PDF / /!

Similar documents
SPARE CONNECTORS KTM 2014

SPAREPARTSCATALOG: CONNECTORS SPARE CONNECTORS KTM ART.-NR.: 3CM EN

ก ก Information Technology II

22ND CENTURY_J1.xls Government Site Hourly Rate

Appendix 5-1: Attachment J.1 Pricing Table -1: IMS Ceiling Loaded Rates at Contractor Site


Unit 10. Networks. Copyright 2005 Heathkit Company, Inc. All rights reserved.


ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

Chapter 10: Local Area Networks

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

Local Area Networks (LANs) & Networks Inter-Connection Chapter 5

CD _. _. 'p ~~M CD, CD~~~~V. C ~'* Co ~~~~~~~~~~~~- CD / X. pd.0 & CD. On 0 CDC _ C _- CD C P O ttic 2 _. OCt CD CD (IQ. q"3. 3 > n)1t.

NETWORK SECURITY ITEC 435

Contents. Introduction to Networking. Preface...i. Introduction... xix

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

The NIC is the main interface between the computer and the network cable.

DETAIL SPECIFICATION SHEET

GAYATRI COMPUTERS Prepared by : VENKAT.G 1. Module 1: NETWORK BASICS

IEEE standards for local area networks

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Working with Data sent to a Computer or Flash Stick

OPAL-RT FIU User Guide.

Section 1.1: Networking Overview

Network Administration

Study Guide. Module Two

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Patch Panel Cable Guide 3-5-3

Lecture 8: Switched Ethernet and Collision Domains

Local Area Networks. Ethernet LAN

IEEE 802 LANs SECTION C

SMF Transient Voltage Suppressor Diode Series

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B

Part3. Local Area Networks (LAN)

Ethernet. Computer Networks. Lecture 4.

Raj Jain. The Ohio State University Columbus, OH

Computer Networks. Week 04 Media and Devices. College of Information Science and Engineering Ritsumeikan University

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers.

The following pages contain a guide for the installation

GE Fanuc IC695ETM001. Rx3i PacSystem

Review: Networking Fall Final

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Parts List, Charging Chart, Wiring Diagrams

Tape & Reel Packaging For Surface Mount Devices. Date Code Marking:

LAN PROTOCOLS. Beulah A AP/CSE

Network Media and Layer 1 Functionality

ELC 537 Communication Networks

One subset of FEAL, called FEAL-NX, is N round FEAL using a 128-bit key without key parity.

ET4254 Communications and Networking 1

Lecture 05 Chapter 16 High Speed LANs

This PDF document is a sample chapter from the book...

10/100/1000 Mbps Ethernet 100 Mbps FDDI 155/620 Mbps ATM 4/10/45 Mbps Wireless

Local Area Network Overview

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Lecture (04) Network Layer (Physical/Data link) 2

Internet Architecture and Protocol

Integrating Information Systems: Technology, Strategy, and Organizational Factors

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

TCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming

LAN Systems. Bus topology LANs

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Other Protocols. Arash Habibi Lashkari

Networking Fundamentals

Lecture (04) Data link layer

Lecture (04) Network Access layer fundamentals I

Lecture (04) Network Access layer fundamentals I

Network Topology. By Dr. Piya Techateerawat. Bus Topology Ring Topology Star Topology Fully Connected Topology. Combined Topology

Lecture (04 & 05) Data link layer fundamental

High Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2

Introduction to Networking

Zarządzanie sieciami telekomunikacyjnymi

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

N11 = 100 MBH Input Aluminized Steel S13 = 125 MBH Input Stainless Steel E15 = 15 kw Electric Heat. E30 = 30 kw Electric Heat

Introducing Cisco Data Center Networking

ITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D.

CompTIA Network+ Course

W52P1J-15-D-0060 [ ] Honeywell CN70GQ5KN00G1A40

CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS

Module 11. OSI Model, Network Devices, and Network Standards

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Introduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control

Chapter 4: Network Access

Solved MCQ of Computer networking. Set-1

Chapter 16 Networking

CSCD 330 Network Programming Spring 2017

Ethernet 101 Siemens Industry Inc All rights reserved. usa.siemens.com/industry

UYM-UOM-UOY-UOD- UOS-UOB-UOR

Introduction to LAN Protocols

Chapter 9 Ethernet Part 1

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub

JUBILEE HOW-TO HANDBOOK

Ethernet Standard. Campus Network Design. Ethernet address. OSI Model. Thana Hongsuwan

Introduction to LAN Protocols

Technology in Action. Chapter 12 Behind the Scenes: Networking and Security. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall

Networking Essentials

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

2-Type Series Pressurized Closures

1. Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?

OSI Model with Protocols. Layer Name PDU Address Protocols Device

Transcription:

www.parstech.org // PDF!

Main Mini P.C! "# $# %#& '() $# " Package :.+ * '+,, '(-!. / $ 0! 1 2#! : &+# ' User & 5!(.14 5!( 67 * $"8 5!( 9 ( Ram) 6; $<1= 0""+ A#9 $<1= 0""+ : @ : Single user '! Multi user ' +,! Multi programming!

Main) ( ر.+, 1 %6"1 BC D"! * 01EF %C "(.+, *C & $1; $ B*G H,.0! I ' +,! ( J&(F 0!.0! #!)!." ( BAIF $% +,#! 9 56K Main) ( ر.+,,K# 'L " & 2+ M ( HC (! 4.0! I *C $CA & NOKP!." +%L# $,".0! $CA & (*+7 'L " (+P! " ( *C." +, $( " *C & 0!.CK B & Q" DQ!* 5Q#C & '(-Q! R+Q=.Q" $ +# '(-! H, 5 +,# %, ' +,.0! *C.0!.CK S ( T ( * CI! $P! : Q Q! ( J&(QF "& +( V 0! $! U!F B& 'L " (+P V"1 @.(4 5; $Q% * Q! & '(-Q! Q BQ J&Q) UNIX QX Q Q Q! & '(-Q! 06 $ W.+ CI Y!, $#

: +Q,#Q * +Q#( \QA L"+QC" Q [QA /Q7 Q" Z"[ & $ G +, & $K8.+,( 28# '(( HG# 56K! " # $%& ' Local Area Network ( Lan) 67 $CA " Z"[ & 5*( "! " \A & 0 A 67 $CA.(*+7 "1]9 '(*+7 " (! " K $ * B#R " 07 /7 Wide Area Network ( Wan ) '( 4 $CA Lan."+, & Wan " ^ ( X ( * +#+# "1]9 0"(*+7 Wan $CA."L <# ( Wan."4 0#," B +" Q ( (8" L"+C" /A : # %&( ) *+,-. *C ("& (+P Q "# *, " & B( ( '*_ 67 $CA.+#( # (! /7 (. $CA ( * =[ $,& ( 66K`. * 6 (+#! B+) (9* $.+, T $P! 06R ( 67 $CA K7 $[ B&! $ 1a $," * +" $P! B&! &# 2LK! 67 $CA " (.+,K#.+, B,K[ R * "bf cdp# 67 $CA ^ Q %C Q"( (Q +Q,# 0QKR BQ4 Q1 0Q! & eiq '(-Q! BC 67 $CA.+, 1 BAIF $% 'L!( * ` LF : @ W

ر :Pack Q8= Q " $ $ 5_[ [A \dt ( _[ 1 H, ( 0`%! 67 $CA ( $1Qa B) $Q... * QdT f7q $Q \ 5_[ * +G g() ^ +A g() h! +# G C.+# '+# Packet $.". ( OPEN SYSTEM OSI! INTERCONECT 2%- " 5; $K! (+#!.". + 67 $CA (+#!."AP *."1*P OSI H+ [QQQA QQQ((R & QQQ iqqq"p QQQ 6QQQ; jqqq QQQ% BQQQ, $QQQ * '+QQQ $QQQk QQQ6 jq % " H+.".( $14 $ $CA ( ( Communication Protocol ).(&(FK# \A R L#L * 5k9 $ * +( $k \A 6 +, $GA[ * +T * +, '(-! 6AR $"O /! '+ $k 5+T & $"O. 0! '+ CI $"O 0- & H+.".+( $k +P $"O $.+Q $+# (9* $"O +, " " $CA " ( 0!.CK * 0 # ` $"O K (9* 6 0`= ( '+Q $Qk 5+QT gq! 2 n $"O ( '+ 28# +,"1 * J&(F $6 $ 0!." ( +, $GA[ 0" YQ.Q" $Q.(+Q# B) & QAR * n-2 $"O l# * T! $ L * ( =[ 2( n-1) $"O /! Q "%* (8" * 0( +T 5*- L"+C" $"O +, " " ( %, 5*- ((R " $CA.(4 5; '(! $CA.". \A R Physical Data link Network Transmission Session Presentation Application :! C"1 $"O '(( \A $"O $CA $"O HG# $"O $"O : gk V"K# $"O @ ( $"O W : ( Physical)

* $Q"8 * +Q#+# Q,P MQ Q8," ( Q%.Q" ^ (( *! % * C"C` 5I C"1 $"O ^ /T ( B"9 * m`* n C * od! $ \ ((R. 0! O $"O $-E* %." 67.0! \ $"O." $ HG# /7 8# * 5O l# ^ h#1 ^ B!O+ l# ( $Q<7` Q" ( 0Q +,) & " * ( $<7` ( 0 ")! 5; $ 0!.CK $"O." ( \A (. +Q Full Duplex Q" Half Duplex HG# J* 0!.CK 5; *(." & " (. + 0Q1"( Q " * 5_[ HQQ! " +# +QQQ=* B) ( HG# /T Half Duplex HG# J*.0 #.CQK /T " $6!* $ BKQQ 01"( * HQQ! J*." (.(QQ $14 $ 5QQ_[.0! "bf BC /T " /! 5_[ BK 01"( * H! Full Duplex HGQ# J* ( : ( Data link) $QC6 (+Q# *! % L"( $"O." (( '+% $ 'L " *(. /T B*+ \A R $"O." $Q Packet %# * + B( pi " $#I# $"O.".+!, Packet 5 5_[ 'Q7# * BQ&.QP.(4 5; $"O." ( # dt o_; * &! C). +"1 5_[ $.0! $"O." i"e* & # /T $!( : ( Network) Q & $Q "Q $CAQ ( ^ (( '+Q% $Q 5_[ H! Y!, &8 (8" $"O.".QP qqt \QA " R Y!, $"O." +,, '(-! 5_[ HG# i6 Q" $6Q!* $ HG# $"O ( ( Connection ) \A."+, +# (9* 5; ( $"O.".+,.(4 5; Multiplex J* $." +, R Data link $"O ( \A : ( Transmission ) Q $Q"O 0""+Q QK $"O." ^ +( $k $ 67 5+T $ 0! $"O."."F $"O." o_q; * CQ) QdT $Q"O.Q" (.+Q( 28# 5_[ B"9 * \A +,"1 H, <# &.""& $Q +#QQ '+Q#(4 f7; 0`= $ +# '+ 01"( f7; S Y $ " Packet * +# 5_[ HG# ^ \A l* (4 5; 5_[ 07; H, "%# = $"O." ( L"( 5A OQ $"O $ ( r $"O." (9*. (4 5; $"O." /! \A T *.""& $"O $.+,( $( $ 5_[ B"9 H, '7# * /T $!!( '7# /7 l# & G : ( Session )

BQC * +Q, HQ, BQ QA +Q +Q(Q pi $"O." Z"[ & B 67 $CA " $Q $Q +Q,Q.P $"O.".,tK +, 1 Full Duplex * Half Duplex 0`= s"p ( * (( Q * Q! $CAQ ""+ k gk $"O. +, '(-! $CA & +# #& $ ( * <# & B $"O." (.( 28# $"O." /! HC 0`= & n*t! ( HC &* 5;.+# H, $CA & '(-! L#L * +G : ( Presentation) 5_[ B(*)( $ * (( *! ( 01 ) 5_[ Y`R * %6"1 HG# ^ 5_[ 0, $"O." $Q-E* $"O.". (4 5; $"O." ( L"( %A`R $ 5_[ $9 * 5_[ "I4& ^ % ( H_QT QAR & 6k Q =.(( '+% L"( ((R $ ( Protocol ) ((R " 5_[ "+A QL"( i"e* & 'L " *(. ( ) 0! ( c_t * V"K# $7-; \dt.+ $"O." : ( Application ) Q Q! * B &# $ ("& L $"O." T!.0! $"O $G [A /!* $"O." 5Q; $Q"O." 5#C /! # $CA ( L"( B pi * B 2F HG#. (( '(-! ( ^ *Q! Q"1 Q $Q# ^ Q_[ Q%C# 0""+Q $# ^ %6"1 HG# $ \ 5+T.(4.(( R $"O." (! B1 /T * C#*C` 0 F ^ *! 0,"F

% $ #"ر : Servers Work Stations Net Work Interface Cards Communication System '+,( h"*! 'L " ( $CA % ) $CA 8# ( [A! : ( Servers).%&! / $ h"*! " $k 2&O 1 2# & K R R+= * 1 0! & 0! 5A '+,( h"*! " : + "& '+,( h"*! +# $CA " 6 0`= (.$CA B Q9 HQ= ( (Q Q Q" +# $ 0! $CA "!! * 2&O v : Fail server Q1 0! 5#C & 0! (R.".+ qt T! "* qt $# Q!.(bL e $ $CA B. ` " dt LF * hard disk AR & (T $Q $ B!!( '7# 5<# * 0""+ %, 0!9 H= ( Fail server * $ 6.(( '+% A,9 5#C * "1 2Q8# LF.b4 e $ ""+ 56K $ 0! $# " 'L!( : Print server.+( Q (QT hard disk.qb4 eq $ 06R $ 0! $# " 'L!( : Data base server Q QT ( Q%#) * Q 56K 28# * _[ %C# _% * (( $CA B '(-Q! 2QL, ( * +, Multi tasking %6R ( NK '+,( h"*!.". +( R.( 28# Data base server ( L"( 0K R * 'L " ( J&(F & K R %#) & \QA Q 2&O Q 5+QT $Q 0Q! $Q# Q" 'LQ!( : Communication server.+,. $CA & nt 'L!( * $CA B : ( Work Stations) ( $.2 $ 4 ^ +,, '(-! B) ei 5#C & * +, $CA " $ $ +, " *C NO; Work Stations (( R L"( 'L " T ( 'L " " 1 0! 5#C B 0!." $CA " 'L "!! $I. +#K# $14 <# ( 5#C.b4 e $ H, * $CA 'L ".!! w1." ^ +,( 28# J&(F +,# * +, +,K $.+( CI

: ( Net Work Interface Cards ) $3( & L"( C" +#( '+% *! "1 * 'L " * [A!. \A R $-E* \dt ( 5_[ 1 H,.0! 5_[ H! Y!, B& pi $CA ( i"e*.+,, 5_[ H! $ 2+R A!, B& ( $CA ( 'L " 0! 2&O [A : 4( [A! T! CI (. (( '+% $CA i6 x9. \A R 6; $-E* : +#( 0`T( "& Topology " +,AK [A /T $!( '7# \A H#. $CA B*( 'L!( H!+, C & 0! 5A +,AK : Topology " +,AK : & +,A y" %` Bus!" #$%$& '+I L"( 'L!( $ 'L!( " & Y $ $ $ " Z"[ & 'L!( \A +,AK." ( * $1" HG# *( & ( '(( R * 'L!( " Z"[ & $ F. ( R ( B& 0KR * Y# = J*." L"( " & 0! 01"( R L"( 'L!( & " /! 'L " $6 +( z & " ( `C '4 $ 0!."!." Y ". 0! B) & 4. + I +"A# { & H[ J*." (.(( +,T 0!( & $CA \A." $ 0"G n 0! '+,, 0"G " $ Repeater 'L!( $6!* $ ( '(-! { & V H[.+# C Ring $'( #$%$&

5*-." ( L"( 'L!( $ 'L!( " & / dt +,AK +,# +,AK." ( * '( 0= " ( %, 'L!( /! 2F H!. +, $ # (&)! *( $ 0!." G6= +,AK HC ".0! 01"( R (( R ( $ $" K 'L!(.`* /!."!! 0". (4K# 5; 4(! $ $CA 'L " (+P B( " * B( $1a $.0! O 1 " $CA ( %#) jt "! Signal C Star ) #$%$& CENTRAL " 'L!( " $ (T qt / Z"[ & 'L!( +,AK." ( &.((.-6! +,AK $ ("& 0A '! +,AK.( $ HUB $C," Y"P & *.0!%#) O [A 0! * 7 j# 0`%! J*." ".0! ("& B) $," Hub C

: 56 78 9.: 'L " " T ( +# %,,P B& " ( [A H# $CA! X ( $ 8#) & H# & '(-! $ n= 0!.CK $<7` ( $CA 'L " & " L"( c[ & * +. 0! g 7 HG# /7 $!!( pi B#R * J* " 0" 2*` +, $( [A HG# 0! $CA! " (. + $( $CA " (!! VG# +# J*." " $!!( + J* " "& 0 #! 0! V8,! P %,( $#} 0 ) B/S Y = 5_[ /T.b4 e $ y" %*. +( V 5+ $ 5_[ HG# } 0! +# /T : & +,A : - $ L!( & [A /7 ( NKk( ( Token ) 0_ 2# $ qt ( Pocket ) $ $ J*." ( "& K *( & C" +# +, 01"( Token $ L!( 0! \A H= ( L"( 'L!( : +( 28# * '( nt /T & Token +" + + 2F H! $ " 'L!( $C; ( Token N(+8 +" '+,!1 'L!( ^ H! $KT & hf +, /T (* (T 2F h!.+, H! +P 'L!( $ B) * '( /T (* ~ (Token) 0_ g() +" %, +A# 2F H! $ " 'L!( $C; ( [ & hf NK= $ 0!." ( J*." 0". +, H! +P 'L!( $ B) '( 0!."!." " &.+! +T 'L!( $ 2F H! 0# pi B&.+ AT (T +P 'L!( g() & +" L!( $ Carrier Sense Multiple Access - 6 w " ( B( 0A7; J* $ $A + CSMA/CD B) i- 2# $ J*." L"( (1 $ (. Kd B(( J4 +" +, 0A7; +T $ R., ( ^0! $CA 5) $CA 8# ( J*." ( hf. +, 0A; $ 2+R h! * 0 # 07A; H= (." '4 +, 67 * $"8 /T ` 5; $ 0! '+ Y# F " T( ( $ (!." (. +, 2F H! $ 2+R /T B+ `T & hf + $( H! F 'L " (9* $ Collision " (T '+"+F +,, H! /T ( F $<7` " ( $CA 5 *( '4.+ Collision Detect i- J*." %# ( CD c= *(.+) +T ] 2F." ( H! /T ( Jam 2# $! 7 2F (4 5; (T " $ '4 ( $ L!( *( h! +, D6d (T & 'L " $6 /T ( G m`* fd!

B( `T 5; ( h! * +,, A; 1( B& '&+# $ " +# $( 0 (T /" ( jt " * 4(!!."!! 0". +,, 2F H! $ 2+R /T.0!O 1 (! " B+ B) '+K HC * 0! ( : ( \A y" %d7. 0! $CA 9 '+,( \A C"1 /7 [A H# & <, : & +,A $CA - :!"#!"$ %$& '+ '+ QQQ! ^ \AQ m`,c ( [A /QQ7." K"+QQR *." HKP *."QQ B& 0-9." & 1 (+QQQP +# '+QQ '+ $ "# V ( JF* QQ! $ *(.0Q!.QQ,. +,QQ( CI " * +#QQ4 QQQR C!_F c_s " T( ( QQ! '+ '+! $K8 4. +,# ( Unshielded Twisted Pair ) UTP 6 ( Shielded Twisted Pair) STP ;= ^ ( '(( R K,`) c_s " T(.+,#

: :!(!!; <: 7 #! '& (! # $3!%: "& '%( )( )*+, -. "!* & ;= [,] *C` 5P * /7 "# ^ l#." C"1 T! 06 $.+, $9 HC /7." (C6K +# ^ "(#( (9 C"C` 5*( * 'L!( " " * 0,!*61 O " C"(# & A } ( = 0!.CK T+.".+, I NA # 0, ( <#." & STP l# %6. ( (8" 1 : '/0 1 2 ( r.".( ipv! T( ( C"C` H,L! H[ B+ ("& H= ( /T L"( %# ( $ " 'L!( * ( 2&O += & K 2F = % `F l-.+# dt ( +, 1* 0 pi : ) '&3(,4( CI "%#&T^ K,`) c_s * L"+C" '+ '+ $! *( V"1 r." ^ +,, (8" #& 0} "! K 0*G 'K $ %#&T.".+,( h#1 0"(*+7 Y9 0"%# ( * '+ 2F = % `F 21 ] * B+.%F.( (Cross talk) '" 0-9. [,] * C"C` G` & ;= T+^ 9T C"C` T+ '*_ STP %6 ( (.". +, (*+7 l#." # " T(!.+( z I B& 0KR 06 $ HG# /7 l#." & '(-! (*+7 H[ ( ^ %"(*+7." (9*.0! y" ^ Y# #!) *

(Coaxial Cable ) ( %) * $6;1.0! $14 R `T 61 $#! " T( ( $ 0! e&# `- ( "." (*+= ) O h#1 (." ^ 0! '+ F Z" " $#! * #*( (. r "# $ 0A # 0, '*_ $ ^ O % #1 ( '(-! 06R.+, '(-! R ( L4.+,, +F 5 m`,c ( ( %6." $ '+ $. + #4 * CI '+ '+ $! & %6." Y# 56K * H ^ G (.0! = %#) HG# \dt.#r ^ %6." ( h#1.1 O 06 B) ( $1 C C"1 5QI * DdQQG fd! (QQP * & ^.#R." ZA[ (( $I 0*G )) 0*G.".+") 0!( $ ( Y = ) 0QQ*G "^.+,# ( Characteristic Impedance) 2F ^ ( %, J $I *G $ " '4 ^ $ 0!." ( +G." 0K ( 5," S (.(K# hcp, /T %# $ (T ( ^ /T ( '+ '(!1 C"C` T+ ^ 0! H! H= ( $ +P 2F '+ hcp, 2F * +( z gcp# ^ /T %#.+ +T '(-! R S HG# /7 * +, (*+ ^ $I 0*G *G /! ^ 7 %# *( `(." $.+,# Terminator N=_d; 0*G.".(

& 6`( $ '4.(( L B) DdG fd! (P $ $I 5*G ^ + $-4 $ d#k." ( $I 0*G ^ +" C ] DdG fd! ^ += & V B+ T " * B+ '(I1 AR.+, K 5*- $I 6 $PdR +,# 0K R." * '+ ~ 0K R

( Optical Fiber Cable ) -.$/ '(-! 06 $ %6.".+#( 7 %6 5%9 & & # A1 ^ ("& +#,%F 06 $ ^ +,. /7 "# <# & ^ C"C` B"9 8 # & # A1." '*_.+,( 28# `#) / B*+ H8"( \A +,# B * +,, H] K 9 ^ +, K B&* ( ^ ( $ *( ;1 B.+,K# +"+% %#) 4(& #& * 4(!1 +, # 61 c_s " ( $ #m 5C6!* +,# c- h,9 " & &# $6 & %." 61! +, * # A1 $6 +, & $K8.+# '+ $T! ^ +#( R 5*- 0 C ja.+#4 R C!_F c_s " ( ^ +#'+ $1a C#C 5+R V"1 $ ^ : +# G 6; $!( $! $ # A1 %6 Step- index Multimode Grade-index Multimode Signal-Mode L"( l# & V * +,."F 0- * #& 0KR ( Step- index Multimode %6.+#4 R '(-! ( $CA ( # A1

y"+ $ A#9 fd! & c- /7 0 C Y"a Grade-index Multimode %6 ( # $C6 ^ (4K# 5; # 6 V& c- /7 '"( * 6., (.(.+, [,7, " k9 V& e&# %6.".+, ("& +#,%F ( * '( 0KR B4 Signal-Mode %6.(4 5;! $ %#) * 5O 28# * +, " * ( Light Emitting Diode) LED # ("( $6!* $ # " ( H,L! H! %`,L! "+A $-E* ("(.".(4 28# ( Injection Laser Diode) ILD ` ("( PIN ("( $6!* $ # H,L! /T L"( c[ (. +#( '+% # H,L! $ C"C`.( C"C` %`,L! $ "+A N (+8 $ (+8 * '+ 0"G ^ '+ "+A C"C` k_ $ # k_ +" '+ ipa k_ 0"G H,L! $ "+A B*+ # H,L! $ # '+,, 0"G ƒƒ H! (.+# "+A # k_.+ $T! +, 0"G C"C` B." ^ ( = # A1 * PI# 5O (8" ( (9 k $C; (.0 #( $CA `) '+" HG# /7

$ $!!(= L#L ' (,#R $ 0! [A /a * %* & $K8 $CA ((R " * $CA ( B4+,, +` '((R." (9*.( \A =K " * K R 28# %K R 28# } %* 0" $ $CA $ \ L"( 1 2# * 1 0! 5*( $ i6 B4+,, +` 5O7 $ ( Y9.".+, 26 \A +,"1 i6. +,,, ( CI (8" B*+ +# '+ $T! q ((R " : Ethernet 01! " $ Ethernet! " (. +, OSI H+ C"1 $"O ( ((R." J* * +,AK & ( $"b] 'L " $6!* $ $CA $,P." $ 0! HP1 S [A & 'L " * 10Mb/S 5_[ HG# 0!. ( '(-! CSMA/CD /T $!( ((R.".( $CA 6; $ Transceiver " * '+,, H, " Z"[. (K# pi ((R." ( HG# /7 * +, pi 'L ". \A L#L.( $14 <# ( Ethernet ((R "& /7 RG-8 50= $I 0*G dr 7 RG-68 50= $I 0*G e&# 7 150= $I 0*G ( * 'K ) '+ '+! B*C * * dr # A1

: IEEE802.3 01 -!( CSMA/CD J* & Ethernet +,# * 0! Ethernet $ $A ((R.".+, Data Link $"O & K R * C"1 $"O ( ((R.". +, '(-! [A /T $ : ( G LLC * MAC $"O *( $ ((R." ( Data Link $"O MAC LLC Media Access Control Logical Link Control IEEE802.2 $"O ( LLC $"O K L#L * IEEE802.3 ((R ( MAC $"O '7#.(( R Token Ring %2$& : IEEE802.5 01 -." +, Data Link $"O & MAC V * C"1 $"O ( IEEE802.3 ((R +,# IBM 0 0T! *, $ *C H BC!.+, 1 $! HG# /7.( '(-! 0_ HG# J* * $G6= +,AK & Token Ring ( +,AK +,# E $ 0! $G6= l# &! +,AK $4. 0! 7 * '+ Multi ) MAU 2# $ L!( B*( 2&O 5%8 L"( 'K $ $G6= "&. +! <# $ '! MAU $ [A /T " $6!* $ 'L " & " * $14 R ( Station Access Unit.+# ( Attached Resource Computer Network ) : ARCNET 01-3 $! +#!." ( HG# /7.+, '(-! 0_ HG# J* Star +,AK & ^ J 4 06R ^ "bf cdp#.+ # A1 " * ( 93=) RG62 7 * '+ J*1 F Ethernet & +P!." $ 0! '+ r Arcnet B& 0KR * jt ".+ $CA!." $CA J 4. +# HUB 2# $! " $ 'L!( $6!." ( HP1 HUB " & 'L " " $6;1 X+=. (*1 $CA $ # L"( HUB B B*+ "& 0! B!) Arcnet $ \ 5OC D1 * " Y.+ @.( +9 $CA & 'L " " $ \ %6 B $CA 'L " ( H_T TCO/IP 01-4 i- B) 2# $ (( R." Stanford 'LI#( ( Vinton cref ^ ƒƒ $( "* ( \A ((R.".(%#, 0! Transmission Control Protect / Internet Protocol

. ((R."% B, $TCP/IP '&*.+ (8" 5*- ((R i6. * *C $CA. \A * i6 ((R $CA. \A ^ 0! '( OSI H+ +,# [A H+ " + ( TCP/IP $ 4.( $T, ( $T, [A H+ " 5 $C#) & V TCP/IP '&* ^ OSI H+ & '(-! J 4.0! HAR ( OSI H+ $"O ( ((R & $K8 B, $ * +, OSI H+ & $CA $"O ( IP.+( $k fd! *( ( [A 5+T TCP/IP 5+T & TCP DR* (.+" $( V"K# $"O +# * '+ &S) HG# $"O ( TCP 5+T.+, '(-! IP /! '+ $k Segment 2# $ " $ $ ^ +, 01"( O $"O & $ _[ +A 'L " ( TCP.+"1 %#) $ $CA $"O $ \ 5_[ $." 01"( & hf IP.+, G $"O Z"[ & Data gram.".+,# Data gram N=_d; IP ( 5_[ $ * (4 28# hc K +G 'L " (.+# G, +G 'L " ( $CA $"O $.""& "& 5_[ Segment * & * '+ n! Segment 5 5_[ Data gram.( '(-! ^+, (8" BLK# $CA. \A BC $ 0! $CA $"O ( ((R IP.".+,, R \A L"+C" +,# 5*- $CA *( $ Z6P 'L " ((1." &.+, Data Link * C"1 $"O ( (9 ((R * T! & G ((R.( $14 <# ( TCP/IP, ( IEEE802.3 ((R NOKP 0!.CK $C6 ^ (K# R '+#4 'L " * '+,!1 'L ". 0} Gd, " IP ( Data +, $ L,. +,, [ -6 +G $ +A & HG# Data gram $K A 0} " (9* 2+ 06 $ ^ +# H! +G $ +A & Y $ gram.+,! +G $ 0!(# Y 0!.CK ^ %#) +G $ 2F B+! & B,K[ (8" * +(K# +G $ +A & 2F B+!,Kv.,tK IP.(4 5; TCP ( ( ^ 5_[." * & * +, 0A} Segment ( Segment H! Y TCP,Ka.+, Y +, '+ 01"( 0!(# Y 0!.CK $ " Segment +G.( ;= B,K[ +G $ 2F B+! & ^ +" 2F 01"( +G $ B+! 6% Data gram +,, '(-! TCP/IP & $ $CA & $K8 " (.".(*. & (I# 01"( L " $6!* $ Data gram 06%." vg# & hf 4.(( <# ( $CA 1 ( V"1 * B(4! Data gram (9* & 469.0! '+ $14

(>+? cq[ $CAQ Q" Q 1 0! &# $K8 ^ +#+! B, $ 67 $CA & "%K R 2Q# Q&# $Q "L9^ ( $# * %L "! 'K $^ $CA!. +#&!.(( '+% $ 1 0Q%9 2&O 5+QT * 0Q! $CAQ Q1 2Q#!! V * 67 $CA " Y6R BQ Q( 0Q# * (.Q" H* '. (( (9* ' *( Memory Management ) FILE Server File Server File Server (>+? 1 2#. +,+ $k $CA!! 56K 28# $Q<1= 0""+Q ^ $CA #L"! ^ HX B, $ 1 2# (8". ( 2# B 5+T 01"( $Q 0Q! B) 2*( ' * ^ ( $# C," q (Multitasking) ' +,! " $ 0!. ( $# UNIX, OS2 +,# ' +, %6! & C" *.+# '+"4 2*( = ' LAN Manager Microsoft * +Q,Q '(-Q! * UNIX Banyan +,# ^ Q Q! & ^. (I 9 File Server OS2 Banyan & $Q 0Q! Unix Q Q! * Q $CAQ "+Q Q1 2# " File Server 1 2# 1 2# B4+,, +` & T! 07 Banyan 0Q & Vines Q1 2Q# Microsoft 0 H7 H7 Vines Vines $Q ^ '(Q) Q Q! Q" & '(-! 0". +,C ( '%. = 7# $ ^!." 5#C $Q Q Q Q! * (9 ( $# ^ $ 0!." $CA 1 2# B,. +#4 R $CA 1 2# '(-! ( +,# = Q Q %K Q! Q \QA BQC ^ 'L Q" Q"( ( B(b4 e $ BC Vines " & 2Q# $CA! " (. ( 2# B R 5#C * ^ SNA *TCP/IP ((R

( Q Q" 5Q#C K & +# ^ ( $CA (*.-6 /T Z"[ & $ ^ Q" +` 0.". 0! $Q 0Q! 6Q Q! Vines 1. 0! $CA J*1 F 1 2# & C" B, Vines. +, '(-! $CA T( Netware Netware Novell 0 & Netware! ^ $CA 1 2#."*1F $Q Q8#) & (( f9q Q Q! Q" (Q8" ^ $CAQ 1 2# "Q * 0Q! ( ^ Q! Q1 0Q! $Q IQ C"(# 06 $ ^ 0! '+ $# $CA q QR iq6 Q +Q,AK Q ^ Q1 0Q!! X * $!.". 0! I. 0! "# ( ^ 0! x9 cq Q H) '+Q" $CAQ Q1 2Q# Q" $Q Netware $ "%6R T"! $ ^ $( (. "&( ^ 0! '( "+A K (File Allocation Table ) 3@+ : A%; #! $(%3 Q +# 5_[." * 0! B & '+ ei 5_[ *= $CA "( ( $ 8#) &.1 0!( & 06 $ 5_[.1 0!( & dt & 469 +Q%L# Q"( (Q & QL"( Q7 ( FAT & Q Q" ^ Q1 Q8 Q"( (Q *( ( 5Q_[ Q +Q%L# BC Netware! + +,K& ( file Allocation Table) FAT STF Netware!.+, Q9 "( ( *( * BK d.# 56K * '( B C" _ "( ( *(.".+, * Q (Q9 5_[ ^ %C "( ( & C" * (9 5_[.1 0!( & 5; (.( OQ Q BQ,K[ 0Q6R " $CA $!( BC.".(4 R '(-! ( +# L"(.+, 1 Hot Fix Redirection 7?2& B!!( C5 *D A& 5Q_[ Q eq6 Q7 $,.+#T #) ^ "( ( * e6.# & hf Netware Hot Fix 2Q# $Q L"( 7 ( 5_[ * '( 0((" 7." g() ^ +,C# 0Gd '+ $#.+ "# 0!." q $.KQa (.+Q,Q 4Q69 Q"( ( fd! ( HC &* 06 $ 5_[ B+ jt & K.".(K# $# B) ( hf." & * '+ $T, Bad Block B, $ w1 7

"+E #.!D F %E & Netware.+Q,Q '(-Q! Q! $<1= & 640 KB & %, ( d $ DOS! S6 Disk Hashing, Disk Caching, Elevator Q6K "Q# Q.Q".+Q,Q '(-Q! $Q<1= QK * (Buffering) 5_[ 0R +%L# 56K $6!.".Ka (. +, 1 Seeking.+( 28# $<1= K $ $CA B 0Pa* H, Disk Hashing Q" $QCL,.+Q,Q +%L# RAM ( "( * %6"1 7 $ \ 5_[ File Server * '+Q +QF Ram ( 0Q! $ "1." 7 +!1File Server $ "1 " 01"( ag.(4 28# 0! $ ( h"*! Disk Caching (Q & K QR 0_[ Netware +!- File Server $ 6"1 01"( ag " '4.Q" $Q \Q QL"( 0Q_[ 'Q4 +Q,Q G, Ram $ _ 0! "1." $ \ $ "( $Q Q8#) &.(4 5; Ram & "( ( 8 ( h"*! ^ ( ag "( ( & 0K R QK.Q" ^ 0Q! $Q#}*C += ( Ram( * $#} 6 += ( "( ( ( 5_[ $!( B& Q.Q# 5Q6K 2Q8#.Q" '*_. +( V"1 +; & V File Server"L9 0!.0! "bf BC L"( $ ( h"*!.= ( ^ " "( ( * Elevator Seeking Q'+Q#*F B( +F H= ( #L" +, " +, ~1 Elevator Seeking 2%- % e( hqf +Q,.0!... * -G} ^ +K7 ^ 7d Y $ (1."! * 0! 0 ` " ( (9 (1 HQA#( $Q ^ ((QL QA-` c*q= Q%# ( +QK7 '+Q#*F HA#( $ $C#) & AR 7d '+#*F B( +F &.01 +T +K7 '+#*F! $ h!.0i4 +T ^ (( R 7d $ "(# $ -G} '+#*F h"*q! (Q (.K N, ^ +, Netware! 07 $ File Server " 0Q# ( h"*q! 0Q1"( Q $CA B File Server $4.+( 28# "( ( & ( +, "( ( + 6P1 7 C"(# ( 67 $ \ $ "ag $ ( h"*! ^ +( R.(4 28# 0# & nt

DOS G(.+ $CA \A R $ (R ^67 56K 28# "#, ( +" ^$CA 'L " " ( 07 +#K# ^y" %K! * (+#! 1 2# $ &# 06 $ 'L " H=. ( $# " +" ( 9 'L " ( $ $CA 1 2# & K R $8# (.+, ' "*! $CA * 67 56K N` 0!.CK 'L " B * + y" %K! & C" 07 "9.+ (Resident) 4+# $<1= ( +" $#." ^+( 28#!.( $ 26 '+,, '(-! ^L"( 1 2# & c_t ^ Netware! i6 %K! & $K8 & '(-! BC!.".+,K# ^'L " ( ;T.+, 1 $CA " ( ^ DOS & B) 'L " $ $CA (.+, '(-! shell 2, $K8 & Netware! $-E* ^(( 2# IPX.COM $ $#.`* ^0! '+ CI "9 $# *( & shell ^+,, '(-! 2*( 0K R.(( '+% $ ^'L " L"( ( T ( * ^ File server %F B(!1 K $#." ^+, (*!( $ R*.0! NET4.COM " * NET3.COM $ \ '+ (*!( 4.0! $CA $ $[ " 67 56K $ \!(." $ (4.+ +T 9 $CA Z"[ & 5," S ( ^( G, DOS $ N, ^+ 67 56K.+ +T,) $CA 'L " ( shell '7# 5k9 1 ( H6 $(>+? % 'L "! e( R - & C" Z"[ & $CA ( (9 5#C $CA!.+, 1 'L "! (Drive +,#) $CA "!! 0".0 # 1 $CA Drive * & 9 06R %, ^ $CA 1 2# " " ( $ B).+( +=* la " * BC +, $ $ 0!." ^67 ;T + <# ( $# ( 0! 2&O ^+,, I 5_[ * +,# +, ^$<7` " ( +, ~1 ^HX B, $.( 0" ^qt 5_[! " * +, B( 5_[ /Aa $ 2+R *( 4.+, "1 " * H= ( $<7` " ( -# *( 67 $CA.( "1.1 0!( & " * 5_[ A.1 0!( & r +#." ^+,, *( $ %*.".+( $k #C * %* 0`=." &* & 469 ^ $CA! ".+# G!! $!( ei '+#*F ( (9 5_[ $!!( ( L,K (8" (lock) -R J* $CA 5#C "! $ ei g!( ( L,K (8" Semaphore J* - ( Lock ) D= I(

5"7 $ ei!!( ( L,K (8" $CA! /! $ 0! * ^ -R J* ( " " * "1 " $ + $ $# J*." (.(* $ ( " " * "1 " ( ( " "1 4.+, -R $[ ( " "1 $ +T! & + $(!!( (.( 2_ $# $! c[ &." + '+ -R L"( $# /! $#." 0!T( 0`T( B) ( L"( $# $C," & B,K[ $#." * '+ 28# b4 -R 5;." S! & L"( 0!T( H! $# B"F (.(( +T $( (T $ ^ ( +#.(( -R $ +T +# $# ".+( R $# T ( -R & -6 l# 0!.CK $CA! ".+, '(-! -R l# & vp " * K & :! $%&! # K4 L ( D=!@J " # (Logical) Gd, * (Physical) C"1 -R (NO Wait) A; B*+ * (Wait) A; -R (Exclusive) 7# * (Shareable) e R -R." (.+, ag 7# A; B*+ C"1 -R! & $# " 0!.CK HX B, $.( '(( 7a +, $!(." & " ( ( 0K R '5& >+ $ D= 0" G (K Z"[ & %, L,K B) ( * $( AT $A,9 /G1 $ 0! 6-R Gd, -R $# ( $9 -, j9 -R ag( $# 4 = -R l#." & '(-! 5; (.( h"# $# K!., (.+( ] B) * +, +F!!( <# ( 5_[ $ 0 # +T (T 5_[ $!!( & ^ b4 -R B(A# Z1 5; ( $ +, <, [ $# (( $-E*.+, ( (.+, 469 _K ^ '+ -R 5_[ $ $#!( &! ^ C"1 -R J* (.(+# (9* $# T+ BC $# " /! -R 0" 2+ 5; ( = 5;." M L% M $3@D= $8#.+! $# l_[ $! c[ & P"! -R 0!T( $8# ^ A; B*+ -R J* (.0! '+ -R $# '(-! B, * '( g!( ( <# ( 5_[ $ 0!,P." $ 0AX (.0 # g!( ( B, * 0! '+ -R L"( $# /! 5_[ $ 0!,P." $ -, $8# 5_[ $ +( l_[ $ " * +, C (T 0!T( 0AX $8# H= +" $# J*.".0 # g!( ( <# (

c[ B&! + '+ -R L"( /! <# ( 5_[ 4 ^ A; -R J* ( (. +( l_[ $# $ 0AX $8# * +, -R $# 5_[ h! '(K# A; -R B+ J*." & '(-! ^ 0! HAR R * pi ^ 5_[ & $# '(-! B& X+= $ "! $ _[ B( -R <# ( %+ $# " 0!.CK 5;." S (.+,K# (8" `C.+#K R ^ 0! '+ -R L"( $# /! 1 2#." (.+,( R T ( J* *(." & A ( 1 2# & T -R $ ( '(( h"# $# $ BC.". 0! A; B*+ l# & ( 0`= ( b4 -R J*.+, ag <, R <# B& ^ A; $(N: 9 = $ D= 5_[ B+#T %, ( " "1 " $ $ +,( '&9 $# (+P $ ^ e R -R & C" $ X+= $[ ( " "1 ( 5_[.# BC 0`=." (.+, $(!!(.0( +,#.# BC $G * ( '(( $# = 5_[." $!!( BC ( -R $# " /! 5_[ 4 7# -R J* (.( $14 L"( $# & B+#T ( Semaphore) I( +#4 R $# & I (+P T ( BK d $ #C $!!( ( L,K (8"! /! $ 0! ] DR* ( ( Semaphore).( '(-! & C" $!!( & " $ \ ( Semaphore) ( Semaphore) ( Semaphore) J* & ^.+ $( -; " 0AX "(G +# * ( H, * +%L# J&.0! J& " ( * +, H, $CA 5#C $.+,, '(-! BC B) & BK d +# $ 0! " $# (+P X+= $CA 5#C ( Semaphore) ". (4 R $# : T ( BK d +# $CA 5#C & C" 4 HX B,.( +T H, B) : J&!. +!1! ag +, '(-! $CA 5#C & +T $ $# J*." ( +QQG 4.(QQQ4 K BC." B(( T ( (QQQ ( ^ ( Semaphore) " * (QQQ4 QQR $# QQT ( <# (QQ BC ^ +QQQQQQ 0QQQAX (+ +G g! QQQ ( Semaphore) ( <# ( BQC ^ + -; ( Semaphore) +G $C; (.( ( Semaphore) & +QQQQ=* ^ (T 2K & hf $#.+, A; ( Semaphore) +G B+QQ 0AX +" $# * 0 # g!( $ +=* " B+ '(*1 rqq." ^ +, 2_ QQQ! $.( ( Semaphore) ( Semaphore) B(Q +QQG

O*P Deadlock & $K8 7# B( -R $ n= (T $( 0%9 $# *( 0!.CK ( & ( V B( -R <# ( * '( -R (T 5_[." & I " * ^+, $( 5_[ w1 $# & " M * + L"( T ( $# &# ( 5_[ & I 4.+, L"( * ( +,# $( $ (R $# & " M ^ +,C# 2+R L"( $# $ 5_[ b4* $ 0A # KP $# *( & V +# * '(A# $# *( p 0`=.".( ;= Deadlock 0`=.+" * Record1 2# $ '+#*F " & ( *( +" $( $# *( +, ~1 HX B, $ $# *( & " M ^ +,, -R Record2 2*( $# * Record1 H* $# 4. +,, -R Record2.+) +T (9* $ Deadlock 0`= * +,( $( (T $ +#K# &# ( 5_[K B( -R ( $# " 4 ^ $ 0!." 0`=." & 469 J* " 5_[ B(K# -R $ 2+R (+8 h! * +, (&) 0! '( -R $ _[ K ^ (A# Z1 (T.+"K# <# ( $K8 + $# " ^ $ 0!." (( R $# T ( Netware! ( $ L"( J* (.+, (; $K8 K B+ -R ag B"F ( * '( b4 0_ &# ( 5_[.(K# $b4 -R M 0G1 2+ 5; ( * +# '+ -R 5_[ K 0G1 5; Transaction Tracking ^ %6"1. \A 06 $. + '+ CI i6 "1 & 0!.CK _[ #! " $K BK B(*)( &* +,"1.( L"( %6"1 5"7 ( ] r +# "1 " ( ].+,# Transaction " %6"1 * '+) ( &* $ 5_[ & K R ^ ( HC ( Transaction " 28#.= $# " $ L, * '(A# B,K[ R! 9*T 5_[ Y." $.+# '+# R $`* 0`= $ &, L"( 0K R.+, J& +R1 ( &* $ i6 %6"1 ( 5_[ K " ^ +, '(-! Transaction Tracking & $ K! (.+#(4 $`* 0`= $ %6"1 $6 ^ HC B+) (9* $ 5; ( "* +,").( '+# Automatic Rollback N=_d; $`* 0`= $ %6"1 0I4& +,"1

(Q) *& B) $! BO <# & *( +,# (1 * 0! '( 4 _[! " $CA H, b` ^+ '+ 'T $CA ( K% 5_[ 0!.CK L"( c[ & ^+, $(!!(.0! = ^ B L#L * 0=_; +"+ :( G!! $T *( $ $CA ( B (C6K * 5#C H, +, $CA ( $ i` ( '(( * $ " $ '&9 j.+ +T! +P 1 ( 2*( $T * 0T(F T H* $T 5k9! $ 1." ( L( %# & C" 2# 4.+!F * & «2#» " ^$CA $ (** 2L, Netware +T 1." $( (.+ +T '(( $CA ( '&9 * $ ^+ $CA "+ /! '+ i"p ^0! '( " ^ (** 2L, $ # $ NKG ^(( $CA ( " $ T * 5#C $ +"(.(( L <# ( * $CA "+ /! $ 0! # <, ^ 0! '+ ' «2#» $ $ 9 hf." &.0! '+ $14 NOKP 61 2# " * 2# ^+ PR* 2# Y!, *+GK` = +" $CA ( 2# T $ $CA ( " $ (( 0"." * PR* 2# 2# \A.+, A!, %#.0! +- B. \A R (." * ( $T, B L"( * $CA "+ /! '+ $CA (* qt " 9 $ ^L"( B " 0=_; B*+ (1 0!.CK Y." $ + Netware (." & 469.+,, '(-! ^0! '+ <, * $ "&8 & *."&(F +."! $ 1." $( (.0! '+ $14 <# ( +"+ (!. HK B & (+P ( ( ;T &8 * 56K 0! 2&O $CA " ( ( & ( ^B +, $!( BC Netware,!.( +T +- B +, $!( (." (.(

R $!( " ( $ (1 * (4 5; 0R( $ +" +, $!(.".+, 1 «'*4» 5; $ ^+, $( e $9* L"+C" ^+,( 28# $ 6K " * &# ( 5_[ ( +" +#4.+ $( L"( '*4 " I xv 0!.CK '*4 " (8" + ( ^( $CA B $K $ '*4.".0! Everyone '*4 ^% '*4 "! $ ^ $ 0!." '*4." 0;T ".( (8" 5; $! $CA "+ /! '*4." '4.+ +T '*4." & v 5; $ ( i"p.014 +,T R '*4." ( +"+9 B %, ^( (8" '*( * ( ef v 2# * '*4 2# & +# %, * (4 5; $CA "+ /! B +,'*4.+, ;= l_[ %#)!( (! *&.+#+ 2#." $ \ (password) A + * «2#» " +" $CA $ (** 2L,.( $CA (* * $ \ A + * 2# B( (* " * Login!( & '(-! ( $ #.+ +T 469 $CA $ * (** & ^+, " /6S (T A + " * 2# ^ '4 * ^(** 2L, A + b` ^+# D6d ( A + & ^(** 2L, 0!.CK +,,.( (* c*= * c*= B 2# * A +.(K# E $7-; * "& 2F $ $A F ^+#+# f7; A + * ( $CA (* 2# +, P! 4.+ +T '+"( V"K# $7-; Access to server denied You are attached to server SINASOFT. * ( '+!F A + * & ^+A# '+ $T, $CA * 2# * + $( (** ( P! 4.( +T 01"( O 2F $I F h! $CA ( '7# 2*` 5; ( ^j =." $6!* $ $ 0! = ( $CA ( ") $CA "+ $6! * '( & w1 j = 0! 2&O $CA $ " (**.( "&.+ '+I# $ (L"( ( % *& 07; &! $6!*." $ * 0! $CA ( 0 '+,+#I# DR* ( ^ " A + "+ T ( A + 0, -= + Netware! (.( D6d 0" : ( (." +.".(( R $CA *( (.(L %#) & Z=." ^ " * ++ A + s"p '&9 B $ +# $CA "+ -.+, ~ B A + +# $CA "+ 5;

6 0`= (.+, A +.( $ A8 B +# A + 0, V"1 $CA "+.+ $+# A + +# ".( $ 26 B Y." $.+, pi A + &8 H[ R+= +# $CA "+.( +,T ^ H[." & I " * * H[ A + '(-! 5; (.+, 26 A + ` s"p $ B +# $CA "+ ^ 2*` 5; (.+,.P A + s"p *(. B& +# $CA "+ ^BC." & ^( $CA (* 6AR A +."+, +# ^A + " A B& vg# & hf «A (**» N=_d; '+ vg, A + (**.+,.P (+P." +# $CA "+.+,# (Grace login) B 2*` 5; (.+ 6AR A + +# +"+9 A + ( 0`= (.+, (* +"+9 A + $ ( A8 "+ * (. Netware,! $6!* $ NK ^'(-! 5; ( ^w1 5#C $6 1." 6K (.(( '+% $ %#) & '(-! 2+ " '(-! $ D9 4 K %, $CA.+ +T,) 5#C." & '(-! L#L - - - - - - # *!%:.( $CA (* $- & &* (* &* $#A &! ( +# " ( 0`=(.".+, (*+7 &* $#A & ;T 5! ( $CA & '(-! $ +# $CA "+ &8 5! B HX B, $.0! <, R $- &* ( 0! # 0R( &8 5!.(K# i"p "& 5; $ @/ {/ 0! & $A,% $A, &* / {/ 0! & $A,y,F &* i"p &8 0! B, $, 0! '+ Y# B) ( $CA ( $ B&! 5! NOKP.++T 469 $CA $ (** & 5! & nt 5R* (.( $9 "& 2F $ $A F +$( $AC $ (** ( P! $,K 5! ( 4.+ +T Attempting to login during an unauthorized time period. The supervisor has limits the time that you can login to this server. Access to server denied. You are attached to server SINASOFT. F,+ $CA ( H= (, &8 B& vg# DR ( * '+ $CA (* N_AR 4.(+T 01"( "& 2F $ $A

>> SINASOFT CONNECTION TIME EXPIRED, PLEASE LOG OUT..( +T 01"( 2F." $ $A F, (I# nt $CA & 4 >> SINASOFT CONNECTION TERMINATING IN 1 MINUTE. $CA * \A $CA!, (I# nt $CA &, $GR( " 0b4 & hf 4 H= ( $# 0!.CK, ( $ $ \ %6"1 $6 H=." (.( +T DdR (* $+; 5_[ $ Y." $ * +'+!# \A DdR A!, 7 $ 'L " (.+,, $9 w1 2F $ +" B b`.(.+ +T,), $CA ( &8 5!.P L#L 1." 6K (.2 *!%: '&9 * 5#C.( (* $CA 'L " & " & +# " ( 0`= ( B) & $ L " [A * (( * A+ * 2# $ L $CA ( 56K 28#.(+#, 0!'+ $CA (*, $CA $ (** qt $ +, " " & '(-! $ B +# $CA "+, 2F." $ $A F, ( $CA (* &8 S & +, P! 4.+, (*+7 : (+T 01"( Attempting to login from an unapproved station. The supervisor has limited the stations that you are allowed to login on. Access to server denied. You are attached server SINASOFT..0! B(T 0K R ( $ ^ 0K R " B B( (*+7 ^." ( " (9 5_[ B+ & 469 [T $ 'L " & vp "( F_1 # ( vp ( ( ( (9 5_[ 0, -= (." (.( $T+# & %#) "( ( (.( '(( 'L " B $ %, 'L!(." '&9 "( L>J AN *!%: $K Z"[ & * '+ $CA (* 'L "."+, & 2# " +# " ( 0`= ( $CA $ H <# & B +# $CA "+.+ $CA $ BK 5; $ 'L " H 0"(*+7 & '(-! 5; (.+, (*+7 ^ i6 'L " & BK 5; $ $ B& 5; $ %#) & +# " $ " 'L " (+P +# $CA "+ ^ B&.+,.P ^ + $CA

$ (** ( P! * + $CA $ ^ &8 (+P $ " 'L " & ^ $C; ( : + +T $9 2F." $ $A F ^ + $( L"( 'L " & $CA Attempting to simultaneously login on too many work station. The supervisor limited the number of active connections you may have. Access to server denied. You Are Attached To Server SINASOFT. INTRUDER DETECTION / LOCKOUT pi ^ +#( $CA $ (** ( P! $ 0=_; B*+ (1 +# + " $CA "+ 4 ^ +, (* 'A A + +# " $ ` 5P1( (+P +".".+( qt 2# " $CA $ (** ( P! ^ '+.P 5P1( (+P & V p '4.+, (*+7 j 7 A + B(& g+= H= ( =_; B*+ (1 p." ^ (I# Z1 * + $( (1 pi & hf $ +, <, [! +# $CA "+ 2*` 5; (.+ +T 0`=." (.( $ ( ( '+ $CA $ (** ( P! * 2# $ $ ) j = 0=_; B*+ : ( E $7-; * 2F." $A F Intruder detection lockout has disabled this account. Access to server denied. You Are Attached To Server SINASOFT. $.(&+# B"9 $ B) +# $CA "+ %, * ( (*+ $[ j = H=." ( +T 469 f7; A + B(( = 2#." (** & I 5+ Y.".0! <, R $CA "+ $6!* $ B& 5+.".+ B"9 $ (+8 * j = $CA "+ * +, $P9 $CA "+ $ +" $CA ( $(.(&+# +G." 4.+,.P Z1 S (**.14 '+"(# 2&O B& 5+ +# $CA "+.( $14 '+"(# 6AR Z1 S (** $6 ^ (bl Z1 S (**."T) & B&

(R) *&! +, $CA ( $ $C," ( ( Netware, + $b4 1 ( +" i6 28# ( * "#* 5#C + $CA (* $C," & hf."(! i6 56K 28# B "# H, %* 1." (.( H,.+# & % fd! $! ( %6"1 * 56K 28# B &8 H, Netware! ( : (4 5;.+,, K += ( ^ &8." Q ( Trustee Assignment) &8 " ( * $.+ 56K vp 28# &8 ( I +, " "( 0!.CK " 0"v &8.+,# I B) & v " ^ + '+ $14 <# ( "&8 I.+ 5*- L"( 0"v &8 +# ^ K I fd! ( &8." Q ( Maximum Rights Mask) I ( AP &8 5G6P & I ( AP &8.+,,.P I " ( &8 A * +,,.(.P B $6 ^ K " 28# 2&O "# &8." Z"[ & * '( I I ( 28# $ (R M ^ (I# 28# &8 ^ I ( AP &8 '4.( +# $[ * +, K "1 fd! (, + & 0K R." Q ( file attributes) "1 $I.+,.P qt "1 " * 56K 28# '&9

( Trustee Assignment) $#S $ & +,#^ +, H, fd! ( 56K 28# '&9 $ ^ &8.".+, 5*- L"(." & v "." ^ + '+ '(( p " $ I " ( "&8 '4 0!.CK.( 'A 2%- +"A# v " 2%- +, $9.+,# I I." v * 5;." ( ^ + $+# qt I " ( &8 M + $CA.0 # %"(*+Q7 * A + +,# &8." $ 0!." 0"v &QQ8 ( ( % $C# qt QI " ( 56K T 28# * '&9 * +, Q 5G6P & $CA $ (** : +,,.P : & +,A &8." %6"1 B( & &8 0! '+ & $ 6"1 & B+#T &8 0! '+ & $ 6"1 (.# &8 "1 " ( (8" 2L, B( & * ) (8" &8 ( %6"1 0 `.14 ) I " 8 9 &8 `T I " " "1 " B( ef &8 I "& 2# ] " %6"1 $I B(( ] &8 0"v &8 +# ^ + 0`- &8 ( $ ^ I 0`- &8.+, ~ I &8 " * +( ] I( B "! (Open) (Read) (Write) (Create) (Search) (Delete) (Modify) (Parental) O R W C S D M P &8." %A & C".+ &8." & A " " +# QQI " ( " &8 &8 M) ( I " ( $.( BI# [ ] 5 Y.".0! ( &8 M ).0! 5*- (+# &8 I." ( $ + ( * 0! [ROSWC]&8 ( I " ( user1 2# $ $ +, ~1 ^ HX B, $.(+# I." ( &8 user3 2# $ L"( * 0! [ ] &8 ( I.K ( user2 ( $4.0 # I." v user3 +, I." v user2 * user1 B 0`=." ( $CA ( *(." 0PR +#+# M 28# &8 I." ( user3 * user2 K.(! +P 0K R ( $ (( " 5*-

+, (8" +"+9 "1 " I." ( +# ^ + C &8 ( I " ( 4 (+8 B( & "1. & hf.,tk.(( n= W &8 $ "1." ( 5_[& B( (*.0! 2&O R * O &8 B) 7 B+"( * *T $#S 7+ L; '(( [ROSWC] 0"v &8 DIR_1 I ( $ +, ~1.+, $9 "& C $ i"p L"( 5; $ &8 $ "9 ^ I." I"& $6 ( ^ H=." (.0! '+.( +T &8." ( + '+I# SDIR_1A [ROSWC ] SDIR_1B [ROSWC ] DIR_1 SDIR_1 [ROSWC ].( '(( &8 <# ( I "& ( %, $ +" 0"v &8 B(( 2L, Y." $ i"p (+8 &8 I B) ( +" I " ( 6AR I &8.1" B"9 & 469 $+# 28# '&9 SDIR_1A I "& ( AR HX ( 4 HX B, $.+#." &8 5;." (.( R &8 M I ( * 0a &8 +" +.( +T [ ] B) I "& * SDIR_1A I ( I." ( &8 $ 0! [ ] &8 ( I " ( $ B 5*- w1 HX ( * &8, +A# I "& " v 4.( pi, (0 # I." v) (+# 0"v &8 %,, 0! I " v $, 01" +T B"9 I "&." $ 6AR I.0( +T I." ( (T

& $ +, ~1.+$( L"( " 0"v &8 $6 +( '&9 " $, &8 ( User-2 * J [ROSWC ] &8 ( User-1 2# $ DIR-1 I ( +T * $ User-1 &8 $6, ( '(( User-1, User-2 $ 4.+ [ROS] 6; &8 ( ( %,, +, $9.+ +T [ROSWC ] &8 ( * +! User-1 &8, ( '(( User-2, User-3 $ O HX ( 4 N_X +, K.+! +T * $ 0! User-2 (T $ \ $ [ROS] &8 %, $C6 +! +# * $.0! USER-2, ( USER-2 4,P", 0! $1[ ", :+, $9 "& HX $.0! [ROSWC] &8 ( I " ( Ali.0! [ROS MP] &8 ( Babak * [ROSWC MP] &8 ( BABAK, ( '(( ALI, BABAK $ 4.+! +# ALI $ P * M &8.+#+T R [ROSWC] BK ALI &8 * ++T. $#S " ( "&8 +# " +,# '*4 " (.0! '*4 B) +,# '*4 ( 0"v '(( '*4 " $ $ "&8.+, " &8 +,# N, &8.". + $( I '*4 B), ( '*4 " v '4.( G, '*4 B) xv $6 $, (.+ +T '*4 B) v, (, '*4 " $ * 0(+T, (MAXIMUM RIGHTS MASK), (! $(S "+.+,,.P I " ( B 5T A, +,, K I fd! ( $, &8.".(( 5T I $6 ( * '(,X." & $CA : & +,A 0"v &8 +,# &8." %6"1 B( & &8 (Open) 0! '+ & $ 6"1 & B+#T &8 (Read) 0! '+ & $ 6"1 (.# &8 (Write) "1 " ( (8" 2L, B( & * ) (8" &8 (Create) ( %6"1 0 `.14 ) I " 8 9 &8 (Search) `T I " " "1 " B( ef &8 (Delete) I "& 2# ] " %6"1 $I B(( ] &8 (Modify) 0"v &8 +# ^ + 0`- &8 ( $ ^ I 0`- &8 (Parental O R W C S D M P

.+, ~ I &8 " * +( ] I( B "! ), I ( AP &8 * +, AP I B) (, 0"v &8 K I " (8" 2L,.+$( I." ( wg=." K +# " Y." $.( w1 &8 K &8 B & &8 +, " " +" (B K ) I." ( AP &8 B( (*+7.( cb=, I ( AP ( AP &8 $ 8#) &.( cb= I " ( AP &8 & D &8 +, ~1 HX B, $ &8 ( $ # = hf." &, +,,.P I " ( B $6 &8 A I (+# (9* I." ( AP &8 ( D &8 "&.+,, ef 6"1 +,#K# + # D 0"v.0! A +R1 I." ( B D &8 * $, 0"v &8 c_t * +, I " 5G6P x9 I 2# +,#, I ( AP &8.+,,K# +F B"9 I " I"& $[ K 28# $ (R M, I ( AP &8 & &8 " cb= & hf $ 8#) & '((R (&8 $6) [ROSSWCDMP] I ( AP &8 qt ( 9 $, (+#.+# (File Attribute) + 567 Netware #L"! ( "1.+,, K "1 +=(, Netware, + & 0K R." :& +,A 5O=.".0! $I " ( (Normal) N 567 ~1 VF 5, "1 " (8" 2L, Netware! $ 0! $I, $I." 5_[.+, # +,. e R ^ +#( $I." $ "%6"1 (4 <# ( B).0!.# * B+#T R 6"1., B*( (Read Only) RO 567 #) +#K# M * +,# "1."+,# %, B, + $I." ( 6"1 4.(+# &8 $ L.".+ ", B) ( " * +( ] #) 2#, +, ef (Read Write) RW 567 ^ ( $# +, 1 &8 ( $ # $6!* $ +#, + $I." ( $ 6"1.( ef " * ( '(( 2# ( Shareable ) S 567

$I.".( $b4 e $ +, $6!* $ +# + $I." ( $ 6"1.(* $ RO $I ( Modified ) M 567 & hf.+# nt Modified $I & %6"1 $6 ( $% BAIF $CA %6"1 & $.( +T +F Modified $I "1." +, +F ] 5; $ 6"1 7 '4 B&." Execute Only NU,., ( $ 6"1.( $ COM * EXE $`A#( "%6"1 B %, $I." B( e F ^ "1 T( (.# & $I." & '(-! 5; (.0!9 R %, + $I.+ +T 469 "1 B( * "1 2# s"p ^ "1 System NU, 2#.+, '(-! System $I " "1 & (T 6T( 28# Netware!! +# 6"1., B+"( $+;.(K# E I " %6"1 0 ` ( "%6"1.,.+, HC ( ( Indexed ) I NU,." & ^ +, 0" L & V K8= ( $ "%6"1 i6 %K R $!( ( D" %6"1 i6 %`*+9 ( "1 " i6 5PdR g() ^ $CA!.( '(-! $I $!( 5;." ( * ( ("& +# "1 " i6 5PdR (+P.+, +%L# ^ %!() &! Y & '(-!.( c; B) g().1" ("& B& "1." & $PdR ".(( V"1 %9 R 5; $ "1 " i6 5PdR $!( 0! +# ( Hiden) H NU,.+ +# E I " %6"1 0 ` ( ( 5 ^ + $I." ( $ 6"1 2#." (] ( & (.+,, '(-! $I." "%6"1 & (T 1 2# &.+ +T $[ 1 2# ( HC &* r $I." B"9 ( B 0! 2&O ^ +, '(-!! 0, %6"1 $I & +"( <# ( 4.+( R

( Effective Rights) V $#S DR* (.+, " 28# * '&9 '+,,.P K ( ^ I "( " } &8 Z"[ & $ "&8^ * (1 0"v &8 lk8 & +,A I " ( " &8 0!.CK $ "&8.0! '+! * $ '*4 Z"[ & $ "&8 * 0! '+! * $ 0,.(*1 lk8." $ +" # + '( +F B"9 I." $ 6AR I Z"[ & L"( 5A $.I ( AP &8 Gd, ja & +,A I " ( " } &8 /! BA $ * 0"v &8 & $!( B) & +,A I " ( " } &8.+ '+ +" I ( AP &8 *P Bindary.".0! ] R $CA "+ /! $ $CA 0, $ \ 5_[ & 0! 5A Bindary "1 *(.".+# +%L# NET$BVAL.SYS * NET$BIND.SYS "1 *( ( 5_[ * I ^ I ( B 0"v &8 ^ '*4 ^ B#) A + * B ( ( _[ *= +# HC ( 6`( $ '+#*F." $ ( (.0!... * i; ^ I ( AP &8.+ +T '+I $CA ( "& 5_CI.(( ] " ( cb= BK# " 2#.(( ] BK# " A +.(( ] BK# " &8.(( ] BK# I ( AP &8.( '(( V"K# File Server * Bindary ( dt 2F ( $-R* & %6"1." & BAIF $% +" $CA "+ Bindary ( (9 5_[ B( g = `( $.+, 469 $CA + $#.".( '(-! BINDFIX CK $# & B Bindary ( HC &* 5; ( 28# B) * &!& 56K h! * '( nt B g!( & Bindary $ \ %6"1.+#4 R B g!( ( (+8 %6"1." &! & K B"F & hf. +( Y $CA "+ & ( & T ( * '(( J4 K = BINDFIX &! & 56K.= ( 0!( & HK= ^ ( HC ( 6`( $ $[ 'L " Bindary &! &.= ( 4.+, i6c ^ &! & K l* & AR $CA " ( Bindary ("& 0K 06 $.(( (9* %6"1.1 * NET$BIND.SYS %6"1 ( * +, $% Bindary $ \ "1 *( & " BINDFIX.+, +%L# NET$BVAL.SYS.+, ef.old %6"1 $ +T & BINDFIX ^ &! & K B( Z1 5; (

$ \ %6"1 BINDREST!( 9 B ^ &! & K ( HC &* 5; (.+#(4& H* 5; $ Bindary.(+# R B g!( ( * ( 9 R $CA "+ $6!* $ BINFIX!(