How to set up smartphones and PCs. Informational portal
  • home
  • Windows 10
  • A finished report on industrial practice computer networks. Practice Report: Computer Networks

A finished report on industrial practice computer networks. Practice Report: Computer Networks

Federal Agency for Education of the Russian Federation

"Petrovsky College"

Course work

in the discipline "Computer networks and telecommunications"

Topic: "Designing an educational local area network"

Completed by: Kurilovich N.G.

Checked by: Y.P. Markelov

Saint Petersburg 2010


Introduction

Stage 1. Infological examination of the automation object

Stage 2. Design stage

Stage 3. Calculation of the network configuration

Conclusion


Introduction

Our time is characterized by the rapid development of telecommunication technologies.

Connecting computers in a network has significantly increased labor productivity. Computers are used both for production (or office) needs and for training.

A local network is a group of interconnected computers, servers, printers located within a building, office or room. The local network makes it possible to share access to shared folders, files, equipment, various programs, etc.

Using the resources of the local network makes it possible to significantly reduce the financial costs of the enterprise, increase the level of security of storage of important data, reduce the time spent by the company's employees on solving various types of tasks, as well as increase the overall efficiency of work.

Computers can be connected to each other using various access media: copper conductors (twisted pair), optical conductors (optical cables) and through a radio channel (wireless technologies). Wired connections are established via Ethernet, wireless - via Wi-Fi, Bluetooth, GPRS and other means. A separate local area network can have gateways with other local area networks, as well as be part of a global computer network (for example, the Internet) or have a connection to it.

LAN (Local Area Network) is a local area network designed to unite geographically grouped network devices. All network devices inside the LAN have information about the MAC addresses of neighboring network adapters and exchange data at the second (link) layer of the seven-layer OSI model.

Main advantages of LAN:

1. Reducing network load

2. Information security

a. Combining user workstations into functional groups between which unauthorized data exchange at the data link level is impossible.

b. Differentiation of access to servers and printers.

c. Internet access control

d. Mutual isolation of network segments using different network protocols (for example: virtual network for IPX users, virtual network for Apple users)

3. Reduced operating costs

a. Low cost of moving, changing and adding network users

b. Reducing the number of unused switch ports

4. Improving the reliability and resiliency of the network

a. Isolation of broadcast storms

b. Faster localization of faults

c. More complete traffic control

d. Effective use of ip addresses

Disadvantages of LAN:

1. Increase in start-up costs

2. The need for additional training of personnel.


Stage 1. "Infological examination of the automation object"

Targets and goals

The main objective of the course project is the design and calculation of a peer-to-peer educational LAN on the topology "Star" and "Shared bus" OIPTS Petrovsky College.

Computers will be used by students for the purpose of teaching, conducting practical classes. The network must ensure the smooth functioning and interoperability of the various distributed applications that reside on the network.

List of academic disciplines

Table 1. List of academic disciplines and software required for them

Each workstation will be equipped with a 32-bit Window 7 HomeBasicDVD (RUSDVD) operating system. This choice is explained by the fact that Windows 7 includes both some developments excluded from Windows Vista, as well as innovations in the interface and built-in programs, and it has more features than previous versions of Windows and is more optimized.

The cost of one license OS MS Windows 7 Home Basic 32-bit Rus 1pk OEI DVD for one PC (workstation) is 3799 rubles. Therefore, for 34 workstations, the total cost will be 129,166 rubles.

Workstation software

In addition to the operating system, workstations need to install the main package of applications and utilities that meet the requirements of the LAN.

1. MS Office 2007 Professional Win32 Rus AE CD BOX (for educational institutions)

Table 3. System requirements for MSOfficeProfessional

2. KOMPAS-3DV12


Table 4. System requirements for KOMPAS-3DV12

3. Acronis Disk Director 11 Home

Table 5. System Requirements for Acronis Disk Director 11 Home

Typical workstation configuration

Table 7. Calculating the cost of a workstation

Components Product description Price
Frame InwinEMR-006, microATX, Minitower, 450W, Black / Silver 2290 p.
Motherboard Gigabyte GA-H55M-S2H, iH55, Socket 1156, 2xDDR3 2200MHz, 2 x PCI Express x16 + Integrated Intel HD Graphics, 6 x SATA II, LAN 1 Gbit, microATX 3290 RUR
CPU Intel Core i3 530 2.93GHz, 2х256 kb, 4 Mb, LGA1156 BOX 4390 RUR
RAM Kingston HyperX (KVR1333D3N9K2 / 2G) Kit of 2, DDR3 2048Mb (2x1024), 1333MHz 1590 p.
HDD Western Digital WD5000KS / AAKS, 3.5 ", 500Mb, SATA-II, 7200 rpm, 16Mb Cache 1840 p.
Video card Built-in video adapter 0 p.
Optical drive Asus DRW-24B3ST, DVD RW, SATA, Black 1090 p.
LAN Built-in 1Gbit network adapter 0 p.
Monitor Samsung EX1920, 18.5 "/ 1366 х 768 pix / 16: 9, 1000: 1, DC - 5,000,000: 1/250 cd / m² / 5 ms, D-Sub / DVI, TFT Black 5990 p.
Network filter Vektor Lite, 1.8 m 399 p.
Input Devices Logitech Desktop MK120 Black Keyboard + Mouse Kit 680 p.
TOTAL: 21560 p.

In total, the cost of one workstation was 21,560 rubles. The designed network consists of 34 workstations, which will amount to 733,000 rubles.

The typical configuration was selected using information from the KEY Computer Center store website. (http://www.key.ru/)

Conclusion on the first stage

Upon completion of the first stage of the course project on computer networks and telecommunications, I compiled a list of all software installed on workstations. A typical configuration of a workstation was drawn up taking into account system requirements, application and system software, and the required amount of memory on the hard disk was calculated by summing the amount of memory required for the software. The RAM and processor are selected taking into account the system requirements of the applications, with a margin of 30%.


Stage 2. Design stage

Targets and goals

The purpose of the second stage of the course project is to develop specifications for communication equipment, the cost of work and plans for workspaces connected to a LAN, indicating the location of PCs and cable lines in them.

For each room, it is necessary to draw up a specification of communication equipment, after which, draw up a general plan of all LAN rooms and a specification of all equipment.

Choosing a cable system

The choice of a cable system depends on the intensity of network traffic, requirements for information protection, maximum distance, requirements for cable characteristics, and the cost of implementation.

Twisted pair (twistedpair) - a type of communication cable, is one or more pairs of insulated conductors, twisted together and covered with a plastic sheath. It is the twisting that prevents some types of interference induced on the cable. Typically Ethernet 10Base-T uses a twisted pair cable. One transmit and one receive (AWG 24).

Thin coaxial (RG-58 or "Thin Ethernet") is an electrical cable consisting of a center conductor and a screen located coaxially and used to transmit high-frequency signals. Characteristic impedance 50 Ohm, diameter 0.25 inches, maximum length of the cable segment 185 meters. Rule 5.4.3 applies 10BASE2 standard . Coaxial cable is more noise-resistant, signal attenuation in it is less than in twisted pair.

Passive LAN equipment includes:

1) The cable itself

2) RJ-45 wall sockets

3) Patch panels

4) Repeaters

5) Patch cords (subscriber cords) with RJ-45 connectors (cable for connecting wall sockets with connectors on the computer's network adapter).

The laying of cable systems in workrooms is carried out on the basis of a plan for this room, taking into account the specifications for consumables and accessories for this room.

When designing cabling systems, the characteristics and limitations of the various cabling systems need to be considered:

1) The maximum length of the cable segment according to its type

2) Cable throughput

3) Availability of equipment that provides interaction with other cable systems

After analyzing the characteristics of various types of cable, the physical location of computers, we choose a 10Base-T twisted pair cable and a thin coaxial.

Choosing a network topology

Network topology is a way of describing the configuration of a network, a diagram of the location and connection of network devices.

There are several topology options for network design and construction. Below is a description of some of them.

Bus topology

The common bus topology assumes the use of a single cable to which all computers on the network are connected. A message sent by a workstation is propagated to all computers on the network. Each machine checks - to whom the message is addressed and, if to her, then processes it. Special measures are taken to ensure that when working with a common cable, computers do not interfere with each other to transmit and receive data.

With such a connection, computers can transmit information only one by one, because there is only one communication line. Otherwise, the transmitted information will be distorted as a result of overlap (conflict, collision).

Fig. 1 Topology Common bus

The bus is not afraid of failures of individual computers, because all other computers on the network can continue to exchange normally. In addition, since only one cable is used, the entire network is disrupted in the event of a break. It may seem that the bus is not afraid of a cable break, since in this case there are two fully functional buses. However, due to the peculiarity of the propagation of electrical signals along long communication lines, it is necessary to provide for the inclusion of special devices at the ends of the bus - Terminators.

When building large networks, the problem of limiting the length of the connection between nodes arises, in which case the network is divided into segments that are connected by various devices - repeaters, hubs or hubs. For example, Ethernet technology allows you to use a cable no longer than 185 meters.


Fig. 2 Topology common bus with repeaters

Advantages:

1) Short network setup time;

2) Cheap (less cable and network devices required);

3) Easy to customize;

4) Failure of the workstation does not affect the operation of the network.

Flaws:

1) Any malfunctions in the network, such as a cable break, failure of the terminator, completely destroy the operation of the entire network;

2) Complex localization of faults;

3) With the addition of new workstations, network performance decreases.

Star topology

A star is a topology with an explicitly dedicated center to which all other subscribers are connected. All information exchange is carried out exclusively through the central computer, which thus bears a very heavy load, therefore it cannot be engaged in anything other than the network.

As a rule, it is the central computer that is the most powerful, and it is on it that all the functions of managing the exchange are entrusted. In principle, no conflicts in a network with a star topology are possible, since the management is completely centralized.

The failure of a peripheral computer does not in any way affect the functioning of the rest of the network, but any failure of the central computer makes the network completely inoperative. Therefore, special measures must be taken to improve the reliability of the central computer and its network equipment. A break in any cable or a short circuit in it in a star topology disrupts communication with only one computer, and all other computers can continue to work normally.

Fig. 4 Star topology

There are only two subscribers in the star on each communication line: the central one and one of the peripheral ones. Most often, two communication lines are used to connect them, each of which transmits information in only one direction. Thus, there is only one receiver and one transmitter on each link. All this greatly simplifies the network equipment in comparison with the bus and eliminates the need for additional external terminators. The problem of signal attenuation in the communication line is also solved in the "star" more easily than in the "bus", because each receiver always receives a signal of the same level.

Various other types of topologies can be built on the basis of the "star" topology, as if extending it. For example, you can add another hub with a certain number of ports to an existing hub on the network and thereby add new users to the network.

This topology is based on twisted pair cabling, although if you are using a hub with an additional port for coaxial cable connections, this connection can be used. For example, you can connect several more workstations to a common network by topology, for example, "bus". Thus, almost any mixed topology can be made from this topology.

Advantages:

1) the failure of one workstation does not affect the operation of the entire network as a whole;

2) good scalability of the network;

3) easy troubleshooting and network breaks;

4) high network performance (subject to correct design);

5) flexible administration options.

Flaws:

1) failure of the central hub will result in the inoperability of the network (or network segment) as a whole;

2) for laying a network, more cable is often required than for most other topologies;

3) the finite number of workstations in the network (or network segment) is limited by the number of ports in the central hub.

Based on all the above information about the topologies of building networks, their advantages and disadvantages, as well as in accordance with the characteristics of the network being created, we choose the topology Star-bus.

Survey of the selected room.

All objects (rooms 30, 36 and 39) are located on the third floor and are intended for practical training of students on a PC. In these offices, we will conduct an infological examination, draw up diagrams, calculate the required amount of equipment and its cost.

Below is a plan of the first network object, room 30. It includes 15 workstations.


Scheme 1. Plan of office # 30

Legend:

Table 8. Specifications of the communication equipment of the office # 30

Name Units Quantity Price, rub.) Cost, rub.) Note
I Consumables
1 meters 44 140 6167 3m up the wall,
2 Coaxial cable RG-58 C / U, coil 100m meters 43 14 619 3m up the wall,
II Components
1 bracket 19 "" 3U Things 1 638 638
2

Concentrator

16 xRJ-45, 1xBNC, 19 "

things 1 2613 2613
3 BNC connector RG-58 (P) crimp things 31 16 496
4 BNC connector RG-58 ( M) crimp Things 1 25 25
5 BNCT connector (M-M-M) Things 15 67 1008
6 Cable BNC (R) - BNC (R) 1.5 m Things 15 84 1272
7 BNC terminator 50 Ohm things 1 32 32
III Installation
1 Meter 35 58 2030
2 Laying the cable in the box Meter 34 14 493
3 Crimp RG-58 BNC-connector things 32 43 1392
4 Mounting the socket (BNCT-connector) into the box Things 15 87 1305
5 Things 1 725 725
6 Rack Mounting the Hub Things 1 435 435
7 LAN Testing Ports 15 40 600
IV Total cost
TOTAL: 19851

The second object of the projected network (room 36) includes 16 workstations. Below is his plan.


Scheme 2. Plan of office # 36

Legend:

Table 9. Specifications of the communication equipment of the office # 36

Name Units Quantity Price, rub.) Cost, rub.) Note
I Consumables
1 meters 262 9 2599 3m up the wall,
2 Box 40x20mm rectangular, white meters 43 140 6026 3m up the wall,
II Components
1 bracket 19 "" 3U Things 1 638,08 638,08
2 Things 1 768 768
3 Things 1 4832 4832
5 Things 16 57 921
6 Things 32 25 819
III Installation
1 installation of the box on the wall up to 50 mm Meter 35 58 2030
2 Laying the cable in the box Meter 209 14 3030
3 Installation of an RJ-45 socket in a box Things 16 87 1392
4 Wall Mounting 19 "" Bracket Things 1 725 725
5 Rack Mounting the Switch Things 1 435 435
6 Installation of patch panels in a box Things 1 435 435
7 Things 16 87 1392
8 LAN Testing Ports 16 40 640
IV Total cost
TOTAL: 26684

The third object of the projected network (room 39) contains 3 workstations. Below you can see his plan.


Scheme 2. Plan of office # 36

Legend:

Table 10. Specifications of the communication equipment of the office # 39

Name Units Quantity Price, rub.) Cost, rub.) Note
I Consumables
1 Twisted pair cable 8 pc. 5E cat. (PCnet), bay 305m meters 56 9 555 3m up the wall,
2 Box 40x20mm rectangular, white meters 22 140 3083 3m up the wall,
II Components
1 bracket 19 "" 3U Things 1 638 638,
2 Patch panel 19 "16 ports, Cat.5e, universal (PCnet) Things 1 768 768
3 PLANET GSW-1600 16-port 10/100 / 1000BaseTX 19 "switch Things 1 4832 4832
4 Socket 8P8C (RJ-45) category 5e, universal (PCnet) Things 3 57 172
5 Patch cord cat. 5е 0.5m (blue) Things 6 25 153
III Installation
1 installation of the box on the wall up to 50 mm Meter 17 58 986
2 Laying the cable in the box Meter 45 14 652
3 Installation of an RJ-45 socket in a box Things 3 87 261
4 Wall Mounting 19 "" Bracket Things 1 725 725
5 Rack Mounting the Switch Things 1 435 435
6 Installation of patch panels in a box Things 1 435 435
7 Crossing the patch panel (crimping, cable cutting, bundling) Things 3 87 261
8 LAN Testing Ports 3 40 120
IV Total cost
TOTAL: 14079

General plan of the projected LAN

Diagram 4. General plan of LAN

Legend:

Table 11. Territory specifications, outside the classrooms

at Name Units Quantity Price, rub.) Cost, rub.) Note
I Consumables
1 Twisted pair cable 8 pc. 5E cat. (PCnet), bay 305m meters 130 9,92 1289,60 3m up the wall
2 Box 40x20mm rectangular, white meters 85 140,16 11913,60 3m up the wall
II Components
1

Switch

5-port wall-mounted

Things 1 1285,76 1285,76
2 RJ-45 plug for round stranded cable Things 8 2,88 23,04
III Installation
1 Mounting the box (< 60 мм) на стену из легких материалов высота >2 m Meter 68 72,50 4930,00
2 Cable routing in ducts, height> 2 m Meter 104 17,50 1820,00
RJ-45 connector crimp Things 8 43,50 348,00
IV Total cost
TOTAL: 21610

Conclusion on the second stage

When working on the second stage, plans of classrooms were drawn up, a general plan for laying a LAN, as well as tables of consumables. Information about the number of cables, accessories, as well as installation work and their cost is contained in the tables.

The total amount of consumables, components and installation work amounted to 82,224 rubles.

Stage 3. Calculation of the network configuration

Targets and goals

At this stage, it is necessary to draw up a plan for calculating the diameter of the network, indicating the workstations, the size of the premises, according to the plan drawn up, draw up a table for calculating the diameter of the network. Also, according to the compiled table, draw up a structural diagram and according to the diagram, calculate the operability of the projected LAN.

Calculation of the diameter of the network

The method for determining the diameter of the network can be drawn up in the form of a table. The row and column numbers in it correspond to the identifiers of the workstations on the general plan of the LAN, and the values ​​of the cells in the table correspond to the distance between the workstations with the row number and the column number. At the same time, diagonal elements do not contain values.

The maximum value in this table will be equal to the diameter of the network in the collision domain of this LAN.

Table 12. Calculation of the diameter of the network

WS1 WS3 WS4 WS19 WS20 WS34
WS1 29.10 m 43.42 m 76.15 m 98.48 m 128.41 m
WS3 29.10 m 45.74 m 78.47 m 103.80 m 133.73 m
WS4 43.42 m 45.74 m 32.73 m 156.98 m 186.91 m
WS19 76.15 m 78.47 m 32.73 m 144.45 m 174.38 m
WS20 98.48 m 103.80 m 156.98 m 144.45 m 29.93 m
WS34 128.41 m 133.73 m 186.91 m 174.38 m 29.93 m

In order for the projected LAN to work correctly, 3 conditions must be observed:

1. The number of workstations should not exceed 1024 pcs.

2. The doubled propagation delay (PDV) between two stations should not exceed 575bt.

3. Reduction of interframe distance when all frames pass through all repeaters should not exceed 49bt.

Structural diagram of a LAN

This block diagram describes a LAN with network diameters from WS4 to WS34.

Scheme 5. The structure of the network between offices # 30 and # 36

Payment PDV

When calculating PDV, it is necessary to use a reference table and initial data (footage, type of cable system, block diagram).

Table 13. PDV Reference Table

Segment type Base of the left segment Intermediate segment base Base of the right segment Delay of medium by 1 meter Maximum segment length
10BASE-5 11,8 46,5 169,5 0,866 500
10BASE-2 11,8 46,5 169,5 0,1026 185
100BASE-T 15,3 42 165 0,113 100
10BASE-FB - 24 - 0,1 2000
10BASE-FL 12,3 33,5 156,5 0,1 2000
FOILR 7,8 29 152 0,1 1000
AUI (> 2m) 0,26 2+48

Payment PDV (1 to 4):

Left Segment1: 15.3 + 20.93 * 0.113 = 17.67bt

Intermediate Segment2: 42 + 50.96 * 0.113 = 47.76bt

Intermediate Segment3: 42 + 81.18 * 0.113 = 51.17bt

Right Segment4: 169.5 + 33.84 * 0.1026 = 172.97bt

Payment PDV (4 to 1):

Left Segment1: 11.8 + 33.84 * 0.1026 = 15.27bt

Intermediate Segment2: 42 + 81.18 * 0.113 = 51.17bt

Intermediate Segment3: 42 + 50.96 * 0.113 = 47.76bt

Right Segment4: 165 + 20.93 * 0.113 = 167.37bt

Since the obtained value is less than 575bt, this network passes according to the criterion of the maximum possible signal turnover delay, with a maximum network length of 186.91 m.

Payment PVV

Table 14. PVV bit interval table

Segment type Transmitting segment Intermediate segment
10BASE-2 16 11
10BASE-5 16 11
10BASE-FB 2
10BASE-FL 10,5 8
100BASE-T 10,5 8

Payment PVV (With 1 on 4 ):

Left Segment1: 100BASE-T - 10.5bt

Intermediate Segment2: 100BASE-T - 8bt

Right Segment4: 10BASE2 - 16bt

Payment PVV (4 to 1):

Left Segment4: 10BASE2 - 16bt

Intermediate Segment3: 100BASE-T - 8bt

Intermediate Segment2: 100BASE-T - 8bt

Right Segment1: 100BASE-T - 10.5bt

This LAN according to the PVV criterion does not exceed 49bt. Thus, the designed LAN, represented by the structural diagram, is fully operational. . Compliance with these requirements ensures the correct operation of the LAN, even in cases where simple rules for configuring the network are violated.

Conclusion

When working on a course project, I studied the entire design and implementation cycle of this LAN. A LAN was designed for the classrooms of one of the buildings of the Petrovsky College according to the Ethernet standard using the "Twisted pair" and "Thin coaxial" cables in all parameters, using the 10Base-T and 10Base standards.

Were carried out calculations of the diameter of the LAN, and calculations to check the operability of the LAN using the method of bit intervals. This method shows that the designed LAN is functional and meets all the requirements and criteria of the Ethernet standard.

Introduction. ……………………………………………………………………… ...... 3
1.General characteristics of the enterprise ……………………………… ................... 4
2. Practice assignment ……………………………………………………………… 6
3. Theoretical information ……………………………………………………… .7
3.1. Theoretical information about the main software products used in ZPH "TEKHOL" LLP ………………………………………………… 7
3.2. Theoretical information about a wireless LAN based on Wi-Fi wireless data transmission technology ………………………………… 14
4.Results of the main tasks …………………………………… .17
Conclusion ………………………………………………………………………… .20
List of used literature …………………………………………… ... 21
Appendix A
Introduction

Industrial practice is an important stage in the training of qualified specialists. It is a type of educational and auxiliary process, during which theoretical knowledge is consolidated in production, practical skills and competencies are acquired, and advanced experience is mastered. Practice is the final stage in the process of preparing a specialist for independent production activities.
This industrial practice took place on the basis of ZPH "TEHOL" from June 3, 2014 to July 5, 2014 as an intern. The work was carried out in the office of the enterprise.
The purpose of the industrial practice is to consolidate the theoretical knowledge gained and to acquire practical skills.
To achieve this goal, it is necessary to solve the following tasks:
1. Getting a general idea of ​​the activities of the enterprise;
2. Acquaintance with the main tasks and functions of the information computing center;
3. Acquaintance with the software of the enterprise;
4. Obtaining practical skills of real work in this department, consolidating and applying the knowledge gained during training.
1. General characteristics of the enterprise

The Tekhol plant was established in 1991. Its construction was initiated by the USSR Ministry of Fisheries. Then on the territory of the Union there was not a single enterprise that would specialize in the design, assembly and supply of industrial refrigerators. Techol became a pioneer. The specialists of the future promising enterprise have been trained abroad. Since then, the modern equipment of the plant has been serviced only by qualified service personnel.
The rapid economic growth of independent Kazakhstan, the modernization of production, the prospect of the republic joining the WTO have caused the demand for Tekhol products in the domestic market of Kazakhstan. Thus, it has become in demand both abroad, where the plant's partnerships are only expanding, and in the republic itself. Today Tekhol products are supplied to all major cities and regions of Kazakhstan. Proof of the company's successful cooperation with partners from foreign countries is the supply of Tekhol products to the Moscow Region, Altai and Primorsky Territories, to Sakhalin Island, to Turkmenistan, to the regions of Eastern and Western Siberia, to the cities of the Black Sea and the Caspian Sea.
Tekhol today is a modern multi-purpose enterprise with a well-functioning management system, a developed management and marketing service, with its own design bureau and laboratory, with a huge sales market. It is equipped with the highest class equipment, technological lines of leading European companies.
The Tekhol plant is part of the group of companies: the Tekhol-UDR construction corporation, which also includes: Uraldomnaremont KZ - one of the oldest enterprises in Kazakhstan, performing unique work on the construction, reconstruction of metallurgical facilities, technological equipment, pipelines; Tekhol-montazh company - performance of any construction and installation work; Temirstroy is one of the oldest companies in the corporation, performing construction work at industrial and civil facilities and other companies. A large number of qualified specialists, a large fleet of constantly updated construction equipment, modern equipment - all this allows the corporation to carry out large volumes of construction in the shortest possible time and with constant quality. All Tekhol products are certified and manufactured under the RK license. Since 2003, the plant has certified and successfully operates a quality management system according to the international standard ISO 9001-2000. Tekhol offers quality products that may interest the most demanding customer.
The main office of ZPH Tekhol LLP has access to the Internet. Access to the Internet serves for electronic document management with tax authorities and business partners of the enterprise, access to the websites of partner manufacturers is provided.
LLP ZPH "Tekhol" monitors the state of computer technology. Obsolete equipment is regularly updated and therefore modern high-performance computers based on the intel core i7 3820 processor are installed in the main office of the enterprise.
Computers were connected to a local area network using a twisted pair (star topology), but then Wi-Fi wireless technology was introduced. Now all computers of the head office of ZPH Tekhol LLP are united into a wireless local area network.

2.Practice assignment

I. Getting a general idea of ​​the activities of the enterprise;
II. Acquaintance with the main tasks and functions of the information computing center;
III. Familiarization with the enterprise software;
IV. Obtaining practical skills of real work in this department, consolidating and applying the knowledge gained during the training while completing an individual assignment.

Individual task: Implementation and adjustment of a wired and wireless local area network based on Wi-Fi wireless data transmission technology. This requires:
1) Dismantle the existing wired twisted pair LAN.
2) Review the technical requirements for installing a wireless LAN.
3) Get acquainted with the technical characteristics and operating instructions for the necessary equipment.
4) Install the equipment.
5) Perform adjustment and adjustment of equipment and computer equipment to work in a wireless network.


3.Theoretical information

3.1. Theoretical information about the main software products used in LLP ZPH "Tekhol"

Windows7 is a user operating system of the Windows NT family, the next in time after Windows Vista and preceding Windows 8. This operating system has support for multitouch control. All OS versions include 50 new fonts. The existing fonts have been improved for the correct display of all symbols. Windows 7 is the first version of Windows to include more fonts for displaying non-Latin characters than for displaying Latin characters. The control panel for fonts has also undergone improvements - by default, it will display only those fonts for which the layout is installed on the system.
Windows 7 supports folder aliases internally. For example, the Program Files folder in some localized versions of Windows was translated and displayed with a translated name, but at the file system level it remained in English. Also, the system (except for Windows 7 Starter and Windows 7 Home Basic) has about 120 built-in background images that are unique for each country and language version. Thus, the Russian version includes the theme "Russia" with six unique high-resolution wallpapers.
An additional benefit of Windows 7 is tighter integration with driver manufacturers. Most drivers are automatically detected and 90% of the time is backward compatible with Windows Vista drivers.
Windows 7 has also improved compatibility with older applications, some of which could not run on Windows Vista. This is especially true for older games developed for Windows XP. Also in Windows 7, Windows XP Mode appeared, which allows you to run old applications in a Windows XP virtual machine, which provides almost complete support for old applications.
The Remote Desktop feature has also undergone changes. Support for the Aero Peek interface, Direct 2D and Direct3D 10.1, support for multiple monitors, media extensions, DirectShow, and the ability to play audio with low latency were introduced.
Branch Cache network technology allows you to cache the content of Internet traffic. If a user on the local network needs a file that has already been downloaded by one of the users on his network, he will be able to get it from the local cache storage, and not use a channel with limited bandwidth. The technology is designed for large networks and is offered for implementation at enterprises as part of the Corporate and Maximum OS versions.

Microsoft Office - Office suite of applications created by Microsoft for Microsoft Windows, Apple Mac OS X and Apple iOS (on iPad) operating systems. This package includes software for working with various types of documents: texts, spreadsheets, databases, etc. Microsoft Office is an OLE object server and its functions can be used by other applications, as well as the Microsoft Office applications themselves. Supports scripts and macros written in VBA. Microsoft Office comes in several editions. Differences between editions in the package and price. The most complete of them contains:
- Microsoft Word is a word processor. Available for Windows and Apple Mac OS X. Allows you to prepare documents of varying complexity. Supports OLE, third party plugins, templates, and more. The main format in the latest version is Microsoft Office Open XML, which is a ZIP-archive containing text in the form of XML, as well as all the necessary graphics. The binary file format Microsoft Word 97-2003 with the DOC extension remains the most widespread. The product occupies a leading position in the word processor market, and its formats are used as the de facto standard in the workflow of most enterprises. Word is also available in select editions of Microsoft Works. Programs are equivalents: OpenOffice.org Writer, LibreOffice Writer, StarOffice Writer, NeoOffice Writer, Corel WordPerfect and Apple Pages (Mac OS only), as well as, with some caveats, AbiWord (in cases where its capabilities are sufficient, but small the volume and speed of work with low resource requirements are more important).
- Microsoft Excel is a spreadsheet processor. Supports all the necessary functions for creating spreadsheets of any complexity. It occupies a leading position in the market. The latest version uses the OOXML format with the ".xlsx" extension, earlier versions used the binary format with the ".xls" extension. Available for Windows and Apple Mac OS X. Programs - equivalents: OpenOffice.org Calc, LibreOffice Calc, StarOffice, Gnumeric, Corel Quattro Pro and Apple Numbers (Mac OS only).
- Microsoft Outlook is a personal communicator. Outlook includes: calendar, task planner, sticky notes, email manager, address book. Collaborative networking is supported. Programs - equivalents: mail client - Mozilla Thunderbird / SeaMonkey, Novell Evolution, Claws Mail, Eudora Mail, The Bat !; Personal Information Manager - Mozilla, Lotus Organizer and Novell Evolution. Available for Windows and Apple Mac OS X.
- Microsoft PowerPoint - an application for preparing presentations for Microsoft Windows and Apple Mac OS X. Programs - equivalents: OpenOffice.org Impress, LibreOffice Impress, Corel WordPerfect and Apple Keynote.
- Microsoft Access is an application for managing databases. Program equivalents: OpenOffice.org Base, LibreOffice Base
- Microsoft InfoPath — an application for collecting and managing data — simplifies the process of collecting information.
- Microsoft Publisher is an application for preparing publications.
- Microsoft Visio - an application for working with business diagrams and technical diagrams - allows you to transform concepts and common business data into diagrams.
- Microsoft Project - project management.
- Microsoft OneNote is an application for recording and managing notes.
- Microsoft SharePoint Designer - a tool for building applications on the Microsoft SharePoint platform and customizing SharePoint sites.

Dr.Web is a family of anti-viruses. Developed by Doctor Web. Specific features of Dr.Web:
- Ability to install on an infected machine.
- Origins Tracing - an algorithm for non-signature detection of malicious objects, which complements the traditional signature search and heuristic analyzer, makes it possible to significantly increase the level of detection of previously unknown malicious programs. Also used in Dr.Web for Android
- Subsystem Anti-rootkit API (ArkAPI), using universal algorithms to neutralize threats. Through this system, threats are neutralized by all anti-virus components. It is also used in the Dr.Web CureIt!
- Dr. Web Shield is a mechanism for fighting rootkits implemented as a driver. Provides low-level access to virus objects hidden in the depths of the operating system.
- Fly-code is an emulator with dynamic code translation that implements a mechanism for universal unpacking of viruses protected from analysis and detection by one or a chain of new and / or unknown packers, cryptors and droppers. This allows you to unpack files protected by, for example, ASProtect, EXECryptor, VMProtect and thousands of other packers and protectors, including those unknown to antivirus.
- Support for most existing formats of packed files and archives, including multivolume and self-extracting archives.
- Virus databases are updated immediately as new viruses are detected, up to several times per hour. The developers of the antivirus product refused to release virus database updates according to any schedule, since virus outbreaks do not obey them.
- SelfPROtect self-defense module, which protects anti-virus components (files, registry keys, processes, etc.) from being modified and removed by malware.
- Background Rootkit Scan - a subsystem for background scanning and neutralization of active threats. This subsystem is resident in memory and scans the system for active threats and neutralizes them in various areas, for example: startup objects, running processes and modules, system objects, RAM, MBR / VBR disks, computer system BIOS.
- Dr.Web Cloud is a cloud-based service for checking links and files on Doctor Web's servers in real time, which allows the anti-virus to use the most recent information about unsafe resources and files.
- Cross-platform - a single virus database and a single core of the anti-virus scanner are used on different OS platforms.
- Detection and treatment of complex polymorphic, encrypted viruses and rootkits.
- Compact virus database and small size of updates. One entry in the virus database allows detecting up to a thousand of these viruses.

WinRAR is a RAR and ZIP file archiver for 32- and 64-bit Windows operating systems (there are also versions of this archiver for Android, Linux, FreeBSD, Mac OS X, MS-DOS, Windows Mobile). It is considered one of the best archivers in terms of the ratio of the compression ratio to the speed of work. Distributed under a shareware license. After 40 days of trial operation, the user is prompted to purchase a license. The Android and Pocket PC versions are Freeware licensed. Key features:
- Creation of archives in RAR and ZIP formats.
- Unpacking CAB, ARJ, LZH, TAR, GZ, ACE, UUE, BZIP2, JAR, ISO, 7z, Z files.
- Ability to encrypt archives using the AES (Advanced Encryption Standard) algorithm in CBC mode with a key length of 256 bits (128 bits in version 4).
- Ability to work with files up to 8.589 billion (approximately 8 x 109) gigabytes.
- Creation of self-extracting, continuous and multivolume archives.
- Adding additional data to the archives to restore the archive in case of its damage, as well as the creation of special volumes for recovery, allowing you to restore a multivolume archive in case of damage or even complete absence of its individual volumes.
- Full support for the NTFS file system and file names in Unicode.
- Command line support.

Adobe Acrobat Reader is a free, proven standard for reliably viewing, printing, and annotating PDF documents. It is the only PDF viewer that allows you to open and interact with all types of PDF content, including forms and media. Functions:
- View and create annotations in PDF documents. With Adobe Reader XI, you can not only open and view PDF files, but also perform many other operations. Now you can easily add annotations to your document using a comprehensive set of annotation tools.
- Filling out, signing and submitting PDF forms. Add signatures to documents in minutes, not hours. Complete, sign, and return the PDF form, and then save a digital copy for accounting using Reader XI.
- Reliable access to PDF documents. Use the leading PDF viewer to work with any PDF file on a variety of operating systems and platforms, including iPad, iPhone, or Android mobile devices.
- Software deployment management and standards compliance. Industry standard Adobe and Microsoft tools make it easy to manage and install updates. Get support for a variety of standards directly related to document security. Extend Reader functionality with the free Adobe Acrobat SDK.

Microsoft Windows Server 2012 R2 is a version of the server operating system from Microsoft, which already has the status of the final version and belongs to the Microsoft Windows OS family. This server operating system is intended to replace the currently released Windows Server 2012. Windows Server 2012 is the first version of Windows Server since Windows NT 4.0 to not support Itanium processors.
Among the main features of Windows Server 2012, Microsoft representatives emphasize storage pools and significantly expanded capabilities of the branded hypervisor for servicing virtual machines. In particular, the work of virtual Hyper-V servers on 32 virtual processors and 120 GB of RAM was shown. Hyper-V in Windows Server 2012 can now support up to 1 TB of memory per virtual machine with the same license price for any virtual machine - a significant improvement over VMware's processor-based licensing scheme, which supports up to 12 cores per license. In addition, Hyper-V will be able to support virtual disks up to 64 TB.

Google Chrome is a free browser for your computer. Thanks to Google Chrome Russian version, you can ensure a safe and comfortable work on the Internet. This Google Chrome 2014 in Russian is the most popular browser in 2013 for Windows, Android, iOS and many other platforms, there is even support for the Windows 8 operating system. Google Chrome new version was made by the popular Google company from scratch, the popular engine was also chosen Webkit for HTML processing, which is also used in the Safari browser. Another plus of Google Chrome's latest version is that when you open a new tab, it opens it in a new process, which will protect you and your computer from intruders. We would like to note that the new Google Chrome 2014 Browser from Google is well optimized and stable thanks to the use of the JavaScript engine.

Cisco Packet Tracer is a data network simulator manufactured by Cisco Systems. Allows you to create workable network models, configure routers and switches (using Cisco IOS commands), interact between multiple users (via the cloud). Includes the Cisco 1800, 2600, 2800 series of routers and 2950, ​​2960, 3560 switches. In addition, there are DHCP, HTTP, TFTP, FTP servers, workstations, various modules for computers and routers, WiFi devices, and various cables.
It successfully allows you to create even complex layouts of networks, check topology for performance. Available free of charge to members of the Cisco Networking Academy Program.

1C: Enterprise 8 is a 1C software product designed to automate activities at an enterprise. Initially, 1C: Enterprise was intended to automate accounting and management accounting (including payroll and personnel management), but today this product finds its application in areas that are far from the actual accounting tasks.
In version 8, there are two main modes - enterprise mode and configurator mode (this mode also has a debug mode). The monitor mode is excluded due to the fact that the monitor is built into the modes of both the enterprise and the configurator.
The 1C: Enterprise 8 platform allows configuration, allows the simultaneous use of one database by several users with the required number of additional licenses. Additional cost licenses are significantly lower than the cost of the program.
The 1C: Enterprise 8 platform, when used with specialized "basic" configurations, provides operation in the "basic" mode with limited capabilities: it does not allow configuration, does not support external connection mode, and does not have a multiuser mode. To work in the "basic" mode, a lightweight licensing option is used, no hardware protection keys are required, and the cost of such a product is significantly lower.

Firewall is a software package designed to protect your computer from unauthorized access. Its functions include the control and separation of network packets passing through it with the elimination of suspicious and dangerous, in accordance with the specified rules. Sometimes similar functions are assigned to hardware protection. This term (firewall) can be translated as "wall of fire" or "wall of fire".
Firewall is a computer program that protects the user's computer while on the Internet from unauthorized access by other network users to the data on the computer. The program suppresses all attempts to access the information contained on the hard drive in order to avoid theft of confidential information and infection with computer viruses.
3.2 Theoretical information about a wireless local area network based on Wi-Fi wireless data transmission technology.

Wi-Fi (Wireless Fidelity) is a trademark of the Wi-Fi Alliance for wireless networks based on the IEEE 802.11 standard. It is short for Wireless-Fidelity (literally "wireless fidelity") by analogy with Hi-Fi. Any equipment complying with the IEEE 802.11 standard can be tested by the Wi-Fi Alliance and receive the corresponding certification and the right to apply the Wi-Fi logo. Typically, a Wi-Fi network scheme contains at least one access point and at least one client. It is also possible to connect two clients in point-to-point mode, when the access point is not used, and clients are connected through network adapters "directly". The access point broadcasts its network identifier (SSID) using special signaling packets at a speed of 0.1 Mbps every 100 ms. Therefore, 0.1 Mbps is the lowest data transfer rate for Wi-Fi. Knowing the SSID of the network, the client can find out if it is possible to connect to this access point. When two access points with identical SSIDs come into range, the receiver can choose between them based on the signal strength. The Wi-Fi standard gives the client complete freedom in choosing the criteria for the connection. The principle of operation is described in more detail in the official text of the standard.
Benefits of Wi-Fi:
+ Allows you to deploy a network without cabling, which can reduce the cost of deploying and / or expanding the network. Locations where cable cannot be installed, such as outdoors and in buildings of historical value, can be served by wireless networks.
+ Allows mobile devices to access the network.
+ Wi-Fi devices are widespread in the market. Compatibility of equipment is guaranteed due to the mandatory certification of equipment with the Wi-Fi logo.
Disadvantages of Wi-Fi:
- Frequency response and operating limits vary from country to country.
- In many European countries, two additional channels are allowed, which are prohibited in the USA; Japan has another channel at the top of the range, while other countries such as Spain prohibit the use of low frequency channels. Moreover, some countries, such as Russia, Belarus and Italy, require registration of all outdoor Wi-Fi networks or require registration of a Wi-Fi operator.
- High power consumption compared to other standards, which reduces the battery life, increases the temperature of the device.
- The most popular encryption standard, WEP can be cracked relatively easily, even with the correct configuration (due to the weakness of the algorithm). Although newer devices support the more advanced WPA and WPA2 data encryption protocol, many older access points do not support it and need to be replaced. The adoption of the IEEE 802.11i (WPA2) standard in June 2004 made available a more secure scheme that is available in new hardware. Both schemes require a stronger password than those typically assigned by users. Many organizations use additional encryption (such as VPN) to protect against intrusion.
- Wi-Fi has a limited range. A typical 802.11b or 802.11g Wi-Fi home router has a range of 45m indoors and 450m outdoors. A microwave oven or mirror between Wi-Fi devices weakens the signal strength. Distance also depends on frequency.
- Overlapping signals from a closed or encrypted access point and an open access point operating on the same or adjacent channels may prevent access to an open access point. This problem can arise with a high density of hotspots, for example, in large apartment buildings, where many residents set up their own Wi-Fi hotspots.
- Incomplete interoperability between devices from different manufacturers or incomplete standard compliance may result in limited connectivity or reduced speed.
- Decreased network performance when it rains. Overload of equipment when transmitting small data packets due to the attachment of a large amount of service information.
- Low suitability for applications using real-time media streams (for example, the RTP protocol used in IP telephony): the quality of the media stream is unpredictable due to possible high data transmission losses due to a number of factors beyond the user's control (atmospheric interference , landscape and others, in particular those listed above). Despite this
disadvantage, a lot of VoIP equipment based on 802.11b / g devices is produced, which is also targeted at the corporate segment: however, in most cases, the documentation for such devices contains a clause stating that the quality of communication is determined by the stability and quality of the radio channel.
Wireless technologies in industry:
For industrial use, Wi-Fi technologies are still offered by a limited number of suppliers. For example, Siemens Automation & Drives offers Wi-Fi solutions for its SIMATIC controllers in accordance with the IEEE 802.11g standard in the free ISM 2.4 GHz band and providing a maximum transmission rate of 11 Mbps. These technologies are used mainly for the control of moving objects and in warehouse logistics, as well as in cases where, for any reason, it is impossible to lay wired Ethernet networks.

Necessary equipment:
- Network adapters. These adapters (also called network interface cards (NICs)) connect computers to the network so they can communicate. The network adapter can be plugged into a USB or Ethernet port on your computer, or installed inside your computer in an available PCI expansion slot.
- Routers and access points. Routers connect computers and networks to each other (for example, using a router, you can connect a local area network to the Internet). Routers also allow multiple computers to share the same Internet connection. To share an Internet connection over a wireless network, you need a wireless router. Access points enable computers and devices to connect to a wireless network.
4. Results of the main tasks

I. In the first days of industrial practice, a general idea of ​​the enterprise was obtained, with the principles of the enterprise, job responsibilities.
LLP ZPH "Tekhol" is a modern multi-purpose enterprise, which is equipped with technological lines of European firms. The main products are warehouse, industrial and administrative buildings, modular industrial refrigerators.
The industrial practice was held at the head office of ZPH Tekhol LLP as an intern.
The student trainee was charged with the following duties:
- keeping the computers of all departments of the enterprise in working order;
-making maintenance;
-installation, configuration and maintenance of operating systems;
-implementation, customization of applied software;
-provision of computer security of the enterprise information system.
Under the guidance of an employee of ZPH Tekhol LLP, the safety measures at the enterprise, the location of emergency exits, actions in emergency situations, the evacuation plan in case of fire were studied.

II. Then I got acquainted with the main tasks and functions of the data processing center.
The main tasks and functions of the data center are:
- organization of the work of a unified information network;
- ensuring the correct technical operation of the electronic equipment of the enterprise;
- introduction of modern software;
- ensuring information security, anti-virus protection when working with the available software;
- support of the 1C: Enterprise 8 system;
- support of the website of ZPH Tekhol LLP;
- provision of information services on the Internet.

III. Also, the main software products used in ZPH Tekhol LLP were studied.
The main software products used at the enterprise: Windows 7 operating system from Microsoft, Microsoft Office suite of office programs, Dr.Web anti-virus program, 1C: Enterprise 8 information system, Google Chrome Internet browser.

IV. During the internship, I received practical skills of real work in this department, consolidated the knowledge gained during the training while completing an individual task: the implementation and adjustment of a wireless local area network based on Wi-Fi wireless data transmission technology.
When installing a wireless LAN, a D-Link TD-W8910G router and a D-Link DGS 3200-24 switch were used. A D-Link TL-WN723N wireless network adapter was installed on each computer.
Network installation is carried out in several steps:
1) Modeling the future network using Cisco Packet Tracer.
2) Installation of the necessary equipment.
3) Installing the required software.
4) Setting up an Internet connection.
5) Connecting computers to a network using the network setup wizard.
6) Configuring network security.
7) Testing the performance of the network.
8) Elimination of existing problems.

Step 1. Modeling the network with Packet Tracer.
Using the Cisco Packet Tracer simulator, I simulated the future network. The network consisted of 4 computers. One of the computers was designated as a server. Appendix A provides a diagram of the developed network.

Step 2. Hardware installation.
A wireless network adapter was installed on each computer. The network adapter was installed in the PCI port of the motherboard. The corresponding software has been installed in the form of a driver. The switch was connected to the server computer via the RJ-45 port. The router was connected to the switch via an RJ-45 port. The driver was installed on the server and configured accordingly.

Step 3. Software installation.
On each computer, the main software was installed, which is used at the enterprise ZPH "Tekhol" LLP. These are: Windows 7 operating system by Microsoft, Microsoft Office suite of office programs, Dr.Web anti-virus program, 1C: Enterprise 8 information system, Google Chrome Internet browser. And the server operating system Microsoft Windows Server 2012 R2 was installed on the server computer.

Step 4. Setting up an Internet connection.
The wireless router was connected to the existing Internet connection using the RJ-45 port. The connection to the Internet was set up.

Step 5: Connecting computers into one network.
Network discovery was enabled on each computer, and the required Wireless Setup Wizard was enabled on the server. The computers were connected to a wireless LAN.

Step 6. Configuring network security.
A software package was installed on the server computer, designed to protect against unauthorized access Firewall. Bala, the Firewall was configured and debugged.

Step 7. Testing the network performance.
To test network performance and troubleshoot network problems, the Network Problem Diagnostics and Correction Wizard was launched on the server.

Step 8. Troubleshooting.
The problems identified during the operation of the "Diagnose and Fix Network Problems Wizard" were resolved using the Windows Help and Support Center (section "Troubleshooting wireless networks").


Conclusion

During the internship, the theoretical skills obtained during the studies were supported by practical ones. An acquaintance with the organization, structure and principles of operation of the enterprise, rules of safety and labor protection was made.
The experience of working in a team was gained, the development of communication skills, the manifestation of responsibility.
The individual task received at the enterprise was completed in full and on time.
During the internship, knowledge in the field of information systems, anti-virus programs, computer networks, etc. was deepened.

List of used literature

1. Standards for local area networks: Handbook / VK Shcherbo, VM Kireichev, SI Samoilenko; ed. S. I. Samoilenko. - M .: Radio and communication, 2000.
2. Practical data transfer: Modems, networks and protocols / F. Jennings; per. from English - M .: Mir, 2005.
3. Computer networks: protocols, standards, interfaces / Yu. Black; per. from English - M .: Mir, 2002.
4. Fast Ethernet / L. Quinn, R. Russell. - BHV-Kiev, 1998.
5. Switching and routing of IP / IPX traffic / M. V. Kulgin, IT Co. - M .: Computer-press, 2003.
6. Fiber optics in local and corporate communication networks / AB Semenov, IT Co. - M .: Computer-press, 2009.
7. Internet protocols. S. Zolotov. - SPb .: BHV - Saint Petersburg, 2008.
8. Personal computers in TCP / IP networks. Craig Hunt; per. from English - BHV-Kiev, 2011.
9. Computing systems, networks and telecommunications / Pyatibratov et al. - FIS, 2008.
10. High-performance networks. User encyclopedia / A. Mark Sportak et al .; per. from English - Kiev: DiaSoft, 2008.
11. Synchronous digital networks SDH / N. N. Slepov. - Eco-Trends, 2008.
12. Windows-based Enterprise Networks for Professionals / Stern, Monty; per. from English - SPb .: Peter, 2009.
13. Networking Essentials. Certification exam - external (exam 70-058) / J. Stewart, Ed Tittel, Kurt Hudson; per. from English - SPb .: Peter Kom, 2006.
14. Basics of building networks: textbook. a guide for MCSE specialists (+ CD-ROM) / J. Cellis, C. Perkins, M. Strieb; per. from English - Laurie, 2007.
15. Computer networks: textbook. well. 7th ed. (+ CD-ROM). - MicrosoftPress, Russian edition, 2008.
16. Network facilities Microsoft Windows Server / per. from English - SPb .: - BHV - Saint Petersburg, 2007.
17. Microsoft Windows Server 2012. Book 1 / per. from English - SPb .: - BHV - Saint Petersburg, 2012.
18. Explanatory dictionary on computer technology / per. from English - M .: Publishing department "Russian edition" LLP "Channel Trading Ltd.", 2005.
19. Emerging Communications Technologies, 5 / e, Uyless Black, Prentice Hall Professional, 2007.

Introduction

The development of economic and social relations, the expansion of networks and enterprises and an increase in their size, the emergence of new ties between enterprises and industries, an increase in flows and volumes of information - all this has led to a sharp increase in the complexity of management tasks.

The increasing complexity of the tasks solved in the field of management, in turn, led to a change in the nature of management processes. The use of computers significantly increases the efficiency of control, but at the same time, it is assumed that a person actively participates in the control process. It is he who makes the final decision based on the assessment of various design options, taking into account the additional data available to him.

Industrial and technological practice is an organic part of the educational process and has the goal of consolidating and deepening the knowledge gained in the process of theoretical activity, introducing the student to socially useful labor and linking the theoretical knowledge gained with real production conditions. During the industrial technological practice, student trainees work according to the regime established for this enterprise and are subject to the internal regulations of this organization.

The purpose of the industrial and technological practice is for students to study a real enterprise and working conditions at it, to acquire applied skills in developing and maintaining programs, studying information flows and workflow, methods of storing and processing information, collecting materials for a report and preliminary selection of a probable topic for a diploma project. In addition, during the internship, trainees must also take an active part in the social life of the enterprise.

1. Production activities of the enterprise

Municipal budgetary institution of culture "Vozhegodskoe regional cultural and leisure association"

Year of creation - 01.11.2007. The network of MBUK "VR KDO" consists of 14 branches: Houses of culture and clubs. Director of MBUK "BP KDO" Lyubov Aleksandrovna Klyushina. The main goal of the MBUK "VR KDO": Creation of conditions for organizing leisure and providing the residents of the district with the services of cultural and leisure institutions.

To achieve this goal, the following tasks were set for 2012:

Improving the organization of work to improve the qualifications of BWW specialists using new techniques.

Creation of conditions for increasing the efficiency and effectiveness of the work of the KFOR.

Work on the formation of a positive image of MWW institutions.

Priority areas of work of MBUK "BP KDO":

Patriotic and spiritual and moral education of citizens.

Promotion of family values.

Preservation and revival of traditional folk culture.

Prevention of a healthy lifestyle.

Cultural and entertainment activities.

Formation and development of cultural brands of settlements.

Inter-settlement festivals and holidays are held annually.

Benchmarks of activity of MBUK "VR KDO" in 2012:

4586 events were held, of which 2389 were film screenings.

There were 3748 paid events, 2389 of which were film screenings.

54,923 visitors were served, of which 13,788 at film shows.

32,001 visitors were served on a paid basis, of which 13,788 were at movie shows.

There were 135 club formations with the number of participants in them 993 people.

All Houses of Culture and clubs carry out their activities in accordance with the goals and objectives.

2. IS architecture, software tools, methods of information processing and storage, database organization, familiarization with the network structure and composition of IT

In the institution "Vozhegodskoe Regional Cultural and Leisure Association", the topology of the "Star" network is used, that is, two computers are connected to each other using a router.

A star topology is the basic topology of a computer network in which all computers on the network are connected to a central site (usually a switch) to form a physical segment of the network. Such a network segment can function both separately and as part of a complex network topology (usually a “tree”). All information exchange is carried out exclusively through the central computer, on which a very large load is imposed in this way, therefore it cannot be engaged in anything other than the network. As a rule, it is the central computer that is the most powerful, and it is on it that all the functions of managing the exchange are entrusted. In principle, no conflicts in a network with a star topology are possible, because the management is completely centralized, what the star topology looks like can be seen in diagram # 1.

Scheme No. 1.

Characteristics of institution computers

"Vozhegodskoe regional cultural and leisure association":

Specifications:

Computer # 1

Processor: Intel® Pentium® 4 2.66 GHz

RAM: 512 Mb DDR

Hard Drive: Seagate 120 Gb 7200 rpm

Monitor: Samsung 17 "

OS: MS Windows XP Professional RUS

Computer # 2

Processor: Intel® Pentium® 4 2.66 GHz

RAM: 1024 Mb DDR

Video card: Geforce FX 5200 128Mb 128 bit MSI

Hard Drive: Seagate 240 Gb 7200 rpm

Monitor: Samsung 19 "

OS: MS Windows 7

3. Reporting form

The reporting form of the institution "Vozhegodskoe regional cultural and leisure association" is information containing tables, text, calculations and executed in a text file using a set of Microsoft Office programs, such as Microsoft Word, Excel, Access.

4. Means of security and information protection

Antivirus Kaspersky CRYSTAL was installed on the computers of the institution. CRYSTAL keeps your digital world crystal clear. Hybrid Internet Threat Protection instantly eliminates malware, spam, and other modern threats while conserving computer resources through a combination of cloud and antivirus technologies. CRYSTAL keeps your computers safe and reliable against Internet threats, no matter what you and your loved ones doing on the internet. The product has optimal default settings, and you do not need to be an IT professional to effectively manage the protection of all home computers. Make the most of the Internet, and entrust security to Kaspersky PURE. The capabilities of Kaspersky PURE allow you to keep your valuable documents, photos, favorite audio recordings and films, even in the event of a breakdown or theft of your computer. Special security tools and technologies allow you to create and securely store strong passwords, as well as prevent theft of accounts on websites and applications. Using Kaspersky PURE, you can determine the time, duration and nature of the work of each user in your home. You can also block access to websites with inappropriate content and filter data sent using instant messaging programs. Kaspersky CRYSTAL is a comprehensive home computer protection solution that allows you to centrally manage security and reliably protects your computers from malware and other Internet threats. Special tools such as Parental Control, Password Manager, Backup, etc. provide a level of protection for your personal data that was previously unavailable.

5. Labor protection and safety requirements.

Basic rights and obligations of employees:

1. Employees of the Company have the right:

· To conclude, amend and terminate an employment contract in the manner and on the terms established by labor legislation.

· For the provision of work stipulated by the employment contract.

· To a workplace that meets state regulatory requirements for labor protection.

· For timely and full payment of wages in accordance with their qualifications, complexity of work, quantity and quality of work performed.

· For rest, provided by the establishment of normal working hours, the provision of weekly days off, non-working holidays, paid vacations.

· For complete reliable information about working conditions and labor protection requirements at the workplace.

· For vocational training, retraining and advanced training in accordance with the procedure established by labor legislation and local regulations of the Company (documented procedure of the QMS "Training of Personnel"), including certification in order to maintain the level of professional competence, improve the qualification category or advance in position, is regulated by the Regulations on the procedure for attestation of the Company's employees.

· To compensate for harm caused by him in connection with the performance of his labor duties, and compensation for moral damage in the manner prescribed by labor legislation.

· For compulsory social insurance in cases stipulated by federal laws.

2.Employees are obliged to:

· To conscientiously fulfill their labor duties stipulated by the employment contract and job description.

· Comply with the Internal Labor Regulations and other local regulations adopted by the Company in accordance with the established procedure.

· Work in good faith, observe labor discipline, timely and accurately fulfill the orders of the Company, use all working time for productive work.

· Carefully treats the property of the Company (including the property of third parties held by the Company, if the Company is responsible for the safety of this property) and other employees.

· Ensure the safety of entrusted property, effectively use equipment, take good care of tools, measuring instruments, overalls and other items issued for use by employees.

· Not to disclose information constituting a commercial secret and confidential information about the activities of the Company, in accordance with the "Regulations on ensuring the safety of confidential information in the Open Joint Stock Company" Universal Electronic Map of the Vologda Region ".

· Behave correctly, with dignity, avoiding deviations from the recognized norms of business communication.

Obligations of the employee in the field of labor protection.

The employee is obliged:

· comply with the norms, rules and instructions on labor protection, industrial sanitation, fire safety rules;

· to use the means of individual and collective protection correctly;

· undergo training in safe methods and techniques for performing work on labor protection, first aid, instruction on labor protection, testing of knowledge of labor protection requirements;

· undergo compulsory medical examinations;

· immediately inform the immediate supervisor or other representatives of the Company about a situation that poses a threat to the life and health of people, the safety of the Company property (including the property of third parties held by the Company, if the Company is responsible for the safety of this property).

6. Tasks of the head of practice from the enterprise

1) Updating installed software

Basically, this operation took place manually by selecting the necessary updates, but it was also practiced to update programs through a free application - Software Update Monitor (tracking software updates). Its main purpose is to notify the user about the appearance of new versions of applications with which he works (the result can be seen in Fig. 1).

2) Setting up a local network

Before setting up a local network through a router for two computers, we will do the following operations on each of them:

· Configuring a local network for Windows XP

First, you need to disable all security programs on this computer (antiviruses, firewalls, firewalls, etc.)

In order for several computers to be identified and have open access, they must be placed in one workgroup. To do this, you need to do the following: open the "Properties" tab by calling the context menu on the "My computer" icon, then go to the "computer name" tab and, by clicking on the "change" button, change the computer name, and click "OK". To configure a local network using a router, you need to make sure that all Ip addresses of computers are located in a single subnet. To do this, you must specify identical settings on all computers. It may be impossible to configure settings without enabling the NetBios protocol. If you have just such a case, then you need to go to the "Network Connections" tab and open a window for configuring TCP / IP, then call additional parameters and enable this very NetBios in the "general" attachment. This concludes that the process is complete.

· Setting up a local network for Windows 7

The process for setting up a local network for different operating systems is quite different. Setting up a local network via a Windows 7 router is not much more difficult. First, we will need to find out the name of our computer, then go to the "Properties" section, in which we click on the "change parameters" button and make the necessary corrections. Then restart your computer for the changes to take effect. The computer name must be entered in English letters. If it is specified in a different way, then there is a great risk of getting serious errors in the network.

Now we set up automatic generation of the address and DNS. To do this, you need to go along the following path: Control Panel - Control Center - Local Network - Properties. In the window that opens, select TCP / IPv4 and check the box for obtaining an IP address automatically. In the end, all you have to do is turn on NetBios. To do this, you will need to go to the "Protocol Properties" section, in the "Advanced" tab, click on the "WINS" button and check the box next to "Enable NetBios", and then restart your computer. This completes the settings.

3) Installing additional software

In the institution "Vozhegodskoe Regional Cultural and Leisure Association", additional software was installed:

WINRAR 5.00 is a powerful utility for creating and managing archives, containing a whole range of additional useful functions. WinRAR is used every day by millions of people around the world to save PC space and transfer files quickly.

Adobe Flash Player is a versatile free application that allows you to view pages with dynamic content, colorful special effects, interactive games and video clips, shown in Fig. 2 you can see what Adobe Flash Player looks like.

Reader is a free, proven standard for reliably viewing, printing, and annotating PDF documents. It is the only PDF viewer that allows you to open and interact with all types of PDF content, including forms and multimedia objects, as shown in Fig. 3.

FineReader is a text recognition program that allows you to quickly and accurately translate document images and PDF files into editable electronic formats without the need for retyping.

It is possible to obtain an image for recognition not only with the help of a scanner: it is enough to have a digital camera or a mobile phone with a built-in camera with you, the result can be seen in Fig. 4.

antivirus microsoft office installation

4) Installing Microsoft Office 2007

Before installing Office 2007, we need to uninstall the old version, for this we go to the folder "my computer", then select "Add / Remove Programs" and remove the old version of Office 2003, after the uninstallation is complete, restart the computer. After restarting the computer, download the Office 2007 image from the portable media and proceed with the installation following the instructions. After installation, it is best to restart your computer for the changes to take effect.

) Installing the operating system Windows7:

Reinstallation of Windows occurs using hard disk partitioning programs, both standard and third-party, such as: Acronis Disk Director.

· The first thing to do before installing Windows is to make a copy of the data we need using a memory card or CD-disk.

· Now we need to go into the BIOS of the computer in order to set the boot from a CD or from a USB flash drive. We save the changes and restart the computer by pressing the F10 key.

· The third step is to prepare the hard drive for installing the new OS. Here we carry out the procedure for partitioning the disk into the NTFS file system using the Acronis Disk Director program. From under BIOSS, launch Acronis and perform the following actions: delete the previous hard disk partitions and create new ones, specify the amount of memory that will be required for the new OS, specify the NTFS file system and press the Start button. After completing these procedures, close the program and remove the disc.

· The fourth step is to install the new OS itself. We launch the installation image from under the BIOS and start the installation. We indicate the disk partition we need and click next, and wait for the end of the installation process.

· After completing the installation of the OS, we configure it.

· Install the drivers using the Driver Pack Solution program.

· install the programs we need from the ChipWPI collection of programs (antivirus, MS Office, codecs, archiver).

· Setting up the local network.

6) Installing Adobe Photoshop CS5

1.Installing Adobe Photoshop.

2.Go to the Adobe website.

.Choosing Russian | Windows | 1000.9 MB, Download now.

4.Log in \ Register.

.Download Akami Download Manager, open it and reopen the site. Click "Download Now". Select the directory where the files will be downloaded.

.Password input

Downloaded Adobe Photoshop CS5 Extended 12.0 Final Multilanguage. Click on Set-up.exe the result of this operation can be seen in Fig. 5.

Press the button Skip and continue , we are waiting for the initialization of the installation programs, the process of this operation can be viewed in Fig. 6.

The next step in installing Adobe Photoshop CS5 is to enter the serial number that was given when purchasing the software.

We are waiting for the end of the installation, the process can be viewed in Fig. 9.

At the end of the installation, press the "Finish" button, fig. 10.

We launch the program using a shortcut on the desktop or through the "Start" menu, we get the working window of the program, which can be viewed in Fig. 11. The program is ready to use.

7) Configuring antivirus

When configuring the network, there was a problem with detecting computers; to solve it, it was necessary to disable the firewall in Kaspersky Anti-Virus. To do this, we do the following: in the system tray (bottom corner of the screen) we find the antivirus icon and click on it. Next, select "Security Control" on the antivirus panel. On the left, select "Protection Center". At the bottom right, click "Networking".

A new window "Protection components of your computer" will open. On the left, select "Network Protection", then look for "Firewall". And by clicking on the point opposite, turn off the "Firewall". This is the firewall in Kaspersky PURE.

The license for the use of Kaspersky anti-virus programs was also renewed.

Conclusion

Passage of industrial practice is an important element of the educational process for the training of a specialist in the field of programming.

During its passage, the future programmer applies the knowledge, skills and abilities acquired in the learning process in practice.

During the industrial practice in the institution "Vozhegodskoe Regional Cultural and Leisure Association" all the skills of theoretical training were consolidated in production.

The wide coverage of the industries that I had to deal with in practice allowed me to better assimilate the studied theoretical material obtained in the classroom at the technical school.

I mastered some of the subtleties of using software in practice, understood how some programs work, subroutines that were not clear to me, realized their importance in practice, increased the level of proficiency in programs: Adobe Photoshop, Adobe Reader, Microsoft Word and others.

Practical activity helped me learn to independently solve a certain range of problems that arise in the course of a programmer's work. Also, great help in solving the set tasks was provided by the world network of the Internet, in which you can currently find a lot of useful information in the field of programming.

Bibliography

1. Scott Kelby - Adobe Photoshop CS6. A Handbook of Digital Photography (2013) PDF.

2. Broido V. L. Computing systems, networks and telecommunications: Textbook for universities / V.L. Broido. - SPb .: Peter, 2003 .-- 688 p.

3.Shafrin Yu.A. Fundamentals of computer technology / Yu.A. Shafrin. - M .: ABF, 2001 .-- 560 p.

4.Olifer V.G., Olifer N.A. Computer networks. Principles, technologies, protocols / V.G. Olifer, N.A. Olifer. - SPb .: Peter, 2002 .-- 672 p.

    Computer networks. Classification of computer networks. ……………4

    Fast Ethernet network. …………………………………………………………..5

    Network topology. ……………………………………………………...….eight

    Ensuring the safety of work in the Computing Center. ……….12

Computer networks. Classification of computer networks.

According to the principles of construction, computer networks are divided into local and remote (Fig. 1).

Computer networks


Remote


Local


Peer-to-peer

Multi-rank

Regional

International

Local networks are usually created in one organization or in one room.

The simplest version of such a network is the connection of computers through parallel or serial ports. In this case, there is no need for any additional equipment. There should be only connecting conductors. Such communication between computers is configured within the same room. It is used to transfer data from one computer to another. In this case, you can transfer data without using floppy disks. Any modern shell of the operating system has software that provides such data transfer.

In local peer-to-peer computer networks, computers are connected to the network through special network adapters, and the functioning of the network is supported by the network operating system. Examples of such operating systems are: Novell Personal Net Ware, Net Ware Line, Windows for Workgroups.

All computers and their operating systems in local peer-to-peer computer networks must be of the same type. Users of this network can transfer data to each other, use shared printers, magnetic and optical disks, etc.

In a local multi-rank computer network, one more powerful computer is used, which is called a server, and others, less powerful, are called workstations. The servers use special system software that is different from the system software of workstations.

Remote computer networks are divided into regional and international. Regional are created in certain regions, for example, a state, and international provide communication between your computer and another computer on the worldwide network. An example of such networks is Relcom (for the CIS countries) and the Internet (for the whole world). In principle, it is possible to connect to the Internet from regional computer networks.

Communication of computers in regional networks is provided by ordinary telephone networks or specially dedicated networks through special devices called modems. The modem converts binary code signals to audio signals for the language range, and vice versa.

Computers of the specified area (city) through modems and communication lines are connected to a more powerful computer called a provider. More than 100 providers are currently operating in Ukraine.

Each computer user who is connected to the network is assigned details (address). Providers, using the details, ensure the connection of the respective users' computers.

Communication between computers of different continents is carried out by satellite communication channels.

Regional computer networks can operate in different modes. The easiest is the e-mail mode. It is used to transfer letters, documents, etc. from one computer to another.

Fast Ethernet network

Fast Ethernet is a Local Area Network (LAN) technology used to connect computers in a small area such as an office, building or group of buildings. Fast Ethernet is not intended for use in large regions like a large village or a whole city. In this it differs from global computing, which are systems designed to connect devices or LANs located at significant distances from each other.

A simple definition of a LAN is that it is a system for directly connecting many computers. It can be said that this definition lacks academic precision, but it is practical and well suited to our purposes. Naturally, this definition needs some explanation. In particular, four words require clearer clarification: “system,” “direct,” “connection,” and “many”. Networks are systems because they are made up of components such as cable, repeaters, network interfaces, nodes, and protocols. You may already be familiar with the term hub. The terms hub and repeater are often used interchangeably, but there are differences between the two in Fast Ethernet. All of these elements work together and function like a network. If at least one of them is missing, then there is no LAN.

The term “connection” is easy to explain. The network assumes a connection, i.e. the way computers exchange information and / or data. It is the creation of a connection that is the primary task of a LAN or any other network. It is very important that the LAN does not impose restrictions on the type of data that nodes can exchange, except that this data must be digital. Most LANs are used to share files and printers. Almost all of us are faced with a similar local area network. However, LANs and other networks are capable of transmitting video images, telephone conversations, and other information that can be represented in digital form.

Explaining the term “many” is also not difficult. The network is not a network unless

contains two or more computers. It, of course, may contain other devices, such as printers. When referring to devices connected to a network, we use the general term knots... The node communicates with the LAN using network interface... Thus, the local network directly connects many nodes.

The word "directly" has the exclusive meaning in the definition of a LAN. It is the direct connection that makes the network local. "Directly" means that any LAN node can exchange information with any other node without involving a third node or any device as an intermediary, as opposed to global networks using local networks or other devices to communicate gateways.

Figure 2 shows three LANs connected by two wide area network (WAN) links. The nodes of each LAN can contact each other directly. When LAN node 1 communicates with LAN node 3, the data must pass through two gateways. Nodes of different LANs must be aware of the presence of a gateway and, if necessary, interact with it. Another common name for a gateway is a router. However, when using this term, remember that every router is a gateway, but not every gateway is a router.

On a separate Fast Ethernet LAN (or some other LAN), any two devices can communicate directly as they share a common transmission medium. Typically, this medium is a cable and / or other device that physically connects all the components on the network. In other words, Fast Ethernet is common environment technology... All LAN nodes use the same transmission medium and the same data transmission rules. The main feature of a local network is that any two nodes that need to exchange data do not have to communicate through intermediate devices.

A LAN is local because all computers on it are connected by a common environment. Each type of network has rules that determine

the physical connection of its components with each other and are called topological

the rules.

Rice. 2. Local and global networks


Network topology

There are three main types of network topology: Hub and Spoke (often referred to simply as “star”), ring and bus (Figure 3). Computers in Fast Ethernet, like 10Base-T Ethernet, are physically connected using the first topology. We will use the term “star” to refer to the more common hub-and-spoke topology.

Fast Ethernet and its predecessor Ethernet act as bus networks. In other words, Fast Ethernet physically uses a star topology, but logically acts like a bus network for historical reasons.

Concentrator and beam Ring Fig. 3.

In the first Ethernet networks from which Fast Ethernet originated, all nodes were connected to a single cable segment with T-shaped connectors.

(T-connector). In the first Ethernet networks from which Fast Ethernet originated. All nodes were connected to a single cable segment with T-connectors. The first Ethernet networks used thick coaxial cable. Both ends were terminated (Fig. 4) with a device called a terminator. The configuration described is called 10Base-2 Ethernet or Thin Ethernet. There are other Ethernet bus technologies, notably 10Base5, often referred to as “thick” Ethernet, which uses a thick yellow cable.

Rice. 4. Bus network Ethernet 10Base-2


It is easy to guess that such a connection scheme has certain limitations. The biggest challenge is running a single piece of cable throughout the building. The next problem is that if a break or other damage occurs anywhere in the cable, the entire LAN fails. The first Ethernet LANs could not be very large due to cable length constraints. To provide the ability to grow the network, the concept of a repeater was introduced (Figure 5). The first repeaters were devices that connected two cable segments to form a single LAN.



Rice. 5. The first repeaters


Repeaters not only connected two pieces of cable, but also filtered electrical signals passing between the segments. The first repeaters had another advantage: if problems arose in any section of the cable (for example, a short circuit), then nodes connected to other segments could still communicate with each other. This technique is called breaking up(partitioning) and is used in modern Ethernet and Fast Ethernet networks to isolate network components that can cause problems. Although repeaters are physically connected to cable segments, they are low-level electrical devices that are invisible to the nodes. Therefore, the entire system acts as a single LAN.

Newer technology (meaning 10Base-T) introduces the concept repeater hub commonly referred to simply as a hub or repeaters. A hub is a device that each node on the network attaches to instead of being tied to a common cable with a T-piece (Figure 6).

Rice. 6. Basic repeater
The hub takes up the space allotted in the bus network for the cable and

T-shaped ties. Each node is connected to the hub with a separate cable (Fig. 4). There is a digital bus inside the hub, to which all nodes are connected through the repeater port. The internal digital bus takes up the space reserved for the coaxial cable in the bus network. The repeater ports are designed to perform the same functions as bus repeaters (Fig. 5). The difference between them is that the hub has not two, but many (up to 32) ports. In the case of Ethernet, this technology is called 10Base-T, and in the case of Fast Ethernet, 100Base-T.

Using a hub offers several advantages and simplifies cabling. Moreover, it is much easier to install a hub, since the connections go from the center to each node in the network. All telephone systems work in a similar way. In addition, an inexpensive, unshielded twisted pair cable is used to connect the nodes to the hub. In 10Base-T technology, a regular telephone cable was used for this purpose, which greatly simplified the installation of a network in old buildings. Often there was no need to lay a new cable at all, since the signals passed through the already existing telephone cable. Twisted pair can be used in Fast Ethernet too.

The use of cheap twisted pair cables really reduces the cost of the network. However, the biggest advantage of hubs is that they are somewhat “smart” devices that control every connection on the network. In addition, Ethernet and Fast Ethernet repeaters offer many new capabilities. True, while Ethernet supports two physical topologies, a bus and a star, Fast Ethernet only supports a star. Fast Ethernet cannot operate over coaxial cable.

One of the things Ethernet and Fast Ethernet have in common is that nodes and repeaters are capable of verifying the integrity of a connection. When the cable is connected correctly, an indicator (usually an LED) turns on. Many hubs, as noted earlier, automatically disconnect nodes that are causing too many network problems.

When working with Ethernet and Fast Ethernet, these terms are used interchangeably. In the case of other technologies, they often mean different things. The hub is usually located in the center, and all connections from the nodes lead to it. Hubs are often simply mechanical devices for connecting cables and providing termination. For example, telephone risers are a form of wired hub.

In Ethernet and Fast Ethernet, a repeater is a device that copies (repeats) electrical signals passing between two or more devices. Early two-port repeaters simply connected two coaxial cable segments. Fast Ethernet repeater hubs combine the functions of a hub and a repeater. For convenience, they are simply referred to as repeaters, as this is the term used in the Fast Ethernet specification. The repeater can be made as a separate unit or as a board built into a larger chassis. Sometimes it is assembled from separate devices called stackable hubs(stackable hubs).


Ensuring the safety of work in the Computing Center


In the Computing Center, digital computers (personal computers) are widely used to carry out various calculations, in this regard, ensuring the safety of work is very important. The following are the main safety precautions used during operation.

Safety engineering

when working with a personal computer


When starting to work with a personal computer, you must always remember that this is a very complex and expensive equipment that requires careful and careful handling, high self-discipline at all stages of working with a computer.

The supply voltage of a personal computer (220 V) is dangerous for human life. In this regard, the design of computer blocks, interconnecting cables provides for a sufficiently reliable isolation from conductive sections. The user practically deals with several power switches and is seemingly insured against electric shock. However, in practical work, there are unforeseen situations, and in order for them not to become dangerous for the user, it is necessary to know and strictly follow a number of safety rules. This will help not only avoid accidents and maintain health, but also guarantee the safety of the equipment.

You must be especially careful when working with a display whose cathode ray tube uses high voltage and is a source of electromagnetic radiation. Misconduct with the display and other electronic equipment can result in severe electric shock and fire. In this regard, strictly IT IS PROHIBITED:

If you smell burning, unusual sounds, or if the equipment shuts down spontaneously, turn off the computer immediately and notify the appropriate personnel.

    Working on a computer requires constant attention, precise actions and self-control. In this regard, it is impossible to work on the computer in poor lighting, high noise level, touch the screen and the rear side of the display, power wires and grounding devices, connecting cables;

    violate the procedure for turning on and off the hardware units, try to independently eliminate the detected malfunction in the operation of the equipment;

    put foreign objects on the equipment;

    work on the computer with wet clothes and wet hands.

While working on a computer NECESSARY:

    strictly observe the provisions of the operating instructions for the equipment;

    closely monitor the health of the main units and devices;

    work on the keyboard with clean hands, do not press certain keys unnecessarily;

    when working with floppy disks, protect them from shock, twisting, magnetic field or heat, do not touch the floppy disk, insert the floppy disk into the disk drive only after turning it on, making sure that the diskette is oriented correctly relative to the drive slot;

    during a break in work, turn off the computer only if the processing of the current information is completed and the contents of the RAM are written to the magnetic disks (otherwise, the information may be lost);

While working on a computer, the display's cathode-ray tube is a source of electromagnetic radiation, which, when working close to the screen, destructively affects vision, causes fatigue and reduces performance. In this regard, it is necessary to work at a distance of 60–70 cm from the screen, to maintain correct posture, without stooping or bending over.

Electrical Hazard and Shock Protection

There is a potential electrical shock hazard when setting up computer room equipment and routing network cables.

Human activity today is unthinkable without the use of electric current. A unified energy system has been created in Ukraine, the capacities of power plants are enormous, the voltages of power lines reach thousands of kilovolts.

The human body is a good conductor of electrical current. In case of accidental (emergency) inclusion of a person in an electrical circuit, the current has a damaging effect on him of varying severity, up to and including death. If we take the number of victims of electric shock as 100%, then the persons whose profession is connected with electricity is about 50%.

An analysis of the causes of accidents shows that human contact with wires and live parts more often occurs accidentally and is not caused by production necessity. In addition, electric shock occurs when voltage is incorrectly applied during repairs and inspections of electrical networks. Hence, we can conclude that the psychological factor plays a decisive role in ensuring electrical safety. With constant work with electrical installations that are energized, you should always remember about the danger of electric shock.

The most severe injuries to a person are electric shock and electric shock. With an electric shock, the body as a whole is damaged, accompanied by loss of consciousness and muscle cramps, and then the cessation of breathing and the work of the heart. With spasms of the motor muscles of the chest, suffocation can occur, and with fibrillation (irregular contraction) of the heart, death from acid starvation can occur.

The degree of electric shock to a person depends on many factors. These include: voltage and current strength, the time of its exposure, the paths along which the current passes through the human body when it is included in the circuit, the type of current (direct or alternating), and the frequency of the alternating current.

The paths of current passing through the human body can be different: from hand to other hand, from hand to leg, from leg to leg. The most dangerous is the passage of current from hand to hand, when the heart and

human lungs; the danger of serious injury is greatly increased.

The action of the current on a person as on a biological system goes through four stages:

    onset of sensation (0.5-1.5 mA AC and 5-7 mA DC) - itching. burning sensation, slight tingling sensation;

    convulsions (8-16 mA AC and 40-80 mA DC), due to which a person cannot independently free himself from contact with live parts, and due to convulsions of the vocal cords - call for help;

    clinical death (the striking characteristics of the current depend on the paths of its passage through the body and the individual data of a person) - there is no breathing and the work of the heart stops;

    biological death, which occurs 3–7 minutes after clinical death, as a result of the irreversible process of decay of cells of the cerebral cortex without oxygen supply.

To avoid electric shock, the adjustment of computer equipment and the laying of network cables were carried out with the power supply disconnected.


In the Computing Center, during all kinds of work, safety and fire safety are ensured. The following are instructions on fire safety and safety when working with computers in display classes, the main provisions of which are guided during operation.


Agreed with Approved

State Fire Supervision Vice-Rector for Frequency Response

Shiryaev V.A.

INSTRUCTIONS

by fire regime

Computing Center UGMTU


Responsible persons for the fire regime in educational institutions, laboratories are the heads of laboratories, workshops, warehouses.

In accordance with the order, these persons are responsible for the implementation of all fire safety rules and regulations at the facilities.


Responsible persons are obliged:

Clearly know the features of their facilities, the specifics of production, the rules of the fire regime and exercise daily control over their implementation.

Know the location of fire extinguishing agents, be able to use them and keep them ready for use.

To organize a fire-prevention technical minimum for workers and employees, to demand strict adherence to fire safety.

Equip the locations of heating electrical devices in accordance with fire safety rules: sheet metal, asbestos, ceramics.

It is prohibited:

    smoke in non-designated and unequipped places, contaminate work tables, cabinets, change houses, floors with fuels and lubricants, use an open flame of blowtorches;

    leave operating installations, burner devices, electric stoves, irons, soldering irons, lamps unattended;

    obstruct entrances and exits from premises, as well as access to fire extinguishing equipment.

Persons responsible for the fire regime are obliged to develop plans for the evacuation of people, material values ​​in the event of a fire, and to acquaint workers with them.

In case of fire, call the fire brigade by phone number 01, meet it. Before the arrival of the fire brigade, take all measures to extinguish the fire. Employees who violate the fire safety regime are held accountable.


Agreed Approved
Head of SOT UGMTU Vice-rector of AHCh

L.V. Konstantinova Shiryaev V.Ya.

Safety instructions

when working with computers in display classes

computing center UGMTU


When working with computers in display classes, it must be remembered that computers, displays and other electrical equipment are a source of increased danger. To avoid electric shock, it is strictly prohibited to:

    touch the screen and back of the display, power wires, grounding devices, and connecting wires.

    violate the procedure for turning on and off hardware units, independently eliminate a detected malfunction in the operation of the equipment.

    put foreign objects on the apparatus.

    work on a computer in wet clothes and with wet hands.

In the event of a burning smell, unusual sounds or spontaneous shutdown of the equipment, it is necessary to turn off the computer and notify the teacher or service personnel about the incident.


During the operation of the computer, the cathode-ray tube of the display is a source of electromagnetic radiation and negatively affects vision and performance, therefore, it is necessary to work at a distance of 6070 cm from the screen and adhere to the correct fit.


Head of Computing Center Nor S.P.


Bibliography

    Queen Laem, Russell Richard. Fast Ethernet. / Ed. K. Korolkova - Kiev: BHV, 1998 .-- 444s.

    Rudenko V.D., Makarchuk A.M., Patlanzhoglu M.A. / Under. ed. Academician of the Academy of Pedagogical Sciences of Ukraine V.M. Madzigona  Kiev: Phoenix, 1997 .-- 304s.

    Figurnov V.E. IBM PC for the user.  Moscow, 1996. - 432s.

SheetIzm List

Document no.

Signature Date






8.092201.3362.






Ministry of Education and Science of Ukraine

UKRAINIAN STATE MARITIME TECHNICAL UNIVERSITY

Department of electrical equipment of ships


REPORT

on industrial practice

at the Computing Center of UGMTU


Head from the department

associate professor ___________ Piskunov A.M.

(signature, date)

Leader from

Computing Center ___________ S.P. Nor

(signature, date)

Executor

student of group 3362 ___________ Kirichenko A.S.

(signature, date)


Nikolaev 2001


Ukrainian powers

Marine Technical University

Individual study and protocol of practice

Specialty student ___ 8.092201 ____

_________________Electricity systems and complexes _________________________

_______________________vehicles ___

Student ___________ KirichenkoAleksandr Sergeevich _____________________________

Group ___ 3362 ___ Type of practice __________ production _______________________

Practice time __________ Computing Center UGMTU ________________________

The term of the practice ________ With _25.06.01 _until 15.07.01 _________________________

Kerivnik to the University _________ Piskunov _A.M. ________________________________

Kerivnik from the enterprise _________ Nor _S.P. ______________________________________


________________________________L i n i i in i d r i z y_ ________________________________

  1. INDIVIDUAL STAFF

1.1 Witchcraft

___________familiarize yourself with the classification of computer networks; to examine _____types of network topology, substantiate their advantages and disadvantages ___________

__________________________________________________________________________________________


1.2. Development (carry out an analysis, on the basis of a description) ______ analyzeopportunities ___applicationthe networkFast Ethernetin the computer room of the Computing Center, _justify its advantages and disadvantages_____________________________________


1.3. Learn the protection of practice and technology of safety ______________________________________ familiarize yourself with the rules of technology ______safety at work and fire safety rules_____ ____ ____________________________________________________________________


“___” ____________ 2001 p. Kerivnik from the University _____________

H A R A K T E R I S T I K A

internship by a student

(Advice from the enterprise about the student's work during the period of practice: the level of training, technical skills, moral and efficiency, innovation, discipline, communication, forecast of professional activity)

___________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________


“___” ___________ 2001 p. Kerivnik to the shop, viddilu

laboratory _____________ ()

Mісce seals Kerіvnik practice від

enterprises ____________ ()


__________________________________L i n i i in i d r i z y _______________________________

  1. Practice protocol

2.1. The number of days missed for the term of practice: ___ for reasons

_____ for unimportant reasons.


2.2.Estimation of the profile from the enterprise:

____________________________________________________________________

labor discipline __________________________________________________


“___” ______________ 2001 p. _____________________

2.3.Estimation of the university curriculum:

Visiting an individual ____________________________________

____________________________________________________________________

labor discipline _________________________________________________________


“___” ______________ 2001 p. _____________________

Ministry of Education and Science of the Russian Federation

Federal Agency for Education

GOU SPO "Kirov Aviation College"

on industrial practice

230106.PP0344.001D1

Group VP-44 student P.Yu. Belyaev

Practice manager from the enterprise

D.S. Emelyanov

Practice leader from the technical school

D.M. Epifanova

  • 1. Introduction
    • 4. Network hardware
    • 4.1 Servers
    • 4.2 Workstations
  • 4.3 Switches
  • 4.4 Network adapters
  • 4.5 Modems
  • 4.6 Cabling
  • 5. Network software and network administration
  • 6. Protection of information
  • 9. Measures for the maintenance of VT facilities
  • 10. Diagnostic tools and maintenance
  • 10.1 Software and hardware diagnostics
  • 10.2 Tools and devices
  • 10.3 Troubleshooting Techniques
  • 11. Ensuring conditions for the safe operation and repair of military equipment
  • Conclusion
  • Bibliography

1. Introduction

In our age of computer technology, no company can do without the use of computers. And if there are several computers, then they, as a rule, are combined into a local area network (LAN).

A computer network is a system of interconnected computers, as well as, possibly, other devices, which are called nodes (workstations) of the network. All computers on the network are connected to each other and can exchange information.

As a result of combining computers into a network, opportunities arise: increasing the speed of transferring information messages, quickly exchanging information between users, expanding the list of services provided to users by combining significant computing power with a wide range of various software and peripheral equipment in the network. The use of distributed resources (printers, scanners, CD-ROMs, etc.), the availability of structured information and efficient search for the desired data. Networks offer tremendous benefits that cannot be achieved by using computers alone. Among them: sharing of processor resources. By dividing processor resources, it is possible to use computing power for the simultaneous processing of data by all stations in the network. Data separation. Data sharing allows you to manage databases from any workstations that need information. Shared Internet access. LAN allows you to provide access to the Internet for all its clients using only one access channel. Sharing resources. A LAN allows you to economically use expensive resources (printers, plotters, etc.) and access them from all connected workstations. Multimedia capabilities. Modern high-speed technologies make it possible to transmit audio and video information in real time, which allows video conferencing and network communication without leaving the workplace.

Nowadays, no large enterprise can do without a LAN.

The purpose of this industrial professional practice is to study the features of the operation and maintenance of computer equipment and computer networks.

2. History of creation and development prospects of the network

At the very beginning, the LEPSE enterprise purchased 200 pieces of 386 personal computers (PCs), in 1996 a decision was made to switch to PCs for data processing. From this lot 20 pcs. provided to engineering services and 20 pcs. for accounting and implementation of the production plan. The rest were installed in the shops to keep track of manufactured products and the cost of raw materials consumed. LAN at that time did not yet exist at the enterprise, information was transmitted using floppy magnetic disks (floppy disk drives) to the information center. From the same year, the enterprise began to automate information processing: marketing, sales, software. The workstations were connected to each other via a modem and data was transmitted over a telephone pair. Then all computers were connected with a thick coaxial cable. Then we switched to a thin coaxial cable. The number of computers remained the same. In 1998, a decision was made to create a single LAN, and the NETWARE 4.11 server was installed. The operating system Windows2000 ran as a system service. This server was used to access the Internet and manage the administration of the network. After that, on the basis of the PC, the installation and the plan of the future LAN already existing at the present time were carried out. Until 2004, the development and installation of a LAN was carried out. Switched nodes (CUs) were delivered in each building, where there were PCs using 100 Base FX technology, a fiber-optic cable was used to connect the CUs to each other, and a star topology was used. The workstations were connected using Fast Ethernet technology, which was provided using a Category 5e twisted pair cable. There was one server providing 2000 Mb / s to which all departments of the LEPSE enterprise with a PC were connected.

Now the LEPSE enterprise employs about 1000 workstations, and all of them are connected into a single local network.

Prospects for modernization of the enterprise network:

Currently, the network of the enterprise continues to develop. New computers are added at workplaces, as a result of which the number of requests to servers increases. Therefore, the main direction of network modernization is replacing servers with more modern ones. The first steps were taken in early 2004 when Bali replaced one of the mail servers and the TKIIP information hub. Most of the jobs at the hub stations also require modernization.

3. Description of the network topology and architecture

In 1998, the enterprise used a bus topology to build a network, i.e. all computers were connected in series one after another, using a cable system. In this case, the technology of the "Ethernet" standard was used.

Ethernet is the most widely used standard for local area networks. Ethernet is usually understood as any of the variants of this technology: Ethernet, Fast Ethernet, Gigabit Ethernet. All types of Ethernet standards use the same media separation method — CSMA / CD — Carrier Sense Multiple Access and Collision Detection.

In a narrower sense, Ethernet is a networking standard with a data transfer rate of 10 Mbps. The historic first networks of Ethernet technology were built on coaxial cable. Subsequently, other physical layer specifications for this standard have been defined. The physical specifications for Ethernet technology today include the following media:

10 Base-5 - A 0.5 "coaxial cable called" thick "coax. Has a wave impedance of 50 ohms. The maximum segment length is 500 meters without repeaters;

10 Base-2 is a 0.25 "coaxial cable called" thin "coax. Has a wave impedance of 50 ohms. The maximum segment length is 185 meters without repeaters;

10 Base-T is a Category 3 unshielded twisted pair (UTP) cable. Forms a hub-based star topology. The distance between the hub and the end node is no more than 100 meters;

10 Base-F - fiber optic cable. The topology is similar to that of the 10 Base-T standard. There are several options for this specification - FOIRL (distance up to 1000 meters), 10 Base-FL (up to 2000 meters), 10 Base-FB (up to 2000 meters).

The number 10 in these names denotes the bit rate of data transmission of these standards - 10 Mbit / s.

An important phenomenon in Ethernet networks is collision - a situation when two stations simultaneously try to transmit a data frame over a common medium. This is a consequence of the random access method adopted.

But over time, the number of computers increased, and data transmission over the bus became impossible due to the loss of speed. In this case, the enterprise decided to use the ZVEZDA network topology. In this case, there is a server to which all computers participating in the local computer network are directly connected. To build the network, “Fast Ethernet” technology was chosen and applied, and now “Gigabit Ethernet” is already in use.

Fast Ethernet: In 1995, the IEEE 802.3 committee adopted the Fast Ethernet specification as an 802.3u standard, which is not a stand-alone standard, but an addition to the existing 802.3 standard. The MAC and LLC layers in Fast Ethernet remain exactly the same as in Ethernet. The access method also remains the same - CSMA / CD. This ensured the continuity and consistency of 10 Mbps and 100 Mbps networks. All the differences between Fast Ethernet and Ethernet technology are focused on the physical layer. The more complex structure of the physical layer of the technology is caused by the fact that it uses three options for cable systems:

Fiber optic multimode cable, uses two fibers;

Coaxial cable is not included in the number of approved data transmission media of Fast Ethernet technology. Networks based on this technology always have a hierarchical tree structure based on hubs. The diameter of the network has been reduced to 200 m (for a hub-based network). The speed, in comparison with Ethernet, is increased by 10 times due to the decrease in interframe latency. The technology works in full duplex mode. The 802.3u standard established 3 different specifications for the Fast Ethernet physical layer, giving them the following names:

100Base-TX for two-pair cable on UTP category 5 unshielded twisted pair cable or STP type 1 shielded twisted pair cable. Maximum segment length is 100 m;

100Base-T4 for a four-pair cable on an unshielded twisted pair UTP category 3.4 or 5. Maximum segment length - 100 m;

100Base-FX for multimode fiber optic cable, uses two fibers. The maximum segment length is 412 m (half duplex), 2 km (full duplex).

Gigabit Ethernet: Quite soon after the introduction of Fast Ethernet products on the market, network integrators and administrators felt certain limitations when building corporate networks. In many cases, servers connected over a 100-megabit link overloaded the network backbones. There was a need for the next level of the speed hierarchy. In this regard, in June 1995, the IEEE High Speed ​​Technology Research Group was ordered to look into the possibility of developing an Ethernet standard with an even higher bit rate. The final Category 5 twisted pair standard was adopted in 1999. The transmission speed in Gigabit Ethernet is 1000 Mbps. The developers have retained a great degree of continuity with Ethernet and Fast Ethernet technologies: the same frame formats operate in half-duplex and full-duplex modes, supporting the same CSMA / CD access method on a shared medium with minimal changes. In the summer of 1998, the 802.3z standard was adopted, which defines the use of three types of cable as a physical medium: multimode fiber-optic (distance up to 500 m), single-mode fiber-optic (distance up to 5000 m) and double coaxial (twin ax), through which data is transmitted over two copper shielded conductors up to a distance of 25 meters.

A special working group 802.3ab has developed a version of Gigabit Ethernet on UTP category 5. To provide a speed of 1000 Mbps, simultaneous data transmission is used over four unshielded twisted pairs, a speed of 250 Mbps.

4 ... Network hardware

4.1 Servers

A server is a networked computer that allows multiple users to share various network resources, such as files or printers.

The enterprise uses the following types of servers:

a) file server - provides the ability to centrally store files used by a group of users.

Characteristic:

Intel 2 * Xeon 2.6 GHz processor, 533 FSB, 512 Kb L2 HT;

SCSI controller PCI 133 MHz SRCU42X, 2 * LAN 1000 BASE-T;

RAM 2Gb;

Hard disk RAID5 10 * 36Gb 15000rpm, hot-swappable.

b) server of services and electronic document management (DNS, DHCP, GroupWise)

Characteristic:

Intel 2 * Xeon 2.4 GHz processor, 533 FSB, 512 Kb L2 HT;

SRCU PCI controller 100 MHz SRCU42L, 2 * LAN 1000 BASE-T;

RAM 2Gb;

Hard disk RAID5 4 * 36Gb 15000rpm, hot swappable.

c) ERP system server - ERP system MAX + for enterprise resource planning.

The ERP system server has the following characteristics:

Intel 2 * Xeon 3.0 GHz processor, 533 FSB, 512 Kb L2 HT;

SCSI controller PCIe 133 MHz SRCU42E, 2 * LAN 1000 BASE-T;

RAM 8Gb DDR2 533 ECC;

Hard disk RAID5 10 * 72Gb 15000rpm, hot-swappable.

4.2 Workstations

Workstations are any computers that access resources stored on a server through a local network.

basically all workstations of the enterprise have the following configuration:

Intel Pentium III 1.3 GHz processor;

RAM 256 Mb;

LAN 10 / 100Mb / s;

IDE hard drive 40Gb.

Some workstations have a CD-ROM drive, sound card and speakers, HP 1200 printers.

4.3 Switches

A switch is a multiport data link device that "learns" MAC addresses and stores them in an internal lookup table. A temporary dial-up connection is created between the sender and the intended recipient of the frame, over which the frame is transmitted.

To connect computers into a network, 3Com Super Stack Switches 4900, 4924, 4400 SE and 4-port 1000BASE-SX optical modules are used for connecting trunk links.

Central distribution 3Com Super Stack Switch 4900, 4900SX:

IEEE 802.1р, 1000Base-TX standard;

Throughput capacity 23 mln. packets / s (24x port);

CSMA / CD access method;

Size 6.6 * 44 * 37 (cm), weight 6.5kg;

Environment humidity 10% ~ 90%;

3Com Super Stack 3 Switch 4400SE Network Border Switch

IEEE 802.3ad, 1000Base-SX standard;

Form a stack of up to 192 10 / 100Mbit / s ports;

Throughput 6.6 million packets / s (24 ports);

Physical media UTP category 5e;

Power supply from the network 100-240V (50-60Hz);

Size 6.6 * 44 * 41 (cm), weight 6.3kg;

Permissible ambient temperature 00C ~ 40C;

The admissible ambient humidity is 10% ~ 90%.

Adopt non-blocking Gigabit Ethernet switching at the fastest possible speed, using XRN technology can boost performance up to 48Gbps.

It also uses Layer 3 switching, support for unicast IP routing and OSPF protocols. RIP / RIPv2 and CIDR availability of UDP traffic control function. It leverages advanced security, RADIUS client support and Routed Access Control Lists to provide automated users with access to network resources. Supports 3Com Gigabit Multilayer Switching (GMS) software and provides advanced Layer 2 switching. Have an advanced network management function. The software used 3Com Network Supervisor (simplifies network administration tasks) detects devices connected to the network, displays their status in the form of a graphical diagram and their management.

4.4 Network adapters

Network adapters are designed to receive and transmit data over the network. Mainly, the department computers use D-Link 530TX 10/100 Mbit / s network cards. Supports 32bit PCI bus in Lokal Bus mode, Nway auto-sensing, complies with IEEE 802.3u / 8702.3 standard, supports Plug and Play, ACPI, Wol, and power management.

4.5 Modems

Modem is a functional device that provides modulation and demodulation of signals; a device that converts digital signals into analog form and vice versa for transmission over analog-type communication lines. Characteristics of an external ADSL modem:

Reception at a speed of 8 Mb / s and transmission up to 1 Mb / s;

RJ-11 connector for line connection;

Ethernet interface 10 / 100Mb / s with automatic cable detection;

Work in bridge and router modes, routing using a policy of supporting multiple addresses;

Compliance with G.PMT standards (G.992.1);

Service quality management (UBR / CBR / VBR);

Configuration via WEB-interface or Telnet;

Administration and SNMP;

System requirements;

PC with Ethernet 10/100 Mb / s interface;

CD or DVD drive;

Telephone line with ADSL access service from an Internet provider.

4.6 Cabling

Equally important in the design of a local area network is the choice of the cabling subsystem, since a reliable LAN provides for reliable connections. In other words, all connections in the network must be of high quality, unreliable contacts and other physical damage are unacceptable. This is so important because it is still a very time-consuming task to find an open or damaged connection in a faulty network.

The answer to the high requirements for the quality of the cabling system was structured cabling systems, which are a set of switching elements (cables, connectors, connectors, cross-over panels and cabinets), as well as a technique for their joint use, which allows you to create regular, easily expandable communication structures in computer networks. ...

Versatility;

Increased service life;

Reliability.

Review of cable equipment.

Twisted pair (UTP / STP, unshielded / shielded twisted pair) is currently the most common medium for signaling in local area networks. UTP / STP cables are used in Ethernet, Token Ring and ARCnet networks. They differ by category (depending on bandwidth) and type of conductor (flexible or solid). In a cable of the 5th category, as a rule, there are eight conductors, twisted in pairs (that is, four pairs).

All cables consist of 4 pairs (two for file transfer, the other two for voice). RJ-45 plugs and sockets are used to connect cables to equipment. There also appeared cables of category 6, with a frequency of up to 200 MHz, and category 7, with a frequency of up to 600 MHz, which are necessarily shielded.

Category 5 twisted pair structured cabling is very flexible in use. Its idea is as follows.

The structured cabling system is built in a hierarchical manner, with the main backbone and numerous branches from it. A typical hierarchical structure of a structured cabling system includes:

Horizontal subsystems (within a floor);

Vertical subsystems (inside the building);

Subsystem of the campus (within the same territory with several buildings).

The use of a structured cabling system instead of chaotically laid cables gives an enterprise many advantages:

Versatility;

Increased service life;

Reducing the cost of adding new users and changing their locations;

Possibility of easy network expansion;

Providing more efficient service;

Reliability.

The horizontal subsystem is characterized by a large number of cable branches, as it must be routed to each user outlet. Therefore, for the cable used in horizontal wiring, increased requirements are imposed on the convenience of making branches, as well as the convenience of laying it indoors. When choosing a cable, the following characteristics are taken into account: bandwidth, distance, physical security, electromagnetic interference immunity, cost.

The horizontal subsystem, that is, the storey one, can be divided into three parts:

The subscriber part consists of RJ-45 sockets connected by a patch cord;

The stationary part is a patch cord that connects the sockets to the cabinet with network equipment;

The patching part is the patch cord between the switch and the sockets on the patch panel.

The vertical subsystem, the cable that connects the floors of the building, must transmit data over long distances and at a faster speed than the horizontal subsystem cable. It consists of longer cable lengths, the number of branches is much less than in the horizontal subsystem.

Optical fiber, as its name implies, transmits signals using pulses of light radiation. Semiconductor lasers and LEDs are used as light sources. Fiber optic is classified into single mode and multimode.

Singlemode fiber is very thin, with a diameter of about 10 microns. Due to this, the light pulse passing through the fiber is less often reflected from its inner surface, which provides less attenuation. Consequently, single-mode fiber provides longer range without the use of repeaters. The theoretical bandwidth of single-mode fiber is 10 Gbps. Its main disadvantages are high cost and high complexity of installation. Single-mode fiber is used primarily in telephony.

Multimode fiber has a larger diameter of 50 or 62.5 microns. This type of fiber is most commonly used in computer networks. The greater attenuation in multimode fiber is explained by the higher dispersion of light in it, due to which its throughput is significantly lower - theoretically it is 2.5 Gbit / s.

All active switching equipment is located in special cabinets made of transparent plastic, which allows you to clearly see all the equipment. Patch panels, converters, switches, hubs, etc. are used. In departments, wires are attached to the walls using special boxes or to the ceiling under false ceilings. Everything is organized simply, conveniently and neatly. To connect an optical cable with active equipment, special connectors are used.

5 ... Network software and network administration

The wide variety of types of computers used in computer networks entails a variety of operating systems: for workstations, for department-level network servers, and enterprise-level servers in general. They may have different requirements for performance and functionality, it is desirable that they have the property of compatibility, which would allow for the interoperability of different operating systems.

Network operating systems can be divided into two groups: department-wide and enterprise-wide. OS for departments or workgroups provide a set of network services, including the sharing of files, applications, and printers. They must also provide fault tolerance properties, for example, work with RAID arrays, support cluster architectures. Departmental network operating systems are generally easier to install and manage than enterprise network operating systems. They are less functional, less secure, and have weaker interoperability with other types of networks, as well as poorer performance.

An enterprise-wide network operating system, first of all, must have the basic properties of any corporate product, including:

- scalability, that is, the ability to work equally well in a wide range of different quantitative characteristics of the network;

- interoperability with other products, that is, the ability to operate in a complex heterogeneous inter-network environment in a plug-and-play mode.

The criteria for choosing an enterprise-wide operating system are the following characteristics:

- organic support for a multi-server network, high efficiency of file operations;

- the possibility of effective integration with other operating systems, the presence of a centralized scalable help desk, good development prospects;

- efficient work of remote users, various services: file service, print service, data security and fault tolerance, data archiving, messaging service, various databases and others;

- a variety of software and hardware host platforms: IBM SNA, DEC NSA, UNIX;

- various transport protocols: TCP / IP, IPX / SPX, NetBIOS, Appletalk;

- Support for a variety of operating systems for end users: DOS, UNIX, OS / 2, Mac;

- support for network equipment standards Ethernet, Token Ring, FDDI, ARCnet;

- Availability of popular application interfaces and RPC remote procedure call mechanisms;

- the ability to interact with the network control and management system, support for SNMP network management standards.

Of course, none of the existing network operating systems fully meets the listed requirements, so the choice of a network operating system, as a rule, is carried out taking into account the production situation and experience.

The server operating system allows you to simplify and make accessible and understandable networking. Depending on the computers in the departments, they may have different network operating systems. A network operating system is required to control the flow of messages between workstations and servers. It can allow any workstation to work with a shared network drive or printer that is not physically connected to that workstation. Most servers run Microsoft's operating system, Windows 2000 Server. This choice is due to the fact that most of the software products used in the enterprise are developed for the Windows platform, so this OS becomes the optimal choice for a sufficiently large enterprise network. Its main advantages are: full compatibility with workstations and their software; most workstations work under the operating system of the Windows family, a more flexible security policy in comparison with other server systems (in relation to the operating systems of the Windows family).

The initial installation of Windows 2000 Server is almost identical to the installation of Windows 2000 Pro. The difference is only in two things: the number of connection licenses is requested, as well as the choice of components for installation, among which we can especially say about the Terminal Service, which allows several users to work on the server at the same time, through an interface called the Terminal Services Client (MSTSC - Microsoft Terminal Services Client).

After the initial server installation, the operating system is similar to Windows 2000 Professional, with only slightly more configuration and security options.

A domain controller must be installed to acquire full network administration and connectivity for workers to the server. A dialog box will appear where you can select the type of domain to install. To install an independent server, you need to select the first parameters. There it is proposed to set the DNS name of the domain to be installed in the format (<имя вашего домена>.<полное имя родительского домена>), NetBios-domain name (this name will be displayed when logging in, this name is not recommended to be changed), administrator password (used when booting the system in the directory service recovery mode). Next, you will be prompted to install a DNS server on your computer, or the installation of a domain controller will begin immediately. After completing all operations, you will be prompted to restart your computer.

After logging in, the set of server settings will be significantly expanded. The administration interface is unified through the MMC utility - Microsoft Management Console. Basic snap-ins: Active Directory - Users and Computers - used to manage groups, users, departments and group policy. A group policy can only be assigned to an organizational unit and is applied to those users who are directly placed in an organizational unit or their organizational unit has a parent and inherits the policy from it. To create a group policy item, you need to call the properties of the unit and select the Group Policy tab.

Computer Management - used for general system management:

- creating shared network resources (locally or for another station), you need to select the Connect to another computer command from the context menu of the console root, where you specify its name or select from the list of registered in this domain);

When creating network resources, it is recommended to create them in the NTFS file system - this method provides more options for configuring the security of access to the allocated resource. In general, it is recommended to give full access to the resource for everyone (Sharing tab of the folder or disk properties window), and then very flexibly configure access for each user or group using NTFS (Security tab).

Local Security Policy, Domain Security Policy, Domain Controller Security Policy (local security policy, domain security policy, domain controller security policy) - are used to set the security parameters of the system as a whole (which users have the right to log on to the computer, shutdown, access from the network etc.). The snap-ins differ only in scope: the first affects only the computer on which it is installed (does not affect the domain controller), the second — to all computers included in this domain, the third — only to the computer of the domain controller.

- DNS - used to manage DNS accounts on the server;

- Terminal Services Configuration - setting the parameters of the working environment for users connecting to the server via MSTSC;

- Active Directory - Trusts and Relationships - used to establish trust relationships between different domains;

- Services - used to manage services.

For file servers, the OS is Novell NetWare 4.1. Its main characteristics:

A specialized operating system optimized to function as a file server and print server. Limited resources for use as an application server: No virtual memory or preemptive multitasking, and no symmetric multiprocessing support until very recently. There are no APIs for the main operating environments used for application development - UNIX, Windows, OS / 2 Server platforms: Intel-based computers, IBM RS / 6000 workstations running the AIX operating system using NetWare for UNIX. Delivered with a shell for clients: DOS, Macintosh, OS / 2, UNIX, Windows (A shell for Windows NT is currently under development by Novell, although Microsoft has already implemented the NetWare client on Windows NT). Peer-to-peer communication is possible using PersonalWare OS. Has NetWare Directory Services (NDS), which is centrally managed, distributed, fully replicated, auto-syncing, and has excellent scalability.

Comes with a powerful Message Handling Service (MHS), fully integrated (since version 4.1) with the help service. Supported network protocols: TCP / IP, IPX / SPX, NetBIOS, Appletalk Remote user support: ISDN, dial-up lines, frame relay, X.25 via NetWare Connect (optional). Security: Authentication using public keys RSA encryption method; certified to level C2. Good communication server. Built-in disk compression function.

6. Protection of information

One of the main tasks at the JSC Lepse enterprise is information protection.

Information protection means include:

- passwords installed on computers;

- anti-virus programs;

- power protection on servers and some workstations.

The first department has been created at the enterprise, which is responsible for the archive of classified information. Before hiring a new employee for work or practice (who will directly work with a computer and data), a person must be familiar with the information protection instructions. He will also need to get a certificate from the first department.

Information stored directly on computers is protected by delimiting access for administrators and guests, each of which has a separate username and password. User groups are created with certain rights and authorities (for example: user) access to network resources. That is, for an employee with a certain position, certain access rights and the amount of information related exclusively to his activities are provided. Thus, the more rights the user has, the more information the user has. The administrator can perform all actions: enter new data into the database, delete records from the database, make various settings of systems and programs. And ordinary users can only perform certain actions. For example, viewing and searching for the necessary information.

Virus protection can be ensured using common anti-virus programs such as Kaspersky Anti-Virus, Dr.Web and McAfee others. The enterprise mainly uses McAfee.

In order to protect information from viruses and from its leakage, the work on the Internet takes place on separate computers that are not connected to the network.

7. Power protection devices

To protect servers, as well as a number of simple workstations from power surges, the enterprise uses uninterruptible power supplies. Uninterruptible Power Supply (UPS) provide all levels of protection for your computer's electrical power. They are also the most expensive of all power protection devices. While backup power supplies (BPS) only supply power to the computer in the event of an AC power outage, uninterruptible power supplies (UPS) provide continuous modulated DC power from the battery to the computer. AC power from the mains is not supplied directly to the computer's power supply, it only constantly charges the battery of the uninterruptible power supply. As a result, the computer is isolated from any anomalies in the AC line voltage. Like a backup power supply unit, an uninterruptible power supply unit can ensure the operation of the computer only for a certain period of time (depending on the load), which allows the user to save the results of his work and shut down the operating system in a regular way. The uninterruptible power supply supplies power to the computer continuously, so when using it, there is no problem with the duration of the switch to battery mode. High quality uninterruptible power supplies provide uninterruptible power to your computer, as well as sag correction and protection from AC power surges and peaks.

The enterprise uses APC Smart-UPS 5000VA 230V uninterruptible power supplies.

Technical characteristics of APC Smart-UPS 5000VA 230V uninterruptible power supplies are shown in Table 1.

Table 1 - technical characteristics of APC Smart-UPS 5000VA 230V uninterruptible power supplies.

Allowable input "voltage

0 - 325 VAC

Output voltage

196 - 253 VAC

Input protection

Circuit breaker (with reset)

Frequency limits (mains operation)

Switching time

2 ms (typical), 4 ms (maximum)

5000 VA / 3750 W

Output voltage when running on battery

220.225.230 or 240 VAC

Battery frequency

50 or 60 Til ± 0.1 Hz: if Synchronized with mains supply during partial disconnection

Voltage waveform for battery operation

Low distortion sine wave

Overload protection (when running on battery)

Overcurrent and short-circuit protection, lockable shutdown at

overload

Noise filter

Suppression of electromagnetic and radio frequency interference during normal and joint operation, 100 kHz - 10 MHz

Battery type

Splash-proof, sealed, lead-acid, maintenance-free battery

Typical battery life

3 to 6 years old. depending on the number of discharge cycles and ambient temperature

Typical charging time

About 2 to 5 hours from the moment of full discharge

Working temperature

0 to 40 ° C (+ 32 to + 104 ° F)

Storage temperature

-15 to + 45 ° C (+ 5 to + 113 ° F)

Operating and storage relative humidity

0 - 95%. no condensation

Terrain height during operation

0 to +3000 m

Storage Height

0 to +15000 m

Electromagnetic compatibility

Electromagnetic Interference (EMI)

EN55022 class A

Security approval

GS. VDE certified according to EN50091-1-1 and 60950 standards

8. Feasibility study of the network

The main factor in the feasibility study of a network is the indicator of the total cost of creating a LAN. The indicator total costs consists of the following parts:

LAN development costs;

Equipment and material costs;

Marketing research costs.

The total cost of creating a LAN is determined by the formula (1):

The total cost of creating a LAN;

LAN development costs;

Taxes included on the cost of creating a LAN;

Costs for equipment and materials (calculated when designing a LAN);

The costs of marketing research can be taken in the amount of 10-20% of.

The amount of taxes is calculated using the formula (2):

General payroll for workers involved in the creation of the LAN;

The general tax rate (in addition to transport), which includes the costs of creating a LAN, can be taken at 10%.

The general wage fund for workers involved in the creation of a LAN is determined by the formula (3):

The time of participation of a specialist of a certain qualification in the creation of a LAN (data are taken from Table 3);

The number of specialists of a certain qualification;

The monthly salary of an employee in accordance with his category or the tariff category of the UTS of the budgetary sphere;

Duration of the shift (8 hours);

Average number of working days in a month (21 days);

The bonus provided for employees is 20-25% of;

Payments according to the regional coefficient (Kirov 15% of (+ P)).

The costs of developing a LAN are calculated using the formula (4):

Project and documentation development costs;

Installation and installation costs;

Commissioning costs;

Other costs associated with the creation of a LAN (study of the assignment, literature, patents, economic calculations, etc.);

The costs of developing a project and documentation are determined by the formula (5):

The cost of paying salaries to workers involved in the development of the LAN;

Bonus to employees participating in the development of the project and documentation;

District coefficient for workers involved in the development of the project and documentation (15%);

General rate of deductions for social needs (26%);

The wage fund for workers involved in the development of the project and documentation (includes a salary bonus and payments according to the regional coefficient);

Set-up costs of the organization that is creating the LAN. They can be accepted in the amount of 100-200% of.

Other costs of creating a LAN are 15-20% of the costs, and are calculated by the formula (7):

The costs of materials and equipment are calculated during the design of the LAN, and their price is taken from the design of the LAN.

The total cost estimate is presented in table 2.

Table 2.

Top related articles