Hardware and software setup

Reports of practice specialty computer networks. Computer networks

Federal Agency for Education of the Russian Federation

"Peter's College"

Course work

by discipline " Computer networks and telecommunications"

Topic: "Designing an educational local area network"

Completed by: Kurilovich N.G.

Checked by: Markelov Yu.P.

St. Petersburg 2010


Introduction

Stage 1. Infological survey of the automation object

Stage 2. Design stage

Stage 3. Network configuration calculation

Conclusion


Introduction

Our time is characterized by the rapid development of telecommunication technologies.

The combination of computers in the network has significantly increased productivity. Computers are used both for production (or office) needs and for education.

A local area network is a group of interconnected computers, servers, printers located within a building, office or room. The local network allows you to share access to shared folders, files, equipment, various programs etc.

Resource usage local network makes it possible to significantly reduce the financial costs of the enterprise, increase the level of security of storing important data, reduce the time spent by company employees on solving various types of tasks, as well as increase overall work efficiency.

Computers can be interconnected using various access media: copper conductors ( twisted pair), optical conductors (optical cables) and through a radio channel (wireless technologies). Wired connections are established via Ethernet, wireless - via Wi-Fi, Bluetooth, GPRS and other means. A separate local area network may have gateways to other local area networks, as well as be part of a global area network (for example, the Internet) or have a connection to it.

LAN (Local Area Network) - a local area network designed to unite geographically grouped network devices. All network devices inside the LAN have information about the MAC addresses of neighboring network adapters and communicate at the second (link) level of the seven-layer OSI model.

Main advantages of LAN:

1. Reducing network load

2. Information security

a. Combining user workstations into functional groups between which unauthorized data exchange at the data link level is impossible.

b. Differentiation of access to servers and printers.

c. Internet Access Controls

d. Mutual isolation of network segments using different network protocols(for example: IPX User VNet, Apple User VNet)

3. Reduced operating costs

a. Low cost of moving, changing and adding network users

b. Reducing the number of unused switch ports

4. Increasing the reliability and fault tolerance of the network

a. Broadcast Storm Isolation

b. Accelerated fault localization

c. More control over traffic

d. Effective use of IP addresses

Disadvantages of LAN:

1. Increasing start-up costs

2. The need for additional staff training.


Stage 1. "Infological survey of the automation object"

Targets and goals

The main objective of the course project is the design and calculation of a peer-to-peer educational LAN on the topology "Star" and "Common bus" OIPTS Petrovsky College.

Computers will be used by students for the purpose of training, conducting practical classes. The network must ensure the smooth functioning and interaction of various distributed applications located in this network.

List of academic disciplines

Table 1. List of academic disciplines and software required for them

Each workstation will be equipped with a 32-bit Window 7 HomeBasicDVD (RUSDVD) operating system. This choice is explained by the fact that Windows 7 included some developments that were excluded from Windows Vista, as well as innovations in the interface and built-in programs, and it has more features than previous versions of Windows and is more optimized.

The cost of one license OS MS Windows 7 Home Basic 32-bit Rus 1pk OEI DVD for one PC (workstation) is 3799 rubles. Therefore, for 34 workstations, the total cost will be 129166 rubles.

Workstation software

In addition to the operating system, workstations require the installation of the main package application programs and utilities that meet the requirements of the LAN.

1. MS Office 2007 Professional Win32 Rus AE CD BOX (for educational institutions)

Table 3. System requirements for MSOfficeProfessional

2. KOMPAS-3DV12


Table 4. System requirements for KOMPAS-3DV12

3. Acronis Disk Director 11 Home

Table 5. Acronis Disk Director 11 Home system requirements

Typical Workstation Configuration

Table 7. Workstation Cost Calculation

Accessories Product description Price
Frame InwinEMR-006, microATX, Minitower, 450W, Black/Silver 2290 r.
Motherboard Gigabyte GA-H55M-S2H, iH55, Socket 1156, 2xDDR3 2200MHz, 2x PCI Express x16 + Integrated Intel HD Graphics, 6 x SATA II, LAN 1 Gbit, microATX 3290r.
CPU Intel Core i3 530 2.93GHz, 2x256 kb, 4 Mb, LGA1156 BOX 4390r.
RAM Kingston HyperX(KVR1333D3N9K2/2G) Kit of 2, DDR3 2048Mb (2x1024), 1333MHz 1590 r.
HDD Western Digital WD5000KS/AAKS, 3.5", 500Mb, SATA-II, 7200 rpm, Cache16Mb 1840 p.
video card Integrated video adapter 0 r.
optical drive Asus DRW-24B3ST, DVD RW, SATA, Black 1090 r.
LAN Integrated 1Gbit network adapter 0 r.
Monitor Samsung EX1920, 18.5" / 1366 x 768 pix / 16:9, 1000:1, DC - 5000000:1 / 250 cd/m² / 5 ms, D-Sub / DVI, TFT Black 5990 r.
Network filter Vector Lite, 1.8 m 399 r.
Input Devices Logitech Desktop MK120 Black, keyboard + mouse set 680 rubles
TOTAL: 21560 r.

In total, the cost of one workstation amounted to 21,560 rubles. The designed network consists of 34 workstations, which will amount to 733,000 rubles.

A typical configuration was selected using information from the website of the KEY Computer Center store. (http://www.key.ru/)

Conclusion on the first stage

Upon completion of work on the first stage of the course project on computer networks and telecommunications, I compiled a list of all software installed on workstations. A typical workstation configuration was drawn up, taking into account system requirements, application and system software, and the required amount of memory on the hard disk was calculated by summing the amount of memory required for the software. RAM and processor are selected taking into account the system requirements of applications, with a margin of 30%.


Stage 2. Design stage

Targets and goals

The purpose of the second stage of the course project is to develop specifications for communication equipment, the cost of work and plans for LAN workrooms, indicating the location of PCs and cable lines in them.

For each room, it is necessary to draw up a specification of communication equipment, after which, draw up a general plan for all LAN rooms and a specification for all equipment.

Choice cable system

The choice of cable system depends on the intensity of network traffic, information security requirements, maximum distance, requirements for cable characteristics, implementation cost.

Twisted pair (twistedpair) - a type of communication cable, it is one or more pairs of insulated conductors twisted together and covered with a plastic sheath. It is twisting that prevents some types of interference induced on the cable. Typically, 10Base-T Ethernet uses a cable that has two twisted pairs. One for transmission and one for reception (AWG 24).

Thin coaxial (RG-58 or "Thin Ethernet") - an electrical cable consisting of a central conductor and a screen arranged coaxially and used to transmit high-frequency signals. Impedance 50 Ohm, diameter 0.25 inches, maximum cable segment length 185 meters. Rule 5.4.3 applies. Standard 10BASE2 . Coaxial cable is more noise-resistant, signal attenuation in it is less than in twisted pair.

Passive LAN network equipment includes:

1) The cable itself

2) RJ-45 wall sockets

3) Patch panels

4) Repeaters

5) Patch cords (subscriber cords) with RJ-45 connectors (cable for connecting wall sockets with connectors on network adapter computer).

Laying of cable systems in the working premises is carried out on the basis of the drawn up plan of this premises, taking into account the specification for consumables and components of this premises.

When designing cabling systems, the characteristics and limitations of the various cabling systems must be taken into account:

1) The maximum length of the cable segment according to its type

2) Cable bandwidth

3) Availability of equipment that provides interaction with other cable systems

After analyzing the characteristics of different types of cable, physical location computers, we choose a 10Base-T twisted pair cable and a thin coaxial cable.

Choosing a network topology

Network topology - a way to describe the configuration of a network, the layout and connection of network devices.

There are several options for topologies for designing and building a network. Below is a description of some of them.

Bus topology

The common bus topology assumes the use of a single cable to which all computers on the network are connected. A message sent by a workstation propagates to all computers on the network. Each machine checks - to whom the message is addressed, and if it is, then it processes it. Special measures are taken to ensure that when working with a common cable, computers do not interfere with each other to transmit and receive data.

With such a connection, computers can only transmit information in turn, because there is only one communication line. V otherwise the transmitted information will be distorted as a result of superposition (conflict, collision).

Fig.1 Topology Common bus

The bus is not afraid of failures of individual computers, because all other computers on the network can continue to communicate normally. In addition, since only one cable is used, in the event of a break, the operation of the entire network is disrupted. It may seem that the bus is not afraid of a cable break, since in this case two fully functional buses remain. However, due to the peculiarity of the propagation of electrical signals over long communication lines, it is necessary to provide for the inclusion of special devices at the ends of the bus - Terminators.

When building large networks, there is a problem of limiting the length of communication between nodes, in which case the network is divided into segments that are connected by various devices - repeaters, hubs or hubs. For example, Ethernet technology allows you to use a cable no longer than 185 meters.


Fig. 2 Common bus topology with repeaters

Advantages:

1) Short network setup time;

2) Cheapness (requires less cable and network devices);

3) Easy to set up;

4) The failure of the workstation does not affect the operation of the network.

Flaws:

1) Any problems in the network, such as a cable break, the failure of the terminator, completely destroy the operation of the entire network;

2) Complex localization of faults;

3) With the addition of new workstations, network performance drops.

Topology star

A star is a topology with a clearly defined center to which all other subscribers are connected. The entire exchange of information goes exclusively through the central computer, which thus bears a very large load, so it cannot do anything other than the network.

As a rule, it is the central computer that is the most powerful, and it is on it that all the functions of managing the exchange are assigned. In principle, no conflicts in a network with a star topology are possible, since management is completely centralized.

The failure of a peripheral computer does not affect the functioning of the rest of the network, but any failure of the central computer makes the network completely inoperable. Therefore, special measures must be taken to improve the reliability of the central computer and its network equipment. A break in any cable or a short circuit in it in a star topology disrupts the exchange with only one computer, and all other computers can continue to work normally.

Fig.4 Topology Star

In a star on each communication line there are only two subscribers: the central one and one of the peripheral ones. Most often, two communication lines are used to connect them, each of which transmits information in only one direction. Thus, there is only one receiver and one transmitter on each link. All this greatly simplifies network equipment in comparison with the bus and eliminates the need for additional external terminators. The problem of attenuation of signals in the communication line is also solved in the "star" easier than in the "bus", because each receiver always receives a signal of the same level.

Based on the star topology, you can build various other types of topologies, as if expanding it. For example, you can add another hub with a certain number of ports to an already existing hub in the network and thereby add new users to the network.

This topology is based on a twisted-pair cabling system, although if you use a hub with an additional port for connecting with coaxial cable, you can use this connection. For example, you can connect several more workstations to a common network according to a topology, such as a “bus”. Thus, almost any mixed topology can be made from this topology.

Advantages:

1) the failure of one workstation does not affect the operation of the entire network as a whole;

2) good network scalability;

3) easy troubleshooting and breaks in the network;

4) high network performance (subject to proper design);

5) flexible administration options.

Flaws:

1) the failure of the central hub will result in the inoperability of the network (or network segment) as a whole;

2) networking often requires more cable than most other topologies;

3) the finite number of workstations in the network (or network segment) is limited by the number of ports in the central hub.

Based on all the above information about networking topologies, their advantages and disadvantages, as well as in accordance with the characteristics created network, choose the topology "star-tire".

Inspection of the selected premises.

All facilities (rooms 30, 36 and 39) are located on the third floor and are intended for conducting practical classes for students on a PC. In these offices, we will conduct an infological survey, draw up diagrams, calculate the required amount of equipment and its cost.

Below is a plan of the first network object, office No. 30. It includes 15 workstations.


Scheme 1. Plan of the office No. 30

Legend:

Table 8. Communication Equipment Specifications for Room #30

Name Units Quantity Price, rub.) Cost, rub.) Note
I Consumables
1 meters 44 140 6167 3m to climb the wall,
2 Coaxial cable RG-58 C/U, coil 100m meters 43 14 619 3m to climb the wall,
II Accessories
1 bracket 19"" 3U Things 1 638 638
2

concentrator

16xRJ-45, 1xBNC, 19"

things 1 2613 2613
3 BNC connector RG-58(P) crimp things 31 16 496
4 BNC connector RG-58( M) crimp Things 1 25 25
5 BNCT connector (M-M-M) Things 15 67 1008
6 Cable BNC (P) - BNC (P) 1.5 m Things 15 84 1272
7 BNC terminator 50 Ohm things 1 32 32
III Mounting
1 Meter 35 58 2030
2 Cable laying in a box Meter 34 14 493
3 Crimp RG-58 BNC-connector things 32 43 1392
4 Mounting the socket (BNCT-connector) in the box Things 15 87 1305
5 Things 1 725 725
6 Mounting the Hub in a Rack Things 1 435 435
7 LAN testing Ports 15 40 600
IV Total cost
TOTAL: 19851

The second object of the designed network (office No. 36) includes 16 workstations. Below is his plan.


Scheme 2. Plan of the office No. 36

Legend:

Table 9. Communication Equipment Specifications for Room #36

Name Units Quantity Price, rub.) Cost, rub.) Note
I Consumables
1 meters 262 9 2599 3m to climb the wall,
2 Box 40x20mm rectangular, white meters 43 140 6026 3m to climb the wall,
II Accessories
1 bracket 19"" 3U Things 1 638,08 638,08
2 Things 1 768 768
3 Things 1 4832 4832
5 Things 16 57 921
6 Things 32 25 819
III Mounting
1 installation of the box on the wall up to 50 mm Meter 35 58 2030
2 Cable laying in a box Meter 209 14 3030
3 Mounting an RJ-45 socket in a box Things 16 87 1392
4 Mounting the Bracket 19"" on the wall Things 1 725 725
5 Mounting the Switch in a Rack Things 1 435 435
6 Installation of patch panels in a box Things 1 435 435
7 Things 16 87 1392
8 LAN testing Ports 16 40 640
IV Total cost
TOTAL: 26684

The third object of the designed network (office No. 39) contains 3 workstations. Below you can see his plan.


Scheme 2. Plan of the office No. 36

Legend:

Table 10. Communication Equipment Specifications for Room #39

Name Units Quantity Price, rub.) Cost, rub.) Note
I Consumables
1 Cable "Twisted pair" 8 pr. 5E cat. (PCnet), bay 305m meters 56 9 555 3m to climb the wall,
2 Box 40x20mm rectangular, white meters 22 140 3083 3m to climb the wall,
II Accessories
1 bracket 19"" 3U Things 1 638 638,
2 Patch panel 19" 16 ports, cat. 5e, universal (PCnet) Things 1 768 768
3 Switch PLANET GSW-1600 16-port 10/100/1000BaseTX 19" Things 1 4832 4832
4 Socket 8P8C (RJ-45) category 5e, universal (PCnet) Things 3 57 172
5 Patch cord cat. 5e 0.5m (blue) Things 6 25 153
III Mounting
1 installation of the box on the wall up to 50 mm Meter 17 58 986
2 Cable laying in a box Meter 45 14 652
3 Mounting an RJ-45 socket in a box Things 3 87 261
4 Mounting the Bracket 19"" on the wall Things 1 725 725
5 Mounting the Switch in a Rack Things 1 435 435
6 Installation of patch panels in a box Things 1 435 435
7 Crossing the patch panel (crimping, cable cutting, bundling) Things 3 87 261
8 LAN testing Ports 3 40 120
IV Total cost
TOTAL: 14079

The general plan of the projected LAN

Diagram 4. General plan of the LAN

Legend:

Table 11. Specifications of the territory, outside the offices

at Name Units Quantity Price, rub.) Cost, rub.) Note
I Consumables
1 Cable "Twisted pair" 8 pr. 5E cat. (PCnet), bay 305m meters 130 9,92 1289,60 3m wall climb
2 Box 40x20mm rectangular, white meters 85 140,16 11913,60 3m wall climb
II Accessories
1

Switch

5-port wall-mounted

Things 1 1285,76 1285,76
2 RJ-45 plug for round stranded cable Things 8 2,88 23,04
III Mounting
1 Box installation (< 60 мм) на стену из легких материалов высота >2 m Meter 68 72,50 4930,00
2 Cable laying in boxes height > 2 m Meter 104 17,50 1820,00
RJ-45 connector crimp Things 8 43,50 348,00
IV Total cost
TOTAL: 21610

Conclusion on the second stage

When working on the second stage, plans for classrooms were drawn up, a general plan for laying a LAN, as well as tables of consumables. Information about the number of cables, components, as well as installation work and their cost is contained in the tables.

The total amount of consumables, components and installation work amounted to 82,224 rubles.

Stage 3. Network configuration calculation

Targets and goals

At this stage, it is necessary to draw up a plan for calculating the network diameter, indicating workstations, room sizes, and, according to the plan, draw up a table for calculating the network diameter. Also, according to the compiled table, draw up a block diagram and, according to the diagram, calculate the performance of the designed LAN.

Mesh diameter calculation

The method for determining the network diameter can be presented in the form of a table. The numbers of rows and columns in it correspond to the identifiers of workstations on the general LAN plan, and the cell values ​​in the table correspond to the distance between workstations with the row number and column number. In this case, the diagonal elements do not contain values.

The maximum value in this table will be equal to the diameter of the network in the collision domain of this LAN.

Table 12. Network diameter calculation

WS1 WS3 WS4 WS19 WS20 WS34
WS1 29.10 m 43.42 m 76.15 m 98.48 m 128.41 m
WS3 29.10 m 45.74 m 78.47 m 103.80 m 133.73 m
WS4 43.42 m 45.74 m 32.73 m 156.98 m 186.91 m
WS19 76.15 m 78.47 m 32.73 m 144.45 m 174.38 m
WS20 98.48 m 103.80 m 156.98 m 144.45 m 29.93 m
WS34 128.41 m 133.73 m 186.91 m 174.38 m 29.93 m

In order for the designed LAN to work correctly, 3 conditions must be met:

1. The number of workstations should not exceed 1024 pcs.

2. Double propagation delay (PDV) between two stations should not exceed 575bt.

3. Reducing the interframe distance when all frames pass through all repeaters should not exceed 49bt.

Structural diagram of the LAN

This structural scheme describes a LAN with a network diameter from WS4 to WS34.

Scheme 5. Network structure between offices No. 30 and No. 36

Payment PDV

When calculating PDV, it is necessary to use a reference table and initial data (footage, type of cable system, block diagram).

Table 13. PDV lookup table

Segment type Base of the left segment Intermediate base Right segment base Medium delay per 1 meter Maximum segment length
10BASE-5 11,8 46,5 169,5 0,866 500
10BASE-2 11,8 46,5 169,5 0,1026 185
100BASE-T 15,3 42 165 0,113 100
10BASE-FB - 24 - 0,1 2000
10BASE-FL 12,3 33,5 156,5 0,1 2000
Foilr 7,8 29 152 0,1 1000
AUI(>2m) 0,26 2+48

Payment PDV (from 1 to 4):

Left Segment1: 15.3+20.93*0.113=17.67bt

Intermediate Segment2: 42+50.96*0.113=47.76bt

Intermediate Segment3: 42+81.18*0.113=51.17bt

Right Segment4: 169.5+33.84*0.1026=172.97bt

Payment PDV (from 4 to 1):

Left Segment1: 11.8+33.84*0.1026=15.27bt

Intermediate Segment2: 42+81.18*0.113=51.17bt

Intermediate Segment3: 42+50.96*0.113=47.76bt

Right Segment4: 165+20.93*0.113=167.37bt

Since the obtained value is less than 575bt, this network passes the criterion of the maximum possible signal turnover delay, with a maximum network length of 186.91 m.

Payment PVV

Table 14. PVV bit interval table

Segment type Transmit segment intermediate segment
10BASE-2 16 11
10BASE-5 16 11
10BASE-FB 2
10BASE-FL 10,5 8
100BASE-T 10,5 8

Payment PVV (With 1 on 4 ):

Left Segment1: 100BASE-T - 10.5bt

Intermediate Segment2: 100BASE-T - 8bt

Right Segment4: 10BASE2 - 16bt

Payment PVV (from 4 to 1):

Left Segment4: 10BASE2 - 16bt

Intermediate Segment3: 100BASE-T - 8bt

Intermediate Segment2:100BASE-T - 8bt

Right Segment1: 100BASE-T - 10.5bt

This LAN according to the PVV criterion does not exceed 49bt. Thus, the designed LAN, represented by a block diagram, is fully operational. . Compliance with these requirements ensures the correct operation of the LAN even in cases where the simple rules network configuration.

Conclusion

While working on a course project, I studied the entire cycle of designing and implementing this LAN. A LAN was designed for the classrooms of one of the buildings of the Petrovsky College according to the Ethernet standard using a "Twisted Pair" and "Thin Coax" cable in all respects, using the 10Base-T and 10Base standards.

Calculations were made for the diameter of the LAN, and calculations for checking the operability of the LAN using the bit interval method. This method shows that the designed LAN is operational and meets all the requirements and criteria of the Ethernet standard.

    Computer networks. Classification of computer networks. ……………4

    Fast Ethernet network. …………………………………………………………..5

    network topology. ……………………………………………………...….eight

    Ensuring the safety of work in the Computing Center. ……….12

Computer networks. Classification of computer networks.

According to the principles of construction, computer networks are divided into local and remote (Fig. 1).

Computer networks


distant


Local


peer-to-peer

Multi-rank

Regional

International

Local networks are created, as a rule, in one organization or in one room.

The simplest variant of such a network is the connection of computers through parallel or serial ports. In this case, there is no need for any additional equipment. There should be only connecting conductors. Such a connection between computers is configured within the same room. It is used to transfer data from one computer to another. In this case, you can transfer data without the help of floppy disks. Any modern operating system shell has software tools that provide such data transfer.

In local peer-to-peer computer networks, computers are connected to the network through special network adapters, and the network operation is supported by the network operating system. Examples of such operating systems are: Novell Personal Net Ware, Net Ware Line, Windows for Workgroups.

All computers and their operating systems in local peer-to-peer computer networks must be of the same type. Users of this network can transfer data to each other, use shared printers, magnetic and optical disks, etc.

In a local multi-rank computer network, one more powerful computer is used, which is called a server, and other less powerful computers are called workstations. Servers use special system software that is different from the system software of workstations.

Remote computer networks are divided into regional and international. Regional ones are created in certain regions, for example, a state, and international ones provide a connection between your computer and another computer on the World Wide Web. An example of such networks is Relcom (for the CIS countries) and Internet (for the whole world). In principle, it is possible to access the Internet from regional computer networks.

The connection of computers in regional networks is provided by conventional telephone networks or networks specially allocated for this purpose through special devices called modems. The modem converts binary code signals to language range audio signals and vice versa.

Computers of a certain area (city) are connected via modems and communication lines to a more powerful computer, which is called a provider. More than 100 providers are currently operating in Ukraine.

Each computer user that is connected to the network is assigned details (address). Providers, using requisites, ensure the connection of the corresponding computers of users.

Communication between computers on different continents is carried out by satellite communication channels.

Regional computer networks can operate in different modes. The simplest is the email mode. It is used to transfer letters, documents, etc. from one computer to another.

Fast Ethernet network

Fast Ethernet is a Local Area Network (LAN) technology used to connect computers in a small area, such as an office, building, or group of buildings. Fast Ethernet is not designed for use in large areas like a large village or an entire city. In this it differs from global computing, which are systems designed to connect devices or LANs located at considerable distances from each other.

A simple definition of a LAN is that it is a system for connecting many computers directly. It can be said that this definition lacks academic precision, but it is practical and well suited to our purposes. Naturally, this definition needs some explanation. In particular, four words need clearer explanation: “system”, “direct”, “connection” and “many”. Networks are systems because they are made up of components such as cables, repeaters, network interfaces, nodes, and protocols. You may already be familiar with the term hub. The terms hub and repeater are often used interchangeably, but there are differences between the two in Fast Ethernet. All these elements work together and function as a network. If at least one of them is missing, then there is no LAN.

The term "connection" is easy to explain. The network assumes a connection, i.e. the way in which computers exchange information and/or data. It is the creation of a connection that is the primary task of a LAN or any other network. It is very important that the LAN imposes no restrictions on the type of data that nodes can exchange, except that this data must be digital. Most LANs are used to share files and printers. Almost every one of us is faced with a similar local area network. However, LANs and other networks are capable of transmitting video images, telephone conversations, and other information that can be represented in digital form.

The term “many” is also easy to explain. A network is not a network unless

contains two or more computers. It, of course, may contain other devices, such as printers. When referring to devices connected to a network, we use the general term nodes. The node communicates with the LAN using network interface. Thus, the local area network directly connects many nodes.

The word "directly" is of paramount importance in the definition of LAN. It is the direct connection that makes the network local. “Directly” means that any node on the LAN can communicate with any other node without the involvement of a third node or device as an intermediary, as opposed to WANs, which use local networks or other devices to communicate gateways.

Figure 2 shows three LANs connected via two wide area network (WAN) links. The nodes of each LAN can contact each other directly. When LAN node 1 communicates with LAN node 3, the data must pass through two gateways. The nodes of different LANs must be aware of the presence of a gateway and, if necessary, interact with it. Another common name for a gateway is a router. However, when using this term, remember that every router is a gateway, but not every gateway is a router.

On a separate Fast Ethernet LAN (or some other LAN), any two devices can communicate directly because they share a common transmission medium. Typically, this medium is a cable and/or other device that physically connects all components in the network. In other words, Fast Ethernet is common environment technology. All LAN nodes use the same transmission medium and the same data transfer rules. The main feature of a local area network is that any two nodes that need to exchange data do not have to communicate through intermediate devices.

A LAN is local because all computers on it are connected by a common environment. For networks of each type, rules are characteristic that determine

the physical connection of its components with each other and are called topological

rules.

Rice. 2. Local and global networks


Network topology

There are three main types of network topology: hub and beam (Hub and Spoke; often referred to simply as a “star”), ring and bus (Fig. 3). Computers in Fast Ethernet, like a 10Base-T Ethernet network, are physically connected using the first topology. We will use the term "star" to refer to the "hub and spoke" topology as the more common one.

Fast Ethernet and its predecessor Ethernet act as bus networks. In other words, Fast Ethernet physically uses a star topology, but logically acts like a bus network for historical reasons.

Concentrator and beam Ring Fig. 3.

In the early Ethernet networks from which Fast Ethernet originated, all nodes were connected to a single cable segment with T-connectors.

(T connector). In the first Ethernet networks from which Fast Ethernet is derived. All nodes were connected to a single cable segment with T-connectors. The first Ethernet networks used thick coaxial cable. Both of its ends ended (Fig. 4) with a device called a “terminator”. The described configuration is called 10Base-2 Ethernet or thin Ethernet. Other Ethernet bus technologies exist, notably 10Base5, often referred to as “thick” Ethernet, which uses a thick yellow cable.

Rice. 4. Ethernet bus network 10Base-2


It is easy to guess that such a connection scheme has certain limitations. The biggest problem is running a single piece of cable throughout the building. The next problem is that if a break or other damage occurs anywhere in the cable, the entire LAN goes down. The first Ethernet LANs could not be very large due to cable length limitations. To allow the network to grow, the concept of a repeater was introduced (Figure 5). The first repeaters were devices that connected two cable segments to form one LAN.



Rice. 5. First repeaters


The repeaters not only connected two pieces of cable, but also filtered the electrical signals passing between the segments. The first repeaters had another advantage: if there were problems in any section of the cable (for example, a short circuit), then the nodes connected to other segments could still interact with each other. This approach is called splitting(partitioning) and is used in modern Ethernet and Fast Ethernet networks to isolate network components that can cause problems. Although repeaters are physically connected to the cable segments, they are low-level electrical devices that are invisible to nodes. Therefore, the entire system acts as a single LAN.

Newer technology (meaning 10Base-T) introduced the concept hub repeater, usually referred to simply as a hub or repeaters. A hub is a device to which each network node is connected instead of being connected with a T-connector to a common cable (Fig. 6).

Rice. 6. Basic repeater
The hub occupies the space allotted in the bus network for the cable and

T-shaped connections. Each node is connected to the hub with a separate cable (Fig. 4). Inside the hub there is a digital bus to which all nodes are connected through the repeater port. The internal digital bus occupies the space allocated to the coaxial cable in the bus network. The repeater ports are designed to perform the same functions as bus repeaters (Figure 5). The difference between them is that the hub has not two, but many (up to 32) ports. In the case of an Ethernet network, this technology is called 10Base-T, and in the case of Fast Ethernet, 100Base-T.

The use of a hub provides some advantages and simplifies cabling. Moreover, it is much easier to install a hub, since the connections go from the center to each network node. All telephone systems are arranged in a similar way. In addition, low-cost unshielded twisted-pair cable is used to connect the nodes to the hub. In 10Base-T technology, a regular telephone cable was used for this purpose, which greatly simplified laying the network in old buildings. Often there was no need to lay a new cable at all, since the signals passed through the already existing telephone cable. Twisted pair can also be used in Fast Ethernet.

Using a cheap twisted pair cable really reduces the cost of the network. However, the biggest advantage of hubs is that they are, to some extent, "intelligent" devices that control every connection on the network. In addition, Ethernet and Fast Ethernet repeaters have many new features. True, while Ethernet supports two physical topologies - a bus and a star, Fast Ethernet supports only a star. Fast Ethernet network cannot work on coaxial cable.

One of the things that Ethernet and Fast Ethernet have in common is that nodes and repeaters are able to check the integrity of the connection. When the cable is connected correctly, an indicator (usually an LED) turns on. Many hubs, as noted earlier, automatically disconnect nodes that cause too many problems on the network.

When working with Ethernet and Fast Ethernet, these terms are used interchangeably. In the case of other technologies, they often mean different things. The hub is usually located in the center, and all connections from the nodes lead to it. Hubs are often simply mechanical devices for connecting cables and terminating them. For example, telephone risers are a form of wired hub.

In Ethernet and Fast Ethernet, a repeater is a device that replicates (repeats) electrical signals passing between two or more devices. Early two-port repeaters simply connected two segments of coaxial cable. Fast Ethernet repeater hubs combine the functions of a hub and a repeater. For convenience, they are simply called repeaters, as this is the term specified in the Fast Ethernet specification. The repeater can be made as a separate unit or a board built into a larger chassis. Sometimes it is assembled from separate devices called stackable hubs(stackable hubs).


Ensuring the safety of work in the Computing Center


The Computing Center widely uses digital computing technology (personal computers) for various calculations, in this regard, ensuring the safety of work is very important. Below are the main safety precautions used during operation.

Safety

when working with a personal computer


When starting to work with a personal computer, you must always remember that this is a very complex and expensive equipment that requires careful and careful handling, high self-discipline at all stages of working with a computer.

The power supply voltage of a personal computer (220 V) is dangerous for human life. In this regard, the design of computer blocks, interblock connecting cables provides for sufficiently reliable isolation from conductive sections. The user practically deals with several power switches and is seemingly immune to electric shock. However, in practical work there are unforeseen situations, and so that they do not become dangerous for the user, it is necessary to know and strictly follow a number of safety rules. This will help not only to avoid accidents and maintain health, but also guarantee the safety of the equipment.

Particular care must be taken when working with a display whose cathode ray tube uses high voltage and is a source of electromagnetic radiation. Improper handling of the display and other electronic equipment may result in severe electric shock or equipment fire. For this reason, strictly PROHIBITED:

In the event of a burning smell, unusual sounds, or spontaneous shutdown of the equipment, you must immediately turn off the computer and inform the appropriate personnel.

    Working on a computer requires constant attention, clear actions and self-control. In this regard, the computer cannot be used in poor lighting, high level touching the screen and the rear side of the display, power wires and grounding devices, connecting cables;

    violate the order of turning on and off the hardware units, try to independently eliminate the identified malfunction in the operation of the equipment;

    place foreign objects on the equipment;

    work on the computer in wet clothes and with wet hands.

While working on the computer NECESSARY:

    strictly follow the instructions for use of the equipment;

    carefully monitor the serviceability of the main blocks and devices;

    work on the keyboard with clean hands, do not press certain keys unnecessarily;

    when working with floppy disks, protect them from impacts, torsion, magnetic field or heat, do not touch the floppy disk, insert the floppy disk into the disk drive only after it is turned on, making sure that the diskette is correctly oriented relative to the disk drive slot;

    during a break in work, turn off the computer only if the processing of the current information is completed and the contents of the RAM are stored on magnetic disks (otherwise the information may be lost);

While working on a computer, the display cathode ray tube emits electromagnetic radiation, which, when used close to the screen, is detrimental to vision, causes fatigue and reduces performance. In this regard, it is necessary to work at a distance of 60-70 cm from the screen, to maintain the correct posture, without slouching or bending over.

Electrical hazard and protection against electric shock

There is a potential risk of electric shock when setting up computer room equipment and laying network cables.

Human activity today is unthinkable without the use of electric current. A unified energy system has been created in Ukraine, the capacities of power plants are huge, the voltage of power transmission lines reaches thousands of kilovolts.

The human body is a good conductor of electricity. In the event of an accidental (emergency) inclusion of a person in an electrical circuit, the current has on him damaging effects of varying severity, up to death. If we take the number of victims of electric current as 100%, then the number of people whose profession is related to electricity is about 50%.

An analysis of the causes of accidents shows that human contact with wires and current-carrying parts often occurs by accident and is not caused by production necessity. In addition, electric shocks occur when voltage is applied incorrectly during repairs and inspections of electrical networks. From this we can conclude that the psychological factor plays a decisive role in ensuring electrical safety. When constantly working with electrical installations that are energized, you should always be aware of the danger of electric shock.

The most severe human injuries are electric shock and electric shock. With an electric shock, the body as a whole is damaged, accompanied by loss of consciousness and muscle cramps, and then the cessation of breathing and heart function. With spasms of the motor muscles of the chest, suffocation can occur, and with fibrillation (random contraction) of the heart, death from acid starvation can occur.

The degree of electric shock to a person depends on many factors. These include: voltage and current strength, the time of its exposure, the paths along which the current passes through the human body when it is included in the circuit, the type of current (direct or alternating), and also the frequency of the alternating current.

The paths of current passing through the human body can be different: from hand to other hand, from hand to foot, from foot to foot. The most dangerous is the passage of current from hand to hand, when the heart and

human lungs; the risk of serious injury is greatly increased.

The action of current on a person as a biological system goes through four stages:

    the onset of sensation (0.5–1.5 mA AC and 5–7 mA DC) is itching. burning, slight tingling;

    convulsions (8–16 mA AC and 40–80 mA DC), due to which a person cannot independently get rid of contact with current-carrying parts, and due to convulsions of the vocal cords, call for help;

    clinical death (the striking characteristics of the current depend on the paths of its passage through the body and the individual data of the person) - there is no breathing and the work of the heart stops;

    biological death that occurs 3-7 minutes after clinical death as a result of the irreversible process of decay of the cells of the cerebral cortex without oxygen supply.

To avoid electric shock, the computer equipment was set up and the network cables were laid with the power turned off.


In the Computing Center, during various kinds of work, safety and fire safety are observed. The following are instructions on fire safety and safety precautions when working with computers in display classes, the main provisions of which are guided during work.


Agreed with Approved

State Fire Supervision Vice-Rector for AFC

Shiryaev V.A.

INSTRUCTIONS

according to the fire regime

Computing Center USMTU


Responsible persons for the fire regime in educational institutions, laboratories are the heads of laboratories, workshops, warehouses.

In accordance with the order, these persons are responsible for the implementation of all fire safety rules and regulations at the facilities.


Responsible persons must:

Clearly know the features of their facilities, the specifics of production, the rules of the fire regime and exercise daily control over their implementation.

Know the location of fire extinguishing equipment, be able to use them and keep them ready for use.

To organize a fire-fighting technical minimum for workers and employees, to demand strict observance of fire safety.

The locations of heating electrical appliances should be equipped in accordance with fire safety rules: sheet metal, asbestos, ceramics.

It is forbidden:

    smoking in undesignated and unequipped places, contaminating work tables, cabinets, change houses, floors with fuel and lubricants, using open flames of blowtorches;

    leave unattended operating installations, burner devices, electric stoves, irons, soldering irons, lamps;

    obstruct entrances and exits from the premises, as well as access to fire extinguishing equipment.

Persons responsible for the fire regime are obliged to develop plans for the evacuation of people, material assets in case of fire and to acquaint employees with them.

In case of fire, call the fire brigade by phone number 01, meet her. Prior to the arrival of the fire brigade, take all measures to eliminate the fire. Employees who violate the fire safety regime are held accountable.


Agreed I approve
Head of SOT UGMTU Vice-Rector of the Academy of Arts and Sciences

Konstantinova L.V. Shiryaev V.Ya.

Safety instructions

when working with computers in display classes

computer center USMTU


When working with computers in display classes, it must be remembered that computers, displays and other electrical equipment are a source of increased danger. To avoid electric shock, it is strictly prohibited to:

    touch the screen and the back of the display, power wires, grounding devices and connecting wires.

    violate the order of turning on and off the hardware units, independently eliminate the identified malfunction in the operation of the equipment.

    place foreign objects on the equipment.

    work on a computer in wet clothes and with wet hands.

In the event of a burning smell, unusual sounds, or spontaneous shutdown of the equipment, it is necessary to turn off the computer and notify the teacher or maintenance personnel about what happened.


During operation of the computer, the cathode-ray tube of the display is a source of electromagnetic radiation and negatively affects vision and performance, therefore, it is necessary to work at a distance of 60-70 cm from the screen and adhere to the correct fit.


Head of the Computing Center Nor S.P.


Bibliography

    Quinn Laem, Russell Richard. fast ethernet. / Ed. K.Korolkova - Kiev: BHV, 1998. - 444p.

    Rudenko V.D., Makarchuk A.M., Patlanjoglu M.A. / Under. ed. Academician of the APS of Ukraine Madzigon V.M. - Kiev: Phoenix, 1997. - 304 p.

    Figurnov V.E. IBM PC for the user. - Moscow, 1996. - 432p.

SheetIzm Sheet

Document No.

Signature Date






8.092201.3362.






Ministry of Education and Science of Ukraine

UKRAINIAN STATE MARINE TECHNICAL UNIVERSITY

Department of electrical equipment of ships


REPORT

on production practice

at the Computing Center of USMTU


Head of the department

Associate Professor ___________ Piskunov A.M.

(signature, date)

Head from

Computing Center ___________ Nor S.P.

(signature, date)

Executor

student of group 3362 ___________ Kirichenko A.S.

(signature, date)


Nikolaev 2001


Ukrainian sovereign

maritime technical university

Individual assignment and practice protocol

Student of specialty ___ 8.092201 ____

_________________Electrical systems and complexes _________________________

_______________________vehicles ___

Student ___________ KirichenkoAAlexander Sergeevich _____________________________

Group ___ 3362 ___ Type of practice __________ production _______________________

Place of practice __________ Computing center USMTU ________________________

Practice term_________ With _25.06.01 _to 15.07.01 _________________________

University certifier _________ Piskunov _A.M. ________________________________

Carrier type of business _________ Nor _S.P. ______________________________________


________________________________L i n i i v i d r i z y_ ________________________________

  1. Individual task

1.1.Vivchiti

___________to get acquainted with the classification of computer networks; explore _____types of network topology, justify their advantages and disadvantages ___________

__________________________________________________________________________________________


1.2. Explore (carry out an analysis, make a description) ______ analyzeopportunities ___applicationsnetworksFast ethernetin the computer room of the Computing Center, _justify its advantages and disadvantages_____________________________________


1.3.Vivchiti protection practice and safety equipment ______________________________________ familiarize yourself with the rules of technology ______safety at work and fire safety rules_____ ____ ____________________________________________________________________


“___”____________2001 p. Curriculum for the university _____________

CH A R A C T E R I S T I C A

student internship

(Visnovki pіdpriєmstva about the work of the student during the period of practice: training period, technical skills, moral and business strength, initiative, discipline, communication skills, forecast of professional activity) ___________________________________________________________________

___________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________


“___”___________2001 p. Ker_vnik workshop, vіddіlu

laboratories _____________()

Place of seals Ker_vnik of practice

undertakings ____________ ()


__________________________________L i n i i v i d r i z y _______________________________

  1. Practice protocol

2.1. Number of missed days per practice term: ___ due to reasons

____ for unimportant reasons.


2.2. Evaluation of the stone worker by type of business:

____________________________________________________________________

labor discipline __________________________________________________


“___”______________2001 p. _____________________

2.3.Assessment of a university student:

vikonannya іindivіdualnogo zavdannya ____________________________________

____________________________________________________________________

labor discipline _________________________________________________________


“___”______________2001 p. _____________________

Similar Documents

    Classification of local networks by topology. Ethernet network architecture. Functional diagram of a local area network. Network equipment configuration: number of servers, hubs, network printers. Typical domain usage models.

    thesis, added 05/08/2011

    The principle of activity of LLC "MAGMA Computer". Features of the subject area. The purpose of creating a computer network. Network configuration development. Choice of network components. List of functions of network users. Network information security planning.

    term paper, added 09/17/2010

    The choice of protocol and technology for building a local area network based on the bandwidth - 100 Mbps. Choice of network equipment. Drawing up a network plan to scale. Configuration of servers and workstations. Calculation of the cost of ownership of the network.

    term paper, added 01/28/2011

    Connection of workstations to a local computer network according to the IEEE 802.3 10/100 BASET standard. Calculation of the twisted pair length spent on the implementation of the network and the number of RJ-45 connectors. Construction of the topology of the local computer network of the institution.

    term paper, added 04/14/2016

    Selection of the configuration of workstations, server and software for connection to the local computer network. Organization of a local network, its basis on the "star" topology. Antivirus protection, browsers, archivers. Features of network settings.

    term paper, added 07/11/2015

    Enterprise equipment configuration. Tasks solved by a computer network. Analysis of information flows. Data transfer protocol. Selecting a network operating system. Address space allocation. Protection of stations in the central office.

    thesis, added 03/20/2017

    Selection of passive network equipment. Substantiation of the need to modernize the local computer network of the enterprise. Choice of operating system for workstations and server. Comparative characteristics D-Link switches. Local network diagrams.

    term paper, added 10/10/2015

    Setting up the telecommunications equipment of the local area network. Choice of network architecture. Server configuration services. Cable calculation, selection of equipment and software. Description of the physical and logical schemes of the computer network.

    term paper, added 12/22/2014

    Choice of local area network among peer-to-peer and server-based networks. The concept of network topology and basic topologies (star, common bus, ring). Network architectures and protocols, information security, anti-virus systems, network equipment.

    term paper, added 07/15/2012

    An integrated approach to the organization of IT operations. Simplify IT infrastructure and reduce costs. Improve application performance. IBM server configurations, their characteristics. Additional equipment for the server, software.

INTRODUCTION Objectives of practice: 1. Consolidation of theoretical knowledge obtained in the study of disciplines: the organization of computers and systems, system software, databases, computer networks and telecommunications, peripheral office equipment; 2. Familiarization with production processes, including the use of computers and information technologies; 3. Studying the methods of formation, processing, accumulation and use of information flows in the production process; 4. Acquisition of skills for the use of autonomous and integrated computing systems ; 5. Analysis of achievements and shortcomings in the activities of the organization. Topic of practice: 1. Studying the principles of building and functioning of a local area network in a particular organization. As a place for passing production and technological practice, I chose the organization "Snegovik Plus" LLC. The internship period is four weeks, from June 15 to July 13, 2004. Structure of the enterprise: Director Masov Evgeniy Nikolaevich. There are 20 people in his subordination: an accountant, loaders, drivers, technicians, sellers. MAIN PART As a result of passing the production and technological practice, the student must know: General principles of construction and architecture of computers; Principles, methods and methods of integration of hardware and software in the creation of computing systems, complexes and networks; Models, methods and forms of organizing the process of developing a software product, a technical product; The main features of database management systems and their use. In addition, he must learn to: 1. Use technical and reference literature, sets of standards for the development of a software product, a technical product; 2. Use the knowledge and skills acquired during the training process for the competent and technically sound development of a software product, a technical product; 3. Design a software product, a technical product; 4. Develop programs of modular structure; 5. Apply methods and means of testing and testing a software product, a technical product; 6. Use debugging tools; LLC "Snegovik plus" Carries out the implementation of wholesale products in Ulyanovsk. I did an internship in the technical department under the guidance of a programmer Vorlamov N.F. Database management on deliveries and the quantity of goods in warehouses is carried out using computers with the Windows 95 or Windows 98 operating system. In order to save the time of transferring information from one computer to another, the Director of this company decided to make a local area network in his organization. The technical department was tasked with laying a network to every computer in the firm. The technical department has started the task. First, we had to project on the spot what kind of network we should use the Local Area Network with a central Server. See Appendix 1 The simplest variant of such a network is the connection of computers through parallel or serial ports. In this case, there is no need for any additional equipment. There should be only connecting conductors. Such communication between computers is configured within one or more rooms. It is used to transfer data from one computer to another. In this case, you can transfer data without the help of floppy disks. Any modern operating system shell has software tools that provide such data transfer. In local peer-to-peer computer networks, computers are connected to the network through special network adapters, and the network operation is supported by the network operating system. Examples of such operating systems are: Novell Personal Net Ware, Net Ware Line, Windows for Workgroups. All computers and their operating systems in local peer-to-peer computer networks must be of the same type. Users of this network can transfer data to each other, use shared printers, magnetic and optical disks, etc. In a local multi-rank computer network, one more powerful computer is used, which is called a server, and other less powerful computers are called workstations. Servers use a special system software , which is different from the system software of workstations. main parts of the network. For our network, we used twisted pair cable or 10BaseT Twisted Pair coaxial cable. Twisted-pair connectors Twisted-pair networks include 10BaseT, 100BaseTX, 100BaseT4, and very likely the adoption of the 1000BaseT standard. In the network cards of computers, in hubs and on the walls, there are sockets (jack), plugs (plug) are stuck into them. Twisted Pair Connectors Eight-pin Modular Connector (Plug) Common name "RJ-45" ​​The "RJ-45" ​​plug is similar to the plug from imported phones, only slightly larger and has eight pins. 1 - contacts 8 pcs. 2 - connector retainer 3 - wire retainerView from the contact side Contact 1 2 3 4 5 6 7 Contact 8View from the cable sideFront view ) wires and stick into the core (1). Plugs are divided into shielded and unshielded, with and without insert, for round and flat cables, for solid and stranded cables, with two and three prongs. It is useful to install a protective cap on the cable together with the plug. Plug with insert The cable wires, untwisted and arranged in accordance with the method you have chosen, are inserted into the insert until it stops, the excess is cut off, then the resulting design is inserted into the plug. The fork is crimped. With this method of installation, the length of the untwisting is minimal, installation is easier and faster than using a conventional plug without an insert. This fork is a little more expensive than a regular one. Connecting dimensions (in mm) Connectors for 10Base-T Eight-pin modular connector. Socket (jack) and socket (outlet) Jacks are installed in network cards, hubs, transceivers and other devices. The connector itself is a row (8 pcs.) of springy contacts and a recess for the plug lock. If you look at the socket from the side of the contacts, when they are located below, then the countdown goes from right to left. A socket is a socket (connector) of a connector with some kind of cable attachment device and a housing for ease of installation. It also includes a fork. Sockets, as well as cables, come in different categories. On the body of the outlet is usually written what category it belongs to. When building 10Base-2 networks, you must use category 3 (Cat.3) or better 5 (Cat.5) sockets. And for 100Base-TX networks, only Cat. 5 . Sockets of the 5th category are also divided according to the method of installing the cable in the socket itself. There is a fairly large number of solutions, both supported by any one particular company, and quite generally accepted - "type 110", "type KRONE". It should be noted that KRONE is also such a company. In general, a huge number of different types of sockets are produced, but for the home you have to use the cheapest - external ones. A conventional socket is a small plastic box that comes with a screw and a double-sided sticker for wall mounting. If the wall covering allows, it is easier to use the sticker, if not, you will have to drill the wall and screw the socket with a screw. On one side of the case there is a connector for turning on the RJ-45 plug; By the way, there are sockets that have two or more connectors in the case. To remove the cover from the box and get to the inside of the socket, you need to show a lot of patience and resourcefulness. The lid is held on by internal latches, which are usually not marked on the outside. In my opinion, manufacturers compete with each other and with the user which outlet is harder to open. It is necessary to detect these latches, then there are two possibilities: the latches open either inward (which is less common) or outward. The latches that open inward must be pressed, and those that open outward must be hooked with something. It is useful when buying to ask to be shown how the outlet opens. After removing the cover, depending on what type of outlet you have, you will find wire fasteners and a connector. Network cards are used to connect the network to the computer. PCI network card Combined network card (BNC+RJ45), PCI bus Simultaneous use of two connectors is not allowed. 1 - Connector for twisted pair(RJ-45) 2 - Connector for coaxial wire (BNC) 3 - PCI data bus 4 - Socket for BootROM chip 5 - Board controller chip (Chip or Chipset) PCI slot There is also a PCI data bus (connectors white color ). Network cards designed for PCI must be inserted into the PCI slot. On the computer Server setup. Servers Server Functions Windows95(Windows98) Enter "Control Panel" (Start->Settings->Control Panel)Select "Network"In the "Configuration" tab, click the "Add" button. "Select Component Type" menu Select "Service" and click Add. Window "Select: Network Service". Set "Manufacturers" to "Microsoft" and "Network Services" to "File and Printer Sharing for Microsoft Networks". Please note that at the beginning this inscription is not fully visible and you need to scroll it to the left so as not to make a mistake. Click "OK". If you also want to add access to your computer via http (or www), then again go to the "Select: Network Service" window and select "Microsoft", "Personal Web Server". Click OK. Network window. Make sure the distribution is available. Click "OK". A window will appear showing the process of copying files. Finally, you will be prompted to reboot the system by clicking "Yes". After rebooting, go online, and select the icon (icon) "My Computer". In the window that appears, right-click on the drive that you want to make available on the network. If you want to make available not the entire disk, but some of its directory (directory), then double-click on this disk with the left button, right-click on the directory you need. In the menu that appears, select the access item. The "Properties: .. ." In which it is indicated that this resource is local. Select the "Share" item, the drive letter or directory name will become the network name. You can change this however you like, subject to some restrictions on the characters used. I usually leave it as is so I don't get confused later. Here you can also change the type of access and restrict all this with passwords. Click "OK" In a second, your resource will be available over the network. DIARY OF PRACTICE June 15 - Acquaintance with the Programmer, inspection of the place of internship; June 16 - Studying the rules of the enterprise's internal regulations; June 17 - I selected literature on the topic of the assignment, studied software (Novell Personal Net Ware, Net Ware Line, Windows for Workgroups.); June 18 - Studying software; June 21 - Studying software; June 22 - Inspection of the object; June 23 - Network design; June 24 - Purchase of material and tools; June 25 - Preparation of the object for work; June 28 - Preparation of the object for work; June 29 - Laying the network; June 30 - Laying the network; July 1 - Checking the network's ability to work (Break) ; July 2 - Installation of equipment and connection of devices; July 5 - Installation of equipment and connection of devices; July 6 - Installation of the Operating System, Drivers for Computers; July 7 - Installation of the Operating System, Drivers for Computers; July 8 - System setup; July 9 - Setting up the main server; July 12 - System and network testing; July 13 - Writing a practice diary; CONCLUSIONS: Being at this enterprise I: 1. Complied with the rules of labor protection and safety; 2. Complied with the rules established for employees of the enterprise, including those on labor regulations, fire safety, confidentiality regime, responsibility for the safety of property; 3. Studied the current standards, specifications, job responsibilities, regulations and instructions for the operation of VT; 4. Studied the rules for the operation and maintenance of BT equipment, research facilities available in the unit; 5. Mastered individual computer programs used in the professional field (Novell Personal Net Ware, Net Ware Line, Windows for Workgroups); 6. Mastered the work with periodical, abstract and reference information publications on informatics and computer science; Carried out the tasks provided by the program of practice. one

Introduction
Chapter 1. Analysis of the structure of the organization, description of the hardware and software of the organization
1.1 Structure of the organization
1.2 Description hardware organizations
1.3 Description of the software used in the organization
1.4 Description of the activities of the information technology department of the organization
Chapter 2. Ensuring stable operation of computer systems and complexes
2.1 List of instructions required for organizing the workplace of a computer system adjuster or a hardware and software system adjuster.
2.2 Examine the system of preventive maintenance of computers in the organization
2.3 Description of monitoring, diagnostics and recovery of computer systems and complexes
2.4 Identification of shortcomings in the system for ensuring the stable operation of computer systems and complexes. Suggestions for improving this system
Chapter 3. Description of the information system used in the organization
3.1 Analysis/development of the structure of the information system
3.2 Description of the database management system/software used for development
3.3 Description of the main objects of the information system
3.4 Instructions for users to work with the information system
3.4.1 Purpose of the program
3.4.2 Program execution conditions
3.4.3 Program execution
3.4.4 Operator messages
3.5 Description of means, methods of information protection when working with an information system
Conclusion
List of sources used

Introduction

Today the whole world communicates with the help of computers. Every family has high-tech machines; not a single enterprise works without them. Only not everyone knows how to talk to a computer in its language and make it understand the language of a person. To be an expert in computer systems means to be one step ahead of time. After all, nothing in the world is developing as fast as computer technology. No wonder they say: "The computer is outdated as soon as it went on sale."

Having learned how computer systems are arranged, you begin to understand the language of numbers, know computer-aided design systems, microprocessor systems and peripheral equipment. In other words, you begin to speak the same language with the computer. He, as a friend, teaches to solve problems, assess risks and make decisions in non-standard situations, which is very much appreciated by employers. The range of application of the knowledge of a computer network specialist is wide: from small salons to large enterprises - wherever there are computers, a system administrator is required - a specialist in computer systems and complexes.

In order to better prepare specialists for this profession, practical skills are required. For this purpose, practical classes are provided in educational institutions.

Practice in the profile of the specialty is a form of training in organizations (enterprises) of different forms of ownership and organizational and legal forms.

Practice in the profile of the specialty is carried out in order to study the general principles of the functioning of organizations and institutions for labor management and regulation of social and labor relations, employment services; principles of organizing the work of services and divisions dealing with the selection, placement and accounting of personnel, personnel departments, labor and wages, personnel management departments; as well as analysis of documentation supporting the activities of these services. It allows you to combine theoretical training with practical activities in specific workplaces. Practice tasks include:

  • monitoring, diagnostics and recovery of computer systems and complexes
  • system maintenance of computer systems and complexes
  • debugging of hardware-software systems and complexes;
  • installation, configuration and configuration of the operating system, drivers, resident programs;
  • maintaining customer databases;
  • demonstrating the capabilities of complex technical systems;
  • advising on the use of complex technical systems;
  • informing the consumer about the operating conditions of the selected options for technical solutions, license agreements.
  • During the practice in the specialty profile, it is necessary to perform the following types of work:
  • characteristics of the enterprise. Analysis of the external and internal environment of the organization;
  • description of the technical and software park of the enterprise;
  • development of methods and regulations for preventive maintenance of computer equipment;
  • development of a system for modernizing the technical and software park of the enterprise;
  • development of information security policy rules;
  • designing the organization's database structure;
  • general description of the configuration/database, interface, input and output forms;
  • configuring and setting up the database, setting data access privileges;
  • drawing up instructions for the user when using a particular database management system;
  • developing a presentation of the organization's products.

Chapter 1. Analysis of the structure of the organization, description of the hardware and software of the organization

1.1. Organization structure

Princip Company is one of the largest companies in the city of Smolensk, specializing in the production and sale of computers, solving network integration issues, as well as in the supply of office and mobile equipment, components and consumables.

The stores offer the widest selection of modern computer equipment: personal and laptop computers, monitors, office equipment from leading manufacturers (Samsung, Acer, Phillips, Toshiba, MSI, Intel, AMD, Asus, Dell, LG, Canon, Epson and many others).

Huge selection of consumables (paper, cartridges for inkjet and laser printers, toner, ink, etc.)

Today it is a supplier of many large state and commercial organizations in Smolensk and the Smolensk region.

It also became the first Smolensk manufacturer of computers certified according to GOST and having an international quality certificate ISO 9001. This allows us to speed up and simplify the process of servicing our customers' equipment and offer computers of the highest quality at the best prices.

It is the first Smolensk company to be a Microsoft Gold Certified Partner with the "Management of licenses in organizations" competence, offering customers software under various licensing programs, which allows them to choose the best option.

1.2. Description of the organization's hardware

Nowadays, the vast majority of organizations use modern automated systems and computer hardware, software and storage media.

The institution has 12 computers.

The computer hardware for the workstation includes:

  • processor type and frequency - Intel Core 2 Duo 2.4 Hz;
  • the amount of RAM - 2048 MB;
  • hard disk type and size - WDCWD1600AAJS-61 WAA0 (IDE500GB);
  • motherboard type - integrated;
  • type of video card - built-in;
  • type CD-ROM-DVD-R;
  • sound card type - built-in;
  • network card type - ETHERNET (100 MB/s);
  • BIOS type - rewritable;
  • monitor type and size - LCD 17''.

Workstation PC system software includes:

  • OS - Windows XP Professional;
  • manufacturer - Microsoft;
  • bit depth OS-32;
  • the file system used is NTFS;
  • type of supported interface - graphical.

Minimum requirements for computer architecture when installing this OS:

  • 2.4 Hz Intel processor or faster;
  • at least 64 MB of RAM (at least 128 MB recommended);
  • at least 1.5 GB of free hard disk space;
  • CD or DVD drive;
  • keyboard, Microsoft Mouse.

The organization has an S5000MB (S5332LNi) server as a server computer: Core i5-4590 / 8 GB / 2 x 1 TB SATA RAID.

The server computer hardware includes:

  • Intel processor
  • Drive Interface SATA 6Gb/s
  • Type of HDD
  • RAM 8 GB
  • Network card 10/100/1000 Mbps

The organization uses the following peripherals HP LASERJET P2035, HP LASERJET PRO COLOR CP1025, HP LASERJET PRO P1102, HP SCANJET 300, Samsung ML-1210

1.3. Description of the software used in the organization

Software is used as operating system. Microsoft software Windows XP Pro.

Personal computer software:

  • Microsoft Office 2007
  • KasperskyAnti-Virus
  • 1C: Enterprise (1C: Accounting).
  • 1C: TRADE AND WAREHOUSE 7.7
  • Windows 2000 Server SP4

Windows XP Professional is an operating system (OS) of the Windows NT family of Microsoft Corporation. It was released on April 25, 2005 as a version of Windows XP for the personal computer platform.

Kaspersky Antivirus (KAV) is antivirus software developed by Kaspersky Lab. Provides the user with protection against viruses, Trojans, spyware, rootkits, adware, and unknown threats using proactive protection that includes the HIPS component (only for older versions called "Kaspersky Internet Security 2009+, where '+' is the serial number of the previous register, annually incremented by one in accordance with the number of the year following the year of release of the next version of the antivirus"). Initially, in the early 1990s, it was called -V, then - AntiViral Toolkit Pro.

1C: Enterprise is a system of programs for automating various areas of economic activity. A specific software product included in the 1C: Enterprise program system includes those functions and capabilities that meet the purpose of this product.

All components of the 1C: Enterprise program system can be divided into the Technological Platform and Configurations. The technological platform is a set of various mechanisms used to automate economic activity and is independent of specific legislation and accounting methodology. Configurations are actually applied solutions. Each configuration is focused on the automation of a certain area of ​​economic activity and, of course, complies with the current legislation.

"1C: Trade and Warehouse" is designed to account for any type of trading operations. Thanks to its flexibility and customizability, the system is able to perform all accounting functions - from maintaining directories and entering primary documents to receiving various statements and analytical reports.

"1C: Trade and Warehouse" automates work at all stages of the enterprise and allows you to:

  • keep separate management and financial records
  • keep records on behalf of several legal entities
  • keep batch accounting of inventory with the ability to choose the method of writing off the cost (FIFO, LIFO, average)
  • keep separate records of own goods and goods taken for sale
  • handle the purchase and sale of goods
  • perform automatic initial filling of documents based on previously entered data
  • keep records of mutual settlements with buyers and suppliers, detail mutual settlements under individual agreements
  • generate the necessary primary documents
  • draw up invoices, automatically build a sales book and a purchase book, keep quantitative records in the context of customs declaration numbers
  • perform product reservation and payment control
  • keep records Money on current accounts and at the cash desk
  • keep records of commodity loans and control their repayment
  • keep records of goods transferred for sale, their return and payment

In "1C: Trade and Warehouse" you can:

  • set the required number of prices for each product different type, store prices of suppliers, automatically control and quickly change the price level
  • work with related documents
  • perform automatic calculation of write-off prices for goods
  • quickly make changes using group processing of directories and documents
  • keep records of goods in various units of measurement,
  • and cash - in different currencies
  • receive a wide variety of reporting and analytical information on the movement of goods and money
  • automatically generate accounting entries for 1C: Accounting.

"1C: Trade and Warehouse" contains the means to ensure the safety and consistency of information:

  • the ability to prohibit users from "direct" deletion of information
  • special data deletion mode with cross-reference control
  • the ability to prohibit users from editing data for past reporting periods
  • setting a ban on editing printed forms of documents
  • “locking” the system by the user during a temporary stoppage of work.

Server computer software

Windows 2000 Server is a feature-rich operating system that provides the functions of a file and print server, an application server, a Web server, and a communications server. New system in comparison with the previous one provides greater reliability, speed and ease of management. More importantly, Windows 2000 Server has a large set of distributed services built on top of Active Directory, a multi-purpose, scalable Internet-based directory that is fully integrated with the system. Active Directory makes it much easier to administer systems and find resources on a corporate network.

Numerous Web and Internet services included with Windows 2000 Server allow organizations to make extensive use of Internet technologies by building sophisticated Web applications and streaming services (audio, video, and so on) using Windows 2000 Server as the platforms for building intranet networks.

Windows 2000 Server is a promising target and instrumentation platform for Independent Software Vendors (ISVs) and custom business application developers because it supports and evolves the most advanced distributed application services such as DCOM, transaction servers, and message queuing . In addition, to improve the performance of Windows 2000 Server, the base product in the Microsoft server family supports multi-processor symmetric processing (SMP) on two processors and up to 4 GB of memory.

1.4. Description of the activities of the information technology department of the organization

System Administrator Responsibilities:

1. Installs operating systems and software necessary for operation on servers and workstations.

2. Performs software configuration on servers and workstations.

3. Supports in working condition software for servers and workstations.

4. Registers users of the local network and mail server, assigns identifiers and passwords

5. Provides technical and software support to users, advises users on the operation of the local network and programs, draws up instructions for working with the software and brings them to the attention of users.

6. Sets access rights and controls the use of network resources.

7. Provides timely copying, archiving and backup of data.

8. Takes measures to restore the operability of the local network in case of failures or failure of network equipment.

9. Identifies user and software errors and takes action to correct them.

10. Monitors the network, develops proposals for the development of the network infrastructure.

11. Provides network security (protection against unauthorized access to information, viewing or changing system files and data), security of internetworking.

12. Performs anti-virus protection of the local area network, servers and workstations.

13. Prepares proposals for upgrading and purchasing network equipment.

14. Controls the installation of local network equipment by third-party specialists.

15. Informs his immediate supervisor about cases of violation of the rules for using the local area network and the measures taken.

Chapter 2. Ensuring stable operation of computer systems and complexes

2.1. A list of instructions necessary for organizing the workplace of a computer systems adjuster or a hardware and software systems adjuster.

A hardware and software adjuster is a specialist who manages the operation of a computer and configures certain types of equipment related to computer technology and information support. The field of activity of this profession is the installation, maintenance and modernization of computer equipment, including hardware and software for personal computers, servers, as well as peripheral devices, equipment and computer office equipment.

Means of labor (the main types of equipment and technologies used)

– hardware and software of personal computers and servers;

- periphery equipment;

– multimedia equipment;

– information resources of local and global computer networks.

Main types of work (labor activities)

– maintenance of hardware for personal computers, servers, peripheral devices and equipment, computer office equipment;

– installation and maintenance of software for personal computers, servers, peripheral devices and equipment;

- modernization of hardware for personal computers, servers, peripherals and equipment;

– modernization of software for personal computers, servers, peripherals and equipment.

Professional competencies

– to put computer facilities into operation;

- to diagnose the health, troubleshoot and failures of hardware of computer equipment;

- replace consumables used in computing and office equipment;

– install operating systems on personal computers and servers, as well as configure the user interface;

– to administer operating systems of personal computers and servers;

- install and configure the operation of peripheral devices and equipment;

– install and configure application software for personal computers and servers;

- diagnose the health, troubleshoot and crash the operating system and application software;

– optimize the configuration of computer equipment depending on the requirements and tasks solved by the user;

- remove and add components of personal computers and servers, replace them with compatible ones;

- replace, remove and add the main components of peripheral devices, equipment and computer office equipment;

– update and delete versions of operating systems of personal computers and servers;

– update and delete versions of application software for personal computers and servers;

– update and remove device drivers for personal computers, servers, peripherals and equipment;

– update the firmware of computer components, servers, peripherals and equipment

2.2. Studying the system of preventive maintenance of computers in the organization

Safety requirements before starting work

  • Put on and carefully tuck in special clothing (dressing gown) and technological footwear (slippers) established in accordance with current standards, avoiding hanging ends and constraint when moving.
  • Check and verify the availability and serviceability of the fixed tool, devices to ensure safe work performance, personal protective equipment, fire extinguishing equipment.
  • Check the condition of general and ordinary lighting.
  • Do not carry out any work on the repair of fixtures, equipment, etc., if this is not part of the employee's responsibilities.
  • Report all shortcomings and malfunctions found during the inspection at the workplace to the shift supervisor for taking measures to eliminate them completely.
  • Place the tool in the workplace with maximum ease of use, avoiding the presence of unnecessary items in the work area.
  • Check availability of first aid kit.

Safety requirements during work

  • Work only in serviceable and carefully fitted overalls and special equipment. shoes and use personal protective equipment required at the workplace in accordance with current regulations.
  • When servicing and repairing machines and equipment, the use of metal ladders is allowed. Work from boxes and other foreign objects is prohibited.
  • It is necessary to install the stepladder firmly, checking its stability before lifting. Ladders with a height of 1.3 m or more must be equipped with a stop.
  • Constantly monitor the health of the equipment. When leaving the machine or manipulator, the latter must be stopped and de-energized.
  • Work in the presence and serviceability of fences, interlocks and other devices that ensure labor safety, with sufficient illumination.
  • Do not touch moving mechanisms and rotating parts of machines, as well as energized live parts of equipment.
  • Keep your work area tidy and clean.
  • Keep foreign objects and tools away from moving mechanisms.
  • When starting the machine, machine, personally make sure that there are no workers in the area of ​​the machines.
  • All repair work on electrical installations, routine inspection, repairs should be carried out with the fuses (voltage) removed. Check the absence of voltage on current-carrying parts of electrical equipment with a voltmeter or voltage indicator.
  • To protect against burns when changing lamps in the equipment, the service technician must use cotton gloves, special keys and fixtures.
  • Immediately after carrying out the necessary shutdowns on the switching equipment (automatic device, knife switch, switch) disconnected during the preparation of the workplace, posters should be posted: “Do not turn on - people work!”, And disconnected for admission to work on overhead lines and cable lines - posters: “Do not turn on - work on the line!
  • For work, use a hand tool with insulating handles (pliers, pliers, wire cutters, screwdrivers), the dielectric coating should not be damaged and fit snugly to the handle.
  • Elimination of damage and repairs on the equipment must be carried out when the voltage is completely removed from the equipment.
  • The portable power tool used (soldering iron, step-down transformer) must be tested and have an inventory number, systematically and timely checked and repaired.

Safety requirements in emergency situations

  • Each employee who discovers violations of the requirements of this instruction and labor protection rules or notices a malfunction of the equipment that poses a danger to people is obliged to report this to the immediate supervisor.
  • In cases where a malfunction of the equipment poses a threatening danger to people or the equipment itself, the employee who discovered it is obliged to take measures to terminate the operation of the equipment, and then notify the immediate supervisor about this. Troubleshooting is carried out in compliance with safety requirements.
  • If an accident occurs during work, it is necessary to immediately provide first aid to the victim, report the incident to your immediate supervisor and take measures to preserve the situation of the accident, if this is not associated with a danger to life and health of people.
  • In case of electric shock, it is necessary to release the victim from the action of the current as soon as possible, in case of working at height, take measures to prevent him from falling. Switch off the equipment using switches, a plug-in connector, cut the supply wire with a tool with insulated handles. If it is impossible to turn off the equipment quickly enough, other measures must be taken to free the victim from the action of the current. To separate the victim from current-carrying parts or wires, use a stick, board or some other dry object that does not conduct electricity, while the caregiver must stand on a dry, non-conductive place, or wear dielectric gloves.
  • If a fire occurs in a technical room, you should immediately start extinguishing it with the available means (carbon dioxide fire extinguishers, asbestos blankets, sand) and call the fire department.

Safety requirements at the end of work

  • It is necessary to tidy up the workplace, tools and fixtures.
  • Notify the work manager of any malfunctions noticed during work and the measures taken to eliminate them
  • Put away the overalls in a specially designated place.

Studying the system of preventive maintenance of computers in the organization

Types of technical maintenance of SVT

The type of maintenance is determined by the frequency and complex of technological operations to maintain the operational properties of the SVT.

GOST 28470-90 "Maintenance and repair system technical means Computer Engineering and Informatics” defines the following types of maintenance

  • regulated;
  • periodic;
  • with periodic control;
  • with continuous monitoring.

Scheduled maintenance should be carried out to the extent and taking into account the operating time provided for in the operational documentation for the SVT, regardless of the technical condition.

Periodic maintenance should be carried out at intervals and to the extent specified in the operational documentation for the SVT.

Maintenance with periodic monitoring should be carried out with the frequency of monitoring the technical condition of the computer and the necessary set of technological operations, depending on the technical condition of the computer, established in the technological documentation.

Maintenance with continuous monitoring should be carried out in accordance with the operational documentation for the SVT or technological documentation based on the results of continuous monitoring of the technical condition of the SVT.

Control of the technical condition of the SVT can be performed in static or dynamic modes.

In the static mode, the control values ​​of voltages and clock frequencies remain constant throughout the entire cycle of preventive control, and in the dynamic mode, their periodic change is provided. Thus, due to the creation of heavy operating modes of the SVT, it is possible to identify elements that are critical in terms of reliability.

Preventive control is carried out by hardware and software. Hardware control is carried out with the help of special equipment, instrumentation and stands, and software and hardware systems.

Troubleshooting activities during preventive control can be divided into the following stages:

  • analysis of the nature of malfunctions according to the current state of the computer;
  • control of environmental parameters and measures to eliminate their deviations;
  • localization of the error and determination of the location of the malfunction with the help of hardware and software of the SVT and with the help of additional equipment;
  • trouble-shooting;
  • resuming the solution of the problem.

Currently, the following types of maintenance systems (STO) are most widely used:

  • Scheduled preventive maintenance;
  • Service according to technical condition;
  • Combined service.

Scheduled preventive maintenance is based on the calendar principle and implements scheduled and periodic maintenance. These works are carried out in order to maintain the CVT devices in good condition, identify equipment failures, prevent failures and failures in the operation of the CVT.

The frequency of scheduled preventive maintenance depends on the type of SVT and operating conditions (number of shifts and load).

Advantages of the system - provides the highest availability of SVT.

Disadvantages of the system - requires large material and physical costs.

In general, the system includes the following types of maintenance (preventive maintenance):

  • control examinations (KO)
  • daily maintenance (ETO);
  • weekly maintenance;
  • two-week MOT;
  • ten-day maintenance;
  • monthly maintenance (TO1);
  • two-month maintenance;
  • semi-annual or seasonal (SRT);
  • annual maintenance;

KO, ETO SVT includes inspection of devices, running a quick test of readiness (operability of devices), as well as work provided for by daily preventive maintenance (in accordance with the operating instructions) of all external devices (cleaning, lubrication, adjustment, etc.).

During the two-week maintenance, diagnostic tests are run, as well as all types of two-week preventive maintenance provided for external devices.

With monthly maintenance, it provides for a more complete check of the functioning of the computer with the help of the entire system of tests that are part of its software. The check is carried out at the nominal values ​​of the power sources with a preventive voltage change of + 5%.

Preventive voltage change allows you to identify the weakest circuits in the system. Typically, circuits must maintain their performance when the voltage changes within the specified limits. However, aging and other factors cause gradual changes in the performance of the circuits, which can be detected on prophylactic regimens.

CVT proactive voltage testing detects predictable faults, thereby reducing the number of hard-to-locate faults that lead to failures.

During the monthly prophylaxis, all necessary work provided in the operating instructions for external devices.

With a semi-annual (annual) maintenance (SRT), the same work is carried out as with a monthly maintenance. As well as all types of semi-annual (annual) maintenance work: disassembly, cleaning and lubrication of all mechanical components of external devices with their simultaneous adjustment or replacement of parts. In addition, the cables and power busbars are inspected.

A detailed description of preventive maintenance is given in the operating instructions for individual devices attached to the SVT by the manufacturer.

When maintaining on a technical condition, the performance of maintenance work is unscheduled and is performed as necessary based on the state of the object (test results), which corresponds to maintenance with continuous monitoring or maintenance with periodic monitoring.

Unscheduled preventive maintenance includes extraordinary preventive maintenance, appointed mainly after the elimination of serious malfunctions of the computer. The scope of preventive measures is determined by the nature of the malfunction and its possible consequences.

The conclusion of the SVT for unscheduled preventive maintenance can also be carried out when the number of failures that occur over a certain set period of time exceeds the allowable values.

The system requires the presence and correct use of various testing tools (software).

The system allows minimizing the cost of operating the WTS, but the readiness of the WTS for use is lower than when using a planned preventive service station.

With a combined maintenance system, “junior types of maintenance” are carried out as necessary, as with maintenance on condition, based on the operating time and operating conditions of a particular type of computer equipment or the results of its testing. The implementation of "senior types of maintenance" and repairs is planned.

The rational organization of service stations should provide for the accumulation of static material based on the results of CVT operation in order to summarize, analyze and develop recommendations for improving the service structure, increasing the efficiency of using CVT, and reducing operating costs.

The list of necessary material and technical means for organizing and carrying out work on maintenance of the SVT

The quality of operation of the SVT depends on the provision of spare parts, various devices and consumables, the provision of instrumentation, tools, etc. The creation of the necessary conditions for normal functioning is also of great importance. computing facilities(temperature and humidity conditions, power supply mode, etc.) and for service personnel (climatic conditions, noise level, illumination, etc.).

The operation of the CVT must be carefully planned. Planning should cover the entire range of issues related both to the compilation of the general program of work of the CVT, the distribution of machine time, etc., and to the entire work of the maintenance personnel.

The rational organization of operation should provide for the accumulation of static material based on the results of the operation of the SVT in order to summarize, analyze and develop recommendations for improving the service structure, increasing the efficiency of using the SVT, and reducing operating costs.

Diagnostic programs

For PCs, there are several types of diagnostic programs (some of which are included with the computer) that allow the user to identify the causes of problems that occur in the computer. Diagnostic programs used in PCs can be divided into three levels:

  • BIOS diagnostic programs - POST (Power-OnSelfTest - power-on self-test procedure). Runs every time the computer is turned on.
  • Diagnostic programs for operating rooms Windows systems come with several diagnostic programs to test various computer components.
  • Diagnostic programs of firms - manufacturers of equipment.
  • Diagnostic programs for general purposes. Such programs, which provide thorough testing of any PC-compatible computers, are produced by many companies.

Power-on Self Test (POST)

POST is a sequence of short routines stored in the ROM BIOS on the motherboard. They are designed to check the main components of the system immediately after it is turned on, which, in fact, is the reason for the delay before loading the operating system.

Each time you turn on your computer, it automatically checks its main components:

  • processor,
  • ROM chips,
  • auxiliary elements of the system board,
  • RAM and major peripherals.

These tests are fast and not very thorough when a faulty component is found, a warning or error message (failure) is issued. Such faults are sometimes referred to as fatal errors. The POST procedure usually provides three ways to indicate a malfunction:

  • sound signals,
  • messages displayed on the screen
  • hexadecimal error codes issued to the I/O port.

When POST detects a problem, the computer emits distinctive beeps that can help identify the failed item (or group of items). If the computer is working properly, then when you turn it on, you will hear one short beep; if a malfunction is detected, a whole series of short or long beeps is issued, and sometimes a combination of them. The nature of the audio codes depends on BIOS versions and the company that developed it.

In most PC-compatible models, the POST procedure displays the progress of testing the computer's RAM on the screen. If an error is detected during the POST procedure, a corresponding message is displayed, usually in the form of a numerical code of several digits, for example: 1790- Disk 0 Error. By using the instruction manual and after-sales service, you can determine which fault corresponds to this code. Error codes issued by POST to I/O ports

A lesser known feature of this procedure is that at the beginning of each test, POST outputs test codes to a special I/O port address, which can only be read using a special adapter card installed in the expansion slot. The POST board is installed in the expansion slot. At the time of the POST procedure, its built-in indicator will rapidly change two-digit hexadecimal numbers. If the computer unexpectedly stops testing or “freezes”, this indicator will display the code of the test during which the failure occurred. This allows you to significantly narrow the search for a faulty element. On most computers, POST codes to I/O port 80h

Operating system diagnostic programs

DOS and Windows include several diagnostic programs. Which provide performance of testing of components of SVT. Modern diagnostic programs have graphical shells and are part of the operating system. Such programs are, for example:

  • utility to clean the disk from unnecessary files;
  • utility to check the disk for errors;
  • utility for defragmenting files and free space;
  • data archiving utility;
  • file system conversion utility.

All of these programs are also available in Windows.

Diagnostic programs of equipment manufacturers

Equipment manufacturers produce special specialized programs for diagnosing specific equipment, a specific manufacturer. The following groups of programs can be distinguished:

  • Hardware Diagnostic Programs
  • SCSI Device Diagnostic Programs
  • Network adapter diagnostic programs

Diagnostic programs for general and special purposes

Most test programs can be run in batch mode, which allows you to run a whole series of tests without operator intervention. You can create an automated diagnostic program that is most effective if you need to identify possible defects or run the same sequence of tests on multiple computers.

These programs check all types system memory: basic (base), extended (expanded) and additional (extended). The location of the fault can often be determined down to a single chip or module (SIMM or DIMM)

There are many such programs. This type of software can be divided into the following categories:

  • Information programs;
  • Test programs;
  • Universal programs

Information programs

They are used in situations where it is necessary to find out a detailed configuration and test the computer for performance as much as possible without disassembling system unit or when, at first glance, everything works fine, but the user claims that his computer is constantly buggy and starts every other time. Or after repairs, for example, replacing electrolytic capacitors with motherboard, you need to conduct a thorough diagnosis in order to make sure that the computer is working properly. They test a computer or individual components, and provide detailed information about its condition, functionality, and possible software and physical problems.

Test programs

They work on the principle of maximum load with various operations that emulate the user's work on a computer, and measure the overall performance of the system or the performance of individual components based on a comparison with an existing database.

Universal programs

Programs combining two categories of programs - informational and test. They allow not only to test the PC, but also to obtain comprehensive information about its components.

There are several completely different versions of the program, but they are all focused solely on measuring the performance of a video system.

When you start the program, in the main window you will see only the model of the video card and the characteristics of the monitor. For more information, click on SystemInfo , there you can find out - processor model, cache size, directX version and other system information. It is possible to select all or only some tests in the program. Almost all tests are run twice, at low and high detail, which gives greater accuracy. After the test, the program displays the result in the form of points that can be compared with another computer. The main thing is that the video system test is not complete without a critical load on other computer components. And if the computer under test coped with them, then most likely the main components are in order.

Among the packages of service utilities, without a doubt, "the first among equals" is NortonUtilities manufactured by Symantec and has already grown to the 2001 version.

The included SystemInformation utility provides conveniently grouped information on all major computer components. It is possible to detail information on some sections, as well as generate a report. Quite clearly and colorfully, with the use of pie charts, information about the efficiency and use of the disk is framed. You can test the processor by clicking the Benchmark button. The program gives a graph of the approximate speed of your system, the unit of measurement is the performance of a PC based on an Intel 386SX-16MHz processor.

Service equipment

For troubleshooting and repairing a PC, you must have special tools, which allow you to identify problems and fix them simply and quickly.

These include:

  • a set of tools for disassembly and assembly;
  • chemicals (solution for wiping contacts), a spray bottle with coolant and a can of compressed gas (air) for cleaning computer parts;
  • a set of swabs for wiping contacts;
  • specialized improvised tools (for example, tools needed to replace microcircuits (chips));
  • service equipment.

Service equipment is a set of devices designed specifically for diagnosing, testing and repairing computer hardware. Service equipment includes the following elements:

  • Measuring instruments test connectors for testing serial and parallel ports;
  • memory testing devices that allow you to evaluate the functioning of SIMM modules, DIP chips and other memory modules;
  • equipment for testing a computer power supply;
  • diagnostic devices and programs for testing computer components (hardware and software systems).

Measuring instruments and test sockets for testing PC ports

The following measuring instruments are used to check and repair a PC:

  • digital multimeter;
  • logic probes;
  • single pulse generators for testing digital circuits.

Test connectors provide software and hardware testing of PC I/O ports (parallel and serial).

Computer power supply testing equipment provides testing of PC power supplies and determination of their main characteristics. It is a set of equivalent loads, switching elements and measuring instruments.

2.3. Description of monitoring, diagnostics and recovery of computer systems and complexes

Status analysis and troubleshooting "SamsungML-1210"

The printer does not pick up paper. The problem is in the capture roller. You need to do preventive maintenance.

Technical description "SamsungML-1210"

Main characteristics:

  • Printing technology - laser (Electrography);
  • Print speed - 12 PPM (pages per minute);
  • Toner saving mode up to 30%;
  • Resolution - 600 × 600 dpi;
  • Powerful 66 MHz processor;
  • Repeat the printing of the last sheet by pressing one button;
  • Compatibility (Linux, Macintosh, Windows).

Other Features:

  • Tray (cassette) - 150 sheets;
  • Output tray - 100 sheets;
  • Paper size - Letter, legal, Monarch, com 10, C5, DL, A4, A5, B5;
  • Interface - USB, IEEE 1284 (parallel);
  • Processor - 66 MHz;
  • Memory (MB) - 8 MB;
  • Working cycle (pages per month) - 12000;
  • Supported operating systems - Windows 95/98/2000/Me/NT, Linux (Redhat 6.0), Macintosh OS 8.0 and later;
  • Emulation - Smart GDI;
  • Toner cartridge - Single cartridge: 2500 pages at 5% coverage, 1000 starter.
  • Power consumption (W):
  • Standby - 5;
  • In print mode - 180;
  • Warm-up time (sec.) - 25;
  • First page output (sec.) - 13;
  • Noise level (max., dB) - 47;
  • Fonts - Windows fonts;
  • Size (W × D × H) mm - 329 × 355 × 231;
  • Printer weight - 6.2 kg.

Troubleshooting and failures "SamsungML-1210"

The front cover opens, 2 screws are unscrewed.

Unscrew 4 screws on the back.

Removing the back wall top cover, the paper guides are taken out and the side walls are removed.

Unscrew 3 screws that hold the laser. Disconnect 2 connectors located on the sides. The glass is wiped with a cotton swab or a clean piece of cloth.

In fact, the capture roller, which is held by 2 self-tapping screws, is unscrewed and cleaned special liquid. At the same time, the brake pad is cleaned. It is located in the machine under the pickup roller.

Then the printer itself is cleaned. This operation can be performed with a vacuum cleaner or a compressor.

Assembly is carried out in the reverse order.

2.4. Identification of the shortcomings of the system for ensuring the stable operation of computer systems and complexes. Suggestions for improving this system

The disadvantage of this organization is the lack of a PC maintenance schedule and peripheral equipment. In this regard, this schedule was proposed and developed.

Chapter 3. Description of the information system used in the organization

3.1 Analysis of the subject area for the information system

Students organized in groups study in one of the specialties. Teachers are involved in the learning process. The educational process is regulated curriculum, indicating the number of hours for each discipline and the form of control (test, exam). A teacher can lead classes in one or more disciplines.

3.2 Analysis/development of the structure of the information system

This figure shows a block diagram of the program execution, which means that information from directories is taken into the document.

A use case diagram (use case diagram) in UML is a diagram that depicts the relationship between actors and use cases and is integral part precedent model, which allows describing the system at the conceptual level.

Precedent - the possibility of a simulated system (part of its functionality), thanks to which the user can get a specific, measurable and desired result. The use case corresponds to a separate service of the system, defines one of the options for its use and describes typical way user interaction with the system. Use cases are typically used to specify external requirements for a system. .

3.3 Description of the database management system/software used for development

The 1C: Enterprise 8 software system includes a platform and application solutions developed on its basis for automating the activities of organizations and individuals. The platform itself is not a software product for use by end users, who usually work with one of the many application solutions (configurations) developed on this platform. This approach allows you to automate various activities using a single technological platform.

3.4. Instructions for users to work with the information system

3.4.1 Purpose of the program

The program allows:

  • based on the entered data allows you to view the information of interest.
  • to carry out automated selection of the necessary information.
  • generate and print documents for registration and reporting forms.

program benefits « information system of the auto enterprise ":

  • convenience and ease of use;
  • small amount of occupied memory on hdd;
  • operational service.

Functional purpose

  • the ability to independently manage the accounting methodology as part of setting up accounting policies and setting accounting parameters;
  • arbitrary structure of the account code makes it possible to use long codes of accounts (sub-accounts) and maintain multi-level charts of accounts with a large nesting level;
  • the ability to work with several charts of accounts allows you to keep records in several accounting systems;
  • contains built-in mechanisms for conducting quantitative and currency accounting;
  • on any account, you can maintain multidimensional and multilevel analytical accounting;
  • the user can independently create new types of subconto, add accounts and subaccounts;
  • business transactions are reflected in accounting mainly by entering configuration documents that are identical to primary accounting documents, it is possible to enter individual entries manually;
  • when reflecting business transactions in configuration documents, you can explicitly indicate accounting and tax accounts;
  • the applied accounting methodology ensures the simultaneous registration of each record of a business transaction, both according to accounting accounts and according to the necessary sections of analytical accounting, quantitative and currency accounting;

Operational purpose

The program should be operated by enterprises focused on the automotive industry, namely passenger and freight transport.

Users of the program must be employees of the automotive industry.

Composition of functions

The program provides the ability to perform the following functions:

  • functions for creating a new (empty) file;
  • functions for opening (loading) an existing file;
  • inventory accounting;
  • inventory control;
  • accounting of trade operations;
  • accounting of commission trade;
  • accounting of agency contracts;
  • accounting of operations with containers;
  • accounting of banking and cash transactions;
  • accounting for settlements with counterparties;
  • accounting of fixed assets and intangible assets;
  • accounting of the main and auxiliary production;
  • accounting of semi-finished products;
  • accounting for indirect costs;
  • VAT accounting;
  • payroll accounting, personnel and personalized accounting;
  • income tax accounting;
  • simplified taxation system;
  • accounting for activities subject to a single tax on imputed income;
  • accounting of income and expenses of individual entrepreneurs - payers of personal income tax;

3.4.2 Program execution conditions

Climatic operating conditions under which the specified characteristics must be ensured must meet the requirements for technical equipment in terms of their operating conditions.

Minimum composition of technical means

The hardware must include an IBM compatible Personal Computer(PC), including:

  • processor Pentium-1000 with a clock frequency, GHz - 10, not less;
  • motherboard with FSB, GHz - 5, not less;
  • RAM volume, GB - 2, not less;

Minimum composition of software

The system software used by the program must be represented by a licensed localized version of the operating system. You can use update package 8.3.5.1284.

3.4.3 Program execution

Program launch

The program is launched by double-clicking the left mouse button on the label of the program "1C: Enterprise 8.3", then you need to select the "WIS Base" configuration and click the "Configurator" item. The selection window is shown in Figure 1.

Figure 1 - Launch information base

After launching the program module in the "1C: Enterprise 8.3" system, the "Working window of the 1C: Enterprise 8.3 system" will appear on the screen, it displays the menu and toolbar in accordance with the selected user, it looks like this: the system working window is shown in Figure 2 .

Figure 2 - Appearance of the configuration menu

Menu operation

This menu can be divided into:

  • menu "File";
  • menu "Edit";
  • menu "Configuration";
  • menu "Debug";
  • menu "Administration",
  • menu "Service",
  • menu "Windows",
  • Help menu

You can choose the basic actions for editing and setting up a document, from creating and saving a new document to setting access rights to the infobase. You can also customize the interface for a specific user, use the help offered by the program to facilitate work.

The main menu is the "Configuration" menu, because the structure of the infobase is created in it. Each configuration object has a unique set of properties. This set is described at the system level and cannot be changed during task configuration. The set of properties of a configuration object is determined mainly by its purpose in the 1C:Enterprise system.

The main property of any configuration object is the name - the short name of the configuration object. When a new configuration object is created, it is automatically assigned a conditional name consisting of a word determined by the type of object and a number. This name can be changed while editing the properties of the configuration object, while the system keeps track of the uniqueness of the names. The configuration object name cannot be empty and cannot be longer than 255 characters.

Some properties from the entire set of properties inherent in the configuration object are available for editing and can be changed in one way or another during the system configuration. The nature of the changes and their limits are also set at the system level. A specialist who configures the system can achieve the desired behavior of the object during system operation by purposefully changing the properties of the configuration object.

3.4.4 Operator messages

Since the program is not a console (with a command line interface), but with a graphical user interface, classic text messages are not expected. Error messages are displayed as windows on the desktop. Shown in Figure 3.

3.5 Description of means, methods of information protection when working with an information system

1C:Enterprise supports the ability to upload/download an infobase to a file. This mechanism is intended primarily for obtaining an infobase image, regardless of how data is stored. For example, loading/unloading an infobase to a file can be used to convert the file version to a client-server one.

Sometimes this mode is also used to create a backup copy of the infobase, but this option of using it has a number of disadvantages. The main disadvantage of this method of creating a backup is the need to use single-user mode to carry out this operation. With a large amount of information base, a break in the work of users can be quite large, which is not always acceptable.

Depending on the variant of 1C: Enterprise (file or client-server), we can recommend the following ways to create a backup copy of the infobase:

1) When using the 1C:Enterprise 8 file option, you can organize the process of creating an infobase backup copy by simply copying the 1CV8.1CD file to a separate directory or using software for backing up and restoring data. It should be taken into account that to ensure the integrity and consistency of the data during the creation of a backup, the work of users with the infobase should be prohibited, however, the time required to create a backup is significantly less than when using uploading the infobase to a file.

2) When using the client-server version of 1C: Enterprise 8, it becomes possible to create a backup copy of the infobase using the DBMS. For example, SQL Server allows data to be backed up while the database is in multi-user mode and available to all users.

Using these methods gives the most accurate copy of the infobase state, which cannot always be obtained when using the infobase loading/unloading mode. For example, if the database is corrupted, some information may not be unloaded when unloading, while copying will preserve all the information, and after restoration it will be possible to correct the database.

The time spent by the infobase in single-user mode is also significantly reduced in the case of the file version of 1C: Enterprise 8, and in the case of the client-server version, single-user mode is not used at all.

In addition, the positive point is that when using the above methods, you can use various specialized software tools to create backups.

Conclusion

During the passage industrial practice in the direction of 230000 Informatics and Computer Engineering, specialty 230113 Computer systems and complexes the following tasks were performed:

Formation and development of general and professional competencies in the field of the chosen specialty;

Acquisition and formation necessary skills, skills and experience practical work to solve professional problems in the conditions of a particular enterprise (organization) of the city and district;

  • Organization of independent professional activity, socialization in a specific type of activity.
  • Also, as a result of practical training in the direction 230000 Informatics and Computer Engineering in the specialty 230113 Computer Systems and Complexes, the following tasks were completed:
  • Consolidation, deepening and expansion of the acquired theoretical knowledge, skills and abilities;
  • Mastering professional competencies, production skills and new methods of work;
  • Mastering the norms of the profession in the motivational sphere: awareness of motives and spiritual values ​​in the chosen profession;
  • Mastering the basics of the profession in the operational sphere: familiarization and assimilation of the methodology for solving professional tasks (problems);
  • The study of different aspects of professional activity: social, legal, psychological, hygienic, technical, technological, economic.

As a result of practical training, experience was gained in supporting workstations in working order, as well as in analyzing and structuring knowledge about the information system of the branch.

List of sources used

1. Baidakov V., Dranishchev V., Krayushkin A., Kuznetsov I., Lavrov M., Monichev A. 1C:Enterprise 8.0 Embedded language description. [Text] /. In 4 volumes. - M .: Firm "1C", 2004. -2575 p.
2. Belousov P.S., Ostroverkh A.V. Repair of workstations. [Text] / Practical guide. - M .: LLC "1C-Publishing", 2008. -286 p.: ill.
3. Gabets A.P. Solving operational problems. Methodological materials for the listener of the certified course. [Text] / M .: LLC "1C-Training Center No. 3", 2004. -116s.: Ill.
4. A. P. Gabets and D. I. Goncharov, All About PC Design. [Text] / M .: 1C-Publishing LLC, 2008. -286 p.: ill.
5. Gabets A.P., Goncharov D.I., Kozyrev D.V., Kukhlevsky D.S., Radchenko M.G. Professional development in the system 1C: Enterprise 8. - M .: LLC "1C-Publishing"; [Text] / St. Petersburg: Peter, 2007. - 808 p.: ill.
6. Smooth A. A. 1C: Enterprise 8.0. - St. Petersburg: [Text] / Triton, 2005. - 256 p.: ill.
7. Mitichkin S.A. Development in the system 1C Enterprise 8.0. [Text] / M .: 1C-Publishing LLC, 2003. - 413p. ill.
8. Pankratov, F.G. 1C: Enterprise [Electronic resource]: textbook / F.G. Pankratov. - M.: Businesssoft, 2005. - 1 electron. opt. disc (CD-ROM).
9. Radchenko M.G. 1C:Enterprise 8.0. Practical developer guide. Examples and typical techniques. [Text] / M.:, 1C-Publishing LLC, 2004. -656 p.: ill.
10. Radchenko M.G. Repair of computers and peripherals. [Text] / M.:, 1C-Publishing LLC, St. Petersburg: Peter, 2007. -512 p.: ill.
11. Russian State Library [Electronic resource] / Center inform. RSL technologies; ed. Vlasenko T.V.; Web-master Kozlova N.V. - Electron, yes. – M. : Ros. state library, 1997 . – Access mode: http://www.rsl.ru, free

Liked the article? Share with friends!
Was this article helpful?
Yes
Not
Thanks for your feedback!
Something went wrong and your vote was not counted.
Thank you. Your message has been sent
Did you find an error in the text?
Select it, click Ctrl+Enter and we'll fix it!