Hardware and software setup

5 what types of local networks exist. Local area network - what is it and why is it needed? Features of server hardware

Computer network is a collection of computers various devices, providing information exchange between computers on a network without the use of any intermediate storage media.

Creation computer networks caused by the practical need of users of computers remote from each other for the same information.

Networks provide users with the opportunity not only to quickly exchange information, but also to collaborate on printers and other peripheral devices, and even simultaneous processing of documents.

The whole variety of computer networks can be classified according to a group of features:

  • Territorial prevalence;
  • Departmental affiliation;
  • Information transfer rate;
  • Type of transmission medium.

By territorial prevalence, networks can be local, global, and regional.

By affiliation, departmental and state networks are distinguished.

Departmental ones belong to one organization and are located on its territory.

According to the speed of information transfer, computer networks are divided into low-, medium- and high-speed.

According to the type of transmission medium, they are divided into coaxial, twisted-pair, fiber-optic networks, with the transmission of information via radio channels, in the infrared range.

Local computer networks

The local network combines computers installed in the same room (for example, a school computer class consisting of 8-12 computers) or in one building (for example, several dozen computers installed in different subject rooms can be connected to a local network in a school building).

In small local networks, all computers are usually equal, that is, users independently decide which resources of their computer (disks, directories, files) to make publicly available over the network. Such networks are called peer-to-peer.

If more than ten computers are connected to the local network, then the peer-to-peer network may not be efficient enough.

To increase performance, as well as to ensure greater reliability when storing information on the network, some computers are specially allocated for storing files or application programs. Such computers are called servers, and the local area network is called a server-based network.

Each computer connected to the local network must have a special board (network adapter). Computers (network adapters) are connected to each other using cables.

Network topology

The general scheme for connecting computers in local networks called network topology. Network topologies can be different.

Ethernet networks can have bus and star topologies. In the first case, all computers are connected to one common cable (bus), in the second, there is a special central device(hub), from which "beams" go to each computer, that is, each computer is connected to its own cable.

The bus-type structure is simpler and more economical, since it does not require an additional device and consumes less cable. But she is very sensitive to faults. cable system. If the cable is damaged in at least one place, then there are problems for the entire network. The fault location is difficult to locate.

Bus topology

Star topology

In this sense, the "star" is more stable. A damaged cable is a problem for one particular computer; it does not affect the operation of the network as a whole. No troubleshooting effort required.

Topology "ring"

In a network having a "ring" type structure, it is transmitted between stations along the ring with reception in each network controller. Reception is carried out through buffer drives made on the basis of random access memory devices, therefore, if they fail, one network controller may disrupt the operation of the entire ring. The advantage of the ring structure is the ease of implementation of devices, and the disadvantage is low reliability.

Regional computer networks

Local networks do not allow sharing information with users located, for example, in different parts of the city. Regional networks come to the rescue, uniting computers within the same region (city, country, continent).

Corporate computer networks

Many organizations interested in protecting information from unauthorized access (for example, military, banking, etc.) create their own, so-called corporate networks.

A corporate network can unite thousands and tens of thousands of computers located in different countries and cities (an example is the network of Microsoft Corporation, MSN).

Global computer network Internet

Currently, tens of millions of computers connected to the Internet store a huge amount of information (hundreds of millions of files, documents, and so on) and hundreds of millions of people use information services global network.

The Internet is a global computer network that unites many local, regional and corporate networks and includes tens of millions of computers.

Each local or corporate network usually has at least one computer that has permanent connection to the Internet using a high bandwidth connection (server).

The reliability of the functioning of the global network is ensured by the redundancy of communication lines: as a rule, servers have more than two communication lines connecting them to the Internet.

The basis, "framework" of the Internet is more than one hundred million servers permanently connected to the network. Internet servers can be connected using local area networks or dial-up telephone lines hundreds of millions of network users.

Here is an example of one from the global center

Large Google Internet Data Storage Center

This article is about LAN basics, the following topics will be covered:

  • The concept of a local network;
  • Local network device;
  • Equipment for local network;
  • Network topology;
  • TCP/IP protocols;
  • IP addressing.

The concept of a local network

Network - a group of computers connected to each other with the help of special equipment that ensures the exchange of information between them. The connection between two computers can be direct ( point-to-point connection) or using additional communication nodes.

There are several types of networks, and the local area network is just one of them. A local area network is, in fact, a network used in one building or a separate room, such as an apartment, to allow the computers and programs used in them to communicate. Local networks located in different buildings can be interconnected using satellite communication channels or fiber optic networks, which allows you to create a global network, i.e. a network that includes several local networks.

The Internet is another example of a network that has long since become worldwide and all-encompassing, comprising hundreds of thousands of different networks and hundreds of millions of computers. Whether you access the Internet via a modem, a local connection, or a global connection, every Internet user is effectively a network user. A wide variety of programs are used to surf the Internet, such as Internet browsers, FTP clients, e-mail programs, and many others.

A computer that is connected to a network is called workstation (workstation). As a rule, a person works with this computer. There are also computers on the network on which no one works. They are used as control centers in the network and as information stores. These computers are called servers.
If the computers are located relatively close to each other and are connected using high-speed network adapters then such networks are called local. When using a local area network, computers are usually located within the same room, building, or in several closely spaced houses.
To combine computers or entire local networks that are located at a considerable distance from each other, modems are used, as well as dedicated, or satellite channels connections. Such networks are called global networks. Typically, the data transfer rate in such networks is much lower than in local ones.

LAN device

There are two types of network architecture: peer-to-peer ( Peer-to-peer) and client/server ( Client/Server), On the this moment the client/server architecture has practically supplanted the peer-to-peer one.

If a peer-to-peer network is used, then all computers included in it have the same rights. Accordingly, any computer can act as a server that provides access to its resources, or a client that uses the resources of other servers.

In a network built on a client / server architecture, there are several main computers - servers. The rest of the computers that are part of the network are called clients, or workstations.

Server - is a computer that services other computers on the network. There are various types of servers, differing from each other in the services they provide; database servers, file servers, print servers, mail servers, web servers, etc.

Peer-to-peer architecture has become popular in small offices or home LANs. In most cases, to create such a network, you will need a couple of computers that are equipped with network cards, and a cable. Used as a cable twisted pair fourth or fifth category. twisted pair got its name because the pairs of wires inside the cable are twisted ( this avoids interference and external influences). You can still find quite old networks that use coaxial cable. Such networks are morally obsolete, and the information transfer rate in them does not exceed 10 Mbps.

After the network is created and the computers are connected to each other, you need to configure all the necessary parameters programmatically. First of all, make sure that operating systems with network support have been installed on the computers to be connected ( Linux, FreeBSD, Windows)

All computers in a peer-to-peer network are combined into workgroups that have their own names ( identifiers).
In the case of a client/server network architecture, access control is performed at the user level. The administrator has the opportunity to allow access to the resource only to certain users. Let's say you make your printer available to network users. If you do not want anyone to print on your printer, then you should set a password to work with this resource. With a peer-to-peer network, anyone who knows your password can access your printer. On a client/server network, you can restrict the use of the printer for some users, whether they know the password or not.

To access a resource in a local network built on a client / server architecture, the user must enter a username (Login - login) and password (Password). Note that the username is open information, and the password is confidential.

The process of verifying a username is called identification. The process of verifying that the entered password matches the username by authentication. Together, identification and authentication constitute the authorization process. Often the term authentication' - used in a broad sense: to indicate authentication.

From all of the above, we can conclude that the only advantage of a peer-to-peer architecture is its simplicity and low cost. Client/server networks provide more high level speed and protection.
Quite often, the same server can perform the functions of several servers, such as a file server and a web server. Naturally, the total number of functions that the server will perform depends on the load and its capabilities. The higher the power of the server, the more clients it can serve and the more large quantity provide services. Therefore, a powerful computer with a large amount of memory and a fast processor is almost always assigned as a server ( as a rule, multiprocessor systems are used to solve serious problems)

LAN equipment

In the simplest case, network cards and a cable are enough for the network to work. If you need to create a fairly complex network, then you will need special network equipment.

Cable

Computers within a local network are connected using cables that transmit signals. A cable that connects two network components ( e.g. two computers) is called a segment. Cables are classified depending on the possible values ​​​​of the information transfer rate and the frequency of failures and errors. There are three main categories of cables most commonly used:

  • twisted pair;
  • Coaxial cable;
  • Fiber optic cable,

To build local networks is now the most widely used twisted pair. Inside, such a cable consists of two or four pairs of copper wire twisted together. Twisted pair also has its own varieties: UTP ( Unshielded Twisted Pair - unshielded twisted pair) and STP ( Shielded Twisted Pair - shielded twisted pair). These types of cable are capable of transmitting signals over a distance of about 100 m. As a rule, UTP is used in local networks. STP has a braided copper filament sheath that has a higher level of protection and quality than the UTP cable sheath.

In the STP cable, each pair of wires is additionally shielded ( it is wrapped in foil), which protects the data that is being transmitted from external interference. This solution allows you to maintain high transmission speeds over longer distances than in the case of using a UTP cable. The twisted pair is connected to the computer using an RJ-45 connector ( Registered Jack 45), which closely resembles an RJ-11 phone jack ( regi-steredjack). Twisted pair is capable of providing network operation at speeds of 10.100 and 1000 Mbps.

Coaxial cable consists of a copper wire covered with insulation, a shielding metal braid and an outer sheath. The central wire of the cable transmits signals into which the data has been previously converted. Such a wire can be either solid or stranded. Two types of coaxial cable are used to organize a local network: ThinNet ( thin, 10Base2) and ThickNet ( thick, 10Base5). At the moment, local area networks based on coaxial cable are practically not found.

At the core fiber optic cable are optical fibers(light guides), data on which are transmitted in the form of pulses of light. Electrical signals are not transmitted over fiber optic cable, so the signal cannot be intercepted, which virtually eliminates unauthorized access to data. Fiber optic cable is used to transport large amounts of information at the highest available speeds.

The main disadvantage of such a cable is its fragility: it is easy to damage it, and it can be mounted and connected only with the help of special equipment.

network cards

Network cards make it possible to connect a computer and network cable. The network card converts the information that is intended to be sent into special packets. Packet - a logical collection of data, which includes a header with address information and information itself. The header contains address fields that contain information about the place of origin and destination of the data, the NIC analyzes the destination address of the received packet and determines whether the packet was actually sent this computer. If the output is positive, the board will send the packet to the operating system. AT otherwise the packet will not be processed. Special software allows you to process all packets that pass within the network. This opportunity is used system administrators when analyzing the network, and attackers to steal data passing through it.

Any network card has an individual address built into its chips. This address is called the physical or MAC address ( Media Access Control - access control to the transmission medium).

The order of actions to be taken network card, such.

  1. Receiving information from the operating system and converting it into electrical signals for further sending over the cable;
  2. Receipt electrical signals over the cable and converting them back into data that the operating system can work with;
  3. Determining whether the received data packet is intended specifically for this computer;
  4. Controlling the flow of information that passes between a computer and a network.

Hubs

concentrator (hub) is a device capable of connecting computers in a physical star topology. The hub has several ports that allow you to connect network components. A hub with only two ports is called a bridge. A bridge is needed to connect two network elements.

The network, together with the hub, is common bus". Data packets when transmitted through the hub will be delivered to all computers connected to the local network.

There are two types of concentrators.

passive concentrators. Such devices send the received signal without pre-processing it.
Active hubs ( multi-site repeaters). They receive incoming signals, process them and transmit them to connected computers.

Switches

Switches are needed to organize a closer network connection between the sending computer and the destination computer. In the process of data transfer through the switch, information about the MAC addresses of computers is recorded in its memory. Using this information, the switch compiles a routing table, in which for each of the computers it is indicated that it belongs to a certain network segment.

When the switch receives data packets, it creates a special internal connection ( segment) between its two Ports using the routing table. It then sends a data packet to the appropriate port on the destination computer based on the information described in the packet header.

Thus, this compound is isolated from other ports, allowing computers to communicate with maximum speed, which is available for this network. If a switch has only two ports, it is called a bridge.

The switch provides the following features:

  • Send a data packet from one computer to the destination computer;
  • Increase data transfer rate.

Routers

The router is similar in principle to a switch, but has a larger set of functionality, It learns not only the MAC, but also the IP addresses of both computers involved in the data transfer. When transporting information between different network segments, routers analyze the packet header and try to figure out the best path for the given packet. The router is able to determine the path to an arbitrary network segment using information from the routing table, which allows you to create a general connection to the Internet or a wide area network.
Routers allow the packet to be delivered in the most fast track, which makes it possible to increase throughput large networks. If some segment of the network is overloaded, the data flow will take a different path,

Network topology

The arrangement and connection of computers and other elements on a network is called network topology. A topology can be compared to a network map showing workstations, servers, and other network equipment. The chosen topology affects the overall network capabilities, the protocols and network equipment that will be used, as well as the ability to further expand the network.

Physical topology - is a description of how they will be connected physical elements networks. The logical topology defines the routes of data packets within the network.

There are five types of network topology:

  • Common bus;
  • Star;
  • Ring;

Common bus

In this case, all computers are connected to the same cable, which is called the data bus. In this case, the packet will be received by all computers that are connected to this network segment.

Network performance is largely determined by the number of computers connected to the common bus. The more such computers, the slower the network. In addition, such a topology can cause various collisions that occur when several computers simultaneously try to transmit information to the network. The likelihood of a collision increases as the number of computers connected to the bus increases.

Benefits of using networks with topology " common bus» the following:

  • Significant cable savings;
  • Ease of creation and management.

Main disadvantages:

  • the probability of collisions with an increase in the number of computers in the network;
  • a broken cable will shut down many computers;
  • low level of protection transmitted information. Any computer can receive data that is transmitted over the network.

Star

When using a star topology, each cable segment from any computer on the network will connect to a central switch or hub. All packets will be transported from one computer to another through this device. It is allowed to use both active and passive hubs. If the connection between the computer and the hub is broken, the rest of the network continues to work. If the hub fails, the network will stop working. With the help of a star structure, even local networks can be connected to each other.

Using this topology is convenient when searching for damaged items: cables, network adapters or connectors, " Star" more comfortable " common bus” and in case of adding new devices. It should also be taken into account that networks with a transmission rate of 100 and 1000 Mbps are built according to the topology " star».

If in the very center stars» position a hub, the logical topology will change to "common bus".
Advantages " stars»:

  • ease of creation and management;
  • high level of network reliability;
  • high security of information that is transmitted within the network ( if a switch is located in the center of the star).

The main disadvantage is that the failure of the hub leads to the cessation of the entire network.

Ring topology

In case of use ring topology all computers on the network are connected to a single ring cable. Packets loop in one direction through all the network cards of computers connected to the network. Each computer will amplify the signal and send it further along the ring.

In the presented topology, the transmission of packets around the ring is organized by the marker method. The marker is a specific sequence of binary bits containing control data. If a network device has a token, then it has the right to send information to the network. Only one token can be passed inside the ring.

The computer that is going to transport the data takes the token from the network and sends the requested information around the ring. Each subsequent computer will transmit data further until this packet reaches the destination. Upon receipt, the recipient will return an acknowledgment of receipt to the sending computer, and the latter will create a new token and return it to the network.

The advantages of this topology are as follows:

  • more efficiently than in the case of a common bus, large amounts of data are served;
  • each computer is a repeater: it amplifies the signal before sending it to the next machine, which allows you to significantly increase the size of the network;
  • the ability to set different network access priorities; however, the computer with the higher priority will be able to hold the token longer and transmit more information.

Disadvantages:

  • a break in the network cable leads to the inoperability of the entire network;
  • an arbitrary computer can receive data that is transmitted over the network.

TCP/IP protocols

TCP/IP protocols ( Transmission Control Protocol/Internet Protocol - Transmission Control Protocol/Internet Protocol) are the main internetworking protocols and manage the transfer of data between networks of different configurations and technologies. It is this family of protocols that is used to transmit information on the Internet, as well as in some local networks. The TPC/IP protocol family includes all intermediate protocols between the application layer and physical layer. Their total number is several dozen.

The main ones among them are:

  • Transport protocols: TCP - Transmission Control Protocol ( communication control protocol) and others - manage the transfer of data between computers;
  • Routing protocols: IP - Internet Protocol ( Internet Protocol) and others - provide the actual data transfer, process data addressing, determine the best path to the addressee;
  • Network address support protocols: DNS - Domain Name System ( domain system names) and others - provides the determination of the unique address of the computer;
  • Application service protocols: FTP - File Transfer Protocol ( file transfer protocol), HTTP - HyperText Transfer Protocol (Hypertext Transfer Protocol), TELNET and others - are used to gain access to various services: file transfer between computers, access to the WWW, remote terminal access to the system, etc.;
  • Gateway protocols: EGP - Exterior Gateway Protocol ( external gateway protocol) and others - help transmit routing messages and network status information over the network, as well as process data for local networks;
  • Mail protocols: POP - Post Office Protocol ( mail receiving protocol) - used to receive email messages, SMPT Simple Mail Transfer Protocol ( mail transfer protocol) is used to send mail messages.

All major network protocols (NetBEUI, IPX/SPX and TCPIP) are routable protocols. But manually you have to configure only the TCPIP routing. Other protocols are routed by the operating system automatically.

IP addressing

When building a local network based on the TCP / IP protocol, each computer receives a unique IP address, which can be assigned either by a DHCP server - special program installed on one of the network computers, either using Windows tools or manually.

The DHCP server allows you to flexibly distribute IP addresses to computers and assign permanent, static IP addresses to some computers. The built-in Windows tool does not have this capability. Therefore, if the network has a DHCP server, then by means of Windows is better do not use by setting the network settings of the operating system to automatic ( dynamic) IP address assignment. Installing and configuring a DHCP server is beyond the scope of this book.

Note, however, that when using a DHCP server IP address or Windows tools loading computers on the network and assigning IP addresses takes a long time, the longer the larger the network. Also, the computer with the DHCP server must be turned on first.
If you manually assign static ( permanent, not changing) IP addresses, then computers will boot faster and immediately appear in a networked environment. For small networks, this option is the most preferred, and it is this that we will consider in this chapter.

For the TCP / IP protocol bundle, the base protocol is IP, since it is he who is responsible for moving data packets between computers through networks using various network technologies. It is thanks to the universal characteristics of the IP protocol that the very existence of the Internet, consisting of a huge number of heterogeneous networks, became possible.

IP protocol data packets

The IP protocol is the delivery service for the entire TCP-iP family of protocols. Information coming from other protocols is packaged into IP protocol data packets, an appropriate header is added to them, and the packets begin their journey through the network.

IP addressing system

One of the most important fields in the IP data packet header are the sender and destination addresses of the packet. Each IP address must be unique on the internetwork where it is used in order for the packet to reach its destination. Even in the entire global Internet network, it is impossible to meet two identical addresses.

An IP address, unlike a regular postal address, consists entirely of numbers. It occupies four standard computer memory cells - 4 bytes. Since one byte (Byte) is equal to 8 bits (Bit), the length of the IP address is 4 x 8 = 32 bits.

A bit is the smallest possible unit of information storage. It can only contain 0 ( bit cleared) or 1 ( bit set).

Although an IP address is always the same length, it can be written in different ways. The format for writing an IP address depends on the number system used. In this case, the same address can look completely different:

Numeric entry format

Meaning

Binary

Hexadecimal(Hexadecimal)

0x86180842

Decimal

2249721922

dotted decimal(Dotted Decimal)

134.24.8.66

The binary number 10000110 is converted to decimal as follows: 128 + 0 + 0 + 0 + 0 + 4 + 2 + 0 =134.
The most preferred option, in terms of human readability, is to write the IP address in dotted decimal notation. This format consists of four decimal numbers separated by dots. Each number, called an Octet, is the decimal value of the corresponding byte in the IP address. An octet is called so because one byte in binary form consists of eight bits.

When using dotted decimal notation to write octets in an IP address, keep in mind the following rules:

  • Only integers are allowed;
  • Numbers must be between 0 and 255.

The most significant bits in the IP address, located on the left, determine the class and network number. Their combination is called the subnet identifier or network prefix. When assigning addresses within the same network, the prefix always remains the same. It identifies the ownership of the IP address of the given network.

For example, if the IP addresses of computers on the subnet 192.168.0.1 - 192.168.0.30, then the first two octets define the subnet ID - 192.168.0.0, and the next two - host IDs.

How many bits are used for one purpose or another depends on the class of the network. If the host number is zero, then the address does not point to any one particular computer, but to the entire network as a whole.

Network classification

There are three main classes of networks: A, B, C. They differ from each other in the maximum possible number of hosts that can be connected to a network of this class.

The generally accepted classification of networks is given in the following table, where it is indicated the largest number network interfaces available for connection, which octets of the IP address are used for network interfaces (*), and which remain unchanged (N).

Network class

The largest number hosts

Modifiable IP octets - addresses used for host numbering

16777214

N*.*.*

65534

N.N.*.*

N.N.N.*

For example, in the networks of the most common class C, there cannot be more than 254 computers, so only one, the lowest byte of the IP address, is used to number network interfaces. This byte corresponds to the rightmost octet in dotted decimal notation.

A legitimate question arises: why can only 254 computers be connected to a class C network, and not 256? The fact is that some intranet IP addresses are intended for special use, namely:

O - identifies the network itself;
255 - broadcast.

Network segmentation

The address space within each network allows splitting into smaller subnets by the number of hosts ( Subnets). The process of subnetting is also called sharding.

For example, if the class C network 192.168.1.0 is divided into four subnets, then their address ranges will be as follows:

  • 192.168.1.0-192.168.1.63;
  • 192.168.1.64-192.168.1.127;
  • 192.168.1.128-192.168.1.191;
  • 192.168.1.192-192.168.1.255.

In this case, not the entire right octet of eight bits is used for host numbering, but only the 6 least significant of them. And the two remaining high bits determine the subnet number, which can take values ​​from zero to three.

Both regular and extended network prefixes can be identified using a subnet mask ( subnet mask), which also allows you to separate the subnet ID from the host ID in an IP address by masking the subnet portion of the IP address with a number.

The mask is a combination of numbers appearance resembling an IP address. The binary representation of the subnet mask contains zeros in bits that are interpreted as a host number. The remaining bits set to one indicate that this part of the address is a prefix. The subnet mask is always used in conjunction with the IP address.

In the absence of additional subnetting, the masks of the standard network classes have the following meanings:

Network class

Mask

binary

dotted decimal

11111111.00000000.00000000.00000000

255.0.0.0

11111111.11111111.00000000.00000000

255.255.0.0

11111111.11111111.11111111.00000000

255.255.255.0

When the subnetting mechanism is used, the mask changes accordingly. Let's explain this using the already mentioned example with the division of a class C network into four subnets.

In this case, the two most significant bits in the fourth octet of the IP address are used to number the subnets. Then the mask in binary form will look like this: 11111111.11111111.11111111.11000000, and in dotted decimal form -255.255.255.192.

Private network address ranges

Each computer connected to the network has its own unique IP address. For some machines, such as servers, this address does not change. Such Permanent Address is called static. For others, such as clients, the IP address can be fixed (static) or dynamically assigned each time you connect to the network.

To get a unique static, that is, a permanent IP address on the Internet, you need to contact a special InterNIC organization - Internet Network Information Center ( network information Center Internet). InterNIC assigns only the network number, and the network administrator must deal with further work on creating subnets and numbering hosts on his own.

But formal registration with InterNIC in order to obtain a static IP address is usually required for networks that have a permanent connection to the Internet. For private networks that are not part of the Internet, several blocks of address space are specially reserved, which can be freely used to assign IP addresses without registering with InterNIC:

Network class

Number of available network numbers

IP address ranges used for host numbering

10.0.0.0 — 10.255.255.255

172.16.0.0-172.31.255.255

192.168.0.О-192.168.255.255

LINKLOCAL

169.254.0.0-169.254.255.255

However, these addresses are used only for internal network addressing and are not intended for hosts that directly connect to the Internet.

The LINKLOCAL address range is not a network class in the usual sense. It is used by Windows when automatically assigning private IP addresses to computers on a local network.

I hope you now have an idea about the local network!

About what the whole modern world is a giant virtual web known, perhaps, to every student. The times when the exchange of information was carried out on a “hand-to-hand” basis, and the main data carrier was a stamped paper folder, are in the distant past, but now countless virtual highways connect all points of the planet into a single information system– computer data network.

What is a computer network?

In a general sense, a computer data network is a communication system of various computer science(including PC and user office equipment) necessary for automatic data exchange between end users, as well as remote control functional nodes and software this network.

There are a lot of ways to classify computer networks (according to architecture, type of transmission medium, network operating systems etc.), but delve into the jungle of theory network technologies we won't: especially inquisitive users will always be able to find this information in educational literature. Here we restrict ourselves to the simplest classification of networks depending on their length.

So, computer networks on a territorial basis are divided into local and global:

The global computer network is a data transmission network covering the whole world (or separate large regions) and uniting an unlimited number of unrelated subscribers.

A local computer network is a set of PCs connected by communication channels and network equipment, designed to transfer data to a finite number of users. By the way, the term "local network" was assigned to the system at a time when the capabilities of the equipment did not allow organizing such communication for subscribers remote over long distances, now local computer networks are used both for organizing local communications (within the same building or organization), and cover entire cities, regions and even countries.

Types of computer networks

According to the method of organizing communication between subscribers, the topology of computer networks distinguishes the following schemes of local networks:

Where the nodes of the network are computers, office equipment and various network equipment.

More complex topologies (such as tree network, mesh network, etc.) are built by various connections of the three elementary types of local area network.

LAN functions

About purpose global networks and what benefits the Internet brings to the world, we will not tell: the main functions of the World Wide Web are already well known to every user, and detailed description You can devote more than one book to all the possibilities of the network.

At the same time, home networks are undeservedly deprived of informational attention, and many users do not understand why they need a local network at all.

So, the main functions of the local network:

  • - Workflow optimization. Thus, a home local area network, organized, for example, in an office, provides all its employees with the possibility of remote data exchange, as well as the sharing of all types of office equipment;
  • - Communication. Of course, local networks will not be able to completely replace “Internet connection”, but in cases where you need to organize your own, closed from external users, communication channel (for example, a corporate employee forum), local networks are simply irreplaceable;
  • - Possibility remote administration. Thus, a corporate local area network allows one specialist to provide technical support several dozen different devices;
  • - Saving. Agree, it is more logical to pay for an Internet connection once and provide all employees of the organization (user devices) with the opportunity of free access than to pay for access to world wide web each employee (gadget) individually;
  • - Games, communication security, user comfort and more.

Thus, the local network is very, very useful tool in any field of activity. In fact, it was local networks that replaced the well-known "pigeon mail" both at any enterprise and between friends and acquaintances (after all, this is a much more functional alternative to tapping on the battery and signals like "cactus" on the windowsill). And our lessons will help you not only create a local network from scratch with your own hands, but also solve much more complex administration issues corporate networks and settings different types network equipment.

Do you want to optimize the work of the company as much as possible? You just need to install local computer network. This will allow employees to use the computer equipment, databases and programs necessary for their work. Regardless of the location of the workplace, team members will be able to transfer information, send email etc.

Key Features and Benefits of a LAN

Highlight the main functions of the LAN. This is:

  • prompt sending of documentation (in electronic form) to all branches of the organization;
  • constant communication between the team. LAN will provide communication between employees located in
  • head office and branches;
  • the ability to access office equipment (printers, faxes, modems) from different points of the office;
  • automation of the use of all databases (archives, storages);
  • provision of collective access to the Internet;
  • remote communication (teleconferences). This is important for meetings, conferences;
  • possibility of remote network administration.

Actual LAN installation price available on the website of the company providing such a service. Please read the price list carefully before applying.

After installing the LAN, you get the opportunity to quickly receive and send any information. Plus, by connecting all computers to a single communication network, the speed of work as a whole is significantly increased.


What is LAN installation? The work consists of several stages:

  • visit of a specialist to the object;
  • system design;
  • selection of the necessary equipment;
  • direct installation work;
  • adjustment and adjustment of equipment;
  • testing and delivery.

LAN installation should only be carried out by professionals. This process requires strict adherence to technology. The slightest mistake will lead to the fact that office equipment simply will not function. This is unacceptable downtime for the company and losses.

Firms offering LAN installation must be licensed to engage in such activities. An important factor is minimum terms during which the work will be completed. After the installation is completed, it is wiser to conclude a contract for servicing the system.

After connecting computers to a single network, you will immediately feel the difference. The work will be done much faster. LAN capabilities allow you to connect devices to it in different offices, cities and even countries.

Liked the article? Share with friends!
Was this article helpful?
Yes
Not
Thanks for your feedback!
Something went wrong and your vote was not counted.
Thank you. Your message has been sent
Did you find an error in the text?
Select it, click Ctrl+Enter and we'll fix it!