1
ﺻﻔﺤﻪ
ﺑﺨﺶ ﺳﻮﻡ :ﺍﻳﻨﺘﺮﻧﺖ
ﻣﻌﺮﻓﯽ ﺷﺒﮑﻪ ﭘﻬﻨﺎﻭﺭ ﺟﻬﺎﻧﯽ ) ۶........................................( World Wide Web -ﺯﻳﺮ ﺳﺎﺧﺖ ﺍﻳﻨﺘﺮﻧﺖ ۴۷...............................................................................................
۵۶.......................................................................................................................ISP -
۶۰.....................................................................................................................DSL۶۷.................................................................................................................VDSL -
ﺍﻳﻨﺘﺮﻧﺖ ﻣﺎﻫﻮﺍﺭﻩ ﺍﻱ۷۲................................................................................................. ۷۴..................................................................................................................VOIP -ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ۸۱...............................................................................................
ﻳﺎﺩﮔﻴﺮﻱ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ۹۴............................................................................................... ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ۱۰۱.................................................................................................. -ﺭﺍﺩﻳﻮ ﺍﻳﻨﺘﺮﻧﺘﻲ۱۰۹........................................................................................................
2
ﺻﻔﺤﻪ
ﺑﺨﺶ ﭼﻬﺎﺭﻡ ﺷﺒﮑﻪ
ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ۱۱۴.............................................................................................-
ﺷﺒﮑﻪ ﻭﺍﻧﻮﺍﻉ ﺁﻥ۱۲۶......................................................................................................
MAC Addressﭼﻴﺴﺖ؟۱۲۹.................................................................................. ﻣﺪﻝ ﻣﺮﺟﻊ ۱۳۳....................................................................................................OSI۱۳۶......................................................................................................................OSI -
ﻧﺤﻮﻩ ﻣﺒﺎﺩﻟﻪ ﺩﺍﺩﻩ ﺑﻴﻦ ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ۱۴۰............................................................................ -ﭘﻮﻳﺶ ﭘﻮﺭﺕ ﻫﺎ ۱۴۵.....................................................................................................
ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﭘﻮﺭﺕ ﻫﺎﻱ ﺷﺒﮑﻪ ﺩﺭ ﻭﻳﻨﺪﻭﺯ۱۴۸................................................................. ﭘﺮﻭﺗﮑﻞ ۱۶۰..................................................................................................TCP/IP -ﻣﻔﺎﻫﻴﻢ ﺍﻭﻟﻴﻪ ﭘﺮﻭﺗﮑﻞ ) TCP/IPﻗﺴﻤﺖ ﺍﻭﻝ (۱۶۹.....................................................
ﻣﻔﺎﻫﻴﻢ ﺍﻭﻟﻴﻪ ﭘﺮﻭﺗﮑﻞ ) TCP/IPﻗﺴﻤﺖ ﺩﻭﻡ (۱۷۵................................................... ﻣﻔﺎﻫﻴﻢ ﺍﻭﻟﻴﻪ ﭘﺮﻭﺗﮑﻞ ) TCP/IPﻗﺴﻤﺖ ﺳﻮﻡ (۱۸۳................................................... -ﻣﻔﺎﻫﻴﻢ ﺍﻭﻟﻴﻪ ﭘﺮﻭﺗﮑﻞ ) TCP/IPﻗﺴﻤﺖ ﭼﻬﺎﺭﻡ (۱۸۹................................................
ﻣﻔﺎﻫﻴﻢ ﺍﻭﻟﻴﻪ ﭘﺮﻭﺗﮑﻞ ) TCP/IPﻗﺴﻤﺖ ﭘﻨﺠﻢ (۱۹۶...................................................۲۰۳...................................................................................................................DNS -
ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ۲۱۹............................................................................................. DNS ﺍﺗﺮﻧﺖ ۲۲۷...................................................................................................................-
۲۴۰...................................................................................................................NAT
-
۲۴۶...............................................................................................................VLAN
-ﺷﺒﮑﻪ ﻫﺎﻱ ۲۵۰.................................................................................................VPN
ﺍﺷﺘﺮﺍﮎ ﻣﻨﺎﺑﻊ ۲۶۱........................................................................................................3
ﻫﺎﺏ ﻭ ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ ﺁﻥ ۲۷۱......................................................................................-
ﺳﻮﺋﻴﭻ ۲۷۵...................................................................................................................
ﻣﻔﻬﻮﻡ ﺭﻭﺗﻴﻨﮓ ۲۹۳...................................................................................................... ﭘﺮﻭﺗﮑﻞ ﺭﻭﺗﻴﻨﮓ۲۹۵..................................................................................................... -ﻓﺮﺁﻳﻨﺪ ﺭﻭﺗﻴﻨﮓ۲۹۷.......................................................................................................
-
ﺭﻭﺗﺮ ۳۰۳.....................................................................................................................
ﺭﺍﻩ ﺍﻧﺪﺍﺯﯼ ﺍﻭﻟﻴﻪ ﺭﻭﺗﺮ۳۱۳............................................................................................. ﺁﺷﻨﺎﺋﯽ ﺑﺎ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﺭﻭﺗﺮ۳۱۷.................................................................................. ﺭﺍﻩ ﺍﻧﺪﺍﺯﯼ ﺍﻭﻟﻴﻪ ﺭﻭﺗﺮ :ﺍﻳﺠﺎﺩ ﻳﮏ )۳۲۴..................( Hyper Terminal Session ﺁﺷﻨﺎﺋﯽ ﺑﺎ ﻋﻨﺎﺻﺮ ﺩﺍﺧﻠﯽ ﺭﻭﺗﺮ۳۲۸................................................................................ ﺁﺷﻨﺎﺋﯽ ﺑﺎ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﯼ ﺭﻭﺗﺮ۳۳۳............................................................................... ﺭﻭﺗﺮ ﻭ ﺟﺎﻳﮕﺎﻩ ﺁﻥ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﯼ ۳۳۹............................................................WAN ﺍﻧﻮﺍﻉ ﺭﻭﺗﺮ۳۴۶.............................................................................................................-
ﺭﻭﺗﺮﻫﺎﻱ ﺳﻴﺴﮑﻮ۳۵۰..................................................................................................
ﭘﻴﮑﺮﺑﻨﺪﯼ ﺭﻭﺗﺮ ﻫﺎﯼ ﺳﻴﺴﮑﻮ۳۵۵................................................................................. ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ۳۶۴.......................................................................................... -ﺍﻧﻮﺍﻉ ﺷﺒﮑﻪ ﻫﺎﻱ ۳۷۰................................................................................Wireless
ﭘﻴﮑﺮﺑﻨﺪﻱ ﺷﺒﮑﻪ ۳۷۳.................................................................................Wireless ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻭ ﻣﻴﺰﺍﻥ ﺗﺄﺧﻴﺮ ۳۷۶..................................................................................... ﺍﻧﻮﺍﻉ ﮐﺎﺑﻞ ۳۸۰............................................................................................................ -ﻓﻴﺒﺮ ﻧﻮﺭﻱ ۳۸۵............................................................................................................
ﺍﻳﺠﺎﺩ ﮐﺎﺑﻞ ۳۹۱...........................................................................................X-Over ﺍﻳﺠﺎﺩ ﮐﺎﺑﻞ ۳۹۵.........................................................................................Straight ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ ﺧﻄﻮﻁ ۴۰۱....................................................................................T14
5
ﻣﻌﺮﻓﻲ ﺷﺒﻜﻪ ﭘﻬﻨﺎﻭﺭ ﺟﻬﺎﻧﻲ )(World Wide Web ﻗﺒﻞ ﺍﺯ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻥ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﻭﺏ ,ﺭﻭﻳﺎﻱ ﺯﺍﻧﺪﺍ ﻣﻄﺮﺡ ﺑﻮﺩ .ﺩﺭ ﺍﻳﻦ ﺭﻭﻳﺎ ﺗﻤﺎﻣﻲ ﻋﻠﻮﻡ ,ﻣﺴﺘﻨﺪﺍﺕ ,ﺗﺼﺎﻭﻳﺮ ,ﺻﻮﺕ ,ﻭﻳﺪﺋﻮ ﻭ… ﺗﻮﺳﻂ ﻫﺮ ﻓﺮﺩ ﻛﻪ ﺩﺍﺭﺍﻱ ﻳﻜﺪﺳﺘﮕﺎﻩ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺑﻮﺩ ﺩﺭ ﻫﺮ ﺯﻣﺎﻥ ﻭ ﻣﻜﺎﻥ ﺩ ﻟﺨﻮﺍﻩ ,ﻗﺎﺑﻞ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻮﺩ .ﺯﺍﻧﺪﺍ ،ﺭﻭﻳﺎﻱ" ﺗﺪﻧﻠﺴﻮﻥ " ﺍﺯ ﻳﻚ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺧﻴﺎﻟﻲ ﺑﻮﺩ .ﻭﻱ ﺩﻧﻴﺎﺋﻲ ﺭﺍ ﻛﻪ ﺩﺭ ﺁﻥ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﻃﺮﻳﻖ ﺍﺑﺮ ﻣﺘﻦ ﻫﺎ ﻭ ﺍﺑﺮ ﺭﺳﺎﻧﻪ ﻫﺎ
ﺑﺼﻮﺭﺕ ﻳﻚ ﺷﺒﻜﻪ ﺗﺎﺭ ﻋﻨﻜﺒﻮﺗﻲ ﺑﻬﻢ ﻣﺘﺼﻞ ﻭ ﻣﺮﺗﺒﻂ ﻣﻲ ﮔﺮﺩﻳﺪﻧﺪ ,ﭘﻴﺶ ﺑﻴﻨﻲ ﻛﺮﺩﻩ ﺑﻮﺩ .ﺩﺭ ﺍﻳﻦ ﺩﻧﻴﺎ ﺍﻃﻼﻋﺎﺕ ﺑﺼﻮﺭﺕ ﻳﻚ ﻛﺘﺎﺑﺨﺎﻧﻪ ﺟﻬﺎﻧﻲ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﻣﻲ ﺷﻮﻧﺪ .ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻳﻦ
ﻛﺘﺎﺑﺨﺎﻧﻪ ﺟﻬﺎﻧﻲ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺗﺎﺛﻴﺮ ﺷﮕﺮﻓﻲ ﺩﺭ ﺟﻮﺍﻣﻊ ﻣﺘﻔﺎﻭﺕ ﺑﺸﺮﻱ ﺭﺍ ﺑﺪﻧﺒﺎﻝ ﺩﺍﺷﺘﻪ ﻭ
ﻣﻨﺸﺎ ﺑﺮﻭﺯ ﺗﺤﻮﻻﺕ ﻋﻈﻴﻢ ﺩﺭ ﺣﻴﺎﺕ ﺑﺸﺮﻱ ﺧﻮﺍﻫﺪ ﺑﻮﺩ. ﻧﺤﻮﻩ ﺷﻜﻞ ﮔﻴﺮﻱ ﻭ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻥ ﻭﺏ ﺯﺍﻧﺪﺍ ﻳﻚ ﺭﻭﻳﺎ ﺑﻮﺩ ،ﻭﻟﻲ ﺍﻣﺮﻭﺯ ﺑﺎ ﻭﺍﻗﻌﻴﺘﻲ ﺑﻨﺎﻡ ﻭﺏ ﻣﻮﺍﺟﻪ ﻫﺴﺘﻴﻢ .ﺑﻪ ﮐﻤﮏ ﻭﺏ
ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ،ﺻﺮﻓﻨﻈﺮ ﺍﺯ ﻣﺤﻞ ﺍﺳﺘﻘﺮﺍﺭ ﺑﻬﻢ ﭘﻴﻮﻧﺪ ﺧﻮﺭﺩﻩ ﻭ ﺍﻣﻜﺎﻥ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺩﺭﻳﺎﺋﻲ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪﻩ ﻓﺮﺍﻫﻢ ﻣﻴﮕﺮﺩﺩ .ﺍﻃﻼﻋﺎﺕ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﻣﺎﻫﻴﺘﻲ ﻛﺎﻣﻼ" ﭘﻮﻳــﺎ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﻚ ﺩﺍﻳﺮﻩ ﺍﻟﻤﻌﺎﺭﻑ ﺑﺼﻮﺭﺕ ﺍﻳﺴﺘﺎ ﻣﻲ ﺑﺎﺷﻨﺪ ﻭﻟﻲ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﻭﺏ ﺑﺼﻮﺭﺕ ﭘﻮﻳﺎ ﺑﻮﺩﻩ ﻭ ﺩﺍﺋﻤﺎ" ﺑﻬﻨﮕﺎﻡ ﻣﻴﺸﻮﻧﺪ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻭﺏ ﻣﻴﺘﻮﺍﻥ ﺩﺭ ﺳﺮﻳﻌﺘﺮﻳﻦ ﺯﻣﺎﻥ ﻣﻤﻜﻦ ﺑﻪ ﺟﺪﻳﺪﺗﺮﻳﻦ ﺍﻃﻼﻋﺎﺕ ﺩﺳﺘﻴﺎﺑﻲ ﭘﻴﺪﺍ ﻛﺮﺩ.ﺍﻃﻼﻋﺎﺕ ﻓﻮﻕ ﺍﺯ ﻃﺮﻳﻖ
ﺳﺎﻳﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﻛﻪ ﻫﺮ ﻛﺪﺍﻡ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺩﺭ ﻳﻚ ﻭ ﻳﺎ ﭼﻨﺪﻳﻦ ﻣﺤﻞ ﻣﺴﺘﻘﺮ ﻳﺎﺷﻨﺪ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪﻩ ﻗﺮﺍﺭ ﻣﻴﮕﻴﺮﺩ .ﻭﺏ ﭘﺘﺎﻧﺴﻴﻞ ﺑﺎﻻﻱ ﺧﻮﺩ ﺭﺍ ﻣﺪﻳﻮﻥ ﺩﻭ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻣﺪﺭﻥ " :ﺍﺑﺮ ﻣﺘﻦ ﻫﺎ") (HyperTextﻭ" ﺍﺑﺮ ﺭﺳﺎﻧﻪ ﻫﺎ " ) (HyperMediaﺍﺳﺖ .ﺩﺭ
ﺍﺑﺮﻣﺘﻦ ﻫﺎ ,ﺍﻃﻼﻋﺎﺕ ﻣﺮﺗﺒﻂ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺭﻭﺵ ﻣﺪﻭﻥ ﺑﻬﻢ ﭘﻴﻮﻧﺪ ﺯﺩﻩ ﻣﻴﺸﻮﻧﺪ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺑﻴﻦ ﺍﻃﻼﻋﺎﺕ ،ﻣﻴﺘﻮﺍﻥ ﺑﺎ ﻫﺮ ﺭﻭﺵ ﺩﻟﺨﻮﺍﻩ ﻭ ﻃﻲ ﻳﻚ ﻣﺴﻴﺮ ﺧﻄﻲ ﻭ ﻳﺎ ﻏﻴﺮ ﺧﻄﻲ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺩﺳﺘﻴﺎﺑﻲ ﭘﻴﺪﺍ ﻛﺮﺩ.
6
ﺑﻬﺮ ﺣﺎﻝ ﺯﻣﺎﻧﻴﻜﻪ ﻣﺠﻤﻮﻋﻪ ﻭﺳﻴﻌﻲ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﺎ ﻫﺮ ﺭﻭﺵ ﻣﻤﻜﻦ ﺫﺧﻴﺮﻩ ﻧﻤﺎﺋﻴﻢ,
ﻣﻲ ﺑﺎﻳﺴﺖ ﺭﻭﺷﻬﺎﺋﻲ ﺭﺍ ﻧﻴﺰ ﺑﺮﺍﻱ ﺑﺎﺯﻳﺎﺑﻲ ﻭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺁﻧﺎﻥ ﺗﺪﻭﻳﻦ ﻧﻤﻮﺩ .ﺩﺭ ﻣﺪﻟﻬﺎﻱ ﻗﺪﻳﻤﻲ ﺟﻬﺖ ﺣﺮﮐﺖ ﺍﺯ ﻳﻚ ﺻﻔﺤﻪ )ﻳﻚ ﺣﺮﻳﻢ ﺍﻃﻼﻋﺎﺗﻲ( ﺑﻪ ﺻﻔﺤﻪ ﺩﻳﮕﺮ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺼﻮﺭﺕ ﺧﻄﻲ ﺣﺮﻛﺖ ﻧﻤﻮﺩ ).ﺍﺑﺘﺪﺍ ﺻﻔﺤﻪ ﻳﻚ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﺻﻔﺤﻪ ﺩﻭ ﻭ …( ﺩﺭ ﻳﻚ ﺍﺑﺮ ﻣﺘﻦ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﻣﻴﺘﻮﺍﻥ ﺍﺯ ﻳﻚ ﻭﺍﮊﻩ ﺑﻪ ﻭﺍﮊﻩ ﺩﻳﮕﺮ ﭘﺮﺵ ﻭ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﻣﺸﺎﻫﺪﻩ ﻧﻤﻮﺩ.ﻣﺜﻼ" ﺩﺭ ﻳﻚ ﺩﺍﻳﺮﻩ ﺍﻟﻤﻌﺎﺭﻑ ﻛﻪ ﺑﺼﻮﺭﺕ ﺍﺑﺮ ﻣﺘﻨﻲ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺷﺪﻩ ﺍﺳﺖ ,ﻣﻴﺘﻮﺍﻥ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ " ﻧﻴﻤﺎ ﻳﻮﺷﻴﺞ " ﻣﺸﺎﻫﺪﻩ ﻭ ﺩﺭ ﻫﻤﺎﻥ
ﻭﺿﻌﻴﺖ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﻧﻴﺰ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ " ﻳﻮﺷﻴﺞ " ﺯﺍﺩﮔﺎﻩ ﻭﻱ ﻣﺸﺎﻫﺪﻩ ﻧﻤﻮﺩ .ﺩﺭ ﺯﻣﺎﻥ ﻣﺸﺎﻫﺪﻩ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ "ﻳﻮﺷﻴﺞ " ﻣﻴﺘﻮﺍﻥ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺍﺳﺘﺎﻥ ﻣﺎﺯﻧﺪﺭﺍﻥ ﻧﻴﺰ ﺩﺭﻳﺎﻓﺖ ﻛﺮﺩ .ﺩﺭ ﮔﺬﺷﺘﻪ ﺍﻛﺜﺮ ﺍﻃﻼﻋﺎﺗﻲ ﻛﻪ ﺍﺯ ﻃﺮﻳﻖ ﻭﺏ ﺩﺭﺍﺧﺘﻴﺎﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪﮔﺎﻥ ﻗﺮﺍﺭ ﻣﻲ ﮔﺮﻓﺖ
ﺑﺼﻮﺭﺕ"ﻣﺘﻦ") (Textﺑﻮﺩ ,ﻭﻟﻲ ﺍﻣﺮﻭﺯﻩ ﺑﺎ ﺑﻜﺎﺭﮔﻴﺮﻱ ﺍﻣﻜﺎﻧﺎﺕ ﭼﻨﺪ ﺭﺳﺎﻧﻪ ﺍﻱ ) (MultiMediaﻧﻈﻴﺮ ﺻﻮﺕ ,ﮔﺮﺍﻓﻴﻚ ,ﺍﻧﻴﻤﻴﺸﻦ ﻭ ﺗﺼﻮﻳﺮ ﻣﻴﺘﻮﺍﻥ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﺎ ﺍﺷﻜﺎﻝ ﻣﺘﻔﺎﻭﺕ ﺑﺮ ﺭﻭﻱ ﺳﺎﻳﺖ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻣﺸﺎﻫﺪﻩ ﻧﻤﻮﺩ .ﻣﺜﻼ" ﻣﻴﺘﻮﺍﻥ ﻳﻚ ﺳﺎﻳﺖ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ
ﻓﻴﻠﻢ ﻫﺎﻱ ﻭﻳﺪﺋﻮﺋﻲ ﺭﺍ ﺍﻳﺠﺎﺩ ﻭ ﻋﻼﻗﻪ ﻣﻨﺪﺍﻥ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺎﻳﺖ ،ﺍﺯ ﻃﺮﻳﻖ ﻭﺏ ﻗﺎﺩﺭ ﺑﻪ ﺩﺳﺘﻴﺎﺑﻲ ﻓﻴﻠﻢ ﻣﻮﺭﺩ ﻋﻼﻗﻪ ﺧﻮﺩ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ. ﻭﺏ ﺑﻌﻨﻮﺍﻥ ﺑﺨﺸﻲ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺤﺴﻮﺏ ﻣﻴﮕﺮﺩﺩ )ﺍﻳﻨﺘﺮﻧﺖ ﻳﻚ ﺷﺒﻜﻪ ﮔﺴﺘﺮﺩﻩ ﺟﻬﺎﻧﻲ ﺍﺯ ﻛﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺑﻬﻢ ﻣﺮﺗﺒﻂ ﻣﻲ ﺑﺎﺷﺪ( .ﻭﺏ ﻳﻚ ﺳﻴﺴﺘﻢ ﻣﺪﻳﺮﻳﺖ ﺑﺎﻧﻚ ﺍﻃﻼﻋﺎﺗﻲ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ /ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺑﻮﺩﻩ ﻛﻪ ﺍﺯ ﻳﻚ ﺳﺎﺧﺘﺎﺭ ﻭ ﻣﻌﻤﺎﺭﻱ ﻣﺸﺨﺺ ﺟﻬﺖ ﺑﺎﺯﻳﺎﺑﻲ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻛﻨﺪ .ﺗﻤﺎﻣﻲ ﻣﺮﻭﺭﮔﺮﻫﺎ ) (Browserﺑﺎ ﺁﮔﺎﻫﻲ ﺍﺯ ﺍﻳﻦ ﻣﻌﻤﺎﺭﻱ ﻗﺎﺩﺭ ﺑﻪ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﻣﺮﻭﺭﮔﺮﻫﺎ ,ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﺋﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﭘﺲ ﺍﺯ ﻧﺼﺐ ﻭ ﺑﻬﺮﻩ ﺑﺮﺩﺍﺭﻱ ﺍﺯ ﺁﻧﺎﻥ ﻣﻴﺘﻮﺍﻥ ﺍﺯ ﻳﻚ ﺳﺎﻳﺖ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﺳﺎﻳﺖ ﺩﮔﺮ ﺣﺮﻛﺖ
ﻧﻤﻮﺩ.ﺍﻭﻟﻴﻦ ﺑﺎﺭ ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺲ ﺍﻧﮕﻠﻴﺴﻲ ﺑﻨﺎﻡ " ﺑﺮﻧﺮﺯ ﻟﻲ " ﺍﻳﺪﻩ ﺗﺮﻛﻴﺐ ﺍﺑﺮ ﺭﺳﺎﻧﻪ ﻫﺎ ﺭﺍ ﻣﻨﺎﺑﻊ ﺍﻃﻼﻋﺎﺗﻲ ﺍﻳﻨﺘﺮﻧﺖ ﻣﻄﺮﺡ ﻧﻤﻮﺩ .ﻗﺒﻞ ﺍﺯ ﻭﺏ ﻣﻨﺎﺑﻊ ﻭ ﺍﻗﻼﻡ ﺍﻃﻼﻋﺎﺗﻲ ﮔﻮﻧﺎﮔﻮﻧﻲ ﺩﺭ
7
ﺍﻳﻨﺘﺮﻧﺖ ﻭﺟﻮﺩ ﺩﺍﺷﺖ ﻭﻟﻲ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺁﻧﻬﺎ ﺑﺴﺎﺩﮔﻲ ﻣﻴﺴﺮ ﻧﺒﻮﺩ .ﺩﺭ ﺳﺎﻝ "١٩٨٩ﺯﻣﺎﻧﻴﻜﻪ" ﺑﺮﻧﺮﺯﻟﻲ" ﺑﺮ ﺭﻭﻱ ﻳﻚ ﭘﺮﻭﮊﻩ ﻓﻌﺎﻟﻴﺖ ﻣﻲ ﻛﺮﺩ ,ﻣﺸﺎﻫﺪﻩ ﻧﻤﻮﺩ ﻛﻪ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺟﻬﺖ ﻛﺎﺭ ﻫﻤﺰﻣﺎﻥ ﺑﺮ ﺭﻭﻱ ﭘﺮﻭﮊﻩ ﺑﺮﺍﻱ ﺍﻓﺮﺍﺩ ,ﻋﻤﻠﻴﺎﺗﻲ ﻃﺎﻗﺖ ﻓﺮﺳﺎ ﻭ ﻣﺸﻜﻞ ﺍﺳﺖ.ﻭﻱ ﺑﺎ ﺑﻬﺮﻩ ﮔﻴﺮﻱ ﺍﺯ ﺗﻜﻨﻮﻟﻮﮊﻱ ﺍﺑﺮ ﻣﺘﻦ ﻫﺎ ,ﺷﺒﻜﻪ ﺍﻱ ﺍﺯ ﻣﺴﺘﻨﺪﺍﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺍﻓﺮﺍﺩ ﺟﻬﺖ ﻓﻌﺎﻟﻴﺖ
ﺩﺭ ﭘﺮﻭﮊﻩ ﻫﺎﻱ ﮔﻮﻧﺎﮔﻮﻥ ﺭﺍ ﻓﺮﺍﻫﻢ ﺁﻭﺭﺩ .ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻣﺘﻌﺪﺩﻱ ﺑﻪ ﺻﻔﺤﺎﺕ ﻣﺴﺘﻨﺪﺍﺕ ,ﺍﻳﺠﺎﺩ ﻭ ﺗﻤﺎﻣﻲ ﺟﺰﺋﻴﺎﺕ ﻣﺮﺑﻮﻃﻪ ﺍﺯ ﺩﻳﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪﻩ ﻣﺨﻔﻲ ﻣﻲ ﻣﺎﻧﺪ.
ﻣﺴﺘﻨﺪﺍﺕ ﻭﺏ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺎ ﻳﻚ ﻗﺎﻟﺐ ﺧﺎﺹ ﻧﻮﺷﺘﻪ ﺷﻮﻧﺪ ,ﺑﮕﻮﻧﻪ ﺍﻱ ﻛﻪ ﺍﺑﺮ ﻣﺘﻦ ﻫﺎ ﺑﺘﻮﺍﻧﻨﺪ ﺑﺎ ﻳﻜﺪﻳﮕﺮ ﻛﺎﺭ ﻧﻤﺎﻳﻨﺪ .ﺍﻳﻦ ﻗﺎﻟﺐ ﺧﺎﺹ Hyper Text Markup HTML ) ( Languageﻧﺎﻣﻴﺪﻩ ﺷﺪ.
ﺍﻳﻦ ﺯﺑﺎﻥ ﺑﻌﻨﻮﺍﻥ ﺯﻳﺮ ﻣﺠﻤﻮﻋﻪ ﺯﺑﺎﻥ )Standard Generalized Markup ) SGML
( Languageﻣﺤﺴﻮﺏ ﻣﻴﮕﺮﺩﺩ SGML.ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻱ ﺟﻬﺖ ﺗﻌﺮﻳﻒ ﻓﻮﺭﻣﺖ ﺩﺭ ﻣﺴﺘﻨﺪﺍﺕ ﻣﺘﻨﻲ ﺍﺳﺖ.ﺍﺯ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻓﻮﻕ ﺩﺭ ﮔﺬﺷﺘﻪ ﺍﻏﻠﺐ ﺟﻬﺖ ﻋﻤﻠﻴﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﻧﺸﺮ ﺭﻭﻣﻴﺰﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﺪ ".ﺑﺮﻧﺮﺯﻟﻲ " ﺍﺯ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﺍﺑﺮﻣﺘﻦ ﻫﺎ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺍﻭﻟﻴﻦ ﻣﺴﺘﻨﺪﺍﺕ ﺩﺭ ﻭﺏ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ.ﺟﻬﺖ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻭﻟﻴﻦ ﺳﺎﻳﺖ ﻫﺎﻱ ﻭﺏ ﺍﺯ ﻳﻚ ﻣﺮﻭﺭﮔﺮ ﺧﻄﻲ ﻭﺏ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﺪ .ﺍﻳﻦ ﻣﺮﻭﺭﮔﺮ ﻣﺤﺪﻭﺩ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺻﺮﻓﺎ" ﻳﻚ ﺧﻂ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺑﻮﺩ .ﺩﺭ ﺍﻳﻦ ﻣﺪﻝ
ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﻳﻜﻲ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻨﺎﻡ TelNetﺟﻬﺖ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺩﻭ ﺳﺎﻳﺖ ﺍﻭﻟﻴﻪ ﻭﺏ ﺑﺎ ﻧﺎﻣﻬﺎﻱ Infacern.chﻭ ﻳﺎ Nxo01.cern.chﺍﺳﺘﻔﺎﺩﻩ ﻣﻴﮕﺮﺩﻳﺪ .ﺍﻳﻦ ﻣﺮﻭﺭﮔﺮ ﺩﺍﺭﺍﻱ ﺩﺳﺘﻮﺭﺍﺗﻲ ﻧﻈﻴﺮ Start a Search :ﻭ Follow a Linkﺑﻮﺩ .ﺍﻛﺜﺮ
ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺳﺎﻳﺖ ﻫﺎﻱ ﺍﻭﻟﻴﻪ ،ﺍﺯ ﺍﻣﻜﺎﻧﺎﺕ ﺍﺑﺮ ﻣﺘﻦ ﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲ ﻛﺮﺩﻧﺪ ﻭ ﻫﻤﻴﻦ
ﺍﻣﺮ ﺑﺎﻋﺚ ﻋﺪﻡ ﺑﻜﺎﺭﮔﻴﺮﻱ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﺍﺑﺮﻣﺘﻦ ﻫﺎ ﺩﺭ ﻣﺴﺘﻨﺪﺍﺕ ﺍﻭﻟﻴﻪ ﻭ ﻋﺪﻡ ﺭﺷﺪ ﻣﻨﺎﺳﺐ
ﻭﺏ ﮔﺮﺩﻳﺪ .ﻣﻬﻤﺘﺮﻳﻦ ﻋﺎﻣﻞ ﺭﺷﺪ ﻭ ﻓﺮﺍﮔﻴﺮ ﺷﺪﻥ ﻭﺏ ﺩﺭ ﺳﻄﺢ ﺟﻬﺎﻥ ,ﻋﺮﺿﻪ ﻣﺮﻭﺭﮔﺮ " ﻣﻮﺯﺍﺋﻴﻚ " ﺑﻪ ﺑﺎﺯﺍﺭ ﺑﻮﺩ.
8
ﻣﻮﺯﺍﺋﻴﻚ ) ﺗﻮﻟﺪ ﻧﺴﻞ ﺟﺪﻳﺪﻱ ﺍﺯ ﻣﺮﻭﺭﮔﺮﻫﺎ (
" ﻣﺎﺭﻙ ﺁﻧﺪﺭﺳﻮﻥ " ﺩﺭ ﺳﺎﻝ ١٩٩٣ﭘﺮﻭﮊﻩ ﺗﻮﻟﻴﺪ ﻭ ﻃﺮﺍﺣﻲ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻣﻮﺯﺍﺋﻴﻚ ﺭﺍ ﻫﺪﺍﻳﺖ ﻧﻤﻮﺩ .ﻫﺪﻑ ﺍﺯ ﻃﺮﺍﺣﻲ ﻣﻮﺯﺍﺋﻴﻚ ،ﺍﺭﺍﺋﻪ ﺭﺍﻫﻜﺎﺭﻱ ﻣﻨﺎﺳﺐ ﺑﺮﺍﻱ ﺍﻓﺮﺍﺩﻱ ﺑﻮﺩ ﻛﻪ ﺑﺮ ﺭﻭﻱ ﭘﺮﻭﮊﻩ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﻓﻌﺎﻟﻴﺖ ﺩﺍﺷﺘﻪ ﻭ ﻣﻠﺰﻡ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﻣﺸﺘﺮﻙ ﺑﻮﺩﻧﺪ.ﺩﺭ ﺍﺑﺘﺪﺍ " ﺁﻧﺪﺭﺳﻮﻥ " ﺍﺯ ﻭﺟﻮﺩ ﻭﺏ ﻫﻴﭽﮕﻮﻧﻪ ﺍﻃﻼﻋﻲ ﻧﺪﺍﺷﺖ ﻭ ﺟﻬﺖ ﺍﺭﺍﺋﻪ ﺭﺍﻩ ﺣﻞ ﻣﻨﺎﺳﺐ ،ﺗﺤﻘﻴﻘﺎﺕ ﮔﺴﺘﺮﺩﻩ ﺍﻱ ﺗﻮﺳﻂ ﻭﻱ ﺍﻧﺠﺎﻡ ﻭ ﺩﺭ ﻧﻬﺎﻳﺖ ﻭﻱ ﻭﺏ ﺭﺍ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺭﺍ ﻩ ﺣﻞ ﻣﻨﺎﺳﺐ ﻛﺸﻒ ﻧﻤﻮﺩ .ﭘﺲ ﺍﺯ ﺷﻨﺎﺧﺖ ﭘﺘﺎﻧﺴﻴﻞ ﻫﺎﻱ ﻭﺏ ﺗﻮﺳﻂ " ﺁﻧﺪﺭﺳﻮﻥ "،
ﺍﻳﺪﻩ ﻃﺮﺍﺣﻲ ﻣﻮﺯﺍﺋﻴﻚ ﺑﻌﻨﻮﺍﻥ ﻣﺮﻭﺭﮔﺮ ﻭﺏ ﺗﻮﺳﻂ ﻭﻱ ﻣﻄﺮﺡ ﮔﺮﺩﻳﺪ.ﺩﺭ ﺁﻭﺭﻳﻞ ١٩٩٣ﺍﻭﻟﻴﻦ ﻧﺴﺨﻪ ﻣﻮﺯﺍﺋﻴﻚ ) ( Ver 1.0ﺑﺮﺍﻱ ﺳﻴﺴﺘﻢ Windowsﺍﺭﺍﺋﻪ ﮔﺮﺩﻳﺪ.ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﺑﺴﺮﻋﺖ
ﺩﺭ ﺳﻄﺢ ﺟﻬﺎﻥ ﻣﻄﺮﺡ ﻭ ﺑﺎﻋﺚ ﺍﻋﺘﺒﺎﺭ ﻭ ﺷﻬﺮﺕ ﻓﺮﺍﻭﺍﻥ ﻭﺏ ﮔﺮﺩﻳﺪ .ﺑﺪﻟﻴﻞ ﺍﻋﺘﺒﺎﺭ ﻭ ﻋﻤﻮﻣﻴﺖ
ﻳﺎﻓﺘﻦ ﻣﻮﺯﺍﺋﻴﻚ) NCSA ،ﻣﺮﻛﺰ ﻣﻠﻲ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻓﻮﻕ ﻣﺤﺎﺳﺒﺎﺗﻲ( ﻧﺴﺨﻪ ﻫﺎﻱ ﻭﻳﻨﺪﻭﺯ ﻭ ﺍﭘﻞ ﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ ﺭﺍ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻧﻤﻮﺩ .ﻣﺮﻛﺰ ﻓﻮﻕ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺗﻌﺮﻳﻒ ﺧﺎﺹ ﺣﻮﺯﻩ ﻓﻌﺎﻟﻴﺖ
ﺧﻮﺩ ﻣﺠﺒﻮﺭ ﺑﻪ ﻓﺮﻭﺵ ﺍﻣﺘﻴﺎﺯ " ﻣﻮﺯﺍﺋﻴﻚ " ﺑﻪ ﭼﻨﺪﻳﻦ ﺷﺮﻛﺖ ﺍﺯ ﺟﻤﻠﻪMosaic :
Communicationﻭ Quarterdeck spryﺷﺪ.ﺩﺭ ﺳﺎﻝ " ١٩٩٤ﻣﺎﺭﻙ ﺁﻧﺪﺭﺳﻮﻥ " NCSAﺭﺍ ﺗﺮﻙ ﻭ ﺑﻪ ﻳﻚ ﺷﺮﻛﺖ ﺟﺪﻳﺪﺍﻟﺘﺎﺳﻴﺲ ﺑﻨﺎﻡ " ﻧﺖ ﺍﺳﻜﻴﭗ" )( NetScape
ﭘﻴﻮﺳﺖ .ﭘﺲ ﺍﺯ ﭘﻴﻮﺳﺘﻦ ﻭﻱ ﺑﻪ ﻧﺖ ﺍﺳﻜﻴﭗ ,ﻣﺮﻭﺭﮔﺮ ﺟﺪﻳﺪﻱ ﺗﻮﺳﻂ ﺍﻳﻦ ﺷﺮﻛﺖ ﻃﺮﺍﺣﻲ
ﻭﺑﺎ ﻧﺎﻡ Netscape Navigatorﺑﻪ ﺑﺎﺯﺍﺭ ﻋﺮﺿﻪ ﮔﺮﺩﻳﺪ .ﺍﻳﻦ ﻣﺮﻭﺭﮔﺮ ﺍﻧﻘﻼﺑﻲ ﺩﺭ ﺯﻣﻴﻨﻪ ﻣﺮﻭﺭﮔﺮﻫﺎ ﺭﺍ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩ ﻭ ﭘﺲ ﺍﺯ ﻣﺪﺕ ﺯﻣﺎﻥ ﻛﻮﺗﺎﻫﻲ ﺑﻌﻨﻮﺍﻥ ﭘﺮﻓﺮﻭﺷﺘﺮﻳﻦ ﻣﺮﻭﺭﮔﺮ ﺩﺭ ﺳﻄﺢ ﺟﻬﺎﻥ ﻣﻄﺮﺡ ﮔﺮﺩﻳﺪ. ﺭﺷﺪ ﻭ ﺗﻮﺳﻌﻪ ﻭﺏ ﻭﺏ ﺑﺎ ﻳﻚ ﺳﺮﻋﺖ ﺣﻴﺮﺕ ﺍﻧﮕﻴﺰ ﺩﺭ ﺣﺎﻝ ﺭﺷﺪ ﻭ ﺗﻮﺳﻌﻪ ﺍﺳﺖ.ﺍﻣﺮﻭﺯﻩ ﺩﺭ ﺍﻛﺜﺮ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺗﻠﻮﻳﺰﻳﻮﻧﻲ ﻭ ﭘﺨﺶ ﺁﮔﻬﻲ ﻫﺎﻱ ﺗﺠﺎﺭﻱ ﻛﻤﺘﺮﻳﻦ ﺁﮔﻬﻲ ﺭﺍ ﻣﻴﺘﻮﺍﻥ ﻣﺸﺎﻫﺪﻩ ﻧﻤﻮﺩ ﻛﻪ ﻣﺘﻘﺎﺿﻴﺎﻥ
9
ﺭﺍ ﺟﻬﺖ ﻛﺴﺐ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﺑﻪ ﻳﻚ ﻭﺏ ﺳﺎﻳﺖ ﻫﺪﺍﻳﺖ ﻧﻨﻤﺎﻳﺪ .ﻳﻚ ﻭﺏ ﺳﺎﻳﺖ,
ﺳﻴﺴﺘﻤﻲ ﺑﺮ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺖ ﻛﻪ ﺷﺎﻣﻞ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ) (Web Serverﺍﺳﺖ. ﺍﻳﻦ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ،ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺑﺮ ﺭﻭﻱ ﺳﺎﻳﺖ ﺍﺳﺖ ﻛﻪ ﺍﻣﻜﺎﻥ ﺩﺳﺘﻴﺎﺑﻲ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﺭﺍ ﺑﻪ ﻣﺴﺘﻨﺪﺍﺕ ﻣﻮﺟﻮﺩ ﻓﺮﺍﻫﻢ ﻣﻲ ﻛﻨﺪ.ﺩﺭ ﮔﺬﺷﺘﻪ ﺑﺪﻟﻴﻞ ﺗﺮﺍﻓﻴﻚ ﺑﺎﻻﻱ ﻣﺼﺎﺭﻑ ﺳﻴﺎﺳﻲ ﺍﺯ
ﺍﻳﻨﺘﺮﻧﺖ ,ﺯﻣﻴﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺩﺭ ﺑﻌﺪ ﺗﺠﺎﺭﻱ ﻭ ﺍﻗﺘﺼﺎﺩﻱ ﻓﺮﺍﻫﻢ ﻧﺒﻮﺩ.ﺩﺭ ﺳﺎﻝ ١٩٩١ﺑﺎ ﭘﻴﺪﺍﻳﺶ ﺍﻳﺪﻩ ﺗﺒﺎﺩﻝ ﺍﻗﺘﺼﺎﺩﻱ ﺍﻳﻨﺘﺮﻧﺖ (Commerical Internet Exchange) CIX ﻭﺿﻌﻴﺖ ﻓﻮﻕ ﺗﻐﻴﻴﺮ ﻛﺮﺩ CIX .ﺗﻮﺳﻂ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﮔﺎﻥ ﺳﺮﻭﻳﺴﻬﺎﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺗﺤﺖ AlterNet,CERfent,PSInetﺍﺭﺍﺋﻪ ﮔﺮﺩﻳﺪ .ﺍﻳﻦ ﺳﻴﺴﺘﻢ ﺑﺎ ﻣﻮﻓﻘﻴﺖ ﻭ ﺍﺳﺘﻘﺒﺎﻝ ﭼﺸﻤﮕﻴﺮﻱ ﻣﻮﺍﺟﻪ ﮔﺮﺩﻳﺪ.ﺍﻣﺮﻭﺯﻩ ﺍﻏﻠﺐ ﺗﻮﻟﻴﺪ ﻛﻨﻨﺪﮔﺎﻥ ﻛﺎﻻ ﺩﺭ ﺳﻄﺢ ﺟﻬﺎﻥ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﻛﺎﻻﻱ ﺧﻮﺩ ﺭﺍ ﺑﺮ ﺭﻭﻱ ﻭﺏ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﺳﺎﻳﺖ ﻫﺎﻱ ﺷﻨﺎﺧﺘﻪ ﺷﺪﻩ ﺍﻱ ﺍﺭﺍﺋﻪ
ﻣﻴﺪﻫﻨﺪ.ﻣﺘﻘﺎﺿﻴﺎﻥ ﻛﺎﻻ ﺩﺭ ﻫﺮ ﻧﻘﻄﻪ ﺍﺯ ﺟﻬﺎﻥ ﺑﺎ ﻣﺮﺍﺟﻌﻪ ﺑﻪ ﺳﺎﻳﺖ ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﻥ ﺷﺮﻛﺖ ﻭ ﻳﺎ ﺷﺮﻛﺖ ﻫﺎﻱ ﻣﺸﺎﺑﻪ ﻣﻴﺘﻮﺍﻧﻨﺪ ﺁﮔﺎﻫﺎﻧﻪ ﻧﺴﺒﺖ ﺑﻪ ﺍﻧﺘﺨﺎﺏ ﻛﺎﻻﻱ ﻣﻮﺭﺩ ﻋﻼﻗﻪ ﺧﻮﺩ ﺍﻗﺪﺍﻡ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﻭﺏ ،ﻓﺮﺁﻳﻨﺪ ﺛﺒﺖ ﺳﻔﺎﺭﺵ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ.ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﺍﺯ ﺷﺮﻛﺖ ﻫﺎ ﺩﺭ ﺳﻄﺢ ﺟﻬﺎﻥ ﺑﺎﻻﺧﺺ ﺷﺮﻛﺖ ﻫﺎﻱ ﻛﺎﻣﭙﻴﻮﺗﺮﻱ ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﻓﻨﻲ ﻭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﻣﺸﺘﺮﻳﺎﻥ ﺍﺯ
ﻃﺮﻳﻖ ﻭﺏ ﺍﻧﺠﺎﻡ ﻣﻴﺪﻫﻨﺪ .ﻣﺜﻼ" ﺑﺎ ﻣﺮﺍﺟﻌﻪ ﺑﻪ ﺳﺎﻳﺖ ﻣﺎﻛﺮﻭﺳﺎﻓﺖ ﻋﻼﻭﻩ ﺑﺮ ﺍﻣﻜﺎﻥ ﺧﺮﻳﺪ ﻣﺤﺼﻮﻝ ﻣﻮﺭﺩ ﻧﻈﺮﺧﻮﺩ ،ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺩﺭ ﺯﻣﻴﻨﻪ ﺑﻜﺎﺭﮔﻴﺮﻱ ﻳﻜﻲ ﺍﺯ ﻣﺤﺼﻮﻻﺕ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ
ﺁﻥ ﺷﺮﻛﺖ ﺩﺍﺭﺍﻱ ﺳﻮﺍﻻﺕ ﻭ ﺍﺑﻬﺎﻣﺎﺗﻲ ﺑﺎﺷﻴﻢ ,ﺑﺎ ﺍﺳﺘﻘﺮﺍﺭ ﺩﺭ ﺑﺨﺶ ﻓﻨﻲ ﻭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻣﻴﺘﻮﺍﻥ
ﭘﺎﺳﺦ ﻭ ﺭﻫﻨﻤﻮﺩﻫﺎﻱ ﻻﺯﻡ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻛﺮﺩ.ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﺍﺯ ﺷﺮﻛﺖ ﻫﺎ ﺑﺎﻻﺧﺺ ﺷﺮﻛﺖ ﻫﺎﻱ ﺍﻧﺘﺸﺎﺭﺍﺗﻲ ﻭ ﭼﺎﭖ ﻣﺠﻼﺕ ،ﺭﻭﺯﻧﺎﻣﻪ ﻫﺎ ،ﺍﻃﻼﻋﺎﺕ ﺧﻮﺩ ﺭﺍ )ﺭﻭﺯﻧﺎﻣﻪ ﻫﺎ ﻭ ﻣﺠﻼﺕ( ﺑﺮ ﺭﻭﻱ ﺷﺒﻜﻪ ﻗﺮﺍﺭﺩﺍﺩﻩ ﻭ ﺯﻣﻴﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻭ ﻳﺎ ﺧﺮﻳﺪ ﺭﺍ ﺑﺮﺍﻱ ﻣﺘﻘﺎﺿﻴﺎﻥ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺗﻤﺎﻣﻲ
ﻣﺘﻘﺎﺿﻴﺎﻥ ﺟﻬﺖ ﺧﺮﻳﺪ ﮐﺎﻻﻱ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺧﻮﺩ ﺍﺯ ﻃﺮﻳﻖ ﻭﺏ ,ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺍﺭﺍﻱ ﻳﻜﻲ ﺍﺯ ﺍﻧﻮﺍﻉ ﻣﺘﺪﺍﻭﻝ ﻛﺎﺭﺗﻬﺎﻱ ﺍﻋﺘﺒﺎﺭﻱ ﻧﻈﻴﺮ Credit Card :ﻭ ﻳﺎ MasterCardﺑﺎﺷﻨﺪ.
10
ﭘﺲ ﺍﺯ ﺍﻧﺘﺨﺎﺏ ﻛﺎﻻ ﺍﺯ ﻃﺮﻳﻖ ﻣﺘﻘﺎﺿﻲ ﻭ ﺗﻌﻴﻴﻦ ﻧﺤﻮﻩ ﭘﺮﺩﺍﺧﺖ ﺷﻤﺎﺭﻩ ﻣﺮﺑﻮﻁ ﺑﻪ ﻛﺎﺭﺕ
ﺍﻋﺘﺒﺎﺭﻱ
ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﺳﻴﺴﺘﻢ ﺩﺍﺩﻩ ﺷﻮﺩ .ﺛﺒﺖ ﻭ ﺩﺭﺝ ﺷﻤﺎﺭﻩ ﻛﺎﺭﺗﻬﺎﻱ ﺍﻋﺘﺒﺎﺭﻱ ﻳﻜﻲ ﺍﺯ
ﻣﺴﺎﺋﻞ ﻣﻬﻢ ﺩﺭ ﺯﻣﻴﻨﻪ ﺍﻣﻨﻴﺖ ﺩﺭ ﺗﺠﺎﺭﺕ ﺑﺮ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺖ .ﻫﺮ ﻓﺮﺩ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻛﻪ ﺍﺯ ﺷﻤﺎﺭﻩ ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﻭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻏﻴﺮ ﻗﺎﻧﻮﻧﻲ ﺑﻌﻤﻞ ﻧﻤﻲ ﺁﻳﺪ.
ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﻭﺏ ﻣﺠﻬﺰ ﺑﻪ ﻳﻚ ﺳﻴﺴﺘﻢ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﻄﻤﺌﻦ ﺟﻬﺖ ﻛﺎﺭﺕ ﻫﺎﻱ ﺍﻋﺘﺒﺎﺭﻱ ﺍﺳﺖ. ﺍﺻﻮﻝ ﻭ ﺗﻌﺎﺭﻳﻒ ﺍﻭﻟﻴﻪ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻭﺏ
ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﻭﺏ ﺩﺭ ﺣﺮﻳﻢ ﻫﺎﻱ ﺍﻃﻼﻋــــــﺎﺗﻲ ﺑﺎ ﻧﺎﻡ " ﺻﻔﺤﺎﺕ ﻭﺏ "
ﺫﺧﻴـــﺮﻩ ﻣﻲ ﮔﺮﺩﻧﻨﺪ .ﺍﻧﺪﺍﺯﻩ ﻭﻧﻮﻉ ﻣﺤﺘﻮﻳﺎﺕ ﺍﻳﻦ ﻧﻮﻉ ﺻﻔﺤﺎﺕ ﮐﺎﻣﻼ" ﻣﺘﻐﻴﺮ ﺑﻮﺩﻩ ﻭ
ﻧﻤﻲ ﺑﺎﻳﺴﺖ ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﻳﮏ ﺻﻔﺤﻪ ﻭﺏ ﺭﺍ ﺑﺎ ﻳﮏ ﺻﻔﺤﻪ ﮐﺘﺎﺏ ﻣﻘﺎﻳﺴﻪ ﮐﺮﺩ ﮔﺮﭼﻪ ﺷﺒﺎﻫﺖ ﻫﺎﻱ ﺍﻧﺪﮐﻲ ﻧﻴﺰ ﺑﻴﻦ ﺁﻧﻬﺎ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ. ﻣﺤﺘﻮﻳﺎﺕ ﻳﮏ ﺻﻔﺤﻪ ﻭﺏ ﻣﻲ ﺗﻮﺍﻧﺪ :ﻣﺘﻦ ﺭﺍﻓﻴﮏ ﺻﺪﺍ ﺗﺼﻮﻳﺮ ﺍﻧﻴﻤﻴﺸﻦ ﻭ ...ﺑﺎﺷﺪ.
ﮔﺴﺘﺮﺩﮔﻲ ﻭ ﺗﻨﻮﻉ ﻧﻮﻉ ﺍﻃﻼﻋﺎﺗﻲ ﮐﻪ ﻣﻲ ﺗﻮﺍﻥ ﺩﺭ ﺻﻔﺤﺎﺕ ﻭﺏ ﻗﺮﺍﺭ ﺩﺍﺩ ﻳﮑﻲ ﺍﺯ
ﻣﻬﻤﺘﺮﻳﻦ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﻗﺎﺑﻞ ﺗﻮﺟﻪ ﻭﺏ ﺍﺯ ﺩﻳﺪﮔﺎﻩ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﮔﺎﻥ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﻳﮑﻄﺮﻑ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻨﺪﮔﺎﻥ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﻃﺮﻑ ﺩﻳﮕﺮ ﻣﻲ ﺑﺎﺷﺪ. ﺻﻔﺤﺎﺕ ﻭﺏ ﺍﺯ ﻟﺤﺎﻅ ﻓﻴﺰﻳﮑﻲ ﻓﺎﻳﻞ ﻫﺎﻱ ﻫﺴﺘﻨﺪ ﮐﻪ ﺗﻮﺳﻂ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﻭ ﺩﺍﺭﺍﻱ ﺍﻧﺸﻌﺎﺏ " "htmﻭ ﻳﺎ " ""htmlﻣﻲ ﺑﺎﺷﻨﺪ .ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺍﻳﻦ ﻧﻮﻉ ﺻﻔﺤﺎﺕ
ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺗﻤﺎﻡ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﺋﻲ ﮐﻪ ﺑﻨﻮﻋﻲ ﻗﺎﺩﺭ ﺑﻪ ﺍﻳﺠﺎﺩ ﻭ ﺫﺧﻴﺮﻩ ﺳﺎﺯﻱ ﻳﮏ ﻓﺎﻳﻞ ﻫﺴﺘﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ Notepad ).ﻧﻤﻮﻧﻪ ﺍﻱ ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎ ﺍﺳﺖ( .ﺍﻣﺮﻭﺯﻩ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﮐﺎﻣﻼ" ﺣﺮﻓﻪ ﺍﻱ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻭ ﻣﺪﻳﺮﻳﺖ ﺻﻔﺤﺎﺕ ﻭﺏ ﺗﻮﺳﻂ ﺷﺮﮐﺖ ﻫﺎﻱ
11
ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ ...,FrontPage,Hotmetal .ﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻣﻲ ﺑﺎﺷﻨﺪ.ﭘﺲ ﺍﺯ ﺍﻳﺠﺎﺩ ﺻﻔﺤﺎﺕ ﻭﺏ ﺩﺭ ﺻﻮﺭﺕ ﻧﻴﺎﺯ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﻋﻤﻮﻡ )ﺩﺍﺧﻠﻲ ، ﺧﺎﺭﺟﻲ( ﻣﻲ ﺑﺎﻳﺴﺖ ﺁﻧﻬﺎ ﺭﺍ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺳﺎﻳﺖ ﺫﺧﻴﺮﻩ ﻧﻤﻮﺩ .ﻳﮏ ﻭﺏ ﺳﺎﻳﺖ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺻﻔﺤﺎﺕ ﻭﺏ ﺭﺍ ﺷﺎﻣﻞ ﻣﻲ ﮔﺮﺩﺩ.
ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﮔﺎﻥ ﺍﻃﻼﻋﺎﺕ ﭘﺲ ﺍﺯ ﺁﻣﺎﺩﻩ ﺳﺎﺯﻱ ﺻﻔﺤﺎﺕ ﻭﺏ ﻭ ﺍﺳﺘﻘﺮﺍﺭ ﺁﻧﻬﺎ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﻭﺏ ﺳﺎﻳﺖ ﺯﻣﻴﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﻓﻮﻕ ﺭﺍ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻨﺪﮔﺎﻥ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﻨﺪ. ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻨﺪﮔﺎﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﺋﻲ ﻣﻮﺳﻮﻡ ﺑﻪ " ﻣﺮﻭﺭﮔﺮ" ﻗﺎﺩﺭ ﺑﻪ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻳﮏ ﻭﺏ ﺳﺎﻳﺖ ﻭ ﺩﺭﺧﻮﺍﺳﺖ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺧﻮﺩ ﻣﻲ ﺑﺎﺷﻨﺪ. ﺗﻤﺎﻡ ﺻﻔﺤﺎﺕ ﻭﺏ ﺩﺍﺭﺍﻱ ﻣﺠﻤﻮﻋﻪ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎﺋﻲ ﻫﺴﺘﻨﺪ ﮐﻪ ﻧﺤﻮﻩ ﻧﻤﺎﻳﺶ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﻣﺸﺨﺺ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺭﺍﻳﺞ ﺗﺮﻳﻦ ﻣﺠﻤﻮﻋﻪ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎﻱ ﻧﻤﺎﻳﺶ ﺩﺭ ﺻﻔﺤﺎﺕ ﻭﺏ ﺗﮓ ﻫﺎﻱ Htmlﻣﻲ ﺑﺎﺷﻨﺪ. ﻫﻤﺎﻧﻄﻮﺭ ﮐﻪ ﺍﺷﺎﺭﻩ ﮔﺮﺩﻳﺪ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻣﺠﻤﻮﻋﻪ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎﻱ ﻧﻤﺎﻳﺶ ﺩﺭ ﺻﻔﺤﺎﺕ ﻭﺏ ﺍﺯ ﺷﺒﻪ ﺯﺑﺎﻥ Htmlﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.ﺷﺒﻪ ﺯﺑﺎﻥ ﻓﻮﻕ ،ﺭﺍ ﻧﻤﻲ ﺗﻮﺍﻥ ﺑﻌﻨﻮﺍﻥ ﻳﮏ ﺯﺑﺎﻥ ﺑﺮﻧﺎﻣﻪ
ﻧﻮﻳﺴﻲ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺖ ﭼﺮﺍﮐﻪ ﻋﻤﻼ" ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎﻱ ﭘﺮﺩﺍﺯﺵ ﺭﺍ ﺷﺎﻣﻞ ﻧﺸﺪﻩ ﻭ ﺻﺮﻓﺎ" ﺩﺭ ﺣﺪ ﺗﻮﺻﻴﻒ ﻧﺤﻮﻩ ﻧﻤﺎﻳﺶ ﻣﺤﺘﻮﻳﺎﺕ ﺍﺳﺖ Html .ﺩﺍﺭﺍﻱ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﮐﺪﻫﺎﻱ ﺗﻮﺻﻴﻔﻲ ﺑﺮﺍﻱ ﻧﻤﺎﻳﺶ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻣﺮﻭﺭﮔﺮﻫﺎ ﺍﺳﺖ .ﺍﻳﻦ ﺯﺑﺎﻥ ﺩﺍﺭﺍﻱ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺗﮓ ﻫﺎ ﺍﺳﺖ ﮐﻪ ﻫﺮ ﻳﮏ ﺩﺍﺭﺍﻱ ﻣﻌﺎﻧﻲ ﻭ ﻋﻤﻠﮑﺮﺩ ﺍﺯ ﻗﺒﻞ ﻣﺸﺨﺺ ﺷﺪﻩ ﻫﺴﺘﻨﺪ .ﻣﺜﻼ" ﺗﮓ
:ﺑﺮﺍﻱ ﭘﺮﺭﻧﮓ ﻧﻤﻮﺩﻥ ﻣﺘﻦ ﻣﻮﺭﺩ ﻧﻈﺮ ﻭ ﻳﺎ ﺗﮓ >
" "Htmlﻭ ﻳﺎ " "Htmﺑﺎﺷﻨﺪ .ﺩﺭ ﺣﻘﻴﻘﺖ ﺗﮓ ﻫﺎﻱ Htmlﺳﻴﺎﺳﺖ ﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﻧﺤﻮﻩ ﻧﻤﺎﻳﺶ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﺭﺍ ﻣﺸﺨﺺ ﻭ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﭘﺲ ﺍﺯ ﺗﻔﺴﻴﺮ
12
ﺗﮓ ﻫﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﻭﺍﮐﻨﺶ ﻫﺎﻱ ﺍﺯ ﻗﺒﻞ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺭﺍ ﺍﺯ ﺧﻮﺩ ﻧﺸﺎﻥ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ. ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﻲ ﺗﻮﺍﻥ Htmlﺭﺍ ﺑﻌﻨﻮﺍﻥ ﺯﺑﺎﻧﻲ ﺑﺮﺍﻱ ﺗﺒﻴﻦ ﻧﺤﻮﻩ ﻧﻤﺎﻳﺶ ﺍﻃﻼﻋﺎﺕ ﺗﻌﺮﻳﻒ ﮐﺮﺩ. ﻣﺜﺎﻝ :ﻳﮏ ﻧﻤﻮﻧﻪ ﻓﺎﻳﻞ HTML >
ﻋﻨﻮﺍﻥ
ﺻﻔﺤﻪ>
>
<
......
>
htmlﺩﺍﺭﺍﻱ ﻧﺴﺨﻪ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺍﺯ ﺑﺪﻭ ﭘﻴﺪﺍﻳﺶ ﺗﺎﮐﻨﻮﻥ ﺑﻮﺩﻩ ﺍﺳﺖ .ﺩﺭ ﺯﻣﺎﻥ ﺍﻳﺠﺎﺩ
ﻳﮏ ﺻﻔﺤﻪ ﻭﺏ ﻣﻲ ﺑﺎﻳﺴﺖ ،ﻧﻮﻉ ﻧﺴﺨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ Htmlﺭﺍ ﻣﺸﺨﺺ ﻧﻤﻮﺩ .ﺍﻳﻦ ﻋﻤﻠﻴﺎﺕ ﺗﻮﺳﻂ DOCTYPEﺍﻧﺠﺎﻡ ﻣﻲ ﮔﻴﺮﺩ .ﻫﺮ ﻳﮏ ﺍﺯ ﻧﺴﺨﻪ ﻫﺎﻱ ﻓﻮﻕ ﺩﺍﺭﺍﻱ
ﻣﺠﻤﻮﻋﻪ ﺗﮓ ﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺍﻧﻮﺍﻉ ﺍﻳﻦ ﻧﺴﺨﻪ ﻫﺎ ﻭ ﻧﺤﻮﻩ ﺗﻌﺮﻳﻒ ﮐﺮﺩﻥ ﻭ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﻧﻮﻉ ﻧﺴﺨﻪ ﺩﺭ ﺻﻔﺤﺎﺕ ﻭﺏ ﺍﺷﺎﺭﻩ ﻣﻲ ﮔﺮﺩﺩ. HTML 2.0ﻧﺴﺨﻪ ﻓﻮﻕ ﺑﻌﻨﻮﺍﻥ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺍﻭﻟﻴﻪ ) (RFC 1866ﻣﻌﺮﻓﻲ ﮔﺮﺩﻳﺪ. "Strict//EN >"
Html 4.0ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻣﻌﺮﻓﻲ ﺷﺪﻩ ﺗﻮﺳﻂ ﮐﻨﺴﺮﺳﻴﻮﻡ ﻭﺏ ﮐﻪ ﺩﺍﺭﺍﻱ ﺳﻪ ﮔﺮﺍﻳﺶ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ:
13
. Strict HTML 4.0ﺍﻳﻦ ﻧﺴﺨﻪ ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺮﻳﻢ ﻭ ﺍﻏﻠﺐ ﻭﻳﮋﮔﻲ ﻫﺎﺋﻲ ﻧﻈﻴﺮ" ﺗﺮﺍﺯ ﺑﻨﺪﻱ " ﺭﺍ ﺷﺎﻣﻞ ﻧﻤﻲ ﺷﻮﺩ. "
HTML 4.0
""http://www.w3.org/TR/REC-html40/loose.dtd
. HTML 4.0 Framesetﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺮﻳﻢ ﺭﺍ ﺩﺍﺭﺍ ﺍﺳﺖ.""http://www.w3.org/TR/REC-html40/frameset.dtd ﻣﺤﺪﻭﺩﻳﺖ ﻫﺎﻱ Html ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﻭﺏ ﺩﺭ ﺣﺮﻳﻢ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺎ ﻧﺎﻡ "ﺻﻔﺤﺎﺕ ﻭﺏ" ﺫﺧﻴﺮﻩ ﻣﻲ ﮔﺮﺩﻧﻨﺪ.
ﺍﻧﺪﺍﺯﻩ ﻭﻧﻮﻉ ﻣﺤﺘﻮﻳﺎﺕ ﺍﻳﻦ ﻧﻮﻉ ﺻﻔﺤﺎﺕ ﮐﺎﻣﻼ" ﻣﺘﻐﻴﺮ ﺑﻮﺩﻩ ﻭ ﻧﻤﻲ ﺑﺎﻳﺴﺖ ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﻳﮏ ﺻﻔﺤﻪ ﻭﺏ ﺭﺍ ﺑﺎ ﻳﮏ ﺻﻔﺤﻪ ﮐﺘﺎﺏ ﻣﻘﺎﻳﺴﻪ ﮐﺮﺩ ﮔﺮﭼﻪ ﺷﺒﺎﻫﺖ ﻫﺎﻱ ﺍﻧﺪﮐﻲ ﻧﻴﺰ ﺑﻴﻦ ﺁﻧﻬﺎ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ.
14
ﺻﻔﺤﺎﺕ ﻭﺏ ﺍﻳﺴﺘﺎ ،ﺍﻣﺮﻭﺯﻩ ﺑﺮ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﻭﺏ ،ﺑﺎ ﺳﺎﻳﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﮐﻪ ﺷﺎﻣﻞ
ﺗﻌﺪﺍﺩ ﺑﻴﺸﻤﺎﺭﻱ ﺍﺯ ﺻﻔﺤﺎﺕ ﻭﺏ ﺍﻳﺴﺘﺎ ﻣﻲ ﺑﺎﺷﻨﺪ ،ﺑﺮﺧﻮﺭﺩ ﻣﻲ ﻧﻤﺎﺋﻴﻢ .ﻭﺍﮊﻩ " ﺍﻳﺴﺘﺎ " ،ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻳﻚ ﺻﻔﺤﻪ ﻭﺏ ﺩﺍﺭﺍﻱ ﭼﻪ ﺗﻌﺮﻳﻔﻲ ﺍﺳﺖ؟ ﺍﻳﻦ ﻧﻮﻉ ﺻﻔﺤﺎﺕ ،ﺻﻔﺤﺎﺗﻲ ﻫﺴﺘﻨﺪ
ﻛﻪ ﺷﺎﻣﻞ ﻛﺪﻫﺎﻱ Htmlﺑﻮﺩﻩ ﻭ ﺩﺭ ﻳﻚ ﻣﺤﻴﻂ ﺍﺩﻳﺘﻮﺭ ﺗﺎﻳﭗ ﻭ ﺑﺎ ﺍﻧﺸﻌﺎﺏ Htmﻭ ﻳﺎ
Htmlﺫﺧﻴﺮﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻣﻮﻟﻒ ﺻﻔﺤﻪ ﻭﺏ ﻗﺒﻞ ﺍﺯ ﺍﻳﻨﻜﻪ ﻫﺮ ﻧﻮﻉ ﺩﺭﺧﻮﺍﺳﺘﻲ ﺑﺮﺍﻱ ﺁﻥ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ،ﺑﻄﻮﺭ ﻛﺎﻣﻞ ﻣﺤﺘﻮﻱ ﺻﻔﺤﻪ ﺭﺍ ﻣﺸﺨﺺ ﻛﺮﺩﻩ ﺍﺳﺖ .ﻣﺤﺘﻮﻳﺎﺕ ﺍﻳﻦ ﻧﻮﻉ
ﺍﺯ ﺻﻔﺤﺎﺕ )ﻣﺘﻦ ،ﺗﺼﻮﻳﺮ ،ﻟﻴﻨﻚ ﻫﺎ ﻭ…( ﻭ ﺷﻜﻞ ﻇﺎﻫﺮﻱ ﺁﻧﻬﺎ ﻫﻤﻮﺍﺭﻩ ﻳﻜﺴﺎﻥ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ،ﺻﺮﻓﻨﻈﺮ ﺍﺯ ﺍﻳﻨﻜﻪ ﭼﻪ ﻛﺴﻲ ،ﺩﺭ ﭼﻪ ﺯﻣﺎﻧﻲ ﻭ ﻳﺎ ﭼﮕﻮﻧﻪ ﺻﻔﺤﻪ ﺭﺍ ﻣﺸﺎﻫﺪﻩ ﺧﻮﺍﻫﺪ ﻛﺮﺩ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﻲ ﺗﻮﺍﻥ ﮔﻔﺖ ،ﻣﺤﺘﻮﻳﺎﺕ ﺍﻳﻦ ﻗﺒﻴﻞ ﺍﺯ ﺻﻔﺤﺎﺕ ﻗﺒﻞ ﺍﺯ ﺍﻳﻨﻜﻪ ﺩﺭﺧﻮﺍﺳﺘﻲ
ﺍﻳﺠﺎﺩ ﮔﺮﺩﺩ ،ﺗﻮﺳﻂ ﻣﺪﻳﺮﻳﺖ ﺳﺎﻳﺖ ﺍﻳﺠﺎﺩ ﻭ ﻣﺸﺨﺺ ﺷﺪﻩ ﺍﻧﺪ.
ﻣﺮﺍﺣﻞ ﺁﻣﺎﺩﻩ ﺳﺎﺯﻱ ﺻﻔﺤﺎﺕ ﻭﺏ ﺍﻳﺴﺘﺎ – ١ﻳﻚ ﻣﻮﻟﻒ ﺻﻔﺤﻪ ﺍﻱ ﺭﺍ ﻛﻪ ﺷﺎﻣﻞ ﻛﺪﻫﺎﻱ Htmlﺍﺳﺖ ﺭﺍ ﺍﻳﺠﺎﺩ ﻭ ﺁﻥ ﺭﺍ ﺑﺎ ﺍﻧﺸﻌﺎﺏ Htmﻭ ﻳﺎ Htmlﺑﺮ ﺭﻭﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﺫﺧﻴﺮﻩ ﻣﻲ ﻧﻤﺎﻳﺪ. 15
– ٢ﮐﺎﺭﺑﺮﻱ ﺍﺯ ﻃﺮﻳﻖ ﺑﺮﻧﺎﻣﻪ ﻣﺮﻭﺭﮔﺮ ﺧﻮﺩ ،ﺩﺭ ﺧﻮﺍﺳﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺻﻔﺤﻪ ﺭﺍ ﻣﻲ ﻧﻤﺎﻳﺪ، ﺩﺭﺧﻮﺍﺳﺖ ﻓﻮﻕ ﺍﺯ ﻣﺮﻭﺭﮔﺮ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ. – ٣ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ،ﻓﺎﻳﻞ ﺩﺭﺧﻮﺍﺳﺘﻲ ﺑﺎ ﺍﻧﺸﻌﺎﺏ Htmﻭ ﻳﺎ Htmlﺭﺍ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ ﻛﺮﺩ. – ٤ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ،ﻛﺪﻫﺎﻱ Htmlﻓﺎﻳﻞ ﻣﺰﺑﻮﺭ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﻜﻪ ﺑﺮﺍﻱ ﻣﺮﻭﺭﮔﺮ ﺍﺭﺳﺎﻝ ﻣﻴﺪﺍﺭﺩ. – ٥ﻣﺮﻭﺭﮔﺮ ﻛﺪﻫﺎﻱ Htmlﺭﺍ ﭘﺮﺩﺍﺯﺵ ﻭ ﺻﻔﺤﻪ ﻓﻮﻕ ﺭﺍ ﻧﻤﺎﻳﺶ ﺧﻮﺍﻫﺪ ﺩﺍﺩ. ﻣﺤﺪﻭﺩﻳﺖ ﻫﺎﻱ ﺻﻔﺤﺎﺕ ﻭﺏ ﺍﻳﺴﺘﺎ ﻓﺮﺽ ﻛﻨﻴﺪ ﻣﻲ ﺧﻮﺍﻫﻴﻢ ﻳﻚ ﺻﻔﺤﻪ ﻭﺏ ﺭﺍ ﺑﮕﻮﻧﻪ ﺍﻱ ﻃﺮﺍﺣﻲ ﻧﻤﺎﺋﻴﻢ ،ﻛﻪ ﺑﻤﺤﺾ ﻭﺭﻭﺩ ﻫﺮ ﻛﺎﺭﺑﺮ ﺯﻣﺎﻥ ﺟﺎﺭﻱ ﺳﻴﺴﺘﻢ ﺑﻬﺮﺍﻩ ﻳﻚ ﭘﻴﺎﻡ ﻣﻨﺎﺳﺐ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﺷﻮﺩ ..ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺑﺎ ﭼﻨﺪﻳﻦ ﻣﺤﺪﻭﺩﻳﺖ ﻣﻮﺍﺟﻪ ﺧﻮﺍﻫﻴﻢ ﺑﻮﺩ ﻛﻪ ﺑﻜﻤﻚ ﺗﮓ ﻫﺎﻱ Htmlﻗﺎﺩﺭ ﺑﻪ ﺑﺮﻃﺮﻑ ﻛﺮﺩﻥ
ﺁﻧﻬﺎ ﻧﺨﻮﺍﻫﻴﻢ ﺑﻮﺩ .ﻣﺎ ﻣﻴﺪﺍﻧﻴﻢ ﻛﻪ ﻳﻚ ﻛﺎﺭﺑﺮ ﺩﺭ ﻳﻚ ﺯﻣﺎﻥ ﺧﺎﺹ ﺑﻪ ﻣﻼﻗﺎﺕ ﺻﻔﺤﻪ ﺧﻮﺍﻫﺪ ﺁﻣﺪ ﻭﻟﻲ ﻗﻄﻌﺎ؛ ﺯﻣﺎﻥ ﺁﻥ ﺭﺍ ﻧﻤﻲ ﺩﺍﻧﻴﻢ .ﺍﮔﺮ ﺑﺨﻮﺍﻫﻴﻢ ﺯﻣﺎﻥ ﺭﺍ ﺑﺼﻮﺭﺕ ﻛﺪ ﺩﺭ ﺻﻔﺤﻪ Html ﺧﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ ،ﻧﺘﻴﺠﻪ ﻫﻤﻮﺍﺭﻩ ﻳﻜﺴﺎﻥ ﺑﻮﺩﻩ ﻭ ﻫﻤﻴﺸﻪ ﻳﻚ ﺯﻣﺎﻥ ﺛﺎﺑﺖ ﻭ ﻳﻜﺴﺎﻥ ﺑﺮﺍﻱ
ﺗﻤﺎﻣﻲ ﻣﻼﻗﺎﺕ ﻛﻨﻨﺪﮔﺎﻥ ﺻﻔﺤﻪ ،ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺗﮓ ﻫﺎﻱ Htmlﺍﻣﻜﺎﻧﺎﺗﻲ ﺑﻤﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﺻﻔﺤﺎﺕ ﻭﺏ ﺳﻔﺎﺭﺷﻲ ﻭ ﺑﺮ ﺍﺳﺎﺱ ﺷﺮﺍﻳﻂ ﺧﺎﺹ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻗﺮﺍﺭ ﻧﻤﻲ ﺩﻫﺪ .ﺻﻔﺤﺎﺕ ﻭﺏ ﺍﻳﺴﺘﺎ ﻫﻤﻮﺍﺭﻩ ﺑﺼﻮﺭﺕ ﻣﺸﺎﺑﻪ ﻭ ﻳﮑﺴﺎﻥ ﺑﺮﺍﻱ ﺗﻤﺎﻣﻲ ﮐﺎﺭﺑﺮﺍﻥ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﺧﻮﺍﻫﻨﺪ ﺷﺪ ) .ﻧﻈﻴﺮ ﺭﺳﺘﻮﺭﺍﻧﻲ ﻛﻪ ﻫﻤﻮﺍﺭﻩ ﻭ ﺻﺮﻓﻨﻈﺮ ﺍﺯ ﺫﺍﺋﻘﻪ ﻣﺸﺘﺮﻳﺎﻥ ﺧﻮﺩ، ﻳﻚ ﻏﺬﺍﻱ ﺛﺎﺑﺖ ﻭ ﺍﺯ ﻗﺒﻞ ﺁﻣﺎﺩﻩ ﺷﺪﻩ ﺭﺍ ﺑﺮﺍﻱ ﻫﻤﻪ ﺁﻣﺎﺩﻩ ﻭ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻗﺮﺍﺭ ﻣﻲ ﺩﻫﺪ!( Htmlﺩﺍﺭﺍﻱ ﻫﻴﭽﮕﻮﻧﻪ ﺍﻣﻨﻴﺘﻲ ﻧﻴﺰ ﻧﺒﻮﺩﻩ ﻭ ﻛﺪﻫﺎﻱ ﺁﻥ ﺭﺍ ﻫﻤﻪ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﻣﺸﺎﻫﺪﻩ ﻭ ﺣﺘﻲ 16
ﺗﻜﺜﻴﺮ ﮔﺮﺩﺩ .ﺷﺎﻳﺪ ﺗﻨﻬﺎ ﻣﺰﻳﺖ ﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺻﻔﺤﺎﺕ ﻃﺮﺍﺣﻲ ﺁﺳﺎﻥ ﻭ ﺑﮑﺎﺭﮔﻴﺮﻱ ﺳﺮﻳﻊ ﺁﻧﺎﻥ ﺩﺭ ﻳﻚ ﺷﺒﻜﻪ ﺑﺎﺷﺪ .ﺍﻳﻦ ﻧﻮﻉ ﺻﻔﺤﺎﺕ ﺩﺍﺭﺍﻱ ﺍﻣﻜﺎﻧﺎﺕ ﻻﺯﻡ ﺑﻤﻨﻈﻮﺭ ﺁﻓﺮﻳﻨﺶ ﺻﻔﺤﺎﺕ ﭘﻮﻳﺎ
ﻧﻴﺴﺘﻨﺪ ،ﭼﻮﻥ ﻧﻤﻲ ﺗﻮﺍﻥ ﻛﺪﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﺭﺍ ﺑﻌﺪ ﺍﺯ ﺩﺭﺧﻮﺍﺳﺖ ﻳﻚ ﺻﻔﺤﻪ ﺑﻪ ﺁﻥ ﺍﺿﺎﻓﻪ ﮐﺮﺩ .ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺪﻧﺒﺎﻝ ﺭﻭﺷﻲ ﻭ ﻳﺎ ﺭﻭﺵ ﻫﺎﺋﻲ ﺑﻮﺩ ﮐﻪ ﺑﮑﻤﮏ ﺁﻧﻬﺎ ﺑﺘﻮﺍﻥ ﺻﻔﺤﺎﺕ ﻭﺏ ﭘﻮﻳﺎ ﺭﺍ ﺍﻳﺠﺎﺩ ﮐﺮﺩ .ﺑﻤﻨﻈﻮﺭ ﻧﻴﻞ ﺑﻪ ﻫﺪﻑ ﻓﻮﻕ ﺍﺯ ﺩﻭ ﺭﻭﺵ ﻋﻤﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ: . page Client - side dynamicﺑﻬﺮﻩ ﮔﻴﺮﻱ ﺍﺯ ﺗﻜﻨﻮﻟﻮﮊﻳﻬﺎﺋﻲ ﻛﻪ ﭘﻮﻳﺎﺋﻲ ﻳﻚ ﺻﻔﺤﻪ ﺭﺍ ﺍﺯ ﺟﺎﻳﮕﺎﻩ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺗﺤﻘﻖ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ. . page side dynamic - Serverﺑﻬﺮﻩ ﮔﻴﺮﻱ ﺍﺯ ﺗﻜﻨﻮﻟﻮﮊﻳﻬﺎﺋﻲ ﻛﻪ ﭘﻮﻳﺎﺋﻲ ﻳﻚ ﺻﻔﺤﻪ ﺭﺍ ﺍﺯ ﺟﺎﻳﮕﺎﻩ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺗﺤﻘﻖ ﻧﻤﺎﻳﻨﺪ. ﻗﺒﻞ ﺍﺯ ﭘﺮﺩﺍﺧﺘﻦ ﺑﻪ ﻫﺮ ﻳﻚ ﺍﺯ ﻣﻮﺍﺭﺩ ﻓﻮﻕ ،ﻻﺯﻡ ﺍﺳﺖ ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﺎ ﻣﻔﻬﻮﻡ ﻭ ﺟﺎﻳﮕﺎﻩ ﻳﻚ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﺑﻴﺸﺘﺮ ﺁﺷﻨﺎ ﺷﻮﻳﻢ .ﻳﻚ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ،ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺍﺳﺖ ﻛﻪ ﻣﺪﻳﺮﻳﺖ ﺻﻔﺤﺎﺕ ﻭﺏ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﮔﺮﻓﺘﻪ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ﻣﺠﻬﺰ ﺑﻪ
ﻣﺮﻭﺭﮔﺮﻫﺎ ،ﻗﺎﺑﻞ ﺩﺳﺘﻴﺎﺑﻲ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺗﺎﻛﻨﻮﻥ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻫﺎﻱ ﻭﺏ ﻣﺘﻌﺪﺩﻱ ﻃﺮﺍﺣﻲ ﻭ ﺑﻪ ﺑﺎﺯﺍﺭ ﻋﺮﺿﻪ ﺷﺪﻩ ﺍﺳﺖ … IIS ، Apache .ﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎ ﻫﺴﺘﻨﺪ IIS .ﻣﺤﺼﻮﻝ ﺷﺮﮐﺖ ﻣﺎﻳﮑﺮﻭﺳﺎﻓﺖ ﺑﻮﺩﻩ ﻭ ﻣﻲ ﺗﻮﺍﻥ ﺩﺭ ﺯﻣﺎﻥ ﻧﺼﺐ ﻭﻳﻨﺪﻭﺯ ) ٢٠٠٠ﻭ ﻳﺎ (XPﺁﻥ ﺭﺍ ﻧﻴﺰ ﻧﺼﺐ ﻧﻤﻮﺩ.ﻧﺴﺨﻪ ٥ﺑﻬﻤﺮﺍﻩ ﻭﻳﻨﺪﻭﺯ ٢٠٠٠ﻭ ﻧﺴﺨﻪ ٥,١
ﺑﻬﻤﺮﺍﻩ XPﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ .ﺑﻬﺮﺣﺎﻝ ﺟﺎﻳﮕﺎﻩ ﻳﻚ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﺩﺭ ﺍﺭﺍﺋﻪ ﺍﻣﻜﺎﻧﺎﺕ ﻭ ﺯﻳﺮﺳﺎﺧﺖ ﻫﺎﻱ ﻣﻨﺎﺳﺐ ﺑﺮﺍﻱ ﻃﺮﺍﺣﻲ ﺻﻔﺤﺎﺕ ﻭﺏ ﭘﻮﻳﺎ ﻭ ﺑﺎﻟﻄﺒﻊ ﺳﺎﻳﺖ ﻫﺎﻱ ﭘﻮﻳﺎ ﻳﻚ ﺍﻣﺮ ﺑﺮﺟﺴﺘﻪ ﺍﺳﺖ .ﻫﻤﺎﻧﮕﻮﻧﻪ ﻛﻪ ﺍﺷﺎﺭﻩ ﮔﺮﺩﻳﺪ ،ﺑﺮﺍﻱ ﺧﻠﻖ ﺻﻔﺤﺎﺕ ﻭﺏ ﭘﻮﻳﺎ ﺍﺯ ﺩﻭ ﺭﻭﻳﻜﺮﺩ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺍﺳﺘﻔﺎﺩﻩ ﻫﻤﺰﻣﺎﻥ ﺍﺯ ﺩﻭ ﺭﻭﺵ ﻓﻮﻕ ﻫﻴﭽﮕﻮﻧﻪ ﺗﻌﺎﺭﺿﻲ ﺑﺎ ﻫﻢ
17
ﻧﺪﺍﺷﺘﻪ ﺑﻠﻜﻪ ﺑﺎﻟﻌﻜﺲ ﺗﻮﺍﻧﺎﺋﻲ ﻳﻚ ﺻﻔﺤﻪ ﻭﺏ ﭘﻮﻳﺎ ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺩﺭﺍﺩﺍﻣﻪ ﺑﻪ ﺑﺮﺭﺳﻲ ﺩﻭ ﺭﻭﻳﻜﺮﺩ ﻓﻮﻕ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ. . page Client-side dynamicﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ﻣﺎﮊﻭﻝ ﻫﺎﺋﻲ ) ( Plug –inﻛﻪ ﺑﻪ ﻣﺮﻭﺭﮔﺮ ﻣﻠﺤﻖ ﺷﺪﻩ ﺍﻧﺪ ،ﺗﻤﺎﻣﻲ ﻋﻤﻠﻴﺎﺕ ﻻﺯﻡ ﺟﻬﺖ ﺍﻳﺠﺎﺩ ﺻﻔﺤﺎﺕ ﭘﻮﻳﺎ ﺭﺍ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ .ﻛﺪﻫﺎﻱ Htmlﺍﺯ ﻃﺮﻳﻖ ﻓﺎﻳﻞ ﻣﺮﺑﻮﻃﻪ ﻛﻪ ﺷﺎﻣﻞ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎ ﺍﺳﺖ
ﺑﺮﺍﻱ ﻣﺮﻭﺭﮔﺮ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ.ﻣﺮﻭﺭﮔﺮﻫﺎ ﺩﺳﺘﻮﺭﺍﺕ ﻓﻮﻕ ﺭﺍ ﺟﻬﺖ ﺗﻮﻟﻴﺪ ﻛﺪﻫﺎﻱ Html ﻭ ﺩﺭ ﺯﻣﺎﻥ ﺩﺭﺧﻮﺍﺳﺖ ﻳﻚ ﺻﻔﺤﻪ ﺗﻮﺳﻂ ﻛﺎﺭﺑﺮ ،ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﻨﺪ ﻛﺮﺩ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﺤﺘﻮﻳﺎﺕ ﻳﻚ ﺻﻔﺤﻪ ﺑﺮ ﺍﺳﺎﺱ ﺩﺭﺧﻮﺍﺳﺖ ﻛﺎﺭﺑﺮﺍﻥ ﻭ ﺑﺼﻮﺭﺕ ﭘﻮﻳﺎ ﺍﻳﺠﺎﺩ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﻣﺮﺍﺣﻞ ﺁﻣﺎﺩﻩ ﺷﺪﻥ ﻳﻚ ﺻﻔﺤﻪ ﻭﺏ ﭘﻮﻳﺎ ﺑﺎ ﺗﺎﻛﻴﺪ ﺑﺮ ﺭﻭﺵ ﻫﺎﻱ Client-Side – ١ﻳﻚ ﻣﻮﻟﻒ ﺻﻔﺤﻪ ﻭﺏ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﺭﺍ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻛﺪﻫﺎﻱ Html ﻧﻮﺷﺘﻪ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺩﺭ ﻓﺎﻳﻠﻲ ﺑﺎ ﺍﻧﺸﻌﺎﺏ Htmlﺫﺧﻴﺮﻩ ﻣﻲ ﻧﻤﺎﻳﺪ.
18
– ٢ﻛﺎﺭﺑﺮﺍﻥ ﺩﺭﺧﻮﺍﺳﺖ ﻳﻚ ﺻﻔﺤﻪ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﻣﺮﻭﺭﮔﺮ ﺧﻮﺩ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﻨﺪ ﻛﺮﺩ. – ٣ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻓﺎﻳﻞ ﺩﺭﺧﻮﺍﺳﺘﻲ )ﺩﺭ ﺻﻮﺭﺕ ﻧﻴﺎﺯ ﻓﺎﻳﻞ ﺩﻳﮕﺮﻱ ﻛﻪ ﺷﺎﻣﻞ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎ ﺑﺎﺷﺪ( ﺭﺍ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ ﻛﺮﺩ. – ٤ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﻓﺎﻳﻞ ﺣﺎﻭﻱ ﻛﺪﻫﺎﻱ Htmlﻭ ﺩﺭ ﺻﻮﺭﺕ ﻭﺟﻮﺩ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﺑﺮﺍﻱ ﻣﺘﻘﺎﺿﻲ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﻛﺮﺩ. – ٥ﻳﻚ ﻣﺎﮊﻭﻝ ﻫﻤﺮﺍﻩ ﻣﺮﻭﺭﮔﺮ ،ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎ ﺭﺍ ﭘﺮﺩﺍﺯﺵ ﻭ ﻛﺪﻫﺎﻱ Htmlﺭﺍ ﺩﺭ ﻫﻤﺎﻥ ﺻﻔﺤﻪ Htmlﺑﺮﻣﻲ ﮔﺮﺩﺍﻧﺪ. – ٦ﺩﺭ ﻧﻬﺎﻳﺖ ﻛﺪﻫﺎﻱ Htmlﺗﻮﺳﻂ ﻣﺮﻭﺭﮔﺮ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﻧﺪ. ﺗﺎﻛﻨﻮﻥ ﺗﻜﻨﻮﻟﻮﮊﻳﻬﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺑﺮ ﺍﺳﺎﺱ ﺭﻭﻳﻜﺮﺩ ﻓﻮﻕ ﻣﻄﺮﺡ ﻭ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻃﺮﺍﺣﺎﻥ ﻭ ﻣﻮﻟﻔﺎﻥ ﺻﻔﺤﺎﺕ ﻭﺏ ﭘﻮﻳﺎ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺍﺳﺖ .ﺟﺎﻭﺍ ﺍﺳﻜﺮﻳﭙﺖ ،Vbscript ،ﻛﻨﺘﺮﻝ ﻫﺎﻱ
ActiveXﻭ ﺍﭘﻠﺖ ﻫﺎﻱ ﺟﺎﻭﺍ ﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻫﺎ ﺑﻮﺩﻩ ﻛﻪ ﺑﺮﺍﻱ ﺷﻨﺎﺧﺖ ﺧﻮﺍﻧﻨﺪﮔﺎﻥ ﺩﺭ ﺍﻳﻦ ﺑﺨﺶ ﺑﺼﻮﺭﺕ ﺧﻴﻠﻲ ﻣﺨﺘﺼﺮ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻫﺮ ﻳﻚ ﺗﻮﺿﻴﺤﺎﺗﻲ ﺍﺭﺍﺋﻪ ﺧﻮﺍﻫﺪ ﺷﺪ. ﺟﺎﻭﺍﺍﺳﻜﺮﻳﭙﺖ )، (JavaScriptﺍﻭﻟﻴﻦ ﺯﺑﺎﻥ ﺍﺳﻜﺮﻳﭙﺖ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻣﺮﻭﺭﮔﺮﻫﺎ ﺍﺳﺖ.
ﺯﺑﺎﻧﻬﺎﻱ ﺍﺳﻜﺮﻳﭙﺖ ﺑﻌﻨﻮﺍﻥ ﺣﺪ ﻣﻴﺎﻧﻪ ﺑﻴﻦ ﻛﺪﻫﺎﻱ Htmlﻭ ﺯﺑﺎﻧﻬﺎﻱ ﻣﻌﻤﻮﻟﻲ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﻲ ﻗﺮﺍﺭ ﺩﺍﺷﺘﻪ ﻭ ﺑﺼﻮﺭﺕ ﻣﻔﺴﺮ ﻋﻤﻞ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺟﺎﻭﺍﺍﺳﻜﺮﻳﭙﺖ ﺭﺍ ﻧﺒﺎﻳﺪ ﺑﺎ ﺯﺑﺎﻥ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﻲ ﺟﺎﻭﺍ ﺍﺷﺘﺒﺎﻩ ﮔﺮﻓﺖ .ﺷﺮﻛﺖ ﻧﺖ ﺍﺳﻜﻴﭗ ﺩﺭ ﺍﺑﺘﺪﺍ ﺯﺑﺎﻥ ﺍﺳﻜﺮﻳﭙﺘﻲ ﺑﺎ ﻧﺎﻡ LiveScriptﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻭ ﺑﻬﻤﺮﺍﻩ ﻣﺮﻭﺭﮔﺮ NetScape 2.0ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻋﻼﻗﻪ ﻣﻨﺪﺍﻥ ﻗﺮﺍﺭ ﮔﺮﻓﺖ .ﺯﻣﺎﻧﻴﻜﻪ
19
ﺷﺮﻛﺖ ﻧﺖ ﺍﺳﻜﻴﭗ ﺑﺎ ﺷﺮﻛﺖ Sunﻣﺘﺤﺪ ﮔﺮﺩﻳﺪ ،ﻧﺎﻡ ﺁﻥ ﺭﺍ ﺟﺎﻭﺍﺍﺳﻜﺮﻳﭙﺖ ﮔﺬﺍﺷﺘﻨﺪ. ﺑﺨﺸﻲ ﺍﺯ ﮔﺮﺍﻣﺮ ﺯﺑﺎﻥ ﻓﻮﻕ ﻧﻈﻴﺮ ﺳﺎﺧﺘﺎﺭ ﺍﻭﻟﻴﻪ ،ﺍﺯ ﺟﺎﻭﺍ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺍﺳﺖ )ﺧﻮﺩ ﺟﺎﻭﺍ ﻧﻴﺰ ﺍﻏﻠﺐ ﺳﺎﺧﺘﺎﺭ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺯﺑﺎﻥ Cﮔﺮﻓﺘﻪ ﺍﺳﺖ( .ﺟﺎﻭﺍﺍﺳﻜﺮﻳﭙﺖ ﺩﺍﺭﺍﻱ ﺍﻣﻜﺎﻧﺎﺕ ﻣﺘﻌﺪﺩ ﻭ
ﻗﺪﺭﺗﻤﻨﺪﻱ ﺟﻬﺖ ﻛﻨﺘﺮﻝ ﻭ ﻣﺪﻳﺮﻳﺖ ﺭﻓﺘﺎﺭ ﻭ ﻣﺤﺘﻮﻳﺎﺕ ﻳﻚ ﻣﺮﻭﺭﮔﺮ ﺍﺳﺖ .ﺯﺑﺎﻥ ﻓﻮﻕ ﺗﻮﺍﻧﺎﺋﻲ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺗﻲ ﻧﻈﻴﺮ :ﻋﻤﻠﻴﺎﺕ ﺭﻭﻱ ﻓﺎﻳﻞ ﻫﺎ ﺭﺍ ﺩﺍﺭﺍ ﻧﻤﻲ ﺑﺎﺷﺪ) .ﺷﺎﻳﺪ ﻳﻜﻲ ﺍﺯ ﺩﻻﻳﻞ ﻣﺴﺎﺋﻞ ﺍﻣﻨﻴﺘﻲ ﺑﺎﺷﺪ( .ﻓﺮﺍﮔﻴﺮﻱ ﺟﺎﻭﺍﺍﺳﻜﺮﻳﭙﺖ ﻧﺴﺒﺖ ﺑﻪ ﺟﺎﻭﺍ ﺑﻤﺮﺍﺗﺐ ﺭﺍﺣﺖ ﺗﺮ ﺍﺳﺖ .ﺟﺎﻭﺍ
ﺍﺳﻜﺮﻳﭙﺖ ﺑﮕﻮﻧﻪ ﺍﻱ ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺍﺳﺖ ﻛﻪ ﻗﺎﺩﺭ ﺑﻪ ﺧﻠﻖ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻛﻮﭼﻚ ﻭ ﺩﺭ ﻋﻴﻦ ﺣﺎﻝ ﻣﻮﺛﺮ ﺟﻬﺖ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻣﺘﻌﺪﺩﻱ ﻧﻈﻴﺮ ﺑﺮﺧﻮﺭﺩ ﺑﺎ ﺭﻭﻳﺪﺍﺩﻫﺎﻱ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﺩﺭ ﺳﻄﺢ ﻛﺎﺭﺑﺮ ﻧﻈﻴﺮ :ﻛﻠﻴﻚ ﻧﻤﻮﺩﻥ ﺑﺮ ﺭﻭﻱ ﻳﻚ ﺁﻳﺘﻢ ،ﺑﺴﺘﻦ ﻳﻚ ﭘﻨﺠﺮﻩ ،ﻓﻌﺎﻝ ﺷﺪﻥ ﻳﻚ ﺻﻔﺤﻪ ،ﺧﺎﺭﺝ
ﺷﺪﻥ ﺍﺯ ﻳﻚ ﺻﻔﺤﻪ ،ﺣﺮﻛﺖ ﻣﻮﺱ ﺭﻭﻱ ﻳﻚ ﺁﻳﺘﻢ ﻭ…ﺍﺳﺖ .ﻣﺎﻛﺮﻭﺳﺎﻓﺖ ﻧﺴﺨﻪ ﺍﺧﺘﺼﺎﺻﻲ
ﺧﻮﺩ ﺍﺯ ﺟﺎﻭﺍﺍﺳﻜﺮﻳﭙﺖ ﺭﺍ ﺑﺎ ﻧﺎﻡ Jscriptﻭ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﻣﻌﺮﻓﻲ ﻣﺮﻭﺭﮔﺮ IE 3.0ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻋﻼﻗﻪ ﻣﻨﺪﺍﻥ ﻗﺮﺍﺭ ﺩﺍﺩ. . Vbscriptﺷﺮﻛﺖ ﻣﺎﻛﺮﻭﺳﺎﻓﺖ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﻋﺮﺿﻪ ﻣﺮﻭﺭﮔﺮ IE 3.0ﺯﺑﺎﻥ ﺍﺳﻜﺮﻳﭙﺖ
ﺍﺧﺘﺼﺎﺻﻲ ﺧﻮﺩ ﻳﻌﻨﻲ Vbscriptﺭﺍ ﻣﻄﺮﺡ ﻧﻤﻮﺩ .ﺯﺑﺎﻥ ﺍﺳﻜﺮﻳﭙﺖ ﻓﻮﻕ ﺑﺮ ﺍﺳﺎﺱ ﺯﺑﺎﻥ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﻲ ﻭﻳﮋﻭﺍﻝ ﺑﻴﺴﻴﻚ ﻭ ﺑﺎ ﻫﺪﻑ ﺭﻗﺎﺑﺖ ﺑﺎ ﺟﺎﻭﺍﺍﺳﻜﺮﻳﭙﺖ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻋﻼﻗﻪ ﻣﻨﺪﺍﻥ
ﻗﺮﺍﺭ ﮔﺮﻓﺖ .ﺷﺎﻳﺪ ﺍﺯ ﻣﻌﺪﻭﺩ ﺍﻣﺘﻴﺎﺯﺍﺕ ﺍﻳﻦ ﺯﺑﺎﻥ ﻧﺴﺒﺖ ﺑﻪ ﺟﺎﻭﺍﺳﻜﺮﻳﭙﺖ ﺑﺘﻮﺍﻥ ﺑﻪ ﻋﺪﻡ
ﺣﺴﺎﺳﻴﺖ ﺁﻥ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺣﺮﻭﻑ ﺑﺰﺭﮒ ﻭ ﻛﻮﭼﻚ ) (Case Sensitiveﻧﺎﻡ ﺑﺮﺩ .ﻛﺪﻫﺎﻱ
ﻧﻮﺷﺘﻪ ﺷﺪﻩ ﺗﻮﺳﻂ ﺯﺑﺎﻥ ﻓﻮﻕ ﺻﺮﻓﺎ؛ ﺍﺯ ﻃﺮﻳﻖ ﻣﺮﻭﺭﮔﺮ ﺷﺮﻛﺖ ﻣﺎﻛﺮﻭﺳﺎﻓﺖ ) (IEﻗﺎﺑﻞ ﺗﻔﺴﻴﺮ ﻭ ﺍﺟﺮﺍ ﺑﻮﺩﻩ ﻭ ﻧﺖ ﺍﺳﻜﻴﭗ ﺍﻳﻦ ﺯﺑﺎﻥ ﺭﺍ ﺣﻤﺎﻳﺖ ﻧﻤﻲ ﻛﻨﺪ ،ﮔﺮﭼﻪ ﺑﺎ ﺍﻓﺰﻭﺩﻥ ﺑﺮﺧﻲ Plug-Inﺍﻣﻜﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ ﺯﺑﺎﻥ ﺩﺭ ﻣﺮﻭﺭﮔﺮ ﻧﺖ ﺍﺳﻜﻴﭗ ﻧﻴﺰ ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺯﺑﺎﻥ ﺟﺎﻭﺍﺍﺳﻜﺮﻳﭙﺖ ﺑﻤﺮﺍﺗﺐ ﻧﺴﺒﺖ ﺑﻪ ﺯﺑﺎﻥ Vbscriptﺭﺍﻳﺞ ﺗﺮ ﺍﺳﺖ .ﺍﮔﺮ ﻗﺼﺪ ﺍﻧﺘﺨﺎﺏ ﻳﻚ ﺯﺑﺎﻥ ﺍﺳﻜﺮﻳﭙﺖ ﺑﺮﺍﻱ ﭘﺮﺩﺍﺯﺵ ﻫﺎﻱ ﻣﺘﻜﻲ ﺑﺮ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ،
20
ﺑﺪﻭﻥ ﺷﻚ ﺟﺎﻭﺍﺍﺳﻜﺮﻳﭙﺖ ﻳﻚ ﮔﺰﻳﻨﻪ ﻣﻨﺎﺳﺐ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺟﺎﻭﺍﺳﻜﺮﻳﭙﺖ ﻭ Vbscriptﻫﺮ ﺩﻭ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻣﺎﮊﻭﻝ ﺑﺎ ﻧﺎﻡ Script Engineﻛﻪ ﺑﻬﻤﺮﺍﻩ ﻣﺮﻭﺭﮔﺮﻫﺎ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ، ﻣﺴﺌﻮﻟﻴﺖ ﺗﻔﺴﻴﺮ ﻭ ﺍﺟﺮﺍﻱ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﺑﺮ ﻋﻬﺪﻩ ﺧﻮﺍﻫﻨﺪ ﮔﺮﻓﺖ .ﺩﺭ ﭘﺮﻭﮊﻩ ﺩﺍﺕ ﻧﺖ ﺷﺮﻛﺖ ﻣﺎﻛﺮﻭﺳﺎﻓﺖ VB.NETﺭﺍ ﺟﺎﻳﮕﺰﻳﻦ Vbscriptﻧﻤﻮﺩﻩ ﺍﺳﺖ.
ﻛﻨﺘﺮﻝ ﻫﺎﻱ ، ActiveXﻳﻚ ﻛﻨﺘﺮﻝ ﺍﻛﺘﻴﻮﺍﻳﻜﺲ ﻋﻨﺼﺮﻱ ﺍﺳﺖ ﻛﻪ ﺗﻮﺳﻂ ﻳﻜﻲ ﺍﺯ ﺯﺑﺎﻧﻬﺎﻱ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﻲ ﻧﻈﻴﺮ C++ﻭ ﻳﺎ ﺟﺎﻭﺍ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺩﺭ ﺯﻣﺎﻧﻴﻜﻪ ﺍﻳﻦ ﻧﻮﻉ ﺍﻛﺘﻴﻮﺍﻳﻜﺲ
ﻫﺎ ﺭﺍ ﺑﻬﻤﺮﺍﻩ ﺻﻔﺤﺎﺕ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﺋﻴﻢ ،ﺍﻣﻜﺎﻥ ﺍﻧﺠﺎﻡ ﺑﺨﺸﻲ ﺍﺯ ﻋﻤﻠﻴﺎﺕ ﻣﺘﻜﻲ ﺑﺮ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻧﻈﻴﺮ ﺍﻳﺠﺎﺩ ﻳﻚ ، Timer ، Bar Chartﺗﺎﻳﻴﺪ ﻛﺎﺭﺑﺮ ﻭ ﻳﺎ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ
ﺑﺎﻧﻚ ﺍﻃﻼﻋﺎﺗﻲ ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ .ﻛﻨﺘﺮﻝ ﻫﺎﻱ ﺍﻛﺘﻴﻮﺍﻳﻜﺲ ﺍﺯ ﻃﺮﻳﻖ ﺗﮓ >
ﺻﻔﺤﺎﺕ ﻭﺏ ﺍﺿﺎﻓﻪ ﺧﻮﺍﻫﻨﺪ ﮔﺮﺩﻳﺪ .ﻣﻨﺎﺩﻱ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺷﺮﻛﺖ ﻣﺎﻛﺮﻭﺳﺎﻓﺖ ﺑﻮﺩﻩ ﻭ ﺗﺎ
ﻧﺴﺨﻪ ﺷﺶ ﻣﺮﻭﺭﮔﺮ ﻧﺖ ﺍﺳﻜﻴﭗ ﺍﻣﻜﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﻬﺎ ﺗﻮﺳﻂ ﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ. ﺍﻟﺒﺘﻪ ﺑﺎ ﻧﺼﺐ ﺑﺮﺧﻲ Plug-inﺯﻣﻴﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻛﻨﺘﺮﻝ ﻫﺎﻱ ﺍﻛﺘﻴﻮﺍﻳﻜﺲ ﺩﺭ ﻣﺮﻭﺭﮔﺮ ﻧﺖ
ﺍﺳﻜﻴﭗ ﺑﮕﻮﻧﻪ ﺍﻱ ﻓﺮﺍﻫﻢ ﺷﺪﻩ ﺍﺳﺖ .ﻧﻜﺘﻪ ﺟﺎﻟﺐ ﺗﻮﺟﻪ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺍﻣﻜﺎﻥ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻣﺘﻔﺎﻭﺕ ﺑﺮ ﺭﻭﻱ ﻛﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻛﺎﺭﺑﺮﺍﻥ ﻧﻈﻴﺮ ﻛﺎﺭ ﺑﺎ ﻓﺎﻳﻞ ﻫﺎ ﻭ ﺭﻳﺠﺴﺘﺮﻱ ﻭﻳﻨﺪﻭﺯ ﺑﻮﺟﻮﺩ ﻣﻲ ﺁﻳﺪ ﻭ ﺍﻳﻦ ﺧﻮﺩ ﻣﻲ ﺗﻮﺍﻧﺪ ﺍﺯ ﻟﺤﺎﻅ ﺍﻣﻨﻴﺘﻲ ﻣﺸﻜﻞ ﻭ ﮔﺎﻫﺎ " ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻭﺟﻮﺩ ﻓﺎﻳﺮﻭﺍﻝ ﻫﺎ ﺗﺤﻘﻖ ﻧﺎ ﭘﺬﻳﺮ ﺑﺎﺷﺪ .ﺑﻬﺮﺣﺎﻝ ﻧﻤﻲ ﺗﻮﺍﻥ ﺑﺮ ﺭﻭﻱ ﺗﻜﻨﻮﻟﻮﮊﻱ
ﻓﻮﻕ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺭﺍﻩ ﺣﻞ ﺟﺎﻣﻊ ﻭ ﻓﺮﺍﮔﻴﺮ ﺑﺮﺍﻱ ﺧﻠﻖ ﺻﻔﺤﺎﺕ ﻭﺏ ﭘﻮﻳﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ ﻣﮕﺮ ﺍﻳﻨﻜﻪ ﻣﺨﺎﻃﺒﺎﻥ ﺳﺎﻳﺖ ﺧﻮﺩ ﺭﺍ ﺻﺮﻓﺎ" ﺍﺯ ﺑﻴﻦ ﻛﺴﺎﻧﻲ ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﻢ ﻛﻪ ﻭﻳﻨﺪﻭﺯ ﺭﺍ ﺑﻌﻨﻮﺍﻥ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻭ ﻣﺮﻭﺭﮔﺮ IEﺭﺍ ﺑﻌﻨﻮﺍﻥ ﻣﺮﻭﺭﮔﺮ ﺧﻮﺩ ﺑﺮﮔﺰﻳﺪﻩ ﺍﻧﺪ. ، Java Appletﺟﺎﻭﺍ ﻳﻚ ﺯﺑﺎﻥ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﻲ ﻣﺴﺘﻘﻞ ﺍﺯ Platformﺍﺳﺖ .ﺟﺎﻭﺍ ﻧﺴﺒﺖ
ﺑﻪ ﺯﺑﺎﻧﻬﺎﻱ ﺍﺳﻜﺮﻳﭙﺖ ﺩﺍﺭﺍﻱ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮﻱ ﺍﺳﺖ .ﻫﺪﻑ ،ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻛﺪﻫﺎﻱ ﺟﺎﻭﺍ ﺑﻪ ﺷﻜﻞ ﺍﭘﻠﺖ ﺍﺳﺖ .ﻋﻨﺎﺻﺮ ﻓﻮﻕ ﺑﺴﺎﺩﮔﻲ ﻭ ﺗﻮﺳﻂ ﺗﮓ > <Appletﺑﻪ ﺻﻔﺤﺎﺕ 21
ﻭﺏ ﻣﻠﺤﻖ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﺧﻮﺷﺒﺨﺘﺎﻧﻪ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻣﺎﻛﺮﻭﺳﺎﻓﺖ ﻭ ﻧﺖ ﺍﺳﻜﻴﭗ ﻫﺮ ﺩﻭ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﺠﺎﺩ ﻳﻚ ﻣﺎﺷﻴﻦ ﻣﺠﺎﺯﻱ ﺟﺎﻭﺍ ) (JVMﺍﺯ ﺍﭘﻠﺖ ﻫﺎﻱ ﺟﺎﻭﺍ ﺣﻤﺎﻳﺖ ﻣﻲ ﻛﻨﻨﺪ. ﺑﻤﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﭘﻠﺖ ﻫﺎﻱ ﺟﺎﻭﺍ ﺩﺭ ﻳﻚ ﺻﻔﺤﻪ ﻭﺏ ﺍﺯ ﭼﻨﺪﻳﻦ ﺭﻭﺵ ﻣﻲ ﺗﻮﺍﻥ ﺍﺳﺘﻔﺎﺩﻩ
ﻛﺮﺩ :ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﮓ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ > . <Applet
ﺗﮓ ﻫﺎﻱ ﻓﻮﻕ ﺑﻪ ﻣﺮﻭﺭﮔﺮ ﺧﻮﺍﻫﻨﺪ ﮔﻔﺖ ﻛﻪ ﻳﻚ ﻓﺎﻳﻞ ﺟﺎﻭﺍ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ DownLoadﻭ ﺳﭙﺲ ﺑﻜﻤﻚ ﻣﺎﺷﻴﻦ ﻣﺠﺎﺯﻱ ﺟﺎﻭﺍ ) ، (JVMﻣﻮﺟﻮﺩ ﺩﺭ ﻣﺮﻭﺭﮔﺮﻫﺎ ،ﺁﻥ
ﺭﺍ ﺍﺟﺮﺍﺀ ﻧﻤﺎﻳﺪ .ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﺣﺪﺱ ﺯﺩﻩ ﺍﻳﺪ ﻳﻜﻲ ﺍﺯ ﻣﺴﺎﺋﻞ ﻣﻮﺟﻮﺩ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﭘﻠﺖ ﻫﺎ ﺟﺎﻭﺍ ،ﺯﻣﺎﻥ ﺍﺿﺎﻓﻪ ﺍﻱ ﺍﺳﺖ ﻛﻪ ﺻﺮﻑ Downloadﻛﺮﺩﻥ ،ﻣﻲ ﮔﺮﺩﺩ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺩﺭ ﺯﻣﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﭘﻠﺖ ﻫﺎﻱ ﺟﺎﻭﺍ ،ﺳﻌﻲ ﺩﺭ ﻧﻮﺷﺘﻦ ﺍﭘﻠﺖ ﻫﺎ ﺑﺎ ﻛﺪ ﻛﻢ ﺑﺎﺷﻴﻢ .ﺍﺯ ﺭﺍﻳﺞ ﺗﺮﻳﻦ
ﻣﻮﺍﺭﺩ ﻛﺎﺭﺑﺮﺩ ﺍﭘﻠﺖ ﻫﺎﻱ ﺟﺎﻭﺍ ﻣﻲ ﺗﻮﺍﻥ ﺑﻪ ﺍﻳﺠﺎﺩ Drop-Down Menuﻭ ﺍﻧﻴﻤﻴﺸﻦ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺍﺷﺎﺭﻩ ﻛﺮﺩ. . Pages Server Side Dynamicﺩﺭ ﺍﻳﻦ ﻣﺪﻝ ﻛﺪﻫﺎﻱ Htmlﺑﻬﻤﺮﺍﻩ ﻣﺠﻤﻮﻋﻪ ﺍﻱ
ﺍﺯ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺍﺭﺳﺎﻝ ﻭ ﻣﺠﺪﺩﺍ" ﺍﺯ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎﻱ ﻓﻮﻕ ﺑﺮﺍﻱ
ﺗﻮﻟﻴﺪ ﻛﺪﻫﺎﻱ Htmlﺑﺮﺍﻱ ﺻﻔﺤﻪ ﺍﻱ ﻛﻪ ﻛﺎﺭﺑﺮ ﺩﺭﺧﻮﺍﺳﺖ ﻛﺮﺩﻩ ،ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﻭ ﺩﺭ ﻧﻬﺎﻳﺖ ﺻﻔﺤﻪ ﺑﺼﻮﺭﺕ ﭘﻮﻳﺎ ﺑﺮ ﺍﺳﺎﺱ ﺩﺭﺧﻮﺍﺳﺖ ﻛﺎﺭﺑﺮ ﺍﻳﺠﺎﺩ ﺧﻮﺍﻫﺪ ﺷﺪ.
22
ﻣﺮﺍﺣﻞ ﺁﻣﺎﺩﻩ ﺷﺪﻥ ﻳﻚ ﺻﻔﺤﻪ ﻭﺏ ﭘﻮﻳﺎ ﺑﺎ ﺗﺎﻛﻴﺪ ﺑﺮ ﺭﻭﺵ ﻫﺎﻱ Server-Side – ١ﻳﻚ ﻣﻮﻟﻒ ﺻﻔﺤﻪ ﻭﺏ ،ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎ ﺭﺍ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻛﺪﻫﺎﻱ Html ﻧﻮﺷﺘﻪ ﻭ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎ ﺭﺍ ﺩﺭ ﻳﻚ ﻓﺎﻳﻞ ﺫﺧﻴﺮﻩ ﻣﻲ ﻛﻨﺪ. – ٢ﻛﺎﺭﺑﺮﺍﻥ ﺍﺯ ﻃﺮﻳﻖ ﻣﺮﻭﺭﮔﺮ ﺧﻮﺩ ،ﺩﺭﺧﻮﺍﺳﺖ ﻳﻚ ﺻﻔﺤﻪ ﻭﺏ ﺭﺍ ﻧﻤﻮﺩﻩ ﻭ ﺍﻳﻦ ﺩﺭﺧﻮﺍﺳﺖ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ. – ٣ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﻣﺤﻞ ﻓﺎﻳﻞ ﺣﺎﻭﻱ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﺭﺍ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ ﻛﺮﺩ. – ٤ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﺩﺳﺘﻮﺭﺍﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﻓﺎﻳﻞ ﺭﺍ ﺑﻤﻨﻈﻮﺭ ﺗﻮﻟﻴﺪ ﻛﺪ Htmlﺍﺟﺮﺍﺀ ﺧﻮﺍﻫﺪ ﻛﺮﺩ. – ٥ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﻛﺪﻫﺎﻱ ﺗﻮﻟﻴﺪ ﺷﺪﻩ ﺟﺪﻳﺪ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﻜﻪ ﺑﺮﺍﻱ ﻣﺮﻭﺭﮔﺮ ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ.
23
– ٦ﻣﺮﻭﺭﮔﺮ ﻛﺪﻫﺎﻱ Htmlﺭﺍ ﭘﺮﺩﺍﺯﺵ ﻭ ﺩﺭ ﻧﻬﺎﻳﺖ ﺻﻔﺤﻪ ﻭﺏ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﺧﻮﺍﻫﺪ ﺷﺪ. ﻳﻜﺘﻪ ﻣﻬﻢ ﺩﺭ ﺳﻨﺎﺭﻳﻮﻱ ﻓﻮﻕ ،ﺍﺟﺮﺍﻱ ﺗﻤﺎﻣﻲ ﭘﺮﺩﺍﺯﺵ ﻫﺎ ﺑﺮ ﺭﻭﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ،ﻗﺒﻞ ﺍﺯ
ﺍﺭﺳﺎﻝ ﺻﻔﺤﻪ ﺑﺮﺍﻱ ﻣﺮﻭﺭﮔﺮ ﺍﺳﺖ .ﻳﻜﻲ ﺍﺯ ﻣﺰﺍﻳﺎﻱ ﻋﻤﺪﻩ ﻣﺪﻝ ﻓﻮﻕ ﻧﺴﺒﺖ ﺑﻪ ﻣﺪﻝ Client- ، Sideﺍﻳﻦ ﻣﻮﺭﺩ ﺍﺳﺖ ﻛﻪ :ﺩﺭ ﻳﻚ ﺻﻔﺤﻪ ﻭﺏ ﺻﺮﻓﺎ" ﺷﺎﻫﺪ ﻛﺪﻫﺎﻱ Htmlﺧﻮﺍﻫﻴﻢ ﺑﻮﺩ.
ﺍﻳﻦ ﺑﺪﺍﻥ ﻣﻌﻨﻲ ﺍﺳﺖ ﻛﻪ ﻣﻨﻄﻖ ﺻﻔﺤﺎﺕ ﻭﺏ ﺩﺭ ﻧﺰﺩ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﻣﺨﻔﻲ ﻧﮕﻬﺪﺍﺭﻱ ﺧﻮﺍﻫﺪ ﺷﺪ ﻭ ﻣﻲ ﺗﻮﺍﻥ ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ ﺭﺍ ﺩﺍﺷﺖ ﻛﻪ ﺍﻛﺜﺮ ﻣﺮﻭﺭﮔﺮﻫﺎ ﻗﺎﺩﺭ ﺑﻪ ﻧﻤﺎﻳﺶ ﻧﺘﺎﻳﺞ ﭘﺮﺩﺍﺯﺵ ﻫﺎ ﻱ ﺍﺟﺮﺍﺀ ﺷﺪﻩ ﺑﺮ ﺭﻭﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺑﺎﺷﻨﺪ ASP.NET .ﺍﺯ ﻣﺪﻝ ﻓﻮﻕ
ﺗﺒﻌﻴﺖ ﻣﻲ ﻛﻨﺪ .ﻳﻜﻲ ﺩﻳﮕﺮ ﺍﺯ ﻧﻜﺎﺕ ﻣﻬﻢ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻣﺪﻝ ﻓﻮﻕ ،ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻳﻚ ﺻﻔﺤﻪ ﺗﺎ ﺯﻣﺎﻧﻴﻜﻪ ﺩﺭﺧﻮﺍﺳﺘﻲ ﺑﺮﺍﻱ ﺁﻥ ﺩﺭﻳﺎﻓﺖ ﻧﺸﺪﻩ ﺑﺎﺷﺪ ،ﻣﺤﺘﻮﻳﺎﺕ ﺁﻥ ﺑﻮﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺁﻣﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺑﺮﺭﺳﻲ ﺑﺮﺧﻲ ﺗﻜﻨﻮﻟﻮﮊﻳﻬﺎﻱ ﻣﺘﺪﺍﻭﻝ ﺩﺭﺍﻳﻦ ﻣﺪﻝ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ. ) . CGI(Common Gateway Interfaceﻣﻜﺎﻧﻴﺰﻣﻲ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺍﺳﻜﺮﻳﭙﺖ ﺑﺮ
ﺭﻭﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺑﻮﺩﻩ ﺗﺎ ﺑﺪﻳﻦ ﻃﺮﻳﻖ ﺍﻣﻜﺎﻥ ﺍﻳﺠﺎﺩ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﻱ ﻣﺘﻜﻲ ﺑﺮ ﻭﺏ ﻓﺮﺍﻫﻢ
ﮔﺮﺩﺩ CGI .ﻣﺎﮊﻭﻟﻲ ﺍﺳﺖ ﻛﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﺍﺿﺎﻓﻪ ﮔﺮﺩﺩ .ﻗﺪﻣﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮ ﺍﺯ ASPﺍﺳﺖ ﻭ ﺗﺎ ﻛﻨﻮﻥ ﺗﻌﺪﺍﺩ ﺑﻴﺸﻤﺎﺭﻱ ﺍﺯ ﺻﻔﺤﺎﺕ ﻭﺏ ﭘﻮﻳﺎ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﻭ ﺑﻜﻤﻚ ﻳﻚ ﺯﺑﺎﻥ ﺍﺳﻜﺮﻳﭙﺖ ﺍﻳﺠﺎﺩ ﺷﺪﻩ
ﺍﻧﺪ CGI .ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﺭﺍ ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﻛﺮﺩ ﻛﻪ ﻛﺎﺭﺑﺮ ،ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﺩﻳﮕﺮ ) ﻧﻈﻴﺮ ﻳﻚ ﺍﺳﻜﺮﻳﭙﺖ ( Perlﺭﺍ ﺑﺮ ﺭﻭﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺻﻔﺤﺎﺕ ﻭﺏ ﭘﻮﻳﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﺪ. ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺯﺑﺎﻧﻬﺎﺋﻲ ﻧﻈﻴﺮ Perl , C ,C++ﺑﻬﻤﺮﺍﻩ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺑﺴﻴﺎﺭ ﺭﺍﻳﺞ ﺍﺳﺖ.
ﺑﻬﺮﺣﺎﻝ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺍﻣﺮﻭﺯﻩ ﺩﺭ ﺧﻴﻠﻲ ﺍﺯ ﺳﺎﻳﺖ ﻫﺎﻱ ﺑﺰﺭﮒ ﺧﺼﻮﺻﺎ" ﺳﺎﻳﺖ ﻫﺎﻱ ﻣﺘﻜﻲ ﺑﺮ ﻳﻮﻧﻴﻜﻴﺲ ﺭﺍﻳﺞ ﺑﻮﺩﻩ ﻭ ﻗﺎﺑﻠﻴﺖ ﺍﺟﺮﺍﺀ ﺑﺮ ﺭﻭﻱ ﭼﻨﺪﻳﻦ Platformﺭﺍ ﺩﺍﺭﺍ ﻣﻲ ﺑﺎﺷﻨﺪ.
24
) ، ASP(Active Server Pageﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﻛﻪ ﭘﺲ ﺍﺯ ﻋﺮﺿﻪ ASP.NETﺑﺎ ﻧﺎﻡ ASPﻛﻼﺳﻴﻚ ﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ ،ﻳﻜﻲ ﺍﺯ ﻣﺘﺪﻭﺍﻟﺘﺮﻳﻦ ﺭﻭﺵ ﻫﺎﺏ ﻣﻮﺟﻮﺩ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺻﻔﺤﺎﺕ ﻭﺏ ﭘﻮﻳﺎ ﺍﺳﺖ .ﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺑﺎ ﺑﻬﺮﻩ ﮔﻴﺮﻱ ﺍﺯ ﺗﻮﺍﻥ ﺯﺑﺎﻧﻬﺎﻱ
ﺍﺳﻜﺮﻳﭙﺖ ﻧﻈﻴﺮ ﺟﺎﻭﺍﺍﺳﻜﺮﻳﭙﺖ ﻭ Vbscriptﺗﻮﺍﻧﺴﺘﻪ ﺍﺳﺖ ﭘﺎﺳﺦ ﺷﺎﻳﺴﺘﻪ ﺑﻪ ﻃﺮﺍﺡ ﺻﻔﺤﺎﺕ
ﻭﺏ ﭘﻮﻳﺎ ﺭﺍ ﺍﺭﺍﺋﻪ ﻧﻤﺎﻳﺪ ASP .ﻳﻚ ﻣﺎﮊﻭﻝ ﺟﺪﺍﮔﺎﻧﻪ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﻛﻨﺎﺭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﻗﺮﺍﺭ ﻣﻲ ﮔﻴﺮﺩ) . ( ASP.dllﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﻧﺴﺒﺖ ﺑﻪ ﺑﺮﺧﻮﺩ ﺍﺯ ﺗﻜﻨﻮﻟﻮﮊﻳﻬﺎﻱ ﻫﻤﮕﺮﻭﻩ ﺍﺯ ﻛﺎﺭﺁﻳﻲ ﭘﺎﻳﻴﻦ ﺗﺮﻱ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺑﻮﺩﻩ ﻭ ﺩﺭ ﺯﻣﻴﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺯﺑﺎﻧﻬﺎﺏ ﺍﺳﻜﺮﻳﭙﺖ ﺩﺭ ﻛﻨﺎﺭ ﺧﻮﺩ،
ﻧﻴﺰ ﺩﺍﺭﺍﻱ ﻣﺤﺪﻭﺩﻳﺖ ﺍﺳﺖ .ﺑﻬﺮﺣﺎﻝ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺑﺎ ﺳﺎﺑﻘﻪ ﺷﺶ ﺳﺎﻟﻪ ﺗﺎﻛﻨﻮﻥ ﺗﻮﺍﻧﺴﺘﻪ ﺍﺳﺖ ﺑﻪ ﺧﻴﻞ ﻋﻈﻴﻢ ﺩﺭﺧﻮﺍﺳﺖ ﻫﺎ ﺑﺮﺍﺏ ﺍﻳﺠﺎﺩ ﺻﻔﺤﺎﺕ ﭘﻮﻳﺎ ﺩﺭﺳﺖ ﭘﺎﺳﺦ ﺩﻫﺪ ،ﻭﻟﻲ ﺑﺎ
ﻇﻬﻮﺭ ﺧﻮﺍﺳﺘﻪ ﻫﺎ ﻭ ﺍﻧﺘﻈﺎﺭﺍﺕ ﺟﺪﻳﺪ ﺑﻪ ﭼﺎﻟﺶ ﺟﺪﻱ ﻛﺸﻴﺪﻩ ﺷﺪﻩ ﺍﺳﺖ ﻭ ﺷﺎﻳﺪ ﻇﻬﻮﺭ ﻭ ﺗﻮﻟﺪ ASP.NETﺩﻟﻴﻞ ﻭ ﭘﺎﺳﺨﻲ ﺑﻪ ﺑﺮﺧﻲ ﺍﺯ ﺍﻧﺘﻘﺎﺩﺍﺕ ﻣﻄﺮﻭﺣﻪ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺑﺎﺷﺪ. ) ، JSP (JavaServer pageﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺍﻣﻜﺎﻥ ﺗﺮﻛﻴﺐ Htmlﻭﻳﺎ Xmlﺭﺍ ﺑﺎ ﻛﺪﻫﺎﻱ ﺟﺎﻭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺍﻳﻦ ﻓﻨﺎﻭﺭﻱ ﺑﺮﺧﻼﻑ ASPﻛﻪ ﺻﺮﻓﺎ" ﺗﻮﺳﻂ ﺳﺮﻭﻳﺲ
ﺩﻫﻨﺪﻩ ﻭﺏ ﻣﺎﻛﺮﻭﺳﺎﻓﺖ ) ( IISﺣﻤﺎﻳﺖ ﻣﻲ ﮔﺮﺩﺩ ،ﺗﻮﺳﻂ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻣﺘﻌﺪﺩﻱ ﺣﻤﺎﻳﺖ ﺷﺪﻩ ﺍﺳﺖ JSP .ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ASPﺑﻤﺮﺍﺗﺐ ﺩﺍﺭﺍﻱ ﻗﺪﺭﺕ ﻭ ﺳﺮﻋﺖ ﺑﻴﺸﺘﺮﻱ ﺑﻮﺩﻩ
ﻭ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﺎﻥ ﺟﺎﻭﺍ ﺑﺨﻮﺑﻲ ﺑﺎ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﺁﻥ ﺁﺷﻨﺎﺋﻲ ﺩﺍﺭﻧﺪ JSP .ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻛﻨﺪ ﻛﻪ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺟﺎﻭﺍ ﺍﺯ ﻭﻳﮋﮔﻲ ﻣﺤﻴﻂ ﻫﺎﻱ ﻣﺘﻜﻲ ﺑﺮ Java2ﻧﻈﻴﺮ JavaBeansﻭ Java2 Librariesﺑﺨﻮﺑﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ.
. ColdFusionﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ،ﺍﻣﻜﺎﻥ ﺳﺎﺧﺖ ﺻﻔﺤﺎﺕ ﻭﺏ ﭘﻮﻳﺎ ﻓﺮﺍﻫﻢ
ﻣﻲ ﮔﺮﺩﺩ .ﺍﻳﻦ ﺗﻜﻨﻮﻟﻮﮊﻱ ﺑﺼﻮﺭﺕ ﻳﻚ ﻣﺎﮊﻭﻝ ﺟﺪﺍﮔﺎﻧﻪ ﺍﺳﺖ ﻛﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺮ ﺭﻭﻱ
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﻧﺼﺐ ﮔﺮﺩﺩ .ﺻﻔﺤﺎﺗﻲ ﻛﻪ ﺗﻮﺳﻂ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺑﻮﺟﻮﺩ ﻣﻲ ﺁﻳﻨﺪ،
ﺗﻮﺳﻂ ﻫﺮ ﻧﻮﻉ ﻣﺮﻭﺭﮔﺮﻱ ﻗﺎﺑﻞ ﺧﻮﺍﻧﺪﻥ ﻭ ﻧﻤﺎﻳﺶ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ.
25
ﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺍﺯ ﻣﺠﻤﻮﻋﻪ ﺯﻳﺎﺩﻱ ﺗﮓ ﻛﻪ ﺗﻮﺳﻂ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ColdFusionﺍﺭﺍﺋﻪ ﺷﺪﻩ
ﺍﺳﺖ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻛﻨﺪ .ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻓﻮﻕ ﺑﺮ ﺭﻭﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻣﺘﻌﺪﺩﻱ ﺣﺘﻲ IIS ﻧﺼﺐ ﻭ ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺳﺖ .ﻣﻬﻤﺘﺮﻳﻦ ﻣﺴﺌﻠﻪ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺩﺭ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺍﺯ
ﺗﮓ ﻫﺎﻱ Html-Likeﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ ) ﺩﺭ ASP.NETﺍﺯ ﺯﺑﺎﻧﻬﺎﻱ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﻲ ﻭ
ﺍﺷﻴﺎﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ( .ﻳﻜﻲ ﺩﻳﮕﺮ ﺍﺯ ﻧﻜﺎﺕ ﻣﻬﻢ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺩﺭ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺗﻬﻴﻪ ﺁﻥ ﺭﺍﻳﮕﺎﻥ ﻧﺒﻮﺩﻩ ﻭ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻴﺶ ﺍﺯ ﻫﺰﺍﺭ ﺩﻻﺭ ﺑﺮﺍﻱ ﺗﻬﻴﻪ ﺁﻥ ﻫﺰﻳﻨﻪ ﻧﻤﻮﺩ! ، PHPﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﻛﻪ ﺩﺭ ﺍﺑﺘﺪﺍ Personal Home Pageﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﺪ ﻭ ﺍﺧﻴﺮﺍ؛ PHP Hypertext Preprocessorﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ ،ﻳﻜﻲ ﺩﻳﮕﺮ ﺍﺯ ﺗﻜﻨﻮﻟﻮﮊﻳﻬﺎﻱ ﺭﺍﻳﺞ
ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺻﻔﺤﺎﺕ ﻭﺏ ﭘﻮﻳﺎ ﺍﺳﺖ .ﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺑﺮ ﺧﻼﻑ . ASP.NETﺑﺼﻮﺭﺕ
Cross-Platformﺑﻮﺩﻩ ﻭ ﺑﺮ ﺭﻭﻱ ﺍﻏﻠﺐ ﺳﻴﺴﺘﻢ ﻫﺎ ﻧﻈﻴﺮ ﻭﻳﻨﺪﻭﺯ NTﻭ ﺍﻏﻠﺐ ﻧﺴﺨﻪ ﻫﺎﻱ ﻳﻮﻧﻴﻜﺲ ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺳﺖ .ﮔﺮﺍﻣﺮ ﺯﺑﺎﻥ ﻓﻮﻕ ﻧﻈﻴﺮ Cﻭ Perlﺍﺳﺖ .ﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ
ﺩﺍﺭﺍﻱ ﺑﺮﺧﻲ ﺍﺯ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﻲ ﺷﻲ ﮔﺮﺍﺀ ﺑﻮﺩﻩ ﻛﻪ ﺍﻣﻜﺎﻥ ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﻭ ﻛﭙﺴﻮﻟﻪ
ﻧﻤﻮﺩﻥ ﻛﺪﻫﺎ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﺁﻭﺭﺩ. ، ASP.NETﭘﺲ ﺍﺯ ﻣﻌﺮﻓﻲ ﺗﻜﻨﻮﻟﻮﮊﻳﻬﺎﻱ ﺭﺍﻳﺞ ﺩﺭ ﺍﻳﻦ ﮔﺮﻭﻩ ،ﺯﻣﻴﻨﻪ ﻣﻨﺎﺳﺐ ﺑﺮﺍﻱ ﺁﺷﻨﺎﺋﻲ ﺑﺎ ﺗﻜﻨﻮﻟﻮﮊﻱ ASP.NETﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﺍﺳﺖ ASP.NET .ﻧﻴﺰ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻣﺎﮊﻭﻝ ﺑﺮ ﺭﻭﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻗﺮﺍﺭ ﻣﻲ ﮔﻴﺮﺩ ) .( aspnetIsapi.dllﺩﺭ ﻛﻨﺎﺭ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ
ﻣﺠﻤﻮﻋﻪ ﻋﻈﻴﻢ ﺩﺍﺕ ﻧﺖ ﻗﺮﺍﺭ ﺩﺍﺭﺩ ASP .ﻛﻼﺳﻴﻚ ﺩﺭﺭﺍﺑﻄﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺯﺑﺎﻧﻬﺎﻱ ﺍﺳﻜﺮﻳﭙﺖ ﻣﺤﺪﻭﺩ ﺑﻮﺩﻩ ﻭ ﺻﺮﻓﺎ؛ ﺑﻪ ﺟﺎﻭﺍﺍﺳﻜﺮﻳﭙﺖ ﻭ Vbscriptﺧﺘﻢ ﻣﻲ ﮔﺮﺩﺩ ) Vbscriptﻫﻢ ﺻﺮﻓﺎ" ﺗﻮﺳﻂ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻣﺘﻜﻲ ﺑﺮ ﻭﻳﻨﺪﻭﺯ ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﺪ ﺑﻮﺩ( ASP.NET.ﺍﻣﻜﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺠﻤﻮﻋﻪ ﻭﺳﻴﻌﻲ ﺍﺯ ﺯﺑﺎﻧﻬﺎﻱ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﻲ ﺭﺍ ﻓﺮﺍﻫﻢ
26
ﻣﻲ ﻛﻨﺪ .ﺯﺑﺎﻧﻬﺎﺋﻲ ﻧﻈﻴﺮ Python, Perl ، Jscript.NET ، C# ، VB.NETﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﺍﺯ ﺯﺑﺎﻧﻬﺎﺋﻲ ﻣﻲ ﺑﺎﺷﻨﺪ ﻛﻪ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺁﻧﻬﺎ ﺑﻬﻤﺮﺍﻩ ASP.NETﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ. ﺍﻣﺮﻭﺯﻩ ﺑﻴﺶ ﺍﺯ ﭘﺎﻧﺼﺪ ﻣﻴﻠﻴﻮﻥ ﻧﻔﺮ ﺩﺭ ﺳﺮﺍﺳﺮ ﺩﻧﻴﺎ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﺗﻌﺪﺍﺩ ﺻﻔﺤﺎﺕ ﻭﺏ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﻣﺮﺯ ﭼﻬﺎﺭ ﻣﻴﻠﻴﺎﺭﺩ ﮔﺬﺷﺘﻪ ﻭ ﻫﻤﭽﻨﺎﻥ ﺍﻳﻦ ﺭﻭﻧﺪ ﺑﺎ
ﺳﺮﻋﺘﻲ ﺑﺎﻭﺭﻧﮑﺮﺩﻧﻲ ﺭﻭ ﺑﻪ ﺍﻓﺰﺍﻳﺶ ﺍﺳﺖ .ﺣﺠﻢ ﻣﺒﺎﺩﻻﺕ ﺗﺠﺎﺭﻱ ﺑﺮ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ،ﺍﺯ ﻣﺮﺯ ﻧﻴﻢ ﺗﺮﻳﻠﻴﻮﻥ ﺩﻻﺭ ﮔﺬﺷﺘﻪ ﻭ ﺍﻓﻖ ﺟﺪﻳﺪﻱ ﺭﺍ ﺑﺮﺍﻱ ﺗﻤﺎﻣﻲ ﺑﻨﮕﺎﻩ ﻫﺎﻱ ﺗﺠﺎﺭﻱ ﺩﺭ ﺳﺮﺗﺎﺳﺮ ﺩﻧﻴﺎ
ﺍﻳﺠﺎﺩ ﻧﻤﻮﺩﻩ ﺍﺳﺖ .ﺭﺷﺪ ﻭ ﮔﺴﺘﺮﺵ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﺗﻤﺎﻣﻲ ﻋﺮﺻﻪ ﻫﺎ ،ﺗﻌﺠﺐ ﺍﮐﺜﺮ ﮐﺎﺭﺷﻨﺎﺳﺎﻥ ﻭ
ﻣﺘﺨﺼﺼﻴﻦ ﺭﺍ ﺑﺎﻋﺚ ﺷﺪﻩ ﺍﺳﺖ .ﺑﻪ ﺍﻋﺘﻘﺎﺩ ﺍﻏﻠﺐ ﮐﺎﺭﺷﻨﺎﺳﺎﻥ ﻫﻨﻮﺯ ﺩﺭ ﻣﻴﺎﻧﻪ ﺭﺍﻩ ﺑﻮﺩﻩ ﻭ ﻳﮏ ﺍﻧﻘﻼﺏ ﺩﻳﺠﻴﺘﺎﻟﻲ ﮐﺎﻣﻞ ﻭ ﺑﺴﻴﺎﺭ ﻓﺮﺍﮔﻴﺮ ﺭﺍ ﺩﺭ ﺁﻳﻨﺪﻩ ﺷﺎﻫﺪ ﺧﻮﺍﻫﻴﻢ ﺑﻮﺩ. ﻭﺿﻌﻴﺖ ﻓﻌﻠﻲ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﺍﻏﻠﺐ ﻣﻮﺍﺭﺩ ،ﻣﺸﺎﺑﻪ ﻭﺿﻌﻴﺖ ﻣﺪﻝ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﺑﺰﺭﮒ
) (Mainfarameﺩﺭ ﮔﺬﺷﺘﻪ ﺍﺳﺖ .ﺩﺭ ﻗﻴﺎﺱ ﻓﻮﻕ ،ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﺑﻤﻨﺰﻟﻪ ﺗﺮﻣﻴﻨﺎﻝ ﻫﺎﻱ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﺑﺰﺭﮒ ﺑﻮﺩﻩ ﻭ ﺩﻗﻴﻘﺎ" ﺩﺭ ﻫﻤﺎﻥ ﺭﺍﺳﺘﺎ ﺍﻳﻔﺎﻱ ﻭﻇﻴﻔﻪ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺗﻤﺎﻡ ﺍﻃﻼﻋﺎﺕ
ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﺣﺎﻝ ﺣﺎﺿﺮ ﺩﺭ ﺑﺎﻧﮏ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻣﺘﻤﺮﮐﺰ ﺷﺪﻩ ﺍﻱ ،ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺍﺳﺖ .ﮐﺎﺭﺑﺮﺍﻥ ﺩﺭ ﻫﺮ ﻟﺤﻈﻪ ﻗﺎﺩﺭ ﺑﻪ ﺩﺭﻳﺎﻓﺖ ﻳﮏ ﺻﻔﺤﻪ ﻭﺏ ﺍﺯ ﻳﮏ ﻭﺏ ﺳﺎﻳﺖ
ﻣﻲ ﺑﺎﺷﻨﺪ .ﺻﻔﺤﺎﺕ ﻭﺏ ،ﺻﺮﻓﺎ" ﺗﺼﻮﻳﺮﻱ ﺍﺯ ﺩﺍﺩﻩ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﮐﺎﺭﺑﺮﺍﻥ ﺑﻮﺩﻩ ﻭ ﺩﺍﺩﻩ
ﻫﺎﻱ ﻭﺍﻗﻌﻲ ﻭ ﺍﺳﺎﺳﻲ ﺭﺍ ﺷﺎﻣﻞ ﻧﻤﻲ ﮔﺮﺩﻧﺪ ) .ﺷﺎﻣﻞ ﺧﻮﺩ ﺩﺍﺩﻩ ﻫﺎ ﻧﻤﻲ ﺑﺎﺷﻨﺪ ( .ﺍﻃﻼﻋﺎﺕ
ﻣﻮﺟﻮﺩ ﺩﺭ ﺻﻔﺤﺎﺕ ﻭﺏ ﺭﺍ ﻣﻲ ﺗﻮﺍﻥ ﺩﺭﻳﺎﻓﺖ ﮐﺮﺩ ،ﻭﻟﻲ ﺍﻣﮑﺎﻥ ﻭﻳﺮﺍﻳﺶ ،ﺗﻔﺴﻴﺮ ﻫﺎﻱ ﺟﺎﻧﺒﻲ ﻭ ﻳﺎ ﺳﺎﻳﺮ ﻋﻤﻠﻴﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺳﻔﺎﺭﺷﻲ ﻧﻤﻮﺩﻥ ﺩﺍﺩﻩ ﻫﺎ ،ﺍﻣﺮﻱ ﺑﺴﻴﺎﺭ ﻣﺸﮑﻞ ﻭ ﺩﺭ ﺑﺮﺧﻲ ﺣﺎﻻﺕ ﻏﻴﺮﻣﻤﮑﻦ ﺍﺳﺖ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺑﺮﺧﻲ ﮐﺎﺭﺑﺮﺍﻥ ﻗﺼﺪ ﺍﺳﺘﺨﺮﺍﺝ ﻭ ﺟﻤﻊ ﺁﻭﺭﻱ
ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﭼﻨﺪﻳﻦ ﻭﺏ ﺳﺎﻳﺖ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺭ ﻧﻬﺎﻳﺖ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺭﺍ ﺍﺯ ﺻﻔﺤﺎﺕ ﻭﺏ ﻣﺘﻔﺎﻭﺕ ﺍﻧﺘﺨﺎﺏ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺩﺭ ﻳﮏ ﻓﺎﻳﻞ ﺩﻳﮕﺮ ﮐﻪ ﺑﺎ ﻳﮏ ﺍﺩﻳﺘﻮﺭ ﺧﺎﺹ
27
ﻧﻈﻴﺮ notepadﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ ،ﻗﺮﺍﺭ ﺩﻫﻨﺪ .ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ﺑﺼﻮﺭﺕ ﮐﺎﻣﻼ" ﺩﺳﺘﻲ ﺗﻮﺳﻂ
ﮐﺎﺭﺑﺮﺍﻥ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﻭ ﻋﻤﻼ" ﻳﮏ ﺣﺮﮐﺖ ﺳﻴﺴﺘﻤﺎﺗﻴﮏ ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﺍﻧﺠﺎﻡ ﻧﻤﻲ ﮔﻴﺮﺩ" .ﺗﻴﻢ ﺑﺮﻧﺮﺯ ﻟﻲ" ،ﻣﺒﺘﮑﺮ ﻭﺏ ،ﺩﺭ ﺯﻣﺎﻥ ﺍﻳﺠﺎﺩ ﻭﺏ ﺑﺮ ﺧﺎﺻﻴﺖ " ﻣﺤﻴﻂ ﻣﺤﺎﻭﺭﻩ ﺍﻱ " ﺁﻥ ﺗﺎﮐﻴﺪ ﻓﺮﺍﻭﺍﻥ ﺩﺍﺷﺖ .ﻭﺿﻌﻴﺖ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺍﺳﺘﺨﺮﺍﺝ ﻭ ﺟﻤﻊ ﺁﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺍﺯ ﻭﺏ ﺳﺎﻳﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ،ﺑﺎ ﺍﻳﺪﻩ ﻣﻄﺮﺡ ﺷﺪﻩ ﻓﻮﻕ ﻓﺎﺻﻠﻪ ﺯﻳﺎﺩﻱ ﺩﺍﺭﺩ.
ﺑﻤﻨﻈﻮﺭ ﮔﺬﺭ ﺍﺯ ﻭﺿﻌﻴﺖ ﻓﻌﻠﻲ ﻭﺏ ﻭ ﺍﺭﺗﻘﺎﺀ ﺁﻥ ﺑﻪ ﻣﺤﻴﻄﻲ ﮐﻪ ﺻﺮﻓﺎ" ﻧﻤﺎﻳﺶ ﺩﻫﻨﺪﻩ ﺍﻃﻼﻋﺎﺕ ﺍﻳﺴﺘﺎ ﻧﺒﺎﺷﺪ ،ﻻﺯﻡ ﺍﺳﺖ ﻧﺴﻞ ﺟﺪﻳﺪﻱ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﮐﻪ ﭘﺎﺳﺨﮕﻮﻱ ﻧﻴﺎﺯ ﻫﺎ ﻭ ﺍﻧﺘﻈﺎﺭﺍﺕ
ﻓﻌﻠﻲ ﻭ ﻣﺸﮑﻼﺕ ﻣﻮﺟﻮﺩ ﺑﺎﺷﺪ ،ﺑﻮﺟﻮﺩ ﺁﻳﺪ .ﻭﺏ ﺳﺎﻳﺖ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﻣﺸﺎﺑﻪ ﺟﺰﺍﻳﺮ
ﺍﻃﻼﻋﺎﺗﻲ ﺑﻮﺩﻩ ﮐﻪ ﮔﺮﭼﻪ ﺩﺭ ﻫﺮ ﻳﮏ ﺍﺯ ﺟﺰﺍﻳﺮ ﻓﻮﻕ ﻣﻤﮑﻦ ﺍﺳﺖ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺼﻮﺭﺕ ﭘﻮﻳﺎ ﻧﻴﺰ ﺍﻳﺠﺎﺩ ﮔﺮﺩﺩ ،ﻭﻟﻲ ﻫﻴﭽﮕﻮﻧﻪ ﺗﻌﺎﻣﻞ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻴﻦ ﺟﺰﺍﻳﺮ ﻓﻮﻕ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ .ﺗﻨﻬﺎ ﺗﻌﺎﻣﻞ ﺍﺭﺗﺒﺎﻃﻲ ﺑﺎ ﺟﺰﺍﻳﺮ ﻓﻮﻕ ﺗﻮﺳﻂ ﮐﺎﺭﺑﺮﺍﻥ ﺁﻥ ﺳﺎﻳﺖ ﺍﻳﺠﺎﺩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﻻﺯﻡ ﺍﺳﺖ ،
ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ،ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻫﻮﺷﻤﻨﺪ ،ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ﺩﺭ ﻳﮏ ﻫﻤﻴﺎﺭﻱ ﻭ ﻫﻤﮑﺎﺭﻱ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ،ﺯﻣﻴﻨﻪ ﺍﺭﺗﺒﺎﻁ ﻭ ﺗﻌﺎﻣﻞ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻴﻦ ﻫﺮ ﻳﮏ ﺍﺯ ﺟﺰﺍﻳﺮ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﻓﺮﺍﻫﻢ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﻧﺴﻞ ﻗﺒﻠﻲ ﺍﻳﻨﺘﺮﻧﺖ ﺗﻤﺎﻡ ﺗﻼﺵ ﺩﺭ ﺟﻬﺖ ﺑﻬﺒﻮﺩ ﻧﺤﻮﻩ ﺍﺭﺗﺒﺎﻁ ﮐﺎﺭﺑﺮﺍﻥ ﺑﺎ ﻫﺮ ﻳﮏ ﺍﺯ ﺟﺰﺍﻳﺮ ﺍﻃﻼﻋﺎﺗﻲ ﺻﺮﻑ ﮔﺮﺩﻳﺪ ،ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺩﺭ ﻧﺴﻞ ﺟﺪﻳﺪ ﺍﻳﻨﺘﺮﻧﺖ ﻻﺯﻡ ﺍﺳﺖ ،ﺗﻌﺎﻣﻞ
ﺍﻃﻼﻋﺎﺗﻲ ﺑﻴﻦ ﺟﺰﺍﻳﺮ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻮﺟﻮﺩ ﺁﻳﺪ ﻭ ﻓﺼﻞ ﺟﺪﻳﺪﻱ ﺑﺎ ﻧﺎﻡ " ﮔﻔﺘﻤﺎﻥ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ "
ﻣﻮﺟﻮﺩ ﺩﺭ ﻫﺮ ﻳﮏ ﺍﺯ ﺟﺰﺍﻳﺮ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺷﺎﻫﺪ ﺑﺎﺷﻴﻢ ،ﺑﺎ ﺣﺮﮐﺖ ﺑﺴﻤﺖ ﻣﺪﻝ ﻓﻮﻕ ،ﺟﺰﺍﻳﺮ ﺍﻃﻼﻋﺎﺗﻲ ﺍﻳﺰﻭﻟﻪ ﺷﺪﻩ ﺍﺯ ﺣﺎﻟﺖ ﻣﺤﺪﻭﺩ ﺧﻮﺩ ﺧﺎﺭﺝ ﺷﺪﻩ ﻭ ﺑﻴﻦ ﺟﺰﺍﻳﺮ ﻓﻮﻕ ،ﭘﻞ ﻫﺎﻱ
ﻣﺘﻔﺎﻭﺕ ﺍﻃﻼﻋﺎﺗﻲ ﺍﻳﺠﺎﺩ ﻭ ﻋﻤﻼ" ﺑﺎ ﺗﺤﻮﻟﻲ ﺷﮕﺮﻑ ﻣﻮﺍﺟﻪ ﺧﻮﺍﻫﻴﻢ ﺷﺪ .ﺍﻏﻠﺐ ﺳﺮﻭﻳﺲ ﻫﺎ ﻭ ﺍﻣﮑﺎﻧﺎﺕ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺑﻪ ﮐﺎﺭﺑﺮﺍﻥ ﺗﺎﮐﻨﻮﻥ ﺍﺯ ﻃﺮﻳﻖ ﻫﻤﻴﻦ ﺟﺰﺍﻳﺮ ﺍﻃﻼﻋﺎﺗﻲ ﺍﻳﺰﻭﻟﻪ ﺷﺪﻩ ﻗﺮﺍﺭ ﻣﻲ ﮔﺮﻓﺖ ،ﺩﺭ ﺻﻮﺭﺕ ﺍﺭﺗﺒﺎﻁ ﺍﻃﻼﻋﺎﺗﻲ ﻭ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺑﻴﻦ ﺟﺰﺍﻳﺮ ﺍﻃﻼﻋﺎﺗﻲ ،ﺩﺳﺘﺎﻭﺭﺩﻫﺎﻱ ﺑﻤﺮﺍﺗﺐ ﮔﺴﺘﺮﺩﻩ ﺗﺮﻱ ﻧﺴﺒﺖ ﺑﻪ ﻭﺿﻌﻴﺖ ﻓﻌﻠﻲ ﺭﺍ ﺑﺪﻧﺒﺎﻝ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ.
28
،(Language Extensible Markup(XMLﻫﺴﺘﻪ ﺍﺳﺎﺳﻲ ﮔﺬﺭ ﺍﺯ ﻣﺮﺣﻠﻪ ﻓﻌﻠﻲ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﻗﺪﻡ ﮔﺬﺍﺷﺘﻦ ﺩﺭ ﻧﺴﻞ ﺟﺪﻳﺪ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺖ ، XML .ﻳﮏ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺻﻨﻌﺘﻲ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺗﻮﺳﻂ ﮐﻨﺴﺮﺳﻴﻮﻡ ﻭﺏ ﺍﺳﺖ ﮐﻪ ﺗﻮﺳﻂ ﺍﮐﺜﺮ ﺷﺮﮐﺖ ﻫﺎﻱ ﻋﻈﻴﻢ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺩﺭ ﺳﻄﺢ
ﺩﻧﻴﺎ ﭘﺬﻳﺮﻓﺘﻪ ﺷﺪﻩ ﻭ ﺑﻌﻨﻮﺍﻥ ﻣﺤﻮﺭ ﺗﻮﺳﻌﻪ ﺩﺭ ﻧﺴﻞ ﺟﺪﻳﺪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﻭ ﺍﻫﺘﻤﺎﻡ ﺟﺪﻱ ﺍﺳﺖ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ، XMLﺑﻴﻦ ﻧﺤﻮﻩ ﻧﻤﺎﻳﺶ ﺍﻃﻼﻋﺎﺕ ﻭ ﺧﻮﺩ ﺍﻃﻼﻋﺎﺕ ،ﻳﮏ ﺗﻤﺎﻳﺰ ﻭ ﺗﻔﮑﻴﮏ ﺍﻳﺠﺎﺩ ﻣﻲ ﮔﺮﺩﺩ XML .ﺩﺭ ﻣﻮﺍﺭﺩ ﻣﺘﻌﺪﺩ ،ﺩﺍﺭﺍﻱ ﻋﻤﻠﮑﺮﺩﻱ ﻣﺸﺎﺑﻪ HTML
ﺍﺳﺖ .ﺩﺭ HTMLﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﮓ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ،ﻧﺤﻮﻩ ﻧﻤﺎﻳﺶ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺻﻔﺤﺎﺕ ﻭﺏ
ﺗﻌﺮﻳﻒ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ XMLﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﮓ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ،ﺳﺎﺧﺘﺎﺭ ﻣﻨﺎﺳﺒﻲ ﺑﺮﺍﻱ ﺍﻃﻼﻋﺎﺕ ﺗﻌﺮﻳﻒ ﻭ ﺍﻣﮑﺎﻥ ﺍﺭﺳﺎﻝ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺍﺩﻩ ﻫﺎ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ
ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﺷﺪ ، XML .ﺍﻣﮑﺎﻥ ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ،ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﻲ ،ﻭﻳﺮﺍﻳﺶ ﻭ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﺳﺎﻳﺮ ﺳﺎﻳﺖ ﻫﺎ ،ﺑﺮﻧﺎﻣﻪ ﻭ ﺩﺳﺘﮕﺎﻫﻬﺎ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﺁﻭﺭﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﻫﺮ ﻳﮏ ﺍﺯ ﺻﻔﺤﺎﺕ ﻭﺏ ﺩﺍﺭﺍﻱ ﻳﮏ ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﻲ ﮐﻮﭼﮏ ﺷﺪﻩ ) ﺍﻃﻼﻋﺎﺕ ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﺎﺧﺘﺎﺭﻫﺎﻱ (XMLﮐﻪ
ﺑﺮﺍﺣﺘﻲ ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺳﺎﺧﺘﺎﺭ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺑﺮﺍﻱ ﺩﺍﺩﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ،ﺍﺯ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﻲ ﺩﺭ ﺟﻬﺖ ﻧﻴﻞ ﺑﻪ ﺧﻮﺍﺳﺘﻪ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺑﺎ
ﺁﮔﺎﻫﻲ ﺍﺯ ﺳﺎﺧﺘﺎﺭ ﺩﺍﺩﻩ ﻫﺎﻱ ﺫﺧﻴﺮﻩ ﺷﺪﻩ )ﺳﺎﺧﺘﻤﺎﻥ ﺩﺍﺩﻩ( ﻗﺎﺩﺭ ﺑﻪ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻣﺘﻔﺎﻭﺕ ﻭ
ﮔﻮﻧﺎﮔﻮﻧﻲ ﺧﻮﺍﻫﺪ ﺷﺪ .ﻣﺜﻼ" ﺑﺎ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﻗﻴﻤﺖ ﺳﻬﺎﻡ ﺍﺯ ﻭﺏ ﺳﺎﻳﺖ
ﻣﺮﺑﻮﻃﻪ ،ﻣﻲ ﺗﻮﺍﻥ ﺑﺮ ﺭﻭﻱ ﺳﺎﻳﺖ ﺧﻮﺩ ﺍﻧﻮﺍﻉ ﺗﺤﻠﻴﻞ ﻫﺎﻱ ﭘﻮﻳﺎ ﻭ ﮔﺰﺍﺭﺷﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﭘﺲ ﺍﺯ ﺍﻧﺠﺎﻡ ﭘﺮﺩﺍﺯﺵ ﻫﺎﻱ ﻻﺯﻡ ،ﺍﺭﺍﺋﻪ ﺩﺍﺩ .ﭘﺮﺩﺍﺯﺵ ﻫﺎﻱ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺩﺭ ﻳﮏ ﻭﺏ ﺳﺎﻳﺖ ﺑﺮ ﺭﻭﻱ ﺩﺍﺩﻩ ﻫﺎ) ﺩﺍﺩﻩ ﻫﺎ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺳﺎﺧﺘﺎﺭ ﻣﻨﺎﺳﺐ ﻣﺒﺘﻨﻲ ﺑﺮ XMLﺗﻌﺮﻳﻒ ﻣﻲ ﮔﺮﺩﻧﺪ (
ﻣﻤﮑﻦ ﺍﺳﺖ ﺑﺎ ﭘﺮﺩﺍﺯﺵ ﻫﺎﻱ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺩﺭ ﻭﺏ ﺳﺎﻳﺖ ﺩﻳﮕﺮ ﻣﺘﻔﺎﻭﺕ ﺑﺎﺷﺪ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﺩﺭ ﺍﺑﺘﺪﺍ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺎﻳﻞ ﻫﺎﻱ XMLﺩﺭﻳﺎﻓﺖ ﻭ ﭘﺲ ﺍﺯ ﺍﻧﺠﺎﻡ ﭘﺮﺩﺍﺯﺵ ﻫﺎﻱ ﻻﺯﻡ ﻭ ﺩﻟﺨﻮﺍﻩ ،ﺑﺎ ﻓﻮﺭﻣﺖ ﻣﻮﺭﺩ ﻧﻈﺮ ) ﻧﻪ ﺗﺤﻤﻴﻠﻲ ( ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﮐﺎﺭﺑﺮﺍﻥ ﺳﺎﻳﺖ ﻗﺮﺍﺭ ﺩﺍﺩﻩ
ﺧﻮﺍﻫﺪ ﺷﺪ XML .ﺩﺭ ﺳﻨﺎﺭﻳﻮﻱ ﻓﻮﻕ ﺑﻤﻨﺰﻟﻪ ﭘﻞ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻮﺩﻩ ﮐﻪ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﺮ ﺍﺳﺎﺱ 29
ﺳﺎﺧﺘﺎﺭ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺳﺎﻳﺮ ﺳﺎﻳﺖ ﻫﺎ )ﻧﻤﺎﻳﻨﺪﮔﺎﻥ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﻣﺮﺑﻮﻃﻪ( ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﺩﺍﺩ. ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ، XMLﻭﺏ ﺳﺎﻳﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﻗﺎﺩﺭ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﻃﻼﻋﺎﺕ ﺑﻴﻦ
ﻳﮑﺪﻳﮕﺮ ﺑﻮﺩﻩ ﻭ ﺿﺮﻭﺭﺗﻲ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺯﺑﺎﻥ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﻲ ﻭ ﻳﺎ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺧﺎﺹ
ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﻭﺏ ﺳﺎﻳﺖ ﻫﺎ ﺑﺎ ﺍﻳﺠﺎﺩ ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ،ﻗﺎﺩﺭ ﺑﻪ ﺍﻳﺠﺎﺩ
ﻳﮏ ﺍﺭﺗﺒﺎﻁ ﻭ ﺗﻌﺎﻣﻞ ﻫﻮﺷﻤﻨﺪﺍﻧﻪ ﺑﻴﻦ ﺧﻮﺩ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺍﻃﻼﻋﺎﺕ ﺑﺴﺎﺩﮔﻲ ﺑﻴﻦ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺣﺮﮐﺖ ﺧﻮﺍﻫﺪ ﮐﺮﺩ. ﻧﺴﻞ ﺟﺪﻳﺪ ﺍﻳﻨﺘﺮﻧﺖ ﻳﮏ ﭘﻼﺕ ﻓﻮﺭﻡ ﺍﺭﺗﺒﺎﻃﻲ ﻭ ﻣﺤﺎﺳﺒﺎﺗﻲ ﻧﻈﻴﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺷﺨﺼﻲ
ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺑﺮﻧﺎﻣﻪ ﻫﺎﺋﻲ ﮐﻪ ﺑﺮﺍﻱ ﺍﻳﻨﺘﺮﻧﺖ ﻧﻮﺷﺘﻪ ﻣﻲ ﮔﺮﺩﻧﺪ ) ﻧﻈﻴﺮ ﺑﺮﻧﺎﻣﻪ ﻫﺎﺋﻲ ﮐﻪ ﺑﺮﺍﻱ
ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺷﺨﺼﻲ ﻧﻮﺷﺘﻪ ﻣﻲ ﺷﻮﺩ ( ،ﺩﺭ ﻭﺏ ﺳﺎﻳﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﻗﺎﺑﻠﻴﺖ ﺍﺟﺮﺍﺀ ﺭﺍ ﺩﺍﺷﺘﻪ ﻭ ﭘﺲ ﺍﺯ ﺍﺧﺬ ﺍﻃﻼﻋﺎﺕ ﻭ ﺧﺪﻣﺎﺕ ﺍﺯ ﻳﮑﺪﻳﮕﺮ ،ﺑﺎ ﺗﺮﮐﻴﺐ ﻭ ﺗﻮﺯﻳﻊ ﺁﻧﻬﺎ ﺑﺎ ﺍﺷﮑﺎﻝ ﮐﺎﻣﻼ"
ﺧﺎﺹ ﻭ ﺳﻔﺎﺭﺷﻲ ،ﺍﻣﮑﺎﻥ ﺍﺭﺳﺎﻝ ﺁﻧﻬﺎ ﺑﺮﺍﻱ ﻫﺮ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ،ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﻓﺎﺻﻠﻪ ﻣﻮﺟﻮﺩ ﺑﻴﻦ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﺨﺼﻲ ﻭ ﻳﺎ ﺳﺎﻳﺮ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺣﺬﻑ ﻭ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﭘﻴﺸﺮﻓﺘﻪ ﺍﻱ ﺑﺼﻮﺭﺕ ﺍﺗﻮﻣﺎﺗﻴﮏ ،ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﮐﺎﺭﺑﺮﺍﻥ ﺭﺍ ﺑﺼﻮﺭﺕ ﻣﺤﻠﻲ ﻭ ﻳﺎ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺟﻤﻊ ﺁﻭﺭﻱ ﻭ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻣﺘﻘﺎﺿﻴﺎﻥ ﻗﺮﺍﺭ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ. ﺩﺭ ﻧﺴﻞ ﺟﺪﻳﺪ ﺍﻳﻨﺘﺮﻧﺖ ﻓﺎﺻﻠﻪ ﻣﻮﺟﻮﺩ ﺑﻴﻦ ﺍﻃﻼﻋﺎﺕ ، onlineﺳﺮﻭﻳﺲ ﻫﺎ ﻭ ﺩﺳﺘﮕﺎﻫﻬﺎ، ﺷﮑﺴﺘﻪ )ﺣﺬﻑ( ﺷﺪﻩ ﻭ ﺍﻧﻘﻼﺑﻲ ﺩﺭ ﺯﻣﻴﻨﻪ ﻧﺤﻮﻩ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺁﻧﻬﺎ ﺭﺍ ﺷﺎﻫﺪ ﺧﻮﺍﻫﻴﻢ ﺑﻮﺩ .ﺍﻣﺮﻭﺯﻩ، ﮐﺎﺭﺑﺮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻭ ﺑﮑﺎﺭﮔﻴﺮﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺠﺰﺍ ﺑﺮﺍﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﻋﻤﻠﻴﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ،ﺍﻣﮑﺎﻥ ﺍﺧﺬ ﺍﻃﻼﻋﺎﺕ ،ﻧﻮﺷﺘﻦ ﻭ ﻳﺎ ﻭﻳﺮﺍﻳﺶ ﻧﺎﻣﻪ ﻫﺎﻱ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ﻭ ﻳﺎ ﭘﻴﺎﻡ ﻫﺎﻱ
ﻓﻮﺭﻱ ﻭ ﺳﺎﻳﺮ ﻣﻮﺍﺭﺩ ﺩﻟﺨﻮﺍﻩ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺭﻧﺪ .ﺩﺭ ﻧﺴﻞ ﺟﺪﻳﺪ ﺍﻳﻨﺘﺮﻧﺖ ،ﺑﺎ ﺭﻭﻳﮑﺮﺩﻱ ﮐﺎﻣﻼ" ﻣﺠﺘﻤﻊ ﻭ ﻫﻤﮕﻦ ﻣﻮﺍﺟﻪ ﺧﻮﺍﻫﻴﻢ ﺑﻮﺩ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ،ﮐﺎﺭﺑﺮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ
30
ﺍﻳﻨﺘﺮﻓﻴﺲ ) ﺭﺍﺑﻂ( ﻭﺍﺣﺪ ،ﻗﺎﺩﺭ ﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻃﻲ ﺷﻔﺎﻑ ﺑﻴﻦ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﺨﺼﻲ ﻭ ﻳﺎ ﺳﺎﻳﺮﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺑﻮﺩﻩ ﻭ ﺍﺯ ﺍﻳﻦ ﻃﺮﻳﻖ ﺍﻣﮑﺎﻥ ﻣﺸﺎﻫﺪﻩ ،ﻭﻳﺮﺍﻳﺶ ،ﺯﻣﺎﻧﺒﻨﺪﻱ، ﺍﺭﺗﺒﺎﻁ ﻭ ﺁﻧﺎﻟﻴﺰ ﺩﺍﺩﻩ ﻫﺎ ﺭﺍ ﭘﻴﺪﺍ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ .ﮐﺎﺭﺑﺮﺍﻥ ﻗﺎﺩﺭﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﺎﺯﻣﺎﻥ ﻣﺘﺒﻮﻉ
ﺧﻮﺩ ﺑﮑﻤﮏ ﺭﻭﺵ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﺍﻣﺮﻭﺯﻩ ﺗﻌﺪﺍﺩ ﻧﺎﻣﻪ ﻫﺎﻱ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ﮐﻪ ﻫﺮ ﻓﺮﺩ ﺩﺭﻳﺎﻓﺖ ﻭ ﺣﺎﻭﻱ ﻧﻮﺷﺘﻪ ﻫﺎﻱ ﺗﺎﻳﭗ ﺷﺪﻩ ﻭ ﻳﺎ ﺣﺎﺷﻴﻪ ﻧﻮﻳﺴﻲ ﺻﻮﺗﻲ ﻣﻲ ﺑﺎﺷﻨﺪ ،ﺑﺴﻴﺎﺭ
ﻣﺤﺪﻭﺩ ﺍﺳﺖ .ﺩﺭ ﺁﻳﻨﺪﻩ ،ﺍﮐﺜﺮ ﭘﻴﺎﻡ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺎ ﻓﻮﺭﻣﺘﻲ ﺑﺠﺰ ﻣﺘﻦ ﻫﺎﻱ ﺗﺎﻳﭗ ﺷﺪﻩ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻣﺨﺎﻃﺒﺎﻥ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﮔﺮﻓﺖ.
ﺑﻬﺮﺣﺎﻝ ﻭﺿﻌﻴﺖ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﻭﺏ ﺑﺴﺮﻋﺖ ﺩﺭ ﺣﺎﻝ ﺗﻐﻴﻴﺮ ﺍﺳﺖ .ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺗﺤﺖ ﻭﺏ ﺩﺍﺭﺍﻱ
ﻣﺴﺌﻮﻟﻴﺘﻲ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮ ﻧﺴﺒﺖ ﺑﻪ ﮔﺬﺷﺘﻪ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺳﻄﺢ ﺍﻧﺘﻈﺎﺭﺍﺕ ﻭ ﺧﻮﺍﺳﺘﻪ ﻫﺎ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺗﺪﻭﻳﻦ ،ﻃﺮﺍﺣﻲ ﻭ ﻋﺮﺿﻪ ﺷﺪﻩ ﺍﺳﺖXML .
ﺳﺘﺎﺭﻩ ﺍﻱ ﺑﻲ ﻓﺮﻭﻍ ﺩﺭ ﺑﻴﻦ ﺗﻤﺎﻡ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺑﻮﺩﻩ ﮐﻪ ﺑﻌﻨﻮﺍﻥ ﺷﺎﻩ ﮐﻠﻴﺪ ﻃﻼﺋﻲ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺍﻳﻔﺎﻱ ﻭﻇﻴﻔﻪ ﻣﻲ ﻧﻤﺎﻳﺪ .ﻭﺏ ﺳﺎﻳﺖ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ، HTMLﺩﺭ ﺁﻳﻨﺪﻩ ﺍﻱ ﻧﻪ ﭼﻨﺪﺍﻥ ﺩﻭﺭ ﺑﻪ ﺳﺎﻳﺖ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ XMLﺗﺒﺪﻳﻞ ﺗﺎ ﺑﺘﻮﺍﻧﻨﺪ ﺩﺭ ﺑﻴﻦ ﻣﻴﻠﻴﻮﻥ ﻫﺎ ﻭﺏ ﺳﺎﻳﺖ
ﻣﻮﺟﻮﺩ ،ﺯﺑﺎﻧﻲ ﺑﺮﺍﻱ ﮔﻔﺘﻦ ﻭ ﮔﻮﺷﻲ ﺑﺮﺍﻱ ﺷﻨﻴﺪﻥ ،ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﻭﺏ ﺳﺎﻳﺖ
ﻫﺎ ﺍﺯ ﺣﺎﻟﺖ ﺍﻳﺰﻭﻟﻪ ﻭ ﻣﺤﺪﻭﺩ ﻭ ﻣﺤﺼﻮﺭ ﺩﺭ ﻳﮏ ﺣﺼﺎﺭ ﻓﻴﺰﻳﮑﻲ ﻭ ﻣﻨﻄﻘﻲ ﺧﺎﺭﺝ ﻭ ﺯﻣﻴﻨﻪ ﺍﺭﺗﺒﺎﻁ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻴﻦ ﺁﻧﻬﺎ ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﺷﺪ .ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﺑﺎﻻﺗﺮﻳﻦ ﺑﻬﺮﻩ ﺭﺍ ﺧﻮﺍﻫﻨﺪ ﺑﺮﺩ .ﺁﻧﺎﻥ ﻓﻘﻂ ﺧﻮﺍﺳﺘﻪ ﺧﻮﺩ ﺭﺍ ﻣﻄﺮﺡ ﻭ ﺑﺎ ﺗﻤﻬﻴﺪﺍﺕ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ،ﺩﺭ ﺳﺮﻳﻌﺘﺮﻳﻦ ﺯﻣﺎﻥ
ﻣﻤﮑﻦ ،ﻣﻨﻄﻘﻲ ﺗﺮﻳﻦ ﻭ ﻣﺒﺴﻮﻁ ﺗﺮﻳﻦ ﭘﺎﺳﺦ ﺑﻪ ﺁﻧﻬﺎ ﺍﺭﺍﺋﻪ ﺧﻮﺍﻫﺪ ﺷﺪ ، .ﭘﺎﺳﺨﻲ ﮐﻪ ﺑﺮﺍﻱ ﺑﺪﺳﺖ ﺁﻭﺭﺩﻥ ﺁﻥ ،ﻭﺏ ﺳﺎﻳﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﺩﺭ ﺗﻌﺎﻣﻞ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺗﺎ
ﺑﺘﻮﺍﻧﻨﺪ ﺳﻄﺢ ﺟﺪﻳﺪﻱ ﺍﺯ ﺍﻧﺘﻈﺎﺭﺍﺕ ﻭ ﺧﻮﺍﺳﺘﻪ ﻫﺎ ﺭﺍ ﺗﺤﻘﻖ ﻧﻤﺎﻳﻨﺪ .ﻧﺴﻞ ﺟﺪﻳﺪ ﺍﻳﻨﺘﺮﻧﺖ
ﻣﺴﺘﻠﺰﻡ ﻭﺟﻮﺩ ﺳﺎﻳﺖ ﻫﺎﺋﻲ ﺍﺳﺖ ﮐﻪ ﻳﺎﺩ ﮔﺮﻓﺘﻪ ﺍﻧﺪ ﭼﮕﻮﻧﻪ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻣﺮﺍﻭﺩﻩ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺍﺷﺘﻪ ﻭ ﻫﺮ ﺭﻭﺯ ﻧﻴﺰ ﺑﺮ ﺍﻳﻦ ﺗﻮﺍﻥ ﻭ ﭘﺘﺎﻧﺴﻴﻞ ﻧﻴﺰ ﻣﻲ ﺍﻓﺰﺍﻳﻨﺪ.
31
ﺗﻌﺎﺭﻳﻒ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﻲ ﺗﺤﺖ ﻭﺏ ﺑﺮﺍﻱ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﺑﺮﻧﺎﻣﻪ ﻫﺎﺋﻲ ﺑﺎ ﻗﺎﺑﻠﻴﺖ ﺍﺟﺮﺍﺀ ﺑﺮ ﺭﻭﻱ ﻭﺏ ،ﺍﺯ ﻭﺍﮊﻩ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ Web-based ، Web-enabled :ﻭ Web applicationﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻭﺍﮊﻩ ﻫﺎﻱ Web-Basedﻭ Web-enabledﺩﺭ ﺑﺮﺧﻲ
ﻣﻮﺍﺭﺩ ﺑﺠﺎﻱ ﻳﮑﺪﻳﮕﺮ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺗﺎ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻧﻮﺷﺘﻪ ﺷﺪﻩ ﺑﺮﺍﻱ ﺍﺟﺮﺍﺀ ﺑﺮ ﺭﻭﻱ ﻭﺏ، ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺍﻳﻨﺘﺮﻧﺖ ﻧﻈﻴﺮ ﺍﻳﻨﺘﺮﺍﻧﺖ ﻫﺎ ﺭﺍ ﺗﺸﺮﻳﺢ ﻭ ﻣﺸﺨﺺ ﻧﻤﺎﻳﻨﺪ .ﺑﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻓﻮﻕ ،ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﻣﺮﻭﺭﮔﺮ ﺩﺳﺘﻴﺎﺑﻲ ﭘﻴﺪﺍ ﮐﺮﺩ .ﺍﻳﻦ ﻧﻮﻉ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﺩﺭ
ﻣﻮﺍﺭﺩ ﻣﺘﻌﺪﺩﻱ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻣﺘﻔﺎﻭﺕ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻃﺮﺍﺣﻲ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ) Web-Basedﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ( ،ﺑﮕﻮﻧﻪ ﺍﻱ ﺍﺳﺖ ﮐﻪ ﻗﺎﺑﻠﻴﺖ ﺍﺟﺮﺍﺀ ﺑﺮ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﻭﺏ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ،ﺩﺭ ﻣﻘﺎﺑﻞ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ، Web-enabledﺩﺍﺭﺍﻱ ﻳﮏ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻣﺒﺘﻲ ﺑﺮ ﻭﺏ ﺑﻤﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﻧﺮﻡ ﺍﻓﺮﺍﺭﻫﺎﻱ ﻣﻮﺟﻮﺩ ) ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺳﻨﺘﻲ ( ﻣﻲ ﺑﺎﺷﻨﺪ .ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻓﻮﻕ
ﻗﺒﻞ ﺍﺯ ﻣﻄﺮﺡ ﺷﺪﻥ ﻭﺏ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﻭ ﺑﺎ ﻃﺮﺍﺣﻲ ﻳﮏ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺍﻣﮑﺎﻧﺎﺕ ﺁﻧﻬﺎ ﺩﺭ ﺻﻔﺤﺎﺕ ﻭﺏ ﻧﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﻣﺜﻼ" ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﻃﺮﺍﺣﻲ ﻳﮏ ﻓﺮﻡ ﻻﺯﻡ، ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺍﺯ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺧﺬ ﻭ ﺑﺎ ﻣﺮﺍﺟﻌﻪ ﺑﻪ ﺑﺎﻧﮏ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻣﻮﺟﻮﺩ ،ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺍﺳﺘﺨﺮﺍﺝ ﻭ ﻧﺘﺎﻳﺞ ﺭﺍ ﺑﺎ ﻳﮏ ﻓﺮﻣﺖ ﻣﻨﺎﺳﺐ ﺑﺮﺍﻱ ﻣﺮﻭﺭﮔﺮ ﺍﺭﺳﺎﻝ ﮐﺮﺩ .ﺑﻬﺮﺣﺎﻝ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ،ﺍﺯ ﺁﻏﺎﺯ ﺑﺎ ﺭﻭﻳﮑﺮﺩ ﻭﺏ ،ﻃﺮﺍﺣﻲ ﻭ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺷﺪﻩ ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ، Web-enabledﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﮑﻤﮏ ﻳﮏ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻣﺒﺘﻲ ﺑﺮ ﻭﺏ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ. ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ، Web-Basedﺩﺍﺭﺍﻱ ﺍﻣﮑﺎﻧﺎﺕ ﻭ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺑﻮﺩﻩ ﮐﻪ ﺑﻤﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﻭﺏ ﻃﺮﺍﺣﻲ ﻭ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺷﺪﻩ ﺍﻧﺪ .ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ، Web-enabledﺩﺍﺭﺍﻱ ﻳﮏ Gatewayﻣﺠﺰﺍ ﺗﺤﺖ ﻭﺏ ﺑﻮﺩﻩ ﮐﻪ ﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻗﺪﻳﻤﻲ ﺭﺍ ﻓﺮﺍﻫﻢ
32
ﻣﻲ ﺁﻭﺭﺩ Gateway .ﻣﻮﺟﻮﺩ ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻤﺎﻡ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻭﺟﻮﺩ ﺭﺍ
ﻓﺮﺍﻫﻢ ﻧﺨﻮﺍﻫﺪ ﮐﺮﺩ ﻭ ﺻﺮﻓﺎ" ﭘﺎﺳﺨﮕﻮ ﺑﻪ ﺑﺨﺶ ﻣﺤﺪﻭﺩﻱ ﺍﺯ ﺍﻧﺘﻈﺎﺭﺍﺕ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺑﺪﻳﻬﻲ ﺍﺳﺖ ﺑﺨﺶ ﻫﺎﺋﻲ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﻮﺟﻮﺩ )ﺳﻨﺘﻲ( ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺎ ﺭﻭﻳﮑﺮﺩ ﻭﺏ ﺑﺎﺯﻧﻮﻳﺴﻲ ﺷﺪﻩ ﺗﺎ ﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﺁﻧﺎﻥ ﺑﺎ Gatewayﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ. ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺑﺮﺧﻲ ﺍﺯ ﺳﺎﻳﺖ ﻫﺎ ﻧﻈﻴﺮ :ﺧﺮﻳﺪ ﮐﺎﻻ ،ﮐﺘﺎﺏ ،ﺭﺯﻭ ﺑﻠﻴﻂ ﻫﻮﺍﭘﻴﻤﺎ ،
ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﻧﺎﻣﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ) ﻧﻈﻴﺮ ( hotmailﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ
ﻭﺏ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺎ ﺑﺮﺧﻲ ﺗﻌﺎﺭﻳﻒ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺗﺤﺖ ﻭﺏ ﺁﺷﻨﺎ ﻣﻲ ﺷﻮﻳﻢ: ● ﻳﮏ ﻭﺏ ﺳﺎﻳﺖ ﮐﻪ ﻗﺎﺩﺭ ﺑﻪ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺗﻲ ﺧﺎﺹ ﻧﻈﻴﺮ ﻓﺮﻭﺵ ﮐﺎﻻ ﺍﺳﺖ. ● ﺑﺮﻧﺎﻣﻪ ﺍﻱ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﻭﺏ ﺍﺟﺮﺍﺀ ﻣﻲ ﮔﺮﺩﺩ. ● ﺑﺮﻧﺎﻣﻪ ﺍﻱ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﺩﺭ ﺷﺒﮑﻪ ﺍﺟﺮﺍﺀ ﻭ ﺍﻣﮑﺎﻥ ﺳﺮﻭﻳﺲ ﺩﻫﻲ ﺑﻪ ﭼﻨﺪﻳﻦ ﮐﺎﺭﺑﺮ ﺩﺭ ﻫﺮ ﻟﺤﻈﻪ ﺭﺍ ﺩﺍﺭﺍ ﺍﺳﺖ. ● ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﮐﻪ ﺍﺯ ﭘﺮﻭﺗﮑﻞ Httpﺑﻌﻨﻮﺍﻥ ﻫﺴﺘﻪ ﭘﺮﻭﺗﮑﻞ ﺍﺭﺗﺒﺎﻃﻲ ﺧﻮﺩ ﺑﻤﻨﻈﻮﺭ
ﺗﻮﺯﻳﻊ ﻭ ﺍﺭﺍﺋﻪ ﺍﻃﻼﻋﺎﺕ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ﻭ ﺑﺎ ﻓﺮﻣﺖ Htmlﺍﺳﺘﻔﺎﺩﻩ ﻭ ﺁﻧﺎﻥ ﺭﺍ ﺑﺮﺍﻱ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ. ● ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ﺩﺍﺭﺍﻱ ﻻﻳﻪ ﻫﺎﻱ ﺯﻳﺮ ﺍﺳﺖ: ▪ ﻳﮏ ﻻﻳﻪ ﻧﺎﺯﮎ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ) ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ( ▪ ﻳﮏ ﻻﻳﻪ ﻧﻤﺎﻳﺶ ﻭ ﺍﺭﺍﺋﻪ ) ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻭﺏ ( ▪ ﻳﮏ ﻻﻳﻪ ) Applicationﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ (Application 33
▪ ﻳﮏ ﻻﻳﻪ ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﻲ
ﺍﺭﺍﺋﻪ ﻳﮏ ﻣﺪﻝ ﻫﻤﮕﺮﺍ ﻭ ﺟﺎﻣﻊ ﺑﺮﺍﻱ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺗﺤﺖ ﻭﺏ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﻭ ﻣﺘﻔﺎﻭﺗﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺑﻤﻨﻈﻮﺭ ﻃﺮﺍﺣﻲ ﻭ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ﺻﺮﻓﺎ" ﻳﮏ ﺭﻭﺵ ﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻪ ﻭ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺭﻭﺵ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﮐﻪ ﻫﺮ ﻳﮏ ﺑﺮﺧﺎﺳﺘﻪ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﻣﻲ ﺑﺎﺷﻨﺪ ،ﺑﻪ ﻫﺪﻑ ﺧﻮﺩ ﺩﺳﺖ ﭘﻴﺪﺍ ﮐﺮﺩ.
34
ﺑﺮﺧﻲ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﻣﺘﻌﻠﻖ ﺑﻪ ﺷﺮﮐﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺑﻮﺩﻩ ﮐﻪ ﺩﺭ ﺣﺎﻻﺗﻲ ﻣﻤﮑﻦ ﺍﺳﺖ ﺩﺍﺭﺍﻱ ﻋﻤﻠﮑﺮﺩﻫﺎﻱ ﻣﺸﺎﺑﻪ ﺑﺎﺷﻨﺪ .ﮐﻨﺴﺮﺳﻴﻮﻡ ﻭﺏ ﻣﺴﺌﻮﻟﻴﺖ ﺍﺳﺘﺎﻧﺪﺍﺭ ﻧﻤﻮﺩﻥ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﺮﺗﺒﻂ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ .ﭘﺲ ﺍﺯ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻧﻤﻮﺩﻥ ﻫﺮ ﻳﮏ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ،ﺗﻤﺎﻡ ﺗﻮﻟﻴﺪﮐﻨﻨﺪﮔﺎﻥ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻭ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﺳﻌﻲ ﺩﺭ ﺭﻋﺎﻳﺖ ﻣﻮﺍﺭﺩ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺷﺪﻩ ﮐﺮﺩﻩ ﺗﺎ ﺑﺪﻳﻦ ﻃﺮﻳﻖ ﻣﺨﺎﻃﺒﺎﻥ ﺑﻴﺸﺘﺮﻱ ﺭﺍ ﺟﺬﺏ ﻭ ﺯﻣﻴﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻭﺳﻴﻊ ﺗﺮ ﻭ ﮔﺴﺘﺮﺩﻩ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻓﻮﻕ ،ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ.
ﻋﻤﻠﮑﺮﺩ ﺍﮐﺜﺮ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺗﺤﺖ ﻭﺏ ﺩﺭ ﻣﻮﺍﺭﺩ ﺑﺴﻴﺎﺭﻱ ﻣﺸﺎﺑﻪ ﻳﮑﺪﻳﮕﺮ ﺍﺳﺖ: ﺍﺭﺍﺋﻪ ﻳﮏ ﺑﺨﺶ ﺭﺍﺑﻂ ﮐﺎﺭﺑﺮ ﺑﻤﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﮐﺎﺭﺑﺮﺍﻥ :ﺩﺭﻳﺎﻓﺖ ﺧﻮﺍﺳﺘﻪ ﻫﺎ ﻭ ﻳﺎ ﻧﻤﺎﻳﺶ ﻧﺘﺎﻳﺞ ﺩﺭﻳﺎﻓﺖ ﻭ ﺍﺭﺳﺎﻝ ﺩﺭﺧﻮﺍﺳﺖ ﮐﺎﺭﺑﺮﺍﻥ ) ﺍﺯ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺑﺴﻤﺖ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ( ﺍﻧﺠﺎﻡ ﭘﺮﺩﺍﺯﺵ ﻻﺯﻡ ) ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ( ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻣﻨﺎﺑﻊ ﺩﺍﺩﻩ ﺋﻲ ) ﺑﺎﻧﮏ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ( ﻭ ﺍﻧﺠﺎﻡ ﭘﺮﺩﺍﺯﺵ ﻫﺎﻱ ﻻﺯﻡ ﺍﺭﺳﺎﻝ ﻧﺘﺎﻳﺞ ﺑﺪﺳﺘﺖ ﺁﻣﺪﻩ ﺍﺯ ﭘﺮﺩﺍﺯﺵ ﻫﺎﻱ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺍﻧﺠﺎﻡ ﭘﺮﺩﺍﺯﺵ ﻫﺎﻱ ﻻﺯﻡ ) ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ (
ﺷﮑﻞ ﺯﻳﺮ ﻧﺤﻮﻩ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ:
35
ﻫﺪﻑ ﺍﺭﺍﺋﻪ ﻳﮏ ﻣﺪﻝ ﻋﻤﻠﻴﺎﺗﻲ ﺑﺮﺍﻱ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ
ﻣﻲ ﺑﺎﺷﺪ .ﻣﺪﻝ ﭘﻴﺸﻨﻬﺎﺩﻱ ،ﻣﺴﺘﻘﻞ ﺍﺯ ﻧﻮﻉ ﺗﮑﻨﻮﻟﻮﮊﻱ ،ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﻣﺪﻝ ﺻﺮﻓﻨﻈﺮ ﺍﺯ ﻧﻮﻉ ﺗﮑﻨﻮﻟﻮﮊﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ،ﻣﻲ ﺗﻮﺍﻥ ﺗﻤﺎﻣﻲ ﻋﻤﻠﻴﺎﺗﻲ ﺭﺍ ﮐﻪ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﺪ ﺭﺍ ﺩﺭ ﭼﻬﺎﺭ ﻻﻳﻪ ﻣﺘﻔﺎﻭﺕ ﺗﺒﻴﻦ ﻭ ﺗﻌﺮﻳﻒ ﮐﺮﺩ. ﻻﻳﻪ ﺭﺍﺑﻂ ﮐﺎﺭﺑﺮ ﻻﻳﻪ ﺍﺭﺗﺒﺎﻃﻲ ﻻﻳﻪ ﻣﻴﺎﻧﻲ ﻻﻳﻪ ﺩﺍﺩﻩ
36
ﻫﺮ ﻳﮏ ﺍﺯ ﻻﻳﻪ ﻫﺎﻱ ﻓﻮﻕ ﻣﺴﺌﻮﻟﻴﺖ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻣﺘﻔﺎﻭﺗﻲ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺷﺘﻪ ﻭ ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ،ﺟﺎﻳﮕﺎﻩ ﻫﺮ ﻳﮏ ﺍﺯ ﻻﻳﻪ ﻫﺎﻱ
ﻓﻮﻕ ﺩﺭ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ﺗﺸﺮﻳﺢ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺗﺒﻴﻦ ﺟﺎﻳﮕﺎﻩ ﻫﺮ ﻳﮏ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭﻻﻳﻪ ﻫﺎ ،ﭘﺮﺩﺍﺧﺘﻪ ﺧﻮﺍﻫﺪ ﺷﺪ. ﺁﺷﻨﺎﺋﻲ ﺑﺎ ﻋﻤﻠﮑﺮﺩ ﻫﺮ ﻻﻳﻪ ﻭ ﺷﻨﺎﺧﺖ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ،ﺯﻣﻴﻨﻪ ﺷﻨﺎﺧﺖ ﺍﺻﻮﻟﻲ، ﻣﻨﻄﻘﻲ ﻭ ﺳﻴﺴﺘﻤﺎﺗﻴﮏ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ﺭﺍ ﺑﻮﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺁﻭﺭﺩ .ﺩﺍﻣﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﺧﻲ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎ ﺻﺮﻓﺎ" ﺩﺭ ﺣﺪ ﻭ ﺍﻧﺪﺍﺯﻩ ﻳﮏ ﻻﻳﻪ ﺑﻮﺩﻩ ﻭ ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎ ﺩﺍﺭﺍﻱ ﻋﻤﺎﮐﺮﺩﻱ ﻓﺮﺍ ﻻﻳﻪ ﺍﻱ ﺑﻮﺩﻩ ﻭ ﻣﻤﮑﻦ ﺍﺳﺖ ﺩﺭ ﭼﻨﺪﻳﻦ ﻻﻳﻪ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﻧﺪ.
37
ﻻﻳﻪ ﺭﺍﺑﻂ ﮐﺎﺭﺑﺮ ﻻﻳﻪ ﺭﺍﺑﻂ ﮐﺎﺭﺑﺮ ﺑﺨﺸﻲ ﺍﺯ ﻳﮏ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺑﻮﺩﻩ ﮐﻪ ﻣﺴﺌﻮﻟﻴﺖ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﮐﺎﺭﺑﺮﺍﻥ ﺭﺍ
ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ .ﮐﺎﺭﺑﺮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻣﮑﺎﻧﺎﺕ ﻻﻳﻪ ﻓﻮﻕ ،ﻗﺎﺩﺭ ﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻣﮑﺎﻧﺎﺕ ﻭ ﭘﺘﺎﻧﺴﻴﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﻻﻳﻪ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﺯﻳﺮ ﺍﺳﺖ : ﺭﺍﺑﻂ ﮐﺎﺭﺑﺮ ﺑﻌﻨﻮﺍﻥ ﻳﮏ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺑﻴﻦ ﺩﻧﻴﺎﻱ ﮐﺎﺭﺑﺮﺍﻥ ﻭ ﺩﻧﻴﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺳﺖ.
ﺑﺨﺶ ﺭﺍﺑﻂ ﮐﺎﺭﺑﺮ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺮﻭﺭﮔﺮ ،ﺍﺭﺍﺋﻪ ﻣﻲ ﮔﺮﺩﺩ. ﺗﻤﺎﻡ ﺑﺤﺚ ﻫﺎ ﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﻻﻳﻪ ﺭﺍﺑﻂ ﮐﺎﺭﺑﺮ ،ﺑﺎ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﺁﻏﺎﺯ ﻣﻲ ﮔﺮﺩﺩ. ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻟﻲ ﺗﻮﺳﻂ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﺗﻮﺳﻂ ﻣﺮﻭﺭﮔﺮ ﻭﺏ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ. ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﺩﺍﺭﺍﻱ ﺍﻣﮑﺎﻧﺎﺕ ﻻﺯﻡ ﺑﺮﺍﻱ ﺗﻔﺴﻴﺮ ﺗﮓ ﻫﺎﻱ Htmlﻭ ﻧﺤﻮﻩ ﻧﻤﺎﻳﺶ ﺁﻧﺎﻥ ﻣﻲ ﺑﺎﺷﻨﺪ. ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺮﻡ ﻫﺎﻱ ﻭﺏ ﺍﻣﮑﺎﻥ ﺍﺧﺬ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﮐﺎﺭﺑﺮﺍﻥ ﻭ ﺍﺭﺳﺎﻝ ﺁﻧﻬﺎ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﺁﻭﺭﻧﺪ. ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﭘﺲ ﺍﺯ ﺍﺧﺬ ﺍﻃﻼﻋﺎﺕ ﻻﺯﻡ ﺍﺯ ﮐﺎﺭﺑﺮﺍﻥ ،ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺘﺪﻫﺎﻱ GETﻭ ﻳﺎ POSTﭘﺮﻭﺗﮑﻞ ،HTTPﺁﻧﻬﺎ ﺭﺍ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﻨﺪ. ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﺑﻤﻨﻈﻮﺭ ﭘﺸﺘﻴﺎﻧﻲ ﻭ ﻧﮕﻬﺪﺍﺭﻱ ﻭﺿﻌﻴﺖ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﺍﺯ ﮐﻮﮐﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
38
ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ ﻻﻳﻪ ﻭﺍﺑﺴﺘﻪ ﺑﻪ ﻧﻮﻉ ﻣﺮﻭﺭﮔﺮ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﻣﻤﮑﻦ ﺍﺳﺖ ﺑﺮﺧﻲ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎ ﺗﻮﺳﻂ ﺑﺮﺧﻲ ﺍﺯ ﻣﺮﻭﺭﮔﺮﻫﺎ ﺣﻤﺎﻳﺖ ﻧﺸﺪﻩ ﻭ ﻳﺎ ﺑﺮﺧﻲ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎ ﺍﺯ ﻳﮏ ﻧﺴﺨﻪ ﺧﺎﺹ ﺩﺭ ﻣﺮﻭﺭﮔﺮ ﭘﻴﺶ ﺑﻴﻨﻲ ﺷﺪﻩ ﺑﺎﺷﻨﺪ. ﺟﺎﻳﮕﺎﻩ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﻳﮑﻲ ﺍﺯ ﺷﺎﻫﮑﺎﺭﻫﺎﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻮﺩﻩ ﮐﻪ ﮐﺎﺭﺑﺮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﺎﻥ
ﻗﺎﺩﺭ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻭﺏ ﺳﺎﻳﺖ ﻫﺎ ﻭ ﻣﺸﺎﻫﺪﻩ ﺻﻔﺤﺎﺕ ﻭﺏ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻓﻮﻕ ﺍﺯ
ﺟﺎﻳﮕﺎﻩ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﻲ ﺗﺤﺖ ﻭﺏ ﺩﺍﺭﺍﻱ ﻧﻘﺶ ﺑﺴﻴﺎﺭ ﻣﻬﻤﻲ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﺎﻥ ﻭﺏ ﺑﺮﺍﻱ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺑﺨﺶ ﺭﺍﺑﻂ ﮐﺎﺭﺑﺮ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺧﻮﺩ ﺍﺯ ﺍﻣﮑﺎﻧﺎﺕ ﮔﺴﺘﺮﺩﻩ ﺍﻳﻦ ﻧﻮﻉ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ. ﺗﻌﺎﺭﻳﻒ ﻣﺘﻔﺎﻭﺕ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ: ﻣﺮﻭﺭﮔﺮ ﻭﺏ ،ﺑﺮﻧﺎﻣﻪ ﺍﻱ ﺍﺳﺖ ﮐﻪ ﺍﻃﻼﻋﺎﺕ ﺩﺭﺧﻮﺍﺳﺖ ﺷﺪﻩ ﺗﻮﺳﻂ ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﺍﻃﻼﻉ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻭﺏ ﺭﺳﺎﻧﺪﻩ ﻭ ﭘﺲ ﺍﺯ ﺍﺧﺬ ﺍﻃﻼﻋﺎﺕ ،ﺁﻧﻬﺎ ﺭﺍ ﺑﺎ ﻳﮏ ﻓﺮﻣﺖ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺑﺮ ﺭﻭﻱ ﺻﻔﺤﺎﺕ ﻧﻤﺎﻳﺸﮕﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﮐﺎﺭﺑﺮﺍﻥ ،ﻧﻤﺎﻳﺶ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ. ﻳﮏ ﻣﺮﻭﺭﮔﺮ ﻭﺏ ،ﺑﺮﻧﺎﻣﻪ ﺍﻱ ﺍﺳﺖ ﮐﻪ ﺑﻪ ﻣﺘﻘﺎﺿﻲ ﺻﻔﺤﺎﺕ ﻭﺏ ،ﺍﻣﮑﺎﻥ ﻣﺸﺎﻫﺪﻩ ﺻﻔﺤﺎﺕ ﻭ ﺧﻮﺍﻧﺪﻥ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺭﺍ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ Internet
(IE(Explorerﻭ Navigator Netscapeﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﻣﺘﺪﺍﻭﻝ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻣﻲ ﺑﺎﺷﻨﺪ. ﺑﻤﻨﻈﻮﺭ ﻣﺸﺎﻫﺪﻩ ﺻﻔﺤﺎﺕ ﻭﺏ ﻣﺮﺑﻮﻁ ﺑﻪ ﻳﮏ ﻭﺏ ﺳﺎﻳﺖ ،ﺍﺯ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﮐﺎﺭﺑﺮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ،ﻗﺎﺩﺭ ﺑﻪ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻟﻲ ﺗﻮﺳﻂ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻭﺏ ﻭ ﻣﺸﺎﻫﺪﻩ ﺁﻧﺎﻥ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ. 39
ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ،ﺑﺮﻧﺎﻣﻪ ﻫﺎﺋﻲ ﻣﻲ ﺑﺎﺷﻨﺪ ﮐﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﺎﻥ ﺍﻣﮑﺎﻥ ﻣﺸﺎﻫﺪﻩ ﺻﻔﺤﺎﺕ ﻭﺏ ،ﺍﺧﺬ ﻓﺎﻳﻞ ﻭ ﺳﺎﻳﺮ ﻋﻤﻠﻴﺎﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﮐﺎﺭﺑﺮﺍﻥ ﺩﺭ ﺯﻣﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﻣﺮﻭﺭﮔﺮﻫﺎ ،ﺻﻔﺤﺎﺕ ﻭﺏ ﺭﺍ ﮐﻪ ﺍﻏﻠﺐ ﺑﺼﻮﺭﺕ ﺗﮓ ﻫﺎﻱ Htmlﻣﻲ ﺑﺎﺷﻨﺪ ،ﺧﻮﺍﻧﺪﻩ ﻭ ﭘﺲ ﺍﺯ ﺗﻔﺴﻴﺮ ﮐﺪﻫﺎﻱ ﻣﻮﺟﻮﺩ ،ﺯﻣﻴﻨﻪ ﻧﻤﺎﻳﺶ ﻣﺤﺘﻮﻳﺎﺕ ﻭ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﺁﻭﺭﻧﺪ.
ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﻋﻼﻭﻩ ﺑﺮ ﺍﻣﮑﺎﻥ ﺗﻔﺴﻴﺮ ﺗﮓ ﻫﺎﻱ Htmlﺑﻤﻨﻈﻮﺭ ﺗﺒﻴﻦ ﻧﺤﻮﻩ ﻧﻤﺎﻳﺶ ،ﺩﺍﺭﺍﻱ ﻋﻨﺎﺻﺮ ﻻﺯﻡ ﺑﻤﻨﻈﻮﺭ ﺗﻔﺴﻴﺮ ﺍﺳﮑﺮﻳﭙﺖ ﻫﺎﻱ ﻧﻮﺷﺘﻪ ﺷﺪﻩ ﺑﺎ ﻳﮑﻲ ﺍﺯ ﺯﺑﺎﻧﻬﺎﻱ ﺍﺳﮑﺮﻳﭙﺖ ﻧﻴﺰ ﻣﻲ ﺑﺎﺷﻨﺪ. ﺟﺎﻭﺍ ﺍﺳﮑﺮﻳﭙﺖ ﻭ VBscriptﺩﻭ ﻧﻤﻮﻧﻪ ﻣﺘﺪﺍﻭﻝ ﺍﺯ ﺯﺑﺎﻧﻬﺎﻱ ﺍﺳﮑﺮﻳﭙﺖ ﺑﻮﺩﻩ ﮐﻪ ﺩﺭ ﺍﮐﺜﺮ ﺻﻔﺤﺎﺕ ﭘﻮﻳﺎ ﺩﺍﺭﺍﻱ ﺣﻀﻮﺭﻱ ﻓﻌﺎﻝ ﻣﻲ ﺑﺎﺷﻨﺪ. ﻧﮕﺮﺵ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻌﻤﻮﻟﻲ ﻭ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﺎﻥ ﻭﺏ ﺑﻪ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﮐﺎﻣﻼ" ﻣﺘﻤﺎﻳﺰ ﺑﻮﺩﻩ ﻭ ﻫﺮ ﻳﮏ ﺑﺎ ﺗﻮﺟﻪ ﻧﻮﻉ ﺧﻮﺍﺳﺘﻪ ﻭ ﺍﻧﺘﻈﺎﺭ ﺧﻮﺩ ﺍﺯ ﭘﺘﺎﻧﺴﻴﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ،ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ.
40
ﻣﺮﻭﺭﮔﺮ InterNet Explorer
ﻣﺮﻭﺭﮔﺮ Netscape Communicator
ﻣﺮﻭﺭﮔﺮﻫﺎ ﺭﻭﻧﺪ ﺗﮑﺎﻣﻞ ﻭ ﺷﮑﻞ ﮔﻴﺮﻱ ﻃﺮﺍﺣﻲ ،ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻭ ﺗﻮﺳﻌﻪ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﻣﻄﺮﺡ ﺷﺪﻥ ﻭﺏ ،ﺁﻏﺎﺯ ﻭ ﻫﻤﭽﻨﺎﻥ ﺍﺩﺍﻣﻪ ﺩﺍﺭﺩ 41
. . WorldWideWebﺍﻳﻦ ﻣﺮﻭﺭﮔﺮ ﺗﻮﺳﻂ " ﺗﻴﻢ .ﺑﺮﻧﺮﺯ ﻟﻲ " ﺩﺭ ﺳﺎﻝ ١٩٩٠ﻭ ﺑﺮ ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ NeXTﺩﺭ CERNﻧﻮﺷﺘﻪ ﮔﺮﺩﻳﺪ. " . libwwwﺗﻴﻢ.ﺑﺮﻧﺮﺯ ﻟﻲ " ﻭ ﺩﺍﻧﺸﺠﻮﺋﻲ ﺑﺎ ﻧﺎﻡ " "Jean-Francois Groffﺍﺯ CERNﺩﺭ ﺳﺎﻝ ،١٩٩٢ﻣﺮﻭﺭﮔﺮ WorldWideWebﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺯﺑﺎﻥ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﻲ Cﺑﺎﺯﻧﻮﻳﺴﻲ ﻧﻤﻮﺩﻧﺪ. . Line-Modeﺩﺍﻧﺸﺠﻮﺋﻲ ﺑﺎ ﻧﺎﻡ " "Nicola pellowﺍﺯ ﺩﺍﻧﺸﺠﻮﻳﺎﻥ ﺭﻳﺎﺿﻲ CERNﺩﺭ ﺳﺎﻝ ، ١٩٩١ﻳﮏ ﻣﺮﻭﺭﮔﺮ ﺧﻄﻲ ﻃﺮﺍﺣﻲ ﻧﻤﻮﺩ ﮐﻪ ﻗﺎﺑﻠﻴﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺑﺮ
ﺭﻭﻱ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﺘﻌﺪﺩ ﺭﺍ ﺩﺍﺷﺖ .ﺩﺭ ﺍﺩﺍﻣﻪ "ﻧﻴﮑﻼ" ﻭ ﺩﺳﺘﻴﺎﺭﺍﻧﺶ ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ ﺭﺍ ﺑﺮ ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﺘﻨﻮﻋﻲ )ﺍﺯ ﻳﻮﻧﻴﮑﺲ ﺗﺎ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ (DOS ﻓﺮﺍﻫﻢ ﻧﻤﻮﺩﻧﺪ. . ViolaWWWﺩﺭ ﺳﺎﻝ ١٩٩٢ﺗﻮﺳﻂ ﺩﺍﻧﺸﺠﻮﺋﻲ ﺑﺎ ﻧﺎﻡ " "Pei Weiﺍﺯ ﺩﺍﻧﺸﮕﺎﻩ ﺑﺮﮐﻠﻲ ﮐﺎﻟﻴﻔﺮﻧﻴﺎ ،ﺩﻭﻣﻴﻦ ﻣﺮﻭﺭﮔﺮ ﺑﺮﺍﻱ ﻳﻮﻧﻴﮑﺲ ﻃﺮﺍﺣﻲ ﮔﺮﺩﻳﺪ. . Midasﺩﺭ ﺳﺎﻝ ١٩٩٢ﺗﻮﺳﻂ " "Tony Johnsonﺩﺭ ،SLACﺳﻮﻣﻴﻦ ﻣﺮﻭﺭﮔﺮ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻳﻮﻧﻴﮑﺲ ﻃﺮﺍﺣﻲ ﮔﺮﺩﻳﺪ .ﻫﺪﻑ ﺍﺯ ﻃﺮﺍﺣﻲ ﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ ﺟﻤﻊ ﺁﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﺤﻘﻴﻘﺎﺕ ﻓﻴﺰﻳﮏ ﺑﻮﺩ. . Sambaﺍﻭﻟﻴﻦ ﻣﺮﻭﺭﮔﺮ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﮑﻴﻨﺘﺎﺵ ﮐﻪ ﺗﻮﺳﻂ " Robert "Cailliauﻃﺮﺍﺣﻲ ﻭ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﮔﺮﺩﻳﺪ.ﻧﺴﺨﻪ ﻧﻬﺎﺋﻲ ﻭ ﻋﻤﻠﻴﺎﺗﻲ ﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ ﺍﻭﺍﺧﺮ ﺳﺎﻝ ١٩٩٢ﻋﺮﺿﻪ ﮔﺮﺩﻳﺪ.
42
ﻣﻮﺯﺍﺋﻴﮏ .ﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ ﺗﻮﺳﻂ " "Andreessen Marcﻭ " "Eric Binaﺍﺯ NCSA ﺩﺭ ﺳﺎﻝ ١٩٩٣ﺑﺮﺍﻱ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ X-Windowsﻭ ﺑﺮ ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻳﻮﻧﻴﮑﺲ ﻋﺮﺿﻪ ﮔﺮﺩﻳﺪ .ﭼﻨﺪ ﻣﺎﻩ ﺑﻌﺪ ﻧﺴﺨﻪ ﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ ﺑﻤﻨﻈﻮﺭ ﺍﺟﺮﺍﺀ ﺑﺮ ﺭﻭﻱ ﺳﻴﺴﺘﻢ
ﻫﺎﻱ ﻣﮑﻴﻨﺘﺎﺵ ﺗﻮﺳﻂ " "Aleks Toticﻃﺮﺍﺣﻲ ﻭ ﻋﺮﺿﻪ ﮔﺮﺩﻳﺪ .ﻣﻮﺯﺍﺋﻴﮏ ،ﺍﻭﻟﻴﻦ ﻣﺮﻭﺭﮔﺮﻱ ﺑﺎ ﻗﺎﺑﻠﻴﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺑﺮ ﺭﻭﻱ ﭘﻼﺕ ﻓﻮﺭﻡ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﺑﻮﺩ .ﺍﻳﻦ ﻣﺮﻭﺭﮔﺮ ﺩﺍﺭﺍﻱ ﺍﻣﮑﺎﻧﺎﺕ ﻣﺘﻌﺪﺩ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺻﻮﺕ ،ﺗﺼﻮﻳﺮ ،ﻓﺎﻳﻞ ﻫﺎﻱ ﺳﻮﺍﺑﻖ ﻭ ...ﺑﻮﺩ .ﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ
ﭘﺲ ﺍﺯ ﻣﺪﺕ ﺯﻣﺎﻥ ﮐﻮﺗﺎﻫﻲ ﺑﻌﻨﻮﺍﻥ ﺭﺍﻳﺞ ﺗﺮﻳﻦ ﻣﺮﻭﺭﮔﺮ ﻏﻴﺮ ﺍﻗﺘﺼﺎﺩﻱ ﻣﻄﺮﺡ ﮔﺮﺩﻳﺪ .ﺩﺭ ﺍﮔﻮﺳﺖ ﺳﺎﻝ NCSA ، ١٩٩٤ﺣﻖ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ ﺭﺍ ﺑﻪ ﺷﺮﮐﺖ Spyglass
ﻭﺍﮔﺬﺍﺭ ﮐﺮﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺷﺮﮐﺖ ﻓﻮﻕ ،ﺍﻣﺘﻴﺎﺯ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺮﻭﺭﮔﺮ ﻣﻮﺯﺍﺋﻴﮏ ﺭﺍ ﺑﻪ ﺷﺮﮐﺖ
ﻫﺎﻱ ﺩﻳﮕﺮ ﻧﻈﻴﺮ ﻣﺎﮐﺮﻭﺳﺎﻓﺖ ﻭﺍﮔﺬﺍﺭ ﮐﺮﺩ NCSA .ﻋﻤﻠﻴﺎﺕ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻭ ﺗﻮﺳﻌﻪ ﻣﺮﻭﺭﮔﺮ ﻣﻮﺯﺍﺋﻴﮏ ﺭﺍ ﺩﺭ ﺳﺎﻝ ١٩٩٧ﻣﺘﻮﻗﻒ ﮐﺮﺩ. . Arenaﺩﺭ ﺳﺎﻝ "Dave Raggett" ،١٩٩٣ﺩﺭ ﻫﻴﻮﻟﺖ ﭘﺎﮐﺎﺭﺩ ) (HPﺷﻬﺮ ﺑﺮﻳﺴﺘﻮﻝ ﺍﻧﮕﻠﺴﺘﺎﻥ ،ﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ ﺭﺍ ﻃﺮﺍﺣﻲ ﻭ ﻋﺮﺿﻪ ﻧﻤﻮﺩ .ﺍﻳﻦ ﻣﺮﻭﺭﮔﺮ ﺩﺍﺭﺍﻱ
ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﻓﺮﺍﻭﺍﻧﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺟﺪﺍﻭﻝ ﻭ ﮔﺮﺍﻓﻴﮏ ﺑﻮﺩ. . Lynxﺩﺍﻧﺸﮕﺎﻩ ﮐﺎﻧﺰﺍﺱ ﻳﮏ ﻣﺮﻭﺭﮔﺮ ﻣﺴﺘﻘﻞ ﺑﺮﺍﻱ ﻭﺏ ﺭﺍ ﻃﺮﺍﺣﻲ ﻧﻤﻮﺩ .ﻫﺪﻑ ﺍﺯ ﻃﺮﺍﺣﻲ ﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ ﺗﻮﺯﻳﻊ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺩﺍﻧﺸﮕﺎﻩ ﺑﻮﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﻭ ﺩﺭ ﺳﺎﻝ ،١٩٩٣ ﺩﺍﻧﺸﺠﻮﺋﻲ ﺑﺎ ﻧﺎﻡ " "Lou Montulliﻳﮏ ﺍﻳﻨﺘﺮﻓﻴﺴﻲ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺑﻪ ﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ﺍﺿﺎﻓﻪ
ﻭ ﻧﺴﺨﻪ ﺷﻤﺎﺭﻩ ﺩﻭ ﻣﺮﻭﺭﮔﺮ ﻭﺏ Lynxﺭﺍ ﻋﺮﺿﻪ ﻧﻤﻮﺩ .ﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ ﺑﺴﺮﻋﺖ ﻣﺘﺪﺍﻭﻝ ﻭ ﺑﻌﻨﻮﺍﻥ ﮔﺰﻳﻨﻪ ﺍﻱ ﻣﻨﺎﺳﺐ ﺑﺮﺍﻱ ﺗﺮﻣﻴﻨﺎﻝ ﻫﺎﻱ ﻓﺎﻗﺪ ﺍﻣﮑﺎﻧﺎﺕ ﮔﺮﺍﻓﻴﮑﻲ ﺍﻧﺘﺨﺎﺏ ﻭ ﻫﻤﭽﻨﺎﻥ ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
43
. Operaﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ ﺩﺭ ﺳﺎﻝ ١٩٩٤ﺗﻮﺳﻂ ﻋﺪﻩ ﺍﻱ ﺍﺯ ﻣﺤﻘﻘﻴﻦ ﻳﮏ ﺷﺮﮐﺖ
ﻣﺨﺎﺑﺮﺍﺗﻲ ﺩﺭ ﺍﺳﻠﻮ ﻧﺮﻭﮊ ،ﺑﺎ ﻧﺎﻡ Telenorﻃﺮﺍﺣﻲ ﮔﺮﺩﻳﺪ .ﺩﺭ ﺳﺎﻝ ﻫﺎﻱ ﺑﻌﺪ ﺩﻭ ﺗﻦ ﺍﺯ ﺍﻋﻀﺎﻱ ﮔﺮﻭﻩ ﻓﻮﻕ ،ﺍﺯ Telenorﺟﺪﺍ ﺷﺪﻩ ﻭ ﺷﺮﮐﺖ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ Operaﺭﺍ ﺑﺎ ﻫﺪﻑ ﺗﻮﻟﻴﺪ ﺗﺠﺎﺭﻱ ﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ ،ﺗﺎﺳﻴﺲ ﮐﺮﺩﻧﺪ .ﻧﺴﺨﻪ Oper 2.1ﺩﺭ ﺳﺎﻝ ١٩٩٦ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻋﻤﻮﻡ ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﻋﺮﺿﻪ ﮔﺮﺩﻳﺪ.
. InterNet In A Boxﺩﺭ ﺳﺎﻝ O'Reilly ،١٩٩٤ﻭ ﻣﺘﺤﺪﺍﻧﺶ ،ﻣﺤﺼﻮﻝ ﻓﻮﻕ ﺭﺍ ﻋﺮﺿﻪ ﻧﻤﻮﺩﻧﺪ .ﻣﺤﺼﻮﻝ ﻓﻮﻕ ﺷﺎﻣﻞ ﺗﻤﺎﻣﻲ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺿﺮﻭﺭﻱ ﻭ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﮐﺎﺭﺑﺮﺍﻥ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻮﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﮐﺎﺭﺑﺮﺍﻥ ﺑﺎ ﻧﺼﺐ ﺻﺮﻓﺎ" ﻳﮏ
ﺑﺮﻧﺎﻣﻪ ﺍﺯ ﻧﺼﺐ ﻭ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﺍﻣﮑﺎﻧﺎﺕ ﻣﻮﺟﻮﺩ ﺑﻲ ﻧﻴﺎﺯ ﻣﻲ ﺷﺪﻧﺪ.
. Mozillaﺩﺭ ﺍﮐﺘﺒﺮ ﺳﺎﻝ ، ١٩٩٤ﺷﺮﮐﺖ ﻧﺖ ﺍﺳﮑﻴﭗ ،ﺍﻭﻟﻴﻦ ﻧﺴﺨﻪ ﻣﺮﻭﺭﮔﺮ ﺧﻮﺩ ﺭﺍ ﺑﺎ ﻧﺎﻡ Mozilla 0.96bﻋﺮﺿﻪ ﻧﻤﻮﺩﻧﺪ ) .ﻧﺴﺨﻪ ﻓﻮﻕ ﻧﺴﺨﻪ ﺑﺘﺎ ﺑﻮﺩ ( .ﺩﺭ ﺩﺳﺎﻣﺒﺮ
ﻫﻤﺎﻥ ﺳﺎﻝ ،ﻧﺴﺨﻪ ﻧﻬﺎﺋﻲ ﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ ﺑﺎ ﻧﺎﻡ ١,٠ Mozillaﻋﺮﺿﻊ ﮔﺮﺩﻳﺪ .ﻣﺮﻭﺭﮔﺮ
ﻓﻮﻕ ﺍﻭﻟﻴﻦ ﻣﺮﻭﺭﮔﺮ ﺗﺠﺎﺭﻱ ﺩﺭ ﻋﺮﺻﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺖ . . Internet Explorerﺩﺭ ﺍﮔﻮﺳﺖ ﺳﺎﻝ ،١٩٩٥ﺷﺮﮐﺖ ﻣﺎﮐﺮﻭﺳﺎﻓﺖ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﻣﻌﺮﻓﻲ ﻭﻳﻨﺪﻭﺯ ، ٩٥ﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ ﺭﺍ ﻋﺮﺿﻪ ﻧﻤﻮﺩ .ﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ ﺑﻬﻤﺮﺍﻩ ﻣﺮﻭﺭﮔﺮ ﺷﺮﮐﺖ ﻧﺖ ﺍﺳﮑﻴﭗ ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﻧﻮﻉ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﺑﻮﺩﻩ ﮐﻪ ﺗﻮﺳﻂ ﺍﮐﺜﺮ ﮐﺎﺭﺑﺮﺍﻥ
ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﺣﺎﻝ ﺣﺎﺿﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﻧﺪ. ● ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ﺷﺎﻣﻞ ﺩﺭﺧﻮﺍﺳﺖ ﻫﺎﺋﻲ ﺍﺯ ﻃﺮﻑ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻭﺏ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻣﺮﻭﺭﮔﺮﻫﺎ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﺩﺭﺧﻮﺍﺳﺖ ﺧﻮﺩ ﺍﺯ ﭘﺮﻭﺗﮑﻞ
44
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻭﺍﮊﻩ "ﻣﺮﻭﺭﮔﺮ " ﺑﺮﺍﻱ. ﻭ ﻳﺎ ﺳﺎﻳﺮ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪHttp ﭼﺮﺍﮐﻪ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻓﻮﻕ ﻋﻼﻭﻩ ﺑﺮ، ﺍﻳﻦ ﻧﻮﻉ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎ ﭼﻨﺪﺍﻥ ﻣﻨﻄﻘﻲ ﺑﻨﻈﺮ ﻧﻤﻲ ﺭﺳﺪ ﺩﺍﺭﺍﻱ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﻭ ﻓﺮﺍﻭﺍﻧﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺑﺮﻧﺎﻣﻪ، ﺍﻣﮑﺎﻥ ﺑﺎﺯﻳﺎﺑﻲ ﻭ ﻧﻤﺎﻳﺶ ﺍﻃﻼﻋﺎﺕ
.ﻧﻮﻳﺴﻲ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ﻣﻲ ﺑﺎﺷﻨﺪ
ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻓﻮﻕ ﺑﻤﻨﺰﻟﻪ ﻳﮏ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻣﻨﺎﺳﺐ ﺑﺮﺍﻱ ﭘﺮﺩﺍﺯﺵ ﻭ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻣﺘﻔﺎﻭﺕ
ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﺎﻥ ﻭﺏ ﺑﺪﻭﻥ ﺷﻨﺎﺧﺖ ﻭ ﺗﻮﺟﻪ ﺑﻪ ﭘﺘﺎﻧﺴﻴﻞ ﻭ ﺍﻣﮑﺎﻧﺎﺕ.ﺍﻳﻔﺎﻱ ﻭﻇﻴﻔﻪ ﻣﻲ ﻧﻤﺎﻳﻨﺪ
. ﺧﻮﺩ ﻧﺨﻮﺍﻫﻨﺪ ﺑﻮﺩ، ﻗﺎﺩﺭ ﺑﻪ ﺁﻓﺮﻳﻨﺶ ﺁﺛﺎﺭ ﻣﺎﻧﺪﮔﺎﺭ،ﻣﺮﻭﺭﮔﺮﻫﺎ ﻣﻘﺎﻳﺴﻪ ﺍﻣﮑﺎﻧﺎﺕ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﻮﻉ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ Windows Table XML color n n n n y y s y n y n y n n n n n n n n y y n y n y n y n n n n y y n y n y n n Macintosh Table XML color n n n n
I frames n n y y y y n n n n n n n n n n n n n n
java script N N Y Y Y Y N N N N Y Y Y Y S N Y Y Y N
font color y n y y y y y y n n y y y y y n y y y n
font size y n y y y y y y y n y y y y y y y y y n
plugins n n y y y y n n n n y y y y y n s y y n
I java dhtmlgif89 CSS frames script n n n n N n n n n N
font color n n
font size n n
plugtablesframes javabrowsers ins n n n n AOL 2.7 n n n n AOL 1.0 Cyberdog n y y n 2.0 y y y y IE 5.0 y y y y IE 4.0 y y y y IE 3.0 y y y n IE 2.0 n y y n Mosaic 3.07 n y n n Mosaic 2.0 n n n n Mosaic 1.0 y y y y NS 6 y y y y NS 4.74 y y y y NS 4.5
dhtmlgif89 CSS n n y y y n n n n n y y y n n n n n n n
n n y y y y n n n n y y y y y n y y y n
n n y y y y n n n n y y y n n n y y n n
n
n
n
n
y
n
N
y
y
s n n n n n n y n n
y y y n n n n y y y
y y y n n n n n n n
y y n n n n n y y y
y y y n n n n y y y
y y y n n n n y y y
Y Y Y N N N N Y Y Y
y y y y y n n y y y
y y y y y n n y y y
45
tablesframes javabrowsers y n y y y y y y y n y y y y y y y y y y
y n y y y y n n y n y y y y y n y y y y
n n y y y y n n n n y y y y y n y n n n
AOL 3.0 AOL 1.0 IE 5.5 IE 5.0 IE 4.0 IE 3.0 IE 2.0 IE 1.0 Mosaic 3.0 Mosaic 1.0 NS 6 NS 4.7 NS 4.5 NS 3.0 NS 2.0 NS 1.1 Opera 4.2 Opera 3.60 Opera 3.5 Lynx
n y n y n n n n Unix Table XML color y y n y n n n n y y n y n n n n n n n n n n Linux Table XML color y y y y n n y y y y n n Television Table XML color n y NextStep Table XML color
n n n n
Y Y S N
y y y n
y y y y
y y y n
java script Y Y N N Y Y Y S N N N
font color y y n n y y y y n n n
font size y y n n y y y y y y n
plugins y y n n y y y y n n n
java script Y Y Y N N N
font color y y y y y n
font size y y y y y n
plugins y y y n s n
I java dhtmlgif89 CSS frames script n n y n Y
font color y
font size y
plugtablesframes javabrowsers ins n y y n WebTV
I java dhtmlgif89 CSS frames script
font color
font size
n
n
s
n
n
n
y
y
n
n
n
n
n
n
y
y
plugtablesframes javabrowsers ins OmniWeb n y y n 2.1 OmniWeb n n n n 1.0
n n
java script n n y n
font color y y y n
font size y y y n
OS/2 Table XML color n n n n n n n n
I frames y y n n n n n n n n n I frames n n y n n n
I frames n n n n
y n n n
y y y n
s s n n
dhtmlgif89 CSS y y n n y y n n n n n
y y n n y y y y n n n
y y n n n n n n n y n
dhtmlgif89 CSS y n n n n n
y y s y y n
y y y y y n
dhtmlgif89 CSS n n n n
y n y n
n n n n
46
plugins n n n n
y y y y
y y y n
y y n n
NS NS NS NS
4.06 3.0 2.0 1.1
tablesframes javabrowsers y y y n y y y y y y y
y y n n y y y y n n y
y y n n y y y y n n n
IE 4.01 IE 4.01 Mosaic 2.75 Mosaic 1.0 NS 4.6 NS 4.06 NS 3.0 NS 2.0 NS 1.1 Arena 3 Lynx
tablesframes javabrowsers y y y y y y
y y y y y y
y s y n n n
NS 6 Mozilla NS 4.7 Amaya Opera 4a Lynx
tablesframes javabrowsers y y y y
n n y y
n n n n
NS 2.02 Web IE 1.1 Opera Lynx
ﺯﻳﺮ ﺳﺎﺧﺖ ﺍﻳﻨﺘﺮﻧﺖ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺷﺒﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ) ﺑﺰﺭﮒ ،ﮐﻮﭼﮏ ( ﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺍﺳﺖ.
ﺷﺒﮑﻪ ﻫﺎﻱ ﻓﻮﻕ ﺑﺎ ﺭﻭﺵ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻭ ﻣﻮﺟﻮﺩﻳﺖ ﻭﺍﺣﺪﻱ ﺑﺎ ﻧﺎﻡ
"ﺍﻳﻨﺘﺮﻧﺖ" ﺭﺍ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩﻩ ﺍﻧﺪ .ﻧﺎﻡ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺑﺮﺍﻱ ﺷﺒﮑﻪ ﻓﻮﻕ ﺍﺯ ﺗﺮﮐﻴﺐ ﻭﺍﮊﻩ ﻫﺎﻱ " "Interconnectedﻭ" "Networkﺍﻧﺘﺨﺎﺏ ﺷﺪﻩ ﺍﺳﺖ ) .ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﻬﻢ ﻣﺮﺗﺒﻂ(.
ﺍﻳﻨﺘﺮﻧﺖ ﻓﻌﺎﻟﻴﺖ ﺍﻭﻟﻴﻪ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺳﺎﻝ ١٩٦٩ﻭ ﺑﺎ ﭼﻬﺎﺭ ﺩﺳﺘﮕﺎﻩ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻴﺰﺑﺎﻥ )(host
ﺁﻏﺎﺯ ﻭ ﭘﺲ ﺍﺯ ﺭﺷﺪ ﺑﺎﻭﺭﻧﮑﺮﺩﻧﻲ ﺧﻮﺩ ،ﺗﻌﺪﺍﺩ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ﺩﺭ ﺷﺒﮑﻪ ﺑﻪ ﺑﻴﺶ ﺍﺯ ﺩﻩ ﻫﺎ ﻣﻴﻠﻴﻮﻥ ﺩﺳﺘﮕﺎﻩ ﺭﺳﻴﺪﻩ ﺍﺳﺖ .ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﻫﻴﭻ ﺳﺎﺯﻣﺎﻥ ﻭ ﻳﺎ ﻣﻮﺳﺴﻪ ﺧﺎﺻﻲ ﺩﺭ ﺟﻬﺎﻥ
ﺗﻌﻠﻖ ﻧﺪﺍﺭﺩ .ﻋﺪﻡ ﺗﻌﻠﻖ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﻳﮏ ﺳﺎﺯﻣﺎﻥ ﻭﻳﺎ ﻣﻮﺳﺴﻪ ﺑﻪ ﻣﻨﺰﻟﻪ ﻋﺪﻡ ﻭﺟﻮﺩ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﺍﻧﺠﻤﻦ ﻫﺎﻱ ﺧﺎﺻﻲ ﺑﺮﺍﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﺳﺎﺯﻱ ﻧﻴﺴﺖ .ﻳﮑﻲ ﺍﺯ ﺍﻳﻦ ﺍﻧﺠﻤﻦ ﻫﺎ" ،ﺍﻧﺠﻤﻦ ﺍﻳﻨﺘﺮﻧﺖ" ﺍﺳﺖ ﮐﻪ ﺩﺭ ﺳﺎﻝ ١٩٩٢ﺑﺎ ﻫﺪﻑ ﺗﺒﻴﻦ ﺳﻴﺎﺳﺖ ﻫﺎ ﻭ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺟﻬﺖ ﺍﺗﺼﺎﻝ
ﺑﻪ ﺷﺒﮑﻪ ﺗﺎﺳﻴﺲ ﺷﺪﻩ ﺍﺳﺖ.
47
ﺳﻠﺴﻠﻪ ﻣﺮﺍﺗﺐ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ
ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﮐﻪ ﺑﻪ ﺷﺒﮑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ ،ﺑﺨﺸﻲ ﺍﺯ ﺷﺒﮑﻪ ﺗﻠـــــﻘﻲ ﻣﻲ ﮔﺮﺩﺩ .ﻣﺜﻼ" ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻠﻔﻦ ) ﻣﻨﺰﻝ ( ﺑﻪ ﻳﮏ ﻣﺮﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ
ﺍﻳﻨﺘﺮﻧﺖ ) (ISPﻣﺘﺼﻞ ﻭ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻌﻨﻮﺍﻥ ﺑﺨﺸﻲ ﺍﺯ ﺷﺒﮑﻪ ﺑﺰﺭﮒ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺤﺴﻮﺏ ﺧﻮﺍﻫﺪ ﺷﺪ. .ﺑﺮﺧﻲ ﺍﺯ ﮐﺎﺭﺑﺮﺍﻥ ﺩﺭ ﺍﺩﺍﺭﺍﺕ ﺧﻮﺩ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺴﺘﺮ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ،ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ،ﮐﺎﺭﺑﺮﺍﻥ
ﺩﺭ ﺍﺑﺘﺪﺍ ﺍﺯ ﺷﺒﮑﻪ ﻣﺤﻠﻲ ﻧﺼﺐ ﺷﺪﻩ ﺩﺭ ﺳﺎﺯﻣﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺷﺒﮑﻪ ﻓﻮﻕ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﻄﻮﻁ ﻣﺨﺎﺑﺮﺍﺗﻲ ﺧﺎﺹ ﻭ ﻳﺎ ﺳﺎﻳﺮ ﺍﻣﮑﺎﻧﺎﺕ ﻣﺮﺑﻮﻃﻪ ﺑﻪ ﻳﮏ ﻣﺮﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﺷﺪﻩ ﺍﺳﺖ .ﻣﺮﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺖ ﻧﻴﺰ ﻣﻤﮑﻦ ﺍﺳﺖ ﺑﻪ ﻳﮏ ﺷﺒﮑﻪ
ﺑﺰﺭﮔﺘﺮ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﺎﺷﺪ .ﺍﻳﻨﺘﺮﻧﺖ ،ﺷﺒﮑﻪ ﺍﻱ ﺍﺳﺖ ﮐﻪ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﻴﺸﻤﺎﺭﻱ ﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺍﺳﺖ ) ﺷﺒﮑﻪ ﺍﻱ ﺍﺯ ﺳﺎﻳﺮ ﺷﺒﮑﻪ ﻫﺎ (
ﺍﮐﺜﺮ ﺷﺮﮐﺖ ﻫﺎﻱ ﻣﺨﺎﺑﺮﺍﺗﻲ ﺑﺰﺭﮒ ﺩﺍﺭﺍﻱ ﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ ﺍﺧﺘﺼﺎﺻﻲ ﺑﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﻧﺎﺣﻴﻪ ﻫﺎﻱ
ﻣﺘﻔﺎﻭﺕ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﻫﺮ ﻧﺎﺣﻴﻪ ،ﺷﺮﮐﺖ ﻣﺨﺎﺑﺮﺍﺗﻲ ﺩﺍﺭﺍﻱ ﻳﮏ " ﻧﻘﻄﻪ ﺣﻀﻮﺭ" ): POP
(Point of Presenceﺍﺳﺖ ، POP .ﻣﮑﺎﻧﻲ ﺍﺳﺖ ﮐﻪ ﮐﺎﺭﺑﺮﺍﻥ ﻣﺤﻠﻲ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺑﻪ ﺷﺒﮑﻪ ﺷﺮﮐﺖ ﻣﺨﺎﺑﺮﺍﺗﻲ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ ) .ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺷﺒﮑﻪ ﺍﺯ ﺧﻄﻮﻁ ﺗﻠﻔﻦ
ﻣﻌﻤﻮﻟﻲ ﻭ ﻳﺎ ﺧﻄﻮﻁ ﺍﺧﺘﺼﺎﺻﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ(.
ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ،ﭼﻨﺪﻳﻦ ﺷﺒﮑﻪ ﺳﻄﺢ ﺑﺎﻻ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﮐﻪ ﺗﻮﺳﻂ " ﻧﻘﺎﻁ ﺩﺳﺘﻴﺎﺑﻲ ﺷﺒﮑﻪ" ) (Network Access Points: NAPﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺮﺗﺒﻂ ﻣﻲ ﮔﺮﺩﻧﺪ.
48
ﻓﺮﺽ ﮐﻨﻴﺪ ،ﺷﺮﮐﺖ Aﻳﮏ ﻣﺮﮐﺰﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺰﺭﮒ ﺑﺎﺷﺪ .ﺩﺭﻫﺮ ﺷﻬﺮﺳﺘﺎﻥ
ﺍﺻﻠﻲ ،ﺷﺮﮐﺖ Aﺩﺍﺭﺍﻱ ﻳﮏ POPﺍﺳﺖ .ﻫﺮ ﻳﮏ ﺍﺯ POPﻫﺎ ﺩﺍﺭﺍﻱ ﺍﻣﮑﺎﻧﺎﺕ ﮔﺴﺘﺮﺩﻩ ﺍﻱ
ﺑﻪ ﻣﻨﻈﻮﺭ ﺗﻤﺎﺱ ﮐﺎﺭﺑﺮﺍﻥ ﻣﺤﻠﻲ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺷﺮﮐﺖ Aﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ POPﻫﺎ ﺑﻴﮑﺪﻳﮕﺮ ﻭ ﺷﺮﮐﺖ ،ﺍﺯ ﺧﻄﻮﻁ ﺍﺧﺘﺼﺎﺻﻲ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﻓﺮﺽ ﮐﻨﻴﺪ ﺷﺮﮐﺖ ،Bﻳﮏ
ﻣﺮﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺖ ﻫﻤﮑﺎﺭﺑﺎﺷﺪ.ﺷﺮﮐﺖ ، Bﺳﺎﺧﺘﻤﺎﻧﻬﺎﻱ ﺑﺰﺭﮔﻲ ﺭﺍ ﺩﺭ ﺷﻬﺮﻫﺎﻱ ﺍﺻﻠﻲ ﺍﻳﺠﺎﺩ ﻭ ﻣﺎﺷﻴﻦ ﻫﺎﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﺩﺭ ﺁﻧﻬﺎ ﻣﺴﺘﻘﺮ ﻧﻤﻮﺩﻩ ﺍﺳﺖ .ﺷﺮﮐﺖ Bﺍﺯ ﺧﻄﻮﻁ ﺍﺧﺘﺼﺎﺻﻲ ﻓﻴﺒــﺮﻧﻮﺭﻱ ﺑﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﺳﺎﺧﺘـﻤﺎﻧﻬﺎﻱ ﺍﺳﺘﻔـــﺎﺩﻩ
ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ،ﺗﻤﺎﻡ ﻣﺸﺘﺮﮐﻴﻦ ﺷﺮﮐﺖ Aﻗﺎﺩﺭ ﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻳﮑﺪﻳﮕﺮ
ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﻭﺿﻌﻴﺖ ﻣﺸﺘﺮﮐﻴﻦ ﺷﺮﮐﺖ Bﻧﻴﺰ ﻣﺸﺎﺑﻪ ﻣﺸﺘﺮﮐﻴﻦ ﺷﺮﮐﺖ Aﺍﺳﺖ .ﺁﻧﻬﺎ ﻧﻴﺰ ﻗﺎﺩﺭ ﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﺍﻣﮑﺎﻥ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﻣﺸﺘﺮﮐﻴﻦ ﺷﺮﮐﺖ Aﻭ ﻣﺸﺘﺮﮐﻴﻦ ﺷﺮﮐﺖ Bﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﺷﺮﮐﺖ ﻫﺎﻱ Aﻭ B ﺗﺼﻤﻴﻢ ﻣﻲ ﮔﻴﺮﻧﺪ ﺍﺯ ﻃﺮﻳﻖ NAPﺩﺭ ﺷﻬﺮﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺑﻴﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﮔﺮﺩﻧﺪ .ﺗﺮﺍﻓﻴﮏ ﻣﻮﺟﻮﺩ ﺑﻴﻦ ﺩﻭ ﺷﺮﮐﺖ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﮑﻪ ﻫﺎﻱ ﺩﺍﺧﻠﻲ ﻭ NAPﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ. ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ،ﻫﺰﺍﺭﺍﻥ ﻣﺮﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺰﺭﮒ ﺍﺯ ﻃﺮﻳﻖ NAPﺩﺭ ﺷﻬﺮﻫﺎﻱ
ﻣﺘﻔﺎﻭﺕ ﺑﻴﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺩﺭ ﻧﻘﺎﻁ ﻓﻮﻕ ) (NAPﺭﻭﺯﺍﻧﻪ ﻣﻴﻠﻴﺎﺭﺩﻫﺎ ﺑﺎﻳﺖ ﺍﻃﻼﻋﺎﺕ ﺟﺎﺑﺠﺎ ﻣﻲ ﮔﺮﺩﺩ .ﺍﻳﻨﺘﺮﻧﺖ ،ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺴﻴﺎﺭ ﺑﺰﺭﮒ ﺑﻮﺩﻩ ﮐﻪ ﺗﻤﺎﻡ ﺁﻧﻬﺎ ﺍﺯ ﻃﺮﻳﻖ NAPﺑﻴـــﮑﺪﻳﮕﺮ ﻣﺮﺗﺒﻂ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﺎﻳﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
ﺗﻤﺎﻡ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺯ ﻃﺮﻳﻖ ،NAPﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﻭ ﺭﻭﺗﺮ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺗﺒﺎﻁ ﺑﺎﻳﮑﺪﻳﮕﺮ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﭘﻴﺎﻡ ﺍﺭﺳﺎﻟﻲ ﺗﻮﺳﻂ ﻳﮏ ﮐﺎﺭﺑﺮ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﭼﻨﺪﻳﻦ ﺷﺒﮑﻪ ﻣﺘﻔﺎﻭﺕ ﻋﺒﻮﺭ ﺗﺎ ﺑﻪ ﮐﺎﻣــــﭙﻴﻮﺗﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺮﺳــﺪ .ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ﺩﺭ ﮐﻤـﺘﺮ ﺍﺯ ﻳﮏ ﺛﺎﻧﻴﻪ
ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ.
49
ﺭﻭﺗﺮ ،ﻣﺴﻴﺮﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺭﺳﺎﻟﻲ ﺗﻮﺳﻂ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﻳﮕﺮ ﺭﺍ ﺗﻌﻴﻴﻦ
ﻣﻲ ﮐﻨﺪ .ﺭﻭﺗﺮﻫﺎ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺧﺎﺻﻲ ﻣﻲ ﺑﺎﺷﻨﺪ ﮐﻪ ﭘﻴﺎﻡ ﻫﺎﻱ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺗﻮﺳﻂ ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺎ ﻭﺟﻮﺩ ﻫﺰﺍﺭﺍﻥ ﻣﺴﻴﺮ ﻣﻮﺟﻮﺩ ﺭﺍ ﻣﺴﻴﺮﻳﺎﺑﻲ ﻭ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﮔﺎﻥ ﻣﺮﺑﻮﻃﻪ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺭﻭﺗﺮ ﺩﻭ ﮐﺎﺭ ﺍﺳﺎﺳﻲ ﺭﺍ ﺩﺭ ﺷﺒﮑﻪ ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﺪ: •
ﺍﻳﺠﺎﺩ ﺍﻃﻤﻴﻨﺎﻥ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻋﺪﻡ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﻣﮑﺎﻧﻬﺎﺋﻲ ﮐﻪ ﺑﻪ ﺁﻧﻬﺎ ﻧﻴﺎﺯ ﻧﻤﻲ ﺑﺎﺷﺪ.
•
ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺍﺭﺳﺎﻝ ﺻﺠﻴﺢ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈﺮ
ﺭﻭﺗﺮﻫﺎ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﻭ ﺷﺒﮑﻪ ﻣﺠﺰﺍ ﺭﺍ ﺑﻴﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻧﻤﺎﻳﻨﺪ .ﺭﻭﺗﺮ ﺑﺎﻋﺚ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ ﺷﺒﮑﻪ ﺩﻳﮕﺮ ،ﺣﻔﺎﻇﺖ ﺷﺒﮑﻪ ﻫﺎ ﺍﺯ ﻳﮑﺪﻳﮕﺮ ﻭ ﭘﻴﺸﮕﻴﺮﻱ ﺍﺯ ﺗﺮﺍﻓﻴﮏ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﻫﺰﺍﺭﺍﻥ ﺷﺒﮑﻪ ﮐﻮﭼﮑﺘﺮ ﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺍﺳﺖ ،ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺗﺮ ﻳﮏ ﺿﺮﻭﺭﺕ ﺍﺳﺖ.
ﺩﺭ ﺳﺎﻝ ١٩٨٧ﻣﻮﺳﺴﻪ ، NSFﺍﻭﻟﻴﻦ ﺷﺒﮑﻪ ﺑﺎ ﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ ﭘﺮ ﺳﺮﻋﺖ ﺭﺍ ﺍﻳﺠﺎﺩ ﮐﺮﺩ .ﺷﺒﮑﻪ ﻓﻮﻕ NSFNETﻧﺎﻣﻴﺪﻩ ﺷﺪ .ﺩﺭ ﺍﻳﻦ ﺷﺒﮑﻪ ﺍﺯ ﻳﮏ ﺧﻂ ﺍﺧﺘﺼﺎﺻﻲ T1ﺍﺳﺘﻔﺎﺩﻩ ﻭ ١٧٠ ﺷﺒﮑﻪ ﮐﻮﭼﮑﺘﺮ ﺑﻴﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻳﺪﻧﺪ .ﺳﺮﻋﺖ ﺷﺒﮑﻪ ﻓﻮﻕ ١,٥٤٤ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ
ﺑﻮﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺷﺮﮐﺖ ﻫﺎﻱ MCI ، IBMﻭ ، Meritﺷﺒﮑﻪ ﻓﻮﻕ ﺭﺍ ﺗﻮﺳﻌﻪ ﻭ ﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ ﺁﻥ ﺭﺍ ﺑﻪ T3ﺗﺒﺪﻳﻞ ﮐﺮﺩﻧﺪ) ٤٥ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ( .ﺑﺮﺍﻱ ﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ ﺷﺒﮑﻪ ﺍﺯ ﺧﻄﻮﻁ ﻓﻴﺒﺮﻧﻮﺭﻱ ) (fiber optic trunkﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﻳﺪ.ﻫﺮ trunkﺍﺯ ﭼﻨﺪﻳﻦ ﮐﺎﺑﻞ ﻓﻴﺒﺮ
ﻧﻮﺭﻱ ﺗﺸﮑﻴﻞ ﻣﻲ ﮔﺮﺩﺩ) ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻓﺰﺍﻳﺶ ﻇﺮﻓﻴﺖ(. ﭘﺮﻭﺗﮑﻞ ﺍﻳﻨﺘﺮﻧﺖ
ﻫﺮ ﻣﺎﺷﻴﻦ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺍﺭﺍﻱ ﻳﮏ ﺷﻤﺎﺭﻩ ﺷﻨﺎﺳﺎﺋﻲ ﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ ﺍﺳﺖ .ﺍﻳﻦ ﺷﻤﺎﺭﻩ ﺷﻨﺎﺳﺎﺋﻲ ،ﺁﺩﺭﺱ (Internet Protocol(IPﻧﺎﻣﻴﺪﻩ ﻣﻲ ﮔﺮﺩﺩ .ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﻣﺸﺎﺑﻪ
ﻳﮏ ﺯﺑﺎﻥ ﺍﺭﺗﺒﺎﻃﻲ ﻣﺸﺘﺮﮎ ﺑﺮﺍﻱ ﮔﻔﺘﮕﻮﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ
50
،ﺑﻪ ﻣﺠﻤﻮﻋﻪ ﻗﻮﺍﻧﻴﻨﻲ ﺍﻃﻼﻕ ﻣﻲ ﮔﺮﺩﺩ ﮐﻪ ﺑﺎ ﺍﺳﺘﻨﺎﺩ ﺑﻪ ﺁﻥ ﮔﻔﺘﮕﻮ ﻭ ﺗﺒﺎﺩﻝ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻴﻦ ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻴﺴﺮ ﺧﻮﺍﻫﺪ ﺷﺪ IP .ﺩﺍﺭﺍﻱ ﻓﺮﻣﺘﻲ ﺑﺼﻮﺭﺕ ٢١١,٢٧,٦٥,١٣٨:ﺍﺳﺖ.
ﺑﺨﺎﻃﺮ ﺳﭙﺮﺩﻥ ﺁﺩﺭﺱ ﻫﺎﻱ IPﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺭﺩ ﻧﻄﺮ ،ﻣﺸﮑﻞ ﺍﺳﺖ. ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺍﺭﺍﻱ ﻧﺎﻡ ﺍﻧﺤﺼﺎﺭﻱ ﺧﻮﺩ ﺷﺪﻩ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﺳﻴﺴﺘﻤﻲ ﺩﻳﮕﺮ،
ﺁﺩﺭﺱ IPﺑﻪ ﻧﺎﻡ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ،ﻧﺴﺒﺖ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ.
ﺩﺭ ﺁﻏﺎﺯ ﺷﮑﻞ ﮔﻴﺮﻱ ﺍﻳﻨﺘﺮﻧﺖ ،ﺗﻌﺪﺍﺩ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺑﺴﻴﺎﺭ ﮐﻢ ﺑﻮﺩ ﻭ ﻫﺮ ﮐﺎﺭﺑﺮ ﮐﻪ ﻗﺼﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺷﺒﮑﻪ ﺭﺍ ﺩﺍﺷﺖ ،ﭘﺲ ﺍﺯ ﺍﺗﺼﺎﻝ ﺑﻪ ﺷﺒﮑﻪ ﺍﺯ ﺁﺩﺭﺱ IPﮐﺎﻣﭙﻴﻮﺗﺮ
ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮐﺮﺩ .ﺭﻭﺵ ﻓﻮﻕ ﻣﺎﺩﺍﻣﻴﮑﻪ ﺗﻌﺪﺍﺩ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ﮐﻢ ﺑﻮﺩﻧﺪ ،ﻣﻔﻴﺪ ﻭﺍﻗﻊ ﮔﺮﺩﻳﺪ ﻭﻟﻲ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺍﻓﺰﺍﻳﺶ ﺗﻌﺪﺍﺩ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ﺩﺭ ﺷﺒﮑﻪ ﺍﻳﻨﺘﺮﻧﺖ ،ﮐﺎﺭﺁﺋﻲ ﺭﻭﺵ ﻓﻮﻕ ﺑﺸﺪﺕ ﺍﻓﺖ ﻭ ﻏﻴﺮﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﻳﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺣﻞ
ﻣﺸﮑﻞ ﻓﻮﻕ ﺍﺯ ﻳﮏ ﻓﺎﻳﻞ ﺳﺎﺩﻩ ﻣﺘﻨﻲ ﮐﻪ ﺗﻮﺳﻂ " ﻣﺮﮐﺰ ﺍﻃﻼﻋﺎﺕ ﺷﺒﮑﻪ " ) (NICﭘﺸﺘﻴﺒﺎﻧﻲ
ﻣﻲ ﮔﺮﺩﻳﺪ ،ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﻳﺪ .ﺑﻤﻮﺍﺯﺍﺕ ﺭﺷﺪ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﻭﺭﻭﺩ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ﺑﻴﺸﺘﺮ ﺩﺭ ﺷﺒﮑﻪ ،ﺣﺠﻢ ﻓﺎﻳﻞ ﻓﻮﻕ ﺍﻓﺰﺍﻳﺶ ﻭ ﺑﺪﻟﻴﻞ ﺳﺎﻳﺮ ﻣﺴﺎﺋﻞ ﺟﺎﻧﺒﻲ ،ﻋﻤﻼ" ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ ﻓﻮﻕ
ﺑﺮﺍﻱ ﺑﺮﻃﺮﻑ ﻣﺸﮑﻞ " ﺗﺒﺪﻳﻞ ﻧﺎﻡ ﺑﻪ ﺁﺩﺭﺱ " ﻓﺎﻗﺪ ﮐﺎﺭﺁﺋﻲ ﻻﺯﻡ ﺑﻮﺩ .ﺩﺭﺳﺎﻝ ، ١٩٨٣ﺳﻴﺴﺘﻢ
(DNS(Domain Name Systemﺍﺭﺍﺋﻪ ﮔﺮﺩﻳﺪ .ﺳﻴﺴﺘﻢ ﻓﻮﻕ ﻣﺴﺌﻮﻝ ﺗﻄﺒﻴﻖ ﻧﺎﻡ ﺑﻪ ﺁﺩﺭﺱ ،ﺑﺼﻮﺭﺕ ﺍﺗﻮﻣﺎﺗﻴﮏ ﺍﺳﺖ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﺑﻪ ﻳﮏ
ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻴﺰﺑﺎﻥ ،ﺻﺮﻓﺎ" ﻣﻲ ﺗﻮﺍﺗﻨﺪ ﻧﺎﻡ ﺁﻥ ﺭﺍ ﻣﺸﺨﺺ ﮐﺮﺩﻩ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ،DNS
ﺁﺩﺭﺱ IPﻣﺮﺑﻮﻃﻪ ﺁﻥ ﻣﺸﺨﺺ ﺗﺎ ﺯﻣﻴﻨﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ. ﻣﻨﻈﻮﺭ ﺍﺯ " ﻧﺎﻡ" ﭼﻴﺴﺖ ؟ ﺩﺭ ﺯﻣﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻭﺏ ﻭ ﻳﺎ ﺍﺭﺳﺎﻝ ﻳﮏ E-Mailﺍﺯ ﻳﮏ "ﻧﺎﻡ ﺣﻮﺯﻩ" ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔـــﺮﺩﺩ.
ﻣــــــﺜﻼ" ( Uniform Resource Locator )URLﻣﺮﺑــــــــــــــــــﻮﻁ ﺑﻪ http://www.oursite.comﺷﺎﻣﻞ " ﻧﺎﻡ ﺣﻮﺯﻩ " oursite.comﺍﺳﺖ. ﺩﺭﺯﻣﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ "ﻧﺎﻡ ﺣﻮﺯﻩ " ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ DNSﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺮﺟـﻤﻪ
51
ﻧﺎﻡ ﺑﻪ ﺁﺩﺭﺱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﻮﺩ .ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ DNSﺩﺭﺧﻮﺍﺳﺖ ﻫﺎﺋﻲ ﺭﺍ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﻭ ﻳﺎ ﺳﺎﻳﺮ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ DNSﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺒﺪﻳﻞ ﻧﺎﻡ ﺑﻪ ﺁﺩﺭﺱ ﺩﺭﻳﺎﻓﺖ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺩﺭ ﺯﻣﺎﻥ ﺩﺭﻳﺎﻓﺖ ﻳﮏ ﺩﺭﺧﻮﺍﺳﺖ ،ﺑﺮ ﺍﺳﺎﺱ ﻳﮑﻲ ﺍﺯ ﺭﻭﺵ ﻫﺎﻱ ﺯﻳﺮ ﺑﺎ ﺁﻥ ﺑﺮﺧﻮﺭﺩ ﺧﻮﺍﻫﺪ ﮐﺮﺩ: •
ﻗﺎﺩﺭ ﺑﻪ ﭘﺎﺳﺦ ﺩﺍﺩﻥ ﺑﻪ ﺩﺭﺧﻮﺍﺳﺖ ﺍﺳﺖ IP .ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺮﺍﻱ ﻧﺎﻡ ﺩﺭﺧﻮﺍﺳﺖ ﺷﺪﻩ ﺭﺍ ﻣﻲ ﺩﺍﻧﺪ .
•
ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺩﻳﮕﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﻳﺎﻓﺘﻦ ﺁﺩﺭﺱ IPﻧﺎﻡ
•
ﺍﻋﻼﻡ " ﻋﺪﻡ ﺁﮔﺎﻫﻲ ﺍﺯ ﺁﺩﺭﺱ IPﺩﺭﺧﻮﺍﺳﺖ ﺷﺪﻩ " ﻭ ﻣﺸﺨﺺ ﮐﺮﺩﻥ ﺁﺩﺭﺱ IP
ﺩﺭﺧﻮﺍﺳﺖ ﺷﺪﻩ ﺍﺳﺖ ).ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﻣﻤﮑﻦ ﺍﺳﺖ ﺗﮑﺮﺍﺭﮔﺮﺩﺩ(
ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺩﻳﮕﺮ ﮐﻪ ﺁﮔﺎﻫﻲ ﺑﻴﺸﺘﺮﻱ ﺩﺍﺭﺩ. •
ﺍﺭﺍﺋﻪ ﻳﮏ ﭘﻴﺎﻡ ﺧﻄﺎﺀ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻋﺪﻡ ﻳﺎﻓﺘﻦ ﺁﺩﺭﺱ ﺑﺮﺍﻱ ﻧﺎﻡ ﺩﺭﺧﻮﺍﺳﺖ ﺷﺪﻩ
ﻓﺮﺽ ﻧﻤﺎﺋﻴﺪ ،ﺁﺩﺭﺱ http://www.oursite.comﺩﺭ ﺑﺮﻧﺎﻣﻪ ﻣﺮﻭﺭﮔﺮ ) (IEﺗﺎﻳﭗ ﺷﺪﻩ ﺑﺎﺷﺪ .ﻣﺮﻭﺭﮔﺮ ﺑﺎ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺭﻳﺎﻓﺖ ﺁﺩﺭﺱ IPﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﻋﻤﻠﻴﺎﺕ ﺟﺴﺘﺠﻮ ﺑﺮﺍﻱ ﻳﺎﻓﺘﻦ ﺁﺩﺭﺱ IPﺭﺍ ﺍﺯ
ﻳﮑﻲ ﺍﺯ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ DNSﺳﻄﺢ ﺭﻳﺸﻪ ،ﺁﻏﺎﺯ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﺭﻳﺸﻪ، ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ IPﺗﻤﺎﻡ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ DNSﮐﻪ ﺷﺎﻣﻞ ﺑﺎﻻﺗﺮﻳﻦ ﺳﻄﺢ ﻧﺎﻣﮕﺬﺍﺭﻱ ﺣﻮﺯﻩ ﻫﺎ ) ORG ،NET ،COMﻭ (...ﺁﮔﺎﻫﻲ ﺩﺍﺭﻧﺪ .ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ،DNS ﺩﺭﺧﻮﺍﺳﺖ ﺁﺩﺭﺱ http://www.oursite.comﺭﺍ ﻧﻤﻮﺩﻩ ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺭﻳﺸﻪ
ﺍﻋﻼﻡ ﻣﻲ ﻧﻤﺎﻳﺪ ﮐﻪ " ﻣﻦ ﺁﺩﺭﺱ ﻓﻮﻕ ﺭﺍ ﻧﻤﻲ ﺩﺍﻧﻢ ﻭﻟﻲ ﺁﺩﺭﺱ IPﻣﺮﺑﻮﻁ ﺑﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ COMﺍﻳﻦ ﺍﺳﺖ " .ﺩﺭ ﺍﺩﺍﻣﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺷﻤﺎ ﺑﺎ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNS ﻣﺮﺑﻮﻁ ﺑﻪ ﺣﻮﺯﻩ COMﺍﺭﺗﺒﺎﻁ ﻭ ﺩﺭﺧﻮﺍﺳﺖ ﺁﺩﺭﺱ IPﺳﺎﻳﺖ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﻣﻲ ﻧﻤﺎﻳﺪ
.ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻓﻮﻕ ﺁﺩﺭﺱ ﻫﺎﻱ IPﻣﺮﺑﻮﻁ ﺑﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺍﻱ ﮐﻪ ﻗﺎﺩﺭ ﺑﻪ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﮔﺬﺍﺷﺘﻦ ﺁﺩﺭﺱ IPﺳﺎﻳﺖ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺳﺖ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺷﻤﺎ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺑﺎ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﻣﺮﺑﻮﻃﻪ ﺗﻤﺎﺱ ﻭ 52
ﺩﺭﺧﻮﺍﺳﺖ ﺁﺩﺭﺱ IPﺳﺎﻳﺖ ﻣﻮﺭﺩ ﻧﻄﺮ ﺭﺍ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺁﺩﺭﺱ IP
ﺳﺎﻳﺖ ﺩﺭﺧﻮﺍﺳﺖ ﺷﺪﻩ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺷﻤﺎ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﺩﺍﺩ. ﺑﺎ ﻣﺸﺨﺺ ﺷﺪﻩ ﺁﺩﺭﺱ IPﺳﺎﻳﺖ ﻣﻮﺭﺩ ﻧﻈﺮ ،ﺍﻣﮑﺎﻥ ﺍﺗﺼﺎﻝ ﺑﻪ ﺳﺎﻳﺖ ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﺷﺪ. ﺍﺯ ﻧﮑﺎﺕ ﻗﺎﺑﻞ ﺗﻮﺟﻪ ﺳﻴﺴﺘﻢ ﻓﻮﻕ ،ﻭﺟﻮﺩ ﭼﻨﺪﻳﻦ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻫﻢ ﺳﻄﺢ DNSﺍﺳﺖ
.ﺑﻨﺎﺑﺮﺍﻳﻦ ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﻳﮑﻲ ﺍﺯ ﺁﻧﻬﺎ ﺑﺎ ﺍﺷﮑﺎﻝ ﻣﻮﺍﺟﻪ ﮔﺮﺩﺩ ،ﺍﺯ ﺳﺎﻳﺮ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺮﺟﻤﻪ ﻧﺎﻡ ﺑﻪ ﺁﺩﺭﺱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻳﮑﻲ ﺩﻳﮕﺮ ﺍﺯ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﺳﻴﺴﺘﻢ ﻓﻮﻕ، ﺍﻣﮑﺎﻥ Cacheingﺍﺳﺖ .ﺯﻣﺎﻧﻴﮑﻪ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺑﻪ ﻳﮏ ﺩﺭﺧﻮﺍﺳﺖ ﭘﺎﺳﺦ ﻻﺯﻡ ﺭﺍ ﺩﺍﺩ ،ﺁﺩﺭﺱ IPﻣﺮﺑﻮﻃﻪ ﺍﻱ ﺭﺍ Cacheﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺯﻣﺎﻧﻴﮑﻪ ﺩﺭﺧﻮﺍﺳﺘﻲ
ﺑﺮﺍﻱ ﻳﮑﻲ ﺍﺯ ﺣﻮﺯﻩ ﻫﺎﻱ COMﻭﺍﺻﻞ ﮔﺮﺩﺩ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺍﺯ ﺁﺩﺭﺱ Cache ﺷﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﺪ ﮐﺮﺩ. ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ DNSﺭﻭﺯﺍﻧﻪ ﺑﻪ ﻣﻴﻠﻴﺎﺭﺩﻫﺎ ﺩﺭﺧﻮﺍﺳﺖ ﭘﺎﺳﺦ ﻣﻲ ﺩﻫﻨﺪ .ﺳﻴﺴﺘﻢ ﻓﻮﻕ ﺍﺯ ﻳﮏ ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﻲ ﺗﻮﺯﻳﻊ ﺷﺪﻩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﺑﻪ ﻣﺘﻘﺎﺿﻴﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ. ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻭﺏ
ﺍﻣﮑﺎﻧﺎﺕ ﻭ ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﻃﺮﻳﻖ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ
ﺍﻳﻨﺘﺮﻧﺖ ﺍﻧﺠﺎﻡ ﻣﻲ ﮔﻴﺮﺩ .ﺗﻤﺎﻡ ﻣﺎﺷﻴﻦ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭ ﻳﺎ ﺳﺮﻭﻳﺲ
ﮔﻴﺮﻧﺪﻩ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻣﺎﺷﻴﻦ ﻫﺎﺋﻲ ﮐﻪ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﻣﺎﺷﻴﻦ ﻫﺎ ،ﺧﺪﻣﺎﺗﻲ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲ ﻧﻤﺎﻳﻨﺪ، ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﻧﺪ .ﻣﺎﺷﻴﻦ ﻫﺎﺋﻲ ﮐﻪ ﺍﺯ ﺧﺪﻣﺎﺕ ﻓﻮﻕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ،
ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺍﻳﻨﺘﺮﻧﺖ ﺷﺎﻣﻞ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻣﺘﻌﺪﺩﻱ ﻧﻈﻴﺮ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ﻭ ...ﺑﻪ ﻣﻨﻈﻮﺭ ﭘﺎﺳﺨﮕﻮﺋﻲ ﺑﻪ ﻧﻴﺎﺯﻫﺎﻱ ﻣﺘﻌﺪﺩ ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﻣﻲ ﺑﺎﺷﺪ. ﺯﻣﺎﻧﻴﮑﻪ ﺑﻪ ﻳﮏ ﻭﺏ ﺳﺎﻳﺖ ﻣﺘﺼﻞ ﻭ ﺩﺭﺧﻮﺍﺳﺖ ﻳﮏ ﺻﻔﺤﻪ ﺍﻃﻼﻋﺎﺕ ﻣﻲ ﺷﻮﺩ ،ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺭﺧﻮﺍﺳﺖ ﮐﻨﻨﺪﻩ ﺑﻤﻨﺰﻟﻪ ﻳﮏ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺗﻠﻘﻲ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ﺩﺭﺧﻮﺍﺳﺖ
ﺷﻤﺎ ) ﺑﻌﻨﻮﺍﻥ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ( ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﮔﺬﺍﺷﺘﻪ ﻣﻲ ﺷﻮﺩ .ﺳﺮﻭﻳﺲ 53
ﺩﻫﻨﺪﻩ ﺻﻔﺤﻪ ﺩﺭﺧﻮﺍﺳﺘﻲ ﺭﺍ ﭘﻴﺪﺍ ﻭ ﺁﻥ ﺭﺍ ﺑﺮﺍﻱ ﻣﺘﻘﺎﺿﻲ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ
ﮐﺎﺭﺑﺮﺍﻥ ﻭ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ﺍﺯ ﻳﮏ ﻣﺮﻭﺭﮔﺮ ﻭﺏ ﺑﺮﺍﻱ ﺍﻋﻼﻡ ﺩﺭﺧﻮﺍﺳﺖ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻭ
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻭﺏ ﻣﺴﺌﻮﻝ ﺩﺭﻳﺎﻓﺖ ﺩﺭﺧﻮﺍﺳﺖ ﻭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ﻣﻲ ﺑﺎﺷﻨﺪ.
ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺩﺍﺭﺍﻱ ﻳﮏ ﺁﺩﺭﺱ IPﺍﻳﺴﺘﺎ ) ﺛﺎﺑﺖ ( ﺑﻮﺩﻩ ﮐﻪ ﺗﻐﻴﻴﺮ ﻧﺨﻮﺍﻫﺪ ﮐﺮﺩ. ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﮐﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻳﺪ ،ﺩﺍﺭﺍﻱ ﻳﮏ IPﻣﺘﻐﻴﺮ ﺑﻮﺩﻩ ﮐﻪ ﺗﻮﺳﻂ ISPﻣﺮﺑﻮﻃﻪ ﺑﻪ ﺷﻤﺎ ﺍﺧﺘﺼﺎﺹ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺁﺩﺭﺱ IPﺗﺨﺼﻴﺺ ﻳﺎﻓﺘﻪ ﺩﺭ ﻃﻮﻝ
ﻣﺪﺕ ﺍﺗﺼﺎﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ) ﻳﮏ ﺟﻠﺴﻪ ﮐﺎﺭﻱ ( ﺛﺎﺑﺖ ﺑﻮﺩﻩ ﻭ ﺗﻐﻴﻴﺮ ﻧﺨﻮﺍﻫﺪ ﮐﺮﺩ .ﺁﺩﺭﺱ IP ﻧﺴﺒﺖ ﺩﺍﺩﻩ ﺑﻪ ﺷﻤﺎ ﺩﺭ ﺁﻳﻨﺪﻩ ﻭ ﺗﻤﺎﺱ ﻣﺠﺪﺩ ﺑﺎ ISPﻣﻤﮑﻦ ﺍﺳﺖ ﺗﻐﻴﻴﺮ ﻧﻤﺎﻳﺪ .ﻣﺮﺍﮐﺰ ISP ﺑﺮﺍﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎﻱ ﺧﻮﺩ ﻳﮏ IPﺍﻳﺴﺘﺎ ﺭﺍ ﻧﺴﺒﺖ ﻣﻲ ﺩﻫﻨﺪ .ﺑﺪﻳﻬﻲ ﺍﺳﺖ ﺩﺭ ﺁﻳﻨﺪﻩ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﭘﻮﺭﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﮐﻪ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺷﻤﺎ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ ،ﻣﻤﮑﻦ ﺍﺳﺖ ﺁﺩﺭﺱ IP ﻧﺴﺒﺖ ﺑﻪ ﻗﺒﻞ ﻣﺘﻔﺎﻭﺕ ﺑﺎﺷﺪ. ﻫﺮ ﻳﮏ ﺍﺯ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ،ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﭘﻮﺭﺕ ﻫﺎﻱ ﻣﺸﺨﺼﻲ ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﻨﺪ .ﻣﺜﻼ" ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﻣﺎﺷﻴﻦ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻭﺏ ﻭ FTPﻣﺴﺘﻘﺮ
ﺷﺪﻩ ﺑﺎﺷﻨﺪ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﻣﻌﻤﻮﻻ" ﺍﺯ ﭘﻮﺭﺕ ٨٠ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ FTPﺍﺯ ﭘﻮﺭﺕ ٢١ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ﺍﺯ ﺧﺪﻣﺎﺕ ﻳﮏ ﺳﺮﻭﻳﺲ ﺧﺎﺹ ﮐﻪ ﺩﺍﺭﺍﻱ ﻳﮏ ﺁﺩﺭﺱ IPﻭ ﻳﮏ ﺷﻤﺎﺭﻩ ﭘﻮﺭﺕ ﻣﻨﺨﺼﺮ ﺑﻔﺮﺩ ﺍﺳﺖ ،ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ،ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﭘﻮﺭﺕ ﺧﺎﺹ ﺑﻪ ﻳﮏ ﺳﺮﻭﻳﺲ ﻣﺘﺼﻞ
ﻣﻲ ﮔﺮﺩﺩ ،ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺮﻭﻳﺲ ﻣﻮﺭﺩ ﻧﻈﺮ ،ﺍﺯ ﻳﮏ ﭘﺮﻭﺗﮑﻞ ﺧﺎﺹ ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﺪ ﺷﺪ ..ﭘﺮﻭﺗﮑﻞ ﻫﺎ ﺍﻏﻠﺐ ﺑﺼﻮﺭﺕ ﻣﺘﻨﻲ ﺑﻮﺩﻩ ﻭ ﻧﺤﻮﻩ ﻣﮑﺎﻟﻤﻪ ﺑﻴﻦ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺭﺍ ﺗﺒﻴﻦ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻭﺏ ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﺍﺯ ﭘﺮﻭﺗﮑﻞ
(Hypertext Transfer Protocol(HTTPﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ ﻣﮑﺎﻟﻤﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻴﻦ ﺧﻮﺩ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
54
ﺷﺒﮑﻪ ﻫﺎ ،ﺭﻭﺗﺮﻫﺎ ،ISPs ،NAPs ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ DNSﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻗﺪﺭﺗﻤﻨﺪ ،ﻫﻤﮕﻲ ﺳﻬﻤﻲ ﺩﺭ ﺷﮑﻞ ﮔﻴﺮﻱ ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻲ ﺑﺰﺭﮔﺘﺮﻳﻦ ﺷﺒﮑﻪ ﻣﻮﺟﻮﺩ ﺩﺭ ﺳﻄﺢ ﺟﻬﺎﻥ ) ﺍﻳﻨﺘﺮﻧﺖ ( ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﻧﺪ .ﻋﻨﺎﺻﺮ ﻓﻮﻕ ﺩﺭ ﺯﻧﺪﮔﻲ ﻣﺪﺭﻥ ﺍﻣﺮﻭﺯﻱ ﺟﺎﻳﮕﺎﻫﻲ ﻭﻳﮋﻩ ﺩﺍﺭﻧﺪ .ﺑﺪﻭﻥ ﻭﺟﻮﺩ ﺁﻧﻬﺎ ،ﺍﻳﻨﺘﺮﻧﺘﻲ ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ ﻭ ﺑﺪﻭﻥ ﻭﺟﻮﺩ ﺍﻳﻨﺘﺮﻧﺖ ،ﺯﻧﺪﮔﻲ
ﺍﻣﺮﻭﺯ ﺑﺸﺮﻳﺖ ﺭﺍ ﺗﻌﺮﻳﻔﻲ ﺩﻳﮕﺮ ﻻﺯﻡ ﺍﺳﺖ!
55
ISP ﻣﺮﺍﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺖ ) ،( ISPﺧﺪﻣﺎﺕ ﻣﺘﻌﺪﺩﯼ ﻧﻈﻴﺮ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻭ ﺩﺳﺘﻴﺎﺑﯽ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻣﺘﻘﺎﺿﻴﺎﻥ ﻗﺮﺍﺭ ﻣﯽ ﺩﻫﻨﺪ .ﺩﺭ ﺯﻣﺎﻥ ﺍﻧﺘﺨﺎﺏ ﻳﮏ ISPﻣﯽ ﺑﺎﻳﺴﺖ ﻓﺎﮐﺘﻮﺭﻫﺎﯼ ﻣﺘﻌﺪﺩﯼ ﺭﺍ ﺑﺮﺭﺳﯽ ﻧﻤﻮﺩ .ﺍﻣﻨﻴﺖ ،ﻧﻮﻉ ﻭ ﮐﻴﻔﻴﺖ ﺳﺮﻭﻳﺲ ﻫﺎﯼ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﻭ ﻗﻴﻤﺖ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﺍﺯ ﺟﻤﻠﻪ ﻓﺎﮐﺘﻮﺭﻫﺎﯼ ﻣﻬﻢ ﺩﺭ ﺯﻣﺎﻥ ﺍﻧﺘﺨﺎﺏ ﻳﮏ ISP
ﺍﺳﺖ. ISPﭼﻴﺴﺖ ؟ ﻳﮏ ISPﻭ ﻳﺎ ، Internet Service Providerﺷﺮﮐﺘﯽ ﺍﺳﺖ ﮐﻪ ﺍﻣﮑﺎﻥ ﺩﺳﺘﻴﺎﺑﯽ
ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﺳﺎﻳﺮ ﺳﺮﻭﻳﺲ ﻫﺎﯼ ﻭﺏ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﯽ ﻧﻤﺎﻳﺪ .ﻣﺮﺍﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ
ﺍﻳﻨﺘﺮﻧﺖ ﻋﻼﻭﻩ ﺑﺮ ﻧﮕﻬﺪﺍﺭﯼ ﻭ ﭘﺸﺘﻴﺒﺎﻧﯽ ﺍﺯ ﻳﮏ ﺧﻂ ﻣﺴﺘﻘﻴﻢ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ،ﻓﻌﺎﻟﻴﺖ ﻫﺎﯼ ﻣﺘﻌﺪﺩ ﺩﻳﮕﺮﯼ ﻧﻈﻴﺮ ﻧﮕﻬﺪﺍﺭﯼ ﻭ ﭘﺸﺘﻴﺎﻧﯽ ﺍﺯ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻭﺏ ﺭﺍ ﻧﻴﺰ ﺍﻧﺠﺎﻡ ﻣﯽ ﺩﻫﻨﺪ. ﻣﺮﺍﮐﺰ ﻓﻮﻕ ﺑﺎ ﺍﺭﺍﺋﻪ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﯼ ﻻﺯﻡ ) ﺩﺭ ﺻﻮﺭﺕ ﺿﺮﻭﺭﺕ ( ،ﻳﮏ ﺭﻣﺰ ﻋﺒﻮﺭ ﺣﻔﺎﻇﺖ ﺷﺪﻩ ﻭ ﻳﮏ ﺷﻤﺎﺭﻩ ﺗﻠﻔﻦ ﺑﺮﺍﯼ ﺗﻤﺎﺱ ﺑﺎ ﺷﺒﮑﻪ ،ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﻣﺒﺎﺩﻟﻪ ﻧﺎﻣﻪ ﻫﺎﯼ
ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻣﺘﻘﺎﺿﻴﺎﻥ ﻗﺮﺍﺭ ﻣﯽ ﺩﻫﻨﺪ .ﺑﺮﺧﯽ ﺍﺯ ﻣﺮﺍﮐﺰ ISPﺧﺪﻣﺎﺕ ﺍﺿﺎﻓﻪ ﺩﻳﮕﺮﯼ ﺭﺍ ﻧﻴﺰ ﺍﺭﺍﺋﻪ ﻣﯽ ﻧﻤﺎﻳﻨﺪ.
ﻣﺮﺍﮐﺰ ISPﺩﺍﺭﺍﯼ ﺍﺑﻌﺎﺩ ﻭ ﺍﻧﺪﺍﺯﻩ ﻫﺎﯼ ﻣﺘﻔﺎﻭﺗﯽ ﻣﯽ ﺑﺎﺷﻨﺪ .ﺑﺮﺧﯽ ﺍﺯ ﺁﻧﺎﻥ ﺗﻮﺳﻂ ﺍﻓﺮﺍﺩﯼ
ﺍﻧﺪﮎ ﺍﺩﺍﺭﻩ ﻣﯽ ﺷﻮﻧﺪ ﻭ ﺗﻌﺪﺍﺩﯼ ﺩﻳﮕﺮ ﺷﺮﮐﺖ ﻫﺎﺋﯽ ﺑﺰﺭﮒ ﻣﯽ ﺑﺎﺷﻨﺪ ﮐﻪ ﺧﺪﻣﺎﺕ ﻣﺘﻨﻮﻋﯽ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﮐﺎﺭﺑﺮﺍﻥ ﻗﺮﺍﺭ ﻣﯽ ﺩﻫﻨﺪ .ﻣﺮﺍﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺍﺭﺍﯼ ﺣﻮﺯﻩ ﻫﺎﯼ
ﻋﻤﻠﻴﺎﺗﯽ ﻣﺘﻔﺎﻭﺗﯽ ﻧﻴﺰ ﻣﯽ ﺑﺎﺷﻨﺪ .ﻣﺜﻼ" ﺑﺮﺧﯽ ﺍﺯ ﺁﻧﺎﻥ ﺧﺪﻣﺎﺕ ﺧﻮﺩ ﺭﺍ ﺻﺮﻓﺎ" ﺩﺭ ﺳﻄﺢ ﻳﮏ
ﺷﻬﺮﺳﺘﺎﻥ ﺍﺭﺍﺋﻪ ﺩﺍﺩﻩ ﻭ ﺑﺮﺧﯽ ﺩﻳﮕﺮ ﺩﺍﺭﺍﯼ ﻗﺎﺑﻠﻴﺖ ﻫﺎﯼ ﻣﻨﻄﻘﻪ ﺍﯼ ﻭ ﺣﺘﯽ ﺑﻴﻦ ﺍﻟﻤﻠﻠﯽ ﻣﯽ ﺑﺎﺷﻨﺪ.
56
ﻣﺮﺍﮐﺰ ISPﭼﻪ ﺳﺮﻭﻳﺲ ﻫﺎﺋﯽ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﯽ ﺩﻫﻨﺪ ؟
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﺍﺷﺎﺭﻩ ﮔﺮﺩﻳﺪ ،ﺧﺪﻣﺎﺗﯽ ﮐﻪ ﺗﻮﺳﻂ ﻣﺮﺍﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺭﺍﺋﻪ ﻣﻴﮕﺮﺩﺩ ﺑﺴﻴﺎﺭ ﻣﺘﻨﻮﻉ ﻭ ﺩﺭ ﻋﻴﻦ ﺣﺎﻝ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ: •
ﺗﻘﺮﻳﺒﺎ" ﺗﻤﺎﻣﯽ ﻣﺮﺍﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺖ ،ﺳﺮﻭﻳﺲ ﻫﺎﺋﯽ ﻧﻈﻴﺮ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﯽ ﻧﻤﺎﻳﻨﺪ.
•
ﻧﻮﻉ ﻭ ﮐﻴﻔﻴﺖ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﻭ ﭘﺸﺘﻴﺒﺎﻧﯽ ﻓﻨﯽ ﺗﻮﺳﻂ ﻣﺮﺍﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ
•
ﺍﮐﺜﺮ ﻣﺮﺍﮐﺰ ، ISPﺳﺮﻭﻳﺲ ﻫﺎﺳﺘﻴﻨﮓ ﻭﺏ ﺭﺍ ﻧﻴﺰ ﺍﺭﺍﺋﻪ ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
ﺍﻳﻨﺘﺮﻧﺖ ﺩﺍﺭﺍﯼ ﺳﻄﻮﺡ ﻣﺘﻔﺎﻭﺗﯽ ﺍﺳﺖ.
ﺳﺮﻭﻳﺲ ﻓﻮﻕ ،ﻣﺘﻘﺎﺿﻴﺎﻥ ﻣﯽ ﺗﻮﺍﻧﻨﺪ ﺻﻔﺤﺎﺕ ﻭﺏ ﺷﺨﺼﯽ ﺧﻮﺩ ﺭﺍ ﺍﻳﺠﺎﺩ ﻭ ﺍﺯ ﺁﻧﺎﻥ ﻧﮕﻬﺪﺍﺭﯼ ﻧﻤﺎﻳﻨﺪ .ﺍﺧﺘﺼﺎﺹ ﻓﻀﺎﯼ ﻻﺯﻡ ﺑﻪ ﻣﻨﻈﻮﺭ ﺫﺧﻴﺮﻩ ﺳﺎﺯﯼ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﺟﻤﻠﻪ
ﻭﻇﺎﻳﻒ ﻳﮏ ISPﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﺍﺳﺖ. •
ﺑﺮﺧﯽ ﺍﺯ ﻣﺮﺍﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺖ ﺳﺮﻭﻳﺲ ﻫﺎﺋﯽ ﺭﺍ ﺑﻪ ﻣﻨﻈﻮﺭ ﻃﺮﺍﺣﯽ ﻭ ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﺻﻔﺤﺎﺕ ﻭﺏ ﺍﺭﺍﺋﻪ ﻣﯽ ﻧﻤﺎﻳﻨﺪ.
•
ﺗﻌﺪﺍﺩﯼ ﺍﺯ ﻣﺮﺍﮐﺰ ISPﮔﺰﻳﻨﻪ ﻫﺎﯼ ﻣﺘﻔﺎﻭﺗﯽ ﺭﺍ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻧﻮﻉ ﺩﺳﺘﻴﺎﺑﯽ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ
ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻣﺘﻘﺎﺿﻴﺎﻥ ﻗﺮﺍﺭ ﻣﯽ ﺩﻫﻨﺪ ، DSL ، Dial-up ) .ﻣﻮﺩﻡ ﻫﺎﯼ ﮐﺎﺑﻠﯽ( .ﺑﺮﺧﯽ ﺍﺯ ﻣﺮﺍﮐﺰ ISPﺍﻣﮑﺎﻥ ﺩﺳﺘﻴﺎﺑﯽ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﺻﺮﻓﺎ" ﺍﺯ ﻃﺮﻳﻖ ﺧﻄﻮﻁ ﻣﻌﻤﻮﻟﯽ ﺗﻠﻔﻦ
ﻓﺮﺍﻫﻢ ﻣﯽ ﻧﻤﺎﻳﻨﺪ. •
ﺍﮐﺜﺮ ﻣﺮﺍﮐﺰ ISPﻋﻤﻠﻴﺎﺕ ﻣﺘﻔﺎﻭﺗﯽ ﻧﻈﻴﺮ ﺗﻬﻴﻪ Backupﺍﺯ ﻧﺎﻣﻪ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻭ ﻓﺎﻳﻞ ﻫﺎﯼ ﻭﺏ ﺭﺍ ﻧﻴﺰ ﺍﻧﺠﺎﻡ ﻣﯽ ﺩﻫﻨﺪ .ﺩﺭ ﺻﻮﺭﺗﯽ ﮐﻪ ﺑﺎﺯﻳﺎﻓﺖ ﻧﺎﻣﻪ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻭ ﻓﺎﻳﻞ ﻫﺎﯼ ﻭﺏ ﺑﺮﺍﯼ ﺷﻤﺎ ﻣﻬﻢ ﺍﺳﺖ ) ﺩﺭ ﺻﻮﺭﺕ ﺑﺮﻭﺯ ﺍﺷﮑﺎﻝ ( ،ﻳﮏ ISPﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ ﮐﻪ Backupﮔﺮﻓﺘﻦ ﺍﺯ ﺩﺍﺩﻩ ﻫﺎ ﺭﺍ ﺩﺭ ﺩﺳﺘﻮﺭ ﮐﺎﺭ ﺧﻮﺩ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﺍﺳﺖ.
57
ﭼﮕﻮﻧﻪ ﻳﮏ ISPﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﻢ؟
ﺑﺮﺍﯼ ﺍﻧﺘﺨﺎﺏ ﻳﮏ ISPﭘﺎﺭﺍﻣﺘﺮﻫﺎﯼ ﻣﺘﻌﺪﺩﯼ ﺑﺮﺭﺳﯽ ﻣﯽ ﮔﺮﺩﺩ: •
ﺍﻣﻨﻴﺖ :ﺁﻳﺎ ISPﺍﻧﺘﺨﺎﺑﯽ ﺍﺯ ﺭﻭﻳﮑﺮﺩﻫﺎﯼ ﻣﻨﺎﺳﺐ ﺍﻣﻨﻴﺘﯽ ﺩﺭ ﺟﻬﺖ ﺣﻔﺎﻇﺖ
ﺍﻃﻼﻋﺎﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﺪ ؟ ﺁﻳﺎ ﺍﺯ ﺭﻣﺰﻧﮕﺎﺭﯼ ﻭ SSLﺑﻪ ﻣﻨﻈﻮﺭ ﺣﻔﺎﻇﺖ ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻟﯽ ﺷﻤﺎ ﻧﻈﻴﺮ ﻧﺎﻡ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ؟
•
ﻣﺤﺮﻣﺎﻧﮕﯽ :ﺁﻳﺎ ISPﺍﻧﺘﺨﺎﺑﯽ ﺩﺍﺭﺍﯼ ﻳﮏ ﺳﻴﺎﺳﺖ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺩﺭ ﺧﺼﻮﺹ ﺭﻋﺎﻳﺖ ﺣﺮﻳﻢ ﺧﺼﻮﺻﯽ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺳﺖ ؟ ﺁﻳﺎ ﺧﻴﺎﻝ ﺷﻤﺎ ﺍﺯ ﺍﻳﻦ ﺑﺎﺑﺖ ﺭﺍﺣﺖ ﺍﺳﺖ ﮐﻪ ﭼﻪ ﺍﻓﺮﺍﺩﯼ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﺷﻤﺎ ﺩﺳﺘﻴﺎﺑﯽ ﺩﺍﺭﻧﺪ؟ ﻧﺤﻮﻩ ﺑﺮﺧﻮﺭﺩ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺁﻧﺎﻥ ﺍﺯ ﺍﻃﻼﻋﺎﺕ
ﺑﻪ ﭼﻪ ﺻﻮﺭﺕ ﺍﺳﺖ؟ •
ﺳﺮﻭﻳﺲ ﻫﺎ :ﺁﻳﺎ ISPﺍﻧﺘﺨﺎﺑﯽ ﺳﺮﻭﻳﺲ ﻫﺎﯼ ﻣﻮﺭﺩ ﻧﻈﺮ ﺷﻤﺎ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﯽ ﻧﻤﺎﻳﺪ؟ ﺁﻳﺎ
ﺳﺮﻭﻳﺲ ﻫﺎﯼ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺗﺎﻣﻴﻦ ﮐﻨﻨﺪﻩ ﻧﻴﺎﺯ ﺷﻤﺎ ﻣﯽ ﺑﺎﺷﻨﺪ؟ ﺁﻳﺎ ﭘﺸﺘﻴﺒﺎﻧﯽ ﻻﺯﻡ ﺑﻪ
ﻣﻨﻈﻮﺭ ﺍﺭﺍﺋﻪ ﺳﺮﻭﻳﺲ ﻫﺎ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺷﻤﺎ ﮔﺬﺍﺷﺘﻪ ﻣﯽ ﺷﻮﺩ؟ •
ﻗﻴﻤﺖ :ﺁﻳﺎ ﻗﻴﻤﺖ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﺗﻮﺳﻂ ISPﻗﺎﺑﻞ ﻗﺒﻮﻝ ﺍﺳﺖ؟ ﺁﻳﺎ ﻗﻴﻤﺖ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺗﻌﺪﺍﺩ ﻭ ﻧﻮﻉ ﺳﺮﻭﻳﺲ ﻫﺎﯼ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ،ﻣﻨﻄﻘﯽ ﺍﺳﺖ؟ ﺁﻳﺎ ﺑﻪ ﻣﻨﻈﻮﺭ
ﺩﺭﻳﺎﻓﺖ ﺧﺪﻣﺎﺕ ﺍﺭﺯﺍﻥ ﺗﺮ ،ﺍﺯ ﮐﻴﻔﻴﺖ ﻭ ﺍﻣﻨﻴﺖ ﭼﺸﻢ ﭘﻮﺷﯽ ﻣﯽ ﻧﻤﺎﺋﻴﺪ؟
•
ﺍﻋﻤﺘﺎﺩ ﭘﺬﻳﺮﯼ :ﺁﻳﺎ ﺑﻪ ﺳﺮﻭﻳﺲ ﻫﺎﯼ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺗﻮﺳﻂ ISPﺍﻧﺘﺨﺎﺑﯽ ﻣﯽ ﺗﻮﺍﻥ ﺍﻋﺘﻤﺎﺩ ﺩﺍﺷﺖ ﻭ ﻳﺎ ﺩﺭ ﺍﻏﻠﺐ ﻣﻮﺍﺭﺩ ﺳﺮﻭﻳﺲ ﻫﺎﯼ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﺩﻻﻳﻞ ﻣﺘﻔﺎﻭﺗﯽ ﻧﻈﻴﺮ
ﭘﺸﺘﻴﺒﺎﻧﯽ ﻭ ﻧﮕﻬﺪﺍﺭﯼ ،ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩ ﮐﺎﺭﺑﺮﺍﻥ ﻭ ،...ﻏﻴﺮ ﻓﻌﺎﻝ ﺑﻮﺩﻩ ﻭ ﻋﻤﻼ" ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﺎﻥ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ .ﺩﺭ ﺻﻮﺭﺗﯽ ﮐﻪ ﺑﻪ ﺩﻻﻳﻞ ﻣﺘﻔﺎﻭﺗﯽ ﻻﺯﻡ ﺍﺳﺖ ﺑﺮﺧﯽ ﺍﺯ ﺳﺮﻭﻳﺲ ﻫﺎﯼ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﻏﻴﺮ ﻓﻌﺎﻝ ﮔﺮﺩﻧﺪ ﺁﻳﺎ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﮑﺎﻧﻴﺰﻡ ﻫﺎﯼ ﺧﺎﺻﯽ ﺑﻪ ﺷﻤﺎ ﺍﻃﻼﻉ ﺩﺍﺩﻩ ﻣﯽ ﺷﻮﺩ؟ •
ﭘﺸﺘﻴﺒﺎﻧﯽ ﮐﺎﺭﺑﺮﺍﻥ :ﺁﻳﺎ ISPﺍﻧﺘﺨﺎﺑﯽ ﺩﺍﺭﺍﯼ ﺑﺨﺶ ﭘﺸﺘﻴﺒﺎﻧﯽ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺳﺖ؟ ﻧﺤﻮﻩ ﺑﺮﺧﻮﺭﺩ ﭘﺮﺳﻨﻞ ﺑﺨﺶ ﭘﺸﺘﻴﺒﺎﻧﯽ ﺑﻪ ﭼﻪ ﺻﻮﺭﺕ ﺍﺳﺖ؟ ﺁﻳﺎ ﺁﻧﺎﻥ ﺩﺍﺭﺍﯼ ﺩﺍﻧﺶ ﻻﺯﻡ ﺑﻪ
ﻣﻨﻈﻮﺭ ﭘﺎﺳﺨﮕﻮﺋﯽ ﻣﻨﻄﻘﯽ ﺑﻪ ﺳﻮﺍﻻﺕ ﺷﻤﺎ ﻣﯽ ﺑﺎﺷﻨﺪ؟ 58
•
ﺳﺮﻋﺖ :ﺳﺮﻋﺖ ﺍﺗﺼﺎﻝ ISPﺍﻧﺘﺨﺎﺑﯽ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﭼﮕﻮﻧﻪ ﺍﺳﺖ ؟ ﺁﻳﺎ ﺍﻳﻦ ﺳﺮﻋﺖ ﺑﻪ
•
ﮐﻴﻔﻴﺖ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ :ﺁﻳﺎ ISPﺍﻧﺘﺨﺎﺑﯽ ﺩﺍﺭﺍﯼ ﻋﻤﻠﮑﺮﺩﯼ ﻣﺜﺒﺖ ﺩﺭ ﮐﺎﺭﻧﺎﻣﻪ ﻓﻌﺎﻟﻴﺖ
ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﯽ ﺷﻤﺎ ﺑﻪ ﻧﺎﻣﻪ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻭﺏ ﮐﺎﻓﯽ ﺍﺳﺖ؟
ﺧﻮﺩ ﺍﺳﺖ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻨﺪﮔﺎﻧﯽ ﮐﻪ ﻗﺒﻼ" ﺍﺯ ﺧﺪﻣﺎﺕ ﺁﻧﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩﻩ ﺍﻧﺪ ،ﺍﺯ ﮐﻴﻔﻴﺖ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﺭﺍﺿﯽ ﻣﯽ ﺑﺎﺷﻨﺪ؟
59
DSL ﺑﺮﺍﯼ ﺍﺗﺼﺎﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﺭﻭﺵ ﻫﺎﯼ ﻣﺘﻔﺎﻭﺗﯽ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻮﺩﻡ ﻣﻌﻤﻮﻟﯽ ،ﻣﻮﺩﻡ ﮐﺎﺑﻠﯽ ،ﺷﺒﮑﻪ ﻣﺤﻠﯽ ﻭ ﻳﺎ ﺧﻄﻮﻁ ،(Digital Subscriber Line(DSL ﻧﻤﻮﻧﻪ ﻫﺎﺋﯽ ﺍﺯ ﺭﻭﺵ ﻫﺎﯼ ﻣﻮﺟﻮﺩ ﺑﺮﺍﯼ ﺍﺗﺼﺎﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﯽ ﺑﺎﺷﻨﺪ ، DSL .ﻳﮏ ﺍﺗﺼﺎﻝ
ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﯼ ﻣﻌﻤﻮﻟﯽ ﺗﻠﻔﻦ ﺑﺮﺍﯼ ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﻓﺮﺍﻫﻢ ﻣﯽ ﻧﻤﺎﻳﺪ. ﻣﺰﺍﻳﺎﯼ DSL •
ﺩﺭ ﺯﻣﺎﻥ ﺍﺗﺼﺎﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ،ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﻂ ﺗﻠﻔﻦ ﺑﺮﺍﯼ ﺗﻤﺎﺱ ﻫﺎﯼ ﻣﻮﺭﺩ ﻧﻈﺮ ﻫﻤﭽﻨﺎﻥ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ.
• •
ﺩﺍﺭﺍﯼ ﺳﺮﻋﺘﯽ ﺑﻤﺮﺍﺗﺐ ﺑﺎﻻﺗﺮ ﺍﺯ ﻣﻮﺩﻡ ﻫﺎﯼ ﻣﻌﻤﻮﻟﯽ ﺍﺳﺖ ) ٥/١ﻣﮕﺎﺑﺎﻳﺖ (.
ﻧﻴﺎﺯ ﺑﻪ ﮐﺎﺑﻞ ﮐﺸﯽ ﺟﺪﻳﺪ ﻧﺒﻮﺩﻩ ﻭ ﻫﻤﭽﻨﺎﻥ ﻣﯽ ﺗﻮﺍﻥ ﺍﺯ ﺧﻄﻮﻁ ﺗﻠﻔﻦ ﻣﻮﺟﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ.
•
ﺷﺮﮐﺖ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ، DSLﻣﻮﺩﻡ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺩﺭ ﺯﻣﺎﻥ ﻧﺼﺐ ﺧﻂ ﻓﻮﻕ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻣﺸﺘﺮﮎ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﺩﺍﺩ.
ﺍﺷﮑﺎﻻﺕ DSL •
ﻳﮏ ﺍﺗﺼﺎﻝ DSLﻫﺮ ﺍﻧﺪﺍﺯﻩ ﮐﻪ ﺑﻪ ﺷﺮﮐﺖ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ ﻓﻮﻕ ﻧﺰﺩﻳﮑﺘﺮ ﺑﺎﺷﺪ،
•
ﺳﺮﻋﺖ ﺩﺭﻳﺎﻓﺖ ﺩﺍﺩﻩ ﻧﺴﺒﺖ ﺑﻪ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮ ﺍﺳﺖ ) ﻋﺪﻡ ﻭﺟﻮﺩ ﺗﻮﺍ
ﺩﺍﺭﺍﯼ ﮐﻴﻔﻴﺖ ﺑﻬﺘﺮﯼ ﺍﺳﺖ.
ﺯﻥ ﻣﻨﻄﻘﯽ (
•
ﺳﺮﻭﻳﺲ ﻓﻮﻕ ﺩﺭ ﻫﺮ ﻣﺤﻞ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺱ ﻧﻤﯽ ﺑﺎﺷﺪ.
60
ﻣﺒﺎﻧﯽ DSL ﺩﺭ ﺯﻣﺎﻥ ﻧﺼﺐ ﻳﮏ ﺗﻠﻔﻦ ) ﺍﺳﺘﺎﻧﺪﺍﺭﺩ( ﺩﺭ ﺍﻏﻠﺐ ﮐﺸﻮﺭﻫﺎ ﺍﺯ ﻳﮏ ﺯﻭﺝ ﮐﺎﺑﻞ ﻣﺴﯽ
ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﺷﻮﺩ .ﮐﺎﺑﻞ ﻣﺴﯽ ﺩﺍﺭﺍﯼ ﭘﻬﻨﺎﯼ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮﯼ ﻧﺴﺒﺖ ﺑﻪ ﺁﻥ ﭼﻴﺰﯼ ﺍﺳﺖ ﮐﻪ
ﺩﺭ ﻣﮑﺎﻟﻤﺎﺕ ﺗﻠﻔﻨﯽ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ ) ﺑﺨﺶ ﻋﻤﺪﻩ ﺍﯼ ﺍﺯﻇﺮﻓﻴﺖ ﭘﻬﻨﺎﯼ ﺑﺎﻧﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﯽ ﮔﺮﺩﺩ ( DSL .ﺍﺯ ﭘﻬﻨﺎﯼ ﺑﺎﻧﺪ ﺑﻼﺍﺳﺘﻔﺎﺩﻩ ﺑﺪﻭﻥ ﺗﺎﺛﻴﺮ ﮔﺬﺍﺭﯼ ﻣﻨﻔﯽ ﺑﺮ ﮐﻴﻔﻴﺖ ﻣﮑﺎﻟﻤﺎﺕ
ﺻﻮﺗﯽ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﺪ ) .ﺗﻄﺒﻴﻖ ﻓﺮﮐﺎﻧﺲ ﻫﺎﯼ ﺧﺎﺹ ﺑﻪ ﻣﻨﻈﻮﺭﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﺧﺎﺹ(. ﺑﻪ ﻣﻨﻈﻮﺭ ﺷﻨﺎﺧﺖ ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ ، DSLﻻﺯﻡ ﺍﺳﺖ ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﺎ ﻳﮏ ﺧﻂ ﺗﻠﻔﻦ ﻣﻌﻤﻮﻟﯽ
ﺁﺷﻨﺎ ﺷﻮﻳﻢ .ﺍﮐﺜﺮ ﺧﻄﻮﻁ ﺗﻠﻔﻦ ﻭ ﺗﺠﻬﻴﺰﺍﺕ ﻣﺮﺑﻮﻃﻪ ﺩﺍﺭﺍﯼ ﻣﺤﺪﻭﺩﻳﺖ ﻓﺮﮐﺎﻧﺴﯽ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﻮﺋﻴﭻ ،ﺗﻠﻔﻦ ﻭ ﺳﺎﻳﺮ ﺗﺠﻬﻴﺰﺍﺗﯽ ﻣﯽ ﺑﺎﺷﻨﺪ ﮐﻪ ﺑﻨﻮﻋﯽ ﺩﺭ ﻓﺮﺁﻳﻨﺪ ﺍﻧﺘﻘﺎﻝ ﺳﻴﮕﻨﺎ ﻝ ﻫﺎ ﺩﺧﺎﻟﺖ
ﺩﺍﺭﻧﺪ .ﺻﺪﺍﯼ ﺍﻧﺴﺎﻥ ) ﺩﺭ ﻳﮏ ﻣﮑﺎﻟﻤﻪ ﺻﻮﺗﯽ ﻣﻌﻤﻮﻟﯽ ( ﺗﻮﺳﻂ ﺳﻴﮕﻨﺎﻝ ﻫﺎﺋﯽ ﺑﺎ ﻓﺮﮐﺎﻧﺲ ﺑﻴﻦ ﺻﻔﺮ ﺗﺎ ٣٤٠٠ﻗﺎﺑﻞ ﺍﻧﺘﻘﺎﻝ ﺍﺳﺖ .ﻣﺤﺪﻭﺩﻩ ﻓﻮﻕ ﺑﺴﻴﺎﺭ ﻧﺎﭼﻴﺰ ﺍﺳﺖ )ﻣﺜﻼ" ﺍﻏﻠﺐ ﺑﻠﻨﺪﮔﻮﻫﺎﯼ ﺍﺳﺘﺮﻳﻮ ﮐﻪ ﺩﺍﺭﺍﯼ ﻣﺤﺪﻭﺩﻩ ﺑﻴﻦ ٢٠ﺗﺎ ٢٠,٠٠٠ﻫﺮﺗﺰ ﻣﯽ ﺑﺎﺷﻨﺪ( .ﮐﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ
ﺷﺪﻩ ﺩﺭ ﺳﻴﺴﺘﻢ ﺗﻠﻔﻦ ﻗﺎﺩﺭ ﺑﻪ ﺍﻧﺘﻘﺎﻝ ﺳﻴﮕﻨﺎﻝ ﻫﺎﺋﯽ ﺑﺎ ﻇﺮﻓﻴﺖ ﭼﻨﺪﻳﻦ ﻣﻴﻠﻴﻮﻥ ﻫﺮﺗﺰ ﻣﯽ ﺑﺎﺷﺪ.
ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺩﺭ ﻣﮑﺎﻟﻤﺎﺕ ﺻﻮﺗﯽ ﺻﺮﻓﺎ" ﺍﺯ ﺑﺨﺶ ﺑﺴﻴﺎﺭ ﻣﺤﺪﻭﺩﯼ ﺍﺯ ﭘﻬﻨﺎﯼ ﺑﺎﻧﺪ ﻣﻮﺟﻮﺩ، ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻬﻨﺎﯼ ﺑﺎﻧﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻧﺸﺪﻩ ﻣﯽ ﺗﻮﺍﻥ ﻋﻼﻭﻩ ﺑﺮ ﺑﻬﺮﻩ ﺑﺮﺩﺍﺭﯼ ﺍﺯ
ﭘﺘﺎﻧﺴﻴﻞ ﻫﺎﯼ ﻣﻮﺟﻮﺩ ،ﺑﮕﻮﻧﻪ ﺍﯼ ﻋﻤﻞ ﻧﻤﻮﺩ ﮐﻪ ﮐﻴﻔﻴﺖ ﻣﮑﺎﻟﻤﺎﺕ ﺻﻮﺗﯽ ﻧﻴﺰ ﺩﭼﺎﺭ ﺍﻓﺖ ﻧﮕﺮﺩﻧﺪ .ﺗﺠﻬﻴﺰﺍﺕ ﭘﻴﺸﺮﻓﺘﻪ ﺍﯼ ﮐﻪ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﺼﻮﺭﺕ ﺩﻳﺠﻴﺘﺎﻝ ﺍﺭﺳﺎﻝ ﻣﯽ ﻧﻤﺎﻳﻨﺪ ،ﻗﺎﺩﺭ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻇﺮﻓﻴﺖ ﺧﻄﻮﻁ ﺗﻠﻔﻦ ﺑﺼﻮﺭﺕ ﮐﺎﻣﻞ ﻣﯽ ﺑﺎﺷﻨﺪ DSL .ﭼﻨﻴﻦ ﻫﺪﻓﯽ ﺭﺍ ﺩﻧﺒﺎﻝ ﻣﯽ ﻧﻤﺎﻳﺪ. ﺩﺭ ﺍﻏﻠﺐ ﻣﻨﺎﺯﻝ ﻭ ﺍﺩﺍﺭﺍﺕ ﺑﺮﺧﯽ ﺍﺯ ﮐﺸﻮﺭﻫﺎﯼ ﺩﻧﻴﺎ ،ﮐﺎﺭﺑﺮﺍﻥ ﺍﺯ ﻳﮏ DSLﻧﺎﻣﺘﻘﺎﺭﻥ ) (ADSLﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﻨﺪ ADSL .ﻓﺮﮐﺎﻧﺲ ﻫﺎﯼ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺱ ﺩﺭﻳﮏ ﺧﻂ ﺭﺍ ﺗﻘﺴﻴﻢ ﺗﺎ ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﻗﺎﺩﺭ ﺑﻪ ﺩﺭﻳﺎﻓﺖ ﻭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺎﺷﻨﺪ .ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ،ﻓﺮﺽ ﺑﺮ ﺍﻳﻦ
61
ﮔﺬﺍﺷﺘﻪ ﺷﺪﻩ ﺍﺳﺖ ﮐﻪ ﺳﺮﻋﺖ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮ ﺍﺯ ﺳﺮﻋﺖ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ
ﺑﺎﺷﺪ.
ﺻﻮﺕ ﻭ ﺩﺍﺩﻩ ﮐﻴﻔﻴﺖ ﺩﺭﻳﺎﻓﺖ ﻭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﻃﺮﻳﻖ ، DSLﺑﻪ ﻣﺴﺎﻓﺖ ﻣﻮﺟﻮﺩ ﺑﻴﻦ ﺍﺳﺘﻔﺎﺩﻩ
ﮐﻨﻨﺪﻩ ﻭ ﺷﺮﮐﺖ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ ﻓﻮﻕ ﺑﺴﺘﮕﯽ ﺩﺍﺭﺩ ADSL .ﺍﺯ ﻳﮏ ﺗﮑﻨﻮﻟﻮﮊﯼ ﺑﺎ ﻧﺎﻡ " ﺗﮑﻨﻮﻟﻮﮊﯼ ﺣﺴﺎﺱ ﺑﻪ ﻣﺴﺎﻓﺖ " ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﺪ .ﺑﻤﻮﺍﺯﺍﺕ ﺍﻓﺰﺍﻳﺶ ﻃﻮﻝ ﺧﻂ ﺍﺭﺗﺒﺎﻃﯽ، ﮐﻴﻔﻴﺖ ﺳﻴﮕﻨﺎﻝ ﺍﻓﺖ ﻭ ﺳﺮﻋﺖ ﺧﻂ ﺍﺭﺗﺒﺎﻃﯽ ﮐﺎﻫﺶ ﭘﻴﺪﺍ ﻣﯽ ﻧﻤﺎﻳﺪ ADSL .ﺩﺍﺭﺍﯼ ﻣﺤﺪﻭﺩﻳﺖ ١٨,٠٠٠ﻓﻮﺕ ) ٥,٤٦٠ﻣﺘﺮ ( ﺍﺳﺖ .ﮐﺎﺭﺑﺮﺍﻧﯽ ﮐﻪ ﺩﺭ ﻣﺠﺎﻭﺭﺕ ﻭ ﻧﺰﺩﻳﮑﯽ ﺷﺮﮐﺖ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ DSLﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ ،ﺩﺍﺭﺍﯼ ﮐﻴﻔﻴﺖ ﻭ ﺳﺮﻋﺖ ﻣﻨﺎﺳﺒﯽ ﺑﻮﺩﻩ ﻭ
ﺑﻤﻮﺍﺯﺍﺕ ﺍﻓﺰﺍﻳﺶ ﻣﺴﺎﻓﺖ ،ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﻧﻈﺮ ﮐﻴﻔﻴﺖ ﻭ ﺳﺮﻋﺖ ﺩﭼﺎﺭ ﺍﻓﺖ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﺗﮑﻨﻮﻟﻮﮊﯼ ADSLﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺍﺋﻪ ﺑﺎﻻﺗﺮﻳﻦ ﺳﺮﻋﺖ ﺩﺭ ﺣﺎﻟﺖ " ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﮐﺎﺭﺑﺮ "
) (Downstreamﺗﺎ ٨ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺍﺳﺖ ) .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﯽ ﺣﺪﺍﮐﺜﺮ ﻣﺴﺎﻓﺖ ٦,٠٠٠ﻓﻮﺕ ﻭ ﻳﺎ ١,٨٢٠ﻣﺘﺮ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ( .ﺳﺮﻋﺖ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ " ﺍﺯ ﮐﺎﺭﺑﺮ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ"
) (Upstreamﺩﺍﺭﺍﯼ ﻣﺤﺪﻭﺩﻩ ٦٤٠ﮐﻴﻠﻮﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺩﺭ ﻋﻤﻞ ،ﺑﻬﺘﺮﻳﻦ ﺳﺮﻋﺖ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﮐﺎﺭﺑﺮ ١,٥ ،ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﻭ ﺳﺮﻋﺖ ﺍﺭﺳﺎﻝ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺗﻮﺳﻂ ﮐﺎﺭﺑﺮ ﺑﺮ ﺭﻭﯼ ﺍﻳﻨﺘﺮﻧﺖ ٦٤٠ ،ﮐﻴﻠﻮﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺍﺳﺖ.
ﻣﻤﮑﻦ ﺍﺳﺖ ﺍﻳﻦ ﺳﻮﺍﻝ ﺩﺭ ﺫﻫﻦ ﺧﻮﺍﻧﻨﺪﮔﺎﻥ ﻣﻄﺮﺡ ﮔﺮﺩﺩ ﮐﻪ ﺍﮔﺮ ﺗﮑﻨﻮﻟﻮﮊﯼ DSLﺩﺍﺭﺍﯼ ﻣﺤﺪﻭﺩﻳﺖ ﻓﺎﺻﻠﻪ ﺍﺳﺖ ،ﭼﺮﺍ ﻣﺤﺪﻭﺩﻳﺖ ﻓﻮﻕ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻣﮑﺎﻟﻤﺎﺕ ﺻﻮﺗﯽ ﺻﺪﻕ ﻧﻤﯽ ﮐﻨﺪ؟ ﺩﺭ ﭘﺎﺳﺦ ﺑﺎﻳﺪ ﺑﻪ ﻭﺟﻮﺩ ﻳﮏ ﺗﻔﻮﻳﺖ ﮐﻨﻨﺪﻩ ﮐﻮﭼﮏ ﮐﻪ Loading coilsﻧﺎﻣﻴﺪﻩ
ﻣﯽ ﺷﻮﺩ ،ﺍﺷﺎﺭﻩ ﮐﺮﺩ .ﺷﺮﮐﺖ ﻫﺎﯼ ﺗﻠﻔﻦ ﺍﺯ ﺗﻔﻮﻳﺖ ﮐﻨﻨﺪﻩ ﻓﻮﻕ ،ﺑﻪ ﻣﻨﻈﻮﺭ ﺗﻘﻮﻳﺖ ﺳﻴﮕﻨﺎﻝ ﺻﻮﺗﯽ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﻣﺘﺎﺳﻔﺎﻧﻪ ﺗﻘﻮﻳﺖ ﮐﻨﻨﺪﻩ ﻓﻮﻕ ﺑﺎ ﺳﻴﮕﻨﺎﻝ ﻫﺎﯼ ADSLﺳﺎﺯﮔﺎﺭ
62
ﻧﻴﺴﺖ .ﻻﺯﻡ ﺑﻪ ﺫﮐﺮ ﺍﺳﺖ ﮐﻪ ﺳﻴﮕﻨﺎﻝ ﻫﺎﯼ ، ADSLﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺑﺨﺸﯽ ﺍﺯ ﺧﻂ ﺍﺭﺗﺒﺎﻃﯽ ﺍﺯ ﻧﻮﻉ ﻓﻴﺒﺮ ﻧﻮﺭﯼ ﺑﺎﺷﺪ ،ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﻧﺨﻮﺍﻫﻨﺪ ﺑﻮﺩ.
ﺗﻘﺴﻴﻢ ﺳﻴﮕﻨﺎﻝ
ﺍﺯ ﺩﻭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻣﺘﻔﺎﻭﺕ ﺑﺮﺍﯼ ﺗﻘﺴﻴﻢ ﺳﻴﮕﻨﺎﻟﻬﺎ ) ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺳﺎﺯﮔﺎﺭ ﻧﻤﯽ ﺑﺎﺷﻨﺪ(،
ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ .ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ،ANSIﺑﺮﺍﯼ ADSLﺳﻴﺴﺘﻤﯽ ﺑﺎ ﻧﺎﻡ Discrete Multitoneﺍﺳﺖ .(DMT) .ﺍﮐﺜﺮ ﺗﻮﻟﻴﺪﮐﻨﻨﺪﮔﺎﻥ ﺗﺠﻬﻴﺰﺍﺕ DSLﺍﺯ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻓﻮﻕ ﺗﺒﻌﻴﺖ ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺩﻳﮕﺮﯼ ﮐﻪ ﻧﺴﺒﺖ ﺑﻪ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ DMTﻗﺪﻳﻤﯽ ﺗﺮ ﻭ ﺑﺴﺎﺩﮔﯽ ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﻣﯽ ﮔﺮﺩﺩ ،ﺍﺳﺘﺎﻧﺪﺍﺭﺩ Carrierless Amplitude phase/ﺍﺳﺖ).(CAP ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ، CAPﺳﻴﮕﻨﺎﻝ ﻫﺎ ﺭﺍ ﺑﻪ ﺳﻪ ﺑﺎﻧﺪ ﻣﺠﺰﺍ ﺗﻘﺴﻴﻢ ﻣﯽ ﻧﻤﺎﻳﺪ :ﻣﮑﺎﻟﻤﺎﺕ ﺗﻠﻔﻦ ﺩﺍﺭﺍﯼ
ﺑﺎﻧﺪ ﺻﻔﺮ ﺗﺎ ٤ﮐﻴﻠﻮ ﻫﺮﺗﺰ ،ﮐﺎﻧﺎﻝ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﮐﺎﺭﺑﺮ ﺑﺮﺍﯼ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺩﺍﺭﺍﯼ ﺑﺎﻧﺪﯼ ﺑﻴﻦ ٢٥ﺗﺎ ١٦٠ﮐﻴﻠﻮ ﻫﺮﺗﺰ ) (Upstreamﻭ ﮐﺎﻧﺎﻝ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺑﺮﺍﯼ ﮐﺎﺭﺑﺮ ،ﺩﺍﺭﺍﯼ ﻣﺤﺪﻭﺩﻩ ﺍﯼ ﮐﻪ ﺍﺯ ٢٤٠ﮐﻴﻠﻮ ﻫﺮﺗﺰ ﺷﺮﻭﻉ ﻣﯽ ﮔﺮﺩﺩ .ﺣﺪﺍﮐﺜﺮ
ﺑﺎﻧﺪ ﻓﻮﻕ ﺑﻪ ﻋﻮﺍﻣﻞ ﺗﻔﺎﻭﺗﯽ ﻧﻈﻴﺮ :ﻃﻮﻝ ﺧﻂ ،ﺗﻌﺪﺍﺩ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﺮﮐﺖ ﺗﻠﻔﻨﯽ ﺧﺎﺹ ﻭ ...ﺑﺴﺘﮕﯽ ﺩﺍﺭﺩ ،ﺑﻬﺮﺣﺎﻝ ﺣﺪﺍﮐﺜﺮ ﻣﺤﺪﻭﺩﻩ ﺑﺎﻧﺪ ﻓﻮﻕ ﺍﺯ ١,٥ﻣﮕﺎﻫﺮﺗﺰ ﺗﺠﺎﻭﺯ ﻧﺨﻮﺍﻫﺪ ﮐﺮﺩ .ﺳﻴﺴﺘﻢ CAPﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻪ ﮐﺎﻧﺎﻝ ﻓﻮﻕ ،ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﺳﻴﮕﻨﺎﻝ ﻫﺎﯼ
ﻣﺮﺑﻮﻃﻪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ، DMTﻧﻴﺰ ﺳﻴﮕﻨﺎﻝ ﻫﺎﯼ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﺑﻪ ﮐﺎﻧﺎﻝ ﻫﺎﯼ ﻣﺠﺰﺍ ﺗﻘﺴﻴﻢ ﻣﯽ ﻧﻤﺎﻳﺪ.ﺩﺭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻓﻮﻕ ﺍﺯ ﺩﻭ ﮐﺎﻧﺎﻝ ﻣﺠﺰﺍ ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺩﺍﺩﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﯽ ﮔﺮﺩﺩ،DMT . ﺩﺍﺩﻩ ﺭﺍ ﺑﻪ ٢٤٧ﮐﺎﻧﺎﻝ ﻣﺠﺰﺍ ﺗﻘﺴﻴﻢ ﻣﯽ ﻧﻤﺎﻳﺪ.ﻫﺮ ﮐﺎﻧﺎﻝ ﺩﺍﺭﺍﯼ ﺑﺎﻧﺪ ٤ﮐﻴﻠﻮ ﻫﺮﺗﺰ ﻣﯽ ﺑﺎﺷﻨﺪ.
) ﻭﺿﻌﻴﺖ ﻓﻮﻕ ﻣﺸﺎﺑﻪ ﺁﻥ ﺍﺳﺖ ﮐﻪ ﺷﺮﮐﺖ ﺗﻠﻔﻦ ﻣﺮﺑﻮﻃﻪ ،ﺧﻂ ﻣﺴﯽ ﻣﻮﺟﻮﺩ ﺭﺍ ﺑﻪ ٢٤٧
63
ﺧﻂ ٤ﮐﻴﻠﻮ ﻫﺮﺗﺰﯼ ﻣﺠﺰﺍ ﺗﻘﺴﻴﻢ ﻭ ﻫﺮ ﻳﮏ ﺍﺯ ﺧﻄﻮﻁ ﻓﻮﻕ ﺭﺍ ﺑﻪ ﻳﮏ ﻣﻮﺩﻡ ﻣﺘﺼﻞ ﻧﻤﻮﺩﻩ
ﺍﺳﺖ .ﺍﺳﺘﻔﺎﺩﻩ ﻫﻤﺰﻣﺎﻥ ﺍﺯ ٢٤٧ﻣﻮﺩﻡ ﮐﻪ ﻫﺮ ﻳﮏ ﺩﺍﺭﺍﯼ ﺑﺎﻧﺪ ٤ﮐﻴﻠﻮﻫﺮﺗﺰ ﻣﯽ ﺑﺎﺷﻨﺪ( .ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﻧﺎﻝ ﻫﺎ ،ﮐﻨﺘﺮﻝ ﻭ ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﮐﻴﻔﻴﺖ ﻳﮏ ﮐﺎﻧﺎﻝ ﺍﻓﺖ ﻧﻤﺎﻳﺪ ،ﺳﻴﮕﻨﺎﻝ ﺑﺮ ﺭﻭﯼ ﮐﺎﻧﺎﻝ ﺩﻳﮕﺮ ﺷﻴﻔﺖ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﻓﺮﺁﻳﻨﺪ ﺷﻴﻔﺖ ﺩﺍﺩﻥ ﺳﻴﮕﻨﺎ ﻝ ﻫﺎ ﺑﻴﻦ ﮐﺎﻧﺎﻝ ﻫﺎﯼ
ﻣﺘﻔﺎﻭﺕ ﻭ ﺟﺴﺘﺠﻮ ﺑﺮﺍﯼ ﻳﺎﻓﺘﻦ ﺑﻬﺘﺮﻳﻦ ﮐﺎﻧﺎﻝ ،ﺑﺼﻮﺭﺕ ﭘﻴﻮﺳﺘﻪ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺑﺮﺧﯽ ﺍﺯ ﮐﺎﻧﺎﻝ ﻫﺎ ﺑﺼﻮﺭﺕ ﺩﻭ ﻃﺮﻓﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﺷﻮﻧﺪ )ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ( ﮐﻨﺘﺮﻝ ﻭ ﻣﺮﺗﺐ
ﺳﺎﺯﯼ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﮐﺎﻧﺎﻝ ﻫﺎﯼ ﺩﻭ ﻃﺮﻓﻪ ﻭ ﻧﮕﻬﺪﺍﺭﯼ ﮐﻴﻔﻴﺖ ﻫﺮ ﻳﮏ ﺍﺯ ٢٤٧ﮐﺎﻧﺎﻝ ﻣﻮﺟﻮﺩ،
ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ DMTﺭﺍ ﻧﺴﺒﺖ ﺑﻪ CAPﺑﻤﺮﺍﺗﺐ ﭘﻴﭽﻴﺪﻩ ﺗﺮ ﻧﻤﻮﺩﻩ ﺍﺳﺖ .ﺍﺳﺘﺎﻧﺪﺍﺭﺩ
DMTﺩﺍﺭﺍﯼ ﺍﻧﻌﻄﺎﻑ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮﯼ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﮐﻴﻔﻴﺖ ﺧﻄﻮﻁ ﻭ ﮐﺎﻧﺎﻝ ﻫﺎ ﯼ ﻣﺮﺑﻮﻃﻪ ﺍﺳﺖ .
ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﯼ CAPﻭ DMTﺍﺯ ﺩﻳﺪ ﮐﺎﺭﺑﺮ ﺩﺍﺭﺍﯼ ﻳﮏ ﺷﺒﺎﻫﺖ ﻣﯽ ﺑﺎﺷﻨﺪ .ﺩﺭ ﻫﺮ ﺩﻭ ﺣﺎﻟﺖ ﺍﺯ ﻳﮏ ﻓﻴﻠﺘﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﻓﻴﻠﺘﺮ ﻧﻤﻮﺩﻥ ﺳﻴﮕﻨﺎﻝ ﻫﺎﯼ ﻣﺮﺑﻮﻃﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ .ﻓﻴﻠﺘﺮﻫﺎﯼ ﻓﻮﻕ ﺍﺯ ﻧﻮﻉ Low-Passﻣﯽ ﺑﺎﺷﻨﺪ .ﻓﻴﻠﺘﺮﻫﺎﯼ ﻓﻮﻕ ﺩﺍﺭﺍﯼ ﺳﺎﺧﺘﺎﺭﯼ ﺳﺎﺩﻩ ﺑﻮﺩﻩ ﻭ ﺗﻤﺎﻡ ﺳﻴﮕﻨﺎﻝ ﻫﺎﯼ ﺑﺎﻻﺗﺮ ﺍﺯ ﻳﮏ ﻣﺤﺪﻭﺩﻩ ﺭﺍ ﺑﻼﮎ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ .ﻣﮑﺎﻟﻤﺎﺕ ﺻﻮﺗﯽ ﺩﺭ ﻣﺤﺪﻭﺩﻩ
ﭘﺎﻳﻴﻦ ﺗﺮ ﺍﺯ ٤ﮐﻴﻠﻮ ﻫﺮﺗﺰ ﺍﻧﺠﺎﻡ ﻣﯽ ﮔﻴﺮﻧﺪ ،ﺑﻨﺎﺑﺮﺍﻳﻦ ﻓﻴﻠﺘﺮﻫﺎﯼ ﻓﻮﻕ ﺗﻤﺎﻡ ﺳﻴﮕﻨﺎ ﻝ ﻫﺎﯼ ﺑﺎﻻﺗﺮ ﺍﺯ ﻣﺤﺪﻭﺩﻩ ﻓﻮﻕ ﺭﺍ ﺑﻼﮎ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺍﺯ ﺗﺪﺍﺧﻞ ﺳﻴﮕﻨﺎﻝ ﻫﺎﯼ ﺩﺍﺩﻩ ﺑﺎ ﻣﮑﺎﻟﻤﺎﺕ ﺗﻠﻔﻨﯽ ﺟﻠﻮﮔﻴﺮﯼ ﺑﻌﻤﻞ ﻣﯽ ﺁﻳﺪ. ﺗﺠﻬﻴﺰﺍﺕ DSL
ADSLﺍﺯ ﺩﻭ ﺩﺳﺘﮕﺎﻩ ﺧﺎﺹ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﺪ .ﻳﮑﯽ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎ ﺩﺭ ﻣﺤﻞ ﻣﺸﺘﺮﮐﻴﻦ ﻭ ﺩﺳﺘﮕﺎﻩ ﺩﻳﮕﺮ ﺑﺮﺍﯼ ، ISPﺷﺮﮐﺖ ﺗﻠﻔﻦ ﻭ ﻳﺎ ﺳﺎﺯﻣﺎﻧﻬﺎﯼ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ ، DSL
ﻧﺼﺐ ﻣﯽ ﮔﺮﺩﺩ .ﺩﺭ ﻣﺤﻞ ﻣﺸﺘﺮﮐﻴﻦ ﺍﺯ ﻳﮏ ﺗﺮﺍﻧﺴﻴﻮﺭ DSLﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ .ﺷﺮﮐﺖ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ DSLﺍﺯ ﻳﮏ DSL Access Multiplexerﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﺪ 64
) .(DSLAMﺍﺯ ﺩﺳﺘﮕﺎﻩ ﻓﻮﻕ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺭﻳﺎﻓﺖ ﺍﺗﺼﺎﻻﺕ ﻣﺸﺘﺮﮐﻴﻦ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺗﺸﺮﻳﺢ ﻫﺮ ﻳﮏ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎﯼ ﻓﻮﻕ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ.
ﺗﺮﺍﻧﺴﻴﻮﺭ DSL
ﺍﮐﺜﺮ ﻣﺸﺘﺮﮐﻴﻦ ، DSLﺗﺮﺍﻧﺴﻴﻮﺭ DSLﺭﺍ ﻣﻮﺩﻡ DSLﻣﯽ ﻧﺎﻣﻨﺪ .ﻣﻬﻨﺪﺳﻴﻦ ﻭ ﮐﺎﺭﺷﻨﺎﺳﺎﻥ
ﺷﺮﮐﺖ ﻫﺎﯼ ﺗﻠﻔﻦ ﺑﻪ ﺩﺳﺘـﮕﺎﻩ ﻓﻮﻕ ATU-Rﻣﯽ ﮔﻮﻳﻨﺪ .ﺻﺮﻓـﻨﻈﺮ ﺍﺯ ﻫﺮ ﻧﺎﻣﯽ ﮐﻪ ﺑﺮﺍﯼ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﺷﻮﺩ ،ﺩﺳﺘﮕﺎﻩ ﻓﻮﻕ ﻧﻘﻄﻪ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﮐﺎﻣﭙﻴﻮﺗﺮ ﮐﺎﺭﺑﺮ ﻭ ﻳﺎ ﺷﺒﮑﻪ ﺑﻪ ﺧﻂ DSLﺍﺳﺖ .ﺗﺮﺍﻧﺴﻴﻮﺭ ﺑﺎ ﺍﺳﺘــﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ ﻫـﺎﯼ ﻣــﺘﻔﺎﻭﺕ ﺑﻪ ﺩﺳـﺘﮕﺎﻩ ﻣﺸﺘﺮﮐﻴﻦ ﻣﺘﺼﻞ
ﻣﯽ ﮔﺮﺩﺩ .ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﺭﻭﺵ ،ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺗﺼﺎﻻﺕ USBﻭ ﻳﺎ ﺍﺗﺮﻧﺖ ﺍﺳﺖ.
DSLAM ﺩﺳﺘﮕﺎﻩ ﻓﻮﻕ ﺩﺭ ﻣﺮﺍﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ DSLﻧﺼﺐ ﻭ ﺍﻣﮑﺎﻥ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﻣﺒﺘﻨﯽ ﺑﺮ DSLﺭﺍ ﻓﺮﺍﻫﻢ ﻣﯽ ﻧﻤﺎﻳﺪ DSLAM .ﺍﺗﺼﺎﻻﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺗﻌﺪﺍﺩﯼ ﺍﺯ ﻣﺸﺘﺮﮐﻴﻦ ﺭﺍ ﮔﺮﻓﺘﻪ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺑﻪ ﻳﮏ ﺍﺗﺼﺎﻝ ﺑﺎ ﻇﺮﻓﻴﺖ ﺑﺎﻻ ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﺑﺮ ﺭﻭﯼ ﺍﻳﻨﺘﺮﻧﺖ ﺗﺒﺪﻳﻞ
ﻣﯽ ﻧﻤﺎﻳﺪ .ﺩﺳﺘﮕﺎﻫﻬﺎﯼ DSLAMﺩﺍﺭﺍﯼ ﺍﻧﻌﻄﺎﻑ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﻄﻮﻁ DSLﻣﺘﻔﺎﻭﺕ ،ﭘﺮﻭﺗﮑﻞ ﻫﺎﯼ ﻣﺘﻔﺎﻭﺕ ﻭ ﻣﺪﻭﻻﺳﻴﻮﻥ ﻣﺘﻔﺎﻭﺕ ) (Cap,DMTﻣﯽ ﺑﺎﺷﻨﺪ. ﺩﺭ ﺑﺮﺧﯽ ﺍﺯ ﻣﺪﻝ ﻫﺎﯼ ﻓﻮﻕ ﺍﻣﮑﺎﻥ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﺧﺎﺻﯽ ﻧﻈﻴﺮ ﺍﺧﺘﺼﺎﺹ ﭘﻮﻳﺎﯼ ﺁﺩﺭﺱ ﻫﺎﯼ IPﺑﻪ ﻣﺸﺘﺮﮐﻴﻦ ،ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺭﺩ. ﻳﮑﯽ ﺍﺯ ﺗﻔﺎﻭﺕ ﻫﺎﯼ ﻣﻬﻢ ﺑﻴﻦ ADSLﻭ ﻣﻮﺩﻡ ﻫﺎﯼ ﮐﺎﺑﻠﯽ ،ﻧﺤﻮﻩ ﺑﺮﺧﻮﺭﺩ ﻭ ﺭﻓﺘﺎﺭ DSLAMﺍﺳﺖ .ﮐﺎﺭﺑﺮﺍﻥ ﻣﻮﺩﻡ ﻫﺎﯼ ﮐﺎﺑﻠﯽ ﺍﺯ ﻳﮏ ﺷﺒﮑﻪ ﺑﺴﺘﻪ ﺑﺼﻮﺭﺕ ﺍﺷﺘﺮﺍﮐﯽ ﺍﺳﺘﻔﺎﺩﻩ 65
ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻳﮑﻪ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺍﻓﺰﺍﻳﺶ ﺗﻌﺪﺍﺩ ﮐﺎﺭﺑﺮﺍﻥ ،ﮐﺎﺭﺁﺋﯽ ﺁﻧﻬﺎ ﺗﻨﺰﻝ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ ﮐﺮﺩ ADSL .ﺑﺮﺍﯼ ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﺭﺑﺮﺍﻥ ﻳﮏ ﺍﺭﺗﺒﺎﻁ ﺍﺧﺘﺼﺎﺻﯽ ﺍﻳﺠﺎﺩ ﻭ ﺁﻥ ﺭﺍ ﺑﻪ
DSLAMﻣﺘﺼﻞ ﻣﯽ ﻧﻤﺎﻳﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺍﻓﺰﺍﻳﺶ ﮐﺎﺭﺑﺮﺍﻥ ،ﮐﺎﺭﺁﺋﯽ ﻣﺮﺑﻮﻃﻪ ﺗﻨﺰﻝ ﭘﻴﺪﺍ ﻧﺨﻮﺍﻫﺪ ﮐﺮﺩ .ﻭﺿﻌﻴﺖ ﻓﻮﻕ ﺗﺎ ﺯﻣﺎﻧﻴﮑﻪ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺯ ﺗﻤﺎﻡ ﻇﺮﻓﻴﺖ ﻣﻮﺟﻮﺩ ﺧﻂ ﺍﺭﺗﺒﺎﻃﯽ ﺑﺎ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻧﮑﺮﺩﻩ ﺑﺎﺷﻨﺪ ،ﺍﺩﺍﻣﻪ ﺧﻮﺍﻫﺪ ﻳﺎﻓﺖ .ﺩﺭ ﺻﻮﺭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻤﺎﻡ ﻇﺮﻓـﻴﺖ
ﺧﻂ ﺍﺭﺗﺒﺎﻃﯽ ﺍﻳﻨﺘﺮﻧﺖ ،ﻣﺮﺍﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ DSLﻣﯽ ﺗﻮﺍﻧﻨﺪ ﻧﺴﺒﺖ ﺑﻪ ﺍﺭﺗﻘﺎﺀ ﺧﻂ ﺍﺭﺗﺒﺎﻃﯽ ﺍﻳﻨﺘﺮﻧﺖ ﺍﻗﺪﺍﻡ ﺗﺎ ﺗﻤﺎﻡ ﻣﺸﺘﺮﮐﻴﻦ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ DSLAMﺩﺍﺭﺍﯼ ﮐﺎﺭﺁﺋﯽ ﻣﻄﻠﻮﺏ ﺩﺭ ﺯﻣﻴﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﮔﺮﺩﻧﺪ.
ﺁﻳﻨﺪﻩ DSL ADSLﺑﺎ ﺳﺎﻳﺮ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﯼ ﻣﺮﺑﻮﻁ ﺑﻪ ﺩﺳﺘﻴﺎﺑﯽ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻧﻈﻴﺮ ﻣﻮﺩﻡ ﻫﺎﯼ ﮐﺎﺑﻠﯽ ﻭ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺎﻫﻮﺍﺭﻩ ﺍﯼ ﺭﻗﺎﺑﺖ ﻣﯽ ﻧﻤﺎﻳﺪ .ﺑﺮ ﻃﺒﻖ ﺁﻣﺎﺭ ﺍﺧﺬ ﺷﺪﻩ ﺩﺭ ﺳﺎﻝ ،١٩٩٩
ﺑﻴﺶ ﺍﺯ ٣٣٠,٠٠٠ﻣﻨﺰﻝ ﺩﺭ ﺍﻣﺮﻳﮑﺎ ﺍﺯ DSLﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩﻩ ﺍﻧﺪ .ﺗﻌﺪﺍﺩ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻮﺩﻡ ﻫـﺎﯼ ﮐﺎﺑﻠﯽ ﺗﺎ ﺳﺎﻝ ١٩٩٩ﺑﻪ ﻣﺮﺯ ١,٣٥٠,٠٠٠ﮐﺎﺭﺑﺮ ﺭﺳﻴﺪﻩ ﺍﺳﺖ .ﺑﺮ ﺍﺳﺎﺱ ﭘﻴﺶ ﺑﻴﻨﯽ ﺑﻌﻤﻞ ﺁﻣﺪﻩ ﺗﺎ ﺍﻭﺍﺧﺮ ﺳﺎﻝ ،٢٠٠٣ﺗــﻌﺪﺍﺩ ﻣـــﺸﺘﺮﮐﻴﻦ ﻣﻮﺩﻡ ﻫﺎﯼ ﮐﺎﺑــﻠﯽ ﺑﻪ ﻣﺮﺯ ٨,٩٨٠,٠٠٠ﻭ ﻣﺸﺘﺮﮐﻴﻦ DSLﺑﻪ ٩,٣٠٠,٠٠٠ﺧﻮﺍﻫﺪ ﺭﺳﻴﺪ.
ﺳﺮﻋﺖ ADSLﺩﺭ ﺣﺎﻝ ﺣﺎﺿﺮ ﺣﺪﺍﮐﺜﺮ ١,٥ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺍﺳﺖ .ﺍﺯ ﻟﺤﺎﻅ ﺗﺌﻮﺭﯼ ﺭﺳﻴﺪﻥ ﺑﻪ ﻣﺮﺯ ٧ﻣﮕﺎﺑﺎﻳﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺩﻭﺭ ﺍﺯ ﺩﺳﺘﺮﺱ ﻧﻤﯽ ﺑﺎﺷﺪ .ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺗﺤﻘﻴﻘﺎﺕ ﻋﻤﺪﻩ ﺍﯼ ﺻﻮﺭﺕ ﮔﺮﻓﺘﻪ ﻭ ﺗﮑﻨﻮﻟﻮﮊﯼ VDSLﻣﻄﺮﺡ ﺷﺪﻩ ﺍﺳﺖ.
66
VDSL ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﻄﻮﻁ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﯽ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻃﯽ ﺳﺎﻟﻴﺎﻥ ﺍﺧﻴﺮ ﺑﺸﺪﺕ ﺭﺷﺪ ﺩﺍﺷﺘﻪ ﺍﺳﺖ .ﻣﻮﺩﻡ ﻫﺎﯼ ﮐﺎﺑﻠﯽ ﻭ ﺧﻄﻮﻁ ADSLﺩﻭ ﺭﻭﻳﮑﺮﺩ ﻣﺘﻔﺎﻭﺕ ﺩﺭ ﺍﻳﻦ
ﺯﻣﻴﻨﻪ ﻣﯽ ﺑﺎﺷﻨﺪ .ﺗﮑﻨﻮﻟﻮﮊﯼ ﻫﺎﯼ ﻓﻮﻕ ﺍﻣﮑﺎﻥ ﺩﺳﺘﻴﺎﺑﯽ ﮐﺎﺭﺑﺮﺍﻥ ﺭﺍ ﺑﺎ ﺳﺮﻋﺖ ﻣﻄﻠﻮﺏ ﺑﻪ
ﺍﻳﻨﺘﺮﻧﺖ ﻓﺮﺍﻫﻢ ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﺍﻳﻨﺘﺮﻧﺖ ﺑﺴﺮﻋﺖ ﺩﺭ ﺣﺎﻝ ﺭﺷﺪ ﺩﺭ ﺗﻤﺎﻣﯽ ﺍﺑﻌﺎﺩ ﺍﺳﺖ .ﺗﻠﻮﻳﺰﻳﻮﻥ ﻫﺎﯼ ﺩﻳﺠﻴﺘﺎﻟﯽ ﻭ ﭘﺨﺶ ﺗﺼﺎﻭﻳﺮ ﻭﻳﺪﺋﻮﻳﻲ ﺩﻭ ﮐﺎﺭﺑﺮﺩ ﺟﺪﻳﺪ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻮﺩﻩ ﮐﻪ ﻋﻼﻗﻪ
ﻣﻨﺪﺍﻥ ﻭ ﻣﺸﺘﺎﻗﺎﻥ ﺯﻳﺎﺩﯼ ﺭﺍ ﺑﻪ ﺧﻮﺩ ﺟﻠﺐ ﻧﻤﻮﺩﻩ ﺍﺳﺖ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﻓﻮﻕ ﻭ ﺳﺎﻳﺮ ﺧﺪﻣﺎﺕ ﻣﺸﺎﺑﻪ ،ﮐﺎﺭﺑﺮﺍﻥ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻨﺪﮔﺎﻥ ﺍﻳﻨﺘﺮﻧﺖ ﻧﻴﺎﺯﻣﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﻄﻮﻁ ﺑﻤﺮﺍﺗﺐ ﺳﺮﻳﻌﺘﺮ ﻧﺴﺒﺖ ﺑﻪ ﻭﺿﻌﻴﺖ ﻓﻌﻠﯽ ﻣﯽ ﺑﺎﺷﻨﺪ .ﻣﻮﺩﻡ ﻫﺎﯼ ﮐﺎﺑﻠﯽ ﻭ ﻳﺎ ﺧﻄﻮﻁ ADSLﻋﻠﻴﺮﻏﻢ
ﺍﺭﺍﺋﻪ ﺳﺮﻋﺖ ﻣﻨﺎﺳﺐ ﺩﺭ ﮐﺎﺭﺑـﺮﺩﻫﺎﺋﯽ ﮐﻪ ﺑﻪ ﺁﻧﻬﺎ ﺍﺷــﺎﺭﻩ ﮔﺮﺩﻳﺪ ،ﻓﺎﻗﺪ ﺳﺮﻋﺖ ﻻﺯﻡ ﻣﯽ ﺑﺎﺷﻨﺪ.
ﺍﺧﻴﺮﺍ" ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﺷﺮﮐﺖ ﻫﺎﯼ ﻣﺘﻌﺪﺩﯼ ﺗﮑﻨﻮﻟﻮﮊﯼ Very high bit-rate ( VDSL (DSLﺭﺍ ﻣﻄﺮﺡ ﻧﻤﻮﺩﻩ ﺍﻧﺪ .ﺑﺮﺧﯽ ﺍﺯ ﺷﺮﮐﺖ ﻫﺎ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺍﺋﻪ ﺳﺮﻭﻳﺲ ﻓﻮﻕ ﺩﺭ ﺑﺮﺧﯽ ﺍﺯ
ﻧﻘﺎﻁ ﮐﺸﻮﺭﺍﻣﺮﻳﮑﺎ ﻧﻤﻮﺩﻩ ﺍﻧﺪ VDSL .ﭘﻬﻨﺎﯼ ﺑﺎﻧﺪ ﺑﺴﻴﺎﺭ ﺑﺎﻻﺋﯽ ﺭﺍ ﺍﺭﺍﺋﻪ ﻭ ﺳﺮﻋﺖ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ٥٢ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺍﺳﺖ .ﺳﺮﻋﺖ ﻓﻮﻕ ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ) DSLﺣﺪﺍﮐﺜﺮ ﺳﺮﻋﺖ ٨ ﺗﺎ ﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ( ﻭ ﻳﺎ ﻣﻮﺩﻡ ﻫﺎﯼ ﮐﺎﺑﻠﯽ ﺑﺴﻴﺎﺭ ﺑﺎﻻ ﺑﻮﺩﻩ ﻭ ﻗﻄﻌﺎ" ﻧﻘﻄﻪ ﻋﻄﻔﯽ ﺩﺭ ﺯﻣﻴﻨﻪ ﺩﺳﺘﻴﺎﺑﯽ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﻧﻈﺮ ﺳﺮﻋﺖ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﻧﻘﻄﻪ ﻋﻄﻒ ﻗﺒﻠﯽ ،ﮔﺬﺭ ﺍﺯ ﻣﺮﺣﻠﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻮﺩﻡ ﻫﺎﯼ ﺑﺎ ﻇﺮﻓﻴﺖ ٥٦ﮐﻴﻠﻮ ﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺑﻪ broadbandﺑﻮﺩ. ADSLﺍﺯ ﺩﻭ ﺩﺳﺘﮕﺎﻩ ﺧﺎﺹ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﺪ .ﻳﮑﯽ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎ ﺩﺭ ﻣﺤﻞ ﻣﺸﺘﺮﮐﻴﻦ ﻭ ﺩﺳﺘﮕﺎﻩ ﺩﻳﮕﺮ ﺑﺮﺍﯼ ،ISPﺷﺮﮐﺖ ﺗﻠﻔﻦ ﻭ ﻳﺎ ﺳﺎﺯﻣﺎﻧﻬﺎﯼ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ،DSL ﻧﺼﺐ ﻣﯽ ﮔﺮﺩﺩ .ﺩﺭ ﻣﺤﻞ ﻣﺸﺘﺮﮐﻴﻦ ﺍﺯ ﻳﮏ ﺗﺮﺍﻧﺴﻴﻮﺭ DSLﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ .ﺷﺮﮐﺖ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ DSLﺍﺯ ﻳﮏ Multiplexer DSL Accessﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﺪ
. (DSLAM).ﺍﺯ ﺩﺳﺘﮕﺎﻩ ﻓﻮﻕ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺭﻳﺎﻓﺖ ﺍﺗﺼﺎﻻﺕ ﻣﺸﺘﺮﮐﻴﻦ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ. 67
ﺍﮐﺜﺮ ﻣﺸﺘﺮﮐﻴﻦ ،DSLﺗﺮﺍﻧﺴﻴﻮﺭ DSLﺭﺍ ﻣﻮﺩﻡ DSLﻣﯽ ﻧﺎﻣﻨﺪ .ﻣﻬﻨﺪﺳﻴﻦ ﻭ ﮐﺎﺭﺷﻨﺎﺳﺎﻥ
ﺷﺮﮐﺖ ﻫﺎﯼ ﺗﻠﻔﻦ ﺑﻪ ﺩﺳﺘﮕﺎﻩ ﻓﻮﻕ ATU-Rﻣﯽ ﮔﻮﻳﻨﺪ .ﺻﺮﻓﻨﻈﺮ ﺍﺯ ﻫﺮ ﻧﺎﻣﯽ ﮐﻪ ﺑﺮﺍﯼ ﺁﻥ
ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﺷﻮﺩ ،ﺩﺳﺘﮕﺎﻩ ﻓﻮﻕ ﻧﻘﻄﻪ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﮐﺎﻣﭙﻴﻮﺗﺮ ﮐﺎﺭﺑﺮ ﻭ ﻳﺎ ﺷﺒﮑﻪ ﺑﻪ ﺧﻂ DSLﺍﺳﺖ .ﺗﺮﺍﻧﺴﻴﻮﺭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ ﻫﺎﯼ ﻣﺘﻔﺎﻭﺕ ﺑﻪ ﺩﺳﺘﮕﺎﻩ ﻣﺸﺘﺮﮐﻴﻦ ﻣﺘﺼﻞ
ﻣﯽ ﮔﺮﺩﺩ .ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﺭﻭﺵ ،ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺗﺼﺎﻻﺕ USBﻭ ﻳﺎ ﺍﺗﺮﻧﺖ ﺍﺳﺖ.
ﺩﺳﺘﮕﺎﻩ ﻓﻮﻕ ﺩﺭ ﻣﺮﺍﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ DSLﻧﺼﺐ ﻭ ﺍﻣﮑﺎﻥ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﻣﺒﺘﻨﯽ ﺑﺮ DSLﺭﺍ ﻓﺮﺍﻫﻢ ﻣﯽ ﻧﻤﺎﻳﺪ DSLAM .ﺍﺗﺼﺎﻻﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺗﻌﺪﺍﺩﯼ ﺍﺯ ﻣﺸﺘﺮﮐﻴﻦ ﺭﺍ ﮔﺮﻓﺘﻪ
ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺑﻪ ﻳﮏ ﺍﺗﺼﺎﻝ ﺑﺎ ﻇﺮﻓﻴﺖ ﺑﺎﻻ ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﺑﺮ ﺭﻭﯼ ﺍﻳﻨﺘﺮﻧﺖ ﺗﺒﺪﻳﻞ ﻣﯽ ﻧﻤﺎﻳﺪ. ﺩﺳﺘﮕﺎﻫﻬﺎﯼ DSLAMﺩﺍﺭﺍﯼ ﺍﻧﻌﻄﺎﻑ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﻄﻮﻁ DSL
ﻣﺘﻔﺎﻭﺕ ،ﭘﺮﻭﺗﮑﻞ ﻫﺎﯼ ﻣﺘﻔﺎﻭﺕ ﻭ ﻣﺪﻭﻻﺳﻴﻮﻥ ﻣﺘﻔﺎﻭﺕ ) (Cap,DMTﻣﯽ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺑﺮﺧﯽ ﺍﺯ ﻣﺪﻝ ﻫﺎﯼ ﻓﻮﻕ ﺍﻣﮑﺎﻥ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﺧﺎﺻﯽ ﻧﻈﻴﺮ ﺍﺧﺘﺼﺎﺹ ﭘﻮﻳﺎﯼ ﺁﺩﺭﺱ ﻫﺎﯼ IPﺑﻪ ﻣﺸﺘﺮﮐﻴﻦ ،ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺭﺩ. ﻳﮑﯽ ﺍﺯ ﺗﻔﺎﻭﺕ ﻫﺎﯼ ﻣﻬﻢ ﺑﻴﻦ ADSLﻭ ﻣﻮﺩﻡ ﻫﺎﯼ ﮐﺎﺑﻠﯽ ،ﻧﺤﻮﻩ ﺑﺮﺧﻮﺭﺩ ﻭ ﺭﻓﺘﺎﺭ DSLAMﺍﺳﺖ .ﮐﺎﺭﺑﺮﺍﻥ ﻣﻮﺩﻡ ﻫﺎﯼ ﮐﺎﺑﻠﯽ ﺍﺯ ﻳﮏ ﺷﺒﮑﻪ ﺑﺴﺘﻪ ﺑﺼﻮﺭﺕ ﺍﺷﺘﺮﺍﮐﯽ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻳﮑﻪ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺍﻓﺰﺍﻳﺶ ﺗﻌﺪﺍﺩ ﮐﺎﺭﺑﺮﺍﻥ ،ﮐﺎﺭﺁﺋﯽ ﺁﻧﻬﺎ ﺗﻨﺰﻝ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ ﮐﺮﺩ ADSL .ﺑﺮﺍﯼ ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﺭﺑﺮﺍﻥ ﻳﮏ ﺍﺭﺗﺒﺎﻁ ﺍﺧﺘﺼﺎﺻﯽ ﺍﻳﺠﺎﺩ ﻭ ﺁﻥ ﺭﺍ ﺑﻪ DSLAMﻣﺘﺼﻞ ﻣﯽ ﻧﻤﺎﻳﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺍﻓﺰﺍﻳﺶ ﮐﺎﺭﺑﺮﺍﻥ ،ﮐﺎﺭﺁﺋﯽ ﻣﺮﺑﻮﻃﻪ ﺗﻨﺰﻝ ﭘﻴﺪﺍ ﻧﺨﻮﺍﻫﺪ ﮐﺮﺩ .ﻭﺿﻌﻴﺖ ﻓﻮﻕ ﺗﺎ ﺯﻣﺎﻧﻴﮑﻪ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺯ ﺗﻤﺎﻡ ﻇﺮﻓﻴﺖ ﻣﻮﺟﻮﺩ ﺧﻂ ﺍﺭﺗﺒﺎﻃﯽ ﺑﺎ
ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻧﮑﺮﺩﻩ ﺑﺎﺷﻨﺪ ،ﺍﺩﺍﻣﻪ ﺧﻮﺍﻫﺪ ﻳﺎﻓﺖ .ﺩﺭ ﺻﻮﺭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻤﺎﻡ ﻇﺮﻓﻴﺖ ﺧﻂ
ﺍﺭﺗﺒﺎﻃﯽ ﺍﻳﻨﺘﺮﻧﺖ ،ﻣﺮﺍﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ DSLﻣﯽ ﺗﻮﺍﻧﻨﺪ ﻧﺴﺒﺖ ﺑﻪ ﺍﺭﺗﻘﺎﺀ ﺧﻂ ﺍﺭﺗﺒﺎﻃﯽ ﺍﻳﻨﺘﺮﻧﺖ ﺍﻗﺪﺍﻡ ﺗﺎ ﺗﻤﺎﻡ ﻣﺸﺘﺮﮐﻴﻦ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ DSLAMﺩﺍﺭﺍﯼ ﮐﺎﺭﺁﺋﯽ ﻣﻄﻠﻮﺏ ﺩﺭ ﺯﻣﻴﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﮔﺮﺩﻧﺪ.
68
ﺳﺮﻋﺖ VDSL
ﻋﻤﻠﮑﺮﺩ ، VDSLﺩﺭ ﺍﻏﻠﺐ ﻣﻮﺍﺭﺩ ﻣﺸﺎﺑﻪ ADSLﺍﺳﺖ .ﻋﻠﻴﺮﻏﻢ ﺷﺒﺎﻫﺖ ﻫﺎﯼ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺍﺧﺘﻼﻓﺎﺕ ﻣﺘﻌﺪﺩﯼ ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺭﺩ VDSL .ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺍﺋﻪ ﺳﺮﻋﺖ ٥٢ﻣﮕﺎﺑﻴﺖ ﺩﺭ
ﺛﺎﻧﻴﻪ ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﮐﺎﺭﺑﺮ ) (Downstreamﻭ ١٦ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﮐﺎﺭﺑﺮ ﺑﺮ ﺭﻭﯼ ﺍﻳﻨﺘﺮﻧﺖ ) (Upstreamﺍﺳﺖ. ﺳﺮﻋﺖ ﻫﺎﯼ ﻓﻮﻕ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮ ﺍﺯ ADSLﺍﺳﺖ .ﺩﺭ ADSLﺣﺪﺍﮐﺜﺮ ﺳﺮﻋﺖ ﺍﺭﺳﺎﻝ
ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﮐﺎﺭﺑﺮ ٨ ،ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﻭ ﺳﺮﻋﺖ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﮐﺎﺭﺑﺮ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ٨٠٠ﮐﻴﻠﻮﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺍﺳﺖ VDSL .ﺳﺮﻋﺖ ﺑﺎﻻﯼ ﺧﻮﺩ ﺭﺍ ﻣﺪﻳﻮﻥ ﻣﺤﺪﻭﺩﺗﺮ ﺷﺪﻥ ﻓﺎﺻﻠﻪ ﺑﻴﻦ ﻣﺸﺘﺮﮐﻴﻦ ﻭ ﻣﺮﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ ﻓﻮﻕ ﺍﺳﺖ .ﺣﺪﺍﮐﺜﺮ ﻣﺴﺎﻓﺖ ﻣﻮﺟﻮﺩ ٤,٠٠٠ﻓﻮﺕ ) ١,٢٠٠ﻣﺘﺮ ( ﺍﺳﺖ.
ﺷﺮﮐﺖ ﻫﺎﯼ ﺗﻠﻔﻦ ﺩﺭ ﺣﺎﻝ ﺟﺎﻳﮕﺰﻳﻦ ﻧﻤﻮﺩﻥ ﺍﻏﻠﺐ ﺗﺠﻬﻴﺰﺍﺕ )ﻣﺮﺑﻮﻁ ﺑﻪ ﺗﻐﺬﻳﻪ ﺍﻃﻼﻋﺎﺕ(
ﺑﻪ ﻓﻴﺒﺮ ﻧﻮﺭﯼ ﻣﯽ ﺑﺎﺷﻨﺪ .ﺍﮐﺜﺮ ﺷﺮﮐﺖ ﻫﺎﯼ ﺗﻠﻔﻦ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﯼ Fiber to the (FTTC (curbﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﺷﺮﮐﺖ ﻫﺎﯼ ﻓﻮﻕ ﻗﺼﺪ ﺩﺍﺭﻧﺪ ﮐﻪ ﺗﻤﺎﻡ ﺧﻄﻮﻁ ﻣﺴﯽ ﻣﻮﺟﻮﺩ ﺭﺍ
ﺗﺎ ﻣﺤﻠﯽ ﮐﻪ ﺍﺯ ﺁﻧﻬﺎ ﺍﻧﺸﻌﺎﺏ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﻭ ﺑﻪ ﻣﻨﺎﺯﻝ ﻣﺸﺘﺮﮐﻴﻦ ﺗﻮﺯﻳﻊ ﻣﯽ ﮔﺮﺩﺩ ،ﺗﻌﻮﻳﺾ ﻧﻤﺎﻳﻨﺪ .ﺷﺮﮐﺖ ﻫﺎﯼ ﺗﻠﻔﻦ ﺩﺭ ﺗﻼﺵ ﺑﺮﺍﯼ ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﺳﻴﺴﺘﻢ Fiber To the (FFTN(Neighborhoodﻣﯽ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺭﻭﺵ ﻓﻮﻕ ﺩﺭ ﻋﻮﺽ ﻧﺼﺐ ﮐﺎﺑﻞ ﻓﻴﺒﺮ ﻧﻮﺭﯼ ﺩﺭ ﻫﺮﺧﻴﺎﺑﺎﻥ FFTN ،ﺩﺍﺭﺍﯼ ﻓﻴﺒﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﺗﺎ ﺟﻌﺒﻪ ﺍﺗﺼﺎﻻﺕ ) ﺍﻧﺸﻌﺎﺑﺎﺕ ( ﺑﺮﺍﯼ ﻳﮏ ﻫﻤﺴﺎﻳﻪ ) ﻣﺸﺘﺮﮎ ( ﺧﺎﺹ ﺍﺳﺖ.
ﺑﺎ ﺍﺍﺳﺘﻘﺮﺍﺭ ﻳﮏ ﺗﺮﺍﻧﺴﻴﻮﺭ VDSLﺩﺭ ﻣﻨﺰﻝ ﻭ ﻳﮏ VDSL gatewayﺩﺭ ﺟﻌﺒﻪ ﺗﻘﺴﻴﻢ ﺍﺗﺼﺎﻻﺕ ،ﻣﺤﺪﻭﺩﻳﺖ ﻓﺎﺻﻠﻪ ﮐﻢ ﺭﻧﮓ ﺧﻮﺍﻫﺪ ﺷﺪ gateway .ﺑﺎﻋﺚ ﻣﺮﺍﻗﺒﺖ ﺍﺯ ﺗﺒﺪﻳﻼﺕ ﺁﻧﺎﻟﻮﮒ ﺑﻪ ﺩﻳﺠﻴﺘﺎﻝ ﻭ ﺩﻳﺠﻴﺘﺎﻝ ﺑﻪ ﺁﻧﺎﻟﻮﮒ ﮐﻪ ﺑﺎﻋﺚ ﻏﻴﺮﻓﻌﺎﻝ ﺷﺪﻥ ADSLﺑﺮ ﺭﻭﯼ ﺧﻄﻮﻁ ﻓﻴﺒﺮ ﻧﻮﺭﯼ ﻣﯽ ﮔﺮﺩﺩ Gateway .ﺩﺍﺩﻩ ﻫﺎﯼ ﻭﺭﻭﺩﯼ ﻭ ﺩﺭﻳﺎﻓﺖ ﺷﺪﻩ ﺍﺯ ﺗﺮﺍﻧﺴﻴﻮﺭ ﺭﺍ ﺑﻪ ﭘﺎﻟﺲ ﻫﺎﯼ ﻧﻮﺭ ﺗﺒﺪﻳﻞ ﺗﺎ ﺯﻣﻴﻨﻪ ﺍﺭﺳﺎﻝ ﺁﻧﻬﺎ ﺍﺯ ﻃﺮﻳﻖ ﻓﻴﺒﺮ ﻧﻮﺭﯼ ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ .ﺯﻣﺎﻧﻴﮑﻪ ﺩﺍﺩﻩ ﻫﺎ ﺑﺮﺍﯼ ﮐﺎﻣﭙﻴﻮﺗﺮ ﮐﺎﺭﺑﺮ ﺍﺭﺳﺎﻝ ﻣﯽ ﮔﺮﺩﻧﺪ) ﺑﺮﮔﺸﺖ ﺩﺍﺩﻩ ( Gateway ،ﻣﻮﺟﻮﺩ ﺳﻴﮕﻨﺎﻝ ﻫﺎﯼ 69
ﻭﺭﻭﺩﯼ ﺍﺯ ﻓﻴﺒﺮ ﻧﻮﺭﯼ ﺭﺍ ﺗﺒﺪﻳﻞ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺑﺮﺍﯼ ﺗﺮﺍﻧﺴﻴﻮﺭ ﮐﺎﺭﺑﺮ ﺍﺭﺳﺎﻝ ﻣﯽ ﻧﻤﺎﻳﺪ .ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ ﻣﻴﻠﻴﻮﻥ ﻫﺎ ﻣﺮﺗﺒﻪ ﺗﮑﺮﺍﺭ ﺧﻮﺍﻫﺪ ﮔﺮﺩﻳﺪ.
ADSLﻭ VDSLﺻﺮﻓﺎ" ﺩﻭ ﻧﻤﻮﻧﻪ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻁ ﻫﺎﯼ ﻣﺮﺑﻮﻁ ﺑﻪ DSL spectrum ﻣﯽ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺑﺮﺭﺳﯽ ﺳﺎﻳﺮ ﻣﺪﻝ ﻫﺎﯼ ﻣﺮﺑﻮﻁ ﺑﻪ ﺗﮑﻨﻮﻟﻮﮊﯼ ﻓﻮﻕ ﺍﺷﺎﺭﻩ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﻣﻘﺎﻳﺴﻪ ﺍﻧﻮﺍﻉ DSL
ﻧﻤﻮﻧﻪ ﻫﺎﯼ ﻣﺘﻔﺎﻭﺗﯽ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﯼ DSLﺗﺎﮐﻨﻮﻥ ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﺷﺪﻩ ﺍﺳﺖ: •
.(ADSL(Asymmetric DSLﺩﺭﻣﺪﻝ ﻓﻮﻕ ﺑﺪﻟﻴﻞ ﺗﻔﺎﻭﺕ ﺳﺮﻋﺖ ﺩﺭﻳﺎﻓﺖ ﻭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﻭﺍﮊﻩ " ﻧﺎﻣﺘﻘﺎﺭﻥ " ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺍﺳﺖ .ﻣﺎﻫﻴﺖ ﻋﻤﻠﻴﺎﺕ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺗﻮﺳﻂ ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﺑﮕﻮﻧﻪ ﺍﯼ ﺍﺳﺖ ﮐﻪ ﻫﻤﻮﺍﺭﻩ ﺣﺠﻢ ﺍﻃﻼﻋﺎﺕ ﺩﺭﻳﺎﻓﺘﯽ
ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻟﯽ ﺍﺳﺖ. •
. (HDSL(High bit-rate DSLﺳﺮﻋﺖ ﻣﺪﻝ ﻓﻮﻕ ﺩﺭ ﺣﺪ ﺧﻄﻮﻁ T1ﺍﺳﺖ ) ٥/١ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ( .ﺳﺮﻋﺖ ﺩﺭﻳﺎﻓﺖ ﻭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎ ﺕ ﺩﺭ ﺭﻭﺵ ﻓﻮﻕ
ﻳﮑﺴﺎﻥ ﺑﻮﺩﻩ ﻭ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﻧﻴﺎﺯ ﺑﻪ ﺩﻭ ﺧﻂ ﻣﺠﺰﺍ ﻧﺴﺒﺖ ﺑﻪ ﺧﻂ ﺗﻠﻔﻦ ﻣﻌﻤﻮﻟﯽ ﻣﻮﺟﻮﺩ ﺍﺳﺖ. •
. (ISDL(ISDN DSLﻣﺪﻝ ﻓﻮﻕ ﺩﺭ ﺍﺑﺘﺪﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻨﺪﻩ ﺍﺯ ISDNﻗﺮﺍﺭ ﮔﺮﻓﺖ ISDL .ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ﺳﺎﻳﺮ ﻣﺪﻝ ﻫﺎﯼ DSLﺩﺍﺭﺍﯼ ﭘﺎﻳﻴﻦ ﺗﺮﻳﻦ ﺳﺮﻋﺖ ﺍﺳﺖ .ﺳﺮﻋﺖ ﺍﻳﻦ ﺧﻄﻮﻁ ١٤٤ﮐﻴﻠﻮﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺍﺳﺖ )ﺩﻭ ﺟﻬﺖ(.
•
. ( MSDSL(Multirate Symmetric DSLﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ﺳﺮﻋﺖ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﻳﮑﺴﺎﻥ ﺍﺳﺖ .ﻧﺮﺥ ﺳﺮﻋﺖ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺗﻮﺳﻂ ﻣﺮﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ ، DSLﺗﻨﻈﻴﻢ ﻣﯽ ﮔﺮﺩﺩ.
•
. (RADSL(Rate Adaptiveﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﻣﺪﻝ ADSLﺑﻮﺩﻩ ﻭ ﺍﻳﻦ ﺍﻣﮑﺎﻥ ﺭﺍ ﺑﻪ ﻣﻮﺩﻡ ﺧﻮﺍﻫﺪ ﺩﺍﺩ ﮐﻪ ﺳﺮﻋﺖ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﺭﺍ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻋﻮﺍﻣﻠﯽ ﻧﻈﻴﺮ ﻣﺴﺎﻓﺖ
ﻭ ﮐﻴﻔﻴﺖ ﺧﻂ ﺗﻌﻴﻴﻦ ﻧﻤﺎﻳﺪ. 70
•
. ( SDLS(Symmetric DSLﺳﺮﻋﺖ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﻳﮑﺴﺎﻥ ﺍﺳﺖ .ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ﺑﺮ ﺧﻼﻑ HDSLﮐﻪ ﺍﺯ ﺩﻭ ﺧﻂ ﻣﺠﺰﺍ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﺪ،
ﺻﺮﻓﺎ" ﺑﻪ ﻳﮏ ﺧﻂ ﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺑﻮﺩ. •
. ( VDSL(Very high bit-rateﻣﺪﻝ ﻓﻮﻕ ﺑﺼﻮﺭﺕ "ﻧﺎﻣﺘﻘﺎﺭﻥ " ﺑﻮﺩﻩ ﻭ ﺩﺭ
•
.(VoDSL(Voice-over DSLﻳﮏ ﻧﻮﻉ ﺧﺎﺹ ﺍﺯ IPﺗﻠﻔﻨﯽ ﺍﺳﺖ .ﺩﺭ ﻣﺪﻝ
ﻣﺴﺎﻓﺖ ﻫﺎﯼ ﮐﻮﺗﺎﻩ ﺑﻬﻤﺮﺍﻩ ﺧﻄﻮﻁ ﻣﺴﯽ ﺗﻠﻔﻦ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ.
ﻓﻮﻕ ﭼﻨﺪﻳﻦ ﺧﻂ ﺗﻠﻔﻦ ﺗﺮﮐﻴﺐ ﻭ ﺑﻪ ﻳﮏ ﺧﻂ ﺗﻠﻔﻦ ﺗﺒﺪﻳﻞ ﺗﺒﺪﻳﻞ ﻣﯽ ﺷﻮﻧﺪ.
ﺟﺪﻭﻝ ﺯﻳﺮ ﻧﻤﻮﻧﻪ ﻫﺎﯼ ﻣﺘﻔﺎﻭﺕ ﺗﮑﻨﻮﻟﻮﮊﯼ DSLﺭﺍ ﻧﺸﺎﻥ ﻣﯽ ﺩﻫﺪ. ﻧﻮﻉ
ﺣﺪﺍﮐﺜﺮ
ﺣﺪﺍﮐﺜﺮ ﺳﺮﻋﺖ
DSL
ﺳﺮﻋﺖ ﺍﺭﺳﺎﻝ
ﺩﺭﻳﺎﻓﺖ
ADSL
800 Kbps
8 Mbps
ﺣﺪﺍﮐﺜﺮ ﻣﺴﺎﻓﺖ
ﺧﻄﻮﻁ
ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻮﺭﺩ ﻧﻴﺎﺯ
ﺍﺯ ﺗﻠﻔﻦ
18,000 ft (5,500 )m
1
Yes
12,000 ft (3,650 1.54 Mbps 1.54 Mbps HDSL )m
2
No
IDSL
144 Kbps
144 Kbps
35,000 ft (10,700 )m
1
No
MSDSL
2 Mbps
2 Mbps
29,000 ft (8,800 )m
1
No
RADSL
1 Mbps
7 Mbps
18,000 ft (5,500 )m
1
Yes
SDSL
2.3 Mbps
2.3 Mbps
22,000 ft (6,700 )m
1
No
VDSL
16 Mbps
52 Mbps
4,000 ft (1,200 )m
1
Yes
71
ﺍﻳﻨﺘﺮﻧﺖ ﻣﺎﻫﻮﺍﺭﻩ ﺍﯼ ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻣﮑﺎﻧﺎﺕ ﻣﺘﻌﺪﺩﯼ ﻗﺎﺩﺭ ﺑﻪ ﺍﺗﺼﺎﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﺍﺳﺘﻔﺎﺩﻩ
ﺍﺯ ﻣﻨﺎﺑﻊ ﻣﻮﺟﻮﺩ ﻣﯽ ﺑﺎﺷﻨﺪ .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﻄﻮﻁ ﺗﻠﻔﻦ ﻣﻌﻤﻮﻟﯽ ،ﻣﻮﺩﻡ ﮐﺎﺑﻠﯽ ،ﺧﻄﻮﻁ ،DSL ﺍﻳﻨﺘﺮﻧﺖ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ،ﻧﻤﻮﻧﻪ ﻫﺎﺋﯽ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻣﯽ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﻗﺎﺩﺭ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻫﻴﭽﮑﺪﺍﻡ ﺍﺯ ﻭﺳﺎﻳﻞ ﺍﺭﺗﺒﺎﻃﯽ ﻓﻮﻕ ﻧﺒﺎﺷﻨﺪ )ﺑﺪﻟﻴﻞ ﻭﺟﻮﺩ ﻣﺴﺎﻓﺖ ﺯﻳﺎﺩ ﺑﻴﻦ ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻨﺪﻩ ﻭ ﻣﺮﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ( ،ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺎﻫﻮﺍﺭﻩ
ﺍﯼ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﺍﻳﻨﺘﺮﻧﺖ ﻣﺎﻫﻮﺍﺭﻩ ﺍﯼ ﺍﺯ ﺧﻄﻮﻁ ﺗﻠﻔﻦ ﻭ ﻳﺎ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﻣﺒﺘﻨﯽ ﺑﺮ ﮐﺎﺑﻞ ﺑﺮﺍﯼ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﯽ ﻧﻤﺎﻳﺪ .ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺳﻴﺴﺘﻢ ﻫﺎ ﺍﺯ ﻳﮏ "ﺑﺸﻘﺎﺏ
ﻣﺎﻫﻮﺍﺭﻩ ﺍﯼ " ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ) ﺩﻭ ﻃﺮﻓﻪ ( ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ .ﻣﻌﻤﻮﻻ" ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺳﻴﺴﺘﻢ ﻫﺎ ﺳﺮﻋﺖ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻣﻌﺎﺩﻝ ﻳﮏ ﺩﻫﻢ ﺳﺮﻋﺖ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺖ .ﻣﻮﺩﻡ ﻫﺎﯼ ﮐﺎﺑﻠﯽ ﻭ ﺧﻄﻮﻁ DSLﻧﺴﺒﺖ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺎﻫﻮﺍﺭﻩ ﺍﯼ ﺩﺍﺭﺍﯼ ﺳﺮﻋﺖ
ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮﯼ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﻣﯽ ﺑﺎﺷﻨﺪ .ﺳﺮﻋﺖ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺎﻫﻮﺍﺭﻩ ﺍﯼ ﺩﻩ ﺑﺮﺍﺑﺮ ﺳﺮﻋﺖ ﻳﮏ ﻣﻮﺩﻡ ﻣﻌﻤﻮﻟﯽ ﺍﺳﺖ. ﻣﻮﺳﺴﺎﺕ ﻭ ﺷﺮﮐﺖ ﻫﺎﯼ ﻣﺘﻔﺎﻭﺗﯽ ﺗﺎﮐﻨﻮﻥ ﺳﺮﻭﻳﺲ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺎﻫﻮﺍﺭﻩ ﺍﯼ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻋﻼﻗﻪ ﻣﻨﺪﺍﻥ ﻗﺮﺍﺭ ﻣﯽ ﺩﻫﻨﺪ Teledesic, StarBand,Pegasus Express .ﻭ Tachyonﻧﻤﻮﻧﻪ ﻫﺎﺋﯽ ﺍﺯ ﺷﺮﮐﺖ ﻫﺎﯼ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺎﻫﻮﺍﺭﻩ ﺍﯼ ﺑﺼﻮﺭﺕ ﺩﻭ ﻃﺮﻓﻪ ﻣﯽ ﺑﺎﺷﻨﺪ .ﺳﺮﻭﻳﺲ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺗﻮﺳﻂ Tachyonﺩﺭ ﺍﻣﺮﻳﮑﺎ ،ﺍﺭﻭﭘﺎﯼ ﻏﺮﺑﯽ ﻭ ﻣﮑﺰﻳﮏ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ Pegasus Express .ﻧﺴﺨﻪ ﺩﻭ ﻃﺮﻓﻪ DirectPCﺍﺳﺖ. ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺎﻫﻮﺍﺭﻩ ﺍﯼ ﺩﻭ ﻃﺮﻓﻪ ﺍﺯ ﻋﻨﺎﺻﺮ ﺯﻳﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﺷﻮﺩ : •
ﻳﮏ "ﺑﺸﻘﺎﺏ " ) (Dishﺑﺎ ﺍﺑﻌﺎﺩ ﺩﻭ ﻭ ﻳﺎ ﺳﻪ ﻓﻮﺕ
•
ﺩﻭ ﻋﺪﺩ ﻣﻮﺩﻡ ) ( Uplink,downlink
•
ﮐﺎﺑﻞ ﻫﺎﯼ ﮐﻮﺍﮐﺴﻴﺎﻝ ﺑﻴﻦ ﺑﺸﻘﺎﺏ ﻭ ﻣﻮﺩﻡ
72
ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺎﻫﻮﺍﺭﻩ ﺍﯼ ﺩﻭ ﻃﺮﻓﻪ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﯼ IP multicastingﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﺷﻮﺩ .ﺩﺭ
ﺍﻳﻦ ﺣﺎﻟﺖ ﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ٥,٠٠٠ﮐﺎﻧﺎﻝ ﺑﺼﻮﺭﺕ ﻫﻤﺰﻣﺎﻥ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﺻﺮﻓﺎ" ﻳﮏ ﻣﺎﻫﻮﺍﺭﻩ ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﺷﺪ ، IP multicasting .ﺩﺍﺩﻩ ﻫﺎﯼ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺍﺯ ﻳﮏ ﻧﻘﻄﻪ ﺑﻪ ﭼﻨﺪﻳﻦ ﻧﻘﻄﻪ ﻭ ﺑﺼﻮﺭﺕ ﻓﺸﺮﺩﻩ ،ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ) ﺩﺭ ﻳﮏ ﺯﻣﺎﻥ ( .ﺑﺎ ﻓﺸﺮﺩﻩ ﺳﺎﺯﯼ ﺍﻃﻼﻋﺎﺕ، ﺣﺠﻢ ﺩﺍﺩﻩ ﻫﺎ ﮐﺎﻫﺶ ﻭ ﺍﺯ ﭘﻬﻨﺎﯼ ﺑﺎﻧﺪ ﻣﻮﺟﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺑﻬﻴﻨﻪ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺩﺭ ﺳﻴﺴﺘﻢ ) DirectPCﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺗﻮﺳﻂ ، (DirectTVﮐﺎﺭﺑﺮﺍﻥ ﻫﻤﭽﻨﺎﻥ ﻣﯽ ﺑﺎﻳﺴﺖ ﺍﺯ ﻳﮏ ISPﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ﮐﺎﺭﺑﺮﺍﻥ ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺍﺑﺘﺪﺍ ﻣﯽ ﺑﺎﻳﺴﺖ ﺑﺎ ISPﺗﻤﺎﺱ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﻭ ﻳﺎ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﻧﻤﺎﻳﻨﺪ.
73
VOIP IPﺗﻠﻔﻨﯽ ،ﺍﺭﺳﺎﻝ ﻣﮑﺎﻟﻤﺎﺕ ﺗﻠﻔــﻨﯽ ﺑﺮ ﺭﻭﯼ ﻳﮏ ﺷﺒـﮑﻪ ﻣﺒﺘﻨﯽ ﺑﺮ ﺩﺍﺩﻩ ﺍﺳﺖ .ﺑﻪ
ﻧﮑﻨﻮﻟﻮﮊﯼ ﻓﻮﻕ (Voice-over IP(VoIPﻧﻴﺰ ﮔﻔﺘﻪ ﻣﯽ ﺷﻮﺩ .ﺍﻣﺮﻭﺯﻩ ﻣﮑﺎﻟﻤﺎﺕ ﮔﺴﺘﺮﺩﻩ ﺍﯼ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﮑﻪ ﻫﺎﯼ ﻣﺒﺘﻨﯽ ﺑﺮ ﺩﺍﺩﻩ ) ﻧﻈﻴﺮ ﺍﻳﻨﺘﺮﻧﺖ ( ﺍﻧﺠﺎﻡ ﻣﯽ ﺷﻮﺩ. Circuit Switching ﺷﺮﮐﺖ ﻫﺎﯼ ﺗﻠﻔﻦ ﺑﻴﺶ ﺍﺯ ﻳﮑﺼﺪ ﺳﺎﻝ ﺍﺳﺖ ﮐﻪ ﺍﺯ ﺗﮑــﻨﻮﻟﻮﮊﯼ
Circuit
Switchingﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺭﻭﺵ ﻓﻮﻕ ﺑﻤﺤﺾ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒـــﺎﻁ ﺑﻴﻦ ﺩﻭ ﻧﻔﺮ، ﺩﺭ ﺗﻤﺎﻡ ﻣﺪﺕ ﺯﻣﺎﻥ ﻣﮑﺎﻟﻤﻪ ﻳﮏ ﻣﺪﺍﺭ ﺍﺧﺘﺼﺎﺻﯽ ﺑﺮﺍﯼ ﺁﻧﻬﺎ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺑﺪﻳﻦ
ﺗﺮﺗﻴﺐ ﺑﺮﺍﯼ ﺩﻭ ﻧﻘﻄﻪ ﻣﺮﺑﻮﻃﻪ ﻳﮏ ﺍﺭﺗﺒﺎﻁ ﺩﻭ ﺳﻮﻳﻪ ﺍﻳﺠﺎﺩ ﻣﯽ ﮔﺮﺩﺩ .ﻧﺤﻮﻩ ﺍﻧﺠﺎﻡ ﻳﮏ ﻣﮑﺎﻟﻤﻪ ﺻﻮﺗﯽ ﺑﻪ ﺻﻮﺭﺕ ﺯﻳﺮ ﺍﺳﺖ: •
ﭘﺲ ﺍﺯ ﺑﺮﺩﺍﺷﺘﻦ ﮔﻮﺷﯽ ﺗﻠﻔﻦ ﻳﮏ ﺑﻮﻕ ﺷﻨﻴﺪﻩ ﻣﯽ ﮔﺮﺩﺩ .ﺑﻮﻕ ﻓﻮﻕ ﺑﻤﻨﺰﻟﻪ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺷﺮﮐﺖ ﺗﻠﻔﻦ ) ﻣﺮﮐﺰ ﻣﺮﺑﻮﻃﻪ ( ﺍﺳﺖ.
• •
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻴﺴﺘﻢ ﺗﻠﻔﻦ ،ﺍﻗﺪﺍﻡ ﺑﻪ ﺷﻤﺎﺭﻩ ﮔﻴﺮﯼ ﻣﯽ ﮔﺮﺩﺩ.
ﺍﺭﺗﺒﺎﻁ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺯ ﻃﺮﻳﻖ ﻣﺠﻤﻮﻋﻪ ﺍﯼ ﺍﺯ ﺳﻮﺋﻴﺞ ﻫﺎ ﻋﺒﻮﺭ ﺩﺍﺩﻩ ﺷﺪﻩ ﺗﺎ ﺑﻪ ﻣﺨﺎﻃﺐ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺮﺳﺪ.
•
ﻳﮏ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺗﻠﻔﻦ ﺷﻤﺎ ﻭ ﻣﺨﺎﻃﺐ ﺑﺮﻗﺮﺍﺭ ﻭ ﻳﮏ ﻣﺪﺍﺭ ﻓﻌﺎﻝ ﻣﯽ ﮔﺮﺩﺩ.
•
ﻣﮑﺎﻟﻤﻪ ﺑﺎ ﻣﺨﺎﻃﺐ ﻣﻮﺭﺩ ﻧﻈﺮ ﺩﺭ ﻣﺪﺕ ﺯﻣﺎﻥ ﺩﻟﺨﻮﺍﻩ ﺍﻧﺠﺎﻡ ﻣﯽ ﮔﻴﺮﺩ.
•
ﭘﺲ ﺍﺯ ﻗﻄﻊ ﻣﮑﺎﻟﻤﻪ ،ﻣﺪﺍﺭ ﻓﻌﺎﻝ ﺷﺪﻩ ﺑﻴﻦ ﺷﻤﺎ ﻭ ﻣﺨﺎﻃﺐ ﻏﻴﺮ ﻓﻌﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ.
74
ﻓﺮﺽ ﮐﻨﻴﺪ ﻣﺪﺕ ﺯﻣﺎﻥ ﻣﮑﺎﻟﻤﻪ ﺷﻤﺎ ﺩﻩ ﺩﻗﻴﻘﻪ ﺑﺎﺷﺪ ،ﺩﺭ ﻃﻮﻝ ﻣﺪﺕ ﺯﻣﺎﻥ ﻓﻮﻕ ﻣﺪﺍﺭ ﺍﻳﺠﺎﺩ
ﺷﺪﻩ ﺑﻴﻦ ﺩﻭ ﺗﻠﻔﻦ ﺑﺼﻮﺭﺕ ﭘﻴﻮﺳﺘﻪ ﻓﻌﺎﻝ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺩﺭ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﻗﺪﻳﻤﯽ ﻣﺨﺎﺑﺮﺍﺗﯽ،
ﻣﮑﺎﻟﻤﻪ ﺗﻠﻔﻨﯽ ﺑﺎ ﻧﺮﺥ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺛﺎﺑﺖ ٦٤ﮐﻴﻠﻮ ﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﻭ ﻳﺎ ١٠٢٤ﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺩﺭ ﻫﺮ ﺟﻬﺖ ﺍﻧﺠﺎﻡ ﻣﯽ ﮔﺮﻓﺖ ) ﻣﺠﻤﻮﻉ ﻧﺮﺥ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ١٢٨ﮐﻴﻠﻮﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ( .ﺑﺎ
ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﺩﺭ ﻫﺮ ﮐﻴﻠﻮﺑﺎﻳﺖ ،ﻫﺸﺖ ﮐﻴﻠﻮﺑﻴﺖ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ،ﺑﻨﺎﺑﺮﺍﻳﻦ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ ١٦ﮐﻴﻠﻮ ﺑﺎﻳﺖ ﻭ ﻳﺎ ﺩﺭ ﻫﺮ ﺩﻗﻴﻘﻪ ٩٦٠ﮐﻴﻠﻮﺑﺎﻳﺖ ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻝ ﻣﯽ ﮔﺮﺩﺩ) ﺯﻣﺎﻧﯽ ﮐﻪ ﻣﺪﺍﺭ ﻓﻌﺎﻝ ﺍﺳﺖ ( .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺩﺭ ﻣﺪﺕ ﺯﻣﺎﻥ ﺩﻩ ﺩﻗﻴﻘﻪ ﺍﺭﺗﺒﺎﻁ ﺗﻠﻔﻨﯽ ،ﻣﺠﻤﻮﻉ ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ٩٦٠٠ﮐﻴﻠﻮ ﺑﺎﻳﺖ ) ٩/٤ﻣﮕﺎﺑﺎﻳﺖ ( ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
ﺩﺭ ﻳﮏ ﻣﮑﺎﻟﻤﻪ ﺗﻠﻔﻨﯽ ﺍﮐﺜﺮ ﺩﺍﺩﻩ ﻫﺎﯼ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺑﻴﻬﻮﺩﻩ ﻣﯽ ﺑﺎﺷﻨﺪ .ﺯﻣﺎﻧﯽ ﮐﻪ ﺷﻤﺎ ﺣﺮﻑ ﻣﯽ ﺯﻧﻴﺪ ،ﻣﺨﺎﻃﺐ ﺻﺮﻓﺎ" ﮔﻮﺵ ﻣﯽ ﺩﻫﺪ .ﺍﻳﻦ ﺑﺪﺍﻥ ﻣﻌﻨﯽ ﺍﺳﺖ ﮐﻪ ﺩﺭ ﻫﺮ ﻣﻘﻄﻊ ﺯﻣﺎﻧﯽ، ﺍﺯﻧﺼﻒ ﺧﻂ ﺍﺭﺗﺒﺎﻃﯽ ﺑﻴﺸﺘﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﯽ ﮔﺮﺩﺩ ) .ﺳﮑﻮﺕ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﯼ ﺧﻂ ﺩﺭ ﻣﺪﺕ
ﺯﻣﺎﻥ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﺯﻳﺎﺩ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ( ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ﺣﺠﻢ ﺍﻃﻼﻋــــﺎﺕ ﺍﺭﺳﺎﻝ ﺷﺪﻩ، ﺑﻪ ٤/٧ﻣﮕﺎﺑﺎﻳﺖ ﺗﻨﺰﻝ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
ﺷﺒﮑﻪ ﻫﺎﯼ ﻣﺒﺘﻨﯽ ﺑﺮ ﺩﺍﺩﻩ ﺍﺯ ﺭﻭﺵ Circuit switchingﺍﺳﺘﻔﺎﺩﻩ ﻧﮑﺮﺩﻩ ﻭ ﺩﺭ ﻣﻘﺎﺑﻞ، ﺭﻭﺵ Packet Switchingﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ.
Packet Switching ﺩﺭ ﺭﻭﺵ Packet Switchingﺑﺮ ﺧﻼﻑ Switching Circuitﮐﻪ
ﺑﺼﻮﺭﺕ ﭘﻴﻮﺳﺘﻪ ﺍﺭﺗﺒﺎﻁ ﺭﺍ ﻓﻌﺎﻝ ﻧﮕﻪ ﻣﯽ ﺩﺍﺭﺩ ،ﺻﺮﻓﺎ" ﺩﺭ ﺯﻣﺎﻥ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ) ﻳﮏ ﺑﺨﺶ ﮐﻮﭼﮏ ﺩﺍﺩﻩ ﮐﻪ ﺑﻪ ﺁﻥ packetﮔﻔﺘﻪ ﻣﯽ ﺷﻮﺩ ( ﺍﺭﺗﺒﺎﻁ ﻓﻌﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﻓﺮﺳﺘﻨﺪﻩ ﺑﻪ ﻣﺠﻤﻮﻋﻪ ﺍﯼ ﺍﺯ Packetﺗﻘﺴﻴﻢ ﻣﯽ ﮔﺮﺩﺩ .ﺩﺭ ﻫﺮ ﻳﮏ ﺍﺯ ﺑﺴﺘﻪ ﻫﺎﯼ ﺍﻃﻼﻋﺎﺗﯽ ﺁﺩﺭﺱ ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﺍﻃﻼﻋﺎﺕ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﮔﺮﻓﺖ .ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﺑﺴﺘﻪ ﻫﺎﯼ ﺍﻃﻼﻋﺎﺗﯽ ،ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﻠﺤﻖ ﺗﺎ ﺍﻃﻼﻋﺎﺕ ﺍﻭﻟﻴﻪ ﺑﻮﺟﻮﺩ ﺁﻳﻨﺪ.
75
ﺭﻭﺵ ﻓﻮﻕ ﺑﺴﻴﺎﺭ ﮐﺎﺭﺁ ﺑﻮﺩﻩ ﻭ ﺯﻣﺎﻥ ﻓﻌﺎﻝ ﺑﻮﺩﻥ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﮔﻴﺮﻧﺪﻩ ﺭﺍ ﺑﻪ ﺣﺪﺍﻗﻞ
ﻣﻘﺪﺍﺭ ﺧﻮﺩ ﻣﯽ ﺭﺳﺎﻧﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺗﺮﺍﻓﻴﮏ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﯼ ﺷﺒﮑﻪ ﻧﻴﺰ ﮐﺎﻫﺶ ﺧﻮﺍﻫﺪ ﻳﺎﻓﺖ .ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﯼ ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﮔﻴﺮﻧﺪﻩ ﺩﺭ ﺯﻣﺎﻥ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻗﺎﺩﺭ ﺑﻪ ﺩﺭﻳﺎﻓﺖ ﻭ ﻳﺎ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﯼ ﺳﺎﻳﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻧﻴﺰ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ.
ﺗﮑﻨﻮﻟﻮﮊﯼ VoIPﺍﺯ ﺭﻭﺵ Packet Switchingﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮐﻨﺪ .ﺑﺎﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ
ﻓﻮﻕ ﺍﻣﮑﺎﻥ ﺑﺮﻗﺮﺍﺭﯼ ﭼﻨﺪﻳﻦ ﻣﮑﺎﻟﻤﻪ ﺗﻠﻔﻨﯽ ﻓﺮﺍﻫﻢ ﻣﯽ ﮔﺮﺩﺩ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ، PSTNﻳﮏ ﻣﮑﺎﻟﻤﻪ ﺩﻩ ﺩﻗﻴﻘﻪ ﺍﯼ ،ﺩﻩ ﺩﻗﻴﻘﻪ ﮐﺎﻣﻞ ﺍﺯ ﺯﻣﺎﻥ ﺍﻧﺘﻘﺎﻝ ﺑﺎ ﻧﺮﺥ ١٢٨ﮐﻴﻠﻮﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺭﺍ ﺍﺷﻐﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺩﺭ ﺭﻭﺵ ، VoIPﻣﮑﺎﻟﻤﻪ ﺩﻩ ﺩﻗﻴﻘﻪ ﺍﯼ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﺻﺮﻓﺎ" ٥/٣ﺩﻗﻴﻘﻪ ﺯﻣﺎﻥ
ﺍﻧﺘﻘﺎﻝ ﺭﺍ ﺑﺎ ﻧﺮﺥ ٦٤ﮐﻴﻠﻮﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺍﺷﻐﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ٦٤ﮐﻴﻠﻮﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺑﺮﺍﯼ ﻣﺪﺕ ٥/٣ﺩﻗﻴﻘﻪ ،ﻭ ١٢٨ﮐﻴﻠﻮﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺑﺮﺍﯼ ﺯﻣﺎﻥ ﺑﺎﻗﻴﻤﺎﻧﺪﻩ ٦/ ٥ﺁﺯﺍﺩ ﺧﻮﺍﻫﺪ ﻣﺎﻧﺪ.
ﻓﺮﺽ ﮐﻨﻴﺪ ﮐﻪ ﺷﺮﮐﺖ ﺷﻤﺎ ﺩﺳﺘﮕﺎﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻤﻨﻄﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺮﻭﻳﺲ VoIPﺭﺍ ﺧﺮﻳﺪﺍﺭﯼ ﻭ ﻧﺼﺐ ﮐﺮﺩﻩ ﺑﺎﺷﺪ .ﺩﺭ ﺷﺮﮐﺖ ﻣﺮﺑﻮﻃﻪ ﺻﺪﻫﺎ ﺗﻠﻔﻦ ﻭ ﻳﮏ Private (PBX (branch exchangeﻧﻴﺰ ﻧﺼﺐ ﺷﺪﻩ ﺍﺳﺖ PBX .ﺳﻮﺋﻴﭽﯽ ﺍﺳﺖ ﮐﻪ ﺍﺯ ﺁﻥ ﺑﻤﻨﻈﻮﺭ
ﺍﺭﺗﺒﺎﻁ ﻣﺠﻤﻮﻋﻪ ﺍﯼ ﺍﺯ ﺗﻠﻔﻦ ﻫﺎ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻭ ﺑﻪ ﻳﮏ ﻳﺎ ﭼﻨﺪﻳﻦ ﺧﻂ ﺧﺎﺭﺝ ﺍﺯ ﺷﺮﮐﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ .ﺩﺭ ﻣﺜﺎﻝ ﻓﻮﻕ PBXﺑﺼﻮﺭﺕ ﻳﮏ gatewayﺍﺳﺖ.
ﺍﺯ gatewayﺑﻤﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺩﺳﺘﮕﺎﻫﻬﺎﯼ ﻣﻮﺟﻮﺩ ﺩﺭ ﺩﻭ ﺷﺒﮑﻪ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻴﮕﺮﺩﺩ PBX .ﻳﮏ Gatewayﺍﺳﺖ ).ﭼﻮﻥ ﺳﻴﮕﻨﺎﻝ ﻫﺎﯼ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ circuit-
switchingﻫﺮ ﻳﮏ ﺍﺯ ﺗﻠﻔﻦ ﻫﺎ ﺭﺍ ﺑﻪ ﺩﺍﺩﻩ ﻫﺎﯼ ﺩﻳﺠﻴﺘﺎﻝ ﺑﻤﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﺷﺒﮑﻪ ﻣﺒﺘﻨﯽ ﺑﺮ IPﻭ Packet Switchingﺗﺒﺪﻳﻞ ﻣﯽ ﻧﻤﺎﻳﺪ(. ﺭﻭﺵ ﺑﺮﻗﺮﺍﺭﯼ ﻳﮏ ﻣﮑﺎﻟﻤﻪ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﺷﺒﮑﻪ Packet-Switchingﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ VoIPﺑﺼﻮﺭﺕ ﺯﻳﺮ ﺍﺳﺖ : •
ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﺭﺍ ﻓﻌﺎﻝ ﺗﺎ ﺍﺯ ﻃﺮﻳﻖ ﺁﻥ ﻳﮏ ﺳﻴﮕﻨﺎﻝ ﺑﺮﺍﯼ PBXﺍﺭﺳﺎﻝ ﮔﺮﺩﺩ.
•
PBXﺳﻴﮕﻨﺎﻝ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻭ ﻳﮏ ﺑﻮﻕ ﺁﺯﺍﺩ ﺭﺍ ﺑﺮﺍﯼ ﻓﺮﺳﺘﻨﺪﻩ ﺍﺭﺳﺎﻝ ﻣﯽ ﺩﺍﺭﺩ. 76
•
ﻓﺮﺳﺘﻨﺪﻩ ﺍﻗﺪﺍﻡ ﺑﻪ ﺷﻤﺎﺭﻩ ﮔﻴﺮﯼ ﺗﻠﻔﻦ ﻣﺨﺎﻃﺐ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﻣﯽ ﻧﻤﺎﻳﺪ .ﺷﻤﺎﺭﻩ ﻓﻮﻕ ﺩﺭ
•
ﭘﺲ ﺍﺯ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﺷﻤﺎﺭﻩ ﺗﻮﺳﻂ ﻓﺮﺳﺘﻨﺪﻩ PBX ،ﺑﻤﻨﻈﻮﺭ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺻﺤﺖ
ﺍﺩﺍﻣﻪ ﺗﻮﺳﻂ PBXﺑﺼﻮﺭﺕ ﻣﻮﻗﺖ ﺫﺧﻴﺮﻩ ﻣﯽ ﮔﺮﺩﺩ.
ﻓﺮﻣﺖ ،ﺁﻥ ﺭﺍ ﺑﺮﺭﺳﯽ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
•
PBXﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻧﺠﻮﻩ ﺗﻄﺒﻴﻖ ﺷﻤﺎﺭﻩ ﺩﺭﻳﺎﻓﺘﯽ ﺑﺎ ﺷﺨﺺ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﻗﺪﺍﻣﺎﺕ ﻻﺯﻡ ﺭﺍ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺩﺭﻓﺮﺁﻳﻨﺪ ﺗﻄﺒﻴﻖ ،ﺷﻤﺎﺭﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﺁﺩﺭﺱ IPﺩﺳﺘﮕﺎﻩ ﺩﻳﮕﺮ ﮐﻪ "ﻣﻴﺰﺑﺎﻥ "IPﻧﺎﻣﻴﺪﻩ ﻣﯽ ﮔﺮﺩﺩ ،ﻣﻠﺤﻖ ﻣﯽ ﮔﺮﺩﺩ" .ﻣﻴﺰﺑﺎﻥ "IPﻋﻤﻼ" ﻳﮏ PBX ﺩﻳﺠﻴﺘﺎﻟﯽ ﺩﻳﮕﺮ ﺍﺳﺖ ﮐﻪ ﺑﻪ ﺳﻴﺘﻢ ﺗﻠﻔﻦ ﻣﺤﻠﯽ ﮐﻪ ﺑﺎ ﺁﻥ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﺷﺪﻩ ،ﻧﺼﺐ
ﺷﺪﻩ ﺍﺳﺖ .ﺩﺭ ﻣﻮﺍﺭﺩ ﺧﺎﺻﯽ ﮐﻪ ﻣﺨﺎﻃﺐ ﺍﺯ ﻳﮏ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ VoIPﻣﺒﺘﻨﯽ ﺑﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﺪ " ،ﻣﻴﺰﺑﺎﻥ ، "IPﺳﻴﺴﺘﻤﯽ ﺍﺳﺖ ﮐﻪ ﻗﺼﺪ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺁﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ. •
ﻳﮏ sessionﺑﻴﻦ PBXﺍﺩﺍﺭﻩ ﺗﻤﺎﺱ ﮔﻴﺮﻧﺪﻩ ﻭ "ﻣﻴﺰﺑﺎﻥ "IPﺑﺮﻗﺮﺍﺭ ﻣﯽ ﮔﺮﺩﺩ .ﻫﺮ ﺳﻴﺴﺘﻢ ﻣﯽ ﺑﺎﻳﺴﺖ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎ یﻤﺸﺎﺑﻪ ﺑﻤﻨﻈﻮﺭ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﺪ. ﺳﻴﺴﺘﻢ ﻫﺎ ﺩﻭ ﮐﺎﻧﺎﻝ ﺑﺮﺍﯼ ﻫﺮ ﺟﻬﺖ ﺭﺍ ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ.
•
ﻣﮑﺎﻟﻤﻪ ﺑﻪ ﻣﺪﺕ ﺯﻣﺎﻥ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﻧﺠﺎﻡ ﻣﯽ ﮔﻴﺮﺩ.ﺩﺭ ﺯﻣﺎﻥ ﺑﺮﻗﺮﺍﺭﯼ ﻣﮑﺎﻟﻤﻪPBX ، ﺷﺮﮐﺖ ﺷﻤﺎ ﻭ ﻣﻴﺰﺑﺎﻥ IPﻣﺨﺎﻃﺐ ،ﺑﺴﺘﻪ ﻫﺎﯼ ﺍﻃﻼﻋﺎﺗﯽ ﺭﺍ ﺍﺭﺳﺎﻝ ﻭ ﻳﺎ ﺩﺭﻳﺎﻓﺖ ﻣﯽ ﺩﺍﺭﻧﺪ.
•
ﻣﮑﺎﻟﻤﻪ ﺑﻪ ﺍﺗﻤﺎﻡ ﺭﺳﻴﺪﻩ ﻭ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﻏﻴﺮﻓﻌﺎﻝ ﻣﯽ ﮔﺮﺩﺩ.
•
ﭘﺲ ﺍﺯ ﻗﻄﻊ ﺍﺭﺗﺒﺎﻁ ،ﻣﺪﺍﺭ) ﺍﺭﺗﺒﺎﻁ ( ﻣﻮﺟﻮﺩ ﺑﻴﻦ ﺗﻠﻔﻦ ﺗﻤﺎﺱ ﮔﻴﺮﻧﺪﻩ ﻭ PBXﺁﺯﺍﺩ ﻣﯽ ﮔﺮﺩﺩ.
• •
PBXﺳﻴﮕﻨﺎﻟﯽ ﺭﺍ ﺑﺮﺍﯼ ﻣﻴﺰﺑﺎﻥ IPﺍﺭﺳﺎﻝ ﻭ ﺧﺎﺗﻤﻪ ﻣﮑﺎﻟﻤﻪ ﺭﺍ ﺍﻋﻼﻡ ﻣﯽ ﻧﻤﺎﻳﺪ.
ﭘﺲ ﺍﺯ ﺍﺗﻤﺎﻡ ، sessionﺩﺳﺘﮕﺎﻩ PBXﺷﻤﺎﺭﻩ ﺗﻠﻔﻦ ﺗﻄﺒﻴﻖ ﺩﺍﺩﻩ ﺷﺪﻩ ﺑﻪ "ﻣﻴﺰﺑﺎﻥ "IPﺭﺍ ﺍﺯ ﺣﺎﻓﻈﻪ ﺧﻮﺩ ﭘﺎﮎ ﻣﯽ ﻧﻤﺎﻳﺪ.
77
ﺑﻤﻨﻈﻮﺭ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﺍﺯ ﻃﺮﻳﻖ ﺗﻠﻔﻦ ﺑﺎ ﺩﺳﺘﮕﺎﻫﻬﺎﺋﯽ ﻧﻈﻴﺮ :ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺭ ﻃﻮﻝ ﻳﮏ
ﺷﺒﮑﻪ ،ﻣﯽ ﺑﺎﻳﺴﺖ ﺍﺯ ﻳﮏ ﭘﺮﻭﺗﮑﻞ ﻣﺸﺘﺮﮎ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ. ﭘﺮﻭﺗﮑﻞ
ﺍﺯ ﺩﻭ ﭘﺮﻭﺗﮑﻞ ﻋﻤﺪﻩ ﺑﺮﺍﯼ VoIPﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﺷﻮﺩ .ﭘﺮﻭﺗﮑﻞ ﻫﺎﯼ ﻓﻮﻕ ﺭﻭﺵ ﻫﺎﯼ ﻣﺮﺑﻮﻁ
ﺑﻪ ﺍﺭﺗﺒﺎﻁ ﺩﺳﺘﮕﺎﻫﻬﺎﯼ ﻣﺘﻔﺎﻭﺕ ﺍﺯ ﻃﺮﻳﻖ VoIPﺭﺍ ﻣﺸﺨﺺ ﻭ Codecﻫﺎﯼ ﺻﻮﺗﯽ ﺭﺍ ﻧﻴﺰ ﺗﻌﻴﻴﻦ ﻣﯽ ﻧﻤﺎﻳﺪ" .ﮐﺪﮎ " ﺍﺯ ﺗﻠﻔﻴﻖ ﺩﻭ ﻭﺍﮊﻩ Codeﻭ Decodeﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺍﺳﺖ.
ﮐﺪﮎ ،ﻳﮏ ﺳﻴﮕﻨﺎﻝ ﺻﻮﺗﯽ ﺭﺍ ﺑﻪ ﻳﮏ ﺳﻴﮕﻨﺎﻝ ﺩﻳﺠﻴﺘﺎﻟﯽ ﻓﺸﺮﺩﻩ ﺷﺪﻩ ﺗﺒﺪﻳﻞ ﻣﯽ ﻧﻤﺎﻳﺪ.
ﺍﻭﻟﻴﻦ ﭘﺮﻭﺗﮑﻞ H.323ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺗﻮﺳﻂ ) ITU(International Telecommunication Unionﺍﺳﺖ H.323 .ﻳﮏ ﭘﺮﻭﺗﮑﻞ ﭘﻴﺸﺮﻓﺘﻪ ﻭ ﭘﻴﭽﻴﺪﻩ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﻣﺸﺨﺼﺎﺕ ﻻﺯﻡ ﺑﺮﺍﯼ ﻭﻳﺪﺋﻮﮐﻨﻔﺮﺍﻧﺲ ﻫﺎﯼ
ﻣﺤﺎﻭﺭﻩ ﺍﯼ ﻭ ﺍﺷﻨﺘﺮﺍﮎ ﺩﺍﺩﻩ ﻭ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﯼ ﺻﻮﺗﯽ ﻧﻈﻴﺮ IPﺗﻠﻔﻨﯽ ﺭﺍ ﺗﻌﺮﻳﻒ ﻣﯽ ﻧﻤﺎﻳﺪ. H.323ﺩﺍﺭﺍﯼ ﻣﺠﻤﻮﻋﻪ ﺍﯼ ﺍﺯ ﺳﺎﻳﺮ ﭘﺮﻭﺗﮑﻞ ﻫﺎ ﺑﻮﺩﻩ ﮐﻪ ﻫﺮ ﻳﮏ ﺩﺍﺭﺍﯼ ﮐﺎﺭﺑﺮﺩ ﺧﺎﺹ ﺧﻮﺩ ﻣﯽ ﺑﺎﺷﻨﺪ. H.323 Protocol Video H.261 H.263
Audio
Data
T.122 G.711 T.124 G.722 T.125 G.723.1 T.126 G.728 T.127 G.729
Transport H.225 H.235 H.245 H.450.1 H.450.2 H.450.3 RTP X.224.0
78
ﺧﻴﺮﺍ" ﭘﺮﻭﺗﮑﻞ ﺩﻳﮕﺮﯼ ﺑﺎ ﻧﺎﻡ (session Initiation Protocol(SIPﺗﻮﺳﻂ IETF
ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ SIP.ﻧﺴﺒﺖ ﺑﻪ H.323ﺩﺍﺭﺍﯼ ﮐﺎﺭﺍﺋﯽ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮﯼ ﺑﻮﺩﻩ ﻭ ﺻﺮﻓﺎ" ﺑﺮﺍﯼ IPﺗﻠﻔﻨﯽ ﻃﺮﺍﺣﯽ ﻭ ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﺷﺪﻩ ﺍﺳﺖ. ﺭﻭﺵ ﻫﺎﯼ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ VoIP ﺑﺮﺍﯼ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ، VoIPﭼﻬﺎﺭ ﺣﺎﻟﺖ ﻣﺘﻔﺎﻭﺕ ﻭﺟﻮﺩ ﺩﺍﺭﺩ: •
ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ .ﺳﺎﺩﻩ ﺗــﺮﻳﻦ ﺭﻭﺵ ﺍﺳــﺘﻔﺎﺩﻩ ﺍﺯ VoIPﺍﺳﺖ .ﺷﺮﮐﺖ ﻫﺎﯼ ﻣﺘﻌﺪﺩﯼ ،ﺧﺪﻣﺎﺕ ﻓﻮﻕ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﯽ ﺩﻫﻨﺪ .ﺑﺮﺍﯼ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ ﻓﻮﻕ ﺑﻪ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻣﺮﺑﻮﻃﻪ ،ﻣﻴــﮑﺮﻭﻓﻦ ،ﺑﻠــﻨﺪﮔﻮ ،ﮐﺎﺭﺕ ﺻﺪﺍ ﻭ ﺧﻂ ﺍﺭﺗﺒﺎﻃﯽ ﺑﺎ ﺳﺮﻋﺖ ﻣﻨﺎﺳﺐ ) ﺧﻄﻮﻁ DSLﻭ ﻳﺎ ﻣﻮﺩﻡ ﻫﺎﯼ ﮐﺎﺑﻠﯽ ( ﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺑﻮﺩ MSN Explorer .ﻳﮏ
ﻧﻤﻮﻧﻪ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﯼ ﻣﺮﺑﻮﻃﻪ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺍﺳﺖ. •
ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺗﻠﻔﻦ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ ﻓﻮﻕ ﻣﯽ ﺗﻮﺍﻥ ﺍﺯ ﻃﺮﻳﻖ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﺎ ﻫﺮ ﺷﺨﺺ ﮐﻪ ﺩﺍﺭﺍﯼ ﻳﮏ ﺧﻂ ﺗﻠﻔﻦ ﺍﺳﺖ ،ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﮐﺮﺩ .ﺑﺮﺍﯼ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ
ﻓﻮﻕ ﺑﻪ ﻳﮏ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻓﻮﻕ ﺍﻏﻠﺐ
ﺑﺼﻮﺭﺕ ﺭﺍﻳﮕﺎﻥ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻋﻼﻗﻪ ﻣﻨﺪﺍﻥ ﻗﺮﺍﺭ ﻣﯽ ﮔﻴﺮﺩ .ﻫﺰﻳﻨﻪ ﻣﮑﺎﻟﻤﺎﺕ ﺍﻧﺠﺎﻡ ﺷﺪﻩ،
ﺑﻤﺮﺍﺗﺐ ﭘﺎﻳﻴﻦ ﺗﺮ ﺍﺯ ﺭﻭﺵ ﻫﺎﯼ ﻗﺪﻳﻤﯽ ﺍﺳﺖ. •
ﺗﻠﻔﻦ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ .ﺑﺮﺧﯽ ﺍﺯ ﺷﺮﮐﺖ ﻫﺎ ،ﺷﻤﺎﺭﻩ ﺗﻠﻔﻦ ﻫﺎﯼ ﺧﺎﺻﯽ ﺭﺍ ﺑﻤﻨﻈﻮﺭ ﺗﻤﺎﺱ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻌﻤﻮﻟﯽ ﺗﻠﻔﻦ ﺑﺎ ﮐﺎﺭﺑﺮﺍﻥ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻓﺮﺍﻫﻢ ﻧﻤﻮﺩﻩ ﺍﻧﺪ .ﻧﺼﺐ ﻳﮏ ﻧﺮﻡ ﺍﻓﺰﺍﺭ
ﺧﺎﺹ ﺑﻤﻨﻈﻮﺭ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ،ﺑﺮ ﺭﻭﯼ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ،ﺍﻟﺰﺍﻣﯽ ﺍﺳﺖ.
•
ﺗﻠﻔﻦ ﺑﻪ ﺗﻠﻔﻦ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ Gatewaysﻣﯽ ﺗﻮﺍﻥ ﺑﺎ ﻫﺮ ﺗﻠﻔﻦ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺩﺭ ﺳﻄﺢ ﺩﻧﻴﺎ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﮐﺮﺩ .ﺑﺮﺍﯼ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺮﻭﻳﺲ ﻓﻮﻕ ﮐﻪ ﺗﻮﺳﻂ ﺑﺮﺧﯽ ﺍﺯ ﺷﺮﮐﺖ
ﻫﺎ ﺍﺭﺍﺋﻪ ﻣﯽ ﮔﺮﺩﺩ ،ﻣﯽ ﺑﺎﻳﺴﺖ ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﺎ ﻳﮑﯽ ﺍﺯ Gatewayﻫﺎﯼ ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﻧﺎﻥ
ﺗﻤﺎﺱ ﺑﺮﻗﺮﺍﺭ ﮐﺮﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺷﻤﺎﺭﻩ ﺗﻠﻔﻦ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﺭﺍ ﻣﺸﺨﺺ ﻭ ﻧﻬﺎﻳﺘﺎ" ﺗﻮﺳﻂ 79
ﺷﺮﮐﺖ ﻣﺮﺑﻮﻃﻪ ﺍﻣﮑﺎﻥ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺷﺒﮑﻪ ﻣﺒﺘﻨﯽ ﺑﺮ IPﻓﺮﺍﻫﻢ
ﺧﻮﺍﻫﺪ ﺷﺪ .ﺩﺭ ﺍﻳﻦ ﺭﻭﺵ ،ﻻﺯﻡ ﺍﺳﺖ ﮐﻪ ﺩﺭ ﺍﺑﺘﺪﺍ ﺍﺯ ﻳﮏ ﺷﻤﺎﺭﻩ ﺧﺎﺹ ﺍﺳﺘﻔﺎﺩﻩ
ﮔﺮﺩﺩ ).ﺷﻤﺎﺭﻩ ﻣﺮﺑﻮﻁ ﺑﻪ Gatewayﺷﺮﮐﺖ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ ﻓﻮﻕ (. ﺍﮐﺜﺮ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﻣﻮﺳﺴﺎﺕ ﺑﺎ ﻧﺼﺐ ﺳﻴﺴﺘﻢ ﻫﺎﯼ VoIPﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ IPﺗﻠﻔﻨﯽ ﺭﺍ
ﺑﺮﺍﯼ ﮐﺎﺭﺑﺮﺍﻥ ﺧﻮﺩ ﻓﺮﺍﻫﻢ ﻧﻤﻮﺩﻩ ﺍﻧﺪ .ﺗﮑﻨﻮﻟﻮﮊﯼ ﻓﻮﻕ ﺑﺎ ﺳﺮﻋﺖ ﺩﺭ ﺣﺎﻝ ﺭﺷﺪ ﻭ ﮔﺴﺘﺮﺵ ﻫﻤﮕﺎﻧﯽ ﺍﺳﺖ .ﮐﻴﻔﻴﺖ ﺑﺎﻻ ﻭ ﻫﺰﻳﻨﻪ ﭘﺎﻳﻴﻦ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﺩﻻﻳﻞ ﻓﺮﺍﮔﻴﺮ ﺷﺪﻥ ﺗﮑﻨﻮﻟﻮﮊﯼ ﻓﻮﻕ ﺍﺳﺖ.
80
ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺩﺭ ﺳﺎﻟﻴﺎﻥ ﺍﺧﻴﺮ ﺑﺎ ﺍﺳﺘﻘﺒﺎﻝ ﮔﺴﺘﺮﺩﻩ ﺟﻮﺍﻣﻊ ﺑﺸﺮﯼ ﺭﻭﺑﺮﻭ ﺷﺪﻩ ﺍﺳﺖ.
ﺍﻣﺮﻭﺯﻩ ﮐﻤﺘﺮ ﺷﺨﺼﯽ ﺭﺍ ﻣﯽ ﺗﻮﺍﻥ ﻳﺎﻓﺖ ﮐﻪ ﻭﺍﮊﻩ ﻓﻮﻕ ﺑﺮﺍﯼ ﺍﻭ ﺑﻴﮕﺎﻧﻪ ﺑﺎﺷﺪ .ﻧﺸﺮﻳﺎﺕ، ﺭﺍﺩﻳﻮ ﻭ ﺗﻠﻮﻳﺰﻳﻮﻥ ﺑﻪ ﺻﻮﺭﺕ ﺭﻭﺯﺍﻧﻪ ﻣﻮﺿﻮﻋﺎﺗﯽ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺭﺍ ﻣﻨﺘﺸﺮ
ﻭ ﺍﻓﺮﺍﺩ ﻭ ﮐﺎﺭﺷﻨﺎﺳﺎﻥ ﺍﺯ ﺯﻭﺍﻳﺎﯼ ﻣﺘﻔﺎﻭﺕ ﺑﻪ ﺑﺮﺭﺳﯽ ﻣﻘﻮﻟﻪ ﻓﻮﻕ ﻣﯽ ﭘﺮﺩﺍﺯﻧﺪ .ﺷﺮﮐﺖ ﻫﺎ ﻭ
ﻣﻮﺳﺴﺎﺕ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺕ ﻫﻤﮕﺎﻡ ﺑﺎ ﺳﻴﺮ ﺗﺤﻮﻻﺕ ﺟﻬﺎﺗﯽ ﺩﺭ ﺯﻣﻴﻨﻪ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺩﺭ ﺗﻼﺵ ﺑﺮﺍﯼ ﺗﻐﻴﻴﺮ ﺳﺎﺧﺘﺎﺭ ﻣﻨﻄﻘﯽ ﻭ ﻓﻴﺰﻳﮑﯽ ﺳﺎﺯﻣﺎﻥ ﺧﻮﺩ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻣﯽ ﺑﺎﺷﻨﺪ. ﺗﺠﺎﺭﺕ
ﻗﺒﻞ ﺍﺯ ﺑﺮﺭﺳﯽ " ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ " ،ﻻﺯﻡ ﺍﺳﺖ ﺩﺭ ﺍﺑﺘﺪﺍ ﻳﮏ ﺗﺼﻮﻳﺮ ﺫﻫﻨﯽ ﻣﻨﺎﺳﺐ ﺍﺯ
ﺗﺠﺎﺭﺕ ﺳﻨﺘﯽ ﺭﺍ ﺍﺭﺍﺋﻪ ﻧﻤﺎﺋﻴﻢ .ﺩﺭ ﺻﻮﺭﺕ ﺷﻨﺎﺧﺖ " ﺗﺠﺎﺭﺕ " ،ﺑﺎ " ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ "
ﻧﻴﺰ ﺁﺷﻨﺎ ﺧﻮﺍﻫﻴﻢ ﺷﺪ. ﺑﺮﺍﯼ ﻭﺍﮊﻩ "ﺗﺠﺎﺭﺕ" ﺩﺭ ﺍﮐﺜﺮ ﻭﺍﮊﻩ ﻧﺎﻣﻪ ﻫﺎ ﺗﻌﺎﺭﻳﻒ ﺯﻳﺮ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ: •
ﻣﺒﺎﺩﻻﺕ ﺍﺟﺘﻤﺎﻋﯽ :ﺗﺒﺎﺩﻝ ﺍﻳﺪﻩ ﻫﺎ ،ﻋﻘﺎﻳﺪ ﻭ ﺗﻤﺎﻳﻼﺕ ) ﺧﻮﺍﺳﺘﻪ ﻫﺎ (
•
ﻣﺒﺎﺩﻟﻪ ﻳﺎ ﺧﺮﻳﺪ ﻭ ﻓﺮﻭﺵ ﮐﺎﻻ ﺩﺭ ﻣﻘﻴﺎﺱ ﺑﺎﻻ ﮐﻪ ﺑﻪ ﻫﻤﺮﺍﻩ ﺣﻤﻞ ﮐﺎﻻ ﺍﺯ ﻧﻘﻄﻪ ﺍﯼ ﺑﻪ ﻧﻘﻄﻪ ﺍﯼ ﺩﻳﮕﺮ ﻣﯽ ﺑﺎﺷﺪ .
ﺩﺭ ﺍﺩﺍﻣﻪ ،ﺗﻌﺮﻳﻒ ﺩﻭﻡ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺑﺮﺍﯼ "ﺗﺠﺎﺭﺕ " ﺭﺍ ﺑﻪ ﻋﻨﻮﺍﻥ ﻣﺤﻮﺭ ﺑﺤﺚ ﺍﻧﺘﺨﺎﺏ ﻭ ﺑﺮ
ﺭﻭﯼ ﺁﻥ ﻣﺘﻤﺮﮐﺰ ﺧﻮﺍﻫﻴﻢ ﺷﺪ.
ﺗﺠﺎﺭﺕ ﺩﺭ ﺳﺎﺩﻩ ﺗﺮﻳﻦ ﻧﮕﺎﻩ ،ﻣﺒﺎﺩﻟﻪ ﮐﺎﻻ ﻭ ﺧﺪﻣﺎﺕ ﺑﻪ ﻣﻨﻈﻮﺭ ﮐﺴﺐ ﺩﺭﺁﻣﺪ ) ﭘﻮﻝ ( ﺍﺳﺖ. ﺯﻧﺪﮔﯽ ﺍﻧﺴﺎﻥ ﻣﻤﻠﻮ ﺍﺯ ﻓﺮﺁﻳﻨﺪﻫﺎﯼ ﺗﺠﺎﺭﯼ ﺑﻮﺩﻩ ﻭ ﺗﺠﺎﺭﺕ ﺑﺎ ﻣﻴﻠﻴﻮﻧﻬﺎ ﺷﮑﻞ ﻣﺘﻔﺎﻭﺕ ﺩﺭ
ﺯﻧﺪﮔﯽ ﺑﺸﺮﻳﺖ ﻧﻤﻮﺩ ﭘﻴﺪﺍ ﮐﺮﺩﻩ ﺍﺳﺖ .ﺯﻣﺎﻧﻴﮑﻪ ﮐﺎﻻﯼ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﻳﮏ ﻓﺮﻭﺷﮕﺎﻩ ﺗﺎﻣﻴﻦ ﻭ ﺧﺮﻳﺪﺍﺭﯼ ﻣﯽ ﻧﻤﺎﺋﻴﺪ ،ﺩﺭ ﺗﺠﺎﺭﺕ ﺷﺮﻳﮏ ﻭ ﺩﺭ ﻓﺮﺁﻳﻨﺪﻫﺎﯼ ﺁﻥ ﺩﺭﮔﻴﺮ ﺷﺪﻩ ﺍﻳﺪ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺩﺭ ﺷﺮﮐﺘﯽ ﻣﺸﻐﻮﻝ ﺑﮑﺎﺭ ﻫﺴﺘﻴﺪ ﮐﻪ ﮐﺎﻻﺋﯽ ﺭﺍ ﺗﻮﻟﻴﺪ ﻣﯽ ﻧﻤﺎﻳﺪ ،ﺩﺭﮔﻴﺮ ﻳﮑﯽ ﺩﻳﮕﺮ
81
ﺍﺯ ﺯﻧﺠﻴﺮﻩ ﻫﺎﯼ ﺗﺠﺎﺭﺕ ﺷﺪﻩ ﺍﻳﺪ .ﺗﻤﺎﻡ ﺟﻠﻮﻩ ﻫﺎﯼ ﺗﺠﺎﺭﺕ ﺑﺎ ﻫﺮ ﺭﻭﻳﮑﺮﺩ ﻭ ﺳﻴﺎﺳﺘﯽ ﺩﺍﺭﺍﯼ ﺧﺼﺎﻳﺺ ﺯﻳﺮ ﻣﯽ ﺑﺎﺷﻨﺪ: •
ﺧﺮﻳﺪﺍﺭﺍﻥ .ﺍﻓﺮﺍﺩﻳﮑﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻮﻝ ﺧﻮﺩ ﻗﺼﺪ ﺧﺮﻳﺪ ﻳﮏ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺕ ﺭﺍ
•
ﻓﺮﻭﺷﻨﺪﮔﺎﻥ .ﺍﻓﺮﺍﺩﻳﮑﻪ ﮐﺎﻻ ﻭ ﺧﺪﻣﺎﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺧﺮﻳﺪﺍﺭﺍﻥ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﯽ ﺩﻫﻨﺪ.
ﺩﺍﺭﻧﺪ.
ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺑﻪ ﺩﻭ ﮔﺮﻭﻉ ﻋﻤﺪﻩ ﺗﻘﺴﻴﻢ ﻣﯽ ﮔﺮﺩﻧﺪ :ﺧﺮﺩﻩ ﻓﺮﻭﺷﺎﻥ ،ﮐﻪ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺗﯽ ﺭﺍ ﻣﺴﺘﻘﻴﻤﺎ" ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻣﺘﻘﺎﺿﻴﺎﻥ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﻭ ﻋﻤﺪﻩ ﻓﺮﻭﺷﺎﻥ ﻭ ﻋﻮﺍﻣﻞ ﻓﺮﻭﺵ ،ﮐﻪ ﮐﺎﻻ ﻭ ﺧﺪﻣﺎﺕ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺧﺮﺩﻩ ﻓﺮﻭﺷﺎﻥ ﻭ ﺳﺎﻳﺮ ﻣﻮﺳﺴﺎﺕ ﺗﺠﺎﺭﯼ ﻣﯽ ﻧﻤﺎﻳﻨﺪ.
•
ﺗﻮﻟﻴﺪﮐﻨﻨﺪﮔﺎﻥ .ﺍﻓﺮﺍﺩﻳﮑﻪ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺗﯽ ﺭﺍ ﺍﻳﺠﺎﺩ ﺗﺎ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺁﻧﻬﺎ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺧﺮﻳﺪﺍﺭﺍﻥ ﻗﺮﺍﺭ ﺩﻫﻨﺪ .ﻳﮏ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺎﻫﻴﺖ ﮐﺎﺭ ﺧﻮﺩ ﻫﻤﻮﺍﺭﻩ ﻳﮏ
ﻓﺮﻭﺷﻨﺪﻩ ﻧﻴﺰ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺗﻮﻟﻴﺪﮐﻨﻨﺪﮔﺎﻥ ﮐﺎﻻﯼ ﺗﻮﻟﻴﺪﯼ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﻋﻤﺪﻩ ﻓﺮﻭﺷﺎﻥ ، ﺧﺮﺩﻩ ﻓﺮﻭﺷﺎﻥ ﻭ ﻳﺎ ﻣﺴﺘﻘﻴﻤﺎ" ﺑﻪ ﻣﺼﺮﻑ ﮐﻨﻨﺪﻩ ﮔﺎﻥ ﻣﯽ ﻓﺮﻭﺷﻨﺪ. ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﻣﺸﺎﻫﺪﻩ ﻣﯽ ﮔﺮﺩﺩ " ،ﺗﺠﺎﺭﺕ " ﺍﺯ ﺯﺍﻭﻳﻪ ﻓﻮﻕ ﺩﺍﺭﺍﯼ ﻣﻔﺎﻫﻴﻢ ﺳﺎﺩﻩ ﺍﯼ ﺍﺳﺖ.
ﺗﺠﺎﺭﺕ ﺍﺯ ﺧﺮﻳﺪ ﻳﮏ ﻣﺤﺼﻮﻝ ﺳﺎﺩﻩ ﻧﻈﻴﺮ " ﺑﺴﺘﻨﯽ " ﺗﺎ ﻣﻮﺍﺭﺩ ﭘﻴﭽﻴﺪﻩ ﺍﯼ ﻧﻈﻴﺮ ﺍﺟﺎﺭﻩ ﻣﺎﻫﻮﺍﺭﻩ ﺭﺍ ﺷﺎﻣﻞ ﻣﯽ ﮔﺮﺩﺩ .ﺗﻤﺎﻡ ﺟﻠﻮﻩ ﻫﺎﯼ ﺗﺠﺎﺭﺕ ﺍﺯ ﺳﺎﺩﻩ ﺗﺮﻳﻦ ﺳﻄﺢ ﺗﺎ ﭘﻴﭽﻴﺪﻩ ﺗﺮﻳﻦ ﺣﺎﻟﺖ ﺁﻥ ،ﺑﺮ ﻣﻘﻮﻻﺗﯽ ﻫﻤﭽﻮﻥ :ﺧﺮﻳﺪﺍﺭﺍﻥ ،ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻭ ﺗﻮﻟﻴﺪﮐﻨﻨﺪﮔﺎﻥ ﻣﺘﻤﺮﮐﺰ ﺧﻮﺍﻫﺪ
ﺑﻮﺩ.
ﻋﻨﺎﺻﺮ ﺗﺠﺎﺭﺕ
ﺯﻣﺎﻧﻴﮑﻪ ﻗﺼﺪ ﻣﻌﺮﻓﯽ ﻋﻨﺎﺻﺮ ﺫﻳﺮﺑﻂ ﺩﺭ ﺗﺠﺎﺭﺕ ﻭ ﻓﻌﺎﻟﻴﺖ ﻫﺎﯼ ﺗﺠﺎﺭﯼ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ،
ﻣﻮﺿﻮﻋﺎﺕ ﻭ ﻣﻮﺍﺭﺩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺪﻟﻴﻞ ﺩﺭﮔﻴﺮ ﺷﺪﻥ ﺑﺎ ﺟﺰﺋﻴﺎﺕ ﭘﻴﭽﻴﺪﻩ ﺗﺮ ﺑﻨﻈﺮ ﺧﻮﺍﻫﻨﺪ ﺁﻣﺪ. ﻋﻨﺎﺻﺮ ﺫﻳﻞ ﺗﻤﺎﻡ ﺍﻟﻤﺎﻥ ﻫﺎﯼ ﺫﻳﺮﺑﻂ ﺩﺭ ﻳﮏ ﻓﻌﺎﻟﻴﺖ ﺗﺠﺎﺭﯼ ﻣﻌﻤﻮﻟﯽ ﺭﺍ ﺗﺸﺮﻳﺢ ﻣﯽ ﻧﻤﺎﻳﺪ. ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ،ﻓﻌﺎﻟﻴﺖ ﺷﺎﻣﻞ ﻓﺮﻭﺵ ﺑﺮﺧﯽ ﻣﺤﺼﻮﻻﺕ ﺗﻮﺳﻂ ﻳﮏ ﺧﺮﺩﻩ ﻓﺮﻭﺵ ﺑﻪ
ﻣﺼﺮﻑ ﮐﻨﻨﺪﻩ ﺍﺳﺖ : 82
•
ﺩﺭ ﺻﻮﺭﺕ ﺗﻤﺎﻳﻞ ﻓﺮﻭﺵ ﻣﺤﺼﻮﻝ ﻭ ﻳﺎ ﻣﺤﺼﻮﻻﺗﯽ ﺑﻪ ﻳﮏ ﻣﺼﺮﻑ ﮐﻨﻨﺪﻩ ،ﻣﺴﺌﻠﻪ
ﺍﺳﺎﺳﯽ ﺩﺍﺷﺘﻦ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺗﯽ ﺧﺎﺹ ﺑﺮﺍﯼ ﻋﺮﺿﻪ ﺍﺳﺖ .ﮐﺎﻻ ﻣﯽ ﺗﻮﺍﻧﺪ ﻫﺮ ﭼﻴﺰﯼ ﺭﺍ ﺷﺎﻣﻞ ﮔﺮﺩﺩ .ﻓﺮﻭﺷﻨﺪﻩ ،ﻣﻤﮑﻦ ﺍﺳﺖ ﮐﺎﻻﯼ ﺧﻮﺩ ﺭﺍ ﻣﺴﺘﻘﻴﻤﺎ" ﺍﺯ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ ﻭ ﻳﺎ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﻋﺎﻣﻞ ﻓﺮﻭﺵ ﺗﻬﻴﻪ ﮐﺮﺩﻩ ﺑﺎﺷﺪ .ﺩﺭ ﺑﺮﺧﯽ ﺣﺎﻻﺕ ﻣﻤﮑﻦ ﺍﺳﺖ ﻓﺮﻭﺷﻨﺪﻩ
،ﺧﻮﺩ ﮐﺎﻻﺋﯽ ﺭﺍ ﺗﻮﻟﻴﺪ ﻭ ﺑﻘﺮﻭﺵ ﻣﯽ ﺭﺳﺎﻧﺪ. •
ﻓﺮﻭﺷﻨﺪﻩ ﺑﺮﺍﯼ ﻓﺮﻭﺵ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺕ ﻣﯽ ﺑﺎﻳﺴﺖ " ﻣﮑﺎﻧﯽ ﻣﻨﺎﺳﺐ " ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ .ﻣﮑﺎﻥ ﻣﻮﺭﺩ ﻧﻈﺮ ﻣﯽ ﺗﻮﺍﻧﺪ ﺩﺭ ﺑﺮﺧﯽ ﺣﺎﻻﺕ ﺑﺴﻴﺎﺭ ﻣﻮﻗﺘﯽ ﺑﺎﺷﺪ .ﻣﺜﻼ"
ﻳﮏ ﺷﻤﺎﺭﻩ ﺗﻠﻔﻦ ﺧﻮﺩ ﺑﻤﻨﺰﻟﻪ ﻳﮏ ﻣﮑﺎﻥ ﺍﺳﺖ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﯼ ﻣﺘﻘﺎﺿﯽ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺕ ﺑﺎ ﺗﻤﺎﺱ ﺗﻠﻔﻨﯽ ﺑﺎ ﻓﺮﻭﺷﻨﺪﻩ ﻗﺎﺩﺭ ﺑﻪ ﺛﺒﺖ ﺳﻔﺎﺭﺵ ﻭ ﺩﺭﻳﺎﻓﺖ ﮐﺎﻻﯼ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺑﺮﺍﯼ ﺍﮐﺜﺮ ﮐﺎﻻﻫﺎﯼ ﻓﻴﺰﻳﮑﯽ ﻣﯽ ﺑﺎﻳﺴﺖ ﻣﮑﺎﻥ ﺍﺭﺍﺋﻪ ﮐﺎﻻ ،ﻳﮏ
ﻣﻐﺎﺯﻩ ﻭ ﻳﺎ ﻓﺮﻭﺷﮕﺎﻩ ﺑﺎﺷﺪ. •
ﺑﺮﺍﯼ ﻓﺮﻭﺵ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺕ ،ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻣﯽ ﺑﺎﻳﺴﺖ ﺍﺯ ﺭﺍﻫﮑﺎﺭﻫﺎﺋﯽ ﺑﺮﺍﯼ ﺟﺬﺏ ﺍﻓﺮﺍﺩ ﺑﻪ ﻣﮑﺎﻥ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ .ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ " ﻣﺎﺭﮐﺘﻴﻨﮓ " ﻧﺎﻣﻴﺪﻩ ﻣﯽ ﺷﻮﺩ .ﺩﺭ
ﺻﻮﺭﺗﻴﮑﻪ ﺍﻓﺮﺍﺩ ﺍﺯ ﻣﺤﻞ ﻭ ﻣﮑﺎﻥ ﺍﺭﺍﺋﻪ ﻳﮏ ﮐﺎﻻ ﻭ ﺧﺪﻣﺎﺕ ﺁﮔﺎﻫﯽ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ، ﺍﻣﮑﺎﻥ ﻓﺮﻭﺵ ﻫﻴﭽﮕﻮﻧﻪ ﮐﺎﻻﺋﯽ ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﺍﻧﺘﺨﺎﺏ ﻣﺤﻞ ﺍﺭﺍﺋﻪ ﮐﺎﻻ ﺩﺭ ﻳﮏ ﻣﺮﮐﺰ ﺗﺠﺎﺭﯼ ﺷﻠﻮﻍ ،ﻳﮑﯽ ﺍﺯ ﺭﻭﺵ ﻫﺎﯼ ﺍﻓﺰﺍﻳﺶ ﺗﺮﺩﺩ ﺑﻪ ﻣﮑﺎﻥ ﺍﺭﺍﺋﻪ ﮐﺎﻻ ﺍﺳﺖ.
ﺍﺭﺳﺎﻝ ﭘﺴﺘﯽ ﮐﺎﺗﻮﻟﻮﮒ ﻫﺎ ﯼ ﻣﺮﺑﻮﻁ ﺑﻪ ﻣﺤﺼﻮﻻﺕ ،ﻳﮑﯽ ﺩﻳﮕﺮ ﺍﺯ ﺭﻭﺵ ﻫﺎﯼ
ﻣﻌﺮﻓﯽ ﻣﮑﺎﻥ ﺍﺭﺍﺋﻪ ﻳﮏ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺕ ﺍﺳﺖ .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺷﻴﻮﻩ ﻫﺎﯼ ﻣﺘﻔﺎﻭﺕ ﺗﺒﻠﻴﻐﺎﺗﯽ ،ﺭﺍﻫﮑﺎﺭﯼ ﺩﻳﮕﺮ ﺩﺭ ﻣﻌﺮﻓﯽ ﻣﮑﺎﻥ ﺍﺭﺍﺋﻪ ﮐﺎﻻ ﺍﺳﺖ. •
ﻓﺮﻭﺷﻨﺪﻩ ﻧﻴﺎﺯﻣﻨﺪ ﺭﻭﺷﯽ ﺑﺮﺍﯼ ﺩﺭﻳﺎﻓﺖ ﺳﻔﺎﺭﺷﺎﺕ ﺍﺳﺖ .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻠﻔﻦ ﻭ ﻧﺎﻣﻪ، ﻧﻤﻮﻧﻪ ﻫﺎﺋﯽ ﺍﺯ ﺭﻭﺵ ﻫﺎﯼ ﺩﺭﻳﺎﻓﺖ ﺳﻔﺎﺭﺵ ﻣﺘﻘﺎﺿﻴﺎﻥ ﻣﯽ ﺑﺎﺷﺪ .ﺣﻀﻮﺭ ﻓﻴﺰﻳﮑﯽ ﺩﺭ
ﻣﮑﺎﻥ ﺍﺭﺍﺋﻪ ﻳﮏ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺕ ﺍﺯ ﺩﻳﮕﺮ ﺭﻭﺵ ﻫﺎﯼ ﺳﻨﺘﯽ ﺑﺮﺍﯼ ﺛﺒﺖ ﺳﻔﺎﺭﺵ ﮐﺎﻻ ﺍﺳﺖ .ﭘﺲ ﺍﺯ ﺛﺒﺖ ﺳﻔﺎﺭﺵ ،ﻓﺮﺁﻳﻨﺪﻫﺎﯼ ﻻﺯﻡ ﺗﻮﺳﻂ ﭘﺮﺳﻨﻞ ﺷﺎﻏﻞ ﺩﺭ ﺷﺮﮐﺖ ﻭ ﻳﺎ
ﻣﻮﺳﺴﻪ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺕ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﮔﺮﻓﺖ. 83
•
ﻓﺮﻭﺷﻨﺪﻩ ﻧﻴﺎﺯﻣﻨﺪ ﺭﻭﺷﯽ ﺑﺮﺍﯼ ﺩﺭﻳﺎﻓﺖ ﭘﻮﻝ ﺍﺳﺖ .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭼﮏ ،ﮐﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﯼ ﻭ ﻳﺎ ﭘﻮﻝ ﻧﻘﺪ ﺭﻭﺵ ﻫﺎﯼ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻣﯽ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺑﺮﺧﯽ ﺍﺯ ﻓﻌﺎﻟﻴﺖ ﻫﺎﯼ ﺗﺠﺎﺭﯼ ﺍﺯ ﻓﺮﻭﺷﻨﺪﻩ ﺗﺎ ﺯﻣﺎﻥ ﺗﻮﺯﻳﻊ ﮐﺎﻻ ﭘﻮﻟﯽ ﺩﺭﻳﺎﻓﺖ ﻧﻤﯽ ﮔﺮﺩﺩ.
•
ﻓﺮﻭﺷﻨﺪﻩ ﻧﻴﺎﺯﻣﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺷﯽ ﺑﺮﺍﯼ ﻋﺮﺿﻪ ﻭ ﺗﻮﺯﻳﻊ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺕ ﻣﯽ ﺑﺎﺷﺪ. ﺩﺭ ﺑﺮﺧﯽ ﺍﺯ ﺳﻴﺴﺘﻢ ﻫﺎ ﺑﻤﺤﺾ ﺍﻧﺘﺨﺎﺏ ﮐﺎﻻ ﺗﻮﺳﻂ ﻣﺸﺘﺮﯼ ﻭ ﭘﺮﺩﺍﺧﺖ ﻭﺟﻪ ﺁﻥ،
ﻋﻤﻠﻴﺎﺕ ﺗﻮﺯﻳﻊ ﮐﺎﻻ ﺑﺼﻮﺭﺕ ﺍﺗﻮﻣﺎﺗﻴﮏ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺩﺭ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﺛﺒﺖ ﺳﻔﺎﺭﺵ ﻣﺒﺘﻨﯽ ﺑﺮ ﻧﺎﻣﻪ ،ﮐﺎﻻﯼ ﺧﺮﻳﺪﺍﺭﯼ ﺷﺪﻩ ﭘﺲ ﺍﺯ ﺑﺴﺘﻪ ﺑﻨﺪﯼ ﺑﻪ ﻣﻘﺼﺪ ﻣﺸﺘﺮﯼ
ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺩﺭ ﻣﻮﺍﺭﺩﻳﮑﻪ ﺣﺠﻢ ﮐﺎﻻ ﺯﻳﺎﺩ ﻧﺒﺎﺷﺪ ﺍﺯ ﻣﺒﺎﺩﻻﺕ ﭘﺴﺘﯽ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﮐﺎﻻ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﻭ ﺩﺭ ﻣﻮﺍﺭﺩﻳﮑﻪ ﺣﺠﻢ ﮐﺎﻻ ﺯﻳﺎﺩ ﺑﺎﺷﺪ ﺍﺯ ﮐﺎﻣﻴﻮﻥ ،ﻗﻄﺎﺭ ﻭ ﻳﺎ ﮐﺸﺘﯽ ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﻭ ﺗﻮﺯﻳﻊ ﮐﺎﻻ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ.
•
ﺩﺭ ﺑﺮﺧﯽ ﻣﻮﺍﺭﺩ ،ﺧﺮﻳﺪﺍﺭﺍﻥ ﻳﮏ ﮐﺎﻻ ﺗﻤﺎﻳﻞ ﻭ ﻋﻼﻗﻪ ﺍﯼ ﻧﺴﺒﺖ ﺑﻪ ﺁﻥ ﭼﻴﺰﯼ ﮐﻪ ﺧﺮﻳﺪﺍﺭﯼ ﻧﻤﻮﺩﻩ ﺍﻧﺪ ﻧﺪﺍﺷﺘﻪ ﻭ ﻗﺼﺪ ﺑﺮﮔﺸﺖ ﺁﻥ ﺭﺍ ﺩﺍﺭﻧﺪ .ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺕ ﻣﯽ ﺑﺎﻳﺴﺖ ﺍﺯ ﺭﻭﺵ ﻫﺎﺋﯽ ﺑﺮﺍﯼ ﻗﺒﻮﻝ ﻣﻮﺍﺭﺩ "ﺑﺮﮔﺸﺖ ﺍﺯ ﻓﺮﻭﺵ " ﺍﺳﺘﻔﺎﺩﻩ
ﻧﻤﺎﻳﻨﺪ. •
ﺩﺭ ﺑﺮﺧﯽ ﻣﻮﺍﺭﺩ ﻣﻤﮑﻦ ﺍﺳﺖ ﮐﺎﻻﺋﯽ ﺩﺭ ﺯﻣﺎﻥ ﺗﻮﺯﻳﻊ ﺁﺳﻴﺐ ﺩﻳﺪﻩ ﺑﺎﺷﺪ .ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻣﯽ ﺑﺎﻳﺴﺖ ﺍﺯ ﺭﻭﺵ ﻫﺎﯼ ﺑﺮﺍﯼ ﺗﻀﻤﻴﻦ ﮔﺎﺭﺍﻧﺘﯽ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ.
•
ﺑﺮﺧﯽ ﺍﺯ ﮐﺎﻻﻫﺎﯼ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺑﻪ ﻣﺸﺘﺮﻳﺎﻥ ﺩﺍﺭﺍﯼ ﭘﻴﭽﻴﺪﮔﯽ ﻫﺎﯼ ﺧﺎﺹ ﺧﻮﺩ ﺑﻮﺩﻩ ﻭ ﻧﻴﺎﺯﻣﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﺪﻣﺎﺕ ﭘﺲ ﺍﺯ ﻓﺮﻭﺵ ﻭ ﻳﺎ ﺣﻤﺎﻳﺖ ﻓﻨﯽ ﻣﯽ ﺑﺎﺷﻨﺪ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﯼ ﻭﺟﻮﺩ ﺑﺨﺶ ﻫﺎﺋﯽ ﺩﺭ ﺷﺮﮐﺖ ﻭ ﻳﺎ ﻣﻮﺳﺴﻪ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺕ ﺍﻟﺰﺍﻣﯽ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﮐﺎﻣﭙﻴﻮﺗﺮ ﻳﮑﯽ ﺍﺯ ﻧﻤﻮﻧﻪ ﮐﺎﻻﻫﺎﺋﯽ ﺍﺳﺖ ﮐﻪ ﻧﻴﺎﺯﻣﻨﺪ ﺧﺪﻣﺎﺕ ﭘﺲ
ﺍﺯ ﻓﺮﻭﺵ ﻭ ﺣﻤﺎﻳﺖ ﻓﻨﯽ ﺍﺯ ﺩﻳﺪﮔﺎﻩ ﻣﺸﺘﺮﻳﺎﻥ ) ﺧﺮﻳﺪﺍﺭﺍﻥ ( ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
ﺗﻤﺎﻡ ﻋﻨﺎﺻﺮ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﺭﺍ ﻣﯽ ﺗﻮﺍﻥ ﺩﺭ ﻳﮏ ﺷﺮﮐﺖ ﺗﺠﺎﺭﯼ ﺳﻨﺘﯽ ﻣﺸﺎﻫﺪﻩ ﮐﺮﺩ .ﻓﻌﺎﻟﻴﺖ ﻫﺎﯼ ﺗﺠﺎﺭﯼ ﺷﺮﮐﺖ ﻫﺎﯼ ﻓﻮﻕ ﻣﯽ ﺗﻮﺍﻧﺪ ﺷﺎﻣﻞ ﻣﻘﻮﻟﻪ ﻫﺎﯼ ﻣﺘﻔﺎﻭﺗﯽ ﺑﺎﺷﺪ.
84
ﺩﺭ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺗﻤﺎﻡ ﻋﻨﺎﺻﺮ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ،ﺣﻀﻮﺭﯼ ﻣﺸﻬﻮﺩ ﺑﺎ ﺗﻐﻴﻴﺮﺍﺕ ﺧﺎﺻﯽ ﺩﺍﺭﻧﺪ.
ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺪﻳﺮﻳﺖ ﻭ ﺍﺟﺮﺍﯼ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﻪ ﻋﻨﺎﺻﺮ ﺯﻳﺮ ﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺑﻮﺩ: •
ﻳﮏ ﻣﺤﺼﻮﻝ
•
ﻣﺤﻠﯽ ﺑﺮﺍﯼ ﻓﺮﻭﺵ ﮐﺎﻻ .ﺩﺭ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻳﮏ ﻭﺏ ﺳﺎﻳﺖ ﺑﻤﻨﺰﻟﻪ ﻣﮑﺎﻥ ﺍﺭﺍﺋﻪ
•
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ ﻭ ﻳﺎ ﺭﻭﺵ ﻫﺎﺋﯽ ﺑﺮﺍﯼ ﻣﺮﺍﺟﻌﻪ ﺑﻪ ﺳﺎﻳﺖ
•
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺷﯽ ﺑﺮﺍﯼ ﺛﺒﺖ ﺳﻔﺎﺭﺵ ).ﺍﻏﻠﺐ ﺑﺼﻮﺭﺕ ﻓﺮﻡ ﻫﺎ ﺋﯽ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ
•
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺷﯽ ﺑﺮﺍﯼ ﺩﺭﻳﺎﻓﺖ ﭘﻮﻝ ) .ﮐﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﯼ ﺍﺯ ﻧﻤﻮﻧﻪ ﻫﺎﯼ ﻣﺘﺪﺍﻭﻝ ﺍﺳﺖ (
•
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺷﯽ ﺑﺮﺍﯼ ﺗﻮﺯﻳﻊ ﮐﺎﻻ
ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺕ ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
ﻣﯽ ﺷﻮﺩ(
•
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺷﯽ ﺑﺮﺍﯼ ﻣﻮﺍﺭﺩ ﺑﺮﮔﺸﺖ ﺩﺍﺩﻩ ﺷﺪﻩ ﺗﻮﺳﻂ ﺧﺮﻳﺪﺍﺭﺍﻥ
•
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺷﯽ ﺑﺮﺍﯼ ﻣﻮﺍﺭﺩ ﻣﺮﺑﻮﻁ ﺑﻪ ﮔﺎﺭﺍﻧﺘﯽ
•
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺷﯽ ﺑﺮﺍﯼ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﭘﺲ ﺍﺯ ﻓﺮﻭﺵ ) ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﺍﺭﺍﺋﻪ ﭘﺎﻳﮕﺎﻩ ﻫﺎﯼ ﺍﻃﻼﻉ ﺭﺳﺎﻧﯽ ﻭ(...
ﭼﺮﺍ ﺗﺒﻠﻴﻐﺎﺕ ﺯﻳﺎﺩ ؟ ﭘﻴﺮﺍﻣﻮﻥ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺗﺒﻠﻴﻐﺎﺕ ﺯﻳﺎﺩ ﻭ ﮔﺎﻫﺎ" ﺑﯽ ﺭﻭﻳﻪ ﺍﯼ ﺍﻧﺠﺎﻡ ﻣﯽ ﮔﻴﺮﺩ .ﻋﻠﺖ ﺗﺒﻠﻴﻐﺎﺕ ﺯﻳﺎﺩ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺭﺍ ﻣﯽ ﺗﻮﺍﻥ ﺑﺎ ﺍﺳﺘﻨﺎﺩ ﺑﻪ ﺑﺮﺧﯽ ﺍﺯ ﺁﻣﺎﺭﻫﺎ ﻭ ﺍﺭﻗﺎﻡ ﻣﻮﺟﻮﺩ ﻣﺘﻮﺟﻪ ﺷﺪ: •
ﺗﺎ ﺳﺎﻝ ٢٠٠١ﻣﻴﻼﺩﯼ ﺑﺎﻟﻎ ﺑﺮ ١٧ﻣﻴﻠﻴﺎﺭﺩ ﺩﻻﺭ ﺩﺭ ﺳﻄﺢ ﺧﺮﺩﻩ ﻓﺮﻭﺷﯽ ﻣﺒﺎﺩﻻﺕ ﺗﺠﺎﺭﯼ ﺻﻮﺭﺕ ﮔﺮﻓﺘﻪ ﺍﺳﺖ.
•
ﺗﻌﺪﺍﺩ ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻨﺪﮔﺎﻥ ﺍﺯ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺯ ﺭﻗﻢ ١,٣ﻣﻴﻠﻴﻮﻥ ﻧﻔﺮ ﺩﺭ ﺳﺎﻝ ١٩٩٦ ﺑﻪ ٨ﻣﻴﻠﻴﻮﻥ ﻧﻔﺮ ﺩﺭ ﺳﺎﻝ ٢٠٠١ﺭﺳﻴﺪﻩ ﺍﺳﺖ.
85
•
٧٠ﺩﺭﺻﺪ ﮐﺎﺭﺑﺮﺍﻥ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻨﺪﮔﺎﻥ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺭ ﻣﻨﺰﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﻭ ﺍﻳﻦ ﮔﺮﻭﻩ ٦٠ﺩﺭﺻﺪ ﺧﺮﻳﺪ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﺍﺩﻩ ﺍﻧﺪ.
ﺑﺮ ﺍﺳﺎﺱ ﺁﻣﺎﺭﻫﺎﯼ ﻣﻮﺟﻮﺩ ،ﮔﺮﻭﻩ ﮐﺎﻻﻫﺎﯼ ﺯﻳﺮ ﺩﺍﺭﺍﯼ ﺑﻴﺸﺘﺮﻳﻦ ﻣﻴﺰﺍﻥ ﻓﺮﻭﺵ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺭﺍ ﺑﺨﻮﺩ ﺍﺧﺘﺼﺎﺹ ﺩﺍﺩﻩ ﺍﻧﺪ: •
ﻣﺤﺼﻮﻻﺕ ﮐﺎﻣﭙﻴﻮﺗﺮﯼ ) ﻧﺮﻡ ﺍﻓﺰﺍﺭ ،ﺳﺨﺖ ﺍﻓﺰﺍﺭ (
•
ﮐﺘﺎﺏ
•
ﺧﺪﻣﺎﺕ ﻣﺎﻟﯽ
•
ﺳﺮﮔﺮﻣﯽ ﻫﺎ
•
ﻣﻮﺯﻳﮏ
•
ﺍﻟﮑﺘﺮﻭﻧﻴﮏ ﻫﺎﯼ ﺧﺎﻧﮕﯽ
•
ﭘﻮﺷﺎﮎ
•
ﻫﺪﺍﻳﺎ ﻭ ﮔﻞ
•
ﺧﺪﻣﺎﺕ ﻣﺴﺎﻓﺮﺗﯽ
•
ﺍﺳﺒﺎﺏ ﺑﺎﺯﯼ
•
ﺑﻠﻴﻂ ﻓﺮﻭﺷﯽ
•
ﺍﻃﻼﻋﺎﺕ
ﺑﺮﺭﺳﯽ ﺷﺮﮐﺖ Dell
ﺍﻣﺮﻭﺯﻩ ﺷﺮﮐﺖ ﻫﺎﯼ ﮐﻮﭼﮏ ﻭ ﺑﺰﺭﮒ ﺑﺎ ﺣﺮﮐﺎﺕ ﺳﺮﺍﺳﻴﻤﻪ ﻭ ﺷﺘﺎﺑﺎﻥ ﺑﺴﺮﻋﺖ ﺑﺴﻤﺖ
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺤﻴﻂ ﺟﺪﻳﺪ ) ﺍﻳﻨﺘﺮﻧﺖ ( ﺑﺮﺍﯼ ﺍﺭﺍﺋﻪ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺕ ﻣﯽ ﺑﺎﺷﻨﺪ .ﻋﻠﺖ ﺍﻳﻦ ﻫﻤﻪ ﺗﻌﺠﻴﻞ ﻭ ﺑﻨﻮﻋﯽ ﺷﻴﺪﺍﺋﯽ ﺩﺭ ﭼﻴﺴﺖ؟ ﺷﺮﮐﺖ Dellﻳﮑﯽ ﺍﺯ ﻣﻮﻓﻘﺘﺮﻳﻦ ﺷﺮﮐﺖ ﻫﺎﯼ
ﻣﻮﺟﻮﺩ ﺩﺭ ﺯﻣﻴﻨﻪ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺳﺖ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﺷﺎﻳﺴﺘﻪ ﺍﺳﺖ ﺩﺭ ﺍﻳﻦ ﺑﺨﺶ ﺑﻪ ﺑﺮﺭﺳﯽ ﻭﺿﻌﻴﺖ ﺷﺮﮐﺖ ﻓﻮﻕ ﺩﺭ ﺯﻣﻴﻨﻪ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﭘﺮﺩﺍﺧﺘﻪ ﻭ ﺍﺯ ﺍﻳﻦ ﺭﻫﮕﺬﺭ ﺍﺯ ﺗﺠﺎﺭﺏ ﻣﻮﺟﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ. 86
Dellﻳﮑﯽ ﺍﺯ ﺻﺪﻫﺎ ﺷﺮﮐﺘﯽ ﺍﺳﺖ ﮐﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﯼ ﺷﺨﺼﯽ ﺗﻮﻟﻴﺪﯼ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ
ﻣﺸﺘﺮﻳﺎﻥ ﺣﻘﻴﻘﯽ ﻭ ﻳﺎ ﺣﻘﻮﻗﯽ ﻗﺮﺍﺭ ﻣﯽ ﺩﻫﺪ .ﻓﻌﺎﻟﻴﺖ ﺍﻗﺘﺼﺎﺩﯼ Dellﺑﺎ ﺩﺭﺝ ﺁﮔﻬﯽ ﺩﺭ ﭘﺸﺖ ﺟﻠﺪ ﻣﺠﻼﺕ ﮐﺎﻣﭙﻴﻮﺗﺮﯼ ﻭ ﻓﺮﻭﺵ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺯ ﻃﺮﻳﻖ ﺗﻠﻔﻦ ،ﺁﻏﺎﺯ ﮔﺮﺩﻳﺪ .ﺍﻣﺮﻭﺯﻩ ﺣﻀﻮﺭ ﺷﺮﮐﺖ Dellﺩﺭ ﻋﺮﺻﻪ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﺴﺮﻋﺖ ﻣﺘﺪﺍﻭﻝ ﻭ ﻋﻤﻮﻣﯽ ﺷﺪﻩ ﺍﺳﺖ
.ﺷﺮﮐﺖ ﻓﻮﻕ ،ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺍﺋﻪ ﮐﺎﻻﻫﺎﯼ ﺑﻴﺸﻤﺎﺭﯼ ﺍﺯ ﻃﺮﻳﻖ ﻭﺏ ﺷﺪﻩ ﺍﺳﺖ .ﺑﺮ ﺍﺳﺎﺱ ﺁﻣﺎﺭﻫﺎﯼ
ﻣﻮﺟﻮﺩ ،ﻓﺮﻭﺵ ﺭﻭﺯﺍﻧﻪ ، Dellﭼﻬﺎﺭﺩﻩ ﻣﻴﻠﻴﻮﻥ ﺩﻻﺭ ﺑﻮﺩﻩ ﻭ ﺗﻘﺮﻳﺒﺎ" ٢٥ﺩﺭﺻﺪ ﻓﺮﻭﺵ ﺍﻳﻦ ﺷﺮﮐﺖ ﺍﺯ ﻃﺮﻳﻖ ﻭﺏ ﺍﻧﺠﺎﻡ ﻣﯽ ﮔﻴﺮﺩ .ﺷﺮﮐﺖ Dellﻗﺒﻞ ﺍﺯ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ،
ﺍﮐﺜﺮ ﺳﻔﺎﺭﺷﺎﺕ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺗﻠﻔﻦ ﺍﺧﺬ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺴﺖ ﺁﻧﻬﺎ ﺭﺍ ﺑﺮﺍﯼ ﺧﺮﻳﺪﺍﺭﺍﻥ ﺧﻮﺩ ،ﺍﺭﺳﺎﻝ ﻣﯽ ﮐﺮﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻓﺮﻭﺵ ٢٥ﺩﺭﺻﺪﯼ ﺷﺮﮐﺖ ﻓﻮﻕ ﺍﺯ ﻃﺮﻳﻖ ﻭﺏ ﻣﯽ ﺗﻮﺍﻥ
ﺑﻪ ﺟﺎﻳﮕﺎﻩ ﻭ ﺍﻫﻤﻴﺖ ﻣﻮﺿﻮﻉ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﻴﺶ ﺍﺯ ﮔﺬﺷﺘﻪ ﻭﺍﻗﻒ ﮔﺮﺩﻳﺪ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﻣﯽ ﺗﻮﺍﻥ ﺑﻪ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﺍﺷﺎﺭﻩ ﮐﺮﺩ: •
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺷﺮﮐﺖ Dellﺗﻮﺍﻧﺴﺘﻪ ﺑﺎﺷﺪ ،ﻣﻴﺰﺍﻥ ﻓﺮﻭﺵ ﺍﺯ ﻃﺮﻳﻖ ﺗﻠﻔﻦ ﺭﺍ ٢٥ ﺩﺭﺻﺪ ﮐﺎﻫﺶ ﻭ ٢٥ﺩﺭﺻﺪ ﺑﻪ ﻣﻴﺰﺍﻥ ﻓﺮﻭﺵ ﺧﻮﺩ ﺍﺯ ﻃﺮﻳﻖ ﻭﺏ ﺑﻴﻔﺰﺍﻳﺪ ،ﺩﻟﻴﻞ ﺭﻭﺷﻦ ﻭ ﻗﺎﻃﻌﯽ ﺑﺮﺍﯼ ﻭﺟﻮﺩ ﻣﺰﺍﻳﺎﯼ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ؟ Dell
ﺻﺮﻓﺎ" ﮐﺎﻣﭙﻴﻮﺗﺮ ﻋﺮﺿﻪ ﻣﯽ ﻧﻤﺎﻳﺪ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﻣﺪﻳﺮﻳﺖ ﻓﺮﻭﺵ ﺍﺯ ﻃﺮﻳﻖ ﻭﺏ ﻫﺰﻳﻨﻪ ﻫﺎﯼ ﮐﻤﺘﺮﯼ ﺭﺍ ﺑﻪ ﻳﮏ ﺳﺎﺯﻣﺎﻥ ﺗﺤﻤﻴﻞ ﻧﻤﺎﻳﺪ ﻭ ﻳﺎ ﺍﻓﺮﺍﺩﻳﮑﻪ ﺍﺯ ﻃﺮﻳﻖ ﻭﺏ ﮐﺎﻻﯼ ﺧﻮﺩ ﺭﺍ ﺧﺮﻳﺪﺍﺭﯼ ﻣﯽ ﻧﻤﺎﻳﻨﺪ ،ﺍﻗﺪﺍﻡ ﺑﻪ ﺧﺮﻳﺪ ﺗﺠﻬﻴﺰﺍﺕ ﮐﻤﮑﯽ ﺩﻳﮕﺮﯼ ﻧﻤﺎﻳﻨﺪ ﻭ ﻳﺎ
ﺍﮔﺮ ﻫﺰﻳﻨﻪ ﻫﺎﯼ ﻋﻤﻠﻴﺎﺕ ﻓﺮﻭﺵ ﺍﺯ ﻃﺮﻳﻖ ﻭﺏ ﺑﻤﺮﺍﺗﺐ ﮐﻤﺘﺮﺷﺪﻩ ﻭ ﻳﺎ ﺍﮔﺮ ﺍﺭﺍﺋﻪ ﮐﺎﻻ ﺑﺮ ﺭﻭﯼ ﻭﺏ ﺑﺎﻋﺚ ﺍﻓﺰﺍﻳﺶ ﺧﺮﻳﺪﺍﺭﺍﻥ ﻭ ﺣﺠﻢ ﻋﻤﻠﻴﺎﺕ ﻓﺮﻭﺵ ﮔﺮﺩﺩ ،ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﺮﺍﯼ ﺷﺮﮐﺖ Dellﻣﻘﺮﻭﻥ ﺑﺼﺮﻓﻪ ﻭ ﺗﻮﺍﻡ ﺑﺎ ﺍﻓﺰﺍﻳﺶ ﺑﻬﺮﻩ ﻭﺭﯼ
ﺑﻮﺩﻩ ﺍﺳﺖ. •
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺷﺮﮐﺖ ، Dellﺩﺭ ﻓﺮﺁﻳﻨﺪ ﻓﺮﻭﺵ ﮐﺎﻻ ﺍﺯ ﻃﺮﻳﻖ ﻭﺏ ،ﻓﺮﻭﺵ ﺳﻨﺘﯽ ﻭ ﻣﺒﺘﻨﯽ ﺑﺮ ﺗﻠﻔﻦ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺩﺳﺖ ﻧﺪﻫﺪ ،ﭼﻪ ﺍﺗﻔﺎﻗﯽ ﻣﯽ ﺍﻓﺘﺪ؟ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﻣﯽ ﺗﻮﺍﻧﺪ ﺻﺤﺖ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ،ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺑﻪ ﺗﻤﺎﻳﻞ ﻋﺪﻩ ﺍﯼ ﺑﺮﺍﯼ ﺧﺮﻳﺪ ﮐﺎﻻ ﺍﺯ ﻃﺮﻳﻖ ﻭﺏ 87
ﺑﺴﺘﮕﯽ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﮔﺮﺍﻳﺶ ﺑﺴﻤﺖ ﺧﺮﻳﺪ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺼﻮﺭﺕ ﻳﮏ ﻧﻴﺎﺯ
ﻣﻄﺮﺡ ﺷﺪﻩ ﺍﺳﺖ ﻭ ﺍﺯ ﺍﻳﻦ ﺑﺎﺑﺖ ﻧﮕﺮﺍﻧﯽ ﭼﻨﺪﺍﻧﯽ ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ. •
ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻓﺮﻭﺵ ﻋﻘﻴﺪﻩ ﺍﯼ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﮐﻪ :ﺯﻣﺎﻧﻴﮑﻪ ﻳﮏ ﻣﺸﺘﺮﯼ ﮐﺎﺭ ﺧﻮﺩ ﺭﺍ ﺑﺎ ﻳﮏ ﻓﺮﻭﺷﻨﺪﻩ ﺁﻏﺎﺯ ﻣﯽ ﻧﻤﺎﻳﺪ ،ﻧﮕﻬﺪﺍﺭﯼ ﺁﻥ ﻣﺸﺘﺮﯼ ﺑﺮﺍﯼ ﻓﺮﻭﺷﻨﺪﻩ ﺑﻤﺮﺍﺗﺐ ﺭﺍﺣﺖ ﺗﺮ ﺍﺯ ﺟﺬﺏ ﻣﺸﺘﺮﻳﺎﻥ ﺟﺪﻳﺪ ﺍﺳﺖ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺗﺼﻤﻴﻢ ﺑﻪ ﺍﻳﺠﺎﺩ ﻳﮏ ﻭﺏ ﺳﺎﻳﺖ
ﺯﻭﺩﺗﺮ ﺍﺗﺤﺎﺫ ﮔﺮﺩﺩ ،ﻧﺴﺒﺖ ﺑﻪ ﺳﺎﻳﺮ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﮐﻪ ﺑﻌﺪﺍ" ﺗﺼﻤﻴﻢ ﻓﻮﻕ ﺭﺍ ﺍﺗﺨﺎﺫ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ ،ﭘﻴﺸﻘﺪﻡ ﺧﻮﺍﻫﻴﺪ ﺑﻮﺩ .ﺷﺮﮐﺖ Dellﺳﺎﻳﺖ ﺧﻮﺩ ﺭﺍ ﺧﻴﻠﯽ ﺯﻭﺩ ﻃﺮﺍﺣﯽ
ﻭ ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﻧﻤﻮﺩﻩ ﻭ ﺍﺯ ﺍﻳﻦ ﻃﺮﻳﻖ ﺍﺯ ﺳﺎﻳﺮ ﺭﻗﺒﺎﯼ ﺧﻮﺩ ﭘﻴﺸﯽ ﮔﺮﻓﺘﻪ ﺍﺳﺖ ﻋﻮﺍﻣﻞ ﺳﻪ ﮔﺎﻧﻪ ﻓﻮﻕ ،ﺩﻻﻳﻞ ﻋﻤﺪﻩ ﺑﺴﻤﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺳﺖ. ﮔﻴﺮﺍﺋﯽ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ
ﺩﻻﻳﻞ ﺯﻳﺮ ﻋﻠﻞ ﮔﻴﺮﺍﺋﯽ ﻭ ﺟﺎﺫﺑﻪ ﻓﺮﺍﻭﺍﻥ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺳﺖ: •
ﮐﺎﻫﺶ ﻫﺰﻳﻨﻪ ﻫﺎ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺳﺎﻳﺖ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﺨﻮﺑﯽ ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﮔﺮﺩﺩ ،ﻫﺰﻳﻨﻪ ﻫﺎﯼ ﻣﺮﺑﻮﻁ ﺑﻪ ﺛﺒﺖ ﺳﻔﺎﺭﺵ ﻗﺒﻞ ﺍﺯ ﺍﺭﺍﺋﻪ ﮐﺎﻻ ﻭ ﻫﺰﻳﻨﻪ ﻫﺎﯼ ﺧﺪﻣﺎﺕ ﭘﺲ ﺍﺯ ﻓﺮﻭﺵ ﺑﻌﺪ ﺍﺯ ﺍﺭﺍﺋﻪ ﮐﺎﻻ ﮐﺎﻫﺶ ﻣﯽ ﻳﺎﺑﺪ.
•
ﺧﺮﻳﺪ ﺑﻴﺸﺘﺮ ﺩﺭ ﻫﺮ ﺗﺮﺍﮐﻨﺶ .ﺳﺎﻳﺖ ﺁﻣﺎﺯﻭﻥ ﻭﻳﮋﮔﯽ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﯽ ﺩﻫﺪ ﮐﻪ ﺩﺭ ﻓﺮﻭﺷﮕﺎﻫﻬﺎﯼ ﻣﻌﻤﻮﻟﯽ ﻧﻈﻴﺮ ﺁﻥ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ .ﺯﻣﺎﻧﻴﮑﻪ ﻣﺸﺨﺼﺎﺕ ﻳﮏ ﮐﺘﺎﺏ ﺭﺍ
ﻣﻄﺎﻟﻌﻪ ﻣﯽ ﻧﻤﺎﺋﻴﺪ ،ﻣﯽ ﺗﻮﺍﻥ ﺑﺨﺸﯽ ﺑﺎ ﻧﺎﻡ " ﺍﻓﺮﺍﺩﻳﮑﻪ ﮐﺘﺎﺏ ﻓﻮﻕ ﺭﺍ ﺳﻔﺎﺭﺵ ﺩﺍﺩﻩ ﺍﻧﺪ ،ﭼﻪ ﭼﻴﺰﻫﺎﯼ ﺩﻳﮕﺮﯼ ﺭﺍ ﺧﺮﻳﺪﺍﺭﯼ ﻧﻤﻮﺩﻩ ﺍﻧﺪ" ،ﺭﺍ ﻧﻴﺰ ﻣﺸﺎﻫﺪﻩ ﻧﻤﻮﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺍﻣﮑﺎﻥ ﻣﺸﺎﻫﺪﻩ ﺳﺎﻳﺮ ﮐﺘﺐ ﻣﺮﺗﺒﻂ ﮐﻪ ﺳﺎﻳﺮﻳﻦ ﺧﺮﻳﺪ ﻧﻤﻮﺩﻩ ﺍﻧﺪ ،ﻓﺮﺍﻫﻢ ﻣﯽ ﮔﺮﺩﺩ.ﺑﻨﺎﺑﺮﺍﻳﻦ ﺍﻣﮑﺎﻥ ﺧﺮﻳﺪ ﮐﺘﺐ ﺑﻴﺸﺘﺮ ﺗﻮﺳﻂ ﻣﺮﺍﺟﻌﻪ ﮐﻨﻨﺪﮔﺎﻥ ﺑﻪ ﺳﺎﻳﺖ ﻧﺴﺒﺖ ﺑﻪ ﻳﮏ ﮐﺘﺎﺑﻔﺮﻭﺷﯽ ﻣﻌﻤﻮﻟﯽ ﺑﻮﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺁﻣﺪ. •
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﻭﺏ ﺳﺎﻳﺖ ﺑﮕﻮﻧﻪ ﺍﯼ ﻃﺮﺍﺣﯽ ﺷﺪﻩ ﺑﺎﺷﺪ ﮐﻪ ﺑﺎ ﺳﺎﻳﺮ ﻣﺮﺍﺣﻞ ﻣﺮﺑﻮﻁ ﺑﻪ
ﺗﺠﺎﺭﺕ ﺩﺭﮔﻴﺮ ﺷﺪﻩ ﺑﺎﺷﺪ ،ﺍﻣﮑﺎﻥ ﺍﺧﺬ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮﯼ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻭﺿﻌﻴﺖ ﮐﺎﻻﯼ ﺧﺮﻳﺪﺍﺭﯼ ﺷﺪﻩ ﺑﺮﺍﯼ ﻣﺸﺘﺮﻳﺎﻥ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﻣﺜﻼ" ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺷﺮﮐﺖ 88
Dellﻭﺿﻌﻴﺖ ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺭﺍ ﺍﺯ ﻣﺮﺣﻠﻪ ﺗﻮﻟﻴﺪ ﺗﺎ ﻋﺮﺿﻪ ،ﺛﺒﺖ ﻧﻤﺎﻳﺪ ،ﻣﺸﺘﺮﻳﺎﻥ ﺩﺭ
ﻫﺮ ﻟﺤﻈﻪ ﻗﺎﺩﺭ ﺑﻪ ﻣﺸﺎﻫﺪﻩ ﺁﺧﺮﻳﻦ ﻭﺿﻌﻴﺖ ﺳﻔﺎﺭﺵ ﺧﻮﺩ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ. •
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﻓﺮﺍﺩ ﻗﺎﺩﺭ ﺑﻪ ﺍﻧﺘﺨﺎﺏ ﮐﺎﻻﯼ ﺧﻮﺩ ﺑﺎ ﺭﻭﺵ ﻫﺎﯼ ﻣﺘﻔﺎﻭﺗﯽ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﻭﺏ ﺳﺎﻳﺖ ﻫﺎﯼ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺍﻣﮑﺎﻧﺎﺕ ﺯﻳﺮ ﺭﺍ ﺍﺭﺍﺋﻪ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ:
ﺍﻣﮑﺎﻥ ﺛﺒﺖ ﻳﮏ ﺳﻔﺎﺭﺵ ﻃﯽ ﭼﻨﺪ ﺭﻭﺯ ﺍﻣﮑﺎﻥ ﭘﻴﮑﺮﺑﻨﺪﯼ ﻣﺤﺼﻮﻝ ﻭ ﻣﺸﺎﻫﺪﻩ ﻗﻴﻤﺖ ﻫﺎﯼ ﻭﺍﻗﻌﯽ ﺍﻣﮑﺎﻥ ﺍﻳﺠﺎﺩ ﺁﺳﺎﻥ ﺳﻔﺎﺭﺵ ﻫﺎﯼ ﺍﺧﺘﺼﺎﺻﯽ ﭘﻴﭽﻴﺪﻩ ﺍﻣﮑﺎﻥ ﻣﻘﺎﻳﺴﻪ ﻗﻴﻤﺖ ﮐﺎﻻ ﺑﻴﻦ ﭼﻨﺪﻳﻦ ﻓﺮﻭﺷﻨﺪﻩ -ﺍﻣﮑﺎﻥ ﺟﺴﺘﺠﻮﯼ ﺁﺳﺎﻥ ﺑﺮﺍﯼ ﮐﺎﺗﻮﻟﻮﮒ ﻫﺎﯼ ﻣﻮﺭﺩ ﻧﻴﺎﺯ
•
ﮐﺎﺗﻮﻟﻮﮒ ﻫﺎﯼ ﺑﺰﺭﮔﺘﺮ .ﻳﮏ ﺷﺮﮐﺖ ﻗﺎﺩﺭ ﺑﻪ ﺍﻳﺠﺎﺩ ﻳﮏ ﮐﺎﺗﻮﻟﻮﮒ ﺑﺮ ﺭﻭﯼ ﻭﺏ ﺑﻮﺩﻩ ﮐﻪ ﻫﺮﮔﺰ ﺍﻣﮑﺎﻥ ﺍﺭﺳﺎﻝ ﺁﻥ ﺍﺯ ﻃﺮﻳﻖ ﭘﺴﺖ ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﻣﺜﻼ" ﺁﻣﺎﺯﻭﻥ ﺑﻴﺶ ﺍﺯ ﺳﻪ ﻣﻴﻠﻴﻮﻥ ﮐﺘﺎﺏ ﺭﺍ ﺑﻔﺮﻭﺵ ﻣﯽ ﺭﺳﺎﻧﺪ ،ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﮐﺘﺐ ﻓﻮﻕ ﺍﺯ ﻃﺮﻳﻖ ﺳﺎﻳﺖ ﺁﻣﺎﺯﻭﻥ ﺍﺭﺍﺋﻪ ﻭﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻣﺮﺍﺟﻌﻪ ﮐﻨﻨﺪﮔﺎﻥ ﻗﺮﺍﺭ ﻣﯽ ﮔﻴﺮﺩ ،ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ
ﻓﻮﻕ ﺍﺯ ﻃﺮﻳﻖ ﭘﺴﺖ ،ﺑﺴﻴﺎﺭ ﻣﺸﮑﻞ ﻭ ﻳﺎ ﻏﻴﺮﻣﻤﮑﻦ ﺑﻨﻈﺮ ﻣﯽ ﺁﻳﺪ. •
ﺑﻬﺒﻮﺩ ﺍﺭﺗﺒﺎﻁ ﻣﺘﻘﺎﺑﻞ ﺑﺎ ﻣﺸﺘﺮﻳﺎﻥ .ﺑﺎ ﻃﺮﺍﺣﯽ ﻣﻨﺎﺳﺐ ﺳﺎﻳﺖ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺑﺰﺍﺭ ﻫﺎﯼ ﻣﺮﺑﻮﻃﻪ ،ﺍﻣﮑﺎﻥ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﻣﺘﻘﺎﺑﻞ ﺑﺎ ﻣﺸﺘﺮﻳﺎﻥ ﺑﺎ ﺭﻭﺵ ﻫﺎﯼ ﻣﻄﻤﺌﻦ ﺗﺮ ﻭ ﺑﺪﻭﻥ ﺻﺮﻑ ﻫﺰﻳﻨﻪ ،ﻓﺮﺍﻫﻢ ﻣﯽ ﮔﺮﺩﺩ .ﻣﺜﻼ" ﻣﺸﺘﺮﯼ ﭘﺲ ﺍﺯ ﺛﺒﺖ ﺳﻔﺎﺭﺵ ﺑﺎ ﺩﺭﻳﺎﻓﺖ ﻳﮏ ﻧﺎﻣﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺯ ﺛﺒﺖ ﺳﻔﺎﺭﺵ ﺧﻮﺩ ﻣﻄﻤﺌﻦ ﺷﺪﻩ ﻭ ﻳﺎ ﺩﺭ ﺻﻮﺭﺕ ﺍﺭﺳﺎﻝ ﮐﺎﻻ ﺑﺮﺍﯼ ﻣﺸﺘﺮﯼ ،ﻣﯽ ﺗﻮﺍﻥ ﺍﺯ ﻃﺮﻳﻖ ﻧﺎﻣﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻭﯼ ﺭﺍ ﻣﻄﻠﻊ ﻧﻤﻮﺩ .ﻫﻤﻮﺍﺭﻩ ﻳﮏ
ﻣﺸﺘﺮﯼ ﺭﺍﺿﯽ ﻭ ﺧﻮﺷﺤﺎﻝ ﺗﻤﺎﻳﻞ ﺑﻪ ﺧﺮﻳﺪ ﻣﺠﺪﺩ ﺍﺯ ﺷﺮﮐﺖ ﻭ ﻳﺎ ﻣﻮﺳﺴﻪ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﮐﺎﻻ ﺭﺍ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ. ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺫﮐﺮ ﻳﮏ ﻧﮑﺘﻪ ﺩﻳﮕﺮ ﺿﺮﻭﺭﯼ ﺑﻨﻈﺮ ﻣﯽ ﺭﺳﺪ .ﺗﺠﺎﺭﺕ
ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﻪ ﺍﻓﺮﺍﺩ ﻭ ﻳﺎ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﻣﻮﺳﺴﺎﺕ ﺍﻣﮑﺎﻥ ﺍﻳﺠﺎﺩ ﻣﺪﻝ ﻫﺎﯼ ﮐﺎﻣﻼ" ﺟﺪﻳﺪ ﺗﺠﺎﺭﯼ 89
ﺭﺍ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺩﺭ ﺷﺮﮐﺖ ﻫﺎﯼ ﺗﺠﺎﺭﯼ ﻣﺒﺘﻨﯽ ﺑﺮ ﺛﺒﺖ ﺳﻔﺎﺭﺵ ﭘﺴﺘﯽ ،ﻫﺰﻳﻨﻪ ﻫﺎﯼ ﺯﻳﺎﺩﯼ
ﺻﺮﻑ ﭼﺎﭖ ﻭ ﺍﺭﺳﺎﻝ ﮐﺎﺗﻮﻟﻮﮒ ﻫﺎ ،ﭘﺎﺳﺨﮕﻮﺋﯽ ﺑﻪ ﺗﻠﻔﻦ ﻫﺎ ﻭ ﺭﺩﻳﺎﺑﯽ ﺳﻔﺎﺭﺷﺎﺕ، ﻣﻴﮕﺮﺩﺩ .ﺩﺭ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﻫﺰﻳﻨﻪ ﺗﻮﺯﻳﻊ ﮐﺎﺗﻮﻟﻮﮒ ﻭ ﺭﺩﻳﺎﺑﯽ ﺳﻔﺎﺭﺷﺎﺕ ﺑﺴﻤﺖ ﺻﻔﺮ ﻣﻴﻞ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺍﻣﮑﺎﻥ ﻋﺮﺿﻪ ﮐﺎﻻ ﺑﺎ ﻗﻴﻤﺖ ﺍﺭﺯﺍﻧﺘﺮ ﻓﺮﺍﻡ ﺧﻮﺍﻫﺪ ﺷﺪ. ﺟﻨﺒﻪ ﻫﺎﯼ ﺳﺎﺩﻩ ﻭ ﺳﺨﺖ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ
ﻣﻮﺍﺭﺩﻳﮑﻪ ﺍﺯ ﺁﻧﻬﺎ ﺑﻌﻨﻮﺍﻥ ﻋﻤﻠﻴﺎﺕ ﺩﺷﻮﺍﺭ ﻭ ﺳﺨﺖ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻳﺎﺩ ﻣﯽ ﺷﻮﺩ ،ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ: •
ﺗﺮﺍﻓﻴﮏ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﯼ ﺳﺎﻳﺖ
•
ﺗﺮﺍﻓﻴﮏ ﻣﺮﺍﺟﻌﺎﺕ ﺛﺎﻧﻮﻳﻪ ﺑﺮ ﺭﻭﯼ ﺳﺎﻳﺖ
•
ﺗﻤﺎﻳﺰ ﺧﻮﺩ ﺑﺎ ﺳﺎﻳﺮ ﺭﻗﺒﺎﺀ
•
ﺗﻤﺎﻳﻞ ﺍﻓﺮﺍﺩ ﺑﻪ ﺧﺮﻳﺪ ﮐﺎﻻ ﺍﺯ ﺳﺎﻳﺖ .ﻣﺮﺍﺟﻌﻪ ﺑﻪ ﺳﺎﻳﺖ ﻳﮏ ﻣﻮﺿﻮﻉ ﻭ ﺧﺮﻳﺪ ﺍﺯ ﺳﺎﻳﺖ ﻣﻮﺿﻮﻋﯽ ﺩﻳﮕﺮ ﺍﺳﺖ.
•
ﺍﺭﺗﺒﺎﻁ ﻭ ﺗﻌﺎﻣﻞ ﺳﺎﻳﺖ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﺎ ﺳﺎﻳﺮ ﺩﺍﺩﻩ ﻫﺎﯼ ﻣﻮﺟﻮﺩ ﺩﺭ ﺳﺎﺯﻣﺎﻥ
ﺍﻣﺮﻭﺯﻩ ﺑﺮ ﺭﻭﯼ ﺍﻳﻨﺘﺮﻧﺖ ﺳﺎﻳﺖ ﻫﺎﯼ ﺑﻴﺸﻤﺎﺭﯼ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﻭ ﺍﻳﺠﺎﺩ ﻳﮏ ﺳﺎﻳﺖ ﺟﺪﻳﺪ
ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﮐﺎﺭ ﻣﺸﮑﻠﯽ ﻧﻴﺴﺖ ﻭﻟﯽ ﺟﺬﺏ ﻣﺨﺎﻃﺒﻴﻦ ﺟﻬﺖ ﻣﺮﺍﺟﻌﻪ ﺑﻪ ﺳﺎﻳﺖ ﻭ ﺧﺮﻳﺪ ﺍﺯ ﺁﻥ ،ﻣﻬﻤﺘﺮﻳﻦ ﻣﺴﺌﻠﻪ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺍﺳﺖ.
ﻣﻮﺍﺭﺩﻳﮑﻪ ﺍﺯ ﺁﻧﻬﺎ ﺑﻌﻨﻮﺍﻥ ﻋﻤﻠﻴﺎﺕ ﺳﺎﺩﻩ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻳﺎﺩ ﻣﯽ ﺷﻮﺩ،
ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ : •
ﺍﻳﺠﺎﺩ ﻳﮏ ﻭﺏ ﺳﺎﻳﺖ
•
ﺍﺧﺬ ﺳﻔﺎﺭﺷﺎﺕ
•
ﭘﺬﻳﺮﺵ ﭘﺮﺩﺍﺧﺖ 90
ﺍﻳﺠﺎﺩ ﻳﮏ ﺳﺎﻳﺖ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ
ﺩﺭ ﺯﻣﺎﻥ ﺍﻳﺠﺎﺩ ﻳﮏ ﺳﺎﻳﺖ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﻣﯽ ﺑﺎﻳﺴﺖ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﻗﺮﺍﺭ
ﮔﻴﺮﺩ: •
ﺗﺎﻣﻴﻦ ﮐﻨﻨﺪﮔﺎﻥ .ﺑﺪﻭﻥ ﻭﺟﻮﺩ ﺗﺎﻣﻴﻦ ﮐﻨﻨﺪﮔﺎﻥ ﺧﻮﺏ ﺍﻣﮑﺎﻥ ﻋﺮﺿﻪ ﮐﺎﻻ ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ.
•
ﻗﻴﻤﺖ .ﻳﮑﯽ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﺑﺨﺶ ﻫﺎﯼ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﻋﺮﺿﻪ ﮐﺎﻻ ﺑﺎ ﻗﻴﻤﺖ
ﻣﻨﺎﺳﺐ ﺍﺳﺖ .ﺍﻣﮑﺎﻥ ﻣﻘﺎﻳﺴﻪ ﻗﻴﻤﺖ ﻳﮏ ﮐﺎﻻ ﺑﺴﺎﺩﮔﯽ ﺑﺮﺍﯼ ﻣﺸﺘﺮﻳﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﻭ ﻫﻤﻮﺍﺭﻩ ﻗﻴﻤﺖ ﻳﮏ ﮐﺎﻻ ﺑﺎ ﻣﻮﺍﺭﺩ ﻣﺸﺎﺑﻪ ﮐﻪ ﺍﺯ ﻃﺮﻳﻖ ﺳﺎﻳﺮ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺍﺭﺍﺋﻪ ﻣﯽ ﮔﺮﺩﺩ
،ﻣﻘﺎﻳﺴﻪ ﺧﻮﺍﻫﺪ ﺷﺪ.
•
ﺍﺭﺗﺒﺎﻃﺎﺕ ﺑﺎ ﻣﺸﺘﺮﯼ .ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻣﺠﻤﻮﻋﻪ ﺍﯼ ﻣﺘﻨﻮﻉ ﺍﺯ ﺭﻭﺵ ﻫﺎﯼ ﻣﻮﺟﻮﺩ ﺟﻬﺖ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻣﺸﺘﺮﯼ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﯽ ﻧﻤﺎﻳﺪ .ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﭘﺎﻳﮕﺎﻩ ﻫﺎﯼ ﺩﺍﻧﺶ ،ﺗﺎﻻﺭﻫﺎﯼ ﻣﺒﺎﺣﺜﻪ ،ﺍﺗﺎﻕ ﻫﺎﯼ ﮔﻔﺘﮕﻮ ﻭ ...ﻧﻤﻮﻧﻪ ﻫﺎﺋﯽ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ
ﻣﯽ ﺑﺎﺷﻨﺪ .ﻣﺸﺘﺮﯼ ﻫﻤﻮﺍﺭﻩ ﻣﯽ ﺑﺎﻳﺴﺖ ﺍﺣﺴﺎﺱ ﻧﻤﺎﻳﺪ ﮐﻪ ﺩﺭ ﺻﻮﺭﺕ ﺑﺮﻭﺯ ﻣﺸﮑﻞ ﻭ ﻳﺎ ﺩﺭﺧﻮﺍﺳﺖ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ،ﺑﺪﻭﻥ ﭘﺎﺳﺦ ﻧﺨﻮﺍﻫﻨﺪ ﻣﺎﻧﺪ. •
ﺗﻮﺯﻳﻊ ﮐﺎﻻ ،ﺧﺪﻣﺎﺕ ﭘﺲ ﺍﺯ ﻓﺮﻭﺵ ﻭ ﺍﻣﮑﺎﻥ ﺑﺮﮔﺸﺖ ﺍﺯ ﻓﺮﻭﺵ ﺍﺯ ﺟﻤﻠﻪ ﻣﻮﺍﺭﺩﯼ ﺍﺳﺖ ﮐﻪ ﺩﺭ ﻣﻮﻓﻘﻴﺖ ﻳﮏ ﺳﺎﻳﺖ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮏ ﻧﻘﺶ ﺑﺴﺰﺍﺋﯽ ﺩﺍﺭﺩ.
ﺩﺭ ﺯﻣﺎﻥ ﺍﻳﺠﺎﺩ ﻳﮏ ﺳﺎﻳﺖ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﻗﺎﺑﻠﻴﺖ ﻫﺎﯼ ﺯﻳﺮ ﻧﻴﺰ ﻣﯽ ﺗﻮﺍﻧﺪ ﻋﺮﺿﻪ ﻭ ﺑﺎﻋﺚ ﻣﻮﻓﻘﻴﺖ ﺩﺭ ﺍﻣﺮ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﮔﺮﺩﺩ: •
ﺍﺭﺳﺎﻝ ﻫﺪﻳﻪ ) ﺟﺎﻳﺰﻩ (
•
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎﯼ ﻫﻤﺒﺴﺘﮕﯽ
•
ﺗﺨﻔﻴﻒ ﻫﺎﯼ ﻭﻳﮋﻩ
•
ﺑﺮﻧﺎﻣﻪ ﻫﺎﯼ ﺧﺮﻳﺪﺍﺭ ﺗﮑﺮﺍﺭﯼ
•
ﻓﺮﻭﺵ ﺍﺩﻭﺍﺭﯼ ﻭ ﻓﺼﻠﯽ 91
ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻣﺮﺑﻮﻁ ﺑﻪ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻣﯽ ﺑﺎﻳﺴﺖ ﺍﻣﮑﺎﻧﺎﺕ ﻓﻮﻕ ﺭﺍ ﻓﺮﺍﻫﻢ ﻧﻤﺎﻳﺪ، ﺩﺭﻏﻴﺮﺍﻳﻨﺼﻮﺭﺕ ﺍﻧﺠﺎﻡ ﻫﺮ ﻳﮏ ﺍﺯ ﻣﻮﺍﺭﺩ ﻓﻮﻕ ﺑﺎ ﻣﺸﮑﻞ ﻣﻮﺍﺟﻪ ﻣﯽ ﮔﺮﺩﺩ.
ﺑﺮﻧﺎﻣﻪ ﻫﺎﯼ ﻫﻤﺒﺴﺘﮕﯽ
ﻳﮑﯽ ﺍﺯ ﺑﺨﺶ ﻫﺎﯼ ﻣﻬﻢ ﺩﺭ ﺯﻣﻴﻨﻪ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺗﻮﺟﻪ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﻧﺎﻣﻪ
ﻫﺎﯼ ﻫﻤﺒﺴﺘﮕﯽ ) ﺍﻧﺠﻤﻨﯽ ( ﻣﯽ ﺑﺎﺷﺪ .ﻭﻳﮋﮔﯽ ﻓﻮﻕ ﺗﻮﺳﻂ ﺁﻣﺎﺯﻭﻥ ﺑﺨﺪﻣﺖ ﮔﺮﻓﺘﻪ ﺷﺪﻩ
ﺍﺳﺖ .ﺁﻣﺎﺯﻭﻥ ﺍﻳﻦ ﺍﻣﮑﺎﻥ ﺭﺍ ﺍﺭﺍﺋﻪ ﻧﻤﻮﺩﻩ ﺗﺎ ﻫﺮ ﺷﺨﺺ ﻗﺎﺩﺭ ﺑﻪ ﭘﻴﮑﺮﺑﻨﺪﯼ ﻳﮏ ﻓﺮﻭﺷﮕﺎﻩ
ﮐﺘﺎﺏ ﺍﺧﺘﺼﺎﺻﯽ ﺑﺎﺷﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﺍﺯ ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺘﺎﺑﻔﺮﻭﺷﯽ ﻫﺎﯼ ﻓﻮﻕ ،ﮐﺘﺎﺑﯽ ﺧﺮﻳﺪﺍﺭﯼ ﻣﯽ ﮔﺮﺩﺩ ،ﻓﺮﺩﯼ ﮐﻪ ﺩﺍﺭﺍﯼ ﮐﺘﺎﺑﻔﺮﻭﺷﯽ ﻣﺮﺑﻮﻃﻪ ﺍﺳﺖ ،ﮐﻤﻴﺴﻴﻮﻧﯽ ) ﺣﺪﺍﮐﺜﺮ ١٥ﺩﺭﺻﺪ ﻗﻴﻤﺖ
ﮐﺘﺎﺏ ( ﺭﺍ ﺍﺯ ﺁﻣﺎﺯﻭﻥ ﺩﺭﻳﺎﻓﺖ ﻣﯽ ﻧﻤﺎﻳﺪ .ﺑﺮﻧﺎﻣﻪ ﻫﻤﺒﺴﺘﮕﯽ ،ﻗﺎﺑﻠﻴﺖ ﻫﺎﯼ ﺯﻳﺎﺩﯼ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ
ﺁﻣﺎﺯﻭﻥ ﻗﺮﺍﺭ ﻣﯽ ﺩﻫﺪ .ﻣﺪﻝ ﻓﻮﻕ ﺍﻣﺮﻭﺯﻩ ﺗﻮﺳﻂ ﻫﺰﺍﺭﺍﻥ ﺳﺎﻳﺖ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺩﻳﮕﺮ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﻭ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ.
ﻳﮑﯽ ﺍﺯ ﮔﺮﺍﻳﺸﺎﺕ ﺟﺪﻳﺪ ﺩﺭ ﺯﻣﻴﻨﻪ ﺑﺮﻧﺎﻣﻪ ﻫﺎﯼ ﻫﻤﺒﺴﺘﮕﯽ ،ﺭﻭﺵ Cost Per(CPC link (clickﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﺑﺮ ﺭﻭﯼ ﺳﺎﻳﺖ ،ﻳﮏ ﻟﻴﻨﮏ ﻣﺮﺑﻮﻁ ﺑﻪ ﺳﺎﻳﺖ ﺩﻳﮕﺮ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﻭ ﺯﻣﺎﻧﻴﮑﻪ ﺑﺮ ﺭﻭﯼ ﻟﻴﻨﮏ ﻓﻮﻕ ﮐﻠﻴﮏ ﮔﺮﺩﺩ ،ﺗﻮﺳﻂ ﺷﺮﮐﺖ ﻣﺮﺑﻮﻃﻪ ﺑﻪ ﺷﻤﺎ ﻣﺒﻠﻐﯽ ﭘﺮﺩﺍﺧﺖ
ﻣﯽ ﮔﺮﺩﺩ .ﺭﻭﺵ ﻓﻮﻕ ،ﻣﺪﻟﯽ ﻣﻴﺎﻧﻪ ﺑﻴﻦ ﺭﻭﺵ ﻫﺎﯼ ﺗﺒﻠﻴﻐﺎﺗﯽ ﻣﺒﺘﻨﯽ ﺑﺮ Bannerﻭ ﺑﺮﻧﺎﻣﻪ
ﻫﺎﯼ ﻫﻤﺒﺴﺘﮕﯽ ﻣﺒﺘﻨﯽ ﺑﺮ ﮐﻤﻴﺴﻴﻮﻥ ﺍﺳﺖ .ﺩﺭ ﺭﻭﺵ ﺗﺒﻠﻴﻐﺎﺗﯽ ﻣﺒﺘﻨﯽ ﺑﺮ ،Bannerﺷﺮﮐﺖ
ﺗﺒﻠﻴﻎ ﮐﻨﻨﺪﻩ ﺗﻤﺎﻡ ﺭﻳﺴﮏ ﺭﺍ ﺑﺮ ﻋﻬﺪﻩ ﻣﯽ ﮔﻴﺮﺩ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﻓﺮﺩﯼ ﺑﺮ ﺭﻭﯼ Banner ﮐﻠﻴﮏ ﻧﻨﻤﺎﻳﺪ ،ﺗﺒﻠﻴﻎ ﮐﻨﻨﺪﻩ ﭘﻮﻝ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺩﺳﺖ ﺩﺍﺩﻩ ﺍﺳﺖ .ﺩﺭ ﺭﻭﺵ ﺍﺧﺬ ﮐﻤﻴﺴﻴﻮﻥ ،ﺗﻤﺎﻡ ﺭﻳﺴﮏ ﺑﺮ ﻋﻬﺪﻩ ﻭﺏ ﺳﺎﻳﺖ ﺍﺳﺖ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﻭﺏ ﺳﺎﻳﺖ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﯼ ﻣﺸﺘﺮﯼ ﺭﺍ ﺑﻪ ﺳﺎﻳﺖ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺭﺳﺎﻝ ) ﻫﺪﺍﻳﺖ ( ﻭﻟﯽ ﻫﻴﭽﮑﺪﺍﻡ ﺍﺯ ﺁﻧﻬﺎ ﮐﺎﻻﺋﯽ ﺭﺍ ﺧﺮﻳﺪﺍﺭﯼ ﻧﻨﻤﺎﻳﻨﺪ ،ﻣﺒﻠﻐﯽ ﺑﻪ ﻭﺏ ﺳﺎﻳﺖ ﭘﺮﺩﺍﺧﺖ ﻧﺨﻮﺍﻫﺪ ﺷﺪ .ﺩﺭ ﺭﻭﺵ CPCﺩﻭ ﻃﺮﻑ ﺭﻳﺴﮏ
ﻣﻮﺟﻮﺩ ﺭﺍ ﺑﺼﻮﺭﺕ ﻣﺸﺘﺮﮎ ﻗﺒﻮﻝ ﻣﯽ ﻧﻤﺎﻳﻨﺪ.
92
ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﻳﮏ ﺳﺎﻳﺖ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮏ
ﺳﻪ ﺭﻭﺵ ﻋﻤﺪﻩ ﺑﺮﺍﯼ ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﻳﮏ ﺳﺎﻳﺖ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮏ ﻭﺟﻮﺩ ﺩﺍﺭﺩ: •
. Enterprise Computingﺩﺭ ﺭﻭﺵ ﻓﻮﻕ ﺷﺮﮐﺖ ﻭ ﻳﺎ ﻣﻮﺳﺴﻪ ﻣﺮﺑﻮﻁ ﺍﻗﺪﺍﻡ ﺑﻪ ﺗﻬﻴﻪ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ،ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻭ ﮐﺎﺭﺷﻨﺎﺳﺎﻥ ﻭﺭﺯﻳﺪﻩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﻭﺏ
ﺳﺎﻳﺖ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺧﻮﺩ ﻣﯽ ﻧﻤﺎﻳﺪ .ﺁﻣﺎﺯﻭﻥ ﻭ ﺳﺎﻳﺮ ﺷﺮﮐﺖ ﻫﺎﯼ ﺑﺰﺭﮒ ﺍﺯ ﺭﻭﺵ ﻓﻮﻕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﺍﻧﺘﺨﺎﺏ ﺭﻭﺵ ﻓﻮﻕ ﻣﺸﺮﻭﻁ ﺑﻪ ﻭﺟﻮﺩ ﻋﻮﺍﻣﻞ ﺯﻳﺮ
ﺍﺳﺖ
ﺷﺮﮐﺖ ﻣﺮﺑﻮﻃﻪ ﺩﺍﺭﺍﯼ ﺗﺮﺍﻓﻴﮏ ﺑﺴﻴﺎﺭ ﺑﺎﻻﺋﯽ ﺍﺳﺖ ) ﭼﻨﺪﻳﻦ ﻣﻴﻠﻴﻮﻥ ﺩﺭ ﻫﺮ ﻣﺎﻩ ( -ﺷﺮﮐﺖ ﻣﺮﺑﻮﻃﻪ ﺩﺍﺭﺍﯼ ﻳﮏ ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﯽ ﺑﺰﺭﮒ ﺑﻮﺩﻩ ﮐﻪ ﺷﺎﻣﻞ ﮐﺎﺗﻮﻟﻮﮒ ﻫﺎﯼ
ﻣﺮﺑﻮﻁ ﺑﻪ ﻣﺤﺼﻮﻻﺕ ﺍﺳﺖ ) ﻣﺨﺼﻮﺻﺎ" ﺍﮔﺮ ﮐﺎﺗﻮﻟﻮﮒ ﻫﺎ ﺑﺴﺮﻋﺖ ﺗﻐﻴﻴﺮﻣﯽ ﻳﺎﺑﻨﺪ(. ﺷﺮﮐﺖ ﻣﺮﺑﻮﻃﻪ ﺩﺍﺭﺍﯼ ﻳﮏ ﭼﺮﺧﻪ ﻓﺮﻭﺵ ﭘﻴﭽﻴﺪﻩ ﺑﻮﺩﻩ ﮐﻪ ﻣﺴﺘﻠﺰﻡ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺮﻡﻫﺎﯼ ﺍﺧﺘﺼﺎﺻﯽ ،ﺟﺪﺍﻭﻝ ﻣﺘﻔﺎﻭﺕ ﻗﻴﻤﺖ ﻭ ...ﺍﺳﺖ .
ﺷﺮﮐﺖ ﻣﺮﺑﻮﻃﻪ ﺩﺍﺭﺍﯼ ﺳﺎﻳﺮ ﭘﺮﺩﺍﺯﺵ ﻫﺎﯼ ﺗﺠﺎﺭﯼ ﺑﻮﺩﻩ ﻭ ﻗﺼﺪ ﺍﺭﺗﺒﺎﻁ ﻭﭘﻴﻮﺳﺘﮕﯽﺁﻧﻬﺎ ﺑﺎ ﺳﺎﻳﺖ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻭﺟﻮﺩ ﺩﺍﺭﺩ. •
ﺳﺮﻭﻳﺲ ﻫﺎﯼ ﻣﻴﺰﺑﺎﻧﯽ ﻣﺠﺎﺯﯼ .ﻓﺮﻭﺷﻨﺪﻩ ﺗﺠﻬﻴﺰﺍﺕ ﻭ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﯼ ﻣﺮﺑﻮﻁ ﺭﺍ
ﺑﻌﻨﻮﺍﻥ ﻳﮏ ﺑﺴﺘﻪ ﻧﺮﻡ ﺍﻓﺰﺍﺭﯼ ﺍﺧﺘﺼﺘﺎﺻﯽ ﻋﺮﺿﻪ ﻣﯽ ﻧﻤﺎﻳﺪ .ﺑﺨﺸﯽ ﺍﺯ ﺑﺴﺘﻪ ﻧﺮﻡ
ﺍﻓﺰﺍﺭﯼ ﺷﺎﻣﻞ ﺍﻣﻨﻴﺖ ﺍﺳﺖ .ﺩﺳﺘﻴﺎﺑﯽ ﺑﻪ ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﯽ ﻧﻴﺰ ﺑﺨﺶ ﺩﻳﮕﺮﯼ ﺍﺯ ﺑﺴﺘﻪ ﻧﺮﻡ ﺍﻓﺰﺍﺭﯼ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺘﺎﻧﺴﻴﻞ ﻫﺎﯼ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﺩﺍﻣﻪ ﺷﺮﮐﺖ ﻣﺮﺑﻮﻃﻪ
ﻣﯽ ﺗﻮﺍﻧﺪ ﺑﺎ ﺑﺨﺪﻣﺖ ﮔﺮﻓﺘﻦ ﻃﺮﺍﺣﺎﻥ ﻭﺏ ﻭ ﭘﻴﺎﺩﻩ ﮐﻨﻨﺪﮔﺎﻥ ﻣﺮﺑﻮﻃﻪ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﻳﺠﺎﺩ ﻭ ﻧﮕﻬﺪﺍﺭﯼ ﺳﺎﻳﺖ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺧﻮﺩ ﻧﻤﺎﻳﺪ. •
ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺳﺎﺩﻩ .ﺍﮐﺜﺮ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﺷﺮﮐﺖ ﻫﺎ ﺍﺯ ﺭﻭﺵ ﻓﻮﻕ ﺑﺮﺍﯼ ﭘﻴﺎﺩﻩ
ﺳﺎﺯﯼ ﺳﺎﻳﺖ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﻨﺪ.ﺳﻴﺴﺘﻢ ﺷﺎﻣﻞ ﻣﺠﻤﻮﻋﻪ ﺍﯼ ﺍﺯ
ﻓﺮﻡ ﻫﺎﯼ ﺳﺎﺩﻩ ﺑﻮﺩﻩ ﮐﻪ ﺗﻮﺳﻂ ﻣﺘﻘﺎﺿﯽ ﺗﮑﻤﻴﻞ ﻣﯽ ﮔﺮﺩﻧﺪ .ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻣﺮﺑﻮﻃﻪ ﺩﺭ ﺍﺩﺍﻣﻪ ﺗﻤﺎﻡ ﺻﻔﺤﺎﺕ ﻭﺏ ﺫﻳﺮﺑﻂ ﺭﺍ ﺗﻮﻟﻴﺪ ﻣﯽ ﻧﻤﺎﻳﺪ. 93
ﻳﺎﺩﮔﻴﺮﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﻋﺮﺻﻪ ﻫﺎﯼ ﺁﻣﻮﺯﺷﯽ ﻧﻴﺰ ﭼﺎﻟﺶ ﻫﺎﯼ ﺟﺪﻳﺪﯼ ﺭﺍ ﺍﻳﺠﺎﺩ ﮐﺮﺩﻩ ﺍﺳﺖ.
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺯﻳﺮﺳﺎﺧﺖ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺮﺍﯼ ﺁﻣﻮﺯﺵ ،ﺩﺭ ﺳﺎﻟﻴﺎﻥ ﺍﺧﻴﺮ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﮐﺎﺭﺷﻨﺎﺳﺎﻥ ﻭ ﻣﺮﺍﮐﺰ ﻋﻠﻤﯽ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺍﺳﺖ .ﺁﻣﻮﺯﺵ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﺁﻣﻮﺯﺵ ﻣﺒﺘﻨﯽ ﺑﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ )،(CBT ﺁﻣﻮﺯﺵ ﻣﺒﺘﻨﯽ ﺑﺮ ﺍﻳﻨﺘﺮﻧﺖ ) (IBTﻭ ﺁﻣﻮﺯﺵ ﻣﺒﺘﻨﯽ ﺑﺮ ﻭﺏ ) (WBTﻧﻤﻮﻧﻪ ﺍﺳﺎﻣﯽ ﺍﻧﺘﺨﺎﺏ ﺷﺪﻩ ﺑﺮﺍﯼ ﺭﻭﺵ ﻫﺎﯼ ﺟﺪﻳﺪ ﺁﻣﻮﺯﺷﯽ ﻣﯽ ﺑﺎﺷﻨﺪ .ﺁﻣﻮﺯﺵ ) ﻳﺎﺩ ﺩﺍﺩﻥ ﻭ ﻳﺎﺩ ﮔﻴﺮﯼ ( ،ﻃﯽ
ﺳﺎﻟﻴﺎﻥ ﺁﻳﻨﺪﻩ ﺑﺎ ﺍﻧﻘﻼﺑﯽ ﺑﺰﺭﮒ ﺭﻭﺑﺮﻭ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺍﻣﮑﺎﻧﺎﺕ ﺳﺨﺖ ﺍﻓﺰﺍﺭﯼ ﻭ ﻧﺮﻡ ﺍﻓﺮﺍﺭﯼ ﻣﻮﺟﻮﺩ ،ﺑﺸﺮﻳﺖ ﺭﺍ ﺑﻪ ﺳﻤﺖ ﻳﮏ ﺍﻧﻘﻼﺏ ﺑﺰﺭﮒ ﺁﻣﻮﺯﺷﯽ ﺳﻮﻕ ﻣﯽ ﺩﻫﺪ. ﺁﻣﻮﺯﺵ ﻫﺎﯼ Onlineﺍﺯ ﺳﺎﻝ ١٩٩٠ﻣﻄﺮﺡ ﻭ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺭﺷﺪ ﺗﺠﻬﻴﺰﺍﺕ ﻭ ﺍﻣﮑﺎﻧﺎﺕ
ﻣﺮﺑﻮﻃﻪ ﺩﺭ ﺩﻫﻪ ﮔﺬﺷﺘﻪ ،ﮔﺎﻡ ﻫﺎﯼ ﻣﻮﺛﺮﯼ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺑﺮﺩﺍﺷﺘﻪ ﺷﺪﻩ ﻭ ﺍﻳﻨﮏ ﺩﺭ ﻧﻘﻄﻪ ﻋﻄﻔﯽ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺍﺳﺖ .ﺁﺷﻨﺎﺋﯽ ﺑﺎ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﺁﻣﻮﺯﺷﯽ ﺟﺪﻳﺪ ﺑﺮﺍﯼ ﺗﻤﺎﻣﯽ ﺩﺳﺖ ﺍﻧﺪﺭﮐﺎﺭﺍﻥ ﺍﻣﺮ ﺁﻣﻮﺯﺵ ،ﺣﺎﺋﺰ ﺍﻫﻤﻴﺖ ﺍﺳﺖ .ﺍﮔﺮ ﺩﺍﻧﺎﺋﯽ ﺭﺍ ﻋﻴﻦ ﺗﻮﺍﻧﺎﺋﯽ ﺑﺪﺍﻧﻴﻢ ،ﺟﻮﺍﻣﻌﯽ ﺍﺯ
ﺑﺸﺮﻳﺖ ﺑﻪ ﺗﻮﺍﻧﺎﺋﯽ ﻭ ﺧﻮﺩ ﺑﺎﻭﺭﯼ ﺧﻮﺍﻫﻨﺪ ﺭﺳﻴﺪ ﮐﻪ ﺯﻳﺮ ﺳﺎﺧﺖ ﻣﻨﺎﺳﺒﯽ ﺭﺍ ﺑﺮﺍﯼ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﺁﻣﻮﺯﺷﯽ ﺧﻮﺩ ﺍﻧﺘﺨﺎﺏ ﻭ ﺑﺮ ﻫﻤﻴﻦ ﺍﺳﺎﺱ ﺣﺮﮐﺎﺕ ﻫﺪﻓﻤﻨﺪ ﻭ ﺳﻴﺴﺘﻤﺎﺗﻴﮏ ﺁﻣﻮﺯﺷﯽ ﺭﺍ ﺑﺎ ﺗﺎﮐﻴﺪ ﺑﺮ ﻋﻨﺎﺻﺮ ﻣﺘﻔﺎﻭﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺳﻴﺴﺘﻢ ﺁﻣﻮﺯﺷﯽ ،ﺁﻏﺎﺯ ﻧﻤﺎﻳﻨﺪ .ﺁﻣﻮﺯﺵ
ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻓﺮﺻﺖ ﻣﻨﺎﺳﺒﯽ ﺭﺍ ﺑﺮﺍﯼ ﺗﻤﺎﻣﯽ ﺩﺳﺖ ﺍﻧﺪﺭﮐﺎﺭﺍﻥ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﺁﻣﻮﺯﺷﯽ ﻓﺮﺍﻫﻢ ﻧﻤﻮﺩﻩ ﺍﺳﺖ ﺗﺎ ﺑﺘﻮﺍﻧﻨﺪ ﺑﺎ ﺑﻬﺮﻩ ﮔﻴﺮﯼ ﺍﺯ ﺁﺧﺮﻳﻦ ﻓﻦ ﺁﻭﺭﯼ ﻫﺎﯼ ﻣﻮﺟﻮﺩ ،ﻣﻬﻤﺘﺮﻳﻦ ﺭﺳﺎﻟﺖ ﺧﻮﺩ ﺭﺍ ﮐﻪ ﻫﻤﺎﻥ ﺁﻣﻮﺯﺵ ﺍﺳﺖ ﺑﺎ ﺳﺮﻋﺖ ﻭﮐﻴﻔﻴﺘﯽ ﻣﻄﻠﻮﺏ ﺩﺭﺍﺧﺘﻴﺎﺭ ﻣﺘﻘﺎﺿﻴﺎﻥ ﻗﺮﺍﺭ ﺩﻫﻨﺪ. ﺁﻣﻮﺯﺵ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﭼﻴﺴﺖ ؟
ﺁﻣﻮﺯﺵ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﺍﻣﮑﺎﻥ ﻓﺮﺍﮔﻴﺮﯼ ﻣﺴﺘﻘﻞ ﺍﺯ ﺯﻣﺎﻥ ﻭ ﻣﮑﺎﻥ ﺭﺍ ﺑﺮﺍﯼ ﺩﺍﻧﺶ ﭘﮋﻭﻫﺎﻥ ﻓﺮﺍﻫﻢ ﻣﯽ ﺁﻭﺭﺩ .ﺟﺎﻳﮕﺎﻩ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺭ ﺁﻣﻮﺯﺵ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﺴﻴﺎﺭ ﺣﺎﺋﺰ ﺍﻫﻤﻴﺖ ﺍﺳﺖ. ﺑﺎ ﭘﻴﮑﺮﺑﻨﺪﯼ ﻣﻨﺎﺳﺐ ﮐﺎﻣﭙﻴﻮﺗﺮ)ﺳﺨﺖ ﺍﻓﺰﺍﺭ ،ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻭ ﺷﺒﮑﻪ( ،ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻣﻮﺯﺵ ﻫﺎﯼ
94
ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﺮﺍﯼ ﻋﻼﻗﻪ ﻣﻨﺪﺍﻥ ﻓﺮﺍﻫﻢ ﻣﯽ ﮔﺮﺩﺩ .ﻋﻤﻠﮑﺮﺩ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺭ ﺁﻣﻮﺯﺵ ﻫﺎﯼ
ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻧﻈﻴﺮ ﻋﻤﻠﮑﺮﺩ ﻣﻮﺑﺎﻳﻞ ﺩﺭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﺳﺖ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻭ ﭘﻴﮑﺮﺑﻨﺪﯼ ﻣﻨﺎﺳﺐ ﻣﻮﺑﺎﻳﻞ ﺍﻣﮑﺎﻥ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﻣﺴﺘﻘﻞ ﺍﺯ ﺯﻣﺎﻥ ﻭ ﻣﮑﺎﻥ ﺧﺎﺹ ﺑﺮﺍﯼ ﺍﻓﺮﺍﺩ ﺑﻮﺟﻮﺩ ﻣﯽ ﺁﻳﺪ. ﺁﻣﻮﺯﺵ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻣﯽ ﺗﻮﺍﻧﺪ ﻣﺒﺘﻨﯽ ﺑﺮ ، CD-ROMﺷﺒﮑﻪ ،ﺍﻳﻨﺘﺮﺍﻧﺖ ﻭ ﻳﺎ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺎﺷﺪ.
ﺁﻣﻮﺯﺵ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﺮﺍﯼ ﺍﺭﺍﺋﻪ ﻣﺤﺘﻮﯼ ﺍﺯ ﻋﻨﺎﺻﺮ ﺍﻃﻼﻋﺎﺗﯽ ﺑﺎ ﻓﺮﻣﺖ ﻫﺎﯼ ﻣﺘﻔﺎﻭﺕ ﻧﻈﻴﺮ: ﻣﺘﻦ ،ﻭﻳﺪﺋﻮ ،ﺻﺪﺍ ،ﺍﻧﻴﻤﻴﺸﻦ ،ﮔﺮﺍﻓﻴﮏ ﻭ ﻣﺤﻴﻂ ﻫﺎﯼ ﻣﺠﺎﺯﯼ ﻭ ﻳﺎ ﺷﺒﻴﻪ ﺳﺎﺯﯼ ﺷﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﺪ .ﺗﺠﺎﺭﺏ ﺑﺪﺳﺖ ﺁﻣﺪﻩ ﺍﺯ ﺁﻣﻮﺯﺵ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﻤﺮﺍﺗﺐ ﮔﺴﺘﺮﺩﻩ ﺗﺮ ﺍﺯ ﺗﺠﺎﺭﺏ ﺁﻣﻮﺯﺷﯽ ﺑﺪﺳﺖ ﺁﻣﺪﻩ ﺩﺭ ﻳﮏ ﮐﻼﺱ ﺩﺭﺱ ﺳﻨﺘﯽ ﺍﺳﺖ .ﺁﻫﻨﮓ ﻓﺮﺍﮔﻴﺮﯼ ﺩﺭ ﺳﻴﺴﺘﻢ ﻫﺎﯼ
ﺁﻣﻮﺯﺷﯽ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺯ ﻳﮏ ﺭﻭﻧﺪ ﻣﺸﺨﺺ ﻭ ﺳﻴﺴﺘﻤﺎﺗﻴﮏ ﺗﺒﻌﻴﺖ ﮐﺮﺩﻩ ﻭ ﻣﺨﺎﻃﺒﺎﻥ ﺧﻮﺩ ﺭﺍ ﺑﺎ ﻫﺮ ﻧﻮﻉ ﺳﻠﻴﻘﻪ ﻭ ﮔﺮﺍﻳﺶ ﺑﺴﺮﻋﺖ ﺟﺬﺏ ﻣﯽ ﻧﻤﺎﻳﺪ.
ﺁﻣﻮﺯﺵ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺭﻣﺰ ﻣﻮﻓﻘﻴﺖ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺷﻴﻮﻩ ﺍﺭﺍﺋﻪ ،ﻧﻮﻉ ﻣﺤﺘﻮﻳﺎﺕ ﻭ ﺗﻮﺯﻳﻊ ) ﻋﺮﺿﻪ ( ﻣﻨﺎﺳﺐ ﻣﯽ ﺩﺍﻧﻨﺪ .ﺩﺭ ﺁﻣﻮﺯﺵ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺯ ﺍﻏﻠﺐ ﻣﺴﺎﺋﻞ ﻣﻮﺟﻮﺩ ﺩﺭ ﺁﻣﻮﺯﺵ ﻫﺎﯼ ﺳﻨﺘﯽ ﻧﻈﻴﺮ :ﺳﺨﻨﺮﺍﻧﯽ ﻫﺎﯼ ﻳﮑﻄﺮﻓﻪ ،ﺗﻌﺎﻣﻞ ﻭ ﺍﺭﺗﺒﺎﻁ ﺿﻌﻴﻒ ﺑﺎ ﻓﺮﺍﮔﻴﺮﺍﻥ، ﺍﺟﺘﻨﺎﺏ ﻣﯽ ﮔﺮﺩﺩ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﯼ ﻣﺮﺑﻮﻁ ﺑﻪ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﺁﻣﻮﺯﺵ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ
ﻣﯽ ﺗﻮﺍﻥ ﺑﺴﺮﻋﺖ ﻣﺤﻴﻂ ﻫﺎﯼ ﺁﻣﻮﺯﺷﯽ ﻣﻮﺛﺮ ﻭ ﮐﺎﺭﺁ ﺭﺍ ﺑﺎ ﺑﻬﺮﻩ ﮔﻴﺮﯼ ﺍﺯ ﻋﻨﺎﺻﺮ ﻣﺘﻔﺎﻭﺕ ﺁﻣﻮﺯﺷﯽ ﺍﻳﺠﺎﺩ ﮐﺮﺩ. ﺳﻄﻮﺡ ﺁﻣﻮﺯﺵ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ
ﺁﻣﻮﺯﺵ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺩﺭ ﭼﻬﺎﺭ ﮔﺮﻭﻩ ﻋﻤﺪﻩ ﻃﺒﻘﻪ ﺑﻨﺪﯼ ﻣﯽ ﮔﺮﺩﺩ .ﮔﺮﻭﻩ ﻫﺎﯼ ﻓﻮﻕ ﺳﻄﻮﺡ ﻣﺘﻔﺎﻭﺕ ﺁﻣﻮﺯﺷﯽ ﺍﺯ ﺍﺑﺘﺪﺍﺋﯽ ﺗﺎ ﺳﻄﻮﺡ ﭘﻴﺸﺮﻓﺘﻪ ﺭﺍ ﺗﻀﻤﻴﻦ ﻣﯽ ﻧﻤﺎﻳﻨﺪ: •
ﭘﺎﻳﮕﺎﻩ ﻫﺎﯼ ﺩﺍﻧﺶ .ﭘﺎﻳﮕﺎﻩ ﻫﺎﯼ ﺩﺍﻧﺶ ﻭ ﺍﻃﻼﻋﺎﺕ ﺧﻮﺩ ﺑﻌﻨﻮﺍﻥ ﻳﮏ ﺁﻣﻮﺯﺵ ﻭﺍﻗﻌﯽ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﻧﻤﯽ ﺷﻮﻧﺪ .ﺑﺎﻧﮏ ﻫﺎﯼ ﺍﻃﻼﻋﺎﺗﯽ ﺷﮑﻞ ﺍﻭﻟﻴﻪ ﺍﯼ ﺍﺯ ﺁﻣﻮﺯﺵ
ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻣﯽ ﺑﺎﺷﻨﺪ .ﺑﺎﻧﮏ ﻫﺎﯼ ﺍﻃﻼﻋﺎﺗﯽ ﻓﻮﻕ ﺭﺍ ﻣﯽ ﺗﻮﺍﻥ ﺩﺭ ﺳﺎﻳﺖ ﻫﺎﯼ ﻧﺮﻡ ﺍﻓﺰﺍﺭﯼ ﻣﺘﻌﺪﺩ ،ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺸﺎﻫﺪﻩ ﻧﻤﻮﺩ .ﺑﺎﻧﮏ ﻫﺎﯼ ﺍﻃﻼﻋﺎﺗﯽ ﺑﺎ ﻳﮏ ﺭﻭﺵ ﺳﻴﺴﺘﻤﺎﺗﻴﮏ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺍﺋﻪ ﺗﻮﺿﻴﺤﺎﺕ ﻭ ﺭﺍﻫﻨﻤﺎﺋﯽ ﻫﺎﯼ ﺿﺮﻭﺭﯼ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ 95
ﺳﻮﺍﻻﺕ ﻣﻄﺮﺡ ﺷﺪﻩ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻣﯽ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ
ﻫﺎﯼ ﻻﺯﻡ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﺧﺎﺹ ﺗﻮﺳﻂ ﻳﮏ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺑﺼﻮﺭﺕ ﻣﺮﺣﻠﻪ ﺑﻪ ﻣﺮﺣﻠﻪ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻣﺘﻘﺎﺿﻴﺎﻥ ﻗﺮﺍﺭ ﻣﯽ ﮔﻴﺮﺩ.ﺑﺎﻧﮏ ﻫﺎﯼ ﺍﻃﻼﻋﺎﺗﯽ ﻓﻮﻕ ،ﺍﻏﻠﺐ ﺑﺼﻮﺭﺕ ﻣﺘﻌﺎﻣﻞ ﺑﺎ ﮐﺎﺭﺑﺮﺍﻥ ﺧﻮﺩ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﻣﺜﻼ" ﮐﺎﺭﺑﺮﺍﻥ ﻣﯽ ﺗﻮﺍﻧﻨﺪ
ﮐﻠﻤﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺑﺨﺶ ﻣﺮﺑﻮﻃﻪ ﺗﺎﻳﭗ ﺗﺎ ﺯﻣﻴﻨﻪ ﺟﺴﺘﺠﻮ ﺩﺭ ﺑﺎﻧﮏ
ﺍﻃﻼﻋﺎﺗﯽ ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﺍﻣﮑﺎﻥ ﺍﻧﺘﺨﺎﺏ ﻣﻮﺿﻮﻉ ﻣﻮﺭﺩ ﻋﻼﻗﻪ ﺑﺮ ﺍﺳﺎﺱ ﻟﻴﺴﺖ ﻫﺎﯼ ﻣﺮﺗﺐ ﺷﺪﻩ ) ﻣﻮﺿﻮﻋﯽ ﻭ ﻳﺎ ﺍﻟﻔﺒﺎﺋﯽ ( ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺭﺩ.
•
ﺣﻤﺎﻳﺖ ﻓﻨﯽ . onlineﺣﻤﺎﻳﺖ onlineﻧﻴﺰ ﻧﻮﻉ ﺧﺎﺻﯽ ﺍﺯ ﺁﻣﻮﺯﺵ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﻮﺩﻩ ﮐﻪ ﺩﺭ ﻣﻮﺍﺭﺩﯼ ﺷﺒﺎﻫﺖ ﻫﺎﺋﯽ ﺑﺎ ﭘﺎﻳﮕﺎﻩ ﻫﺎﯼ ﺩﺍﻧﺶ ،ﺩﺍﺭﺩ .ﺑﺮﺍﯼ ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﺣﻤﺎﻳﺖ ﻫﺎﯼ ﻓﻨﯽ ، onlineﺍﺯ ﺭﻭﺵ ﻫﺎﯼ ﻣﺘﻌﺪﺩﯼ ﻧﻈﻴﺮ :ﺗﺎﻻﺭﻫﺎﯼ ﻣﺒﺎﺣﺜﻪ ،ﺍﺗﺎﻕ
ﻫﺎﯼ ﮔﻔﺘﮕﻮ ،ﺳﻴﺴﺘﻢ ﻫﺎﯼ ، BBSﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻭ ﻳﺎ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﻓﻮﺭﯼ ﻭ ﺯﻧﺪﻩ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﺷﻮﺩ .ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﻓﻮﻕ ﺗﻌﺎﻣﻞ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮﯼ ﺭﺍ ﻧﺴﺒﺖ ﺑﻪ ﭘﺎﻳﮕﺎﻩ ﻫﺎﯼ ﺩﺍﻧﺶ ﺑﺎ ﻣﺨﺎﻃﺐ ،ﺑﺮﻗﺮﺍﺭ ﻣﯽ ﻧﻤﺎﻳﻨﺪ.
•
ﺁﻣﻮﺯﺵ ﻧﺎﻣﺘﻘﺎﺭﻥ .ﺳﻴﺴﺘﻢ ﻓﻮﻕ ﺩﺭ ﺁﻣﻮﺯﺵ ﻫﺎﯼ ﺍﻭﻟﻴﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﻳﺪ .ﺩﺭ ﺭﻭﺵ ﻓﻮﻕ ﺍﻣﮑﺎﻥ ﺧﻮﺩ ﺁﻣﻮﺯﯼ ﺑﺎ ﻣﺤﻮﺭﻳﺖ ﻓﺮﺍﮔﻴﺮﺍﻥ ﻓﺮﺍﻫﻢ
ﻣﯽ ﮔﺮﺩﺩ .ﺑﺮﺍﯼ ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﻭ ﺍﺟﺮﺍﯼ ﺳﻴﺴﺘﻢ ﻓﻮﻕ ﺍﺯ ﺍﻣﮑﺎﻧﺎﺕ ﻭ ﺭﻭﺵ ﻫﺎﯼ
ﻣﺘﻌﺪﺩﯼ ﻧﻈﻴﺮ :ﺁﻣﻮﺯﺵ ﻫﺎﯼ ﻣﺒﺘﻨﯽ ﺑﺮ ، CD-ROMﺍﻳﻨﺘﺮﺍﻧﺖ ﻭ ﻳﺎ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ .ﺩﺳﺘﻴﺎﺑﯽ ﺑﻪ ﻣﺠﻤﻮﻋﻪ ﺍﯼ ﺍﺯ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺠﺎﻡ ﻳﮏ ﻋﻤﻠﻴﺎﺕ
ﺧﺎﺹ ﺍﺯ ﻃﺮﻳﻖ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ، BBSﮔﺮﻭﻩ ﻫﺎ ﻭ ﺗﺎﻻﺭﻫﺎﯼ ﻣﺘﻔﺎﻭﺕ ﻣﺒﺎﺣﺜﻪ ﻭ ﭘﺴﺖ
ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻧﻤﻮﻧﻪ ﻫﺎﺋﯽ ﺍﺯ ﺍﻣﮑﺎﻧﺎﺕ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺗﻮﺳﻂ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﻓﻮﻕ ﻣﯽ ﺑﺎﺷﻨﺪ. ﺩﺭ ﺑﺮﺧﯽ ﻣﻮﺍﺭﺩ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﻓﻮﻕ ،ﺑﺼﻮﺭﺕ ﮐﺎﻣﻼ" ﺧﻮﺩ ﺁﻣﻮﺯ ﺑﻮﺩﻩ ﻭ ﺍﺯ ﻟﻴﻨﮏ ﻫﺎﯼ
ﺧﺎﺻﯽ ﺑﺮﺍﯼ ﻣﺮﺍﺟﻌﻪ ﺑﻪ ﻣﻨﺎﺑﻊ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ .ﺩﺭﺍﻳﻦ ﻧﻮﻉ ﺳﻴﺴﺘﻢ ﻫﺎ ،ﺍﺯ ﻣﺮﺑﻴﺎﻥ ﺁﻣﻮﺯﺷﯽ ﮐﻪ ﺑﺼﻮﺭﺕ ﺯﻧﺪﻩ ﻓﻌﺎﻟﻴﺖ ﻫﺎﯼ ﺁﻣﻮﺯﺷﯽ ﻓﺮﺍﮔﻴﺮﺍﻥ ﺭﺍ ﻣﺪﻳﺮﻳﺖ
96
ﻣﯽ ﻧﻤﺎﻳﻨﺪ ،ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﯽ ﮔﺮﺩﺩ .ﭼﺎﺭﭼﻮﺏ ﻭ ﺳﺎﺧﺘﺎﺭ ﺍﺭﺍﺋﻪ ﻣﻮﺿﻮﻉ ﻭ ﻣﺤﺘﻮﯼ ﺍﻏﻠﺐ ﺑﺼﻮﺭﺕ ﺧﻮﺩﺁﻣﻮﺯ ﺑﺎ ﻫﺪﺍﻳﺖ ﻟﻴﻨﮏ ﻫﺎﯼ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺩﺭ ﻣﻮﺿﻮﻋﺎﺕ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ.
•
ﺁﻣﻮﺯﺵ ﻫﻤﺰﻣﺎﻥ .ﺁﻣﻮﺯﺵ ﻫﻤﺰﻣﺎﻥ ﺑﺼﻮﺭﺕ ﺑﻼﺩﺭﻧﮓ ﺑﺎ ﮐﻤﮏ ﻳﮏ ﻣﺮﺑﯽ ﺁﻣﻮﺯﺷﯽ ﮐﻪ ﺑﺼﻮﺭﺕ ﺯﻧﺪﻩ ﻧﺎﻇﺮ ﺗﻤﺎﻡ ﻓﻌﺎﻟﻴﺖ ﻫﺎﯼ ﺁﻣﻮﺯﺷﯽ ﻓﺮﺍﮔﻴﺮﺍﻥ ﺍﺳﺖ ﺍﻧﺠﺎﻡ ﻣﯽ ﮔﻴﺮﺩ.
ﺩﺭ ﺳﻴﺴﺘﻢ ﻓﻮﻕ ،ﻓﺮﺍﮔﻴﺮﺍﻥ ﺑﺎ ﻭﺭﻭﺩ ﺑﻪ ﮐﻼﺱ ﻣﺠﺎﺯﯼ ،ﻗﺎﺩﺭ ﺑﻪ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﻣﺴﺘﻘﻴﻢ ﺑﺎ ﻣﺮﺑﯽ ﻭ ﺳﺎﻳﺮ ﻓﺮﺍﮔﻴﺮﺍﻥ ﻣﻮﺟﻮﺩ ﺩﺭ ﮐﻼﺱ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺁﻣﻮﺯﺵ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﺗﻤﺎﻡ ﻭﻳﮋﮔﯽ ﻫﺎﯼ ﻳﮏ ﮐﻼﺱ ﺩﺭﺱ ﺑﺼﻮﺭﺕ ﻣﺠﺎﺯﯼ ﺷﺒﻴﻪ ﺳﺎﺯﯼ ﻭ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻣﺮﺑﯽ ﻭ ﻓﺮﺍﮔﻴﺮﺍﻥ ﻗﺮﺍﺭ ﻣﯽ ﮔﻴﺮﺩ .ﻣﺜﻼ" ﻣﯽ ﺗﻮﺍﻥ ﺑﺼﻮﺭﺕ ﻣﺠﺎﺯﯼ ﺩﺳﺖ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﯼ ﺳﻮﺍﻝ ﮐﺮﺩﻥ ﺑﺎﻻ ﺑﺮﺩﻩ ﻭ ﻳﺎ ﺣﺘﯽ ﺍﺯ ﻳﮏ ﺗﺨﺘﻪ ﺳﻴﺎﻩ ﻣﺠﺎﺯﯼ
ﺍﺳﺘﻔﺎﺩﻩ ﻭ ﻣﺤﺘﻮﻳﺎﺕ ﻧﻮﺷﺘﻪ ﺷﺪﻩ ﺑﺮ ﺭﻭﯼ ﺁﻥ ﺭﺍ ﻣﺸﺎﻫﺪﻩ ﻧﻤﻮﺩ .ﺟﻠﺴﺎﺕ ﺁﻣﻮﺯﺷﯽ
ﻣﻤﮑﻦ ﺍﺳﺖ ﺻﺮﻓﺎ" ﺩﺭ ﺣﺪ ﻭ ﺍﻧﺪﺍﺯﻩ ﻳﮏ ﺟﻠﺴﻪ ﺑﻮﺩﻩ ﻭ ﻳﺎ ﻫﻔﺘﻪ ﻫﺎ ،ﻣﺎﻩ ﻫﺎ ﻭ ﻳﺎ ﺣﺘﯽ ﺳﺎﻝ ﻫﺎ ،ﺑﻄﻮﻝ ﺍﻧﺠﺎﻣﺪ .ﺍﻳﻦ ﻧﻮﻉ ﺁﻣﻮﺯﺵ ﻫﺎ ﻣﻌﻤﻮﻻ" ﺍﺯ ﻃﺮﻳﻖ ﻭﺏ ﺳﺎﻳﺖ ﻫﺎﯼ
ﺍﻳﻨﺘﺮﻧﺖ ،ﮐﻨﻔﺮﺍﻧﺲ ﻫﺎﯼ ﺻﻮﺗﯽ ﻭ ﻳﺎ ﺗﺼﻮﻳﺮﯼ ،ﺍﻳﻨﺘﺮﻧﺖ ﺗﻠﻔﻨﯽ ﺍﻧﺠﺎﻡ ﻣﯽ ﮔﻴﺮﺩ. ﺭﻭﺍﻧﺸﻨﺎﺳﯽ ﻳﺎﺩﮔﻴﺮﯼ
ﭼﻪ ﻧﻮﻉ ﺗﺤﻮﻻﺕ ﻭ ﻳﺎ ﺍﺗﻔﺎﻗﺎﺗﯽ ﺩﺭ ﻣﻐﺰ ﺍﻧﺴﺎﻥ ﺩﺭ ﺯﻣﺎﻥ ﻓﺮﺍﮔﻴﺮﯼ ،ﺑﻮﺟﻮﺩ ﻣﯽ ﺁﻳﺪ؟ ﺁﻣﻮﺯﺵ
ﺩﺭ ﺍﺑﺘﺪﺍ ﻧﻴﺎﺯﻣﻨﺪ ﻣﺤﺮﮎ ﻫﺎﯼ ﻻﺯﻡ ﺍﺳﺖ .ﺑﻪ ﻣﻨﻈﻮﺭ ﻓﺮﺍﮔﻴﺮﯼ ﻣﻮﺛﺮ ﻭ ﮐﺎﺭﺁ ،ﻣﺤﺮﮎ ﻫﺎﯼ ﻣﻮﺟﻮﺩ ﻣﯽ ﺑﺎﻳﺴﺖ ﻧﮕﻬﺪﺍﺭﯼ ﮔﺮﺩﻧﺪ .ﻣﺘﺎﺳﻔﺎﻧﻪ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﻧﺮﻭﻧﯽ )ﻋﺼﺒﯽ( ﻣﻮﺟﻮﺩ ﺩﺭ ﻣﻐﺰ ﮐﻪ ﻣﺴﺌﻮﻝ ﮐﻨﺘﺮﻝ ﻣﺤﺮﮎ ﻫﺎ ﻭ ﺫﺧﻴﺮﻩ ﺳﺎﺯﯼ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺣﺎﻓﻈﻪ ﻣﯽ ﺑﺎﺷﺪ ،ﺑﺴﺮﻋﺖ ﺩﭼﺎﺭ ﺧﺴﺘﮕﯽ ﻣﯽ ﮔﺮﺩﻧﺪ )ﭘﺲ ﺍﺯ ﮔﺬﺷﺖ ﭼﻨﺪ ﺩﻗﻴﻘﻪ( .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺁﻧﻬﺎ ﻧﻴﺎﺯﻣﻨﺪ ﺑﺎﺯﺳﺎﺯﯼ ﺩﺭ
ﻓﻮﺍﺻﻞ ﺑﻴﻦ ﺳﻪ ﺗﺎ ﭘﻨﺞ ﺩﻗﻴﻘﻪ ﻣﯽ ﺑﺎﺷﻨﺪ ،ﺩﺭ ﻏﻴﺮ ﺍﻳﻨﺼﻮﺭﺕ ﻣﻴﺰﺍﻥ ﭘﺎﺳﺨﮕﻮﺋﯽ ﻭ ﻓﺮﺍﮔﻴﺮﯼ ﺁﻧﻬﺎ ﺩﭼﺎﺭ ﺍﻓﺖ ﻣﯽ ﮔﺮﺩﺩ .ﺁﻧﻬﺎ ﺑﺴﺮﻋﺖ ﺑﺎﺯﺳﺎﺯﯼ ﻣﯽ ﮔﺮﺩﻧﺪ ،ﺳﻴﺴﺘﻢ ﺁﻣﻮﺯﺷﯽ ﻣﯽ ﺑﺎﻳﺴﺖ
ﺑﺴﺮﻋﺖ ﺑﺎ ﺧﺴﺘﮕﯽ ﻭ ﺩﻟﺰﺩﮔﯽ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﺑﺮﺍﯼ ﻓﺮﺍﮔﻴﺮﺍﻥ ﺑﺮﺧﻮﺭﺩ ﻣﻨﺎﺳﺐ ﺭﺍ ﺩﺍﺷﺘﻪ ،ﺗﺎ ﺍﻣﮑﺎﻥ ﻳﺎﺩﮔﻴﺮﯼ ﻣﻮﺛﺮﺗﺮ ﺑﻮﺟﻮﺩ ﺁﻳﺪ.
97
ﻳﺎﺩﮔﻴﺮﯼ ﺑﺮ ﺍﺳﺎﺱ ﺍﻟﮕﻮ ﻫﺎ ،ﻣﻮﺛﺮﺗﺮﻳﻦ ﻣﺪﻝ ﻳﺎﺩﮔﻴﺮﯼ ﻣﺤﺴﻮﺏ ﻣﯽ ﮔﺮﺩﺩ .ﺩﺭ ﺍﻳﻦ ﺭﻭﺵ،
ﺍﻟﮕﻮﻫﺎ ﺍﺯ ﻣﺠﻤﻮﻋﻪ ﺍﯼ ﺑﻪ ﻣﺠﻤﻮﻋﻪ ﺩﻳﮕﺮ ﺟﺎﺑﺠﺎ ﻣﯽ ﮔﺮﺩﻧﺪ .ﺍﻟﮕﻮﻫﺎﺋﯽ ﮐﻪ ﻧﺮﻭﻥ ﻫﺎﯼ ﻣﺮﺑﻮﻁ
ﺑﺨﻮﺩ ﺭﺍ ﻣﺴﺌﻮﻝ ﭘﺎﺳﺨﮕﻮﺋﯽ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ ،ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﻣﺘﻔﺎﻭﺕ ﺩﺭ ﻣﺤﻞ ﻫﺎﯼ ﻣﺘﻔﺎﻭﺕ ﻣﻐﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﻣﺜﻼ" •
ﮔﻮﺵ ﺩﺍﺩﻥ ﺑﻪ ﻳﮏ ﺣﻘﻴﻘﺖ .ﺯﻣﺎﻧﻴﮏ ﺁﺭﺩ ﺑﺎ ﺗﺨﻢ ﻣﺮﻍ ﺗﺮﮐﻴﺐ ﻣﯽ ﮔﺮﺩﺩ ،ﺧﻤﻴﺮﯼ ﺑﻮﺟﻮﺩ ﻣﯽ ﺁﻳﺪ ﮐﻪ ﻣﯽ ﺗﻮﺍﻥ ﺁﻥ ﺭﺍ ﺑﻪ ﻗﻄﻌﺎﺗﯽ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﻣﺎﮐﺎﺭﻭﻧﯽ ﺑﺮﺵ ﺩﺍﺩ.
•
ﺍﺭﺗﺒﺎﻁ ﻳﮏ ﻣﻔﻬﻮﻡ ﺑﺎ ﻳﮏ ﺣﻘﻴﻘﺖ .ﻏﺬﺍ ﮐﻪ ﺩﺍﺭﺍﯼ ﮐﺮﺑﻮﻫﻴﺪﺭﺍﺕ ﺑﺎﻻﺋﻲ ﺍﺳﺖ ،ﺑﺮﺍﯼ ﺗﻮﻟﻴﺪ ﺍﻧﺮﮊﯼ ﺑﺪﻥ ﻻﺯﻡ ﺍﺳﺖ.
•
ﺗﺠﺴﻢ ﺩﻭ ﭼﻴﺰ ﺑﺎﻳﮑﺪﻳﮕﺮ .ﺗﻴﻢ ﻫﺎﯼ ﻭﺭﺯﺷﯽ ﺑﻪ ﺍﻧﺮﮊﯼ ﺳﺮﻳﻊ ﻧﻴﺎﺯ ﺩﺍﺷﺘﻪ ﻭ ﺁﻥ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﮐﺮﺑﻮﻫﻴﺪﺭﺍﺕ ﺗﺎﻣﻴﻦ ﻣﯽ ﻧﻤﺎﻳﻨﺪ ،ﺑﻨﺎﺑﺮﺍﻳﻨﻦ ﻗﺒﻞ ﺍﺯ ﺑﺎﺯﯼ ﻳﮏ ﻭﻋﺪﻩ ﻏﺬﺍ ﻣﻨﺎﺳﺐ
ﺧﻮﺍﻫﻨﺪ ﺩﺍﺷﺖ.
ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﻓﻮﻕ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻣﺮﺗﺒﻂ ﺑﻮﺩﻩ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﻫﻤﮑﺎﺭﯼ ﺑﺎﻳﮑﺪﻳﮕﺮ ﺣﺎﻓﻈﻪ ﺭﺍ ﺷﮑﻞ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ ) ﻳﺎﺩﮔﻴﺮﯼ ( ﻫﺪﻑ ﺷﮑﻞ ﺩﻫﯽ ﺣﺎﻓﻈﻪ ،ﺩﺭ ﻫﺮﻳﮏ ﺍﺯ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﻧﺮﻭﻧﯽ ﻣﺮﺑﻮﻃﻪ ﺍﺳﺖ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺍﻃﻼﻋﺎﺗﯽ ﮐﻪ ﺑﮕﻮﻧﻪ ﺍﯼ ﻃﺮﺍﺣﯽ ﻣﯽ ﮔﺮﺩﻧﺪ ﺗﺎ ﺍﺯ ﻳﮏ ﺳﻴﺴﺘﻢ ﻧﺮﻭﻧﯽ ﺑﻪ ﺳﻴﺴﺘﻢ ﻧﺮﻭﻧﯽ ﺩﻳﮕﺮ ﺣﺮﮐﺖ ﻧﻤﺎﻳﻨﺪ ،ﺩﺍﺭﺍﯼ ﮐﺎﺭﺁﺋﯽ ﺑﻴﺸﺘﺮﯼ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻳﺎﺩﮔﻴﺮﯼ
ﻣﯽ ﺑﺎﺷﻨﺪ. ﻳﺎﺩﮔﻴﺮﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﻪ ﭼﻪ ﺻﻮﺭﺕ ﻧﮕﻬﺪﺍﺷﺖ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﻬﺒﻮﺩ ﻣﯽ ﺑﺨﺸﺪ ؟
ﺁﻣﻮﺯﺵ ﻋﻼﻭﻩ ﺑﺮ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﻧﺮﻭﻧﯽ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ،ﻣﺴﺘﻠﺰﻡ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻋﻨﺎﺻﺮ ﺩﻳﮕﺮ
ﻧﻈﻴﺮ :ﺍﺭﺗﺒﺎﻁ ﻣﺘﻘﺎﺑﻞ ،ﺗﺨﻴﻞ ﻭ ﻓﻴﺪﺑﮏ ﺍﺳﺖ .ﻳﺎﺩﮔﻴﺮﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻋﻨﺎﺻﺮ
ﻣﺘﻔﺎﻭﺕ ،ﮐﻪ ﺑﺎﻋﺚ ﺍﻳﺠﺎﺩ ﻋﻨﺎﺻﺮ ﺟﺪﻳﺪ ﺁﻣﻮﺯﺷﯽ ﻣﯽ ﮔﺮﺩﺩ ،ﻓﺮﺁﻳﻨﺪ ﻓﺮﺍﮔﻴﺮﯼ ﺭﺍ ﺣﺬﺍﺏ ﺗﺮ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺍﻳﺠﺎﺩ ﺟﺬﺍﺑﻴﺖ ﺩﺭ ﻳﺎﺩﮔﻴﺮﯼ ﻳﮑﯽ ﺍﺯ ﺩﻻﻳﻞ ﻣﻮﻓﻘﻴﺖ ﺁﻣﻮﺯﺵ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ
ﺍﺳﺖ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺍﺯ ﻋﻨﺎﺻﺮ ﺟﺪﻳﺪ ﺩﺭ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﺁﻣﻮﺯﺵ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺳﺘﻔﺎﺩﻩ ﻧﮕﺮﺩﺩ،
ﻋﻤﻼ" ﺟﺬﺍﺑﻴﺖ ﻫﺎﯼ ﻻﺯﻡ ﺑﺮﺍﯼ ﺁﻣﻮﺯﺵ ﺭﺍ ﺍﺯ ﺩﺳﺖ ﺩﺍﺩﻩ ﺍﻳﻢ .ﺑﺮﺍﯼ ﻣﻮﻓﻘﻴﺖ ﺩﺭ ﺁﻣﻮﺯﺵ
ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻧﮑﺎﺕ ﺯﻳﺮ ﻣﯽ ﺑﺎﻳﺴﺖ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﻗﺮﺍﺭ ﮔﻴﺮﺩ. 98
•
ﺑﺮﺭﺳﯽ ﻧﻮﻉ ﻣﺤﺘﻮﻳﺎﺕ .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﺼﺎﻭﻳﺮ ،ﺻﺪﺍ ﻭ ﻣﺘﻦ ﻭ ﺗﺮﮐﻴﺐ ﻣﻨﺎﺳﺐ ﺁﻧﻬﺎ ﺑﺎ
•
ﺍﺭﺗﺒﺎﻁ ﻣﺘﻔﺎﺑﻞ ﺑﺎ ﻓﺮﺍﮔﻴﺮﺍﻥ ﺑﮕﻮﻧﻪ ﺍﯼ ﮐﻪ ﺍﻳﺠﺎﺩ ﻣﺤﺮﮎ ﻫﺎﯼ ﻻﺯﻡ ﺭﺍ ﺗﻀﻤﻴﻦ ﻧﻤﺎﻳﺪ.
ﻳﮑﺪﻳﮕﺮ ﭘﻴﺎﻣﺪﻫﺎﯼ ﻣﺜﺒﺘﯽ ﺭﺍ ﺑﺪﻧﺒﺎﻝ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ.
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺎﺯﻳﻬﺎ ،ﺍﻣﺘﺤﺎﻧﺎﺕ ﮐﻮﺗﺎﻩ ﻣﺪﺕ ﺑﺮﺍﯼ ﺍﺧﺬ ﻓﻴﺪﺑﮏ ﺳﺮﻳﻊ ﺍﺯ ﻓﺮﺍﮔﻴﺮﺍﻥ ﻣﻨﺎﺳﺐ ﺗﺮﻳﻦ ﺭﻭﺵ ﺑﺮﺍﯼ ﺳﻨﺠﺶ ﻣﻴﺰﺍﻥ ﻣﻮﻓﻘﻴﺖ ﺩﺭ ﺁﻣﻮﺯﺵ ﺍﺳﺖ.
•
ﺍﻳﺠﺎﺩ ﻓﻴﺪﺑﮏ ﻫﺎﯼ ﺳﺮﻳﻊ .ﺩﻭﺭﻩ ﻫﺎﯼ ﺁﻣﻮﺯﺵ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻣﯽ ﺑﺎﻳﺴﺖ ﺍﺯ ﺭﻭﺵ ﻫﺎﺋﯽ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺧﺬ ﻓﻴﺪ ﺑﮏ ﺳﺮﻳﻊ ﺍﺳﺘﻔﺎﺩﻩ ﺗﺎ ﺩﺭ ﺻﻮﺭﺕ ﺍﺷﮑﺎﻝ ﻭ ﻳﺎ ﻋﺪﻡ ﻣﻮﻓﻘﻴﺖ، ﺳﺮﻳﻌﺎ" ﻧﺴﺒﺖ ﺑﻪ ﺑﺮﻃﺮﻑ ﻧﻤﻮﺩﻥ ﺁﻥ ﺍﻗﺪﺍﻡ ﻧﻤﺎﻳﻨﺪ .ﻓﻴﺪﺑﮏ ﻫﺎﯼ ﻣﺮﺑﻮﻃﻪ ﻣﯽ ﺑﺎﻳﺴﺖ ﺩﺭ ﺳﺮﻳﻌﺘﺮﻳﻦ ﺯﻣﺎﻥ ﻣﻤﮑﻦ ﺍﺧﺬ ﮔﺮﺩﻧﺪ .ﺁﻣﻮﺯﺵ ﺩﺭ ﻫﺮ ﻣﺮﺣﻠﻪ ﺑﺮ ﺍﺳﺎﺱ ﺁﻣﻮﺯﺵ ﺩﺭ ﻣﺮﺣﻠﻪ ﻗﺒﻞ ﺍﻳﺠﺎﺩ ﻣﯽ ﮔﺮﺩﺩ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺗﺸﺨﻴﺺ ﻭ ﺍﺧﺬ ﻓﻴﺪﺑﮏ ﻫﺎﯼ ﺳﺮﻳﻊ ،ﻣﺮﺍﺣﻞ
ﻣﺘﻔﺎﻭﺕ ﺁﻣﻮﺯﺷﯽ ﺭﺍ ﺑﺪﺭﺳﺘﯽ ﺗﺒﻴﻦ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺩﺭ ﻳﮏ ﻣﺮﺣﻠﻪ
ﻣﻮﻓﻘﻴﺘﯽ ﺣﺎﺻﻞ ﻧﺸﺪﻩ ﺑﺎﺷﺪ ،ﻣﺮﺣﻠﻪ ﺑﻌﺪ ﮐﻪ ﺑﺮ ﺍﺳﺎﺱ ﻣﺮﺣﻠﻪ ﻗﺒﻞ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ، ﺩﺭ ﺍﻣﺮ ﺁﻣﻮﺯﺵ ﺗﻮﻓﻴﻖ ﭼﻨﺪﺍﻧﯽ ﺍﻳﺠﺎﺩ ﻧﺨﻮﺍﻫﺪ ﮐﺮﺩ.
•
ﺍﺭﺗﺒﺎﻃﺎﺕ ﺻﻤﻴﻤﯽ ﺑﺎ ﺳﺎﻳﺮ ﻓﺮﺍﮔﻴﺮﺍﻥ ﻭ ﻣﺮﺑﻴﺎﻥ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺗﺎﻕ ﻫﺎﯼ ﮔﻔﺘﮕﻮ ،ﺗﺎﻻﺭﻫﺎﯼ ﻣﺒﺎﺣﺜﻪ ،ﭘﻴﺎﻡ ﻫﺎﯼ ﻓﻮﺭﯼ ﻭ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺩﺭ ﺍﻳﺠﺎﺩ ﺍﺭﺗﺒﺎﻁ ﻣﺘﻘﺎﺑﻞ ﺑﺎ ﻓﺮﺍﮔﻴﺮﺍﻥ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﺴﻴﺎﺭ ﻣﻮﺛﺮ ﻭ ﮐﺎﺭﺳﺎﺯ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺍﻳﺠﺎﺩ ﮐﻤﻴﺘﻪ ﻫﺎﯼ Onlineﺑﻄﺮﺯ ﭼﺸﻤﮕﻴﺮﯼ ﺩﺭ ﻋﻤﻠﮑﺮﺩ ﺑﺮﻧﺎﻣﻪ ﻫﺎﯼ ﺁﻣﻮﺯﺷﯽ ﺗﺎﺛﻴﺮ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ.
ﺁﻣﻮﺯﺵ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﻪ ﻓﺮﺍﮔﻴﺮﺍﻥ ﺍﻳﻦ ﺍﻣﮑﺎﻥ ﺭﺍ ﺧﻮﺍﻫﺪ ﺩﺍﺩ ﺗﺎ ﻫﺮ ﻓﺮﺩ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺴﺎﻳﻞ ﻭ ﺗﻮﺍﻧﺎﺋﯽ ﺧﻮﺩ ،ﺁﻫﻨﮓ ﻳﺎﺩﮔﻴﺮﯼ ﺭﺍ ﺧﻮﺩ ﻣﺸﺨﺺ ﻧﻤﺎﻳﺪ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﯼ ،ﻓﺮﺍﮔﻴﺮﺍﻥ ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺑﻪ ﺩﻻﻳﻠﯽ ،ﭼﻨﺪ ﺭﻭﺯﯼ ﺍﺯ ﺳﻴﺴﺘﻢ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻨﻤﺎﻳﻨﺪ ﻭ ﺍﺯ ﺁﻣﻮﺯﺵ ﺩﻭﺭ ﺑﺎﺷﻨﺪ،
ﭘﺲ ﺍﺯ ﺑﺮﻃﺮﻑ ﺷﺪﻥ ﻣﺸﮑﻼﺕ ،ﻣﺠﺪﺩﺍ" ﻗﺎﺩﺭ ﺑﻪ ﺍﺩﺍﻣﻪ ﺁﻣﻮﺯﺵ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺩﻭﺭﻩ ﻫﺎﯼ ﺁﻣﻮﺯﺷﯽ ﻣﺒﺘﻨﯽ ﺑﺮ ﺁﻣﻮﺯﺵ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺩﺍﺭﺍﯼ ﻋﻨﺎﺻﺮ ﻗﺎﺑﻞ ﮐﻨﺘﺮﻟﯽ ﺑﻮﺩﻩ ﮐﻪ ﺗﻮﺳﻂ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﻧﺪ .ﻋﻨﺎﺻﺮ ﮐﻨﺘﺮﻟﯽ ﻓﻮﻕ ﺩﺭ ﮐﻼﺱ ﻫﺎ ﯼ ﺁﻣﻮﺯﺵ ﻣﻌﻤﻮﻟﯽ ﺍﺳﺘﻔﺎﺩﻩ ﻧﺸﺪﻩ ﻭ
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﺎﻥ ﺩﺭ ﺁﻣﻮﺯﺵ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﻓﺮﺍﮔﻴﺮﺍﻥ ﻗﺎﺩﺭ ﺑﻪ ﮐﻨﺘﺮﻝ ﻓﺮﺁﻳﻨﺪ ﺁﻣﻮﺯﺵ، 99
ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﻗﺎﺑﻠﻴﺖ ﺗﻨﻈﻴﻢ ﺁﻫﻨﮓ ﺁﻣﻮﺯﺵ ﺗﻮﺳﻂ ﻓﺮﺍﮔﻴﺮﺍﻥ ﻳﮑﯽ ﺍﺯ ﺩﻻﻳﻞ ﻣﻬﻢ ﺩﺭ ﺭﺍﺑﻄﻪ
ﺑﺎ ﻣﻮﺛﺮ ﺑﻮﺩﻥ ﺁﻣﻮﺯﺵ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺳﺖ.
100
ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺷﻬﺮﻭﻧﺪﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﺭﻭﺯﺍﻧﻪ ﻣﻴﻠﻴﻮﻥ ﻫﺎ ﻧﺎﻣﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺭﺍ ﺑﺮﺍﯼ ﻳﮑﺪﻳﮕﺮ ﺍﺭﺳﺎﻝ ﻣﯽ ﻧﻤﺎﻳﻨﺪ. ﻣﺒﺎﺩﻟﻪ ﻧﺎﻣﻪ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻳﮑﯽ ﺍﺯ ﺍﻭﻟﻴﻦ ﺳﺮﻭﻳﺲ ﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺤﺴﻮﺏ ﺷﺪﻩ ﻭ ﺍﻣﺮﻭﺯﻩ ﺍﺯ ﺁﻥ ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﮏ ﺍﺑﺰﺍﺭ ﺍﺭﺗﺒﺎﻃﯽ ﻗﺪﺭﺗﻤﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ .ﺩﺭ ﺯﻣﺎﻥ ﺍﺭﺳﺎﻝ ﻳﮏ ﻧﺎﻣﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﻓﺮﺁﻳﻨﺪ ﮔﺴﺘﺮﺩﻩ ﻭ ﻣﺴﻴﺮﯼ ﻃﻮﻻﻧﯽ ﻃﯽ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﻳﮏ ﭘﻴﺎﻡ E-Mail
ﺍﻭﻟﻴﻦ ﭘﻴﺎﻡ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺗﻮﺳﻂ ﻧﺎﻣﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺩﺭ ﺳﺎﻝ ١٩٧١ﺗﻮﺳﻂ ﻣﻬﻨﺪﺳﯽ ﺑﺎ ﻧﺎﻡ " Ray "Tomlinsonﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺍﺳﺖ .ﻗﺒﻞ ﺍﺯ ﺗﺤﻘﻖ ﺭﻭﻳﺪﺍﺩ ﻓﻮﻕ ،ﺻﺮﻓﺎ" ﺍﻣﮑﺎﻥ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ
ﺑﺮﺍﯼ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﯼ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻴﺴﺮ ﺑﻮﺩ .ﭘﻴﺎﻡ ﺍﺭﺳﺎﻟﯽ ﺗﻮﺳﻂ Tomlinson
ﻗﺎﺑﻠﻴﺖ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﺑﻪ ﺳﺎﻳﺮ ﻣﺎﺷﻴﻦ ﻫﺎﯼ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﯼ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻋﻼﻣﺖ "@" ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﻣﺎﺷﻴﻦ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﺑﻮﺩ ، E-Mail .ﻳﮏ ﭘﻴﺎﻡ ﻣﺘﻨﯽ ﺳﺎﺩﻩ ﺍﺳﺖ ﮐﻪ ﺑﺮﺍﯼ ﮔﻴﺮﻧﺪﻩ ﭘﻴﺎﻡ ﺍﺭﺳﺎﻝ ﻣﯽ ﮔﺮﺩﺩ .ﻧﺎﻣﻪ ﻫﺎﯼ ﺍﻟﮑﻨﺘﺮﻭﻧﻴﮑﯽ ﺩﺭ ﺍﺑﺘﺪﺍ ﻭ ﻫﻢ ﺍﻳﻨﮏ
ﺍﻏﻠﺐ ﺑﺼﻮﺭﺕ ﻣﺘﻦ ﻫﺎﯼ ﮐﻮﺗﺎﻩ ﻣﯽ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺑﺮﺧﯽ ﻣﻮﺍﺭﺩ ﻣﻤﮑﻦ ﺍﺳﺖ ،ﻓﺮﺳﺘﻨﺪﮔﺎﻥ ﻧﺎﻣﻪ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﺎ ﺍﻓﺰﻭﺩﻥ "ﺿﻤﺎﺋﻢ " ،ﺣﺠﻢ ﻳﮏ ﻧﺎﻣﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﺩﻫﻨﺪ. ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ E-mail
ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺸﺎﻫﺪﻩ ﻧﺎﻣﻪ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺩﺭﻳﺎﻓﺖ ﺷﺪﻩ ،ﻣﯽ ﺑﺎﻳﺴﺖ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎﯼ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻧﺎﻣﻪ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ .ﺑﺮﺧﯽ ﺍﺯ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻣﻌﺮﻭﻑ
outlookﻭ ﻳﺎ outlook expressﺷﺮﮐﺖ ﻣﺎﻳﮑﺮﻭﺳﺎﻓﺖ Eudora ،ﻭ ﻳﺎ Pegasusﺑﻤﻨﻄﻮﺭ ﻣﺸﺎﻫﺪﻩ ﻧﺎﻣﻪ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﺍﻓﺮﺍﺩﻳﮑﻪ ﺍﺯ ﺧﺪﻣﺎﺕ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺭﺍﻳﮕﺎﻥ ﻧﻈﻴﺮ Hotmailﻭ ﻳﺎ Yahooﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﻨﺪ ،ﺍﺯ
ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﮐﻪ ﺑﺼﻮﺭﺕ ﻳﮏ ﺻﻔﺤﻪ ﻭﺏ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻣﯽ ﺷﻮﺩ ،ﺍﺳﺘﻔﺎﺩﻩ
101
ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﺑﺮﻧﺎﻣﻪ ﻫﺎﯼ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺻﺮﻓﻨﻈﺮ ﺍﺯ ﻧﻮﻉ ﺧﻮﺩ ،ﺩﺍﺭﺍﯼ ﻭﻇﺎﻳﻒ ﺯﻳﺮ
ﻣﯽ ﺑﺎﺷﻨﺪ: •
ﻧﻤﺎﻳﺶ ﻟﻴﺴﺖ ﺗﻤﺎﻡ ﭘﻴﺎﻡ ﻫﺎﯼ ﻣﻮﺟﻮﺩ ﺩﺭ ﺻﻨﺪﻭﻕ ﭘﺴﺘﯽ ﺍﺯ ﻃﺮﻳﻖ " ﻋﻨﺎﻭﻳﻦ ﭘﻴﺎﻡ ﻫﺎ " . ﻋﻨﻮﺍﻥ ﻳﮏ ﭘﻴﺎﻡ ﻣﺸﺨﺺ ﮐﻨﻨﺪﻩ ﻓﺮﺳﺘﻨﺪﻩ ،ﻣﻮﺿﻮﻉ ،ﺗﺎﺭﻳﺦ ﻭ ﺯﻣﺎﻥ ﻭ ﺍﻧﺪﺍﺯﻩ ﭘﻴﺎﻡ ﺍﺳﺖ.
•
ﺍﻣﮑﺎﻥ ﺍﻧﺘﺨﺎﺏ ﻳﮏ ﭘﻴﺎﻡ ﺍﺯ ﻃﺮﻳﻖ ﻋﻨﻮﺍﻥ ﺁﻥ ﻓﺮﺍﻫﻢ ﺷﺪﻩ ﻭﻣﻄﺎﻟﻌﻪ ﻣﺤﺘﻮﻳﺎﺕ ﭘﻴﺎﻡ
•
ﺍﻣﮑﺎﻥ ﺍﻳﺠﺎﺩ ﭘﻴﺎﻡ ﻫﺎﯼ ﺟﺪﻳﺪ ﻭ ﺍﺭﺳﺎﻝ ﺁﻧﻬﺎ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﻳﮏ ﭘﻴﺎﻡ ﻣﯽ ﺑﺎﻳﺴﺖ ﺁﺩﺭﺱ ﮔﻴﺮﻧﺪﻩ ،ﻣﻮﺿﻮﻉ ﭘﻴﺎﻡ ﺭﺍ ﻣﺸﺨﺺ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﻣﺤﺘﻮﻳﺎﺕ ﭘﻴﺎﻡ ﺭﺍ ﺗﺎﻳﭗ ﮐﺮﺩ.
•
ﺍﮐﺜﺮ ﺑﺮﻧﺎﻣﻪ ﻫﺎﯼ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﭘﻴﺎﻡ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﻣﮑﺎﻥ ﺍﺿﺎﻓﻪ ﮐﺮﺩﻥ ﺿﻤﺎﺋﻢ ﺑﻪ ﻳﮏ ﭘﻴﺎﻡ ﺭﺍ ﻧﻴﺰ ﻓﺮﺍﻫﻢ ﻣﯽ ﺁﻭﺭﻧﺪ .ﺑﺮﻧﺎﻣﻪ ﻫﺎﯼ ﻓﻮﻕ ﻫﻤﭽﻨﻴﻦ ﺍﻣﮑﺎﻥ ﺫﺧﻴﺮﻩ ﮐﺮﺩﻥ
ﺿﻤﺎﺋﻢ ﻣﻮﺟﻮﺩ ﺩﺭ ﭘﻴﺎﻡ ﻫﺎﯼ ﺩﺭﻳﺎﻓﺖ ﺷﺪﻩ ﺭﺍ ﻧﻴﺰ ﺩﺍﺭﺍ ﻣﯽ ﺑﺎﺷﻨﺪ. ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺳﺎﺩﻩ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ
ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﻳﮏ ﻧﺎﻣﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻣﻮﺟﻮﺩ ﻣﯽ ﺑﺎﻳﺴﺖ ﺑﻪ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻣﺮﺗﺒﻂ ﮔﺮﺩﺩ .ﺑﺮﺧﯽ ﺍﺯ ﻣﺎﺷﻴﻦ ﻫﺎﯼ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﯼ
ﺍﻳﻨﺘﺮﻧﺖ ﺑﺎ ﻧﺼﺐ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﯼ ﻻﺯﻡ ﺑﻌﻨﻮﺍﻥ " ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ " ﺩﺭ ﺷﺒﮑﻪ ﺍﻳﻔﺎﯼ ﻭﻇﻴﻔﻪ ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ، telnetﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ Ftpﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﻧﻤﻮﻧﻪ ﻫﺎﺋﯽ ﺍﺯ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ
ﻣﯽ ﺑﺎﺷﻨﺪ .ﻣﻴﻠﻴﻮﻥ ﻫﺎ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺑﺮ ﺭﻭﯼ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﻭ ﺳﺮﻭﻳﺲ ﻫﺎﯼ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ﻓﻌﺎﻟﻴﺖ ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﺑﺮﻧﺎﻣﻪ ﻫﺎﯼ ﻧﺼﺐ ﺷﺪﻩ ﺑﺮ ﺭﻭﯼ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﺑﺼﻮﺭﺕ ﺷﺒﺎﻧﻪ ﺭﻭﺯﯼ ﺩﺭ ﺣﺎﻟﺖ ﺍﺟﺮﺍﺀ ﺑﻮﺩﻩ ﻭ ﺑﻪ ﭘﻮﺭﺕ ﻫﺎﯼ ﺧﺎﺻﯽ ﮔﻮﺵ ﻓﺮﺍ ﻣﯽ ﺩﻫﻨﺪ .ﺍﻳﻦ ﻧﻮﻉ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﺩﺭ ﺍﻧﺘﻈﺎﺭ ﺍﺭﺗﺒﺎﻁ ﺳﺎﻳﺮ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ) ﺳﺮﻭﻳﺲ
ﮔﻴﺮﻧﺪﮔﺎﻥ( ﺍﺯ ﻃﺮﻳﻖ ﭘﻮﺭﺕ ﻣﺮﺑﻮﻃﻪ ﻣﯽ ﺑﺎﺷﻨﺪ .ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺩﺭ ﺳﺎﺩﻩ ﺗﺮﻳﻦ ) ﺣﺎﻟﺖ ﺁﻣﻮﺯﺷﯽ ( ﺣﺎﻟﺖ ﺑﺼﻮﺭﺕ ﺯﻳﺮ ﻋﻤﻞ ﻣﯽ ﻧﻤﺎﻳﺪ: 102
•
ﻫﺮ ﺷﺨﺺ ﺑﺮ ﺭﻭﯼ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺩﺍﺭﺍﯼ ﻳﮏ Accountﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﻭ
•
ﺑﺮﺍﯼ ﻫﺮ ﻳﮏ ﺍﺯ ﺍﻓﺮﺍﺩﻳﮑﻪ ﺩﺍﺭﺍﯼ Accountﻣﯽ ﺑﺎﺷﻨﺪ ،ﻳﮏ ﻓﺎﻳﻞ ﺳﺎﺩﻩ ﻣﺘﻨﯽ ﺩﺭ
ﺩﺭﻳﺎﻓﺖ ﻧﺎﻣﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺳﺖ.
ﻓﻮﻟﺪﺭ ﻣﻮﺭﺩ ﻧﻈﺮ ﺫﺧﻴﺮﻩ ﻣﯽ ﮔﺮﺩﺩ.
•
ﺍﻓﺮﺍﺩﻳﮑﻪ ﺗﻤﺎﻳﻞ ﺑﻪ ﺍﺭﺳﺎﻝ ﻧﺎﻣﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﺮﺍﯼ ﺷﺨﺺ ﺑﺨﺼﻮﺻﯽ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ، ﻣﯽ ﺑﺎﻳﺴﺖ ﻳﮏ ﭘﻴﺎﻡ ﻣﺘﻨﯽ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﻨﺪ. ﭘﺲ ﺍﺯ ﺁﻣﺎﺩﻩ ﻧﻤﻮﻥ ﭘﻴﺎﻡ ،ﺑﺎ ﻓﺸﺮﺩﻥ ﺩﮐﻤﻪ "ﺍﺭﺳﺎﻝ" ،ﭘﻴﺎﻡ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺮﺍﯼ ﮔﻴﺮﻧﺪﻩ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺑﺎ ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ
ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻭ ﭘﻴﺎﻡ ﺣﺎﻭﯼ ﺁﺩﺭﺱ ﻓﺮﺳﺘﻨﺪﻩ ،ﮔﻴﺮﻧﺪﻩ ﻭ ﻣﺤﺘﻮﻳﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺑﺮﺍﯼ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺭﺳﺎﻝ ﻣﯽ ﻧﻤﺎﻳﺪ.
•
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻣﻤﮑﻦ ﺍﺳﺖ ﺍﻃﻼﻋﺎﺕ ﺩﺭﻳﺎﻓﺖ ﺷﺪﻩ ﺭﺍ ﺑﺎ ﻳﮏ ﻓﺮﻣﺖ ﻣﻨﺎﺳﺐ ﺑﻪ ﺍﻧﺘﻬﺎﯼ ﻓﺎﻳﻞ ﻣﺘﻨﯽ ﮐﻪ ﺑﺮﺍﯼ ﻫﺮ ﻓﺮﺩ ﺑﺎ ﻧﺎﻡ Accountﻭﯼ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ،ﺍﺿﺎﻓﻪ ﻣﯽ ﻧﻤﺎﻳﺪ.
•
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻣﻤﮑﻦ ﺍﺳﺖ ﺍﻃﻼﻋﺎﺕ ﺩﻳﮕﺮ ﻧﻈﻴﺮ :ﺯﻣﺎﻥ ﻭ ﺗﺎﺭﻳﺦ ﺩﺭﻳﺎﻓﺖ ﭘﻴﺎﻡ ﺭﺍ ﻧﻴﺰ
ﺫﺧﻴﺮﻩ ﻧﻤﺎﻳﺪ .ﺩﺭ ﺻﻮﺭﺕ ﺍﺭﺳﺎﻝ ﻧﺎﻣﻪ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺩﻳﮕﺮ ﺑﺮﺍﯼ ﻳﮏ ﮔﻴﺮﻧﺪﻩ
ﺧﺎﺹ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﭘﻴﺎﻡ ﻫﺎﯼ ﺩﺭﻳﺎﻓﺖ ﺷﺪﻩ ﺭﺍ ﺑﻪ ﺍﻧﺘﻬﺎﯼ ﻓﺎﻳﻞ ﻣﺘﻨﯽ )ﺣﺎﻭﯼ ﭘﻴﺎﻡ ﻫﺎﯼ ﻣﺮﺑﻮﻃﻪ( ﺍﺿﺎﻓﻪ ﻣﯽ ﻧﻤﺎﻳﺪ .ﮔﻴﺮﻧﺪﻩ ﭘﻴﺎﻡ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺧﻮﺩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺭﻳﺎﻓﺖ ﻭ ﻣﺸﺎﻫﺪﻩ ﻧﺎﻣﻪ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﺪ":
•
ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺍﺯ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻣﯽ ﺧﻮﺍﻫﺪ ﮐﻪ ﻳﮏ ﻧﺴﺨﻪ ﺍﺯ ﻓﺎﻳﻞ ﻣﺘﻨﯽ ﻣﺮﺑﻮﻁ ﺑﻪ ﺷﺨﺺ ﮔﻴﺮﻧﺪﻩ ﺭﺍ ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﺪ.
•
ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺍﺯ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻣﯽ ﺧﻮﺍﻫﺪ ﮐﻪ ﻣﺤﺘﻮﻳﺎﺕ ﻓﺎﻳﻞ ﻣﺘﻨﯽ ﺭﺍ ﺣﺬﻑ ﻧﻤﺎﻳﺪ.
•
ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻗﺎﺩﺭ ﺑﻪ ﺫﺧﻴﺮﻩ ﺳﺎﺯﯼ ﻓﺎﻳﻞ ﻣﺘﻨﯽ ﺣﺎﻭﯼ ﭘﻴﺎﻡ ﻫﺎ ﺑﺮ ﺭﻭﯼ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺧﻮﺩ ﺍﺳﺖ.
103
• •
ﺩﺭ ﻓﺎﻳﻞ ﻣﺘﻨﯽ ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺑﺪﻧﺒﺎﻝ ﺧﻄﻮﻃﯽ ﺑﺎﺷﺪ ﮐﻪ ﺑﺎ ﻋﻨﻮﺍﻥ "ﺍﺯ" ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ.
ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻗﺎﺩﺭ ﺑﻪ ﻧﻤﺎﻳﺶ ﻟﻴﺴﺖ ﺗﻤﺎﻡ ﭘﻴﺎﻡ ﻫﺎ ﺑﺮ ﺍﺳﺎﺱ ﻋﻨﺎﻭﻳﻦ ﻣﺮﺑﻮﻃﻪ ﺍﺳﺖ.
ﻣﺜﺎﻝ ﻓﻮﻕ ﺻﺮﻓﺎ" ﻳﮏ ﺳﻴﺴﺘﻢ ﺑﺴﻴﺎﺭ ﺳﺎﺩﻩ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺭﺍ ﻧﺸﺎﻥ
ﻣﯽ ﺩﺍﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺑﺮﺭﺳﯽ ﻳﮏ ﺳﻴﺴﺘﻢ ﻭﺍﻗﻌﯽ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ. ﺳﻴﺴﺘﻢ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻭﺍﻗﻌﯽ
ﺳﻴﺴﺘﻢ ﻭﺍﻗﻌﯽ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺩﺍﺭﺍﯼ ﺩﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻣﺘﻔﺎﻭﺕ ﺑﻮﺩﻩ ﮐﻪ ﺑﺮ ﺭﻭﯼ ﻳﮏ
ﻣﺎﺷﻴﻦ ﺍﺟﺮﺍﺀ ﻣﯽ ﮔﺮﺩﻧﺪ. ﻳﮑﯽ ﺍﺯ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ Simple Mail Transfer(SMTP
(Protocolﺑﻮﺩﻩ ﻭ ﻣﺴﺘﻮﻟﻴﺖ ﭘﻴﺎﻡ ﻫﺎﯼ ﺍﺭﺳﺎﻟﯽ ) ﺧﺮﻭﺝ ( ﻧﺎﻣﻪ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ .ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺩﻭﻡ ( Post office Protocol (POP3 ،ﻧﺎﻣﻴﺪﻩ ﺷﺪﻩ ﻭ
ﻣﺴﺪﻭﻟﻴﺖ ﭘﻴﺎﻡ ﻫﺎﯼ ﺩﺭﻳﺎﻓﺘﯽ ) ﻭﺭﻭﺩ ( ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ .ﺷﮑﻞ ﺯﻳﺮ ﺟﺎﻳﮕﺎﻩ ﻫﺮ ﻳﮏ ﺍﺯ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﺭﺍ ﻧﺸﺎﻥ ﻣﯽ ﺩﻫﺪ.
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ SMTPﺑﻪ ﭘﻮﺭﺕ ٢٥ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ POP3ﺑﻪ ﭘﻮﺭﺕ ١١٠ﮔﻮﺵ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ.
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ SMTP ﺯﻣﺎﻧﻴﮑﻪ ﺍﺯ ﻃﺮﻳﻖ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺧﻮﺩ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﻧﺎﻣﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻣﯽ ﻧﻤﺎﺋﻴﺪ ،ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺑﺎ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ SMTPﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﻧﺎﻣﻪ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﺍﺭﺗﺒﺎﻁ
ﺑﺮﻗﺮﺍﺭ ﻣﯽ ﻧﻤﺎﻳﺪ .ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ SMTPﻣﻮﺟﻮﺩ ،ﻣﻤﮑﻦ ﺍﺳﺖ ﺑﺎ ﺳﺎﻳﺮ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ
104
SMTPﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ) ﺗﻮﺯﻳﻊ ( ﻧﺎﻣﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻧﻤﺎﻳﺪ .ﺷﮑﻞ ﺯﻳﺮ ﻧﺤﻮﻩ
ﻋﻤﻠﮑﺮﺩ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻓﻮﻕ ﺭﺍ ﻧﺸﺎﻥ ﻣﯽ ﺩﻫﺪ.
ﮐﺎﺭﺑﺮﺍﻥ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﻧﺎﻣﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺗﻮﺳﻂ ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ،ﻣﯽ ﺑﺎﻳﺴﺖ
ﺗﻨﻈﻴﻤﺎﺕ ﻻﺯﻡ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ .ﻓﺮﺽ ﮐﻨﻴﺪ ﺁﺩﺭﺱ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺷﻤﺎ [email protected] ﺑﺎﺷﺪ ،ﺩﺭ ﺯﻣﺎﻥ ﺗﻨﻈﻴﻢ ﭘﺎﺭﺍﻣﺘﺮﻫﺎﯼ ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ )ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ،(Outlook :ﻧﺎﻡ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻣﯽ ﺑﺎﻳﺴﺖ ﻣﺸﺨﺺ ﮔﺮﺩﺩ
) ﻓﺮﺽ ﮐﻨﻴﺪ ﻧﺎﻡ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ mail.test.comﺑﺎﺷﺪ( .ﭘﺲ ﺍﺯ
ﺁﻣﺎﺩﻩ ﻧﻤﻮﺩﻥ ﻧﺎﻣﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻭ ﻓﺸﺮﺩﻥ ﺩﮐﻤﻪ "ﺍﺭﺳﺎﻝ" ،ﻋﻤﻠﻴﺎﺕ ﺯﻳﺮ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ: •
ﺑﺮﻧﺎﻣﻪ ،Outlook expressﺑﺎ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ SMTPﻣﻮﺟﻮﺩ ﺩﺭ
•
ﺑﺮﻧﺎﻣﻪ Outlook Expressﺑﺎ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ SMTPﻣﮑﺎﻟﻤﻪ ﺍﯼ ﺭﺍ ﺑﺮﻗﺮﺍﺭﻭ ﺑﻪ
com.١mail.testﺍﺯ ﻃﺮﻳﻖ ﭘﻮﺭﺕ ، ٢٥ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﯽ ﻧﻤﺎﻳﺪ.
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ، SMTPﺁﺩﺭﺱ ﻫﺎﯼ ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﮔﻴﺮﻧﺪﻩ ﻭ ﻣﺤﺘﻮﻳﺎﺕ ﭘﻴﺎﻡ ﺭﺍ ﺍﻋﻼﻥ ﻣﯽ ﻧﻤﺎﻳﺪ.
•
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ SMTPﺁﺩﺭﺱ ﮔﻴﺮﻧﺪﻩ ) ﺑﻌﻨﻮﺍﻥ ﻣﺜﺎﻝ ( [email protected] ﺭﺍ ﺑﻪ ﺩﻭ ﺑﺨﺶ ﻣﺠﺰﺍ ﺗﻘﺴﻴﻢ ﻣﯽ ﻧﻤﺎﻳﺪ: -ﻧﺎﻡ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ )(Reza
-ﻧﺎﻡ ﺣﻮﺯﻩ )(test1.com
105
•
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﮔﻴﺮﻧﺪﻩ ﭘﻴﺎﻡ ﺩﺍﺭﺍﯼ ﺻﻨﺪﻭﻕ ﭘﺴﺘﯽ ﺑﺮ ﺭﻭﯼ ﻫﻤﺎﻥ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ
ﺑﺎﺷﺪ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ SMTPﭘﻴﺎﻡ ﺩﺭﻳﺎﻓﺖ ﺷﺪﻩ ﺭﺍ ﺑﺴﺎﺩﮔﯽ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ POP3ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﺍﯼ ﺑﺎ ﻧﺎﻡ " Delivery
) "agentﺁﮊﺍﻧﺲ ﺗﻮﺯﻳﻊ ( ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﮔﻴﺮﻧﺪﻩ ﭘﻴﺎﻡ ﺑﺮ ﺭﻭﯼ
ﺣﻮﺯﻩ ﺍﯼ ﺩﻳﮕﺮ ﺑﺎﺷﺪ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ SMTPﻧﻴﺎﺯﻣﻨﺪ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺣﻮﺯﻩ
ﻣﺮﺑﻮﻃﻪ ﺍﺳﺖ .
•
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ، SMTPﺑﺎ DNSﻣﺮﺑﻮﻁ ﺍﺭﺗﺒﺎﻁ ﻭ ﺍﺯ ﺍﻭ ﻣﯽ ﺧﻮﺍﻫﺪ ﮐﻪ ﺁﺩﺭﺱ aIPﻣﺮﺑﻮﻁ ﺑﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ SMTPﺣﻮﺯﻩ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﺑﻪ ﺍﻃﻼﻉ ﻭﯼ ﺑﺮﺳـﺎﻧﺪ. ) ﻓﺮﺽ ﺍﻳﻦ ﺍﺳﺖ ﮐﻪ ﮔﻴﺮﻧﺪﻩ ﭘﻴﺎﻡ ﺩﺍﺭﺍﯼ ﺻﻨﺪﻭﻕ ﭘﺴﺘﯽ ﺑﺮ ﺭﻭﯼ ﻫﻤﺎﻥ ﮐﺎﻣﭙــﻴﻮﺗﺮ
ﻓﺮﺳﺘـﺪﻩ ﻧﻴـﺴﺖ ( .ﺩﺭ ﺍﺩﺍﻣﻪ ، DNSﺁﺩﺭﺱ ) ﻭ ﻳﺎ ﺁﺩﺭﺱ ﻫﺎﯼ ( IPﻣﺮﺑﻮﻁ ﺑﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ) ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ( SMTPﻣﺮﺑﻮﻁ ﺑﻪ ﺣﻮﺯﻩ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﺍﻋﻼﻡ
ﻣﯽ ﻧﻤﺎﻳﺪ. •
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻣﻮﺟﻮﺩ ﺩﺭ ﺣﻮﺯﻩ Test1.comﺑﺎ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻣﻮﺟﻮﺩ ﺩﺭ ﺣﻮﺯﻩ Test2.comﺍﺯ ﻃﺮﻳﻖ ﭘﻮﺭﺕ ، ٢٥ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﯽ ﻧﻤﺎﻳﺪ .ﺳﺮﻭﻳﺲ
106
ﺩﻫﻨﺪﻩ SMTPﻣﻮﺟﻮﺩ ﺩﺭ ﺣﻮﺯﻩ ، Test2.comﭘﻴﺎﻡ ﺍﺭﺳﺎﻟﯽ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻭ ﺁﻥ ﺭﺍ
ﺩﺭ ﺻﻨﺪﻭﻕ ﭘﺴﺘﯽ ﻣﺮﺑﻮﻁ ﺑﻪ ﮔﻴﺮﻧﺪﻩ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﺩﺍﺩ.
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻣﻮﺟﻮﺩ ﺩﺭ ﺣﻮﺯﻩ Test1.comﻗﺎﺩﺭ ﺑﻪ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ SMTPﻣﻮﺟﻮﺩ ﺩﺭ ﺣﻮﺯﻩ Test2.comﻧﮕﺮﺩﺩ ،ﭘﻴﺎﻡ ﻣﻮﺭﺩ ﻧﻈﺮ ﺩﺭ ﻣﺤﻠﯽ ﺧﺎﺹ ﺩﺭ ﻧﻮﺑﺖ ﻗﺮﺍﺭ ﻣﯽ ﮔﻴﺮﺩ .ﺳﺮﻳﺲ ﺩﻫﻨﺪﻩ SMTPﺩﺭ ﺍﮐﺜﺮ ﻣﺎﺷﻴﻦ ﻫﺎ ﺍﺯ ﺑﺮﻧﺎﻣﻪ
ﺍﯼ ﺑﺎ ﻧﺎﻡ Sendmailﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﻭﺍﻗﻌﯽ ﻳﮏ ﭘﻴﺎﻡ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩﻩ ﻭ ﺑﺮﺍﯼ ﭘﻴﺎﻡ ﻫﺎﯼ ﻣﻮﺟﻮﺩ ﺩﺭ ﺻﻒ ،ﺍﺯ ﺻﻔﯽ ﺑﺎ ﻧﺎﻡ sendmail queueﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ .ﺑﺮﻧﺎﻣﻪ
Sendmailﺑﺼﻮﺭﺕ ﺍﺩﻭﺍﺭﯼ) ﺗﮑﺮﺍﺭﯼ( ﺳﻌﯽ ﺩﺭ ﺍﺭﺳﺎﻝ ﻣﺠﺪﺩ ﭘﻴﺎﻡ ﻫﺎﯼ ﻣﻮﺟﻮﺩ ﺩﺭ ﺻﻒ ﻣﯽ ﻧﻤﺎﻳﺪ .ﻣﺜﻼ" ﻣﻤﮑﻦ ﺍﺳﺖ ﻫﺮ ١٥ﺩﻗﻴﻘﻪ ﻳﮑﺒﺎﺭ ﺗﻼﺵ ﻣﺠﺪﺩ ﺧﻮﺩ ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﺪ .ﭘﺲ ﺍﺯ ﮔﺬﺷﺖ ﭼﻬﺎﺭ ﺳﺎﻋﺖ ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﮐﻨﻨﺪﻩ ﻧﺎﻣﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﭘﻴﺎﻣﯽ ﻣﺒﻨﯽ
ﺑﺮ ﻭﺟﻮﺩ ﺍﺷﮑﺎﻝ ﺩﺭ ﺍﺭﺳﺎﻝ ﻧﺎﻣﻪ ،ﻓﺮﺳﺘﺎﺩﻩ ﻣﯽ ﺷﻮﺩ .ﭘﺲ ﺍﺯ ﭘﻨﺞ ﺭﻭﺯ ،ﺍﮐﺜﺮ ﺑﺮﻧﺎﻣﻪ ﻫﺎﯼ ﭘﻴﮑﺮﺑﻨﺪﯼ Sendmailﭘﻴﺎﻣﯽ ﻣﺒﻨﯽ ﺑﺮ ﻋﺪﻡ ﻣﻮﻓﻘﻴﺖ ﺩﺭ ﺗﻮﺯﻳﻊ ﭘﻴﺎﻡ ﺭﺍ ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ
ﻣﯽ ﺩﺍﺭﻧﺪ.
107
ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺗﯽ ﺑﻴﻦ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ SMTPﺑﺎ
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺯﺑﺎﻥ ﺳﺎﺩﻩ ﻣﺘﻨﯽ ﻭ ﺧﻮﺍﻧﺎ ،ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺧﻮﺩ ﺭﺍ ﻣﻌﺮﻓﯽ ،ﺁﺩﺭﺱ ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﮔﻴﺮﻧﺪﻩ ﻭ ﻣﺤﺘﻮﻳﺎﺕ ﭘﻴﺎﻡ ﺭﺍ ﻣﺸﺨﺺ ﺧﻮﺍﻫﺪ ﮐﺮﺩ ) .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﻧﺎﻣﻪ telnetﻣﯽ ﺗﻮﺍﻥ ﺑﺎ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ
ﻭ ﺍﺯ ﻃﺮﻳﻖ ﭘﻮﺭﺕ ٢٥ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﮐﺮﺩ(.ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ SMTPﺍﺯ ﺩﺳﺘﻮﺭﺍﺕ ﺳﺎﺩﻩ ﺍﯼ ﻧﻈﻴﺮ HELLO,MAIL,RCPT,DATAﻭ ...ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﺪ. •
.HELLOﻣﻌﺮﻓﯽ ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ
•
. EHLOﻣﻌﺮﻓﯽ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻭ ﺩﺭﺧﻮﺍﺳﺖ ﺣﺎﻟﺖ ﺗﻮﺳﻪ ﻳﺎﻓﺘﻪ
•
.MAIL FROMﻣﺸﺨﺺ ﮐﺮﺩﻥ ﻓﺮﺳﺘﻨﺪﻩ
•
. RCPT TOﻣﺸﺨﺺ ﮐﺮﺩﻥ ﮔﻴﺮﻧﺪﻩ
•
. DATAﻣﺤﺘﻮﻳﺎﺕ ﭘﻴﺎﻡ ﺭﺍ ﻣﺸﺨﺺ ﻣﯽ ﮐﻨﺪ.
•
. RESETﺑﺮﺍﯼ Resetﻧﻤﻮﺩﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﺷﻮﺩ.
•
. QUITﺍﺭﺗﺒﺎﻁ ﺭﺍ ﻗﻄﻊ ﻣﯽ ﻧﻤﺎﻳﺪ.
•
. HELPﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺩﺳﺘﻮﺭﺍﺕ ﺗﻮﺿﻴﺤﺎﺕ ﻻﺯﻡ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﯽ ﻧﻤﺎﻳﺪ.
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ POP3
ﺯﻣﺎﻧﻴﮑﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ،ﺻﻨﺪﻭﻕ ﭘﺴﺘﯽ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺭﻳﺎﻓﺖ
ﻧﺎﻣﻪ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﺮﺭﺳﯽ ﻣﯽ ﻧﻤﺎﺋﻴﺪ ،ﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ﺑﺎ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ POP3ﺍﺯ ﻃﺮﻳﻖ ﭘﻮﺭﺕ ١١٠ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﯽ ﻧﻤﺎﻳﺪ .ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ POP3ﺑﻪ ﻳﮏ ﻧﺎﻡ Accountﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﻧﻴﺎﺯ ﺩﺍﺭﺩ .ﭘﺲ ﺍﺯ ﺗﺎﻳﻴﺪ ﺍﻋﺘﺒﺎﺭ ﻭ ﻣﺠﻮﺯ ﺷﻤﺎ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ POP3ﻓﺎﻳﻞ ﻫﺎﯼ
ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﻓﻌﺎﻝ ﻭ ﺍﻣﮑﺎﻥ ﺩﺳﺘﻴﺎﺑﯽ ﺑﻪ ﺁﻧﺎﻥ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﯽ ﻧﻤﺎﻳﺪ.
108
ﺭﺍﺩﻳﻮ ﺍﻳﻨﺘﺮﻧﺘﯽ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﻋﺮﺻﻪ ﭘﺨﺶ ﺻﻮﺕ ) ﺻﺪﺍ ( ﻭ ﺗﺼﻮﻳﺮ ،ﻧﻴﺰ ﺗﺤﻮﻻﺕ ﭼﺸﻤﮕﻴﺮﯼ ﺭﺍ
ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩﻩ ﺍﺳﺖ .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ،ﻣﻬﻤﺘﺮﻳﻦ ﺗﺤﻮﻝ ﺩﺭ ﺯﻣﻴﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
ﺭﺍﺩﻳﻮ ﺍﺯ ﺳﺎﻝ ١٩٢٠ﺍﺳﺖ .ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﺍﺯ ﺍﻭﺍﺧﺮ ﺳﺎﻝ ١٩٩٠ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﺟﺪﯼ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺍﻧﺪ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﺍﺩﻳﻮﻫـﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﻣﯽ ﺗﻮﺍﻥ ﺍﺯ ﻫﺮ ﻣﺤﻞ ﻭ ﺗﻮﺳﻂ ﺻﺮﻓﺎ" ﻳـﮏ ﺩﺳﺘﮕﺎﻩ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﻣﻨﺘﺸﺮ ﺷﺪﻩ ،ﺩﺳﺘﻴﺎﺑﯽ ﭘﻴﺪﺍ ﮐﺮﺩ.
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﺍﺩﻳﻮ ﺑﻪ ﻣﻨﻈﻮﺭ ﻧﺸﺮ ﺍﻃﻼﻋﺎﺕ ،ﺍﺯ ﺍﻭﺍﻳﻞ ﺳﺎﻝ ١٩٢٠ﻣﻄﺮﺡ ﮔﺮﺩﻳﺪ .ﺩﺭ ﺳﺎﻝ ١٩٥٤ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺍﺑﺪﺍﻉ ﺗﺮﺍﺗﺰﻳﺴﺘﻮﺭ ،ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﺍﺩﻳﻮ ﺑﺸﺪﺕ ﺭﺷﺪ ﻭ ﻣﺘﺪﺍﻭﻝ ﮔﺮﺩﻳﺪ.
ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﺩﺭ ﺍﻭﺍﺧﺮ ﻗﺮﻥ ﺑﻴﺴﺘﻢ ﻭ ﺍﻭﺍﻳﻞ ﻗﺮﻥ ﺑﻴﺴﺖ ﻭ ﻳﮑﻢ ﻣﻄﺮﺡ ﻭ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺯﻳﺮﺳﺎﺧﺖ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺴﺮﻋﺖ ﺑﺎ ﺍﺳﺘﻘﺒﺎﻝ ﻣﻮﺍﺟﻪ ﮔﺮﺩﻳﺪﻧﺪ .ﺑﺮﺍﯼ ﺩﺳﺘﻴﺎﺑﯽ ﺑﻪ ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﺑﻪ ﻳﮑﺪﺳﺘﮕﺎﻩ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﺨﺼﯽ ﻭ ﺍﻳﻨﺘﺮﻧﺖ ﻧﻴﺎﺯ ﺍﺳﺖ .ﺩﺳﺘﻴﺎﺑﯽ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ
ﺑﺼﻮﺭﺕ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ،ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﺭﺍ ﺩﺭ ﺍﺗﻮﻣﺒﻴﻞ PDA ،ﻭ ﺗﻠﻔﻦ ﻫﺎﯼ ﺳﻠﻮﻟﯽ ﻓﺮﺍﻫﻢ ﮐﺮﺩﻩ ﺍﺳﺖ .ﻧﺴﻞ ﺟﺪﻳﺪ ﺩﺳﺘﮕﺎﻫﻬﺎﯼ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ،ﺩﺍﺭﺍﯼ ﻗﺎﺑﻠﻴﺖ ﻫﺎﯼ ﮔﺴﺘﺮﺩﻩ ﺍﯼ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﯽ ﺑﻪ ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ. ﻣﺰﺍﻳﺎﯼ ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ
ﺍﻳﺴﺘﮕﺎﻫﻬﺎﯼ ﺭﺍﺩﻳﻮﺋﯽ ﺳﻨﺘﯽ ،ﺩﺍﺭﺍﯼ ﺩﻭ ﻣﺤﺪﻭﺩﻳﺖ ﻋﻤﺪﻩ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻧﺸﺮ ﺍﻃﻼﻋﺎﺕ ﻣﯽ ﺑﺎﺷﻨﺪ: • •
ﻗﺪﺭﺕ ﺍﻳﺴﺘﮕﺎﻩ ﻓﺮﺳﺘﻨﺪﻩ ) ﻣﻌﻤﻮﻻ" ﻳﮑﺼﺪ (miles
ﺍﻣﻮﺍﺝ ﺭﺍﺩﻳﻮﺋﯽ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺱ ) ﺻﺪﻫﺎ ﺍﻳﺴﺘﮕﺎﻩ ﻣﺤﻠﯽ ﻣﻤﮑﻦ ﺍﺳﺖ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ
ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﺩﺍﺭﺍﯼ ﻣﺤﺪﻭﺩﻳﺖ ﺟﻐﺮﺍﻓﻴﺎﺋﯽ ﻧﻤﯽ ﺑﺎﺷﻨﺪ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺍﻧﺘﺸﺎﺭ ﺍﻃﻼﻋﺎﺕ ﺗﻮﺳﻂ ﻳﮏ ﺭﺍﺩﻳﻮﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﺩﺭ ﺷﺮﻕ ،ﻗﺎﺑﻞ ﺷﻨﻴﺪﻥ ﺩﺭ ﻏﺮﺏ ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
109
ﭘﺘﺎﻧﺴﻴﻞ ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﺑﺴﻴﺎﺭ ﮔﺴﺘﺮﺩﻩ ﺍﺳﺖ .ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ﺭﺍﺩﻳﻮﻫﺎﯼ ﺳﻨﺘﯽ ﮐﻪ ﺻﺮﻓﺎ" ﺍﺯ ﺻﻮﺕ ﺑﺮﺍﯼ ﭘﺨﺶ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﻨﺪ ،ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﺼﺎﻭﻳﺮ ،ﮔﺮﺍﻓﻴﮏ ،ﻣﺘﻦ ،ﻟﻴﻨﮏ ﻫﺎﯼ ﻣﺮﺑﻮﻃﻪ ﻭ ﺍﺭﺗﺒﺎﻁ ﻣﺘﻘﺎﺑﻞ ﺑﺎ ﺷﻨﻮﻧﺪﻩ ﺭﺍ ﻧﻴﺰ ﺍﺭﺍﺋﻪ
ﻣﯽ ﺩﻫﻨﺪ.
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺎﻫﻴﺖ ﻋﻤﻠﮑﺮﺩ ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﺎﻥ ﺩﺭ ﻣﻮﺍﺭﺩ ﻣﺘﻌﺪﺩﯼ ﺗﻮﺻﻴﻪ ﻣﯽ ﮔﺮﺩﺩ .ﻣﺜﻼ" ﺩﺭ ﻳﮏ ﺳﻴﺴﺘﻢ ﺁﻣﻮﺯﺷﯽ ﻭ ﻳﺎ ﺁﻣﻮﺯﺵ ﻫﺎﯼ ﻣﺒﺘﻨﯽ ﺑﺮ ﻭﺏ ،ﺍﺳﺘﻔﺎﺩﻩ
ﺍﺯ ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﺑﻪ ﻣﻨﻈﻮﺭ ﻧﺸﺮ ﺍﻃﻼﻋﺎﺕ ﺑﺴﻴﺎﺭ ﺣﺎﺋﺰ ﺍﻫﻤﻴﺖ ﺍﺳﺖ .ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ
ﺍﺯ ﻃﻴﻒ ﮔﺴﺘﺮﺩﻩ ﺍﯼ ﺍﺯ ﺍﻣﻮﺍﺝ ﺑﺮﺍﯼ ﻧﺸﺮ ﺍﻃﻼﻋﺎﺕ ﺧﺼﻮﺻﺎ" ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻣﻮﺯﻳﮏ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﻨﺪ. ﺍﻳﺠﺎﺩ ﻳﮏ ﺍﻳﺴﺘﮕﺎﻩ ﺭﺍﺩﻳﻮ ﺍﻳﻨﺘﺮﻧﺘﯽ
ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﻳﮏ ﺍﻳﺴﺘﮕﺎﻩ ﺭﺍﺩﻳﻮﺋﯽ ﺍﻳﻨﺘﺮﻧﺘﯽ ﺑﻪ ﺍﻣﮑﺎﻧﺎﺕ ﺯﻳﺮ ﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺑﻮﺩ: • •
CD player ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻫﺎﯼ ﻣﺮﺑﻮﻁ ﺑﻪ ﺗﮑﺜﻴﺮ ﻳﮏ Trackﻣﻮﺯﻳﮏ ﺍﺯ ﻳﮏ CDﺑﻪ ﻫﺎﺭﺩ ﺩﻳﺴﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ
•
ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﯼ ﻭﻳﺮﺍﻳﺶ ﻭ ﺿﺒﻂ ﺻﺪﺍ
•
ﻣﻴﮑﺮﻭﻓﻦ
•
Mixerﻫﺎﯼ ﺻﻮﺗﯽ
•
Compressor ، Equalizer
•
ﮐﺎﺭﺕ ﺻﺪﺍ
•
ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺧﺘﺼﺎﺻﯽ ﺑﻬﻤﺮﺍﻩ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻫﺎﯼ encoder
•
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ Streaming media
ﺑﺮﺍﯼ ﻧﺸﺮ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﻃﺮﻳﻖ ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﻣﺮﺍﺣﻞ ﺯﻳﺮ ﺩﻧﺒﺎﻝ ﻣﯽ ﮔﺮﺩﺩ:
110
• •
ﺍﻃﻼﻋﺎﺕ ﺻﻮﺗﯽ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﮐﺎﺭﺕ ﺻﺪﺍ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﻭﺍﺭﺩ ﻣﯽ ﮔﺮﺩﻧﺪ. ﻳﺴﺘﻢ ﻓﻮﻕ ،ﺍﻃﻼﻋﺎﺕ ﺻﻮﺗﯽ ﺩﺭﻳﺎﻓﺘﯽ ﺭﺍ ﺑﻪ ﻓﺮﻣﺖ
Streaming
ﺗﺒﺪﻳﻞ ﻣﯽ ﻧﻤﺎﻳﺪ.
ﺍﻃﻼﻋﺎ ﺕ ﺻﻮﺗﯽ ﺩﺭﻳﺎﻓﺘﯽ ،ﻧﻤﻮﻧﻪ ﺳﺎﺯﯼ ﻭ ﭘﺲ ﺍﺯ ﻗﺸﺮﺩﻩ ﺳﺎﺯﯼ ﺁﻣﺎﺩﻩ ﺍﺭﺳﺎﻝ ﺑﺮ ﺭﻭﯼ ﺍﻳﻨﺘﺮﻧﺖ ﺧﻮﺍﻫﻨﺪ ﺷﺪ.
•
ﺍﻃﻼﻋﺎﺕ ﺻﻮﺗﯽ ﻓﺸﺮﺩﻩ ﺷﺪﻩ ،ﺑﺮﺍﯼ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺍﺭﺳﺎﻝ ﻣﯽ ﮔﺮﺩﻧﺪ .ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻣﯽ ﺑﺎﻳﺴﺖ ﺩﺍﺭﺍﯼ ﻳﮏ ﭘﻬﻨﺎﯼ ﺑﺎﻧﺪ ﺑﺎﻻ ﺑﺎ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺎﺷﺪ.
•
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺻﻮﺗﯽ ﺑﺮ ﺭﻭﯼ ﺍﻳﻨﺘﺮﻧﺖ ﮐﺮﺩﻩ ﻭ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﯼ ﺷﻨﻮﻧﺪﻩ ﮐﻪ ﺩﺍﺭﺍﯼ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﯼ Playerﻭ ﻳﺎ Plug-inﻣﯽ ﺑﺎﺷﻨﺪ،
ﻗﺎﺩﺭ ﺑﻪ ﺷﻨﻴﺪﻥ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﯼ ﻓﻮﻕ ،ﺍﻃﻼﻋﺎ ﺕ ﺻﻮﺗﯽ stream ﺩﺭﻳﺎﻓﺖ ﺷﺪﻩ ﺍﺯ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺭﺍ ﺑﻪ ﺻﻮﺗﯽ ﮐﻪ ﻗﺎﺑﻞ ﺷﻨﻴﺪﻥ ﺗﻮﺳﻂ ﺷﻨﻮﻧﺪﻩ ﺑﺎﺷﻨﺪ،
ﺗﺒﺪﻳﻞ ﻣﯽ ﻧﻤﺎﻳﻨﺪ.
ﺍﺯ ﺩﻭ ﺭﻭﺵ ﻣﺘﻔﺎﻭﺕ ﺑﺮﺍﯼ ﻋﺮﺿﻪ ﺻﻮﺕ ﺑﺮ ﺭﻭﯼ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﺷﻮﺩ: Downloadﻭ . Streaming mediaﺩﺭ ﺭﻭﺵ ، downloadﻳﮏ ﻓﺎﻳﻞ ﺻﻮﺗﯽ ﺑﺮ ﺭﻭﯼ ﮐﺎﻣﭙﻴﻮﺗﺮ ﮐﺎﺭﺑﺮ ﺫﺧﻴﺮﻩ ﻣﯽ ﮔﺮﺩﺩ .ﻓﺮﻣﺖ ﻫﺎﯼ ﻓﺸﺮﺩﻩ ﻧﻈﻴﺮ ،mp3ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ
ﻓﺮﻣﺖ ﻓﺎﻳﻞ ﻫﺎﯼ ﺻﻮﺗﯽ ﺑﺮﺍﯼ Downloadﮐﺮﺩﻥ ﻣﯽ ﺑﺎﺷﻨﺪ ) .ﺍﺭﺳﺎﻝ ﻫﺮ ﻧﻮﻉ ﻓﺎﻳﻞ ﺻﻮﺗﯽ ﺗﻮﺳﻂ ﻭﺏ ﺳﺎﻳﺖ ﻫﺎ ﻭ ﻳﺎ ﺳﺎﻳﺖ ﻫﺎﯼ Ftpﺍﻣﮑﺎﻥ ﭘﺬﻳﺮ ﺍﺳﺖ(. ﺩﺭ ﺭﻭﺵ ، Streamingﻓﺎﻳﻞ ﺻﻮﺗﯽ ﺫﺧﻴﺮﻩ ﻧﻤﯽ ﮔﺮﺩﺩ ﺑﻠﮑﻪ ﺻﺮﻓﺎ" ﭘﺠﺶ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺍﻧﺘﺸﺎﺭ ﺍﻃﻼﻋﺎﺕ ﺑﮑﻤﮏ ﺭﻭﺵ ﻓﻮﻕ ﺑﺼﻮﺭﺕ ﭘﻴﻮﺳﺘﻪ ﻭ ﺑﺎ ﺑﻬﺮﻩ ﮔﻴﺮﯼ ﺍﺯ ﺳﻪ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺍﻧﺠﺎﻡ ﻣﯽ ﮔﻴﺮﺩ Encode :ﻭ Serverﻭ . Playerﻧﺮﻡ ﺍﻓﺰﺍﺭ encoderﺍﻃﻼﻋﺎﺕ ﺻﻮﺗﯽ ﺭﺍ ﺑﻪ ﻓﺮﻣﺖ streamingﺗﺒﺪﻳﻞ ﻣﯽ ﻧﻤﺎﻳﺪ. ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ،ﺍﻃﻼﻋﺎﺕ ﺗﺒﺪﻳﻞ ﺷﺪﻩ ﺭﺍ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺱ ﺑﺮ ﺭﻭﺱ ﺍﻳﻨﺘﺮﻧﺖ ﻧﻤﻮﺩﻩ ﻭ ﻧﺮﻡ
ﺍﻓﺰﺍﺭ ، playerﻣﺴﺪﻭﻝ ﺑﺎﺯﻳﺎﺑﯽ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺖ .ﺩﺭ ﭘﺤﺶ ﻣﺴﺘﻘﻴﻢ ،ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﯼ encoderﻭ Streamerﺑﺼﻮﺭﺕ ﻫﻤﺰﻣﺎﻥ ﻓﻌﺎﻟﻴﺖ ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﺍﻃﻼﻋﺎﺕ ﺻﻮﺗﯽ ﺍﺯ ﻃﺮﻳﻖ ﮐﺎﺭﺕ ﺻﺪﺍ ﺑﻪ ﺳﻴﺴﺘﻢ ﻣﺮﺑﻮﻃﻪ ﺗﻐﺬﻳﻪ ﻭ ﭘﺲ ﺍﺯ Encodeﻧﻤﻮﺩﻥ ﺁﻧﻬﺎ ﺗﻮﺳﻂ ﻧﺮﻡ 111
ﺍﻓﺰﺍﺭ ﻣﺮﺑﻮﻃﻪ ﺑﺮ ﺭﻭﯼ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ streamingﻗﺮﺍﺭ ﺧﻮﺍﻫﻨﺪ ﮔﺮﻓﺖ .ﺑﺎﺗﻮﺟﻪ ﺑﻪ
ﺣﺠﻢ ﺑﺎﻻﯼ ﻋﻤﻠﻴﺎﺕ ﻣﺤﺎﺳﺒﺎﺗﯽ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ Streamingﻣﯽ ﺑﺎﻳﺴﺖ ﻳﮏ ﺳﺮﻭﻳﺲ
ﺩﻫﻨﺪﻩ ﻗﺪﺭﺗﻤﻨﺪ ﻭ ﺍﺧﺘﺼﺎﺻﯽ ﺑﺎﺷﺪ.
112
113
ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﻳﮏ ﺷﺒﮑﻪ ﺷﺎﻣﻞ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎ )ﮐﺎﻣﭙﻴﻮﺗﺮ ،ﭼﺎﭘﮕﺮﻭ (...ﺑﻮﺩﻩ ﮐﻪ ﺑﺎ
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺭﻭﺵ ﺍﺭﺗﺒﺎﻃﻲ )ﮐﺎﺑﻞ ،ﺍﻣﻮﺍﺝ ﺭﺍﺩﻳﻮﺋﻲ ،ﻣﺎﻫﻮﺍﺭﻩ( ﻭ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺷﺘﺮﺍﮎ ﻣﻨﺎﺑﻊ ﻓﻴﺰﻳﮑﻲ )ﭼﺎﭘﮕﺮ( ﻭ ﺍﺷﺘﺮﺍﮎ ﻣﻨﺎﺑﻊ ﻣﻨﻄﻘﻲ )ﻓﺎﻳﻞ( ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺷﺒﮑﻪ ﻫﺎ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻧﻴﺰ ﻣﺮﺗﺒﻂ ﺷﺪﻩ ﻭ ﺷﺎﻣﻞ ﺯﻳﺮ ﺷﺒﮑﻪ ﻫﺎﺋﻲ ﺑﺎﺷﻨﺪ. ﺗﻘﺴﻴﻢ ﺑﻨﺪﻱ ﺷﺒﮑﻪ ﻫﺎ
ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺭﺍ ﺑﺮ ﺍﺳﺎﺱ ﻣﻮﻟﻔﻪ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺗﻘﺴﻴﻢ ﺑﻨﺪﻱ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ
ﺍﺩﺍﻣﻪ ﺑﻪ ﺑﺮﺧﻲ ﺍﺯ ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﺗﻘﺴﻴﻢ ﺑﻨﺪﻱ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺍﺷﺎﺭﻩ ﻣﻲ ﮔﺮﺩﺩ. ﺗﻘﺴﻴﻢ ﺑﻨﺪﻱ ﺑﺮ ﺍﺳﺎﺱ ﻧﻮﻉ ﻭﻇﺎﻳﻒ
ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺭﺍ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﻮﻉ ﻭﻇﺎﻳﻒ ﻣﺮﺑﻮﻃﻪ ﺑﻪ ﺩﻭﮔﺮﻭﻩ ﻋﻤﺪﻩ:
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ) (Serversﻭ ﻳﺎ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ) (Clientsﺗﻘﺴﻴﻢ ﻣﻲ ﻧﻤﺎﻳﻨﺪ. ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﺋﻲ ﺩﺭ ﺷﺒﮑﻪ ﮐﻪ ﺑﺮﺍﻱ ﺳﺎﻳﺮﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺳﺮﻭﻳﺲ ﻫﺎ ﻭﺧﺪﻣﺎﺗﻲ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲ ﻧﻤﺎﻳﻨﺪ، ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻧﺎﻣﻴﺪﻩ ﻣﻲ ﮔﺮﺩﻧﺪ .ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﺋﻲ ﮐﻪ ﺍﺯ ﺧﺪﻣﺎﺕ ﻭ ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﺍﺭﺍﺋﻪ ﺷﺪﻩ
ﺗﻮﺳﻂ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮐﻨﻨﺪ ،ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﻧﺪ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ،Client-Serverﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺭ ﺷﺒﮑﻪ ﻧﻤﻲ ﺗﻮﺍﻧﺪ ﻫﻢ ﺑﻪ ﻋﻨﻮﺍﻥ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭ ﻫﻢ ﺑﻪ ﻋﻨﻮﺍﻥ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ،ﺍﻳﻔﺎﻱ ﻭﻇﻴﻔﻪ ﻧﻤﺎﻳﺪ.
ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ، Peer-To-Peerﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻲ ﺗﻮﺍﻧﺪ ﻫﻢ ﺑﺼﻮﺭﺕ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭ ﻫﻢ ﺑﺼﻮﺭﺕ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺍﻳﻔﺎﻱ ﻭﻇﻴﻔﻪ ﻧﻤﺎﻳﺪ.
114
ﻳﮏ ﺷﺒﮑﻪ LANﺩﺭ ﺳﺎﺩﻩ ﺗﺮﻳﻦ ﺣﺎﻟﺖ ﺍﺯ ﺍﺟﺰﺍﻱ ﺯﻳﺮ ﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺍﺳﺖ: •
ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﺨﺼﻲ .ﻳﮏ ﺷﺒﮑﻪ ﻣﻲ ﺗﻮﺍﻧﺪ ﺷﺎﻣﻞ ﭼﻨﺪ ﺻﺪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﺎﺷﺪ .ﺣﺪﺍﻗﻞ ﻳﮑﻲ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﻋﻨﻮﺍﻥ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻣﺸﺨﺺ ﮔﺮﺩﺩ.
)ﺩﺭﺻﻮﺭﺗﻲ ﮐﻪ ﺷﺒﮑﻪ ﺍﺯ ﻧﻮﻉ Client-Serverﺑﺎﺷﺪ( .ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ، ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺳﺖ ﮐﻪ ﻫﺴﺘﻪ ﺍﺳﺎﺳﻲ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﺑﺮ ﺭﻭﻱ ﺁﻥ ﻧﺼﺐ ﺧﻮﺍﻫﺪ ﺷﺪ.
•
ﻳﮏ ﻋﺪﺩ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ) (NICﺑﺮﺍﻱ ﻫﺮ ﺩﺳﺘﮕﺎﻩ .ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﻧﻈﻴﺮ ﮐﺎﺭﺕ ﻫﺎﺋﻲ ﺍﺳﺖ ﮐﻪ ﺑﺮﺍﻱ ﻣﻮﺩﻡ ﻭ ﺻﺪﺍ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﻣﺴﺌﻮﻝ
ﺩﺭﻳﺎﻓﺖ ،ﺍﻧﺘﻘﺎﻝ ،ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﻭ ﺫﺧﻴﺮﻩ ﺳﺎﺯﻱ ﻣﻮﻗﺖ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻃﻮﻝ ﺷﺒﮑﻪ ﺍﺳﺖ.
ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺠﺎﻡ ﻭﻇﺎﻳﻒ ﻓﻮﻕ ﮐﺎﺭﺕ ﻫﺎﻱ ﺷﺒﮑﻪ ﺩﺍﺭﺍﻱ ﭘﺮﺩﺍﺯﻧﺪﻩ ،ﺣﺎﻓﻈﻪ ﻭ ﮔﺬﺭﮔﺎﻩ ﺍﺧﺘﺼﺎﺻﻲ ﺧﻮﺩ ﻫﺴﺘﻨﺪ.
ﺗﻘﺴﻴﻢ ﺑﻨﺪﻱ ﺑﺮ ﺍﺳﺎﺱ ﺗﻮﭘﻮﻟﻮﮊﻱ ﺍﻟﮕﻮﻱ ﻫﻨﺪﺳﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺟﻬﺖ ﺍﺗﺼﺎﻝ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ،ﺗﻮﭘﻮﻟﻮﮊﻱ ﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ.
ﺗﻮﭘﻮﻟﻮﮊﻱ ﺍﻧﺘﺨﺎﺏ ﺷﺪﻩ ﺑﺮﺍﻱ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺷﺒﮑﻪ ﻫﺎ ،ﻋﺎﻣﻠﻲ ﻣﻬﻢ ﺩﺭ ﺟﻬﺖ ﮐﺸﻒ ﻭ ﺑﺮﻃﺮﻑ ﻧﻤﻮﺩﻥ ﺧﻄﺎﺀ ﺩﺭ ﺷﺒﮑﻪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺍﻧﺘﺨﺎﺏ ﻳﮏ ﺗﻮﭘﻮﻟﻮﮊﻱ ﺧﺎﺹ ﻧﻤﻲ ﺗﻮﺍﻧﺪ ﺑﺪﻭﻥ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﻭ ﺭﻭﺵ ﻫﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﻂ ﻣﻄﺮﺡ ﮔﺮﺩﺩ .ﻧﻮﻉ ﺗﻮﭘﻮﻟﻮﮊﻱ ﺍﻧﺘﺨﺎﺑﻲ ﺟﻬﺖ
ﺍﺗﺼﺎﻝ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ،ﻣﺴﺘﻘﻴﻤﺎ" ﺑﺮ ﻧﻮﻉ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﻭ ﺭﻭﺵ ﻫﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﻂ
ﺗﺎﺛﻴﺮ ﻣﻲ ﮔﺬﺍﺭﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺗﺎﺛﻴﺮ ﻣﺴﺘﻘﻴﻢ ﺗﻮﭘﻮﻟﻮﮊﻱ ﺍﻧﺘﺨﺎﺑﻲ ﺩﺭ ﻧﻮﻉ ﮐﺎﺑﻞ ﮐﺸﻲ ﻭ ﻫﺰﻳﻨﻪ ﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﻥ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺎ ﺩﻗﺖ ﻭ ﺗﺎﻣﻞ ﺑﻪ ﺍﻧﺘﺨﺎﺏ ﺗﻮﭘﻮﻟﻮﮊﻱ ﻳﮏ ﺷﺒﮑﻪ ﻫﻤﺖ 115
ﮔﻤﺎﺷﺖ .ﻋﻮﺍﻣﻞ ﻣﺨﺘﻠﻔﻲ ﺟﻬﺖ ﺍﻧﺘﺨﺎﺏ ﻳﮏ ﺗﻮﭘﻮﻟﻮﮊﻱ ﺑﻬﻴﻨﻪ ﻣﻄﺮﺡ ﻣﻲ ﺷﻮﺩ .ﻣﻬﻤﺘﺮﻳﻦ ﺍﻳﻦ ﻋﻮﺍﻣﻞ ﺑﺸﺮﺡ ﺫﻳﻞ ﺍﺳﺖ:
-ﻫﺰﻳﻨﻪ .ﻫﺮ ﻧﻮﻉ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﮐﻪ ﺑﺮﺍﻱ ﺷﺒﮑﻪ LANﺍﻧﺘﺨﺎﺏ ﮔﺮﺩﺩ ،ﺩﺭ ﻧﻬﺎﻳﺖ ﻣﻲ ﺑﺎﻳﺴﺖ
ﻋﻤﻠﻴﺎﺕ ﻧﺼﺐ ﺷﺒﮑﻪ ﺩﺭ ﻳﮏ ﺳﺎﺧﺘﻤﺎﻥ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﮔﺮﺩﺩ .ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﻓﺮﺁﻳﻨﺪﻱ ﻃﻮﻻﻧﻲ ﺟﻬﺖ ﻧﺼﺐ ﮐﺎﻧﺎﻝ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺑﻪ ﮐﺎﺑﻞ ﻫﺎ ﻭ ﻣﺤﻞ ﻋﺒﻮﺭ ﮐﺎﺑﻞ ﻫﺎ ﺩﺭ ﺳﺎﺧﺘﻤﺎﻥ ﺍﺳﺖ .ﺩﺭ ﺣﺎﻟﺖ ﺍﻳﺪﻩ ﺁﻝ ﮐﺎﺑﻞ ﮐﺸﻲ ﻭ ﺍﻳﺠﺎﺩ ﮐﺎﻧﺎﻝ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﻗﺒﻞ ﺍﺯ ﺗﺼﺮﻑ ﻭ
ﺑﮑﺎﺭﮔﻴﺮﻱ ﺳﺎﺧﺘﻤﺎﻥ ﺍﻧﺠﺎﻡ ﮔﺮﻓﺘﻪ ﺑﺎﺷﺪ .ﺑﻬﺮﺣﺎﻝ ﻣﻲ ﺑﺎﻳﺴﺖ ﻫﺰﻳﻨﻪ ﻧﺼﺐ ﺷﺒﮑﻪ ﺑﻬﻴﻨﻪ ﮔﺮﺩﺩ.
ﺍﻧﻌﻄﺎﻑ ﭘﺬﻳﺮﻱ .ﻳﮑﻲ ﺍﺯ ﻣﺰﺍﻳﺎﻱ ﺷﺒﮑﻪ ﻫﺎﻱ ،LANﺗﻮﺍﻧﺎﺋﻲ ﭘﺮﺩﺍﺯﺵ ﺩﺍﺩﻩ ﻫﺎ ﻭﮔﺴﺘﺮﺩﮔﻲ ﻭ ﺗﻮﺯﻳﻊ ﮔﺮﻩ ﻫﺎ ﺩﺭ ﻳﮏ ﻣﺤﻴﻂ ﺍﺳﺖ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺗﻮﺍﻥ ﻣﺤﺎﺳﺒﺎﺗﻲ ﺳﻴﺴﺘﻢ ﻭ
ﻣﻨﺎﺑﻊ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺗﻤﺎﻡ ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻨﺪﮔﺎﻥ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﮔﺮﻓﺖ .ﺩﺭ ﺍﺩﺍﺭﺍﺕ ﻫﻤﻪ ﭼﻴﺰ ﺗﻐﻴﻴﺮ ﺧﻮﺍﻫﺪ ﮐﺮﺩ).ﻟﻮﺍﺯﻡ ﺍﺩﺍﺭﻱ ،ﺍﺗﺎﻗﻬﺎ ﻭ .(...ﺗﻮﭘﻮﻟﻮﮊﻱ ﺍﻧﺘﺨﺎﺑﻲ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺴﺎﺩﮔﻲ ﺍﻣﮑﺎﻥ
ﺗﻐﻴﻴﺮ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺩﺭ ﺷﺒﮑﻪ ﺭﺍ ﻓﺮﺍﻫﻢ ﻧﻤﺎﻳﺪ .ﻣﺜﻼ" ﺍﻳﺴﺘﮕﺎﻫﻲ ﺭﺍ ﺍﺯ ﻧﻘﻄﻪ ﺍﻱ ﺑﻪ ﻧﻘﻄﻪ ﺩﻳﮕﺮ ﺍﻧﺘﻘﺎﻝ ﻭ ﻳﺎ ﻗﺎﺩﺭ ﺑﻪ ﺍﻳﺠﺎﺩ ﻳﮏ ﺍﻳﺴﺘﮕﺎﻩ ﺟﺪﻳﺪ ﺩﺭ ﺷﺒﮑﻪ ﺑﺎﺷﻴﻢ. ﺳﻪ ﻧﻮﻉ ﺗﻮﭘﻮﻟﻮﮊﻱ ﺭﺍﻳﺞ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ LANﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ: BUS STAR RING ﺗﻮﭘﻮﻟﻮﮊﻱ BUS
ﻳﮑﻲ ﺍﺯ ﺭﺍﻳﺠﺘﺮﻳﻦ ﺗﻮﭘﻮﻟﻮﮊﻱ ﻫﺎ ﺑﺮﺍﻱ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺷﺒﮑﻪ ﻫﺎﻱ LANﺍﺳﺖ .ﺩﺭ ﻣﺪﻝ
ﻓﻮﻕ ﺍﺯ ﻳﮏ ﮐﺎﺑﻞ ﺑﻪ ﻋﻨﻮﺍﻥ ﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ ﺍﺻﻠﻲ ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﻭ ﺗﻤﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ )ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ،ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ( ﺑﻪ ﺁﻥ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ.
116
ﻣﺰﺍﻳﺎﻱ ﺗﻮﭘﻮﻟﻮﮊﻱ BUS •
ﮐﻢ ﺑﻮﺩﻥ ﻃﻮﻝ ﮐﺎﺑﻞ .ﺑﺪﻟﻴﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺧﻂ ﺍﻧﺘﻘﺎﻝ ﺟﻬﺖ ﺍﺗﺼﺎﻝ ﺗﻤﺎﻡ
ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ،ﺩﺭ ﺗﻮﭘﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺍﺯ ﮐﺎﺑﻞ ﮐﻤﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ .ﻣﻮﺿﻮﻉ ﻓﻮﻕ ﺑﺎﻋﺚ ﭘﺎﻳﻴﻦ ﺁﻣﺪﻥ ﻫﺰﻳﻨﻪ ﻧﺼﺐ ﻭ ﺍﻳﺠﺎﺩ ﺗﺴﻬﻴﻼﺕ ﻻﺯﻡ ﺩﺭ ﺟﻬﺖ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺷﺒﮑﻪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
•
ﺳﺎﺧﺘﺎﺭ ﺳﺎﺩﻩ .ﺗﻮﭘﻮﻟﻮﮊﻱ BUSﺩﺍﺭﺍﻱ ﻳﮏ ﺳﺎﺧﺘﺎﺭ ﺳﺎﺩﻩ ﺍﺳﺖ .ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ﺻﺮﻓﺎ" ﺍﺯ ﻳﮏ ﮐﺎﺑﻞ ﺑﺮﺍﻱ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ.
•
ﺗﻮﺳﻌﻪ ﺁﺳﺎﻥ .ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺟﺪﻳﺪ ﺭﺍ ﻣﻲ ﺗﻮﺍﻥ ﺑﺮﺍﺣﺘﻲ ﺩﺭ ﻧﻘﻄﻪ ﺍﻱ ﺍﺯ ﺷﺒﮑﻪ ﺍﺿﺎﻓﻪ ﮐﺮﺩ .ﺩﺭ ﺻﻮﺭﺕ ﺍﺿﺎﻓﻪ ﺷﺪﻥ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﺑﻴﺸﺘﺮ ﺩﺭ ﻳﮏ ﺳﮕﻤﻨﺖ ،ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ
ﺗﻘﻮﻳﺖ ﮐﻨﻨﺪﻩ ﻫﺎﺋﻲ ﺑﻪ ﻧﺎﻡ Repeaterﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ. ﻣﻌﺎﻳﺐ ﺗﻮﭘﻮﻟﻮﮊﻱ BUS •
ﻣﺸﮑﻞ ﺑﻮﺩﻥ ﻋﻴﺐ ﻳﺎﺑﻲ .ﺑﺎ ﺍﻳﻨﮑﻪ ﺳﺎﺩﮔﻲ ﻣﻮﺟﻮﺩ ﺩﺭ ﺗﻮﻳﻮﻟﻮﮊﻱ BUSﺍﻣﮑﺎﻥ ﺑﺮﻭﺯ
ﺍﺷﺘﺒﺎﻩ ﺭﺍ ﮐﺎﻫﺶ ﻣﻲ ﺩﻫﻨﺪ ،ﻭﻟﻲ ﺩﺭ ﺻﻮﺭﺕ ﺑﺮﻭﺯ ﺧﻄﺎﺀ ﮐﺸﻒ ﺁﻥ ﺳﺎﺩﻩ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ.
ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﺋﻲ ﮐﻪ ﺍﺯ ﺗﻮﭘﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﮐﻨﺘﺮﻝ ﺷﺒﮑﻪ ﺩﺭ ﻫﺮ ﮔﺮﻩ ﺩﺍﺭﺍﻱ ﻣﺮﮐﺰﻳﺖ ﻧﺒﻮﺩﻩ ﻭ ﺩﺭ ﺻﻮﺭﺕ ﺑﺮﻭﺯ ﺧﻄﺎﺀ ﻣﻲ ﺑﺎﻳﺴﺖ ﻧﻘﺎﻁ ﺯﻳﺎﺩﻱ ﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺸﺨﻴﺺ ﺧﻄﺎﺀ ﺑﺎﺯﺩﻳﺪ ﻭ ﺑﺮﺭﺳﻲ ﮔﺮﺩﻧﺪ. •
ﺍﻳﺰﻭﻟﻪ ﮐﺮﺩﻥ ﺧﻄﺎﺀ ﻣﺸﮑﻞ ﺍﺳﺖ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺭ ﺗﻮﭘﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺩﭼﺎﺭ ﻣﺸﮑﻞ ﮔﺮﺩﺩ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺭﺍ ﺩﺭ ﻣﺤﻠﻲ ﮐﻪ ﺑﻪ ﺷﺒﮑﻪ ﻣﺘﺼﻞ ﺍﺳﺖ ﺭﻓﻊ
ﻋﻴﺐ ﻧﻤﻮﺩ .ﺩﺭ ﻣﻮﺍﺭﺩ ﺧﺎﺹ ﻣﻲ ﺗﻮﺍﻥ ﻳﮏ ﮔﺮﻩ ﺭﺍ ﺍﺯ ﺷﺒﮑﻪ ﺟﺪﺍ ﮐﺮﺩ .ﺩﺭ ﺣﺎﻟﺘﻴﮑﻪ ﺍﺷﮑﺎﻝ ﺩﺭ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺑﺎﺷﺪ ،ﺗﻤﺎﻡ ﻳﮏ ﺳﮕﻤﻨﺖ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﺷﺒﮑﻪ ﺧﺎﺭﺝ ﮔﺮﺩﺩ. •
ﻣﺎﻫﻴﺖ ﺗﮑﺮﺍﺭﮐﻨﻨﺪﻩ ﻫﺎ .ﺩﺭ ﻣﻮﺍﺭﺩﻳﮑﻪ ﺑﺮﺍﻱ ﺗﻮﺳﻌﻪ ﺷﺒﮑﻪ ﺍﺯ ﺗﮑﺮﺍﺭﮐﻨﻨﺪﻩ ﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ ،ﻣﻤﮑﻦ ﺍﺳﺖ ﺩﺭ ﺳﺎﺧﺘﺎﺭ ﺷﺒﮑﻪ ﺗﻐﻴﻴﺮﺍﺗﻲ ﻧﻴﺰ ﺩﺍﺩﻩ ﺷﻮﺩ .ﻣﻮﺿﻮﻉ ﻓﻮﻕ
ﻣﺴﺘﻠﺰﻡ ﺑﮑﺎﺭﮔﻴﺮﻱ ﮐﺎﺑﻞ ﺑﻴﺸﺘﺮ ﻭ ﺍﺿﺎﻓﻪ ﻧﻤﻮﺩﻥ ﺍﺗﺼﺎﻻﺕ ﻣﺨﺼﻮﺹ ﺷﺒﮑﻪ ﺍﺳﺖ. 117
ﺗﻮﭘﻮﻟﻮﮊﻱ STAR
ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺗﻮﭘﻮﻟﻮﮊﻱ ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﺍﺯ ﻧﺎﻡ ﺁﻥ ﻣﺸﺨﺺ ﺍﺳﺖ ،ﺍﺯ ﻣﺪﻟﻲ ﺷﺒﻴﻪ "ﺳﺘﺎﺭﻩ" ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺍﻳﻦ ﻣﺪﻝ ﺗﻤﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻣﻌﻤﻮﻻ" ﺑﻪ ﻳﮏ ﺩﺳﺘﮕﺎﻩ ﺧﺎﺹ ﺑﺎ ﻧﺎﻡ " ﻫﺎﺏ " ﻣﺘﺼﻞ ﺧﻮﺍﻫﻨﺪ ﺷﺪ.
ﻣﺰﺍﻳﺎﻱ ﺗﻮﭘﻮﻟﻮﮊﻱ STAR •
ﺳﺎﺩﮔﻲ ﺳﺮﻭﻳﺲ ﺷﺒﮑﻪ .ﺗﻮﭘﻮﻟﻮﮊﻱ STARﺷﺎﻣﻞ ﺗﻌﺪﺍﺩﻱ ﺍﺯ ﻧﻘﺎﻁ ﺍﺗﺼﺎﻟﻲ ﺩﺭ ﻳﮏ ﻧﻘﻄﻪ ﻣﺮﮐﺰﻱ ﺍﺳﺖ .ﻭﻳﮋﮔﻲ ﻓﻮﻕ ﺗﻐﻴﻴﺮ ﺩﺭ ﺳﺎﺧﺘﺎﺭ ﻭ ﺳﺮﻭﻳﺲ ﺷﺒﮑﻪ ﺭﺍ ﺁﺳﺎﻥ
ﻣﻲ ﻧﻤﺎﻳﺪ. •
ﺩﺭ ﻫﺮ ﺍﺗﺼﺎﻝ ﻳﮑﺪﺳﺘﮕﺎﻩ .ﻧﻘﺎﻁ ﺍﺗﺼﺎﻟﻲ ﺩﺭ ﺷﺒﮑﻪ ﺫﺍﺗﺎ" ﻣﺴﺘﻌﺪ ﺍﺷﮑﺎﻝ ﻫﺴﺘﻨﺪ .ﺩﺭ
ﺗﻮﭘﻮﻟﻮﮊﻱ STARﺍﺷﮑﺎﻝ ﺩﺭ ﻳﮏ ﺍﺗﺼﺎﻝ ،ﺑﺎﻋﺚ ﺧﺮﻭﺝ ﺁﻥ ﺧﻂ ﺍﺯ ﺷﺒﮑﻪ ﻭ ﺳﺮﻭﻳﺲ ﻭ ﺍﺷﮑﺎﻝ ﺯﺩﺍﺋﻲ ﺧﻂ ﻣﺰﺑﻮﺭ ﺍﺳﺖ .ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﺗﺎﺛﻴﺮﻱ ﺩﺭ ﻋﻤﻠﮑﺮﺩ ﺳﺎﻳﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻧﺨﻮﺍﻫﺪ ﮔﺬﺍﺷﺖ.
•
ﮐﻨﺘﺮﻝ ﻣﺮﮐﺰﻱ ﻭ ﻋﻴﺐ ﻳﺎﺑﻲ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﻣﺴﺌﻠﻪ ﮐﻪ ﻧﻘﻄﻪ ﻣﺮﮐﺰﻱ ﻣﺴﺘﻘﻴﻤﺎ" ﺑﻪ ﻫﺮ ﺍﻳﺴﺘﮕﺎﻩ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻣﺘﺼﻞ ﺍﺳﺖ ،ﺍﺷﮑﺎﻻﺕ ﻭ ﺍﻳﺮﺍﺩﺍﺕ ﺩﺭ ﺷﺒﮑﻪ ﺑﺴﺎﺩﮔﻲ
ﺗﺸﺨﻴﺺ ﻭ ﻣﻬﺎﺭ ﺧﻮﺍﻫﻨﺪ ﮔﺮﺩﻳﺪ. •
ﺭﻭﺵ ﻫﺎﻱ ﺳﺎﺩﻩ ﺩﺳﺘﻴﺎﺑﻲ .ﻫﺮ ﺍﺗﺼﺎﻝ ﺩﺭ ﺷﺒﮑﻪ ﺷﺎﻣﻞ ﻳﮏ ﻧﻘﻄﻪ ﻣﺮﮐﺰﻱ ﻭ ﻳﮏ ﮔﺮﻩ
ﺟﺎﻧﺒﻲ ﺍﺳﺖ .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺣﻬﺖ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ
ﺍﻃﻼﻋﺎﺕ ﺩﺍﺭﺍﻱ ﺍﻟﮕﻮﺭﻳﺘﻤﻲ ﺳﺎﺩﻩ ﺧﻮﺍﻫﺪ ﺑﻮﺩ. ﻣﻌﺎﻳﺐ ﺗﻮﭘﻮﻟﻮﮊﻱ STAR •
ﺯﻳﺎﺩ ﺑﻮﺩﻥ ﻃﻮﻝ ﮐﺎﺑﻞ .ﺑﺪﻟﻴﻞ ﺍﺗﺼﺎﻝ ﻣﺴﺘﻘﻴﻢ ﻫﺮ ﮔﺮﻩ ﺑﻪ ﻧﻘﻄﻪ ﻣﺮﮐﺰﻱ ،ﻣﻘﺪﺍﺭ ﺯﻳﺎﺩﻱ ﮐﺎﺑﻞ ﻣﺼﺮﻑ ﻣﻲ ﺷﻮﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﻫﺰﻳﻨﻪ ﮐﺎﺑﻞ ﻧﺴﺒﺖ ﺑﻪ ﺗﻤﺎﻡ ﺷﺒﮑﻪ،ﮐﻢ ﺍﺳﺖ،
118
ﺗﺮﺍﮐﻢ ﺩﺭ ﮐﺎﻧﺎﻝ ﮐﺸﻲ ﺟﻬﺖ ﮐﺎﺑﻞ ﻫﺎ ﻭ ﻣﺴﺎﺋﻞ ﻣﺮﺑﻮﻁ ﺑﻪ ﻧﺼﺐ ﻭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺁﻧﻬﺎ
ﺑﻄﻮﺭ ﻗﺎﺑﻞ ﺗﻮﺟﻬﻲ ﻫﺰﻳﻨﻪ ﻫﺎ ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﺧﻮﺍﻫﺪ ﺩﺍﺩ. •
ﻣﺸﮑﻞ ﺑﻮﺩﻥ ﺗﻮﺳﻌﻪ .ﺍﺿﺎﻓﻪ ﻧﻤﻮﺩﻥ ﻳﮏ ﮔﺮﻩ ﺟﺪﻳﺪ ﺑﻪ ﺷﺒﮑﻪ ﻣﺴﺘﻠﺰﻡ ﻳﮏ ﺍﺗﺼﺎﻝ ﺍﺯ
ﻧﻘﻄﻪ ﻣﺮﮐﺰﻱ ﺑﻪ ﮔﺮﻩ ﺟﺪﻳﺪ ﺍﺳﺖ .ﺑﺎ ﺍﻳﻨﮑﻪ ﺩﺭ ﺯﻣﺎﻥ ﮐﺎﺑﻞ ﮐﺸﻲ ﭘﻴﺶ ﺑﻴﻨﻲ ﻫﺎﻱ ﻻﺯﻡ ﺟﻬﺖ ﺗﻮﺳﻌﻪ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﻣﻲ ﺷﻮﺩ ،ﻭﻟﻲ ﺩﺭ ﺑﺮﺧﻲ ﺣﺎﻻﺕ ﻧﻈﻴﺮ ﺯﻣﺎﻧﻴﮑﻪ ﻃﻮﻝ ﺯﻳﺎﺩﻱ ﺍﺯ ﮐﺎﺑﻞ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺑﻮﺩﻩ ﻭ ﻳﺎ ﺍﺗﺼﺎﻝ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﮔﺮﻩ ﻫﺎﻱ ﻏﻴﺮ ﻗﺎﺑﻞ ﭘﻴﺶ
ﺑﻴﻨﻲ ﺍﻭﻟﻴﻪ ،ﺗﻮﺳﻌﻪ ﺷﺒﮑﻪ ﺭﺍ ﺑﺎ ﻣﺸﮑﻞ ﻣﻮﺍﺟﻪ ﺧﻮﺍﻫﺪ ﮐﺮﺩ. •
ﻭﺍﺑﺴﺘﮕﻲ ﺑﻪ ﻧﻘﻄﻪ ﻣﺮﮐﺰﻱ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻧﻘﻄﻪ ﻣﺮﮐﺰﻱ )ﻫﺎﺏ( ﺩﺭ ﺷﺒﮑﻪ ﺑﺎ ﻣﺸﮑﻞ ﻣﻮﺍﺟﻪ ﺷﻮﺩ ،ﺗﻤﺎﻡ ﺷﺒﮑﻪ ﻏﻴﺮﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
ﺗﻮﭘﻮﻟﻮﮊﻱ RING
ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺗﻮﭘﻮﻟﻮﮊﻱ ﺗﻤﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺑﺼﻮﺭﺕ ﻳﮏ ﺣﻠﻘﻪ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺮﺗﺒﻂ
ﻣﻲ ﮔﺮﺩﻧﺪ .ﺗﻤﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ )ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ،ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ( ﺑﻪ ﻳﮏ ﮐﺎﺑﻞ ﮐﻪ ﺑﺼﻮﺭﺕ ﻳﮏ ﺩﺍﻳﺮﻩ ﺑﺴﺘﻪ ﺍﺳﺖ ،ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ﻫﺮ ﮔﺮﻩ ﺑﻪ ﺩﻭ ﻭ
ﻓﻘﻂ ﺩﻭ ﻫﻤﺴﺎﻳﻪ ﻣﺠﺎﻭﺭ ﺧﻮﺩ ﻣﺘﺼﻞ ﺍﺳﺖ .ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﮔﺮﻩ ﻣﺠﺎﻭﺭ ﺩﺭﻳﺎﻓﺖ ﻭ ﺑﻪ ﮔﺮﻩ ﺑﻌﺪﻱ ﺍﺭﺳﺎﻝ ﻣﻲ ﺷﻮﻧﺪ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺩﺍﺩﻩ ﻫﺎ ﻓﻘﻂ ﺩﺭ ﻳﮏ ﺟﻬﺖ ﺣﺮﮐﺖ ﮐﺮﺩﻩ ﻭ ﺍﺯ ﺍﻳﺴﺘﮕﺎﻫﻲ ﺑﻪ ﺍﻳﺴﺘﮕﺎﻩ ﺩﻳﮕﺮ ﺍﻧﺘﻘﺎﻝ ﭘﻴﺪﺍ ﻣﻲ ﮐﻨﻨﺪ.
ﻣﺰﺍﻳﺎﻱ ﺗﻮﭘﻮﻟﻮﮊﻱ RING •
ﮐﻢ ﺑﻮﺩﻥ ﻃﻮﻝ ﮐﺎﺑﻞ .ﻃﻮﻝ ﮐﺎﺑﻠﻲ ﮐﻪ ﺩﺭ ﺍﻳﻦ ﻣﺪﻝ ﺑﮑﺎﺭ ﮔﺮﻓﺘﻪ ﻣﻲ ﺷﻮﺩ ،ﻗﺎﺑﻞ
ﻣﻘﺎﻳﺴﻪ ﺑﻪ ﺗﻮﭘﻮﻟﻮﮊﻱ BUSﻧﺒﻮﺩﻩ ﻭ ﻃﻮﻝ ﮐﻤﻲ ﺭﺍ ﺩﺭ ﺑﺮﺩﺍﺭﺩ .ﻭﻳﮋﮔﻲ ﻓﻮﻕ ﺑﺎﻋﺚ
119
ﮐﺎﻫﺶ ﺗﻌﺪﺍﺩ ﺍﺗﺼﺎﻻﺕ )ﮐﺎﻧﮑﺘﻮﺭ( ﺩﺭ ﺷﺒﮑﻪ ﺷﺪﻩ ﻭ ﺿﺮﻳﺐ ﺍﻋﺘﻤﺎﺩ ﺑﻪ ﺷﺒﮑﻪ ﺭﺍ
ﺍﻓﺰﺍﻳﺶ ﺧﻮﺍﻫﺪ ﺩﺍﺩ. •
ﻧﻴﺎﺯ ﺑﻪ ﻓﻀﺎﺋﻲ ﺧﺎﺹ ﺟﻬﺖ ﺍﻧﺸﻌﺎﺑﺎﺕ ﺩﺭ ﮐﺎﺑﻞ ﮐﺸﻲ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ.ﺑﺪﻟﻴﻞ ﺍﺳﺘﻔﺎﺩﻩ
ﺍﺯ ﻳﮏ ﮐﺎﺑﻞ ﺟﻬﺖ ﺍﺗﺼﺎﻝ ﻫﺮ ﮔﺮﻩ ﺑﻪ ﮔﺮﻩ ﻫﻤﺴﺎﻳﻪ ﺍﺵ ،ﺍﺧﺘﺼﺎﺹ ﻣﺤﻞ ﻫﺎﺋﻲ ﺧﺎﺹ ﺑﻪ ﻣﻨﻈﻮﺭ ﮐﺎﺑﻞ ﮐﺸﻲ ﺿﺮﻭﺭﺗﻲ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ.
•
ﻣﻨﺎﺳﺐ ﺟﻬﺖ ﻓﻴﺒﺮ ﻧﻮﺭﻱ .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺑﺎﻋﺚ ﺑﺎﻻ ﺭﻓﺘﻦ ﻧﺮﺥ ﺳﺮﻋﺖ
ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺖ .ﭼﻮﻥ ﺩﺭ ﺗﻮﭘﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺗﺮﺍﻓﻴﮏ ﺩﺍﺩﻩ ﻫﺎ ﺩﺭ ﻳﮏ ﺟﻬﺖ ﺍﺳﺖ ،ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ .ﺩﺭ ﺻﻮﺭﺕ
ﺗﻤﺎﻳﻞ ﻣﻲ ﺗﻮﺍﻥ ﺩﺭ ﻫﺮ ﺑﺨﺶ ﺍﺯﺷﺒﮑﻪ ﺍﺯ ﻳﮏ ﻧﻮﻉ ﮐﺎﺑﻞ ﺑﻪ ﻋﻨﻮﺍﻥ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ .ﻣﺜﻼ" ﺩﺭ ﻣﺤﻴﻂ ﻫﺎﻱ ﺍﺩﺭﺍﻱ ﺍﺯ ﻣﺪﻝ ﻫﺎﻱ ﻣﺴﻲ ﻭ ﺩﺭ ﻣﺤﻴﻂ ﮐﺎﺭﺧﺎﻧﻪ ﺍﺯ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ.
ﻣﻌﺎﻳﺐ ﺗﻮﭘﻮﻟﻮﮊﻱ RING •
ﺍﺷﮑﺎﻝ ﺩﺭ ﻳﮏ ﮔﺮﻩ ﺑﺎﻋﺚ ﺍﺷﮑﺎﻝ ﺩﺭ ﺗﻤﺎﻡ ﺷﺒﮑﻪ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺻﻮﺭﺕ ﺑﺮﻭﺯ
ﺍﺷﮑﺎﻝ ﺩﺭ ﻳﮏ ﮔﺮﻩ ،ﺗﻤﺎﻡ ﺷﺒﮑﻪ ﺑﺎ ﺍﺷﮑﺎﻝ ﻣﻮﺍﺟﻪ ﺧﻮﺍﻫﺪ ﺷﺪ .ﻭ ﺗﺎ ﺯﻣﺎﻧﻴﮑﻪ ﮔﺮﻩ ﻣﻌﻴﻮﺏ ﺍﺯ ﺷﺒـﮑﻪ ﺧﺎﺭﺝ ﻧﮕﺮﺩﺩ ،ﻫــﻴﭽﮕﻮﻧﻪ ﺗﺮﺍﻓﻴــــﮏ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺭﻭﻱ ﺷﺒــﮑﻪ ﻧﻤﻲ ﺗﻮﺍﻥ ﺩﺍﺷﺖ.
•
ﺍﺷﮑﺎﻝ ﺯﺩﺍﺋﻲ ﻣﺸﮑﻞ ﺍﺳﺖ .ﺑﺮﻭﺯ ﺍﺷﮑﺎﻝ ﺩﺭ ﻳﮏ ﮔﺮﻩ ﻣﻲ ﺗﻮﺍﻧﺪ ﺭﻭﻱ ﺗﻤﺎﻡ ﮔﺮﻫﻬﺎﻱ ﺩﻳﮕﺮ ﺗﺎﺛﻴﺮ ﮔﺬﺍﺭ ﺑﺎﺷﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﻋﻴﺐ ﻳﺎﺑﻲ ﻣﻲ ﺑﺎﻳﺴﺖ ﭼﻨﺪﻳﻦ ﮔﺮﻩ
ﺑﺮﺭﺳﻲ ﺗﺎ ﮔﺮﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﭘﻴﺪﺍ ﮔﺮﺩﺩ. •
ﺗﻐﻴﻴﺮ ﺩﺭﺳﺎﺧﺘﺎﺭﺷﺒﮑﻪ ﻣﺸﮑﻞ ﺍﺳﺖ .ﺩﺭ ﺯﻣﺎﻥ ﮔﺴﺘﺮﺵ ﻭ ﻳﺎ ﺍﺻﻼﺡ ﺣﻮﺯﻩ
ﺟﻐﺮﺍﻓﻴﺎﺋﻲ ﺗﺤﺖ ﭘﻮﺷﺶ ﺷﺒﮑﻪ ،ﺑﺪﻟﻴﻞ ﻣﺎﻫﻴﺖ ﺣﻠﻘﻮﻱ ﺷﺒﮑﻪ ﻣﺴﺎﺋﻠﻲ ﺑﻮﺟﻮﺩ ﺧﻮﺍﻫﺪ
ﺁﻣﺪ. •
ﺗﻮﭘﻮﻟﻮﮊﻱ ﺑﺮ ﺭﻭﻱ ﻧﻮﻉ ﺩﺳﺘﻴﺎﺑﻲ ﺗﺎﺛﻴﺮ ﻣﻲ ﮔﺬﺍﺭﺩ .ﻫﺮ ﮔﺮﻩ ﺩﺭ ﺷﺒﮑﻪ ﺩﺍﺭﺍﻱ ﻣﺴﺌﻮﻟﻴﺖ ﻋﺒﻮﺭ ﺩﺍﺩﻥ ﺩﺍﺩﻩ ﺍﻱ ﺍﺳﺖ ﮐﻪ ﺍﺯ ﮔﺮﻩ ﻣﺠﺎﻭﺭ ﺩﺭﻳﺎﻓﺖ ﺩﺍﺷﺘﻪ ﺍﺳﺖ .ﻗﺒﻞ ﺍﺯ 120
ﺍﻳﻨﮑﻪ ﻳﮏ ﮔﺮﻩ ﺑﺘﻮﺍﻧﺪ ﺩﺍﺩﻩ ﺧﻮﺩ ﺭﺍ ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ ﺑﺮﺳﺪ ﮐﻪ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺎﺑﻞ ﺩﺳﺘﻴﺎﺑﻲ ﺍﺳﺖ.
ﺗﻘﺴﻴﻢ ﺑﻨﺪﻱ ﺑﺮ ﺍﺳﺎﺱ ﺣﻮﺯﻩ ﺟﻐﺮﺍﻓﻲ ﺗﺤﺖ ﭘﻮﺷﺶ .
ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺣﻮﺯﻩ ﺟﻐﺮﺍﻓﻴﺎﺋﻲ ﺗﺤﺖ ﭘﻮﺷﺶ ﺑﻪ ﺳﻪ ﮔﺮﻭﻩ ﺗﻘﺴﻴﻢ
ﻣﻲ ﮔﺮﺩﻧﺪ: •
ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺤﻠﻲ ) ﮐﻮﭼﮏ ( LAN
•
ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺘﻮﺳﻂ MAN
•
ﺷﺒﮑﻪ ﻫﺎﻱ ﮔﺴﺘﺮﺩﻩ WAN
ﺷﺒﮑﻪ ﻫﺎﻱ . LANﺣﻮﺯﻩ ﺟﻐﺮﺍﻓﻴﺎﺋﻲ ﮐﻪ ﺗﻮﺳﻂ ﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎ ﭘﻮﺷﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ ،ﻳﮏ ﻣﺤﻴﻂ ﮐﻮﭼﮏ ﻧﻈﻴﺮ ﻳﮏ ﺳﺎﺧﺘﻤﺎﻥ ﺍﺩﺍﺭﻱ ﺍﺳﺖ .ﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎ ﺩﺍﺭﺍﻱ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﺯﻳﺮ ﻣﻲ ﺑﺎﺷﻨﺪ: •
ﺗﻮﺍﻧﺎﺋﻲ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ
•
ﻣﺤﺪﻭﺩﻳﺖ ﻓﺎﺻﻠﻪ
•
ﻗﺎﺑﻠﻴﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺤﻴﻂ ﻣﺨﺎﺑﺮﺍﺗﻲ ﺍﺭﺯﺍﻥ ﻧﻈﻴﺮ ﺧﻄﻮﻁ ﺗﻠﻔﻦ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ
•
ﻧﺮﺥ ﭘﺎﻳﻴﻦ ﺧﻄﺎﺀ ﺩﺭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺤﺪﻭﺩ ﺑﻮﺩﻥ ﻓﺎﺻﻠﻪ
ﺍﻃﻼﻋﺎﺕ
ﺷﺒﮑﻪ ﻫﺎﻱ . MANﺣﻮﺯﻩ ﺟﻐﺮﺍﻓﻴﺎﺋﻲ ﮐﻪ ﺗﻮﺳﻂ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ﭘﻮﺷﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ، ﺩﺭ ﺣﺪ ﻭ ﺍﻧﺪﺍﺯﻩ ﻳﮏ ﺷﻬﺮ ﻭ ﻳﺎ ﺷﻬﺮﺳﺘﺎﻥ ﺍﺳﺖ .ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎ ﺑﺸﺮﺡ
ﺯﻳﺮ ﺍﺳﺖ: •
ﭘﻴﭽﻴﺪﮔﻲ ﺑﻴﺸﺘﺮ ﻧﺴﺒﺖ ﺑﻪ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺤﻠﻲ
•
ﻗﺎﺑﻠﻴﺖ ﺍﺭﺳﺎﻝ ﺗﺼﺎﻭﻳﺮ ﻭ ﺻﺪﺍ
•
ﻗﺎﺑﻠﻴﺖ ﺍﻳﺠﺎﺩ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﭼﻨﺪﻳﻦ ﺷﺒﮑﻪ
121
ﺷﺒﮑﻪ ﻫﺎﻱ . WANﺣﻮﺯﻩ ﺟﻐﺮﺍﻓﻴﺎﺋﻲ ﮐﻪ ﺗﻮﺳﻂ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ﭘﻮﺷﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ، ﺩﺭ ﺣﺪ ﻭ ﺍﻧﺪﺍﺯﻩ ﮐﺸﻮﺭ ﻭ ﻗﺎﺭﻩ ﺍﺳﺖ .ﻭﻳﮋﮔﻲ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ﺑﺸﺮﺡ ﺯﻳﺮ ﺍﺳﺖ: •
ﻗﺎﺑﻠﻴﺖ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﻴﻦ ﮐﺸﻮﺭﻫﺎ ﻭ ﻗﺎﺭﻩ ﻫﺎ
•
ﻗﺎﺑﻠﻴﺖ ﺍﻳﺠﺎﺩ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺷﺒﮑﻪ ﻫﺎﻱ LAN
•
ﺳﺮﻋﺖ ﭘﺎﻳﻴﻦ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻧﺴﺒﺖ ﺑﻪ ﺷﺒﮑﻪ ﻫﺎﻱ LAN
•
ﻧﺮﺥ ﺧﻄﺎﻱ ﺑﺎﻻ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﮔﺴﺘﺮﺩﮔﻲ ﻣﺤﺪﻭﺩﻩ ﺗﺤﺖ ﭘﻮﺷﺶ
ﮐﺎﺑﻞ ﺩﺭ ﺷﺒﮑﻪ
ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺤﻠﻲ ﺍﺯ ﮐﺎﺑﻞ ﺑﻪ ﻋﻨﻮﺍﻥ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﻭ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺍﺯﭼﻨﺪﻳﻦ ﻧﻮﻉ ﮐﺎﺑﻞ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺤﻠﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﻣﻤﮑﻦ ﺍﺳﺖ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺻﺮﻓﺎ" ﺍﺯ ﻳﮏ ﻧﻮﻉ ﮐﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻭ ﻳﺎ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺷﺮﺍﻳﻂ ﻣﻮﺟﻮﺩ ﺍﺯ ﭼﻨﺪﻳﻦ ﻧﻮﻉ ﮐﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ .ﻧﻮﻉ ﮐﺎﺑﻞ ﺍﻧﺘﺨﺎﺏ ﺷﺪﻩ ﺑﺮﺍﻱ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ
ﻋﻮﺍﻣﻞ ﻣﺘﻔﺎﻭﺗﻲ ﻧﻈﻴﺮ :ﺗﻮﭘﻮﻟﻮﮊﻱ ﺷﺒﮑﻪ ،ﭘﺮﻭﺗﮑﻞ ﻭ ﺍﻧﺪﺍﺯﻩ ﺷﺒﮑﻪ ﺑﺴﺘﮕﻲ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ.
ﺁﮔﺎﻫﻲ ﺍﺯ ﺧﺼﺎﻳﺺ ﻭ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎ ﻭ ﺗﺎﺛﻴﺮ ﻫﺮ ﻳﮏ ﺍﺯ ﺁﻧﻬﺎ ﺑﺮ ﺳﺎﻳﺮ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﺷﺒﮑﻪ ،ﺑﻪ ﻣﻨﻈﻮﺭ ﻃﺮﺍﺣﻲ ﻭ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻳﮏ ﺷﺒﮑﻪ ﻣﻮﻓﻖ ﺑﺴﻴﺎﺭ ﻻﺯﻡ
ﺍﺳﺖ.
ﮐﺎﺑﻞ (UTP( Unshielded Twisted pair ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﻧﻮﻉ ﮐﺎﺑﻠﻲ ﮐﻪ ﺩﺭ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ ،ﮐﺎﺑﻞ ﻫﺎﻱ ﺑﻬﻢ ﺗﺎﺑﻴﺪﻩ
ﻣﻲ ﺑﺎﺷﻨﺪ .ﺍﻳﻦ ﻧﻮﻉ ﮐﺎﺑﻞ ﻫﺎ ﺩﺍﺭﺍﻱ ﺩﻭ ﺭﺷﺘﻪ ﺳﻴﻢ ﺑﻪ ﻫﻢ ﭘﻴﭽﻴﺪﻩ ﺑﻮﺩﻩ ﮐﻪ ﻫﺮ ﺩﻭ ﻧﺴﺒﺖ ﺯﻣﻴﻦ ﺩﺍﺭﺍﻱ ﻳﮏ ﺍﻣﭙﺪﺍﻧﺶ ﻳﮑﺴﺎﻥ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺍﻣﮑﺎﻥ ﺗﺎﺛﻴﺮ ﭘﺬﻳﺮﻱ ﺍﻳﻦ ﻧﻮﻉ ﮐﺎﺑﻞ ﻫﺎ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ﻣﺠﺎﻭﺭ ﻭ ﻳﺎ ﺳﺎﻳﺮ ﻣﻨﺎﺑﻊ ﺧﺎﺭﺟﻲ ﮐﺎﻫﺶ ﺧﻮﺍﻫﺪ ﻳﺎﻓﺖ .ﮐﺎﺑﻞ ﻫﺎﻱ ﺑﻬﻢ
ﺗﺎﺑﻴﺪﻩ ﺩﺍﺭﺍﻱ ﺩﻭ ﻣﺪﻝ ﻣﺘﻔﺎﻭﺕ) Shielded :ﺭﻭﮐﺶ ﺩﺍﺭ( ﻭ ) Unshieldedﺑﺪﻭﻥ ﺭﻭﮐﺶ( ﻣﻲ ﺑﺎﺷﻨﺪ .ﮐﺎﺑﻞ UTPﻧﺴﺒﺖ ﺑﻪ ﮐﺎﺑﻞ STPﺑﻤﺮﺍﺗﺐ ﻣﺘﺪﺍﻭﻝ ﺗﺮ ﺑﻮﺩﻩ ﻭ ﺩﺭ ﺍﮐﺜﺮ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺤﻠﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ. 122
ﮐﻴﻔﻴﺖ ﮐﺎﺑﻞ ﻫﺎﻱ UTPﻣﺘﻐﻴﺮ ﺑﻮﺩﻩ ﻭ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ﻣﻌﻤﻮﻟﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺑﺮﺍﻱ ﺗﻠﻔﻦ ﺗﺎ
ﮐﺎﺑﻞ ﻫﺎﻱ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ﺭﺍ ﺷﺎﻣﻞ ﻣﻲ ﮔﺮﺩﺩ .ﮐﺎﺑﻞ ﺩﺍﺭﺍﻱ ﭼﻬﺎﺭ ﺯﻭﺝ ﺳﻴﻢ ﺑﻮﺩﻩ ﻭ ﺩﺭﻭﻥ
ﻳﮏ ﺭﻭﮐﺶ ﻗﺮﺍﺭ ﻣﻲ ﮔﻴﺮﻧﺪ .ﻫﺮ ﺯﻭﺝ ﺑﺎ ﺗﻌﺪﺍﺩ ﻣﺸﺨﺼﻲ ﭘﻴﭻ ﺗﺎﺑﺎﻧﺪﻩ ﺷﺪﻩ ) ﺩﺭ ﻭﺍﺣﺪ ﺍﻳﻨﭻ ( ﺗﺎ ﺗﺎﺛﻴﺮ ﭘﺬﻳﺮﻱ ﺁﻥ ﺍﺯ ﺳﺎﻳﺮ ﺯﻭﺝ ﻫﺎ ﻭ ﻳﺎﺳﺎﻳﺮ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺍﻟﮑﺘﺮﻳﮑﻲ ﮐﺎﻫﺶ ﻳﺎﺑﺪ.
ﮐﺎﺑﻞ ﻫﺎﻱ UTPﺩﺍﺭﺍﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺑﻮﺩﻩ ﮐﻪ ﺩﺭ ﮔﺮﻭﻫﻬﺎﻱ )(Categories
ﻣﺘﻔﺎﻭﺕ ﺯﻳﺮ ﺗﻘﺴﻴﻢ ﺷﺪﻩ ﺍﻧﺪ:
ﮐﺎﺭﺑﺮﺩ
Type
Cat 1ﻓﻘﻂ ﺻﻮﺕ ) ﮐﺎﺑﻞ ﻫﺎﻱ ﺗﻠﻔﻦ ( Cat 2ﺩﺍﺩﻩ ﺑﺎ ﺳﺮﻋﺖ ٤ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ Cat 3ﺩﺍﺩﻩ ﺑﺎ ﺳﺮﻋﺖ ١٠ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ Cat 4ﺩﺍﺩﻩ ﺑﺎ ﺳﺮﻋﺖ ٢٠ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ Cat 5ﺩﺍﺩﻩ ﺑﺎ ﺳﺮﻋﺖ ١٠٠ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ
ﻣﺰﺍﻳﺎﻱ ﮐﺎﺑﻞ ﻫﺎﻱ ﺑﻬﻢ ﺗﺎﺑﻴﺪﻩ : •
ﺳﺎﺩﮔﻲ ﻭ ﻧﺼﺐ ﺁﺳﺎﻥ
•
ﺍﻧﻌﻄﺎﻑ ﭘﺬﻳﺮﻱ ﻣﻨﺎﺳﺐ
•
ﺩﺍﺭﺍﻱ ﻭﺯﻥ ﮐﻢ ﺑﻮﺩﻩ ﻭ ﺑﺮﺍﺣﺘﻲ ﺑﻬﻢ ﺗﺎﺑﻴﺪﻩ ﻣﻲ ﮔﺮﺩﻧﺪ.
123
ﻣﻌﺎﻳﺐ ﮐﺎﺑﻞ ﻫﺎﻱ ﺑﻬﻢ ﺗﺎﺑﻴﺪﻩ : •
ﺗﻀﻌﻴﻒ ﻓﺮﮐﺎﻧﺲ
•
ﺑﺪﻭﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﮑﺮﺍﺭﮐﻨﻨﺪﻩ ﻫﺎ ،ﻗﺎﺩﺭ ﺑﻪ ﺣﻤﻞ ﺳﻴﮕﻨﺎﻝ ﺩﺭ ﻣﺴﺎﻓﺖ ﻫﺎﻱ ﻃﻮﻻﻧﻲ
•
ﭘﺎﻳﻴﻦ ﺑﻮﺩﻥ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ
•
ﺑﺪﻟﻴﻞ ﭘﺬﻳﺮﺵ ﭘﺎﺭﺍﺯﻳﺖ ﺩﺭ ﻣﺤﻴﻂ ﻫﺎﻱ ﺍﻟﮑﺘﺮﻳﮑﻲ ﺳﻨﮕﻴﻦ ﺑﺨﺪﻣﺖ ﮔﺮﻓﺘﻪ ﻧﻤﻲ ﺷﻮﻧﺪ.
ﻧﻤﻲ ﺑﺎﺷﻨﺪ.
ﮐﺎﻧﮑﺘﻮﺭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺑﺮﺍﻱ ﮐﺎﺑﻞ ﻫﺎﻱ ،UTPﺍﺯ ﻧﻮﻉ RJ-45ﻣﻲ ﺑﺎﺷﺪ .ﮐﺎﻧﮑﺘﻮﺭ ﻓﻮﻕ ﺷﺒﺎﻫﺖ ﺯﻳﺎﺩﻱ ﺑﻪ ﮐﺎﻧﮑﺘﻮﺭﻫﺎﻱ ﺗﻠﻔﻦ ) (RJ-11ﺩﺍﺭﺩ .ﻫﺮ ﻳﮏ ﺍﺯ ﭘﻴﻦ ﻫﺎﻱ ﮐﺎﻧﮑﺘﻮﺭ ﻓﻮﻕ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺪﺭﺳﺘﻲ ﭘﻴﮑﺮﺑﻨﺪﻱ ﮔﺮﺩﻧﺪ( Jack Registered:RJ ) .
ﮐﺎﺑﻞ ﮐﻮﺍﮐﺴﻴﺎﻝ ﻳﮑﻲ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﻣﺤﻴﻂ ﻫﺎﻱ ﺍﻧﺘﻘﺎﻝ ﺩﺭ ﻣﺨﺎﺑﺮﺍﺕ ﮐﺎﺑﻞ ﮐﻮﺍﮐﺴﻴﺎﻝ ﻭ ﻳﺎ ﻫﻢ ﻣﺤﻮﺭ
ﻣﻲ ﺑﺎﺷﺪ .ﺍﻳﻦ ﻧﻮﻉ ﮐﺎﺑﻞ ﻫﺎ ﺍﺯ ﺳﺎﻝ ١٩٣٦ﺑﺮﺍﻱ ﺍﻧﺘﻘﺎﻝ ﺍﺧﺒﺎﺭ ﻭ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺩﻧﻴﺎﺭ ﺑﻪ ﮐﺎﺭ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺍﻧﺪ .ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﮐﺎﺑﻞ ﻫﺎ ،ﺩﻭ ﺳﻴﻢ ﺗﺸﮑﻴﻞ ﺩﻫﻨﺪﻩ ﻳﮏ ﺯﻭﺝ ،ﺍﺯ ﺣﺎﻟﺖ ﻣﺘﻘﺎﺭﻥ ﺧﺎﺭﺝ ﺷﺪﻩ ﻭ ﻫﺮ ﺯﻭﺝ ﺍﺯ ﻳﮏ ﺳﻴﻢ ﺩﺭ ﻣﻐﺰ ﻭ ﻳﮏ ﻻﻳﻪ ﻣﺴﻲ ﺑﺎﻓﺘﻪ ﺷﺪﻩ ﺩﺭ ﺍﻃﺮﺍﻑ ﺁﻥ
ﺗﺸﮑﻴﻞ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﻧﻮﻉ ﺩﻳﮕﺮ ﮐﺎﺑﻞ ﻫﺎﻱ ﮐﻮﺍﮐﺴﻴﺎﻝ ،ﺑﻪ ﺣﺎﻱ ﻻﻳﻪ ﻣﺴﻲ ﺑﺎﻓﺘﻪ ﺷﺪﻩ ،ﺍﺯ ﺗﻴﻮﭖ ﻣﺴﻲ ﺍﺳﺘﻮﺍﻧﻪ ﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ .ﻣﺎﺩﻩ ﺍﻱ ﭘﻼﺳﺘﻴﮑﻲ ﺍﻳﻦ ﺩﻭ ﻫﺎﺩﻱ ﺭﺍ ﺍﺯ ﻳﮑﺪﻳﮕﺮ ﺟﺪﺍ ﻣﻲ ﮐﻨﺪ .ﻣﺎﺩﻩ ﭘﻼﺳﺘﻴﮑﻲ ﻣﻤﮑﻦ ﺍﺳﺖ ﺑﺼﻮﺭﺕ ﺩﻳﺴﮑﻬﺎﻱ ﭘﻼﺳﺘﻴﮑﻲ ﻳﺎ ﺷﻴﺸﻪ ﺍﻱ ﺩﺭ
ﻓﻮﺍﺻﻞ ﻣﺨﺘﻠﻒ ﺍﺳﺘﻔﺎﺩﻩ ﻭ ﻣﺎﻧﻊ ﺍﺯ ﺗﻤﺎﺱ ﺩﻭ ﻫﺎﺩﻱ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺷﻮﺩ ﻭ ﻳﺎ ﻣﻤﮑﻦ ﺍﺳﺖ ﺩﻭ ﻫﺎﺩﻱ ﺩﺭ ﺗﻤﺎﻡ ﻃﻮﻝ ﮐﺎﺑﻞ ﺑﻮﺳﻴﻠﻪ ﻣﻮﺍﺩ ﭘﻼﺳﺘﻴﮑﻲ ﺍﺯ ﻳﮑﺪﻳﮕﺮ ﺟﺪﺍ ﮔﺮﺩﻧﺪ.
124
ﻣﺰﺍﻳﺎﻱ ﮐﺎﺑﻞ ﻫﺎﻱ ﮐﻮﺍﮐﺴﻴﺎﻝ :
•
ﻗﺎﺑﻠﻴﺖ ﺍﻋﺘﻤﺎﺩ ﺑﺎﻻ
•
ﻇﺮﻓﻴﺖ ﺑﺎﻻﻱ ﺍﻧﺘﻘﺎﻝ ،ﺣﺪﺍﮐﺜﺮ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ٣٠٠ﻣﮕﺎﻫﺮﺗﺰ
•
ﺩﻭﺍﻡ ﻭ ﭘﺎﻳﺪﺍﺭﻱ ﺧﻮﺏ
•
ﭘﺎﻳﻄﻦ ﺑﻮﺩﻥ ﻣﺨﺎﺭﺝ ﻧﮕﻬﺪﺍﺭﻱ
•
ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﺁﻧﺎﻟﻮﮒ ﻭ ﺩﻳﺠﻴﺘﺎﻝ
•
ﻫﺰﻳﻨﻪ ﭘﺎﺋﻴﻦ ﺩﺭ ﺯﻣﺎﻥ ﺗﻮﺳﻌﻪ
•
ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻧﺴﺒﺘﺎ" ﻭﺳﻴﻊ ﮐﻪ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺍﮐﺜﺮ ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﻣﺨﺎﺑﺮﺍﺗﻲ ﺍﺯ ﺟﻤﻠﻪ ﺗﻠﻪ ﮐﻨﻔﺮﺍﻧﺲ ﺻﻮﺗﻲ ﻭ ﺗﺼﻮﻳﺮﻱ ﺍﺳﺖ.
ﻣﻌﺎﻳﺐ ﮐﺎﺑﻞ ﻫﺎﻱ ﮐﻮﺍﮐﺴﻴﺎﻝ : •
ﻣﺨﺎﺭﺝ ﺑﺎﻻﻱ ﻧﺼﺐ
•
ﻧﺼﺐ ﻣﺸﮑﻞ ﺗﺮ ﻧﺴﺒﺖ ﺑﻪ ﮐﺎﺑﻞ ﻫﺎﻱ ﺑﻬﻢ ﺗﺎﺑﻴﺪﻩ
•
ﻣﺤﺪﻭﺩﻳﺖ ﻓﺎﺻﻠﻪ
•
ﻧﻴﺎﺯ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻋﻨﺎﺻﺮ ﺧﺎﺹ ﺑﺮﺍﻱ ﺍﻧﺸﻌﺎﺑﺎﺕ
ﺍﺯ ﮐﺎﻧﮑﺘﻮﺭﻫﺎﻱ ) (Bayone -Neill - Concelman(BNCﺑﻬﻤﺮﺍﻩ ﮐﺎﺑﻞ ﻫﺎﻱ
ﮐﻮﺍﮐﺴﻴﺎﻝ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺍﻏﻠﺐ ﮐﺎﺭﺕ ﻫﺎﻱ ﺷﺒﮑﻪ ﺩﺍﺭﺍﻱ ﮐﺎﻧﮑﺘﻮﺭﻫﺎﻱ ﻻﺯﻡ ﺩﺭ ﺍﻳﻦ ﺧﺼﻮﺹ ﻣﻲ ﺑﺎﺷﻨﺪ.
125
ﺷﺒﮑﻪ ﻭ ﺍﻧﻮﺍﻉ ﺁﻥ ﻳﮏ ﺷﺒﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺯ ﺍﺗﺼﺎﻝ ﺩﻭ ﻭ ﻳﺎ ﭼﻨﺪﻳﻦ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺗﺸﮑﻴﻞ ﻣﻲ ﮔﺮﺩﺩ .ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺩﺭ ﺍﺑﻌﺎﺩ ﻣﺘﻔﺎﻭﺕ ﻭ ﺑﺎ ﺍﻫﺪﺍﻑ ﮔﻮﻧﺎﮔﻮﻥ ﻃﺮﺍﺣﻲ ﻭ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻣﻲ ﮔﺮﺩﻧﺪ. ﺷﺒﮑﻪ ﻫﺎﻱ( LAN) Local-Area Networksﻭ)(Wide-Area Networks
( WANﺩﻭ ﻧﻤﻮﻧﻪ ﻣﺘﺪﺍﻭﻝ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ،LANﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﻧﺎﺣﻴﻪ ﻣﺤﺪﻭﺩ ﺟﻐﺮﺍﻓﻴﺎﺋﻲ ﻧﻈﻴﺮ ﻣﻨﺰﻝ ﻭ ﻳﺎ ﻣﺤﻴﻂ ﮐﺎﺭ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ،WANﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﻄﻮﻁ ﺗﻠﻔﻦ ﻭ ﻳﺎ ﻣﺨﺎﺑﺮﺍﺗﻲ ،ﺍﻣﻮﺍﺝ
ﺭﺍﺩﻳﻮﺋﻲ ﻭ ﺳﺎﻳﺮ ﮔﺰﻳــﻨﻪ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ،ﺩﺳﺘــــﮕﺎﻩ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺩﺭ ﻳﮏ ﺷﺒــﮑﻪ ﺑﻪ
ﻳﮑﺪﻳـــﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ. ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﭼﮕﻮﻧﻪ ﺗﻘﺴﻴﻢ ﺑﻨﺪﻱ ﻣﻲ ﮔﺮﺩﻧﺪ ؟
ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺭﺍ ﻣﻲ ﺗﻮﺍﻥ ﺑﺮ ﺍﺳﺎﺱ ﺳﻪ ﻭﻳﮋﮔﻲ ﻣﺘﻔﺎﻭﺕ ﺗﻘﺴﻴﻢ ﻧﻤﻮﺩ:
ﺗﻮﭘﻮﻟﻮﮊﻱ ،ﭘﺮﻭﺗﮑﻞ ﻭ ﻣﻌﻤﺎﺭﻱ •
ﺗﻮﭘﻮﻟﻮﮊﻱ ،ﻧﺤﻮﻩ ﺍﺳﺘﻘﺮﺍﺭ) ﺁﺭﺍﻳﺶ( ﻫﻨﺪﺳﻲ ﻳﮏ ﺷﺒﮑﻪ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ.
•
ﭘﺮﻭﺗﮑﻞ ،ﻣﺠﻤﻮﻋﻪ ﻗﻮﺍﻧﻴﻦ ﻻﺯﻡ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺑﻴﻦ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ
bus , ringﻭ ، starﺳﻪ ﻧﻤﻮﻧﻪ ﻣﺘﺪﺍﻭﻝ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻣﻲ ﺑﺎﺷﻨﺪ.
ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺍﮐﺜﺮ ﺷﺒﮑﻪ ﻫﺎ ﺍﺯ "ﺍﺗﺮﻧﺖ" ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﺩﺭ ﺑﺮﺧﻲ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎ ﻣﻤﮑﻦ ﺍﺳﺖ ﺍﺯ ﭘﺮﻭﺗﮑﻞ Token Ringﺷﺮﮐﺖ IBM ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ .ﭘﺮﻭﺗﮑﻞ ،ﺩﺭ ﺣﻘﻴﺖ ﺑﻪ ﻣﻨﺰﻟﻪ ﻳﮏ ﺍﻋﻼﻣﻴﻪ ﺭﺳﻤﻲ ﺍﺳﺖ ﮐﻪ ﺩﺭ ﺁﻥ
ﻗﻮﺍﻧﻴﻦ ﻭ ﺭﻭﻳﻪ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﻭﻳﺎ ﺩﺭﻳﺎﻓﺖ ﺩﺍﺩﻩ ،ﺗﻌﺮﻳﻒ ﻣﻲ ﮔﺮﺩﺩ. ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺩﺍﺭﺍﻱ ﺩﻭ ﻭ ﻳﺎ ﭼﻨﺪﻳﻦ ﺩﺳﺘﮕﺎﻩ )ﻧﻈﻴﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ( ﺑﺎﺷﻴﻢ ﻭ ﺑﺨﻮﺍﻫﻴﻢ ﺁﻧﺎﻥ ﺭﺍ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺮﺗﺒﻂ ﻧﻤﺎﺋﻴﻢ ،ﻗﻄﻌﺎ" ﺑﻪ ﻭﺟﻮﺩ ﻳﮏ ﭘﺮﻭﺗﮑﻞ ﺩﺭ ﺷﺒﮑﻪ ﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺑﻮﺩ. ﺗﺎﮐﻨﻮﻥ ﺻﺪﻫﺎ ﭘﺮﻭﺗﮑﻞ ﺑﺎ ﺍﻫﺪﺍﻑ ﻣﺘﻔﺎﻭﺕ ﻃﺮﺍﺣﻲ ﻭ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺷﺪﻩ ﺍﺳﺖ.
126
•
TCP/IPﻳﮑﻲ ﺍﺯ ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﭘﺮﻭﺗﮑﻞ ﻫﺎ ﺩﺭ ﺯﻣﻴﻨﻪ ﺷﺒﮑﻪ ﺑﻮﺩﻩ ﮐﻪ ﺧﻮﺩ ﺍﺯ ﻣﺠﻤﻮﻋﻪ
ﭘﺮﻭﺗﮑﻞ ﻫﺎﺋﻲ ﺩﻳﮕﺮ ،ﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺍﺳﺖ .ﺟﺪﻭﻝ ﺯﻳﺮ ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ
TCP/IPﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ .ﺩﺭ ﮐﻨﺎﺭ ﺟﺪﻭﻝ ﻓﻮﻕ ،ﻣﺪﻝ ﻣﺮﺟﻊ OSIﻧﻴﺰ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ ﺗﺎ ﻣﺸﺨﺺ ﮔﺮﺩﺩ ﮐﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻓﻮﻕ ﺩﺭ ﭼﻪ ﻻﻳﻪ ﺍﻱ ﺍﺯ ﻣﺪﻝ
OSIﮐﺎﺭ ﻣﻲ ﮐﻨﻨﺪ .ﺑﻪ ﻣﻮﺍﺯﺍﺕ ﺣﺮﮐﺖ ﺍﺯ ﭘﺎﺋﻴﻦ ﺗﺮﻳﻦ ﻻﻳﻪ )ﻻﻳﻪ ﻓﻴﺰﻳﮑﻲ( ﺑﻪ ﺑﺎﻻﺗﺮﻳﻦ ﻻﻳﻪ )ﻻﻳﻪ ،(Applicationﻫﺮ ﻳﮏ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﺮﺗﺒﻂ ﺑﺎ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻫﺮ ﻻﻳﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺠﺎﻡ ﭘﺮﺩﺍﺯﺵ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ،ﺯﻣﺎﻧﻲ ﺭﺍ ﺻﺮﻑ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ.
ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ TCP/IP
ﻣﺪﻝ ﻣﺮﺟﻊ OSI
• OSIﺍﺯ ﮐﻠﻤﺎﺕ Open Systems Interconnectﺍﻗﺘﺒﺎﺱ ﻭ ﻳﮏ ﻣﺪﻝ ﻣﺮﺟﻊ ﺩﺭ ﺧﺼﻮﺹ ﻧﺤﻮﻩ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﺑﻴﻦ ﺩﻭ ﻧﻘﻄﻪ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﻣﺨﺎﺑﺮﺍﺗﻲ ﻭ ﺍﺭﺗﺒﺎﻃﻲ ﺍﺳﺖ. ﻫﺪﻑ ﻋﻤﺪﻩ ﻣﺪﻝ ،OSIﺍﺭﺍﺋﻪ ﺭﺍﻫﻨﻤﺎﺋﻲ ﻫﺎﻱ ﻻﺯﻡ ﺑﻪ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ ﻣﺤﺼﻮﻻﺕ ﺷﺒﮑﻪ ﺍﻱ ﺑﻪ ﻣﻨﻈﻮﺭ ﺗﻮﻟﻴﺪ ﻣﺤﺼﻮﻻﺕ ﺳﺎﺯﮔﺎﺭ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺍﺳﺖ.
ﻣﺪﻝ OSIﺗﻮﺳﻂ ﮐﻤﻴﺘﻪ IEEEﺍﻳﺠﺎﺩ ﺗﺎ ﻣﺤﺼﻮﻻﺕ ﺗﻮﻟﻴﺪ ﺷﺪﻩ ﺗﻮﺳﻂ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ ﻣﺘﻌﺪﺩ ﻗﺎﺩﺭ ﺑﻪ ﮐﺎﺭ ﻭ ﻳﺎ ﺳﺎﺯﮔﺎﺭﻱ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺑﺎﺷﻨﺪ .ﻣﺸﮑﻞ ﻋﺪﻡ ﺳﺎﺯﮔﺎﺭﻱ ﺑﻴﻦ ﻣﺤﺼﻮﻻﺕ ﺗﻮﻟﻴﺪﺷﺪﻩ ﺗﻮﺳﻂ ﺷﺮﮐﺖ ﻫﺎﻱ ﺑﺰﺭﮒ ﺗﺠﻬﻴﺰﺍﺕ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﺯﻣﺎﻧﻲ
ﺁﻏﺎﺯ ﮔﺮﺩﻳﺪ ﮐﻪ ﺷﺮﮐﺖ HPﺗﺼﻤﻴﻢ ﺑﻪ ﺍﻳﺠﺎﺩ ﻣﺤﺼﻮﻻﺕ ﺷﺒﮑﻪ ﺍﻱ ﻧﻤﻮﺩ ﻭ ﻣﺤﺼﻮﻻﺕ ﺗﻮﻟﻴﺪ ﺷﺪﻩ ﺗﻮﺳﻂ HPﺑﺎ ﻣﺤﺼﻮﻻﺕ ﻣﺸﺎﺑﻪ ﺗﻮﻟﻴﺪ ﺷﺪﻩ ﺗﻮﺳﻂ ﺷﺮﮐﺖ
127
ﻫﺎﻱ ﺩﻳﮕﺮ ﻧﻈﻴﺮ ،IBMﺳﺎﺯﮔﺎﺭ ﻧﺒﻮﺩ .ﻣﺜﻼ" ﺯﻣﺎﻧﻲ ﮐﻪ ﺷﻤﺎ ﭼﻬﻞ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺭﺍ ﺑﺮﺍﻱ ﺷﺮﮐﺖ ﺧﻮﺩ ﺗﻬﻴﻪ ﻣﻲ ﻧﻤﻮﺩﻳﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺳﺎﻳﺮ ﺗﺠﻬﻴﺰﺍﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺷﺒﮑﻪ ﻧﻴﺰ ﺍﺯ
ﻫﻤﺎﻥ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ ﺧﺮﻳﺪﺍﺭﻱ ﻣﻲ ﮔﺮﺩﻳﺪ)ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﻭﺟﻮﺩ ﺳﺎﺯﮔﺎﺭﻱ ﺑﻴﻦ ﺁﻧﺎﻥ(. ﻣﺸﮑﻞ ﻓﻮﻕ ﭘﺲ ﺍﺯ ﻣﻌﺮﻓﻲ ﻣﺪﻝ ﻣﺮﺟﻊ ،OSIﺑﺮﻃﺮﻑ ﮔﺮﺩﻳﺪ. ﻣﺪﻝ OSIﺩﺍﺭﺍﻱ ﻫﻔﺖ ﻻﻳﻪ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ ﮐﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﺁﻧﺎﻥ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺠﺎﻡ
ﻋﻤﻠﻴﺎﺗﻲ ﺧﺎﺻﻲ ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺍﻧﺪ .ﺑﺎﻻﺗﺮﻳﻦ ﻻﻳﻪ ،ﻻﻳﻪ ﻫﻔﺖ ) ( Applicationﻭ ﭘﺎﺋﻴﻦ ﺗﺮﻳﻦ ﻻﻳﻪ ،ﻻﻳﻪ ﻳﮏ ) (Physiacalﻣﻲ ﺑﺎﺷﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻗﺼﺪ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺑﺮﺍﻱ ﻳﮏ ﮐﺎﺭﺑﺮ ﺩﻳﮕﺮ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ،ﺩﺍﺩﻩ ﻫﺎ ﺣﺮﮐﺖ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﻻﻳﻪ ﻫﻔﺘﻢ
ﺷﺮﻭﻉ ﻧﻤﻮﺩﻩ ﻭ ﭘـﺲ ﺍﺯ ﺗـــﺒﺪﻳﻞ ﺑﻪ ﺳﮕﻤﻨﺖ ،datagram ،ﺑﺴـﺘﻪ ﺍﻃﻼﻋــــــﺎﺗﻲ
) ( Packetﻭ ﻓﺮﻳﻢ ،ﺩﺭ ﻧﻬﺎﻳﺖ ﺩﺭ ﻃﻮﻝ ﮐﺎﺑﻞ ) ﻋﻤﻮﻣﺎ" ﮐﺎﺑﻞ
ﻫﺎﻱ ( twisted pairﺍﺭﺳﺎﻝ ﺗﺎ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺑﺮﺳﺪ. •
ﻣﻌﻤﺎﺭﻱ ،ﺑﻪ ﺩﻭ ﮔﺮﻭﻩ ﻋﻤﺪﻩ ﻣﻌﻤﺎﺭﻱ ﮐﻪ ﻋﻤﺪﺗﺎ" ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﮔﺮﺩﺩ ،ﺍﺷﺎﺭﻩ ﻣﻲ ﻧﻤﺎﻳﺪ Peer- Peer-To :ﻭ .Server - Clientﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ Peer-To-Peerﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺍﺧﺘﺼﺎﺻﻲ ﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻪ ﻭ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺍﺯ
ﻃﺮﻳﻖ workgroupﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺷﺘﺮﺍﮎ ﻓﺎﻳﻞ ﻫﺎ ،ﭼﺎﭘﮕﺮﻫﺎ ﻭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ، ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ. •
] ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ، Server - Clientﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭ ﻳﺎ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻧﻲ ﺍﺧﺘﺼﺎﺻﻲ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ) ﻧﻈﻴﺮ ﻳﮏ ﮐﻨﺘﺮﻝ ﮐﻨﻨﺪﻩ Domainﺩﺭ ﻭﻳﻨﺪﻭﺯ ( ﮐﻪ ﺗﻤﺎﻣﻲ
ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺮﻭﻳﺲ ﻫﺎ ﻭ ﺧﺪﻣﺎﺕ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ،ﺑﻪ ﺁﻥ log onﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺍﮐﺜﺮ ﺳﺎﺯﻣﺎﻥ ﻭ ﻣﻮﺳﺴﺎﺕ ﺍﺯ ﻣﻌﻤﺎﺭﻱ Server - Client ﺑﻪ ﻣﻨﻈﻮﺭ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
128
MAC Addressﭼﻴﺴﺖ؟ ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒــﮑﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳـﺎﻳﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ،ﻣﻲ ﺑﺎﻳﺴﺖ
ﺷﻨﺎﺳﺎﺋﻲ ﻭ ﺩﺍﺭﺍﻱ ﻳﮏ ﺁﺩﺭﺱ ﻣﻨﺤﺼﺮﺑﻔﺮﺩ ﺑﺎﺷﺪ .ﻗﻄﻌﺎ" ﺗﺎﮐﻨﻮﻥ ﺑﺎ ﺁﺩﺭﺱ ﻫﺎﻱ IPﻭ ﻳـﺎ ) MACﺍﻗﺘﺒﺎﺱ ﺷﺪﻩ ﺍﺯ ﮐﻠﻤﺎﺕ ( Media Access Controlﺑﺮﺧﻮﺭﺩ ﺩﺍﺷﺘﻪ ﺍﻳﺪ
ﻭ ﺷﺎﻳﺪ ﺍﻳﻦ ﺳﻮﺍﻝ ﺑﺮﺍﻱ ﺷﻤﺎ ﻣﻄﺮﺡ ﺷﺪﻩ ﺑﺎﺷﺪ ﮐﻪ ﺍﻭﻻ" ﺿﺮﻭﺭﺕ ﻭﺟﻮﺩ ﺩﻭ ﻧﻮﻉ ﺁﺩﺭﺱ
ﭼﻴﺴﺖ ﻭ ﺛﺎﻧﻴﺎ" ﺟﺎﻳﮕﺎﻩ ﺍﺳﻔﺎﺩﻩ ﺍﺯ ﺁﻧﺎﻥ ﭼﻴﺴﺖ؟
، MAC Addressﻳﮏ ﺁﺩﺭﺱ ﻓﻴﺰﻳﮑﻲ ﺍﺳﺖ ﺩﺭ ﺣﺎﻟﻲ ﮐﻪ ﺁﺩﺭﺱ ﻫﺎﻱ ، IPﺑﻪ ﻣﻨﺰﻟﻪ ﺁﺩﺭﺱ ﻫﺎﻱ ﻣﻨﻄﻘﻲ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺁﺩﺭﺱ ﻫﺎﻱ ﻣﻨﻄﻘﻲ ﺷﻤﺎ ﺭﺍ ﻣﻠﺰﻡ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ﮐﻪ ﺑﻪ ﻣﻨــﻈﻮﺭ ﭘﻴﮑﺮﺑﻨﺪﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻭ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ،ﺩﺭﺍﻳﻮﺭﻫﺎ ﻭ ﻳﺎ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺧﺎﺻـﻲ ﺭﺍ ﺩﺭ ﺣﺎﻓــﻈﻪ
ﻣﺴﺘﻘﺮ ﻧﻤﺎﺋﻴﺪ ) ﻣﺜﻼ" ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ .( IPﺍﻳﻦ ﻭﺿﻌﻴﺖ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ MAC Addressﺻﺪﻕ ﻧﺨﻮﺍﻫﺪ ﮐﺮﺩ ﻭ ﺍﻳﻨﮕﻮﻧﻪ ﺁﺩﺭﺱ ﻫﺎ ﻧﻴﺎﺯﻣﻨﺪ ﺩﺭﺍﻳﻮﺭﻫﺎﻱ ﺧﺎﺻﻲ ﻧﺨﻮﺍﻫﻨﺪ ﺑﻮﺩ ،ﭼﺮﺍﮐﻪ ﺁﺩﺭﺱ ﻫﺎﻱ ﻓﻮﻕ ﺩﺭﻭﻥ ﺗﺮﺍﺷﻪ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﻗﺮﺍﺭ ﻣﻲ ﮔﻴﺮﻧﺪ. ﺩﻟﻴﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ MAC Address
ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ ﻫﺎﺋﻲ ﺧﺎﺹ ﺷﻨﺎﺳﺎﺋﻲ ﮔﺮﺩﺩ. ﺑﺮﺍﻱ ﺷﻨﺎﺳﺎﺋﻲ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ،ﺻﺮﻑ ﺩﺍﺷﺘﻦ ﻳﮏ ﺁﺩﺭﺱ IPﺑﻪ ﺗﻨﻬﺎﺋﻲ ﮐﻔﺎﻳﺖ ﻧﺨﻮﺍﻫﺪ ﮐﺮﺩ .ﺣﺘﻤﺎ" ﻋﻼﻗﻪ ﻣﻨﺪﻳﺪ ﮐﻪ ﻋﻠﺖ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺭﺍ ﺑﺪﺍﻧﻴﺪ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ،ﻻﺯﻡ ﺍﺳﺖ ﻧﮕﺎﻫﻲ ﺑﻪ ﻣﺪﻝ ﻣﻌﺮﻭﻑ ( OSI (Open Systems Interconnectﻭ ﻻﻳﻪ
ﻫﺎﻱ ﺁﻥ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ:
129
ﻣﺪﻝ OSI ... Networkﻻﻳﻪ ﺳﻮﻡ ﺁﺩﺭﺱ IPﺩﺭ ﺍﻳﻦ Layer ﻻﻳﻪ ﻗﺮﺍﺭ ﺩﺍﺭﺩ DataLinkﻻﻳﻪ ﺩﻭﻡ ﺁﺩﺭﺱ MACﺩﺭ Layer ﺍﻳﻦ ﻻﻳﻪ ﻗﺮﺍﺭ ﺩﺍﺭﺩ Physical Layer
ﻻﻳﻪ ﺍﻭﻝ ﺷﺒﮑﻪ ﻓﻴﺰﻳﮑﻲ
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﻣﺸﺎﻫﺪﻩ ﻣﻲ ﻧﻤﺎﺋﻴﺪ MAC Address ،ﺩﺭ ﻻﻳﻪ ) DataLinkﻻﻳﻪ ﺩﻭﻡ
ﻣﺪﻝ ( OSIﻗﺮﺍﺭ ﺩﺍﺭﺩ ﻭ ﺍﻳﻦ ﻻﻳﻪ ﻣﺴﺌﻮﻝ ﺑﺮﺭﺳﻲ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ﮐﻪ ﺩﺍﺩﻩ ﻣﺘﻌﻠﻖ ﺑﻪ ﮐﺪﺍﻣﻴﮏ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺖ. ﺯﻣﺎﻧﻲ ﮐﻪ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ) ( Packetﺑﻪ ﻻﻳﻪ Datalinkﻣﻲ ﺭﺳﺪ ) ﺍﺯ ﻃﺮﻳﻖ ﻻﻳﻪ
ﺍﻭﻝ ( ،ﻭﻱ ﺁﻥ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻻﻳﻪ ﺑﺎﻻﺋﻲ ﺧﻮﺩ ) ﻻﻳﻪ ﺳﻮﻡ ( ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﺎ
ﻧﻴﺎﺯﻣﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ ﺧﺎﺻﻲ ﺑﻪ ﻣﻨﻈﻮﺭ ﺷﻨﺎﺳﺎﺋﻲ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻗﺒﻞ ﺍﺯ ﻻﻳﻪ ﺳﻮﻡ ﻫﺴـﺘﻴﻢ. ،MAC Addressﺩﺭ ﭘﺎﺳﺦ ﺑﻪ ﻧﻴﺎﺯ ﻓﻮﻕ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﻭ ﺑﺎ ﺍﺳـﺘﻘﺮﺍﺭ ﺩﺭ ﻻﻳﻪ ﺩﻭﻡ،
ﻭﻇﻴﻔﻪ ﺷﻨﺎﺳﺎﺋﻲ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻗﺒﻞ ﺍﺯ ﻻﻳﻪ ﺳﻮﻡ ﺭﺍ ﺑﺮ ﻋﻬﺪﻩ ﺩﺍﺭﺩ .ﺗﻤﺎﻣﻲ ﻣﺎﺷﻴﻦ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺷﺒﮑﻪ ،ﺍﻗﺪﺍﻡ ﺑﻪ ﺑﺮﺭﺳﻲ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻧﻤﻮﺩﻩ ﺗﺎ ﻣﺸﺨﺺ ﮔﺮﺩﺩ ﮐﻪ ﺁﻳﺎ
MAC Addressﻣﻮﺟﻮﺩ ﺩﺭ ﺑﺨﺶ "ﺁﺩﺭﺱ ﻣﻘﺼﺪ " ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺭﺳﺎﻟﻲ ﺑﺎ ﺁﺩﺭﺱ ﺁﻧﺎﻥ ﻣﻄﺎﺑﻘﺖ ﻣﻲ ﻧﻤﺎﻳﺪ؟ ﻻﻳﻪ ﻓﻴﺰﻳﮑﻲ) ﻻﻳﻪ ﺍﻭﻝ ( ﻗﺎﺩﺭ ﺑﻪ ﺷﻨﺎﺧﺖ ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﺍﻟﮑﺘﺮﻳﮑﻲ
ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﺑﻮﺩﻩ ﻭ ﻓﺮﻳﻢ ﻫﺎﺋﻲ ﺭﺍ ﺗﻮﻟﻴﺪ ﻣﻲ ﻧﻤﺎﻳﺪ ﮐﻪ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻻﻳﻪDatalink ﮔﺬﺍﺷﺘﻪ ﻣﻲ ﺷﻮﺩ .ﺩﺭ ﺻﻮﺭﺕ ﻣﻄﺎﺑﻘﺖ MAC Addressﻣﻮﺟﻮﺩ ﺩﺭ ﺑﺨﺶ "ﺁﺩﺭﺱ ﻣﻘﺼﺪ " ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺭﺳﺎﻟﻲ ﺑﺎ MAC Addressﻳﮑﻲ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ، 130
ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﺁﻥ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻭ ﺑﺎ ﺍﺭﺳﺎﻝ ﺁﻥ ﺑﻪ ﻻﻳﻪ ﺳﻮﻡ ،ﺁﺩﺭﺱ ﺷﺒﮑﻪ ﺍﻱ ﺑﺴﺘﻪ
ﺍﻃﻼﻋﺎﺗﻲ ) ( IPﺑﺮﺭﺳﻲ ﺗﺎ ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﮔﺮﺩﺩ ﮐﻪ ﺁﺩﺭﺱ ﻓﻮﻕ ﺑﺎ ﺁﺩﺭﺱ ﺷﺒﮑﻪ ﺍﻱ ﮐﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺎ ﺁﻥ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺷﺪﻩ ﺍﺳﺖ ﺑﺪﺭﺳﺘﻲ ﻣﻄﺎﺑﻘﺖ ﻣﻲ ﻧﻤﺎﻳﺪ. ﺳﺎﺧﺘﺎﺭ MAC Address
ﻳﮏ MAC Addressﺑﺮ ﺭﻭﻱ ﻫﺮ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﻫﻤﻮﺍﺭﻩ ﺩﺍﺭﺍﻱ ﻃﻮﻟﻲ ﻣﺸﺎﺑﻪ ﻭ ﻳﮑﺴﺎﻥ ﻣﻲ ﺑﺎﺷﻨﺪ ) .ﺷﺶ ﺑﺎﻳﺖ ﻭ ﻳﺎ ٤٨ﺑﻴﺖ ( .ﺩﺭ ﺻﻮﺭﺕ ﺑﺮﺭﺳﻲ Address MACﻳﮏ
ﮐﺎﻣﭙﻴﻮﺗﺮ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﺁﻥ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﻧﺼﺐ ﺷﺪﻩ ﺍﺳﺖ ،ﺁﻥ ﺭﺍ ﺑﺎ ﻓﺮﻣﺖ ﻣﺒﻨﺎﻱ ﺷﺎﻧﺰﺩﻩ ) ،( Hexﻣﺸﺎﻫﺪﻩ ﺧﻮﺍﻫﻴﺪ ﺩﻳﺪ .ﻣﺜﻼ" MAC Addressﮐﺎﺭﺕ ﺷﺒﮑﻪ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ
ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﻪ ﺻﻮﺭﺕ ﺯﻳﺮ ﺑﺎﺷﺪ: ﻣﺸﺎﻫﺪﻩ MAC Address ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘﻮﺭ IPconfig/allﻭ ﻣﺸﺎﻫﺪﻩ ﺑﺨﺶ Physical : address BA 50 00 ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺗﻮﺳﻂ
6A DB 79 ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺗﻮﺳﻂ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ
IEEEﺑﺎ ﺗﻮﺟﻪ ﺑﻪ RFC ١٧٠٠
ﺯﻣﺎﻧﻲ ﮐﻪ ﻳﮏ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ ﻧﻈﻴﺮ ﺍﻳﻨﺘﻞ ،ﮐﺎﺭﺕ ﻫﺎ ﻱ ﺷﺒﮑﻪ ﺧﻮﺩ ﺭﺍ ﺗﻮﻟﻴﺪ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺁﻧﺎﻥ ﻫﺮ
ﺁﺩﺭﺱ ﺩﻟﺨﻮﺍﻫﻲ ﺭﺍ ﻧﻤﻲ ﺗﻮﺍﻧﻨﺪ ﺑﺮﺍﻱ MAC Addressﺩﺭ ﻧﻈﺮ ﺑﮕﻴﺮﻧﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺗﻤﺎﻣﻲ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ ﮐﺎﺭﺕ ﻫﺎﻱ ﺷﺒﮑﻪ ﺑﺨﻮﺍﻫﻨﺪ ﺑﺪﻭﻥ ﻭﺟﻮﺩ ﻳﮏ ﺿﺎﺑﻄﻪ ﺧﺎﺹ ،ﺍﻗﺪﺍﻡ ﺑﻪ ﺗﻌﺮﻳﻒ ﺁﺩﺭﺱ ﻫﺎﻱ ﻓﻮﻕ ﻧﻤﺎﻳﻨﺪ ،ﻗﻄﻌﺎ" ﺍﻣﮑﺎﻥ ﺗﻌﺎﺭﺽ ﺑﻴﻦ ﺁﺩﺭﺱ ﻫﺎﻱ ﻓﻮﻕ ﺑﻮﺟﻮﺩ ﺧﻮﺍﻫﺪ
ﺁﻣﺪ ) .ﻋﺪﻡ ﺗﺸﺨﻴﺺ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ ﮐﺎﺭﺕ ﻭ ﻭﺟﻮﺩ ﺩﻭ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺍﺯ ﺩﻭ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ ﻣﺘﻔﺎﻭﺕ ﺑﺎ ﺁﺩﺭﺱ ﻫﺎﻱ ﻳﮑﺴﺎﻥ ( .ﺣﺘﻤﺎ" ﺍﻳﻦ ﺳﻮﺍﻝ ﺑﺮﺍﻱ ﺷﻤﺎ ﻣﻄﺮﺡ ﻣﻲ ﮔﺮﺩﺩ ﮐﻪ
131
MAC Addressﺗﻮﺳﻂ ﭼﻪ ﺍﻓﺮﺍﺩ ﻭ ﻳﺎ ﺳﺎﺯﻣﺎﻥ ﻫﺎﺋﻲ ﻭ ﺑﻪ ﭼﻪ ﺻﻮﺭﺕ ﺑﻪ ﮐﺎﺭﺕ ﻫﺎﻱ
ﺷﺒﮑﻪ ﻧﺴﺒﺖ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ؟ ﺑﻪ ﻣﻨﻈﻮﺭ ﺑﺮﺧﻮﺭﺩ ﺑﺎ ﻣﺸﮑﻼﺕ ﻓﻮﻕ ،ﮔﺮﻭﻩ ، IEEEﻫﺮ MAC Addressﺭﺍ ﺑﻪ ﺩﻭ ﺑﺨﺶ ﻣﺴﺎﻭﻱ ﺗﻘﺴﻴﻢ ﮐﻪ ﺍﺯ ﺍﻭﻟﻴﻦ ﺑﺨﺶ ﺁﻥ ﺑﻪ ﻣﻨﻈﻮﺭ ﺷﻨﺎﺳﺎﺋﻲ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ ﮐﺎﺭﺕ ﻭ ﺩﻭﻣﻴﻦ ﺑﺨﺶ ﺑﻪ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ ﺍﺧﺘﺼﺎﺹ ﺩﺍﺩﻩ ﺷﺪﻩ ﺗﺎ ﺁﻧﺎﻥ
ﻳﮏ ﺷﻤﺎﺭﻩ ﺳﺮﻳﺎﻝ ﺭﺍ ﺩﺭ ﺁﻥ ﺩﺭﺝ ﻧﻤﺎﻳﻨﺪ.
ﮐﺪ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ ﺑﺮ ﺍﺳﺎﺱ RFC-1700ﺑﻪ ﺁﻧﺎﻥ ﻧﺴﺒﺖ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺩﺭ ﺻﻮﺭﺕ ﻣﺸﺎﻫﺪﻩ RFCﻓﻮﻕ ﺣﺘﻤﺎ" ﻣﺘﻮﺟﻪ ﺧﻮﺍﻫﻴﺪ ﺷﺪ ﮐﻪ ﺑﺮﺧﻲ ﺍﺯ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ ﺩﺍﺭﺍﻱ ﺑﻴﺶ ﺍﺯ
ﻳﮏ ﮐﺪ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻋﻠﺖ ﺍﻳﻦ ﺍﻣﺮ ﺑﻪ ﺣﺠﻢ ﮔﺴﺘﺮﺩﻩ ﻣﺤﺼﻮﻻﺕ ﺗﻮﻟﻴﺪﻱ ﺁﻧﺎﻥ ﺑﺮﻣﻲ ﮔﺮﺩﺩ. ﺑﺎ ﺍﻳﻦ ﮐﻪ MAC Addressﺩﺭ ﺣﺎﻓﻈﻪ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺛﺒﺖ ﻣﻲ ﮔﺮﺩﺩ ،ﺑﺮﺧﻲ ﺍﺯ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ ﺑﻪ ﺷﻤﺎ ﺍﻳﻦ ﺍﺟﺎﺯﻩ ﺭﺍ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ ﮐﻪ ﺑﺎ ﺩﺭﻳﺎﻓﺖ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﺧﺎﺹ، ﺑﺘﻮﺍﻧﻴﺪ ﺑﺨﺶ ﺩﻭﻡ MAC Addressﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺧﻮﺩ ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﻫﻴﺪ) ﺷﻤﺎﺭﻩ ﺳﺮﻳﺎﻝ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ( .ﻋﻠﺖ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﺠﺪﺩ ﺍﺯ ﺳﺮﻳﺎﻝ ﻫﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﺳﺎﻳﺮ
ﻣﺤﺼﻮﻻﺕ ﺗﻮﻟﻴﺪ ﺷﺪﻩ ﺗﻮﺳﻂ ﺁﻧﺎﻥ ﺑﺮﻣﻲ ﮔﺮﺩﺩ )ﺗﺠﺎﻭﺯ ﺍﺯ ﻣﺤﺪﻭﺩ ﻣﻮﺭﺩ ﻧﻈﺮ(. ﺩﺭ ﺣﺎﻝ ﺣﺎﺿﺮ ﺍﺣﺘﻤﺎﻝ ﺍﻳﻦ ﮐﻪ ﺷﻤﺎ ﺩﻭ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺭﺍ ﺧﺮﻳﺪﺍﺭﻱ ﻧﻤﺎﺋﻴﺪ ﮐﻪ ﺩﺍﺭﺍﻱ MAC
Addressﻳﮑﺴﺎﻧﻲ ﺑﺎﺷﻨﺪ ،ﺑﺴﻴﺎﺭ ﺿﻌﻴﻒ ﻭ ﺷﺎﻳﺪ ﻫﻢ ﻏﻴﺮﻣﻤﮑﻦ ﺑﺎﺷﺪ.
132
ﻣﺪﻝ ﻣﺮﺟﻊ OSI OSIﺍﺯ ﮐﻠﻤﺎﺕ Open Systems Interconnectﺍﻗﺘﺒﺎﺱ ﻭ ﻳﮏ
ﻣﺪﻝ ﻣﺮﺟﻊ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻧﺤﻮﻩ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﺑﻴﻦ ﺩﻭ ﻧﻘﻄﻪ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﻣﺨﺎﺑﺮﺍﺗﻲ ﻭ ﻳﺎ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺳﺖ .ﻫﺪﻑ ﻋﻤﺪﻩ ﻣﺪﻝ ﻓﻮﻕ ،ﺍﺭﺍﺋﻪ ﺗﻮﺻﻴﻪ ﻫﺎ ﻭ ﺭﺍﻫﻨﻤﺎﺋﻲ ﻫﺎﻱ ﻻﺯﻡ ﺑﻪ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ ﻣﺤﺼﻮﻻﺕ ﺷﺒﮑﻪ ﺍﻱ ﺑﻪ ﻣﻨﻈﻮﺭ ﺗﻮﻟﻴﺪ ﻣﺤﺼﻮﻻﺗﻲ ﺳﺎﺯﮔﺎﺭ ﺑﺎ ﺳﺎﻳﺮ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ
ﺍﺳﺖ.
ﻣﺪﻝ OSIﺗﻮﺳﻂ ﮐﻤﻴﺘﻪ IEEEﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺪﻝ ﻓﻮﻕ ،ﻣﺤﺼﻮﻻﺕ ﺗﻮﻟﻴﺪ ﺷﺪﻩ ﺗﻮﺳﻂ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ ﻣﺨﺘﻠﻒ ﺍﻣﮑﺎﻥ ﮐﺎﺭ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺭﺍ ﭘﻴﺪﺍ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ ) ﺳﺎﺯﮔﺎﺭﻱ ﺑﻴﻦ ﻣﺤﺼﻮﻻﺕ ( .ﻣﺸﮑﻞ ﻋﺪﻡ ﺳﺎﺯﮔﺎﺭﻱ ﺑﻴﻦ ﻣﺤﺼﻮﻻﺕ ﺗﻮﻟﻴﺪﺷﺪﻩ ﺗﻮﺳﻂ
ﺷﺮﮐﺖ ﻫﺎﻱ ﺑﺰﺭﮒ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ ﺗﺠﻬﻴﺰﺍﺕ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ،ﺯﻣﺎﻧﻲ ﺁﻏﺎﺯ ﮔﺮﺩﻳﺪ ﮐﻪ ﺷﺮﮐﺖ HPﺗﺼﻤﻴﻢ ﺑﻪ ﺗﻮﻟﻴﺪ ﻳﮏ ﻣﺤﺼﻮﻝ ﺷﺒﮑﻪ ﺍﻱ ﻧﻤﻮﺩ ﻭ ﺍﻳﻦ ﻣﺤﺼﻮﻝ ﺑﺎ ﻣﺤﺼﻮﻻﺕ ﻣﺸﺎﺑﻪ ﺳﺎﻳﺮ ﺷﺮﮐﺖ ﻫﺎ ) ﻣﺜﻼ" ( IBMﺳﺎﺯﮔﺎﺭ ﻧﺒﻮﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺸﮑﻞ ﻓﻮﻕ ،ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ
ﻗﺼﺪ ﺗﻬﻴﻪ ﭼﻬﻞ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺑﺮﺍﻱ ﺳﺎﺯﻣﺎﻥ ﺧﻮﺩ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺳﺎﻳﺮ ﺗﺠﻬﻴﺰﺍﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺷﺒﮑﻪ ﺭﺍ ﻧﻴﺰ ﺍﺯ ﻫﻤﺎﻥ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ ﺗﻬﻴﻪ ﻣﻲ ﻧﻤﻮﺩﻳﺪ )ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺳﺎﺯﮔﺎﺭﻱ ﺑﻴﻦ ﺁﻧﺎﻥ ( .ﻣﺸﮑﻞ ﻓﻮﻕ ﺗﺎ ﺯﻣﺎﻥ ﺍﻳﺠﺎﺩ ﻣﺪﻝ ﻣﺮﺟﻊ OSIﻫﻤﭽﻨﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺷﺖ
ﻭ ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﮏ ﻣﻌﻈﻞ ﺑﺰﺭﮒ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻣﻄﺮﺡ ﺑﻮﺩ.
ﻣﺪﻝ OSIﺩﺍﺭﺍﻱ ﻫﻔﺖ ﻻﻳﻪ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ ﮐﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﺁﻧﺎﻥ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺗﻲ ﺧﺎﺹ ،ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺍﻧﺪ .ﺑﺎﻻﺗﺮﻳﻦ ﻻﻳﻪ ،ﻻﻳﻪ ﻫﻔﺖ ﻭ ﭘﺎﺋﻴﻦ ﺗﺮﻳﻦ ﻻﻳﻪ ،ﻻﻳﻪ ﻳﮏ ﺍﺳﺖ .ﺩﺭ
ﺯﻣﺎﻥ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺍﺯ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﻳﮕﺮ ،ﺩﺍﺩﻩ ﻫﺎ ﺣﺮﮐﺖ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﻻﻳﻪ ﻫﻔﺘﻢ ﺁﻏﺎﺯ ﻧﻤﻮﺩﻩ ﻭ ﭘﺲ ﺍﺯ ﺗﺒﺪﻳﻞ ﺑﻪ ﺳﮕﻤﻨﺖ ،ﺩﻳﺘﺎﮔﺮﺍﻡ ،ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ) ( Packetﻭ ﻓﺮﻳﻢ، ﺩﺭ ﻧﻬﺎﻳﺖ ﺍﺯ ﻃﺮﻳﻖ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ) ﻣﺜﻼ" ﮐﺎﺑﻞ ( ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﻧﺪ.
133
ﻋﻤﻠﮑﺮﺩ ﻫﺮ ﻳﮏ ﺍﺯ ﻻﻳﻪ ﻫﺎﻱ ﻣﺪﻝ ﻣﺮﺟﻊ : OSI •
ﻻﻳﻪ ) Applicationﻻﻳﻪ ﻫﻔﺘﻢ (
□ ﺍﺭﺍﺋﻪ ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﺷﺒﮑﻪ ﺑﻪ ﺑﺮﻧﺎﻣﻪ ﻫﺎ)ﻧﻈﻴﺮ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ،ﺍﺭﺳﺎﻝ ﻓﺎﻳﻞ ﻫﺎ ﻭ(... □ ﺗﺸﺨﻴﺺ ﺯﻣﺎﻥ ﻻﺯﻡ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺷﺒﮑﻪ •
ﻻﻳﻪ ) Presentationﻻﻳﻪ ﺷﺸﻢ (
□ ﺍﻳﺠﺎﺩ ﺍﻃﻤﻴﻨﺎﻥ ﻻﺯﻡ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺑﻮﺩﻥ ﺩﺍﺩﻩ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻢ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ □ ﻓﺮﻣﺖ ﺩﺍﺩﻩ
□ ﺳﺎﺧﺘﻤﺎﻥ ﻫﺎﻱ ﺩﺍﺩﻩ □ ﺗﻮﺍﻓﻖ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﮔﺮﺍﻣﺮ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﻩ ﺑﺮﺍﻱ ﻻﻳﻪ Application □ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺩﺍﺩﻩ •
ﻻﻳﻪ ) Sessionﻻﻳﻪ ﭘﻨﺠﻢ (
•
ﻻﻳﻪ ) Transportﻻﻳﻪ ﭼﻬﺎﺭﻡ (
□ ﺍ ﻳﺠﺎﺩ ،ﻣﺪﻳﺮﻳﺖ ﻭ ﺧﺎﺗﻤﻪ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﺷﺪﻩ ﺑﻴﻦ ﺑﺮﻧﺎﻣﻪ ﻫﺎ □ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺭﻭﻳﮑﺮﺩﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺣﻤﻞ ﺩﺍﺩﻩ ﺑﻴﻦ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ □ ﺣﻤﻞ ﻣﻄﻤﺌﻦ ﺩﺍﺩﻩ
□ ﺍﻳﺠﺎﺩ ،ﻣﺪﻳﺮﻳﺖ ﻭ ﺧﺎﺗﻤﻪ ﻣﺪﺍﺭﺍﺕ ﻣﺠﺎﺯﻱ 134
□ ﺗﺸﺨﻴﺺ ﻭ ﺑﺮﻃﺮﻑ ﻧﻤﻮﺩﻥ ﺧﻄﺎﺀ
□ ﺗﻘﺴﻴﻢ ﺩﺍﺩﻩ ﺑﻪ ﻓﺮﻳﻢ ﻭ ﻧﺴﺒﺖ ﺩﻫﻲ ﻳﮏ ﺩﻧﺒﺎﻟﻪ ﻋﺪﺩﻱ ﻣﻨﺎﺳﺐ ﺑﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﺁﻧﺎﻥ □ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ UDP ،TCPﻭ SPXﺩﺭ ﺍﻳﻦ ﻻﻳﻪ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ. •
ﻻﻳﻪ ) Networkﻻﻳﻪ ﺳﻮﻡ (
□ ﺍﺭﺍﺋﻪ ﺍﺭﺗﺒﺎﻁ ﻭ ﻣﺴﻴﺮ ﺍﻧﺘﺨﺎﺑﻲ ﺑﺮﺍﻱ ﺩﻭ ﺳﻴﺴﺘﻢ □ ﺣﻮﺯﻩ ﺭﻭﺗﻴﻨﮓ
□ ﭘﺎﺳﺦ ﺑﻪ ﺳﻮﺍﻻﺕ ﻣﺘﻌﺪﺩﻱ ﻧﻈﻴﺮ ﻧﺤﻮﻩ ﺍﺭﺗﺒﺎﻁ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺳﮕﻤﻨﺖ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺷﺒﮑﻪ □ ﺁﺩﺭﺱ ﻫﺎﻱ ﻣﺒﺪﺍﺀ ،ﻣﻘﺼﺪ Subnet ،ﻭ ﺗﺸﺨﻴﺺ ﻣﺴﻴﺮ ﻻﺯﻡ □ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ IPﻭ IPXﺩﺭ ﺍﻳﻦ ﻻﻳﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﻧﺪ. •
ﻻﻳﻪ ) Datalinkﻻﻳﻪ ﺩﻭﻡ ( □ ﺍﻧﺘﻘﺎﻝ ﻣﻄﻤﺌﻦ ﺩﺍﺩﻩ ﺍﺯ ﻃﺮﻳﻖ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ
□ ﺁﺩﺭﺱ ﺩﻫﻲ ﻓﻴﺰﻳﮑﻲ ﻭ ﻳﺎ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ) ،( MACﺗﻮﭘﻮﻟﻮﮊﻱ ﺷﺒﮑﻪ □ ﻓﺮﻳﻢ ﻫﺎ ﺩﺭ ﺍﻳﻦ ﻻﻳﻪ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ. •
ﻻﻳﻪ ) Physicalﻻﻳﻪ ﺍﻭﻝ (
□ ﮐﺎﺑﻞ ﻫﺎ ،ﮐﺎﻧﮑﺘﻮﺭﻫﺎ ،ﻭﻟﺘﺎﮊﻫﺎ ،ﻧﺮﺥ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﻩ □ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﺻﻮﺭﺕ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺑﻴﺖ ﻫﺎ ،ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﺍﻟﮑﺘﺮﻳﮑﻲ ﻭ
ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ
135
OSI ﺑﻪ ﻣﻨﻈﻮﺭ ﺷﻨﺎﺧﺖ ﻣﻨﺎﺳﺐ ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ ﭘﺮﻭﺗﮑﻞ ﺩﺭ ﺷﺒﮑﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺎ ﺑﺮﺧﻲ ﺍﺯ
ﻣﺪﻝ ﻫﺎﻱ ﺭﺍﻳﺞ ﺷﺒﮑﻪ ﮐﻪ ﻣﻌﻤﺎﺭﻱ ﺷﺒﮑﻪ ﺭﺍ ﺗﺸﺮﻳﺢ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﺁﺷﻨﺎ ﮔﺮﺩﻳﺪ.
ﻣﺪﻝ ( Open Systems Interconnection ) OSIﻳﮏ ﻣﺮﺟﻊ ﻣﻨﺎﺳﺐ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺍﺳﺖ .ﺍﻳﻦ ﻣﺪﻝ ﺩﺭ ﺳﺎﻝ ١٩٨٤ﺗﻮﺳﻂ ) ISOﻳﮏ ﺳﺎﺯﻣﺎﻥ ﺑﻴﻦ ﺍﻟﻤﻠﻠﻲ
ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺳﺎﺯﻱ ﺑﺎ ﺑﻴﺶ ﺍﺯ ١٣٠ﻋﻀﻮ( ﺍﺭﺍﺋﻪ ﮔﺮﺩﻳﺪ .ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ﺍﺯ ﻫﻔﺖ ﻻﻳﻪ ﺑﺮﺍﻱ
ﺗﺸﺮﻳﺢ ﻓﺮﺁﻳﻨﺪﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻫﺮﻳﮏ ﺍﺯ ﻻﻳﻪ ﻫﺎ ﻣﺴﻴﻮﻟﻴﺖ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﺧﺎﺻﻲ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﻧﺪ ..ﻣﺪﻝ OSIﺑﻪ ﻋﻨﻮﺍﻥ ﻳﮏ ﻣﺮﺟﻊ ﻭ ﺭﺍﻫﻨﻤﺎ ﺑﺮﺍﻱ ﺷﻨﺎﺧﺖ ﻋﻤﻠﻴﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺁﺷﻨﺎ ﺋﻲ ﺑﺎ ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ ﻳﮏ
ﺷﺒﮑﻪ ،ﻣﻄﺎﻟﻌﻪ ﻣﺪﻝ ﻓﻮﻕ ،ﻣﻔﻴﺪ ﻣﻲ ﺑﺎﺷﺪ .ﺷﮑﻞ ﺯﻳﺮ ﻫﻔﺖ ﻻﻳﻪ ﻣﺪﻝ OSIﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ.
ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﻃﺮﻳﻖ ﻻﻳﻪ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﮔﻴﺮﻧﺪﻩ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺩﺍﺩﻩ ﻫﺎ ﺗﻮﺳﻂ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﻭ ﺗﻮﺳﻂ ﮐﺎﺭﺑﺮ ﺗﻮﻟﻴﺪ ﺧﻮﺍﻫﻨﺪ ﺷﺪ ) ﻧﻈﻴﺮ ﻳﮏ ﭘﻴﺎﻡ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ( .ﺷﺮﻭﻉ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﻫﺎ ﺍﺯ ﻻﻳﻪ Applicationﺍﺳﺖ .ﺩﺭ ﺍﺩﺍﻣﻪ ﻭ ﺑﺎ ﺣﺮﮐﺖ ﺑﻪ ﺳﻤﺖ ﭘﺎﻳﻴﻦ ،ﺩﺭ ﻫﺮ ﻻﻳﻪ ﻋﻤﻠﻴﺎﺕ ﻣﺮﺑﻮﻃﻪ ﺍﻧﺠﺎﻡ ﻭ ﺩﺍﺩﻩ ﻫﺎﺋﻲ ﺑﻪ ﺑﺴﺘﻪ ﻫﺎﻱ
ﺍﻃﻼﻋﺎﺗﻲ ﺍﺿﺎﻓﻪ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺩﺭ ﺁﺧﺮﻳﻦ ﻻﻳﻪ )ﻻﻳﻪ ﻓﻴﺰﻳﮑﻲ( ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ،ﺩﺍﺩﻩ ﻫﺎ ﺑﻪ ﺳﻴﮕﻨﺎﻟﻬﺎﻱ ﺍﻟﮑﺘﺮﻳﮑﻲ ،ﭘﺎﻟﺲ ﻫﺎﺋﻲ ﺍﺯ ﻧﻮﺭ ﻭ ﻳﺎ ﺳﻴﮕﻨﺎﻟﻬﺎﻱ ﺭﺍﺩﻳﻮﺋﻲ 136
ﺗﺒﺪﻳﻞ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﮐﺎﺑﻞ ﻭ ﻳﺎ ﻫﻮﺍ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﭘﺲ ﺍﺯ ﺩﺭﻳﺎﻓﺖ ﺩﺍﺩﻩ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ،ﻋﻤﻠﻴﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ )ﻣﻌﮑﻮﺱ ﻋﻤﻠﻴﺎﺕ ﺍﺭﺳﺎﻝ( ﺗﻮﺳﻂ ﻫﺮ ﻳﮏ ﺍﺯ
ﻻﻳﻪ ﻫﺎ ﺍﻧﺠﺎﻡ ﻭ ﺩﺭ ﻧﻬﺎﻳﺖ ﺑﺎ ﺭﺳﻴﺪﻥ ﺩﺍﺩﻩ ﺑﻪ ﻻﻳﻪ Applicationﻭ ﺑﮑﻤﮏ ﻳﮏ ﺑﺮﻧﺎﻣﻪ، ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻟﻲ ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺷﮑﻞ ﺯﻳﺮ ﻧﺤﻮﻩ ﺍﻧﺠﺎﻡ ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ.
ﻻﻳﻪ ﻫﺎﻱ OSI
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﺍﺷﺎﺭﻩ ﮔﺮﺩﻳﺪ ﻣﺪﻝ OSIﺍﺯ ﻫﻔﺖ ﻻﻳﻪ ﻣﺘﻔﺎﻭﺕ ﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺍﺳﺖ .ﺩﺭ ﺍﺩﺍﻣﻪ ﻋﻤﻠﮑﺮﺩ ﻫﺮ ﻻﻳﻪ ﺗﺸﺮﻳﺢ ﻣﻲ ﮔﺮﺩﺩ: •
ﻻﻳﻪ ﻫﻔﺖ ) . (Applicationﺍﻳﻦ ﻻﻳﻪ ﺑﺎ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻭ ﻳﺎ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ
ﮐﺎﺭﺑﺮﺩﻱ ﺍﺭﺗﺒﺎﻁ ﺩﺍﺭﺩ .ﮐﺎﺭﺑﺮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﮐﺎﺭﺑﺮﺩﻱ ﻣﺘﻔﺎﻭﺕ ﻗﺎﺩﺭ ﺑﻪ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻣﺮﺗﺒﻂ ﺑﺎ ﺷﺒﮑﻪ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﻣﺜﻼ" ﮐﺎﺭﺑﺮﺍﻥ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﻓﺎﻳﻞ ﺧﻮﺍﻧﺪﻥ ﭘﻴﺎﻡ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﻭ ...ﻧﻤﺎﻳﻨﺪ.
•
ﻻﻳﻪ ﺷﺶ ) . (Presentationﻻﻳﻪ ﻓﻮﻕ ﺩﺍﺩﻩ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﻻﻳﻪ Applicationﺍﺧﺬ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺑﮕﻮﻧﻪ ﺍﻱ ﺗﺒﺪﻳﻞ ﺧﻮﺍﻫﺪ ﮐﺮﺩ ﮐﻪ ﺗﻮﺳﻂ ﺳﺎﻳﺮ ﻻﻳﻪ ﻫﺎ ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺑﺎﺷﺪ.
137
•
ﻻﻳﻪ ﭘﻨﺞ ) . (Sessionﻻﻳﻪ ﻓﻮﻕ ﻣﺴﺌﻮﻝ ﺍﻳﺠﺎﺩ ،ﭘﺸﺘﻴﺒﺎﻧﻲ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻣﺮﺑﻮﻃﻪ
•
ﻻﻳﻪ ﭼﻬﺎﺭ ) . (Transportﻻﻳﻪ ﻓﻮﻕ ﻣﺴﺌﻮﻝ ﭘﺸﺘﻴﺒﺎﻧﻲ ﮐﻨﺘﺮﻝ ﺟﺮﻳﺎﻥ ﺩﺍﺩﻩ ﻫﺎ ﻭ
ﺑﺎ ﺩﺳﺘﮕﺎﻩ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺖ.
ﻭ ﺑﺮﺭﺳﻲ ﺧﻄﺎﺀ ﻭ ﺑﺎﺯﻳﺎﺑﻲ ﺍﻃﻼﻋﺎﺕ ﺑﻴﻦ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ .ﮐﻨﺘﺮﻝ ﺟﺮﻳﺎﻥ ﺩﺍﺩﻩ ﻫﺎ ،ﺑﺪﻳﻦ ﻣﻌﻨﻲ ﺍﺳﺖ ﮐﻪ ﻻﻳﻪ ﻓﻮﻕ ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﭼﻨﺪﻳﻦ ﺑﺮﻧﺎﻣﻪ
ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺑﺎﺷﺪ ،ﺩﺍﺩﻩ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺑﻪ ﻫﺮ ﺑﺮﻧﺎﻣﻪ ﺭﺍ ﺑﻪ ﻳﮏ streamﺁﻣﺎﺩﻩ ﺗﺒﺪﻳﻞ ﺗﺎ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺷﺒﮑﻪ ﻓﻴﺰﻳﮑﻲ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﺷﻮﻧﺪ. •
ﻻﻳﻪ ﺳﻪ ) . (Networkﺩﺭ ﻻﻳﻪ ﻓﻮﻕ ﺭﻭﺵ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﻫﺎ ﺑﺮﺍﻱ ﺩﺳﺘﮕﺎﻩ ﮔﻴﺮﻧﺪﻩ
ﺗﻌﻴﻴﻦ ﺧﻮﺍﻫﺪ ﺷﺪ .ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻨﻄﻘﻲ ،ﺭﻭﺗﻴﻨﮓ ﻭ ﺁﺩﺭﺱ ﺩﻫﻲ ﺩﺭ ﺍﻳﻦ ﻻﻳﻪ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ. •
ﻻﻳﻪ ﺩﻭ ) .( Dataﺩﺭ ﻻﻳﻪ ﻓﻮﻕ ،ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻓﻴﺰﻳﮑﻲ ﺑﻪ ﺩﺍﺩﻩ ﺍﺿﺎﻓﻪ ﺧﻮﺍﻫﻨﺪ
ﺷﺪ .ﺩﺭ ﺍﻳﻦ ﻻﻳﻪ ﻧﻮﻉ ﺷﺒﮑﻪ ﻭ ﻭﺿﻌﻴﺖ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ) (Packetﻧﻴﺰ ﺗﻌﻴﻴﻦ ﻣﻲ ﮔﺮﺩﻧﺪ. •
ﻻﻳﻪ ﻳﮏ ) . (Physicalﻻﻳﻪ ﻓﻮﻕ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﻣﺴﺘﻘﻴﻢ ﺑﺎ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﺑﻮﺩﻩ ﻭ ﺧﺼﺎﻳﺺ ﻓﻴﺰﻳﮑﻲ ﺷﺒﮑﻪ ﻧﻈﻴﺮ :ﺍﺗﺼﺎﻻﺕ ،ﻭﻟﺘﺎﮊ ﻭ ﺯﻣﺎﻥ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﻣﺪﻝ OSIﺑﺼﻮﺭﺕ ﻳﮏ ﻣﺮﺟﻊ ﺑﻮﺩﻩ ﻭ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﭘﺸﺘﻪ ﺍﻱ ﻳﮏ ﻭ ﻳﺎ ﭼﻨﺪﻳﻦ ﻻﻳﻪ ﺍﺯ ﻣﺪﻝ ﻓﻮﻕ ﺭﺍ ﺗﺮﮐﻴﺐ ﻭ ﺩﺭ ﻳﮏ ﻻﻳﻪ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻣﻲ ﻧﻤﺎﻳﻨﺪ. ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﭘﺸﺘﻪ ﺍﻱ
ﻳﮏ ﭘﺮﻭﺗﮑﻞ ﭘﺸﺘﻪ ﺍﻱ ،ﺷﺎﻣﻞ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎ ﺍﺳﺖ ﮐﻪ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻓﻌﺎﻟﻴﺖ ﻧﻤﻮﺩﻩ ﺗﺎ ﺍﻣﮑﺎﻥ ﺍﻧﺠﺎﻡ ﻳﮏ ﻋﻤﻠﻴﺎﺕ ﺧﺎﺹ ﺭﺍ ﺑﺮﺍﻱ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﻭ ﻳﺎ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻓﺮﺍﻫﻢ ﻧﻤﺎﻳﻨﺪ. ﭘﺮﻭﺗﮑﻞ TCP/IPﻧﻤﻮﻧﻪ ﺍﻱ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﭘﺸﺘﻪ ﺍﻱ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺍﺯ ﭼﻬﺎﺭ ﻻﻳﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ.
138
•
ﻻﻳﻪ ﻳﮏ ) . (Interface Networkﻻﻳﻪ ﻓﻮﻕ ،ﻻﻳﻪ ﻫﺎﻱ Physicalﻭ Dataﺭﺍ ﺗﺮﮐﻴﺐ ﻭ ﺩﺍﺩﻩ ﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺭﺍ ﺭﻭﺕ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
•
ﻻﻳﻪ ﺩﻭ ) . (Internetﻻﻳﻪ ﻓﻮﻕ ﻣﺘﻨﺎﻇﺮ ﻻﻳﻪ Networkﺩﺭ ﻣﺪﻝ OSIﺍﺳﺖ. ﭘﺮﻭﺗﮑﻞ ﺍﻳﻨﺘﺮﻧﺖ ) ، (IPﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﺩﺭﺱ ) IPﺷﺎﻣﻞ ﻳﮏ ﻣﺸﺨﺼﻪ ﺷﺒﮑﻪ ﻭ ﻳﮏ
ﻣﺸﺨﺼﻪ ﻣﻴﺰﺑﺎﻥ ( ،ﺁﺩﺭﺱ ﺩﺳﺘﮕﺎﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ. •
ﻻﻳﻪ ﺳﻪ ) . (Transportﻻﻳﻪ ﻓﻮﻕ ﻣﺘﻨﺎﻇﺮ ﺑﺎ ﻻﻳﻪ Transportﺩﺭ ﻣﺪﻝ OSI ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ )TCP(Trnsport control protocolﺩﺭ ﻻﻳﻪ ﻓﻮﻕ ﺍﻳﻔﺎﻱ ﻭﻇﻴﻔﻪ ﻣﻲ ﻧﻤﺎﻳﺪ
•
ﻻﻳﻪ ﭼﻬﺎﺭ ) . (Applicationﻻﻳﻪ ﻓﻮﻕ ﻣﺘﻨﺎﻇﺮ ﺑﺎ ﻻﻳﻪ ﻫﺎﻱ Session,Presentationﻭ Applicationﺩﺭ ﻣﺪﻝ OSIﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ ﻫﺎﺋﻲ ﻧﻈﻴﺮ FTPﻭ SMTPﺩﺭ ﻻﻳﻪ ﻓﻮﻕ ﺍﻳﻔﺎﻱ ﻭﻇﻴﻔﻪ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
139
ﻧﺤﻮﻩ ﻣﺒﺎﺩﻟﻪ ﺩﺍﺩﻩ ﺑﻴﻦ ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺁﻳﺎ ﺗﺎﮐﻨﻮﻥ ﺑﺮﺍﻱ ﺷﻤﺎ ﺍﻳﻦ ﺳﻮﺍﻝ ﻣﻄﺮﺡ ﺷﺪﻩ ﺍﺳﺖ ﮐﻪ ﻧﺤﻮﻩ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺑﻴﻦ ﺩﻭ
ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ ﭼﻪ ﺻﻮﺭﺕ ﺍﺳﺖ؟ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺗﺎﺑﻊ ﻣﺪﻝ ﻣﺮﺟﻊ OSIﻣﻲ ﺑﺎﺷﻨﺪ .ﻣﺪﻝ ﻓﻮﻕ ،ﻫﻤﺎﻧﻨﺪ ﻳﮏ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﺍﺟﺮﺍﺋﻲ ﺑﻮﺩﻩ ﻭ ﻋﻤﻠﻴﺎﺕ ﻻﺯﻡ ﺩﺭ ﺯﻣﺎﻥ ﺍﺭﺳﺎﻝ ﻭ ﻳﺎ ﺩﺭﻳﺎﻓﺖ ﺩﺍﺩﻩ ﺭﺍ ﺑﺮﺍﻱ ﻳﮏ
ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺁﺷﻨﺎﺋﻲ ﻭ ﺁﻧﺎﻟﻴﺰ ﻓﺮﺁﻳﻨﺪ ﻣﺒﺎﺩﻟﻪ ﺩﺍﺩﻩ ﺑﻴﻦ ﺩﻭ ﮐﺎﻣﭙــﻴﻮﺗﺮ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ ﺑﺮﺭﺳﻲ ﻳﮏ ﻧﻤﻮﻧﻪ ﻣﺜﺎﻝ ﮐﺎﺭﺑﺮﺩﻱ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ.
ﺯﻣﺎﻧﻲ ﮐﻪ ﻳﮏ ﺍﺗﻮﻣﺒﻴﻞ ﺩﺭ ﮐﺎﺭﺧﺎﻧﻪ ﺍﻱ ﺗﻮﻟﻴﺪ ﻣﻲ ﮔﺮﺩﺩ ،ﻳﮏ ﻧﻔﺮ ﺗﻤﺎﻣﻲ ﮐﺎﺭﻫﺎ ﺭﺍ ﺍﻧﺠﺎﻡ
ﻧﺨﻮﺍﻫﺪ ﺩﺍﺩ .ﺗﻮﻟﻴﺪ ﻳﮏ ﺍﺗﻮﻣﺒﻴﻞ ﺑﺮ ﺍﺳﺎﺱ ﻳﮏ ﺧﻂ ﺗﻮﻟﻴﺪ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﻭ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺣﺮﮐﺖ ﺍﺗﻮﻣﺒﻴﻞ ﺩﺭ ﺧﻂ ﺗﻮﻟﻴﺪ ﻫﺮ ﺷﺨﺺ ﺑﺨﺶ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺭﺍ ﺑﻪ ﺁﻥ ﺍﺿﺎﻓﻪ ﻧﻤﻮﺩﻩ ﻭ ﺯﻣﺎﻧﻲ ﮐﻪ ﺑﻪ ﺍﻧﺘﻬﺎﻱ ﺧﻂ ﺗﻮﻟﻴﺪ ﻣﻲ ﺭﺳﻴﻢ ،ﺍﺗﻮﻣﺒﻴﻞ ﻣﻮﺭﺩ ﻧﻈﺮ ﺗﻮﻟﻴﺪ ﻭ ﺁﻣﺎﺩﻩ ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
ﻭﺿﻌﻴﺖ ﻓﻮﻕ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺩﺍﺩﻩ ﺍﺭﺳﺎﻟﻲ ﺍﺯ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﻳﮕﺮ ﻧﻴﺰ ﺻﺪﻕ ﻣﻲ ﮐﻨﺪ.
ﻣﺪﻝ OSIﮐﻪ ﺗﻮﺳﻂ ﮐﻤﻴﺘﻪ IEEEﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ ،ﻗﻮﺍﻧﻴﻦ ﻻﺯﻡ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺑﻴﻦ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﻭ ﺑﺎ ﭘﻴﺮﻭﻱ ﺍﺯ ﻣﺠﻤﻮﻋﻪ ﺭﻫﻨﻤﻮﺩﻫﺎﻱ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺩﺭ ﻣﺪﻝ ﻣﺮﺟﻊ ،OSIﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻗﺎﺩﺭ ﺑﻪ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﺳﺎﻳﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ) ﺻﺮﻓﻨﻈﺮ ﺍﺯ ﻧﻮﻉ ﮐﺎﻣﭙﻴﻮﺗﺮ ( ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺣﺮﮐﺖ ﺩﺍﺩﻩ ﺑﺎ ﺩﻭ ﺭﻭﺵ ﻣﺘﻔﺎﻭﺕ ﺩﺭ
ﻣﺪﻝ ﻣﺮﺟﻊ OSIﺍﻧﺠﺎﻡ ﻣﻲ ﺷﻮﺩ .ﺩﺭ ﺳﻤﺖ ﻓﺮﺳﺘﻨﺪﻩ ) ﺑﻪ ﻃﺮﻑ ﭘﺎﺋﻴﻦ ( ،ﺩﺍﺩﻩ ﻫﺎ ﮐﭙﺴﻮﻟﻪ ﺷﺪﻩ ﻭ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﮔﻴﺮﻧﺪﻩ ﺍﺭﺳﺎﻝ ﻣﻲ ﺷﻮﻧﺪ .ﺩﺭ ﺳﻤﺖ ﮔﻴﺮﻧﺪﻩ ) ﺑﻪ ﻃﺮﻑ ﺑﺎﻻ ( ،ﺩﺍﺩﻩ ﻫﺎ
ﺍﺯ ﺣﺎﻟﺖ ﮐﭙﺴﻮﻟﻪ ﺧﺎﺭﺝ ﺷﺪﻩ ﻭ ﺩﺭ ﻧﻬﺎﻳﺖ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﮔﻴﺮﻧﺪﻩ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﻧﺪ.
140
ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ :ﺷﮑﻞ ﺯﻳﺮﻧﺤﻮﻩ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺗﻮﺳﻂ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ:
ﺗﻮﺿﻴﺤﺎﺕ : •
ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ،ﻗﺼﺪ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﻳﮕﺮ ﺭﺍ ﺩﺍﺭﺩ .ﺩﺭ ﻻﻳﻪ
، Applicationﺭﺍﺑﻂ ﮐﺎﺭﺑﺮ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﺁﻥ ﮐﺎﺭﺑﺮ ﺑﺎ ﺑﺮﻧﺎﻣﻪ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﻲ ﻧﻤﺎﻳﺪ.
•
ﭘﺲ ﺍﺯ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺍﺯ ﻻﻳﻪ ، Applicationﺩﺍﺩﻩ ﺍﺭﺳﺎﻟﻲ ﺑﻪ ﺗﺮﺗﻴﺐ ﻻﻳﻪ ﻫﺎﻱ Presentationﻭ Sessionﺭﺍ ﻃﻲ ﻣﻲ ﻧﻤﺎﻳﺪ .ﻫﺮ ﻳﮏ ﺍﺯ ﻻﻳﻪ ﻫﺎﻱ ﻓﻮﻕ ﺍﻃﻼﻋﺎﺕ ﺍﺿﺎﻓﻪ ﺍﻱ ﺭﺍ ﺑﻪ ﺩﺍﺩﻩ ﺍﻭﻟﻴﻪ ﺍﺿﺎﻓﻪ ﻧﻤﻮﺩﻩ ﻭ ﺩﺭ ﻧﻬﺎﻳﺖ ﺩﺍﺩﻩ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻻﻳﻪ
Transportﻗﺮﺍﺭ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ. •
ﺩﺭ ﻻﻳﻪ ، Transportﺩﺍﺩﻩ ﺑﻪ ﺑﺨﺶ ﻫﺎﻱ ﮐﻮﭼﮑﺘﺮﻱ ﺗﻘﺴﻴﻢ ﻭ ﻫﺪﺭ TCPﺑﻪ ﺁﻥ ﺍﺿﺎﻓﻪ ﻣﻲ ﮔﺮﺩﺩ .ﺑﻪ ﺩﺍﺩﻩ ﻣﻮﺟﻮﺩ ﺩﺭ ﻻﻳﻪ " ، Transportﺳﮕﻤﻨﺖ" ﮔﻔﺘﻪ ﻣﻲ ﺷﻮﺩ
.ﻫﺮ ﺳﮕﻤﻨﺖ ﺷﻤﺎﺭﻩ ﮔﺬﺍﺭﻱ ﺷﺪﻩ ﺗﺎ ﺍﻣﮑﺎﻥ ﺑﺎﺯﺳﺎﺯﻱ ﻣﺠﺪﺩ ﺁﻧﺎﻥ ﺩﺭ ﻣﻘﺼﺪ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ) ﺍﻧﺘﻈﺎﺭ ﺩﺍﺭﻳﻢ ﺩﺍﺩﻩ ﺩﺭﻳﺎﻓﺘﻲ ﺗﻮﺳﻂ ﮔﻴﺮﻧﺪﻩ ﻫﻤﺎﻥ ﺩﺍﺩﻩ ﺍﺭﺳﺎﻟﻲ ﺗﻮﺳﻂ ﻓﺮﺳﺘﻨﺪﻩ ﺑﺎﺷﺪ(.
•
ﻫﺮ ﺳﮕﻤﻨﺖ ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺁﺩﺭﺱ ﺩﻫﻲ ﺷﺒﮑﻪ )ﻣﻨﻈﻮﺭ ﺁﺩﺭﺱ ﺩﻫﻲ ﻣﻨﻄﻘﻲ ﺍﺳﺖ( ﻭ ﺭﻭﺗﻴﻨﮓ ﻣﻨﺎﺳﺐ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻻﻳﻪ Networkﻗﺮﺍﺭ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺑﻪ ﺩﺍﺩﻩ ﻣﻮﺟﻮﺩ ﺩﺭ ﻻﻳﻪ ،Networkﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻭ ﻳﺎ Packetﮔﻔﺘﻪ ﻣﻲ ﺷﻮﺩ.
141
ﻻﻳﻪ ،Networkﻫﺪﺭ IPﺧﻮﺩ ﺭﺍ ﺑﻪ ﺁﻥ ﺍﺿﺎﻓﻪ ﻧﻤﻮﺩﻩ ﻭ ﺁﻥ ﺭﺍ ﺑﺮﺍﻱ ﻻﻳﻪ
DataLinkﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ. •
ﺩﺭ ﻻﻳﻪ DataLinkﺑﻪ ﺩﺍﺩﻩ ﺋﻲ ﮐﻪ ﻫﻢ ﺍﻳﻨﮏ ﺷﺎﻣﻞ ﻫﺪﺭ ﻻﻳﻪ ﻫﺎﻱ Transportﻭ Networkﺍﺳﺖ" ،ﻓﺮﻳﻢ" ﮔﻔﺘﻪ ﻣﻲ ﺷﻮﺩ .ﺩﺭ ﺍﻳﻦ ﻻﻳﻪ ،ﻫﺮ ﻳﮏ ﺍﺯ ﺑﺴﺘﻪ ﻫﺎﻱ
ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭﻳﺎﻓﺘﻲ ،ﮐﭙﺴﻮﻟﻪ ﺷﺪﻩ ﻭ ﺩﺭ ﻳﮏ ﻓﺮﻳﻢ ﺑﻪ ﻫﻤﺮﺍﻩ ﺁﺩﺭﺱ ﺳﺨـﺖ ﺍﻓـــــﺰﺍﺭﻱ) ﺁﺩﺭﺱ ( MACﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﮔﻴﺮﻧﺪﻩ ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﻣﻲ ﺷﻮﻧﺪ .ﺩﺭ ﻓﺮﻳﻢ ﻓﻮﻕ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ) LLCﻧﻮﻉ ﭘﺮﻭﺗﮑﻞ ﺍﺭﺳﺎﻟﻲ ﺗﻮﺳﻂ
ﻻﻳﻪ ﻗﺒﻠﻲ ﺯﻣﺎﻧﻲ ﮐﻪ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﻣﻲ ﺭﺳﺪ( ،ﻧﻴﺰ ﺍﺿﺎﻓﻪ ﻣﻲ ﺷﻮﺩ .ﺩﺭ ﺑﺨﺶ ﺍﻧﺘﻬﺎﺋﻲ ﻓﺮﻳﻢ ،ﻓﻴﻠﺪﻱ ﺑﺎ ﻧﺎﻡ FCSﮐﻪ ﺍﺯ ﮐﻠﻤﺎﺕ Frame Check Sequence ﺍﻗﺘﺒﺎﺱ ﺷﺪﻩ ﺍﺳﺖ ﺑﻪ ﻣﻨﻈﻮﺭ ﺑﺮﺭﺳﻲ ﺧﻄﺎﺀ ﺍﺿﺎﻓﻪ ﻣﻲ ﮔﺮﺩﺩ.
•
ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺑﺎﺷﺪ ،ﻓﺮﻳﻢ ﺑﻪ ﺭﻭﺗﺮ ﻭ ﻳﺎ gatewayﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺴﻴﺮﻳﺎﺑﻲ ﻣﻨﺎﺳﺐ ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ.
•
ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻘﺮﺍﺭ ﻓﺮﻳﻢ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺑﻪ ﺻﻮﺭﺕ ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻝ ﺗﺒﺪﻳﻞ ﺷﻮﻧﺪ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﮐﻪ ﻳﮏ ﻓﺮﻳﻢ ﻣﺸﺘﻤﻞ ﺑﺮ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺻﻔﺮ ﻭ ﻳﮏ ﺍﺳﺖ ،ﻻﻳﻪ Physicalﻋﻤﻠﻴﺎﺕ ﮐﭙﺴﻮﻟﻪ ﻧﻤﻮﺩﻥ ﺍﺭﻗﺎﻡ ﻣﻮﺟﻮﺩ ﺩﺭ
ﻓﺮﻳﻢ ﺑﻪ ﻳﮏ ﺳﻴﮕﻨﺎﻝ ﺩﻳﺠﻴﺘﺎﻝ ﺭﺍ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺩﺍﺩ. •
ﺩﺭ ﺍﺑﺘﺪﺍﻱ ﻓﺮﻳﻢ ﻭ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻫﻤﺰﻣﺎﻥ ﺳﺎﺯﻱ )ﻫﻤﺎﻫﻨﮓ ﺷﺪﻥ ﺩﺭﻳﺎﻓﺖ
ﮐﻨﻨﺪﻩ ﺑﺎ ﻓﺮﺳﺘﻨﺪﻩ ( ،ﺗﻌﺪﺍﺩ ﺍﻧﺪﮐﻲ ﺻﻔﺮ ﻭ ﻳﮏ ﺍﺿﺎﻓﻪ ﻣﻲ ﮔﺮﺩﺩ.
142
ﺩﺭﻳﺎﻓﺖ ﺩﺍﺩﻩ :ﺷﮑﻞ ﺯﻳﺮ ﻧﺤﻮﻩ ﺩﺭﻳﺎﻓﺖ ﺩﺍﺩﻩ ﺗﻮﺳﻂ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ:
ﺗﻮﺿﻴﺤﺎﺕ : •
ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﻪ ﻣﻨﻈﻮﺭ ﻫﻤﺎﻫﻨﮓ ﮐﺮﺩﻥ ﺧﻮﺩ ﺑﺎ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻓﺮﺳﺘﻨﺪﻩ
ﺩﺭ ﺟﻬﺖ ﺧﻮﺍﻧﺪﻥ ﺳﻴﮕﻨﺎﻝ ﺩﻳﺠﻴﺘﺎﻝ ،ﺗﻌﺪﺍﺩ ﻣﺤﺪﻭﺩﻱ ﺍﺯ ﺑﻴﺖ ﻫﺎ ﺭﺍ ﻣﻲ ﺧﻮﺍﻧﺪ .ﭘﺲ ﺍﺯ ﺍﺗﻤﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻫﻤﺰﻣﺎﻥ ﺳﺎﺯﻱ ﻭ ﺩﺭﻳﺎﻓﺖ ﺗﻤﺎﻣﻲ ﻓﺮﻳﻢ ﺁﻥ ﺭﺍ ﺑﻪ ﻻﻳﻪ ﺑﺎﻻﺗﺮ )ﻻﻳﻪ
،( DataLinkﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ. •
ﻻﻳﻪ ، DataLinkﺩﺭ ﺍﺑﺘﺪﺍ ﺑﺮﺭﺳﻲ ﻻﺯﻡ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻭﺟﻮﺩ ﺧﻄﺎﺀ ) ( CRCﻭ ﻳﺎ ﻫﻤﺎﻥ Cyclic Redundancy Checkﺭﺍ ﺩﺭ ﺧﺼﻮﺹ ﺍﻃﻼﻋﺎﺕ ﺩﺭﻳﺎﻓﺘﻲ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﻣﺤﺎﺳﺒﺎﺕ ﻓﻮﻕ ﺗﻮﺳﻂ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﻭ
ﻣﺎﺣﺼﻞ ﮐﺎﺭ ﺑﺎ ﻣﻘﺪﺍﺭ ﻣﻮﺟﻮﺩ ﺩﺭ ﻓﻴﻠﺪ FCSﻣﻘﺎﻳﺴﻪ ﺷﺪﻩ ﻭ ﺑﺮ ﺍﺳﺎﺱ ﺁﻥ ﺗﺸﺨﻴﺺ ﺩﺍﺩﻩ ﺧﻮﺍﻫﺪ ﺷﺪ ﮐﻪ ﺁﻳﺎ ﻓﺮﻳﻢ ﺩﺭﻳﺎﻓﺘﻲ ﺑﺪﻭﻥ ﺑﺮﻭﺯ ﺧﻄﺎﺀ ﺩﺭﻳﺎﻓﺖ ﺷﺪﻩ ﺍﺳﺖ؟ ﺩﺭ ﺍﺩﺍﻣﻪ ﻻﻳﻪ ،DataLinkﺍﻃﻼﻋﺎﺕ ﺍﺿﺎﻓﻪ ﻭ ﻳﺎ ﻫﺪﺭﻱ ﺭﺍ ﮐﻪ ﺗﻮﺳﻂ ﻻﻳﻪ DataLink
ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺑﻪ ﺁﻥ ﺍﺿﺎﻓﻪ ﺷﺪﻩ ﺍﺳﺖ ﺭﺍ ﺑﺮﺩﺍﺷﺘﻪ ﻭ ﻣﺎﺑﻘﻲ ﺩﺍﺩﻩ ﺭﺍ ﮐﻪ ﺑﻪ ﺁﻥ Packetﺍﻃﻼﻕ ﻣﻲ ﮔﺮﺩﺩ ﺑﺮﺍﻱ ﻻﻳﻪ Networkﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ.
143
•
ﺩﺭ ﻻﻳﻪ ، Networkﺁﺩﺭﺱ IPﻣﻮﺟﻮﺩ ﺩﺭ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺎ ﺁﺩﺭﺱ IPﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﻣﻘﺎﻳﺴﻪ ﺷﺪﻩ ﻭ ﺩﺭ ﺻﻮﺭﺕ ﻣﻄﺎﺑﻘﺖ ،ﻫﺪﺭ ﻻﻳﻪ Networkﻭ ﻳﺎ
ﻫﺪﺭ IPﺍﺯ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺩﺍﺷﺘﻪ ﺷﺪﻩ ﻭ ﻣﺎﺑﻘﻲ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺍﻱ ﻻﻳﻪ ﺑﺎﻻﺗﺮ ) ﻻﻳﻪ ،( Transportﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ .ﺑﻪ ﺩﺍﺩﻩ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ ﻻﻳﻪ ،ﺳﮕﻤﻨﺖ
ﮔﻔﺘﻪ ﻣﻲ ﺷﻮﺩ. •
ﺳﮕﻤﻨﺖ ﺩﺭ ﻻﻳﻪ Transportﭘﺮﺩﺍﺯﺵ ﻭ ﻋﻤﻠﻴﺎﺕ ﺑﺎﺯﺳﺎﺯﻱ ﻣﺠﺪﺩ ﺩﺍﺩﻩ ﺩﺭﻳﺎﻓﺘﻲ، ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺩﺭ ﺯﻣﺎﻥ ﺑﺎﺯﺳﺎﺯﻱ ﻣﺠﺪﺩ ﺩﺍﺩﻩ ﺩﺭﻳﺎﻓﺘﻲ ﺗﻮﺳﻂ ﮐﺎﻣﭙﻴﻮﺗﺮ ﮔﻴﺮﻧﺪﻩ ﺑﻪ
ﻓﺮﺳﺘﻨﺪﻩ ﺍﻃﻼﻉ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ ﮐﻪ ﻭﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﺑﺨﺶ ﻫﺎ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻧﻤﻮﺩﻩ ﺍﺳﺖ ﺗﺎ ﺧﻠﻠﻲ ﺩﺭ ﺑﺎﺯﺳﺎﺯﻱ ﻣﺠﺪﺩ ﺩﺍﺩﻩ ﺍﻳﺠﺎﺩ ﻧﮕﺮﺩﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﺭﺳﺎﻝ ﻳﮏ ACKﺑﺮﺍﻱ ﻓﺮﺳﺘﻨﺪﻩ ) ﺍﻋﻼﻡ ﻭﺿﻌﻴﺖ ﺳﮕﻤﻨﺖ ﺩﺭﻳﺎﻓﺘﻲ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻓﺮﺳﺘﻨﺪﻩ ( ،ﺍﺯ ﭘﺮﻭﺗﮑﻞ TCP ﺩﺭ ﻣﻘﺎﺑﻞ UDPﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺍﺳﺖ .ﭘﺲ ﺍﺯ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ،ﺩﺍﺩﻩ ﺩﺭﻳﺎﻓﺘﻲ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻻﻳﻪ Applicationﮔﺬﺍﺷﺘﻪ ﻣﻲ ﺷﻮﺩ .ﺩﺭ ﺯﻣﺎﻥ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺑﻴﻦ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ،ﮐﺎﺭﺑﺮﺍﻥ ﺩﺭﮔﻴﺮ ﺟﺰﺋﻴﺎﺕ ﻣﺴﺌﻠﻪ ﻧﺸﺪﻩ ﻭ ﺗﻤﺎﻣﻲ ﻓﺮﺁﻳﻨﺪﻫﺎﻱ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﺑﻪ ﺻﻮﺭﺕ ﺍﺗﻮﻣﺎﺗﻴﮏ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ.
144
ﭘﻮﻳﺶ ﭘﻮﺭﺕ ﻫﺎ ﭘﻮﻳﺶ ﻳﮏ ﭘﻮﺭﺕ ﻓﺮﺁﻳﻨﺪﻱ ﺍﺳﺖ ﮐﻪ ﻣﻬﺎﺟﻤﺎﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﻗﺎﺩﺭ ﺑﻪ ﺗﺸﺨﻴﺺ
ﻭﺿﻌﻴﺖ ﻳﮏ ﭘﻮﺭﺕ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺳﻴﺴﺘﻢ ﻭ ﻳﺎ ﺷﺒﮑﻪ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻣﻬﺎﺣﻤﺎﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ،ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺑﻪ ﭘﻮﺭﺕ ﻫﺎﻱ TCPﻭ UDPﻧﻤﻮﺩﻩ ﻭ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﭘﺎﺳﺦ ﺩﺭﻳﺎﻓﺘﻲ ﻗﺎﺩﺭ ﺑﻪ ﺗﺸﺨﻴﺺ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ ﮐﻪ ﮐﺪﺍﻡ ﭘﻮﺭﺕ ﻫﺎ ﺩﺭ ﺣﺎﻝ ﺍﺳﺘﻔﺎﺩﻩ ﺑﻮﺩﻩ ﻭ ﺍﺯ ﮐﺪﺍﻡ ﭘﻮﺭﺕ ﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲ ﮔﺮﺩﺩ ﻭ ﺍﺻﻄﻼﺣﺎ" ﺁﻧﺎﻥ ﺑﺎﺯ ﻣﻲ ﺑﺎﺷﻨﺪ.
ﻣﻬﺎﺟﻤﺎﻥ ﺩﺭ ﺍﺩﺍﻣﻪ ﻭ ﺑﺮ ﺍﺳﺎﺱ ﺍﻃﻼﻋﺎﺕ ﺩﺭﻳﺎﻓﺘﻲ ،ﺑﺮ ﺭﻭﻱ ﭘﻮﺭﺕ ﻫﺎﻱ ﺑﺎﺯ ﻣﺘﻤﺮﮐﺰ ﺷﺪﻩ ﻭ ﺣﻤﻼﺕ ﺧﻮﺩ ﺭﺍ ﺑﺮ ﺍﺳﺎﺱ ﺁﻧﺎﻥ ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﻋﻤﻠﮑﺮﺩ ﻣﻬﺎﺟﻤﺎﻥ ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ
ﻣﺸﺎﺑﻪ ﺳﺎﺭﻗﺎﻧﻲ ﺍﺳﺖ ﮐﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﻧﻴﻞ ﺑﻪ ﺍﻫﺪﺍﻑ ﻣﺨﺮﺏ ﺧﻮﺩ ) ﺳﺮﻗﺖ ( ،ﺩﺭﺍﺑﺘﺪﺍ ﻭﺿﻌﻴﺖ ﺩﺭﺏ ﻫﺎ ﻭ ﭘﻨﺠﺮﻩ ﻫﺎﻱ ﻣﻨﺎﺯﻝ ﺭﺍ ﺑﺮﺭﺳﻲ ﻧﻤﻮﺩﻩ ﺗﺎ ﭘﺲ ﺍﺯ ﺁﮔﺎﻫﻲ ﺍﺯ ﻭﺿﻌﻴﺖ ﺁﻧﺎﻥ ) ﺑﺎﺯ ﺑﻮﺩﻥ ﻭ ﻳﺎ ﻗﻔﻞ ﺑﻮﺩﻥ ( ،ﺳﺮﻗﺖ ﺧﻮﺩ ﺭﺍ ﺑﺮﻧﺎﻣﻪ ﺭﻳﺰﻱ ﻧﻤﺎﻳﻨﺪ.
( TCP (Transmission Control Protocolﻭ) User Datagram ) UDP ،Protocolﺩﻭ ﭘﺮﻭﺗـﮑﻞ ﻣﻬﻢ TCP/IPﻣﻲ ﺑﺎﺷـﻨﺪ .ﻫﺮ ﻳﮏ ﺍﺯ ﭘﺮﻭﺗــﮑﻞ ﻫﺎﻱ ﻓﻮﻕ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺩﺍﺭﺍﻱ ﺷﻤﺎﺭﻩ ﭘﻮﺭﺗﻲ ﺑﻴﻦ ﺻﻔﺮ ﺗﺎ ٦٥،٥٣٥ﺑﺎﺷﻨﺪ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﺎ ﺩﺍﺭﺍﻱ ﺑﻴﺶ ﺍﺯ ٦٥،٠٠٠ﺩﺭﺏ ﻣﻲ ﺑﺎﺷﻴﻢ ﮐﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺑﺎﺯ ﺑﻮﺩﻥ ﻭ ﻳﺎ ﺑﺴﺘﻦ ﻫﺮ ﻳﮏ ﺍﺯ ﺁﻧﺎﻥ
ﺗﻌﻴﻴﻦ ﺗﮑﻠﻴﻒ ﻧﻤﻮﺩ ) ﺷﺒﮑﻪ ﺍﻱ ﺑﺎ ﺑﻴﺶ ﺍﺯ ٦٥،٠٠٠ﺩﺭﺏ! ( .ﺍﺯ ١٠٢٤ﭘﻮﺭﺕ ﺍﻭﻝ TCP
ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺍﺋﻪ ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻱ ﻧﻈﻴﺮ FTP,HTTP,SMTPﻭ DNSﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ ) .ﭘﻮﺭﺕ ﻫﺎﻱ ﺧﻮﺵ ﻧﺎﻡ ( .ﺑﻪ ﺑﺮﺧﻲ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎﻱ ﺑﺎﻻﻱ ١٠٢٣ﻧﻴﺰ ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﺷﻨﺎﺧﺘﻪ ﺷﺪﻩ ﺍﻱ ﻧﺴﺒﺖ ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳﺖ ،ﻭﻟﻲ ﺍﻏﻠﺐ ﺍﻳﻦ ﭘﻮﺭﺕ ﻫﺎ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ
ﺗﻮﺳﻂ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﺩﺭ ﺩﺳﺘﺮﺱ ﻣﻲ ﺑﺎﺷﻨﺪ.
145
ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﭘﻮﻳﺶ ﭘﻮﺭﺕ ﻫﺎ
ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﭘﻮﻳﺶ ﭘﻮﺭﺕ ﻫﺎ ﺩﺭ ﺍﺑﺘﺪﺍ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﻳﮏ ﺩﺭﺧﻮﺍﺳﺖ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ
ﻫﺪﻑ ﻭ ﺑﺮ ﺭﻭﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎ ﻧﻤﻮﺩﻩ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﺘﺎﻳﺞ ﺑﺪﺳﺖ ﺁﻣﺪﻩ ،ﻗﺎﺩﺭ
ﺑﻪ ﺗﺸﺨﻴﺺ ﻭﺿﻌﻴﺖ ﻳﮏ ﭘﻮﺭﺕ ﻣﻲ ﺑﺎﺷﻨﺪ )ﺑﺎﺯ ﺑﻮﺩﻥ ﻭ ﻳﺎ ﺑﺴﺘﻪ ﺑﻮﺩﻥ ﻳﮏ ﭘﻮﺭﺕ( .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﻳﻨﮕﻮﻧﻪ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﺑﺎ ﺍﻫﺪﺍﻑ ﻣﺨﺮﺏ ﺑﻪ ﺧﺪﻣﺖ ﮔﺮﻓﺘﻪ ﺷﻮﻧﺪ ،ﻣﻬﺎﺟﻤﺎﻥ ﻗﺎﺩﺭ ﺑﻪ ﺗﺸﺨﻴﺺ ﻭﺿﻌﻴﺖ ﭘﻮﺭﺕ ﻫﺎ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺳﻴﺴﺘﻢ ﻭ ﻳﺎ ﺷﺒﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﻣﻲ ﺷﻮﻧﺪ .ﺁﻧﺎﻥ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺗﻬﺎﺟﻢ ﺧﻮﺩ ﺭﺍ ﺑﮕﻮﻧﻪ ﺍﻱ ﺑﺮﻧﺎﻣﻪ ﺭﻳﺰﻱ ﻧﻤﺎﻳﻨﺪ ﮐﻪ ﻧﺎﺷﻨﺎﺧﺘﻪ ﺑﺎﻗﻲ ﻣﺎﻧﺪﻩ ﻭ ﺍﻣﮑﺎﻥ
ﺗﺸﺨﻴﺺ ﺁﻧﺎﻥ ﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ .ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻧﺼﺐ ﺷﺪﻩ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺷﺒﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﮕﻮﻧﻪ ﺍﻱ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺷﻮﻧﺪ ﮐﻪ ﺩﺭ ﺻﻮﺭﺕ ﺗﺸﺨﻴﺺ ﺍﻳﺠﺎﺩ ﻳﮏ
ﺍﺭﺗﺒﺎﻁ ﻭ ﭘﻮﻳﺶ ﻣﺴﺘﻤﺮ ﻭ ﺑﺪﻭﻥ ﻭﻗﻔﻪ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎ ﺩﺭ ﻳﮏ ﻣﺤﺪﻭﺩﻩ ﺯﻣﺎﻧﻲ ﺧﺎﺹ ﺗﻮﺳﻂ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ،ﻫﺸﺪﺍﺭﻫﺎﻱ ﻻﺯﻡ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻣﺪﻳﺮﻳﺖ ﺳﻴﺴﺘﻢ ﻗﺮﺍﺭ ﺩﻫﻨﺪ. ﻣﻬﺎﺟﻤﺎﻥ ﺑﻪ ﻣﻨﻈﻮﺭ ﭘﻮﻳﺶ ﭘﻮﺭﺕ ﻫﺎ ﺍﺯ ﺩﻭ ﺭﻭﺵ ﻋﻤﺪﻩ "ﺁﺷﮑﺎﺭ" ﻭ ﻳﺎ " ﻣﺨﻔﻲ" ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺭﻭﺵ ﭘﻮﻳﺶ ﺁﺷﮑﺎﺭ ،ﻣﻬﺎﺟﻤﺎﻥ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﻌﺪﺍﺩ ﭘﻮﺭﺕ ﻫﺎﺋﻲ ﮐﻪ ﻗﺼﺪ
ﺑﺮﺭﺳﻲ ﺁﻧﺎﻥ ﺭﺍ ﺩﺍﺭﻧﺪ ،ﺩﺍﺭﺍﻱ ﻣﺤﺪﻭﺩﻳﺖ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ ) ﺍﻣﮑﺎﻥ ﭘﻮﻳﺶ ﺗﻤﺎﻣﻲ ٦٥،٥٣٥ ﭘﻮﺭﺕ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ( .ﺩﺭ ﭘﻮﻳﺶ ﻣﺨﻔﻲ ،ﻣﻬﺎﺟﻤﺎﻥ ﺍﺯ ﺭﻭﺵ ﻫﺎﺋﻲ ﻧﻈﻴﺮ " ﭘﻮﻳﺶ ﮐﻨﺪ "
ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩﻩ ﺗﺎ ﺍﺣﺘﻤﺎﻝ ﺷﻨﺎﺳﺎﺋﻲ ﺁﻧﺎﻥ ﮐﺎﻫﺶ ﻳﺎﺑﺪ .ﺑﺎ ﭘﻮﻳﺶ ﭘﻮﺭﺕ ﻫﺎ ﺩﺭ ﻳﮏ ﻣﺤﺪﻭﺩﻩ ﺯﻣﺎﻧﻲ ﺑﻴﺸﺘﺮ ،ﺍﺣﺘﻤﺎﻝ ﺗﺸﺨﻴﺺ ﺁﻧﺎﻥ ﺗﻮﺳﻂ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺍﻣـــﻨﻴﺘﻲ ﻧﺼﺐ ﺷﺪﻩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﮐﺎﻫﺶ ﭘﻴﺪﺍ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﭘﻮﻳﺶ ﭘﻮﺭﺕ ﻫﺎ ﺑﺎ ﺗﻨﻈﻴﻢ ﻓﻼﮒ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ TCPﻭ ﻳﺎ ﺍﺭﺳﺎﻝ ﺍﻧﻮﺍﻉ ﻣﺘﻔﺎﻭﺗﻲ ﺍﺯ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ TCPﻗﺎﺩﺭ ﺑﻪ ﺍﻳﺠﺎﺩ ﻧﺘﺎﻳﺞ ﻣﺘﻔﺎﻭﺕ ﻭ ﺗﺸﺨﻴﺺ ﭘﻮﺭﺕ ﻫﺎﻱ ﺑﺎﺯ ﺑﺮ ﺍﺳﺎﺱ ﺭﻭﺵ ﻫﺎﻱ ﻣﺨﺘﻠﻔﻲ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻣﺜﻼ" ﻳﮏ ﭘﻮﻳﺶ ﻣﺒﺘﻨﻲ ﺑﺮ SYNﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﺘﺎﻳﺞ ﺑﺪﺳﺖ ﺁﻣﺪﻩ ﺍﻋﻼﻡ ﻣﻲ ﻧﻤﺎﻳﺪ ﮐﻪ ﮐﺪﺍﻡ ﭘﻮﺭﺕ ﺑﺎﺯ ﻭ ﻳﺎ ﮐﺪﺍﻡ ﭘﻮﺭﺕ ﺑﺴﺘﻪ ﺍﺳﺖ ﻭ ﻳﺎ ﺩﺭ ﻳﮏ
ﭘﻮﻳﺶ ﻣﺒﺘﻨﻲ ﺑﺮ FINﺑﺮ ﺍﺳﺎﺱ ﭘﺎﺳﺨﻲ ﮐﻪ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎﻱ ﺑﺴﺘﻪ ﺩﺭﻳﺎﻓﺖ ﻣﻲ ﻧﻤﺎﻳﺪ ) ﭘﻮﺭﺕ ﻫﺎﻱ ﺑﺎﺯ ﭘﺎﺳﺨﻲ ﺭﺍ ﺍﺭﺳﺎﻝ ﻧﺨﻮﺍﻫﻨﺪ ﮐﺮﺩ( ﻭﺿﻌﻴﺖ ﻳﮏ ﭘﻮﺭﺕ ﺭﺍ ﺗﺸﺨﻴﺺ ﺧﻮﺍﻫﺪ ﺩﺍﺩ. 146
ﻧﺤﻮﻩ ﭘﻴﺸﮕﻴﺮﻱ ﻭ ﺣﻔﺎﻇﺖ
ﻣﺪﻳﺮﺍﻥ ﺷﺒﮑﻪ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻣﮑﺎﻧﺎﺕ ﻣﺘﻨﻮﻋﻲ ﮐﻪ ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﺍﺯ
ﭘﻮﻳﺶ ﭘﻮﺭﺕ ﻫﺎ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﺗﻮﺳﻂ ﻣﻬﺎﺟﻤﺎﻥ ﺁﮔﺎﻩ ﮔﺮﺩﻧﺪ .ﻣﺜﻼ" ﻣﻲ ﺗﻮﺍﻥ ﺗﻤﺎﻣﻲ ﭘﻮﻳﺶ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ SYNﺭﺍ ﺛﺒﺖ ﺗﺎ ﺩﺭ ﺍﺩﺍﻣﻪ ﺍﻣﮑﺎﻥ ﺑﺮﺭﺳﻲ ﺩﻗﻴﻖ ﺁﻧﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ. )ﺗﺸﺨﻴﺺ ﺍﺭﺳﺎﻝ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ SYNﺑﻪ ﭘﻮﺭﺕ ﻫﺎﻱ ﺑﺎﺯ ﻭ ﻳﺎ ﺑﺴﺘﻪ(. ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻓﺰﺍﻳﺶ ﺍﻳﻤﻦ ﺳﺎﺯﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻭ ﻳﺎ ﺷﺒﮑﻪ ﻣﻮﺭﺩ ﻧﻈﺮ ﻣﻲ ﺗﻮﺍﻥ ﺧﻮﺩ ﺭﺍﺳﺎ" ﺍﻗﺪﺍﻡ ﺑﻪ
ﭘﻮﻳﺶ ﭘﻮﺭﺕ ﻫﺎ ﻧﻤﻮﺩ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﺋﻲ ﻧﻈﻴﺮ NMapﻣﻲ ﺗﻮﺍﻥ ﻣﺤﺪﻭﺩﻩ ﺍﻱ ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ IPﻭ ﭘﻮﺭﺕ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺑﺮﺭﺳﻲ ﻧﻤﻮﺩ ) ﺷﺒﻴﻪ ﺳﺎﺯﻱ ﻳﮏ ﺗﻬﺎﺟﻢ ( .ﭘﺲ
ﺍﺯ ﻣﺸﺨﺺ ﺷﺪﻥ ﻭﺿﻌﻴﺖ ﻫﺮ ﻳﮏ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﻗﺪﺍﻣﺎﺕ ﻻﺯﻡ ﺣﻔﺎﻇﺘﻲ ﺩﺭ ﺍﻳﻦ ﺧﺼﻮﺹ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﺍﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺑﻪ ﻭﺟﻮﺩ ) ﺑﺎﺯ ﺑﻮﺩﻥ ( ﻳﮏ ﭘﻮﺭﺕ ﻧﻴﺎﺯ ﻧﻤﻲ ﺑﺎﺷﺪ،
ﻣﻲ ﺑﺎﻳﺴﺖ ﺁﻧﺎﻥ ﺭﺍ ﻏﻴﺮ ﻓﻌﺎﻝ ﻧﻤﻮﺩ .ﺩﺭ ﺻﻮﺭﺕ ﺿﺮﻭﺭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﭘﻮﺭﺕ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺮﺭﺳﻲ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺗﻬﺪﻳﺪﺍﺗﻲ ﮐﻪ ﻣﻤﮑﻦ ﺍﺳﺖ ﺍﺯ ﺟﺎﻧﺐ ﺁﻥ ﭘﻮﺭﺕ ﻣﺘﻮﺟﻪ ﺳﻴﺴﺘﻢ ﻭ ﻳﺎ ﺷﺒﮑﻪ ﮔﺮﺩﺩ ﺭﺍ ﺍﻧﺠﺎﻡ ﻭ ﺑﺎ ﻧﺼﺐ patchﻫﺎﻱ ﻣﺮﺗﺒﻂ ﺑﺎ ﺁﻧﺎﻥ ﺍﻣﮑﺎﻥ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
ﭘﻮﺭﺕ ﻫﺎﻱ ﺑﺎﺯ ﺭﺍ ﮐﺎﻫﺶ ﺩﺍﺩ.
ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﭘﻮﻳﺶ ﭘﻮﺭﺕ ﻫﺎ
ﺑﻪ ﻣﻨﻈﻮﺭ ﭘﻮﻳﺶ ﭘﻮﺭﺕ ﻫﺎ ﻭ ﺁﮔﺎﻫﻲ ﺍﺯ ﻭﺿﻌﻴﺖ ﭘﻮﺭﺕ ﻫﺎﻱ TCPﻭ UDPﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ : • • •
) Nmapﻳﺎ ( Network Mapper FoundStone Vision FoundStone FPort
•
FoundStone ScanLine
•
Found Stone SuperScan
•
) FireWalls.com Port Scanﺑﺮﺭﺳﻲ onlineﻭﺿﻌﻴﺖ ﭘﻮﺭﺕ ﻫﺎ (
147
ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﭘﻮﺭﺕ ﻫﺎﻱ ﺷﺒﮑﻪ ﺩﺭ ﻭﻳﻨﺪﻭﺯ ﻭﻳﻨﺪﻭﺯ ﺍﺯ ﻳﮏ ﺯﻳﺮﺳﺎﺧﺖ ﺟﺎﻣﻊ ﻭ ﭘﻴﻮﺳﺘﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺎﻣﻴﻦ ﻃﻴﻒ ﻭﺳﻴﻌﻲ ﺍﺯ ﻧﻴﺎﺯﻫﺎ ﻭ ﺧﻮﺍﺳﺘﻪ ﻫﺎﻱ ﭘﻴﺎﺩﻩ ﮐﻨﻨﺪﮔﺎﻥ ﻭﮐﺎﺭﺷﻨﺎﺳﺎﻥ ﺣﺮﻓﻪ ﺍﻱ ﻓﻦ ﺁﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ. ﺩﺭ ﺯﻳﺮﺳﺎﺧﺖ ﻓﻮﻕ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺍﺟﺮﺍﺀ ﻣﻲ ﮔﺮﺩﺩ ﺗﺎ ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻨﺪﮔﺎﻥ ﺍﻃﻼﻋﺎﺕ ﻗﺎﺩﺭ
ﺑﻪ ﺩﺳﺘﻴﺎﺑﻲ ،ﺁﻧﺎﻟﻴﺰ ﻭ ﺍﺷﺘﺮﺍﮎ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﺳﺎﺩﮔﻲ ﻭ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻﺋﻲ ﺑﺎﺷﻨﺪ. ﻣﺤﺼﻮﻻﺕ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺷﺮﮐﺖ ﻣﺎﻳﮑﺮﻭﺳﺎﻓﺖ ﺍﺯ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﭘﻮﺭﺕ ﻭ ﭘﺮﻭﺗﮑﻞ ﺷﺒﮑﻪ ﺍﻱ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺳﻴﺴﺘﻤﻬﺎﻱ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻭﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ. ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﻤﻦ ﺳﺎﺯﻱ ﻳﮏ ﺷﺒﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺯ ﻓﺎﻳﺮﻭﺍﻝ ﻫﺎﻱ ﺧﺎﺻﻲ ﻭ ﻳﺎ
ﻓﻴﻠﺘﺮﻫﺎﻱ IPSecﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ ،ﻣﻤﮑﻦ ﺍﺳﺖ ﺑﺮﺧﻲ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎ ﻭ ﭘﺮﻭﺗﮑﻞ ﻫﺎ ﺗﻮﺳﻂ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻓﻮﻕ ﺑﻼﮎ ﺷﺪﻩ ﻭ ﺑﺪﻧﺒﺎﻝ ﺁﻥ ﺍﻣﮑﺎﻥ ﭘﺎﺳﺨﮕﻮﺋﻲ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺑﻪ ﺩﺭﺧﻮﺍﺳﺖ ﻫﺎﻱ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ﻣﺠﺎﺯ ،ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ ) ﻋﺪﻡ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﻭ
ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺗﻮﺳﻂ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ(. ﺑﺮﺧﻲ ﺗﻌﺎﺭﻳﻒ ﺍﻭﻟﻴﻪ •
ﺳﻴﺴﺘﻢ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﻳﻨﺪﻭﺯ ،ﺍﺯ ﻣﺤﺼﻮﻻﺕ ﻣﺘﻌﺪﺩﻱ ﻧﻈﻴﺮ ﺧﺎﻧﻮﺍﺩﻩ ﻧﺴﺨﻪ ﻫﺎﻱ
ﻭﻳﻨﺪﻭﺯ ،٢٠٠٣ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ، Exchange 2000ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ SQL ، Server 2000ﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺍﺳﺖ .ﻫﺮ ﻳﮏ ﺍﺯ ﻣﺤﺼﻮﻻﺕ ﻓﻮﻕ ﺍﺯ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﻋﻨﺎﺻﺮ ﻭ ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﺳﻴﺴﺘﻢ ﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺍﻧﺪ .ﺑﺮﺧﻲ ﺍﺯ ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﺳﻴﺴﺘﻢ ﺩﺭ
ﺯﻣﺎﻥ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﻭ ﺗﻮﺳﻂ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﺍﺟﺮﺍﺀ ﺷﺪﻩ ﻭ ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﺑﺮ ﺍﺳﺎﺱ ﺗﺤﻘﻖ ﺷﺮﺍﻳﻄﻲ ﺧﺎﺹ ،ﻓﻌﺎﻟﻴﺖ ﺧﻮﺩ ﺭﺍ ﺁﻏﺎﺯ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﻫﺮ ﺳﺮﻭﻳﺲ ﺳﻴﺴﺘﻢ ﺩﺍﺭﺍﻱ ﻳﮏ ﻧﺎﻡ ﺧﻮﺩﻣﺎﻧﻲ ﻭ ﻳﮏ ﻧﺎﻡ ﺳﺮﻭﻳﺲ ﺍﺳﺖ .ﻧﺎﻡ ﺧﻮﺩﻣﺎﻧﻲ ،ﻧﺎﻣﻲ ﺍﺳﺖ ﮐﻪ ﺩﺭ ﺍﺑﺰﺍﺭﻫﺎﻱ
ﻣﺪﻳﺮﻳﺘﻲ ﮔﺮﺍﻓﻴﮑﻲ ﻧﻈﻴﺮ ) ، Microsoft Management Console (MMC ﻧﺸﺎﻥ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﻧﺪ .ﻧﺎﻡ ﺳﺮﻭﻳﺲ ،ﻧﺎﻣﻲ ﺍﺳﺖ ﮐﻪ ﺍﺯ ﺁﻥ ﺑﻪ ﻫﻤﺮﺍﻩ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺧﻂ
148
ﺩﺳﺘﻮﺭ ﻭ ﻳﺎ ﺯﺑﺎﻥ ﻫﺎﻱ ﺍﺳﮑﺮﻳﭙﺖ ﻧﻮﻳﺴﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻫﺮ ﺳﺮﻭﻳﺲ ﺳﻴﺴﺘﻢ
ﻣﻤﮑﻦ ﺍﺳﺖ ﻳﮏ ﻭ ﻳﺎ ﭼﻨﺪﻳﻦ ﺳﺮﻭﻳﺲ ﺷﺒﮑﻪ ﺍﻱ ﺭﺍ ﺍﺭﺍﺋﻪ ﻧﻤﺎﻳﺪ. •
ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ، Applicationﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺳﻄﺢ ﺑﺎﻻﻱ ﺷﺒﮑﻪ ﺑﻮﺩﻩ ﮐﻪ ﺍﺯ ﻳﮏ
ﻭ ﻳﺎ ﭼﻨﺪﻳﻦ ﭘﺮﻭﺗﮑﻞ ﻭ ﭘﻮﺭﺕ TCP/IPﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ HTTP .ﻭ SMTP ﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻣﻲ ﺑﺎﺷﻨﺪ. •
ﭘﺮﻭﺗﮑﻞ ﻫﺎ ،ﺩﺭ ﻳﮏ ﺳﻄﺢ ﭘﺎﺋﻴﻦ ﺗﺮ ﻧﺴﺒﺖ ﺑﻪ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ Applicationﮐﺎﺭ
ﻣﻲ ﮐﻨﻨﺪ .ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ TCP/IPﻓﺮﻣﺖ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻱ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺷﺒﮑﻪ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ) .ﭘﺮﻭﺗﮑﻞ TCP/IPﺷﺎﻣﻞ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺩﻳﮕﺮﻱ ﻧﻈﻴﺮ UDP ، TCPﻭ ICMPﺍﺳﺖ(.
•
ﭘﻮﺭﺕ .ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﺳﻴﺴﺘﻢ ﺑﺎ ﮔﻮﺵ ﺩﺍﺩﻥ ﺑﻪ ﭘﻮﺭﺕ ﻫﺎ ﻗﺎﺩﺭ ﺑﻪ ﺗﺸﺨﻴﺺ ﺗﺮﺍﻓﻴﮏ ﻭﺭﻭﺩﻱ ﺷﺒﮑﻪ ﻣﻲ ﺑﺎﺷﻨﺪ.
ﺟﺪﻭﻝ ﺯﻳﺮ ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﭘﻮﺭﺕ ﻫﺎﻱ ﺷﺒﮑﻪ ﺩﺭ ﻣﺤﺼﻮﻻﺕ ﺍﺻﻠﻲ ﻭﻳﻨﺪﻭﺯ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ: Application ProtocolPort protocol GRE (IP GRE n/a )protocol 47 IPSec ESP (IP ESP n/a )protocol 50 IPSec AH (IP AH n/a )protocol 51 Echo TCP 7 7
UDP
Echo
9
TCP
Discard
149
System Service Name Routing and Remote Access Routing and Remote Access Routing and Remote Access Simple TCP/IP Services Simple TCP/IP Services Simple TCP/IP Services
Simple TCP/IP Discard Services Simple TCP/IP Daytime Services Simple TCP/IP Daytime Services Simple TCP/IP Quotd Services Simple TCP/IP Quotd Services Simple TCP/IP Chargen Services Simple TCP/IP Chargen Services FTP Publishing FTP default Service data FTP Publishing FTP control Service Application Layer FTP control Gateway Service Telnet Telnet Simple Mail SMTP Transfer Protocol Simple Mail SMTP Transfer Protocol Exchange Server SMTP Exchange Server SMTP Windows WINS Internet Name Replication Service Windows WINS Internet Name Replication Service DNS Server DNS 150
UDP
9
TCP
13
UDP
13
TCP
17
UDP
17
TCP
19
UDP
19
TCP
20
TCP
21
TCP
21
TCP TCP
23 25
UDP
25
TCP UDP TCP
25 25 42
UDP
42
TCP
53
DNS Server DNS Internet DNS Connection Firewall/Internet Connection Sharing DHCP Server DHCP Server Internet DHCP Server Connection Firewall/Internet Connection Sharing Trivial FTP TFTP Daemon Service Windows Media HTTP Services World Wide Web HTTP Publishing Service SharePoint Portal HTTP Server Kerberos Key Kerberos Distribution Center Kerberos Key Kerberos Distribution Center Microsoft X.400 Exchange MTA Stacks Microsoft POP3 POP3 Service Exchange Server POP3 Network News NNTP 151
UDP TCP
53 53
UDP UDP
67 67
UDP
69
TCP
80
TCP
80
TCP
80
TCP
88
UDP
88
TCP
102
TCP
110
TCP TCP
110 119
Transfer Protocol Windows Time NTP Windows Time SNTP Message RPC Queuing Remote RPC Procedure Call Exchange Server RPC Certificate RPC Services Cluster Service RPC Distributed File RPC System Distributed Link RPC Tracking Distributed RPC Transaction Coordinator Event Log RPC Fax Service RPC File Replication RPC Local Security RPC Authority Remote Storage RPC Notification Remote Storage RPC Server Systems RPC Management Server 2.0 Terminal RPC Services Licensing Terminal RPC 152
UDP UDP TCP
123 123 135
TCP
135
TCP TCP
135 135
TCP TCP
135 135
TCP
135
TCP
135
TCP TCP TCP TCP
135 135 135 135
TCP
135
TCP
135
TCP
135
TCP
135
TCP
135
Services Session Directory Computer NetBIOS Browser Name Resolution Server NetBIOS Name Resolution Windows NetBIOS Internet Name Name Service Resolution Net Logon NetBIOS Name Resolution Systems NetBIOS Management Name Server 2.0 Resolution Computer NetBIOS Browser Datagram Service Messenger NetBIOS Datagram Service Server NetBIOS Datagram Service Net Logon NetBIOS Datagram Service Distributed File NetBIOS System Datagram Service Systems NetBIOS Management Datagram 153
UDP
137
UDP
137
UDP
137
UDP
137
UDP
137
UDP
138
UDP
138
UDP
138
UDP
138
UDP
138
UDP
138
Server 2.0 Service License Logging NetBIOS Datagram Service Service Computer NetBIOS Browser Session Service NetBIOS Fax Service Session Service Performance NetBIOS Logs and Alerts Session Service Print Spooler NetBIOS Session Service Server NetBIOS Session Service Net Logon NetBIOS Session Service Remote NetBIOS Procedure Call Session Locator Service Distributed File NetBIOS System Session Service Systems NetBIOS Management Session Server 2.0 Service License Logging NetBIOS Service Session Service 154
UDP
138
TCP
139
TCP
139
TCP
139
TCP
139
TCP
139
TCP
139
TCP
139
TCP
139
TCP
139
TCP
139
Exchange Server IMAP TCP SNMP Service SNMP UDP SNMP Trap SNMP Traps UDP Service Outbound Local Security LDAP Server TCP Authority Local Security LDAP Server UDP Authority Distributed File LDAP Server TCP System Distributed File LDAP Server UDP System HTTP SSL HTTPS TCP World Wide Web HTTPS TCP Publishing Service SharePoint Portal HTTPS TCP Server Fax Service SMB TCP Print Spooler SMB TCP Server SMB TCP Remote SMB TCP Procedure Call Locator Distributed File SMB TCP System License Logging SMB TCP Service Net Logon SMB TCP Local Security IPSec ISAKMP UDP Authority TCP/IP Print LPD TCP Server File Server for File Server for TCP 155
143 161 162 389 389 389 389 443 443 443 445 445 445 445 445 445 445 500 515 548
Macintosh Macintosh Windows Media RTSP TCP Services Network News NNTP over TCP Transfer Protocol SSL Remote RPC over TCP Procedure Call HTTP Exchange Server RPC over TCP HTTP Local Security LDAP SSL TCP Authority Local Security LDAP SSL UDP Authority Exchange Server IMAP over TCP SSL Exchange Server POP3 over TCP SSL Microsoft MOMTCP Operations Encrypted Manager 2000 Microsoft SQL SQL over TCP TCP Server MSSQL$UDDI SQL over TCP TCP Microsoft SQL SQL Probe UDP Server MSSQL$UDDI SQL Probe UDP Internet Legacy UDP Authentication RADIUS Service Internet Legacy UDP Authentication RADIUS Service Routing and L2TP UDP Remote Access 156
554 563 593 593 636 636 993 995 1270 1433 1433 1434 1434 1645 1646 1701
Routing and Remote Access Windows Media Services Windows Media Services Message Queuing Message Queuing Internet Authentication Service Internet Authentication Service SSDP Discovery Service Message Queuing Message Queuing Message Queuing Message Queuing SQL Server: Downlevel OLAP Client Support SQL Server: Downlevel OLAP Client Support Windows Media Services
PPTP
TCP
1723
MMS
TCP
1755
MMS
UDP
1755
MSMQ
TCP
1801
MSMQ
UDP
1801
RADIUS UDP Authentication
1812
RADIUS Accounting
UDP
1813
SSDP
UDP
1900
MSMQ-DCs
TCP
2101
MSMQ-RPC
TCP
2103
MSMQ-RPC
TCP
2105
MSMQ-Mgmt TCP
2107
OLAP Services TCP 7.0
2393
OLAP Services TCP 7.0
2394
MS Theater
2460
157
UDP
DHCP Server SMS Remote Control Agent SMS Remote Control Agent SMS Remote Control Agent SMS Remote Control Agent SMS Remote Control Agent SMS Remote Control Agent SMS Remote Control Agent SMS Remote Control Agent SQL Analysis Server UPNP Device Host SSDP Discovery Service Local Security Authority Local Security Authority Cluster Service NetMeeting
MADCAP UDP SMS Remote TCP Control (control) SMS Remote UDP Control (control) SMS Remote TCP Control (data) SMS Remote UDP Control (data) SMS Remote TCP Chat SMS Remote UPD Chat SMS Remote TCP File Transfer SMS Remote UDP File Transfer SQL Analysis TCP Services UPNP TCP
2535 2701
SSDP event notification Global Catalog Server Global Catalog Server Cluster Services Terminal
TCP
2869
TCP
3268
TCP
3269
UDP
3343
TCP
3389
158
2701 2702 2702 2703 2703 2704 2704 2725 2869
Remote Desktop Sharing Terminal Services Message Queuing Remote Installation Local Security Authority SSDP Discovery Service
Services Terminal Services MSMQ-Ping
TCP
3389
UDP
3527
BINL
UDP
4011
NAT-T
UDP
4500
SSDP legacy TCP event notification Windows Media RTP UDP Services Windows Media RTCP UDP Services ASP.NET State ASP.Net TCP Service Session State Microsoft MOM-Clear TCP Operations Manager 2000
5000
ﺳﺎﻳﺖ ﻣﺎﻳﮑﺮﻭﺳﺎﻓﺖ: ﻣﻨﺒﻊ
159
5004 5005 42424 51515
ﭘﺮﻭﺗﮑﻞ TCP/IP TCP/IPﭘﺮﻭﺗﮑﻞ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺩﺭ ﺍﮐﺜﺮ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺰﺭﮒ ﺍﺳﺖ .ﺑﺎ ﺍﻳﻨﮑﻪ ﭘﺮﻭﺗﮑﻞ
ﻓﻮﻕ ﮐﻨﺪ ﻭ ﻣﺴﺘﻠﺰﻡ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻨﺎﺑﻊ ﺯﻳﺎﺩﻱ ﺍﺳﺖ ،ﻭﻟﻲ ﺑﺪﻟﻴﻞ ﻣﺰﺍﻳﺎﻱ ﺑﺎﻻﻱ ﺁﻥ ﻧﻈﻴﺮ :ﻗﺎﺑﻠﻴﺖ ﺭﻭﺗﻴﻨﮓ ،ﺣﻤﺎﻳﺖ ﺩﺭ ﺍﻏﻠﺐ ﭘﻼﺕ ﻓﻮﺭﻡ ﻫﺎ ﻭ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻋﺎﻣﻞ ﻫﻤﭽﻨﺎﻥ ﺩﺭ ﺯﻣﻴﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎ ﺣﺮﻑ ﺍﻭﻝ ﺭﺍ ﻣﻲ ﺯﻧﺪ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﮐﺎﺭﺑﺮﺍﻥ ﺑﺎ ﺩﺭ ﺍﺧﺘﻴﺎﺭ
ﺩﺍﺷﺘﻦ ﻭﻳﻨﺪﻭﺯ ﻭ ﭘﺲ ﺍﺯ ﺍﺗﺼﺎﻝ ﺑﻪ ﺷﺒﮑﻪ ﺍﻳﻨﺘﺮﻧﺖ ،ﺑﺮﺍﺣﺘﻲ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﮐﺎﺭﺑﺮﺍﻥ ﺩﻳﮕﺮ
ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ ﮐﻪ ﺍﺯ ﻣﮑﻴﻨﺘﺎﺵ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮐﻨﺪ ﺍﻣﺮﻭﺯﻩ ﮐﻤﺘﺮ ﻣﺤﻴﻄﻲ ﺭﺍ ﻣﻲ ﺗﻮﺍﻥ ﻳﺎﻓﺖ ﮐﻪ ﻧﻴﺎﺯﺑﻪ ﺩﺍﻧﺶ ﮐﺎﻓﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ TCP/IPﻧﺒﺎﺷﺪ.
ﺣﺘﻲ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﺷﺒﮑﻪ ﺍﻱ ﻧﺎﻭﻝ ﮐﻪ ﺳﺎﻟﻴﺎﻥ ﻣﺘﻤﺎﺩﻱ ﺍﺯ ﭘﺮﻭﺗﮑﻞ IPX/SPXﺑﺮﺍﻱ
ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮐﺮﺩ ،ﺩﺭﻧﺴــﺨﻪ ﺷﻤﺎﺭﻩ ﭘﻨﺞ ﺧﻮﺩ ﺑﻪ ﺿـــﺮﻭﺭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﻭﺍﻗﻒ ﻭ ﻧﺴﺨﻪ ﺍﺧﺘﺼﺎﺻﻲ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺍﺭﺍﺋﻪ ﻧﻤﻮﺩ. ﭘﺮﻭﺗﮑﻞ TCP/IPﺩﺭ ﺍﺑﺘﺪﺍ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺷﺒﮑﻪ ) ARPAnetﻧﺴﺨﻪ ﻗﺒﻠﻲ ﺍﻳﻨﺘﺮﻧﺖ ( ﻃﺮﺍﺣﻲ ﮔﺮﺩﻳﺪ .ﻭﺯﺍﺭﺕ ﺩﻓﺎﻉ ﺍﻣﺮﻳﮑﺎ ﺑﺎ ﻫﻤﮑﺎﺭﻱ ﺑﺮﺧﻲ ﺍﺯ ﺩﺍﻧﺸﮕﺎﻫﻬﺎ ﺍﻗﺪﺍﻡ ﺑﻪ ﻃﺮﺍﺣﻲ ﻳﮏ
ﺳﻴﺴﺘﻢ ﺟﻬﺎﻧﻲ ﻧﻤﻮﺩ ﮐﻪ ﺩﺍﺭﺍﻱ ﻗﺎﺑﻠﻴﺖ ﻫﺎ ﻭ ﻇﺮﻓﻴﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﺣﺘﻲ ﺩﺭ ﺻﻮﺭﺕ ﺑﺮﻭﺯ ﺟﻨﮓ ﻫﺴﺘﻪ ﺍﻱ ﺑﺎﺷﺪ .ﭘﺮﻭﺗﮑﻞ ﺍﺭﺗﺒﺎﻃﻲ ﺑﺮﺍﻱ ﺷﺒﮑﻪ ﻓﻮﻕ TCP/IP ،ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪ. ﺍﺟﺰﺍﻱ ﭘﺮﻭﺗﮑﻞ TCP/IP
ﭘﺮﻭﺗﮑﻞ TCP/IPﺍﺯ ﻣﺠﻤﻮﻋﻪ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺩﻳﮕﺮ ﺗﺸﮑﻴﻞ ﺷﺪﻩ ﮐﻪ ﻫﺮ ﻳﮏ ﺩﺭ ﻻﻳﻪ
ﻣﺮﺑﻮﻃﻪ ،ﻭﻇﺎﻳﻒ ﺧﻮﺩ ﺭﺍ ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﻨﺪ .ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻻﻳﻪ ﻫﺎﻱ Transportﻭ Networkﺩﺍﺭﺍﻱ ﺍﻫﻤﻴﺖ ﺑﺴﺰﺍﺋﻲ ﺑﻮﺩﻩ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺑﺮﺭﺳﻲ ﺁﻧﻬﺎ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ.
160
ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻻﻳﻪ Networkﭘﺮﻭﺗﮑﻞ TCP/IP •
ﭘﺮﻭﺗﮑﻞ ،(Transmission Control Protocol)TCPﻣﻬﻤﺘﺮﻳﻦ ﻭﻇﻴﻔﻪ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺻﺤﺖ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺍﺻﻄﻼﺣﺎ"
Connection-orientedﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ .ﻋﻠﺖ ﺍﻳﻦ ﺍﻣﺮ ﺍﻳﺠﺎﺩ ﻳﮏ ﺍﺭﺗﺒﺎﻁ ﻣﺠﺎﺯﻱ ﺑﻴﻦ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﮔﻴﺮﻧﺪﻩ ﺑﻌﺪ ﺍﺯ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ
ﻫﺎﺋﻲ ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ،ﺍﻣﮑﺎﻧﺎﺕ ﺑﻴﺸﺘﺮﻱ ﺭﺍﺑﻪ ﻣﻨﻈﻮﺭ ﮐﻨﺘﺮﻝ ﺧﻄﺎﻫﺎﻱ ﺍﺣﺘﻤﺎﻟﻲ ﺩﺭ ﺍﺭﺳﺎﻝ
ﺍﻃﻼﻋﺎﺕ ﻓﺮﺍﻫﻢ ﻧﻤﻮﺩﻩ ﻭﻟﻲ ﺑﺪﻟﻴﻞ ﺍﻓﺰﺍﻳﺶ ﺑﺎﺭ ﻋﻤﻠﻴﺎﺗﻲ ﺳﻴﺴﺘﻢ ﮐﺎﺭﺍﺋﻲ ﺁﻧﺎﻥ ﮐﺎﻫﺶ ﺧﻮﺍﻫﺪ ﻳﺎﻓﺖ .ﺍﺯ ﭘﺮﻭﺗﮑﻞ TCPﺑﻪ ﻋﻨﻮﺍﻥ ﻳﮏ ﭘﺮﻭﺗﮑﻞ ﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥ ﻧﻴﺰ ﻳﺎﺩ
ﻣﻲ ﺷﻮﺩ .ﻋﻠﺖ ﺍﻳﻦ ﺍﻣﺮ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺴﺐ ﺁﮔﺎﻫﻲ ﻻﺯﻡ ﺍﺯ ﮔﻴﺮﻧﺪﻩ ﺍﻃﻼﻋﺎﺕ
ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺻﺤﺖ ﺍﺭﺳﺎﻝ ﺗﻮﺳﻂ ﻓﺮﺳﺘﻨﺪﻩ ﺍﺳﺖ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺪﺭﺳﺘﻲ ﺩﺭﺍﺧﺘﻴﺎﺭ ﻓﺮﺳﺘﻨﺪﻩ ﻗﺮﺍﺭ ﻧﮕﻴﺮﻧﺪ ،ﻓﺮﺳﺘﻨﺪﻩ ﻣﺠﺪﺩﺍ" ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻣﻲ ﻧﻤﺎﻳﺪ.
•
ﭘﺮﻭﺗﮑﻞ . (Datagram Protocol User(UDPﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﻧﻈﻴﺮ ﭘﺮﻭﺗﮑﻞ TCPﺩﺭ ﻻﻳﻪ " ﺣﻤﻞ " ﻓﻌﺎﻟﻴﺖ ﻣﻲ ﻧﻤﺎﻳﺪ UDP .ﺑﺮ ﺧﻼﻑ ﭘﺮﻭﺗﮑﻞ TCP ﺑﺼﻮﺭﺕ " ﺑﺪﻭﻥ ﺍﺗﺼﺎﻝ " ﺍﺳﺖ .ﺑﺪﻳﻬﻲ ﺍﺳﺖ ﮐﻪ ﺳﺮﻋﺖ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﻧﺴﺒﺖ ﺑﻪ TCPﺳﺮﻳﻌﺘﺮ ﺑﻮﺩﻩ ﻭﻟﻲ ﺍﺯ ﺑﻌﺪ ﮐﻨﺘﺮﻝ ﺧﻄﺎﺀ ﺗﻈﻤﻴﻨﺎﺕ ﻻﺯﻡ ﺭﺍ ﺍﺭﺍﺋﻪ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺩ.
ﺑﻬﺘﺮﻳﻦ ﺟﺎﻳﮕﺎﻩ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺩﺭ ﻣﻮﺍﺭﺩﻱ ﺍﺳﺖ ﮐﻪ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﻳﮏ ﺳﻄﺢ ﺑﺎﻻ ﺍﺯ ﺍﻃﻤﻴﻨﺎﻥ ،ﻧﻴﺎﺯ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ.
•
ﭘﺮﻭﺗﮑﻞ . (Internet Protocol(IPﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺩﺭ ﻻﻳﻪ ﺷﺒﮑﻪ ﺍﻳﻔﺎﻱ ﻭﻇﻴﻔﻪ ﮐﺮﺩﻩ ﻭ ﻣﻬﻤﺘﺮﻳﻦ ﻣﺴﺌﻮﻟﻴﺖ ﺁﻥ ﺩﺭﻳﺎﻓﺖ ﻭ ﺍﺭﺳﺎﻝ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﻣﻘﺎﺻﺪ ﺩﺭﺳﺖ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ ﻧﺴﺒﺖ ﺩﺍﺩﻩ ﺷﺪﻩ ﻣﻨﻄﻘﻲ، ﻋﻤﻠﻴﺎﺕ ﺭﻭﺗﻴﻨﮓ ﺭﺍ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺩﺍﺩ.
161
ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻻﻳﻪ Applicationﭘﺮﻭﺗﮑﻞ TCP/IP
ﭘﺮﻭﺗﮑﻞ TCP/IPﺻﺮﻓﺎ" ﺑﻪ ﺳﻪ ﭘﺮﻭﺗﮑﻞ UDP ،TCPﻭ IPﻣﺤﺪﻭﺩ ﻧﺸﺪﻩ ﻭ ﺩﺭ ﺳﻄﺢ ﻻﻳﻪ Applicationﺩﺍﺭﺍﻱ ﻣﺠﻤﻮﻋﻪ ﮔﺴﺘﺮﺩﻩ ﺍﻱ ﺍﺯ ﺳﺎﻳﺮ ﭘﺮﻭﺗﮑﻞ ﻫﺎ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ
ﻓﻮﻗﺒﻪ ﻋﻨﻮﺍﻥ ﻣﺠﻤﻮﻋﻪ ﺍﺑﺰﺍﺭﻫﺎﺋﻲ ﺑﺮﺍﻱ ﻣﺸﺎﻫﺪﻩ ،ﺍﺷﮑﺎﻝ ﺯﺩﺍﺋﻲ ﻭ ﺍﺧﺬ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﻳﺮ ﻋﻤﻠﻴﺎﺕ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲ ﮔﻴﺮﻧﺪ .ﺩﺭ ﺍﻳﻦ ﺑﺨﺶ ﺑﻪ ﻣﻌﺮﻓﻲ ﺑﺮﺧﻲ ﺍﺯ ﺍﻳﻦ ﭘﺮﻭﺗﮑﻞ ﻫﺎ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ. •
ﭘﺮﻭﺗﮑﻞ . (File Transfer Protocol(FTPﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺑﺮﺍﻱ ﺗﮑﺜﻴﺮ ﻓﺎﻳﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﮐﺎﻣﻴﭙﻴﻮﺗﺮ ﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﻳﮕﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻭﻳﻨﺪﻭﺯ ﺩﺍﺭﺍﻱ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﺧﻂ ﺩﺳﺘﻮﺭﻱ ﺑﻮﺩﻩ ﮐﻬﺒﻪ ﻋﻨﻮﺍﻥ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺍﻳﻔﺎﻱ ﻭﻇﻴﻔﻪ
ﮐﺮﺩﻩ ﻭ ﺍﻣﮑﺎﻥ ﺍﺭﺳﺎﻝ ﻭ ﻳﺎ ﺩﺭﻳﺎﻓﺖ ﻓﺎﻳﻞ ﻫﺎ ﺭﺍ ﺍﺯ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ FTPﻓﺮﺍﻫﻢ ﻣﻲ ﮐﻨﺪ. •
ﭘﺮﻭﺗﮑﻞ .(Protocol Simple Network Management(SNMPﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺧﺬ ﺍﻃﻼﻋﺎﺕ ﺁﻣﺎﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻳﮏ ﺳﻴﺴﺘﻢ
ﻣﺪﻳﺮﻳﺘﻲ ،ﺩﺭﺧﻮﺍﺳﺖ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﻳﮏ ﺁﮊﺍﻧﺲ SNMPﻣﻄﺮﺡ ﻭ ﻣﺎﺣﺼﻞ ﻋﻤﻠﻴﺎﺕ ﮐﺎﺭ ﺩﺭ ﻳﮏ MIB-Management Information Baseﺫﺧﻴﺮﻩ
ﻣﻲ ﮔﺮﺩﺩ MIB .ﻳﮏ ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻮﺩﻩ ﮐﻪ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ
ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺭﺍ ﺩﺭ ﺧﻮﺩ ﻧﮕﻬﺪﺍﺭﻱ ﻣﻲ ﻧﻤﺎﻳﺪ) .ﻣﺜﻼ" ﭼﻪ ﻣﻴﺰﺍﻥ ﻓﻀﺎ ﻱ ﻫﺎﺭﺩ ﺩﻳﺴﮏ ﻭﺟﻮﺩ ﺩﺍﺭﺩ(. •
ﭘﺮﻭﺗﮑﻞ . TelNetﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﮐﺎﺭﺑﺮﺍﻥ ﻗﺎﺩﺭ ﺑﻪ ، log onﺍﺟﺮﺍﻱ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﻭ ﻣﺸﺎﻫﺪﻩ ﻓﺎﻳﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﻣﻲ ﺑﺎﺷﻨﺪ. ﻭﻳﻨﺪﻭﺯ ﺩﺍﺭﺍﻱ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭ ﮔﻴﺮﻧﺪﻩ ﺟﻬﺖ ﻓﻌﺎﻝ ﻧﻤﻮﺩﻥ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺘﺎﻧﺴﻴﻞ ﻓﻮﻕ ﺍﺳﺖ.
162
•
ﭘﺮﻭﺗﮑﻞ .( simple Mail Transfer Protocol (SMTPﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ
•
ﭘﺮﻭﺗﮑﻞ .( HyperText Transfer Protocol (HTTPﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ
ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
ﻣﺸﻬﻮﺭﺗﺮﻳﻦ ﭘﺮﻭﺗﮑﻞ ﺩﺭ ﺍﻳﻦ ﮔﺮﻭﻩ ﺑﻮﺩﻩ ﻭ ﺍﺯ ﺁﻥ ﺑﺮﺍﻱ ﺭﺍﻳﺞ ﺗﺮﻳﻦ ﺳﺮﻭﻳﺲ ﺍﻳﻨﺘﺮﻧﺖ ﻳﻌﻨﻲ ﻭﺏ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻗﺎﺩﺭ ﺑﻪ ﻣﺒﺎﺩﻟﻪ
ﻓﺎﻳﻞ ﻫﺎ ﺑﺎ ﻓﺮﻣﺖ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ )ﻣﺘﻦ ،ﺗﺼﺎﻭﻳﺮ،ﮔﺮﺍﻓﻴﮑﻲ ،ﺻﺪﺍ ،ﻭﻳﺪﺋﻮ ﻭ (...ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺑﺮﺍﻱ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﺍﺳﺘﻨﺎﺩ ﺑﻪ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﻣﻲ ﺑﺎﻳﺴﺖ ،ﺳﺮﻭﻳﺲ ﻓﻮﻕ ﺍﺯ
ﻃﺮﻳﻖ ﻧﺼﺐ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﻓﻌﺎﻝ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﮐﺎﺭﺑﺮﺍﻥ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻨﺪﮔﺎﻥ ﺑﺎ
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﻣﺮﻭﺭﮔﺮ ﻭﺏ ﻗﺎﺩﺭ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺮﻭﻳﺲ ﻓﻮﻕ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ. •
ﭘﺮﻭﺗﮑﻞ .(Protocol Network News Transfer (NNTPﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺑﺮﺍﻱ ﻣﺪﻳﺮﻳﺖ ﭘﻴﺎﻡ ﻫﺎﻱ ﺍﺭﺳﺎﻟﻲ ﺑﺮﺍﻱ ﮔﺮﻭﻩ ﻫﺎﻱ ﺧﺒﺮﻱ ﺧﺼﻮﺻﻲ ﻭ ﻋﻤﻮﻣﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺮﺍﻱ ﻋﻤﻠﻴﺎﺗﻲ ﻧﻤﻮﺩﻥ ﺳﺮﻭﻳﺲ ﻓﻮﻕ ﻣﻲ ﺑﺎﻳﺴﺖ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ NNTPﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺪﻳﺮﻳﺖ ﻣﺤﻞ ﺫﺧﻴﺮﻩ ﺳﺎﺯﻱ ﭘﻴﺎﻡ ﻫﺎﻱ ﺍﺭﺳﺎﻟﻲ ﻧﺼﺐ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﮐﺎﺭﺑﺮﺍﻥ ﻭ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﺍﻱ ﻣﻮﺳﻮﻡ ﺑﻪ NewsReader
ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ. ﻣﺪﻝ ﺁﺩﺭﺱ ﺩﻫﻲ IP
ﻋﻼﻭﻩ ﺑﺮ ﺟﺎﻳﮕﺎﻩ ﭘﺮﻭﺗﮑﻞ ﻫﺎ ،ﻳﮑﻲ ﺩﻳﮕﺮ ﺍﺯ ﻋﻨﺎﺻﺮ ﻣﻬﻢ ﺩﺭ ﺯﻳﺮﺳﺎﺧﺖ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ
TCP/IPﻣﺪﻝ ﺁﺩﺭﺱ ﺩﻫﻲ IPﺍﺳﺖ .ﻣﺪﻝ ﺍﻧﺘﺨﺎﺑﻲ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ ﺭﺍ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩ ﮐﻪ ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻟﻲ ﺑﺪﺭﺳﺘﻲ ﺑﻪ ﻣﻘﺼﺪ ﺧﻮﺍﻫﻨﺪ ﺭﺳﻴﺪ. ﻧﺴﺨﻪ ﺷﻤﺎﺭﻩ ﭼﻬﺎﺭ ) IPﻧﺴﺨﻪ ﻓﻌﻠﻲ ( ﺍﺯ ٣٢ﺑﻴﺖ ﺑﺮﺍﻱ ﺁﺩﺭﺱ ﺩﻫﻲ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩﻩ ﮐﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺴﻬﻴﻞ ﺩﺭ ﺍﻣﺮ ﻧﻤﺎﻳﺶ ﺑﺼﻮﺭﺕ ﭼﻬﺎﺭ ﻋﺪﺩ ﺻﺤﻴﺢ ) ﻣﺒﻨﺎﻱ ﺩﻩ ( ﮐﻪ ﺑﻴﻦ ﺁﻧﻬﺎ ﻧﻘﻄﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺍﺳﺖ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﻧﺪ.
163
ﻧﺤﻮﻩ ﺍﺧﺘﺼﺎﺹ IP
ﻧﺤﻮﻩ ﺍﺧﺘﺼﺎﺹ IPﺑﻪ ﻋﻨﺎﺻﺮ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ TCP/IPﻳﮑﻲ ﺍﺯ ﻣﻮﺍﺭﺩ ﺑﺴﻴﺎﺭ ﻣﻬﻢ ﺍﺳﺖ .ﺍﺧﺘﺼﺎﺹ IPﻣﻤﮑﻦ ﺍﺳﺖ ﺑﺼﻮﺭﺕ ﺩﺳﺘﻲ ﻭ ﺗﻮﺳﻂ ﻣﺪﻳﺮﻳﺖ ﺷﺒﮑﻪ
ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﻭ ﻳﺎ ﺍﻧﺠﺎﻡ ﺭﺳﺎﻟﺖ ﻓﻮﻕ ﺑﺮ ﻋﻬﺪﻩ ﻋﻨﺎﺻﺮ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﻧﻈﻴﺮ
DHCPﻭ ﻳﺎ NATﮔﺬﺍﺷﺘﻪ ﮔﺮﺩﺩ Subnetting ﻳﮑﻲ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﻋﻤﻠﻴﺎﺕ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺍﺧﺘﺼﺎﺹ IPﻣﺴﺌﻠﻪ Subnettingﺍﺳﺖ .ﻣﺴﺌﻠﻪ ﻓﻮﻕ ﺑﻪ ﻋﻨﻮﺍﻥ ﻫﻨﺮ ﻭ ﻋﻠﻤﻲ ﺍﺳﺖ ﮐﻪ ﻣﺎﺣﺼﻞ ﺁﻥ ﺗﻘﺴﻴﻢ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺷﺒﮑﻪ
ﻫﺎﻱ ﮐﻮﭼﮑﺘﺮ ) (Subnetﺍﺯ ﻃﺮﻳﻖ ﺑﺨﺪﻣﺖ ﮔﺮﻓﺘﻦ ۳۲ﺑﻴﺖ ﺑﺎ ﻧﺎﻡ Subnet mask
ﺑﻮﺩﻩ ﮐﻪ ﺑﻨﻮﻋﻲ ﻣﺸﺨﺼﻪ ) (IDﺷﺒﮑﻪ ﺭﺍ ﻣﺸﺨﺺ ﺧﻮﺍﻫﺪ ﮐﺮﺩ. ﮐﺎﻟﺒﺪ ﺷﮑﺎﻓﻲ ﺁﺩﺭﺱ ﻫﺎﻱ IP ﻫﺮ ﺩﺳﺘﮕﺎﻩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ TCP/IPﺩﺍﺭﺍﻱ ﻳﮏ ﺁﺩﺭﺱ ﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ ﺍﺳﺖ.
ﺁﺩﺭﺱ ﻓﻮﻕ IPﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ .ﻳﮏ ﺁﺩﺭﺱ IPﻣﻄﺎﺑﻖ ﺯﻳﺮ ﺍﺳﺖ:
219.27.61.137 ﺑﻪ ﻣﻨﻈﻮﺭ ﺑﺨﺎﻃﺮ ﺳﭙﺮﺩﻥ ﺁﺳﺎﻥ ﺁﺩﺭﺱ ﻫﺎﻱ ، IPﻧﺤﻮﻩ ﻧﻤﺎ ﻳﺶ ﺁﻧﻬﺎ ﺑﺼﻮﺭﺕ ﺩﺳﻴﻤﺎﻝ ) ﻣﺒﻨﺎﻱ ﺩﻫﺪﻫﻲ ( ﺑﻮﺩﻩ ﮐﻪ ﺗﻮﺳﻂ ﭼﻬﺎﺭ ﻋﺪﺩ ﮐﻪ ﺗﻮﺳﻂ ﻧﻘﻄﻪ ﺍﺯ ﻳﮑﺪﻳﮕﺮ ﺟﺪﺍ ﻣﻲ ﮔﺮﺩﻧﺪ، ﺍﺳﺖ .ﻫﺮ ﻳﮏ ﺍﺯ ﺍﻋﺪﺍﺩ ﻓﻮﻕ ﺭﺍ octetﻣﻲ ﮔﻮﻳﻨﺪ .ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺑﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺍﺯ ﻣﺒﻨﺎﻱ ﺩﻭ ) ﺑﺎﻳﻨﺮﻱ ( ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﻓﺮﻣﺖ ﺑﺎﻳﻨﺮﻱ ﺁﺩﺭﺱ IPﺍﺷﺎﺭﻩ ﺷﺪﻩ ﺑﺼﻮﺭﺕ ﺯﻳﺮ
ﺍﺳﺖ:
11011000.00011011.00111101.10001001 ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﻣﺸﺎﻫﺪﻩ ﻣﻲ ﮔﺮﺩﺩ ،ﻫﺮ IPﺍﺯ ٣٢ﺑﻴﺖ ﺗﺸﮑﻴﻞ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ
ﻣﻲ ﺗﻮﺍﻥ ﺣﺪﺍﮐﺜﺮ ٤,٢٩٤,٩٦٧,٢٩٦ﺁﺩﺭﺱ ﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ ﺭﺍ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ) .( ٢٣٢ 164
ﻣﺜﻼ" ﺁﺩﺭﺱ ٢٥٥,٢٥٥,٢٥٥,٢٥٥ﺑﺮﺍﻱ ) Broadcastﺍﻧﺘﺸﺎﺭ ﻋﺎﻡ ( ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
ﻧﻤﺎﻳﺶ ﻳﮏ IPﺑﺼﻮﺭﺕ ﭼﻬﺎﺭ ﻋﺪﺩ ) (Octetﺻﺮﻓﺎ" ﺑﺮﺍﻱ ﺭﺍﺣﺘﻲ ﮐﺎﺭ ﻧﺒﻮﺩﻩ ﻭ ﺍﺯ ﺁﻧﺎﻥ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ " ﮐﻼﺱ ﻫﺎﻱ " IPﻧﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ. ﻫﺮ Octetﺑﻪ ﺩﻭ ﺑﺨﺶ ﻣﺠﺰﺍ ﺗﻘﺴﻴﻢ ﻣﻲ ﮔﺮﺩﺩ :ﺷﺒﮑﻪ ) (Netﻭ ﻣﻴﺰﺑﺎﻥ ).(Host
ﺍﻭﻟﻴﻦ octetﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﺷﺒﮑﻪ ﺑﻮﺩﻩ ﻭ ﺍﺯ ﺁﻥ ﺑﺮﺍﻱ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﺷﺒﮑﻪ ﺍﻱ ﮐﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺁﻥ ﺗﻌﻠﻖ ﺩﺍﺭﺩ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺳﻪ ﺑﺨﺶ ﺩﻳﮕﺮ ،octetﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﺁﺩﺭﺱ ﮐﺎﻣﭙﻴﻮﺗﺮ
ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺖ
ﭘﻨﺞ ﮐﻼﺱ ﻣﺘﻔﺎﻭﺕ IPﺑﻬﻤﺮﺍﻩ ﺑﺮﺧﻲ ﺁﺩﺭﺱ ﻫﺎﻱ ﺧﺎﺹ ،ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺍﺳﺖ: •
. Default Networkﺁﺩﺭﺱ ، ٠,٠,٠,٠ IPﺑﺮﺍﻱ ﺷﺒﮑﻪ ﭘﻴﺶ ﻓﺮﺽ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺍﺳﺖ .ﺁﺩﺭﺱ ﻓﻮﻕ ﺑﺮﺍﻱ ﻣﻮﺍﺭﺩﻳﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻴﺰﺑﺎﻥ ﺍﺯ ﺁﺩﺭﺱ ﺧﻮﺩ
ﺁﮔﺎﻫﻲ ﻧﺪﺍﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺗﺎ ﺑﻪ ﭘﺮﻭﺗﮑﻞ ﻫﺎﺋﻲ ﻧﻈﻴﺮ DHCPﺍﻋﻼﻡ ﻧﻤﺎﻳﺪ ﺑﺮﺍﻱ ﻭﻱ ﺁﺩﺭﺳﻲ ﺭﺍ ﺗﺨﺼﻴﺺ ﺩﻫﺪ.
•
ﮐﻼﺱ . Aﮐﻼﺱ ﻓﻮﻕ ﺑﺮﺍﻱ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺴﻴﺎﺭ ﺑﺰﺭﮒ ﻧﻈﻴﺮ ﻳﮏ ﺷﺮﮐﺖ ﺑﻴﻦ ﺍﻟﻤﻠﻠﻲ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﻣﻲ ﺷﻮﺩ .ﺁﺩﺭﺱ ﻫﺎﺋﻲ ﮐﻪ ﺍﻭﻟﻴﻦ octetﺁﻧﻬﺎ ١ﺗﺎ ١٢٦ﺑﺎﺷﺪ ،ﮐﻼﺱ
Aﻣﻲ ﺑﺎﺷﻨﺪ .ﺍﺯ ﺳﻪ octetﺩﻳﮕﺮﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﻣﺠﻤﻮﻉ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﻼﺱ ، Aﻣﻌﺎﺩﻝ ١٢٦ﻭ ﻫﺮ ﻳﮏ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎﻱ ﻓﻮﻕ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ١٦,٧٧٧,٢١٤ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻴﺰﺑﺎﻥ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ.
) ﻋﺪﺩ ﻓﻮﻕ ﺍﺯ ﻃﺮﻳﻖ ﺣﺎﺻﻞ ٢٢٤ - ٢ﺑﺪﺳﺖ ﺁﻣﺪﻩ ﺍﺳﺖ ( .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺗﻌﺪﺍﺩ ﺗﻤﺎﻡ
ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﻼﺱ Aﻣﻌﺎﺩﻝ (٢٣١) ٢,١٤٧,٤٨٣,٦٤٨ﺍﺳﺖ. ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﻼﺱ ، Aﺑﻴﺖ ﺑﺎ ﺍﺭﺯﺵ ﺑﺎﻻ ﺩﺭ ﺍﻭﻟﻴﻦ octetﻫﻤﻮﺍﺭﻩ ﻣﻘﺪﺍﺭ ﺻﻔﺮ ﺭﺍ ﺩﺍﺭﺩ. )Host (Node
NET 115.
24.53.107
165
•
. LoopBackﺁﺩﺭﺱ ١٢٧,٠,٠,١ IPﺑﺮﺍﻱ LoopBackﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪﻩ
ﺍﺳﺖ .ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻴﺰﺑﺎﻥ ﺍﺯ ﺁﺩﺭﺱ ﻓﻮﻕ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﻳﮏ ﭘﻴﺎﻡ ﺑﺮﺍﻱ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﮐﻨﺪ ).ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﮔﻴﺮﻧﺪﻩ ﭘﻴﺎﻡ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻲ ﺑﺎﺷﺪ( ﺁﺩﺭﺱ ﻓﻮﻕ ﺍﻏﻠﺐ ﺑﺮﺍﻱ ﺗﺴﺖ ﻭ ﺍﺷﮑﺎﻝ ﺯﺩﺍﺋﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
•
ﮐﻼﺱ . Bﮐﻼﺱ ﻓﻮﻕ ﺑﺮﺍﻱ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺘﻮﺳﻂ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﻣﻲ ﺷﻮﺩ ).ﻣﺜﻼ" ﻳﮏ ﺩﺍﻧﺸﮕﺎﻩ ﺑﺰﺭﮒ ( ﺁﺩﺭﺱ ﻫﺎﺋﻲ ﮐﻪ ﺍﻭﻟﻴﻦ octetﺁﻧﻬﺎ ١٢٨ﺗﺎ ١٩١ﺑﺎﺷﺪ ،ﮐﻼﺱ B
ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﮐﻼﺱ ﻓﻮﻕ ﺍﺯ ﺩﻭﻣﻴﻦ octetﻫﻢ ﺑﺮﺍﻱ ﻣﺸﺨﺺ ﮐﺮﺩﻥ ﺷﺒﮑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺍﺯ ﺩﻭ octetﺩﻳﮕﺮ ﺑﺮﺍﻱ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ
ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ (٢١٤ ) ١٦,٣٨٤ﺷﺒﮑﻪ ﺍﺯ ﻧﻮﻉ ﮐﻼﺱ B
ﻭﺟﻮﺩ ﺩﺍﺭﺩ .ﺗﻌﺪﺍﺩ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ) ﻫﺮ ﺷﺒﮑﻪ ( ﻣﻌﺎﺩﻝ ( ٢ ١٦ - ٢) ٦٥,٥٣٤ﺍﺳﺖ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺗﻌﺪﺍﺩ ﺗﻤﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﻼﺱ Bﻣﻌﺎﺩﻝ (٢٣٠) ١,٠٧٣,٧٤١,٨٢٤ﺍﺳﺖ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﻼﺱ ،Bﺍﻭﻟﻴﻦ ﻭ ﺩﻭﻣﻴﻦ ﺑﻴﺖ ﺩﺭ ﺍﻭﻟﻴﻦ octetﺑﻪ ﺗﺮﺗﻴﺐ ﻣﻘﺪﺍﺭ ﻳﮏ ﻭ ﺻﻔﺮ ﺭﺍ ﺩﺍﺭﺍ ﻣﻲ ﺑﺎﺷﻨﺪ. NET •
)Host (Node
53.107 145.24. ﮐﻼﺱ . Cﮐﻼﺱ ﻓﻮﻕ ﺑﺮﺍﻱ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﻮﭼﮏ ﺗﺎ ﻣﺘﻮﺳﻂ ﺩﺭ ﻧﻈﺮﮔﺮﻓﺘﻪ ﻣﻲ ﺷﻮﺩ .ﺁﺩﺭﺱ ﻫﺎﺋﻲ ﮐﻪ ﺍﻭﻟﻴﻦ octetﺁﻧﻬﺎ ١٩٢ﺗﺎ ٢٢٣ﺑﺎﺷﺪ ،ﮐﻼﺱ ) ( C
ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﮐﻼﺱ ﻓﻮﻕ ﺍﺯ ﺩﻭﻣﻴﻦ ﻭ ﺳﻮﻣﻴﻦ octetﻫﻢ ﺑﺮﺍﻱ ﻣﺸﺨﺺ ﮐﺮﺩﻥ ﺷﺒﮑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺍﺯ ﺁﺧﺮﻳﻦ octetﺑﺮﺍﻱ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ( ٢ ٢١ ) ٢,٠٩٧,١٥٢
ﺷﺒﮑﻪ ﮐﻼﺱ Cﻭﺟﻮﺩ ﺩﺍﺭﺩ.ﺗﻌﺪﺍﺩ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ) ﻫﺮ ﺷﺒﮑﻪ ( ﻣﻌﺎﺩﻝ ( ٢ ٨ - ٢) ٢٥٤ﺍﺳﺖ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺗﻌﺪﺍﺩ ﺗﻤﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ﺩﺭ
ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﻼﺱ Cﻣﻌﺎﺩﻝ ( ٢٢٩ ) ٥٣٦,٨٧٠,٩١٢ﺍﺳﺖ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﻼﺱ
166
، Cﺍﻭﻟﻴﻦ ،ﺩﻭﻣﻴﻦ ﻭ ﺳﻮﻣﻴﻦ ﺑﻴﺖ ﺩﺭ ﺍﻭﻟﻴﻦ octetﺑﻪ ﺗﺮﺗﻴﺐ ﻣﻘﺪﺍﺭ ﻳﮏ ،ﻳﮏ ﻭ ﺻﻔﺮ ﺭﺍ ﺩﺍﺭﺍ ﻣﻲ ﺑﺎﺷﻨﺪ.
NET •
)Host(Node
107 195.24.53. ﮐﻼﺱ . Dﺍﺯ ﮐﻼﺱ ﻓﻮﻕ ﺑﺮﺍﻱ multicastsﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ
ﻳﮏ ﮔﺮﻩ ) ﻣﻴﺰﺑﺎﻥ( ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﻳﮏ ﮔﺮﻭﻩ ﺧﺎﺹ ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ. ﺗﻤﺎﻡ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﮔﺮﻭﻩ ،ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ ) .ﻣﺜﻼ" ﻳﮏ ﺭﻭﺗﺮ ﺳﻴﺴﮑﻮ ﺁﺧﺮﻳﻦ ﻭﺿﻌﻴﺖ ﺑﻬﻨﮕﺎﻡ ﺷﺪﻩ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﺳﺎﻳﺮ
ﺭﻭﺗﺮﻫﺎﻱ ﺳﻴﺴﮑﻮ ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ ( ﮐﻼﺱ ﻓﻮﻕ ﻧﺴﺒﺖ ﺑﻪ ﺳﻪ ﮐﻼﺱ ﻗﺒﻠﻲ ﺩﺍﺭﺍﻱ ﺳﺎﺧﺘﺎﺭﻱ ﮐﺎﻣﻼ" ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ .ﺍﻭﻟﻴﻦ ،ﺩﻭﻣﻴﻦ ،ﺳﻮﻣﻴﻦ ﻭ ﭼﻬﺎﺭﻣﻴﻦ ﺑﻴﺖ ﺑﻪ ﺗﺮﺗﻴﺐ ﺩﺍﺭﺍﻱ ﻣﻘﺎﺩﻳﺮ ﻳﮏ ،ﻳﮏ ،ﻳﮏ ﻭ ﺻﻔﺮ ﻣﻲ ﺑﺎﺷﻨﺪ ٢٨.ﺑﻴﺖ ﺑﺎﻗﻴﻤﺎﻧﺪﻩ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺸﺨﺺ
ﻧﻤﻮﺩﻥ ﮔﺮﻭﻫﻬﺎﺋﻲ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻮﺩﻩ ﮐﻪ ﭘﻴﺎﻡ Multicastﺑﺮﺍﻱ ﺁﻧﺎﻥ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ
ﻣﻲ ﺷﻮﺩ .ﮐﻼﺱ ﻓﻮﻕ ﻗﺎﺩﺭ ﺑﻪ ﺁﺩﺭﺳﻲ ﺩﻫﻲ ( ٢٢٦) ٢٦٨,٤٣٥,٤٥٦ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺳﺖ. NET •
)Host(Node
24.53.107 224. ﮐﻼﺱ . Eﺍﺯ ﮐﻼﺱ ﻓﻮﻕ ﺑﺮﺍﻱ ﻣﻮﺍﺭﺩ ﺗﺠﺮﺑﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ .ﮐﻼﺱ ﻓﻮﻕ ﻧﺴﺒﺖ ﺑﻪ ﺳﻪ ﮐﻼﺱ ﺍﻭﻟﻴﻪ ﺩﺍﺭﺍﻱ ﺳﺎﺧﺘﺎﺭﻱ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ .ﺍﻭﻟﻴﻦ ،ﺩﻭﻣﻴﻦ ،ﺳﻮﻣﻴﻦ ﻭ ﭼﻬﺎﺭﻣﻴﻦ ﺑﻴﺖ ﺑﻪ ﺗﺮﺗﻴﺐ ﺩﺍﺭﺍﻱ ﻣﻘﺎﺩﻳﺮ ﻳﮏ ،ﻳﮏ ،ﻳﮏ ﻭ ﻳﮏ ﻣﻲ ﺑﺎﺷﻨﺪ ٢٨ .ﺑﻴﺖ ﺑﺎﻗﻴﻤﺎﻧﺪﻩ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﮔﺮﻭﻫﻬﺎﺋﻲ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻮﺩﻩ ﮐﻪ ﭘﻴﺎﻡ
Multicastﺑﺮﺍﻱ ﺁﻧﺎﻥ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﻣﻲ ﺷﻮﺩ .ﮐﻼﺱ ﻓﻮﻕ ﻗﺎﺩﺭ ﺑﻪ ﺁﺩﺭﺳﻲ ﺩﻫﻲ ( ٢٢٦) ٢٦٨,٤٣٥,٤٥٦ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺳﺖ NET
)Host(Node
240.
24.53.107
167
•
. BroadCastﭘﻴﺎﻡ ﻫﺎﺋﻲ ﺑﺎ ﺁﺩﺭﺳﻲ ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ،ﺑﺮﺍﻱ ﺗﻤﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺩﺭ ﺷﺒﮑﻪ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺍﻳﻦ ﻧﻮﻉ ﭘﻴﺎﻡ ﻫﺎ ﻫﻤﻮﺍﺭﻩ ﺩﺍﺭﺍﻱ ﺁﺩﺭﺱ ﺯﻳﺮ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ:
•
255.255.255.255 ﺁﺩﺭﺱ ﻫﺎﻱ ﺭﺯﻭ ﺷﺪﻩ .ﺁﺩﺭﺱ ﻫﺎﻱ IPﺯﻳﺮﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺧﺼﻮﺻﻲ )ﺍﻳﻨﺘﺮﺍﻧﺖ ( ﺭﺯﻭ ﺷﺪﻩ ﺍﻧﺪ:
10.x.x.x 172.16.x.x172.31.x.x 192.168.x.x IPﻧﺴﺨﻪ ﺷﺶ .ﻧﺴﺨﻪ ﻓﻮﻕ ﺑﺮﺧﻼﻑ ﻧﺴﺨﻪ ﻓﻌﻠﻲ ﮐﻪ ﺍﺯ ٣٢ﺑﻴﺖ ﺑﻪ ﻣﻨﻈﻮﺭ ﺁﺩﺭﺱ ﺩﻫﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺍﺯ ١٢٨ﺑﻴﺖ ﺑﺮﺍﻱ ﺁﺩﺭﺱ ﺩﻫﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮐﻨﺪ .ﻫﺮ ﺷﺎﻧﺰﺩﻩ ﺑﻴﺖ
ﺑﺼﻮﺭﺕ ﻣﺒﻨﺎﻱ ﺷﺎﻧﺰﺩﻩ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ: . ﺧﻼﺻﻪ :
2b63:1478:1ac5:37ef:4e8c:75df:14cd:93f2
Class
1st Octet Net ID
2nd Octet
3rd Octet
4th Octet Host ID
A Host ID
Net ID B Net ID C Network Type Class A
001.x.x.x to 126.x.x.x
Class B
128.1.x.x to 191.254.x.x
Class C Class D Class E
Normal Comments Netmask For very large networks 255.0.0.0 For medium size 255.255.0.0 networks
Address Range
192.0.1.x to 223.255.254.x 224.x.x.x to 239.255.255.255 240.x.x.x to 247.255.255.255
Host ID
255.255.255.0
168
For small networks Used to support multicasting
ﻣﻔﺎﻫﻴﻢ ﺍﻭﻟﻴﻪ ﭘﺮﻭﺗﮑﻞ ) TCP/IPﻗﺴﻤﺖ ﺍﻭﻝ ( ،TCP/IPﻳﮑﻲ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺳﺖ. ﺍﻳﻨﺘﺮﻧﺖ ﺑﻌﻨﻮﺍﻥ ﺑﺰﺭﮔﺘﺮﻳﻦ ﺷﺒﮑﻪ ﻣﻮﺟﻮﺩ ،ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺑﻤﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﭘﺮﻭﺗﮑﻞ ،ﻣﺠﻤﻮﻋﻪ ﻗﻮﺍﻧﻴﻦ ﻻﺯﻡ ﺑﻤﻨﻈﻮﺭ ﻗﺎﻧﻮﻧﻤﻨﺪ ﻧﻤﻮﺩﻥ ﻧﺤﻮﻩ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺳﺖ .ﺩﺭ ﻣﺠﻤﻮﻋﻪ ﻣﻘﺎﻻﺗﻲ ﮐﻪ ﺍﺭﺍﺋﻪ ﺧﻮﺍﻫﺪ ﺷﺪ ﺑﻪ
ﺑﺮﺭﺳﻲ ﺍﻳﻦ ﭘﺮﻭﺗﮑﻞ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ .ﺩﺭ ﺍﻳﻦ ﺑﺨﺶ ﻣﻮﺍﺭﺩﻱ ﻫﻤﭽﻮﻥ :ﻓﺮﺁﻳﻨﺪ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ،ﻣﻌﺮﻓﻲ ﻭ ﺗﺸﺮﻳﺢ ﻻﻳﻪ ﻫﺎﻱ ﭘﺮﻭﺗﮑﻞ TCP/IPﻭ ﻧﺤﻮﻩ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻮﮐﺖ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺗﻤﺎﻳﺰ ﺩﺭ ﺍﺭﺗﺒﺎﻃﺎﺕ ،ﺗﺸﺮﻳﺢ ﻣﻲ ﮔﺮﺩﺩ.
ﻣﻘﺪﻣﻪ
ﺍﻣﺮﻭﺯﻩ ﺍﮐﺜﺮ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺑﺰﺭﮒ ﻭ ﺍﻏﻠﺐ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻋﺎﻣﻞ ﻣﻮﺟﻮﺩ ﺍﺯ
ﭘﺮﻭﺗﮑﻞ ،TCP/IPﺍﺳﺘﻔﺎﺩﻩ ﻭ ﺣﻤﺎﻳﺖ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ، TCP/IP .ﺍﻣﮑﺎﻧﺎﺕ ﻻﺯﻡ ﺑﻤﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻏﻴﺮﻣﺸﺎﺑﻪ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﺁﻭﺭﺩ. ﺍﺯ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﻣﻬﻢ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ،ﻣﻲ ﺗﻮﺍﻥ ﺑﻪ ﻣﻮﺍﺭﺩﻱ ﻫﻤﭽﻮﻥ :ﻗﺎﺑﻠﻴﺖ ﺍﺟﺮﺍﺀ ﺑﺮ ﺭﻭﻱ
ﻣﺤﻴﻂ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ،ﺿﺮﻳﺐ ﺍﻃﻤﻴﻨﺎﻥ ﺑﺎﻻ ،ﻗﺎﺑﻠﻴﺖ ﮔﺴﺘﺮﺵ ﻭ ﺗﻮﺳﻌﻪ ﺁﻥ ،ﺍﺷﺎﺭﻩ ﮐﺮﺩ .ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ،ﺑﻤﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﻣﺘﻨﻮﻉ ﺁﻥ ﻧﻈﻴﺮ ﻭﺏ ﻭ ﻳﺎ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺗﻨﻮﻉ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﭘﺸﺘﻪ TCP/IPﻭ ﺍﺭﺗﺒﺎﻁ ﻣﻨﻄﻘﻲ ﻭ ﺳﻴﺴﺘﻤﺎﺗﻴﮏ ﺁﻧﻬﺎ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ،ﺍﻣﮑﺎﻥ ﺗﺤﻘﻖ ﺍﺭﺗﺒﺎﻁ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ
ﺭﺍ ﺑﺎ ﺍﻫﺪﺍﻑ ﻣﺘﻔﺎﻭﺕ ،ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ .ﻓﺮﺁﻳﻨﺪ ﺑﺮﻗﺮﺍﺭﻱ ﻳﮏ ﺍﺭﺗﺒﺎﻁ ،ﺷﺎﻣﻞ ﻓﻌﺎﻟﻴﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﻧﻈﻴﺮ :ﺗﺒﺪﻳﻞ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺁﺩﺭﺱ IPﻣﻌﺎﺩﻝ ،ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﻣﻮﻗﻌﻴﺖ ﮐﺎﻣﭙﻴﻮﺗﺮ
ﻣﻘﺼﺪ ،ﺑﺴﺘﻪ ﺑﻨﺪﻱ ﺍﻃﻼﻋﺎﺕ ،ﺁﺩﺭﺱ ﺩﻫﻲ ﻭ ﺭﻭﺗﻴﻨﮓ ﺩﺍﺩﻩ ﻫﺎ ﺑﻤﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﻣﻮﻓﻘﻴﺖ ﺁﻣﻴﺰ ﺑﻪ ﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈﺮ ،ﺑﻮﺩﻩ ﮐﻪ ﺗﻮﺳﻂ ﻣﺠﻤﻮﻋﻪ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﭘﺸﺘﻪ TCP/IP ﺍﻧﺠﺎﻡ ﻣﻲ ﮔﻴﺮﺩ.
169
ﻣﻌﺮﻓﻲ ﭘﺮﻭﺗﮑﻞ TCP/IP
، TCP/IPﭘﺮﻭﺗﮑﻠﻲ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺑﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﻣﺒﺘﻨﻲ
ﺑﺮ ﻭﻳﻨﺪﻭﺯ ۲۰۰۰ﺍﺳﺖ .ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ،ﺑﻤﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺰﺭﮒ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﮔﺮﺩﺩ .ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺍﺯ ﻃﺮﻳﻖ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﮐﻪ ﺩﺭ ﭼﻬﺎﺭﻻﻳﻪ ﻣﺠﺰﺍ ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﺷﺪﻩ ﺍﻧﺪ ،ﻣﻴﺴﺮ ﻣﻲ ﮔﺮﺩﺩ .ﻫﺮ ﻳﮏ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﭘﺸﺘﻪ ، TCP/IP ﺩﺍﺭﺍﻱ ﻭﻇﻴﻔﻪ ﺍﻱ ﺧﺎﺹ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ) ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ( ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺯﻣﺎﻥ ﺍﻳﺠﺎﺩ ﻳﮏ ﺍﺭﺗﺒﺎﻁ ،ﻣﻤﮑﻦ ﺍﺳﺖ ﺩﺭ ﻳﮏ ﻟﺤﻈﻪ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ،ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ
ﻧﻤﺎﻳﻨﺪ ،TCP/IP .ﺩﺍﺭﺍﻱ ﻗﺎﺑﻠﻴﺖ ﺗﻔﮑﻴﮏ ﻭ ﺗﻤﺎﻳﺰ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﺎ ﺳﺎﻳﺮ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﺑﻮﺩﻩ ﻭ ﭘﺲ ﺍﺯ ﺩﺭﻳﺎﻓﺖ ﺩﺍﺩﻩ ﻫﺎ ﺍﺯ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ،ﺁﻧﻬﺎ ﺭﺍ ﺑﺮﺍﻱ ﺑﺮﻧﺎﻣﻪ ﻣﺘﻨﺎﻇﺮ
ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﻳﮕﺮ ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ .ﻧﺤﻮﻩ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺗﻮﺳﻂ ﭘﺮﻭﺗﮑﻞ
TCP/IPﺍﺯ ﻣﺤﻠﻲ ﺑﻪ ﻣﺤﻞ ﺩﻳﮕﺮ ،ﺑﺎ ﻓﺮﺁﻳﻨﺪ ﺍﺭﺳﺎﻝ ﻳﮏ ﻧﺎﻣﻪ ﺍﺯ ﺷـــﻬﺮﻱ ﺑﻪ ﺷــــﻬﺮ، ﻗﺎﺑﻞ ﻣﻘﺎﻳﺴﻪ ﺍﺳﺖ.
ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﻣﺒﺘﻨﻲ ﺑﺮ ، TCP/IPﺑﺎ ﻓﻌﺎﻝ ﺷﺪﻥ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﺑﺮ ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍ ﺁﻏﺎﺯ
ﻣﻲ ﮔﺮﺩﺩ .ﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ،ﺩﺍﺩﻩ ﻫـﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺟﻬﺖ ﺍﺭﺳﺎﻝ ﺭﺍ ﺑﮕــﻮﻧﻪ ﺍﻱ ﺁﻣــﺎﺩﻩ ﻭ ﻓﺮﻣـــﺖ ﻣﻲ ﻧﻤﺎﻳﺪ ﮐﻪ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﻗﺎﺑﻞ ﺧﻮﺍﻧﺪﻥ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺑﺎﺷﻨﺪ ) .ﻣﺸﺎﺑﻪ ﻧﻮﺷﺘﻦ
ﻧﺎﻣﻪ ﺑﺎ ﺯﺑﺎﻧﻲ ﮐﻪ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ،ﻗﺎﺩﺭ ﺑﻪ ﻣﻄﺎﻟﻌﻪ ﺁﻥ ﺑﺎﺷﺪ( .ﺩﺭ ﺍﺩﺍﻣﻪ ﺁﺩﺭﺱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ، ﺑﻪ ﺩﺍﺩﻩ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺍﺿﺎﻓﻪ ﻣﻲ ﮔﺮﺩﺩ ) ﻣﺸﺎﺑﻪ ﺁﺩﺭﺱ ﮔﻴﺮﻧﺪﻩ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﻧﺎﻣﻪ ﻣﺸﺨﺺ ﻣﻲ ﮔﺮﺩﺩ( .ﭘﺲ ﺍﺯ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ،ﺩﺍﺩﻩ ﺑﻬﻤﺮﺍﻩ ﺍﻃﻼﻋﺎﺕ ﺍﺿﺎﻓﻲ ) ﺩﺭﺧﻮﺍﺳﺘﻲ ﺑﺮﺍﻱ ﺗﺎﺋﻴﺪ ﺩﺭﻳﺎﻓﺖ ﺩﺭ ﻣﻘﺼﺪ ( ،ﺩﺭ ﻃﻮﻝ ﺷﺒﮑﻪ ﺑﺤﺮﮐﺖ ﺩﺭﺁﻣﺪﻩ ﺗﺎ ﺑﻪ ﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺮﺳﺪ. ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ،ﺍﺭﺗﺒﺎﻃﻲ ﺑﻪ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺷﺒﮑﻪ ﺑﻤﻨﻈﻮﺭ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻧﺪﺍﺷﺘﻪ ،ﻭ ﺗﺤﻘﻖ ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﺑﺎ ﺭﻭﻳﮑﺮﺩﻱ ﻣﺴﺘﻘﻞ ﻧﺴﺒﺖ ﺑﻪ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ،ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ.
170
ﻻﻳﻪ ﻫﺎﻱ ﭘﺮﻭﺗﮑﻞ TCP/IP
، TCP/IPﻓﺮﺁﻳﻨﺪﻫﺎﻱ ﻻﺯﻡ ﺑﻤﻨﻈﻮﺭ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺭﺍ ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﻭ ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ
ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺩﺭ ﭘﺸﺘﻪ TCP/IPﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺑﻤﻨﻈﻮﺭ ﺍﻓﺰﺍﻳﺶ ﮐﺎﺭﺁﺋﻲ ﺩﺭ
ﺗﺤﻘﻖ ﻓﺮﺁﻳﻨﺪ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ،ﭘﺮﻭﺗﮑﻞ ﻫﺎ ﺩﺭ ﻻﻳﻪ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ،ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﺷﺪﻩ ﺍﻧﺪ. ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﺩﺭﺱ ﺩﻫﻲ ﺩﺭ ﺍﻧﺘﻬﺎ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﻭ ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻗﺎﺩﺭ ﺑﻪ ﺑﺮﺭﺳﻲ ﺁﻥ ﺑﺎ ﺳﺮﻋﺖ ﻣﻄﻠﻮﺏ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ،ﺻﺮﻓﺎ" ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﮐﻪ ﺑﻌﻨﻮﺍﻥ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﻣﻌﺮﻓﻲ ﺷﺪﻩ ﺍﺳﺖ ،ﺍﻣﮑﺎﻥ ﺑﺎﺯ ﻧﻤﻮﺩﻥ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻭ ﺍﻧﺠﺎﻡ
ﭘﺮﺩﺍﺯﺵ ﻫﺎﻱ ﻻﺯﻡ ﺑﺮ ﺭﻭﻱ ﺁﻥ ﺭﺍ ﺩﺍﺭﺍ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ، TCP/IP .ﺍﺯ ﻳﮏ ﻣﺪﻝ ﺍﺭﺗﺒﺎﻃﻲ ﭼﻬﺎﺭ ﻻﻳﻪ ﺑﻤﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﻣﺤﻠﻲ ﺑﻪ ﻣﺤﻞ ﺩﻳﮕﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪApplication :
,Transport ,Internetﻭ ،Interface Networkﻻﻳﻪ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﭘﺮﻭﺗﮑﻞ TCP/IPﻣﻲ ﺑﺎﺷﻨﺪ.ﻫﺮ ﻳﮏ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻭﺍﺑﺴﺘﻪ ﺑﻪ ﭘﺸﺘﻪ ، TCP/IPﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺭﺳﺎﻟﺖ ﺧﻮﺩ ،ﺩﺭ ﻳﮑﻲ ﺍﺯ ﻻﻳﻪ ﻫﺎﻱ ﻓﻮﻕ ،ﻗﺮﺍﺭ ﻣﻲ ﮔﻴﺮﻧﺪ.
ﻻﻳﻪ Application
ﻻﻳﻪ ، Applicationﺑﺎﻻﺗﺮﻳﻦ ﻻﻳﻪ ﺩﺭ ﭘﺸﺘﻪ TCP/IPﺍﺳﺖ .ﺗﻤﺎﻣﻲ ﺑﺮﻧﺎﻣﻪ ﻭ ﺍﺑﺰﺍﺭﻫﺎﻱ
ﮐﺎﺭﺑﺮﺩﻱ ﺩﺭ ﺍﻳﻦ ﻻﻳﻪ ،ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻻﻳﻪ ﻓﻮﻕ ،ﻗﺎﺩﺭ ﺑﻪ ﺩﺳﺘﺘﻴﺎﺑﻲ ﺑﻪ ﺷﺒﮑﻪ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ. ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ ﻻﻳﻪ ﺑﻤﻨﻈﻮﺭ ﻓﺮﻣﺖ ﺩﻫﻲ ﻭ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﻧﺪ HTTP .ﻭ FTPﺩﻭ ﻧﻤﻮﻧﻪ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎ ﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ ﻻﻳﻪ ﻣﻲ ﺑﺎﺷﻨﺪ.
171
•
ﭘﺮﻭﺗﮑﻞ .(HTTP)Hyper text Transfer Protocolﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ،
•
ﭘﺮﻭﺗﮑﻞ . (FTP)File Transfer Protocolﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﻭ
ﺑﻤﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﻓﺎﻳﻞ ﻫﺎﻱ ﺻﻔﺤﺎﺕ ﻭﺏ ﻣﺮﺑﻮﻁ ﺑﻪ ﻭﺏ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
ﺩﺭﻳﺎﻓﺖ ﻓﺎﻳﻞ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
ﻻﻳﻪ Transport
ﻻﻳﻪ " ﺣﻤﻞ " ،ﻗﺎﺑﻠﻴﺖ ﺍﻳﺠﺎﺩ ﻧﻈﻢ ﻭ ﺗﺮﺗﻴﺐ ﻭ ﺗﻀﻤﻴﻦ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻭ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ
ﺑﻪ ﻻﻳﻪ ) Applicationﻻﻳﻪ ﺑﺎﻻﻱ ﺧﻮﺩ( ﻭ ﻳﺎ ﻻﻳﻪ ﺍﻳﻨﺘﺮﻧﺖ ) ﻻﻳﻪ ﭘﺎﻳﻴﻦ ﺧﻮﺩ( ﺭﺍ ﺑﺮ ﻋﻬﺪﻩ ﺩﺍﺭﺩ .ﻻﻳﻪ ﻓﻮﻕ ،ﻫﻤﭽﻨﻴﻦ ﻣﺸﺨﺼﻪ ﻣﻨﺤﺼﺮﺑﻔﺮﺩﻱ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﺍﻱ ﮐﻪ ﺩﺍﺩﻩ ﺭﺍ ﻋﺮﺿﻪ ﻧﻤﻮﺩﻩ ﺍﺳﺖ ،ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺍﻳﻦ ﻻﻳﻪ ﺩﺍﺭﺍﻱ ﺩﻭ ﭘﺮﻭﺗﮑﻞ ﺍﺳﺎﺳﻲ ﺍﺳﺖ ﮐﻪ ﻧﺤﻮﻩ ﺗﻮﺯﻳﻊ ﺩﺍﺩﻩ ﺭﺍ
ﮐﻨﺘﺮﻝ ﻣﻲ ﻧﻤﺎﻳﻨﺪ. •
.(TCP)Transmission Control Protocolﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ،ﻣﺴﺌﻮﻝ ﺗﻀﻤﻴﻦ ﺻﺤﺖ ﺗﻮﺯﻳﻊ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺖ .
•
.(Datagram Protocol UDP)Userﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ،ﺍﻣﮑﺎﻥ ﻋﺮﺿﻪ ﺳﺮﻳﻊ
ﺍﻃﻼﻋﺎﺕ ﺑﺪﻭﻥ ﭘﺬﻳﺮﻓﺘﻦ ﻣﺴﺌﻮﻟﻴﺘﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﻀﻤﻴﻦ ﺻﺤﺖ ﺗﻮﺯﻳﻊ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ.
ﻻﻳﻪ ﺍﻳﻨﺘﺮﻧﺖ
ﻻﻳﻪ "ﺍﻳﻨﺘﺮﻧﺖ" ،ﻣﺴﺌﻮﻝ ﺁﺩﺭﺱ ﺩﻫﻲ ،ﺑﺴﺘﻪ ﺑﻨﺪﻱ ﻭ ﺭﻭﺗﻴﻨﮓ ﺩﺍﺩﻩ ﻫﺎ ،ﺍﺳﺖ .ﻻﻳﻪ ﻓﻮﻕ ،ﺷﺎﻣﻞ ﭼﻬﺎﺭ ﭘﺮﻭﺗﮑﻞ ﺍﺳﺎﺳﻲ ﺍﺳﺖ: •
. (IP)Internet Protocolﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ،ﻣﺴﺌﻮﻝ ﺁﺩﺭﺳﻲ ﺩﺍﺩﻩ ﻫﺎ ﺑﻤﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ
ﺑﻪ ﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺳﺖ. •
.(Protocol ARP)Address Resoulationﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ،ﻣﺴﺌﻮﻝ ﻣﺸﺨﺺ
ﻧﻤﻮﺩﻥ ﺁﺩﺭﺱ (Access Control MAC)Mediaﺁﺩﺍﭘﺘﻮﺭ ﺷﺒﮑﻪ ﺑﺮ ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺍﺳﺖ.
172
•
. (ICMP)Internet Control Message Protocolﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ،ﻣﺴﺌﻮﻝ
ﺍﺭﺍﺋﻪ ﺗﻮﺍﺑﻊ ﻋﻴﺐ ﻳﺎﺑﻲ ﻭ ﮔﺰﺍﺭﺵ ﺧﻄﺎﺀ ﺩﺭ ﺻﻮﺭﺕ ﻋﺪﻡ ﺗﻮﺯﻳﻊ ﺻﺤﻴﺢ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺖ. •
.(Protocol Managemant IGMP)Internet Groupﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ،
ﻣﺴﺌﻮﻝ ﻣﺪﻳﺮﻳﺖ Multicastingﺩﺭ TCP/IPﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ. ﻻﻳﻪ Network Interface
ﻻﻳﻪ " ﺍﻳﻨﺘﺮﻓﻴﺲ ﺷﺒﮑﻪ " ،ﻣﺴﺌﻮﻝ ﺍﺳﺘﻘﺮﺍﺭ ﺩﺍﺩﻩ ﺑﺮ ﺭﻭﻱ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺷﺒﮑﻪ ﻭ ﺩﺭﻳﺎﻓﺖ ﺩﺍﺩﻩ ﺍﺯ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺷﺒﮑﻪ ﺍﺳﺖ .ﻻﻳﻪ ﻓﻮﻕ ،ﺷﺎﻣﻞ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻓﻴﺰﻳﮑﻲ ﻧﻈﻴﺮ ﮐﺎﺑﻞ ﺷﺒﮑﻪ ﻭ ﺁﺩﺍﭘﺘﻮﺭﻫﺎﻱ ﺷﺒﮑﻪ ﺍﺳﺖ .ﮐﺎﺭﺕ ﺷﺒﮑﻪ ) ﺁﺩﺍﭘﺘﻮﺭ( ﺩﺍﺭﺍﻱ ﻳﮏ ﻋﺪﺩ ﺩﻭﺍﺯﺩﻩ ﺭﻗﻤﻲ ﻣﺒﻨﺎﻱ
ﺷﺎﻧﺰﺩﻩ ) ﻧﻈﻴﺮ ( B5-50-04-22-D4-66 :ﺑﻮﺩﻩ ﮐﻪ ﺁﺩﺭﺱ ،MACﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ. ﻻﻳﻪ " ﺍﻳﻨﺘﺮﻓﻴﺲ ﺷﺒﮑﻪ " ،ﺷﺎﻣﻞ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻣﺸﺎﺑﻪ ﻻﻳﻪ ﻫﺎﻱ ﻗﺒﻞ، ﻧﻤﻲ ﺑﺎﺷﺪ .ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ Ethernetﻭ ،(ATM)Asynchronous Transfer Mode
ﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ ﻻﻳﻪ ﻣﻲ ﺑﺎﺷﻨﺪ .ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻓﻮﻕ ،ﻧﺤﻮﻩ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺩﺭ ﺷﺒﮑﻪ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﺑﺮﻧﺎﻣﻪ ﻫﺎ
ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ،ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﻱ ﻣﺘﻌﺪﺩﻱ ﺩﺭ ﻳﮏ ﺯﻣﺎﻥ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻣﺮﺗﺒﻂ ﻣﻲ ﮔﺮﺩﻧﺪ.
ﺯﻣﺎﻧﻴﮑﻪ ﭼﻨﺪﻳﻦ ﺑﺮﻧﺎﻣﻪ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻓﻌﺎﻝ ﻣﻲ ﮔﺮﺩﻧﺪ ، TCP/IP ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﺭﻭﺷﻲ ﺑﻤﻨﻈﻮﺭ ﺗﻤﺎﻳﺰ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﺩﻳﮕﺮ ،ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﺪ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ،ﺍﺯ ﻳﮏ ﺳﻮﮐﺖ ) (Socketﺑﻤﻨﻈﻮﺭ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﺧﺎﺹ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
173
ﺁﺩﺭﺱ IP
ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ،ﻣﺴﺘﻠﺰﻡ ﻣﺸﺨﺺ ﺷﺪﻥ ﺁﺩﺭﺱ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﺒﺪﺍﺀ ﻭ ﻣﻘﺼﺪ ﺍﺳﺖ ) ﺷﺮﻁ ﺍﻭﻟﻴﻪ ﺑﻤﻨﻈﻮﺭ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺩﻭ ﻧﻘﻄﻪ ،ﻣﺸﺨﺺ ﺑﻮﺩﻥ ﺁﺩﺭﺱ ﻧﻘﺎﻁ ﺩﺭﮔﻴﺮ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﺍﺳﺖ ( .ﺁﺩﺭﺱ ﻫﺮ ﻳﮏ ﺍﺯ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﺩﺭﮔﻴﺮ ﺩﺭ ﻓﺮﺁﻳﻨﺪ ﺍﺭﺗﺒﺎﻁ ،ﺗﻮﺳﻂ
ﻳﮏ ﻋﺪﺩ ﻣﻨﺤﺼﺮﺑﻔﺮﺩ ﮐﻪ IPﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ ،ﻣﺸﺨﺺ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺁﺩﺭﺱ ﻓﻮﻕ ﺑﻪ ﻫﺮﻳﮏ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻧﺴﺒﺖ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ ، ١٠,١,١ .١٠ : IP .ﻧﻤﻮﻧﻪ ﺍﻱ ﺩﺭ
ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺍﺳﺖ.
ﭘﻮﺭﺕ TCP/UDP
ﭘﻮﺭﺕ ﻣﺸﺨﺼﻪ ﺍﻱ ﺑﺮﺍﻱ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﻭ ﺩﺭ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺧﺎﺹ ﺍﺳﺖ .ﭘﻮﺭﺕ ﺑﺎ ﻳﮑﻲ
ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻻﻳﻪ "ﺣﻤﻞ" ) TCPﻭ ﻳﺎ ( UDPﻣﺮﺗﺒﻂ ﻭ ﭘﻮﺭﺕ TCPﻭ ﻳﺎ ﭘﻮﺭﺕ
، UDPﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ .ﭘﻮﺭﺕ ﻣﻲ ﺗﻮﺍﻧﺪ ﻋﺪﺩﻱ ﺑﻴﻦ ﺻﻔﺮ ﺗﺎ ۶۵۵۳۵ﺭﺍ ﺷﺎﻣﻞ ﺷﻮﺩ .ﭘﻮﺭﺕ ﻫﺎ ﺑﺮﺍﻱ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ TCP/IPﺳﻤﺖ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ،ﺑﻌﻨﻮﺍﻥ ﭘﻮﺭﺕ ﻫﺎﻱ "ﺷﻨﺎﺧﺘﻪ ﺷﺪﻩ " ﻧﺎﻣﻴﺪﻩ ﺷﺪﻩ ﻭ ﺑﻪ ﺍﻋﺪﺍﺩ ﮐﻤﺘﺮ ﺍﺯ ۱۰۲۴ﺧﺘﻢ ﻭ ﺭﺯﻭ ﻣﻲ ﺷﻮﻧﺪ ﺗﺎ ﻫﻴﭽﮕﻮﻧﻪ ﺗﻌﺎﺭﺽ ﻭ ﺑﺮﺧﻮﺭﺩﻱ ﺑﺎ ﺳﺎﻳﺮ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﺑﻮﺟﻮﺩ ﻧﻴﺎﻳﺪ .ﻣﺜﻼ" ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ FTPﺍﺯ ﭘﻮﺭﺕ
TCPﺑﻴﺴﺖ ﻭ ﻳﺎ ﺑﻴﺴﺖ ﻭﻳﮏ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ. ﺳﻮﮐﺖ )(Socket
ﺳﻮﮐﺖ ،ﺗﺮﮐﻴﺒﻲ ﺍﺯ ﻳﮏ ﺁﺩﺭﺱ IPﻭ ﭘﻮﺭﺕ TCPﻭﻳﺎ ﭘﻮﺭﺕ UDPﺍﺳﺖ .ﻳﮏ
ﺑﺮﻧﺎﻣﻪ ،ﺳﻮﮐﺘﻲ ﺭﺍ ﺑﺎ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﺁﺩﺭﺱ IPﻣﺮﺑﻮﻁ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻭ ﻧﻮﻉ ﺳﺮﻭﻳﺲ )TCP
ﺑﺮﺍﻱ ﺗﻀﻤﻴﻦ ﺗﻮﺯﻳﻊ ﺍﻃﻼﻋﺎﺕ ﻭ ﻳﺎ (UDPﻭ ﭘﻮﺭﺗﻲ ﮐﻪ ﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﺑﺮﻧﺎﻣﻪ ﺍﺳﺖ ،ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺁﺩﺭﺱ IPﻣﻮﺟﻮﺩ ﺩﺭ ﺳﻮﮐﺖ ،ﺍﻣﮑﺎﻥ ﺁﺩﺭﺱ ﺩﻫﻲ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺭﺍ ﻓﺮﺍﻫﻢ ﻭ ﭘﻮﺭﺕ ﻣﺮﺑﻮﻃﻪ ،ﺑﺮﻧﺎﻣﻪ ﺍﻱ ﺭﺍ ﮐﻪ ﺩﺍﺩﻩ ﻫﺎ ﺑﺮﺍﻱ ﺁﻥ ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ.
174
ﻣﻔﺎﻫﻴﻢ ﺍﻭﻟﻴﻪ ﭘﺮﻭﺗﮑﻞ ) TCP/IPﻗﺴﻤﺖ ﺩﻭﻡ ( ﺩﺭ ﻗﺴﻤﺖ ﺍﻭﻝ ،ﭘﺮﻭﺗﮑﻞ TCP/IPﺑﻬﻤﺮﺍﻩ ﻻﻳﻪ ﻫﺎﻱ ﺁﻥ ﻣﻌﺮﻓﻲ ﮔﺮﺩﻳﻴﺪ .ﺩﺭ ﺍﻳﻦ ﻗﺴﻤﺖ ،ﺑﻪ ﺑﺮﺭﺳﻲ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ TCP/IPﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ.
، TCP/IPﺷﺎﻣﻞ ﺷﺶ ﭘﺮﻭﺗﮑﻞ ﺍﺳﺎﺳﻲ) ( ARP، TCP,UDP,IP,ICMP,IGMPﻭ
ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﮐﺎﺭﺑﺮﺩﻱ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻓﻮﻕ ،ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺍﺳﺘﺎﺩﻧﺪﺍﺭﺩﻫﺎ ﻱ ﻻﺯﻡ ﺑﻤﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻭ ﺩﺳﺘﮕﺎﻫﻬﺎ ﺭﺍ ﺩﺭ ﺷﺒﮑﻪ ،ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺗﻤﺎﻣﻲ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﻭ ﺳﺎﻳﺮ ﭘﺮﻭﺗﮑﻞ ﻫﺎ ﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﭘﺮﻭﺗﮑﻞ ، TCP/IPﺑﻪ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺷﺶ ﮔﺎﻧﻪ
ﻓﻮﻕ ﻣﺮﺗﺒﻂ ﻭ ﺍﺯ ﺧﺪﻣﺎﺕ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺗﻮﺳﻂ ﺁﻧﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺗﺸﺮﻳﺢ ﻋﻤﻠﮑﺮﺩ ﻭ ﺟﺎﻳﮕﺎﻩ ﻫﺮ ﻳﮏ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ،ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ. ﭘﺮﻭﺗﮑﻞ : TCPﻻﻳﻪ Transport
،(Transmission Control Protocol (TCPﻳﮑﻲ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ
TCP/IPﺍﺳﺖ ﮐﻪ ﺍﻣﮑﺎﻥ ﺗﻮﺯﻳﻊ ﻭ ﻋﺮﺿﻪ ﺍﻃﻼﻋﺎﺕ )ﺳﺮﻭﻳﺲ ﻫﺎ( ﺑﻴﻦ ﺻﺮﻓﺎ" ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ، ﺑﺎ ﺿﺮﻳﺐ ﺍﻋﺘﻤﺎﺩ ﺑﺎﻻ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ .ﭼﻨﻴﻦ ﺍﺭﺗﺒﺎﻃﻲ )ﺻﺮﻓﺎ" ﺑﻴﻦ ﺩﻭ ﻧﻘﻄﻪ(Unicast ، ﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ .ﺩﺭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺑﺎ ﺭﻭﻳﮑﺮﺩ ﺍﺗﺼﺎﻝ ﮔﺮﺍ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﻗﺒﻞ ﺍﺯ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ،ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﺮﻗﺮﺍﺭ ﮔﺮﺩﺩ .ﭘﺲ ﺍﺯ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ،ﺍﻣﮑﺎﻥ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻱ ﺻﺮﻓﺎ" ﺍﺗﺼﺎﻝ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ،ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ .ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ،ﺑﺴــﻴﺎﺭ ﻣﻄﻤـــﺌﻦ ﻣﻲ ﺑﺎﺷﻨﺪ، ﻋﻠﺖ ﺍﻳﻦ ﺍﻣﺮ ﺑﻪ ﺗﻀﻤﻴﻦ ﺗﻮﺯﻳﻊ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻱ ﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺮﻣﻲ ﮔﺮﺩﺩ.
175
ﺑﺮ ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻣﺒﺪﺍﺀ TCP ،ﺩﺍﺩﻩ ﻫﺎﺋﻲ ﮐﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺭﺳﺎﻝ ﮔﺮﺩﻧﺪ ﺭﺍ ﺩﺭ ﺑﺴﺘﻪ ﻫﺎﻱ
ﺍﻃﻼﻋﺎﺗﻲ ) (Packetﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ،TCP ،ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺗﺸﺨﻴﺺ ﻭ ﺩﺍﺩﻩ ﻫﺎﻱ ﺍﻭﻟﻴﻪ ﺭﺍ ﻣﺠﺪﺩﺍ" ﺍﻳﺠﺎﺩ ﺧﻮﺍﻫﺪ ﮐﺮﺩ. ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ TCP ،TCPﺑﻤﻨﻈﻮﺭ ﺍﻓﺰﺍﻳﺶ ﮐﺎﺭﺍﺋﻲ ،ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﺼﻮﺭﺕ ﮔﺮﻭﻫﻲ ﺍﺭﺳﺎﻝ
ﻣﻲ ﻧﻤﺎﻳﺪ ،TCP.ﻳﮏ ﻋﺪﺩ ﺳﺮﻳﺎﻝ )ﻣﻮﻗﻌﻴﺖ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻧﺴﺒﺖ ﺑﻪ ﺗﻤﺎﻡ ﺑﺴﺘﻪ
ﺍﻃﻼﻋﺎﺗﻲ ﺍﺭﺳﺎﻟﻲ( ﺭﺍ ﺑﻪ ﻫﺮﻳﮏ ﺍﺯ ﺑﺴﺘﻪ ﻫﺎ ﻧﺴﺒﺖ ﺩﺍﺩﻩ ﻭ ﺍﺯ Acknowledgmentﺑﻤﻨﻈﻮﺭ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺩﺭﻳﺎﻓﺖ ﮔﺮﻭﻫﻲ ﺍﺯ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭ
ﺻﻮﺭﺗﻴﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ،ﺩﺭ ﻣﺪﺕ ﺯﻣﺎﻥ ﻣﺸﺨﺼﻲ ﻧﺴﺒﺖ ﺑﻪ ﺍﻋﻼﻡ ﻭﺻﻮﻝ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ،ﺍﻗﺪﺍﻡ ﻧﻨﻤﺎﻳﺪ ،ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍﺀ ،ﻣﺠﺪﺩﺍ" ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻣﻲ ﻧﻤﺎﻳﺪ .ﻋﻼﻭﻩ ﺑﺮﺍﻓﺰﻭﺩﻥ ﻳﮏ ﺩﻧﺒﺎﻟﻪ ﻋﺪﺩﻱ ﻭ Acknowledgmentﺑﻪ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲTCP ،
ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﭘﻮﺭﺕ ﻣﺮﺗﺒﻂ ﺑﺎ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﻱ ﻣﺒﺪﺍﺀ ﻭ ﻣﻘﺼﺪ ﺭﺍ ﻧﻴﺰ ﺑﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺿﺎﻓﻪ ﻣﻲ ﻧﻤﺎﻳﺪ .ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍﺀ ،ﺍﺯ ﭘﻮﺭﺕ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺑﻤﻨﻈﻮﺭ ﻫﺪﺍﻳﺖ ﺻﺤﻴﺢ ﺑﺴﺘﻪ ﻫﺎﻱ
ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﺑﺮﻧﺎﻣﻪ ﻣﻨﺎﺳﺐ ﺑﺮ ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺍﺯ
ﭘﻮﺭﺕ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍﺀ ﺑﻤﻨﻈﻮﺭ ﺑﺮﮔﺮﺩﺍﻧﺪﻥ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﺑﺮﻧﺎﻣﻪ ﺍﺭﺳﺎﻝ ﮐﻨﻨﺪﻩ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍﺀ، ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﺪ ﮐﺮﺩ. ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﺋﻲ ﮐﻪ ﺗﻤﺎﻳﻞ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﮑﻞ TCPﺑﻤﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺩﺍﺭﻧﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﻗﺒﻞ ﺍﺯ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ،ﻳﮏ ﺍﺗﺼﺎﻝ ﺑﻴﻦ ﺧﻮﺩ ﺍﻳﺠﺎﺩ ﻧﻤﺎﻳﻨﺪ .ﺍﺗﺼﺎﻝ ﻓﻮﻕ، ﺍﺯ ﻧﻮﻉ ﻣﺠﺎﺯﻱ ﺑﻮﺩﻩ ﻭ Sessionﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ .ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺭﮔﻴﺮ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ،ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ TCPﻭ ﺑﮑﻤﮏ ﻓﺮﺁﻳﻨﺪﻱ ﺑﺎ ﻧﺎﻡ ، Three-Way handshake :ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻣﺮﺗﺒﻂ ﻭ ﻫﺮ ﻳﮏ ﭘﺎﻳﺒﻨﺪ ﺑﻪ ﺭﻋﺎﻳﺖ ﺍﺻﻮﻝ ﻣﺸﺨﺺ ﺷﺪﻩ ﺩﺭ ﺍﻟﮕﻮﺭﻳﺘﻢ ﻣﺮﺑﻮﻃﻪ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ.
176
ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ،ﺩﺭ ﺳﻪ ﻣﺮﺣﻠﻪ ﺻﻮﺭﺕ ﻣﻲ ﭘﺬﻳﺮﺩ:
ﻣﺮﺣﻠﻪ ﺍﻭﻝ :ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍﺀ ،ﺍﺗﺼﺎﻝ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ، Sessionﻣﻘﺪﺍﺭﺩﻫﻲ ﺍﻭﻟﻴﻪ ﻣﻲ ﻧﻤﺎﻳﺪ ) ﻋﺪﺩ ﻣﺮﺑﻮﻁ ﺑﻪ ﻣﻮﻗﻌﻴﺖ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻴﻦ ﺗﻤﺎﻡ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻭ ﺍﻧﺪﺍﺯﻩ ﻣﺮﺑﻮﻁ ﺑﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ(
ﻣﺮﺣﻠﻪ ﺩﻭﻡ :ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ،ﺑﻪ ﺍﻃﻼﻋﺎﺕ Sessionﺍﺭﺳﺎﻝ ﺷﺪﻩ ،ﭘﺎﺳﺦ ﻣﻨﺎﺳﺐ ﺭﺍ ﺧﻮﺍﻫﺪ ﺩﺍﺩ. ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍﺀ ،ﺍﺯ ﺷﺮﺡ ﻭﺍﻗﻌﻪ ﺑﮑﻤﮏ Acknowledgmentﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺗﻮﺳﻂ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ،ﺁﮔﺎﻫﻲ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
ﭘﺮﻭﺗﮑﻞ : UDPﻻﻳﻪ Transport
،( UDP) User Datagram Protocolﭘﺮﻭﺗﮑﻠﻲ ﺩﺭ ﺳﻄﺢ ﻻﻳﻪ "ﺣﻤﻞ" ﺑﻮﺩﻩ ﮐﻪ ﺑﺮﻧﺎﻣﻪ ﻣﻘﺼﺪ ﺩﺭ ﺷﺒﮑﻪ ﺭﺍ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻩ ﻭ ﺍﺯ ﻧﻮﻉ ﺑﺪﻭﻥ ﺍﺗﺼﺎﻝ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ،ﺍﻣﮑﺎﻥ ﺗﻮﺯﻳﻊ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﺳﺮﻋﺖ ﻣﻨﺎﺳﺐ ﺭﺍ ﺍﺭﺍﺋﻪ ﻭﻟﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﻀﻤﻴﻦ ﺻﺤﺖ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ،ﺳﻄﺢ ﻣﻄﻠﻮﺑﻲ ﺍﺯ ﺍﻃﻤﻴﻨﺎﻥ ﺭﺍ ﺑﻮﺟﻮﺩ ﻧﻤﻲ ﺁﻭﺭﺩ UDP .ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺩﺍﺩﻩ ﻫﺎﻱ ﺩﺭﻳﺎﻓﺘﻲ ﺗﻮﺳﻂ ﻣﻘﺼﺪ ،ﺑﻪ Acknowledgmentﻧﻴﺎﺯﻱ ﻧﺪﺍﺷﺘﻪ ﻭ ﺩﺭ ﺻﻮﺭﺕ ﺑﺮﻭﺯ ﺍﺷﮑﺎﻝ ﻭ ﻳﺎ ﺧﺮﺍﺑﻲ ﺩﺭ ﺩﺍﺩﻩ ﻫﺎﻱ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ،ﺗﻼﺵ ﻣﻀﺎﻋﻔﻲ ﺑﻤﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﻣﺠﺪﺩ ﺩﺍﺩﻩ ﻫﺎ ،ﺍﻧﺠﺎﻡ ﻧﺨﻮﺍﻫﺪ ﺷﺪ .ﺍﻳﻦ ﺑﺪﺍﻥ ﻣﻌﻨﻲ ﺍﺳﺖ ﮐﻪ ﺩﺍﺩﻩ ﻫﺎﺋﻲ ﮐﻤﺘﺮ ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ ﻭﻟﻲ ﻫﻴﭽﻴﮏ ﺍﺯ ﺩﺍﺩﻩ
ﻫﺎﻱ ﺩﺭﻳﺎﻓﺘﻲ ﻭ ﺻﺤﺖ ﺗﺴﻠﺴﻞ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ،ﺗﻀﻤﻴﻦ ﻧﻤﻲ ﮔﺮﺩﺩ .ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ، ﺑﻤﻨﻈﻮﺭ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﭼﻨﺪﻳﻦ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ Broadcastﻭ ﻳﺎ ،Multicast
ﺍﺳﺘﻔﺎﺩﻩ ﺑﻌﻤﻞ ﻣﻲ ﺁﻳﺪ .ﭘﺮﻭﺗﮑﻞ ،UDPﺩﺭ ﻣﻮﺍﺭﺩﻳﮑﻪ ﺣﺠﻢ ﺍﻧﺪﮐﻲ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻝ ﻭ ﻳﺎ ﺍﻃﻼﻋﺎﺕ ﺩﺍﺭﺍﻱ ﺍﻫﻤﻴﺖ ﺑﺎﻻﺋﻲ ﻧﻤﻲ ﺑﺎﻧﺸﺪ ،ﻧﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
177
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﮑﻞ UDPﺩﺭ ﻣﻮﺍﺭﺩﻱ ﻫﻤﭽﻮﻥ )،media Multicasting Streamingﻧﻈﻴﺮ
ﻳﮏ ﻭﻳﺪﺋﻮ ﮐﻨﻔﺮﺍﻧﺲ ﺯﻧﺪﻩ( ﻭ ﻳﺎ ﺍﻧﺘﺸﺎﺭ ﻟﻴﺴﺘﻲ ﺍﺯ ﺍﺳﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﮐﻪ ﺑﻤﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻣﺤﻠﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﻧﺪ ،ﻣﺘﺪﺍﻭﻝ ﺍﺳﺖ .ﺑﻤﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ، UDPﺑﺮﻧﺎﻣﻪ ﻣﺒﺪﺍﺀ ﻣﻲ ﺑﺎﻳﺴﺖ ﭘﻮﺭﺕ UDPﺧﻮﺩ ﺭﺍ ﻣﺸﺨﺺ ﻧﻤﺎﻳﺪ ﺩﻗﻴﻘﺎ" ﻣﺸﺎﺑﻪ ﻋﻤﻠﻴﺎﺗﻲ ﮐﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﮐﺎﻣﭙﻴﻮﺗﺮ
ﻣﻘﺼﺪ ﺍﻧﺠﺎﻡ ﺩﻫﺪ .ﻻﺯﻡ ﺑﻪ ﻳﺎﺩﺁﻭﺭﻱ ﺍﺳﺖ ﮐﻪ ﭘـﻮﺭﺕ ﻫﺎﻱ UDPﺍﺯ ﭘــــﻮﺭﺕ ﻫﺎﻱ TCP ﻣﺠﺰﺍ ﻭ ﻣﺘــــﻤﺎﻳﺰ
ﻣﻲ ﺑﺎﺷﻨﺪ )ﺣﺘﻲ ﺍﮔﺮ ﺩﺍﺭﺍﻱ ﺷﻤﺎﺭﻩ ﭘﻮﺭﺕ ﻳﮑﺴﺎﻥ ﺑﺎﺷﻨﺪ(.
ﭘﺮﻭﺗﮑﻞ : IPﻻﻳﻪ Internet
،( IP) Internet Protocolﺍﻣﮑﺎﻥ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﻣﺤﻞ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺍﺭﺗﺒﺎﻃﻲ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ ، IP .ﻳﮏ ﭘﺮﻭﺗﮑﻞ ﺑﺪﻭﻥ ﺍﺗﺼﺎﻝ ﻭ ﻏﻴﺮﻣﻄﻤﺌﻦ ﺑﻮﺩﻩ ﮐﻪ ﺍﻭﻟﻴﻦ
ﻣﺴﺌﻮﻟﻴﺖ ﺁﻥ ﺁﺩﺭﺱ ﺩﻫﻲ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻭ ﺭﻭﺗﻴﻨﮓ ﺑﻴﻦ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ
ﺍﺳﺖ .ﺑﺎ ﺍﻳﻨﮑﻪ IPﻫﻤﻮﺍﺭﻩ ﺳﻌﻲ ﺩﺭ ﺗﻮﺯﻳﻊ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﻣﻤﮑﻦ ﺍﺳﺖ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﺯﻣﺎﻥ ﺍﺭﺳﺎﻝ ﮔﺮﻓﺘﺎﺭ ﻣﺴﺎﺋﻞ ﻣﺘﻌﺪﺩﻱ ﻧﻈﻴﺮ :ﮔﻢ ﺷﺪﻥ ،ﺧﺮﺍﺑﻲ ،ﻋﺪﻡ ﺗﻮﺯﻳﻊ
ﺑﺎ ﺍﻭﻟﻮﻳﺖ ﻣﻨﺎﺳﺐ ،ﺗﮑﺮﺍﺭ ﺩﺭ ﺍﺭﺳﺎﻝ ﻭ ﻳﺎ ﺗﺎﺧﻴﺮ ،ﮔﺮﺩﻧﺪ.ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ،ﭘﺮﻭﺗﮑﻞ IPﺗﻼﺷﻲ ﺑﻤﻨﻈﻮﺭ ﺣﻞ ﻣﺸﮑﻼﺕ ﻓﻮﻕ ﺭﺍ ﺍﻧﺠﺎﻡ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺩ )ﺍﺭﺳﺎﻝ ﻣﺠﺪﺩ ﺍﻃﻼﻋﺎﺕ
ﺩﺭﺧﻮﺍﺳﺘﻲ( .ﺁﮔﺎﻫﻲ ﺍﺯ ﻭﺻﻮﻝ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﻣﻘﺼﺪ ﻭ ﺑﺎﺯﻳﺎﻓﺖ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ
ﮔﻢ ﺷﺪﻩ ،ﻣﺴﺌﻮﻟﻴﺘﻲ ﺍﺳﺖ ﮐﻪ ﺑﺮ ﻋﻬﺪﻩ ﻳﮏ ﻻﻳﻪ ﺑﺎﻻﺗﺮ ﻧﻈﻴﺮ TCPﻭ ﻳﺎ ﺑﺮﻧﺎﻣﻪ ﺍﺭﺳﺎﻝ ﮐﻨﻨﺪﻩ ﺍﻃﻼﻋﺎﺕ ،ﻭﺍﮔﺬﺍﺭ ﻣﻲ ﮔﺮﺩﺩ.
178
ﻋﻤﻠﻴﺎﺕ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺗﻮﺳﻂ IP
ﻣﻲ ﺗﻮﺍﻥ IPﺭﺍ ﺑﻌﻨﻮﺍﻥ ﻣﮑﺎﻧﻲ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺖ ﮐﻪ ﻋﻤﻠﻴﺎﺕ ﻣﺮﺗﺐ ﺳﺎﺯﻱ ﻭ ﺗﻮﺯﻳﻊ ﺑﺴﺘﻪ
ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﺁﻥ ﻣﺤﻞ ،ﺻﻮﺭﺕ ﻣﻲ ﭘﺬﻳﺮﺩ .ﺑﺴﺘﻪ ﻫﺎ ﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺗﻮﺳﻂ ﻳﮑﻲ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻻﻳﻪ ﺣﻤﻞ ) TCPﻭ ﻳﺎ (UDPﻭ ﻳﺎ ﺍﺯ ﻃﺮﻳﻖ ﻻﻳﻪ " ﺍﻳﺘﺮﻓﻴﺲ ﺷﺒﮑﻪ " ،ﺑﺮﺍﻱ IPﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺍﻭﻟﻴﻦ ﻭﻇﻴﻔﻪ ،IPﺭﻭﺗﻴﻨﮓ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻤﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺑﻪ ﻣﻘﺼﺪ ﻧﻬﺎﺋﻲ ﺍﺳﺖ .ﻫﺮ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ،ﺷﺎﻣﻞ ﺁﺩﺭﺱ IPﻣﺒﺪﺍﺀ ) ﻓﺮﺳﺘﻨﺪﻩ ( ﻭ ﺁﺩﺭﺱ IP
ﻣﻘﺼﺪ ) ﮔﻴﺮﻧﺪﻩ ( ﻣﻲ ﺑﺎﺷﺪ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ، IPﺁﺩﺭﺱ ﻣﻘﺼﺪﻱ ﺭﺍ ﻣﺸﺨﺺ ﻧﻤﺎﻳﺪ ﮐﻪ ﺩﺭ ﻫﻤﺎﻥ ﺳﮕﻤﻨﺖ ﻣﻮﺟﻮﺩ ﺑﺎﺷﺪ ،ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻣﺴﺘﻘﻴﻤﺎ" ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭﺻﻮﺭﺗﻴﮑﻪ ﺁﺩﺭﺱ ﻣﻘﺼﺪ ﺩﺭﻫﻤﺎﻥ ﺳﮕﻤﻨﺖ ﻧﺒﺎﺷﺪ ، IP،ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﻳﮏ ﺭﻭﺗﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻭ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﺮﺍﻱ ﺁﻥ ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﺪ.ﻳﮑﻲ ﺩﻳﮕﺮ ﺍﺯ ﻭﻇﺎﻳﻒ ، IPﺍﻳﺠﺎﺩ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ
ﻋﺪﻡ ﻭﺟﻮﺩ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ) ﺑﻼﺗﮑﻠﻴﻒ ! ( ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺖ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﻣﺤﺪﻭﺩﻳﺖ ﺯﻣﺎﻧﻲ ﺧﺎﺻﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻣﺪﺕ ﺯﻣﺎﻥ ﺣﺮﮐﺖ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﻃﻮﻝ ﺷﺒﮑﻪ ،ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ
ﻣﻲ ﺷﻮﺩ .ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ،ﺗﻮﺳﻂ ﻧﺴﺒﺖ ﺩﺍﺩﻥ ﻳﮏ ﻣﻘﺪﺍﺭ (Time To Live)TTLﺑﻪ ﻫﺮ
ﻳﮏ ﺍﺯ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺻﻮﺭﺕ ﻣﻲ ﭘﺬﻳﺮﺩ ،TTL .ﺣﺪﺍﮐﺜﺮ ﻣﺪﺕ ﺯﻣﺎﻧﻲ ﺭﺍ ﮐﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻗﺎﺩﺭ ﺑﻪ ﺣﺮﮐﺖ ﺩﺭ ﻃﻮﻝ ﺷﺒﮑﻪ ﺍﺳﺖ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ) ﻗﺒﻞ ﺍﺯ ﺍﻳﻨﮑﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﮐﻨﺎﺭ ﮔﺬﺍﺷﺘﻪ ﺷﻮﺩ(.
ﭘﺮﻭﺗﮑﻞ : ICMPﻻﻳﻪ Internet
،(Protocol Internet Control Message (ICMPﺍﻣﮑﺎﻧﺎﺕ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ
ﺍﺷﮑﺎﻝ ﺯﺩﺍﺋﻲ ﻭ ﮔﺰﺍﺭﺵ ﺧﻄﺎﺀ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻏﻴﺮﻗﺎﺑﻞ ﺗﻮﺯﻳﻊ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ. 179
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ، ICMPﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻭ ﺭﻭﺗﺮﻫﺎ ﮐﻪ ﺍﺯ IPﺑﻤﻨـــﻈﻮﺭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﺳﺘــــﻔﺎﺩﻩ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﻗﺎﺩﺭ ﺑﻪ ﮔﺰﺍﺭﺵ ﺧﻄﺎﺀ ﻭ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻣﺤﺪﻭﺩ ﺩﺭ ﺭﺍﺑﻄﻪ ﻭﺿﻌﻴﺖ
ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻣﺜﻼ" ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ، IPﻗﺎﺩﺭ ﺑﻪ ﺗﻮﺯﻳﻊ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈﺮ ﻧﺒﺎﺷﺪ ICMP ،ﻳﮏ ﭘﻴﺎﻡ ﻣﺒﺘﻨﻲ ﺑﺮ ﻏﻴﺮﻗﺎﺑﻞ ﺩﺳﺘﺮﺱ ﺑﻮﺩﻥ ﺭﺍ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ
ﻣﺒﺪﺍﺀ ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ .ﺑﺎ ﺍﻳﻨﮑﻪ ﭘﺮﻭﺗﮑﻞ IPﺑﻤﻨﻈﻮﺭ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﻩ ﺑﻴﻦ ﺭﻭﺗﺮﻫﺎﻱ ﻣﺘﻌﺪﺩ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﮔﺮﺩﺩ ،ﻭﻟﻲ ICMPﺑﻪ ﻧﻤﺎﻳﻨﺪﮔﻲ ﺍﺯ ،TCP/IPﻣﺴﺌﻮﻝ ﺍﺭﺍﺋﻪ ﮔﺰﺍﺭﺵ ﺧﻄﺎﺀ ﻭ ﻳﺎ ﭘﻴﺎﻡ ﻫﺎﻱ ﮐﻨﺘﺮﻟﻲ ﺍﺳﺖ .ﺗﻼﺵ ، ICMPﺩﺭ ﺍﻳﻦ ﺟﻬﺖ ﻧﻴﺴﺖ ﮐﻪ ﭘﺮﻭﺗﮑﻞ IPﺭﺍ ﺑﻌﻨﻮﺍﻥ ﻳﮏ
ﭘﺮﻭﺗﮑﻞ ﻣﻄﻤﺌﻦ ﻣﻄﺮﺡ ﻧﻤﺎﻳﺪ ،ﭼﻮﻥ ﭘﻴﺎﻡ ﻫﺎﻱ ICMPﺩﺍﺭﺍﻱ ﻫﻴﭽﮕﻮﻧﻪ ﻣﺤﺘﻮﻳﺎﺗﻲ ﻣﺒﻨﻲ ﺑﺮ ﺍﻋﻼﻡ ﻭﺻﻮﻝ ﭘﻴﺎﻡ ) ( Acknowledgmentﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻧﻤﻲ ﺑﺎﺷﻨﺪ ،ICMP .ﺻﺮﻓﺎ"
ﺳﻌﻲ ﺩﺭ ﮔﺰﺍﺭﺵ ﺧﻄﺎﺀ ﻭ ﺍﺭﺍﺋﻪ ﻓﻴﺪﺑﮏ ﻫﺎﻱ ﻻﺯﻡ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﺤﻘﻖ ﻳﮏ ﻭﺿﻌﻴﺖ ﺧﺎﺹ ﺭﺍ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﭘﺮﻭﺗﮑﻞ : IGMPﻻﻳﻪ Internet
، (Protocol Internet Group Managment (IGMPﭘﺮﻭﺗﮑﻠﻲ ﺍﺳﺖ ﮐﻪ ﻣﺪﻳﺮﻳﺖ ﻟﻴﺴﺖ ﺍﻋﻀﺎﺀ ﺑﺮﺍﻱ ، Multicasting IPﺩﺭ ﻳﮏ ﺷﺒﮑﻪ TCP/IPﺭﺍ ﺑﺮ ﻋﻬﺪﻩ ﺩﺍﺭﺩIP .
،Multicastingﻓﺮﺁﻳﻨﺪﻱ ﺍﺳﺖ ﮐﻪ ﺑﺮ ﺍﺳﺎﺱ ﺁﻥ ﻳﮏ ﭘﻴﺎﻡ ﺑﺮﺍﻱ ﮔﺮﻭﻫﻲ ﺍﻧﺘﺨﺎﺏ ﺷﺪﻩ ﺍﺯ ﮔﻴﺮﻧﺪﮔﺎﻥ ﮐﻪ ﮔﺮﻭﻩ multicatﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﻧﺪ ؛ ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ IGMP .ﻟﻴﺴﺖ ﺍﻋﻀﺎﺀ ﺭﺍ ﻧﮕﻬﺪﺍﺭﻱ ﻣﻲ ﻧﻤﺎﻳﺪ.
180
ﻣﺪﻳﺮﻳﺖ Multicasting IP
ﺗﻤﺎﻣﻲ ﺍﻋﻀﺎﺀ ﻳﮏ ﮔﺮﻭﻩ ، multicastﺑﻪ ﺗﺮﺍﻓﻴﮏ IPﻫﺪﺍﻳﺖ ﺷﺪﻩ ﺑﻪ ﻳﮏ ﺁﺩﺭﺱ
، Multicast IPﮔﻮﺵ ﺩﺍﺩﻩ ﻭ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺑﻪ ﺁﻥ ﺁﺩﺭﺱ ﺭﺍ ﺩﺭﻳﺎﻓﺖ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﭼﻨﺪﻳﻦ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻧﻴﺎﺯﻣﻨﺪ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻧﻈﻴﺮ Streaming mediaﺑﺎﺷﻨﺪ ،ﻳﮏ ﺁﺩﺭﺱ IPﺭﺯﻭﺷﺪﻩ ﺑﺮﺍﻱ multicastingﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺭﻭﺗﺮﻫﺎ ﮐﻪ ﺑﻤﻨﻈﻮﺭ ﭘﺮﺩﺍﺯﺵ multicastﭘﻴﮑﺮﺑﻨﺪﻱ ﻣﻲ ﮔﺮﺩﻧﺪ ،ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺑﺮﺍﻱ ﺗﻤﺎﻣﻲ ﻣﺸﺘﺮﮐﻴﻦ ﮔﺮﻭﻩ multicastﺍﺭﺳﺎﻝ ) ( Forwardﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺑﻤﻨﻈﻮﺭ ﺭﺳﻴﺪﻥ ﺍﻃﻼﻋﺎﺕ Multicastﺑﻪ ﮔﻴﺮﻧﺪﮔﺎﻥ ﻣﺮﺑﻮﻃﻪ ،ﻫﺮ ﻳﮏ ﺍﺯ ﺭﻭﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻣﺴﻴﺮ ﺍﺭﺗﺒﺎﻃﻲ
ﻣﻲ ﺑﺎﻳﺴﺖ ،ﻗﺎﺩﺭ ﺑﻪ ﺣﻤﺎﻳﺖ ﺍﺯ Multicastingﺑﺎﺷﻨﺪ .ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻭﻳﻨﻮﺯ ،٢٠٠٠ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ، IP Multicastﻣﻲ ﺑﺎﺷﻨﺪ. ﭘﺮﻭﺗﮑﻞ : ARPﻻﻳﻪ Internet
،(Protocol ARP) Address Resolutionﭘﺮﻭﺗﮑﻠﻲ ﺍﺳﺖ ﮐﻪ ﻣﺴﺌﻮﻟﻴﺖ ﻣﺴﺌﻠﻪ " ﻧﺎﻡ ﺑﻪ ﺁﺩﺭﺱ" ﺭﺍ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺧﺮﻭﺟﻲ ) ،(Outgoingﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ. ﻣﺎﺣﺼﻞ ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ Mapping ،ﺁﺩﺭﺱ IPﺑﻪ ﺁﺩﺭﺱMedia Access ( MAC
،(Controlﻣﺮﺑﻮﻃﻪ ﺍﺳﺖ .ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺍﺯ ﺁﺩﺭﺱ ، MACﺑﻤﻨﻈﻮﺭ ﺗﺸﺨﻴﺺ ﺗﻌﻠﻖ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺮﺑﻮﻃﻪ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺑﺪﻭﻥ ﺁﺩﺭﺱ ﻫﺎﻱ ، MACﮐﺎﺭﺕ ﻫﺎﻱ ﺷﺒﮑﻪ ،ﺩﺍﻧﺶ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺍﺭﺳﺎﻝ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﻻﻳﻪ ﺑﺎﻻﺗﺮ ﺑﻤﻨﻈﻮﺭ ﭘﺮﺩﺍﺯﺵ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﺩﺍﺭﺍ ﻧﺨﻮﺍﻫﻨﺪ ﺑﻮﺩ.
181
ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺭﺳﻴﺪﻥ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﻻﻳﻪ IPﺑﻤﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺩﺭ ﺷﺒﮑﻪ ،ﺁﺩﺭﺱ ﻫﺎﻱ MACﻣﺒﺪﺍﺀ ﻭ ﻣﻘﺼﺪ ﺑﻪ ﺁﻥ ﺍﺿﺎﻓﻪ ﻣﻲ ﮔﺮﺩﺩ.
،ARPﺍﺯ ﺟﺪﻭﻟﻲ ﺧﺎﺹ ﺑﻤﻨﻈﻮﺭ ﺫﺧﻴﺮﻩ ﺳﺎﺯﻱ ﺁﺩﺭﺱ ﻫﺎﻱ IPﻭ MACﻣﺮﺑﻮﻃﻪ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﻣﺤﻠﻲ ﺍﺯ ﺣﺎﻓﻈﻪ ﮐﻪ ﺟﺪﻭﻝ ﻓﻮﻕ ﺩﺭ ﺁﻧﺠﺎ ﺫﺧﻴﺮﻩ ﻣﻲ ﮔﺮﺩﺩ Cache ARP ،ﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ ARP Cache .ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﺎﻣﻞ mappingﻻﺯﻡ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻭ ﺭﻭﺗﺮﻫﺎﺋﻲ ﺍﺳﺖ ﮐﻪ ﺻﺮﻓﺎ" ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺳﮕﻤﻨﺖ ﻣﺸﺎﺑﻪ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ. Physical Address Resolution ﭘﺮﻭﺗﮑﻞ ، ARPﺁﺩﺭﺱ IPﻣﻘﺼﺪ ﻫﺮ ﻳﮏ ﺍﺯ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺧﺮﻭﺟﻲ ﺭﺍ ﺑﺎ ARP
Cacheﻣﻘﺎﻳﺴﻪ ﺗﺎ ﺁﺩﺭﺱ MACﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺑﺪﺳﺖ ﺁﻭﺭﺩ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﻣﻮﺭﺩﻱ
ﭘﻴﺪﺍ ﮔﺮﺩﺩ ،ﺁﺩﺭﺱ MACﺍﺯ Cacheﺑﺎﺯﻳﺎﺑﻲ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﻏﻴﺮ ﺍﻳﻨﺼﻮﺭﺕ؛ ARP ﺩﺭﺧﻮﺍﺳﺘﻲ ﺭﺍ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﮐﻪ ﻣﺎﻟﮑﻴﺖ IPﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ Broadcast ،ﻧﻤﻮﺩﻩ ﻭ ﺍﺯ
ﻭﻱ ﻣﻲ ﺧﻮﺍﻫﺪ ﮐﻪ ﺁﺩﺭﺱ MACﺧﻮﺩ ﺭﺍ ﺍﻋﻼﻡ ﻧﻤﺎﻳﺪ .ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ) ﺑﺎ IPﻣﺮﺑﻮﻃﻪ ( ،ﺩﺭ ﺍﺑﺘﺪﺍ ﺁﺩﺭﺱ MACﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺭﺳﺎﻝ ﮐﻨﻨﺪﻩ ﺩﺭﺧﻮﺍﺳﺖ ﺭﺍ ﺑﻪ Cacheﺧﻮﺩ ﺍﺿﺎﻓﻪ ﻧﻤﻮﺩﻩ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﭘﺎﺳﺦ ﻻﺯﻡ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺍﺭﺳﺎﻝ ﺁﺩﺭﺱ MACﺧﻮﺩ ،ﺑﻪ ﻣﺘﻘﺎﺿﻲ ﺧﻮﺍﻫﺪ ﺩﺍﺩ
.ﺯﻣﺎﻧﻴﮑﻪ ﭘﺎﺳﺦ ARPﺗﻮﺳﻂ ﺩﺭﺧﻮﺍﺳﺖ ﮐﻨﻨﺪﻩ ،ﺩﺭﻳﺎﻓﺖ ﮔﺮﺩﻳﺪ ،ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﺎ ﺍﺳﺘﻨﺎﺩ ﺑﻪ ﺍﻃﻼﻋـﺎﺕ ﺟﺪﻳﺪ ﺩﺭﻳﺎﻓــــﺘﻲ Cache ،ﻣﺮﺑﻮﻃﻪ ﺑﻬﻨﮕﺎﻡ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﻣﻘﺼﺪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ.
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﻣﻘﺼﺪ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ،ﺳﮕﻤﻨﺘﻲ ﺩﻳﮕﺮ ﺑﺎﺷﺪ ، ARP ،ﺁﺩﺭﺱ MACﺭﺍ ﺑﻪ ﺭﻭﺗﺮ ﻣﺴﺌﻮﻝ ﺩﺭ ﺳﮕﻤﻨﺖ ﻣﺮﺑﻮﻃﻪ ،ﺗﻌﻤﻴﻢ ﺧﻮﺍﻫﺪ ﺩﺍﺩ )ﺩﺭ ﻣﻘﺎﺑﻞ ﺁﺩﺭﺱ ﻣﺮﺑﻮﻁ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ( .ﺭﻭﺗﺮ ،ﺩﺭ ﺍﺩﺍﻣﻪ ﻣﺴﺌﻮﻝ ﻳﺎﻓﺘﻦ ﺁﺩﺭﺱ MACﻣﻘﺼﺪ ﻭ ﻳﺎ Forwardingﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺍﻱ ﺭﻭﺗﺮ ﺩﻳﮕﺮ ﺍﺳﺖ.
ﺩﺭ ﻗﺴﻤﺖ ﺳﻮﻡ ﺑﻪ ﺑﺮﺭﺳﻲ ،ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﻭ ﺍﺑﺰﺍﺭﻫﺎﻱ ﮐﻤﮑﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﭘﺮﻭﺗﮑﻞ ،TCP/IP ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ. 182
ﻣﻔﺎﻫﻴﻢ ﺍﻭﻟﻴﻪ ﭘﺮﻭﺗﮑﻞ ) TCP/IPﻗﺴﻤﺖ ﺳﻮﻡ ( ﺩﺭ ﻗﺴﻤﺖ ﺍﻭﻝ ،ﭘﺮﻭﺗﮑﻞ TCP/IPﺑﻬـــﻤﺮﺍﻩ ﻻﻳﻪ ﻫﺎﻱ ﺁﻥ ﻣــــــﻌﺮﻓﻲ ﮔﺮﺩﻳﺪ.
ﺩﺭ ﻗﺴﻤﺖ ﺩﻭﻡ ،ﺑﻪ ﺑﺮﺭﺳﻲ ﺑﺮﺧﻲ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻬﻢ ﻣﻮﺟﻮﺩ ﺩﺭ ﭘﺸﺘﻪ TCP/IP
ﺍﺷﺎﺭﻩ ﮔﺮﺩﻳﺪ .ﺩﺭ ﺍﻳﻦ ﻗﺴﻤﺖ ،ﺑﻪ ﺑﺮﺭﺳﻲ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﻭ ﺍﺑﺰﺍﺭﻫﺎﻱ ﮐﻤﮑﻲ ﻣﻮﺟﻮﺩ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﭘﺮﻭﺗﮑﻞ ،TCP/IPﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ. ﻧﺴﺨﻪ TCP/IPﭘﻴﺎﺩ ﻩ ﺳﺎﺯﻱ ﺷﺪﻩ ﺩﺭ ﻭﻳﻨﺪﻭﺯ ،ﺑﻬﻤﺮﺍﻩ ﺧﻮﺩ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﮐﺎﺭﺑﺮﺩﻱ ﺭﺍ ﺍﺭﺍﺋﻪ ﻧﻤﻮﺩﻩ ﺍﺳﺖ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻓﻮﻕ ،ﺍﻣﮑﺎﻥ ﺍﺟﺮﺍﻱ ﻭﻳﻨﺪﻭﺯ ٢٠٠٠
ﺑﺮ ﺭﻭﻱ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻤﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﮔﺴﺘﺮﺩﻩ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ،ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﻭﻳﻨﺪﻭﺯ ، ٢٠٠٠ﺳﻪ ﮔﺮﻭﻩ ﻋﻤﺪﻩ ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ TCP/IPﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲ ﻧﻤﺎﻳﺪ :ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻋﻴﺐ ﻳﺎﺑﻲ ،ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺍﺭﺗﺒﺎﻃﻲ ﻭ ﻧﺮﻡ ﺍﻓــﺰﺍﺭﻫﺎﻱ
ﺳﻤﺖ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ. ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺗﺸﺮﻳﺢ ﺍﻣﮑﺎﻧﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﻫﺮ ﮔﺮﻭﻩ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ. ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻋﻴﺐ ﻳﺎﺑﻲ
ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻋﻴﺐ ﻳﺎﺑﻲ ،ﺍﻣﮑﺎﻥ ﺗﺸﺨﻴﺺ ﻭ ﺑﺮﻃﺮﻑ ﻧﻤﻮﺩﻥ ﻣﺴﺎﺋﻞ ﻣﺮﺗﺒﻂ ﺑﺎ ﺷﺒﮑﻪ ﺭﺍ ﺑﺮﺍﻱ
ﮐﺎﺭﺑﺮﺍﻥ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺑﺮﺧﻲ ﺍﺯ ﺍﻳﻦ ﺍﺑﺰﺍﺭﻫﺎ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ: . ARPﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ Cache ،ﻣﺮﺑﻮﻁ ﺑﻪ
Addreee Resolution Protocol
) (ARPﺭﺍ
ﻧﻤﺎﻳﺶ ﻭ ﺍﻣﮑﺎﻥ ﺍﺻﻼﺡ ﺁﻥ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺑﻤﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ،ﮐﺎﻓﻲ ﺍﺳﺖ ARP -aﺭﺍ ﺩﺭ ﺧﻂ ﺩﺳﺘﻮﺭ ﺗﺎﻳﭗ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﺟﺪﻭﻝ ﻣﺮﺑﻮﻁ ﺑﻪ ARP
، Cacheﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ﻣﻲ ﺗﻮﺍﻥ ﻳﮏ Entry ﺍﻳﺴﺘﺎ ﺭﺍ ﺑﻪ ﺟﺪﻭﻝ ﻣﺮﺑﻮﻃﻪ ﺍﺿﺎﻓﻪ ) aa-00-62--٠٠ ١٥٧,٥٥,٨٥,٢١٢ s- arp ،( c6-09ﻭ ﻳﺎ ﺍﻗﺪﺍﻡ ﺑﻪ ﺣﺬﻑ ﻳﮏ hostﺍﺯ ﺟﺪﻭﻝ ﻧﻤﻮﺩ ).( arp -d
183
. Hostnameﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ،ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻴﺰﺑﺎﻥ ﺭﺍ ﻧﻤﺎﻳﺶ ﻣﻲ ﺩﻫﺪ .ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
ﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ،ﮐﺎﻓﻲ ﺍﺳﺖ Hostnameﺭﺍ ﺩﺭ ﺧﻂ ﺩﺳﺘﻮﺭ ،ﺗﺎﻳﭗ ﻭ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺧﻮﺩ
ﺭﺍ ﻣﺸﺎﻫﺪﻩ ﻧﻤﻮﺩ. . IPConfigﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ،ﭘﻴﮑﺮﺑﻨﺪﻱ ﺟﺎﺭﻱ ﭘﺮﻭﺗﮑﻞ TCP/IPﺭﺍ ﻧﻤﺎﻳﺶ ) ﺁﺩﺭﺱ ، IPﺁﺩﺭﺱ ﻓﻴﺰﻳﮑﻲ ،ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻭ ( ...ﻭ ﺍﻣﮑﺎﻥ ﺑﻬﻨﮕﺎﻡ ﺳﺎﺯﻱ ﺁﻥ ﺭﺍ ﻓﺮﺍﻫﻢ
ﻣﻲ ﻧﻤﺎﻳﺪ .ﺑﻤﻨﻈﻮﺭ ﺁﺷﻨﺎﺋﻲ ﺑﺎ ﭘﺘﺎﻧﺴﻴﻞ ﻫﺎﻱ ﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ipcongig/help ،ﺭﺍ ﺩﺭ ﺧﻂ ﺩﺳﺘﻮﺭ ﺗﺎﻳﭗ ﺗﺎ ﺑﺎ ﻋﻤﻠﮑﺮﺩ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﻭ ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺁﺷﻨﺎ ﮔﺮﺩﻳﺪ.
. Nbtstatﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ،ﺟﺪﻭﻝ ﻣﺤﻠﻲ ﺍﺳﺎﻣﻲ NetBIOSﺭﺍ ﻧﻤﺎﻳﺶ ﻣﻲ ﺩﻫﺪ .ﺟﺪﻭﻝ ﻓﻮﻕ ،ﺷﺎﻣﻞ ﻟﻴﺴﺘﻲ ﺍﺯ ﺍﺳﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺑﻬﻤﺮﺍﻩ IPﻣﺮﺑﻮﻃﻪ ﺍﺳﺖ )( mapping . Netstatﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ،ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺟﻠﺴﻪ ﮐﺎﺭﻱ ) (Sessionﭘﺮﻭﺗﮑﻞ TCP/IPﺭﺍ ﻧﻤﺎﻳﺶ ﻣﻲ ﺩﻫﺪ.
. Pingﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ،ﭘﻴﮑﺮﺑﻨﺪﻱ ﻭ ﺍﺭﺗﺒﺎﻁ ﻣﺒﺘﻨﻲ ﺑﺮ IPﺑﻴﻦ ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺭﺍ ﺑﺮﺭﺳﻲ ﻭ ﺗﺴﺖ ﻣﻲ ﻧﻤﺎﻳﺪ Ping .ﻳﮏ ﺩﺭﺧﻮﺍﺳﺖ ICMPﺭﺍ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍﺀ ﺍﺭﺳﺎﻝ ﻭ
ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﭘﺎﺳﺦ ICMPﺑﻪ ﺁﻥ ﺟﻮﺍﺏ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺑﻤﻨﻈﻮﺭ ﺗﺴﺖ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺁﺩﺭﺱ IP
ﻭ ﻳﺎ ﻧﺎﻡ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ،
ﻓﺮﻣﺎﻥ ] PING [IP_Address or Computer_Nameﺭﺍ ﺗﺎﻳﭗ ﻧﻤﺎﺋﻴﺪ.
ﺑﻤﻨﻈﻮﺭ ﺗﺴﺖ ﭘﻴﮑﺮﺑﻨﺪﻱ TCP/IPﺑﺮ ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺧﻮﺩ ،ﺍﺯ Local Loopbackﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﺋﻴﺪ ،loopback Local .ﺷﺎﻣﻞ ﺁﺩﺭﺱ ١٢٧,٠,٠,١ ﺍﺳﺖ( Ping 127.0.0.1).
. Tracertﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ،ﺭﺩﻳﺎﺑﻲ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺗﺎ ﺭﺳﻴﺪﻥ ﺑﻪ ﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﺪ.
184
ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺍﺭﺗﺒﺎﻃﻲ
ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻓﻮﻕ ،ﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻣﺠﻤﻮﻋﻪ ﻭﺳﻴﻌﻲ ﺍﺯ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﻳﻨﺪﻭﺯ ﻭ ﻳﺎ ﻏﻴﺮﻭﻳﻨﺪﻭﺯ ﻧﻈﻴﺮ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻳﻮﻳﻨﻴﮑﺲ ،ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﮐﺎﺭﺑﺮﺍﻥ ﻗﺮﺍﺭ ﻣﻲ ﺩﻫﻨﺪ .ﺑﺎ ﺍﻳﻨﮑﻪ ﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﺍﻣﮑﺎﻥ ﺍﺭﺳﺎﻝ ﺳﺮﻳﻊ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ﻭﻟﻲ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺎﻫﻴﺖ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺗﻮﺳﻂ ﺁﻧﺎﻥ )ﺗﻤﺎﻣﻲ ﺍﻃﻼﻋﺎﺕ ﺷﺎﻣﻞ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺗﺎﺋﻴﺪ ﺍﻋﺘﺒﺎﺭ ﻭ ﻫﻮﻳﺖ ﮐﺎﺭﺑﺮﺍﻥ ﺑﺼﻮﺭﺕ ﻣﺘﻦ ﺷﻔﺎﻑ ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ( ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﻗﺖ ﻻﺯﻡ ﺻﻮﺭﺕ ﭘﺬﻳﺮﺩ
.ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺍﺭﺗﺒﺎﻃﻲ ﻣﻲ ﺑﺎﺷﻨﺪ:
. FTPﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ،ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ،TCPﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﻓﺎﻳﻞ ﺑﻴﻦ ﻭﻳﻨﺪﻭﺯ ٢٠٠٠ﻭ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﺋﻲ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﺁﻧﺎﻥ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ FTPﻧﺼﺐ ﺷﺪﻩ ﺍﺳﺖ ،ﻣﻲ ﻧﻤﺎﻳﺪ.
. Telnetﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ،ﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺑﻪ ﻣﻨﺎﺑﻊ ﺷﺒﮑﻪ ﻣﻮﺟﻮﺩ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﺋﻲ ﮐﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ Telnetﺑﺮ ﺭﻭﻱ ﺁﻧﺎﻥ ﻧﺼﺐ ﺷﺪﻩ ﺍﺳﺖ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ.
. Tftpﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ، UDPﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﻓﺎﻳﻞ ﻫﺎﻱ ﮐﻮﭼﮏ ﺑﻴﻦ ﻭﻳﻨﺪﻭﺯ ٢٠٠٠ﻭ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﺋﻲ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﺁﻧﺎﻥ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ Trivial File (TFTP ( Transfer Protocolﻧﺼﺐ ﺷﺪﻩ ﺍﺳﺖ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺳﻤﺖ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ
ﺍﻳﻦ ﻧﻮﻉ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎ ﺍﻣﮑﺎﻥ ﭼﺎﭖ ﻭ ﺍﻧﺘﺸﺎﺭ ﺳﺮﻭﻳﺲ ﻫﺎ ﺭﺍ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ﻣﺒﺘﻨﻲ ﺑﺮ TCP/IPﺩﺭ ﻭﻳﻨﺪﻭﺯ ، ٢٠٠٠ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ. •
ﺳﺮﻭﻳﺲ ﭼﺎﭖ . TCP/IPﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ،ﺳﺮﻭﻳﺲ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﭼﺎﭖ TCP/IPﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺳﺮﻭﻳﺲ ﻓﻮﻕ ،ﺍﻣﮑﺎﻥ ﺍﺭﺳﺎﻝ ﭼﺎﭖ ﺭﺍ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﺋﻲ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﺁﻧﺎﻥ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻋﺎﻣﻠﻲ ﺑﺠﺰ ﻭﻳﻨﺪﻭﺯ ٢٠٠٠ﻧﺼﺐ ﺷﺪﻩ ﺑﺎﺷﺪ ،ﺑﻪ ﭼﺎﭘﮕﺮ ﻫﺎﻱ
ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﻳﻨﺪﻭﺯ ، ٢٠٠٠ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ. •
ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﻳﻨﺘﺮﻧﺖ ) .(IISﺑﺮﻧﺎﻣﻪ ، IISﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻣﺘﻌﺪﺩﻱ ﻧﻈﻴﺮ ﻭﺏ ،ﺍﺧﺒﺎﺭ ،ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ﻭ ﺍﺭﺳﺎﻝ ﻓﺎﻳﻞ ﻣﺒﺘﻨﻲ ﺑﺮ 185
TCP/IPﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻗﺮﺍﺭ ﻣﻲ ﺩﻫﺪ ،IIS .ﺩﺭ ﺳﻴﺴﺘﻢ ﻫﺎﺋﻲ ﮐﻪ ﺍﺯ ﻧﺴﺨﻪ ﻫﺎﻱ
Serverﻭﻳﻨﺪﻭﺯ ٢٠٠٠ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﺑﺼﻮﺭﺕ ﭘﻴﺶ ﻓﺮﺽ ﻧﺼﺐ ﻣﻲ ﮔﺮﺩﺩ. ﭘﻴﺸﻨﻬﺎﺩ ﻣﻲ ﮔﺮﺩﺩ ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺑﻪ ﻋﻤﻠﮑﺮﺩ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﻧﻴﺎﺯﻱ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ،ﺍﻗﺪﺍﻡ ﺑﻪ ﻣﺜﺎﻝ
ﺣﺬﻑ ) (Uninstallﺁﻥ ﺍﺯ ﺭﻭﻱ ﺳﻴﺴﺘﻢ ﻧﻤﻮﺩ.
ﻣﺜﺎﻝ - ١ﻫﺪﻑ :ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﻧﺎﻣﻪ Pingﺑﻤﻨﻈﻮﺭ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺻﺤﺖ ﻋﻤﻠﮑﺮﺩ ﭘﺮﻭﺗﮑﻞ TCP/IP ﻣﺮﺣﻠﻪ ﻳﮏ :ﺑﻌﻨﻮﺍﻥ ﻳﮏ ﮐﺎﺭﺑﺮ ﻣﺠﺎﺯ ،ﺑﻪ ﺷﺒﮑﻪ ﻭﺍﺭﺩ ﺷﻮﻳﺪ.
ﻣﺮﺣﻠﻪ ﺩﻭ :ﮔﺰﻳﻨﻪ Prompt Commandﺭﺍ ﺍﺯ ﻣﺴﻴﺮ | Start | Programs Accessoriesﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ.
ﻣﺮﺣﻠﻪ ﺳﻪ :ﺩﺳﺘﻮﺭ ١٢٧,٠,٠,١ Pingﺭﺍ ﺩﺭ ﭘﻨﺠﺮﻩ ﻣﺮﺑﻮﻃﻪ ﺗﺎﻳﭗ ﻧﻤﺎﺋﻴﺪ.
ﻧﺘﺎﻳﺞ :ﭘﺲ ﺍﺯ ﺍﻧﺠﺎﻡ ﻣﺮﺍﺣﻞ ﻓﻮﻕ ،ﻧﺘﺎﻳﺞ ﺯﻳﺮ ﻣﻲ ﺑﺎﻳﺴﺖ ﻧﺸﺎﻥ ﺩﺍﺩﻩ ﺷﻮﺩ:
ﻧﺘﻴﺠﻪ ﻳﮏ :ﻣﻲ ﺑﺎﻳﺴﺖ ﭼﻬﺎﺭ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺭﺳﺎﻝ ﻭ ﭼﻬﺎﺭ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭﻳﺎﻓﺖ ﻭ ﻫﻴﭽﮕﻮﻧﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﮔﻢ ﻧﮕﺮﺩﺩ .ﺩﺭ ﻏﻴﺮ ﺍﻳﻨﺼﻮﺭﺕ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻧﺼﺐ TCP/IP
ﻣﺸﮑﻼﺗﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ.
ﻧﺘﻴﺠﻪ ﺩﻭ :ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﭼﻬﺎﺭ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﮔﺮﺩﺩ ،ﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﺻﺤﺖ ﻋﻤﻠﮑﺮﺩ ﻭ ﻧﺼﺐ ﭘﺮﻭﺗﮑﻞ TCP/IPﺍﺳﺖ. ﻧﺘﺎﻳﺞ ﺣﺎﺻﻞ ﺍﺯ ﺍﺟﺮﺍﻱ ﺑﺮﻧﺎﻣﻪ Ping C:\>ping 127.0.0.1 Pinging 127.0.0.1 with 32 bytes of data: Reply from 127.0.0.1: bytes=32 time<10ms TTL=128 Reply from 127.0.0.1: bytes=32 time<10ms TTL=128 Reply from 127.0.0.1: bytes=32 186
time<10ms TTL=128 Reply from 127.0.0.1: bytes=32 time<10ms TTL=128 Ping statistics for 127.0.0.1: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: = Minimum = 0ms, Maximum 0ms, Average = 0ms ﻣﺜﺎﻝ - ٢ﻫﺪﻑ :ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ Pingﻭ Hostnameﺑﻤﻨﻈﻮﺭ ﺻﺤﺖ ﻋﻤﻠﮑﺮﺩ TCP/IP • ﻣﺮﺣﻠﻪ ﻳﮏ :ﺑﻌﻨﻮﺍﻥ ﻳﮏ ﮐﺎﺭﺑﺮ ﻣﺠﺎﺯ ،ﺑﻪ ﺷﺒﮑﻪ ﻭﺍﺭﺩ ﺷﻮﻳﺪ. •
ﻣﺮﺣﻠﻪ ﺩﻭ :ﮔﺰﻳﻨﻪ Prompt Commandﺭﺍ ﺍﺯ ﻣﺴﻴﺮ | Start | Programs
•
ﻣﺮﺣﻠﻪ ﺳﻪ :ﺩﺭ ﭘﻨﺠﺮﻩ ﻣﺮﺑﻮﻃﻪ ،ﺩﺳﺘﻮﺭ hostnameﺭﺍ ﺗﺎﻳﭗ ﻧﻤﺎﺋﻴﺪ.
•
ﻣﺮﺣﻠﻪ ﭼﻬﺎﺭﻡ :ﺩﺭ ﭘﻨﺠﺮﻩ ﻣﺮﺑﻮﻃﻪ ،ﺩﺳﺘﻮﺭ Computer_Name Pingﺭﺍ
Accessoriesﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ.
ﺗﺎﻳﭗ ﻧﻤﺎﺋﻴﺪ .ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ،ﻣﻘﺪﺍﺭ ﺑﺮﮔﺮﺩﺍﻧﺪﻩ ﺷﺪﻩ ﺩﺭ ﺍﺛﺮ ﺍﺟﺮﺍﻱ ﻓﺮﻣﺎﻥ hostname ﺍﺳﺖ.
ﻧﺘﺎﻳﺞ :ﭘﺲ ﺍﺯ ﺍﻧﺠﺎﻡ ﻣﺮﺍﺣﻞ ﻓﻮﻕ ،ﻧﺘﺎﻳﺞ ﺯﻳﺮ ﻣﻲ ﺑﺎﻳﺴﺖ ﻧﺸﺎﻥ ﺩﺍﺩﻩ ﺷﻮﺩ: •
ﻧﺘﻴﺠﻪ ﻳﮏ :ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ )ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺍﺭﺍﻱ ﻧﺎﻡ ﺍﺧﺘﺼﺎﺻﻲ ﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ ﺧﻮﺍﻫﺪ ﺑﻮﺩ(
•
ﻧﺘﻴﺠﻪ ﺩﻭ :ﺁﺩﺭﺱ IPﮐﺎﻣﭙﻴﻮﺗﺮ ) ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺍﺭﺍﻱ ﺁﺩﺭﺱ IPﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ ﺧﻮﺍﻫﺪ ﺑﻮﺩ( ﻣﺮﺣﻠﻪ ﺍﻭﻝ :ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ C:\> hostname Srco 187
ﺑﻬﻤﺮﺍﻩ ﻧﺎﻡPing ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘﻮﺭ: ﻣﺮﺣﻠﻪ ﺩﻭﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ
C:> Ping Srco Pinging Srco.Test.com [ 10.10.1.1] with 32 bytes of data: Reply from 10.10.1.1: bytes=32 time<10ms TTL=128 Reply from 10.10.1.1: bytes=32 time<10ms TTL=128 Reply from 10.10.1.1: bytes=32 time<10ms TTL=128 Reply from 10.10.1.1: bytes=32 time<10ms TTL=128 Ping statistics for 10.10.1.1: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms
188
ﻣﻔﺎﻫﻴﻢ ﺍﻭﻟﻴﻪ ﭘﺮﻭﺗﮑﻞ ) TCP/IPﻗﺴﻤﺖ ﭼﻬﺎﺭﻡ ( ﺁﻧﭽﻪ ﺗﺎﮐﻨﻮﻥ ﮔﻔﺘﻪ ﺷﺪﻩ ﺍﺳﺖ:
ﻗﺴﻤﺖ ﺍﻭﻝ :ﻣﻌﺮﻓﻲ ﭘﺮﻭﺗﮑﻞ TCP/IPﺑﻬﻤﺮﺍﻩ ﻻﻳﻪ ﻫﺎﻱ ﺁﻥ
ﻗﺴﻤﺖ ﺩﻭﻡ :ﺑﺮﺭﺳﻲ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ TCP/IP ﻗﺴﻤﺖ ﺳﻮﻡ :ﺑﺮﺭﺳﻲ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﻭ ﺍﺑﺰﺍﺭﻫﺎﻱ ﮐﻤﮑﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﭘﺮﻭﺗﮑﻞ TCP/IP
ﺩﺭ ﺍﻳﻦ ﻗﺴﻤﺖ ﺑﻪ ﺑﺮﺭﺳﻲ ، Name Resoulationﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ .ﻣﺎﺣﺼﻞ ﻓﺮﺁﻳﻨﺪ
ﻓﻮﻕ ،ﻳﺎﻓﺘﻦ ﺁﺩﺭﺱ IPﻣﭗ ) (mapﺷﺪﻩ ﺑﻪ ﻳﮏ ﻧﺎﻡ ﺍﺳﺖ ) ﺩﺭ ﺻﻮﺭﺗﻴــﮑﻪ ﻋﻤﻠﻴﺎﺕ ﺑﺎ ﻣﻮﻓﻘﻴﺖ ﺍﻧﺠﺎﻡ ﮔﺮﺩﺩ( .ﺗﻤﺎﻣﻲ ﺍﺳﺎﻣﻲ ، User-friendlyﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﺁﺩﺭﺱ ﻣﻌﺎﺩﻝ IP
ﻣﺮﺑﻮﻃﻪ ﻣﭗ ﺗﺎ ﺯﻣﻴﻨﻪ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﺘﻘﺎﺿﻲ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﻣﺒﺘﻨﻲ ﺑﺮ ، TCP/IP ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ. ﭘﺮﻭﺗﮑﻞ TCP/IPﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﺒﺪﺍﺀ ﻭ ﻣﻘﺼﺪ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺁﺩﺭﺱ IPﺁﻧﺎﻥ ،ﺷﻨﺎﺳﺎﺋﻲ
ﻣﻲ ﻧﻤﺎﻳﺪ .ﮐﺎﺭﺑﺮﺍﻥ ،ﺗﻤﺎﻳﻞ ﺑﻴﺸﺘﺮﻱ ﺑﺮﺍﻱ ﺑﺨﺎﻃﺮﺳﭙﺮﺩﻥ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺳﺎﻣﻲ ،ﻧﺴﺒﺖ ﺑﻪ ﺍﻋﺪﺍﺩ) ﺁﺩﺭﺱ ﻫﺎﻱ ( IPﺭﺍ ﺩﺍﺭﻧﺪ .ﺑﺮﺍﻱ ﺁﺩﺭﺱ ﺩﻫــــﻲ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺯ ﺍﻧﻮﺍﻉ ﻣﺘﻔﺎﻭﺗﻲ ﻧﺎﻡ ) ،( user friendly namesﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻭﻳﻨﺪﻭﺯ ، ٢٠٠٠ﺑﻤﻨﻈﻮﺭ ﺫﺧﻴﺮﻩ ﺳﺎﺯﻱ
ﺍﺳﺎﻣﻲ ﻭ ﺁﺩﺭﺱ IPﻣﻌﺎﺩﻝ ﺁﻧﺎﻥ ،ﺍﺯ ﺭﻭﻳﮑﺮﺩﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﻮﻉ
ﻧﺎﻡ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ،ﺍﺯ ﻳﮏ ﻓﺎﻳﻞ ﺍﻳﺴﺘﺎ ﻭ ﻳﺎ ﭘﻮﻳﺎ ﺑﻤﻨﻈﻮﺭ ﺫﺧﻴﺮﻩ ﻧﻤﻮﺩﻥ ﺍﺳﺎﻣﻲ ﻭ ﺁﺩﺭﺱ ﻫﺎﻱ IP ﻣﭗ ﺷﺪﻩ ﺑﻪ ﺁﻧﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺮﺧﻲ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﻧﻈﻴﺮ IEﻭ ،FTPﻗﺎﺩﺭ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﺩﺭﺱ IPﻭ ﻳﺎ ﻧﺎﻡ ﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈﺮ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﺍﺯ ﻧﺎﻡ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ ،ﻗﺒﻞ ﺍﺯ ﺁﻏﺎﺯ ﻳﮏ ﺍﺭﺗﺒﺎﻁ ﺍﺯ ﻃﺮﻳﻖ ﭘﺮﻭﺗﮑﻞ ،TCP/IPﺍﺯ ﻓﺮﺁﻳﻨﺪﻱ ﺑﺎ ﻧﺎﻡ
Resolution Nameﺍﺳﺘﻔﺎﺩﻩ ﺗﺎ ﺁﺩﺭﺱ IPﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ،ﻣﺸﺨﺺ ﮔﺮﺩﺩ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺁﺩﺭﺱ ،IPﻣﺸﺨﺺ ﺷﺪﻩ ﺑﺎﺷﺪ ) ﺩﺭ ﻣﻘﺎﺑﻞ ﻣﺸﺨﺺ ﺷﺪﻥ ﻧﺎﻡ ( ،ﺍﺭﺗﺒﺎﻁ ﺑﻼﻓﺎﺻﻠﻪ ﺑﺮﻗﺮﺍﺭﺧﻮﺍﻫﺪ ﺷﺪ.
189
ﺍﻧﻮﺍﻉ ﻧﺎﻡ
ﺩﻭ ﻧﻮﻉ ﻧﺎﻡ user friendlyﻭﺟﻮﺩ ﺩﺍﺭﺩ :ﺍﺳﺎﻣﻲ ﻣﻴﺰﺑﺎﻥ ) (Hostﻭ ﺍﺳﺎﻣﻲ
. NetBIOSﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ،ﻧﺎﻣﻲ ﺍﺳﺖ ﮐﻪ ﺑﻪ ﻳﮏ ﺁﺩﺭﺱ IPﮐﺎﻣﭙﻴﻮﺗﺮﻧﺴﺒﺖ ﺩﺍﺩﻩ ﺷﺪﻩ ﺗﺎ ﺁﻥ
ﺭﺍ ﺑﻌﻨﻮﺍﻥ ﻳﮏ ﻣﻴﺰﺑﺎﻥ TCP/IPﻣﺸﺨﺺ ﻧﻤﺎﻳﺪ .ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ،ﻣﻲ ﺗﻮﺍﻧﺪ ﺩﺍﺭﺍﻱ ﺣﺪﺍﮐﺜﺮ ٢٥٥ ﮐﺎﺭﺍﮐﺘﺮ ) ﺣﺮﻭﻑ ﺍﻟﻔﺒﺎﺋﻲ ،ﮐﺎﺭﺍﮐﺘﺮﻫﺎﻱ ﻋﺪﺩﻱ ،ﻧﻘﻄﻪ ﻭ ( hyphensﺑﺎﺷﺪ .ﺍﺳﺎﻣﻲ ﻣﻴﺰﺑﺎﻥ ﺩﺍﺭﺍﻱ ﺍﺷﮑﺎﻝ ﻣﺘﻔﺎﻭﺗﻲ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻧﺎﻡ ﻣﺴﺘﻌﺎﺭ ) (Aliasﻭ ، names Domainﺩﻭ ﻧﻤﻮﻧﻪ
ﻣﺘﺪﺍﻭﻝ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻧﺎﻡ ﻣﺴﺘﻌﺎﺭ ،ﻧﺎﻣﻲ ﺧﺎﺹ ﻭ ﻣﺮﺗﺒﻂ ﺷﺪﻩ ﺑﻪ ﻳﮏ ﺁﺩﺭﺱ IP ﺍﺳﺖ) .ﻧﻈﻴﺮ .( Tehran :ﻳﮏ ، Domain nameﺑﻤﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺑﺮ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ
ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﻭ ﺍﺯ ﻧﻘﻄﻪ ﺑﻌﻨﻮﺍﻥ ﻳﮏ ﺟﺪﺍﮐﻨﻨﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ )ﻣﺜﻼ" ( Tehran.Citys.com
ﻧﺎﻡ ، NetBIOSﻳﮏ ﻧﺎﻡ ﺷﺎﻧﺰﺩﻩ ﮐﺎﺭﺍﮐﺘﺮﻱ ﺍﺳﺖ ﮐﻪ ﺍﺯ ﺁﻥ ﺑﻤﻨﻈﻮﺭ ﻣﺸﺨﺺ
ﻧﻤﻮﺩﻥ ﻳﮏ ﻣﻨﺒﻊ NetBIOSﺑﺮﺭﻭﻱ ﺷﺒﮑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺍﺯﻳﮏ ﻧﺎﻡNetBIOS
ﺑﻤﻨﻈﻮﺭ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﻳﮏ ﻭ ﻳﺎ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻴﮕﺮﺩﺩ. ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ،ﺻﺮﻓﺎ" ﺍﺯ ﭘﺎﻧﺰﺩﻩ ﺣﺮﻑ ﺍﻭﻝ ﺁﻥ ﺑﺮﺍﻱ ﻧﺎﻡ ﻭ ﺍﺯ ﮐﺎﺭﺍﮐﺘﺮ ﻧﻬﺎﺋﻲ ﺑﻤﻨﻈﻮﺭ ﻣﺸﺨﺺ
ﻧﻤﻮﺩﻥ ﻣﻨﺒﻊ ﻭ ﻳﺎ ﺳﺮﻭﻳﺴﻲ ﮐﻪ ﺑﻪ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺷﺎﺭﻩ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻧﻤﻮﻧﻪ ﺍﻱ ﺍﺯ ﻳﮏ ﻣﻨﺒﻊ ، NetBIOSﻋﻨﺼﺮ File and Print Sharing for Microsoft Networksﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﻳﻨﺪﻭﺯ ٢٠٠٠ﺍﺳﺖ .ﺯﻣﺎﻧﻴﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻓﻌﺎﻟﻴﺖ ﺧﻮﺩ
ﺭﺍ ﺁﻏﺎﺯ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﻋﻨﺼﺮ ﻓﻮﻕ ،ﻳﮏ ﻧﺎﻡ ﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ NetBIOSﺭﺍ ﺭﻳﺠﺴﺘﺮ)ﺛﺒﺖ(
ﻣﻲ ﻧﻤﺎﻳﺪ .ﻧﺎﻡ ﺛﺒﺖ ﺷﺪﻩ ﺷﺎﻣﻞ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻭ ﮐﺎﺭﺍﮐﺘﺮﻱ ﺍﺳﺖ ﮐﻪ ﺑﻴﺎﻧﮕﺮ ﻋﻨﺼﺮ ﺛﺒﺖ ﮐﻨﻨﺪﻩ ﺍﺳﺖ ) ﺑﺮﺍﻱ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻦ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺯ ﺣﺪﺍﮐﺜﺮ ﭘﺎﻧﺰﺩﻩ ﺣﺮﻑ ﻭ ﺑﺮﺍﻱ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ
ﻋﻨﺼﺮ ﺛﺒﺖ ﮐﻨﻨﺪﻩ ﻧﺎﻡ ،ﺍﺯ ﻳﮏ ﺣﺮﻑ ﺩﻳﮕﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ( .ﺩﺭﻭﻳﻨﺪﻭﺯ ، ٢٠٠٠ﻧﺎﻡ ، NetBIOSﻣﻲ ﺗﻮﺍﻧﺪ ﺣﺪﺍﮐﺜﺮ ﭘﺎﻧﺰﺩﻩ ﮐﺎﺭﺍﮐﺘﺮ ﺑﺎﺷﺪ .ﻭﻳﻨﺪﻭﺯ ، ٢٠٠٠ﺧﻮﺩ ﻧﻴﺎﺯﻱ ﺑﻪ ﺍﻳﻦ ﻧﻮﻉ ﺍﺳﺎﻣﻲ ﻧﺪﺍﺷﺘﻪ ﻭ ﻧﺴﺨﻪ ﻫﺎﻱ ﻗﺒﻠﻲ ﻭﻳﻨﺪﻭﺯ ﻧﻴﺎﺯﻣﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺳﺎﻣﻲ NetBIOS ﺑﻤﻨﻈﻮﺭ ﺣﻤﺎﻳﺖ ﺍﺯ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﺷﺒﮑﻪ ﺍﻱ ،ﺩﺍﺭﻧﺪ. 190
Static IP mapping ﺯﻣﺎﻧﻴﮑﻪ ﮐﺎﺭﺑﺮﺍﻥ ﻳﮏ ﻧﺎﻡ ﺭﺍ ﺑﻤﻨﻈﻮﺭ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ،ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﭘﺮﻭﺗﮑﻞ TCP/IPﻫﻤﭽﻨﺎﻥ ﻧﻴﺎﺯﻣﻨﺪ ﻳﮏ ﺁﺩﺭﺱ IPﺑﺮﺍﻱ ﺗﺤﻘﻖ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﻻﺯﻡ ﺍﺳﺖ ﮐﻪ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﻳﮏ ﺁﺩﺭﺱ ، IPﻣﭗ ﮔﺮﺩﺩ.
ﻣﺎﺣﺼﻞ ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ) ،( mappingﺩﺭ ﻳﮏ ﺟﺪﻭﻝ ﺍﻳﺴﺘﺎ ﻭ ﻳﺎ ﭘﻮﻳﺎ ﺫﺧﻴﺮﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺍﺯ ﻳﮏ ﺟﺪﻭﻝ ﺍﻳﺴﺘﺎ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ ،ﻧﺘﺎﻳﺞ ﻣﻮﺭﺩ ﻧﻈﺮ ﺩﺭ ﻳﮑﻲ ﺍﺯ ﻓﺎﻳﻞ ﻫﺎﻱ Hostsﻭ ﻳﺎ Lmhostsﺫﺧﻴﺮﻩ ﻣﻲ ﮔﺮﺩﻧﺪ) ﻓﺎﻳﻞ ﻫﺎ ﻱ ﻓﻮﻕ ،ﻣﺘﻨﻲ ﻣﻲ ﺑﺎﺷﻨﺪ( .ﻣﻬﻤﺘﺮﻳﻦ
ﻣﺰﻳﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺟﺪﻭﻝ ﺍﻳﺴﺘﺎ ،ﺍﻣﮑﺎﻥ ﺳﻔﺎﺭﺷﻲ ﻧﻤﻮﺩﻥ ﺁﻥ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺎﻫﻴﺖ ﻓﺎﻳﻞ
) ﻣﺘﻨﻲ ( ﻭ ﻣﺤﻞ ﺫﺧﻴﺮﻩ ﺳﺎﺯﻱ ) ﺫﺧﻴﺮﻩ ﺑﺮ ﺭﻭﻱ ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ( ﺁﻥ ﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻣﻨﺎﺑﻌﻲ ﺑﺎ ﻓﺮﮐﺎﻧﺲ ﺑﺎﻻﻱ ﺩﺳﺘﻴﺎﺑﻲ ،ﺑﻪ ﻫﺮ ﻣﻴﺰﺍﻥ
ﮐﻪ ﺿﺮﻭﺭﺕ ﺩﺍﺭﺩ entry ،ﺩﺭ ﺟﺪﻭﻝ ﻓﻮﻕ ﺛﺒﺖ ﻧﻤﺎﻳﻨﺪ .ﺑﻬﻨﮕﺎﻡ ﺳﺎﺯﻱ ﺟﺪﺍﻭﻝ ﺍﻳﺴﺘﺎ ،ﻳﮑﻲ ﺍﺯ ﭼﺎﻟﺶ ﻫﺎﻱ ﺍﺻﻠﻲ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺑﻮﺩﻩ ﻭ ﺩﺭ ﻣﻮﺍﺭﺩﻳﮑﻪ ﺗﻌﺪﺍﺩ ﺁﺩﺭﺱ ﻫﺎﻱ IPﻣﭗ ﺷﺪﻩ ،ﺯﻳﺎﺩ
ﻭ ﺁﺩﺭﺱ ﻫﺎﻱ ﻓﻮﻕ ﻣﺘﻨﺎﻭﺑﺎ" ﺗﻐﻴﻴﺮ ﻳﺎﺑﻨﺪ ،ﺑﻬﻨﮕﺎﻡ ﺳﺎﺯﻱ ﺟﺪﺍﻭﻝ ﺍﻳﺴﺘﺎ ﻣﺴﺎﺋﻞ ﺧﺎﺹ ﺧﻮﺩ ﺭﺍ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ.
ﻓﺎﻳﻞ . Hostsﻓﺎﻳﻞ ﻓﻮﻕ ،ﻳﮏ ﻓﺎﻳﻞ ﻣﺘﻨﻲ ﻭ ﺷﺎﻣﻞ ﺁﺩﺭﺱ ﻫﺎﻱ IPﻣﭗ ﺷﺪﻩ ﺑﻪ ﺍﺳﺎﻣﻲ
ﻣﻴﺰﺑﺎﻥ ﺍﺳﺖ .ﻓﺎﻳﻞ ﻓﻮﻕ ،ﺩﺍﺭﺍﻱ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﺯﻳﺮ ﺍﺳﺖ: •
ﻣﻲ ﺗﻮﺍﻥ ﭼﻨﺪﻳﻦ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﺭﺍ ﺑﻪ ﺁﺩﺭﺱ IPﻣﺸﺎﺑﻬﻲ ﻧﺴﺒﺖ ﺩﺍﺩ .ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ، ﺍﻣﮑﺎﻥ ﻣﺮﺍﺟﻌﻪ ﺑﻪ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺩﺭ ﺁﺩﺭﺱ ١٢٧,٩١,٤٥,١٢١ : IPﺍﺯ ﻃﺮﻳﻖ ﻧﺎﻡ ﺣﻮﺯﻩ Tehran.Citys.Comﻭ ﻳﺎ ﻧﺎﻡ ﻣﺴﺘﻌﺎﺭ Tehranﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ. ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ،ﮐﺎﺭﺑﺮﺍﻥ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺑﻤﻨﻈﻮﺭ ﻣﺮﺍﺟﻌﻪ ﺑﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺍﺯ ﻧﺎﻡ ﻣﺴﺘﻌﺎﺭ
Tehranﺩﺭ ﻣﻘﺎﺑﻞ ﻧﺎﻡ ،Domainﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ. •
ﻫﺮ Entryﺩﺭ ﻓﺎﻳﻞ ﻓﻮﻕ ،ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﻮﻉ ﭘﻼﺕ ﻓﺮﻡ ،ﻧﺴﺒﺖ ﺑﻪ ﺣﺮﻭﻑ ﺑﺰﺭﮒ ﻭ ﮐﻮﭼﮏ ﺣﺴﺎﺱ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﺋﻲ ﮐﻪ ﻭﻳﻨﺪﻭﺯ ٢٠٠٠ﻭ ﻳﺎ NT ﺑﺮ ﺭﻭﻱ ﺁﻧﻬﺎ ﻧﺼﺐ ﺷﺪﻩ ﺍﺳﺖ ،ﺣﺴﺎﺳﻴﺖ ﻓﻮﻕ ،ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ.
191
ﻓﺎﻳﻞ . LmHostsﻓﺎﻳﻞ ﻓﻮﻕ ،ﻳﮏ ﻓﺎﻳﻞ ﻣﺘﻨﻲ ﻭﺷﺎﻣﻞ ﺁﺩﺭﺱ IPﻣﭗ ﺷﺪﻩ ﺑﻪ ﻧﺎﻡ NetBIOSﺍﺳﺖ .ﺑﺨﺸﻲ ﺍﺯ ﻓﺎﻳﻞ Lmhostsﺩﺭ ﺍﺑﺘﺪﺍ ﻭﺍﺭﺩ ﺣﺎﻓﻈﻪ ﺷﺪﻩ ﻭ ﺑﻪ ﺁﻥ
ﺍﺻﻄﻼﺣﺎ" NetBIOS name Cacheﻣﻲ ﮔﻮﻳﻨﺪ. mapping Dynamic IP ﻣﻬﻤﺘﺮﻳﻦ ﻣﺰﻳﺖ ﺟﺪﺍﻭﻝ ﭘﻮﻳﺎ )ﻣﺴﺌﻮﻝ ﺫﺧﻴﺮﻩ ﺳﺎﺯﻱ IPﻣﭗ ﺷﺪﻩ( ،ﺑﻬﻨﮕﺎﻡ ﺳﺎﺯﻱ ﺍﺗﻮﻣﺎﺗﻴﮏ ﺁﻧﺎﻥ ﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ،ﺟﺪﺍﻭﻝ ﭘﻮﻳﺎ ﺍﺯ ﺩﻭ ﺳﺮﻭﻳﺲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ:
(Domain Name System(DNSﻭ Windows Internet Neame (WINS .(Serviceﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﻭ WINSﻋﻤﻠﻴﺎﺕ ﻣﺸﺎﺑﻪ ﺍﻱ ﺭﺍ ﻧﻈﻴﺮ ﻓﺎﻳﻞ ﻫﺎﻱ Hostsﻭ Lmhostsﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ ) ﺑﺪﻭﻥ ﻧﻴﺎﺯ ﺑﻪ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺩﺳﺘﻲ (. (Domain Name System)DNS
، DNSﺭﻭﺷﻲ ﺑﻤﻨﻈﻮﺭ ﻧﺎﻣﮕﺬﺍﺭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻭ ﻣﻨﺎﺑﻊ ﺷﺒﮑﻪ ﺍﺳﺖ .ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ، TCP/IPﺍﺯ ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺳﺎﻣﻲ ،DNSﺑﻤﻨﻈﻮﺭ ﻳﺎﻓﺘﻦ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻭ ﺳﺮﻭﻳﺲ ﻫﺎ ﺍﺯ ﻃﺮﻳﻖ ﺍﺳﺎﻣﻲ User friendlyﻣﺮﺑﻮﻁ ﺑﻪ ،Domain namesﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺯﻣﺎﻧﻴﮑﻪ
ﮐﺎﺭﺑﺮﻱ ﻧﺎﻡ ﻳﮏ Domainﺭﺍ ﺩﺭ ﺑﺮﻧﺎﻣﻪ ﺍﻱ ﻭﺍﺭﺩ ) ﻣﺸﺨﺺ ( ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ
، DNSﻧﺎﻡ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺑﻪ IPﻣﺮﺑﻮﻃﻪ map ،ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺳﺎﺧﺘﺎﺭ ﺳﻴﺴﺘﻢ ﻧﺎﻣﮕﺬﺍﺭﻱ ، DNSﺑﺼﻮﺭﺕ ﺳﻠﺴﻠﻪ ﻣﺮﺍﺗﺒﻲ ﺍﺳﺖ ،ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻴﺴﺘﻢ ﻓﻮﻕ ،ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺰﺭﮔﻲ ﻧﻈﻴﺮ ﺍﻳﻨﺘﺮﻧﺖ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺳﻴﺴﺘﻢ ﺳﻠﺴﻠﻪ ﻣﺮﺍﺗﺒﻲ ﺑﻤﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﺍﺳﺎﻣﻲ ، Domainﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﺋﻲ ﮐﻪ ﺍﺳﺎﻣﻲ Domainﻭ ﻣﻌﺎﺩﻝ IPﻣﺮﺑﻮﻃﻪ
ﺭﺍ ﺫﺧﻴﺮﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﺩﺍﺭﺍﻱ mappingﻻﺯﻡ ﺑﺮﺍﻱ ﺻﺮﻓﺎ" ﻧﺎﺣﻴﻪ ﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ ﻣﻲ ﺑﺎﺷﻨﺪ. ﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺍﺻﻄﻼﺣﺎ" ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ، DNSﻧﺎﻣﻴﺪﻩ ﺷﺪﻩ ﻭ ﺻﺮﻓﺎ" ﭘﺮﺩﺍﺯﺵ
ﻫﺎﻱ ﻻﺯﻡ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﺋﻲ ﮐﻪ ﺩﺭ ﻣﻴﺪﺍﻥ ﻋﻤﻠﻴﺎﺗﻲ ﺁﻧﺎﻥ ﻣﻲ ﺑﺎﺷﺪ ﺭﺍ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ. ﺯﻣﺎﻧﻴﮑﻪ mappingﺩﺭ ﻧﺎﺣﻴﻪ ﻣﺮﺑﻮﻃﻪ ﺗﻐﻴﻴﺮ ﻧﻤﺎﻳﺪ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ DNSﻣﺒﺘﻨﻲ ﺑﺮ ﻭﻳﻨﺪﻭﺯ ، ٢٠٠٠ﺑﺼﻮﺭﺕ ﺍﺗﻮﻣﺎﺗﻴﮏ ﻋﻤﻠﻴﺎﺕ ﺑﻬﻨﮕﺎﻡ ﺳﺎﺯﻱ ﺭﺍ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ.
192
(Windows Internet Name Service(WINS
، WINSﻳﮏ ﺑﺎﻧـﮏ ﺍﻃﻼﻋــــﺎﺗﻲ ﺗﻮﺯﻳﻌﻲ ﺭﺍ ﺑﺮﺍﻱ ﺛﺒـــﺖ mappingﭘﻮﻳﺎﻱ ﺍﺳــﺎﻣﻲ NetBIOSﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﺷﺒﮑﻪ ،ﺍﺭﺍﺋﻪ ﻣﻲ ﻧﻤﺎﻳﺪ ،WINS .ﺍﺳﺎﻣﻲ NetBIOSﺭﺍ ﺑـﻪ
ﺁﺩﺭﺱ ﻫﺎﻱ IPﻣﭗ ﻭ ﺍﻳﻦ ﺍﻣﮑﺎﻥ ﺭﺍ ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﺁﻭﺭﺩ ﮐﻪ ﺍﺳــﺎﻣﻲ NetBIOSﺩﺭ ﻃﻮﻝ ﺭﻭﺗﺮﻫﺎ ،ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺑﺎﺷﻨﺪ. Name Resoulationﺩﺭ ﻭﻳﻨﺪﻭﺯ ٢٠٠٠ ، Resoulation Nameﻓﺮﺁﻳﻨﺪﻱ ﺍﺳﺖ ﮐﻪ ﺑﺮ ﺍﺳﺎﺱ ﺁﻥ ﻣﺸﮑﻞ ﻳﮏ ﻧﺎﻡ ﺑﺮﻃﺮﻑ ﻭ ﻳﺎ ﺑﻪ ﻳﮏ ﺁﺩﺭﺱ IPﻣﭗ ﻣﻲ ﮔﺮﺩﺩ .ﺯﻣﺎﻧﻴﮑﻪ ﮐﺎﺭﺑﺮﻱ ﻳﮏ ﻧﺎﻡ ﺭﺍ ﺩﺭ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ،ﻭﺍﺭﺩ ﻣﻲ ﻧﻤﺎﻳﺪ،
ﺑﺮﻧﺎﻣﻪ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ ﮐﻪ ﻧﺎﻡ ﻓﻮﻕ ﻳﮏ ﻣﻴﺰﺑﺎﻥ ﻭ ﻳﺎ ﻳﮏ ﻧﺎﻡ NetBIOSﺍﺳﺖ .ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻓﻌﻠﻲ ﺩﺭ ﻭﻳﻨﺪﻭﺯ ،٢٠٠٠ﺍﺯ ﻓﺮﺁﻳﻨﺪ ، host name resolutionﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ
ﻭﻟﻲ ﺑﺮﺧﻲ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻗﺪﻳﻤﻲ ﺗﺮ ﻧﻈﻴﺮ ﺑﺮﻧﺎﻣﻪ ﻫﺎﺋﻲ ﮐﻪ ﻣﺨﺘﺺ ﻭﻳﻨﺪﻭﺯ NTﻭ ﻳﺎ ﻭﻳﻨﺪﻭﺯ ٩٨ , ٩٥ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺍﻧﺪ ،ﻫﻤﭽﻨﺎﻥ ﺍﺯ ﺍﺳﺎﻣﻲ NetBIOSﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ،ﺑﺎ ﻣﻮﻓﻘﻴﺖ ﻫﻤﺮﺍﻩ ﻧﮕﺮﺩﺩ ،ﺑﺮﻧﺎﻣﻪ ﻣﺘﻘﺎﺿﻲ ﻗﺎﺩﺭ ﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻣﻘﺼﺪ
ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺍﺯ ﻳﮏ ﺁﺩﺭﺱ IPﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﺋﻴﺪname ، resolutionﻧﻴﺎﺯ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ.
ﻓﺮﺁﻳﻨﺪ Host name Resolution
ﺁﺩﺭﺱ IPﺍﺳﺎﻣﻲ ﻣﻴﺰﺑﺎﻥ ) ، (Host Namesﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺎﻳﻞ Hostﻭ ﻳﺎ ﺑﮑﻤﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ، DNSﻣﺸﺨﺺ ﺧﻮﺍﻫﺪ ﺷﺪ .ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ،ﺑﺼﻮﺭﺕ ﺯﻳﺮ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ. •
ﮐﺎﻣﭙﻴﻮﺗﺮ Aﺩﺳﺘﻮﺭﻱ ﺭﺍ ﻧﻈﻴﺮ FTPﺑﻬﻤﺮﺍﻩ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻴﺰﺑﺎﻥ ، Bﻭﺍﺭﺩ ﻣﻲ ﻧﻤﺎﻳﺪ.
•
ﮐﺎﻣﭙﻴﻮﺗﺮ ، Aﺑﺮﺭﺳﻲ ﻣﻲ ﻧﻤﺎﻳﺪ ﮐﻪ ﺁﻳﺎ ﻧﺎﻡ ﻣﺸﺨﺺ ﺷﺪﻩ ﺑﺎ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﻣﺤﻠﻲ ﻣﻄﺎﺑﻘﺖ
ﻣﻲ ﻧﻤﺎﻳﺪ.
193
•
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﻧﺎﻡ ﻣﺸﺨﺺ ﺷﺪﻩ ﺑﺎ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﻣﺤﻠﻲ ﻣﻄﺎﺑﻘﺖ ﻧﻨﻤﺎﻳﺪ ،ﮐﺎﻣﭙﻴﻮﺗﺮ ، A
ﻓﺎﻳﻞ ﻣﻴﺰﺑﺎﻧﺎﻥ ﺧﻮﺩ ﺭﺍ ) ( Hosts Fileﺑﻤﻨﻈﻮﺭ ﺁﮔﺎﻫﻲ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻴﺰﺑﺎﻥ ، B
ﺟﺴﺘﺠﻮ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻴﺰﺑﺎﻥ ﭘﻴﺪﺍ ﮔﺮﺩﺩ ،ﺁﺩﺭﺱ IPﻣﭗ ﺷﺪﻩ ﺑﻪ ﺁﻥ ،ﺑﺮﮔﺮﺩﺍﻧﺪﻩ ﺧﻮﺍﻫﺪ ﺷﺪ .ﭘﺲ ﺍﺯ ﻣﺸﺨﺺ ﺷﺪﻥ ﺁﺩﺭﺱ ، IPﺯﻣﻴﻨﻪ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﺷﺪ.
•
ﺍﮔﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ، Aﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﮐﺎﻣﭙﻴﻮﺗﺮ Bﺭﺍ ﭘﻴﺪﺍ ﻧﻨﻤﺎﻳﺪ ،ﺩﺭ ﺍﺩﺍﻣﻪ ﻳﮏ queryﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﭘﻴﺪﺍ ﮔﺮﺩﺩ ،ﺁﺩﺭﺱ IPﻧﺴﺒﺖ ﺩﺍﺩﻩ ﺷﺪﻩ ﺑﻪ ﺁﻥ ﻣﺸﺨﺺ ﺧﻮﺍﻫﺪ ﺷﺪ .ﭘﺲ ﺍﺯ ﻣﺸﺨﺺ ﺷﺪﻥ ﺁﺩﺭﺱ IP
،ﺯﻣﻴﻨﻪ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﺷﺪ. •
ﺩﺭﺻﻮﺭﺗﻴﮑﻪ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻴﺰﺑﺎﻥ ﺩﺭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﭘﻴﺪﺍ ﻧﮕﺮﺩﺩ ،ﻭﻳﻨﺪﻭﺯ
Cache ، ٢٠٠٠ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﺳﺎﻣﻲ NetBIOSﺭﺍ ﺑﺮﺭﺳﻲ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺍﻳﻦ ﺍﻣﺮ ﺑﺪﻳﻦ
ﻋﻠﺖ ﺍﺳﺖ ﮐﻪ ﻭﻳﻨﺪﻭﺯ ، ٢٠٠٠ﺑﺎ name NetBIOSﺑﻤﻨﺰﻟﻪ ، host name ﺭﻓﺘﺎﺭ ﻣﻲ ﻧﻤﺎﻳﺪ. •
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ Cacheﻓﻮﻕ ،ﺷﺎﻣﻞ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﻣﻮﺭﺩ ﻧﻈﺮ ﻧﺒﺎﺷﺪ ،ﻳﮏ queryﺑﺮﺍﻱ
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ WINSﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ. •
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ WINSﻗﺎﺩﺭ ﺑﻪ ﺣﻞ ﻣﺸﮑﻞ ﻧﺎﻡ ﻧﺒﺎﺷﺪ ،ﻳﮏ ﭘﻴﺎﻡ
•
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﻣﻴﺰﺑﺎﻧﻲ ﺑﻪ ﭘﻴﺎﻡ ﻣﻨﺘﺸﺮ ﺷﺪﻩ ﭘﺎﺳﺦ ﻧﺪﻫﺪ ،ﻓﺎﻳﻞ Lmhostsﺑﻤﻨﻈﻮﺭ ﻧﺎﻡ
Broadcastﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ. ﻣﻴﺰﺑﺎﻥ) ، (NetBIOSﺑﺮﺭﺳﻲ ﺧﻮﺍﻫﺪ ﺷﺪ. ﻓﺮﺁﻳﻨﺪ Name Resolution NetBIOS
ﺑﺼﻮﺭﺕ ﭘﻴﺶ ﻓﺮﺽ ،ﺍﺳﺎﻣﻲ NetBIOSﺑﺮ ﺭﻭﻱ ﻳﮏ ﺷﺒﮑﻪ ﻣﺒﺘﻨﻲ ﺑﺮ TCP/IP
ﮐﺎﺭ ﻧﺨﻮﺍﻫﻨﺪ ﮐﺮﺩ .ﻭﻳﻨﺪﻭﺯ ،٢٠٠٠ﺍﻣﮑﺎﻥ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ TCP/IP ﺭﺍ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ، NetBIOSﺍﺯ ﻃﺮﻳﻖ ﭘﺮﻭﺗﮑﻞ ، NetBTﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ. 194
، NetBTﺍﺯ ﮐﻠﻤﺎﺕ NetBIOS over TCP/IPﺍﻗﺘﺒﺎﺱ ﺷﺪﻩ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ، ﺍﻣﮑﺎﻥ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺭﺍ ﺑﺮﺍﻱ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ، NetBIOSﺗﻮﺳﻂ TCP/IPﻭ ﺍﺯ
ﻃﺮﻳﻖ ﺗﺮﺟﻤﻪ ﻧﺎﻡ NetBIOSﺑﻪ ﻳﮏ ﺁﺩﺭﺱ ،IPﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭﺻﻮﺭﺗﻴﮑﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ WINSﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ،ﭘﻴﮑﺮﺑﻨﺪﻱ ﺷﺪﻩ ﺑﺎﺷﺪ ،ﻓﺮﺁﻳﻨﺪ NetBIOS Name ، Resolutionﺑﺼﻮﺭﺕ ﺯﻳﺮ ﺧﻮﺍﻫﺪ ﺑﻮﺩ : •
ﮐﺎﻣﭙﻴﻮﺗﺮ ، Aﺩﺳﺘﻮﺭﻱ ﻧﻈﻴﺮ Net useﺭﺍ ﺑﻬﻤﺮﺍﻩ ﻧﺎﻡ NetBIOSﮐﺎﻣﭙﻴﻮﺗﺮ ،B ﻭﺍﺭﺩ ﻣﻲ ﻧﻤﺎﻳﺪ.
•
ﮐﺎﻣﭙﻴﻮﺗﺮ ، Aﺑﺮﺭﺳﻲ ﻣﻲ ﻧﻤﺎﻳﺪ ﮐﻪ ﺁﻳﺎ ﻧﺎﻡ ﻣﺸﺨﺺ ﺷﺪﻩ ﺩﺭ Cacheﺍﺳﺎﻣﻲ ، NetBIOSﻣﻮﺟﻮﺩ ﺍﺳﺖ.
•
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﻧﺎﻡ ﻣﻮﺟﻮﺩ ﻧﺒﺎﺷﺪ ،ﮐﺎﻣﭙﻴﻮﺗﺮ Aﻳﮏ queryﺭﺍ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ
•
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ WINSﻗﺎﺩﺭ ﺑﻪ ﻳﺎﻓﺘﻦ ﻧﺎﻡ ﻧﺒﺎﺷﺪ ،ﮐﺎﻣﭙﻴﻮﺗﺮ Aﺍﺯ
WINSﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ.
Broadcastﺩﺭ ﺷﺒﮑﻪ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ. •
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ، Broadcastﻗﺎﺩﺭ ﺑﻪ ﺣﻞ ﻣﺸﮑﻞ ﻧﺎﻡ ﻧﮕﺮﺩﺩ ،ﮐﺎﻣﭙﻴﻮﺗﺮ ، Aﻓﺎﻳﻞ Lmhostsﺭﺍ ﺑﺮﺭﺳﻲ ﻣﻲ ﻧﻤﺎﻳﺪ.
•
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺭﻭﺵ ﻫﺎﻱ NetBIOSﻓﻮﻕ ،ﻗﺎﺩﺭ ﺑﻪ ﺣﻞ ﻣﺸﮑﻞ ﻧﺎﻡ ﻧﮕﺮﺩﻧﺪ،
•
ﺩﺭ ﻧﻬﺎﻳﺖ ،ﮐﺎﻣﭙﻴﻮﺗﺮ ، Aﻳﮏ queryﺑﺮﺍﻱ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺍﺭﺳﺎﻝ
ﮐﺎﻣﭙﻴﻮﺗﺮ ، Aﻓﺎﻳﻞ Hostsﺭﺍ ﺑﺮﺭﺳﻲ ﻣﻲ ﻧﻤﺎﻳﺪ. ﻣﻲ ﻧﻤﺎﻳﺪ.
ﺩﺭ ﻗﺴﻤﺖ ﭘﻨﺠﻢ ﺑﻪ ﺑﺮﺭﺳﻲ ﻧﺤﻮﻩ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ.
195
ﻣﻔﺎﻫﻴﻢ ﺍﻭﻟﻴﻪ ﭘﺮﻭﺗﮑﻞ ) TCP/IPﻗﺴﻤﺖ ﭘﻨﺠﻢ ( ﺁﻧﭽﻪ ﺗﺎﮐﻨﻮﻥ ﮔﻔﺘﻪ ﺷﺪﻩ ﺍﺳﺖ :
ﻗﺴﻤﺖ ﺍﻭﻝ :ﻣﻌﺮﻓﻲ ﭘﺮﻭﺗﮑﻞ TCP/IPﺑﻬﻤﺮﺍﻩ ﻻﻳﻪ ﻫﺎﻱ ﺁﻥ
ﻗﺴﻤﺖ ﺩﻭﻡ :ﺑﺮﺭﺳﻲ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ TCP/IP ﻗﺴﻤﺖ ﺳﻮﻡ :ﺑﺮﺭﺳﻲ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﻭ ﺍﺑﺰﺍﺭﻫﺎﻱ ﮐﻤﮑﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﭘﺮﻭﺗﮑﻞ TCP/IP ﻗﺴﻤﺖ ﭼﻬﺎﺭﻡ :ﺑﺮﺭﺳﻲ Name Resoulation
ﺩﺭ ﺍﻳﻦ ﻗﺴﻤﺖ ﺑﻪ ﺑﺮﺭﺳﻲ ﻧﺤﻮﻩ ﻓﺮﺁﻳﻨﺪ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ. ، TCP/IPﺑﻤﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﺁﻧﻬﺎ ﺭﺍ ﺑﻪ ﺑﺨﺶ ﻫﺎﻱ ﮐﻮﭼﮑﺘﺮﻱ ﺑﺎ ﻧﺎﻡ
) Packetsﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ( ،ﺗﻘﺴﻴﻢ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺍﺯ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ،ﺑﺮ ﺍﺳﺎﺱ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﺮﺗﺒﻂ ﺑﺎ ﺁﻧﺎﻥ ﺑﺎ ﻭﺍﮊﻩ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﻳﺎﺩ ﻣﻲ ﮔﺮﺩﺩ .ﺗﻘﺴﻴﻢ ﺩﺍﺩﻩ ﺑﻪ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﻣﺮﻱ ﺣﻴﺎﺗﻲ ﻭ ﺿﺮﻭﺭﻱ ﺍﺳﺖ .ﺍﺭﺳﺎﻝ ﺣﺠﻢ ﺑﺎﻻﺋﻲ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺷﺒﮑﻪ ،ﻣﺪﺕ
ﺯﻣﺎﻥ ﺯﻳﺎﺩﻱ ﻃﻮﻝ ﺧﻮﺍﻫﺪ ﮐﺸﻴﺪ ﻭ ﻫﻤﻴﻦ ﺍﻣﺮ ،ﺑﺎﻋﺚ ﮐﻨﺪ ﺷﺪﻥ ﺷﺒﮑﻪ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺯﻣﺎﻧﻴﮑﻪ ﺣﺠﻢ ﺑﺎﻻﺋﻲ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺷﺒﮑﻪ ﺟﺎﺑﺠﺎ ﻣﻲ ﮔﺮﺩﺩ ،ﺳﺎﻳﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻧﺨﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ،ﺍﮔﺮ ﺩﺭ ﻓﺮﺁﻳﻨﺪ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺷﮑﺎﻟﻲ ﺑﺮﻭﺯ ﻧﻤﺎﻳﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺗﻤﺎﻣﻲ ﺍﻃﻼﻋﺎﺕ ﻣﺠﺪﺩﺍ" ﺍﺭﺳﺎﻝ ﺷﻮﻧﺪ .ﺩﺭ ﻣﻘﺎﺑﻞ ،ﺍﮔﺮ ﺑﺴﺘﻪ
ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﮐﻮﭼﮏ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﺍﺭﺳﺎﻝ ﮔﺮﺩﻧﺪ ،ﺍﻧﺘﻘﺎﻝ ﺁﻧﻬﺎ ﺑﺴﺮﻋﺖ ﺍﻧﺠﺎﻡ ﻭ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺑﻪ ﻣﺪﺕ ﺯﻳﺎﺩﻱ ،ﺍﺷﻐﺎﻝ ﻧﺨﻮﺍﻫﺪ ﺷﺪ .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺎ ﻣﺸﮑﻞ ﻣﻮﺍﺟﻪ ﺷﻮﻧﺪ ،ﺻﺮﻓﺎ" ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﮐﻪ ﺑﺎ ﻣﺸﮑﻞ ﻣﻮﺍﺟﻪ ﺷﺪﻩ ﺍﺳﺖ ،ﻣﺠﺪﺩﺍ" ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ ) .ﺩﺭ ﻣﻘﺎﺑﻞ ﺍﺭﺳﺎﻝ ﺗﻤﺎﻡ ﺍﻃﻼﻋﺎﺕ (. ﺯﻣﺎﻧﻴﮑﻪ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﻻﻳﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺷﺒﮑﻪ ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ ) ،( Network interface layerﺑﻪ ﺁﻥ ﻓﺮﻳﻢ ) ( frameﻣﻲ ﮔﻮﻳﻨﺪ .ﻓﺮﻳﻢ ،ﺍﺯ ﺑﺨﺶ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﮐﻪ ﻫﺮ ﻳﮏ ﺩﺍﺭﺍﻱ ﻋﻤﻠﮑﺮﺩ ﺧﺎﺹ ﺧﻮﺩ ﺩﺭ ﺟﺮﻳﺎﻥ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻻﻳﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺷﺒﮑﻪ ﻣﻲ ﺑﺎﺷﻨﺪ ،ﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺍﺳﺖ.
196
ﻓﺮﺁﻳﻨﺪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ،ﺷﺎﻣﻞ ﻣﺮﺍﺣﻞ ﻣﺘــﻌﺪﺩﻱ ﺍﺳﺖ )ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﺩﺍﺩﻩ ﺩﺭﻭﻥ ﺑﺴﺘﻪ
ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍﺀ ﻭ ﺑﻬﻢ ﺑﺴﺘﻦ ﺁﻧﺎﻥ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺑﮕﻮﻧﻪ ﺍﻱ ﮐﻪ ﺷﮑﻞ
ﺍﻭﻟﻴﻪ ﻣﺠﺪﺩﺍ" ﺍﻳﺠﺎﺩ ﮔﺮﺩﺩ( .ﻫﺮ ﻻﻳﻪ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ، TCP/IPﺩﺍﺭﺍﻱ ﻧﻘﺸﻲ ﻣﻮﺛﺮ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﺒﺪﺍﺀ ﻭ ﻣﻘﺼﺪ ﺍﺳﺖ.
ﻭﺍﮊﮔﺎﻥ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ) ( Packets ﺩﺭ ﻫﺮ ﻳﮏ ﺍﺯ ﻻﻳﻪ ﻫﺎﻱ TCP/IPﺍﺯ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ) ( packetﺑﺎ ﺍﺳﺎﻣﻲ ﻣﺘﻔﺎﻭﺗﻲ ﻧﺎﻡ
ﺑﺮﺩﻩ ﻣﻲ ﺷﻮﺩ .ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺣﺮﮐﺖ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﻳﮏ ﻻﻳﻪ ﺑﻪ ﻻﻳﻪ ﺩﻳﮕﺮ ﺩﺭ ﭘﺮﻭﺗﮑﻞ ، TCP/IPﻫﺮ ﻳﮏ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ،ﺍﻃﻼﻋﺎﺕ ﺍﺧﺘﺼﺎﺻﻲ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺁﻥ ﺍﺿﺎﻓﻪ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺍﺯ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻬﻤﺮﺍﻩ ﺍﻃﻼﻋﺎﺕ ﺍﺿﺎﻓﻪ ﺷﺪﻩ ﺑﻪ ﺁﻥ ،ﺑﺎ ﺍﺳﺎﻣﻲ ﻓﻨﻲ ﺩﻳﮕﺮ ،ﻳﺎﺩ ﻣﻲ ﮔﺮﺩﺩ .ﺍﻳﻦ ﺍﺳﺎﻣﻲ ) Segment :ﺳﮕﻤﻨﺖ ( ) message ،ﭘﻴﺎﻡ (datagram ، ) ﺩﻳﺘﺎﮔﺮﺍﻡ ( ﻭ ) frameﻓﺮﻳﻢ ( ،ﻣﻲ ﺑﺎﺷﻨﺪ. •
ﺳﮕﻤﻨﺖ .ﺳﮕﻤﻨﺖ ﻭﺍﺣﺪ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺩﺭ TCPﺑﻮﺩﻩ ﻭ ﺷﺎﻣﻞ ﻳﮏ TCP
•
ﭘﻴﺎﻡ .ﭘﻴﺎﻡ ،ﻭﺍﺣﺪ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﭘﺮﻭﺗﮑﻞ ﻫﺎﺋﻲ ﻧﻈﻴﺮ
headerﺍﺳﺖ ﮐﻪ ﺗﻮﺳﻂ ، Application dataﻫﻤﺮﺍﻫﻲ ﺷﺪﻩ ﺍﺳﺖ.
.ICMP,UDP,IGMPﻭ ARPﺍﺳﺖ .ﭘﻴﺎﻡ ﺷﺎﻣﻞ ﻳﮏ header Protocol ﺑﻮﺩﻩ ﮐﻪ ﺗﻮﺳﻂ Applicationﻭ ﻳﺎ ، protocol dataﻫﻤﺮﺍﻫﻲ ﺷﺪﻩ ﺍﺳﺖ. •
ﺩﻳﺘﺎﮔﺮﺍﻡ .ﺩﻳﺘﺎﮔﺮﺍﻡ ،ﻭﺍﺣﺪ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺳﻄﺢ ﻻﻳﻪ IPﺍﺳﺖ .ﺩﻳﺘﺎﮔﺮﺍﻡ ﺷﺎﻣﻞ
•
ﻓﺮﻳﻢ .ﻓﺮﻳﻢ ،ﻭﺍﺣﺪ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺳﻄﺢ ﻻﻳﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺷﺒﮑﻪ ﺍﺳﺖ .ﻓﺮﻳﻢ ﺷﺎﻣﻞ
ﻳﮏ IP headerﺍﺳﺖ ﮐﻪ ﺗﻮﺳﻂ ﻻﻳﻪ ، transportﻫﻤﺮﺍﻫﻲ ﺷﺪﻩ ﺍﺳﺖ.
ﻳﮏ headerﺍﺳﺖ ﮐﻪ ﺩﺭ ﻻﻳﻪ networkﺑﻪ ﺁﻥ ﺍﺿﺎﻓﻪ ﺷﺪﻩ ﺍﺳﺖ ﮐﻪ ﺗﻮﺳﻂ ﺩﺍﺩﻩ ﻻﻳﻪ ، IPﻫﻤﺮﺍﻫﻲ ﺷﺪﻩ ﺍﺳﺖ.
ﺍﺟﺰﺍﺀ ﻳﮏ ﻓﺮﻳﻢ
ﻳﮏ ﻓﺮﻳﻢ )ﺍﺻﻄﻼﺣﻲ ﺑﺮﺍﻱ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﺳﻄﺢ ﻻﻳﻪ ﺷﺒﮑﻪ( ﺷﺎﻣﻞ ﺳﻪ ﺑﺨﺶ ﺍﺳﺎﺳﻲ data , header :ﻭ trailerﺍﺳﺖ. 197
. Headerﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ ﺑﺨﺶ ﺷﺎﻣﻞ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﻣﻲ ﺑﺎﺷﺪ: •
ﻳﮏ ﺳﻴﮕﻨﺎﻝ ﻫﺸﺪﺍﺭﺩﻫﻨﺪﻩ ﻣﺒﻨﻲ ﺑﺮ ﺍﺭﺳﺎﻝ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ
•
ﺁﺩﺭﺱ ﻣﺒﺪﺍﺀ
•
ﺁﺩﺭﺱ ﻣﻘﺼﺪ
. Dataﺩﺭ ﺍﻳﻦ ﺑﺨﺶ ،ﺍﻃﻼﻋﺎﺕ ﻭﺍﻗﻌﻲ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺗﻮﺳﻂ ﺑﺮﻧﺎﻣﻪ ،ﻗﺮﺍﺭ ﻣﻲ ﮔﻴـــﺮﺩ .ﺍﻳﻦ ﺑﺨﺶ ﺍﺯ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺍﺭﺍﻱ ﺍﻧﺪﺍﺯﻩ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺍﺳﺖ ) ﺑﺴﺘﮕﻲ ﺑﻪ ﻣﺤﺪﻭﺩﻳﺖ ﺍﻧﺪﺍﺯﻩ ﺗﻨﻈﻴﻢ ﺷﺪﻩ ﺗﻮﺳﻂ ﺷﺒﮑﻪ ﺩﺍﺭﺩ( .ﺑﺨﺶ ، Dataﺩﺭ ﺍﮐﺜﺮ ﺷﺒﮑﻪ ﻫﺎ ﺍﺯ ﻧﻴﻢ ﮐﻴﻠﻮ ﺑﺎﻳﺖ ﺗﺎ ﭼﻬﺎﺭ ﮐﻴﻠﻮ ﺑﺎﻳﺖ ﺭﺍ ﻣﻲ ﺗﻮﺍﻧﺪ ﺷﺎﻣﻞ ﺷﻮﺩ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ،ﺍﻧﺪﺍﺯﻩ ﺩﺍﺩﻩ ﺗﻘﺮﻳﺒﺎ" ﻣﻌﺎﺩﻝ ﻳﮏ ﻭ
ﻧﻴﻢ ﮐﻴﻠﻮ ﺑﺎﻳﺖ ﺍﺳﺖ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﺍﮐﺜﺮ ﺗﻨﻈﻴﻤﺎﺕ ﺩﺍﺩﻩ ﻫﺎﻱ ﺍﻭﻟﻴﻪ ،ﺑﻴﺶ ﺍﺯ ﭼﻬﺎﺭ ﮐﻴﻠﻮ ﺑﺎﻳﺖ ﻣﻲ ﺑﺎﺷﻨﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺍﺩﻩ ﺑﻪ ﺑﺨﺶ ﻫﺎﻱ ﮐﻮﭼﮑﺘﺮﻱ ﺑﺎ ﻧﺎﻡ " ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋــﺎﺗﻲ " ) ،( packetﺗﻘﺴﻴﻢ ﮔﺮﺩﺩ .ﺩﺭ ﺯﻣﺎﻥ ﺍﻧﺘﻘﺎﻝ ﻳﮏ ﻓﺎﻳﻞ ﺑﺎ ﻇﺮﻓﻴﺖ ﺑﺎﻻ ،ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺯﻳﺎﺩﻱ ﺩﺭ ﻃﻮﻝ ﺷﺒﮑﻪ ﻣﻨﺘﻘﻞ ﺧﻮﺍﻫﻨﺪ ﺷﺪ. . Trailerﻣﺤﺘﻮﻳﺎﺕ ، trailerﺍﺭﺗﺒﺎﻁ ﻣﺴﺘﻘﻴﻢ ﺑﻪ ﭘﺮﻭﺗﮑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﻻﻳﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺷﺒﮑﻪ ﺩﺍﺭﺩ ، trailer .ﻣﻌﻤﻮﻻ" ﺷﺎﻣﻞ ﺑﺨﺸﻲ ﺑﻤﻨﻈﻮﺭ ﺑﺮﺭﺳﻲ ﺧﻄﺎﺀ ﺑﻮﺩﻩ ﮐﻪ ،(Cyclical redundancy check(CRCﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ ،CRC.ﻋﺪﺩﻱ ﺍﺳﺖ ﮐﻪ
ﺗﻮﺳﻂ ﻳﮏ ﻣﺤﺎﺳﺒﻪ ﺭﻳﺎﺿﻲ ﺑﺮ ﺭﻭﻱ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺘﻲ ﺩﺭ ﻣﺒﺪﺍﺀ ) ﻓﺮﺳﺘﻨﺪﻩ( ،ﺗﻮﻟﻴﺪ ﻣﻲ ﮔﺮﺩﺩ. ﺯﻣﺎﻧﻴﮑﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﻣﻘﺼﺪ ﺧﻮﺩ ﻣﻲ ﺭﺳﺪ ،ﻣﺠﺪﺩﺍ" ﻣﺤﺎﺳﺒﻪ ﻣﺮﺑﻮﻃﻪ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ. ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﻧﺘﺎﻳﺞ ﺑﺪﺳﺖ ﺁﻣﺪﻩ ،ﻳﮑﺴﺎﻥ ﺑﺎﺷﺪ ،ﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﺻﺤﺖ ﺍﺭﺳﺎﻝ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﻣﺎﺣﺼﻞ ﻣﺤﺎﺳﺒﻪ ﺩﺭ ﻣﻘﺼﺪ ﺑﺎ ﻧﺘﻴﺠﻪ ﻣﺤﺎﺳﺒﻪ ﺷﺪﻩ ﺩﺭ ﻣﺒﺪﺍﺀ،
198
ﻣﻐﺎﻳﺮﺕ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ،ﺑﺪﻳﻦ ﻣﻔﻬﻮﻡ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ﮐﻪ ﺩﺍﺩﻩ ﺩﺭ ﺯﻣﺎﻥ ﺍﻧﺘﻘﺎﻝ ،ﺗﻐﻴﻴﺮ ﻧﻤﻮﺩﻩ ﺍﺳﺖ .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ،ﮐﺎﻣﭙﻴﻮﺗﺰ ﻣﺒﺪﺍﺀ ،ﻣﺠﺪﺩﺍ" ﺩﺍﺩﻩ ﺭﺍ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
ﺟﺮﻳﺎﻥ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ) ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍﺀ ﺗﺎ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ (
ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺍﺯ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﻳﮕﺮ ﺍﺯ ﺑﻴﻦ ﻻﻳﻪ ﻫﺎﻱ ﻣﺘﻌﺪﺩ
ﭘﺮﻭﺗﮑﻞ TCP/IPﻋﺒﻮﺭ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ .ﺑﻤﻮﺍﺯﺍﺕ ﺭﺳﻴﺪﻥ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﻳﮏ ﻻﻳﻪ، ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺁﻥ ،ﺍﻃﻼﻋﺎﺕ ﺧﺎﺻﻲ ﺭﺍ ﺑﻪ ﺁﻥ ﺍﺿﺎﻓﻪ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ .ﺍﻃﻼﻋﺎﺕ ﺍﺿﺎﻓﻪ ﺷﺪﻩ ) ﺿﻤﻴﻤﻪ ﺷﺪﻩ ( ﺗﻮﺳﻂ ﻫﺮ ﭘﺮﻭﺗﮑﻞ ،ﺷﺎﻣﻞ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺑﺮﺭﺳﻲ ﺧﻄﺎﺀ ﺑﻮﺩﻩ ﮐﻪ ،Checksumﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ .ﺍﺯ ،Checksumﺑﻤﻨﻈﻮﺭ ﺑﺮﺭﺳﻲ ﺻﺤﺖ ﺍﺭﺳﺎﻝ
ﺍﻃﻼﻋﺎﺕ ﺍﺿﺎﻓﻪ ﺷﺪﻩ ﺩﺭ headerﺗﻮﺳﻂ ﭘﺮﻭﺗﮑﻞ ﻣﺮﺑﻮﻃﻪ ،ﺩﺭ ﭘﺮﻭﺗﮑﻞ ﻣﻘﺼﺪ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﮔﺮﺩﺩ )ﺍﻃﻼﻋﺎﺕ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻲ ﮐﻢ ﻭ ﮐﺎﺳﺖ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﭘﺮﻭﺗﮑﻞ ﻣﻘﺼﺪ ﻗﺮﺍﺭ ﺑﮕﻴﺮﻧﺪ( .ﻓﺮﺍﻣﻮﺵ ﻧﮑﻨﻴﻢ ﮐﻪ ،CRCﺻﺤﺖ ﺍﻧﺘﻘﺎﻝ ﻳﮏ ﺑﺴﺘﻪ ﺭﺍ ﺑﻄﻮﺭ ﮐﺎﻣﻞ ﺑﺮﺭﺳﻲ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﺍﻃﻼﻋﺎﺕ ﺍﺿﺎﻓﻪ ﺷﺪﻩ ﺗﻮﺳﻂ ﭘﺮﻭﺗﮑﻞ ﻫﺎ ﺩﺭ ﻫﺮ ﻻﻳﻪ ،ﺑﻌﻨﻮﺍﻥ ﺩﺍﺩﻩ ﺗﻮﺳﻂ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻻﻳﻪ
ﺯﻳﺮﻳﻦ )ﭘﺎﻳﻴﻦ( ،ﮐﭙﺴﻮﻟﻪ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈﺮ ﻣﻲ ﺭﺳﺪ، ﻻﻳﻪ ﻣﺮﺑﻮﻃﻪ ) ﻣﻨﺘﺎﻇﺮ ( ﻳﮏ ﺑﺨﺶ ﺍﺯ headerﺭﺍ ﺑﺮﺩﺍﺷﺘﻪ ﻭ ﺑﺎ ﺑﺎﻗﻲ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻌﻨﻮﺍﻥ
ﺩﺍﺩﻩ ﺑﺮﺧﻮﺭﺩ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺴﻤﺖ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻻﻳﻪ
ﺑﺎﻻﺗﺮ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﺍﺧﺘﻴﺎﺭ ﭘﺮﻭﺗﮑﻞ ﻣﺮﺑﻮﻃﻪ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﮔﺮﻓﺖ .ﺩﺭ ﺍﺩﺍﻣﻪ ﻋﻤﻠﮑﺮﺩ ﻫﺮ ﻳﮏ ﺍﺯ ﻻﻳﻪ ﻫﺎ ﺭﺍ ﺩﺭ ﻓﺮﺁﻳﻨﺪ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺭﺳﻲ ﻭ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺭﺍ ﺍﺯ ﺯﺍﻭﻳﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍﺀ ﻭ ﻣﻘﺼﺪ ﺩﻧﺒﺎﻝ ﺧﻮﺍﻫﻴﻢ ﻧﻤﻮﺩ.
199
ﻻﻳﻪ Application
ﻓﺮﺁﻳﻨﺪ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﻻﻳﻪ applicationﺁﻏﺎﺯ ﻣﻲ ﮔﺮﺩﺩ .ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﻧﻈﻴﺮ ،FTP ﭘﺮﺩﺍﺯﺵ ﺭﺍ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍﺀ ﻣﻘﺪﺍﺭ ﺩﻫﻲ ﺍﻭﻟﻴﻪ ﻣﻲ ﻧﻤﺎﻳﺪ )ﺁﻣﺎﺩﻩ ﻧﻤﻮﺩﻥ ﺩﺍﺩﻩ ﺑﻪ ﻓﺮﻣﺘﻲ ﮐﻪ ﺑﺮﻧﺎﻣﻪ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ،ﻗﺎﺩﺭ ﺑﻪ ﺗﺸﺨﻴﺺ ﺁﻥ ﺑﺎﺷﺪ( .ﺑﺮﻧﺎﻣﻪ ﻣﻮﺟﻮﺩ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍﺀ،
ﮐﻨﺘﺮﻝ ﺗﻤﺎﻣﻲ ﻓﺮﺁﻳﻨﺪ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ. ﻻﻳﻪ Transport
ﺍﺯ ﻻﻳﻪ ، Applicationﺩﺍﺩﻩ ﺑﻪ ﻻﻳﻪ transportﻣﻨﺘﻘﻞ ﻣﻲ ﮔﺮﺩﺩ .ﺍﻳﻦ ﻻﻳﻪ ﺷﺎﻣﻞ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ TCPﻭ UDPﺍﺳﺖ .ﺑﺮﻧﺎﻣﻪ ﻣﻮﺭﺩ ﻧﻈﺮ ﻧﻮﻉ ﭘﺮﻭﺗﮑﻞ "ﺣﻤﻞ" ﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ
) TCPﻳﺎ .( UDPﺩﺭ ﻫﺮ ﺩﻭ ﺣﺎﻟﺖ Checksumﺑﺮﺍﻱ TCPﻭ UDPﺍﺿﺎﻓﻪ ﺧﻮﺍﻫﺪ ﺷﺪ. ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﭘﺮﻭﺗﮑﻞ ، TCPﺍﻧﺘﺨﺎﺏ ﮔﺮﺩﺩ: •
ﻳﮏ ﺩﻧﺒﺎﻟﻪ ﻋﺪﺩﻱ ) ( number Sequenceﺑﻪ ﻫﺮ ﺳﮕﻤﻨﺖ ﻣﻨﺘﻘﻞ ﺷﺪﻩ ،ﺍﺿﺎﻓﻪ
ﺧﻮﺍﻫﺪ ﺷﺪ. •
ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ Acknowledgmentﺑﺮﺍﻱ ﻳﮏ ﺍﺭﺗﺒﺎﻁ " ﺍﺗﺼﺎﻝ -ﮔﺮﺍ" ،ﺑﻪ ﻫﺮ ﺳﮕﻤﻨﺖ ﺍﺿﺎﻓﻪ ﻣﻲ ﺷﻮﺩ.
•
ﺷﻤﺎﺭﻩ ﭘﻮﺭﺕ TCPﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺒﺪﺍﺀ ﻭ ﻣﻘﺼﺪ ،ﺍﺿﺎﻓﻪ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﭘﺮﻭﺗﮑﻞ ، UDPﺍﻧﺘﺨﺎﺏ ﮔﺮﺩﺩ: •
ﺷﻤﺎﺭﻩ ﭘﻮﺭﺕ UDPﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺒﺪﺍﺀ ﻭ ﻣﻘﺼﺪ ،ﺍﺿﺎﻓﻪ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﻻﻳﻪ ﺍﻳﻨﺘﺮﻧﺖ
ﭘﺲ ﺍﺯ ﺍﻳﻨﮑﻪ ﺍﻃﻼﻋﺎﺕ "ﺣﻤﻞ " ﺍﺿﺎﻓﻪ ﮔﺮﺩﻳﺪ ،ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻻﻳﻪ "ﺍﻳﻨﺘﺮﻧﺖ " ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺩﺭ ﺍﻳﻦ ﻻﻳﻪ ،ﺍﻃﻼﻋﺎﺕ ﺯﻳﺮ ﺑﻪ headerﺍﺿﺎﻓﻪ ﻣﻲ ﮔﺮﺩﺩ: •
ﺁﺩﺭﺱ IPﻣﺒﺪﺍﺀ
•
ﺁﺩﺭﺱ IPﻣﻘﺼﺪ
•
ﻧﻮﻉ ﭘﺮﻭﺗﮑﻞ "ﺣﻤﻞ " 200
• •
ﻣﻘﺪﺍﺭ checksum
ﺍﻃﻼﻋﺎﺕ (Time to Live)TTL
ﻋﻼﻭﻩ ﺑﺮ ﺍﻃﻼﻋﺎﺕ ﻓﻮﻕ ،ﻻﻳﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺴﺌﻮﻟﻴﺖ ﺑﺮ ﻃﺮﻑ ﻧﻤﻮﺩﻥ ﺁﺩﺭﺱ ﻫﺎﻱ IPﻣﻘﺼﺪ ﺑﻪ ﻳﮏ ﺁﺩﺭﺱ MACﺭﺍ ﻧﻴﺰ ﺑﺮ ﻋﻬﺪﻩ ﺩﺍﺭﺩ .ﭘﺮﻭﺗﮑﻞ ، ARPﻣﺴﺌﻮﻝ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ، ﺍﺳﺖ .ﺁﺩﺭﺱ MACﺑﻪ headerﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺿﺎﻓﻪ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻻﻳﻪ " ﺍﻳﻨﺘﺮﻓﻴﺲ ﺷﺒﮑﻪ " ،ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ. ﻻﻳﻪ "ﺍﻳﻨﺘﺮﻓﻴﺲ ﺷﺒﮑﻪ "
ﻻﻳﻪ ﻓﻮﻕ ،ﭘﺲ ﺍﺯ ﺩﺭﻳﺎﻓﺖ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﻻﻳﻪ ، IPﺍﻃﻼﻋﺎﺕ ﺯﻳﺮ ﺭﺍ ﺑﻪ ﺁﻥ ﺍﺿﺎﻓﻪ ﺧﻮﺍﻫﺪ ﮐﺮﺩ: •
ﻳﮏ ) Preambleﻣﻘﺪﻣﻪ ( .ﺩﻧﺒﺎﻟﻪ ﺍﻱ ﺍﺯ ﺑﺎﻳﺖ ﻫﺎ ﺍﺳﺖ ﮐﻪ ﺍﺑﺘﺪﺍﻱ ﻳﮏ "ﻓﺮﻳﻢ " ﺭﺍ
ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ . •
ﻳﮏ . CRCﻣﺎﺣﺼﻞ ﻳﮏ ﻣﺤﺎﺳﺒﻪ ﺭﻳﺎﺿﻲ ﺍﺳﺖ ﮐﻪ ﺑﻪ ﺍﻧﺘﻬﺎﻱ ﻓﺮﻳﻢ ﺍﺿﺎﻓﻪ ﻭ ﺍﺯ ﺁﻥ ﺑﻤﻨﻈﻮﺭ ﺻﺤﺖ ﺍﺭﺳﺎﻝ ﻓﺮﻳﻢ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
ﭘﺲ ﺍﺯﺍﻓﺰﻭﺩﻥ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﻓﺮﻳﻢ ﻫﺎ ﺩﺭ ﻻﻳﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺷﺒﮑﻪ ،ﺩﺭ ﺍﺩﺍﻣﻪ ﻓﺮﻳﻢ ﻫﺎ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﻨﺪ ﺷﺪ.
ﻋﻤﻠﻴﺎﺕ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ
ﺯﻣﺎﻧﻴﮑﻪ ﻓﺮﻳﻢ ﻫﺎ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﻣﻲ ﺭﺳﻨﺪ ،ﻻﻳﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺷﺒﮑﻪ Preamble ،ﺭﺍ ﺣﺬﻑ ﻭ ﻣﻘﺪﺍﺭ CRCﺭﺍ ﻣﺠﺪﺩﺍ" ﻣﺤﺎﺳﺒﻪ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﻣﻘﺪﺍﺭ ﺑﺪﺳﺖ ﺁﻣﺪﻩ ﺑﺎ ﻣﻘﺪﺍﺭ
ﻣﺤﺎﺳﺒﻪ ﺷﺪﻩ ﺩﺭ ﻣﺒﺪﺍﺀ ،ﻳﮑﺴﺎﻥ ﺑﺎﺷﺪ ﺩﺭ ﺍﺩﺍﻣﻪ ﺁﺩﺭﺱ MACﻣﻘﺼﺪ ،ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﻓﺮﻳﻢ،
ﺑﺮﺭﺳﻲ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺁﺩﺭﺱ ، MACﻳﮏ ﺁﺩﺭﺱ Broadcastﻭ ﻳﺎ ﺁﺩﺭﺱ MACﺑﺎ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﻣﻄﺎﺑﻘﺖ ﻧﻤﺎﻳﺪ ،ﻓﺮﻳﻢ ﺑﻪ ﻻﻳﻪ "ﺍﻳﻨﺘﺮﻧﺖ " ،ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺩﺭ
ﻏﻴﺮ ﺍﻳﻨﺼﻮﺭﺕ ﻓﺮﻳﻢ ﻧﺎﺩﻳﺪﻩ ﮔﺮﻓﺘﻪ ﻣﻲ ﺷﻮﺩ .ﺩﺭ ﻻﻳﻪ ،IPﻣﺠﺪﺩﺍ" Checksumﻣﺤﺎﺳﺒﻪ ﻭ
ﺑﺎ ﻣﻘﺪﺍﺭ ﻣﺤﺎﺳﺒﻪ ﺷﺪﻩ ﻗﺒﻞ ﺍﺯ ﺍﻧﺘﻘﺎﻝ ،ﻣﻘﺎﻳﺴﻪ ﺗﺎ ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﮔﺮﺩﺩ ﮐﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﻃﻮﻝ ﻣﺴﻴﺮ ﺗﻐﻴﻴﺮ ﻧﻨﻤﻮﺩﻩ ﺍﺳﺖ .ﺩﺭ ﺍﺩﺍﻣﻪ IP،ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﭘﺮﻭﺗﮑﻞ"ﺣﻤﻞ" ، 201
ﻗﺮﺍﺭ ﻣﻲ ﺩﻫﺪ ) TCPﻳﺎ .( UDPﺑﻤﻨﻈﻮﺭ ﺗﺼﻤﻴﻢ ﮔﻴﺮﻱ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻧﻮﻉ ﭘﺮﻭﺗﮑﻞ "ﺣﻤﻞ " ،ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ header IPﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﻻﻳﻪ "ﺣﻤﻞ" ،ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ
ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ TCPﺩﺭﻳﺎﻓﺖ ﺷﺪﻩ ﺑﺎﺷﺪ ،ﺩﻧﺒﺎﻟﻪ ﻋﺪﺩﻱ ) ( sequence numberﺑﺮ ﺭﻭﻱ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺭﺳﻲ ﻭ ﻳﮏ acknowledgementﺑﺮﺍﻱ TCPﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍﺀ ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﭘﻮﺭﺕ TCPﻣﻮﺟﻮﺩ ﺩﺭ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺗﺎ
ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺍﻱ ﺑﺮﻧﺎﻣﻪ ﻣﺮﺑﻮﻃﻪ ﺩﺭ ﻻﻳﻪ ، Applicationﺍﺭﺳﺎﻝ ﮔﺮﺩﺩ. ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ UDPﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺍﺯ ﻻﻳﻪ "ﺍﻳﻨﺘﺮﻧﺖ" ﺩﺭﻳﺎﻓﺖ ﻧﻤﺎﻳﺪ ،ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﭘﻮﺭﺕ
UDPﻣﻮﺟﻮﺩ ﺩﺭ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺗﺎ ﺁﻥ ﺭﺍ ﺑﺮﺍﻱ ﺑﺮﻧﺎﻣﻪ ﻣﺮﺑﻮﻃﻪ ﺩﺭ ﻻﻳﻪ
Applicationﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﺪ ) .ﺑﺪﻭﻥ ﺍﺭﺳﺎﻝ ﻳﮏ acknowledgementﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍﺀ(.
ﭘﺲ ﺍﺯ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﺗﻮﺳﻂ ، Appliactionﭘﺮﺩﺍﺯﺵ ﻫﺎﻱ ﻻﺯﻡ ﻭ ﺿﺮﻭﺭﻱ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺁﻧﻬﺎ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ.
202
DNS DNSﻣﺴﺌﻮﻟﻴﺖ ﺣﻞ ﻣﺸﮑﻞ ﺍﺳﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ) ﺗﺮﺟﻤﻪ ﻧﺎﻡ ﺑﻪ ﺁﺩﺭﺱ ( ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﻭ ﻣﺴﺎﺋﻞ ﻣﺮﺗﺒﻂ ﺑﺎ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ Winsockﺭﺍ ﺑﺮ ﻋﻬﺪﻩ ﺩﺍﺭﺩ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺷﻨﺎﺧﺖ ﺑﺮﺧﻲ ﺍﺯ ﻣﻔﺎﻫﻴﻢ ﮐﻠﻴﺪﻱ ﻭ ﺍﺳﺎﺳﻲ ، DNSﻻﺯﻡ ﺍﺳﺖ ﮐﻪ ﺳﻴﺴﺘﻢ ﻓﻮﻕ ﺭﺍ ﺑﺎ ﺳﻴﺴﺘﻢ ﺩﻳﮕﺮ ﻧﺎﻣﮕﺬﺍﺭﻱ
ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺎﻳﮑﺮﻭﺳﺎﻓﺖ) ( NetBIOSﻣﻘﺎﻳﺴﻪ ﻧﻤﺎﺋﻴﻢ.
ﻗﺒﻞ ﺍﺯ ﻋﺮﺿﻪ ﻭﻳﻨﺪﻭﺯ ٢٠٠٠ﺗﻤﺎﻣﻲ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺎﻳﮑﺮﻭﺳﺎﻓﺖ ﺍﺯ ﻣﺪﻝ NetBIOSﺑﺮﺍﻱ ﻧﺎﻣﮕﺬﺍﺭﻱ ﻣﺎﺷﻴﻦ ﻫﺎ ﻭ ﺳﺮﻭﻳﺲ ﻫﺎ ﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮐﺮﺩﻧﺪ. NetBIOSﺩﺭ ﺳﺎﻝ ١٩٨٣ﺑﻪ ﺳﻔﺎﺭﺵ ﺷﺮﮐﺖ IBMﻃﺮﺍﺣﻲ ﮔﺮﺩﻳﺪ .ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺩﺭ
ﺍﺑﺘﺪﺍ ﺑﻌﻨﻮﺍﻥ ﭘﺮﻭﺗﮑﻠﻲ ﺩﺭ ﺳﻄﺢ ﻻﻳﻪ " ﺣﻤﻞ " ﺍﻳﻔﺎﻱ ﻭﻇﻴﻔﻪ ﻣﻲ ﮐﺮﺩ.ﺩﺭ ﺍﺩﺍﻣﻪ ﻣﺠﻤﻮﻋﻪ ﺩﺳﺘﻮﺭﺍﺕ NetBIOSﺑﻌﻨﻮﺍﻥ ﻳﮏ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻣﺮﺑﻮﻁ ﺑﻪ ﻻﻳﻪ Sessionﻧﻴﺰ ﻣﻄﺮﺡ ﺗﺎ ﺍﺯ ﺍﻳﻦ ﻃﺮﻳﻖ ﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﺎﻳﺮ ﭘﺮﻭﺗﮑﻞ ﻫﺎ ﻧﻴﺰ ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ NetBEUI .ﻣﻬﻤﺘﺮﻳﻦ ﻭ ﺭﺍﻳﺞ
ﺗﺮﻳﻦ ﻧﺴﺨﻪ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺷﺪﻩ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺍﺳﺖ NetBIOS .ﺑﺮﺍﻱ ﺷﻴﮑﻪ ﻫﺎﻱ ﮐﻮﭼﮏ
ﻣﺤﻠﻲ ﺑﺎ ﻳﮏ ﺳﮕﻤﻨﺖ ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺑﺼﻮﺭﺕ Broadcast Base ﺍﺳﺖ .ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ NetBIOSﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺳﺎﻳﺮ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻣﻬﺎﻱ Broadcastﺑﻪ ﻣﻨﻈﻮﺭ ﺷﻨﺎﺧﺖ ﻭ ﺁﮔﺎﻫﻲ ﺍﺯ ﺁﺩﺭﺱ
ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻘﺼﺪ ﭘﻴﺪﺍ ﻧﻤﺎﻳﻨﺪ .ﺷﮑﻞ ﺯﻳﺮ ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﻭ ﺁﮔﺎﻫﻲ ﺍﺯ ﺁﺩﺭﺱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ .ﮐﺎﻣﭙﻴﻮﺗﺮ
ds2000ﻗﺼﺪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺑﺎ ﻧﺎﻡ Exeterﺭﺍ ﺩﺍﺭﺩ .ﻳﮏ ﭘﻴﺎﻡ
Broadcastﺑﺮﺍﻱ ﺗﻤﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺳﮕﻤﻨﺖ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺗﻤﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺳﮕﻤﻨﺖ ﻣﮑﻠﻒ ﺑﻪ ﺑﺮﺭﺳﻲ ﭘﻴﺎﻡ ﻣﻲ ﺑﺎﺷﻨﺪ .ﮐﺎﻣﭙﻴﻮﺗﺮ Exeterﭘﺲ ﺍﺯ ﺩﺭﻳﺎﻓﺖ ﭘﻴﺎﻡ ،ﺁﺩﺭﺱ MACﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ds2000ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ.
203
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﺍﺷﺎﺭﻩ ﮔﺮﺩﻳﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺑﺮﺍﻱ ﺑﺮﻃﺮﻑ ﻣﺸﮑﻞ ﺍﺳﺎﻣﻲ )ﺗﺮﺟﻤﻪ ﻧﺎﻡ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺁﺩﺭﺱ ﻓﻴﺰﻳﮑﻲ ﻭ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ( ﺻﺮﻓﺎ" ﺑﺮﺍﻱ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺤﻠﻲ ﺑﺎ ﺍﺑﻌﺎﺩ ﮐﻮﭼﮏ ﺗﻮﺻﻴﻪ ﺷﺪﻩ ﻭ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺰﺭﮒ ﻧﻈﻴﺮ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﺑﺎ ﻣﺎﻫﻴﺖ
Broadcast Basedﺑﺎ ﻣﺸﮑﻼﺕ ﻋﺪﻳﺪﻩ ﺍﻱ ﻣﻮﺍﺟﻪ ﺧﻮﺍﻫﻴﻢ ﺷﺪ.ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺑﺮﺧﻲ ﺍﺯ ﺍﻳﻦ ﻣﺸﮑﻼﺕ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﺍﺳﺖ. •
ﺑﻤﻮﺍﺯﺍﺕ ﺍﻓﺰﺍﻳﺶ ﺗﻌﺪﺍﺩ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺗﺮﺍﻓﻴﮏ ﺍﻧﺘﺸﺎﺭ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺸﺪﺕ ﺍﻓﺰﺍﻳﺶ ﺧﻮﺍﻫﺪ ﻳﺎﻓﺖ.
•
ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ) NetBIOSﻧﻈﻴﺮ (NetBEUIﺩﺍﺭﺍﻱ ﻣﮑﺎﻧﻴﺰﻣﻬﺎﻱ ﻻﺯﻡ ﺑﺮﺍﻱ ﺭﻭﺗﻴﻨﮓ ﻧﺒﻮﺩﻩ ﻭ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺭﻭﺗﻴﻨﮓ ﺩﺭ ﻣﺸﺨﺼﻪ ﻓﺮﻳﻢ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ NetBIOSﺗﻌﺮﻳﻒ ﻧﺸﺪﻩ ﺍﺳﺖ.
•
ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﻣﮑﺎﻧﻲ ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ ﮐﻪ ﻗﺎﺑﻠﻴﺖ ﺭﻭﺗﻴﻨﮓ ﺑﻪ ﭘﻴﺎﻣﻬﺎﻱ NetBIOS ﺩﺍﺩﻩ ﺷﻮﺩ ) ﻧﻈﻴﺮ Overlayﻧﻤﻮﺩﻥ NetBIOSﺑﺮ ﺭﻭﻱ ﭘﺮﻭﺗﮑﻞ ﺩﻳﮕﺮ ﺑﺎ ﻗﺎﺑﻠﻴﺖ
ﺭﻭﺗﻴﻨﮓ ،ﺭﻭﺗﺮﻫﺎ ﺑﺼﻮﺭﺕ ﭘﻴﺶ ﻓﺮﺽ ﺑﺴﺘﻪ ﻫﺎﻱ NetBIOSﺭﺍ ﻣﻨﺘﺸﺮ ﻧﺨﻮﺍﻫﻨﺪ ﮐﺮﺩ .ﻣﺎﻫﻴﺖ BroadCastﺑﻮﺩﻥ ﭘﺮﻭﺗﮑﻞ NetBIOSﻳﮑﻲ ﺍﺯ ﺩﻭ ﻓﺎﮐﺘﻮﺭ ﻣﻬﻢ ﺩﺭ
ﺭﺍﺑﻄﻪ ﺑﺎ ﻣﺤﺪﻭﺩﻳﺖ ﻫﺎﻱ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺧﺼﻮﺻﺎ" ﺩﺭﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺰﺭﮒ ﺍﺳﺖ .ﻓﺎﮐﺘﻮﺭ ﺩﻭﻡ ،ﺳﺎﺧﺘﺎﺭ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺑﺮﺍﻱ ﻧﺤﻮﻩ ﻧﺎﻣﮕﺬﺍﺭﻱ ﺍﺳﺖ .ﺳﺎﺧﺘﺎﺭ ﻧﺎﻣﮕﺬﺍﺭﻱ ﺩﺭ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺑﺼﻮﺭﺕ ﻣﺴﻄﺢ ) (Flatﺍﺳﺖ.
204
Flat NetBios NameSpace ﺑﻪ ﻣﻨﻈﻮﺭ ﺷﻨﺎﺧﺖ ﻭ ﺩﺭﮎ ﻣﻠﻤﻮﺱ ﻣﺸﮑﻞ ﻧﺎﻣﮕﺬﺍﺭﻱ ﻣﺴﻄﺢ ﺩﺭ NetBIOSﻻﺯﻡ
ﺍﺳﺖ ﮐﻪ ﺩﺭ ﺍﺑﺘﺪﺍ ﻣﺜﺎﻝ ﻫﺎﺋﻲ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺫﮐﺮ ﮔﺮﺩﺩ .ﻓﺮﺽ ﮐﻨﻴﺪ ﻫﺮ ﺷﺨﺺ ﺩﺭ ﺩﻧﻴﺎ ﺩﺍﺭﺍﻱ ﻳﮏ ﻧﺎﻡ ﺑﻮﺩﻩ ﻭ ﺻﺮﻓﺎ" ﺍﺯ ﻃﺮﻳﻖ ﻫﻤﺎﻥ ﻧﺎﻡ ﺷﻨﺎﺧﺘﻪ ﮔﺮﺩﺩ .ﺩﺭ ﭼﻨﻴﻦ ﻭﺿﻌﻴﺘﻲ ﺍﺩﺍﺭﻩ ﺭﺍﻫﻨﻤﺎﺋﻲ ﻭ ﺭﺍﻧﻨﺪﮔﻲ ﺍﻗﺪﺍﻡ ﺑﻪ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻴﻨﻤﺎﻣﻪ ﺭﺍﻧﻨﺪﮔﻲ ﻣﻲ ﻧﻤﺎﻳﺪ .ﻫﺮ ﺭﺍﻧﻨﺪﻩ ﺩﺍﺭﺍﻱ ﻳﮏ ﺷﻤﺎﺭﻩ
ﺳﺮﻳﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﺯ ﺍﺩﺍﺭﻩ ﻓﻮﻕ ﺳﻮﺍﻻﺗﻲ ﻧﻈﻴﺮ ﺳﻮﺍﻻﺕ ﺫﻳﻞ ﻣﻄﺮﺡ ﮔﺮﺩﺩ
ﻗﻄﻌﺎ" ﭘﺎﺳﺨﮕﻮﺋﻲ ﺑﻪ ﺁﻧﻬﺎ ﺑﺴﺎﺩﮔﻲ ﻣﻴﺴﺮ ﻧﺨﻮﺍﻫﺪ ﺷﺪ. • •
ﭼﻨﺪ ﻧﻔﺮ ﺑﺎ ﻧﺎﻡ ﺍﺣﻤﺪ ﺩﺍﺭﺍﻱ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻫﺴﺘﻨﺪ؟
ﭼﻨﺪ ﻧﻔﺮ ﺑﺎ ﻧﺎﻡ ﺭﺿﺎ ﺩﺍﺭﺍﻱ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻫﺴﺘﻨﺪ؟
ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﻲ ﺍﮔﺮ ﺍﻓﺴﺮ ﺍﺩﺍﺭﻩ ﺭﺍﻫﻨﻤﺎﺋﻲ ﻭ ﺭﺍﻧﻨﺪﮔﻲ ﺭﺍﻧﻨﺪﻩ ﺍﻱ ﺭﺍ ﺑﺨﺎﻃﺮ ﺗﺨﻠﻒ ﻣﺘﻮﻗﻒ ﻧﻤﻮﺩﻩ ﻭ ﺍﺯ ﻣﺮﮐﺰ ﻭ ﺑﺮ ﺍﺳﺎﺱ ﻧﺎﻡ ﻭﻱ ﺍﺳﺘﻌﻼﻡ ﻧﻤﺎﻳﺪ ﮐﻪ ﺁﻳﺎ " ﺭﺍﻧﻨﺪﻩ ﺍﻱ ﺑﺎ ﻧﺎﻡ ﺍﺣﻤﺪ ﻗﺒﻼ" ﻧﻴﺰ ﻣﺮﺗﮑﺐ ﺗﺨﻠﻒ ﺷﺪﻩ ﺍﺳﺖ ﻳﺎ ﺧﻴﺮ ؟" ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﺯ ﻃﺮﻑ ﻣﺮﮐﺰ ﺑﻪ ﻭﻱ ﭘﺎﺳﺦ ﻣﺜﺒﺖ ﺩﺍﺩﻩ ﺷﻮﺩ ﺍﻓﺴﺮ ﻣﺮﺑﻮﻃﻪ ﻫﻴﭽﮕﻮﻧﻪ ﺍﻃﻤﻴﻨﺎﻧﻲ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ ﮐﻪ ﺭﺍﻧﻨﺪﻩ ﺩﺭ ﻣﻘﺎﺑﻞ ﺁﻥ ﻫﻤﺎﻥ ﺍﺣﻤﺪ
ﻣﺘﺨﻠﻒ ﺍﺳﺖ ﮐﻪ ﻗﺒﻼ" ﻧﻴﺰ ﺗﺨﻠﻒ ﺩﺍﺷﺘﻪ ﺍﺳﺖ. ﻳﮑﻲ ﺍﺯ ﺭﻭﺵ ﻫﺎﻱ ﺣﻞ ﻣﺸﮑﻞ ﻓﻮﻕ ،ﺍﻳﺠﺎﺩ ﺳﻴﺴﺘﻤﻲ ﺍﺳﺖ ﮐﻪ ﻣﺴﺌﻮﻟﻴﺖ ﺁﻥ ﺍﺭﺍﺋﻪ ﻧﺎﻡ
ﺑﺼﻮﺭﺕ ﺍﻧﺤﺼﺎﺭﻱ ﻭ ﻏﻴﺮﺗﮑﺮﺍﺭﻱ ﺑﺮﺍﻱ ﺗﻤﺎﻣﻲ ﺍﻓﺮﺍﺩ ﺩﺭ ﺳﻄﺢ ﺩﻧﻴﺎ ﺑﺎﺷﺪ .ﺩﺭ ﭼﻨﻴﻦ ﻭﺿﻌﻴﺘﻲ ﺍﻓﺴﺮ ﺍﺩﺍﺭﻩ ﺭﺍﻫﻨﻤﺎﺋﻲ ﻭ ﺭﺍﻧﻨﺪﮔﻲ ﺩﺭ ﺑﺮﺧﻮﺭﺩ ﺑﺎ ﺍﻓﺮﺍﺩ ﻣﺘﺨﻠﻒ ﺩﭼﺎﺭ ﻣﺸﮑﻞ ﻧﺸﺪﻩ ﻭ ﻫﻤﻮﺍﺭﻩ ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ ﮐﻪ ﺍﺳﺎﻣﻲ ﺑﺼﻮﺭﺕ ﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺍﺳﺖ .ﺩﺭ ﭼﻨﻴﻦ ﺳﻴﺴﺘﻤﻲ ﭼﻪ ﺍﻓﺮﺍﺩ ﻭ ﻳﺎ ﺳﺎﺯﻣﺎﻧﻬﺎﺋﻲ ﻣﺴﺌﻠﻪ ﻋﺪﻡ ﺗﮑﺮﺍﺭ ﺍﺳﺎﻣﻲ ﺭﺍ ﮐﻨﺘﺮﻝ ﻭ ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ ﺭﺍ ﺑﻮﺟﻮﺩ ﺧﻮﺍﻫﻨﺪ ﺁﻭﺭﻧﺪ ﮐﻪ ﺍﺳﺎﻣﻲ ﺑﺼﻮﺭﺕ ﺗﮑﺮﺍﺭﻱ ﺩﺭ ﺳﻄﺢ ﺩﻧﻴﺎ ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ؟.
ﺑﻬﺮﺣﺎﻝ ﺳﺎﺧﺘﺎﺭ ﺳﻴﺴﺘﻢ ﻧﺎﻣﮕﺬﺍﺭﻱ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﮕﻮﻧﻪ ﺍﻱ ﺑﺎﺷﺪ ﮐﻪ ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ ﺭﺍ ﺑﻮﺟﻮﺩ
ﺁﻭﺭﺩ ﮐﻪ ﻧﺎﻡ ﺍﻧﺘﺨﺎﺏ ﺷﺪﻩ ﻗﺒﻼ" ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﻳﮕﺮﻱ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﻧﺸﺪﻩ ﺍﺳﺖ .ﺩﺭ ﻋﻤﻞ ﭘﻴﺎﺩﻩ
205
ﺳﺎﺯﻱ ﺍﻳﻨﭽﻨﻴﻦ ﺳﻴﺴﺘﻢ ﻫﺎﺋﻲ ﻏﻴﺮ ﻣﻤﮑﻦ ﺍﺳﺖ.ﻣﺜﺎﻝ ﻓﻮﻕ ﻣﺤﺪﻭﺩﻳﺖ ﻧﺎﻣﮕﺬﺍﺭﻱ ﺑﺼﻮﺭﺕ
ﻣﺴﻄﺢ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ.
ﺳﻴﺴﺘﻢ ﻧﺎﻣﮕﺬﺍﺭﻱ ﺑﺮ ﺍﺳﺎﺱ NetBIOSﺑﺼﻮﺭﺕ ﻣﺴﻄﺢ ﺑﻮﺩﻩ ﻭ ﺍﻳﻦ ﺑﺪﺍﻥ ﻣﻌﻨﻲ ﺍﺳﺖ ﮐﻪ ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺍﺭﺍﻱ ﻳﮏ ﻧﺎﻡ ﻣﺘﻤﺎﻳﺰ ﺍﺯ ﺩﻳﮕﺮﺍﻥ ﺑﺎﺷﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ NetBIOSﺩﺍﺭﺍﻱ ﺍﺳﺎﻣﻲ ﻳﮑﺴﺎﻧﻲ
ﺑﺎﺷﻨﺪ ﭘﻴﺎﻣﻬﺎﻱ ﺍﺭﺳﺎﻟﻲ ﺍﺯ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﻳﮕﺮ ﮐﻪ ﺩﺍﺭﺍﻱ ﭼﻨﺪﻳﻦ ﻧﻤﻮﻧﻪ )ﻧﺎﻡ ﺗﮑﺮﺍﺭﻱ( ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺖ ،ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﺎﻋﺚ ﺑﺮﻭﺯ ﻣﺸﮑﻼﺕ ﺩﺭ ﺷﺒﮑﻪ ﻭ ﻋﺪﻡ ﺭﺳﻴﺪﻥ ﭘﻴﺎﻡ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺑﻪ ﻣﻘﺼﺪ ﺩﺭﺳﺖ ﺧﻮﺩ ﺑﺎﺷﺪ.
ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ NetBIOSﻭ WinSock DNSﻣﺴﺎﺋﻞ ﻓﻮﻕ ﺭﺍ ﺑﺴﺎﺩﮔﻲ ﺑﺮﻃﺮﻑ ﻧﻤﻮﺩﻩ ﺍﺳﺖ .ﺳﻴﺴﺘﻢ ﻓﻮﻕ ﺍﺯ ﻳﮏ ﻣﺪﻝ ﺳﻠﺴﻠﻪ ﻣﺮﺍﺗﺒﻲ ﺑﺮﺍﻱ ﻧﺎﻣﮕﺬﺍﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩﻩ ﺍﺳﺖ .ﻗﺒﻞ ﺍﺯ ﭘﺮﺩﺍﺧﺘﻦ ﺑﻪ ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ ﻭ ﺟﺰﺋﻴﺎﺕ ﺳﻴﺴﺘﻢ DNSﻻﺯﻡ ﺍﺳﺖ ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﺎ ﻧﺤﻮﻩ ﺩﺳﺘﻴﺎﺑﻲ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﺑﻪ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ
ﺷﺒﮑﻪ ﻭ ﺧﺼﻮﺻﺎ" ﻧﺤﻮﻩ ﺍﺭﺗﺒﺎﻁ ﺁﻧﻬﺎ ﺑﺎ ﭘﺮﻭﺗﮑﻞ TCP/IPﺁﺷﻨﺎ ﺷﻮﻳﻢ. ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺑﺎ ﻗﺎﺑﻠﻴﺖ ﺍﺟﺮﺍﺀ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﻫﺎﺋﻲ ﺑﺎ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻋﺎﻣﻞ ﻣﺎﻳﮑﺮﻭﺳﺎﻓﺖ ،ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﻭ ﺭﻭﺵ ﻣﺘﻔﺎﻭﺕ ﺑﺎ ﭘﺮﻭﺗﮑﻞ TCP/IPﻣﺮﺗﺒﻂ ﻣﻲ ﮔﺮﺩﻧﻨﺪ. • •
ﺍﻳﻨﺘﺮﻓﻴﺲ ﺳﻮﮐﺖ ﻫﺎﻱ ﻭﻳﻨﺪﻭﺯ )(WinSock ﺍﻳﻨﺘﺮﻓﻴﺲ NetBIOS
ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻓﻮﻕ ﻳﮑﻲ ﺍﺯ ﻣﺴﺎﺋﻞ ﺍﺳﺎﺳﻲ ﺩﺭ ﻧﺎﻣﮕﺬﺍﺭﻱ ﻭ ﺗﺮﺟﻤﻪ ﺍﺳﺎﻣﻲ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ TCP/IPﺭﺍ ﺑﻪ ﭼﺎﻟﺶ ﻣﻲ ﮐﺸﺎﻧﻨﺪ.ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻧﻮﺷﺘﻪ ﺷﺪﻩ ﮐﻪ ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ NetBIOSﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ﺍﺯ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺑﻌﻨﻮﺍﻥ " ﻧﻘﻄﻪ ﺁﺧﺮ" ﺑﺮﺍﻱ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ NetBIOSﺻﺮﻓﺎ" ﻣﺮﺍﻗﺒﺖ ﻫﺎﻱ ﻻﺯﻡ ﺭﺍ ﺩﺭ ﺧﺼﻮﺹ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﻳﮏ sessionﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ .ﺩﺭ
ﺣﺎﻟﻴﮑﻪ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ (TCP/IP )IP,TCPﻫﻴﭽﮕﻮﻧﻪ ﺁﮔﺎﻫﻲ ﺍﺯ ﺍﺳﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ 206
NetBIOSﻧﺪﺍﺷﺘﻪ ﻭ ﺩﺭ ﺗﻤﺎﻣﻲ ﻣﻮﺍﺭﺩ ﻣﺮﺍﻗﺒﺖ ﻫﺎﻱ ﻻﺯﻡ ﺭﺍ ﺍﻧﺠﺎﻡ ﻧﺨﻮﺍﻫﻨﺪ ﺩﺍﺩ.
ﺑﻪ ﻣﻨﻈﻮﺭ ﺣﻞ ﻣﺸﮑﻞ ﻓﻮﻕ) ﺑﺮﻧﺎﻣﻪ ﻫﺎﺋﻲ ﮐﻪ ﺍﺯ NetBIOSﺑﮑﻤﮏ ﺍﻳﻨﺘﺮﻓﻴﺲ NetBIOS ﺑﺎ ﭘﺮﻭﺗﮑﻞ TCP/IPﻣﺮﺗﺒﻂ ﺧﻮﺍﻫﻨﺪ ﺷﺪ( ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ netBTﻭ ﻳﺎ NetBIOS over
TCP/IPﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﺩﺭﺧﻮﺍﺳﺘﻲ ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻳﮏ ﻣﻨﺒﻊ ﺩﺭ ﺷﺒﮑﻪ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﺑﺎ ﺍﻳﻨﺘﺮﻓﻴﺲ NetBIOSﺍﺭﺍﺋﻪ ﻣﻲ ﮔﺮﺩﺩ ﻭ ﺑﻪ ﻻﻳﻪ Application
ﻣﻲ ﺭﺳﺪ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻓﻴﺲ NetBTﺑﺎ ﺁﻥ ﻣﺮﺗﺒﻂ ﺧﻮﺍﻫﺪ ﺷﺪ.ﺩﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ ﻧﺎﻡ NetBIOSﺗﺮﺟﻤﻪ ﻭ ﺑﻪ ﻳﮏ IPﺗﺒﺪﻳﻞ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﻧﺎﻡ NetBIOSﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﻳﮏ ﺁﺩﺭﺱ ﻓﻴﺰﻳﮑﻲ ﺗﺮﺟﻤﻪ ﻣﻲ ﮔﺮﺩﺩ ﺩﺭﺧﻮﺍﺳﺖ ﻣﺮﺑﻮﻃﻪ ﻣﻲ ﺗﻮﺍﻧﺪ ﻻﻳﻪ ﻫﺎﻱ ﺯﻳﺮﻳﻦ
ﭘﺮﻭﺗﮑﻞ TCP/IPﺭﺍ ﻃﻲ ﺗﺎ ﻭﻇﺎﻳﻒ ﻣﺤﻮﻟﻪ ﺩﻧﺒﺎﻝ ﮔﺮﺩﺩ .ﺷﮑﻞ ﺯﻳﺮ ﻧﺤﻮﻩ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ.
ﺍﻳﻨﺘﺮﻓﻴﺲ Winsock
ﺍﻏﻠﺐ ﺑﺮﻧﺎﻣﻪ ﻫﺎﺋﻲ ﮐﻪ ﺑﺮﺍﺳﺎﺱ ﭘﺮﻭﺗﮑﻞ TCP/IPﻧﻮﺷﺘﻪ ﻣﻲ ﮔﺮﺩﻧﻨﺪ ،ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ
Winsockﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺍﻳﻦ ﻧﻮﻉ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﻧﻴﺎﺯﻣﻨﺪ ﺁﮔﺎﻫﻲ ﺍﺯ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺑﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﻧﺒﻮﺩﻩ ﻭ ﺑﺎ ﺁﮔﺎﻫﻲ ﺍﺯ ﺁﺩﺭﺱ IPﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘــﺼﺪ ﻗﺎﺩﺭ ﺑﻪ ﺍﻳـﺠﺎﺩ ﻳﮏ ﺍﺭﺗــﺒﺎﻁ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ.
207
ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺟﻬﺖ ﮐﺎﺭ ﺑﺎ ﺍﻋﺪﺍﺩ ) ﺧﺼﻮﺻﺎ" ( IPﺩﺍﺭﺍﻱ ﻣﺴﺎﺋﻞ ﻭ ﻣﺸﮑﻼﺕ ﺑﺴﻴﺎﺭ ﻧﺎﭼﻴﺰﻱ
ﻣﻲ ﺑﺎﺷﻨﺪ.ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﻧﺴﺎﻥ ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﺩﺍﺭﺍﻱ ﻣﺸﮑﻼﺕ ﺧﺎﺹ ﺧﻮﺩ ﺍﺳﺖ .ﻗﻄﻌﺎ" ﺑﺨﺎﻃﺮ ﺳﭙﺮﺩﻥ ﺍﻋﺪﺍﺩ ﺑﺰﺭﮒ ﻭ ﻃﻮﻻﻧﻲ ﺑﺮﺍﻱ ﻫﺮ ﺷﺨﺺ ﮐﺎﺭ ﻣﺸﮑﻠﻲ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﻫﺮ ﻳﮏ ﺍﺯ ﻣﺎ ﻃﻲ ﺭﻭﺯ ﺑﻪ ﻭﺏ ﺳﺎﻳﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﻣﺮﺍﺟﻌﻪ ﻭ ﺻﺮﻓﺎ" ﺑﺎ ﺗﺎﻳﭗ ﺁﺩﺭﺱ ﻣﺮﺑﻮﻃﻪ ﮐﻪ ﺑﺼﻮﺭﺕ ﻳﮏ ﻧﺎﻡ ﺧﺎﺹ ﺍﺳﺖ ) (www.test.comﺍﺯ ﺍﻣﮑﺎﻧﺎﺕ ﺳﺎﻳﺖ ﻣﺮﺑﻮﻃﻪ ﺑﻬﺮﻩ ﻣﻨﺪ
ﻣﻲ ﮔﺮﺩﻳﻢ .ﺁﻳﺎ ﻃﻲ ﺍﻳﻦ ﻧﻮﻉ ﻣﻼﻗﺎﺕ ﻫﺎ ﻣﺎ ﻧﻴﺎﺯﻣﻨﺪ ﺁﮔﺎﻫﻲ ﺍﺯ ﺁﺩﺭﺱ IPﺳﺎﻳﺖ ﻣﺮﺑﻮﻃﻪ ﺑﻮﺩﻩ ﺍﻳﻢ؟ ﺑﻬﺮﺣﺎﻝ ﺑﺨﺎﻃﺮ ﺳﭙﺮﺩﻥ ﺍﺳﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺑﻤﺮﺍﺗﺐ ﺭﺍﺣﺖ ﺗﺮ ﺍﺯ ﺑﺨﺎﻃﺮ ﺳﭙﺮﺩﻥ ﺍﻋﺪﺍﺩ ) ﮐﺪ ( ﺍﺳﺖ .ﺍﺯ ﺁﻧﺠﺎﺋﻴﮑﻪ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ Winsockﻧﻴﺎﺯﻣﻨﺪ ﺁﮔﺎﻫﻲ ﺍﺯ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻭ ﻳﺎ
Host Nameﻧﻤﻲ ﺑﺎﺷﻨﺪ ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﺭﻋﺎﻳﺖ ﺗﻤﺎﻣﻲ ﻣﺴﺎﺋﻞ ﺟﺎﻧﺒﻲ ﺍﺯ ﺭﻭﺵ ﻓﻮﻕ ﺑﺮﺍﻱ ﺗﺮﺟﻤﻪ ﺍﺳﺎﻣﻲ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ.ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ﺭﺍ ﺗﺮﺟﻤﻪ
ﺍﺳﺎﻣﻲ)Name Resoulation
(Host
ﻣﻲ ﮔﻮﻳﻨﺪ. ﻣﻮﺍﺭﺩ ﺍﺧﺘﻼﻑ ﺑﻴﻦ NetBIOSﻭ WinSock
ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ NetBIOSﻣﻲ ﺑﺎﻳﺴﺖ ﻗﺒﻞ ﺍﺯ ﺍﻳﺠﺎﺩ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ،ﻧﺎﻡ
NetBIOSﺭﺍ ﺑﻪ ﻳﮏ IPﺗﺮﺟﻤﻪ ﻧﻤﺎﻳﻨﺪ ).ﻗﺒﻞ ﺍﺯ ﺍﻳﺠﺎﺩ ﺍﺭﺗﺒﺎﻁ ﻧﺎﻡ NetBIOSﺑﻪ IP ﺗﺒﺪﻳﻞ ﺧﻮﺍﻫﺪ ﺷﺪ (.ﺩﺭ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ WinSockﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ) Host
(nameﺩﺭ ﻣﻘﺎﺑﻞ IPﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ .ﻗﺒﻞ ﺍﺯ ﻋﺮﺿﻪ ﻭﻳﻨﺪﻭﺯ ٢٠٠٠ﺗﻤﺎﻣﻲ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﮐﻪ ﺗﻮﺳﻂ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻋﺎﻣﻞ ﻭﻳﻨﺪﻭﺯ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻣﻲ ﺷﺪﻧﺪ ﺍﺯ NetBIOS ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮐﺮﺩﻧﺪ .ﺑﻬﻤﻴﻦ ﺩﻟﻴﻞ ﺩﺭ ﮔﺬﺷﺘﻪ ﺯﻣﺎﻥ ﺯﻳﺎﺩﻱ ﺻﺮﻑ ﺗﺮﺟﻤﻪ ﺍﺳﺎﻣﻲ ﻣﻲ ﮔﺮﺩﻳﺪ. ﻭﻳﻨﺪﻭﺯ ﻭﺍﺑﺴﺘﮕﻲ ﺑﻪ NetBIOSﻧﺪﺍﺷﺘﻪ ﻭ ﺩﺭ ﻣﻘﺎﺑﻞ ﺍﺯ ﺳﻴﺴﺘﻢ DNSﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ. DNS NameSpace ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﺍﺷﺎﺭﻩ ﮔﺮﺩﻳﺪ DNSﺍﺯ ﻳﮏ ﺳﺎﺧﺘﺎﺭ ﺳﻠﺴﻠﻪ ﻣﺮﺍﺗﺒﻲ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻢ ﻧﺎﻣﮕﺬﺍﺭﻱ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ. 208
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺎﻫﻴﺖ ﺳﻠﺴﻠﻪ ﻣﺮﺍﺗﺒﻲ ﺑﻮﺩﻥ ﺳﺎﺧﺘﺎﺭ ﻓﻮﻕ ،ﭼﻨﺪﻳﻦ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺩﺍﺭﺍﻱ
ﺍﺳﺎﻣﻲ ﻳﮑﺴﺎﻥ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺷﺒﮑﻪ ﺑﻮﺩﻩ ﻭ ﻫﻴﭽﮕﻮﻧﻪ ﻧﮕﺮﺍﻧﻲ ﺍﺯ ﻋﺪﻡ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﻫﺎ ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﻭﻳﮋﮔﻲ ﻓﻮﻕ ﺩﺭﺳﺖ ﻧﻘﻄﻪ ﻣﺨﺎﻟﻒ ﺳﻴﺴﺘﻢ ﻧﺎﻣﮕﺬﺍﺭﻱ NetBIOSﺍﺳﺖ. ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ﻗﺎﺩﺭ ﺑﻪ ﺍﻧﺘﺨﺎﺏ ﺩﻭ ﻧﺎﻡ ﻳﮑﺴﺎﻥ ﺑﺮﺍﻱ
ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺷﺒﮑﻪ ﻳﮑﺴﺎﻥ ﻧﺨﻮﺍﻫﻴﻢ ﻧﺒﻮﺩ.
ﺑﺎﻻﺗﺮﻳﻦ ﺳﻄﺢ ﺩﺭ DNSﺑﺎ ﻧﺎﻡ Root Domainﻧﺎﻣﻴﺪﻩ ﺷﺪﻩ ﻭ ﺍﻏﻠﺐ ﺑﺼﻮﺭﺕ ﻳﮏ “”. ﻭ ﻳﺎ ﻳﮏ ﻓﻀﺎﻱ ﺧﺎﻟﻲ “” ﻧﺸﺎﻥ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺑﻼﻓﺎﺻﻠﻪ ﭘﺲ ﺍﺯ ﺭﻳﺸﻪ ﺑﺎ ﺍﺳﺎﻣﻲ ﻣﻮﺟﻮﺩ ﺩﺭ
ﺩﺍﻣﻨﻪ ﺑﺎﻻﺗﺮﻳﻦ ﺳﻄﺢ ) (Top Levelﺑﺮﺧﻮﺭﺩ ﺧﻮﺍﻫﻴﻢ ﮐﺮﺩ .ﺩﺍﻣﻨﻪ ﻫﺎﻱ Com , .net , .
.org , .eduﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺳﺎﺯﻣﺎﻧﻬﺎﺋﻲ ﮐﻪ ﺗﻤﺎﻳﻞ ﺑﻪ ﺩﺍﺷﺘﻦ ﻳﮏ ﻭﺏ ﺳﺎﻳﺖ ﺑﺮ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺍﺭﻧﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﻳﮏ ﺩﺍﻣﻨﻪ ﺭﺍ ﮐﻪ ﺑﻌﻨﻮﺍﻥ ﻋﻀﻮﻱ ﺍﺯ ﺍﺳﺎﻣﻲ ﺣﻮﺯﻩ Top Levelﻣﻲ ﺑﺎﺷﺪ ﺭﺍ ﺑﺮﺍﻱ ﺧﻮﺩ ﺍﺧﺘﻴﺎﺭ ﻧﻤﺎﻳﺪ .ﻫﺮ ﻳﮏ ﺍﺯ ﺣﻮﺯﻩ ﻫﺎﻱ ﺳﻄﺢ ﺑﺎﻻ
ﺩﺍﺭﺍﻱ ﮐﺎﺭﺑﺮﺩﻫﺎﻱ ﺧﺎﺻﻲ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻣﺜﻼ" ﺳﺎﺯﻣﺎﻥ ﻫﺎﻱ ﺍﻗﺘﺼﺎﺩﻱ ﺩﺭ ﺣﻮﺯﻩ com .ﻭ ﻣﻮﺳﺴﺎﺕ ﺁﻣﻮﺯﺷﻲ ﺩﺭ ﺣﻮﺯﻩ edu.ﻭ domain ...ﺧﻮﺩ ﺭﺍ ﺛﺒﺖ ﺧﻮﺍﻫﻨﺪ ﻧﻤﻮﺩ.ﺷﮑﻞ ﺯﻳﺮ ﺳﺎﺧﺘﺎﺭ ﺳﻠﺴﻠﻪ ﻣﺮﺍﺗﺒﻲ DNSﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ.
ﺩﺭ ﻫﺮ ﺳﻄﺢ ﺍﺯ ﺳﺎﺧﺘﺎﺭ ﺳﻠﺴﻠﻪ ﻣﺮﺍﺗﺒﻲ ﻓﻮﻕ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺳﺎﻣﻲ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻣﺘﻔﺎﻭﺕ ﺑﺎﺷﺪ.
ﻣﺜﻼ" ﻧﻤﻲ ﺗﻮﺍﻥ ﺩﻭ ﺣﻮﺯﻩ com.ﻭ ﻳﺎ ﺩﻭ ﺣﻮﺯﻩ net.ﺭﺍ ﺗﻌﺮﻳﻒ ﻭ ﻳﺎ ﺩﻭ ﺣﻮﺯﻩ
Microsoft.comﺩﺭ ﺳﻄﺢ ﺩﻭﻡ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺳﺎﻣﻲ ﺗﮑﺮﺍﺭﻱ ﺩﺭ ﺳﻄﻮﺡ
209
ﻣﺘﻔﺎﻭﺕ ﻣﺠﺎﺯ ﺑﻮﺩﻩ ﻭ ﺑﻬﻤﻴﻦ ﺩﻟﻴﻞ ﺍﺳﺖ ﮐﻪ ﺍﻏﻠﺐ ﻭﺏ ﺳﺎﻳﺖ ﻫﺎ ﺩﺍﺭﺍﻱ ﻧﺎﻡ www
ﻣﻲ ﺑﺎﺷﻨﺪ.
ﺣﻮﺯﻩ ﻫﺎﻱ Top Levelﻭ Second levelﺗﻨﻬﺎ ﺑﺨﺸﻬﺎﺋﻲ ﺍﺯ ﺳﻴﺴﺘﻢ DNSﻣﻲ ﺑﺎﺷﻨﺪ ﮐﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺼﻮﺭﺕ ﻣﺮﮐﺰﻱ ﻣﺪﻳﺮﻳﺖ ﻭ ﮐﻨﺘﺮﻝ ﮔﺮﺩﻧﻨﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺭﻳﺠﺴﺘﺮ ﻧﻤﻮﺩﻥ ﺩﺍﻣﻨﻪ
ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺎ ﺳﺎﺯﻣﺎﻥ ﻭ ﻳﺎ ﺷﺮﮐﺘﻲ ﮐﻪ ﻣﺴﺌﻮﻟﻴﺖ ﺭﻳﺠﺴﺘﺮ ﻧﻤﻮﺩﻥ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻧﻤﻮﺩﻩ ﻭ ﺍﺯ ﺁﻧﻬﺎ ﺩﺭﺧﻮﺍﺳﺖ ﻧﻤﻮﺩ ﮐﻪ ﻋﻤﻠﻴﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺭﻳﺠﺴﺘﺮ ﻧﻤﻮﺩﻥ ﺩﺍﻣﻨﻪ ﻣﻮﺭﺩ ﻧﻈﺮ ﻣﺎ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ .ﺩﺭ ﮔﺬﺷﺘﻪ ﺗﻨﻬﺎ ﺳﺎﺯﻣﺎﻧﻲ ﮐﻪ ﺩﺍﺭﺍﻱ ﻣﺠﻮﺯ ﻻﺯﻡ ﺑﺮﺍﻱ
ﺭﻳﺠﺴﺘﺮ ﻧﻤﻮﺩﻥ ﺣﻮﺯﻩ ﻫﺎﻱ ﺳﻄﺢ ﺩﻭﻡ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺷﺖ ﺷﺮﮐﺖ NSI)Network (Solutions Intcorporatedﺑﻮﺩ .ﺍﻣﺮﻭﺯﻩ ﺍﻣﺘﻴﺎﺯ ﻓﻮﻕ ﺻﺮﻓﺎ" ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺷﺮﮐﺖ ﻓﻮﻕ ﻧﺒﻮﺩﻩ ﻭ ﺷﺮﮐﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺍﻗﺪﺍﻡ ﺑﻪ ﺭﻳﺠﺴﺘﺮ ﻧﻤﻮﺩﻥ ﺣﻮﺯﻩ ﻫﺎ ﻣﻲ ﻧﻤﺎﻳﻨﺪ. ﻣﺸﺨﺼﺎﺕ ﺩﺍﻣﻨﻪ ﻭ ﺍﺳﻢ Host
ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺭ DNSﺑﻌﻨﻮﺍﻥ ﻋﻀﻮﻱ ﺍﺯ ﻳﮏ ﺩﺍﻣﻨﻪ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﻣﻲ ﺷﻮﺩ .ﺑﻪ ﻣﻨﻈﻮﺭ
ﺷﻨﺎﺧﺖ ﻭ ﺿﺮﻭﺭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺎﺧﺘﺎﺭ ﺳﻠﺴﻠﻪ ﻣﺮﺍﺗﺒﻲ ﺑﻬﻤﺮﺍﻩ DNSﻻﺯﻡ ﺍﺳﺖ ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﺎ FQDNﺁﺷﻨﺎ ﺷﻮﻳﻢ . ﻣﻌﺮﻓﻲ (Qualified Domain Names FQDN)Fully ﻳﮏ FQDNﻣﺤﻞ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺧﺎﺹ ﺭﺍ ﺩﺭ DNSﻣﺸﺨﺺ ﺧﻮﺍﻫﺪ ﻧﻤﻮﺩ .ﺑﺎ
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ FQDNﻣﻲ ﺗﻮﺍﻥ ﺑﺴﺎﺩﮔﻲ ﻣﺤﻞ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺭ ﺩﺍﻣﻨﻪ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﻣﺸﺨﺺ ﻭ ﺑﻪ ﺁﻥ ﺩﺳﺘﻴﺎﺑﻲ ﻧﻤﻮﺩ FQDN .ﻳﮏ ﻧﺎﻡ ﺗﺮﮐﻴﺒﻲ ﺍﺳﺖ ﮐﻪ ﺩﺭ ﺁﻥ ﻧﺎﻡ ﻣﺎﺷﻴﻦ ) (Hostﻭ ﻧﺎﻡ ﺩﺍﻣﻨﻪ ﻣﺮﺑﻮﻃﻪ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﮔﺮﻓﺖ .ﻣﺜﻼ" ﺍﮔﺮ ﺷﺮﮐﺘﻲ ﺑﺎ ﻧﺎﻡ TestCorpﺩﺭ ﺣﻮﺯﻩ ﺳﻄﺢ ﺩﻭﻡ ﺩﺍﻣﻨﻪ ﺧﻮﺩ ﺭﺍ ﺛﺒﺖ ﻧﻤﺎﻳﺪ ) (TestCorp.comﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﺑﺮ
ﺭﻭﻱ TestCorp.comﺍﺟﺮﺍﺀ ﮔﺮﺩﺩ ﻣﻲ ﺗﻮﺍﻥ ﺁﻥ ﺭﺍ wwwﻧﺎﻣﻴﺪ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ www.testCorp.comﺑﻪ ﺁﻥ ﺩﺳﺘﻴﺎﺑﻲ ﭘﻴﺪﺍ ﻧﻤﺎﻳﻨﺪ. 210
ﺩﻗﺖ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﮐﻪ wwwﺍﺯ ﻧﺎﻡ FQDNﻣﺜﺎﻝ ﻓﻮﻕ ﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﻳﮏ ﺷﻨﺎﺳﻪ ﺧﺪﻣﺎﺗﻲ
ﻧﺒﻮﺩﻩ ﻭ ﺻﺮﻓﺎ" ﻧﺎﻡ hostﻣﺮﺑﻮﻁ ﺑﻪ ﻣﺎﺷﻴﻦ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﻣﺸﺨﺺ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﻳﮏ ﻧﺎﻡ FQDNﺍﺯ ﺩﻭ ﻋﻨﺼﺮ ﺍﺳﺎﺳﻲ ﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺍﺳﺖ: : Labelﺷﺎﻣﻞ ﻧﺎﻡ ﺣﻮﺯﻩ ﻭ ﻳﺎ ﻧﺎﻡ ﻳﮏ hostﺍﺳﺖ.
•
: Dotsﻧﻘﻄﻪ ﻫﺎ ﮐﻪ ﺑﺎﻋﺖ ﺟﺪﺍﺳﺎﺯﻱ ﺑﺨﺶ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺧﻮﺍﻫﺪ ﺷﺪ.
•
ﻫﺮ lableﺗﻮﺳﻂ ﻧﻘﻄﻪ ﺍﺯ ﻳﮑﺪﻳﮕﺮ ﺟﺪﺍ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﻫﺮ lableﻣﻲ ﺗﻮﺍﻧﺪ ﺣﺪﺍﮐﺜﺮ ﺩﺍﺭﺍﻱ ۶۳ﺑﺎﻳﺖ ﺑﺎﺷﺪ .ﺩﻗﺖ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﮐﻪ ﻃﻮﻝ ) ﺍﻧﺪﺍﺯﻩ ( ﻫﺮ lableﺑﺮ ﺣﺴﺐ ﺑﺎﻳﺖ ﻣﺸﺨﺺ ﺷﺪﻩ ﺍﺳﺖ ﻧﻪ ﺑﺮ ﺣﺴﺐ ﻃﻮﻝ ﺭﺷﺘﻪ .ﻋﻠﺖ ﺍﻳﻦ ﺍﺳﺖ ﮐﻪ DNSﺩﺭ ﻭﻳﻨﺪﻭﺯ ٢٠٠٠ﺍﺯ
ﮐﺎﺭﺍﮐﺘﺮﻫﺎﻱ UTF-8ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺑﺮ ﺧﻼﻑ ﮐﺎﺭﺍﮐﺘﺮﻫﺎﻱ ﺍﺳﮑﻲ ﮐﻪ ﻗﺒﻼ" ﺍﺯ ﺁﻧﺎﻥ
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﻳﺪ .ﺑﻬﺮﺣﺎﻝ FQDNﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺍﺭﺍﻱ ﻃﻮﻟﻲ ﺑﻪ ﺍﻧﺪﺍﺯﻩ ﺣﺪﺍﮐﺜﺮ ٢٥٥ﺑﺎﻳﺖ ﺑﺎﺷﺪ.
ﻃﺮﺍﺣﻲ ﻧﺎﻡ ﺣﻮﺯﻩ ﺑﺮﺍﻱ ﻳﮏ ﺳﺎﺯﻣﺎﻥ ﻗﺒﻞ ﺍﺯ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺳﻴﺴﺘﻢ ) ﻣﺪﻝ ( DNSﺑﺮﺍﻱ ﻳﮏ ﺳﺎﺯﻣﺎﻥ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﻧﻤﻮﻧﻪ
ﺳﻮﺍﻻﺕ ﺫﻳﻞ ﺑﺪﺭﺳﺘﻲ ﭘﺎﺳﺦ ﺩﺍﺩ: •
ﺁﻳﺎ ﺳﺎﺯﻣﺎﻥ ﻣﺮﺑﻮﻃﻪ ﺩﺭ ﺣﺎﻝ ﺣﺎﺿﺮ ﺑﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﺍﻳﻨﺘﺮﺍﻧﺘﻲ ﺧﻮﺩ ﺍﺯ DNSﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ؟
•
ﺁﻳﺎ ﺳﺎﺯﻣﺎﻥ ﻣﺮﺑﻮﻃﻪ ﺩﺍﺭﺍﻱ ﻳﮏ ﺳﺎﻳﺖ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺍﺳﺖ؟
•
ﺁﻳﺎ ﺳﺎﺯﻣﺎﻥ ﻣﺮﺑﻮﻃﻪ ﺩﺍﺭﺍﻱ ﻳﮏ ﺣﻮﺯﻩ) ﺩﺍﻣﻨﻪ ( ﺛﺒﺖ ﺷﺪﻩ ) ﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ( ﺍﺳﺖ؟
•
ﺁﻳﺎ ﺳﺎﺯﻣﺎﻥ ﻣﺮﺑﻮﻃﻪ ﺍﺯ ﺍﺳﺎﻣﻲ ﺣﻮﺯﻩ ﻳﮑﺴﺎﻥ ﺑﺮﺍﻱ ﻣﻨﺎﺑﻊ ﻣﺮﺑﻮﻃﻪ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ
•
ﺍﻳﻨﺘﺮﻧﺖ /ﺍﻳﻨﺘﺮﺍﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ؟
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺎﻡ ﻳﮑﺴﺎﻥ ﺩﺍﻣﻨﻪ ﺑﺮﺍﻱ ﻣﻨﺎﺑﻊ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﺍﻳﻨﺘﺮﺍﻧﺖ
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺳﺎﻣﻲ ﻳﮑﺴﺎﻥ ﺑﺮﺍﻱ ﻧﺎﻣﮕﺬﺍﺭﻱ ﺩﺍﻣﻨﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻨﺎﺑﻊ ﻣﻮﺟﻮﺩ
ﺩﺍﺧﻠﻲ ﻭ ﻣﻨﺎﺑﻊ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺩﺭ ﻣﺮﺣﻠﻪ ﺍﻭﻝ ﺑﺴﻴﺎﺭ ﻗﺎﺑﻞ ﺗﻮﺟﻪ ﻭ ﺟﺬﺍﺏ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺗﻤﺎﻣﻲ
211
ﻣﺎﺷﻴﻦ ﻫﺎ ﺑﻌﻨﻮﺍﻥ ﻋﻀﻮ ﻳﮏ ﺩﺍﻣﻨﻪ ﻳﮑﺴﺎﻥ ﻣﺤﺴﻮﺏ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻧﻴﺎﺯ ﺑﻪ ﺑﺨﺎﻃﺮ ﺳﭙﺮﺩﻥ ﺩﺍﻣﻨﻪ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺑﺮ ﺍﺳﺎﺱ ﻧﻮﻉ ﻣﻨﺒﻊ ﮐﻪ ﻣﻤﮑﻦ ﺍﺳﺖ ﺩﺍﺧﻠﻲ ﻭ ﻳﺎ ﺧﺎﺭﺟﻲ ﺑﺎﺷﺪ ﻧﺨﻮﺍﻫﻨﺪ
ﺩﺍﺷﺖ ..ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻭﺟﻮﺩ ﻣﺰﺍﻳﺎﻱ ﻓﻮﻕ ،ﺑﮑﺎﺭﮔﻴﺮﻱ ﺍﻳﻦ ﺭﻭﺵ ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﺎﻋﺚ ﺑﺮﻭﺯ ﺑﺮﺧﻲ ﻣﺸﮑﻼﺕ ﻧﻴﺰ ﮔﺮﺩﺩ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺣﻔﺎﻇﺖ ﺍﺯ ﻧﺎﺣﻴﻪ ) (Zoneﻫﺎﻱ DNSﺍﺯ ﺩﺳﺘﻴﺎﺑﻲ ﻏﻴﺮ
ﻣﺠﺎﺯ ﻧﻤﻲ ﺑﺎﻳﺴﺖ ﻫﻴﭽﮕﻮﻧﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻣﻨﺎﺑﻊ ﺩﺍﺧﻠﻲ ﺑﺮ ﺭﻭﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﻧﮕﻬﺪﺍﺭﻱ ﻧﻤﻮﺩ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺮﺍﻱ ﻳﮏ ﺩﺍﻣﻨﻪ ﺍﺯ ﺩﻭ Zoneﻣﺘﻔﺎﻭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﻳﮑﻲ ﺍﺯ Zoneﻫﺎ ﻣﻨﺎﺑﻊ ﺩﺍﺧﻠﻲ ﺭﺍ ﺩﻧﺒﺎﻝ ﻭ Zoneﺩﻳﮕﺮ ﻣﺴﺌﻮﻟﻴﺖ ﭘﺎﺳﺨﮕﻮﺋﻲ ﺑﻪ
ﻣﻨﺎﺑﻌﻲ ﺍﺳﺖ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ .ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﻗﻄﻌﺎ" ﺣﺠﻢ ﻭﻇﺎﻳﻒ ﻣﺪﻳﺮﻳﺖ ﺳﺎﻳﺖ ﺭﺍ
ﺍﻓﺰﺍﻳﺶ ﺧﻮﺍﻫﺪ ﺩﺍﺩ. ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻧﺎﻡ ﻳﮑﺴﺎﻥ ﺑﺮﺍﻱ ﻣﻨﺎﺑﻊ ﺩﺍﺧﻠﻲ ﻭ ﺧﺎﺭﺟﻲ
ﻳﮑﻲ ﺩﻳﮕﺮ ﺍﺯ ﻋﻤﻠﻴﺎﺗﻲ ﮐﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺭ ﺯﻣﺎﻥ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺩﺍﻣﻨﻪ ﻫﺎﻱ ﻳﮑﺴﺎﻥ ﺑﺮﺍﻱ
ﻣﻨﺎﺑﻊ ﺩﺍﺧﻠﻲ ﻭ ﺧﺎﺭﺟﻲ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﻗﺮﺍﺭ ﺩﺍﺭﺩ Mirrorﻧﻤﻮﺩﻥ ﻣﻨﺎﺑﻊ ﺧﺎﺭﺟﻲ ﺑﺼﻮﺭﺕ ﺩﺍﺧﻠﻲ ﺍﺳﺖ .ﻣﺜﻼ" ﻓﺮﺽ ﻧﻤﺎﺋﻴﺪ ﮐﻪ Test.comﻧﺎﻡ ﺍﻧﺘﺨﺎﺏ ﺷﺪﻩ ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻣﻨﺎﺑﻊ
ﺩﺍﺧﻠﻲ ) ﺍﻳﻨﺘﺮﺍﻧﺖ( ﻭ ﻣﻨﺎﺑﻊ ﺧﺎﺭﺟﻲ ) ﺍﻳﻨﺘﺮﻧﺖ ( ﺍﺳﺖ.ﺩﺭﭼﻨﻴﻦ ﻭﺿﻌﻴﺘﻲ ﺩﺍﺭﺍﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﺑﺮﺍ ﻳﺎﻳﻨﺘﺮﺍﻧﺖ ﺑﺎﺷﻴﻢ ﮐﻪ ﭘﺮﺳﻨﻞ ﺳﺎﺯﻣﺎﻥ ﺍﺯ ﺁﻥ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﺍﺧﺘﺼﺎﺻﻲ ﻭ ﺳﺎﻳﺮ ﺍﻃﻼﻋﺎﺕ ﺩﺍﺧﻠﻲ ﺳﺎﺯﻣﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺍﻳﻦ ﻣﺪﻝ ﺩﺍﺭﺍﻱ
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻧﻲ ﺧﻮﺍﻫﻴﻢ ﺑﻮﺩ ﮐﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻣﻨﺎﺑﻊ ﺍﻳﻨﺘﺮﻧﺖ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﺧﻮﺍﻫﻨﺪ ﮔﺮﻓﺖ .ﻣﺎ ﻣﻲ ﺧﻮﺍﻫﻴﻢ ﺍﺯ ﺍﺳﺎﻣﻲ ﻳﮑﺴﺎﻥ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﺋﻴﻢ. ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ﺍﮔﺮ ﺩﺭﺧﻮﺍﺳﺘﻲ ﺑﺮﺍﻱ www.test.comﺻﻮﺭﺕ ﭘﺬﻳﺮﺩ ﻣﺴﺌﻠﻪ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺧﺘﻢ ﺧﻮﺍﻫﺪ ﺷﺪ ﮐﻪ ﻗﺼﺪ ﺩﺍﺭﻳﻢ ﺑﺮﺍﻱ ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﻗﺎﺑﻞ ﺩﺳﺘﻴﺎﺑﻲ ﺑﺎﺷﺪ .ﺩﺭ
ﭼﻨﻴﻦ ﻭﺿﻌﻴﺘﻲ ﻣﺎ ﻧﻤﻲ ﺧﻮﺍﻫﻴﻢ ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﻗﺎﺩﺭ ﺑﻪ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﺷﺨﺼﻲ ﻭ ﺩﺍﺧﻠﻲ ﺳﺎﺯﻣﺎﻥ ﺑﺎﺷﻨﺪ. 212
ﺟﻬﺖ ﺣﻞ ﻣﺸﮑﻞ ﻓﻮﻕ Mirrorﻧﻤﻮﺩﻥ ﻣﻨﺎﺑﻊ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺼﻮﺭﺕ ﺩﺍﺧﻠﻲ ﺍﺳﺖ ﻭ ﺍﻳﺠﺎﺩ ﻳﮏ
zoneﺩﺭ DNSﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﮐﺎﺭﺑﺮﺍﻥ ﺑﻪ ﻣﻨﺎﺑﻊ ﺩﺍﺧﻠﻲ ﺿﺮﻭﺭﻱ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺯﻣﺎﻧﻴﮑﻪ
ﮐﺎﺭﺑﺮﻱ ﺩﺭﺧﻮﺍﺳﺖ www.test.comﺭﺍ ﺻﺎﺩﺭ ﻧﻤﺎﺋﻴﺪ ﺩﺭ ﺍﺑﺘﺪﺍ ﻣﺴﺌﻠﻪ ﻧﺎﻡ ﺍﺯ ﻃﺮﻳﻖ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺩﺍﺧﻠﻲ DNSﺑﺮﻃﺮﻑ ﺧﻮﺍﻫﺪ ﺷﺪ ﮐﻪ ﺷﺎﻣﻞ zoneﺩﺍﺧﻠﻲ ﻣﺮﺑﻮﻃﻪ ﺍﺳﺖ.
ﺯﻣﺎﻧﻲ ﮐﻪ ﻳﮏ ﮐﺎﺭﺑﺮ ﺍﻳﻨﺘﺮﻧﺖ ﻗﺼﺪ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ www.test.comﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﺩﺭﺧﻮﺍﺳﺖ ﻭﻱ ﺑﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺍﻳﻨﺘﺮﻧﺖ DNSﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪﺷﺪ ﮐﻪ ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ
ﺁﺩﺭﺱ IPﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺧﺎﺭﺟﻲ DNSﺑﺮﮔﺮﺩﺍﻧﺪﻩ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺳﺎﻣﻲ ﻣﺘﻔﺎﻭﺕ ﺑﺮﺍﻱ ﺩﺍﻣﻨﻪ ﻫﺎ ﻱ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﺍﻳﻨﺘﺮﺍﻧﺖ
ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺳﺎﺯﻣﺎﻧﻲ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﻭ ﻳﺎ ﺩﺭ ﺣﺎﻝ ﺑﺮﻧﺎﻣﻪ ﺭﻳﺰﻱ ﺟﻬﺖ ﺍﺗﺼﺎﻝ ﺑﻪ
ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺖ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺩﻭ ﻧﺎﻡ ﻣﺘﻔﺎﻭﺕ ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻣﻨﺎﺑﻊ ﺍﻳﻨﺘﺮﺍﻧﺘﻲ ﻭ ﺍﻳﻨﺘﺮﻧﺘﻲ
ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻣﺪﻝ ﻓﻮﻕ ﺑﻤﺮﺍﺗﺐ ﺍﺯ ﻣﺪﻝ ﻗﺒﻞ ﺳﺎﺩﻩ ﺗﺮ ﺍﺳﺖ .ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ﻧﻴﺎﺯﻱ ﺑﻪ ﻧﮕﻬﺪﺍﺭﻱ Zoneﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺑﺮﺍﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﺁﻧﻬﺎ ﻧﺒﻮﺩﻩ ﻭ ﻫﺮﻳﮏ ﺍﺯ ﺁﻧﻬﺎ ﺩﺍﺭﺍﻱ ﻳﮏ ﻧﺎﻡ ﻣﺠﺰﺍ ﻭ ﺍﺧﺘﺼﺎﺻﻲ ﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﻣﺜﻼ" ﻣﻲ ﺗﻮﺍﻥ ﻧﺎﻡ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺣﻮﺯﻩ ﺭﺍ Test.comﻭ ﻧﺎﻡ ﺍﻳﻨﺘﺮﺍﻧﺘﻲ ﺁﻥ ﺭﺍ TestCorp.comﻗﺮﺍﺭ ﺩﺍﺩ.
213
ﺑﺮﺍﻱ ﻧﺎﻣﮕﺬﺍﺭﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﺯﻳﺮ ﺩﺍﻣﻨﻪ ﻫﺎ ﻣﻲ ﺗﻮﺍﻥ ﺍﺳﺎﻣﻲ ﺍﻧﺘﺨﺎﺑﻲ ﺭﺍ ﺑﺮﺍﺳﺎﺱ ﻧﻮﻉ ﻓﻌﺎﻟﻴﺖ ﻭ ﻳﺎ ﺣﻮﺯﻩ ﺟﻔﺮﺍﻓﻴﺎﺋﻲ ﺍﻧﺘﺨﺎﺏ ﻧﻤﻮﺩ. Zones of Authority DNSﺩﺍﺭﺍﻱ ﺳﺎﺧﺘﺎﺭﻱ ﺍﺳﺖ ﮐﻪ ﺍﺯ ﺁﻥ ﺑﺮﺍﻱ ﮔﺮﻭﻩ ﺑﻨﺪﻱ ﻭ ﺩﻧﺒﺎﻝ ﻧﻤﻮﺩﻥ ﻣﺎﺷﻴﻦ ﻣﺮﺑﻮﻃﻪ ﺑﺮﺍﺳﺎﺱ ﻧﺎﻡ hostﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﻓﻌﺎﻝ ﻧﻤﻮﺩﻥ DNSﺩﺭ ﺟﻬﺖ ﺗﺎﻣﻴﻦ ﺧﻮﺍﺳﺘﻪ ﺍﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﻣﻲ ﺑﺎﻳﺴﺖ ﺭﻭﺷﻲ ﺟﻬﺖ ﺫﺧﻴﺮﻩ ﻧﻤﻮﺩﻥ ﺍﻃﻼﻋﺎﺕ ﺩﺭ DNS ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ.ﺍﻃﻼﻋﺎﺕ ﻭﺍﻗﻌﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺩﺍﻣﻨﻪ ﻫﺎ ﺩﺭ ﻓﺎﻳﻠﻲ ﺑﺎ ﻧﺎﻡ
Zone
databaseﺫﺧﻴﺮﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺍﻳﻦ ﻧﻮﻉ ﻓﺎﻳﻞ ﻫﺎ ،ﻓﺎﻳﻞ ﻫﺎﻱ ﻓﻴﺰﻳﮑﻲ ﺑﻮﺩﻩ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺫﺧﻴﺮﻩ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﺁﺩﺭﺱ ﻣﺤﻞ ﻗﺮﺍﺭ ﮔﻴﺮﻱ ﻓﺎﻳﻞ ﻫﺎﻱ ﻓﻮﻕ systemroot%\system32\dns%ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺩﺭ ﺍﻳﻦ ﺑﺨﺶ ﻫﺪﻑ ﺑﺮﺭﺳﻲ Zoneﻫﺎﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺑﻮﺩﻩ ﮐﻪ ﺑﻪ ﺩﻭ ﻧﻮﻉ ﻋﻤﺪﻩ ﺗﻘﺴﻴﻢ ﺧﻮﺍﻫﻨﺪ ﺷﺪ. •
Forward Lookup Zone
•
Reverse Lookup Zone
ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺗﺸﺮﻳﺢ ﻋﻤﻠﮑﺮﺩ ﻫﺮ ﻳﮏ ﺍﺯ Zoneﻫﺎﻱ ﻓﻮﻕ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ.
214
Forward Lookup Zone ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ Zoneﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻣﮑﺎﻧﻴﺰﻣﻲ ﺑﺮﺍﻱ ﺗﺮﺟﻤﻪ ﺍﺳﺎﻣﻲ hostﺑﻪ ﺁﺩﺭﺱ IP ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ DNSﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ Zone .ﻫﺎ ﺩﺍﺭﺍﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻫﺴﺘﻨﺪ ﮐﻪ ﺑﺼﻮﺭﺕ ﺭﮐﻮﺭﺩﻫﺎﻱ ﺧﺎﺹ ﺩﺭ ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﻲ ﻣﺮﺑﻮﻃﻪ ﺫﺧﻴﺮﻩ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﺍﻳﻦ ﻧﻮﻉ ﺭﮐﻮﺭﺩﻫﺎ ﺭﺍ " ﺭﮐﻮﺭﺩﻫﺎﻱ ﻣﻨﺒﻊ " Record Resourceﻣﻲ ﮔﻮﻳﻨﺪ .ﺭﮐﻮﺭﺩﻫﺎﻱ ﻓﻮﻕ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻣﻨﺎﺑﻊ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺱ ﺩﺭ ﻫﺮ Zoneﺭﺍ ﻣﺸﺨﺺ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ. ﺗﻔﺎﻭﺕ ﺑﻴﻦ Domainﻭ Zone
ﺩﺭ ﺍﺑﺘﺪﺍ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﺍﻳﻦ ﻧﮑﺘﻪ ﺍﺷﺎﺭﻩ ﻧﻤﻮﺩ ﮐﻪ Zoneﻫﺎ ﺑﺎ ﺩﺍﻣﻨﻪ ﻫﺎ )(Domain
ﻳﮑﺴﺎﻥ ﻧﺒﻮﺩﻩ ﻭ ﻳﮏ Zoneﻣﻲ ﺗﻮﺍﻧﺪ ﺷﺎﻣﻞ ﺭﮐﻮﺭﺩﻫﺎﺋﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﭼﻨﺪﻳﻦ ﺩﺍﻣﻨﻪ ﺑﺎﺷﺪ. ﻣﺜﻼ" ﻓﺮﺽ ﮐﻨﻴﺪ ،ﺩﺍﻣﻨﻪ www.microsoft.comﺩﺍﺭﺍﻱ ﺩﻭ ﺯﻳﺮ ﺩﺍﻣﻨﻪ ﺑﺎ ﻧﺎﻡ East , Westﺑﺎﺷﺪ.(West.microsoft.com , East.microsoft.com) .
ﻣﺎﻳﮑﺮﻭﺳﺎﻓﺖ ﺩﺍﺭﺍﻱ ﺩﺍﻣﻨﻪ ﺍﺧﺘﺼﺎﺻﻲ msn.comﺑﻮﺩﻩ ﮐﻪ ﺧﻮﺩ ﺷﺎﻣﻞ ﺩﺍﺭﺍﻱ ﻳﮏ ﺯﻳﺮﺩﺍﻣﻨﻪ ﺑﺎ ﻧﺎﻡ mail.microsoft.comﺍﺳﺖ
215
ﺩﺍﻣﻨﻪ ﻫﺎﻱ ﻫﻤﺠﻮﺍﺭ ﻭ ﻏﻴﺮ ﻫﻤﺠﻮﺍﺭ ﺩﺭ ﺷﮑﻞ ﻓﻮﻕ ﻧﺸﺎﻥ ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳﺖ .ﺩﺍﻣﻨﻪ ﻫﺎﻱ
ﻫﻤﺠﻮﺍﺭ ﻫﻤﺪﻳﮕﺮ ﺭﺍ ﺣﺲ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ ) ﺑﺮﺍﻱ ﻳﮑﺪﻳﮕﺮ ﻣﻠﻤﻮﺱ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ(.
ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻣﺜﺎﻝ ﻓﻮﻕ ﺩﺍﻣﻨﻪ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ Zone Microsoft.comﻫﻤﺠﻮﺍﺭ ﻭ ﺩﺍﻣﻨﻪ ﻫﺎﻱ Msn.comﻭ Microsoft.comﻏﻴﺮ ﻫﻤﺠﻮﺍﺭ ﻫﺴﺘﻨﺪ.
Zoneﻫﺎ ﻣﺠﻮﺯ ﻭﺍﮔﺬﺍﺭﻱ ﻣﺴﺌﻮﻟﻴﺖ ﺑﺮﺍﻱ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻣﻨﺎﺑﻊ ﻣﻮﺟﻮﺩ ﺩﺭ Zoneﺭﺍ ﻓﺮﺍﻫﻢ
ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ Zone .ﻫﺎ ﺭﻭﺷﻲ ﺭﺍ ﺑﻪ ﻣﻨﻈﻮﺭ ﻭﺍﮔﺬﺍﺭﻱ ﻣﺴﺌﻮﻟﻴﺖ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻭ ﻧﮕﻬﺪﺍﺭﻱ ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﻲ ﻣﺮﺑﻮﻃﻪ ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ .ﻓﺮﺽ ﮐﻨﻴﺪ ﺷﺮﮐﺘﻲ ﺑﺎ ﻧﺎﻡ TACteam ﻭﺟﻮﺩﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ .ﺷﺮﮐﺖ ﻓﻮﻕ ﺍﺯ ﺩﺍﻣﻨﻪ ﺍﻱ ﺑﺎ ﻧﺎﻡ tacteam.netﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﺷﺮﮐﺖ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﺷﻌﺒﺎﺗﻲ ﺩﺭ and Boston ,San Francisco, Dallasﺍﺳﺖ. ﺷﻌﺒﻪ ﺍﺻﻠﻲ ﺩﺭ Dallasﺑﻮﺩﻩ ﮐﻪ ﻣﺪﻳﺮﺍﻥ ﻣﺘﻌﺪﺩﻱ ﺑﺮﺍﻱ ﻣﺪﻳﺮﻳﺖ ﺷﺒﮑﻪ ﺩﺭ ﺁﻥ ﻓﻌﺎﻟﻴﺖ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺷﻌﺒﻪ San Franciscoﻧﻴﺰ ﺩﺍﺭﺍﻱ ﭼﻨﺪﻳﻦ ﻣﺪﻳﺮ ﻭﺭﺯﻳﺪﻩ ﺑﻪ ﻣﻨﻈﻮﺭ ﻧﻈﺎﺭﺕ ﺑﺮ ﺳﺎﻳﺖ ﺍﺳﺖ .ﺷﻌﺒﻪ Bostonﺩﺍﺭﺍﻱ ﻣﺪﻳﺮﻳﺘﻲ ﮐﺎﺭﺁﻣﺪ ﺑﺮﺍﻱ ﻣﺪﻳﺮﻳﺖ DNSﻧﻤﻲ ﺑﺎﺷﺪ. ﺑﻨﺎﺑﺮﺍﻳﻦ ﻫﻤﻮﺍﺭﻩ ﻧﮕﺮﺍﻧﻲ ﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﻭﺍﮔﺬﺍﺭﻱ ﻣﺴﺌﻮﻟﻴﺖ ﻧﮕﻬﺪﺍﺭﻱ ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﻳﮏ ﻓﺮﺩ ﺩﺭ Bostonﺧﻮﺍﻫﻴﻢ ﺑﻮﺩ .ﻣﻨﺎﺑﻊ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺳﺎﻳﺖ Dallasﺩﺭ ﺣﻮﺯﻩ tacteam.netﺑﻮﺩﻩ ﻭ ﻣﻨــــــﺎﺑﻊ ﻣﻮﺟـــﻮﺩ ﺩﺭ San Franciscoﺩﺭ ﺳﺎﻳـــﺖ west.tacteam.netﻭ ﻣﻨــــــﺎﺑﻊ ﻣﻮﺟـــــﻮﺩ ﺩﺭ Bostonﺩﺭ ﺳﺎﻳـــﺖ east.tacteam.netﻧﮕﻬﺪﺍﺭﻱ ﻣﻲ ﮔﺮﺩﻧﻨﺪ .ﺩﺭ ﭼﻨﻴﻦ ﻭﺿﻌﻴﺘﻲ ﻣﺎ ﺻﺮﻓﺎ" ﺩﻭ Zoneﺭﺍ ﺑﺮﺍﻱ ﻣﺪﻳﺮﻳﺖ ﺳﻪ ﺩﺍﻣﻨﻪ ﺍﻳﺠﺎﺩ ﺧﻮﺍﻫﻴﻢ ﮐﺮﺩ .ﻳﮏ Zoneﺑﺮﺍﻱ tacteam.netﮐﻪ
ﻣﺴﺌﻮﻟﻴﺖ ﻣﻨﺎﺑﻊ ﻣﺮﺑﻮﻁ ﺑﻪ tacteam.netﻭ east.tacteam.netﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺷﺘﻪ
ﻭ ﻳﮏ Zoneﺩﻳﮕﺮ ﺑﺮﺍﻱ west.tacteam.netﮐﻪ ﻣﻨﺎﺑﻊ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺳﺎﻳﺖ San Franciscoﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺧﻮﺍﻫﺪ ﮔﺮﻓﺖ .ﺍﺳﺎﻣﻲ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺮﺍﻱ ﻫﺮ Zoneﺑﻪ ﭼﻪ
ﺻﻮﺭﺕ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﻧﺘﺨﺎﺏ ﮔﺮﺩﻧﻨﺪ؟ ﻫﺮ Zoneﻧﺎﻡ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺭﻳﺸﻪ ﻭ ﻳﺎ ﺑﺎﻻﺗﺮﻳﻦ ﺳﻄﺢ ﺩﺍﻣﻨﻪ ﺍﻗﺘﺒﺎﺱ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﺩﺭﺧﻮﺍﺳﺘﻲ ﺑﺮﺍﻱ ﻳﮏ ﻣﻨﺒﻊ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺩﺍﻣﻨﻪ west.tacteam.netﺑﺮﺍﻱ DNSﻭﺍﺻﻞ ﮔﺮﺩﺩ ) ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﻣﺮﺑﻮﻁ ﺑﻪ 216
( tacteam.netﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ tacteam.netﺻﺮﻓﺎ" ﺷﺎﻣﻞ ﻳﮏ Zoneﻧﺨﻮﺍﻫﺪ
ﺑﻮﺩ.ﺩﺭ ﭼﻨﻴﻦ ﻭﺿﻌﻴﻨﻲ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﻳﮏ ) Delegationﻭﺍﮔﺬﺍﺭﻱ
ﻣﺴﺌﻮﻟﻴﺖ ( ﺑﻮﺩﻩ ﮐﻪ ﺑﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﻣﺮﺑﻮﻁ ﺑﻪ west.tacteam.netﺍﺷﺎﺭﻩ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺩﺭﺧﻮﺍﺳﺖ ﻣﺮﺑﻮﻃﻪ ﺑﺮﺍﻱ ﺗﺮﺟﻤﻪ ﺍﺳﺎﻣﻲ ﺑﻪ ﺁﺩﺭﺱ ﺑﺪﺭﺳﺘﻲ ﺑﻪ
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻣﺮﺑﻮﻃﻪ ﻫﺪﺍﻳﺖ ﺗﺎ ﻣﺸﮑﻞ ﺑﺮﻃﺮﻑ ﮔﺮﺩﺩ.
Reverse Lookup Zones Zoneﻫﺎ ﻱ ﺍﺯ ﻧﻮﻉ Forwardﺍﻣﮑﺎﻥ ﺗﺮﺟﻤﻪ ﻧﺎﻡ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﻳﮏ IPﺭﺍ ﻓﺮﺍﻫﻢ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ..ﻳﮏ Reverse Lookupﺍﻳﻦ ﺍﻣﮑﺎﻥ ﺭﺍ ﺑﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ﺧﻮﺍﻫﺪ ﺩﺍﺩ ﮐﻪ ﻋﻤﻠﻴﺎﺕ ﻣﺨﺎﻟﻒ ﻋﻤﻠﻴﺎﺕ ﮔﻔﺘﻪ ﺷﺪﻩ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ :ﺗﺮﺟﻤﻪ ﻳﮏ ﺁﺩﺭﺱ IPﺑﻪ ﻳﮏ ﻧﺎﻡ. ﻣﺜﻼ" ﻓﺮﺽ ﮐﻨﻴﺪ ﺷﻤﺎ ﻣﻲ ﺩﺍﻧﻴﺪ ﮐﻪ ﺁﺩﺭﺱ IPﻣﺮﺑﻮﻁ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ١٩٢,١٦٨,١,٣ ﺍﺳﺖ ﺍﻣﺎ ﻋﻼﻗﻪ ﻣﻨﺪ ﻫﺴﺘﻴﻢ ﮐﻪ ﻧﺎﻡ ﺁﻥ ﺭﺍ ﻧﻴﺰ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ .ﺑﻪ ﻣﻨﻈﻮﺭ ﭘﺎﺳﺨﮕﻮﺋﻲ ﺑﻪ ﺍﻳﻦ ﻧﻮﻉ ﺩﺭﺧﻮﺍﺳﺖ ﻫﺎ ﺳﻴﺴﺘﻢ DNSﺍﺯ ﺍﻳﻦ ﻧﻮﻉ Zoneﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ Zone .ﻫﺎﻱ ﻓﻮﻕ
ﺑﺴﺎﺩﮔﻲ ﻭ ﺭﺍﺣﺘﻲ Forward Zoneﻫﺎ ﺭﻓﺘﺎﺭ ﻧﻤﻲ ﻧﻤﺎﻳﻨﺪ .ﻣﺜﻼ" ﻓﺮﺽ ﮐﻨﻴﺪ Forward Lookup Zoneﻣﺸﺎﺑﻪ ﻳﮏ ﺩﻓﺘﺮﭼﻪ ﺗﻠﻔﻦ ﺑﺎﺷﺪ ﺍﻳﻨﺪﮐﺲ ﺍﻳﻦ ﻧﻮﻉ ﺩﻓﺘﺮﭼﻪ
ﻫﺎ ﺑﺮ ﺍﺳﺎﺱ ﻧﺎﻡ ﺍﺷﺨﺎﺹ ﺍﺳﺖ .
217
ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻗﺼﺪ ﻳﺎﻓﺘﻦ ﻳﮏ ﺷﻤﺎﺭﻩ ﺗﻠﻔﻦ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﺑﺎ ﺣﺮﮐﺖ ﺑﺮ ﺭﻭﻱ ﺣﺮﻑ
ﻣﺮﺑﻮﻃﻪ ﻭ ﺩﻧﺒﺎﻝ ﻧﻤﻮﺩﻥ ﻟﻴﺴﺖ ﮐﻪ ﺑﺘﺮﺗﻴﺐ ﺣﺮﻭﻑ ﺍﻟﻔﺒﺎﺀ ﺍﺳﺖ ﻗﺎﺩﺭ ﺑﻪ ﻳﺎﻓﺘﻦ ﻧﺎﻡ ﺷﺨﺺ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺍﻫﻴﺪ ﺑﻮﺩ .ﺍﮔﺮ ﻣﺎ ﺷﻤﺎﺭﻩ ﺗﻠﻔﻦ ﻓﺮﺩﻱ ﺭﺍ ﺑﺪﺍﻧﻴﻢ ﻭ ﻗﺼﺪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ ﺍﺯ ﻧﺎﻡ ﻭﻱ ﻧﻴﺰ ﺁﮔﺎﻫﻲ ﭘﻴﺪﺍ ﻧﻤﺎﺋﻴﻢ ﭼﻪ ﻧﻮﻉ ﻓﺮﺁﻳﻨﺪﻱ ﺭﺍ ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﻧﺒﺎﻝ ﻧﻤﻮﺩ؟ .ﺍﺯ ﺁﻧﺠﺎﺋﻴﮑﻪ ﺩﻓﺘﺮﭼﻪ ﺗﻠﻔﻦ ﺑﺮ ﺍﺳﺎﺱ ﻧﺎﻡ ﺍﻳﻨﺪﮐﺲ ﺷﺪﻩ ﺍﺳﺖ ﺗﻨﻬﺎ ﺭﺍﻩ ﺣﺮﮐﺖ ﻭ ﺟﺴﺘﺠﻮ ﺩﺭ ﺗﻤﺎﻡ ﺷﻤﺎﺭﻩ ﺗﻠﻔﻦ ﻫﺎ ﻭ ﻳﺎﻓﺘﻦ ﻧﺎﻡ ﻣﺮﺑﻮﻃﻪ ﺍﺳﺖ .ﻗﻄﻌﺎ" ﺭﻭﺵ ﻓﻮﻕ ﺭﻭﺵ ﻣﻨﺎﺳﺒﻲ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺣﻞ ﻣﺸﮑﻞ ﻓﻮﻕ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻳﺎﻓﺘﻦ ﻧﺎﻡ ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ IPﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ ﺍﺯ ﻳﮏ ﺩﺍﻣﻨﻪ ﺟﺪﻳﺪ ﺑﺎ
ﻧﺎﻡ in-addr.arpaﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺍﻣﻨﻪ ﻓﻮﻕ ﺍﺳﺎﻣﻲ ﻣﺮﺑﻮﻃﻪ ﺑﻪ ﺩﺍﻣﻨﻪ ﻫﺎ ﺭﺍ ﺑﺮ ﺍﺳﺎﺱ ﺷﻨﺎﺳﻪ ﺷﺒﮑﻪ ) (Network IDﺍﻳﻨﺪﮐﺲ ﻭ ﺑﺎﻋﺚ ﺍﻓﺰﺍﻳﺶ ﺳﺮﻋﺖ ﻭ ﮐﺎﺭﺁﺋﻲ ﺩﺭ ﺑﺎﺯﻳﺎﺑﻲ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﻮﻉ ﺩﺭﺧﻮﺍﺳﺖ ﻫﺎ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻣﺪﻳﺮﻳﺘﻲ DNSﻣﻲ ﺗﻮﺍﻥ ﺑﺮﺍﺣﺘﻲ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﻳﺠﺎﺩ ﺍﻳﻦ ﻧﻮﻉ Zoneﻫﺎ ﻧﻤﻮﺩ .ﻣﺜﻼ" ﺍﮔﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺩﺍﺭﺍﻱ ﺁﺩﺭﺱ ١٩٢,١٦٨,١,٠ﺑﺎﺷﺪ ﻳﮏ ﺁﺩﺭﺱ ﻣﻌﮑﻮﺱ ﺍﻳﺠﺎﺩ ﻭ Zoneﻣﺮﺑﻮﻃﻪ ﺑﺼﻮﺭﺕ ﺯﻳﺮ ﺧﻮﺍﻫﺪ ﺑﻮﺩ : 1.168.192.inaddr.arpa.dns
218
ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ DNS DNSﺍﺯﮐﻠﻤﺎﺕ Domain Name Systemﺍﻗﺘﺒﺎﺱ ﻭ ﻳﮏ ﭘﺮﻭﺗﮑﻞ ﺷﻨﺎﺧﺘﻪ
ﺷﺪﻩ ﺩﺭ ﻋﺮﺻﻪ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺧﺼﻮﺻﺎ" ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺖ .ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺮﺟﻤﻪ ﺍﺳﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ﻭ Domainﺑﻪ ﺁﺩﺭﺱ ﻫﺎﻱ IPﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ. ﺯﻣﺎﻧﻲ ﮐﻪ ﺷﻤﺎ ﺁﺩﺭﺱ www.irib.irﺭﺍ ﺩﺭ ﻣﺮﻭﺭﮔﺮ ﺧﻮﺩ ﺗﺎﻳﭗ ﻣﻲ ﻧﻤﺎﺋﻴﺪ ،ﻧﺎﻡ ﻓﻮﻕ ﺑﻪ
ﻳﮏ ﺁﺩﺭﺱ IPﻭ ﺑﺮ ﺍﺳﺎﺱ ﻳﮏ ﺩﺭﺧﻮﺍﺳﺖ ﺧﺎﺹ ) ( queryﮐﻪ ﺍﺯ ﺟﺎﻧﺐ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﻤﺎ
ﺻﺎﺩﺭ ﻣﻲ ﺷﻮﺩ ،ﺗﺮﺟﻤﻪ ﻣﻲ ﮔﺮﺩﺩ. ﺗﺎﺭﻳﺨﭽﻪ DNS ، DNSﺯﻣﺎﻧﻲ ﮐﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺗﺎ ﺑﻪ ﺍﻳﻦ ﺍﻧﺪﺍﺯﻩ ﮔﺴﺘﺮﺵ ﭘﻴﺪﺍ ﻧﮑﺮﺩﻩ ﺑﻮﺩ ﻭ ﺻﺮﻓﺎ" ﺩﺭ ﺣﺪ ﻭ ﺍﻧﺪﺍﺯﻩ ﻳﮏ ﺷﺒﮑﻪ ﮐﻮﭼﮏ ﺑﻮﺩ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﻳﺪ .ﺩﺭ ﺁﻥ ﺯﻣﺎﻥ ،ﺍﺳﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ
ﻣﻴﺰﺑﺎﻥ ﺑﻪ ﺻﻮﺭﺕ ﺩﺳﺘﻲ ﺩﺭ ﻓﺎﻳﻠﻲ ﺑﺎ ﻧﺎﻡ HOSTSﺩﺭﺝ ﻣﻲ ﮔﺮﺩﻳﺪ .ﻓﺎﻳﻞ ﻓﻮﻕ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻣﺮﮐﺰﻱ ﻗﺮﺍﺭ ﻣﻲ ﮔﺮﻓﺖ .ﻫﺮ ﺳﺎﻳﺖ ﻭ ﻳﺎ ﮐﺎﻣﭙﻴﻮﺗﺮ ﮐﻪ ﻧﻴﺎﺯﻣﻨﺪ ﺗﺮﺟﻤﻪ ﺍﺳﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ﺑﻮﺩ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﻓﺎﻳﻞ ﻓﻮﻕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﻮﺩ .ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﮔﺴﺘﺮﺵ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﺍﻓﺰﺍﻳﺶ ﺗﻌﺪﺍﺩ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ،ﺣﺠﻢ ﻓﺎﻳﻞ ﻓﻮﻕ ﻧﻴﺰ ﺍﻓﺰﺍﻳﺶ ﻭ
ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺑﺎ ﻣﺸﮑﻞ ﻣﻮﺍﺟﻪ ﮔﺮﺩﻳﺪ ) ﺍﻓﺰﺍﻳﺶ ﺗﺮﺍﻓﻴﮏ ﺷﺒﮑﻪ ( .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺴﺎﺋﻞ ﻓﻮﻕ ،ﺩﺭ ﺳﺎﻝ ۱۹۸۴ﺗﮑﻨﻮﻟﻮﮊﻱ DNSﻣﻌﺮﻓﻲ ﮔﺮﺩﻳﺪ. ﭘﺮﻭﺗﮑﻞ DNS
، DNSﻳﮏ "ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﻲ ﺗﻮﺯﻳﻊ ﺷﺪﻩ " ﺍﺳﺖ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﻣﺎﺷﻴﻦ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﻣﺴﺘﻘﺮ ﻣﻲ ﺷﻮﺩ ) ﻣﺸﺎﺑﻪ ﺭﻳﺸﻪ ﻫﺎﻱ ﻳﮏ ﺩﺭﺧﺖ ﮐﻪ ﺍﺯ ﺭﻳﺸﻪ ﺍﺻﻠﻲ ﺍﻧﺸﻌﺎﺏ ﻣﻲ ﺷﻮﻧﺪ ( .ﺍﻣﺮﻭﺯﻩ ﺍﮐﺜﺮ ﺷﺮﮐﺖ ﻫﺎ ﻭ ﻣﻮﺳﺴﺎﺕ ﺩﺍﺭﺍﻱ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﮐﻮﭼﮏ ﺩﺭ ﺳﺎﺯﻣﺎﻥ ﺧﻮﺩ
ﻣﻲ ﺑﺎﺷﻨﺪ ﺗﺎ ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ ﺍﻳﺠﺎﺩ ﮔﺮﺩﺩ ﮐﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺑﺪﻭﻥ ﺑﺮﻭﺯ ﻫﻴﭽﮕﻮﻧﻪ ﻣﺸﮑﻠﻲ ،ﻳﮑﺪﻳﮕﺮ ﺭﺍ ﭘﻴﺪﺍ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﺯ ﻭﻳﻨﺪﻭﺯ ۲۰۰۰ﻭ ﺍﮐﺘﻴﻮ ﺩﺍﻳﺮﮐﺘﻮﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﺋﻴﺪ،
219
ﻗﻄﻌﺎ" ﺍﺯ DNSﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺮﺟﻤﻪ ﺍﺳﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺑﻪ ﺁﺩﺭﺱ ﻫﺎﻱ ، IPﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ.
ﺷﺮﮐﺖ ﻣﺎﻳﮑﺮﻭﺳﺎﻓﺖ ﺩﺭ ﺍﺑﺘﺪﺍ ﻧﺴﺨﻪ ﺍﺧﺘﺼﺎﺻﻲ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺧﻮﺩ ﺭﺍ ﺑﺎ ﻧﺎﻡ
Windows Internet Name Service ) WINSﻃﺮﺍﺣﻲ ﻭ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻧﻤﻮﺩ. ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻓﻮﻕ ﻣﺒﺘﻨﻲ ﺑﺮ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻗﺪﻳﻤﻲ ﺑﻮﺩ ﻭ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﺋﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ
ﮔﺮﺩﻳﺪ ﮐﻪ ﻫﺮﮔﺰ ﺩﺍﺭﺍﻱ ﮐﺎﺭﺍﺋﻲ ﻣﺸﺎﺑﻪ DNSﻧﺒﻮﺩﻧﺪ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﻃﺒﻴﻌﻲ ﺑﻮﺩ ﮐﻪ ﺷﺮﮐﺖ ﻣﺎﻳﮑﺮﻭﺳﺎﻓﺖ ﺍﺯ WINSﻓﺎﺻﻠﻪ ﮔﺮﻓﺘﻪ ﻭ ﺑﻪ ﺳﻤﺖ DNSﺣﺮﮐﺖ ﮐﻨﺪ. ﺍﺯ ﭘﺮﻭﺗﮑﻞ DNSﺩﺭ ﻣﻮﺍﺭﺩﻱ ﮐﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﻤﺎ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﻳﮏ ﺩﺭﺧﻮﺍﺳﺖ ﻣﺒﺘﻨﻲ ﺑﺮ DNSﺑﺮﺍﻱ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻧﺎﻡ ﺑﻪ ﻣﻨﻈﻮﺭ ﻳﺎﻓﺘﻦ ﺁﺩﺭﺱ Domainﻣﻲ ﻧﻤﺎﻳﺪ،
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ .ﻣﺜﻼ" ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺩﺭ ﻣﺮﻭﺭﮔﺮ ﺧﻮﺩ ﺁﺩﺭﺱ www. Cisco.com ﺭﺍ ﺗﺎﻳﭗ ﻧﻤﺎﺋﻴﺪ ،ﻳﮏ ﺩﺭﺧﻮﺍﺳﺖ ﻣﺒﺘﻨﻲ ﺑﺮ DNSﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﻤﺎ ﻭ ﺑﻪ ﻣﻘﺼﺪ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺻﺎﺩﺭ ﻣﻲ ﺷﻮﺩ .ﻣﺎﻣﻮﺭﻳﺖ ﺩﺭﺧﻮﺍﺳﺖ ﺍﺭﺳﺎﻟﻲ ،ﻳﺎﻓﺘﻦ ﺁﺩﺭﺱ IP ﻭﺏ ﺳﺎﻳﺖ Ciscoﺍﺳﺖ. ﭘﺮﻭﺗﮑﻞ DNSﻭ ﻣﺪﻝ ﻣﺮﺟﻊ OSI
ﭘﺮﻭﺗﮑﻞ DNSﻣﻌﻤﻮﻻ" ﺍﺯ ﭘﺮﻭﺗﮑﻞ UDPﺑﻪ ﻣﻨﻈﻮﺭ ﺣﻤﻞ ﺩﺍﺩﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﭘﺮﻭﺗﮑﻞ UDPﻧﺴﺒﺖ ﺑﻪ TCPﺩﺍﺭﺍﻱ overheadﮐﻤﺘﺮﻱ ﻣﻲ ﺑﺎﺷﺪ .ﻫﺮ ﺍﻧﺪﺍﺯﻩ overheadﻳﮏ ﭘﺮﻭﺗﮑﻞ ﮐﻤﺘﺮ ﺑﺎﺷﺪ ،ﺳﺮﻋﺖ ﺁﻥ ﺑﻴﺸﺘﺮ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺩﺭ ﻣﻮﺍﺭﺩﻱ ﮐﻪ ﺣﻤﻞ ﺩﺍﺩﻩ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﮑﻞ UDPﺑﺎ ﻣﺸﮑﻞ ﻭ ﻳﺎ ﺑﻬﺘﺮ ﺑﮕﻮﺋﻴﻢ ﺧﻄﺎﺀ ﻣﻮﺍﺟﻪ ﮔﺮﺩﺩ،
ﭘﺮﻭﺗﮑﻞ DNSﺍﺯ ﭘﺮﻭﺗﮑﻞ TCPﺑﻪ ﻣﻨﻈﻮﺭ ﺣﻤﻞ ﺩﺍﺩﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩﻩ ﺗﺎ ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ ﺍﻳﺠﺎﺩ ﮔﺮﺩﺩ ﮐﻪ ﺩﺍﺩﻩ ﺑﺪﺭﺳﺘﻲ ﻭ ﺑﺪﻭﻥ ﺑﺮﻭﺯ ﺧﻄﺎﺀ ﺑﻪ ﻣﻘﺼﺪ ﺧﻮﺍﻫﺪ ﺭﺳﻴﺪ.
220
ﻓﺮﺁﻳﻨﺪ ﺍﺭﺳﺎﻝ ﻳﮏ ﺩﺭﺧﻮﺍﺳﺖ DNSﻭ ﺩﺭﻳﺎﻓﺖ ﭘﺎﺳﺦ ﺁﻥ ،ﻣﺘﻨﺎﺳﺐ ﺑﺎ ﻧﻮﻉ ﺳﻴﺴﺘﻢ
ﻋﺎﻣﻞ ﻧﺼﺐ ﺷﺪﻩ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺳﺖ .ﺑﺮﺧﻲ ﺍﺯ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻋﺎﻣﻞ ﺍﺟﺎﺯﻩ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﮑﻞ TCPﺑﺮﺍﻱ DNSﺭﺍ ﻧﺪﺍﺩﻩ ﻭ ﺻﺮﻓﺎ" ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﭘﺮﻭﺗﮑﻞ UDPﺑﻪ ﻣﻨﻈﻮﺭ
ﺣﻤﻞ ﺩﺍﺩﻩ ﺍﺳﺘﻔﺎﺩﻩ ﺷﻮﺩ .ﺑﺪﻳﻬﻲ ﺍﺳﺖ ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ﻫﻤﻮﺍﺭﻩ ﺍﻳﻦ ﺍﺣﺘﻤﺎﻝ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ ﮐﻪ ﺑﺎ ﺧﻄﺎﻫﺎﺋﻲ ﻣﻮﺍﺟﻪ ﺷﺪﻩ ﻭ ﻋﻤﻼ" ﺍﻣﮑﺎﻥ ﺗﺮﺟﻤﻪ ﻧﺎﻡ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻭ ﻳﺎ
Domainﺑﻪ ﺁﺩﺭﺱ IPﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ.
ﭘﺮﻭﺗﮑﻞ DNSﺍﺯ ﭘﻮﺭﺕ ۵۳ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺑﻪ ﭘﻮﺭﺕ ۵۳ﮔﻮﺵ ﺩﺍﺩﻩ ﻭ ﺍﻳﻦ ﺍﻧﺘﻈﺎﺭ ﺭﺍ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ ﮐﻪ ﻫﺮ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺍﻱ ﮐﻪ ﺗﻤﺎﻳﻞ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺮﻭﻳﺲ ﻓﻮﻕ ﺭﺍ ﺩﺍﺭﺩ ﺍﺯ ﭘﻮﺭﺕ ﻣﺸﺎﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ
ﻧﻤﺎﻳﺪ .ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﻣﻤﮑﻦ ﺍﺳﺖ ﻣﺠﺒﻮﺭ ﺷﻮﻳﻢ ﺍﺯ ﭘﻮﺭﺕ ﺩﻳﮕﺮﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﺋﻴﻢ. ﻭﺿﻌﻴﺖ ﻓﻮﻕ ﺑﻪ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﻧﺼﺐ ﺷﺪﻩ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ
ﺑﺴﺘﮕﻲ ﺩﺍﺭﺩ.
ﺳﺎﺧﺘﺎﺭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻧﺎﻡ ﺩﺍﻣﻨﻪ ﻫﺎ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺍﻣﺮﻭﺯﻩ ﺑﺮ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﻣﻴﻠﻴﻮﻥ ﻫﺎ ﺳﺎﻳﺖ ﺑﺎ ﺍﺳﺎﻣﻲ Domainﺛﺒﺖ ﺷﺪﻩ ﻭﺟﻮﺩ ﺩﺍﺭﺩ.
ﺷﺎﻳﺪ ﺍﻳﻦ ﺳﻮﺍﻝ ﺑﺮﺍﻱ ﺷﻤﺎ ﺗﺎﮐﻨﻮﻥ ﻣﻄﺮﺡ ﺷﺪﻩ ﺑﺎﺷﺪ ﮐﻪ ﺍﻳﻦ ﺍﺳﺎﻣﻲ ﭼﮕﻮﻧﻪ ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﻣﻲ ﺷﻮﻧﺪ؟ ﺳﺎﺧﺘﺎﺭ DNSﺑﮕﻮﻧﻪ ﺍﻱ ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺍﺳﺖ ﮐﻪ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNS ﺿﺮﻭﺭﺗﻲ ﺑﻪ ﺁﮔﺎﻫﻲ ﺍﺯ ﺗﻤﺎﻣﻲ ﺍﺳﺎﻣﻲ Domainﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ﻧﺪﺍﺷﺘﻪ ﻭ ﺻﺮﻓﺎ" ﻣﻴﺰﺍﻥ ﺁﮔﺎﻫﻲ
221
ﻭﻱ ﺑﻪ ﻳﮏ ﺳﻄﺢ ﺑﺎﻻﺗﺮ ﻭ ﻳﮏ ﺳﻄﺢ ﭘﺎﺋﻴﻦ ﺗﺮ ﺍﺯ ﺧﻮﺩ ﻣﺤﺪﻭﺩ ﻣﻲ ﮔﺮﺩﺩ .ﺷﮑﻞ ﺯﻳﺮ ﺑﺨﺶ
ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺳﺎﺧﺘﺎﺭ ﺳﻠﺴﻠﻪ ﻣﺮﺍﺗﺒﻲ DNSﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ:
، internicﻣﺴﺌﻮﻟﻴﺖ ﮐﻨﺘﺮﻝ ﺩﺍﻣﻨﻪ ﻫﺎﻱ ﺭﻳﺸﻪ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺷﺘﻪ ﮐﻪ ﺷﺎﻣﻞ ﺗﻤﺎﻣﻲ
Domainﻫﺎﻱ ﺳﻄﺢ ﺑﺎﻻ ﻣﻲ ﺑﺎﺷﺪ ) ﺩﺭ ﺷﮑﻞ ﻓﻮﻕ ﺑﻪ ﺭﻧﮓ ﺁﺑﻲ ﻧﺸﺎﻥ ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳﺖ(. ﺩﺭ ﺑﺨﺶ ﻓﻮﻕ ﺗﻤﺎﻣﻲ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ DNSﺭﻳﺸﻪ ﻗﺮﺍﺭ ﺩﺍﺷﺘﻪ ﻭ ﺁﻧﺎﻥ ﺩﺍﺭﺍﻱ ﺁﮔﺎﻫﻲ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺩﺍﻣﻨﻪ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺳﻄﺢ ﭘﺎﺋﻴﻦ ﺗﺮ ﺍﺯ ﺧﻮﺩ ﻣﻲ ﺑﺎﺷﻨﺪ )ﻣﺜﻼ"
.(microsoft.comﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ DNSﺭﻳﺸﻪ ﻣﺸﺨﺺ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ ﮐﻪ ﮐﺪﺍﻡ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺩﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺩﺍﻣﻨﻪ ﻫﺎﻱ microsoft.comﻭ ﻳﺎ Cisco.com ﻣﻲ ﺑﺎﺷﺪ. ﻫﺮ domainﺷﺎﻣﻞ ﻳﮏ Primary DNSﻭ ﻳﮏ Secondary DNSﻣﻲ ﺑﺎﺷﺪ.
، Primary DNSﺗﻤﺎﻣﻲ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺗﺒﻂ ﺑﺎ Domainﺧﻮﺩ ﺭﺍ ﻧﮕﻬﺪﺍﺭﻱ ﻣﻲ ﻧﻤﺎﻳﺪ. Secondary DNSﺑﻪ ﻣﻨﺰﻟﻪ ﻳﮏ backupﺑﻮﺩﻩ ﻭ ﺩﺭ ﻣﻮﺍﺭﺩﻱ ﮐﻪ Primary DNS
ﺑﺎ ﻣﺸﮑﻞ ﻣﻮﺍﺟﻪ ﻣﻲ ﺷﻮﺩ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺑﻪ ﻓﺮﺁﻳﻨﺪﻱ ﮐﻪ ﺑﺮ ﺍﺳﺎﺱ ﺁﻥ ﻳﮏ
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ Primary DNSﺍﻃﻼﻋﺎﺕ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ Secondary DNSﺗﮑﺜﻴﺮ ﻣﻲ ﻧﻤﺎﻳﺪ Zone Transfer ،ﮔﻔﺘﻪ ﻣﻲ ﺷﻮﺩ.
ﺍﻣﺮﻭﺯﻩ ﺻﺪﻫﺎ ﻭﺏ ﺳﺎﻳﺖ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﮐﻪ ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﺎﻥ ﻳﮏ Domainﺭﺍ ﺛﺒﺖ ﻭ ﻳﺎ ﺍﺻﻄﻼﺣﺎ" ﺭﻳﺠﺴﺘﺮ ﻧﻤﻮﺩ .ﭘﺲ ﺍﺯ ﺛﺒﺖ ﻳﮏ ، Domainﺍﻣﮑﺎﻥ ﻣﺪﻳﺮﻳﺖ ﺁﻥ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺷﻤﺎ ﮔﺬﺍﺷﺘﻪ ﺷﺪﻩ ﻭ ﻣﻲ ﺗﻮﺍﻥ ﺭﮐﻮﺭﺩﻫﺎﻱ ﻣﻨﺒﻊ ) ( RRﺭﺍ ﺩﺭ ﺁﻥ ﺗﻌﺮﻳﻒ ﻧﻤﻮﺩ.
222
Support, wwwﻭ ، Routersﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﺍﺯ ﺭﮐﻮﺭﺩﻫﺎﻱ ﻣﻨﺒﻊ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺩﺍﻣﻨﻪ
Cisco.comﻣﻲ ﺑﺎﺷﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ Subdomainﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﻣﺪﻳﺮﻳﺘﻲ DNSﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ www .ﻭ ﻳﺎ ﻫﺮ ﻧﻮﻉ ﺭﮐﻮﺭﺩ ﻣﻨﺒﻊ ﺩﻳﮕﺮﻱ ﺭﺍ ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻓﻮﻕ ﺗﻌﺮﻳﻒ ﻧﻤﻮﺩ .ﭘﺲ ﺍﺯ ﺍﻋﻤﺎﻝ ﺗﻐﻴﻴﺮﺍﺕ ﺩﻟﺨﻮﺍﻩ ﺧﻮﺩ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ
، Domainﻣﺤﺘﻮﻳﺎﺕ ﻓﺎﻳﻞ ﻫﺎﻱ ﺧﺎﺻﻲ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺍﻧﺪ ﻧﻴﺰ
ﺗﻐﻴﻴﺮ ﻧﻤﻮﺩﻩ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﺗﻐﻴﻴﺮﺍﺕ ﻓﻮﻕ ﺑﻪ ﺳﺎﻳﺮ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﺗﺎﺋﻴﺪ ﺷﺪﻩ ﺍﻃﻼﻉ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻓﻮﻕ ،ﻣﺴﺌﻮﻟﻴﺖ Domainﺷﻤﺎ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺷﺘﻪ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ
ﺗﻤﺎﻣﻲ ﺍﻳﻨﺘﺮﻧﺖ ﮐﻪ ﺑﻪ ﺍﻳﻦ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ DNSﻣﺘﺼﻞ ﻣﻲ ﺷﻮﻧﺪ ﺍﺯ ﺗﻐﻴﻴﺮﺍﺕ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺁﮔﺎﻩ ﻭ ﻗﺎﺩﺭ ﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻫﺮ ﻳﮏ ﺍﺯ ﺑﺨﺶ ﻫﺎﻱ Domainﻣﻲ ﮔﺮﺩﻧﺪ. ﻣﺜﻼ" ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻗﺼﺪ ﺍﺭﺗﺒﺎﻁ ﺑﺎ Support.Cisco.comﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ،ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﻤﺎ ﺑﺎ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﮐﻪ ﻣﺴﺌﻮﻟﻴﺖ ﻣﺪﻳﺮﻳﺖ ﺩﺍﻣﻨﻪ ﻫﺎﻱ .Comﺭﺍ ﺩﺍﺭﺩ ،ﺍﺭﺗﺒﺎﻁ
ﺑﺮﻗﺮﺍﺭ ﻧﻤﻮﺩﻩ ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻓﻮﻕ ﺍﻃﻼﻋﺎﺕ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺩﺍﻣﻨﻪ Cisco.comﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺩﺭ ﻧﻬﺎﻳﺖ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﻣﺮﺑﻮﻁ ﺑﻪ Cisco.com ) ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻓﻮﻕ ،ﺗﻤﺎﻣﻲ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺗﺒﻂ ﺑﺎ ﺩﺍﻣﻨﻪ Cisco.comﺭﺍ ﺩﺭ ﺧﻮﺩ
ﻧﮕﻬﺪﺍﺭﻱ ﻣﻲ ﻧﻤﺎﻳﺪ ( ،ﺁﺩﺭﺱ IPﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺮﺑﻮﻁ ﺑﻪ Support.Cisco.comﺭﺍ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻩ ﺗﺎ ﺍﻣﮑﺎﻥ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺁﻥ ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ. ﻧﺤﻮﻩ ﺗﺮﺟﻤﻪ ﺍﺳﺎﻣﻲ Domainﺗﻮﺳﻂ DNS ﺁﻳﺎ ﺗﺎﮐﻨﻮﻥ ﺍﻳﻦ ﺳﻮﺍﻝ ﺑﺮﺍﻱ ﺷﻤﺎ ﻣﻄﺮﺡ ﺷﺪﻩ ﺍﺳﺖ ﮐﻪ ﭘﺲ ﺍﺯ ﺗﺎﻳﭗ ﻧﺎﻡ ﻳﮏ ﺳﺎﻳﺖ ﺩﺭ
ﻣﺮﻭﺭﮔﺮ ﻭﺏ ،ﺁﺩﺭﺱ IPﺁﻥ ﭼﮕﻮﻧﻪ ﭘﻴﺪﺍ ﻣﻲ ﺷﻮﺩ؟ ﺑﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻳﮏ ﺳﺎﻳﺖ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﻗﺒﻞ ﺍﺯ ﻫﺮ ﭼﻴﺰ ﺁﺩﺭﺱ IPﺁﻥ ﻣﺸﺨﺺ ﮔﺮﺩﺩ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺮﺟﻤﻪ ﺍﺳﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ﻭ Domainﺑﻪ ﺁﺩﺭﺱ ﻫﺎﻱ IPﺍﺯ ﭘﺮﻭﺗﮑﻞ DNSﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
223
Queriesﻭ Resolution
ﻳﮏ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ DNSﻭ ﺍﺧﺬ ﭘﺎﺳﺦ ﻻﺯﻡ ﺍﺯ ﺩﻭ ﺭﻭﺵ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ: •
ﺩﺭ ﺭﻭﺵ ﺍﻭﻝ ،ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺑﺎ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻧﺎﻡ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ﻣﺎﺩﺍﻣﻴﮑﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻣﺠﺎﺯ ﺷﺎﻣﻞ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﭘﻴﺪﺍ ﻧﺸﻮﺩ، ﺍﺩﺍﻣﻪ ﺧﻮﺍﻫﺪ ﻳﺎﻓﺖ )ﺭﻭﺵ .( non Recursive query
•
ﺩﺭ ﺭﻭﺵ ﺩﻭﻡ ،ﻣﺎﻣﻮﺭﻳﺖ ﺗﺮﺟﻤﻪ ﻧﺎﻡ ﺑﻪ ﺁﺩﺭﺱ ﺑﻪ DNSﻭﺍﮔﺬﺍﺭ ﻣﻲ ﺷﻮﺩ .ﺩﺭ ﺍﻳﻦ
ﺭﻭﺵ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﺩﺭﺧﻮﺍﺳﺖ ﺧﻮﺩ ﺑﺮﺍﻱ DNSﻧﻤﻮﺩﻩ ﻭ
DNSﭘﺲ ﺍﺯ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺗﻲ ﺧﺎﺹ ﻭ ﻳﺎﻓﺘﻦ ﺁﺩﺭﺱ IPﺳﺎﻳﺖ ﺩﺭﺧﻮﺍﺳﺘﻲ ،ﺁﻥ ﺭﺍ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ )ﺭﻭﺵ .( Recursive query ﺷﮑﻞ ﺯﻳﺮ ﻧﺤﻮﻩ ﺍﻧﺠﺎﻡ ﮐﺎﺭ ﺩﺭ ﺭﻭﺵ ﺩﻭﻡ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ:
224
ﺑﻪ ﻣﻨﻈﻮﺭ ﺁﺷﻨﺎﺋﻲ ﺑﺎ ﻧﺤﻮﻩ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﺑﻪ ﺑﺮﺭﺳﻲ ﻳﮏ ﻧﻤﻮﻧﻪ ﻣﺜﺎﻝ ﻣﻲ ﭘﺮﺩﺍﺯﻳﻢ.
ﺯﻣﺎﻧﻲ ﮐﻪ ﺷﻤﺎ ﻗﺼﺪ ﻣﺸﺎﻫﺪﻩ ﻳﮏ ﻭﺏ ﺳﺎﻳﺖ ﻧﻈﻴﺮﻭﺏ ﺳﺎﻳﺖ) ( www.cisco.comﺭﺍ
ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ، ﭘﺲ ﺍﺯ ﻓﻌﺎﻝ ﻧﻤﻮﺩﻥ ﻣﺮﻭﺭﮔﺮ ﻭﺏ ﻭ ﺗﺎﻳﭗ ﺁﺩﺭﺱ
http://www.cisco.comﻭ ﻳﺎ ، www.cisco.comﭘﺲ ﺍﺯ ﻣﺪﺕ ﺯﻣﺎﻥ ﮐﻮﺗﺎﻫﻲ ! ﺻﻔﺤﻪ ﺍﺻﻠﻲ ﻭﺏ ﺳﺎﻳﺖ ﺩﺭ ﻣﺮﻭﺭﮔﺮ ﺷﻤﺎ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺑﺮﺍﻱ ﻳﺎﻓﺘﻦ ﺁﺩﺭﺱ IPﻭﺏ ﺳﺎﻳﺖ ﺩﺭﺧﻮﺍﺳﺘﻲ ﻣﺮﺍﺣﻞ ﺯﻳﺮ ﺩﻧﺒﺎﻝ ﻣﻲ ﺷﻮﺩ : •
ﻣﺮﺣﻠﻪ ﺍﻭﻝ :ﻓﻌﺎﻝ ﻧﻤﻮﺩﻥ ﻣﺮﻭﺭﮔﺮ ﻭ ﺩﺭﺝ ﺁﺩﺭﺱ www.cisco.comﺩﺭ ﺑﺨﺶ
ﺁﺩﺭﺱ ﺁﻥ .ﺩﺭ ﺍﻳﻦ ﻣﻘﻄﻊ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﻤﺎ ﺩﺍﺭﺍﻱ ﺁﮔﺎﻫﻲ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺁﺩﺭﺱ IP ﻭﺏ ﺳﺎﻳﺖ ﺳﻴﺴﮑﻮ ﻧﻤﻲ ﺑﺎﺷﺪ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﻳﮏ ﺩﺭﺧﻮﺍﺳﺖ DNSﺭﺍ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ
ﺩﻫﻨﺪﻩ DNSﻣﺮﺑﻮﻁ ﺑﻪ ﻣﺮﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﺍﻳﻨﺘﺮﻧﺖ ) ( ISPﺍﺭﺳﺎﻝ ﻣﻲ
ﻧﻤﺎﻳﺪ .ﺣﺘﻤﺎ" ﺍﻳﻦ ﺳﻮﺍﻝ ﺑﺮﺍﻱ ﺷﻤﺎ ﻣﻄﺮﺡ ﺷﺪﻩ ﺍﺳﺖ ﮐﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﭼﻪ ﺻﻮﺭﺕ ﺍﺯ ﺁﺩﺭﺱ IPﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺁﮔﺎﻫﻲ ﻣﻲ ﻳﺎﺑﺪ ﺗﺎ ﺩﺭﺧﻮﺍﺳﺖ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﻭﻱ
ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﺪ ؟ ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺷﻤﺎ ﺍﺯ ﻃﺮﻳﻖ up-Dialﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﺷﺪﻩ ﺍﻳﺪ
،ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻨﻈﻴﻤﺎﺕ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ) ﺍﻳﺴﺘﺎ ﻭ ﭘﻮﻳﺎ ( ﭘﺮﻭﺗﮑﻞ TCP/IP ﻣﺮﺗﺒﻂ ﺑﺎ ﺁﺩﺍﭘﺘﻮﺭ ﻣﺠﺎﺯﻱ up-Dialﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺩﺍﺭﺍﻱ ﻳﮏ ﺍﺗﺼﺎﻝ ﺩﺍﺋﻢ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﺷﺒﮑﻪ ﻣﺤﻠﻲ ﻣﻲ ﺑﺎﺷﻴﺪ ،ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺑﺎ
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯﺗﻨﻈﻴﻤﺎﺕ ﺍﻧﺠﺎﻡ ﺷﺪﻩ )ﺍﻳﺴﺘﺎ ﻭ ﭘﻮﻳﺎ( ﭘﺮﻭﺗﮑﻞ TCP/IPﻣﺮﺗﺒﻂ ﺑﺎ ﺁﺩﺍﭘﺘﻮﺭ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﻣﺮﺣﻠﻪ ﺩﻭﻡ :ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﻣﺮﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺖ ) ( ISPﺷﻤﺎ،
ﺁﺩﺭﺱ IPﻣﺮﺑﻮﻁ ﺑﻪ ﺳﺎﻳﺖ ﺳﻴﺴﮑﻮ ﺭﺍ ﻧﻤﻲ ﺩﺍﻧﺪ ﻭ ﺑﺪﻳﻦ ﺩﻟﻴﻞ ،ﺁﺩﺭﺱ ﺳﺎﻳﺖ ﻓﻮﻕ ﺭﺍ ﺍﺯ ﻳﮑﻲ ﺍﺯ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻧﺎﻡ ﺭﻳﺸﻪ ﺩﺭﺧﻮﺍﺳﺖ ﻣﻲ ﻧﻤﺎﻳﺪ. •
ﻣﺮﺣﻠﻪ ﺳﻮﻡ :ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺭﻳﺸﻪ ،ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﻲ ﺧﻮﺩ ﺭﺍ ﺑﺮﺭﺳﻲ ﻧﻤﻮﺩﻩ ﻭ ﺍﺯ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺍﻭﻟﻴﻪ Cisco.comﺁﮔﺎﻫﻲ ﻣﻲ ﻳﺎﺑﺪ ): IP 225
. ( ١٩٨,١٣٣,٢١٩,٢٥ﭘﺲ ﺍﺯ ﺁﮔﺎﻫﻲ ﺍﺯ ﺁﺩﺭﺱ IPﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﻣﺮﺑﻮﻁ ﺑﻪ ، cisco.comﭘﺎﺳﺦ ﻻﺯﻡ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ISPﺷﻤﺎ ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ.
•
ﻣﺮﺣﻠﻪ ﭼﻬﺎﺭﻡ :ﺩﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﻣﺮﮐﺰ ISPﺷﻤﺎ ﺩﺍﻧﺶ ﻻﺯﻡ
ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺳﻴﺴﮑﻮ ﺭﺍ ﭘﻴﺪﺍ ﻧﻤﻮﺩﻩ ﻭ ﭘﺲ ﺍﺯ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺍﺯ ﻭﻱ ﺁﺩﺭﺱ IPﻭﺏ ﺳﺎﻳﺖ ﺳﻴﺴﮑﻮ ) ( www.cisco.comﺭﺍ ﺟﻮﻳﺎ
ﻣﻲ ﺷﻮﺩ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺷﻤﺎ ﻳﮏ ﺩﺭﺧﻮﺍﺳﺖ Recursiveﺭﺍ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﻣﺮﺑﻮﻁ ﺑﻪ Cisco.comﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ.
•
ﻣﺮﺣﻠﻪ ﭘﻨﺠﻢ :ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺳﻴﺴﮑﻮ ،ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﻲ ﺧﻮﺩ ﺭﺍ ﺑﺮﺭﺳﻲ ﻧﻤﻮﺩﻩ ﻭ ﺍﺯ ﻭﺟﻮﺩ ﺭﮐﻮﺭﺩ www.cisco.comﺩﺭ ﺑﺎﻧﮏ ﺁﮔﺎﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺭﮐﻮﺭﺩ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﻳﮏ ﺁﺩﺭﺱ IPﻣﻌﺎﺩﻝ IP:198.133.219.25ﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ﺧﺎﺹ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﺑﺮ ﺭﻭﻱ ﻣﺎﺷﻴﻦ ﻣﺸﺎﺑﻬﻲ ﺍﺳﺖ ﮐﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﻧﺼﺐ ﺷﺪﻩ ﺍﺳﺖ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ
DNSﺑﺮ ﺭﻭﻱ ﻳﮏ ﻣﺎﺷﻴﻦ ﻣﺸﺎﺑﻪ ﻧﺼﺐ ﻧﺸﺪﻩ ﺑﺎﺷﻨﺪ ،ﺁﺩﺭﺱ IPﺁﻧﺎﻥ ﻣﺘﻔﺎﻭﺕ ﺑﻮﺩﻩ
ﻭ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺍﺯ ﻃﺮﻳﻖ ﺭﮐﻮﺭﺩﻫﺎﻱ ﻣﻨﺒﻊ ﻣﻮﺟﻮﺩ ﺩﺭ ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﻲ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﻣﺸﺨﺺ ﻣﻲ ﮔﺮﺩﺩ. •
ﻣﺮﺣﻠﻪ ﺷﺸﻢ :ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﻣﺮﺑﻮﻁ ﺑﻪ ISPﺷﻤﺎ ﺍﺯ ﺁﺩﺭﺱ IPﻣﺮﺑﻮﻁ ﺑﻪ
www.cisco.comﺁﮔﺎﻫﻲ ﭘﻴﺪﺍ ﻧﻤﻮﺩﻩ ﻭ ﻧﺘـﺎﻳﺞ ﺭﺍ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴـﻮﺗﺮ ﺷــﻤﺎ ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ.
•
ﻣﺮﺣﻠﻪ ﻫﻔﺘﻢ :ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﻤﺎ ﺩﺭ ﺍﻳﻦ ﻣﻘﻄﻊ ﺩﺍﺭﺍﻱ ﺁﮔﺎﻫﻲ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺁﺩﺭﺱ IPﻭﺏ ﺳﺎﻳﺖ ﺳﻴﺴﮑﻮ ﺑﻮﺩﻩ ﻭ ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﺎ ﺁﻥ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻧﻤﺎﻳﺪ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﮐﺎﻣﭙﻴﻮﺗﺮ
ﺷﻤﺎ ﻳﮏ ﺩﺭﺧﻮﺍﺳﺖ httpﺭﺍ ﻣﺴﺘﻘﻴﻤﺎ" ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﺳﻴﺴﮑﻮ ﺍﺭﺳﺎﻝ ﻧﻤﻮﺩﻩ ﻭ ﺍﺯ ﻭﻱ ﺩﺭﺧﻮﺍﺳﺖ ﻳﮏ ﺻﻔﺤﻪ ﻭﺏ ﺭﺍ ﻣﻲ ﻧﻤﺎﻳﺪ.
226
ﺍﺗﺮﻧﺖ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﺭﻭﺵ ﻫﺎﻱ ﻣﻄﻤﺌﻦ ﻭ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ﻳﮑﻲ ﺍﺯ ﺭﻣﻮﺯ ﻣﻮﻓﻘﻴﺖ ﻫـﺮ
ﺳﺎﺯﻣﺎﻥ ﻭ ﻣﻮﺳﺴﻪ ﺍﺳﺖ .ﻃﻲ ﺳﺎﻟﻴﺎﻥ ﺍﺧﻴﺮ ﻫﺰﺍﺭﺍﻥ ﭘﺮﻭﻧﺪﻩ ﻭ ﮐﺎﻏﺬ ﮐﻪ ﺣﺎﻭﻱ ﺍﻃﻼﻋــﺎﺕ ﺑﺎ
ﺍﺭﺯﺵ ﺑﺮﺍﻱ ﻳﮏ ﺳﺎﺯﻣﺎﻥ ﺑﻮﺩﻩ ،ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺍﻧﺪ .ﺑﺎ ﺗﻐﺬﻳﻪ ﺩﺭﻳﺎﺋﻲ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ،ﺍﻣﮑﺎﻥ ﻣﺪﻳﺮﻳﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ﺍﻃﻼﻋﺎﺕ ﻓﺮﺍﻫﻢ ﺷﺪﻩ ﺍﺳﺖ .ﮐﺎﺭﺑﺮﺍﻥ ﻣﺘﻔﺎﻭﺕ ﺩﺭ ﺍﻗﺼﻲ ﻧﻘﺎﻁ ﺟﻬﺎﻥ ﻗﺎﺩﺭﺑﻪ ﺍﺷﺘﺮﺍﮎ ﺍﻃﻼﻋﺎﺕ ﺑﻮﺩﻩ ﻭﺗﺼﻮﻳﺮﻱ ﺯﻳﺒﺎ ﺍﺯ ﻫﻤﻴﺎﺭﻱ ﻭﻫﻤﮑﺎﺭﻱ
ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﻪ ﻧﻤﺎﻳﺶ ﻣﻲ ﮔﺬﺍﺭﻧﺪ.
ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﻭ ﺟﻬﺖ ﻧﻴﻞ ﺑﻪ ﺍﻫﺪﺍﻑ ﻓﻮﻕ ﻧﻘﺶ ﺑﺴﻴﺎﺭ ﻣﻬﻤﻲ ﺭﺍ ﺍﻳﻔﺎﺀ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ.ﺍﻳﻨﺘﺮﻧﺖ ﮐﻪ ﻋﺎﻟﻲ ﺗﺮﻳﻦ ﺗﺒﻠﻮﺭ ﻳﮏ ﺷﺒﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺩﺭ ﺳﻄﺢ ﺟﻬﺎﻥ ﺍﺳﺖ، ﺍﻣﺮﻭﺯﻩ ﺩﺭ ﻣﻘﻴﺎﺱ ﺑﺴﻴﺎﺭ ﮔﺴﺘﺮﺩﻩ ﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﻭ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﮔﺎﻥ ﺍﻃﻼﻋﺎﺕ ،ﺍﻃﻼﻋﺎﺕ ﻭ ﻳﺎ
ﻓﺮﺁﻭﺭﺩﻩ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﻗﺎﻟﺐ ﻣﺤﺼﻮﻻﺕ ﺗﻮﻟﻴﺪﻱ ﻭ ﻳﺎ ﺧﺪﻣﺎﺕ ﺩﺭ ﺍﺧﺘــﻴـﺎﺭ ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻨﺪﮔﺎﻥ ﻗﺮﺍﺭﻣﻲ ﺩﻫﻨﺪ .ﻭﺏ ﮐﻪ ﻋﺎﻟﻲ ﺗﺮﻳﻦ ﺳﺮﻭﻳﺲ ﺧﺪﻣﺎﺗﻲ ﺍﻳﻨﺘﺮﻧﺖ ﻣﻲ ﺑﺎﺷﺪ ﮐﺎﺭﺑﺮﺍﻥ ﺭﺍ ﻗﺎﺩﺭ ﻣﻲ ﺳﺎﺯﺩ ﮐﻪ ﺩﺭ ﺍﻗﺼﻲ ﻧﻘﺎﻁ ﺩﻧﻴﺎ ﺍﻗﺪﺍﻡ ﺑﻪ ﺧﺮﻳﺪ ،ﺁﻣﻮﺯﺵ ،ﻣﻄﺎﻟﻌﻪ ﻭ ...
ﻧﻤﺎﻳﻨﺪ.
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺷﺒﮑﻪ ،ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﻳﮕﺮ ﺍﺳﺖ .ﺍﻳﻨﺘﺮﻧﺖ ﻧﻤﻮﻧﻪ ﺍﻱ ﻋﻴﻨﻲ ﺍﺯ ﻳﮏ ﺷﺒﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﺷﺒﮑﻪ ﻣﻴﻠﻴﻮﻥ ﻫﺎ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺭ ﺍﻗﺼﻲ ﻧﻘﺎﻁ ﺟﻬﺎﻥ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﺷﺪﻩ ﺍﻧﺪ.ﺍﻳﻨﺘﺮﻧﺖ ﺷﺒﮑﻪ ﺍﻱ ﺍﺳﺖ ﻣﺸﺘﻤﻞ
ﺑﺮ ﺯﻧﺠﻴﺮﻩ ﺍﻱ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﻮﭼﮑﺘﺮﺍﺳﺖ .ﻧﻘﺶ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﻮﭼﮏ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺗﺼﻮﻳﺮﻱ ﺑﺎ ﻧﺎﻡ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺴﻴﺎﺭ ﺣﺎﺋﺰ ﺍﻫﻤﻴﺖ ﺍﺳﺖ .ﺗﺼﻮﻳﺮﻱ ﮐﻪ ﻫﺮ ﮐﺎﺭﺑﺮ ﺑﺎ ﻧﮕﺎﻩ ﮐﺮﺩﻥ ﺑﻪ ﺁﻥ ﮔﻤﺸﺪﻩ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺁﻥ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺩﺭ ﺍﻳﻦ ﺑﺨﺶ ﺑﻪ ﺑﺮﺭﺳﻲ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﻭ ﺟﺎﻳﮕﺎﻩ
ﻣﻬﻢ ﺁﻧﺎﻥ ﺩﺭ ﺯﻣﻴﻨﻪ ﺗﮑﻨﻮﻟﻮﮊﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﻣﺪﻳﺮﻳﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ﺍﻃﻼﻋﺎﺕ ﺧﻮﺍﻫﻴﻢ ﺩﺍﺷﺖ.
227
ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺤﻠﻲ ﻭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮔﺴﺘﺮﺩﻩ
ﺗﺎﮐﻨﻮﻥ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺑﺮ ﺍﺳﺎﺱ ﻣﻮﻟﻔﻪ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺗﻘﺴﻴﻢ ﺑﻨﺪﻱ ﺷﺪﻩ ﺍﻧﺪ.
ﻳﮑﻲ ﺍﺯ ﺍﻳﻦ ﻣﻮﻟﻔﻪ ﻫﺎ " ﺣﻮﺯﻩ ﺟﻐﺮﺍﻓﻴﺎﺋﻲ " ﻳﮏ ﺷﺒﮑﻪ ﺍﺳﺖ .ﺑﺮ ﻫﻤﻴﻦ ﺍﺳﺎﺱ ﺷﺒﮑﻪ ﻫﺎ ﺑﻪ ﺩﻭ ﮔﺮﻭﻩ ﻋﻤﺪﻩ (Local area network(LANﻭ Wide area (WAN
(networkﺗﻘﺴﻴﻢ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ LANﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺣﻮﺯﻩ ﺟﻐﺮﺍﻓﻴﺎﺋﻲ ﻣﺤﺪﻭﺩ ،ﻧﻈﻴﺮ ﻳﮏ ﺳﺎﺧﺘﻤﺎﻥ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺩﺭ
ﺷﺒﮑﻪ ﻫﺎﻱ WANﺗﻌﺪﺍﺩﻱ ﺩﺳﺘﮕﺎﻩ ﮐﻪ ﺍﺯ ﻳﮑﺪﻳﮕﺮ ﮐﻴﻠﻮﻣﺘﺮﻫﺎ ﻓﺎﺻﻠﻪ ﺩﺍﺭﻧﺪ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﻣﺜﻼ" ﺍﮔﺮ ﺩﻭ ﮐﺘﺎﺑﺨﺎﻧﻪ ﮐﻪ ﻫﺮ ﻳﮏ ﺩﺭ ﻳﮏ ﻧﺎﺣﻴﻪ ﺍﺯ ﺷﻬﺮ ﺑﺰﺭﮔﻲ ﻣﺴﺘﻘﺮ
ﻣﻲ ﺑﺎﺷﻨﺪ ،ﻗﺼﺪ ﺍﺷﺘﺮﺍﮎ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺷﺒﮑﻪ ﺍﻱ WANﺍﻳﺠﺎﺩ ﻭ ﮐﺘﺎﺑﺨﺎﻧﻪ ﻫﺎ ﺭﺍ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻧﻤﻮﺩ .ﺑﺮﺍﻱ ﺍﺗﺼﺎﻝ ﺩﻭ ﮐﺘﺎﺑﺨﺎﻧﻪ ﻓﻮﻕ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺍﻣﮑﺎﻧﺎﺕ
ﻣﺨﺎﺑﺮﺍﺗﻲ ﻣﺘﻔﺎﻭﺗﻲ ﻧﻈﻴﺮ ﺧﻄﻮﻁ ﺍﺧﺘﺼﺎﺻﻲ ) (Leasedﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﺷﺒﮑﻪ ﻫﺎﻱ LAN
ﻧﺴﺒﺖ ﺑﻪ ﺷﺒﮑﻪ ﻫﺎﻱ WANﺩﺍﺭﺍﻱ ﺳﺮﻋﺖ ﺑﻴﺸﺘﺮﻱ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺑﺎ ﺭﺷﺪ ﻭ ﺗﻮﺳﻌﻪ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﺘﻔﺎﻭﺕ ﻣﺨﺎﺑﺮﺍﺗﻲ ﻣﻴﺰﺍﻥ ﺳﺮﻋﺖ ﺷﺒﮑﻪ ﻫﺎﻱ ،WANﺗﻐﻴﻴﺮ ﻭ ﺑﻬﺒﻮﺩ ﭘﻴﺪﺍ ﮐﺮﺩﻩ
ﺍﺳﺖ .ﺍﻣﺮﻭﺯﻩ ﺑﺎ ﺑﮑﺎﺭﮔﻴﺮﻱ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ LANﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﺘﻌﺪﺩ ﮐﻪ ﺩﺭ ﻣﺴﺎﻓﺖ ﻫﺎﻱ ﻃﻮﻻﻧﻲ ﻧﺴﺒﺖ ﺑﻴﮑﺪﻳﮕﺮ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ ،ﻓﺮﺍﻫﻢ ﺷﺪﻩ ﺍﺳﺖ.
ﺍﺗﺮﻧﺖ ﺩﺭ ﺳﺎﻝ ١٩٧٣ﭘﮋﻭﻫﺸﮕﺮﻱ ﺑﺎ ﻧﺎﻡ " "Metcalfeﺩﺭ ﻣﺮﮐﺰ ﺗﺤﻘﻴﻘﺎﺕ ﺷﺮﮐﺖ ﺯﻳﺮﺍﮐﺲ ،ﺍﻭﻟﻴﻦ ﺷﺒﮑﻪ ﺍﺗﺮﻧﺖ ﺭﺍ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩ .ﻫﺪﻑ ﻭﻱ ﺍﺭﺗﺒﺎﻁ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﻳﮏ ﭼﺎﭘﮕﺮ
ﺑﻮﺩ .ﻭﻱ ﺭﻭﺷﻲ ﻓﻴﺰﻳﮑﻲ ﺑﻪ ﻣﻨﻈﻮﺭ ﮐﺎﺑﻞ ﮐﺸﻲ ﺑﻴﻦ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﺘﺼﻞ ﺑﻬﻢ ﺩﺭ ﺍﺗﺮﻧﺖ ﺍﺭﺍﺋﻪ ﻧﻤﻮﺩ .ﺍﺗﺮﻧﺖ ﺩﺭ ﻣﺪﺕ ﺯﻣﺎﻥ ﮐﻮﺗﺎﻫﻲ ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﮑﻲ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﺭﺍﻳﺞ ﺑﺮﺍﻱ ﺑﺮﭘﺎﺳﺎﺯﻱ ﺷﺒﮑﻪ ﺩﺭ ﺳﻄﺢ ﺩﻧﻴﺎ ﻣﻄﺮﺡ ﮔﺮﺩﻳﺪ .ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﭘﻴﺸﺮﻓﺖ ﻫﺎﻱ ﻣﻬﻢ ﺩﺭ ﺯﻣﻴﻨﻪ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ،ﺗﺠﻬﻴﺰﺍﺕ ﻭ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ،ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﻧﻴﺰ ﻫﻤﮕﺎﻡ ﺑﺎ
ﺗﺤﻮﻻﺕ ﻓﻮﻕ ﺷﺪﻩ ﻭ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺭﺍ ﺩﺭ ﺑﻄﻦ ﺧﻮﺩ ﺍﻳﺠﺎﺩ ﻧﻤﻮﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ 228
ﺗﻐﻴﻴﺮﺍﺕ ﻭ ﺍﺻﻼﺣﺎﺕ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ،ﻋﻤﻠﮑﺮﺩ ﻭ ﻧﺤﻮﻩ ﮐﺎﺭ ﺁﻧﺎﻥ ﻧﺴﺒﺖ
ﺑﻪ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﻭﻟﻴﻪ ﺗﻔﺎﻭﺕ ﭼﻨﺪﺍﻧﻲ ﻧﮑﺮﺩﻩ ﺍﺳﺖ .ﺩﺭ ﺍﺗﺮﻧﺖ ﺍﻭﻟﻴﻪ ،ﺍﺭﺗﺒﺎﻁ ﺗﻤﺎﻡ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﮐﺎﺑﻞ ﺍﻧﺠﺎﻡ ﻣﻲ ﮔﺮﻓﺖ ﮐﻪ ﺗﻮﺳﻂ ﺗﻤﺎﻡ ﺩﺳﺘﮕﺎﻫﻬﺎ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﮔﺬﺍﺷﺘﻪ ﻣﻲ ﮔﺮﺩﻳﺪ .ﭘﺲ ﺍﺯ ﺍﺗﺼﺎﻝ ﻳﮏ ﺩﺳﺘﮕﺎﻩ ﺑﻪ ﮐﺎﺑﻞ ﻣﺸﺘﺮﮎ ،ﻣﻲ ﺑﺎﻳﺴﺖ
ﭘﺘﺎﻧﺴﻴﻞ ﻫﺎﻱ ﻻﺯﻡ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﺎﻳﺮ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﺮﺑﻮﻃﻪ ﻧﻴﺰ ﺩﺭ ﺑﻄﻦ ﺩﺳﺘﮕﺎﻩ
ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ )ﮐﺎﺭﺕ ﺷﺒﮑﻪ ( .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺍﻣﮑﺎﻥ ﮔﺴﺘﺮﺵ ﺷﺒﮑﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﭼﺪﻳﺪ ﺑﺮﺍﺣﺘﻲ ﺍﻧﺠﺎﻡ ﻭ ﻧﻴﺎﺯﻱ ﺑﻪ ﺍﻋﻤﺎﻝ ﺗﻐﻴﻴﺮﺍﺕ ﺑﺮ ﺭﻭﻱ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ.
ﺍﺗﺮﻧﺖ ﻳﮏ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻣﺤﻠﻲ ) (LANﺍﺳﺖ .ﺍﮐﺜﺮ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﻭﻟﻴﻪ ﺩﺭ ﺣﺪ ﻭ ﺍﻧﺪﺍﺯﻩ ﻳﮏ ﺳﺎﺧﺘﻤﺎﻥ ﺑﻮﺩﻩ ﻭ ﺩﺳﺘﮕﺎﻫﻬﺎ ﻧﺰﺩﻳﮏ ﺑﻪ ﻫﻢ ﺑﻮﺩﻧﺪ .ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺷﺒﮑﻪ
ﺍﺗﺮﻧﺖ ﺻﺮﻓﺎ" ﻗﺎﺩﺭ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭼﻨﺪ ﺻﺪ ﻣﺘﺮ ﮐﺎﺑﻞ ﺑﻴﺸﺘﺮﻧﺒﻮﺩﻧﺪ.ﺍﺧﻴﺮﺍ" ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺗﻮﺳﻌﻪ ﺍﻣﮑﺎﻧﺎﺕ ﻣﺨﺎﺑﺮﺍﺗﻲ ﻭ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ،ﺯﻣﻴﻨﻪ ﺍﺳﺘﻘﺮﺍﺭ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺍﺗﺮﻧﺖ ﺑﺎ ﻣﺴﺎﻓﺖ ﻫﺎﻱ ﭼﻨﺪ ﮐﻴﻠﻮﻣﺘﺮﻧﻴﺰ ﻓﺮﺍﻫﻢ ﺷﺪﻩ ﺍﺳﺖ.
ﭘﺮﻭﺗﮑﻞ
ﭘﺮﻭﺗﮑﻞ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺑﻪ ﻣﺠﻤﻮﻋﻪ ﻗﻮﺍﻧﻴﻨﻲ ﺍﻃﻼﻕ ﻣﻲ ﮔﺮﺩﺩ ﮐﻪ ﻧﺤﻮﻩ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺭﺍ ﻗﺎﻧﻮﻧﻤﻨﺪ ﻣﻲ ﻧﻤﺎﻳﺪ .ﻧﻘﺶ ﭘﺮﻭﺗﮑﻞ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻧﻈﻴﺮ ﻧﻘﺶ ﺯﺑﺎﻥ ﺑﺮﺍﻱ ﺍﻧﺴﺎﻥ ﺍﺳﺖ .ﺑﺮﺍﻱ ﻣﻄﺎﻟﻌﻪ ﻳﮏ ﮐﺘﺎﺏ ﻧﻮﺷﺘﻪ ﺷﺪﻩ ﺑﻪ ﻓﺎﺭﺳﻲ ﻣﻲ ﺑﺎﻳﺴﺖ ﺧﻮﺍﻧﻨﺪﻩ ﺷﻨﺎﺧﺖ ﻣﻨﺎﺳﺒﻲ
ﺍﺯ ﺯﺑﺎﻥ ﻓﺎﺭﺳﻲ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﻣﻮﻓﻘﻴﺖ ﺁﻣﻴﺰ ﺩﻭ ﺩﺳﺘــﮕﺎﻩ ﺩﺭ ﺷــــﺒﮑﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﻫﺮ ﺩﻭ ﺩﺳﺘﮕﺎﻩ ﺍﺯ ﻳﮏ ﭘﺮﻭﺗﮑﻞ ﻣﺸﺎﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ.
ﺍﺻﻄﻼﺣﺎﺕ ﺍﺗﺮﻧﺖ
ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﺍﺯ ﻣﺠﻤﻮﻋﻪ ﻗﻮﺍﻧﻴﻦ ﻣﺤﺪﻭﺩﻱ ﺑﻪ ﻣﻨﻈﻮﺭ ﻗﺎﻧﻮﻧﻤﻨﺪ ﮐﺮﺩﻥ ﻋﻤﻠﻴﺎﺕ
ﺍﺳﺎﺳﻲ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺷﻨﺎﺧﺖ ﻣﻨﺎﺳﺐ ﻗﻮﺍﻧﻴﻦ ﻣﻮﺟﻮﺩ ﻻﺯﻡ ﺍﺳﺖ ﮐﻪ ﺑﺎ ﺑﺮﺧﻲ ﺍﺯ ﺍﺻﻄﻼﺣﺎﺕ ﻣﺮﺑﻮﻃﻪ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺑﻴﺸﺘﺮ ﺁﺷﻨﺎ ﺷﻮﻳﻢ:
229
•
) Mediumﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ( .ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺍﺗﺮﻧﺖ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺑﻪ
•
) Segmentﺳﮕﻤﻨﺖ ( .ﺑﻪ ﻳﮏ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﮔﺬﺍﺷﺘﻪ ﺷﺪﻩ ﻣﻨﻔﺮﺩ" ،
ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ. ﺳﮕﻤﻨﺖ " ﻣﻲ ﮔﻮﻳﻨﺪ.
•
) Nodeﮔﺮﻩ ( .ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ ﻳﮏ Segmentﺭﺍ ﮔﺮﻩ ﻭ ﻳﺎ " ﺍﻳﺴﺘﮕﺎﻩ " ﻣﻲ ﮔﻮﻳﻨﺪ.
•
) Frameﻓﺮﻳﻢ( .ﺑﻪ ﻳﮏ ﺑﻼﮎ ﺍﻃﻼﻋﺎﺕ ﮐﻪ ﮔﺮﻩ ﻫﺎ ﺍﺯ ﻃﺮﻳﻖ ﺍﺭﺳﺎﻝ ﺁﻧﻬﺎ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻣﺮﺗﺒﻂ ﻣﻲ ﮔﺮﺩﻧﺪ ،ﺍﻃﻼﻕ ﻣﻲ ﮔﺮﺩﺩ
ﻓﺮﻳﻢ ﻫﺎ ﻣﺸﺎﺑﻪ ﺟﻤﻼﺕ ﺩﺭ ﺯﺑﺎﻧﻬﺎﻱ ﻃﺒﻴﻌﻲ ) ﻓﺎﺭﺳﻲ ،ﺍﻧﮕﻠﻴﺴﻲ ( ...ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﻫﺮ ﺯﺑﺎﻥ ﻃﺒﻴﻌﻲ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺟﻤﻼﺕ ،ﻣﺠﻤﻮﻋﻪ ﻗﻮﺍﻧﻴﻨﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﻣﺜﻼ" ﻳﮏ ﺟﻤﻠﻪ ﻣﻲ ﺑﺎﻳﺴﺖ
ﺩﺍﺭﺍﻱ ﻣﻮﺿﻮﻉ ﻭ ﻣﻔﻬﻮﻡ ﺑﺎﺷﺪ .ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﻣﺠﻤﻮﻋﻪ ﻗﻮﺍﻧﻴﻦ ﻻﺯﻡ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻓﺮﻳﻢ
ﻫﺎ ﺭﺍ ﻣﺸﺨﺺ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ .ﺍﻧﺪﺍﺯﻩ ﻳﮏ ﻓﺮﻳﻢ ﻣﺤﺪﻭﺩ ﺑﻮﺩﻩ ) ﺩﺍﺭﺍﻱ ﻳﮏ ﺣﺪﺍﻗﻞ ﻭ ﻳﮏ ﺣﺪﺍﮐﺜﺮ ( ﻭ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺿﺮﻭﺭﻱ ﻭ ﻣﻮﺭﺩ ﻧﻴﺎﺭ ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺭ ﻓﺮﻳﻢ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ .ﻣﺜﻼ" ﻳﮏ ﻓﺮﻳﻢ ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺍﺭﺍﻱ ﺁﺩﺭﺱ ﻫﺎﻱ ﻣﺒﺪﺍﺀ ﻭ ﻣﻘﺼﺪ ﺑﺎﺷﺪ .ﺁﺩﺭﺱ
ﻫﺎﻱ ﻓﻮﻕ ﻫﻮﻳﺖ ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﭘﻴﺎﻡ ﺭﺍ ﻣﺸﺨﺺ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺁﺩﺭﺱ ﺑﺼﻮﺭﺕ ﮐﺎﻣﻼ" ﺍﺧﺘﺼﺎﺻﻲ ﻳﮏ ﮔﺮﻩ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ ).ﻧﻈﻴﺮ ﻧﺎﻡ ﻳﮏ ﺷﺨﺺ ﮐﻪ ﺑﻴﺎﻧﮕﺮ ﻳﮏ ﺷﺨﺺ ﺧﺎﺹ ﺍﺳﺖ ( .ﺩﻭ ﺩﺳﺘﮕﺎﻩ ﻣﺘﻔﺎﻭﺕ ﺍﺗﺮﻧﺖ ﻧﻤﻲ ﺗﻮﺍﻧﻨﺪ ﺩﺍﺭﺍﻱ ﺁﺩﺭﺱ ﻫﺎﻱ ﻳﮑﺴﺎﻧﻲ
ﺑﺎﺷﻨﺪ.
ﻳﮏ ﺳﻴﮕﻨﺎﻝ ﺍﺗﺮﻧﺖ ﺑﺮ ﺭﻭﻱ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺑﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﮔﺮﻩ ﻫﺎﻱ ﻣﺘﺼﻞ ﺷﺪﻩ ﺩﺭ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺧﻮﺍﻫﺪ ﺭﺳﻴﺪ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﺸﺨﺺ ﺷﺪﻥ ﺁﺩﺭﺱ ﻣﻘﺼﺪ ،ﺑﻪ ﻣﻨﻈﻮﺭﺩﺭﻳﺎﻓﺖ ﭘﻴﺎﻡ ﻧﻘﺸﻲ
230
ﺣﻴﺎﺗﻲ ﺩﺍﺭﺩ .ﻣﺜﻼ" ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ) Bﺷﮑﻞ ﺑﺎﻻ( ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﺮﺍﻱ ﭼﺎﭘﮕﺮ C
ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ Aﻭ Dﻧﻴﺰ ﻓﺮﻳﻢ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻭ ﺁﻥ ﺭﺍ ﺑﺮﺭﺳﻲ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ.
ﻫﺮ ﺍﻳﺴﺘﮕﺎﻩ ﺯﻣﺎﻧﻴﮑﻪ ﻓﺮﻳﻢ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻣﻲ ﺩﺍﺭﺩ ،ﺁﺩﺭﺱ ﺁﻥ ﺭﺍ ﺑﺮﺭﺳﻲ ﺗﺎ ﻣﻄﻤﺌﻦ ﮔﺮﺩﺩ ﮐﻪ ﭘﻴﺎﻡ ﺑﺮﺍﻱ ﻭﻱ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺍﺳﺖ ﻳﺎ ﺧﻴﺮ؟ ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﭘﻴﺎﻡ ﺑﺮﺍﻱ ﺍﻳﺴﺘﮕﺎﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺭﺳﺎﻝ
ﻧﺸﺪﻩ ﺑﺎﺷﺪ ،ﺍﻳﺴﺘﮕﺎﻩ ﻓﺮﻳﻢ ﺭﺍ ﺑﺪﻭﻥ ﺑﺮﺭﺳﻲ ﻣﺤﺘﻮﻳﺎﺕ ﺁﻥ ﮐﻨﺎﺭﺧﻮﺍﻫﺪﮔـــﺬﺍﺷﺖ)ﻋﺪﻡ ﺍﺳﺘﻔﺎﺩﻩ (. ﻳﮑﻲ ﺍﺯ ﻧﮑﺎﺕ ﻗﺎﺑﻞ ﺗﻮﺟﻪ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺁﺩﺭﺱ ﺩﻫﻲ ﺍﺗﺮﻧﺖ ،ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻳﮏ ﺁﺩﺭﺱ Broadcastﺍﺳﺖ .ﺯﻣﺎﻧﻴﮑﻪ ﺁﺩﺭﺱ ﻣﻘﺼﺪ ﻳﮏ ﻓﺮﻳﻢ ﺍﺯ ﻧﻮﻉ Broadcastﺑﺎﺷﺪ ،ﺗﻤﺎﻡ ﮔﺮﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺁﻥ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻭ ﭘﺮﺩﺍﺯﺵ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ. CSMA/CD ﺗﮑﻨﻮﻟﻮﮊﻱ carrier-sense multiple access with collision( CSMA/CD ( detectionﻣﺴﺌﻮﻟﻴﺖ ﺗﺸﺮﻳﺢ ﻭ ﺗﻨﻈﻴﻢ ﻧﺤﻮﻩ ﺍﺭﺗﺒﺎﻁ ﮔﺮﻩ ﻫﺎ ﺑﺎ ﻳﮑﺪﻳﮕﺮﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ .ﺑﺎ ﺍﻳﻨﮑﻪ ﻭﺍﮊﻩ ﻓﻮﻕ ﭘﻴﭽﻴﺪﻩ ﺑﻨﻈﺮ ﻣﻲ ﺁﻳﺪ ﻭﻟﻲ ﺑﺎ ﺗﻘﺴﻴﻢ ﻧﻤﻮﺩﻥ ﻭﺍﮊﻩ ﻓﻮﻕ ﺑﻪ ﺑﺨﺶ ﻫﺎﻱ
ﮐﻮﭼﮑﺘﺮ ،ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﻧﻘﺶ ﻫﺮ ﻳﮏ ﺍﺯ ﺁﻧﻬﺎ ﺳﺮﻳﻌﺘﺮ ﺁﺷﻨﺎ ﮔﺮﺩﻳﺪ.
ﺑﻪ ﻣﻨﻈﻮﺭ ﺷﻨﺎﺧﺖ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﻣﺜﺎﻝ ﺯﻳﺮ ﺭﺍ ﺩﻧﺒﺎﻝ ﻣﻲ ﻧﻤﺎﺋﻴﻢ. ﻓﺮﺽ ﮐﻨﻴﺪ ﺳﮕﻤﻨﺖ ﺍﺗﺮﻧﺖ ،ﻣﺸﺎﺑﻪ ﻳﮏ ﻣﻴﺰ ﻧﺎﻫﺎﺭﺧﻮﺭﻱ ﺑﺎﺷﺪ .ﭼﻨﺪﻳﻦ ﻧﻔﺮ )ﻧﻈﻴﺮ ﮔﺮﻩ( ﺩﻭﺭ ﺗﺎ ﺩﻭﺭ ﻣﻴﺰ ﻧﺸﺴﺘﻪ ﻭ ﺑﻪ ﮔﻔﺘﮕﻮ ﻣﺸﻐﻮﻝ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻭﺍﮊﻩ multiple access
)ﺩﺳﺘﻴﺎﺑﻲ ﭼﻨﺪﮔﺎﻧﻪ( ﺑﺪﻳﻦ ﻣﻔﻬﻮﻡ ﺍﺳﺖ ﮐﻪ :ﺯﻣﺎﻧﻴﮑﻪ ﻳﮏ ﺍﻳﺴﺘﮕﺎﻩ ﺍﺗﺮﻧﺖ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ ﺗﻤﺎﻡ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﺩﻳﮕﺮ ﻣﻮﺟﻮﺩ ) ﻣﺘﺼﻞ ( ﺩﺭ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ،ﻧﻴﺰ ﺍﺯ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺁﮔﺎﻩ ﺧﻮﺍﻫﻨﺪ ﺷﺪ.).ﻧﻈﻴﺮ ﺻﺤﺒﺖ ﮐﺮﺩﻥ ﻳﮏ ﻧﻔﺮ ﺩﺭ ﻣﻴﺰ ﻧﺎﻫﺎﺭ ﺧﻮﺭﻱ ﻭ ﮔﻮﺵ ﺩﺍﺩﻥ ﺳﺎﻳﺮﻳﻦ ( .ﻓﺮﺽ ﮐﻨﻴﺪ ﮐﻪ ﺷﻤﺎ ﻧﻴﺰ ﺑﺮ ﺭﻭﻱ ﻳﮑﻲ ﺍﺯ ﺻﻨﺪﻟﻲ ﻫﺎﻱ ﻣﻴﺰ ﻧﺎﻫﺎﺭ ﺧﻮﺭﻱ ﻧﺸﺴﺘﻪ ﻭ ﻗﺼﺪ ﺣﺮﻑ ﺯﺩﻥ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ،ﺩﺭ ﻫﻤﺎﻥ ﺯﻣﺎﻥ ﻓﺮﺩ ﺩﻳﮕﺮﻱ ﺩﺭ ﺣﺎﻝ ﺳﺨﻦ ﮔﻔﺘﻦ ﺍﺳﺖ ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ﻣﻲ ﺑﺎﻳﺴﺖ ﺷﻤﺎ ﺩﺭ ﺍﻧﺘﻈﺎﺭ ﺍﺗﻤﺎﻡ ﺳﺨﻨﺎﻥ ﮔﻮﻳﻨﺪﻩ ﺑﺎﺷﻴﺪ .ﺩﺭ ﭘﺮﻭﺗﮑﻞ ﺍﺗﺮﻧﺖ ﻭﺿﻌﻴﺖ
ﻓﻮﻕ carrier senseﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ.ﻗﺒﻞ ﺍﺯ ﺍﻳﻨﮑﻪ ﺍﻳﺴﺘﮕﺎﻫﻲ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ
231
ﺑﺎﺷﺪ ﻣﻲ ﺑﺎﻳﺴﺖ ﮔﻮﺵ ﺧﻮﺩ ﺭﺍ ﺑﺮ ﺭﻭﻱ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﮔﺬﺍﺷﺘﻪ ﻭ ﺑﺮﺭﺳﻲ ﻧﻤﺎﻳﺪ ﮐﻪ ﺁﻳﺎ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺁﺯﺍﺩ ﺍﺳﺖ؟ ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺻﺪﺍﺋﻲ ﺍﺯ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺑﻪ ﮔﻮﺵ ﺍﻳﺴﺘﮕﺎﻩ ﻣﺘﻘﺎﺿﻲ ﺍﺭﺳﺎﻝ
ﺍﻃﻼﻋﺎﺕ ﻧﺮﺳﺪ ،ﺍﻳﺴﺘﮕﺎﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﻗﺎﺩﺭ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﻭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
access Carrier-sense multipleﺷــﺮﻭﻉ ﻳﮏ ﮔﻔﺘﮕﻮ ﺭﺍ ﻗﺎﻧﻮﻧﻤﻨﺪ ﻭ ﺗﻨﻈــﻴﻢ ﻣﻲ ﻧﻤﺎﻳﺪ ﻭﻟﻲ ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﻳﮏ ﻧﮑﺘﻪ ﺩﻳﮕﺮ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﮐﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺮﺍﻱ ﺁﻥ ﻧﻴﺰ ﺭﺍﻫﮑﺎﺭﻱ ﺍﺗﺨﺎﺫ ﺷﻮﺩ.ﻓﺮﺽ ﮐﻨﻴﺪ ﺩﺭ ﻣﺜﺎﻝ ﻣﻴﺰ ﻧﺎﻫﺎﺭ ﺧﻮﺭﻱ ﺩﺭ ﻳﮏ ﻟﺤﻈﻪ ﺳﮑﻮﺗﻲ ﺣﺎﮐﻢ
ﺷﻮﺩ ﻭ ﺩﻭ ﻧﻔﺮ ﻧﻴﺰ ﻗﺼﺪ ﺣﺮﻑ ﺯﺩﻥ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ.ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﺩﺭ ﻳﮏ ﻟﺤﻈﻪ ﺳﮑﻮﺕ ﻣﻮﺟﻮﺩ ﺗﻮﺳﻂ ﺩﻭ ﻧﻔﺮ ﺗﺸﺨﻴﺺ ﻭ ﺑﻼﻓﺎﺻﻠﻪ ﻫﺮ ﺩﻭ ﺗﻘﺮﻳﺒﺎ" ﺩﺭ ﻳﮏ ﺯﻣﺎﻥ ﻳﮑﺴﺎﻥ ﺷﺮﻭﻉ
ﺑﻪ ﺣﺮﻑ ﺯﺩﻥ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.ﭼﻪ ﺍﺗﻔﺎﻗﻲ ﺧﻮﺍﻫﺪ ﺍﻓﺘﺎﺩ؟ ﺩﺭ ﺍﺗﺮﻧﺖ ﭘﺪﻳﺪﻩ ﻓﻮﻕ ﺭﺍ ﺗﺼﺎﺩﻡ
) (Collisionﻣﻲ ﮔﻮﻳﻨﺪ ﻭ ﺯﻣﺎﻧﻲ ﺍﺗﻔﺎﻕ ﺧﻮﺍﻫﺪ ﺍﻓﺘﺎﺩ ﮐﻪ ﺩﻭ ﺍﻳﺴﺘﮕﺎﻩ ﻗﺼﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﻭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﺼﻮﺭﺕ ﻫﻤﺰﻣﺎﻥ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ .ﺩﺭ ﮔﻔﺘﮕﻮﻱ ﺍﻧﺴﺎﻥ ﻫﺎ،
ﻣﺸﮑﻞ ﻓﻮﻕ ﺭﺍ ﻣﻲ ﺗﻮﺍﻥ ﺑﺼﻮﺭﺕ ﮐﺎﻣﻼ" ﺩﻭﺳﺘﺎﻧﻪ ﺣﻞ ﻧﻤﻮﺩ .ﻣﺎ ﺳﮑﻮﺕ ﺧﻮﺍﻫﻴﻢ ﮐﺮﺩ ﺗﺎ ﺍﻳﻦ ﺷﺎﻧﺲ ﺑﻪ ﺳﺎﻳﺮﻳﻦ ﺑﺮﺍﻱ ﺣﺮﻑ ﺯﺩﻥ ﺩﺍﺩﻩ ﺷﻮﺩ .ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﺩﺭ ﺯﻣﺎﻥ ﺣﺮﻑ ﺯﺩﻥ ﻣﻦ، ﺩﻳﮕﺮﺍﻥ ﺍﻳﻦ ﻓﺮﺻﺖ ﺭﺍ ﺑﺮﺍﻱ ﻣﻦ ﺍﻳﺠﺎﺩ ﮐﺮﺩﻩ ﺑﻮﺩﻧﺪ! ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﺍﺗﺮﻧﺖ ﺯﻣﺎﻧﻴﮑﻪ ﻗﺼﺪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ،ﺑﻪ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﮔﻮﺵ ﻓﺮﺍ ﺩﺍﺩﻩ ﺗﺎ ﺑﻪ ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ ﺑﺮﺳﻨﺪ ﮐﻪ ﺗﻨﻬﺎ ﺍﻳﺴﺘﮕﺎﻩ ﻣﻮﺟﻮﺩ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ
ﺍﺭﺳﺎﻝ ﮐﻨﻨﺪﻩ ﺍﻃﻼﻋﺎﺕ ﻣﺘﻮﺟﻪ ﻧﻘﺺ ﺩﺭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺧﻮﺩ ﮔﺮﺩﻧﺪ ،ﺍﺯ ﺑﺮﻭﺯ ﻳﮏ ﺗﺼﺎﺩﻡ ﺩﺭ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺁﮔﺎﻩ ﺧﻮﺍﻫﻨﺪ ﮔﺮﺩﻳﺪ .ﺩﺭ ﺯﻣﺎﻥ ﺑﺮﻭﺯ ﺗﺼﺎﺩﻡ ،ﻫﺮ ﻳﮏ ﺍﺯ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ
ﻣﺮﺑﻮﻃﻪ ﺑﻪ ﻣﺪﺕ ﺯﻣﺎﻧﻲ ﮐﺎﻣﻼ" ﺗﺼﺎﺩﻓﻲ ﺩﺭ ﺣﺎﻟﺖ ﺍﻧﺘﻈﺎﺭ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﻭ ﭘﺲ ﺍﺯ ﺍﺗﻤﺎﻡ ﺯﻣﺎﻥ
ﺍﻧﺘﻈﺎﺭ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺷﺮﻁ ﺁﺯﺍﺩ ﺑﻮﺩﻥ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺭﺍ ﺑﺮﺭﺳﻲ ﻧﻤﺎﻳﻨﺪ!
ﺗﻮﻗﻒ ﺗﺼﺎﺩﻓﻲ ﻭ ﺗﻼﺵ ﻣﺠﺪﺩ ﻳﮑﻲ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﺑﺨﺶ ﻫﺎﻱ ﭘﺮﻭﺗﮑﻞ ﺍﺳﺖ.
232
ﻣﺤﺪﻭﺩﻳﺖ ﻫﺎﻱ ﺍﺗﺮﻧﺖ
ﻳﮏ ﺷﺒﮑﻪ ﺍﺗﺮﻧﺖ ﺩﺍﺭﺍﻱ ﻣﺤﺪﻭﺩﻳﺖ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺍﺯ ﺍﺑﻌﺎﺩ ﮔﻮﻧﺎﮔﻮﻥ )ﺑﮑﺎﺭﮔﻴﺮﻱ
ﺗﺠﻬﻴﺰﺍﺕ ( ﺍﺳﺖ .ﻃﻮﻝ ﮐﺎﺑﻠﻲ ﮐﻪ ﺗﻤﺎﻡ ﺍﻳﺴﺘﮕﺎﻫﻬﺎ ﺑﺼﻮﺭﺕ ﺍﺷﺘﺮﺍﮐﻲ ﺍﺯ ﺁﻥ ﺑﻪ ﻋﻨﻮﺍﻥ ﻣﺤﻴﻂ
ﺍﻧﺘﻘﺎﻝ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ﻳﮑﻲ ﺍﺯ ﺷﺎﺧﺺ ﺗﺮﻳﻦ ﻣﻮﺍﺭﺩ ﺩﺭ ﺍﻳﻦ ﺯﻣﻨﻴﻪ ﺍﺳﺖ .ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ
ﺍﻟﮑﺘﺮﻳﮑﻲ ﺩﺭ ﻃﻮﻝ ﮐﺎﺑﻞ ﺑﺴﺮﻋﺖ ﻣﻨﺘﺸﺮ ﻣﻲ ﮔﺮﺩﻧﺪ .ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﻃﻲ ﻣﺴﺎﻓﺘﻲ ،ﺳﻴﮕﻨﺎﻝ ﻫﺎ ﺿﻌﻴﻒ ﻣﻲ ﮔﺮﺩﻧﺪ .ﻭﭼﻮﺩ ﻣﻴﺪﺍﻥ ﻫﺎﻱ ﺍﻟﮑﺘﺮﻳﮑﻲ ﮐﻪ ﺗﻮﺳﻂ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﺠﺎﻭﺭ ﮐﺎﺑﻞ ﻧﻈﻴﺮﻻﻣﭗ ﻫﺎﻱ ﻓﻠﻮﺭﺳﻨﺖ ﺍﻳﺠﺎﺩ ﻣﻲ ﮔﺮﺩﺩ ،ﺑﺎﻋﺚ ﺗﻠﻒ ﺷﺪﻥ ﺳﻴﮕﻨﺎﻝ ﻣﻲ ﮔﺮﺩﺩ .ﻃﻮﻝ
ﮐﺎﺑﻞ ﺷﺒﮑﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﮐﻮﺗﺎﻩ ﺑﻮﺩﻩ ﺗﺎ ﺍﻣﮑﺎﻥ ﺩﺭﻳﺎﻓﺖ ﺳﻴﮕﻨﺎﻝ ﺗﻮﺳﻂ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺩﻭ ﻧﻘﻄﻪ ﺍﺑﺘﺪﺍﺋﻲ ﻭ ﺍﻧﺘﻬﺎﺋﻲ ﮐﺎﺑﻞ ﺑﺼﻮﺭﺕ ﺷﻔﺎﻑ ﻭ ﺑﺎ ﺣﺪﺍﻗﻞ ﺗﺎﺧﻴﺮ ﺯﻣﺎﻧﻲ ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ.
ﻫﻤﻴﻦ ﺍﻣﺮ ﺑﺎﻋﺚ ﺑﺮﻭﺯ ﻣﺤﺪﻭﺩﻳﺖ ﺩﺭ ﻃﻮﻝ ﮐﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ،ﻣﻲ ﮔﺮﺩﺩ. ﭘﺮﻭﺗﮑﻞ CSMA/CDﺍﻣﮑﺎﻥ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻱ ﺻﺮﻓﺎ" ﻳﮏ ﺩﺳﺘﮕﺎﻩ ﺭﺍ ﺩﺭ ﻫﺮ ﻟﺤﻈﻪ
ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﺤﺪﻭﺩﻳﺖ ﻫﺎﺋﻲ ﺍﺯ ﻟﺤﺎﻅ ﺗﻌﺪﺍﺩ ﺩﺳﺘﮕﺎﻫﻬﺎﺋﻲ ﮐﻪ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺷﺒﮑﻪ ﻣﺠﺰﺍ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ،ﻧﻴﺰ ﺑﻮﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺁﻣﺪ .ﺑﺎ ﺍﺗﺼﺎﻝ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ
ﻣﺘﻌﺪﺩ )ﻓﺮﺍﻭﺍﻥ ( ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺳﮕﻤﻨﺖ ﻣﺸﺘﺮﮎ ،ﺷﺎﻧﺲ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺑﺮﺍﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺳﮕﻤﻨﺖ ﮐﺎﻫﺶ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ﻫﺮ ﺩﺳﺘﮕﺎﻩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻣﻲ ﺑﺎﻳﺴﺖ ﻣﺪﺕ ﺯﻣﺎﻥ ﺯﻳﺎﺩﻱ ﺭﺍ ﺩﺭ ﺍﻧﺘﻈﺎﺭ ﺳﭙﺮﻱ ﻧﻤﺎﻳﺪ.
ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ ﺗﺠﻬﻴﺰﺍﺕ ﺷﺒﮑﻪ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺭﺍ ﺑﻪ ﻣﻨﻈﻮﺭ ﻏﻠﺒﻪ ﺑﺮ ﻣﺸﮑﻼﺕ ﻭ
ﻣﺤﺪﻭﺩﻳﺖ ﮔﻔﺘﻪ ﺷﺪﻩ ،ﻃﺮﺍﺣﻲ ﻭ ﻋﺮﺿﻪ ﻧﻤﻮﺩﻩ ﺍﻧﺪ .ﺍﻏﻠﺐ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻓﻮﻕ ﻣﺨﺘﺺ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﻧﺒﻮﺩﻩ ﻭﻟﻲ ﺩﺭ ﺳﺎﻳﺮ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﺮﺗﺒﻂ ﺑﺎ ﺷﺒﮑﻪ ﻧﻘﺶ ﻣﻬﻤﻲ ﺭﺍ ﺍﻳﻔﺎﺀ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﺗﮑﺮﺍﺭﮐﻨﻨﺪﻩ )(Repeater
ﺍﻭﻟﻴﻦ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﮐﺎﺑﻞ ﻫﺎﻱ ﻣﺴﻲ ﮐﻮﺍﮐﺴﻴﺎﻝ ﺑﻮﺩ
ﮐﻪ ) Thicknetﺿﺨﻴﻢ( ﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﻧﺪ .ﺣﺪﺍﮐﺜﺮ ﻃﻮﻝ ﻳﮏ ﮐﺎﺑﻞ ﺿﺨﻴﻢ ٥٠٠ﻣﺘﺮ ﺍﺳﺖ .ﺩﺭ ﻳﮏ ﺳﺎﺧﺘﻤﺎﻥ ﺑﺰﺭﮒ ،ﮐﺎﺑﻞ ٥٠٠ﻣﺘﺮﻱ ﺟﻮﺍﺑﮕﻮﻱ ﺗﻤﺎﻣﻲ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﺷﺒﮑﻪ ﻧﺨﻮﺍﻫﺪ 233
ﺑﻮﺩ .ﺗﮑﺮﺍﺭ ﮐﻨﻨﺪﻩ ﻫﺎ ﺑﺎ ﻫﺪﻑ ﺣﻞ ﻣﺸﮑﻞ ﻓﻮﻕ ،ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﻧﺪ . .ﺗﮑﺮﺍﺭﮐﻨﻨﺪﻩ ﻫﺎ ،ﺳﮕﻤﻨﺖ
ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﻳﮏ ﺷﺒﮑﻪ ﺍﺗﺮﻧﺖ ﺭﺍ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮐﻨﻨﺪ .ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ﺗﮑﺮﺍﺭﮐﻨﻨﺪﻩ ﺳﻴﮕﻨﺎﻝ ﻭﺭﻭﺩﻱ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﻳﮏ ﺳﮕﻤﻨﺖ ﺍﺧﺬ ﻭ ﺑﺎ ﺗﻘﻮﻳﺖ ﺳﻴﮕﻨﺎﻝ ﺁﻥ ﺭﺍ ﺑﺮﺍﻱ ﺳﮕﻤﻨﺖ
ﺑﻌﺪﻱ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺑﺪﻳﻦ ﺗﺰﺗﻴﺐ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭼﻨﺪﻳﻦ ﺗﮑﺮﺍﺭ ﮐﻨﻨﺪﻩ ﻭ ﺍﺗﺼﺎﻝ ﮐﺎﺑﻞ
ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺗﻮﺳﻂ ﺁﻧﺎﻥ ،ﻣﻲ ﺗﻮﺍﻥ ﻗﻄﺮ ﻳﮏ ﺷﺒﮑﻪ ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﺩﺍﺩ ) .ﻗﻄﺮ ﺷﺒﮑﻪ ﺑﻪ ﺣﺪﺍﮐﺜﺮ
ﻣﺴﺎﻓﺖ ﻣﻮﺟﻮﺩ ﺑﻴﻦ ﺩﻭ ﺩﺳﺘﮕﺎﻩ ﻣﺘﻤﺎﻳﺰ ﺩﺭ ﺷﺒﮑﻪ ﺍﻃﻼﻕ ﻣﻲ ﮔﺮﺩﺩ( Bridgesﻭ ﺳﮕﻤﻨﺖ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺭﺷﺪ )ﺑﺰﺭﮒ ﺷﺪﻥ( ﺩﭼﺎﺭ ﻣﺸﮑﻞ ﺗﺮﺍﮐﻢ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺩﺭ
ﺻﻮﺭﺗﻲ ﮐﻪ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺍﻳﺴﺘﮕﺎﻩ ﺑﻪ ﻳﮏ ﺳﮕﻤﻨﺖ ﻣﺘﺼﻞ ﮔﺮﺩﻧﺪ ،ﻫﺮ ﻳﮏ ﺩﺍﺭﺍﻱ ﺗﺮﺍﻓﻴﮏ ﺧﺎﺹ ﺧﻮﺩ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺩﺭ ﺷﺮﺍﻳﻂ ﻓﻮﻕ ،ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻣﺘﻌﺪﺩﻱ ﻗﺼﺪ ﺍﺭﺳﺎﻝ ﺍﻃﻼ ﻋﺎﺕ ﺭﺍ ﺩﺍﺭﻧﺪ ﻭﻟﻲ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺎﻫﻴﺖ ﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎ ﺩﺭ ﻫﺮ ﻟﺤﻈﻪ ﻳﮏ ﺍﻳﺴﺘﮕﺎﻩ ﺷﺎﻧﺲ ﻭ
ﻓﺮﺻﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺭﺍ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺩﺭ ﭼﻨﻴﻦ ﻭﺿﻌﻴﺘﻲ ﺗﻌﺪﺍﺩ ﺗﺼﺎﺩﻡ ﺩﺭ ﺷﺒﮑﻪ ﺍﻓﺰﺍﻳﺶ ﻳﺎﻓﺘﻪ ﻭ ﻋﻤﻼ" ﮐﺎﺭﺁﺋﻲ ﺷﺒﮑﻪ ﺍﻓﺖ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﻳﮑﻲ ﺍﺯ ﺭﺍﻩ ﺣﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺑﺮﻃﺮﻑ ﻧﻤﻮﺩﻥ ﻣﺸﮑﻞ ﺗﺮﺍﮐﻢ ﺩﺭ ﺷﺒﮑﻪ ﺗﻘﺴﻴﻢ ﻳﮏ ﺳﮕﻤﻨﺖ ﺑﻪ ﭼﻨﺪﻳﻦ ﺳﮕﻤﻨﺖ
ﺍﺳﺖ .ﺑﺎ ﺍﻳﻦ ﮐﺎﺭ ﺑﺮﺍﻱ ﺗﺼﺎﺩﻡ ﻫﺎﺋﻲ ﮐﻪ ﺩﺭ ﺷﺒﮑﻪ ﺑﺮﻭﺯ ﺧﻮﺍﻫﺪ ﮐﺮﺩ ،ﺩﺍﻣﻨﻪ ﻭﺳﻴﻌﺘﺮﻱ ﺍﻳﺠﺎﺩ
ﻣﻲ ﮔﺮﺩﺩ.ﺭﺍﻩ ﺣﻞ ﻓﻮﻕ ﺑﺎﻋﺚ ﺑﺮﻭﺯ ﻳﮏ ﻣﺸﮑﻞ ﺩﻳﮕﺮ ﻣﻲ ﮔﺮﺩﺩ :ﺳﮕﻤﻨﺖ ﻫﺎ ﻗﺎﺩﺭ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻧﺨﻮﺍﻫﻨﺪ ﺑﻮﺩ. ﺑﻪ ﻣﻨﻈﻮﺭ ﺣﻞ ﻣﺸﮑﻞ ﻓﻮﻕ Bridges ،ﺩﺭ ﺷﺒﮑﻪ ﺍﺗﺮﻧﺖ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺷﺪﻩ ﺍﺳﺖ Bridge . ﺩﻭ ﻭ ﻳﺎ ﭼﻨﺪﻳﻦ ﺳﮕﻤﻨﺖ ﺭﺍ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺩﺳﺘﮕﺎﻩ ﻓﻮﻕ ﺑﺎﻋﺚ ﺍﻓﺰﺍﻳﺶ ﻗﻄﺮ ﺷﺒﮑﻪ ﺧﻮﺍﻫﺪ ﺷﺪ .ﻋﻤﻠﮑﺮﺩ Bridgeﺍﺯ ﺑﻌﺪ ﺍﻓﺰﺍﻳﺶ ﻗﻄﺮ ﺷﺒﮑﻪ ﻧﻈﻴﺮ ﺗﮑﺮﺍﺭﮐﻨﻨﺪﻩ ﺍﺳﺖ ،ﺑﺎ ﺍﻳﻦ ﻧﻔﺎﻭﺕ ﮐﻪ Bridgeﻗﺎﺩﺭ ﺑﻪ ﺍﻳﺠﺎﺩ ﻧﻈﻢ ﺩﺭ ﺗﺮﺍﻓﻴﮏ ﺷﺒﮑﻪ ﻧﻴﺰ
ﺧﻮﺍﻫﺪ ﺑﻮﺩ Bridge .ﻧﻈﻴﺮ ﺳﺎﻳﺮ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ
ﺍﻃﻼﻋﺎﺕ ﺑﻮﺩﻩ ﻭﻟﻲ ﻋﻤﻠﮑﺮﺩ ﺁﻧﻬﺎ ﺩﻗﻴﻘﺎ" ﻣﺸﺎﺑﻪ ﻳﮏ ﺍﻳﺴﺘﮕﺎﻩ ﻧﻤﻲ ﺑﺎﺷﺪ Bridge .ﻗﺎﺩﺭ ﺑﻪ 234
ﺍﻳﺠﺎﺩ ﺗﺮﺍﻓﻴﮑﻲ ﮐﻪ ﺧﻮﺩ ﺳﺮﭼﺸﻤﻪ ﺁﻥ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ،ﻧﻴﺴﺖ ) ﻧﻈﻴﺮ ﺗﮑﺮﺍﺭﮐﻨﻨﺪﻩ ( Bridge.
ﺻﺮﻓﺎ" ﭼﻴﺰﻱ ﺭﺍ ﮐﻪ ﺍﺯ ﺳﺎﻳﺮ ﺍﻳﺴﺘﮕﺎﻫﻬﺎ ﻣﻲ ﺷﻨﻮﺩ ،ﻣﻨﻌﮑﺲ ﻣﻲ ﻧﻤﺎﻳﺪ Bridge ) .ﻗﺎﺩﺭ ﺑﻪ ﺍﻳﺠﺎ ﺩ ﻳﮏ ﻧﻮﻉ ﻓــﺮﻳﻢ ﺧﺎﺹ ﺍﺗﺮﻧﺖ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳـــﺠﺎﺩ ﺍﺭﻧﺒـﺎﻁ ﺑﺎ ﺳــﺎﻳﺮ Bridgeﻫﺎ ﻣﻲ ﺑﺎﺷﻨﺪ (.
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﻗﺒﻼ" ﺍﺷﺎﺭﻩ ﮔﺮﺩﻳﺪ ﻫﺮ ﺍﻳﺴﺘﮕﺎﻩ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺗﻤﺎﻡ ﻓﺮﻳﻢ ﻫﺎﻱ ﺍﺭﺳﺎﻝ ﺷﺪﻩ
ﺑﺮ ﺭﻭﻱ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻣﻲ ﻧﻤﺎﻳﺪ).ﺻﺮﻓﻨﻈﺮ ﺍﺯﺍﻳﻨﮑﻪ ﻣﻘﺼﺪ ﻓﺮﻳﻢ ﻫﻤﺎﻥ ﺍﻳﺴﺘﮕﺎﻩ ﺑﺎﺷﺪ ﻭ ﻳﺎ ﻧﺒﺎﺷﺪ Bridge (.ﺑﺎ ﺗﺎﮐﻴﺪ ﺑﺮ ﻭﻳﮋﮔﻲ ﻓﻮﻕ ﺳﻌﻲ ﺑﺮ ﺗﻨﻈﻴﻢ ﺗﺮﺍﻓﻴﮏ ﺑﻴﻦ ﺳﮕﻤﻨﺖ ﻫﺎ ﺩﺍﺭﺩ.
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﺩﺭ ﺷﮑﻞ ﻓﻮﻕ ﻣﺸﺎﻫﺪﻩ ﻣﻲ ﮔﺮﺩﺩ Bridgeﺩﻭ ﺳﮕﻤﻨﺖ ﺭﺍ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻧﻤﻮﺩﻩ ﺍﺳﺖ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﻳﺴﺘﮕﺎﻩ Aﻭ ﻳﺎ Bﻗﺼﺪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ
Bridgeﻧﻴﺰ ﻓﺮﻳﻢ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﻧﺤﻮﻩ ﺑﺮﺧﻮﺭﺩ Bridgeﺑﺎ ﻓﺮﻳﻢ
ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭﻳﺎﻓﺖ ﺷﺪﻩ ﺑﻪ ﭼﻪ ﺻﻮﺭﺕ ﺍﺳﺖ؟ ﺁﻳﺎ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﺍﺗﻮﻣﺎﺗﻴﮏ ﻓﺮﻳﻢ ﻫﺎ ﺑﺮﺍﻱ ﺳﮕﻤﻨﺖ ﺩﻭﻡ ﻣﻲ ﺑﺎﺷﺪ؟ ﻳﮑﻲ ﺍﺯﺍﻫﺪﺍﻑ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ Bridgeﮐﺎﻫﺶ ﺗﺮﺍﻓﻴﮏ ﻫﺎﻱ
ﻏﻴﺮﺿﺮﻭﺭﻱ ﺩﺭ ﻫﺮ ﺳﮕﻤﻨﺖ ﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ،ﺁﺩﺭﺱ ﻣﻘﺼﺪ ﻓﺮﻳﻢ ،ﻗﺒﻞ ﺍﺯ ﻫﺮ ﮔﻮﻧﻪ ﻋﻤﻠﻴﺎﺕ ﺑﺮ ﺭﻭﻱ ﺁﻥ ،ﺑﺮﺭﺳﻲ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺁﺩﺭﺱ ﻣﻘﺼﺪ ،ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ Aﻭ
ﻳﺎ Bﺑﺎﺷﺪ ﻧﻴﺎﺯﻱ ﺑﻪ ﺍﺭﺳﺎﻝ ﻓﺮﻳﻢ ﺑﺮﺍﻱ ﺳﮕﻤﻨﺖ ﺷﻤﺎﺭﻩ ﺩﻭ ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ Bridgeﻋﻤﻠﻴﺎﺕ ﺧﺎﺻﻲ ﺭﺍ ﺍﻧﺠﺎﻡ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺩ .ﻧﺤﻮﻩ ﺑﺮﺧﻮﺭﺩ Bridgeﺑﺎ ﻓﺮﻳﻢ
ﻓﻮﻕ ﻣﺸﺎﺑﻪ ﻓﻴﻠﺘﺮ ﻧﻤﻮﺩﻥ ﺍﺳﺖ .ﺩﺭﺻﻮﺭﺗﻲ ﮐﻪ ﺁﺩﺭﺱ ﻣﻘﺼﺪ ﻓﺮﻳﻢ ﻳﮑﻲ ﺍﺯ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ C ﻭ ﻳﺎ Dﺑﺎﺷﺪ ﻭ ﻳﺎ ﻓﺮﻳﻢ ﻣﻮﺭﺩ ﻧﻈﺮ ﺩﺍﺭﺍﻱ ﻳﮏ ﺁﺩﺭﺱ ﺍﺯ ﻧﻮﻉ Broadcastﺑﺎﺷﺪ، Bridgeﻓﺮﻳﻢ ﻓﻮﻕ ﺭﺍ ﺑﺮﺍﻱ ﺳﮕﻤﻨﺖ ﺷﻤﺎﺭﻩ ﺩﻭ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
235
ﺑﺎ ﺍﺭﺳﺎﻝ ﻭ ﻫﺪﺍﻳﺖ ﻓﺮﻳﻢ ﺍﻃﻼﻋﺎﺗﻲ ﺗﻮﺳﻂ Bridgeﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﭼﻬﺎﺭ ﺩﺳﺘﮕﺎﻩ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻓﺮﺍﻫﻢ
ﻣﻲ ﮔﺮﺩﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﮑﺎﻧﻴﺰﻡ ﻓﻴﻠﺘﺮ ﻧﻤﻮﺩﻥ ﻓﺮﻳﻢ ﻫﺎ ﺗﻮﺳﻂ ، Bridgeﺍﻳﻦ
ﺍﻣﮑﺎﻥ ﺑﻮﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺁﻣﺪ ﮐﻪ ﺍﻳﺴﺘﮕﺎﻩ Aﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﺮﺍﻱ ﺍﻳﺴﺘﮕﺎﻩ Bﺍﺭﺳﺎﻝ ﻭ ﺩﺭ ﻫﻤﺎﻥ ﻟﺤﻈﻪ ﻧﻴﺰ ﺍﻳﺴﺘﮕﺎﻩ Cﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﺮﺍﻱ ﺍﻳﺴﺘﮕﺎﻩ Dﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﺪ.ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺍﻣﮑﺎﻥ
ﺑﺮﻗﺮﺍﺭﻱ ﺩﻭ ﺍﺭﺗﺒﺎﻁ ﺑﺼﻮﺭﺕ ﻫﻤﺰﻣﺎﻥ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﺍﺳﺖ. ﺭﻭﺗﺮﻫﺎ :ﺳﮕﻤﻨﺖ ﻫﺎﻱ ﻣﻨﻄﻘﻲ
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ Bridgeﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﻫﻤﺰﻣﺎﻥ ﺑﻴﻦ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﭼﻨﺪﻳﻦ
ﺳﮕﻤﻨﺖ ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ Bridge .ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﺮﺍﻓﻴﮏ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺳﮕﻤﻨﺖ ﻋﻤﻠﻴﺎﺕ ﺧﺎﺻﻲ ﺭﺍ ﺍﻧﺠﺎﻡ ﻧﻤﻲ ﺩﻫﺪ .ﻳﮑﻲ ﺍﺯ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﻣﻬﻢ Bridgeﺍﺭﺳﺎﻟﻲ ﻓﺮﻳﻢ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﻧﻮﻉ Broadcastﺑﺮﺍﻱ ﺗﻤﺎﻡ ﺳﮕﻤﻨﺖ ﻫﺎﻱ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﺍﺳﺖ.
ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺭﺷﺪ ﺷﺒﮑﻪ ﻭ ﮔﺴﺘﺮﺵ ﺳﮕﻤﻨﺖ ﻫﺎ ،ﻭﻳﮋﮔﻲ ﻓﻮﻕ ﻣﻲ ﺗﻮﺍﻧﺪ ﺳﺒﺐ ﺑﺮﻭﺯ ﻣﺴﺎﺋﻠﻲ ﺩﺭ ﺷﺒﮑﻪ ﮔﺮﺩﺩ .ﺯﻣﺎﻧﻴﮑﻪ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺍﺯ ﺍﻳﺴﺘﮕﺎﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ، Bridgeﻓﺮﻳﻢ ﻫﺎﻱ Broadcastﺭﺍ ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﺗﺮﺍﮐﻢ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ
ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮ ﺍﺯ ﺯﻣﺎﻧﻲ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ﮐﻪ ﺗﻤﺎﻣﻲ ﺩﺳﺘﮕﺎﻫﻬﺎ ﺩﺭ ﻳﮏ ﺳﮕﻤﻨﺖ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺑﺎﺷﻨﺪ. ﺭﻭﺗﺮ ﻳﮑﻲ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﭘﻴﺸﺮﻓﺘﻪ ﺩﺭ ﺷﺒﮑﻪ ﺑﻮﺩﻩ ﮐﻪ ﻗﺎﺩﺭ ﺑﻪ ﺗﻘﺴﻴﻢ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ ﭼﻨﺪﻳﻦ
ﺷﺒﮑﻪ ﻣﻨﻄﻘﻲ ﻣﺠﺰﺍ ﺍﺳﺖ .ﺭﻭﺗﺮ ﻫﺎ ﻳﮏ ﻣﺤﺪﻭﺩﻩ ﻣﻨﻄﻘﻲ ﺑﺮﺍﻱ ﻫﺮ ﺷﺒﮑﻪ ﺍﻳﺠﺎﺩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ. ﺭﻭﺗﺮﻫﺎ ﺑﺮ ﺍﺳﺎﺱ ﭘﺮﻭﺗﮑﻞ ﻫﺎﺋﻲ ﮐﻪ ﻣﺴﺘﻘﻞ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﺧﺎﺹ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺍﺳﺖ، ﻓﻌﺎﻟﻴﺖ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﻭﻳﮋﮔﻲ ﻓﻮﻕ ﺍﻳﻦ ﺍﻣﮑﺎﻥ ﺭﺍ ﺑﺮﺍﻱ ﺭﻭﺗﺮ ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﮐﺮﺩ ﮐﻪ ﭼﻨﺪﻳﻦ ﺷﺒﮑﻪ ﺑﺎ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺭﺍ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺮﺗﺒﻂ ﻧﻤﺎﻳﺪ .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺗﺮ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺤﻠﻲ ﻭ ﮔﺴﺘﺮﺩﻩ ﺍﻣﮑﺎﻥ ﭘﺬﻳﺮﺍﺳﺖ.
236
ﻭﺿﻌﻴﺖ ﻓﻌﻠﻲ ﺍﺗﺮﻧﺖ
ﺍﺯ ﺯﻣﺎﻥ ﻣﻄﺮﺡ ﺷﺪﻥ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﺗﺎﮐﻨﻮﻥ ﺗﻐﻴﻴﺮﺍﺕ ﻓﺮﺍﻭﺍﻧﻲ ﺍﺯ ﺑﻌﺪ ﺗﻨﻮﻉ
ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ .ﺩﺭ ﺍﺑﺘﺪﺍ ﺍﺯ ﮐﺎﺑﻞ ﮐﻮﺍﮐﺴﻴﺎﻝ ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﻳﺪ.ﺍﻣﺮﻭﺯﻩ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺪﺭﻥ ﺍﺗﺮﻧﺖ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ﺑﻬﻢ ﺗﺎﺑﻴﺪﻩ ﻭ ﻳﺎ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺑﺮﺍﻱ ﺍﺗﺼﺎﻝ ﺍﻳﺴﺘﮕﺎﻩ ﻫﺎ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﻭﻟﻴﻪ ﺍﺗﺮﻧﺖ
ﺳﺮﻋﺖ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺑﻮﺩ ﻭﻟﻲ ﺍﻣﺮﻭﺯﻩ ﺍﻳﻦ ﺳﺮﻋﺖ ﺑﻪ ﻣﺮﺯ ١٠٠ﻭ
ﺣﺘﻲ ١٠٠٠ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺭﺳﻴﺪﻩ ﺍﺳﺖ .ﻣﻬﻤﺘﺮﻳﻦ ﺗﺤﻮﻝ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ
ﺍﺗﺮﻧﺖ ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﺍﺳﺖ .ﺳﮕﻤﻨﺖ ﻫﺎ ﺗﻮﺳﻂ ﺳﻮﺋﻴﭻ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ ) .ﻧﻈﻴﺮ Bridgeﺑﺎ ﺍﻳﻦ ﺗﻔﺎﻭﺕ ﻋﻤﺪﻩ ﮐﻪ ﺍﻣﮑﺎﻥ ﺍﺗﺼﺎﻝ ﭼﻨﺪﻳﻦ ﺳﮕﻤﻨﺖ
ﺗﻮﺳﻂ ﺳﻮﺋﻴﭻ ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ( ﺑﺮﺧﻲ ﺍﺯ ﺳﻮﺋﻴﭻ ﻫﺎ ﺍﻣﮑﺎﻥ ﺍﺗﺼﺎﻝ ﺻﺪﻫﺎ ﺳﮕﻤﻨﺖ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺗﻤﺎﻡ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ،ﺳﻮﺋﻴﭻ ﻭ ﻳﺎ ﺍﻳﺴﺘﮕﺎﻩ
ﻣﻲ ﺑﺎﺷﻨﺪ .ﻗﺒﻞ ﺍﺯ ﺍﺭﺳﺎﻝ ﻓﺮﻳﻢ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺍ ﻱ ﻫﺮ ﺍﻳﺴﺘﮕﺎﻩ ،ﺳﻮﺋﻴﭻ ﻓﺮﻳﻢ ﻣﻮﺭﺩ ﻧﻈﺮ
ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻭ ﭘﺲ ﺍﺯ ﺑﺮﺭﺳﻲ ،ﺁﻥ ﺭﺍ ﺑﺮﺍﻱ ﺍﻳﺴﺘﮕﺎﻩ ﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ. ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﻣﺸﺎﺑﻪ Bridgeﺍﺳﺖ ،ﻭﻟﻲ ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ﻫﺮ ﺳﮕﻤﻨﺖ ﺩﺍﺭﺍﻱ ﺻﺮﻓﺎ" ﻳﮏ
ﺍﻳﺴﺘﮕﺎﻩ ﺍﺳﺖ ﻭ ﻓﺮﻳﻢ ﺻﺮﻓﺎ" ﺑﻪ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﻭﺍﻗﻌﻲ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺍﻣﮑﺎﻥ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﻫﻤﺰﻣﺎﻥ ﺑﻴﻦ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺍﻳﺴﺘﮕﺎﻩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﻮﺋــﻴﭻ
ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﻣﻄﺮﺡ ﺷﺪﻥ ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﻣﺴﺌﻠﻪ Full-duplexﻧﻴﺰ ﻣﻄﺮﺡ ﮔﺮﺩﻳﺪFull- . dulledﻳﮏ ﺍﺻﻄﻼﺡ ﺍﺭﺗﺒﺎﻃﻲ ﺍﺳﺖ ﮐﻪ ﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﻗﺎﺑﻠﻴﺖ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﺑﺼﻮﺭﺕ ﻫﻤﺰﻣﺎﻥ ﺍﺳﺖ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﺍﻭﻟﻴﻪ ﻭﺿﻌﻴﺖ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﺑﺼﻮﺭﺕ ﻳﮑﻄﺮﻓﻪ ) (half-duplexﺑﻮﺩ.ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﻮﺋﻴﭻ ،ﺍﻳﺴﺘﮕﺎﻫﻬﺎ ﺻﺮﻓﺎ" ﺑﺎ ﺳﻮﺋﻴﭻ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﮐﺮﺩﻩ ﻭ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺗﺒﺎﻁ ﻣﺴﺘﻘﻴﻢ ﺑﺎ ﻳﮑﺪﻳﮕﺮﻧﻤﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ﺑﻬﻢ ﺗﺎﺑﻴﺪﻩ ﻭ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻭﺳﻮﺋﻴﭻ ﻣﺮﺑﻮﻃﻪ ﺩﺍﺭﺍﻱ ﮐﺎﻧﮑﻨﻮﺭﻫﺎﻱ ﻻﺯﻡ ﺩﺭ ﺍﻳﻦ ﺧﺼﻮﺹ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﻮﺋﻴﭻ ﻋﺎﺭﻱ ﺍﺯ ﺗﺼﺎﺩﻡ 237
ﺑﻮﺩﻩ ﻭ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺗﻮﺳﻂ ﻳﮏ ﺍﻳﺴﺘﮕﺎﻩ ﺑﻪ ﺳﻮﺋﻴﭻ ،ﺍﻣﮑﺎﻥ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ
ﺗﻮﺳﻂ ﺳﻮﺋﻴﭻ ﺑﺮﺍﻱ ﺍﻳﺴﺘﮕﺎﻩ ﺩﻳﮕﺮ ﻧﻴﺰ ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﺷﺪ. ﺍﺗﺮﻧﺖ ﻭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ٨٠٢,٣
ﺷﺎﻳﺪ ﺗﺎﮐﻨﻮﻥ ﺍﺻﻄﻼﺡ ٨٠٢,٣ﺭﺍ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﺷﻨﻴﺪﻩ ﺑﺎﺷﻴﺪ .ﺍﺗﺮﻧﺖ
ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﮏ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺷﺒﮑﻪ ﺗﻮﺳﻂ ﺷﺮﮐﺖ ﻫﺎﻱ :ﺩﻳﺠﻴﺘﺎﻝ ،ﺍﻳﻨﺘﻞ ﻭ ﺯﻳﺮﺍﮐﺲ )(DIX
ﻣﻄﺮﺡ ﮔﺮﺩﻳﺪ .ﺩﺭ ﺳﺎﻝ ١٩٨٠ﻣﻮﺳﺴﻪ IEEEﮐﻤﻴﺘﻪ ﺍﻱ ﺭﺍ ﻣﺴﺌﻮﻝ ﺍﺳﺘﺎﻧﺪﺍﺭ ﺳﺎﺯﻱ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﺮﺗﺒﻂ ﺑﺎ ﺷﺒﮑﻪ ﮐﺮﺩ .ﻣﻮﺳﺴﻪ IEEEﻧﺎﻡ ﮔﺮﻭﻩ ﻓﻮﻕ ﺭﺍ ٨٠٢ﻗﺮﺍﺭ ﺩﺍﺩ. ) ﻋﺪﺩ ٨٠٢ﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﺳﺎﻝ ﻭ ﻣﺎﻩ ﺗﺸﮑﻴﻞ ﮐﻤﻴﺘﻪ ﺍﺳﺘﺎﻧﺪﺍﺭﺳﺎﺯﻱ ﺍﺳﺖ ( ﮐﻤﻴﺘﻪ ﻓﻮﻕ ﺍﺯ
ﭼﻨﺪﻳﻦ ﮐﻤﻴﺘﻪ ﺟﺎﻧﺒﻲ ﺩﻳﮕﺮ ﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺑﻮﺩ .ﻫﺮ ﻳﮏ ﺍﺯ ﮐﻤﻴﺘﻪ ﻫﺎﻱ ﻓﺮﻋﻲ ﻧﻴﺰ ﻣﺴﺌﻮﻝ
ﺑﺮﺭﺳﻲ ﺟﻨﺒﻪ ﻫﺎﻱ ﺧﺎﺻﻲ ﺍﺯ ﺷﺒﮑﻪ ﮔﺮﺩﻳﺪﻧﺪ .ﻣﻮﺳﺴﻪ IEEEﺑﺮﺍﻱ ﺗﻤﺎﻳﺰ ﻫﺮ ﻳﮏ ﺍﺯ ﮐﻤﻴﺘﻪ ﻫﺎﻱ ﺟﺎﻧﺒﻲ ﺍﺯ ﺭﻭﺵ ﻧﺎﻣﮕﺬﺍﺭﻱ x.٨٠٢x :ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ X .ﻳﮏ ﻋﺪﺩ ﻣﻨﺼﺮ ﺑﻔﺮﺩ ﺑﻮﺩﻩ ﮐﻪ ﺑﺮﺍﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﮐﻤﻴﺘﻪ ﻫﺎ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺑﻮﺩ .ﮔﺮﻭﻩ ٨٠٢,٣ﻣﺴﺌﻮﻟﻴﺖ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺳﺎﺯﻱ ﻋﻤﻠﻴﺎﺕ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ CSMA/CDﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺷﺘﻨﺪ) .ﺷﺒﮑﻪ ﻓﻮﻕ ﺩﺭ ﺍﺑﺘﺪﺍ DIX Ethernetﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﺪ ( ﺍﺗﺮﻧﺖ ﻭ ٨٠٢,٣ﺍﺯ ﻧﻈﺮ ﻓﺮﻣﺖ ﺩﺍﺩﻩ ﻫﺎ ﺩﺭ ﻓﺮﻳﻢ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻣﺘﻔﺎﻭﺕ ﻣﻲ ﺑﺎﺷﻨﺪ. ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺷﺒﮑﻪ
ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﻣﺪﻝ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ )ﺭﻭﻳﮑﺮﺩ ﺩﻳﮕﺮﻱ ﺍﺯ ﺍﺗﺮﻧﺖ( ﺗﻮﺳﻂ
ﺷﺮﮐﺖ IBMﻭ ﺑﺎ ﻧﺎﻡ ring Tokenﻋﺮﺿﻪ ﮔﺮﺩﻳﺪ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﻲ ﺍﺯ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺍﺯ ﻓﻮﺍﺻﻞ ﺧﺎﻟﻲ ) (Gapﺗﺼﺎﺩﻓﻲ ﺩﺭ ﺯﻣﺎﻥ ﺍﻧﺘﻘﺎﻝ ﻓﺮﻳﻢ ﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺷﺒﮑﻪ ﻫﺎﻱ Token ringﺍﺯ ﻳﮏ ﺭﻭﺵ ﭘﻴﻮﺳﺘﻪ ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻓﻮﻕ ،ﺍﻳﺴﺘﮕﺎﻩ ﻫﺎ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﺣﻠﻘﻪ ﻣﻨﻄﻘﻲ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ
ﻣﻲ ﮔﺮﺩﻧﺪ .ﻓﺮﻳﻢ ﻫﺎ ﺻﺮﻓﺎ" ﺩﺭ ﻳﮏ ﺟﻬﺖ ﺣﺮﮐﺖ ﻭ ﭘﺲ ﺍﺯ ﻃﻲ ﻃﻮﻝ ﺣﻠﻘﻪ ،ﻓﺮﻳﻢ ﮐﻨﺎﺭ 238
ﮔﺬﺍﺷﺘﻪ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺭﻭﺵ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺗﺎﺑﻊ
CSMA/CDﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ ﻭ ﺍﺯ ﺭﻭﺵ passing Tokenﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺭﻭﺵ
ﻓﻮﻕ ﺩﺭ ﺍﺑﺘﺪﺍ ﻳﮏ ) Tokenﻧﻮﻉ ﺧﺎﺻﻲ ﺍﺯ ﻳﮏ ﻓﺮﻳﻢ ﺍﻃﻼﻋﺎﺗﻲ ( ﺍﻳﺠﺎﺩ ﻣﻲ ﮔﺮﺩﺩ. Tokenﻓﻮﻕ ﺩﺭ ﻃﻮﻝ ﺣﻠﻘﻪ ﻣﻲ ﭼﺮﺧﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﻳﮏ ﺍﻳﺴﺘﮕﺎﻩ ﻗﺼﺪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺭﺍ
ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ Tokenﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﮔﺮﻓﺘﻪ ﻭ ﻓﺮﻳﻢ ﺍﻃﻼﻋﺎﺗﻲ ﺧﻮﺩ ﺭﺍ ﺑﺮ ﺭﻭﻱ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺍﺭﺳﺎﻝ ﺩﺍﺭﺩ .ﺯﻣﺎﻧﻴﮑﻪ ﻓﺮﻳﻢ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﻣﺠﺪﺩﺍ" ﺑﻪ ﺍﻳﺴﺘﮕﺎﻩ ﺍﺭﺳﺎﻝ ﮐﻨﻨﺪﻩ ﺑﺮﮔﺸﺖ ﺩﺍﺩﻩ ﺷﺪ )ﻃﻲ ﻧﻤﻮﺩﻥ ﻣﺴﻴﺮ ﺣﻠﻘﻪ( ،ﺍﻳﺴﺘﮕﺎﻩ ﻓﺮﻳﻢ ﺧﻮﺩ ﺭﺍ ﺣﺬﻑ ﻭ ﻳﮏ Token
ﺟﺪﻳﺪ ﺭﺍ ﺍﻳﺠﺎﺩ ﻭﺁﻥ ﺭﺍ ﺑﺮ ﺭﻭﻱ ﺣﻠﻘﻪ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﮔﺮﻓﺘﻦ Tokenﺷﺮﻁ ﻻﺯﻡ ﺑﺮﺍ ﻱ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺖ .ﺳﺮﻋﺖ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ﭼﻬﺎﺭ
ﺗﺎ ﺷﺎﻧﺰﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺍﺳﺖ. ﺍﺗﺮﻧﺖ ﺑﺎ ﻳﮏ ﺭﻭﻧﺪ ﭘﻴﻮﺳﺘﻪ ﻫﻤﭽﻨﺎﻥ ﺑﻪ ﺭﺷﺪ ﺧﻮﺩ ﺍﺩﺍﻣﻪ ﻣﻲ ﺩﻫﺪ .ﭘﺲ ﺍﺯ ﮔﺬﺷﺖ ﺣﺪﻭﺩ ﺳﻲ ﺳﺎﻝ ﺍﺯﻋﻤﺮ ﺷﺒﮑﻪ ﻫﺎﻱ ﻓﻮﻕ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺍﻳﺠﺎﺩ ﻭ ﺑﺮﺍﻱ ﻋﻤﻮﻡ ﻣﺘﺨﺼﺼﻴﻦ ﺷﻨﺎﺧﺘﻪ ﺷﺪﻩ ﻫﺴﺘﻨﺪ ﻭ ﻫﻤﻴﻦ ﺍﻣﺮ ﻧﮕﻬﺪﺍﺭﻱ ﻭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﺭﺍ ﺁﺳﺎﻥ ﻧﻤﻮﺩﻩ ﺍﺳﺖ .ﺍﺗﺮﻧﺖ ﺑﺎ ﺻﻼﺑﺖ ﺑﺴﻤﺖ ﺍﻓﺰﺍﻳﺶ ﺳﺮﻋﺖ ﻭ ﺑﻬﺒﻮﺩ ﮐﺎﺭﺁﺋﻲ ﻭ ﻋﻤﻠﮑﺮﺩ ﮔﺎﻡ ﺑﺮﻣﻲ ﺩﺍﺭﺩ.
239
NAT ﺍﻳﻨﺘﺮﻧﺖ ﺑﺎ ﺳﺮﻋﺘﻲ ﺑﺎﻭﺭﻧﮑﺮﺩﻧﻲ ﻫﻤﺠﻨﺎﻥ ﺩﺭ ﺣﺎﻝ ﮔﺴﺘﺮﺵ ﺍﺳﺖ .ﺗﻌﺪﺍﺩ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ
ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺍﻃﻼﻋﺎﺕ ) ﺧﺪﻣﺎﺕ ( ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﺭﻭﺯﺍﻧﻪ ﺗﻐﻴﻴﺮ ﻭ ﺭﺷﺪ ﻣﻲ ﻳﺎﺑﺪ .ﺑﺎ ﺍﻳﻨﮑﻪ ﻧﻤﻲ ﺗﻮﺍﻥ ﺩﻗﻴﻘﺎ" ﺍﻧﺪﺍﺯﻩ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﻣﺸﺨﺺ ﮐﺮﺩ ﻭﻟﻲ ﺗﻘﺮﻳﺒﺎ" ﻳﮑﺼﺪ ﻣﻴﻠﻴﻮﻥ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻴﺰﺑﺎﻥ ) (Hostﻭ ٣٥٠ﻣﻴﻠﻴﻮﻥ ﮐﺎﺭﺑﺮ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺭﺷﺪ ﺍﻳﻨﺘﺮﻧﺖ ﭼﻪ ﻧﻮﻉ
ﺍﺭﺗﺒﺎﻃﻲ ﺑﺎ ) Network Address Translator (NATﺩﺍﺭﺩ؟ ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﺎﻳﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻭﺏ ﺑﺮ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺍﺭﺍﻱ ﻳﮏ ﺁﺩﺭﺱ IPﺑﺎﺷﺪ IP .ﻳﮏ ﻋﺪﺩ ﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ ٣٢ﺑﻴﺘﻲ ﺑﻮﺩﻩ ﮐﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﮐﻨﺪ.
ﺍﻭﻟﻴﻦ ﻣﺮﺗﺒﻪ ﺍﻱ ﮐﻪ ﻣﺴﺌﻠﻪ ﺁﺩﺭﺱ ﺩﻫﻲ ﺗﻮﺳﻂ IPﻣﻄﺮﺡ ﮔﺮﺩﻳﺪ ،ﮐﻤﺘﺮ ﮐﺴﻲ ﺑﻪ ﺍﻳﻦ ﻓﮑﺮ ﻣﻲ ﺍﻓﺘﺎﺩ ﮐﻪ ﻣﻤﮑﻦ ﺍﺳﺖ ﺧﻮﺍﺳﺘﻪ ﺍﻱ ﻣﻄﺮﺡ ﺷﻮﺩ ﮐﻪ ﻧﺘﻮﺍﻥ ﺑﻪ ﺁﻥ ﻳﮏ ﺁﺩﺭﺱ ﺭﺍ ﻧﺴﺒﺖ ﺩﺍﺩ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻴﺴﺘﻢ ﺁﺩﺭﺱ ﺩﻫﻲ IPﻣﻲ ﺗﻮﺍﻥ (٢٣٢) ٤,٢٩٤,٩٧٦,٢٩٦ﺁﺩﺭﺱ ﺭﺍ ﺗﻮﻟﻴﺪ
ﮐﺮﺩ ) .ﺑﺼﻮﺭﺕ ﺗﺌﻮﺭﻱ ( .ﺗﻌﺪﺍﺩ ﻭﺍﻗﻌﻲ ﺁﺩﺭﺱ ﻫﺎﻱ ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﮐﻤﺘﺮ ﺍﺯ ﻣﻘﺪﺍﺭ ) ﺑﻴﻦ ٣,٢
ﻣﻴﻠﻴﺎﺭﺩ ﻭ ٣,٣ﻣﻴﻠﻴﺎﺭﺩ ( ﻓﻮﻕ ﺍﺳﺖ .ﻋﻠﺖ ﺍﻳﻦ ﺍﻣﺮ ،ﺗﻔﮑﻴﮏ ﺁﺩﺭﺱ ﻫﺎ ﺑﻪ ﮐﻼﺱ ﻫﺎ ﻭ ﺭﺯﻭ ﺑﻮﺩﻥ ﺑﺮﺧﻲ ﺁﺩﺭﺱ ﻫﺎ ﺑﺮﺍﻱ ، multicastingﺗﺴﺖ ﻭ ﻣﻮﺍﺭﺩ ﺧﺎﺹ ﺩﻳﮕﺮ ﺍﺳﺖ. ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺍﻧﻔﺠﺎﺭ ﺍﻳﻨﺘﺮﻧﺖ ) ﻋﻤﻮﻣﻴﺖ ﻳﺎﻓﺘﻦ( ﻭ ﺍﻓﺰﺍﻳﺶ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ،ﺗﻌﺪﺍﺩ IP
ﻣﻮﺟﻮﺩ ،ﭘﺎﺳﺨﮕﻮﻱ ﻧﻴﺎﺯﻫﺎ ﻧﺒﻮﺩ .ﻣﻨﻄﻘﻲ ﺗﺮﻳﻦ ﺭﻭﺵ ،ﻃﺮﺍﺣﻲ ﻣﺠﺪﺩ ﺳﻴﺴﺘﻢ ﺁﺩﺭﺱ ﺩﻫﻲ IP ﺍﺳﺖ ﺗﺎ ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ IPﺑﻴﺸﹶﺘﺮﻱ ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ .ﻣﻮﺿﻮﻉ ﻓﻮﻕ ﺩﺭ ﺣﺎﻝ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺑﻮﺩﻩ ﻭ ﻧﺴﺨﻪ ﺷﻤﺎﺭﻩ ﺷﺶ ، IPﺭﺍﻫﮑﺎﺭﻱ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺍﺳﺖ .ﭼﻨﺪﻳﻦ ﺳﺎﻝ ﻃﻮﻝ ﺧﻮﺍﻫﺪ ﮐﺸﻴﺪ ﺗﺎ ﺳﻴﺴﺘﻢ ﻓﻮﻕ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﮔﺮﺩﺩ ،ﭼﺮﺍﮐﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺗﻤﺎﻣﻲ ﺯﻳﺮﺳﺎﺧﺖ
ﻫﺎﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺗﻐﻴﻴﺮ ﻭﺍﺻﻼﺡ ﮔﺮﺩﻧﺪ NAT.ﺑﺎ ﻫﺪﻑ ﮐﻤﮏ ﺑﻪ ﻣﺸﮑﻞ ﻓﻮﻕ ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺍﺳﺖ NAT .ﺑﻪ ﻳﮏ ﺩﺳﺘﮕﺎﻩ ﺍﺟﺎﺯﻩ ﻣﻲ ﺩﻫﺪ ﮐﻪ ﺑﺼﻮﺭﺕ ﻳﮏ ﺭﻭﺗﺮ ﻋﻤﻞ ﻧﻤﺎﻳﺪ .ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ NATﺑﻪ ﻋﻨﻮﺍﻥ ﻳﮏ ﺁﮊﺍﻧﺲ ﺑﻴﻦ ﺍﻳﻨﺘﺮﻧﺖ ) ﺷﺒﮑﻪ ﻋﻤﻮﻣﻲ ( ﻭ ﻳﮏ ﺷﺒﮑﻪ ﻣﺤﻠﻲ
240
) ﺷﺒﮑﻪ ﺧﺼﻮﺻﻲ ( ﺭﻓﺘﺎﺭ ﻧﻤﺎﻳﺪ .ﺍﻳﻦ ﺑﺪﺍﻥ ﻣﻌﻨﻲ ﺍﺳﺖ ﮐﻪ ﺻﺮﻓﺎ" ﻳﮏ IPﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ ﺑﻪ
ﻣﻨﻈﻮﺭ ﻧﻤﺎﻳﺶ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ) ﻳﮏ ﮔﺮﻭﻩ ( ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
ﮐﻢ ﺑﻮﺩﻥ ﺗﻌﺪﺍﺩ IPﺻﺮﻓﺎ" ﻳﮑﻲ ﺍﺯ ﺩﻻﻳﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ NATﺍﺳﺖ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺑﺮﺭﺳﻲ ﻋﻠﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ NATﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ. ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ NAT ﻋﻤﻠﮑﺮﺩ NATﻣﺸﺎﺑﻪ ﻳﮏ ﺗﻠﻔﺘﭽﻲ ﺩﺭ ﻳﮏ ﺍﺩﺍﺭﻩ ﺑﺰﺭﮒ ﺍﺳﺖ .ﻓﺮﺽ ﮐﻨﻴﺪ ﺷﻤﺎ ﺑﻪ ﺗﻠﻔﻨﭽﻲ
ﺍﺩﺍﺭﻩ ﺧﻮﺩ ﺍﻋﻼﻡ ﻧﻤﻮﺩﻩ ﺍﻳﺪ ﮐﻪ ﺗﻤﺎﺱ ﻫﺎﻱ ﺗﻠﻔﻨﻲ ﻣﺮﺑﻮﻁ ﺑﻪ ﺷﻤﺎ ﺭﺍ ﺗﺎ ﺑﻪ ﻭﻱ ﺍﻋﻼﻡ ﻧﻨﻤﻮﺩﻩ
ﺍﻳﺪ ،ﻭﺻﻞ ﻧﮑﻨﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺎ ﻳﮑﻲ ﺍﺯﻣﺸﺘﺮﻳﺎﻥ ﺗﻤﺎﺱ ﮔﺮﻓﺘﻪ ﻭ ﺑﺮﺍﻱ ﻭﻱ ﭘﻴﺎﻣﻲ ﮔﺬﺍﺷﺘﻪ ﺍﻳﺪ ﮐﻪ ﺳﺮﻳﻌﺎ" ﺑﺎ ﺷﻤﺎ ﺗﻤﺎﺱ ﺑﮕﻴﺮﺩ .ﺷﻤﺎ ﺑﻪ ﺗﻠﻔﺘﭽﻲ ﺍﺩﺍﺭﻩ ﻣﻲ ﮔﻮﺋﻴﺪ ﮐﻪ ﻣﻨﺘﻈﺮ ﺗﻤﺎﺱ
ﺗﻠﻔﻦ ﺍﺯ ﻃﺮﻑ ﻳﮑﻲ ﺍﺯ ﻣﺸﺘﺮﻳﺎﻥ ﻫﺴﺘﻢ ،ﺩﺭ ﺻﻮﺭﺕ ﺗﻤﺎﺱ ﻭﻱ ،ﺁﻥ ﺭﺍ ﺑﻪ ﺩﻓﺘﺮ ﻣﻦ ﻭﺻﻞ ﻧﻤﺎﺋﻴﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ ﻣﺸﺘﺮﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺎ ﺍﺩﺍﺭﻩ ﺷﻤﺎ ﺗﻤﺎﺱ ﮔﺮﻓﺘﻪ ﻭ ﺑﻪ ﺗﻠﻔﻨﭽﻲ ﺍﻋﻼﻡ ﻣﻲ ﻧﻤﺎﻳﺪ ﮐﻪ ﻗﺼﺪ ﮔﻔﺘﮕﻮ ﺑﺎ ﺷﻤﺎ ﺭﺍ ﺩﺍﺭﺩ )ﭼﺮﺍﮐﻪ ﺷﻤﺎ ﻣﻨﺘﻈﺮ ﺗﻤﺎﺱ ﻭﻱ ﻫﺴﺘﻴﺪ( .ﺗﻠﻔﻨﭽﻲ ﺟﺪﻭﻝ
ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﺭﺍ ﺑﺮﺭﺳﻲ ﺗﺎ ﻧﺎﻡ ﺷﻤﺎ ﺭﺍ ﺩﺭ ﺁﻥ ﭘﻴﺪﺍ ﻧﻤﺎﻳﺪ .ﺗﻠﻔﻨﭽﻲ ﻣﺘﻮﺟﻪ ﻣﻲ ﺷﻮﺩ ﮐﻪ ﺷﻤﺎ ﺗﻠﻔﻦ ﻓﻮﻕ ﺭﺍ ﺩﺭﺧﻮﺍﺳﺖ ﻧﻤﻮﺩﻩ ﺍﻳﺪ ،ﺑﻨﺎﺑﺮﺍﻳﻦ ﺗﻤﺎﺱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﺩﻓﺘﺮ ﺷﻤﺎ ﻭﺻﻞ ﺧﻮﺍﻫﺪ ﺷﺪ.
NATﺗﻮﺳﻂ ﺷﺮﮐﺖ ﺳﻴﺴﮑﻮ ﻭ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﻳﮏ ﺩﺳﺘﮕﺎﻩ )ﻓﺎﻳﺮﻭﺍﻝ ،ﺭﻭﺗﺮ ،ﮐﺎﻣﭙﻴﻮﺗﺮ ( ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ NAT.ﺑﻴﻦ ﻳﮏ ﺷﺒﮑﻪ ﺩﺍﺧﻠﻲ ﻭ ﻳﮏ ﺷﺒﮑﻪ ﻋﻤﻮﻣﻲ ﻣﺴﺘﻘﺮ ﻭ ﺷﺎﻣﻞ ﻣﺪﻝ ﻫﺎ ﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺍﺳﺖ. •
NATﺍﻳﺴﺘﺎ .ﻋﻤﻠﻴﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺗﺮﺟﻤﻪ ﻳﮏ ﺁﺩﺭﺱ IPﻏﻴﺮ ﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ) ﺛﺒﺖ ﺷﺪﻩ ( ﺑﻪ ﻳﮏ ﺁﺩﺭﺱ IPﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ﺭﺍ ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﺪ ) .ﺗﻨﺎﻇﺮ ﻳﮏ ﺑﻪ
ﻳﮏ( ﺭﻭﺵ ﻓﻮﻕ ﺯﻣﺎﻧﻴﮑﻪ ﻗﺼﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺩﺳﺘﮕﺎﻩ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺧﺎﺭﺝ ﺍﺯ ﺷﺒﮑﻪ 241
ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ ،ﻣﻔﻴﺪ ﻭ ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺳﺖ .ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ﻫﻤﻮﺍﺭﻩ IP
•
192.168.32.10ﺑﻪ IP 213.18.123.110ﺗﺮﺟﻤﻪ ﺧﻮﺍﻫﺪ ﺷﺪ.
NATﭘﻮﻳﺎ .ﻳﮏ ﺁﺩﺭﺱ IPﻏﻴﺮ ﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ﺭﺍ ﺑﻪ ﻳﮏ IPﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ﺗﺮﺟﻤﻪ
ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭ ﺗﺮﺟﻤﻪ ﻓﻮﻕ ﺍﺯ ﮔﺮﻭﻫﻲ ﺁﺩﺭﺱ ﻫﺎﻱ IPﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﺪ ﺷﺪ.
•
. OverLoadingﻣﺪﻝ ﻓﻮﻕ ﺷﮑﻞ ﺧﺎﺻﻲ ﺍﺯ NATﭘﻮﻳﺎ ﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﻣﺪﻝ
ﭼﻨﺪﻳﻦ IPﻏﻴﺮ ﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ﺑﻪ ﻳﮏ IPﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎﻱ
ﻣﺘﻌﺪﺩ ،ﺗﺮﺟﻤﻪ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﺑﻪ ﺭﻭﺵ ﻓﻮﻕ Port Address (PAT (Translationﻧﻴﺰ ﮔﻔﺘﻪ ﻣﻲ ﺷﻮﺩ.
•
. Overlappingﺩﺭ ﺭﻭﺵ ﻓﻮﻕ ﺷﺒﮑﻪ ﺧﺼﻮﺻﻲ ﺍﺯ ﻣﺠﻤﻮﻋﻪ ﺍﻱ IPﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮐﻨﺪ ﮐﻪ ﺗﻮﺳﻂ ﺷﺒﮑﻪ ﺩﻳﮕﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﻧﺪ NAT .ﻣﻲ ﺑﺎﻳﺴﺖ ﺁﺩﺭﺱ ﻫﺎﻱ ﻓﻮﻕ ﺭﺍ ﺑﻪ ﺁﺩﺭﺱ ﻫﺎﻱ IPﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ﻣﻨﺤﺼﺮﺑﻔﺮﺩ ﺗﺮﺟﻤﻪ ﻧﻤﺎﻳﺪ. NATﻫﻤﻮﺍﺭﻩ ﺁﺩﺭﺱ ﻫﺎﻱ ﻳﮏ ﺷﺒﮑﻪ ﺧﺼﻮﺻﻲ ﺭﺍ ﺑﻪ ﺁﺩﺭﺱ ﻫﺎﻱ ﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ
ﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ ﺗﺮﺟﻤﻪ ﻣﻲ ﻧﻤﺎﻳﺪ NAT .ﻫﻤﭽﻨﻴﻦ ﺁﺩﺭﺱ ﻫﺎﻱ ﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ﻋﻤﻮﻣﻲ ﺭﺍ ﺑﻪ ﺁﺩﺭﺱ ﻫﺎﻱ ﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺧﺼﻮﺻﻲ ﺗﺮﺟﻤﻪ ﻣﻲ ﻧﻤﺎﻳﺪ) .ﺩﺭ ﻫﺮ 242
ﺣﺎﻟﺖ ﺧﺮﻭﺟﻲ ، NATﺁﺩﺭﺱ ﻫﺎﻱ IPﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺁﺩﺭﺱ ﻫﺎﻱ
ﻓﻮﻕ ﻣﻲ ﺗﻮﺍﻧﺪ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻋﻤﻮﻣﻲ ﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ﺟﻬﺎﻧﻲ ﺑﺎﺷﻨﺪ ﻭ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺧﺼﻮﺻﻲ ﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ﻣﺤﻠﻲ ﺑﺎﺷﻨﺪ (
ﺷﺒﮑﻪ ﺍﺧﺘﺼﺎﺻﻲ ) ﺧﺼﻮﺻﻲ ( ﻣﻌﻤﻮﻻ" ﺑﺼﻮﺭﺕ ﻳﮏ ﺷﺒﮑﻪ LANﻣﻲ ﺑﺎﺷﻨﺪ. ﺑﻪ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ﮐﻪ ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ IPﺩﺍﺧﻠﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ﺣﻮﺯﻩ ﻣﺤﻠﻲ
ﻣﻲ ﮔﻮﻳﻨﺪ .ﺍﻏﻠﺐ ﺗﺮﺍﻓﻴﮏ ﺷﺒﮑﻪ ﺩﺭ ﺣﻮﺯﻩ ﻣﺤﻠﻲ ﺑﺼﻮﺭﺕ ﺩﺍﺧﻠﻲ ﺑﻮﺩﻩ ﻭﺑﻨﺎﺑﺮﺍﻳﻦ ﺿﺮﻭﺭﺗﻲ ﺑﻪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺧﺎﺭﺝ ﺍﺯ ﺷﺒﮑﻪ ﺭﺍ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﻳﮏ ﺣﻮﺯﻩ ﻣﺤﻠﻲ ﻣﻲ ﺗﻮﺍﻧﺪ ﺩﺍﺭﺍﻱ ﺁﺩﺭﺱ ﻫﺎﻱ IPﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ﻭ ﻳﺎ ﻏﻴﺮﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ﺑﺎﺷﺪ .ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﮐﻪ ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ IPﻏﻴﺮﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮐﻨﻨﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ NATﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺩﻧﻴﺎﻱ ﺧﺎﺭﺝ ﺍﺯ ﺷﺒﮑﻪ ﻣﺤﻠﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ. NATﻣﻲ ﺗﻮﺍﻧﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﭘﻴﮑﺮﺑﻨﺪﻱ ﮔﺮﺩﺩ .ﺩﺭ ﻣﺜﺎﻝ ﺯﻳﺮ NAT
ﺑﮕﻮﻧﻪ ﺍﻱ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺷﺪﻩ ﺍﺳﺖ ﮐﻪ ﺑﺘﻮﺍﻧﺪ ﺁﺩﺭﺱ ﻫﺎﻱ ﻏﻴﺮ ﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ) IPﺩﺍﺧﻠﻲ ﻭ ﻣﺤﻠﻲ( ﮐﻪ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﺧﺼﻮﺻﻲ )ﺩﺍﺧﻠﻲ( ﻣﻲ ﺑﺎﺷﻨﺪ ﺭﺍ ﺑﻪ ﺁﺩﺭﺱ ﻫﺎﻱ IPﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ﺗﺮﺟﻤﻪ ﻧﻤﺎﻳﺪ. •
ﻳﮏ ) ISPﻣﺮﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺖ( ﻳﮏ ﻣﺤﺪﻭﺩﻩ ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ IPﺭﺍ
ﺑﺮﺍﻱ ﺷﺮﮐﺖ ﺷﻤﺎ ﺩﺭ ﻧﻈﺮ ﻣﻲ ﮔﻴﺮﺩ .ﺁﺩﺭﺱ ﻫﺎﻱ ﻓﻮﻕ ﺭﻳﺠﺴﺘﺮ ﻭ ﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺁﺩﺭﺱ ﻫﺎﻱ ﻓﻮﻕ Inside globalﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﻧﺪ .ﺁﺩﺭﺱ ﻫﺎﻱ IPﺧﺼﻮﺻﻲ ﻭ ﻏﻴﺮﺭﻳﭽﺴﺘﺮ ﺷﺪﻩ ﺑﻪ ﺩﻭ ﮔﺮﻭﻩ ﻋﻤﺪﻩ ﺗﻘﺴﻴﻢ ﻣﻲ ﮔﺮﺩﻧﺪ :ﻳﮏ ﮔﺮﻭﻩ
ﮐﻮﭼﮏ ﮐﻪ ﺗﻮﺳﻂ NATﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ) (Outside local addressﻭ ﮔﺮﻭﻩ
ﺑﺰﺭﮔﺘﺮﻱ ﮐﻪ ﺗﻮﺳﻂ ﺣﻮﺯﻩ ﻣﺤﻠﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﻨﺪ ﺷﺪ) .(Inside local dress ﺁﺩﺭﺱ ﻫﺎﻱ Outside localﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺮﺟﻤﻪ ﺑﻪ ﺁﺩﺭﺱ ﻫﺎﻱ ﻣﻨﺤﺼﺮﺑﻔﺮﺩ IP
243
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﻧﺪ .ﺁﺩﺭﺱ ﻫﺎﻱ ﻣﻨـﺤﺼﺮ ﺑﻔﺮﺩ ﻓﻮﻕ outside global ،ﻧﺎﻣﻴﺪﻩ ﺷﺪﻩ ﻭ ﺍﺧﺘﺼﺎﺹ ﺑﻪ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﻋﻤﻮﻣﻲ ) ﺍﻳﻨﺘﺮﻧﺖ( ﺩﺍﺭﻧﺪ.
•
ﺍﮐﺜﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺣﻮﺯﻩ ﺩﺍﺧﻠﻲ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ inside localﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
•
ﺑﺮﺧﻲ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺣﻮﺯﻩ ﺩﺍﺧﻠﻲ ﮐﻪ ﻧﻴﺎﺯﻣﻨﺪ ﺍﺭﺗﺒﺎﻁ ﺩﺍﺋﻢ ﺑﺎ ﺧﺎﺭﺝ ﺍﺯ ﺷﺒﮑﻪ ﺑﺎﺷﻨﺪ ،ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ inside globalﺍﺳﺘﻔﺎﺩﻩ ﻭ ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﻧﻴﺎﺯﻱ ﺑﻪ ﺗﺮﺟﻤﻪ ﻧﺨﻮﺍﻫﻨﺪ ﺩﺍﺷﺖ.
•
ﺯﻣﺎﻧﻴﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺟﻮﺩ ﺩﺭ ﺣﻮﺯﻩ ﻣﺤﻠﻲ ﮐﻪ ﺩﺍﺭﺍﻱ ﻳﮏ ﺁﺩﺭﺱ inside local ﺍﺳﺖ ،ﻗﺼﺪ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺧﺎﺭﺝ ﺷﺒﮑﻪ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻭﻱ ﺩﺭ ﺍﺧﺘﻴﺎﺭ NATﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﮔﺮﻓﺖ.
•
NATﺟﺪﻭﻝ ﺭﻭﺗﻴﻨﮓ ﺧﻮﺩ ﺭﺍ ﺑﺮﺭﺳﻲ ﺗﺎ ﺑﻪ ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ ﺑﺮﺳﺪ ﮐﻪ ﺑﺮﺍﻱ ﺁﺩﺭﺱ ﻣﻘﺼﺪ ﻳﮏ entryﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺭﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﭘﺎﺳﺦ ﻣﺜﺒﺖ ﺑﺎﺷﺪ NAT ،ﺑﺴﺘﻪ
ﺍﻃﻼﻋﺎﺗﻲ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﺗﺮﺟﻤﻪ ﻭ ﻳﮏ entryﺑﺮﺍﻱ ﺁﻥ ﺍﻳﺠﺎﺩ ﻭ ﺁﻥ ﺭﺍ ﺩﺭ ﺟﺪﻭﻝ ﺗﺮﺟﻤﻪ ﺁﺩﺭﺱ ) (ATTﺛﺒﺖ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﭘﺎﺳﺦ ﻣﻨﻔﻲ ﺑﺎﺷﺪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﻭﺭ ﺍﻧﺪﺍﺧﺘﻪ ﺧﻮﺍﻫﺪ ﺷﺪ.
•
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺁﺩﺭﺱ ، inside globalﺭﻭﺗﺮ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﻪ ﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
•
ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻋﻤﻮﻣﻲ ) ﺍﻳﻨﺘﺮﻧﺖ ( ،ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﺮﺍﻱ ﺷﺒﮑﻪ
ﺧﺼﻮﺻﻲ ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ .ﺁﺩﺭﺱ ﻣﺒﺪﺍﺀ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﻧﻮﻉoutside global ﺍﺳﺖ .ﺁﺩﺭﺱ ﻣﻘﺼﺪ ﻳﮏ ﺁﺩﺭﺱ inside globalﺍﺳﺖ.
244
•
NATﺩﺭ ﺟﺪﻭﻝ ﻣﺮﺑﻮﻃﻪ ﺑﻪ ﺧﻮﺩ ﺟﺴﺘﺠﻮ ﻭ ﺁﺩﺭﺱ ﻣﻘﺼﺪ ﺭﺍ ﺗﺸﺨﻴﺺ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ
•
NATﺁﺩﺭﺱ ﻫﺎﻱ inside globalﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﻪ ﺁﺩﺭﺱ ﻫﺎﻱ inside
ﺁﻥ ﺭﺍ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺟﻮﺩ ﺩﺭ ﺣﻮﺯﻩ ﺩﺍﺧﻠﻲ ﻧﺴﺒﺖ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
localﺗﺮﺟﻤﻪ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
245
VLAN ) ،VLAN ( Virtual Local Area Networksﻳـﮑﻲ ﺍﺯ ﺟﺪﻳﺪﺗــﺮﻳﻦ ﻭ
ﺟﺎﻟﺒﺘﺮﻳﻦ ﺗﮑﻨﻮﻟــﻮﮊﻱ ﻫﺎﻱ ﺷﺒﮑﻪ ﺍﺳﺖ ﮐﻪ ﺍﺧـﻴﺮﺍ" ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﺑﻴﺸﺘﺮﻱ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺍﺳﺖ. ﺭﺷﺪ ﺑﺪﻭﻥ ﻭﻗﻔﻪ ﺷﺒﮑﻪ ﻫﺎﻱ LANﻭ ﺿﺮﻭﺭﺕ ﮐﺎﻫﺶ ﻫﺰﻳﻨﻪ ﻫﺎ ﺑﺮﺍﻱ ﺗﺠﻬﻴﺰﺍﺕ ﮔﺮﺍﻧﻘﻴﻤﺖ ﺑﺪﻭﻥ ﺍﺯ ﺩﺳﺖ ﺩﺍﺩﻥ ﮐﺎﺭﺁﺋﻲ ﻭ ﺍﻣﻨﻴﺖ ،ﺍﻫﻤﻴﺖ ﻭ ﺿﺮﻭﺭﺕ ﺗﻮﺟﻪ ﺑﻴﺸﺘﺮ ﺑﻪ VLANﺭﺍ
ﻣﻀﺎﻋﻒ ﻧﻤﻮﺩﻩ ﺍﺳﺖ.
ﻭﺿﻌﻴﺖ ﺷﺒﮑﻪ ﻫﺎﻱ ﻓﻌﻠﻲ
ﺗﻘﺮﻳﺒﺎ" ﺩﺭ ﺍﮐﺜﺮ ﺷﺒﮑﻪ ﻫﺎ ﺍﻣﺮﻭﺯﻱ ﺍﺯ ﻳﮏ )ﻭ ﻳﺎ ﭼﻨﺪﻳﻦ( ﺳﻮﺋﻴﭻ ﮐﻪ ﺗﻤﺎﻣﻲ ﮔﺮﻩ ﻫﺎﻱ
ﺷﺒﮑﻪ ﺑﻪ ﺁﻥ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ ،ﺍﺳﺘﻔﺎﻩ ﻣﻲ ﺷﻮﺩ .ﺳﻮﺋﻴﭻ ﻫﺎ ﺭﻭﺷﻲ ﻣﻄﻤﺌﻦ ﻭ ﺳﺮﻳﻊ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺑﻴﻦ ﮔﺮﻩ ﻫﺎ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.ﺑﺎ ﺍﻳﻦ ﮐﻪ ﺳﻮﺋﻴﭻ ﻫﺎ
ﺑﺮﺍﻱ ﺍﻧﻮﺍﻉ ﺷﺒﮑﻪ ﻫﺎ ،ﮔﺰﻳﻨﻪ ﺍﻱ ﻣﻨﺎﺳﺐ ﻣﻲ ﺑﺎﺷﻨﺪ ،ﻭﻟﻲ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺭﺷﺪ ﺷﺒﮑﻪ ﻭ ﺍﻓﺰﺍﻳﺶ ﺗﻌﺪﺍﺩ ﺍﻳﺴﺘﮕﺎﻫﻬﺎ ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ،ﺷﺎﻫﺪ ﺑﺮﻭﺯ ﻣﺴﺎﺋﻞ ﺧﺎﺻﻲ ﺧﻮﺍﻫﻴﻢ ﺑﻮﺩ .ﺳﻮﺋﻴﭻ ﻫﺎ، ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻻﻳﻪ ﺩﻭﻡ )ﻣﺪﻝ ﻣﺮﺟﻊ ( OSIﻣﻲ ﺑﺎﺷﻨﺪ ﮐﻪ ﻳﮏ ﺷﺒﮑﻪ Flatﺭﺍ ﺍﻳﺠﺎﺩ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﺩﺭ ﺷﮑﻞ ﻓﻮﻕ ﻣﺸﺎﻫﺪﻩ ﻣﻲ ﻧﻤﺎﺋﻴﺪ ،ﺑﻪ ﻳﮏ ﺳﻮﺋﻴﭻ ،ﺳﻪ ﺍﻳﺴﺘﮕﺎﻩ ﻣﺘﺼﻞ ﺷﺪﻩ ﺍﺳﺖ .ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻓﻮﻕ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺑﻮﺩﻩ ﻭ ﻫﺮ ﻳﮏ ﺑﻪ ﻋﻨﻮﺍﻥ ﻋﻀﻮﻱ ﺍﺯ
ﻳﮏ Broadcast domainﻣﺸﺎﺑﻪ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ،ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﻳﺴﺘﮕﺎﻫﻲ
246
ﻳﮏ ﭘﻴﺎﻡ broadcastﺭﺍ ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﺪ ،ﺳﺎﻳﺮ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ ﺳﻮﺋﻴﭻ ﻧﻴﺰ ﺁﻥ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺷﺖ.
ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﮐﻮﭼﮏ ،ﻭﺟﻮﺩ ﭘﻴﺎﻡ ﻫﺎﻱ Broadcastﻧﻤﻲ ﺗﻮﺍﻧﺪ ﻣﺸﮑﻞ ﻭ ﻳﺎ ﻣﺴﺌﻠﻪ ﻗﺎﺑﻞ ﺗﻮﺟﻬﻲ ﺭﺍ ﺍﻳﺠﺎﺩ ﻧﻤﺎﻳﺪ ،ﻭﻟﻲ ﺩﺭ ﺻﻮﺭﺕ ﺭﺷﺪ ﺷﺒﮑﻪ ،ﻭﺟﻮﺩ ﭘﻴﺎﻡ ﻫﺎﻱ braodcast
ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﻪ ﻳﮏ ﻣﺸﮑﻞ ﺍﺳﺎﺳﻲ ﻭ ﻣﻬﻢ ﺗﺒﺪﻳﻞ ﮔﺮﺩﺩ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ﻭ ﺩﺭ ﺍﻏﻠﺐ ﻣﻮﺍﻗﻊ، ﺳﻴﻼﺑﻲ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺑﻲ ﺍﺭﺯﺵ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﺩﺭ ﺣﺎﻝ ﺟﺎﺑﺠﺎﺋﻲ ﺑﻮﺩﻩ ﻭ ﻋﻤﻼ" ﺍﺯ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺷﺒﮑﻪ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻄﻠﻮﺏ ﻧﺨﻮﺍﻫﺪ ﺷﺪ .ﺗﻤﺎﻣﻲ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ ﻳﮏ ﺳﻮﺋﻴﭻ،
ﭘﻴﺎﻡ ﻫﺎﻱ Braodcastﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﭼﺮﺍﮐﻪ ﺗﻤﺎﻣﻲ ﺁﻧﺎﻥ ﺑﺨﺸﻲ ﺍﺯ ﻳﮏ Broadcast doaminﻣﺸﺎﺑﻪ ﻣﻲ ﺑﺎﺷﻨﺪ. ﺩﺭ ﺻﻮﺭﺕ ﺍﻓﺰﺍﻳﺶ ﺗﻌﺪﺍﺩ ﺳﻮﺋﻴﭻ ﻫﺎ ﻭ ﺍﻳﺴﺘﮕﺎﻫﻬﺎ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ،ﻣﺸﮑﻞ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﻣﻠﻤﻮﺱ ﺗﺮ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﻫﻤﻮﺍﺭﻩ ﺍﺣﺘﻤﺎﻝ ﻭﺟﻮﺩ ﭘﻴﺎﻡ ﻫﺎﻱ Braodcastﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ. ﻳﮑﻲ ﺩﻳﮕﺮ ﺍﺯ ﻣﺴﺎﺋﻞ ﻣﻬﻢ ،ﻣﻮﺿﻮﻉ ﺍﻣﻨﻴﺖ ﺍﺳﺖ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﺋﻲ ﮐﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻮﺋﻴﭻ ﺍﻳﺠﺎﺩ ﻣﻲ ﮔﺮﺩﻧﺪ ،ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﺭﺑﺮﺍﻥ ﺷﺒﮑﻪ ﻗﺎﺩﺭ ﺑﻪ ﻣﺸﺎﻫﺪﻩ ﺗﻤﺎﻣﻲ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ
ﺷﺒﮑﻪ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺩﺭ ﺷﺒﮑﻪ ﺍﻱ ﺑﺰﺭﮒ ﮐﻪ ﺩﺍﺭﺍﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻓﺎﻳﻞ ،ﺑﺎﻧﮏ ﻫﺎﻱ
ﺍﻃﻼﻋﺎﺗﻲ ﻭ ﺳﺎﻳﺮ ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺱ ﻭ ﺣﻴﺎﺗﻲ ﺍﺳﺖ ،ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﻣﻲ ﺗﻮﺍﻧﺪ ﺍﻣﮑﺎﻥ ﻣﺸﺎﻫﺪﻩ ﺗﻤﺎﻣﻲ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺭﺍ ﺑﺮﺍﻱ ﻫﺮ ﺷﺨﺺ ﻓﺮﺍﻫﻢ ﻧﻤﺎﻳﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﻣﻨﺎﺑﻊ
ﻓﻮﻕ ﺩﺭ ﻣﻌﺮﺽ ﺗﻬﺪﻳﺪ ﻭ ﺣﻤﻼﺕ ﺑﻴﺸﺘﺮﻱ ﻗﺮﺍﺭ ﺧﻮﺍﻫﻨﺪ ﮔﺮﻓﺖ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺣﻔﺎﻇﺖ ﺍﻳﻨﭽﻨﻴﻦ ﺳﻴﺴﺘﻢ ﻫﺎﺋﻲ ﻣﻲ ﺑﺎﻳﺴﺖ ﻣﺤﺪﻭﺩﻳﺖ ﺩﺳﺘﻴﺎﺑﻲ ﺭﺍ ﺩﺭ ﺳﻄﺢ ﺷﺒﮑﻪ ﻭ ﺑﺎ ﺍﻳﺠﺎﺩ ﺳﮕﻤﻨﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﻭ ﻳﺎ ﺍﺳﺘﻘﺮﺍﺭ ﻳﮏ ﻓﺎﻳﺮﻭﺍﻝ ﺩﺭ ﺟﻠﻮﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﺣﻴﺎﺗﻲ ،ﺍﻧﺠﺎﻡ ﺩﺍﺩ. ﻣﻌﺮﻓﻲ VLAN
ﺗﻤﺎﻣﻲ ﻣﺴﺎﺋﻞ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﺩﺭ ﺑﺨﺶ ﻗﺒﻞ ﺭﺍ ﻭ ﺗﻌﺪﺍﺩ ﺑﻴﺸﺘﺮﻱ ﺭﺍ ﮐﻪ ﺑﻪ ﺁﻧﺎﻥ ﺍﺷﺎﺭﻩ
ﻧﺸﺪﻩ ﺍﺳﺖ ﺭﺍ ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﺍﻳﺠﺎﺩ ﻳﮏ VLANﺑﻪ ﻓﺮﺍﻣﻮﺷﻲ ﺳﭙﺮﺩ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ،VLAN 247
ﺑﻪ ﻳﮏ ﺳﻮﺋﻴﭻ ﻻﻳﻪ ﺩﻭﻡ ﮐﻪ ﺍﻳﻦ ﺗﮑﻨﻮﻟﻮﮊﻱ ﺭﺍ ﺣﻤﺎﻳﺖ ﻧﻤﺎﻳﺪ ،ﻧﻴﺎﺯ ﻣﻲ ﺑﺎﺷﺪ .ﺗﻌﺪﺍﺩﻱ ﺯﻳﺎﺩﻱ ﺍﺯ ﺍﻓﺮﺍﺩﻳﮑﻪ ﺟﺪﻳﺪﺍ" ﺑﺎ ﺩﻧﻴﺎﻱ ﺷﺒﮑﻪ ﺁﺷﻨﺎ ﺷﺪﻩ ﺍﻧﺪ ،ﺍﻏﻠﺐ ﺩﺍﺭﺍﻱ ﺑﺮﺩﺍﺷﺖ ﻣﻨﺎﺳﺒﻲ ﺩﺭ ﺍﻳﻦ ﺧﺼﻮﺹ ﻧﻤﻲ ﺑﺎﺷﻨﺪ ﻭ ﺍﻳﻨﮕﻮﻧﻪ ﺍﺳﺘﻨﺒﺎﻁ ﻧﻤﻮﺩﻩ ﺍﻧﺪ ﮐﻪ ﺻﺮﻓﺎ" ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﻣﻨﻈﻮﺭ ﻓﻌﺎﻝ ﻧﻤﻮﺩﻥ ، VLANﻳﮏ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺍﺿﺎﻓﻪ ﺭﺍ ﺑﺮ ﺭﻭﻱ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ﻭ ﻳﺎ ﺳﻮﺋﻴﭻ ﻧﺼﺐ
ﻧﻤﺎﻳﻨﺪ ) .ﺑﺮﺩﺍﺷﺘﻲ ﮐﺎﻣﻼ" ﺍﺷﺘﺒﺎﻩ ! ( .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﮐﻪ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ، VLANﻣﻴﻠﻴﻮﻥ ﻫﺎ
ﻣﺤﺎﺳﺒﺎﺕ ﺭﻳﺎﺿﻲ ﺍﻧﺠﺎﻡ ﻣﻲ ﺷﻮﺩ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﺧﺎﺻﻲ ﮐﻪ ﺩﺭﻭﻥ ﺳﻮﺋﻴﭻ ﺗﻌﺒﻴﻪ ﺷﺪﻩ ﺍﺳﺖ ،ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ )ﺩﻗﺖ ﺩﺭ ﺯﻣﺎﻥ ﺗﻬﻴﻪ ﻳﮏ ﺳﻮﺋﻴﭻ(،ﺩﺭ ﻏﻴﺮ ﺍﻳﻨﺼﻮﺭﺕ ﺍﻣﮑﺎﻥ ﺍﻳﺠﺎﺩ ﻳﮏ VLANﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻮﺋﻴﭻ ﺗﻬﻴﻪ ﺷﺪﻩ ،ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ.
ﻫﺮ VLANﮐﻪ ﺑﺮ ﺭﻭﻱ ﺳﻮﺋﻴﭻ ﺍﻳﺠﺎﺩ ﻣﻲ ﮔﺮﺩﺩ ،ﺑﻪ ﻣﻨﺰﻟﻪ ﻳﮏ ﺷﺒﮑﻪ ﻣﺠﺰﺍ ﻣﻲ ﺑﺎﺷﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺑﺮﺍﻱ ﻫﺮ VLANﻣﻮﺟﻮﺩ ﻳﮏ broadcast domainﺟﺪﺍﮔﺎﻧﻪ ﺍﻳﺠﺎﺩ ﻣﻲ ﮔﺮﺩﺩ .ﭘﻴﺎﻡ ﻫﺎﻱ ، broadcastﺑﻪ ﺻﻮﺭﺕ ﭘﻴﺶ ﻓﺮﺽ ،ﺍﺯ ﺭﻭﻱ ﺗﻤﺎﻣﻲ ﭘﻮﺭﺕ ﻫﺎﺋﻲ ﺍﺯ ﺷﺒﮑﻪ ﮐﻪ ﻋﻀﻮﻱ ﺍﺯ ﻳﮏ VLANﻣﺸﺎﺑﻪ ﻧﻤﻲ ﺑﺎﺷﻨﺪ ،ﻓﻴﻠﺘﺮ ﻣﻲ ﮔﺮﺩﻧﺪ .ﻭﻳﮋﮔﻲ ﻓﻮﻕ ،ﻳﮑﻲ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﺩﻻﻳﻞ ﻣﺘﺪﺍﻭﻝ ﺷﺪﻥ VALNﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺰﺭﮒ ﺍﻣﺮﻭﺯﻱ ﺍﺳﺖ ) ﺗﻤﺎﻳﺰ ﺑﻴﻦ ﺳﮕﻤﻨﺖ ﻫﺎﻱ ﺷﺒﮑﻪ ( .ﺷﮑﻞ ﺯﻳﺮ ﻳﮏ ﻧﻤﻮﻧﻪ ﺷﺒﮑﻪ ﺑﺎ ﺩﻭ VLANﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ:
ﺩﺭ ﺷﮑﻞ ﻓﻮﻕ ،ﻳﮏ ﺷﺒﮑﻪ ﮐﻮﭼﮏ ﺑﺎ ﺷﺶ ﺍﻳﺴﺘﮕﺎﻩ ﺭﺍ ﮐﻪ ﺑﻪ ﻳﮏ ﺳﻮﺋﻴﭻ ) ﺑﺎ ﻗﺎﺑﻠﻴﺖ ﺣﻤﺎﻳﺖ ﺍﺯ ( VLANﻣﺘﺼﻞ ﺷﺪﻩ ﺍﻧﺪ ،ﻣﺸﺎﻫﺪﻩ ﻣﻲ ﻧﻤﺎﺋﻴﻢ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺘﺎﻧﺴﻴﻞ VLAN ﺳﻮﺋﻴﭻ ،ﺩﻭ VLANﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ ﮐﻪ ﺑﻪ ﻫﺮ ﻳﮏ ﺳﻪ ﺍﻳﺴﺘﮕﺎﻩ ﻣﺘﺼﻞ ﺷﺪﻩ ﺍﺳﺖ ) VLAN1ﻭ . (VLAN2
248
ﺯﻣﺎﻧﻲ ﮐﻪ ﺍﻳﺴﺘﮕﺎﻩ ﺷﻤﺎﺭﻩ ﻳﮏ ﻣﺘﻌﻠﻖ ﺑﻪ ، VLAN1ﻳﮏ ﭘﻴﺎﻡ Braodcastﺭﺍ
ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ )ﻧﻈﻴﺮ ،( FF:FF:FF:FF:FF:FF:ﺳﻮﺋﻴﭻ ﻣﻮﺟﻮﺩ ﺁﻥ ﺭﺍ ﺻﺮﻓﺎ" ﺑﺮﺍﻱ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﺷﻤﺎﺭﻩ ﺩﻭ ﻭﺳﻪ ﻓﻮﺭﻭﺍﺭﺩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ﺳﺎﻳﺮ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻣﺘﻌﻠﻖ ﺑﻪ ، VLAN2ﺁﮔﺎﻫﻲ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﭘﻴﺎﻡ ﻫﺎﻱ broadcastﺍﺭﺳﺎﻟﻲ ﺑﺮ ﺭﻭﻱ VLAN1ﺭﺍ ﭘﻴﺪﺍ ﻧﮑﺮﺩﻩ ﻭ ﺩﺭﮔﻴﺮ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﻧﺨﻮﺍﻫﻨﺪ
ﺷﺪ. ﺩﺭ ﺣﻘﻴﻘﺖ ،ﺳﻮﺋﻴﭽﻲ ﮐﻪ ﻗﺎﺩﺭ ﺑﻪ ﺣﻤﺎﻳﺖ ﺍﺯ VLANﻣﻲ ﺑﺎﺷﺪ ،ﺍﻣﮑﺎﻥ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﭼﻨﺪﻳﻦ
ﺷﺒﮑﻪ ﻣﺠﺰﺍ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ ) ﻣﺸﺎﺑﻪ ﺩﺍﺷﺘﻦ ﺩﻭ ﺳﻮﺋﻴﭻ ﺟﺪﺍﮔﺎﻧﻪ ﻭ ﺍﺗﺼﺎﻝ ﺳﻪ ﺍﻳﺴﺘﮕﺎﻩ ﺑﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﺁﻧﺎﻥ ﺩﺭ ﻣﻘﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ .( VLANﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺷﺎﻫﺪ ﮐﺎﻫﺶ ﭼﺸﻤﮕﻴﺮ ﻫﺰﻳﻨﻪ ﻫﺎﻱ ﺑﺮﭘﺎﺳﺎﺯﻱ ﻳﮏ ﺷﺒﮑﻪ ﺧﻮﺍﻫﻴﻢ ﺑﻮﺩ. ﻓﺮﺽ ﮐﻨﻴﺪ ﻗﺼﺪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ ﺯﻳﺮ ﺳﺎﺧﺖ ﺷﺒﮑﻪ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺳﺎﺯﻣﺎﻥ ﺑﺰﺭﮒ ﺭﺍ ﺑﻪ ﺩﻭﺍﺯﺩﻩ ﺷﺒﮑﻪ ﺟﺪﺍﮔﺎﻧﻪ ﺗﻘﺴﻴﻢ ﻧﻤﺎﺋﻴﻢ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﺗﻬﻴﻪ ﺩﻭﺍﺯﺩﻩ ﺳﻮﺋﻴﭻ ﻭ ﺍﺗﺼﺎﻝ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﺁﻧﺎﻥ ،ﺩﻭﺍﺯﺩﻩ ﺷﺒﮑﻪ ﻣﺠﺰﺍ ﮐﻪ ﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺁﻧﺎﻥ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ﺭﺍ ﺍﻳﺠﺎﺩ ﻧﻤﺎﺋﻴﻢ .ﻳﮑﻲ ﺩﻳﮕﺮ ﺍﺯ ﺭﻭﺵ ﻫﺎﻱ ﺗﺎﻣﻴﻦ ﺧﻮﺍﺳﺘﻪ ﻓﻮﻕ ،ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
VLANﺍﺳﺖ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﻳﮏ ﻭ ﻳﺎ ﭼﻨﺪﻳﻦ ﺳﻮﺋﻴﭻ ﮐﻪ VLANﺭﺍ ﺣﻤﺎﻳﺖ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﺍﺳﺘﻔﺎﺩﻩ ﻭ ﺩﻭﺍﺯﺩﻩ VLANﺭﺍ ﺍﻳﺠﺎﺩ ﻧﻤﻮﺩ .ﺑﺪﻳﻬﻲ ﺍﺳﺖ ،ﻫﺰﻳﻨﻪ ﺑﺮﭘﺎﺳﺎﺯﻱ ﭼﻨﻴﻦ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﻪ ﻣﺮﺍﺗﺐ ﮐﻤﺘﺮ ﺍﺯ ﺣﺎﻟﺘﻲ ﺍﺳﺖ ﮐﻪ ﺍﺯ ﺩﻭﺍﺯﺩﻩ ﺳﻮﺋﻴﭻ ﺟﺪﺍﮔﺎﻧﻪ ،ﺍﺳﺘﻔﺎﺩﻩ
ﺷﺪﻩ ﺑﺎﺷﺪ .
ﺩﺭ ﺯﻣﺎﻥ ﺍﻳﺠﺎﺩ ،VALNﻣﻲ ﺑﺎﻳﺴﺖ ﺗﻤﺎﻣﻲ ﺍﻳﺴﺘﮕﺎﻫﻬﺎ ﺭﺍ ﺑﻪ ﺳﻮﺋﻴﭻ ﻣﺘﺼﻞ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ، ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻣﺮﺗﺒﻂ ﺑﺎ ﻫﺮ VLANﺭﺍ ﻣﺸﺨﺺ ﻧﻤﻮﺩ .ﻫﺮ ﺳﻮﺋﻴﭻ ﺩﺭ ﺻﻮﺭﺕ ﺣﻤﺎﻳﺖ ﺍﺯ ، VLANﻗﺎﺩﺭ ﺑﻪ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺍﺯ ﺗﻌﺪﺍﺩ ﻣﺸﺨﺼﻲ VLANﺍﺳﺖ .ﻣﺜﻼ" ﻳﮏ ﺳﻮﺋﻴﭻ ﻣﻤﮑﻦ ﺍﺳﺖ ٦٤ﻭ ﻳﺎ VLAN ٢٦٦ﺭﺍ ﺣﻤﺎﻳﺖ ﻧﻤﺎﻳﺪ.
249
ﺷﺒﮑﻪ ﻫﺎﻱ VPN ﺩﺭ ﻃﻲ ﺩﻩ ﺳﺎﻝ ﮔﺬﺷﺘﻪ ﺩﻧﻴﺎ ﺩﺳﺘﺨﻮﺵ ﺗﺤﻮﻻﺕ ﻓﺮﺍﻭﺍﻧﻲ ﺩﺭ ﻋﺮﺻﻪ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺑﻮﺩﻩ
ﺍﺳﺖ .ﺍﻏﻠﺐ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﻣﻮﺳﺴﺎﺕ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﮐﺎﻻ ﻭ ﺧﺪﻣﺎﺕ ﮐﻪ ﺩﺭ ﮔﺬﺷﺘﻪ ﺑﺴﻴﺎﺭ ﻣﺤﺪﻭﺩ ﻭ ﻣﻨﻄﻘﻪ ﺍﻱ ﻣﺴﺎﺋﻞ ﺭﺍ ﺩﻧﺒﺎﻝ ﻭ ﺩﺭ ﺻﺪﺩ ﺍﺭﺍﺋﻪ ﺭﺍﻫﮑﺎﺭﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺑﻮﺩﻧﺪ ،ﺍﻣﺮﻭﺯﻩ ﺑﻴﺶ ﺍﺯ ﮔﺬﺷﺘﻪ ﻧﻴﺎﺯﻣﻨﺪ ﺗﻔﮑﺮ ﺩﺭ ﻣﺤﺪﻭﺩﻩ ﺟﻬﺎﻧﻲ ﺑﺮﺍﻱ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﻭ ﮐﺎﻻﻱ ﺗﻮﻟﻴﺪﻩ ﺷﺪﻩ ﺭﺍ ﺩﺍﺭﻧﺪ.
ﺑﻪ ﻋﺒﺎﺭﺕ ﺩﻳﮕﺮ ﺗﻔﮑﺮﺍﺕ ﻣﻨﻄﻘﻪ ﺍﻱ ﻭ ﻣﺤﻠﻲ ﺣﺎﮐﻢ ﺑﺮ ﻓﻌﺎﻟﻴﺖ ﻫﺎﻱ ﺗﺠﺎﺭﻱ ﺟﺎﻱ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺗﻔﮑﺮﺍﺕ ﺟﻬﺎﻧﻲ ﻭ ﺳﺮﺍﺳﺮﻱ ﺩﺍﺩﻩ ﺍﻧﺪ .ﺍﻣﺮﻭﺯﻩ ﺑﺎ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺯﻳﺎﺩﻱ ﺑﺮﺧﻮﺭﺩ ﻣﻲ ﻧﻤﺎﺋﻴﻢ ﮐﻪ ﺩﺭ ﺳﻄﺢ ﻳﮏ ﮐﺸﻮﺭ ﺩﺍﺭﺍﻱ ﺩﻓﺎﺗﺮ ﻓﻌﺎﻝ ﻭ ﺣﺘﻲ ﺩﺭ ﺳﻄﺢ ﺩﻧﻴﺎ ﺩﺍﺭﺍﻱ ﺩﻓﺎﺗﺮ ﻣﺘﻔﺎﻭﺗﻲ
ﻣﻲ ﺑﺎﺷﻨﺪ .ﺗﻤﺎﻡ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻓﻮﻕ ﻗﺒﻞ ﺍﺯ ﻫﺮ ﭼﻴﺰ ﺑﺪﻧﺒﺎﻝ ﻳﮏ ﺍﺻﻞ ﺑﺴﻴﺎﺭ ﻣﻬﻢ ﻣﻲ ﺑﺎﺷﻨﺪ: ﻳﮏ ﺭﻭﺵ ﺳﺮﻳﻊ ،ﺍﻳﻤﻦ ﻭ ﻗﺎﺑﻞ ﺍﻋﺘﻤﺎﺩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺩﻓﺎﺗﺮ ﻭ ﻧﻤﺎﻳﻨﺪﮔﻲ ﺩﺭ ﺍﻗﺼﻲ
ﻧﻘﺎﻁ ﻳﮏ ﮐﺸﻮﺭ ﻭ ﻳﺎ ﺩﺭ ﺳﻄﺢ ﺩﻧﻴﺎ. ﺍﮐﺜﺮ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﻣﻮﺳﺴﺎﺕ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﻳﮏ ﺷﺒﮑﻪ WANﺍﺯ ﺧﻄﻮﻁ ﺍﺧﺘﺼﺎﺻﻲ ) (Leased Lineﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.ﺧﻄﻮﻁ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﺍﻧﻮﺍﻉ ﻣﺘﻔﺎﻭﺗﻲ ﻣﻲ ﺑﺎﺷﻨﺪ. ) ISDNﺑﺎ ﺳﺮﻋﺖ ١٢٨ﮐﻴﻠﻮﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ((Optical Carrier-3 OC3 ) ،
) ﺑﺎ ﺳﺮﻋﺖ ١٥٥ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ( ﺩﺍﻣﻨﻪ ﻭﺳﻴﻊ ﺧﻄﻮﻁ ﺍﺧﺘﺼﺎﺻﻲ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ .ﻳﮏ
ﺷﺒﮑﻪ WANﺩﺍﺭﺍﻱ ﻣﺰﺍﻳﺎﻱ ﻋﻤﺪﻩ ﺍﻱ ﻧﺴﺒﺖ ﺑﻪ ﻳﮏ ﺷﺒﮑﻪ ﻋﻤﻮﻣﻲ ﻧﻈﻴﺮ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﺑﻌﺪ ﺍﻣﻨﻴﺖ ﻭﮐﺎﺭﺁﺋﻲ ﺍﺳﺖ .ﭘﺸﺘﻴﺎﻧﻲ ﻭ ﻧﮕﻬﺪﺍﺭﻱ ﻳﮏ ﺷﺒﮑﻪ WANﺩﺭ ﻋﻤﻞ ﻭ ﺯﻣﺎﻧﻴﮑﻪ ﺍﺯﺧﻄﻮﻁ
ﺍﺧﺘﺼﺎﺻﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ ،ﻣﺴﺘﻠﺰﻡ ﺻﺮﻑ ﻫﺰﻳﻨﻪ ﺑﺎﻻﺋﻲ ﺍﺳﺖ.
ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﻋﻤﻮﻣﻴﺖ ﻳﺎﻓﺘﻦ ﺍﻳﻨﺘﺮﻧﺖ ،ﺍﻏﻠﺐ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﻣﻮﺳﺴﺎﺕ ﺿﺮﻭﺭﺕ ﺗﻮﺳﻌﻪ ﺷﺒﮑﻪ ﺍﺧﺘﺼﺎﺻﻲ ﺧﻮﺩ ﺭﺍ ﺑﺪﺭﺳﺘﻲ ﺍﺣﺴﺎﺱ ﮐﺮﺩﻧﺪ .ﺩﺭ ﺍﺑﺘﺪﺍ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﻳﻨﺘﺮﺍﻧﺖ ﻣﻄﺮﺡ ﮔﺮﺩﻳﺪﻧﺪ.ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﺑﺼﻮﺭﺕ ﮐﺎﻣﻼ" ﺍﺧﺘﺼﺎﺻﻲ ﺑﻮﺩﻩ ﻭ ﮐﺎﺭﻣﻨﺪﺍﻥ ﻳﮏ ﺳﺎﺯﻣﺎﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻣﺰ ﻋﺒﻮﺭ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ،ﻗﺎﺩﺭ ﺑﻪ ﻭﺭﻭﺩ ﺑﻪ ﺷﺒﮑﻪ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻨﺎﺑﻊ ﻣﻮﺟﻮﺩ ﻣﻲ ﺑﺎﺷﻨﺪ.
250
ﺍﺧﻴﺮﺍ" ،ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺍﺯ ﻣﻮﺳﺴﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﻄﺮﺡ ﺷﺪﻥ ﺧﻮﺍﺳﺘﻪ ﻫﺎﻱ ﺟﺪﻳﺪ ) ﮐﺎﺭﻣﻨﺪﺍﻥ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ،ﺍﺩﺍﺭﺍﺕ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ( ،ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﻳﺠﺎﺩ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺧﺘﺼﺎﺻﻲ ﻣﺠﺎﺯﻱ
( Virtual Private Network (VPNﻧﻤﻮﺩﻩ ﺍﻧﺪ. ﻳﮏ ، VPNﺷﺒﮑﻪ ﺍﻱ ﺍﺧﺘﺼﺎﺻﻲ ﺑﻮﺩﻩ ﮐﻪ ﺍﺯ ﻳﮏ ﺷﺒﮑﻪ ﻋﻤﻮﻣﻲ ) ﻋﻤﻮﻣﺎ" ﺍﻳﻨﺘﺮﻧﺖ ( ،ﺑﺮﺍﻱ
ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﺎﻳﺖ ﻫﺎﻱ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﻭ ﺍﺭﺗﺒﺎﻁ ﮐﺎﺭﺑﺮﺍﻥ ﺑﺎﻳﮑﺪﻳﮕﺮ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ﺩﺭ ﻋﻮﺽ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﻄﻮﻁ ﻭﺍﻗﻌﻲ ﻧﻈﻴﺮ :ﺧﻄﻮﻁ ،Leasedﺍﺯ ﻳﮏ ﺍﺭﺗﺒﺎﻁ
ﻣﺠﺎﺯﻱ ﺑﮑﻤﮏ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺮﺍﻱ ﺷﺒﮑﻪ ﺍﺧﺘﺼﺎﺻﻲ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺑﻪ ﺳﺎﻳﺖ ﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﮐﻨﺪ.
ﻋﻨﺎﺻﺮ ﺗﺸﮑﻴﻞ ﺩﻫﻨﺪﻩ ﻳﮏ VPN
ﺩﻭ ﻧﻮﻉ ﻋﻤﺪﻩ ﺷﺒﮑﻪ ﻫﺎﻱ VPNﻭﺟﻮﺩ ﺩﺍﺭﺩ: •
ﺩﺳﺘﻴﺎﺑﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ) . (Remote-Accessﺑﻪ ﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎ ،(network Virtual private dial-up(VPDNﻧﻴﺰ ﮔﻔﺘﻪ ﻣﻲ ﺷﻮﺩ.ﺩﺭ
ﺷﺒﮑﻪ ﻫﺎﻱ ﻓﻮﻕ ﺍﺯ ﻣﺪﻝ ﺍﺭﺗﺒﺎﻃﻲ ) User-To-Lanﺍﺭﺗﺒﺎﻁ ﮐﺎﺭﺑﺮ ﺑﻪ ﻳﮏ ﺷﺒﮑﻪ
ﻣﺤﻠﻲ ( ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺳﺎﺯﻣﺎﻧﻬﺎﺋﻲ ﮐﻪ ﺍﺯ ﻣﺪﻝ ﻓﻮﻕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﺑﺪﻧﺒﺎﻝ ﺍﻳﺠﺎﺩ ﺗﺴﻬﻴﻼﺕ ﻻﺯﻡ ﺑﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﭘﺮﺳﻨﻞ )ﻋﻤﻮﻣﺎ" ﮐﺎﺭﺑﺮﺍﻥ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﻭ ﺩﺭ ﻫﺮ
ﻣﮑﺎﻧﻲ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺣﻀﻮﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ( ﺑﻪ ﺷﺒﮑﻪ ﺳﺎﺯﻣﺎﻥ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺳﺎﺯﻣﺎﻧﻬﺎﺋﻲ ﮐﻪ ﺗﻤﺎﻳﻞ ﺑﻪ ﺑﺮﭘﺎﺳﺎﺯﻱ ﻳﮏ ﺷﺒﮑﻪ ﺑﺰﺭﮒ " ﺩﺳﺘﻴﺎﺑﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ " ﻣﻲ ﺑﺎﺷﻨﺪ، ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﺍﻣﮑﺎﻧﺎﺕ ﻳﮏ ﻣﺮﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺖ ﺟﻬﺎﻧﻲ
(service provider Enterprise(ESPﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ .ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ، ESPﺑﻪ ﻣﻨﻈﻮﺭ ﻧﺼﺐ ﻭ ﭘﻴﮑﺮﺑﻨﺪﻱ ، VPNﻳﮏ Network access (NAS (serverﺭﺍ ﭘﻴﮑﺮﺑﻨﺪﻱ ﻭ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﺎﻳﺖ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﮐﺎﺭﺑﺮﺍﻥ ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺎ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﻗﺎﺩﺭ ﺑﻪ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ NASﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻣﺮﺑﻮﻃﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺷﺒﮑﻪ
ﺳﺎﺯﻣﺎﻥ ﺧﻮﺩ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ. 251
•
ﺳﺎﻳﺖ ﺑﻪ ﺳﺎﻳﺖ ) . (Site-to-Siteﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ﻳﮏ ﺳﺎﺯﻣﺎﻥ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ
ﺳﻴﺎﺳﺖ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ،ﻗﺎﺩﺭ ﺑﻪ ﺍﺗﺼﺎﻝ ﭼﻨﺪﻳﻦ ﺳﺎﻳﺖ ﺛﺎﺑﺖ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﺷﺒﮑﻪ ﻋﻤﻮﻣﻲ ﻧﻈﻴﺮ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺖ .ﺷﺒﮑﻪ ﻫﺎﻱ VPNﮐﻪ ﺍﺯ ﺭﻭﺵ ﻓﻮﻕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ، ﺩﺍﺭﺍﻱ ﮔﻮﻧﻪ ﻫﺎﻱ ﺧﺎﺻﻲ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻣﻲ ﺑﺎﺷﻨﺪ:
ﻣﺒﺘﻨﻲ ﺑﺮ ﺍﻳﻨﺘﺮﺍﻧﺖ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺳﺎﺯﻣﺎﻧﻲ ﺩﺍﺭﺍﻱ ﻳﮏ ﻭ ﻳﺎ ﺑﻴﺶ ﺍﺯ ﻳﮏ ﻣﺤﻞ) ﺭﺍﻩ ﺩﻭﺭ( ﺑﻮﺩﻩ ﻭ ﺗﻤﺎﻳﻞ ﺑﻪ ﺍﻟﺤﺎﻕ ﺁﻧﻬﺎ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺍﺧﺘﺼﺎﺻﻲ ﺑﺎﺷﺪ ،ﻣﻲ ﺗﻮﺍﻥ
ﻳﮏ ﺍﻳﻨﺘﺮﺍﻧﺖ VPNﺭﺍ ﺑﻪ ﻣﻨﻈﻮﺭ ﺑﺮﻗﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﻫﺮ ﻳﮏ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺤﻠﻲ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺍﻳﺠﺎﺩ ﻧﻤﻮﺩ. -ﻣﺒﺘﻨﻲ ﺑﺮ ﺍﮐﺴﺘﺮﺍﻧﺖ .ﺩﺭ ﻣﻮﺍﺭﺩﻳﮑﻪ ﺳﺎﺯﻣﺎﻧﻲ ﺩﺭ ﺗﻌﺎﻣﻞ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺴﻴﺎﺭ ﻧﺰﺩﻳﮏ
ﺑﺎ ﺳﺎﺯﻣﺎﻥ ﺩﻳﮕﺮ ﺑﺎﺷﺪ ،ﻣﻲ ﺗﻮﺍﻥ ﻳﮏ ﺍﮐﺴﺘﺮﺍﻧﺖ VPNﺭﺍ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺤﻠﻲ ﻫﺮ ﻳﮏ ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺍﻳﺠﺎﺩ ﮐﺮﺩ .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻣﺘﻌﺪﺩ ﻗﺎﺩﺭ ﺑﻪ ﻓﻌﺎﻟﻴﺖ ﺩﺭ ﻳﮏ ﻣﺤﻴﻂ ﺍﺷﺘﺮﺍﮐﻲ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ. ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ VPNﺑﺮﺍﻱ ﻳﮏ ﺳﺎﺯﻣﺎﻥ ﺩﺍﺭﺍﻱ ﻣﺰﺍﻳﺎﻱ ﻣﺘﻌﺪﺩﻱ ﻧﻈﻴﺮ :ﮔﺴﺘﺮﺵ ﻣﺤﺪﻭﻩ
ﺟﻐﺮﺍﻓﻴﺎﺋﻲ ﺍﺭﺗﺒﺎﻃﻲ ،ﺑﻬﺒﻮﺩ ﻭﺿﻌﻴﺖ ﺍﻣﻨﻴﺖ ،ﮐﺎﻫﺶ ﻫﺰﻳﻨﻪ ﻫﺎﻱ ﻋﻤﻠﻴﺎﺗﻲ ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ﺭﻭﺵ
ﻫﺎﻱ ﺳﻨﺘﻲ ، WANﮐﺎﻫﺶ ﺯﻣﺎﻥ ﺍﺭﺳﺎﻝ ﻭ ﺣﻤﻞ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻱ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ،ﺑﻬﺒﻮﺩ ﺑﻬﺮﻩ ﻭﺭﻱ ،ﺗﻮﭘﻮﻟﻮﮊﻱ ﺁﺳﺎﻥ ...،ﺍﺳﺖ .ﺩﺭ ﻳﮑﻪ ﺷﺒﮑﻪ VPNﺑﻪ ﻋﻮﺍﻣﻞ ﻣﺘﻔﺎﻭﺗﻲ ﻧﻈﻴﺮ :ﺍﻣﻨﻴﺖ، ﺍﻋﺘﻤﺎﺩﭘﺬﻳﺮﻱ ،ﻣﺪﻳﺮﻳﺖ ﺷﺒﮑﻪ ﻭ ﺳﻴﺎﺳﺖ ﻫﺎ ﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺑﻮﺩ. ﺷﺒﮑﻪ ﻫﺎﻱ LANﺟﺰﺍﻳﺮ ﺍﻃﻼﻋﺎﺗﻲ
ﻓﺮﺽ ﻧﻤﺎﺋﻴﺪ ﺩﺭ ﺟﺰﻳﺮﻩ ﺍﻱ ﺩﺭ ﺍﻗﻴﺎﻧﻮﺳﻲ ﺑﺰﺭﮒ ،ﺯﻧﺪﮔﻲ ﻣﻲ ﮐﻨﻴﺪ .ﻫﺰﺍﺭﺍﻥ ﺟﺰﻳﺮﻩ ﺩﺭ ﺍﻃﺮﺍﻑ ﺟﺰﻳﺮﻩ ﺷﻤﺎ ﻭﺟﻮﺩ ﺩﺍﺭﺩ .ﺑﺮﺧﻲ ﺍﺯ ﺟﺰﺍﻳﺮ ﻧﺰﺩﻳﮏ ﻭ ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﺩﺍﺭﺍﻱ ﻣﺴﺎﻓﺖ ﻃﻮﻻﻧﻲ ﺑﺎ ﺟﺰﻳﺮﻩ ﺷﻤﺎ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﺭﻭﺵ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺴﺎﻓﺮﺕ ﺑﻪ ﺟﺰﻳﺮﻩ ﺩﻳﮕﺮ،
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﮐﺸﺘﻲ ﻣﺴﺎﻓﺮﺑﺮﻱ ﺍﺳﺖ .ﻣﺴﺎﻓﺮﺕ ﺑﺎ ﮐﺸﺘﻲ ﻣﺴﺎﻓﺮﺑﺮﻱ ،ﺑﻤﻨﺰﻟﻪ ﻋﺪﻡ ﻭﺟﻮﺩ ﺍﻣﻨﻴﺖ ﺍﺳﺖ. 252
ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﻫﺮ ﮐﺎﺭﻱ ﺭﺍ ﮐﻪ ﺷﻤﺎ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ ،ﺗﻮﺳﻂ ﺳﺎﻳﺮ ﻣﺴﺎﻓﺮﻳﻦ ﻗﺎﺑﻞ ﻣﺸﺎﻫﺪﻩ
ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﻓﺮﺽ ﮐﻨﻴﺪ ﻫﺮ ﻳﮏ ﺍﺯ ﺟﺰﺍﻳﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﻣﺸﺎﺑﻪ ﻳﮏ ﺷﺒﮑﻪ ﻣﺤﻠﻲ ) (LANﻭ ﺍﻗﻴﺎﻧﻮﺱ ﻣﺎﻧﻨﺪ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺎﺷﻨﺪ .ﻣﺴﺎﻓﺮﺕ ﺑﺎ ﻳﮏ ﮐﺸﺘﻲ ﻣﺴﺎﻓﺮﺑﺮﻱ ﻣﺸﺎﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﻭ ﻳﺎ ﺳﺎﻳﺮ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺖ .ﺷﻤﺎ ﺩﺍﺭﺍﻱ ﻫﻴﭽﮕﻮﻧﻪ ﮐﻨﺘﺮﻟﻲ ﺑﺮ ﺭﻭﻱ ﮐﺎﺑﻞ ﻫﺎ ﻭ ﺭﻭﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ
ﻧﻤﻲ ﺑﺎﺷﻴﺪ ) .ﻣﺸﺎﺑﻪ
ﻋﺪﻡ ﮐﻨﺘﺮﻝ ﺷﻤﺎ ﺑﻪ ﻋﻨﻮﺍﻥ ﻣﺴﺎﻓﺮ ﮐﺸﺘﻲ ﻣﺴﺎﻓﺮﺑﺮﻱ ﺑﺮ ﺭﻭﻱ ﺳﺎﻳﺮ ﻣﺴﺎﻓﺮﻳﻦ ﺣﺎﺿﺮ ﺩﺭ ﮐﺸﺘﻲ ( .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺗﻤﺎﻳﻞ ﺑﻪ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺩﻭ ﺷﺒﮑﻪ ﺍﺧﺘﺼﺎﺻﻲ ﺍﺯ ﻃﺮﻳﻖ ﻣﻨﺎﺑﻊ ﻋﻤﻮﻣﻲ ﻭﺟﻮﺩ
ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ،ﺍﻭﻟﻴﻦ ﻣﺴﺌﻠﻪ ﺍﻱ ﮐﻪ ﺑﺎ ﭼﺎﻟﺶ ﻫﺎﻱ ﺟﺪﻱ ﺑﺮﺧﻮﺭﺩ ﺧﻮﺍﻫﺪ ﮐﺮﺩ ،ﺍﻣﻨﻴﺖ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﻓﺮﺽ ﮐﻨﻴﺪ ،ﺟﺰﻳﺮﻩ ﺷﻤﺎ ﻗﺼﺪ ﺍﻳﺠﺎﺩ ﻳﮏ ﭘﻞ ﺍﺭﺗﺒﺎﻃﻲ ﺑﺎ ﺟﺰﻳﺮﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ .ﻣﺴﻴﺮ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﻳﮏ ﺭﻭﺵ ﺍﻳﻤﻦ ،ﺳﺎﺩﻩ ﻭ ﻣﺴﺘﻘﻴﻢ ﺑﺮﺍﻱ ﻣﺴﺎﻓﺮﺕ ﺳﺎﮐﻨﻴﻦ ﺟﺰﻳﺮﻩ
ﺷﻤﺎ ﺑﻪ ﺟﺰﻳﺮﻩ ﺩﻳﮕﺮ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﺁﻭﺭﺩ .ﻫﻤﺎﻧﻄﻮﺭ ﮐﻪ ﺣﺪﺱ ﺯﺩﻩ ﺍﻳﺪ ،ﺍﻳﺠﺎﺩ ﻭ ﻧﮕﻬﺪﺍﺭﻱ
ﻳﮏ ﭘﻞ ﺍﺭﺗﺒﺎﻃﻲ ﺑﻴﻦ ﺩﻭ ﺟﺰﻳﺮﻩ ﻣﺴﺘﻠﺰﻡ ﺻﺮﻑ ﻫﺰﻳﻨﻪ ﻫﺎﻱ ﺑﺎﻻﺋﻲ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ).ﺣﺘﻲ ﺍﮔﺮ ﺟﺰﺍﻳﺮ ﺩﺭ ﻣﺠﺎﻭﺭﺕ ﻳﮑﺪﻳﮕﺮ ﺑﺎﺷﻨﺪ ( .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺿﺮﻭﺭﺕ ﻭ ﺣﺴﺎﺳﻴﺖ ﻣﺮﺑﻮﻁ ﺑﻪ ﺩﺍﺷﺘﻦ
ﻳﮏ ﻣﺴﻴﺮ ﺍﻳﻤﻦ ﻭ ﻣﻄﻤﺌﻦ ،ﺗﺼﻤﻴﻢ ﺑﻪ ﺍﻳﺠﺎﺩ ﭘﻞ ﺍﺭﺗﺒﺎﻃﻲ ﺑﻴﻦ ﺩﻭ ﺟﺰﻳﺮﻩ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺍﺳﺖ. ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺟﺰﻳﺮﻩ ﺷﻤﺎ ﻗﺼﺪ ﺍﻳﺠﺎﺩ ﻳﮏ ﭘﻞ ﺍﺭﺗﺒﺎﻃﻲ ﺑﺎ ﺟﺰﻳﺮﻩ ﺩﻳﮕﺮ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﮐﻪ ﺩﺭ ﻣﺴﺎﻓﺖ ﺑﺴﻴﺎﺭ ﻃﻮﻻﻧﻲ ﻧﺴﺒﺖ ﺑﻪ ﺟﺰﻳﺮﻩ ﺷﻤﺎ ﻭﺍﻗﻊ ﺍﺳﺖ ،ﻫﺰﻳﻨﻪ ﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﻭﺿﻌﻴﺖ ﻓﻮﻕ ،ﻧﻈﻴﺮ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ
ﺍﺧﺘﺼﺎﺻﻲ Leasedﺍﺳﺖ .ﻣﺎﻫﻴﺖ ﭘﻞ ﻫﺎﻱ ﺍﺭﺗﺒﺎﻃﻲ ) ﺧﻄﻮﻁ ﺍﺧﺘﺼﺎﺻﻲ ( ﺍﺯ ﺍﻗﻴﺎﻧﻮﺱ ) ﺍﻳﻨﺘﺮﻧﺖ ( ﻣﺘﻔﺎﻭﺕ ﺑﻮﺩﻩ ﻭ ﮐﻤﺎﮐﻦ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺗﺒﺎﻁ ﺟﺰﺍﻳﺮ) ﺷﺒﮑﻪ ﻫﺎﻱ (LANﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ. ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﻣﻮﺳﺴﺎﺕ ﻣﺘﻌﺪﺩﻱ ﺍﺯ ﺭﻭﻳﮑﺮﺩ ﻓﻮﻕ ) ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﻄﻮﻁ ﺍﺧﺘﺼﺎﺻﻲ( ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﻣﻬﻤﺘﺮﻳﻦ ﻋﺎﻣﻞ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻭﺟﻮﺩ ﺍﻣﻨﻴﺖ ﻭ ﺍﻃﻤﻴﻨﺎﻥ ﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﻫﺮ ﻳﮏ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺍﺳﺖ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻣﺴﺎﻓﺖ ﺍﺩﺍﺭﺍﺕ ﻭ ﻳﺎ ﺷﻌﺐ ﻳﮏ ﺳﺎﺯﻣﺎﻥ ﺍﺯ ﻳﮑﺪﻳﮕﺮ ﺑﺴﻴﺎﺭ ﺩﻭﺭ ﺑﺎﺷﺪ ،ﻫﺰﻳﻨﻪ ﻣﺮﺑﻮﻁ ﺑﻪ ﺑﺮﻗﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﻧﻴﺰ ﺍﻓﺰﺍﻳﺶ ﺧﻮﺍﻫﺪ
ﻳﺎﻓﺖ.
253
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﻮﺍﺭﺩ ﮔﻔﺘﻪ ﺷﺪﻩ ،ﭼﻪ ﺿﺮﻭﺭﺗﻲ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ VPNﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﻭ
VPNﺗﺎﻣﻴﻦ ﮐﻨﻨﺪﻩ ،ﮐﺪﺍﻣﻴﮏ ﺍﺯ ﺍﻫﺪﺍﻑ ﻭ ﺧﻮﺍﺳﺘﻪ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺳﺖ؟ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﻘﺎﻳﺴﻪ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺩﺭ ﻣﺜﺎﻝ ﻓﺮﺿﻲ ،ﻣﻲ ﺗﻮﺍﻥ ﮔﻔﺖ ﮐﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ VPNﺑﻪ ﻫﺮﻳﮏ ﺍﺯ ﺳﺎﮐﻨﻴﻦ ﺟﺰﻳﺮﻩ ﻳﮏ ﺯﻳﺮﺩﺭﻳﺎﺋﻲ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺯﻳﺮﺩﺭﻳﺎﺋﻲ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﺧﺼﺎﻳﺺ ﻣﺘﻔﺎﻭﺕ
ﻧﻈﻴﺮ : • •
ﺩﺍﺭﺍﻱ ﺳﺮﻋﺖ ﺑﺎﻻ ﺍﺳﺖ. ﻫﺪﺍﻳﺖ ﺁﻥ ﺳﺎﺩﻩ ﺍﺳﺖ.
•
ﻗﺎﺩﺭ ﺑﻪ ﺍﺳﺘﺘﺎﺭ) ﻣﺨﻔﻲ ﻧﻤﻮﺩﻥ( ﺷﻤﺎ ﺍﺯ ﺳﺎﻳﺮ ﺯﻳﺮﺩﺭﻳﺎ ﺋﻴﻬﺎ ﻭ ﮐﺸﺘﻲ ﻫﺎ ﺍﺳﺖ.
•
ﻗﺎﺑﻞ ﺍﻋﺘﻤﺎﺩ ﺍﺳﺖ .
•
ﭘﺲ ﺍﺯ ﺗﺎﻣﻴﻦ ﺍﻭﻟﻴﻦ ﺯﻳﺮﺩﺭﻳﺎﺋﻲ ،ﺍﻓﺰﻭﺩﻥ ﺍﻣﮑﺎﻧﺎﺕ ﺟﺎﻧﺒﻲ ﻭ ﺣﺘﻲ ﻳﮏ ﺯﻳﺮﺩﺭﻳﺎﺋﻲ ﺩﻳﮕﺮﻣﻘﺮﻭﻥ ﺑﻪ ﺻﺮﻓﻪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ
ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ،ﺑﺎ ﻭﺟﻮﺩ ﺗﺮﺍﻓﻴﮏ ﺩﺭ ﺍﻗﻴﺎﻧﻮﺱ ،ﻫﺮ ﻳﮏ ﺍﺯ ﺳﺎﮐﻨﻴﻦ ﺩﻭ ﺟﺰﻳﺮﻩ ﻗﺎﺩﺭ ﺑﻪ ﺗﺮﺩﺩ ﺩﺭ ﻃﻮﻝ ﻣﺴﻴﺮ ﺩﺭ ﺯﻣﺎﻥ ﺩﻟﺨﻮﺍﻩ ﺧﻮﺩ ﺑﺎ ﺭﻋﺎﻳﺖ ﻣﺴﺎﻳﻞ ﺍﻳﻤﻨﻲ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻣﺜﺎﻝ ﻓﻮﻕ ﺩﻗﻴﻘﺎ" ﺑﻴﺎﻧﮕﺮ ﺗﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ VPNﺍﺳﺖ .ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺷﺒﮑﻪ ﻗﺎﺩﺭﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻃﻲ ﺍﻣﻦ ﻭ ﻣﻄﻤﺌﻦ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﻋﻤﻮﻣﻲ ) ﻧﻈﻴﺮ ﺍﻳﻨﺘﺮﻧﺖ ( ﺑﺎ ﺷﺒﮑﻪ ﻣﺤﻠﻲ
) (LANﻣﻮﺟﻮﺩ ﺩﺭ ﺳﺎﺯﻣﺎﻥ ﺧﻮﺩ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺗﻮﺳﻌﻪ ﻳﮏ ) VPNﺍﻓﺰﺍﻳﺶ ﺗﻌﺪﺍﺩ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﻭ ﻳﺎ ﺍﻓﺰﺍﻳﺶ ﻣﮑﺎﻥ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ( ﺑﻤﺮﺍﺗﺐ ﺁﺳﺎﻧﺘﺮ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎﺋﻲ ﺍﺳﺖ ﮐﻪ ﺍﺯ
ﺧﻄﻮﻁ ﺍﺧﺘﺼﺎﺻﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﻗﺎﺑﻠﻴﺖ ﺗﻮﺳﻌﻪ ﻓﺮﺍﮔﻴﺮ ﺍﺯ ﻣﻬﻤﺘﺰﻳﻦ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﻳﮏ
VPNﻧﺴﺒﺖ ﺑﻪ ﺧﻄﻮﻁ ﺍﺧﺘﺼﺎﺻﻲ ﺍﺳﺖ. ﺍﻣﻨﻴﺖ VPN ﺷﺒﮑﻪ ﻫﺎﻱ VPNﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺎﻣﻴﻦ ﺍﻣﻨﻴﺖ )ﺩﺍﺩﻩ ﻫﺎ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ( ﺍﺯ ﺭﻭﺵ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ:
254
•
ﻓﺎﻳﺮﻭﺍﻝ .ﻓﺎﻳﺮﻭﺍﻝ ﻳﮏ ﺩﻳﻮﺍﺭﻩ ﻣﺠﺎﺯﻱ ﺑﻴﻦ ﺷﺒﮑﻪ ﺍﺧﺘﺼﺎﻱ ﻳﮏ ﺳﺎﺯﻣﺎﻥ ﻭ ﺍﻳﻨﺘﺮﻧﺖ ﺍﻳﺠﺎﺩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺎﻳﺮﻭﺍﻝ ﻣﻲ ﺗﻮﺍﻥ ﻋﻤﻠﻴﺎﺕ ﻣﺘﻔﺎﻭﺗﻲ ﺭﺍ ﺩﺭ ﺟﻬﺖ ﺍﻋﻤﺎﻝ ﺳﻴﺎﺳﺖ ﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻳﮏ ﺳﺎﺯﻣﺎﻥ ﺍﻧﺠﺎﻡ ﺩﺍﺩ .ﺍﻳﺠﺎﺩ ﻣﺤﺪﻭﺩﻳﺖ ﺩﺭ ﺗﻌﺪﺍﺩ ﭘﻮﺭﺕ ﻫﺎ
ﻓﻌﺎﻝ ،ﺍﻳﺠﺎﺩ ﻣﺤﺪﻭﺩﻳﺖ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﻪ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺧﺎﺹ ،ﺍﻳﺠﺎﺩ ﻣﺤﺪﻭﺩﻳﺖ ﺩﺭ
ﻧﻮﻉ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻭ ...ﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﺍﺯ ﻋﻤﻠﻴﺎﺗﻲ ﺍﺳﺖ ﮐﻪ ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﻓﺎﻳﺮﻭﺍﻝ ﺍﻧﺠﺎﻡ ﺩﺍﺩ.
•
ﺭﻣﺰﻧﮕﺎﺭﻱ .ﻓﺮﺁﻳﻨﺪﻱ ﺍﺳﺖ ﮐﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍﺀ ﺍﻃﻼﻋﺎﺗﻲ ﺭﻣﺰﺷﺪﻩ ﺭﺍ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﻳﮕﺮ ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺳﺎﻳﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻱ ﻣﺠﺎﺯ ﻗﺎﺩﺭ ﺑﻪ ﺭﻣﺰﮔﺸﺎﺋﻲ
ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻟﻲ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﭘﺲ ﺍﺯ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺗﻮﺳﻂ
ﻓﺮﺳﺘﻨﺪﻩ ،ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﮔﺎﻥ ،ﻗﺒﻞ ﺍﺯ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﻗﺪﺍﻡ ﺑﻪ ﺭﻣﺰﮔﺸﺎﺋﻲ ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﻧﻤﺎﻳﻨﺪ .ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺩﻭ
ﮔﺮﻭﻩ ﻋﻤﺪﻩ ﺗﻘﺴﻴﻢ ﻣﻲ ﮔﺮﺩﺩ :ﺭﻣﺰﻧﮕﺎﺭﻱ ﮐﻠﻴﺪ ﻣﺘﻘﺎﺭﻥ ﻭ ﺭﻣﺰﻧﮕﺎﺭﻱ ﮐﻠﻴﺪ ﻋـــﻤﻮﻣﻲ ﺩﺭ ﺭﻣﺰ ﻧﮕﺎﺭﻱ " ﮐﻠﻴﺪ ﻣﺘﻘﺎﺭﻥ " ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺩﺍﺭﺍﻱ ﻳﮏ ﮐﻠﻴﺪ ) Secretﮐﺪ ( ﺑﻮﺩﻩ ﮐﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﻗﺎﺩﺭ ﺑﻪ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻗﺒﻞ ﺍﺯ ﺍﺭﺳﺎﻝ ﺩﺭ ﺷﺒﮑﻪ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﻳﮕﺮ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺭﻭﺵ ﻓﻮﻕ ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺭ ﺍﺑﺘﺪﺍ ﻧﺴﺒﺖ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﺋﻲ
ﮐﻪ ﻗﺼﺪ ﺑﺮﻗﺮﺍﺭﻱ ﻭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻱ ﻳﮑﺪﻳﮕﺮ ﺭﺍ ﺩﺍﺭﻧﺪ ،ﺁﮔﺎﻫﻲ ﮐﺎﻣﻞ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ
ﺑﺎﺷﺪ .ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺷﺮﮐﺖ ﮐﻨﻨﺪﻩ ﺩﺭ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺍﺭﺍﻱ ﮐﻠﻴﺪ ﺭﻣﺰ ﻣﺸﺎﺑﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺭﻣﺰﮔﺸﺎﺋﻲ ﺍﻃﻼﻋﺎﺕ ﺑﺎﺷﻨﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻟﻲ ﻧﻴﺰ
ﺍﺯ ﮐﻠﻴﺪ ﻓﻮﻕ ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﺪ ﺷﺪ .ﻓﺮﺽ ﮐﻨﻴﺪ ﻗﺼﺪ ﺍﺭﺳﺎﻝ ﻳﮏ ﭘﻴﺎﻡ ﺭﻣﺰ ﺷﺪﻩ ﺑﺮﺍﻱ ﻳﮑﻲ ﺍﺯ ﺩﻭﺳﺘﺎﻥ ﺧﻮﺩ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﺍﺯ ﻳﮏ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺧﺎﺹ ﺑﺮﺍﻱ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺩﺭ ﺍﻟﮕﻮﺭﻳﺘﻢ ﻓﻮﻕ ﻫﺮ ﺣﺮﻑ ﺑﻪ ﺩﻭﺣﺮﻑ ﺑﻌﺪ ﺍﺯ ﺧﻮﺩ ﺗﺒﺪﻳﻞ ﻣﻲ ﮔﺮﺩﺩ) .ﺣﺮﻑ A
ﺑﻪ ﺣﺮﻑ ، Cﺣﺮﻑ Bﺑﻪ ﺣﺮﻑ .( Dﭘﺲ ﺍﺯ ﺭﻣﺰﻧﻤﻮﺩﻥ ﭘﻴﺎﻡ ﻭ ﺍﺭﺳﺎﻝ ﺁﻥ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﭘﻴﺎﻡ ﺑﻪ ﺍﻳﻦ ﺣﻘﻴﻘﺖ ﻭﺍﻗﻒ ﺑﺎﺷﺪ ﮐﻪ ﺑﺮﺍﻱ ﺭﻣﺰﮔﺸﺎﺋﻲ ﭘﻴﺎﻡ ﻟﺮﺳﺎﻝ ﺷﺪﻩ ،ﻫﺮ ﺣﺮﻑ ﺑﻪ ﺩﻭ ﺣﺮﻕ ﻗﺒﻞ ﺍﺯ ﺧﻮﺩ ﻣﻲ ﺑﺎﻳﺴﺖ ﺗﺒﺪﻳﻞ ﮔﺮﺩﺩ. 255
ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﺩﻭﺳﺖ ﺍﻣﻴﻦ ﺧﻮﺩ ،ﻭﺍﻗﻌﻴﺖ ﻓﻮﻕ ) ﮐﻠﻴﺪ ﺭﻣﺰ ( ﮔﻔﺘﻪ
ﺷﻮﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﭘﻴﺎﻡ ﻓﻮﻕ ﺗﻮﺳﻂ ﺍﻓﺮﺍﺩ ﺩﻳﮕﺮﻱ ﺩﺭﻳﺎﻓﺖ ﮔﺮﺩﺩ ،ﺑﺪﻟﻴﻞ ﻋﺪﻡ ﺁﮔﺎﻫﻲ ﺍﺯ ﮐﻠﻴﺪ ،ﺁﻧﺎﻥ ﻗﺎﺩﺭ ﺑﻪ ﺭﻣﺰﮔﺸﺎﺋﻲ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻴﺎﻡ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﻧﺨﻮﺍﻫﻨﺪ ﺑﻮﺩ. ﺩﺭ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻋﻤﻮﻣﻲ ﺍﺯ ﺗﺮﮐﻴﺐ ﻳﮏ ﮐﻠﻴﺪ ﺧﺼﻮﺻﻲ ﻭ ﻳﮏ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ. ﮐﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺻﺮﻓﺎ" ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﻤﺎ ) ﺍﺭﺳﺎﻝ ﮐﻨﻨﺪﻩ( ﻗﺎﺑﻞ ﺷﻨﺎﺳﺎﺋﻲ ﻭ ﺍﺳﺘـﻔﺎﺩﻩ ﺍﺳﺖ. ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺗﻮﺳﻂ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﻤﺎ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺗﻤﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺩﻳﮕﺮ ﮐﻪ ﻗﺼﺪ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺁﻥ
ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ،ﮔﺬﺍﺷﺘﻪ ﻣﻲ ﺷﻮﺩ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺭﻣﺰﮔﺸﺎﺋﻲ ﻳﮏ ﭘﻴﺎﻡ ﺭﻣﺰ ﺷﺪﻩ ،ﻳﮏ ﮐﺎﻣﭙﻴـﻮﺗﺮ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ ) ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺗﻮﺳﻂ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺭﺳﺎﻝ ﮐﻨﻨﺪﻩ ( ،ﮐﻠــﻴﺪ ﺧﺼﻮﺻﻲ ﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ ﺍﻗﺪﺍﻡ ﺑﻪ ﺭﻣﺰﮔﺸﺎﺋﻲ ﭘﻴﺎﻡ ﺍﺭﺳﺎﻟﻲ ﻧﻤﺎﻳﺪ .ﻳﮑﻲ ﺍﺯ ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﺍﺑﺰﺍﺭ
"ﺭﻣﺰﻧﮕﺎﺭﻱ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ" ،ﺭﻭﺷﻲ ﺑﺎ ﻧﺎﻡ (Pretty Good Privacy(PGPﺍﺳﺖ. ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ ﻓﻮﻕ ﻣﻲ ﺗﻮﺍﻥ ﺍﻗﺪﺍﻡ ﺑﻪ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺩﻟﺨﻮﺍﻩ ﺧﻮﺩ ﻧﻤﻮﺩ. •
. IPSecﭘﺮﻭﺗﮑﻞ ، (protocol Internet protocol security(IPsec
ﻳﮑﻲ ﺍﺯ ﺍﻣﮑﺎﻧﺎﺕ ﻣﻮﺟﻮﺩ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺍﻣﻨــــﻴﺖ ﺩﺭ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓـــــﺖ ﺍﻃﻼﻋﺎﺕ
ﻣﻲ ﺑﺎﺷﺪ .ﻗﺎﺑﻠﻴﺖ ﺭﻭﺵ ﻓﻮﻕ ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ﺍﻟﮕﻮﺭﻳﺘﻢ ﻫﺎﻱ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﺩﻭ ﺭﻭﺵ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺍﺳﺖ . Transport ،Tunnel : ﺩﺭ ﺭﻭﺵ ، tunelﻫﺪﺭ ﻭ Payloadﺭﻣﺰ ﺷﺪﻩ ﺩﺭﺣﺎﻟﻴﮑﻪ ﺩﺭ ﺭﻭﺵ transport
ﺻﺮﻓﺎ" payloadﺭﻣﺰ ﻣﻲ ﮔﺮﺩﺩ .ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﻗﺎﺩﺭ ﺑﻪ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺍﻃﻼﻋــﺎﺕ ﺑﻴﻦ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ: -ﺭﻭﺗﺮ ﺑﻪ ﺭﻭﺗﺮ
ﻓﺎﻳﺮﻭﺍﻝ ﺑﻪ ﺭﻭﺗﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺭﻭﺗﺮ -ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ
256
•
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ . AAAﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ) Authentication : AAA
(Authorization,Accounting,ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﺍﻣﻨﻴﺖ ﺑﺎﻻ ﺩﺭ ﻣﺤﻴﻂ ﻫـﺎﻱ
VPNﺍﺯ ﻧﻮﻉ " ﺩﺳﺘﻴﺎﺑﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ " ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﮐﺎﺭﺑﺮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﻂ ﺗﻠﻔﻦ ﺑﻪ ﺳﻴﺴﺘﻢ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ AAAﺩﺭﺧﻮﺍﺳﺖ ﺁﻧﻬﺎ ﺭﺍ ﺍﺧﺬ ﻭ ﻋﻤﺎﻳﺎﺕ ﺯﻳﺮ ﺭﺍ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺩﺍﺩ : -ﺷﻤﺎ ﭼﻪ ﮐﺴﻲ ﻫﺴﺘﻴﺪ؟ ) ﺗﺎﻳﻴﺪ( Authentication ،
ﺷﻤﺎ ﻣﺠﺎﺯ ﺑﻪ ﺍﻧﺠﺎﻡ ﭼﻪ ﮐﺎﺭﻱ ﻫﺴﺘﻴﺪ؟ ) ﻣﺠﻮﺯ( Authorization ، ﭼﻪ ﮐﺎﺭﻫﺎﺋﻲ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﺍﺩﻩ ﺍﻳﺪ؟ ) ﺣﺴﺎﺑﺪﺍﺭﻱ( Accounting ،ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ VPN
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﻮﻉ " ) VPNﺩﺳﺘﻴﺎﺑﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ " ﻭ ﻳﺎ " ﺳﺎﻳﺖ ﺑﻪ ﺳﺎﻳﺖ " ( ،ﺑﻪ ﻣﻨﻈﻮﺭ
ﺍﻳﺠﺎﺩ ﺷﺒﮑﻪ ﺍﺯ ﻋﻨﺎﺻﺮ ﺧﺎﺻﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ: •
ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ
•
ﺳﺨﺖ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺍﺧﺘﺼﺎﺻﻲ ﻧﻈﻴﺮ ﻳﮏ " ﮐﺎﻧﮑﺘﻮﺭ "VPNﻭ ﻳﺎ ﻳﮏ ﻓﺎﻳﺮﻭﺍﻝ PIX
•
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺍﺧﺘﺼﺎﺻﻲ VPNﺑﻪ ﻣﻨﻈﻮﺭ ﺳﺮﻭﻳﺲ ﻫﺎﻱ Dial-up
•
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ NASﮐﻪ ﺗﻮﺳﻂ ﻣﺮﮐﺰ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ VPNﺍﺯ ﻧﻮﻉ "ﺩﺳﺘﻴﺎﺑﻲ ﺍﺯ ﺭﺍ ﺩﻭﺭ" ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ.
•
ﺷﺒﮑﻪ VPNﻭ ﻣﺮﮐﺰ ﻣﺪﻳﺮﻳﺖ ﺳﻴﺎﺳﺖ ﻫﺎ
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﺗﺎﮐﻨﻮﻥ ﻳﮏ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻗﺎﺑﻞ ﻗﺒﻮﻝ ﻭ ﻋﻤﻮﻣﻲ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﺵVPN ﺍﻳﺠﺎﺩ ﻧﺸﺪﻩ ﺍﺳﺖ ،ﺷﺮﮐﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﻫﺮ ﻳﮏ ﺍﻗﺪﺍﻡ ﺑﻪ ﺗﻮﻟﻴﺪ ﻣﺤﺼﻮﻻﺕ ﺍﺧﺘﺼﺎﺻﻲ ﺧﻮﺩ
ﻧﻤﻮﺩﻩ ﺍﻧﺪ. •
ﮐﺎﻧﮑﺘﻮﺭ . VPNﺳﺨﺖ ﺍﻓﺰﺍﺭ ﻓﻮﻕ ﺗﻮﺳﻂ ﺷﺮﮐﺖ ﺳﻴﺴﮑﻮ ﻃﺮﺍﺣﻲ ﻭ ﻋﺮﺿﻪ ﺷﺪﻩ ﺍﺳﺖ .ﮐﺎﻧﮑﺘﻮﺭ ﻓﻮﻕ ﺩﺭ ﻣﺪﻝ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﻭ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﮔﻮﻧﺎﮔﻮﻥ ﻋﺮﺿﻪ ﺷﺪﻩ
ﺍﺳﺖ .ﺩﺭ ﺑﺮﺧﻲ ﺍﺯ ﻧﻤﻮﻧﻪ ﻫﺎﻱ ﺩﺳﺘﮕﺎﻩ ﻓﻮﻕ ﺍﻣﮑﺎﻥ ﻓﻌﺎﻟﻴﺖ ﻫﻤﺰﻣﺎﻥ ١٠٠ﮐﺎﺭﺑﺮ ﺍﺯ
257
ﺭﺍﻩ ﺩﻭﺭ ﻭ ﺩﺭ ﺑﺮﺧﻲ ﻧﻤﻮﻧﻪ ﻫﺎﻱ ﺩﻳﮕﺮ ﺗﺎ ١٠,٠٠٠ﮐﺎﺭﺑﺮ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﻗﺎﺩﺭ ﺑﻪ ﺍﺗﺼﺎﻝ
ﺑﻪ ﺷﺒﮑﻪ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ. •
ﺭﻭﺗﺮ ﻣﺨﺘﺺ . VPNﺭﻭﺗﺮ ﻓﻮﻕ ﺗﻮﺳﻂ ﺷﺮﮐﺖ ﺳﻴﺴﮑﻮ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ .ﺍﻳﻦ ﺭﻭﺗﺮ ﺩﺍﺭﺍﻱ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﻣﺤﻴﻂ ﻫﺎﻱ ﮔﻮﻧﺎﮔﻮﻥ ﺍﺳﺖ.
ﺩﺭ ﻃﺮﺍﺣﻲ ﺭﻭﺗﺮ ﻓﻮﻕ ﺷﺒﮑﻪ ﻫﺎﻱ VPNﻧﻴﺰ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﻭ ﺍﻣﮑﺎﻧﺎﺕ ﻣﺮﺑﻮﻁ ﺩﺭ ﺁﻥ ﺑﮕﻮﻧﻪ ﺍﻱ ﺑﻬﻴﻨﻪ ﺳﺎﺯﻱ ﺷﺪﻩ ﺍﻧﺪ.
•
ﻓﺎﻳﺮﻭﺍﻝ ) . PIXﻓﺎﻳﺮﻭﺍﻝ eXchange Private Internet) PIXﻗﺎﺑﻠﻴﺖ ﻫﺎﺋﻲ ﻧﻈﻴﺮ ، NATﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ،Proxyﻓﻴﻠﺘﺮ ﻧﻤﻮﺩﻥ ﺑﺴﺘﻪ ﺍﻱ ﺍﻃﻼﻋﺎﺗﻲ،
ﻓﺎﻳﺮﻭﺍﻝ ﻭ VPNﺭﺍ ﺩﺭ ﻳﮏ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﻓﺮﺍﻫﻢ ﻧﻤﻮﺩﻩ ﺍﺳﺖ. )Tunnelingﺗﻮﻧﻞ ﺳﺎﺯﻱ (
ﺍﮐﺜﺮ ﺷﺒﮑﻪ ﻫﺎﻱ VPNﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﻳﮏ ﺷﺒﮑﻪ ﺍﺧﺘﺼﺎﺻﻲ ﺑﺎ ﻗﺎﺑﻠﻴﺖ ﺩﺳﺘﻴﺎﺑﻲ ﺍﺯ
ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﺍﻣﮑﺎﻥ " " Tunnelingﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺭﻭﺵ ﻓﻮﻕ ﺗﻤﺎﻡ ﺑﺴﺘﻪ
ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﻳﮏ ﺑﺴﺘﻪ ﺩﻳﮕﺮ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﮑﻪ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ .ﭘﺮﻭﺗﮑﻞ ﻣﺮﺑﻮﻁ ﺑﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺧﺎﺭﺟﻲ ) ﭘﻮﺳﺘﻪ ( ﺗﻮﺳﻂ ﺷﺒﮑﻪ ﻭ ﺩﻭ ﻧﻔﻄﻪ )ﻭﺭﻭﺩ ﻭ ﺧﺮﻭﺝ
ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ( ﻗﺎﺑﻞ ﻓﻬﻢ ﻣﻲ ﺑﺎﺷﺪ .ﺩﻭ ﻧﻘﻈﻪ ﻓﻮﻕ ﺭﺍ "ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﺗﻮﻧﻞ " ﻣﻲ ﮔﻮﻳﻨﺪ. ﺭﻭﺵ ﻓﻮﻕ ﻣﺴﺘﻠﺰﻡ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻪ ﭘﺮﻭﺗﮑﻞ ﺍﺳﺖ: • •
ﭘﺮﻭﺗﮑﻞ ﺣﻤﻞ ﮐﻨﻨﺪﻩ .ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺷﺒﮑﻪ ﺣﺎﻣﻞ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﭘﺮﻭﺗﮑﻞ ﮐﭙﺴﻮﻟﻪ ﺳﺎﺯﻱ .ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﺋﻲ ﻧﻈﻴﺮ:
IPSec,L2F,PPTP,L2TP,GREﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ. •
ﭘﺮﻭﺗﮑﻞ ﻣﺴﺎﻓﺮ .ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﺋﻲ ﻧﻈﻴﺮ IPX,IP,NetBeuiﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﻩ ﻫﺎﻱ ﺍﻭﻟﻴﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ.
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ Tunnelingﻣﻲ ﺗﻮﺍﻥ ﻋﻤﻠﻴﺎﺕ ﺟﺎﻟﺒﻲ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﺍﺩ .ﻣﺜﻼ" ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺑﺴﺘﻪ ﺍﻱ ﺍﻃﻼﻋﺎﺗﻲ ﮐﻪ ﭘﺮﻭﺗﮑﻞ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﺣﻤﺎﻳﺖ ﻧﻤﻲ ﮐﻨﺪ ) ﻧﻈﻴﺮ (NetBeuiﺩﺭﻭﻥ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ IPﺍﺳﺘﻔﺎﺩﻩ ﻭ ﺁﻥ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺭﺳﺎﻝ ﻧﻤﻮﺩ 258
ﻭ ﻳﺎ ﻣﻲ ﺗﻮﺍﻥ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﮐﻪ ﺍﺯ ﻳﮏ ﺁﺩﺭﺱ IPﻏﻴﺮ ﻗﺎﺑﻞ ﺭﻭﺕ ) ﺍﺧﺘﺼﺎﺻﻲ (
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺩﺭﻭﻥ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﮐﻪ ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ ﻣﻌﺘﺒﺮ IPﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮐﻨﺪ، ﻣﺴﺘﻘﺮ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺭﺳﺎﻝ ﻧﻤﻮﺩ. ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ VPNﺍﺯ ﻧﻮﻉ " ﺳﺎﻳﺖ ﺑﻪ ﺳﺎﻳﺖ " generic routing (GRE ،
(encapsulationﺑﻪ ﻋﻨﻮﺍﻥ ﭘﺮﻭﺗﮑﻞ ﮐﭙﺴﻮﻟﻪ ﺳﺎﺯﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ﻧﺤﻮﻩ ﺍﺳﺘﻘﺮﺍﺭ ﻭ ﺑﺴﺘﻪ ﺑﻨﺪﻱ " ﭘﺮﻭﺗﮑﻞ ﻣﺴﺎﻓﺮ" ﺍﺯ ﻃﺮﻳﻖ ﭘﺮﻭﺗﮑﻞ " ﺣﻤﻞ ﮐﻨﻨﺪﻩ " ﺑﺮﺍﻱ ﺍﻧﺘﻘﺎﻝ ﺭﺍ ﺗﺒﻴﻦ ﻣﻲ ﻧﻤﺎﻳﺪ ) .ﭘﺮﻭﺗﮑﻞ ﺣﻤﻞ ﮐﻨﻨﺪﻩ ،ﻋﻤﻮﻣﺎ" IPﺍﺳﺖ( .ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ﺷﺎﻣﻞ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻧﻮﻉ ﺑﺴﺖ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺍﻱ ﮐﭙﺴﻮﻟﻪ ﻧﻤﻮﺩﻥ ﻭ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺍﺭﺗﺒﺎﻁ
ﺑﻴﻦ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺍﺳﺖ .ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ) IPSecﺩﺭ ﺣﺎﻟﺖ (tunnelﺑﺮﺍﻱ ﮐﭙﺴﻮﻟﻪ ﺳﺎﺯﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.ﭘﺮﻭﺗﮑﻞ ، IPSecﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺩﻭ ﻧﻮﻉ ﺷﺒﮑﻪ ) VPNﺳﺎﻳﺖ ﺑﻪ ﻳﺎﻳﺖ ﻭ ﺩﺳﺘﻴﺎﺑﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ( ﺍﺳﺖ .ﺍﻳﻨﺘﺮﻓﻴﺶ ﻫﺎﻱ Tunnelﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺍﺭﺍﻱ ﺍﻣﮑﺎﻧﺎﺕ ﺣﻤﺎﻳﺘﻲ ﺍﺯ IPSecﺑﺎﺷﻨﺪ. ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ VPNﺍﺯ ﻧﻮﻉ " ﺩﺳﺘﻴﺎﺑﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ " Tunneling ،ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ PPP ﺍﻧﺠﺎﻡ ﻣﻲ ﮔﻴﺮﺩ PPP .ﺑﻪ ﻋﻨﻮﺍﻥ ﺣﻤﻞ ﮐﻨﻨﺪﻩ ﺳﺎﻳﺮ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ IPﺩﺭ ﺯﻣﺎﻥ ﺑﺮﻗﺮﺍﺭﻱ
ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﻳﮏ ﺳﻴﺴﺘﻢ ﻣﻴﺰﺑﺎﻥ ﻭ ﻳﮏ ﺳﻴﺴﺘﻢ ﺍﺯﻩ ﺩﻭﺭ ،ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲ ﮔﻴﺮﺩ. ﻫﺮ ﻳﮏ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺯﻳﺮ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺎﺧﺘﺎﺭ ﺍﻭﻟﻴﻪ PPPﺍﻳﺠﺎﺩ ﻭ ﺗﻮﺳﻂ ﺷﺒﮑﻪ ﻫﺎﻱ VPNﺍﺯ ﻧﻮﻉ " ﺩﺳﺘﻴﺎﺑﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ " ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﻧﺪ: •
. (Layer 2 Forwarding(F٢Lﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺗﻮﺳﻂ ﺳﻴﺴﮑﻮ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ .ﺩﺭ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺍﺯ ﻣﺪﻝ ﻫﺎﻱ ﺗﻌﻴﻴﻦ ﺍﻋﺘﺒﺎﺭ ﮐﺎﺭﺑﺮ ﮐﻪ ﺗﻮﺳﻂ PPPﺣﻤﺎﻳﺖ ﺷﺪﻩ ﺍﻧﺪ ،ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪ ﻩ ﺍﺳﺖ.
•
. (Point-to-Point Tunneling Protocol(PPTPﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺗﻮﺳﻂ ﮐﻨﺴﺮﺳﻴﻮﻣﻲ ﻣﺘﺸﮑﻞ ﺍﺯ ﺷﺮﮐﺖ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ .ﺍﻳﻦ ﭘﺮﻭﺗﮑﻞ ﺍﻣﮑﺎﻥ ﺭﻣﺰﻧﮕﺎﺭﻱ ٤٠ﺑﻴﺘﻲ ﻭ ١٢٨ﺑﻴﺘﻲ ﺭﺍ ﺩﺍﺭﺍ ﺑﻮﺩﻩ ﻭ ﺍﺯ ﻣﺪﻝ ﻫﺎﻱ ﺗﺎﺋﻴﺪ ﺍﻋﺘﺒﺎﺭ ﮐﺎﺭﺑﺮ ﮐﻪ ﺗﻮﺳﻂ PPPﺣﻤﺎﻳﺖ ﻣﻲ ﮔﺮﺩﺩ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ. 259
•
. (Layer 2 Tunneling Protocol(L2TPﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺑﺎ ﻫﻤﮑﺎﺭﻱ ﭼﻨﺪﻳﻦ ﺷﺮﮐﺖ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺍﺯ ﻭﻳﮋﮔﻲ ﻫﺎﻱ PPTPﻭ L2F
ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩﻩ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ L2TPﺑﺼﻮﺭﺕ ﮐﺎﻣﻞ IPSecﺭﺍ ﺣﻤﺎﻳﺖ ﻣﻲ ﮐﻨﺪ. ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﺗﻮﻧﻞ ﺑﻴﻦ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ :
ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻭ ﺭﻭﺗﺮ NASﻭ ﺭﻭﺗﺮ -ﺭﻭﺗﺮ ﻭ ﺭﻭﺗﺮ
ﻋﻤﻠﮑﺮﺩ Tunnelingﻣﺸﺎﺑﻪ ﺣﻤﻞ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺗﻮﺳﻂ ﻳﮏ ﮐﺎﻣﻴﻮﻥ ﺍﺳﺖ .ﻓﺮﻭﺷﻨﺪﻩ ، ﭘﺲ ﺍﺯ ﺑﺴﺘﻪ ﺑﻨﺪﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ) ﭘﺮﻭﺗﮑﻞ ﻣﺴﺎﻓﺮ ( ﺩﺭﻭﻥ ﻳﮏ ﺟﻌﺒﻪ ) ﭘﺮﻭﺗﮑﻞ ﮐﭙﺴﻮﻟﻪ ﺳﺎﺯﻱ ( ﺁﻥ ﺭﺍ ﺗﻮﺳﻂ ﻳﮏ ﮐﺎﻣﻴﻮﻥ ) ﭘﺮﻭﺗﮑﻞ ﺣﻤﻞ ﮐﻨﻨﺪﻩ ( ﺍﺯ ﺍﻧﺒﺎﺭ ﺧﻮﺩ ) ﺍﻳﺘﺮﻓﻴﺲ ﻭﺭﻭﺩﻱ ﺗﻮﻧﻞ ( ﺑﺮﺍﻱ ﻣﺘﻘﺎﺿﻲ ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ.
ﮐﺎﻣﻴﻮﻥ ) ﭘﺮﻭﺗﮑﻞ ﺣﻤﻞ ﮐﻨﻨﺪﻩ ( ﺍﺯ ﻃﺮﻳﻖ ﺑﺰﺭﮔﺮﺍﻩ ) ﺍﻳﻨﺘﺮﻧﺖ ( ﻣﺴﻴﺮ ﺧﻮﺩ ﺭﺍ ﻃﻲ ،ﺗﺎ ﺑﻪ ﻣﻨﺰﻝ ﺷﻤﺎ ) ﺍﻳﻨﺘﺮﻓﻴﺶ ﺧﺮﻭﺟﻲ ﺗﻮﻧﻞ ( ﺑﺮﺳﺪ .ﺷﻤﺎ ﺩﺭ ﻣﻨﺰﻝ ﺟﻌﺒﻪ ) ﭘﺮﻭﺗﮑﻞ ﮐﭙﺴﻮﻝ ﺳﺎﺯﻱ ( ﺭﺍ ﺑﺎﺯ ﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ) ﭘﺮﻭﺗﮑﻞ ﻣﺴﺎﻓﺮ( ﺭﺍ ﺍﺯ ﺁﻥ ﺧﺎﺭﺝ ﻣﻲ ﻧﻤﺎﺋﻴﺪ.
260
ﺍﺷﺘﺮﺍﮎ ﻣﻨﺎﺑﻊ ﻳﮑﻲ ﺍﺯ ﺍﻫﺪﺍﻑ ﺍﻭﻟﻴﻪ ﻭ ﻣﻬﻢ ﺩﺭﺑﺮﭘﺎﺳﺎﺯﻱ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ،ﺍﺷﺘﺮﺍﮎ ﻣﻨﺎﺑﻊ ﺍﺳﺖ.
ﻣﻨﺎﺑﻊ ﻣﻮﺟﻮﺩ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺩﻭ ﮔﺮﻭﻩ ﻋﻤﺪﻩ ﻣﻨﺎﺑﻊ ﻓﻴﺰﻳﮑﻲ )ﭼﺎﭘﮕﺮ( ﻭ ﻣﻨﺎﺑﻊ ﻣﻨﻄﻘﻲ ) ﻓﺎﻳﻞ ﻫﺎ( ﺗﻘﺴﻴﻢ ﻣﻲ ﮔﺮﺩﻧﺪ .ﭘﺲ ﺍﺯ ﺍﻳﺠﺎﺩ ﻳﮏ ﺷﺒﮑﻪ ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺑﺴﺘﺮ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﻋﻤﻠﻴﺎﺕ ﻣﺘﻔﺎﻭﺗﻲ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﺍﺩ: •
ﺍﺷﺘﺮﺍﮎ ﻳﮏ ﭼﺎﭘﮕﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺗﻮﺳﻂ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ
•
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺧﻂ ﺍﺭﺗﺒﺎﻃﻲ ﺍﻳﻨﺘﺮﻧﺖ ﺗﻮﺳﻂ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ
•
ﺍﺷﺘﺮﺍﮎ ﻓﺎﻳﻞ ﻫﺎ ﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺎ ﻣﺤﺘﻮﻳﺎﺕ ﻣﺘﻔﺎﻭﺕ
•
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺎﺯﻳﻬﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﮐﻪ ﭼﻨﺪﻳﻦ ﮐﺎﺭﺑﺮ ﺑﺼﻮﺭﺕ ﻫﻤﺰﻣﺎﻥ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ.
•
ﺍﺭﺳﺎﻝ ﺧﺮﻭﺟﻲ ﺩﺳﺘﮕﺎﻫﻬﺎﺋﻲ ﻧﻈﻴﺮ ﺩﻭﺭﺑﻴﻦ ﻫﺎﻱ ﻭﺏ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭﺷﺒﮑﻪ
ﺑﻪ ﻣﻨﻈﻮﺭ ﺑﺮ ﭘﺎ ﺳﺎﺯﻱ ﻳﮏ ﺷﺒﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﮐﻮﭼﮏ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﻣﺮﺍﺣﻞ ﺯﻳﺮ ﺭﺍ ﺩﻧﺒﺎﻝ ﻧﻤﻮﺩ : •
ﺍﻧﺘﺨﺎﺏ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺟﻬﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺷﺒﮑﻪ .ﺍﺗﺮﻧﺖ ﺑﻪ ﻋﻨﻮﺍﻥ ﻣﻬﻤﺘﺮﻳﻦ ﺗﮑﻨﻮﻟﻮﮊﻱ ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﻣﻄﺮﺡ ﺍﺳﺖ.
•
ﺗﻬﻴﻪ ﻭ ﻧﺼﺐ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ .ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺍﺭﺍﻱ ﻳﮏ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺑﺎﺷﻨﺪ.ﺩﺭ ﺻﻮﺭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻮﭘﻮﻟﻮﮊﻱ ﺳﺘﺎﺭﻩ
)ﺩﺭ ﺣﺎﻝ ﺣﺎﺿﺮ ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﻧﻮﻉ ﺗﻮﭘﻮﻟﻮﮊﻱ ﺍﺳﺖ( ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﻳﮑﺪﺳﺘﮕﺎﻩ ﻫﺎﺏ ﻭ ﺩﺭ ﻣﻮﺍﺭﺩ ﺣﺮﻓﻪ ﺍﻱ ﺗﺮ ﺍﺯ ﻳﮏ ﺩﺳﺘﮕﺎﻩ ﺳﻮﺋﻴﭻ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ .ﭘﺲ ﺍﺯ ﻧﺼﺐ ﻭ
ﭘﻴﮑﺮﺑﻨﺪﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﺭﺕ ﻫﺎﻱ ﺷﺒﮑﻪ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ،ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ) ﻋﻤﻮﻣﺎ" ﺍﺯ ﮐﺎﺑﻞ ﺑﻬﻢ ﺗﺎﺑﻴﺪﻩ Cat5ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ ( ﻫﺮ ﻳﮏ
ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺑﻪ ﻫﺎﺏ ﻭ ﻳﺎ ﺳﻮﺋﻴﭻ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ.
261
•
ﭘﻴﮑﺮﺑﻨﺪﻱ ﺳﻴﺴﺘﻢ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻨﺎﺑﻊ ﻣﺸﺘﺮﮎ ﺩﺭ ﺳﻴﺴﺘﻢ :ﺍﻳﻦ ﻣﺮﺣـــﻠﻪ
) ﭘﻴﮑﺮﺑﻨﺪﻱ ﺳﻴﺴﺘﻢ ( ،ﻳﮑﻲ ﺍﺯ ﻣﺮﺍﺣﻞ ﻣﻬﻢ ﺩﺭ ﺯﻣﻴﻨﻪ ﺁﻣﺎﺩﻩ ﺳﺎﺯﻱ ﺷﺒـــــﮑﻪ ﺑﺮﺍﻱ
ﺍﺳﺘﻔﺎﺩﻩ ﺗﻮﺳﻂ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺳﺖ.ﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﻋﻤﻠﻴﺎﺕ ﺯﻳﺮﺻﻮﺭﺕ ﭘﺬﻳﺮﺩ:
ﻧﺎﻣﮕﺬﺍﺭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺷﺘﺮﺍﮎ ﻓﺎﻳﻞ ﻫﺎ ﺍﺷﺘﺮﺍﮎ ﭼﺎﭘﮕﺮ -ﺍﻣﻨﻴﺖ
ﺍﺷﺘﺮﺍﮎ ﺧﻂ ﺍﻳﻨﺘﺮﻧﺖﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺑﺮﺭﺳﻲ ﻧﺤﻮﻩ ﺍﻧﺠﺎﻡ ﻫﺮ ﻳﮏ ﺍﺯ ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ.
ﻧﺎﻣﮕﺬﺍﺭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ
ﻗﺒﻞ ﺍﺯ ﺍﻳﻨﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﮑﻲ ﺍﺯ ﮔﺮﻩ ﻫﺎﻱ ﺷﺒﮑﻪ ﻣﻄﺮﺡ ﮔﺮﺩﺩ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺮﺍﻱ ﺁﻥ
ﻧﺎﻡ ﻭ ﻳﮏ ﮔﺮﻭﻩ ﺭﺍ ﻣﺸﺨﺺ ﮐﺮﺩ .ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺍﺭﺍﻱ ﻳﮏ ﻧﺎﻡ ﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ ﻭ ﻳﮏ ﻧﺎﻡ ﮔﺮﻭﻩ ﻳﮑﺴﺎﻥ ﺑﺎﺷﻨﺪ .ﺑﺮﺍﻱ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻭ ﮔﺮﻭﻩ ،ﻋﻤﻠﻴﺎﺕ ﺯﻳﺮ ﺭﺍ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﻧﺠﺎﻡ ﺩﺍﺩ. •
ﻣﺮﺣﻠﻪ ﺍﻭﻝ :ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﺋﻲ ﺑﺎ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻭﻳﻨﺪﻭﺯ ٩٨ﻭ ﻳﺎ ﻣﻴﻠﻴﻨﻴﻮﻡ ،ﻣﻮﺱ ﺭﺍ
ﺑﺮﺭﻭﻱ ) Network Neighborhoodﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺻﻔﺤﻪ ﺍﺻﻠﻲ(
ﻗﺮﺍﺭﺩﺍﺩﻩ ﻭ ﮐﻠﻴﺪ ﺳﻤﺖ ﺭﺍﺳﺖ ﻣﻮﺱ ﺭﺍ ﻓﻌﺎﻝ ﻧﻤﺎﺋﻴﺪ.
•
ﻣﺮﺣﻠﻪ ﺩﻭﻡ :ﮔﺰﻳﻨﻪ Propertiesﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﻣﻨﻮﻱ ﺩﺳﺘﻮﺭﺍﺕ ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ ﭘﻨﺠﺮﻩ Network Propertiesﻓﻌﺎﻝ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﭘﻨﺠﺮﻩ ﻓﻮﻕ ﺍﻃﻼﻋﺎﺗﻲ
ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺁﺩﭘﺘﻮﺭﻫﺎﻱ ﺷﺒﮑﻪ ﻭ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻧﺼﺐ ﺷﺪﻩ ﺑﺮ ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ،ﻧﻤﺎﻳﺶ
ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ.
262
•
ﻣﺮﺣﻠﻪ ﺳﻮﻡ :ﭘﺲ ﺍﺯ ﻓﻌﺎﻝ ﺷﺪﻩ ﭘﻨﺠﺮﻩ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ،ﮔﺰﻳﻨﻪ Identificationﺭﺍ
•
ﻣﺮﺣﻠﻪ ﭼﻬﺎﺭﻡ :ﺩﺭﺍﻭﻟﻴﻦ ﻓﻴﻠﺪ ﺍﻃﻼﻋﺎﺗﻲ ،ﻧﺎﻡ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻭﺍﺭﺩ
ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ .ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ﺳﻪ ﻓﻴﻠﺪ ﺍﻃﻼﻋﺎﺗﻲ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ.
ﻧﻤﺎﺋﻴﺪ .ﻧﺎﻡ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﮐﺎﻣﻼ" ﺍﻧﺘﺨﺎﺑﻲ ﺍﺳﺖ ﻭ ﺗﻨﻬﺎ ﻣﺤﺪﻭﺩﻳﺖ ﻣﻮﺟﻮﺩ، ﺗﮑﺮﺍﺭﻱ ﻧﺒﻮﺩﻥ ﺁﻥ ﺍﺳﺖ .ﺳﺎﻳﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻧﺒﺎﻳﺪ ﺍﺯ ﻧﺎﻡ ﻓﻮﻕ
ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩﻩ ﺑﺎﺷﻨﺪ. •
ﻣﺮﺣﻠﻪ ﭘﻨﺠﻢ :ﺩﺭﺩﻭﻣﻴﻦ ﻓﻴﻠﺪ ﺍﻃﻼﻋﺎﺗﻲ ،ﻧﺎﻡ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺑﺮﺍﻱ ﮔﺮﻭﻩ ﺭﺍ ﻭﺍﺭﺩ
ﻧﻤﺎﺋﻴﺪ .ﺗﻤﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﮐﻪ ﻗﺼﺪ ﺑﻪ ﺍﺷﺘـــــﺮﺍﮎ ﮔﺬﺍﺷﺘﻦ ﻣﻨﺎﺑﻊ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﻭ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺑﻴﻦ ﺧﻮﺩ ﺭﺍ ﺩﺍﺭﻧﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺍﺭﺍﻱ ﻧﺎﻡ ﮔﺮﻭﻩ ﻣﺸﺎﺑﻪ ﻭ ﻳﮑﺴﺎﻥ ﺑﺎﺷﻨﺪ.
ﺍﺷﺘﺮﺍﮎ ﻓﺎﻳﻞ ﻭ ﺍﻣﻨﻴﺖ
ﻳﮑﻲ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﻋﻤﻠﻴﺎﺕ ﺩﺭ ﻫﺮ ﺷﺒﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ،ﺍﺷﺘﺮﺍﮎ ﻓﺎﻳﻞ ﻫﺎ ﺍﺳﺖ .ﺩﺭ
ﺳﻴﺴﺘﻢ ﻫﺎﺋﻲ ﮐﻪ ﺍﺯ ﻭﻳﻨﺪﻭﺯ ٩٨ﻭ ﻳﺎ ﻣﻴﻠﻴﻨﻴﻮﻡ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ﺑﺴﺎﺩﮔﻲ ﺍﻧﺠﺎﻡ
ﺧﻮﺍﻫﺪ ﺷﺪ .ﭘﺲ ﺍﺯ ﭘﻴﮑﺮﺑﻨﺪﻱ ﻣﻨﺎﺳﺐ ،ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻗﺎﺩﺭ ﺑﻪ
ﺍﺷﺘﺮﺍﮎ ﻓﺎﻳﻞ ﺑﻴﻦ ﺧﻮﺩ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ. ﺑﻪ ﻣﻨﻈﻮﺭ ﻓﻌﺎﻝ ﻧﻤﻮﺩﻥ ﻭﻳﮋﮔﻲ ﻓﻮﻕ ﺩﺭ ﺍﺑﺘﺪﺍ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﻓﻌﺎﻝ ﺷﺪﻥ ﮔﺰﻳﻨﻪ File and
Printer Sharingﻣﻄﻤﺌﻦ ﮔﺮﺩﻳﺪ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﻣﻮﺱ ﺭﺍ ﺑﺮﺭﻭﻱ ﺍﻣﮑﺎﻥ Network
263
) Neighborhoodﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺻﻔﺤﻪ ﺍﺻﻠﻲ( ﻗﺮﺍﺭﺩﺍﺩﻩ ﻭ ﮐﻠﻴﺪ ﺳﻤﺖ ﺭﺍﺳﺖ
ﻣﻮﺱ ﺭﺍ ﻓﻌﺎﻝ ﻧﻤﺎﺋﻴﺪ.ﮔﺰﻳﻨﻪ Propertiesﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﻣﻨﻮﻱ ﺩﺳﺘﻮﺭﺍﺕ ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ ﭘﻨﺠﺮﻩ Network Propertiesﻓﻌﺎﻝ ﻣﻲ ﮔﺮﺩﺩ.
ﺩﺭ ﺍﺩﺍﻣﻪ ﮔﺰﻳﻨﻪ Configurationﻓﻌﺎﻝ ﻭ ﺩﺭ ﺑﺨﺶ ﭘﺎﻳﻴﻦ ﭘﻨﺠﺮﻩ ﻓﻮﻕ ،ﺍﻣﮑﺎﻥ Client
for Microsoft Networksﻣﻲ ﺑﺎﻳﺴﺖ ﻣﺸﺎﻫﺪﻩ ﮔﺮﺩﺩ .ﺯﻣﺎﻧﻴﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﮏ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ) (Clientﺩﺭ ﺷﺒﮑﻪ ﺍﻱ ﻣﻄﺮﺡ ﺑﺎﺷﺪ ،ﻗﺎﺩﺭ ﺑﻪ ﺗﺒﺎﺩﻝ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺎ ﺳﺎﻳﺮ
ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺯﻣﺎﻧﻴﮑﻪ ﻋﻤﻠﻴﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﭘﻴﮑﺮﺑﻨﺪﻱ ﻭ ﺗﻨﻈﻴﻢ
ﺷﺒﮑﻪ ﺩﺭ ﻭﻳﻨﺪﻭﺯﻫﺎﻱ ٩٨ﻭ ﻳﺎ ﻣﻴﻠﻴﻨﻴﻮﻡ ﺍﻧﺠﺎﻡ ﻣﻲ ﮔﻴﺮﺩ ،ﺍﻣﮑﺎﻥ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﺑﺼﻮﺭﺕ
ﺍﺗﻮﻣﺎﺗﻴﮏ ﺩﺭ ﺳﻴﺴﺘﻢ ﺍﺿﺎﻓﻪ ﺧﻮﺍﻫﺪ ﮔﺮﺩﻳﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﻣﮑﺎﻥ ﻓﻮﻕ ﺑﺼﻮﺭﺕ ﺍﺗﻮﻣﺎﺗﻴﮏ ﺍﺿﺎﻓﻪ ﻧﺸﺪﻩ ﺑﺎﺷﺪ ،ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﺩﻧﺒﺎﻝ ﻧﻤﻮﺩﻥ ﻣﺮﺍﺣﻞ ﺯﻳﺮ ،ﺁﻥ ﺭﺍ ﻧﺼﺐ ﻧﻤﻮﺩ.
•
ﻣﺮﺣﻠﻪ ﺍﻭﻝ :ﮔﺰﻳﻨﻪ Addﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﭘﻨﺠﺮﻩ Properties Networkﺍﻧﺘﺨﺎﺏ
•
ﻣﺮﺣﻠﻪ ﺩﻭﻡ :ﮔﺰﻳﻨﻪ Clientﺭﺍ ﺍﺯ ﻟﻴﺴﺖ ﺑﻨﻤﺎﻳﺶ ﺩﺭ ﺁﻣﺪﻩ ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ.
ﻧﻤﺎﺋﻴﺪ
•
ﻣﺮﺣﻠﻪ ﺳﻮﻡ :ﺑﺎ ﻓﻌﺎﻝ ﮐﺮﺩﻥ ﮔﺰﻳﻨﻪ Addﻟﻴﺴﺘﻲ ﺍﺯ ﺷﺮﮐﺖ ﻫﺎ ﻭ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ ﻣﺘﻔﺎﻭﺕ ﺭﺍ ﺩﺭ ﭘﺎﻧﻞ ﺳﻤﺖ ﭼﭗ ﻣﺸﺎﻫﺪﻩ ﻣﻲ ﻧﻤﺎﺋﻴﺪ.
264
•
ﻣﺮﺣﻠﻪ ﭼﻬﺎﺭﻡ :ﮔﺰﻳﻨﻪ Microsoftﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﭘﺎﻧﻞ ﺳﻤﺖ ﭼﭗ ﺍﻧﺘﺨﺎﺏ ﻭ ﺩﺭ
ﺍﺩﺍﻣﻪ ﻟﻴﺴﺘﻲ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻣﺎﻳﮑﺮﻭﺳﺎﻓﺖ ﺩﺭ ﭘﺎﻧﻞ ﺳﻤﺖ ﺭﺍﺳﺖ
ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﺧﻮﻭﺍﻫﻨﺪ ﺷﺪ.
•
ﻣﺮﺣﻠﻪ ﭘﻨﺠﻢ :ﺍﺯ ﻟﻴﺴﺖ ﻓﻮﻕ ،ﮔﺰﻳﻨﻪ Client for Microsoft Networksﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻭ ﺩﮐﻤﻪ OKﺭﺍ ﻓﻌﺎﻝ ﻧﻤﺎﺋﻴﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻭﻳﻨﺪﻭﺯ ﺗﻤﺎﻡ ﻓﺎﻳﻞ ﻫﺎﻱ
ﺿﺮﻭﺭﻱ ﻭ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺭﺍ ﺑﺮ ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﺩﺍﺩ) ﺩﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ CD ﻣﺮﺑﻮﻁ ﺑﻪ ﻭﻳﻨﺪﻭﺯ ﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺑﻮﺩ( ﭘﺲ ﺍﺯ ﻧﺼﺐ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ،ﻣﻲ ﺗﻮﺍﻥ ﻋﻤﻠﻴﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﻓﺎﻳﻞ ﻫﺎ ﺭﺍ
ﺩﻧﺒﺎﻝ ﻧﻤﻮﺩ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﺩﺭ ﭘﻨﺠﺮﻩ ﺍﺻﻠﻲ ) ( Networkﺷﺒﮑﻪ ﻣﺴﺘﻔﺮ ﺷﺪﻩ ﻭ ﻣﺮﺍﺣﻞ ﺯﻳﺮ
ﺭﺍ ﺩﻧﺒﺎﻝ ﻧﻤﺎﺋﻴﺪ: •
ﻣﺮﺣﻠﻪ ﺍﻭﻝ :ﺩﮐﻤﻪ ﻣﺮﺑﻮﻁ ﺑﻪ File and print sharingﺭﺍ ﻓﻌﺎﻝ ﻧﻤﺎﺋﻴﺪ
•
ﻣﺮﺣﻠﻪ ﺩﻭﻡ :ﺩﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ ﺩﻭ ﺣﻖ ﺍﻧﺘﺨﺎﺏ ﻭﺟﻮﺩ ﺩﺍﺭﺩ .ﻳﮑﻲ ﺑﺮﺍﻱ ﺍﺷﺘﺮﺍﮎ ﻓﺎﻳﻞ ﻫﺎ ﻭ ﺩﻳﮕﺮﻱ ﺑﺮﺍﻱ ﺍﺷﺘﺮﺍﮎ ﭼﺎﭘﮕﺮ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻭﺿﻌﻴﺖ ﻣﻮﺟﻮﺩ ﺷﺒﮑﻪ ﻣﻲ ﺗﻮﺍﻥ ﻳﮏ ﻭ
ﻳﺎ ﻫﺮ ﺩﻭ ﺁﻳﺘﻢ ﺭﺍ ﺍﻧﺘﺨﺎﺏ ﮐﺮﺩ. •
ﻣﺮﺣﻠﻪ ﺳﻮﻡ :ﭘﺲ ﺍﺯ ﺍﻧﺘﺨﺎﺏ ﻫﺮ ﻳﮏ ﺍﺯ ﮔﺰﻳﻨﻪ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ) ﻓﺎﻳﻞ ،ﭼﺎﭘﮕﺮ (،
ﻳﮏ Checkmarkﺩﺭ ﮐﻨﺎﺭ ﮔﺰﻳﻨﻪ File and print sharingﻓﻌﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺑﺎ ﻓﻌﺎﻝ ﻧﻤﻮﺩﻥ ﺩﮐﻤﻪ OKﭘﻨﺠﺮﻩ ﻣﺮﺑﻮﻁ ﺑﻪ Sharing-optionsﺑﺴﺘﻪ ﺧﻮﺍﻫﺪ ﺷﺪ.
•
ﻣﺮﺣﻠﻪ ﭼﻬﺎﺭﻡ :ﺩﺭ ﺍﺩﺍﻣﻪ ﺍﻣﮑﺎﻥ Access Controlﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﭘﻨﺠﺮﻩ Networkﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﮐﻨﺘﺮﻝ ﺳﺎﺩﻩ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻫﻮﻳﺖ ﺍﻓﺮﺍﺩﻳﮑﻲ
265
ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺍﺯ ﻓﺎﻳﻞ ﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ ،ﮔﺰﻳﻨﻪ Share-level Access Control ﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ.
•
ﻣﺮﺣﻠﻪ ﭘﻨﺠﻢ :ﺑﺎ ﻓﻌﺎﻝ ﮐﺮﺩﻥ ﺩﮐﻤﻪ ، OKﭘﻨﺠﺮﻩ Networkﺑﺴﺘﻪ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺩﺭ ﺍﺩﺍﻣﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﻓﻮﻟﺪﺭﻫﺎﺋﻲ ﺭﺍ ﮐﻪ ﻗﺼﺪ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﮔﺬﺍﺷﺘﻦ ﺁﻧﻬﺎ ﺭﺍ ﺩﺍﺭﻳﺪ ،ﻣﺸﺨﺺ ﻧﻤﺎﺋﻴﺪ .ﺑﺎ ﺍﻳﺠﺎﺩ ﻓﻮﻟﺪﺭﻫﺎﻱ ﺩﻟﺨﻮﺍﻩ ﻭ ﺍﺳﺘﻘﺮﺍﺭ ﻓﺎﻳﻞ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺩﺭﻫﺮ ﻳﮏ ﻣﻲ ﺗﻮﺍﻥ ﻳﮏ ﺍﻧﻈﺒﺎﻁ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﺑﻌﺪ ﺫﺧﻴﺮﻩ ﺳﺎﺯﻱ ﺭﺍ ﺍﻳﺠﺎﺩ ﮐﺮﺩ .ﺑﺮﺍﻱ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﮔﺬﺍﺷﺘﻦ ﻳﮏ ﻓﻮﻟﺪﺭ ،ﺑﺮ ﺭﻭﻱ ﻓﻮﻟﺪﺭ ﻓﻮﻕ ﻣﺴﺘﻘﺮ ﻭ ﮐﻠﻴﺪ ﺳﻤﺖ ﺭﺍﺳﺖ ﻣﻮﺱ ﺭﺍ ﻓﻌﺎﻝ ﻧﻤﺎﺋﻴﺪ .ﮔﺰﻳﻨﻪ
Sharingﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﻣﻨﻮﻱ ﻣﺮﺑﻮﻃﻪ ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ ﭘﻨﺠﺮﻩ ﺍﻱ ﻓﻌﺎﻝ ﻣﻲ ﮔﺮﺩﺩ ﮐﻪ ﺩﺭ ﺁﻥ ﺍﻣﮑﺎﻥ ﺍﻧﺘﺨﺎﺏ ﭼﻨﺪﻳﻦ ﺁﻳﺘﻢ ﻭﺟﻮﺩ ﺩﺍﺭﺩ .ﻣﻘﺪﺍﺭ ﭘﻴﺶ ﻓﺮﺽ ﺑﺮﺍﻱ Sharing
ﺑﺼﻮﺭﺕ Not Sharedﺍﺳﺖ .ﺑﺎ ﺗﻐﻴﻴﺮ ﻣﻘﺪﺍﺭ ﮔﺰﻳﻨﻪ ﻓﻮﻕ ﻭ ﺗﺒﺪﻳﻞ ﺁﻥ ﺑﻪ Shared As ﻣﻲ ﺗﻮﺍﻥ ﺩﺭ ﻓﻴﻠﺪ ﺍﻃﻼﻋﺎﺗﻲ ، Name Shareﻧﺎﻡ ﺩﻟﺨﻮﺍﻩ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﻓﻮﻟﺪﺭ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﮔﺬﺍﺷﺘﻪ ﺷﺪﻩ ﻣﺸــﺨﺺ ﻧﻤﻮﺩ .ﻧﺎﻡ ﻓﻮﻕ ﻣﻲ ﺗــﻮﺍﻧﺪ ﺑﺎ ﻧﺎﻡ ﻭﺍﻗﻌﻲ ﻓﻮﻟﺪﺭ ﮐﺎﻣﻼ" ﻣﺘــﻔﺎﻭﺕ ﻣﻲ ﺑﺎﺷﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻗﺒﻼ" ﮔﺰﻳﻨﻪ Share-level Access Controlﺭﺍ ﺍﻧﺘﺨﺎﺏ
ﮐﺮﺩﻩ ﺑﺎﺷﻴﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺭ ﺍﺩﺍﻣﻪ ﺳﻄﺢ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﻣﻨﻴﺘﻲ ) (Access Typeﺭﺍ ﻣﺸﺨﺺ
ﻭ ﺑﺮﺍﻱ ﺁﻥ ﻳﮏ ﺭﻣﺰ ﻋﺒﻮﺭ ﺭﺍ ﻧﻴﺰ ﻣﺸﺨﺺ ﻧﻤﻮﺩ .ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺭﻭﺵ Read-onlyﺑﺪﻳﻦ ﻣﻔﻬﻮﻡ ﺍﺳﺖ ﮐﻪ ﻫﺮ ﮐﺎﺭﺑﺮ ﻗﺎﺩﺭ ﺑﻪ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻓﻮﻟﺪﺭ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﮑﻪ ﺑﻮﺩﻩ ﻭ ﺻﺮﻓﺎ" ﻗﺎﺩﺭ ﺑﻪ ﻣﺸﺎﻫﺪﻩ ﻭ ﺑﺎﺯﻳﺎﺑﻲ ﻓﺎﻳﻞ ﻫﺎ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺍﻳﻦ ﻧﻮﻉ ﮐﺎﺭﺑﺮﺍﻥ ﻗﺎﺩﺭ ﺑﻪ ﺍﺳﺘﻘﺮﺍﺭ ﻓﺎﻳﻞ ﻫﺎﻱ ﺟﺪﻳﺪ
ﺩﺭ ﻓﻮﻟﺪﺭ ﻭ ﻳﺎ ﺣﺬﻑ ﻭ ﺍﺻﻼﺡ ﻓﺎﻳﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻓﻮﻟﺪﺭ ﻧﺨﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺭﻭﺵ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻓﻮﻟﺪﺭ access Full ،ﺗﻌﻴﻴﻦ ﮔﺮﺩﺩ ،ﮐﺎﺭﺑﺮﺍﻥ ﻗﺎﺩﺭ ﺑﻪ ﻣﺸﺎﻫﺪﻩ ،ﻧﻮﺷﺘﻦ، ﺍﻳﺠﺎﺩ ﻭ ﺣﺬﻑ ﻓﺎﻳﻞ ﺩﺭ ﻓﻮﻟﺪﺭ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﻮﻉ ﺭﻣﺰ ﻋﺒﻮﺭ ﻣﻲ ﺗﻮﺍﻥ ﻫﺮ ﺩﻭ ﮔﺰﻳﻨﻪ ﺭﺍ ﺑﺼﻮﺭﺕ ﺷﻨﺎﻭﺭ ﻧﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ.
266
ﺍﺷﺘﺮﺍﮎ ﭼﺎﭘﮕﺮ
ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺷﺘﺮﺍﮎ ﻳﮏ ﭼﺎﭘﮕﺮ ﺩﺭ ﺍﺑﺘﺪﺍ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﺻﺤﺖ ﻋﻤﻠﻴﺎﺕ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﺧﺼﻮﺻﺎ"
ﻓﻌﺎﻝ ﺷﺪﻥ Sharing File and Printerﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﮐﺮﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺎ ﺩﻧﺒـــﺎﻝ ﻧﻤﻮﺩﻥ ﻣﺮﺍﺣﻞ ﺯﻳﺮ ﻣﻲ ﺗﻮﺍﻥ ﺑﺮﺍﻱ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﮔﺬﺍﺷﺘﻦ ﻳﮏ ﭼﺎﭘﮕﺮ ﻣﺮﺍﺣﻞ ﺯﻳﺮ ﺭﺍ ﺩﻧـــﺒﺎﻝ ﻧﻤﻮﺩ. •
ﻣﺮﺣﻠﻪ ﺍﻭﻝ :ﺍﺯ ﻃﺮﻳﻖ ﺩﮐﻤﻪ ، Startﮔﺰﻳﻨﻪ Settingﻭ ﺩﺭ ﺍﺩﺍﻣﻪ Printersﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ.ﺩﺭ ﺍﺩﺍﻣﻪ ﭘﻨﺠﺮﻩ ﺍﻱ ﺷﺎﻣﻞ ﻟﻴﺴﺘﻲ ﺍﺯ ﺗﻤﺎﻡ ﭼﺎﭘﮕﺮﻫﺎﻱ ﻣﺤﻠﻲ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﺧﻮﺍﻫﺪ ﺷﺪ.
•
ﻣﺮﺣﻠﻪ ﺩﻭﻡ :ﻣﻮﺱ ﺭﺍ ﺑﺮ ﺭﻭﻱ ﺁﻳﮑﻮﻥ ﭼﺎﭘﮕﺮﻱ ﮐﻪ ﻗﺼﺪ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﮔﺬﺍﺷﺘﻦ ﺁﻥ ﺭﺍ
ﺩﺍﺭﻳﺪ ،ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﻭ ﮐﻠﻴﺪ ﺳﻤﺖ ﺭﺍﺳﺖ ﻣﻮﺱ ﺭﺍ ﻓﻌﺎﻝ ﻭ ﮔﺰﻳﻨﻪ Sharingﺭﺍ
ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ. •
ﻣﺮﺣﻠﻪ ﺳﻮﻡ :ﺩﺭ ﺍﺩﺍﻣﻪ ﭘﻨﺠﺮﻩ Propertiesﻓﻌﺎﻝ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﻓﻴﻠﺪ ﺍﻃﻼﻋﺎﺗﻲ
Shared Asﻧﺎﻡ ﺩﻟﺨﻮﺍﻩ ﺑﺮﺍﻱ ﭼﺎﭘﮕﺮ ) ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺷﺘﺮﺍﮎ ﮔﺬﺍﺷﺘﻦ( ﺭﺍ ﻣﺸﺨﺺ
ﻧﻤﺎﺋﻴﺪ .ﺩﺭ ﺻﻮﺭﺕ ﺗﻤﺎﻳﻞ ﻳﮏ ﺭﻣﺰ ﻋﺒﻮﺭ ﻧﻴﺰ ﺭﺍ ﺩﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ ﻣﺸﺨﺺ ﻧﻤﻮﺩ.
267
•
ﻣﺮﺣﻠﻪ ﭼﻬﺎﺭﻡ :ﺑﺎ ﻓﻌﺎﻝ ﮐﺮﺩﻥ ﺩﮐﻤﻪ ،OKﭘﻨﺠﺮﻩ ﻣﺮﺑﻮﻃﻪ ﺑﺴﺘﻪ ﺷﺪﻩ ﻭ ﭼﺎﭘﮕﺮ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﮔﺬﺍﺷﺘﻪ ﺷﺪﻩ ﺍﺳﺖ .
ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﭼﺎﭘﮕﺮ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﮔﺬﺍﺷﺘﻪ ﺷﺪﻩ ﺍﺯ ﻃﺮﻳﻖ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺩﻳﮕﺮ ،ﻣﺮﺍﺣﻞ ﺯﻳﺮ ﺭﺍ ﺩﻧﺒﺎﻝ ﻧﻤﺎﺋﻴﺪ: • •
ﻣﺮﺣﻠﻪ ﺍﻭﻝ :ﭘﻨﺠﺮﻩ ﻣﺮﺑﻮﻁ ﺑﻪ Printerﺭﺍ ﻓﻌﺎﻝ ﻧﻤﺎﺋﻴﺪ.
ﻣﺮﺣﻠﻪ ﺩﻭﻡ :ﻭﻳﺰﺍﺭﺩ) ﺑﺮﻧﺎﻣﻪ ﮐﻤﮑﻲ ( Add a Printerﺭﺍ ﻓﻌﺎﻝ ﻧﻤﺎﺋﻴﺪ.
•
ﻣﺮﺣﻠﻪ ﺳﻮﻡ :ﮔﺰﻳﻨﻪ Network Printerﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻭ ﺩﮐﻤﻪ OKﺭﺍ ﻓﻌﺎﻝ ﻧﻤﺎﺋﻴﺪ.
•
ﻣﺮﺣﻠﻪ ﭼﻬﺎﺭﻡ :ﻭﻳﺰﺍﺭﺩ ﻣﺮﺑﻮﻃﻪ ﺩﺭ ﺍﺩﺍﻣﻪ ﻟﻴﺴﺘﻲ ﺍﺯ ﭼﺎﭘﮕﺮﻫﺎﻱ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﮔﺬﺍﺷﺘﻪ
ﺷﺪﻩ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﺭﺍ ﻧﻤﺎﻳﺶ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﭼﺎﭘﮕﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ
ﺍﻧﺘﺨﺎﺏ ﻭ ﺩﮐﻤﻪ Nextﺭﺍ ﻓﻌﺎﻝ ﻧﻤﺎﺋﻴﺪ .ﺩﺭ ﻧﻬﺎﻳﺖ ﻭﻳﺰﺍﺭﺩ ﻣﺮﺑﻮﻃﻪ ﺩﺭﺍﻳﻮﺭ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﻧﺼﺐ ﺧﻮﺍﻫﺪ ﮐﺮﺩ ) .ﺩﺭ ﺑﺮﺧﻲ ﺣﺎﻻﺕ ﻣﻤﮑﻦ ﺍﺳﺖ ﻧﻴﺎﺯ ﺑﻪ CDﻭ ﻳﺎ ﺩﻳﺴﮑﺖ ﺣﺎﻭﻱ ﺩﺭﺍﻳﻮﺭ ﭼﺎﭘﮕﺮ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ(
268
ﺍﺷﺘﺮﺍﮎ ﺧﻂ ﺍﻳﻨﺘﺮﻧﺖ
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺭﺷﺪ ﺷﺒﮑﻪ ﻫﺎ ﻱ ﮐﻮﭼﮏ ،ﺷﺮﮐﺖ ﻣﺎﻳﮑﺮﻭﺳﺎﻓﺖ ﺍﺯ ﻧﺴﺨﻪ ﻭﻳﻨﺪﻭﺯ
CE٩٨ﺑﻪ ﺑﻌﺪ ﺍﻣﮑﺎﻧﻲ ﺑﺎ ﻧﺎﻡ (Internet Connection Sharing(ICSﺭﺍ ﺍﺿﺎﻓﻪ
ﻧﻤﻮﺩﻩ ﺍﺳﺖ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ICSﻣﻲ ﺗﻮﺍﻥ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺭﺍ ﮐﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮑﻲ ﺍﺯ ﺭﻭﺵ ﻫﺎﻱ ﺭﺍﻳﺞ ﻧﻈﻴﺮ :ﻣﻮﺩﻡ ISDN ،DSL ،ﻭ ﻳﺎ ﮐﺎﺑﻞ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﺍﺳﺖ ،ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﮔﺬﺍﺷﺖ .ﻭﻳﻨﺪﻭﺯ CE٩٨ﻭ ﺳﺎﻳﺮ ﻧﺴﺨﻪ ﻫﺎﻱ ﻭﻳﻨﺪﻭﺯ ﺩﺍﺭﺍﻱ ﻳﮏ ﻭﻳﺰﺍﺭﺩ ﺑﻪ ﻣﻨﻈﻮﺭ ﻓﻌﺎﻝ ﮐﺮﺩﻥ ﺍﻣﮑﺎﻥ ﻓﻮﻕ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻋﻨﺎﺻﺮ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ICSﺑﺼﻮﺭﺕ ﭘﻴﺶ ﻓﺮﺽ ﺑﺮ
ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻧﺼﺐ ﻧﻤﻲ ﮔﺮﺩﻧﺪ .ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﮐﻪ ﺍﻣﮑﺎﻥ ﻓﻮﻕ ﺻﺮﻓﺎ" ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺮ ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﮐﻪ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﺍﺳﺖ ،ﻓﻌﺎﻝ ﮔﺮﺩﺩ .ﺑﺮﺍﻱ ﻓﻌﺎﻝ ﻧﻤﻮﺩﻥ ﺍﻣﮑﺎﻥ ﻓﻮﻕ ) ﺑﺮ ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﺋﻲ ﮐﻪ ﺍﺯ ﻧﺴﺨﻪ ﻭﻳﻨﺪﻭﺯ CE٩٨ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ( ﻣﻲ ﺑﺎﻳﺴﺖ ﻣﺮﺍﺣﻞ
ﺯﻳﺮ ﺭﺍ ﺩﻧﺒﺎﻝ ﮐﺮﺩ: •
ﻣﺮﺣﻠﻪ ﺍﻭﻝ :ﺍﺯ ﻃﺮﻳﻖ ، Control PanelﮔﺰﻳﻨﻪPrograms Add/Remove
•
ﻣﺮﺣﻠﻪ ﺩﻭﻡ :ﮔﺰﻳﻨﻪ windows setupﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﺁﻳﺘﻢ Internet
•
ﻣﺮﺣﻠﻪ ﺳﻮﻡ :ﻋﻨﺼﺮ Internet Connection Sharingﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ.
ﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ.
Toolsﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ.
ﺩﺭ ﺍﺩﺍﻣﻪ ﮐﻠﻴﺪ Nextﺭﺍ ﻓﻌﺎﻝ ﻧﻤﺎﺋﻴﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ICSﭘﻴﮑﺮﺑﻨﺪﻱ ﻧﺸﺪﻩ ﺑﺎﺷﺪ،
ﺑﺮﻧﺎﻣﻪ ﮐﻤﮑﻲ ) ﻭﻳﺰﺍﺭﺩ( ﻣﺮﺑﻮﻁ ﺑﻪ ICSﻓﻌﺎﻝ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﻣﻲ ﺗﻮﺍﻥ ﻋﻤﻠﻴﺎﺕ ﭘﻴﮑﺮﺑﻨﺪﻱ ﻻﺯﻡ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﺍﺩ. •
ﻣﺮﺣﻠﻪ ﭼﻬﺎﺭﻡ :ﭘﺲ ﺍﺯ ﺍﺧﺬ ﺍﻃﻼﻋﺎﺕ ﺿﺮﻭﺭﻱ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﮐﻪ ICSﺑﺮ ﺭﻭﻱ ﺁﻥ ﻓﻌﺎﻝ ﺷﺪﻩ ﺍﺳﺖ ،ﻭﻳﺰﺍﺭﺩ ﻣﺮﺑﻮﻃﻪ ﻧﻴﺎﺯ ﺑﻪ ﻳﮏ ﻋﺪﺩ ﺩﻳﺴﮑﺖ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ.
ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺑﺮ ﺭﻭﻱ ﺩﻳﺴﮑﺖ ﻓﻮﻕ ﺑﻪ ﻣﻨﻈﻮﺭ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺳﺎﻳﺮ
ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﮐﻪ ﺗﻤﺎﻳﻞ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺮﻭﻳﺲ ICSﺭﺍ ﺩﺍﺷﺘﻪ
ﺑﺎﺷﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ. 269
ﻣﺮﺍﺣﻞ ﻓﻌﺎﻝ ﻧﻤﻮﺩﻥ ﺳﺮﻭﻳﺲ ICSﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﺋﻲ ﮐﻪ ﺍﺯ ﻭﻳﻨﺪﻭﺯ ٢٠٠٠ﻭ ﻳﺎ XPﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ ﺑﻤﺮﺍﺗﺐ ﺭﺍﺣﺖ ﺗﺮ ﺍﺯ ﻣﺮﺍﺣﻞ ﮔﻔﺘﻪ ﺷﺪﻩ ﻓﻮﻕ ﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﭘﺲ ﺍﺯ ﺍﻳﺠﺎﺩ ﻳﮏ ، Dial-upﺑﺎ ﺍﻧﺘﺨﺎﺏ ﺁﻥ ﻭ ﻓﻌﺎﻝ ﮐﺮﺩﻥ ﮐﻠﻴﺪ ﺳﻤﺖ ﺭﺍﺳﺖ ،ﮔﺰﻳﻨﻪ Propertiesﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ ﭘﻨﺠﺮﻩ Dial-up Connection propertiesﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ
ﻣﻲ ﺷﻮﺩ.
ﺑﺮﺍﻱ ﺍﺷﺘﺮﺍﮎ ﺧﻄﻲ ﺍﺭﺗﺒﺎﻁ ﮔﺰﻳﻨﻪ " "Sharingﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ ﮔﺰﻳﻨﻪ " "Enable internet connection sharing for this connectionﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻭ ﺳﺎﻳﺮ ﻣﻮﺍﺭﺩ ﻭ ﻋﻤﻠﻴﺎﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺑﺼﻮﺭﺕ ﺍﺗﻮﻣﺎﺗﻴﮏ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ.
270
ﻫﺎﺏ ﻭ ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ ﺁﻥ ﻫﺎﺏ ﺍﺯ ﺟﻤﻠﻪ ﺗﺠﻬﻴﺰﺍﺕ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﺍﺳﺖ ﮐﻪ ﺍﺯ ﺁﻥ ﺑﻪ ﻣﻨﻈﻮﺭ ﺑﺮﭘﺎﺳﺎﺯﻱ ﺷﺒﮑﻪ
ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ .ﮔﺮﭼﻪ ﺩﺭ ﺍﮐﺜﺮ ﺷﺒﮑﻪ ﻫﺎﺋﻲ ﮐﻪ ﺍﻣﺮﻭﺯﻩ ﺍﻳﺠﺎﺩ ﻣﻲ ﮔﺮﺩﺩ ﺍﺯ ﺳﻮﺋﻴﭻ ﺩﺭ ﻣﻘﺎﺑﻞ ﻫﺎﺏ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ ،ﻭﻟﻲ ﻣﺎ ﻫﻤﭽﻨﺎﻥ ﺷﺎﻫﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ﺗﺠﻬﻴﺰﺍﺕ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﻣﻲ ﺑﺎﺷﻴﻢ .ﻗﺒﻞ ﺍﺯ ﭘﺮﺩﺍﺧﺘﻦ ﺑﻪ ﺍﺻﻞ
ﻣﻮﺿﻮﻉ ،ﻻﺯﻡ ﺍﺳﺖ ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﺎ ﺑﺮﺧﻲ ﺗﻌﺎﺭﻳﻒ ﻣﻬﻢ ﮐﻪ ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺪﻓﻌﺎﺕ ﺑﻪ ﺁﻧﺎﻥ ﻣﺮﺍﺟﻌﻪ ﺧﻮﺍﻫﻴﻢ ﮐﺮﺩ ﺑﻴﺸﺘﺮ ﺁﺷﻨﺎ ﺷﻮﻳﻢ. •
: Domainﺗﻤﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻋﻀﻮﺀ ﻳﮏ domainﻫﺮ ﺍﺗﻔﺎﻕ ﻭ ﻳﺎ ﺭﻭﻳﺪﺍﺩﻱ
•
: Collision Domainﺩﺭ ﺻﻮﺭﺕ ﺑﺮﻭﺯ ﻳﮏ ﺗﺼﺎﺩﻡ ) ( Collisionﺑﻴﻦ
ﺭﺍ ﮐﻪ ﺩﺭ domainﺍﺗﻔﺎﻕ ﻣﻲ ﺍﻓﺘﺪ ،ﻣﺸﺎﻫﺪﻩ ﻭ ﻳﺎ ﺧﻮﺍﻫﻨﺪ ﺷﻨﻴﺪ.
ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ،ﺳﺎﻳﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ domainﺁﻥ ﺭﺍ ﺷﻨﻴﺪﻩ ﻭ ﺁﮔﺎﻫﻲ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺁﻥ ﭼﻴﺰﻱ ﮐﻪ ﺍﺗﻔﺎﻕ ﺍﻓﺘﺎﺩﻩ ﺍﺳﺖ ﺭﺍ ﭘﻴﺪﺍ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ .ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻓﻮﻕ ﻋﻀﻮﺀ ﻳﮏ Collision Domainﻳﮑﺴﺎﻥ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺗﻤﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﺋﻲ ﮐﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻫﺎﺏ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﺷﻮﻧﺪ ،ﻋﻀﻮﺀ ﻳﮏ Collision
Domainﻳﮑﺴﺎﻥ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ ) ﺑﺮ ﺧﻼﻑ ﺳﻮﺋﻴﭻ (. •
: Broadcast Domainﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ،domainﻳﮏ ﭘﻴﺎﻡ broadcast ) ﻳﮏ ﻓﺮﻳﻢ ﻭ ﻳﺎ ﺩﺍﺩﻩ ﮐﻪ ﺑﺮﺍﻱ ﺗﻤﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ( ﺑﺮﺍﻱ ﻫﺮ ﻳﮏ ﺍﺯ
ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ doaminﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ .ﻫﺎﺏ ﻭ ﺳﻮﺋﻴﭻ ﺑﺎ ﻣﻮﺿﻮﻉ broadcast domainﺑﺮﺧﻮﺭﺩ ﻣﻨﺎﺳﺒﻲ ﻧﺪﺍﺷﺘﻪ ) ﺍﻳﺠﺎﺩ ﺣﻮﺯﻩ ﻫﺎﻱ ﻣﺠﺰﺍﺀ( ﻭ ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﺑﻪ ﻳﮏ ﺭﻭﺗﺮ ﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺑﻮﺩ. ﺑﻪ ﻣﻨﻈﻮﺭ ﺑﺮﺧﻮﺭﺩ ﻣﻨﺎﺳﺐ )ﺍﻳﺠﺎﺩ ﺣﻮﺯﻩ ﻫﺎﻱ ﻣﺠﺰﺍﺀ( ﺑﺎ ،collision domain broadcast domainﻭ ﺍﻓﺰﺍﻳﺶ ﺳﺮﻋﺖ ﻭ ﮐﺎﺭﺍﺋﻲ ﻳﮏ ﺷﺒﮑﻪ ﺍﺯ ﺗﺠﻬﻴﺰﺍﺕ ﺳﺨﺖ
ﺍﻓﺰﺍﺭﻱ ﻣﺘﻌﺪﺩﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺳﻮﺋﻴﭻ ﻫﺎ collision domainﻣﺠﺰﺍﺋﻲ ﺭﺍ ﺍﻳﺠﺎﺩ
271
ﻣﻲ ﻧﻤﺎﻳﻨﺪ ﻭﻟﻲ ﺩﺭ ﺧﺼﻮﺹ broadcast doaminﺑﺪﻳﻦ ﺷﮑﻞ ﺭﻓﺘﺎﺭ ﻧﻤﻲ ﻧﻤﺎﻳﻨﺪ.
ﺭﻭﺗﺮﻫﺎ broadcast domain ،ﻭ domain collisionﻣﺠﺰﺍﺋﻲ ﺭﺍ ﺍﻳﺠﺎﺩ ﻧﻤﻮﺩﻩ ﻭ ﺩﺭ ﻣﻘﺎﺑﻞ ﻫﺎﺏ ،ﻗﺎﺩﺭ ﺑﻪ ﺍﻳﺠﺎﺩ broadcast doaminﻭ domain Collision ﺟﺪﺍﮔﺎﻧﻪ ﻧﻤﻲ ﺑﺎﺷﺪ .ﺷﮑﻞ ﺯﻳﺮ ﻳﮏ ﻧﻤﻮﻧﻪ ﻫﺎﺏ ﻫﺸﺖ ﭘﻮﺭﺕ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ
) .( D-Link DE-808TP 10Mbps Ethernet 8-Port Mini-Hub
ﺁﺷﻨﺎﺋﻲ ﺑﺎ ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ ﻫﺎﺏ
ﻫﺎﺏ ،ﻳﮑﻲ ﺍﺯ ﺗﺠﻬﻴﺰﺍﺕ ﻣﺘﺪﺍﻭﻝ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﻭ ﺍﺭﺯﺍﻧﺘﺮﻳﻦ ﺭﻭﺵ ﺍﺗﺼﺎﻝ
ﺩﻭ ﻭ ﻳﺎ ﭼﻨﺪﻳﻦ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﺍﺳﺖ .ﻫﺎﺏ ﺩﺭ ﺍﻭﻟﻴﻦ ﻻﻳﻪ ﻣﺪﻝ ﻣﺮﺟﻊ OSIﻓﻌﺎﻟﻴﺖ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺁﻧﺎﻥ ﻓﺮﻳﻢ ﻫﺎﻱ ﺩﺍﺩﻩ ﺭﺍ ﻧﻤﻲ ﺧﻮﺍﻧﻨﺪ )ﮐﺎﺭﻱ ﮐﻪ ﺳﻮﺋﻴﭻ ﻭ ﻳﺎ ﺭﻭﺗﺮ ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﻨﺪ(
ﻭ ﺻﺮﻓﺎ" ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ ﺭﺍ ﺍﻳﺠﺎﺩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ﮐﻪ ﻓﺮﻳﻢ ﻫﺎﻱ ﺩﺍﺩﻩ ﺑﺮ ﺭﻭﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎ،
ﺗﮑﺮﺍﺭ ﺧﻮﺍﻫﺪ ﺷﺪ. ﮔﺮﻩ ﻫﺎﺋﻲ ﮐﻪ ﻳﮏ ﺍﺗﺮﻧﺖ ﻭ ﻳﺎ Fast Ethernetﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻗﻮﺍﻧﻴﻦ CSMA/CD
ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﻣﻲ ﮔﺬﺍﺭﻧﺪ ،ﻋﻀﻮﺀ ﻳﮏ Collision Domainﻣﺸﺎﺑﻪ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺍﻳﻦ ﺑﺪﺍﻥ ﻣﻌﻨﻲ ﺍﺳﺖ ﮐﻪ ﺗﻤﺎﻣﻲ ﮔﺮﻩ ﻫﺎﻱ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ ﻫﺎﺏ ﺑﺨﺸﻲ ﺍﺯ Collision domain ﻣﺸﺎﺑﻪ ﺑﻮﺩﻩ ﻭ ﺯﻣﺎﻧﻲ ﮐﻪ ﻳﮏ collisionﺍﺗﻔﺎﻕ ﻣﻲ ﺍﻓﺘﺪ ،ﺳﺎﻳﺮ ﮔﺮﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ domainﻧﻴﺰ ﺁﻥ ﺭﺍ ﺷﻨﻴﺪﻩ ﻭ ﺍﺯ ﺁﻥ ﻣﺘﺎﺛﺮ ﺧﻮﺍﻫﻨﺪ ﺷﺪ.ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻭ ﻳﺎ ﮔﺮﻩ ﻫﺎﻱ ﻣﺘﺼﻞ
ﺷﺪﻩ ﺑﻪ ﻫﺎﺏ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ، Unshielded Twisted Pair) UTPﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺻﺮﻓﺎ" ﻳﮏ ﮔﺮﻩ ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﻪ ﻫﺮ ﭘﻮﺭﺕ ﻫﺎﺏ ﻣﺘﺼﻞ ﮔﺮﺩﺩ .ﻣﺜﻼ" ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﻫﺎﺏ ﻫﺸﺖ ﭘﻮﺭﺕ ،ﺍﻣﮑﺎﻥ ﺍﺗﺼﺎﻝ ﻫﺸﺖ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﺯﻣﺎﻧﻲ ﮐﻪ
272
ﻫﺎﺏ ﻫﺎ ﺑﻪ ﻣﺘﺪﺍﻭﻟﻲ ﺍﻣﺮﻭﺯ ﻧﺒﻮﺩﻧﺪ ﻭ ﻗﻴﻤﺖ ﺁﻧﺎﻥ ﻧﻴﺰ ﮔﺮﺍﻥ ﺑﻮﺩ ،ﺩﺭ ﺍﮐﺜﺮ ﺷﺒﮑﻪ ﻫﺎﻱ ﻧﺼﺐ ﺷﺪﻩ ﺩﺭ ﺍﺩﺍﺭﺍﺕ ﻭ ﻳﺎ ﻣﻨﺎﺯﻝ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ﮐﻮﺍﮐﺴﻴﺎﻝ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﻳﺪ.
ﻧﺤﻮﻩ ﮐﺎﺭ ﻫﺎﺏ ﺑﺴﻴﺎﺭ ﺳﺎﺩﻩ ﺍﺳﺖ .ﺯﻣﺎﻧﻲ ﮐﻪ ﻳﮑﻲ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ ﻫﺎﺏ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺋﻲ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺳﺎﻳﺮ ﭘﻮﺭﺕ ﻫﺎﻱ ﻫﺎﺏ ﻧﻴﺰ ﺁﻥ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ )ﺩﺍﺩﻩ ﺍﺭﺳﺎﻟﻲ ﺗﮑﺮﺍﺭ ﻭ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﭘﻮﺭﺕ ﻫﺎﻱ ﻫﺎﺏ ﻧﻴﺰ ﻓﺮﺳﺘﺎﺩﻩ ﻣﻲ ﺷﻮﺩ( .ﺷﮑﻞ ﺯﻳﺮ ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ ﻫﺎﺏ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ.
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﺩﺭ ﺷﮑﻞ ﻓﻮﻕ ﻣﺸﺎﻫﺪﻩ ﻣﻲ ﻧﻤﺎﺋﻴﺪ ،ﮔﺮﻩ ﻳﮏ ﺩﺍﺩﻩ ﺋﻲ ﺭﺍ ﺑﺮﺍﻱ ﮔﺮﻩ ﺷﺶ ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ ﻭﻟﻲ ﺗﻤﺎﻣﻲ ﮔﺮﻩ ﻫﺎﻱ ﺩﻳﮕﺮ ﻧﻴﺰ ﺩﺍﺩﻩ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ،
ﺑﺮﺭﺳﻲ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺩﺍﺩﻩ ﺍﺭﺳﺎﻟﻲ ﺗﻮﺳﻂ ﻫﺮ ﻳﮏ ﺍﺯ ﮔﺮﻩ ﻫﺎ ﺍﻧﺠﺎﻡ ﻭ ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺗﺸﺨﻴﺺ ﺩﺍﺩﻩ ﺷﻮﺩ ﮐﻪ ﺩﺍﺩﻩ ﺍﺭﺳﺎﻟﻲ ﻣﺘﻌﻠﻖ ﺑﻪ ﺁﻧﺎﻥ ﻧﻴﺴﺖ ،ﺁﻥ ﺭﺍ ﻧﺎﺩﻳﺪﻩ ﺧﻮﺍﻫﻨﺪ ﮔﺮﻓﺖ. ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﺍﺯ ﻃﺮﻳﻖ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﮐﻪ ﺁﺩﺭﺱ MACﻣﻘﺼﺪ
ﻓﺮﻳﻢ ﺍﺭﺳﺎﻟﻲ ﺭﺍ ﺑﺮﺭﺳﻲ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺍﻧﺠﺎﻡ ﻣﻲ ﺷﻮﺩ .ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺑﺮﺭﺳﻲ ﻻﺯﻡ ﺭﺍ ﺍﻧﺠﺎﻡ ﻭ ﺩﺭ ﺻﻮﺭﺕ ﻋﺪﻡ ﻣﻄﺎﺑﻘﺖ ﺁﺩﺭﺱ MACﻣﻮﺟﻮﺩ ﺩﺭ ﻓﺮﻳﻢ ،ﺑﺎ ﺁﺩﺭﺱ MACﮐﺎﺭﺕ ﺷﺒﮑﻪ ،ﻓﺮﻳﻢ ﺍﺭﺳﺎﻟﻲ ﺩﻭﺭ ﺍﻧﺪﺍﺧﺘﻪ ﻣﻲ ﮔﺮﺩﺩ.
ﺍﮐﺜﺮ ﻫﺎﺏ ﻫﺎ ﺩﺍﺭﺍﻱ ﻳﮏ ﭘﻮﺭﺕ ﺧﺎﺹ ﻣﻲ ﺑﺎﺷﻨﺪ ﮐﻪ ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﻪ ﺻﻮﺭﺕ ﻳﮏ ﭘﻮﺭﺕ
ﻣﻌﻤﻮﻟﻲ ﻭ ﻳﺎ ﻳﮏ ﭘﻮﺭﺕ uplinkﺭﻓﺘﺎﺭ ﻧﻤﺎﻳﺪ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﭘﻮﺭﺕ uplinkﻣﻲ ﺗﻮﺍﻥ ﻳﮏ ﻫﺎﺏ ﺩﻳﮕﺮ ﺭﺍ ﺑﻪ ﻫﺎﺏ ﻣﻮﺟﻮﺩ ،ﻣﺘﺼﻞ ﻧﻤﻮﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺗﻌﺪﺍﺩ ﭘﻮﺭﺕ ﻫﺎ ﺍﻓﺰﺍﻳﺶ
ﻳﺎﻓﺘﻪ ﻭ ﺍﻣﮑﺎﻥ ﺍﺗﺼﺎﻝ ﺗﻌﺪﺍﺩ ﺑﻴﺸﺘﺮﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺷﺒﮑﻪ ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ.
273
ﺭﻭﺵ ﻓﻮﻕ ﮔﺰﻳﻨﻪ ﺍﻱ ﺍﺭﺯﺍﻥ ﻗﻴﻤﺖ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻓﺰﺍﻳﺶ ﺗﻌﺪﺍﺩ ﮔﺮﻩ ﻫﺎ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺍﺳﺖ ﻭﻟﻲ
ﺑﺎ ﺍﻧﺠﺎﻡ ﺍﻳﻦ ﮐﺎﺭ ﺷﺒﮑﻪ ﺷﻠﻮﻍ ﺗﺮ ﺷﺪﻩ ﻭ ﻫﻤﻮﺍﺭﻩ ﺑﺮ ﺭﻭﻱ ﺁﻥ ﺣﺠﻢ ﺑﺎﻻﺋﻲ ﺩﺍﺩﻩ ﻏﻴﺮ ﺿﺮﻭﺭﻱ
ﺩﺭ ﺣﺎﻝ ﺟﺎﺑﺠﺎﺋﻲ ﺍﺳﺖ .ﺗﻤﺎﻣﻲ ﮔﺮﻩ ﻫﺎ ،ﻋﻀﻮﺀ ﻳﮏ Broadcast domainﻭ collision domainﻳﮑﺴﺎﻧﻲ ﻣﻲ ﺑﺎﺷﻨﺪ ،ﺑﻨﺎﺑﺮﺍﻳﻦ ﺗﻤﺎﻣﻲ ﺁﻧﺎﻥ ﻫﺮ ﻧﻮﻉ collisionﻭ ﻳﺎ
Broadcastﺭﺍ ﮐﻪ ﺍﺗﻔﺎﻕ ﺧﻮﺍﻫﺪ ﺍﻓﺘﺎﺩ ،ﻣﻲ ﺷﻨﻮﻧﺪ.
ﺩﺭ ﺍﮐﺜﺮ ﻫﺎﺏ ﻫﺎ ﺍﺯ ﻳﮏ LEDﺑﻪ ﻣﻨﻈﻮﺭ ﻧﺸﺎﻥ ﺩﺍﺩﻥ ﻓﻌﺎﻝ ﺑﻮﺩﻥ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﺷﺪﻩ ﺑﻴﻦ ﻫﺎﺏ ﻭ ﮔﺮﻩ ﻭ ﺍﺯ LEDﺩﻳﮕﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﻧﺸﺎﻥ ﺩﺍﺩﻥ ﺑﺮﻭﺯ ﻳﮏ ، collisionﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﮔﺮﺩﺩ ) .ﺩﻭ LEDﻣﺠﺰﺍﺀ ( .ﺩﺭ ﺑﺮﺧﻲ ﺍﺯ ﻫﺎﺏ ﻫﺎ ﺩﻭ LEDﻣﺮﺑﻮﻁ ﺑﻪ ﻓﻌﺎﻝ ﺑﻮﺩﻥ
ﻟﻴﻨﮏ ﺍﺭﺗﺒﺎﻃﻲ ﺑﻴﻦ ﻫﺎﺏ ﻭ ﮔﺮﻩ ﻭ ﻓﻌﺎﻟﻴﺖ ﭘﻮﺭﺕ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺗﺮﮐﻴﺐ ﻭ ﺯﻣﺎﻧﻲ ﮐﻪ ﭘﻮﺭﺕ ﺩﺭ ﺣﺎﻝ ﻓﻌﺎﻟﻴﺖ ﺍﺳﺖ LED ،ﻣﺮﺑﻮﻃﻪ ﭼﺸﻤﮏ ﺯﻥ ﺷﺪﻩ ﻭ ﺯﻣﺎﻧﻲ ﮐﻪ ﻓﻌﺎﻟﻴﺘﻲ ﺍﻧﺠﺎﻡ ﻧﻤﻲ ﺷﻮﺩ، LEDﻓﻮﻕ ﺑﻪ ﺻﻮﺭﺕ ﭘﻴﻮﺳﺘﻪ ﺭﻭﺷﻦ ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
LEDﻣﺮﺑﻮﻁ ﺑﻪ Collisionﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﻫﺎﺏ ﻫﺎ ﺯﻣﺎﻧﻲ ﺭﻭﺷﻦ ﻣﻲ ﮔﺮﺩﺩ ﮐﻪ ﻳﮏ collisionﺑﻮﺟﻮﺩ ﺁﻳﺪ Collision .ﺯﻣﺎﻧﻲ ﺑﻮﺟﻮﺩ ﻣﻲ ﺁﻳﺪ ﮐﻪ ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻭ ﻳﺎ ﮔﺮﻩ ﺳﻌﻲ ﻧﻤﺎﻳﻨﺪ ﺩﺭ ﻳﮏ ﻟﺤﻈﻪ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﺻﺤﺒﺖ ﻧﻤﺎﻳﻨﺪ .ﭘﺲ ﺍﺯ ﺑﺮﻭﺯ ﻳﮏ ، Collision
ﻓﺮﻳﻢ ﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﮔﺮﻩ ﻫﺎ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺑﺮﺧﻮﺭﺩ ﻧﻤﻮﺩﻩ ﻭ ﺧﺮﺍﺏ ﻣﻲ ﮔﺮﺩﻧﺪ. ﻫﺎﺏ ﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺸﺨﻴﺺ ﺍﻳﻦ ﻧﻮﻉ ﺗﺼﺎﺩﻡ ﻫﺎ ﺑﻪ ﺍﻧﺪﺍﺯﻩ ﮐﺎﻓﻲ ﻫﻮﺷﻤﻨﺪ ﺑﻮﺩﻩ ﻭ ﺑﺮﺍﻱ ﻣﺪﺕ
ﺯﻣﺎﻥ ﮐﻮﺗﺎﻫﻲ ﭼﺮﺍﻍ ﻣﺮﺑﻮﻁ ﺑﻪ collisionﺭﻭﺷﻦ ﻣﻲ ﮔﺮﺩﺩ ) .ﻳﮏ ﺩﻫﻢ ﺛﺎﻧﻴﻪ ﺑﻪ ﺍﺯﺍﻱ ﻫﺮ ﺗﺼﺎﺩﻡ (.
ﺗﻌﺪﺍﺩ ﺍﻧﺪﮐﻲ ﺍﺯ ﻫﺎﺏ ﻫﺎ ﺩﺍﺭﺍﻱ ﻳﮏ ﺍﺗﺼﺎﻝ ﺧﺎﺹ ﺍﺯ ﻧﻮﻉ BNCﺑﻮﺩﻩ ﮐﻪ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺁﻥ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﻳﮏ ﮐﺎﺑﻞ ﮐﻮﺍﮐﺴﻴﺎﻝ ،ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﭘﺲ ﺍﺯ ﺍﺗﺼﺎﻝ ﻓﻮﻕ LED ،ﻣﺮﺑﻮﻁ ﺑﻪ
ﺍﺗﺼﺎﻝ BNCﺭﻭﻱ ﻫﺎﺏ ﺭﻭﺷﻦ ﻣﻲ ﮔﺮﺩﺩ.
274
ﺳﻮﺋﻴﭻ ﺷﺒﮑﻪ ﺍﺯ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ) ﮔﺮﻩ ( ﮐﻪ ﺗﻮﺳﻂ ﻳﮏ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ) ﮐﺎﺑﻠﻲ ﺑﺪﻭﻥ
ﮐﺎﺑﻞ( ﺑﻴﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ ،ﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺍﺳﺖ .ﺩﺭ ﺷﺒﮑﻪ ﺍﺯ ﺗﺠﻬﻴﺰﺍﺕ ﺧﺎﺻﻲ ﻧﻈﻴﺮ ﻫﺎﺏ ﻭ ﺭﻭﺗﺮ ﻧﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺳﻮﺋﻴﭻ ﻳﮑﻲ ﺍﺯ ﻋﻨﺎﺻﺮ ﺍﺻﻠﻲ ﻭ ﻣﻬﻢ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺳﺖ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻮﺋﻴﭻ ،ﭼﻨﺪﻳﻦ ﮐﺎﺭﺑﺮﻗﺎﺩﺭﺑﻪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﮑﻪ
ﺩﺭ ﻳﮏ ﻟﺤﻈﻪ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺳﺮﻋﺖ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﺭﺑﺮﺍﻥ ﺑﺮ ﺳﺮﻋﺖ ﺩﺳﺘﻴﺎﺑﻲ
ﺳﺎﻳﺮ ﮐﺎﺭﺑﺮﺍﻥ ﺷﺒﮑﻪ ﺗﺎﺛﻴﺮ ﻧﺨﻮﺍﻫﺪ ﮔﺬﺍﺷﺖ .ﺳﻮﺋﻴﭻ ﻫﻤﺎﻧﻨﺪ ﺭﻭﺗﺮ ﮐﻪ ﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﭼﻨﺪﻳﻦ ﺷﺒﮑﻪ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﮔﺮﻩ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ) ﻣﻌﻤﻮﻻ" ﮐﺎﻣﭙﻴﻮﺗﺮ( ﻳﮏ
ﺷﺒﮑﻪ ﺭﺍ ﻣﺴﺘﻘﻴﻤﺎ" ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺷﺒﮑﻪ ﻫﺎ ﻭ ﺳﻮﺋﻴﭻ ﻫﺎ ﺩﺍﺭﺍﻱ ﺍﻧﻮﺍﻉ ﻣﺘﻔﺎﻭﺗﻲ
ﻣﻲ ﺑﺎﺷﻨﺪ ..ﺳﻮﺋﻴﭻ ﻫﺎﺋﻲ ﮐﻪ ﺑﺮﺍﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﺍﺗﺼﺎﻻﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺩﺍﺧﻠﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﻧﺪ ،ﺳﻮﺋﻴﭻ ﻫﺎﻱ LANﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﻧﺪ .ﺍﻳﻦ ﻧﻮﻉ ﺳﻮﺋﻴﭻ ﻫﺎ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺷﺒﮑﻪ ﺭﺍ ﺑﻴﻦ ﺻﺮﻓﺎ" ﺩﻭ ﺩﺳﺘﮕﺎﻩ ﮐﻪ ﻗﺼﺪ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺭﺍ ﺩﺍﺭﻧﺪ ،ﺩﺭ ﺯﻣﺎﻥ
ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﻳﺠﺎﺩ ﻣﻲ ﻧﻤﺎﻳﺪ. ﻣﺒﺎﻧﻲ ﺷﺒﮑﻪ
ﻋﻨﺎﺻﺮ ﺍﺻﻠﻲ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺑﺸﺮﺡ ﺯﻳﺮ ﻣﻲ ﺑﺎﺷﻨﺪ: •
ﺷﺒﮑﻪ .ﺷﺒﮑﻪ ﺷﺎﻣﻞ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﺘﺼﻞ ﺷﺪﻩ )ﺑﺎ ﻳﮏ ﺭﻭﺵ ﺧﺎﺹ(،
•
ﮔﺮﻩ .ﮔﺮﻩ ،ﺷﺎﻣﻞ ﻫﺮ ﭼﻴﺰﻱ ﮐﻪ ﺑﻪ ﺷﺒﮑﻪ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ ،ﺧﻮﺍﻫﺪ ﺑﻮﺩ ).ﮐﺎﻣﭙﻴﻮﺗﺮ،
•
ﺳﮕﻤﻨﺖ .ﺳﮕﻤﻨﺖ ﻳﮏ ﺑﺨﺶ ﺧﺎﺹ ﺍﺯ ﺷﺒﮑﻪ ﺑﻮﺩﻩ ﮐﻪ ﺗﻮﺳﻂ ﻳﮏ ﺳﻮﺋﻴﭻ ،ﺭﻭﺗﺮ ﻭ
•
ﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ .ﮐﺎﺑﻞ ﺍﺻﻠﻲ ﮐﻪ ﺗﻤﺎﻡ ﺳﮕﻤﻨﺖ ﻫﺎ ﺑﻪ ﺁﻥ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ .ﻣﻌﻤﻮﻻ"
ﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺒﺎﺩﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺖ. ﭼﺎﭘﮕﺮ ﻭ ( ...
ﻳﺎ Bridgeﺍﺯ ﺳﺎﻳﺮ ﺑﺨﺶ ﻫﺎ ﺟﺪﺍ ﺷﺪﻩ ﺍﺳﺖ.
ﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ ﻳﮏ ﺷﺒﮑﻪ ﺩﺍﺭﺍﻱ ﺳﺮﻋﺖ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮﻱ ﻧﺴﺒﺖ ﺑﻪ ﻫﺮ ﻳﮏ ﺍﺯ 275
ﺳﮕﻤﻨﺖ ﻫﺎﻱ ﺷﺒﮑﻪ ﺍﺳﺖ .ﻣﺜﻼ" ﻣﻤﮑﻦ ﺍﺳﺖ ﻧﺮﺥ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ ﺷﺒﮑﻪ ١٠٠ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺑﻮﺩﻩ ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻧﺮﺥ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻫﺮ ﺳﮕﻤﻨﺖ ١٠ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺑﺎﺷﺪ. • •
ﺗﻮﭘﻮﻟﻮﮊﻱ .ﺭﻭﺷﻲ ﮐﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﮔﺮﻩ ﻫﺎ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ ﺭﺍ ﮔﻮﻳﻨﺪ.
ﮐﺎﺭﺕ ﺷﺒﮑﻪ .ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺑﻪ ﺷﺒﮑﻪ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ.ﺩﺭ
ﺍﮐﺜﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺷﺨﺼﻲ ،ﮐﺎﺭﺕ ﻓﻮﻕ ﺍﺯ ﻧﻮﻉ ﺍﺗﺮﻧﺖ ﺑﻮﺩﻩ ) ﺩﺍﺭﺍﻱ ﺳﺮﻋﺖ ١٠ﻭ ﻳﺎ ١٠٠ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ( ﻭ ﺩﺭ ﻳﮑﻲ ﺍﺯ ﺍﺳﻼﺕ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺭﻭﻱ ﺑﺮﺩ ﺍﺻﻠﻲ ﺳﻴﺴﺘﻢ،
ﻧﺼﺐ ﺧﻮﺍﻫﺪ ﺷﺪ.
•
ﺁﺩﺭﺱ . MACﺁﺩﺭﺱ ﻓﻴﺰﻳﮑﻲ ﻫﺮ ﺩﺳﺘﮕﺎﻩ ) ﮐﺎﺭﺕ ﺷﺒﮑﻪ ( ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺖ .ﺁﺩﺭﺱ ﻓﻮﻕ ﻳﮏ ﻋﺪﺩ ﺷﺶ ﺑﺎﻳﺘﻲ ﺑﻮﺩﻩ ﮐﻪ ﺳﻪ ﺑﺎﻳﺖ ﺍﻭﻝ ﺁﻥ ﻣﺸﺨﺺ ﮐﻨﻨﺪﻩ ﺳﺎﺯﻧﺪﻩ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﻭ ﺳﻪ ﺑﺎﻳﺖ ﺩﻭﻡ ،ﺷﻤﺎﺭﻩ ﺳﺮﻳﺎﻝ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺍﺳﺖ.
•
. Unicastﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺗﻮﺳﻂ ﻳﮏ ﮔﺮﻩ ﺑﺎ ﺁﺩﺭﺱ ﺧﺎﺹ ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﺗﻮﺳﻂ ﮔﺮﻩ ﺩﻳﮕﺮ ﺍﺳﺖ.
•
. Multicastﻳﮏ ﮔﺮﻩ ،ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﺮﺍﻱ ﻳﮏ ﮔﺮﻭﻩ ﺧﺎﺹ )ﺑﺎ ﺁﺩﺭﺱ ﻣﺸﺨﺺ( ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ.ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﮔﺮﻭﻩ ،ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻟﻲ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ.
•
. Broadcastﻳﮏ ﮔﺮﻩ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﺮﺍﻱ ﺗﻤﺎﻡ ﮔﺮﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻮﺋﻴﭻ
ﺩﺭ ﺍﮐﺜﺮ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺘﺪﺍﻭﻝ ،ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﮔﺮﻩ ﻫﺎ ﺍﺯ ﻫﺎﺏ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ .ﻫﻤﺰﻣﺎﻥ ﺑﺎ
ﺭﺷﺪ ﺷﺒﮑﻪ ) ﺗﻌﺪﺍﺩ ﮐﺎﺭﺑﺮﺍﻥ ،ﺗﻨﻮﻉ ﻧﻴﺎﺯﻫﺎ ،ﮐﺎﺭﺑﺮﺩﻫﺎﻱ ﺟﺪﻳﺪ ﺷﺒﮑﻪ ﻭ (...ﻣﺸﮑﻼﺗﻲ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻓﻮﻕ ﺑﻮﺟﻮﺩ ﻣﻲ ﺁﻳﺪ:
276
•
. Scalabilityﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﻣﺒﺘﻨﻲ ﺑﺮ ﻫﺎﺏ ،ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺑﺼﻮﺭﺕ ﻣﺸﺘﺮﮎ
ﺗﻮﺳﻂ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺤﺪﻭﺩ ﺑﻮﺩﻥ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ،ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺗﻮﺳﻌﻪ ،ﮐﺎﺭﺁﺋﻲ ﺷﺒﮑﻪ ﺑﺸﺪﺕ ﺗﺤﺖ ﺗﺎﺛﻴﺮ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﮔﺮﻓﺖ .ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﮐﻪ ﺍﻣﺮﻭﺯﻩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺟﺮﺍﺀ ﺑﺮ ﺭﻭﻱ ﻣﺤﻴﻂ ﺷﺒﮑﻪ ،ﻃﺮﺍﺣﻲ ﻣﻲ ﮔﺮﺩﻧﻨﺪ ﺑﻪ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ
ﻣﻨﺎﺳﺒﻲ ﻧﻴﺎﺯ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺷﺖ .ﻋﺪﻡ ﺗﺎﻣﻴﻦ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻣﻮﺭﺩ ﻧﻴﺎﺯﺑﺮﻧﺎﻣﻪ ﻫﺎ ،ﺗﺎﺛﻴﺮ ﻣﻨﻔﻲ ﺩﺭ ﻋﻤﻠﮑﺮﺩ ﺁﻧﻬﺎ ﺭﺍ ﺑﺪﻧﺒﺎﻝ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ. •
. Latencyﺑﻪ ﻣﺪﺕ ﺯﻣﺎﻧﻲ ﮐﻪ ﻃﻮﻝ ﺧﻮﺍﻫﺪ ﮐﺸﻴﺪ ﺗﺎ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﺑﺮﺳﺪ ،ﺍﻃﻼﻕ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﻫﺮ ﮔﺮﻩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻫﺎﺏ ﻣﻲ ﺑﺎﻳﺴﺖ ﻣﺪﺕ ﺯﻣﺎﻧﻲ ﺭﺍ ﺩﺭ ﺍﻧﺘﻈﺎﺭ ﺳﭙﺮﻱ ﮐﺮﺩﻩ )ﻣﻤﺎﻧﻌﺖ ﺍﺯ ﺗﺼﺎﺩﻡ ﺍﻃﻼﻋﺎﺕ( ،ﺑﻤﻮﺍﺯﺍﺕ ﺍﻓﺰﺍﻳﺶ ﺗﻌﺪﺍﺩ ﮔﺮﻩ ﻫﺎ ﺩﺭ ﺷﺒﮑﻪ ،ﻣﺪﺕ ﺯﻣﺎﻥ ﻓﻮﻕ ﺍﻓﺰﺍﻳﺶ ﺧﻮﺍﻫﺪ ﻳﺎﻓﺖ .ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻳﮑﻲ ﺍﺯ ﮐﺎﺭﺑﺮﺍﻥ ﻓﺎﻳﻞ ﺑﺎ ﻇﺮﻓﻴﺖ
ﺑﺎﻻﺋﻲ ﺭﺍ ﺑﺮﺍﻱ ﮐﺎﺭﺑﺮ ﺩﻳﮕﺮ ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﺪ ،ﺗﻤﺎﻡ ﮐﺎﺭﺑﺮﺍﻥ ﺩﻳﮕﺮ ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺭ ﺍﻧﺘﻈﺎﺯ ﺁﺯﺍﺩ ﺷﺪﻥ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺎﺷﻨﺪ .ﺑﻬﺮﺣﺎﻝ ﺍﻓﺰﺍﻳﺶ ﻣﺪﺕ
ﺯﻣﺎﻧﻲ ﮐﻪ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﻣﻘﺼﺪ ﺧﻮﺩ ﺑﺮﺳﺪ ،ﻫﺮﮔﺰ ﻣﻮﺭﺩ ﻧﻈﺮ ﮐﺎﺭﺑﺮﺍﻥ ﻳﮏ ﺷﺒﮑﻪ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ.
•
. Failure Networkﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻫﺎﺏ ،ﻳﮑﻲ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ ﻫﺎﺏ ﻗﺎﺩﺭ ﺑﻪ ﺍﻳﺠﺎﺩ ﻣﺴﺎﺋﻞ ﻭ ﻣﺸﮑﻼﺗﻲ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﻋﺎﻣﻞ ﺑﺮﻭﺯ ﺍﺷﮑﺎﻝ ﻣﻲ ﺗﻮﺍﻧﺪ ﻋﺪﻡ ﺗﻨﻈﻴﻢ ﻣﻨﺎﺳﺐ ﺳﺮﻋﺖ )ﻣﺜﻼ" ﺗﻨﻈﻴﻢ ﺳﺮﻋﺖ ﻳﮏ ﻫﺎﺏ ﺑﺎ ﻗﺎﺑﻠﻴﺖ ١٠ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺑﻪ ١٠٠ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ( ﻭ ﻳﺎ ﺍﺭﺳﺎﻝ ﺑﻴﺶ ﺍﺯ ﺣﺪ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﻧﻮﻉ ، Broadcastﺑﺎﺷﺪ.
•
. Collisionsﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺗﮑﻨﻮﻟﻮﮊﻱ ﺍﺗﺮﻧﺖ ﺍﺯ ﻓﺮﺁﻳﻨﺪﻩ ﺧﺎﺻﻲ ﺑﺎ ﻧﺎﻡ CSMA/CDﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ﻧﺤﻮﻩ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﻗﺎﻧﻮﻧﻤﻨﺪ ﻣﻲ ﻧﻤﺎﻳﺪ. 277
•
ﺩﺭ ﭼﻨﻴﻦ ﺷﺒﮑﻪ ﻫﺎﺋﻲ ﺗﺎ ﺯﻣﺎﻧﻴﮑﻪ ﺑﺮ ﺭﻭﻱ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺗﺮﺍﻓﻴﮏ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺎﺷﺪ ،ﮔﺮﻩ ﺍﻱ ﺩﻳﮕﺮ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺩﻭ ﮔﺮﻩ ﺩﺭ ﻳﮏ
ﻟﺤﻈﻪ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻧﻤﺎﻳﻨﺪ ،ﻳﮏ ﺗﺼﺎﺩﻡ ﺍﻃﻼﻋﺎﺗﻲ ﺍﻳﺠﺎﺩ ﻭ ﻋﻤﻼ" ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺭﺳﺎﻟﻲ ﺗﻮﺳﻂ ﻫﺮ ﻳﮏ ﺍﺯ ﮔﺮﻩ ﻫﺎ ﻧﻴﺰ ﺍﺯ ﺑﻴﻦ ﺧﻮﺍﻫﻨﺪ ﺭﻓﺖ .ﻫﺮ ﻳﮏ
ﺍﺯ ﮔﺮﻩ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ) ﺗﺼﺎﺩﻡ ﮐﻨﻨﺪﻩ ( ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻤﺪﺕ ﺯﻣﺎﻥ ﮐﺎﻣﻼ" ﺗﺼﺎﺩﻓﻲ ﺩﺭ ﺍﻧﺘﻈﺎﺭ ﺑﺎﻗﻲ ﻣﺎﻧﺪﻩ ﻭ ﭘﺲ ﺍﺯ ﻓﺮﺍﻫﻢ ﺷﺪﻥ ﺷﺮﺍﻳﻂ ﺍﺭﺳﺎﻝ ،ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﻧﻤﺎﻳﻨﺪ.
ﻫﺎﺏ ﻣﺴﻴﺮ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﻳﮏ ﮔﺮﻩ ﺑﻪ ﮔﺮﻩ ﺩﻳﮕﺮ ﺭﺍ ﺑﻪ ﺣﺪﺍﻗﻞ ﻣﻘﺪﺍﺭ ﺧﻮﺩ ﻣﻲ ﺭﺳﺎﻧﺪ ﻭﻟﻲ ﻋﻤﻼ" ﺷﺒﮑﻪ ﺭﺍ ﺑﻪ ﺳﮕﻤﻨﺖ ﻫﺎﻱ ﮔﺴﺴﺘﻪ ﺗﻘﺴﻴﻢ ﻧﻤﻲ ﻧﻤﺎﻳﺪ .ﺳﻮﺋﻴﭻ ﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺤﻘﻖ ﺧﻮﺍﺳﺘﻪ ﻓﻮﻕ ﻋﺮﺿﻪ ﺷﺪﻩ ﺍﺳﺖ .ﻳﮑﻲ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﺗﻔﺎﻭﺕ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﻴﻦ
ﻫﺎﺏ ﻭ ﺳﻮﺋﻴﭻ ،ﺗﻔﺴﻴﺮ ﻫﺮ ﻳﮏ ﺍﺯ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺍﺳﺖ .ﺗﻤﺎﻡ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ ﻫﺎﺏ، ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻣﻮﺟﻮﺩ ﺭﺍ ﺑﻴﻦ ﺧﻮﺩ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﻣﻲ ﮔﺬﺍﺭﻧﺪ.ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻳﮏ ﺩﺳﺘﮕﺎﻩ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ ﺳﻮﺋﻴﭻ ،ﺩﺍﺭﺍﻱ ﺗﻤﺎﻡ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻣﺨﺘﺺ ﺧﻮﺩ ﺍﺳﺖ .ﻣﺜﻼ" ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺩﻩ ﮔﺮﻩ
ﺑﻪ ﻫﺎﺏ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﺎﺷﻨﺪ ) ،ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭﺛﺎﻧﻴﻪ( ﻫﺮ ﮔﺮﻩ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺑﺨﺸﻲ ﺍﺯ ﺗﻤﺎﻡ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻣﻮﺟﻮﺩ ) ﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ( ﺭﺍ ﺍﺷﻐﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ ) .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺳﺎﻳﺮﮔﺮﻩ ﻫﺎ ﻧﻴﺰ ﻗﺼﺪ ﺍﺭﺗﺒﺎﻁ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ( .ﺩﺭ ﺳﻮﺋﻴﭻ ،ﻫﺮﻳﮏ ﺍﺯ ﮔﺮﻩ ﻫﺎ ﻗﺎﺩﺭ ﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﺎﻳﺮﮔﺮﻩ ﻫﺎ ﺑﺎ ﺳﺮﻋﺖ ﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﻮﺋﻴﭻ ،ﺑﺮﺍﻱ ﻫﺮ ﮔﺮﻩ ﻳﮏ ﺳﮕﻤﻨﺖ ﺍﺧﺘﺼﺎﺻﻲ ﺍﻳﺠﺎﺩ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺳﮕﻤﻨﺖ ﻫﺎﻱ ﻓﻮﻕ ﺑﻪ ﻳﮏ ﺳﻮﺋﻴﭻ ﻣﺘﺼﻞ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﺩﺭ ﺣﻘﻴﻘﺖ ﺳﻮﺋﻴﭻ ﺍﻣﮑﺎﻥ ﺣﻤﺎﻳﺖ ﺍﺯ
ﭼﻨﺪﻳﻦ ) ﺩﺭ ﺑﺮﺧﻲ ﺣﺎﻻﺕ ﺻﺪﻫﺎ ( ﺳﮕﻤﻨﺖ ﺍﺧﺘﺼﺎﺻﻲ ﺭﺍ ﺩﺍﺭﺍ ﺍﺳﺖ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﺗﻨﻬﺎ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻫﺮ ﺳﮕﻤﻨﺖ ﺳﻮﺋﻴﭻ ﮔﺮﻭﻩ ﻣﻲ ﺑﺎﺷﻨﺪ ،ﺳﻮﺋﻴﭻ ﻗﺎﺩﺭ ﺑﻪ ﺍﻧﺘﺨﺎﺏ ﺍﻃﻼﻋﺎﺕ ،ﻗﺒﻞ ﺍﺯ ﺭﺳﻴﺪﻥ ﺑﻪ ﺳﺎﻳﺮ ﮔﺮﻩ ﻫﺎ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺳﻮﺋﻴﭻ ،ﻓﺮﻳﻢ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ
ﺭﺍ ﺑﻪ ﺳﮕﻤﻨﺖ ﻣﻮﺭﺩ ﻧﻈﺮ ﻫﺪﺍﻳﺖ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﻫﺮ ﺳﮕﻤﻨﺖ ﺩﺍﺭﺍﻱ ﺻﺮﻓﺎ"
ﻳﮏ ﮔﺮﻩ ﻣﻲ ﺑﺎﺷﺪ ،ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﻨﺪ ﺷﺪ. 278
ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﻮﺋﻴﭻ ﺍﻣﮑﺎﻥ ﭼﻨﺪﻳﻦ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺼﻮﺭﺕ
ﻫﻤﺰﻣﺎﻥ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ .
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻮﺋﻴﭻ ،ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﺑﺼﻮﺭﺕ full-duplexﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﻗﺒﻞ ﺍﺯ ﻣﻄﺮﺡ ﺷﺪﻥ ﺳﻮﺋﻴﭻ ،ﺍﺗﺮﻧﺖ ﺑﺼﻮﺭﺕ half-duplexﺑﻮﺩ .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﺩﺍﺩﻩ ﻫﺎ ﺩﺭ ﻫﺮ ﻟﺤﻈﻪ ﺍﻣﮑﺎﻥ ﺍﺭﺳﺎﻝ ﺩﺭ ﻳﮏ ﺟﻬﺖ ﺭﺍ ﺩﺍﺭﺍ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﻮﺋﻴﭻ ،ﻫﺮ
ﮔﺮﻩ ﺻﺮﻓﺎ" ﺑﺎ ﺳﻮﺋﻴﭻ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﻲ ﻧﻤﺎﻳﺪ ) ﮔﺮﻩ ﻫﺎ ﻣﺴﺘﻘﻴﻤﺎ" ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻧﻤﻲ ﻧﻤﺎﻳﻨﺪ( .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﮔﺮﻩ ﺑﻪ ﺳﻮﺋﻴﭻ ﻭ ﺍﺯ ﺳﻮﺋﻴﭻ ﺑﻪ ﮔﺮﻩ ﻣﻘﺼﺪ ﺑﺼﻮﺭﺕ ﻫﻤﺰﻣﺎﻥ ﻣﻨﺘﻘﻞ ﻣﻲ ﮔﺮﺩﻧﺪ.
ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﻮﺋﻴﭻ ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ﺑﻬﻢ ﺗﺎﺑﻴﺪﻩ ﻭ ﻳﺎ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﮐﺎﻧﮑﺘﻮﺭﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ ﺑﺮﺍﻱ
ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻮﺋﻴﭻ ،ﺷﺒﮑﻪ ﺍﻱ ﻋﺎﺭﻱ ﺍﺯ ﺗﺼﺎﺩﻡ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻮﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺁﻣﺪ .ﺍﻧﺘﻘﺎﻝ ﺩﻭ ﺳﻮﻳﻪ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﻮﺋــﻴﭻ ، ﺳﺮﻋﺖ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﺍﻓﺰﺍﻳﺶ ﻣﻲ ﻳﺎﺑﺪ.
ﺍﮐﺜﺮ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﻮﺋﻴﭻ ﺑﺪﻟﻴﻞ ﻗﻴﻤﺖ ﺑﺎﻻﻱ ﺳﻮﺋﻴﭻ ،ﺻﺮﻓﺎ" ﺍﺯ ﺳﻮﺋﻴﭻ ﺑﻪ ﺗﻨﻬﺎﺋﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ﺍﺯ ﺗﺮﮐﻴﺐ ﻫﺎﺏ ﻭ ﺳﻮﺋﻴﭻ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻣﺜﻼ" ﻳﮏ ﺳﺎﺯﻣﺎﻥ ﻣﻲ ﺗﻮﺍﻧﺪ ﺍﺯ ﭼﻨﺪﻳﻦ ﻫﺎﺏ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻫﺮ ﻳﮏ ﺍﺯ ﺩﭘﺎﺭﺗﻤﺎﻧﻬﺎﻱ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺳﻮﺋﻴﭻ ﺗﻤﺎﻡ ﻫﺎﺏ ﻫﺎ)ﻣﺮﺑﻮﻁ ﺑﻪ ﻫﺮ
ﻳﮏ ﺍﺯ ﺩﭘﺎﺭﺗﻤﺎﻧﻬﺎ( ﺑﻴﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ. ﺗﮑﻨﻮﻟﻮﮊﻱ ﺳﻮﺋﻴﭻ ﻫﺎ
ﺳﻮﺋﻴﭻ ﻫﺎ ﺩﺍﺭﺍﻱ ﭘﺘﺎﻧﺴﻴﻞ ﻫﺎﻱ ﻻﺯﻡ ﺑﻪ ﻣﻨﻈﻮﺭ ﺗﻐﻴﻴﺮ ﺭﻭﺵ ﺍﺭﺗﺒﺎﻁ ﻫﺮ ﻳﮏ ﺍﺯ ﮔﺮﻩ ﻫﺎ
ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺗﻔﺎﻭﺕ ﺳﻮﺋﻴﭻ ﺑﺎ ﺭﻭﺗﺮ ﭼﻴﺴﺖ؟ ﺳﻮﺋﻴﭻ ﻫﺎ ﻣﻌﻤﻮﻻ" ﺩﺭ ﻻﻳﻪ ﺩﻭﻡ
) (Data layerﻣﺪﻝ OSIﻓﻌﺎﻟﻴﺖ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.ﺩﺭ ﻻﻳﻪ ﻓﻮﻕ ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ ) MACﺁﺩﺭﺱ ﻫﺎ ﻱ ﻓﻴﺰﻳﮑﻲ ( ﻭﺟﻮﺩ ﺩﺍﺭﺩ .ﺭﻭﺗﺮ ﺩﺭ ﻻﻳﻪ ﺳﻮﻡ ) (Networkﻣﺪﻝ OSI 279
ﻓﻌﺎﻟﻴﺖ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﻻﻳﻪ ﻓﻮﻕ ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ IPﺭ IPXﻭ ﻳﺎ Appeltalkﺍﺳﺘــﻔﺎﺩﻩ
ﻣﻲ ﺷﻮﺩ ) .ﺁﺩﺭﺱ ﻫﺎ ﻱ ﻣﻨﻄﻘﻲ ( .ﺍﻟﮕﻮﺭﻳﺘﻢ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺗﻮﺳﻂ ﺳﻮﺋﻴﭻ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺨﺎﺫ ﺗﺼﻤﻴﻢ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻣﻘﺼﺪ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺎ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺗﻮﺳﻂ ﺭﻭﺗﺮ، ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ.
ﻳﮑﻲ ﺍﺯ ﻣﻮﺍﺭﺩ ﺍﺧﺘﻼﻑ ﺍﻟﮕﻮﺭﻳﺘﻢ ﻫﺎﻱ ﺳﻮﺋﻴﭻ ﻭ ﻫﺎﺏ ،ﻧﺤﻮﻩ ﺑﺮﺧﻮﺭﺩ ﺁﻧﺎﻥ ﺑﺎ
Broadcastﺍﺳﺖ .ﻣﻔﻬﻮﻡ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﻧﻮﻉ Broadcastﺩﺭ ﺗﻤﺎﻡ ﺷﺒﮑﻪ ﻫﺎ ﻣﺸﺎﺑﻪ ﻣﻲ ﺑﺎﺷﺪ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ،ﺩﺳﺘﮕﺎﻫﻲ ﻧﻴﺎﺯ ﺑﻪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺩﺍﺷﺘﻪ ﻭﻟﻲ ﻧﻤﻲ ﺩﺍﻧﺪ ﮐﻪ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﺮﺍﻱ ﭼﻪ ﮐﺴﻲ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﺪ .ﺑﺪﻟﻴﻞ ﻋﺪﻡ ﺁﮔﺎﻫﻲ ﻭ ﺩﺍﻧﺶ ﻧﺴﺒﺖ ﺑﻪ ﻫﻮﻳﺖ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﺍﻃﻼﻋﺎﺕ ،ﺩﺳﺘﮕﺎﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺼﻮﺭﺕ
broadcastﻣﻲ ﻧﻤﺎﻳﺪ .ﻣﺜﻼ" ﻫﺮ ﺯﻣﺎﻥ ﮐﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺟﺪﻳﺪ ﻭﻳﺎ ﻳﮑﺪﺳﺘﮕﺎﻩ ﺑﻪ ﺷﺒﮑﻪ ﻭﺍﺭﺩ
ﻣﻲ ﺷﻮﺩ ،ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﻧﻮﻉ Broadcastﺑﺮﺍﻱ ﻣﻌﺮﻓﻲ ﻭ ﺣﻀﻮﺭ ﺧﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ .ﺳﺎﻳﺮ ﮔﺮﻩ ﻫﺎ ﻗﺎﺩﺭ ﺑﻪ ﺍﻓﺰﻭﺩﻥ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﺩﺭ ﻟﻴﺴﺖ ﺧﻮﺩ ﻭ ﺑﺮﻗﺮﺍﺭﻱ
ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺁﻥ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﻧﻮﻉ Broadcastﺩﺭ ﻣﻮﺍﺭﺩﻳﮑﻪ
ﻳﮏ ﺩﺳﺘﮕﺎﻩ ﻧﻴﺎﺯ ﺑﻪ ﻣﻌﺮﻓﻲ ﺧﻮﺩ ﺑﻪ ﺳﺎﻳﺮ ﺑﺨﺶ ﻫﺎﻱ ﺷﺒﮑﻪ ﺭﺍ ﺩﺍﺷﺘﻪ ﻭ ﻳﺎ ﻧﺴﺒﺖ ﺑﻪ ﻫﻮﻳﺖ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﺍﻃﻼﻋﺎﺕ ﺷﻨﺎﺧﺖ ﻻﺯﻡ ﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﻧﺪ. ﻫﺎﺏ ﻭ ﻳﺎ ﺳﻮﺋﻴﭻ ﻫﺎ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﺑﺴﺘﻪ ﺍﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﻧﻮﻉ Broadcastﺑﺮﺍﻱ ﺳﺎﻳﺮ ﺳﮕﻤﻨﺖ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺣﻮﺯﻩ Broadcastﻣﻲ ﺑﺎﺷﻨﺪ.
280
ﺭﻭﺗﺮ ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﺭﺍ ﺍﻧﺠﺎﻡ ﻧﻤﻲ ﺩﻫﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺁﺩﺭﺱ ﻳﮑﺪﺳﺘﮕﺎﻩ ﻣﺸﺨﺺ
ﻧﮕﺮﺩﺩ ،ﺭﻭﺗﺮ ﻗﺎﺩﺭ ﺑﻪ ﻣﺴﻴﺮﻳﺎﺑﻲ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻣﻮﺭﺩ ﻧﻈﺮ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ .ﻭﻳﮋﮔﻲ ﻓﻮﻕ ﺩﺭ
ﻣﻮﺍﺭﺩﻳﮑﻪ ﻗﺼﺪ ﺟﺪﺍﺳﺎﺯﻱ ﺷﺒﮑﻪ ﻫﺎ ﺍﺯ ﻳﮑﺪﻳﮕﺮ ﻣﺪ ﻧﻈﺮ ﺑﺎﺷﺪ ،ﺑﺴﻴﺎﺭ ﺍﻳﺪﻩ ﺁﻝ ﺧﻮﺍﻫﺪ ﺑﻮﺩ. ﻭﻟﻲ ﺯﻣﺎﻧﻴﮑﻪ ﻫﺪﻑ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻴﻦ ﺑﺨﺶ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﻳﮏ ﺷﺒﮑﻪ ﺑﺎﺷﺪ ،ﻣﻄﻠﻮﺏ ﺑﻨﻈﺮ
ﻧﻤﻲ ﺁﻳﺪ .ﺳﻮﺋﻴﭻ ﻫﺎ ﺑﺎ ﻫﺪﻑ ﺑﺮﺧﻮﺭﺩ ﺑﺎ ﻣﺸﮑﻞ ﻓﻮﻕ ﻋﺮﺿﻪ ﺷﺪﻩ ﺍﻧﺪ.
ﺳﻮﺋﻴﭻ ﻫﺎﻱ LANﺑﺮ ﺍﺳﺎﺱ ﺗﮑﻨﻮﻟﻮﮊﻱ packet-switchingﻓﻌﺎﻟﻴﺖ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﺳﻮﺋﻴﭻ ﻳﮏ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺩﻭ ﺳﮕﻤﻨﺖ ﺍﻳﺠﺎﺩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﻭﻟﻴﻪ ﺩﺭ ﻳﮏ
ﻣﺤﻞ ﻣﻮﻗﺖ ) ﺑﺎﻓﺮ( ﺫﺧﻴﺮﻩ ﻣﻲ ﮔﺮﺩﻧﺪ ،ﺁﺩﺭﺱ ﻓﻴﺰﻳﮑﻲ ) (MACﻣﻮﺟﻮﺩ ﺩﺭ ﻫﺪﺭ ﺧﻮﺍﻧﺪﻩ ﺷﺪﻩ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺎ ﻟﻴﺴﺘﻲ ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺟﺪﻭﻝ ) Lookupﺟﺴﺘﺠﻮ( ﻣﻘﺎﻳﺴﻪ
ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ LANﻣﺒﺘﻨﻲ ﺑﺮ ﺍﺗﺮﻧﺖ ،ﻫﺮ ﻓﺮﻳﻢ ﺍﺗﺮﻧﺖ ﺷﺎﻣﻞ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺧﺎﺹ ﺍﺳﺖ .ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻓﻮﻕ ﺷﺎﻣﻞ ﻳﮏ ﻋﻨﻮﺍﻥ )ﻫﺪﺭ( ﺧﺎﺹ ﻭ ﺷﺎﻣﻞ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﺩﺭﺱ ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﮔﻴﺮﻧﺪﻩ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺳﺖ. ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺴﻴﺮﻳﺎﺑﻲ ﺗﺮﺍﻓﻴﮏ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺍﺯ
ﺳﻪ ﺭﻭﺵ ﺯﻳﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
• Cut-Through • Store-and-forward • Fragment-free ﺳﻮﺋﻴﭻ ﻫﺎﻱ ، Cut-throughﺑﻼﻓﺎﺻﻠﻪ ﭘﺲ ﺍﺯ ﺗﺸﺨﻴﺺ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺗﻮﺳﻂ ﺳﻮﺋﻴﭻ ،ﺁﺩﺭﺱ MACﺧﻮﺍﻧﺪﻩ ﻣﻲ ﺷﻮﺩ .ﭘﺲ ﺍﺯ ﺫﺧﻴﺮﻩ ﺳﺎﺯﻱ ﺷﺶ ﺑﺎﻳﺖ ﺍﻃﻼﻋﺎﺕ ﮐﻪ ﺷﺎﻣﻞ ﺁﺩﺭﺱ ﻣﻲ ﺑﺎﺷﻨﺪ ،ﺑﻼﻓﺎﺻﻠﻪ ﻋﻤـﻠﻴﺎﺕ ﺍﺭﺳﺎﻝ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﮔﺮﻩ ﻣﻘـــﺼﺪ ﺁﻏـــﺎﺯ
ﻣﻲ ﮔﺮﺩﺩ) .ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺩﺭﻳﺎﻓﺖ ﺳﺎﻳﺮ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺗﻮﺳﻂ ﺳﻮﺋﻴﭻ ( .ﺑﺎ ﺗﻮﺟﻪ
ﺑﻪ ﻋﺪﻡ ﻭﺟﻮﺩ ﮐﻨﺘﺮﻝ ﻫﺎﻱ ﻻﺯﻡ ﺩﺭ ﺻﻮﺭﺕ ﺑﺮﻭﺯ ﺧﻄﺎﺀ ﺩﺭ ﺭﻭﺵ ﻓﻮﻕ ،ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﺯﻳﺎﺩﻱ ﺍﺯ ﺭﻭﺵ ﻓﻮﻕ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲ ﻧﻤﺎﻳﻨﺪ.
281
ﺳﻮﺋﻴﭻ ﻫﺎﻱ ، store-and-forwardﺗﻤﺎﻡ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺩﺭ ﺑﺎﻓﺮ ﻣﺮﺑﻮﻃﻪ ﺫﺧﻴﺮﻩ ﻭ
ﻋﻤﻠﻴﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺑﺮﺭﺳﻲ ﺧﻄﺎﺀ ) (CRCﻭ ﺳﺎﻳﺮ ﻣﺴﺎﺋﻞ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﻗﺒﻞ ﺍﺯ ﺍﺭﺳﺎﻝ
ﺍﻃﻼﻋﺎﺕ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺍﺭﺍﻱ ﺧﻄﺎﺀ ﺑﺎﺷﺪ ،ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﻭﺭ ﺍﻧﺪﺍﺧﺘﻪ ﺧﻮﺍﻫﺪ ﺷﺪ. .ﺩﺭ ﻏﻴﺮﺍﻳﻨﺼﻮﺭﺕ ،ﺳﻮﺋﻴﭻ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﺩﺭﺱ، MAC
ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﺮﺍﻱ ﮔﺮﻩ ﻣﻘﺼﺪ ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺍﻏﻠﺐ ﺳﻮﺋﻴﭻ ﻫﺎ ﺍﺯ ﺗﺮﮐﻴﺐ ﺩﻭ ﺭﻭﺵ
ﮔﻔﺘﻪ ﺷﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺳﻮﺋﻴﭻ ﻫﺎ ﺍﺯ ﺭﻭﺵ cut-throughﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﻭ ﺑﻤﺤﺾ ﺑﺮﻭﺯ ﺧﻄﺎﺀ ﺍﺯ ﺭﻭﺵ store-and-forwardﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳـﻨﺪ.
ﻳﮑﻲ ﺩﻳﮕﺮ ﺍﺯ ﺭﻭﺵ ﻫﺎﻱ ﻣﺴﻴﺮﻳﺎﺑﻲ ﺗﺮﺍﻓﻴﮏ ﺩﺭ ﺳﻮﺋﻴﭻ ﻫﺎ ﮐﻪ ﮐﻤﺘﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ، fragment-freeﺍﺳﺖ .ﺭﻭﺵ ﻓﻮﻕ ﻣﺸﺎﺑﻪ cut-throughﺑﻮﺩﻩ ﺑﺎ ﺍﻳﻦ ﺗﻔﺎﻭﺕ ﮐﻪ ﻗﺒﻞ ﺍﺯ ﺍﺭﺳﺎﻝ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ٦٤ﺑﺎﻳﺖ ﺁﻥ ﺫﺧﻴﺮﻩ ﻣﻲ ﮔﺮﺩﺩ. ﺳﻮﺋﻴﭻ ﻫﺎﻱ LANﺩﺍﺭﺍﻱ ﻣﺪﻝ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺍﺯ ﻧﻘﻄﻪ ﻧﻈﺮ ﻃﺮﺍﺣﻲ ﻓﻴﺰﻳﮑﻲ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺳﻪ ﻣﺪﻝ ﺭﺍﻳﺞ ﺩﺭ ﺣﺎﻝ ﺣﺎﺿﺮ ﺑﺸﺮﺡ ﺯﻳﺮ ﻣﻲ ﺑﺎﺷﻨﺪ: •
. Shared memoryﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺳﻮﺋﻴﭻ ﻫﺎ ﺗﻤﺎﻡ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﻭﻟﻴﻪ ﺩﺭ ﺑﺎﻓﺮ ﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ ﺭﺍ ﺫﺧﻴﺮﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺑﺎﻓﺮ ﻓﻮﻕ ﺑﺼﻮﺭﺕ ﻣﺸﺘﺮﮎ ﺗﻮﺳﻂ
ﺗﻤﺎﻡ ﭘﻮﺭﺕ ﻫﺎﻱ ﺳﻮﺋﻴﭻ ) ﺍﺗﺼﺎﻻﺕ ﻭﺭﻭﺩﻱ ﻭ ﺧﺮﻭﺟﻲ ( ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﮑﻤﮏ ﭘﻮﺭﺕ ﻣﺮﺑﻮﻃﻪ ﺑﺮﺍﻱ ﮔﺮﻩ ﻣﻘﺼﺪ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﻨﺪ ﺷﺪ.
•
.Matrixﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺳﻮﺋﻴﭻ ﻫﺎ ﺩﺍﺭﺍﻱ ﻳﮏ ﺷﺒﮑﻪ) ﺗﻮﺭ( ﺩﺍﺧﻠﻲ ﻣﺎﺗﺮﻳﺲ ﻣﺎﻧﻨﺪ ﺑﻮﺩﻩ ﮐﻪ ﭘﻮﺭﺕ ﻫﺎﻱ ﻭﺭﻭﺩﻱ ﻭ ﺧﺮﻭﺟﻲ ﻫﻤﺪﻳﮕﺮ ﺭﺍ ﻗﻄﻊ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮ ﺭﻭﻱ ﭘﻮﺭﺕ ﻭﺭﻭﺩﻱ ﺗﺸﺨﻴﺺ ﺩﺍﺩﻩ ﺷﺪ ،ﺁﺩﺭﺱ MACﺁﻥ ﺑﺎ ﺟﺪﻭﻝ lookupﻣﻘﺎﻳﺴﻪ ﺗﺎ ﭘﻮﺭﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﺮﻭﺟﻲ ﺁﻥ ﻣﺸﺨﺺ ﮔﺮﺩﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺳﻮﺋﻴﭻ
ﻳﮏ ﺍﺭﺗﺒﺎﻁ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﮑﻪ ﻭ ﺩﺭ ﻣﺤﻠﻲ ﮐﻪ ﭘﻮﺭﺕ ﻫﺎ ﻫﻤﺪﻳﮕﺮ ﺭﺍ ﻗﻄﻊ ﻣﻲ ﮐﻨﻨﺪ، ﺑﺮﻗﺮﺍﺭ ﻣﻲ ﮔﺮﺩﺩ.
282
•
. Architecture Busﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺳﻮﺋﻴﭻ ﻫﺎ ﺑﺠﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺷﺒﮑﻪ ) ﺗﻮﺭ( ،ﺍﺯ ﻳﮏ ﻣﺴﻴﺮ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺧﻠﻲ ) (Busﺍﺳﺘﻔﺎﺩﻩ ﻭ ﻣﺴﻴﺮ ﻓﻮﻕ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
TDMAﺗﻮﺳﻂ ﺗﻤﺎﻡ ﭘﻮﺭﺕ ﻫﺎ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﮔﺬﺍﺷﺘﻪ ﻣﻲ ﺷﻮﺩ .ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﻓﻮﻕ ﺑﺮﺍﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎ ﺩﺍﺭﺍﻱ ﻳﮏ ﺣﺎﻓﻈﻪ ﺍﺧﺘﺼﺎﺻﻲ ﻣﻲ ﺑﺎﺷﻨﺪ. Transparent Bridging ﺍﮐﺜﺮ ﺳﻮﺋﻴﭻ ﻫﺎﻱ LANﻣﺒﺘﻨﻲ ﺑﺮ ﺍﺗﺮﻧﺖ ﺍﺯ ﺳﻴﺴﺘﻢ ﻱ ﺑﺎ ﻧﺎﻡ transparent bridging ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺟﺪﺍﻭﻝ ﺁﺩﺭﺱ lookupﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺗﮑﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺍﻣﮑﺎﻥ ﻳﺎﺩﮔﻴﺮﻱ
ﻫﺮ ﭼﻴﺰﻱ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻣﺤﻞ ﮔﺮﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ،ﺑﺪﻭﻥ ﺣﻤﺎﻳﺖ ﻣﺪﻳﺮﻳﺖ ﺷﺒﮑﻪ ﺭﺍ
ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺗﮑﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺩﺍﺭﻱ ﭘﻨﺞ ﺑﺨﺶ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ: • • • • •
Learning Flooding Filtering Forwarding Aging
ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺑﺸﺮﺡ ﺯﻳﺮ ﺍﺳﺖ: •
ﺳﻮﺋﻴﭻ ﺑﻪ ﺷﺒﮑﻪ ﺍﺿﺎﻓﻪ ﺷﺪﻩ ﻭ ﺗﻤﺎﻡ ﺳﮕﻤﻨﺖ ﻫﺎ ﺑﻪ ﭘﻮﺭﺕ ﻫﺎﻱ ﺳﻮﺋﻴﭻ ﻣﺘﺼﻞ
•
ﮔﺮﻩ Aﺑﺮ ﺭﻭﻱ ﺍﻭﻟﻴﻦ ﺳﮕﻤﻨﺖ ) ﺳﮕﻤﻨﺖ ،( Aﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﻳــﮕﺮ
ﺧﻮﺍﻫﻨﺪ ﺷﺪ.
) ﮔﺮﻩ ( Bﺩﺭ ﺳﮕﻤﻨﺖ ﺩﻳﮕﺮ ) ﺳﮕﻤﻨﺖ ( Cﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ.
283
•
ﺳﻮﺋﻴﭻ ﺍﻭﻟﻴﻦ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺍﺯ ﮔﺮﻩ Aﺩﺭﻳﺎﻓﺖ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺁﺩﺭﺱ MACﺁﻥ
ﺧﻮﺍﻧﺪﻩ ﺷﺪﻩ ﻭ ﺁﻥ ﺭﺍ ﺩﺭ ﺟﺪﻭﻝ Lookupﺳﮕﻤﻨﺖ Aﺫﺧﻴﺮﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺑﺪﻳﻦ
ﺗﺮﺗﻴﺐ ﺳﻮﺋﻴﭻ ﺍﺯ ﻧﺤﻮﻩ ﻳﺎﻓﺘﻦ ﮔﺮﻩ Aﺁﮔﺎﻫﻲ ﭘﻴﺪﺍ ﮐﺮﺩﻩ ﻭ ﺍﮔﺮ ﺩﺭ ﺁﻳﻨﺪﻩ ﮔﺮﻩ ﺍﻱ ﻗﺼﺪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻱ ﮔﺮﻩ Aﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ،ﺳﻮﺋﻴﭻ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺁﺩﺭﺱ ﺁﻥ
ﻣﺸﮑﻠﻲ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ﺭﺍ Learningﻣﻲ ﮔﻮﻳﻨﺪ. •
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﺳﻮﺋﻴﭻ ﺩﺍﻧﺸﻲ ﻧﺴﺒﺖ ﺑﻪ ﻣﺤﻞ ﮔﺮﻩ Bﻧﺪﺍﺭﺩ ،ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﺮﺍﻱ ﺗﻤﺎﻡ ﺳﮕﻤﻨﺖ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ )ﺑﺠﺰ ﺳﮕﻤﻨﺖ Aﮐﻪ ﺍﺧﻴﺮﺍ" ﻳﮑﻲ ﺍﺯ ﮔﺮﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺁﻥ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻧﻤﻮﺩﻩ ﺍﺳﺖ (.ﻓﺮﺁﻳﻨﺪ ﺍﺭﺳﺎﻝ ﻳﮏ
ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺗﻮﺳﻂ ﺳﻮﺋﻴﭻ ،ﺑﻪ ﻣﻨﻈﻮﺭ ﻳﺎﻓﺘﻦ ﻳﮏ ﮔﺮﻩ ﺧﺎﺹ ﺑﺮﺍﻱ ﺗﻤﺎﻡ ﺳﮕﻤﻨﺖ ﻫﺎ Flooding ،ﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ. •
ﮔﺮﻩ Bﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻭ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﻪ ﻋﻨﻮﺍﻥ Acknowledgementﺑﺮﺍﻱ ﮔﺮﻩ Aﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
•
ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺭﺳﺎﻟﻲ ﺗﻮﺳﻂ ﮔﺮﻩ Bﺑﻪ ﺳﻮﺋﻴﭻ ﻣﻲ ﺭﺳﺪ .ﺩﺭ ﺍﻳﻦ ﺯﻣﺎﻥ ،ﺳﻮﺋﻴﭻ ﻗﺎﺩﺭ ﺑﻪ ﺫﺧﻴﺮﻩ ﮐﺮﺩﻥ ﺁﺩﺭﺱ MACﮔﺮﻩ Bﺩﺭ ﺟﺪﻭﻝ Lookupﺳﮕﻤﻨﺖ Cﻣﻲ ﺑﺎﺷﺪ. ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﺳﻮﺋﻴﭻ ﺍﺯ ﺁﺩﺭﺱ ﮔﺮﻩ Aﺁﮔﺎﻫﻲ ﺩﺍﺭﺩ ،ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﻣﺴﺘﻘﻴﻤﺎ"
ﺑﺮﺍﻱ ﺁﻥ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﮔﺮﻩ Aﺩﺭ ﺳﮕﻤﻨﺘﻲ ﻣﺘﻔﺎﻭﺕ ﻧﺴﺒﺖ ﺑﻪ ﮔﺮﻩ Bﻗﺮﺍﺭ ﺩﺍﺭﺩ ،ﺑﻨﺎﺑﺮﺍﻳﻦ ﺳﻮﺋﻴﺞ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﻭ ﺳﮕﻤﻨﺖ ﺭﺍ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻧﻤﺎﺋﻴﺪ .ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ Forwardingﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ.
•
ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻌﺪﻱ ﺍﺯ ﮔﺮﻩ Aﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺑﺮﺍﻱ ﮔﺮﻩ Bﺑﻪ ﺳﻮﺋﻴﭻ ﻣﻲ ﺭﺳﺪ ،ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﺳﻮﺋﻴﺞ ﺍﺯ ﺁﺩﺭﺱ ﮔﺮﻩ Bﺁﮔﺎﻫﻲ ﺩﺍﺭﺩ ،ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻓﻮﻕ ﻣﺴﺘﻘﻴﻤﺎ" ﺑﺮﺍﻱ ﮔﺮﻩ Bﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ.
•
ﮔﺮﻩ Cﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺳﻮﺋﻴﭻ ﺑﺮﺍﻱ ﮔﺮﻩ Aﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ .ﺳﻮﺋﻴﭻ ﺁﺩﺭﺱ
MACﮔﺮﻩ Cﺭﺍ ﺩﺭ ﺟﺪﻭﻝ Lookupﺳﮕﻤﻨﺖ Aﺫﺧﻴﺮﻩ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺳﻮﺋﻴﭻ ﺁﺩﺭﺱ ﮔﺮﻩ Aﺭﺍ ﺩﺍﻧﺴﺘﻪ ﻭ ﻣﺸﺨﺺ ﻣﻲ ﮔﺮﺩﺩ ﮐﻪ ﺩﻭ ﮔﺮﻩ Aﻭ Cﺩﺭ ﻳﮏ ﺳﮕﻤﻨﺖ 284
ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﻧﻴﺎﺯﻱ ﺑﻪ ﺍﺭﺗﺒﺎﻁ ﺳﮕﻤﻨﺖ Aﺑﺎ ﺳﮕﻤﻨﺖ ﺩﻳﮕﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﮔﺮﻩ Cﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺳﻮﺋﻴﭻ ﺍﺯ ﺣﺮﮐﺖ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ
ﺑﻴﻦ ﮔﺮﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺳﮕﻤﻨﺖ ﻣﻤﺎﻧﻌﺖ ﻣﻲ ﻧﻤﺎﻳﺪ .ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ﺭﺍ Filteringﻣﻲ ﮔﻮﻳﻨﺪ.
•
Learningﻭ Floodingﺍﺩﺍﻣﻪ ﻳﺎﻓﺘﻪ ﻭ ﺑﻤﻮﺍﺯﺍﺕ ﺁﻥ ﺳﻮﺋﻴﭻ ،ﺁﺩﺭﺱ ﻫﺎﻱ MAC ﻣﺮﺑﻮﻁ ﺑﻪ ﮔﺮﻩ ﻫﺎ ﺭﺍ ﺩﺭ ﺟﺪﺍﻭﻝ Lookupﺫﺧﻴﺮﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺍﮐﺜﺮ ﺳﻮﺋﻴﭻ ﻫﺎ ﺩﺍﺭﺍﻱ ﺣﺎﻓﻈﻪ ﮐﺎﻓﻲ ﺑﻪ ﻣﻨﻈﻮﺭ ﺫﺧﻴﺮﻩ ﺳﺎﺯﻱ ﺟﺪﺍﻭﻝ Lookupﻣﻲ ﺑﺎﺷﻨﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺑﻬﻴﻨﻪ
ﺳﺎﺯﻱ ﺣﺎﻓﻈﻪ ﻓﻮﻕ ،ﺍﻃﻼﻋﺎﺕ ﻗﺪﻳﻤﻲ ﺗﺮ ﺍﺯ ﺟﺪﺍﻭﻝ ﻓﻮﻕ ﺣﺬﻑ ﺗﺎ ﻓﺮﺁﻳﻨﺪ ﺟﺴﺘﺠﻮ ﻭ ﻳﺎﻓﺘﻦ ﺁﺩﺭﺱ ﻫﺎ ﺩﺭ ﻳﮏ ﺯﻣﺎﻥ ﻣﻌﻘﻮﻝ ﻭ ﺳﺮﻳﻌﺘﺮ ﺍﻧﺠﺎﻡ ﭘﺬﻳﺮﺩ .ﺑﺬﻳﻦ ﻣﻨﻈﻮﺭ ﺳﻮﺋﻴﺞ ﻫﺎ ﺍﺯ ﺭﻭﺷﻲ ﺑﺎ ﻧﺎﻡ agingﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﻳﮏ Entryﺑﺮﺍﻱ ﻳﮏ ﮔﺮﻩ
ﺩﺭ ﺟﺪﻭﻝ Lookupﺍﺿﺎﻓﻪ ﻣﻲ ﮔﺮﺩﺩ ،ﺑﻪ ﺁﻥ ﻳﮏ ﺯﻣﺎﻥ ﺧﺎﺹ ﻧﺴﺒﺖ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ .ﻫﺮ ﺯﻣﺎﻥ ﮐﻪ ﺑﺴﺘﻪ ﺍﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﮔﺮﻩ ﺩﺭﻳﺎﻓﺖ ﻣﻲ ﮔﺮﺩﺩ ،ﺯﻣﺎﻥ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻬﻨﮕﺎﻡ ﻣﻲ ﮔﺮﺩﺩ .ﺳﻮﺋﻴﭻ ﺩﺍﺭﺍﻱ ﻳﮏ ﻳﮏ ﺗﺎﻳﻤﺮ ﻗﺎﺑﻞ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺑﻮﺩﻩ ﮐﻪ ﺑﺎ ﻋﺚ ﻣﻲ ﺷﻮﺩ Entry ،ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺟﺪﻭﻝ Lookupﮐﻪ ﻣﺪﺕ ﺯﻣﺎﻥ ﺧﺎﺻﻲ
ﺍﺯ ﺁﻧﻬﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻧﺸﺪﻩ ﻭ ﻳﺎ ﺑﻪ ﺁﻧﻬﺎ ﻣﺮﺍﺟﻌﻪ ﺍﻱ ﻧﺸﺪﻩ ﺍﺳﺖ ،ﺣﺬﻑ ﮔﺮﺩﻧﺪ .ﺑﺎ ﺣﺬﻑ Entryﻫﺎﻱ ﻏﻴﺮﺿﺮﻭﺭﻱ ،ﺣﺎﻓﻈﻪ ﻗﺎﺑﻞ ﺍﺳﺘـــﻔﺎﺩﻩ ﺑﺮﺍﻱ ﺳﺎﻳﺮ Entryﻫﺎ ﺑﻴﺸـــﺘﺮ ﻣﻲ ﮔﺮﺩﺩ.
ﺩﺭ ﻣﺜﺎﻝ ﻓﻮﻕ ،ﺩﻭ ﮔﺮﻩ ﺳﮕﻤﻨﺖ Aﺭﺍ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﮔﺬﺍﺷﺘﻪ ﻭ ﺳﮕﻤﻨﺖ ﻫﺎﻱ Aﻭ Dﺑﺼﻮﺭﺕ ﻣﺴﺘﻘﻞ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﻳﺪﻩ ﺁﻝ ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﻮﺋﻴﭻ ،ﻫﺮﮔﺮﻩ ﺩﺍﺭﺍﻱ ﺳﮕﻤﻨﺖ ﺍﺧﺘﺼﺎﺻﻲ ﻣﺮﺑﻮﻁ ﺑﺨﻮﺩ ﺍﺳﺖ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺍﻣﮑﺎﻥ ﺗﺼﺎﺩﻡ ﺣﺬﻑ ﻭ ﻧﻴﺎﺯﻱ ﺑﻪ ﻋﻤﻠﻴﺎﺕ Filteringﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ.
285
ﻓﺮﺍﻭﺍﻧﻲ ﻭ ﺁﺷﻔﺘﮕﻲ ﺍﻧﺘﺸﺎﺭ
ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺎ ﺗﻮﭘﻮﻟﻮﮊﻱ ﺳﺘﺎﺭﻩ ) (Starﻭ ﻳﺎ ﺗﺮﮐﻴﺐ Busﻭ ﻭ Starﻳﮑﻲ ﺍﺯ ﻋﻨﺎﺻﺮ
ﺍﺻﻠﻲ ﺷﺒﮑﻪ ﮐﻪ ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﺎﻋﺚ ﺍﺯ ﮐﺎﺭ ﺍﻓﺘﺎﺩﻥ ﺷﺒﮑﻪ ﮔﺮﺩﺩ ،ﻫﺎﺏ ﻭ ﻳﺎ ﺳﻮﺋﻴﭻ ﺍﺳﺖ .ﻓﺮﺽ ﮐﻨﻴﺪ ﺷﺒﮑﻪ ﺍﻱ ﺑﺎ ﺳﺎﺧﺘﺎﺭ ﺯﻳﺮ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ:
ﺩﺭ ﻣﺜﺎﻝ ﻓﻮﻕ ،ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺳﻮﺋﻴﭻ Aﻭ ﻳﺎ Cﺑﺎ ﻣﺸﮑﻞ ﻣﻮﺍﺟﻪ ﮔﺮﺩﻧﺪ ،ﺗﻤﺎﻡ ﮔﺮﻩ ﻫﺎﻱ ﻣﺘﺼﻞ ﺑﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﻓﻮﻕ ﻧﻴﺰ ﺗﺤﺖ ﺗﺎﺛﻴﺮ ﺍﺷﮑﺎﻝ ﻓﻮﻕ ﻗﺮﺍﺭ ﺧﻮﺍﻫﻨﺪ ﮔﺮﻓﺖ. ﮔﺮﻩ ﻫﺎﻱ ﻣﺘﺼﻞ ﺑﻪ ﺳﻮﺋﻴﭻ ﺩﻳﮕﺮ ) (Bﮐﻤﺎﮐﻦ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﺧﻮﺩ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺩﺭ
ﺻﻮﺭﺗﻲ ﮐﻪ ﺳﻮﺋﻴﭻ Cﺑﺎ ﺍﺷﮑﺎﻝ ﻣﻮﺍﺟﻪ ﮔﺮﺩﺩ ،ﺗﻤﺎﻡ ﺷﺒﮑﻪ ﺍﺯ ﮐﺎﺭ ﺧﻮﺍﻫﺪ ﺍﻓﺘﺎﺩ .ﺩﺭ ﺻﻮﺭﺕ ﺍﺿﺎﻓﻪ ﮐﺮﺩﻥ ﺳﮕﻤﻨﺖ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﺳﻮﺋﻴﭻ Aﻭ Cﭼﻪ ﺍﺗﻔﺎﻗﻲ ﺧﻮﺍﻫﺪ ﺍﻓﺘﺎﺩ.
ﺩﺭ ﺣﺎﻟﺖ ﻓﻮﻕ ،ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻳﮑﻲ ﺍﺯ ﺳﻮﺋﻴﭻ ﻫﺎ ﺑﺎ ﺍﺷﮑﺎﻝ ﻣﻮﺍﺟﻪ ﮔﺮﺩﺩ ،ﺷﺒﮑﻪ ﮐﻤﺎﮐﻦ
ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﺧﻮﺩﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺑﺎ ﺍﻓﺰﺩﻭﻥ ﺳﮕﻤﻨﺖ ﻓﻮﻕ ،ﺷﺒﮑﻪ ﺍﺯ ﺣﺎﻟﺖ ﻭﺍﺑﺴﺘﮕﻲ ﺑﻪ ﻳﮏ ﻧﻘﻄﻪ ﺧﺎﺭﺝ ﻭ ﻳﮏ ﻧﻮﻉ " ﻓﺮﺍﻭﺍﻧﻲ" ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ.
ﺑﺎ ﺣﻞ ﻣﺸﮑﻞ ﻭﺍﺑﺴﺘﮕﻲ ﻋﻤﻠﻴﺎﺗﻲ ﺷﺒﮑﻪ ﺑﻪ ﻳﮏ ﻧﻘﻄﻪ ،ﻣﺸﮑﻞ ﺩﻳﮕﺮﻱ ﺑﻮﺟﻮﺩ ﻣﻲ ﺁﻳﺪ. ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﻗﺒﻼ" ﺍﺷﺎﺭﻩ ﮔﺮﺩﻳﺪ ،ﺳﻮﺋﻴﭻ ﻫﺎ ﺑﺼﻮﺭﺕ ﻫﻮﺷﻤﻨﺪﺍﻧﻪ ﺍﺯﺁﺩﺭﺱ ﻭ ﻣﺤﻞ ﻫﺮ ﻳﮏ ﺍﺯ ﮔﺮﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺁﮔﺎﻩ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺷﺮﺍﻳﻂ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ،ﺗﻤﺎﻡ ﺳﻮﺋﻴﺞ ﻫﺎ ﺩﺭ ﻳﮏ Loopﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ
ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺗﻮﺳﻂ ﻳﮏ ﮔﺮﻩ ،ﻣﻤﮑﻦ ﺍﺳﺖ ﺗﻮﺳﻂ ﺳﻮﺋﻴﭽﻲ ﺍﺯ ﺳﮕﻤﻨﺖ ﺩﻳﮕﺮ ﺁﻣﺪﻩ ﺑﺎﺷﺪ. 286
ﻣﺜﻼ" ﻓﺮﺽ ﻧﻤﺎﺋﻴﺪ ﮐﻪ ﮔﺮﻩ Bﺑﻪ ﺳﻮﺋﻴﭻ Aﻣﺘﺼﻞ ﻭ ﻗﺼﺪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻱ ﮔﺮﻩ B
ﻣﻮﺟﻮﺩ ﺩﺭ ﺳﮕﻤﻨﺖ Bﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ .ﺳﻮﺋﻴﭻ Aﺷﻨﺎﺧﺘﻲ ﻧﺴﺒﺖ ﺑﻪ ﮔﺮﻩ Aﻧﺪﺍﺭﺩ ،ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﮔﺮﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺳﮕﻤﻨﺖ ﻫﺎﻱ ﺩﻳﮕﺮ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺯ ﻃﺮﻳﻖ ﺳﮕﻤﻨﺖ ﻫﺎﻱ Aﻭ ﻳﺎ Cﺑﺮﺍﻱ ﺳﺎﻳﺮ ﺳﻮﺋﻴﭻ ﻫﺎ ) Bﻭ ﻳﺎ (Cﺣﺮﮐﺖ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺳﻮﺋﻴﭻ ،Bﮔﺮﻩ Bﺭﺍ ﺑﻪ ﺟﺪﻭﻝ Lookupﺧﻮﺩ ﺍﺿـــــﺎﻓﻪ ﻣﻲ ﻧﻤﺎﻳﺪ ) .ﺑﺮﺍﻱ ﺳﮕﻤﻨﺖ .(Aﺳﻮﺋﻴﭻ Cﺁﺩﺭﺱ ﮔﺮﻩ Bﺭﺍ ﺑﻪ ﻣﻨﻈﻮﺭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺳﮕﻤﻨﺖ Cﺩﺭ ﺟﺪﻭﻝ Lookupﺧﻮﺩ ﺫﺧﻴﺮﻩ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﻫﻴﭽﮑﺪﺍﻡ ﺍﺯ ﺳﻮﺋﻴﭻ ﻫﺎ ﺗﺎﮐﻨﻮﻥ ﺷﻨﺎﺧﺘﻲ ﻧﺴﺒﺖ ﺑﻪ ﺁﺩﺭﺱ ﮔﺮﻩ Aﺑﺪﺳﺖ ﻧﻴﺎﻭﺭﺩﻩ ﺍﻧﺪ ،ﺳﮕﻤﻨﺖ Bﺑﺮﺍﻱ ﭘﻴﺪﺍ ﮐﺮﺩﻥ
ﮔﺮﻩ Aﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﮔﺮﻓﺖ .ﻫﺮ ﺳﻮﺋﻴﺞ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻭ ﻣﺠﺪﺩﺍ" ﺁﻥ ﺭﺍ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﺳﮕﻤﻨﺖ ﻫﺎ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ ) .ﭼﻮﻥ ﻫﻴﭽﮑﺪﺍﻡ ﻫﻨﻮﺯ ﺩﺍﻧﺸﻲ ﻧﺴﺒﺖ ﺑﻪ ﻣﺤﻞ ﮔﺮﻩ Aﺭﺍ ﮐﺴﺐ ﻧﮑﺮﺩﻩ ﺍﻧﺪ( ﺳﻮﺋﻴﺞ Aﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺭﺳﺎﻟﻲ ﺗﻮﺳﻂ
ﻫﺮ ﻳﮏ ﺍﺯ ﺳﻮﺋﻴﭻ ﻫﺎ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻭ ﻣﺠﺪﺩﺍ" ﺁﻥ ﺭﺍ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﺳﮕﻤﻨﺖ ﻫﺎ ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﺩﺭ ﺟﻨﻴﻦ ﺷﺮﺍﻳﻄﻲ ﻳﮏ ﻧﻮﻉ " ﺁﺷﻔﺘﮕﻲ ﺍﻧﺘﺸﺎﺭ " ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ .ﺷﺮﺍﻳﻂ ﻓﻮﻕ ﺑﺎﻋﺚ ﺍﻳﺠﺎﺩ
ﻣﺸﮑﻞ ﺗﺮﺍﻓﻴﮑﻲ ﺩﺭ ﺷﺒﮑﻪ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺣﻞ ﻣﺸﮑﻞ ﻓﻮﻕ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﺑﺎ ﻧﺎﻡ Spanning treesﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ. Spanning tress ﺑﻪ ﻣﻨﻈﻮﺭﻱ ﭘﻴﺸﮕﻴﺮﻱ ﺍﺯ ﻣﺴﺌﻠﻪ " ﺁﺷﻔﺘﮕﻲ ﺍﻧﺘﺸﺎﺭ" ﻭ ﺳﺎﻳﺮ ﺍﺛﺮﺍﺕ ﺟﺎﻧﺒﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ Loopingﺷﺮﮐﺖ DECﭘﺮﻭﺗﮑﻠﻲ ﺑﺎ ﻧﺎﻡ (Spanning-tree Protocol(STPﺭﺍ ﺍﻳﺠﺎﺩ ﻧﻤﻮﺩﻩ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺑﺎ ﻣﺸﺨﺼﻪ d٨٠٢,١ﺗﻮﺳﻂ ﻣﻮﺳﺴﻪ IEEEﺍﺳﺘﺎﻧﺪﺍﺭﺩ 287
ﺷﺪﻩ ﺍﺳﺖ tree Spanning .ﺍﺯ ﺍﻟﮕﻮﺭﻳﺘﻢ (STA(Spanning-tree algoritm
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺍﻟﮕﻮﺭﻳﺘﻢ ﻓﻮﻕ ﺑﺮﺭﺳﻲ ﺧﻮﺍﻫﺪ ﮐﺮﺩ ﺁﻳﺎ ﻳﮏ ﺳﻮﺋﻴﭻ ﺩﺍﺭﺍﻱ ﺑﻴﺶ ﺍﺯ ﻳﮏ ﻣﺴﻴﺮ ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻳﮏ ﮔﺮﻩ ﺧﺎﺹ ﺍﺳﺖ .ﺩﺭ ﺻﻮﺭﺕ ﻭﺟﻮﺩ ﻣﺴﻴﺮﻫﺎﻱ ﻣﺘﻌﺪﺩ ،ﺑﻬﺘﺮﻳﻦ ﻣﺴﻴﺮ ﻧﺴﺒﺖ ﺑﻪ ﺳﺎﻳﺮ ﻣﺴﻴﺮﻫﺎ ﮐﺪﺍﻡ ﺍﺳﺖ؟ ﻧﺤﻮﻩ ﻋﻤﻠﻴﺎﺕ STPﺑﺸﺮﺡ ﺯﻳﺮ ﺍﺳﺖ: •
ﺑﻪ ﻫﺮ ﺳﻮﺋﻴﺞ ،ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﻣﺸﺨﺼﻪ ﻫﺎ ) (IDﻧﺴﺒﺖ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ .ﻳﮑﻲ ﺍﺯ ﻣﺸﺨﺼﻪ ﻫﺎ ﺑﺮﺍﻱ ﺳﻮﺋﻴﭻ ﻭ ﺳﺎﻳﺮ ﻣﺸﺨﺼﻪ ﻫﺎ ﺑﺮﺍﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻣﺸﺨﺼﻪ ﺳﻮﺋﻴﭻ (Bridge ID(BID ،ﻧﺎﻣﻴﺪﻩ ﺷﺪﻩ ﻭ ﺩﺍﺭﺍﻱ ﻫﺸﺖ
ﺑﺎﻳﺖ ﺍﺳﺖ .ﺩﻭ ﺑﺎﻳﺖ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﺍﻭﻟﻮﻳﺖ ﻭ ﺷﺶ ﺑﺎﻳﺖ ﺑﺮﺍﻱ
ﻣﺸﺨﺺ ﮐﺮﺩﻥ ﺁﺩﺭﺱ MACﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻣﺸﺨﺼﻪ ﭘﻮﺭﺕ ﻫﺎ ،ﺷﺎﻧﺰﺩﻩ ﺑﻴﺘﻲ ﺍﺳﺖ .ﺷﺶ ﺑﻴﺖ ﺑﻪ ﻣﻨﻈﻮﺭ ﺗﻨﻈﻴﻤﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻭﻟﻮﻳﺖ ﻭ ﺩﻩ ﺑﻴﺖ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﺍﺧﺘﺼﺎﺹ ﻳﮏ ﺷﻤﺎﺭﻩ ﺑﺮﺍ ﻱ ﭘﻮﺭﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺳﺖ. •
ﺑﺮﺍﻱ ﻫﺮ ﻣﺴﻴﺮ ﻳﮏ Path Costﻣﺤﺎﺳﺒﻪ ﻣﻲ ﮔﺮﺩﺩ .ﻧﺤﻮﻩ ﻣﺤﺎﺳﺒﻪ ﭘﺎﺭﺍﻣﺘﺮ ﻓﻮﻕ ﺑﺮ ﺍﺳﺎﺱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺗﻮﺳﻂ ﻣﻮﺳﺴﻪ IEEEﺍﺳﺖ .ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺤﺎﺳﺒﻪ ﻣﻘﺎﺩﺭ ﻓﻮﻕ ١,٠٠٠ ،ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ) ﻳﮏ ﮔﻴﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ( ﺭﺍ ﺑﺮ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺳﮕﻤﻨﺖ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ ﭘﻮﺭﺕ ،ﺗﻘﺴﻴﻢ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﻳﮏ ﺍﺗﺼﺎﻝ ١٠ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ،ﺩﺍﺭﺍﻱ Costﺑﻪ ﻣﻴﺰﺍﻥ ١٠٠ﺍﺳﺖ ) ١,٠٠٠ﺗﻔﺴﻴﻢ ﺑﺮ .( ١٠ﺑﻪ ﻣﻨﻈﻮﺭ ﻫﻤﺎﻫﻨﮓ ﺷﺪﻥ ﺑﺎ ﺍﻓﺰﺍﻳﺶ ﺳﺮﻋﺖ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ Costﻧﻴﺰ
ﺍﺻﻼﺡ ﻣﻲ ﮔﺮﺩﺩ .ﺟﺪﻭﻝ ﺯﻳﺮ ﻣﻘﺎﺩﻳﺮ ﺟﺪﻳﺪ STP Costﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ. ) ﻣﻘﺪﺍﺭ cost Pathﻣﻲ ﺗﻮﺍﻧﺪ ﻳﮏ ﻣﻘﺪﺍﺭ ﺩﻟﺨﻮﺍﻩ ﺑﻮﺩﻩ ﮐﻪ ﺗﻮﺳﻂ ﻣﺪﻳﺮﻳﺖ ﺷﺒﮑﻪ ﺗﻌﺮﻳﻒ ﻭ ﻣﺸﺨﺺ ﻣﻲ ﮔﺮﺩﺩ ( STP Cost Value Bandwidth 4 Mbps
250
10 Mbps
100
16 Mbps
62
288
45 Mbps
39
100 Mbps
19
155 Mbps
14
622 Mbps
6
1 Gbps
4
2 10 Gbps • ﻫﺮ ﺳﻮﺋﻴﭻ ﻓﺮﺁﻳﻨﺪﻱ ﺭﺍ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺘﺨﺎﺏ ﻣﺴﻴﺮﻫﺎﻱ ﺷﺒﮑﻪ ﮐﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺗﻮﺳﻂ ﻫﺮ ﻳﮏ ﺍﺯ ﺳﮕﻤﻨﺖ ﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ ،ﺁﻏﺎﺯ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺍﻃﻼﻋﺎﺕ ﻓﻮﻕ ﺗﻮﺳﻂ ﺳﺎﻳﺮ ﺳﻮﺋﻴﭻ ﻫﺎ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﭘﺮﻭﺗﮑﻞ ﺧﺎﺹ ﺑﺎ ﻧﺎﻡ Bridge(BPUD (protocol data unitsﺑﻪ ﺍﺷﺘﺮﺍﮎ ﮔﺬﺍﺷﺘﻪ ﻣﻲ ﺷﻮﺩ .ﺳﺎﺧﺘﺎﺭ ﻳﮏ BPUD ﺑﺸﺮﺡ ﺯﻳﺮ ﺍﺳﺖ :
. Root BIDﭘﺎﺭﺍﻣﺘﺮ ﻓﻮﻕ BIDﻣﺮﺑﻮﻁ ﺑﻪ Root Bridgeﺟﺎﺭﻱ ﺭﺍﻣﺸﺨﺺ ﻣﻲ ﮐﻨﺪ. . Path Cost to Bridge -ﻣﺴﺎﻓﺖ root bridgeﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﻣﺜﻼ" ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺩﺍﺩﻩ ﺍﺯ ﻃﺮﻳﻖ ﻃﻲ ﻧﻤﻮﺩﻥ ﺳﻪ ﺳﮕﻤﻨﺖ ﺑﺎ ﺳﺮﻋﺘﻲ ﻣﻌﺎﺩﻝ ١٠٠
ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺑﺮﺍﻱ ﺭﺳﻴﺪﻥ ﺑﻪ Root bridgeﺑﺎﺷﺪ ،ﻣﻘﺪﺍﺭ costﺑﺼﻮﺭﺕ ) (٣٨=٠+١٩+١٩ﺑﺪﺳﺖ ﻣﻲ ﺁﻳﺪ .ﺳﮕﻤﻨﺘﻲ ﮐﻪ ﺑﻪ Root Bridgeﻣﺘﺼﻞ ﺍﺳﺖ
ﺩﺍﺭﺍﻱ Costﻣﻌﺎﺩﻝ ﺻﻔﺮ ﺍﺳﺖ.
. Sender BIDﻣﺸﺨﺼﻪ BIDﺳﻮﺋﻴﭻ ﺍﺭﺳﺎﻝ ﮐﻨﻨﺪﻩ BPDUﺭﺍ ﻣﺸﺨﺺﻣﻲ ﮐﻨﺪ. . Port ID -ﭘﻮﺭﺕ ﺍﺭﺳﺎﻝ ﮐﻨﻨﺪﻩ BPDUﻣﺮﺑﻮﻁ ﺑﻪ ﺳﻮﺋﻴﭻ ﺭﺍ ﻣﺸﺨﺺ
ﻣﻲ ﻧﻤﺎﻳﺪ.
ﺗﻤﺎﻡ ﺳﻮﺋﻴﺞ ﻫﺎ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﺑﻬﺘﺮﻳﻦ ﻣﺴﻴﺮ ﺑﻴﻦ ﺳﮕﻤﻨﺖ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ، ﺑﺼﻮﺭﺕ ﭘﻴﻮﺳﺘﻪ ﺑﺮﺍﻱ ﻳﮑﺪﻳﮕﺮ BPDUﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﺳﻮﺋﻴﭽﻲ ﻳﮏ BPDU
289
ﺭﺍ )ﺍﺯ ﺳﻮﺋﻴﭻ ﺩﻳﮕﺮ( ﺩﺭﻳﺎﻓﺖ ﻣﻲ ﺩﺍﺭﺩ ﮐﻪ ﻣﻨﺎﺳﺒﺘﺮ ﺍﺯ ﺁﻥ ﭼﻴﺰﻱ ﺍﺳﺖ ﮐﻪ ﺧﻮﺩ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ
ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻫﻤﺎﻥ ﺳﮕﻤﻨﺖ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩﻩ ﺍﺳﺖ BPDU ،ﺧﻮﺩ ﺭﺍ ﻣﺘﻮﻗﻒ ) ﺑﻪ ﺳﺎﻳﺮ ﺳﮕﻤﻨﺖ ﻫﺎ ﺍﺭﺍﺳﺎﻝ ﻧﻤﻲ ﻧﻤﺎﻳﺪ ( ﻭ ﺍﺯ BPDUﺳﺎﻳﺮ ﺳﻮﺋﻴﭻ ﻫﺎ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺳﮕﻤﻨﺖ ﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﺪ ﮐﺮﺩ. •
ﻳﮏ Root bridgeﺑﺮ ﺍﺳﺎﺱ ﻓﺮﺁﻳﻨﺪﻫﺎﻱ BPDUﺑﻴﻦ ﺳﻮﺋﻴﺞ ﻫﺎ ،ﺍﻧﺘﺨﺎﺏ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺍﺑﺘﺪﺍ ﻫﺮ ﺳﻮﺋﻴﺞ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﻋﻨﻮﺍﻥ Rootﺩﺭ ﻧﻈﺮ ﻣﻲ ﮔﻴﺮﺩ .ﺯﻣﺎﻧﻴﮑﻪ ﻳﮏ ﺳﻮﺋﻴﭻ ﺑﺮﺍﻱ ﺍﻭﻟﻴﻦ ﺑﺎﺭ ﺑﻪ ﺷﺒﮑﻪ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ ،ﻳﮏ BPDUﺭﺍ ﺑﻬﻤﺮﺍﻩ BID
ﺧﻮﺩ ﮐﻪ ﺑﻪ ﻋﻨﻮﺍﻥ Root BIDﺍﺳﺖ ،ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﺳﺎﻳﺮ ﺳﻮﺋﻴﭻ ﻫﺎ
BPDUﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻣﻲ ﺩﺍﺭﻧﺪ ،ﺁﻥ ﺭﺍ ﺑﺎ BIDﻣﺮﺑﻮﻃﻪ ﺍﻱ ﮐﻪ ﺑﻪ ﻋﻨﻮﺍﻥ Root BIDﺫﺧﻴﺮﻩ ﻧﻤﻮﺩﻩ ﺍﻧﺪ ،ﻣﻘﺎﻳﺴﻪ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ Root BIDﺟﺪﻳﺪ ﺩﺍﺭﺍﻱ ﻳﮏ ﻣﻘﺪﺍﺭ ﮐﻤﺘﺮ ﺑﺎﺷﺪ ،ﺗﻤﺎﻡ ﺳﻮﺋﻴﭻ ﻫﺎ ﺁﻥ ﺭﺍ ﺑﺎ ﺁﻧﭽﻴﺰﻱ ﮐﻪ ﻗﺒﻼ" ﺫﺧﻴﺮﻩ ﮐﺮﺩﻩ ﺍﻧﺪ ،ﺟﺎﻳﮕﺰﻳﻦ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ Root BIDﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺩﺍﺭﺍﻱ ﻣﻘﺪﺍﺭ ﮐﻤﺘﺮﻱ ﺑﺎﺷﺪ ،ﻳﮏ BPDUﺑﺮﺍﻱ ﺳﻮﺋﻴﭻ ﺟﺪﻳﺪ ﺑﻬﻤﺮﺍﻩ BIDﻣﺮﺑﻮﻁ ﺑﻪ
Root BID
ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ .ﺯﻣﺎﻧﻴﮑﻪ ﺳﻮﺋﻴﭻ ﺟﺪﻳﺪ BPDUﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻣﻲ ﺩﺍﺭﺩ ،ﺍﺯ Root
ﺑﻮﺩﻥ ﺧﻮﺩ ﺻﺮﻓﻨﻈﺮ ﻭ ﻣﻘﺪﺍﺭ ﺍﺭﺳﺎﻟﻲ ﺭﺍ ﺑﻪ ﻋﻨﻮﺍﻥ Root BIDﺩﺭ ﺟﺪﻭﻝ ﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ ﺫﺧﻴﺮﻩ ﺧﻮﺍﻫﺪ ﮐﺮﺩ. •
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺤﻞ ،Root Bridgeﺳﺎﻳﺮ ﺳﻮﺋﻴﭻ ﻫﺎ ﻣﺸﺨﺺ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ ﮐﻪ ﮐﺪﺍﻣﻴﮏ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎﻱ ﺁﻧﻬﺎ ﺩﺍﺭﺍﻱ ﮐﻮﺗﺎﻫﺘﺮﻳﻦ ﻣﺴﻴﺮ ﺑﻪ Bridge Rootﺍﺳﺖ.
ﭘﻮﺭﺕ ﻫﺎﻱ ﻓﻮﻕ Root Ports ،ﻧﺎﻣﻴﺪﻩ ﺷﺪﻩ ﻭ ﻫﺮ ﺳﻮﺋﻴﺞ ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺍﺭﺍﻱ ﻳﮏ ﻧﻤﻮﻧﻪ ﺑﺎﺷﺪ. •
ﺳﻮﺋﻴﭻ ﻫﺎ ﻣﺸﺨﺺ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ ﮐﻪ ﭼﻪ ﮐﺴﻲ ﺩﺍﺭﺍﻱ ﭘﻮﺭﺕ ﻫﺎﻱ designated
ﺍﺳﺖ .ﭘﻮﺭﺕ ﻓﻮﻕ ،ﺍﺗﺼﺎﻟﻲ ﺍﺳﺖ ﮐﻪ ﺗﻮﺳﻂ ﺁﻥ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺍﻱ ﻳﮏ ﺳﮕﻤﻨﺖ ﺧﺎﺹ ﺍﺭﺳﺎﻝ ﻭ ﻳﺎ ﺍﺯ ﺁﻥ ﺩﺭﻳﺎﻓﺖ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﺑﺎ ﺩﺍﺷﺘﻦ ﺻﺮﻓﺎ" ﻳﮏ ﻧﻤﻮﻧﻪ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎﻱ ﻓﻮﻕ ،ﺗﻤﺎﻡ ﻣﺸﮑﻼﺕ ﻣﺮﺑﻮﻁ ﺑﻪ Loopingﺑﺮﻃﺮﻑ ﺧﻮﺍﻫﺪ ﺷﺪ. 290
•
ﭘﻮﺭﺕ ﻫﺎﻱ designatedﺑﺮ ﺍﺳﺎﺱ ﮐﻮﺗﺎﻫﺘﺮﺗﻦ ﻣﺴﻴﺮ ﺑﻴﻦ ﻳﮏ ﺳﮕﻤﻨﺖ ﺗﺎ root bridgeﺍﻧﺘﺨﺎﺏ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ Root bridgeﺩﺍﺭﺍﻱ ﻣﻘﺪﺍﺭ ﺻﻔﺮ
ﺑـــﺮﺍﻱ cost pathﺍﺳﺖ ،ﻫﺮ ﭘﻮﺭﺕ ﺁﻥ ﺑﻤﻨــﺰﻟﻪ ﻳﮏ ﭘﻮﺭﺕ designated ﺍﺳﺖ ) .ﻣﺸﺮﻭﻁ ﺑﻪ ﺍﺗﺼﺎﻝ ﭘﻮﺭﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﺳﺴﮕﻤﻨﺖ ( ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﺳﻮﺋﻴﭻ ﻫﺎ،
Path Costﺑﺮﺍﻱ ﻳﮏ ﺳﮕﻤﻨﺖ ﺑﺮﺭﺳﻲ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﭘﻮﺭﺗﻲ ﺩﺍﺭﺍﻱ ﭘﺎﻳﻴﻦ ﺗﺮﻳﻦ path costﺑﺎﺷﺪ ،ﭘﻮﺭﺕ ﻓﻮﻕ ﺑﻤﻨﺰﻟﻪ ﭘﻮﺭﺕ designated
ﺳﮕﻤﻨﺖ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺩﻭ ﻭ ﻳﺎ ﺑﻴﺶ ﺍﺯ ﺩﻭ ﭘﻮﺭﺕ ﺩﺍﺭﺍﻱ
ﻣﻘﺎﺩﻳﺮ ﻳﮑﺴﺎﻥ cost pathﺑﺎﺷﻨﺪ ،ﺳﻮﺋﻴﭻ ﺑﺎ ﻣﻘﺎﺩﺭ ﮐﻤﺘﺮ BIDﺍﺗﺨﺎﺏ ﻣﻲ ﮔﺮﺩﺩ. •
ﭘﺲ ﺍﺯ ﺍﻧﺘﺨﺎﺏ ﭘﻮﺭﺕ designatedﺑﺮﺍﻱ ﺳﮕﻤﻨﺖ ﺷﺒﮑﻪ ،ﺳﺎﻳﺮ ﭘﻮﺭﺕ ﻫﺎﻱ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ ﺳﮕﻤﻨﺖ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﻋﻨﻮﺍﻥ non -designated portﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎﻱ designatedﻣﻲ ﺗﻮﺍﻥ ﺑﻪ ﻳﮏ ﺳﮕﻤﻨﺖ ﻣﺘﺼﻞ ﮔﺮﺩﻳﺪ.
•
ﻫﺮ ﺳﻮﺋﻴﭻ ﺩﺍﺭﺍﻱ ﺟﺪﻭﻝ BPDUﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ ﺑﻮﺩﻩ ﮐﻪ ﺑﺼﻮﺭﺕ ﺧﻮﺩﮐﺎﺭ ﺑﻬﻨﮕﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺷﺒﮑﻪ ﺑﺼﻮﺭﺕ ﻳﮏ spanning treeﺑﻮﺩﻩ ﮐﻪ roor
bridgeﮐﻪ ﺑﻤﻨﺰﻟﻪ ﺭﻳﺸﻪ ﻭ ﺳﺎﻳﺮ ﺳﻮﺋﻴﭻ ﻫﺎ ﺑﻤﻨﺰﻟﻪ ﺑﺮﮒ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﻫﺮ ﺳﻮﺋﻴﭻ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ Root Portsﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺗﺒﺎﻁ ﺑﺎ root bridgeﺑﻮﺩﻩ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎﻱ designatedﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻫﺮ ﺳﮕﻤﻨﺖ ﺧﻮﺍﻫﺪ ﺑﻮﺩ. ﺭﻭﺗﺮﻫﺎ ﻭ ﺳﻮﺋﻴﭽﻴﻨﮓ ﻻﻳﻪ ﺳﻮﻡ
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﻗﺒﻼ" ﺍﺷﺎﺭﻩ ﮔﺮﺩﻳﺪ ،ﺍﮐﺜﺮ ﺳﻮﺋﻴﭻ ﻫﺎ ﺩﺭ ﻻﻳﻪ ﺩﻭﻡ ﻣﺪﻝ OSIﻓﻌﺎﻟﻴﺖ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ) .(Data Layerﺍﺧﻴﺮﺍ" ﺑﺮﺧﻲ ﺍﺯ ﺗﻮﻟﻴﺪﮐﻨﻨﺪﮔﺎﻥ ﺳﻮﻳﻴﭻ ،ﻣﺪﻟﻲ ﺭﺍ ﻋﺮﺿﻪ ﻧﻤﻮﺩﻩ ﺍﻧﺪ ﮐﻪ ﻗﺎﺩﺭ ﺑﻪ ﻓﻌﺎﻟﻴﺖ ﺩﺭ ﻻﻳﻪ ﺳﻮﻡ ﻣﺪﻝ OSIﺍﺳﺖ.(Network Layer) . ﺍﻳﻦ ﻧﻮﻉ ﺳﻮﺋﻴﭻ ﻫﺎ ﺩﺍﺭﺍﻱ ﺷﺒﺎﻫﺖ ﺯﻳﺎﺩﻱ ﺑﺎ ﺭﻭﺗﺮ ﻣﻲ ﺑﺎﺷﻨﺪ.
291
ﺯﻣﺎﻧﻴﮑﻪ ﺭﻭﺗﺮ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺩﺭ ﻻﻳﻪ ﺳﻮﻡ ﺑﺪﻧﺒﺎﻝ ﺁﺩﺭﺱ ﻫﺎﻱ
ﻣﺒﺪﺍﺀ ﻭ ﻣﻘﺼﺪ ﮔﺸﺘﻪ ﺗﺎ ﻣﺴﻴﺮ ﻣﺮﺑﻮﻁ ﺑﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﻣﺸﺨﺺ ﻧﻤﺎﻳﺪ .ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ MACﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺸﺨﺺ ﮐﺮﺩﻥ ﺁﺩﺭﺱ ﻣﺒﺪﺍﺀ ﻭ ﻣﻘﺼﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ).ﺍﺯ ﻃﺮﻳﻖ ﻻﻳﻪ ﺩﻭﻡ( ﻣﻬﻤﺘﺮﻳﻦ ﺗﻔﺎﻭﺕ ﺑﻴﻦ ﻳﮏ ﺭﻭﺗﺮ ﻭ ﻳﮏ ﺳﻮﺋﻴﭻ ﻻﻳﻪ ﺳﻮﻡ، ﺍﺳﺘﻔﺎﺩﻩ ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﻻﻳﻪ ﺳﻮﻡ ﺍﺯ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺑﻬﻴﻨﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺑﺎ ﺳﺮﻋﺖ
ﻣﻄﻠﻮﺏ ﻧﻈﻴﺮ ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﻻﻳﻪ ﺩﻭﻡ ﺍﺳﺖ .ﻧﺤﻮﻩ ﺗﺼﻤﻴﻢ ﮔﻴﺮﻱ ﺁﻧﻬﺎ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻣﺴﻴﺮﻳﺎﺑﻲ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻣﺸﺎﺑﻪ ﺭﻭﺗﺮ ﺍﺳﺖ .ﺩﺭ ﻳﮏ ﻣﺤﻴﻂ ﺷﺒﮑﻪ ﺍﻱ ، LANﺳﻮﺋﻴﭻ ﻫﺎﻱ ﻻﻳﻪ ﺳﻮﻡ ﻣﻌﻤﻮﻻ" ﺩﺍﺭﺍﻱ ﺳﺮﻋﺘﻲ ﺑﻴﺸﺘﺮ ﺍﺯ ﺭﻭﺗﺮ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻋﻠﺖ ﺍﻳﻦ ﺍﻣﺮ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺨﺖ
ﺍﻓﺰﺍﺭﻫﺎﻱ ﺳﻮﺋﻴﭽﻴﻨﮓ ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺳﻮﺋﻴﭻ ﻫﺎ ﺍﺳﺖ .ﺍﻏﻠﺐ ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﻻﻳﻪ ﺳﻮﻡ ﺷﺮﮐﺖ ﺳﻴﺴﮑﻮ ،ﺑﻤﻨﺰﻟﻪ ﺭﻭﺗﺮﻫﺎﺋﻲ ﻣﻲ ﺑﺎﺷﻨﺪ ﮐﻪ ﺑﻤﺮﺍﺗﺐ ﺍﺯ ﺭﻭﺗﺮ ﻫﺎ ﺳﺮﻳﻌﺘﺮ ﺑﻮﺩﻩ ) ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺍﺧﺘﺼﺎﺻﻲ ﺳﻮﺋﻴﭽﻴﻨﮓ ( ﻭ ﺩﺍﺭﺍﻱ ﻗﻴﻤﺖ ﺍﺭﺯﺍﻧﺘﺮﻱ ﻧﺴﺒﺖ ﺑﻪ ﺭﻭﺗﺮ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻧﺤﻮﻩ matching Patternﻭ cachingﺩﺭ ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﻻﻳﻪ ﺳﻮﻡ ﻣﺸﺎﺑﻪ ﻳﮏ ﺭﻭﺗﺮ ﺍﺳﺖ .ﺩﺭ ﻫﺮ ﺩﻭ ﺩﺳﺘﮕﺎﻩ ﺍﺯ ﻳﮏ ﭘﺮﻭﺗﮑﻞ ﺭﻭﺗﻴﻨﮓ ﻭ ﺟﺪﻭﻝ ﺭﻭﺗﻴﻨﮓ ،ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﺑﻬﺘﺮﻳﻦ ﻣﺴﻴﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﻻﻳﻪ ﺳﻮﻡ ﻗﺎﺩﺭ ﺑﻪ
ﺑﺮﻧﺎﻣﻪ ﺭﻳﺰﻱ ﻣﺠﺪﺩ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﺑﺼﻮﺭﺕ ﭘﻮﻳﺎ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺭﻭﺗﻴﻨﮓ ﻻﻳﻪ ﺳﻮﻡ ﻣﻲ ﺑﺎﺷﻨﺪ ﻭ ﻫﻤﻴﻦ ﺍﻣﺮ ﺑﺎﻋﺚ ﺳﺮﻋﺖ ﺑﺎﻻﻱ ﭘﺮﺩﺍﺯﺵ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻣﻲ ﮔﺮﺩﺩ .ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﻻﻳﻪ ﺳﻮﻡ ،ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺩﺭﻳﺎﻓﺖ ﺷﺪﻩ ﺗﻮﺳﻂ ﭘﺮﻭﺗﮑﻞ ﺭﻭﺗﻴﻨﮓ ﺑﻪ ﻣﻨﻈﻮﺭ ﺑﻬﻨﮕﺎﻡ ﺳﺎﺯﻱ ﺟﺪﺍﻭﻝ ﻣﺮﺑﻮﻁ ﺑﻪ Cachingﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﻣﻼﺣﻈﻪ ﮔﺮﺩﻳﺪ ،ﺩﺭ ﻃﺮﺍﺣﻲ ﺳﻮﺋﻴﭻ ﻫﺎﻱ LANﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻧﻮﻉ ﺳﻮﺋﻴﭻ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ،ﺗﺎﺛﻴﺮ ﻣﺴﺘﻘﻴﻢ ﺑﺮ ﺳﺮﻋﺖ ﻭ ﮐﻴﻔﻴﺖ ﻳﮏ ﺷﺒﮑﻪ ﺭﺍ ﺑﺪﻧﺒﺎﻝ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ.
292
ﻣﻔﻬﻮﻡ ﺭﻭﺗﻴﻨﮓ ﺭﻭﺗﻴﻨﮓ ) ( Routingﻳﮑﻲ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ
ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﺎﻳﺮ ﺷﺒﮑﻪ ﻫﺎ ﺍﺳﺖ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﻣﮑﺎﻥ ﺭﻭﺗﻴﻨﮓ ﭘﺮﻭﺗﮑﻞ ﻫﺎ ﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ ،ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻗﺎﺩﺭ ﺑﻪ ﻣﺒﺎﺩﻟﻪ ﺩﺍﺩﻩ ﻧﺨﻮﺍﻫﻨﺪ ﺑﻮﺩ. ﺗﻌﺮﻳﻒ
ﺍﺯ ﺭﻭﺗﻴﻨﮓ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺭﻳﺎﻓﺖ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ) ( packetﺍﺯ ﻳﮏ ﺩﺳﺘﮕﺎﻩ ﻭ
ﺍﺭﺳﺎﻝ ﺁﻥ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﮑﻪ ﺑﺮﺍﻱ ﺩﺳﺘﮕﺎﻫﻲ ﺩﻳﮕﺮ ﻭ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﺍﻱ ﻣﺘﻔﺎﻭﺕ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺷﺒﮑﻪ ﺷﻤﺎ ﺩﺍﺭﺍﻱ ﺭﻭﺗﺮ ﻧﺒﺎﺷﺪ ،ﺍﻣﮑﺎﻥ ﺭﻭﺗﻴﻨﮓ ﺩﺍﺩﻩ ﺑﻴﻦ ﺷﺒﮑﻪ ﺷﻤﺎ ﻭ ﺳﺎﻳﺮ ﺷﺒﮑﻪ ﻫﺎ ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﻳﮏ ﺭﻭﺗﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺴﻴﺮﻳﺎﺑﻲ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ، ﻣﻲ ﺑﺎﻳﺴﺖ ﺁﮔﺎﻫﻲ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺍﻃﻼﻋﺎﺕ ﺯﻳﺮ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ:
• •
ﺁﺩﺭﺱ ﻣﻘﺼﺪ ﺭﻭﺗﺮﻫﺎﻱ ﻣﺠﺎﻭﺭ ﮐﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﺎﻥ ﺍﻣﮑﺎﻥ ﺍﺧﺬ ﺍﻃﻼﻋﺎﺕ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ،ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ .
•
ﻣﺴﻴﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﻪ ﺗﻤﺎﻣﻲ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ
•
ﺑﻬﺘﺮﻳﻦ ﻣﺴﻴﺮ ﺑﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ
•
ﻧﺤﻮﻩ ﻧﮕﻬﺪﺍﺭﻱ ﻭ ﺑﺮﺭﺳﻲ ﺍﻃﻼﻋﺎﺕ ﺭﻭﺗﻴﻨﮓ
ﻫﻤﮕﺮﺍﺋﻲ ) ( Convergence
ﻓﺮﺁﻳﻨﺪ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺑﺮﺍﻱ ﺗﻤﺎﻣﻲ ﺭﻭﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺑﻬﻨﮕﺎﻡ
ﺳﺎﺯﻱ ﺟﺪﺍﻭﻝ ﺭﻭﺗﻴﻨﮓ ﻭ ﺍﻳﺠﺎﺩ ﻳﮏ ﻧﮕﺮﺵ ﺳﺎﺯﮔﺎﺭ ﺍﺯ ﺷﺒﮑﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺭ ﺑﻬﺘﺮﻳﻦ ﻣﺴﻴﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ .ﺩﺭ ﺯﻣﺎﻥ ﺍﻧﺠﺎﻡ ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ )ﻫﻤﮕﺮﺍﺋﻲ( ،ﺩﺍﺩﻩ ﮐﺎﺭﺑﺮ ﺍﺭﺳﺎﻝ ﻧﺨﻮﺍﻫﺪ ﺷﺪ.
293
ﻣﺴﻴﺮ ﭘﻴﺶ ﻓﺮﺽ ) ( Default Route
ﻳﮏ ﻣﺴﻴﺮ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺩﺭﺝ ﺷﺪﻩ ﺩﺭ ﺟﺪﻭﻝ ﺭﻭﺗﻴﻨﮓ ﮐﻪ ﺑﻪ ﻋﻨﻮﺍﻥ ﺍﻭﻟﻴﻦ ﮔﺰﻳﻨﻪ ﺩﺭ ﻧﻈﺮ
ﮔﺮﻓﺘﻪ ﻣﻲ ﺷﻮﺩ .ﻫﺮ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﮐﻪ ﺗﻮﺳﻂ ﻳﮏ ﺩﺳﺘﮕﺎﻩ ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﻪ ﻣﺴﻴﺮ ﭘﻴﺶ ﻓﺮﺽ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻣﺴﻴﺮ ﻓﻮﻕ ﻣﺸﮑﻞ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ،ﻳﮏ ﻣﺴﻴﺮ ﺩﻳﮕﺮ ﺍﻧﺘﺨﺎﺏ ﻣﻲ ﮔﺮﺩﺩ. ﻣﺴﻴﺮ ﺍﻳﺴﺘﺎ ) ( Static Route
ﻳﮏ ﻣﺴﻴﺮ ﺩﺍﺋﻢ ﮐﻪ ﺑﻪ ﺻﻮﺭﺕ ﺩﺳﺘﻲ ﺩﺭﻭﻥ ﻳﮏ ﺟﺪﻭﻝ ﺭﻭﺗﻴﻨﮓ ﺩﺭﺝ ﻣﻲ ﮔﺮﺩﺩ .ﻣﺴﻴﺮ
ﻓﻮﻕ ﺣﺘﻲ ﺩﺭ ﻣﻮﺍﺭﺩﻳﮑﻪ ﺍﺭﺗﺒﺎﻁ ﻏﻴﺮ ﻓﻌﺎﻝ ﺍﺳﺖ ﺩﺭ ﺟﺪﻭﻝ ﺭﻭﺗﻴﻨﮓ ﺑﺎﻗﻲ ﻣﺎﻧﺪﻩ ﻭ ﺻﺮﻓﺎ" ﺑﻪ
ﺻﻮﺭﺕ ﺩﺳﺘﻲ ﺣﺬﻑ ﻣﻲ ﮔﺮﺩﺩ.
ﻣﺴﻴﺮ ﭘﻮﻳﺎ ) ( Dynamic Route
ﻳﮏ ﻣﺴﻴﺮ ﮐﻪ ﺑﻪ ﺻﻮﺭﺕ ﭘﻮﻳﺎ ) ﺍﺗﻮﻣﺎﺗﻴﮏ ( ﻭ ﻣﺘﻨﺎﺳﺐ ﺑﺎ ﺗﻐﻴﻴﺮﺍﺕ ﺷﺒﮑﻪ ،ﺑﻬﻨﮕﺎﻡ
ﻣﻲ ﮔﺮﺩﺩ .ﻣﺴﻴﺮﻫﺎﻱ ﭘﻮﻳﺎ ﻧﻘﻄﻪ ﻣﻘﺎﺑﻞ ﻣﺴﻴﺮﻫﺎﻱ ﺍﻳﺴﺘﺎ ﻣﻲ ﺑﺎﺷﻨﺪ.
294
ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺭﻭﺗﻴﻨﮓ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺭﻭﺗﻴﻨﮓ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺭﻭﺗﺮﻫﺎ ،ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﻧﺪ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ
ﻓﻮﻕ ،ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺍﻧﺪ ﮐﻪ ﺍﻣﮑﺎﻥ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺟﺪﺍﻭﻝ ﺭﻭﺗﻴﻨﮓ ﺑﻴﻦ ﺭﻭﺗﺮﻫﺎ ﺭﺍ ﻓﺮﺍﻫﻢ ﻧﻤﺎﻳﺪ .ﺗﺎﮐﻨﻮﻥ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﺋﻲ ﺑﺎ ﺍﺑﻌﺎﺩ ﮔﻮﻧﺎﮔﻮﻥ ،ﻃﺮﺍﺣﻲ ﻭ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺷﺪﻩ ﺍﺳﺖ. ﺩﻭ ﻧﻮﻉ ﻋﻤﺪﻩ ﺭﻭﺗﻴﻨﮓ :ﭘﻮﻳﺎ ﻭ ﺍﻳﺴﺘﺎ
ﺭﻭﺗﺮ ،ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺗﺮﻫﺎﻱ ﻣﺠﺎﻭﺭ ) ﻫﻤﺴﺎﻳﻪ( ﻭ ﻳﺎ ﺗﻮﺳﻂ ﻣﺪﻳﺮ ﺷﺒﮑﻪ ،ﺁﮔﺎﻫﻲ ﻻﺯﻡ
ﺩﺭ ﺧﺼﻮﺹ ﺷﺒﮑﻪ ﻫﺎﻱ ﺭﺍﻩ ﺩﻭﺭ ﺭﺍ ﭘﻴﺪﺍ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺭﻭﺗﺮ ﺩﺭ ﺍﺩﺍﻣﻪ ،ﻳﮏ ﺟﺪﻭﻝ ﺭﻭﺗﻴﻨﮓ ﺭﺍ
ﺍﻳﺠﺎﺩ ﮐﻪ ﻣﺴﺌﻮﻟﻴﺖ ﺁﻥ ﺗﺸﺮﻳﺢ ﻧﺤﻮﻩ ﻳﺎﻓﺘﻦ ﺷﺒﮑﻪ ﻫﺎﻱ ﺭﺍﻩ ﺩﻭﺭ ﺍﺳﺖ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺷﺒﮑﻪ ﻣﺴﺘﻘﻴﻤﺎ" ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﺎﺷﺪ ،ﺭﻭﺗﺮ ﺩﺭ ﺧﺼﻮﺹ ﺷﺒﮑﻪ ،ﻣﺸﮑﻞ ﺧﺎﺻﻲ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺷﺒﮑﻪ ﻫﺎ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻧﻤﻲ ﺑﺎﺷﻨﺪ ،ﺭﻭﺗﺮ ﻣﻲ ﺑﺎﻳﺴﺖ ﺁﮔﺎﻫﻲ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺷﺒﮑﻪ ﻫﺎﻱ ﺭﺍﻩ ﺩﻭﺭ ﺭﺍ ﭘﻴﺪﺍ ﻧﻤﺎﻳﺪ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﺍﺯ ﺭﻭﺗﻴﻨﮓ ﺍﻳﺴﺘﺎ )ﺩﺭﺝ ﺩﺳﺘﻲ
ﻣﺴﻴﺮﻫﺎ ﺩﺭ ﺟﺪﻭﻝ ﺭﻭﺗﻴﻨﮓ ﺗﻮﺳﻂ ﻣﺪﻳﺮ ﺷﺒﮑﻪ( ﻭ ﻳﺎ ﺭﻭﺗﻴﻨﮓ ﭘﻮﻳﺎ )ﺩﺭﺝ ﺍﺗﻮﻣﺎﺗﻴﮏ ﻣﺴﻴـﺮﻫﺎ ﺩﺭ ﺟﺪﻭﻝ ﺭﻭﺗﻴــﻨﮓ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗــﮑﻞ ﻫﺎﻱ ﺭﻭﺗﻴﻨﮓ( ،ﺍﺳﺘــﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ. ﺭﻭﺗﺮﻫﺎ ﺩﺭ ﺍﺩﺍﻣﻪ ﺍﻗﺪﺍﻡ ﺑﻪ ﺑﻬﻨﮕﺎﻡ ﺳﺎﺯﻱ ﺍﻃﻼﻋﺎﺕ ﺧﻮﺩ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺗﻤﺎﻣﻲ ﺷﺒﮑﻪ ﻫﺎﺋﻲ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ ﮐﻪ ﻧﺴﺒﺖ ﺑﻪ ﺁﻧﺎﻥ ﺁﮔﺎﻫﻲ ﻻﺯﻡ ﺭﺍ ﭘﻴﺪﺍ ﻧﻤﻮﺩﻩ ﺍﻧﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺗﻐﻴﻴﺮﻱ ﺍﻳﺠﺎﺩ ﮔﺮﺩﺩ )ﻣﺜﻼ" ﻳﮏ ﺭﻭﺗﺮ ﺑﺎ ﻣﺸﮑﻞ ﻣﻮﺍﺟﻪ ﺷﺪﻩ ﻭ ﻋﻤﻼ" ﻗﺎﺩﺭ ﺑﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻲ ﻧﺒﺎﺷﺪ(، ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺭﻭﺗﻴﻨﮓ ﭘﻮﻳﺎ ،ﺑﻪ ﺻﻮﺭﺕ ﺍﺗﻮﻣﺎﺗﻴﮏ ﺑﻪ ﺗﻤﺎﻣﻲ ﺭﻭﺗﺮﻫﺎ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺭﺍ ﺍﻃﻼﻉ
ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ .ﺩﺭ ﺻﻮﺭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺗﻴﻨﮓ ﺍﻳﺴﺘﺎ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﻣﺪﻳﺮ ﺷﺒﮑﻪ ﺗﻐﻴﻴﺮﺍﺕ ﻻﺯﻡ ﺭﺍ
ﺩﺭ ﺗﻤﺎﻣﻲ ﺭﻭﺗﺮﻫﺎ ،ﺍﻋﻤﺎﻝ ﻧﻤﺎﻳﺪ ) ﻋﺪﻡ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺭﻭﺗﻴﻨﮓ(.
295
ﺩﺭ ﺭﻭﺗﻴﻨﮓ ﭘﻮﻳﺎ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺭﻭﺗﻴﻨﮓ ﺑﻪ ﻣﻨﻈﻮﺭ ﻧﻴﻞ ﺑﻪ ﺍﻫﺪﺍﻑ ﺯﻳﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ. •
ﺗﺸﺨﻴﺺ ﻭ ﻧﮕﻬﺪﺍﺭﻱ ﭘﻮﻳﺎﻱ ﺭﻭﺗﺮﻫﺎ
•
ﻣﺤﺎﺳﺒﻪ ﻣﺴﻴﺮﻫﺎ
•
ﺗﻮﺯﻳﻊ ﺍﻃﻼﻋﺎﺕ ﺑﻬﻨﮕﺎﻡ ﺷﺪﻩ ﺭﻭﺗﻴﻨﮓ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﺭﻭﺗﺮﻫﺎ
•
ﺣﺼﻮﻝ ﺗﻮﺍﻓﻖ ﺑﺎ ﺳﺎﻳﺮ ﺭﻭﺗﺮﻫﺎ ﺩﺭ ﺧﺼﻮﺹ ﺗﻮﭘﻮﻟﻮﮊﻱ ﺷﺒﮑﻪ
ﺩﺭ ﺻﻮﺭﺕ ﺑﺮﻧﺎﻣﻪ ﺭﻳﺰﻱ ﺍﻳﺴﺘﺎﻱ ﺭﻭﺗﺮﻫﺎ ،ﺍﻣﮑﺎﻥ ﻳﺎﻓﺘﻦ ﺭﻭﺗﺮﻫﺎ ﻭ ﻳﺎ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﺭﻭﺗﺮﻫﺎ ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﺁﻧﺎﻥ ﺩﺍﺩﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺑﺮ ﺭﻭﻱ ﺭﻭﺗﺮﻫﺎﺋﻲ ﮐﻪ ﺗﻮﺳﻂ
ﻣﺪﻳﺮ ﺷﺒﮑﻪ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺍﺳﺖ ،ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﻨﺪ. ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺭﻭﺗﻴﻨﮓ ﭘﻮﻳﺎ
ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﺍﺯ ﺳﻪ ﻧﻮﻉ) ﮔﺮﻭﻩ( ﭘﺮﻭﺗﮑﻞ ﺭﻭﺗﻴﻨﮓ ﭘﻮﻳﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺗﻔﺎﻭﺕ
ﻋﻤﺪﻩ ﺑﻴﻦ ﺁﻧﺎﻥ ،ﺭﻭﺵ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺑﻪ ﻣﻨﻈﻮﺭ ﻳﺎﻓﺘﻦ ﺭﻭﺗﺮﻫﺎ ﻭ ﻣﺤﺎﺳﺒﺎﺕ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﻣﺴﻴﺮﻳﺎﺑﻲ ﺁﻧﺎﻥ ﺍﺳﺖ. •
: Distance Vectorﺍﻳﻦ ﻧﻮﻉ ﺭﻭﺗﺮﻫﺎ ﺑﻬﺘﺮﻳﻦ ﻣﺴﻴﺮ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺍﻃﻼﻋﺎﺕ
ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺗﻮﺳﻂ ﺳﺎﻳﺮ ﺭﻭﺗﺮﻫﺎﻱ ﻣﺠﺎﻭﺭ ،ﻣﺤﺎﺳﺒﻪ ﻣﻲ ﻧﻤﺎﻳﻨﺪ. •
: Link stateﺍﻳﻦ ﻧﻮﻉ ﺭﻭﺗﺮﻫﺎ ﻫﺮ ﻳﮏ ﺩﺍﺭﺍﻱ ﻧﺴﺨﻪ ﺍﻱ ﺍﺯ ﺗﻤﺎﻣﻲ ﻣﭗ ﺷﺒﮑﻪ ﺑﻮﺩﻩ ﻭ ﺑﻬﺘﺮﻳﻦ ﻣﺴﻴﺮ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﻣﺤﺎﺳﺒﻪ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
•
: Hybridﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺭﻭﺗﻴﻨﮓ Hybridﺣﺪ ﻓﺎﺻﻞ ﺑﻴﻦ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺭﻭﺗﻴﻨﮓ state Linkﻭ Distance Vectorﻣﻲ ﺑﺎﺷﻨﺪ.
296
ﻓﺮﺁﻳﻨﺪ ﺭﻭﺗﻴﻨﮓ ﺭﻭﺗﻴﻨﮓ ) ( Routingﻳﮑﻲ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﭘﺘﺎﻧﺴﻴﻞ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ
ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﺎﻳﺮ ﺷﺒﮑﻪ ﻫﺎ ﺍﺳﺖ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﻣﮑﺎﻥ ﺭﻭﺗﻴﻨﮓ ﭘﺮﻭﺗﮑﻞ ﻫﺎ ﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ ،ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻗﺎﺩﺭ ﺑﻪ ﻣﺒﺎﺩﻟﻪ ﺩﺍﺩﻩ ﻧﺨﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻋﻼﻗﻪ ﻣﻨﺪﺍﻧﻲ ﮐﻪ ﺟﺪﻳﺪﺍ" ﺑﻪ ﺩﻧﻴﺎﻱ ﮔﺴﺘﺮﺩﻩ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﭘﻴﻮﺳﺘﻪ ﺍﻧﺪ ،ﻓﮑﺮ ﻣﻲ ﮐﻨﻨﺪ ﮐﻪ ﺑﻪ ﻣﻨﻈﻮﺭ
ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻳﮏ ﻣﺎﺷﻴﻦ ﺻﺮﻓﺎ" ﺑﻪ ﺁﺩﺭﺱ IPﺁﻥ ﻧﻴﺎﺯ ﺍﺳﺖ .ﺑﺎ ﻣﻄﺎﻟﻌﻪ ﺍﻳﻦ ﻣﻄﻠﺐ ﻣﺸﺨﺺ
ﺧﻮﺍﻫﺪ ﺷﺪ ﮐﻪ ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮﻱ ﻧﻴﺎﺯ ﻣﻲ ﺑﺎﺷﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺁﺷﻨﺎﺋﻲ ﺑﺎ ﻓﺮﺁﻳﻨﺪ ﺭﻭﺗﻴﻨﮓ ،ﻳﮏ ﻧﻤﻮﻧﻪ ﻣﺜﺎﻝ ﺭﺍ ﻣﺮﺣﻠﻪ ﺑﻪ ﻣﺮﺣﻠﻪ ﺩﻧﺒﺎﻝ ﻧﻤﻮﺩﻩ ﺗﺎ ﺑﺎ ﻓﺮﺁﻳﻨﺪ ﺭﻭﺗﻴﻨﮓ ﺍﻃﻼﻋﺎﺕ ،ﺑﻴﺸﺘﺮ ﺁﺷﻨﺎ ﺷﻮﻳﻢ.
ﻣﺜﺎﻝ :ﺑﺮﺭﺭﺳﻲ ﻓﺮﺁﻳﻨﺪ ﺭﻭﺗﻴﻨﮓ ﺩﺭ ﺩﻭ ﺷﺒﮑﻪ LAN
ﺩﻭ ﺷﺒﮑﻪ ﻓﺮﺿﻲ Aﻭ Bﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﺭﻭﺗﺮ ) ﺭﻭﺗﺮ ( Aﮐﻪ ﺩﺍﺭﺍﻱ ﺩﻭ ﺍﻳﻨﺘﺮﻓﻴﺲ ٠Eﻭ ١E
ﻣﻲ ﺑﺎﺷﺪ ،ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﺷﺪﻩ ﺍﻧﺪ .ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻓﻮﻕ ،ﻣﺸﺎﺑﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﮐﺎﺭﺕ ﻫﺎﻱ ﺷﺒﮑﻪ ﺑﻮﺩﻩ ﮐﻪ ﺩﺭﻭﻥ ﺭﻭﺗﺮ ﺗﻌﺒﻴﻪ ﺷﺪﻩ ﺍﻧﺪ ) .( RJ-45ﮐﺎﻣﭙﻴــﻮﺗﺮ A )ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ، ( Aﻗﺼﺪ ﺑﺮﻗﺮﺍﺭﻱ ﻳﮏ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﮐﺎﻣﭙﻴﻮﺗﺮ ) Bﻣـﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ
ﺷﺒﮑﻪ (Bﺭﺍ ﺩﺍﺭﺩ.
297
ﻣﺮﺣﻠﻪ ﻳﮏ :ﮐﺎﻣﭙﻴﻮﺗﺮ)ﻣﻴﺰﺑﺎﻥ( Aﺍﺯ ﻃﺮﻳﻖ ﺧﻂ ﺩﺳﺘﻮﺭ ،ﻓﺮﻣﺎﻥ ping 200.200.200.5ﺭﺍ
ﺗﺎﻳﭗ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﻣﺮﺣﻠﻪ ﺩﻭﻡ :ﭘﺮﻭﺗﮑﻞ IPﺑﺎ ﭘﺮﻭﺗﮑﻞ ) ARPﺍﻗﺘﺒﺎﺱ ﺷﺪﻩ ﺍﺯ ﮐﻠﻤﺎﺕ Address
( protocol Resolutionﮐﺎﺭ ﻧﻤﻮﺩﻩ ﺗﺎ ﻣﺸﺨﺺ ﮔﺮﺩﺩ ﮐﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻓﻮﻕ ﻋﺎﺯﻡ
ﭼﻪ ﺷﺒﮑﻪ ﺍﻱ ﺍﺳﺖ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﺁﺩﺭﺱ IPﻭ Subnet Maskﮐﺎﻣﭙﻴﻮﺗﺮ Aﺑﺮﺭﺳﻲ
ﻣﻲ ﮔﺮﺩﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﮐﻪ ﺩﺭﺧﻮﺍﺳﺖ ﻓﻮﻕ ﺑﺮﺍﻱ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺭﺍﻩ ﺩﻭﺭ ﻣﻲ ﺑﺎﺷـــﺪ، ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺍﻱ ﺭﻭﺗﺮ ) Gatewayﺷﺒﮑﻪ ( Aﺍﺭﺳﺎﻝ ﺗﺎ ﻭﻱ ﺑﺘﻮﺍﻧﺪ ﺁﻥ ﺭﺍ ﺑﻪ ﺷﺒﮑﻪ ﻣﻮﺭﺩ ﻧﻈﺮ ﻫﺪﺍﻳﺖ ﻧﻤﺎﻳﺪ ) ﺩﺭ ﺍﻳﻦ ﻣﻮﺭﺩ ﺧﺎﺹ ﺷﺒﮑﻪ .( B
ﻣﺮﺣﻠﻪ ﺳﻮﻡ :ﮐﺎﻣﭙﻴﻮﺗﺮ Aﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺍﻱ ﺭﻭﺗﺮ ،ﻧﻴﺎﺯﻣﻨﺪ ﺁﮔﺎﻫﻲ ﺍﺯ
ﺁﺩﺭﺱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺭﻭﺗﺮ ﺍﺳﺖ ﮐﻪ ﺑﻪ ﺷﺒﮑﻪ Aﻣﺘﺼﻞ ﺷﺪﻩ ﺍﺳﺖ ).ﻣﻨﻈﻮﺭ ﺁﺩﺭﺱ MACﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ E0ﺍﺳﺖ ﮐﻪ ﺷﺒﮑﻪ Aﺍﺯ ﻃﺮﻳﻖ ﺁﻥ ﺑﻪ ﺭﻭﺗﺮ ﻣﺘﺼﻞ ﺷﺪﻩ
ﺍﺳﺖ ( .ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺭﻳﺎﻓﺖ ﺁﺩﺭﺱ ،MACﮐﺎﻣﭙﻴﻮﺗﺮ Aﻣﺤﺘﻮﻳﺎﺕ ARP cacheﺧﻮﺩ ﺭﺍ
ﺑﺮﺭﺳﻲ ﻣﻲ ﻧﻤﺎﻳﺪ ،Cache ARP .ﻣﺤﻠﻲ ﺍﺯ ﺣﺎﻓﻈﻪ ﺍﺳﺖ ﮐﻪ ﺁﺩﺭﺱ ﻫﺎﻱ MACﺑﺮﺍﻱ ﭼﻨﺪﻳﻦ ﺛﺎﻧﻴﻪ ﺩﺭ ﺁﻧﺠﺎ ﺫﺧﻴﺮﻩ ﻣﻲ ﮔﺮﺩﻧﺪ.
ﻣﺮﺣﻠﻪ ﭼﻬﺎﺭﻡ :ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺁﺩﺭﺱ MACﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺭﻭﺗﺮ ﮐﻪ ﺑﻪ ﺷﺒﮑﻪ A ﻣﺘﺼﻞ ﺷﺪﻩ ﺍﺳﺖ ﺩﺭ ARP Cacheﮐﺎﻣﭙﻴﻮﺗﺮ Aﭘﻴﺪﺍ ﻧﺸﻮﺩ ،ﻧﺸﺎﻧﺪ ﻫﻨﺪﻩ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺍﺳﺖ ﮐﻪ ﻣﺪﺕ ﺯﻣﺎﻥ ﺯﻳﺎﺩﻱ ﺍﺯ ﺍﺭﺗﺒﺎﻁ ﻭﻱ ﺑﺎ ﺭﻭﺗﺮ ﮔﺬﺷﺘﻪ ﻭ ﻳﺎ ﻭﻱ ﻗﺎﺩﺭ ﺑﻪ ﻳﺎﻓﺘﻦ ﺁﺩﺭﺱ
MACﻣﺮﺑﻮﻁ ﺑﻪ ﺭﻭﺗﺮ ) ﺍﻳﻨﺘﺮﻓﻴﺴﻲ ﮐﻪ ﺑﻪ ﺷﺒﮑﻪ Aﻣﺘﺼﻞ ﺷﺪﻩ ﺍﺳﺖ ( ﻧﻤﻲ ﺑﺎﺷﺪ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻭﺿﻌﻴﺖ ﻓﻮﻕ ،ﮐﺎﻣﭙﻴﻮﺗﺮ Aﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﻳﮏ ARP broadcastﻣﻲ ﻧﻤﺎﻳﺪ .ﭘﻴﺎﻡ ﺍﺭﺳﺎﻟﻲ ﺩﺭ ﭘﻲ ﻳﺎﻓﺘﻦ ﭘﺎﺳﺨﻲ ﻣﻨﺎﺳﺐ ﺑﺪﻳﻦ ﺳﻮﺍﻝ ﺍﺳﺖ ﮐﻪ " :ﺁﺩﺭﺱ MACﻣﺮﺑﻮﻁ ﺑﻪ
IP:192.168.0.1ﭼﻴﺴﺖ ؟" .ﭘﺲ ﺍﺯ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ،broadcastﺭﻭﺗﺮ ﺗﺸﺨﻴﺺ
ﻣﻲ ﺩﻫﺪ ﮐﻪ ﺁﺩﺭﺱ IPﻣﺮﺑﻮﻁ ﺑﻪ ﻭﻱ ﺑﻮﺩﻩ ﻭ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﺩﺭﺧﻮﺍﺳﺖ ﻓﻮﻕ ،ﭘﺎﺳﺦ ﺩﻫﺪ. ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ،ﺭﻭﺗﺮ ﺑﺎ ﺍﺭﺳﺎﻝ ﺁﺩﺭﺱ MACﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ ، E0ﭘﺎﺳﺦ ﻻﺯﻡ ﺭﺍ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ Aﺧﻮﺍﻫﺪ ﺩﺍﺩ. 298
ﻳﮑﻲ ﺍﺯ ﺩﻻﻳﻠﻲ ﮐﻪ ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﻗﻊ ﺩﺳﺘﻮﺭ Pingﺩﺭ ﺍﻭﻟﻴﻦ ﻣﺮﺗﺒﻪ ﺑﺎ Time out
ﻣﻮﺍﺟﻪ ﻣﻲ ﺷﻮﺩ ﺑﻪ ﻣﻮﺿﻮﻉ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﺑﺮﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ﻣﺪﺕ ﺯﻣﺎﻥ ﺯﻳﺎﺩﻱ ﻃﻮﻝ ﺧﻮﺍﻫﺪ ﮐﺸﻴﺪ ﮐﻪ ﻳﮏ ARPﺍﺭﺳﺎﻝ ﻭ ﻣﺎﺷﻴﻦ ﻣﺮﺑﻮﻃﻪ ﺑﺎ ﺍﺭﺳﺎﻝ ﺁﺩﺭﺱ MACﺧﻮﺩ ﺑﻪ ﺁﻥ ﭘﺎﺳﺦ ﺩﻫﺪ ) TTL:Time To Liveﺍﻭﻟﻴﻦ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ Pingﺑﻪ ﺳﺮ ﺁﻣﺪﻩ ﻭ ﭘﻴﺎﻡ Time outﺭﺍ ﺧﻮﺍﻫﻴﻢ ﺩﺍﺷﺖ (.
ﻣﺮﺣﻠﻪ ﭘﻨﺠﻢ :ﺭﻭﺗﺮ ﺑﺎ ﺍﺭﺳﺎﻝ ﺁﺩﺭﺱ IP:192.168.0.1ﮐﻪ ﺑﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ E0ﺁﻥ ﻧﺴﺒﺖ
ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳﺖ ،ﭘﺎﺳﺦ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ،ﮐﺎﻣﭙﻴﻮﺗﺮ Aﺗﻤﺎﻣﻲ ﺍﻃﻼﻋﺎﺕ
ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﺧﺎﺭﺝ ﺍﺯ ﺷﻴﮑﻪ ﻭ ﺑﺮﺍﻱ ﺭﻭﺗﺮ ﺭﺍ ﺩﺍﺭﺍ ﻣﻲ ﺑﺎﺷﺪ .ﻻﻳﻪ ﺷﺒﮑﻪ ﺑﻪ ﻻﻳﻪ DataLinkﮐﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺗﻮﺳﻂ ) Pingﻳﮏ ICMP ( echo requestﺗﻮﻟﻴﺪ ﻧﻤﻮﺩﻩ ﺍﺳﺖ ،ﺑﻪ ﻫﻤﺮﺍﻩ ﺁﺩﺭﺱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﺭﻭﺗﺮ ،ﺍﺷﺎﺭﻩ ﻣﻲ
ﻧﻤﺎﻳﺪ .ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺷﺎﻣﻞ ﺁﺩﺭﺱ ﻫﺎﻱ IPﻣﺒﺪﺍﺀ ﻭ ﻣﻘﺼﺪ ﺑﻪ ﻫﻤﺮﺍﻩ ICMP echo ﺍﺳﺖ ﮐﻪ ﺩﺭ ﻻﻳﻪ ﺷﺒﮑﻪ ﻣﺸﺨﺺ ﺷﺪﻩ ﺍﺳﺖ.
ﻣﺮﺣﻠﻪ ﺷﺸﻢ :ﻻﻳﻪ DataLinkﻣﺮﺑﻮﻁ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ، Aﻳﮏ ﻓﺮﻳﻢ ﺭﺍ ﺗﻮﻟﻴﺪ ﮐﻪ ﻳﮏ ﺑﺴﺘﻪ
ﺍﻃﻼﻋﺎﺗﻲ ﮐﭙﺴﻮﻟﻪ ﺷﺪﻩ ﺑﻪ ﻫﻤﺮﺍﻩ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﻣﺤﻠﻲ ﺍﺳﺖ ) ﺷﺒﮑﻪ .( Aﺍﻃﻼﻋﺎﺕ ﻓﻮﻕ ،ﺷﺎﻣﻞ ﺁﺩﺭﺱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﺒﺪﺍﺀ ﻭ ﻣﻘﺼﺪ ) ﺁﺩﺭﺱ ( MACﻭ ﻓﻴﻠﺪ ﻧﻮﻉ ﺍﺳﺖ ﮐﻪ ﻣﺴﺌﻮﻟﻴﺖ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﭘﺮﻭﺗﮑﻞ ﻻﻳﻪ ﺷﺒﮑﻪ ) ﻣﺜﻼ" ( IPv4ﻭ ARPﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ .ﺩﺭ ﺍﻧﺘﻬﺎﻱ ﻓﺮﻳﻢ ،ﺩﺭ ﺑﺨﺶ FCSﻓﺮﻳﻢ ،ﻻﻳﻪ
DataLinkﻳﮏ CRCﺭﺍ ﻣﺴﺘﻘﺮ ﻧﻤﻮﺩﻩ ﺗﺎ ﻣﺎﺷﻴﻦ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ )ﺭﻭﺗﺮ( ﻗﺎﺩﺭ ﺑﻪ ﺗﺸﺨﻴﺺ ﺳﺎﻟﻢ ﺑﻮﺩﻥ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭﻳﺎﻓﺘﻲ ﺑﺎﺷﺪ.
299
ﻣﺮﺣﻠﻪ ﻫﻔﺘﻢ :ﻻﻳﻪ DataLinkﮐﺎﻣﭙﻴﻮﺗﺮ ، Aﻓﺮﻳﻢ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻻﻳﻪ ﻓﻴﺰﻳﮑﻲ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﺗﺎ ﺻﻔﺮ ﻭ ﻳﮏ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺁﻥ ﺑﻪ ﻳﮏ ﺳﻴﮕﻨﺎﻝ ﺩﻳﺠﻴﺘﺎﻝ ﺗﺒﺪﻳﻞ ﻭ ﺑﺮ ﺭﻭﻱ ﻣﺤﻴﻂ ﻓﻴﺰﻳﮑﻲ ﺷﺒﮑﻪ ﺍﺭﺳﺎﻝ ﮔﺮﺩﺩ .
ﻣﺮﺣﻠﻪ ﻫﺸﺘﻢ :ﺳﻴﮕﻨﺎﻝ ﺍﺭﺳﺎﻟﻲ ﺗﻮﺳﻂ ﺍﻳﻨﺘﺮﻓﻴﺲ E0ﺭﻭﺗﺮ ﺑﺮﺩﺍﺷﺘﻪ ﺷﺪﻩ ﻭ ﻓﺮﻳﻢ ﺧﻮﺍﻧﺪﻩ
ﻣﻲ ﺷﻮﺩ .ﺭﻭﺗﺮ ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﺨﺶ CRCﺁﻥ ﺭﺍ ﺑﺮﺭﺳﻲ ﻭ ﺁﻥ ﺭﺍ ﺑﺎ ﻣﻘﺪﺍﺭ CRCﺍﺿﺎﻓﻪ ﺷﺪﻩ ﺑﻪ ﻓﺮﻳﻢ ﺗﻮﺳﻂ ﮐﺎﻣﭙﻴﻮﺗﺮ Aﻣﻘﺎﻳﺴﻪ ﻣﻲ ﻧﻤﺎﻳﺪ )ﺣﺼﻮﻝ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﻋﺪﻡ ﺧﺮﺍﺑﻲ ﻓﺮﻳﻢ(. ﻣﺮﺣﻠﻪ ﻧﻬﻢ :ﺩﺭ ﺍﺩﺍﻣﻪ ،ﺁﺩﺭﺱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﻣﻘﺼﺪ ) ( MACﻓﺮﻳﻢ ﺩﺭﻳﺎﻓﺘﻲ ،ﺑﺮﺭﺳﻲ
ﻣﻲ ﮔﺮﺩﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻭﺟﻮﺩ ﻳﮏ ﻣﻮﺭﺩ ﺁﺩﺭﺱ ﮐﻪ ﺑﺎ ﺁﻥ ﻣﻄﺎﺑﻘﺖ ﺧﻮﺍﻫﺪ ﮐﺮﺩ ،ﻓﻴﻠﺪ "ﻧﻮﻉ
ﻓﺮﻳﻢ" ﺑﺮﺭﺳﻲ ﺗﺎ ﻧﺤﻮﻩ ﺑﺮﺧﻮﺭﺩ ﺭﻭﺗﺮ ﺑﺎ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ،ﻣﺸﺨﺺ ﮔﺮﺩﺩ IP .ﺩﺭ "ﻓﻴﻠﺪ ﻧﻮﻉ " ﺑﻮﺩﻩ ﻭ ﺭﻭﺗﺮ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﭘﺮﻭﺗﮑﻞ IPﮐﻪ ﺑﺮ ﺭﻭﻱ ﺭﻭﺗﺮ ﺩﺭ ﺣﺎﻝ ﺍﺟﺮﺍﺀ ﺍﺳﺖ ،ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﻓﺮﻳﻢ ﺍﺯ ﻭﺿﻌﻴﺖ ﻣﻮﺟﻮﺩ ﺧﺎﺭﺝ ﻭ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﻭﻟﻴﻪ ﺍﻱ ﮐﻪ ﺗﻮﺳﻂ ﮐﺎﻣﭙﻴﻮﺗﺮ Aﺗﻮﻟﻴﺪ ﺷﺪﻩ ﺍﺳﺖ ﺩﺭ ﺑﺎﻓﺮ ﺭﻭﺗﺮ ﺫﺧﻴﺮﻩ ﻣﻲ ﮔﺮﺩﺩ.
ﻣﺮﺣﻠﻪ ﺩﻫﻢ :ﭘﺮﻭﺗﮑﻞ IPﺑﺮﺭﺳﻲ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺁﺩﺭﺱ IPﻣﻘﺼﺪ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﺍﺩﻩ ﺗﺎ
ﻣﺸﺨﺺ ﮔﺮﺩﺩ ﮐﻪ ﺁﻳﺎ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺍﻱ ﺭﻭﺗﺮ ﺍﺳﺖ.ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﺁﺩﺭﺱ :IP
، ٢٠٠,٢٠٠,٢٠٠,٥ﻣﻲ ﺑﺎﺷﺪ ،ﺭﻭﺗﺮ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺟﺪﻭﻝ ﺭﻭﺗﻴﻨﮓ ﺧﻮﺩ ﺗﺸﺨﻴﺺ ﺧﻮﺍﻫﺪ ﺩﺍﺩ ﮐﻪ ﺁﺩﺭﺱ ﻓﻮﻕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺷﺒﮑﻪ ﺍﻱ ﺍﺳﺖ ﮐﻪ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻓﻴﺲ E1ﻣﺴﺘﻘﻴﻤﺎ" ﺑﻪ ﺭﻭﺗﺮ
ﻣﺘﺼﻞ ﺷﺪﻩ ﺍﺳﺖ.
300
ﻣﺮﺣﻠﻪ ﻳﺎﺯﺩﻫﻢ :ﺭﻭﺗﺮ ،ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺩﺭ ﺑﺎﻓﺮ ﺍﻳﻨﺘﺮﻓﻴﺲ E1ﻣﺴﺘﻘﺮ ﻧﻤﻮﺩﻩ ﻭ
ﻣﻲ ﺑﺎﻳﺴﺖ ﻳﮏ ﻓﺮﻳﻢ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺭﺍ ﺗﻮﻟﻴﺪ ﻧﻤﺎﻳﺪ.
ﺭﻭﺗﺮ ﺩﺭ ﺍﺑﺘﺪﺍ ARP Cacheﺧﻮﺩ ﺭﺍ ﺑﻪ ﻣﻨﻈﻮﺭ ﻳﺎﻓﺘﻦ ﺁﺩﺭﺱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﻣﺮﺑﻮﻁ ﺑﻪ
، IP:200.200.200.5ﺑﺮﺭﺳﻲ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭ ﺻﻮﺭﺕ ﻋﺪﻡ ﻭﺟﻮﺩ ﺁﺩﺭﺱ ﻓﻮﻕ ﺩﺭ
، ARP cacheﺭﻭﺗﺮ ﻳﮏ broadcast ARPﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻓﻴﺲ E1ﺑﻪ ﻣﻨﻈﻮﺭ ﭘﻴﺪﺍ ﻧﻤﻮﺩﻥ ﺁﺩﺭﺱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﻓﻮﻕ ،ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﻣﺮﺣﻠﻪ ﺩﻭﺍﺯﺩﻫﻢ :ﮐﺎﻣﭙﻴﻮﺗﺮ Bﺑﺎ ﺍﺭﺍﺋﻪ ﻳﮏ ARP Replyﭘﺎﺳﺦ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺁﺩﺭﺱ
ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ ﺭﺍ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ،ﺍﻳﻨﺘﺮﻓﻴﺲ E1 ﺭﻭﺗﺮ ﺗﻤﺎﻣﻲ ﺍﻃﻼﻋﺎﺕ ﻻﺯﻡ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﻣﻘﺼﺪ ﻧﻬﺎﺋﻲ ﺭﺍ ﺩﺍﺭﺍ
ﻣﻲ ﺑﺎﺷﺪ.
ﻣﺮﺣﻠﻪ ﺳﻴﺰﺩﻫﻢ :ﻓﺮﻳﻢ ﺗﻮﻟﻴﺪ ﺷﺪﻩ ﺗﻮﺳﻂ ﺍﻳﻨﺘﺮﻓﻴﺲ E1ﺭﻭﺗﺮ ﺩﺍﺭﺍﻱ ﺁﺩﺭﺱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ
ﻣﺒﺪﺍﺀ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ E1ﻭ ﺁﺩﺭﺱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﻣﻘﺼﺪ ﻣﺮﺑﻮﻁ ﺑﻪ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ Bﻣﻲ ﺑﺎﺷﺪ.ﺑﺎ ﺍﻳﻦ ﮐﻪ ﺁﺩﺭﺱ ﻫﺎﻱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﻣﺒﺪﺍﺀ ﻭ ﻣﻘﺼﺪ ﻓﺮﻳﻢ ﺩﺭ ﻫﺮ ﻳﮏ ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﺭﻭﺗﺮ ﺗﻐﻴﻴﺮ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺁﺩﺭﺱ IPﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﺒﺪﺍﺀ ﻭ ﻣﻘﺼﺪ ﻫﺮﮔﺰ
ﺗﻐﻴﻴﺮ ﭘﻴﺪﺍ ﻧﻤﻲ ﻧﻤﺎﻳﺪ ) ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻫﺮﮔﺰ ﺗﻐﻴﻴﺮ ﻧﮑﺮﺩﻩ ﻭ ﺻﺮﻓﺎ" ﻓﺮﻳﻢ ﺗﻐﻴﻴﺮ ﻣﻲ ﻧﻤﺎﻳﺪ(.
ﻣﺮﺣﻠﻪ ﭼﻬﺎﺭﺩﻫﻢ :ﮐﺎﻣﭙﻴﻮﺗﺮ ، Bﻓﺮﻳﻢ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻭ ﺑﺮﺭﺳﻲ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ CRCﺭﺍ
ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻣﺎﺣﺼﻞ ﺑﺮﺭﺳﻲ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﻣﻮﻓﻘﻴﺖ ﺁﻣﻴﺰ ﻧﺒﺎﺷﺪ ،ﻓﺮﻳﻢ ﺩﻭﺭﺍﻧﺪﺍﺧﺘﻪ ﻣﻲ ﺷﻮﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ،ﺁﺩﺭﺱ IPﻣﻘﺼﺪ ﺑﺮﺭﺳﻲ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﮐﻪ ﺁﺩﺭﺱ ﻣﻘﺼﺪ ﺑﺎ ﭘﻴﮑﺮﺑﻨﺪﻱ IPﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺑﺮ ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ، Bﻣﻄﺎﺑﻘﺖ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﻓﻴﻠﺪ ﭘﺮﻭﺗﮑﻞ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺭﺳﻲ ﺗﺎ ﺍﻫﺪﺍﻑ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻣﺸﺨﺺ ﮔﺮﺩﺩ.
301
ﻣﺮﺣﻠﻪ ﭘﺎﻧﺰﺩﻫﻢ :ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﮐﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻳﮏ ﺩﺭﺧﻮﺍﺳﺖ ICMP echo
ﺍﺳﺖ ،ﮐﺎﻣﭙﻴﻮﺗﺮ Bﻳﮏ ICMP echo-replyﺟﺪﻳﺪ ﺭﺍ ﮐﻪ ﺷﺎﻣﻞ ﺁﺩﺭﺱ IPﻣﺒﺪﺍﺀ
) ﮐﺎﻣﭙﻴﻮﺗﺮ ( Bﻭ ﺁﺩﺭﺱ IPﻣﻘﺼﺪ ﻣﺮﺑﻮﻁ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ Aﻣﻲ ﺑﺎﺷﺪ ﺭﺍ ﺍﻳﺠﺎﺩ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ،ﻣﺠﺪﺩﺍ" ﻭ ﺩﺭ ﺟﻬﺖ ﻣﻌﮑﻮﺱ ﺗﮑﺮﺍﺭ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ ،ﺁﺩﺭﺱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭﻃﻮﻝ ﻣﺴﻴﺮ ﺷﻨﺎﺧﺘﻪ ﺷﺪﻩ ﺑﻮﺩﻩ ﻭ ﻫﺮ ﺩﺳﺘﮕﺎﻩ ﺻﺮﻓﺎ" ﻧﻴﺎﺯﻣﻨﺪ ﺑﺮﺭﺳﻲ ARP cacheﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺸﺨﻴﺺ ﺁﺩﺭﺱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ﻣﻲ ﺑﺎﺷﺪ ) ﺁﺩﺭﺱ .( MAC
302
ﺭﻭﺗﺮ ﺍﻳﻨﺘﺮﻧﺖ ﻳﮑﻲ ﺍﺯ ﺷﺎﻫﮑﺎﺭﻫﺎﻱ ﺑﺸﺮﻳﺖ ﺩﺭ ﺯﻣﻴﻨﻪ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﺳﺖ .ﺑﺎ ﺍﻳﺠﺎﺩ ﺯﻳﺮ
ﺳﺎﺧﺖ ﻣﻨﺎﺳﺐ ﺍﺭﺗﺒﺎﻃﻲ ،ﮐﺎﺭﺑﺮﺍﻥ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻗﺼﻲ ﻧﻘﺎﻁ ﺩﻧﻴﺎ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﻧﺎﻣﻪ ﻫﺎﻱ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ،ﻣﺸﺎﻫﺪﻩ ﺻﻔﺤﺎﺕ ﻭﺏ ،ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﻓﺎﻳﻞ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﮐﻤﺘﺮ ﺍﺯ ﭼﻨﺪ ﺛﺎﻧﻴﻪ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺷﺒﮑﻪ ﺍﺭﺗﺒﺎﻃﻲ ﻣﻮﺟﻮﺩ ﺑﺎ ﺑﮑﺎﺭﮔﻴﺮﻱ ﺍﻧﻮﺍﻉ ﺗﺠﻬﻴﺰﺍﺕ ﻣﺨﺎﺑﺮﺍﺗﻲ ،ﺳﺨﺖ
ﺍﻓﺰﺍﺭﻱ ﻭ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ،ﺯﻳﺮ ﺳﺎﺧﺖ ﻣﻨﺎﺳﺐ ﺍﺭﺗﺒﺎﻃﻲ ﺭﺍ ﺑﺮﺍﻱ ﻋﻤﻮﻡ ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﻓﺮﺍﻫﻢ
ﺁﻭﺭﺩﻩ ﺍﺳﺖ .ﻳﮑﻲ ﺍﺯ ﻋﻨﺎﺻﺮ ﺍﺻﻠﻲ ﻭ ﻣﻬﻢ ﮐﻪ ﺷﺎﻳﺪ ﺍﻏﻠﺐ ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﺁﻥ ﺭﺍ ﺗﺎﮐﻨﻮﻥ ﻣﺸﺎﻫﺪﻩ ﻧﻨﻤﻮﺩﻩ ﺍﻧﺪ ،ﺭﻭﺗﺮ ﺍﺳﺖ .ﺭﻭﺗﺮﻫﺎ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺧﺎﺻﻲ ﻫﺴﺘﻨﺪ ﮐﻪ ﭘﻴﺎﻡ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﮐﺎﺭﺑﺮﺍﻥ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻫﺰﺍﺭﺍﻥ ﻣﺴــﻴﺮ ﻣﻮﺟﻮﺩ ﺑﻪ ﻣﻘﺎﺻــﺪ ﻣﻮﺭﺩ ﻧﻈﺮ ﻫﺪﺍﻳﺖ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﻧﺤﻮﻩ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ
ﺑﺮﺍﻱ ﺷﻨﺎﺧﺖ ﻋﻤﻠﮑﺮﺩ ﺭﻭﺗﺮﻫﺎ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺎ ﻳﮏ ﻣﺜﺎﻝ ﺳﺎﺩﻩ ﺷﺮﻭﻉ ﻣﻲ ﻧﻤﺎﺋﻴﻢ.
ﺯﻣﺎﻧﻴﮑﻪ ﺑﺮﺍﻱ ﻳﮑﻲ ﺍﺯ ﺩﻭﺳﺘﺎﻥ ﺧﻮﺩ ،ﻳﮏ E-mailﺭﺍ ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﻳﺪ ،ﭘﻴﺎﻡ ﻓﻮﻕ ﺑﻪ ﭼﻪ ﺻﻮﺭﺕ ﺗﻮﺳﻂ ﺩﻭﺳﺖ ﺷﻤﺎ ﺩﺭﻳﺎﻓﺖ ﻣﻲ ﮔﺮﺩﺩ ؟ ﻧﺤﻮﻩ ﻣﺴﻴﺮ ﻳﺎﺑﻲ ﭘﻴﺎﻡ ﻓﻮﻕ ﺑﻪ ﭼﻪ ﺻﻮﺭﺕ ﺍﻧﺠﺎﻡ ﻣﻲ ﮔﻴﺮﺩ ﮐﻪ ﻓﻘﻂ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﻭﺳﺖ ﺷﻤﺎ ﺩﺭ ﻣﻴﺎﻥ ﻣﻴﻠﻴﻮﻥ ﻫﺎ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺟﻮﺩ ﺩﺭ ﺩﻧﻴﺎ،
ﺁﻥ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.؟ ﺍﮐﺜﺮ ﻋﻤﻠﻴﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﺭﺳﺎﻝ ﻳﮏ ﭘﻴﺎﻡ ﺗﻮﺳﻂ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﺩﺭﻳﺎﻓﺖ ﺁﻥ ﺗﻮﺳﻂ ﮐﺎﻣﭙﻴﻮﺗﺮ ﮔﻴﺮﻧﺪﻩ ،ﺗﻮﺳﻂ ﺭﻭﺗﺮ ﺍﻧﺠﺎﻡ ﻣﻲ ﮔﻴﺮﺩ.ﺭﻭﺗﺮﻫﺎ
ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺧﺎﺻﻲ ﻣﻲ ﺑﺎﺷﻨﺪ ﮐﻪ ﺍﻣﮑﺎﻥ ﺣﺮﮐﺖ ﭘﻴﺎﻡ ﻫﺎ ﺩﺭ ﻃﻮﻝ ﺷﺒﮑﻪ ﺭﺍ ﻓﺮﺍﻫﻢ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ. ﺑﻪ ﻣﻨﻈﻮﺭ ﺁﮔﺎﻫﻲ ﺍﺯ ﻋﻤﻠﮑﺮﺩ ﺭﻭﺗﺮ ،ﺳﺎﺯﻣﺎﻧﻲ ﺭﺍ ﺩﺭ ﻧﻈﺮ ﺑﮕﻴﺮﻳﺪ ﮐﻪ ﺩﺍﺭﺍﻱ ﻳﮏ ﺷﺒﮑﻪ
ﺩﺍﺧﻠﻲ ﻭ ﺍﺧﺘﺼﺎﺻﻲ ﺧﻮﺩ ﺍﺳﺖ .ﮐﺎﺭﮐﻨﺎﻥ ﺳﺎﺯﻣﺎﻥ ﻓﻮﻕ ﻫﺮ ﻳﮏ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﻮﻉ ﮐﺎﺭ ﺧﻮﺩ ﺍﺯ ﺷﺒﮑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺳﺎﺯﻣﺎﻥ ﻓﻮﻕ ﺗﻌﺪﺍﺩﻱ ﮔﺮﺍﻓﻴﺴﺖ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﻣﺸﻐﻮﻝ ﺑﮑﺎﺭ ﻫﺴﺘﻨﺪ ﮐﻪ ﺑﮑﻤﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻃﺮﺡ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﻃﺮﺍﺣﻲ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﻳﮏ
303
ﮔﺮﺍﻓﻴﺴﺖ ﻓﺎﻳﻠﻲ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﮑﻪ ﺑﺮﺍﻱ ﻫﻤﮑﺎﺭ ﺧﻮﺩ ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ ،ﺑﺪﻟﻴﻞ ﺣﺠﻢ
ﺑﺎﻻﻱ ﻓﺎﻳﻞ ﺍﺭﺳﺎﻟﻲ ،ﺍﮐﺜﺮ ﻇﺮﻓﻴﺖ ﺷﺒﮑﻪ ﺍﺷﻐﺎﻝ ﻭ ﺑﺪﻧﺒﺎﻝ ﺁﻥ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﮐﺎﺭﺑﺮﺍﻥ ،ﺷﺒﮑﻪ ﮐﻨﺪ ﺧﻮﺍﻫﺪ ﺷﺪ .ﻋﻠﺖ ﻓﻮﻕ ) ﺗﺎﺛﻴﺮ ﻋﻤﻠﮑﺮﺩ ﻳﮏ ﮐﺎﺭﺑﺮ ﺑﺮ ﺗﻤﺎﻡ ﻋﻤﻠﮑﺮﺩ ﺷﺒﮑﻪ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﮐﺎﺭﺑﺮﺍﻥ ( ﺑﻪ ﻣﺎﻫﻴﺖ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﺑﺮﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻓﻮﻕ ﻫﺮ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﮐﻪ ﺗﻮﺳﻂ ﮐﺎﺭﺑﺮﻱ ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ ،ﺑﺮﺍﻱ ﺗﻤﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻧﻴﺰ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ .ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺁﺩﺭﺱ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭﻳﺎﻓﺖ ﺷﺪﻩ ﺭﺍ ﺑﻪ ﻣﻨﻈﻮﺭ ﺁﮔﺎﻫﻲ ﺍﺯ ﻣﻘﺼﺪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺭﺳﻲ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺭﻭﻳﮑﺮﺩ ﻓﻮﻕ ﺩﺭ ﺭﻓﺘﺎﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ،ﻃﺮﺍﺣﻲ ﻭ
ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺁﻧﺎﻥ ﺭﺍ ﺳﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ ﻭﻟﻲ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﮔﺴﺘﺮﺵ ﺷﺒﮑﻪ ﻭ ﺍﻓﺰﺍﻳﺶ ﻋﻤﻠﻴﺎﺕ ﻣﻮﺭﺩ ﺍﻧﺘﻈﺎﺭ ،ﮐﺎﺭﺁﺋﻲ ﺷﺒﮑﻪ ﮐﺎﻫﺶ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺳﺎﺯﻣﺎﻥ ﻣﻮﺭﺩ ﻧﻈﺮ ) ﺩﺭ ﻣﺜﺎﻝ ﻓﻮﻕ ( ﺑﺮﺍﻱ ﺣﻞ ﻣﺸﮑﻞ ﻓﻮﻕ ﺗﺼﻤﻴﻢ ﺑﻪ ﺍﻳﺠﺎﺩ ﺩﻭ ﺷﺒﮑﻪ ﻣﺠﺰﺍ ﻣﻲ ﮔﻴﺮﺩ .ﻳﮏ ﺷﺒﮑﻪ ﺑﺮﺍﻱ ﮔﺮﺍﻓﻴﺴﺖ ﻫﺎ
ﺍﻳﺠﺎﺩ ﻭ ﺷﺒﮑﻪ ﺩﻭﻡ ﺑﺮﺍﻱ ﺳﺎﻳﺮﮐﺎﺭﺑﺮﺍﻥ ﺳﺎﺯﻣﺎﻥ ﺩﺭ ﻧﻈﺮﮔﺮﻓﺘﻪ ﻣﻲ ﺷﻮﺩ .ﺑﻪ ﻣﻨﻈﻮﺭﺍﺭﺗﺒﺎﻁ ﺩﻭ ﺷﺒﮑﻪ ﻓﻮﻕ ﺑﻴﮑﺪﻳﮕﺮ ﻭ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﻳﮑﺪﺳﺘﮕﺎﻩ ﺭﻭﺗﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
ﺭﻭﺗﺮ ،ﺗﻨﻬﺎ ﺩﺳﺘﮕﺎﻩ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺖ ﮐﻪ ﺗﻤﺎﻡ ﭘﻴﺎﻣﻬﺎﻱ ﺍﺭﺳﺎﻟﻲ ﺗﻮﺳﻂ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺳﺎﺯﻣﺎﻥ ،ﺭﺍ ﻣﺸﺎﻫﺪﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﻳﮏ ﮔﺮﺍﻓﻴﺴﺖ ،ﻓﺎﻳﻠﻲ ﺑﺎ ﻇﺮﻓﻴﺖ ﺑﺎﻻ ﺭﺍ ﺑﺮﺍﻱ ﮔﺮﺍﻓﻴﺴﺖ ﺩﻳﮕﺮﻱ ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ ،ﺭﻭﺗﺮ ﺁﺩﺭﺱ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﻓﺎﻳﻞ ﺭﺍ ﺑﺮﺭﺳﻲ ﻭ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﻓﺎﻳﻞ ﻣﻮﺭﺩ ﻧﻈﺮ ﻣﺮﺑﻮﻁ ﺑﻪ ﺷﺒﮑﻪ
ﮔﺮﺍﻓﻴﺴﺖ ﻫﺎ ﺩﺭ ﺳﺎﺯﻣﺎﻥ ﺍﺳﺖ ،ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﺴﻤﺖ ﺷﺒﮑﻪ ﻓﻮﻕ ﻫﺪﺍﻳﺖ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻳﮏ ﮔﺮﺍﻓﻴﺴﺖ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﺮﺍﻱ ﻳﮑﻲ ﺍﺯ ﭘﺮﺳﻨﻞ ﺷﺎﻏﻞ ﺩﺭ ﺑﺨﺶ ﻣﺎﻟﻲ ﺳﺎﺯﻣﺎﻥ ﺍﺭﺳﺎﻝ ﺩﺍﺭﺩ ،ﺭﻭﺗﺮ ﺑﺎ ﺑﺮﺭﺳﻲ ﺁﺩﺭﺱ ﻣﻘﺼﺪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﺍﻳﻦ ﻧﮑﻨﻪ ﭘﻲ ﺧﻮﺍﻫﺪ ﺑﺮﺩ ﮐﻪ
ﭘﻴﺎﻡ ﻓﻮﻕ ﺭﺍ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﺷﺒﮑﻪ ﺩﻳﮕﺮ ﺍﻧﺘﻘﺎﻝ ﺩﻫﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺭﻭﺗﺮ ﻗﺎﺩﺭ ﺑﻪ ﻣﺴﻴﺮﻳﺎﺑﻲ ﺻﺤﻴﺢ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻭ ﻫﺪﺍﻳﺖ ﺁﻥ ﺑﻪ ﺷﺒﮑﻪ ﻣﻮﺭﺩ ﻧﻈﺮ ﺷﺪﻩ ﺍﺳﺖ. ﻳﮑﻲ ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎﺋﻲ ﮐﻪ ﺭﻭﺗﺮ ﺍﺯ ﺁﻥ ﺑﺮﺍﻱ ﺗﻌﻴﻴﻦ ﻣﻘﺼﺪ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ،
" ﺟﺪﻭﻝ ﭘﻴﮑﺮﺑﻨﺪﻱ " ﺍﺳﺖ .ﺟﺪﻭﻝ ﻓﻮﻕ ﺷﺎﻣﻞ ﻣﺠﻤﻮﻋﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺸﺮﺡ ﺫﻳﻞ ﺍﺳﺖ: 304
•
ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻧﺤﻮﻩ ﻫﺪﺍﻳﺖ ﺍﺗﺼﺎﻻﺕ ﺑﻪ ﺁﺩﺭﺱ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ
•
ﺍﻭﻟﻮﻳﺖ ﻫﺎﻱ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺑﺮﺍﻱ ﻫﺮ ﺍﺗﺼﺎﻝ
•
ﻗﻮﺍﻧﻴﻦ ﻣﺮﺑﻮﻁ ﺑﻪ ﺗﺒﻴﻦ ﺗﺮﺍﻓﻴﮏ ﺩﺭ ﺣﺎﻟﺖ ﻃﺒﻴﻌﻲ ﻭﺷﺮﺍﻳﻂ ﺧﺎﺹ
ﺟﺪﻭﻝ ﻓﻮﻕ ﻣﻲ ﺗﻮﺍﻧﺪ ﺳﺎﺩﻩ ﻭﻳﺎ ﺷﺎﻣﻞ ﺻﺪﻫﺎ ﺧﻂ ﺑﺮﻧﺎﻣﻪ ﺩﺭ ﻳﮏ ﺭﻭﺗﺮﻫﺎﻱ ﮐﻮﭼﮏ ﺑﺎﺷﺪ. ﺩﺭ ﺭﻭﺗﺮﻫﺎﻱ ﺑﺰﺭﮒ ﺟﺪﻭﻝ ﻓﻮﻕ ﭘﻴﭽﻴﺪﻩ ﺗﺮ ﺑﻮﺩﻩ ﺑﮕﻮﻧﻪ ﺍﻱ ﮐﻪ ﻗﺎﺩﺭ ﺑﻪ ﻋﻤﻠﻴﺎﺕ ﻣﺴﻴﺮﻳﺎﺑﻲ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺎﺷﻨﺪ .ﻳﮏ ﺭﻭﺗﺮ ﺩﺍﺭﺍﻱ ﺩﻭ ﻭﻇﻴﻔﻪ ﺍﺻﻠﻲ ﺍﺳﺖ: • •
ﺗﻀﻤﻴﻦ ﻋﺪﻡ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﻣﺤﻠﻲ ﮐﻪ ﺑﻪ ﺁﻧﻬﺎ ﻧﻴﺎﺯ ﻧﻴﺴﺖ ﺗﻀﻤﻴﻦ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﻣﻘﺼﺪ ﺻﺤﻴﺢ
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻭﻇﺎﻳﻒ ﺍﺳﺎﺳﻲ ﻓﻮﻕ ،ﻣﻨﺎﺳﺒﺘﺮﻳﻦ ﻣﺤﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺭﻭﺗﺮ ،ﺍﺗﺼﺎﻝ ﺩﻭ ﺷﺒﮑﻪ ﺍﺳﺖ .ﺑﺎ ﺍﺗﺼﺎﻝ ﺩﻭ ﺷﺒﮑﻪ ﺗﻮﺳﻂ ﺭﻭﺗﺮ ،ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﺩﺭ
ﺷﺒﮑﻪ ﺩﻳﮕﺮ ﻭ ﺑﺎﻟﻌﮑﺲ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﺗﺮﺟﻤﻪ ﻫﺎﻱ ﻻﺯﻡ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﭘﺮﻭﺗﮑﻞ
ﻫﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﻫﺮﻳﮏ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎ ،ﻧﻴﺰ ﺗﻮﺳﻂ ﺭﻭﺗﺮ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺭﻭﺗﺮ ﺷﺒﮑﻪ ﻫﺎ ﺭﺍ ﺩﺭ ﻣﻘﺎﺑﻞ ﻳﮑﺪﻳﮕﺮ ﺣﻔﺎﻇﺖ ﻭ ﺍﺯ ﺗﺮﺍﻓﻴﮏ ﻏﻴﺮﺿﺮﻭﺭﻱ ﭘﻴﺸﮕﻴﺮﻱ ﻣﻲ ﻧﻤﺎﻳﺪ ) .ﺗﺎﺛﻴﺮ ﺗﺮﺍﻓﻴﮏ
ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺑﺮ ﺷﺒﮑﻪ ﺩﻳﮕﺮ ﺑﺎ ﻓﺮﺽ ﻏﻴﺮ ﻻﺯﻡ ﺑﻮﺩﻥ ﺍﻃﻼﻋﺎﺕ ﺣﺎﺻﻞ ﺍﺯ ﺗﺮﺍﻓﻴﮏ ﺩﺭ ﺷﺒﮑﻪ ﺍﻭﻝ ﺑﺮﺍﻱ ﺷﺒﮑﻪ ﺩﻭﻡ( .ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﮔﺴﺘﺮﺵ ﺷﺒﮑﻪ ،ﺟﺪﻭﻝ ﭘﻴﮑﺮﺑﻨﺪﻱ ﻧﻴﺰ ﺭﺷﺪ ﻭ ﺗﻮﺍﻥ ﭘﺮﺩﺍﺯﻧﺪﻩ ﺭﻭﺗﺮ ﻧﻴﺰ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﻓﺰﺍﻳﺶ ﻳﺎﺑﺪ .ﺻﺮﻓﻨﻈﺮ ﺍﺯ ﺗﻌﺪﺍﺩ ﺷﺒﮑﻪ ﻫﺎﺋﻲ ﮐﻪ ﺑﻪ ﻳﮏ
ﺭﻭﺗﺮ ﻣﺘﺼﻞ ﻣﻲ ﺑﺎﺷﻨﺪ ،ﻧﻮﻉ ﻭ ﻧﺤﻮﻩ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﺩﺭ ﺗﻤﺎﻣﻲ ﺭﻭﺗﺮﻫﺎ ﻣﺸﺎﺑﻪ ﺍﺳﺖ .ﺍﻳﻨﺘﺮﻧﺖ
ﺑﻪ ﻋﻨﻮﺍﻥ ﺑﺰﺭﮔﺘﺮﻳﻦ ﺷﺒﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺯ ﻫﺰﺍﺭﺍﻥ ﺷﺒﮑﻪ ﮐﻮﭼﮑﺘﺮ ﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺍﺳﺖ .ﺭﻭﺗﺮﻫﺎ ﺩﺭ ﺍﺗﺼﺎﻝ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﻮﭼﮑﺘﺮ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺍﺭﺍﻱ ﻧﻘﺸﻲ ﺍﺳﺎﺳﻲ ﻭ ﺿﺮﻭﺭﻱ ﻣﻲ ﺑﺎﺷﻨﺪ. ﺍﺭﺳﺎﻝ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺯﻣﺎﻧﻴﮑﻪ ﺍﺯ ﻃﺮﻳﻖ ﺗﻠﻔﻦ ﺑﺎ ﺷﺨﺼﻲ ﺗﻤﺎﺳﻲ ﺑﺮﻗﺮﺍﺭ ﻣﻲ ﮔﺮﺩﺩ ،ﺳﻴﺴﺘﻢ ﺗﻠﻔﻦ ،ﻳﮏ ﻣﺪﺍﺭ
ﭘﺎﻳﺪﺍﺭ ﺑﻴﻦ ﺗﻤﺎﺱ ﮔﻴﺮﻧﺪﻩ ﻭ ﺷﺨﺺ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﻳﺠﺎﺩ ﻣﻲ ﻧﻤﺎﻳﺪ.
305
ﻣﺪﺍﺭ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﻣﻲ ﺑﺎﻳﺴﺖ ﻣﺮﺍﺣﻞ ﻣﺘﻔﺎﻭﺗﻲ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ﻣﺴﻲ ،ﺳﻮﺋﻴﭻ ﻫﺎ،
ﻓﻴﺒﺮ ﻫﺎﻱ ﻧﻮﺭﻱ ،ﻣﺎﮐﺮﻭﻭﻳﻮ ﻭ ﻣﺎﻫﻮﺍﺭﻩ ﺍﻧﺠﺎﻡ ﺩﻫﺪ .ﺗﻤﺎﻡ ﻣﺮﺍﺣﻞ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺑﺮﭘﺎﺳﺎﺯﻱ ﻳﮏ ﺍﺭﺗﺒﺎﻁ ﭘﺎﻳﺪﺍﺭ ﺑﻴﻦ ﺗﻤﺎﺱ ﮔﻴﺮﻧﺪﻩ ﻭ ﻣﺨﺎﻃﺐ ﻣﻮﺭﺩ ﻧﻈﺮ ﺩﺭ ﻣﺪﺕ ﺯﻣﺎﻥ ﺗﻤﺎﺱ ، ﺛﺎﺑﺖ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﮐﻴﻔﻴﺖ ﺧﻂ ﺍﺭﺗﺒﺎﻃﻲ ﻣﺸﺮﻭﻁ ﺑﻪ ﻋﺪﻡ ﺑﺮﻭﺯ ﻣﺸﮑﻼﺕ ﻓﻨﻲ ﻭ ﻏﻴﺮﻓﻨﻲ ﺩﺭ
ﻫﺮ ﻳﮏ ﺍﺯ ﺗﺠﻬﻴﺰﺍﺕ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ،ﺩﺭ ﻣﺪﺕ ﺑﺮﻗﺮﺍﺭﻱ ﺗﻤﺎﺱ ﺛﺎﺑــﺖ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺑﺎ ﺑﺮﻭﺯ ﻫﺮ ﮔﻮﻧـﻪ ﺍﺷﮑﺎﻝ ﻧﻈﻴﺮ ﺧــــﺮﺍﺑﻲ ﻳﮏ ﺳﻮﺋﻴﭻ ﻭ ..ﺧﻂ ﺍﺭﺗﺒﺎﻃﻲ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺑﺎ ﻣﺸﮑﻞ ﻣﻮﺍﺟﻪ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ) ﺻﻔﺤﺎﺕ ﻭﺏ ،ﭘﻴﺎﻡ ﻫﺎﻱ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ﻭ ( ...ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
ﺳﻴﺴﺘﻤﻲ ﺑﺎ ﻧﺎﻡ Packet -switching networkﺑﻪ ﺣﺮﮐﺖ ﺩﺭ ﻣﻲ ﺁﻳﻨﺪ .ﺩﺭ ﺳﻴﺴﺘﻢ ﻓﻮﻕ ،ﺩﺍﺩﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﭘﻴﺎﻡ ﻭ ﻳﺎ ﻳﮏ ﻓﺎﻳﻞ ﺑﻪ ﺑﺴﺘﻪ ﻫﺎﻱ ١٥٠٠ﺑﺎﻳﺘﻲ ﺗﻘﺴﻴﻢ
ﻣﻲ ﮔﺮﺩﻧﺪ .ﻫﺮ ﻳﮏ ﺍﺯ ﺑﺴﺘﻪ ﻫﺎﻱ ﻓﻮﻕ ﺷﺎﻣﻞ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ :ﺁﺩﺭﺱ ﻓﺮﺳﺘﻨﺪﻩ ،ﺁﺩﺭﺱ
ﮔﻴﺮﻧﺪﻩ ،ﻣﻮﻗﻌﻴﺖ ﺑﺴﺘﻪ ﺩﺭ ﭘﻴﺎﻡ ﻭ ﺑﺮﺭﺳﻲ ﺍﺭﺳﺎﻝ ﺩﺭﺳﺖ ﺍﻃﻼﻋﺎﺕ ﺗﻮﺳﻂ ﮔﻴﺮﻧﺪﻩ ﺍﺳﺖ .ﻫﺮ ﻳﮏ ﺍﺯ ﺑﺴﺘﻪ ﻫﺎﻱ ﻓﻮﻕ ﺭﺍ Packetﻣﻲ ﮔﻮﻳﻨﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺴﺘﻪ ﻫﺎﻱ ﻓﻮﻕ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﻬﺘﺮﻳﻦ
ﻭ ﻣﻨﺎﺳﺒﺘﺮﻳﻦ ﻣﺴﻴﺮ ﺑﺮﺍﻱ ﻣﻘﺼﺪ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ﺳﻴﺴﺘﻢ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﺗﻠﻔﻦ ﭘﻴﭽﻴﺪﻩ ﺗﺮ ﺑﻨﻈﺮ ﻣﻲ ﺁﻳﺪ ،ﻭﻟﻲ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﻣﺒﺘﻨﻲ ﺑﺮ ﺩﺍﺩﻩ ﺩﻭﺩﻟﻴﻞ ) ﻣﺰﻳﺖ( ﻋﻤﺪﻩ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ Packet switchingﻭﺟﻮﺩ ﺩﺍﺭﺩ: •
ﺷﺒﮑﻪ ﻗﺎﺩﺭ ﺑﻪ ﺗﻨﻈﻴﻢ ﻟﻮﺩ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ﺍﺳﺖ
•
ﺩﺭ ﺻﻮﺭﺕ ﻭﺟﻮﺩ ﺍﺷﮑﺎﻝ ﺩﺭ ﻳﮏ ﺩﺳﺘﮕﺎﻩ ،ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﻣﺴﻴﺮ ﺩﻳﮕﺮ ﻋﺒﻮﺭ ﺩﺍﺩﻩ
) ﻣﻴﻠﻲ ﺛﺎﻧﻴﻪ (
ﺷﺪﻩ ﺗﺎ ﺑﻪ ﻣﻘﺼﺪ ﺑﺮﺳﺪ.
ﺭﻭﺗﺮﻫﺎ ﮐﻪ ﺑﺨﺶ ﺍﺻﻠﻲ ﺷﺒﮑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﺗﺸﮑﻴﻞ ﻣﻲ ﺩﻫﻨﺪ ،ﻗﺎﺩﺭ ﺑﻪ " ﭘﻴﮑﺮﺑﻨﺪﻱ ﻣﺠﺪﺩ ﻣﺴﻴﺮ " ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﺷﺮﺍﻳﻂ ﺣﺎﮐﻢ ﺑﺮ ﺧﻄﻮﻁ ﻧﻈﻴﺮ ﺗﺎﺧﻴﺮ ﺩﺭ ﺩﺭﻳﺎﻓﺖ ﻭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻭ ﺗﺮﺍﻓﻴﮏ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﻋﻨﺎﺻﺮ ﻣﺘﻔﺎﻭﺕ ﺷﺒﮑﻪ ﺑﺼﻮﺭﺕ ﺩﺍﺋﻢ
ﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﺧﻮﺍﻫﻨﺪ ﮔﺮﻓﺖ .ﺭﻭﺗﺮ ﺩﺍﺭﺍﻱ ﺍﻧﺪﺍﺯﻩ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ: 306
•
ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﺯ ﺍﻣﮑﺎﻥ Internet connection sharingﺑﻴﻦ ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﺁﻧﻬﺎ ﻭﻳﻨﺪﻭﺯ ٩٨ﻧﺼﺐ ﺷﺪﻩ ﺍﺳﺖ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ ،ﻳﮑﻲ ﺍﺯ
ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﮐﻪ ﺧﻂ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﺁﻥ ﻣﺘﺼﻞ ﺷﺪﻩ ﺍﺳﺖ ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﮏ ﺭﻭﺗﺮ ﺳﺎﺩﻩ ﺭﻓﺘﺎﺭ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ﺭﻭﺗﺮ ،ﻋﻤﻠﻴﺎﺕ ﺳﺎﺩﻩ ﺍﻱ ﺭﺍ ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﺪ .ﺩﺍﺩﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺮﺭﺳﻲ ﺗﺎ ﻣﻘﺼﺪ ﺁﻥ ﺑﺮﺍﻱ ﻳﮑﻲ ﺍﺯ ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺗﻌﻴﻴﻦ ﮔﺮﺩﺩ.
•
ﺭﻭﺗﺮﻫﺎﻱ ﺑﺰﺭﮔﺘﺮ ﻧﻈﻴﺮ ﺭﻭﺗﺮﻫﺎﺋﻲ ﮐﻪ ﻳﮏ ﺳﺎﺯﻣﺎﻥ ﮐﻮﭼﮏ ﺭﺍ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﻋﻤﻠﻴﺎﺕ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮﻱ ﺭﺍ ﻧﺴﺒﺖ ﺑﻪ ﻣﺪﻝ ﻗﺒﻠﻲ ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﻨﺪ. ﺭﻭﺗﺮﻫﺎﻱ ﻓﻮﻕ ﺍﺯ ﻣﺠﻤﻮﻋﻪ ﻗﻮﺍﻧﻴﻦ ﺍﻣﻨﻴﺘﻲ ﺣﺎﮐﻢ ﺑﺮ ﺳﺎﺯﻣﺎﻥ ﻣﺮﺑﻮﻃﻪ ﺗﺒﻌﻴﺖ ﻭ
ﺑﺼﻮﺭﺕ ﺍﺩﻭﺍﺭﻱ ﺳﻴﺴﺘﻢ ﺍﻣﻨﻴﺘﻲ ﺗﺒﻴﻦ ﺷﺪﻩ ﺍﻱ ﺭﺍ ﺑﺮﺭﺳﻲ ﻣﻲ ﻧﻤﺎﻳﻨﺪ. •
ﺭﻭﺗﺮﻫﺎﻱ ﺑﺰﺭﮔﺘﺮ ﻣﺸﺎﺑﻪ ﺭﻭﺗﺮﻫﺎﺋﻲ ﮐﻪ ﺗﺮﺍﻓﻴﮏ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺩﺭ ﻧﻘﻂ ﺣﺴﺎﺱ ﻭﻣﻬﻢ ﺍﻳﻨﺘﺮﻧﺖ ﮐﻨﺘﺮﻝ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ ﻣﻴﻠﻴﻮﻥ ﻫﺎ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﻣﺴﻴﺮﻳﺎﺑﻲ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ. ﺩﺭ ﺍﻏﻠﺐ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﻣﻮﺳﺴﺎﺕ ﺍﺯ ﺭﻭﺗﺮﻫﺎﻱ ﻣﺘﻮﺳﻂ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺍﻳﻦ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺍﺯ
ﺭﻭﺗﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﺩﻭ ﺷﺒﮑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺷﺒﮑﻪ ﺩﺍﺧﻠﻲ ﺳﺎﺯﻣﺎﻥ ﺍﺯ ﻃﺮﻳﻖ ﺭﻭﺗﺮ ﺑﻪ
ﺷﺒﮑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ .ﺷﺒﮑﻪ ﺩﺍﺧﻠﻲ ﺳﺎﺯﻣﺎﻥ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﺧﻂ ﺍﺗﺮﻧﺖ ) ﻳﮏ ﺍﺗﺼﺎﻝ ، ٩ base-T١٠٠ﺧﻂ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﻧﺮﺥ ﺍﻧﺘﻘﺎﻝ ١٠٠ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺑﻮﺩﻩ ﻭ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ﺑﻬﻢ ﺗﺎﺑﻴﺪﻩ ﻫﺸﺖ ﺭﺷﺘﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ( ﺑﻪ ﺭﻭﺗﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺭﻭﺗﺮ ﺑﻪ ﻣﺮﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺖ ) (ISPﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺧﻄﻮﻁ
ﺍﺧﺘﺼﺎﺻﻲ ﺑﺎ ﺳﺮﻋﺖ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ .ﺧﻂ ﺍﺧﺘﺼﺎﺻﻲ T1ﻳﮏ ﻧﻤﻮﻧﻪ ﻣﺘﺪﺍﻭﻝ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺑﻮﺩﻩ ﻭ ﺩﺍﺭﺍﻱ ﺳﺮﻋﺖ ١,٥ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺍﺳﺖ .ﺑﺮﺧﻲ ﺍﺯ ﻣﻮﺳﺴﺎﺕ ﺑﺎ ﺗﻮﺟﻪ
ﺑﻪ ﺣﺴﺎﺳﻴﺖ ﻭ ﻧﻮﻉ ﮐﺎﺭ ﺧﻮﺩ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺍﺯ ﻳﮏ ﺧﻂ ﺩﻳﮕﺮ ﻧﻴﺰ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺭﻭﺗﺮ ﺑﺎ ISPﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ.
307
ﺧﻂ ﻓﻮﻕ ﺑﺼﻮﺭﺕ Backupﺑﻮﺩﻩ ﻭ ﺑﻤﺤﺾ ﺑﺮﻭﺯ ﺍﺷﮑﺎﻝ ﺩﺭ ﺧﻂ ﺍﺧﺘﺼﺎﺻﻲ) ﻣﺜﻼ"( T1
ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺧﻂ ﺩﻭﻡ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﺧﻂ ﻓﻮﻕ ﺑﺼﻮﺭﺕ ﻣﻮﻗﺖ ﻭ ﺩﺭ ﻣﻮﺍﻗﻊ ﺍﺿﻄﺮﺍﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ ،ﻣﻲ ﺗﻮﺍﻥ ﻳﮏ ﺧﻂ ﺑﺎ ﺳﺮﻋﺖ ﭘﺎﻳﻴﻦ ﺗﺮﺭﺍ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ.
ﺭﻭﺗﺮﻫﺎ ﻋﻼﻭﻩ ﺑﺮ ﻗﺎﺑﻠﻴﺖ ﺭﻭﺗﻴﻨﮓ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﻳﮏ ﻧﻘﻄﻪ ﺑﻪ ﻧﻘﻄﻪ ﺩﻳﮕﺮ ،ﺩﺍﺭﺍﻱ
ﺍﻣﮑﺎﻧﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺳﻴﺴﺘﻢ ﺍﻣﻨﻴﺘﻲ ﻧﻴﺰ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻣﺜﻼ" ﻣﻲ ﺗﻮﺍﻥ ﻣﺸﺨﺺ ﮐﺮﺩ ﮐﻪ ﻧﺤﻮﻩ ﺩﺳﺘﻴﺎﺑﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺧﺎﺭﺝ ﺍﺯ ﺷﺒﮑﻪ ﺩﺍﺧﻠﻲ ﺳﺎﺯﻣﺎﻥ ﺑﻪ ﺷﺒﮑﻪ ﺩﺍﺧﻠﻲ ﺑﻪ ﭼﻪ
ﺻﻮﺭﺕ ﺍﺳﺖ .ﺍﮐﺜﺮ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﻣﻮﺳﺴﺎﺕ ﺩﺍﺭﺍﻱ ﻳﮏ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻭ ﻳﺎ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﺧﺎﺹ ﻓﺎﻳﺮﻭﺍﻝ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻋﻤﺎﻝ ﺳﻴﺎﺳــﺖ ﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻗﻮﺍﻧــﻴﻦ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺩﺭ ﺟﺪﻭﻝ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺭﻭﺗﺮ ﺍﺯ ﻟﺤﺎﻅ ﺍﻣﻨﻴﺘﻲ ﺩﺍﺭﺍﻱ ﺻﻼﺑﺖ ﺑﻴﺸﺘﺮﻱ ﻣﻲ ﺑﺎﺷﻨﺪ.
ﻳﮑﻲ ﺍﺯ ﻋﻤﻠﻴﺎﺕ ﺍﺩﻭﺍﺭﻱ ) ﺗﮑﺮﺍﺭﻱ ( ﮐﻪ ﻫﺮ ﺭﻭﺗﺮ ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﺪ ،ﺁﮔﺎﻫﻲ ﺍﺯ ﺍﺳﺘﻘﺮﺍﺭ ﻳﮏ
ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﺷﺒﮑﻪ ﺩﺍﺧﻠﻲ ﺍﺳﺖ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻣﺮﺑﻮﻁ ﺑﻪ ﺷﺒﮑﻪ ﺩﺍﺧﻠﻲ ﺑﻮﺩﻩ ﻧﻴﺎﺯﻱ ﺑﻪ ﺭﻭﺕ ﻧﻤﻮﺩﻥ ﺁﻥ ﺗﻮﺳﻂ ﺭﻭﺗﺮ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ .ﺑﺪﻳﻦ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺯ
ﻣﮑﺎﻧﻴﺰﻣﻲ ﺑﺎ ﻧﺎﻡ Subnet maskﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ subnet .ﻣﺸﺎﺑﻪ ﻳﮏ ﺁﺩﺭﺱ IP ﺑﻮﺩﻩ ﻭ ﺍﻏﻠﺐ ﺑﺼﻮﺭﺕ ٢٥٥,٢٥٥,٢٥٥,٠ﺍﺳﺖ .ﺁﺩﺭﺱ ﻓﻮﻕ ﺑﻪ ﺭﻭﺗﺮ ﺍﻋﻼﻡ ﻣﻲ ﻧﻤﺎﻳﺪ ﮐﻪ ﺗﻤﺎﻡ ﭘﻴﺎﻡ ﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﻳﺎ ﮔﻴﺮﻧﺪﻩ ﮐﻪ ﺩﺍﺭﺍﻱ ﻳﮏ ﺁﺩﺭﺱ ﻣﺸﺘﺮﮎ ﺩﺭ ﺳﻪ ﮔﺮﻭﻩ
ﺍﻭﻝ ﻣﻲ ﺑﺎﺷﻨﺪ ،ﻣﺮﺑﻮﻁ ﺑﻪ ﻳﮏ ﺷﺒﮑﻪ ﻣﺸﺎﺑﻪ ﺑﻮﺩﻩ ﻭ ﻧﻴﺎﺯﻱ ﺑﻪ ﺍﺭﺳﺎﻝ ﺁﻧﻬﺎ ﺑﺮﺍﻱ ﻳﮏ ﺷﺒﮑﻪ ﺩﻳﮕﺮ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ.
ﻣﺜﻼ" ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺑﺎ ﺁﺩﺭﺱ ١٥,٥٧,٣١,٤٠ﭘﻴﺎﻣﻲ ﺭﺍ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﺎ ﺁﺩﺭﺱ ١٥,٥٧,٣١,٥٢ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ .ﺭﻭﺗﺮ ﮐﻪ ﺩﺭ ﺟﺮﻳﺎﻥ ﺗﻤﺎﻡ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺳﺖ ،ﺳﻪ ﮔﺮﻭﻩ ﺍﻭﻝ ﺩﺭ ﺁﺩﺭﺱ ﻫﺎﻱ ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﮔﻴﺮﻧﺪﻩ ﺭﺍ ﻣﻄﺎﺑﻘﺖ ﻣﻲ ﻧﻤﺎﻳﺪ ﻭ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﺩﺍﺧﻠﻲ ﻧﮕﻪ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ.
308
ﺁﮔﺎﻫﻲ ﺍﺯ ﻣﻘﺼﺪ ﻳﮏ ﭘﻴﺎﻡ
ﺭﻭﺗﺮ ﻳﮑﻲ ﺍﺯ ﻣﺠﻤﻮﻋﻪ ﺩﺳﺘﮕﺎﻫﻬﺎﺋﻲ ﺍﺳﺖ ﮐﻪ ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ .ﻫﺎﺏ، ﺳﻮﺋﻴﭻ ﻭ ﺭﻭﺗﺮ ﺳﻴﮕﻨﺎﻝ ﻫﺎﺋﻲ ﺭﺍ ﺍﺭ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻭ ﻳﺎ ﺷﺒﮑﻪ ﻫﺎ ﺩﺭﻳﺎﻓﺖ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻭ ﻳﺎ ﺷﺒﮑﻪ ﻫﺎﻱ ﺩﻳﮕﺮ ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﻧﺪ .ﺭﻭﺗﺮ ﺗﻨﻬﺎ ﺩﺳﺘﮕﺎﻩ ﻣﻮﺟﻮﺩ ﻣﻲ ﺑﺎﺷﺪ ﮐﻪ
ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻣﺴﻴﺮ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺗﺼﻤﻴﻢ ﮔﻴﺮﻱ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ،ﺭﻭﺗﺮﻫﺎ ﻣﻲ ﺑﺎﻳﺴﺖ ﻧﺴﺒﺖ ﺑﻪ ﺩﻭ ﻣﻮﺿﻮﻉ ﺁﮔﺎﻫﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ :ﺁﺩﺭﺱ ﻫﺎ ﻭ ﺳﺎﺧﺘﺎﺭ ﺷﺒﮑﻪ.
ﺯﻣﺎﻧﻴﮑﻪ ﺗﻮﺳﻂ ﻳﮑﻲ ﺍﺯ ﺩﻭﺳﺘﺎﻧﺘﺎﻥ ﺑﺮﺍﻱ ﺷﻤﺎ ﻳﮏ ﮐﺎﺭﺕ ﺗﺒﺮﻳﮏ ﺳﺎﻝ ﻧﻮ ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ ، ﺍﺯ ﺁﺩﺭﺳﻲ ﻣﻄﺎﺑﻖ ﺯﻳﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ " :ﺗﻬﺮﺍﻥ -ﺧﻴﺎﺑﺎﻥ ﺍﻳﺮﺍﻥ -ﮐﻮﭼﻪ ﺷﻤﻴﺮﺍﻧﺎﺕ -ﭘﻼﮎ " ١١٠ﺁﺩﺭﺱ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﭼﻨﺪﻳﻦ ﺑﺨﺶ ﺑﻮﺩﻩ ﮐﻪ ﺑﻪ ﺍﺩﺍﺭﻩ ﭘﺴﺖ ﻣﺮﺑﻮﻃﻪ ﺍﻣﮑﺎﻥ ﭘﻴﺪﺍ ﻧﻤﻮﺩﻥ
ﺁﺩﺭﺱ ﻓﻮﻕ ﺭﺍ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮐﺪ ﭘﺴﺘﻲ ﺑﺎﻋﺚ ﺳﺮﻋﺖ ﺩﺭ ﺍﺭﺳﺎﻝ ﮐﺎﺭﺕ ﺗﺒﺮﻳﮏ ﻭ ﺩﺭﻳﺎﻓﺖ ﺁﻥ ﺗﻮﺳﻂ ﺷﺨﺺ ﻣﻮﺭﺩ ﻧﻈﺮ ﻣﻲ ﻧﻤﺎﻳﺪ .ﻭﻟﻲ ﺣﺘﻲ ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﺯ ﮐﺪ ﭘﺴﺘﻲ ﻫﻢ
ﺍﺳﺘﻔﺎﺩﻩ ﻧﺸﻮﺩ ،ﺍﻣﮑﺎﻥ ﺩﺭﻳﺎﻓﺖ ﮐﺎﺭﺕ ﺗﺒﺮﻳﮏ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺸﺨﺺ ﺷﺪﻥ ﺷﻬﺮﺳﺘﺎﻥ ،ﺧﻴﺎﺑﺎﻥ ،ﮐﻮﭼﻪ ﻭ ﭘﻼﮎ ﻧﻴﺰ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ. ﺁﺩﺭﺱ ﻓﻮﻕ ﻳﮏ ﻧﻮﻉ ﺁﺩﺭﺱ ﻣﻨﻄﻘﻲ ﺍﺳﺖ .ﺁﺩﺭﺱ ﻓﻮﻕ ﺭﻭﺷﻲ ﺭﺍ ﺑﺮﺍﻱ ﺩﺭﻳﺎﻓﺖ ﮐﺎﺭﺕ ﺗﺒﺮﻳﮏ ،ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺁﺩﺭﺱ ﻓﻮﻕ ﺑﻪ ﻳﮏ ﺁﺩﺭﺱ ﻓﻴﺰﻳﮑﻲ ﻣﺮﺗﺒﻂ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﻫﺮ ﻳﮏ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﮐﻪ ﺑﻪ ﺷﺒﮑﻪ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ ،ﺩﺍﺭﺍﻱ ﻳﮏ ﺁﺩﺭﺱ ﻓﻴﺰﻳﮑﻲ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺁﺩﺭﺱ ﻓﻮﻕ ﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ ﺑﻮﺩﻩ ﻭ ﺗﻮﺳﻂ ﺩﺳﺘﮕﺎﻫﻲ ﮐﻪ ﺑﻪ ﮐﺎﺑﻞ ﺷﺒﮑﻪ ﻣﺘﺼﻞ ﺍﺳﺖ ،ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺧﻮﺍﻫﺪ ﺷﺪ .ﻣﺜﻼ" ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﻤﺎ ﺩﺍﺭﺍﻱ ﻳﮏ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ) (NICﻣﻲ ﺑﺎﺷﺪ ،ﮐﺎﺭﺕ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﻳﮏ ﺁﺩﺭﺱ ﻓﻴﺰﻳﮑﻲ ﺩﺍﺋﻤﻲ ﺑﻮﺩﻩ ﮐﻪ ﺩﺭ ﻳﮏ ﻣﺤﻞ ﺧﺎﺹ ﺍﺯ ﺣﺎﻓﻈﻪ ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺍﺳﺖ .ﺁﺩﺭﺱ ﻓﻴﺰﻳﮑﻲ ﮐﻪ ﺁﺩﺭﺱ Media Access ( MAC (Controlﻧﻴﺰ ﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ ،ﺩﺍﺭﺍﻱ ﺩﻭ ﺑﺨﺶ ﺑﻮﺩﻩ ﮐﻪ ﻫﺮ ﻳﮏ ﺳﻪ ﺑﺎﻳﺖ ﻣﻲ ﺑﺎﺷﻨﺪ. ﺍﻭﻟﻴﻦ ﺳﻪ ﺑﺎﻳﺖ ،ﺷﺮﮐﺖ ﺳﺎﺯﻧﺪﻩ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﻭﻣﻴﻦ ﺳﻪ ﺑﺎﻳﺖ ﻳـﮏ
ﺷﻤﺎﺭﻩ ﺳﺮﻳﺎﻝ ﻣﺮﺑﻮﻁ ﺑﻪ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺍﺳﺖ. 309
ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻲ ﺗﻮﺍﻧﺪ ﺩﺍﺭﺍﻱ ﭼﻨﺪﻳﻦ ﺁﺩﺭﺱ ﻣﻨﻄﻘﻲ ﺩﺭ ﻳﮏ ﻟﺤﻈﻪ ﺑﺎﺷﺪ .ﻭﺿﻌﻴﺖ ﻓﻮﻕ
ﺩﺭﺭﺍﺑﻄﻪ ﺑﺎ ﺍﺷﺨﺎﺹ ﻧﻴﺰ ﺻﺪﻕ ﻣﻲ ﮐﻨﺪ .ﻣﺜﻼ" ﻳﮏ ﺷﺨﺺ ﻣﻲ ﺗﻮﺍﻧﺪ ﺩﺍﺭﺍﻱ ﺁﺩﺭﺱ ﭘﺴﺘﻲ، ﺷﻤﺎﺭﻩ ﺗﻠﻔﻦ ،ﺁﺩﺭﺱ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ﻭ ...ﺑﺎﺷﺪ .ﺍﺯ ﻃﺮﻳﻖ ﻫﺮ ﻳﮏ ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ ﻓﻮﻕ ﺍﻣﮑﺎﻥ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﺑﺮﺍﻱ ﺷﻤﺎ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﺁﺩﺭﺱ ﻫﺎﻱ ﻣﻨﻄﻘﻲ ﺩﺭ ﮐﺎﻣﭙﻴﻮﻧﺮ ﻧﻴﺰ ﻣﺸﺎﺑﻪ
ﺳﻴﺴﺘﻢ ﻓﻮﻕ ﮐﺎﺭ ﻣﻲ ﮐﻨﻨﺪ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﻣﻤﮑﻦ ﺍﺳﺖ ﺍﺯ ﻣﺪﻝ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺁﺩﺭﺱ ﺩﻫﻲ ﻭ ﻳﺎ
ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺑﻄﻮﺭ ﻫﻤﺰﻣﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ .ﺩﺭ ﺯﻣﺎﻥ ﺍﺗﺼﺎﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ،ﺷﻤﺎ ﺩﺍﺭﺍﻱ ﻳﮏ ﺁﺩﺭﺱ ﺑﻮﺩﻩ ﮐﻪ ﺍﺯ ﭘﺮﻭﺗﮑﻞ TCP/IPﻣﺸﺘﻖ ﺷﺪﻩ ﺍﺳﺖ .ﺩﺭ
ﺻﻮﺭﺗﻲ ﮐﻪ ﺩﺍﺭﺍﻱ ﻳﮏ ﺷﺒﮑﻪ ﮐﻮﭼﮏ ﻣﻲ ﺑﺎﺷﻴﺪ ،ﻣﻤﮑﻦ ﺍﺳﺖ ﺍﺯ ﭘﺮﻭﺗﮑﻞ NetBEUI
ﻣﺎﻳﮑﺮﻭﺳﺎﻓﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﺋﻴﺪ .ﺑﻬﺮﺣﺎﻝ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻲ ﺗﻮﺍﻧﺪ ﺩﺍﺭﺍﻱ ﭼﻨﺪﻳﻦ ﺁﺩﺭﺱ ﻣﻨﻄﻘﻲ ﺑﻮﺩﻩ ﮐﻪ ﭘﺮﻭﺗﮑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﻗﺎﻟﺐ ﺁﺩﺭﺱ ﻓﻮﻕ ﺭﺍ ﻣﺸﺨﺺ ﺧﻮﺍﻫﺪ ﮐﺮﺩ. ﺁﺩﺭﺱ ﻓﻴﺰﻳﮑﻲ ﻳﮏ ﮐﺎﻣﭙﻴﻮﻧﺮ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﻳﮏ ﺁﺩﺭﺱ ﻣﻨﻄﻘﻲ ﺗﺒﺪﻳﻞ ﮔﺮﺩﺩ .ﺍﺯ ﺁﺩﺭﺱ ﻣﻨﻄﻘﻲ ﺩﺭ ﺷﺒﮑﻪ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺮﺍﻱ ﻣﺸﺎﻫﺪﻩ ﺁﺩﺭﺱ
ﻓﻴﺰﻳﮑﻲ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺧﻮﺩ ﻣﻲ ﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺩﺳﺘﻮﺭ ) IPCONFIGﻭﻳﻨﺪﻭﺯ ٢٠٠٠ﻭ (XPﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﺪ.
ﭘﺮﻭﺗﮑﻞ ﻫﺎ
ﺍﻭﻟﻴﻦ ﻭ ﻣﻬﻤﺘﺮﻳﻦ ﻭﻇﻴﻔﻪ ﺭﻭﺗﺮ ،ﺁﮔﺎﻫﻲ ﺍﺯ ﻣﺤﻠﻲ ﺍﺳﺖ ﮐﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻝ
ﮔﺮﺩﻧﺪ. 310
ﺍﮐﺜﺮ ﺭﻭﺗﺮﻫﺎ ﮐﻪ ﻳﮏ ﭘﻴﺎﻡ ﺭﺍ ﺑﺮﺍﻱ ﺷﻤﺎ ﻣﺴﻴﺮﻳﺎﺑﻲ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﺍﺯ ﺁﺩﺭﺱ ﻓﻴﺰﻳﮑﻲ
ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﻤﺎ ﺁﮔﺎﻫﻲ ﻧﺪﺍﺭﻧﺪ .ﺭﻭﺗﺮﻫﺎ ﺑﻪ ﻣﻨﻈﻮﺭ ﺷﻨﺎﺧﺖ ﺍﮐﺜﺮ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺭﺍﻳﺞ ،ﺑﺮﻧﺎﻣﻪ
ﺭﻳﺰﻱ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺭﻭﺗﺮﻫﺎ ﻧﺴﺒﺖ ﺑﻪ ﻓﻮﺭﻣﺖ ﻫﺮ ﻳﮏ ﺍﺯ ﻣﺪﻝ ﻫﺎﻱ ﺁﺩﺭﺱ ﺩﻫﻲ ﺩﺍﺭﺍﻱ ﺷﻨﺎﺧﺖ ﻣﻨﺎﺳﺐ ﻣﻲ ﺑﺎﺷﻨﺪ ) .ﺗﻌﺪﺍﺩ ﺑﺎﻳﺖ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻫﺮ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ،ﺁﮔﺎﻫﻲ ﺍﺯ ﻧﺤﻮﻩ ﺍﺭﺳﺎﻝ ﺩﺭﺳﺖ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﻣﻘﺼﺪ ﻭ (...ﺭﻭﺗﺮﻫﺎ ﺑﻪ ﻋﻨﻮﺍﻥ ﻣﻬﻤﺘﺮﻳﻦ ﻋﻨﺎﺻﺮ ﺩﺭ
ﺍﻳﺠﺎﺩ ﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ ﺍﻳﻨﺘﺮﻧﺖ ﻣﻄﺮﺡ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺭﻭﺗﺮﻫﺎ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ ﻣﻴﻠﻴﻮﻥ ﻫﺎ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﻣﺴﻴﺮﻳﺎﺑﻲ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺍﺭﺳﺎﻝ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈﺮ ،ﺗﻨﻬﺎ ﻭﻇﻴﻔﻪ ﻳﮏ
ﺭﻭﺗﺮ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ .ﺭﻭﺗﺮﻫﺎ ﻣﻲ ﺑﺎﻳﺴﺖ ﻗﺎﺩﺭ ﺑﻪ ﻳﺎﻓﺘﻦ ﺑﻬﺘﺮﻳﻦ ﻣﺴﻴﺮ ﻣﻤﮑﻦ ﺑﺎﺷﻨﺪ .ﺩﺭﻳﮏ
ﺷﺒﮑﻪ ﭘﻴﺸﺮﻓﺘﻪ ﻫﺮ ﭘﻴﺎﻡ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ﺑﻪ ﭼﻨﺪﻳﻦ ﺑﺨﺶ ﮐﻮﭼﮑﺘﺮ ﺗﻘﺴﻴﻢ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺨﺶ ﻫﺎﻱ ﻓﻮﻕ ﺑﺼﻮﺭﺕ ﻣﺠﺰﺍ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭ ﻣﻘﺼﺪ ﻣﺠﺪﺩﺍ" ﺑﺎ ﺗﺮﮐﻴﺐ ﺑﺨﺶ ﻫﺎﻱ ﻓﻮﻕ ﺑﻴﮑﺪﻳﮕﺮ ،ﭘﻴﺎﻡ
ﺍﻭﻟﻴﻪ ﺷﮑﻞ ﻭﺍﻗﻌﻲ ﺧﻮﺩ ﺭﺍ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺑﺨﺶ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺷﺎﺭﻩ ﺷﺪﻩ Packet
ﻧﺎﻣﻴﺪﻩ ﺷﺪﻩ ﻭ ﻫﺮ ﻳﮏ ﺍﺯﺁﻧﺎﻥ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺍﺯ ﻳﮏ ﻣﺴﻴﺮ ﺧﺎﺹ ﺍﺭﺳﺎﻝ ﮔﺮﺩﻧﺪ .ﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎ ﺭﺍ network Packet-Switchedﻣﻲ ﮔﻮﻳﻨﺪ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻓﻮﻕ ﻳﮏ ﻣﺴﻴﺮ
ﺍﺧﺘﺼﺎﺻﻲ ﺑﻴﻦ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻓﺮﺳﺘﻨﺪﻩ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻭ ﮔﻴﺮﻧﺪﻩ ﺍﻳﺠﺎﺩ ﻧﺨﻮﺍﻫﺪ ﮔﺮﺩﻳﺪ .ﭘﻴﺎﻡ
ﻫﺎﻱ ﺍﺭﺳﺎﻟﻲ ﺍﺯ ﻃﺮﻳﻖ ﻳﮑﻲ ﺍﺯ ﻫﺰﺍﺭﺍﻥ ﻣﺴﻴﺮ ﻣﻤﮑﻦ ﺣﺮﮐﺖ ﺗﺎ ﺩﺭ ﻧﻬﺎﻳﺖ ﺗﻮﺳﻂ ﮐﺎﻣﭙﻴﻮﺗﺮ ﮔﻴﺮﻧﺪﻩ ،ﺩﺭﻳﺎﻓﺖ ﮔﺮﺩﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺗﺮﺍﻓﻴﮏ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻣﻤﮑﻦ ﺍﺳﺖ ﺩﺭ ﺑﺮﺧﻲ ﺣﺎﻻﺕ ﻋﻨﺎﺻﺮ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻟﻮﺩ ﺑﺎﻻﺋﻲ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ،ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ﺭﻭﺗﺮﻫﺎ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺍﺭﺗﺒﺎﻁ ﻭ ﺗﺮﺍﻓﻴﮏ ﺷﺒﮑﻪ ﺭﺍ ﺑﻬﻴﻨﻪ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ ) .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺴﻴﺮﻫﺎﻱ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺎﺗﻮﺟﻪ ﺑﻪ ﻭﺟﻮﺩ ﺗﺮﺍﻓﻴﮏ ﺑﺎﻻ ﺩﺭ ﺑﺨﺶ ﻫﺎﻱ ﺧﺎﺻﻲ ﺍﺯ ﺷﺒﮑﻪ( ﺭﺩﻳﺎﺑﻲ ﻳﮏ ﭘﻴﺎﻡ ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﺯ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻭﻳﻨﺪﻭﺯ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﺋﻴﺪ ،ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘﻮﺭ Tracerouteﻣﻲ ﺗﻮﺍﻧﻴﺪ ﻣﺴﻴﺮ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺩﻧﺒﺎﻝ ﻧﻤﺎﺋﻴﺪ.
311
ﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ ﺍﻳﻨﺘﺮﻧﺖ
ﺑﺎﺗﻮﺟﻪ ﺑﻪ ﮔﺴﺘﺮﺩﮔﻲ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﻭﺟﻮﺩ ﻣﻴﻠﻴﻮﻥ ﻫﺎ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ ﺑﻪ
ﻣﻨﻈﻮﺭ ﻣﺴﻴﺮﻳﺎﺑﻲ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﺭﻭﺗﺮﻫﺎﻱ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ﺍﺳﺘﻔﺎﺩﻩ ﺷﻮﺩ .ﺭﻭﺗﺮ ﺳﺮﻱ ١٢٠٠٠ ﺳﻴﺴﮑﻮ ﻳﮑﻲ ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ﺭﻭﺗﺮﻫﺎ ﺑﻮﺩﻩ ﮐﻪ ﺑﻪ ﻋﻨﻮﺍﻥ ﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ ﺍﺻﻠﻲ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﺷﻮﺩ .ﺗﮑﻨﻮﻟﻮﮊﻱ ﺑﮑﺎﺭ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺩﺭ ﻃﺮﺍﺣﻲ ﺭﻭﺗﺮﻫﺎﻱ ﻓﻮﻕ ﻣﺸﺎﺑﻪ ﺳﻮﭘﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻣﻲ ﺑﺎﺷﺪ ) .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﺩﺍﺯﻧﺪﻩ ﻫﺎﻱ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ﺑﻬﻤﺮﺍﻩ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺳﻮﻳﺌﭻ ﻫﺎﻱ ﭘﺮ ﺳﺮﻋﺖ ( .ﺩﺭ ﺭﻭﺗﺮ ﻣﺪﻝ ١٢٠٠٠ﺍﺯ ﭘﺮﺩﺍﺯﻧﺪﻩ ﻫﺎﻱ MHZ MIPS R5000٢٠٠ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﺷﻮﺩ ، ١٢٠١٦ .ﻳﮑﻲ ﺍﺯ ﻣﺪﻝ ﻫﺎﻱ ﺳﺮﻱ ﻓﻮﻕ ﺍﺳﺖ .ﻣﺪﻝ ﻓﻮﻕ ﻗﺎﺩﺭ ﺩﺍﺭﺍﻱ ﺗﻮﺍﻥ ﻋﻤﻠﻴﺎﺕ ٣٢٠ﻣﻴﻠﻴﺎﺭﺩ ﺑﻴﺖ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺩﺭ ﺛﺎﻧﻴﻪ ﺭﺍ ﺩﺍﺭﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻣﺪﻝ ﻓﻮﻕ ﺑﺎ
ﺗﻤﺎﻡ ﺗﻮﺍﻥ ﻭ ﻇﺮﻓﻴﺖ ﺧﻮﺩ ﻧﺼﺐ ﮔﺮﺩﺩ ،ﺍﻣﮑﺎﻥ ﺍﻧﺘﻘﺎﻝ ٦٠ﻣﻴﻠﻴﻮﻥ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﻫﺮﺛﺎﻧﻴﻪ ﺭﺍ ﺩﺍﺭﺍ ﺍﺳﺖ.
ﺭﻭﺗﺮﻫﺎ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺟﺪﻭﻝ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺧﻮﺩ ﻗﺎﺩﺭ ﺑﻪ ﻣﺴﻴﺮﻳﺎﺑﻲ ﺻﺤﻴﺢ ﺑﺴﺘﻪ ﻫﺎﻱ
ﺍﻃﻼﻋﺎﺗﻲ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﻗﻮﺍﻧﻴﻦ ﻣﻮﺟﻮﺩ ﺩﺭ ﺟﺪﻭﻝ ﻓﻮﻕ ﺳﻴﺎﺳﺖ ﻣﺴﻴﺮﻳﺎﺑﻲ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺗﺒﻴﻦ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ .ﻗﺒﻞ ﺍﺯ ﺍﺭﺳﺎﻝ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺗﻮﺳﻂ ﻣﺴﻴﺮ ﻣﺸﺨﺺ ﺷﺪﻩ ،ﺭﻭﺗﺮ ﺧﻂ ) ﻣﺴﻴﺮ ( ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﺍﺯ ﺍﺯ ﻧﻘﻄﻪ ﻧﻈﺮ ﮐﺎﺭﺁﺋﻲ ﺑﺮﺭﺳﻲ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻣﺴﻴﺮ ﻓﻮﻕ ﻓﺎﻗﺪ ﮐﺎﺭﺁﺋﻲ ﻻﺯﻡ ﺑﺎﺷﺪ ،ﺭﻭﺗﺮ ﻣﺴﻴﺮ ﻓﻮﻕ ﺭﺍ ﭼﺸﻢ ﭘﻮﺷﻲ ﻧﻤﻮﺩﻩ ﻭ
ﻣﺠﺪﺩﺍ" ﻳﮏ ﻣﺴﻴﺮ ﺩﻳﮕﺮ ﺭﺍ ﻣﺸﺨﺺ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﭘﺲ ﺍﺯ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﮐﺎﺭﺁﺋﻲ ﻣﺴﻴﺮ ﻣﺸﺨﺺ ﺷﺪﻩ ،ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺗﻮﺳﻂ ﻣﺴﻴﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﮔﺮﺩﻳﺪ .ﺗﻤﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﺻﺮﻓﺎ" ﺩﺭ ﮐﺴﺮﻱ ﺍﺯ ﺛﺎﻧﻴﻪ ﺍﻧﺠﺎﻡ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ ،ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ﻣﻴﻠﻴﻮﻥ ﻫﺎ ﻣﺮﺗﺒﻪ ﺗﮑﺮﺍﺭ ﺧﻮﺍﻫﺪ ﺷﺪ. ﺁﮔﺎﻫﻲ ﺍﺯ ﻣﺤﻠﻲ ﮐﻪ ﭘﻴﺎﻡ ﻫﺎ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺭﺳﺎﻝ ﮔﺮﺩﻧﺪ ،ﻣﻬﻤﺘﺮﻳﻦ ﻭﻇﻴﻔﻪ ﻳﮏ ﺭﻭﺗﺮ ﺍﺳﺖ .ﺑﺮﺧﻲ ﺍﺯ ﺭﻭﺗﺮﻫﺎﻱ ﺳﺎﺩﻩ ،ﺻﺮﻓﺎ" ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﺍﺩﻩ ﻭ ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﺍﺯ ﺭﻭﺗﺮﻫﺎ ﻋﻤﻠﻴﺎﺕ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮ ﻭ ﭘﻴﭽﻴﺪﻩ ﺗﺮﻱ ﺭﺍ ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﻨﺪ.
312
ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺍﻭﻟﻴﻪ ﺭﻭﺗﺮ ﺭﻭﺗﺮ ﻳﻚ ﻧﻮﻉ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺧﺎﺹ ﺍﺳﺖ ﻛﻪ ﺩﺍﺭﺍﻱ ﻋﻨﺎﺻﺮ ﻣﺸﺎﺑﻪ ﻳﻚ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺷﺨﺼﻲ ﻧﻈﻴﺮ ﭘﺮﺩﺍﺯﻧﺪﻩ ،ﺣﺎﻓﻈﻪ ،ﺧﻄﻮﻁ ﺩﺍﺩﻩ ﻭ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻣﺨﺘﻠﻒ ﻭﺭﻭﺩﻱ ﻭ ﺧﺮﻭﺟﻲ ﺍﺳﺖ .ﺭﻭﺗﺮﻫﺎ ﻧﻴﺰ ﻫﻤﺎﻧﻨﺪ ﻛﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻛﻪ ﺑﺮﺍﻱ ﺍﺟﺮﺍﻱ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﺑﻪ ﻳﻚ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻧﻴﺎﺯ
ﺩﺍﺭﻧﺪ ،ﺍﺯ ﺧﺪﻣﺎﺕ ﻳﻚ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﺩﺭ ﺍﺑﻌﺎﺩ ﮔﺴﺘﺮﺩﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﻓﺮﺁﻳﻨﺪ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺭﻭﺗﺮ ﺑﺎ ﺍﺳﺘﻘﺮﺍﺭ ﺑﺮﻧﺎﻣﻪ ، Bootstrapﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻭ ﻳﻚ ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺩﺭ ﺣﺎﻓﻈﻪ ﺁﻏﺎﺯ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﻛﻪ ﺭﻭﺗﺮ ﻧﺘﻮﺍﻧﺪ ﻳﻚ ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﺍ ﭘﻴﺪﺍ
ﻧﻤﺎﻳﺪ Setup mode ،ﻓﻌﺎﻝ ﻭ ﭘﺲ ﺍﺯ ﺍﺗﻤﺎﻡ ﻋﻤﻠﻴﺎﺕ ﺩﺭ ﺍﻳﻦ ، modeﻣﻲ ﺗﻮﺍﻥ ﻳﻚ ﻧﺴﺨﻪ backupﺍﺯ ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﺍ ﺩﺭ ﺣﺎﻓﻈﻪ NVRAMﺫﺧﻴﺮﻩ ﻧﻤﻮﺩ. ﻫﺪﻑ ﺍﺯ ﺍﺟﺮﺍﻱ ﺭﻭﺗﻴﻦ ﻫﺎﻱ ﺭﺍﻩ ﺍﻧﺪﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ، IOSﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﻭ ﺁﻏﺎﺯ ﻓﻌﺎﻟﻴﺖ ﻫﺎﻱ ﻳﻚ ﺭﻭﺗﺮ ﻣﻲ ﺑﺎﺷﺪ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﻻﺯﻡ ﺍﺳﺖ ﻋﻤﻠﻴﺎﺕ ﺯﻳﺮ ﺗﻮﺳﻂ ﺭﻭﺗﻴﻦ ﻫﺎﻱ ﺭﺍﻩ ﺍﻧﺪﺍﺯ ﺍﻧﺠﺎﻡ ﺷﻮﺩ : •
ﺣﺼﻮﻝ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺻﺤﺖ ﻋﻤﻠﻜﺮﺩ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﺭﻭﺗﺮ
•
ﻳﺎﻓﺘﻦ ﻭ ﺍﺳﺘﻘﺮﺍﺭ ﻧﺮﻡ ﺍﻓﺰﺍﺭ IOSﺩﺭ ﺣﺎﻓﻈﻪ
•
ﻳﺎﻓﺘﻦ ﻭ ﺑﻜﺎﺭﮔﻴﺮﻱ ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﺍﻩ ﺍﻧﺪﺍﺯ ﻭ ﻳﺎ ﻭﺭﻭﺩ ﺑﻪ setup mode
ﭘﺲ ﺍﺯ ﺭﻭﺷﻦ ﻛﺮﺩﻥ ﺭﻭﺗﺮ ،ﺩﺭ ﺍﻭﻟﻴﻦ ﺍﻗﺪﺍﻡ ﺑﺮﻧﺎﻣﻪ ﺍﻱ ﻣﻮﺳﻮﻡ ﺑﻪ ) POSTﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ
( power-on self-testﺍﺟﺮﺍﺀ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ﺩﺭ ﺣﺎﻓﻈﻪ ROMﺫﺧﻴﺮﻩ ﻭ ﻣﺸﺘﻤﻞ ﺑﺮ ﺭﻭﺗﻴﻦ ﻫﺎﺋﻲ ﺍﺳﺖ ﻛﻪ ﺗﻤﺎﻣﻲ ﻋﻨﺎﺻﺮ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﺭﻭﺗﺮ ﻧﻈﻴﺮ ﭘﺮﺩﺍﺯﻧﺪﻩ ،ﺣﺎﻓﻈﻪ ﻭ ﭘﻮﺭﺕ ﻫﺎﻱ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺷﺒﻜﻪ ﺭﺍ ﺑﺮﺭﺳﻲ ﻭ ﺗﺴﺖ ﻣﻲ ﻧﻤﺎﻳﺪ. ﭘﺲ ﺍﺯ ﺣﺼﻮﻝ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺻﺤﺖ ﻋﻤﻠﻜﺮﺩ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ،ﻓﺮﺁﻳﻨﺪ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺭﻭﺗﺮ ﺑﺮ ﺍﺳﺎﺱ
ﻣﺮﺍﺣﻞ ﺯﻳﺮ ﺩﻧﺒﺎﻝ ﻣﻲ ﺷﻮﺩ:
313
•
ﻣﺮﺣﻠﻪ ﺍﻭﻝ :ﺍﺟﺮﺍﻱ ﺑﺮﻧﺎﻣﻪ loader bootstrapﻣﻮﺟﻮﺩ ﺩﺭ ﺣﺎﻓﻈﻪ . ROMﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ،ﻣﺸﺘﻤﻞ ﺑﺮ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺴﺖ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﻭ ﻣﻘﺪﺍﺭﺩﻫﻲ ﺍﻭﻟﻴﻪ IOSﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﻭﻇﺎﻳﻒ ﻣﺤﻮﻟﻪ ﻣﻲ ﺑﺎﺷﺪ.
•
ﻣﺮﺣﻠﻪ ﺩﻭﻡ :ﻳﺎﻓﺘﻦ ﻣﺤﻞ ﺫﺧﻴﺮﻩ . IOSﻓﻴﻠﺪ ﺑﻮﺕ ﺭﻳﺠﺴﺘﺮ ﭘﻴﻜﺮﺑﻨﺪﻱ ،ﻣﻜﺎﻥ ﺫﺧﻴﺮﻩ IOSﺭﺍ ﺗﻌﻴﻴﻦ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﻛﻪ ﻣﺸﺨﺺ ﺷﺪﻩ ﺑﺎﺷﺪ ﻛﻪ ﻣﻲ ﺑﺎﻳﺴﺖ
IOSﺍﺯ ﻃﺮﻳﻖ ﺣﺎﻓﻈﻪ ﻓﻠﺶ ﺩﺭ ﺣﺎﻓﻈﻪ ﻣﺴﺘﻘﺮ ﮔﺮﺩﺩ ﻭﻟﻲ IOSﺩﺭ ﺣﺎﻓﻈﻪ ﻓﻠﺶ ﻣﻮﺟﻮﺩ ﻧﺒﺎﺷﺪ ،ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ IOSﺑﺎ ﺍﻣﻜﺎﻧﺎﺕ ﻣﺤﺪﻭﺩﺗﺮ ﺍﺯ ﻃﺮﻳﻖ ﺣﺎﻓﻈﻪ ROM ﺩﺭ ﺣﺎﻓﻈﻪ ﻣﺴﺘﻘﺮ ﺧﻮﺍﻫﺪ ﺷﺪ . •
ﻣﺮﺣﻠﻪ ﺳﻮﻡ :ﺍﺳﺘﻘﺮﺍﺭ IOS imageﺩﺭ ﺣﺎﻓﻈﻪ .ﺩﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ IOSﺩﺭ ﺣﺎﻓﻈﻪ ﻣﺴﺘﻘﺮ ﻣﻲ ﮔﺮﺩﺩ .ﭘﺲ ﺍﺯ ﺍﺳﺘﻘﺮﺍﺭ IOSﺩﺭ ﺣﺎﻓﻈﻪ ﻭ ﻋﻤﻠﻴﺎﺗﻲ ﺷﺪﻥ ﺁﻥ ،ﻟﻴﺴﺘﻲ
ﺍﺯ ﻋﻨﺎﺻﺮ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﻭ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﻧﻤﺎﻳﺸﮕﺮ )ﻛﺎﻣﭙﻴﻮﺗﺮ ﻭ ﻳﺎ
ﺗﺮﻣﻴﻨﺎﻝ( ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ. •
ﻣﺮﺣﻠﻪ ﭼﻬﺎﺭﻡ :ﺍﺳﺘﻘﺮﺍﺭ ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺩﺭ ﺣﺎﻓﻈﻪ ﻭ ﺍﺟﺮﺍﻱ ﺩﺳﺘﻮﺭﺍﺕ ﺁﻥ .ﺩﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺩﺭ ﺣﺎﻓﻈﻪ ، NVRAMﺩﺭﻭﻥ ﺣﺎﻓﻈﻪ ﺍﺻﻠﻲ
ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﻭ ﺩﺳﺘﻮﺭﺍﺕ ﺁﻥ ﻳﻜﻲ ﭘﺲ ﺍﺯ ﺩﻳﮕﺮﻱ ﺍﺟﺮﺍﺀ ﻣﻲ ﮔﺮﺩﻧﺪ. •
ﻣﺮﺣﻠﻪ ﭘﻨﺠﻢ :ﻓﻌﺎﻝ ﺷﺪﻥ mode Setupﺩﺭ ﺻﻮﺭﺗﻲ ﻛﻪ IOSﺑﮕﻮﻧﻪ ﺍﻱ ﺗﻨﻈﻴﻢ ﺷﺪﻩ ﺑﺎﺷﺪ ﻛﻪ ﻭﻱ ﺭﺍ ﻣﻠﺰﻡ ﺑﻪ ﺍﺳﺘﻘﺮﺍﺭ ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺍﺯ ﻃﺮﻳﻖ ﻳﻚ ﺳﺮﻭﻳﺲ
ﺩﻫﻨﺪﻩ TFTPﻭ ﻳﺎ NVRAMﻧﻤﺎﻳﺪ ﻭﻟﻲ ﺩﺭ ﻋﻤﻞ ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺩﺭ ﻫﻴﭽﻴﻚ ﺍﺯ ﻣﻜﺎﻥ ﻫﺎﻱ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﻣﻮﺟﻮﺩ ﻧﺒﺎﺷﺪ ،ﺭﻭﺗﻴﻦ automated setupﻣﻘﺪﺍﺭﺩﻫﻲ ﺍﻭﻟﻴﻪ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺍﻳﻦ modeﺍﻣﻜﺎﻧﺎﺕ ﻭ ﺗﺴﻬﻴﻼﺕ ﻻﺯﻡ ﺑﺮﺍﻱ ﻧﺼﺐ ﺣﺪﺍﻗﻞ
ﭘﻴﻜﺮﺑﻨﺪﻱ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻣﺪﻳﺮﻳﺖ ﺷﺒﻜﻪ ﮔﺬﺍﺷﺘﻪ ﻣﻲ ﺷﻮﺩ .ﺩﺭ setup ، modeﭘﺎﺳﺦ ﻫﺎﻱ ﭘﻴﺶ ﻓﺮﺽ ﺑﻴﻦ ﻋﻼﻣﺖ ][ ﻧﺸﺎﻥ ﺩﺍﺩﻩ ﺷﺪﻩ ﻭ ﭘﺲ ﺍﺯ ﻓﺸﺮﺩﻥ ﻛﻠﻴﺪ ،Enterﮔﺰﻳﻨﻪ ﭘﻴﺶ ﻓﺮﺽ ﺍﻧﺘﺨﺎﺏ ﻣﻲ ﮔﺮﺩﺩ .ﭘﺲ ﺍﺯ ﺗﻜﻤﻴﻞ ﻓﺮﺁﻳﻨﺪ ﭘﻴﻜﺮﺑﻨﺪﻱ ،ﮔﺰﻳﻨﻪ ﻫﺎﻱ ﺯﻳﺮ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﻧﺪ: 314
Setup mode [0] Go to the IOS command prompt without saving this config. [1] Return back to the setup without saving this config. [2] Save this configuration to nvram and exit. Enter your selection [2]: ﭼﺮﺍﻍ ﻫﺎﻱ LEDs ﺩﺭ ﺯﻣﺎﻥ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺭﻭﺗﺮ ،ﻫﺮ LEDﻣﻮﺟﻮﺩ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺭﺳﺎﻟﺖ ﺧﻮﺩ ﻣﻲ ﺗﻮﺍﻧﺪ ﺍﻃﻼﻋﺎﺕ
ﻣﻔﻴﺪﻱ ﺭﺍ ﺍﺭﺍﺋﻪ ﻧﻤﺎﻳﺪ .ﻣﺜﻼ" LEDﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ،ﻭﺿﻌﻴﺖ ﻫﺮ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺭﺍ ﻧﺸﺎﻥ
ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﻛﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻓﻌﺎﻝ ﻭ ﺑﻪ ﺩﺭﺳﺘﻲ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﺎﺷﺪ ﻭﻟﻲ LEDﺁﻥ ﺧﺎﻣﻮﺵ ﺍﺳﺖ ،ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮﺍﻱ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻳﻚ ﻣﺸﻜﻞ ﺧﺎﺹ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺑﺎﺷﺪ. ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺳﻴﺴﺘﻢ ﻭ ﻧﻤﺎﻳﺶ ﭘﻴﺎﻡ ﻫﺎ ﻭ ﺍﻃﻼﻋﺎﺕ ﻣﺨﺘﻠﻒ
ﺩﺭ ﺯﻣﺎﻥ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺭﻭﺗﺮ ﺍﻃﻼﻋﺎﺕ ﻭ ﭘﻴﺎﻡ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺑﺮ ﺭﻭﻱ ﻧﻤﺎﻳﺸﮕﺮ ﻛﺎﻣﭙﻴﻮﺗﺮ ﻭ ﻳﺎ ﺗﺮﻣﻴﻨﺎﻝ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺍﻃﻼﻋﺎﺕ ﻓﻮﻕ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﻮﻉ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺭﻭﺗﺮ ﻭ ﻧﺴﺨﻪ IOS
ﻣﺘﻔﺎﻭﺕ ﻣﻲ ﺑﺎﺷﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺑﺮﺧﻲ ﺍﺯ ﭘﻴﺎﻡ ﻫﺎ ﺩﺭ ﺯﻣﺎﻥ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺭﻭﺗﺮ ﺍﺷﺎﺭﻩ ﻣﻲ ﮔﺮﺩﺩ: •
ﻧﻤﺎﻳﺶ ﭘﻴﺎﻡ ",NVRAM invalid
possibly due to write
"eraseﺩﺭ ﺯﻣﺎﻥ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺭﻭﺗﺮ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺭﺍ ﺍﻋﻼﻡ ﻣﻲ ﻧﻤﺎﻳﺪ ﻛﻪ ﺭﻭﺗﺮ ﺗﺎﻛﻨﻮﻥ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻧﺸﺪﻩ ﻭ ﻳﺎ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺣﺎﻓﻈﻪ NVRAMﺁﻥ ﺣﺬﻑ ﺷﺪﻩ ﺍﺳﺖ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ﻻﺯﻡ ﺍﺳﺖ ﻛﻪ ﺭﻭﺗﺮ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﺪﻩ ﻭ ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺩﺭ ﺣﺎﻓﻈﻪ NVRAMﺫﺧﻴﺮﻩ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﺍﺯ ﻓﺎﻳﻞ ﻓﻮﻕ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ .ﺗﻨﻈﻤﻴﺎﺕ ﭘﻴﺶ ﻓﺮﺽ ﺑﺮﺍﻱ ﺭﻳﺠﺴﺘﺮ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻣﻘﺪﺍﺭ X2102٠ﻣﻲ ﺑﺎﺷﺪ ﻛﻪ ﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﺫﺧﻴﺮﻩ image IOS
315
ﺩﺭ ﺣﺎﻓﻈﻪ ﻓﻠﺶ ﺍﺳﺖ ﻭ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﻃﺮﻳﻖ ﺣﺎﻓﻈﻪ ﻓﻮﻕ ﺑﻪ ﺩﺭﻭﻥ ﺣﺎﻓﻈﻪ ﺍﺻﻠﻲ
ﻣﻨﺘﻘﻞ ﮔﺮﺩﺩ . •
ﻧﻤﺎﻳﺶ ﺍﻃﻼﻋﺎﺕ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﻭ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﺭﻭﺗﺮ .ﺩﺭ ﺯﻣﺎﻥ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺭﻭﺗﺮ،
ﺍﻃﻼﻋﺎﺕ ﻣﺘﻔﺎﻭﺗﻲ ﻧﻈﻴﺮ ﺷﻤﺎﺭﻩ ﻧﺴﺨﻪ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ، IOS ، bootstrapﻣﺪﻝ ﺭﻭﺗﺮ ،ﻧﻮﻉ ﭘﺮﺩﺍﺯﻧﺪﻩ ،ﻣﻴﺰﺍﻥ ﺣﺎﻓﻈﻪ ،ﺗﻌﺪﺍﺩ ﻭ ﻧﻮﻉ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ﺑﺮ ﺭﻭﻱ ﺻﻔﺤﻪ ﻧﻤﺎﻳﺸﮕﺮ ﻛﺎﻣﭙﻴﻮﺗﺮ ﻭ ﻳﺎ ﺗﺮﻣﻴﻨﺎﻝ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ.
316
ﺁﺷﻨﺎﺋﻲ ﺑﺎ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﺭﻭﺗﺮ ) IOSﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ ،( Internetwork Operating Systemﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺍﺳﺖ ﻛﻪ ﺍﺯ ﺁﻥ ﺑﻪ ﻣﻨﻈﻮﺭ ﻛﻨﺘﺮﻝ ﺭﻭﺗﻴﻨﮓ ﻭ ﺳﻮﺋﻴﭽﻴﻨﮓ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﺑﻴﻦ ﺷﺒﻜﻪ ﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ. ﺁﺷﻨﺎﺋﻲ ﺑﺎ IOSﺑﺮﺍﻱ ﺗﻤﺎﻣﻲ ﻣﺪﻳﺮﺍﻥ ﺷﺒﻜﻪ ﻭ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺪﻳﺮﻳﺖ ﻭ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺩﺳﺘﮕﺎﻩ ﻫﺎﺋﻲ ﻧﻈﻴﺮ ﺭﻭﺗﺮ ﻭ ﻳﺎ ﺳﻮﺋﻴﭻ ﺍﻟﺰﺍﻣﻲ ﺍﺳﺖ.
ﺩﺭ ﺍﻳﻦ ﻣﻄﻠﺐ ﭘﺲ ﺍﺯ ﻣﻌﺮﻓﻲ ﺍﻭﻟﻴﻪ IOSﺑﻪ ﺑﺮﺭﺳﻲ ﺑﺮﺧﻲ ﺍﺯ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﺁﻥ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ.
IOSﻭ ﺿﺮﻭﺭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ
ﻳﻚ ﺭﻭﺗﺮ ﻭ ﻳﺎ ﺳﻮﺋﻴﭻ ﺑﺪﻭﻥ ﻭﺟﻮﺩ ﻳﻚ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻗﺎﺩﺭ ﺑﻪ ﺍﻧﺠﺎﻡ ﻭﻇﺎﻳﻒ ﺧﻮﺩ ﻧﻤﻲ ﺑﺎﺷﻨﺪ)ﻫﻤﺎﻧﻨﺪ ﻳﻚ ﻛﺎﻣﭙﻴﻮﺗﺮ ( .ﺷﺮﻛﺖ ﺳﻴﺴﻜﻮ ،ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ Cisco IOSﺭﺍ ﺑﺮﺍﻱ ﻃﻴﻒ
ﮔﺴﺘﺮﺩﻩ ﺍﻱ ﺍﺯ ﻣﺤﺼﻮﻻﺕ ﺷﺒﻜﻪ ﺍﻱ ﺧﻮﺩ ﻃﺮﺍﺣﻲ ﻭ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻧﻤﻮﺩﻩ ﺍﺳﺖ .ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻓﻮﻕ ،ﺟﺰﺀ ﻻﻳﻨﻔﻚ ﺩﺭ ﻣﻌﻤﺎﺭﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺭﻭﺗﺮﻫﺎﻱ ﺳﻴﺴﻜﻮ ﻣﻲ ﺑﺎﺷﺪ ﻭ ﻫﻤﭽﻨﻴﻦ ﺑﻪ ﻋﻨﻮﺍﻥ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﺩﺭ ﺳﻮﺋﻴﭻ ﻫﺎﻱ Catalystﺍﻳﻔﺎﻱ ﻭﻇﻴﻔﻪ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺑﺪﻭﻥ ﻭﺟﻮﺩ ﻳﻚ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ،ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﻗﺎﺩﺭ ﺑﻪ ﺍﻧﺠﺎﻡ ﻫﻴﭽﮕﻮﻧﻪ ﻋﻤﻠﻴﺎﺗﻲ ﻧﺨﻮ ﺍﻫﺪ ﺑﻮﺩ ) .ﻋﺪﻡ ﺗﺎﻣﻴﻦ ﺷﺮﺍﻳﻂ ﻻﺯﻡ ﺑﺮﺍﻱ ﺑﺎﻟﻔﻌﻞ ﺷﺪﻥ ﭘﺘﺎﻧﺴﻴﻞ ﻫﺎﻱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ(. ، IOSﺳﺮﻭﻳﺲ ﻫﺎﻱ ﺷﺒﻜﻪ ﺍﻱ ﺯﻳﺮ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲ ﻧﻤﺎﻳﺪ: •
ﻋﻤﻠﻴﺎﺕ ﺭﻭﺗﻴﻨﮓ ﻭ ﺳﻮﺋﻴﭽﻴﻨﮓ
•
ﺩﺳﺘﻴﺎﺑﻲ ﺍﻳﻤﻦ ﻭ ﻣﻄﻤﺌﻦ ﺑﻪ ﻣﻨﺎﺑﻊ ﺷﺒﻜﻪ
•
ﻗﺎﺑﻠﻴﺖ ﺗﻮﺳﻌﻪ ﻭ ﺗﻐﻴﻴﺮ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﺒﻜﻪ
ﻣﺎﻫﻴﺖ ﺍﻳﻨﺘﺮﻓﻴﺲ IOS
ﻧﺮﻡ ﺍﻓﺰﺍﺭ IOSﺍﺯ ﻳﻚ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺧﻂ ﺩﺳﺘﻮﺭﻱ ﻭ ﻳﺎ ) CLIﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ command- ( line interfaceﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ IOS .ﻳﻚ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻛﻠﻴﺪﻱ ﺍﺳﺖ ﻛﻪ ﺍﺯ ﺁﻥ ﺩﺭ
317
ﺍﻛﺜﺮ ﺧﻄﻮﻁ ﺗﻮﻟﻴﺪ ﻣﺤﺼﻮﻻﺕ ﺷﺮﻛﺖ ﺳﻴﺴﻜﻮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻋﻤﻠﻜﺮﺩ IOSﺑﺎ ﺗﻮﺟﻪ ﺑﻪ
ﻧﻮﻉ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﺑﻴﻦ ﺷﺒﻜﻪ ﺍﻱ ﻣﺘﻔﺎﻭﺕ ﻣﻲ ﺑﺎﺷﺪ.
ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻣﺤﻴﻂ IOSﺍﺯ ﺭﻭﺵ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ: •
: session consoleﺩﺭ ﺍﻳﻦ ﺭﻭﺵ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺍﺗﺼﺎﻝ ﺳﺮﻳﺎﻝ ﺑﺎ ﺳﺮﻋﺖ ﭘﺎﺋﻴﻦ ،ﻛﺎﻣﭙﻴﻮﺗﺮ ﻭ ﻳﺎ ﺩﺳﺘﮕﺎﻩ ﺗﺮﻣﻴﻨﺎﻝ ﺭﺍ ﻣﺴﺘﻘﻴﻤﺎ" ﺑﻪ ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﺭﻭﺗﺮ ﻣﺘﺼﻞ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ) .ﺳﺮﻭﻳﺲ ﺷﺒﻜﻪ ﺍﻱ ﺧﺎﺻﻲ ﺑﺮ ﺭﻭﻱ ﺭﻭﺗﺮ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻧﺸﺪﻩ ﺍﺳﺖ(
•
ﺍﺭﺗﺒﺎﻁ : Dialupﺩﺭ ﺍﻳﻦ ﺭﻭﺵ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻮﺩﻡ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﭘﻮﺭﺕ ﻛﻤﻜﻲ
) ( AUXﺑﺎ ﺭﻭﺗﺮ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﻲ ﮔﺮﺩﺩ ) .ﺳﺮﻭﻳﺲ ﺷﺒﻜﻪ ﺍﻱ ﺧﺎﺻﻲ ﺑﺮ ﺭﻭﻱ
ﺭﻭﺗﺮ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻧﺸﺪﻩ ﺍﺳﺖ (. •
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ : telnetﺩﺭ ﺍﻳﻦ ﺭﻭﺵ ﻣﻲ ﺑﺎﻳﺴﺖ ﺣﺪﺍﻗﻞ ﻳﻜﻲ ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ﺑﺎ ﻳﻚ
ﺁﺩﺭﺱ IPﭘﻴﻜﺮﺑﻨﺪﻱ ﮔﺮﺩﺩ ﻭ terminal sessions virtualﺑﺮﺍﻱ loginﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﺪﻩ ﺑﺎﺷﺪ.
ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺑﺨﺶ ﺭﺍﺑﻂ ﻛﺎﺭﺑﺮ ﺭﻭﺗﺮ ﻭ ﻳﺎ ﺳﻮﺋﻴﭻ ﺍﺯ ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﺗﺮﻣﻴﻨﺎﻝ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ HyperTerminalﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﮔﺰﻳﻨﻪ ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﻣﻲ ﺑﺎﺷﺪ. ﺣﺎﻻﺕ ﻣﺘﻔﺎﻭﺕ ﺭﺍﺑﻂ ﻛﺎﺭﺑﺮ ﺭﻭﺗﺮ
ﺍﻳﻨﺘﺮﻓﻴﺲ ﺧﻂ ﺩﺳﺘﻮﺭ ﻭ ﻳﺎ CLIﺭﻭﺗﺮﻫﺎﻱ ﺳﻴﺴﻜﻮ ﺍﺯ ﻳﻚ ﺳﺎﺧﺘﺎﺭ ﺳﻠﺴﻠﻪ ﻣﺮﺍﺗﺒﻲ ﺗﺒﻌﻴﺖ
ﻣﻲ ﻧﻤﺎﻳﺪ .ﺳﺎﺧﺘﺎﺭ ﻓﻮﻕ ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍ ﻣﻠﺰﻡ ﻣﻲ ﻧﻤﺎﻳﺪ ﻛﻪ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﻫﺮ ﻧﻮﻉ ﻋﻤﻠﻴﺎﺕ ﺧﺎﺹ ﺑﻪ ﻳﻚ modeﺑﺨﺼﻮﺹ ﻭﺍﺭﺩ ﺷﻮﻧﺪ .ﻣﺜﻼ" ﺑﺮﺍﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻳﻚ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺭﻭﺗﺮ ،ﻛﺎﺭﺑﺮ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ modeﭘﻴﻜﺮﺑﻨﺪﻱ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻭ ﻳﺎ interface
configuration
modeﻭﺍﺭﺩ ﺷﻮﺩ .ﻫﺮ modeﭘﻴﻜﺮﺑﻨﺪﻱ ﺩﺍﺭﺍﻱ ﻳﻚ promptﻣﺨﺘﺺ ﺑﻪ ﺧﻮﺩ ﻣﻲ ﺑﺎﺷﺪ ﻛﻪ ﺍﺯ ﻃﺮﻳﻖ ﺁﻥ ﻣﻲ ﺗﻮﺍﻥ ﺩﺳﺘﻮﺭﺍﺕ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﺗﺎﻳﭗ ﻭ ﺍﺯ ﺗﻮﺍﻥ ﻋﻤﻠﻴﺎﺗﻲ ﺁﻧﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ.
318
، IOSﻳﻚ ﺳﺮﻭﻳﺲ ﻣﻔﺴﺮ ﺩﺳﺘﻮﺭ ﺑﺎ ﻧﺎﻡ EXECﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲ ﻧﻤﺎﻳﺪ .ﭘﺲ ﺍﺯ ﺩﺭﺝ ﻫﺮ ﺩﺳﺘﻮﺭ،
EXECﺻﺤﺖ ﺁﻥ ﺭﺍ ﺑﺮﺭﺳﻲ ﻭ ﭘﺲ ﺍﺯ ﺗﺎﺋﻴﺪ ﺁﻥ ﺭﺍ ﺍﺟﺮﺍﺀ ﻣﻲ ﻧﻤﺎﻳﺪ .ﻧﺮﻡ ﺍﻓﺰﺍﺭ IOSﺩﺭ
ﺟﻬﺖ ﺍﻓﺰﺍﻳﺶ ﺍﻣﻨﻴﺖ ،ﺩﻭ ﺳﻄﺢ ﻣﺘﻔﺎﻭﺕ ﺩﺳﺘﻴﺎﺑﻲ user EXEC modeﻭ privileged EXEC modeﺑﺎ ﻭﻳﮋﮔﻲ ﺯﻳﺮ ﺭﺍ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﻣﻔﺴﺮ ﺩﺳﺘﻮﺭ ) ( EXEC ﺩﺭ ﻧﻈﺮ ﻣﻲ ﮔﻴﺮﺩ: •
: EXEC mode userﺩﺭ ﺍﻳﻦ modeﺻﺮﻓﺎ" ﻣﻲ ﺗﻮﺍﻥ ﺗﻌﺪﺍﺩ ﻣﺤﺪﻭﺩﻱ ﺍﺯ ﺩﺳﺘﻮﺭﺍﺕ ﻣﺎﻧﻴﺘﻮﺭﻳﻨﮓ ﺭﺍ ﺍﺟﺮﺍﺀ ﻧﻤﻮﺩ .ﺑﻪ ﺍﻳﻦ ﻣﺪ view onlyﻧﻴﺰ ﮔﻔﺘﻪ ﺷﺪﻩ ﻭ
ﻧﻤﻲ ﺗﻮﺍﻥ ﺩﺳﺘﻮﺭﺍﺗﻲ ﺭﺍ ﻛﻪ ﺑﺎﻋﺚ ﺗﻐﻴﻴﺮ ﺩﺭ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﻭﺗﺮ ﻣﻲ ﮔﺮﺩﻧﺪ ،ﺍﺟﺮﺍﺀ ﻧﻤﻮﺩ. •
: privileged EXEC modeﺩﺭ ﺍﻳﻦ modeﻣﻲ ﺗﻮﺍﻥ ﺑﻪ ﺗﻤﺎﻣﻲ ﺩﺳﺘﻮﺭﺍﺕ ﺭﻭﺗﺮ ﺩﺳﺘﻴﺎﺑﻲ ﺩﺍﺷﺖ .ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ modeﻭ ﺩﺭ ﺟﻬﺖ ﺍﻓﺰﺍﻳﺶ ﺍﻣﻨﻴﺖ ،ﻣﻲ ﺗﻮﺍﻥ ﺭﻭﺗﺮ ﺭﺍ ﺑﮕﻮﻧﻪ ﺍﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻧﻤﻮﺩ ﻛﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍ ﻣﻠﺰﻡ ﺑﻪ ﺩﺭﺝ ﻧﺎﻡ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﺟﻬﺖ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺭﻭﺗﺮ ﻧﻤﺎﻳﺪ Global configuration mode .ﻭ
ﺳﺎﻳﺮ ﺣﺎﻻﺕ ﻣﺘﻔﺎﻭﺕ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺻﺮﻓﺎ" ﺍﺯ ﻃﺮﻳﻖ privileged EXEC mode ﻗﺎﺑﻞ ﺩﺳﺘﻴﺎﺑﻲ ﻣﻲ ﺑﺎﺷﻨﺪ. EXEC Mode Router1> Userﺑﺮﺭﺳﻲ ﻭﺿﻌﻴﺖ ﺭﻭﺗﺮ ﻛﺎﺭﺑﺮﺩ
Prompt
Router1# privileged
•
ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺣﺎﻻﺕ ﻣﺘﻔﺎﻭﺕ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﻭﺗﺮ
ﺷﻜﻞ ﺯﻳﺮ ﺣﺎﻻﺕ ﻣﺘﻔﺎﻭﺕ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﻭﺗﺮ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ.
319
ﻫﻤﺎﻧﮕﻮﻧﻪ ﻛﻪ ﺩﺭ ﺷﻜﻞ ﻓﻮﻕ ﻣﺸﺎﻫﺪﻩ ﻣﻲ ﮔﺮﺩﺩ ،ﺟﻬﺖ ﻓﻠﺶ ﻗﺮﻣﺰ ﺭﻧﮓ ﺑﻪ ﺳﻤﺖ Global Configuration Modeﻭ Privileged modeﺍﺳﺖ .ﺍﻳﻦ ﺑﺪﺍﻥ ﻣﻌﻨﻲ ﺍﺳﺖ ﻛﻪ ﺟﻬﺖ ﻭﺭﻭﺩ ﺑﻪ ﺑﺮﺧﻲ ﺣﺎﻻﺕ ﺧﺎﺹ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﻃﺮﻳﻖ Global
Configuration Modeﺍﻗﺪﺍﻡ ﻧﻤﻮﺩ ﻭ ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﺩﻳﮕﺮ ﺍﻳﻦ ﻛﺎﺭ ﺍﺯ ﻃﺮﻳﻖ Privileged modeﺍﻧﺠﺎﻡ ﻣﻲ ﮔﺮﺩﺩ . ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ privileged EXEC modeﺍﺯ ﻃﺮﻳﻖ ، user EXEC mode ﺍﺯ ﺩﺳﺘﻮﺭ enableﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﻛﻪ ﺭﻭﺗﺮ ﺑﮕﻮﻧﻪ ﺍﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﺪﻩ ﺍﺳﺖ
ﻛﻪ ﺟﻬﺖ ﻭﺭﻭﺩ ﺑﻪ privileged EXEC modeﻛﺎﺭﺑﺮﺍﻥ ﺭﺍ ﻣﻠﺰﻡ ﺑﻪ ﺩﺭﺝ ﻧﺎﻡ ﻭ ﺭﻣﺰ ﻋﺒﻮﺭ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ ﺭﻣﺰ ﻋﺒﻮﺭ ﺭﺍ ﻧﻴﺰ ﻭﺍﺭﺩ ﻧﻤﻮﺩ .ﭘﺲ ﺍﺯ ﺩﺭﺝ ﺻﺤﻴﺢ ﺭﻣﺰ ﻋﺒﻮﺭ ،ﺑﻪ EXEC mode privilegedﻭﺍﺭﺩ ﺷﺪﻩ ﻭ ﺑﺎ ﺩﺭﺝ ﻳﻚ ﻋﻼﻣﺖ ﺳﻮﺍﻝ ﻣﻲ ﺗﻮﺍﻥ ﺩﺳﺘﻮﺭﺍﺕ ﻭ ﮔﺰﻳﻨﻪ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ modeﺭﺍ ﻣﺸﺎﻫﺪﻩ ﻧﻤﻮﺩ .ﺷﻜﻞ ﺯﻳﺮ
ﻧﺤﻮﻩ ﺣﺮﻛﺖ ﺑﻴﻦ user EXEC modeﻭ privileged EXEC mode ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ.
320
ﺭﺍ
ﻭﻳﮋﮔﻲ ﻧﺮﻡ ﺍﻓﺰﺍﺭ IOS ﺷﺮﻛﺖ ﺳﻴﺴﻜﻮ ﺗﺎﻛﻨﻮﻥ ﻧﺴﺨﻪ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭ IOSﺭﺍ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻧﻤﻮﺩﻩ ﺍﺳﺖ .
ﻫﺮ imageﺩﺍﺭﺍﻱ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﻣﺨﺘﺺ ﺑﻪ ﺧﻮﺩ ﻣﻲ ﺑﺎﺷﺪ .ﻋﻠﻴﺮﻏﻢ ﺗﻨﻮﻉ ﺑﺴﻴﺎﺭ ﮔﺴـــﺘﺮﺩﻩ
IOS imagesﺑﺮﺍﻱ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﺳﻴﺴﻜﻮ ،ﺳﺎﺧﺘﺎﺭ ﺍﻭﻟﻴﻪ ﺩﺳﺘﻮﺭﺍﺕ ﭘﻴﻜﺮﺑﻨــﺪﻱ ﺩﺭ ﺁﻧﺎﻥ ﻣﺸﺎﺑﻪ ﻣﻲ ﺑﺎﺷﺪ ﻭ ﺩﺭ ﺻﻮﺭﺕ ﻛﺴﺐ ﻣﻬﺎﺭﺕ ﻻﺯﻡ ﺑﻪ ﻣﻨﻈﻮﺭ ﭘﻴﻜﺮﺑﻨــﺪﻱ ﻭ ﺍﺷﻜﺎﻝ ﺯﺩﺍﺋﻲ ﻳﻚ ﺩﺳﺘﮕﺎﻩ ﺧﺎﺹ ،ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺗﺠﺎﺭﺏ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﺎﻳﺮ ﺩﺳﺘﮕﺎﻩ ﻫﺎ ﻧﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ. ﺍﺳﺎﻣﻲ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺑﺮﺍﻱ ﻫﺮ ﻳﻚ ﺍﺯ ﻧﺴﺨﻪ ﻫﺎﻱ IOSﺍﺯ ﺳﻪ ﺑﺨﺶ ﻋﻤﺪﻩ ﺗﺸـﻜﻴﻞ
ﻣﻲ ﮔﺮﺩﺩ: •
ﻣﺤﻴﻄﻲ ﻛﻪ imageﺑﺮ ﺭﻭﻱ ﺁﻥ ﺍﺟﺮﺍﺀ ﻣﻲ ﮔﺮﺩﺩ
•
ﻭﻳﮋﮔﻲ ﻣﻨﺤﺼﺮﺑﻔﺮﺩ image
•
ﻣﺤﻞ ﺍﺟﺮﺍﺀ imageﻭ ﻭﺿﻌﻴﺖ ﻓﺸﺮﺩﻩ ﺑﻮﺩﻥ ﺁﻥ
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ Advisor Cisco Softwareﻣﻲ ﺗﻮﺍﻥ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﺧﺎﺻﻲ ﺍﺯ IOSﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻧﻤﻮﺩ .ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻓﻮﻕ ﻳﻚ ﺍﺑﺰﺍﺭ ﻣﺤﺎﻭﺭﻩ ﺍﻱ ﺍﺳﺖ ﻛﻪ ﭘﺲ ﺍﺯ ﻧﻤﺎﻳﺶ ﻭﺿﻌﻴﺖ ﻣﻮﺟﻮﺩ ،ﺍﻣﻜﺎﻥ ﺍﻧﺘﺨﺎﺏ ﮔﺰﻳﻨﻪ ﻫﺎﺋﻲ ﻣﺘﻨﺎﺳﺐ ﺑﺎ ﻭﺍﻗﻌﻴﺖ ﻫﺎﻱ ﺷﺒﻜﻪ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ. ﻳﻜﻲ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﻣﻮﺍﺭﺩﻱ ﻛﻪ ﺩﺭ ﺯﻣﺎﻥ ﺍﻧﺘﺨﺎﺏ ﻳﻚ IOS imageﺟﺪﻳﺪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﺁﻥ ﺗﻮﺟﻪ ﮔﺮﺩﺩ ،ﺳﺎﺯﮔﺎﺭﻱ ﺁﻥ ﺑﺎ ﺣﺎﻓﻈﻪ ﻓﻠﺶ ﻭ RAMﺍﺳﺖ .ﻧﺴﺨﻪ ﻫﺎﻱ ﺟﺪﻳﺪﺗﺮ ﻋﻤﻮﻣﺎ"
321
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ. ﺩﺍﺭﺍﻱ ﺍﻣﻜﺎﻧﺎﺕ ﺑﻴﺸﺘﺮﻱ ﺑﻮﺩﻩ ﻭ ﺑﻪ ﺣﺎﻓﻈﻪ ﺑﻴﺸﺘﺮﻱ ﻧﻴﺰ ﻧﻴﺎﺯ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺷﺖ
ﻣﻮﺟﻮﺩ ﻭ ﺣﺎﻓﻈﻪ ﻓﻠﺶ ﺭﺍ ﻣﺸﺎﻫﺪﻩimage ﻣﻲ ﺗﻮﺍﻥ ﻭﺿﻌﻴﺖShow version ﺩﺳﺘﻮﺭ
ﻣﻲ ﺑﺎﻳﺴﺖ ﻭﺿﻌﻴﺖ ﺣﺎﻓﻈﻪ ﺁﻥ، IOS ﻗﺒﻞ ﺍﺯ ﻧﺼﺐ ﻳﻚ ﻧﺴﺨﻪ ﺟﺪﻳﺪ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭ. ﻧﻤﻮﺩ . ﺑﺮﺭﺳﻲ ﮔﺮﺩﺩ، ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﻭﺟﻮﺩ ﻇﺮﻓﻴﺖ ﻛﺎﻓﻲ : ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩShow version ﺍﺯ ﺩﺳﺘﻮﺭ، RAM ﺑﺮﺍﻱ ﻣﺸﺎﻫﺪﻩ ﻣﻴﺰﺍﻥ ﺣﺎﻓﻈﻪ ﺧﺮﻭﺟﻲ
ﺩﺳﺘﻮﺭ ﺗﺎﻳﭗ
....... System image file is "flash:c2600-dos-mz_1204_T.bin" Processor board ID JAB040202ZW (201830944) M860 processor: part number 0, mask 49 Bridging software. X.25 software, Version Router>Show 3.0.0. Version 2 FastEthernet/IEEE 802.3 interface(s) 32K bytes of non-volatile configuration memory. 8192K bytes of processor board System flash (Read/Write) Configuration register is 0x2102
322
. ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩShow flash ﺑﺮﺍﻱ ﻣﺸﺎﻫﺪﻩ ﻣﻴﺰﺍﻥ ﺣﺎﻓﻈﻪ ﻓﻠﺶ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺩﺳﺘﻮﺭ ﺧﺮﻭﺟﻲ
ﺩﺳﺘﻮﺭ ﺗﺎﻳﭗ
System flash directory: File Length Name/status 1 6399468 c2600-dosmz_120-4_T.bin [6399532 bytes used, 1989076 available, 8388608 total] 8192K bytes of processor board System flash (Read/Write)
323
Router>show flash
ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺭﻭﺗﺮ :ﺍﻳﺠﺎﺩ ﻳﻚ Hyper Terminal Session ﺗﻤﺎﻣﻲ ﺭﻭﺗﺮﻫﺎﻱ ﺳﻴﺴﻜﻮ ﺩﺍﺭﺍﻱ ﻳﻚ ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﺳﺮﻳﺎﻝ ﻏﻴﺮﻫﻤﺰﻣﺎﻥ TIA/EIA- 232ﻣﻲ ﺑﺎﺷﻨﺪ .ﺑﺮﺍﻱ ﺍﺗﺼﺎﻝ ﻳﻚ ﺗﺮﻣﻴﻨﺎﻝ ﺑﻪ ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﺭﻭﺗﺮ ،ﺍﺯ ﻛﺎﺑﻞ ﻫﺎ ﻭ ﺁﺩﺍﭘﺘﻮﺭﻫﺎﻱ ﺧﺎﺻﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ :ﺗﺮﻣﻴﻨﺎﻝ ،ﻳﻚ ﺗﺮﻣﻴﻨﺎﻝ ﺍﺳﻜﻲ ﻭ ﻳﺎ ﻛﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺳﺖ ﻛﻪ ﺑﺮ ﺭﻭﻱ ﺁﻥ
ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺷﺒﻴﻪ ﺳﺎﺯ ﺗﺮﻣﻴﻨﺎﻝ ﻧﻈﻴﺮ HyperTerminalﺍﺟﺮﺍﺀ ﺷﺪﻩ ﺑﺎﺷﺪ .ﺑﺮﺍﻱ ﺍﺗﺼﺎﻝ ﻛﺎﻣﭙﻮﺗﺮ ﺑﻪ ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﺭﻭﺗﺮ ﺍﺯ RJ-45 to RJ-45 rollover cableﺑﻪ ﻫﻤﺮﺍﻩ ﺁﺩﺍﭘﺘﻮﺭ RJ-45 to DB-9ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ. ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺷﺒﻴﻪ ﺳﺎﺯ ﺗﺮﻣﻴﻨﺎﻝ
ﻫﺮ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﺍﺯ ﻳﻚ ﻭ ﻳﺎ ﭼﻨﺪﻳﻦ ﻧﻮﻉ ﺑﺮﻧﺎﻣﻪ ﺷﺒﻴﻪ ﺳﺎﺯ ﺗﺮﻣﻴﻨﺎﻝ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ.
، HyperTerminalﻳﻚ ﺑﺮﻧﺎﻣﻪ ﺳﺎﺩﻩ ﺷﺒﻴﻪ ﺳﺎﺯ ﺗﺮﻣﻴﻨﺎﻝ ﺍﺳﺖ ﻛﻪ ﺍﺯ ﺁﻥ ﺩﺭ ﻧﺴﺨﻪ ﻫﺎﻱ ﻣﺨﺘﻠﻒ ﻭﻳﻨﺪﻭﺯ ﺍﺳﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﻭﺍﻗﻊ ،ﻛﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﻫﻤﺮﺍﻩ ، HyperTerminalﻧﻈﻴﺮ
ﻳﻚ ﺗﺮﻣﻴﻨﺎﻝ ﺭﻓﺘﺎﺭ ﻣﻲ ﻧﻤﺎﻳﺪ ) ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺻﻔﺤﻪ ﻛﻠﻴﺪ ﻓﺮﺍﻣﻴﻦ ﺗﺎﻳﭗ ﻭ ﭘﺲ ﺍﺯ ﺍﺭﺳﺎﻝ ﺑﻪ
ﺭﻭﺗﺮ ،ﻧﺘﺎﻳﺞ ﺍﺯ ﻃﺮﻳﻖ ﻧﻤﺎﻳﺸﮕﺮ ﻛﺎﻣﭙﻴﻮﺗﺮ ،ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ(. ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﻛﺎﺑﻞ rolloverﻭ ﺑﺮﻧﺎﻣﻪ ﺍﻱ ﻧﻈﻴﺮ ، HyperTerminalﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ
ﺭﻭﺵ ﺍﺗﺼﺎﻝ ﺑﻪ ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﺭﻭﺗﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺑﺮﺭﺳﻲ ﻭ ﺗﻐﻴﻴﺮ ﭘﺎﺭﺍﻣﺘﺮﻫﺎﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﻭﺗﺮ ﻣﻲ ﺑﺎﺷﺪ. ﺗﺠﻬﻴﺰﺍﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ
ﺑﺮﺍﻱ ﺍﺗﺼﺎﻝ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺭﻭﺗﺮ ﺑﻪ ﺗﺠﻬﻴﺰﺍﺕ ﻭ ﺍﻣﻜﺎﻧﺎﺕ ﺯﻳﺮ ﻧﻴﺎﺯ ﻣﻲ ﺑﺎﺷﺪ :
•
ﻳﻚ ﺩﺳﺘﮕﺎﻩ ﻛﺎﻣﭙﻴﻮﺗﺮ ﻛﻪ ﺩﺍﺭﺍﻱ ﻳﻚ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺳﺮﻳﺎﻝ ﺍﺳﺖ ﻭ ﺑﺮﻧﺎﻣﻪ HyperTerminalﺑﺮ ﺭﻭﻱ ﻧﺼﺐ ﺷﺪﻩ ﺑﺎﺷﺪ .
•
ﻳﻚ ﺭﻭﺗﺮ
•
ﻛﺎﺑﻞ ﻛﻨﺴﻮﻝ ﻭ ﻳﺎ rolloverﺑﺮﺍﻱ ﺍﺗﺼﺎﻝ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺭﻭﺗﺮ
324
ﺍﻳﺠﺎﺩ ﻳﻚ HyperTerminal Session
ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻳﻚ HyperTerminal Sessionﻭ ﺍﺗﺼﺎﻝ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺭﻭﺗﺮ ﻣﺮﺍﺣﻞ ﺯﻳﺮ
ﺭﺍ ﺩﻧﺒﺎﻝ ﻣﻲ ﻧﻤﺎﺋﻴﻢ : ﻣﺮﺣﻠﻪ ﺍﻭﻝ -ﭘﻴﻜﺮﺑﻨﺪﻱ ﺍﻭﻟﻴﻪ ﺭﻭﺗﺮ :ﺩﺭ ﺍﻭﻟﻴﻦ ﺍﻗﺪﺍﻡ ﻣﻲ ﺑﺎﻳﺴﺖ ﻛﺎﺑﻞ rolloverﺭﺍ ﺑﻪ ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﺭﻭﺗﺮ ﻭ ﺳﺮ ﺩﻳﮕﺮ ﺁﻥ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺁﺩﺍﭘﺘﻮﺭ DB-9ﻭ ﻳﺎ DB-25ﺑﻪ ﭘﻮﺭﺕ ﺳﺮﻳﺎﻝ ) ( COMﻛﺎﻣﭙﻴﻮﺗﺮ ﻣﺘﺼﻞ ﻧﻤﻮﺩ.
ﺍﺗﺼﺎﻝ ﺭﻭﺗﺮ ﺑﻪ ﻛﺎﻣﭙﻴﻮﺗﺮ )ﻣﻨﺒﻊ :ﺳﺎﻳﺖ ﺳﻴﺴﻜﻮ( ﻣﺮﺣﻠﻪ ﺩﻭﻡ -ﺍﺟﺮﺍﻱ ﺑﺮﻧﺎﻣﻪ : HyperTerminalﺩﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ ﭘﺲ ﺍﺯ ﺭﻭﺷﻦ ﻛﺮﺩﻥ ﻛﺎﻣﭙﻴﻮﺗﺮ ﻭ ﺭﻭﺗﺮ ،ﺑﺮﻧﺎﻣﻪ HyperTerminalﻣﻮﺟﻮﺩ ﺩﺭ ﻣﺴﻴﺮ ﺯﻳﺮ ﺭﺍ ﺍﺟﺮﺍﺀ ﻣﻲ ﻧﻤﺎﺋﻴﻢ . Start > Programs > Accessories > Communications > Hyper Terminal ﻣﺮﺣﻠﻪ ﺳﻮﻡ -ﺍﻧﺘﺨﺎﺏ ﻳﻚ ﻧﺎﻡ ﺑﺮﺍﻱ : HyperTerminal Sessionﺩﺭ ﺍﻳﻦ
ﻣﺮﺣﻠﻪ ﺑﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﻣﻮﺭﺩ ﻧﻈﺮ ،ﻳﻚ ﻧﺎﻡ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﺋﻴﻢ. 325
ﻣﺮﺣﻠﻪ ﭼﻬﺎﺭﻡ -ﺍﻧﺘﺨﺎﺏ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺍﺭﺗﺒﺎﻃﻲ ﻛﺎﻣﭙﻴﻮﺗﺮ :ﺩﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ ﻧﻮﻉ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺍﺭﺗﺒﺎﻃﻲ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺑﺎ ﺭﻭﺗﺮ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﺋﻴﻢ ) ﭘﻮﺭﺕ ﺳﺮﻳﺎﻝ .( COM1 :
326
ﻣﺮﺣﻠﻪ ﭘﻨﺠﻢ -ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﺧﺼﺎﻳﺺ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺍﺭﺗﺒﺎﻃﻲ :ﺩﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ ﺧﺼﺎﻳﺺ ﭘﻮﺭﺕ ﺳﺮﻳﺎﻝ ﺍﻧﺘﺨﺎﺏ ﺷﺪﻩ ﺩﺭ ﻣﺮﺣﻠﻪ ﻗﺒﻞ ) ( COM1ﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﺋﻴﻢ . Bits per second: 9600 • Data bits: 8 • Parity: None • Stop bits: 1 • Flow control: None •
ﭘﺲ ﺍﺯ ﻓﻌﺎﻝ ﺷﺪﻥ ﭘﻨﺠﺮﻩ ، HyperTerminal sessionﺭﻭﺗﺮ ﺭﺍ ﺭﻭﺷﻦ ﻧﻤﻮﺩﻩ ﻭ ﺩﺭ ﺻﻮﺭﺗﻲ ﻛﻪ ﺭﻭﺗﺮ ﺭﻭﺷﻦ ﺍﺳﺖ ،ﻛﻠﻴﺪ Enterﺭﺍ ﻓﻌﺎﻝ ﻭ ﺩﺭ ﺍﻧﺘﻈﺎﺭ ﭘﺎﺳﺦ ﺭﻭﺗﺮ ﻣﻲ ﻣﺎﻧﻴﻢ . ﺩﺭ ﺻﻮﺭﺕ ﭘﺎﺳﺦ ﺭﻭﺗﺮ ،ﻳﻚ ﺍﺭﺗﺒﺎﻁ ﻣﻮﻓﻘﻴﺖ ﺁْﻣﻴﺰ ﺑﺎ ﺭﻭﺗﺮ ﺑﺮﻗﺮﺍﺭ ﺷﺪﻩ ﺍﺳﺖ. ﻣﺮﺣﻠﻪ ﺷﺸﻢ :ﺑﺴﺘﻦ : Sessionﺑﺮﺍﻱ ﺧﺎﺗﻤﻪ ﺩﺍﺩﻥ ﺑﻪ ، Console sessionﮔﺰﻳﻨﻪ Exitﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﻣﻨﻮﻱ Exitﺍﻧﺘﺨﺎﺏ ﻧﻤﻮﺩﻩ ﻭ ﺁﻥ ﺭﺍ ﺑﺎ ﻳﻚ ﻧﺎﻡ ﺩﻟﺨﻮﺍﻩ ﺫﺧﻴﺮﻩ ﻣﻲ ﻧﻤﺎﺋﻴﻢ ) ﺍﺳﺘﻔﺎﺩﻩ ﻣﺠﺪﺩ ﺍﺯ ﺁﻥ ﺩﺭ ﺁﻳﻨﺪﻩ (.
327
ﺁﺷﻨﺎﺋﻲ ﺑﺎ ﻋﻨﺎﺻﺮ ﺩﺍﺧﻠﻲ ﺭﻭﺗﺮ ﺭﻭﺗﺮ ﻳﻜﻲ ﺍﺯ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﺷﺒﻜﻪ ﺍﻱ ﻣﻬﻢ ﻭ ﺣﻴﺎﺗﻲ ﺍﺳﺖ ﻛﻪ ﺍﺯ ﺁﻥ ﺩﺭ ﺷﺒﻜﻪ ﻫﺎﻱ LANﻭ WANﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺭﻭﺗﺮﻫﺎ ﺗﺎﻛﻨﻮﻥ ﺩﺭ ﻣﺪﻝ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﻭ ﺑﺎ ﻣﻌﻤﺎﺭﻱ ﻣﺨﺘﻠﻒ ﻃﺮﺍﺣﻲ ،ﺗﻮﻟﻴﺪ ﻭ ﻋﺮﺿﻪ ﺷﺪﻩ ﺍﻧﺪ .ﺩﺭ ﺍﻳﻦ ﻣﻄﻠﺐ ﺑﺎ ﻋﻨﺎﺻﺮ ﺍﺻﻠﻲ ﺩﺍﺧﻠﻲ ﻳﻚ ﺭﻭﺗﺮ ﺁﺷﻨﺎ ﺧﻮﺍﻫﻴﻢ ﺷﺪ.
ﻋﻨﺎﺻﺮ ﺩﺍﺧﻠﻲ ﺭﻭﺗﺮ •
ﭘﺮﺩﺍﺯﻧﺪﻩ ) : ( CPUﭘﺮﺩﺍﺯﻧﺪﻩ ﻣﺴﺌﻮﻟﻴﺖ ﺍﺟﺮﺍﻱ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎ ﺩﺭ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ .ﻣﻘﺪﺍﺭﺩﻫﻲ ﺍﻭﻟﻴﻪ ﺳﻴﺴﺘﻢ ،ﻋﻤﻠﻴﺎﺕ ﺭﻭﺗﻴﻨﮓ ﻭ ﻛﻨﺘﺮﻝ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺷﺒﻜﻪ ﺍﺯ ﺟﻤﻠﻪ ﻭﻇﺎﻳﻒ ﻳﻚ ﭘﺮﺩﺍﺯﻧﺪﻩ ﻣﻲ ﺑﺎﺷﺪ ،CPU .ﻳﻚ ﺭﻳﺰﭘﺮﺩﺍﺯﻧﺪﻩ ﺍﺳﺖ ﻭ ﺩﺭ
ﺭﻭﺗﺮﻫﺎﻱ ﺑﺰﺭﮒ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺯ ﭼﻨﺪﻳﻦ ﭘﺮﺩﺍﺯﻧﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ. •
ﺣﺎﻓﻈﻪ ﺍﺻﻠﻲ ) : ( RAMﺍﺯ ﺣﺎﻓﻈﻪ ﻓﻮﻕ ﺑﻪ ﻣﻨﻈﻮﺭ ﺫﺧﻴﺮﻩ ﺍﻃﻼﻋﺎﺕ ﺟﺪﻭﻝ
ﺭﻭﺗﻴﻨﮓ ،ﺻﻒ ﻫﺎﻱ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ،ﺍﺟﺮﺍﺀ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻭ cacheﺳﻮﺋﻴﭽﻴﻨﮓ
ﺳﺮﻳﻊ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﮔﺮﺩﺩ .ﺩﺭ ﺍﻛﺜﺮ ﺭﻭﺗﺮﻫﺎ ،ﺣﺎﻓﻈﻪ RAMﻓﻀﺎﻱ ﺯﻣﺎﻥ ﺍﺟﺮﺍﺀ ﺑﺮﺍﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭ IOSﻭ ﺯﻳﺮ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺣﺎﻓﻈﻪ RAMﻣﻨﻄﻘﺎ" ﺑﻪ
ﺩﻭ ﺑﺨﺶ ﺣﺎﻓﻈﻪ ﭘﺮﺩﺍﺯﻧﺪﻩ ﺍﺻﻠﻲ ﻭ ﺣﺎﻓﻈﻪ ﻭﺭﻭﺩﻱ ﻭ ﺧﺮﻭﺟﻲ ﻣﺸـــﺘﺮﻙ ﺗﻘﺴـــﻴﻢ ﻣﻲ ﮔﺮﺩﺩ .ﺍﺯﺣﺎﻓﻈﻪ ﻭﺭﻭﺩﻱ ﻭ ﺧﺮﻭﺟﻲ ﻣﺸﺘﺮﻙ ) (Shared I/Oﺗﻮﺳﻂ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ﻭ ﺑﻪ ﻣﻨﻈﻮﺭ ﺫﺧﻴﺮﻩ ﻣﻮﻗﺖ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺎ
ﺗﻮﺟﻪ ﺑﻪ ﺗﻜﻨﻮﻟﻮﮊﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﺳﺎﺧﺖ ﺍﻳﻨﮕﻮﻧﻪ ﺣﺎﻓﻈﻪ ﻫﺎ ،ﭘﺲ ﺍﺯ ﺧﺎﻣﻮﺵ
ﻛﺮﺩﻥ ﻭ ﻳﺎ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﻣﺠﺪﺩ ﺭﻭﺗﺮ ﺍﻃﻼﻋــــﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺣﺎﻓﻈﻪ RAMﺣﺬﻑ ﻣﻲ ﮔﺮﺩﺩ .ﺣﺎﻓﻈﻪ ﻫﺎﻱ ﻓﻮﻕ ﻣﻌﻤﻮﻻ" ﺍﺯ ﻧﻮﻉ ) DRAMﺣﺎﻓﻈﻪ RAMﭘﻮﻳﺎ ( ﺑﻮﺩﻩ ﻭ ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﺍﻓﺰﻭﺩﻥ ﻣﺎﮊﻭﻝ ﻫﺎﻱ DIMMsﻇﺮﻓﻴﺖ ﺁﻧﺎﻥ ﺭﺍ ﺗﻐﻴﻴﺮ ﻭ ﺍﻓﺰﺍﻳﺶ ﺩﺍﺩ.
328
•
ﺣﺎﻓﻈﻪ ﻓﻠﺶ ) : ( Flashﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ﺣﺎﻓﻈﻪ ﻫﺎ ﺑﻪ ﻣﻨﻈﻮﺭ ﺫﺧﻴﺮﻩ ﻧﺴﺨﻪ ﻛﺎﻣﻞ ﻧﺮﻡ
ﺍﻓﺰﺍﺭ IOSﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺭﻭﺗﺮ ،ﻣﻌﻤﻮﻻ" IOSﭘﻴﺶ ﻓﺮﺽ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺣﺎﻓﻈﻪ
ﻓﻠﺶ ﺩﺭﻳﺎﻓﺖ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺗﻜﻨﻮﻟﻮﮊﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﺳﺎﺧﺖ ﺍﻳﻨﮕﻮﻧﻪ ﺣﺎﻓﻈﻪ ﻫﺎ ،ﻫﻤﻮﺍﺭﻩ ﻣﻲ ﺗﻮﺍﻥ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺩﺭﻭﻥ ﺁﻧﺎﻥ ﺭﺍ ﺍﺭﺗﻘﺎﺀ ﻭ ﺑﺎ ﻳﻚ
ﻧﺴﺨﻪ ﺟﺪﻳﺪ ﺟﺎﻳﮕﺰﻳﻦ ﻧﻤﻮﺩ IOS .ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﺻﻮﺭﺕ ﻓﺸﺮﺩﻩ ﻭ ﻳﺎ ﻣﻌﻤﻮﻟﻲ ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺑﺎﺷﺪ .ﺩﺭ ﺍﻛﺜﺮ ﺭﻭﺗﺮﻫﺎ ﻳﻚ ﻧﺴﺨﻪ ﺍﺟﺮﺍﺋﻲ ﺍﺯ IOSﺩﺭ ﺯﻣﺎﻥ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ
ﺭﻭﺗﺮ ﺑﻪ ﺣﺎﻓﻈﻪ RAMﺍﻧﺘﻘﺎﻝ ﻣﻲ ﻳﺎﺑﺪ .ﺩﺭ ﺳﺎﻳﺮ ﺭﻭﺗﺮﻫﺎ IOS ،ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﺴﺘﻘﻴﻤﺎ" ﺍﺯ ﻃﺮﻳﻖ ﺣﺎﻓﻈﻪ ﻓﻠﺶ ﺍﺟﺮﺍﺀ ﮔﺮﺩﺩ .ﺑﺎ ﺍﻓﺰﻭﺩﻥ ﻭ ﻳﺎ ﺗﻌﻮﻳﺾ ﻣﺎﮊﻭﻝ ﻫﺎﻱ SIMMsﻭ ﻳﺎ ﻛﺎﺭﺕ ﻫﺎﻱ PCMCIAﻣﻲ ﺗﻮﺍﻥ ﻇﺮﻓﻴﺖ ﺣﺎﻓﻈﻪ ﻓﻠﺶ ﺭﺍ ﺍﺭﺗﻘﺎﺀ ﺩﺍﺩ. •
ﺣﺎﻓﻈﻪ : NVRAMﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ﺣﺎﻓﻈﻪ ﻫﺎﻱ ﻏﻴﺮ ﻓﺮﺍﺭ ﺑﻪ ﻣﻨﻈﻮﺭ ﺫﺧﻴﺮﻩ ﭘﻴﻜﺮﺑﻨﺪﻱ
ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺭﻭﺗﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺑﺮﺧﻲ ﺩﺳﺘﮕﺎﻩ ﻫﺎ NVRAM ،ﺑﺮ ﺍﺳﺎﺱ ﺗﻜﻨﻮﻟﻮﮊﻱ EEPROMsﻭ ﺩﺭ ﺳﺎﻳﺮ ﺩﺳﺘﮕﺎﻩ ﻫﺎ ﺑﻪ ﺻﻮﺭﺕ ﺣﺎﻓﻈﻪ ﻫﺎﻱ ﻓﻠﺶ ﭘﻴﺎﺩﻩ
ﺳﺎﺯﻱ ﻣﻲ ﮔﺮﺩﺩ .ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ NVRAMﭘﺲ ﺍﺯ ﺧﺎﻣﻮﺵ ﺷﺪﻥ ﻭ ﻳﺎ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﻣﺠﺪﺩ ﺭﻭﺗﺮ ﺍﺯ ﺑﻴﻦ ﻧﺨﻮﺍﻫﻨﺪ ﺭﻓﺖ. •
ﮔﺬﺭﮔﺎﻩ ﻫﺎ ) : ( Busesﺍﻛﺜﺮ ﺭﻭﺗﺮﻫﺎ ﺷﺎﻣﻞ ﻳﻚ ﮔﺬﺭﮔﺎﻩ ﺳﻴﺴﺘﻢ ﻭ ﻳﻚ ﮔﺬﺭﮔﺎﻩ ﭘﺮﺩﺍﺯﻧﺪﻩ ﻣﻲﺑﺎﺷﻨﺪ .ﺍﺯ ﮔﺬﺭﮔﺎﻩ ﺳﻴﺴﺘﻢ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺑﻴﻦ ﭘﺮﺩﺍﺯﻧﺪﻩ ﻭ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ﻭ ﻳﺎ ﺗﺠﻬﻴﺰﺍﺕ ﺟﺎﻧﺒﻲ ﻧﺼﺐ ﺷﺪﻩ ﺩﺭ ﻳﻜﻲ ﺍﺯ ﺍﺳﻼﺕ ﻫﺎﻱ ﺳﻴﺴﺘﻢ، ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﮔﺬﺭﮔﺎﻩ ﻓﻮﻕ ﻣﺴﺌﻮﻟﻴﺖ ﻣﺒﺎﺩﻟﻪ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ
ﻫﺎ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ ) ﺩﺭﻳﺎﻓﺖ ﻭ ﺍﺭﺳﺎﻝ (.
ﮔﺬﺭﮔﺎﻩ ﭘﺮﺩﺍﺯﻧﺪﻩ ﺗﻮﺳﻂ ﭘﺮﺩﺍﺯﻧﺪﻩ ﻭ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﻲ ﻋﻨﺎﺻﺮ ﺍﺯ ﻃﺮﻳﻖ ﺣﺎﻓﻈﻪ ﺍﺻﻠﻲ ﺭﻭﺗﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺍﻳﻦ ﮔﺬﺭﮔﺎﻩ ﻣﺴﺌﻮﻟﻴﺖ ﻣﺒﺎﺩﻟﻪ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎ ﻭ ﺩﺍﺩﻩ ﺑﻪ ﻳﻚ ﺁﺩﺭﺱ ﺧﺎﺹ ﺍﺯ ﺣﺎﻓﻈﻪ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ ) ﺫﺧﻴﺮﻩ ﻭ ﺑﺎﺯﻳﺎﺑﻲ (.
329
•
ﺣﺎﻓﻈﻪ : ROMﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ﺣﺎﻓﻈﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺫﺧﻴﺮﻩ ﺩﺍﺋﻢ ﻛﺪ ﺍﺷﻜﺎﻝ ﺯﺩﺍﺋﻲ ﺭﺍﻩ ﺍﻧﺪﺍﺯ
) ( ROM Monitorﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﮔﺮﺩﺩ .ﻣﻬﻤﺘﺮﻳﻦ ﻭﻇﻴﻔﻪ ﺣﺎﻓﻈﻪ ، ROMﺗﺴﺖ ﻭ ﻋﻴﺐ ﻳﺎﺑﻲ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﺩﺭ ﺯﻣﺎﻥ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺭﻭﺗﺮ ﻭ ﺍﺳﺘﻘﺮﺍﺭ ﻧﺮﻡ ﺍﻓﺰﺍﺭ IOSﺍﺯ
ﺣﺎﻓﻈﻪ ﻓﻠﺶ ﺑﻪ ﺩﺭﻭﻥ ﺣﺎﻓﻈﻪ RAMﻣﻲﺑﺎﺷﺪ .ﺑﺮﺧﻲ ﺭﻭﺗﺮﻫﺎ ﺩﺍﺭﺍﻱ ﻳﻚ ﻧﺴﺨﻪ ﺧﺎﺹ ﻭ ﺳﺒﻚ ﺗﺮ ﺍﺯ IOSﻣﻲ ﺑﺎﺷﻨﺪ ﻛﻪ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺁﻥ ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﻚ ﮔﺰﻳﻨﻪ ﻭ
ﻣﻨﺒﻊ ﺟﺎﻳﮕﺰﻳﻦ ﺩﺭ ﺯﻣﺎﻥ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺭﻭﺗﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ
ﺍﻳﻨﮕﻮﻧﻪ ﺣﺎﻓﻈﻪ ﻫﺎ ﺭﺍ ﻧﻤﻲ ﺗﻮﺍﻥ ﺣﺬﻑ ﻧﻤﻮﺩ ﻭ ﺩﺭ ﺻﻮﺭﺕ ﻧﻴﺎﺯ ﺑﻪ ﺍﺭﺗﻘﺎﺀ ،ﻣﻲﺑﺎﻳﺴﺖ
ﺗﺮﺍﺷﻪ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﺗﻌﻮﻳﺾ ﻧﻤﻮﺩ . •
ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ :ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ﻣﺴﺌﻮﻟﻴﺖ ﺍﺗﺼﺎﻻﺕ ﺭﻭﺗﺮ ﺑﻪ ﺩﻧﻴﺎﻱ ﺧﺎﺭﺝ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺷﺘﻪ ﻭ
ﻣﻲ ﺗﻮﺍﻥ ﺁﻧﺎﻥ ﺭﺍ ﺑﻪ ﺳﻪ ﮔﺮﻭﻩ ﻋﻤﺪﻩ ﺗﻘﺴﻴﻢ ﻧﻤﻮﺩ:
ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻣﺨﺘﺺ ﺷﺒﻜﻪ ﻣﺤﻠﻲ :ﺍﻳﻦ ﻧﻮﻉ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ﻣﻌﻤﻮﻻ" ﻳﻜﻲ ﺍﺯ ﮔﺰﻳﻨﻪ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺍﺗﺮﻧﺖ ﻭ ﻳﺎ Token Ringﻣﻲ ﺑﺎﺷﻨﺪ .ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻓﻮﻕ ﺩﺍﺭﺍﻱ
ﺗﺮﺍﺷﻪ ﻫﺎﻱ ﻛﻨﺘﺮﻟﻲ ﺧﺎﺻﻲ ﻣﻲ ﺑﺎﺷﻨﺪ ﻛﻪ ﻣﻨﻄﻖ ﻻﺯﻡ ﺑﺮﺍﻱ ﺍﺗﺼﺎﻝ ﺳﻴﺴﺘﻢ ﺑﻪ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﭘﻴﻜﺮﺑﻨﺪﻱ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻓﻮﻕ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﺻﻮﺭﺕ
ﺛﺎﺑﺖ ﻭ ﻳﺎ ﻣﺎﮊﻭﻻﺭ ) ﭘﻴﻤﺎﻧﻪ ﺍﻱ ﻭ ﻗﺎﺑﻞ ﺍﻓﺰﺍﻳﺶ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﻴﺎﺯ( ﺑﺎﺷﺪ. ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻣﺨﺘﺺ ﺷﺒﻜﻪ : WANﺷﺎﻣﻞ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﺳﺮﻳﺎﻝ ISDN ،ﻭ ) CSUsﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ ( Channel Service Unitﻣﻲ ﺑﺎﺷﺪ .ﻫﻤﺎﻧﻨﺪ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺷﺒــﻜﻪ ﻫﺎﻱ ﻣﺤﻠﻲ ،ﺍﻳﻦ ﻧﻮﻉ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ﻧﻴﺰ ﺩﺍﺭﺍﻱ ﺗﺮﺍﺷــــﻪ ﻫﺎﻱ ﻛﻨﺘﺮﻟﻲ ﺧﺎﺻﻲ
ﻣﻲ ﺑﺎﺷﻨﺪ ﻛﻪ ﻣﻨﻄﻖ ﻻﺯﻡ ﺑﺮﺍﻱ ﺍﺗﺼﺎﻝ ﺳﻴﺴﺘﻢ ﺑﻪ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲ ﻧﻤﺎﻳﻨﺪ. ﭘﻴﻜﺮﺑﻨﺪﻱ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻓﻮﻕ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﺻﻮﺭﺕ ﺛﺎﺑﺖ ﻭ ﻳﺎ ﻣﺎﮊﻭﻻﺭ ﺑﺎﺷﺪ. ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻛﻨﺴﻮﻝ ﻭ ﻛﻤﻜﻲ :ﺍﻳﻦ ﻧﻮﻉ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ،ﭘﻮﺭﺕ ﻫﺎﻱ ﺳﺮﻳﺎﻟﻲ
ﻣﻲ ﺑﺎﺷﻨﺪ ﻛﻪ ﺍﺯ ﺁﻧﺎﻥ ﺟﻬﺖ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺍﻭﻟﻴﻪ ﺭﻭﺗﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﭘﻮﺭﺕ ﻫﺎﻱ ﻓﻮﻕ ﺭﺍ ﻧﻤﻲ ﺗﻮﺍﻥ ﺑﻪ ﻋﻨﻮﺍﻥ ﭘﻮﺭﺕ ﻫﺎﻱ ﺷﺒﻜﻪ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺖ ﻭ ﺍﺯ ﺁﻧﺎﻥ ﺻﺮﻓﺎ" ﺟﻬﺖ
330
ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺍﺯ ﻃﺮﻳﻖ ﭘﻮﺭﺕ ﻫﺎﻱ ﺍﺭﺗﺒﺎﻃﻲ ﻛﺎﻣﭙﻴﻮﺗﺮ ﻭ ﻳﺎ ﻣﻮﺩﻡ ﺍﺳﺘﻔﺎﺩﻩ ﺑﻌﻤﻞ
ﻣﻲ ﺁﻳﺪ. •
ﻣﻨﺒﻊ ﺗﻐﺬﻳﻪ :ﻣﻨﺒﻊ ﺗﻐﺬﻳﻪ ﺗﻮﺍﻥ ﻻﺯﻡ ﺑﺮﺍﻱ ﻋﻤﻠﻜﺮﺩ ﺻﺤﻴﺢ ﻋﻨﺎﺻﺮ ﺩﺍﺧﻠﻲ ﺭﻭﺗﺮ ﺭﺍ ﺗﺎﻣﻴﻦ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺭﻭﺗﺮﻫﺎﻱ ﺑﺰﺭﮒ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺍﺭﺍﻱ ﭼﻨﺪﻳﻦ ﻣﻨﺒﻊ ﺗﻐﺬﻳﻪ ﺑﺎﺷﻨﺪ .ﺩﺭ
ﺭﻭﺗﺮﻫﺎﻱ ﻛﻮﭼﻚ ﻣﻨﺒﻊ ﺗﻐﺬﻳﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﺻﻮﺭﺕ Externalﺑﺎﺷﺪ. ﻣﺤﻞ ﻧﺼﺐ ﻋﻨﺎﺻﺮ ﺩﺍﺧﻠﻲ ﺩﺭﻭﻥ ﺭﻭﺗﺮ
ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺗﺮ ﻻﺯﻡ ﻧﻴﺴﺖ ﻛﻪ ﺑﺎ ﻣﺤﻞ ﻧﺼﺐ ﻋﻨﺎﺻﺮ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﺩﺭﻭﻥ ﺭﻭﺗﺮ ﺁﺷﻨﺎ
ﺑﺎﺷﻴﻢ ﻭﻟﻲ ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﻧﻈﻴﺮ ﺍﺭﺗﻘﺎﺀ ﺣﺎﻓﻈﻪ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﻣﻲ ﺗﻮﺍﻧﺪ ﺿﺮﻭﺭﺕ ﺧﺎﺹ ﺧﻮﺩ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ .
ﻧﻮﻉ ﻋﻨﺎﺻﺮ ﻭ ﻣﺤﻞ ﻧﺼﺐ ﺁﻧﺎﻥ ﺩﺭ ﺭﻭﺗﺮﻫﺎ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺪﻝ ﺁﻧﺎﻥ ﻣﻲ ﺗﻮﺍﻧﺪ ﻣﺘﻔﺎﻭﺕ ﻭ ﻣﺘﻐﻴﺮ ﺑﺎﺷﺪ .ﺷﻜﻞ ﺯﻳﺮ ﻋﻨﺎﺻﺮ ﺍﺻﻠﻲ ﺩﺍﺧﻠﻲ ﺩﺭ ﻳﻚ ﺭﻭﺗﺮ ٢٦٠٠ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ.
ﻋﻨﺎﺻﺮ ﺍﺻﻠﻲ ﺩﺍﺧﻠﻲ ﺭﻭﺗﺮ ) ٢٦٠٠ﻣﻨﺒﻊ :ﺳﺎﻳﺖ ﺳﻴﺴﻜﻮ (
331
ﺷﻜﻞ ﺯﻳﺮ ﺑﺮﺧﻲ ﻛﺎﻧﻜﺘﻮﺭﻫﺎﻱ ﺧﺎﺭﺟﻲ ﻳﻚ ﺭﻭﺗﺮ ٢٦٠٠ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ.
ﻛﺎﻧﻜﺘﻮﺭﻫﺎﻱ ﺧﺎﺭﺟﻲ ﺭﻭﺗﺮ ) ٢٦٠٠ﻣﻨﺒﻊ :ﺳﺎﻳﺖ ﺳﻴﺴﻜﻮ (
332
ﺁﺷﻨﺎﺋﻲ ﺑﺎ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﺭﻭﺗﺮ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ﻣﺴﺌﻮﻟﻴﺖ ﺍﺗﺼﺎﻻﺕ ﺭﻭﺗﺮ ﺑﻪ ﺩﻧﻴﺎﻱ ﺧﺎﺭﺝ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺷﺘﻪ ﻭ ﻣﻲ ﺗﻮﺍﻥ ﺁﻧﺎﻥ ﺭﺍ ﺑﻪ ﺳﻪ ﮔﺮﻭﻩ ﻋﻤﺪﻩ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻣﺨﺘﺺ ﺷﺒﻜﻪ ﻣﺤﻠﻲ ،ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻣﺨﺘﺺ ﺷﺒﻜﻪ WANﻭ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻛﻨﺴﻮﻝ ﻭ ﻛﻤﻜﻲ ﺗﻘﺴﻴﻢ ﻧﻤﻮﺩ .ﺩﺭ ﺍﻳﻦ ﻣﻄﻠﺐ ﺑﺎ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻓﻮﻕ ﺁﺷﻨﺎ ﺧﻮﺍﻫﻴﻢ ﺷﺪ. ﺍﻧﻮﺍﻉ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﺭﻭﺗﺮ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ﻣﺴﺌﻮﻟﻴﺖ ﺍﺗﺼﺎﻻﺕ ﺭﻭﺗﺮ ﺑﻪ ﺩﻧﻴﺎﻱ ﺧﺎﺭﺝ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺷﺘﻪ ﻭ ﻣﻲ ﺗﻮﺍﻥ ﺁﻧﺎﻥ ﺭﺍ ﺑﻪ ﺳﻪ ﮔﺮﻭﻩ ﻋﻤﺪﻩ ﺗﻘﺴﻴﻢ ﻧﻤﻮﺩ: •
ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻣﺨﺘﺺ ﺷﺒﻜﻪ ﻣﺤﻠﻲ :ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻓﻮﻕ ﻳﻚ ﺭﻭﺗﺮ ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﻪ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺷﺒﻜﻪ ﻣﺤﻠﻲ ﻣﺘﺼﻞ ﮔﺮﺩﺩ .ﺍﻳﻨﮕﻮﻧﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ﻣﻌﻤﻮﻻ" ﻧﻮﻉ ﺧﺎﺻﻲ ﺍﺯ ﺍﺗﺮﻧﺖ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺯ ﺳﺎﻳﺮ ﺗﻜﻨﻮﻟﻮﮊﻱ
ﻫﺎﻱ LANﻧﻈﻴﺮ Token Ringﻭ ﻳﺎ ) ATMﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ Asynchronous ( Transfer Modeﻧﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ. •
ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻣﺨﺘﺺ ﺷﺒﻜﻪ : WANﺍﻳﻦ ﻧﻮﻉ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ﺍﺗﺼﺎﻻﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ
ﺍﺯ ﻃﺮﻳﻖ ﻳﻚ ﺍﺭﺍﺋﻪ ﺩﻫﻨـﺪﻩ ﺳﺮﻭﻳﺲ ﺑﻪ ﻳﻚ ﺳﺎﻳﺖ ﺧﺎﺹ ﻭ ﻳﺎ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﻓﺮﺍﻫـــــﻢ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺍﺗﺼﺎﻻﺕ ﻓﻮﻕ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺯ ﻧﻮﻉ ﺳﺮﻳﺎﻝ ﻭ ﻳﺎ ﻫﺮ ﺗﻌﺪﺍﺩ ﺩﻳﮕﺮ ﺍﺯ
ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ WANﺑﺎﺷﻨﺪ .ﺩﺭ ﺯﻣﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﺧﻲ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ، WANﺑﻪ ﻳﻚ ﺩﺳﺘﮕﺎﻩ ﺧﺎﺭﺟﻲ ﻧﻈﻴﺮ CSUﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﺭﻭﺗﺮ ﺑﻪ ﺍﺗﺼﺎﻝ ﻣﺤﻠﻲ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ
ﺳﺮﻭﻳﺲ ﻧﻴﺎﺯ ﻣﻲ ﺑﺎﺷﺪ .ﺩﺭ ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﺍﺯ ﺍﺗﺼﺎﻻﺕ ، WANﻣﻤﻜﻦ ﺍﺳﺖ ﺭﻭﺗﺮ ﻣﺴﺘﻘﻴﻤﺎ" ﺑﻪ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ ﻣﺘﺼﻞ ﮔﺮﺩﺩ. •
ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻛﻨﺴﻮﻝ ﻭ ﻛﻤﻜﻲ :ﻋﻤﻠﻜﺮﺩ ﭘﻮﺭﺕ ﻫﺎﻱ ﻣﺪﻳﺮﻳﺘﻲ ﻣﺘﻔﺎﻭﺕ ﺍﺯ ﺳﺎﻳﺮ ﺍﺗﺼﺎﻻﺕ ﺍﺳﺖ .ﺍﺗﺼﺎﻻﺕ LANﻭ ، WANﻣﺴﻮﻟﻴﺖ ﺍﻳﺠﺎﺩ ﺍﺗﺼﺎﻻﺕ ﺷﺒﻜﻪ ﺍﻱ ﺑﻪ
333
ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﻓﺮﻳﻢ ﻫﺎ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﻧﺪ ﻭﻟﻲ ﭘﻮﺭﺕ ﻫﺎﻱ ﻣﺪﻳﺮﻳﺘﻲ ﻳﻚ ﺍﺗﺼﺎﻝ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﺘﻦ ﺑﻪ ﻣﻨﻈﻮﺭ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻭ ﺍﺷﻜﺎﻝ ﺯﺩﺍﺋﻲ ﺭﻭﺗﺮ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﭘﻮﺭﺕ ﻫﺎﻱ
ﻛﻤﻜﻲ ) ( auxilliaryﻭ ﻛﻨﺴﻮﻝ ) ( consoleﺩﻭ ﻧﻤﻮﻧﻪ ﻣﺘﺪﺍﻭﻝ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎﻱ ﻣﺪﻳﺮﻳﺖ ﺭﻭﺗﺮ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺍﻳﻦ ﻧﻮﻉ ﭘﻮﺭﺕ ﻫﺎ ،ﺍﺯ ﻧﻮﻉ ﭘﻮﺭﺕ ﻫﺎﻱ ﺳﺮﻳﺎﻝ ﻏﻴﺮﻫﻤﺰﻣﺎﻥ EIA-232ﻣﻲ ﺑﺎﺷﻨﺪ ﻛﻪ ﺑﻪ ﻳﻚ ﭘﻮﺭﺕ ﺍﺭﺗﺒﺎﻃﻲ ﻛﺎﻣﭙﻴﻮﺗﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺩﺭ
ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ﺍﺯ ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﺷﺒﻴﻪ ﺳﺎﺯ ﺗﺮﻣﻴﻨﺎﻝ ﺑﺮ ﺭﻭﻱ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﻳﻚ ﺍﺭﺗﺒﺎﻁ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﺘﻦ ﺑﺎ ﺭﻭﺗﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻣﺪﻳﺮﺍﻥ ﺷﺒﻜﻪ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺭﺗﺒﺎﻁ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﻣﺪﻳﺮﻳﺖ ﻭ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺩﺳﺘﮕﺎﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ. ﺷﻜﻞ ﺯﻳﺮ ﺍﻧﻮﺍﻉ ﺍﺗﺼﺎﻻﺕ ﻳﻚ ﺭﻭﺗﺮ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ.
ﺍﻧﻮﺍﻉ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻳﻚ ﺭﻭﺗﺮ ) ﻣﻨﺒﻊ :ﺳﺎﻳﺖ ﺳﻴﺴﻜﻮ (
ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺎ ﻧﺤﻮﻩ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻓﻮﻕ ﺁﺷﻨﺎ ﺧﻮﺍﻫﻴﻢ ﺷﺪ. ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﻭﺗﺮ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎﻱ ﻣﺪﻳﺮﻳﺖ
ﭘﻮﺭﺕ ﻫﺎﻱ ﻛﻨﺴﻮﻝ ﻭ ﻛﻤﻜﻲ ﺑﻪ ﻣﻨﺰﻟﻪ ﭘﻮﺭﺕ ﻫﺎﻱ ﻣﺪﻳﺮﻳﺘﻲ ﻣﻲ ﺑﺎﺷﻨﺪ ﻛﻪ ﺍﺯ ﺁﻧﺎﻥ ﺑﻪ
ﻣﻨﻈﻮﺭ ﻣﺪﻳﺮﻳﺖ ﻭ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﻭﺗﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺍﻳﻦ ﻧﻮﻉ ﭘﻮﺭﺕ ﻫﺎﻱ ﺳﺮﻳﺎﻝ ﻏﻴﺮﻫﻤﺰﻣﺎﻥ ﺑﻪ ﻋﻨﻮﺍﻥ ﭘﻮﺭﺕ ﻫﺎﻱ ﺷﺒﻜﻪ ﺍﻱ ﻃﺮﺍﺣﻲ ﻧﺸﺪﻩ ﺍﻧﺪ .ﺑﺮﺍﻱ ﭘﻴﻜﺮﻳﻨﺪﻱ ﺍﻭﻟﻴﻪ ﺭﻭﺗﺮ ﺍﺯ ﻳﻜﻲ ﺍﺯ
ﭘﻮﺭﺕ ﻫﺎﻱ ﻓﻮﻕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻣﻌﻤﻮﻻ" ﺑﺮﺍﻱ ﭘﻴﻜﺮﻳﻨﺪﻱ ﺍﻭﻟﻴﻪ ،ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﺗﻮﺻﻴﻪ ﻣﻲ ﮔﺮﺩﺩ ﭼﺮﺍﻛﻪ ﺗﻤﺎﻣﻲ ﺭﻭﺗﺮﻫﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺍﺭﺍﻱ ﻳﻚ ﭘﻮﺭﺕ ﻛﻤﻜﻲ ﻧﺒﺎﺷﻨﺪ. ﺯﻣﺎﻧﻲ ﻛﻪ ﺭﻭﺗﺮ ﺑﺮﺍﻱ ﺍﻭﻟﻴﻦ ﻣﺮﺗﺒﻪ ﻭﺍﺭﺩ ﻣﺪﺍﺭ ﻭ ﻳﺎ ﺳﺮﻭﻳﺲ ﻣﻲ ﮔﺮﺩﺩ ،ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻋﺪﻡ ﻭﺟﻮﺩ ﭘﺎﺭﺍﻣﺘﺮﻫﺎﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﺪﻩ ،ﺍﻣﻜﺎﻥ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻫﻴﭻ ﺷﺒﻜﻪ ﺍﻱ ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ.
334
ﺑﺮﺍﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻭ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺍﻭﻟﻴﻪ ﺭﻭﺗﺮ ،ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﻳﻚ ﺗﺮﻣﻴﻨﺎﻝ ﻭ ﻳﺎ ﻛﺎﻣﭙﻴﻮﺗﺮ ﻛﻪ ﺑﻪ
ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﺭﻭﺗﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ ،ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﭘﺲ ﺍﺯ ﺍﺗﺼﺎﻝ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺭﻭﺗﺮ ، ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘﻮﺭﺍﺕ ﭘﻴﻜﺮﺑﻨﺪﻱ ،ﺗﻨﻈﻴﻤﺎﺕ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﺍﺩ .ﭘﺲ ﺍﺯ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﻭﺗﺮ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﻭ ﻳﺎ ﻛﻤﻜﻲ ،ﺯﻣﻴﻨﻪ ﺍﺗﺼﺎﻝ ﺭﻭﺗﺮ ﺑﻪ ﺷﺒﻜﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺷﻜﺎﻝ
ﺯﺩﺍﺋﻲ ﻭ ﻳﺎ ﻣﺎﻧﻴﺘﻮﺭﻳﻨﮓ ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ. ﻧﺤﻮﻩ ﺍﺗﺼﺎﻝ ﺑﻪ ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﺭﻭﺗﺮ
ﺑﺮﺍﻱ ﺍﺗﺼﺎﻝ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﺭﻭﺗﺮ ،ﺑﻪ ﻳﻚ ﻛﺎﺑﻞ rolloverﻭ ﻳﻚ
ﺁﺩﺍﭘﺘﻮﺭ RJ-45 to DB-9ﻧﻴﺎﺯ ﻣﻲ ﺑﺎﺷﺪ .ﺭﻭﺗﺮﻫﺎﻱ ﺳﻴﺴﻜﻮ ﺑﻪ ﻫﻤﺮﺍﻩ ﺁﺩﺍﭘﺘﻮﺭﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺑﺮﺍﻱ ﺍﺗﺼﺎﻝ ﺑﻪ ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﺍﺭﺍﺋﻪ ﻣﻲ ﮔﺮﺩﻧﺪ .ﻛﺎﻣﭙﻴﻮﺗﺮ ﻭ ﻳﺎ ﺗﺮﻣﻴﻨﺎﻝ ﻣﻲ ﺑﺎﻳﺴﺖ ﻗﺎﺩﺭ ﺑﻪ ﺣﻤﺎﻳﺖ ﺍﺯ ﺷﺒﻴﻪ ﺳﺎﺯﻱ ﺗﺮﻣﻴﻨﺎﻝ VT100ﺑﺎﺷﻨﺪ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺷﺒﻴﻪ ﺳﺎﺯ ﺗﺮﻣﻴﻨﺎﻝ ﻧﻈﻴﺮ HyperTerminalﺍﺳﺘﻔﺎﺩﻩ ﻣﻲﮔﺮﺩﺩ.
ﺑﺮﺍﻱ ﺍﺗﺼﺎﻝ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺭﻭﺗﺮ ﻣﻲ ﺑﺎﻳﺴﺖ ﻣﺮﺍﺣﻞ ﺯﻳﺮ ﺭﺍ ﺩﻧﺒﺎﻝ ﻧﻤﻮﺩ: •
ﭘﻴﻜﺮﺑﻨﺪﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺷﺒﻴﻪ ﺳﺎﺯﻱ ﺗﺮﻣﻴﻨﺎﻝ ﺑﺮ ﺭﻭﻱ ﻛﺎﻣﭙﻴﻮﺗﺮ ) ﺍﻧﺘﺨﺎﺏ ﺷﻤﺎﺭﻩ ﭘﻮﺭﺕ
•
ﺍﺗﺼﺎﻝ ﻛﺎﻧﻜﺘﻮﺭ RJ-45ﻛﺎﺑﻞ rolloverﺑﻪ ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﺭﻭﺗﺮ
ﻣﻨﺎﺳﺐ ﻭ ( ... • •
ﺍﺗﺼﺎﻝ ﺳﺮ ﺩﻳﮕﺮ ﻛﺎﺑﻞ rolloverﺑﻪ ﺁﺩﺍﭘﺘﻮﺭ RJ-45 to DB-9
ﺍﺗﺼﺎﻝ ﺁﺩﺍﭘﺘﻮﺭ DB-9ﺑﻪ ﻛﺎﻣﭙﻴﻮﺗﺮ
ﺷﻜﻞ ﺯﻳﺮ ﻧﺤﻮﻩ ﺍﺗﺼﺎﻝ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺭﻭﺗﺮ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﻛﺎﺑﻞ rolloverﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ :
335
ﺍﺗﺼﺎﻝ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺭﻭﺗﺮ
ﺑﺮﺍﻱ ﻣﺪﻳﺮﻳﺖ ﻭ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺭﻭﺗﺮ ،ﻣﻲ ﺗﻮﺍﻥ ﻳﻚ ﻣﻮﺩﻡ ﺭﺍ ﺑﻪ ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﻭ ﻳﺎ ﻛﻤﻜﻲ ﺭﻭﺗﺮ ﻣﺘﺼﻞ ﻧﻤﻮﺩ .ﺷﻜﻞ ﺯﻳﺮ ﻧﺤﻮﻩ ﺍﺗﺼﺎﻝ ﺭﻭﺗﺮ ﺑﻪ ﻳﻚ ﻣﻮﺩﻡ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ :
ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺭﻭﺗﺮ ﺍﺯ ﻃﺮﻳﻖ ﻣﻮﺩﻡ
ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺷﻜﺎﻝ ﺯﺩﺍﺋﻲ ﺭﻭﺗﺮ ،ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﻧﺴﺒﺖ ﺑﻪ ﭘﻮﺭﺕ ﻛﻤﻜﻲ ﺗﺮﺟﻴﺢ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺩﺭ ﺯﻣﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﺑﻪ ﺻﻮﺭﺕ ﭘﻴﺶ ﻓﺮﺽ ﭘﻴﺎﻡ ﻫﺎﻱ ﺧﻄﺎﺀ ،ﺍﺷﻜﺎﻝ
ﺯﺩﺍﺋﻲ ﻭ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﻧﺪ .ﺍﺯ ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﺩﺭ ﻣﻮﺍﺭﺩﻱ ﻛﻪ ﺳﺮﻭﻳﺲ ﻫﺎﻱ
ﺷﺒﻜﻪ ﻓﻌﺎﻝ ﻧﺸﺪﻩ ﻭ ﻳﺎ ﺑﺎ ﻣﺸﻜﻞ ﻣﻮﺍﺟﻪ ﺷﺪﻩ ﺍﻧﺪ ﻧﻴﺰ ﻣﻲ ﺗﻮﺍﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﮔﺰﻳﻨﻪ ﺍﻱ ﻣﻨﺎﺳﺐ ﺑﺮﺍﻱ ﺑﺎﺯﻳﺎﻓﺖ ﺭﻣﺰ ﻋﺒﻮﺭ ﻭ ﺳﺎﻳﺮ ﻣﺸﻜﻼﺕ ﻏﻴﺮﻗﺎﺑﻞ ﭘﻴﺶ ﺑﻴﻨﻲ ﻣﻲ ﺑﺎﺷﺪ. ﺍﺗﺼﺎﻝ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ LAN ﺩﺭ ﺍﻛﺜﺮ ﻣﺤﻴﻂ ﻫﺎﻱ ، LANﺭﻭﺗﺮ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺍﻳﻨﺘﺮﻓﻴﺲ Ethernetﻭ ﻳﺎ Fast Ethernetﺑﻪ ﺷﺒﻜﻪ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ﺭﻭﺗﺮ ﻫﻤﺎﻧﻨﺪ ﻳﻚ ﻣﻴﺰﺑﺎﻥ ﺍﺳﺖ ﻛﻪ
ﺑﺎ ﺷﺒﻜﻪ LANﺍﺯ ﻃﺮﻳﻖ ﻳﻚ ﻫﺎﺏ ﻭ ﻳﺎ ﺳﻮﺋﻴﭻ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﺍﺗﺼﺎﻝ ﺍﺯ ﻳﻚ ﻛﺎﺑﻞ straight-throughﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ،ﺍﺗﺼﺎﻝ
336
ﺍﺗﺮﻧﺖ ﺭﻭﺗﺮ ﻣﺴﺘﻘﻴﻤﺎ"ﺑﻪ ﻛﺎﻣﭙﻴﻮﺗﺮ ﻭ ﻳﺎ ﺭﻭﺗﺮ ﺩﻳﮕﺮﻱ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ﺍﺯ
ﻳﻚ ﻛﺎﺑﻞ Crossoverﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
ﺩﺭ ﺻﻮﺭﺕ ﻋﺪﻡ ﺍﺳﺘﻔﺎﺩﻩ ﺻﺤﻴﺢ ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ،ﻣﻤﻜﻦ ﺍﺳﺖ ﺭﻭﺗﺮ ﻭ ﻳﺎ ﺳﺎﻳﺮ ﺗﺠﻬﻴﺰﺍﺕ ﺷﺒﻜﻪ ﺍﻱ ﺑﺎ ﻣﺸﻜﻞ ﻣﻮﺍﺟﻪ ﮔﺮﺩﻧﺪ. ﺍﺗﺼﺎﻝ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ WAN ﺍﺗﺼﺎﻻﺕ WANﺩﺍﺭﺍﻱ ﺍﻧﻮﺍﻉ ﻣﺨﺘﻠﻔﻲ ﺑﻮﺩﻩ ﻭ ﺍﺯ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ. ﺳﺮﻭﻳﺲ ﻫﺎﻱ WANﻣﻌﻤﻮﻻ" ﺍﺯ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﮔﺎﻥ ﺳﺮﻭﻳﺲ ﺍﺟﺎﺭﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺧﻄﻮﻁ leasedﻭ ﻳﺎ packet-switchedﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﺍﺯ ﺍﻧﻮﺍﻉ ﻣﺘﻔﺎﻭﺕ ﺍﺗﺼﺎﻻﺕ WAN ﻣﻲ ﺑﺎﺷﻨﺪ. ﺑﺮﺍﻱ ﻫﺮ ﻳﻚ ﺍﺯ ﺍﻧﻮﺍﻉ ﺳﺮﻭﻳﺲ ﻫﺎﻱ ، WANﺩﺳﺘﮕﺎﻩ ﻣﺸﺘﺮﻱ ) ﺍﻏﻠﺐ ﻳﻚ ﺭﻭﺗﺮ ﺍﺳﺖ ( ﺑﻪ
ﻣﻨﺰﻟﻪ ﻳﻚ ) DTEﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ ( data terminal equipmentﺭﻓﺘﺎﺭ ﻣﻲ ﻧﻤﺎﻳﺪ. ﭘﺎﻳﺎﻧﻪ ﻓﻮﻕ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺩﺳﺘﮕﺎﻩ ) DCEﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ data circuit-terminating (equipmentﻛﻪ ﻣﻌﻤﻮﻻ" ﻳﻚ ﻣﻮﺩﻡ ﻭ ﻳﺎ ) CSU/DSUﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ channel ( service unit/data service unitﻣﻲ ﺑﺎﺷﺪ ﺑﻪ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ ﻣﺘﺼﻞ
ﻣﻲ ﮔﺮﺩﺩ .ﺍﺯ ﺩﺳﺘﮕﺎﻩ ﻓﻮﻕ ﺑﺮﺍﻱ ﺗﺒﺪﻳﻞ ﺩﺍﺩﻩ ﺍﺯ DTEﺑﻪ ﻳﻚ ﺷﻜﻞ ﻗﺎﺑﻞ ﻗﺒﻮﻝ ﺑﺮﺍﻱ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ ، WANﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ ) WANﻣﻨﺒﻊ :ﺳﺎﻳﺖ ﺳﻴﺴﻜﻮ (
337
ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﺳﺮﻳﺎﻝ ،ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﺭﻭﺗﺮ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﻫﺎﻱ WANﻣﻲ ﺑﺎﺷﻨﺪ .ﺑﺮﺍﻱ ﺍﻧﺘﺨﺎﺏ ﻛﺎﺑﻞ ﺳﺮﻳﺎﻝ ﻣﻨﺎﺳﺐ ،ﺑﺮﺭﺳﻲ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﭘﻴﺸﻨﻬﺎﺩ ﻣﻲ ﮔﺮﺩﺩ: •
ﻧﻮﻉ ﺍﻳﻨﺘﺮﻓﻴﺲ :ﺭﻭﺗﺮﻫﺎﻱ ﺳﻴﺴﻜﻮ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺯ ﻛﺎﻧﻜﺘﻮﺭﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺑﺮﺍﻱ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﺳﺮﻳﺎﻝ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ .ﻣﺜﻼ" ﺩﺭ ﺑﺮﺧﻲ ﺭﻭﺗﺮﻫﺎ ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ
ﺳﺮﻳﺎﻝ smartﻭ ﻳﺎ ﻳﻚ ﺍﺗﺼﺎﻝ DB-60ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ. •
ﻧﻮﻉ ﺍﺗﺼﺎﻝ ﺷﺒﻜﻪ :ﺁﻳﺎ ﺷﺒﻜﻪ ﺑﻪ ﻳﻚ ﺩﺳﺘﮕﺎﻩ DCEﻭ ﻳﺎ DTEﻣﺘﺼﻞ ﺍﺳﺖ؟ DCE
ﻭ DTEﺩﻭ ﻧﻮﻉ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺳﺮﻳﺎﻝ ﻣﻲ ﺑﺎﺷﻨﺪ ﻛﻪ ﺩﺳﺘﮕﺎﻩ ﻫﺎ ﺍﺯ ﺁﻧﺎﻥ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻳﻜﺪﻳﮕﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺍﺭﺍﺋﻪ ﺳﻴﮕﻨﺎﻝ ﻛﻼﻙ ﺑﺮﺍﻱ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺑﺮ ﺭﻭﻱ ﮔﺬﺭﮔﺎﻩ ،ﻣﻬﻤﺘﺮﻳﻦ ﻭﻳﮋﮔﻲ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ DTEﻣﺤﺴﻮﺏ ﻣﻲ ﮔﺮﺩﺩ.
•
ﻧﻮﻉ ﺳﻴﮕﻨﺎﻟﻴﻨﮓ :ﺑﺮﺍﻱ ﻫﺮ ﺩﺳﺘـﮕﺎﻩ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﻳﻚ ﺍﺳﺘــﺎﻧﺪﺍﺭﺩ ﺳﺮﻳﺎﻝ ﻣﺘﻔـــﺎﻭﺕ
ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﻫﺮ ﺍﺳـــﺘﺎﻧﺪﺍﺭﺩ ،ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﻛﺎﺑﻞ ﺭﺍ ﺗﻌﺮﻳﻒ ﻭ ﻧﻮﻉ
ﻛﺎﻧﻜﺘﻮﺭﻫﺎﻱ ﺩﻭ ﺳﺮ ﻛﺎﺑﻞ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ.
338
ﺭﻭﺗﺮ ﻭ ﺟﺎﻳﮕﺎﻩ ﺁﻥ ﺩﺭ ﺷﺒﻜﻪ ﻫﺎﻱ WAN ﺭﻭﺗﺮ ﻳﻜﻲ ﺍﺯ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﺷﺒﻜﻪ ﺍﻱ ﻣﻬﻢ ﻭ ﺣﻴﺎﺗﻲ ﺍﺳﺖ ﻛﻪ ﺍﺯ ﺁﻥ ﺩﺭ ﺷﺒﻜﻪ ﻫﺎﻱ LANﻭ WANﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺍﻳﻦ ﻣﻄﻠﺐ ﭘﺲ ﺍﺯ ﺁﺷﻨﺎﺋﻲ ﺍﻭﻟﻴﻪ ﺑﺎ ﺭﻭﺗﺮ ،ﺑﺎ ﺟﺎﻳﮕﺎﻩ ﺁﻥ ﺩﺭ ﺷﺒﻜﻪ ﻫﺎﻱ WANﺁﺷﻨﺎ ﺧﻮﺍﻫﻴﻢ ﺷﺪ. ﺁﺷﻨﺎﺋﻲ ﺍﻭﻟﻴﻪ ﺑﺎ ﺭﻭﺗﺮ
ﺭﻭﺗﺮ ﻳﻚ ﻧﻮﻉ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺧﺎﺹ ﺍﺳﺖ ﻛﻪ ﺩﺍﺭﺍﻱ ﻋﻨﺎﺻﺮ ﻣﺸﺎﺑﻪ ﻳﻚ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ
ﺷﺨﺼﻲ ﻧﻈﻴﺮ ﭘﺮﺩﺍﺯﻧﺪﻩ ،ﺣﺎﻓﻈﻪ ،ﺧﻄﻮﻁ ﺩﺍﺩﻩ ﻭ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻣﺨﺘﻠﻒ ﻭﺭﻭﺩﻱ ﻭ ﺧﺮﻭﺟﻲ ﺍﺳﺖ .ﺭﻭﺗﺮﻫﺎ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﺑﺴﻴﺎﺭ ﺧﺎﺹ ﻛﻪ ﻋﻤﻮﻣﺎ" ﻧﻤﻲ ﺗﻮﺍﻥ ﺁﻧﺎﻥ ﺭﺍ ﺗﻮﺳﻂ
ﻛﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺷﺨﺼﻲ ﺍﻧﺠﺎﻡ ﺩﺍﺩ ،ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺍﻧﺪ .ﻣﺜﻼ" ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺗﺮ ﻣﻲ ﺗﻮﺍﻥ ﺩﻭ ﺷﺒﻜﻪ ﺭﺍ ﺑﻪ ﻳﻜﺪﻳﮕﺮ ﻣﺘﺼﻞ ﺗﺎ ﺩﺭ ﺍﺩﺍﻣﻪ ﺍﻣﻜﺎﻥ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺑﻴﻦ ﺁﻧﺎﻥ ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ .ﺭﻭﺗﺮ، ﻫﻤﭽﻨﻴﻦ ﺑﻬﺘﺮﻳﻦ ﻣﺴﻴﺮ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺍﺯ ﻳﻚ ﺷﺒﻜﻪ ﺑﻪ ﺷﺒﻜﻪ ﺍﻱ ﺩﻳﮕﺮ ﺭﺍ ﺗﻌﻴﻴﻦ ﻣﻲ ﻧﻤﺎﻳﺪ. ﻛﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺟﺮﺍﻱ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺑﻪ ﻳﻚ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻧﻴﺎﺯ ﺩﺍﺭﻧﺪ ،ﺍﻳﻦ
ﻭﺿﻌﻴﺖ ﺩﺭ ﺭﻭﺗﺮﻫﺎ ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﻭ ﺁﻧﺎﻥ ﻧﻴﺰ ﺟﻬﺖ ﺍﺟﺮﺍﻱ ﻓﺎﻳﻞ ﻫﺎﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺑﻪ ﻳﻚ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻛﻪ ﺑﻪ ﺁﻥ ) IOSﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ Internetwork Operating System
( softwareﮔﻔﺘﻪ ﻣﻲ ﺷﻮﺩ ،ﻧﻴﺎﺯ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺷﺖ .ﻓﺎﻳﻞ ﻫﺎﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﺎﻣﻞ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ
ﻫﺎ ﻭ ﭘﺎﺭﺍﻣﺘﺮﻫﺎﺋﻲ ﻣﻲ ﺑﺎﺷﻨﺪ ﻛﻪ ﺑﺮ ﺍﺳﺎﺱ ﺁﻧﺎﻥ ﺗﺮﺍﻓﻴﻚ ﻭﺭﻭﺩﻱ ﻭ ﺧﺮﻭﺟﻲ ﺭﻭﺗﺮ ﻛﻨــــــﺘﺮﻝ ﻣﻲ ﮔﺮﺩﺩ .ﻣﺜﻼ" ﺭﻭﺗﺮﻫﺎ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﻜﻞ ﻫﺎﻱ ﺭﻭﺗﻴﻨﮓ ،ﻗﺎﺩﺭ ﺑﻪ ﺍﺗﺨﺎﺫ ﺗﺼﻤﻴﻢ
ﻣﻨﺎﺳﺐ ﺩﺭ ﺧﺼﻮﺹ ﺑﻬﺘﺮﻳﻦ ﻣﺴﻴﺮ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻣﻲ ﺑﺎﺷﻨﺪ.
ﺣﺎﻓﻈﻪ ﻫﺎﻱ ، NVRAM ، RAMﻓﻠﺶ ROM ،ﻭ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ﻣﻬﻤﺘﺮﻳﻦ ﻋﻨﺎﺻﺮ ﺩﺍﺧﻠﻲ ﻳﻚ ﺭﻭﺗﺮ ﻣﻲ ﺑﺎﺷﻨﺪ ﻛﻪ ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺑﺮﺭﺳﻲ ﻫﺮ ﻳﻚ ﺍﺯ ﺁﻧﺎﻥ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ.
339
ﺣﺎﻓﻈﻪ ) RAMﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ : ( random access memoryﺣﺎﻓﻈﻪ RAM ﻛﻪ ﺑﻪ ﺁﻥ ) DRAMﺣﺎﻓﻈﻪ RAMﭘﻮﻳﺎ ( ﻧﻴﺰ ﮔﻔﺘﻪ ﻣﻲﺷﻮﺩ ﺩﺍﺭﺍﻱ ﺧﺼﻮﺻﻴﺎﺕ ﻭ ﻭﻇﺎﻳﻒ ﺯﻳﺮ ﻣﻲ ﺑﺎﺷﺪ : •
ﺫﺧﻴﺮﻩ ﺟﺪﺍﻭﻝ ﺭﻭﺗﻴﻨﮓ
•
ﻧﮕﻬﺪﺍﺭﻱ Cache ARP
•
ﻧﮕﻬﺪﺍﺭﻱ fast-Switching cache
•
ﻧﮕﻬﺪﺍﺭﻱ ﻭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺍﺯ ﺻﻒ ﻫﺎﻱ ﺣﺎﻭﻱ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ
•
ﺍﺭﺍﺋﻪ ﺣﺎﻓﻈﻪ ﻣﻮﻗﺖ ﺑﺮﺍﻱ ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺩﺭ ﺯﻣﺎﻥ ﺭﻭﺷﻦ ﻛﺮﺩﻥ ﺭﻭﺗﺮ
•
ﻋﺪﻡ ﻧﮕﻬﺪﺍﺭﻱ ﺍﻃﻼﻋﺎﺕ ﭘﺲ ﺍﺯ ﺧﺎﻣﻮﺵ ﻛﺮﺩﻥ ﻭ ﻳﺎ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﻣﺠﺪﺩ ﺭﻭﺗﺮ
ﺣﺎﻓﻈﻪ ) NVRAMﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ nonvolatile random-access : ( memoryﺣﺎﻓﻈﻪ NVRAMﻳﺎ ﻏﻴﺮﻓﺮﺍﺭ ﺩﺍﺭﺍﻱ ﺧﺼﺎﻳﺺ ﻭ ﻭﻇﺎﻳﻒ ﺯﻳﺮ ﻣﻲ ﺑﺎﺷﺪ : •
ﻣﺤﻞ ﻧﮕﻬﺪﺍﺭﻱ ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺭﻭﺗﺮ
•
ﻧﮕﻬﺪﺍﺭﻱ ﺍﻃﻼﻋﺎﺕ ﭘﺲ ﺍﺯ ﺧﺎﻣﻮﺵ ﻛﺮﺩﻥ ﻭ ﻳﺎ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﻣﺠﺪﺩ ﺭﻭﺗﺮ
ﺣﺎﻓﻈﻪ ﻓﻠﺶ :ﺣﺎﻓﻈﻪ ﻓﻠﺶ ﺩﺍﺭﺍﻱ ﺧﺼﺎﻳﺺ ﻭ ﻭﻇﺎﻳﻒ ﺯﻳﺮ ﻣﻲ ﺑﺎﺷﺪ: •
ﻧﮕﻬﺪﺍﺭﻱ ) IOSﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ (
•
ﺑﻬﻨﮕﺎﻡ ﺳﺎﺯﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺑﺪﻭﻥ ﺿﺮﻭﺭﺕ ﺗﻌﻮﻳﺾ ﻭ ﻳﺎ ﺟﺎﻳﮕﺰﻳﻨﻲ ﺗﺮﺍﺷﻪ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﭘﺮﺩﺍﺯﻧﺪﻩ
•
ﻧﮕﻬﺪﺍﺭﻱ ﺍﻃﻼﻋﺎﺕ ﭘﺲ ﺍﺯ ﺧﺎﻣﻮﺵ ﻛﺮﺩﻥ ﻭ ﻳﺎ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﻣﺠﺪﺩ ﺭﻭﺗﺮ
•
ﻗﺎﺑﻠﻴﺖ ﺫﺧﻴﺮﻩ ﭼﻨﺪﻳﻦ ﻧﺴﺨﻪ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭ IOS
340
•
ﺍﻣﻜﺎﻥ ﺣﺬﻑ ﺍﻃﻼﻋﺎﺕ ) ﻳﻚ ﻧﻮﻉ ﺧﺎﺹ ﺍﺯ ﺣﺎﻓﻈﻪ ﻫﺎﻱ ROMﺑﺎ ﻗﺎﺑﻠﻴﺖ ﺣﺬﻑ ﺍﻟﻜﺘﺮﻭﻧﻴﻜﻲ ﺍﻃﻼﻋﺎﺕ( EEPROM :
ﺣﺎﻓﻈﻪ ) ROMﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ ،( Read-only memoryﺣﺎﻓﻈﻪ ROMﻭ ﻳﺎ ﻓﻘﻂ ﺧﻮﺍﻧﺪﻧﻲ ﺩﺍﺭﺍﻱ ﺧﺼﺎﻳﺺ ﻭ ﻭﻇﺎﻳﻒ ﺯﻳﺮ ﻣﻲ ﺑﺎﺷﺪ: •
ﻧﮕﻬﺪﺍﺭﻱ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎﻱ ﻻﺯﻡ ﺑﺮﺍﻱ ﺍﺷﻜﺎﻝ ﺯﺩﺍﺋﻲ ﻭ ﺍﺟﺮﺍﻱ ﺑﺮﻧﺎﻣﻪ POST ) ﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ ( power-on self test
•
ﺫﺧﻴﺮﻩ ﺑﺮﻧﺎﻣﻪ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺭﻭﺗﺮ ﻣﻮﺳﻮﻡ ﺑﻪ bootstrapﻭ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺍﻭﻟﻴﻪ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ
•
ﺗﻌﻮﻳﺾ ﺗﺮﺍﺷﻪ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺑﺮﺩ ﺍﺻﻠﻲ ﺩﺭ ﺻﻮﺭﺕ ﻧﻴﺎﺯ ﺑﻪ ﺍﺭﺗﻘﺎﺀ ﻧﺮﻡ ﺍﻓﺰﺍﺭ
ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ :ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ﺩﺍﺭﺍﻱ ﺧﺼﺎﻳﺺ ﻭ ﻭﻇﺎﻳﻒ ﺯﻳﺮ ﻣﻲ ﺑﺎﺷﻨﺪ: • •
ﺭﻭﺗﺮ ﺭﺍ ﺑﻪ ﺷﺒﻜﻪ ﻣﺘﺼﻞ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ) ﻭﺭﻭﺩ ﻭ ﺧﺮﻭﺝ ﻓﺮﻳﻢ ﻫﺎ(.
ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮ ﺭﻭﻱ ﺑﺮﺩ ﺍﺻﻠﻲ ﻭ ﻳﺎ ﺑﻪ ﻋﻨﻮﺍﻥ ﻣﺎﮊﻭﻝ ﻫﺎﻱ ﺟﺪﺍﮔﺎﻧﻪ
ﺍﺭﺍﺋﻪ ﮔﺮﺩﻧﺪ . ﺟﺎﻳﮕﺎﻩ ﺭﻭﺗﺮ ﺩﺭ ﺷﺒﻜﻪ ﻫﺎﻱ LANﻭ WAN ﺑﺎ ﺍﻳﻦ ﻛﻪ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺭﻭﺗﺮ ﺑﺮﺍﻱ ﺗﻘﺴﻴﻢ ) ( Segmentationﻳﻚ ﺷﺒﻜﻪ ﻣﺤﻠﻲ
ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ ﻭﻟﻲ ﻣﻬﻤﺘﺮﻳﻦ ﻛﺎﺭﺑﺮﺩ ﺁﻥ ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﻚ ﺩﺳﺘﮕﺎﻩ ﺷﺒﻜﻪ ﺍﻱ ﺩﺭ ﺷﺒﻜﻪ ﻫﺎﻱ WANﻣﻲ ﺑﺎﺷﺪ .ﺷﻜﻞ ﺯﻳﺮ ﻧﺤﻮﻩ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺗﺮ ﺩﺭﻳﻚ ﺷﺒﻜﻪ ﻣﺤﻠﻲ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ.
341
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺗﺮ ﺩﺭﻳﻚ ﺷﺒﻜﻪ ﻣﺤﻠﻲ ) ﻣﻨﺒﻊ :ﺳﺎﻳﺖ ﺳﻴﺴﻜﻮ (
ﺍﺯ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ WANﺩﺭ ﺍﻛﺜﺮ ﻣﻮﺍﺭﺩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﺭﻭﺗﺮﻫﺎ ﺑﻪ ﻳﻜﺪﻳﮕﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ ﻭ ﺭﻭﺗﺮﻫﺎ ﺑﺎ ﺍﺗﺼﺎﻻﺕ ﻣﺒﺘﻲ ﺑﺮ WANﺑﺎ ﻳﻜﺪﻳﮕﺮ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﻲ ﻧﻤﺎﻳﻨﺪ. ﺭﻭﺗﺮﻫﺎ ﻣﺴﺌﻮﻟﻴﺖ ﺍﻳﺠﺎﺩ ﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ ﺩﺭ ﺷﺒﻜﻪ ﻫﺎﻱ ﺩﺍﺧﻠﻲ ﺑﺰﺭﮒ ) ﺍﻳﻨﺘﺮﺍﻧﺖ ( ﻭ ﻳﺎ
ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺷﺘﻪ ﻭ ﺩﺭ ﻻﻳﻪ ﺳﻮﻡ ﻣﺪﻝ ﻣﺮﺟﻊ OSIﻓﻌﺎﻟﻴﺖ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ) ﺍﺗﺨﺎﺫ
ﺗﺼﻤﻴﻢ ﺑﺮ ﺍﺳﺎﺱ ﺁﺩﺭﺱ ﻫﺎﻱ ﺷﺒﻜﻪ (. ﺍﻧﺘﺨﺎﺏ ﺑﻬﺘﺮﻳﻦ ﻣﺴﻴﺮ ﻭ ﺳﻮﺋﻴﭽﻴﻨﮓ ﻓﺮﻳﻢ ﻫﺎ ﺑﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻣﻨﺎﺳﺐ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﻭﻇﺎﻳﻒ ﻳﻚ ﺭﻭﺗﺮ ﻣﺤﺴﻮﺏ ﻣﻲ ﮔﺮﺩﺩ .ﺭﻭﺗﺮﻫﺎ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺠﺎﻡ ﻭﻇﺎﻳﻒ ﻓﻮﻕ ﺟﺪﺍﻭﻝ
ﺭﻭﺗﻴﻨﮕﻲ ﺭﺍ ﺍﻳﺠﺎﺩ ) ﺍﻳﺴﺘﺎ ﻭ ﻳﺎ ﭘﻮﻳﺎ ( ﺗﺎ ﺑﻪ ﻛﻤﻚ ﺁﻥ ﺍﻗﺪﺍﻡ ﺑﻪ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺷﺒﻜﻪ ﺑﺎ ﺳﺎﻳﺮ ﺭﻭﺗﺮﻫﺎ ﻧﻤﺎﻳﻨﺪ .ﻳﻚ ﻣﺪﻳﺮ ﺷﺒﻜﻪ ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﺎ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻣﺴﻴﺮﻫﺎﻱ ﺍﻳﺴﺘﺎ ،ﺍﻃﻼﻋﺎﺕ ﺟﺪﺍﻭﻝ ﺭﻭﺗﻴﻨﮓ ﺭﺍ ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﻭ ﻣﺪﻳﺮﻳﺖ ﻧﻤﺎﻳﺪ ﻭﻟﻲ ﻋﻤﻮﻣﺎ" ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺟﺪﺍﻭﻝ ﺭﻭﺗﻴﻨﮓ ﺑﻪ ﺻﻮﺭﺕ ﭘﻮﻳﺎ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﭘﺮﻭﺗﻜﻞ ﺭﻭﺗﻴﻨﮓ ﺫﺧﻴﺮﻩ ﻭ ﺑﻬﻨﮕﺎﻡ ﻣﻲ ﮔﺮﺩﻧﺪ .ﻣﺴﺌﻮﻟﻴﺖ
ﭘﺮﻭﺗﻜﻞ ﺭﻭﺗﻴﻨﮓ ،ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺗﻮﭘﻮﻟﻮﮊﻱ ﺷﺒﻜﻪ ) ﻣﺴﻴﺮ( ﺑﺎ ﺳﺎﻳﺮ ﺭﻭﺗﺮﻫﺎ ﻣﻲ ﺑﺎﺷﺪ.
ﻳﻚ ﺷﺒﻜﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﺎﻳﺮ ﺷﺒﻜﻪ ﻫﺎ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﺩﺭﺳﺘﻲ ﭘﻴﻜﺮﺑﻨﺪﻱ ﮔﺮﺩﺩ .ﺍﻳﻦ ﭼﻨﻴﻦ ﺷﺒﻜﻪ ﻫﺎﺋﻲ ﺍﻣﻜﺎﻧﺎﺕ ﺯﻳﺮ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲ ﻧﻤﺎﻳﻨﺪ: • •
ﺁﺩﺭﺱ ﺩﻫﻲ ﭘﻴﻮﺳﺘﻪ ﻭ ﺳﺎﺯﮔﺎﺭ ﺍﻧﺘﺨﺎﺏ ﺑﻬﺘﺮﻳﻦ ﻣﺴﻴﺮ
342
•
ﺭﻭﺗﻴﻨﮓ ﺍﻳﺴﺘﺎ ﻭ ﻳﺎ ﭘﻮﻳﺎ
•
ﺳﻮﺋﻴﭽﻴﻨﮓ
•
ﺁﺩﺭﺱ ﻫﺎﺋﻲ ﻛﻪ ﺑﻴﺎﻧﮕﺮ ﺗﻮﭘﻮﻟﻮﮊﻱ ﻫﺎﻱ ﺷﺒﻜﻪ ﻣﻲ ﺑﺎﺷﻨﺪ.
ﺟﺎﻳﮕﺎﻩ ﺭﻭﺗﺮ ﺩﺭ ﺷﺒﻜﻪ ﻫﺎﻱ WAN
ﺷﺒﻜﻪ ﻫﺎﻱ WANﺩﺭ ﻻﻳﻪ ﻓﻴﺰﻳﻜﻲ ﻭ data linkﻣﺪﻝ ﻣﺮﺟﻊ OSIﻓﻌﺎﻟﻴﺖ ﻣﻲ ﻧﻤﺎﻳﻨﺪ. ﻣﻄﻠﺐ ﻓﻮﻕ ﺑﺪﻳﻦ ﻣﻌﻨﻲ ﻧﻤﻲ ﺑﺎﺷﺪ ﻛﻪ ﭘﻨﺞ ﻻﻳﻪ ﺩﻳﮕﺮ ﻣﺪﻝ ﻣﺮﺟﻊ OSIﺩﺭ ﺷﺒﻜﻪ ﻫﺎﻱ WANﺟﺎﻳﮕﺎﻫﻲ ﻧﺪﺍﺭﻧﺪ .ﻋﺒﺎﺭﺕ ﻓﻮﻕ ﺑﺮ ﺍﻳﻦ ﻧﻜﺘﻪ ﻣﻬﻢ ﺗﺎﻛﻴﺪ ﻣﻲ ﻧﻤﺎﻳﺪ ﻛﻪ ﺧﺼﺎﻳﺼﻲ ﻛﻪ
ﻳﻚ ﺷﺒﻜﻪ WANﺭﺍ ﺍﺯ LANﻣﺘﻤﺎﻳﺰ ﻣﻲ ﻧﻤﺎﻳﺪ ﺩﺭ ﻻﻳﻪ ﻫﺎﻱ ﻓﻴﺰﻳﻜﻲ ﻭ link data ﺣﻀﻮﺭ ﻣﻮﺛﺮ ﻭ ﻛﺎﻣﻼ" ﻣﺸﻬﻮﺩﻱ ﺭﺍ ﺩﺍﺭﻧﺪ .ﺑﻪ ﻋﺒﺎﺭﺕ ﺩﻳﮕﺮ ،ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﻭ ﭘﺮﻭﺗﻜﻞ ﻫﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﺷﺒﻜﻪ ﻫﺎﻱ WANﻭ ﺩﺭ ﻻﻳﻪ ﻫﺎﻱ ﺍﻭﻝ ﻭ ﺩﻭﻡ ﻣﺘﻔﺎﻭﺕ ﺑﺎ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﻭ
ﭘﺮﻭﺗﻜﻞ ﻫﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﺷﺒﻜﻪ ﻫﺎﻱ ﻣﺤﻠﻲ ﻭ ﺩﺭ ﻻﻳﻪ ﻫﺎﻱ ﻣﺸﺎﺑﻪ ﻣﻲ ﺑﺎﺷﺪ. ﻻﻳﻪ ﻓﻴﺰﻳﻜﻲ ،WANﺍﻳﻨﺘﺮﻓﻴﺲ ﺑﻴﻦ ) DTEﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ
data terminal
( equipmentﻭ ) DCEﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ ( data circuit equipmentﺭﺍ ﺗﺸﺮﻳﺢ ﻣﻲ ﻧﻤﺎﻳﺪ .ﻋﻤﻮﻣﺎ" DCE ،ﻳﻚ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ ﻭ DTEﺩﺳﺘﮕﺎﻩ ﺿﻤﻴﻤﻪ ﻣﻲ ﺑﺎﺷﺪ. ﺑﻪ ﻋﺒﺎﺭﺕ ﺩﻳﮕﺮ ، DTEﺩﺳﺘﮕﺎﻩ ﻛﺎﺭﺑﺮ ﺑﺎ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻣﺮﺑﻮﻃﻪ ﺍﺳﺖ ﻛﻪ ﺑﻪ ﻟﻴﻨﻚ WANﻣﺘﺼﻞ
ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺍﻳﻦ ﻣﺪﻝ ،ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺑﻪ DTEﺍﺯ ﻃﺮﻳﻖ ﻳﻚ ﻣﻮﺩﻡ ﻭ ﻳﺎ CSU/DSUﺩﺭ ﺩﺳﺘﺮﺱ ﻗﺮﺍﺭ ﻣﻲ ﮔﻴﺮﺩ. ﻭﻇﻴﻔﻪ ﺍﺻﻠﻲ ﻳﻚ ﺭﻭﺗﺮ ،ﺭﻭﺗﻴﻨﮓ ﺍﺳﺖ ﻭ ﺭﻭﺗﻴﻨﮓ ﺩﺭ ﻻﻳﻪ ﺷﺒﻜﻪ ﻭ ﻳﺎ ﻻﻳﻪ ﺳﻮﻡ ﻣﺪﻝ ﻣﺮﺟﻊ
OSIﻣﺤﻘﻖ ﻣﻲ ﮔﺮﺩﺩ ﻭﻟﻲ ﺍﮔﺮ ﻳﻚ ﺷﺒﻜﻪ WANﺩﺭ ﻻﻳﻪ ﻫﺎﻱ ﺍﻭﻝ ﻭ ﺩﻭﻡ ﻣﺪﻝ ﻣﺮﺟﻊ OSIﻓﻌﺎﻟﻴﺖ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺁﻳﺎ ﺭﻭﺗﺮ ﻳﻚ ﺩﺳﺘﮕﺎﻩ ﺷﺒﻜﻪ ﻣﺤﻠﻲ ﻭ ﻳﺎ ﻳﻚ ﺩﺳﺘﮕﺎﻩ WANﺍﺳﺖ ؟ ﺩﺭ ﭘﺎﺳﺦ ﺑﻪ ﺳﻮﺍﻝ ﻓﻮﻕ ﻣﻲ ﺑﺎﻳﺴﺖ ﮔﻔﺖ ﻛﻪ ﻫﺮ ﺩﻭ ﮔﺰﻳﻨﻪ ﺩﺭﺳﺖ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻳﻚ ﺭﻭﺗﺮ
ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﻧﺤﺼﺎﺭﺍ" ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﻚ ﺩﺳﺘﮕﺎﻩ ﺷﺒﻜﻪ ﻣﺤﻠﻲ ﺍﻳﻔﺎﻱ ﻭﻇﻴﻔﻪ ﻧﻤﺎﻳﺪ ﻭ ﻳﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﻣﻨﺤﺼﺮﺍ" ﻭﻇﻴﻔﻪ ﻳﻚ ﺩﺳﺘﮕﺎﻩ WANﺭﺍ ﺩﺭ ﺷﺒﻜﻪ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻭ ﻳﺎ ﺩﺭ ﺑﺮﺧﻲ
343
ﻣﻮﺍﺭﺩ ﻛﻪ ﺩﺭ ﻣﺤﺪﻭﺩﻩ ﻣﺮﺯﻱ ﺑﻴﻦ ﻳﻚ ﺷﺒﻜﻪ LANﻭ WANﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ ،ﺩﺭ ﻳﻚ
ﻟﺤﻈﻪ ﻣﻲﺗﻮﺍﻧﺪ ﻫﻢ ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﻚ ﺩﺳﺘﮕﺎﻩ ﺷﺒﻜﻪ ﻣﺤﻠﻲ ﻭ ﻫﻢ ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﻚ ﺩﺳﺘﮕﺎﻩ WAN
ﻭﻇﺎﻳﻒ ﻣﺤﻮﻟﻪ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﺪ . ﻳﻜﻲ ﺍﺯ ﻭﻇﺎﻳﻒ ﺭﻭﺗﺮ ﺩﺭ ﺷﺒﻜﻪ ﻫﺎﻱ ، WANﻣﺴﻴﺮﺩﻫﻲ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﻻﻳﻪ ﺳﻮﻡ
ﺍﺳﺖ ﻭﻟﻲ ﺭﻭﺗﺮ ﺩﺭ ﻳﻚ ﺷﺒﻜﻪ ﻣﺤﻠﻲ ﻧﻴﺰ ﺩﺍﺭﺍﻱ ﭼﻨﻴﻦ ﻣﺴﺌﻮﻟﻴﺘﻲ ﺍﺳﺖ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﻧﻤﻲ ﺗﻮﺍﻥ
ﺭﻭﺗﻴﻨﮓ ﺭﺍ ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﻚ ﻭﻇﻴﻔﻪ ﺍﺧﺘﺼﺎﺻﻲ ﺑﺮﺍﻱ ﺭﻭﺗﺮ ﺩﺭ ﺷﺒﻜﻪ ﻫﺎﻱ WANﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺖ .ﺯﻣﺎﻧﻲ ﻛﻪ ﻳﻚ ﺭﻭﺗﺮ ﺍﺯ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﻭ ﭘﺮﻭﺗﻜﻞ ﻫﺎﻱ ﻣﺮﺗﺒﻂ ﺑﺎ WANﺩﺭ ﻻﻳﻪ ﻫﺎﻱ
ﻓﻴﺰﻳﻜﻲ ﻭ data linkﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﻭﻱ ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﻚ ﺩﺳﺘﮕﺎﻩ WANﺩﺭ ﺷﺒﻜﻪ ﺍﻳﻔﺎﻱ ﻭﻇﻴﻔﻪ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺍﻭﻟﻴﻦ ﻭﻇﻴﻔﻪ ﺭﻭﺗﺮ ﺩﺭ ﻳﻚ ﺷﺒﻜﻪ WANﺭﻭﺗﻴﻨﮓ ﻧﻤﻲ ﺑﺎﺷﺪ ﻭ ﺍﮔﺮ
ﻗﺮﺍﺭ ﺍﺳﺖ ﺑﺮﺍﻱ ﺁﻥ ﻭﻇﻴﻔﻪ ﺍﻱ ﺍﺧﺘﺼﺎﺻﻲ ﺭﺍ ﺗﻌﺮﻳﻒ ﻧﻤﺎﺋﻴﻢ ﺑﻬﺘﺮ ﺍﺳﺖ ﮔﻔﺘﻪ ﺷﻮﺩ ﻛﻪ ﻣﺴﺌﻮﻟﻴﺖ ﺭﻭﺗﺮ ﺩﺭ ﺷﺒﻜﻪ ﻫﺎﻱ ، WANﺍﺭﺍﺋﻪ ﺍﺗﺼﺎﻻﺕ ﻻﺯﻡ ﺑﻴﻦ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻣﺨﺘﻠﻒ data linkﻭ ﻓﻴﺮﻳﻜﻲ WANﺍﺳﺖ. ﻣﺜﻼ" ﻳﻚ ﺭﻭﺗﺮ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺍﺭﺍﻱ ﻳﻚ ﺍﻳﻨﺘﺮﻓﻴﺲ ISDNﺑﺎﺷﺪ ﻛﻪ ﺍﺯ ﻛﭙﺴﻮﻟﻪ ﺳﺎﺯﻱ PPP ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ ﻭ ﻫﻤﭽﻨﻴﻦ ﺩﺍﺭﺍﻱ ﻳﻚ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺳﺮﻳﺎﻝ T1ﺑﺎﺷﺪ ﻛﻪ ﺩﺭ ﺁﻥ ﺍﺯ ﻛﭙﺴﻮﻟﻪ
ﺳﺎﺯﻱ Frame Relayﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﭼﻨﻴﻦ ﻭﺿﻌﻴﺘﻲ ﺭﻭﺗﺮ ﻣﻲ ﺑﺎﻳﺴﺖ ﻗﺎﺩﺭ ﺑﻪ ﺍﻧﺘﻘﺎﻝ ﺑﻴﺖ ﻫﺎ ﺍﺯ ﻳﻚ ﻧﻮﻉ ﺳﺮﻭﻳﺲ ) ﻧﻈﻴﺮ ( ISDNﺑﻪ ﺳﺮﻭﻳﺲ ﺩﻳﮕﺮ )ﻧﻈﻴﺮ (T1ﻭ ﺗﻐﻴﻴﺮ ﻛﭙﺴﻮﻟﻪ ﺳﺎﺯﻱ data linkﺍﺯ PPPﺑﻪ Frame Relayﺑﺎﺷﺪ. ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﻭ ﭘﺮﻭﺗﻜﻞ ﻫﺎﻱ ﻻﻳﻪ ﻓﻴﺰﻳﻜﻲ ﻭ data linkﺩﺭ ﺷﺒﻜﻪ ﻫﺎﻱ WAN ﺑﺮﺧﻲﺍﺯ ﭘﺮﻭﺗﻜﻞ ﻫﺎ ﻭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻻﻳﻪ ﻓﻴﺰﻳﻜﻲ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ:
EIA/TIA-232 EIA/TIA-449 V.24 V.35 X.21 G.703 344
• • • • • •
• • • • •
EIA-530 ISDN T1, T3, E1, and E3 xDSL SONET (OC-3, OC-12, OC-48, OC-192) : ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯdata link ﺑﺮﺧﻲ ﺍﺯ ﭘﺮﻭﺗﻜﻞ ﻫﺎ ﻭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻻﻳﻪ
• • • • • • • • • •
High-level data link control (HDLC) Frame Relay Point-to-Point Protocol (PPP) Synchronous Data Link Control (SDLC) Serial Line Internet Protocol (SLIP) X.25 ATM LAPB LAPD LAPF
345
ﺍﻧﻮﺍﻉ ﺭﻭﺗﺮ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺗﺮﻫﺎ ﺩﺭ ﺷﺒﮑﻪ ﺑﻪ ﺍﻣﺮﻱ ﻣﺘﺪﺍﻭﻝ ﺗﺒﺪﻳﻞ ﺷﺪﻩ ﺍﺳﺖ .ﻳﮑﻲ ﺍﺯ ﺩﻻﻳﻞ ﻣﻬﻢ
ﮔﺴﺘﺮﺵ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺗﺮ ،ﺿﺮﻭﺭﺕ ﺍﺗﺼﺎﻝ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ ﭼﻨﺪﻳﻦ ﺷﺒﮑﻪ ﺩﻳﮕﺮ ) ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﻳﺎ ﺳﺎﻳﺮ ﺳﺎﻳﺖ ﻫﺎ ﻱ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ( ﺩﺭ ﻋﺼﺮ ﺣﺎﺿﺮ ﺍﺳﺖ .ﻧﺎﻡ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺑﺮﺍﻱ ﺭﻭﺗﺮﻫﺎ ،ﻣﺘﻨﺎﺳﺐ ﺑﺎ ﮐﺎﺭﻱ ﺍﺳﺖ ﮐﻪ ﺁﻧﺎﻥ ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﻨﺪ " :ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺍﺯ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ
ﺷﺒﮑﻪ ﺍﻱ ﺩﻳﮕﺮ" .ﻣﺜﻼ" ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻳﮏ ﺷﺮﮐﺖ ﺩﺍﺭﺍﻱ ﺷﻌﺒﻪ ﺍﻱ ﺩﺭ ﺗﻬﺮﺍﻥ ﻭ ﻳﮏ ﺩﻓﺘﺮ ﺩﻳﮕﺮ ﺩﺭ ﺍﻫﻮﺍﺯ ﺑﺎﺷﺪ ،ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﺁﻧﺎﻥ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﻳﮏ ﺧﻂ leased )ﺍﺧﺘﺼﺎﺻﻲ( ﮐﻪ ﺑﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﺭﻭﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺩﻓﺎﺗﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ ،ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ.
ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ،ﻫﺮ ﮔﻮﻧﻪ ﺗﺮﺍﻓﻴﮑﻲ ﮐﻪ ﻻﺯﻡ ﺍﺳﺖ ﺍﺯ ﻳﮏ ﺳﺎﻳﺖ ﺑﻪ ﺳﺎﻳﺖ ﺩﻳﮕﺮ ﺍﻧﺠﺎﻡ ﺷﻮﺩ ﺍﺯ ﻃﺮﻳﻖ ﺭﻭﺗﺮ ﻣﺤﻘﻖ ﺷﺪﻩ ﻭ ﺗﻤﺎﻣﻲ ﺗﺮﺍﻓﻴﮏ ﻫﺎﻱ ﻏﻴﺮﺿﺮﻭﺭﻱ ﺩﻳﮕﺮ ﻓﻴﻠﺘﺮ ﻭ ﺩﺭ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻭ ﻫﺰﻳﻨﻪ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ،ﺻﺮﻓﻪ ﺟﻮﺋﻲ ﻣﻲ ﮔﺮﺩﺩ. ﺍﻧﻮﺍﻉ ﺭﻭﺗﺮﻫﺎ ﺭﻭﺗﺮﻫﺎ ﺭﺍ ﻣﻲ ﺗﻮﺍﻥ ﺑﻪ ﺩﻭ ﮔﺮﻭﻩ ﻋﻤﺪﻩ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﻭ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺗﻘﺴﻴﻢ ﻧﻤﻮﺩ: •
ﺭﻭﺗﺮﻫﺎﻱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ :ﺭﻭﺗﺮﻫﺎﻱ ﻓﻮﻕ ،ﺳﺨﺖ ﺍﻓﺰﺍﺭﻫﺎﺋﻲ ﻣﻲ ﺑﺎﺷﻨﺪ ﮐﻪ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺧﺎﺹ ﺗﻮﻟﻴﺪ ﺷﺪﻩ ﺗﻮﺳﻂ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ ﺭﺍ ﺍﺟﺮﺍﺀ ﻣﻲ ﻧﻤﺎﻳﻨﺪ )ﺩﺭﺣﺎﻝ
ﺣﺎﺿﺮ ﺻﺮﻓﺎ" ﺑﻪ ﺻﻮﺭﺕ black boxﺑﻪ ﺁﻧﺎﻥ ﻧﮕﺎﻩ ﻣﻲ ﮐﻨﻴﻢ (.ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻓﻮﻕ، ﻗﺎﺑﻠﻴﺖ ﺭﻭﺗﻴﻨﮓ ﺭﺍ ﺑﺮﺍﻱ ﺭﻭﺗﺮﻫﺎ ﻓﺮﺍﻫﻢ ﻧﻤﻮﺩﻩ ﺗﺎ ﺁﻧﺎﻥ ﻣﻬﻤﺘﺮﻳﻦ ﻭ ﺷﺎﻳﺪ ﺳﺎﺩﻩ ﺗﺮﻳﻦ ﻭﻇﻴﻔﻪ ﺧﻮﺩ ﮐﻪ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺍﺯ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ ﺷﺒﮑﻪ ﺩﻳﮕﺮ ﺍﺳﺖ ﺭﺍ ﺑﺨﻮﺑﻲ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ. ﺍﮐﺜﺮ ﺷﺮﮐﺖ ﻫﺎ ﺗﺮﺟﻴﺢ ﻣﻲ ﺩﻫﻨﺪ ﮐﻪ ﺍﺯ ﺭﻭﺗﺮﻫﺎﻱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ
ﭼﺮﺍﮐﻪ ﺁﻧﺎﻥ ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ﺭﻭﺗﺮﻫﺎﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ،ﺩﺍﺭﺍﻱ ﺳﺮﻋﺖ ﻭ ﺍﻋﺘﻤﺎﺩ ﭘﺬﻳﺮﻱ ﺑﻴﺸﺘﺮﻱ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺷﮑﻞ ﺯﻳﺮ ﻳﮏ ﻧﻤﻮﻧﻪ ﺭﻭﺗﺮ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪCisco 2600 ) .
( Series Multiservice Platform
346
ﻣﻨﺒﻊ :ﺳﺎﻳﺖ ﺳﻴﺴﮑﻮ
•
ﺭﻭﺗﺮﻫﺎﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ :ﺭﻭﺗﺮﻫﺎﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺩﺍﺭﺍﻱ ﻋﻤﻠﮑﺮﺩﻱ ﻣﺸﺎﺑﻪ ﺑﺎ ﺭﻭﺗﺮﻫﺎﻱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﺑﻮﺩﻩ ﻭ ﻣﺴﺌﻮﻟﻴﺖ ﺍﺻﻠﻲ ﺁﻧﺎﻥ ﻧﻴﺰ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺍﺯ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ ﺷﺒﮑﻪ
ﺩﻳﮕﺮ ﺍﺳﺖ .ﻳﮏ ﺭﻭﺗﺮ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﻣﻲ ﺗﻮﺍﻧﺪ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ، NTﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻧﺖ ﻭﺭ ﻭ ﻳﺎ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻟﻴﻨﻮﮐﺲ ﺑﺎﺷﺪ .ﺗﻤﺎﻣﻲ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻋﺎﻣﻞ
ﺷﺒﮑﻪ ﺍﻱ ﻣﻄﺮﺡ ،ﺩﺍﺭﺍﻱ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﺭﻭﺗﻴﻨﮓ ﺍﺯ ﻗﺒﻞ ﺗﻌﺒﻴﻪ ﺷﺪﻩ ﻣﻲ ﺑﺎﺷﻨﺪ. ﺩﺭ ﺍﮐﺜﺮ ﻣﻮﺍﺭﺩ ﺍﺯ ﺭﻭﺗﺮﻫﺎ ﺑﻪ ﻋﻨﻮﺍﻥ ﻓﺎﻳﺮﻭﺍﻝ ﻭ ﻳﺎ gatewayﺍﻳﻨﺘﺮﻧﺖ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ. ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﻻﺯﻡ ﺍﺳﺖ ﺑﻪ ﻳﮑﻲ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﺗﻔﺎﻭﺕ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﻴﻦ ﺭﻭﺗﺮﻫﺎﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ
ﻭ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ،ﺍﺷﺎﺭﻩ ﮔﺮﺩﺩ :ﺩﺭ ﺍﮐﺜﺮ ﻣﻮﺍﺭﺩ ﻧﻤﻲ ﺗﻮﺍﻥ ﻳﮏ ﺭﻭﺗﺮ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺭﺍ ﺟﺎﻳﮕﺰﻳﻦ ﻳﮏ ﺭﻭﺗﺮ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﻧﻤﻮﺩ ،ﭼﺮﺍﮐﻪ ﺭﻭﺗﺮﻫﺎﻱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﺩﺍﺭﺍﻱ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﻻﺯﻡ ﻭ ﺍﺯ ﻗﺒﻞ ﺗﻌﺒﻴﻪ ﺷﺪﻩ ﺍﻱ ﻣﻲ ﺑﺎﺷﻨﺪ ﮐﻪ ﺑﻪ ﺁﻧﺎﻥ ﺍﻣﮑﺎﻥ ﺍﺗﺼﺎﻝ ﺑﻪ ﻳﮏ ﻟﻴﻨﮏ ﺧﺎﺹ WAN
)ﺍﺯ ﻧﻮﻉ ISDN ، Frame Relayﻭ ﻳﺎ (ATMﺭﺍ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﻳﮏ ﺭﻭﺗﺮ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ) ﻧﻈﻴﺮ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﻳﻨﺪﻭﺯ ( ﺩﺍﺭﺍﻱ ﺗﻌﺪﺍﺩﻱ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺍﺳﺖ ﮐﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﺁﻧﺎﻥ ﺑﻪ
ﻳﮏ ﺷﺒﮑﻪ LANﻣﺘﺼﻞ ﺷﺪﻩ ﻭ ﺳﺎﻳﺮ ﺍﺗﺼﺎﻻﺕ ﺑﻪ ﺷﺒﮑﻪ ﻫﺎﻱ WANﺍﺯ ﻃﺮﻳﻖ ﺭﻭﺗﺮﻫﺎﻱ ﺳﺨﺖ ﻓﺰﺍﺭﻱ ،ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ. ﻣﺜﺎﻝ : ١ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺗﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﺩﻭ ﺷﺒﮑﻪ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻭ ﺍﺭﺗﺒﺎﻁ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ
ﻓﺮﺽ ﮐﻨﻴﺪ ﺍﺯ ﻳﮏ ﺭﻭﺗﺮ ﻣﻄﺎﺑﻖ ﺷﮑﻞ ﺯﻳﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﺩﻭ ﺷﺒﮑﻪ LANﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻭ ﺍﻳﻨﺘﺮﻧﺖ ،ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺍﺳﺖ .ﺯﻣﺎﻧﻲ ﮐﻪ ﺭﻭﺗﺮ ﺩﺍﺩﻩ ﺍﻱ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﺷﺒﮑﻪ LANﻭ ﻳﺎ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭﻳﺎﻓﺖ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﭘﺲ ﺍﺯ ﺑﺮﺭﺳﻲ ﺁﺩﺭﺱ ﻣﺒﺪﺍﺀ ﻭ ﻣﻘﺼﺪ ،ﺩﺍﺩﻩ ﺩﺭﻳﺎﻓﺘﻲ ﺭﺍ ﺑﺮﺍﻱ ﻫﺮ
ﻳﮏ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎ ﻭ ﻳﺎ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺭﻭﺗﺮ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﺷﮑﻞ ﺯﻳﺮ ،ﺷﺒﮑﻪ ﺭﺍ
347
ﺑﻪ ﺩﻭ ﺑﺨﺶ ﻣﺘﻔﺎﻭﺕ ﺗﻘﺴﻴﻢ ﻧﻤﻮﺩﻩ ﺍﺳﺖ ) .ﺩﻭ ﺷﺒﮑﻪ ﻣﺠﺰﺍﺀ ( .ﻫﺮ ﺷﺒﮑﻪ ﺩﺍﺭﺍﻱ ﻳﮏ ﻫﺎﺏ
ﺍﺳﺖ ﮐﻪ ﺗﻤﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺑﻪ ﺁﻥ ﻣﺘﺼﻞ ﺷﺪﻩ ﺍﻧﺪ .ﻋﻼﻭﻩ ﺑﺮ ﻣﻮﺍﺭﺩ ﻓﻮﻕ، ﺭﻭﺗﺮ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺍﺭﺍﻱ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻻﺯﻡ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﻫﺮ ﺷﺒﮑﻪ ﺑﻪ ﺁﻥ ﺑﻮﺩﻩ ﻭ ﺍﺯ
ﻳﮏ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺩﻳﮕﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ،ﺭﻭﺗﺮ ﻗﺎﺩﺭ ﺍﺳﺖ ﺩﺍﺩﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺑﻪ ﻣﻘﺼﺪ ﺩﺭﺳﺖ ،ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﺪ.
ﻣﺜﺎﻝ :٢ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺗﺮ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ LAN ﻓﺮﺽ ﮐﻨﻴﺪ ﺍﺯ ﻳﮏ ﺭﻭﺗﺮ ﻣﻄﺎﺑﻖ ﺷﮑﻞ ﺯﻳﺮ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ،LANﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺍﺳﺖ .ﺩﺭ
ﻣﺪﻝ ﻓﻮﻕ ،ﻫﺮ ﻳﮏ ﺍﺯﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺑﺎ ﺭﻭﺗﺮ ﻣﻮﺟﻮﺩ ﻧﻈﻴﺮ ﻳﮏ gateway ﺑﺮﺧﻮﺭﺩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ،ﻫﺮ ﻳﮏ ﺍﺯ ﻣﺎﺷﻴﻦ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ LANﮐﻪ ﻗﺼﺪ ﺍﺭﺳﺎﻝ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ )ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﻳﺎ ﻫﺮ ﻣﺤﻞ ﺧﺎﺭﺝ ﺍﺯ ﺷﺒﮑﻪ ( LANﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ،ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺑﺮﺍﻱ gatewayﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﺭﻭﺗﺮ ) ( gatewayﻧﺴﺒﺖ ﺑﻪ ﻣﺤﻞ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺩﺍﺭﺍﻱ ﺁﮔﺎﻫﻲ ﻻﺯﻡ ﻣﻲ ﺑﺎﺷﺪ) .ﺩﺭ ﺯﻣﺎﻥ
ﺗﻨﻈﻴﻢ ﺧﺼﻠﺖ ﻫﺎﻱ ﭘﺮﻭﺗﮑﻞ TCP/IPﺑﺮﺍﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﻣﺎﺷﻴﻦ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻳﮏ ﺁﺩﺭﺱ IPﺑﺮﺍﻱ gatewayﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﻣﻲ ﺷﻮﺩ ( .ﺷﮑﻞ ﺯﻳﺮ ﻧﺤﻮﻩ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺭﻭﺗﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﻲ ﮐﺎﺭﺑﺮﺍﻥ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﺷﺒﮑﻪ LANﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ:
348
ﻣﺜﺎﻝ :٣ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺗﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﺩﻭ ﺩﻓﺘﺮ ﮐﺎﺭ
ﻓﺮﺽ ﮐﻨﻴﺪ ،ﺑﺨﻮﺍﻫﻴـﻢ ﺍﺯ ﺭﻭﺗـــﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗــﺼﺎﻝ ﺩﻭ ﺩﻓﺘﺮ ﮐﺎﺭ ﻳﮏ ﺳﺎﺯﻣﺎﻥ ﺑﻪ ﻳﮑﺪﻳﮕﺮ، ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﺋﻴﻢ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﻫﺮ ﻳﮏ ﺍﺯ ﺭﻭﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ
ﭘﺮﻭﺗﮑﻞ WANﻧﻈﻴﺮ ISDNﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ .ﻋﻤﻼ" ،ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﮐﺎﺑﻞ
ﮐﻪ ﺗﻮﺳﻂ ISPﻣﺮﺑﻮﻃﻪ ﺍﺭﺍﺋﻪ ﻣﻲ ﮔﺮﺩﺩ ،ﺍﻣﮑﺎﻥ ﺍﺗﺼﺎﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ WANﺭﻭﺗﺮ ﻓﺮﺍﻫﻢ ﺷﺪﻩ ﻭ ﺍﺯ ﺁﻧﺠﺎ ﺳﻴﮕﻨﺎﻝ ﻣﺴﺘﻘﻴﻤﺎ" ﺑﻪ ﺷﺒﮑﻪ ISPﻣﺮﺑﻮﻃﻪ ﺭﻓﺘﻪ ﻭ ﺳﺮ ﺩﻳﮕﺮ ﺁﻥ ﺑﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ
WANﺭﻭﺗﺮ ﺩﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ .ﺭﻭﺗﺮﻫﺎ ،ﻗﺎﺩﺭ ﺑﻪ ﺣﻤﺎﻳﺖ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ WAN ﻣﺘﻌﺪﺩﻱ ﻧﻈﻴﺮ HDLC , Frame Relay , ATMﻭ ﻳﺎ ، PPPﻣﻲ ﺑﺎﺷﻨﺪ.
ﻣﻬﻤﺘﺮﻳﻦ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﻳﮏ ﺭﻭﺗﺮ : •
ﺭﻭﺗﺮﻫﺎ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻻﻳﻪ ﺳﻮﻡ ) ﻣﺪﻝ ﻣﺮﺟﻊ ( OSIﻣﻲ ﺑﺎﺷﻨﺪ.
•
ﺭﻭﺗﺮﻫﺎ ﻣﺎﺩﺍﻣﻴﮑﻪ ﺑﺮﻧﺎﻣﻪ ﺭﻳﺰﻱ ﻧﮕﺮﺩﻧﺪ ،ﺍﻣﮑﺎﻥ ﺗﻮﺯﻳﻊ ﺩﺍﺩﻩ ﺭﺍ ﻧﺨﻮﺍﻫﻨﺪ ﺩﺍﺷﺖ.
•
ﺍﮐﺜﺮ ﺭﻭﺗﺮﻫﺎﻱ ﻣﻬﻢ ﺩﺍﺭﺍﻱ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﺍﺧﺘﺼﺎﺻﻲ ﺧﺎﺹ ﺧﻮﺩ ﻣﻲ ﺑﺎﺷﻨﺪ.
•
ﺭﻭﺗﺮﻫﺎ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺧﺎﺻﻲ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺿﺮﻭﺭﻱ ﺧﻮﺩ ) ﻣﻨﻈﻮﺭ ﺩﺍﺩﻩ ﻧﻴﺴﺖ ( ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .
•
ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ ﻳﮏ ﺭﻭﺗﺮ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ :ﻣﺴﻴﺮ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺑﺮﺍﻱ ﺍﻧﺠﺎﻡ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻴﻦ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺩﺭ ﺗﻤﺎﻣﻲ ﻣﺪﺕ ﺯﻣﺎﻥ ﺍﻧﺠﺎﻡ ﺗﺮﺍﮐﺶ ﺛﺎﺑﺖ ﻭ ﻳﮑﺴﺎﻥ ﻧﺒﻮﺩﻩ ﻭ ﻣﺘﻨﺎﺳﺐ ﺑﺎ ﻭﺿﻌﻴﺖ ﺗﺮﺍﻓﻴﮏ ﻣﻮﺟﻮﺩ ﻭ ﺩﺭ ﺩﺳﺘﺮﺱ ﺑﻮﺩﻥ ﻣﺴﻴﺮ ،ﺗﻐﻴﻴﺮ
ﻣﻲ ﻧﻤﺎﻳﺪ.
349
ﺭﻭﺗﺮﻫﺎﻱ ﺳﻴﺴﮑﻮ ﺳﻴﺴﮑﻮ ﻳﮑﻲ ﺍﺯ ﻣﻌﺘﺒﺮﺗﺮﻳﻦ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ ﺭﻭﺗﺮ ﻭ ﺳﻮﺋﻴﭻ ﺩﺭ ﺳﻄﺢ ﺟﻬﺎﻥ ﺍﺳﺖ ﮐﻪ ﺍﺯ
ﻣﺤﺼﻮﻻﺕ ﺁﻥ ﺩﺭ ﻣﺮﺍﮐﺮ ﺷﺒﮑﻪ ﺍﻱ ﻣﺘﻌﺪﺩﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺍﻳﻦ ﺷﺮﮐﺖ ﺗﺎﮐﻨﻮﻥ ﻣﺪﻝ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺍﺯ ﺭﻭﺗﺮﻫﺎ ﺭﺍ ﺑﺎ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﻣﺨﺘﻠﻔﻲ ﺗﻮﻟﻴﺪ ﻧﻤﻮﺩﻩ ﺍﺳﺖ .ﺳﺮﻱ ٢٥٠٠ ، ١٦٠٠ﻭ ، ٢٦٠٠ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﻧﻤﻮﻧﻪ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺭﻭﺗﺮﻫﺎﻱ ﺗﻮﻟﻴﺪ ﺷﺪﻩ ﺗﻮﺳﻂ ﺍﻳﻦ ﺷﺮﮐﺖ
ﺍﺯ ﺳﺮﻱ ٦٠٠ﺷﺮﻭﻉ ﻭ ﺗﺎ ﺳﺮﻱ ١٢٠٠٠ﺍﺩﺍﻣﻪ ﻣﻲ ﻳﺎﺑﺪ) ﺩﺭ ﺣﺎﻝ ﺣﺎﺿﺮ ( .ﺷﮑﻞ ﺯﻳﺮ ﺑﺮﺧﻲ ﺍﺯ ﻧﻤﻮﻧﻪ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ: ﺳﺮﻱ ٢٦٠٠
ﺳﺮﻱ ١٢٠٠٠
ﻣﻨﺒﻊ :ﺳﺎﻳﺖ ﺳﻴﺴﮑﻮ
ﺗﻤﺎﻣﻲ ﺗﺠﻬﻴﺰﺍﺕ ﻓﻮﻕ ،ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺧﺎﺻﻲ ﺭﺍ ﺑﺎ ﻧﺎﻡ Internetwork Operating Systemﻭ ﻳﺎ IOSﺍﺟﺮﺍﺀ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،IOS .ﻫﺴﺘﻪ ﺭﻭﺗﺮﻫﺎ ﻭﺍﮐﺜﺮﺳﻮﺋﻴﭻ ﻫﺎﻱ ﺗﻮﻟﻴﺪ ﺷﺪﻩ ﺗﻮﺳﻂ ﺳﻴﺴﮑﻮ ،ﻣﺤﺴﻮﺏ ﻣﻲ ﮔﺮﺩﺩ .ﺍﻳﻦ ﺷﺮﮐﺖ ﺑﺎ ﺭﻋﺎﻳﺖ ﺍﺻﻞ ﻣﻬﻢ ﺳﺎﺯﮔﺎﺭﻱ ﮐﻪ ﺍﺯ ﺁﻥ ﺑﻪ
ﻋﻨﻮﺍﻥ ﻳﮏ ﺍﺳﺘﺮﺍﺗﮋﻱ ﻣﻬﻢ ﺩﺭ ﺗﻮﻟﻴﺪ ﻭ ﺑﺎ ﻧﺎﻡ ،Fusion Ciscoﻧﺎﻡ ﺑﺮﺩﻩ ﻣﻲ ﺷﻮﺩ ،ﻗﺼﺪ
ﺩﺍﺭﺩ ﻣﺤﺼﻮﻻﺕ ﺧﻮﺩ ﺭﺍ ﺑﮕﻮﻧﻪ ﺍﻱ ﺗﻮﻟﻴﺪ ﻧﻤﺎﻳﺪ ﮐﻪ ﺗﻤﺎﻣﻲ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺳﻴﺴﮑﻮﻳﮏ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻳﮑﺴﺎﻥ ﺭﺍ ﺍﺟﺮﺍﺀ ﻧﻤﺎﻳﻨﺪ.
ﻋﻨﺎﺻﺮ ﺍﺻﻠﻲ ﺩﺭ ﻳﮏ ﺭﻭﺗﺮ ﺳﻴﺴﮑﻮ •
ﺍﻳﻨﺘﺮﻓﻴﺲ ) . ( Interfacesﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ،ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺗﺮ
ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ.
350
•
ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ﺷﺎﻣﻞ ﭘﻮﺭﺕ ﻫﺎﻱ ﺳﺮﻳﺎﻝ ﻭ ﺍﺗﺮﻧﺖ ﻣﺨﺘﻠﻔﻲ ﻣﻲ ﺑﺎﺷﻨﺪ ﮐﻪ ﺍﺯ ﺁﻧﺎﻥ ﺑﻪ
ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﺭﻭﺗﺮ ﺑﻪ ﺷﺒﮑﻪ LANﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻫﺮ ﺭﻭﺗﺮ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﭘﺘﺎﻧﺴﻴﻞ ﻫﺎﻱ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ،ﺩﺍﺭﺍﻱ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺍﺳﺖ .ﺑﺮﺍﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﺭﻭﺗﺮ ﺍﺯ ﻳﮏ ﻧﺎﻡ ﺧﺎﺹ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺟﺪﻭﻝ ﺯﻳﺮ ﺑﺮﺧﻲ ﺍﺯ ﺍﺳﺎﻣﻲ ﻣﺘﺪﺍﻭﻝ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ.
ﺍﻳﻨﺘﺮﻓﻴﺲ E0 E1 S0 S1 BRI 0 BRI 1 •
ﮐﺎﺭﺑﺮﺩ first Ethernet interface second Ethernet interface first Serial interface second Serial interface first B channel for Basic ISDN second B channel for Basic ISDN
ﺩﺭ ﺷﮑﻞ ﺯﻳﺮ ﻧﻤﺎﻱ ﭘﺸﺖ ﻳﮏ ﺭﻭﺗﺮ ﺳﻴﺴﮑﻮﺭﺍ ﺑﻪ ﻫﻤﺮﺍﻩ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺁﻥ ﻣﺸﺎﻫﺪﻩ ﻣﻲ ﻧﻤﺎﺋﻴﺪ ) .ﻳﮏ ﺭﻭﺗﺮ ﺑﺎ ﻗﺎﺑﻠﻴﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ .( ISDN
• •
ﻣﻨﺒﻊ :ﺳﺎﻳﺖ ﺳﻴﺴﮑﻮ
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﻣﺸﺎﻫﺪﻩ ﻣﻲ ﻧﻤﺎﺋﻴﺪ ،ﺭﻭﺗﺮ ﻓﻮﻕ ﺣﺘﻲ ﺩﺍﺭﺍﻱ ﺳﻮﮐﺖ ﻫﺎﻱ ﻣﺨﺘﺺ ﺗﻠﻔﻦ ﻧﻴﺰ ﻣﻲ ﺑﺎﺷﺪ ،ﭼﺮﺍﮐﻪ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﮐﻪ ﺭﻭﺗﺮ ﻓﻮﻕ ﺍﺯ ﻧﻮﻉ ISDNﻣﻲ ﺑﺎﺷﺪ،
ﻣﻲ ﺑﺎﻳﺴﺖ ﻳﮏ ﺗﻠﻔﻦ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺭﺍ ﺑﻪ ﻳﮏ ﺧﻂ ISDNﻣﺘﺼﻞ ﻧﻤﻮﺩ .ﺭﻭﺗﺮ ﻓﻮﻕ ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ISDNﺩﺍﺭﺍﻱ ﻳﮏ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺍﺗﺮﻧﺖ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﺑﻪ ﻳﮏ ﺩﺳﺘﮕﺎﻩ ﺩﺭ ﺷﺒﮑﻪ LANﺍﺳﺖ ) ﻣﻌﻤﻮﻻ" ﻳﮏ ﻫﺎﺏ ﻭ ﻳﺎ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ( .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻓﻮﻕ ﺭﺍ ﺑﻪ ﭘﻮﺭﺕ uplinkﻳﮏ ﻫﺎﺏ ﻣﺘﺼﻞ ﻧﻤﺎﺋﻴﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺳﻮﺋﻴﭻ
ﮐﻮﭼﮏ ﻣﻮﺟﻮﺩ ﺩﺭ ﭘﺸﺖ ﺭﻭﺗﺮ ﺭﺍ ﺩﺭ ﺣﺎﻟﺖ ﻫﺎﺏ ،ﺗﻨﻈﻴﻢ ﻧﻤﻮﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ 351
ﺍﻳﻨﺘﺮﻓﻴﺲ ﻓﻮﻕ ﺭﺍ ﺑﻪ ﻳﮏ ﺩﺳﺘﮕﺎﻩ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺘﺼﻞ ﻧﻤﺎﺋﻴﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﻭﺿﻌﻴﺖ ﺳﻮﺋﻴﭻ
ﺭﺍ ﺩﺭ ﺣﺎﻟﺖ nodeﻗﺮﺍﺭ ﺩﺍﺩ .ﭘﻮﺭﺕ Configﻭ ﻳﺎ Consoleﺍﺯ ﻧﻮﻉ ﮐﺎﻧﮑﺘﻮﺭ ) DB9ﻣﺎﺩﮔﻲ ( ﺑﻮﺩﻩ ﮐﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﮐﺎﺑﻞ ﺧﺎﺹ ﺑﻪ ﭘﻮﺭﺕ ﺳﺮﻳﺎﻝ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺘﺼﻞ ﺗﺎ ﺍﻣﮑﺎﻥ ﭘﻴﮑﺮﺑﻨﺪﻱ ﻣﺴﺘﻘﻴﻢ ﺭﻭﺗﺮ ،ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ. •
ﭘﺮﺩﺍﺯﻧﺪﻩ ) : ( CPUﺗﻤﺎﻣﻲ ﺭﻭﺗﺮﻫﺎﻱ ﺳﻴﺴﮑﻮ ﺩﺍﺭﺍﻱ ﻳﮏ ﭘﺮﺩﺍﺯﻧﺪﻩ ﺍﺻﻠﻲ
ﻣﻲ ﺑﺎﺷﻨﺪ ﮐﻪ ﻣﺴﺌﻮﻟﻴﺖ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﺍﺻﻠﻲ ﺩﺭ ﺭﻭﺗﺮ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﻧﺪ .ﭘﺮﺩﺍﺯﻧﺪﻩ ﺑﺎ
ﺗﻮﻟﻴﺪ ﻭﻗﻘﻪ ) ( IRQﺑﺎ ﺳﺎﻳﺮ ﻋﻨﺎﺻﺮ ﻣﻮﺟﻮﺩ ﺩﺭ ﺭﻭﺗﺮ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﺭﻭﺗﺮﻫﺎﻱ ﺳﻴﺴﮑﻮ ﺍﺯ ﭘﺮﺩﺍﺯﻧﺪﻩ ﻫﺎﻱ RISCﻣﻮﺗﻮﺭﻭﻻ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﻣﻌﻤﻮﻻ" ﺩﺭﺻﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﺩﺍﺯﻧﺪﻩ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺭﻭﺗﺮ ﻣﻌﻤﻮﻟﻲ ﺍﺯ ﺑﻴﺴﺖ ﺗﺠﺎﻭﺯ ﻧﻤﻲ ﻧﻤﺎﻳﺪ. •
، IOSﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﺍﺻﻠﻲ ﺍﺟﺮﺍﺀ ﺷﺪﻩ ﺑﺮ ﺭﻭﻱ ﺭﻭﺗﺮﻫﺎ ﺍﺳﺖ IOS .ﺑﺮ ﺍﺳﺎﺱ ﻓﺮﺁﻳﻨﺪ ﻣﻮﺳﻮﻡ ﺑﻪ ،Bootupﻟﻮﺩ ﻭﺩﺭ ﺣﺎﻓﻈﻪ ﻣﺴﺘﻘﺮﻣﻲ ﮔﺮﺩﺩ .ﺣﺠﻢ IOSﻣﻌﻤﻮﻻ" ﺑﻴﻦ ﺩﻭ ﺗﺎ ﭘﻨﭻ ﻣﮕﺎﺑﺎﻳﺖ ﺑﻮﺩﻩ ﻭ ﺍﻳﻦ ﺣﺠﻢ ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﻮﻉ ﺭﻭﺗﺮ ﺍﺯ ﻣﻴﺰﺍﻥ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﻧﻴﺰ ﺗﺠﺎﻭﺯ ﻧﻤﺎﻳﺪ .ﺁﺧﺮﻳﻦ ﻧﺴﺨﻪ IOSﺩﺭ ﺣﺎﻝ ﺣﺎﺿﺮ ،ﻧﺴﺨﻪ ﺷﻤﺎﺭﻩ
ﺩﻭﺍﺯﺩﻩ ﺍﺳﺖ .ﺷﺮﮐﺖ ﺳﻴﺴﮑﻮ ﺑﻪ ﺻﻮﺭﺕ ﻣﺴﺘﻤﺮ ﻭ ﺑﺎ ﻫﺪﻑ ﺑﺮﻃﺮﻑ ﻧﻤﻮﺩﻥ ﺑﺎﮒ ﻫﺎ ﻭ ﻳﺎ ﺍﻓﺰﻭﺩﻥ ﻗﺎﺑﻠﻴـﺖ ﻫﺎﻱ ﺍﺿﺎﻓﻪ ،ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺍﺋﻪ ﻧﺴﺨﻪ ﻫﺎﻱ ﺟﺎﻧﺒﻲ ﻣﺘﻌﺪﺩﻱ ﺩﺭ ﻃﻲ ﻫﺮ ﻣﺎﻩ ﻣﻲ ﻧﻤﺎﻳﺪ.( ١٢ .٢ ، ١٢ . ١ ) .
•
، IOSﻗﺎﺑﻠﻴﺖ ﻫﺎ ﻭ ﭘﺘﺎﻧﺴﻴﻞ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺭﺍ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺭﻭﺗﺮ ﺍﺭﺍﺋﻪ ﺩﺍﺩﻩ ﻭ ﻣﻲ ﺗﻮﺍﻥ ﺁﻥ ﺭﺍ ﺑﻬﻨﮕﺎﻡ ﻭ ﻳﺎ ﺑﻪ ﻣﻨﻈﻮﺭ Backupﮔﺮﻓﺘﻦ ﺁﻥ ﺭﺍ ﺍﺯ ﺭﻭﺗﺮ downloadﻧﻤﻮﺩ. ﺩﺭ ﺳﺮﻱ ١٦٠٠٠ﺑﻪ ﺑﺎﻻ IOS ،ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺣﺎﻓﻈﻪ ﻓﻠﺶ ﮐﺎﺭﺕ PCMCIAﺍﺭﺍﺋﻪ
ﺷﺪﻩ ﺍﺳﺖ .ﺣﺎﻓﻈﻪ ﻓﻮﻕ ،ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﻳﮏ ﺍﺳﻼﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﭘﺸﺖ ﺭﻭﺗﺮ ﻣﺘﺼﻞ ﺷﺪﻩ
ﻭ ﺍﺯ ﻃﺮﻳﻖ ﺁﻥ ،image IOSﻟﻮﺩ ﻣﻲ ﮔﺮﺩﺩ ، IOS image .ﻣﻌﻤﻮﻻ" ﻓﺸﺮﺩﻩ ﺑﻮﺩﻩ ﻭ ﺭﻭﺗﺮ ﻣﻲ ﺑﺎﻳﺴﺖ ﺁﻥ ﺭﺍ ﺍﺯ ﺣﺎﻟﺖ ﻓﺸﺮﺩﻩ ﺧﺎﺭﺝ ﻧﻤﺎﻳﺪ.
IOSﻳﮑﻲ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﻋﻨﺎﺻﺮ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺭﻭﺗﺮ ﺑﻮﺩﻩ ﻭ ﺑﺪﻭﻥ ﻭﺟﻮﺩ ﺁﻥ ،ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺗﺮ ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻘﺮﺍﺭ IOSﺩﺭ ﺣﺎﻓﻈﻪ ﺿﺮﻭﺭﺗﻲ 352
ﺑﻪ ﺩﺍﺷﺘﻦ ﻳﮏ ﮐﺎﺭﺕ ﻓﻠﺶ ) ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﺩﺭ ﺧﺼﻮﺹ ﺭﻭﺗﺮﻫﺎﻱ ﺳﺮﻱ ١٦٠٠ﺍﺷﺎﺭﻩ
ﮔﺮﺩﻳﺪ( ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﻣﻲ ﺗﻮﺍﻥ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺍﮐﺜﺮ ﺭﻭﺗﺮﻫﺎﻱ ﺳﻴﺴﮑﻮ ﺭﺍ ﺑﻪ ﻣﻨﻈﻮﺭ ﻟﻮﺩ image IOSﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ tftpﺷﺒﮑﻪ ﻭ ﻳﺎ ﺭﻭﺗﺮ ﺩﻳﮕﺮﻱ ﮐﻪ ﺩﺍﺭﺍﻱ ﭼﻨﺪﻳﻦ IOS imageﺑﺮﺍﻱ ﺭﻭﺗﺮﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺍﺳﺖ ،ﺍﻧﺠﺎﻡ ﺩﺍﺩ. ﺩﺭ ﭼﻨﻴﻦ ﺭﻭﺗﺮﻫﺎﺋﻲ ﺍﺯ ﻳﮏ ﻓﻠﺶ ﮐﺎﺭﺕ ﺣﺎﻓﻈﻪ ﺑﺎ ﻇﺮﻓﻴﺖ ﺑﺎﻻ ﺑﻪ ﻣﻨﻈﻮﺭ ﺫﺧﻴﺮﻩ ﺳﺎﺯﻱ
ﭼﻨﺪﻳﻦ ، ISO imageﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ. •
، Image RXBootﮐﻪ ﺑﻪ ﺁﻥ Bootloaderﻧﻴﺰ ﮔﻔﺘﻪ ﻣﻲ ﺷﻮﺩ ،ﭼﻴﺰﻱ
ﺑﻴﺸﺘﺮ ﺍﺯ ﻳﮏ ﻧﺴﺨﻪ ﮐﻢ ﺣﺠﻢ IOSﻧﺒﻮﺩﻩ ﮐﻪ ﺩﺭ ﺣﺎﻓﻈﻪ ROMﺭﻭﺗﺮ ﻣﺴﺘﻘﺮ
ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻳﮏ ﺭﻭﺗﺮ ﺩﺍﺭﺍﻱ ﻓﻠﺶ ﮐﺎﺭﺕ ﻻﺯﻡ ﺑﻪ ﻣﻨﻈﻮﺭ ﻟﻮﺩ IOS ﻧﺒﺎﺷﺪ ،ﻣﻲ ﺗﻮﺍﻥ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺭﻭﺗﺮ ﺭﺍ ﺑﮕﻮﻧﻪ ﺍﻱ ﺍﻧﺠﺎﻡ ﺩﺍﺩ ﮐﻪ RXBoot imageﺭﺍ ﻟﻮﺩ ﻧﻤﺎﻳﺪ .ﺑﺎ ﻟﻮﺩ ﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ،ﺍﻣﮑﺎﻥ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﺍﻭﻟﻴﻪ ﻧﮕﻬﺪﺍﺭﻱ ﻭ ﻓﻌﺎﻝ ﻧﻤﻮﺩﻥ ﻭ ﻳﺎ ﻏﻴﺮ ﻓﻌﺎﻝ ﮐﺮﺩﻥ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺁﻥ ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ. •
ﺣﺎﻓﻈﻪ ، RAMﻣﺤﻠﻲ ﺍﺳﺖ ﮐﻪ ﺭﻭﺗﺮ IOS ،ﻭ ﻓﺎﻳﻞ ﻫﺎﻱ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺭﺍ ﺩﺭ ﺁﻥ ﻟﻮﺩ
ﻣﻲ ﻧﻤﺎﻳﺪ .ﻋﻤﻠﮑﺮﺩ ﺣﺎﻓﻈﻪ ﻓﻮﻕ ﻣﺸﺎﺑﻪ ﺣﺎﻓﻈﻪ RAMﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺳﺖ )ﺍﺳﺘﻘﺮﺍﺭ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻭ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﮐﺎﺭﺑﺮﺩﻱ ﻣﺘﻔﺎﻭﺕ( .ﻣﻴﺰﺍﻥ ﺣﺎﻓﻈﻪ RAMﻣﻮﺭﺩ ﻧﻴﺎﺯ ﻳﮏ ﺭﻭﺗﺮ ،ﺑﺴﺘﮕﻲ ﺑﻪ ﺍﻧﺪﺍﺯﻩ image IOSﻭ ﻓﺎﻳﻞ ﻫﺎﻱ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺩﺍﺭﺩ .ﺩﺭ ﺍﮐﺜﺮ ﻣﻮﺍﺭﺩ ﻭ ﺩﺭ ﺭﻭﺗﺮﻫﺎﻱ ﮐﻮﭼﮏ ﺗﺮ ) ﺳﺮﻱ ،( ١٦٠٠ﺣﺎﻓﻈﻪ RAMﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ
ﺑﻴﻦ ﺩﻭﺍﺯﺩﻩ ﺗﺎ ﺷﺎﻧﺰﺩﻩ ﻣﮕﺎﺑﺎﻳﺖ ﻣﻲ ﺑﺎﺷﺪ.ﺍﻳﻦ ﻭﺿﻌﻴﺖ ﺩﺭ ﺭﻭﺗﺮﻫﺎﻱ ﺑﺰﺭﮔﺘﺮ ﮐﻪ
ﺩﺍﺭﺍﻱ image ISOﺑﻴﺸﺘﺮﻱ ﻣﻲ ﺑﺎﺷﻨﺪ ،ﺑﻴﻦ ﺳﻲ ﻭ ﺩﻭ ﺗﺎ ﺷﺼﺖ ﻭ ﭼﻬﺎﺭ ﻣﮕﺎﺑﺎﻳﺖ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﺳﺘﻘﺮﺍﺭ ﺟﺪﺍﻭﻝ ﺭﻭﺗﻴﻨﮓ ﺩﺭ ﺣﺎﻓﻈﻪ ، RAMﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺟﺪﺍﻭﻝ ﻓﻮﻕ ﺑﺰﺭﮒ ﻭ ﭘﻴﭽﻴﺪﻩ ﻣﻲ ﺑﺎﺷﻨﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﻳﮏ ﺭﻭﺗﺮ ﺑﺎ ﻣﻴﺰﺍﻥ ﺣﺎﻓﻈﻪ RAMﻣﻨﺎﺳﺒﻲ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ. •
ﺣﺎﻓﻈﻪ ) . Non-Volatile RAM ) NVRAMﺭﻭﺗﺮﻫﺎ ﺍﺯ ﺣﺎﻓﻈﻪ ﻓﻮﻕ ﺑﻪ
ﻣﻨﻈﻮﺭ ﺫﺧﻴﺮﻩ ﻭ ﻧﮕﻬﺪﺍﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ. 353
ﭘﺲ ﺍﺯ ﭘﻴﮑﺮﺑﻨﺪﻱ ﻳﮏ ﺭﻭﺗﺮ ،ﻧﺘﺎﻳﺞ ﻭ ﻣﺎﺣﺼﻞ ﻋﻤﻠﻴﺎﺕ ﺩﺭ NVRAMﺫﺧﻴﺮﻩ
ﻣﻲ ﮔﺮﺩﺩ .ﺣﺠﻢ ﺣﺎﻓﻈﻪ ﻓﻮﻕ ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ﺣﺎﻓﻈﻪ ﻫﺎﻱ ،RAMﺍﻧﺪﮎ ﻣﻲ ﺑﺎﺷﺪ. ﻣﺜﻼ" ﺩﺭ ﺭﻭﺗﺮﻫﺎﻱ ﺳﺮﻱ ، ١٦٠٠ﺣﺠﻢ ﺣﺎﻓﻈﻪ ﻓﻮﻕ ﺑﻪ ﻫﺸﺖ ﮐﻴﻠﻮﺑﺎﻳﺖ ﻣﻲ ﺭﺳﺪ .ﺩﺭ ﺭﻭﺗﺮﻫﺎﻱ ﺑﺰﺭﮔﺘﺮﻱ ﻧﻈﻴﺮ ﺳﺮﻱ ،٢٦٠٠ﺣﺠﻢ ﺣﺎﻓﻈﻪ NVRAMﺑﻪ ﺳﻲ ﻭ ﺩﻭ
ﮐﻴﻠﻮﺑﺎﻳـﺖ ﻣﻲ ﺭﺳﺪ .ﭘﺲ ﺍﺯ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﻳﮏ ﺭﻭﺗﺮ ﻭ ﻟﻮﺩ ، ISO imageﻓﺎﻳﻞ
ﭘﻴﮑﺮﺑﻨﺪﻱ ﺍﺯ ﺣﺎﻓﻈﻪ NVRAMﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺠﺎﻡ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺭﻭﺗﺮ ،ﻟﻮﺩ ﻣﻲ ﮔﺮﺩﺩ. ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺣﺎﻓﻈﻪ ﻫﺎ ،ﭘﺎﮎ ﻧﺨﻮﺍﻫﺪ ﺷﺪ )ﺣﺘﻲ ﺯﻣﺎﻧﻲ ﮐﻪ ﺭﻭﺗﺮ
Reloadﻭ ﻳﺎ ﺧﺎﻣﻮﺵ ﺍﺳﺖ(. •
ﺣﺎﻓﻈﻪ ، ROMﺍﺯ ﺣﺎﻓﻈﻪ ﻓﻮﻕ ﺑﻪ ﻣﻨﻈﻮﺭ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﻭ ﻧﮕﻬﺪﺍﺭﻱ ﺭﻭﺗﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺣﺎﻓﻈﻪ ﻓﻮﻕ ﺷﺎﻣﻞ ﺑﺮﺧﻲ ﮐﺪﻫﺎ ﻧﻈﻴﺮ Bootstrapﻭ POSTﺑﻮﺩﻩ ﮐﻪ ﺗﺴﻬﻴﻼﺕ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺍﻧﺠﺎﻡ ﺗﺴﺖ ﻫﺎﻱ ﺍﻭﻟﻴﻪ ﻭ ﺭﺍﻩ ﺍﻧﺪﺍﺭﻱ ﺭﺍ ﺑﺮﺍﻱ ﺭﻭﺗﺮ
ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ .ﻣﺤﺘﻮﻳﺎﺕ ﺍﻳﻦ ﺣﺎﻓﻈﻪ ﺭﺍ ﻧﻤﻲ ﺗﻮﺍﻥ ﺗﻐﻴﻴﺮ ﺩﺍﺩ ) ﻓﻘﻂ ﺧﻮﺍﻧﺪﻧﻲ(. ﺗﻤﺎﻣﻲ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺣﺎﻓﻈﻪ ROMﺗﻮﺳﻂ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺍﺳﺖ.
•
ﺣﺎﻓﻈﻪ ﻓﻠﺶ ،ﻫﻤﺎﻥ ﮐﺎﺭﺗﻲ ﺍﺳﺖ ﮐﻪ ﺩﺭ ﺑﺨﺶ IOSﺑﻪ ﺁﻥ ﺍﺷﺎﺭﻩ ﮔﺮﺩﻳﺪ. ﺍﻳﻦ ﺣﺎﻓﻈﻪ ﺍﺯ ﻧﻮﻉ
)(Electrical Eraseable Programmable Read Only Memory
، EEPROM
ﻣﻲ ﺑﺎﺷﺪ .ﮐﺎﺭﺕ ﻓﻮﻕ ﺍﺯ ﻃﺮﻳﻖ ﺍﺳﻼﺗﻲ ﮐﻪ ﺩﺭ ﭘﺸﺖ ﻳﮏ ﺭﻭﺗﺮ ﻗﺮﺍﺭ ﺩﺍﺭﺩ ﺑﻪ ﺭﻭﺗﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ ﻭ ﭼﻴﺰﻱ ﺑﻴﺶ ﺍﺯ image IOSﺭﺍ ﺩﺭ ﺧﻮﺩ ﺫﺧﻴﺮﻩ ﻧﻤﻲ ﻧﻤﺎﻳﺪ. ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮐﻨﺴﻮﻝ ﺭﻭﺗﺮ ﻣﻲ ﺗﻮﺍﻥ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺣﺎﻓﻈﻪ ﻧﻮﺷﺖ ﻭ ﻳﺎ ﺍﻗﺪﺍﻡ ﺑﻪ ﺣﺬﻑ ﺑﺮﺧﻲ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﻧﻤﻮﺩ .ﺣﺠﻢ ﺣﺎﻓﻈﻪ ﻓﻮﻕ ﺍﺯ ٤ﻣﮕﺎﺑﺎﻳﺖ ﺩﺭ
ﺭﻭﺗﺮﻫﺎﻱ ﺳﺮﻱ ١٦٠٠ﺷﺮﻭﻉ ﺷﺪﻩ ﻭ ﻣﺘﻨﺎﺳﺐ ﺑﺎ ﻣﺪﻝ ﺭﻭﺗﺮ ،ﺍﻓﺰﺍﻳﺶ ﻣﻲ ﻳﺎﺑﺪ. •
ﺭﻳﺠﺴﺘﺮ ﭘﻴﮑﺮﺑﻨﺪﻱ ) ،( Configuration Registerﻧﻘﻄﻪ ﺷﺮﻭﻉ ﻓﺮﺁﻳﻨﺪ
ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ IOSﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ ) ﻓﻠﺶ ﮐﺎﺭﺕ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ tftpﻭ ﻳﺎ ﺻﺮﻓﺎ" ﻟﻮﺩ . ( RXBoot imageﺭﻳﺠﺴﺘﺮ ﻓﻮﻕ ،ﺷﺎﻧﺰﺩﻩ ﺑﻴﺘﻲ ﺍﺳﺖ.
354
ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﻭﺗﺮﻫﺎﻱ ﺳﻴﺴﻜﻮ ﺑﺮﺍﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﻭﺗﺮﻫﺎﻱ ﺳﻴﺴﻜﻮ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﻪ ﺑﺨﺶ ﺭﺍﺑﻂ ﻛﺎﺭﺑﺮﺁﻧﺎﻥ ﺩﺳﺘﻴﺎﺑﻲ ﺩﺍﺷﺖ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ،ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﻳﻚ ﺗﺮﻣﻴﻨﺎﻝ ﻭ ﻳﺎ ﺩﺳﺘﻴﺎﺑﻲ ﺍﺯﺭﺍﻩ ﺩﻭﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ. ﭘﺲ ﺍﺯ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺭﻭﺗﺮ ،ﺩﺭ ﺍﻭﻟﻴﻦ ﺍﻗﺪﺍﻡ ﻣﻲ ﺑﺎﻳﺴﺖ ﻋﻤﻠﻴﺎﺕ loggingﺭﺍ ﺍﻧﺠﺎﻡ ﺗﺎ ﺯﻣﻴﻨﻪ
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯﺳﺎﻳﺮ ﺩﺳﺘﻮﺭﺍﺕ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺸﺎﻫﺪﻩ ﺁﺧﺮﻳﻦ ﻭﺿﻌﻴﺖ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻭ ﻳﺎ ﺗﻐﻴﻴﺮ ﭘﻴﻜﺮﺑﻨﺪﻱ
ﺭﻭﺗﺮ ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ. ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺍﺋﻪ ﻳﻚ ﻻﻳﻪ ﺍﻣﻨﻴﺘﻲ ﻣﻨﺎﺳﺐ ،ﺍﻣﻜﺎﻥ ﺑﺎﻟﻔﻌﻞ ﻛﺮﺩﻥ ﭘﺘﺎﻧﺴﻴﻞ ﻫﺎﻱ ﺍﺭﺍﺋﻪ ﺷﺪﻩ
) ﺩﺳﺘﻮﺭﺍﺕ( ﺭﻭﺗﺮ ﺩﺭ ﺩﻭ modeﻣﺘﻔﺎﻭﺕ ﻓﺮﺍﻫﻢ ﺷﺪﻩ ﺍﺳﺖ: •
: EXEC mode Userﺩﺭ ﺍﻳﻦ ، modeﻋﻤﻮﻣﺎ" ﺩﺳﺘﻮﺭﺍﺗﻲ ﺭﺍ ﻣﻲ ﺗﻮﺍﻥ
ﺍﺟﺮﺍﺀ ﻧﻤﻮﺩ ﻛﻪ ﻣﺎﺣﺼﻞ ﺍﺟﺮﺍﻱ ﺁﻧﺎﻥ ،ﻧﻤﺎﻳﺶ ﻭﺿﻌﻴﺖ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﻭﺗﺮ ﺍﺳﺖ ﻭ
ﻧﻤﻲ ﺗﻮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺠﻤﻮﻋﻪ ﺍﻣﻜﺎﻧﺎﺕ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺩﺭ ﺍﻳﻦ ، modeﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﻭﺗﺮ ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﺍﺩ . •
: Privileged EXEC modeﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻣﻜﺎﻧﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ
، modeﻣﻲ ﺗﻮﺍﻥ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﻭﺗﺮ ﺭﺍ ﺍﻧﺠﺎﻡ ﻭ ﺗﻐﻴﻴﺮﺍﺕ ﻻﺯﻡ ﺭﺍ ﺍﻋﻤﺎﻝ ﻧﻤﻮﺩ. ﭘﺲ ﺍﺯ loginﺑﻪ ﺭﻭﺗﺮ ،ﭘﺮﺍﻣﭙﺖ user Exec modeﻧﺸﺎﻥ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺩﺳﺘﻮﺭﺍﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ ، modeﺯﻳﺮﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺩﺳﺘﻮﺭﺍﺕ Privileged EXEC mode ﻣﻲ ﺑﺎﺷﻨﺪ .ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻣﺠﻤﻮﻋﻪ ﻛﺎﻣﻞ ﺩﺳﺘﻮﺭﺍﺕ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ Privileged
EXEC modeﻭﺍﺭﺩ ﺷﺪ .ﺑﺎ ﺗﺎﻳﭗ ﺩﺳﺘﻮﺭ enableﻭ ﻳﺎ ﺷﻜﻞ ﻣﺨﻔﻒ ﺷﺪﻩ ﺁﻥ ﻳﻌﻨﻲ ، enuﺁﻣﺎﺩﻩ ﻭﺭﻭﺩ ﺑﻪ ﺍﻳﻦ modeﺧﻮﺍﻫﻴﻢ ﺷﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﻛﻪ ﺑﺮﺍﻱ ﺭﻭﺗﺮ ﺭﻣﺰ ﻋﺒﻮﺭﻱ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺑﺎﺷﺪ ،ﭘﺲ ﺍﺯ ﻧﻤﺎﻳﺶ passwordﻣﻲ ﺑﺎﻳﺴﺖ ﺭﻣﺰ ﻋﺒﻮﺭ ﺭﺍ ﻭﺍﺭﺩ ﻧﻤﻮﺩ.
ﭘﺲ ﺍﺯ ﺗﻜﻤﻴﻞ ﻓﺮﺁﻳﻨﺪ ، logginﺷﻜﻞ ﭘﺮﺍﻣﭙﺖ ) (promptﺗﻐﻴﻴﺮ ﻭ ﺑﻪ ﺻﻮﺭﺕ " "#ﻧﺸﺎﻥ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ ﻛﻪ ﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﻭﺭﻭﺩ ﺑﻪ Privileged EXEC modeﻣﻲ ﺑﺎﺷﺪglobal .
355
، configuration modeﻳﻜﻲ ﺍﺯ ﺣﺎﻻﺗﻲ ﺍﺳﺖ ﻛﻪ ﺻﺮﻓﺎ" ﺍﺯ ﻃﺮﻳﻖ Privileged
EXEC modeﻗﺎﺑﻞ ﺩﺳﺘﻴﺎﺑﻲ ﺍﺳﺖ .ﺍﻣﻜﺎﻥ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺣﺎﻻﺕ ﺯﻳﺮ ﺍﺯ ﻃﺮﻳﻖ global configuration modeﻭﺟﻮﺩ ﺩﺍﺭﺩ : Interface Subinterface Line Router Route-map
• • • • •
ﺑﺮﺍﻱ ﺑﺮﮔﺸﺖ ﺑﻪ EXEC modeﺍﺯ ﻃﺮﻳﻖ ، Privileged EXEC modeﺍﺯ ﺩﺳﺘﻮﺭ disableﻭ ﻳﺎ Exitﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺮﺍﻱ ﺑﺮﮔﺸﺖ ﺑﻪ Privileged EXEC modeﺍﺯ ﻃﺮﻳﻖ ، global configuration modeﺍﺯ ﺩﺳﺘﻮﺭ Exitﻭ ﻳﺎ ﻛﻠﻴﺪﻫﺎﻱ Ctrl-Zﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺍﺯ ﺗﺮﻛﻴﺐ ﻛﻠﻴﺪﻫﺎﻱ Ctrl-Zﻣﻲ ﺗﻮﺍﻥ ﺑﺮﺍﻱ ﺑﺮﮔﺸﺖ ﻣﺴﺘﻘﻴﻢ ﺑﻪ Privileged EXEC modeﺍﺯ ﻫﺮﻳﻚ ﺍﺯ ﺣﺎﻻﺕ ﺯﻳﺮﻣﺠﻤﻮﻋﻪ global configuration modeﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ.
ﺑﺮﺍﻱ ﺗﻌﺮﻳﻒ ﺭﻣﺰ ﻋﺒﻮﺭ ﺟﻬﺖ ﻭﺭﻭﺩ ﺑﻪ ،Privileged EXEC modeﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺩﺳﺘﻮﺭﺍﺕ enable passwordﻭ enable secretﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﺩﺭ ﺻﻮﺭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘﻮﺭﺍﺕ ﻓﻮﻕ ،ﺍﻭﻟﻮﻳﺖ ﺑﺎ ﺩﺳﺘﻮﺭ enable secretﻣﻲ ﺑﺎﺷﺪ.
356
ﺁﺷﻨﺎﺋﻲ ﺑﺎ ﺍﻣﻜﺎﻧﺎﺕ ﺑﺨﺶ ﺭﺍﺑﻂ ﻛﺎﺭﺑﺮ
، privileged EXEC mode ﻭ ﻳﺎuser EXEC mode ﺑﺎ ﺗﺎﻳﭗ ﻋﻼﻣﺖ "?" ﺩﺭ ﺩﺳﺘﻮﺭﺍﺕ ﺻﻔﺤﻪ ﺑﻪ. ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩmode ﻟﻴﺴﺖ ﺩﺳﺘﻮﺭﺍﺕ ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﻫﺮ
ﻣﻲ ﺗﻮﺍﻥ ﺻﻔﺤﺎﺕ ﺑﻌﺪﻱ ﺭﺍ ﻣﺸﺎﻫﺪﻩenter ﺻﻔﺤﻪ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﺷﺪﻩ ﻭ ﺑﺎ ﻓﺸﺮﺩﻥ ﻛﻠﻴﺪ .ﻧﻤﻮﺩ mode user EXEC ﺩﺳﺘﻮﺭﺍﺕ Exec commands: access-enable Create a temporary Access-List entry access-profile Apply userprofile to interface clear Reset functions connect Open a terminal connection disable Turn off privileged commands disconnect Disconnect an existing network connection Router>? enable Turn on privileged commands exit Exit from the EXEC help Description of the interactive help system lock Lock the terminal login Log in as a particular user logout Exit from the EXEC mrinfo Request neighbor and version information from a multicast router 357
mstat Show statistics after multiple multicast traceroutes mtrace Trace reverse multicast path from destination to source name-connection Name an existing network connection pad Open a X.29 PAD connection ping Send echo messages ppp Start IETF Point-to-Point Protocol (PPP) resume Resume an active network connection rlogin Open an rlogin connection show Show running system information slip Start Serial-line IP (SLIP) systat Display information about terminal lines telnet Open a telnet connection terminal Set terminal line parameters --More--
358
privileged EXEC mode ﺩﺳﺘﻮﺭﺍﺕ Exec commands: access-enable Create a temporary Access-List entry access-profile Apply userprofile to interface access-template Create a temporary Access-List entry bfe For manual emergency modes setting clear Reset functions clock Manage the system clock configure Enter configuration mode connect Open a terminal connection copy Copy configuration or #Router? image data debug Debugging functions (see also 'undebug') disable Turn off privileged commands disconnect Disconnect an existing network connection enable Turn on privileged commands erase Erase flash or configuration memory exit Exit from the EXEC help Description of the interactive help system lock Lock the terminal login Log in as a particular 359
user logout Exit from the EXEC mrinfo Request neighbor and version information from a multicast router mstat Show statistics after multiple multicast traceroutes mtrace Trace reverse multicast path from destination to source name-connection Name an existing network connection no Disable debugging functions pad Open a X.29 PAD connection ping Send echo messages ppp Start IETF Point-to-Point Protocol (PPP) --More- ﻳﻚ ﻧﻤﻮﻧﻪ ﻣﺜﺎﻝ ) ﺗﻨﻈﻴﻢ ﺳﺎﻋﺖ، ﺑﺮﺍﻱ ﺁﺷﻨﺎﺋﻲ ﺑﺎ ﻧﺤﻮﻩ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺨﺶ ﺭﺍﺑﻂ ﻛﺎﺭﺑﺮ ﺭﻭﺗﺮ
: ﺭﻭﺗﺮ ( ﺭﺍ ﺑﺎ ﻫﻢ ﺩﻧﺒﺎﻝ ﻣﻲ ﻧﻤﺎﺋﻴﻢ
ﺗﺎﻳﭗ ﻋﻼﻣﺖ "?" ﺑﻪ ﻣﻨﻈﻮﺭ ﺁﮔﺎﻫﻲ ﺍﺯ ﺩﺳﺘﻮﺭﺍﺕ ﻣﻮﺟﻮﺩ ) ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ: ﻣﺮﺣﻠﻪ ﺍﻭﻝ
•
ﺑﺮﺭﺳﻲ ﮔﺮﺍﻣﺮ ﺩﺳﺘﻮﺭ ﻭ ﺍﻳﻦ ﻛﻪ ﺯﻣﺎﻥ ﺭﺍ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺎ ﭼﻪ ﻓﺮﻣﺘﻲ ﻭﺍﺭﺩ: ﻣﺮﺣﻠﻪ ﺩﻭﻡ
•
( clock ﺩﺳﺘﻮﺭ
. ﻧﻤﻮﺩ
ﺑﻪ ﺷﻤﺎ ﺍﻋﻼﻡ ﻣﻲ ﮔﺮﺩﺩ ﻛﻪ ﺑﻪ، ﺩﻗﻴﻘﻪ ﻭ ﺛﺎﻧﻴﻪ، ﭘﺲ ﺍﺯ ﺗﺎﻳﭗ ﺳﺎﻋﺖ: ﻣﺮﺣﻠﻪ ﺳﻮﻡ .( ﺳﺎﻝ، ﻣﺎﻩ، ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮﻱ ﻧﻴﺎﺯ ﻣﻲ ﺑﺎﺷﺪ ) ﺭﻭﺯ
360
•
•
ﻣﺮﺣﻠﻪ ﭼﻬﺎﺭﻡ :ﺑﺎ ﻓﺸﺮﺩﻥ ﻛﻠﻴﺪﻫﺎﻱ ctrl-Pﻭ ﻳﺎ )ﻛﻠﻴﺪ ( up arrowﺩﺳﺘﻮﺭ
ﺗﺎﻳﭗ ﺷﺪﻩ ﻗﺒﻠﻲ ﺗﻜﺮﺍﺭ ﻭ ﺑﺎ ﺍﺿﺎﻓﻪ ﻧﻤﻮﺩﻥ ﻋﻼﻣﺖ ﺳﻮﺍﻝ ﺑﻪ ﺍﻧﺘﻬﺎﻱ ﺁﻥ ،ﻭﺿﻌﻴﺖ
ﺁﺭﮔﻮﻣﺎﻥ ﻫﺎﻱ ﺍﺿﺎﻓﻲ ﺁﻥ ﻣﺸﺨﺺ ﻣﻲ ﮔﺮﺩﺩ. •
ﻣﺮﺣﻠﻪ ﭘﻨﺠﻢ :ﺑﺎ ﻣﺸﺎﻫﺪﻩ ﻋﻼﻣﺖ "^" ﻭ ﭘﺎﺳﺦ ﺳﻴﺴﺘﻢ ،ﺷﺎﻫﺪ ﺑﺮﻭﺯ ﻳﻚ ﺧﻄﺎﺀ
ﺧﻮﺍﻫﻴﻢ ﺑﻮﺩ .ﻣﺤﻞ ﻋﻼﻣﺖ "^" ،ﻣﻜﺎﻥ ﺍﺣﺘﻤﺎﻟﻲ ﺑﺮﻭﺯ ﺧﻄﺎﺀ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ .ﺑﺮﺍﻱ ﺗﺎﻳﭗ ﺻﺤﻴﺢ ﺩﺳﺘﻮﺭ ،ﻣﺠﺪﺩﺍ" ﺩﺳﺘﻮﺭ ﺭﺍ ﺗﺎ ﻣﺤﻠﻲ ﻛﻪ ﻋﻼﻣﺖ "^" ﻣﺸﺨﺺ ﻧﻤﻮﺩﻩ
ﺗﺎﻳﭗ ﻛﺮﺩﻩ ﻭ ﺳﭙﺲ ﺍﺯ ﻋﻼﻣﺖ "?" ﺑﺮﺍﻱ ﺁﮔﺎﻫﻲ ﺍﺯ ﮔﺮﺍﻣﺮ ﻣﺮﺑﻮﻃﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﺋﻴﻢ .
•
ﻣﺮﺣﻠﻪ ﺷﺸﻢ :ﭘﺲ ﺍﺯ ﺩﺭﺝ ﺳﺎﻋﺖ ،ﺩﻗﻴﻘﻪ ﻭ ﺛﺎﻧﻴﻪ ﺑﺮ ﺍﺳﺎﺱ ﻓﺮﻣﺖ ﺩﺭﺧﻮﺍﺳﺘﻲ ،ﺩﺭ ﺍﺩﺍﻣﻪ ﺳﺎﻝ ﺭﺍ ﻧﻴﺰ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻓﺮﻣﺖ ﻣﻮﺭﺩ ﻧﻈﺮ ﻭﺍﺭﺩ ﻣﻲ ﻧﻤﺎﺋﻴﻢ . ﺗﻨﻈﻴﻢ ﺯﻣﺎﻥ ﺭﻭﺗﺮ Router Con0 is now available Press RETURN to get started. Router>enable ?Router#cl clear clock ? Router#clock set Set the time and date ? Router#clock set hh:mm:ss Current Time ? Router#clock set 13:22:00 <1-31> Day of the month MONTH Month of the year ? Router#clock set 13:22:00 17 october <1999-2035> Year
Router#clock set 13:22:00 17 october 2005 Router#
361
ﺩﺳﺘﻮﺭﺍﺕ ﺍﺿﺎﻓﻲ ﻭﻳﺮﺍﻳﺶ ﺑﺨﺶ ﺭﺍﺑﻂ ﻛﺎﺭﺑﺮ ﺷﺎﻣﻞ ﻳﻚ modeﺍﺿﺎﻓﻲ ﻭﻳﺮﺍﻳﺶ ﺍﺳﺖ ﻛﻪ ﺑﺎ ﺗﻌﺮﻳﻒ ﻣﺠﻤﻮﻋﻪ
ﺍﻱ ﺍﺯ ﻛﻠﻴﺪﻫﺎ ،ﺍﻣﻜﺎﻥ ﻭﻳﺮﺍﻳﺶ ﻳﻚ ﺩﺳﺘﻮﺭ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻛﺎﺭﺑﺮ ﻗﺮﺍﺭ ﻣﻲ ﺩﻫﺪ mode .ﻓﻮﻕ ، ﺑﻪ ﺻﻮﺭﺕ ﭘﻴﺶ ﻓﺮﺽ ﻓﻌﺎﻝ ﻣﻲ ﮔﺮﺩﺩ ﻭ ﺩﺭ ﺻﻮﺭﺕ ﺗﻤﺎﻳﻞ ﻣﻲ ﺗﻮﺍﻥ ﺁﻥ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
ﺩﺳﺘﻮﺭ terminal no editingﺩﺭ privileged EXEC modeﻏﻴﺮﻓﻌﺎﻝ ﻧﻤﻮﺩ.
ﺩﺭ ﺍﻳﻦ ، modeﺍﺯ Scrollingﺍﻓﻘﻲ ﺩﺭ ﻣﻮﺍﺭﺩﻱ ﻛﻪ ﻃﻮﻝ ﻳﻚ ﺩﺳﺘﻮﺭ ﺍﺯ ﻳﻚ ﺧﻂ
ﺗﺠﺎﻭﺯ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ﻭ ﺯﻣﺎﻧﻲ ﻛﻪ cursorﺑﻪ ﻣﻨﺘﻬﻲ ﺍﻟﻴﻪ ﺳﻤﺖ ﺭﺍﺳﺖ ﻣﻲ ﺭﺳﺪ ،ﺧﻂ ﺩﺳﺘﻮﺭ ﺑﻪ ﺍﻧﺪﺍﺯﻩ ﺩﻩ ﺣﺮﻑ ﺑﻪ ﺳﻤﺖ ﭼﭗ ﺷﻴﻔﺖ ﭘﻴﺪﺍ ﻧﻤﻮﺩﻩ ﻭ ﺍﻭﻟﻴﻦ ﺩﻩ ﺣﺮﻑ ﺗﺎﻳﭗ ﺷﺪﻩ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻧﺨﻮﺍﻫﻨﺪ ﺷﺪ .ﻭﺟﻮﺩ ﻋﻼﻣﺖ " "$ﺩﺭ ﺍﺑﺘﺪﺍﻱ ﻳﻚ
ﺩﺳﺘﻮﺭ ﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺍﺳﺖ ﻛﻪ ﺧﻂ ﺑﻪ ﺳﻤﺖ ﭼﭗ scrollﻧﻤﻮﺩﻩ ﺍﺳﺖ. ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻮﺍﺑﻖ ﺩﺳﺘﻮﺭﺍﺕ ﺗﺎﻳﭗ ﺷﺪﻩ ﺑﺨﺶ ﺭﺍﺑﻂ ﻛﺎﺭﺑﺮ ﺭﻭﺗﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻣﺠﺪﺩ ﺍﺯ ﺩﺳﺘﻮﺭﺍﺕ ﺗﺎﻳﭗ ﺷﺪﻩ ،ﺁﻧﺎﻥ ﺭﺍ ﺩﺭ ﻳﻚ ﺑﺎﻓﺮ ﻭ ﺑﺎ ﻇﺮﻓﻴﺖ ﻣﺤﺪﻭﺩ ﻧﮕﻬﺪﺍﺭﻱ ﻣﻲ ﻧﻤﺎﻳﺪ ) ﺳﻮﺍﺑﻖ ﻭ ﻳﺎ ﺗﺎﺭﻳﺨﭽﻪ ﺩﺳﺘﻮﺭﺍﺕ ( .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻣﻜﺎﻧﺎﺕ ﻣﻮﺟﻮﺩ ﻣﻲ ﺗﻮﺍﻥ ﻋﻤﻠﻴﺎﺕ ﺯﻳﺮ ﺭﺍ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﻮﺍﺑﻖ ﺩﺳﺘﻮﺭﺍﺕ ﺍﻧﺠﺎﻡ ﺩﺍﺩ: •
ﺗﻨﻈﻴﻢ ﻭ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﺍﻧﺪﺍﺯﻩ ﺑﺎﻓﺮ ﺳﻮﺍﺑﻖ
•
ﻓﺮﺍﺧﻮﺍﻧﻲ ﻣﺠﺪﺩ ﺩﺳﺘﻮﺭﺍﺕ
•
ﻏﻴﺮﻓﻌﺎﻝ ﻧﻤﻮﺩﻥ ﻭﻳﮋﮔﻲ "ﺳﻮﺍﺑﻖ ﺩﺳﺘﻮﺭﺍﺕ "
ﺳﻮﺍﺑﻖ ﺩﺳﺘﻮﺭﺍﺕ ﺑﻪ ﺻﻮﺭﺕ ﭘﻴﺶ ﻓﺮﺽ ﻓﻌﺎﻝ ﻣﻲ ﮔﺮﺩﺩ ﻭ ﻗﺎﺩﺭ ﺑﻪ ﺫﺧﻴﺮﻩ ﺣﺪﺍﻛﺜﺮ ﺩﻩ ﺧﻂ
ﺩﺳﺘﻮﺭ ﺩﺭ ﺑﺎﻓﺮ ﻣﺮﺑﻮﻃﻪ ﻣﻲ ﺑﺎﺷﺪ .ﺑﺮﺍﻱ ﺗﻐﻴﻴﺮ ﺗﻌﺪﺍﺩ ﺩﺳﺘﻮﺭﺍﺗﻲ ﻛﻪ ﻣﻲ ﺗﻮﺍﻥ ﺁﻧﺎﻥ ﺭﺍ ﺩﺭ ﻟﻴﺴﺖ
ﺳﻮﺍﺑﻖ ﻧﮕﻬﺪﺍﺭﻱ ﻧﻤﻮﺩ ،ﺍﺯ ﺩﺳﺘﻮﺭ terminal history sizeﻭ ﻳﺎ history size
362
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺣﺪﺍﻛﺜﺮ ٢٥٦ﺩﺳﺘﻮﺭ ﺭﺍ ﻣﻲ ﺗﻮﺍﻥ ﺩﺭ ﻟﻴﺴﺖ ﺳﻮﺍﺑﻖ ﻧﮕﻬﺪﺍﺭﻱ ﻧﻤﻮﺩ.
ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺩﺳﺘﻮﺭﺍﺕ ﺗﺎﻳﭗ ﺷﺪﻩ ،ﺍﺯ ﻛﻠﻴﺪﻫﺎﻱ Ctrl-Pﻭ ﻳﺎ ﻛﻠﻴﺪ arrow Up
) ﺣﺮﻛﺖ ﺑﻪ ﺳﻤﺖ ﺍﺑﺘﺪﺍﻱ ﻟﻴﺴﺖ ( ﻭ ﻛﻠﻴﺪﻫﺎﻱ Ctrl-Nﻭ ﻳﺎ ) down arrowﺣﺮﻛﺖ ﺑﻪ ﺳﻤﺖ ﭘﺎﺋﻴﻦ ﻟﻴﺴﺖ ( ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
363
ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﻳﮑﻲ ﺍﺯ ﭼﻨﺪﻳﻦ ﺭﻭﺵ ﻣﻮﺟﻮﺩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﭼﻨﺪ
ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻴﮑﺪﻳﮕﺮ ﻭ ﺍﻳﺠﺎﺩ ﻳﮏ ﺷﺒﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺳﺖ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻓﻮﻕ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﻴﻦ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺍﺯ ﺍﻣﻮﺍﺝ ﺭﺍﺩﻳﻮﺋﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ. ﻣﺒﺎﻧﻲ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ
ﺗﮑﻨﻮﻟﻮﮊﻱ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﺍﺯ ﺍﻳﺪﻩ" ﺿﺮﻭﺭﺗﻲ ﺑﻪ ﮐﺎﺑﻞ ﻫﺎ ﻱ ﺟﺪﻳﺪ
ﻧﻤﻲ ﺑﺎﺷﺪ" ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ،ﺗﻤﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻴﮕﻨﺎﻝ ﻫﺎﺋﻲ ﺭﺍﺩﻳﻮﺋﻲ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﻧﺘﺸﺎﺭ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺮﺍﻱ ﻳﮑﺪﻳﮕﺮ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺍﻳﻦ ﻧﻮﻉ
ﺷﺒﮑﻪ ﻫﺎ ﺩﺍﺭﺍﻱ ﺳﺎﺧﺘﺎﺭﻱ ﺳﺎﺩﻩ ﺑﻮﺩﻩ ﻭ ﺑﺮﺍﺣﺘﻲ ﻣﻲ ﺗﻮﺍﻥ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺘﺼﻞ ﺑﻪ ﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎ ﺭﺍ ﻣﮑﺎﻥ ﻫﺎﻱ ﺩﻳﮕﺮ ﺍﺳﺘﻘﺮﺍﺭ ﻭ ﮐﻤﺎﮐﻦ ﺍﺯ ﺍﻣﮑﺎﻧﺎﺕ ﺷﺒﮑﻪ ﺑﻬﺮﻩ ﻣﻨﺪ ﮔﺮﺩﻳﺪ ﻣﺜﻼ" ﺩﺭ
ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ﺭﺍ ﺩﺭ ﻳﮏ ﻓﻀﺎﻱ ﮐﻮﭼﮏ ﻧﻈﻴﺮ ﻳﮏ ﺳﺎﺧﺘﻤﺎﻥ ﺍﺩﺍﺭﻱ ﺍﻳﺠﺎﺩ ﮐﺮﺩﻩ ﺑﺎﺷﻴﻢ ﻭ ﺩﺍﺭﺍﻱ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ laptopﺑﺎﺷﻴﻢ ﮐﻪ ﺍﺯ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﻣﺨﺼﻮﺹ ﺑﺪﻭﻥ
ﮐﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺩﺭ ﻫﺮ ﻣﮑﺎﻧﻲ ﺍﺯ ﺍﺩﺍﺭﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﮐﻪ ﻣﺴﺘﻘﺮ ﺷﺪﻩ ﺑﺎﺷﻴﻢ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
Laptopﻣﻲ ﺗﻮﺍﻥ ﺑﺴﺎﺩﮔﻲ ﺑﻪ ﺷﺒﮑﻪ ﻣﺘﺼﻞ ﻭ ﺍﺯ ﺍﻣﮑﺎﻧﺎﺕ ﻣﺮﺑﻮﻃﻪ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ. ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺯ ﻧﻘﻈﻪ ﻧﻈﺮ ﻧﻮﻉ ﺧﺪﻣﺎﺕ ﻭﺳﺮﻭﻳﺲ ﺩﻫﻲ ﺑﻪ ﺩﻭ ﮔﺮﻭﻩ :ﻧﻈﻴﺮ ﺑﻪ ﻧﻈﻴﺮ
ﻭ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ /ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻧﻘﺴﻴﻢ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻧﻈﻴﺮ ﺑﻪ ﻧﻈﻴﺮ ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻗﺎﺩﺭ ﺑﻪ ﺍﻳﻔﺎﻱ ﻭﻇﻴﻔﻪ ﺩﺭ ﺩﻭ ﻧﻘﺶ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺩﺭ ﻫﺮ ﻟﺤﻈﻪ ﺍﺳﺖ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ /ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ،ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺻﺮﻓﺎ"
ﻣﻲ ﺗﻮﺍﻧﺪ ﻳﮏ ﻧﻘﺶ ﺭﺍ ﺑﺎﺯﻱ ﻧﻤﺎﻳﺪ ) .ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻳﺎ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ( .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ
ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﮐﻪ ﺑﺼﻮﺭﺕ ﻧﻈﻴﺮ ﺑﻪ ﻧﻈﻴﺮ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻣﻲ ﮔﺮﺩﻧﻨﺪ ،ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺗﺒﺎﻁ
ﻣﺴﺘﻘﻴﻢ ﺑﺎ ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺖ .ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﺑﺼﻮﺭﺕ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ /ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ،ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ﺩﺍﺭﺍﻱ ﻳﮏ Access pointﻣﻲ ﺑﺎﺷﻨﺪ. 364
ﺩﺳﺘﮕﺎﻩ ﻓﻮﻕ ﻳﮏ ﮐﻨﺘﺮﻝ ﮐﻨﻨﺪﻩ ﮐﺎﺑﻠﻲ ﺑﻮﺩﻩ ﻭ ﻗﺎﺩﺭ ﺑﻪ ﺩﺭﻳﺎﻓﺖ ﻭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﻪ
ﺁﺩﺍﭘﺘﻮﺭﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ )ﮐﺎﺭﺕ ﻫﺎﻱ ﺷﺒﮑﻪ ﺑﺪﻭﻥ ﮐﺎﺑﻞ( ﻧﺼﺐ ﺷﺪﻩ ﺩﺭ ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻣﻲ ﺑﺎﺷﻨﺪ.
ﭼﻬﺎﺭ ﻧﻮﻉ ﻣﺘﻔﺎﻭﺕ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﻭﺟﻮﺩ ﺩﺍﺭﺩ )ﺍﺯ ﮐﻨﺪ ﻭ ﺍﺭﺯﺍﻥ ﺗﺎ ﺳﺮﻳﻊ ﻭﮔﺮﺍﻥ ( • • • •
BlueTooth IrDA (SWAP(HomeRF (Wi-Fi(WECA
ﺷﺒﮑﻪ ﻫﺎﻱ Bluetoothﺩﺭ ﺣﺎﻝ ﺣﺎﺿﺮ ﻋﻤﻮﻣﻴﺖ ﻧﺪﺍﺷﺘﻪ ﻭ ﺑﻨﻈﺮ ﻗﺎﺩﺭ ﺑﻪ ﭘﺎﺳﺨﮕﻮﺋﻲ ﺑﻪ ﮐﺎﺭﺑﺮﺍﻥ ﺑﺮﺍﻱ ﺷﺒﮑﻪ ﻫﺎ ﻱ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ﻧﻤﻲ ﺑﺎﺷﻨﺪInfrared Data(IrDA .
(Associationﺍﺳﺘﺎﻧﺪﺍﺭﺩﻱ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺩﺳﺘﮕﺎﻫﻬﺎﺋﻲ ﺍﺳﺖ ﮐﻪ ﺍﺯ ﺳﻴﮕﻨﺎﻝ ﻫﺎ ﻱ ﻧﻮﺭﻱ ﻣﺎﺩﻭﻥ ﻗﺮﻣﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻓﻮﻕ ﻧﺤﻮﻩ ﻋﻤﻠﻴﺎﺕ ﮐﻨﺘﺮﻝ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ، ) ﺗﻮﻟﻴﺪ ﺷﺪﻩ ﺗﻮﺳﻂ ﻳﮏ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ ﺧﺎﺹ( ﻭ ﻳﮏ ﺩﺳﺘﮕﺎﻩ ﺭﺍﻩ ﺩﻭﺭ )ﺗﻮﻟﻴﺪ ﺷﺪﻩ ﺗﻮﺳﻂ
ﺗﻮﻟﻴـﺪ ﮐﻨﻨﺪﻩ ﺩﻳﮕﺮ( ﺭﺍ ﺗﺒﻴــﻦ ﻣﻲ ﮐﻨـــﺪ .ﺩﺳﺘــﮕﺎﻫﻬﺎﻱ IrDAﺍﺯ ﻧﻮﺭﻣﺎﺩﻭﻥ ﻗﺮﻣﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ. ﻗﺒﻞ ﺍﺯ ﺑﺮﺭﺳﻲ ﻣﺪﻝ ﻫﺎﻱ SWAPﻭ Wi-Fiﻻﺯﻡ ﺍﺳﺖ ﮐﻪ ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﺎ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺍﻭﻟﻴﻪ ﺍﻱ
ﮐﻪ ﺩﻭ ﻣﺪ ﻝ ﻓﻮﻕ ﺑﺮ ﺍﺳﺎﺱ ﺁﻧﻬﺎ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﻧﺪ ،ﺑﻴﺸﺘﺮ ﺁﺷﻨﺎ ﺷﻮﻳﻢ .ﺍﻭﻟﻴﻦ ﻣﺸﺨﺼﺎﺕ ﺷﺒﮑﻪ
ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﺑﺪﻭ ﻥ ﮐﺎﺑﻞ ﺑﺎ ﻧﺎﻡ IEEE 802.11ﺗﻮﺳﻂ ﻣﻮﺳﺴﻪ IEEEﻋﺮﺿﻪ ﮔﺮﺩﻳﺪ .ﺩﺭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻓﻮﻕ ﺩﻭ ﺭﻭﺵ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺩﺳﺘﮕﺎﻫﻬﺎ ﺑﺎ ﺳﺮﻋﺖ ﺩﻭ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ
ﻣﻄﺮﺡ ﺷﺪ .ﺩﻭ ﺭﻭﺵ ﻓﻮﻕ ﺑﺸﺮﺡ ﺯﻳﺮ ﻣﻲ ﺑﺎﺷﻨﺪ: •
(spectrum Direct-sequence spread(DSSS
•
(spectrum Frequency-hopping spread(FHSS
ﺩﻭ ﺭﻭﺵ ﻓﻮﻕ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ (Frequency-shift keying(FSKﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ. ﻫﻤﭽﻨﻴﻦ ﺩﻭ ﺭﻭﺵ ﻓﻮﻕ ﺍﺯ ﺍﻣﻮﺍﺝ ﺭﺍﺩﻳﻮﺋﻲ Spread-spectrumﺩﺭ ﻣﺤﺪﻭﺩﻩ ٢ /٤ ﮔﻴﮕﺎﻫﺮﺗﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ. 365
، Spread Spectrumﺑﺪﻳﻦ ﻣﻌﻨﻲ ﺍﺳﺖ ﮐﻪ ﺩﺍﺩﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﺑﻪ ﺑﺨﺶ ﻫﺎﻱ ﮐﻮﭼﮑﺘﺮ ﺗﻘﺴﻴﻢ ﻭ ﻫﺮ ﻳﮏ ﺍﺯ ﺁﻧﻬﺎ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺮﮐﺎﻧﺲ ﻫﺎﻱ ﮔﺴﺴﺘﻪ ﻗﺎﺑﻞ ﺩﺳﺘﻴﺎﺑﻲ ﺩﺭ ﻫﺮ
ﺯﻣﺎﻥ ،ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﺩﺳﺘﮕﺎﻫﻬﺎﺋﻲ ﮐﻪ ﺍﺯ DSSSﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﻫﺮ ﺑﺎﻳﺖ ﺩﺍﺩﻩ ﺭﺍ ﺑﻪ ﭼﻨﺪﻳﻦ ﺑﺨﺶ ﻣﺠﺰﺍ ﺗﻘﺴﻴﻢ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺑﺼﻮﺭﺕ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺮﮐﺎﻧﺲ ﻫﺎﻱ
ﻣﺘﻔﺎﻭﺕ ،ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﻧﺪ.
DSSSﺍﺯ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺑﺴﻴﺎﺭ ﺑﺎﻻﺋﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ ) ﺗﻘﺮﻳﺒﺎ" ٢٢ﻣﮕﺎﻫﺮﺗﺰ( ﺩﺳﺘﮕﺎﻫﻬﺎﺋﻲ ﮐﻪ ﺍﺯ FHSSﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﺩﺭﻳﮏ ﺯﻣﺎﻥ ﭘﻴﻮﺳﺘﻪ ﮐﻮﺗﺎﻩ ،ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﮐﺮﺩﻩ ﻭ
ﺑﺎ ﺷﻴﻔﺖ ﺩﺍﺩﻥ ﻓﺮﮐﺎﻧﺲ ) (hopﺑﺨﺶ ﺩﻳﮕﺮﻱ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ FHSSﮐﻪ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻣﺮﺗﺒﻂ ﻣﻲ ﮔﺮﺩﻧﺪ ،ﺑﺮ ﺍﺳﺎﺱ ﻓﺮﮐﺎﻧﺲ ﻣﺮﺑﻮﻃﻪ ﺍﻱ ﮐﻪ ﻣﻲ ﺑﺎﻳﺴﺖ Hopﻧﻤﺎﻳﻨﺪ ﻭ ﺍﺯ ﻫﺮ ﻓﺮﮐﺎﻧﺲ ﺩﺭ ﻳﮏ ﺑﺎﺯﻩ ﺯﻣﺎﻧﻲ ﺑﺴﻴﺎﺭ ﮐﻮﺗﺎﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ)ﺣﺪﻭﺩﺍ" ٤٠٠ﻣﻴﻠﻲ ﺛﺎﻧﻴﻪ( ،ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﭼﻨﺪﻳﻦ ﺷﺒﮑﻪ FHSSﺩﺭ ﻳﮏ ﻣﺤﻴﻂ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ)ﺑﺪﻭﻥ ﺍﺛﺮﺍﺕ ﺟﺎﻧﺒﻲ( .ﺩﺳﺘﮕﺎﻫﻬﺎﻱ FHSSﺻﺮﻓﺎ" ﺩﺍﺭﺍﻱ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻳﮏ ﻣﮕﺎﻫﺮﺗﺰ ﻭ ﻳﺎ ﮐﻤﺘﺮ ﻣﻲ ﺑﺎﺷﻨﺪ. HomeRFﻭ SWAP ، HomeRFﺍﺗﺤﺎﺩﻳﻪ ﺍﻱ ﺍﺳﺖ ﮐﻪ ﺍﺳﺘﺎﻧﺪﺍﺭﻱ ﺑﺎ ﻧﺎﻡ Shared Wireless (SWAP
(Access protocolﺭﺍ ﺍﻳﺠﺎﺩ ﻧﻤﻮﺩﻩ ﺍﺳﺖ SWAP .ﺩﺍﺭﺍﻱ ﺷﺶ ﮐﺎﻧﺎﻝ ﺻﻮﺗﻲ ﻣﺘﻔﺎﻭﺕ ﺑﺮ ﺍﺳﺎﺱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ DECTﻭ ٨٠٢,١١ﺍﺳﺖ .ﺩﺳﺘﮕﺎﻫﻬﺎﻱ SWAPﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ hop ٥٠ ﺍﻳﺠﺎﺩ ﻭ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﻳﮏ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺑﺮﺧﻲ ﺍﺯ ﻣﺪﻝ ﻫﺎ ﻣﻴﺰﺍﻥ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺗﺎ ﺩﻭ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﻫﻢ ﻣﻲ ﺭﺳﺪ ، .ﺗﻮﺍﻧﺎﺋﻲ ﻓﻮﻕ ﺍﺭﺗﺒﺎﻁ ﻣﺴﺘﻘﻴﻢ ﺑﻪ ﺗﻌﺪﺍﺩ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻣﺠﻴﻂ ﻋﻤﻠﻴﺎﺗﻲ ﺩﺍﺭﺩ .ﻣﺰﺍﻳﺎﻱ SWAPﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ: •
ﻗﻴﻤﺖ ﻣﻨﺎﺳﺐ
•
ﻧﺼﺐ ﺁﺳﺎﻥ
•
ﺑﻪ ﮐﺎﺑﻞ ﻫﺎﻱ ﺍﺿﺎﻓﻪ ﻧﻴﺎﺯ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ 366
•
ﺩﺍﺭﺍﻱ Access pointﻧﻴﺴﺖ
•
ﺩﺍﺭﺍﻱ ﺷﺶ ﮐﺎﻧﺎﻝ ﺻﻮﺗﻲ ﺩﻭ ﻃﺮﻓﻪ ﻭ ﻳﮏ ﮐﺎﻧﺎﻝ ﺩﺍﺩﻩ ﺍﺳﺖ
•
ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ١٢٧ﺩﺳﺘﮕﺎﻩ ﺩﺭ ﻫﺮ ﺷﺒﮑﻪ ﻭﺟﻮﺩ ﺩﺍﺭﺩ.
•
ﺍﻣﮑﺎﻥ ﺩﺍﺷﺘﻦ ﭼﻨﺪﻳﻦ ﺷﺒﮑﻪ ﺩﺭ ﻳﮏ ﻣﺤﻞ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ.
•
ﺍﻣﮑﺎﻥ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﻤﻦ ﺳﺎﺯﻱ ﺩﺍﺩﻩ ﻫﺎ ﻭﺟﻮﺩ ﺩﺍﺭﺩ.
ﺑﺮﺧﻲ ﺍﺯ ﺍﺷﮑﺎﻻﺕ SWAPﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ: •
ﺩﺍﺭﺍﻱ ﺳﺮﻋﺖ ﺑﺎﻻ ﻧﻴﺴﺖ )ﺩﺭ ﺣﺎﻟﺖ ﻋﺎﺩﻱ ﻳﮏ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ(
•
ﺩﺍﺭﺍﻱ ﺩﺍﻣﻨﻪ ﻣﺤﺪﻭﺩﻱ ﺍﺳﺖ ) ٧٥ﺗﺎ ١٢٥ﻓﻮﺕ ٢٣ /ﺗﺎ ٣٨ﻣﺘﺮ(
•
ﺑﺎ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ FHSSﺳﺎﺯﮔﺎﺭ ﻧﻴﺴﺖ.
•
ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺩﺍﺭﺍﻱ ﻓﻠﺰ ﻭ ﻳﺎ ﻭﺟﻮﺩ ﺩﻳﻮﺍﺭ ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﺎﻋﺚ ﺍﻓﺖ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺷﻮﺩ.
•
ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﺑﻠﻲ ﻣﺸﮑﻞ ﺍﺳﺖ.
ﺗﺮﺍﺗﺴﻴﻮﺭ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﻭﺍﻗﻌﻲ ﺑﻬﻤﺮﺍﻩ ﻳﮏ ﺁﻧﺘﻦ ﮐﻮﭼﮏ ﺩﺭ ﻳﮏ ﮐﺎﺭﺕ PCI , ISAﻭ ﻳﺎ PCMCIAﺍﻳﺠﺎﺩ) ﺳﺎﺧﺘﻪ ( ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﺯ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ Laptopﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ ،ﮐﺎﺭﺕ PCMCIAﺑﺼﻮﺭﺕ ﻣﺴﺘﻘﻴﻢ ﺑﻪ ﻳﮑﻲ ﺍﺯ ﺍﺳﻼﺕ ﻫﺎﻱ PCMCIAﻣﺘﺼﻞ
ﺧﻮﺍﻫﺪ ﺷﺪ .ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺷﺨﺼﻲ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﻳﮏ ﮐﺎﺭﺕ ﺍﺧﺘﺼﺎﺻﻲ ، ISAﮐﺎﺭﺕ
HomeRF PCIﻭ ﻳﺎ ﻳﮏ ﮐﺎﺭﺕ PCMCIAﺑﻬﻤﺮﺍﻩ ﻳﮏ ﺁﺩﺍﭘﺘﻮﺭ ﻣﺨﺼﻮﺹ ،ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺿﺮﻭﺭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮐﺎﺭﺕ ﻫﺎﻱ ﺍﺧﺘﺼﺎﺻﻲ ،ﺻﺮﻓﺎ" ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺭﺍ ﻣﻲ ﺗﻮﺍﻥ
ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ SWAPﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ .ﭼﺎﭘﮕﺮﻫﺎ ﻭ ﺳﺎﻳﺮ ﻭﺳﺎﺋﻞ ﺟﺎﻧﺒﻲ ﻣﻲ ﺑﺎﻳﺴﺖ ﻣﺴﺘﻘﻴﻤﺎ"
ﺑﻪ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺘﺼﻞ ﻭ ﺗﻮﺳﻂ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﮏ ﻣﻨﺒﻊ ﺍﺷﺘﺮﺍﮐﻲ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ. ﺍﮐﺜﺮ ﺷﺒﮑﻪ ﻫﺎﻱ SWAPﺑﺼﻮﺭﺕ "ﻧﻈﻴﺮ ﺑﻪ ﻧﻈﻴﺮ" ﻣﻲ ﺑﺎﺷﻨﺪ .ﺑﺮﺧﻲ ﺍﺯ ﺗﻮﻟﻴﺪﮐﻨﻨﺪﮔﺎﻥ ﺍﺧﻴﺮﺍ"
ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻓﺰﺍﻳﺶ ﺩﺍﻣﻨﻪ ﺗﺎﺛﻴﺮ ﭘﺬﻳﺮﻱ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ Access point ،ﻫﺎﺋﻲ ﺭﺍ ﺑﻪ ﺑﺎﺯﺍﺭ ﻋﺮﺿﻪ ﻧﻤﻮﺩﻩ ﺍﻧﺪ .ﺷﺒﮑﻪ ﻫﺎﻱ HomeRfﻧﺴﺒﺖ ﺑﻪ ﺳﺎﻳﺮ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ، ﺩﺍﺭﺍﻱ ﻗﻴﻤﺖ ﻣﻨﺎﺳﺐ ﺗﺮﻱ ﻣﻲ ﺑﺎﺷﻨﺪ. 367
WECAﻭ Wi-Fi
(Alliance Wireless Ethernet Compatibility(WECAﺭﻭﻳﮑﺮﺩ ﺟﺪﻳﺪﻱ ﺭﺍ ﻧﺴﺒﺖ ﺑﻪ HomeRFﺍﺭﺍﺋﻪ ﻧﻤﻮﺩﻩ ﺍﺳﺖ ، Wi-Fi .ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻱ ﺍﺳﺖ ﮐﻪ ﺑﻪ ﺗﻤﺎﻡ ﺗﻮﻟﻴﺪﮐﻨﻨﺪﮔﺎﻥ ﺑﺮﺍﻱ ﺗﻮﻟﻴﺪ ﻣﺤﺼﻮﻻﺕ ﻣﺒﺘﻲ ﺑﺮ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ٨٠٢,١١ IEEEﺗﺎﮐﻴﺪ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﻣﺸﺨﺼﺎﺕ ﻓﻮﻕ FHSSﺭﺍ ﺣﺬﻑ ﻭ ﺗﺎﮐﻴﺪ ﺑﺮ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ DSSSﺩﺍﺭﺩ ) .ﺑﺪﻟﻴﻞ ﻇﺮﻓﻴﺖ ﺑﺎﻻ ﺩﺭ ﻧﺮﺥ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ( .ﺑﺮ ﺍﺳﺎﺱ ، IEEE 802.11bﻫﺮ ﺩﺳﺘﮕﺎﻩ ﻗﺎﺩﺭ ﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ
ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﺮﻋﺖ ﻳﺎﺯﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺍﺳﺖ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺳﺮﻋﺖ ﻓﻮﻕ ﭘﺎﺳﺨﮕﻮ ﻧﺒﺎﺷﺪ
،ﺑﺘﺪﺭﻳﺞ ﺳﺮﻋﺖ ﺑﻪ ٥/٥ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ،ﺩﻭ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﻭ ﻧﻬﺎﻳﺘﺎ" ﺑﻪ ﻳﮏ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺗﻨﺰﻝ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺷﺒﮑﻪ ﺍﺯ ﺻﻼﺑﺖ ﻭ ﺍﻋﺘﻤﺎﺩ ﺑﻴﺸﺘﺮﻱ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
ﻣﺰﺍﻳﺎﻱ Wi-Fiﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ : •
ﺳﺮﻋﺖ ﺑﺎﻻ )ﻳﺎﺯﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ(
•
ﻗﺎﺑﻞ ﺍﻋﺘﻤﺎﺩ
•
ﺩﺍﺭﺍﻱ ﺩﺍﻣﻨﻪ ﺑﺎﻻﺋﻲ ﻣﻲ ﺑﺎﺷﻨﺪ ) ١,٠٠٠ﻓﻮﺕ ﻳﺎ ٣٠٥ﻣﺘﺮ ﺩﺭ ﻗﻀﺎﻱ ﺑﺎﺯ ﻭ ٢٥٠ﺗﺎ ٤٠٠ ﻓﻮﺕ ٧٦ /ﺗﺎ ١٢٢ﻣﺘﺮ ﺩﺭ ﻓﻀﺎﻱ ﺑﺴﺘﻪ(
•
ﺑﺎ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﺑﻠﻲ ﺑﺴﺎﺩﮔﻲ ﺗﺮﮐﻴﺐ ﻣﻲ ﮔﺮﺩ.
•
ﺑﺎ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ) DSSS 802.11ﺍﻭﻟﻴﻪ ( ﺳﺎﺯﮔﺎﺭ ﺍﺳﺖ.
ﺑﺮﺧﻲ ﺍﺯ ﺍﺷﮑﺎﻻﺕ Wi-Fiﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ: •
ﮔﺮﺍﻥ ﻗﻴﻤﺖ ﻣﻲ ﺑﺎﺷﻨﺪ.
•
ﭘﻴﮑﺮﺑﻨﺪﻱ ﻭ ﺗﻨﻈﻴﻤﺎﺕ ﺁﻥ ﻣﺸﮑﻞ ﺍﺳﺖ.
•
ﻧﻮﺳﺎﻧﺎﺕ ﺳﺮﻋﺖ ﺯﻳﺎﺩ ﺍﺳﺖ.
Wi-Fiﺳﺮﻋﺖ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﺭﺍ ﺑﺪﻭﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮐﺎﺑﻞ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻗﺮﺍﺭ ﻣﻲ ﺩﻫﺪ .ﮐﺎﺭﺕ ﻫﺎﻱ ﺳﺎﺯﮔﺎﺭ ﺑﺎ Wi-Fiﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ " ﻧﻈﻴﺮ ﺑﻪ ﻧﻈﻴﺮ " ﻭﺟﻮﺩ ﺩﺍﺭﺩ ،ﻭﻟﻲ
ﻣﻌﻤﻮﻻ" Wi-Fiﺑﻪ Access Pointﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﺍﻏﻠﺐ Access pointﻫﺎ 368
ﺩﺍﺭﺍﻱ ﻳﮏ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﺑﻪ ﻳﮏ ﺷﺒﮑﻪ ﮐﺎﺑﻠﻲ ﺍﺗﺮﻧﺖ ﻧﻴﺰ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺍﮐﺜﺮ
ﺗﺮﺍﻧﺴﻴﻮﺭﻫﺎﻱ Wi-Fiﺑﺼﻮﺭﺕ ﮐﺎﺭﺕ ﻫﺎﻱ PCMCIAﻋﺮﺿﻪ ﺷﺪﻩ ﺍﻧﺪ .ﺑﺮﺧﻲ ﺍﺯ ﺗﻮﻟﻴﺪﮐﻨﻨﺪﮔﺎﻥ ﮐﺎﺭﺕ ﻫﺎﻱ PCIﻭ ﻳﺎ ISAﺭﺍ ﻧﻴﺰ ﻋﺮﺿﻪ ﻧﻤﻮﺩﻩ ﺍﻧﺪ.
369
ﺍﻧﻮﺍﻉ ﺷﺒﮑﻪ ﻫﺎﻱ Wireless ﺍﻣﺮﻭﺯﻩ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ) ( Wirelessﺩﺭ ﺍﺑﻌﺎﺩ ﻣﺘﻔﺎﻭﺕ ﻭ ﺑﺎ ﺍﻫﺪﺍﻑ ﻣﺨﺘﻠﻒ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺑﺮﻗﺮﺍﺭﻱ ﻳﮏ ﺗﻤﺎﺱ ﺍﺯ ﻃﺮﻳﻖ ﺩﺳﺘﮕﺎﻩ ﻣﻮﺑﺎﻳﻞ ،ﺩﺭﻳﺎﻓﺖ ﻳﮏ ﭘﻴﺎﻡ ﺑﺮ ﺭﻭﻱ ﺩﺳﺘﮕﺎﻩ pagerﻭ ﺩﺭﻳﺎﻓﺖ ﻧﺎﻣﻪ ﻫﺎﻱ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﺩﺳﺘﮕﺎﻩ ،PDA
ﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﺍﺯ ﮐﺎﺭﺑﺮﺩ ﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺗﻤﺎﻣﻲ ﻣﻮﺍﺭﺩ ﻓﻮﻕ ،ﺩﺍﺩﻩ ﻭ ﻳﺎ ﺻﻮﺕ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﺷﺒﮑﻪ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ﻗﺮﺍﺭ ﻣﻲ ﮔﻴﺮﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻳﮏ ﮐﺎﺭﺑﺮ ،ﺑﺮﻧﺎﻣﻪ ﻭ ﻳﺎ ﺳﺎﺯﻣﺎﻥ ﺗﻤﺎﻳﻞ ﺑﻪ ﺍﻳﺠﺎﺩ ﭘﺘﺎﺳﻴﻞ ﻗﺎﺑﻠﻴـﺖ ﺣﻤﻞ ﺩﺍﺩﻩ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ،ﻣﻲ ﺗﻮﺍﻧﺪ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﺪ .ﻳﮏ ﺷﺒﮑﻪ ﺑﺪﻭﻥ ﮐﺎﺑﻞ
ﻋﻼﻭﻩ ﺑﺮ ﺻﺮﻓﻪ ﺟﻮﺋﻲ ﺩﺭ ﺯﻣﺎﻥ ﻭ ﻫﺰﻳﻨﻪ ﮐﺎﺑﻞ ﮐﺸﻲ ،ﺍﻣﮑﺎﻥ ﺑﺮﻭﺯ ﻣﺴﺎﺋﻞ ﻣﺮﺗﺒﻂ ﺑﺎ ﻳﮏ ﺷﺒﮑﻪ ﮐﺎﺑﻠﻲ ﺭﺍ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ. ﺍﺯ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﻣﻲ ﺗﻮﺍﻥ ﺩﺭ ﻣﮑﺎﻥ ﻋﻤﻮﻣﻲ ،ﮐﺘﺎﺑﺨﺎﻧﻪ ﻫﺎ ،ﻫﺘﻞ ﻫﺎ ،ﺭﺳﺘﻮﺭﺍﻥ ﻫﺎ ﻭ
ﻣﺪﺍﺭﺱ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﺩﺭ ﺗﻤﺎﻣﻲ ﻣﮑﺎﻥ ﻫﺎﻱ ﻓﻮﻕ ،ﻣﻲ ﺗﻮﺍﻥ ﺍﻣﮑﺎﻥ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﻧﻴﺰ ﻓﺮﺍﻫﻢ ﻧﻤﻮﺩ .ﻳﮑﻲ ﺍﺯ ﭼﺎﻟﺶ ﻫﺎﻱ ﺍﺻﻠﻲ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ،ﺑﻪ ﮐﻴﻔﻴﺖ ﺳﺮﻭﻳﺲ ) ( QoSﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺑﺮﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺑﻪ ﻫﺮ ﺩﻟﻴﻠﻲ ﺑﺮ ﺭﻭﻱ ﺧﻂ ﭘﺎﺭﺍﺯﻳﺖ ﺍﻳﺠﺎﺩ
ﮔﺮﺩﺩ ،ﻣﻤﮑﻦ ﺍﺳﺖ ﺍﺭﺗﺒﺎﻁ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﻗﻄﻊ ﻭ ﻳﺎ ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻄﻠﻮﺏ ﺍﺯ ﺁﻥ ﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻪ
ﺑﺎﺷﺪ. ﺍﻧﻮﺍﻉ ﺷﺒﮑﻪ ﻫﺎﻱ wireless •
. Wireless Local Area Networks :WLANSﺷﺒﮑﻪ ﻫﺎﻱ
ﻓﻮﻕ ،ﺍﻣﮑﺎﻥ ﺩﺳﺘﻴﺎﺑﻲ ﮐﺎﺭﺑﺮﺍﻥ ﺳﺎﮐﻦ ﺩﺭ ﻳﮏ ﻣﻨﻄﻘﻪ ﻣﺤﺪﻭﺩ ﻧﻈﻴﺮ ﻣﺤﻮﻃﻪ ﻳﮏ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻳﺎ ﮐﺘﺎﺑﺨﺎﻧﻪ ﺭﺍ ﺑﻪ ﺷﺒﮑﻪ ﻭ ﻳﺎ ﺍﻳﻨﺘﺮﻧﺖ ،ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ.
370
•
. Wireless Personal Area Networks :WPANSﺩﺭ ﺷﺒﮑﻪ
ﻫﺎﻱ ﻓﻮﻕ ،ﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺷﺨﺼﻲ )ﻧﻈﻴﺮ ( laptopﺩﺭ ﻳﮏ ﻧﺎﺣﻴﻪ ﻣﺤﺪﻭﺩ )ﺣﺪﻭﺩ ٩١٤ﺳﺎﻧﺘﻲ ﻣﺘﺮ( ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ﺍﺯ ﺩﻭ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻣﺘﺪﺍﻭﻝ ( IR ) Infra Redﻭ ) ، IEEE 802.15 ) Bluetooth
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ. •
. Wireless Metropolitan Area Networks :WMANSﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻓﻮﻕ ،ﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﭼﻨﺪﻳﻦ ﺷﺒﮑﻪ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﻬﺮ ﺑﺰﺭﮒ ﻓﺮﺍﻫﻢ
ﻣﻲ ﮔﺮﺩﺩ .ﺍﺯ ﺷﺒﮑﻪ ﻫﺎﻱ ﻓﻮﻕ ،ﺍﻏﻠﺐ ﺑﻪ ﻋﻨﻮﺍﻥ ﺷﺒﮑﻪ ﻫﺎﻱ backupﮐﺎﺑﻠﻲ )ﻣﺴﻲ ،ﻓﻴﺒﺮ ﻧﻮﺭﻱ( ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
•
. Wireless Wide Area Networks :WWANSﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻓﻮﻕ ،ﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺷﻬﺮﻫﺎ ﻭ ﻳﺎ ﺣﺘﻲ ﮐﺸﻮﺭﻫﺎ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻣﺎﻫﻮﺍﺭﻩ ﺍﻱ ﻣﺘﻔﺎﻭﺕ ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ .ﺷﺒﮑﻪ ﻫﺎﻱ ﻓﻮﻕ ﺑﻪ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ) G٢ﻧﺴﻞ ﺩﻭﻡ(
ﻣﻌﺮﻭﻑ ﺷﺪﻩ ﺍﻧﺪ. ﺍﻣﻨﻴﺖ
ﺑﺮﺍﻱ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺍﻣﻨﻴـﺖ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﺍﺯ ﺳﻪ ﺭﻭﺵ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ: •
. Wired Equivalent Privacy : WEPﺩﺭ ﺭﻭﺵ ﻓﻮﻕ ،ﻫﺪﻑ
ﺗﻮﻗﻒ ﺭﻩ ﮔﻴﺮﻱ ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﻓﺮﮐﺎﻧﺲ ﺭﺍﺩﻳﻮﺋﻲ ﺗﻮﺳﻂ ﮐﺎﺭﺑﺮﺍﻥ ﻏﻴﺮ ﻣﺠﺎﺯ ﺑﻮﺩﻩ ﻭ ﺑﺮﺍﻱ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﻮﭼﮏ ﻣﻨﺎﺳﺐ ﺍﺳﺖ .ﻋﻠﺖ ﺍﻳﻦ ﺍﻣﺮ ﺑﻪ ﻋﺪﻡ ﻭﺟﻮﺩ ﭘﺮﻭﺗﮑﻞ ﺧﺎﺻﻲ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺪﻳﺮﻳﺖ "ﮐﻠﻴﺪ " ﺑﺮ ﻣﻲ ﮔﺮﺩﺩ .ﻫﺮ "ﮐﻠﻴﺪ " ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﺻﻮﺭﺕ ﺩﺳﺘﻲ
ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ﺗﻌﺮﻳﻒ ﮔﺮﺩﺩ .ﺑﺪﻳﻬﻲ ﺍﺳﺖ ﺩﺭ ﺻﻮﺭﺕ ﺑﺰﺭﮒ ﺑﻮﺩﻥ ﺷﺒﮑﻪ، ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ﺍﺯ ﺟﻤﻠﻪ ﻋﻤﻠﻴﺎﺕ ﻭﻗﺖ ﮔﻴﺮ ﺑﺮﺍﻱ ﻫﺮ ﻣﺪﻳﺮ ﺷﺒﮑﻪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ،WEP . ﻣﺒﺘﻨﻲ ﺑﺮ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺭﻣﺰﻧﮕﺎﺭﻱ RC4ﺍﺳﺖ ﮐﻪ ﺗﻮﺳﻂ RSA Data Systemﺍﺭﺍﺋﻪ
ﺷﺪﻩ ﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﺗﻤﺎﻣﻲ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ﻭ Point Aceessﻫﺎ ﺑﮕﻮﻧﻪ ﺍﻱ
371
ﭘﻴﮑﺮﺑﻨﺪﻱ ﻣﻲ ﮔﺮﺩﻧﺪ ﮐﻪ ﺍﺯ ﻳﮏ ﮐﻠﻴﺪ ﻣﺸﺎﺑﻪ ﺑﺮﺍﻱ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻭ ﺭﻣﺰﮔﺸﺎﺋﻲ ﺍﺳﺘﻔﺎﺩﻩ
ﻧﻤﺎﻳﻨﺪ. •
.Service Set Identifier :SSIDﺭﻭﺵ ﻓﻮﻕ ﺑﻪ ﻣﻨﺰﻟﻪ ﻳﮏ "ﺭﻣﺰﻋﺒﻮﺭ"
ﺑﻮﺩﻩ ﮐﻪ ﺍﻣﮑﺎﻥ ﺗﻘﺴﻴﻢ ﻳﮏ ﺷﺒﮑﻪ WLANﺑﻪ ﭼﻨﺪﻳﻦ ﺷﺒﮑﻪ ﻣﺘﻔﺎﻭﺕ ﺩﻳﮕﺮ ﮐﻪ ﻫﺮ ﻳﮏ ﺩﺍﺭﺍﻱ ﻳﮏ ﺷﻨﺎﺳﻪ ﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ ﻣﻲ ﺑﺎﺷﻨﺪ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺷﻨﺎﺳﻪ ﻫﺎﻱ ﻓﻮﻕ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺮﺍﻱ ﻫﺮ access pointﺗﻌﺮﻳﻒ ﮔﺮﺩﻧﺪ .ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺳﺮﻭﻳﺲ
ﮔﻴﺮﻧﺪﻩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻫﺮ ﺷﺒﮑﻪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﮕﻮﻧﻪ ﺍﻱ ﭘﮑﺮﺑﻨﺪﻱ ﮔﺮﺩﺩ ﮐﻪ ﺩﺍﺭﺍﻱ ﺷﻨﺎﺳﻪ SSIDﻣﺮﺑﻮﻁ ﺑﻪ ﺷﺒﮑﻪ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺎﺷﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺷﻨﺎﺳﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺑﺎ ﺷﻨﺎﺳﻪ ﺷﺒﮑﻪ ﻣﻮﺭﺩ ﻧﻈﺮ ﻣﻄﺎﺑﻘﺖ ﻧﻤﺎﻳﺪ ،ﺍﻣﮑﺎﻥ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺷﺒﮑﻪ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ.
•
ﻓﻴﻠﺘﺮﻳﻨﮓ ﺁﺩﺭﺱ ﻫﺎﻱ ) : Control Media Access ) MACﺩﺭ ﺭﻭﺵ ﻓﻮﻕ ،ﻟﻴﺴﺘﻲ ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ MACﻣﺮﺑﻮﻁ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ،ﺑﺮﺍﻱ
ﻳﮏ Point Accessﺗﻌﺮﻳﻒ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ،ﺻﺮﻓﺎ" ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻓﻮﻕ ﺍﻣﮑﺎﻥ ﺩﺳﺘﻴﺎﺑﻲ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺯﻣﺎﻧﻲ ﮐﻪ ﻳﮏ ﮐﺎﻣـــﭙﻴﻮﺗﺮ ﺩﺭﺧﻮﺍﺳﺘﻲ ﺭﺍ ﺍﻳـــــﺠﺎﺩ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺁﺩﺭﺱ MACﺁﻥ ﺑﺎ ﺁﺩﺭﺱ MACﻣﻮﺟﻮﺩ ﺩﺭ Access Point
ﻣﻘﺎﻳﺴﻪ ﺷﺪﻩ ﻭ ﺩﺭ ﺻﻮﺭﺕ ﻣﻄﺎﺑﻘﺖ ﺁﻧﺎﻥ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ،ﺍﻣﮑﺎﻥ ﺩﺳﺘﻴﺎﺑﻲ ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ .ﺍﻳﻦ ﺭﻭﺵ ﺍﺯ ﻟﺤﺎﻅ ﺍﻣﻨﻴﺘﻲ ﺷﺮﺍﻳﻂ ﻣﻨﺎﺳﺒﻲ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﻭﻟﻲ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﮐﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﻫﺮ ﻳﮏ ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ MACﺭﺍ ﺑﺮﺍﻱ ﻫﺮ Access pointﺗﻌﺮﻳﻒ
ﻧﻤﻮﺩ ،ﺯﻣﺎﻥ ﺯﻳﺎﺩﻱ ﺻﺮﻑ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ ﻓﻮﻕ ،ﺻﺮﻓﺎ" ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﻮﭼﮏ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﭘﻴﺸﻨﻬﺎﺩ ﻣﻲ ﮔﺮﺩﺩ.
372
ﭘﻴﮑﺮﺑﻨﺪﯼ ﻳﮏ ﺷﺒﮑﻪ Wireless ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺑﻪ ﻣﻨﻈﻮﺭ ﭘﻴﮑﺮﺑﻨﺪﯼ ﻳﮏ ﺷﺒﮑﻪ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﺑﻪ ﺍﺑﻌﺎﺩ ﺷﺒﮑﻪ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺴﺘﮕﯽ ﺩﺍﺭﺩ .ﻋﻠﻴﺮﻏﻢ ﻣﻮﺿﻮﻉ ﻓﻮﻕ ،ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ﺍﻏﻠﺐ ﻭ ﺷﺎﻳﺪ ﻫﻢ ﻗﻄﻌﺎ" ﺑﻪ ﻳﮏ access pointﻭ ﻳﮏ ﺍﻳﻨﺘﺮﻓﻴﺲ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺩﺭ ﺻﻮﺭﺗﯽ ﮐﻪ ﻗﺼﺪ
ﺍﻳﺠﺎﺩ ﻳﮏ ﺷﺒﮑﻪ ﻣﻮﻗﺖ ﺑﻴﻦ ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ،ﺻﺮﻓﺎ" ﺑﻪ ﺩﻭ ﮐﺎﺭﺕ ﺷﺒــﮑﻪ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﻧﻴﺎﺯ ﺧﻮﺍﻫﻴﺪ ﺩﺍﺷﺖ.
Access Pointﭼﻴﺴﺖ ؟
ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﻓﻮﻕ ،ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﮏ ﭘﻞ ﺍﺭﺗﺒﺎﻃﯽ ﺑﻴﻦ ﺷﺒﮑﻪ ﻫﺎﯼ ﮐﺎﺑﻠﯽ ﻭ ﺩﺳﺘﮕﺎﻫﻬﺎﯼ
ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﻋﻤﻞ ﻣﯽ ﻧﻤﺎﻳﺪ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﻓﻮﻕ ،ﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﭼﻨﺪﻳﻦ ﺩﺳﺘﮕﺎﻩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﯽ ﺑﻪ ﺷﺒﮑﻪ ﻓﺮﺍﻫﻢ ﻣﯽ ﮔﺮﺩﺩ point access.ﻣﯽ ﺗﻮﺍﻧﺪ ﺩﺍﺭﺍﯼ ﻋﻤﻠﮑﺮﺩﯼ
ﻣﺸﺎﺑﻪ ﻳﮏ ﺭﻭﺗﺮ ﻧﻴﺰ ﺑﺎﺷﺪ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﯼ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻣﺤﺪﻭﺩﻩ ﻭﺳﻴﻌﺘﺮﯼ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﻭ ﺩﺍﺩﻩ ﺍﺯ ﻳﮏ point accessﺑﻪ access pointﺩﻳﮕﺮ ﺍﺭﺳﺎﻝ ﻣﯽ ﮔﺮﺩﺩ. ﻳﮏ ﻧﻤﻮﻧﻪ ﺩﺳﺘﮕﺎﻩ access point
ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺑﺪﻭﻥ ﮐﺎﺑﻞ
ﻫﺮ ﻳﮏ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎﯼ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﯼ ﻳﮏ ﺷﺒﮑﻪ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ،ﺑﻪ ﻳﮏ ﮐﺎﺭﺕ ﺷﺒﮑﻪ
ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﻧﻴﺎﺯ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺷﺖ .ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ، Laptopﻋﻤﻮﻣﺎ" ﺩﺍﺭﺍﯼ ﻳﮏ ﺍﺳﻼﺕ PCMCIAﺍﺳﺖ ﮐﻪ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺩﺭﻭﻥ ﺁﻥ ﻗﺮﺍﺭ ﻣﯽ ﮔﻴﺮﺩ .ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﯼ ﺷﺨﺼﯽ ﻧﻴﺰ ﺑﻪ ﻳﮏ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺩﺍﺧﻠﯽ ﮐﻪ ﻣﻌﻤﻮﻻ" ﺩﺍﺭﺍﯼ ﻳﮏ ﺁﻧﺘﻦ ﮐﻮﭼﮏ ﻭ ﻳﺎ ﺁﻧﺘﻦ ﺧﺎﺭﺟﯽ ﺍﺳﺖ ،ﻧﻴﺎﺯ
373
ﺧﻮﺍﻫﻨﺪ ﺩﺍﺷﺖ .ﺁﻧﺘﻦ ﻫﺎﯼ ﻓﻮﻕ ﺑﺮ ﺭﻭﯼ ﺍﻏﻠﺐ ﺩﺳﺘﮕﺎﻫﻬﺎ ،ﺍﺧﺘﻴﺎﺭﯼ ﺑﻮﺩﻩ ﻭ ﺍﻓﺰﺍﻳﺶ ﺳﻴﮕﻨﺎﻝ
ﺑﺮ ﺭﻭﯼ ﮐﺎﺭﺕ ﺭﺍ ﺑﺪﻧﺒﺎﻝ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ.
ﻳﮏ ﻧﻤﻮﻧﻪ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺑﺪﻭﻥ ﮐﺎﺑﻞ
ﭘﻴﮑﺮﺑﻨﺪﯼ ﻳﮏ ﺷﺒﮑﻪ ﺑﺪﻭﻥ ﮐﺎﺑﻞ
ﺑﻪ ﻣﻨﻈﻮﺭ ﭘﻴﮑﺮﺑﻨﺪﯼ ﻳﮏ ﺷﺒﮑﻪ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﺍﺯ ﺩﻭ ﺭﻭﺵ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ: •
ﺭﻭﺵ : Infrastructureﺑﻪ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ hosted ،ﻭ ﻳﺎ
managedﻧﻴﺰ ﮔﻔﺘﻪ ﻣﯽ ﺷﻮﺩ .ﺩﺭ ﺍﻳﻦ ﺭﻭﺵ ﺍﺯ ﻳﮏ ﻭ ﻳﺎ ﭼﻨﺪﻳﻦ access ) pointﻣﻮﺳﻮﻡ ﺑﻪ gatewayﻭ ﻳﺎ ﺭﻭﺗﺮﻫﺎﯼ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ( ﮐﻪ ﺑﻪ ﻳﮏ ﺷﺒﮑﻪ ﻣﻮﺟﻮﺩ ﻣﺘﺼﻞ ﻣﯽ ﮔﺮﺩﻧﺪ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﺷﻮﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺩﺳﺘﮕﺎﻫﻬﺎﯼ ﺑﺪﻭﻥ ﮐﺎﺑﻞ، ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻨﺎﺑﻊ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﯼ ﺷﺒﮑﻪ ﻧﻈﻴﺮ ﭼﺎﭘﮕﺮ ﻭ ﻳﺎ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﺑﺪﺳﺖ
ﻣﯽ ﺁﻭﺭﻧﺪ. •
ﺭﻭﺵ : Ad-Hocﺑﻪ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ unmanaged ،ﻭ ﻳﺎ peer to
peerﻧﻴﺰ ﮔﻔﺘﻪ ﻣﯽ ﺷﻮﺩ .ﺩﺭ ﺭﻭﺵ ﻓﻮﻕ ﻫﺮ ﻳﮏ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎ ﻣﺴﺘﻘﻴﻤﺎ" ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﯽ ﮔﺮﺩﻧﺪ.ﻣﺜﻼ" ﻳﮏ ﺷﺨﺺ ﺑﺎ ﺩﺍﺭﺍ ﺑﻮﺩﻥ ﻳﮏ ﺩﺳﺘﮕﺎﻩ ﮐﺎﻣﭙﻴﻮﺗﺮ laptop ﻣﺴﺘﻘﺮ ﺩﺭ ﻣﺤﻮﻃﻪ ﻣﻨﺰﻝ ﺧﻮﺩ ﻣﯽ ﺗﻮﺍﺗﻨﺪ ﺑﺎ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﺨﺼﯽ ﻣﻮﺟﻮﺩ ﺩﺭ ﻣﻨﺰﻝ ﺧﻮﺩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﯽ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ،ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻧﻤﺎﻳﺪ.
374
ﭘﺲ ﺍﺯ ﺗﻬﻴﻪ ﺗﺠﻬﻴﺰﺍﺕ ﺳﺨﺖ ﺍﻓﺰﺍﺭﯼ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﻳﮏ ﺷﺒﮑﻪ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ،ﺩﺭ ﺍﺩﺍﻣﻪ ﻣﯽ ﺑﺎﻳﺴﺖ ﺗﻤﺎﻣﯽ ﺗﺠﻬﻴﺰﺍﺕ ﺗﻬﻴﻪ ﺷﺪﻩ ﺭﺍ ﺑﺎ ﻫﺪﻑ ﺍﻳﺠﺎﺩ ﻭ ﺳﺎﺯﻣﺎﻧﺪﻫﯽ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ
ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﺗﺎ ﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺁﻧﺎﻥ ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ .ﻗﺒﻞ ﺍﺯ ﻧﺼﺐ ﻭ ﭘﻴﮑﺮﺑﻨﺪﯼ ﻳﮏ ﺷﺒﮑﻪ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ،ﻻﺯﻡ ﺍﺳﺖ ﺑﻪ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﺩﻗﺖ ﻧﻤﺎﺋﻴﺪ: •
ﺗﻬﻴﻪ ﺩﺭﺍﻳﻮﺭﻫﺎﯼ ﻣﺮﺑﻮﻃﻪ ﺍﺯ ﻓﺮﻭﺷﻨﺪﻩ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﻭ ﮐﺴﺐ ﺁﺧﺮﻳﻦ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ
ﻧﻴﺎﺯ •
ﻓﺎﺻﻠﻪ ﺑﻴﻦ ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﯽ ﺑﺎﻳﺴﺖ ﮐﻤﺘﺮ ﺍﺯ ﻳﮑﺼﺪ ﻣﺘﺮ ﺑﺎﺷﺪ.
•
ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﯼ ﻣﻮﺟﻮﺩ ﻣﯽ ﺑﺎﻳﺴﺖ ﺑﺮ ﺭﻭﯼ ﻳﮏ ﻃﺒﻘﻪ ﻣﺸﺎﺑﻪ ﺑﺎﺷﻨﺪ.
•
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﺠﻬﻴﺰﺍﺕ ﺳﺨﺖ ﺍﻓﺰﺍﺭﯼ ﻣﺮﺑﻮﻁ ﺑﻪ ﻳﮏ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ ،ﺩﺍﺭﺍﯼ ﻣﺰﺍﻳﺎ ﻭ ﻣﻌﺎﻳﺒﯽ ﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﭘﻴﺸﻨﻬﺎﺩ ﻣﯽ ﮔﺮﺩﺩ ﻟﻴﺴﺘﯽ ﺍﺯ ﻭﻳﮋﮔﯽ ﻫﺎﯼ ﻫﺮ ﻳﮏ ﺍﺯ
ﺳﺨﺖ ﺍﻓﺰﺍﺭﻫﺎﯼ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﻋﺮﺿﻪ ﺷﺪﻩ ﺗﻮﺳﻂ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ ﻣﺘﻌﺪﺩ ﺗﻬﻴﻪ ﺷﻮﺩ ﺗﺎ ﺍﻣﮑﺎﻥ ﻣﻘﺎﻳﺴﻪ ﻭ ﺍﺧﺬ ﺗﺼﻤﻴﻢ ﻣﻨﺎﺳﺐ ،ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ.
ﻣﺮﺍﺣﻞ ﻻﺯﻡ ﺑﻪ ﻣﻨﻈﻮﺭ ﻧﺼﺐ ﻳﮏ ﺷﺒﮑﻪ ) ﻓﺮﺿﻴﺎﺕ :ﻣﺎ ﺩﺍﺭﺍﯼ ﻳﮏ ﺷﺒﮑﻪ ﮐﺎﺑﻠﯽ ﻣﻮﺟﻮﺩ
ﻫﺴﺘﻴﻢ ﻭ ﻗﺼﺪ ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﻳﮏ ﺷﺒﮑﻪ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺩﺳﺘﮕﺎﻫﻬﺎﯼ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﺑﻪ ﺁﻥ ﺭﺍ ﺩﺍﺭﻳﻢ (: •
ﺍﺗﺼﺎﻝ point accessﺑﻪ ﺑﺮﻕ ﻭ ﺳﻮﮐﺖ ﻣﺮﺑﻮﻁ ﺑﻪ ﺷﺒﮑﻪ ﺍﺗﺮﻧﺖ
•
ﭘﻴﮑﺮﺑﻨﺪﯼ ) access pointﻣﻌﻤﻮﻻ" ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﻣﺮﻭﺭﮔﺮ ﻭﺏ ( ﺗﺎ ﺍﻣﮑﺎﻥ ﻣﺸﺎﻫﺪﻩ ﺁﻥ ﺗﻮﺳﻂ ﺷﺒﮑﻪ ﻣﻮﺟﻮﺩ ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ .ﻧﺤﻮﻩ ﭘﻴﮑﺮﺑﻨﺪﯼ point access ﺑﺴﺘﮕﯽ ﺑﻪ ﻧﻮﻉ ﺁﻥ ﺩﺍﺭﺩ.
•
ﭘﻴﮑﺮﺑﻨﺪﯼ ﻣﻨﺎﺳﺐ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﯼ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ access ) pointﺩﺭ ﺻﻮﺭﺗﯽ ﮐﻪ ﺗﻤﺎﻣﯽ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻫﺎﯼ ﺷﺒﮑﻪ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﺍﺯ ﻳﮏ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ ﺗﻬﻴﻪ ﺷﺪﻩ ﺑﺎﺷﻨﺪ ،ﻋﻤﻮﻣﺎ" ﺑﺎ ﺗﻨﻈﻴﻤﺎﺕ ﭘﻴﺶ ﻓﺮﺽ ﻫﻢ ﻣﯽ ﺗﻮﺍﻥ ﺷﺒﮑﻪ ﺭﺍ ﻓﻌﺎﻝ ﻧﻤﻮﺩ .ﺑﻪ ﻫﺮ ﺣﺎﻝ ﭘﻴﺸﻨﻬﺎﺩ ﻣﯽ ﮔﺮﺩﺩ ﻫﻤﻮﺍﺭﻩ ﺑﻪ ﺭﺍﻫﻨﻤﺎﯼ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﺗﻬﻴﻪ ﺷﺪﻩ ﺑﻪ
ﻣﻨﻈﻮﺭ ﭘﻴﮑﺮﺑﻨﺪﯼ ﺑﻬﻴﻨﻪ ﺁﻧﺎﻥ ،ﻣﺮﺍﺟﻌﻪ ﮔﺮﺩﺩ(. 375
ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻭ ﻣﻴﺰﺍﻥ ﺗﺎﺧﻴﺮ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺍﺯ ﺟﻤﻠﻪ ﻭﺍﮊﻩ ﻫﺎﻱ ﻣﺘﺪﺍﻭﻝ ﺩﺭ ﺩﻧﻴﺎﻱ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺳﺖ ﮐﻪ ﺑﻪ
ﻧﺮﺥ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﻩ ﺗﻮﺳﻂ ﻳﮏ ﺍﺗﺼﺎﻝ ﺷﺒﮑﻪ ﻭ ﻳﺎ ﻳﮏ ﺍﻳﻨﺘﺮﻓﻴﺲ ،ﺍﺷﺎﺭﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺍﻳﻦ ﻭﺍﮊﻩ ﺍﺯ
ﺭﺷﺘﻪ ﻣﻬﻨﺪﺳﻲ ﺑﺮﻕ ﺍﻗﺘﺒﺎﺱ ﺷﺪﻩ ﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﺷﺎﺧﻪ ﺍﺯ ﻋﻠﻮﻡ ،ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻧﺸﺎﻥ ﺩﻫﻨﺪﻩ ﻣﺠﻤﻮﻉ ﻓﺎﺻﻠﻪ ﻭ ﻳﺎ ﻣﺤﺪﻭﺩﻩ ﺑﻴﻦ ﺑﺎﻻﺗﺮﻳﻦ ﻭ ﭘﺎﺋﻴﻦ ﺗﺮﻳﻦ ﺳﻴﮕﻨﺎﻝ ﺑﺮ ﺭﻭﻱ ﮐﺎﻧﺎﻝ ﻫﺎﻱ
ﻣﺨﺎﺑﺮﺍﻧﻲ ) ﺑﺎﻧﺪ ( ،ﺍﺳﺖ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺳـﻨﺠﺶ ﺍﻧﺪﺍﺯﻩ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺍﺯ ﻭﺍﺣﺪ " ﺗﻌـــﺪﺍﺩ ﺑﺎﻳﺖ ﺩﺭﺛﺎﻧﻴﻪ " ﻭ ﻳﺎ bpsﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ. ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺗﻨﻬﺎ ﻋﺎﻣﻞ ﺗﻌﻴﻴﻦ ﮐﻨﻨﺪﻩ ﺳﺮﻋﺖ ﻳﮏ ﺷﺒﮑﻪ ﺍﺯ ﺯﺍﻭﻳﻪ ﮐﺎﺭﺑﺮﺍﻥ ﻧﺒﻮﺩﻩ ﻭ ﻳﮑﻲ ﺩﻳﮕﺮ ﺍﺯ ﻋﻨﺎﺻﺮ ﺗﺎﺛﻴﺮﮔﺬﺍﺭ" ،ﻣﻴﺰﺍﻥ ﺗﺎﺧﻴﺮ" ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺍﺳﺖ ﮐﻪ ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺭﺍ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﺍﺟﺮﺍﺀ ﻣﻲ ﮔﺮﺩﻧﺪ ،ﺗﺤﺖ ﺗﺎﺛﻴﺮ ﻗﺮﺍﺭ ﺩﻫﺪ. ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﭼﻴﺴﺖ ؟ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ ﺗﺠﻬﻴﺰﺍﺕ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﺷﺒﮑﻪ ﺩﺭ ﺯﻣﺎﻥ ﺍﺭﺍﺋﻪ ﻣﺤﺼﻮﻻﺕ ﺧﻮﺩ ﺗﺒﻠﻴﻐﺎﺕ
ﺯﻳﺎﺩﻱ ﺭﺍ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ،ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﻨﺪ .ﺍﮐﺜﺮ ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﻧﺴﺒﺖ ﺑﻪ ﻣﻴﺰﺍﻥ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻣﻮﺩﻡ ﺧﻮﺩ ﻭ ﻳﺎ ﺳﺮﻭﻳﺲ ﺍﻳﻨﺘﺮﻧﺖ braodbandﺩﺍﺭﺍﻱ ﺁﮔﺎﻫﻲ ﻻﺯﻡ ﻣﻲ ﺑﺎﺷﻨﺪ .ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ،ﻇﺮﻓﻴﺖ ﺍﺗﺼﺎﻝ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺭﺍ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻩ ﻭ ﺑﺪﻳﻬﻲ ﺍﺳﺖ ﮐﻪ ﻫﺮ ﺍﻧﺪﺍﺯﻩ ﻇﺮﻓﻴﺖ ﻓﻮﻕ ﺑﻴﺸﺘﺮ ﺑﺎﺷﺪ ،ﺍﻣﮑﺎﻥ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻣﻨﺎﺑﻊ ﺷﺒﮑﻪ ﺑﺎ ﺳﺮﻋﺖ ﺑﻴﺸﺘﺮﻱ ﻓﺮﺍﻫﻢ
ﻣﻲ ﮔﺮﺩﺩ .ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ،ﻇﺮﻓﻴﺖ ﺗﺌﻮﺭﻱ ﻭ ﻳﺎ ﻋﻤﻠﻲ ﻳﮏ ﺍﺗﺼﺎﻝ ﺷﺒﮑﻪ ﻭ ﻳﺎ ﻳﮏ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺭﺍ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻩ ﮐﻪ ﺩﺭ ﻋﻤﻞ ﻣﻤﮑﻦ ﺍﺳﺖ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻣﺘﻔﺎﻭﺕ ﺑﺎﺷﻨﺪ .ﻣﺜﻼ" ﻳﮏ ﻣﻮﺩﻡ V.90 ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪﻱ ﻣﻌﺎﺩﻝ kbps ٥٦ﺭﺍ ﺩﺭ ﺣﺎﻟﺖ ﺳﻘﻒ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺣﻤﺎﻳﺖ ﻣﻲ ﻧﻤﺎﻳﺪ ﻭﻟﻲ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺤﺪﻭﺩﻳﺖ ﻫﺎﻱ ﺧﻄﻮﻁ ﺗﻠﻔﻦ ﻭ ﺳﺎﻳﺮ ﻋﻮﺍﻣﻞ ﻣﻮﺟﻮﺩ ،ﻋﻤﻼ" ﺍﻣﮑﺎﻥ ﺭﺳﻴﺪﻥ ﺑﻪ ﻣﺤﺪﻭﺩﻩ ﻓﻮﻕ ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﻳﮏ ﺷﺒﮑﻪ ﺍﺗﺮﻧﺖ ﺳﺮﻳﻊ ﻧﻴﺰ ﺍﺯ ﻟﺤﺎﻅ ﺗﺌﻮﺭﻱ ﻗﺎﺩﺭ ﺑﻪ
376
ﺣﻤﺎﻳﺖ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪﻱ ﻣﻌﺎﺩﻝ Mbps١٠٠ﺍﺳﺖ ،ﻭﻟﻲ ﻋﻤﻼ" ﺍﻳﻦ ﻭﺿﻌﻴﺖ ﺩﺭ ﻋﻤﻞ ﻣﺤﻘﻖ
ﻧﺨﻮﺍﻫﺪ ﺷﺪ ) ﺗﻔﺎﻭﺕ ﻇﺮﻓﻴﺖ ﺗﺌﻮﺭﻱ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺑﺎ ﻇﺮﻓﻴﺖ ﻭﺍﻗﻌﻲ(. ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺑﺎﻻ ﻭ broadband
ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﻭﺍﮊﻩ ﻫﺎﻱ "ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺑﺎﻻ" ﻭ " " braodbandﺑﻪ ﺟﺎﻱ ﻳﮑﺪﻳﮕﺮ
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﻧﺪ .ﮐﺎﺭﺷﻨﺎﺳﺎﻥ ﺷﺒﮑﻪ ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﺍﺯ ﻭﺍﮊﻩ "ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺑﺎﻻ " ﺑﻪ ﻣﻨﻈﻮﺭ
ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﺳﺮﻋﺖ ﺑﺎﻻﻱ ﺍﺗﺼﺎﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﺗﻌﺎﺭﻳﻒ ﻣﺘﻔﺎﻭﺗﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ .ﺍﻳﻦ ﻧﻮﻉ ﺍﺗﺼﺎﻻﺕ ،ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪﻱ ﺑﻴﻦ Kbps٦٤ﺗﺎ kbps٣٠٠ﻭ ﻳﺎ ﺑﻴﺸﺘﺮ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲ ﻧـﻤﺎﻳﻨﺪ .ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺑﺎﻻ ﺑﺎ broadbandﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ. ، broadbandﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﺭﻭﺵ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﻳﮏ ﺍﺭﺗﺒﺎﻁ ﺍﺳﺖ ﺩﺭ
ﺻﻮﺭﺗﻲ ﮐﻪ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ،ﻧﺮﺥ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﻩ ﺍﺯ ﻃﺮﻳﻖ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ. ﺍﻧﺪﺍﺯﻩ ﮔﻴﺮﻱ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺷﺒﮑﻪ
ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺪﺍﺯﻩ ﮔﻴﺮﻱ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺍﺗﺼﺎﻝ ﺷﺒﮑﻪ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺍﺳﺘﻔﺎﺩﻩ
ﻧﻤﻮﺩ .ﺑﺮﺍﻱ ﺍﻧﺪﺍﺯﻩ ﮔﻴﺮﻱ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺤﻠﻲ ) ، ( LANﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎﺋﻲ ﻧﻈﻴﺮ netprefﻭ ، ttcpﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺯﻣﺎﻥ ﺍﺗﺼﺎﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺴﺖ
ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻓﻮﻕ ﺭﺍ ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﻣﺮﺍﺟﻌﻪ ﺑﻪ ﺻﻔﺤﺎﺕ ﻭﺏ ﻋﻤﻮﻣﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﺻﺮﻓﻨﻈﺮ ﺍﺯ ﻧﻮﻉ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﮐﻪ ﺍﺯ ﺁﻥ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺪﺍﺯﻩ ﮔﻴﺮﻱ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ ،ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺩﺍﺭﺍﻱ ﻣﺤﺪﻭﺩﻩ
ﺑﺴﻴﺎﺭ ﻣﺘﻐﻴﺮﻱ ﺍﺳﺖ ﮐﻪ ﺍﻧﺪﺍﺯﻩ ﮔﻴﺮﻱ ﺩﻗﻴﻖ ﺁﻥ ﺍﻣﺮﻱ ﻣﺸﮑﻞ ﺍﺳﺖ. ﺗﺎﺧﻴﺮ
ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪﺻﺮﻓﺎ" ﻳﮑﻲ ﺍﺯ ﻋﻨﺎﺻﺮﺗﺎﺛﻴﺮﮔﺬﺍﺭ ﺩﺭﺳﺮﻋﺖ ﻳﮏ ﺷﺒﮑﻪ ﺍﺳﺖ.
ﺗﺎﺧﻴﺮ) ( Latencyﮐﻪ ﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﻣﻴﺰﺍﻥ ﺗﺎﺧﻴﺮ ﺩﺭ ﭘﺮﺩﺍﺯﺵ ﺩﺍﺩﻩ ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺖ،
ﻳﮑﻲ ﺩﻳﮕﺮ ﺍﺯ ﻋﻨﺎﺻﺮ ﻣﻬﻢ ﺩﺭ ﺍﺭﺯﻳﺎﺑﻲ ﮐﺎﺭﺁﺋﻲ ﻭ ﺳﺮﻋﺖ ﻳﮏ ﺷﺒﮑﻪ ﺍﺳﺖ ﮐﻪ ﺩﺍﺭﺍﻱ ﺍﺭﺗﺒﺎﻃﻲ ﻧﺰﺩﻳﮏ ﺑﺎ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻣﻲ ﺑﺎﺷﺪ .ﺍﺯ ﻟﺤﺎﻅ ﺗﺌﻮﺭﻱ ﺳﻘﻒ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺛﺎﺑﺖ 377
ﺍﺳﺖ .ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻭﺍﻗﻌﻲ ﻣﺘﻐﻴﺮ ﺑﻮﺩﻩ ﻭ ﻣﻲ ﺗﻮﺍﻧﺪ ﻋﺎﻣﻞ ﺑﺮﻭﺯ ﺗﺎﺧﻴﺮ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ
ﮔﺮﺩﺩ .ﻭﺟﻮﺩ ﺗﺎﺧﻴﺮ ﺯﻳﺎﺩ ﺩﺭ ﭘﺮﺩﺍﺯﺵ ﺩﺍﺩﻩ ﺩﺭ ﺷﺒﮑﻪ ﻭ ﺩﺭ ﻳﮏ ﻣﺤﺪﻭﺩﻩ ﺯﻣﺎﻧﻲ ﮐﻮﺗﺎﻩ ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﺎﻋﺚ ﺑﺮﻭﺯ ﻳﮏ ﺑﺤﺮﺍﻥ ﺩﺭ ﺷﺒﮑﻪ ﺷﺪﻩ ﻭ ﭘﻴﺎﻣﺪ ﺁﻥ ﭘﻴﺸﮕﻴﺮﻱ ﺍﺯ ﺣﺮﮐﺖ ﺩﺍﺩﻩ ﺑﺮ ﺭﻭﻱ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﻭ ﮐﺎﻫﺶ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻮﺛﺮ ﺍﺯ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺑﺎﺷﺪ. ﺗﺎﺧﻴﺮ ﻭ ﺳﺮﻭﻳﺲ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺎﻫﻮﺍﺭﻩ ﺍﻱ
ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺎﻫﻮﺍﺭﻩ ﺑﻪ ﺧﻮﺑﻲ ﺗﻔﺎﻭﺕ ﺑﻴﻦ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻭ ﺗﺎﺧﻴﺮ
ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ .ﺍﺭﺗﺒﺎﻃﺎﺕ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﺎﻫﻮﺍﺭﻩ ﺩﺍﺭﺍﻱ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻭ ﺗﺎﺧﻴﺮ ﺑﺎﻻﺋﻲ ﻣﻲ ﺑﺎﺷﻨﺪ. ﻣﺜﻼ" ﺯﻣﺎﻧﻲ ﮐﻪ ﮐﺎﺭﺑﺮﻱ ﺩﺭﺧﻮﺍﺳﺖ ﻳﮏ ﺻﻔﺤﻪ ﻭﺏ ﺭﺍ ﻣﻲ ﻧﻤﺎﺋﻴﺪ ،ﻣﺪﺕ ﺯﻣﺎﻧﻲ ﮐﻪ ﺑﻄﻮﻝ
ﻣﻲ ﺍﻧﺠﺎﻣﺪ ﺗﺎ ﺻﻔﺤﻪ ﺩﺭﺣﺎﻓﻈﻪ ﻣﺴﺘﻘﺮ ﮔﺮﺩﺩ ﺑﺎ ﺍﻳﻦ ﮐﻪ ﮐﻮﺗﺎﻩ ﺑﻨﻈﺮ ﻣﻲ ﺁﻳﺪ ﻭﻟﻲ ﮐﺎﻣﻼ" ﻣﻠﻤﻮﺱ ﺍﺳﺖ .ﺗﺎﺧﻴﺮ ﻓﻮﻕ ﺑﻪ ﺩﻟﻴﻞ ﺗﺎﺧﻴﺮ ﺍﻧﺘﺸﺎﺭ ﺍﺳﺖ .ﻋﻼﻭﻩ ﺑﺮ ﺗﺎﺧﻴﺮ ﺍﻧﺘﺸﺎﺭ ،ﻳﮏ ﺷﺒﮑﻪ ﻣﻤﮑﻦ ﺍﺳﺖ ﺑﺎ ﻧﻮﻉ ﻫﺎﻱ ﺩﻳﮕﺮﻱ ﺍﺯ ﺗﺎﺧﻴﺮ ﻣﻮﺍﺟﻪ ﮔﺮﺩﺩ .ﺗﺎﺧﻴﺮ ﺍﻧﺘﻘﺎﻝ )ﻣﺮﺗﺒﻂ ﺑﺎ ﺧﺼﺎﻳﺺ
ﻓﻴﺰﻳﮑﻲ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ( ﻭ ﺗﺎﺧﻴﺮ ﭘﺮﺩﺍﺯﺵ )ﺍﺭﺳﺎﻝ ﺩﺭﺧﻮﺍﺳﺖ ﺍﺯ ﻃﺮﻳﻖ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ
ﭘﺮﻭﮐﺴﻲ ﻭ ﻳﺎ ﺍﻳﺠﺎﺩ hopsﺑﺮ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ( ﺩﻭ ﻧﻤﻮﻧﻪ ﻣﺘﺪﺍﻭﻝ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻣﻲ ﺑﺎﺷﻨﺪ. ﺍﻧﺪﺍﺯﻩ ﮔﻴﺮﻱ ﺗﺎﺧﻴﺮ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ
ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎﻱ ﺷﺒﮑﻪ ﺍﻱ ﻣﺘﻌﺪﺩﻱ ﻧﻈﻴﺮ pingﻭ tracerouteﻣﻲ ﺗﻮﺍﻥ ﺑﻪ ﻣﻨﻈﻮﺭ
ﺍﻧﺪﺍﺯﻩ ﮔﻴﺮﻱ ﻣﻴﺰﺍﻥ ﺗﺎﺧﻴﺮ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻓﻮﻕ ﻓﺎﺻﻠﻪ ﺯﻣﺎﻧﻲ ﺑﻴﻦ
ﺍﺭﺳﺎﻝ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﻣﺒﺪﺍﺀ ﺑﻪ ﻣﻘﺼﺪ ﻭ ﺑﺮﮔﺸﺖ ﺁﻥ ﺭﺍ ﻣﺤﺎﺳﺒﻪ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺑﻪ ﺯﻣﺎﻥ ﻓﻮﻕ ، round-tripﮔﻔﺘﻪ ﻣﻲ ﺷﻮﺩ round-trip .ﺗﻨﻬﺎ ﺭﻭﺵ ﻣﻮﺟﻮﺩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺸﺨﻴﺺ ﻭ ﻳﺎ ﺑﺪﺳﺖ ﺁﻭﺭﺩﻥ ﻣﻴﺰﺍﻥ ﺗﺎﺧﻴﺮ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﻧﺒﻮﺩﻩ ﻭ ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ
ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ.
378
ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻭ ﺗﺎﺧﻴﺮ ﺩﻭ ﻋﻨﺼﺮ ﺗﺎﺛﻴﺮ ﮔﺬﺍﺭ ﺩﺭ ﮐﺎﺭﺍﺋﻲ ﻳﮏ ﺷﺒﮑﻪ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻣﻌﻤﻮﻻ" ﺍﺯ ﻭﺍﮊﻩ
) QoS ( Quality of Serviceﺑﻪ ﻣﻨﻈﻮﺭ ﻧﺸﺎﻥ ﺩﺍﺩﻥ ﻭﺿﻌﻴﺖ ﮐﺎﺭﺁﺋﻲ ﻳﮏ ﺷﺒﮑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ ﮐﻪ ﺩﺭ ﺁﻥ ﺩﻭ ﺷﺎﺧﺺ ﻣﻬﻢ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻭ ﺗﺎﺧﻴﺮ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﻗﺮﺍﺭ ﻣﻲ ﮔﻴﺮﺩ.
379
ﺍﻧﻮﺍﻉ ﮐﺎﺑﻞ ﺍﻣﺮﻭﺯﻩ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ﻣﺨﺘﻠﻔﻲ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻧﻮﻉ ﻭ ﺳﻴﺴﺘﻢ ﮐﺎﺑﻞ ﮐﺸﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺑﺴﻴﺎﺭ ﺣﺎﺋﺰ ﺍﻫﻤﻴﺖ ﺍﺳﺖ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻗﺼﺪ ﺩﺍﺷﺘﻦ ﺷﺒﮑﻪ ﺍﻱ ﺭﺍ ﺩﺍﺭﻳﻢ ﮐﻪ ﺩﺍﺭﺍﻱ ﺣﺪﺍﻗﻞ ﻣﺸﮑﻼﺕ ﺑﺎﺷﺪ ﻭ ﺑﺘﻮﺍﻧﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻔﻴﺪ ﺍﺯ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ
ﺑﻪ ﺩﺭﺳﺘﻲ ﺧﺪﻣﺎﺕ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﮐﺎﺭﺑﺮﺍﻥ ﻗﺮﺍﺭ ﺩﻫﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﻳﮏ ﺳﻴﺴﺘﻢ ﮐﺎﺑﻠﻴﻨﮓ ﻣﻨﺎﺳﺐ ،ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ .ﺩﺭ ﺯﻣﺎﻥ ﻃﺮﺍﺣﻲ ﻳﮏ ﺷﺒﮑﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺎ ﺭﻋﺎﻳﺖ ﻣﺠﻤﻮﻋﻪ ﻗﻮﺍﻧﻴﻦ ﻣﻮﺟﻮﺩ ﺩﺭ ﺧﺼﻮﺹ ﺳﻴﺴﺘﻢ ﮐﺎﺑﻠﻴﻨﮓ ،ﺷﺒﮑﻪ ﺍﻱ ﺑﺎ ﺣﺪﺍﻗﻞ ﻣﺸﮑﻼﺕ ﺭﺍ ﻃﺮﺍﺣﻲ
ﻧﻤﻮﺩ.ﺑﺎ ﺍﻳﻦ ﮐﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﻧﻴﺰ ﺩﺭ ﺍﺑﻌﺎﺩ ﻭﺳﻴﻌﻲ ﮔﺴﺘﺮﺵ ﻳﺎﻓﺘﻪ ﺍﺳﺖ، ﻭﻟﻲ ﻫﻨﻮﺯ ﺑﻴﺶ ﺍﺯ ٩٥ﺩﺭﺻﺪ ﺳﺎﺯﻣﺎﻥ ﻫﺎ ﻭ ﻣﻮﺳﺴﺎﺕ ﺍﺯ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﺷﺒﮑﻪ ﺍﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﮐﺎﺑﻞ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ. ﺍﻳﺪﻩ ﻫﺎﻱ ﺍﻭﻟﻴﻪ ﺍﻳﺪﻩ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﺻﻮﺭﺕ ﺩﻳﺠﻴﺘﺎﻝ ،ﺗﻔﮑﺮﻱ ﺟﺪﻳﺪ ﺩﺭ ﻋﺼﺮ ﺣﺎﺿﺮ ﻣﺤﺴﻮﺏ
ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭﺳﺎﻝ ١٨٤٤ﻓﺮﺩﻱ ﺑﺎ ﻧﺎﻡ"ﺳﺎﻣﻮﺋﻞ ﻣﻮﺭﺱ" ،ﻳﮏ ﭘﻴﺎﻡ ﺭﺍ ﺍﺯ
Washington D.C
ﺑﻪ Baltimoreﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺧﺘﺮﺍﻉ ﺟﺪﻳﺪ ﺧﻮﺩ )ﺗﻠﮕﺮﺍﻑ( ،ﺍﺭﺳﺎﻝ ﻧﻤﻮﺩ .ﺑﺎ ﺍﻳﻦ ﮐﻪ ﺍﺯ ﺁﻥ ﻣﻮﻗﻊ ﺯﻣﺎﻧﻲ ﺯﻳﺎﺩﻱ ﮔﺬﺷﺘﻪ ﺍﺳﺖ ﻭ ﻣﺎ ﺍﻣﺮﻭﺯﻩ ﺷﺎﻫﺪ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺑﺰﺭﮒ ﻭ ﺩﺭ ﻋﻴﻦ
ﺣﺎﻝ ﭘﻴﭽﻴﺪﻩ ﺍﻱ ﻣﻲ ﺑﺎﺷﻴﻢ ﻭﻟﻲ ﻣﻲ ﺗﻮﺍﻥ ﺍﺩﻋﺎ ﻧﻤﻮﺩ ﮐﻪ ﺍﺻﻮﻝ ﮐﺎﺭ ،ﻫﻤﺎﻥ ﺍﺻﻮﻝ ﻭ ﻣﻔﺎﻫﻴﻢ
ﮔﺬﺷﺘﻪ ﺍﺳﺖ. ﮐﺪﻫﺎﻱ ﻣﻮﺭﺱ ،ﻧﻮﻉ ﺧﺎﺻﻲ ﺍﺯ ﺳﻴﺴﺘﻢ ﺑﺎﻳﻨﺮﻱ ﻣﻲ ﺑﺎﺷﻨﺪ ﮐﻪ ﺍﺯ ﻧﻘﻄﻪ ﻭ ﺧﻂ ﻓﺎﺻﻠﻪ ﺑﺎ
ﺗﺮﮐﻴﺒﺎﺕ ﻣﺘﻔﺎﻭﺕ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺍﺋﻪ ﺣﺮﻭﻑ ﻭ ﺍﻋﺪﺍﺩ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺪﺭﻥ ﺩﺍﺩﻩ ﺍﺯ ﻳﮏ ﻭ ﺻﻔﺮ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺑﺰﮔﺘﺮﻳﻦ ﺗﻔﺎﻭﺕ ﻣﻮﺟﻮﺩ ﺑﻴﻦ ﺳﻴﺴـﺘﻢ ﻫﺎﻱ ﻣﺪﺭﻥ ﻣﺒـــﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﻴﺴﺘــﻢ ﭘﻴﺸــﻨﻬﺎﺩﻱ "ﻣﻮﺭﺱ " ،ﺳﺮﻋـﺖ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋــﺎﺕ ﺩﺭ ﺁﻧﺎﻥ
380
ﺍﺳﺖ.ﺗﻠﮕﺮﺍﻑ ﻫﺎﻱ ﺍﻭﺍﺳﻂ ﻗﺮﻥ ، ١٩ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﭼﻬﺎﺭ ﺗﺎ ﭘﻨﺞ ﻧﻘﻄﻪ ﻭ ﻳﺎ ﺧﻂ ﻓﺎﺻﻠﻪ ﺩﺭ
ﻫﺮ ﺛﺎﻧﻴﻪ ﺑﻮﺩﻧﺪ ،ﺩﺭ ﺣﺎﻟﻲ ﮐﻪ ﻫﻢ ﺍﻳﻨﮏ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺑﺎ ﺳﺮﻋﺘﻲ ﻣﻌﺎﺩﻝ ﻳﮏ ﮔﻴﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ
ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﻲ ﻧﻤﺎﻳﻨﺪ )ﺍﺭﺳﺎﻝ ١،٠٠٠،٠٠٠،٠٠٠ﺻﻔﺮ ﻭ ﻳﺎ ﻳﮏ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ(. ﺗﻠﮕﺮﺍﻑ ﻭ ﺗﻠﻪ ﺗﺎﻳﭗ ﺭﺍﻳﺘﺮ ،ﭘﻴﺸﮕﺎﻡ ﻣﺒﺎﺩﻟﻪ ﺩﺍﺩﻩ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﻃﻲ ﺳﻲ ﻭ ﭘﻨﺞ ﺳﺎﻝ ﺍﺧﻴﺮ ﻫﻤﻪ ﭼﻴﺰ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ﻭ ﻏﻴﺮﻗﺎﺑﻞ ﺗﺼﻮﺭﻱ ﺗﻐﻴﻴﺮ ﻧﻤﻮﺩﻩ ﺍﺳﺖ .ﺿﺮﻭﺭﺕ ﺍﺭﺗﺒﺎﻁ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ
ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻭ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ،ﻣﻬﻤﺘﺮﻳﻦ ﻋﻠﻞ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺗﺠﻬﻴﺰﺍﺕ ﺷﺒﮑﻪ ﺍﻱ ﺳﺮﻳﻊ ،ﮐﺎﺑﻞ ﻫﺎﺋﻲ ﺑﺎ ﻣﺸﺨﺼﺎﺕ ﺑﺎﻻ ﻭ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺍﺭﺗﺒﺎﻃﻲ ﭘﻴﺸﺮﻓﺘﻪ ﺍﺳﺖ. ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﺟﺪﻳﺪ ﺷﺒﮑﻪ
ﺍﺗﺮﻧﺖ ﺩﺭ ﺳﺎﻝ ١٩٧٠ﺗﻮﺳﻂ ﺷﺮﮐﺖ ﺯﻳﺮﺍﮐﺲ ﻭ ﺩﺭ ﻣﺮﮐﺰ ﺗﺤﻘﻴﻘﺎﺕ Palo Altoﺩﺭ
ﮐﺎﻟﻴﻔﺮﻧﻴﺎ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﮔﺮﺩﻳﺪ .ﺩﺭ ﺳﺎﻝ ١٩٧٩ﺷﺮﮐﺖ ﻫﺎﻱ DECﻭ ﺍﻳﻨﺘﻞ ﺑﺎ ﭘﻴﻮﺳﺘﻦ ﺑﻪ ﺯﻳﺮﺍﮐﺲ ،ﺳﻴﺴﺘﻢ ﺍﺗﺮﻧﺖ ﺭﺍ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻋﻤﻮﻡ ،ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻧﻤﻮﺩﻧﺪ .ﺍﻭﻟﻴﻦ ﻣﺸﺨﺼﻪ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺩﺭ ﺳﺎﻝ ١٩٨٠ﺗﻮﺳﻂ ﺳﻪ ﺷﺮﮐﺖ ﻓﻮﻕ ﻭ ﺑﺎ ﻧﺎﻡ Ethernet Blue Book ﺍﺭﺍﺋﻪ ﮔﺮﺩﻳﺪ ) .ﺍﺳﺘﺎﻧﺪﺍﺭﺩ .( DIX
ﺍﺗﺮﻧﺖ ﻳﮏ ﺳﻴﺴﺘﻢ ﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺍﺳﺖ ) ﺩﻩ ﻣﻴﻠﻴﻮﻥ ﺻﻔﺮ ﻭ ﻳﺎ ﻳﮏ ﺩﺭ ﺛﺎﻧﻴﻪ( ﮐﻪ ﺍﺯ ﻳﮏ ﮐﺎﺑﻞ ﮐﻮﺍﮐﺴﻴﺎﻝ ﺑﺰﺭﮒ ﺑﻪ ﻋﻨﻮﺍﻥ ﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ ﻭ ﮐﺎﺑﻞ ﻫﺎﻱ ﮐﻮﺍﮐﺴﻴﺎﻝ ﮐﻮﺗﺎﻩ ﺩﺭ
ﻓﻮﺍﺻﻞ ٢ / ٥ﻣﺘﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﮐﺎﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﮐﺎﺑﻞ ﮐﻮﺍﮐﺴﻴﺎﻟﻲ ﮐﻪ ﺑﻪ ﻋﻨﻮﺍﻥ ﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ Ethernet Thick ،ﻭ ﻳﺎ Basee5١٠ﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ ﮐﻪ ﺩﺭ ﺁﻥ ١٠ﺑﻪ ﺳﺮﻋﺖ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺷﺒﮑﻪ ﺍﺷﺎﺭﻩ ﺩﺍﺷﺘﻪ ) ١٠ﻣﮕﺎﺑﻴﺖ ﺩﺭ
ﺛﺎﻧﻴﻪ ( ﻭ ﻭﺍﮊﻩ Baseﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﺳﻴﺴﺘﻢ Base bandﺍﺳﺖ .ﺩﺭ ﺳﻴﺴﺘﻢ ﻓﻮﻕ ،ﺍﺯ ﺗﻤﺎﻣﻲ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ Broad bandﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻫﻤﺰﻣﺎﻥ ،ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺑﻪ ﮐﺎﻧﺎﻝ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺗﻘﺴﻴﻢ ﻣﻲ ﮔﺮﺩﺩ. ﻋﺪﺩ ٥ﻧﻴﺰ ﺷﮑﻞ ﺧﻼﺻﻪ ﺷﺪﻩ ﺍﻱ ﺑﺮﺍﻱ ﻧﺸﺎﻥ ﺩﺍﺩﻥ ﺣﺪﺍﮐﺜﺮ ﻃﻮﻝ ﮐﺎﺑﻠﻲ ﺍﺳﺖ ﮐﻪ ﻣﻲ ﺗﻮﺍﻥ
ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ ) ﺩﺭ ﺍﻳﻦ ﻣﻮﺭﺩ ﺧﺎﺹ ٥٠٠ﻣﺘﺮ (.
381
ﻣﻮﺳﺴﻪ IEEEﺩﺭ ﺳﺎﻝ ١٩٨٣ﻧﺴﺨﻪ ﺭﺳﻤﻲ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺍﺗﺮﻧﺖ ﺭﺍ ﺑﺎ ﻧﺎﻡ IEEE
802.3ﻭ ﺩﺭ ﺳﺎﻝ ، ١٩٨٥ﻧﺴﺨﻪ ﺷﻤﺎﺭﻩ ﺩﻭ ﺭﺍ ﺑﺎ ﻧﺎﻡ IEEE 802.3aﺍﺭﺍﺋﻪ ﻧﻤﻮﺩ .ﺍﻳﻦ ﻧﺴﺨﻪ ﺑﺎ ﻧﺎﻡ Thin Ethernetﻭ ﻳﺎ Base2١٠ﻣﻌﺮﻭﻑ ﮔﺮﺩﻳﺪ ) .ﺣﺪﺍﮐﺜﺮ ﻃﻮﻝ ﮐﺎﺑﻞ
١٨٥ﻣﺘﺮ ﻣﻲ ﺑﺎﺷﺪ ﻭ ﻋﺪﺩ ٢ﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺍﺳﺖ ﮐﻪ ﻃﻮﻝ ﮐﺎﺑﻞ ﻣﻲ ﺗﻮﺍﻧﺪ ﺗﺎ ﻣﺮﺯ ٢٠٠ﻣﺘﺮ ﻧﻴﺰ ﺑﺮﺳﺪ(
ﺍﺯ ﺳﺎﻝ ١٩٨٣ﺗﺎﮐﻨﻮﻥ ،ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ ﮐﻪ ﻳﮑﻲ ﺍﺯ ﺍﻫﺪﺍﻑ ﻣﻬﻢ ﺁﻧﺎﻥ ،ﺗﺎﻣﻴﻦ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻣﻨﺎﺳﺐ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺖ .ﻣﺎ ﺍﻣﺮﻭﺯﻩ ﺷﺎﻫﺪ ﺭﺳﻴﺪﻥ ﺑﻪ ﻣﺮﺯ ﮔﻴﮕﺎﺑﻴﺖ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﻣﻲ ﺑﺎﺷﻴﻢ.
ﮐﺎﺑﻞ ﻫﺎﻱ )Unshielded Twisted Pair) UTP
ﮐﺎﺑﻞ UTPﻳﮑﻲ ﺍﺯ ﻣﺘﺪﺍﻭﻟـﺘﺮﻳﻦ ﮐﺎﺑﻞ ﻫﺎﻱ ﺍﺳـــﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﺷــﺒﮑﻪ ﻫﺎﻱ ﻣﺨـــﺎﺑﺮﺍﺗﻲ ﻭ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺳﺖ .ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ﻓﻮﻕ ،ﻋﻼﻭﻩ ﺑﺮ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺩﺭ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﺗﻠﻔﻦ ﻧﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ ) .( CAT1ﺷﺶ ﻧﻮﻉ ﮐﺎﺑﻞ UTPﻣﺘﻔﺎﻭﺕ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﮐﻪ ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﻮﻉ ﺷﺒﮑﻪ ﻭ ﺍﻫﺪﺍﻑ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺯ ﺁﻧﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﮐﺎﺑﻞ ، CAT5ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ
ﻧﻮﻉ ﮐﺎﺑﻞ UTPﻣﺤﺴﻮﺏ ﻣﻲ ﮔﺮﺩﺩ. ﻣﺸﺨﺼﻪ ﻫﺎﻱ ﮐﺎﺑﻞ UTP ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺸﺨﺼﻪ ﻫﺎﻱ ﮐﺎﺑﻞ ﻫﺎﻱ ، UTPﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ،ﻧﺼﺐ ﻭ ﺗﻮﺳﻌﻪ ﺳﺮﻳﻊ ﻭ ﺁﺳﺎﻥ ﺁﻧﺎﻥ ،ﻓﺮﺍﻫﻢ ﻣﻲ ﺁﻭﺭﺩ .ﺟﺪﻭﻝ ﺯﻳﺮ ﺍﻧﻮﺍﻉ ﮐﺎﺑﻞ ﻫﺎﻱ UTPﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ:
382
ﻣﻮﺍﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻗﺪﻳﻤﻲ ﺗﻠﻔﻦ ISDN ،ﻭ
ﺳﺮﻋﺖ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ
ﮔﺮﻭﻩ
ﺣﺪﺍﮐﺜﺮ ﺗﺎ ﻳﮏ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ
CAT1
ﻣﻮﺩﻡ ﺣﺪﺍﮐﺜﺮ ﺗﺎ ﭼﻬﺎﺭ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ CAT2
ﺷﺒﮑﻪ ﻫﺎﻱ Ring Token
ﺷﺒﮑﻪ ﻫﺎﻱ ring Tokenﻭ BASE-١٠ﺣﺪﺍﮐﺜﺮ ﺗﺎ ﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ
CAT3
T ﺷﺒﮑﻪ ﻫﺎﻱ Ring Token
CAT4
ﺣﺪﺍﮐﺜﺮ ﺗﺎ ﺷﺎﻧﺰﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺣﺪﺍﮐﺜﺮ ﺗﺎ ﻳﮑﺼﺪ ﻣﮕﺎﺑﻴﺖ ﺩﺭ
ﺍﺗﺮﻧﺖ ) ﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ( ،ﺍﺗﺮﻧﺖ
CAT5
ﺳﺮﻳﻊ ) ﻳﮑﺼﺪ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ( ﻭ ﺷﺒﮑﻪ ﺛﺎﻧﻴﻪ ﻫﺎﻱ ) Ring Tokenﺷﺎﻧﺰﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ( ﺷﺒﮑﻪ ﻫﺎﻱ Gigabit Ethernet
ﺣﺪﺍﮐﺜﺮ ﺗﺎ ﻳﮑﻬﺰﺍﺭ ﻣﮕﺎﺑﻴﺖ ﺩﺭ
CAT5e
ﺛﺎﻧﻴﻪ ﺷﺒﮑﻪ ﻫﺎﻱ Gigabit Ethernet
ﺣﺪﺍﮐﺜﺮ ﺗﺎ ﻳﮑﻬﺰﺍﺭ ﻣﮕﺎﺑﻴﺖ ﺩﺭ
CAT6
ﺛﺎﻧﻴﻪ
ﺗﻮﺿﻴﺤﺎﺕ : •
ﺗﻘﺴﻴﻢ ﺑﻨﺪﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﮔﺮﻭﻩ ﻫﺎﻱ ﻓﻮﻕ ﺑﺮ ﺍﺳﺎﺱ ﻧﻮﻉ ﮐﺎﺑﻞ ﻣﺴﻲ ﻭ Jackﺍﻧﺠﺎﻡ
•
ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ، CAT1ﺑﻪ ﺩﻟﻴﻞ ﻋﺪﻡ ﺣﻤﺎﻳﺖ ﺗﺮﺍﻓﻴﮏ ﻣﻨﺎﺳﺐ ،ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ
ﺷﺪﻩ ﺍﺳﺖ.
ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲ ﮔﺮﺩﺩ. •
ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ﮔﺮﻭﻩ CAT4, CAT5 ,CAT2, CAT3ﻭ CAT6ﺩﺭ ﺷﺒﮑﻪ ﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﮐﺎﺑﻞ ﻫﺎﻱ ﻓﻮﻕ ،ﻗﺎﺩﺭ ﺑﻪ ﺣﻤﺎﻳﺖ ﺍﺯ ﺗﺮﺍﻓﻴﮏ ﺗﻠﻔﻦ ﻭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﻣﻲ ﺑﺎﺷﻨﺪ. 383
•
ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ CAT2ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ Token Ringﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﻭ ﺳﺮﻋﺘﻲ ﺑﺎﻟﻎ
•
ﺑﺮﺍﻱ ﺷﺒﮑﻪ ﻫﺎﺋﻲ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ) ﻳﮑﺼﺪ ﻣﮕﺎ ﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ( ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ CAT5
ﺑﺮ ٤ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﻭ ﺑﺮﺍﻱ ﺳﺮﻋﺖ ﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ CAT3ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ. •
ﺩﺭ ﮐﺎﺑﻞ ﻫﺎﻱ CAT3 ,CAT4ﻭ CAT5ﺍﺯ ﭼﻬﺎﺭ ﺯﻭﺝ ﮐﺎﺑﻞ ﻣﺴﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ
ﺍﺳﺖ CAT5 .ﻧﺴﺒﺖ ﺑﻪ CAT3ﺩﺍﺭﺍﻱ ﺗﻌــﺪﺍﺩ ﺑﻴﺸــﺘﺮﻱ ﭘﻴــﭽﺶ ﺩﺭ ﻫﺮ ﺍﻳﻨـﭻ ﻣﻲ ﺑﺎﺷﺪ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺍﻳﻦ ﻧـﻮﻉ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎ ﺳﺮﻋﺖ ﻭ ﻣــﺴﺎﻓﺖ ﺑﻴــﺸﺘﺮ ﻱ ﺭﺍ ﺣﻤﺎﻳﺖ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
•
ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ CAT3ﻭ CAT4ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ Token Ringﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
•
ﺣﺪﺍﮐﺜﺮ ﻣﺴﺎﻓﺖ ﺩﺭ ﮐﺎﺑﻞ ﻫﺎﻱ ، CAT3ﻳﮑﺼﺪ ﻣﺘﺮ ﺍﺳﺖ.
•
ﺣﺪﺍﮐﺜﺮ ﻣﺴﺎﻓﺖ ﺩﺭ ﮐﺎﺑﻞ ﻫﺎﻱ ، CAT4ﺩﻭﻳﺴﺖ ﻣﺘﺮ ﺍﺳﺖ.
•
ﮐﺎﺑﻞ CAT6ﺑﺎ ﻫﺪﻑ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﮔﻴﮕﺎﺑﻴﺖ ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺍﺳﺖ. ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﺋﻲ ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﮐﻪ ﺍﻣﮑﺎﻥ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﮔﻴﮕﺎﺑﻴﺖ ﺑﺮ ﺭﻭﻱ ﮐﺎﺑﻞ ﻫﺎﻱ CAT5ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ) .( CAT5eﮐﺎﺑﻞ ﻫﺎﻱ CAT6ﻣﺸﺎﺑﻪ
ﮐﺎﺑﻞ ﻫﺎﻱ CAT5ﺑﻮﺩﻩ ﻭﻟﻲ ﺑﻴﻦ ٤ﺯﻭﺝ ﮐﺎﺑﻞ ﺁﻧﺎﻥ ﺍﺯ ﻳﮏ ﺟﺪﺍﮐﻨﻨﺪﻩ ﻓﻴﺰﻳﮑﻲ ﺑﻪ
ﻣﻨﻈﻮﺭ ﮐﺎﻫﺶ ﭘﺎﺭﺍﺯﻳﺖ ﻫﺎﻱ ﺍﻟﮑﺘﺮﻭﻣﻐﻨﺎﻃﻴﺴﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﻭ ﺳﺮﻋﺘﻲ ﺑﺎﻟﻎ ﺑﺮ ﻳﮑﻬﺰﺍﺭ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
384
ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﻳﮑﻲ ﺍﺯ ﻣﺤﻴﻂ ﻫﺎﻱ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﻩ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ﺍﺳﺖ .ﺍﺯ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺩﺭ
ﻣﻮﺍﺭﺩ ﻣﺘﻔﺎﻭﺗﻲ ﻧﻈﻴﺮ :ﺷﺒﮑﻪ ﻫﺎﻱ ﺗﻠﻔﻦ ﺷﻬﺮﻱ ﻭ ﺑﻴﻦ ﺷﻬﺮﻱ ،ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﻭ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻓﻴﺒﺮﻧﻮﺭﻱ ﺭﺷﺘﻪ ﺍﻱ ﺍﺯ ﺗﺎﺭﻫﺎﻱ ﺷﻴﺸﻪ ﺍﻱ ﺑﻮﺩﻩ ﮐﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﺗﺎﺭﻫﺎ ﺩﺍﺭﺍﻱ ﺿﺨﺎﻣﺘﻲ ﻣﻌﺎﺩﻝ ﺗﺎﺭ ﻣﻮﻱ ﺍﻧﺴﺎﻥ ﺭﺍ ﺩﺍﺷﺘﻪ ﻭ ﺍﺯ ﺁﻧﺎﻥ ﺑﺮﺍﻱ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺩﺭ
ﻣﺴﺎﻓﺖ ﻫﺎﻱ ﻃﻮﻻﻧﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ.
ﻣﺒﺎﻧﻲ ﻓﻴﺒﺮ ﻧﻮﺭﻱ
ﻓﻴﺒﺮ ﻧﻮﺭﻱ ،ﺭﺷﺘﻪ ﺍﻱ ﺍﺯ ﺗﺎﺭﻫﺎﻱ ﺑﺴﻴﺎﺭ ﻧﺎﺯﮎ ﺷﻴﺸﻪ ﺍﻱ ﺑﻮﺩﻩ ﮐﻪ ﻗﻄﺮ ﻫﺮ ﻳﮏ ﺍﺯ
ﺗﺎﺭﻫﺎ ﻧﻈﻴﺮ ﻗﻄﺮ ﻳﮏ ﺗﺎﺭ ﻣﻮﻱ ﺍﻧﺴﺎﻥ ﺍﺳﺖ .ﺗﺎﺭﻫﺎﻱ ﻓﻮﻕ ﺩﺭ ﮐﻼﻑ ﻫﺎﺋﻲ ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﻭ ﮐﺎﺑﻞ ﻫﺎﻱ ﻧﻮﺭﻱ ﺭﺍ ﺑﻮﺟﻮﺩ ﻣﻲ ﺁﻭﺭﻧﺪ .ﺍﺯ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺑﻤﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﻧﻮﺭﻱ ﺩﺭ ﻣﺴﺎﻓﺖ ﻫﺎﻱ ﻃﻮﻻﻧﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ.
385
ﻳﮏ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺍﺯ ﺳﻪ ﺑﺨﺶ ﻣﺘﻔﺎﻭﺕ ﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺍﺳﺖ: •
ﻫﺴﺘﻪ ) . (Coreﻫﺴﺘﻪ ﻧﺎﺯﮎ ﺷﻴﺸﻪ ﺍﻱ ﺩﺭ ﻣﺮﮐﺰ ﻓﻴﺒﺮ ﮐﻪ ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﻧﻮﺭﻱ ﺩﺭ ﺁﻥ ﺣﺮﮐﺖ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
•
ﺭﻭﮐﺶ ) . (Claddingﺑﺨﺶ ﺧﺎﺭﺟﻲ ﻓﻴﺒﺮ ﺑﻮﺩﻩ ﮐﻪ ﺩﻭﺭﺗﺎﺩﻭﺭ ﻫﺴﺘﻪ ﺭﺍ ﺍﺣﺎﻃﻪ ﮐﺮﺩﻩ ﻭ ﺑﺎﻋﺚ ﺑﺮﮔﺸﺖ ﻧﻮﺭﻣﻨﻌﮑﺲ ﺷﺪﻩ ﺑﻪ ﻫﺴﺘﻪ ﻣﻲ ﮔﺮﺩﺩ.
•
ﺑﺎﻓﺮ ﺭﻭﻳﻪ ) . (Coating Bufferﺭﻭﮐﺶ ﭘﻼﺳﺘﻴﮑﻲ ﮐﻪ ﺑﺎﻋﺚ ﺣﻔﺎﻇﺖ ﻓﻴﺒﺮ ﺩﺭ ﻣﻘﺎﺑﻞ ﺭﻃﻮﺑﺖ ﻭ ﺳﺎﻳﺮ ﻣﻮﺍﺭﺩ ﺁﺳﻴﺐ ﭘﺬﻳﺮ ،ﺍﺳﺖ.
ﺻﺪﻫﺎ ﻭ ﻫﺰﺍﺭﺍﻥ ﻧﻤﻮﻧﻪ ﺍﺯ ﺭﺷﺘﻪ ﻫﺎﻱ ﻧﻮﺭﻱ ﻓﻮﻕ ﺩﺭ ﺩﺳﺘﻪ ﻫﺎﺋﻲ ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﺷﺪﻩ ﻭ ﮐﺎﺑﻞ ﻫﺎﻱ ﻧﻮﺭﻱ ﺭﺍ ﺑﻮﺟﻮﺩ ﻣﻲ ﺁﻭﺭﻧﺪ .ﻫﺮ ﻳﮏ ﺍﺯ ﮐﻼﻑ ﻫﺎﻱ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺗﻮﺳﻂ ﻳﮏ ﺭﻭﮐﺶ ﻫﺎﺋﻲ ﺑﺎ ﻧﺎﻡ Jacketﻣﺤﺎﻓﻈﺖ ﻣﻲ ﮔﺮﺩﻧﺪ. ﻓﻴﺒﺮ ﻫﺎﻱ ﻧﻮﺭﻱ ﺩﺭ ﺩﻭ ﮔﺮﻭﻩ ﻋﻤﺪﻩ ﺍﺭﺍﺋﻪ ﻣﻲ ﮔﺮﺩﻧﺪ: •
ﻓﻴﺒﺮﻫﺎﻱ ﺗﮏ ﺣﺎﻟﺘﻪ ) . (Single-Modeﺑﻤﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﻳﮏ ﺳﻴﮕﻨﺎﻝ ﺩﺭ ﻫﺮ ﻓﻴﺒﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ) ﻧﻈﻴﺮ :ﺗﻠﻔﻦ (
•
ﻓﻴﺒﺮﻫﺎﻱ ﭼﻨﺪﺣﺎﻟﺘﻪ ) . (Multi-Modeﺑﻤﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﭼﻨﺪﻳﻦ ﺳﻴﮕﻨﺎﻝ ﺩﺭ ﻳﮏ ﻓﻴﺒﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ) ﻧﻈﻴﺮ :ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ(
ﻓﻴﺒﺮﻫﺎﻱ ﺗﮏ ﺣﺎﻟﺘﻪ ﺩﺍﺭﺍﻱ ﻳﮏ ﻫﺴﺘﻪ ﮐﻮﭼﮏ ) ﺗﻘﺮﻳﺒﺎ" ٩ﻣﻴﮑﺮﻭﻥ ﻗﻄﺮ ( ﺑﻮﺩﻩ ﻭ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﻧﻮﺭ ﻟﻴﺰﺭﻱ ﻣﺎﺩﻭﻥ ﻗﺮﻣﺰ ) ﻃﻮﻝ ﻣﻮﺝ ﺍﺯ ١٣٠٠ﺗﺎ ١٥٥٠ﻧﺎﻧﻮﻣﺘﺮ( ﻣﻲ ﺑﺎﺷﻨﺪ .ﻓﻴﺒﺮﻫﺎﻱ ﭼﻨﺪ ﺣﺎﻟﺘﻪ ﺩﺍﺭﺍﻱ ﻫﺴﺘﻪ ﺑﺰﺭﮔﺘﺮ ) ﺗﻘﺮﻳﺒﺎ" ٦٢ / ٥ﻣﻴﮑﺮﻭﻥ ﻗﻄﺮ ( ﻭ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﻧﻮﺭﻣﺎﺩﻭﻥ
ﻗﺮﻣﺰ ﺍﺯ ﻃﺮﻳﻖ LEDﻣﻲ ﺑﺎﺷﻨﺪ. ﺍﺭﺳﺎﻝ ﻧﻮﺭ ﺩﺭ ﻓﻴﺒﺮ ﻧﻮﺭﻱ
ﻓﺮﺽ ﮐﻨﻴﺪ ،ﻗﺼﺪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﭼﺮﺍﻍ ﻗﻮﻩ ﻳﮏ ﺭﺍﻫﺮﻭﻱ ﺑﺰﺭﮒ ﻭ
ﻣﺴﺘﻘﻴﻢ ﺭﺍ ﺭﻭﺷﻦ ﻧﻤﺎﺋﻴﻢ .ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺭﻭﺷﻦ ﻧﻤﻮﺩﻥ ﭼﺮﺍﻍ ﻗﻮﻩ ،ﻧﻮﺭ ﻣﺮﺑﻮﻃﻪ ﺩﺭ ﻃﻮﻝ ﻣﺴﻴﺮ ﻣﺴﻔﻘﻴﻢ ﺭﺍﻫﺮﻭ ﺗﺎﺑﺎﻧﺪﻩ ﺷﺪﻩ ﻭ ﺁﻥ ﺭﺍ ﺭﻭﺷﻦ ﺧﻮﺍﻫﺪ ﮐﺮﺩ. 386
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻋﺪﻡ ﻭﺟﻮﺩ ﺧﻢ ﻭ ﻳﺎ ﭘﻴﭻ ﺩﺭ ﺭﺍﻫﺮﻭ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﺎﺑﺶ ﻧﻮﺭ ﭼﺮﺍﻍ ﻗﻮﻩ
ﻣﺸﮑﻠﻲ ﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻪ ﻭ ﭼﺮﺍﻍ ﻗﻮﻩ ﻣﻲ ﺗﻮﺍﻧﺪ ) ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﻮﻉ ﺁﻥ ( ﻣﺤﺪﻭﺩﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺭﻭﺷﻦ ﮐﺮﺩ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺭﺍﻫﺮﻭﻱ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﺧﻢ ﻭ ﻳﺎ ﭘﻴﭻ ﺑﺎﺷﺪ ،ﺑﺎ ﭼﻪ ﻣﺸﮑﻠﻲ ﺑﺮﺧﻮﺭﺩ ﺧﻮﺍﻫﻴﻢ ﮐﺮﺩ؟ ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﻳﮏ ﺁﻳﻴﻨﻪ ﺩﺭ ﻣﺤﻞ ﭘﻴﭻ ﺭﺍﻫﺮﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺗﺎ ﺑﺎﻋﺚ
ﺍﻧﻌﮑﺎﺱ ﻧﻮﺭ ﺍﺯ ﺯﺍﻭﻳﻪ ﻣﺮﺑﻮﻃﻪ ﮔﺮﺩﺩ.ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺭﺍﻫﺮﻭﻱ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﭘﻴﭻ ﻫﺎﻱ ﺯﻳﺎﺩﻱ ﺑﺎﺷﺪ ،ﭼﻪ ﮐﺎﺭ ﺑﺎﻳﺴﺖ ﮐﺮﺩ؟ ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﺩﺭ ﺗﻤﺎﻡ ﻃﻮﻝ ﻣﺴﻴﺮ ﺩﻳﻮﺍﺭ ﺭﺍﻫﺮﻭﻱ ﻣﻮﺭﺩ ﻧﻈﺮ، ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﺁﻳﻴﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﻧﻮﺭ ﺗﺎﺑﺎﻧﺪﻩ ﺷﺪﻩ ﺗﻮﺳﻂ ﭼﺮﺍﻍ ﻗﻮﻩ )ﺑﺎ ﻳﮏ
ﺯﺍﻭﻳﻪ ﺧﺎﺹ( ﺍﺯ ﻧﻘﻄﻪ ﺍﻱ ﺑﻪ ﻧﻘﻄﻪ ﺍﻱ ﺩﻳﮕﺮ ﺣﺮﮐﺖ ﮐﺮﺩﻩ ) ﺟﻬﺶ ﮐﺮﺩﻩ ﻭ ﻃﻮﻝ ﻣﺴﻴﺮ ﺭﺍﻫﺮﻭ ﺭﺍ ﻃﻲ ﺧﻮﺍﻫﺪ ﮐﺮﺩ( .ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﻣﺸﺎﺑﻪ ﺁﻧﭽﻴﺰﻱ ﺍﺳﺖ ﮐﻪ ﺩﺭ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺍﻧﺠﺎﻡ ﻣﻲ
ﮔﻴﺮﺩ.
ﻧﻮﺭ ،ﺩﺭ ﮐﺎﺑﻞ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺍﺯ ﻃﺮﻳﻖ ﻫﺴﺘﻪ )ﻧﻈﻴﺮ ﺭﺍﻫﺮﻭﻱ ﻣﺜﺎﻝ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ( ﻭ ﺗﻮﺳﻂ ﺟﻬﺶ ﻫﺎﻱ ﭘﻴﻮﺳﺘﻪ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺳﻄﺢ ﺁﺑﮑﺎﺭﻱ ﺷﺪﻩ ) ) (Claddingﻣﺸﺎﺑﻪ ﺩﻳﻮﺍﺭﻫﺎﻱ ﺷﻴﺸﻪ ﺍﻱ ﻣﺜﺎﻝ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ( ﺣﺮﮐﺖ ﻣﻲ ﮐﻨﺪ ).ﻣﺠﻤﻮﻉ ﺍﻧﻌﮑﺎﺱ ﺩﺍﺧﻠﻲ ( .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﺳﻄﺢ
ﺁﺑﮑﺎﺭﻱ ﺷﺪﻩ ،ﻗﺎﺩﺭ ﺑﻪ ﺟﺬﺏ ﻧﻮﺭ ﻣﻮﺟﻮﺩ ﺩﺭ ﻫﺴﺘﻪ ﻧﻤﻲ ﺑﺎﺷﺪ ،ﻧﻮﺭ ﻗﺎﺩﺭ ﺑﻪ ﺣﺮﮐﺖ ﺩﺭ ﻣﺴﺎﻓﺖ ﻫﺎﻱ ﻃﻮﻻﻧﻲ ﻣﻲ ﺑﺎﺷﺪ .ﺑﺮﺧﻲ ﺍﺯ ﺳﻴﮕﻨﺎ ﻝ ﻫﺎﻱ ﻧﻮﺭﻱ ﺑﺪﻟﻴﻞ ﻋﺪﻡ ﺧﻠﻮﺹ ﺷﻴﺸﻪ ﻣﻮﺟﻮﺩ ،ﻣﻤﮑﻦ ﺍﺳﺖ ﺩﭼﺎﺭ ﻧﻮﻋﻲ ﺗﻀﻌﻴﻒ ﺩﺭ ﻃﻮﻝ ﻫﺴﺘﻪ ﮔﺮﺩﻧﺪ .ﻣﻴﺰﺍﻥ ﺗﻀﻌﻴﻒ ﺳﻴﮕﻨﺎﻝ ﻧﻮﺭﻱ ﺑﻪ ﺩﺭﺟﻪ ﺧﻠﻮﺹ ﺷﻴﺸﻪ ﻭ ﻃﻮﻝ ﻣﻮﺝ ﻧﻮﺭ ﺍﻧﺘﻘﺎﻟﻲ ﺩﺍﺭﺩ ) .ﻣﺜﻼ" ﻣﻮﺝ ﺑﺎ ﻃﻮﻝ ٨٥٠
ﻧﺎﻧﻮﻣﺘﺮ ﺑﻴﻦ ٦٠ﺗﺎ ٧٥ﺩﺭﺻﺪ ﺩﺭ ﻫﺮ ﮐﻴﻠﻮﻣﺘﺮ ،ﻣﻮﺝ ﺑﺎ ﻃﻮﻝ ١٣٠٠ﻧﺎﻧﻮﻣﺘﺮ ﺑﻴﻦ ٥٠ﺗﺎ ٦٠ ﺩﺭﺻﺪ ﺩﺭ ﻫﺮ ﮐﻴﻠﻮﻣﺘﺮ ،ﻣﻮﺝ ﺑﺎ ﻃﻮﻝ ١٥٥٠ﻧﺎﻧﻮﻣﺘﺮ ﺑﻴﺶ ﺍﺯ ٥٠ﺩﺭﺻﺪ ﺩﺭ ﻫﺮ ﮐﻴﻠﻮﻣﺘﺮ( ﺳﻴﺴﺘﻢ ﺭﻟﻪ ﻓﻴﺒﺮ ﻧﻮﺭﻱ
ﺑﻤﻨﻈﻮﺭ ﺁﮔﺎﻫﻲ ﺍﺯ ﻧﺤﻮﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺩﺭ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻣﺨﺎﺑﺮﺍﺗﻲ ،ﻣﺜﺎﻟﻲ ﺭﺍ ﺩﻧﺒﺎﻝ
ﺧﻮﺍﻫﻴﻢ ﮐﺮﺩ ﮐﻪ ﻣﺮﺑﻮﻁ ﺑﻪ ﻳﮏ ﻓﻴﻠﻢ ﺳﻴﻨﻤﺎﺋﻲ ﻭ ﻳﺎ ﻣﺴﺘﻨﺪ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺟﻨﮓ ﺟـــﻬﺎﻧﻲ ﺩﻭﻡ
ﺍﺳﺖ .ﺩﺭ ﻓﻴﻠﻢ ﻓﻮﻕ ﺩﻭ ﻧﺎﻭﮔﺎﻥ ﺩﺭﻳﺎﺋﻲ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﺳﻄﺢ ﺩﺭﻳﺎ ﺩﺭ ﺣﺎﻝ ﺣﺮﮐﺖ ﻣﻲ ﺑﺎﺷﻨﺪ ، ﻧﻴﺎﺯ ﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺩﺭ ﻳﮏ ﻭﺿﻌﻴﺖ ﮐﺎﻣﻼ" ﺑﺤﺮﺍﻧﻲ ﻭ ﺗﻮﻓﺎﻧﻲ ﺭﺍ ﺩﺍﺭﻧﺪ. 387
ﻳـﮑﻲ ﺍﺯ ﻧﺎﻭﻫﺎ ﻗﺼﺪ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﺑﺮﺍﻱ ﻧﺎﻭ ﺩﻳﮕﺮ ﺭﺍ ﺩﺍﺭﺩ.ﮐﺎﭘﻴﺘﺎﻥ ﻧﺎﻭ ﻓﻮﻕ ﭘﻴﺎﻣﻲ
ﺑﺮﺍﻱ ﻳﮏ ﻣﻠﻮﺍﻥ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﻋﺮﺷﻪ ﮐﺸﺘﻲ ﻣﺴﺘﻘﺮ ﺍﺳﺖ ،ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ .ﻣﻠﻮﺍﻥ ﻓﻮﻕ ﭘﻴﺎﻡ ﺩﺭﻳﺎﻓﺘﻲ ﺭﺍ ﺑﻪ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﮐﺪﻫﺎﻱ ﻣﻮﺭﺱ ) ﻧﻘﻄﻪ ﻭ ﻓﺎﺻﻠﻪ ( ﺗﺮﺟﻤﻪ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ ﻣﻠﻮﺍﻥ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﻧﻮﺭﺍﻓﮑﻦ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﺑﺮﺍﻱ ﻧﺎﻭ ﺩﻳﮕﺮ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﻳﮏ ﻣﻠﻮﺍﻥ ﺑﺮ ﺭﻭﻱ ﻋﺮﺷﻪ ﮐﺸﺘﻲ ﺩﻭﻡ ،ﮐﺪﻫﺎﻱ ﻣﻮﺭﺱ ﺍﺭﺳﺎﻟﻲ ﺭﺍ ﻣﺸﺎﻫﺪﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ ﻣﻠﻮﺍﻥ ﻓﻮﻕ ﮐﺪﻫﺎﻱ ﻓﻮﻕ ﺭﺍ ﺑﻪ ﻳﮏ ﺯﺑﺎﻥ ﺧﺎﺹ ) ﻣﺜﻼ" ﺍﻧﮕﻠﻴﺴﻲ ( ﺗﺒﺪﻳﻞ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺑﺮﺍﻱ ﮐﺎﭘﻴﺘﺎﻥ ﻧﺎﻭ ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ .ﻓﺮﺽ ﮐﻨﻴﺪ ﻓﺎﺻﻠﻪ ﺩﻭ ﻧﺎﻭ ﻓﻮﻕ ﺍﺯ ﻳﮑﺪﻳﮕﺮ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩ ) ﻫﺰﺍﺭﺍﻥ ﻣﺎﻳﻞ ( ﺑﻮﺩﻩ ﻭ ﺑﻤﻨﻈﻮﺭ ﺑﺮﻗﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺁﻧﻬﺎ ﺍﺯ ﻳﮏ ﺳﻴﺴﺘﻢ ﻣﺨﺎﺑﺮﺍﺗﻲ ﻣﺒﺘﻨﻲ ﺑﺮ
ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ. ﺳﻴﺴﺘﻢ ﺭﻟﻪ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺍﺯ ﻋﻨﺎﺻﺮ ﺯﻳﺮ ﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺍﺳﺖ: •
ﻓﺮﺳﺘﻨﺪﻩ .ﻣﺴﺌﻮﻝ ﺗﻮﻟﻴﺪ ﻭ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﻧﻮﺭﻱ ﺍﺳﺖ.
•
ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﻣﺪﻳﺮﻳﺖ ﺳﻴﮑﻨﺎﻝ ﻫﺎﻱ ﻧﻮﺭﻱ ﺩﺭ ﻳﮏ ﻣﺴﺎﻓﺖ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﻣﻲ ﮔﻴﺮﺩ.
•
ﺑﺎﺯﻳﺎﺏ ﻧﻮﺭﻱ .ﺑﻤﻨﻈﻮﺭ ﺗﻘﻮﻳﺖ ﺳﻴﮕﻨﺎ ﻝ ﻫﺎﻱ ﻧﻮﺭﻱ ﺩﺭ ﻣﺴﺎﻓﺖ ﻫﺎﻱ ﻃﻮﻻﻧﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
•
ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﻧﻮﺭﻱ .ﺳﻴﮕﻨﺎ ﻝ ﻫﺎﻱ ﻧﻮﺭﻱ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻭ ﺭﻣﺰﮔﺸﺎﺋﻲ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺑﺮﺭﺳﻲ ﻫﺮ ﻳﮏ ﺍﺯ ﻋﻨﺎﺻﺮ ﻓﻮﻕ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ.
ﻓﺮﺳﺘﻨﺪﻩ
ﻭﻇﻴﻔﻪ ﻓﺮﺳﺘﻨﺪﻩ ،ﻣﺸﺎﺑﻪ ﻧﻘﺶ ﻣﻠﻮﺍﻥ ﺑﺮ ﺭﻭﻱ ﻋﺮﺷﻪ ﮐﺸﺘﻲ ﻧﺎﻭ ﻓﺮﺳﺘﻨﺪﻩ ﭘﻴﺎﻡ ﺍﺳﺖ.
ﻓﺮﺳﺘﻨﺪﻩ ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﻧﻮﺭﻱ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻭ ﺩﺳﺘﮕﺎﻩ ﻧﻮﺭﻱ ﺭﺍ ﺑﻤﻨﻈﻮﺭ ﺭﻭﺷﻦ ﻭ ﺧﺎﻣﻮﺵ ﺷﺪﻥ ﺩﺭ ﻳﮏ ﺩﻧﺒﺎﻟﻪ ﻣﻨﺎﺳﺐ ) ﺣﺮﮐﺖ ﻣﻨﺴﺠﻢ ( ﻫﺪﺍﻳﺖ ﻣﻲ ﻧﻤﺎﻳﺪ .ﻓﺮﺳﺘﻨﺪﻩ ،ﺍﺯ ﻟﺤﺎﻅ ﻓﻴﺰﻳﮑﻲ ﺩﺭ ﻣﺠﺎﻭﺭﺕ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﻗﺮﺍﺭ ﺩﺍﺷﺘﻪ ﻭ ﻣﻤﮑﻦ ﺍﺳﺖ ﺩﺍﺭﺍﻱ ﻳﮏ ﻟﻨﺰ ﺑﻤﻨﻈﻮﺭ ﺗﻤﺮﮐﺰ
ﻧﻮﺭ ﺩﺭ ﻓﻴﺒﺮ ﺑﺎﺷﺪ .ﻟﻴﺰﺭﻫﺎ ﺩﺍﺭﺍﻱ ﺗﻮﺍﻥ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮﻱ ﻧﺴﺒﺖ ﺑﻪ LEDﻣﻲ ﺑﺎﺷﻨﺪ .ﻗﻴﻤﺖ ﺁﻧﻬﺎ ﻧﻴﺰ ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ LEDﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮﺍﺳﺖ .ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﻃﻮﻝ ﻣﻮﺝ ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﻧﻮﺭﻱ، ٨٥٠ﻧﺎﻧﻮﻣﺘﺮ ١٣٠٠ ،ﻧﺎﻧﻮﻣﺘﺮ ﻭ ١٥٥٠ﻧﺎﻧﻮﻣﺘﺮ ﺍﺳﺖ. 388
ﺑﺎﺯﻳﺎﺏ ) ﺗﻘﻮﻳﺖ ﮐﻨﻨﺪﻩ ( ﻧﻮﺭﻱ
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﻗﺒﻼ" ﺍﺷﺎﺭﻩ ﮔﺮﺩﻳﺪ ،ﺑﺮﺧﻲ ﺍﺯ ﺳﻴﮕﻨﺎﻝ ﻫﺎ ﺩﺭ ﻣﻮﺍﺭﺩﻳﮑﻪ ﻣﺴﺎﻓﺖ ﺍﺭﺳﺎﻝ
ﺍﻃﻼﻋﺎﺕ ﻃﻮﻻﻧﻲ ﺑﻮﺩﻩ ) ﺑﻴﺶ ﺍﺯ ﻳﮏ ﮐﻴﻠﻮﻣﺘﺮ ( ﻭ ﻳﺎ ﺍﺯ ﻣﻮﺍﺩ ﺧﺎﻟﺺ ﺑﺮﺍﻱ ﺗﻬﻴﻪ ﻓﻴﺒﺮ ﻧﻮﺭﻱ
) ﺷﻴﺸﻪ ( ﺍﺳﺘﻔﺎﺩﻩ ﻧﺸﺪﻩ ﺑﺎﺷﺪ ،ﺗﻀﻌﻴﻒ ﻭ ﺍﺯ ﺑﻴﻦ ﺧﻮﺍﻫﻨﺪ ﺭﻓﺖ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ﻭ
ﺑﻤﻨﻈﻮﺭ ﺗﻘﻮﻳﺖ ) ﺑﺎﻻ ﺑﺮﺩﻥ ( ﺳﻴﮕﻨﺎ ﻝ ﻫﺎﻱ ﻧﻮﺭﻱ ﺗﻀﻌﻴﻒ ﺷﺪﻩ ﺍﺯ ﻳﮏ ﻳﺎ ﭼﻨﺪﻳﻦ " ﺗﻘﻮﻳﺖ ﮐﻨﻨﺪﻩ ﻧﻮﺭﻱ " ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺗﻘﻮﻳﺖ ﮐﻨﻨﺪﻩ ﻧﻮﺭﻱ ﺍﺯ ﻓﻴﺒﺮﻫﺎﻱ ﻧﻮﺭﻱ ﻣﺘﻌﻌﺪﺩ ﺑﻬﻤﺮﺍﻩ ﻳﮏ
ﺭﻭﮐﺶ ﺧﺎﺹ ) (dopingﺗﺸﮑﻴﻞ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺑﺨﺶ ﺩﻭﭘﻴﻨﮓ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﻟﻴﺰﺭ ﭘﻤﭗ ﻣﻲ ﮔﺮﺩﺩ .ﺯﻣﺎﻧﻴﮑﻪ ﺳﻴﮕﻨﺎﻝ ﺗﻀﻌﻴﻒ ﺷﺪﻩ ﺑﻪ ﺭﻭﮐﺶ ﺩﻭﭘﻴﻨﮕﻲ ﻣﻲ ﺭﺳﺪ ،ﺍﻧﺮﮊﻱ ﻣﺎﺣﺼﻞ ﺍﺯ ﻟﻴﺰﺭ ﺑﺎﻋﺚ ﻣﻲ ﮔﺮﺩﺩ ﮐﻪ ﻣﻮﻟﮑﻮﻝ ﻫﺎﻱ ﺩﻭﭘﻴﻨﮓ ﺷﺪﻩ ،ﺑﻪ ﻟﻴﺰﺭ ﺗﺒﺪﻳﻞ ﻣﻲ ﮔﺮﺩﻧﺪ .ﻣﻮﻟﮑﻮﻝ
ﻫﺎﻱ ﺩﻭﭘﻴﻨﮓ ﺷﺪﻩ ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺎﻋﺚ ﺍﻧﻌﮑﺎﺱ ﻳﮏ ﺳﻴﮕﻨﺎﻝ ﻧﻮﺭﻱ ﺟﺪﻳﺪ ﻭ ﻗﻮﻳﺘﺮ ﺑﺎ ﻫﻤﺎﻥ ﺧﺼﺎﻳﺺ ﺳﻴﮕﻨﺎﻝ ﻭﺭﻭﺩﻱ ﺗﻀﻌﻴﻒ ﺷﺪﻩ ،ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ ).ﺗﻘﻮﻳﺖ ﮐﻨﻨﺪﻩ ﻟﻴﺰﺭﻱ( ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﻧﻮﺭﻱ
ﻭﻇﻴﻔﻪ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ،ﻣﺸﺎﺑﻪ ﻧﻘﺶ ﻣﻠﻮﺍﻥ ﺑﺮ ﺭﻭﻱ ﻋﺮﺷﻪ ﮐﺸﺘﻲ ﻧﺎﻭ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﭘﻴﺎﻡ ﺍﺳﺖ .ﺩﺳﺘﮕﺎﻩ ﻓﻮﻕ ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﻧﻮﺭﻱ ﺭﺍ ﺍﺧﺬ ﻭ ﭘﺲ ﺍﺯ ﺭﻣﺰﮔﺸﺎﺋﻲ ،ﺳﻴﮕﻨﺎ ﻝ ﻫﺎﻱ ﺍﻟﮑﺘﺮﻳﮑﻲ ﺭﺍ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻨﺪﮔﺎﻥ ) ﮐﺎﻣﭙﻴﻮﺗﺮ ،ﺗﻠﻔﻦ ﻭ ( ...ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ. ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﺑﻤﻨﻈﻮﺭ ﺗﺸﺨﻴﺺ ﻧﻮﺭ ﺍﺯ ﻳﮏ "ﻓﺘﻮﺳﻞ" ﻭ ﻳﺎ "ﻓﺘﻮﺩﻳﻮﺩ" ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮐﻨﺪ.
ﻣﺰﺍﻳﺎﻱ ﻓﻴﺒﺮ ﻧﻮﺭﻱ
ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ﺳﻴﻢ ﻫﺎﻱ ﻫﺎﻱ ﻣﺴﻲ ﺩﺍﺭﺍﻱ ﻣﺰﺍﻳﺎﻱ ﺯﻳﺮ ﺍﺳﺖ: •
ﺍﺭﺯﺍﻧﺘﺮ .ﻫﺰﻳﻨﻪ ﭼﻨﺪﻳﻦ ﮐﻴﻠﻮﻣﺘﺮ ﮐﺎﺑﻞ ﻧﻮﺭﻱ ﻧﺴﺒﺖ ﺑﻪ ﺳﻴﻢ ﻫﺎﻱ ﻣﺴﻲ ﮐﻤﺘﺮ ﺍﺳﺖ.
•
ﻧﺎﺯﮎ ﺗﺮ .ﻗﻄﺮ ﻓﻴﺒﺮﻫﺎﻱ ﻧﻮﺭﻱ ﺑﻤﺮﺍﺗﺐ ﮐﻤﺘﺮ ﺍﺯ ﺳﻴﻢ ﻫﺎﻱ ﻣﺴﻲ ﺍﺳﺖ.
•
ﻇﺮﻓﻴﺖ ﺑﺎﻻ .ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺑﻤﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮ ﺍﺯ
•
ﺗﻀﻌﻴﻒ ﻧﺎﭼﻴﺰ .ﺗﻀﻌﻴﻒ ﺳﻴﮕﻨﺎﻝ ﺩﺭ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺑﻤﺮﺍﺗﺐ ﮐﻤﺘﺮ ﺍﺯ ﺳﻴﻢ ﻣﺴﻲ ﺍﺳﺖ.
ﺳﻴﻢ ﻣﺴﻲ ﺍﺳﺖ.
389
•
ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﻧﻮﺭﻱ .ﺑﺮﺧﻼﻑ ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﺍﻟﮑﺘﺮﻳﮑﻲ ﺩﺭ ﻳﮏ ﺳﻴﻢ ﻣﺴﻲ ،ﺳﻴﮕﻨﺎ ﻝ
•
ﻣﺼﺮﻑ ﺑﺮﻕ ﭘﺎﻳﻴﻦ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺳﻴﮕﻨﺎﻝ ﻫﺎ ﺩﺭ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﮐﻤﺘﺮ ﺿﻌﻴﻒ ﻣﻲ ﮔﺮﺩﻧﺪ،
ﻫﺎ ﻱ ﻧﻮﺭﻱ ﺩﺭ ﻳﮏ ﻓﻴﺒﺮ ﺗﺎﺛﻴﺮﻱ ﺑﺮ ﻓﻴﺒﺮ ﺩﻳﮕﺮ ﻧﺨﻮﺍﻫﻨﺪ ﺩﺍﺷﺖ.
ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﻓﺮﺳﺘﻨﺪﻩ ﻫﺎﺋﻲ ﺑﺎ ﻣﻴﺰﺍﻥ ﺑﺮﻕ ﻣﺼﺮﻓﻲ ﭘﺎﻳﻴﻦ ﻧﺴﺒﺖ ﺑﻪ ﻓﺮﺳﺘﻨﺪﻩ ﻫﺎﻱ ﺍﻟﮑﺘﺮﻳﮑﻲ ﮐﻪ ﺍﺯ ﻭﻟﺘﺎﮊ ﺑﺎﻻﺋﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ.
•
ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻝ .ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﻣﻨﺎﺳﺐ ﺑﻤﻨﻈﻮﺭ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺍﺳﺖ.
•
ﻏﻴﺮ ﺍﺷﺘﻌﺎﻝ ﺯﺍ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻋﺪﻡ ﻭﺟﻮﺩ ﺍﻟﮑﺘﺮﻳﺴﻴﺘﻪ ،ﺍﻣﮑﺎﻥ ﺑﺮﻭﺯ ﺁﺗﺶ ﺳﻮﺯﻱ ﻭﺟﻮﺩ
•
ﺳﺒﮏ ﻭﺯﻥ .ﻭﺯﻥ ﻳﮏ ﮐﺎﺑﻞ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺑﻤﺮﺍﺗﺐ ﮐﻤﺘﺮ ﺍﺯ ﮐﺎﺑﻞ ﻣﺴﻲ )ﻗﺎﺑﻞ ﻣﻘﺎﻳﺴﻪ(
•
ﺍﻧﻌﻄﺎﻑ ﭘﺬﻳﺮ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻧﻌﻈﺎﻑ ﭘﺬﻳﺮﻱ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﻭ ﻗﺎﺑﻠﻴﺖ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ
ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ. ﺍﺳﺖ.
ﻧﻮﺭ ﺍﺯ ﺁﻧﺎﻥ ،ﺩﺭ ﻣﻮﺍﺭﺩ ﻣﺘﻔﺎﻭﺕ ﻧﻈﻴﺮ ﺩﻭﺭﺑﻴﻦ ﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻝ ﺑﺎ ﻣﻮﺍﺭﺩ ﮐﺎﺭﺑﺮﺩﻱ ﺧﺎﺹ
ﻣﺎﻧﻨﺪ :ﻋﮑﺲ ﺑﺮﺩﺍﺭﻱ ﭘﺰﺷﮑﻲ ،ﻟﻮﻟﻪ ﮐﺸﻲ ﻭ ...ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ. ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺰﺍﻳﺎﻱ ﻓﺮﺍﻭﺍﻥ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ،ﺍﻣﺮﻭﺯﻩ ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ﮐﺎﺑﻞ ﻫﺎ ﺩﺭ ﻣﻮﺍﺭﺩ ﻣﺘﻔﺎﻭﺗﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺍﮐﺜﺮ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﻭ ﻳﺎ ﻣﺨﺎﺑﺮﺍﺕ ﺍﺯﺭﺍﻩ ﺩﻭﺭ ﺩﺭ ﻣﻘﻴﺎﺱ ﻭﺳﻴﻌﻲ ﺍﺯ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
390
ﺍﻳﺠﺎﺩ ﮐﺎﺑﻞ X-Over ﮐﺎﺑﻞ ﻫﺎﻱ ﮐﺮﺍﺱ CAT5 UTPﮐﻪ ﺍﺯ ﺁﻧﺎﻥ ﺑﺎ ﻧﺎﻡ X-overﻧﻴﺰ ﻧﺎﻡ ﺑﺮﺩﻩ ﻣﻲ ﺷﻮﺩ،
ﻳﮑﻲ ﺍﺯ ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﮐﺎﺑﻞ ﻫﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﭘﺲ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ Straightﻣﻲ ﺑﺎﺷﻨﺪ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ﻓﻮﻕ ،ﻣﻲ ﺗﻮﺍﻥ ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺭﺍ ﺑﺪﻭﻥ ﻧﻴﺎﺯ ﺑﻪ ﻳﮏ ﻫﺎﺏ ﻭ ﻳﺎ ﺳﻮﺋﻴﭻ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻧﻤﻮﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﮐﻪ ﻫﺎﺏ ﻋﻤﻠﻴﺎﺕ X-overﺭﺍ ﺑﻪ ﺻﻮﺭﺕ ﺩﺍﺧﻠﻲ ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﺪ ،ﺩﺭ ﺯﻣﺎﻧﻲ ﮐﻪ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺭﺍ ﺑﻪ ﻳﮏ ﻫﺎﺏ ﻣﺘﺼﻞ ﻣﻲ ﻧﻤﺎﺋﻴﻢ ،ﺻﺮﻓﺎ" ﺑﻪ ﻳﮏ
ﮐﺎﺑﻞ Straightﻧﻴﺎﺯ ﻣﻲ ﺑﺎﺷﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻗﺼﺪ ﺍﺗﺼﺎﻝ ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﺭﺍ ﺑﺪﻭﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﻫﺎﺏ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﻋﻤﻠﻴﺎﺕ X-overﺭﺍ ﺑﻪ ﺻﻮﺭﺕ ﺩﺳﺘﻲ ﺍﻧﺠﺎﻡ ﺩﺍﺩ ﻭ ﮐﺎﺑﻞ ﻣﺨﺘﺺ ﺁﻥ ﺭﺍ ﺍﻳﺠﺎﺩ ﻧﻤﻮﺩ. ﭼﺮﺍ ﺑﻪ ﮐﺎﺑﻞ ﻫﺎﻱ X-overﻧﻴﺎﺯ ﺩﺍﺭﻳﻢ ؟
ﺩﺭ ﺯﻣﺎﻥ ﻣﺒﺎﺩﻟﻪ ﺩﺍﺩﻩ ﺑﻴﻦ ﺩﻭ ﺩﺳﺘﮕﺎﻩ ) ﻣﺜﻼ" ﮐﺎﻣﭙﻴﻮﺗﺮ ( ،ﻳﮑﻲ ﺍﺯ ﺁﻧﺎﻥ ﺑﻪ ﻋﻨﻮﺍﻥ
ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﻭ ﺩﻳﮕﺮﻱ ﺑﻪ ﻋﻨﻮﺍﻥ ﻓﺮﺳﺘﻨﺪﻩ ﺍﻳﻔﺎﻱ ﻭﻇﻴﻔﻪ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺗﻤﺎﻣﻲ ﻋﻤﻠﻴﺎﺕ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺍﺯ ﻃﺮﻳﻖ ﮐﺎﺑﻞ ﻫﺎﻱ ﺷﺒﮑﻪ ﺍﻧﺠﺎﻡ ﻣﻲ ﺷﻮﺩ .ﻳﮏ ﮐﺎﺑﻞ ﺷﺒﮑﻪ ﺍﺯ ﭼﻨﺪﻳﻦ ﺭﺷﺘﻪ ﺳﻴﻢ ﺩﻳﮕﺮ
ﺗﺸﮑﻴﻞ ﻣﻲ ﮔﺮﺩﺩ .ﺍﺯ ﺑﺮﺧﻲ ﺭﺷﺘﻪ ﺳﻴﻢ ﻫﺎ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﻭ ﺍﺯ ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﺑﻪ ﻣﻨﻈﻮﺭ
ﺩﺭﻳﺎﻓﺖ ﺩﺍﺩﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻳﮏ ﮐﺎﺑﻞ X-overﺍﺯ ﺭﻭﻳﮑﺮﺩ ﻓﻮﻕ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﻭ ) TXﺍﺭﺳﺎﻝ ( ﻳﮏ ﺳﻤﺖ ﺑﻪ ) RXﺩﺭﻳﺎﻓﺖ ( ﺳﻤﺖ ﺩﻳﮕﺮ ،ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ .ﺷﮑﻞ ﺯﻳﺮ ﻧﺤﻮﻩ ﺍﻧﺠﺎﻡ ﺍﻳﻦ ﻋﻤﻠﻴﺎﺕ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ :
ﺍﺗﺼﺎﻝ ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﮐﺎﺑﻞ X-over
391
ﮐﺎﺑﻞ CAT5 X-over
ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﮐﺎﺑﻞ ﻫﺎﻱ ﮐﺮﺍﺱ CAT5ﺻﺮﻓﺎ" ﺍﺯ ﻳﮏ ﺭﻭﺵ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﻗﺒﻼ" ﺍﺷﺎﺭﻩ ﮔﺮﺩﻳﺪ ،ﻳﮏ ﮐﺎﺑﻞ X-overﭘﻴﻦ TXﻳﮏ ﺳﻤﺖ ﺭﺍ ﺑﻪ ﭘﻴﻦ RX
ﺳﻤﺖ ﺩﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﻧﻤﺎﻳﺪ) ﻭ ﺑﺮﻋﮑﺲ( .ﺷﮑﻞ ﺯﻳﺮ ﺷﻤﺎﺭﻩ ﭘﻴﻦ ﻫﺎﻱ ﻳﮏ ﮐﺎﺑﻞ CAT5
ﻣﻌﻤﻮﻟﻲ X-overﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ. ﺷﻤﺎﺭﻩ ﭘﻴﻦ ﻫﺎﻱ ﻳﮏ ﮐﺎﺑﻞ CAT5 X- . over
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﺩﺭ ﺷﮑﻞ ﻓﻮﻕ ﻣﺸﺎﻫﺪﻩ ﻣﻲ ﮔﺮﺩﺩ ﺩﺭ ﮐﺎﺑﻞ ﻫﺎﻱ X-overﺻﺮﻓﺎ" ﺍﺯ ﭘﻴﻦ ﻫﺎﻱ
ﺷﻤﺎﺭﻩ ﻳﮏ ،ﺩﻭ ،ﺳﻪ ﻭ ﺷﺶ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﭘﻴﻦ ﻫﺎﻱ ﻳﮏ ﻭ ﺩﻭ ﺑﻤﻨﺰﻟﻪ ﻳﮏ ﺯﻭﺝ ﺑﻮﺩﻩ ﻭ ﭘﻴﻦ ﻫﺎﻱ ﺳﻪ ﻭ ﺷﺶ ﺯﻭﺝ ﺩﻳﮕﺮ ﺭﺍ ﺗﺸﮑﻴﻞ ﻣﻲ ﺩﻫﻨﺪ .ﺍﺯ ﭘﻴﻦ ﻫﺎﻱ ﭼﻬﺎﺭ ،ﭘﻨﺞ ،ﻫﻔﺖ ﻭ ﻫﺸﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲ ﮔﺮﺩﺩ ) .ﺻﺮﻓﺎ" ﺍﺯ ﭼﻬﺎﺭ ﭘﻴﻦ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻳﮏ ﮐﺎﺑﻞ ، X-overﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ (. ﻣﻮﺍﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ X-over
ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ X-overﺻﺮﻓﺎ" ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲ ﺷﻮﺩ ﻭ
ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺁﻧﺎﻥ ﺩﺭ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﻧﻈﻴﺮ ﺳﻮﺋﻴﭻ ﻭ ﻳﺎ ﻫﺎﺏ ﻧﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻗﺼﺪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ ﺩﻭ ﻫﺎﺏ ﺭﺍ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻧﻤﺎﺋﻴﻢ ،ﻣﻌﻤﻮﻻ" ﺍﺯ ﭘﻮﺭﺕ uplinkﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﭘﻮﺭﺕ ﻓﻮﻕ ،ﺑﺨﺶ ﻫﺎﻱ txﻭ rxﺭﺍ ﮐﺮﺍﺱ ﻧﻤﻲ ﻧﻤﺎﻳﺪ.
392
ﺷﮑﻞ ﺯﻳﺮ ﻧﺤﻮﻩ ﺍﺗﺼﺎﻝ ﺩﻭ ﻫﺎﺏ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﮐﺎﺑﻞ Straightﻭ ﺍﺯ ﻃﺮﻳﻖ ﭘﻮﺭﺕ Uplinkﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ:
ﺍﺗﺼﺎﻝ ﺩﻭ ﻫﺎﺏ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻮﺭﺕ Uplinkﻭ ﻳﮏ ﮐﺎﺑﻞ Straight
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻭﺟﻮﺩ ﭘﻮﺭﺕ ، uplinkﻧﻴﺎﺯﻱ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﮐﺎﺑﻞ x-overﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ.
ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻮﺭﺕ uplinkﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻭ ﺑﺨﻮﺍﻫﻴﻢ ﺩﻭ ﻫﺎﺏ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎﻱ ﻣﻌﻤﻮﻟﻲ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻧﻤﺎﺋﻴﻢ ،ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﻳﮏ ﮐﺎﺑﻞ X-over ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﺷﮑﻞ ﺯﻳﺮ ﻧﺤﻮﻩ ﺍﺗﺼﺎﻝ ﺩﻭ ﻫﺎﺏ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﮐﺎﺑﻞ X-over ﺭﺍ ﻭ ﺑﺪﻭﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻮﺭﺕ Uplinkﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ:
ﺍﺗﺼﺎﻝ ﺩﻭ ﻫﺎﺏ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻮﺭﺕ ﻣﻌﻤﻮﻟﻲ ﻭ ﻳﮏ ﮐﺎﺑﻞ X-over
393
ﺷﮑﻞ ﺯﻳﺮ ﺗﻔﺎﻭﺕ ﻣﻮﺟﻮﺩ ﺑﻴﻦ ﺷﻤﺎﺭﻩ ﭘﻴﻦ ﻫﺎﻱ ﻳﮏ ﮐﺎﺑﻞ Straightﻭ X-overﺭﺍ ﻧﺸﺎﻥ
ﻣﻲ ﺩﻫﺪ :
ﺗﻔﺎﻭﺕ ﺷﻤﺎﺭﻩ ﭘﻴﻦ ﻫﺎﻱ ﺑﻴﻦ ﮐﺎﺑﻞ Straightﻭ X-over
394
ﺍﻳﺠﺎﺩ ﮐﺎﺑﻞ Straight ﮐﺎﺑﻞ ﮐﺸﻲ ﺷﺒﮑﻪ ﻳﮑﻲ ﺍﺯ ﻣﺮﺍﺣﻞ ﻣﻬﻢ ﺩﺭ ﺯﻣﺎﻥ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻳﮏ ﺷﺒﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺳﺖ ﮐﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺎ ﺩﻗﺖ،ﻇﺮﺍﻓﺖ ﺧﺎﺹ ﻭ ﭘﺎﻳﺒﻨﺪﻱ ﺑﻪ ﺍﺻﻮﻝ ﮐﺎﺑﻞ ﮐﺸﻲ ﺳﺎﺧﺖ ﻳﺎﻓﺘﻪ ،ﺍﻧﺠﺎﻡ ﺷﻮﺩ .ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﮐﺎﺑﻞ ﻫﺎﻱ UTPﺍﺯ ﺗﺠﻬﻴﺰﺍﺕ ﺯﻳﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ : ﺗﺠﻬﻴﺰﺍﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ
ﮐﺎﻧﮑﺘﻮﺭﻫﺎﻱ RJ-
ﮐﺎﺑﻞ UTP
45 ﺁﭼﺎﺭ ﭘﺮﺱ RJ-45ﺳﻴﻢ ﻟﺨﺖ ﮐﻦ
ﻳﮑﻲ ﺍﺯ ﻋﻮﺍﻣﻞ ﺗﺎﺛﻴﺮ ﮔﺬﺍﺭ ﺩﺭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻭ ﻧﮕﻬﺪﺍﺭﻱ ﻳﮏ ﺷﺒﮑﻪ ،ﻧﺤﻮﻩ ﮐﺎﺑﻞ ﮐﺸﻲ ﺁﻥ ﺍﺳﺖ. ﺑﺎ ﺭﻋﺎﻳﺖ ﺍﺻﻮﻝ ﮐﺎﺑﻞ ﮐﺸﻲ ﺳﺎﺧﺘﻴﺎﻓﺘﻪ ،ﺩﺭ ﺻﻮﺭﺕ ﺑﺮﻭﺯ ﺍﺷﮑﺎﻝ ﺩﺭ ﺷﺒﮑﻪ ،ﺗﺸﺨﻴﺺ ﻭ ﺍﺷﮑﺎﻝ ﺯﺩﺍﺋﻲ ﺁﻥ ﺑﺎ ﺳﺮﻋﺘﻲ ﻣﻨﺎﺳﺒﻲ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ. ﻣﺮﺍﺣﻞ ﺍﻳﺠﺎﺩ ﻳﮏ ﮐﺎﺑﻞ :ﺑﺪﻭﻥ ﻫﻴﭽﮕﻮﻧﻪ ﺗﻮﺿﻴﺢ ﺍﺿﺎﻓﻪ ! ﻣﺮﺣﻠﻪ ﺩﻭﻡ
ﻣﺮﺣﻠﻪ ﺍﻭﻝ
ﻣﺮﺣﻠﻪ ﭼﻬﺎﺭﻡ
ﻣﺮﺣﻠﻪ ﺳﻮﻡ
395
ﻣﺮﺣﻠﻪ ﭘﻨﺠﻢ
ﻣﺪﻝ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﮐﺎﺑﻞ ﮐﺸﻲ ﮐﺎﺑﻞ ﻫﺎﻱ UTP
ﺑﻪ ﻣﻨﻈﻮﺭ ﮐﺎﺑﻞ ﮐﺸﻲ ﮐﺎﺑﻞ ﻫﺎﻱ UTPﺍﺯ ﺩﻭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻣﺘﻔﺎﻭﺕ T-568Aﻭ
T-568Bﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ ﺩﻭ ﻣﺪﻝ ﻓﻮﻕ ﻳﮑﺴﺎﻥ ﺑﻮﺩﻩ ﻭ ﺗﻨﻬﺎ ﺗﻔﺎﻭﺕ ﻣﻮﺟﻮﺩ ﺑﻪ ﺭﻧﮓ ﺯﻭﺝ ﻫﺎﺋﻲ ﺍﺳﺖ ﮐﻪ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﺷﻮﻧﺪ .ﺩﺭ ﮐﺎﺑﻞ ﻫﺎﻱ UTPﺍﺯ ﮐﺎﻧﮑﺘﻮﺭﻫﺎﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻭ ﭼﻬﺎﺭ ﺯﻭﺝ ﺳﻴﻢ ﺑﻬﻢ ﺗﺎﺑﻴﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ: •
ﺯﻭﺝ ﺍﻭﻝ :ﺁﺑﻲ ﻭ ﺳﻔﻴﺪ /ﺁﺑﻲ
•
ﺯﻭﺝ ﺩﻭﻡ :ﻧﺎﺭﻧﺠﻲ ﻭ ﺳﻔﻴﺪ /ﻧﺎﺭﻧﺠﻲ
•
ﺯﻭﺝ ﺳﻮﻡ :ﺳﺒﺰ ﻭ ﺳﻔﻴﺪ /ﺳﺒﺰ
•
ﺯﻭﺝ ﭼﻬﺎﺭﻡ :ﻗﻬﻮﻩ ﺍﻱ ﻭ ﺳﻔﻴﺪ /ﻗﻬﻮﻩ ﺍﻱ
ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ Mbit ١٠/١٠٠ﺍﺯ ﺯﻭﺝ ﻫﺎﻱ ﺩﻭ ﻭ ﺳﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﻭ ﺯﻭﺝ ﻫﺎﻱ ﻳــﮏ ﻭ
ﭼﻬﺎﺭ ﺭﺯﻭ ﺷﺪﻩ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺷـــﺒﮑﻪ ﻫﺎﻱ ﮔﻴــﮕﺎﺍﺗﺮﻧﺖ ﺍﺯ ﺗــﻤﺎﻣﻲ ﭼﻬﺎﺭ ﺯﻭﺝ ﺍﺳـﺘﻔﺎﺩﻩ
ﻣﻲ ﮔﺮﺩﺩ .ﮐﺎﺑﻞ ﻫﺎﻱ CAT5ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﻧﻮﻉ ﮐﺎﺑﻞ UTPﺑﻮﺩﻩ ﮐﻪ ﺩﺍﺭﺍﻱ ﺍﻧﻌﻄﺎﻑ ﻣﻨﺎﺳﺐ ﺑﻮﺩﻩ ﻭ ﻧﺼﺐ ﺁﻧﺎﻥ ﺑﺴﺎﺩﮔﻲ ﺍﻧﺠﺎﻡ ﻣﻲ ﺷﻮﺩ.
396
ﺍﻳﺠﺎﺩ ﻳﮏ ﮐﺎﺑﻞ UTPﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﻫﺎﺏ ) ﻣﻌﺮﻭﻑ ﺑﻪ ﮐﺎﺑﻞ ﻫﺎﻱ ( Straight
ﺍﺗﺮﻧﺖ ﻋﻤﻮﻣﺎ" ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻫﺸﺖ ﮐﺎﺑﻞ ﻫﺎﺩﻱ ﺑﻪ ﻫﻤﺮﺍﻩ ﻫﺸﺖ ﭘﻴﻦ ﻣﺎﮊﻭﻻﺭ
، plugs/jacksﺩﺍﺩﻩ ﺭﺍ ﺣﻤﻞ ﻣﻲ ﮐﻨﺪ.
ﮐﺎﻧﮑﺘﻮﺭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ RJ-45 ،ﻧﺎﻣﻴﺪﻩ ﺷﺪﻩ ﻭ ﻣﺸﺎﺑﻪ ﮐﺎﻧﮑﺘﻮﺭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ RJ-11ﺍﺳﺖ ﮐﻪ ﺩﺭ ﺗﻠﻔﻦ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻳﮏ ﺭﺷﺘﻪ ﮐﺎﺑﻞ CAT5ﺷﺎﻣﻞ ﭼﻬﺎﺭ ﺯﻭﺝ ﺳﻴﻢ ﺑﻬﻢ ﺗﺎﺑﻴﺪﻩ ﺍﺳﺖ ﮐﻪ ﻫﺮ ﺯﻭﺝ ﺩﺍﺭﺍﻱ ﺩﻭ ﺭﺷﺘﻪ ﺳﻴﻢ ﺑﺎ ﺭﻧﮓ ﻫﺎﺋﻲ ﺧﺎﺹ ﺍﺳﺖ) .ﻳﮏ ﺭﺷﺘﻪ ﺭﻧﮕﻲ ﻭ ﻳﮏ ﺭﺷﺘﻪ ﺳﻔﻴﺪ ﺑﺎ ﻧﻮﺍﺭﻱ ﺑﻪ ﺭﻧﮓ ﺭﺷﺘﻪ ﺯﻭﺝ ﻣﺮﺑﻮﻁ( .ﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺴﻬﻴﻞ ﺩﺭ ﺍﻣﺮ ﻧﮕﻬﺪﺍﺭﻱ ،ﻣﻲ ﺑﺎﻳﺴﺖ
ﺑﻪ ﺍﻧﺪﺍﺯﻩ ﺿﺮﻭﺭﻱ ﺳﻴﻢ ﻫﺎﻱ ﺑﻬﻢ ﺗﺎﺑﻴﺪﻩ ﺭﺍ ﺍﺯ ﺣﺎﻟﺖ ﭘﻴﭽﺶ ﺧﺎﺭﺝ ﻧﻤﻮﺩ )ﻣﺜﻼ" ﺣﺪﻭﺩ ﻳﮏ ﺳﺎﻧﺘﻴﻤﺘﺮ( .ﺯﻭﺝ ﻫﺎﻱ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺑﺮﺍﻱ ﺍﺗﺮﻧﺖ ﺩﻩ ﻭ ﻳﮑﺼﺪ ﻣﮕﺎﺑﻴﺖ ﺑﻪ ﺭﻧﮓ ﻧﺎﺭﻧﺠﻲ
ﻭ ﺳﺒﺰ ﻣﻲ ﺑﺎﺷﻨﺪ.
ﺍﺯ ﺩﻭ ﺯﻭﺝ ﺩﻳﮕﺮ )ﺭﻧﮓ ﻗﻬﻮﻩ ﺍﻱ ﻭ ﺁﺑﻲ( ﻣﻲ ﺗﻮﺍﻥ ﺑﻪ ﻣﻨﻈﻮﺭ ﻳﮏ ﺧﻂ ﺍﺗﺮﻧﺖ ﺩﻭﻡ ﻭ ﻳﺎ ﺍﺗﺼﺎﻻﺕ ﺗﻠـﻔﻦ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ.
ﺑﻪ ﻣﻨﻈﻮﺭ ﮐﺎﺑﻞ ﮐﺸﻲ ﮐﺎﺑﻞ ﻫﺎﻱ UTPﺍﺯ ﺩﻭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻣﺘﻔﺎﻭﺕ ﺑﺎ ﻧﺎﻡ ) T-568Bﻳﺎ ( EIAﻭ ) T-568Aﻳﺎ ،( A٢٥٨ ، T&ATﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺗﻨﻬﺎ ﺗﻔﺎﻭﺕ ﻣﻮﺟﻮﺩ ﺑﻴﻦ ﺁﻧﺎﻥ ﺗﺮﺗﻴﺐ ﺍﺗﺼﺎﻻﺕ ﺍﺳﺖ.
397
ﺷﻤﺎﺭﻩ ﭘﻴﻦ ﻫﺎﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ T568B
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﺩﺭ ﺟﺪﻭﻝ ﺯﻳﺮ ﻣﺸﺎﻫﺪﻩ ﻣﻲ ﮔﺮﺩﺩ ،ﺷﻤﺎﺭﻩ ﭘﻴﻦ ﻫﺎﻱ ﻓﺮﺩ ﻫﻤﻮﺍﺭﻩ ﺳﻔﻴﺪ
ﺑﻮﺩﻩ ﮐﻪ ﺑﺎ ﻳﮏ ﻧﻮﺍﺭ ﺭﻧﮕﻲ ﭘﻮﺷﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﻧﺪ. ﮐﺪ ﺭﻧﮓ ﻫﺎ ﺩﺭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ B٥٦٨T ﮐﺎﺭﺑﺮﺩ
ﺯﻭﺝ
TxData+
ﺩﻭﻡ
TxData-
ﺩﻭﻡ
ﺭﻧﮓ ﺳﻔﻴﺪ/
ﻧﺎﺭﻧﺠﻲ ﻧﺎﺭﻧﺠﻲ
ﺷﻤﺎﺭﻩ ﭘﻴﻦ ﻳﮏ ﺩﻭ
RecvData+ﺳﻮﻡ ﺳﻔﻴﺪ /ﺳﺒﺰ ﺳﻪ ﭼﻬﺎﺭ ﺁﺑﻲ ﻳﮏ RecvData-
ﻳﮏ
ﺳﻔﻴﺪ /ﺁﺑﻲ
ﭘﻨﺞ
ﺳﻮﻡ
ﺳﺒﺰ
ﺷﺶ
ﭼﻬﺎﺭﻡ ﭼﻬﺎﺭﻡ
ﺳﻔﻴﺪ/ﻗﻬﻮﻩ ﺍﻱ
ﻗﻬﻮﻩ ﺍﻱ ﻫﺸﺖ
ﺍﺳﺘﺎﻧﺪﺍﺭﺩ B٥٦٨T
398
ﻫﻔﺖ
ﺷﻤﺎﺭﻩ ﭘﻴﻦ ﻫﺎﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ T568A
ﺩﺭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ، T568Aﺍﺗﺼﺎﻻﺕ ﺳﺒﺰ ﻭ ﻧﺎﺭﻧﺠﻲ ﺑﺮﻋﮑﺲ ﺷﺪﻩ ﺍﺳﺖ ،ﺑﻨﺎﺑﺮﺍﻳﻦ
ﺯﻭﺝ ﻫﺎﻱ ﻳﮏ ﻭ ﺩﻭ ﺑﺮ ﺭﻭﻱ ﭼﻬﺎﺭ ﭘﻴﻦ ﻭﺳﻂ ﻗﺮﺍﺭ ﻣﻲ ﮔﻴﺮﻧﺪ )ﺳﺎﺯﮔﺎﺭﻱ ﺑﺎ ﺍﺗﺼﺎﻻﺕ
.( telco voice
ﮐﺪ ﺭﻧﮓ ﻫﺎ ﺩﺭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ A٥٦٨T ﺭﻧﮓ
ﺷﻤﺎﺭﻩ ﭘﻴﻦ
ﮐﺎﺭﺑﺮﺩ
RecvData+ﺳﻮﻡ
ﺳﻔﻴﺪ /ﺳﺒﺰ
ﻳﮏ
RecvData-ﺳﻮﻡ
ﺳﺒﺰ
ﺩﻭ
TxData+
TxData-
ﺯﻭﺝ
ﺩﻭﻡ ﺳﻔﻴﺪ /ﻧﺎﺭﻧﺠﻲ
ﺳﻪ
ﻳﮏ
ﺁﺑﻲ
ﭼﻬﺎﺭ
ﻳﮏ
ﺳﻔﻴﺪ /ﺁﺑﻲ
ﭘﻨﺞ
ﺩﻭﻡ
ﻧﺎﺭﻧﺠﻲ
ﺷﺶ
ﭼﻬﺎﺭﻡ ﺳﻔﻴﺪ/ﻗﻬﻮﻩ ﺍﻱ ﭼﻬﺎﺭﻡ
ﻗﻬﻮﻩ ﺍﻱ
ﺍﺳﺘﺎﻧﺪﺍﺭﺩ A٥٦٨T
399
ﻫﻔﺖ ﻫﺸﺖ
ﻣﻮﺍﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﮐﺎﺭﺑﺮﺩ ﻳﮏ ﮐﺎﺑﻞ ، straightﺍﺗﺼﺎﻝ ﺑﻴﻦ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻭ ﻫﺎﺏ /ﺳﻮﺋﻴﭻ
ﺍﺳﺖ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ،ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺴﺘﻘﻴﻤﺎ" ﺑﻪ ﻫﺎﺏ ﻭ ﻳﺎ ﺳﻮﺋﻴﭻ ﻣﺘﺼﻞ ﺷﺪﻩ ﮐﻪ ﺑﻪ ﺻﻮﺭﺕ ﺍﺗﻮﻣﺎﺗﻴﮏ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺪﺍﺭﺍﺗﻲ ﺧﺎﺹ ،ﮐﺎﺑﻞ over crossﻣﻲ ﮔﺮﺩﺩ.
ﺷﮑﻞ ﻓﻮﻕ ﻳﮏ ﺍﺗﺼﺎﻝ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ straightﺩﺭ ﮐﺎﺑﻞ ﻫﺎﻱ CAT5ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ ﮐﻪ ﺍﺯ ﺁﻥ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﻳﮏ PCﺑﻪ ﻫﺎﺏ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻣﻤﮑﻦ ﺍﺳﺖ ﺑﺎ ﻣﺸﺎﻫﺪﻩ ﺷﮑﻞ ﻓﻮﻕ ﺍﻧﺘﻈﺎﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﮐﻪ TX+ﻳﮏ ﻃﺮﻑ ﺑﻪ TX+ﻃﺮﻑ ﺩﻳﮕﺮ ﻣﺘﺼﻞ ﮔﺮﺩﺩ ) ﻋﻤﻼ" ﺍﻳﻦ ﺍﺗﻔﺎﻕ ﻧﻴﺎﻓﺘﺎﺩﻩ ﺍﺳﺖ ( .ﺯﻣﺎﻧﻲ ﮐﻪ ﻳﮏ PCﺑﻪ ﻫﺎﺏ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ ،ﻫﺎﺏ ﺑﻪ ﺻﻮﺭﺕ
ﺍﺗﻮﻣﺎﺗﻴﮏ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺪﺍﺭﺍﺕ ﺩﺍﺧﻠﻲ ﺧﻮﺩ ﮐﺎﺑﻞ ﺭﺍ X-overﻧﻤﻮﺩﻩ ﻭ ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ،
ﭘﻴﻦ ﺷﻤﺎﺭﻩ ﻳﮏ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮ ) ( TX +ﺑﻪ ﭘﻴﻦ ﺷﻤﺎﺭ ﻳﮏ ﻫﺎﺏ ) ( RX +ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ. ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻫﺎﺏ ﻋﻤﻠﻴﺎﺕ x-overﺭﺍ ﺍﻧﺠﺎﻡ ﻧﺪﻫﺪ ) ﺩﺭ ﺯﻣﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻮﺭﺕ
، ( Uplinkﭘﻴﻦ ﺷﻤﺎﺭﻩ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ) (TX +ﺑﻪ ﭘﻴﻦ ﺷﻤﺎﺭﻩ ﻳﮏ ﻫﺎﺏ ) ( TX +ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﻬﻢ ﻧﻴﺴﺖ ﮐﻪ ﭼﻪ ﻧﻮﻉ ﻋﻤﻠﻴﺎﺗﻲ ﺭﺍ ﺑﺎ ﭘﻮﺭﺕ HUBﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﻴـــﻢ ) Uplinkﻭ ﻳﺎ ﻧﺮﻣﺎﻝ ( ،ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﻧﺴﺒﺖ ﺩﺍﺩﻩ ﺷﺪﻩ ﺑﻪ ﻫﺸﺖ ﭘﻴﻦ ﺳﻤﺖ ،PC ﻫﻤﻮﺍﺭﻩ ﻳﮑﺴﺎﻥ ﺑﺎﻗﻲ ﻣﺎﻧﺪﻩ ﻭ ﻫﺎﺏ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﻮﻉ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻮﺭﺕ ) ﻧﺮﻣﺎﻝ ﻭ ﻳﺎ
(Uplinkﻋﻤﻠﻴﺎﺕ ﻻﺯﻡ ﺭﺍ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺩﺍﺩ.
400
ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ ﺧﻄﻮﻁ T1
ﺍﮐﺜﺮ ﺷﻤﺎ ﺑﺎ ﻳﮏ ﺧﻂ ﻣﺨﺎﺑﺮﺍﺗﻲ ﻣﻌﻤﻮﻟﻲ ﺁﺷﻨﺎ ﻫﺴﺘﻴﺪ .ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺧﻄﻮﻁ ﺍﺯ ﻳﮏ ﺯﻭﺝ ﺳﻴﻢ ﻣﺴﻲ ﮐﻪ ﻣﺴﺌﻮﻟﻴﺖ ﺍﻧﺘﻘﺎﻝ ﺻﻮﺕ ﺭﺍ ﺑﻪ ﺻﻮﺭﺕ ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﺁﻧﺎﻟﻮﮒ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ،
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺯﻣﺎﻧﻲ ﮐﻪ ﺍﻳﻦ ﻧﻮﻉ ﺧﻄﻮﻁ ﺭﺍ ﺑﻪ ﻳﮏ ﻣﻮﺩﻡ ﻣﻌﻤﻮﻟﻲ ﻣﺘﺼﻞ ﻣﻲ ﻧﻤﺎﺋﻴﻢ، ﺍﻣﮑﺎﻥ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﻩ ﺗﺎ ٣٠ﮐﻴﻠﻮ ﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ. ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺗﺤﻮﻻﺕ ﮔﺴﺘﺮﺩﻩ ﺩﺭ ﻋﺮﺻﻪ ﻣﺨﺎﺑﺮﺍﺗﻲ ،ﺍﮐﺜﺮ ﺷﺮﮐﺖ ﻫﺎﻱ ﻣﺨﺎﺑﺮﺍﺗﻲ ﺩﺭﺻﺪﺩ
ﺍﻧﺘﻘﺎﻝ ﺗﻤﺎﻣﻲ ﺗﺮﺍﻓﻴﮏ ﺻﻮﺗﻲ ﺧﻮﺩ ﺑﻪ ﺻﻮﺭﺕ ﺩﻳﺠﻴﺘﺎﻝ ﺩﺭ ﻣﻘﺎﺑﻞ ﺁﻧﺎﻟﻮﮒ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺍﻳﻦ
ﺭﺍﺑﻄﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺧﻂ ﺁﻧﺎﻟﻮﮒ ﺷﻤﺎ ﺑﻪ ﻳﮏ ﺳﻴﮕﻨﺎﻝ ﺩﻳﺠﻴﺘﺎﻝ ﺗﺒﺪﻳﻞ ﮔﺮﺩﺩ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ ٨٠٠٠ﺍﻟﮕﻮ ﻭ ﺑﺎ ﺩﻗﺖ ﻫﺸﺖ ﺑﻴﺖ ،ﻧﻤﻮﻧﻪ ﺑﺮﺩﺍﺭﻱ ﻣﻲ ﮔﺮﺩﺩ ) ٦٤،٠٠٠ﺑﻴﺖ ﺩﺭ
ﺛﺎﻧﻴﻪ( .ﺩﺭ ﺣﺎﻝ ﺣﺎﺿﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﻩ ﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻝ ﻋﻤﻮﻣﺎ" ﺍﺯ ﻓﻴﺒﺮﻧﻮﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﺷﺮﮐﺖ ﻫﺎﻱ ﻣﺨﺎﺑﺮﺍﺗﻲ ﺍﺯ ﮔﺰﻳﻨﻪ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺩﺭ ﺧﺼﻮﺹ ﻇﺮﻓﻴﺖ ﻫﺮ ﺧﻂ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻣﺤﻞ ﮐﺎﺭ ﺷﻤﺎ ﺍﺯ ﻳﮏ ﺧﻂ
T1ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺍﺳﺖ ﮐﻪ ﺷﺮﮐﺖ ﻣﺨﺎﺑﺮﺍﺕ ﻭ ﺳﺎﻳﺮ ﺷﺮﮐﺖ ﻫﺎﻱ ﻋﺮﺿﻪ ﮐﻨﻨﺪﻩ ﺳﺮﻭﻳﺲ ﻓﻮﻕ ،ﻳﮏ ﺧﻂ ﻓﻴــﺒﺮﻧﻮﺭﻱ ﺭﺍ ﺗﺎ ﻣﺤﻞ ﺍﺩﺍﺭﻩ ﺷﻤﺎ ﺁﻣﺎﺩﻩ ﻧﻤﻮﺩﻩ ﺍﻧﺪ ) .ﻳﮏ ﺧﻂ T1ﻣﻤﮑﻦ ﺍﺳﺖ ﺑﻪ ﺻﻮﺭﺕ ﻣﺴﻲ ﻧﻴﺰ ﺍﺭﺍﺋﻪ ﮔﺮﺩﺩ( .ﻳﮏ ﺧﻂ T1ﻗﺎﺩﺭ ﺑﻪ ﺣﻤﻞ ٢٤ﮐﺎﻧﺎﻝ ﺻﻮﺗﻲ ﺩﻳﺠﻴﺘﺎﻝ ﻭ ﻳﺎ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﻩ ﺑﺎ ﻣﻴﺰﺍﻥ ١ / ٥٤٤ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ
ﺍﺳﺖ.
ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺧﻂ T1ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺒﺎﺩﻻﺕ ﺗﻠﻔﻨﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ ،ﺧﻂ ﻓﻮﻕ ﺑﻪ ﺳﻴﺴﺘﻢ ﺗﻠﻔﻦ ﺍﺩﺍﺭﻩ ﺷﻤﺎ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﺯ ﺧﻂ T1ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ ،ﺧﻂ ﻓﻮﻕ ﺑﻪ ﺭﻭﺗﺮ ﺷﺒﮑﻪ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ. ﻳﮏ ﺧﻂ T1ﻗﺎﺩﺭ ﺑﻪ ﺣﻤﻞ ﺣﺪﻭﺩ ١٩٢،٠٠٠ﺑﺎﻳﺖ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ ﺍﺳﺖ ) ٦٠ﻣﺮﺗﺒﻪ ﺑﻴﺶ ﺍﺯ ﻳﮏ ﻣﻮﺩﻡ ﻣﻌﻤﻮﻟﻲ( .ﺿﺮﻳﺐ ﺍﻋﺘﻤﺎﺩ ﺑﻪ ﺍﻳﻨﮕﻮﻧﻪ ﺧﻄﻮﻁ ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ﻳﮏ ﻣﻮﺩﻡ ﺁﻧﺎﻟﻮﮒ
401
ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮ ﺍﺳﺖ .ﻳﮏ ﺧﻂ T1ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﻪ ﺻﻮﺭﺕ ﻣﺸﺘﺮﮎ ﺗﻮﺳﻂ ﮐﺎﺭﺑﺮﺍﻥ ﻣﺘﻌﺪﺩﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﻮﺩ )ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﻮﻉ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺎﺭﺑﺮﺍﻥ( .ﻣﺜﻼ" ﺩﺭ ﺻﻮﺭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻌﻤﻮﻟﻲ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ،ﺻﺪﻫﺎ ﮐﺎﺭﺑﺮ ﻗﺎﺩﺭ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﺸﺘﺮﮎ ﺍﺯ ﻳﮏ ﺧﻂ T1ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ
ﺗﻤﺎﻣﻲ ﮐﺎﺭﺑﺮﺍﻥ ﻓﺎﻳﻞ ﻫﺎﻱ MP3ﺭﺍ Downloadﻧﻤﻮﺩﻩ ﻭ ﻳﺎ ﻓﺎﻳﻞ ﻫﺎﻱ ﻭﻳﺪﺋﻮﺋﻲ ﺭﺍ ﺑﻄﻮﺭ ﻫﻤﺰﻣﺎﻥ ﻣﺸﺎﻫﺪﻩ ﻧﻤﺎﻳﻨﺪ ،ﻇﺮﻓﻴﺖ ﻭ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻣﻮﺟﻮﺩ ﺟﻮﺍﺑﮕﻮ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ ،ﮔﺮﭼﻪ ﺍﺣﺘﻤﺎﻝ
ﺗﺤﻘﻖ ﭼﻨﻴﻦ ﺷﺮﺍﻳﻄﻲ ﺩﺭ ﻳﮏ ﻣﻘﻄﻊ ﺯﻣﺎﻧﻲ ﺧﺎﺹ ﻭ ﺑﻄﻮﺭ ﻫﻤﺰﻣﺎﻥ ،ﮐﻢ ﻣﻲ ﺑﺎﺷﺪ.
ﻳﮏ ﺷﺮﮐﺖ ﺑﺰﺭﮒ ﺑﻪ ﭼﻴﺰﻱ ﺑﻴﺶ ﺍﺯ ﻳﮏ ﺧﻂ T1ﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﺟﺪﻭﻝ ﺯﻳﺮ ﺑﺮﺧﻲ ﺍﺯ ﮔﺰﻳﻨﻪ ﻫﺎﻱ ﻣﺘﺪﺍﻭﻝ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ: ﻣﻌﺎﺩﻝ
ﻧﻮﻉ ﺧﻂ
٦٤ﮐﻴﻠﻮﺑﻴﺖ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ
DS0
ﻣﻌﺎﺩﻝ ﺩﻭ ﺧﻂ DS0ﺑﻪ ﺍﺿﺎﻓﻪ ﺳﻴﮕﻨﺎﻟﻴﻨﮓ ) ١٦ ﮐﻴﻠﻮﺑﻴﺖ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ ( ﻭ ﻳﺎ ١٢٨ﮐﻴﻠﻮ ﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ
ISDN
١ ٥٤٤ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ ) ﻣﻌﺪﺍﻝ ٢٤ﺧﻂ ( DS0
T1
٤٣ /٢٣٢ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ ) ﻣﻌﺎﺩﻝ ٢٨ﺧﻂ ( T1
T3
١٥٥ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ ) ﻣﻌﺎﺩﻝ ٨٤ﺧﻂ ( T1
OC3
٦٢٢ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ ) ﻣﻌﺎﺩﻝ ٤ﺧﻂ ( OC3
OC12
٢ / ٥ﮔﻴﮕﺎﺑﻴﺖ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ ) ﻣﻌﺎﺩﻝ ٤ﺧﻂ OC48 ( OC12 ٩ / ٦ﮔﻴﮕﺎﺑﻴﺖ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ ) ﻣﻌﺪﺍﻝ ٤ﺧﻂ OC192 ( OC48
402