Merezhі transmission of data and technology induce merezh. Data transfer. Attachments, systems, programs. Information technology Calls: information - alert - signal

Most of the inhabitants of today's places of the day pass on or take away whether they are given. It can be computer files, a TV picture, a radio broadcast - everything that represents a portion of basic information. Technological methods of data transmission are a great number. At the same time, in the rich segments of the informational solutions, the modernization of the main channels is going on at a very dynamic pace. In exchange for primary technologies, as it was supposed to be, people can be satisfied with the needs of people, come new, perfect ones. We recently went to Merezh through a stylish phone, looking at me like an exotic, but today it is like an option to know more people. The current speed of transferring files via the Internet, with hundreds of megabits per second, seemed like a fantastic first coristuvach of the All-World's Merazh. For the help of what types of infrastructures can data be transferred? How can you be deluded by choosing one of the other channels?

Main mechanisms of data transmission

The concept of the transfer of data may be related to various technological phenomena. In a wild mood, it is connected with the industry of computer communications. Data transfer in this aspect - tse exchange of files (editing, editing), folders and other implementations of machine code.

A familiar term can also refer to the non-digital sphere of communications. For example, broadcasting a TV signal, radio, telephone line robots - as if it were not about today's high-tech tools - you can apply for the help of analog principles. In this way, the transmission of data is the broadcast of electromagnetic signals for the help of that other channel.

Intermediate station between two technological implementations of data transmission - digital and analog - can take mobile calls. On the right, in that the devices with the technologies of voice communications are considered to be of the first type - for example, GSM-call, 3G or 4G-internet, and others are characterized by less computerization, and that can be considered analog - for example, voice calls in the AMPS standards or N.T.T.

However, the current trend in the development of communication technologies is such that data transmission channels, of which type information was transmitted for their assistance, are actively "digitized". In the great Russian places, you can easily know telephone lines that function according to analog standards. Technologies similar to AMPS gradually lose relevance and are replaced by more thorough ones. Digital TV and radio. In this rank, we have the right to consider modern technologies for the transfer of data as the leading rank in the digital context. Wanting the historical aspect of the task of quiet chi іnshih decisions, insanely, it would be better to follow up.

Modern data transmission systems can be classified into 3 main groups: implemented in computer networks, which are used in mobile networks, as a basis for organizing TV and radio broadcasts. Let's look at the specifics of the report.

Data transfer technologies in computer networks

The main subject of transferring data in computer systems, as we have designated more, is the collection of files, folders and other products of the implementation of machine code (for example, arrays, stacks, etc.). Modern digital communications can function on the basis of the various standards themselves. Among the most widely used - TCP-IP. The main yoga principle is to attach a unique IP address to the computer, which can serve as the main reference when transferring data.

The exchange of files in modern digital networks can be carried out with the help of dart technologies, or it is quiet, in which no radiation is transmitted to the cable. The classification of different infrastructures of the first type can vary depending on the specific variety of droti. In modern computer networks, most often vikoristovuyutsya:

Tough bet;

Fiber optic wires;

coaxial cables;

USB cables;

Phone darts.

Leather from the designated types of cables may be both superior and incomplete. For example, a twisted pair is a cheap, universal and easy-to-install type of wire, which is clearly supplied to the fiber in terms of throughput building (the report of this parameter is easily seen three times better). USB cables are rarely attached to data transfer within computer networks, however, it is practically impossible to use a modern computer - it is rarely possible to use a PC that is not equipped with USB ports. Coaxial cables in a sufficient world of protection from crossovers and allow you to securely transfer data over a great distance.

Characteristics of computer data transmission media

It will be important to remember the key characteristics of computer networks, in which files are exchanged. The number of the most important parameters of the existing infrastructure is throughput of the building. This characteristic allows you to evaluate those, which can be the maximum indications of security and the obligation to transfer data in the measure. Vlasne, insulting the values ​​of the parameter is also seen up to the key ones. The speed of data transmission is an actual indicator that shows those files that can be sent from one computer to the next hour after the installation. This parameter is most often expressed in bits per second (in practice, as a rule, in kilo-, mega-, gigabita, in tight measures - in Terabitia).

Classification of channels for transmitting computer data

The exchange of data in case of a received computer infrastructure can be carried out for the help of three main types of channels: duplex, simplex, and also half-duplex. The channel of the first type is broadcasting, which can be used to transfer data to a PC at the same time. Simplex devices, in your own hands, only receive signals. Duplex attachments ensure the task of receiving and transferring files via a card.

The wireless transfer of data in computer networks is most often achieved through standards:

- "small radius" (Bluetooth, IR port);

- "middle radius" - Wi-Fi;

- "great radius" - 3G, 4G, WiMAX.

The speed, with which the files are transmitted, can be strongly irritated in the staleness due to the higher standard of communication, so it is the stability of the system and the protection of the other way. Wi-Fi is one of the best solutions for organizing home internal corporate computer networks. It is also necessary to transfer data to distant countries - 3G, 4G, WiMax, or other competitive technologies are being developed. Save the demand for Bluetooth, in a smaller world - infrachervoni port, the shards of their tasks practically do not affect the fine tuning of devices, for the help of which you need to exchange files.

The most popular standard for "small radius" may be in the mobile applications industry. So, the transfer of data to android with another similar OS, or the sum, is often done with the help of Bluetooth. However, mobile attachments as a whole can be successfully integrated with computer systems, for example, for the help of Wi-Fi.

The computer for the transfer of data functions for the additional provision of two resources - hardware security and necessary software security. It is also necessary for the organization of a full exchange of files between PCs. Programs for transferring data can be used for transferring data. You can mentally classify it according to such a criterion, as an area of ​​congestion.

Є is recognized for koristuvach software, adapted to the standard of web resources - browsers are considered to such decisions. Programs used as a tool for voice communication, supplemented by the possibility of organizing video chats - for example, Skype.

Є Software that can be classified as a system software. Vіdpovіdnі vіdnі vіdnі аn practіcіnіnі іnіyаnі koristuvаchіm, prote їх funcіonіvannіа mаy be nоbhіdno іn order to secure the exchange of files. As a rule, similar software works on equal background programs in the structure of the operating system. Data visual software allows you to connect PCs with a mesh infrastructure. On the basis of similar plug-ins, you can already use the tasks for the koristuvach іnstrumenti - browsers, programs for organizing video chats, etc.

Є ON, recognized for the diagnosis of z'ednan. So, if you need to add an additional connection between a PC that needs a pardon to transfer data, then you can charge for additional support programs for diagnostics. The knowledge of different types of software is one of the key criteria for demarcating digital and analog technologies. When using the data transfer infrastructure of the traditional type, the software solution may, as a rule, have an inconspicuously smaller functionality, lower when vibudovuvanni merez on the basis of digital concepts.

Data transfer technologies

Vivchimo now those, by some rank of tribute, can be transferred in other large-scale infrastructures - stylnikovy merezhs. Looking at the data of the technological segment, it will be important to add respect to the history of the development of advanced solutions. On the right, in what is the standard, for the help of such zdіysnyuєtsya transfer of dani in stіlnikovih merezh, develop more dynamically. Deyakі s looked at by us more solutions that are zadіyuyutsya in computer merezhy, zberіgayut urgency for a long ten years. It is especially obvious that it is easy to use the application of wired technologies - coaxial cable, twisted pair, fiber-optic darts have been introduced into the practice of computer communications for a long time, but the resource of their work is far away. In their own line, in the mobile industry, new concepts are not widely announced, which, with a different level of intensity, can be put into practice.

Since then, the evolution of stylistic linkage technologies begins with the introduction of the 80s of the most early standards - such as NMT. It can be seen that this ability was not separated by the security of a voice call. Transferring data via NMT-merezhі was also possible, but with a little bit of speed - close to 1.2 Kb / sec.

It is the beginning of a technological evolution in the market of stiletto tie-ups with the introduction of the GSM standard. The speed of data transmission during yogo transmission was higher than the higher, lower at the lower end of the NMT channel - about 9.6 Kb / sec. Over the years, the GSM standard has been supplemented with HSCSD technology, which allowed subscribers of a telephone call to transmit data with a speed of 57.6 Kbps.

Recently, the GPRS standard has appeared, for the help of which it has become possible to connect typical “computer” traffic, which is transmitted in the channels of the voice call, as well as voice. The speed of data transmission with GPRS received could reach approximately 171.2 Kb / s. We will come technological solutions, promoted by mobile operators, becoming the EDGE standard. Vіn having allowed to secure the transfer of data with the speed of 326 Kbit / sec.

The development of the Internet was craved by the technology of the style communication in the provision of solutions, which could become competitive with the standards - the first for everything for the speed of data transfer, as well as for the stability of the day. A significant advance was the introduction of the UMTS standard to the market. This technology made it possible to secure the exchange of data between subscribers of the telephone operator on a speed of up to 2 Mbit / sec.

Later, the HSDPA standard appeared, with which the transmission and reception of files could be supported on a speed of up to 14.4 Mbit / sec. A lot of experts in the digital industry are aware that since the moment HSDPA technology has been introduced, stylnikov operators have begun to put up direct competition with Internet providers, cable companies are starting to work.

In the late 2000s, the LTE standard and its competitive analogues appeared, for the help of which the subscribers of the steel operators took away the ability to exchange files with the speed of hundreds of megabits. It is possible to indicate that similar resources are available for current wire channels. Most Russian providers provide their subscribers with a data transmission channel for data transmission, which does not exceed 100 Mbit / s, in practice - most of the time, less than once.

Generation of style technologies

The NMT standard, as a rule, is introduced up to the 1G generation. GPRS and EDGE technologies are often classified as 2G, HSDPA as 3G, LTE as 4G. It should be noted that the cutaneous solution has competitive analogues. For example, WiMAX can be brought up to such a high level of LTE. The other competitive solution for LTE solutions in the 4G technology market is 1xEV-DO, IEEE 802.20. Dot dawn, for which the LTE standard is still not quite correctly classified as 4G, the chips on the maximum speed of the wines do not reach the ostentatious one, designated as a hundred and fifty conceptual 4G, which becomes 1 Gbit / sec. In such a rank, it is not excluded that a new standard will appear on the light market of a stylistic tie, it is possible, even more thorough, lower 4G and the building to ensure the transfer of data from the flooring to the enemy swidkistyu. So far, among the quietest solutions that are being developed most dynamically is LTE. Conducting Russian operators are actively modernizing their wireless infrastructure throughout the country - the security of data transmission over the 4G standard is becoming one of the key competitive advantages in the market of voice calls.

Broadcast technologies

Digital concepts of data transmission can also be applied in the media industry. For a long time, information technologies in the organization of broadcasting television and radio were not actively promoted - they were the main rank, due to the marginalized profitability of such improvements. Often there were problems that were solved in their own digital and analog technologies. Thus, in today's "computerized" world, the infrastructure for a television center could be. However, analogue programs were broadcast for subscribers of television networks.

In the world of expanding the Internet and cheapening the channels of computer transmission of data, the gravity television and radio industries have begun to actively “digitize” their infrastructure, integrate it with IT solutions. In different countries of the world, the standards of television movement in digital format have been approved. Of these, the most widely used are DVB, adaptations for the European market, ATSC, which is played in the USA, ISDB, which are used in Japan.

Digital solutions in the radio industry

Information technologies are also actively developed in the radio industry. It can be seen that similar solutions are characterized by singing advantages in comparison with analogous standards. So, in digital radio broadcasts, you can achieve a higher quality of sound, lower with FM channels. The digital transmission of data theoretically gives radio stations the ability to send to radio receivers of subscribers not only voice traffic, but also any other media content - pictures, videos, texts. Vіdpovіdnі іdnі іshenya can bіvdzhenі in іnfrastrukturаї organіzаtsії digital tv broadcasts.

Satellite data transmission channels

In the other category, you can see satellite channels, for the help of which you can transfer data. Formally, we may have the right to classify them as wireless, however, the scale of their transmission is such that it would not be entirely correct to combine these solutions into one class with Wi-Fi and Bluetooth. Satellite data transmission channels can be used - in practice, this is how it works - in case of vibudovuvanni, whether it is practical for any type of infrastructure, the call is quiet, which is more refurbished by us.

For the help of "plates" it is possible to organize the integration of PCs in a small area, connect them to the Internet, ensure the functioning of television and radio broadcasts, improve the technological effectiveness of mobile services. The main advantage of satellite channels is omnipotence. The transfer of data can be done when they are received, it is practical in any place on the planet - so it is like a reception - from any point of the earth's backwoods. And the satellite solutions also have technological shortcomings. For example, when transferring computer files for additional help, the “tablet” can be blamed for the jamming of the voice, or “ping” - an hourly interval between the moment of editing the file from one PC and removing it for another.

Taking a look at the technology transfer of information, it is impossible not to guess about the OSI model, the model that describes the structure of the ideal architecture fringes. Leather interface and transmission protocol, about which language is used in this graduation project, takes its own song in this model.

    1. axis model

In order for the different components of the merezhі to be able to communicate, they are guilty of practicing the same protocol for the exchange of information, so it is guilty of “speaking” in the same language. The protocol defines a set of rules for organizing the exchange of information on all levels of interdependence between objects. As a "line" for the designation of equals, the OSI (Open System Interconnect) model is developed, developed by the International Standardization Organization (ISO). The OSI model has equal interchanges for reviewing the process of exchanging information between outbuildings in the area. Skin from equal measure is clearly autonomous and looks out of the blue. The OSI model has been tested to determine the functions of the skin level. This model can be found in your own account in essence 2 different models:

    horizontal model based on protocols, which ensures the mechanism of interaction between programs and processes on different machines;

    vertical model on the basis of services, yakі bezpechuyutsya suіdnіmi іvnyami one to one on one machine.

Malyunok 1.1.1 OSI model

Physical layer (physical layer) - the bottom layer of the model, which defines the method of transferring data, presented in a two-dimensional view, from one attachment (computer) to another. The transmission of electrical or optical signals to the cable or to the radio is dependent on the methods of coding digital signals. The specifics of the physical level are determined by the voltage level, the synchronization of the voltage change, the speed of the transmission of physical information, the maximum distance of the transmission of information, and also to the transmission medium, the physical transmission and other similar characteristics.

The functions of the physical level are implemented on all outbuildings connected to the fence. On the side of the computer, the functions of the physical level are connected by a mesh adapter, which provides a mechanical interface for connecting the computer to the transmission medium or the last port. The physical ratio indicates the type of data transmission medium, such as fiber optic, twisted pair, coaxial cable, satellite data transmission channel, etc.

The standard types of network interfaces, which are considered to be physical, are: USB, RS-232, RS-485, RJ-45, Ethernet physical interfaces (10BASE-T, 100BASE-T and 1000BASE-TX). Main physical layer protocols: IEEE 802.15 (bluetooth), EIA RS-232, RS-485, DSL (digital subscriber line), ISDN (digital network with service integration), 802.11 Wi-Fi, GSM, RFID, 802.15.4.

Channel riven (data link) ensures the overhead transit of data through the physical channel. Take away the data from the physical level, presented in bits, pack the wines into frames, recheck them for integrity and, as necessary, correct the pardons (forming a repeated request for a poshkodzhennogo frame) and correct the merzhevy riven. Vkonuyuchi tse zavdannya, channel rіven vіrіshuє supply of physical addressing, topology ї merezhі, podomlennya about faults, ordered delivery of data blocks and control flow of information. Sound this line is divided into two drives: LLC (Logical Link Control) in the upper half, which performs rechecking for pardons and services of the line level, and MAC (Media Access Control) in the lower half, which charges for physical packet addressing and receiving physical equal. On this level, commutators, bridges and other outbuildings work, stinks are called outbuildings of another level.

Link layer protocols: Controller Area Network (CAN), IEEE 802.3 Ethernet, Fiber Distributed Data Interface (FDDI), Frame Relay, IEEE 802.11 wireless LAN, 802.15.4, Point-to-Point Protocol (PPP), Token ring, x. 25, ATM.

In programming, this line represents the driver of the tethering board, in operating systems it represents the software interface between the channel and the tethering line between themselves. The price is not new, but simply the implementation of the model for a specific OS. Apply such interfaces: ODI, NDIS, UDI.

Merezheviy riven (session layer) secures the connection and selection of the route between two terminal systems, connected to different "merezhі", which can be transferred to different geographic points. Merezhevy rіven vіdpovidaє for broadcasting logical addresses and names in physical, designating the shortest routes, switching and routing, troubleshooting and "congestion" in the merezhі. The protocols of the merging line route the data from the dzherel to the owner. Pratsyuyuchi on tshomu rіvnі pristroy (routers) are wisely called prіvnya third tier (after the number of іvnі in the OSI model).

Merging protocols: IP / IPv4 / IPv6 (Internet Protocol), IPX (Internetwork Packet Exchange, protocol of inter-merge exchange), X.25 (partially the implementation protocol on the level 2), IPsec (Internet Protocol Security). Routing protocols - RIP (Routing Information Protocol), OSPF (Open Shortest Path First).

Transport rіven (transport layer) - the most important rіvnіv, scho vіdpovіdat for the transportation of data, appointments for the safe transfer of data from the vіdpravnik to oberzhuvach. With this, the rіven nadіnostі can vary in wide ranges. Іsnuє anonymous class of protocols in the transport level, starting in the form of protocols, as to give only the main transport functions (for example, the functions of transferring data without confirmation to the recipient), and ending with protocols, as to guarantee delivery to the point of recognition of the number of packages in data in the following ensure the mechanism of data flow management and guarantee the reliability of data collection.

For example, UDP is interchanged with data integrity control within one datagram and does not include the possibility of consuming a packet as a whole, or duplicating packets, disrupting the order of taking data packets. Two fields are added to the header of the IP packet vin, one of them is the "port" field, which ensures multiplexing of information between different application processes, and another field - "checksum" - allows you to adjust the data integrity.

The butts of lace attachments that use UDP, NFS and SNMP.

TCP ensures that data is transmitted without interruption, which excludes data wastage or out of order or duplication, can resplit data, splitting large portions of data into fragments and repackaging gluing fragments into one packet.

The main transport layer protocols are: SPX (Sequenced Packet Exchange), TCP (Transmission Control Protocol), UDP (User Datagram Protocol).

The session session synchronizes the dialogue between the objects of the session and manages the closing / ending of the session, the exchange of information, the assignment of the right to transfer data and the support of the session in the period of inactivity of the appendices. Sessions are made up of a dialogue between two people, or more objects of submission. As an example of software tools that secure the session level robot, you can use the NetBIOS interface between Windows and Sockets - sockets between TCP / IP.

The presentation layer is valid for those information that is required from the application layer of one system, but is read for the application layer of another system. If necessary, representative rіven zdіisnyuє broadcast between anonymous formats in the presentation of information by way of the original format of the presentation of information. If transformation is necessary, not only actual data are given, but the structure of the data, which is drawn by the programs. The date of presentation is confirmed for the possibility of dialogue between addendums on different machines. Tsej rіven zabezpechuє reworking of data (coding, compression, etc.) of the applied riven in the flow of information for the transport riven. The protocols of the level of manifestation are called by the warehouse part of the functions of the three upper levels of the model.

Application layer (application layer) - the top layer of the OSI model, which ensures the interoperability of coristuvacha additives with the mesh:

    allows supplements to win the service:

    • remote access to files and databases,

      transfer of electronic mail;

    reprimand for the transfer of service information;

    give supplements information about pardons;

    form to drink before the date of notice.

Application layer protocols: HTTP, SMTP, SNMP, POP3, FTP, TELNET and others.

The development of the structure of this model allows you to create a more clear picture of the stitching of leather lace technology in a folding system for framing.

      Object identification systems

By itself, the idea of ​​automated recognition of objects is not new. As a minimum, five different types of identification:

    optical: systems based on barcodes, character recognition;

    magnetic: magnetic smuga, recognition of marks applied with magnetic noses;

    radio frequency identification (RFID) and data transmission: plastic smart cards with a built-in microcircuit, radio tags;

    biometric: recognizing the sounds of the fingers, scanning the little iris of the eye;

    acoustic: identification by sound parameters (voice).

        optical identification

Optical identification - the principle of visualization of the okremy components of the system of meanless media similar to the help of a point dzherel of optical vibrance of the visible range of dozhin hvil.

Optical identification is often vicorated on the rails. Video-analytical equipment for the security of automation control of the air curtain, adjacent territory (smogi) and other infrastructure facilities for additional technical assistance of video warning.

Setting the next task:

    registration, transmission and analytical processing of video information about the situation at the objects that are being protected;

    automatic formation of an operational alarm signal in case of an emergency (anxious) situation;

    uninterrupted control of the practicality of all components of the complex and automatic detection of unauthorized changes in the development.

Algorithms for analytical video processing, introduced into the setup, responsible for security:

    automatically detecting, supervising and classifying targets on the steps to the airfield and to other infrastructure facilities;

    classification of goals by types of behavior, including: appearance in a given zone;

    control of image brightness and automatic formation of alarm alerts in different significant degradation of brightness.

The Crimean optical identification is vicorated to control the transfer of objects in a dry warehouse for railroad transport (RHD) by way of automatic detection and identification of wagons, tanks and platforms according to their registration number.

The camera is installed on a stand, at a height of up to 6 meters and a straight railing of the railing. The objects of video analysis are people and transport workers who move in the field of view of the camera with a good rank. Setting up different profiles to the ONVIF (Open Network Video Interface Forum) standard. ONVIF is a Galuzian standard that defines protocols for interfacing such devices as IP cameras, video recorders and video management systems.

A small amount of optical identification and the potential for cluttered cameras, spreading on folding plots, by adding a change to image quality and, also, identification, to achieve a great variety of such systems (multiple cameras and image analyzers).

        radio frequency identification

RFID (Radio Frequency IDentification) - radio frequency identification, a method of automatic identification of objects, in which, for additional radio signals, data is read or recorded, which are collected in the so-called transponders, or RFID tags. Whether or not an RFID system includes the following warehouses:

    attach, scho zchituє (zchituvach, reader or interrogator);

    transponder (RFID tag).

Most RFID tags are made up of two parts. The first is an integrated circuit (IC) for collecting and processing information, modulating and demodulating a radio frequency (RF) signal and other functions. Another is an antenna for receiving and transmitting a signal.

Malyunok 1.2.2.1 RFID antenna

Basic methods for systematizing RFID tags and systems:

    For operating frequency

    • Labels for the LF band (125-134 kHz). Passive systems of this range may have low prices, and in conjunction with physical characteristics, they win for small marks when picking up creatures, people and fish. However, in connection with long-term sickness, it is necessary to investigate problems with readings at great times, as well as problems associated with the appearance of collisions during reading.

      Labels for the HF band (13.56 MHz). The advantages of these systems are that they are cheap, do not suffer from environmental and licensing problems, are well standardized, and have a wide range of solutions. Get involved in payment systems, logistics, identification and specialization. For a frequency of 13.56 MHz, the extensions are ISO 14443 (see A / B). However, there are problems with reading on a large scale, in the minds of high water, the presence of metal, as well as problems associated with the appearance of collisions when reading.

      Labels for the UHF band (UHF, 860-960 MHz). Marks of this range may have the greatest range of registration, in rich standards of this range there are anti-collision mechanisms. In UHF RFID-systems in pairs with LF and HF, the number of tags is lower, while the number of tags is higher. At this time, the frequency range of UHF is used for the free radio station in the Russian Federation in the so-called "European" band - 863-868 MHz and in the "American" band ____.

    For life's sake

    • passive

      active

      drink passively

    For the type of memory

    • RO (Read Only) - remove the identifier. Data are recorded only once when prepared

      WORM (Write Once Read Many)

      RW (Read and Write) - delete an identifier and a block of memory for a single recording of information. The data in them can be rewritten differently

    For reading distance

      Nearby identification (reading at a distance of up to 20 cm)

      Identification of the middle range (from 20 cm to 10 m)

      Long-range identification (from 5 m to 300 m)

    for vikonanna

Passive RFID tags don't inspire energy. Electric strum, induced in the antenna by an electromagnetic signal from the meter, ensuring sufficient voltage for the functioning of the silicon chip, located in the socket, and transmitting the signal to the source. In practice, the maximum reading distance of passive tags varies from 10 cm (4 inches) (applies to ISO 14443) to decimal meters (EPC and ISO 18000-6 standards), depending on frequency and antenna size. Passive tags (860-960 MHz) transmit a signal by modulation of the carrier frequency transmitted to the signal (reversal switch modulation). The antenna reads the signal of the carrier frequency and receives input from the signal modulation marks.

Active RFID tags are alive with the dampness of life and do not lie in the energy of the reading, after which the stench can be read at a distant distance (up to 300 meters), may be large and can be equipped with additional electronics. However, such marks are the most expensive, and the batteries have an hour of work. Active markers in more vipadkiv more superficial and secure the most accurate reading at the maximum width. Active markers, volodyuchy in the dampness of life, can also generate a higher output signal, lower passive ones, allowing them to stay in more aggressive mediums for the radio frequency signal: water, on the ground.

Passive RFID tags, which are also called active, are similar to passive tags, but are equipped with a battery, as they provide a chip for energy-saving. Given the range of these marks to lie down, only in the case of sensitivity, taking into account the zchituvacha and the stench, they can function at a greater distance and with better characteristics.

Zchituvachі іnformatsії - tse attach, yakі to read the information from the tags and write down data in them. These extensions can be permanently connected to the oblіkovіy system, or work autonomously. Ready to share on stationary and mobile.

Malyunok 1.2.2.2 RFID reader

International RFID standards, as a warehouse part of automatic identification technology, are distributed and accepted by the international organization ISO together with IEC.

It was accepted a long time ago before the EPCglobal initiative to streamline a large number of RFID protocols, but there was no universally accepted protocol for the exchange between readers and tags. This led to the absurdity of zchituvachіv and mitok of different vibrators. In 2004, ISO / IEC adopted the single international standard ISO 18000, which describes the exchange protocols (radio interface) for all RFID frequency bands from 135 kHz to 2.45 GHz. The UHF range (860-960) MHz complies with the ISO 18000-6A / B standard. / IEC as an addendum W up to the basic options A and B to the ISO 18000-6 standard, and at the moment the ISO / IEC 18000-6C standard is the most extended standard for RFID technology in the UHF band.

Shortfalls of radio frequency identification:

    the practice of the mark is used in case of frequent mechanical failure;

    schilnіst pereshkod at the sight of electromagnetic fields;

    lack of viability of viroblenih standards.

In this section, the main technologies for identifying objects were considered. Among them, special respect was given to radio frequency and optical identification, as it is possible to win for the initiation of the establishment of a stationary control point with a registrar of the parameters of the traffic of the train (RPDR).

      Technologies for wireless data transmission

In order to implement the process of exchange of information between PEOM and RPDP, it was necessary to use the technology of wireless data transmission with the least possible choice.

        bluetooth

BlueTooth technology (IEEE 802.15 standard) has become the first technology that allows organizing a wireless personal data transmission network (WPAN - Wireless Personal Network). It allows the transmission of data and voice over a radio channel on small distances (10-100 m) in the unlicensed frequency range of 2.4 GHz and the connection of a PC, mobile phones and other attachments with direct visibility. When set up, the main method was to expand the radio interface with a low level of energy saving and a low frequency, which would allow you to establish a call between stylist phones and wireless headsets.

Stack of protocols for wireless transmission of data BlueTooth:

Malyunok 1.3.1.1 Bluetooth protocol stack

BlueTooth technology supports both point-to-point and point-to-multipoint types. Two or more vicorists of the same channel will be added to establish a pikomerezh (piconet). One of the annexes is used as the main one (master), and the reshta is like a subordinate (slave). In one pіkomerezі there can be up to seven active auxiliary buildings, while the other ones can be located in the "parking" camp, being out of sync with the main annex. Vzaimodіyuchi pіkomerezі utavlyuyut "split the line" (scatternet). In skin pikomerezhі there are only one main adjuncts, prote pіdléglі pіkomerezі can be included in different pіkomerezі. In addition, the main extension of one of the dimensions can be applied in another.

In most cases, BlueTooth technology is used by retailers to replace the wired connection between two outbuildings on a cordless. To simplify the task of organizing the recording and transmission of data, the version of the firmware of the BlueTooth modules, which represents the completed software implementation of the entire stack of the BlueTooth protocol (Fig. 1), as well as the SPP (Serial Port Profile) and SDP (Service Discovery Profile) profiles . This decision gives the opportunity to the retailer to manage the module, or for a non-rotor serial connection and to override the transmission of data for the help of special symbolic commands. However, it puts a lot of pressure on the possibilities of BlueTooth technology. Basically, it is indicated by the change in the maximum throughput and the number of one-hour asynchronous calls supported by the BlueTooth module.

In the middle of 2004, the specification of BlueTooth version 1.2 was adopted to change the specification of BlueTooth version 1.1, as it was published in 2001. Up to the main vіdmіnnosti specіkії 1.2 від 1.1 vіdnosit:

    Implementation of the technology of adaptive frequency hopping to the channel for unique collisions (Adaptive Friquency hopping, AFH).

    A short time, which is spent on the installation of a connection between two BlueTooth modules.

Apparently, BlueTooth and Wi-Fi use the same non-licensed 2.4 GHz band. Also, in quiet situations, if BlueTooth-appliances are located in the zone of Wi-Fi attachments and exchange data among themselves, it can lead to collisions and get into the practice of attachments. AFH technology allows you to avoid the appearance of collisions: every hour to exchange information to combat interference BlueTooth technology to change the frequency to the channel, when choosing one, do not change the frequency channels, on which you can add Wi-Fi exchange.

Scheme for the development of BlueTooth technology, disaggregated by the SIG consortium

Malyunok 1.3.1.2 Steps to develop Bluetooth technology

At present, there are a large number of companies on the market that offer BlueTooth modules, as well as components for the independent implementation of the BlueTooth hardware part. Almost all manufacturers offer modules that support the specifications of BlueTooth versions 1.1 and 1.2 and conform to class 2 (range 10 m) and class 1 (range 100 m). However, regardless of those that version 1.1 is more than 1.2, everyone will look at it more thoroughly, implemented in version 1.2, can be removed, just as insulting additions to version 1.2.

In the fall of 2004, the BlueTooth version 2.0 specification was adopted, which supports the Enhanced Data Rate (EDR) technology. Specification 2.0 with the support of EDR allows you to exchange data on a mobile device up to 3 Mbit / s. The first batches of modules are being produced, the latest version 2.0 and supporting the technology of extended data transfer EDR, which were propagated by the manufacturers in the last 2005 year. The radius of such modules should be 10 m with line-of-sight visibility, which corresponds to class 2, and with line-of-sight visibility, it can reach 30 m.

As it was already planned earlier, the main recognition of BlueTooth technology is the replacement of the wired serial connection. The following profiles are assigned to BlueTooth technology: local network profile (Lan Access Profile), data exchange profile (Generic Object Exchange), data transfer mode (Profile Object Push Profile), file exchange profile (File Transfer Profile), synchronization profile (Synchronization Profile).

For the functioning of a wireless WiFi network for additional radio equipment, as well as for robotic telephones, TV sets and radio receivers. The exchange of information on bezdrotovoy merezhі is rich in what is similar to the negotiations with vikoristannyam radio communication.

Larger Wi-Fi possession can be divided into two great groups:

    WiFi routers (routers) and access points

    kіntseve possession of coristuvachіv, possession of Wi-Fi adapters.

The adapter of the dartless communication of the computer converts data into a radio signal and transmits it to the air from the jamming of the antenna. The wireless router receives and decodes the signal. Information from the router is sent to the Internet via an Ethernet cable.

In fact, WiFi routers and WiFi access points perform the same functions - they create radio coverage (AP mode), switching to any device, be it an attachment, equipping it with an adapter, you can connect to the network in AP-Client mode. On whom the similarity of the outbuildings will end. These annexes are differentiated both visually and structurally. A classic WiFi hotspot has only one Ethernet port. Classical WiFi routers have x 5. If you see a WAN port, which is used to connect the provider's cable. The Ethernet ports are labeled as LAN - they serve to connect a pair of clients in a local network, as I create a router.

The factory settings for the access point include a DHCP server and to connect to it via Ethernet or via WiFi, the adapter must be assigned a static IP address. The router has a DHCP server in the factory settings enabled, and whether any client of the router can take the IP address of this server automatically. For this, it is necessary to configure the service of the DHCP client of the adapter, for the help of which it is necessary to connect to the router, to automatically remove the IP address. In addition, the DHCP server included in the factory settings, the routers are equipped with a software and hardware firewall, which minimizes the possibility of hacker attacks and the spread of confidential information from clients of local networks, but it does not guarantee 10% success.

Call the Wi-Fi scheme to measure at least one access point and at least one client. The access point transmits its own security identifier (SSID) for additional special signal packets at a speed of 0.1 Mbps / s skin 100 ms. Knowing the SSID of the network, the client can determine whether it is possible to connect to this access point. When two access points with identical SSIDs get into the zone, the receiver can choose between them to provide data about the signal.

When using Wi-Fi, you can see some of the main modes of yoga: point-to-point, infrastructure mode, bridge mode and repeater mode. Let's take a look at the report on the skin of these robotic modes.

In the point-to-point robot mode, the wireless clients connect without intermediary among themselves, the access points in this mode do not vicariously. This mode can be used, for example, for connecting two computers equipped with Wi-Fi adapters, between themselves, without any additional attachments.

Malyunok 1.3.2.1

In the infrastructure mode (point-to-multipoint), robots, all attachments that are connected to a wireless network, communicate with each other through an intermediate attachment, which is called an access point (AP, access point).

Babies 1.3.2.2 In constant working mode

The mode of the droto-free bridge is victorious in that case, it is necessary to connect two local wires, in the distance one to one for a small distance (20-250 m), but there is no possibility to lay cables. In this case, wireless clients cannot connect to an access point, and the access points themselves can only be used to transit traffic from one local wire network to another.

Wi-Fi adapters for robots (receivers, transceivers) are similar to attachments that are used in duplex portable radio stations, stylish phones and other similar attachments. They can transmit and receive radio messages, as well as convert ones and zeros of a digital signal into radio messages and at the same time. At the same time, there is a memorial service for receiving and transmitting WiFi devices from other similar outbuildings. The biggest difference is that stinks work on lower frequency bands. Most of today's laptops and a lot of desktop computers are sold with built-in dartless priymacha. As there is no such attachment in a laptop, there are adapters that can be connected to an expansion slot for PC card standard boards or to a USB port. After installing the adapter of the wireless connection and the necessary drivers, which will ensure the adapter can work normally, the computer can almost automatically search for the available devices.

WiFi receiver can work in one of three frequency bands. It is also a possible option, if you want to “jump” from one range to another. Such a technique allows you to change the infusion of a reshkod and at once win the possibility of a dart-free link with a lot of outbuildings. The most current standards in WiFi technology have a frequency range of 2.4 GHz, and more precisely - a range of frequencies 2400 MHz-2483.5 MHz. The frequency band of 2.4 GHz is compatible with the current WiFi standards in the 5 GHz band in the frequency bands of 5.180-5.240 GHz and 5.745-5.825 GHz. The frequencies are richer, lower victorious in stylish phones, in duplex portable radio stations and for broadcasting terrestrial television. More data can be transmitted on a higher frequency.

In WiFi, there are several standards 802.11 in different types:

    For the 802.11a standard, data is transmitted in the 5 GHz band with speed up to 54 megabits per second. It also transmits orthogonal frequency-division multiplexing OFDM, a more efficient coding technique that transmits the output signal on the transmitting side into a splice of subsignals. Such a pidkhid allows you to change the overflow code.

    802.11b is the most popular and least expensive standard. For a deaky hour, zavdyaks of their vartosі, veins of a wide width, but at the same time they become more swedish standards in the world of their cheapness. 802.11b assignment standard for robots in the 2.4 GHz band. The speed of data transmission is up to 11 megabits per second with the change of speed to increase the speed of manipulation with additional code (complementary code keying, CCK).

    The 802.11g standard, like 802.11b, transmits to the robot in the 2.4 GHz band, however, it provides significantly more data transmission speed - up to 54 megabits per second. The 802.11g standard is faster, but in the new version it is also OFDM encoded, like in 802.11a.

    The latest standard is 802.11n. The new data transmission speed has been increased and the frequency range has been expanded. At the same time, while the standard 802.11g theoretically provides security for data transmission speed of 54 megabits per second, the real speed is about 24 megabits per second, in conjunction with the transfer of data. The 802.11n standard can provide data transfer speeds of 140 megabits per second. The standard was approved on 11 September 2009 by the Institute of Electrical and Electronics Engineers (IEEE), a world leader in the development and promotion of new standards.

The most advanced wireless merging standards today are IEEE 802.11b and 802.11g. The establishment of such measures, according to the IEEE, works in the range of 2400-2483.5 MHz and transfers data with a maximum speed of 11 and 54 Mbit / s.

Rozpodіl khvil in the range of maє a number of original features. Irrespective of the functional feasibility of the burrless and burr blades, there are differences in their installations, installations and fittings. The reason is the power of the physical mediums, which are victorious for the transmission of information. In a state of mindless possessions, it is necessary to protect the laws of the widened radio wave. Radiophere is more sensitive to a different kind of transgression. Therefore, the presence of partitions, walls and concrete overlaps can be identified on the speed of transmission of data. Wash the reception and transmission of the signal not only through physical transitions, but also through various radio industrial devices.

At one time, the standard for security in regional communications was the Wired Equivalency Privacy (WEP) technology. However, hackers have revealed the quirks of WEP and now it's easy to know the programs and programs that are considered to be evil for such an attack. WEP is based on the streaming cipher RC4, which is used because of its high security of operation and the possibility of changing the key life. CRC32 is used for checking sums.

The WPA technology has come to replace the technology behind the WEP arborless meshes. The advantages of WPA є strengthened the security of data and increased access control to bezdrotovyh merezh. Today, the dead line is considered to be stolen, as in it there are three main warehouse security systems: authentication of the coristuvach, confidentiality and integrity of the transfer of data. The WiFi Protected Access (WPA) protocol is now part of the 802.11i wireless security protocol. Dana tehnologіya pіdtrimuє bazovі zasobi autentifіkatsії protokolіv 802.1x, napriklad autentifіkatsії Protocol Extensible Authentication Protocol (EAP), yaky peredbachaє fate in autentifіkatsії troh storіn - scho viklikaє (klієnta), scho viklikaєtsya (access point) i autentifіkatsії server scho іstotno pіdvischuє BEZPEKA s' today. WPA secures the confidentiality of data transmission for additional encryption of traffic with the help of time clock keys for the aid of TKIP and the integrity of information - the MIC (Message Integrity Check) checkbox. Like in times of WEP, WPA passes the entrance to the system with a different password. Most of the public access points either support WPA or 128-bit WEP technology, although the old WEP system is still being exploited. At the moment, WPA and WPA2 are being developed and promoted by the Wi-Fi Alliance.

For even more security, you can filter the address of Media Access Control (MAC). It does not have a password for the identification of the coristuvach, for which the physical hardware of the computer is required. The skin computer has a unique MAC address. MAC address filtering ensures that only machines with the same MAC addresses can access a number of machines. When the router is configured, it is necessary to specify which addresses allow access to the border. The system is not stovіdsotkovoy nadіynistyu. A hacker with sufficient knowledge can tell the MAC address so that he can copy the permissions of the MAC address and enter the system into Oman, imitating this address with his computer, in order to allow it to enter the merezh.

Wi-Fi benefits

    Allows you to open the mesh without laying the cable, which can change the variety of the throat and / or expand the mesh. Mіstsya, where it is not possible to lay a cable, for example, posture used and in the future, which may have historical value, can be serviced by dartless treadmills.

    Allowing the mother access to a number of mobile outbuildings.

    Wi-Fi extensions are widely available in the market. Guaranteed the validity of the seal of the obov's language certificate of possession with the Wi-Fi logo.

    In the boundaries of the Wi-Fi zone in the area of ​​the Internet, there can be a few coristuvachiv from computers, laptops, telephones, etc.

    Vibration of Wi-Fi attachments at the time of data transfer is an order of magnitude (10 times) less than that of a stylish phone.

ZigBee wireless data transmission technology was introduced to the market after the appearance of Bluetooth and Wi-Fi wireless data transmission technologies. Toying technologії Zigbee was objected, Prs for everything, Tim, Shah for acts Dodatkіv (Fort for Vіddalenny Governance Assistvented Abo Garazhniy Gate, Abo Zitchwannya Іnformazії z Sensorіv) The main Crites in the vibor technologies of the revolt transmissions є Male Energite-to-Wartist. Because of this, the throughput of the building is low, so as in the majority of the weather, the sensors are installed in the building in the presence of a built-in battery, the hour of work is due to change the number of months and roll the years. At that time, the technology of wireless data transmission BlueTooth and Wi-Fi did not meet these criteria, ensuring the transmission of data at high speeds, with a high level of energy saving and varstity of the hardware part. In 2001, the working group No. 4 of IEEE 802.15 began to work out the creation of a new standard, which biped the advancing vimog:

    even smaller power supply of the hardware part, which implements the technology of wireless data transmission (the hour of operation in the battery may become from decades of months to decades of life);

    the transfer of information is due to a low security;

    low variability of the hardware part.

The result was the development of the IEEE 802.15.4 standard. On fig. Figure 5 shows the model of interoperability with the IEEE 802.15.4 standard, ZigBee wireless data transmission technology and end-to-end wireframe.

Malyunok 1.3.3.1 Model for interfacing with IEEE 802.15.4 standard, ZigBee wireless data transmission technology and end-of-line cable

The IEEE 802.15.4 standard defines only two lower levels of the model: the physical layer (PHY) and the radio channel access control layer for three unlicensed frequency bands: 2.4 GHz, 868 MHz and 915 MHz.

The MAC value is responsible for managing access to the radio channel with the use of the Carrier Sense Multiple Access with Collision Avoidance (CSMA-CA) method, as well as for managing the connection and inclusion in the secure transmission of data, secure data transfer transmitted by a symmetric key (AES-128).

In its own right, the technology of ZigBee data transmission without wires has been propagated by the ZigBee alliance, designing other equal models for mutual modality, up to which one can add fringe, security, structure and program structure and supplement profile. Merezhevy riven, ZigBee data transmission technology without wires, depending on the appearance of the attachment and configuration of the link, and adding three options for the topology of the link.

To ensure low-cost integration of ZigBee wireless transmission technology in various additions, the physical implementation of the hardware part to the IEEE 802.15.4 standard is divided into two categories: an add-on with an interchanged set of functions (FFD) and an add-on function (RFD).

Three types of logical attachments have been designated by the ZigBee alliance for RFD and FFD applications: ZigBee coordinator (attachment, wait a minute), ZigBee router and ZigBee terminal attachment. The coordinator takes care of the initialization of the border, the management of the nodes, and also collects information about the repair of the skin node brought to the border. ZigBee-router is responsible for routing assistance, transmitted from one node to the next. Under the end of the building, they decide whether there is a terminal, connections to the border. Looked at more RFD and FFD extensions and є terminal extensions. The type of a logical extension, when prompted, is chosen by the endian koristuvach for the additional choice of a singing profile, proponated by the ZigBee alliance. When prompted with a “skin-to-skin” topology, the transfer of the extension from one node of the network to a different one can be followed by different routes, which allows the separation of the lines (to combine a sprat of small lines into one large - a cluster tree) with the installation of one node in the network great vidstani and ensure nadіynu delivery podomlen.

Traffic that is transmitted over ZigBee, as a rule, is divided into periodic, intermittent and repeated (characterized by a small time interval between messages of informational alerts).

Periodic traffic is typical for add-ons, in which it is necessary to remotely receive information, for example, in the form of sensorless sensor sensors, or others. In such addenda, information is removed from the sensors, or the lichniks are assigned an offensive rank. As it was already guessed earlier, be it a terminal, in the capacity of such a droto-free sensor in this butt, for a part of the hour, the robot is guilty of being in the “sibling” mode, ensuring that they themselves have even a low energy supply. In order to transmit information, the terminal at the right moment and hour should go out of the “hiccup” mode and listen to the radio signals of a special signal (beacon) transmitted by the attachment to the control network (ZigBee coordinator or ZigBee router), until it starts without a dart. When there is a special signal (beacon) in the radio, the terminal will send information to the attached guard rail and immediately switch to the “synonymous” mode until the start of the call session.

Pererivchasti traffic of the authorities, for example, for the extension of remote control lighting. Let us know the situation, if it is necessary to send a command to turn on the lighting in the front room when using the floor sensor installed in the entrance doors. The transfer of a command to a given vipadka is called an offensive rank. When the device is removed from the control cell, the signal about the request of the sensor to the ruh is seen as a command for the end device (wireless vimikacha) to connect to the ZigBee cellless cell. We will then install the alarm with the terminal annex (drone-free vimikach) and the transmission of informational notification will be completed to avenge the command to turn on the lighting. Upon receipt of the command, the call is opened and terminated by turning on the dartless vimikacha in the ZigBee network. The connection of the connection of the terminal annex to the ZigBee yard only in the necessary for this moment allows you to just increase the hour of the terminal annex in the "siphoning" mode, ensuring the minimum energy supply by yourself. The method of selecting a special signal (beacon) is more energy efficient.

In some addenda, for example, security systems, the transfer of information about the application of sensors is due to be practically silent and without hiccups. But it is also necessary to protect the fact that at the right moment of the hour they can “repair” a bunch of sensors, generating cyclic traffic in the same ranks. Imovirnist tsієї podії is small, but it is unacceptable not to protect yoga in security systems. In the case of ZigBee wireless meshes, for the purpose of acknowledgment, transferred to the wireless meshing when deploying security sensors (terminal attachments), data transmission of skin sensor data in a specially visible watch slot has been transferred. In ZigBee technology, a time slot is specifically called a guaranteed time slot (Guaranteed Time Slot, GTS). The recent development in ZigBee technology of the ability to give guarantees for a time slot for the transmission of inconvenient notifications allows us to talk about the implementation of the QoS method (quality of service) in ZigBee. The view of a guaranteed time slot for the transmission of inconsistencies is assigned by the border coordinator (Fig. 6, PAN Coordinator).

In order to create a wireless truss (for example, a tether with a "star" topology) based on ZigBee technology, the retailer needs to hire one tethering coordinator and a number of terminal outbuildings. With a planuance merry, Schіd Ekravuvati, Shah's maximum kіlkіt of the active Kіntsevic attachment, attendant to the Mezhoye coordinator, does not obey 240. The CRIM, it is necessary to change the ZigBee-Chіp_v dialer in the diamel, configuration, configuration for Korranhuchi Dodatkiv і Profіlіv.

The high versatility of the debugging kit, which can include a set of software and hardware tools for prompting the ZigBee wire-free mesh, be it folding, is one of the streaming chinniks in the mass expansion of ZigBee technology on the Russian market.

A short look at the technology of wireless data transmission BlueTooth, Wi-Fi and ZigBee shows that skin technology can have its own power, which is within the reach of one and the same and in different ways (with different costs). The relative characteristics of BlueTooth, Wi-Fi and ZigBee technologies are listed in the tables.

Table 1.3.3.1

Similar characteristics of BlueTooth, Wi-Fi and ZigBee technologies

From this table it can be seen that the most wide and long distance transmission is possible with any Wi-Fi technology. Wi-Fi technology is used to transmit mail, video and other data via the Internet. ZigBee technology is perfect for low exchange of information between a small amount of information between a large number of nodes, for remote monitoring and control. BlueTooth technology has known the most congestion when exchanging data between mobile devices.

Merezheva technology - the need for a set of standard protocols and for the implementation of software and hardware devices (for example, mesh adapters, drivers, cables and roses), sufficient for calculating the cost. The epithet “sufficient” substantiates that situation, which is the minimum set of benefits, for the help of which you can induce a practical measure.

The protocols, on the basis of which there will be a measure of singing technology (in a narrow sense) were specially developed for a joint work, therefore, in the form of a measure, it is not necessary to add additional data on the organization of their mutual modality. Some of the technologies are called basic technologies; The basic merging technologies can be applied to such local merging technologies as Ethernet, Token Ring and FDDI, or territorial merging technologies X.25 and frame relay. To remove the practical measure in this way, add software and hardware devices that can be considered to one of the basic technologies - mesh adapters with drivers, concentrators, switches, cable systems, etc. technology.

Today, the widest standard for local networks is Ethernet packet data transmission technology. The Ethernet standards define the network and electrical signals on the physical layer, the frame format and the media access control protocol on the channel layer of the OSI model. Ethernet is mainly described by the IEEE 802.3 standards. A coaxial cable is twisted in the core, a pair or an optical cable is twisted. Computers are connected up to the middle, which are divided in a similar way to the typical structure of the "head bus". Behind the help, two computers can exchange money at the same time.

All types of Ethernet standards (including Fast Ethernet and Gigabit Ethernet) use one and the same method under the data transmission medium - the CSMA / CD method (multiple access with carrier control and collision detection). A computer in an Ethernet link can transfer data across a link, as long as the link is free, so no other computer is currently handling the exchange. Therefore, an important part of Ethernet technology is the procedure for determining the availability of the medium. After that, as the computer is changed, the network is free, the transmission starts, when the medium is “hooted”. An hour of monopoly communication is divided between the medium by one node and is separated by an hour of transmission of one frame. A frame is the only data that computers use in an Ethernet network. Frame can be fixed format and order with the data field to change the difference between the service information, for example, the address of the owner and the address of the manager. The Ethernet network is wired so that when a frame enters the data transmission medium, all the network adapters immediately start receiving the frame. All stinks analyze the address assigned, stashed in one of the cob fields of the frame, and, as the addresses are matched with their own address, the frame fits into the internal buffer of the merging adapter. In this way, the destination computer will take away the recognition of your data. Sometimes you can blame the situation, if at the same time two or more computers fail, which is free, and start transmitting information. Such a situation, called a kolіzієyu, reshuffles the correct transfer of data along the way. The Ethernet transmission standard has an algorithm for displaying the correct processing of collisions. Imovirnist vyniknennya kolіzії lie down in the form of the intensity of the fencing traffic. After the detection of the collision of the mesh adapters, as if they tried to transfer their frames, attach the transfer and after the pause of the fall-back period, they try to re-take access to the middle and transmit that frame, which is the result of the collision.

The main advantage of the Ethernet network, which stench has become so popular, is its economy. To encourage mothers, one lace adapter for the skin computer plus one physical segment for the cable of the required life. Other basic technologies, for example, Token Ring, for the creation of a small scale, take into account the presence of an additional device - a concentrator. In addition, Ethernet networks implement simple algorithms for accessing the medium, addressing and transmitting data. The simple logic of the work and the measure led to the simplicity and, obviously, the cheapening of the measure adapters and their drivers. There are some reasons why Ethernet network adapters can be very high. And, nareshti, yet another miraculous power of the Ethernet network є їх expansion is good, so the ease of connecting new nodes. Other basic technologies - Token Ring, FDDI, - wanting to be rich in individual rice, at the same time, to be rich in wild power over Ethernet. Іstotnі vіdminnosti odnіієї tekhnologiї vіd іnshої po'yazanі z osobennosti vikoristovuvannogo method access to the middle. So, the features of Ethernet technology like Token Ring technology are rich in what are the specifics of laying in them the methods of dividing the middle - a type-based algorithm for accessing Ethernet and a method of accessing a way to transfer a token to Token Ring.

To connect all blocks of the safety control system of the Vityaz train, a CAN bus is used. Let's take a look at this interface for more information.

CAN (Control Area Network) - the next backbone, which ensures the local integration of "intellectual" devices for input / output, sensors and other devices for operating a business. It is characterized by a protocol that ensures the possibility of transferring data on the main line to decals of wired outbuildings, which ensures the transmission of data in real time and the correction of pardons, high confidence. The CAN system is made up of a large number of microcircuits, which ensure the operation of those connected to the main line, the expansion of which was initiated by the BOSH company for wiring in cars, and in this hour they are widely used in the automation of industry. The speed of transmission is set by software and can be up to 1 Mb/s.

But in practice, under the CAN-merezhey, it may sound on the edge of the topology "bus" with a physical equal to the differential wager, which is the same in the ISO 11898 standard. The transmission is carried out by frames, which are accepted by all nodes of the measure. For access to the bus, special microcircuits are available - CAN bus drivers.

The CAN system works even better. As if blamed for any inaccuracies, the stench is obov'yazkovo fixed in the main registrars of inaccuracies and can be further treated for additional diagnostic equipment.

Malyunok 1.5.1 CAN system

Merezha united the spit of blocks of management. Control units are connected to it via transceivers (receivers). In this rank, all the surrounding stations of the city are in the same minds. Therefore, all control blocks are equal and should not be given priority. Why should we talk about the so-called rich subscriber architecture. The exchange of information is determined by the transmission path of the last signals.

The process of exchange of information is based on the exchange of messages, frames. Qi messages can be controlled and removed by skin control blocks. Skin with a message to avenge data about any physical parameters of the system. In this case, the value is presented in two forms, i.e., as a sequence of zeros and ones or bits. For example, the value of the frequency wrapping of the engine 1800 rpm can be represented as a two-digit number 00010101. When a signal is transmitted in the skin, the number in the two-digit data is transformed into a succession of subsequent pulses (bit). Digital pulses go through the TX wire (transmission wire) to the transceiver input (pidsilyuvacha). The transceiver transforms the sequence of pulses into the current voltage signals, which are then sequentially transmitted to the bus wire. When receiving signals, the transceiver transforms the voltage pulses into a sequence of bits and transmits them through the RX wire (receiving wire) to the control unit. At the control unit, the sequence of double signals is re-transformed into this message. For example, the double number 00010101 turns into a wrapping frequency of 1800 rpm.

A sent message may be accepted by the skin control unit. This principle of data transmission is called wide-wave, because it is similar to the principle of wide-wave radio station operation, the signals are received by the skin short-wave radio. The whole principle of data transmission ensures that at the same time the same information is taken by all control units connected to the measure. Skin care is provided with an identifier, which indicates the recognition of the transferred data, but not to the address of the recipient. Be-priymach can respond both to one identifier and to a sprat. For one identifier, a sprinkling of primacies can react.

Malyunok 1.5.2 The principle of exchange of notifications via CAN

The control unit receives the signals from the sensors, processes them and transmits the relevant signals to the vikonavchi attachments. The most important components of the control unit are a microcontroller with inputs and outputs that can be remembered and added to save software. The signals received by the control unit from the sensors, for example, the temperature sensor or the frequency sensor of the crankshaft wrapper, are regularly called up and recorded sequentially at the input of the data collection device. At the microcontroller, the input signals are processed in a consistent way before they are put into new programs. Vibrated as a result of the processing, the signals are sent to the middle of the outbuilding, so remember, the smell of the stink goes to the outbuildings. To process the message that comes from the CAN bus and is sent to it, the skin control unit for the security of the additional memory device, in which the message is saved, how to get there, so the message is sent.

To exchange data for the auxiliary CAN bus, use the CAN system module. Vіn divisions into two zones: the receiving zone and the transmission zone. Module of the CAN system of detections with a control unit through mailboxes for incoming and outgoing messages. Sound the faults in the microcontroller chip to the control unit.

The transiver is a transceiver device that simultaneously performs the functions of the transmitter. Vіn converting the sequence to be from the module of the CAN system of dual signals (on a logical level) into electric impulses of voltage and voltage. In this way, for the help of electrical impulses, data can be transmitted over medium wires. Communication between the transceiver and the CAN system module is carried out using auxiliary wires TX (transmit wire) and RX (receive wire). Carrying out RX connections with the CAN bus through the switch. Vіn allows you to constantly "hear" digital signals that are transmitted through the bus.

With a good bus, any vuzol can start the transfer at any moment. In times of one-hour transmission of frames, two and more nodes pass access arbitration: Transferring the address of the dzherel, the vuzol immediately checks the bus station. If a dominant bit is received when transmitting a recessive bit, it is important that the other node transmits an announcement with great priority and the transmission is considered to be a bus signal. In this way, for example, Ethernet in CAN does not seem to be unproductive in terms of wasting bandwidth on a channel during collisions. The price of this decision is the immovability of the fact that notifications with low priority will never be transferred.

All connections to the station bus will receive messages sent by the control unit. The message must be in the receiving area of ​​the other modules of the CAN system via the RX dart. If so, the stink can be indicated on the control line for the CRC (Cycling Redundancy Check) bag, which is not in the pardon message.

advances

    Possibility of work in the mode of hard real time.

    Simplicity of implementation and minimum cost on the wall.

    High stability to pereshkod.

    Arbitrage access to the border without spending the throughput building.

    Supervision of pardons for transfer and acceptance.

    The great expansion of technology, the presence of a wide range of products from various post-workers.

    The connection of the additional possession is required.

shortfalls

    The number of data is small, as it can be transferred in one package (up to 8 bytes).

    Grand rozmir of service tribute in a package (upon redemption to brown danimi).

    The existence of a single globally accepted standard for the protocol of a high level, however, is price and value. The standard of the measure is given a wide range of possibilities for a practically bezmilkovo transfer of data between nodes, depriving retailers of the opportunity to put everything that can fit into this standard.

      USB interface

At the fourth branch of this graduation project, the writing of the PPP will be carried out for the test bench of the RPDP. On which stand will be connected to CAN via USB, the USB-interface will be disabled.

USB (Universal Serial Bus - universal serial bus) is a standard for expanding the architecture of a PC computer.

The USB architecture is determined by the following criteria:

Easily implemented expansion of the PC-computer periphery;

Transfer rate up to 12 Mb/s (version 1.1), up to 480 Mb/s (version 2.0), up to 4.8 Gb/s (version 3.0);

Possibility of integration in PC-computers of any kind of expansions and configurations;

Easily folding extensions for PC computers.

From the point of view of the important USB parameters, steps:

Ease of connection to a PC computer, so it is impossible to connect devices incorrectly;

It is not necessary to eat food before connecting through the special design of roses;

Prikhovuvannya details of the electrical connection from the end of the koristuvach;

Self-identification of peripheral devices (Plug & Play);

Possibility of dynamic connection of peripheral buildings;

Low-power appliances (up to 500 mA) can take power directly from the USB bus.

The physical structure of the building is built according to the topology of a multi-tiered star. The center of the skin mirror is the hub (provides additional connection points). Leather cable segment connecting two points - a hub with another hub or a function (representing the last peripheral attachment). The system has, moreover, only one, a host controller, at the top of the pyramid of functions and hubs and operating the entire system. The host controller integrates with the root hub (Root Hub), which provides one or more connection points - ports. The USB controller that can enter the chipset warehouse should ring when a two-port root hub is installed.

Logically, connections to any USB hub port can be seen as direct connections to the host controller. In this rank, the connection point is not important.

The host controller changed the bandwidth of the bus between the outbuildings. The USB bus allows you to connect, configure, turn on and turn on the add-on for hours of operation of the host and the add-ons themselves.

Functions are extensions that can transmit or receive data or control information via the bus. Characteristically, the functions are other peripheral devices connected to the hub port with a USB cable. Skin function gives configuration information that describes the ability to build and help to resources. Before the selection, the function is to blame but set by the host - I may have seen smuga in the channel and selected configuration options.

The hub is a cable hub. Connection points are called hub ports. The leather hub transforms one connection point into their faceless. The architecture allows the creation of a number of hubs. The skin hub has one upstream port (Upstream Port), intended for connecting to the hub of the upper level and one or more downstream ports (Downstream Port), designated for connecting the functions of either the hub of the lower level. The hub for the distribution of connections and the inclusion of outbuildings and manages the supply of food to the lower segments.

To help the programmer in the routine work of writing drivers, low-level drivers should be included in the operational system. Windows system login:

    host controller driver (USB Bus Driver) responsible for managing transactions, eating and recognizing attachments;

    bus driver (USB Bus Driver) responsible for managing transactions, eating and recognizing attachments;

    class driver.

From the point of view of the programmer, the greatest interest is in the driver class and the interface leading to the first driver. Here the operating system is to work on the road to unify the interfaces. All USB attachments are divided into groups (hubies, HID attachments, audio, data storage attachments, printers, communications attachments), depending on the overhead authorities, converging functions and helping to resources. For the skin group of attachments in Windows, you can install an okremy driver, which will be automatically installed when it is detected that the attachment belongs to one of the groups. In this manner, in most cases, no drivers are needed.

USB HID (human interface device) class - class of USB devices for interfacing with people. This class includes such attachments as a keyboard, a mouse, a game controller. It is one of the first USB class supported by the Windows operating system. HID attachments for entering data into the computer can be accepted. If you need to correct data on HID attachments, you must initiate a connection with this attachment and proceed with it as a sizable file.

Whom have been divided into conducting an overview of the main technologies for transferring data. In order to improve the process of exchanging information between a computer and a train, it was necessary to use the current technology of wireless data transfer with the method of the farthest choice of the most appropriate (2 chapter). Crimium of droto-free technologies of the physical level, the technologies of the channel level (Ethernet, Frame Relay, ATM) were considered.

In this section, the main technologies for identifying objects were also reviewed. Among them, special respect was given to radio frequency and optical identification, as it is possible to win for the initiation of the establishment of a stationary control point with a registrar of the parameters of the traffic of the train (RPDR).

At our hour of the greatest breadth, electric channels have been connected. Tse sukupnіst tekhnіchnіchnіh pristroїv, scho zabezpechuyut transfer povіdomlennya, no matter what kind of vіdpravnik to oberzhuvach. It’s out there for the help of electric signals, which are spreading along the darts, or radio signals. Distribute electrical communication channels: telephone, telegraph, facsimile, television, wire and radio communication, telemechanical transmission of data, etc. Warehouse part of the channel sv'yazku є linії zv'yazku - conductive and wireless (radio communication). At its core, a wired connection can be connected via an electric cable and via a fiber optic line. And radio communication is established for the LW-, MW-, HF and VHF bands without repeater jamming, via satellite channels from congestion of space transponders, via radio relay lines from congestion of terrestrial repeaters and via satellite communications of terrestrial radio stations.

Carrying out lines of communication

Conducting lines of electricity are divided into cable, repeat and fiber optic.

Cable lines

Cable lines of communication - lines of communication, which are made up of direct transmission media (cables), recognized as a whole with wired transmission systems, for organizing communication. Cable lines are made up of interconnecting hubs, which are not serviced by regeneration (subsidiary) points - NRP, NPP, cable lines.

Check the lines of the call

Paired lines are updated on the lines: international telephone connection (MTS), strong telephone connection (STS), local telephone connection (GTS) and radio broadcasting lines (RS).

For its significance, repeat the lines of the STS; STS subscriber lines.

Read also:

Deployment of an audio signal synthesizer with data compression
The method of this course project is the development of a synthesizer of sound signals with data compression, which allows the creation of sound alerts. Management team...

Development and preparation of a signal amplification and digitization complex based on a microcontroller
The development of microelectronics and a wide її zastosuvannya in industrial production, in attachments and control systems for the most demanding objects and processes, and in denmark ...

Rozrahunok radio characteristics
For the transmission of signals to the transmission antenna (viprominuvach) to the radio receiving antenna in the capacity of the line transmission of energy, it is often necessary to use a natural medium. The line of transmission with whom is called e ...

The last hour is experiencing a turbulent development in the area of ​​data transmission. Riznovidіv merezh dosit rich. The very purpose of the measure in a narrowed sense is the multiplexing system for access to communication channels and resources. By its ownership, the measure is divided into:
- local networks (LAN, Local Area Network
- Mіskі (MAN, Metropolitan Area Network)
- regional (WAN, Wide Area Network)
- global (InterNet, FidoNet, FreeNet)
The main responsibility of the global network among others is the same as the number of subscribers. The uniqueness of the skin barrier is determined by the method of access to the medium of data transmission. With the advent of fiber optics and twists of the bet, the network has now become more and more based on optical fiber cable and the "vita pair" cable - which has increased the efficiency of the network to a new level: the protection and clarity of information have significantly increased, and the bandwidth of transmission has increased.

Below the cracks is a short look at the widened meshing technologies. Danish glance does not pretend to be a theoretical insight - the author's task is to see the main concepts that characterize the essence of a particular technology.

Table 1

technology

speed of transmission

topology

basic outbuildings

access method to the measure

Europe USA
E1 - 2Mb/s T1 - 1.5Mb/s E2 - 8Mb/s T2 - 6Mb/s
E3 - 34Mb/s T3 - 45Mb/s E4 - 140Mb/s T4 - 274Mb/s

point to point

possession
E1, E2, E3, E4
or
T1, T2, T3, T4

timchas pleiochronous multiplexing method

STM-1 155 Mb/s STM-4 622 Mb/s STM-16 2.5 Gb/s STM-64 10 Gb/s

subway kilce,

point to point

SDH switch

STS-1, OC-1 52 Mb/s STS-3, OC-3 155 Mb/s STS-12, OC-12 622 Mb/s STS-48, OC-48 2.5 Gb/s

subway kilce,

point to point

SONET / SDH

time clock synchronous multiplexing method

10 Ethernet - 10 Mbps Fast Ethernet - 100 Mbps Gigabit Ethernet - 1 Gbps 10G Ethernet - 10 Gbps 40G Ethernet - 40 Gbps 100G Ethernet - 100 Gbps

tire, mirror

routing switch

sharing method

subvintage kilce

concentrator

marker method

subvintage kilce

fencing FDDI adapter

marker method

155 Mbps
622 Mbps
2.5 Gb/s

point to point

ATM switch

asynchronous multiplexing method

155 Mbps
622 Mbps
2.5 Gb/s

subvintage kilce

routers
Cisco 7200
Cisco 7500
Cisco 12000

dynamic transmission of IP packets

xDSL family

ADSL - 3.5 Mbps
HDSL - 2 Mbit / s
SDSL - 2 Mbit/s
VDSL - 26 Mbit/s
SHDSL- 2.32 Mbps
UADSL - 384 Kbps
IDSL - 144 Kbps

dot-dot, star

digital signal processing method

APON - 155 Mbps
BPON - 622 Mbps
EPON (GEPON) - 1Gb/s 10 GEPON - 10Gb/s GPON-1Gb/s and 2.5Gb/s

ring,
point to point, tree

optical rozgaluzhuvach

WDM multiplexing method and multiple access method at a low hour

We comment on the case in Table 1.

PDH technology is one of the first technologies that transmits digital data transmission in the first place for additional pulse-code modulation (ICM), so that for the help of a special switching device, the analog telephone signal transforms into a digital information flow
- SDH technology is a further development of PDH technology and for the control of the remaining secure control and self-diagnostics of the primary cell with highly stable data synchronization
- SONET technology - American version of SDH technology
- Ethernet technology successfully wins when prompted by local computer networks. The first technology, as it became victorious in the quality of the medium of transmission of data optical cable and twisted pair - which led to the nameless growth of the Ethernet-merge code. The speed of data transmission is up to 10 Gb/s. 40 Gigabit Ethernet and 100 Gigabit Ethernet protocols with 40 Gb / s and 100 Gb / s are available!
- ATM technology is remarkably young, based on the concept of transporting both data and voice and video traffic with high security
- FDDI technology - fully developed Token Ring. At the head of the design, the design is identical;
- DPT technology - the price of new merging, as a claim to the international standard. The main concept of the DPT network is the efficient reception and transmission of IP traffic
- xDSL technology, which is based on the use of telephone lines, has taken its place in the field of interactive access to subscribers, where it is possible to successfully connect telephone equipment and the Internet, fax and e-mail
- PON technology - technology is rapidly developing, as it allowed for a short term to complete the task of connecting an individual correspondent to a service provider.

Details about skin technology.

PDH technology (plesiochronous digital hierarchy) is the technology of digital primary (reference) measures, in which the principle of digital processing of an analog telephone signal (IKM) and the time clock multiplexing method (TDM) are achieved. The essence of this method of multiplexing at a low hour is in the coming: after the additional switch, the input subscriber channels are sequentially connected to the main channel, the call is on the song interval, so the titles of the time slot, and on the primary side of the main channel, the switch is demultiplexed їх through all kinds of subscriber channels. The PDH architecture has a lot of ararchy security and a large number of channels in digital information flows. The first rіven, the base for the primary tier, is called E1 and more 2.048 Mb/s for the European standard or T1 = 1.544 Mb/s for the American standard. This payment is made for 30 subscriber speeds (64 Kb/s each) plus two service speeds (32 x 64 Kb/s) or 24 subscribers for American worlds plus 8 service speeds (24 x 64 Kb/s + 8 kb/s). Further, for the help of basic streams E1 and T1, other channels are organized with a higher level in the hierarchy of speeds - E2 / T2, E3 / T3, E4 / T4. It is required to indicate that the mechanism of synchronization of these digital streams works on a plesochronous level, so it may be synchronous. It’s worth bringing up to the point that the converted digital streams are vibrating for shvidkost one kind of one for a small value. In order for the PDH measures to function with a pleasant reliability, it is necessary to add an additional option to check security for additional additional special check bits. However, given the digital platform, due to its organization, it does not allow significant increase in the speed of data transmission, and it does not provide sufficient control and management of the data of the primary media. The SDH technology has come to perfection, yak, vicorous digital information flows PDH, can organize high-quality and efficient data transmission.

SDH technology (synchronous digital hierarchy) - technology of digital primary and transport measures. It is a complete version of PDH technology. The main information structure in SDH merezha is a synchronous transport module with a different level of hierarchy, STM-n naming. Riven STM-1 є basic and dorіvnyuє 155 Mbit / s. Merezhі SDH vіdnosjatsya to the class of muсh with switching of channels by the method of synchronous multiplexing at the hour (TDM). The concept of SDH allows creating superfluous transport links, in which PDH streams are generated as input data. All information in the PDH / SDH system is transmitted by Z-n containers and virtual VC-n containers. Container type С-n is the input transport structure in the primary SDH-merezhі: for example, in container С-12 packages flow E1, in container С-3 packages flow E3, and in container З-4 the information flow is packed in the SDH-merezhі module STM- 1. Next, before multiplexing and switching, path information about the route is inserted into the container Cn - now such a container is called a virtual container VC-n. It is also called the unit of multiplexing in the technology of synchronous digital hierarchy. In SDH-merezhe, the only highly stable clock mechanism is the clock-merezhovy synchronization (TTS). The best topology is important for the downstream loop - information traffic is transmitted along the first loop, in another way - synchronizing data and the loop is activated for the passage of the main stream only in case of failures and emergency situations.

SONET technology is a digital first-line technology, analogous to SDH technology. The synchronous transport modules in the SONET design are referred to as STS-n (electrical signals) and OC-n (laser infrared technology). First rіven, base for the primary tier, STS-1 / OC-1 up to 52 Mbit / s. The third tier STS-3 / OC-3 is similar to the first tier STM-1 in the SDH architecture. Likewise, in SDH-mergers in SONET, the time-clock synchronous multiplexing (TDM) method is used. In this way, if we talk about the dimensions of the synchronous digital hierarchy, we can think about the technology with the abbreviation SONET / SDH.

3 Ethernet drive. Infection technology is equipped with the most extensive protocol, in which the method of collective access with carrier frequency recognition and collision detection (CSMA / CD) is won. To put it simply, such a multiple access method does not allow creating a collision, that is the situation of one-hour transmission of data over the main channel between subscribers. An information unit is a frame. For more details about Ethernet technology, see the "Corris information" section of our site under the name "ISO / OSI model and IEEE 802.3 standard in Ethernet networks"

ATM technology transmits an asynchronous way of transmitting information by means of a fixed size of 53 bytes, which is added up to 48 bytes of data and 5 bytes of the header. Through the mediation of the ATM-switch, the cores are multiplexed in the world of the environment. Such an improvement is called the method of asynchronous multiplexing. Merezhі ATM oriented on the virtual connection of two types of interface - virtual channel (VC) and virtual path (VI). The virtual channel will establish a connection between two terminal nodes (subscribers) for an hour of their interaction. The virtual path is composed of a number of virtual channels and establishes a route between switches. Synchronization of ATM-merezhі is ensured for the clock synchronization network (TTS). The concept of ATM is successful in terms of the main criteria - high-speed, fast transmission of various traffic (digital, voice and multimedia data).

FDDI and Token Ring technologies win over the determination of the marker method of data transfer, and in a simple way, this method is called relay-race, since the right to transfer is launched by relay from subscriber to subscriber. This method transfers the obov'yazkovo ring topology of subscriber distribution, and there will be two rings: one ring is a backup ring in case of an accident or failure. The essence of the method is this. A marker (token), a special package, is wrapped around the ring without interruption. There is one more name for the method - token! So the axis, like a marker vіlny - vіn gives the subscriber the right to transfer. The subscriber, having taken the desired marker, will take the marker, come to the new packet of information and send such a request to the call. Reshta subscribers in the country analyze the parcel for the addressee. For example, the parcel is not addressed to the subscribers; If the subscriber knows his address in the message, he accepts the information, the marker indicates as acceptance and starts the message again on the call. The transmitting subscriber, having taken back his message with a confirmation about the reception, saw his information package, designates the token (marker) as a valid one and sends a clean token across the border. Everything repeats itself.

DPT technology, developed by Cisco Systems, is at the stage of being adopted as an international standard for inspiring a new generation of micro-services focused on service providers with the transmission of IP traffic. DPT is a technology for dynamic transmission of IP packets. The dynamism of the line of distribution is the shortest way to the subscriber (unit) in the given data package. Ideology of new technologies is based on smart victorious approaches to everyday life already based on such measures as: SONET / SDH, Token Ring, FDDI. May be on the verge of the organization of the topology of the subway ring. This is the most effective way of the Cisco company! In the topology of the "underground ring" in SONET / SDH, Token Ring, FDDI technologies, the other side backbone is victorious as a backup in case of failures, breaks, etc. DPT has two loops in active mode, and IP packets are wrapped by stake in opposite directions: in one loop - for the year, in the other - against the year. Such an organization of information flow gives the possibility for a special SRP protocol to choose the most relevant routes to the receiving node. Cіkava tekhnologiya DPT y y tim, scho won to do it mobile can be in the already budovanі SONET / SDH і Gigabit Ethernet networks. Well, in terms of capacity, the DPT can include a lot more outbuildings in the region, let's say, but SONET / SDH.

The family of xDSL-technologies victorious and essential subscriber lines of the telephone line of the centralized coronation. So that such a network has become self-sufficient, with the attributes of a network technology - and it is the first for everything: efficient access to the Internet, interactive communication with subscribers, in the concept of xDSL there are three cardinal tasks: a significant increase in the speed of transmission, a wider data bandwidth, on richly raised rіven like zvezku! The first task is to compete for the xDSL-modem conversion rate, the other - for the unique information encoding rate, the third - for the digital signal processing method. Thus, the xDSL family is rightfully occupying its niche among the most demanding framing technologies.

There are two multiplexing methods in the PON technology with the help of the optical network: WDM multiplexing / demultiplexing and the low hour multiple access (TDMA) method. WDM multiplexing - ce khvilyovye spectral amplification of the laser stream іnfrachervonyh khvil in one fibre. The method of multiple (collective) access with timchasovym podіl vikoristovuє special mechanism of arbitration, which includes the fallout of the blocking of information flows in the main channel of data transmission. As a standard, PON networks operate in an interface with Ethernet formats, ensuring that the “remaining mile” is safe on the subscriber path, an effective rozpodіl recognized for serving the service for the principle of “optics to the house” (FTTH). The PON architecture is trivial. Є one active central OLT (optical line terminal) with a laser transceiver module (transiver) and without active remote subscriber nodes ONT (optical network terminal, ITU-T) or ONU (optical network unit, IEEE) with its own laser transceiver module ). Between them, the outbuildings are equipped with a passive optical medium, which does not require electricity and technical maintenance and is composed of optical cables and optical splitters. Calling source of information for OLT є Internet provider and cable television. WDM multiplexes and TDMA are installed at the central and subscriber nodes. Low streams are transmitted from the OLT core, which are composed of WDM packed signals on the lengths of 1490 nm and 1550 nm with a specific ONT addressing. Qi streams come to the subscriber's skin, deformation is filtered for the ONT address with an output to a specific subscriber. Zvorotniy (viskhіdniy) stream from all subscriber extensions is transmitted on the usual wave of 1310 nm. Axis in this potency and victorious way of multiple access at a low hour, so that you can turn off the possibility of switching signals in different coristuvachiv. All ONTs are synchronized to the outer clock domain and the skin ONT sees the first clock domain. The ONT vuzol is obliged to put into its buffer the removal of its corystuvach data until the end, until the time domain arrives. When a time domain arrives, the ONT sends all the information accumulated in the buffer into the next flow, which is received by the central OLT node, and then the flows are demultiplexed for further access to the Internet provider. Interactive stream on 1490 / 1310nm waves via a media converter and a modem for twisting pairs are connected to a computer, an IP phone. Vihіdniy potіk whilі 1550nm ensures the work of cable television. Between OLT and ONT nodes can reach up to 20 km. The number of ONTs, which can be introduced into the OLT-merezh, to a maximum of 64 nodes.

At this article, typical technologies have come across and prompted the transfer of data. We rely on the understanding of our reader in the context that the most significant and most demanded concepts were considered from the most impersonal fringe designs.
Dyakuyu for razuminnya! Author.

The current system of central middle light, all inputs to it are primary directions, so in other words, aimed at shaping the schoolchildren to reduce the practice of information. Not vipadkovo in bіlshostі Reigning programs, scho viznachayut prіoritetnі napryamki rozvitku osvіti in Rosіyskіy Federatsії, Especially uwagi pridіlyaєtsya formuvannyu zagalnonavchalnih i zagalnokulturnih navichok robot uchnіv of іnformatsієyu i zasobami її obrobki scho staє mainly Strizhnev profesіynoї dіyalnostі vipusknikіv The Teaching zakladіv in Minds іnformatsіynogo suspіlstva, neobhіdnim component information culture. In his Cherga, pragnennya to formuvannya іnformatsіynoї culture at maybutnіh vipusknikіv only be sold to orієntatsії zagalnoї osvіti at about telekomunіkatsії nabuttya uchnyami knowledge that zasobi masovoї Informácie, vikoristannya zasobіv telekomunіkatsіy for pridbannya rіznih knowledge i CREATIVE samovirazhennya, otsіnku dostovіrnostі Informácie, rozvitok critical mislennya, spіvvіdnesennya Informácie that knowing, knowing how to properly organize the information process, evaluate and ensure information security.

Telecommunication systems may be of primary importance, not only in the system of global middle education, but play the main role practically in all spheres of life of the household. On the level of the development of the telecommunication informational space, the largest amount of traffic is superimposed on the development of the first lines of communication and the development of the lines of information technologies, which can rightly be seen in the quality technologies for transferring information.

pid I knit a string to understand the collection of wires, radio, optical and other communication channels, special channel-forming equipment, as well as centers and communication hubs, which ensure the functioning of these networks. Practically in all current merezhas, a link, which is formed during the construction of information and telecommunication systems, is present at the same time and works as a spiel of different merezhas due to their characteristics. Qi furnish in a significant world signify the strategy and tactics of the creation and selection of mesh information technologies.



Merezhev's information technologies developed simultaneously with the development of communication channels. At the beginning of the last century, the basis of telegraph and telephone communications became analogous wires and radio channels of electrical communications, as with the development of microelectronics, they began to be more and more replaced by digital fiber-optic lines, communications, information. Viniklo understands telecommunication technologies, as if uniting methods of rational organization of robots and telecommunication systems.

Telecommunication systems, which are victorious today in the system of global medium lighting, as a rule, are based on different factories of computers among themselves. The connected computers can be seen from different points of view. From one side, the association of computers - ce merezha computer. From the other side, - tse zasіb transfer of information in space, zasіb organіzatsії splkuvannya people. The very leaders of their power of computer networks are more and more often called telecommunications networks, substantiating, by themselves, their recognition, and not their particular power.

separate local and global telecommunication networks. As a rule, the local name is a measure that connects computers that live in the same life, the same organization, in the boundaries of the district, city, country. In other words, the most local is a fence, surrounded in space. Local borders are expanded in the sphere of illumination. Larger scales and other initial mortgages on the computer, connected in the local area. At the same time, modern technologies make it possible to use a wide range of computers that are not only in different locations, but also in everyday life, but also on different continents. Not vipadkovo can be used to learn about the initial deposits, which can be found in different lands, the computers of which are united in the local area. Moreover, local borders can be combined with computers of various primary mortgages, which allows talking about the basis of local borders in the sphere of education.

On the vіdmіnu vіd local, globіnі mеrіzhі do not mаyut expanse fencing. Before the global network, there can be connections from any computer. Whether a person can take access to information placed in this area. The largest known butt of the global telecommunication network is the Internet (INTERNET) network, access to which is being accessed by an increasing number of middle schools. The Internet has ceased to be a single global telecommunication network. Іsnuyt and іnshі, like FIDO merging or SPRINT merging.

In this way, the majority of scales and other primary foundations of the system of global average lighting can be localized, as well as the possibility of greater global dimensions.

With all the different information and telecommunication technologies, as well as ways to organize data with their transfers through the channels, the communication of the all-world information computer network of the Internet borrows the central area. More than that, today, it is practically the only global telecommunication network, which is everywhere victorious in the system of global middle education. Why is it rich in why to take the high speed and originality of transmission over the Internet of these various formats (text, graphics, images, sound, video and other). Merezha Internet provides the possibility of collective access to basic materials, which can be represented both by looking at the simplest assistants (electronic texts), and by looking at folding interactive systems, computer models, virtual learning media, etc.

The number of koristuvachiv and dzherel informatsii іnformatsії merezhi The Internet is constantly growing. In addition, there is a constant increase in the quality of their telecom services. Zavdyaki tsomu, high-quality access to the Internet will be limited not only by enterprises and organizations that work in the economic and other areas, but also by installing a global medium of education.

The current Internet is characterized by the presence of a serious problem of organizing a global search for information. Broken, so called, search systems, yakі according to the required word or slyly know the strength on those sides in the measure, in which the whole word is presented or poednannya. At the same time, regardless of the presence of the underlying search systems, the coristuvachevs spend a lot of time on the process of searching for information, as well as on processing and systematizing the removal of data.

The problem is particularly acute in the coverage: the coverage of information resources, although presented in a measure, is, as a rule, presented in a non-systematic way. Vіdsutnіst system pіdhodu to rozmіschennya podіbnih resursіv and takozh vіdsutnіst odnakovostі in virіshennі psycho-pedagogіchnih, tehnologіchnih, estetichnih, ergonomіchnih i іnshih number of problems that rozrobtsі ekspluatatsії osvіtnіh resursіv MEREZHI Іnternet only be sold to the practical nevikoristannya perevag telekomunіkatsіynih zasobіv of metoyu pіdvischennya yakostі osvіtnogo Process.

The most advanced communication technology and advanced service in computer networks has become the technology of computerized transmission and processing of information support, which ensures operational communication between people. Electronic mail (E-mail)- a system for saving and transferring information between people who can access a computer system. For the help of electronic mail, it is possible to transfer any information (text documents, images, digital data, sound recordings, etc.) over computer channels.

This service is implemented by:

Editing documents before transfer,

· Collection of documents and follow-up,

· Forwarding correspondence,

Re-verification and correction of pardons that are blamed for the transfer,

· I give confirmation of the rejection of correspondence by the addressee,

· Retrieving that information,

· Reviewing the rejected correspondence.

E-mail can be used for the compilation of participants in the initial process and the transfer of initial and methodological materials. The important power of electronic mail, let's add to the global media coverage, is the possibility of implementing asynchronous exchange of information. To win the email, to complete the mastering of a few commands of the mail client for editing, receiving and processing information. Respectfully, in the case of communication for additional electronic mail, there are more psychological and pedagogical problems, lower technical ones. On the right, in the fact that, with an uninterrupted human intercourse, information is transmitted not only for the help of language, other forms of communication are included here: mime, gestures, etc. Obviously, in order to convey emotions when listing, you can use “emoticons”, but without violating the problem of not distinguishing between words. Prote, the transition to the letter language is so positive drawing, like accuracy, squeezing of the thought and accuracy.

E-mail can be challenged by teachers for consultation, correction of control work and professional communication with colleagues. Additionally, there is a selection for conducting an electronic lesson in an asynchronous mode, if the text of the lesson is sent in advance in electronic form, the heroes from the recommended literature and other primary materials, and then consultations are carried out by e-mail.

The peculiarity and clarity of electronic mail and the ability to spread one and the same message to a great number of addressees.

A similar principle of distribution is victorious by another service of the Internet under the name distribution lists. This service operates in subscription mode. By subscribing to the list of subscriptions, the subscriber will receive additional electronic notifications for the selected topic on his mail screen. Lists of rozsilki vykonuyut in a number of Internet functions of periodic vidan.

In the global coverage system, for additional lists of distribution, you can organize the following "Virtual primary classes". The created senior group of schoolchildren explains the rules and methods of subscription, and they start working. Skin notifications addressed to the group, be it a participant, are automatically sent to all members of the group. One of the participants in such a group can be a teacher.

The main didactic feasibility of using the lists of distributions is the automatic distribution of primary and methodological materials and the organization of virtual primary classes.

The second popular service, which rely on modern telecommunication measures and implement the exchange of information between people, as a common interest, is teleconferences.

teleconference is a forum for organizing discussions and exchange of novelties on singing topics.

The teleconference allows publishing information for interests on special computers in the area. Information can be read by connecting to a computer and choosing a topic for discussion. Dali, for reasons, you can confirm the author of the article, or correct the personal information. In this manner, the discussion of the merezhev is organized, which is to be of a new character, the shards are saved for a short period of time.

Availability of audio and video setup (microphone, digital video camera, etc.), connected to a computer, allows you to organize computer audio and video conferences, more and more widely spread in the system of global medium lighting.

On the view of the lists of distributions based on the stasis of electronic mail, teleconferences and groups of news are processed in real time. The difference lies in the fact that the exchange of information is carried out in the off-line mode by the automatic distribution of electronic sheets. The server of news publishes all the news on the main doshtsi negajno, and saves them for a long time. In this way, teleconferences allow organizing a discussion both in on-line mode and in a closed mode. When organizing the main ones, take up the largest group of novelties, moderated by the teacher.

With the development of technical zasobіv computer merezh zbіlshuєtsya shvidkіst transfer і danih. Tse allow koristuvachs, connected to the border, not only to exchange text messages, but also to transfer sound and video images to the meaning. One of the representatives of the program that implements communication through the network is the NetMeeting program, which is included in the Internet Explorer package. MS NetMeeting is a special informatization, yakі realizing the possibility of direct communication via the Internet.

The next thing to note is that for the implementation of a sound connection, it is necessary to have a high-quality technical equipment: a sound card, a microphone and acoustic systems. To transfer video images, you need a video card and a camera, or only a camera that supports the Video for Windows standard.

The main directions for using MS NetMeeting in the initial process are:

· Organization of virtual meetings and consultations in real mode for an hour, including voice communication and transmission of video images of participants;

· Exchange of information in text and graphic mode;

· Organization of joint work with initial information in on-line mode;

· Peresilannya primary and methodical information from viewing files in real mode for an hour.

One of the most important telecommunications technologies raspodіlena obrobka danih. In this way, personal computers are victorious in the areas of vindication and storage of information. If the stench is connected by channels to communication, then it gives the possibility of spreading their resources in different functional spheres of activity and changing the technology of data processing into direct decentralization.

The most folding systems of distributed data processing are connected to various information services and systems of global recognition (news services, national and global information and search systems, databases and knowledge banks, etc.).

It is extremely important for the global average coverage of services, implemented in computer systems, search automation. Vikoristovuyuchi specializes in the field of information and search systems, you can, in the shortest terms, know the cicatrices of the bridge in the light information towers.

The main didactic aims are to develop similar resources acquired through telecommunication channels, to teach schoolchildren and to improve knowledge, to form and consolidate knowledge, to form and thoroughly learn and learn, to control and master.

The selection of the most recent published information resources on this day, most of which have been published on the Internet, allows:

· Organize various forms of activity of schoolchildren for independent learning and giving knowledge;

· Zastosovuvati entire spectrum mozhlivostey Suchasnyj іnformatsіynih i telekomunіkatsіynih tehnologіy in protsesі vikonannya rіznomanіtnih vidіv navchalnoї dіyalnostі, in addition chislі such yak in Registration, zbіr, zberіgannya, obrobka Informácie, іnteraktivny dіalog, modelyuvannya ob'єktіv, yavisch, protsesіv, funktsіonuvannya laboratorіy (vіrtualnih, with remote access to real possession) that in .;

· Vykoristovuvaty in the initial process of feasibility of multimedia technologies, hypertext and hypermedia systems;

· Diagnosing the intellectual ability of schoolchildren, as well as the level of their knowledge, learning, skills, training level to a specific occupation;

· Carry out training, automate the process of monitoring the results of initial activity, training, testing, generating tasks in the field according to the intellectual level of a particular study, the level of yoga knowledge, learning, learning, peculiarities of yoga motivation;

· Create minds for the development of independent primary activity of schoolchildren, for self-training, self-development, self-development, self-enlightenment, self-realization;

· Practice in today's telecommunication environments, ensure the management of information flows.

Such a rank, computernі telekomunіkatsії - tsa not Tіlki Lamannaya Square in Invortanya, Shaho Doszoloє in contact the robot И інфорацієЮ, ale, z іншой Інферова, computernі telekomunіkatsії - Це сеперевестьсие Spe_kvykovnya people one with one, Seredovo ІNTeraktynnoye vodimodіїn , professional and other groups of correspondents are independent of their professions.

Unfortunately, there are a lot of methods of effective selection of telecommunication technologies in the process of training schoolchildren, until now, not in the world, teachers are winning. The present teacher is guilty of the crime of learning about the new computer technologies of the mother to find out about the possibilities of their choice in the initial process. The achievement of theoretical and practical mastering by teachers of various methods of using telecommunication technologies in the process of training can become the basis for improving the efficiency and quality of training, shaping and further perfecting one's professional skills.

Topic 4.2. Information resources of the Internet

Informatization is one of the main factors, which makes it difficult to educate yourself. The teaching methods are being changed, the role of the teacher is changing, and the knowledge is transformed step by step from a simple translator into an organizer of the activity of learning from the acquisition of new knowledge, and the beginner. Іstotnym іnformatizatsії є osvetnі іnformatsiynі resources, publіkovanі in the Internet. Not exactly correct, svoєchasne and pre-rechno vykoristannya vsmіma fahіvtsy, yakі pratsyuyut in the system zagalnoї srednої osvіti, є zaporukoy efficiency training schoolchildren.

Let's take a look at the robot with different information resources of computer networks more report.

Similar ICT features allow you to bring into the work the setting of a high average light:

· Using the information posted on the primary and scientific sites of the Internet (Web-sites), for the preparation of primary and methodological materials. Abstracts and recaps;

· Organization of representation of the initial mortgage in the Internet;

· Creation of a site dedicated to the school discipline and placement of yoga in the Internet;

· Placement of special Web-sites for readers and schoolchildren.

Most of the information resources on the Internet are represented by the so-called Web-sides, organized according to the principles of hypermedia.

Web-side - the document to revenge:

· Text formatting;

· Multimedia objects (graphics, sound, video clips);

· Active components, building a robot on a computer for a program embedded in them.

As a rule, the Web-side - ce to file a collapsible document, which is composed of a whole group of files.

Within the framework of one side, it is important to list all the necessary information, most of all, to present information to a set of dozens or hundreds of Web-sites, tied together by a single theme, with a formal style of design and mutually powerful hypertext. Such a set is called a Web site or a Web node.

The skin of the Web site has its own home page, as it is called cob or home.

The original Web-site manages the supply document only for the client's needs. Establish Web-sites that independently transmit updated information for the registration and subscription of the client.

Numerous Web-sites and Web-sides are saved on the great anonymous so-called WWW-servers, that are computers, on which special security software is installed.

Koristuvachs, who can access to the border, take away and look at information from Web-sides for additional software clients for the all-world web, like they took away the specific name of Web-browsers (browsers, lookers).

To remove the side, the browser sends a computer request to the Web server, on which the necessary document is saved. At the request to the server, the program hung and reviewed the necessary Web-side, or information about the command, which is unavailable for other reasons. The interaction between the client and the server depends on the rules, otherwise, apparently, on the application protocol.

A Web document can include formatting text, graphics, and hypertext messages on various Internet resources. In order to realize all the possibilities and secure the independence of information resources in the form of system software security of a personal computer, for which the stench will be overlooked, a special language was broken up. Vіn having omitted the name HyperText Markup Language (HTML) or Mova markup hypertext.

A skinned file on the Internet also has its own unique address. Vin is called URL. URL (Universal Resource Locator) - addresses of any file in the array. In the URL, name the protocol for which it is necessary to get to the file, the computer address from the assigned ones, to run the server program on the new one, and the next way to the file.

Until recently, two great companies - Netscape Communications and Microsoft - were the main competitors in the release of a set of software clients for robots and information resources on the Internet. The first company's product is called Netscape Communicator, and Netscape Navigator is a popular browser program. Microsoft's Internet Explorer client software package is called Internet Explorer. The browser in this kit is otrimav one-menu name.

In the world of development of the Internet, the increasing number of publications in new information resources is becoming more and more important, the problem of searching for the necessary resources. For the system of global median education, it is considered that such information resources, published in the media, could in practice improve the efficiency of the system for training schoolchildren.

A similar search for foundations on the interplay with information resources published on the all-world telecommunication network of the Internet.

The way to the majestic informational baggage of people, which is saved in libraries, music libraries, film libraries, lies through catalog cards. On the Internet, similar mechanisms are being used to retrieve the necessary information. Go about the poshukovyh servers, sluzhbovtsіv vdpravnoy point for koristuvachiv. From a clear point of view, one can speak about them as if it were just one special service of the Internet.

Poshukovі server dosit numerical and raznomanіtnі. It is accepted to separate search indexes and catalogs. Server-indexes regularly read from most of the web pages of the Internet ("index" їх), and place them more or less frequently in the global data base. Koristuvachi poshukovoy server can zdіysnyuvat povnotekstovy search on tsіy data bases, vykoristuvuyuchi key words, yakі sossuyutsya їх їхікавіт. The appearance of the results of a search is made up of the recommendations of the courtesy of the pages and their address (URL), the design of the visual hypertextile. Practice with poke servers of this type by hand, if you are kind enough to know what you yourself want to know.

Catalogs have grown from lists of cіkavih messages, bookmarks (bookmarks). As a matter of fact, the right stench is a bagatarіvnevu smyslovu klasifіkatsiyu posilan, pobudovanu for the principle of "from the outspoken to the concrete". Other messages are accompanied by a short description of the information resource. As a rule, a possible search in the names of headings (categories) and descriptions of resources behind keywords. Catalogs are the same, if you don’t know clearly what you are joking about. Moving from the most important categories to the most private, you can choose the most multimedia resource on the Internet next to know. Poshukov catalogs are closely related to thematic library catalogs, dictionaries-thesauruses or biological classifications of creatures and roslin. The maintenance of search catalogs is often automated, but until now, the classification of resources is done manually by the head rank.

Poshukovі catalogs buvayut wild recognition and specialization. Poshukov's catalogs of high profile recognition include information resources of the most diverse profile. Specialized catalogs combine only resources related to song topics. We often try to reach the best resource pool in our own areas and encourage more adequate rubrication.

The Internet has a lot of catalogs and portals, so they can collect resources that will be used in the system of global middle education.

Selection of such catalogs and information resources on the Internet for:

· Operational security of teachers, students and fathers with up-to-date, timely and reliable information, which will support the goals and freedom of enlightenment;

· Organization of various forms of activity of scientists, connected with independent education by knowledge;

· Placing modern information and telecommunication technologies (multimedia technologies, virtual reality, hypertext and hypermedia technologies) at the main office;

· Objective vimiryuvannya, assessment and forecast of the effectiveness of training, setting the results of the primary activity of schoolchildren with the help of the sovereign lighting standard;

· Management of the initial activity of learning, adequately equal to the knowledge, improvement and skill, as well as the peculiarities of the yoga motivation to the training;

· A creation of minds for individual independent education of schoolchildren;

· Permanent and operational communication of teachers, students and fathers, aimed at improving the effectiveness of teaching;

· Organization of the effective activity of the installations of the global coverage in the best possible way before being adopted in the country by the normative provisions and changing concepts.

The most important information resources of the Internet can be used as additional resources for the audience in the global middle school. SERIUM SEVITSIVI VASHNET-portal, Yaki Samі ІNTERnet-portal, Yaki Selfі є catalogs Resource, Servіsnі Ta ONSTRUMENTII DRAWS, ELECTRONNIANIA PAPERIVYKH VIDYA, ELECTRONNI IN TASTVERIVA DETAILS І DETAILS VIMІRUYUVENNE RESULTS OF INTROSTNY, RESERSIY, SHO MISTYNE NOVINIE .

The largest number of information resources are aimed at students by teachers and schoolchildren in the course of the initial process. Some of these resources are recognized for selection in the traditional system of training up to state educational standards and medical programs from skin training discipline. Other educational resources are allocated for schoolchildren's work before the last hour and after school hours, the destruction of knowledge and independent education (for schoolchildren and applicants). There are resources of a preliminary and encyclopedic character, as well as the ability to win, control and evaluate the results of initial activity.

Vikoristovuyuchi іnformatsіynі resources MEREZHI Іnternet, teachers zmozhut bіlsh efektivnosti upravlyati pіznavalnoyu dіyalnіstyu shkolyarіv promptly vіdstezhuvati result navchannya i vihovannya, priymati obgruntovanі i dotsіlnі come in schodo pіdvischennya rіvnya navchenostі i yakostі knowledge uchnіv, tsіlespryamovano vdoskonalyuvati pedagogіchnu maysternіst, mother rapid targeted access to neobhіdnoї Informácie The Teaching, methodical and organizational character. Teachers, as they are engaged in the development of the power of information resources, increase the possibility of extracting fragments from the light resources published in the media, and the necessary assistance and access to copyright.

Access of students to information resources on the Internet should be provided to schoolchildren with the main and supplementary primary material necessary for education in schools, education in the field of vikladach, self-study education and organization of education. Thanks to such resources, schoolchildren have the opportunity to quickly learn about innovations, learn about holding olympiads, competitions, consult, communicate with teachers and fellow students. Applicants can find in the information resources of the Internet the information necessary for further education - information about institutions, universities and academies, terms and conditions for entering, basic and methodological materials necessary for preparing for admission to admissions.

Batki Shkolyarіv І Represents Maddler, reaches Іnformatyinimi resources Merezhі Intternet, Zakomi D_nashnya federal і і і і и процінования и и и истовый истения світити, от обравий подагогів, Nadati, Issue on the pivotchnya Yakosti Zagalino SEEDNOY.

Vikoristovuyuchi іnformatsіynі resources MEREZHI Іnternet, admіnіstratsіya osvіtnіh SET zmozhe priymati efektivnі upravlіnskі rіshennya, spіvvіdnosyachi їh of chinnim zakonodavstvom i normative documents ob'єktivno otsіnyuvati dіyalnіst pedagogіv promptly vzaєmodіyati of Colleges, pіdvischivshi zagalny rіven planuvannya i admіnіstruvannya dіyalnostі The Teaching mortgage.

The main part of the information resources is dedicated to the promotion of the effectiveness of the training of schoolchildren in the general education disciplines of the program of the global secondary education.

It is important to understand how the use of information resources in the Internet can be first considered by teachers with the main components of the implemented methodical system of training - goals, methods, organizational forms and zastosovuvannye teaching methods. Vykoristovuvani resources due to fit into the whole system, not super-ready and compatible with its components.

Particular respect is due to buti attached to the selection and development of methods for developing the selection of information resources in the Internet. In the number of such methods, I can register Bethiista Skolers in Involutionary ІNFORMAKI, significantly svkolai zori, the city of Zoruyvnya, the design and dositnitzka dіyalnіst schazhnіv, sacrificed at the resources of the Merezhі Intternet, Vicaristani Komunіkatiyi components of such resource for the inaccier Spіlkuvannya schistribiv і pedagogiv.

Topic 4.3. Information about Internet portals

The connection of schools to the Internet will give rise to a number of problems, which will require a nega vyshennia. Among them, the training and retraining of teachers to the development of professional activities with the help of telecommunication stations, the provision of a system for illuminating such information resources, publishing in the Internet, as well as informing teachers and academics.

At tsomu straight ahead, it’s already richly crushed. A system of training teachers in the field of informatization of education, creation of education portals, expansion and publication of electronic education resources in practical terms of school disciplines has been formed.

Illuminate the portals, created in the Internet, to promote more and more impact on the promotion of the effectiveness of ICT technologies in the education of schoolchildren.

In poperednіh rozdіlah tsogo Electonics Vidanov vzhe zaznachalosya scho vіdsutnіst system pіdhodu to rozmіschennya іnformatsіynih resursіv in MEREZHI Іnternet and takozh vіdsutnіst odnakovostі in virіshennі psycho-pedagogіchnih, tehnologіchnih, estetichnih, ergonomіchnih i row іnshih problems rozrobtsі that vikoristannі osvіtnіh іnformatsіynih resursіv only be sold to the practical non-existent achievements of telecommunication services with the method of increasing the quality of the lighting process in the system of global average lighting.

Frequently, the development of these problems can be developed on the basis of the development and promotion of complex informational lighting portals (integration of Web-systems). Whose mind is like that portals, Combining in itself the main information resources, which may have a high illumination value, could become an "entry point" in the current telecommunication systems for all systems, so what else is connected with illumination.

The choice of the portal system allows the most effective organization of the work of teachers, the shards on the portals of the selection and the systematization of the most requested resources. Vikoristovuyuchi їх, vchitelі, uchnі and batki can take access to the same basic and methodical materials, spend an hour searching for the necessary information, and learn about the peculiarity of the classification of information resources in the Internet.

The selections on the portals can be posted on the resources to find contact information about the establishment of education and other teachers, news in the field of education, announcements about olympiads, competitions, conferences and other visits, in which teachers and schoolchildren regularly take part.

The largest number of the most important information resources, the choice of which has increased the effectiveness of the global media coverage of cataloging on the world's Internet portals. In the present hour in Russia, the organizational scheme for the creation of a system of lighting portals has already been developed, which has its own peculiarities. The organizational scheme of the creation of the system of lighting portals includes:

Horizontal portal "Knowledge Island" (www.edu.ru),

· Profiled vertical portals behind the curtains of knowledge: humanitarian, economic and social, natural and scientific, engineering, pedagogical, medical, agricultural and other,

· Specialized vertical portals: book viewing, single sleep, novelty and information.

Horizontal portal "Knowledge Island" secure:

· Navigation on all vertical portals;

· Search for multimedia-information in the gallery of the Internet;

· Personification and personal adaptation of the interface as a way of choosing a coristuvachy power category (the one you are learning, vikladach, administrator, retailer of the portal) and the designation of the level of illumination, and the way of designing a personal interface;

· Forming and priming of vertical portals for lighting equals;

· Collection of information in the field of education (legislation, punishments, normative documents, standards, translation of specialties, federal set of assistants, database of all primary mortgages and other);

· Publication of the press reviewed by the reader;

· A novelty line in the gallery;

· Organization of forums, discussion groups, lists of roses.

Profile vertical portals due material for all levels of education: pochatkovo school, middle school, pochatkovo vocational education, secondary vocational education, higher education, supplementary education, post-slavuz education.