• Report on the practice of computer networks. Practice report: Design of a training local computer network. ISA network card

    3. Software

    Topology- physical or electrical configuration of cabling and network connections.
    Topology is the skeleton of the network.
    There are several main types

    The choice of topology used depends on your conditions, tasks and capabilities. Or it is determined by the standard of the network used.
    You can connect your computers and other devices in any way most suitable for you, but in this case you will have to use a very specific standard that supports this topology.
    If it is convenient for you, you can even connect some computers into a network with one topology, and some into a network with a different topology, then connect the networks to each other using some other method.

    Common bus

    All computers are connected to one cable (data bus). At the ends of the cable are installed terminators . Their presence is mandatory for Ethernet networks. 10 Megabit networks are built using this topology 10Base-2 And 10Base-5 . Used as a cable coaxial cable . Damage to the common cable or any of the two terminators leads to failure of the network section between these terminators (network segment). Disabling any of the connected devices does not have any effect on the network.

    For a 10Base-2 network this will look like

    which is absolutely the same from a topological point of view, but may turn out to be more convenient when laying.
    In 100Mbit networks this topology is not used, but is used " Star".

    Each computer (etc.) is connected by a separate wire to a separate port on a device called a hub or repeater (repeater) or hub (Hub).

    Concentrators can be either active or (theoretically) passive. If the connection between the device and the hub is lost, the rest of the network continues to work. True, if this device was the only server, then the work will be somewhat difficult. If the hub fails, the network will stop working.
    This network topology is most convenient when searching for damage to network elements: cables, network adapters or connectors. When adding new devices, a star is also more convenient than a shared bus topology. You can also take into account that 100 and 1000 Mbit networks are built using a “Star” topology.

    The Ethernet standard was developed in the 70s at the PARC research center of XEROX Corporation.
    Some works note that "Ethernet" is a trademark registered by XEROX.
    It was then further developed jointly by DEC, Intel and XEROX (hence the abbreviation DIX) and first published as the "Blue Book Standard" for Ethernet1 in 1980. This standard was further developed and in 1985 a new one was released - Ethernet2 (also known as DIX).

    IEEE 802.3 was approved in 1985 for standardization by the IEEE (Institute of Electrical and Electronics Engineers) LAN Committee and was published under the title: "IEEE 802.3 Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications."
    This standard establishes general rules for data transmission in local networks.

    Ethernet and IEEE802.3 describe similar technologies. Both are CSMA/CD LANs. Both technologies are broadcast technologies. In other words, all stations see all frames, even if they are not intended for that station. Each station must check the received frame to determine whether it is the destination. If so, then the frame is passed to a higher-level protocol for appropriate processing.

    The difference between Ethernet and IEEE 802.3 is minor.

    Both Ethernet and IEEE 802.3 are built into the hardware.

    IEEE 802.3 defines several different physical layers, while Ethernet defines one.

    Each IEEE 802.3 physical layer has a name that reflects its characteristics.
    For example: 10Base5
    10 - local network speed in Megabits per second
    Base = baseband or Broad = broadband
    5 - segment length in hundreds of meters (in this case 500)

    Physical characteristics of the two standards

    Unshielded twisted-pairwire (UTP) - unshielded twisted pair
    Ethernet is closest to 10Base5.

    10Base2 or Thin Ethernet


    10 Base-T or Ethernet over twisted pair

    To connect devices, the 10 Base-T standard provides for the use of a wire having two pairs: one for transmission, the other for reception.
    There are two possible cable layouts in the port. MDI for DTE (Data Terminal Equipment) devices (computers, printers, etc.) and MDI-X for hubs.


    When connecting an MDI port to an MDI-X port, direct cabling is used. And when connecting the same ports MDI and MDI or MDI-X and MDI-X, “inverted” (crossover) cable routing is used. In this case, “transmission” is correspondingly connected to “reception”.


    Repeaters

    Ethernet networks can be extended using a device called a repeater. An Ethernet repeater is a device physically located on a network with two or more Ethernet ports. These ports can be any type: AUI, BNC, RJ-45 or fiber-optic, or any combination.
    The main function of the repeater is to receive data on one of the ports and immediately forward it to other ports. The data (signal) is re-formed during transmission to other ports to eliminate any deviations that could arise during the movement of the signal from the source.
    Repeaters can also perform a function called "separation". If the repeater detects a large number of collisions occurring on one of the ports, it concludes that there was a failure somewhere on that segment and isolates it from the rest of the network. This feature was made to prevent errors from one segment from propagating throughout the entire network.

    Repeaters have a negative feature in that it introduces a delay in the propagation of the signal through the network. All Ethernet networks use an access protocol called CSMA/CD ("Carrier Sense Multiple Access, with Collision Detection").
    For this protocol to work properly, it needs to be able to detect when a collision has occurred. CSMA/CD determines this occurrence by comparing the data that is on the network with what should have been sent to the network. If any difference is detected, it means that a collision has occurred (simultaneous transmission by two devices) and the transmission is stopped immediately. CSMA/CD then waits a random amount of time and retries the transmission.
    There is a flaw in CSMA/CD that limits the size of the network. The sent bits do not instantly reach all points on the network; a certain short period of time is required for the signal to travel along the wires and through each repeater on the network. This time can be measured and is called the "Propagation Delay". If the "propagation delay" between the signal source and the most distant network source is greater than half the size of the smallest frame that can exist, then CSMA/CD will not be able to correctly detect the collision, and data on the network may be lost or corrupted.


    IEEE 10Base5 or thick Ethernet is the oldest standard among the others. Currently (1998) it is difficult to find new equipment for sale for building a network based on this standard. Its main parameters

    When connecting, a 15 pin connector (AUI) is used

    Transceivers

    The name "Transceiver" comes from the English words transmiter and receiver.
    The transceiver allows a station to transmit to and receive from a common network transmission medium. Additionally,
    Ethernet transceivers detect collisions in the medium and provide electrical isolation between stations.
    10Base2 and 10Base5 transceivers connect directly to the transmission medium (cable) common bus. While the first standard typically uses an internal transceiver built into the controller circuit and a T-connector to connect to the cable, the second (10Base5) uses a separate external transceiver and an AUI cable or transceiver cable to connect to the controller. 10BaseF, 10BaseT, FOIRL also usually use internal transceivers.
    It must be said that there are also external transceivers for 10Base2, 10BaseF, 10baseT and FOIRL, which are connected to the AUI port either directly or via an AUI cable.

    Example of an external transceiver for 10Base2:

    AUI connector
    Attachment Unit interface


    100 Base-TX

    Currently, 100Base-TX networks are the most accessible 100Mbit networks. There are also 100VG and 100Base-T4 networks. But they “didn’t catch on.”

    To combine 10 and 100 Mbit networks, 10/100 Mbit hubs, switches or routers are mainly used.

    1000Base-T

    The network will use twisted pair cable category 5 or better, 4 pairs (8 wires) at a frequency of 125 MHz. The maximum distance between devices is 100 meters.

    1.3 Required equipment

    1.3.1 Thin Ethernet 10Base2

    Coaxial cable

    Coaxial cable (from Latin co- together and axis- axis), consists of two coaxial flexible metal cylinders separated by a dielectric.

    Characteristics of coaxial cables

    Notes: PE - polyethylene, S-PE - polyethylene foam, M - copper wire,
    ML - tinned copper wire, STM - steel-copper wire,
    MS - silver-plated copper wire

    Thin Ethernet connectors


    Terminator

    This is a connector (male) with a resistor sealed in it, between the central and external contacts. The resistance of the resistor must be equal to the characteristic impedance of the cable. For networks such as 10Base-2 or thin Ethernet, this value is 50 ohms. Only one terminator in a 10Base2 segment can be grounded. For grounding, a terminator with a chain and a contact at its end is used. For 10Base5, grounding one and only one of the terminators (more precisely, one of the segment points) is mandatory.

    Designed to connect devices to a network segment based on 10 Base-2 (thin Ethernet).

    When disconnecting the device, the T-connector must be left in the network so as not to disrupt its functionality. Or replace the T-connector with a straight connector (I-connector).

    Transitionsstraight
    barrel-connector/I-connector, bulk-head connector

    Designed to connect the mating parts of two connectors with the same or different connecting dimensions, when their direct mechanical connection is not feasible or direct electrical connection is undesirable.

    Used to connect two pieces of coaxial cable with connectors located at the ends. And also for organizing the supply of coaxial cable to the workplace, in order to avoid accidental breakage or unwanted bending of the main wire.

    You can also use a T connector to connect two pieces of coaxial cable.

    1.3.2 Twisted Pair 10BaseT

    Unshielded Twisted Pair
    UTP

    “Twisted Pair” cable consists of “pairs” of wires twisted around each other and at the same time twisted around other pairs, within one sheath. Each pair consists of a wire called "Ring" and a wire called "Tip". (The names come from telephony). Each pair in the sheath has its own number, so each wire can be identified as Ring1, Tip1, Ring2, Tip2, ....
    In addition to the wire numbering, each pair has its own unique color scheme.
    Blue/White for 1st pair,
    orange/white - for 2nd,
    green/white - for 3rd
    brown/white - for 4th
    and so on 25 pairs.
    For each pair of wires, the Ring wire is painted in the primary color with additional stripes, and the Tip wire is the opposite. For example, for pair 1, Ring1 wire will be blue with white stripes, and Tip1 wire will be white with blue stripes.
    In practice, when the number of pairs is small (4 pairs), coloring the main wire with stripes of an additional color is often not used.
    In this case, the wires are colored in pairs:
    Blue and white with blue stripes
    Orange and white with orange stripes
    Green and white with green stripes
    Brown and white with brown stripes.

    To indicate the diameter of a wire, an American measure is often used - AWG (American Wire Gauge) (gauge-gauge, diameter). Normal wire for use in 10 Base-T is 22 or 24 AWG. Moreover, the smaller the diameter of the wire, the greater this value.
    According to standards, wire is divided into several categories according to its “throughput”.

    Usually it is written on the wire which category it belongs to. For example: "...CATEGORY 5 UTP..."
    International standard ISO/IEC 11801 - equivalent to EIA/TIA-568.

    Twisted pair connectors

    Twisted pair networks include 10BaseT, 100BaseTX, 100BaseT4 networks, and the adoption of the 1000BaseT standard is also very likely.
    In network cards of computers, in hubs and on walls there are sockets (jacks), plugs are stuck into them.

    Twisted pair connectors

    Eight Pin Modular Connector (Plug)

    Common name "RJ-45"

    Fork with insert

    Hub

    Hub or concentrator is a multiport repeater. The most common application is 10Base-T or 100Base-TX/T4 twisted pair networks. But there are also hubs for 10Base-2 networks based on coaxial cable and for 10Base-F networks based on fiber optics. Many 10Mbit hubs have both twisted pair connectors, usually called (RJ-45), and coaxial cable (BNC) or AUI. This allows you to use segments of coaxial or optical cable as the main backbone (Backbone) between hubs.

    Twisted pair hubs use MDI-X ports, which allows you to connect computers directly. To connect the hubs to each other, one of its ports has MDI wiring. This port is somehow highlighted on the device body. Various names are used: "Cascading" or "In", or "Cross-over", or "Uplink". There is often a switch that allows you to switch the port mode from MDI to MDI-X and vice versa, which allows you to use this port not for cascading, but for connecting ordinary computers. If your hub does not have a port mode switch (MDI - MDI-X), and all other ports are busy and you need to connect another computer, then you can easily do this simply by using a “cross-over” cable. This cable is used to connect two computers directly without a hub. But keep in mind that often this port is simply a cross-over version of one of the regular ports; in this case, simultaneous connection to the connectors of these ports is unacceptable.
    To connect hubs via a twisted pair cable to each other, a wire (not cross-over) is plugged into a regular connector (MDI-X) on one hub and into a cascading connector on the other.

    An example of a 5-port 10Base-T Hub.

    Patch cord

    A piece of twisted pair (UTP) wire (no more than 5 meters), with RJ-45 plugs crimped at its ends, to connect a computer to a network outlet. It is usually made of a cable that is more flexible and durable than the main cable (multi-core cable), so as not to accidentally crush or break it. Available in Category 3 and Category 5, and crimped to various 568A or 568B standards. The standard depends solely on what is already in use on your network.
    You can make a patch cord yourself by simply installing two RJ-45 plugs at the ends of a piece of UTP cable.

    A device designed to convert Ethernet signals from one transmission medium, such as 10Base2 coaxial cable, to another, such as 10BaseT twisted pair cable.
    Mediaconvertors can also be used to convert twisted pair to fiber optic cable.
    Physically, it is a small device with corresponding network connectors and a power connector.

    (NIC-Network Interface card)

    A network card or network adapter is an expansion card that is inserted into the connector of the motherboard (main board) of the computer. There are also network adapters of the PCMCIA standard for notebooks; they are inserted into a special connector in the notebook case. Or integrated on the computer motherboard, they are connected via some local bus. Ethernet network adapters have appeared that connect to the USB (Universal Serial Bus) port of the computer. Allowing you to connect to the network without opening the computer case.
    Network cards are characterized by their

    • Bit sizes: 8 bits (oldest), 16 bits and 32 bits. You should expect 64-bit network cards to appear (if they haven't already been released).
    • The data bus through which information is exchanged between the motherboard and the network card: ISA, EISA, VL-Bus, PCI, etc.
    • The controller chip or chip (Chip, chipset) on which this board is made. And which determines the type of compatible driver used and almost everything else: bit width, bus type, etc.
    • Supported network media, in Russian: connectors installed on the card for connecting to a specific network cable. BNC for 10Base-2 networks, RJ45 for 10Base-T and 100Base-TX networks, AUI for 10Base-5 networks or fiber optic connectors.
    • Operating speed: Ethernet 10Mbit and/or Fast Ethernet 100Mbit, Gigabit Ethernet 1000Base-..
    • Also, twisted pair cards may or may not support FullDuplex operation.
    • MAC address

    The MAC address is used to determine the destination of frames on an Ethernet network. This is a unique serial number assigned to each Ethernet network device to identify it on the network. The MAC address is assigned to the adapter by its manufacturer, but can be changed using a program. This is not recommended (only if two devices are detected on the network with the same MAC address). During operation, network adapters scan all passing network traffic and look for its own MAC address in each packet. If one is found, then the device (adapter) decodes this packet. There are also special methods for sending packets to all devices on the network simultaneously (broadcasting). The MAC address is 6 bytes long and is usually written in hexadecimal, e.g.

    12:34:56:78:90:AB

    There may be no colons, but their presence makes the number more readable. Each manufacturer assigns addresses from its address range. The first three bytes of the address identify the manufacturer.

    ISA network card

    Combined network card (BNC+RJ45), ISA bus
    Simultaneous use of two connectors is not permitted.

    BootROM

    The "BootROM" ROM chip is designed to boot the computer's operating system not from a local disk, but from a network server. Thus, you can use a computer that does not have disks or drives installed at all. Sometimes this is useful from a safety point of view (neither bring nor take away), sometimes from a savings point of view. To install BootROM on the network card, there is a socket for the Dip housing. The boot chip must match the network card.

    PCI network cards
    UTP RJ-45

    32-bit network adapters. If there is support for PCI BUS-Mastering (PCI-Bus-Master-Mode), this can reduce the load on the processor.

    Network Card Configuration

    For normal operation of each network card, it needs an input/output address (In/Out port) and an interrupt number (IRQ).
    Configuring the network card consists of setting it to a free address and interrupt, which will then be used by the operating system. Each network card must have its own address (i/o port) and interrupt (IRQ), different from other devices on the computer. Modern network cards that support Plug-n-play technology perform this operation themselves; for everyone else, you need to do it yourself.
    Searching for unoccupied addresses and interrupts depends on your knowledge of the computer hardware or software installed on it.

    Input/output address (In/Out Port, Address) - an area of ​​computer memory, specified in hexadecimal form (beginning of the area), through which data is exchanged with the device.

    IRQ - Interrupt ReQuest - interruption or request for interruption.

    Search for free addresses and interrupts using MS-DOS

    This operating system includes the MSD.EXE program and is usually located in the DOS directory. You can launch it by simply typing MSD from the command line. If the program freezes at startup, you can start it with the /i switch.

    If the computer has a sound card, then you need to check what address and interrupt it uses by looking at, for example, CONFIG.SYS and AUTOEXEC.BAT

    Windows NT 4

    You need to run the winmsd.exe program included with WindowsNT.
    "Start" or "Start" for Russian version
    "Run" or "Execute"
    type winmsd
    press ENTER
    In the window that appears, select the "Resources" tab
    A list of interrupts in use appears. For example this:

    ISA plug"n"play network cards

    Some older computers (486,386,286) do not support plug"n"play technology. There may also be no driver that supports plug"n"play for your operating system. In this case, you need to use the network card settings program to disable this function in it. And then configure the network card using the program.
    Theoretically, when you turn on the computer, the BIOS itself should indicate to the network card a free interrupt number and I/O address. But in practice, errors very often occur that lead to conflicts between the network card and other devices.
    There are three approaches when installing plug"n"play network cards.

    · Install a network card, relying entirely on plug"n"play technology. If any problem occurs, use one of the following methods:

    · When changing the BIOS settings related to assigning interrupts to various PCI bus slots, as well as ISA devices, leave the interrupt free, which will be assigned to the network adapter. If this method does not lead to a positive result, then use the next point.

    · Using your network adapter setup program, disable, if at all possible, the plug"n"play function of the adapter. And in the future install it as an adapter with software configuration.

    Configuring (setting up) a network card
    using a special utility (program)

    To configure the network card to the desired address and interrupt, you must use the configuration program that came with the card.
    If for some reason the program supplied with the board is missing, you can try to find a network board with exactly the same type of controller chip and use the configuration program from it.
    Most programs are designed to run in DOS (since they require direct access to the device), you will need to boot the computer using this operating system or in MS-DOS mode for Win95.
    The running configuration program shows the current settings of the network card and allows you to change them in case of conflicts with other equipment. It also allows you to check the operation of the network card using tests.

    Tests are internal and external. During internal (internal or self) tests, the program tests for register errors inside the board. During external tests, the card sends packets to the network and listens for responses from the network. Thus, by running an external test on two different machines, you can check the functionality of the network segment. It should be noted that some programs automatically terminate external tests after a short period of time (~1 min) and this period is not enough to run to another machine and run the test on it. It gives the wrong impression that there is some kind of malfunction.
    Often, to run external tests on one network card, you need to specify that it acts as a server, and on the other as a client.

    Some network cards require you to specify the type of connector used (port or media type) BNC, UTP (RJ-45) or AUI manually.
    It's best to write down the changes you make (on a piece of paper) so you don't forget.
    At the end of the work, the program will ask you about the need to write new values ​​to the rewritable ROM (EPROM), this must be done.

    Configuring (setting up) a network card

    using jumpers

    In the descriptions of jumpers, the following designations are possible:
    JP1- group of contacts (pins) number one (connector number one), there can be two or more pins in the connector (three, four, etc.).

    And it also happens:

    Boot Rom- whether to use the boot chip or not. If you do not use this chip, then put it in the Off or Disable position.

    You need to set the desired interrupt and the desired address.

    2.3 How to install network cards in a computer

    The network card is inserted into the corresponding data bus connector located on the motherboard.

    If the network card is designed for the ISA data bus, then the card must be inserted into any free ISA slot.
    The connectors are usually black (at least I haven't come across any others).
    The choice of connector is determined solely by your convenience. If you later need to use this particular connector for some other purpose, you can safely remove the network card and move it to another ISA slot. In this case, neither the interrupt nor the input/output address used is changed.

    PCI slot

    There is also a PCI data bus (white connectors). Network cards designed for PCI must be inserted into a PCI slot.

    On the computer

    Before inserting the card, make sure (by attaching) that the corresponding plug on the computer case is removed.
    The plugs are screwed, these need to be unscrewed, and then the network card is screwed in with the same screw. There are also plugs cut out during the manufacture of the case; these must be bent using, for example, a screwdriver, and then broken off. Try not to damage anything unnecessary or injure yourself, because... such an operation often requires considerable effort, and the edges of the glands are sharp.

    Inserting a card into the slot does not require much effort, but it does require that the card fit into the slot itself accurately. In all pictures, network cards are drawn with the blade part down. It is most convenient to insert the card into the computer when it is positioned horizontally, and you insert the card into it from above. You need to insert it as if “rolling”: first one side of the connector, then the other.
    Place the card with the knife part above the connector, and your fingers along the edges of the top of the network card (the first on the metal corner, the second closer to the opposite corner). Lightly press the card with your “second” hand, it should begin to go into the slot, when it goes in about halfway, press with your “first” hand and the card should go completely into place. If you feel that she is up against something, don’t push, because... You'll probably break something. Check whether the tongue of the metal corner of the network card rests against the bottom of the hole on the computer case; if necessary, press it with your finger so that it does not come out and press the network card into place.
    Look at how other cards (if any) are installed in the case and screw your network card in place.

    3. Software

    Server or client are functions that a computer performs. Any computer on the network can perform the functions of a server or a client, or it can perform both of these functions simultaneously. It all depends on the software.
    Server functions (serve - serve) - perform operations based on client requests. This could be storing and transferring files, running applications with results, servicing printers, etc. If a computer performs only server functions, it is usually called a dedicated server. Often such a computer has a monitor or keyboard that is turned off or does not have a monitor at all, and all control is done from other computers via the network.
    If a computer does not perform any server functions on the network, then such a computer is called a workstation, and users work at it.
    If computers on the network simultaneously perform both server and client functions, then such a network is called peer-to-peer.
    Different Operating Systems (OS) are designed differently for server and client functions. There are a number of operating systems specifically designed to perform server tasks.
    Novell NetWare
    Windows NT Server
    OS/2 Warp Server
    Various Unix servers.

    Network clients

    Installing network support depends on the operating system (OS) you are using, its version, and the tasks you are facing.
    If you don't know what OS you are using, try to determine it in the following ways.
    1. When loading, the OS usually displays its name and version on the screen.
    The most common is Windows 95 or Windows 98
    2. Dial a command
    ver
    on the command line. And read the system response.

    DOS clients

    To connect a computer running MS-DOS or a similar operating system to network resources, you must use a special set of programs.

    1.Dos client for Microsoft networks.

    2. Dos client for Netware networks

    3 DOS Client - IBM LAN Client

    W in95 (Win98) Client

    The Windows 95 operating system is available in several flavors and languages.
    Release 950
    English
    Pan-European
    Russian
    OSR2 release
    English
    Pan-European
    Russian

    Setting up network support for OSR2 Rus

    You will need a distribution kit for installation.
    If you have a PCI network card, then simply insert it into your computer and follow the instructions that came with the card.

    For NE2000 type ISA network card:

    Insert the network card into the computer, connect the cable, configure the desired address and interrupt.
    Download Windows95.
    Go to Control Panel (Start->Settings->Control Panel)
    Select "Network"
    In the "Configuration" tab
    click Add
    Component Type Selection Menu
    Network Card->Add

    "Selection: network cards" (Note: there is a version of the page with pictures)
    in the "manufacturers" section you need to find "Novell/Anthem"
    and in the "network boards" section - "NE2000 - compatible board"
    click OK

    You will return to the “network” window, new tabs will appear: “Computer” and “Access Control”
    If network support was not available before, the following components will appear:
    Client for Microsoft Networks
    Client for NetWare networks
    NE2000 compatible board
    IPX/SPX compatible protocol
    NetBEUI
    The network login method will become:
    Client for Microsoft Networks

    Let's configure the network card parameters, select "NE2000-compatible card", click the "Properties" button.

    NE2000 Compatible Board Properties window Click the Resources tab

    In the window that appears. In the "Interrupt (IRQ)" section, specify the interrupt you have installed. And in the "Input/Output Range" item, select the address of your network card. Moreover, the board address must be equal to the beginning of the specified range. For example 280-29F for address 280.
    Click "OK"

    You will be returned to the "network" window.
    Let's add support for the TCP/IP protocol. Click the "Add" button.

    The Select Component Type window appears.
    Specify "Protocol" and click "Add".

    Select: Network Protocol Window
    In the Manufacturers menu, select Microsoft, and in the Network Protocols menu, select TCP/IP. Click "OK".

    You will be taken to the Properties: TCP/IP window.
    If you know for sure that you need to obtain an IP address automatically from a DHCP server, then leave it as is, click “OK” and do not complete the next step. If you are setting up the computer yourself, then select “Specify the IP address explicitly. Specify the IP address and subnet mask that you need. Click “OK”.
    Note: the remaining protocol parameters (Gateway, WINS, DNS) are configured in accordance with the settings installed on your network. Consult your network administrator.

    Network window.
    To assign a network name to your computer, as well as to specify a domain or workgroup, select the "Computer" tab. Enter the name of the computer that will identify it on the network (for example, "COMPUTER1"). Enter the name of your workgroup. If you don't know what to specify, leave it as is (WORKGROUP). Additionally, you can write a description of the computer. Click "OK".

    Network window.
    Make sure the distribution is available. Click "OK".

    A window will appear showing the process of copying files.

    Finally, you will be prompted to reboot the system by clicking Yes.

    After the reboot, a window will appear in which you must enter your username and password. When entering a password, asterisks will be printed instead of letters, this is how it should be. If you typed everything correctly, then clicking “OK” will take you to the system, and your name and password will be used when you access other computers on the network (your workgroup). If you click "Cancel", you will still be logged into Windows, but network resources will not be available to you.

    If you are a new user, a window will appear asking you to confirm your password. You must re-enter the same password.

    If you logged in without a password or want to log in under a different name, select "Start" - "Shut Down".

    And in the “Shut down Windows” window that appears, select “Log on with a different name.”
    Click Yes.

    3.1.2 Servers

    Windows95 Server Features(Windows98)


    4. How to connect two computers via a local network?

    Connecting two computers to a local network
    (short step-by-step instructions)

    At the moment, there are two most common ways to connect computers to a local network, based on two implementations of Ethernet technology. These two standards differ in topology and cable used. The 10Base-T standard is now the most used because it is more technologically advanced (such networks are easier to maintain, more reliable and easier to upgrade). However, no one has canceled the 10Base-2 standard, and on its basis it is possible to create a completely modern and viable network. 10Base-T (Ethernet over twisted pair)
    It is good for its reliability, it is more modern, it allows connecting computers at speeds of up to 100 Mbit. But it doesn’t allow you without purchasing a special device HUB expand the network even to three computers. However, this device is not very expensive. Maximum computer-to-computer or computer-to-hub distance 100 meters. It is preferable to use within the same building.

    You will need:
    a. Network cards with a UTP connector (other names may be: twisted pair or RJ-45).
    b. Measure, as accurately as possible, the distance between the computers (you need to measure along the path where the cable will be laid, that is, for example, you need to go around the door along the jamb). Add a few meters to this number (just in case). The cable length should not exceed 100m. Purchase twisted pair cable category 5 (cat.5) in the required quantity.
    c. Two RJ-45 plugs (connectors). You can also purchase two protective caps for them.
    d. The tool is a crimping tool (although two connectors can be crimped with a screwdriver).

    Job:
    1
    2 . Attach the connectors to the ends of the cable in accordance with the "cross-over" cable pattern.

    3 . Insert network cards into computers, configure them with free addresses and interrupts (write them down).
    4. Plug (until a click) the connectors on the cable into the installed network cards.
    1 -network card (adapter) installed in the computer, 2 - connector on the cable.

    5 . Boot your computer. Enable network support in your operating system (adapter driver, protocol, clients) in accordance with the address and interrupt set on the board.

    10Base-2 (coaxial cable based)
    The good thing is that you can easily add several more computers. Maximum distance between extreme points - 185 meters.

    You will need:
    a. Two network cards BNC (eg NE2000 Compatible) with T-connectors included (if not, buy one separately for each board).
    b.Measure, as accurately as possible, the distance between the computers (you need to measure along the path where the cable will be laid, that is, for example, you need to go around the door along the jamb). Add a few meters to this number (just in case). The cable length should not exceed 185 m. Purchase coaxial cable with a characteristic impedance of 50 Ohms (similar to an antenna for a TV, but it has a characteristic impedance of 75 Ohms and is not suitable). This cable is branded RG-58.
    c. Cable connector with bayonet joint, like the domestic SR-50-... 2 pcs. for each piece of cable.
    d. Terminators 2 pcs.
    e. Soldering iron (only needed for soldering domestic connectors to cables; if you have the opportunity to purchase crimp connectors and a tool for crimping them, then a soldering iron is not required).

    Job:
    1 . Lay the cable along the desired path, avoiding twists and damage. Leave a margin of about 2-3 m on each side in case of possible rearrangements of computers and for ease of installation of connectors.
    2 . Secure the connectors to the ends of the cable.
    3. Insert network cards into computers, configure them with free addresses and interrupts (write them down).
    4. Place the T-connector (male) on the connector protruding from the board (female) and turn the bayonet clockwise to secure the connector.
    5 . Place the cable connector onto one of the T-connector connectors.
    6 . Place a terminator on the other T-connector connector.

    1 network card (adapter), 2 T-connector, 3 - cable connector, 4 - terminator

    7 . Boot your computer. Enable network support on your operating system ( adapter driver, protocol, clients) in accordance with the address and interrupt set on the board.

    Twisted pair cable routing

    to connect two computers directly

    Twisted pair cable can be either four-wire or eight-wire. RJ-45 plugs are used for cable mounting. The plug must be installed on the cable using a special tool.

    For an eight-wire cable (four pairs):

    Or, for example, another option.

    INTRODUCTION Objectives of the practice: 1. Consolidation of theoretical knowledge acquired during the study of disciplines: organization of computers and systems, system software, databases, computer networks and telecommunications, peripheral office equipment; 2. Familiarization with production processes, including the use of computer technology and information technology; 3. Study of methods of formation, processing, accumulation and use of information flows in the production process; 4. Acquiring skills in the use of autonomous and integrated computing systems; 5. Analysis of achievements and shortcomings in the organization’s activities. Topic of practice: 1. Study of the principles of construction and operation of a local computer network in a specific organization. I chose the organization Snowman Plus LLC as the place for my production and technological practice. The internship period is four weeks, from June 15 to July 13, 2004. Enterprise structure: Director Evgeniy Nikovaevich Masov. He has 20 people subordinate to him: accountant, loaders, drivers, technicians, salesmen. MAIN PART As a result of undergoing production and technological practice, the student should know: General principles of construction and computer architecture; Principles, methods and methods of integrating hardware and software when creating computer systems, complexes and networks; Models, methods and forms of organizing the process of developing a software product, technical product; Basic capabilities of database management systems and their use. In addition, he must learn: 1. Use technical and reference literature, sets of standards for the development of a software product, technical product; 2. Use the knowledge and skills acquired during the learning process for the competent and technically sound development of a software product or technical product; 3. Design a software product, technical product; 4. Develop programs with a modular structure; 5. Apply methods and means of testing and testing a software product, technical product; 6. Use debugging tools; LLC "Snegovik Plus" sells wholesale products in Ulyanovsk. I did an internship in the technical department under the guidance of programmer N.F. Vorlamov. Databases on deliveries and quantities of goods in warehouses are managed using computers with the Windows 95 or Windows 98 operating system. In order to save time transferring information from one computer to another, the director of this company decided to create a local network in his organization. The technical department was tasked with laying a network to every computer in the company. The technical department began to complete the task. First, we had to project on the spot which type of network would be better for us to use a Local Network with a central Server. See Appendix 1 The simplest version of such a network is to connect computers through parallel or serial ports. In this case, there is no need for any additional equipment. There should only be connecting conductors. Such communication between computers is configured within one or several rooms. It is used to transfer data from one computer to another. In this case, you can transfer data without using floppy disks. Any modern operating system shell has software that ensures such data transfer. In local peer-to-peer computer networks, computers connect to the network through special network adapters, and the functioning of the network is supported by the network operating system. Examples of such operating systems are: Novell Personal Net Ware, Net Ware Line, Windows for Workgroups. All computers and their operating systems in local peer-to-peer computer networks must be of the same type. Users of this network can transfer data to each other, use shared printers, magnetic and optical disks, etc. In a local multi-rank computer network, one more powerful computer is used, which is called a server, and other, less powerful ones are called workstations. Servers use special system software that differs from workstation system software. Main parts of the network. For our network, we used twisted pair cable or Twisted Pair 10BaseT coaxial cable. Twisted Pair Connectors Twisted pair networks include 10BaseT, 100BaseTX, 100BaseT4, and the 1000BaseT standard is also very likely to be adopted. In network cards of computers, in hubs and on walls there are sockets (jacks), plugs are stuck into them. Twisted pair connectors Eight-pin modular connector (Plug) Popular name "RJ-45" ​​The "RJ-45" ​​plug is similar to the plug from imported phones, only slightly larger and has eight pins. 1 - contacts 8 pcs. 2 - connector retainer 3 - wire retainer View from the contact side Contact 1 2 3 4 5 6 7 Contact 8 View from the cable side Front view On a new, unused plug, the contacts extend beyond the body. During the crimping process, they will be recessed into the body, cutting through the insulation (2 ) wires and stick into the core (1). Plugs are divided into shielded and unshielded, with and without insert, for round and flat cable, for single-core and stranded cable, with two and three prongs. It is useful to install a protective cap on the cable along with the plug. Plug with insert Unraveled and arranged in accordance with the method you choose, the cable wires are inserted into the insert until it stops, the excess is cut off, then the resulting structure is inserted into the plug. The fork is crimped. With this installation method, the unraveling length is minimal, installation is simpler and faster than when using a conventional plug without an insert. This fork is somewhat more expensive than a regular one. Connection dimensions (in mm) Connectors for 10Base-T Eight-pin modular connector. Socket (jack) and socket (outlet) Sockets are installed in network cards, hubs, transceivers and other devices. The connector itself consists of a row (8 pieces) of spring contacts and a recess for the plug latch. If you look at the socket from the side of the contacts, when they are located below, then the countdown goes from right to left. A socket is a socket (connector) of a connector with some kind of device for fastening the cable and a housing for ease of installation. It also includes a plug. Sockets, as well as cables, come in different categories. It is usually written on the body of the outlet which category it belongs to. When building 10Base-2 networks, you must use Category 3 (Cat.3) or better 5 (Cat.5) outlets. And for 100Base-TX networks, only Cat.5 must be used. Category 5 sockets are also divided according to the method of installing the cable in the socket itself. There are quite a large number of solutions, both supported by any one specific company, and quite generally accepted ones - “type 110”, “type KRONE”. It should be noted that KRONE is also such a company. In general, a huge number of different types of sockets are produced, but for the home you have to use the cheapest ones - external ones. A regular socket is a small plastic box, which comes with a screw and a double-sided sticker for mounting on the wall. If the wall covering allows it, it is easier to use a sticker; if not, you will have to drill the wall and screw the socket in place with a screw. On one side of the case there is a connector for connecting an RJ-45 plug; By the way, there are sockets that have two or more connectors in the housing. To remove the cover from the box and get to the inside of the socket, you need to show a lot of patience and resourcefulness. The lid is held on by internal latches, usually not marked on the outside. In my opinion, manufacturers compete with each other and with the user on which outlet is more difficult to open. It is necessary to detect these latches, then there are two possibilities: the latches open either inward (which is less common) or outward. The latches that open inward must be pressed on, and the latches that open outward must be pryed with something. It is useful when purchasing to ask to be shown how the socket opens. After removing the cover, depending on what type of outlet you have, you will find wire fasteners and a connector. Network cards are used to connect the network to the computer. PCI network card Combined network card (BNC+RJ45), PCI bus Simultaneous use of two connectors is not allowed. 1 - Twisted pair connector (RJ-45) 2 - Connector for coaxial wire (BNC) 3 - PCI data bus 4 - Socket for BootROM chip 5 - Board controller chip (Chip or Chipset) PCI connector There is also a PCI data bus (connectors white). Network cards designed for PCI must be inserted into a PCI slot. On the computer Setting up a server. Servers Server functions Windows95 (Windows98) Enter the "Control Panel" (Start->Settings->Control Panel) Select "Network" In the "Configuration" tab, click the "Add" button. Menu "Select a component type" Select "Service" and click "Add". Window "Selection: Network Service". We indicate "Manufacturers" - "Microsoft", and "Network Services" - "File and Printer Access Service for Microsoft Networks". Please note that at the beginning this inscription is not completely visible and you need to scroll it to the left so as not to make a mistake. Click "OK". If you also want to add access to your computer via http (or www), then go to the "Select: Network Service" window again and specify "Microsoft", "Personal Web Server". Click OK. Network Window. Make sure the distribution is available. Click "OK". A window will appear showing the process of copying files. And finally you will be prompted to reboot the system by clicking "Yes". After the reboot, log into the network and select the "My Computer" icon. In the window that appears, right-click on the drive that you want to make accessible over the network. If you want to make accessible not the entire disk, but some of its directory (directory), then by double-clicking on this disk with the left button, right-click on the directory you need. In the menu that appears, select the access item. The “Properties: ..” window will appear. ." Indicating that this resource is local. Select "Shared resource", the network name will be the drive letter or directory name. You can change this as you like, subject to some restrictions on the characters used. I usually leave it as is, so as not to get confused later. Here you can also change the type of access and limit it all with passwords. Click "OK" In a second your resource will become available over the network. PRACTICE DIARY June 15 - Meeting the Programmer, visiting the internship site; June 16 - Study of the internal rules of the enterprise; June 17 - Selected literature on the topic of the assignment, studied software (Novell Personal Net Ware, Net Ware Line, Windows for Workgroups.); June 18 - Software learning; June 21 - Software learning; June 22 - Site inspection; June 23 - Network design; June 24 - Purchase of materials and tools; June 25 - Preparing the facility for work; June 28 - Preparing the facility for work; June 29 - Laying a network; June 30 - Laying a network; July 1 - Checking the network capacity (Break); July 2 - Installation of equipment and connection of devices; July 5 - Installation of equipment and connection of devices; July 6 - Installation of Operating System, Drivers on Computers; July 7 - Installation of the Operating System, Drivers on Computers; July 8 - System setup; July 9 - Setting up the main server; July 12 - System and network testing; July 13 - Writing a practice diary; CONCLUSIONS: While at this enterprise I: 1. Complied with labor protection and safety regulations; 2. Complied with the rules established for employees of the enterprise, including on issues of labor regulations, fire safety, confidentiality regime, responsibility for the safety of property; 3. Studied the current standards, technical conditions, job responsibilities, regulations and operating instructions for VT; 4. Studied the rules of operation and maintenance of military equipment and research facilities available in the department; 5. Mastered individual computer programs used in the professional field (Novell Personal Net Ware, Net Ware Line, Windows for Workgroups); 6. Mastered working with periodicals, abstracts and reference information publications on computer science and computer technology; Performed tasks provided for by the internship program. 1



    Department ____________________________________________________________

    name of the department providing practice

    I CONFIRM:

    Head department ___________________________

    "_____" _______________________20__

    EXERCISE

    According to production practice

    to the student(s) of the group ______ _____________________________________

    Full name student(s)

    Specialty (direction)

    Duration of practice from _____20__. to _______ 20___

    ____________________________________________________________________

    generalized formulation of the task

    Task schedule


    Name of the tasks (activities) that make up the task

    Date of completion of the task (activity)

    Signature of the practice manager from the organization

    1

    2

    3

    Theoretical part

    Practical part

    Defense of the practice report

    Head of practice from the university

    _________________ ___________________

    signature full name, position

    Justification of the need for a corporate network 4

    1.1 The value of information, information technology 4

    1.2 Inconveniences in the absence of a LAN 4

    1.3 Problems solved by the presence of a LAN 5

    Description of the organization's corporate network 6

    1.4 Network topology 6

    1.5 Network model 7

    1.6 Protocol 9

    Hardware and software 10

    1.7 Server and work computer hardware 10

    1.8 Network equipment 12

    1.9 Network cabling system 13

    1.10 Software 14

    1.11 Ensuring information security 17

    Conclusion 18

    List of sources used 19

    Introduction

    Today, computerization in the workplace is a common phenomenon. The presence of only computers in the office with a large information flow and volume of work with documents slows down the work process of employees and creates inconvenience. The success of almost any enterprise or organization is connected or depends on the availability and well-established information system. Such systems are local computing systems (LANs), which are now often called corporate networks.

    Creating a corporate network allows you to:

    – organize high-speed data exchange between employees;

    – reduce paperwork within the organization;

    – increase labor productivity;

    – reduce time for processing information.

    Removable storage media for data exchange are no longer necessary, and there is no need to print documents on paper that need to be shared with multiple users.

    A network printer, modem, scanner can be installed on the network, and the network server is used as an application server.

    In addition, such networks are closed networks; access to them is allowed only to a certain circle of users, which ensures the protection of information. All these capabilities cannot be implemented using operating systems (OS) and application programs alone. Therefore, most modern enterprises use LAN.
    ^

    Justification of the need for a corporate network

    1.1 The importance of information, information technology


    The editorial office of the newspaper "Work in the City" is engaged in the preparation (writing of materials, accepting advertisements, advertising design, layout) of the newspaper for printing in the printing house. That is, the activities of an organization are associated with the use and generation of a large amount of information. The slightest violation during its storage and processing will affect the reduction in the efficiency of the editorial office as a whole. Information is a unique subject of labor, and a well-organized process of managing information resources allows an enterprise to effectively conduct its activities and solve assigned tasks with a lower degree of risk. Using a local computer network allows you to get rid of paperwork, increases productivity, and reduces the time for processing information.

    With the introduction of the network, the personalization of computing tools took place, and automated workstations were organized to effectively solve relevant problems.
    ^

    1.2Inconveniences in the absence of a LAN


    The absence of a network would complicate the work of employees, cause inconvenience, and entail costs:

    – transferring information from one computer to another would be carried out using removable memory media and would take time;

    – access to the global network was made only from a computer with a modem;

    – not all computers are equipped with peripheral devices (printers) (to use such a device you need a removable memory medium, the computer to which the device is connected must be freed for some time);

    – costs of purchasing various devices for each computer (hard drive, printer, CD-ROM, modem) and expensive software.
    ^

    1.3 Problems solved by the presence of a LAN


    LAN ---– a set of hardware and algorithms that ensure the connection of computers and peripheral devices located at a short distance (one enterprise, office), and allow the rapid exchange of data, the sharing of information resources, peripheral devices.

    Features provided to LAN users:

    – saving and archiving your work on the server so as not to use up valuable space on your PC’s hard drive;

    – easy access to applications on the server;

    – collaboration with documents;

    – simplification of document flow (the ability to view, correct and comment on documents without leaving your workplace, without organizing time-consuming meetings);

    – making it easier for organizations to share high-value resources such as printers, CD-ROM drives, hard drives and applications (for example, word processors or database software).

    ^

    Description of the organization's corporate network

    1.4 Network topology


    The topology of a computer network is the way of connecting its individual components (computers, servers, printers, etc.).

    The editorial LAN is built according to a “star” topology based on a server: all computers are connected to a central component using cable segments, information between network clients is transmitted through a single central node, and the server acts as the central node. At the same time, two printers installed in the editorial office are also connected to the server and are networked.

    Editorial local network diagram (star topology type)

    "Star" originated in the early days of computing, when computers were connected to a central, main computer. The advantages of this topology are as follows:

    – high network performance, since the overall network performance depends only on the performance of the central node – the server;

    – internal client calculations do not affect the server processor speed;

    – there is a single person responsible for the administration of network resources;

    – provides the ability to restrict and control access to network resources;

    – no collision of transmitted data, since data between the workstation and the server is transmitted over a separate channel without affecting other computers.

    Disadvantages of the star topology:

    – the reliability of the entire network is determined by the reliability of the central node; if the central computer fails, the operation of the entire network will stop;

    – cabling costs are high, especially when the central node is geographically located far from the center of the topology; When expanding computer networks, previously made cable connections cannot be used: a separate cable must be laid from the center of the network to the new workplace.

    The main criterion when choosing this topology was the fact that if only one computer (or the cable connecting it to the server) fails, then only this computer will not be able to transmit or receive data over the network; this will not affect the other computers on the network.
    ^

    1.5Network model


    The type of LAN in question is a client-server type, there is one main computer - the server. Nine computers and two network printers are connected to the server. Main server tasks:

    – storage of user work data;

    – storage of accounting databases, archives, etc.;

    – storage of service databases and department programs;

    – storage of user home folders.

    The server is designed to provide access to multiple files and printers while providing high performance and security. Administration and control of access to data is carried out centrally. Resources are also centrally located, making them easier to find and support.

    Diagram of a client-server network model

    Advantages of this model:

    – high network speed;

    – availability of a unified information base;

    – presence of a unified security system.

    Since all important information is located centrally, that is, concentrated on one server, it is not difficult to ensure its regular backup. Therefore, if the main data storage area is damaged, information will not be lost - it is easy to use a duplicate copy.

    This model also has disadvantages. The main one is that the cost of creating and maintaining a client-server network is significantly higher due to the need to purchase a special server.

    The decisive argument when choosing a server-based network was the high level of data protection. In such networks, one administrator can deal with security issues: he creates a security policy and applies it to each network user.

    1.6 Protocol

    A protocol is a set of rules and technical procedures that govern communication between computers on a network.

    The process of transmitting data over the network is divided into several steps. At the same time, the order in which these steps are performed is strictly defined. The purpose of protocols is to define such steps and control their implementation. The editorial network uses the Transmission Control Protocol/Internet Protocol – TCP/IP.

    TCP/IP is an industry standard set of protocols that provide communication in a heterogeneous environment, ensuring compatibility between computers of different types. Compatibility is the main advantage of TCP/IP; most LANs support it. TCP/IP also provides access to Internet resources, as well as a routable protocol for enterprise-scale networks. Because TCP/IP supports routing, it is commonly used as an internetworking protocol.

    TCP/IP has two main disadvantages: size and insufficient operating speed. But it’s quite suitable for an editorial network.
    ^

    Hardware and software

    1.7Hardware of the server and work computers


    There are two parameters that distinguish the server from ordinary computers. The first is very high performance (this also applies to efficient exchange with peripheral devices), a fairly powerful disk subsystem (mainly with a SCSI interface); the second is increased reliability (the server, as a rule, works around the clock).

    Server performance is often measured in transactions. A transaction is understood as a set of three sequential actions: reading data, processing data and writing data. In relation, for example, to a file server, a transaction can be considered the process of changing a record on the server when a workstation performs a modification of a file stored on the server.

    Of great interest is the maximum amount of RAM that can be used on a given server, the possibility of installing a more powerful processor, as well as a second processor (if you plan to use an operating system that supports a dual-processor configuration).

    An important question also remains about what configuration of the disk subsystem can be used on this server, first of all, what is the volume of disks, their maximum number.

    The ability to expand the system and the ease of its modernization play an important role, since this is what allows us to ensure the required performance not only at the current time, but also in the future. An important circumstance in the operation of a server is its high-quality and uninterrupted power supply.

    In our case, the server is implemented on a regular, standard computer with a configuration with fairly good characteristics.

    To power the server, an INTEL processor based on dual-core Core 2 Duo technologies was selected, which has high performance, operational reliability, good power consumption and temperature indicators.

    For workstation hardware, preference was given to processors from AMD with average performance and low price.

    The server motherboard is ABIT P-35 on socket 775. It is optimal in terms of price-performance, has good bandwidth, dual-channel architecture for RAM, and is equipped with a built-in network card with a bandwidth of up to 1 Gb/sec. This board supports many modern processors from INTEL, which will allow you to increase system performance by replacing the processor if necessary. There are also a large number of slots for system expansion.

    Server motherboard – ABIT IP-35

    RAM for the server is implemented on two sets of OCZ Gold Series (4 sticks of 512 MB each).

    When choosing storage devices, special attention is paid to its reliability, this especially applies to server equipment. When designing the network, the editors took into account that it was planned to organize a large database, so they decided to use a RAID array of the RAID-5 level. The data blocks and checksums in this array are written cyclically to all disks. This is the most popular of the levels, primarily due to its efficiency.

    Writing information to a RAID 5 volume requires additional resources, since additional calculations are required, but when reading (compared to a separate hard drive), there is a gain, because data streams from several array drives are parallelized. The minimum number of disks used is three, so three disks from the reliable manufacturer Segate, with a capacity of 150 Gb each, were chosen to organize the RAID.

    For the workstations, the smallest hard drives were selected, from those available in the store - 80.0 Gb from Hitachi. This volume is quite sufficient for installing various professional applications and office programs. And the cache memory size of 8MB will allow you to organize work without delays.
    ^

    1.8Network equipment


    The editorial office's LAN has additional equipment installed: two network printers and a modem.

    A network printer eliminates the need to purchase multiple devices for all employees who need them. When creating the network, Samsung CLP-300 A4 color laser printers were chosen.

    The modem is connected to the LAN server. Modem D-Link DSL-2540U is selected.

    The most important component of a computer network is network cards. Network cards act as a physical interface between the computer and the network cable. The main purpose of the network card:

    – preparing data coming from the computer for transmission via a network cable;

    – transferring data to another computer;

    – control of data flow between the computer and the cable system.
    ^

    1.9 Network cabling system


    Cable lines are a complex structure. The cable consists of conductors enclosed in several layers of insulation: electrical, electromagnetic, mechanical. In addition, the cable can be equipped with connectors that allow you to quickly connect various equipment to it. In the computer network under consideration, it is not necessary to lay the communication base from the PC to the server over a distance of more than 100 meters, so a UTP category 5e twisted pair cable is used, supporting a transmission speed of 100 Mbit/s.

    Twisted pair cable

    A twisted pair cable consists of pairs of wires twisted around each other and simultaneously twisted around other pairs within the same sheath. Each pair consists of a wire called a "Ring" and a wire called a "Tip". Each pair in the shell has its own number. Curling wires eliminates electrical interference. The shielded twisted pair cable has a copper braid that provides additional protection against interference. The maximum length of unshielded twisted pair cable is 100 m.

    Advantages of twisted pair:

    – high performance in data transfer speed;

    – low cost;

    – installation prostate;

    – high noise immunity;

    – the dimensions of the areas allow the minimum effective cable length to be kept within.

    RJ-45 connectors are used to connect twisted pair cables to computers.
    ^

    1.10Software


    Today, server versions of the Windows operating system are widely used, mainly due to ease of administration and low total cost of ownership. What distinguishes the Windows Server 2003 family from its predecessors is the presence of the Microsoft .NET Framework in their composition. Windows Server 2003 comes in four editions. The editors use Windows Server 2003 Standard Edition. This is a network operating system for running the server part of business solutions and is designed for use in small companies and departments. It features resource sharing and centralized deployment of desktop applications, as well as support for up to 4GB of RAM and dual-processor symmetric multiprocessing.

    Workstations are computers that use network resources but do not have their own resources themselves. Such computers run an operating system. The Microsoft Windows XP Professional operating system was installed for the editorial workstations. This system has a wider range of configuration, administration and local network capabilities than Windows XP Home Edition. Windows XP Professional has many advantages:

    – stability. A prerequisite for system reliability is that applications run in their own memory spaces. This protects them from conflicts and problems arising from them;

    – compatibility. Ability to work with applications that were not specifically designed for the Windows XP Professional environment;

    – system recovery . If the computer crashes, it goes into Safe Mode, and the operating system offers a rollback option called System Restore. This allows the user to return to the settings that were on the computer before the incident. So-called restore points can be created by the user at any time. In addition, the operating system periodically creates its own restore points every time a new program is installed. When you roll back your computer to a restore point, the operating system uses installation data that corresponds to the time when the system was working normally.

    OpenOffice.org is installed as an office software package, which can work with extensions of the rather expensive Microsoft Office. This quite powerful program has a number of other useful properties, and it is completely free for both home and commercial use. This is a universal office software package that can run on all major operating systems.

    The OpenOffice.org suite includes six application programs. The Writer text editor has a user-friendly interface similar to that of the Word editor. Therefore, any user familiar with Word can easily get used to Writer. The same can be said about the spreadsheet editor Calc, which is in many ways reminiscent of Excel. There is also a program for creating and demonstrating presentations Impress, a vector editor Draw, a database management tool Base and an editor for creating and editing Math formulas. The disadvantage of OpenOffice.org is its speed: it loads and works somewhat slowly, but quite acceptable.

    Organizing safe operation of a LAN is not possible without the use of anti-virus software. Therefore, Kaspersky Anti-Virus 7.0 is installed as anti-virus protection - a reliable and relatively cheap system.

    Kaspersky Anti-Virus has three levels of protection against known and new Internet threats: scanning against signature databases, a heuristic analyzer and a behavioral blocker.

    Kaspersky Anti-Virus protection against viruses is comprehensive and includes:

    – email protection. Kaspersky Anti-Virus performs anti-virus scanning of mail traffic at the data transfer protocol level (POP3, IMAP and NNTP for incoming messages and SMTP for outgoing messages) regardless of the mail program used;

    – checking Internet traffic. Kaspersky Anti-Virus provides anti-virus scanning of Internet traffic arriving via the HTTP protocol in real time and regardless of the browser used. This allows you to prevent infection even before saving files on your computer’s hard drive;

    – scanning the file system. Any individual files, directories and disks can be scanned. In addition, you can run a scan of only critical areas of the operating system and objects loaded when Windows starts.

    Kaspersky Anti-Virus protects your computer from Trojans and all types of keyloggers, preventing the transfer of confidential data to attackers.
    ^

    1.11 Ensuring information security


    Considering the problem of data protection on the network, we will highlight all possible failures and violations that can lead to the destruction or unwanted modification of data.

    Among these potential “threats” are:

    – equipment failures: cable system failures; power outages; disk system failures; failures of data archiving systems; failures of servers, workstations, network cards, etc.;

    – loss of information due to incorrect operation of the software: loss or change of data due to software errors; losses when the system is infected with computer viruses;

    – losses associated with unauthorized access: unauthorized copying, destruction or falsification of information; familiarization with confidential information constituting a secret to unauthorized persons;

    – user errors: accidental destruction or modification of data; incorrect use of software and hardware leading to the destruction or modification of data.

    To ensure reliability of data storage and to prevent loss of information as a result of power failures, the editorial office has an uninterruptible power supply (UPS) Ippon Back Office 600. Its presence allows, in the event of a power outage, to at least correctly shut down the operating system and turn off the server.

    To protect against viruses, the anti-virus program “Kaspersky Anti-Virus” is used.

    Conclusion

    The result of the internship was:

    – detailed acquaintance with the organization’s local network;

    – gaining new knowledge about the operation and maintenance of LANs;

    – studied the programs used in the organization.

    After studying the network and analyzing the work of the editorial office, it was proposed to create a new workplace - a full-time system administrator. Since now daily network problems arise, computers are solved by employees themselves, not having all the necessary knowledge and being distracted from their direct responsibilities.
    ^

    List of sources used


    1. Akulov O. A. Informatics: basic course [Text] – M.: Omega-L, 2004. – 552 p.

    2. Olifer V. G., Olifer N. A. Computer networks [Text]: textbook for universities. – Peter, 2007, 960 p.

    3. Pyatibratov A. P., Gudyno L. P., Kirichenko A. A. Computing systems, networks and telecommunications [Text] / Ed. ed. A. P. Pyatibratova. M.: Finance and Statistics, 2001. - 512 p.

    Introduction

    The development of economic and social relations, the expansion of networks and enterprises and the increase in their size, the emergence of new connections between enterprises and industries, the increase in flows and volumes of information - all this has led to a sharp complication of management tasks.

    The increasing complexity of the tasks being solved in the field of management has, in turn, led to a change in the nature of management processes. The use of computers significantly increases the efficiency of management, but this requires active human participation in the management process. It is he who makes the final decision based on an assessment of various design options, taking into account the additional data at his disposal.

    Production and technological practice is an organic part of the educational process and has the goal of consolidating and deepening the knowledge acquired in the process of theoretical activity, introducing the student to socially useful work and linking the acquired theoretical knowledge with real production conditions. During industrial technological practice, student interns work according to the regime established for a given enterprise and are subject to the internal regulations of this organization.

    The purpose of production and technological practice is for students to study a real enterprise and working conditions there, gain applied skills in the development and maintenance of programs, study information flows and document management, methods of storing and processing information, collecting materials for a report and preliminary selection of a likely topic for a diploma project. In addition, during their internship, student interns must also take an active part in the social life of the enterprise.

    1. Production activity of the enterprise

    Municipal budgetary cultural institution "Vozhegodsky district cultural and leisure association"

    Year of creation - 01.11.2007. The network of MBUK "VR KDO" consists of 14 branches: Houses of Culture and clubs. Director of MBUK "VR KDO" Lyubov Aleksandrovna Klyushina. The main goal of the work of the MBUK "VR KDO" is: Creating conditions for organizing leisure time and providing residents of the area with the services of cultural and leisure institutions.

    To achieve this goal, the following tasks were set for 2012:

    Improving the organization of work to improve the qualifications of CDO specialists using new techniques.

    Creating conditions for increasing the efficiency and effectiveness of the work of the SDK.

    Work to create a positive image of KDO institutions.

    Priority areas of work of MBUK "VR KDO":

    Patriotic and spiritual and moral education of citizens.

    Promoting family values.

    Preservation and revival of traditional folk culture.

    Prevention of a healthy lifestyle.

    Cultural and entertainment activities.

    Formation and development of cultural brands of settlements.

    Inter-settlement festivals and holidays are held annually.

    Benchmark performance indicators of MBUK "VR KDO" in 2012:

    4,586 events were held, including 2,389 film screenings.

    3,748 paid events were held, including 2,389 film screenings.

    54,923 visitors were served, of which 13,788 were at film screenings.

    32,001 paid visitors were served, of which 13,788 were at film screenings.

    There were 135 club formations with 993 participants.

    All cultural centers and clubs operate in accordance with their goals and objectives.

    2. IS architecture, software, methods of processing and storing information, database organization, familiarization with the network structure and composition of VT

    The Vozhegodsk Regional Cultural and Leisure Association institution uses the Zvezda network topology, that is, two computers are connected to each other using a router.

    A star topology is a basic computer network topology in which all computers on the network are connected to a central node (usually a switch), forming a physical segment of the network. Such a network segment can function either separately or as part of a complex network topology (usually a “tree”). All information exchange takes place exclusively through the central computer, which is subject to a very large load in this way, so it cannot do anything else except the network. As a rule, it is the central computer that is the most powerful, and it is on it that all functions for managing the exchange are assigned. In principle, no conflicts in a network with a star topology are possible, because management is completely centralized; you can see what a star topology looks like in diagram No. 1.

    Scheme No. 1.

    Specifications of institutional computers

    "Vozhegodsky District Cultural and Leisure Association":

    Specifications:

    Computer No. 1

    Processor: Intel® Pentium® 4 2.66 GHz

    RAM: 512 Mb DDR

    Hard drive: Seagate 120 Gb 7200 rpm

    Monitor: Samsung 17"

    OS: MS Windows XP Professional RUS

    Computer #2

    Processor: Intel® Pentium® 4 2.66 GHz

    RAM: 1024 Mb DDR

    Video card: Geforce FX 5200 128Mb 128 bit MSI

    Hard drive: Seagate 240 Gb 7200 rpm

    Monitor: Samsung 19"

    OS: MS Windows 7

    3. Reporting form

    The reporting form of the institution “Vozhegodsk District Cultural and Leisure Association” is information containing tables, text, calculations and formatted in a text file using a set of Microsoft Office programs, such as Microsoft Word, Excel, Access.

    4. Security and information protection measures

    Kaspersky CRYSTAL antivirus was installed on the institution’s computers. CRYSTAL keeps your digital world crystal clear. Hybrid Internet Threat Protection instantly eliminates malware, spam, and other advanced threats while conserving computer resources through a combination of cloud and antivirus technologies. CRYSTAL keeps your computers safe and reliable against online threats, no matter what you and your loved ones you do on the Internet. The product comes with optimal settings by default, and you don't need to be an IT specialist to effectively manage the protection of all your home computers. Use the Internet to its full potential, and trust Kaspersky PURE with security. The capabilities of Kaspersky PURE allow you to save your valuable documents, photos, favorite audio recordings and movies even if your computer breaks down or is stolen. Special tools and security technologies allow you to create and securely store strong passwords and prevent account theft on websites and applications. Using Kaspersky PURE, you can determine the time, duration and nature of work of each user in your home. You can also block access to websites with inappropriate content and filter data sent via instant messaging programs. Kaspersky PURE is a comprehensive solution for protecting home computers, which allows you to centrally manage security and reliably protects your computers from malware and other Internet threats. Special tools such as Parental Controls, Password Manager, Backup, etc. provide a previously unavailable level of protection for your personal data.

    5. Occupational health and safety requirements.

    Basic rights and responsibilities of employees:

    1. Employees of the Company have the right:

    · To conclude, amend and terminate an employment contract in the manner and under the conditions established by labor legislation.

    · To provide work stipulated by an employment contract.

    · To a workplace that meets state regulatory requirements for labor protection.

    · For timely and full payment of wages in accordance with their qualifications, complexity of work, quantity and quality of work performed.

    · For rest, ensured by the establishment of normal working hours, the provision of weekly days off, non-working holidays, and paid vacations.

    · For complete reliable information about working conditions and labor protection requirements in the workplace.

    · For professional training, retraining and advanced training in the manner established by labor legislation and local regulations of the Company (documented QMS procedure “Personnel Training”), including certification in order to maintain the level of professional competence, increase qualification category or promotion , is regulated by the Regulations on the procedure for certification of the Company's employees.

    · For compensation for harm caused to them in connection with the performance of their labor duties, and compensation for moral damage in the manner prescribed by labor legislation.

    · For compulsory social insurance in cases provided for by federal laws.

    2.Employees are obliged:

    · Conscientiously perform your job duties as provided for in the employment contract and job description.

    · Comply with the internal labor regulations and other local regulations adopted by the Company in the prescribed manner.

    · Work conscientiously, observe labor discipline, promptly and accurately execute the Company’s orders, use all working time for productive work.

    · Treats the property of the Company with care (including the property of third parties held by the Company, if the Company is responsible for the safety of this property) and other employees.

    · Ensure the safety of entrusted property, use equipment efficiently, take care of tools, measuring instruments, workwear and other items issued to employees for use.

    · Do not disclose information constituting a trade secret and confidential information about the activities of the Company, in accordance with the “Regulations on ensuring the safety of confidential information in the Open Joint-Stock Company “Universal Electronic Card of the Vologda Region”.

    · Conduct yourself correctly and with dignity, avoiding deviations from the recognized norms of business communication.

    Responsibilities of the employee in the field of labor protection.

    The employee is obliged:

    · correctly use personal and collective protective equipment;

    · undergo training in safe methods and techniques for performing labor protection work, providing first aid, instruction in labor protection, testing of knowledge of labor protection requirements;

    · undergo mandatory medical examinations;

    · immediately inform the immediate manager or other representatives of the Company about the occurrence of a situation that poses a threat to the life and health of people, the safety of the Company’s property (including the property of third parties owned by the Company, if the Company is responsible for the safety of this property).

    6. Tasks of the practice manager from the enterprise

    1) Updating installed software

    Basically, this operation was carried out manually by selecting the necessary updates, but it was also practiced to update programs through the free application Software Update Monitor (monitoring software updates). Its main purpose is to notify the user about the availability of new versions of the applications with which he works (the result can be seen in Fig. 1).

    2) Setting up a local network

    Before setting up a local network through a router for two computers, we will perform the following operations on each of them:

    · Setting up a local network for Windows XP

    First you need to disable all security programs on this computer (antiviruses, firewalls, firewalls, etc.)

    In order for several computers to be identified and have open access, they must be placed in the same workgroup. To do this, you need to do the following: open the “Properties” tab by calling the context menu on the “My Computer” icon, then go to the “computer name” tab and, by clicking on the “change” button, change the computer name, and click “OK”. To set up a local network using a router, you need to make sure that all IP addresses of computers are located in a single subnet. To do this, you need to set identical settings on all computers. Sometimes configuration cannot be carried out without enabling the NetBios protocol. If this is your case, then you need to go to the “Network Connections” tab and open the window for configuring TCP/IP, then call up additional parameters and in the “general” attachment enable this same NetBios. At this point we can consider the process complete.

    · Setting up a local network for Windows 7

    The process of setting up a local network is quite different for different operating systems. Setting up a local network via a router for Windows 7 is not much more difficult. First, we will need to find out the name of our computer, then go to the “Properties” section, where we click on the “change parameters” button and make the necessary adjustments. Then restart your computer for the changes to take effect. The computer name must be specified in English letters. If it is specified in a different way, then there is a high risk of getting serious errors in the network.

    Now we set up automatic generation of addresses and DNS. To do this, you need to follow the following path: Control Panel - Control Center - Local Network - Properties. In the window that opens, you need to select TCP/IPv4 and check the box on the tab for obtaining an IP address automatically. In the end, all you have to do is enable NetBios. To do this, you will need to go to the “Protocol Properties” section, in the “advanced” tab, click on the “WINS” button and check the “Enable NetBios” checkbox, and then restart the computer. This completes the settings.

    3) Installation of additional software

    Additional software was installed at the Vozhegodsky District Cultural and Leisure Association institution:

    WINRAR 5.00 is a powerful utility for creating and managing archives, containing a whole range of additional useful functions. WinRAR is used daily by millions of people around the world to save PC space and transfer files quickly.

    Adobe Flash Player is a universal free application that allows you to view pages with dynamic content, colorful special effects, interactive games and video clips, shown in Fig. 2 you can see what Adobe Flash Player looks like.

    Reader is the free, proven standard for securely viewing, printing, and annotating PDF documents. It is the only PDF viewer that allows you to open and interact with all types of PDF content, including forms and media objects, as shown in Figure 1. 3.

    FineReader is a text recognition program that allows you to quickly and accurately convert document images and PDF files into electronic editable formats without the need for retyping.

    You can obtain an image for recognition not only using a scanner: it is enough to have a digital camera or a mobile phone with a built-in camera; the result can be seen in Fig. 4.

    microsoft office antivirus installation

    4) Installing Microsoft Office 2007

    Before installing Office 2007, we need to remove the old version, to do this, go to the “my computer” folder, then select “add/remove programs” and remove the old version of Office 2003, after the removal is complete, restart the computer. After restarting the computer, download the Office 2007 image from portable media and begin the installation following the instructions. After installation, it will be better to restart the laptop for the changes to take effect.

    )Installing the Windows7 operating system:

    Reinstallation of Windows occurs using programs for partitioning the hard drive, both standard and third-party such as: Acronis Disk Director.

    · The first thing you need to do before installing Windows is to make a copy of the data we need using a memory card or CD.

    · Now we need to go into the computer’s BIOS to set it to boot from a CD or flash drive. Save the changes and restart the computer by pressing the F10 key.

    · The third step will be to prepare the hard drive for installing the new OS. Here we carry out the procedure of partitioning the disk into the NTFS file system using the Acronis Disk Director program. From under BIOSS we launch Acronis and perform the following actions: delete previous hard drive partitions and create new ones, indicate the amount of memory that will be required for the new OS, specify the NTFS file system and click the “Start” button. After completing these procedures, close the program and remove the disk.

    · The fourth step will be the installation of the new OS itself. Launch the installation image from the BIOS and begin the installation. We indicate the disk partition we need and click next, and wait for the installation process to complete.

    · After the OS installation is complete, we configure it.

    · Install drivers using the Driver Pack Solution program.

    · install the programs we need from the ChipWPI program collection (antivirus, MS Office, codecs, archiver).

    · Setting up the local network.

    6) Install Adobe Photoshop CS5

    1. Install Adobe Photoshop.

    2. Go to the Adobe website.

    Select Russian | Windows | 1000.9 MB, Download now.

    Download Akami Download Manager. Open it and open the site again. Click “Download Now”. Select the directory where the files will be downloaded.

    Entering your password

    Downloaded Adobe Photoshop CS5 Extended 12.0 Final Multilanguage. Click on Set-up.exe. The result of this operation can be seen in Fig. 5.

    Click the “Skip and Continue” button, wait for the installation programs to initialize, the process of this operation can be seen in Fig. 6.

    The next step in installing Adobe Photoshop CS5 is to enter the serial number that was given when purchasing the software.

    We are waiting for the installation to complete; the process can be seen in Fig. 9.

    When the installation is complete, click the “Finish” button, Fig. 10.

    We launch the program using a shortcut on the desktop or through the Start menu, we get a working program window, which can be seen in Fig. 11. The program is ready for use.

    7) Setting up antivirus

    When setting up the network, a problem arose with identifying computers; to solve it, it was necessary to disable the firewall in Kaspersky antivirus. To do this, we do the following: in the system tray (bottom corner of the screen) find the antivirus icon and click on it. Next, select “Security Control” on the antivirus panel. On the left, select “Protection Center”. At the bottom right click “Network”.

    A new window “Protection components for your computer” will open. On the left, select “Network protection”, then look for “Firewall”. And by clicking on the dot opposite, turn off the “Firewall”. This is the firewall in Kaspersky “CRYSTAL”.

    The license for the use of Kaspersky anti-virus programs was also renewed.

    Conclusion

    On-the-job training is an important element of the educational process for training a specialist in the field of programming.

    During practical training at the institution “Vozhegodsky District Cultural and Leisure Association”, all acquired theoretical training skills were consolidated in production.

    The wide coverage of the industries that I encountered in practice allowed me to better assimilate the theoretical material I learned during my classes at the technical school.

    I mastered some of the subtleties of using software in practice, understood how some programs work, subroutines that were not clear to me, realized their importance in practical activities, and improved my level of proficiency in programs: Adobe Photoshop, Adobe Reader, Microsoft Word and others.

    Practical activities helped me learn to independently solve a certain range of problems that arise during the work of a programmer. The World Wide Web, where you can currently find a lot of useful information in the field of programming, also provided great assistance in solving these problems.

    References

    1. Scott Kelby - Adobe Photoshop CS6. Handbook of Digital Photography (2013) PDF.

    2. Broido V.L. Computing systems, networks and telecommunications: Textbook for universities / V.L. Broido. - St. Petersburg: Peter, 2003. - 688 p.

    3. Shafrin Yu.A. Fundamentals of computer technology / Yu.A. Shafrin. - M.: ABF, 2001. - 560 p.

    4. Olifer V.G., Olifer N.A. Computer networks. Principles, technologies, protocols / V.G. Olifer, N.A. Olifer. - St. Petersburg: Peter, 2002. - 672 p.

    Introduction.…………………………………………………………………………………......3
    1. General characteristics of the enterprise………………………………………………………4
    2. Practice task…………………………………………………………………………………6
    3. Theoretical information……………………………………………………….7
    3.1. Theoretical information about the main software products used in ZPH “TEKHOL” LLP……………………………………………………………7
    3.2. Theoretical information about a wireless local network based on Wi-Fi wireless data transmission technology………………………………14
    4. Results of completing the main tasks…………………………………….17
    Conclusion………………………………………………………………………………….20
    List of references………………………………………………………...21
    Appendix A
    Introduction

    Industrial practice is an important stage in the training of qualified specialists. It is a type of educational and auxiliary process, during which theoretical knowledge is consolidated in production, practical skills and competencies are acquired, and advanced experience is mastered. Practice is the final stage in the process of preparing a specialist for independent production activities.
    This industrial practice took place on the basis of the industrial enterprise "TEKHOL" from June 3, 2014 to July 5, 2014 as an intern. The work was carried out in the company's office.
    The purpose of industrial practice is to consolidate the acquired theoretical knowledge and acquire practical skills.
    To achieve this goal, it is necessary to solve the following tasks:
    1. Obtaining a general idea of ​​the enterprise’s activities;
    2. Familiarization with the main tasks and functions of the information computing center;
    3. Familiarization with the enterprise software;
    4. Obtaining practical skills of real work in this department, consolidating and applying the knowledge acquired during training. 
    1. General characteristics of the enterprise

    The Tehol plant was established in 1991. The initiator of its construction was the USSR Ministry of Fisheries. At that time, there was not a single enterprise on the territory of the Union that specialized in the design, assembly and supply of industrial refrigerators. Techol became a pioneer. The specialists of the future promising enterprise were trained abroad. Since then, the modern equipment of the plant has been maintained only by qualified service personnel.
    The rapid economic growth of independent Kazakhstan, the modernization of production, and the prospect of the republic joining the WTO have created a need for Techol products in the domestic market of Kazakhstan. Thus, it has become in demand both abroad, where the plant’s partnerships are only expanding, and in the republic itself. Today, Techol products are supplied to all major cities and regions of Kazakhstan. Proof of the successful cooperation of the enterprise with partners of foreign countries is the supply of Techol products to the Moscow region, Altai and Primorsky territories, to Sakhalin Island, to Turkmenistan, to the regions of Eastern and Western Siberia, to the cities of the Black Sea region and the Caspian Sea.
    "Techol" today is a modern multi-purpose enterprise, with a well-functioning management system, developed management and marketing services, with its own design bureau and laboratory, and with a huge sales market. It is equipped with the highest class equipment and technological lines from leading European companies.
    The Tehol plant is part of a group of companies: the Tehol-UDR construction corporation, which also includes: Uraldomnaremont KZ - one of the oldest enterprises in Kazakhstan, performing unique work on the construction and reconstruction of metallurgical industry facilities, technological equipment, pipelines; Tehol-montazh company – performing any construction and installation work; Temirstroy is one of the oldest companies in the corporation, performing construction work on industrial and civil facilities and other companies. A large number of qualified specialists, a large fleet of constantly updated construction equipment, modern equipment - all this allows the corporation to carry out large volumes of construction in the shortest possible time and with constant quality. All Techol products are certified and manufactured under license from the Republic of Kazakhstan. Since 2003, the plant has been certified and successfully operates a quality management system in accordance with the international standard ISO 9001-2000. "Techol" offers high-quality products that may interest the most demanding customer.
    The main office of ZPH "Tehol" LLP has access to the Internet. Internet access is used for electronic document management with tax authorities and business partners of the enterprise, and access to the websites of partner manufacturers is provided.
    ZPH "Tehol" LLP monitors the condition of computer equipment. Outdated equipment is regularly updated and therefore modern, productive computers based on an Intel core i7 3820 processor are installed in the main office of the enterprise.
    Computers were connected into a local network using twisted pair cables (star topology), but then Wi-Fi wireless technology was introduced. Now all computers of the main office of ZPH “Tehol” LLP are united into a wireless local network.

    2. Practice task

    I. Obtaining a general idea of ​​the enterprise’s activities;
    II. Familiarization with the main tasks and functions of the information computing center;
    III. Familiarization with enterprise software;
    IV. Obtaining practical skills of real work in this department, consolidating and applying the knowledge acquired during training when performing an individual task.

    Individual task: Implementation and setup of a wired and wireless local network based on Wi-Fi wireless data transmission technology. To do this you need:
    1) Dismantle the existing wired local network based on twisted pair.
    2) Familiarize yourself with the technical requirements for installing a wireless local network.
    3) Familiarize yourself with the technical characteristics and operating instructions of the necessary equipment.
    4) Install the equipment.
    5) Set up and configure equipment and computer equipment to work in a wireless network.


    3.Theoretical information

    3.1. Theoretical information about the main software products used in ZPH “Tehol” LLP

    Windows7 is a user operating system of the Windows NT family, next in time to Windows Vista and preceding Windows 8. This OS has support for multi-touch control. All OS versions include 50 new fonts. Existing fonts have been modified to display all characters correctly. Windows 7 is the first version of Windows to include more fonts to display non-Latin characters than to display Latin ones. The font control panel has also been improved - by default, it will display only those fonts for which the layout is installed in the system.
    Windows 7 supports folder aliases internally. For example, the Program Files folder in some localized versions of Windows was translated and displayed with the translated name, but remained in English at the file system level. Also, the system (except for the Windows 7 Starter and Windows 7 Home Basic versions) has about 120 built-in background images, unique for each country and language version. Thus, the Russian version includes the “Russia” theme with six unique high-resolution wallpapers.
    An additional advantage of Windows 7 is closer integration with driver manufacturers. Most drivers are detected automatically and are backward compatible with Windows Vista drivers in 90% of cases.
    Windows 7 also improved compatibility with older applications, some of which were unable to run on Windows Vista. This is especially true for older games developed for Windows XP. Windows 7 also introduced Windows XP Mode, which allows you to run older applications in a Windows XP virtual machine, which provides almost complete support for older applications.
    The Remote Desktop feature has also undergone changes. Support for the Aero Peek interface, Direct 2D and Direct3D 10.1 was introduced, support for multiple monitors, multimedia extensions, DirectShow, as well as the ability to play audio with low latency.
    Branch Cache network technology allows you to cache the content of Internet traffic. If a user on the local network needs a file that has already been downloaded by someone on his network, he can get it from the local cache storage, rather than using a channel with limited bandwidth. The technology is designed for large networks and is offered for implementation in enterprises as part of the Corporate and Maximum versions of the OS.

    Microsoft Office is an office suite of applications created by Microsoft for the Microsoft Windows, Apple Mac OS X and Apple iOS (on iPad) operating systems. This package includes software for working with various types of documents: texts, spreadsheets, databases, etc. Microsoft Office is an OLE object server and its functions can be used by other applications, as well as the Microsoft Office applications themselves. Supports scripts and macros written in VBA. Microsoft Office comes in several editions. Differences between editions in the package composition and price. The most complete of them contains:
    - Microsoft Word - word processor. Available for Windows and Apple Mac OS X. Allows you to prepare documents of varying complexity. Supports OLE, third party plugins, templates and more. The main format in the latest version is positioned as open Microsoft Office Open XML, which is a ZIP archive containing text in XML form, as well as all the necessary graphics. The most common binary file format is Microsoft Word 97-2003 with the DOC extension. The product occupies a leading position in the word processor market, and its formats are used as the de facto standard in the document flow of most enterprises. Word is also available in some editions of Microsoft Works. Program equivalents: OpenOffice.org Writer, LibreOffice Writer, StarOffice Writer, NeoOffice Writer, Corel WordPerfect and Apple Pages (only on the Mac OS platform), as well as, with some reservations, AbiWord (in cases where its capabilities are sufficient and small the volume and speed of work with low resource requirements are more important).
    - Microsoft Excel - spreadsheet processor. Supports all the necessary functions for creating spreadsheets of any complexity. Occupies a leading position in the market. The latest version uses the OOXML format with the extension ".xlsx", earlier versions used the binary format with the extension ".xls". Available for Windows and Apple Mac OS X. Equivalent programs: OpenOffice.org Calc, LibreOffice Calc, StarOffice, Gnumeric, Corel Quattro Pro and Apple Numbers (Mac OS platform only).
    - Microsoft Outlook - personal communicator. Outlook includes: calendar, task scheduler, notes, email manager, address book. Network collaboration is supported. Programs equivalent to: mail client - Mozilla Thunderbird/SeaMonkey, Novell Evolution, Claws Mail, Eudora Mail, The Bat!; personal data manager - Mozilla, Lotus Organizer and Novell Evolution. Available for Windows and Apple Mac OS X.
    - Microsoft PowerPoint - an application for preparing presentations for Microsoft Windows and Apple Mac OS X. Program equivalents: OpenOffice.org Impress, LibreOffice Impress, Corel WordPerfect and Apple Keynote.
    - Microsoft Access - application for database management. Program equivalents: OpenOffice.org Base, LibreOffice Base
    - Microsoft InfoPath, a data collection and management application, simplifies the process of collecting information.
    - Microsoft Publisher - an application for preparing publications.
    - Microsoft Visio, a business and technical diagramming application, lets you transform concepts and common business data into diagrams.
    - Microsoft Project - project management.
    - Microsoft OneNote is an application for recording and managing notes.
    - Microsoft SharePoint Designer - a tool for building applications on the Microsoft SharePoint platform and adapting SharePoint nodes.

    Dr.Web is a family of antiviruses. Developed by Doctor Web. Characteristic features of Dr.Web:
    - Possibility of installation on an infected machine.
    - Origins Tracing is an algorithm for non-signature detection of malicious objects, which complements traditional signature search and heuristic analyzer, making it possible to significantly increase the level of detection of previously unknown malware. Also used in Dr.Web for Android
    - Anti-rootkit API (ArkAPI) subsystem, which uses universal threat neutralization algorithms. Through this system, threats are neutralized by all antivirus components. It is also used in the treatment utility Dr.Web CureIt!
    -Dr. Web Shield is a mechanism for combating rootkits, implemented as a driver. Provides low-level access to virus objects hiding in the depths of the operating system.
    - Fly-code is an emulator with dynamic code translation that implements a mechanism for universal unpacking of viruses protected from analysis and detection by one or a chain of new and/or unknown packers, cryptors and droppers. This allows you to unpack files protected, for example, by ASProtect, EXECryptor, VMProtect and thousands of other packers and protectors, including those unknown to the antivirus.
    - Support for most existing formats of packed files and archives, including multi-volume and self-extracting archives.
    - Virus databases are updated immediately as new viruses are identified, up to several times per hour. The developers of the anti-virus product refused to release virus database updates on any schedule, since virus epidemics do not follow such schedules.
    - SelfPROtect self-defense module, which protects antivirus components (files, registry keys, processes, etc.) from modification and removal by malware.
    - Background Rootkit Scan - a subsystem for background scanning and neutralization of active threats. This subsystem resides in memory in a resident state and scans the system for active threats and neutralizes them in various areas, for example: startup objects, running processes and modules, system objects, RAM, MBR/VBR disks, computer system BIOS.
    - Dr.Web Cloud is a cloud service for checking links and files on Doctor Web servers in real time, allowing the antivirus to use the latest information about unsafe resources and files.
    - Cross-platform - a single virus database and a single anti-virus scanner kernel are used on different OS platforms.
    - Detection and treatment of complex polymorphic, encrypted viruses and rootkits.
    - Compact virus database and small update size. One entry in the virus database allows you to identify up to a thousand similar viruses.

    WinRAR is an archiver of files in RAR and ZIP formats for 32- and 64-bit Windows operating systems (there are also or have been versions of this archiver for Android, Linux, FreeBSD, Mac OS X, MS-DOS, Windows Mobile). It is considered one of the best archivers in terms of the ratio of compression ratio to operating speed. Distributed under a shareware license. After 40 days of trial use, the user is prompted to purchase a license. Versions for Android and Pocket PC have a Freeware license. Main features:
    - Creation of archives in RAR and ZIP formats.
    - Unpacking files in CAB, ARJ, LZH, TAR, GZ, ACE, UUE, BZIP2, JAR, ISO, 7z, Z formats.
    - Ability to encrypt archives using the AES (Advanced Encryption Standard) algorithm in CBC mode with a key length of 256 bits (128 bits in version 4).
    - Ability to work with files up to 8.589 billion (approximately 8 x 109) gigabytes in size.
    - Creation of self-extracting, continuous and multi-volume archives.
    - Adding additional data to archives to restore the archive if it is damaged, as well as creating special volumes for recovery, allowing you to restore a multi-volume archive if its individual volumes are damaged or even completely missing.
    - Full support for the NTFS file system and Unicode file names.
    - Command line support.

    Adobe Acrobat Reader is the free, proven standard for securely viewing, printing, and annotating PDF documents. It's the only PDF viewer that lets you open and interact with all types of PDF content, including forms and media. Functions:
    - View and create annotations in PDF documents. With Adobe Reader XI, you can not only open and view PDF files, but also perform many other operations. Now you can easily annotate your document using a comprehensive set of annotation tools.
    - Filling out, signing and submitting PDF forms. Get signatures on documents in minutes instead of hours. Complete, sign and return the PDF form, then save a digital copy for record-keeping using Reader XI.
    - Reliable access to PDF documents. Use the leading PDF viewer to work with any PDF file on a variety of operating systems and platforms, including iPad, iPhone, or Android mobile devices.
    - Managing software deployment and ensuring compliance with standards. Industry standard Adobe and Microsoft tools make it easy to manage and install updates. Get support for multiple standards directly related to document security. Extend Reader functionality with the free Adobe Acrobat Development Kit.

    Microsoft Windows Server 2012 R2 is a version of the server operating system from Microsoft, which already has the status of the final version and belongs to the Microsoft Windows OS family. This server operating system is intended to replace the currently released Windows Server 2012. Windows Server 2012 is the first version of Windows Server since Windows NT 4.0 that does not support Itanium processors.
    Among the main features of Windows Server 2012, Microsoft representatives especially highlight storage pools and significantly expanded capabilities of the proprietary hypervisor for servicing virtual machines. In particular, the work of Hyper-V virtual servers on 32 virtual processors and 120 GB of RAM was demonstrated. Hyper-V in Windows Server 2012 can now support up to 1 TB of memory per virtual machine with the same license price for all virtual machines - a significant improvement over VMware's per-processor licensing scheme, which supports a maximum of 12 cores per license. In addition, Hyper-V will be able to support virtual disks up to 64 TB in size.

    Google Chrome is a free browser for your computer. Thanks to Google Chrome Russian version, you can ensure safe and comfortable work on the Internet. This Google Chrome 2014 in Russian is the most popular browser of 2013 for Windows, Android, iOS and many other platforms, there is even support for the Windows 8 operating system. Google Chrome new version was made by the popular Google company from scratch, and a popular engine was also chosen Webkit for processing HTML, which is also used in the Safari browser. Another plus of Google Chrome, the latest version, is that when you open a new tab, it opens it in a new process, which will protect you and your computer from intruders. We would like to note that the new Google Chrome Browser 2014 from Google is well optimized and stable thanks to the use of the JavaScript engine.

    Cisco Packet Tracer is a data network simulator produced by Cisco Systems. Allows you to create workable network models, configure (using Cisco IOS commands) routers and switches, and interact between several users (via the cloud). Includes the Cisco 1800, 2600, 2800 series of routers and 2950, ​​2960, 3560 switches. In addition, there are DHCP, HTTP, TFTP, FTP servers, workstations, various modules for computers and routers, WiFi devices, and various cables.
    It successfully allows you to create even complex network layouts and check the functionality of the topology. Available free to Cisco Networking Academy Program participants.

    1C: Enterprise 8 is a software product of the 1C company designed to automate activities in an enterprise. Initially, 1C:Enterprise was intended to automate accounting and management accounting (including payroll and personnel management), but today this product finds its application in areas far from accounting tasks themselves.
    In version 8, there are two main modes - enterprise mode and configurator mode (this mode also has a debugging mode). The monitor mode is excluded due to the fact that the monitor is built into both the enterprise and configurator modes.
    The 1C:Enterprise 8 platform allows configuration and allows simultaneous use of one database by several users if they have the required number of additional licenses. Additional cost licenses are significantly lower than the cost of the program.
    The 1C:Enterprise 8 platform, when used with specialized “basic” configurations, provides operation in a “basic” mode with limited capabilities: it does not allow configuration, does not support external connection mode, and does not have a multi-user mode. To work in the “basic” mode, a lightweight licensing option is used; hardware protection keys are not required, and the cost of such a product is significantly lower.

    Firewall is a software package designed to protect your computer from unauthorized access. Its functions include monitoring and separation of network packets passing through it, filtering out suspicious and dangerous ones, in accordance with specified rules. Sometimes similar functions are assigned to hardware protection. This term (firewall) can be translated as “wall of fire” or “wall of fire.”
    Firewall is a computer program that protects the user’s computer while on the Internet from unauthorized access of other network users to data on the computer. The program prevents any attempts to access information contained on the hard drive in order to avoid theft of confidential information and infection with computer viruses.  
    3.2 Theoretical information about a wireless local network based on Wi-Fi wireless data transmission technology.

    Wi-Fi (English: Wireless Fidelity) is a trademark of the Wi-Fi Alliance for wireless networks based on the IEEE 802.11 standard. It is short for Wireless-Fidelity (literally “wireless precision”), similar to Hi-Fi. Any equipment that complies with the IEEE 802.11 standard can be tested by the Wi-Fi Alliance and receive the appropriate certificate and the right to apply the Wi-Fi logo. Typically, a Wi-Fi network diagram contains at least one access point and at least one client. It is also possible to connect two clients in point-to-point mode, when the access point is not used, and the clients are connected via network adapters “directly”. The access point transmits its network identifier (SSID) using special signaling packets at a speed of 0.1 Mbit/s every 100 ms. Therefore, 0.1 Mbit/s is the lowest data transfer rate for Wi-Fi. Knowing the network SSID, the client can find out whether a connection to a given access point is possible. When two access points with identical SSIDs are within range, the receiver can choose between them based on signal strength data. The Wi-Fi standard gives the client complete freedom in choosing the criteria for the connection. The operating principle is described in more detail in the official text of the standard.
    Benefits of Wi-Fi:
    + Allows you to deploy a network without laying cables, which can reduce the cost of network deployment and/or expansion. Places where cable cannot be installed, such as outdoors and buildings of historical value, can be served by wireless networks.
    + Allows mobile devices to access the network.
    + Wi-Fi devices are widespread in the market. Equipment compatibility is guaranteed through mandatory certification of equipment bearing the Wi-Fi logo.
    Disadvantages of Wi-Fi:
    - Frequency range and operating restrictions vary from country to country.
    - Many European countries allow two additional channels that are prohibited in the USA; Japan has another channel at the top of the band, and other countries, such as Spain, prohibit the use of low-band channels. Moreover, some countries, such as Russia, Belarus and Italy, require registration of all Wi-Fi networks operating outdoors or require registration of the Wi-Fi operator.
    - High energy consumption compared to other standards, which reduces battery life and increases the temperature of the device.
    - The most popular encryption standard, WEP, can be relatively easily broken, even with the correct configuration (due to the weak strength of the algorithm). Although newer devices support the more advanced data encryption protocol WPA and WPA2, many older access points do not support it and require replacement. The adoption of the IEEE 802.11i (WPA2) standard in June 2004 made a more secure scheme available in new equipment. Both schemes require a stronger password than those typically assigned by users. Many organizations use additional encryption (such as a VPN) to protect against intrusion.
    - Wi-Fi has a limited range. A typical 802.11b or 802.11g home Wi-Fi router has a range of 45m indoors and 450m outdoors. A microwave or mirror placed between Wi-Fi devices will weaken the signal. The distance also depends on the frequency.
    - Overlapping signals from a closed or encrypted access point and an open access point operating on the same or adjacent channels may interfere with access to the open access point. This problem can occur when there is a high density of access points, for example, in large apartment buildings where many residents install their own Wi-Fi access points.
    - Incomplete compatibility between devices from different manufacturers or incomplete compliance with the standard may result in limited connection capabilities or reduced speed.
    - Reduced network performance during rain. Equipment overload when transmitting small data packets due to the attachment of a large amount of service information.
    - Low suitability for applications that use real-time media streams (for example, the RTP protocol used in IP telephony): the quality of the media stream is unpredictable due to possible high losses during data transmission caused by a number of factors uncontrollable by the user (atmospheric interference , landscape and others, in particular those listed above). Despite this
    The disadvantage is that a lot of VoIP equipment is produced based on 802.11b/g devices, which is also aimed at the corporate segment: however, in most cases, the documentation for such devices contains a disclaimer stating that the quality of communication is determined by the stability and quality of the radio channel.
    Wireless technologies in industry:
    For industrial use, Wi-Fi technologies are currently offered by a limited number of suppliers. Thus, Siemens Automation & Drives offers Wi-Fi solutions for its SIMATIC controllers in accordance with the IEEE 802.11g standard in the free ISM band of 2.4 GHz and providing a maximum transmission speed of 11 Mbit/s. These technologies are used mainly to control moving objects and in warehouse logistics, as well as in cases where for some reason it is impossible to lay wired Ethernet networks.

    Required equipment:
    - Network adapters. These adapters (also called network interface cards (NICs)) connect computers to a network so they can communicate. The network adapter can be connected to a USB or Ethernet port on the computer, or installed inside the computer in an open PCI expansion slot.
    - Routers and access points. Routers connect computers and networks to each other (for example, a router can be used to connect a local network to the Internet). Routers also allow multiple computers to share a single Internet connection. To share an Internet connection over a wireless network, you need a wireless router. Access points allow computers and devices to connect to a wireless network.
    4.Results of completing the main tasks

    I. In the first days of industrial practice, a general understanding of the enterprise’s activities was obtained, with the principles of the enterprise’s operation and job responsibilities.
    ZPH "Tehol" LLP is a modern multi-purpose enterprise, which is equipped with technological lines of European companies. The main type of products are warehouse, industrial and administrative buildings, modular industrial refrigerators.
    The practical training was carried out at the main office of ZPH "Tehol" LLP as an intern.
    The student intern was assigned the following responsibilities:
    - maintaining computer equipment of all departments of the enterprise in working condition;
    -carrying out maintenance;
    -installation, configuration and maintenance of operating systems;
    -implementation and configuration of application software;
    - ensuring computer security of the enterprise information system.
    Under the guidance of an employee of ZPH "Tehol" LLP, safety precautions at the enterprise, the location of emergency exits, actions in emergency situations, and an evacuation plan in case of fire were studied.

    II. Next, I became familiar with the main tasks and functions of the information computing center.
    The main tasks and functions of the information and computing center are:
    - organization of the work of a unified information network;
    - ensuring the correct technical operation of the enterprise’s electronic equipment;
    - implementation of modern software;
    - ensuring information security, anti-virus protection when working with existing software;
    - support of the 1C: Enterprise 8 system;
    - support of the website of ZPH “Tehol” LLP;
    - provision of information services on the Internet.

    III. The main software products used in Tehol ZPH LLP were also studied.
    The main software products used in the enterprise: Microsoft's Windows 7 operating system, Microsoft Office suite of office programs, Dr.Web anti-virus program, 1C:Enterprise 8 information system, Google Chrome Internet browser.

    IV. During my internship, I gained practical skills of real work in this department, consolidated the knowledge acquired during training while completing an individual assignment: implementation and setup of a wireless local network based on Wi-Fi wireless data transmission technology.
    When installing a wireless local network, we used a D-Link TD-W8910G router and a D-Link DGS 3200-24 switch. A D-Link TL-WN723N wireless network adapter was installed on each computer.
    Network installation is carried out in several steps:
    1) Simulation of the future network using Cisco Packet Tracer.
    2) Installation of the necessary equipment.
    3) Installation of the necessary software.
    4) Setting up an Internet connection.
    5) Connecting computers into a network using the Network Setup Wizard.
    6) Setting up network security.
    7) Network performance testing.
    8) Troubleshoot existing problems.

    Step 1: Network modeling using Packet Tracer.
    Using the Cisco Packet Tracer simulator program, I simulated the future network. The network consisted of 4 computers. One of the computers was dedicated as a server. Appendix A shows a diagram of the developed network.

    Step 2. Installation of equipment.
    Each computer had a network adapter installed to operate on a wireless network. The network adapter was built into the PCI port of the motherboard. The appropriate software in the form of a driver was installed. The switch was connected to the server computer via an RJ-45 port. The router was connected to the switch via an RJ-45 port. The driver was installed on the server and configured accordingly.

    Step 3: Install the software.
    The main software used at the Tehol ZPH LLP was installed on each computer. These are: Microsoft's Windows 7 operating system, Microsoft Office suite of office programs, Dr.Web anti-virus program, 1C:Enterprise 8 information system, Google Chrome Internet browser. And the server operating system Microsoft Windows Server 2012 R2 was installed on the server computer.

    Step 4: Set up your Internet connection.
    The wireless router was connected to the existing Internet connection via an RJ-45 port. The connection to the Internet has been configured.

    Step 5. Connecting computers into one network.
    Each computer had network discovery enabled and the required Wireless Network Setup Wizard was enabled on the server. The computers were connected to a wireless local network.

    Step 6. Configure network security.
    A software package designed to protect against unauthorized access, Firewall, was installed on the server computer. The Firewall has been configured and debugged.

    Step 7. Testing the network functionality.
    To test the functionality of the network and identify faults in the network, the “Diagnostics and Fixing Network Problems Wizard” was launched on the server.

    Step 8: Troubleshooting.
    The problems identified during the Diagnostic and Fix Network Problems Wizard were resolved using the Windows Help and Support Center (section "Troubleshooting problems in wireless networks").


    Conclusion

    During the internship, the theoretical skills acquired during study were supported by practical ones. Familiarization with the organization, structure and principles of operation of the enterprise, safety and labor protection rules was carried out.
    Experience was gained in working in a team, developing communication skills, and demonstrating responsibility.
    The individual task received at the enterprise was completed in full and on time.
    During the internship, knowledge in the field of information systems, anti-virus programs, computer networks, etc. was deepened.

    List of used literature

    1. Standards for local computer networks: Handbook / V.K. Shcherbo, V.M. Kireichev, S.I. Samoilenko; ed. S. I. Samoilenko. - M.: Radio and communication, 2000.
    2. Practical data transmission: Modems, networks and protocols / F. Jennings; lane from English - M.: Mir, 2005.
    3. Computer networks: protocols, standards, interfaces / Yu. Black; lane from English - M.: Mir, 2002.
    4. Fast Ethernet / L. Quinn, R. Russell. - BHV-Kyiv, 1998.
    5. Switching and routing of IP/IPX traffic / M. V. Kulgin, IT. - M.: Computer press, 2003.
    6. Fiber optics in local and corporate communication networks / A. B. Semenov, IT. - M.: Computer press, 2009.
    7. Internet protocols. S. Zolotov. - St. Petersburg: BHV - St. Petersburg, 2008.
    8. Personal computers on TCP/IP networks. Craig Hunt; lane from English - BHV-Kyiv, 2011.
    9. Computer systems, networks and telecommunications / Pyatibratov et al. - FIS, 2008.
    10. High-performance networks. User Encyclopedia / A. Mark Sportak and others; lane from English - Kyiv: DiaSoft, 2008.
    11. Synchronous digital networks SDH / N. N. Slepov. - Eco-Trends, 2008.
    12. Windows-based enterprise networking for professionals / Stern, Monty; lane from English - St. Petersburg: Peter, 2009.
    13. Networking Essentials. Certification exam - external (exam 70-058) / J. Stewart, Ed Tittel, Kurt Hudson; lane from English - St. Petersburg: Peter Kom, 2006.
    14. Fundamentals of building networks: textbook. guide for MCSE specialists (+CD-ROM) / J. Chellis, C. Perkins, M. Strib; lane from English - Laurie, 2007.
    15. Computer networks: textbook. well. 7th ed. (+CD-ROM). - MicrosoftPress, Russian edition, 2008.
    16. Network tools Microsoft Windows Server / trans. from English - St. Petersburg: - BHV - St. Petersburg, 2007.
    17. Microsoft Windows Server 2012. Book 1 / trans. from English - St. Petersburg: - BHV - St. Petersburg, 2012.
    18. Explanatory dictionary of computer technology / trans. from English - M.: Publishing department “Russian Edition” of Channel Trading Ltd. LLP, 2005.
    19. Emerging Communications Technologies, 5/e, Uyless Black, Prentice Hall Professional, 2007.