Главная | Соглашение | Публикация статей

The total points in the organization LAN
Категория: English version

The computer on your network, called the workstation (Workstation), a computer, providing their resources - server computer with access to shared resources - the customer.
Several computers located in the same room or functionally doing the same job: accounting and planning records, registration of incoming goods, etc., connect to each other and unite in a working group so that they can share different resources: programs, documents , Printers, fax, etc.
The working group is organized so that members of its computers contain all the necessary resources for proper operation. Typically, a working group of more than 10 - 15 computers, include a dedicated server - a powerful computer that are all shared directories and special software to control access to the entire network or its parts.
Team servers unites in the domains. A domain user can log into the network at any workstation in the domain and gain access to all of its resources. Typically, the server networks all shared printers connected to the print server.
In terms of the coordination of computers, network shared by odnorangovye (Peer-to-Peer Network) and Dedicated Server (Dedicated Server Network). In the peer network, each computer performs equal role. However, the increase in the number of computers on the network and the growth of peresylaemyh data has resulted in the network bandwidth becomes narrow mestom.3
Widespread operating system is Windows 95 (98), developed by Microsoft, designed primarily to work in peer networks to support the computer as a client of other networks.
Windows 95, like Windows for Workgroups, may act as a server on the network. Ensure compatibility with older Networking MS-DOS and Windows Z.h. The new operating system allows you to:
• to share hard drives, printers, fax boards, organize odnorangovye local area network (LAN);
• use the remote access and office computer in turn caused the server;
• to support 16-bit network driver DOS.
Your network administrator can specify the overall design of a desktop system, to determine which operations will be accessible to users, and monitor the configuration of desktop system.
The network, based on a relatively small area, called the local (LAN - Local Area Network). In recent years there has been a complex structure of the LAN through the creation of heterogeneous networks of different computer platforms. The possibility of video conferencing and multimedia use increases the requirements for software networks. Modern servers can store binary large object (BLOB), containing text, graphics, audio and video files. In particular, if you need to get on the network database of Staff, the technology will allow BLOB refer not only to personal data: name, last name, date of birth, but also portraits in digital form.

Two technologies server
There are two technologies use the server: technology file server and client-server architecture. The first model uses a file server that stores the majority of programs and data. At the request of the user sent him the necessary programs and data. Information processing is done on the workstation.
In a system with client-server data exchange takes place between a client (front-end) and a server (back-end). Data storage and processing is done on a powerful server, who also serves as controlling access to resources and data. Working station receives only the results of the query. The developers of applications to process information normally use this technology.
Using large and complex applications has led to the development of multi-layer, especially the three architecture in the deployment of data on a separate server database (DB). All access to the database go through an application server, where they are combined. Reducing the number of hits to the database reduces licenses for database management system.

The total points in the organization LAN

Статьи по теме:

Productivity billing system
Macromedia Dreamweaver against Microsoft placed on the first lane
How to choose the CRM: Develop a short-list CRM systems
Pen plotters (PP, PEN PLOTTER)
Make backup ropii professionally - Norton Ghost 14
Changing the design desktop
Integration Ibm Rational Clearquest and Microsoft Project - The key to successful planning
On Legalization. Price Errors!
New CCTV: Monitor Smartec STM-193 with a diagonal 19 "
Robot Tartalo knocking at your door
Animation on your computer desk
What is the codec and where they can be downloaded
PRINCIPLE OF CONSTRUCTION OF COMPUTER NETWORKS
Zao «Light Kommunikeyshn» confirm its status «Microsot Gold Certified Partner» In 2008
Potential problems in Windows
PC Peripherals
Spam and how to cope with it
The physical medium for LANs
LASER (LED) Plotters
Robot Helps Salamandra Razgadyvat Riddles Evolution
The program 1S Salary and Personnel Management 8
Development and dissemination of computer viruses
More WinRAR 3.70 RU Final
VISA-2000. Virtual seller of computer equipment
The company Janet Systems Provedet Roundtable «The future of Soa-Projects»
The organization and classification of printers
Theft of computer data
Review of Windows Vista
The choice of the video
ABOUT personal characteristics COMPUTER CRIMINALS
Memory management Freebsd
Hackers, as the subjects of computer crime
Hackers can control a PC without the knowledge of their owners
The possibility of CompactPCI have more than 8 slots
Review of popular programs Backup
Mistakes Windows registry repair
The structure design and generation of computers
Repair permissions for sluggish computer
Technology Platform 1C: Enterprise 8 - Areas Development
Why is cleaning Windows registry needed
Introduction to Windows
Linux: Gentoo Vs Ubuntu Functionality
Components, Modules, mamboty in CMS Joomla
Free Internet Or How to Become a Hacker
Best Antivirus
The advent of IBM PC
Local bus
Development of Iron Industry Or Who Wanted Now Multi Processors
Nosy about the habits of your guy online?
History of Opera browser
Computer data as an object of criminal assault
Crm, software
Automation planning printing by Apple (Mac)
Basics With Virtualdub
Technical approaches to increase the security of the computer