Соглашение | Публикация статей

Красивые рольшторы - roll-service.by

The total points in the organization LAN
Категория: English version

The computer on your network, called the workstation (Workstation), a computer, providing their resources - server computer with access to shared resources - the customer.
Several computers located in the same room or functionally doing the same job: accounting and planning records, registration of incoming goods, etc., connect to each other and unite in a working group so that they can share different resources: programs, documents , Printers, fax, etc.
The working group is organized so that members of its computers contain all the necessary resources for proper operation. Typically, a working group of more than 10 - 15 computers, include a dedicated server - a powerful computer that are all shared directories and special software to control access to the entire network or its parts.
Team servers unites in the domains. A domain user can log into the network at any workstation in the domain and gain access to all of its resources. Typically, the server networks all shared printers connected to the print server.
In terms of the coordination of computers, network shared by odnorangovye (Peer-to-Peer Network) and Dedicated Server (Dedicated Server Network). In the peer network, each computer performs equal role. However, the increase in the number of computers on the network and the growth of peresylaemyh data has resulted in the network bandwidth becomes narrow mestom.3
Widespread operating system is Windows 95 (98), developed by Microsoft, designed primarily to work in peer networks to support the computer as a client of other networks.
Windows 95, like Windows for Workgroups, may act as a server on the network. Ensure compatibility with older Networking MS-DOS and Windows Z.h. The new operating system allows you to:
• to share hard drives, printers, fax boards, organize odnorangovye local area network (LAN);
• use the remote access and office computer in turn caused the server;
• to support 16-bit network driver DOS.
Your network administrator can specify the overall design of a desktop system, to determine which operations will be accessible to users, and monitor the configuration of desktop system.
The network, based on a relatively small area, called the local (LAN - Local Area Network). In recent years there has been a complex structure of the LAN through the creation of heterogeneous networks of different computer platforms. The possibility of video conferencing and multimedia use increases the requirements for software networks. Modern servers can store binary large object (BLOB), containing text, graphics, audio and video files. In particular, if you need to get on the network database of Staff, the technology will allow BLOB refer not only to personal data: name, last name, date of birth, but also portraits in digital form.

Two technologies server
There are two technologies use the server: technology file server and client-server architecture. The first model uses a file server that stores the majority of programs and data. At the request of the user sent him the necessary programs and data. Information processing is done on the workstation.
In a system with client-server data exchange takes place between a client (front-end) and a server (back-end). Data storage and processing is done on a powerful server, who also serves as controlling access to resources and data. Working station receives only the results of the query. The developers of applications to process information normally use this technology.
Using large and complex applications has led to the development of multi-layer, especially the three architecture in the deployment of data on a separate server database (DB). All access to the database go through an application server, where they are combined. Reducing the number of hits to the database reduces licenses for database management system.


Статьи по теме:

Developing databases, Inside View
Backing up data. Should I pay?
The situation for the computer
Zao «Light Kommunikeyshn» confirm its status «Microsot Gold Certified Partner» In 2008
Lock down the personal information on your computer
LASER (LED) Plotters
Industrial and engineering processes
Client accounting, Accounting orders - the most popular Software
Productivity billing system
Linux: Gentoo Vs Ubuntu Functionality
Download Mozilla
Development of Software Development Projects
Advantages of Mobile Commerce
Enabling Windows XP
More Software to create an electronic catalog Szags
The choice of antivirus software for home computer
WAYS OF COMPUTER CRIMES
The program 1S Accounting Enterprise 8
Greedy cabinet creators Spyware is testing!
What your child is doing online?
Robot Tartalo knocking at your door
Bus EISA
Computer data as an object of criminal assault
Computer virus
The company Janet Systems Llc Presented Soa-Platform Ijanet Framework Ultra The exhibition «Kitel 2008»
Mobile Trade Optimum - Office Business Representatives
Computer technology and Genealogy
ABOUT personal characteristics COMPUTER CRIMINALS
COMPUTER CRIME PREVENTION
What is the codec and where they can be downloaded
Inkjet Plotters (SP, INK-JET PLOTTER)
More Software invites you to Docflow 2008!
Windows Media Player
Version Mobile Forex 2.15: A new approach to reliability and convenience
Development of Iron Industry Or Who Wanted Now Multi Processors
Theft of computer data
Data protection. Luxury or means of survival?
UAB «Business Technology» Conducted Integrated Automation Ltd. Insurance Company «Amkopolis»
Black Banner - or the threat of new technologies?
Enabling Windows Vista
What file compression better?
Classification LAN (LCS)
Systemic and local bus
Working in Windows Vista
Repair & servicing Windows registry
Tips software and programs connected branch
Access
Spyware battle; Use of firewall protection
Proxy Server - This effective way of protecting information as well as a barrier to attack, hackers
The possibility of CompactPCI have more than 8 slots
Preventive methods that reduce fatigue while working for a computer
The destruction of computer data
HISTORY OF BUILDERS
Document for Linux
Using Protection Agency to maintain the security Professional