Free Essay

Network

In:

Submitted By someone
Words 2313
Pages 10
‫اﻟﺸﺒﻜﺎت اﻟﻼﺳﻠﻜﻴﺔ : دورة دراﺳﻴﺔ ﻓﻲ أرﺑﻊ‬ ‫ﺣﻠﻘﺎت‬
‫اﻟﺤﻠﻘﺔ اﻷوﻟﻰ: ﻧﻈﺮة ﻋﺎﻣﺔ ﺣﻮل اﻟﺸﺒﻜﺎت اﻟﻼﺳﻠﻜﻴﺔ‬
‫ﻳﻤﺘ‪j‬ﺪ ﻧﻄ‪jj‬ﺎق ﺗﻘﻨﻴ‪jj‬ﺎت اﻟﺸ‪jj‬ﺒﻜﺎت اﻟﻼﺳ‪j‬ﻠﻜﻴﺔ ﻣ‪jj‬ﻦ ﺷ‪jj‬ﺒﻜﺎت اﻟﺼ‪jj‬ﻮت واﻟﺒﻴﺎﻧ‪jj‬ﺎت‬ ‫اﻟﻌﺎﻣ‪jjj‬ﺔ، اﻟﺘ‪jjj‬ﻲ ﺗﺴ‪jjj‬ﻤﺢ ﻟﻠﻤﺴ‪jjj‬ﺘﺨﺪﻣﻴﻦ ﺑﺘﺄﺳ‪jjj‬ﻴﺲ اﺗﺼ‪jjj‬ﺎﻻت ﻻﺳ‪jjj‬ﻠﻜﻴﺔ ﻋﺒ‪jjj‬ﺮ‬ ‫اﻟﻤﺴ‪jjj‬ﺎﻓﺎت اﻟﻄﻮﻳﻠ‪jjj‬ﺔ، إﻟ‪jjj‬ﻰ ﺗﻘﻨﻴ‪jjj‬ﺎت اﻟﻀ‪jjj‬ﻮء ﺗﺤ‪jjj‬ﺖ اﻷﺣﻤ‪jjj‬ﺮ واﻟﺘ‪jjj‬ﺮددات‬ ‫اﻟﺮادﻳﻮﻳﺔ اﻟﻤﺜﻠﻰ ﻣﻦ أﺟﻞ اﻻﺗﺼﺎﻻت اﻟﻼﺳﻠﻜﻴﺔ ﻗﺼﻴﺮة اﻟﻤﺪى. ﺗﺘﻀ‪j‬ﻤﻦ‬ ‫اﻷﺟﻬ‪jjj‬ﺰة اﻟﺸ‪jjj‬ﺎﺋﻌﺔ اﻟﻤﺴ‪jjj‬ﺘﺨﺪﻣﺔ ﻟﻠﺸ‪jjj‬ﺒﻜﺎت اﻟﻼﺳ‪jjj‬ﻠﻜﻴﺔ أﺟﻬ‪jjj‬ﺰة اﻟﻜﻤﺒﻴ‪jjj‬ﻮﺗﺮ‬ ‫اﻟﻤﺤﻤﻮﻟ‪jj‬ﺔ، وأﺟﻬ‪jj‬ﺰة اﻟﻜﻤﺒﻴ‪jj‬ﻮﺗﺮ اﻟﻤﻜﺘﺒﻴ‪jj‬ﺔ، وأﺟﻬ‪jj‬ﺰة اﻟﻜﻤﺒﻴ‪jj‬ﻮﺗﺮ اﻟﻤﺤﻤﻮﻟ‪jj‬ﺔ‬ ‫ﺑﺎﻟﻴ‪jjjj‬ﺪ، وأﺟﻬ‪jjjj‬ﺰة اﻟﻤﺴ‪jjjj‬ﺎﻋﺪ اﻟﺸﺨﺼ‪jjjj‬ﻲ اﻟﺮﻗﻤ‪jjjj‬ﻲ )‪ ،(PDA‬واﻟﻬﻮاﺗ‪jjjj‬ﻒ‬ ‫اﻟﺨﻠﻮﻳﺔ، وأﺟﻬﺰة اﻟﻜﻤﺒﻴﻮﺗﺮ اﻟﻤﺴﺘﻨﺪة ﻟﻘﻠﻢ، وأﺟﻬﺰة اﻟﻨﺪاء. ﺗﺨﺪم اﻟﺘﻘﻨﻴﺎت‬ ‫اﻟﻼﺳﻠﻜﻴﺔ اﻟﻌﺪﻳﺪ ﻣﻦ اﻷﻏﺮاض اﻟﻌﻤﻠﻴﺔ. ﻣﺜ ً، ﻳﻤﻜﻦ ﻟﻤﺴ‪j‬ﺘﺨﺪﻣﻲ اﻟﻬ‪j‬ﺎﺗﻒ‬ ‫ﻼ‬ ‫اﻟﺨﻠﻮي اﺳﺘﺨﺪام هﻮاﺗﻔﻬﻢ اﻟﺨﻠﻮﻳﺔ ﻟﻠﻮﺻﻮل إﻟﻰ اﻟﺒﺮﻳﺪ اﻹﻟﻜﺘﺮوﻧ‪j‬ﻲ. آﻤ‪j‬ﺎ‬ ‫ﻳﻤﻜﻦ ﻟﻠﻤﺴﺎﻓﺮﻳﻦ اﻟﺬﻳﻦ ﻣﻌﻬﻢ أﺟﻬﺰة آﻤﺒﻴﻮﺗﺮ ﻣﺤﻤﻮﻟﺔ اﻻﺗﺼﺎل ﺑﺈﻧﺘﺮﻧﺖ‬ ‫ﻣ‪jj‬ﻦ ﺧ‪jj‬ﻼل ﻣﺤﻄ‪jj‬ﺎت أﺳﺎﺳ‪jj‬ﻴﺔ ﻣﺜﺒﺘ‪jj‬ﺔ ﻓ‪jj‬ﻲ اﻟﻤﻄ‪jj‬ﺎرات، وﻣﺤﻄ‪jj‬ﺎت اﻟﺴ‪jj‬ﻜﻚ‬ ‫اﻟﺤﺪﻳﺪﻳ‪jj‬ﺔ، واﻷﻣ‪jj‬ﺎآﻦ اﻟﻌﺎﻣ‪jj‬ﺔ اﻷﺧ‪jj‬ﺮى. ﻓ‪jj‬ﻲ اﻟﺒﻴ‪jj‬ﺖ، ﻳﻤﻜ‪jj‬ﻦ ﻟﻠﻤﺴ‪jj‬ﺘﺨﺪﻣﻴﻦ‬ ‫وﺻﻞ اﻷﺟﻬﺰة ﻋﻠﻰ ﺳﻄﺢ اﻟﻤﻜﺘﺐ ﻟﻤﺰاﻣﻨﺔ اﻟﺒﻴﺎﻧﺎت وﻧﻘﻞ اﻟﻤﻠﻔﺎت.‬ ‫ﺗﻌﺮﻳﻒ اﻟﻤﻘﺎﻳﻴﺲ‬ ‫ﻟﺘﺨﻔﻴﺾ ﺗﻜﺎﻟﻴﻒ اﻟﺘﻘﻨﻴﺎت اﻟﻼﺳﻠﻜﻴﺔ، واﻟﺘﺄآ‪j‬ﺪ ﻣ‪j‬ﻦ ﺗﻮاﻓﻘﻬ‪j‬ﺎ، ودﻋ‪j‬ﻢ اﻟﺘﺒﻨ‪j‬ﻲ‬ ‫واﺳ‪j‬ﻊ اﻻﻧﺘﺸ‪j‬ﺎر ﻟﻬ‪j‬ﺎ، ﻓ‪j‬ﺈن ﻣﺆﺳﺴ‪j‬ﺎت ﻣﺜ‪j‬ﻞ ‪Institute of Electrical‬‬ ‫)‪ ،and Electronics Engineers (IEEE‬و ‪Internet‬‬ ‫)‪ ،Engineering Task Force (IETF‬و ‪Wireless Ethernet‬‬ ‫)‪ ،Compatibility Alliance (WECA‬و ‪International‬‬ ‫)‪ Telecommunication Union (ITU‬ﺗﺸﺘﺮك ﺑﻌﺪة ﺟﻬﻮد رﺋﻴﺴﻴﺔ‬ ‫ﻟﺘﻮﺣﻴﺪ اﻟﻤﻘﺎﻳﻴﺲ. ﻣ‪j‬ﺜ ً، ﺗﻘ‪j‬ﻮم ﻣﺠﻤﻮﻋ‪j‬ﺎت اﻟﻌﻤ‪j‬ﻞ ‪ IEEE‬ﺑﺘﻌﺮﻳ‪j‬ﻒ آﻴﻔﻴ‪j‬ﺔ‬ ‫ﻼ‬ ‫ﻧﻘﻞ اﻟﻤﻌﻠﻮﻣﺎت ﻣﻦ ﺟﻬﺎز إﻟﻰ ﺁﺧﺮ)ﺳﻮاء ﺗ‪j‬ﻢ اﺳ‪j‬ﺘﺨﺪام ﻣﻮاﺟ‪j‬ﺎت رادﻳﻮﻳ‪j‬ﺔ‬ ‫أو اﻟﻀ‪jj‬ﻮء ﺗﺤ‪jj‬ﺖ اﻷﺣﻤ‪jj‬ﺮ، ﻣ‪jj‬ﺜﻼ( وآﻴ‪jj‬ﻒ وﻣﺘ‪jj‬ﻰ ﻳﺠ‪jj‬ﺐ اﺳ‪jj‬ﺘﺨﺪام وﺳ‪jj‬ﻴﻠﺔ‬ ‫ً‬ ‫953‬

‫اﻹرﺳ‪jj‬ﺎل ﻟﻼﺗﺼ‪jj‬ﺎﻻت. أﺛﻨ‪jj‬ﺎء ﺗﻄ‪jj‬ﻮﻳﺮ ﻣﻘ‪jj‬ﺎﻳﻴﺲ اﻟﺸ‪jj‬ﺒﻜﺎت اﻟﻼﺳ‪jj‬ﻠﻜﻴﺔ، ﻓ‪jj‬ﺈن‬ ‫ﻣﺆﺳﺴﺎت ﻣﺜﻞ ‪ IEEE‬ﺗﻬ‪j‬ﺘﻢ ﺑ‪j‬ﺈدارة اﻟﻄﺎﻗ‪j‬ﺔ، وﻋ‪j‬ﺮض اﻟﻨﻄ‪j‬ﺎق اﻟﺘ‪j‬ﺮددي،‬ ‫واﻷﻣﺎن، وﻗﻀﺎﻳﺎ أﺧﺮى ﻓﺮﻳﺪة ﻟﺸﺒﻜﺎت اﻻﺗﺼﺎل اﻟﻼﺳﻠﻜﻴﺔ.‬ ‫أﻧﻮاع ﺷﺒﻜﺎت اﻻﺗﺼﺎل اﻟﻼﺳﻠﻜﻴﺔ‬ ‫ﻣﺜﻞ اﻟﺸﺒﻜﺎت اﻟﺴﻠﻜﻴﺔ، ﻳﻤﻜﻦ ﺗﺼ‪j‬ﻨﻴﻒ اﻟﺸ‪j‬ﺒﻜﺎت اﻟﻼﺳ‪j‬ﻠﻜﻴﺔ ﺿ‪j‬ﻤﻦ أﻧ‪j‬ﻮاع‬ ‫ﻣﺨﺘﻠﻔﺔ اﺳﺘﻨﺎدا إﻟﻰ اﻟﻤﺴﺎﻓﺎت اﻟﺘﻲ ﺳﻴﺘﻢ إرﺳﺎل اﻟﺒﻴﺎﻧﺎت ﻋﺒﺮهﺎ آﻤﺎ ﻳﻠﻲ:‬ ‫ً‬ ‫1- ﺷﺒﻜﺎت اﻻﺗﺼﺎل اﻟﻼﺳﻠﻜﻴﺔ واﺳﻌﺔ اﻟﻨﻄﺎق )‪.(WWAN‬‬ ‫2- )‪.Wireless metropolitan area networks (WMAN‬‬ ‫3- ﺷﺒﻜﺎت اﻻﺗﺼﺎل اﻟﻼﺳﻠﻜﻴﺔ اﻟﻤﺤﻠﻴﺔ )‪.(WLAN‬‬ ‫4- )‪ Wireless personal area networks (WPAN‬ﺷ‪jj‬ﺒﻜﺎت‬ ‫اﻻﺗﺼﺎل اﻟﻼﺳﻠﻜﻴﺔ اﻟﺸﺨﺼﻴﺔ.‬ ‫1- ﺷﺒﻜﺎت اﻻﺗﺼﺎل اﻟﻼﺳﻠﻜﻴﺔ واﺳﻌﺔ اﻟﻨﻄﺎق )‪(WWAN‬‬ ‫ﺗﻤﻜ‪jj‬ﻦ ﺗﻘﻨﻴ‪jj‬ﺎت ‪ WWAN‬اﻟﻤﺴ‪jj‬ﺘﺨﺪﻣﻴﻦ ﻣ‪jj‬ﻦ ﺗﺄﺳ‪jj‬ﻴﺲ اﺗﺼ‪jj‬ﺎﻻت ﻻﺳ‪jj‬ﻠﻜﻴﺔ‬ ‫ّ‬ ‫ﻋﺒﺮ اﻟﺸﺒﻜﺎت اﻟﻌﺎﻣ‪j‬ﺔ اﻟﺒﻌﻴ‪j‬ﺪة أو اﻟﺸ‪j‬ﺒﻜﺎت اﻟﺨﺎﺻ‪j‬ﺔ. ﻳﻤﻜ‪j‬ﻦ اﺳ‪j‬ﺘﺨﺪام ه‪j‬ﺬﻩ‬ ‫اﻻﺗﺼﺎﻻت ﻋﺒﺮ ﻣﻨﺎﻃﻖ ﺟﻐﺮاﻓﻴﺔ واﺳﻌﺔ، ﻣﺜﻞ اﻟﻤﺪن واﻟﺪول، ﻣﻦ ﺧﻼل‬ ‫اﺳﺘﺨﺪام اﻟﻤﻮاﻗﻊ ﻣﺘﻌﺪدة اﻟﻬﻮاﺋﻴﺎت أو أﻧﻈﻤﺔ اﻷﻗﻤﺎر اﻟﺼﻨﺎﻋﻴﺔ اﻟﻤﺘﻮﻓﺮة‬ ‫ﻣ‪jj‬ﻦ ﻗﺒ‪jj‬ﻞ ﻣ‪jj‬ﻮﻓﺮي اﻟﺨﺪﻣ‪jj‬ﺔ اﻟﻼﺳ‪jj‬ﻠﻜﻴﺔ. ُﻌ‪jj‬ﺮف ﺗﻘﻨﻴ‪jj‬ﺎت ‪ WWAN‬اﻟﺤﺎﻟﻴ‪jj‬ﺔ‬ ‫ﺗ‬ ‫ﺑﺄﻧﻈﻤ‪jj‬ﺔ اﻟﺠﻴ‪jj‬ﻞ اﻟﺜ‪jj‬ﺎﻧﻲ )2‪ .(G‬ﺗﺘﻀ‪jj‬ﻤﻦ أﻧﻈﻤ‪jj‬ﺔ اﻟﺠﻴ‪jj‬ﻞ اﻟﺜ‪jj‬ﺎﻧﻲ ‪Global‬‬ ‫)‪ ،System for Mobile Communications (GSM‬و‬ ‫)‪ ،Cellular Digital Packet Data (CDPD‬و ‪Code‬‬ ‫)‪ .Division Multiple Access (CDMA‬ﺗﺘﻀ‪jjj‬ﺎﻓﺮ اﻟﺠﻬ‪jjj‬ﻮد‬ ‫ﻟﻼﻧﺘﻘﺎل ﻣﻦ ﺷﺒﻜﺎت اﺗﺼﺎل اﻟﺠﻴﻞ اﻟﺜﺎﻧﻲ، واﻟﺘ‪j‬ﻲ ﻳﻤﺘﻠ‪j‬ﻚ ﺑﻌﻀ‪j‬ﻬﺎ إﻣﻜﺎﻧﻴ‪j‬ﺔ‬ ‫ﺗﺠ ‪ّ j‬ل ﻣﺤ‪jj‬ﺪودة ﺑﺎﻹﺿ‪jj‬ﺎﻓﺔ إﻟ‪jj‬ﻰ ﻋ‪jj‬ﺪم اﻟﺘﻮاﻓ‪jj‬ﻖ ﺑ‪jj‬ﻴﻦ ﺑﻌﻀ‪jj‬ﻬﺎ، إﻟ‪jj‬ﻰ ﺗﻘﻨﻴ‪jj‬ﺎت‬ ‫ﻮ‬ ‫063‬

‫اﻟﺠﻴﻞ اﻟﺜﺎﻟﺚ اﻟﺘ‪j‬ﻲ ﺳ‪j‬ﺘﺘﺒﻊ ﻣﻘﻴﺎﺳ‪j‬ﺎ ﻋﻤﻮﻣﻴ‪j‬ﺎ ﺑﺎﻹﺿ‪j‬ﺎﻓﺔ إﻟ‪j‬ﻰ ﺗ‪j‬ﻮﻓﻴﺮ إﻣﻜﺎﻧﻴ‪j‬ﺔ‬ ‫ً‬ ‫ً‬ ‫اﻟﺘﺠ ّل ﺣﻮل اﻟﻌﺎﻟﻢ. ﺗﺸ ّﻊ ‪ ITU‬ﺑﻨﺸﺎط ﺗﻄ‪j‬ﻮﻳﺮ ﻣﻘﻴ‪j‬ﺎس ﻋﻤ‪j‬ﻮﻣﻲ ﻟﻠﺠﻴ‪j‬ﻞ‬ ‫ﺠ‬ ‫ﻮ‬ ‫اﻟﺜﺎﻟﺚ.‬ ‫2- )‪Wireless metropolitan area networks (WMAN‬‬ ‫ﺗﻤ ّﻦ ﺗﻘﻨﻴﺎت ‪ WMAN‬اﻟﻤﺴﺘﺨﺪﻣﻴﻦ ﻣﻦ ﺗﺄﺳﻴﺲ اﺗﺼﺎﻻت ﻻﺳﻠﻜﻴﺔ ﺑﻴﻦ‬ ‫ﻜ‬ ‫ﻣﻮاﻗﻊ ﻣﺘﻌﺪدة ﺿﻤﻦ ﻣﻨﻄﻘﺔ ﻣﺪﻧﻴﺔ )ﻣﺜ ً، ﺑﻴﻦ ﻋﺪة ﻣﺒﺎن ﻣﻜﺘﺒﻴﺔ ﻓﻲ ﻣﺪﻳﻨﺔ‬ ‫ٍ‬ ‫ﻼ‬ ‫ﻣﻌﻴﻨ‪jj‬ﺔ أو ﺿ‪jj‬ﻤﻦ ﺣ‪jj‬ﺮم ﺟ‪jj‬ﺎﻣﻌﻲ أو ﻓ‪jj‬ﻲ ﻣﻜ‪jj‬ﺎن ﻋ‪jj‬ﺎم ﻣﺜ‪jj‬ﻞ اﻟﻤﻄ‪jj‬ﺎر(، ﺑ‪jj‬ﺪون‬ ‫اﻟﺘﻜﻠﻔﺔ اﻟﻌﺎﻟﻴﺔ ﻟﻤﺪ آﺒﻼت اﻷﻟﻴﺎف اﻟﻀﻮﺋﻴﺔ أو اﻟﻜﺒﻼت اﻟﻨﺤﺎﺳﻴﺔ وﺗﺄﺟﻴﺮ‬ ‫اﻟﺨﻄﻮط. ﺑﺎﻹﺿﺎﻓﺔ إﻟﻰ ذﻟﻚ، ﻳﻤﻜﻦ ﻟﺸﺒﻜﺎت ‪ WMAN‬أن ﺗﻌﻤ‪j‬ﻞ آ‪j‬ﺪﻋﻢ‬ ‫ﻟﺸ‪jj‬ﺒﻜﺎت اﻻﺗﺼ‪jj‬ﺎل اﻟﺴ‪jj‬ﻠﻜﻴﺔ، وذﻟ‪jj‬ﻚ ﻓ‪jj‬ﻲ ﺣﺎﻟ‪jj‬ﺔ ﺗﻌﻄ‪jj‬ﻞ اﻟﺨﻄ‪jj‬ﻮط اﻟﻤ‪jj‬ﺆﺟﺮة‬ ‫ﻟﺸﺒﻜﺔ اﻻﺗﺼﺎل اﻟﺴﻠﻜﻴﺔ. ﺗﺴﺘﺨﺪم ﺷﺒﻜﺎت ‪ WMAN‬اﻷﻣ‪j‬ﻮاج اﻟﺮادﻳﻮﻳ‪j‬ﺔ‬ ‫أو اﻷﺷ‪jj‬ﻌﺔ ﺗﺤ‪jj‬ﺖ اﻟﺤﻤ‪jj‬ﺮاء ﻟﻨﻘ‪jj‬ﻞ اﻟﺒﻴﺎﻧ‪jj‬ﺎت. ﻳ‪jj‬ﺰداد اﻟﻄﻠ‪jj‬ﺐ ﻋﻠ‪jj‬ﻰ ﺷ‪jj‬ﺒﻜﺎت‬ ‫اﻻﺗﺼﺎل اﻟﻼﺳﻠﻜﻴﺔ ﻋﺮﻳﻀﺔ اﻟﻨﻄﺎق، واﻟﺘﻲ ﺗﻮﻓﺮ ﻟﻠﻤﺴﺘﺨﺪﻣﻴﻦ اﻟﻮﺻ‪j‬ﻮل‬ ‫إﻟ‪jjj‬ﻰ إﻧﺘﺮﻧ‪jjj‬ﺖ ﺑﺴ‪jjj‬ﺮﻋﺎت ﻋﺎﻟﻴ‪jjj‬ﺔ. رﻏ‪jjj‬ﻢ اﺳ‪jjj‬ﺘﺨﺪام ﺗﻘﻨﻴ‪jjj‬ﺎت ﻣﺨﺘﻠﻔ‪jjj‬ﺔ، ﻣﺜ‪jjj‬ﻞ‬ ‫‪multichannel‬‬ ‫‪multipoint‬‬ ‫‪distribution‬‬ ‫‪service‬‬ ‫)‪ (MMDS‬و ‪local multipoint distribution services‬‬ ‫)‪ ،(LMDS‬ﺗﺴﺘﻤﺮ ﻣﺠﻤﻮﻋﺔ ﻋﻤﻞ 61.208 ‪ IEEE‬ﻟﻤﻘﺎﻳﻴﺲ اﻟﻮﺻﻮل‬ ‫اﻟﻼﺳﻠﻜﻲ ﻋﺮﻳﺾ اﻟﻨﻄ‪j‬ﺎق ﻓ‪j‬ﻲ ﺗﻄ‪j‬ﻮﻳﺮ اﻟﻤﻮاﺻ‪j‬ﻔﺎت ﻟﺘﻮﺣﻴ‪j‬ﺪ ﺗﻄ‪j‬ﻮﻳﺮ ه‪j‬ﺬﻩ‬ ‫اﻟﺘﻘﻨﻴﺎت.‬

‫163‬

‫اﻟﺤﻠﻘﺔ اﻟﺜﺎﻧﻴﺔ: ﺷﺒﻜﺎت اﻻﺗﺼﺎل اﻟﻼﺳﻠﻜﻴﺔ اﻟﻤﺤﻠﻴﺔ ‪WLAN‬‬

‫ﺗﻤﻜ‪jj‬ﻦ ﺗﻘﻨﻴ‪jj‬ﺎت ‪ WLAN‬اﻟﻤﺴ‪jj‬ﺘﺨﺪﻣﻴﻦ ﻣ‪jj‬ﻦ ﺗﺄﺳ‪jj‬ﻴﺲ اﺗﺼ‪jj‬ﺎﻻت ﻻﺳ‪jj‬ﻠﻜﻴﺔ‬ ‫ﺿﻤﻦ ﻣﻨﻄﻘﺔ ﻣﺤﻠﻴﺔ )ﻋﻠ‪j‬ﻰ ﺳ‪j‬ﺒﻴﻞ اﻟﻤﺜ‪j‬ﺎل، ﺿ‪j‬ﻤﻦ ﺑﻨ‪j‬ﺎء أو ﺷ‪j‬ﺮآﺔ، أو ﻓ‪j‬ﻲ‬ ‫ﻣﻜﺎن ﻋﺎم ﻣﺜ‪j‬ﻞ ﻣﻄ‪j‬ﺎر(. ﻳﻤﻜ‪j‬ﻦ اﺳ‪j‬ﺘﺨﺪام ﺷ‪j‬ﺒﻜﺎت ‪ WLAN‬ﻓ‪j‬ﻲ اﻟﻤﻜﺎﺗ‪j‬ﺐ‬ ‫اﻟﻤﺆﻗﺘﺔ أو ﻓﻲ أﻣ‪j‬ﺎآﻦ أﺧ‪j‬ﺮى ﺣﻴ‪j‬ﺚ ﺗﻜ‪j‬ﻮن آﻠﻔ‪j‬ﺔ ﺗﺮآﻴ‪j‬ﺐ اﻟﻜ‪j‬ﺎﺑﻼت آﺒﻴ‪j‬ﺮة‬ ‫ﻧﺴﺒﻴً، أو ﺑﺎﻹﺿﺎﻓﺔ إﻟﻰ ﺷﺒﻜﺔ ‪ LAN‬ﻣﻮﺟﻮدة ﺣﺘﻰ ﻳﺘﻤﻜﻦ اﻟﻤﺴﺘﺨﺪﻣﻮن‬ ‫ﺎ‬ ‫ﻣ‪j‬ﻦ اﻟﻌﻤ‪jj‬ﻞ ﻓ‪jj‬ﻲ ﻣﻮاﻗ‪j‬ﻊ ﻣﺨﺘﻠﻔ‪jj‬ﺔ ﺿ‪jj‬ﻤﻦ اﻟﺒﻨ‪jj‬ﺎء وﻓ‪j‬ﻲ أوﻗ‪jj‬ﺎت ﻣﺨﺘﻠﻔ‪jj‬ﺔ. ﻳﻤﻜ‪jj‬ﻦ‬ ‫ﻟﺸ‪jjjjj‬ﺒﻜﺎت ‪ WLAN‬أن ﺗﻌﻤ‪jjjjj‬ﻞ ﺑﻄ‪jjjjj‬ﺮﻳﻘﺘﻴﻦ. ﻓ‪jjjjj‬ﻲ ﺷ‪jjjjj‬ﺒﻜﺎت ‪WLAN‬‬ ‫اﻷﺳﺎﺳﻴﺔ، ﺗﺘﺼﻞ ﻣﺤﻄﺎت اﻟﻌﻤ‪j‬ﻞ اﻟﻼﺳ‪j‬ﻠﻜﻴﺔ )أﺟﻬ‪j‬ﺰة ﻣ‪j‬ﻊ ﺑﻄﺎﻗ‪j‬ﺎت ﺷ‪j‬ﺒﻜﺔ‬ ‫اﺗﺼﺎل رادﻳﻮﻳﺔ أو أﺟﻬﺰة ﻣﻮدم ﺧﺎرﺟﻴﺔ( ﻣ‪j‬ﻊ ﻧﻘ‪j‬ﺎط اﻟﻮﺻ‪j‬ﻮل اﻟﻼﺳ‪j‬ﻠﻜﻲ‬ ‫اﻟﺘ ‪j‬ﻲ ﺗﻌﻤ‪jj‬ﻞ آﺠﺴ‪jj‬ﺮ ﺑ‪jj‬ﻴﻦ ﻣﺤﻄ‪jj‬ﺎت اﻟﻌﻤ‪jj‬ﻞ واﻟﺒﻨﻴ‪jj‬ﺔ اﻷﺳﺎﺳ‪jj‬ﻴﺔ ﻟﻠﺸ‪jj‬ﺒﻜﺔ. ﻓ‪jj‬ﻲ‬ ‫ﺷﺒﻜﺎت ‪ WLAN‬ﻣﻦ ﻧﻮع ﻧﻈﻴﺮ إﻟﻰ ﻧﻈﻴﺮ، ﻳﻤﻜﻦ ﻟﻌ‪j‬ﺪة ﻣﺴ‪j‬ﺘﺨﺪﻣﻴﻦ ﻓ‪j‬ﻲ‬ ‫ﻣﻨﻄﻘﺔ ﻣﺤﺪودة، ﻣﺜ‪j‬ﻞ ﻗﺎﻋ‪j‬ﺔ ﻣ‪j‬ﺆﺗﻤﺮات، أن ﻳﺸ‪j‬ﻜﻠﻮا ﺷ‪j‬ﺒﻜﺔ اﺗﺼ‪j‬ﺎل ﻣﺆﻗﺘ‪j‬ﺔ‬ ‫دون اﺳﺘﺨﺪام ﻧﻘﺎط وﺻﻮل، إذا ﻟﻢ ﻳﻜﻦ هﻨ‪j‬ﺎك داع ﻟﻠﻮﺻ‪j‬ﻮل إﻟ‪j‬ﻰ ﻣ‪j‬ﻮارد‬ ‫ٍ‬ ‫اﻟﺸﺒﻜﺔ.‬ ‫ﻋ‪jjjjjj‬ﺎم 7991، ﺻ‪jjjjjj‬ﺎدﻗﺖ ‪ IEEE‬ﻋﻠ‪jjjjjj‬ﻰ ﻣﻘﻴ‪jjjjjj‬ﺎس 11.208 ﻟﺸ‪jjjjjj‬ﺒﻜﺎت‬ ‫‪ ،WLAN‬واﻟ‪jj‬ﺬي ﻳﺤ‪jj‬ﺪد ﺳ‪jj‬ﺮﻋﺔ ﻧﻘ‪jj‬ﻞ اﻟﺒﻴﺎﻧ‪jj‬ﺎت ﻣ‪jj‬ﻦ 1 إﻟ‪jj‬ﻰ 2 ﻣﻴﻐ‪jj‬ﺎ ﺑ‪jj‬ﺖ‬ ‫ﺑﺎﻟﺜﺎﻧﻴ‪jj‬ﺔ. وﻓﻘ‪jj‬ﺎ ﻟﻠﻤﻘﻴ‪jj‬ﺎس 11.208‪ b‬اﻟ‪jj‬ﺬي ﻳﺒ‪jj‬ﺪو وآﺄﻧ‪jj‬ﻪ اﻟﻤﻘﻴ‪jj‬ﺎس اﻟﺠﺪﻳ‪jj‬ﺪ‬ ‫ً‬ ‫اﻟﻤﺴﻴﻄﺮ، ﻳﺘﻢ ﻧﻘﻞ اﻟﺒﻴﺎﻧﺎت ﺑﺴﺮﻋﺔ ﻗﺼﻮى ﻗﺪرهﺎ 11 ﻣﻴﻐ‪j‬ﺎ ﺑ‪j‬ﺖ ﺑﺎﻟﺜﺎﻧﻴ‪j‬ﺔ‬ ‫ﻋﻠ‪jj‬ﻰ اﻟﺘ‪jj‬ﺮدد 4.2 ﺟﻴﻐ‪jj‬ﺎهﺮﺗﺰ. ﻣﻘﻴ‪jj‬ﺎس ﺟﺪﻳ‪jj‬ﺪ ﺁﺧ‪jj‬ﺮ ه‪jj‬ﻮ 11.208‪ ،a‬اﻟ‪jj‬ﺬي‬ ‫ﻳﺤ‪jj‬ﺪد ﻧﻘ‪jj‬ﻞ اﻟﺒﻴﺎﻧ‪jj‬ﺎت ﺑﺴ‪jj‬ﺮﻋﺔ ﻗﺼ‪jj‬ﻮى ﻗ‪jj‬ﺪرهﺎ 45 ﻣﻴﻐ‪jj‬ﺎ ﺑ‪jj‬ﺖ ﺑﺎﻟﺜﺎﻧﻴ‪jj‬ﺔ ﻋﻠ‪jj‬ﻰ‬ ‫اﻟﺘﺮدد 5 ﺟﻴﻐﺎهﺮﺗﺰ.‬ ‫و ﻗﺪ ﺗﻢ اﺳﺘﺤﺪاث ﻣﺠﻤﻮﻋﺔ ﻣﻦ اﻟﻤﻌﺎﻳﻴﺮ ﻟﺤﻔﻆ أﻣﺎن 11.208‬

‫263‬

‫ﺗﺘﻀ‪jjj‬ﻤﻦ ﺧﻴ‪jjj‬ﺎرات اﻷﻣ‪jjj‬ﺎن ﻟ‪jjj‬ـ 11.208 ﺧ‪jjj‬ﺪﻣﺎت اﻟﻤﺼ‪jjj‬ﺎدﻗﺔ وﺧ‪jjj‬ﺪﻣﺎت‬ ‫اﻟﺘﺸ‪j‬ﻔﻴﺮ اﻟﻤﺴ‪j‬ﺘﻨﺪة إﻟ‪j‬ﻰ اﻟﺨﻮارزﻣﻴ‪j‬ﺔ ‪Wired Equivalent Privacy‬‬ ‫)‪ .(WEP‬إن ‪ WEP‬ه‪jjj‬ﻲ ﻣﺠﻤﻮﻋ‪jjj‬ﺔ ﻣ‪jjj‬ﻦ ﺧ‪jjj‬ﺪﻣﺎت اﻷﻣ‪jjj‬ﺎن اﻟﻤﺴ‪jjj‬ﺘﺨﺪﻣﺔ‬ ‫ﻟﺤﻤﺎﻳ‪jj‬ﺔ ﺷ‪jj‬ﺒﻜﺎت 11.208 ﻣ‪jj‬ﻦ اﻟﻮﺻ‪jj‬ﻮل ﻏﻴ‪jj‬ﺮ اﻟﻤﺨ ‪ّ j‬ل، ﻣﺜ‪jj‬ﻞ اﻟﺘﻨﺼ‪jj‬ﺖ‬ ‫ﻮ‬ ‫)اﻟﺘﻘ‪jj‬ﺎط ﺣﺮآ‪jj‬ﺔ ﻣ‪jj‬ﺮور ﺷ‪jj‬ﺒﻜﺔ اﻻﺗﺼ‪jj‬ﺎل اﻟﻼﺳ‪jj‬ﻠﻜﻴﺔ(. ﺑﻮاﺳ‪jj‬ﻄﺔ اﻟﺘﻜ‪jj‬ﻮﻳﻦ‬ ‫اﻟﺘﻠﻘﺎﺋﻲ ﻟﻠﺸﺒﻜﺔ اﻟﻼﺳﻠﻜﻴﺔ، ﻳﻤﻜﻨﻚ ﺗﺤﺪﻳﺪ أن ﻣﻔﺘﺎح اﻟﺸﺒﻜﺔ ﺳﻴﺴ‪j‬ﺘﺨﺪم ﻣ‪j‬ﻦ‬ ‫أﺟ‪jj‬ﻞ اﻟﻤﺼ‪jj‬ﺎدﻗﺔ ﻋﻠ‪jj‬ﻰ اﻟﺸ‪jj‬ﺒﻜﺔ. ﻳﻤﻜﻨ‪jj‬ﻚ أﻳﻀ‪jj‬ﺎ ﺗﺤﺪﻳ‪jj‬ﺪ أن ﻣﻔﺘ‪jj‬ﺎح اﻟﺸ‪jj‬ﺒﻜﺔ‬ ‫ً‬ ‫ﺳﻴﺴﺘﺨﺪم ﻟﺘﺤﺴﻴﻦ ﺑﻴﺎﻧﺎﺗﻚ وهﻲ ُﻨﻘﻞ ﻋﺒﺮ اﻟﺸﺒﻜﺔ. ﻋﻨ‪j‬ﺪﻣﺎ ﻳﻜ‪j‬ﻮن ﺗﺤﺴ‪j‬ﻴﻦ‬ ‫ﺗ‬ ‫اﻟﺒﻴﺎﻧﺎت ﻣﻤ ّﻨً، ﻳﺘﻢ ﺗﻌﻤﻴﻢ ﻣﻔﺎﺗﻴﺢ اﻟﺘﺸﻔﻴﺮ اﻟﻤﺸﺘﺮآﺔ اﻟﺴﺮﻳﺔ واﺳ‪j‬ﺘﺨﺪاﻣﻬﺎ‬ ‫ﻜﺎ‬ ‫ﻣ‪jj‬ﻦ ﻗﺒ‪jj‬ﻞ اﻟﻤﺤﻄ‪jjj‬ﺔ اﻟﻤﺼ‪jj‬ﺪر واﻟﻤﺤﻄ‪jjj‬ﺔ اﻟﻮﺟﻬ‪jj‬ﺔ ﻟﺘﺒ‪jjj‬ﺪﻳﻞ ﺑﺘ‪jj‬ﺎت اﻹﻃ‪jjj‬ﺎر،‬ ‫وﺑﺎﻟﺘﺎﻟﻲ ﺗﺠﻨﺐ اﻟﻜﺸﻒ ﻣﻦ ﻗﺒﻞ اﻟﻤﺘﻨﺼﺘﻴﻦ.‬ ‫اﻟﻨﻈﺎم اﻟﻤﻔﺘﻮح وﻣﺼﺎدﻗﺔ اﻟﻤﻔﺎﺗﻴﺢ اﻟﻤﺸﺘﺮآﺔ‬ ‫ﻳ‪jj‬ﺪﻋﻢ 11.208 ﻧ‪jj‬ﻮﻋﻴﻦ ﻓ‪jj‬ﺮﻋﻴﻴﻦ ﻣ‪jj‬ﻦ ﺧ‪jj‬ﺪﻣﺎت ﻣﺼ‪jj‬ﺎدﻗﺔ اﻟﺸ‪jj‬ﺒﻜﺔ: اﻟﻨﻈ‪jj‬ﺎم‬ ‫اﻟﻤﻔﺘﻮح واﻟﻤﻔﺘﺎح اﻟﻤﺸﺘﺮك. ﺗﺤﺖ ﻣﺼ‪j‬ﺎدﻗﺔ اﻟﻨﻈ‪j‬ﺎم اﻟﻤﻔﺘ‪j‬ﻮح، أي ﻣﺤﻄ‪j‬ﺔ‬ ‫ﻻﺳﻠﻜﻴﺔ ﻳﻤﻜﻨﻬﺎ ﻃﻠﺐ اﻟﻤﺼﺎدﻗﺔ. ﺗﺮﺳ‪j‬ﻞ اﻟﻤﺤﻄ‪j‬ﺔ اﻟﺘ‪j‬ﻲ ﺗﺤﺘ‪j‬ﺎج اﻟﻤﺼ‪j‬ﺎدﻗﺔ‬ ‫ﻣ‪jj‬ﻊ ﻣﺤﻄ‪jj‬ﺔ ﻻﺳ‪jj‬ﻠﻜﻴﺔ أﺧ‪jj‬ﺮى إﻃ‪jj‬ﺎر إدارة ﻣﺼ‪jj‬ﺎدﻗﺔ ﻳﺤﺘ‪jj‬ﻮي ﻋﻠ‪jj‬ﻰ هﻮﻳ‪jj‬ﺔ‬ ‫ﻣﺤﻄﺔ اﻹرﺳﺎل. ﺑﻌﺪ ذﻟﻚ ﺗﻌﻴﺪ ﻣﺤﻄﺔ اﻻﺳﺘﻘﺒﺎل إرﺳﺎل إﻃ‪j‬ﺎر ﻳﺸ‪j‬ﻴﺮ إﻟ‪j‬ﻰ‬ ‫ﻣ‪jj‬ﺎ إذا آﺎﻧ‪jj‬ﺖ ﻗ‪jj‬ﺪ ﺗﻌﺮﻓ‪jj‬ﺖ ﻋﻠ‪jj‬ﻰ هﻮﻳ‪jj‬ﺔ ﻣﺤﻄ‪jj‬ﺔ اﻹرﺳ‪jj‬ﺎل. ﺗﺤ‪jj‬ﺖ ﻣﺼ‪jj‬ﺎدﻗﺔ‬ ‫اﻟﻤﻔﺘ‪jj‬ﺎح اﻟﻤﺸ‪jj‬ﺘﺮك، ﻣ‪jj‬ﻦ اﻟﻤﻔﺘ‪jj‬ﺮض أن ﺗﻜ‪jjj‬ﻮن آ‪jj‬ﻞ ﻣﺤﻄ‪jj‬ﺔ ﻻﺳ‪jj‬ﻠﻜﻴﺔ ﻗ‪jjj‬ﺪ‬ ‫اﺳﺘﻘﺒﻠﺖ ﻣﻔﺘﺎح ﻣﺸﺘﺮك ﺳﺮي ﻋﺒﺮ ﻗﻨﺎة ﺁﻣﻨﺔ ﻣﺴ‪j‬ﺘﻘﻠﺔ ﻋ‪j‬ﻦ ﻗﻨ‪j‬ﺎة اﺗﺼ‪j‬ﺎﻻت‬ ‫اﻟﺸﺒﻜﺔ اﻟﻼﺳﻠﻜﻴﺔ 11.208. ﻻﺳﺘﺨﺪام ﻣﺼﺎدﻗﺔ اﻟﻤﻔﺘﺎح اﻟﻤﺸﺘﺮك، ﻳﺠ‪j‬ﺐ‬ ‫أن ﻳﻜﻮن ﻟﺪﻳﻚ ﻣﻔﺘﺎح ﺷﺒﻜﺔ.‬ ‫ﻣﻔﺎﺗﻴﺢ ﺷﺒﻜﺔ اﻻﺗﺼﺎل‬ ‫ﻋﻨﺪ ﺗﻤﻜﻴﻦ ‪ ،WEP‬ﻳﻤﻜﻨﻚ ﺗﺤﺪﻳ‪j‬ﺪ أن ﻣﻔﺘ‪j‬ﺎح اﻟﺸ‪j‬ﺒﻜﺔ ﺳ ُﺴ‪j‬ﺘﺨﺪم ﻣ‪j‬ﻦ أﺟ‪j‬ﻞ‬ ‫ﻴ‬ ‫اﻟﺘﺸﻔﻴﺮ. ﻳﻤﻜﻦ ﺗﻮﻓﻴﺮ ﻣﻔﺘﺎح ﺷﺒﻜﺔ ﺧﺎص ﺑﻚ ﺗﻠﻘﺎﺋﻴﺎ )ﻣﺜ ً، ﻳﻤﻜ‪j‬ﻦ ﺗ‪j‬ﻮﻓﻴﺮﻩ‬ ‫ً ﻼ‬ ‫ﻋﻠﻰ ﻣﺤ‪j‬ﻮل ﺷ‪j‬ﺒﻜﺔ اﻻﺗﺼ‪j‬ﺎل اﻟﻼﺳ‪j‬ﻠﻜﻴﺔ اﻟﺨﺎﺻ‪j‬ﺔ ﺑ‪j‬ﻚ(، أو ﻳﻤﻜﻨ‪j‬ﻚ ﺗﺤﺪﻳ‪j‬ﺪ‬ ‫اﻟﻤﻔﺘﺎح ﺑﻜﺘﺎﺑﺘﻪ ﺑﻨﻔﺴ‪j‬ﻚ. إذا ﺣ‪j‬ﺪدت اﻟﻤﻔﺘ‪j‬ﺎح ﺑﻨﻔﺴ‪j‬ﻚ، ﻳﻤﻜﻨ‪j‬ﻚ أﻳﻀ‪j‬ﺎ ﺗﺤﺪﻳ‪j‬ﺪ‬ ‫ً‬ ‫ﻃﻮل اﻟﻤﻔﺘﺎح )04 ﺑﺖ أو 401 ﺑﺖ(، وﺗﻨﺴﻴﻖ اﻟﻤﻔﺘﺎح )أﺣﺮف ‪ASCII‬‬ ‫أو أرﻗﺎم ﺳﺖ ﻋﺸﺮﻳﺔ(، وﻓﻬ‪j‬ﺮس اﻟﻤﻔﺘ‪j‬ﺎح )اﻟﻤﻜ‪j‬ﺎن اﻟﻤﺨ‪j‬ﺰن ﻓﻴ‪j‬ﻪ اﻟﻤﻔﺘ‪j‬ﺎح‬ ‫363‬

‫اﻟﻤﺤﺪد(. آﻠﻤﺎ آﺎن ﻃﻮل اﻟﻤﻔﺘﺎح أﻃﻮل، آﻠﻤﺎ آﺎن اﻟﻤﻔﺘ‪j‬ﺎح ﺁﻣﻨ‪j‬ﺎ. ﻓ‪j‬ﻲ آ‪j‬ﻞ‬ ‫ً‬ ‫ﻣ‪jj‬ﺮة ﻳ‪jj‬ﺰداد ﻓﻴﻬ‪jj‬ﺎ ﻃ‪jj‬ﻮل اﻟﻤﻔﺘ‪jj‬ﺎح ﺑ‪jj‬ﺖ واﺣ‪jj‬ﺪ، ﻳﺘﻀ‪jj‬ﺎﻋﻒ ﻋ‪jj‬ﺪد اﻟﻤﻔ‪jj‬ﺎﺗﻴﺢ‬ ‫اﻟﻤﺤﺘﻤﻠﺔ.‬ ‫ﺗﺤﺖ 11.208، ﻳﻤﻜﻦ ﺗﻜﻮﻳﻦ ﻣﺤﻄﺎت ﻻﺳﻠﻜﻴﺔ ﺣﺘﻰ أرﺑﻌﺔ ﻣﻔ‪j‬ﺎﺗﻴﺢ )ﻗ‪j‬ﻴﻢ‬ ‫ﻓﻬ‪jjj‬ﺮس اﻟﻤﻔﺘ‪jjj‬ﺎح ه‪jjj‬ﻲ 0، 1، 2، و3(. ﻋﻨ‪jjj‬ﺪﻣﺎ ﺗﻨﻘ‪jjj‬ﻞ ﻧﻘﻄ‪jjj‬ﺔ اﻟﻮﺻ‪jjj‬ﻮل أو‬ ‫اﻟﻤﺤﻄ‪jj‬ﺔ اﻟﻼﺳ‪jj‬ﻠﻜﻴﺔ رﺳ‪jj‬ﺎﻟﺔ ﻣﺸ‪jj‬ﻔﺮة ﺑﺎﺳ‪jj‬ﺘﺨﺪام ﻣﻔﺘ‪jj‬ﺎح ﻣﺨ‪jj‬ﺰن ﻓ‪jj‬ﻲ ﻓﻬ‪jj‬ﺮس‬ ‫ﻣﻔ‪jj‬ﺎﺗﻴﺢ ﻣﻌ‪jj‬ﻴﻦ، ﺗﺸ‪jj‬ﻴﺮ اﻟﺮﺳ‪jj‬ﺎﻟﺔ اﻟﻤﻨﻘﻮﻟ‪jj‬ﺔ إﻟ‪jj‬ﻰ ﻓﻬ‪jj‬ﺮس اﻟﻤﻔ‪jj‬ﺎﺗﻴﺢ اﻟ‪jj‬ﺬي ﺗ‪jj‬ﻢ‬ ‫اﺳﺘﺨﺪاﻣﻪ ﻟﺘﺸﻔﻴﺮ ﻧﺺ اﻟﺮﺳﺎﻟﺔ. ﻋﻨﺪﺋﺬ ﻳﻤﻜ‪j‬ﻦ ﻟﻨﻘﻄ‪j‬ﺔ اﻟﻮﺻ‪j‬ﻮل اﻟﻤﺴ‪j‬ﺘﻘﺒﻠﺔ‬ ‫أو اﻟﻤﺤﻄ‪jj‬ﺔ اﻟﻼﺳ‪jj‬ﻠﻜﻴﺔ اﺳ‪jj‬ﺘﺮداد اﻟﻤﻔﺘ‪jj‬ﺎح اﻟﻤﺨ‪jj‬ﺰن ﻓ‪jj‬ﻲ ﻓﻬ‪jj‬ﺮس اﻟﻤﻔ‪jj‬ﺎﺗﻴﺢ‬ ‫واﺳﺘﺨﺪاﻣﻪ ﻟﻔﻚ ﺗﺸﻔﻴﺮ ﻧﺺ اﻟﺮﺳﺎﻟﺔ اﻟﻤﺸﻔﺮة.‬ ‫اﻟﻤﺼﺎدﻗﺔ 1.208‪x‬‬ ‫ﻣ‪j‬ﻦ أﺟ‪j‬ﻞ اﻟﺘﺤﺴ‪j‬ﻴﻦ اﻷﻣ‪j‬ﺎن، ﻳﻤﻜﻨ‪j‬ﻚ ﺗﻤﻜ‪j‬ﻴﻦ اﻟﻤﺼ‪j‬ﺎدﻗﺔ ‪.IEEE 802.1x‬‬ ‫ﺗ‪j‬ﻮﻓﺮ اﻟﻤﺼ‪j‬ﺎدﻗﺔ ‪ IEEE 802.1x‬وﺻ‪j‬ﻮﻻ ﻣﺼ‪j‬ﺎدق ﻋﻠﻴ‪jj‬ﻪ إﻟ‪j‬ﻰ ﺷ‪jj‬ﺒﻜﺎت‬ ‫ً‬ ‫اﻻﺗﺼ‪jjjj‬ﺎل اﻟﻼﺳ‪jjjj‬ﻠﻜﻴﺔ 11.208 وﺷ‪jjjj‬ﺒﻜﺎت ‪ Ethernet‬اﻟﺴ‪jjjj‬ﻠﻜﻴﺔ. ﺗﻘ‪jjjj‬ﻮم‬ ‫‪ IEEE 802.1x‬ﺑﺘﻘﻠﻴﻞ ﻣﺨﺎﻃﺮ أﻣﺎن اﻟﺸﺒﻜﺔ اﻟﻼﺳ‪j‬ﻠﻜﻴﺔ، ﻣﺜ‪j‬ﻞ اﻟﻮﺻ‪j‬ﻮل‬ ‫ﻏﻴﺮ اﻟﻤﺨ‪ّ j‬ل إﻟ‪j‬ﻰ ﻣ‪j‬ﻮارد اﻟﺸ‪j‬ﺒﻜﺔ واﻟﺘﻨﺼ‪j‬ﺖ، ﺑﺘ‪j‬ﻮﻓﻴﺮ ﺗﻌﺮﻳ‪j‬ﻒ ﻟﻠﻤﺴ‪j‬ﺘﺨﺪم‬ ‫ﻮ‬ ‫وﻟﻠﻜﻤﺒﻴ‪jjj‬ﻮﺗﺮ، واﻟﻤﺼ‪jjj‬ﺎدﻗﺔ اﻟﻤﺮآﺰﻳ‪jjj‬ﺔ، وإدارة اﻟﻤﻔﺘ‪jjj‬ﺎح اﻟﺤﻴ‪jjj‬ﻮي. ﻳ‪jjj‬ﺪﻋﻢ‬ ‫‪ IEEE 802.1x‬ﺧﺪﻣ‪jjjj‬ﺔ ﻣﺼ‪jjjj‬ﺎدﻗﺔ إﻧﺘﺮﻧ‪jjjj‬ﺖ )‪ ،(IAS‬اﻟﺘ‪jjjj‬ﻲ ﺗﻄﺒ‪jjjj‬ﻖ‬ ‫ﺑﺮوﺗﻮآ‪jjjjj‬ﻮل ﺧﺪﻣ‪jjjjj‬ﺔ ﻣﺴ‪jjjjj‬ﺘﺨﺪم اﻟﻄﻠ‪jjjjj‬ﺐ اﻟﻬ‪jjjjj‬ﺎﺗﻔﻲ اﻟﺒﻌﻴ‪jjjjj‬ﺪ اﻟﻤﺼ‪jjjjj‬ﺎدق‬ ‫)‪ .(RADIUS‬ﺗﺤ‪jj‬ﺖ ه‪jj‬ﺬا اﻟﺘﻄﺒﻴ‪jj‬ﻖ، ﺗﺮﺳ‪jj‬ﻞ ﻧﻘﻄ‪jj‬ﺔ اﻟﻮﺻ‪jj‬ﻮل اﻟﻼﺳ‪jj‬ﻠﻜﻴﺔ‬ ‫اﻟﻤﻜ ّﻧﺔ آﻌﻤﻴ‪j‬ﻞ ‪ RADIUS‬ﻃﻠ‪j‬ﺐ اﺗﺼ‪j‬ﺎل ورﺳ‪j‬ﺎﺋﻞ ﺣﺴ‪j‬ﺎﺑﺎت إﻟ‪j‬ﻰ ﻣﻠﻘ‪j‬ﻢ‬ ‫ﻮ‬ ‫‪ .RADIUS‬ﻳﻌ‪jj‬ﺎﻟﺞ ﻣﻠﻘ‪jj‬ﻢ ‪ RADIUS‬اﻟﻤﺮآ‪jj‬ﺰي اﻟﻄﻠ‪jj‬ﺐ وﻳﻤ‪jj‬ﻨﺢ ﻃﻠ‪jj‬ﺐ‬ ‫اﻻﺗﺼ‪jjj‬ﺎل أو ﻳﺮﻓﻀ‪jjj‬ﻪ. إذا ﺗ‪jjj‬ﻢ ﻣ‪jjj‬ﻨﺢ اﻟﻄﻠ‪jjj‬ﺐ، ﻳﻜ‪jjj‬ﻮن اﻟﻌﻤﻴ‪jjj‬ﻞ ﻣﺼ‪jjj‬ﺎدﻗً،‬ ‫ﺎ‬ ‫واﻟﻤﻔﺎﺗﻴﺢ اﻟﻔﺮﻳﺪة )اﻟﻤﺸﺘﻖ ﻣﻨﻬﺎ ﻣﻔﺘﺎح ‪ (WEP‬ﻳﻤﻜﻦ أن ﻳﺘﻢ إﻧﺸﺎؤهﺎ ﻣﻦ‬ ‫أﺟﻞ ﺟﻠﺴﺔ اﻟﻌﻤﻞ ﺗﻠﻚ، ﻳﻌﺘﻤﺪ ذﻟﻚ ﻋﻠ‪j‬ﻰ ﻃﺮﻳﻘ‪j‬ﺔ اﻟﻤﺼ‪j‬ﺎدﻗﺔ اﻟﻤﺨﺘ‪j‬ﺎرة. إن‬ ‫اﻟ‪j‬ﺪﻋﻢ اﻟ‪j‬ﺬي ﻳ‪j‬ﻮﻓﺮﻩ ‪ IEEE 802.1x‬ﻣ‪j‬ﻦ أﺟ‪j‬ﻞ أﻧ‪j‬ﻮاع أﻣ‪j‬ﺎن ﺑﺮوﺗﻮآ‪j‬ﻮل‬ ‫اﻟﻤﺼ‪jjjj‬ﺎدﻗﺔ اﻟﻘﺎﺑ‪jjjj‬ﻞ ﻟﻺﻟﺤ‪jjjj‬ﺎق )‪ (EAP‬ﻳﺴ‪jjjj‬ﻤﺢ ﻟ‪jjjj‬ﻚ ﺑﺎﺳ‪jjjj‬ﺘﺨﺪام أﺳ‪jjjj‬ﺎﻟﻴﺐ‬ ‫اﻟﻤﺼ‪jj‬ﺎدﻗﺔ ﻣﺜ‪jj‬ﻞ اﻟﺒﻄﺎﻗ‪jj‬ﺔ اﻟﺬآﻴ‪jj‬ﺔ، واﻟﺸ‪jj‬ﻬﺎدات، وﺧﻮارزﻣﻴ‪jj‬ﺔ اﻟﺮﺳ‪jj‬ﺎﻟﺔ 5‬ ‫)5‪.(MD‬‬

‫463‬

‫ﺑﻮاﺳ‪jjj‬ﻄﺔ اﻟﻤﺼ‪jjj‬ﺎدﻗﺔ ‪ ،IEEE 802.1x‬ﻳﻤﻜﻨ‪jjj‬ﻚ ﺗﺤﺪﻳ‪jjj‬ﺪ ﻣ‪jjj‬ﺎ إذا آ‪jjj‬ﺎن‬ ‫اﻟﻜﻤﺒﻴ‪jjj‬ﻮﺗﺮ ﻳﺤ‪j j‬ﺎول اﻟﻤﺼ‪jjj‬ﺎدﻗﺔ ﻣ‪jjj‬ﻊ ﺷ‪jjj‬ﺒﻜﺔ اﻻﺗﺼ‪jjj‬ﺎل ﻓ‪jjj‬ﻲ ﺣ‪jjj‬ﺎل ﺗﻄﻠ‪jjj‬ﺐ‬ ‫اﻟﻜﻤﺒﻴﻮﺗﺮ اﻟﻮﺻﻮل إﻟﻰ ﻣﻮارد ﺷﺒﻜﺔ اﻻﺗﺼ‪j‬ﺎل ﺳ‪j‬ﻮاء ﺗ‪j‬ﻢ ﺗﺴ‪j‬ﺠﻴﻞ دﺧ‪j‬ﻮل‬ ‫اﻟﻤﺴﺘﺨﺪم أو ﻻ. ﻋﻠﻰ ﺳﺒﻴﻞ اﻟﻤﺜﺎل، ﻳﻤﻜﻦ ﻟﻤﺸﻐﻠﻲ ﻣﺮآﺰ اﻟﺒﻴﺎﻧ‪j‬ﺎت اﻟ‪j‬ﺬﻳﻦ‬ ‫ﻳﺪﻳﺮون اﻟﻤﻠﻘﻤﺎت ﻋﻦ ﺑﻌﺪ ﺗﻌﻴﻴﻦ أﻧ‪j‬ﻪ ﻳﺠ‪j‬ﺐ ﻣﺤﺎوﻟ‪j‬ﺔ اﻟﻤﺼ‪j‬ﺎدﻗﺔ ﻟﻠﻮﺻ‪j‬ﻮل‬ ‫إﻟﻰ ﻣﻮارد ﺷﺒﻜﺔ اﻻﺗﺼﺎل وذﻟﻚ ﺑﻮاﺳﻄﺔ اﻟﻤﻠﻘﻤﺎت. ﻳﻤﻜﻨ‪j‬ﻚ أﻳﻀ‪j‬ﺎ ﺗﻌﻴ‪j‬ﻴﻦ‬ ‫ً‬ ‫ﻓﻴﻤﺎ إذا آﺎن ﻋﻠﻰ اﻟﻜﻤﺒﻴﻮﺗﺮ ﻣﺤﺎوﻟ‪j‬ﺔ اﻟﻤﺼ‪j‬ﺎدﻗﺔ إﻟ‪j‬ﻰ ﺷ‪j‬ﺒﻜﺔ اﻻﺗﺼ‪j‬ﺎل ﻓ‪j‬ﻲ‬ ‫ﺣ‪jj‬ﺎل ﻋ‪jj‬ﺪم ﺗ‪jj‬ﻮﻓﺮ ﻣﻌﻠﻮﻣ‪jj‬ﺎت ﻋ‪jj‬ﻦ اﻟﻜﻤﺒﻴ‪jj‬ﻮﺗﺮ أو اﻟﻤﺴ‪jj‬ﺘﺨﺪم. ﻋﻠ‪jj‬ﻰ ﺳ‪jj‬ﺒﻴﻞ‬ ‫اﻟﻤﺜﺎل، ﻳﻤﻜﻦ ﻟﻤ‪j‬ﻮﻓﺮي ﺧﺪﻣ‪j‬ﺔ إﻧﺘﺮﻧ‪j‬ﺖ )‪ (ISP‬اﺳ‪j‬ﺘﺨﺪام ﺧﻴ‪j‬ﺎر اﻟﻤﺼ‪j‬ﺎدﻗﺔ‬ ‫ه‪jj‬ﺬا ﻟﻠﺴ‪jj‬ﻤﺎح ﻟﻠﻤﺴ‪jj‬ﺘﺨﺪﻣﻴﻦ ﺑﺎﻟﻮﺻ‪jj‬ﻮل إﻟ‪jj‬ﻰ ﺧ‪jj‬ﺪﻣﺎت إﻧﺘﺮﻧ‪j‬ﺖ اﻟﻤﺠﺎﻧﻴ‪jj‬ﺔ، أو‬ ‫إﻟ‪jjj‬ﻰ ﺧ‪jjj‬ﺪﻣﺎت إﻧﺘﺮﻧ‪jjj‬ﺖ اﻟﺘ‪jjj‬ﻲ ﻳﻤﻜ‪jjj‬ﻦ ﺷ‪jjj‬ﺮاؤهﺎ. ﻳﻤﻜ‪jjj‬ﻦ ﻟﻠﺸ‪jjj‬ﺮآﺔ أن ﺗﻤ‪jjj‬ﻨﺢ‬ ‫اﻟﺰاﺋ‪jjj‬ﺮﻳﻦ ذوي وﺻ‪jjj‬ﻮل اﻟﻀ‪jjj‬ﻴﻒ )‪ (guest‬اﻟﻤﺤ‪jjj‬ﺪود، ﺑﺤﻴ‪jjj‬ﺚ ﻳﻤﻜ‪jjj‬ﻨﻬﻢ‬ ‫اﻟﻮﺻﻮل إﻟﻰ إﻧﺘﺮﻧﺖ ، وﻟﻜﻦ ﻟﻴﺲ إﻟﻰ ﻣﻮارد ﺷﺒﻜﺔ اﻻﺗﺼﺎل اﻟﺨﺎﺻﺔ.‬

‫563‬

‫اﻟﺤﻠﻘﺔ اﻟﺜﺎﻟﺜﺔ: ﺷﺒﻜﺎت اﻻﺗﺼﺎل اﻟﻼﺳﻠﻜﻴﺔ اﻟﺸﺨﺼﻴﺔ.‬
‫)‪Wireless personal area networks (WPAN‬‬

‫ﺗﻤﻜ‪jj‬ﻦ ﺗﻘﻨﻴ‪jj‬ﺎت ‪ WPAN‬اﻟﻤﺴ‪jj‬ﺘﺨﺪﻣﻴﻦ ﻣ‪jj‬ﻦ ﺗﺄﺳ‪jj‬ﻴﺲ اﺗﺼ‪jj‬ﺎﻻت ﻻﺳ‪jj‬ﻠﻜﻴﺔ‬ ‫آﺎﻓﻴ‪jj‬ﺔ ﻟﻸﺟﻬ‪jj‬ﺰة )ﻣﺜ‪jj‬ﻞ ‪ ،PDA‬اﻟﻬﻮاﺗ‪jj‬ﻒ اﻟﺨﻠﻴﻮﻳ‪jj‬ﺔ، أو أﺟﻬ‪jj‬ﺰة اﻟﻜﻤﺒﻴ‪jj‬ﻮﺗﺮ‬ ‫اﻟﻤﺤﻤﻮﻟﺔ( اﻟﻤﺘﻮاﺟ‪j‬ﺪة ﺿ‪j‬ﻤﻦ ﻓﻀ‪j‬ﺎء اﻟﻌﻤ‪j‬ﻞ اﻟﺸﺨﺼ‪j‬ﻲ )‪ .(POS‬اﻟﻔﻀ‪j‬ﺎء‬ ‫‪ POS‬هﻮ اﻟﻔﻀﺎء اﻟﺬي ﻳﺤﻴﻂ ﺑﺎﻟﻤﺴﺘﺨﺪم ﺣﺘﻰ ﻣﺴﺎﻓﺔ 01 أﻣﺘ‪j‬ﺎر. ﺣﺎﻟﻴ‪،ًj‬‬ ‫ﺎ‬ ‫ﺗﻘﻨﻴﺎت ‪ WPAN‬اﻷﺳﺎﺳﻴﺔ ه‪j‬ﻲ ‪ Bluetooth‬واﻷﺷ‪j‬ﻌﺔ ﺗﺤ‪j‬ﺖ اﻟﺤﻤ‪j‬ﺮاء.‬ ‫ﺗﻘﻨﻴﺔ ‪ Bluetooth‬هﻲ ﺗﻘﻨﻴﺔ ﺑﺪﻳﻠﺔ ﻟﻠﻜﺒﻞ ﺗﺴﺘﺨﺪم اﻷﻣﻮاج اﻟﺮادﻳﻮﻳﺔ ﻟﻨﻘﻞ‬ ‫اﻟﺒﻴﺎﻧ‪jj‬ﺎت إﻟ‪jj‬ﻰ ﻣﺴ‪jj‬ﺎﻓﺎت ﺣﺘ‪jj‬ﻰ 03 ﻗ‪jj‬ﺪﻣﺎ. ﻳﻤﻜ‪jj‬ﻦ ﻧﻘ‪jj‬ﻞ ﺑﻴﺎﻧ‪jj‬ﺎت ‪Bluetooth‬‬ ‫ً‬ ‫ﻋﺒﺮ اﻟﺠﺪران واﻟﺠﻴ‪j‬ﻮب واﻟﺤﻘﺎﺋ‪j‬ﺐ. ﻳ‪j‬ﺘﻢ ﺗﻄ‪j‬ﻮﻳﺮ ﺗﻘﻨﻴ‪j‬ﺔ ‪ Bluetooth‬ﻣ‪j‬ﻦ‬ ‫ﻗﺒ‪jj‬ﻞ ﻣﺠﻤﻮﻋ‪jj‬ﺔ ﻣﻬﺘﻤ‪jj‬ﺔ ﺑﻬ‪jj‬ﺬﻩ اﻟﺘﻘﻨﻴ‪jj‬ﺔ ﺗﺴ‪jj‬ﻤﻰ ‪Bluetooth Special‬‬ ‫)‪ ،Interest Group (SIG‬اﻟﺘ‪jj‬ﻲ ﻧﺸ‪jj‬ﺮت ﻣﻮاﺻ‪jj‬ﻔﺎت ‪Bluetooth‬‬ ‫اﻹﺻﺪار 0.1 ﻋﺎم 9991. ﺑﺸ‪j‬ﻜﻞ ﺑ‪j‬ﺪﻳﻞ، ﻟﻮﺻ‪j‬ﻞ اﻷﺟﻬ‪j‬ﺰة ﺿ‪j‬ﻤﻦ ﻧﻄ‪j‬ﺎق‬ ‫ﺻ‪jjj‬ﻐﻴﺮ ﺟ‪jjj‬ﺪا )1 ﻣﺘ‪jjj‬ﺮ أو أﻗ‪jjj‬ﻞ(، ﻳﻤﻜ‪jjj‬ﻦ ﻟﻠﻤﺴ‪jjj‬ﺘﺨﺪﻣﻴﻦ إﻧﺸ‪jjj‬ﺎء ارﺗﺒﺎﻃ‪jjj‬ﺎت‬ ‫ً‬ ‫ﺑﺎﻷﺷﻌﺔ ﺗﺤﺖ اﻟﺤﻤﺮاء.‬ ‫ﻟﺘﻮﺣﻴ‪jjj‬ﺪ ﺗﻄ‪jjj‬ﻮﻳﺮ ﺗﻘﻨﻴ‪jjj‬ﺎت ‪ ،WPAN‬أﺳﺴ‪jjj‬ﺖ ‪ IEEE‬ﻣﺠﻤﻮﻋ‪jjj‬ﺔ اﻟﻌﻤ‪jjj‬ﻞ‬ ‫51.208 ﻟﺸﺒﻜﺎت ‪ .WPAN‬ﺗﻘﻮم ﻣﺠﻤﻮﻋﺔ اﻟﻌﻤﻞ هﺬﻩ ﺑﺘﻄﻮﻳﺮ ﻣﻘﺎﻳﻴﺲ‬ ‫‪ ،WPAN‬اﺳ‪jjjjj‬ﺘﻨﺎدا إﻟ‪jjjjj‬ﻰ ﻣﻮاﺻ‪jjjjj‬ﻔﺎت ‪ Bluetooth‬اﻹﺻ‪jjjjjj‬ﺪار 0.1.‬ ‫ً‬ ‫اﻷهﺪاف اﻟﺮﺋﻴﺴﻴﺔ ﻟﻬﺬﻩ اﻟﻤﻘﺎﻳﻴﺲ هﻲ ﺗﺨﻔﻴﺾ اﻟﺘﻌﻘﻴﺪ، ﺗﺨﻔﻴﺾ اﺳﺘﻬﻼك‬ ‫اﻟﻄﺎﻗ‪jjj‬ﺔ، إﻣﻜﺎﻧﻴ‪jjj‬ﺔ اﻟﺘﺸ‪jjj‬ﻐﻴﻞ اﻟﻤﺘﺒ‪jjj‬ﺎدل، واﻟﺘﻮاﻓ‪jjj‬ﻖ ﻣ‪jjj‬ﻊ ﺷ‪jjj‬ﺒﻜﺎت اﺗﺼ‪jjj‬ﺎل‬ ‫11.208.‬ ‫أﻣﺎ ﺑﺎﻟﻨﺴﺒﺔ ﻟﻸﺷﻌﺔ ﺗﺤﺖ اﻟﺤﻤﺮاء ﻓﺈﻧﻪ ﻳﺘﻢ ﺗﻄﺒﻴ‪j‬ﻖ ﻧﻘ‪j‬ﻞ اﻟﺒﻴﺎﻧ‪j‬ﺎت ﺑﺎﻷﺷ‪j‬ﻌﺔ‬ ‫ﺗﺤﺖ اﻟﺤﻤﺮاء وﻓﻘﺎ ﻟﻤﻘﺎﻳﻴﺲ وﺑﺮوﺗﻮآﻮﻻت اﻗﺘﺮان ﺑﻴﺎﻧﺎت ﺑﺎﻷﺷﻌﺔ ﺗﺤﺖ‬ ‫ً‬ ‫663‬

‫اﻟﺤﻤ‪j‬ﺮاء )‪ .(IrDA‬ه‪j‬ﺬﻩ اﻟﻤﻘ‪j‬ﺎﻳﻴﺲ ﻣﺼ‪jj‬ﻤﻤﺔ ﻟﺘﺴ‪j‬ﻤﺢ ﺑﻤﻜﻮﻧ‪j‬ﺎت ذات آﻠﻔ‪jj‬ﺔ‬ ‫أﻗﻞ وﻣﺘﻄﻠﺒﺎت ﻃﺎﻗﺔ ﻣﻨﺨﻔﻀﺔ، وﻟﺘﻤﻜﻴﻦ اﻻﺗﺼﺎﻻت ﺑﻤﺠﺮد ﺟﻌﻞ أﺟﻬﺰة‬ ‫اﻷﺷ‪jjj‬ﻌﺔ ﺗﺤ‪jjj‬ﺖ اﻟﺤﻤ‪jjj‬ﺮاء ﺗﺸ‪jjj‬ﻴﺮ إﻟ‪jjj‬ﻰ ﺑﻌﻀ‪jjj‬ﻬﺎ اﻟ‪jjj‬ﺒﻌﺾ ﺑﻜ‪jjj‬ﻞ ﺑﺴ‪jjj‬ﺎﻃﺔ. إن‬ ‫ﻣﺮﺳ‪jj‬ﻼت ﻣﺴ‪jj‬ﺘﻘﺒﻼت اﻷﺷ‪jj‬ﻌﺔ ﺗﺤ‪jj‬ﺖ اﻟﺤﻤ‪jj‬ﺮاء ﻣﺜﺒﺘ‪jj‬ﺔ ﻋﻠ‪jj‬ﻰ آﺎﻓ‪jj‬ﺔ أﺟﻬ‪jj‬ﺰة‬ ‫اﻟﻜﻤﺒﻴﻮﺗﺮ اﻟﻤﺤﻤﻮﻟﺔ اﻟﺠﺪﻳﺪة ﺗﻘﺮﻳﺒﺎ. وﻣﻦ أﺟﻞ أﺟﻬﺰة اﻟﻜﻤﺒﻴ‪j‬ﻮﺗﺮ اﻟﺘ‪j‬ﻲ ﻻ‬ ‫ً‬ ‫ﺗﺤﺘﻮي ﻋﻠﻰ ﻣﺮﺳﻼت ﻣﺴ‪j‬ﺘﻘﺒﻼت أﺷ‪j‬ﻌﺔ ﺗﺤ‪j‬ﺖ ﺣﻤ‪j‬ﺮاء ﻣﻀ‪ّ j‬ﻨﺔ، ﻳﻤﻜﻨ‪j‬ﻚ‬ ‫ﻤ‬ ‫ﺗﺜﺒﻴﺖ ﻣﺮﺳﻼت ﻣﺴﺘﻘﺒﻼت ﺧﺎرﺟﻴﺔ ﻟﻸﺷﻌﺔ ﺗﺤﺖ اﻟﺤﻤﺮاء.‬ ‫إن ‪ IrDA‬هﻮ ﺗﻘﻨﻴﺔ ﺗﺤﻮﻳ‪j‬ﻞ ﺑﻴﺎﻧ‪j‬ﺎت أﺣﺎدﻳ‪j‬ﺔ اﻻﺗﺠ‪j‬ﺎﻩ، ذات ﻣ‪j‬ﺪى ﺻ‪j‬ﻐﻴﺮ.‬ ‫ﺗﻌ‪jjj‬ﻴﻦ ﺑﺮﺗﻮآ‪jjj‬ﻮﻻت ‪ IrDA‬اﻹﺟ‪jjj‬ﺮاءات اﻟﺘ‪jjj‬ﻲ ﺗﻌﺘﻤ‪jjj‬ﺪ ﺗﻬﻴﺌ‪jjj‬ﺔ اﻻرﺗﺒ‪jjj‬ﺎط،‬ ‫واآﺘﺸ‪jj‬ﺎف ﻋﻨ‪jj‬ﻮان اﻟﺠﻬ‪jj‬ﺎز، وﺑ‪jj‬ﺪء ﺗﺸ‪jj‬ﻐﻴﻞ اﻻﺗﺼ‪jj‬ﺎل، واﻟﺘﻔ‪jj‬ﺎوض ﻋﻠ‪jj‬ﻰ‬ ‫ﺳﺮﻋﺔ اﻟﺒﻴﺎﻧ‪j‬ﺎت، وﺗﺒ‪j‬ﺎدل اﻟﻤﻌﻠﻮﻣ‪j‬ﺎت، وﻗﻄ‪j‬ﻊ اﻻﺗﺼ‪j‬ﺎل، وإﻳﻘ‪j‬ﺎف ﺗﺸ‪j‬ﻐﻴﻞ‬ ‫اﻻرﺗﺒﺎط، وﺣﻞ ﺗﻌﺎرض ﻋﻨﺎوﻳﻦ اﻷﺟﻬﺰة.‬ ‫اﻋﺘﻤﺎد ﺟﻬﺎز اﻷﺷﻌﺔ ﺗﺤﺖ اﻟﺤﻤﺮاء‬ ‫ﻳ‪j‬ﺘﻢ ﺗ‪j‬ﻮﻓﻴﺮ وﻇﻴﻔ‪j‬ﺔ اﻷﺷ‪j‬ﻌﺔ ﺗﺤ‪j‬ﺖ اﻟﺤﻤ‪j‬ﺮاء ﻣ‪j‬ﻦ ﺧ‪j‬ﻼل ﻣﻴ‪j‬ﺰة ﻧﻘ‪j‬ﻞ اﻟﻤﻠﻔ‪j‬ﺎت‬ ‫ﻋﺒﺮ اﻻرﺗﺒﺎط اﻟﻼﺳﻠﻜﻲ، واﻟﻄﺒﺎﻋﺔ ﺑﺎﻷﺷ‪j‬ﻌﺔ ﺗﺤ‪j‬ﺖ اﻟﺤﻤ‪j‬ﺮاء ‪،((IrLPT‬‬ ‫وﻧﻘﻞ اﻟﺼﻮر ﺑﺎﻷﺷﻌﺔ ﺗﺤﺖ اﻟﺤﻤﺮاء )‪ ،(IrTran-P‬وإﻣﻜﺎﻧﻴﺎت ﺷ‪j‬ﺒﻜﺎت‬ ‫اﺗﺼ‪jjjj‬ﺎل اﻷﺷ‪jjjj‬ﻌﺔ ﺗﺤ‪jjjj‬ﺖ اﻟﺤﻤ‪jjjj‬ﺮاء )‪ IrDial‬و ‪.(IrComm/IrNET‬‬ ‫ﺑﺎﻹﺿ‪j‬ﺎﻓﺔ إﻟ‪j‬ﻰ ذﻟ‪j‬ﻚ، ﺗﻌﺘﻤ‪j‬ﺪ ‪ IrDA Winsock API‬اﻟﺒ‪j‬ﺮاﻣﺞ اﻟﺘ‪j‬ﻲ ﺗ‪j‬ﻢ‬ ‫إﻧﺸﺎؤهﺎ ﻣﻦ ﻗﺒﻞ ﺷﺮآﺎت ﻣﺼﻨﻌﺔ أﺧ‪j‬ﺮى ﻟﻠﺒ‪j‬ﺮاﻣﺞ واﻟﺘﺠﻬﻴ‪j‬ﺰات. إن ه‪j‬ﺬﻩ‬ ‫اﻟﺸ‪j‬ﺮآﺎت اﻟﻤﺼ‪j‬ﻨﻌﺔ ﺗﺒﻴ‪j‬ﻊ اﻟﺒ‪j‬ﺮاﻣﺞ اﻟﺘ‪j‬ﻲ ﺗﺴ‪j‬ﺘﺨﺪم ‪) Winsock API‬أو‬ ‫واﺟﻬ‪j‬ﺎت اﻟﻤﺎﻟ‪j‬ﻚ( ﻟﺘ‪j‬ﻮﻓﻴﺮ اﺗﺼ‪j‬ﺎﻻت اﻷﺷ‪j‬ﻌﺔ ﺗﺤ‪j‬ﺖ اﻟﺤﻤ‪j‬ﺮاء ﺑﺎﻟﻄﺎﺑﻌ‪jj‬ﺎت،‬ ‫وأﺟﻬ‪jjjj‬ﺰة اﻟﻤ‪jjjj‬ﻮدم، وأﺟﻬ‪jjjj‬ﺰة اﻟﻨ‪jjjj‬ﺪاء اﻟﺮﻗﻤﻴ‪jjjj‬ﺔ، واﻟﻤﺴ‪jjjj‬ﺎﻋﺪات اﻟﺮﻗﻤﻴ‪jjjj‬ﺔ‬ ‫اﻟﺸﺨﺼﻴﺔ، واﻟﻜﺎﻣﻴﺮات اﻹﻟﻜﺘﺮوﻧﻴﺔ، وأﺟﻬﺰة ﺗﻨﻈﻴﻢ اﻟﻤﻮاﻋﻴ‪j‬ﺪ، وأﺟﻬ‪j‬ﺰة‬ ‫اﻟﻬﺎﺗﻒ اﻟﺨﻠﻮﻳﺔ، وأﺟﻬﺰة اﻟﻜﻤﺒﻴﻮﺗﺮ اﻟﻤﺤﻤﻮﻟﺔ ﺑﺎﻟﻴﺪ.‬ ‫ﺳﺮﻋﺎت اﻟﻨﻘﻞ ﺑﺎﻷﺷﻌﺔ ﺗﺤﺖ اﻟﺤﻤﺮاء‬ ‫إن اﻟﻌﺪﻳﺪ ﻣﻦ أﺟﻬﺰة اﻟﻜﻤﺒﻴﻮﺗﺮ اﻟﻤﺤﻤﻮﻟﺔ، وأﺟﻬﺰة اﻟﻜﻤﺒﻴ‪j‬ﻮﺗﺮ اﻟﻤﺤﻤﻮﻟ‪j‬ﺔ‬ ‫ﺑﺎﻟﻴﺪ ﺗﺘﻀﻤﻦ اﻵن ﻣﻨﺎﻓﺬ ﻣﺮﺳﻼت ﻣﺴﺘﻘﺒﻼت أﺷ‪j‬ﻌﺔ ﺗﺤ‪j‬ﺖ ﺣﻤ‪j‬ﺮاء واﻟﺘ‪j‬ﻲ‬ ‫ﺗ‪jj‬ﻮﻓﺮ ﻧﻘ‪j‬ﻼ ﺗﺴﻠﺴ‪jj‬ﻠﻴﺎ ﻏﻴ‪jj‬ﺮ ﻣﺘ‪jj‬ﺰاﻣﻦ ﻣ‪jj‬ﻊ ﺳ‪jj‬ﺮﻋﺔ ﻧﻘ‪jj‬ﻞ ﺑﻴﺎﻧ‪jj‬ﺎت ﻗﺼ‪jj‬ﻮى ﺗﺒﻠ‪jj‬ﻎ‬ ‫ً‬ ‫ً‬ ‫763‬

‫2.511 آﻴﻠﻮ ﺑﺖ ﺑﺎﻟﺜﺎﻧﻴﺔ أو 4 ﻣﻴﻐﺎ ﺑﺖ ﺑﺎﻟﺜﺎﻧﻴﺔ، وﻓﻲ ﺑﻌﺾ اﻷﺣﻴﺎن 61‬ ‫ﻣﻴﻐﺎ ﺑﺖ ﺑﺎﻟﺜﺎﻧﻴﺔ.‬ ‫اﻋﺘﻤﺎد )‪Serial IrDA 115.2 Kbps (SIR‬‬ ‫ﻳ‪jj‬ﻮﻓﺮ ﺗﻄﺒﻴ‪jj‬ﻖ )‪ Serial IrDA (SIR‬ﻟ‪jj‬ـ ‪ IrDA‬ﺳ‪jj‬ﺮﻋﺔ ﻧﻘ‪jj‬ﻞ ﺑﻴﺎﻧ‪jj‬ﺎت‬ ‫ﻗﺼﻮى ﺗﺒﻠﻎ 2.511 آﻴﻠﻮ ﺑ‪j‬ﺖ ﺑﺎﻟﺜﺎﻧﻴ‪j‬ﺔ. إن اﻟﻔﺎﺋ‪j‬ﺪة اﻷﺳﺎﺳ‪j‬ﻴﺔ ﻣ‪j‬ﻦ ﺗﻄﺒﻴﻘ‪j‬ﻪ‬ ‫ه‪jj‬ﻲ أن اﻷﺟﻬ‪jj‬ﺰة اﻟﺘﺴﻠﺴ‪jj‬ﻠﻴﺔ اﻟﻤﻮﺟ‪jj‬ﻮدة ﻳﻤﻜ‪jj‬ﻦ اﺳ‪jj‬ﺘﺨﺪاﻣﻬﺎ ﺑ‪jj‬ﺪون ﺗﻜﻠﻔ‪jj‬ﺔ‬ ‫إﺿﺎﻓﻴﺔ.‬ ‫اﻋﺘﻤ‪j‬ﺎد )‪ Fast IrDA 4.0 Mbps (FIR‬واﻋﺘﻤ‪j‬ﺎد ‪Very Fast‬‬ ‫)‪IrDA 16.0 Mbps (VFIR‬‬ ‫إن ﻋﻤﻠﻴ‪jj‬ﺔ ﺗﻄﺒﻴ‪jj‬ﻖ )‪ Fast IrDA (FIR‬ﻟ‪jj‬ـ ‪ IrDA‬ﺗ‪jj‬ﻮﻓﺮ ﺳ‪jj‬ﺮﻋﺔ ﻧﻘ‪jj‬ﻞ‬ ‫ﺑﻴﺎﻧ‪jj‬ﺎت ﻗﺼ‪jj‬ﻮى ﺗﺒﻠ‪jj‬ﻎ 4 ﻣﻴﻐ‪jj‬ﺎ ﺑ‪jj‬ﺖ ﺑﺎﻟﺜﺎﻧﻴ‪jj‬ﺔ ﻳﻤﻜ‪jj‬ﻦ أن ﺗﺘﻌ‪jj‬ﺪل ﻣ‪jj‬ﻊ ﺳ‪jj‬ﺮﻋﺔ‬ ‫اﻷﺟﻬ‪jj‬ﺰة اﻷﺑﻄ‪jj‬ﺄ ﺑﺴ‪jj‬ﻬﻮﻟﺔ. آﻤ‪jj‬ﺎ ﻳﺠ‪jj‬ﺮي اﻋﺘﻤ‪jj‬ﺎد ‪Very Fast IrDA‬‬ ‫)‪ ،(VFIR‬اﻟﺘﻲ ﺗﻮﻓﺮ ﻧﻘﻞ ﺑﻴﺎﻧﺎت أﺣ‪j‬ﺎدي اﻻﺗﺠ‪j‬ﺎﻩ ﺑﺴ‪j‬ﺮﻋﺔ 61 ﻣﻴﻐ‪j‬ﺎ ﺑ‪j‬ﺖ‬ ‫ﺑﺎﻟﺜﺎﻧﻴﺔ. ﻳﻤﻜﻦ ﻷﺟﻬﺰة ‪ FIR‬و ‪ VFIR‬اﻻﺗﺼﺎل ﻣﻊ أﺟﻬﺰة ‪.SIR‬‬ ‫اﻋﺘﻤﺎد ‪ IrComm‬و ‪IrDial‬‬ ‫ﺑﻮاﺳ‪jjj‬ﻄﺔ ‪ ،IrComm‬ﻳﻤﻜﻨ‪jjj‬ﻚ اﺳ‪jjj‬ﺘﺨﺪام اﻟﻜﻤﺒﻴ‪jjj‬ﻮﺗﺮ واﻟﻬ‪jjj‬ﺎﺗﻒ اﻟﺨﻠﻴ‪jjj‬ﻮي‬ ‫اﻟﻤﺠﻬ‪jjj‬ﺰ ﺑﺎﻷﺷ‪jjj‬ﻌﺔ ﺗﺤ‪jjj‬ﺖ اﻟﺤﻤ‪jjj‬ﺮاء ﻟﻼﺗﺼ‪jjj‬ﺎل ﺑﻤ‪jjj‬ﻮﻓﺮ ﺧﺪﻣ‪jjj‬ﺔ إﻧﺘﺮﻧ‪jjj‬ﺖ أو‬ ‫إرﺳ‪jj‬ﺎل رﺳ‪jj‬ﺎﺋﻞ اﻟﻔ‪jj‬ﺎآﺲ ﺑ‪jj‬ﺪون ﺗﺠﻬﻴ‪jj‬ﺰات إﺿ‪jj‬ﺎﻓﻴﺔ. ﺑﻮاﺳ‪jjj‬ﻄﺔ ‪،IrDial‬‬ ‫ﻳﻤﻜﻨ‪jj‬ﻚ ﺗﺄﺳ‪jj‬ﻴﺲ اﺗﺼ‪jj‬ﺎل ﻧﻘﻄ‪jj‬ﺔ إﻟ‪jj‬ﻰ ﻧﻘﻄ‪jj‬ﺔ ﺑ‪jj‬ﻴﻦ اﻟﻜﻤﺒﻴ‪jj‬ﻮﺗﺮ اﻟﺨ‪jj‬ﺎص ﺑ‪jj‬ﻚ‬ ‫وآﻤﺒﻴ‪jj‬ﻮﺗﺮ ﺁﺧ‪jj‬ﺮ أو ﺟﻬ‪jj‬ﺎز ﺁﺧ‪jj‬ﺮ ﻣﺠﻬ‪jj‬ﺰ ﺑﺎﻷﺷ‪jj‬ﻌﺔ ﺗﺤ‪jj‬ﺖ اﻟﺤﻤ‪jj‬ﺮاء. ﻳﻤﻜﻨ‪jj‬ﻚ‬ ‫أﻳﻀ‪j‬ﺎ ﺗﺄﺳ‪jj‬ﻴﺲ اﺗﺼ‪jj‬ﺎل ﺑ‪jj‬ﻴﻦ اﻟﻜﻤﺒﻴ‪jj‬ﻮﺗﺮ اﻟﺨ‪jj‬ﺎص ﺑ‪jj‬ﻚ وﻧﻘﻄ‪jj‬ﺔ وﺻ‪jj‬ﻮل إﻟ‪jj‬ﻰ‬ ‫ً‬ ‫اﻟﺸﺒﻜﺔ.‬ ‫اﻋﺘﻤﺎد ‪ IrLPT‬ﻟﻠﻄﺎﺑﻌﺔ‬ ‫إذا آﺎن ﻟﻠﻜﻤﺒﻴﻮﺗﺮ اﻟﺨﺎص ﺑﻚ ﺟﻬ‪j‬ﺎز أﺷ‪j‬ﻌﺔ ﺗﺤ‪j‬ﺖ ﺣﻤ‪j‬ﺮاء داﺧﻠ‪j‬ﻲ، أو إذا‬ ‫ﻗﻤﺖ ﺑﺘﺜﺒﻴﺖ ﻣﺮﺳﻞ ﻣﺴﺘﻘﺒﻞ أﺷﻌﺔ ﺗﺤﺖ ﺣﻤﺮاء، ﻳﻈﻬﺮ ﻣﻨﻔﺬ أﺷ‪j‬ﻌﺔ ﺗﺤ‪j‬ﺖ‬ ‫ﺣﻤﺮاء آﻤﻨﻔﺬ ﻣﺤﻠﻲ ﻓﻲ ﻣﺮﺑﻊ اﻟﺤﻮار إﺿﺎﻓﺔ ﻃﺎﺑﻌﺔ. ﻋﻨﺪﻣﺎ ﺗﻘﺮن ﻃﺎﺑﻌﺔ‬ ‫863‬

‫ﺑﻬﺬا اﻟﻤﻨﻔ‪j‬ﺬ ﺛ‪j‬ﻢ ﺗﻘ‪j‬ﻮم ﺑﺎﻟﻄﺒﺎﻋ‪j‬ﺔ إﻟﻴﻬ‪j‬ﺎ، ﻳ‪j‬ﺘﻢ اﺳ‪j‬ﺘﺨﺪام اﻟﺒﺮوﺗﻮآ‪j‬ﻮل ‪IrLPT‬‬ ‫ﻟﻨﻘﻞ اﻟﺒﻴﺎﻧﺎت.‬ ‫اﻋﺘﻤﺎد ﻧﻘﻞ اﻟﺼﻮرة ﻣﻊ ‪IrTran-P‬‬ ‫ﻳﺴ‪jj‬ﺘﺨﺪم ﺑﺮوﺗﻮآ‪jj‬ﻮل ﻧﻘ‪jj‬ﻞ اﻟﺼ‪jj‬ﻮر ‪ IrTran-P‬ﻓ‪jj‬ﻲ اﻟﻜ‪jj‬ﺎﻣﻴﺮات اﻟﺮﻗﻤﻴ‪jj‬ﺔ‬ ‫وأﺟﻬ‪jj‬ﺰة اﻟﺘﻘ‪jj‬ﺎط اﻟﺼ‪jj‬ﻮر اﻟﺮﻗﻤﻴ‪jj‬ﺔ اﻷﺧ‪jj‬ﺮى. ﻳﻤﻜﻨ‪jj‬ﻚ اﺳ‪jj‬ﺘﺨﺪام ه‪jj‬ﺬﻩ اﻟﻤﻴ‪jj‬ﺰة‬ ‫ﻻﺳﺘﻘﺒﺎل ﺻﻮر رﻗﻤﻴﺔ ﻣﻦ آﺎﻣﻴﺮا أو ﺟﻬﺎز ﺁﺧ‪j‬ﺮ ﻳﻌﺘﻤ‪j‬ﺪ ‪ IrTran-P‬إﻟ‪j‬ﻰ‬ ‫اﻟﻜﻤﺒﻴﻮﺗﺮ اﻟﺨﺎص ﺑﻚ ﻣﻦ ﺧﻼل اﺗﺼﺎل ‪ .IrDA‬إن اﻟﺨﺪﻣﺔ ‪IrTran-P‬‬ ‫ﻣﻄﺒﻘﺔ آﺨﺪﻣﺔ اﺳﺘﻤﺎع ﻓﻘﻂ؛ وهﻲ ﻻ ﺗﺒﺪأ أﺑﺪا اﺗﺼﺎل ‪.IrTran-P‬‬ ‫ً‬ ‫ﻣﻼﺣﻈﺔ:‬ ‫إذا آﻨﺖ ﺗﺴﺘﺨﺪم ﺑﺮﻧﺎﻣﺞ ﻣﺰاﻣﻨﺔ، ﻓﻌﻠﻴ‪j‬ﻚ اﻻﻧﺘﺒ‪j‬ﺎﻩ إﻟ‪j‬ﻰ أن ﺑﻌ‪j‬ﺾ اﻟﺒ‪j‬ﺮاﻣﺞ‬ ‫ﺗﻌﻄ‪jjj‬ﻞ ﻧﻘ‪jjj‬ﻞ اﻟﺼ‪jjj‬ﻮر ﺑﺎﻷﺷ‪jjj‬ﻌﺔ ﺗﺤ‪jjj‬ﺖ اﻟﺤﻤ‪jjj‬ﺮاء ﺗﻠﻘﺎﺋﻴ‪jjj‬ﺎ ‪.((Ir-TranP‬‬ ‫ً‬ ‫وآﻨﺘﻴﺠ‪jj‬ﺔ ﻟ‪jj‬ﺬﻟﻚ، ﻟ‪jj‬ﻦ ﻳﻜ‪jj‬ﻮن ﺑﺈﻣﻜﺎﻧ‪jj‬ﻚ اﺳ‪jj‬ﺘﺨﺪام اﻻرﺗﺒ‪jj‬ﺎط اﻟﻼﺳ‪jj‬ﻠﻜﻲ ﻟﻨﻘ‪jj‬ﻞ‬ ‫اﻟﺼ‪jj‬ﻮر ﻣ‪jj‬ﻦ آ‪jj‬ﺎﻣﻴﺮا رﻗﻤﻴ‪jj‬ﺔ إﻟ‪jj‬ﻰ اﻟﻜﻤﺒﻴ‪jj‬ﻮﺗﺮ. ﻓ‪jj‬ﻲ ﻣﺜ‪jj‬ﻞ ه‪jj‬ﺬﻩ اﻟﺤ‪jj‬ﺎﻻت، ﻗ‪jj‬ﺪ‬ ‫ﺗﺤﺘ‪jj‬ﺎج ﻹزاﻟ‪jj‬ﺔ ﺑﺮﻧ‪jj‬ﺎﻣﺞ اﻟﻤﺰاﻣﻨ‪jj‬ﺔ ﻗﺒ‪jj‬ﻞ أن ﺗ‪jj‬ﺘﻤﻜﻦ ﻣ‪jj‬ﻦ اﺳ‪jj‬ﺘﺨﺪام اﻻرﺗﺒ‪jj‬ﺎط‬ ‫اﻟﻼﺳﻠﻜﻲ ﻟﻨﻘﻞ ﺻﻮر آﺎﻣﻴﺮا رﻗﻤﻴﺔ. ﻟﺘﺤﺪﻳﺪ ﻣﺎ إذا آﺎن ﺑﺮﻧﺎﻣﺞ اﻟﻤﺰاﻣﻨ‪j‬ﺔ‬ ‫ﻳﻌﻄﻞ ﻧﻘﻞ اﻟﺼﻮر ﺑﺎﻷﺷﻌﺔ ﺗﺤﺖ اﻟﺤﻤﺮاء، راﺟﻊ وﺛﺎﺋﻖ اﻟﻤﻨ‪j‬ﺘﺞ ﻟﻠﺸ‪j‬ﺮآﺔ‬ ‫اﻟﻤﺼﻨﻌﺔ ﻟﻠﺒﺮﻧﺎﻣﺞ.‬ ‫اﻻرﺗﺒﺎﻃﺎت ﺑﻴﻦ أﺟﻬﺰة اﻷﺷﻌﺔ ﺗﺤﺖ اﻟﺤﻤﺮاء‬ ‫إن ﻧﻘ‪jj‬ﻞ اﻟﺒﻴﺎﻧ‪jj‬ﺎت ﺑﻮاﺳ‪jj‬ﻄﺔ ارﺗﺒ‪jj‬ﺎط اﻷﺷ‪jj‬ﻌﺔ ﺗﺤ‪jj‬ﺖ اﻟﺤﻤ‪jj‬ﺮاء ﻳﺤ‪jj‬ﺪث ﺑ‪jj‬ﻴﻦ‬ ‫ﺟﻬﺎزي أﺷﻌﺔ ﺗﺤﺖ ﺣﻤﺮاء. ﺗﻨﺘﻘﻞ آﺎﻓﺔ ﻋﻤﻠﻴﺎت اﻹرﺳﺎل ﻋﺒ‪j‬ﺮ اﻻرﺗﺒ‪j‬ﺎط‬ ‫ﻣ‪jj‬ﻦ اﻟﺠﻬ‪jj‬ﺎز اﻷﺳﺎﺳ‪jj‬ﻲ )اﻟﻤﺮﺳ‪jj‬ﻞ( إﻟ‪jj‬ﻰ اﻟﺠﻬ‪jj‬ﺎز اﻟﺜ‪jj‬ﺎﻧﻮي )اﻟﻤﺘﻠﻘ‪jj‬ﻲ(. ﻳ‪jj‬ﺘﻢ‬ ‫ﺗﺤﺪﻳﺪ اﻟﺪور اﻷﺳﺎﺳﻲ ﺑﺸﻜﻞ ﺣﻴﻮي ﻋﻨ‪j‬ﺪ ﺗﺄﺳ‪j‬ﻴﺲ اﻻرﺗﺒ‪j‬ﺎط وﻳﺴ‪j‬ﺘﻤﺮ إﻟ‪j‬ﻰ‬ ‫أن ﻳﺘﻢ إﻧﻬﺎء اﻻﺗﺼﺎل. ﻳﻤﻜ‪j‬ﻦ ﻷي ﻣﺤﻄ‪j‬ﺔ ﻗ‪j‬ﺎدرة ﺗ‪j‬ﻮّﻲ اﻟ‪j‬ﺪور اﻷﺳﺎﺳ‪j‬ﻲ.‬ ‫ﻟ‬ ‫ﻓﻲ ﺣﺎل وﺟﻮد ﺟﻬﺎزي آﻤﺒﻴﻮﺗﺮ ﻓﻲ اﻟﻤﺠﺎل، ﻳﻤﻜﻦ ﻷي واﺣ‪j‬ﺪ ﻣﻨﻬﻤ‪j‬ﺎ أن‬ ‫ﻳﺘﻮّﻰ اﻟﺪور اﻷﺳﺎﺳﻲ، ﺑﺤﻴﺚ ﻳﺘﻤﻜﻦ اﻟﻤﺴﺘﺨﺪم ﻣﻦ ﺑﺪء ﻧﻘﻞ ﺑﻴﺎﻧﺎت ﻋﻠ‪j‬ﻰ‬ ‫ﻟ‬ ‫أي ﻣ‪jj‬ﻦ ﺟﻬ‪jj‬ﺎزي اﻟﻜﻤﺒﻴ‪jj‬ﻮﺗﺮ. ﻗ‪jj‬ﺪ ﺗﻜ‪jj‬ﻮن ﺑﻌ‪jj‬ﺾ اﻷﺟﻬ‪jj‬ﺰة ﻗ‪jj‬ﺎدرة ﻓﻘ‪jj‬ﻂ ﻋﻠ‪jj‬ﻰ‬ ‫ﺗﻮّﻲ اﻟﺪور اﻟﺜﺎﻧﻮي.‬ ‫ﻟ‬ ‫963‬

‫آﻴﻔﻴﺔ إﺟﺮاء اﺗﺼﺎل أﺷﻌﺔ ﺗﺤﺖ ﺣﻤﺮاء‬ ‫ﻳﻘ‪jj‬ﻮم اﻟﺠﻬ‪jj‬ﺎز ﺑﺈﻧﺸ‪jj‬ﺎء ارﺗﺒ‪jj‬ﺎط ﺑﻮاﺳ‪jj‬ﻄﺔ اﻟﻜﺸ‪jj‬ﻒ اﻟﺘﻠﻘ‪jj‬ﺎﺋﻲ ﻋ‪jj‬ﻦ اﻵﺧ‪jj‬ﺮ أو‬ ‫ﺑﻮاﺳ‪jj‬ﻄﺔ ﻃﻠ‪jj‬ﺐ ﻣ‪jj‬ﻦ اﻟﻤﺴ‪jj‬ﺘﺨﺪم. ﺗﺮﺳ‪jj‬ﻞ اﻟﻤﺤﻄ‪jj‬ﺔ اﻵﻣ‪jj‬ﺮة ﻃﻠ‪jj‬ﺐ اﺗﺼ‪jj‬ﺎل‬ ‫ﺑﺴﺮﻋﺔ 006,9 ﺑﺖ ﺑﺎﻟﺜﺎﻧﻴﺔ إﻟﻰ اﻟﺠﻬﺎز اﻵﺧﺮ )ﻣﺘﻀ‪j‬ﻤﻨﺎ ﻣﻌﻠﻮﻣ‪j‬ﺎت ﻣﺜ‪j‬ﻞ‬ ‫ً‬ ‫اﻟﻌﻨ‪jjj‬ﻮان، وﺳ‪jjj‬ﺮﻋﺔ اﻟﺒﻴﺎﻧ‪jjj‬ﺎت، واﻹﻣﻜﺎﻧﻴ‪jjj‬ﺎت اﻷﺧ‪jjj‬ﺮى(. ﻳﺘ‪jjj‬ﻮّﻰ اﻟﺠﻬ‪jjj‬ﺎز‬ ‫ﻟ‬ ‫اﻟﻤﺴ‪jjj‬ﺘﺠﻴﺐ اﻟ‪jjj‬ﺪور اﻟﺜ‪jjj‬ﺎﻧﻮي وﻳﻌﻴ‪jjj‬ﺪ اﻟﻤﻌﻠﻮﻣ‪jjj‬ﺎت اﻟﺘ‪jjj‬ﻲ ﺗﺘﻀ‪jjj‬ﻤﻦ ﻋﻨﻮاﻧ‪jjj‬ﻪ‬ ‫وإﻣﻜﺎﻧﻴﺎﺗﻪ. ﻋﻨﺪﺋﺬ، ﺗﻐﻴﺮ اﻟﻤﺤﻄ‪j‬ﺎت اﻷﺳﺎﺳ‪j‬ﻴﺔ واﻟﺜﺎﻧﻮﻳ‪j‬ﺔ ﺳ‪j‬ﺮﻋﺔ اﻟﺒﻴﺎﻧ‪j‬ﺎت‬ ‫ٍ‬ ‫وﻣﻌﻠﻤ‪jj‬ﺎت اﻟ‪jj‬ﺮﺑﻂ إﻟ‪jj‬ﻰ اﻟﺘﻌﻴ‪jj‬ﻴﻦ اﻟﻌ‪jj‬ﺎم اﻟﻤﻌ ‪ّ j‬ف ﻣ‪jj‬ﻦ ﺧ‪jj‬ﻼل اﻟﻨﻘ‪jj‬ﻞ اﻷوﻟ‪jj‬ﻲ‬ ‫ﺮ‬ ‫ﻟﻠﻤﻌﻠﻮﻣ‪jj‬ﺎت. وأﺧﻴ‪jj‬ﺮً، ﺗﺮﺳ‪jj‬ﻞ اﻟﻤﺤﻄ‪jj‬ﺔ اﻷﺳﺎﺳ‪jj‬ﻴﺔ ﺑﻴﺎﻧ‪jj‬ﺎت إﻟ‪jj‬ﻰ اﻟﻤﺤﻄ‪jj‬ﺔ‬ ‫ا‬ ‫َ‬ ‫اﻟﺜﺎﻧﻮﻳﺔ ﻣﺆآﺪة ﻋﻠﻰ اﻻﺗﺼﺎل. ﻓﻴﺘﻢ وﺻ‪j‬ﻞ اﻷﺟﻬ‪j‬ﺰة وﺗﺒ‪j‬ﺪأ ﺑﻨﻘ‪j‬ﻞ اﻟﺒﻴﺎﻧ‪j‬ﺎت‬ ‫ً‬ ‫ﺗﺤﺖ ﺗﺤﻜﻢ اﻟﺠﻬﺎز اﻷﺳﺎﺳﻲ.‬ ‫اﺗﺼﺎﻻت اﻷﺷﻌﺔ ﺗﺤﺖ اﻟﺤﻤﺮاء اﻟﻤﺘﻌﺪدة‬ ‫ﻳﻌﺘﻤﺪ ‪ Winsock API‬اﺗﺼﺎﻻت ﻣﺘﻌﺪدة ﻓﻲ اﻟﻮﻗﺖ ﻧﻔﺴﻪ ﻋﺒ‪j‬ﺮ ارﺗﺒ‪j‬ﺎط‬ ‫‪ IrDA‬واﺣ‪jj‬ﺪ. ﺗﺴ‪jj‬ﻤﺢ ه‪jj‬ﺬﻩ اﻟﻤﻴ‪jj‬ﺰة ﻟﻌ‪jj‬ﺪة ﺑ‪jj‬ﺮاﻣﺞ ﻣﺨﺘﻠﻔ‪jj‬ﺔ ﺑﺎﺳ‪jj‬ﺘﺨﺪام ﺟﻬ‪jj‬ﺎز‬ ‫أﺷ‪jj‬ﻌﺔ ﺗﺤ‪jj‬ﺖ ﺣﻤ‪jj‬ﺮاء واﺣ‪jj‬ﺪ ﻓ‪jj‬ﻲ اﻟﻮﻗ‪jj‬ﺖ ﻧﻔﺴ‪jj‬ﻪ. ﻣ‪jj‬ﺜ ً، ﻗ‪jj‬ﺪ ﺗﻀ‪jj‬ﻊ آﻤﺒﻴ‪jj‬ﻮﺗﺮا‬ ‫ً‬ ‫ﻼ‬ ‫ﻣﺤﻤﻮﻻ ﺿﻤﻦ ﻣﺠﺎل آﻤﺒﻴﻮﺗﺮ ﻣﻜﺘﺒﻲ ﻹرﺳﺎل واﺳﺘﻘﺒﺎل ﺑﺮﻳ‪j‬ﺪ، وﺗﺤ‪j‬ﺪﻳﺚ‬ ‫ً‬ ‫اﻟﺘﻘ‪jj‬ﻮﻳﻢ واﻻﺗﺼ‪jj‬ﺎﻻت، وﻃﺒﺎﻋ‪jj‬ﺔ اﻟﻤﺴ‪jj‬ﺘﻨﺪات اﻟﻤﺆﺟﻠ‪jj‬ﺔ ﻓ‪jj‬ﻲ اﻟﻮﻗ‪jj‬ﺖ ﻧﻔﺴ‪jj‬ﻪ.‬ ‫ﻳﻤﻜ‪jjj‬ﻦ اﻟ‪jjj‬ﺘﺤﻜﻢ ﺑﻜ‪jjj‬ﻞ ﻧﺸ‪jjj‬ﺎط ﻣ‪jjj‬ﻦ ﻗﺒ‪jjj‬ﻞ ﺑﺮﻧ‪jjj‬ﺎﻣﺞ ﻣﺴ‪jjj‬ﺘﻘﻞ ﻋﻠ‪jjj‬ﻰ اﻟﻜﻤﺒﻴ‪jjj‬ﻮﺗﺮ‬ ‫اﻟﻤﺤﻤﻮل اﻟﺬي ﻳﺤﺪد ﻣﻮﻗﻊ اﻟﺒﺮﻧﺎﻣﺞ اﻟﻤﻨﺎﺳﺐ وﻳﺘﺼﻞ ﺑﻪ ﻋﻠﻰ اﻟﻜﻤﺒﻴﻮﺗﺮ‬ ‫اﻟﻤﻜﺘﺒﻲ.‬ ‫أﺟﻬﺰة أﺷﻌﺔ ﺗﺤﺖ ﺣﻤﺮاء ﻣﺘﻌﺪدة‬ ‫ﻻ ﻳﻤﻜﻦ ﻟﺠﻬﺎز أﺷﻌﺔ ﺗﺤﺖ ﺣﻤ‪j‬ﺮاء اﻻرﺗﺒ‪j‬ﺎط ﻣ‪j‬ﻊ أآﺜ‪j‬ﺮ ﻣ‪j‬ﻦ ﺟﻬ‪j‬ﺎز أﺷ‪j‬ﻌﺔ‬ ‫ﺗﺤ‪jj‬ﺖ ﺣﻤ‪jj‬ﺮاء ﺁﺧ‪jj‬ﺮ ﻓ‪jj‬ﻲ اﻟﻮﻗ‪jj‬ﺖ ﻧﻔﺴ‪jj‬ﻪ. ﺑ‪jj‬ﺎﻟﺮﻏﻢ ﻣ‪jj‬ﻦ ذﻟ‪jj‬ﻚ، ﻳﻤﻜﻨ‪jj‬ﻚ ﺗﺜﺒﻴ‪jj‬ﺖ‬ ‫أﺟﻬ‪jj‬ﺰة أﺷ‪jj‬ﻌﺔ ﺗﺤ‪jj‬ﺖ ﺣﻤ‪jj‬ﺮاء ﻣﺘﻌ‪jj‬ﺪدة ﻋﻠ‪jj‬ﻰ اﻟﻜﻤﺒﻴ‪jj‬ﻮﺗﺮ ﻟﺘ‪jj‬ﻮﻓﻴﺮ ارﺗﺒﺎﻃ‪jj‬ﺎت‬ ‫ﻣﺘﺰاﻣﻨ‪jj‬ﺔ ﻷﺟﻬ‪jj‬ﺰة أﺷ‪jj‬ﻌﺔ ﺗﺤ‪jj‬ﺖ ﺣﻤ‪jj‬ﺮاء ﻣﺘﻌ‪jj‬ﺪدة. ﻣ‪jj‬ﺜ ً، ﺑﺎﺳ‪jj‬ﺘﺨﺪام أﺟﻬ‪jj‬ﺰة‬ ‫ﻼ‬ ‫أﺷ‪jj‬ﻌﺔ ﺗﺤ‪jj‬ﺖ ﺣﻤ‪jj‬ﺮاء ﻣﻨﻔﺼ‪jj‬ﻠﺔ، ﻳﻤﻜ‪jj‬ﻦ ﻟﻜﻤﺒﻴ‪jj‬ﻮﺗﺮ ﻣﻜﺘﺒ‪jj‬ﻲ ﻓ‪jj‬ﻲ اﻟﻮﻗ‪jj‬ﺖ ﻧﻔﺴ‪jj‬ﻪ‬

‫073‬

‫اﻟﻄﺒﺎﻋ‪jj‬ﺔ إﻟ‪jj‬ﻰ ﻣﻨﻔ‪jj‬ﺬ أﺷ‪jj‬ﻌﺔ ﺗﺤ‪jj‬ﺖ ﺣﻤ‪jj‬ﺮاء، اﻻﺗﺼ‪jj‬ﺎل ﺑﻜﻤﺒﻴ‪jj‬ﻮﺗﺮ ﻣﺤﻤ‪jj‬ﻮل،‬ ‫وﻃﻠﺐ اﺗﺼﺎل ﺷﺒﻜﺔ.‬ ‫ﻳﻤﻜﻨﻚ اﺳﺘﺨﺪام اﺗﺼﺎﻻت ﺷﺒﻜﺔ اﻻﺗﺼ‪j‬ﺎل ﺑﺎﻷﺷ‪j‬ﻌﺔ ﺗﺤ‪j‬ﺖ اﻟﺤﻤ‪j‬ﺮاء ﻷداء‬ ‫ﻣﻬﺎم ﻣﺘﻨﻮﻋﺔ. ﻋﻠﻰ ﺳﺒﻴﻞ اﻟﻤﺜﺎل، ﻳﻤﻜﻨﻚ:‬ ‫1- اﻟﻮﺻﻮل إﻟﻰ إﻧﺘﺮﻧﺖ ﻣﻦ ﻣﻮﻗﻊ ﻋﺎم.‬ ‫إذا آﻨﺖ ﻓﻲ ﻣﻄﺎر، أو ﻓﻨﺪق، أو أي ﻣﻮﻗﻊ ﺁﺧﺮ ﻳﻮﻓﺮ ﻟﻠﻨﺎس وﺻﻮﻻ إﻟ‪j‬ﻰ‬ ‫ً‬ ‫إﻧﺘﺮﻧ‪jj‬ﺖ، ﻳﻤﻜﻨ‪jj‬ﻚ اﻟﺠﻠ‪jj‬ﻮس ﻓ‪jj‬ﻲ أي آﺸ‪jj‬ﻚ واﺳ‪jj‬ﺘﺨﺪام اﻟﻜﻤﺒﻴ‪jj‬ﻮﺗﺮ اﻟﻤﺤﻤ‪jj‬ﻮل‬ ‫اﻟﺨ‪jj‬ﺎص ﺑ‪jj‬ﻚ، أو اﻟﻤﺴ‪jj‬ﺎﻋﺪ اﻟﺸﺨﺼ‪jj‬ﻲ اﻟﺮﻗﻤ‪jj‬ﻲ )‪ ،(PDA‬أو ﺟﻬ‪jj‬ﺎز ﺁﺧ‪jj‬ﺮ‬ ‫ﻣﺠﻬﺰ ﺑﺎﻷﺷﻌﺔ ﺗﺤﺖ اﻟﺤﻤﺮاء ﻟﻼﺗﺼﺎل ﺑﺈﻧﺘﺮﻧﺖ. ﺗﻮﻓﺮ اﻷآﺸﺎك ﻓﻲ هﺬﻩ‬ ‫اﻟﻤﻮاﻗﻊ ﻣﻨﺎﻓﺬ أﺷﻌﺔ ﺗﺤﺖ ﺣﻤﺮاء ﻣﻀ ّﻨﺔ، ﺑﺤﻴﺚ ﻳﻤﻜﻨﻚ ﺗﻮﺟﻴ‪j‬ﻪ ﺟﻬ‪j‬ﺎزك‬ ‫ﻤ‬ ‫اﻟﻤﺠﻬ‪jj‬ﺰ ﺑﺎﻷﺷ‪jj‬ﻌﺔ ﺗﺤ‪jj‬ﺖ اﻟﺤﻤ‪jj‬ﺮاء إﻟ‪jj‬ﻰ ﻧﺎﺣﻴ‪jj‬ﺔ اﻟﻤﻨﻔ‪jj‬ﺬ اﻟﻤﻀ ‪ّ j‬ﻦ وﺗﺄﺳ‪jj‬ﻴﺲ‬ ‫ﻤ‬ ‫اﺗﺼﺎل ﺷﺒﻜﺔ اﺗﺼﺎل ﺑﺎﻷﺷﻌﺔ ﺗﺤﺖ اﻟﺤﻤﺮاء.‬ ‫ﻋﻨ‪jj‬ﺪ إﺟ‪jj‬ﺮاء ه‪jj‬ﺬا اﻟﻨ‪jj‬ﻮع ﻣ‪jj‬ﻦ اﺗﺼ‪jj‬ﺎﻻت ﺷ‪jj‬ﺒﻜﺔ اﻻﺗﺼ‪jj‬ﺎل ﺑﺎﻷﺷ‪jj‬ﻌﺔ ﺗﺤ ‪j‬ﺖ‬ ‫اﻟﺤﻤﺮاء، ﻓﺈﻧﻚ ﺗﻘﻮم ﺑﺘﻜﻮﻳﻦ ﺟﻬﺎز اﻷﺷﻌﺔ ﺗﺤﺖ اﻟﺤﻤﺮاء آﻀﻴﻒ. اﻟ‪j‬ﺬي‬ ‫ﻳﺘﺼﻞ ﺑﻪ ﺟﻬﺎزك هﻮ اﻟﻤﻀﻴﻒ.‬ ‫2- اﻟﻮﺻﻮل إﻟﻰ ﻣﻌﻠﻮﻣﺎت ﻣﺸﺘﺮآﺔ ﻋﻠﻰ آﻤﺒﻴﻮﺗﺮ ﺁﺧﺮ.‬ ‫ﻳﻤﻜﻨﻚ ﺗﺄﺳﻴﺲ اﺗﺼﺎل ﺷﺒﻜﺔ اﺗﺼﺎل ﺑﺎﻷﺷﻌﺔ ﺗﺤﺖ اﻟﺤﻤﺮاء ﺑﻴﻦ ﺟﻬﺎزي‬ ‫آﻤﺒﻴﻮﺗﺮ ﻟﻠﻮﺻﻮل إﻟﻰ اﻟﻤﻮارد اﻟﻤﺸﺘﺮآﺔ ﻋﻠ‪j‬ﻰ أﺣ‪j‬ﺪ ﺟﻬ‪j‬ﺎزي اﻟﻜﻤﺒﻴ‪j‬ﻮﺗﺮ.‬ ‫ﻣ‪jj‬ﺜ ً، إذا آ‪jj‬ﺎن ﻟ‪jj‬ﺪﻳﻚ آﻤﺒﻴ‪jj‬ﻮﺗﺮ ﻣﺤﻤ‪jj‬ﻮل ﺗﺮﻳ‪jj‬ﺪ اﺳ‪jj‬ﺘﺨﺪاﻣﻪ ﻟﻠﻮﺻ‪jj‬ﻮل إﻟ‪jj‬ﻰ‬ ‫ﻼ‬ ‫ﻣﻠﻔﺎت ﻋﻠﻰ ﻣﺠﻠﺪ ﻣﺸﺘﺮك ﻋﻠﻰ اﻟﻜﻤﺒﻴﻮﺗﺮ اﻟﻤﻜﺘﺒ‪j‬ﻲ اﻟﺨ‪j‬ﺎص ﺑ‪j‬ﻚ، ﻳﻤﻜﻨ‪j‬ﻚ‬ ‫ﺗﺄﺳ‪jj‬ﻴﺲ اﺗﺼ‪jj‬ﺎل ﺷ‪jj‬ﺒﻜﺔ اﺗﺼ‪jj‬ﺎل ﺑﺎﻷﺷ‪jj‬ﻌﺔ ﺗﺤ‪jj‬ﺖ اﻟﺤﻤ‪jj‬ﺮاء ﺑ‪jj‬ﻴﻦ ﺟﻬ‪jj‬ﺎزي‬ ‫اﻟﻜﻤﺒﻴﻮﺗﺮ.‬ ‫ﻋﻨ‪jj‬ﺪ إﺟ‪jj‬ﺮاء ه‪jj‬ﺬا اﻟﻨ‪jj‬ﻮع ﻣ‪jj‬ﻦ اﺗﺼ‪jj‬ﺎﻻت ﺷ‪jj‬ﺒﻜﺔ اﻻﺗﺼ‪jj‬ﺎل ﺑﺎﻷﺷ‪jj‬ﻌﺔ ﺗﺤ‪jj‬ﺖ‬ ‫اﻟﺤﻤ‪jj‬ﺮاء، ﻓﺈﻧ‪jj‬ﻚ ﺗﻘ‪jj‬ﻮم ﺑﺘﻜ‪jj‬ﻮﻳﻦ اﻟﻜﻤﺒﻴ‪jj‬ﻮﺗﺮ اﻟﻤﺤﻤ‪jj‬ﻮل آﻀ‪jj‬ﻴﻒ واﻟﻜﻤﺒﻴ‪jj‬ﻮﺗﺮ‬ ‫اﻟﻤﻜﺘﺒﻲ آﻤﻀﻴﻒ.‬

‫173‬

‫اﻟﺤﻠﻘﺔ اﻟﺮاﺑﻌﺔ: اﻟﺸﺒﻜﺎت اﻟﻼﺳﻠﻜﻴﺔ و وﻳﻨﺪوز ‪XP‬‬
‫ﻓﻲ وﻳﻨﺪوز ‪ XP‬ﻳﻤﻜﻨﻚ اﻻﺧﺘﻴﺎر ﺑﻴﻦ أﻧﻮاع ﺷ‪j‬ﺒﻜﺎت اﻻﺗﺼ‪j‬ﺎل اﻟﻼﺳ‪j‬ﻠﻜﻴﺔ‬ ‫اﻟﺘﺎﻟﻴﺔ:‬ ‫ﻧﻘﻄﺔ اﻟﻮﺻﻮل )اﻟﺒﻨﻴﺔ اﻟﺘﺤﺘﻴﺔ(‬ ‫ﻓ‪jjj‬ﻲ ﺷ‪jjj‬ﺒﻜﺎت اﻻﺗﺼ‪jjj‬ﺎل اﻟﻼﺳ‪jjj‬ﻠﻜﻴﺔ ﻟﻨﻘﻄ‪jjj‬ﺔ اﻟﻮﺻ‪jjj‬ﻮل، ﺗﻘ‪jjj‬ﻮم اﻟﻤﺤﻄ‪jjj‬ﺎت‬ ‫اﻟﻼﺳ‪jjjj‬ﻠﻜﻴﺔ )اﻷﺟﻬ‪jjjj‬ﺰة ذات ﺑﻄﺎﻗ‪jjjj‬ﺎت اﻟﺮادﻳ‪jjjj‬ﻮ ﻟﺸ‪jjjj‬ﺒﻜﺔ اﻻﺗﺼ‪jjjj‬ﺎل، ﻣﺜ‪jjjj‬ﻞ‬ ‫اﻟﻜﻤﺒﻴ‪jjj‬ﻮﺗﺮ اﻟﻤﺤﻤ‪jjj‬ﻮل اﻟﺨ‪jjj‬ﺎص ﺑ‪jjj‬ﻚ أو اﻟﻤﺴ‪jjj‬ﺎﻋﺪ اﻟﺸﺨﺼ‪jjj‬ﻲ اﻟﺮﻗﻤ‪jjj‬ﻲ(‬ ‫ﺑﺎﻻﺗﺼﺎل ﺑﻨﻘﺎط اﻟﻮﺻﻮل اﻟﻼﺳﻠﻜﻴﺔ. ﺗﻌﻤﻞ ﻧﻘﺎط اﻟﻮﺻ‪j‬ﻮل ه‪j‬ﺬﻩ آﺠﺴ‪j‬ﻮر‬ ‫ﺑﻴﻦ اﻟﻤﺤﻄﺎت اﻟﻼﺳﻠﻜﻴﺔ وﻧﻈﺎم ﺗﻮزﻳ‪j‬ﻊ اﻟﺸ‪j‬ﺒﻜﺔ اﻟﻤﻮﺟ‪j‬ﻮدة )أﺳ‪j‬ﺎس ﺷ‪j‬ﺒﻜﺔ‬ ‫اﻻﺗﺼﺎل(. ﻋﻨﺪﻣﺎ ﺗﺘﺤﺮك ﻣﻦ ﻣﻮﻗﻊ ﻵﺧﺮ، ﺗﻀﻌﻒ إﺷﺎرة ﻧﻘﻄﺔ وﺻ‪j‬ﻮل‬ ‫ﻻﺳ‪jj‬ﻠﻜﻴﺔ واﺣ‪jj‬ﺪة، أو ﺗﺼ‪jj‬ﺒﺢ ﻧﻘ‪jj‬ﺎط اﻻﺗﺼ‪jj‬ﺎل ﻣﺰدﺣﻤ‪jj‬ﺔ اﻟﻤ‪jj‬ﺮور، ﻳﻤﻜﻨ‪jj‬ﻚ‬ ‫اﻻﺗﺼﺎل ﺑﻨﻘﻄﺔ وﺻﻮل ﺟﺪﻳﺪة. ﻣﺜ ً، إذا آﻨﺖ ﺗﻌﻤﻞ ﻓﻲ ﺷﺮآﺔ ﺿ‪j‬ﺨﻤﺔ،‬ ‫ﻼ‬ ‫ﻳﻤﻜﻦ ﻟﺠﻬﺎزك اﻟﻼﺳﻠﻜﻲ اﻻﺗﺼﺎل ﺑﻨﻘﺎط وﺻﻮل ﻣﺨﺘﻠﻔﺔ وﻣﺘﻌ‪j‬ﺪدة وأﻧ‪j‬ﺖ‬ ‫ﺗﺘﺤ‪jj‬ﺮك ﺑ‪jj‬ﻴﻦ ﻣﺨﺘﻠ‪jj‬ﻒ ﻃﻮاﺑ‪jj‬ﻖ اﻟﺒﻨ‪jj‬ﺎء أو اﻷﺑﻨﻴ‪jj‬ﺔ اﻟﻤﺨﺘﻠﻔ‪jj‬ﺔ ﻓ‪jj‬ﻲ اﻟﻤ ّﻤ‪jj‬ﻊ.‬ ‫ﺠ‬ ‫وﻧﺘﻴﺠﺔ ﻟﺬﻟﻚ، ﻻ ﻳﻨﻘﻄﻊ اﻻﺗﺼﺎل ﺑﻤﻮارد ﺷﺒﻜﺔ اﻻﺗﺼﺎل.‬ ‫آﻤﺒﻴﻮﺗﺮ إﻟﻰ آﻤﺒﻴﻮﺗﺮ )‪(ad hoc‬‬ ‫ﻓﻲ ﺷﺒﻜﺎت اﻻﺗﺼﺎل اﻟﻼﺳﻠﻜﻴﺔ آﻤﺒﻴﻮﺗﺮ إﻟﻰ آﻤﺒﻴﻮﺗﺮ، ﺗﺘﺼ‪j‬ﻞ اﻟﻤﺤﻄ‪j‬ﺎت‬ ‫اﻟﻼﺳﻠﻜﻴﺔ ﺑﺒﻌﻀ‪j‬ﻬﺎ اﻟ‪j‬ﺒﻌﺾ ﻣﺒﺎﺷ‪j‬ﺮة، ﺑ‪j‬ﺪﻻ ﻣ‪j‬ﻦ أن ﻳﻜ‪j‬ﻮن ذﻟ‪j‬ﻚ ﻣ‪j‬ﻦ ﺧ‪j‬ﻼل‬ ‫ً‬ ‫ﻧﻘﺎط اﻟﻮﺻﻮل اﻟﻼﺳﻠﻜﻲ. ﻣﺜ ً، إذا آﻨﺖ ﻓ‪j‬ﻲ اﺟﺘﻤ‪j‬ﺎع ﻣ‪j‬ﻊ زﻣ‪j‬ﻼء اﻟﻌﻤ‪j‬ﻞ،‬ ‫ﻼ‬ ‫وﻻ ﺗﺤﺘ‪jjj‬ﺎج اﻟﻮﺻ‪jjj‬ﻮل إﻟ‪jjj‬ﻰ ﻣ‪jjj‬ﻮارد اﻟﺸ‪jjj‬ﺒﻜﺔ، ﻳﻤﻜ‪jjj‬ﻦ ﻟﺠﻬ‪jjj‬ﺎزك اﻟﻼﺳ‪jjj‬ﻠﻜﻲ‬ ‫273‬

‫اﻻﺗﺼ‪j‬ﺎل ﺑ‪j‬ﺎﻷﺟﻬﺰة اﻟﻼﺳ‪j‬ﻠﻜﻴﺔ ﻟﺰﻣﻼﺋ‪j‬ﻚ، وﻳﻤﻜﻨ‪j‬ﻚ ﺗﺸ‪j‬ﻜﻴﻞ ﺷ‪j‬ﺒﻜﺔ اﺗﺼ‪j‬ﺎل‬ ‫ﻣﺆﻗﺘﺔ.‬ ‫أﻳﺔ ﺷﺒﻜﺔ اﺗﺼﺎل ﻣﺘﻮﻓﺮة )ﻧﻘﻄﺔ اﻟﻮﺻﻮل ﻣﻔ ّﻠﺔ(‬ ‫ﻀ‬ ‫ﻓ‪jj‬ﻲ ﺷ‪jj‬ﺒﻜﺎت اﻻﺗﺼ‪jj‬ﺎل اﻟﻼﺳ‪jj‬ﻠﻜﻴﺔ اﻟﻤﻔﻀ‪jj‬ﻠﺔ ﻟﻨﻘﻄ‪jj‬ﺔ اﻟﻮﺻ‪jj‬ﻮل، ﺗ‪jj‬ﺘﻢ داﺋﻤ ‪j‬ﺎ‬ ‫ً‬ ‫ﻣﺤﺎوﻟﺔ اﻻﺗﺼﺎل ﺑﺸﺒﻜﺔ ﻻﺳﻠﻜﻴﺔ ﻟﻨﻘﻄﺔ اﻟﻮﺻﻮل أو ً، إذا آ‪j‬ﺎن أي ﻣﻨﻬ‪j‬ﺎ‬ ‫ﻻ‬ ‫ﻣﺘ‪jj‬ﻮﻓﺮا. إذا ﻟ‪jj‬ﻢ ﺗﻜ‪jj‬ﻦ هﻨ‪jj‬ﺎك ﺷ‪jj‬ﺒﻜﺔ ﻧﻘﻄ‪jj‬ﺔ وﺻ‪jj‬ﻮل ﻣﺘ‪jj‬ﻮﻓﺮة، ﺗ‪jj‬ﺘﻢ ﻣﺤﺎوﻟ‪jj‬ﺔ‬ ‫ً‬ ‫اﺗﺼ‪jj‬ﺎل ﺑﺸ‪jj‬ﺒﻜﺔ ﻻﺳ‪jj‬ﻠﻜﻴﺔ آﻤﺒﻴ‪jj‬ﻮﺗﺮ إﻟ‪jj‬ﻰ آﻤﺒﻴ‪jj‬ﻮﺗﺮ. ﻣ‪jj‬ﺜ ً، إذا اﺳ‪jj‬ﺘﺨﺪﻣﺖ‬ ‫ﻼ‬ ‫اﻟﻜﻤﺒﻴ‪jj‬ﻮﺗﺮ اﻟﻤﺤﻤ‪jj‬ﻮل اﻟﺨ‪jj‬ﺎص ﺑ‪jj‬ﻚ ﻓ‪jj‬ﻲ اﻟﻌﻤ‪jj‬ﻞ ﻓ‪jj‬ﻲ ﺷ‪jj‬ﺒﻜﺔ ﻻﺳ‪jj‬ﻠﻜﻴﺔ ﻟﻨﻘﻄ‪jj‬ﺔ‬ ‫اﻟﻮﺻ‪jj‬ﻮل، ﺛ‪jj‬ﻢ أﺧ‪jj‬ﺬت اﻟﻜﻤﺒﻴ‪jj‬ﻮﺗﺮ اﻟﻤﺤﻤ‪jj‬ﻮل إﻟ‪jj‬ﻰ اﻟﻤﻨ‪jj‬ﺰل ﻻﺳ‪jj‬ﺘﺨﺪاﻣﻪ ﻓ‪jj‬ﻲ‬ ‫ﺷ‪jj‬ﺒﻜﺔ اﺗﺼ‪jj‬ﺎل ﻣﻨﺰﻟﻴ‪jj‬ﺔ ﻣ‪jj‬ﻦ ﻧ‪jj‬ﻮع آﻤﺒﻴ‪jj‬ﻮﺗﺮ إﻟ‪jj‬ﻰ آﻤﺒﻴ‪jj‬ﻮﺗﺮ، ﻓ‪jj‬ﺈن اﻟﺘﻜ‪jj‬ﻮﻳﻦ‬ ‫اﻟﺘﻠﻘ‪jj‬ﺎﺋﻲ ﻟﺸ‪jj‬ﺒﻜﺔ اﻻﺗﺼ‪jj‬ﺎل اﻟﻼﺳ‪jj‬ﻠﻜﻴﺔ ﺳ‪jj‬ﻴﻐﻴﺮ إﻋ‪jj‬ﺪادات اﻟﺸ‪jj‬ﺒﻜﺔ اﻟﻼﺳ‪jj‬ﻠﻜﻴﺔ‬ ‫ﺣﺴﺐ اﻟﺤﺎﺟﺔ، ﻓﻴﺼﺒﺢ ﺑﺈﻣﻜﺎﻧﻚ اﻻﺗﺼﺎل ﺑﺸﺒﻜﺔ اﻻﺗﺼﺎل اﻟﻤﻨﺰﻟﻴﺔ.‬ ‫ﻋﻨ‪j‬ﺪﻣﺎ ﺗﻜ‪j‬ﻮن ﻓ‪j‬ﻲ ﻣﺠ‪j‬ﺎل ﺷ‪j‬ﺒﻜﺔ ﻻﺳ‪jj‬ﻠﻜﻴﺔ ﺗﻈﻬ‪j‬ﺮ إﺷ‪j‬ﺎرة ﺑ‪j‬ﺎﻟﻘﺮب ﻣ‪j‬ﻦ رﻣ‪jj‬ﺰ‬ ‫اﻟﺼﻮت و اﻟﺴﺎﻋﺔ ﻋﻠﻰ ﺷﺮﻳﻂ اﻟﻤﻬﺎم.‬ ‫ﻟﻼﺗﺼﺎل ﺑﺸﺒﻜﺔ اﺗﺼﺎل ﻻﺳﻠﻜﻴﺔ ﻣﺘﻮﻓﺮة اﻧﻘﺮ ﺑﺰر اﻟﻤ‪j‬ﺎوس اﻷﻳﻤ‪j‬ﻦ ﻓ‪j‬ﻮق‬ ‫رﻣﺰ اﺗﺼﺎل اﻟﺸﺒﻜﺔ ﻓﻲ ﻧﺎﺣﻴﺔ اﻹﻋﻼم ﻋﻠﻰ ﺷﺮﻳﻂ اﻟﻤﻬﺎم، ﺛﻢ اﻧﻘ‪j‬ﺮ ﻓ‪j‬ﻮق‬ ‫‪.View Available Wireless Networks‬‬ ‫ﻓ‪jj‬ﻲ ‪ ،Connect to Wireless Network‬وﺗﺤ‪jj‬ﺖ ‪Available‬‬ ‫‪ ،Networks‬اﻧﻘﺮ ﻓﻮق ﺷﺒﻜﺔ اﻻﺗﺼ‪j‬ﺎل اﻟﻼﺳ‪j‬ﻠﻜﻴﺔ اﻟﺘ‪j‬ﻲ ﺗﺮﻳ‪j‬ﺪ اﻻﺗﺼ‪j‬ﺎل‬ ‫ﺑﻬﺎ.‬ ‫إذا آﺎن ﻣﻔﺘﺎح ﺷﺒﻜﺔ اﻻﺗﺼﺎل ﻣﻄﻠﻮﺑﺎ ﻣﻦ أﺟ‪j‬ﻞ ‪Wired Equivalent‬‬ ‫ً‬ ‫‪ ،(WEP) Privacy‬ﻧ ّﺬ أﺣﺪ اﻹﺟﺮاﺋﻴﻦ اﻟﺘﺎﻟﻴﻴﻦ:‬ ‫ﻔ‬ ‫1- إذا آﺎن ﻣﻔﺘﺎح ﺷﺒﻜﺔ اﻻﺗﺼﺎل ﻣﻮ ّﺮا ﻟﻚ ﺗﻠﻘﺎﺋﻴﺎ )ﻣﺜ ً، اﻟﻤﻔﺘﺎح ﻣﺨﺰن‬ ‫ً ﻼ‬ ‫ﻓ ً‬ ‫ﻓﻲ ﻣﺤ‪j‬ﻮل ﺷ‪j‬ﺒﻜﺔ اﻻﺗﺼ‪j‬ﺎل اﻟﻼﺳ‪j‬ﻠﻜﻴﺔ اﻟﻤﻌﻄ‪j‬ﻰ ﻟ‪j‬ﻚ ﻣ‪j‬ﻦ ﻗﺒ‪j‬ﻞ اﻟﻤﺴ‪j‬ﺆول(،‬ ‫اﺗﺮك ‪ Network Key‬ﻓﺎرﻏﺎ.‬ ‫ً‬

‫373‬

‫2- إذا ﻟﻢ ﻳﻜﻦ ﻣﻔﺘﺎح ﺷﺒﻜﺔ اﻻﺗﺼﺎل ﻣﻮ ّﺮا ﻟﻚ ﺗﻠﻘﺎﺋﻴ ً، اآﺘﺐ اﻟﻤﻔﺘ‪j‬ﺎح ﻓ‪j‬ﻲ‬ ‫ﺎ‬ ‫ﻓ ً‬ ‫‪ .Network key‬ﺛﻢ اﻧﻘﺮ ﻓﻮق اﺗﺼﺎل.‬ ‫ﻟﺘﻜﻮﻳﻦ إﻋﺪادات اﺗﺼﺎل ﺷﺒﻜﺔ اﺗﺼﺎل ﻻﺳﻠﻜﻴﺔ إﺿ‪j‬ﺎﻓﻴﺔ، أو آﻨ‪j‬ﺖ ﺗﻮاﺟ‪j‬ﻪ‬ ‫ﺻﻌﻮﺑﺎت ﻓﻲ إﺟﺮاء اﺗﺼﺎل ﻣﻊ ﺷﺒﻜﺔ اﻻﺗﺼﺎل اﻟﻼﺳﻠﻜﻴﺔ اﻟﺘ‪j‬ﻲ ﺣ‪j‬ﺪدﺗﻬﺎ،‬ ‫اﻧﻘ‪jj‬ﺮ ﻓ‪jj‬ﻮق ﺧﻴ‪jj‬ﺎرات ﻣﺘﻘﺪﻣ‪jj‬ﺔ، ﺛ‪jj‬ﻢ ﻗ‪jj‬ﻢ ﺑﺘﻜ‪jj‬ﻮﻳﻦ اﻹﻋ‪jj‬ﺪادات ﻓ‪jj‬ﻲ اﻟﺘﺒﻮﻳ‪jj‬ﺐ‬ ‫‪.Wireless Networks‬‬ ‫ﻻ ﺗ‪jj‬ﻨﺲ أﻧ‪jj‬ﻪ ﻳﺠ‪jj‬ﺐ ﻋﻠﻴ‪jj‬ﻚ اﺳ‪jj‬ﺘﺨﺪام ﻣﺤ‪jj‬ﻮل ﺷ‪jj‬ﺒﻜﺔ اﺗﺼ‪jj‬ﺎل ﻻﺳ‪jj‬ﻠﻜﻴﺔ ﻳ‪jj‬ﺪﻋﻢ‬ ‫اﻟﺨﺪﻣﺔ ‪.Wireless Zero Configuration‬‬ ‫ﻹﻋﺪاد ﺗﻜﻮﻳﻦ ﺗﻠﻘﺎﺋﻲ ﻟﺸﺒﻜﺔ اﺗﺼﺎل ﻻﺳﻠﻜﻴﺔ ﻓﻲ وﻳﻨﺪوز ‪ XP‬ﻗﻢ ﺑﻤﺎ ﻳﻠﻲ:‬ ‫اﻓﺘﺢ اﺗﺼﺎﻻت ﺷﺒﻜﺔ اﻻﺗﺼﺎل.‬ ‫اﻧﻘ‪jj‬ﺮ ﺑ‪jj‬ﺰر اﻟﻤ‪jj‬ﺎوس اﻷﻳﻤ‪jj‬ﻦ ﻓ‪jj‬ﻮق اﻻﺗﺼ‪jj‬ﺎل اﻟ‪jj‬ﺬي ﺗﺮﻳ‪jj‬ﺪ ﻣ‪jj‬ﻦ أﺟﻠ‪jj‬ﻪ إﻋ‪jj‬ﺪاد‬ ‫ﺗﻜﻮﻳﻦ ﺗﻠﻘﺎﺋﻲ ﻟﺸﺒﻜﺔ اﻻﺗﺼﺎل اﻟﻼﺳﻠﻜﻴﺔ، ﺛﻢ اﻧﻘﺮ ﻓﻮق ﺧﺼﺎﺋﺺ.‬ ‫ﻓﻲ اﻟﺘﺒﻮﻳﺐ ‪ ،Wireless Networks‬ﻧ ّﺬ أﺣﺪ اﻹﺟﺮاﺋﻴﻦ اﻟﺘﺎﻟﻴﻴﻦ:‬ ‫ﻔ‬ ‫1- ﻟﺘﻤﻜ‪jjj‬ﻴﻦ ﺗﻜ‪jjj‬ﻮﻳﻦ ﺗﻠﻘ‪jjj‬ﺎﺋﻲ ﻟﺸ‪jjj‬ﺒﻜﺔ اﻻﺗﺼ‪jjj‬ﺎل اﻟﻼﺳ‪jjj‬ﻠﻜﻴﺔ ﻣ‪jjj‬ﻦ أﺟ‪jjj‬ﻞ ه‪jjj‬ﺬا‬ ‫اﻻﺗﺼﺎل، ﺣﺪد ﺧﺎﻧﺔ اﻻﺧﺘﻴﺎر ‪Use Windows to configure my‬‬ ‫‪ .wireless network settings‬هﺬا اﻟﺨﻴﺎر ﻣﺤﺪد اﻓﺘﺮاﺿﻴﺎ.‬ ‫ً‬ ‫2- ﻟﺘﻌﻄﻴ‪jj‬ﻞ ﺗﻜ‪jjj‬ﻮﻳﻦ ﺗﻠﻘ‪jj‬ﺎﺋﻲ ﻟﺸ‪jjj‬ﺒﻜﺔ اﻻﺗﺼ‪jj‬ﺎل اﻟﻼﺳ‪jjj‬ﻠﻜﻴﺔ ﻣ‪jj‬ﻦ أﺟ‪jjj‬ﻞ ه‪jjj‬ﺬا‬ ‫اﻻﺗﺼ‪j‬ﺎل، اﻣﺴ‪j‬ﺢ ﺧﺎﻧ‪j‬ﺔ اﻻﺧﺘﻴ‪j‬ﺎر ‪Use Windows to configure‬‬ ‫‪.my wireless network settings‬‬ ‫ﺗﻈﻬﺮ ﻗﺎﺋﻤﺔ ﻣﻦ ﺷﺒﻜﺎت اﻻﺗﺼ‪j‬ﺎل اﻟﻼﺳ‪j‬ﻠﻜﻴﺔ اﻟﻤﺘ‪j‬ﻮﻓﺮة اﻟﺘ‪j‬ﻲ ﺗ‪j‬ﻢ اآﺘﺸ‪j‬ﺎﻓﻬﺎ‬ ‫ﻣ‪jjj‬ﻦ ﻗﺒ‪jjj‬ﻞ ﺗﻜ‪jjj‬ﻮﻳﻦ ﺷ‪jjj‬ﺒﻜﺔ اﻻﺗﺼ‪jjj‬ﺎل اﻟﻼﺳ‪jjj‬ﻠﻜﻴﺔ ﺗﺤ‪jjj‬ﺖ ‪Available‬‬ ‫‪ .networks‬ﻟﺘﺤﺪﻳﺪ ﺷﺒﻜﺎت اﻻﺗﺼﺎل اﻟﻼﺳﻠﻜﻴﺔ اﻟﻤﻔﻀﻠﺔ، ﻧ ّﺬ ﻣﺎ ﻳﻠﻲ:‬ ‫ﻔ‬

‫473‬

‫1- ﻹﺿ‪jj‬ﺎﻓﺔ ﺷ‪jj‬ﺒﻜﺔ اﺗﺼ‪jj‬ﺎل ﻻﺳ‪jj‬ﻠﻜﻴﺔ إﺿ‪jj‬ﺎﻓﻴﺔ إﻟ‪jj‬ﻰ اﻟﻘﺎﺋﻤ‪jj‬ﺔ ‪Preferred‬‬ ‫‪ networks‬ﻟﻬﺬا اﻻﺗﺼﺎل، ﺗﺤﺖ ‪ ،Available networks‬اﻧﻘﺮ ﻓ‪j‬ﻮق‬ ‫ﺷﺒﻜﺔ اﻻﺗﺼﺎل اﻟﺘﻲ ﺗﺮﻳﺪ إﺿﺎﻓﺘﻬﺎ، ﺛﻢ اﻧﻘﺮ ﻓﻮق ﺗﻜﻮﻳﻦ.‬ ‫2- ﻹﺿ‪jj‬ﺎﻓﺔ ﺷ‪jj‬ﺒﻜﺔ اﺗﺼ‪jj‬ﺎل ﻻﺳ‪jj‬ﻠﻜﻴﺔ ﺟﺪﻳ‪jj‬ﺪة إﻟ‪jj‬ﻰ اﻟﻘﺎﺋﻤ‪jj‬ﺔ ‪Preferred‬‬ ‫‪ networks‬ﻟﻬﺬا اﻻﺗﺼﺎل، ﺗﺤﺖ ‪ ،Preferred networks‬اﻧﻘ‪j‬ﺮ ﻓ‪j‬ﻮق‬ ‫إﺿﺎﻓﺔ، وﻓ‪j‬ﻲ ‪ ،Wireless Network Properties‬ﺣ‪j‬ﺪد اﺳ‪j‬ﻢ اﻟﺸ‪j‬ﺒﻜﺔ‬ ‫)ﻣﻌ‪ّ jjj‬ف ﻣﺠﻤﻮﻋ‪jjjj‬ﺔ اﻟﺨ‪jjjj‬ﺪﻣﺎت(، وإﻋ‪jjjj‬ﺪادات ﻣﻔﺘ‪jjjj‬ﺎح ﺷ‪jjjj‬ﺒﻜﺔ اﻻﺗﺼ‪jjjj‬ﺎل‬ ‫ﺮ‬ ‫اﻟﻼﺳ‪jj‬ﻠﻜﻴﺔ )‪ ،(Wired Equivalent Privacy‬وﻣ‪jj‬ﺎ إذا آﺎﻧ‪jj‬ﺖ ﺷ‪jj‬ﺒﻜﺔ‬ ‫اﻻﺗﺼﺎل هﻲ ﺷﺒﻜﺔ آﻤﺒﻴﻮﺗﺮ إﻟﻰ آﻤﺒﻴﻮﺗﺮ )‪.(ad hoc‬‬ ‫3- ﻟﺘﻐﻴﻴﺮ ﺗﺮﺗﻴﺐ ﻣﺤﺎوﻟ‪j‬ﺔ اﻻﺗﺼ‪j‬ﺎل ﺑﺸ‪j‬ﺒﻜﺎت اﻻﺗﺼ‪j‬ﺎل اﻟﻤﻔﻀ‪j‬ﻠﺔ اﻟﻤﻌ‪ّ j‬ة‬ ‫ﺪ‬ ‫ﻟﻬ‪jjj‬ﺬا اﻻﺗﺼ‪jjj‬ﺎل، ﺗﺤ‪jjj‬ﺖ ‪ ،Preferred networks‬اﻧﻘ‪jjj‬ﺮ ﻓ‪jjj‬ﻮق ﺷ‪jjj‬ﺒﻜﺔ‬ ‫اﻻﺗﺼﺎل اﻟﻼﺳﻠﻜﻴﺔ اﻟﺘﻲ ﺗﺮﻳﺪ ﺗﺤﺮﻳﻜﻬﺎ إﻟ‪j‬ﻰ ﻣﻮﻗ‪j‬ﻊ ﺟﺪﻳ‪j‬ﺪ ﻓ‪j‬ﻲ اﻟﻘﺎﺋﻤ‪j‬ﺔ، ﺛ‪j‬ﻢ‬ ‫اﻧﻘﺮ ﻓﻮق ﺗﺤﺮﻳﻚ ﻟﻸﻋﻠﻰ أو ﺗﺤﺮﻳﻚ ﻟﻸﺳﻔﻞ.‬ ‫4- ﻹزاﻟﺔ ﺷ‪j‬ﺒﻜﺔ اﺗﺼ‪j‬ﺎل ﻻﺳ‪j‬ﻠﻜﻴﺔ ﻣ‪j‬ﻦ ﻗﺎﺋﻤ‪j‬ﺔ ﺷ‪j‬ﺒﻜﺎت اﻻﺗﺼ‪j‬ﺎل اﻟﻤﻔﻀ‪j‬ﻠﺔ‬ ‫ﻟﻬ‪jjj‬ﺬا اﻻﺗﺼ‪jjj‬ﺎل، ﺗﺤ‪j j‬ﺖ ‪ ،Preferred networks‬اﻧﻘ‪jjj‬ﺮ ﻓ‪jjj‬ﻮق ﺷ‪jjj‬ﺒﻜﺔ‬ ‫اﻻﺗﺼﺎل اﻟﻼﺳﻠﻜﻴﺔ اﻟﺘﻲ ﺗﺮﻳﺪ إزاﻟﺘﻬﺎ، ﺛﻢ اﻧﻘﺮ ﻓﻮق إزاﻟﺔ.‬ ‫ﻟﺰﻳﺎدة ﺗﺤﺪﻳﺪ ﻧﻮع ﺷ‪j‬ﺒﻜﺔ اﻻﺗﺼ‪j‬ﺎل اﻟﻼﺳ‪j‬ﻠﻜﻴﺔ ﻟﻠﻮﺻ‪j‬ﻮل إﻟﻴﻬ‪j‬ﺎ، اﻧﻘ‪j‬ﺮ ﻓ‪j‬ﻮق‬ ‫ﺧﻴﺎرات ﻣﺘﻘﺪﻣﺔ، ﺛ‪j‬ﻢ اﻧﻘ‪j‬ﺮ ﻓ‪j‬ﻮق ﻧ‪j‬ﻮع ﺷ‪j‬ﺒﻜﺔ اﻻﺗﺼ‪j‬ﺎل اﻟ‪j‬ﺬي ﺗﺮﻳ‪j‬ﺪﻩ. ﻋﻠ‪j‬ﻰ‬ ‫ﺳﺒﻴﻞ اﻟﻤﺜﺎل، إذا آﻨﺖ ﺗﺮﻳﺪ إﺟ‪j‬ﺮاء اﺗﺼ‪j‬ﺎل آﻤﺒﻴ‪j‬ﻮﺗﺮ إﻟ‪j‬ﻰ آﻤﺒﻴ‪j‬ﻮﺗﺮ ) ‪ad‬‬ ‫‪ ،(hoc‬وإذا آﺎن آﻼ ﻣﻦ ﺷﺒﻜﺎت اﺗﺼﺎل آﻤﺒﻴﻮﺗﺮ إﻟﻰ آﻤﺒﻴﻮﺗﺮ وﺷﺒﻜﺎت‬ ‫ً‬ ‫اﺗﺼ‪jj‬ﺎل ﻧﻘﻄ‪jj‬ﺔ اﻟﻮﺻ‪jj‬ﻮل )اﻟﺒﻨﻴ‪jj‬ﺔ اﻟﺘﺤﺘﻴ‪jj‬ﺔ( ﺿ‪jj‬ﻤﻦ ﻧﻄ‪jj‬ﺎق اﻟﻜﻤﺒﻴ‪jj‬ﻮﺗﺮ، اﻧﻘ‪jj‬ﺮ‬ ‫ﻓﻮق ‪.Computer-to-computer (ad hoc) networks only‬‬ ‫ﻣﻼﺣﻈﺎت:‬ ‫1- إذا آﻨﺖ ﺗﺴﺘﺨﺪم ﺑﺮﻧﺎﻣﺞ ﺷﺒﻜﺔ اﺗﺼﺎل ﻻﺳﻠﻜﻴﺔ ﻟﺠﻬﺔ ﺧﺎرﺟﻴﺔ، اﻣﺴﺢ‬ ‫ﺧﺎﻧ‪j‬ﺔ اﻻﺧﺘﻴ‪j‬ﺎر ‪Use Windows to configure my wireless‬‬ ‫‪.network settings‬‬

‫573‬

‫2- إذا آﺎﻧﺖ اﻟﻘﺎﺋﻤﺔ ‪ Preferred networks‬ﺗﺘﻀ‪j‬ﻤﻦ آ‪j‬ﻼ ﻣ‪j‬ﻦ ﺷ‪j‬ﺒﻜﺘﻲ‬ ‫ً‬ ‫اﺗﺼ‪j‬ﺎل ﻧﻘﻄ‪j‬ﺔ اﻟﻮﺻ‪j‬ﻮل )اﻟﺒﻨﻴ‪j‬ﺔ اﻟﺘﺤﺘﻴ‪j‬ﺔ( وآﻤﺒﻴ‪j‬ﻮﺗﺮ إﻟ‪j‬ﻰ آﻤﺒﻴ‪j‬ﻮﺗﺮ ) ‪ad‬‬ ‫‪ ،(hoc‬ﻻ ﻳﻤﻜﻦ ﺗﺤﺮﻳﻚ ﺷﺒﻜﺎت اﺗﺼﺎل آﻤﺒﻴﻮﺗﺮ إﻟﻰ آﻤﺒﻴﻮﺗﺮ إﻟﻰ ﻣﻮﻗﻊ‬ ‫أﻋﻠﻰ ﻣﻦ ﺷﺒﻜﺎت اﺗﺼﺎل ﻧﻘﻄﺔ اﻟﻮﺻﻮل ﻓﻲ اﻟﻘﺎﺋﻤﺔ.‬ ‫3- إن اﻟﺘﻜ‪jjj‬ﻮﻳﻦ اﻟﺘﻠﻘ‪jjj‬ﺎﺋﻲ ﻟﺸ‪jjj‬ﺒﻜﺔ اﻻﺗﺼ‪jjj‬ﺎل اﻟﻼﺳ‪jjj‬ﻠﻜﻲ ﻳ‪jjj‬ﺪﻋﻢ ‪IEEE‬‬ ‫11.208 اﻟﻘﻴﺎﺳ‪jj‬ﻲ ﻟﺸ‪jj‬ﺒﻜﺎت اﻻﺗﺼ‪jj‬ﺎل اﻟﻼﺳ‪jj‬ﻠﻜﻴﺔ. ﻋﻨ‪jj‬ﺪﻣﺎ ﻳﻜ‪jj‬ﻮن اﻟﺘﻜ‪jj‬ﻮﻳﻦ‬ ‫اﻟﺘﻠﻘﺎﺋﻲ ﻟﺸﺒﻜﺔ اﻻﺗﺼﺎل اﻟﻼﺳ‪j‬ﻠﻜﻴﺔ ﻣﻤ ّﻨ‪ ،ًj‬ﻳﻤﻜﻨ‪j‬ﻚ اﻟﺘﺠ‪j‬ﻮل ﻋﺒ‪j‬ﺮ ﺷ‪j‬ﺒﻜﺎت‬ ‫ﻜﺎ‬ ‫اﻻﺗﺼ‪jj‬ﺎل اﻟﻼﺳ‪jj‬ﻠﻜﻴﺔ اﻟﻤﺨﺘﻠﻔ‪jj‬ﺔ دون اﻟﺤﺎﺟ‪jj‬ﺔ إﻟ‪jj‬ﻰ إﻋ‪jj‬ﺎدة ﺗﻜ‪jj‬ﻮﻳﻦ إﻋ‪jj‬ﺪادات‬ ‫اﺗﺼﺎل اﻟﺸﺒﻜﺔ ﻋﻠﻰ اﻟﻜﻤﺒﻴﻮﺗﺮ اﻟﺨﺎص ﺑﻚ ﻟﻜﻞ ﻣﻮﻗﻊ.‬ ‫أﻣ‪jj‬ﺎ ﻟﺘﺄﺳ‪jj‬ﻴﺲ اﺗﺼ‪jj‬ﺎل ﺷ‪jj‬ﺒﻜﺔ أﺷ‪jj‬ﻌﺔ ﺗﺤ‪jj‬ﺖ ﺣﻤ‪jj‬ﺮاء ﻣﺒﺎﺷ‪jj‬ﺮ ﺑ‪jj‬ﻴﻦ ﺟﻬ‪jj‬ﺎزي‬ ‫آﻤﺒﻴﻮﺗﺮ ﻓﻲ وﻳﻨﺪوز ‪ XP‬ﻓﻘﻢ ﺑﻤﺎ ﻳﻠﻲ:‬ ‫اﻓﺘﺢ اﺗﺼﺎﻻت ﺷﺒﻜﺔ اﻻﺗﺼﺎل.‬ ‫اﻧﻘﺮ ﻧﻘﺮا ﻣﺰدوﺟﺎ ﻓﻮق إﻧﺸﺎء اﺗﺼﺎل ﺟﺪﻳﺪ، ﺛﻢ اﻧﻘﺮ ﻓﻮق اﻟﺘﺎﻟﻲ.‬ ‫ً‬ ‫ً‬ ‫ﻓﻲ ﻧﻮع اﺗﺼﺎل ﺷﺒﻜﺔ اﻻﺗﺼﺎل، اﻧﻘﺮ ﻓﻮق إﻋﺪاد اﺗﺼﺎل ﻣﺘﻘﺪم، ﺛ‪j‬ﻢ اﻧﻘ‪j‬ﺮ‬ ‫ﻓﻮق اﻟﺘﺎﻟﻲ.‬ ‫ﻓﻲ ﺧﻴﺎرات اﺗﺼﺎل ﻣﺘﻘﺪﻣﺔ، اﻧﻘﺮ ﻓﻮق اﻻﺗﺼﺎل ﻣﺒﺎﺷﺮة ﺑﻜﻤﺒﻴﻮﺗﺮ ﺁﺧ‪j‬ﺮ،‬ ‫ً‬ ‫ﺛﻢ اﻧﻘﺮ ﻓﻮق اﻟﺘﺎﻟﻲ.‬ ‫ﻓﻲ اﻟﻤﻀﻴﻒ أو اﻟﻀﻴﻒ، ﺣﺪد إذا آﺎن هﺬا اﻟﻜﻤﺒﻴﻮﺗﺮ ﻣﺴﺘﺨﺪﻣﺎ ﻟﻠﻮﺻﻮل‬ ‫ً‬ ‫إﻟ‪jj‬ﻰ ﻣﻌﻠﻮﻣ‪jj‬ﺎت ﻋﻠ‪jj‬ﻰ آﻤﺒﻴ‪jj‬ﻮﺗﺮ ﺁﺧ‪jj‬ﺮ أو آ‪jj‬ﺎن ﻟﺪﻳ‪jj‬ﻪ اﻟﻤﻌﻠﻮﻣ‪jj‬ﺎت اﻟﻤﻄﻠ‪jj‬ﻮب‬ ‫اﻟﻮﺻﻮل إﻟﻴﻬﺎ ﻋﻦ ﻃﺮﻳﻖ ﺗﻨﻔﻴﺬ أﺣﺪ اﻹﺟﺮاﺋﻴﻦ اﻟﺘﺎﻟﻴﻴﻦ:‬ ‫1- إذا آﺎن ﻟﺪى هﺬا اﻟﻜﻤﺒﻴ‪j‬ﻮﺗﺮ ﻣﻌﻠﻮﻣ‪j‬ﺎت ﺳ‪j‬ﻴﺘﻢ اﻟﻮﺻ‪j‬ﻮل إﻟﻴﻬ‪j‬ﺎ ﻣ‪j‬ﻦ ﻗﺒ‪j‬ﻞ‬ ‫آﻤﺒﻴﻮﺗﺮ ﺁﺧﺮ، ﻓﺎﻧﻘﺮ ﻓﻮق اﻟﻤﻀﻴﻒ.‬ ‫2- إذا آﺎن هﺬا اﻟﻜﻤﺒﻴﻮﺗﺮ ُﺴﺘﺨﺪم ﻟﻠﻮﺻﻮل إﻟﻰ ﻣﻌﻠﻮﻣﺎت ﻋﻠﻰ آﻤﺒﻴﻮﺗﺮ‬ ‫ﻳ‬ ‫ﺁﺧﺮ، ﻓﺎﻧﻘﺮ ﻓﻮق اﻟﻀﻴﻒ.‬ ‫673‬

‫اﻧﻘﺮ ﻓﻮق اﻟﺘﺎﻟﻲ، ﺛﻢ ﻧ ّﺬ أﺣﺪ اﻹﺟﺮاﺋﻴﻦ اﻟﺘﺎﻟﻴﻴﻦ:‬ ‫ﻔ‬ ‫1- إذا آﻨ‪jjj‬ﺖ ﻗ‪jjj‬ﺪ ﺣ‪jjj‬ﺪدت ه‪jjj‬ﺬا اﻟﻜﻤﺒﻴ‪jjj‬ﻮﺗﺮ آﻤﻀ‪jjj‬ﻴﻒ، ﻓ‪jjj‬ﻲ ﺟﻬ‪jjj‬ﺎز ﻟﻬ‪jjj‬ﺬا‬ ‫اﻻﺗﺼﺎل، ﺣﺪد ﻣﻨﻔﺬ ﺗﺤﺖ اﻷﺣﻤﺮ.‬ ‫2- إذا آﻨﺖ ﻗ‪j‬ﺪ ﺣ‪j‬ﺪدت ه‪j‬ﺬا اﻟﻜﻤﺒﻴ‪j‬ﻮﺗﺮ آﻀ‪j‬ﻴﻒ، ﻓ‪j‬ﻲ ﺗﺤﺪﻳ‪j‬ﺪ ﺟﻬ‪j‬ﺎز، ﺣ‪j‬ﺪد‬ ‫ﻣﻨﻔﺬ ﺗﺤﺖ اﻷﺣﻤﺮ.‬ ‫اﻧﻘﺮ ﻓﻮق اﻟﺘﺎﻟﻲ، ﺛﻢ ﻧ ّﺬ أﺣﺪ اﻹﺟﺮاﺋﻴﻦ اﻟﺘﺎﻟﻴﻴﻦ:‬ ‫ﻔ‬ ‫1- إذا آﻨ‪jjjj‬ﺖ ﻗ‪jjjj‬ﺪ ﺣ‪jjjj‬ﺪدت ه‪jjjj‬ﺬا اﻟﻜﻤﺒﻴ‪jjjj‬ﻮﺗﺮ آﻤﻀ‪jjjj‬ﻴﻒ، ﻓ‪jjjj‬ﻲ أذوﻧ‪jjjj‬ﺎت‬ ‫اﻟﻤﺴﺘﺨﺪﻣﻴﻦ، ﻓ‪j‬ﺎﺗﺒﻊ اﻟﺘﻮﺟﻴﻬ‪j‬ﺎت ﻟﺘﺤﺪﻳ‪j‬ﺪ اﻟﻤﺴ‪j‬ﺘﺨﺪﻣﻴﻦ اﻟ‪j‬ﺬﻳﻦ ﺳﺘﺴ‪j‬ﻤﺢ ﻟﻬ‪j‬ﻢ‬ ‫ﺑﺎﻻﺗﺼﺎل.‬ ‫2- إذا آﻨ‪jjj‬ﺖ ﻗ‪jjj‬ﺪ ﺣ‪jjj‬ﺪدت ه‪jjj‬ﺬا اﻟﻜﻤﺒﻴ‪jjj‬ﻮﺗﺮ آﻀ‪jjj‬ﻴﻒ، ﻓ‪jjj‬ﻲ ‪Default‬‬ ‫‪ ،Connection‬ﻓ‪jjjjjj‬ﺎﺗﺒﻊ اﻟﺘﻮﺟﻴﻬ‪jjjjjj‬ﺎت ﻟﺘﺤﺪﻳ‪jjjjjj‬ﺪ إﻋ‪jjjjjj‬ﺪادات اﻻﺗﺼ‪jjjjjj‬ﺎل‬ ‫اﻻﻓﺘﺮاﺿﻴﺔ.‬ ‫أدﺧﻞ اﺳﻤﺎ ﻟﻼﺗﺼﺎل، ﺛﻢ اﻧﻘﺮ ﻓﻮق إﻧﻬﺎء.‬ ‫ً‬ ‫ﻻﺳﺘﺨﺪام اﺗﺼﺎل ﺷﺒﻜﺔ أﺷﻌﺔ ﺗﺤﺖ ﺣﻤﺮاء ﻗﻢ ﺑﻤﺎ ﻳﻠﻲ:‬ ‫أﺳﺲ ارﺗﺒﺎط أﺷﻌﺔ ﺗﺤﺖ ﺣﻤﺮاء ﻋﻦ ﻃﺮﻳ‪j‬ﻖ ﻣﺤ‪j‬ﺎذاة ﺟﻬ‪j‬ﺎزي اﻟﻜﻤﺒﻴ‪j‬ﻮﺗﺮ‬ ‫ﻟ‪jjj‬ﺪﻳﻚ ﺑﺤﻴ‪jjj‬ﺚ ﻳﻜ‪jjj‬ﻮن اﻟﺠﻬ‪jjj‬ﺎزان اﻟﻤﺮﺳ‪jjj‬ﻼن اﻟﻤﺴ‪jjj‬ﺘﻘﺒﻼن ﻟﻸﺷ‪jjj‬ﻌﺔ ﺗﺤ‪jjj‬ﺖ‬ ‫اﻟﺤﻤﺮاء ﻣﺘﻮاﺟﻬﻴﻦ وﻋﻠﻰ ﺑﻌﺪ ﻣﺘﺮ واﺣﺪ ﻋﻦ ﺑﻌﻀﻬﻤﺎ.‬ ‫اﻓﺘﺢ اﺗﺼﺎﻻت ﺷﺒﻜﺔ اﻻﺗﺼﺎل.‬ ‫اﻧﻘ‪jj‬ﺮ ﻧﻘ‪jj‬ﺮا ﻣﺰدوﺟ‪j‬ﺎ ﻓ‪jj‬ﻮق اﻻﺗﺼ‪jj‬ﺎل اﻟ‪jj‬ﺬي ﺗﺮﻳ‪jj‬ﺪ اﺳ‪jj‬ﺘﺨﺪاﻣﻪ ﻟﻠﻮﺻ‪jj‬ﻮل إﻟ‪jj‬ﻰ‬ ‫ً‬ ‫ً‬ ‫اﻟﺸﺒﻜﺔ.‬ ‫ﺗﺤﻘﻖ ﻣﻦ أن ﻣﻌﻠﻮﻣﺎت اﻻﺗﺼﺎل ﺻﺤﻴﺤﺔ، ﺛﻢ اﻧﻘﺮ ﻓﻮق ﻣﻮاﻓﻖ.‬ ‫ﻓﻲ اﻟﻘﺎﺋﻤﺔ ﻣﻠﻒ، اﻧﻘﺮ ﻓﻮق اﺗﺼﺎل.‬ ‫773‬

Similar Documents

Free Essay

Networks

...Case: You are appointed as a technical expert to implement a network system for a small size maritime supplyrepresentative company with four users. The company provides supply services to Maritime shipping companies through a worldwide network of suppliers. Its owner is a maritime business expert who doesnot know much about the use of computer systems to support her business. Therefore, she has decidedto employ you as a consultant on a short term basis to set-up appropriate systems in a network. She hasheard about various technologies and the efficiency achieved by computer systems and would welcomeadvice on the acquisition of hardware, software and network items to augment her existing systems inorder to meet the company’s growing needs. The company has a budget of £100,000 for this project. The company currently consists of the following departments (all located in the same open space office): The sales Manager who is responsible for dealing with Maritime companies. She is assisted by asales assistant, equipped with a laptop but with no ability to access the web. This department iscurrently the only one with a connection to the Internet and with access to the company’s commonemail.  The General Manager who is responsible for the general operation of the company. She tradeswith suppliers all over the world in order to ensure the best prices of goods for the company’sMaritime shipping clients. For client communication, she uses plain telephone services and a faxmachine....

Words: 545 - Pages: 3

Premium Essay

Network Infrastructure

... * How much growth is this network going to have to support? When planning for this, you want to make sure that the company is going to have room to grow, which may vary depending on the company. For example, Target is probably going to be a faster growing network than a local mom/pop shop. * Availability * How long your network is available to users. Basically: is your network and up and running all day, every day? * Network Performance * This includes categories that measure the throughput of data and how efficient your network actually is. (Optimum Utilization) * Security * Security design is one of the most important aspects of a network. Without proper security your network is vulnerable to online cyber attacks that can cripple and steal from your databases. * Manageability * This technical goal is going to vary based on company needs. Some customers are going to have more precise goals. The book talks about a company planning to record the number of bytes sent and received to each router. Other clients may have less specific goals than this, it just tends to vary based on company objectives. * Usability * Close to manageability, but different. Usability refers to people who are accessing and using the network you have setup. Your network needs to be easy to use for them (different from management. Easier To Use =/= Easier To Manage) * Adaptability * Design the network so that in can accept new technologies...

Words: 381 - Pages: 2

Premium Essay

Network Design

...Microsoft account Joseph Jackson  Westwood College Designing a Network Microsoft account Joseph Jackson  Westwood College Designing a Network Determining the networking requirements the designing of a network can be a difficult situation. Whether its data transfer rules that determine the number of channels needed and the priorities to be used. An alternate real issue is the most extreme size of data that can be sent and received leads to the need for segmentation at the sending end and reassembly at the receiving end. Networking design must reflect the objectives, attributes, and approaches of the associations in which they work. A decently planned network can help adjust these targets. At the point when legitimately executed, the network base can improve application accessibility and permit the savvy utilization of existing network assets. The primary step is to comprehend your networking necessities. (Cisco Systems, Inc.) There are two essential objectives when setting up a networking design and having the capacity to execute the design into a live environment. The principal objective is to have application accessibility. The system conveys application information between machines. On the off chance that the applications are not accessible to system clients, the system is not doing its occupying. Which can make trouble managing getting to applications over the system. The second of the essential objectives is the Cost of possession. The Information system (IS) plans...

Words: 874 - Pages: 4

Premium Essay

Network

...Assignment 2: Network Topology Design You are the network manager of a company that has grown from 10 employees to 100 employees in 12 months. Year 2 projected growth is estimated to be 100 additional employees located at a remote location. The aggressive growth has brought about some unique challenges and opportunities. The company has one remote warehouse and no off-site disaster recovery services or servers. The network design remains a non-redundant, flat topology. Your assignment must consider the three-layer hierarchical model. You are free to make supported assumptions of the applications and services that this organization uses. Write a one (1) page paper in which you: 1. Depict a network topology graphical model of the initial environment of 10 employees using Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length. 2. Depict a network topology graphical model of the current 100 employees using Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length. 3. Depict a network topology graphical model for future growth to 200 employees using Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length. 4. Create a two-paragraph executive summary. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New...

Words: 378 - Pages: 2

Premium Essay

Network

...IT140-1302A-05: Introduction to Operating Systems and Client/Server Environments Group Assignment Carroll Backus, Sonia Crumbley, Willie Coffie, Jason Duggan, Christopher West 13 May 2013 Instructor: Dr. Betty Tipton Colorado Technical University Table of Contents Technology Analysis and Assessment Plan 3 Technology Analysis and Assessment Improvement Plan 6 Operating System Platform and Cost Containment 6 Architecture Assessment and Governance 9 Enterprise Authentication 11 Directory Services and Domain Consolidation 13 System Administration 15 Operating Systems 17 Email System 19 Maintenance 21 Network Security 23 Summary 25 References 26 Technology Analysis and Assessment Plan Listed below is a simple diagram of the hardware layout in Acme Gym Inc., a small local fitness company that serves the community from a single location. Following the diagram is a detailed description of the current technology available on-site and an assessment of its weaknesses. There are currently four workstation computers located across several office locations. All four workstations currently contain essentially the same hardware and software consisting of: * Microsoft Windows XP operating system * 2 GHz CPU * 2 GB RAM * 120 GB Hard drive * DVD burner drive * Built-in USB and Ethernet ports The server on-site is currently running Microsoft Windows Server 2000 operating system. It contains the following hardware: * 2 each removable 250...

Words: 5202 - Pages: 21

Premium Essay

Network

...Networks, Telecommunications, and Wireless Computing | | | Telecommunication systems enable the transmission of data over public or private networks. A network is a communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together. Telecommunication systems and networks are traditionally complicated and historically ineffi cient. However, businesses can benefi t from today’s modern network infrastructures that provide reliable global reach to employees and customers. Businesses around the world are moving to network infrastructure solutions that allow greater choice in how they go to market—solutions with global reach. These alternatives include wireless, voice-over internet protocol (VoIP), and radio-frequency identification (RFID). | | | | | Knowledge Areas | Business Dilemma | | | Business Dilemma Personal sensing devices are becoming more commonplace in everyday life. Unfortunately, radio transmissions from these devices can create unexpected privacy concerns if not carefully designed. We demonstrate these issues with a widely-available commercial product, the Nike+iPod Sport Kit, which contains a sensor that users put in one of their shoes and a receiver that users attach to their iPod Nanos. Students and researchers from the University of Washington found out that the transmitter in a sneaker can be read up to 60 feet away. Through the use of a prototype...

Words: 2881 - Pages: 12

Premium Essay

Network

...Home » Resources » Networking Tutorials » Network Switching Tutorial Network Switching Tutorial Network Switching Switches can be a valuable asset to networking. Overall, they can increase the capacity and speed of your network. However, switching should not be seen as a cure-all for network issues. Before incorporating network switching, you must first ask yourself two important questions: First, how can you tell if your network will benefit from switching? Second, how do you add switches to your network design to provide the most benefit? This tutorial is written to answer these questions. Along the way, we’ll describe how switches work, and how they can both harm and benefit your networking strategy. We’ll also discuss different network types, so you can profile your network and gauge the potential benefit of network switching for your environment. What is a Switch? Switches occupy the same place in the network as hubs. Unlike hubs, switches examine each packet and process it accordingly rather than simply repeating the signal to all ports. Switches map the Ethernet addresses of the nodes residing on each network segment and then allow only the necessary traffic to pass through the switch. When a packet is received by the switch, the switch examines the destination and source hardware addresses and compares them to a table of network segments and addresses. If the segments are the same, the packet is dropped or “filtered”; if the segments are different...

Words: 3115 - Pages: 13

Premium Essay

Networks

...Chapter 1 Analyzing Business Goals and Constraints This chapter serves as an introduction to the rest of the book by describing top-down network design. The first section explains how to use a systematic, top-down process when designing computer networks for your customers. Depending on your job, your customers might consist of other departments within your company, those to whom you are trying to sell products, or clients of your consulting business. After describing the methodology, this chapter focuses on the first step in top-down network design: analyzing your customer’s business goals. Business goals include the capability to run network applications to meet corporate business objectives, and the need to work within business constraints, such as budgets, limited networking personnel, and tight timeframes. This chapter also covers an important business constraint that some people call the eighth layer of the Open System Interconnection (OSI) reference model: workplace politics. To ensure the success of your network design project, you should gain an understanding of any corporate politics and policies at your customer’s site that could affect your project. The chapter concludes with a checklist to help you determine if you have addressed the business issues in a network design project. Using a Top-Down Network Design Methodology According to Albert Einstein: 000200010270745975 “The world we’ve made as a result of the level of thinking we have done...

Words: 8812 - Pages: 36

Premium Essay

Network

...Computer network From Wikipedia, the free encyclopedia "Computer networks" redirects here. For the periodical, see Computer Networks (journal). "Datacom" redirects here. For other uses, see Datacom (disambiguation). Network science Theory · History Graph · Complex network · Contagion Small-world · Scale-free · Community structure · Percolation · Evolution · Controllability · Topology · Graph drawing · Social capital · Link analysis · Optimization Reciprocity · Closure · Homophily Transitivity · Preferential attachment Balance · Network effect · Influence Types of Networks Information · Telecommunication Social · Biological · Neural · Semantic Random · Dependency · Flow Graphs Vertex · Edge · Component Directed · Multigraph · Bipartite Weighted · Hypergraph · Random Cycle · Loop · Path Neighborhood · Clique · Complete · Cut Data structure · Adjacency list & matrix Incidence list & matrix Metrics and Algorithms Centrality · Degree · Betweenness Closeness · PageRank · Motif Clustering · Degree distribution · Assortativity · Distance · Modularity Models Random · Erdős–Rényi Barabási–Albert · Watts–Strogatz ERGM · Epidemic · Hierarchical Browse Topics · Software · Network scientists Graph theory · Network theory v t e A computer network, often simply referred to as a network, is a collection of hardware components and computers interconnected by communication channels that allow sharing of resources...

Words: 7339 - Pages: 30

Premium Essay

Network

...2.1.1 Network History The history of computer networking is complex. It has involved many people from all over the world over the past 35 years. Presented here is a simplified view of how the Internet evolved. The processes of invention and commercialization are far more complicated, but it is helpful to look at the fundamental development. In the 1940s computers were large electromechanical devices that were prone to failure. In 1947 the invention of a semiconductor transistor opened up many possibilities for making smaller, more reliable computers. In the 1950s mainframe computers, which were run by punched card programs, began to be used by large institutions. In the late 1950s the integrated circuit that combined several, then many, and now millions, of transistors on one small piece of semiconductor was invented. Through the 1960s mainframes with terminals were commonplace, and integrated circuits were widely used. In the late 1960s and 1970s, smaller computers, called minicomputers came into existence. However, these minicomputers were still very large by modern standards. In 1977 the Apple Computer Company introduced the microcomputer, also known as the personal computer. In 1981 IBM introduced its first personal computer. The user-friendly Mac, the open-architecture IBM PC, and the further micro-miniaturization of integrated circuits led to widespread use of personal computers in homes and businesses. In the mid-1980s users with stand-alone computers...

Words: 2656 - Pages: 11

Premium Essay

Network

...Network Design Following the acquisition of new premises comprising a two-story office in Adeplhi, Maryland this provides UMUC with the ability to revise and improve their network topology accordingly and ensure that not only is connectivity provided in a consistent fashion but also to provide the required security for information accordingly. One of the fundamental requirements is to ensure that data is segregated in terms of staff and students so this will require the creation of dedicated subnets accordingly to follow through and implement the solution, while there is also a requirement to provide wireless connectivity for students in the lobby area. Given that there is a specific opportunity to develop a comprehensive infrastructure it is important that the fundamental basis in terms of cabling is of a sufficiently high quality to support current and future operational requirements. Due to the size of the building there would be limitations if using Cat 5 based Ethernet cables for example and so therefore there should be a requirement to utilize Cat 6 based Ethernet as this will support a maximum cable length in excess of 300 ft without there being any connectivity or performance issues (Mitchell, 2014). Each of the two floors will have a designated server room that is designed to provide a central point of connectivity for all locations on that floor, and each of the rooms on the first and second floor will require a certain number of data ports based on their expected utilization...

Words: 1451 - Pages: 6

Premium Essay

Network+

...XelPharm owns a large distribution warehouse approximately four miles away from the headquarters. Until now, its networks have relied entirely on wired connections. The company’s CIO (chief information officer) decided long ago that he would wait until wireless technology “settled down” before investing in it. 1. What can you tell him about the wireless standards that might convince him that now is the time to adopt wireless technology? Ans: Since 1997 after IEEE released its first wireless network standard, wireless network has evolved into several distinct standards. Most attracting thing about Wireless connection is the absence of wire. Addition to that, the newer technology of wireless network can provide maximum downlink throughput to120 Mbps and maximum uplink throughput to 60 Mbps (WiMax 2). This technology is being considered to be an alternative to DSL and T-carrier services for homes and businesses. It achieves much faster throughput than T-carriers at a lower cost for end users. This type of technology can transmit and receive signals up to 50 km, or approximately 30 miles, when antennas are fixed or up to 15 km, or approximately 10 miles, when they are mobile with QoS (quality of service) provisions. 2. Also, what can you tell him to convince him that wireless networking could improve the company’s productivity? Ans: Wireless networks are a powerful tool for boosting productivity and encouraging information sharing. With...

Words: 747 - Pages: 3

Premium Essay

Networks

...would be sharing only data files and accessing servers on the network. It is more flexible and less expensive if they use wireless a network than a wire network. However, for building number 3, I would recommend to use bound transmission media because people on this building would be sharing files that contain videos. As we know sharing videos require a lot of data bandwidth; therefore, bounded transmission media is the best transmission media that we can use for the network on this building. For building number 4, I would recommend wire transmission media too. As they mention on the book, in building four, 50 shipping and packing will be riding up and down every day. This building needs a lot of bandwidth because it will be transmitting a lot of data. What type of media would you recommend using to connect the buildings and why? I would recommend using a bounded connection to connect these buildings. Even though two of these building would be using wireless networks, some of the data that will be shared by these building require a lot of bandwidth. It’s better if we use a wire network to connect these buildings. Also, the distance between building four and the other buildings might cause problems if we used a wireless network. What kind of media should the company request from its ISP for connecting the corporate WAN to the Internet? Public IP Block, this block could be in the form of /29, /28, or /27 network; depending on which plan or subnet you choose to have. Moreover...

Words: 685 - Pages: 3

Free Essay

Networks

...The Wealth of Networks The Wealth of Networks How Social Production Transforms Markets and Freedom Yochai Benkler Yale University Press New Haven and London Copyright _ 2006 by Yochai Benkler. All rights reserved. Subject to the exception immediately following, this book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. The author has made an online version of the book available under a Creative Commons Noncommercial Sharealike license; it can be accessed through the author’s website at http://www.benkler.org. Printed in the United States of America. Library of Congress Cataloging-in-Publication Data Benkler, Yochai. The wealth of networks : how social production transforms markets and freedom / Yochai Benkler. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-300-11056-2 (alk. paper) ISBN-10: 0-300-11056-1 (alk. paper) 1. Information society. 2. Information networks. 3. Computer networks—Social aspects. 4. Computer networks—Economic aspects. I. Title. HM851.B457 2006 303.48'33—dc22 2005028316 A catalogue record for this book is available from the British Library. The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources. 10 9 8 7 6 5 4 3 2 1...

Words: 214717 - Pages: 859

Free Essay

Network

...Analysis and Review Questions 1. Compare the currents obtained from calculation and simulation. Comment on the findings of the values. | Calculation | Simulation using Multisim | Simulation using Pspice | Current when RL = 50 ohms | 2.994 < 69.91 A | 2.994 A | 4.273 A | Current when RL = 200 ohms | 2.306 < 47.92 A | 2.306 A | 3.277 A | Table above show the results of current obtained from the experiment and simulation. There is a different result between simulation using pspice and simulation using multisim and calculation.From calculation, the value of current used in the calculation and multisim is rms current while value of current used in pspice simulation is peak current.The value of rms current if converted to peak current have to multiply by 2 . Current when RL = 50Ω from calculation if multiply by 2 will get 4.234 A which is almost the same with Pspice simulation. Same goes when RL = 200, from calculation 2.306 x 2 = 3.261 A, which give the value almost the same with current from Pspice simulation. In calculation method, the value of current through RL is obtained using the Norton’s theorem. Each RL is calculated using the equivalent Norton’s circuit. Norton theorem is used to simplify the circuit to make the calculation easier. Below show the equivalent circuit using Norton theorem to obtain the current through RL. Norton equivalent circuit Based on the table above, the results through simulation and calculation are similar which proves...

Words: 927 - Pages: 4