Report on the industrial practice of a computer network adjuster. Inspection of the selected premises


1. Introduction

In our age of computer technology, not a single company can do without the use of computers. And if there are several computers, then, as a rule, they are combined into a local area network (LAN).

Computer network is a system of interconnected computers, as well as possibly other devices called nodes (workstations) of the network. All computers on the network are connected to each other and can exchange information.

As a result of connecting computers into a network, opportunities arise: increasing the speed of transmission of information messages, rapid exchange of information between users, expanding the list of services provided to users by combining significant computing power in the network with a wide range of different software and peripheral equipment. Use of distributed resources (printers, scanners, CD-ROMs, etc.), availability of structured information and effective search for the necessary data. Networks provide enormous benefits that are unattainable when using computers separately. Among them: sharing of processor resources. By sharing processor resources, it is possible to use computing power for simultaneous data processing by all stations included in the network. Data separation. Data sharing makes it possible to manage databases from any workstation that needs information. Internet sharing. A LAN allows you to provide access to the Internet to all your clients using just one access channel. Resource sharing. A LAN allows you to economically use expensive resources (printers, plotters, etc.) and access them from all connected workstations. Multimedia capabilities. Modern high-speed technologies make it possible to transmit audio and video information in real time, which allows you to conduct video conferences and communicate over the network without leaving your workplace.

Nowadays, not a single large enterprise can do without a LAN.

The purpose of this industrial professional practice is to study the features of operation and maintenance of computer equipment and computer networks.


Currently, the enterprise network continues to develop. New computers are added to workplaces, as a result of which the number of requests to servers increases. Therefore, the main direction of network modernization is replacing servers with more modern ones. The first steps were taken at the beginning of 2004, when the bali were replaced by one of mail servers and TKIIP Information Hub. Also, most of the jobs at hub stations require modernization.


At the enterprise in 1998, a bus topology was used to build the network, i.e. all computers were connected in series one after another using a cable system. In this case, the Ethernet standard technology was used.

Ethernet is the most common local area network standard. Ethernet usually refers to any of the variants of this technology: Ethernet, Fast Ethernet, Gigabit Ethernet. All types of Ethernet standards use the same method of separating the data transmission medium - the CSMA/CD method - a multiple access method with carrier sensing and collision detection.

In a narrower sense, Ethernet is a network standard with a data transfer rate of 10 Mbit/s. The historical first networks of Ethernet technology were created on coaxial cable. Subsequently, other physical layer specifications for this standard were defined. Physical specifications of Ethernet technology today include data transmission media:

10 Base-5 is a coaxial cable with a diameter of 0.5 inches, called “thick” coax. Has a characteristic impedance of 50 Ohms. Maximum segment length 500 meters without repeaters;

10 Base-2 is a coaxial cable with a diameter of 0.25 inches, called “thin” coax. Has a characteristic impedance of 50 Ohms. The maximum segment length is 185 meters without repeaters;

10 Base-T - cable based on unshielded twisted pair (UTP) category 3. Forms a star topology based on a hub. The distance between the hub and the end node is no more than 100 meters;

10 Base-F – fiber optic cable. The topology is similar to that of the 10 Base-T standard. There are several variants of this specification - FOIRL (distance up to 1000 meters), 10 Base-FL (up to 2000 meters), 10 Base-FB (up to 2000 meters).

The number 10 in these names indicates the bit rate of data transmission of these standards - 10 Mbit/s.

An important phenomenon in Ethernet networks is collision - a situation when two stations simultaneously try to transmit a data frame over a common medium. This is a consequence of the random access method adopted.

But over time, the number of computers increased, and data transfer via the bus became impossible due to loss of speed. In this case, the enterprise decided to use the STAR network topology. In this case, there is a server to which all computers participating in the local computer network are directly connected. To build the network, “Fast Ethernet” technology was selected and applied, and “Gigabit Ethernet” is currently being used.

Fast Ethernet: In 1995, the IEEE 802.3 committee adopted the Fast Ethernet specification as the 802.3u standard, which is not a standalone standard but an addition to the existing 802.3 standard. The MAC and LLC layers in Fast Ethernet remain exactly the same as in Ethernet. The access method also remains the old one - CSMA/CD. This ensured continuity and consistency between the 10 Mbit/s and 100 Mbit/s networks. All the differences between Fast Ethernet and Ethernet technologies are concentrated at the physical layer. The more complex structure of the technology's physical layer is due to the fact that it uses three types of cabling systems:

Fiber optic multimode cable, two fibers are used;

Coaxial cable is not included in the permitted data transmission media of Fast Ethernet technology. Networks based on this technology always have a hierarchical tree structure built on hubs. The network diameter is reduced to 200 m (for a hub-based network). The speed, in comparison with Ethernet, is increased 10 times by reducing the inter-frame delay. The technology operates in full duplex mode. The 802.3u standard established 3 different specifications for the Fast Ethernet physical layer, giving them the following names:

100Base-TX for two-pair cable on unshielded twisted pair UTP category 5 or shielded twisted pair STP type 1. Maximum segment length is 100 m;

100Base-T4 for four-pair cable on unshielded twisted pair UTP categories 3,4 or 5. Maximum segment length - 100 m;

100Base-FX for multimode fiber optic cable, uses two fibers. The maximum segment length is 412 m (half duplex), 2 km (full duplex).

Gigabit Ethernet: Quite quickly after the introduction of Fast Ethernet products to the market, network integrators and administrators felt certain limitations when building enterprise networks. In many cases, servers connected via a 100-megabit channel overloaded network backbones. There was a need for the next level of the speed hierarchy. Therefore, in June 1995, the IEEE High Speed ​​Technology Research Group was assigned to consider the possibility of developing an Ethernet standard with an even higher bit rate. The Category 5 twisted pair standard was finally adopted in 1999. Gigabit Ethernet transfer speed is 1000 Mbps. The developers have maintained a large degree of continuity with Ethernet and Fast Ethernet technologies: the same frame formats operate in half-duplex and full-duplex modes, supporting the same CSMA/CD access method on a shared medium with minimal changes. In the summer of 1998, the 802.3z standard was adopted, which defines the use of three types of cable as a physical medium: multimode fiber optic (distance up to 500 m), single-mode fiber optic (distance up to 5000 m) and twin coaxial (twin ax), through which data is transmitted over two shielded copper conductors at a distance of up to 25 meters.

The 802.3ab Task Force has developed a variant of Gigabit Ethernet on UTP Category 5. To provide speeds of 1000 Mbps, simultaneous data transmission is used over four unshielded twisted pairs, speed 250 Mbit/s.

4. Hardware networks

Workstations are any computers that access resources stored on a server via a local network.

basically all enterprise workstations have the following configuration:

CPU Intel Pentium III 1.3 GHz;

RAM 256 Mb;

LAN 10/100Mb/s;

HDD IDE 40Gb.

Some workstations have a CD reader, sound card and speakers, and HP 1200 printers.

4.3 Switches

A switch is a multiport link-layer device that “learns” MAC addresses and stores them in an internal lookup table. A temporary switched connection is created between the sender and the intended recipient of the frame, through which the frame is transmitted.

To connect computers into a network, 3Com Super Stack Switch 4900, 4924, 4400 SE and 4-port 1000BASE-SX optical modules are used to connect backbone channels.

Central distribution 3Com Super Stack Switch 4900, 4900SX:

IEEE 802.1р standard, 1000Base-TX;

Capacity 23 million. packets/s (24 ports);

Access method CSMA/CD;

Size 6.6*44*37 (cm), weight 6.5kg;

Permissible ambient humidity 10%~90%;

3Com Super Stack 3 Switch 4400SE

IEEE 802.3ad standard, 1000Base-SX;

Form a stack of up to 192 ports 10/100Mbit/s;

Throughput 6.6 million packets/s (24 ports);

Physical media UTP category 5e;

Power supply 100-240V (50-60Hz);

Size 6.6*44*41 (cm), weight 6.3kg;

Permissible ambient temperature 00C~40C;

Permissible ambient humidity 10%~90%.

Uses non-blocking Gigabit Ethernet switching at the fastest possible speed, using XRN technology can increase performance up to 48 Gbps.

Layer 3 switching is also used, supporting unicast IP routing and OSPF protocols. RIP/RIPv2 and CIDR availability of UDP traffic control function. Uses advanced security capabilities, RADIUS client support, and Routed Access Control Lists to provide automated user access to network resources. Supports 3Com Gigabit Multilayer Switching (GMS) software and provides advanced Layer 2 switching. They have advanced network management functions. The 3Com Network Supervisor software (simplifies network administration tasks) detects devices connected to the network, displays their status in a graphical diagram and controls them.


4.4 Network adapters

Network adapters are designed to receive and transmit data on a network. The department's computers mainly use D-Link 530TX 10/100 Mbit/s network cards. Support 32bit PCI bus in Lokal Bus mode auto-sensing Nway, comply with IEEE 802.3u/ 8702.3 standard, support installation Plug and Play, ACPI, Wol, as well as power management.

4.5 Modems

Modem is a functional device that provides modulation and demodulation of signals; a device that converts digital signals into analog form and back to transmit them over analog communication lines. Characteristics of external ADSL modem:

Reception speed 8 Mb/s and transmission up to 1 Mb/s;

RJ-11 connector for connecting to the line;

Ethernet interface 10/100Mb/s with auto cable detection;

Work in bridge and router modes, routing using a multi-address policy;

Compliance with G.PMT(G.992.1) standards;

Service quality management (UBR/CBR/VBR);

Configuration via WEB interface or Telnet;

Administration and SNMP;

System requirements;

PC with Ethernet interface 10/100 Mb/s;

CD drive or DVD discs;

Telephone line with ADSL access service from an Internet provider.


4.6 Cabling system

No less important in the design of a local network is the choice of cable subsystem, since a reliable LAN provides reliable connections. In other words, all connections in the network must be made with high quality; unreliable contacts and other physical damage are unacceptable. This is given such important attention because finding a broken or damaged connection in a faulty network is still a very time-consuming task.

The answer to the high requirements for the quality of the cabling system has become structured cabling systems, which are a set of switching elements (cables, connectors, connectors, cross-connect panels and cabinets), as well as a technique for their joint use, which allows you to create regular, easily expandable connection structures in computer networks .

Versatility;

Increased service life;

Reliability.

Review of cable equipment.

Twisted pair (UTP/STP, unshielded/shielded twisted pair) is currently the most common signal transmission medium in local networks. UTP/STP cables are used in Ethernet, Token Ring and ARCnet networks. They vary by category (based on bandwidth) and conductor type (flexible or solid). A Category 5 cable usually contains eight conductors twisted in pairs (that is, four pairs).

All cables consist of 4 pairs (two for file transfer, the other two for voice transfer). RJ-45 plugs and sockets are used to connect cables to equipment. Category 6 cables have also appeared, with a frequency of up to 200 MHz, and category 7, with a frequency of up to 600 MHz, which must be shielded.

A structured cabling system built on Category 5 twisted pair cable is very flexible in use. Her idea is as follows.

A structured cabling system is built hierarchically, with a main trunk and numerous branches from it. A typical hierarchical structure of a structured cabling system includes:

Horizontal subsystems (within a floor);

Vertical subsystems (inside the building);

Campus subsystem (within one territory with several buildings).

Using a structured cabling system instead of haphazardly laid cables gives a business many benefits:

Versatility;

Increased service life;

Reducing the cost of adding new users and changing their placements;

Possibility of easy network expansion;

Providing more efficient service;

Reliability.

The horizontal subsystem is characterized big amount cable branches, since it must be routed to each user outlet. Therefore, the cable used in horizontal wiring is subject to increased requirements for the convenience of making branches, as well as the convenience of its installation in premises. When choosing a cable, the following characteristics are taken into account: bandwidth, distance, physical security, electromagnetic immunity, cost.

The horizontal subsystem, that is, the floor subsystem, can be divided into three parts:

The subscriber part consists of RJ-45 sockets connected by a patch cord;

The stationary part is a patch cord that connects the sockets to the cabinet with network equipment;

The patch part is the patch cord between the switch and the sockets on the patch panel.

The vertical subsystem, the cable that connects the floors of a building, must transmit data over longer distances and at higher speeds compared to the horizontal subsystem cable. It consists of longer sections of cable, the number of branches is much less than in the horizontal subsystem.

Optical fiber, as its name suggests, transmits signals using pulses of light. Semiconductor lasers and LEDs are used as light sources. Optical fiber is divided into single-mode and multimode.

Single-mode fiber is very thin, its diameter is about 10 microns. Thanks to this, the light pulse passing through the fiber is less often reflected from its inner surface, which ensures less attenuation. Accordingly, single-mode fiber provides longer range without the use of repeaters. Theoretical throughput single-mode fiber is 10 Gbit/s. Its main disadvantages are high cost and high complexity of installation. Single-mode fiber is mainly used in telephony.

Multimode fiber has a larger diameter - 50 or 62.5 microns. This type of optical fiber is most often used in computer networks. The higher attenuation in multimode fiber is due to the higher dispersion of light in it, due to which its throughput is significantly lower - theoretically it is 2.5 Gbps.

All active switching equipment is located in special cabinets made of transparent plastic, which allows you to clearly see all the equipment. Patch panels, converters, switches, hubs, etc. are used. In departments, wires are mounted on the walls using special boxes or on the ceiling under suspended ceilings. Everything is organized simply, conveniently and neatly. Special connectors are used to connect the optical cable to active equipment.

5. Network software and network administration

The wide variety of types of computers used in computer networks entails a variety of operating systems: for workstations, for department-level network servers and enterprise-level servers as a whole. They may have different performance requirements and functionality, it is desirable that they have a compatibility property that would allow different operating systems to work together.

Network operating systems can be divided into two groups: department-scale and enterprise-scale. Departmental or workgroup operating systems provide a range of network services, including file, application and printer sharing. They must also provide fault tolerance properties, for example, work with RAID arrays, support cluster architectures. Departmental network operating systems are usually easier to install and manage than enterprise network operating systems. They have less functionality, less data protection, weaker interoperability with other types of networks, and poorer performance.

An enterprise-scale network operating system, first of all, must have the basic properties of any enterprise products, including:

Scalability, that is, the ability to work equally well in a wide range of different quantitative network characteristics;

Compatibility with other products, that is, the ability to work in a complex heterogeneous Internet environment in a plug-and-play mode.

The criteria for choosing an enterprise-scale OS are the following characteristics:

Seamless support for multi-server network, high efficiency of file operations;

Possibility of effective integration with other operating systems, availability of a centralized scalable help desk, good development prospects;

Effective work remote users, various services: file service, print service, data security and fault tolerance, data archiving, messaging service, various databases and others;

A variety of software and hardware host platforms: IBM SNA, DEC NSA, UNIX;

Various transport protocols: TCP/IP, IPX/SPX, NetBIOS, Appletalk;

Supports a variety of end user operating systems: DOS, UNIX, OS/2, Mac;

Support for network equipment of Ethernet, Token Ring, FDDI, ARCnet standards;

Availability of popular application interfaces and mechanisms for calling remote procedures RPC;

Ability to interact with the network monitoring and management system, support for SNMP network management standards.

Of course, none of the existing network OSs fully meets the listed requirements, so the choice of a network OS is usually made taking into account the production situation and experience.

One of the main tasks at the Lepse OJSC enterprise is information protection.

Information security measures include:

Passwords installed on computers;

Antivirus programs;

Power protection on servers and some workstations.

The company has created the 1st department, which is responsible for the archive of classified information. Before accepting a new employee for work or practice (who will directly work with a computer and data), the person must be familiar with the information security instructions. He will also need to obtain a certificate from the first department.

Information stored directly on computers is protected by restricting access for administrators and guests, each of whom has a separate login and password. User groups are created with certain rights and authorities (for example: user) to access network resources. That is, an employee with a certain position is granted certain access rights and a volume of information related specifically to his activities. Thus, the more rights, the more information the user has. The administrator can carry out all actions: enter new data into the database, delete records from the database, carry out various settings of systems and programs. A ordinary users can only perform certain actions. For example, viewing and searching for the necessary information.

Protection against viruses can be ensured using common anti-virus programs such as Kaspersky Anti-Virus, Dr.Web and McAfee others. The company primarily uses McAfee.

In order to protect information from viruses and from its leakage, work on the Internet occurs on separate computers that are not connected to the network.


7. Power protection devices

To protect servers, as well as a number of simple workstations, from power surges, enterprises use uninterruptible power supply. Sources of uninterrupted UPS power supply(Uninterruptible Power Supply) provide all levels of computer power supply protection. They are also the most expensive of all power protection devices. If backup power supplies (BPS) supply power to the computer only in the event of a power outage alternating current, then uninterruptible power supplies (UPS) provide a continuous supply of modulated direct current from the battery to the computer. The alternating current of the power network is not supplied directly to the computer's power supply; it only constantly charges the battery of the uninterruptible power supply unit. As a result, the computer is isolated from any AC voltage anomalies. Like a backup power supply, an uninterruptible power supply can only keep a computer running for a certain period of time (depending on the load), allowing the user to save their work and shut down. operating system in a regular way. The uninterruptible power supply supplies voltage to the computer continuously, so when using it there is no problem with the duration of switching to battery-powered mode. High-quality uninterruptible power supplies provide uninterrupted power to the computer, as well as correction of voltage dips and protection against pulses and peaks that occur in the alternating current network.

The enterprise uses uninterruptible power supplies APC Smart-UPS 5000VA 230V.

Technical characteristics of uninterruptible power supplies APC Smart-UPS 5000VA 230V are given in Table 1.


Table 1 - specifications uninterruptible power supplies APC Smart-UPS 5000VA 230V.

Allowable input voltage

0 - 325 VAC

Output voltage

196 - 253 VAC

Input protection

Circuit breaker (with reset)

Frequency limits (mains operation)

Switching time

2 ms (typical), 4 ms (maximum)

5000 VA/3750 W

Output voltage when running on battery

220. 225. 230 or 240 VAC

Frequency when running on battery

50 or 60 Til ± 0.1 Hz: if synchronized with mains power during partial outage

Voltage waveform when operating on battery power

Low distortion sine wave

Overload protection (when running on battery)

Overcurrent and short circuit protection, lockable shutdown

overload

Noise filter

EMI and RFI suppression during normal and combined operation, 100 kHz - 10 MHz

Battery type

Splash-proof, sealed, lead acid battery, maintenance free

Typical battery life

From 3 to 6 years. depending on the number of discharge cycles and ambient temperature

Typical charging time

About 2 to 5 hours from the moment of complete discharge

Working temperature

From 0 to 40°C (from +32 to +104°F)

Storage temperature

From -15 to +45°C (+5 to + 113°F)

Relative humidity during operation and storage

0 - 95%. no condensation

Terrain height during operation

From 0 to +3000 m

Storage altitude

From 0 to +15000 m

Electromagnetic compatibility

Electromagnetic Interference (EMI)

EN55022 class A

Security Statement

G.S. VDE certified to EN50091-1-1 and 60950 standards


8. Feasibility study of the network

The main factor in the feasibility study of a network is the total cost of creating a LAN. The total costs indicator consists of the following parts:

LAN development costs;

Costs of equipment and materials;

Marketing research costs.

The total costs of creating a LAN are determined by formula (1):

Total costs for creating a LAN;

LAN development costs;

Taxes included in the costs of creating a LAN;

Costs for equipment and materials (calculated when designing a LAN);

The costs of marketing research can be taken in the amount of 10-20% of.

The amount of taxes is calculated using formula (2):

(2),

General wage fund for workers involved in the creation of the LAN;

The general tax rate (in addition to transport), including in the costs of creating a LAN, can be taken at 10%.

The total wage fund for workers participating in the creation of the LAN is determined by formula (3):

(3),

Time of participation of a specialist of a certain qualification in creating a LAN (data taken from Table 3);

Number of specialists with certain qualifications;

The monthly salary of the employee in accordance with his category or tariff category of the Unified Labor System of the budget sector;

Shift duration (8 hours);

Average number of working days in a month (21 days);

The bonus provided for employees is 20-25% of;

Payments according to the regional coefficient (Kirov 15% of (+P)).

The costs of developing a LAN are calculated using formula (4):

Costs for developing the project and documentation;

Installation and installation costs;

Commissioning costs;

Other costs associated with the creation of a LAN (studying the assignment, literature, patents, carrying out economic calculations, etc.);

The costs of developing the project and documentation are determined by formula (5):

Costs of paying wages to employees involved in the development of the LAN;

Bonus for employees involved in the development of the project and documentation;

Regional coefficient for employees involved in the development of the project and documentation (15%);

General rate of contributions for social needs (26%);

The wage fund for workers involved in the development of the project and documentation (includes wage bonus and payments according to the regional coefficient);

Setup costs for an organization that creates a LAN. They can be accepted in the amount of 100-200% of.

Other costs for creating a LAN are 15-20% of the costs, and are calculated using formula (7):

The costs of materials and equipment are calculated when designing the LAN, and their price is taken from the LAN design.

The overall cost estimate is presented in Table 2.


Table 2.

The “other” line includes: sockets, mounting cabinets, brackets, network adapters, network installation work, etc.

As a result, the total cost of building the network was about 86 million rubles. The salaries of those involved in the development and construction of the network are not indicated, since the plant’s network was not built immediately, but was modified as needed over several years. Therefore, it is almost impossible to calculate the salaries of people involved in the development and construction of the network.


9. Measures for preventive maintenance of VT equipment

Preventive maintenance of computers can be divided into:

Emergency;

Scheduled (monthly, annual);

Preventive maintenance of copiers.

Emergency maintenance is carried out when the SVT fails. Maintenance is carried out by a specialist in servicing VT equipment. It includes the following types of work:

Diagnostics of computer hardware and software;

Elimination of hardware (replacing a failed unit with a serviceable one) or software malfunction (reinstalling the OS, reinstalling programs).

Monthly preventative maintenance includes:

Removing dust from the external parts of the PC (with the power off);

Visual inspection of cables: power supply, monitor interface cables, keyboard, mouse, printer, LAN cable;

Cleaning the magnetic heads of floppy drives using a cleaning floppy disk;

Prevention of the keyboard, monitor, processor and other devices (checking using special test programs and external inspection).

During the annual preventive maintenance of equipment, the following actions are performed:

Performing a visual inspection of the computer;

Checking the functionality of the processor cooling system, hard drive, video cards;

Cleaning the monitor, keyboard, mouse and case from dust with cleaning products;

Cleaning the drive and optical drive special cleaning floppy disks and optical disks;

Defragmentation of hard disk;

Checking hard disk for viruses using anti-virus programs;

Checking the compliance of programs installed on the computer with the programs recorded in the data sheet.

Maintenance of copiers is also carried out periodically. TO includes:

Cleaning the outside of the printer from dust and waste from the printing process;

Cleaning the inside of the printer (cleaning the interior mirror with a cleaning brush, wiping the rollers with alcohol);

Checking print quality using a test.

If noise occurs during computer operation or when the PC or printer gets very hot, clean the cooling systems:

Cleaning from dust using a brush or piece of cloth (outside and inside);

Removing foreign objects that got into the fan/radiator during operation;

Fan axis lubrication.


10. Diagnostic tools and maintenance

10.1 Software and hardware diagnostic tools

All methods for troubleshooting and diagnosing devices can be divided into two main groups:

Hardware method;

Software method.

Diagnostic software includes various programs and utilities that can be used to check your computer:

MHDD 4.6 is designed to test a hard drive for logical and hardware errors;

MemoryTest is designed for memory testing;

Actra1.40 is a utility that collects all information about the computer, as well as all information about the software that is installed on the computer.

The hardware method includes external inspection, checking the correct connection using special devices - testers. The SLT3 (UTP) and SLT3S (UTP/STP/FTP) testers, shown in Figure 3, are designed to test copper cable.

Figure 3 - Testers

SLT3 (UTP) - lightweight, small-sized testers, shown in Figure 3 a, consist of 2 parts (master and remote), have built-in 3 RJ45 sockets for testing, respectively 3 methods of cable termination (sequences) USOC, 568A, 568B For ease of transportation, both parts of the tester are connected to each other (placed in a case, attached to the installer’s belt), while the batteries are turned off, thereby extending their service life. The tester is able to detect short circuits, line breaks and inconsistencies in the given sequence (cores or pairs are reversed). LED diodes signal us about all these errors in a certain way.

To measure the attenuation of optical lines, it is recommended to use a tester type FLT4, shown in Figure 3 b. The tester consists of 2 parts: light signal source (FLT4-S) and receiver optical power meter (FLT4-M). The light source is very easy to maintain. The only manually adjustable parameter is the wavelength of the emitted signal (850 nm or 1300 nm). The source has a switch, which also signals us about the need to replace the batteries (one power source with voltage in an EV of the Krone type). The receiver is equipped with a switch, a button for setting the ratio level (zeroing the tester when the “reference” cord is turned on), a button for selecting the wavelength, and a button for selecting the measurement option: attenuation or optical power. The measurement results are displayed on the LCD screen.

10.2 Tools and devices

There are special tools that allow you to identify problems and eliminate them. These include:

A simple set of tools for disassembly and assembly. Required for basic PC maintenance at the level of boards and components: screwdrivers (star-shaped, simple), tweezers, device for extracting microcircuits, pliers, flashlight, protective kit for removing electrostatic voltage, tools for minor repairs (pliers, file);

Diagnostic devices and programs for testing PC components: boot disks or floppy disks, self-test board to display POST diagnostic codes when any errors are detected;

Instruments for measuring voltage and resistance: digital multimeter, logic probes, single pulse generator for testing network circuits, for forcing a pulse with a duration of 1.5 to 10 μs into the circuit, network socket tester for testing an electrical outlet.

Chemicals: solution for wiping contacts, a spray bottle with coolant, a can of compressed gas for cleaning PC parts;

Special available tools;

Test connectors for checking serial and parallel ports, memory testing devices, scanner for network cables;

Markers, pens, notepads;

Spare parts, fasteners.

10.3 Troubleshooting methods

Troubleshooting of any node or block of a computer can be done by two main methods, such as external inspection and testing of individual blocks.

External inspection includes:

Checking the correct connection of computer blocks to each other;

Checking cables and connectors and replacing if necessary;

Checking microcircuits for burnt contacts.

Testing of individual blocks includes:

Checking computer units with diagnostic programs;

Checking computer units using hardware diagnostic tools.

If an error or any malfunction is found, it must be eliminated. And if the malfunction cannot be eliminated, you need to replace the faulty computer unit with a working one.

There is also a program of preventive measures, which includes two types of measures:

Passive prevention - measures aimed at protecting the PC from external influences: creating conditions, placement, use of surge protectors, uninterruptible power supplies, proper heat removal, exclusion of sunlight, grounding;

Active prevention - performing operations whose purpose is to extend the uptime of the PC: cleaning the PC, performing operations for fans and CPU to remove heat, scanning the hard drive and deleting unnecessary information, periodically monitoring the PC.


11. Ensuring conditions for the safe operation and repair of VT equipment

It is prohibited when the power is on:

Move computer blocks, connect and separate them;

Connect and disconnect interface cables for keyboard, mouse, monitor, printer;

Place floppy disks, papers, plates, cups, rags and other items on the computer;

If it is necessary to move the PC, call specialists from the system and technical support department. The movement of computers and devices connected to them by PC users is strictly prohibited.

It is prohibited to eat at workplaces equipped with a PC.

If any malfunctions are detected, contact specialists from the relevant inspection departments.

When repairing VT equipment, the following rules must be observed:

Disconnect your computer from the network;

After opening the case, you need to remove the static voltage;

Never place boards on a conductive metal surface.


Conclusion

During industrial and professional practice at Lepse OJSC, the enterprise network, its structure, network operating system, cable system, cable and switching equipment, and network software were studied. Knowledge was gained in the field of network setup and administration, repair and maintenance personal computers, scanning and printing devices. Skills were acquired in repairing and setting up workstations, laser and inkjet printers, as well as installing servers and preparing workstations for work.


Bibliography

1. Mark Minasi “Your PC: design, principle of operation, modernization, maintenance and repair”, St. Petersburg: CORONA print, 2004.

2. PC World Magazine

3. www.morePC.ru

4. Lectures “Maintenance of SVT and CS”

5. “Local network hardware.” Encyclopedia. M. Guk - St. Petersburg; publishing house "Peter", 2000.

6. “Computer networks. Principles, technologies, protocols." V.G.Olifer, N.A.Olifer - St. Petersburg; publishing house "Peter", 2000.

7. Regulatory documents of the Lepse plant.

Introduction.…………………………………………………………………………………......3
1. General characteristics of the enterprise………………………………………………………4
2. Practice task…………………………………………………………………………………6
3.Theoretical information………………………………………………………….7
3.1. Theoretical information about the main software products used in ZPH “TEKHOL” LLP……………………………………………………………7
3.2. Theoretical information about wireless local network based on wireless technology Wi-Fi data transfer……………………………14
4. Results of completing the main tasks…………………………………….17
Conclusion………………………………………………………………………………….20
List of references………………………………………………………...21
Appendix A
Introduction

Industrial practice is an important stage in the training of qualified specialists. It is a type of educational and auxiliary process, during which theoretical knowledge is consolidated in production, practical skills and competencies are acquired, and advanced experience is mastered. Practice is the final stage in the process of preparing a specialist for independent production activities.
This industrial practice took place on the basis of the TEKHOL industrial enterprise from June 3, 2014 to July 5, 2014 as an intern. The work was carried out in the company's office.
The purpose of industrial practice is to consolidate the acquired theoretical knowledge and acquire practical skills.
To achieve this goal, it is necessary to solve the following tasks:
1. Obtaining a general idea of ​​the enterprise’s activities;
2. Familiarization with the main tasks and functions of the information computing center;
3. Familiarization with the enterprise software;
4. Gaining practical skills real work in this department, consolidation and application of knowledge acquired during training.
1. General characteristics of the enterprise

The Tehol plant was established in 1991. The initiator of its construction was the USSR Ministry of Fisheries. At that time, there was not a single enterprise on the territory of the Union that specialized in the design, assembly and supply of industrial refrigerators. Techol became a pioneer. The specialists of the future promising enterprise were trained abroad. Since then, the modern equipment of the plant has been maintained only by qualified service personnel.
The rapid economic growth of independent Kazakhstan, the modernization of production, and the prospect of the republic joining the WTO have created a need for Techol products in the domestic market of Kazakhstan. Thus, it has become in demand both abroad, where the plant’s partnerships are only expanding, and in the republic itself. Today, Techol products are supplied to all major cities and regions of Kazakhstan. Proof of the successful cooperation of the enterprise with partners of foreign countries is the supply of Techol products to the Moscow region, Altai and Primorsky territories, to Sakhalin Island, to Turkmenistan, to the regions of Eastern and Western Siberia, to the cities of the Black Sea region and the Caspian Sea.
"Techol" today is a modern multi-purpose enterprise, with a well-functioning management system, developed management and marketing services, with its own design bureau and laboratory, and with a huge sales market. It is equipped with the highest class equipment and technological lines from leading European companies.
The Tehol plant is part of a group of companies: the Tehol-UDR construction corporation, which also includes: Uraldomnaremont KZ - one of the oldest enterprises in Kazakhstan, performing unique work on the construction and reconstruction of metallurgical industry facilities, technological equipment, pipelines; Tehol-montazh company – performing any construction and installation work; Temirstroy is one of oldest companies corporations performing construction work at industrial and civil facilities and other companies. A large number of qualified specialists, a large fleet of constantly updated construction equipment, modern equipment - all this allows the corporation to carry out large volumes of construction in the shortest possible time and with consistent quality. All Techol products are certified and manufactured under license from the Republic of Kazakhstan. Since 2003, the plant has been certified and successfully operates a quality management system for international standard ISO 9001-2000. "Techol" offers high-quality products that may interest the most demanding customer.
The main office of ZPH "Tehol" LLP has access to the Internet. Internet access is used for electronic document management with tax authorities and business partners of the enterprise, and access to the websites of partner manufacturers is provided.
ZPH "Tehol" LLP monitors the condition of computer equipment. Outdated equipment is regularly updated and therefore modern, productive computers based on an Intel core i7 3820 processor are installed in the main office of the enterprise.
Computers were connected into a local network using twisted pair cables (star topology), but then Wi-Fi wireless technology was introduced. Now all computers of the main office of ZPH “Tehol” LLP are united into a wireless local network.

2. Practice task

I. Obtaining a general idea of ​​the enterprise’s activities;
II. Familiarization with the main tasks and functions of the information computing center;
III. Familiarization with enterprise software;
IV. Obtaining practical skills of real work in this department, consolidating and applying the knowledge acquired during training when performing an individual task.

Individual task: Implementation and setup of a wired and wireless local network based on Wi-Fi wireless data transmission technology. To do this you need:
1) Dismantle the existing wired local network based on twisted pair.
2) Familiarize yourself with the technical requirements for installing a wireless local network.
3) Familiarize yourself with the technical characteristics and operating instructions of the necessary equipment.
4) Install the equipment.
5) Set up and configure equipment and computer equipment to work in wireless network.


3.Theoretical information

3.1. Theoretical information about the main software products used in ZPH “Tehol” LLP

Windows7 - custom operating system Windows family NT, next in time of release Windows Vista and the previous Windows 8. This OS supports multi-touch control. All OS versions include 50 new fonts. Existing fonts have been modified to display all characters correctly. Windows 7 is the first Windows version, which includes more fonts for displaying non-Latin characters than for displaying Latin ones. The font control panel has also been improved - by default, it will display only those fonts for which the layout is installed in the system.
Windows 7 supports folder aliases internally. For example, the Program Files folder in some localized versions of Windows was translated and displayed with the translated name, but remained in English at the file system level. Also, the system (except for the Windows 7 Starter and Windows 7 Home Basic versions) has about 120 built-in background images, unique for each country and language version. Thus, the Russian version includes the “Russia” theme with six unique high-resolution wallpapers.
Additional advantage of Windows 7 can be considered closer integration with driver manufacturers. Most drivers are detected automatically, but are saved in 90% of cases backward compatibility with drivers for Windows Vista.
Windows 7 also improved compatibility with older applications, some of which were unable to run on Windows Vista. This is especially true for older games developed for Windows XP. Also appeared in Windows 7 Windows mode XP Mode, which allows you to run legacy applications in a Windows XP virtual machine, providing almost complete support for legacy applications.
The Remote Desktop feature has also undergone changes. Support for the Aero Peek interface, Direct 2D and Direct3D 10.1 was introduced, support for multiple monitors, multimedia extensions, DirectShow, as well as the ability to play audio with low latency.
Branch Cache network technology allows you to cache the content of Internet traffic. If a user on the local network needs a file that has already been downloaded by someone on his network, he can get it from the local cache storage, rather than using a channel with limited bandwidth. The technology is designed for large networks and is offered for implementation in enterprises as part of the Corporate and Maximum versions of the OS.

Microsoft OfficeOffice suite applications created by Microsoft for operating systems Microsoft Windows, Apple Mac OS X and Apple iOS (on iPad). This package includes software for working with various types of documents: texts, spreadsheets, databases, etc. Microsoft Office is an OLE object server and its functions can be used by other applications, as well as the Microsoft Office applications themselves. Supports scripts and macros written in VBA. Microsoft Office comes in several editions. Differences between editions in the package composition and price. The most complete of them contains:
- Microsoft Word- word processor. Available for Windows and Apple Mac OS X. Allows you to prepare documents of varying complexity. Supports OLE, third party plugins, templates and more. The main format in the latest version is positioned as open Microsoft Office Open XML, which is a ZIP archive containing text in XML form, as well as all the necessary graphics. Binary format remains the most common Microsoft files Word 97-2003 with DOC extension. The product occupies a leading position in the word processor market, and its formats are used as the de facto standard in the document flow of most enterprises. Word is also available in some editions of Microsoft Works. Program equivalents: OpenOffice.org Writer, LibreOffice Writer, StarOffice Writer, NeoOffice Writer, Corel WordPerfect and Apple Pages (only on the Mac OS platform), as well as, with some reservations, AbiWord (in cases where its capabilities are sufficient and small the volume and speed of work with low resource requirements are more important).
- Microsoft Excel- table processor. Supports all the necessary functions for creating spreadsheets of any complexity. Occupies a leading position in the market. The latest version uses the OOXML format with the extension ".xlsx", earlier versions used the binary format with the extension ".xls". Available for Windows and Apple Mac OS X. Equivalent programs: OpenOffice.org Calc, LibreOffice Calc, StarOffice, Gnumeric, Corel Quattro Pro and Apple Numbers (Mac OS platform only).
- Microsoft Outlook- personal communicator. Outlook includes: calendar, task scheduler, notes, email manager, address book. Network collaboration is supported. Programs equivalent to: mail client - Mozilla Thunderbird/SeaMonkey, Novell Evolution, Claws Mail, Eudora Mail, The Bat!; personal data manager - Mozilla, Lotus Organizer and Novell Evolution. Available for Windows and Apple Mac OS X.
- Microsoft PowerPoint - an application for preparing presentations for Microsoft Windows and Apple Mac OS X. Program equivalents: OpenOffice.org Impress, LibreOffice Impress, Corel WordPerfect and Apple Keynote.
- Microsoft Access - application for database management. Program equivalents: OpenOffice.org Base, LibreOffice Base
- Microsoft InfoPath, a data collection and management application, simplifies the process of collecting information.
- Microsoft Publisher - an application for preparing publications.
- Microsoft Visio, a business and technical diagramming application, lets you transform concepts and common business data into diagrams.
- Microsoft Project - project management.
- Microsoft OneNote is an application for recording and managing notes.
-Microsoft SharePoint Designer- a tool for building applications on Microsoft platform SharePoint and SharePoint site customizations.

Dr.Web is a family of antiviruses. Developed by Doctor Web. Characteristic features of Dr.Web:
- Possibility of installation on an infected machine.
- Origins Tracing is an algorithm for non-signature detection of malicious objects, which complements traditional signature search and heuristic analyzer, making it possible to significantly increase the level of detection of previously unknown malware. Also used in Dr.Web for Android
- Anti-rootkit API (ArkAPI) subsystem, which uses universal threat neutralization algorithms. Through this system, threats are neutralized by all antivirus components. It is also used in the treatment utility Dr.Web CureIt!
-Dr. Web Shield is a mechanism for combating rootkits, implemented as a driver. Provides low-level access to virus objects hiding in the depths of the operating system.
- Fly-code is an emulator with dynamic code translation that implements a mechanism for universal unpacking of viruses protected from analysis and detection by one or a chain of new and/or unknown packers, cryptors and droppers. This allows you to unpack files protected, for example, by ASProtect, EXECryptor, VMProtect and thousands of other packers and protectors, including those unknown to the antivirus.
- Support for most existing formats of packed files and archives, including multi-volume and self-extracting archives.
- Virus databases are updated immediately as new viruses are identified, up to several times per hour. The developers of the anti-virus product refused to release virus database updates on any schedule, since virus epidemics do not follow such schedules.
- SelfPROtect self-defense module, which protects antivirus components (files, registry keys, processes, etc.) from modification and removal by malware.
- Background Rootkit Scan - a subsystem for background scanning and neutralization of active threats. This subsystem resides in memory in a resident state and scans the system for active threats and neutralizes them in various areas, for example: startup objects, running processes and modules, system objects, RAM, MBR/VBR disks, computer system BIOS.
- Dr.Web Cloud is a cloud service for checking links and files on Doctor Web servers in real time, allowing the antivirus to use the latest information about unsafe resources and files.
- Cross-platform - a single virus database and a single anti-virus scanner kernel are used on different OS platforms.
- Detection and treatment of complex polymorphic, encrypted viruses and rootkits.
- Compact virus database and small update size. One entry in the virus database allows you to identify up to a thousand similar viruses.

WinRAR is an archiver of files in RAR and ZIP formats for 32- and 64-bit Windows operating systems (there are also or have been versions of this archiver for Android, Linux, FreeBSD, Mac OS X, MS-DOS, Windows Mobile). Considered one of the the best archivers based on the ratio of compression ratio to operating speed. Distributed under a shareware license. After 40 days of trial use, the user is prompted to purchase a license. Versions for Android and Pocket PC have a Freeware license. Main features:
- Creation of archives in RAR and ZIP formats.
- Unpacking files in CAB, ARJ, LZH, TAR, GZ, ACE, UUE, BZIP2, JAR, ISO, 7z, Z formats.
- Ability to encrypt archives using the AES (Advanced Encryption Standard) algorithm in CBC mode with a key length of 256 bits (128 bits in version 4).
- Ability to work with files up to 8.589 billion (approximately 8 x 109) gigabytes in size.
- Creation of self-extracting, continuous and multi-volume archives.
- Adding additional data to archives to restore the archive if it is damaged, as well as creating special volumes for recovery, allowing you to restore a multi-volume archive if its individual volumes are damaged or even completely missing.
- Full support for the NTFS file system and Unicode file names.
- Command line support.

Adobe Acrobat Reader is a free, proven standard for securely viewing, printing, and annotating PDF documents. This is the only viewer PDF files, which lets you open and interact with all types of PDF content, including forms and media objects. Functions:
- View and create annotations in PDF documents. With Adobe Reader XI, you can not only open and view PDF files, but also perform many other operations. Now you can easily annotate your document using a comprehensive set of annotation tools.
- Filling out, signing and submitting PDF forms. Get signatures on documents in minutes instead of hours. Complete, sign and return the PDF form, then save a digital copy for record-keeping using Reader XI.
- Reliable access to PDF documents. Use the leading PDF viewer to work with any PDF files on multiple operating systems and platforms, including mobile iPad devices, iPhone or Android.
- Managing software deployment and ensuring compliance with standards. Industry standard Adobe and Microsoft tools make it easy to manage and install updates. Get support for multiple standards directly related to document security. Extend Reader functionality with the free Adobe Acrobat Development Kit.

Microsoft Windows Server 2012 R2 is a version of the server operating system from Microsoft, which already has the status of a final version and belongs to the Microsoft Windows OS family. This server operating system is intended to replace the currently released Windows time Server 2012. Windows Server 2012 is the first version of Windows Server since Windows NT 4.0 that does not support Itanium processors.
Of the main Windows features Server 2012, Microsoft representatives highlight storage pools and significantly expanded capabilities of the proprietary hypervisor for maintenance virtual machines. In particular, the work of Hyper-V virtual servers on 32 virtual processors and 120 GB was demonstrated random access memory. Hyper-V in Windows Server 2012 can now support up to 1 TB of memory per virtual machine with the same license price for all virtual machines - a significant improvement over VMware's per-processor licensing scheme, which supports a maximum of 12 cores per license. In addition, Hyper-V will be able to support virtual disks up to 64 TB in size.

Google Chrome- This free browser for your computer. Thanks to Google Chrome Russian version You can ensure safe and comfortable work on the Internet. This Google Chrome 2014 in Russian is the most popular browser of 2013 for Windows, Android, iOS and many other platforms, there is even operating support Windows systems 8. Google Chrome a new version was made by the popular company Google from scratch, and the popular Webkit engine was also chosen for processing HTML, which is also used in the Safari browser. Another plus of Google Chrome, the latest version, is that when you open a new tab, it opens it in a new process, which will protect you and your computer from intruders. We would like to note that new Browser Google Chrome 2014 from Google is well optimized and stable thanks to the JavaScript engine.

Cisco Packet Tracer is a data network simulator produced by Cisco Systems. Allows you to create workable network models, configure (using Cisco IOS commands) routers and switches, and interact between several users (via the cloud). Includes the Cisco 1800, 2600, 2800 series of routers and 2950, ​​2960, 3560 switches. In addition, there are DHCP, HTTP, TFTP, FTP servers, workstations, various modules for computers and routers, WiFi devices, and various cables.
It successfully allows you to create even complex network layouts and check the functionality of the topology. Available free to Cisco Networking Academy Program participants.

1C: Enterprise 8 is a software product of the 1C company designed to automate activities in an enterprise. Initially, 1C:Enterprise was intended to automate accounting and management accounting (including payroll and personnel management), but today this product finds its application in areas far from accounting tasks themselves.
In version 8, there are two main modes - enterprise mode and configurator mode (this mode also has a debugging mode). The monitor mode is excluded due to the fact that the monitor is built into both the enterprise and configurator modes.
The 1C:Enterprise 8 platform allows configuration and allows simultaneous use of one database by several users if they have the required number of additional licenses. Additional cost licenses are significantly lower than the cost of the program.
The 1C:Enterprise 8 platform, when used with specialized “basic” configurations, provides operation in a “basic” mode with limited capabilities: it does not allow configuration, does not support external connection mode, and does not have a multi-user mode. To work in the “basic” mode, a lightweight licensing option is used; hardware protection keys are not required, and the cost of such a product is significantly lower.

Firewall is a software package designed to protect your computer from unauthorized access. Its functions include monitoring and separation of network packets passing through it, filtering out suspicious and dangerous ones, in accordance with specified rules. Sometimes similar functions are assigned to hardware protection. This term (firewall) can be translated as “wall of fire” or “wall of fire.”
Firewall is a computer program that protects the user’s computer while on the Internet from unauthorized access of other network users to data on the computer. The program prevents any attempts to access information contained on the hard drive to prevent theft confidential information and infection by computer viruses.
3.2 Theoretical information about a wireless local network based on Wi-Fi wireless data transmission technology.

Wi-Fi (English: Wireless Fidelity) is a trademark of the Wi-Fi Alliance for wireless networks based on the IEEE 802.11 standard. It is short for Wireless-Fidelity (literally “wireless precision”), similar to Hi-Fi. Any equipment that complies with the IEEE 802.11 standard can be tested by the Wi-Fi Alliance and receive the appropriate certificate and the right to apply the Wi-Fi logo. Typically, a Wi-Fi network diagram contains at least one access point and at least one client. It is also possible to connect two clients in point-to-point mode, when the access point is not used, and the clients are connected via network adapters “directly”. The access point transmits its network identifier (SSID) using special signaling packets at a speed of 0.1 Mbit/s every 100 ms. Therefore, 0.1 Mbit/s is the lowest data transfer rate for Wi-Fi. Knowing the network SSID, the client can find out whether a connection to a given access point is possible. When two access points with identical SSIDs are within range, the receiver can choose between them based on signal strength data. The Wi-Fi standard gives the client complete freedom in choosing the criteria for the connection. The operating principle is described in more detail in the official text of the standard.
Benefits of Wi-Fi:
+ Allows you to deploy a network without laying cables, which can reduce the cost of network deployment and/or expansion. Places where cable cannot be installed, such as outdoors and buildings of historical value, can be served by wireless networks.
+ Allows mobile devices to access the network.
+ Wi-Fi devices are widespread in the market. Equipment compatibility is guaranteed through mandatory certification of equipment bearing the Wi-Fi logo.
Disadvantages of Wi-Fi:
- Frequency range and operating restrictions vary from country to country.
- Many European countries allow two additional channels that are prohibited in the USA; Japan has another channel at the top of the band, and other countries, such as Spain, prohibit the use of low-band channels. Moreover, some countries, such as Russia, Belarus and Italy, require registration of all Wi-Fi networks operating outdoors or require registration of the Wi-Fi operator.
- High energy consumption compared to other standards, which reduces battery life and increases the temperature of the device.
- The most popular encryption standard, WEP, can be relatively easily broken, even with the correct configuration (due to the weak strength of the algorithm). Although newer devices support the more advanced data encryption protocol WPA and WPA2, many older access points do not support it and require replacement. The adoption of the IEEE 802.11i (WPA2) standard in June 2004 made a more secure scheme available in new equipment. Both schemes require a stronger password than those typically assigned by users. Many organizations use additional encryption (such as a VPN) to protect against intrusion.
- Wi-Fi has a limited range. Typical home router Wi-Fi standard 802.11b or 802.11g has a range of 45 m indoors and 450 m outdoors. Microwave oven or mirror placed between Wi-Fi devices, weaken the signal level. The distance also depends on the frequency.
- Overlapping signals from a closed or encrypted access point and an open access point operating on the same or adjacent channels may interfere with access to the open access point. This problem can occur when there is a high density of access points, for example, in large apartment buildings where many residents install their own Wi-Fi access points.
- Incomplete compatibility between devices from different manufacturers or incomplete compliance with the standard may result in limited connection capabilities or reduced speed.
- Reduced network performance during rain. Equipment overload when transmitting small data packets due to the attachment of a large amount of service information.
- Low suitability for applications that use real-time media streams (for example, the RTP protocol used in IP telephony): the quality of the media stream is unpredictable due to possible high losses during data transmission caused by a number of factors uncontrollable by the user (atmospheric interference , landscape and others, in particular those listed above). Despite this
The disadvantage is that a lot of VoIP equipment is produced based on 802.11b/g devices, which is also aimed at the corporate segment: however, in most cases, the documentation for such devices contains a disclaimer stating that the quality of communication is determined by the stability and quality of the radio channel.
Wireless technologies in industry:
For industrial use, Wi-Fi technologies are currently offered by a limited number of suppliers. Thus, Siemens Automation & Drives offers Wi-Fi solutions for its SIMATIC controllers in accordance with the IEEE 802.11g standard in the free ISM band of 2.4 GHz and providing a maximum transmission speed of 11 Mbit/s. These technologies are used mainly to control moving objects and in warehouse logistics, as well as in cases where for some reason it is impossible to lay wired Ethernet networks.

Necessary equipment:
- Network adapters. These adapters (also called network interface cards (NICs)) connect computers to a network so they can communicate. The network adapter can be connected to a USB or Ethernet port on the computer, or installed inside the computer in an open PCI expansion slot.
- Routers and access points. Routers connect computers and networks to each other (for example, a router can be used to connect a local network to the Internet). Routers also allow multiple computers to share a single Internet connection. To share an Internet connection via a wireless network, you need wireless router. Access points allow computers and devices to connect to a wireless network.
4.Results of completing the main tasks

I. In the first days of industrial practice, a general understanding of the enterprise’s activities was obtained, with the principles of the enterprise’s operation and job responsibilities.
ZPH "Tehol" LLP is a modern multi-purpose enterprise, which is equipped with technological lines of European companies. The main type of products are warehouse, industrial and administrative buildings, modular industrial refrigerators.
The practical training was carried out at the main office of ZPH "Tehol" LLP as an intern.
The student intern was assigned the following responsibilities:
- maintaining computer equipment of all departments of the enterprise in working condition;
-carrying out maintenance;
-installation, configuration and maintenance of operating systems;
-implementation and configuration of application software;
- ensuring computer security of the enterprise information system.
Under the guidance of an employee of ZPH "Tehol" LLP, safety precautions at the enterprise, the location of emergency exits, actions in emergency situations, and an evacuation plan in case of fire were studied.

II. Next, I became familiar with the main tasks and functions of the information computing center.
The main tasks and functions of the information and computing center are:
- organization of the work of a unified information network;
- ensuring correct technical operation enterprise electronic equipment;
- implementation of modern software;
- ensuring information security, anti-virus protection when working with existing software;
- support of the 1C: Enterprise 8 system;
- support of the website of ZPH “Tehol” LLP;
- provision of information services on the Internet.

III. The main software products used in Tehol ZPH LLP were also studied.
The main software products used in the enterprise: the Windows 7 operating system from Microsoft, a suite of office Microsoft programs Office, Dr.Web anti-virus program, 1C:Enterprise 8 information system, Google Chrome Internet browser.

IV. During my internship, I gained practical skills of real work in this department, consolidated the knowledge acquired during training while completing an individual assignment: implementation and setup of a wireless local network based on Wi-Fi wireless data transmission technology.
When installing a wireless LAN, you used D-Link router TD-W8910G and D-Link DGS 3200-24 switch. A D-Link TL-WN723N wireless network adapter was installed on each computer.
Network installation is carried out in several steps:
1) Simulation of the future network using Cisco Packet Tracer.
2) Installation of the necessary equipment.
3) Installation of the necessary software.
4) Setting up an Internet connection.
5) Connecting computers into a network using the Network Setup Wizard.
6) Setting up network security.
7) Network performance testing.
8) Troubleshoot existing problems.

Step 1: Network modeling using Packet Tracer.
Using the Cisco Packet Tracer simulator program, I simulated the future network. The network consisted of 4 computers. One of the computers was dedicated as a server. Appendix A shows a diagram of the developed network.

Step 2. Installation of equipment.
Each computer had a network adapter installed to operate on a wireless network. The network adapter was built into the PCI port of the motherboard. The appropriate software in the form of a driver was installed. The switch was connected to the server computer via an RJ-45 port. The router was connected to the switch via an RJ-45 port. The driver was installed on the server and configured accordingly.

Step 3: Install the software.
The main software used at the Tehol ZPH LLP was installed on each computer. These are: Microsoft's Windows 7 operating system, Microsoft Office suite of office programs, Dr.Web anti-virus program, 1C:Enterprise 8 information system, Google Chrome Internet browser. And the server operating system Microsoft Windows Server 2012 R2 was installed on the server computer.

Step 4: Set up your Internet connection.
The wireless router was connected to the existing Internet connection via an RJ-45 port. The connection to the Internet has been configured.

Step 5. Connecting computers into one network.
Each computer had network discovery enabled and the required Wireless Network Setup Wizard was enabled on the server. The computers were connected to a wireless local network.

Step 6. Configure network security.
A software package designed to protect against unauthorized access, Firewall, was installed on the server computer. The Firewall has been configured and debugged.

Step 7. Testing the network performance.
To test the functionality of the network and identify faults in the network, the “Diagnostics and Fixing Network Problems Wizard” was launched on the server.

Step 8: Troubleshooting.
Problems identified during the “Diagnosis and Fix Network Problems Wizard” were resolved using the help center and Windows support(section "Troubleshooting wireless networks").


Conclusion

During the internship, the theoretical skills acquired during study were supported by practical ones. Familiarization with the organization, structure and principles of operation of the enterprise, safety and labor protection rules was carried out.
Experience was gained in working in a team, developing communication skills, and demonstrating responsibility.
The individual task received at the enterprise was completed in full and on time.
During the internship, knowledge in the field was deepened information systems, antivirus programs, computer networks, etc.

List of used literature

1. Standards for local computer networks: Handbook / V.K. Shcherbo, V.M. Kireichev, S.I. Samoilenko; edited by S. I. Samoilenko. - M.: Radio and communication, 2000.
2. Practical data transmission: Modems, networks and protocols / F. Jennings; lane from English - M.: Mir, 2005.
3. Computer networks: protocols, standards, interfaces / Yu. Black; lane from English - M.: Mir, 2002.
4. Fast Ethernet / L. Quinn, R. Russell. - BHV-Kyiv, 1998.
5. Switching and routing of IP/IPX traffic / M. V. Kulgin, IT. - M.: Computer press, 2003.
6. Fiber optics in local and corporate communication networks / A. B. Semenov, IT. - M.: Computer press, 2009.
7. Internet protocols. S. Zolotov. - St. Petersburg: BHV - St. Petersburg, 2008.
8. Personal computers on TCP/IP networks. Craig Hunt; lane from English - BHV-Kyiv, 2011.
9. Computer systems, networks and telecommunications / Pyatibratov et al. - FIS, 2008.
10. High-performance networks. User Encyclopedia / A. Mark Sportak and others; lane from English - Kyiv: DiaSoft, 2008.
11. Synchronous digital networks SDH / N. N. Slepov. - Eco-Trends, 2008.
12. Windows-based enterprise networking for professionals / Stern, Monty; lane from English - St. Petersburg: Peter, 2009.
13. Networking Essentials. Certification exam - external (exam 70-058) / J. Stewart, Ed Tittel, Kurt Hudson; lane from English - St. Petersburg: Peter Kom, 2006.
14. Fundamentals of building networks: textbook. guide for MCSE specialists (+CD-ROM) / J. Chellis, C. Perkins, M. Strib; lane from English - Laurie, 2007.
15. Computer networks: textbook. well. 7th ed. (+CD-ROM). - MicrosoftPress, Russian edition, 2008.
16. Network tools Microsoft Windows Server / trans. from English - St. Petersburg: - BHV - St. Petersburg, 2007.
17. Microsoft Windows Server 2012. Book 1 / trans. from English - St. Petersburg: - BHV - St. Petersburg, 2012.
18. Explanatory dictionary of computer technology / trans. from English - M.: Publishing department “Russian Edition” of Channel Trading Ltd. LLP, 2005.
19. Emerging Communications Technologies, 5/e, Uyless Black, Prentice Hall Professional, 2007.

INTRODUCTION Objectives of the practice: 1. Consolidation of theoretical knowledge acquired during the study of disciplines: organization of computers and systems, system software, databases, computer networks and telecommunications, peripheral office equipment; 2. Familiarization with production processes, including the use of computer technology and information technology; 3. Study of methods of formation, processing, accumulation and use of information flows in the production process; 4. Acquiring skills in the use of autonomous and integrated computing systems; 5. Analysis of achievements and shortcomings in the organization’s activities. Topic of practice: 1. Study of the principles of construction and operation of a local computer network in a specific organization. I chose the organization Snowman Plus LLC as the place for my production and technological practice. The internship period is four weeks, from June 15 to July 13, 2004. Enterprise structure: Director Evgeniy Nikovaevich Masov. He has 20 people under his command: an accountant, loaders, drivers, technicians, and salespeople. MAIN PART As a result of undergoing production and technological practice, the student should know: General principles of construction and computer architecture; Principles, methods and methods of integrating hardware and software when creating computer systems, complexes and networks; Models, methods and forms of organizing the process of developing a software product, technical product; Basic capabilities of database management systems and their use. In addition, he must learn: 1. Use technical and reference literature, sets of standards for the development of a software product, technical product; 2. Use the knowledge and skills acquired during the learning process for the competent and technically sound development of a software product or technical product; 3. Design a software product, technical product; 4. Develop programs with a modular structure; 5. Apply methods and means of testing and testing a software product, technical product; 6. Use debugging tools; LLC "Snegovik Plus" sells wholesale products in Ulyanovsk. I did an internship in the technical department under the guidance of programmer N.F. Vorlamov. Databases on deliveries and quantities of goods in warehouses are managed using computers with the Windows 95 or Windows 98 operating system. In order to save time transferring information from one computer to another, the director of this company decided to create a local network in his organization. The technical department was tasked with laying a network to every computer in the company. The technical department began to complete the task. First, we had to project on the spot which type of network would be better for us to use a Local Network with a central Server. See Appendix 1 Most simple option Such a network is the connection of computers through parallel or serial ports. In this case, there is no need for any additional equipment. There should only be connecting conductors. Such communication between computers is configured within one or several rooms. It is used to transfer data from one computer to another. In this case, you can transfer data without using floppy disks. Any modern operating system shell has software that ensures such data transfer. In local peer-to-peer computer networks, computers connect to the network through special network adapters, and the functioning of the network is supported by the network operating system. Examples of such operating systems are: Novell Personal Net Ware, Net Ware Line, Windows for Workgroups. All computers and their operating systems in local peer-to-peer computer networks must be of the same type. Users of this network can transfer data to each other, use shared printers, magnetic and optical disks, etc. In a local multi-peer computer network, one more powerful computer, which is called a server, and other, less powerful ones are called workstations. Servers use special system software that differs from workstation system software. Main parts of the network. For our network we used cable twisted pair or Twisted Pair 10BaseT coaxial cable. Twisted Pair Connectors Twisted pair networks include 10BaseT, 100BaseTX, 100BaseT4, and the 1000BaseT standard is also very likely to be adopted. In network cards of computers, in hubs and on walls there are sockets (jacks), plugs are stuck into them. Twisted pair connectors Eight-pin modular connector (Plug) Popular name "RJ-45" ​​The "RJ-45" ​​plug is similar to the plug from imported phones, only slightly larger and has eight pins. 1 - contacts 8 pcs. 2 - connector retainer 3 - wire retainer View from the contact side Contact 1 2 3 4 5 6 7 Contact 8 View from the cable side Front view On a new, unused plug, the contacts extend beyond the body. During the crimping process, they will be recessed into the body, cutting through the insulation (2 ) wires and stick into the core (1). Plugs are divided into shielded and unshielded, with and without insert, for round and flat cable, for single-core and stranded cable, with two and three prongs. It is useful to install a protective cap on the cable along with the plug. Plug with insert Unraveled and arranged in accordance with the method you choose, the cable wires are inserted into the insert until it stops, the excess is cut off, then the resulting structure is inserted into the plug. The fork is crimped. With this installation method, the unraveling length is minimal, installation is simpler and faster than when using a conventional plug without an insert. This fork is somewhat more expensive than a regular one. Connection dimensions (in mm) Connectors for 10Base-T Eight-pin modular connector. Socket (jack) and socket (outlet) Sockets are installed in network cards, hubs, transceivers and other devices. The connector itself consists of a row (8 pcs.) of spring contacts and a recess for the plug latch. If you look at the socket from the side of the contacts, when they are located below, then the countdown goes from right to left. A socket is a socket (connector) of a connector with some kind of device for fastening the cable and a housing for ease of installation. It also includes a plug. Sockets, as well as cables, come in different categories. It is usually written on the body of the outlet which category it belongs to. When building 10Base-2 networks, you must use Category 3 (Cat.3) or better 5 (Cat.5) outlets. And for 100Base-TX networks, only Cat.5 must be used. Category 5 sockets are also divided according to the method of installing the cable in the socket itself. There is enough a large number of solutions, both supported by any one specific company, and fairly generally accepted ones - “type 110”, “type KRONE”. It should be noted that KRONE is also such a company. In general, a huge number of different types of sockets are produced, but for the home you have to use the cheapest ones - external ones. A regular socket is a small plastic box, which comes with a screw and a double-sided sticker for mounting on the wall. If the wall covering allows it, it is easier to use a sticker; if not, you will have to drill the wall and screw the socket in place with a screw. On one side of the case there is a connector for connecting an RJ-45 plug; By the way, there are sockets that have two or more connectors in the housing. To remove the cover from the box and get to the inside of the socket, you need to show a lot of patience and resourcefulness. The lid is held on by internal latches, usually not marked on the outside. In my opinion, manufacturers compete with each other and with the user on which outlet is more difficult to open. It is necessary to detect these latches, then there are two possibilities: the latches open either inward (which is less common) or outward. The latches that open inward must be pressed on, and the latches that open outward must be pryed with something. It is useful when purchasing to ask to be shown how the socket opens. After removing the cover, depending on what type of outlet you have, you will find wire fasteners and a connector. Network cards are used to connect the network to the computer. PCI network card Combined network card (BNC+RJ45), PCI bus Simultaneous use of two connectors is not allowed. 1 - Twisted pair connector (RJ-45) 2 - Connector for coaxial wire (BNC) 3 - PCI data bus 4 - Socket for BootROM chip 5 - Board controller chip (Chip or Chipset) PCI connector There is also a PCI data bus (connectors white). Network cards designed for PCI must be inserted into a PCI slot. On the computer Setting up a server. Servers Server functions Windows95 (Windows98) Enter the "Control Panel" (Start->Settings->Control Panel) Select "Network" In the "Configuration" tab, click the "Add" button. Menu "Select a component type" Select "Service" and click "Add". Window "Selection: Network Service". We indicate "Manufacturers" - "Microsoft", and "Network Services" - "File and Printer Access Service for Microsoft Networks". Please note that at the beginning this inscription is not completely visible and you need to scroll it to the left so as not to make a mistake. Click "OK". If you also want to add access to your computer via http (or www), then go to the "Select: Network Service" window again and specify "Microsoft", "Personal Web Server". Click OK. Network Window. Make sure the distribution is available. Click "OK". A window will appear showing the process of copying files. And finally you will be prompted to reboot the system by clicking "Yes". After the reboot, log into the network and select the "My Computer" icon. In the window that appears, right-click on the drive that you want to make accessible over the network. If you want to make available not the entire disk, but some of its directory (directory), then by double-clicking on this disk with the left button, right-click on the directory you need. In the menu that appears, select the access item. The “Properties: ..” window will appear. ." Indicating that this resource is local. Select "Shared resource" network name will be the drive letter or directory name. You can change this as you like, subject to some restrictions on the characters used. I usually leave it as is, so as not to get confused later. Here you can also change the type of access and limit it all with passwords. Click "OK" In a second your resource will become available over the network. PRACTICE DIARY June 15 - Meeting the Programmer, visiting the internship site; June 16 - Study of the internal rules of the enterprise; June 17 - Selected literature on the topic of the assignment, studied software (Novell Personal Net Ware, Net Ware Line, Windows for Workgroups.); June 18 - Software learning; June 21 - Software learning; June 22 - Site inspection; June 23 - Network design; June 24 - Purchase of materials and tools; June 25 - Preparing the facility for work; June 28 - Preparing the facility for work; June 29 - Laying a network; June 30 - Laying a network; July 1 - Checking the network capacity (Break); July 2 - Installation of equipment and connection of devices; July 5 - Installation of equipment and connection of devices; July 6 - Installation of Operating System, Drivers on Computers; July 7 - Installation of the Operating System, Drivers on Computers; July 8 - System setup; July 9 - Setting up the main server; July 12 - System and network testing; July 13 - Writing a practice diary; CONCLUSIONS: While at this enterprise I: 1. Complied with labor protection and safety regulations; 2. Complied with the rules established for employees of the enterprise, including on issues of labor regulations, fire safety, confidentiality regime, responsibility for the safety of property; 3. Studied the current standards, technical specifications, job responsibilities, regulations and operating instructions for VT; 4. Studied the rules of operation and maintenance of military equipment and research facilities available in the department; 5. Mastered individual computer programs used in the professional field (Novell Personal Net Ware, Net Ware Line, Windows for Workgroups); 6. Mastered working with periodicals, abstracts and reference information publications on computer science and computer technology; Performed tasks provided for by the internship program. 1

Ministry of Education and Science of the Russian Federation

Federal Agency for Education

GOU SPO "Kirov Aviation College"

on industrial practice

230106.PP0344.001D1

Student of group VP-44 P.Yu. Belyaev

Head of practice from the enterprise

D.S. Emelyanov

Head of practice from the technical school

D.M. Epifanova

  • 1. Introduction
    • 4. Network hardware
    • 4.1 Servers
    • 4.2 Workstations
  • 4.3 Switches
  • 4.4 Network adapters
  • 4.5 Modems
  • 4.6 Cabling system
  • 5. Network software and network administration
  • 6. Information protection
  • 9. Activities for technical maintenance of VT equipment
  • 10. Diagnostic tools and maintenance
  • 10.1 Software and hardware diagnostic tools
  • 10.2 Tools and devices
  • 10.3 Troubleshooting methods
  • 11. Ensuring conditions for the safe operation and repair of VT equipment
  • Conclusion
  • Bibliography

1. Introduction

In our age of computer technology, not a single company can do without the use of computers. And if there are several computers, then, as a rule, they are combined into a local area network (LAN).

A computer network is a system of interconnected computers, as well as possibly other devices called nodes (workstations) of the network. All computers on the network are connected to each other and can exchange information.

As a result of connecting computers into a network, opportunities arise: increasing the speed of transmission of information messages, rapid exchange of information between users, expanding the list of services provided to users by combining significant computing power in the network with a wide range of different software and peripheral equipment. Use of distributed resources (printers, scanners, CD-ROMs, etc.), availability of structured information and effective search for the necessary data. Networks provide enormous benefits that are unattainable when using computers separately. Among them: sharing of processor resources. By sharing processor resources, it is possible to use computing power for simultaneous data processing by all stations included in the network. Data separation. Data sharing makes it possible to manage databases from any workstation that needs information. Internet sharing. A LAN allows you to provide access to the Internet to all your clients using just one access channel. Resource sharing. A LAN allows you to economically use expensive resources (printers, plotters, etc.) and access them from all connected workstations. Multimedia capabilities. Modern high-speed technologies make it possible to transmit audio and video information in real time, which allows you to conduct video conferences and communicate over the network without leaving your workplace.

Nowadays, not a single large enterprise can do without a LAN.

The purpose of this industrial professional practice is to study the features of operation and maintenance of computer equipment and computer networks.

2. History of creation and prospects for development of the network

At the very beginning, the LEPSE enterprise purchased 200 pieces of 386 personal computers (PCs), and in 1996 a decision was made to switch to PCs for data processing. From this batch 20 pcs. were provided to engineering services and 20 pcs. for accounting and implementation of the production plan. The rest were installed in the workshops to record the products produced and the costs of consumed raw materials. At that time, a LAN did not yet exist at the enterprise; information was transmitted using flexible magnetic disks (FMD) to information Center. From the same year, the enterprise began to automate information processing: marketing, sales, software. The workstations were connected to each other via a modem and data was transmitted via a telephone pair. After which all computers were connected with a thick coaxial cable. Then we switched to thin coaxial cable. The number of computers remained the same. In 1998, a decision was made to create a single LAN, and the NETWARE 4.11 server was installed. The Windows2000 operating system ran as a system service. Through this server, access to the Internet and management of network administration were provided. After that, on the PC basis, installation and planning of the future LAN that already exists at the present time was carried out. Until 2004, the development and installation of LAN was carried out. Switched nodes (SU) were installed in each building where PCs using 100 Base FX technology were located, fiber optic cable was used to connect the CUs to each other, and a “star” topology was used. The workstations were connected using Fast Ethernet technology, which was provided using twisted pair cable of category 5e. There was one server providing 2000 Mb/s to which all departments of the LEPSE enterprise with a PC were connected.

Now the LEPSE enterprise employs about 1,000 workstations, and all of them are connected into a single local network.

Prospects for modernizing the enterprise network:

Currently, the enterprise network continues to develop. New computers are added to workplaces, as a result of which the number of requests to servers increases. Therefore, the main direction of network modernization is replacing servers with more modern ones. The first steps were taken at the beginning of 2004, when one of the mail servers and the TKIIP information concentrator were replaced. Also, most of the jobs at hub stations require modernization.

3. Description of network topology and architecture

At the enterprise in 1998, a bus topology was used to build the network, i.e. all computers were connected in series one after another using a cable system. In this case, the Ethernet standard technology was used.

Ethernet is the most common local area network standard. Ethernet usually refers to any of the variants of this technology: Ethernet, Fast Ethernet, Gigabit Ethernet. All types of Ethernet standards use the same method of separating the data transmission medium - the CSMA/CD method - a multiple access method with carrier sensing and collision detection.

In a narrower sense, Ethernet is a network standard with a data transfer rate of 10 Mbit/s. The historical first networks of Ethernet technology were created on coaxial cable. Subsequently, other physical layer specifications for this standard were defined. Physical specifications of Ethernet technology today include data transmission media:

10 Base-5 is a coaxial cable with a diameter of 0.5 inches, called “thick” coax. Has a characteristic impedance of 50 Ohms. Maximum segment length 500 meters without repeaters;

10 Base-2 is a coaxial cable with a diameter of 0.25 inches, called “thin” coax. Has a characteristic impedance of 50 Ohms. The maximum segment length is 185 meters without repeaters;

10 Base-T - cable based on unshielded twisted pair (UTP) category 3. Forms a star topology based on a hub. The distance between the hub and the end node is no more than 100 meters;

10 Base-F - fiber optic cable. The topology is similar to that of the 10 Base-T standard. There are several variants of this specification - FOIRL (distance up to 1000 meters), 10 Base-FL (up to 2000 meters), 10 Base-FB (up to 2000 meters).

The number 10 in these names indicates the bit rate of data transmission of these standards - 10 Mbit/s.

An important phenomenon in Ethernet networks is collision - a situation when two stations simultaneously try to transmit a data frame over a common medium. This is a consequence of the random access method adopted.

But over time, the number of computers increased, and data transfer via the bus became impossible due to loss of speed. In this case, the enterprise decided to use the STAR network topology. In this case, there is a server to which all computers participating in the local computer network are directly connected. To build the network, “Fast Ethernet” technology was selected and applied, and “Gigabit Ethernet” is currently being used.

Fast Ethernet: In 1995, the IEEE 802.3 committee adopted the Fast Ethernet specification as the 802.3u standard, which is not a standalone standard but an addition to the existing 802.3 standard. The MAC and LLC layers in Fast Ethernet remain exactly the same as in Ethernet. The access method also remains the same - CSMA/CD. This ensured continuity and consistency between the 10 Mbit/s and 100 Mbit/s networks. All the differences between Fast Ethernet and Ethernet technologies are concentrated at the physical layer. The more complex structure of the technology's physical layer is due to the fact that it uses three types of cabling systems:

Fiber optic multimode cable, two fibers are used;

Coaxial cable is not included in the permitted data transmission media of Fast Ethernet technology. Networks based on this technology always have a hierarchical tree structure built on hubs. The network diameter is reduced to 200 m (for a hub-based network). The speed, in comparison with Ethernet, is increased 10 times by reducing the inter-frame delay. The technology operates in full duplex mode. The 802.3u standard established 3 different specifications for the Fast Ethernet physical layer, giving them the following names:

100Base-TX for two-pair cable on unshielded twisted pair UTP category 5 or shielded twisted pair STP type 1. Maximum segment length is 100 m;

100Base-T4 for four-pair cable on unshielded twisted pair UTP category 3,4 or 5. Maximum segment length - 100 m;

100Base-FX for multimode fiber optic cable, uses two fibers. The maximum segment length is 412 m (half duplex), 2 km (full duplex).

Gigabit Ethernet: Quite quickly after the introduction of Fast Ethernet products to the market, network integrators and administrators felt certain limitations when building enterprise networks. In many cases, servers connected via a 100-megabit channel overloaded network backbones. There was a need for the next level of the speed hierarchy. Therefore, in June 1995, the IEEE High Speed ​​Technology Research Group was assigned to consider the possibility of developing an Ethernet standard with an even higher bit rate. The Category 5 twisted pair standard was finally adopted in 1999. Gigabit Ethernet transfer speed is 1000 Mbps. The developers have maintained a large degree of continuity with Ethernet and Fast Ethernet technologies: the same frame formats operate in half-duplex and full-duplex modes, supporting the same CSMA/CD access method on a shared medium with minimal changes. In the summer of 1998, the 802.3z standard was adopted, which defines the use of three types of cable as a physical medium: multimode fiber optic (distance up to 500 m), single-mode fiber optic (distance up to 5000 m) and twin coaxial (twin ax), through which data is transmitted over two shielded copper conductors at a distance of up to 25 meters.

The 802.3ab Task Force has developed a variant of Gigabit Ethernet on UTP Category 5. To provide a speed of 1000 Mbps, simultaneous data transmission is used over four unshielded twisted pairs, a speed of 250 Mbps.

4 . Network hardware

4.1 Servers

Server - network computer, which allows multiple users to share different network resources, such as files or printers.

The enterprise uses following types servers:

a) file server - provides the ability to centrally store files used by a group of users.

Characteristic:

Processor Intel 2*Xeon 2.6 GHz, 533 FSB, 512 Kb L2 HT;

SCSI controller PCI 133 MHz SRCU42X, 2*LAN 1000 BASE-T;

RAM 2Gb;

Hard drive RAID5 10*36Gb 15000rpm, hot-swappable.

b) services and electronic document management server (DNS, DHCP, GroupWise)

Characteristic:

Processor Intel 2*Xeon 2.4 GHz, 533 FSB, 512 Kb L2 HT;

SRCU controller PCI 100 MHz SRCU42L, 2*LAN 1000 BASE-T;

RAM 2Gb;

Hard drive RAID5 4*36Gb 15000rpm, hot-swappable.

c) ERP system server - ERP system MAX+ for enterprise resource planning.

The ERP system server has the following characteristics:

Processor Intel 2*Xeon 3.0 GHz, 533 FSB, 512 Kb L2 HT;

SCSI controller PCIe 133 MHz SRCU42E, 2*LAN 1000 BASE-T;

RAM 8Gb DDR2 533 ECC;

Hard drive RAID5 10*72Gb 15000rpm, hot-swappable.

4.2 Workstations

Workstations are any computers that access resources stored on a server via a local network.

basically all enterprise workstations have the following configuration:

Intel Pentium III 1.3 GHz processor;

RAM 256 Mb;

LAN 10/100Mb/s;

Hard IDE drive 40Gb.

Some workstations have a CD reader, sound card and speakers, and HP 1200 printers.

4.3 Switches

A switch is a multiport link-layer device that "learns" MAC addresses and stores them in an internal lookup table. A temporary switched connection is created between the sender and the intended recipient of the frame, through which the frame is transmitted.

To connect computers into a network, 3Com Super Stack Switch 4900, 4924, 4400 SE and 4-port 1000BASE-SX optical modules are used to connect backbone channels.

Central distribution 3Com Super Stack Switch 4900, 4900SX:

IEEE 802.1р standard, 1000Base-TX;

Capacity 23 million. packets/s (24 ports);

Access method CSMA/CD;

Size 6.6*44*37 (cm), weight 6.5kg;

Permissible ambient humidity 10%~90%;

3Com Super Stack 3 Switch 4400SE

IEEE 802.3ad standard, 1000Base-SX;

Form a stack of up to 192 ports 10/100Mbit/s;

Throughput 6.6 million packets/s (24 ports);

Physical media UTP category 5e;

Power supply 100-240V (50-60Hz);

Size 6.6*44*41 (cm), weight 6.3kg;

Permissible ambient temperature 00C~40C;

Permissible ambient humidity 10%~90%.

Uses non-blocking Gigabit Ethernet switching at the fastest possible speed, using XRN technology can increase performance up to 48 Gbps.

Layer 3 switching is also used, supporting unicast IP routing and OSPF protocols. RIP/RIPv2 and CIDR availability of UDP traffic control function. Uses advanced security capabilities, RADIUS client support, and support for Routed Access Control Lists to provide automated user access to network resources. Supports 3Com Gigabit Multilayer Switching (GMS) software and provides advanced Layer 2 switching. They have advanced network management functions. The 3Com Network Supervisor software (simplifies network administration tasks) detects devices connected to the network, displays their status in a graphical diagram and controls them.

4.4 Network adapters

Network adapters are designed to receive and transmit data on a network. The department's computers mainly use D-Link 530TX 10/100 Mbit/s network cards. Supports 32-bit PCI bus in Lokal Bus mode, auto-sensing Nway, complies with IEEE 802.3u/ 8702.3 standard, supports Plug and Play installation, ACPI, WOL, as well as power management.

4.5 Modems

Modem is a functional device that provides modulation and demodulation of signals; a device that converts digital signals into analog form and back to transmit them over analog communication lines. Characteristics of external ADSL modem:

Reception speed 8 Mb/s and transmission up to 1 Mb/s;

RJ-11 connector for connecting to the line;

Ethernet interface 10/100Mb/s with auto cable detection;

Work in bridge and router modes, routing using a multi-address policy;

Compliance with G.PMT(G.992.1) standards;

Service quality management (UBR/CBR/VBR);

Configuration via WEB interface or Telnet;

Administration and SNMP;

System requirements;

PC with Ethernet interface 10/100 Mb/s;

CD or DVD drive;

Telephone line with ADSL access service from an Internet provider.

4.6 Cabling system

No less important in the design of a local network is the choice of cable subsystem, since a reliable LAN provides reliable connections. In other words, all connections in the network must be made with high quality; unreliable contacts and other physical damage are unacceptable. This is given such important attention because finding a broken or damaged connection in a faulty network is still a very time-consuming task.

The answer to the high requirements for the quality of the cabling system has become structured cabling systems, which are a set of switching elements (cables, connectors, connectors, cross-connect panels and cabinets), as well as a technique for their joint use, which allows you to create regular, easily expandable connection structures in computer networks .

Versatility;

Increased service life;

Reliability.

Review of cable equipment.

Twisted pair (UTP/STP, unshielded/shielded twisted pair) is currently the most common signal transmission medium in local networks. UTP/STP cables are used in Ethernet, Token Ring and ARCnet networks. They vary by category (based on bandwidth) and conductor type (flexible or solid). A Category 5 cable usually contains eight conductors twisted in pairs (that is, four pairs).

All cables consist of 4 pairs (two for file transfer, the other two for voice transfer). RJ-45 plugs and sockets are used to connect cables to equipment. Category 6 cables have also appeared, with a frequency of up to 200 MHz, and category 7, with a frequency of up to 600 MHz, which must be shielded.

A structured cabling system built on Category 5 twisted pair cable is very flexible in use. Her idea is as follows.

A structured cabling system is built hierarchically, with a main trunk and numerous branches from it. A typical hierarchical structure of a structured cabling system includes:

Horizontal subsystems (within a floor);

Vertical subsystems (inside the building);

Campus subsystem (within one territory with several buildings).

Using a structured cabling system instead of haphazardly laid cables gives a business many benefits:

Versatility;

Increased service life;

Reducing the cost of adding new users and changing their placements;

Possibility of easy network expansion;

Providing more efficient service;

Reliability.

The horizontal subsystem is characterized by a large number of cable branches, since it must be routed to each user outlet. Therefore, the cable used in horizontal wiring is subject to increased requirements for the convenience of making branches, as well as the convenience of its installation in premises. When choosing a cable, the following characteristics are taken into account: bandwidth, distance, physical security, electromagnetic immunity, cost.

The horizontal subsystem, that is, the floor subsystem, can be divided into three parts:

The subscriber part consists of RJ-45 sockets connected by a patch cord;

The stationary part is a patch cord that connects the sockets to the cabinet with network equipment;

The patch part is the patch cord between the switch and the sockets on the patch panel.

The vertical subsystem, the cable that connects the floors of a building, must transmit data over longer distances and at higher speeds compared to the horizontal subsystem cable. It consists of longer sections of cable, the number of branches is much less than in the horizontal subsystem.

Optical fiber, as its name suggests, transmits signals using pulses of light. Semiconductor lasers and LEDs are used as light sources. Optical fiber is divided into single-mode and multimode.

Single-mode fiber is very thin, its diameter is about 10 microns. Thanks to this, the light pulse passing through the fiber is less often reflected from its inner surface, which ensures less attenuation. Accordingly, single-mode fiber provides longer range without the use of repeaters. The theoretical throughput of single-mode fiber is 10 Gbps. Its main disadvantages are high cost and high complexity of installation. Single-mode fiber is mainly used in telephony.

Multimode fiber has a larger diameter - 50 or 62.5 microns. This type of optical fiber is most often used in computer networks. The higher attenuation in multimode fiber is due to its higher light dispersion, which causes its throughput to be significantly lower - theoretically 2.5 Gbps.

All active switching equipment is located in special cabinets made of transparent plastic, which allows you to clearly see all the equipment. Patch panels, converters, switches, hubs, etc. are used. In departments, wires are mounted on the walls using special boxes or on the ceiling under suspended ceilings. Everything is organized simply, conveniently and neatly. Special connectors are used to connect the optical cable to active equipment.

5 . Network Software and Network Administration

The wide variety of types of computers used in computer networks entails a variety of operating systems: for workstations, for department-level network servers and enterprise-level servers as a whole. They may have different performance and functionality requirements, and it is desirable that they have compatibility properties that would allow different operating systems to work together.

Network operating systems can be divided into two groups: department-scale and enterprise-scale. Departmental or workgroup operating systems provide a range of network services, including file, application and printer sharing. They must also provide fault tolerance properties, for example, work with RAID arrays, support cluster architectures. Departmental network operating systems are usually easier to install and manage than enterprise network operating systems. They have less functionality, less data protection, weaker interoperability with other types of networks, and poorer performance.

An enterprise-scale network operating system, first of all, must have the basic properties of any enterprise products, including:

- scalability, that is, the ability to work equally well in a wide range of different quantitative network characteristics;

- compatibility with other products, that is, the ability to work in a complex heterogeneous Internet environment in plug-and-play mode.

The criteria for choosing an enterprise-scale OS are the following characteristics:

- organic support for a multi-server network, high efficiency of file operations;

- the ability to effectively integrate with other operating systems, the presence of a centralized scalable help desk, good development prospects;

- effective work of remote users, various services: file service, print service, data security and fault tolerance, data archiving, messaging service, various databases and others;

- various software and hardware host platforms: IBM SNA, DEC NSA, UNIX;

- various transport protocols: TCP/IP, IPX/SPX, NetBIOS, Appletalk;

- support for a variety of end user operating systems: DOS, UNIX, OS/2, Mac;

- support for network equipment of Ethernet, Token Ring, FDDI, ARCnet standards;

- availability of popular application interfaces and mechanisms for calling remote RPC procedures;

- ability to interact with the network monitoring and management system, support for SNMP network management standards.

Of course, none of the existing network OSs fully meets the listed requirements, so the choice of a network OS is usually made taking into account the production situation and experience.

The server operating system allows you to simplify, make accessible and understandable work on the network. Depending on the computers in the departments, they may contain different network operating systems. A network operating system is required to manage message flows between workstations and servers. It can allow any workstation to work with a shared network drive or printer that is not physically connected to that station. Most servers have the Microsoft operating system installed - Windows 2000 Server. This choice is due to the fact that most software products used in an enterprise are developed for the Windows platform, so this OS becomes the optimal choice for a fairly large enterprise network. Its main advantages are: full compatibility with workstations and their software, because Most workstations run under a Windows operating system, which has a more flexible security policy compared to other server systems (in relation to operating systems of the Windows family).

The initial installation of Windows 2000 Server is almost the same as installing Windows 2000 Pro. The difference lies in only two things: the number of licenses for connections is requested, as well as the selection of components to install, among which we can particularly mention the Terminal Service, which allows several users to simultaneously work on the server through an interface called the Terminal Services Client (MSTSC - Microsoft Terminal Services Client).

After the initial server installation, the operating system is similar to Windows 2000 Professional, with only slightly more settings and security features.

To gain full network administration and connectivity capabilities to the server, you must install a domain controller. A dialog box will appear where you can select the type of domain to install. To install an independent server, you need to select the first parameters. There you are asked to specify the DNS name of the domain to be installed in the format (<имя вашего домена>.<полное имя родительского домена>), NetBios domain name (this name will be displayed when logging in, it is not recommended to change this name), administrator password (used when the system boots in directory service recovery mode). Next, you will be prompted to install a DNS server on your computer, or the installation of a domain controller will begin immediately. After completing all operations, you will be prompted to restart the computer.

After logging in, the set of server settings will be significantly expanded. The administration interface is unified through the MMC utility - Microsoft Management Console. Main snap-ins: Active Directory - Users and Computers - used to manage groups, users, departments and group policy. Group Policy can only be assigned to an organizational unit and applies to those users who are placed in an organizational unit directly or whose organizational unit has a parent and inherits policies from it. To create a Group Policy element, you need to call the properties of the organizational unit and select the Group Policy tab.

Computer Management - used for general management system:

- creating shared network resources (locally or for another station) you need to select the Connect to another computer command from the context menu of the console root, where you specify its name or select from the list of those registered in this domain);

When creating network resources, it is recommended to create them in the NTFS file system - this method provides more options for configuring security of access to the allocated resource. In general, it is recommended to give full access to the resource for everyone (Sharing tab ( General access) folder or disk properties window), and then very flexibly configure access for each user or group using NTFS (Security Tab).

Local Security Policy, Domain Security Policy, Domain Controller Security Policy (local security policy, domain security policy, domain controller security policy) - used to set security parameters for the system as a whole (which users have the right to log on to the computer, shutdown, access from the network etc.). The snap-ins differ only in their scope: the first affects only the computer on which it is installed (does not affect the domain controller), the second - on all computers included in a given domain, the third - only on the domain controller's computer.

- DNS - used to manage DNS accounts on the server;

- Terminal Services Configuration - setting up working environment parameters for users connecting to the server via MSTSC;

- Active Directory - Trusts and Relationships - used to establish trust relationships between different domains;

- Services - used to manage services.

For file servers the OS is Novell NetWare 4.1. Its main characteristics:

A specialized operating system optimized to work as a file server and print servers. Limited capabilities for use as an application server: no virtual memory or preemptive multitasking, and support for symmetric multiprocessing was not available until very recently. There are no APIs for the main operating environments used for application development - UNIX, Windows, OS/2 Server platforms: computers based on Intel processors, IBM RS/6000 workstations running the AIX operating system using the NetWare for UNIX product. Comes with a shell for clients: DOS, Macintosh, OS/2, UNIX, Windows (a shell for Windows NT is currently being developed by Novell, although Microsoft has already implemented a NetWare client in Windows NT). Peer-to-peer connections are possible using PersonalWare OS. Features NetWare Directory Services (NDS) that is centrally managed, distributed, fully replicated, automatically synchronized, and highly scalable.

Comes with a powerful Message Handling Service (MHS), fully integrated (as of version 4.1) with the help desk. Supported network protocols: TCP/IP, IPX/SPX, NetBIOS, Appletalk Support for remote users: ISDN, dial-up telephone lines, frame relay, X.25 - using the NetWare Connect product (sold separately). Security: authentication using public keys using RSA encryption method; certified to level C2. Good communication server. Built-in disk compression function.

6. Information protection

One of the main tasks at the Lepse OJSC enterprise is information protection.

Information security measures include:

- passwords installed on computers;

- antivirus programs;

- power protection on servers and some workstations.

The company has created the 1st department, which is responsible for the archive of classified information. Before accepting a new employee for work or practice (who will directly work with a computer and data), the person must be familiar with the information security instructions. He will also need to obtain a certificate from the first department.

Information stored directly on computers is protected by restricting access for administrators and guests, each of whom has a separate login and password. User groups are created with certain rights and authorities (for example: user) to access network resources. That is, an employee with a certain position is granted certain access rights and a volume of information related specifically to his activities. Thus, the more rights, the more information the user has. The administrator can carry out all actions: enter new data into the database, delete records from the database, carry out various settings of systems and programs. And ordinary users can only perform certain actions. For example, viewing and searching for the necessary information.

Protection against viruses can be ensured using common anti-virus programs such as Kaspersky Anti-Virus, Dr.Web and McAfee others. The company primarily uses McAfee.

In order to protect information from viruses and from its leakage, work on the Internet occurs on separate computers that are not connected to the network.

7. Power protection devices

To protect servers, as well as a number of simple workstations, from power surges, enterprises use uninterruptible power supplies. UPS (Uninterruptible Power Supply) uninterruptible power supplies provide all levels of computer power supply protection. They are also the most expensive of all power protection devices. While backup power supplies (BPS) provide power to the computer only in the event of a power outage, uninterruptible power supplies (UPS) provide a continuous supply of modulated direct current from the battery to the computer. The alternating current of the power network is not supplied directly to the computer's power supply; it only constantly charges the battery of the uninterruptible power supply unit. As a result, the computer is isolated from any AC voltage anomalies. Like a backup power supply, an uninterruptible power supply can only keep the computer running for a certain period of time (depending on the load), which allows the user to save the results of their work and shut down the operating system in the normal way. The uninterruptible power supply supplies voltage to the computer continuously, so when using it there is no problem with the duration of switching to battery-powered mode. High-quality uninterruptible power supplies provide uninterrupted power to the computer, as well as correction of voltage dips and protection against pulses and peaks that occur in the alternating current network.

The enterprise uses uninterruptible power supplies APC Smart-UPS 5000VA 230V.

Technical characteristics of uninterruptible power supplies APC Smart-UPS 5000VA 230V are given in Table 1.

Table 1 - technical characteristics of uninterruptible power supplies APC Smart-UPS 5000VA 230V.

Allowable input voltage

0 - 325 VAC

Output voltage

196 - 253 VAC

Input protection

Circuit breaker (with reset)

Frequency limits (mains operation)

Switching time

2 ms (typical), 4 ms (maximum)

5000 VA/3750 W

Output voltage when running on battery

220. 225. 230 or 240 VAC

Frequency when running on battery

50 or 60 Til ± 0.1 Hz: if synchronized with mains power during partial outage

Voltage waveform when operating on battery power

Low distortion sine wave

Overload protection (when running on battery)

Overcurrent and short circuit protection, lockable shutdown

overload

Noise filter

EMI and RFI suppression during normal and combined operation, 100 kHz - 10 MHz

Battery type

Splash-proof, sealed, lead acid battery, maintenance free

Typical battery life

From 3 to 6 years. depending on the number of discharge cycles and ambient temperature

Typical charging time

About 2 to 5 hours from the moment of complete discharge

Working temperature

From 0 to 40°C (from +32 to +104°F)

Storage temperature

From -15 to +45°C (+5 to + 113°F)

Relative humidity during operation and storage

0 - 95%. no condensation

Terrain height during operation

From 0 to +3000 m

Storage altitude

From 0 to +15000 m

Electromagnetic compatibility

Electromagnetic Interference (EMI)

EN55022 class A

Security Statement

G.S. VDE certified to EN50091-1-1 and 60950 standards

8. Feasibility study of the network

The main factor in the feasibility study of a network is the total cost of creating a LAN. The total costs indicator consists of the following parts:

LAN development costs;

Costs of equipment and materials;

Marketing research costs.

The total costs of creating a LAN are determined by formula (1):

Total costs for creating a LAN;

LAN development costs;

Taxes included in the costs of creating a LAN;

Costs for equipment and materials (calculated when designing a LAN);

The costs of marketing research can be taken in the amount of 10-20% of.

The amount of taxes is calculated using formula (2):

General wage fund for workers involved in the creation of the LAN;

The general tax rate (in addition to transport), including in the costs of creating a LAN, can be taken at 10%.

The total wage fund for workers participating in the creation of the LAN is determined by formula (3):

Time of participation of a specialist of a certain qualification in creating a LAN (data taken from Table 3);

Number of specialists with certain qualifications;

The monthly salary of the employee in accordance with his category or tariff category of the Unified Labor System of the budget sector;

Shift duration (8 hours);

Average number of working days in a month (21 days);

The bonus provided for employees is 20-25% of;

Payments according to the regional coefficient (Kirov 15% of (+P)).

The costs of developing a LAN are calculated using formula (4):

Costs for developing the project and documentation;

Installation and installation costs;

Commissioning costs;

Other costs associated with the creation of a LAN (studying the assignment, literature, patents, carrying out economic calculations, etc.);

The costs of developing the project and documentation are determined by formula (5):

Costs of paying wages to employees involved in the development of the LAN;

Bonus for employees involved in the development of the project and documentation;

Regional coefficient for employees involved in the development of the project and documentation (15%);

General rate of contributions for social needs (26%);

The wage fund for workers involved in the development of the project and documentation (includes wage bonus and payments according to the regional coefficient);

Setup costs for an organization that creates a LAN. They can be accepted in the amount of 100-200% of.

Other costs for creating a LAN are 15-20% of the costs, and are calculated using formula (7):

The costs of materials and equipment are calculated when designing the LAN, and their price is taken from the LAN design.

The overall cost estimate is presented in Table 2.

Table 2.

Introduction

The development of economic and social relations, the expansion of networks and enterprises and the increase in their size, the emergence of new connections between enterprises and industries, the increase in flows and volumes of information - all this has led to a sharp complication of management tasks.

The increasing complexity of the tasks being solved in the field of management has, in turn, led to a change in the nature of management processes. The use of computers significantly increases the efficiency of management, but this requires active human participation in the management process. It is he who makes the final decision based on an assessment of various design options, taking into account the additional data at his disposal.

Production and technological practice is an organic part of the educational process and has the goal of consolidating and deepening the knowledge acquired in the process of theoretical activity, introducing the student to socially useful work and linking the acquired theoretical knowledge with real production conditions. During industrial technological practice, student interns work according to the regime established for a given enterprise and are subject to the internal regulations of this organization.

The purpose of production and technological practice is for students to study a real enterprise and working conditions there, gain applied skills in the development and maintenance of programs, study information flows and document management, methods of storing and processing information, collecting materials for a report and preliminary selection of a likely topic for a diploma project. In addition, during their internship, student interns must also take an active part in the social life of the enterprise.

1. Production activity of the enterprise

Municipal budgetary cultural institution "Vozhegodsky district cultural and leisure association"

Year of creation - 01.11.2007. The network of MBUK "VR KDO" consists of 14 branches: Houses of Culture and clubs. Director of MBUK "VR KDO" Lyubov Aleksandrovna Klyushina. The main goal of the work of the MBUK "VR KDO" is: Creating conditions for organizing leisure time and providing residents of the area with the services of cultural and leisure institutions.

To achieve this goal, the following tasks were set for 2012:

Improving the organization of work to improve the qualifications of CDO specialists using new techniques.

Creating conditions for increasing the efficiency and effectiveness of the work of the SDK.

Work to create a positive image of KDO institutions.

Priority areas of work of MBUK "VR KDO":

Patriotic and spiritual and moral education of citizens.

Promoting family values.

Preservation and revival of traditional folk culture.

Prevention of a healthy lifestyle.

Cultural and entertainment activities.

Formation and development of cultural brands of settlements.

Inter-settlement festivals and holidays are held annually.

Benchmark performance indicators of MBUK "VR KDO" in 2012:

4,586 events were held, including 2,389 film screenings.

3,748 paid events were held, including 2,389 film screenings.

54,923 visitors were served, of which 13,788 were at film screenings.

32,001 paid visitors were served, of which 13,788 were at film screenings.

There were 135 club formations with 993 participants.

All cultural centers and clubs operate in accordance with their goals and objectives.

2. IS architecture, software, methods of processing and storing information, database organization, familiarization with the network structure and composition of VT

The Vozhegodsk Regional Cultural and Leisure Association institution uses the Zvezda network topology, that is, two computers are connected to each other using a router.

A star topology is a basic computer network topology in which all computers on the network are connected to a central node (usually a switch), forming a physical segment of the network. Such a network segment can function either separately or as part of a complex network topology (usually a “tree”). All information exchange takes place exclusively through the central computer, which is subject to a very large load in this way, so it cannot do anything else except the network. As a rule, it is the central computer that is the most powerful, and it is on it that all functions for managing the exchange are assigned. In principle, no conflicts in a network with a star topology are possible, because management is completely centralized; you can see what a star topology looks like in diagram No. 1.

Scheme No. 1.

Specifications of institutional computers

"Vozhegodsky District Cultural and Leisure Association":

Specifications:

Computer No. 1

Processor: Intel® Pentium® 4 2.66 GHz

RAM: 512 Mb DDR

Hard drive: Seagate 120 Gb 7200 rpm

Monitor: Samsung 17"

OS: MS Windows XP Professional RUS

Computer #2

Processor: Intel® Pentium® 4 2.66 GHz

RAM: 1024 Mb DDR

Video card: Geforce FX 5200 128Mb 128 bit MSI

Hard drive: Seagate 240 Gb 7200 rpm

Monitor: Samsung 19"

OS: MS Windows 7

3. Reporting form

The reporting form of the institution “Vozhegodsk District Cultural and Leisure Association” is information containing tables, text, calculations and formatted in text file using a set of Microsoft Office package programs, such as Microsoft Word, Excel, Access.

4. Security and information protection measures

Kaspersky CRYSTAL antivirus was installed on the institution’s computers. CRYSTAL saves your digital world crystal clear. Hybrid Internet Threat Protection instantly eliminates malware, spam, and other advanced threats while conserving computer resources through a combination of cloud and antivirus technologies. CRYSTAL keeps your computers safe and protected from online threats, no matter what you and your loved ones you do on the Internet. The product exhibits optimal settings by default, and you don't need to be an IT professional to effectively manage the security of all your home computers. Use the Internet to its full potential, and trust Kaspersky PURE with security. The capabilities of Kaspersky PURE allow you to save your valuable documents, photos, favorite audio recordings and movies even if your computer breaks down or is stolen. Special tools and security technologies allow you to create and securely store strong passwords and prevent account theft on websites and applications. Using Kaspersky PURE, you can determine the time, duration and nature of work of each user in your home. You can also block access to websites with inappropriate content and filter data sent via instant messaging programs. Kaspersky PURE is a comprehensive solution for protecting home computers, which allows you to centrally manage security and reliably protects your computers from malware and other Internet threats. Special tools such as Parental control, Password Manager, Backup etc., provide a previously unavailable level of protection for your personal data.

5. Occupational health and safety requirements.

Basic rights and responsibilities of employees:

1. Employees of the Company have the right:

· To conclude, amend and terminate an employment contract in the manner and under the conditions established by labor legislation.

· To provide work under an employment contract.

· To a workplace that complies with state regulatory labor protection requirements.

· For timely and full payment of wages in accordance with their qualifications, complexity of work, quantity and quality of work performed.

· For rest, ensured by the establishment of normal working hours, the provision of weekly days off, non-working holidays, and paid vacations.

· For complete reliable information about working conditions and labor protection requirements in the workplace.

· For professional training, retraining and advanced training in the manner established by labor legislation and local regulations of the Company (documented QMS procedure “Personnel Training”), including certification in order to maintain the level of professional competence, improve the qualification category or promotion, is regulated by the Regulations on the procedure for certification of the Company's employees.

· For compensation for damage caused to them in connection with the performance of their job duties, and compensation for moral damage in the manner prescribed by labor legislation.

· For compulsory social insurance in cases provided for by federal laws.

2.Employees are obliged:

· Conscientiously fulfill your labor duties as provided for in the employment contract and job description.

· Comply with the Internal Labor Regulations and other local regulations adopted by the Company in the prescribed manner.

· Work conscientiously, observe labor discipline, promptly and accurately execute the Company’s orders, use all working time for productive work.

· Treats with care the property of the Company (including the property of third parties located in the Company, if the Company is responsible for the safety of this property) and other employees.

· Ensure the safety of entrusted property, use equipment efficiently, take care of tools, measuring instruments, workwear and other items issued to employees for use.

· Do not disclose information constituting a trade secret and confidential information about the activities of the Company, in accordance with the “Regulations on ensuring the safety of confidential information in the Open Joint-Stock Company “Universal Electronic Card of the Vologda Region”.

· Behave correctly and with dignity, avoiding deviations from recognized norms of business communication.

Responsibilities of the employee in the field of labor protection.

The employee is obliged:

· comply with norms, rules and instructions on labor protection, industrial sanitation, fire safety rules;

· correctly use personal and collective protective equipment;

· undergo training safe methods and methods of performing work on labor protection, first aid, instruction on labor protection, testing knowledge of labor protection requirements;

· undergo mandatory medical examinations;

· immediately inform the immediate manager or other representatives of the Company about the occurrence of a situation that poses a threat to the life and health of people, the safety of the Company’s property (including the property of third parties owned by the Company, if the Company is responsible for the safety of this property).

6. Tasks of the practice manager from the enterprise

1) Updating installed software

Basically, this operation was carried out manually by selecting the necessary updates, but it was also practiced to update programs through free application- Software Update Monitor (monitoring software updates). Its main purpose is to notify the user about the availability of new versions of the applications with which he works (the result can be seen in Fig. 1).

2) Setting up a local network

Before setting up a local network through a router for two computers, we will perform the following operations on each of them:

· Setting up a local network for Windows XP

First you need to disable all security programs on this computer (antiviruses, firewalls, firewalls, etc.)

In order for several computers to be identified and have open access, they must be placed in the same workgroup. To do this, you need to do the following: open the “Properties” tab by calling the context menu on the “My Computer” icon, then go to the “computer name” tab and, by clicking on the “change” button, change the computer name, and click “OK”. To set up a local network using a router, you need to make sure that all IP addresses of computers are located in a single subnet. To do this, you need to set identical settings on all computers. Sometimes configuration cannot be carried out without enabling the NetBios protocol. If this is your case, then you need to go to the “Network Connections” tab and open the window for setting up TCP/IP, then call Extra options and in the “general” attachment, include this same NetBios. At this point we can consider the process completed.

· Setting up a local network for Windows 7

The process of setting up a local network is quite different for different operating systems. Setting up a local network via a router for Windows 7 is not much more difficult. First, we will need to find out the name of our computer, then go to the “Properties” section, where we click on the “change parameters” button and make the necessary adjustments. Then restart your computer for the changes to take effect. The computer name must be specified in English letters. If it is specified in a different way, then there is a high risk of getting serious errors in the network.

Now we set up automatic generation of addresses and DNS. To do this, you need to follow the following path: Control Panel - Control Center - The local network- Properties. In the window that opens, you need to select TCP/IPv4 and check the box on the tab for obtaining an IP address automatically. In the end, all you have to do is enable NetBios. To do this, you will need to go to the “Protocol Properties” section, in the “advanced” tab, click on the “WINS” button and check the “Enable NetBios” checkbox, and then restart the computer. This completes the settings.

3) Installation of additional software

Additional software was installed at the Vozhegodsky District Cultural and Leisure Association institution:

WINRAR 5.00 is a powerful utility for creating and managing archives, containing a whole range of additional useful functions. WinRAR program Used daily by millions of people around the world to save PC space and transfer files quickly.

Adobe Flash Player is a universal free application that allows you to view pages with dynamic content, colorful special effects, interactive games and video clips, shown in Fig. 2 you can see what Adobe Flash Player looks like.

Reader is the free, proven standard for securely viewing, printing, and annotating PDF documents. It is the only PDF viewer that allows you to open and interact with all types of PDF content, including forms and media objects, as shown in Figure 1. 3.

FineReader is a text recognition program that allows you to quickly and accurately convert document images and PDF files into electronic editable formats without the need for retyping.

You can obtain an image for recognition not only using a scanner: it is enough to have a digital camera or mobile phone with a built-in camera, the result can be seen in Fig. 4.

microsoft office antivirus installation

4) Installing Microsoft Office 2007

Before installing Office 2007, we need to remove the old version, to do this, go to the “my computer” folder, then select “add/remove programs” and remove the old one Office version 2003, after the removal is completed, reboot the computer. After restarting the computer, download the Office 2007 image from portable media and begin the installation following the instructions. After installation, it will be better to restart the laptop for the changes to take effect.

)Installing the Windows7 operating system:

Reinstallation of Windows occurs using programs for partitioning the hard drive, both standard and third-party such as: Acronis Disk Director.

· The first thing to do before Windows installation We need to make a copy of the data we need using a memory card or CD.

· Now we need to go into the computer’s BIOS to set it to boot from a CD or flash drive. Save the changes and restart the computer by pressing the F10 key.

· The third step will be to prepare the hard drive for installing the new OS. Here we carry out the procedure of partitioning the disk into a file NTFS system using Acronis Disk Director. From under BIOSS we launch Acronis and perform the following actions: delete previous sections of hard disk and create new ones, indicate the amount of memory that will be required for the new OS, specify the NTFS file system and click the “Start” button. After completing these procedures, close the program and remove the disk.

· The fourth step will be to install the new OS itself. Launch the installation image from the BIOS and begin the installation. We indicate the disk partition we need and click next, and wait for the installation process to complete.

· After the OS installation is complete, we configure it.

· Install drivers using Driver programs Pack Solution.

· install the programs we need from the ChipWPI program collection (antivirus, MS Office, codecs, archiver).

· We configure the local network.

6) Installation Adobe Photoshop CS5

1.Installing Adobe Photoshop.

2.We go to the Adobe website.

.Select Russian | Windows | 1000.9 MB, Download now.

4.Login\Register.

.Download Akami Download Manager. Open it and open the site again. Click “Download Now”. Select the directory where the files will be downloaded.

.Entering your password

Downloaded Adobe Photoshop CS5 Extended 12.0 Final Multilanguage. Click on Set-up.exe. The result of this operation can be seen in Fig. 5.

Press the button Skip and continue , we are waiting for the installation programs to initialize, the process of this operation can be seen in Fig. 6.

The next step in installing Adobe Photoshop CS5 is to enter serial number, which was given when purchasing the software.

We are waiting for the installation to complete; the process can be seen in Fig. 9.

When the installation is complete, click the “Finish” button, Fig. 10.

We launch the program using a shortcut on the desktop or through the “Start” menu, we get a working program window, which can be seen in Fig. 11. The program is ready for use.

7) Setting up antivirus

When setting up the network, a problem arose with identifying computers; to solve it, it was necessary to disable the firewall in Kaspersky antivirus. To do this, we do the following: in the system tray (bottom corner of the screen) find the antivirus icon and click on it. Next, select “Security Control” on the antivirus panel. On the left, select “Protection Center”. At the bottom right click “Network”.

A new window “Protection components for your computer” will open. On the left, select “Network protection”, then look for “Firewall”. And by clicking on the dot opposite, turn off the “Firewall”. This is the firewall in Kaspersky “CRYSTAL”.

The license for the use of Kaspersky anti-virus programs was also renewed.

Conclusion

On-the-job training is an important element of the educational process for training a specialist in the field of programming.

During its completion, the future programmer applies the knowledge, skills and abilities acquired during the training process in practice.

During practical training at the institution “Vozhegodsk Regional Cultural and Leisure Association”, all acquired theoretical training skills were consolidated in production.

The wide coverage of the industries that I encountered in practice allowed me to better assimilate the theoretical material I learned during my classes at the technical school.

I mastered some of the subtleties of using software in practice, understood how some programs work, subroutines that were not clear to me, realized their importance in practical activities, and improved my level of proficiency in programs: Adobe Photoshop, Adobe Reader, Microsoft Word and others.

Practical activities helped me learn to independently solve a certain range of problems that arise during the work of a programmer. The World Wide Web, where you can currently find a lot of useful information in the field of programming, also provided great assistance in solving these problems.

Bibliography

1. Scott Kelby - Adobe Photoshop CS6. Handbook of Digital Photography (2013) PDF.

2. Broido V.L. Computing systems, networks and telecommunications: Textbook for universities / V.L. Broido. - St. Petersburg: Peter, 2003. - 688 p.

3.Shafrin Yu.A. Basics computer technology/ Yu.A. Shafrin. - M.: ABF, 2001. - 560 p.

4.Olifer V.G., Olifer N.A. Computer networks. Principles, technologies, protocols / V.G. Olifer, N.A. Olifer. - St. Petersburg: Peter, 2002. - 672 p.