Report on industrial practice LAN. Computer networks


1. Introduction

In our age of computer technology, no company can do without the use of computers. And if there are several computers, then they, as a rule, are combined into a local area network (LAN).

A computer network is a system of interconnected computers, as well as, possibly, other devices, which are called nodes (workstations) of the network. All computers in the network are connected to each other and can exchange information.

As a result of combining computers into a network, opportunities appear: to increase the transmission speed information messages, rapid exchange of information between users, expansion of the list of services provided to users by networking significant computing power with a wide range of different software and peripheral equipment. The use of distributed resources (printers, scanners, CD-ROMs, etc.), the availability of structured information and the effective search for the necessary data. Networks provide enormous advantages that are unattainable when using computers separately. Among them: the division of processor resources. When the processor resources are divided, it is possible to use computing power for simultaneous data processing by all stations included in the network. Data separation. Data sharing allows you to manage databases from any workstations that need information. Shared access to the Internet. LAN allows you to provide access to the Internet to all your clients using just one access channel. Resource sharing. LAN allows you to economically use expensive resources (printers, plotters, etc.) and access them from all connected workstations. multimedia capabilities. Modern high-speed technologies allow the transmission of audio and video information in real time, which allows you to conduct video conferences and communicate over the network without leaving your workplace.

Now, no large enterprise can do without a LAN.

The purpose of this industrial professional practice is to study the features of the operation and maintenance of equipment computer science and computer networks.


At present, the enterprise network continues to develop. New computers are added to the workplaces, as a result of which the number of requests to the servers increases. Therefore, the main direction of network modernization is the replacement of servers with more modern ones. The first steps were taken in early 2004 when one of the mail servers and the TKIIP information hub were replaced. Also, modernization requires most of the jobs at the junction stations.


At the enterprise in 1998, a bus topology was used to build a network, i.e. all computers were connected in series one after another, using a cable system. In this case, the technology of the "Ethernet" standard was used.

Ethernet is the most widely used LAN standard. computer networks. Ethernet is usually understood as any of the variants of this technology: Ethernet, Fast Ethernet, Gigabit Ethernet. All kinds of Ethernet standards use the same media separation method, the CSMA/CD method, a multiple access method with carrier sense and collision detection.

In a narrower sense, Ethernet is a network standard with a data transfer rate of 10 Mbps. The historical first networks of Ethernet technology were created on coaxial cable. Other physical layer specifications for this standard have since been defined. The physical specifications of Ethernet technology today include data transmission media:

10 Base-5 - coaxial cable 0.5 inch diameter, called "thick" coax. It has a wave impedance of 50 ohms. Maximum segment length 500 meters without repeaters;

10 Base-2 is a 0.25 inch coaxial cable called “thin” coax. It has a wave impedance of 50 ohms. The maximum segment length is 185 meters without repeaters;

10 Base-T - Category 3 Unshielded Twisted Pair (UTP) cable. Forms a hub-based star topology. The distance between the hub and the end node is no more than 100 meters;

10 Base-F - fiber optic cable. The topology is similar to that of the 10 Base-T standard. There are several options for this specification - FOIRL (distance up to 1000 meters), 10 Base-FL (up to 2000 meters), 10 Base-FB (up to 2000 meters).

The number 10 in these names indicates the bit rate of these standards - 10 Mbps.

An important phenomenon in Ethernet networks is a collision - a situation when two stations simultaneously try to transmit a data frame over a common medium. This is a consequence of the random access method adopted.

But over time, the number of computers increased, and data transmission over the bus became impossible due to the loss of speed. In this case, the enterprise decided to use the ZVEZDA network topology. In this case, there is a server to which all computers participating in the local area network are directly connected. To build the network, the Fast Ethernet technology was chosen and applied, and Gigabit Ethernet is currently being used.

Fast Ethernet: In 1995, the IEEE 802.3 committee adopted the Fast Ethernet specification as the 802.3u standard, which is not a standalone standard, but an addition to the existing 802.3 standard. The MAC and LLC levels in Fast Ethernet remain exactly the same as in Ethernet. The access method also remained the same - CSMA/CD. This ensured the continuity and consistency of the 10 Mbps and 100 Mbps networks. All the differences between Fast Ethernet and Ethernet technologies are concentrated at the physical level. A more complex structure of the physical layer of technology is due to the fact that it uses three options for cable systems:

Fiber optic multi-mode cable, two fibers are used;

Coaxial cable is not included in the number of permitted transmission media for Fast Ethernet technology. Networks based on this technology always have a hierarchical tree structure built on hubs. The network diameter is reduced to 200 m (for a hub-based network). The speed, in comparison with Ethernet, is increased by 10 times due to the reduction of interframe delay. The technology operates in full duplex mode. The 802.3u standard established 3 different specifications for the Fast Ethernet physical layer, giving them the following names:

100Base-TX for two-pair UTP category 5 unshielded twisted pair or STP type 1 shielded twisted pair. Maximum segment length 100m;

100Base-T4 for 4-pair UTP category 3, 4 or 5 unshielded twisted pair cable. Maximum segment length is 100 m;

100Base-FX for multi-mode fiber optic cable, two fibers are used. The maximum segment length is 412 m (half duplex), 2 km (full duplex).

Gigabit Ethernet: Quite quickly after the introduction of Fast Ethernet products on the market, network integrators and administrators felt certain limitations when building corporate networks. In many cases, servers connected over a 100-megabit link overloaded network backbones. There was a need for the next level in the hierarchy of speeds. In this regard, in June 1995, the IEEE High-Speed ​​Technology Research Group was assigned to consider the possibility of developing an Ethernet standard with even higher bit rates. The category 5 twisted-pair standard was finally adopted in 1999. The transfer rate in Gigabit Ethernet is 1000 Mbps. The developers have retained a large degree of continuity with Ethernet and Fast Ethernet technologies: the same frame formats work in half-duplex and full-duplex modes, supporting the same CSMA / CD access method on a shared medium with minimal changes. In the summer of 1998, the 802.3z standard was adopted, which defines the use of three types of cable as a physical medium: multimode fiber optic (distance up to 500 m), single-mode fiber optic (distance up to 5000 m) and double coaxial (twin ax), through which data is transmitted over two shielded copper conductors up to 25 meters.

The 802.3ab ad hoc working group has developed a variant of Gigabit Ethernet over Category 5 UTP. To achieve 1000 Mbps, four unshielded twisted pairs are used simultaneously at 250 Mbps.

4. Network hardware

Workstations are any computers that, through a local network, access resources stored on a server.

basically all enterprise workstations have the following configuration:

Processor Intel Pentium III 1.3 GHz;

RAM 256 Mb;

LAN 10/100Mb/s;

Hard drive IDE 40Gb.

Some workstations have a CD-ROM drive, sound card and speakers, HP 1200 printers.

4.3 Switches

A switch is a multi-port link layer device that "learns" MAC addresses and stores them in an internal lookup table. A temporary switched connection is created between the sender and the intended recipient of the frame, over which the frame is transmitted.

To combine computers into a network, 3Com Super Stack Switch 4900, 4924, 4400 SE switches and 4-port 1000BASE-SX optical modules are used to connect trunk channels.

Central Distribution 3Com Super Stack Switch 4900, 4900SX:

IEEE 802.1p, 1000Base-TX;

Throughput 23 million. packets / s (24 ports);

Access Method CSMA/CD;

Size 6.6*44*37 (cm), weight 6.5kg;

Permissible ambient humidity 10%~90%;

3Com Super Stack 3 Switch 4400SE Network Edge Switch

IEEE 802.3ad, 1000Base-SX;

Stack up to 192 10/100Mbit/s ports;

Bandwidth 6.6 Mpps (24 ports);

UTP category 5e physical media;

Mains supply 100-240V (50-60Hz);

Size 6.6*44*41 (cm), weight 6.3kg;

Permissible ambient temperature 00C~40C;

Permissible ambient humidity 10%~90%.

Uses Gigabit Ethernet switching without blocking at the highest possible speed, using XRN technology can improve performance up to 48Gbps.

Layer 3 switching is also used, supporting unicast IP routing and OSPF protocols. RIP / RIPv2 and CIDR the presence of a function to control UDP traffic. Uses advanced security features, RADIUS client support, and support for Routed Access Control Lists to provide automated user access to network resources. Supports 3Com Gigabit Multilayer Switching (GMS) software and provides advanced Layer 2 switching. They have an advanced network management function. The 3Com Network Supervisor software used (simplifies network administration tasks) detects devices connected to the network, displays their status in a graphical diagram and manages them.


4.4 Network adapters

Network adapters are designed to receive and transmit data on the network. Mainly on the computers of the department are used network cards D-Link 530TX 10/100 Mbit/s. Support 32bit PCI bus in Lokal Bus mode auto-detect Nway, comply with IEEE 802.3u/ 8702.3 standard, support Plug and Play, ACPI, Wol, and power management.

4.5 Modems

Modem - a functional device that provides modulation and demodulation of signals; device that converts digital signals to analog form and vice versa for transmission over communication lines analog type. Characteristics of the external ADSL modem:

Reception at a speed of 8 Mb / s and transmission up to 1 Mb / s;

RJ-11 connector for line connection;

Ethernet interface 10/100Mb/s with auto cable detection;

Work in bridge and router modes, routing using a multi-address policy;

Compliant with G.PMT(G.992.1) standards;

Service Quality Management (UBR/CBR/VBR);

Configuration via WEB-interface or Telnet;

Administration and SNMP;

System requirements;

PC with Ethernet interface 10/100 Mb/s;

CD drive or DVD discs;

Telephone line with ADSL access service from an Internet provider.


4.6 Cable system

Equally important in designing a local network is the choice of cable subsystem, since a reliable LAN provides reliable connections. In other words, all connections in the network must be made with high quality, unreliable contacts and other physical damage are unacceptable. This is given such importance because it is still a very laborious task to find an open or damaged connection in a failed network.

The answer to the high quality requirements of the cable system was structured cable systems, which are a set of switching elements (cables, connectors, connectors, cross panels and cabinets), as well as a method for their joint use, which allows you to create regular, easily expandable communication structures in computer networks. .

Versatility;

Increase in service life;

Reliability.

Overview of cable equipment.

Twisted pair (UTP / STP, unshielded / shielded twisted pair) is currently the most common signal transmission medium in local networks. UTP/STP cables are used in Ethernet, Token Ring, and ARCnet networks. They differ in categories (depending on the bandwidth) and type of conductors (flexible or solid). In a Category 5 cable, as a rule, there are eight conductors intertwined in pairs (that is, four pairs).

All cables consist of 4 pairs (two for file transfer, the other two for voice). RJ-45 plugs and sockets are used to connect cables to equipment. There were also cables of category 6, with a frequency of up to 200 MHz, and category 7, with a frequency of up to 600 MHz, which are necessarily shielded.

A structured cabling system based on Category 5 twisted pair has a very high flexibility in use. Her idea is as follows.

A structured cabling system is built hierarchically, with a main line and numerous branches from it. A typical hierarchical structure of a structured cabling system includes:

Horizontal subsystems (within the floor);

Vertical subsystems (inside the building);

Campus subsystem (within the same territory with several buildings).

Using a structured cabling system instead of chaotically routed cables provides a business with many benefits:

Versatility;

Increase in service life;

Reducing the cost of adding new users and changing their placements;

Possibility of easy network expansion;

Providing more efficient service;

Reliability.

The horizontal subsystem is characterized by big amount branch cable, as it must be routed to each user outlet. Therefore, the cable used in horizontal wiring is subject to increased requirements for the convenience of making branches, as well as the convenience of laying it indoors. When choosing a cable, the following characteristics are taken into account: bandwidth, distance, physical security, electromagnetic interference immunity, cost.

The horizontal subsystem, that is, the floor subsystem, can be divided into three parts:

The subscriber part consists of RJ-45 sockets connected by a patch cord;

The stationary part is a patch cord that connects sockets to a cabinet with network equipment;

The switching part is the patch cord between the switch and the sockets on the patch panel.

The vertical subsystem, the cable that connects the floors of the building, must transmit data over longer distances and at a higher speed compared to the horizontal subsystem cable. It consists of longer cable sections, the number of branches is much less than in the horizontal subsystem.

Optical fiber, as its name implies, transmits signals using pulses of light radiation. Semiconductor lasers and LEDs are used as light sources. Optical fiber is divided into single-mode and multi-mode.

Single-mode fiber is very thin, its diameter is about 10 microns. Due to this, the light pulse passing through the fiber is less often reflected from its inner surface, which provides less attenuation. Accordingly, single-mode fiber provides greater range without the use of repeaters. The theoretical throughput of single-mode fiber is 10 Gbps. Its main disadvantages are high price and high installation complexity. Single-mode fiber is mainly used in telephony.

Multimode fiber has a larger diameter - 50 or 62.5 microns. This type of optical fiber is most often used in computer networks. The greater attenuation in multimode fiber is due to the higher dispersion of light in it, due to which its throughput is significantly lower - theoretically it is 2.5 Gb / s.

All active switching equipment is located in special cabinets made of transparent plastic, which allows you to visually see all the equipment. Patch panels, converters, switches, hubs, etc. are used. In the departments, the wires are mounted on the walls using special boxes or on the ceiling under false ceilings. Everything is organized simply, conveniently and neatly. Special connectors are used to connect the optical cable to active equipment.

5. Network software and network administration

The wide variety of types of computers used in computer networks entails a variety of operating systems: for workstations, for department-level network servers, and enterprise-level servers as a whole. They may have different performance requirements and functionality, it is desirable that they have a compatibility property that would allow different operating systems to work together.

Network operating systems can be divided into two groups: department-wide and enterprise-wide. OS for departments or workgroups provide a set of network services, including the sharing of files, applications and printers. They should also provide fault-tolerant properties, for example, work with RAID arrays, support cluster architectures. Departmental network OSs are typically easier to install and manage than enterprise network OSes. They have fewer features, less data protection, and weaker interoperability with other types of networks, as well as poorer performance.

An enterprise-scale network operating system, first of all, must have the basic properties of any corporate products, including:

Scalability, that is, the ability to work equally well in a wide range of different quantitative characteristics of the network;

Compatibility with other products, that is, the ability to work in a complex heterogeneous environment of the Internet in plug-and-play mode.

The criteria for choosing an enterprise-scale OS are the following characteristics:

Organic support for multi-server network, high efficiency of file operations;

Possibility of effective integration with other operating systems, availability of a centralized scalable help desk, good development prospects;

Effective work of remote users, various services: file service, print service, data security and fault tolerance, data archiving, messaging service, various databases and others;

Various hardware and software host platforms: IBM SNA, DEC NSA, UNIX;

Various transport protocols: TCP/IP, IPX/SPX, NetBIOS, Appletalk;

Support for a variety of end user operating systems: DOS, UNIX, OS/2, Mac;

Support for network equipment standards Ethernet, Token Ring, FDDI, ARCnet;

Availability of popular application interfaces and mechanisms for calling remote RPC procedures;

Ability to interact with the network control and management system, support for SNMP network management standards.

Of course, none of the existing network operating systems fully meets the listed requirements, so the choice of a network operating system, as a rule, is carried out taking into account the production situation and experience.

One of the main tasks at the JSC Lepse enterprise is information protection.

Information security tools include:

Passwords installed on computers;

Antivirus programs;

Power protection for servers and some workstations.

The enterprise created the 1st department, which is responsible for the archive of classified information. Before accepting a new employee for work or practice (who will directly work with a computer and data), a person must be familiar with the instructions for protecting information. He will also need to obtain a certificate from the first department.

Information stored directly on computers is protected by restricting access for administrators and guests, each with a separate login and password. User groups are created with certain rights and powers (for example: user) of access to network resources. That is, for an employee with a certain position, certain access rights and the amount of information related purely to his activities are provided. Thus, the more rights, the more information the user has. The administrator can perform all actions: enter new data into the database, delete records from the database, and perform various settings of systems and programs. And ordinary users can only perform certain actions. For example, viewing and searching for the necessary information.

Virus protection can be provided using common antivirus programs such as Kaspersky Anti-Virus, Dr.Web and McAfee others. The company primarily uses McAfee.

In order to protect information from viruses and from its leakage, work on the Internet takes place on individual computers that are not connected to the network.


7. Power protection devices

To protect servers, as well as a number of simple workstations from power surges, the enterprise uses sources uninterruptible power supply. UPS (Uninterruptible Power Supply) uninterruptible power supplies provide all degrees of computer power protection. They are also the most expensive of all power protection devices. Whereas backup power supplies (BPS) supply power to the computer only in the event of an AC power outage, uninterruptible power supplies (UPS) provide a continuous supply of modulated power to the computer. direct current from the battery. AC mains power is not supplied directly to the computer power supply, it only constantly charges the battery of the uninterruptible power supply. As a result, the computer is isolated from any AC voltage anomalies. Like a backup power supply, an uninterruptible power supply can only provide a computer for a certain period of time (depending on the load), which allows the user to save the results of their work and shut down the operating system in a regular way. An uninterruptible power supply unit supplies voltage to the computer continuously, so when using it, there is no problem with the duration of switching to an autonomous battery mode. High-quality uninterruptible power supplies provide uninterrupted power to the computer, as well as correcting voltage dips and protecting against surges and peaks that occur in the AC mains.

The company uses uninterruptible power supplies APC Smart-UPS 5000VA 230V.

Specifications of uninterruptible power supplies APC Smart-UPS 5000VA 230V are shown in Table 1.


Table 1 - specifications uninterruptible power supplies APC Smart-UPS 5000VA 230V.

Permissible input" voltage

0 - 325 VAC

Output voltage

196 - 253 VAC

Input protection

Circuit breaker (with reset)

Frequency limits (mains operation)

Switching time

2 ms (typical), 4 ms (maximum)

5000VA/3750W

Output voltage when running on battery

220. 225. 230 or 240 V AC

Battery Frequency

50 or 60 Til ± 0.1 Hz: if Synchronized with mains power during partial shutdown

Voltage waveform during battery operation

Sine wave with low distortion

Overload protection (when running on battery)

Overcurrent and short circuit protection, lockable shutdown at

overload

Noise filter

Suppression of electromagnetic and radio frequency interference during normal operation and combined operation, 100 kHz - 10 MHz

Battery type

Splash-proof, sealed, lead acid battery, maintenance-free

Typical Battery Life

From 3 to 6 years. depending on the number of discharge cycles and ambient temperature

Typical recharge time

About 2 to 5 hours from full discharge

Working temperature

0 to 40°C (+32 to +104°F)

Storage temperature

-15 to +45°C (+5 to +113°F)

Relative humidity during operation and storage

0 - 95%. non-condensing

Terrain height during operation

From 0 to +3000 m

Storage Terrain Height

From 0 to +15000 m

Electromagnetic compatibility

Electromagnetic Interference (EMI)

EN55022 class A

Security Statement

GS. VDE certified to EN50091-1-1 and 60950


8. Feasibility study of the network

The main factor in the feasibility study of the network is the indicator of the total cost of creating a LAN. The total cost indicator consists of the following parts:

LAN development costs;

Costs for equipment and materials;

Marketing research costs.

The total cost of creating a LAN is determined by formula (1):

The total cost of creating a LAN;

LAN development costs;

Taxes included on the cost of creating a LAN;

Costs for equipment and materials (calculated at LAN design);

The cost of marketing research can be taken in the amount of 10-20% of .

The amount of taxes is calculated by the formula (2):

(2),

General wage fund for employees involved in the creation of the LAN;

The total rate of taxes (other than transport), including the cost of creating a LAN, can be taken at a rate of 10%.

The total wage fund of employees involved in the creation of the LAN is determined by formula (3):

(3),

The time of participation of a specialist of a certain qualification in the creation of a LAN (data are taken from Table 3);

The number of specialists of a certain qualification;

The monthly salary of an employee in accordance with his category or tariff category of the UTS of the public sector;

Shift duration (8 hours);

Average number of working days per month (21 days);

Bonus provided for employees 20-25% of;

Payments according to the district coefficient (Kirov 15% of (+P)).

LAN development costs are calculated by formula (4):

Project development and documentation costs;

Installation and installation costs;

Costs for commissioning;

Other costs associated with the creation of a LAN (study of tasks, literature, patents, economic calculations, etc.);

The costs for the development of the project and documentation are determined by the formula (5):

The cost of paying salaries to employees involved in the development of the LAN;

Award to employees involved in the development of the project and documentation;

District coefficient for employees involved in the development of the project and documentation (15%);

General rate of contributions for social needs (26%);

Wage fund for employees involved in the development of the project and documentation (includes salary bonus and payments according to the district coefficient);

Adjustment costs of the organization that is engaged in the creation of the LAN. They can be taken in the amount of 100-200% of.

Other costs for the creation of a LAN are 15-20% of the costs , and and are calculated by formula (7):

The cost of materials and equipment is calculated when designing the LAN, and their price is taken from the LAN design.

The overall cost estimate is presented in Table 2.


Table 2.

The "other" line includes: sockets, mounting cabinets, brackets, network adapters, network laying works, etc.

As a result, the total cost of building the network amounted to about 86 million rubles. The salary of the persons involved in the development and construction of the network is not indicated, since the network of the plant was not built immediately, but as needed, it was modified over the course of several years. Therefore, it is almost impossible to calculate the salary of persons involved in the development and construction of the network.


9. Measures for preventive maintenance of military equipment

Preventive maintenance of computers can be divided into:

emergency;

Planned (monthly, annual);

Preventive maintenance of copiers.

Emergency maintenance is carried out when the SVT fails. Maintenance is carried out by a specialist in the maintenance of BT facilities. It includes the following types of work:

Diagnostics of hardware and software of a computer or copy equipment;

Elimination of the hardware (replacement of the failed unit with a serviceable one) or software malfunction(OS reinstallation, software reinstallation).

Monthly preventive maintenance includes:

Removing dust from the external parts of the PC (when the power is off);

Visual inspection of cables: power supply, monitor interface cables, keyboard, mouse, printer, LAN cable;

Cleaning the magnetic heads of floppy drives with a cleaning disk;

Prevention of the keyboard, monitor, processor and other devices (checking with special test programs and external inspection).

In the course of the annual preventive maintenance of SVT facilities, the following actions are performed:

Performing a visual inspection of the computer;

Checking the performance of the cooling system of the processor, hard drive, video card;

Cleaning the monitor, keyboard, mouse and housing from dust with cleaning products;

Cleaning the drive and optical drive special cleaning diskettes and optical disks;

Defragmentation of the hard drive;

Checking hard disk for viruses by antivirus programs;

Checking the compliance of the programs installed on the computer with the programs recorded in the data sheet.

Periodic maintenance (TO) of copiers is also carried out. TO includes:

Cleaning the printer outside from dust and waste from the printing process;

Cleaning the inside of the printer (cleaning the interior mirror with a cleaning brush, wiping the rollers with alcohol);

Check print quality with a test.

If noise occurs during computer operation or when the PC or printer becomes very hot, the cooling systems are cleaned:

Dust removal with a brush or a piece of cloth (outside and inside);

Removal of foreign objects that got into the fan / radiator during operation;

Fan shaft lubrication.


10. Diagnostic tools and maintenance

10.1 Software and hardware diagnostics

All methods for troubleshooting and diagnosing devices can be divided into two main groups:

hardware method;

Program method.

Diagnostic software tools include various programs and utilities with which you can check your computer:

MHDD 4.6 is designed for hard testing disk for logical and hardware errors;

MemoryTest is designed to test memory;

Actra1.40 is a utility that collects all information about the computer, as well as all information about the software that is installed on the computer.

The hardware method includes an external inspection, checking the correctness of the connection using special devices - testers. The SLT3 (UTP) and SLT3S (UTP/STP/FTP) tester shown in Figure 3 is designed to test the copper cable.

Figure 3 - Testers

SLT3 (UTP) - light, small-sized testers, shown in Figure 3 a, consist of 2 parts (master and remote), have built-in 3 RJ45 sockets for testing, respectively 3rd cable stripping methods (sequences) USOC, 568A, 568V For ease of transportation, both parts of the tester are connected to each other (placed in a case, fixed on the installer's belt), while the batteries are turned off, thereby extending their service life. The tester is able to detect short circuits, line breaks and mismatches in this sequence (strands or pairs reversed). LED diodes in a certain way signal us about all these errors.

To measure the attenuation of optical lines, it is recommended to use a tester of the FLT4 type, shown in Figure 3 b. The tester consists of 2nd parts: light signal source (FLT4-S) and receiver optical power meter (FLT4-M). The light source is very easy to maintain. The only manually set parameter is the wavelength of the emitted signal (850 nm or 1300 nm). The source has a switch, which also signals to us the need to replace the batteries (one power supply with voltage in an EV of the Krone type). The receiver is equipped with a switch, a ratio level setting button (zeroing the tester when the "reference" cord is turned on), a wavelength selection button, and a measurement option button: attenuation or optical power. The measurement results are displayed on the LCD screen.

10.2 Tools and instruments

There are special tools that allow you to identify problems and fix them. These include:

A simple set of tools for disassembly and assembly. Necessary for elementary maintenance of a PC at the level of boards and nodes: screwdrivers (star-shaped, simple), tweezers, a device for extracting microcircuits, pliers, a flashlight, a protective kit for removing electrostatic voltage, tools for minor repairs (nippers, a file);

Diagnostic devices and programs for testing PC components: boot disks or floppy disk, self-test board to display POST diagnostic codes if any errors are detected;

Instruments for measuring voltage and resistance: digital multimeter, logic probes, single pulse generator for testing network circuits, for forcing a pulse with a duration of 1.5 to 10 µs into the circuit, tester power outlet to test the electrical outlet.

Chemical preparations: solution for wiping contacts, a spray gun with coolant, a can of compressed gas for cleaning PC parts;

Special improvised tools;

Test connectors for testing serial and parallel ports, memory testers, scanner for network cables;

Markers, pens, notebooks;

Spare parts, fasteners.

10.3 Troubleshooting methods

Troubleshooting any node or block of a computer can be carried out by two main methods, such as external inspection and testing of individual blocks.

External examination includes:

Checking the correct connection of computer blocks to each other;

Check cables and connectors and replace if necessary;

Checking microcircuits for burnt contacts.

Testing individual blocks includes:

Checking computer blocks with diagnostic programs;

Checking computer blocks with hardware diagnostic tools.

If an error or any malfunction is found, it must be eliminated. And if the malfunction cannot be eliminated, you need to replace the faulty computer unit with a serviceable one.

There is also a program of preventive measures, which includes two types of activities:

Passive prevention - measures aimed at protecting the PC from external influences: creating conditions, placement, use of network filters, uninterruptible power supplies, proper heat dissipation, exclusion of sunlight, grounding;

Active Prevention - performing operations aimed at extending the uptime of the PC: cleaning the PC, performing operations for fans and CPU to remove heat, scanning the hard disk and deleting unnecessary information, periodically monitoring the PC.


11. Ensuring conditions for the safe operation and repair of military equipment

Prohibited when power is on:

Move computer blocks, connect and disconnect them;

Connect and disconnect the interface cables of the keyboard, mouse, monitor, printer;

Put diskettes, papers, plates, cups, rags and other items on the computer;

If it is necessary to move the PC, call the specialists of the system and technical support department. Moving computers and devices connected to them by PC users is strictly prohibited.

It is forbidden to eat at workplaces equipped with a PC.

In case of malfunctions, contact the specialists of the relevant inspection departments.

When repairing BT equipment, the following rules must be observed:

Disconnect the computer from the network;

After opening the case, you need to remove the static voltage;

Never lay boards on a conductive metal surface.


Conclusion

During the course of industrial and professional practice at JSC Lepse, the company's network, its structure, network operating system, cable system, cable and switching equipment, network software were studied. Knowledge was gained in the field of setting up and administering a network, repair and maintenance of personal computers, scanning and printing devices. Skills were acquired in repairing and adjusting workstations, laser and inkjet printers, as well as installing servers and preparing workstations for work.


Bibliography

1. Mark Minasi "Your PC: device, principle of operation, modernization, maintenance and repair", St. Petersburg: KORONA print, 2004.

2. Magazine "World of PC"

3. www.morePC.ru

4. Lectures "Maintenance of SVT and KS"

5. "Hardware of local networks". Encyclopedia. M. Guk - St. Petersburg; publishing house "Peter", 2000.

6. “Computer networks. Principles, technologies, protocols”. V.G. Olifer, N.A. Olifer - St. Petersburg; publishing house "Peter", 2000.

7. Regulatory documents of the Lepse plant.

Introduction
Chapter 1. Analysis of the structure of the organization, description of the hardware and software of the organization
1.1 Structure of the organization
1.2 Description hardware organizations
1.3 Description of the software used in the organization
1.4 Description of the activities of the department information technologies organizations
Chapter 2. Ensuring stable operation of computer systems and complexes
2.1 List of instructions required for organizing the workplace of a computer system adjuster or a hardware and software system adjuster.
2.2 Examine the system of preventive maintenance of computers in the organization
2.3 Description of monitoring, diagnostics and recovery of computer systems and complexes
2.4 Identification of shortcomings in the system for ensuring the stable operation of computer systems and complexes. Suggestions for improving this system
Chapter 3. Description of the information system used in the organization
3.1 Analysis/development of the structure of the information system
3.2 Description of the database management system/software used for development
3.3 Description of the main objects of the information system
3.4 Instructions for users to work with the information system
3.4.1 Purpose of the program
3.4.2 Program execution conditions
3.4.3 Program execution
3.4.4 Operator messages
3.5 Description of means, methods of information protection when working with an information system
Conclusion
List of sources used

Introduction

Today the whole world communicates with the help of computers. Every family has high-tech machines; not a single enterprise works without them. Only not everyone knows how to talk to a computer in its language and make it understand the language of a person. To be an expert in computer systems means to be one step ahead of time. After all, nothing in the world is developing as fast as computer technology. No wonder they say: "The computer is outdated as soon as it went on sale."

Having learned how computer systems are arranged, you begin to understand the language of numbers, to know computer-aided design systems, microprocessor systems and peripheral equipment. In other words, you begin to speak the same language with the computer. He, as a friend, teaches to solve problems, assess risks and make decisions in non-standard situations, which is very much appreciated by employers. The range of application of the knowledge of a computer network specialist is wide: from small salons to large enterprises - wherever there are computers, a system administrator is required - a specialist in computer systems and complexes.

In order to better prepare specialists for this profession, practical skills are required. For this purpose, practical classes are provided in educational institutions.

Practice in the profile of the specialty is a form of training in organizations (enterprises) of different forms of ownership and organizational and legal forms.

Practice in the specialty profile is carried out for the purpose of studying general principles functioning of organizations and institutions for labor management and regulation of social and labor relations, employment services; principles of organizing the work of services and divisions dealing with the selection, placement and accounting of personnel, personnel departments, labor and wages, personnel management departments; as well as analysis of documentation supporting the activities of these services. It allows you to combine theoretical training with practical activities in specific workplaces. Practice tasks include:

  • monitoring, diagnostics and recovery of computer systems and complexes
  • system maintenance of computer systems and complexes
  • debugging of hardware-software systems and complexes;
  • installation, configuration and configuration of the operating system, drivers, resident programs;
  • maintaining customer databases;
  • demonstrating the capabilities of complex technical systems;
  • advising on the use of complex technical systems;
  • informing the consumer about the operating conditions of the selected options technical solutions, license agreements.
  • During the practice in the specialty profile, it is necessary to perform the following types of work:
  • characteristics of the enterprise. Analysis of the external and internal environment of the organization;
  • description of the technical and software park of the enterprise;
  • development of methods and regulations for preventive maintenance of computer equipment;
  • development of a system for modernizing the technical and software park of the enterprise;
  • development of information security policy rules;
  • designing the organization's database structure;
  • general description of the configuration/database, interface, input and output forms;
  • configuring and setting up the database, setting data access privileges;
  • drawing up instructions for the user when using a particular database management system;
  • developing a presentation of the organization's products.

Chapter 1. Analysis of the structure of the organization, description of the hardware and software of the organization

1.1. Organization structure

Princip Company is one of the largest companies in the city of Smolensk, specializing in the production and sale of computers, solving network integration issues, as well as in the supply of office and mobile equipment, components and consumables.

The stores offer the widest selection of modern computer equipment: personal and laptop computers, monitors, office equipment from leading manufacturers (Samsung, Acer, Phillips, Toshiba, MSI, Intel, AMD, Asus, Dell, LG, Canon, Epson and many others).

Huge selection of consumables (paper, cartridges for inkjet and laser printers, toner, ink, etc.)

Today it is a supplier of many large state and commercial organizations Smolensk and Smolensk region.

It also became the first Smolensk manufacturer of computers certified according to GOST and having an international quality certificate ISO 9001. This allows us to speed up and simplify the process of servicing our customers' equipment and offer computers highest quality at the best prices.

It is the first Smolensk company to be a Microsoft Gold Certified Partner with the "Management of licenses in organizations" competence, offering customers software under various licensing programs, which allows them to choose the best option.

1.2. Description of the organization's hardware

Nowadays, the vast majority of organizations use modern automated systems and computer hardware, software and storage media.

The institution has 12 computers.

The computer hardware for the workstation includes:

  • processor type and frequency - Intel Core 2 Duo 2.4 Hz;
  • volume random access memory- 2048 MV;
  • hard disk type and size - WDCWD1600AAJS-61 WAA0 (IDE500GB);
  • motherboard type - integrated;
  • type of video card - built-in;
  • type CD-ROM-DVD-R;
  • sound card type - built-in;
  • network card type - ETHERNET (100 MB/s);
  • BIOS type - rewritable;
  • monitor type and size - LCD 17''.

Workstation PC system software includes:

  • OS - Windows XP Professional;
  • manufacturer - Microsoft;
  • bit depth OS-32;
  • the file system used is NTFS;
  • type of supported interface - graphical.

Minimum requirements for computer architecture when installing this OS:

  • 2.4 Hz Intel processor or faster;
  • at least 64 MB of RAM (at least 128 MB recommended);
  • at least 1.5 GB free space on the hard drive;
  • CD or DVD drive;
  • keyboard, Microsoft Mouse.

The organization has an S5000MB (S5332LNi) server as a server computer: Core i5-4590 / 8 GB / 2 x 1 TB SATA RAID.

The server computer hardware includes:

  • Intel processor
  • Drive Interface SATA 6Gb/s
  • Type of HDD
  • RAM 8 GB
  • Network card 10/100/1000 Mbps

The organization uses the following peripherals HP LASERJET P2035, HP LASERJET PRO COLOR CP1025, HP LASERJET PRO P1102, HP SCANJET 300, Samsung ML-1210

1.3. Description of the software used in the organization

The operating system is Microsoft Windows XP Professional software.

Personal computer software:

  • Microsoft Office 2007
  • KasperskyAnti-Virus
  • 1C: Enterprise (1C: Accounting).
  • 1C: TRADE AND WAREHOUSE 7.7
  • Windows 2000 Server SP4

Windows XP Professional is an operating system (OS) of the Windows NT family of Microsoft Corporation. It was released on April 25, 2005 as a version of Windows XP for the personal computer platform.

Kaspersky Antivirus (KAV) is antivirus software developed by Kaspersky Lab. Provides the user with protection against viruses, Trojans, spyware, rootkits, adware, as well as unknown threats using proactive protection that includes the HIPS component (only for older versions called "Kaspersky Internet Security 2009+, where '+' is the sequence number of the previous register, annually incremented by one in accordance with the number of the year following the year of release of the next version of the antivirus"). Initially, in the early 1990s, it was called -V, then - AntiViral Toolkit Pro.

1C: Enterprise is a system of programs for automating various areas economic activity. A specific software product included in the 1C: Enterprise program system includes those functions and capabilities that meet the purpose of this product.

All components of the 1C: Enterprise program system can be divided into the Technological Platform and Configurations. The technological platform is a set of various mechanisms used to automate economic activity and is independent of specific legislation and accounting methodology. Configurations are actually applied solutions. Each configuration is focused on the automation of a certain area of ​​economic activity and, of course, complies with the current legislation.

"1C: Trade and Warehouse" is designed to account for any type of trading operations. Thanks to its flexibility and customizability, the system is able to perform all accounting functions - from maintaining directories and entering primary documents to receiving various statements and analytical reports.

"1C: Trade and Warehouse" automates work at all stages of the enterprise and allows you to:

  • keep separate management and financial records
  • keep records on behalf of several legal entities
  • keep batch accounting of inventory with the ability to choose the method of writing off the cost (FIFO, LIFO, average)
  • keep separate records of own goods and goods taken for sale
  • handle the purchase and sale of goods
  • perform automatic initial filling of documents based on previously entered data
  • keep records of mutual settlements with buyers and suppliers, detail mutual settlements under individual agreements
  • generate the necessary primary documents
  • draw up invoices, automatically build a sales book and a purchase book, keep quantitative records in the context of customs declaration numbers
  • perform product reservation and payment control
  • keep a record of cash in current accounts and at the cash desk
  • keep records of commodity loans and control their repayment
  • keep records of goods transferred for sale, their return and payment

In "1C: Trade and Warehouse" you can:

  • set the required number of prices of different types for each product, store supplier prices, automatically control and quickly change the price level
  • work with related documents
  • perform automatic calculation of write-off prices for goods
  • quickly make changes using group processing of directories and documents
  • keep records of goods in various units of measurement,
  • and cash - in different currencies
  • receive a wide variety of reporting and analytical information on the movement of goods and money
  • automatically generate accounting entries for 1C: Accounting.

"1C: Trade and Warehouse" contains the means to ensure the safety and consistency of information:

  • the ability to prohibit users from "direct" deletion of information
  • special data deletion mode with cross-reference control
  • the ability to prohibit users from editing data for past reporting periods
  • setting a ban on editing printed forms of documents
  • “locking” the system by the user during a temporary stoppage of work.

Server computer software

Windows 2000 Server is a feature-rich operating system that provides the functions of a file and print server, an application server, a Web server, and a communications server. New system in comparison with the previous one provides greater reliability, speed and ease of management. More importantly, Windows 2000 Server has a large set of distributed services built around Active Directory- a multi-purpose, scalable catalog created using Internet technologies and fully integrated with the system. Active Directory makes it much easier to administer systems and find resources in corporate network.

Numerous Web and Internet services included with Windows 2000 Server enable organizations to take advantage of Internet technologies by building sophisticated Web applications and streaming services (audio, video, and so on) using Windows 2000 Server as the platforms for building intranet networks.

Windows 2000 Server is a promising target and instrumentation platform for Independent Software Vendors (ISVs) and custom business application developers because it supports and evolves the most advanced distributed application services such as DCOM, transaction servers, and message queuing . In addition, in order to increase Windows performance 2000 Server base product in the family Microsoft servers supports multi-processor symmetric processing (SMP) on two processors and up to 4 GB of memory.

1.4. Description of the activities of the information technology department of the organization

System Administrator Responsibilities:

1. Installs operating systems and software necessary for operation on servers and workstations.

2. Performs software configuration on servers and workstations.

3. Maintains the software of servers and workstations in working order.

4. Registers LAN users and mail server, assigns IDs and passwords

5. Provides technical and software support to users, advises users on the operation of the local network and programs, draws up instructions for working with the software and brings them to the attention of users.

6. Sets access rights and controls the use of network resources.

7. Provides timely copying, archiving and backup of data.

8. Takes measures to restore the operability of the local network in case of failures or failure of network equipment.

9. Identifies user and software errors and takes action to correct them.

10. Monitors the network, develops proposals for the development of the network infrastructure.

11. Provides network security (protection against unauthorized access to information, viewing or changing system files and data), interworking security.

12. Performs anti-virus protection of the local area network, servers and workstations.

13. Prepares proposals for upgrading and purchasing network equipment.

14. Controls the installation of local network equipment by third-party specialists.

15. Informs his immediate supervisor about cases of violation of the rules for using the local area network and the measures taken.

Chapter 2. Ensuring stable operation of computer systems and complexes

2.1. A list of instructions necessary for organizing the workplace of a computer systems adjuster or a hardware and software systems adjuster.

Hardware and software adjuster - a specialist who manages the operation of a computer and configures certain types equipment related to computer technology And information support. The field of activity of this profession is the installation, maintenance and modernization of computer equipment, including hardware and software for personal computers, servers, as well as peripheral devices, equipment and computer office equipment.

Means of labor (the main types of equipment and technologies used)

– hardware and software of personal computers and servers;

- periphery equipment;

– multimedia equipment;

informational resources local and global computer networks.

Main types of work (labor activities)

– maintenance of hardware for personal computers, servers, peripheral devices and equipment, computer office equipment;

– installation and maintenance of software for personal computers, servers, peripheral devices and equipment;

- modernization of hardware for personal computers, servers, peripherals and equipment;

– modernization of software for personal computers, servers, peripherals and equipment.

Professional competencies

– to put computer facilities into operation;

- to diagnose the health, troubleshoot and failures of hardware of computer equipment;

- replace consumables used in computing and office equipment;

– install operating systems on personal computers and servers, as well as configure the user interface;

– to administer operating systems of personal computers and servers;

- install and configure the operation of peripheral devices and equipment;

– install and configure application software for personal computers and servers;

- diagnose the health, troubleshoot and crash the operating system and application software;

– optimize the configuration of computer equipment depending on the requirements and tasks solved by the user;

- remove and add components of personal computers and servers, replace them with compatible ones;

- replace, remove and add the main components of peripheral devices, equipment and computer office equipment;

– update and delete versions of operating systems of personal computers and servers;

– update and delete versions of application software for personal computers and servers;

– update and remove device drivers for personal computers, servers, peripherals and equipment;

– update the firmware of computer components, servers, peripherals and equipment

2.2. Studying the system of preventive maintenance of computers in the organization

Safety requirements before starting work

  • Put on and carefully tuck in special clothing (dressing gown) and technological footwear (slippers) established in accordance with current standards, avoiding hanging ends and constraint when moving.
  • Check and verify the availability and serviceability of the fixed tool, devices to ensure safe work performance, personal protective equipment, fire extinguishing equipment.
  • Check the condition of general and ordinary lighting.
  • Do not carry out any work on the repair of fixtures, equipment, etc., if this is not part of the employee's responsibilities.
  • Report all shortcomings and malfunctions found during the inspection at the workplace to the shift supervisor for taking measures to eliminate them completely.
  • Place the tool in the workplace with maximum ease of use, avoiding the presence of unnecessary items in the work area.
  • Check availability of first aid kit.

Safety requirements during work

  • Work only in serviceable and carefully fitted overalls and special equipment. shoes and use personal protective equipment required at the workplace in accordance with current regulations.
  • When servicing and repairing machines and equipment, the use of metal ladders is allowed. Work with boxes and other foreign objects is prohibited.
  • It is necessary to install the stepladder firmly, checking its stability before lifting. Ladders with a height of 1.3 m or more must be equipped with a stop.
  • Constantly monitor the health of the equipment. When leaving the machine or manipulator, the latter must be stopped and de-energized.
  • Work in the presence and serviceability of fences, interlocks and other devices that ensure labor safety, with sufficient illumination.
  • Do not touch moving mechanisms and rotating parts of machines, as well as energized live parts of equipment.
  • Keep tidy and clean workplace.
  • Keep foreign objects and tools away from moving mechanisms.
  • When starting the machine, machine, personally make sure that there are no workers in the area of ​​the machines.
  • All repair work on electrical installations, routine inspection, repairs should be carried out with the fuses (voltage) removed. Check the absence of voltage on current-carrying parts of electrical equipment with a voltmeter or voltage indicator.
  • To protect against burns when changing lamps in the equipment, the service technician must use cotton gloves, special keys and fixtures.
  • Immediately after carrying out the necessary shutdowns on the switching equipment (automatic device, knife switch, switch) disconnected during the preparation of the workplace, posters should be posted: “Do not turn on - people work!”, And disconnected for admission to work on overhead lines and cable lines - posters: “Do not turn on - work on the line!
  • For work, use a hand tool with insulating handles (pliers, pliers, wire cutters, screwdrivers), the dielectric coating should not be damaged and fit snugly to the handle.
  • Elimination of damage and repairs on the equipment must be carried out when the voltage is completely removed from the equipment.
  • The portable power tool used (soldering iron, step-down transformer) must be tested and have an inventory number, systematically and timely checked and repaired.

Safety requirements in emergency situations

  • Each employee who discovers violations of the requirements of this instruction and labor protection rules or notices a malfunction of the equipment that poses a danger to people is obliged to report this to the immediate supervisor.
  • In cases where a malfunction of the equipment poses a threatening danger to people or the equipment itself, the employee who discovered it is obliged to take measures to terminate the operation of the equipment, and then notify the immediate supervisor about this. Troubleshooting is carried out in compliance with safety requirements.
  • If an accident occurs during work, you must immediately provide first aid. medical care to the victim, report the incident to his immediate supervisor and take measures to preserve the situation of the accident, if this is not associated with a danger to the life and health of people.
  • When defeated electric shock it is necessary to release the victim from the action of the current as soon as possible, in case of working at height, take measures to prevent him from falling. Switch off the equipment using switches, a plug-in connector, cut the supply wire with a tool with insulated handles. If it is impossible to turn off the equipment quickly enough, other measures must be taken to free the victim from the action of the current. To separate the victim from current-carrying parts or wires, use a stick, board or some other dry object that does not conduct electricity, while the caregiver must stand on a dry, non-conductive place, or wear dielectric gloves.
  • If a fire occurs in a technical room, you should immediately start extinguishing it with the available means (carbon dioxide fire extinguishers, asbestos blankets, sand) and call the fire department.

Safety requirements at the end of work

  • It is necessary to tidy up the workplace, tools and fixtures.
  • Notify the work manager of any malfunctions noticed during work and the measures taken to eliminate them
  • Put away the overalls in a specially designated place.

Studying the system of preventive maintenance of computers in the organization

Types of technical maintenance of SVT

The type of maintenance is determined by the frequency and complex of technological operations to maintain the operational properties of the SVT.

GOST 28470-90 "Maintenance and repair system technical means Computer Engineering and Informatics” defines the following types of maintenance

  • regulated;
  • periodic;
  • with periodic control;
  • with continuous monitoring.

Scheduled maintenance should be carried out to the extent and taking into account the operating time provided for in the operational documentation for the SVT, regardless of the technical condition.

Periodic maintenance should be carried out at intervals and to the extent specified in the operational documentation for the SVT.

Maintenance with periodic monitoring should be carried out with the frequency of monitoring the technical condition of the computer and the necessary set of technological operations, depending on the technical condition of the computer, established in the technological documentation.

Maintenance with continuous monitoring should be carried out in accordance with the operational documentation for the SVT or technological documentation based on the results of continuous monitoring of the technical condition of the SVT.

Control of the technical condition of the SVT can be performed in static or dynamic modes.

In the static mode, the control values ​​of voltages and clock frequencies remain constant throughout the entire cycle of preventive control, and in the dynamic mode, their periodic change is provided. Thus, due to the creation of heavy operating modes of the SVT, it is possible to identify elements that are critical in terms of reliability.

Preventive control is carried out by hardware and software. Hardware control is carried out with the help of special equipment, instrumentation and stands, and software and hardware systems.

Troubleshooting activities during preventive control can be divided into the following stages:

  • analysis of the nature of malfunctions according to the current state of the computer;
  • control of environmental parameters and measures to eliminate their deviations;
  • localization of the error and determination of the location of the malfunction with the help of hardware and software of the SVT and with the help of additional equipment;
  • trouble-shooting;
  • resuming the solution of the problem.

Currently, the following types of maintenance systems (STO) are most widely used:

Scheduled preventive maintenance is based on the calendar principle and implements scheduled and periodic maintenance. These works are carried out in order to maintain the CVT devices in good condition, identify equipment failures, prevent failures and failures in the operation of the CVT.

The frequency of scheduled preventive maintenance depends on the type of SVT and operating conditions (number of shifts and load).

Advantages of the system - provides the highest availability of SVT.

Disadvantages of the system - requires large material and physical costs.

In general, the system includes the following types of maintenance (preventive maintenance):

  • control examinations (KO)
  • daily maintenance (ETO);
  • weekly maintenance;
  • two-week MOT;
  • ten-day maintenance;
  • monthly maintenance (TO1);
  • two-month maintenance;
  • semi-annual or seasonal (SRT);
  • annual maintenance;

KO, ETO SVT includes inspection of devices, running a quick test of readiness (operability of devices), as well as work provided for by daily preventive maintenance (in accordance with the operating instructions) of all external devices(cleaning, lubrication, adjustment, etc.).

During the two-week maintenance, diagnostic tests are run, as well as all types of two-week preventive maintenance provided for external devices.

With monthly maintenance, it provides for a more complete check of the functioning of the computer with the help of the entire system of tests that are part of its software. The check is carried out at the nominal values ​​of the power sources with a preventive voltage change of + 5%.

Preventive voltage change allows you to identify the weakest circuits in the system. Typically, circuits must maintain their performance when the voltage changes within the specified limits. However, aging and other factors cause gradual changes in the performance of the circuits, which can be detected on prophylactic regimens.

CVT proactive voltage testing detects predictable faults, thereby reducing the number of hard-to-locate faults that lead to failures.

During the monthly preventive maintenance, all necessary work is carried out, provided for in the operating instructions for external devices.

With a semi-annual (annual) maintenance (SRT), the same work is carried out as with a monthly maintenance. As well as all types of semi-annual (annual) maintenance work: disassembly, cleaning and lubrication of all mechanical components of external devices with their simultaneous adjustment or replacement of parts. In addition, the cables and power busbars are inspected.

A detailed description of preventive maintenance is given in the operating instructions for individual devices attached to the SVT by the manufacturer.

When maintaining on a technical condition, the performance of maintenance work is unscheduled and is performed as necessary based on the state of the object (test results), which corresponds to maintenance with continuous monitoring or maintenance with periodic monitoring.

Unscheduled preventive maintenance includes extraordinary preventive maintenance, appointed mainly after the elimination of serious malfunctions of the computer. The scope of preventive measures is determined by the nature of the malfunction and its possible consequences.

The conclusion of the SVT for unscheduled preventive maintenance can also be carried out when the number of failures that occur over a certain set period of time exceeds the allowable values.

The system requires the presence and correct use of various testing tools (software).

The system allows minimizing the cost of operating the WTS, but the readiness of the WTS for use is lower than when using a planned preventive service station.

With a combined maintenance system, “junior types of maintenance” are carried out as necessary, as with maintenance on condition, based on the operating time and operating conditions of a particular type of computer equipment or the results of its testing. The implementation of "senior types of maintenance" and repairs is planned.

The rational organization of service stations should provide for the accumulation of static material based on the results of CVT operation in order to summarize, analyze and develop recommendations for improving the service structure, increasing the efficiency of using CVT, and reducing operating costs.

The list of necessary material and technical means for organizing and carrying out work on maintenance of the SVT

The quality of operation of the SVT depends on the provision of spare parts, various devices consumables, providing control and measuring instruments, tools, etc.. It is also of great importance to create the necessary conditions for the normal functioning of computing facilities (temperature and humidity conditions, power supply conditions, etc.) and for service personnel (climatic conditions, noise level , illumination, etc.).

The operation of the CVT must be carefully planned. Planning should cover the whole range of issues related to how to draw up general program the work of the CVT, the distribution of computer time, etc., and to the entire work of the maintenance personnel.

The rational organization of operation should provide for the accumulation of static material based on the results of the operation of the SVT in order to summarize, analyze and develop recommendations for improving the service structure, increasing the efficiency of using the SVT, and reducing operating costs.

Diagnostic programs

For PCs, there are several types of diagnostic programs (some of which are included with the computer) that allow the user to identify the causes of problems that occur in the computer. Diagnostic programs used in PCs can be divided into three levels:

  • BIOS diagnostic programs - POST (Power-OnSelfTest - power-on self-test procedure). Runs every time the computer is turned on.
  • The Windows operating system diagnostic programs come with several diagnostic programs to test various components of your computer.
  • Diagnostic programs of firms - manufacturers of equipment.
  • Diagnostic programs for general purposes. Such programs, which provide thorough testing of any PC-compatible computers, are produced by many companies.

Power-on Self Test (POST)

POST is a sequence of short routines stored in the ROM BIOS on the motherboard. They are designed to check the main components of the system immediately after it is turned on, which, in fact, is the reason for the delay before loading the operating system.

Each time you turn on your computer, it automatically checks its main components:

  • processor,
  • ROM chips,
  • auxiliary elements of the system board,
  • RAM and major peripherals.

These tests are fast and not very thorough when a faulty component is found, a warning or error message (failure) is issued. Such faults are sometimes referred to as fatal errors. The POST procedure usually provides three ways to indicate a malfunction:

  • sound signals,
  • messages displayed on the screen
  • hexadecimal error codes issued to the I/O port.

When POST detects a problem, the computer emits distinctive beeps that can help identify the failed item (or group of items). If the computer is working properly, then when you turn it on, you will hear one short beep; if a malfunction is detected, a whole series of short or long sound signals and sometimes a combination of them. The nature of the audio codes depends on BIOS versions and the company that developed it.

In most PC-compatible models, the POST procedure displays the progress of testing the computer's RAM on the screen. If an error is detected during the POST procedure, a corresponding message is displayed, usually in the form of a numerical code of several digits, for example: 1790- Disk 0 Error. Using the operation and service manual, you can determine which malfunction corresponds to this code. Error codes issued by POST to I/O ports

A lesser known feature of this procedure is that at the beginning of each test, POST outputs test codes to a special I/O port address, which can only be read using a special adapter card installed in the expansion slot. The POST board is installed in the expansion slot. At the time of the POST procedure, its built-in indicator will rapidly change two-digit hexadecimal numbers. If the computer unexpectedly stops testing or “freezes”, this indicator will display the code of the test during which the failure occurred. This allows you to significantly narrow the search for a faulty element. On most computers, POST codes to I/O port 80h

Operating system diagnostic programs

DOS and Windows include several diagnostic programs. Which provide performance of testing of components of SVT. Modern diagnostic programs have graphical shells and are part of the operating system. Such programs are, for example:

  • utility to clean the disk from unnecessary files;
  • utility to check the disk for errors;
  • utility for defragmenting files and free space;
  • data archiving utility;
  • conversion utility file system.

All of these programs are also available in Windows.

Diagnostic programs of equipment manufacturers

Equipment manufacturers produce special specialized programs for diagnosing specific equipment, a specific manufacturer. The following groups of programs can be distinguished:

  • Hardware Diagnostic Programs
  • SCSI Device Diagnostic Programs
  • Network adapter diagnostic programs

Diagnostic programs for general and special purposes

Most test programs can be run in batch mode, which allows you to run a whole series of tests without operator intervention. You can create an automated diagnostic program that is most effective if you need to identify possible defects or run the same sequence of tests on multiple computers.

These programs check all types system memory: basic (base), extended (expanded) and additional (extended). The location of the fault can often be determined down to a single chip or module (SIMM or DIMM)

There are many such programs. This type of software can be divided into the following categories:

  • Information programs;
  • Test programs;
  • Universal programs

Information programs

They are used in situations where it is necessary to find out a detailed configuration and test the computer for performance as much as possible without disassembling system unit or when, at first glance, everything works fine, but the user claims that his computer is constantly buggy and starts every other time. Or after repairs, for example, replacing electrolytic capacitors with motherboard, you need to conduct a thorough diagnosis in order to make sure that the computer is working properly. They test a computer or individual components, and provide detailed information about its condition, functionality, and possible software and physical problems.

Test programs

They work on the principle of maximum load with various operations that emulate the user's work on a computer, and measure the overall performance of the system or the performance of individual components based on a comparison with an existing database.

Universal programs

Programs combining two categories of programs - informational and test. They allow not only to test the PC, but also to obtain comprehensive information about its components.

There are quite a few different versions programs, but they are all focused solely on measuring the performance of a video system.

When you start the program, in the main window you will see only the model of the video card and the characteristics of the monitor. For more information, click on SystemInfo, there you can find out - processor model, cache memory size, directX version and other system information. It is possible to select all or only some tests in the program. Almost all tests are run twice, at low and high detail, which gives greater accuracy. After the test, the program displays the result in the form of points that can be compared with another computer. The main thing is that the video system test is not complete without a critical load on other computer components. And if the computer under test coped with them, then most likely the main components are in order.

Among the packages of service utilities, without a doubt, "the first among equals" is NortonUtilities manufactured by Symantec and has already grown to the 2001 version.

The included SystemInformation utility provides conveniently grouped information on all major computer components. It is possible to detail information on some sections, as well as generate a report. Quite clearly and colorfully, with the use of pie charts, information about the efficiency and use of the disk is framed. You can test the processor by clicking the Benchmark button. The program gives a graph of the approximate speed of your system, the unit of measurement is the performance of a PC based on Intel processor 386SX-16MHz.

Service equipment

To troubleshoot and repair a PC, you need special tools that allow you to identify problems and fix them simply and quickly.

These include:

  • a set of tools for disassembly and assembly;
  • chemicals (solution for wiping contacts), a spray bottle with coolant and a can of compressed gas (air) for cleaning computer parts;
  • a set of swabs for wiping contacts;
  • specialized improvised tools (for example, tools needed to replace microcircuits (chips));
  • service equipment.

Service equipment is a set of devices designed specifically for diagnosing, testing and repairing computer hardware. Service equipment includes the following elements:

  • Measuring instruments test connectors for testing serial and parallel ports;
  • memory testing devices that allow you to evaluate the functioning of SIMM modules, DIP chips and other memory modules;
  • equipment for testing a computer power supply;
  • diagnostic devices and programs for testing computer components (hardware and software systems).

Measuring instruments and test sockets for testing PC ports

The following measuring instruments are used to check and repair a PC:

  • digital multimeter;
  • logic probes;
  • single pulse generators for testing digital circuits.

Test connectors provide software and hardware testing of PC I/O ports (parallel and serial).

Computer power supply testing equipment provides testing of PC power supplies and determination of their main characteristics. It is a set of equivalent loads, switching elements and measuring instruments.

2.3. Description of monitoring, diagnostics and recovery of computer systems and complexes

Status analysis and troubleshooting "SamsungML-1210"

The printer does not pick up paper. The problem is in the capture roller. You need to do preventive maintenance.

Technical description "SamsungML-1210"

Main characteristics:

  • Printing technology - laser (Electrography);
  • Print speed - 12 PPM (pages per minute);
  • Toner saving mode up to 30%;
  • Resolution - 600 × 600 dpi;
  • Powerful 66 MHz processor;
  • Repeat the printing of the last sheet by pressing one button;
  • Compatibility (Linux, Macintosh, Windows).

Other Features:

  • Tray (cassette) - 150 sheets;
  • Output tray - 100 sheets;
  • Paper size - Letter, legal, Monarch, com 10, C5, DL, A4, A5, B5;
  • Interface - USB, IEEE 1284 (parallel);
  • Processor - 66 MHz;
  • Memory (MB) - 8 MB;
  • Working cycle (pages per month) - 12000;
  • Supported operating systems - Windows 95/98/2000/Me/NT, Linux (Redhat 6.0), Macintosh OS 8.0 and later;
  • Emulation - Smart GDI;
  • Toner cartridge - Single cartridge: 2500 pages at 5% coverage, 1000 starter.
  • Power consumption (W):
  • Standby - 5;
  • In print mode - 180;
  • Warm-up time (sec.) - 25;
  • First page output (sec.) - 13;
  • Noise level (max., dB) - 47;
  • Fonts - Windows fonts;
  • Size (W × D × H) mm - 329 × 355 × 231;
  • Printer weight - 6.2 kg.

Troubleshooting and failures "SamsungML-1210"

The front cover opens, 2 screws are unscrewed.

Unscrew 4 screws on the back.

The back wall, the top cover is removed, the paper guides are taken out and the side walls are removed.

Unscrew 3 screws that hold the laser. Disconnect 2 connectors located on the sides. The glass is wiped with a cotton swab or a clean piece of cloth.

The gripper roller, which is held by 2 self-tapping screws, is actually unscrewed and cleaned with a special liquid. At the same time, the brake pad is cleaned. It is located in the machine under the pickup roller.

Then the printer itself is cleaned. This operation can be produced by a vacuum cleaner or a compressor.

Assembly is carried out in the reverse order.

2.4. Identification of the shortcomings of the system for ensuring the stable operation of computer systems and complexes. Suggestions for improving this system

The disadvantage of this organization is the lack of a maintenance schedule for PCs and peripheral equipment. In this regard, this schedule was proposed and developed.

Chapter 3. Description of the information system used in the organization

3.1 Analysis of the subject area for the information system

Students organized in groups study in one of the specialties. Teachers are involved in the learning process. The educational process is regulated by the curriculum, indicating the number of hours for each discipline and the form of control (test, exam). A teacher can lead classes in one or more disciplines.

3.2 Analysis/development of the structure of the information system

This figure shows a block diagram of the program execution, which means that information from directories is taken into the document.

A use case diagram (use case diagram) in UML is a diagram that depicts the relationship between actors and use cases and is integral part precedent model, which allows describing the system at the conceptual level.

Precedent - the possibility of a simulated system (part of its functionality), thanks to which the user can get a specific, measurable and desired result. A use case corresponds to a particular service of the system, defines one of the options for its use, and describes a typical way of user interaction with the system. Use cases are typically used to specify external requirements for a system. .

3.3 Description of the database management system/software used for development

The 1C: Enterprise 8 software system includes a platform and application solutions developed on its basis for automating the activities of organizations and individuals. The platform itself is not software product for use by end users who usually work with one of the many application solutions (configurations) developed on this platform. This approach allows you to automate various activities using a single technological platform.

3.4. Instructions for users to work with the information system

3.4.1 Purpose of the program

The program allows:

  • based on the entered data allows you to view the information of interest.
  • to carry out automated selection of the necessary information.
  • generate and print documents for registration and reporting forms.

program benefits « information system of the auto enterprise ":

  • convenience and ease of use;
  • small amount of occupied memory on hdd;
  • operational service.

Functional purpose

  • the ability to independently manage the accounting methodology within the settings accounting policy and settings of accounting parameters;
  • arbitrary structure of the account code makes it possible to use long codes of accounts (sub-accounts) and maintain multi-level charts of accounts with a large nesting level;
  • the ability to work with several charts of accounts allows you to keep records in several accounting systems;
  • contains built-in mechanisms for conducting quantitative and currency accounting;
  • on any account, you can maintain multidimensional and multilevel analytical accounting;
  • the user can independently create new types of subconto, add accounts and subaccounts;
  • business transactions are reflected in accounting mainly by entering configuration documents that are identical to primary accounting documents, it is possible to enter individual entries manually;
  • when reflecting business transactions in configuration documents, you can explicitly indicate accounting and tax accounts;
  • the applied accounting methodology ensures the simultaneous registration of each record of a business transaction, both according to accounting accounts and according to the necessary sections of analytical accounting, quantitative and currency accounting;

Operational purpose

The program should be operated by enterprises focused on the automotive industry, namely passenger and freight transport.

Users of the program must be employees of the automotive industry.

Composition of functions

The program provides the ability to perform the following functions:

  • functions for creating a new (empty) file;
  • functions for opening (loading) an existing file;
  • inventory accounting;
  • inventory control;
  • accounting of trade operations;
  • accounting of commission trade;
  • accounting of agency contracts;
  • accounting of operations with containers;
  • accounting of banking and cash transactions;
  • accounting for settlements with counterparties;
  • accounting of fixed assets and intangible assets;
  • accounting of the main and auxiliary production;
  • accounting of semi-finished products;
  • accounting for indirect costs;
  • VAT accounting;
  • payroll accounting, personnel and personalized accounting;
  • income tax accounting;
  • simplified taxation system;
  • accounting for activities subject to a single tax on imputed income;
  • accounting of income and expenses of individual entrepreneurs - payers of personal income tax;

3.4.2 Program execution conditions

Climatic operating conditions under which the specified characteristics must be ensured must meet the requirements for technical equipment in terms of their operating conditions.

Minimum composition of technical means

The hardware should include an IBM-compatible personal computer (PC), which includes:

  • processor Pentium-1000 with a clock frequency, GHz - 10, not less;
  • motherboard with FSB, GHz - 5, not less;
  • RAM volume, GB - 2, not less;

Minimum composition of software

The system software used by the program must be represented by a licensed localized version of the operating system. You can use update package 8.3.5.1284.

3.4.3 Program execution

Program launch

The program is launched by double-clicking the left mouse button on the label of the program "1C: Enterprise 8.3", then you need to select the "WIS Base" configuration and click the "Configurator" item. The selection window is shown in Figure 1.

Figure 1 - Launching the infobase

After launching the program module in the "1C: Enterprise 8.3" system, the "Working window of the 1C: Enterprise 8.3 system" will appear on the screen, it displays a menu and a toolbar in accordance with the selected user, it looks like this: the working window of the system is shown in Figure 2 .

Figure 2 - Appearance of the configuration menu

Menu operation

This menu can be divided into:

  • menu "File";
  • menu "Edit";
  • menu "Configuration";
  • menu "Debug";
  • menu "Administration",
  • menu "Service",
  • menu "Windows",
  • Help menu

You can choose the basic actions for editing and setting up a document, from creating and saving a new document to setting access rights to the infobase. You can also customize the interface for a specific user, use the help offered by the program to facilitate work.

The main menu is the "Configuration" menu, because the structure of the infobase is created in it. Each configuration object has a unique set of properties. This set is described at the system level and cannot be changed during task configuration. The set of properties of a configuration object is determined mainly by its purpose in the 1C:Enterprise system.

The main property of any configuration object is the name - the short name of the configuration object. When a new configuration object is created, it is automatically assigned a conditional name consisting of a word determined by the type of object and a number. This name can be changed while editing the properties of the configuration object, while the system keeps track of the uniqueness of the names. The configuration object name cannot be empty and cannot be longer than 255 characters.

Some properties from the entire set of properties inherent in the configuration object are available for editing and can be changed in one way or another during the system configuration. The nature of the changes and their limits are also set at the system level. A specialist who configures the system can achieve the desired behavior of the object during system operation by purposefully changing the properties of the configuration object.

3.4.4 Operator messages

Since the program is not a console (with a command line interface), but with a graphical user interface, classic text messages not expected. Error messages are displayed as windows on the desktop. Shown in Figure 3.

3.5 Description of means, methods of information protection when working with an information system

1C:Enterprise supports the ability to upload/download an infobase to a file. This mechanism is intended primarily for obtaining an infobase image, regardless of how data is stored. For example, loading/unloading an infobase to a file can be used to convert the file version to a client-server one.

Sometimes this mode is also used to create backup information base, but this variant of its use has a number of disadvantages. The main disadvantage of this method of creating a backup is the need to use single-user mode to carry out this operation. With a large amount of information base, a break in the work of users can be quite large, which is not always acceptable.

Depending on the variant of 1C: Enterprise (file or client-server), we can recommend the following ways to create a backup copy of the infobase:

1) When using the 1C:Enterprise 8 file option, you can organize the process of creating an infobase backup copy by simply copying the 1CV8.1CD file to a separate directory or using data backup and recovery software. It should be taken into account that to ensure the integrity and consistency of data during the creation of a backup, the work of users with the infobase should be prohibited, however, the time required to create a backup is significantly less than when using uploading the infobase to a file.

2) When using the client-server version of 1C: Enterprise 8, it becomes possible to create a backup copy of the infobase using the DBMS. For example, SQL Server allows you to back up data while the database is in multi-user mode and available to all users.

The use of these methods gives the maximum exact copy the state of the infobase, which cannot always be obtained when using the infobase loading/unloading mode. For example, if the database is corrupted, then unloading some information may not be unloaded, while copying will preserve all the information, and after restoration, you can perform a database repair.

The time spent by the infobase in single-user mode is also significantly reduced in the case of the file version of 1C: Enterprise 8, and in the case of the client-server version, single-user mode is not used at all.

Besides positive moment is that when using listed ways, you can use various specialized software tools to create backups.

Conclusion

During the internship in the direction 230000 Informatics and Computer Engineering in the specialty 230113 Computer Systems and Complexes, the following tasks were performed:

Formation and development of general and professional competencies in the field of the chosen specialty;

Acquiring and developing the necessary skills, abilities and experience practical work to solve professional problems in the conditions of a particular enterprise (organization) of the city and district;

  • Organization of independent professional activity, socialization in a specific type of activity.
  • Also, as a result of practical training in the direction 230000 Informatics and Computer Engineering in the specialty 230113 Computer Systems and Complexes, the following tasks were completed:
  • Consolidation, deepening and expansion of the acquired theoretical knowledge, skills and abilities;
  • Mastering professional competencies, production skills and new methods of work;
  • Mastering the norms of the profession in the motivational sphere: awareness of motives and spiritual values ​​in the chosen profession;
  • Mastering the basics of the profession in the operational sphere: familiarization and assimilation of the methodology for solving professional tasks (problems);
  • The study of different aspects of professional activity: social, legal, psychological, hygienic, technical, technological, economic.

As a result of practical training, experience was gained in supporting workstations in working order, as well as in analyzing and structuring knowledge about information system branch.

List of sources used

1. Baidakov V., Dranishchev V., Krayushkin A., Kuznetsov I., Lavrov M., Monichev A. 1C:Enterprise 8.0 Embedded language description. [Text] /. In 4 volumes. - M .: Firm "1C", 2004. -2575 p.
2. Belousov P.S., Ostroverkh A.V. Repair of workstations. [Text] / Practical guide. - M .: LLC "1C-Publishing", 2008. -286 p.: ill.
3. Gabets A.P. Solving operational problems. Methodological materials for the listener of the certified course. [Text] / M .: LLC "1C-Training Center No. 3", 2004. -116s.: Ill.
4. A. P. Gabets and D. I. Goncharov, All About PC Design. [Text] / M .: 1C-Publishing LLC, 2008. -286 p.: ill.
5. Gabets A.P., Goncharov D.I., Kozyrev D.V., Kukhlevsky D.S., Radchenko M.G. Professional development in the system 1C: Enterprise 8. - M .: LLC "1C-Publishing"; [Text] / St. Petersburg: Peter, 2007. - 808 p.: ill.
6. Smooth A. A. 1C: Enterprise 8.0. - St. Petersburg: [Text] / Triton, 2005. - 256 p.: ill.
7. Mitichkin S.A. Development in the system 1C Enterprise 8.0. [Text] / M .: 1C-Publishing LLC, 2003. - 413p. ill.
8. Pankratov, F.G. 1C: Enterprise [Electronic resource]: textbook / F.G. Pankratov. - M.: Businesssoft, 2005. - 1 electron. opt. disc (CD-ROM).
9. Radchenko M.G. 1C:Enterprise 8.0. Practical developer guide. Examples and typical techniques. [Text] / M.:, 1C-Publishing LLC, 2004. -656 p.: ill.
10. Radchenko M.G. Repair of computers and peripherals. [Text] / M.:, 1C-Publishing LLC, St. Petersburg: Peter, 2007. -512 p.: ill.
11. Russian State Library [Electronic resource] / Center inform. RSL technologies; ed. Vlasenko T.V.; Web-master Kozlova N.V. - Electron, yes. – M. : Ros. state library, 1997 . – Access mode: http://www.rsl.ru, free

Introduction

The development of economic and social relations, the expansion of the network and enterprises and the increase in their size, the emergence of new ties between enterprises and industries, the increase in the flow and volume of information - all this has led to a sharp complication of managerial tasks.

The complication of the tasks solved in the field of management, in turn, led to a change in the nature of management processes. The use of computers significantly increases the efficiency of management, but it assumes the active participation of a person in the management process. It is he who makes the final decision on the basis of an assessment of various calculation options, taking into account the additional data at his disposal.

Industrial and technological practice is an organic part of the educational process and aims to consolidate and deepen the knowledge gained in the process of theoretical activity, to involve the student in socially useful work and to link the theoretical knowledge gained with the real production conditions. During the passage of industrial technological practice, student interns work according to the regime established for this enterprise and obey the internal regulations of this organization.

The purpose of the production and technological practice is to study by students a real enterprise and working conditions on it, to acquire applied skills in the development and maintenance of programs, the study of information flows and workflow, ways of storing and processing information, collecting materials for a report and preliminary selection of a probable topic for a graduation project. In addition, during the internship, student interns must also take an active part in the social life of the enterprise.

1. Production activity of the enterprise

Municipal state-financed organization culture "Vozhegodsk regional cultural and leisure association"

Year of creation - 01.11.2007. The network of MBUK "VR KDO" consists of 14 branches: Houses of culture and clubs. Director of MBUK "VR KDO" Lyubov Alexandrovna Klyushina. the main objective work of MBUK "VR KDO": Creation of conditions for organizing leisure and providing residents of the district with the services of cultural and leisure institutions.

To achieve this goal, the following tasks were set for 2012:

Improving the organization of work to improve the skills of KDO specialists using new methods.

Creation of conditions for increasing the efficiency and effectiveness of the work of the KFOR.

Work to form a positive image of the BWW institutions.

Priority areas of work of MBUK "VR KDO":

Patriotic and spiritual and moral education of citizens.

Promotion of family values.

Preservation and revival of traditional folk culture.

Prevention of a healthy lifestyle.

Cultural and entertainment activities.

Formation and development of cultural brands of settlements.

Inter-settlement festivals and holidays are held annually.

Performance indicators of MBUK "VR KDO" in 2012:

4586 events were held, including 2389 screenings.

Conducted 3748 events on a paid basis, including 2389 film screenings.

54923 visitors were served, 13788 of them were at film screenings.

32,001 paid visitors were served, of which 13,788 were at film screenings.

There were 135 club formations with 993 members.

All Houses of Culture and clubs carry out their activities in accordance with the goals and objectives.

2. IS architecture, software tools, methods of processing and storing information, organization of the database, familiarization with the network structure and composition of the VT

The institution "Vozhegodsk Regional Cultural and Leisure Association" uses the topology of the "Zvezda" network, that is, two computers are connected to each other using a router.

The star topology is the basic topology of a computer network in which all computers on the network are connected to a central node (usually a switch), forming a physical network segment. Such a network segment can function both separately and as part of a complex network topology (usually a "tree"). The entire exchange of information goes exclusively through the central computer, which in this way has a very large load, so it cannot do anything other than the network. As a rule, it is the central computer that is the most powerful, and it is on it that all the functions of managing the exchange are assigned. In principle, no conflicts in a network with a star topology are possible, because the management is completely centralized, what the star topology looks like can be seen in diagram No. 1.

Scheme No. 1.

Characteristics of institutional computers

"Vozhegodsk regional cultural and leisure association":

Specifications:

Computer #1

Processor: Intel® Pentium® 4 2.66 GHz

RAM: 512 Mb DDR

Hard drive: Seagate 120 Gb 7200 rpm

Monitor: Samsung 17"

OS: MS Windows XP Professional

Computer #2

Processor: Intel® Pentium® 4 2.66 GHz

RAM: 1024 Mb DDR

Video card: Geforce FX 5200 128Mb 128 bit MSI

Hard drive: Seagate 240 Gb 7200 rpm

Monitor: Samsung 19"

OS: MS Windows 7

3. Reporting form

The reporting form of the institution "Vozhegodsk Regional Cultural and Leisure Association" is information containing tables, text, calculations and designed in a text file using a set of Microsoft Office programs, such as Microsoft Word, Excel, Access.

4. Means of security and information protection

The institution's computers have been installed antivirus Kaspersky CRYSTAL.CRYSTAL keeps your digital world crystal clear. Hybrid Internet Threat Protection instantly eliminates malware, spam and other modern threats, saving computer resources through a combination of cloud and antivirus technologies. do on the internet. The product has optimal default settings, and you do not need to be an IT specialist to effectively manage the protection of all home computers. Use the full potential of the Internet, and entrust security to Kaspersky PURE. The capabilities of Kaspersky PURE allow you to save your valuable documents, photos, favorite audio recordings and movies even if your computer breaks down or is stolen. Special security tools and technologies allow you to create and securely store strong passwords, as well as prevent account theft on websites and applications. Using Kaspersky PURE, you can determine the time, duration and nature of the work of each user in your home. You can also block access to websites with inappropriate content and filter data transmitted using instant messaging programs. Kaspersky PURE is a comprehensive home computer protection solution that allows you to centrally manage security and reliably protects your computers from malware and other Internet threats. Special tools such as Parental control, Password Manager, Backup and more, provide a level of protection for your personal data that has never been possible before.

5. Requirements for labor protection and safety.

Basic rights and obligations of employees:

1. Employees of the Company have the right to:

· To conclude, amend and terminate an employment contract in the manner and under the conditions established by labor legislation.

· For the provision of work stipulated by the employment contract.

· To a workplace that meets state regulatory requirements for labor protection.

· For timely and full payment of wages in accordance with their qualifications, the complexity of work, the quantity and quality of work performed.

· For rest provided by the establishment of normal working hours, the provision of weekly days off, non-working holidays, paid holidays.

· Complete and reliable information about working conditions and labor protection requirements at the workplace.

For professional training, retraining and advanced training in the manner prescribed by labor legislation and local regulations of the Company (documented by the QMS procedure "Personnel Training"), including for certification in order to maintain the level of professional competence, improve the qualification category or promotion , is regulated by the Regulations on the procedure for attestation of the Company's employees.

· For compensation for harm caused to them in connection with the performance of labor duties, and compensation for moral damage in the manner prescribed by labor legislation.

· On obligatory social insurance in cases stipulated by federal laws.

2. Employees are required to:

· Conscientiously perform their labor duties stipulated by the employment contract and job description.

· Comply with the Internal Labor Regulations and other local regulations adopted in the Company in the prescribed manner.

· Work conscientiously, observe labor discipline, timely and accurately execute the orders of the Company, use all working hours for productive work.

· Carefully treats the property of the Company (including the property of third parties held by the Company, if the Company is responsible for the safety of this property) and other employees.

· Ensure the safety of the entrusted property, use the equipment efficiently, take care of tools, measuring instruments, overalls and other items issued for use by employees.

· Do not disclose information constituting a trade secret and confidential information about the activities of the Company, in accordance with the "Regulations on ensuring the safety of confidential information in the Open Joint Stock Company" Universal Electronic Card Vologda region».

· Behave correctly, with dignity, avoiding deviations from the recognized norms of business communication.

Obligations of the employee in the field of labor protection.

The employee is obliged:

proper use of personal and collective protective equipment;

· be trained in safe methods and techniques for performing work on labor protection, first aid, briefing on labor protection, testing knowledge of labor protection requirements;

undergo mandatory medical examinations;

immediately inform the immediate supervisor or other representatives of the Company about the occurrence of a situation that poses a threat to the life and health of people, the safety of the Company's property (including the property of third parties held by the Company, if the Company is responsible for the safety of this property).

6. Tasks of the head of practice from the enterprise

1) Update installed software

Basically, this operation was carried out manually by selecting the necessary updates, but it was also practiced to update programs through the free application - Software Update Monitor (tracking software updates). Its main purpose is to notify the user about the appearance of new versions of applications with which he works (the result can be seen in Fig. 1).

2) LAN setup

Before setting up local network through a router for two computers, we will perform the following operations on each of them:

· Setting up a local network for Windows XP

First you need to disable all security programs on this computer (antiviruses, firewalls, firewalls, etc.)

In order for several computers to be recognized and have public access, they must be placed in the same workgroup. To do this, you need to do the following: open the "Properties" tab by calling the context menu on the "My Computer" icon, then go to the "computer name" tab and, by clicking on the "change" button, change the computer name, and click "OK". To set up a local network using a router, you need to make sure that all the IP addresses of computers are located on a single subnet. To do this, you must specify identical settings on all computers. Sometimes the configuration cannot be done without enabling the NetBios protocol. If you have just such a case, then you need to go to the tab " Network connections"And open a window for configuring TCP / IP, then call up additional parameters and enable this same NetBios in the "general" attachment. On this, we can assume that the process is completed.

· LAN setup for Windows 7

The process of setting up a local network for different operating systems is very different. Setting up a local network through a router for Windows 7 is not much more difficult. First, we will need to find out the name of our computer, then go to the "Properties" section, in which we click on the "change settings" button and make the necessary amendments. Then restart your computer for the changes to take effect. The computer name must be in English letters. If it is specified in a different way, then there is a high risk of getting serious errors in the network.

Now we configure automatic generation of the address and DNS. To do this, go to the following path: Control Panel - Control Center - Local Area Network - Properties. In the window that opens, select TCP / IPv4 and check the box for obtaining an IP address automatically. At the end, you will only have to enable NetBios. To do this, you will need to go to the "Protocol Properties" section, in the "Advanced" tab, click on the "WINS" button and check the box next to "Enable NetBios", and then restart the computer. This completes the settings.

3) Installation of additional software

In the institution "Vozhegodsk Regional Cultural and Leisure Association" additional software was installed:

WINRAR 5.00 is a powerful utility for creating and managing archives, containing a whole range of additional useful features. WinRAR program Used daily by millions of people around the world to save PC space and transfer files quickly.

Adobe Flash Player is a universal free application that allows you to view pages with dynamic content, colorful special effects, interactive games and video clips, in fig. 2 you can see what Adobe looks like Flash Player.

Reader is a free, proven standard for securely viewing, printing, and annotating PDF documents. It is the only PDF viewer that allows you to open and interact with all types of PDF content, including forms and multimedia objects, as shown in Figure 1. 3.

FineReader is a text recognition program that allows you to quickly and accurately convert document images and PDF files into editable electronic formats without the need for retyping.

You can get an image for recognition not only with the help of a scanner: it is enough to have a digital camera with you or mobile phone with a built-in camera, the result can be seen in Fig. 4.

microsoft office antivirus installation

4) Install Microsoft Office 2007

Before installing office 2007, we need to remove old version, to do this, go to the "my computer" folder, then select "add/remove programs" and delete the old Office version 2003, after the removal is completed, we restart the computer. After restarting the computer, load the Office 2007 image from portable media and start the installation following the instructions. After installation, it is best to reboot the copter for the changes to take effect.

) Installing Windows7 operating system:

Windows is reinstalled using hard disk partitioning programs, both standard and third-party such as: Acronis Disk Director.

The first thing to do before Windows installation we need to make a copy of the data we need using a memory card or CD-ROM.

· Now we need to go into the BIOS of the computer to set the boot from a CD or from a USB flash drive. Save the changes and restart the computer by pressing the F10 key.

The third step would be hard training disk to install a new OS. Here we perform the procedure of partitioning the disk into a file NTFS system with help Acronis software Disk Director. From under BIOSS, launch Acronis and perform the following actions: delete the previous hard disk partitions and create new ones, specify the amount of memory that will be required for the new OS, specify the NTFS file system and click the "Start" button. After completing these procedures, close the program and remove the disk.

· The fourth step is to install the new OS itself. We launch the installation image from under the BIOS and begin the installation. We indicate the disk partition we need and click next, and wait for the installation process to complete.

After the installation of the OS is completed, we configure it.

Install drivers using Driver programs Pack solution.

Install the programs we need from the ChipWPI program collection (antivirus, MS Office, codecs, archiver).

· Setting up a local network.

6) Install Adobe Photoshop CS5

1. Install Adobe Photoshop.

2. We go to the Adobe website.

Choose Russian | windows | 1000.9 MB Download now.

Download Akami Download Manager. Open it and open the site again. Click "Download Now". Select the directory where the files will be downloaded.

Password entry

Download Adobe Photoshop CS5 Extended 12.0 Final Multilanguage. Click on Set-up.exe, the result of this operation can be seen in fig. 5.

Click the “Skip and continue” button, wait for the installation programs to initialize, the process of this operation can be seen in Fig.6.

The next step in installing Adobe Photoshop CS5 should be entered serial number, which was given when purchasing the software.

We are waiting for the installation to complete, the process can be seen in Fig. 9.

At the end of the installation, click the "Finish" button, fig. 10.

We launch the program using a shortcut on the desktop or through the Start menu, we get the working window of the program, which can be seen in Fig. 11. The program is ready to use.

7) Antivirus settings

When setting up the network, there was a problem with the definition of computers, to solve it, it was necessary to disable the firewall in the Kaspersky anti-virus. To do this, we perform the following action: in the system tray (lower corner of the screen) we find the antivirus icon and click on it. Next, select "Security Control" on the antivirus panel. Select "Protection Center" on the left. At the bottom right, click "Work online".

A new window "Protection components for your computer" will open. On the left, select "Network protection", then look for "Firewall". And by clicking on the dot opposite, turn off the "Firewall". This is the firewall in Kaspersky "CRYSTAL".

The license for the use of Kaspersky anti-virus programs was also renewed.

Conclusion

Passage of industrial practice is an important element of the educational process for the preparation of a specialist in the field of programming.

During the production practice in the institution "Vozhegodsk Regional Cultural and Leisure Association" all the acquired skills of theoretical training were fixed in production.

The wide coverage of industries that I had to deal with in practice allowed me to better assimilate the studied theoretical material obtained in the classroom at the technical school.

I mastered some subtleties of using software in practice, understood how some programs work, subroutines that were not clear to me, realized their importance in practical activities, increased the level of software proficiency: Adobe Photoshop, Adobe Reader, Microsoft Word and others.

Practical activities helped me learn how to independently solve a certain range of tasks that arise in the course of a programmer's work. The Internet, in which you can currently find a lot of useful information in the field of programming.

Bibliography

1. Scott Kelby - Adobe Photoshop CS6. Handbook of Digital Photography (2013) PDF.

2. Broido V.L. Computing systems, networks and telecommunications: Textbook for universities / V.L. Broido. - St. Petersburg: Peter, 2003. - 688 p.

3. Shafrin Yu.A. Fundamentals of computer technology / Yu.A. Shafrin. - M.: ABF, 2001. - 560 p.

4. Olifer V.G., Olifer N.A. Computer networks. Principles, technologies, protocols /V.G. Olifer, N.A. Olifer. - St. Petersburg: Peter, 2002. - 672 p.



Department ____________________________________________________________

name of the department providing practice

APPROVE:

Head department ___________________________

"_____" _______________________ 20__

EXERCISE

On production practice

to the student(s) of the group ______ ____________________________________

Full name. student(s)

Specialty (direction)

Terms of practice from _____20__. to _______ 20___

____________________________________________________________________

generalized task statement

Job Schedule


Name of the tasks (activities) that make up the task

Task completion date (activities)

Signature of the head of practice from the organization

1

2

3

Theoretical part

Practical part

Protection of the practice report

Head of practice from the university

_________________ ___________________

signature Full name, position

Justification of the need for a corporate network 4

1.1 The value of information, information technology 4

1.2 Inconvenience in the absence of a LAN 4

1.3 Tasks solved by the presence of a LAN 5

Description of the organization's corporate network 6

1.4 Network topology 6

1.5 Network model 7

1.6 Protocol 9

Hardware and software 10

1.7 Hardware of the server and work computers 10

1.8 Network equipment 12

1.9 Network cabling 13

1.10 Software 14

1.11 Ensuring information security 17

Conclusion 18

List of sources used 19

Introduction

Today, computerization in the workplace is not uncommon. The presence of only computers in the office with a large information flow and the amount of work with documents slows down the work process of employees and creates inconvenience. The success of almost any enterprise, organization is connected or depends on the availability and well-established system of informatization. Such systems are local area computer systems (LANs), which are now often referred to as corporate networks.

Creating a corporate network allows you to:

– organize high-speed data exchange between employees;

- reduce paperwork within the organization;

– increase labor productivity;

– reduce the time for processing information.

There is no longer a need for removable storage media for data exchange, there is no need to print documents on paper that need to be shared with several users.

A network printer, modem, scanner can be installed on the network, the network server is used as an application server.

In addition, such networks are networks closed type, access to them is allowed only to a certain circle of users, which determines the protection of information. All these features cannot be implemented using only operating systems (OS) and application programs. Therefore, most modern enterprises use LANs.
^

Justification of the need for a corporate network

1.1 The value of information, information technology


The editorial office of the newspaper "Work in the City" is preparing (writing materials, accepting ads, advertising design, layout) newspapers for printing in a printing house. That is, the activity of the organization is associated with the use and generation of a large amount of information. The slightest violation during its storage and processing will affect the decrease in the efficiency of the editorial office as a whole. Information is a kind of subject of labor, and a well-organized information resource management process allows an enterprise to effectively conduct its activities and solve tasks with a lower degree of risk. The use of a local computer network allows you to get rid of paper workflow, increases productivity, and reduces the time for processing information.

With the introduction of the network, personalization of computing tools took place, automated workstations were organized, which made it possible to effectively solve the corresponding tasks.
^

1.2 Inconvenience in the absence of a LAN


The lack of a network would complicate the work of employees, cause inconvenience, entail costs:

- the transfer of information from one computer to another would be carried out using removable memory media, it would take time;

– access to the global network was made only from a computer with a modem;

peripheral devices(printers) not all computers are equipped (removable storage media is required to use such a device, the computer to which the device is connected must be freed for a while);

- acquisition costs various devices for each computer HDD, printer, CD-ROM, modem) and expensive software.
^

1.3 Tasks solved by the presence of a LAN


LAN ---– a set of hardware and algorithms that connect computers and peripheral devices located on short distance(one enterprise, office), and allowing you to quickly exchange data, share information resources, peripheral devices.

Features provided to LAN users:

- saving and archiving your work on the server so as not to use valuable space on your PC hard drive;

– easy access to applications on the server;

- collaborative work with documents;

- simplification of workflow (the ability to view, correct and comment on documents without leaving the workplace, without organizing meetings and meetings that take a lot of time);

– facilitating the sharing of costly resources across organizations such as printers, CD-ROM drives, hard disks and applications (eg word processors or database software).

^

Description of the organization's corporate network

1.4 Network topology


The topology of a computer network is a way of connecting its individual components (computers, servers, printers, etc.).

The editorial LAN is built according to the “star” topology based on the server: all computers are connected to the central component using cable segments, information between network clients is transmitted through a single central node, the server acts as the central node. At the same time, two printers installed in the edition are also connected to the server and are network printers.

Editorial LAN Diagram (Star Topology Type)

Zvezda arose at the dawn of computing, when computers were connected to a central, main computer. The advantages of this topology are as follows:

- high network performance, since the overall network performance depends only on the performance of the central node - the server;

– internal calculations of clients do not affect the speed of the server processor;

– there is a single person responsible for the administration of network resources;

– provides the ability to restrict and control access to network resources;

– no collision of transmitted data, since data between the workstation and the server is transmitted via a separate channel without affecting other computers.

Disadvantages of star topology:

- the reliability of the entire network is determined by the reliability of the central node, if the central computer fails, then the operation of the entire network will stop;

– cabling costs are high, especially when the central node is geographically located far from the center of the topology; when expanding computer networks, previously made cable connections cannot be used: a separate cable must be laid from the center of the network to a new workplace.

The main criterion for choosing this topology was the fact that if only one computer (or the cable connecting it to the server) fails, then only this computer will not be able to transmit or receive data over the network, this will not affect the rest of the computers on the network.
^

1.5 Network model


The type of LAN under consideration is the client-server type, there is one host computer - the server. Nine computers and two network printers are connected to the server. The main tasks of the server:

– storage of user data;

– storage of accounting databases, archives, etc.;

– storage of service databases and programs of the department;

– storage of home folders of users.

The server is designed to provide access to multiple files and printers while providing high performance and security. Administration and control of access to data is carried out centrally. Resources are also centrally located, which makes it easier to find and maintain them.

Diagram of a client-server network model

The advantages of such a model:

– high network speed;

- the presence of a single information base;

- Availability unified system security.

Since all important information located centrally, that is, concentrated on one server, it is easy to ensure its regular backup. Therefore, in case of damage to the main data storage area, information will not be lost - it is easy to use a duplicate copy.

This model also has disadvantages. The main one is that the cost of creating and maintaining a client-server network is much higher due to the need to purchase a special server.

The decisive argument when choosing a server-based network was high level data protection. In such networks, one administrator can deal with security issues: he forms a security policy and applies it to each network user.

1.6 Protocol

A protocol is a set of rules and technical procedures that govern communication between computers on a network.

The process of transferring data over the network is divided into several steps. At the same time, the order in which these steps are performed is strictly defined. The task of the protocols is to define such steps and control their implementation. The editorial network uses the Transmission Control Protocol/Internet Protocol – TCP/IP protocol.

TCP/IP is an industry standard set of protocols that provide communication in a heterogeneous environment, providing compatibility between different types of computers. Compatibility is the main advantage of TCP/IP, most LANs support it. TCP/IP also provides access to Internet resources, as well as a routable protocol for enterprise networks. Since TCP/IP supports routing, it is commonly used as an internet protocol.

TCP / IP has two main drawbacks: size and insufficient speed. But for the editorial network is quite suitable.
^

Hardware and software

1.7Hardware of the server and working computers


There are two parameters that distinguish the server from ordinary computers. The first is very high performance (this also applies to efficient exchange with peripheral devices), a fairly powerful disk subsystem (mainly with SCSI interface); the second is increased reliability (the server, as a rule, works around the clock).

Server performance is often measured in transactions. A transaction is understood as a set of three sequential actions: reading data, processing data and writing data. With regard to, for example, a file server, a transaction can be considered the process of changing a record on the server, when a workstation modifies a file stored on the server.

Of great interest is the maximum amount of RAM that can be used on a given server, the possibility of installing a more powerful processor, as well as a second processor (if you plan to use an operating system that supports a dual-processor configuration).

Also important is the question of what configuration of the disk subsystem can be used on this server, first of all, what is the volume of disks, their maximum number.

An important role is played by the possibility of expanding the system and the ease of its modernization, since this is what allows us to provide the required performance not only at the current time, but also in the future. An important circumstance in the operation of the server is its high-quality and uninterrupted power supply.

In our case, the server is implemented on a regular, standard computer, which has a configuration with fairly good characteristics.

To provide the server, a processor from INTEL was chosen based on dual-core core technologies 2 Duo, featuring high performance, reliable operation, good power consumption and temperature performance.

For workstation hardware, the advantage was given to processors from AMD with an average performance value and a low price.

The server motherboard is ABIT P-35 on socket 775. It is optimal in terms of price-performance, has good bandwidth, dual-channel architecture for RAM, and is provided with an integrated network card with a bandwidth of up to 1Gb / s. This board supports many modern processors from INTEL, which will allow, if necessary, to increase system performance by replacing the processor. There is also a large number of slots for system expansion.

Server Motherboard - ABIT IP-35

RAM for the server is implemented on two sets of OCZ Gold Series (4 bars of 512 MB each).

When choosing storage devices, special attention is paid to its reliability, this is especially true for server equipment. When designing the network, the editors took into account the organization of a large database, so they decided to use a RAID-array of the RAID-5 level. The data blocks and checksums in this array are cyclically written to all disks. This is the most popular of the levels, primarily due to its economy.

Additional resources are spent on writing information to a RAID 5 volume, since additional calculations are required, but when reading (compared to a separate hard drive), there is a gain, because data streams from several array drives are parallelized. The minimum number of disks used is three, so three disks from a reliable manufacturer Segate, with a capacity of 150 Gb each, were chosen for organizing the RAID.

For the workstations, hard drives of the smallest volumes were chosen, from those available in the store - 80.0 Gb from Hitachi. This volume is quite sufficient for installing various professional applications and office programs. A cache size of 8MB will allow you to organize your work without delay.
^

1.8Network equipment


Additional equipment is installed in the LAN of the editorial office: two network printers and a modem.

A network printer eliminates the need to purchase a large number of devices for all employees who need them. When creating the network, color lasers were chosen samsung printers CLP-300 A4.

The modem is connected to the LAN server. D-Link DSL-2540U Modem selected.

The most important component of a computer network are network cards. Network cards act as a physical interface between a computer and a network cable. The main purpose of the network card:

- preparation of data coming from a computer for transmission over a network cable;

– data transfer to another computer;

– control of the data flow between the computer and the cable system.
^

1.9 Network cable system


Cable lines are a complex structure. The cable consists of conductors enclosed in several layers of insulation: electrical, electromagnetic, mechanical. In addition, the cable can be equipped with connectors that allow you to quickly connect various equipment to it. In the considered computer network, it is not required to lay the foundation for communication from a PC to a server over a distance of more than 100 meters, therefore, a UTP category 5e twisted-pair cable supporting a transmission rate of 100 Mbps is used.

twisted pair cable

A twisted pair cable consists of pairs of wires twisted around each other and simultaneously twisted around other pairs within the same sheath. Each pair consists of a wire called "Ring" and a wire called "Tip". Each pair in the shell has its own number. Curling wires allows you to get rid of electrical interference. The shielded twisted-pair cable has a copper braid that provides additional protection against interference. The maximum length of an unshielded twisted pair cable is 100 m.

Benefits of twisted pair:

– high performance in data transfer rate;

- low cost;

– ease of installation;

– high noise immunity;

– the dimensions of the areas allow keeping within the minimum effective cable length.

RJ-45 connectors are used to connect twisted pair to computers.
^

1.10Software


Server versions of the Windows operating system are widely used today, mainly due to ease of administration and low total cost of ownership. Windows family Server 2003 differs from its predecessors by the presence of Microsoft platforms.NET Framework. Windows Server 2003 comes in four editions. The edition uses Windows Server 2003 Standard Edition. This is a network operating system for running the server part of business solutions and is designed for use in small companies and departments. It features resource sharing and centralized deployment of desktop applications, as well as support for up to 4 GB of RAM and dual-processor symmetric multiprocessing.

Workstations are computers that use network resources but do not themselves have their own resources. These computers run an operating system. An operating system was installed for editorial workstations. Microsoft system Windows XP Pro. This system has a wider range of configuration, administration and networking options than Windows XP Home Edition. Windows XP Professional has many advantages:

- stability. A prerequisite for system reliability is that applications run in their own memory spaces. This protects them from conflicts and the problems that arise in connection with them;

- compatibility. Ability to work with applications that were not specifically designed for Windows environments XP Professional;

- System Restore . When it crashes, the computer enters Safe Mode ( Safe mode), the operating system offers a rollback option called System Restore. This allows the user to return to the settings that were on the computer before the incident. So-called restore points can be created by the user at any time. In addition, the operating system periodically creates its own restore points and every time a new program is installed. When you roll back your computer to a restore point, the operating system uses the installation data that corresponds to when the system was working properly.

OpenOffice.org is installed as an office software package, which can work with extensions of the rather expensive Microsoft Office. This rather powerful program has a number of other useful features, and it is completely free for both home and commercial use. It's universal office suite programs that can run on all major operating systems.

The OpenOffice.org suite includes six application programs. Text editor Writer has a user-friendly interface similar to that of the Word editor. Therefore, any user familiar with Word will easily get used to Writer. The same can be said about the editor. spreadsheets Calc, much like Excel. There is also a program for creating and demonstrating Impress presentations, vector editor Draw, a database management tool Base data and an editor for creating and editing Math formulas. The disadvantage of OpenOffice.org is its speed: it loads and runs somewhat slowly, but quite acceptable.

The organization of safe LAN operation is not possible without the use of anti-virus software. Therefore, Kaspersky Anti-Virus 7.0 is installed as anti-virus protection - a reliable and relatively cheap system.

Kaspersky Anti-Virus has three levels of protection against known and new Internet threats: signature database scanning, heuristic analyzer and behavioral blocker.

Kaspersky Anti-Virus protection against viruses is comprehensive and includes:

- Email protection. Kaspersky Anti-Virus performs anti-virus scanning of mail traffic at the data transfer protocol level (POP3, IMAP and NNTP for incoming messages and SMTP for outgoing messages) regardless of the protocol used. mail program;

– Internet traffic check. Kaspersky Anti-Virus provides anti-virus scanning of Internet traffic arriving via the HTTP protocol in real time and regardless of the browser used. This prevents infection even before the files are stored on the computer's hard drive;

- scanning the file system. Any individual files, directories and disks. In addition, you can start scanning only critical areas of the operating system and objects loaded at Windows startup.

Kaspersky Anti-Virus protects your computer from Trojans and all types of keyloggers, preventing the transfer of confidential data to intruders.
^

1.11 Ensuring information security


Considering the problem of protecting data on the network, we will highlight all possible failures and violations that can lead to the destruction or unwanted modification of data.

Potential threats include:

– equipment failures: cabling failures; power outages; disk system failures; failures of data archiving systems; failures of servers, workstations, network cards, etc.;

– loss of information due to incorrect operation of the software: loss or change of data due to software errors; losses when the system is infected with computer viruses;

– losses associated with unauthorized access: unauthorized copying, destruction or falsification of information; familiarization with confidential information constituting a secret, unauthorized persons;

– user errors: accidental destruction or alteration of data; incorrect use of software and hardware, leading to the destruction or alteration of data.

To ensure the reliability of data storage and to prevent loss of information as a result of power failures, the editorial office has an uninterruptible power supply (UPS) Ippon Back Office 600. Its presence allows, in the event of a power outage, at least correctly shut down the operating system and turn off the server.

Used to protect against viruses antivirus program Kaspersky Anti-Virus.

Conclusion

The result of the internship was:

– detailed acquaintance with the local network of the organization;

- obtaining new knowledge about the operation and maintenance of the LAN;

- the programs used in the organization are studied.

After studying the network and analyzing the work of the editors, it was proposed to create a new workplace - a full-time system administrator. Since now the daily problems of network operation, computers are solved by the employees themselves, without having all the necessary knowledge and being distracted from their direct duties.
^

List of sources used


  1. Akulov O. A. Informatics: basic course [Text] - M .: Omega-L, 2004. - 552 p.

  2. Olifer V. G., Olifer N. A. Computer networks [Text]: a textbook for universities. - Peter, 2007, 960 p.

  3. Pyatibratov A. P., Gudyno L. P., Kirichenko A. A. Computing systems, networks and telecommunications [Text] / Pod. ed. A. P. Pyatibratova. M.: Finance and statistics, 2001. - 512 p.

3. Software

Topology- the physical or electrical configuration of the cabling and network connections.
Topology is the skeleton of a network.
There are several main types

The choice of topology to use depends on your conditions, tasks and capabilities. Or it is determined by the standard of the network used.
You can connect your computers and other devices in any way that suits you, but in this case you will have to use a well-defined standard that supports this topology.
If it is convenient for you, you can even connect some of the computers to a network with one topology, and some to a network with a different topology, then connect the networks to each other using some other method.

Common bus

All computers are connected to one cable (data bus). At the ends of the cable are installed terminators . Their presence is mandatory for Ethernet networks. This topology is used to build 10 Mbit networks 10Base-2 And 10Base-5 . Used as a cable coaxial cable . Damage to a common cable or any of the two terminators leads to failure of the network section between these terminators (network segment). Disabling any of the connected devices does not affect network operation.

For a 10Base-2 network it would look like

which is absolutely the same in terms of topology, but may be more convenient when laying.
In 100Mbit networks, this topology is not used, but is used " Star".

Each computer (etc.) is connected by a separate wire to a separate port of a device called a hub or repeater (repeater) or hub (Hub).

Hubs can be either active or (theoretically) passive. If there is a disconnect between the device and the hub, then the rest of the network continues to work. True, if this device was the only server, then the work will be somewhat difficult. If the hub fails, the network will stop working.
This network topology is most useful when looking for damage to network elements: cables, network adapters, or connectors. When adding new devices, a star is also more convenient than a shared bus topology. You can also take into account that 100 and 1000 Mbit networks are built according to the "Star" topology.

The Ethernet standard was developed in the 1970s at XEROX's PARC Research Center.
Some references state that "Ethernet" is a registered mark of XEROX.
It was then developed jointly by DEC, Intel and XEROX (hence the abbreviation DIX) and first published as the "Blue Book Standard" for Ethernet1 in 1980. This standard was further developed and in 1985 a new one was released - Ethernet2 (also known as DIX).

IEEE 802.3 was approved for standardization in 1985 by the IEEE (Institute of Electrical and Electronics Engineers) LAN committee under the title: "IEEE 802.3 Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications."
This standard sets general rules for data transmission in local networks.

Ethernet and IEEE802.3 describe similar technologies. Both are CSMA/CD LANs. Both technologies are broadcast technologies. In other words, all stations see all frames (frame), even if they are not intended for this station. Each station must check the received frame to determine if it, this station, is the destination. If so, then the frame is passed to a higher level protocol for appropriate processing.

The difference between Ethenet and IEEE 802.3 is minor.

Both Ethernet and IEEE 802.3 are built into the hardware.

IEEE 802.3 defines several different physical layers, while Ethernet has one.

Each IEEE 802.3 physical layer has a name that reflects its characteristics.
For example: 10Base5
10 - LAN speed in Megabits per second
Base = baseband or Broad = broadband
5 - segment length in hundreds of meters (in this case 500)

Physical characteristics of the two standards

Unshielded twisted-pairwaire (UTP) - unshielded twisted pair
Ethernet is closest to 10Base5.

10Base2 or Slim Ethernet


10 Base-T or Ethernet over twisted pair

To connect devices, the 10 Base-T standard provides for the use of a wire that has two pairs: one for transmitting, the other for receiving.
There are two possible cable layouts in the port. MDI for DTE (Data Terminal Equipment) devices (computers, printers, etc.) and MDI-X for hubs.


When connecting an MDI port to an MDI-X port, a straight-through cabling is used. And when connecting the same MDI and MDI or MDI-X and MDI-X ports, a "crossover" cabling is used. In this case, the "transmission" is respectively connected to the "reception".


Repeaters

Ethernet networks can be extended using a device called a repeater. An Ethernet repeater is a device physically located on a network with two or more Ethernet ports. These ports can be of any type: AUI, BNC, RJ-45 or fiber-optic, or any combination.
The main function of the repeater is to receive data on one of the ports and immediately forward them to other ports. Data (signal) in the process of transmission to other ports is re-formed to eliminate any deviations that may have occurred during the movement of the signal from the source.
Repeaters can also perform a function called "separation". If the repeater detects a large number of collisions occurring on one of the ports, it concludes that an accident has occurred somewhere on this segment and isolates it from the rest of the network. This feature was made to prevent one segment errors from propagating to the entire network.

Repeaters have a negative feature, which consists in the fact that it introduces a delay in the propagation of the signal through the network. All Ethernet networks use an access protocol called CSMA/CD ("Carrier Sense Multiple Access, with Collision Detection").
For this protocol to work properly, it needs to be able to detect when a collision occurs. CSMA/CD detects this occurrence by comparing the data that is on the network with what should have been sent to the network. If any difference is detected, it means that a collision (simultaneous transmission by two devices) has occurred and the transmission stops immediately. CSMA/CD then waits a random amount of time and retryes the transmission.
There is a flaw in CSMA/CD that limits the size of the network. The bits sent do not arrive instantly at all points on the network, it takes some small amount of time for the signal to travel through the wires and through every repeater on the network. This time can be measured and is called "Propagation Delay". If the "propagation delay" between the signal source and the outermost network source is greater than half the size of the smallest frame that can exist, then CSMA/CD will not be able to properly detect a collision and data on the network may be lost or corrupted.


IEEE 10Base5 or Thick Ethernet is the oldest standard among the rest. At present (1998) it is difficult to find new equipment for building a network based on this standard. Its main parameters

When connecting, a connector (AUI) 15 pin is used

Transceivers

The name "Transceiver" comes from the English words transmiter (transmitter) and receiver (receiver).
The transceiver allows a station to transmit to and receive from a common network transmission medium. Additionally,
Ethernet transceivers detect media collisions and provide electrical isolation between stations.
10Base2 and 10Base5 transceivers are connected directly to the transmission medium (cable) common bus. Although the first standard usually uses an internal transceiver built into the controller circuitry and a T-connector to connect to the cable, the second (10Base5) uses a separate external transceiver and an AUI cable or transceiver cable to connect to the controller. 10BaseF, 10BaseT, FOIRL also usually use internal transceivers.
I must say that there are also external transceivers for 10Base2, 10BaseF, 10baseT and FOIRL, which are connected to the AUI port either directly or via an AUI cable.

An example of an external transceiver for 10Base2:

AUI connector
Attachment Unit interface


100 Base-TX

Currently, 100Base-TX networks are the most accessible 100Mbps networks. There are also 100VG and 100Base-T4 networks. But they "didn't stick".

To combine 10 and 100 Mbps networks, 10/100 Mbps hubs, switches or routers are mainly used.

1000Base-T

The network will use Category 5 twisted pair cable or better, 4 pairs (8 wires) at 125 MHz. The maximum distance between devices is 100 meters.

1.3 Required equipment

1.3.1 Thin Ethernet 10Base2

Coaxial cable

Coaxial cable (from Latin co- jointly and axis- axis), consists of two coaxial flexible metal cylinders separated by a dielectric.

Characteristics of coaxial cables

Notes: PE - polyethylene, S-PE - polyethylene foam, M - copper wire,
ML - tinned copper wire, StM - steel-copper wire,
MS - copper silver wire

Thin Ethernet Connectors


Terminator

This is a connector (male) with a resistor soldered in it, between the central and outer contacts. The resistance of the resistor must be equal to the characteristic impedance of the cable. For networks such as 10Base-2 or thin Ethernet, this value is 50 ohms. Only one terminator in a 10Base2 segment can be grounded. For grounding, a terminator with a chain and a contact at its end is used. For 10Base5, grounding of one and only one of the terminators (more precisely, one of the segment points) is mandatory.

Designed to connect devices to a network segment based on 10 Base-2 (thin Ethernet).

When disconnecting the device, the T-connector must be left on the network so as not to disrupt its performance. Or replace the T-connector with a direct connector (I-connector).

Transitionsstraight
barrel-connector/I-connector, bulk-head connector

Designed to connect the mating parts of two connectors with the same or different connecting dimensions, when their direct mechanical connection is not feasible or direct electrical connection is undesirable.

It is used to connect two pieces of coaxial cable with connectors located at the ends. And also for organizing the supply of a coaxial cable to the workplace, in order to avoid accidental breakage or unwanted bending of the main wire.

You can also use a T-connector to connect two pieces of coaxial cable.

1.3.2 Twisted Pair 10BaseT

Unshielded Twisted Pair
UTP

Cable "Twisted Pair" - "Twisted Pair", consists of "pairs" of wires twisted around each other and simultaneously twisted around other pairs, within the same sheath. Each pair consists of a wire called "Ring" and a wire called "Tip". (The names came from telephony). Each pair in the shell has its own number, so each wire can be identified as Ring1, Tip1, Ring2, Tip2, ... .
In addition to wire numbering, each pair has its own unique color scheme.
Blue/White for 1st pair,
orange/white - for the 2nd,
green/white - for 3rd
brown/white - for 4th
and so on 25 par.
For each pair of wires, the Ring-wire is colored in the main color with additional stripes, and the Tip-wire is the opposite. For example, for pair 1, Ring1-wire will be blue with white stripes, and Tip1-wire will be white with blue stripes.
In practice, when the number of pairs is small (4 pairs), the coloring of the main wire with stripes of the additional color is often not used.
In this case, the wires are colored in pairs:
Blue and white with blue stripes
Orange and white with orange stripes
Green and white with green stripes
Brown and white with brown stripes.

To indicate the diameter of the wire, the American measure is often used - AWG (American Wire Gauge) (gauge-caliber, diameter). Normal wire for use in 10 Base-T is 22 or 24 AWG. Moreover, the smaller the diameter of the wire, the greater this value.
According to the standards, the wire is divided into several categories according to its "bandwidth".

Usually it is written on the wire which category it belongs to. For example: " ...CATEGORY 5 UTP ..."
international standard ISO/IEC 11801 - equivalent to EIA/TIA-568.

Twisted pair connectors

Twisted-pair networks include 10BaseT, 100BaseTX, 100BaseT4, and very likely the approval of the 1000BaseT standard.
In the network cards of computers, in hubs and on the walls, there are sockets (jack), plugs (plug) are stuck into them.

Twisted pair connectors

Eight Pin Modular Connector (Plug)

Common name "RJ-45"

Fork with insert

Hub (hub)

Hub or concentrator is a multiport repeater. The most common application is in 10Base-T or 100Base-TX/T4 twisted-pair networks. But there are also hubs for 10Base-2 networks based on coaxial cable and for 10Base-F networks based on fiber optics. Many 10Mbit hubs have connectors for both twisted pair, commonly called (RJ-45), and coaxial cable (BNC) or AUI. This allows you to use segments of a coaxial or optical cable as the main backbone (Backbone) between hubs.

Twisted-pair hubs use MDI-X type ports, which allows you to connect computers directly. To connect the hubs to each other, one of its ports has an MDI wiring. This port is allocated in some way on the body of the device. Various names are used: "Cascading" or "In", or "Cross-over", or "Uplink". Often there is a switch that allows you to switch the port mode from MDI to MDI-X and vice versa, which allows you to use this port not for cascading, but for connecting ordinary computers. If your hub does not have a port mode switch (MDI - MDI-X), and all other ports are busy and you need to connect another computer, then you can easily do this simply by using a "cross-over" cable for this. This cable is used to connect two computers directly without a hub. But keep in mind that often this port is just a cross-over version of one of the regular ports, in which case simultaneous connection to the connectors of these ports is not allowed.
To connect hubs via a twisted pair cable, a wire (not cross-over) is connected to a regular connector (MDI-X) on one hub and to a cascading connector on the other.

An example of a 5-port 10Base-T Hub.

patch cord

A piece of wire (not more than 5 meters) twisted pair (UTP), with RJ-45 plugs crimped at its ends, for connecting a computer to a network outlet. It is usually made from a cable that is more flexible and stronger than the main cable (multi-core cable) so as not to be accidentally crushed or broken. Available in Category 3 and Category 5, and crimped to various 568A or 568B standards. The standard depends solely on the one already in use on your network.
You can make a patch cord wire yourself by simply installing two RJ-45 plugs on the ends of the UTP cable.

A device designed to convert Ethernet signals from one transmission medium, such as 10Base2 coaxial cable, to another, such as 10BaseT twisted pair.
Mediaconvertors can also be used to convert twisted pair - fiber optic cable.
Physically represents small device with appropriate network connectors and power connector.

(NIC- Network Interface card)

A network card or network adapter is an expansion card that is inserted into the motherboard connector (main board) of a computer. There are also PCMCIA network adapters for laptops (notebook), they are inserted into a special connector in the laptop case. Or integrated on the computer motherboard, they are connected via some local bus. There were Ethernet network adapters connected to the USB (Universal Serial Bus) port of the computer. Allowing you to connect to the network without opening the computer case.
Network boards are characterized by their

  • Bit depth: 8 bits (oldest), 16 bits and 32 bits. We should expect the appearance of 64-bit network cards (if they have not been released already).
  • The data bus through which information is exchanged between the motherboard and the network card: ISA, EISA, VL-Bus, PCI, etc.
  • Controller chip or chip (Chip, chipset), on which this fee made. And which determines the type of compatible driver used and almost everything else: bit depth, bus type, etc.
  • Supported network transmission medium (network media), in Russian to say: connectors installed on the card for connecting to a specific network cable. BNC for 10Base-2 networks, RJ45 for 10Base-T and 100Base-TX networks, AUI for 10Base-5 networks, or connectors for connecting to fiber optics.
  • Operating speed: Ethernet 10Mbit and/or Fast Ethernet 100Mbit, Gigabit Ethernet 1000Base-..
  • Also, twisted-pair cards may or may not support FullDuplex operation.
  • MAC address

The MAC address is used to determine the destination of packets (frames) on an Ethernet network. This is a unique serial number assigned to each Ethernet network device to identify it on the network. The MAC address is assigned to the adapter by its manufacturer, but can be changed using the program. It is not recommended to do this (only if two devices are found on the network with the same MAC address). During operation, network adapters look at all passing network traffic and look for their own MAC address in each packet. If one is found, then the device (adapter) decodes this packet. There are also special methods for sending packets to all network devices simultaneously (broadcasting). The MAC address is 6 bytes long and is usually written in hexadecimal notation, for example

12:34:56:78:90:AB

Colons may or may not be present, but their presence makes the number more readable. Each manufacturer assigns addresses from its own range of addresses. The first three bytes of the address identify the manufacturer.

ISA network card

Combined network card (BNC+RJ45), ISA bus
Simultaneous use of two connectors is not allowed.

BootROM

The "BootROM" ROM chip is designed to boot the computer's operating system not from a local disk, but from a network server. Thus, you can use a computer that does not have disks and drives installed at all. Sometimes it is useful from the point of view of safety (neither bring nor take away), sometimes from the point of view of economy. To install BootROM on the network card, a socket is provided for the Dip case. The boot chip must match the network card.

PCI network cards
UTP RJ-45

32-bit network adapters. If there is support for PCI BUS-Mastering (PCI-Bus-Master-Mode), then this can reduce the load on the processor.

Network card configuration

Each NIC needs an I/O address (In/Out port) and an interrupt number (IRQ) to function properly.
Configuring the network card is to set it to a free address and interrupt, which will then be used by the operating system. The address (i / o port) and interruption (IRQ) for each network card must be different from other devices on the computer. Modern network cards that support Plug-n-play technology themselves perform this operation, for everyone else you need to do it.
Finding idle addresses and interrupts depends on your knowledge of the computer hardware or software installed on it.

Input/output address (In/Out Port, Address) - a computer memory area specified in hexadecimal form (the beginning of the area) through which data is exchanged with the device.

IRQ - Interrupt ReQuest - interruption or interrupt request.

Search for a free address and interrupts using MS-DOS

The distribution of this operating system includes the MSD.EXE program and is usually located in the DOS directory. You can run it by simply typing MSD from the command line. If the program hangs on startup, you can start it with the /i switch.

If the computer has a sound card, then you need to check which address and interrupt it uses by looking, for example, CONFIG.SYS and AUTOEXEC.BAT

Windows NT4

It is necessary to run the winmsd.exe program included in the distribution of WindowsNT
"Start" or "Start" for the Russian version
"Run" or "Run"
type winmsd
press ENTER
In the window that appears, select the "Resources" tab
A list of interrupts in use will appear. For example like this:

ISA plug "n" play network cards

Some older computers (486,386,286) do not support plug "n" play. There may also be no plug "n" play driver for your operating system. In this case, it is necessary to disable this function in it using the network card settings program. And in the future, configure the network card using the program.
Theoretically, when you turn on the computer, the BIOS itself should indicate to the network card a free interrupt number and I / O address. But in practice, errors often occur that lead to conflicts between the network card and other devices.
There are three approaches when installing plug "n" play network cards.

· Install a network card, relying entirely on plug "n" play technology. If any problem occurs, then use one of the following methods:

Changing BIOS settings, relating to the assignment of interrupts to various slots of the PCI bus, as well as ISA devices, leave the interrupt free, which will be assigned to the network adapter. If this method did not lead to a positive result, then use the next paragraph.

With the help of the setup program of your network adapter disable, if at all possible, the plug "n" play function of the adapter. And then install it as an adapter with software configuration.

Configuring (setting) a network card
using a special utility (program)

To configure the network card to the desired address and interrupt, you must use the setup program that came with the board.
If for some reason the program supplied with the board is missing, you can try to find a network card with exactly the same type of controller chip and use the setup program from it.
Most of the programs are designed to run in DOS (because they require direct access to the device), you will need to boot your computer using this operating system or in MS-DOS mode for Win95.
The launched configuration program shows the current settings of the network card and allows you to change them in case of conflicts with other equipment. It also allows you to check the operation of the network card using tests.

Tests are internal and external. During internal (internal or self) tests, the program checks for register errors inside the board. With external tests, the card sends packets to the network and listens for responses from the network. Thus, by running an external test on two different machines, you can check the health of the network segment. It should be noted that some programs automatically complete the work of external tests after a short period of time (~1 min), and this period is not enough to run to another machine and run the test on it. It gives the wrong impression that there is some kind of malfunction.
Often, to run external tests on one network card, you need to specify that it acts as a server (server), and on the other - a client (client)

Some network cards require you to specify the type of connector (port or media type) BNC,UTP(RJ-45) or AUI used manually.
It is best to write down the changes made (on a piece of paper) so as not to forget.
At the end of the work, the program will ask you about the need to write new values ​​​​to a rewritable ROM (EPROM), this must be done.

Configuring (setting) a network card

using jumpers

In descriptions for jumpers, the following designations are possible:
JP1- group of contacts (pins) number one (connector number one), there can be two or more pins in the connector (three, four, etc.).

It also happens:

boot rom- whether to use the boot chip or not. If you do not use this chip, then set to Off or Disable.

You need to set the desired interrupt and the desired address.

2.3 How to install network cards in a computer

The network card is inserted into the appropriate data bus connector located on the motherboard.

If the network card is designed for the ISA data bus, then the card must be inserted into any free ISA slot.
The connectors are usually black (at least I didn't come across any others).
The choice of connector is determined solely by your convenience. If later on for any other purpose you need to use this particular connector, you can safely remove the network card and rearrange it to another ISA connector. In this case, neither the interrupt nor the I/O address used are changed.

PCI slot

There is also a tire PCI data(connectors in white). Network cards designed for PCI must be inserted into the PCI slot.

In computer

Before inserting a board, make sure (attach) that the corresponding plug on the computer case is removed.
The plugs are screwed, these must be unscrewed, and then the network card must be screwed on with the same screw. There are also plugs cut out during the manufacture of the case, this must be bent with, for example, a screwdriver, and then broken off. Try not to damage anything superfluous and not to cripple yourself, because. such an operation often requires considerable effort, and the edges of the glands are sharp.

Installing the card into the slot does not require much effort, but it does require accuracy when the card hits the slot itself. In all figures, network cards are drawn with the blade side down. It is most convenient to insert the card into the computer when it is horizontal, and you insert the card into it from above. It is necessary to insert it as if by "rolling": first one side of the connector, then the other.
Position the card with the blade part above the slot, and place your fingers along the edges of the top of the network card (the first on the metal corner, the second closer to the opposite corner). Slightly push the "second" hand on the card, it should start to go into the slot, when it enters about halfway, press the "first" hand and the card should fully enter into place. If you feel that she has rested against something - do not push, because. you will most likely break something. Check if the tab of the metal corner of the network card has rested against the bottom of the hole on the computer case, if necessary, press it with your finger so that it does not come out and press the network card into place.
Look at how other cards (if any) are installed in the case and screw in your network card.

3. Software

Server or client are the functions that the computer performs. Any computer on the network can act as a server or client, or both at the same time. It all depends on the software.
Server functions (serve - serve) - perform operations at the request of clients. This can be storing and transferring files, running applications with results, maintaining printers, and so on. If a computer performs only the functions of a server, then it is usually called a dedicated server. Often, such a computer has a monitor or keyboard turned off or completely absent, and it is all controlled from other computers via a network.
If the computer does not perform any server functions on the network, then such a computer is called a workstation (workstation), users work behind it.
If computers on the network simultaneously perform both server and client functions, then such a network is called peer-to-peer.
Different Operating Systems (OS) are tailored differently for server and client functions. There are a number of operating systems specifically designed to perform server tasks.
Novell NetWare
Windows NT Server
OS/2 Warp Server
Various Unix servers.

Network clients

Installing network support depends on the operating system (OS) you are using, its version, and your tasks.
If you do not know what OS you are using, try to determine it in the following ways.
1. When the OS boots, it usually displays its name and version on the screen.
The most common is Windows 95 or Windows 98
2. Dial a team
ver
V command line. And read the response of the system.

DOS clients

To connect a computer running MS-DOS or a similar operating system to network resources, you must use a special set of programs.

1.Dos client for Microsoft networks.

2. Dos client for Netware networks

3 DOS Client - IBM LAN Client

Win95 (Win98) Client

The Windows 95 operating system is distributed in several variants and languages
Release 950
English
Pan European
Russian
Release of OSR2
English
Pan European
Russian

Configuring network support for OSR2 Rus

The distribution kit is required for installation.
If you have a PCI network card, then simply insert it into your computer and follow the instructions that came with the card.

For ISA NIC type NE2000:

Insert the network card into the computer, connect the cable, set the desired address and interrupt.
Download Windows95.
Enter Control Panel (Start->Settings->Control Panel)
Select "Network"
In the tab "Configuration"
click Add
Component Type Selector Menu
Network card->Add

"Select: network cards" (Note: there is a version of the "pictures" page)
in the "manufacturers" section, you need to find "Novell / Anthem"
and in the section "network cards" - "NE2000 - compatible card"
press OK

You will return to the "network" window, new tabs will appear: "Computer" and "Access Control"
If there was no network support before, then the following components will appear:
Client for Microsoft Networks
Client for NetWare networks
NE2000 compatible board
IPX/SPX compliant protocol
NetBEUI
The login method will become:
Client for Microsoft Networks

Let's configure the network card settings, select "NE2000-compatible card", click the "Properties" button.

NE2000-Compatible Card Properties Window Click the Resources Tab

In the window that appears. In "Interrupt (IRQ)" Specify the interrupt you set. And in the "I / O range" item, select the address of your network card. Moreover, the address of the board must be equal to the beginning of the specified range. For example 280-29F for address 280.
Click "OK"

You will return to the network window.
Let's add support for the TCP/IP protocol. Click the "Add" button.

The Select Component Type window appears.
Specify "Protocol" and click "Add".

Window "Select: Network Protocol"
In the "Manufacturers" menu, select "Microsoft", and in the "Network Protocols" menu, select "TCP/IP". Click OK.

You will be taken to the "Properties: TCP/IP" window.
If you know for sure that you need to get an IP address automatically from the DHCP server, then leave it as it is, click "OK" and do not follow the next step. If you are configuring the computer yourself, then select the item "Specify the IP address explicitly. Specify the IP address and subnet mask that you need. Click" OK.
Note: other protocol parameters (Gateway, WINS, DNS) are configured in accordance with the parameters set in your network. Consult your network administrator.

Network window.
To assign a network name to your computer, as well as to specify a domain or workgroup, select the "Computer" tab. Enter a computer name that will identify it on the network (for example, "COMPUTER1"). Enter the name of your working group. If you don't know what to specify, leave it as is (WORKGROUP). Additionally, you can write a description of the computer. Click OK.

Network window.
Make sure the distribution is available. Click OK.

A window will appear showing the process of copying files.

Finally, you will be prompted to reboot the system by clicking "Yes".

After the reboot, a window will appear in which you must enter the username and password. When entering a password, asterisks will be printed instead of letters, this is how it should be. If you typed everything correctly, then clicking "OK" will take you to the system, and your name and password will be used when you access other computers on the network (your workgroup). If you click "Cancel", you will still be taken to Windows, but network resources will not be available to you.

If you New user, a window will appear asking you to confirm your password. You must re-type the same password.

If you are logged in without a password or if you want to log in with a different username, select "Start" - "Shut down".

And in the appeared window "Shut down from Windows" select "Log on as a different name."
Click Yes.

3.1.2 Servers

Windows95 server functions(Windows98)


4. How to connect two computers with a local network?

Connecting two computers to a local network
(brief step-by-step instruction)

On this moment There are two most common ways to connect computers to a local network, based on two implementations of Ethernet technology. These two standards differ in topology and cable used. The 10Base-T standard is now the most used, since it is more technologically advanced (such networks are easier to maintain, more reliable and easier to upgrade). However, no one canceled the 10Base-2 standard, and on its basis it is possible to create a completely modern and viable network. 10Base-T (Ethernet over twisted pair)
Good for its reliability, the most modern, allows the connection of computers at speeds up to 100 Mbps. But it does not allow without buying a special device HUB (hub) expand the network even up to three computers. However, the device is not very expensive. Maximum computer-to-computer or computer-to-hub distance 100 meters. It is preferable to use within the same building.

Required:
a. network cards with UTP connector (other names may be: twisted pair or RJ-45).
b. Measure, as accurately as possible, the distance between the computers (it is necessary to measure along the path where the cable will be laid, that is, the door, for example, must be bypassed along the jamb). Add a few meters to this number (just in case). The cable length must not exceed 100m. Purchase Category 5 (cat.5) twisted-pair cable in the quantity you need.
c. Two plugs (connectors) RJ-45. You can also purchase two protective caps for them.
d. Crimp tool (although two connectors can be crimped with a screwdriver).

Job:
1
2 . Fasten the connectors to the ends of the cable according to the "cross-over" pattern of the cable.

3 . Insert network cards into computers, set them to free addresses and interrupts (write it down).
4. Plug (until it clicks) the connectors on the cable into the installed network cards.
1 - network card (adapter) installed in the computer, 2 - connector on the cable.

5 . Boot your computer. Enable network support in your operating system (adapter driver, protocol, clients) in accordance with the address and interrupt set on the board.

10Base-2 (based on coaxial cable)
The good thing is that you can easily add more computers. Maximum distance between extreme points - 185 meters.

Required:
a. Two network cards BNC (e.g. NE2000 Compatible) with T-connectors included in the kit (if not, buy separately one for each board).
b.Measure, as accurately as possible, the distance between the computers (it is necessary to measure along the path where the cable will be laid, that is, the door, for example, must be bypassed along the jamb). Add a few meters to this number (just in case). Cable length should not exceed 185 m. coaxial cable with a characteristic impedance of 50 ohms (similar to a TV antenna, but it has a characteristic impedance of 75 ohms and does not fit). This cable is RG-58.
c. Cable connector with bayonet joint, type of domestic SR-50-... 2 pcs. for each piece of cable.
d. Terminators 2 pcs.
e. Soldering iron (only needed for soldering domestic connectors to the cable, if you have the opportunity to purchase crimp connectors and a tool for crimping them, then a soldering iron is not required).

Job:
1 . Route the cable in the desired path without twisting or damaging it. Leave a margin of about 2-3 m on each side in case of possible rearrangements of computers and for the convenience of mounting connectors.
2 . Attach the connectors to the ends of the cable.
3. Insert network cards into computers, set them to free addresses and interrupts (write it down).
4. Put the T-connector (male) on the connector protruding from the board (female) and turn the bayonet clockwise to secure the connector.
5 . Slide the cable connector onto one of the T-connector connectors.
6 . Put a terminator on the other end of the T-connector.

1-network card (adapter), 2 - T-connector, 3 - cable connector, 4 - terminator

7 . Boot your computer. Enable network support in your operating system ( adapter driver, protocol, clients) in accordance with the address and interrupt set on the board.

Twisted pair cabling

to connect two computers directly

The twisted pair cable can be either four-wire or eight-wire. RJ-45 plugs are used for cable mounting. Mounting the plug on the cable must be carried out using a special tool.

For an eight-wire cable (four pairs):

Or, for example, another option.

Computer