Hardware and software setup

Network field practice report. Report on practice in the Smolensk computer company

Computer networks. Classification of computer networks. ……………4

Fast Ethernet network. …………………………………………………………..5

network topology. ……………………………………………………...….eight

Ensuring the safety of work in the Computing Center. ……….12

Computer networks. Classification of computer networks.

According to the principles of construction, computer networks are divided into local and remote (Fig. 1).

Local networks are created, as a rule, in one organization or in one room.

The simplest variant of such a network is the connection of computers through parallel or serial ports. In this case, there is no need for any additional equipment. There should be only connecting conductors. Such a connection between computers is configured within the same room. It is used to transfer data from one computer to another. In this case, you can transfer data without the help of floppy disks. Any modern operating system shell has software tools that provide such data transfer.

In local peer-to-peer computer networks, computers are connected to the network through special network adapters, and the network operation is supported by the network operating system. Examples of such operating systems are: Novell Personal Net Ware, Net Ware Line, Windows for Workgroups.

All computers and their operating systems in local peer-to-peer computer networks must be of the same type. Users of this network can transfer data to each other, use shared printers, magnetic and optical disks, etc.

In a local multi-rank computer network, one more powerful computer is used, which is called a server, and other less powerful computers are called workstations. Servers use special system software that is different from the system software of workstations.

Remote computer networks are divided into regional and international. Regional ones are created in certain regions, for example, a state, and international ones provide a connection between your computer and another computer on the World Wide Web. An example of such networks is Relcom (for the CIS countries) and Internet (for the whole world). In principle, it is possible to access the Internet from regional computer networks.

The connection of computers in regional networks is provided by conventional telephone networks or networks specially dedicated for this purpose through special devices called modems. The modem converts binary code signals to language range audio signals and vice versa.

Computers of a certain area (city) are connected via modems and communication lines to a more powerful computer, which is called a provider. More than 100 providers are currently operating in Ukraine.

Each computer user that is connected to the network is assigned details (address). Providers, using requisites, ensure the connection of the corresponding computers of users.

Communication between computers on different continents is carried out by satellite communication channels.

A report according to your requirements on the topic "Computer networks. Classification of computer networks" can be ordered from the Diplomtime company.

Download full version

Similar Documents

    Classification of local networks by topology. Ethernet network architecture. Functional diagram of a local area network. Network equipment configuration: number of servers, hubs, network printers. Typical domain usage models.

    thesis, added 05/08/2011

    The principle of activity of LLC "MAGMA Computer". Features of the subject area. The purpose of creating a computer network. Network configuration development. Choice of network components. List of functions of network users. Network information security planning.

    term paper, added 09/17/2010

    The choice of protocol and technology for building a local area network based on the bandwidth - 100 Mbps. Choice of network equipment. Drawing up a network plan to scale. Configuration of servers and workstations. Calculation of the cost of ownership of the network.

    term paper, added 01/28/2011

    Connection of workstations to a local computer network according to the IEEE 802.3 10/100 BASET standard. Calculation of the twisted pair length spent on the implementation of the network and the number of RJ-45 connectors. Construction of the topology of the local computer network of the institution.

    term paper, added 04/14/2016

    Selection of the configuration of workstations, server and software for connection to the local computer network. Organization of a local network, its basis on the "star" topology. Antivirus protection, browsers, archivers. Features of network settings.

    term paper, added 07/11/2015

    Enterprise equipment configuration. Tasks solved by a computer network. Analysis of information flows. Data transfer protocol. Selecting a network operating system. Address space allocation. Protection of stations in the central office.

    thesis, added 03/20/2017

    Selection of passive network equipment. Substantiation of the need to modernize the local computer network of the enterprise. Choice of operating system for workstations and server. Comparative characteristics of D-Link switches. Local network diagrams.

    term paper, added 10/10/2015

    Setting up the telecommunications equipment of the local area network. Choice of network architecture. Server configuration services. Cable calculation, selection of equipment and software. Description of the physical and logical schemes of the computer network.

    term paper, added 12/22/2014

    Choice of local area network among peer-to-peer and server-based networks. The concept of network topology and basic topologies (star, common bus, ring). Network architectures and protocols, information security, anti-virus systems, network equipment.

    term paper, added 07/15/2012

    An integrated approach to the organization of IT operations. Simplify IT infrastructure and reduce costs. Improve application performance. IBM server configurations, their characteristics. Additional equipment for the server, software.

INTRODUCTION Objectives of practice: 1. Consolidation of theoretical knowledge obtained in the study of disciplines: the organization of computers and systems, system software, databases, computer networks and telecommunications, peripheral office equipment; 2. Familiarization with production processes, including the use of computers and information technologies; 3. Studying the methods of formation, processing, accumulation and use of information flows in the production process; 4. Acquisition of skills in the use of autonomous and complex computing systems; 5. Analysis of achievements and shortcomings in the activities of the organization. Topic of practice: 1. Studying the principles of building and functioning of a local area network in a particular organization. As a place for passing production and technological practice, I chose the organization "Snegovik Plus" LLC. The internship period is four weeks, from June 15 to July 13, 2004. Structure of the enterprise: Director Masov Evgeniy Nikolaevich. There are 20 people in his subordination: an accountant, loaders, drivers, technicians, sellers. MAIN PART As a result of passing the production and technological practice, the student must know: General principles of construction and architecture of computers; Principles, methods and methods of integration of hardware and software in the creation of computing systems, complexes and networks; Models, methods and forms of organizing the process of developing a software product, a technical product; The main features of database management systems and their use. In addition, he must learn to: 1. Use technical and reference literature, sets of standards for the development of a software product, a technical product; 2. Use the knowledge and skills acquired during the training process for the competent and technically sound development of a software product, a technical product; 3. Design a software product, a technical product; 4. Develop programs of modular structure; 5. Apply methods and means of testing and testing a software product, a technical product; 6. Use debugging tools; LLC "Snegovik plus" Carries out the implementation of wholesale products in Ulyanovsk. I did an internship in the technical department under the guidance of a programmer Vorlamov N.F. Database management on deliveries and the quantity of goods in warehouses is carried out using computers with the Windows 95 or Windows 98 operating system. In order to save the time of transferring information from one computer to another, the Director of this company decided to make a local area network in his organization. The technical department was tasked with laying a network to every computer in the firm. The technical department has started the task. First, we had to project on the spot what kind of network we should use the Local Area Network with a central Server. See Appendix 1 The simplest variant of such a network is the connection of computers through parallel or serial ports. In this case, there is no need for any additional equipment. There should be only connecting conductors. Such communication between computers is configured within one or more rooms. It is used to transfer data from one computer to another. In this case, you can transfer data without the help of floppy disks. Any modern operating system shell has software tools that provide such data transfer. In local peer-to-peer computer networks, computers are connected to the network through special network adapters, and the network operation is supported by the network operating system. Examples of such operating systems are: Novell Personal Net Ware, Net Ware Line, Windows for Workgroups. All computers and their operating systems in local peer-to-peer computer networks must be of the same type. Users of this network can transfer data to each other, use shared printers, magnetic and optical disks, etc. In a local multi-rank computer network, one more powerful computer is used, which is called a server, and other less powerful computers are called workstations. Servers use special system software that is different from the system software of workstations. main parts of the network. For our network, we used twisted pair cable or 10BaseT Twisted Pair coaxial cable. Twisted-pair connectors Twisted-pair networks include 10BaseT, 100BaseTX, 100BaseT4, and very likely the adoption of the 1000BaseT standard. In the network cards of computers, in hubs and on the walls, there are sockets (jack), plugs (plug) are stuck into them. Twisted Pair Connectors Eight-pin Modular Connector (Plug) Common name "RJ-45" ​​The "RJ-45" ​​plug is similar to the plug from imported phones, only slightly larger and has eight pins. 1 - contacts 8 pcs. 2 - connector retainer 3 - wire retainerView from the side of the contacts Pin 1 2 3 4 5 6 7 Pin 8View from the cable sideFront view ) wires and stick into the core (1). Plugs are divided into shielded and unshielded, with and without insert, for round and flat cables, for solid and stranded cables, with two and three prongs. It is useful to install a protective cap on the cable together with the plug. Plug with insert The cable wires, untwisted and arranged in accordance with the method you have chosen, are inserted into the insert until it stops, the excess is cut off, then the resulting design is inserted into the plug. The fork is crimped. With this method of installation, the length of the unwinding is minimal, installation is easier and faster than using a conventional plug without an insert. This fork is a little more expensive than a regular one. Connecting dimensions (in mm) Connectors for 10Base-T Eight-pin modular connector. Socket (jack) and socket (outlet) Jacks are installed in network cards, hubs, transceivers and other devices. The connector itself is a row (8 pcs.) of springy contacts and a recess for the plug lock. If you look at the socket from the side of the contacts, when they are located below, then the countdown goes from right to left. A socket is a socket (connector) of a connector with some kind of cable attachment device and a housing for ease of installation. It also includes a fork. Sockets, as well as cables, come in different categories. On the body of the outlet is usually written what category it belongs to. When building 10Base-2 networks, you must use category 3 (Cat.3) or better 5 (Cat.5) sockets. And for 100Base-TX networks, only Cat.5 must be used. Sockets of the 5th category are also divided according to the method of installing the cable in the socket itself. There is a fairly large number of solutions, both supported by any one particular company, and quite generally accepted - "type 110", "type KRONE". It should be noted that KRONE is also such a company. In general, a huge number of different types of sockets are produced, but for the home you have to use the cheapest - external ones. A conventional socket is a small plastic box that comes with a screw and a double-sided sticker for wall mounting. If the wall covering allows, it is easier to use the sticker, if not, you will have to drill the wall and screw the socket with a screw. On one side of the case there is a connector for turning on the RJ-45 plug; By the way, there are sockets that have two or more connectors in the case. To remove the cover from the box and get to the inside of the socket, you need to show a lot of patience and resourcefulness. The lid is held on by internal latches, which are usually not marked on the outside. In my opinion, manufacturers compete with each other and with the user which outlet is harder to open. It is necessary to detect these latches, then there are two possibilities: the latches open either inward (which is less common) or outward. The latches that open inward must be pressed, and those that open outward must be hooked with something. It is useful when buying to ask to be shown how the outlet opens. After removing the cover, depending on what type of outlet you have, you will find wire fasteners and a connector. Network cards are used to connect the network to the computer. PCI network card Combined network card (BNC+RJ45), PCI bus Simultaneous use of two connectors is not allowed. 1 - Connector for twisted pair (RJ-45) 2 - Connector for coaxial wire (BNC) 3 - PCI data bus 4 - Socket for BootROM chip 5 - Board controller chip (Chip or Chipset) PCI connector There is also a PCI data bus (connectors white). Network cards designed for PCI must be inserted into the PCI slot. On the computer Server setup. Servers Server Functions Windows95(Windows98) Enter "Control Panel" (Start->Settings->Control Panel)Select "Network"In the "Configuration" tab, click the "Add" button. "Select Component Type" menu Select "Service" and click Add. Window "Select: Network Service". Set "Manufacturers" to "Microsoft" and "Network Services" to "File and Printer Sharing for Microsoft Networks". Please note that at the beginning this inscription is not fully visible and you need to scroll it to the left so as not to make a mistake. Click "OK". If you also want to add access to your computer via http (or www), then again go to the "Select: Network Service" window and select "Microsoft", "Personal Web Server". Click OK. Network window. Make sure the distribution is available. Click "OK". A window will appear showing the process of copying files. Finally, you will be prompted to reboot the system by clicking "Yes". After rebooting, go online, and select the icon (icon) "My Computer". In the window that appears, right-click on the drive that you want to make available on the network. If you want to make available not the entire disk, but some of its directory (directory), then double-click on this disk with the left button, right-click on the directory you need. In the menu that appears, select the access item. The "Properties: .. ." In which it is indicated that this resource is local. Select the "Shared resource" item, the drive letter or directory name will become the network name. You can change this however you like, subject to some restrictions on the characters used. I usually leave it as is so I don't get confused later. Here you can also change the type of access and restrict all this with passwords. Click "OK" In a second, your resource will be available over the network. DIARY OF PRACTICE June 15 - Acquaintance with the Programmer, inspection of the place of internship; June 16 - Studying the rules of the enterprise's internal regulations; June 17 - I selected literature on the topic of the assignment, studied software (Novell Personal Net Ware, Net Ware Line, Windows for Workgroups.); June 18 - Studying software; June 21 - Studying software; June 22 - Inspection of the object; June 23 - Network design; June 24 - Purchase of material and tools; June 25 - Preparation of the object for work; June 28 - Preparation of the object for work; June 29 - Laying the network; June 30 - Laying the network; July 1 - Checking the network's ability to work (Break) ; July 2 - Installation of equipment and connection of devices; July 5 - Installation of equipment and connection of devices; July 6 - Installation of the Operating System, Drivers for Computers; July 7 - Installation of the Operating System, Drivers for Computers; July 8 - System setup; July 9 - Setting up the main server; July 12 - System and network testing; July 13 - Writing a practice diary; CONCLUSIONS: Being at this enterprise I: 1. Complied with the rules of labor protection and safety; 2. Complied with the rules established for employees of the enterprise, including those on labor regulations, fire safety, confidentiality regime, responsibility for the safety of property; 3. Studied the current standards, specifications, job responsibilities, regulations and instructions for the operation of VT; 4. Studied the rules for the operation and maintenance of BT equipment, research facilities available in the unit; 5. Mastered individual computer programs used in the professional field (Novell Personal Net Ware, Net Ware Line, Windows for Workgroups); 6. Mastered the work with periodical, abstract and reference information publications on informatics and computer science; Carried out the tasks provided by the program of practice. one



Department ____________________________________________________________

name of the department providing practice

APPROVE:

Head department ___________________________

"_____" _______________________ 20__

EXERCISE

On production practice

to the student(s) of the group ______ ____________________________________

Full name. student(s)

Specialty (direction)

Terms of practice from _____20__. to _______ 20___

____________________________________________________________________

generalized task statement

Job Schedule


Name of the tasks (activities) that make up the task

Task completion date (activities)

Signature of the head of practice from the organization

1

2

3

Theoretical part

Practical part

Protection of the practice report

Head of practice from the university

_________________ ___________________

signature Full name, position

Justification of the need for a corporate network 4

1.1 The value of information, information technology 4

1.2 Inconvenience in the absence of a LAN 4

1.3 Tasks solved by the presence of a LAN 5

Description of the organization's corporate network 6

1.4 Network topology 6

1.5 Network model 7

1.6 Protocol 9

Hardware and software 10

1.7 Hardware of the server and work computers 10

1.8 Network equipment 12

1.9 Network cabling 13

1.10 Software 14

1.11 Ensuring information security 17

Conclusion 18

List of sources used 19

Introduction

Today, computerization in the workplace is not uncommon. The presence of only computers in the office with a large information flow and the amount of work with documents slows down the work process of employees and creates inconvenience. The success of almost any enterprise, organization is connected or depends on the availability and well-established system of informatization. Such systems are local area computer systems (LANs), which are now often referred to as corporate networks.

Creating a corporate network allows you to:

– organize high-speed data exchange between employees;

- reduce paperwork within the organization;

– increase labor productivity;

– reduce the time for processing information.

There is no longer a need for removable storage media for data exchange, there is no need to print documents on paper that need to be familiarized with several users.

A network printer, modem, scanner can be installed on the network, the network server is used as an application server.

In addition, such networks are networks of a closed type, access to them is allowed only to a certain circle of users, which ensures the protection of information. All these features cannot be implemented using only operating systems (OS) and application programs. Therefore, most modern enterprises use LANs.
^

Justification of the need for a corporate network

1.1 The value of information, information technology


The editorial office of the newspaper "Work in the City" is preparing (writing materials, accepting ads, advertising design, layout) newspapers for printing in a printing house. That is, the activity of the organization is associated with the use and generation of a large amount of information. The slightest violation during its storage and processing will affect the decrease in the efficiency of the editorial office as a whole. Information is a kind of subject of labor, and a well-organized information resource management process allows an enterprise to effectively conduct its activities and solve tasks with a lower degree of risk. The use of a local computer network allows you to get rid of paper workflow, increases productivity, and reduces the time for processing information.

With the introduction of the network, personalization of computing tools took place, automated workstations were organized, which made it possible to effectively solve the corresponding tasks.
^

1.2 Inconvenience in the absence of a LAN


The lack of a network would complicate the work of employees, cause inconvenience, entail costs:

- the transfer of information from one computer to another would be carried out using removable memory media, it would take time;

– access to the global network was made only from a computer with a modem;

- not all computers are equipped with peripheral devices (printers) (to use such a device, you need a removable storage medium, the computer to which the device is connected must be released for a while);

- the cost of acquiring various devices for each computer (hard drive, printer, CD-ROM, modem) and expensive software.
^

1.3 Tasks solved by the presence of a LAN


LAN ---- a set of hardware and algorithms that provide connection of computers and peripheral devices located at a short distance (one enterprise, office), and allow you to quickly exchange data, share information resources, peripheral devices.

Features provided to LAN users:

- saving and archiving your work on the server so as not to use valuable space on your PC hard drive;

– easy access to applications on the server;

- collaborative work with documents;

– simplification of document flow (the ability to view, correct and comment on documents without leaving the workplace, without organizing meetings and meetings that take a lot of time);

– facilitating the sharing of expensive resources across organizations such as printers, CD-ROM drives, hard drives and applications (eg word processors or database software).

^

Description of the organization's corporate network

1.4 Network topology


The topology of a computer network is a way of connecting its individual components (computers, servers, printers, etc.).

The editorial LAN is built according to the “star” topology based on the server: all computers are connected to the central component using cable segments, information between network clients is transmitted through a single central node, the server acts as the central node. At the same time, two printers installed in the edition are also connected to the server and are network printers.

Editorial LAN Diagram (Star Topology Type)

Zvezda arose at the dawn of computing, when computers were connected to a central, main computer. The advantages of this topology are as follows:

- high network performance, since the overall network performance depends only on the performance of the central node - the server;

– internal calculations of clients do not affect the speed of the server processor;

– there is a single person responsible for the administration of network resources;

– provides the ability to restrict and control access to network resources;

– no collision of transmitted data, since data between the workstation and the server is transmitted via a separate channel without affecting other computers.

Disadvantages of star topology:

- the reliability of the entire network is determined by the reliability of the central node, if the central computer fails, then the operation of the entire network will stop;

– cabling costs are high, especially when the central node is geographically located far from the center of the topology; when expanding computer networks, previously made cable connections cannot be used: a separate cable must be laid from the center of the network to a new workplace.

The main criterion for choosing this topology was the fact that if only one computer (or the cable connecting it to the server) fails, then only this computer will not be able to transmit or receive data over the network, this will not affect the rest of the computers on the network.
^

1.5 Network model


The type of LAN under consideration is the client-server type, there is one host computer - the server. Nine computers and two network printers are connected to the server. The main tasks of the server:

– storage of user data;

– storage of accounting databases, archives, etc.;

– storage of service databases and programs of the department;

– storage of home folders of users.

The server is designed to provide access to multiple files and printers while providing high performance and security. Administration and control of access to data is carried out centrally. Resources are also centrally located, which makes it easier to find and maintain them.

Diagram of a client-server network model

The advantages of such a model:

– high network speed;

- the presence of a single information base;

- the presence of a unified security system.

Since all important information is located centrally, that is, concentrated on one server, it is easy to ensure its regular backup. Therefore, in case of damage to the main data storage area, information will not be lost - it is easy to use a duplicate copy.

This model also has disadvantages. The main one is that the cost of creating and maintaining a client-server network is much higher due to the need to purchase a special server.

The decisive argument in choosing a server-based network was the high level of data protection. In such networks, one administrator can deal with security issues: he forms a security policy and applies it to each network user.

1.6 Protocol

A protocol is a set of rules and technical procedures that govern communication between computers on a network.

The process of transferring data over the network is divided into several steps. At the same time, the order in which these steps are performed is strictly defined. The task of the protocols is to define such steps and control their implementation. The editorial network uses the Transmission Control Protocol/Internet Protocol – TCP/IP protocol.

TCP/IP is an industry standard set of protocols that provide communication in a heterogeneous environment, providing compatibility between different types of computers. Compatibility is the main advantage of TCP/IP, most LANs support it. TCP/IP also provides access to Internet resources, as well as a routable protocol for enterprise networks. Since TCP/IP supports routing, it is commonly used as an internet protocol.

TCP / IP has two main drawbacks: size and insufficient speed. But for the editorial network is quite suitable.
^

Hardware and software

1.7Hardware of the server and working computers


There are two parameters that distinguish the server from ordinary computers. The first is a very high performance (this also applies to efficient exchange with peripheral devices), a fairly powerful disk subsystem (mainly with a SCSI interface); the second is increased reliability (the server, as a rule, works around the clock).

Server performance is often measured in transactions. A transaction is understood as a set of three sequential actions: reading data, processing data and writing data. With regard to, for example, a file server, a transaction can be considered the process of changing a record on the server, when a workstation modifies a file stored on the server.

Of great interest is the maximum amount of RAM that can be used on a given server, the possibility of installing a more powerful processor, as well as a second processor (if you plan to use an operating system that supports a dual-processor configuration).

An important question is also what configuration of the disk subsystem can be used on this server, first of all, what is the volume of disks, their maximum number.

An important role is played by the possibility of expanding the system and the ease of its modernization, since this is what allows us to provide the required performance not only at the current time, but also in the future. An important circumstance in the operation of the server is its high-quality and uninterrupted power supply.

In our case, the server is implemented on a normal, standard computer that has a configuration with fairly good characteristics.

To provide the server, an Intel processor based on Core 2 Duo dual-core technologies was chosen, which has high performance, reliability, good power consumption and temperature performance.

For workstation hardware, the advantage was given to processors from AMD with an average performance value and a low price.

The server motherboard is ABIT P-35 on socket 775. It is optimal in terms of price-performance, has good bandwidth, dual-channel architecture for RAM, and is provided with a built-in network card with a bandwidth of up to 1Gb / s. This board supports many modern processors from INTEL, which will allow, if necessary, to increase system performance by replacing the processor. There are also plenty of slots for system expansion.

Server Motherboard - ABIT IP-35

RAM for the server is implemented on two sets of OCZ Gold Series (4 bars of 512 MB each).

When choosing storage devices, special attention is paid to its reliability, this is especially true for server equipment. When designing the network, the editors took into account the organization of a large database, so they decided to use a RAID-array of the RAID-5 level. The data blocks and checksums in this array are cyclically written to all disks. This is the most popular of the levels, primarily due to its economy.

Additional resources are spent on writing information to a RAID 5 volume, since additional calculations are required, but when reading (compared to a separate hard drive), there is a gain, because data streams from several array drives are parallelized. The minimum number of disks used is three, so three disks from a reliable manufacturer Segate, with a capacity of 150 Gb each, were chosen for organizing the RAID.

For the workstations, hard drives of the smallest volumes were chosen, from those available in the store - 80.0 Gb from Hitachi. This volume is quite sufficient for installing various professional applications and office programs. A cache size of 8MB will allow you to organize your work without delay.
^

1.8Network equipment


Additional equipment is installed in the LAN of the editorial office: two network printers and a modem.

A network printer eliminates the need to purchase a large number of devices for all employees who need them. When creating the network, Samsung CLP-300 A4 color laser printers were chosen.

The modem is connected to the LAN server. D-Link DSL-2540U Modem selected.

The most important component of a computer network are network cards. Network cards act as a physical interface between a computer and a network cable. The main purpose of the network card:

- preparation of data coming from a computer for transmission over a network cable;

– data transfer to another computer;

– control of the data flow between the computer and the cable system.
^

1.9 Network cable system


Cable lines are a complex structure. The cable consists of conductors enclosed in several layers of insulation: electrical, electromagnetic, mechanical. In addition, the cable can be equipped with connectors that allow you to quickly connect various equipment to it. In the computer network under consideration, it is not required to lay the foundation for communication from a PC to a server over a distance of more than 100 meters, therefore, a UTP category 5e twisted-pair cable supporting a transmission rate of 100 Mbps is used.

twisted pair cable

A twisted pair cable consists of pairs of wires twisted around each other and simultaneously twisted around other pairs within the same sheath. Each pair consists of a wire called "Ring" and a wire called "Tip". Each pair in the shell has its own number. Curling wires allows you to get rid of electrical interference. The shielded twisted-pair cable has a copper braid that provides additional protection against interference. The maximum length of an unshielded twisted pair cable is 100 m.

Benefits of twisted pair:

– high performance in data transfer rate;

- low cost;

– ease of installation;

– high noise immunity;

– the dimensions of the areas allow keeping within the minimum effective cable length.

RJ-45 connectors are used to connect twisted pair to computers.
^

1.10Software


Server versions of the Windows operating system are widely used today, mainly due to ease of administration and low total cost of ownership. What differentiates the Windows Server 2003 family from its predecessors is the presence of the Microsoft .NET Framework. Windows Server 2003 comes in four editions. The edition uses Windows Server 2003 Standard Edition. This is a network operating system for running the server part of business solutions and is designed for use in small companies and departments. It features resource sharing and centralized deployment of desktop applications, as well as support for up to 4 GB of RAM and dual-processor symmetric multiprocessing.

Workstations are computers that use network resources but do not themselves have their own resources. These computers run an operating system. The operating system Microsoft Windows XP Professional was installed for the edition's workstations. This system has a wider range of configuration, administration and networking options than Windows XP Home Edition. Windows XP Professional has many advantages:

- stability. A prerequisite for system reliability is that applications run in their own memory spaces. This protects them from conflicts and the problems that arise in connection with them;

- compatibility. Ability to work with applications that were not specifically designed for the Windows XP Professional environment;

- System Restore . When a computer crashes, it goes into Safe Mode (Safe Mode), the operating system offers a rollback option called System Restore (System Restore). This allows the user to return to the settings that were on the computer before the incident. So-called restore points can be created by the user at any time. In addition, the operating system periodically creates its own restore points and every time a new program is installed. When you roll back your computer to a restore point, the operating system uses the installation data that corresponds to when the system was working properly.

OpenOffice.org is installed as an office software package, which can work with extensions of the rather expensive Microsoft Office. This rather powerful program has a number of other useful features, and it is completely free for both home and commercial use. This is a universal office software package capable of running on all major operating systems.

The OpenOffice.org suite includes six application programs. The Writer text editor has a user-friendly interface similar to that of the Word editor. Therefore, any user familiar with Word will easily get used to Writer. The same can be said about the Calc spreadsheet editor, which in many ways resembles Excel. There is also a program for creating and demonstrating Impress presentations, a vectorial Draw editor, a Base database management tool, and an editor for creating and editing Math formulas. The disadvantage of OpenOffice.org is its speed: it loads and runs somewhat slowly, but quite acceptable.

The organization of safe LAN operation is not possible without the use of anti-virus software. Therefore, Kaspersky Anti-Virus 7.0 is installed as anti-virus protection - a reliable and relatively cheap system.

Kaspersky Anti-Virus has three levels of protection against known and new Internet threats: signature database scanning, heuristic analyzer and behavioral blocker.

Kaspersky Anti-Virus protection against viruses is comprehensive and includes:

- Email protection. Kaspersky Anti-Virus performs anti-virus scanning of mail traffic at the data transfer protocol level (POP3, IMAP and NNTP for incoming messages and SMTP for outgoing messages) regardless of the mail program used;

– Internet traffic check. Kaspersky Anti-Virus provides anti-virus scanning of Internet traffic arriving via the HTTP protocol in real time and regardless of the browser used. This prevents infection even before the files are stored on the computer's hard drive;

- scanning the file system. Any individual files, directories and disks can be scanned. In addition, you can start scanning only critical areas of the operating system and objects loaded at Windows startup.

Kaspersky Anti-Virus protects your computer from Trojans and all types of keyloggers, preventing the transfer of confidential data to intruders.
^

1.11 Ensuring information security


Considering the problem of protecting data on the network, we will highlight all possible failures and violations that can lead to the destruction or unwanted modification of data.

Potential threats include:

– equipment failures: cabling failures; power outages; disk system failures; failures of data archiving systems; failures of servers, workstations, network cards, etc.;

– loss of information due to incorrect operation of the software: loss or change of data due to software errors; losses when the system is infected with computer viruses;

– losses associated with unauthorized access: unauthorized copying, destruction or falsification of information; familiarization with confidential information constituting a secret, unauthorized persons;

– user errors: accidental destruction or alteration of data; incorrect use of software and hardware, leading to the destruction or alteration of data.

To ensure the reliability of data storage and to prevent loss of information due to power failures, the editorial office has an uninterruptible power supply (UPS) Ippon Back Office 600. Its presence allows, in the event of a power outage, at least correctly shut down the operating system and turn off the server.

Kaspersky Anti-Virus is used to protect against viruses.

Conclusion

The result of the internship was:

– detailed acquaintance with the local network of the organization;

- obtaining new knowledge about the operation and maintenance of the LAN;

- the programs used in the organization are studied.

After studying the network and analyzing the work of the editors, it was proposed to create a new workplace - a full-time system administrator. Since now the daily problems of network operation, computers are solved by the employees themselves, without having all the necessary knowledge and being distracted from their direct duties.
^

List of sources used


  1. Akulov O. A. Informatics: basic course [Text] - M .: Omega-L, 2004. - 552 p.

  2. Olifer V. G., Olifer N. A. Computer networks [Text]: a textbook for universities. - Peter, 2007, 960 p.

  3. Pyatibratov A. P., Gudyno L. P., Kirichenko A. A. Computing systems, networks and telecommunications [Text] / Pod. ed. A. P. Pyatibratova. M.: Finance and statistics, 2001. - 512 p.

Introduction
Chapter 1. Analysis of the structure of the organization, description of the hardware and software of the organization
1.1 Structure of the organization
1.2 Description of the organization's hardware
1.3 Description of the software used in the organization
1.4 Description of the activities of the information technology department of the organization
Chapter 2. Ensuring stable operation of computer systems and complexes
2.1 List of instructions required for organizing the workplace of a computer system adjuster or a hardware and software system adjuster.
2.2 Examine the system of preventive maintenance of computers in the organization
2.3 Description of monitoring, diagnostics and recovery of computer systems and complexes
2.4 Identification of shortcomings in the system for ensuring the stable operation of computer systems and complexes. Suggestions for improving this system
Chapter 3. Description of the information system used in the organization
3.1 Analysis/development of the structure of the information system
3.2 Description of the database management system/software used for development
3.3 Description of the main objects of the information system
3.4 Instructions for users to work with the information system
3.4.1 Purpose of the program
3.4.2 Program execution conditions
3.4.3 Program execution
3.4.4 Operator messages
3.5 Description of means, methods of information protection when working with an information system
Conclusion
List of sources used

Introduction

Today the whole world communicates with the help of computers. Every family has high-tech machines; not a single enterprise works without them. Only not everyone knows how to talk to a computer in its language and make it understand the language of a person. To be an expert in computer systems means to be one step ahead of time. After all, nothing in the world is developing as fast as computer technology. No wonder they say: "The computer is outdated as soon as it went on sale."

Having learned how computer systems are arranged, you begin to understand the language of numbers, to know computer-aided design systems, microprocessor systems and peripheral equipment. In other words, you begin to speak the same language with the computer. He, as a friend, teaches to solve problems, assess risks and make decisions in non-standard situations, which is very much appreciated by employers. The range of application of the knowledge of a computer network specialist is wide: from small salons to large enterprises - wherever there are computers, a system administrator is required - a specialist in computer systems and complexes.

In order to better prepare specialists for this profession, practical skills are required. For this purpose, practical classes are provided in educational institutions.

Practice in the profile of the specialty is a form of training in organizations (enterprises) of different forms of ownership and organizational and legal forms.

Practice in the profile of the specialty is carried out in order to study the general principles of the functioning of organizations and institutions for labor management and regulation of social and labor relations, employment services; principles of organizing the work of services and divisions dealing with the selection, placement and accounting of personnel, personnel departments, labor and wages, personnel management departments; as well as analysis of documentation supporting the activities of these services. It allows you to combine theoretical training with practical activities in specific workplaces. Practice tasks include:

  • monitoring, diagnostics and recovery of computer systems and complexes
  • system maintenance of computer systems and complexes
  • debugging of hardware-software systems and complexes;
  • installation, configuration and configuration of the operating system, drivers, resident programs;
  • maintaining customer databases;
  • demonstrating the capabilities of complex technical systems;
  • advising on the use of complex technical systems;
  • informing the consumer about the operating conditions of the selected options for technical solutions, license agreements.
  • During the practice in the specialty profile, it is necessary to perform the following types of work:
  • characteristics of the enterprise. Analysis of the external and internal environment of the organization;
  • description of the technical and software park of the enterprise;
  • development of methods and regulations for preventive maintenance of computer equipment;
  • development of a system for modernizing the technical and software park of the enterprise;
  • development of information security policy rules;
  • designing the organization's database structure;
  • general description of the configuration/database, interface, input and output forms;
  • configuring and setting up the database, setting data access privileges;
  • drawing up instructions for the user when using a particular database management system;
  • developing a presentation of the organization's products.

Chapter 1. Analysis of the structure of the organization, description of the hardware and software of the organization

1.1. Organization structure

Princip Company is one of the largest companies in the city of Smolensk, specializing in the production and sale of computers, solving network integration issues, as well as in the supply of office and mobile equipment, components and consumables.

The stores offer the widest selection of modern computer equipment: personal and laptop computers, monitors, office equipment from leading manufacturers (Samsung, Acer, Phillips, Toshiba, MSI, Intel, AMD, Asus, Dell, LG, Canon, Epson and many others).

Huge selection of consumables (paper, cartridges for inkjet and laser printers, toner, ink, etc.)

Today it is a supplier of many large state and commercial organizations in Smolensk and the Smolensk region.

It also became the first Smolensk manufacturer of computers certified according to GOST and having an international quality certificate ISO 9001. This allows us to speed up and simplify the process of servicing our customers' equipment and offer computers of the highest quality at the best prices.

It is the first Smolensk company to be a Microsoft Gold Certified Partner with the "Management of licenses in organizations" competence, offering customers software under various licensing programs, which allows them to choose the best option.

1.2. Description of the organization's hardware

Nowadays, the vast majority of organizations use modern automated systems and computer equipment, software and information media in their work.

The institution has 12 computers.

The computer hardware for the workstation includes:

  • processor type and frequency - Intel Core 2 Duo 2.4 Hz;
  • the amount of RAM - 2048 MB;
  • hard disk type and size - WDCWD1600AAJS-61 WAA0 (IDE500GB);
  • motherboard type - integrated;
  • type of video card - built-in;
  • type CD-ROM-DVD-R;
  • sound card type - built-in;
  • network card type - ETHERNET (100 MB/s);
  • BIOS type - rewritable;
  • monitor type and size - LCD 17''.

Workstation PC system software includes:

  • OS - Windows XP Professional;
  • manufacturer - Microsoft;
  • bit depth OS-32;
  • the file system used is NTFS;
  • type of supported interface - graphical.

Minimum requirements for computer architecture when installing this OS:

  • 2.4 Hz Intel processor or faster;
  • at least 64 MB of RAM (at least 128 MB recommended);
  • at least 1.5 GB of free hard disk space;
  • CD or DVD drive;
  • keyboard, Microsoft Mouse.

The organization has an S5000MB (S5332LNi) server as a server computer: Core i5-4590 / 8 GB / 2 x 1 TB SATA RAID.

The server computer hardware includes:

  • Intel processor
  • Drive Interface SATA 6Gb/s
  • Type of HDD
  • RAM 8 GB
  • Network card 10/100/1000 Mbps

The organization uses the following peripherals HP LASERJET P2035, HP LASERJET PRO COLOR CP1025, HP LASERJET PRO P1102, HP SCANJET 300, Samsung ML-1210

1.3. Description of the software used in the organization

The operating system is Microsoft Windows XP Professional software.

Personal computer software:

  • Microsoft Office 2007
  • KasperskyAnti-Virus
  • 1C: Enterprise (1C: Accounting).
  • 1C: TRADE AND WAREHOUSE 7.7
  • Windows 2000 Server SP4

Windows XP Professional is an operating system (OS) of the Windows NT family of Microsoft Corporation. It was released on April 25, 2005 as a version of Windows XP for the personal computer platform.

Kaspersky Antivirus (KAV) is antivirus software developed by Kaspersky Lab. Provides the user with protection against viruses, Trojans, spyware, rootkits, adware, and unknown threats using proactive protection that includes the HIPS component (only for older versions called Kaspersky Internet Security 2009+, where '+' is the sequence number of the previous register, annually increased by one in accordance with the number of the year following the year of release of the next anti-virus version"). Initially, in the early 1990s, it was called -V, then - AntiViral Toolkit Pro.

1C: Enterprise is a system of programs for automating various areas of economic activity. A specific software product included in the 1C: Enterprise program system includes those functions and capabilities that meet the purpose of this product.

All components of the 1C: Enterprise program system can be divided into the Technological Platform and Configurations. The technological platform is a set of various mechanisms used to automate economic activity and is independent of specific legislation and accounting methodology. Configurations are actually applied solutions. Each configuration is focused on the automation of a certain area of ​​economic activity and, of course, complies with the current legislation.

"1C: Trade and Warehouse" is designed to account for any type of trading operations. Thanks to its flexibility and customizability, the system is able to perform all accounting functions - from maintaining directories and entering primary documents to receiving various statements and analytical reports.

"1C: Trade and Warehouse" automates work at all stages of the enterprise and allows you to:

  • keep separate management and financial records
  • keep records on behalf of several legal entities
  • keep batch accounting of inventory with the ability to choose the method of writing off the cost (FIFO, LIFO, average)
  • keep separate records of own goods and goods taken for sale
  • handle the purchase and sale of goods
  • perform automatic initial filling of documents based on previously entered data
  • keep records of mutual settlements with buyers and suppliers, detail mutual settlements under individual agreements
  • generate the necessary primary documents
  • draw up invoices, automatically build a sales book and a purchase book, keep quantitative records in the context of customs declaration numbers
  • perform product reservation and payment control
  • keep a record of cash in current accounts and at the cash desk
  • keep records of commodity loans and control their repayment
  • keep records of goods transferred for sale, their return and payment

In "1C: Trade and Warehouse" you can:

  • set the required number of prices of different types for each product, store supplier prices, automatically control and quickly change the price level
  • work with related documents
  • perform automatic calculation of write-off prices for goods
  • quickly make changes using group processing of directories and documents
  • keep records of goods in various units of measurement,
  • and cash - in different currencies
  • receive a wide variety of reporting and analytical information on the movement of goods and money
  • automatically generate accounting entries for 1C: Accounting.

"1C: Trade and Warehouse" contains the means to ensure the safety and consistency of information:

  • the ability to prohibit users from "direct" deletion of information
  • special data deletion mode with cross-reference control
  • the ability to prohibit users from editing data for past reporting periods
  • setting a ban on editing printed forms of documents
  • “locking” the system by the user during a temporary stoppage of work.

Server computer software

Windows 2000 Server is a feature-rich operating system that provides the functions of a file and print server, an application server, a Web server, and a communications server. The new system, compared to the previous one, provides greater reliability, speed and ease of management. More importantly, Windows 2000 Server has a large set of distributed services built on top of Active Directory, a multi-purpose, scalable Internet-based directory that is fully integrated with the system. Active Directory makes it much easier to administer systems and find resources on a corporate network.

Numerous Web and Internet services included with Windows 2000 Server allow organizations to make extensive use of Internet technologies by building sophisticated Web applications and streaming services (audio, video, and so on) using Windows 2000 Server as the platforms for building intranet networks.

Windows 2000 Server is a promising target and tool platform for Independent Software Vendors (ISVs) and custom business application developers because it supports and evolves the most advanced distributed application services such as DCOM, transaction servers, and message queuing . In addition, to improve the performance of Windows 2000 Server, the base product in the Microsoft server family supports multi-processor symmetric processing (SMP) on two processors and up to 4 GB of memory.

1.4. Description of the activities of the information technology department of the organization

System Administrator Responsibilities:

1. Installs operating systems and software necessary for operation on servers and workstations.

2. Performs software configuration on servers and workstations.

3. Maintains the software of servers and workstations in working order.

4. Registers users of the local network and mail server, assigns identifiers and passwords

5. Provides technical and software support to users, advises users on the operation of the local network and programs, draws up instructions for working with the software and brings them to the attention of users.

6. Sets access rights and controls the use of network resources.

7. Provides timely copying, archiving and backup of data.

8. Takes measures to restore the operability of the local network in case of failures or failure of network equipment.

9. Identifies user and software errors and takes action to correct them.

10. Monitors the network, develops proposals for the development of the network infrastructure.

11. Provides network security (protection against unauthorized access to information, viewing or changing system files and data), security of internetworking.

12. Performs anti-virus protection of the local area network, servers and workstations.

13. Prepares proposals for upgrading and purchasing network equipment.

14. Controls the installation of local network equipment by third-party specialists.

15. Informs his immediate supervisor about cases of violation of the rules for using the local area network and the measures taken.

Chapter 2. Ensuring stable operation of computer systems and complexes

2.1. A list of instructions necessary for organizing the workplace of a computer systems adjuster or a hardware and software systems adjuster.

A hardware and software adjuster is a specialist who manages the operation of a computer and configures certain types of equipment related to computer technology and information support. The field of activity of this profession is the installation, maintenance and modernization of computer equipment, including hardware and software for personal computers, servers, as well as peripheral devices, equipment and computer office equipment.

Means of labor (the main types of equipment and technologies used)

– hardware and software of personal computers and servers;

- periphery equipment;

– multimedia equipment;

– information resources of local and global computer networks.

Main types of work (labor activities)

– maintenance of hardware for personal computers, servers, peripheral devices and equipment, computer office equipment;

– installation and maintenance of software for personal computers, servers, peripheral devices and equipment;

- modernization of hardware for personal computers, servers, peripherals and equipment;

– modernization of software for personal computers, servers, peripherals and equipment.

Professional competencies

– to put computer facilities into operation;

- to diagnose the health, troubleshoot and failures of hardware of computer equipment;

- replace consumables used in computing and office equipment;

– install operating systems on personal computers and servers, as well as configure the user interface;

– to administer operating systems of personal computers and servers;

- install and configure the operation of peripheral devices and equipment;

– install and configure application software for personal computers and servers;

- diagnose the health, troubleshoot and crash the operating system and application software;

– optimize the configuration of computer equipment depending on the requirements and tasks solved by the user;

- remove and add components of personal computers and servers, replace them with compatible ones;

- replace, remove and add the main components of peripheral devices, equipment and computer office equipment;

– update and delete versions of operating systems of personal computers and servers;

– update and delete versions of application software for personal computers and servers;

– update and remove device drivers for personal computers, servers, peripherals and equipment;

– update the firmware of computer components, servers, peripherals and equipment

2.2. Studying the system of preventive maintenance of computers in the organization

Safety requirements before starting work

  • Put on and carefully tuck in special clothing (dressing gown) and technological footwear (slippers) established in accordance with current standards, avoiding hanging ends and constraint when moving.
  • Check and verify the availability and serviceability of the fixed tool, devices to ensure safe work performance, personal protective equipment, fire extinguishing equipment.
  • Check the condition of general and ordinary lighting.
  • Do not carry out any work on the repair of fixtures, equipment, etc., if this is not part of the employee's responsibilities.
  • Report all shortcomings and malfunctions found during the inspection at the workplace to the shift supervisor for taking measures to eliminate them completely.
  • Place the tool in the workplace with maximum ease of use, avoiding the presence of unnecessary items in the work area.
  • Check availability of first aid kit.

Safety requirements during work

  • Work only in serviceable and carefully fitted overalls and special equipment. shoes and use personal protective equipment required at the workplace in accordance with current regulations.
  • When servicing and repairing machines and equipment, the use of metal ladders is allowed. Work from boxes and other foreign objects is prohibited.
  • It is necessary to install the stepladder firmly, checking its stability before lifting. Ladders with a height of 1.3 m or more must be equipped with a stop.
  • Constantly monitor the health of the equipment. When leaving the machine or manipulator, the latter must be stopped and de-energized.
  • Work in the presence and serviceability of fences, interlocks and other devices that ensure labor safety, with sufficient illumination.
  • Do not touch moving mechanisms and rotating parts of machines, as well as energized live parts of equipment.
  • Keep your work area tidy and clean.
  • Keep foreign objects and tools away from moving mechanisms.
  • When starting the machine, machine, personally make sure that there are no workers in the area of ​​the machines.
  • All repair work on electrical installations, routine inspection, repairs should be carried out with the fuses (voltage) removed. Check the absence of voltage on current-carrying parts of electrical equipment with a voltmeter or voltage indicator.
  • To protect against burns when changing lamps in the equipment, the service technician must use cotton gloves, special keys and fixtures.
  • Immediately after carrying out the necessary shutdowns on the switching equipment (automatic device, knife switch, switch) disconnected during the preparation of the workplace, posters should be posted: “Do not turn on - people work!”, And disconnected for admission to work on overhead lines and cable lines - posters: “Do not turn on - work on the line!
  • For work, use a hand tool with insulating handles (pliers, pliers, wire cutters, screwdrivers), the dielectric coating should not be damaged and fit snugly to the handle.
  • Elimination of damage and repairs on the equipment must be carried out when the voltage is completely removed from the equipment.
  • The portable power tool used (soldering iron, step-down transformer) must be tested and have an inventory number, systematically and timely checked and repaired.

Safety requirements in emergency situations

  • Each employee who discovers violations of the requirements of this instruction and labor protection rules or notices a malfunction of the equipment that poses a danger to people is obliged to report this to the immediate supervisor.
  • In cases where a malfunction of the equipment poses a threatening danger to people or the equipment itself, the employee who discovered it is obliged to take measures to terminate the operation of the equipment, and then notify the immediate supervisor about this. Troubleshooting is carried out in compliance with safety requirements.
  • If an accident occurs during work, you must immediately provide first aid to the victim, report the incident to your immediate supervisor and take measures to preserve the situation of the accident, if this is not associated with a danger to life and health of people.
  • In case of electric shock, it is necessary to release the victim from the action of the current as soon as possible, in case of working at height, take measures to prevent him from falling. Switch off the equipment using switches, a plug-in connector, cut the supply wire with a tool with insulated handles. If it is impossible to turn off the equipment quickly enough, other measures must be taken to free the victim from the action of the current. To separate the victim from current-carrying parts or wires, you should use a stick, board or some other dry object that does not conduct electricity, while the caregiver should stand on a dry, non-conductive place, or wear dielectric gloves.
  • If a fire occurs in a technical room, you should immediately start extinguishing it with the available means (carbon dioxide fire extinguishers, asbestos blankets, sand) and call the fire department.

Safety requirements at the end of work

  • It is necessary to tidy up the workplace, tools and fixtures.
  • Notify the work manager of any malfunctions noticed during work and the measures taken to eliminate them
  • Put away the overalls in a specially designated place.

Studying the system of preventive maintenance of computers in the organization

Types of technical maintenance of SVT

The type of maintenance is determined by the frequency and complex of technological operations to maintain the operational properties of the SVT.

GOST 28470-90 "System for the maintenance and repair of technical means of computer technology and informatics" defines the following types of maintenance

  • regulated;
  • periodic;
  • with periodic control;
  • with continuous monitoring.

Scheduled maintenance should be carried out to the extent and taking into account the operating time provided for in the operational documentation for the SVT, regardless of the technical condition.

Periodic maintenance should be carried out at intervals and to the extent specified in the operational documentation for the SVT.

Maintenance with periodic monitoring should be carried out with the frequency of monitoring the technical condition of the computer and the necessary set of technological operations, depending on the technical condition of the computer, established in the technological documentation.

Maintenance with continuous monitoring should be carried out in accordance with the operational documentation for the SVT or technological documentation based on the results of constant monitoring of the technical condition of the SVT.

Control of the technical condition of the SVT can be performed in static or dynamic modes.

In the static mode, the control values ​​of voltages and clock frequencies remain constant throughout the entire cycle of preventive control, and in the dynamic mode, their periodic change is provided. Thus, due to the creation of heavy operating modes of the SVT, it is possible to identify elements that are critical in terms of reliability.

Preventive control is carried out by hardware and software. Hardware control is carried out with the help of special equipment, instrumentation and stands, and software and hardware systems.

Troubleshooting activities during preventive control can be divided into the following stages:

  • analysis of the nature of malfunctions according to the current state of the computer;
  • control of environmental parameters and measures to eliminate their deviations;
  • localization of the error and determination of the location of the malfunction with the help of hardware and software of the SVT and with the help of additional equipment;
  • trouble-shooting;
  • resuming the solution of the problem.

Currently, the following types of maintenance systems (STO) are most widely used:

  • Scheduled preventive maintenance;
  • Service according to technical condition;
  • Combined service.

Scheduled preventive maintenance is based on the calendar principle and implements scheduled and periodic maintenance. These works are carried out in order to maintain the CVT devices in good condition, identify equipment failures, prevent failures and failures in the operation of the CVT.

The frequency of scheduled preventive maintenance depends on the type of SVT and operating conditions (number of shifts and load).

Advantages of the system - provides the highest availability of SVT.

Disadvantages of the system - requires large material and physical costs.

In general, the system includes the following types of maintenance (preventive maintenance):

  • control examinations (KO)
  • daily maintenance (ETO);
  • weekly maintenance;
  • two-week MOT;
  • ten-day maintenance;
  • monthly maintenance (TO1);
  • two-month maintenance;
  • semi-annual or seasonal (SRT);
  • annual maintenance;

KO, ETO SVT includes inspection of devices, running a quick test of readiness (operability of devices), as well as work provided for by daily preventive maintenance (in accordance with the operating instructions) of all external devices (cleaning, lubrication, adjustment, etc.).

During the two-week maintenance, diagnostic tests are run, as well as all types of two-week preventive maintenance provided for external devices.

With monthly maintenance, it provides for a more complete check of the functioning of the computer with the help of the entire system of tests that are part of its software. The check is carried out at the nominal values ​​of the power sources with a preventive voltage change of + 5%.

Preventive voltage change allows you to identify the weakest circuits in the system. Typically, circuits must maintain their performance when the voltage changes within the specified limits. However, aging and other factors cause gradual changes in the performance of the circuits, which can be detected on prophylactic regimens.

CVT proactive voltage testing detects predictable faults, thereby reducing the number of hard-to-locate faults that lead to failures.

During the monthly preventive maintenance, all necessary work is carried out, provided for in the operating instructions for external devices.

With a semi-annual (annual) maintenance (SRT), the same work is carried out as with a monthly maintenance. As well as all types of semi-annual (annual) maintenance work: disassembly, cleaning and lubrication of all mechanical components of external devices with their simultaneous adjustment or replacement of parts. In addition, the cables and power busbars are inspected.

A detailed description of preventive maintenance is given in the operating instructions for individual devices attached to the SVT by the manufacturer.

When maintaining on a technical condition, maintenance work is unscheduled and is performed as necessary based on the state of the object (test results), which corresponds to maintenance with continuous monitoring or maintenance with periodic monitoring.

Unscheduled preventive maintenance includes extraordinary preventive maintenance, appointed mainly after the elimination of serious malfunctions of the computer. The scope of preventive measures is determined by the nature of the malfunction and its possible consequences.

The conclusion of the SVT for unscheduled preventive maintenance can also be carried out when the number of failures that occur over a certain set period of time exceeds the allowable values.

The system requires the presence and correct use of various testing tools (software).

The system allows minimizing the cost of operating the WTS, but the readiness of the WTS for use is lower than when using a planned preventive service station.

With a combined maintenance system, “junior types of maintenance” are carried out as necessary, as with maintenance on condition, based on the operating time and operating conditions of a particular type of computer equipment or the results of its testing. The implementation of "senior types of maintenance" and repairs is planned.

The rational organization of the service station should provide for the accumulation of static material based on the results of the operation of the SVT in order to summarize, analyze and develop recommendations for improving the structure of service, increasing the efficiency of using the SVT, and reducing operating costs.

The list of necessary material and technical means for organizing and carrying out work on maintenance of the SVT

The quality of CVT operation depends on providing it with spare parts, various consumables, instrumentation, tools, etc. . p.) and for service personnel (climatic conditions, noise level, illumination, etc.).

The operation of the CVT must be carefully planned. Planning should cover the entire range of issues related both to the compilation of the general program of work of the CVT, the distribution of machine time, etc., and to the entire work of the maintenance personnel.

The rational organization of operation should provide for the accumulation of static material based on the results of the operation of the SVT in order to summarize, analyze and develop recommendations for improving the service structure, increasing the efficiency of using the SVT, and reducing operating costs.

Diagnostic programs

For PCs, there are several types of diagnostic programs (some of which are included with the computer) that allow the user to identify the causes of problems that occur in the computer. Diagnostic programs used in PCs can be divided into three levels:

  • BIOS diagnostic programs - POST (Power-OnSelfTest - power-on self-test procedure). Runs every time the computer is turned on.
  • The Windows operating system diagnostic programs come with several diagnostic programs to test various components of your computer.
  • Diagnostic programs of firms - manufacturers of equipment.
  • Diagnostic programs for general purposes. Such programs, which provide thorough testing of any PC-compatible computers, are produced by many companies.

Power-on Self Test (POST)

POST is a sequence of short routines stored in the ROM BIOS on the motherboard. They are designed to check the main components of the system immediately after it is turned on, which, in fact, is the reason for the delay before loading the operating system.

Each time you turn on your computer, it automatically checks its main components:

  • processor,
  • ROM chips,
  • auxiliary elements of the system board,
  • RAM and major peripherals.

These tests are fast and not very thorough when a faulty component is found, a warning or error message (failure) is issued. Such faults are sometimes referred to as fatal errors. The POST procedure usually provides three ways to indicate a malfunction:

  • sound signals,
  • messages displayed on the screen
  • hexadecimal error codes issued to the I/O port.

When POST detects a problem, the computer emits distinctive beeps that can help identify the failed item (or group of items). If the computer is working properly, then when you turn it on, you will hear one short beep; if a malfunction is detected, a whole series of short or long beeps is issued, and sometimes a combination of them. The nature of the sound codes depends on the BIOS version and the company that developed it.

In most PC-compatible models, the POST procedure displays the progress of testing the computer's RAM on the screen. If an error is detected during the POST procedure, a corresponding message is displayed, usually in the form of a numerical code of several digits, for example: 1790- Disk 0 Error. Using the operation and service manual, you can determine which malfunction corresponds to this code. Error codes issued by POST to I/O ports

A lesser-known feature of this procedure is that at the beginning of each test, POST outputs test codes at the address of a special I / O port, which can only be read using a special adapter card installed in the expansion slot. The POST board is installed in the expansion slot. At the time of the POST procedure, its built-in indicator will rapidly change two-digit hexadecimal numbers. If the computer unexpectedly stops testing or “freezes”, this indicator will display the code of the test during which the failure occurred. This allows you to significantly narrow the search for a faulty element. On most computers, POST codes to I/O port 80h

Operating system diagnostic programs

DOS and Windows include several diagnostic programs. Which provide performance of testing of components of SVT. Modern diagnostic programs have graphical shells and are part of the operating system. Such programs are, for example:

  • utility to clean the disk from unnecessary files;
  • utility to check the disk for errors;
  • utility for defragmenting files and free space;
  • data archiving utility;
  • file system conversion utility.

All of these programs are also available in Windows.

Diagnostic programs of equipment manufacturers

Equipment manufacturers produce special specialized programs for diagnosing specific equipment, a specific manufacturer. The following groups of programs can be distinguished:

  • Hardware Diagnostic Programs
  • SCSI Device Diagnostic Programs
  • Network adapter diagnostic programs

Diagnostic programs for general and special purposes

Most test programs can be run in batch mode, which allows you to run a whole series of tests without operator intervention. You can create an automated diagnostic program that is most effective if you need to identify possible defects or run the same sequence of tests on multiple computers.

These programs check all types of system memory: basic (base), extended (expanded) and additional (extended). The location of the fault can often be determined down to a single chip or module (SIMM or DIMM)

There are many such programs. This type of software can be divided into the following categories:

  • Information programs;
  • Test programs;
  • Universal programs

Information programs

They are used in situations where it is necessary to find out a detailed configuration and test the computer for maximum performance without disassembling the system unit or when, at first glance, everything works fine, but the user claims that his computer is constantly buggy and starts up every other time. Or, after a repair, such as replacing the electrolytic capacitors on the motherboard, a thorough diagnostic is required to make sure that the computer is working properly. They test a computer or individual components, and provide detailed information about its condition, functionality, and possible software and physical problems.

Test programs

They work on the principle of maximum load with various operations that emulate the user's work on a computer, and measure the overall performance of the system or the performance of individual components based on a comparison with an existing database.

Universal programs

Programs combining two categories of programs - informational and test. They allow not only to test the PC, but also to obtain comprehensive information about its components.

There are several completely different versions of the program, but all of them are focused solely on measuring the performance of a video system.

When you start the program, in the main window you will see only the model of the video card and the characteristics of the monitor. For more information, click on SystemInfo , there you can find out - processor model, cache size, directX version and other system information. It is possible to select all or only some tests in the program. Almost all tests are run twice, at low and high detail, which gives greater accuracy. After the test, the program displays the result in the form of points that can be compared with another computer. The main thing is that the video system test is not complete without a critical load on other computer components. And if the computer under test coped with them, then most likely the main components are in order.

Among the packages of service utilities, without a doubt, "the first among equals" is NortonUtilities manufactured by Symantec and has already grown to the 2001 version.

The included SystemInformation utility provides conveniently grouped information on all major computer components. It is possible to detail information on some sections, as well as generate a report. Quite clearly and colorfully, with the use of pie charts, information about the efficiency and use of the disk is framed. You can test the processor by clicking the Benchmark button. The program gives a graph of the approximate speed of your system, the unit of measurement is the performance of a PC based on an Intel 386SX-16MHz processor.

Service equipment

To troubleshoot and repair a PC, you need special tools that allow you to identify problems and fix them simply and quickly.

These include:

  • a set of tools for disassembly and assembly;
  • chemicals (solution for wiping contacts), a spray bottle with coolant and a can of compressed gas (air) for cleaning computer parts;
  • a set of swabs for wiping contacts;
  • specialized improvised tools (for example, tools needed to replace microcircuits (chips));
  • service equipment.

Service equipment is a set of devices designed specifically for diagnosing, testing and repairing computer hardware. Service equipment includes the following elements:

  • Measuring instruments test connectors for testing serial and parallel ports;
  • memory testing devices that allow you to evaluate the functioning of SIMM modules, DIP chips and other memory modules;
  • equipment for testing a computer power supply;
  • diagnostic devices and programs for testing computer components (hardware and software systems).

Measuring instruments and test sockets for testing PC ports

The following measuring instruments are used to check and repair a PC:

  • digital multimeter;
  • logic probes;
  • single pulse generators for testing digital circuits.

Test connectors provide software and hardware testing of PC I/O ports (parallel and serial).

Computer power supply testing equipment provides testing of PC power supplies and determination of their main characteristics. It is a set of equivalent loads, switching elements and measuring instruments.

2.3. Description of monitoring, diagnostics and recovery of computer systems and complexes

Status analysis and troubleshooting "SamsungML-1210"

The printer does not pick up paper. The problem is in the capture roller. You need to do preventive maintenance.

Technical description "SamsungML-1210"

Main characteristics:

  • Printing technology - laser (Electrography);
  • Print speed - 12 PPM (pages per minute);
  • Toner saving mode up to 30%;
  • Resolution - 600 × 600 dpi;
  • Powerful 66 MHz processor;
  • Repeat the printing of the last sheet by pressing one button;
  • Compatibility (Linux, Macintosh, Windows).

Other Features:

  • Tray (cassette) - 150 sheets;
  • Output tray - 100 sheets;
  • Paper size - Letter, legal, Monarch, com 10, C5, DL, A4, A5, B5;
  • Interface - USB, IEEE 1284 (parallel);
  • Processor - 66 MHz;
  • Memory (MB) - 8 MB;
  • Working cycle (pages per month) - 12000;
  • Supported operating systems - Windows 95/98/2000/Me/NT, Linux (Redhat 6.0), Macintosh OS 8.0 and later;
  • Emulation - Smart GDI;
  • Toner cartridge - Single cartridge: 2500 pages at 5% coverage, 1000 starter.
  • Power consumption (W):
  • Standby - 5;
  • In print mode - 180;
  • Warm-up time (sec.) - 25;
  • First page output (sec.) - 13;
  • Noise level (max., dB) - 47;
  • Fonts - Windows fonts;
  • Size (W × D × H) mm - 329 × 355 × 231;
  • Printer weight - 6.2 kg.

Troubleshooting and failures "SamsungML-1210"

The front cover opens, 2 screws are unscrewed.

Unscrew 4 screws on the back.

The back wall, the top cover is removed, the paper guides are taken out and the side walls are removed.

Unscrew 3 screws that hold the laser. Disconnect 2 connectors located on the sides. The glass is wiped with a cotton swab or a clean piece of cloth.

The gripper roller, which is held by 2 self-tapping screws, is actually unscrewed and cleaned with a special liquid. At the same time, the brake pad is cleaned. It is located in the machine under the pickup roller.

Then the printer itself is cleaned. This operation can be performed with a vacuum cleaner or a compressor.

Assembly is carried out in the reverse order.

2.4. Identification of the shortcomings of the system for ensuring the stable operation of computer systems and complexes. Suggestions for improving this system

The disadvantage of this organization is the lack of a maintenance schedule for PCs and peripheral equipment. In this regard, this schedule was proposed and developed.

Chapter 3. Description of the information system used in the organization

3.1 Analysis of the subject area for the information system

Students organized in groups study in one of the specialties. Teachers are involved in the learning process. The educational process is regulated by the curriculum, indicating the number of hours for each discipline and the form of control (test, exam). A teacher can lead classes in one or more disciplines.

3.2 Analysis/development of the structure of the information system

This figure shows a block diagram of the program execution, which means that information from directories is taken into the document.

A use case diagram (use case diagram) in UML is a diagram that reflects the relationship between actors and use cases and is an integral part of the use case model that allows you to describe the system at a conceptual level.

Precedent - the possibility of a simulated system (part of its functionality), thanks to which the user can get a specific, measurable and desired result. A use case corresponds to a particular service of the system, defines one of the options for its use, and describes a typical way of user interaction with the system. Use cases are typically used to specify external requirements for a system. .

3.3 Description of the database management system/software used for development

The 1C: Enterprise 8 software system includes a platform and application solutions developed on its basis for automating the activities of organizations and individuals. The platform itself is not a software product for use by end users, who usually work with one of the many application solutions (configurations) developed on this platform. This approach allows you to automate various activities using a single technological platform.

3.4. Instructions for users to work with the information system

3.4.1 Purpose of the program

The program allows:

  • based on the entered data allows you to view the information of interest.
  • to carry out automated selection of the necessary information.
  • generate and print documents for registration and reporting forms.

program benefits « information system of the auto enterprise ":

  • convenience and ease of use;
  • small amount of occupied memory on hdd;
  • operational service.

Functional purpose

  • the ability to independently manage the accounting methodology as part of setting up accounting policies and setting accounting parameters;
  • arbitrary structure of the account code makes it possible to use long codes of accounts (sub-accounts) and maintain multi-level charts of accounts with a large nesting level;
  • the ability to work with several charts of accounts allows you to keep records in several accounting systems;
  • contains built-in mechanisms for conducting quantitative and currency accounting;
  • on any account, you can maintain multidimensional and multilevel analytical accounting;
  • the user can independently create new types of subconto, add accounts and subaccounts;
  • business transactions are reflected in accounting mainly by entering configuration documents that are identical to primary accounting documents, it is possible to enter individual entries manually;
  • when reflecting business transactions in configuration documents, you can explicitly indicate accounting and tax accounts;
  • the applied accounting methodology ensures the simultaneous registration of each record of a business transaction, both in accounting accounts and in the necessary sections of analytical accounting, quantitative and currency accounting;

Operational purpose

The program should be operated by enterprises focused on the automotive industry, namely passenger and freight transport.

Users of the program must be employees of the automotive industry.

Composition of functions

The program provides the ability to perform the following functions:

  • functions for creating a new (empty) file;
  • functions for opening (loading) an existing file;
  • inventory accounting;
  • inventory control;
  • accounting of trade operations;
  • accounting of commission trade;
  • accounting of agency contracts;
  • accounting of operations with containers;
  • accounting of banking and cash transactions;
  • accounting for settlements with counterparties;
  • accounting of fixed assets and intangible assets;
  • accounting of the main and auxiliary production;
  • accounting of semi-finished products;
  • accounting for indirect costs;
  • VAT accounting;
  • payroll accounting, personnel and personalized accounting;
  • income tax accounting;
  • simplified taxation system;
  • accounting for activities subject to a single tax on imputed income;
  • accounting of income and expenses of individual entrepreneurs - payers of personal income tax;

3.4.2 Program execution conditions

The climatic operating conditions under which the specified characteristics must be ensured must meet the requirements for technical equipment in terms of their operating conditions.

Minimum composition of technical means

The hardware should include an IBM-compatible personal computer (PC), which includes:

  • processor Pentium-1000 with a clock frequency, GHz - 10, not less;
  • motherboard with FSB, GHz - 5, not less;
  • RAM volume, GB - 2, not less;

Minimum composition of software

The system software used by the program must be represented by a licensed localized version of the operating system. You can use update package 8.3.5.1284.

3.4.3 Program execution

Program launch

The program is launched by double-clicking the left mouse button on the label of the program "1C: Enterprise 8.3", then you need to select the "WIS Base" configuration and click the "Configurator" item. The selection window is shown in Figure 1.

Figure 1 - Launching the infobase

After launching the program module in the "1C: Enterprise 8.3" system, the "Working window of the 1C: Enterprise 8.3 system" will appear on the screen, it displays the menu and toolbar in accordance with the selected user, it looks like this: the system working window is shown in Figure 2 .

Figure 2 - Appearance of the configuration menu

Menu operation

This menu can be divided into:

  • menu "File";
  • menu "Edit";
  • menu "Configuration";
  • menu "Debug";
  • menu "Administration",
  • menu "Service",
  • menu "Windows",
  • Help menu

You can choose the basic actions for editing and setting up a document, from creating and saving a new document to setting access rights to the infobase. You can also customize the interface for a specific user, use the help offered by the program to facilitate work.

The main menu is the "Configuration" menu, because the structure of the infobase is created in it. Each configuration object has a unique set of properties. This set is described at the system level and cannot be changed during task configuration. The set of properties of a configuration object is determined mainly by its purpose in the 1C:Enterprise system.

The main property of any configuration object is the name - the short name of the configuration object. When a new configuration object is created, it is automatically assigned a conditional name consisting of a word determined by the type of object and a number. This name can be changed while editing the properties of the configuration object, while the system keeps track of the uniqueness of the names. The configuration object name cannot be empty and cannot be longer than 255 characters.

Some properties from the entire set of properties inherent in the configuration object are available for editing and can be changed in one way or another during the system configuration. The nature of the changes and their limits are also set at the system level. A specialist who configures the system can achieve the desired behavior of the object during system operation by purposefully changing the properties of the configuration object.

3.4.4 Operator messages

Since the program is not a console (with a command line interface), but with a graphical user interface, classic text messages are not expected. Error messages are displayed as windows on the desktop. Shown in Figure 3.

3.5 Description of means, methods of information protection when working with an information system

1C:Enterprise supports the ability to upload/download an infobase to a file. This mechanism is intended primarily for obtaining an infobase image, regardless of how data is stored. For example, loading/unloading an infobase to a file can be used to convert the file version to a client-server one.

Sometimes this mode is also used to create a backup copy of the infobase, but this option of using it has a number of disadvantages. The main disadvantage of this method of creating a backup is the need to use single-user mode to carry out this operation. With a large amount of information base, a break in the work of users can be quite large, which is not always acceptable.

Depending on the variant of 1C: Enterprise (file or client-server), we can recommend the following ways to create a backup copy of the infobase:

1) When using the 1C:Enterprise 8 file option, you can organize the process of creating an infobase backup copy by simply copying the 1CV8.1CD file to a separate directory or using software for backing up and restoring data. It should be taken into account that to ensure the integrity and consistency of the data during the creation of a backup, the work of users with the infobase should be prohibited, however, the time required to create a backup is significantly less than when using uploading the infobase to a file.

2) When using the client-server version of 1C: Enterprise 8, it becomes possible to create a backup copy of the infobase using the DBMS. For example, SQL Server allows data to be backed up while the database is in multi-user mode and available to all users.

Using these methods gives the most accurate copy of the infobase state, which cannot always be obtained when using the infobase loading/unloading mode. For example, if the database is corrupted, some information may not be unloaded when unloading, while copying will preserve all the information, and after restoration it will be possible to correct the database.

Also, the time spent by the infobase in single-user mode is significantly reduced in the case of the file version of 1C: Enterprise 8, and in the case of the client-server version, single-user mode is not used at all.

In addition, the positive point is that when using the above methods, you can use various specialized software tools to create backups.

Conclusion

During the internship in the direction 230000 Informatics and Computer Engineering in the specialty 230113 Computer Systems and Complexes, the following tasks were performed:

Formation and development of general and professional competencies in the field of the chosen specialty;

Acquisition and formation of the necessary skills and experience of practical work to solve professional problems in a particular enterprise (organization) of the city and region;

  • Organization of independent professional activity, socialization in a specific type of activity.
  • Also, as a result of practical training in the direction 230000 Informatics and Computer Engineering in the specialty 230113 Computer Systems and Complexes, the following tasks were completed:
  • Consolidation, deepening and expansion of the acquired theoretical knowledge, skills and abilities;
  • Mastering professional competencies, production skills and new methods of work;
  • Mastering the norms of the profession in the motivational sphere: awareness of motives and spiritual values ​​in the chosen profession;
  • Mastering the basics of the profession in the operational sphere: familiarization and assimilation of the methodology for solving professional tasks (problems);
  • The study of different aspects of professional activity: social, legal, psychological, hygienic, technical, technological, economic.

As a result of practical training, experience was gained in supporting workstations in working order, as well as in analyzing and structuring knowledge about the information system of the branch.

List of sources used

1. Baidakov V., Dranishchev V., Krayushkin A., Kuznetsov I., Lavrov M., Monichev A. 1C:Enterprise 8.0 Embedded language description. [Text] /. In 4 volumes. - M .: Firm "1C", 2004. -2575 p.
2. Belousov P.S., Ostroverkh A.V. Repair of workstations. [Text] / Practical guide. - M .: LLC "1C-Publishing", 2008. -286 p.: ill.
3. Gabets A.P. Solving operational problems. Methodological materials for the listener of the certified course. [Text] / M .: LLC "1C-Training Center No. 3", 2004. -116s.: Ill.
4. A. P. Gabets and D. I. Goncharov, All About PC Design. [Text] / M .: 1C-Publishing LLC, 2008. -286 p.: ill.
5. Gabets A.P., Goncharov D.I., Kozyrev D.V., Kukhlevsky D.S., Radchenko M.G. Professional development in the system 1C: Enterprise 8. - M .: LLC "1C-Publishing"; [Text] / St. Petersburg: Peter, 2007. - 808 p.: ill.
6. Smooth A. A. 1C: Enterprise 8.0. - St. Petersburg: [Text] / Triton, 2005. - 256 p.: ill.
7. Mitichkin S.A. Development in the system 1C Enterprise 8.0. [Text] / M .: 1C-Publishing LLC, 2003. - 413p. ill.
8. Pankratov, F.G. 1C: Enterprise [Electronic resource]: textbook / F.G. Pankratov. - M.: Businesssoft, 2005. - 1 electron. opt. disc (CD-ROM).
9. Radchenko M.G. 1C:Enterprise 8.0. Practical developer guide. Examples and typical techniques. [Text] / M.:, 1C-Publishing LLC, 2004. -656 p.: ill.
10. Radchenko M.G. Repair of computers and peripherals. [Text] / M.:, 1C-Publishing LLC, St. Petersburg: Peter, 2007. -512 p.: ill.
11. Russian State Library [Electronic resource] / Center inform. RSL technologies; ed. Vlasenko T.V.; Web-master Kozlova N.V. - Electron, yes. – M. : Ros. state library, 1997 . – Access mode: http://www.rsl.ru, free

Liked the article? Share with friends!
Was this article helpful?
Yes
Not
Thanks for your feedback!
Something went wrong and your vote was not counted.
Thank you. Your message has been sent
Did you find an error in the text?
Select it, click Ctrl+Enter and we'll fix it!