Internet & Network
Internet & Network
2
ﺻﻔﺤﻪ ﺑﺨﺶ ﭼﻬﺎﺭﻡ ﺷﺒﮑﻪ
3
-ﻫﺎﺏ ﻭ ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ ﺁﻥ ۲۷۱......................................................................................
ﺳﻮﺋﻴﭻ ۲۷۵................................................................................................................... -
-ﻣﻔﻬﻮﻡ ﺭﻭﺗﻴﻨﮓ ۲۹۳......................................................................................................
-ﭘﺮﻭﺗﮑﻞ ﺭﻭﺗﻴﻨﮓ۲۹۵.....................................................................................................
-ﻓﺮﺁﻳﻨﺪ ﺭﻭﺗﻴﻨﮓ۲۹۷.......................................................................................................
ﺭﻭﺗﺮ ۳۰۳..................................................................................................................... -
-ﺭﺍﻩ ﺍﻧﺪﺍﺯﯼ ﺍﻭﻟﻴﻪ ﺭﻭﺗﺮ۳۱۳.............................................................................................
-ﺁﺷﻨﺎﺋﯽ ﺑﺎ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﺭﻭﺗﺮ۳۱۷..................................................................................
-ﺭﺍﻩ ﺍﻧﺪﺍﺯﯼ ﺍﻭﻟﻴﻪ ﺭﻭﺗﺮ :ﺍﻳﺠﺎﺩ ﻳﮏ )۳۲۴..................( Hyper Terminal Session
-ﺁﺷﻨﺎﺋﯽ ﺑﺎ ﻋﻨﺎﺻﺮ ﺩﺍﺧﻠﯽ ﺭﻭﺗﺮ۳۲۸................................................................................
-ﺁﺷﻨﺎﺋﯽ ﺑﺎ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﯼ ﺭﻭﺗﺮ۳۳۳...............................................................................
-ﺭﻭﺗﺮ ﻭ ﺟﺎﻳﮕﺎﻩ ﺁﻥ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﯼ ۳۳۹............................................................WAN
-ﺍﻧﻮﺍﻉ ﺭﻭﺗﺮ۳۴۶.............................................................................................................
ﺭﻭﺗﺮﻫﺎﻱ ﺳﻴﺴﮑﻮ۳۵۰.................................................................................................. -
-ﭘﻴﮑﺮﺑﻨﺪﯼ ﺭﻭﺗﺮ ﻫﺎﯼ ﺳﻴﺴﮑﻮ۳۵۵.................................................................................
-ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ۳۶۴..........................................................................................
-ﺍﻧﻮﺍﻉ ﺷﺒﮑﻪ ﻫﺎﻱ ۳۷۰................................................................................Wireless
-ﭘﻴﮑﺮﺑﻨﺪﻱ ﺷﺒﮑﻪ ۳۷۳.................................................................................Wireless
-ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻭ ﻣﻴﺰﺍﻥ ﺗﺄﺧﻴﺮ ۳۷۶.....................................................................................
-ﺍﻧﻮﺍﻉ ﮐﺎﺑﻞ ۳۸۰............................................................................................................
-ﻓﻴﺒﺮ ﻧﻮﺭﻱ ۳۸۵............................................................................................................
-ﺍﻳﺠﺎﺩ ﮐﺎﺑﻞ ۳۹۱...........................................................................................X-Over
-ﺍﻳﺠﺎﺩ ﮐﺎﺑﻞ ۳۹۵.........................................................................................Straight
-ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ ﺧﻄﻮﻁ ۴۰۱....................................................................................T1
4
5
ﻣﻌﺮﻓﻲ ﺷﺒﻜﻪ ﭘﻬﻨﺎﻭﺭ ﺟﻬﺎﻧﻲ )(World Wide Web
ﻗﺒﻞ ﺍﺯ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻥ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﻭﺏ ,ﺭﻭﻳﺎﻱ ﺯﺍﻧﺪﺍ ﻣﻄﺮﺡ ﺑﻮﺩ .ﺩﺭ ﺍﻳﻦ ﺭﻭﻳﺎ ﺗﻤﺎﻣﻲ
ﻋﻠﻮﻡ ,ﻣﺴﺘﻨﺪﺍﺕ ,ﺗﺼﺎﻭﻳﺮ ,ﺻﻮﺕ ,ﻭﻳﺪﺋﻮ ﻭ… ﺗﻮﺳﻂ ﻫﺮ ﻓﺮﺩ ﻛﻪ ﺩﺍﺭﺍﻱ ﻳﻜﺪﺳﺘﮕﺎﻩ ﻛﺎﻣﭙﻴﻮﺗﺮ
ﺑﻮﺩ ﺩﺭ ﻫﺮ ﺯﻣﺎﻥ ﻭ ﻣﻜﺎﻥ ﺩ ﻟﺨﻮﺍﻩ ,ﻗﺎﺑﻞ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻮﺩ .ﺯﺍﻧﺪﺍ ،ﺭﻭﻳﺎﻱ" ﺗﺪﻧﻠﺴﻮﻥ " ﺍﺯ ﻳﻚ
ﻛﺎﻣﭙﻴﻮﺗﺮ ﺧﻴﺎﻟﻲ ﺑﻮﺩ .ﻭﻱ ﺩﻧﻴﺎﺋﻲ ﺭﺍ ﻛﻪ ﺩﺭ ﺁﻥ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﻃﺮﻳﻖ ﺍﺑﺮ ﻣﺘﻦ ﻫﺎ ﻭ ﺍﺑﺮ ﺭﺳﺎﻧﻪ ﻫﺎ
ﺑﺼﻮﺭﺕ ﻳﻚ ﺷﺒﻜﻪ ﺗﺎﺭ ﻋﻨﻜﺒﻮﺗﻲ ﺑﻬﻢ ﻣﺘﺼﻞ ﻭ ﻣﺮﺗﺒﻂ ﻣﻲ ﮔﺮﺩﻳﺪﻧﺪ ,ﭘﻴﺶ ﺑﻴﻨﻲ ﻛﺮﺩﻩ ﺑﻮﺩ .ﺩﺭ
ﺍﻳﻦ ﺩﻧﻴﺎ ﺍﻃﻼﻋﺎﺕ ﺑﺼﻮﺭﺕ ﻳﻚ ﻛﺘﺎﺑﺨﺎﻧﻪ ﺟﻬﺎﻧﻲ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﻣﻲ ﺷﻮﻧﺪ .ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻳﻦ
ﻛﺘﺎﺑﺨﺎﻧﻪ ﺟﻬﺎﻧﻲ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺗﺎﺛﻴﺮ ﺷﮕﺮﻓﻲ ﺩﺭ ﺟﻮﺍﻣﻊ ﻣﺘﻔﺎﻭﺕ ﺑﺸﺮﻱ ﺭﺍ ﺑﺪﻧﺒﺎﻝ ﺩﺍﺷﺘﻪ ﻭ
ﻣﻨﺸﺎ ﺑﺮﻭﺯ ﺗﺤﻮﻻﺕ ﻋﻈﻴﻢ ﺩﺭ ﺣﻴﺎﺕ ﺑﺸﺮﻱ ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
ﺯﺍﻧﺪﺍ ﻳﻚ ﺭﻭﻳﺎ ﺑﻮﺩ ،ﻭﻟﻲ ﺍﻣﺮﻭﺯ ﺑﺎ ﻭﺍﻗﻌﻴﺘﻲ ﺑﻨﺎﻡ ﻭﺏ ﻣﻮﺍﺟﻪ ﻫﺴﺘﻴﻢ .ﺑﻪ ﮐﻤﮏ ﻭﺏ
ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ،ﺻﺮﻓﻨﻈﺮ ﺍﺯ ﻣﺤﻞ ﺍﺳﺘﻘﺮﺍﺭ ﺑﻬﻢ ﭘﻴﻮﻧﺪ ﺧﻮﺭﺩﻩ ﻭ ﺍﻣﻜﺎﻥ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺩﺭﻳﺎﺋﻲ
ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪﻩ ﻓﺮﺍﻫﻢ ﻣﻴﮕﺮﺩﺩ .ﺍﻃﻼﻋﺎﺕ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﻣﺎﻫﻴﺘﻲ ﻛﺎﻣﻼ" ﭘﻮﻳــﺎ
ﻣﻲ ﺑﺎﺷﻨﺪ .ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﻚ ﺩﺍﻳﺮﻩ ﺍﻟﻤﻌﺎﺭﻑ ﺑﺼﻮﺭﺕ ﺍﻳﺴﺘﺎ ﻣﻲ ﺑﺎﺷﻨﺪ ﻭﻟﻲ ﺍﻃﻼﻋﺎﺕ
ﻣﻮﺟﻮﺩ ﺩﺭ ﻭﺏ ﺑﺼﻮﺭﺕ ﭘﻮﻳﺎ ﺑﻮﺩﻩ ﻭ ﺩﺍﺋﻤﺎ" ﺑﻬﻨﮕﺎﻡ ﻣﻴﺸﻮﻧﺪ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻭﺏ ﻣﻴﺘﻮﺍﻥ ﺩﺭ
ﺳﺮﻳﻌﺘﺮﻳﻦ ﺯﻣﺎﻥ ﻣﻤﻜﻦ ﺑﻪ ﺟﺪﻳﺪﺗﺮﻳﻦ ﺍﻃﻼﻋﺎﺕ ﺩﺳﺘﻴﺎﺑﻲ ﭘﻴﺪﺍ ﻛﺮﺩ.ﺍﻃﻼﻋﺎﺕ ﻓﻮﻕ ﺍﺯ ﻃﺮﻳﻖ
ﺳﺎﻳﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﻛﻪ ﻫﺮ ﻛﺪﺍﻡ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺩﺭ ﻳﻚ ﻭ ﻳﺎ ﭼﻨﺪﻳﻦ ﻣﺤﻞ ﻣﺴﺘﻘﺮ ﻳﺎﺷﻨﺪ ﺩﺭ
ﺍﺧﺘﻴﺎﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪﻩ ﻗﺮﺍﺭ ﻣﻴﮕﻴﺮﺩ .ﻭﺏ ﭘﺘﺎﻧﺴﻴﻞ ﺑﺎﻻﻱ ﺧﻮﺩ ﺭﺍ ﻣﺪﻳﻮﻥ ﺩﻭ ﺗﻜﻨﻮﻟﻮﮊﻱ
ﻣﺪﺭﻥ " :ﺍﺑﺮ ﻣﺘﻦ ﻫﺎ") (HyperTextﻭ" ﺍﺑﺮ ﺭﺳﺎﻧﻪ ﻫﺎ " ) (HyperMediaﺍﺳﺖ .ﺩﺭ
ﺍﺑﺮﻣﺘﻦ ﻫﺎ ,ﺍﻃﻼﻋﺎﺕ ﻣﺮﺗﺒﻂ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺭﻭﺵ ﻣﺪﻭﻥ ﺑﻬﻢ ﭘﻴﻮﻧﺪ ﺯﺩﻩ ﻣﻴﺸﻮﻧﺪ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ
ﺍﺯ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺑﻴﻦ ﺍﻃﻼﻋﺎﺕ ،ﻣﻴﺘﻮﺍﻥ ﺑﺎ ﻫﺮ ﺭﻭﺵ ﺩﻟﺨﻮﺍﻩ ﻭ ﻃﻲ ﻳﻚ ﻣﺴﻴﺮ ﺧﻄﻲ
ﻭ ﻳﺎ ﻏﻴﺮ ﺧﻄﻲ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺩﺳﺘﻴﺎﺑﻲ ﭘﻴﺪﺍ ﻛﺮﺩ.
6
ﺑﻬﺮ ﺣﺎﻝ ﺯﻣﺎﻧﻴﻜﻪ ﻣﺠﻤﻮﻋﻪ ﻭﺳﻴﻌﻲ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﺎ ﻫﺮ ﺭﻭﺵ ﻣﻤﻜﻦ ﺫﺧﻴﺮﻩ ﻧﻤﺎﺋﻴﻢ,
ﻣﻲ ﺑﺎﻳﺴﺖ ﺭﻭﺷﻬﺎﺋﻲ ﺭﺍ ﻧﻴﺰ ﺑﺮﺍﻱ ﺑﺎﺯﻳﺎﺑﻲ ﻭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺁﻧﺎﻥ ﺗﺪﻭﻳﻦ ﻧﻤﻮﺩ .ﺩﺭ ﻣﺪﻟﻬﺎﻱ
ﻗﺪﻳﻤﻲ ﺟﻬﺖ ﺣﺮﮐﺖ ﺍﺯ ﻳﻚ ﺻﻔﺤﻪ )ﻳﻚ ﺣﺮﻳﻢ ﺍﻃﻼﻋﺎﺗﻲ( ﺑﻪ ﺻﻔﺤﻪ ﺩﻳﮕﺮ ،ﻣﻲ ﺑﺎﻳﺴﺖ
ﺑﺼﻮﺭﺕ ﺧﻄﻲ ﺣﺮﻛﺖ ﻧﻤﻮﺩ ).ﺍﺑﺘﺪﺍ ﺻﻔﺤﻪ ﻳﻚ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﺻﻔﺤﻪ ﺩﻭ ﻭ …( ﺩﺭ ﻳﻚ
ﺍﺑﺮ ﻣﺘﻦ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﻣﻴﺘﻮﺍﻥ ﺍﺯ ﻳﻚ ﻭﺍﮊﻩ ﺑﻪ ﻭﺍﮊﻩ ﺩﻳﮕﺮ ﭘﺮﺵ ﻭ
ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﻣﺸﺎﻫﺪﻩ ﻧﻤﻮﺩ.ﻣﺜﻼ" ﺩﺭ ﻳﻚ ﺩﺍﻳﺮﻩ ﺍﻟﻤﻌﺎﺭﻑ ﻛﻪ ﺑﺼﻮﺭﺕ ﺍﺑﺮ ﻣﺘﻨﻲ ﭘﻴﺎﺩﻩ
ﺳﺎﺯﻱ ﺷﺪﻩ ﺍﺳﺖ ,ﻣﻴﺘﻮﺍﻥ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ " ﻧﻴﻤﺎ ﻳﻮﺷﻴﺞ " ﻣﺸﺎﻫﺪﻩ ﻭ ﺩﺭ ﻫﻤﺎﻥ
ﻭﺿﻌﻴﺖ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﻧﻴﺰ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ " ﻳﻮﺷﻴﺞ " ﺯﺍﺩﮔﺎﻩ ﻭﻱ ﻣﺸﺎﻫﺪﻩ ﻧﻤﻮﺩ .ﺩﺭ ﺯﻣﺎﻥ ﻣﺸﺎﻫﺪﻩ
ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ "ﻳﻮﺷﻴﺞ " ﻣﻴﺘﻮﺍﻥ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺍﺳﺘﺎﻥ ﻣﺎﺯﻧﺪﺭﺍﻥ ﻧﻴﺰ ﺩﺭﻳﺎﻓﺖ
ﻛﺮﺩ .ﺩﺭ ﮔﺬﺷﺘﻪ ﺍﻛﺜﺮ ﺍﻃﻼﻋﺎﺗﻲ ﻛﻪ ﺍﺯ ﻃﺮﻳﻖ ﻭﺏ ﺩﺭﺍﺧﺘﻴﺎﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪﮔﺎﻥ ﻗﺮﺍﺭ ﻣﻲ ﮔﺮﻓﺖ
ﺑﺼﻮﺭﺕ"ﻣﺘﻦ") (Textﺑﻮﺩ ,ﻭﻟﻲ ﺍﻣﺮﻭﺯﻩ ﺑﺎ ﺑﻜﺎﺭﮔﻴﺮﻱ ﺍﻣﻜﺎﻧﺎﺕ ﭼﻨﺪ ﺭﺳﺎﻧﻪ ﺍﻱ
) (MultiMediaﻧﻈﻴﺮ ﺻﻮﺕ ,ﮔﺮﺍﻓﻴﻚ ,ﺍﻧﻴﻤﻴﺸﻦ ﻭ ﺗﺼﻮﻳﺮ ﻣﻴﺘﻮﺍﻥ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﺎ ﺍﺷﻜﺎﻝ
ﻣﺘﻔﺎﻭﺕ ﺑﺮ ﺭﻭﻱ ﺳﺎﻳﺖ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻣﺸﺎﻫﺪﻩ ﻧﻤﻮﺩ .ﻣﺜﻼ" ﻣﻴﺘﻮﺍﻥ ﻳﻚ ﺳﺎﻳﺖ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ
ﻓﻴﻠﻢ ﻫﺎﻱ ﻭﻳﺪﺋﻮﺋﻲ ﺭﺍ ﺍﻳﺠﺎﺩ ﻭ ﻋﻼﻗﻪ ﻣﻨﺪﺍﻥ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺎﻳﺖ ،ﺍﺯ ﻃﺮﻳﻖ ﻭﺏ ﻗﺎﺩﺭ ﺑﻪ
ﺩﺳﺘﻴﺎﺑﻲ ﻓﻴﻠﻢ ﻣﻮﺭﺩ ﻋﻼﻗﻪ ﺧﻮﺩ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ.
ﻭﺏ ﺑﻌﻨﻮﺍﻥ ﺑﺨﺸﻲ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺤﺴﻮﺏ ﻣﻴﮕﺮﺩﺩ )ﺍﻳﻨﺘﺮﻧﺖ ﻳﻚ ﺷﺒﻜﻪ ﮔﺴﺘﺮﺩﻩ ﺟﻬﺎﻧﻲ
ﺍﺯ ﻛﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺑﻬﻢ ﻣﺮﺗﺒﻂ ﻣﻲ ﺑﺎﺷﺪ( .ﻭﺏ ﻳﻚ ﺳﻴﺴﺘﻢ ﻣﺪﻳﺮﻳﺖ ﺑﺎﻧﻚ ﺍﻃﻼﻋﺎﺗﻲ ﺳﺮﻭﻳﺲ
ﺩﻫﻨﺪﻩ /ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺑﻮﺩﻩ ﻛﻪ ﺍﺯ ﻳﻚ ﺳﺎﺧﺘﺎﺭ ﻭ ﻣﻌﻤﺎﺭﻱ ﻣﺸﺨﺺ ﺟﻬﺖ ﺑﺎﺯﻳﺎﺑﻲ
ﺍﻃﻼﻋﺎﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻛﻨﺪ .ﺗﻤﺎﻣﻲ ﻣﺮﻭﺭﮔﺮﻫﺎ ) (Browserﺑﺎ ﺁﮔﺎﻫﻲ ﺍﺯ ﺍﻳﻦ ﻣﻌﻤﺎﺭﻱ
ﻗﺎﺩﺭ ﺑﻪ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﻣﺮﻭﺭﮔﺮﻫﺎ ,ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﺋﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﭘﺲ
ﺍﺯ ﻧﺼﺐ ﻭ ﺑﻬﺮﻩ ﺑﺮﺩﺍﺭﻱ ﺍﺯ ﺁﻧﺎﻥ ﻣﻴﺘﻮﺍﻥ ﺍﺯ ﻳﻚ ﺳﺎﻳﺖ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﺳﺎﻳﺖ ﺩﮔﺮ ﺣﺮﻛﺖ
ﻧﻤﻮﺩ.ﺍﻭﻟﻴﻦ ﺑﺎﺭ ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺲ ﺍﻧﮕﻠﻴﺴﻲ ﺑﻨﺎﻡ " ﺑﺮﻧﺮﺯ ﻟﻲ " ﺍﻳﺪﻩ ﺗﺮﻛﻴﺐ ﺍﺑﺮ ﺭﺳﺎﻧﻪ ﻫﺎ ﺭﺍ
ﻣﻨﺎﺑﻊ ﺍﻃﻼﻋﺎﺗﻲ ﺍﻳﻨﺘﺮﻧﺖ ﻣﻄﺮﺡ ﻧﻤﻮﺩ .ﻗﺒﻞ ﺍﺯ ﻭﺏ ﻣﻨﺎﺑﻊ ﻭ ﺍﻗﻼﻡ ﺍﻃﻼﻋﺎﺗﻲ ﮔﻮﻧﺎﮔﻮﻧﻲ ﺩﺭ
7
ﺍﻳﻨﺘﺮﻧﺖ ﻭﺟﻮﺩ ﺩﺍﺷﺖ ﻭﻟﻲ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺁﻧﻬﺎ ﺑﺴﺎﺩﮔﻲ ﻣﻴﺴﺮ ﻧﺒﻮﺩ .ﺩﺭ ﺳﺎﻝ "١٩٨٩ﺯﻣﺎﻧﻴﻜﻪ"
ﺑﺮﻧﺮﺯﻟﻲ" ﺑﺮ ﺭﻭﻱ ﻳﻚ ﭘﺮﻭﮊﻩ ﻓﻌﺎﻟﻴﺖ ﻣﻲ ﻛﺮﺩ ,ﻣﺸﺎﻫﺪﻩ ﻧﻤﻮﺩ ﻛﻪ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ
ﻧﻴﺎﺯ ﺟﻬﺖ ﻛﺎﺭ ﻫﻤﺰﻣﺎﻥ ﺑﺮ ﺭﻭﻱ ﭘﺮﻭﮊﻩ ﺑﺮﺍﻱ ﺍﻓﺮﺍﺩ ,ﻋﻤﻠﻴﺎﺗﻲ ﻃﺎﻗﺖ ﻓﺮﺳﺎ ﻭ ﻣﺸﻜﻞ ﺍﺳﺖ.ﻭﻱ
ﺑﺎ ﺑﻬﺮﻩ ﮔﻴﺮﻱ ﺍﺯ ﺗﻜﻨﻮﻟﻮﮊﻱ ﺍﺑﺮ ﻣﺘﻦ ﻫﺎ ,ﺷﺒﻜﻪ ﺍﻱ ﺍﺯ ﻣﺴﺘﻨﺪﺍﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺍﻓﺮﺍﺩ ﺟﻬﺖ ﻓﻌﺎﻟﻴﺖ
ﺩﺭ ﭘﺮﻭﮊﻩ ﻫﺎﻱ ﮔﻮﻧﺎﮔﻮﻥ ﺭﺍ ﻓﺮﺍﻫﻢ ﺁﻭﺭﺩ .ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻣﺘﻌﺪﺩﻱ ﺑﻪ ﺻﻔﺤﺎﺕ
ﻣﺴﺘﻨﺪﺍﺕ ,ﺍﻳﺠﺎﺩ ﻭ ﺗﻤﺎﻣﻲ ﺟﺰﺋﻴﺎﺕ ﻣﺮﺑﻮﻃﻪ ﺍﺯ ﺩﻳﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻛﻨﻨﺪﻩ ﻣﺨﻔﻲ ﻣﻲ ﻣﺎﻧﺪ.
ﻣﺴﺘﻨﺪﺍﺕ ﻭﺏ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺎ ﻳﻚ ﻗﺎﻟﺐ ﺧﺎﺹ ﻧﻮﺷﺘﻪ ﺷﻮﻧﺪ ,ﺑﮕﻮﻧﻪ ﺍﻱ ﻛﻪ ﺍﺑﺮ ﻣﺘﻦ ﻫﺎ
ﺑﺘﻮﺍﻧﻨﺪ ﺑﺎ ﻳﻜﺪﻳﮕﺮ ﻛﺎﺭ ﻧﻤﺎﻳﻨﺪ .ﺍﻳﻦ ﻗﺎﻟﺐ ﺧﺎﺹ Hyper Text Markup HTML
) ( Languageﻧﺎﻣﻴﺪﻩ ﺷﺪ.
ﺍﻳﻦ ﺯﺑﺎﻥ ﺑﻌﻨﻮﺍﻥ ﺯﻳﺮ ﻣﺠﻤﻮﻋﻪ ﺯﺑﺎﻥ )Standard Generalized Markup ) SGML
( Languageﻣﺤﺴﻮﺏ ﻣﻴﮕﺮﺩﺩ SGML.ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻱ ﺟﻬﺖ ﺗﻌﺮﻳﻒ ﻓﻮﺭﻣﺖ ﺩﺭ ﻣﺴﺘﻨﺪﺍﺕ
ﻣﺘﻨﻲ ﺍﺳﺖ.ﺍﺯ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻓﻮﻕ ﺩﺭ ﮔﺬﺷﺘﻪ ﺍﻏﻠﺐ ﺟﻬﺖ ﻋﻤﻠﻴﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﻧﺸﺮ ﺭﻭﻣﻴﺰﻱ
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﺪ ".ﺑﺮﻧﺮﺯﻟﻲ " ﺍﺯ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﺍﺑﺮﻣﺘﻦ ﻫﺎ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺍﻭﻟﻴﻦ ﻣﺴﺘﻨﺪﺍﺕ ﺩﺭ ﻭﺏ
ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ.ﺟﻬﺖ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻭﻟﻴﻦ ﺳﺎﻳﺖ ﻫﺎﻱ ﻭﺏ ﺍﺯ ﻳﻚ ﻣﺮﻭﺭﮔﺮ ﺧﻄﻲ ﻭﺏ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﺷﺪ .ﺍﻳﻦ ﻣﺮﻭﺭﮔﺮ ﻣﺤﺪﻭﺩ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺻﺮﻓﺎ" ﻳﻚ ﺧﻂ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺑﻮﺩ .ﺩﺭ ﺍﻳﻦ ﻣﺪﻝ
ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﻳﻜﻲ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻨﺎﻡ TelNetﺟﻬﺖ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺩﻭ ﺳﺎﻳﺖ
ﺍﻭﻟﻴﻪ ﻭﺏ ﺑﺎ ﻧﺎﻣﻬﺎﻱ Infacern.chﻭ ﻳﺎ Nxo01.cern.chﺍﺳﺘﻔﺎﺩﻩ ﻣﻴﮕﺮﺩﻳﺪ .ﺍﻳﻦ
ﻣﺮﻭﺭﮔﺮ ﺩﺍﺭﺍﻱ ﺩﺳﺘﻮﺭﺍﺗﻲ ﻧﻈﻴﺮ Start a Search :ﻭ Follow a Linkﺑﻮﺩ .ﺍﻛﺜﺮ
ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺳﺎﻳﺖ ﻫﺎﻱ ﺍﻭﻟﻴﻪ ،ﺍﺯ ﺍﻣﻜﺎﻧﺎﺕ ﺍﺑﺮ ﻣﺘﻦ ﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲ ﻛﺮﺩﻧﺪ ﻭ ﻫﻤﻴﻦ
ﺍﻣﺮ ﺑﺎﻋﺚ ﻋﺪﻡ ﺑﻜﺎﺭﮔﻴﺮﻱ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﺍﺑﺮﻣﺘﻦ ﻫﺎ ﺩﺭ ﻣﺴﺘﻨﺪﺍﺕ ﺍﻭﻟﻴﻪ ﻭ ﻋﺪﻡ ﺭﺷﺪ ﻣﻨﺎﺳﺐ
ﻭﺏ ﮔﺮﺩﻳﺪ .ﻣﻬﻤﺘﺮﻳﻦ ﻋﺎﻣﻞ ﺭﺷﺪ ﻭ ﻓﺮﺍﮔﻴﺮ ﺷﺪﻥ ﻭﺏ ﺩﺭ ﺳﻄﺢ ﺟﻬﺎﻥ ,ﻋﺮﺿﻪ ﻣﺮﻭﺭﮔﺮ "
ﻣﻮﺯﺍﺋﻴﻚ " ﺑﻪ ﺑﺎﺯﺍﺭ ﺑﻮﺩ.
8
ﻣﻮﺯﺍﺋﻴﻚ ) ﺗﻮﻟﺪ ﻧﺴﻞ ﺟﺪﻳﺪﻱ ﺍﺯ ﻣﺮﻭﺭﮔﺮﻫﺎ (
" ﻣﺎﺭﻙ ﺁﻧﺪﺭﺳﻮﻥ " ﺩﺭ ﺳﺎﻝ ١٩٩٣ﭘﺮﻭﮊﻩ ﺗﻮﻟﻴﺪ ﻭ ﻃﺮﺍﺣﻲ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻣﻮﺯﺍﺋﻴﻚ ﺭﺍ
ﻫﺪﺍﻳﺖ ﻧﻤﻮﺩ .ﻫﺪﻑ ﺍﺯ ﻃﺮﺍﺣﻲ ﻣﻮﺯﺍﺋﻴﻚ ،ﺍﺭﺍﺋﻪ ﺭﺍﻫﻜﺎﺭﻱ ﻣﻨﺎﺳﺐ ﺑﺮﺍﻱ ﺍﻓﺮﺍﺩﻱ ﺑﻮﺩ ﻛﻪ ﺑﺮ
ﺭﻭﻱ ﭘﺮﻭﮊﻩ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﻓﻌﺎﻟﻴﺖ ﺩﺍﺷﺘﻪ ﻭ ﻣﻠﺰﻡ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﻣﺸﺘﺮﻙ
ﺑﻮﺩﻧﺪ.ﺩﺭ ﺍﺑﺘﺪﺍ " ﺁﻧﺪﺭﺳﻮﻥ " ﺍﺯ ﻭﺟﻮﺩ ﻭﺏ ﻫﻴﭽﮕﻮﻧﻪ ﺍﻃﻼﻋﻲ ﻧﺪﺍﺷﺖ ﻭ ﺟﻬﺖ ﺍﺭﺍﺋﻪ ﺭﺍﻩ ﺣﻞ
ﻣﻨﺎﺳﺐ ،ﺗﺤﻘﻴﻘﺎﺕ ﮔﺴﺘﺮﺩﻩ ﺍﻱ ﺗﻮﺳﻂ ﻭﻱ ﺍﻧﺠﺎﻡ ﻭ ﺩﺭ ﻧﻬﺎﻳﺖ ﻭﻱ ﻭﺏ ﺭﺍ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺭﺍ ﻩ
ﺣﻞ ﻣﻨﺎﺳﺐ ﻛﺸﻒ ﻧﻤﻮﺩ .ﭘﺲ ﺍﺯ ﺷﻨﺎﺧﺖ ﭘﺘﺎﻧﺴﻴﻞ ﻫﺎﻱ ﻭﺏ ﺗﻮﺳﻂ " ﺁﻧﺪﺭﺳﻮﻥ "،
ﺍﻳﺪﻩ ﻃﺮﺍﺣﻲ ﻣﻮﺯﺍﺋﻴﻚ ﺑﻌﻨﻮﺍﻥ ﻣﺮﻭﺭﮔﺮ ﻭﺏ ﺗﻮﺳﻂ ﻭﻱ ﻣﻄﺮﺡ ﮔﺮﺩﻳﺪ.ﺩﺭ ﺁﻭﺭﻳﻞ ١٩٩٣ﺍﻭﻟﻴﻦ
ﻧﺴﺨﻪ ﻣﻮﺯﺍﺋﻴﻚ ) ( Ver 1.0ﺑﺮﺍﻱ ﺳﻴﺴﺘﻢ Windowsﺍﺭﺍﺋﻪ ﮔﺮﺩﻳﺪ.ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﺑﺴﺮﻋﺖ
ﺩﺭ ﺳﻄﺢ ﺟﻬﺎﻥ ﻣﻄﺮﺡ ﻭ ﺑﺎﻋﺚ ﺍﻋﺘﺒﺎﺭ ﻭ ﺷﻬﺮﺕ ﻓﺮﺍﻭﺍﻥ ﻭﺏ ﮔﺮﺩﻳﺪ .ﺑﺪﻟﻴﻞ ﺍﻋﺘﺒﺎﺭ ﻭ ﻋﻤﻮﻣﻴﺖ
ﻳﺎﻓﺘﻦ ﻣﻮﺯﺍﺋﻴﻚ) NCSA ،ﻣﺮﻛﺰ ﻣﻠﻲ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻓﻮﻕ ﻣﺤﺎﺳﺒﺎﺗﻲ( ﻧﺴﺨﻪ ﻫﺎﻱ ﻭﻳﻨﺪﻭﺯ ﻭ
ﺍﭘﻞ ﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ ﺭﺍ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻧﻤﻮﺩ .ﻣﺮﻛﺰ ﻓﻮﻕ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺗﻌﺮﻳﻒ ﺧﺎﺹ ﺣﻮﺯﻩ ﻓﻌﺎﻟﻴﺖ
ﺧﻮﺩ ﻣﺠﺒﻮﺭ ﺑﻪ ﻓﺮﻭﺵ ﺍﻣﺘﻴﺎﺯ " ﻣﻮﺯﺍﺋﻴﻚ " ﺑﻪ ﭼﻨﺪﻳﻦ ﺷﺮﻛﺖ ﺍﺯ ﺟﻤﻠﻪMosaic :
Communicationﻭ Quarterdeck spryﺷﺪ.ﺩﺭ ﺳﺎﻝ " ١٩٩٤ﻣﺎﺭﻙ ﺁﻧﺪﺭﺳﻮﻥ
" NCSAﺭﺍ ﺗﺮﻙ ﻭ ﺑﻪ ﻳﻚ ﺷﺮﻛﺖ ﺟﺪﻳﺪﺍﻟﺘﺎﺳﻴﺲ ﺑﻨﺎﻡ " ﻧﺖ ﺍﺳﻜﻴﭗ" )( NetScape
ﭘﻴﻮﺳﺖ .ﭘﺲ ﺍﺯ ﭘﻴﻮﺳﺘﻦ ﻭﻱ ﺑﻪ ﻧﺖ ﺍﺳﻜﻴﭗ ,ﻣﺮﻭﺭﮔﺮ ﺟﺪﻳﺪﻱ ﺗﻮﺳﻂ ﺍﻳﻦ ﺷﺮﻛﺖ ﻃﺮﺍﺣﻲ
ﻭﺑﺎ ﻧﺎﻡ Netscape Navigatorﺑﻪ ﺑﺎﺯﺍﺭ ﻋﺮﺿﻪ ﮔﺮﺩﻳﺪ .ﺍﻳﻦ ﻣﺮﻭﺭﮔﺮ ﺍﻧﻘﻼﺑﻲ ﺩﺭ ﺯﻣﻴﻨﻪ
ﻣﺮﻭﺭﮔﺮﻫﺎ ﺭﺍ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩ ﻭ ﭘﺲ ﺍﺯ ﻣﺪﺕ ﺯﻣﺎﻥ ﻛﻮﺗﺎﻫﻲ ﺑﻌﻨﻮﺍﻥ ﭘﺮﻓﺮﻭﺷﺘﺮﻳﻦ ﻣﺮﻭﺭﮔﺮ ﺩﺭ
ﺳﻄﺢ ﺟﻬﺎﻥ ﻣﻄﺮﺡ ﮔﺮﺩﻳﺪ.
ﻭﺏ ﺑﺎ ﻳﻚ ﺳﺮﻋﺖ ﺣﻴﺮﺕ ﺍﻧﮕﻴﺰ ﺩﺭ ﺣﺎﻝ ﺭﺷﺪ ﻭ ﺗﻮﺳﻌﻪ ﺍﺳﺖ.ﺍﻣﺮﻭﺯﻩ ﺩﺭ ﺍﻛﺜﺮ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ
ﺗﻠﻮﻳﺰﻳﻮﻧﻲ ﻭ ﭘﺨﺶ ﺁﮔﻬﻲ ﻫﺎﻱ ﺗﺠﺎﺭﻱ ﻛﻤﺘﺮﻳﻦ ﺁﮔﻬﻲ ﺭﺍ ﻣﻴﺘﻮﺍﻥ ﻣﺸﺎﻫﺪﻩ ﻧﻤﻮﺩ ﻛﻪ ﻣﺘﻘﺎﺿﻴﺎﻥ
9
ﺭﺍ ﺟﻬﺖ ﻛﺴﺐ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﺑﻪ ﻳﻚ ﻭﺏ ﺳﺎﻳﺖ ﻫﺪﺍﻳﺖ ﻧﻨﻤﺎﻳﺪ .ﻳﻚ ﻭﺏ ﺳﺎﻳﺖ,
ﺳﻴﺴﺘﻤﻲ ﺑﺮ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺖ ﻛﻪ ﺷﺎﻣﻞ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ) (Web Serverﺍﺳﺖ.
ﺍﻳﻦ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ،ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺑﺮ ﺭﻭﻱ ﺳﺎﻳﺖ ﺍﺳﺖ ﻛﻪ ﺍﻣﻜﺎﻥ ﺩﺳﺘﻴﺎﺑﻲ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ
ﺭﺍ ﺑﻪ ﻣﺴﺘﻨﺪﺍﺕ ﻣﻮﺟﻮﺩ ﻓﺮﺍﻫﻢ ﻣﻲ ﻛﻨﺪ.ﺩﺭ ﮔﺬﺷﺘﻪ ﺑﺪﻟﻴﻞ ﺗﺮﺍﻓﻴﻚ ﺑﺎﻻﻱ ﻣﺼﺎﺭﻑ ﺳﻴﺎﺳﻲ ﺍﺯ
ﺍﻳﻨﺘﺮﻧﺖ ,ﺯﻣﻴﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺩﺭ ﺑﻌﺪ ﺗﺠﺎﺭﻱ ﻭ ﺍﻗﺘﺼﺎﺩﻱ ﻓﺮﺍﻫﻢ ﻧﺒﻮﺩ.ﺩﺭ ﺳﺎﻝ ١٩٩١ﺑﺎ
ﭘﻴﺪﺍﻳﺶ ﺍﻳﺪﻩ ﺗﺒﺎﺩﻝ ﺍﻗﺘﺼﺎﺩﻱ ﺍﻳﻨﺘﺮﻧﺖ (Commerical Internet Exchange) CIX
ﻭﺿﻌﻴﺖ ﻓﻮﻕ ﺗﻐﻴﻴﺮ ﻛﺮﺩ CIX .ﺗﻮﺳﻂ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﮔﺎﻥ ﺳﺮﻭﻳﺴﻬﺎﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺗﺤﺖ
AlterNet,CERfent,PSInetﺍﺭﺍﺋﻪ ﮔﺮﺩﻳﺪ .ﺍﻳﻦ ﺳﻴﺴﺘﻢ ﺑﺎ ﻣﻮﻓﻘﻴﺖ ﻭ ﺍﺳﺘﻘﺒﺎﻝ
ﭼﺸﻤﮕﻴﺮﻱ ﻣﻮﺍﺟﻪ ﮔﺮﺩﻳﺪ.ﺍﻣﺮﻭﺯﻩ ﺍﻏﻠﺐ ﺗﻮﻟﻴﺪ ﻛﻨﻨﺪﮔﺎﻥ ﻛﺎﻻ ﺩﺭ ﺳﻄﺢ ﺟﻬﺎﻥ ﺍﻃﻼﻋﺎﺕ
ﻣﺮﺑﻮﻁ ﺑﻪ ﻛﺎﻻﻱ ﺧﻮﺩ ﺭﺍ ﺑﺮ ﺭﻭﻱ ﻭﺏ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﺳﺎﻳﺖ ﻫﺎﻱ ﺷﻨﺎﺧﺘﻪ ﺷﺪﻩ ﺍﻱ ﺍﺭﺍﺋﻪ
ﻣﻴﺪﻫﻨﺪ.ﻣﺘﻘﺎﺿﻴﺎﻥ ﻛﺎﻻ ﺩﺭ ﻫﺮ ﻧﻘﻄﻪ ﺍﺯ ﺟﻬﺎﻥ ﺑﺎ ﻣﺮﺍﺟﻌﻪ ﺑﻪ ﺳﺎﻳﺖ ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﻥ ﺷﺮﻛﺖ ﻭ ﻳﺎ
ﺷﺮﻛﺖ ﻫﺎﻱ ﻣﺸﺎﺑﻪ ﻣﻴﺘﻮﺍﻧﻨﺪ ﺁﮔﺎﻫﺎﻧﻪ ﻧﺴﺒﺖ ﺑﻪ ﺍﻧﺘﺨﺎﺏ ﻛﺎﻻﻱ ﻣﻮﺭﺩ ﻋﻼﻗﻪ ﺧﻮﺩ ﺍﻗﺪﺍﻡ ﻭ ﺍﺯ
ﻃﺮﻳﻖ ﻭﺏ ،ﻓﺮﺁﻳﻨﺪ ﺛﺒﺖ ﺳﻔﺎﺭﺵ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ.ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﺍﺯ ﺷﺮﻛﺖ ﻫﺎ ﺩﺭ ﺳﻄﺢ ﺟﻬﺎﻥ
ﺑﺎﻻﺧﺺ ﺷﺮﻛﺖ ﻫﺎﻱ ﻛﺎﻣﭙﻴﻮﺗﺮﻱ ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﻓﻨﻲ ﻭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﻣﺸﺘﺮﻳﺎﻥ ﺍﺯ
ﻃﺮﻳﻖ ﻭﺏ ﺍﻧﺠﺎﻡ ﻣﻴﺪﻫﻨﺪ .ﻣﺜﻼ" ﺑﺎ ﻣﺮﺍﺟﻌﻪ ﺑﻪ ﺳﺎﻳﺖ ﻣﺎﻛﺮﻭﺳﺎﻓﺖ ﻋﻼﻭﻩ ﺑﺮ ﺍﻣﻜﺎﻥ ﺧﺮﻳﺪ
ﻣﺤﺼﻮﻝ ﻣﻮﺭﺩ ﻧﻈﺮﺧﻮﺩ ،ﺩﺭﺻﻮﺭﺗﻴﻜﻪ ﺩﺭ ﺯﻣﻴﻨﻪ ﺑﻜﺎﺭﮔﻴﺮﻱ ﻳﻜﻲ ﺍﺯ ﻣﺤﺼﻮﻻﺕ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ
ﺁﻥ ﺷﺮﻛﺖ ﺩﺍﺭﺍﻱ ﺳﻮﺍﻻﺕ ﻭ ﺍﺑﻬﺎﻣﺎﺗﻲ ﺑﺎﺷﻴﻢ ,ﺑﺎ ﺍﺳﺘﻘﺮﺍﺭ ﺩﺭ ﺑﺨﺶ ﻓﻨﻲ ﻭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻣﻴﺘﻮﺍﻥ
ﭘﺎﺳﺦ ﻭ ﺭﻫﻨﻤﻮﺩﻫﺎﻱ ﻻﺯﻡ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻛﺮﺩ.ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﺍﺯ ﺷﺮﻛﺖ ﻫﺎ ﺑﺎﻻﺧﺺ ﺷﺮﻛﺖ ﻫﺎﻱ
ﺍﻧﺘﺸﺎﺭﺍﺗﻲ ﻭ ﭼﺎﭖ ﻣﺠﻼﺕ ،ﺭﻭﺯﻧﺎﻣﻪ ﻫﺎ ،ﺍﻃﻼﻋﺎﺕ ﺧﻮﺩ ﺭﺍ )ﺭﻭﺯﻧﺎﻣﻪ ﻫﺎ ﻭ ﻣﺠﻼﺕ( ﺑﺮ ﺭﻭﻱ
ﺷﺒﻜﻪ ﻗﺮﺍﺭﺩﺍﺩﻩ ﻭ ﺯﻣﻴﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻭ ﻳﺎ ﺧﺮﻳﺪ ﺭﺍ ﺑﺮﺍﻱ ﻣﺘﻘﺎﺿﻴﺎﻥ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺗﻤﺎﻣﻲ
ﻣﺘﻘﺎﺿﻴﺎﻥ ﺟﻬﺖ ﺧﺮﻳﺪ ﮐﺎﻻﻱ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺧﻮﺩ ﺍﺯ ﻃﺮﻳﻖ ﻭﺏ ,ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺍﺭﺍﻱ ﻳﻜﻲ ﺍﺯ
ﺍﻧﻮﺍﻉ ﻣﺘﺪﺍﻭﻝ ﻛﺎﺭﺗﻬﺎﻱ ﺍﻋﺘﺒﺎﺭﻱ ﻧﻈﻴﺮ Credit Card :ﻭ ﻳﺎ MasterCardﺑﺎﺷﻨﺪ.
10
ﭘﺲ ﺍﺯ ﺍﻧﺘﺨﺎﺏ ﻛﺎﻻ ﺍﺯ ﻃﺮﻳﻖ ﻣﺘﻘﺎﺿﻲ ﻭ ﺗﻌﻴﻴﻦ ﻧﺤﻮﻩ ﭘﺮﺩﺍﺧﺖ ﺷﻤﺎﺭﻩ ﻣﺮﺑﻮﻁ ﺑﻪ ﻛﺎﺭﺕ
ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﺳﻴﺴﺘﻢ ﺩﺍﺩﻩ ﺷﻮﺩ .ﺛﺒﺖ ﻭ ﺩﺭﺝ ﺷﻤﺎﺭﻩ ﻛﺎﺭﺗﻬﺎﻱ ﺍﻋﺘﺒﺎﺭﻱ ﻳﻜﻲ ﺍﺯ ﺍﻋﺘﺒﺎﺭﻱ
ﻣﺴﺎﺋﻞ ﻣﻬﻢ ﺩﺭ ﺯﻣﻴﻨﻪ ﺍﻣﻨﻴﺖ ﺩﺭ ﺗﺠﺎﺭﺕ ﺑﺮ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺖ .ﻫﺮ ﻓﺮﺩ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﻳﻦ
ﺍﻃﻤﻴﻨﺎﻥ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﻛﻪ ﺍﺯ ﺷﻤﺎﺭﻩ ﻛﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ ﻭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻏﻴﺮ ﻗﺎﻧﻮﻧﻲ ﺑﻌﻤﻞ ﻧﻤﻲ ﺁﻳﺪ.
ﺑﻪ ﻫﻤﻴﻦ ﺩﻟﻴﻞ ﻭﺏ ﻣﺠﻬﺰ ﺑﻪ ﻳﻚ ﺳﻴﺴﺘﻢ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻣﻄﻤﺌﻦ ﺟﻬﺖ ﻛﺎﺭﺕ ﻫﺎﻱ ﺍﻋﺘﺒﺎﺭﻱ
ﺍﺳﺖ.
ﺻﻔﺤﺎﺕ ﻭﺏ ﺍﺯ ﻟﺤﺎﻅ ﻓﻴﺰﻳﮑﻲ ﻓﺎﻳﻞ ﻫﺎﻱ ﻫﺴﺘﻨﺪ ﮐﻪ ﺗﻮﺳﻂ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺑﻮﺟﻮﺩ
ﺁﻣﺪﻩ ﻭ ﺩﺍﺭﺍﻱ ﺍﻧﺸﻌﺎﺏ " "htmﻭ ﻳﺎ " ""htmlﻣﻲ ﺑﺎﺷﻨﺪ .ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺍﻳﻦ ﻧﻮﻉ ﺻﻔﺤﺎﺕ
ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺗﻤﺎﻡ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﺋﻲ ﮐﻪ ﺑﻨﻮﻋﻲ ﻗﺎﺩﺭ ﺑﻪ ﺍﻳﺠﺎﺩ ﻭ ﺫﺧﻴﺮﻩ ﺳﺎﺯﻱ ﻳﮏ ﻓﺎﻳﻞ
ﻫﺴﺘﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ Notepad ).ﻧﻤﻮﻧﻪ ﺍﻱ ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎ ﺍﺳﺖ( .ﺍﻣﺮﻭﺯﻩ ﻧﺮﻡ
ﺍﻓﺰﺍﺭﻫﺎﻱ ﮐﺎﻣﻼ" ﺣﺮﻓﻪ ﺍﻱ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻭ ﻣﺪﻳﺮﻳﺖ ﺻﻔﺤﺎﺕ ﻭﺏ ﺗﻮﺳﻂ ﺷﺮﮐﺖ ﻫﺎﻱ
11
ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ ...,FrontPage,Hotmetal .ﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ
ﻣﻲ ﺑﺎﺷﻨﺪ.ﭘﺲ ﺍﺯ ﺍﻳﺠﺎﺩ ﺻﻔﺤﺎﺕ ﻭﺏ ﺩﺭ ﺻﻮﺭﺕ ﻧﻴﺎﺯ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﻋﻤﻮﻡ )ﺩﺍﺧﻠﻲ ،
ﺧﺎﺭﺟﻲ( ﻣﻲ ﺑﺎﻳﺴﺖ ﺁﻧﻬﺎ ﺭﺍ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺳﺎﻳﺖ ﺫﺧﻴﺮﻩ ﻧﻤﻮﺩ .ﻳﮏ ﻭﺏ ﺳﺎﻳﺖ ﻣﺠﻤﻮﻋﻪ
ﺍﻱ ﺍﺯ ﺻﻔﺤﺎﺕ ﻭﺏ ﺭﺍ ﺷﺎﻣﻞ ﻣﻲ ﮔﺮﺩﺩ.
ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﮔﺎﻥ ﺍﻃﻼﻋﺎﺕ ﭘﺲ ﺍﺯ ﺁﻣﺎﺩﻩ ﺳﺎﺯﻱ ﺻﻔﺤﺎﺕ ﻭﺏ ﻭ ﺍﺳﺘﻘﺮﺍﺭ ﺁﻧﻬﺎ ﺑﺮ ﺭﻭﻱ ﻳﮏ
ﻭﺏ ﺳﺎﻳﺖ ﺯﻣﻴﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﻓﻮﻕ ﺭﺍ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻨﺪﮔﺎﻥ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻨﺪﮔﺎﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﺋﻲ ﻣﻮﺳﻮﻡ ﺑﻪ " ﻣﺮﻭﺭﮔﺮ" ﻗﺎﺩﺭ ﺑﻪ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ
ﻳﮏ ﻭﺏ ﺳﺎﻳﺖ ﻭ ﺩﺭﺧﻮﺍﺳﺖ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺧﻮﺩ ﻣﻲ ﺑﺎﺷﻨﺪ.
ﺗﻤﺎﻡ ﺻﻔﺤﺎﺕ ﻭﺏ ﺩﺍﺭﺍﻱ ﻣﺠﻤﻮﻋﻪ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎﺋﻲ ﻫﺴﺘﻨﺪ ﮐﻪ ﻧﺤﻮﻩ ﻧﻤﺎﻳﺶ ﺍﻃﻼﻋﺎﺕ
ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﻣﺸﺨﺺ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺭﺍﻳﺞ ﺗﺮﻳﻦ ﻣﺠﻤﻮﻋﻪ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎﻱ ﻧﻤﺎﻳﺶ ﺩﺭ
ﺻﻔﺤﺎﺕ ﻭﺏ ﺗﮓ ﻫﺎﻱ Htmlﻣﻲ ﺑﺎﺷﻨﺪ.
ﻫﻤﺎﻧﻄﻮﺭ ﮐﻪ ﺍﺷﺎﺭﻩ ﮔﺮﺩﻳﺪ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻣﺠﻤﻮﻋﻪ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎﻱ ﻧﻤﺎﻳﺶ ﺩﺭ ﺻﻔﺤﺎﺕ ﻭﺏ
ﺍﺯ ﺷﺒﻪ ﺯﺑﺎﻥ Htmlﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.ﺷﺒﻪ ﺯﺑﺎﻥ ﻓﻮﻕ ،ﺭﺍ ﻧﻤﻲ ﺗﻮﺍﻥ ﺑﻌﻨﻮﺍﻥ ﻳﮏ ﺯﺑﺎﻥ ﺑﺮﻧﺎﻣﻪ
ﻧﻮﻳﺴﻲ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺖ ﭼﺮﺍﮐﻪ ﻋﻤﻼ" ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎﻱ ﭘﺮﺩﺍﺯﺵ ﺭﺍ ﺷﺎﻣﻞ ﻧﺸﺪﻩ ﻭ ﺻﺮﻓﺎ" ﺩﺭ
ﺣﺪ ﺗﻮﺻﻴﻒ ﻧﺤﻮﻩ ﻧﻤﺎﻳﺶ ﻣﺤﺘﻮﻳﺎﺕ ﺍﺳﺖ Html .ﺩﺍﺭﺍﻱ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﮐﺪﻫﺎﻱ ﺗﻮﺻﻴﻔﻲ
ﺑﺮﺍﻱ ﻧﻤﺎﻳﺶ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻣﺮﻭﺭﮔﺮﻫﺎ ﺍﺳﺖ .ﺍﻳﻦ ﺯﺑﺎﻥ ﺩﺍﺭﺍﻱ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺗﮓ ﻫﺎ ﺍﺳﺖ
ﮐﻪ ﻫﺮ ﻳﮏ ﺩﺍﺭﺍﻱ ﻣﻌﺎﻧﻲ ﻭ ﻋﻤﻠﮑﺮﺩ ﺍﺯ ﻗﺒﻞ ﻣﺸﺨﺺ ﺷﺪﻩ ﻫﺴﺘﻨﺪ .ﻣﺜﻼ" ﺗﮓ <B>:ﺑﺮﺍﻱ
ﭘﺮﺭﻧﮓ ﻧﻤﻮﺩﻥ ﻣﺘﻦ ﻣﻮﺭﺩ ﻧﻈﺮ ﻭ ﻳﺎ ﺗﮓ > <Brﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻳﮏ ﺧﻂ ﺧﺎﻟﻲ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﺷﻮﺩ .ﻓﺎﻳﻞ ﻫﺎﺋﻲ ﮐﻪ ﺑﮑﻤﮏ Htmlﺍﻳﺠﺎﺩ ﻣﻲ ﮔﺮﺩﻧﻨﺪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺍﺭﺍﻱ ﺍﻧﺸﻌﺎﺏ
" "Htmlﻭ ﻳﺎ " "Htmﺑﺎﺷﻨﺪ .ﺩﺭ ﺣﻘﻴﻘﺖ ﺗﮓ ﻫﺎﻱ Htmlﺳﻴﺎﺳﺖ ﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﻧﺤﻮﻩ
ﻧﻤﺎﻳﺶ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﺭﺍ ﻣﺸﺨﺺ ﻭ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﭘﺲ ﺍﺯ ﺗﻔﺴﻴﺮ
12
ﺗﮓ ﻫﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﻭﺍﮐﻨﺶ ﻫﺎﻱ ﺍﺯ ﻗﺒﻞ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺭﺍ ﺍﺯ ﺧﻮﺩ ﻧﺸﺎﻥ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ.
ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﻲ ﺗﻮﺍﻥ Htmlﺭﺍ ﺑﻌﻨﻮﺍﻥ ﺯﺑﺎﻧﻲ ﺑﺮﺍﻱ ﺗﺒﻴﻦ ﻧﺤﻮﻩ ﻧﻤﺎﻳﺶ ﺍﻃﻼﻋﺎﺕ ﺗﻌﺮﻳﻒ ﮐﺮﺩ.
><html
><head
ﺻﻔﺤﻪ><title ﻋﻨﻮﺍﻥ ></title
></head
><body
< ...... >
></body
></html
htmlﺩﺍﺭﺍﻱ ﻧﺴﺨﻪ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺍﺯ ﺑﺪﻭ ﭘﻴﺪﺍﻳﺶ ﺗﺎﮐﻨﻮﻥ ﺑﻮﺩﻩ ﺍﺳﺖ .ﺩﺭ ﺯﻣﺎﻥ ﺍﻳﺠﺎﺩ
ﻳﮏ ﺻﻔﺤﻪ ﻭﺏ ﻣﻲ ﺑﺎﻳﺴﺖ ،ﻧﻮﻉ ﻧﺴﺨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ Htmlﺭﺍ ﻣﺸﺨﺺ ﻧﻤﻮﺩ .ﺍﻳﻦ
ﻋﻤﻠﻴﺎﺕ ﺗﻮﺳﻂ DOCTYPEﺍﻧﺠﺎﻡ ﻣﻲ ﮔﻴﺮﺩ .ﻫﺮ ﻳﮏ ﺍﺯ ﻧﺴﺨﻪ ﻫﺎﻱ ﻓﻮﻕ ﺩﺍﺭﺍﻱ
ﻣﺠﻤﻮﻋﻪ ﺗﮓ ﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺍﻧﻮﺍﻉ ﺍﻳﻦ ﻧﺴﺨﻪ ﻫﺎ ﻭ ﻧﺤﻮﻩ
ﺗﻌﺮﻳﻒ ﮐﺮﺩﻥ ﻭ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﻧﻮﻉ ﻧﺴﺨﻪ ﺩﺭ ﺻﻔﺤﺎﺕ ﻭﺏ ﺍﺷﺎﺭﻩ ﻣﻲ ﮔﺮﺩﺩ.
13
. Strict HTML 4.0 -ﺍﻳﻦ ﻧﺴﺨﻪ ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺮﻳﻢ ﻭ ﺍﻏﻠﺐ ﻭﻳﮋﮔﻲ ﻫﺎﺋﻲ ﻧﻈﻴﺮ
" ﺗﺮﺍﺯ ﺑﻨﺪﻱ " ﺭﺍ ﺷﺎﻣﻞ ﻧﻤﻲ ﺷﻮﺩ.
Transitional HTML 4.0 -ﺍﻣﮑﺎﻧﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﻧﻤﺎﻳﺶ ﻧﻈﻴﺮ " ﺗﺮﺍﺯﺑﻨﺪﻱ " ﺭﺍ ﺩﺍﺭﺍ
ﺑﻮﺩﻩ ﻭﻟﻲ ﻫﻤﭽﻨﺎﻥ ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺮﻳﻢ ﻫﺎ ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ.
ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﻭﺏ ﺩﺭ ﺣﺮﻳﻢ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺎ ﻧﺎﻡ "ﺻﻔﺤﺎﺕ ﻭﺏ" ﺫﺧﻴﺮﻩ ﻣﻲ ﮔﺮﺩﻧﻨﺪ.
ﺍﻧﺪﺍﺯﻩ ﻭﻧﻮﻉ ﻣﺤﺘﻮﻳﺎﺕ ﺍﻳﻦ ﻧﻮﻉ ﺻﻔﺤﺎﺕ ﮐﺎﻣﻼ" ﻣﺘﻐﻴﺮ ﺑﻮﺩﻩ ﻭ ﻧﻤﻲ ﺑﺎﻳﺴﺖ ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﻳﮏ
ﺻﻔﺤﻪ ﻭﺏ ﺭﺍ ﺑﺎ ﻳﮏ ﺻﻔﺤﻪ ﮐﺘﺎﺏ ﻣﻘﺎﻳﺴﻪ ﮐﺮﺩ ﮔﺮﭼﻪ ﺷﺒﺎﻫﺖ ﻫﺎﻱ ﺍﻧﺪﮐﻲ ﻧﻴﺰ ﺑﻴﻦ ﺁﻧﻬﺎ
ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ.
14
ﺻﻔﺤﺎﺕ ﻭﺏ ﺍﻳﺴﺘﺎ ،ﺍﻣﺮﻭﺯﻩ ﺑﺮ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﻭﺏ ،ﺑﺎ ﺳﺎﻳﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﮐﻪ ﺷﺎﻣﻞ
ﺗﻌﺪﺍﺩ ﺑﻴﺸﻤﺎﺭﻱ ﺍﺯ ﺻﻔﺤﺎﺕ ﻭﺏ ﺍﻳﺴﺘﺎ ﻣﻲ ﺑﺎﺷﻨﺪ ،ﺑﺮﺧﻮﺭﺩ ﻣﻲ ﻧﻤﺎﺋﻴﻢ .ﻭﺍﮊﻩ " ﺍﻳﺴﺘﺎ " ،ﺩﺭ
ﺭﺍﺑﻄﻪ ﺑﺎ ﻳﻚ ﺻﻔﺤﻪ ﻭﺏ ﺩﺍﺭﺍﻱ ﭼﻪ ﺗﻌﺮﻳﻔﻲ ﺍﺳﺖ؟ ﺍﻳﻦ ﻧﻮﻉ ﺻﻔﺤﺎﺕ ،ﺻﻔﺤﺎﺗﻲ ﻫﺴﺘﻨﺪ
ﻛﻪ ﺷﺎﻣﻞ ﻛﺪﻫﺎﻱ Htmlﺑﻮﺩﻩ ﻭ ﺩﺭ ﻳﻚ ﻣﺤﻴﻂ ﺍﺩﻳﺘﻮﺭ ﺗﺎﻳﭗ ﻭ ﺑﺎ ﺍﻧﺸﻌﺎﺏ Htmﻭ ﻳﺎ
Htmlﺫﺧﻴﺮﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻣﻮﻟﻒ ﺻﻔﺤﻪ ﻭﺏ ﻗﺒﻞ ﺍﺯ ﺍﻳﻨﻜﻪ ﻫﺮ ﻧﻮﻉ ﺩﺭﺧﻮﺍﺳﺘﻲ ﺑﺮﺍﻱ ﺁﻥ
ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ،ﺑﻄﻮﺭ ﻛﺎﻣﻞ ﻣﺤﺘﻮﻱ ﺻﻔﺤﻪ ﺭﺍ ﻣﺸﺨﺺ ﻛﺮﺩﻩ ﺍﺳﺖ .ﻣﺤﺘﻮﻳﺎﺕ ﺍﻳﻦ ﻧﻮﻉ
ﺍﺯ ﺻﻔﺤﺎﺕ )ﻣﺘﻦ ،ﺗﺼﻮﻳﺮ ،ﻟﻴﻨﻚ ﻫﺎ ﻭ…( ﻭ ﺷﻜﻞ ﻇﺎﻫﺮﻱ ﺁﻧﻬﺎ ﻫﻤﻮﺍﺭﻩ ﻳﻜﺴﺎﻥ ﺧﻮﺍﻫﺪ
ﺑﻮﺩ ،ﺻﺮﻓﻨﻈﺮ ﺍﺯ ﺍﻳﻨﻜﻪ ﭼﻪ ﻛﺴﻲ ،ﺩﺭ ﭼﻪ ﺯﻣﺎﻧﻲ ﻭ ﻳﺎ ﭼﮕﻮﻧﻪ ﺻﻔﺤﻪ ﺭﺍ ﻣﺸﺎﻫﺪﻩ ﺧﻮﺍﻫﺪ
ﻛﺮﺩ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﻲ ﺗﻮﺍﻥ ﮔﻔﺖ ،ﻣﺤﺘﻮﻳﺎﺕ ﺍﻳﻦ ﻗﺒﻴﻞ ﺍﺯ ﺻﻔﺤﺎﺕ ﻗﺒﻞ ﺍﺯ ﺍﻳﻨﻜﻪ ﺩﺭﺧﻮﺍﺳﺘﻲ
ﺍﻳﺠﺎﺩ ﮔﺮﺩﺩ ،ﺗﻮﺳﻂ ﻣﺪﻳﺮﻳﺖ ﺳﺎﻳﺖ ﺍﻳﺠﺎﺩ ﻭ ﻣﺸﺨﺺ ﺷﺪﻩ ﺍﻧﺪ.
15
– ٢ﮐﺎﺭﺑﺮﻱ ﺍﺯ ﻃﺮﻳﻖ ﺑﺮﻧﺎﻣﻪ ﻣﺮﻭﺭﮔﺮ ﺧﻮﺩ ،ﺩﺭ ﺧﻮﺍﺳﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺻﻔﺤﻪ ﺭﺍ ﻣﻲ ﻧﻤﺎﻳﺪ،
ﺩﺭﺧﻮﺍﺳﺖ ﻓﻮﻕ ﺍﺯ ﻣﺮﻭﺭﮔﺮ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ.
– ٣ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ،ﻓﺎﻳﻞ ﺩﺭﺧﻮﺍﺳﺘﻲ ﺑﺎ ﺍﻧﺸﻌﺎﺏ Htmﻭ ﻳﺎ Htmlﺭﺍ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ
ﻛﺮﺩ.
– ٤ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ،ﻛﺪﻫﺎﻱ Htmlﻓﺎﻳﻞ ﻣﺰﺑﻮﺭ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﻜﻪ ﺑﺮﺍﻱ ﻣﺮﻭﺭﮔﺮ
ﺍﺭﺳﺎﻝ ﻣﻴﺪﺍﺭﺩ.
ﻓﺮﺽ ﻛﻨﻴﺪ ﻣﻲ ﺧﻮﺍﻫﻴﻢ ﻳﻚ ﺻﻔﺤﻪ ﻭﺏ ﺭﺍ ﺑﮕﻮﻧﻪ ﺍﻱ ﻃﺮﺍﺣﻲ ﻧﻤﺎﺋﻴﻢ ،ﻛﻪ ﺑﻤﺤﺾ ﻭﺭﻭﺩ
ﻫﺮ ﻛﺎﺭﺑﺮ ﺯﻣﺎﻥ ﺟﺎﺭﻱ ﺳﻴﺴﺘﻢ ﺑﻬﺮﺍﻩ ﻳﻚ ﭘﻴﺎﻡ ﻣﻨﺎﺳﺐ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﺷﻮﺩ ..ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺑﺎ
ﭼﻨﺪﻳﻦ ﻣﺤﺪﻭﺩﻳﺖ ﻣﻮﺍﺟﻪ ﺧﻮﺍﻫﻴﻢ ﺑﻮﺩ ﻛﻪ ﺑﻜﻤﻚ ﺗﮓ ﻫﺎﻱ Htmlﻗﺎﺩﺭ ﺑﻪ ﺑﺮﻃﺮﻑ ﻛﺮﺩﻥ
ﺁﻧﻬﺎ ﻧﺨﻮﺍﻫﻴﻢ ﺑﻮﺩ .ﻣﺎ ﻣﻴﺪﺍﻧﻴﻢ ﻛﻪ ﻳﻚ ﻛﺎﺭﺑﺮ ﺩﺭ ﻳﻚ ﺯﻣﺎﻥ ﺧﺎﺹ ﺑﻪ ﻣﻼﻗﺎﺕ ﺻﻔﺤﻪ ﺧﻮﺍﻫﺪ
ﺁﻣﺪ ﻭﻟﻲ ﻗﻄﻌﺎ؛ ﺯﻣﺎﻥ ﺁﻥ ﺭﺍ ﻧﻤﻲ ﺩﺍﻧﻴﻢ .ﺍﮔﺮ ﺑﺨﻮﺍﻫﻴﻢ ﺯﻣﺎﻥ ﺭﺍ ﺑﺼﻮﺭﺕ ﻛﺪ ﺩﺭ ﺻﻔﺤﻪ Html
ﺧﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ ،ﻧﺘﻴﺠﻪ ﻫﻤﻮﺍﺭﻩ ﻳﻜﺴﺎﻥ ﺑﻮﺩﻩ ﻭ ﻫﻤﻴﺸﻪ ﻳﻚ ﺯﻣﺎﻥ ﺛﺎﺑﺖ ﻭ ﻳﻜﺴﺎﻥ ﺑﺮﺍﻱ
ﺗﻤﺎﻣﻲ ﻣﻼﻗﺎﺕ ﻛﻨﻨﺪﮔﺎﻥ ﺻﻔﺤﻪ ،ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺗﮓ ﻫﺎﻱ Htmlﺍﻣﻜﺎﻧﺎﺗﻲ
ﺑﻤﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﺻﻔﺤﺎﺕ ﻭﺏ ﺳﻔﺎﺭﺷﻲ ﻭ ﺑﺮ ﺍﺳﺎﺱ ﺷﺮﺍﻳﻂ ﺧﺎﺹ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻗﺮﺍﺭ
ﻧﻤﻲ ﺩﻫﺪ .ﺻﻔﺤﺎﺕ ﻭﺏ ﺍﻳﺴﺘﺎ ﻫﻤﻮﺍﺭﻩ ﺑﺼﻮﺭﺕ ﻣﺸﺎﺑﻪ ﻭ ﻳﮑﺴﺎﻥ ﺑﺮﺍﻱ ﺗﻤﺎﻣﻲ ﮐﺎﺭﺑﺮﺍﻥ
ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﺧﻮﺍﻫﻨﺪ ﺷﺪ ) .ﻧﻈﻴﺮ ﺭﺳﺘﻮﺭﺍﻧﻲ ﻛﻪ ﻫﻤﻮﺍﺭﻩ ﻭ ﺻﺮﻓﻨﻈﺮ ﺍﺯ ﺫﺍﺋﻘﻪ ﻣﺸﺘﺮﻳﺎﻥ ﺧﻮﺩ،
ﻳﻚ ﻏﺬﺍﻱ ﺛﺎﺑﺖ ﻭ ﺍﺯ ﻗﺒﻞ ﺁﻣﺎﺩﻩ ﺷﺪﻩ ﺭﺍ ﺑﺮﺍﻱ ﻫﻤﻪ ﺁﻣﺎﺩﻩ ﻭ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻗﺮﺍﺭ ﻣﻲ ﺩﻫﺪ!(
Htmlﺩﺍﺭﺍﻱ ﻫﻴﭽﮕﻮﻧﻪ ﺍﻣﻨﻴﺘﻲ ﻧﻴﺰ ﻧﺒﻮﺩﻩ ﻭ ﻛﺪﻫﺎﻱ ﺁﻥ ﺭﺍ ﻫﻤﻪ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﻣﺸﺎﻫﺪﻩ ﻭ ﺣﺘﻲ
16
ﺗﻜﺜﻴﺮ ﮔﺮﺩﺩ .ﺷﺎﻳﺪ ﺗﻨﻬﺎ ﻣﺰﻳﺖ ﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺻﻔﺤﺎﺕ ﻃﺮﺍﺣﻲ ﺁﺳﺎﻥ ﻭ ﺑﮑﺎﺭﮔﻴﺮﻱ ﺳﺮﻳﻊ ﺁﻧﺎﻥ ﺩﺭ
ﻳﻚ ﺷﺒﻜﻪ ﺑﺎﺷﺪ .ﺍﻳﻦ ﻧﻮﻉ ﺻﻔﺤﺎﺕ ﺩﺍﺭﺍﻱ ﺍﻣﻜﺎﻧﺎﺕ ﻻﺯﻡ ﺑﻤﻨﻈﻮﺭ ﺁﻓﺮﻳﻨﺶ ﺻﻔﺤﺎﺕ ﭘﻮﻳﺎ
ﻧﻴﺴﺘﻨﺪ ،ﭼﻮﻥ ﻧﻤﻲ ﺗﻮﺍﻥ ﻛﺪﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﺭﺍ ﺑﻌﺪ ﺍﺯ ﺩﺭﺧﻮﺍﺳﺖ ﻳﻚ ﺻﻔﺤﻪ ﺑﻪ ﺁﻥ
ﺍﺿﺎﻓﻪ ﮐﺮﺩ .ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺪﻧﺒﺎﻝ ﺭﻭﺷﻲ ﻭ ﻳﺎ ﺭﻭﺵ ﻫﺎﺋﻲ ﺑﻮﺩ ﮐﻪ ﺑﮑﻤﮏ ﺁﻧﻬﺎ ﺑﺘﻮﺍﻥ ﺻﻔﺤﺎﺕ
ﻭﺏ ﭘﻮﻳﺎ ﺭﺍ ﺍﻳﺠﺎﺩ ﮐﺮﺩ .ﺑﻤﻨﻈﻮﺭ ﻧﻴﻞ ﺑﻪ ﻫﺪﻑ ﻓﻮﻕ ﺍﺯ ﺩﻭ ﺭﻭﺵ ﻋﻤﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ:
ﻗﺒﻞ ﺍﺯ ﭘﺮﺩﺍﺧﺘﻦ ﺑﻪ ﻫﺮ ﻳﻚ ﺍﺯ ﻣﻮﺍﺭﺩ ﻓﻮﻕ ،ﻻﺯﻡ ﺍﺳﺖ ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﺎ ﻣﻔﻬﻮﻡ ﻭ ﺟﺎﻳﮕﺎﻩ ﻳﻚ
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﺑﻴﺸﺘﺮ ﺁﺷﻨﺎ ﺷﻮﻳﻢ .ﻳﻚ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ،ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺍﺳﺖ ﻛﻪ
ﻣﺪﻳﺮﻳﺖ ﺻﻔﺤﺎﺕ ﻭﺏ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﮔﺮﻓﺘﻪ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ﻣﺠﻬﺰ ﺑﻪ
ﻣﺮﻭﺭﮔﺮﻫﺎ ،ﻗﺎﺑﻞ ﺩﺳﺘﻴﺎﺑﻲ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺗﺎﻛﻨﻮﻥ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻫﺎﻱ ﻭﺏ ﻣﺘﻌﺪﺩﻱ
ﻃﺮﺍﺣﻲ ﻭ ﺑﻪ ﺑﺎﺯﺍﺭ ﻋﺮﺿﻪ ﺷﺪﻩ ﺍﺳﺖ … IIS ، Apache .ﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ﻧﺮﻡ
ﺍﻓﺰﺍﺭﻫﺎ ﻫﺴﺘﻨﺪ IIS .ﻣﺤﺼﻮﻝ ﺷﺮﮐﺖ ﻣﺎﻳﮑﺮﻭﺳﺎﻓﺖ ﺑﻮﺩﻩ ﻭ ﻣﻲ ﺗﻮﺍﻥ ﺩﺭ ﺯﻣﺎﻥ ﻧﺼﺐ ﻭﻳﻨﺪﻭﺯ
) ٢٠٠٠ﻭ ﻳﺎ (XPﺁﻥ ﺭﺍ ﻧﻴﺰ ﻧﺼﺐ ﻧﻤﻮﺩ.ﻧﺴﺨﻪ ٥ﺑﻬﻤﺮﺍﻩ ﻭﻳﻨﺪﻭﺯ ٢٠٠٠ﻭ ﻧﺴﺨﻪ ٥,١
ﺑﻬﻤﺮﺍﻩ XPﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ .ﺑﻬﺮﺣﺎﻝ ﺟﺎﻳﮕﺎﻩ ﻳﻚ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﺩﺭ ﺍﺭﺍﺋﻪ ﺍﻣﻜﺎﻧﺎﺕ
ﻭ ﺯﻳﺮﺳﺎﺧﺖ ﻫﺎﻱ ﻣﻨﺎﺳﺐ ﺑﺮﺍﻱ ﻃﺮﺍﺣﻲ ﺻﻔﺤﺎﺕ ﻭﺏ ﭘﻮﻳﺎ ﻭ ﺑﺎﻟﻄﺒﻊ ﺳﺎﻳﺖ ﻫﺎﻱ ﭘﻮﻳﺎ ﻳﻚ
ﺍﻣﺮ ﺑﺮﺟﺴﺘﻪ ﺍﺳﺖ .ﻫﻤﺎﻧﮕﻮﻧﻪ ﻛﻪ ﺍﺷﺎﺭﻩ ﮔﺮﺩﻳﺪ ،ﺑﺮﺍﻱ ﺧﻠﻖ ﺻﻔﺤﺎﺕ ﻭﺏ ﭘﻮﻳﺎ ﺍﺯ ﺩﻭ ﺭﻭﻳﻜﺮﺩ
ﻣﺘﻔﺎﻭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺍﺳﺘﻔﺎﺩﻩ ﻫﻤﺰﻣﺎﻥ ﺍﺯ ﺩﻭ ﺭﻭﺵ ﻓﻮﻕ ﻫﻴﭽﮕﻮﻧﻪ ﺗﻌﺎﺭﺿﻲ ﺑﺎ ﻫﻢ
17
ﻧﺪﺍﺷﺘﻪ ﺑﻠﻜﻪ ﺑﺎﻟﻌﻜﺲ ﺗﻮﺍﻧﺎﺋﻲ ﻳﻚ ﺻﻔﺤﻪ ﻭﺏ ﭘﻮﻳﺎ ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺩﺭﺍﺩﺍﻣﻪ ﺑﻪ ﺑﺮﺭﺳﻲ
ﺩﻭ ﺭﻭﻳﻜﺮﺩ ﻓﻮﻕ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ.
. page Client-side dynamicﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ﻣﺎﮊﻭﻝ ﻫﺎﺋﻲ ) ( Plug –inﻛﻪ ﺑﻪ
ﻣﺮﻭﺭﮔﺮ ﻣﻠﺤﻖ ﺷﺪﻩ ﺍﻧﺪ ،ﺗﻤﺎﻣﻲ ﻋﻤﻠﻴﺎﺕ ﻻﺯﻡ ﺟﻬﺖ ﺍﻳﺠﺎﺩ ﺻﻔﺤﺎﺕ ﭘﻮﻳﺎ ﺭﺍ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﻨﺪ
ﺩﺍﺩ .ﻛﺪﻫﺎﻱ Htmlﺍﺯ ﻃﺮﻳﻖ ﻓﺎﻳﻞ ﻣﺮﺑﻮﻃﻪ ﻛﻪ ﺷﺎﻣﻞ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎ ﺍﺳﺖ
ﺑﺮﺍﻱ ﻣﺮﻭﺭﮔﺮ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ.ﻣﺮﻭﺭﮔﺮﻫﺎ ﺩﺳﺘﻮﺭﺍﺕ ﻓﻮﻕ ﺭﺍ ﺟﻬﺖ ﺗﻮﻟﻴﺪ ﻛﺪﻫﺎﻱ Html
ﻭ ﺩﺭ ﺯﻣﺎﻥ ﺩﺭﺧﻮﺍﺳﺖ ﻳﻚ ﺻﻔﺤﻪ ﺗﻮﺳﻂ ﻛﺎﺭﺑﺮ ،ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﻨﺪ ﻛﺮﺩ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﺤﺘﻮﻳﺎﺕ
ﻳﻚ ﺻﻔﺤﻪ ﺑﺮ ﺍﺳﺎﺱ ﺩﺭﺧﻮﺍﺳﺖ ﻛﺎﺭﺑﺮﺍﻥ ﻭ ﺑﺼﻮﺭﺕ ﭘﻮﻳﺎ ﺍﻳﺠﺎﺩ ﺧﻮﺍﻫﺪ ﺷﺪ.
18
– ٢ﻛﺎﺭﺑﺮﺍﻥ ﺩﺭﺧﻮﺍﺳﺖ ﻳﻚ ﺻﻔﺤﻪ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﻣﺮﻭﺭﮔﺮ ﺧﻮﺩ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ
ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﻨﺪ ﻛﺮﺩ.
– ٣ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻓﺎﻳﻞ ﺩﺭﺧﻮﺍﺳﺘﻲ )ﺩﺭ ﺻﻮﺭﺕ ﻧﻴﺎﺯ ﻓﺎﻳﻞ ﺩﻳﮕﺮﻱ ﻛﻪ ﺷﺎﻣﻞ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ
ﻫﺎ ﺑﺎﺷﺪ( ﺭﺍ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ ﻛﺮﺩ.
ﺗﺎﻛﻨﻮﻥ ﺗﻜﻨﻮﻟﻮﮊﻳﻬﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺑﺮ ﺍﺳﺎﺱ ﺭﻭﻳﻜﺮﺩ ﻓﻮﻕ ﻣﻄﺮﺡ ﻭ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻃﺮﺍﺣﺎﻥ ﻭ ﻣﻮﻟﻔﺎﻥ
ﺻﻔﺤﺎﺕ ﻭﺏ ﭘﻮﻳﺎ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺍﺳﺖ .ﺟﺎﻭﺍ ﺍﺳﻜﺮﻳﭙﺖ ،Vbscript ،ﻛﻨﺘﺮﻝ ﻫﺎﻱ
ActiveXﻭ ﺍﭘﻠﺖ ﻫﺎﻱ ﺟﺎﻭﺍ ﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻫﺎ ﺑﻮﺩﻩ ﻛﻪ ﺑﺮﺍﻱ ﺷﻨﺎﺧﺖ
ﺧﻮﺍﻧﻨﺪﮔﺎﻥ ﺩﺭ ﺍﻳﻦ ﺑﺨﺶ ﺑﺼﻮﺭﺕ ﺧﻴﻠﻲ ﻣﺨﺘﺼﺮ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻫﺮ ﻳﻚ ﺗﻮﺿﻴﺤﺎﺗﻲ ﺍﺭﺍﺋﻪ
ﺧﻮﺍﻫﺪ ﺷﺪ.
19
ﺷﺮﻛﺖ ﻧﺖ ﺍﺳﻜﻴﭗ ﺑﺎ ﺷﺮﻛﺖ Sunﻣﺘﺤﺪ ﮔﺮﺩﻳﺪ ،ﻧﺎﻡ ﺁﻥ ﺭﺍ ﺟﺎﻭﺍﺍﺳﻜﺮﻳﭙﺖ ﮔﺬﺍﺷﺘﻨﺪ.
ﺑﺨﺸﻲ ﺍﺯ ﮔﺮﺍﻣﺮ ﺯﺑﺎﻥ ﻓﻮﻕ ﻧﻈﻴﺮ ﺳﺎﺧﺘﺎﺭ ﺍﻭﻟﻴﻪ ،ﺍﺯ ﺟﺎﻭﺍ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺍﺳﺖ )ﺧﻮﺩ ﺟﺎﻭﺍ ﻧﻴﺰ
ﺍﻏﻠﺐ ﺳﺎﺧﺘﺎﺭ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺯﺑﺎﻥ Cﮔﺮﻓﺘﻪ ﺍﺳﺖ( .ﺟﺎﻭﺍﺍﺳﻜﺮﻳﭙﺖ ﺩﺍﺭﺍﻱ ﺍﻣﻜﺎﻧﺎﺕ ﻣﺘﻌﺪﺩ ﻭ
ﻗﺪﺭﺗﻤﻨﺪﻱ ﺟﻬﺖ ﻛﻨﺘﺮﻝ ﻭ ﻣﺪﻳﺮﻳﺖ ﺭﻓﺘﺎﺭ ﻭ ﻣﺤﺘﻮﻳﺎﺕ ﻳﻚ ﻣﺮﻭﺭﮔﺮ ﺍﺳﺖ .ﺯﺑﺎﻥ ﻓﻮﻕ ﺗﻮﺍﻧﺎﺋﻲ
ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺗﻲ ﻧﻈﻴﺮ :ﻋﻤﻠﻴﺎﺕ ﺭﻭﻱ ﻓﺎﻳﻞ ﻫﺎ ﺭﺍ ﺩﺍﺭﺍ ﻧﻤﻲ ﺑﺎﺷﺪ) .ﺷﺎﻳﺪ ﻳﻜﻲ ﺍﺯ ﺩﻻﻳﻞ ﻣﺴﺎﺋﻞ
ﺍﻣﻨﻴﺘﻲ ﺑﺎﺷﺪ( .ﻓﺮﺍﮔﻴﺮﻱ ﺟﺎﻭﺍﺍﺳﻜﺮﻳﭙﺖ ﻧﺴﺒﺖ ﺑﻪ ﺟﺎﻭﺍ ﺑﻤﺮﺍﺗﺐ ﺭﺍﺣﺖ ﺗﺮ ﺍﺳﺖ .ﺟﺎﻭﺍ
ﺍﺳﻜﺮﻳﭙﺖ ﺑﮕﻮﻧﻪ ﺍﻱ ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺍﺳﺖ ﻛﻪ ﻗﺎﺩﺭ ﺑﻪ ﺧﻠﻖ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻛﻮﭼﻚ ﻭ ﺩﺭ ﻋﻴﻦ ﺣﺎﻝ
ﻣﻮﺛﺮ ﺟﻬﺖ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻣﺘﻌﺪﺩﻱ ﻧﻈﻴﺮ ﺑﺮﺧﻮﺭﺩ ﺑﺎ ﺭﻭﻳﺪﺍﺩﻫﺎﻱ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﺩﺭ ﺳﻄﺢ ﻛﺎﺭﺑﺮ
ﻧﻈﻴﺮ :ﻛﻠﻴﻚ ﻧﻤﻮﺩﻥ ﺑﺮ ﺭﻭﻱ ﻳﻚ ﺁﻳﺘﻢ ،ﺑﺴﺘﻦ ﻳﻚ ﭘﻨﺠﺮﻩ ،ﻓﻌﺎﻝ ﺷﺪﻥ ﻳﻚ ﺻﻔﺤﻪ ،ﺧﺎﺭﺝ
ﺷﺪﻥ ﺍﺯ ﻳﻚ ﺻﻔﺤﻪ ،ﺣﺮﻛﺖ ﻣﻮﺱ ﺭﻭﻱ ﻳﻚ ﺁﻳﺘﻢ ﻭ…ﺍﺳﺖ .ﻣﺎﻛﺮﻭﺳﺎﻓﺖ ﻧﺴﺨﻪ ﺍﺧﺘﺼﺎﺻﻲ
ﺧﻮﺩ ﺍﺯ ﺟﺎﻭﺍﺍﺳﻜﺮﻳﭙﺖ ﺭﺍ ﺑﺎ ﻧﺎﻡ Jscriptﻭ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﻣﻌﺮﻓﻲ ﻣﺮﻭﺭﮔﺮ IE 3.0ﺩﺭ ﺍﺧﺘﻴﺎﺭ
ﻋﻼﻗﻪ ﻣﻨﺪﺍﻥ ﻗﺮﺍﺭ ﺩﺍﺩ.
20
ﺑﺪﻭﻥ ﺷﻚ ﺟﺎﻭﺍﺍﺳﻜﺮﻳﭙﺖ ﻳﻚ ﮔﺰﻳﻨﻪ ﻣﻨﺎﺳﺐ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺟﺎﻭﺍﺳﻜﺮﻳﭙﺖ ﻭ Vbscriptﻫﺮ
ﺩﻭ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﻣﺎﮊﻭﻝ ﺑﺎ ﻧﺎﻡ Script Engineﻛﻪ ﺑﻬﻤﺮﺍﻩ ﻣﺮﻭﺭﮔﺮﻫﺎ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ،
ﻣﺴﺌﻮﻟﻴﺖ ﺗﻔﺴﻴﺮ ﻭ ﺍﺟﺮﺍﻱ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﺑﺮ ﻋﻬﺪﻩ ﺧﻮﺍﻫﻨﺪ ﮔﺮﻓﺖ .ﺩﺭ ﭘﺮﻭﮊﻩ
ﺩﺍﺕ ﻧﺖ ﺷﺮﻛﺖ ﻣﺎﻛﺮﻭﺳﺎﻓﺖ VB.NETﺭﺍ ﺟﺎﻳﮕﺰﻳﻦ Vbscriptﻧﻤﻮﺩﻩ ﺍﺳﺖ.
ﻛﻨﺘﺮﻝ ﻫﺎﻱ ، ActiveXﻳﻚ ﻛﻨﺘﺮﻝ ﺍﻛﺘﻴﻮﺍﻳﻜﺲ ﻋﻨﺼﺮﻱ ﺍﺳﺖ ﻛﻪ ﺗﻮﺳﻂ ﻳﻜﻲ ﺍﺯ ﺯﺑﺎﻧﻬﺎﻱ
ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﻲ ﻧﻈﻴﺮ C++ﻭ ﻳﺎ ﺟﺎﻭﺍ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺩﺭ ﺯﻣﺎﻧﻴﻜﻪ ﺍﻳﻦ ﻧﻮﻉ ﺍﻛﺘﻴﻮﺍﻳﻜﺲ
ﻫﺎ ﺭﺍ ﺑﻬﻤﺮﺍﻩ ﺻﻔﺤﺎﺕ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﺋﻴﻢ ،ﺍﻣﻜﺎﻥ ﺍﻧﺠﺎﻡ ﺑﺨﺸﻲ ﺍﺯ ﻋﻤﻠﻴﺎﺕ ﻣﺘﻜﻲ ﺑﺮ
ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻧﻈﻴﺮ ﺍﻳﺠﺎﺩ ﻳﻚ ، Timer ، Bar Chartﺗﺎﻳﻴﺪ ﻛﺎﺭﺑﺮ ﻭ ﻳﺎ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ
ﺑﺎﻧﻚ ﺍﻃﻼﻋﺎﺗﻲ ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ .ﻛﻨﺘﺮﻝ ﻫﺎﻱ ﺍﻛﺘﻴﻮﺍﻳﻜﺲ ﺍﺯ ﻃﺮﻳﻖ ﺗﮓ > <Objectﺑﻪ
ﺻﻔﺤﺎﺕ ﻭﺏ ﺍﺿﺎﻓﻪ ﺧﻮﺍﻫﻨﺪ ﮔﺮﺩﻳﺪ .ﻣﻨﺎﺩﻱ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺷﺮﻛﺖ ﻣﺎﻛﺮﻭﺳﺎﻓﺖ ﺑﻮﺩﻩ ﻭ ﺗﺎ
ﻧﺴﺨﻪ ﺷﺶ ﻣﺮﻭﺭﮔﺮ ﻧﺖ ﺍﺳﻜﻴﭗ ﺍﻣﻜﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﻬﺎ ﺗﻮﺳﻂ ﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ.
ﺍﻟﺒﺘﻪ ﺑﺎ ﻧﺼﺐ ﺑﺮﺧﻲ Plug-inﺯﻣﻴﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻛﻨﺘﺮﻝ ﻫﺎﻱ ﺍﻛﺘﻴﻮﺍﻳﻜﺲ ﺩﺭ ﻣﺮﻭﺭﮔﺮ ﻧﺖ
ﺍﺳﻜﻴﭗ ﺑﮕﻮﻧﻪ ﺍﻱ ﻓﺮﺍﻫﻢ ﺷﺪﻩ ﺍﺳﺖ .ﻧﻜﺘﻪ ﺟﺎﻟﺐ ﺗﻮﺟﻪ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺍﻳﻦ
ﺍﺳﺖ ﻛﻪ ﺍﻣﻜﺎﻥ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻣﺘﻔﺎﻭﺕ ﺑﺮ ﺭﻭﻱ ﻛﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻛﺎﺭﺑﺮﺍﻥ ﻧﻈﻴﺮ ﻛﺎﺭ ﺑﺎ ﻓﺎﻳﻞ ﻫﺎ
ﻭ ﺭﻳﺠﺴﺘﺮﻱ ﻭﻳﻨﺪﻭﺯ ﺑﻮﺟﻮﺩ ﻣﻲ ﺁﻳﺪ ﻭ ﺍﻳﻦ ﺧﻮﺩ ﻣﻲ ﺗﻮﺍﻧﺪ ﺍﺯ ﻟﺤﺎﻅ ﺍﻣﻨﻴﺘﻲ ﻣﺸﻜﻞ ﻭ ﮔﺎﻫﺎ "
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻭﺟﻮﺩ ﻓﺎﻳﺮﻭﺍﻝ ﻫﺎ ﺗﺤﻘﻖ ﻧﺎ ﭘﺬﻳﺮ ﺑﺎﺷﺪ .ﺑﻬﺮﺣﺎﻝ ﻧﻤﻲ ﺗﻮﺍﻥ ﺑﺮ ﺭﻭﻱ ﺗﻜﻨﻮﻟﻮﮊﻱ
ﻓﻮﻕ ﺑﻌﻨﻮﺍﻥ ﻳﻚ ﺭﺍﻩ ﺣﻞ ﺟﺎﻣﻊ ﻭ ﻓﺮﺍﮔﻴﺮ ﺑﺮﺍﻱ ﺧﻠﻖ ﺻﻔﺤﺎﺕ ﻭﺏ ﭘﻮﻳﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ ﻣﮕﺮ
ﺍﻳﻨﻜﻪ ﻣﺨﺎﻃﺒﺎﻥ ﺳﺎﻳﺖ ﺧﻮﺩ ﺭﺍ ﺻﺮﻓﺎ" ﺍﺯ ﺑﻴﻦ ﻛﺴﺎﻧﻲ ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﻢ ﻛﻪ ﻭﻳﻨﺪﻭﺯ ﺭﺍ ﺑﻌﻨﻮﺍﻥ
ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻭ ﻣﺮﻭﺭﮔﺮ IEﺭﺍ ﺑﻌﻨﻮﺍﻥ ﻣﺮﻭﺭﮔﺮ ﺧﻮﺩ ﺑﺮﮔﺰﻳﺪﻩ ﺍﻧﺪ.
21
ﻭﺏ ﻣﻠﺤﻖ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﺧﻮﺷﺒﺨﺘﺎﻧﻪ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻣﺎﻛﺮﻭﺳﺎﻓﺖ ﻭ ﻧﺖ ﺍﺳﻜﻴﭗ ﻫﺮ ﺩﻭ ﺍﺯ
ﻃﺮﻳﻖ ﺍﻳﺠﺎﺩ ﻳﻚ ﻣﺎﺷﻴﻦ ﻣﺠﺎﺯﻱ ﺟﺎﻭﺍ ) (JVMﺍﺯ ﺍﭘﻠﺖ ﻫﺎﻱ ﺟﺎﻭﺍ ﺣﻤﺎﻳﺖ ﻣﻲ ﻛﻨﻨﺪ.
ﺑﻤﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﭘﻠﺖ ﻫﺎﻱ ﺟﺎﻭﺍ ﺩﺭ ﻳﻚ ﺻﻔﺤﻪ ﻭﺏ ﺍﺯ ﭼﻨﺪﻳﻦ ﺭﻭﺵ ﻣﻲ ﺗﻮﺍﻥ ﺍﺳﺘﻔﺎﺩﻩ
ﻛﺮﺩ :ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﮓ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ > <Objectﻳﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﮓ ﻏﻴﺮﺍﺳﺘﺎﻧﺪﺍﺭﺩ >. <Applet
ﺗﮓ ﻫﺎﻱ ﻓﻮﻕ ﺑﻪ ﻣﺮﻭﺭﮔﺮ ﺧﻮﺍﻫﻨﺪ ﮔﻔﺖ ﻛﻪ ﻳﻚ ﻓﺎﻳﻞ ﺟﺎﻭﺍ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ
DownLoadﻭ ﺳﭙﺲ ﺑﻜﻤﻚ ﻣﺎﺷﻴﻦ ﻣﺠﺎﺯﻱ ﺟﺎﻭﺍ ) ، (JVMﻣﻮﺟﻮﺩ ﺩﺭ ﻣﺮﻭﺭﮔﺮﻫﺎ ،ﺁﻥ
ﺭﺍ ﺍﺟﺮﺍﺀ ﻧﻤﺎﻳﺪ .ﻫﻤﺎﻧﻄﻮﺭ ﻛﻪ ﺣﺪﺱ ﺯﺩﻩ ﺍﻳﺪ ﻳﻜﻲ ﺍﺯ ﻣﺴﺎﺋﻞ ﻣﻮﺟﻮﺩ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
ﺍﭘﻠﺖ ﻫﺎ ﺟﺎﻭﺍ ،ﺯﻣﺎﻥ ﺍﺿﺎﻓﻪ ﺍﻱ ﺍﺳﺖ ﻛﻪ ﺻﺮﻑ Downloadﻛﺮﺩﻥ ،ﻣﻲ ﮔﺮﺩﺩ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺩﺭ
ﺯﻣﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﭘﻠﺖ ﻫﺎﻱ ﺟﺎﻭﺍ ،ﺳﻌﻲ ﺩﺭ ﻧﻮﺷﺘﻦ ﺍﭘﻠﺖ ﻫﺎ ﺑﺎ ﻛﺪ ﻛﻢ ﺑﺎﺷﻴﻢ .ﺍﺯ ﺭﺍﻳﺞ ﺗﺮﻳﻦ
ﻣﻮﺍﺭﺩ ﻛﺎﺭﺑﺮﺩ ﺍﭘﻠﺖ ﻫﺎﻱ ﺟﺎﻭﺍ ﻣﻲ ﺗﻮﺍﻥ ﺑﻪ ﺍﻳﺠﺎﺩ Drop-Down Menuﻭ ﺍﻧﻴﻤﻴﺸﻦ ﻫﺎﻱ
ﻣﺘﻔﺎﻭﺕ ﺍﺷﺎﺭﻩ ﻛﺮﺩ.
. Pages Server Side Dynamicﺩﺭ ﺍﻳﻦ ﻣﺪﻝ ﻛﺪﻫﺎﻱ Htmlﺑﻬﻤﺮﺍﻩ ﻣﺠﻤﻮﻋﻪ ﺍﻱ
ﺍﺯ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺍﺭﺳﺎﻝ ﻭ ﻣﺠﺪﺩﺍ" ﺍﺯ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎﻱ ﻓﻮﻕ ﺑﺮﺍﻱ
ﺗﻮﻟﻴﺪ ﻛﺪﻫﺎﻱ Htmlﺑﺮﺍﻱ ﺻﻔﺤﻪ ﺍﻱ ﻛﻪ ﻛﺎﺭﺑﺮ ﺩﺭﺧﻮﺍﺳﺖ ﻛﺮﺩﻩ ،ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﻭ ﺩﺭ ﻧﻬﺎﻳﺖ
ﺻﻔﺤﻪ ﺑﺼﻮﺭﺕ ﭘﻮﻳﺎ ﺑﺮ ﺍﺳﺎﺱ ﺩﺭﺧﻮﺍﺳﺖ ﻛﺎﺭﺑﺮ ﺍﻳﺠﺎﺩ ﺧﻮﺍﻫﺪ ﺷﺪ.
22
ﻣﺮﺍﺣﻞ ﺁﻣﺎﺩﻩ ﺷﺪﻥ ﻳﻚ ﺻﻔﺤﻪ ﻭﺏ ﭘﻮﻳﺎ ﺑﺎ ﺗﺎﻛﻴﺪ ﺑﺮ ﺭﻭﺵ ﻫﺎﻱ Server-Side
– ٥ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﻛﺪﻫﺎﻱ ﺗﻮﻟﻴﺪ ﺷﺪﻩ ﺟﺪﻳﺪ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﻜﻪ ﺑﺮﺍﻱ ﻣﺮﻭﺭﮔﺮ ﺍﺭﺳﺎﻝ
ﻣﻲ ﻧﻤﺎﻳﺪ.
23
– ٦ﻣﺮﻭﺭﮔﺮ ﻛﺪﻫﺎﻱ Htmlﺭﺍ ﭘﺮﺩﺍﺯﺵ ﻭ ﺩﺭ ﻧﻬﺎﻳﺖ ﺻﻔﺤﻪ ﻭﺏ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﻳﻜﺘﻪ ﻣﻬﻢ ﺩﺭ ﺳﻨﺎﺭﻳﻮﻱ ﻓﻮﻕ ،ﺍﺟﺮﺍﻱ ﺗﻤﺎﻣﻲ ﭘﺮﺩﺍﺯﺵ ﻫﺎ ﺑﺮ ﺭﻭﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ،ﻗﺒﻞ ﺍﺯ
ﺍﺭﺳﺎﻝ ﺻﻔﺤﻪ ﺑﺮﺍﻱ ﻣﺮﻭﺭﮔﺮ ﺍﺳﺖ .ﻳﻜﻲ ﺍﺯ ﻣﺰﺍﻳﺎﻱ ﻋﻤﺪﻩ ﻣﺪﻝ ﻓﻮﻕ ﻧﺴﺒﺖ ﺑﻪ ﻣﺪﻝ Client-
، Sideﺍﻳﻦ ﻣﻮﺭﺩ ﺍﺳﺖ ﻛﻪ :ﺩﺭ ﻳﻚ ﺻﻔﺤﻪ ﻭﺏ ﺻﺮﻓﺎ" ﺷﺎﻫﺪ ﻛﺪﻫﺎﻱ Htmlﺧﻮﺍﻫﻴﻢ ﺑﻮﺩ.
ﺍﻳﻦ ﺑﺪﺍﻥ ﻣﻌﻨﻲ ﺍﺳﺖ ﻛﻪ ﻣﻨﻄﻖ ﺻﻔﺤﺎﺕ ﻭﺏ ﺩﺭ ﻧﺰﺩ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﻣﺨﻔﻲ ﻧﮕﻬﺪﺍﺭﻱ
ﺧﻮﺍﻫﺪ ﺷﺪ ﻭ ﻣﻲ ﺗﻮﺍﻥ ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ ﺭﺍ ﺩﺍﺷﺖ ﻛﻪ ﺍﻛﺜﺮ ﻣﺮﻭﺭﮔﺮﻫﺎ ﻗﺎﺩﺭ ﺑﻪ ﻧﻤﺎﻳﺶ ﻧﺘﺎﻳﺞ
ﭘﺮﺩﺍﺯﺵ ﻫﺎ ﻱ ﺍﺟﺮﺍﺀ ﺷﺪﻩ ﺑﺮ ﺭﻭﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺑﺎﺷﻨﺪ ASP.NET .ﺍﺯ ﻣﺪﻝ ﻓﻮﻕ
ﺗﺒﻌﻴﺖ ﻣﻲ ﻛﻨﺪ .ﻳﻜﻲ ﺩﻳﮕﺮ ﺍﺯ ﻧﻜﺎﺕ ﻣﻬﻢ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻣﺪﻝ ﻓﻮﻕ ،ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﻳﻚ ﺻﻔﺤﻪ
ﺗﺎ ﺯﻣﺎﻧﻴﻜﻪ ﺩﺭﺧﻮﺍﺳﺘﻲ ﺑﺮﺍﻱ ﺁﻥ ﺩﺭﻳﺎﻓﺖ ﻧﺸﺪﻩ ﺑﺎﺷﺪ ،ﻣﺤﺘﻮﻳﺎﺕ ﺁﻥ ﺑﻮﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺁﻣﺪ .ﺩﺭ
ﺍﺩﺍﻣﻪ ﺑﻪ ﺑﺮﺭﺳﻲ ﺑﺮﺧﻲ ﺗﻜﻨﻮﻟﻮﮊﻳﻬﺎﻱ ﻣﺘﺪﺍﻭﻝ ﺩﺭﺍﻳﻦ ﻣﺪﻝ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ.
24
) ، ASP(Active Server Pageﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﻛﻪ ﭘﺲ ﺍﺯ ﻋﺮﺿﻪ ASP.NETﺑﺎ
ﻧﺎﻡ ASPﻛﻼﺳﻴﻚ ﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ ،ﻳﻜﻲ ﺍﺯ ﻣﺘﺪﻭﺍﻟﺘﺮﻳﻦ ﺭﻭﺵ ﻫﺎﺏ ﻣﻮﺟﻮﺩ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ
ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺻﻔﺤﺎﺕ ﻭﺏ ﭘﻮﻳﺎ ﺍﺳﺖ .ﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺑﺎ ﺑﻬﺮﻩ ﮔﻴﺮﻱ ﺍﺯ ﺗﻮﺍﻥ ﺯﺑﺎﻧﻬﺎﻱ
ﺍﺳﻜﺮﻳﭙﺖ ﻧﻈﻴﺮ ﺟﺎﻭﺍﺍﺳﻜﺮﻳﭙﺖ ﻭ Vbscriptﺗﻮﺍﻧﺴﺘﻪ ﺍﺳﺖ ﭘﺎﺳﺦ ﺷﺎﻳﺴﺘﻪ ﺑﻪ ﻃﺮﺍﺡ ﺻﻔﺤﺎﺕ
ﻭﺏ ﭘﻮﻳﺎ ﺭﺍ ﺍﺭﺍﺋﻪ ﻧﻤﺎﻳﺪ ASP .ﻳﻚ ﻣﺎﮊﻭﻝ ﺟﺪﺍﮔﺎﻧﻪ ﺍﺳﺖ ﻛﻪ ﺩﺭ ﻛﻨﺎﺭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ
ﻗﺮﺍﺭ ﻣﻲ ﮔﻴﺮﺩ) . ( ASP.dllﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﻧﺴﺒﺖ ﺑﻪ ﺑﺮﺧﻮﺩ ﺍﺯ ﺗﻜﻨﻮﻟﻮﮊﻳﻬﺎﻱ ﻫﻤﮕﺮﻭﻩ ﺍﺯ
ﻛﺎﺭﺁﻳﻲ ﭘﺎﻳﻴﻦ ﺗﺮﻱ ﺑﺮﺧﻮﺭﺩﺍﺭ ﺑﻮﺩﻩ ﻭ ﺩﺭ ﺯﻣﻴﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺯﺑﺎﻧﻬﺎﺏ ﺍﺳﻜﺮﻳﭙﺖ ﺩﺭ ﻛﻨﺎﺭ ﺧﻮﺩ،
ﻧﻴﺰ ﺩﺍﺭﺍﻱ ﻣﺤﺪﻭﺩﻳﺖ ﺍﺳﺖ .ﺑﻬﺮﺣﺎﻝ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺑﺎ ﺳﺎﺑﻘﻪ ﺷﺶ ﺳﺎﻟﻪ ﺗﺎﻛﻨﻮﻥ ﺗﻮﺍﻧﺴﺘﻪ
ﺍﺳﺖ ﺑﻪ ﺧﻴﻞ ﻋﻈﻴﻢ ﺩﺭﺧﻮﺍﺳﺖ ﻫﺎ ﺑﺮﺍﺏ ﺍﻳﺠﺎﺩ ﺻﻔﺤﺎﺕ ﭘﻮﻳﺎ ﺩﺭﺳﺖ ﭘﺎﺳﺦ ﺩﻫﺪ ،ﻭﻟﻲ ﺑﺎ
ﻇﻬﻮﺭ ﺧﻮﺍﺳﺘﻪ ﻫﺎ ﻭ ﺍﻧﺘﻈﺎﺭﺍﺕ ﺟﺪﻳﺪ ﺑﻪ ﭼﺎﻟﺶ ﺟﺪﻱ ﻛﺸﻴﺪﻩ ﺷﺪﻩ ﺍﺳﺖ ﻭ ﺷﺎﻳﺪ ﻇﻬﻮﺭ ﻭ
ﺗﻮﻟﺪ ASP.NETﺩﻟﻴﻞ ﻭ ﭘﺎﺳﺨﻲ ﺑﻪ ﺑﺮﺧﻲ ﺍﺯ ﺍﻧﺘﻘﺎﺩﺍﺕ ﻣﻄﺮﻭﺣﻪ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺑﺎﺷﺪ.
) ، JSP (JavaServer pageﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺍﻣﻜﺎﻥ ﺗﺮﻛﻴﺐ Htmlﻭﻳﺎ Xmlﺭﺍ ﺑﺎ
ﻛﺪﻫﺎﻱ ﺟﺎﻭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺍﻳﻦ ﻓﻨﺎﻭﺭﻱ ﺑﺮﺧﻼﻑ ASPﻛﻪ ﺻﺮﻓﺎ" ﺗﻮﺳﻂ ﺳﺮﻭﻳﺲ
ﺩﻫﻨﺪﻩ ﻭﺏ ﻣﺎﻛﺮﻭﺳﺎﻓﺖ ) ( IISﺣﻤﺎﻳﺖ ﻣﻲ ﮔﺮﺩﺩ ،ﺗﻮﺳﻂ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻣﺘﻌﺪﺩﻱ
ﺣﻤﺎﻳﺖ ﺷﺪﻩ ﺍﺳﺖ JSP .ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ASPﺑﻤﺮﺍﺗﺐ ﺩﺍﺭﺍﻱ ﻗﺪﺭﺕ ﻭ ﺳﺮﻋﺖ ﺑﻴﺸﺘﺮﻱ ﺑﻮﺩﻩ
ﻭ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﺎﻥ ﺟﺎﻭﺍ ﺑﺨﻮﺑﻲ ﺑﺎ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﺁﻥ ﺁﺷﻨﺎﺋﻲ ﺩﺍﺭﻧﺪ JSP .ﺍﻳﻦ ﺍﻣﻜﺎﻥ ﺭﺍ
ﻓﺮﺍﻫﻢ ﻣﻲ ﻛﻨﺪ ﻛﻪ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺟﺎﻭﺍ ﺍﺯ ﻭﻳﮋﮔﻲ ﻣﺤﻴﻂ ﻫﺎﻱ ﻣﺘﻜﻲ ﺑﺮ Java2ﻧﻈﻴﺮ
JavaBeansﻭ Java2 Librariesﺑﺨﻮﺑﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ.
25
ﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺍﺯ ﻣﺠﻤﻮﻋﻪ ﺯﻳﺎﺩﻱ ﺗﮓ ﻛﻪ ﺗﻮﺳﻂ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ColdFusionﺍﺭﺍﺋﻪ ﺷﺪﻩ
ﺍﺳﺖ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻛﻨﺪ .ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻓﻮﻕ ﺑﺮ ﺭﻭﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻣﺘﻌﺪﺩﻱ ﺣﺘﻲ IIS
ﻧﺼﺐ ﻭ ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺳﺖ .ﻣﻬﻤﺘﺮﻳﻦ ﻣﺴﺌﻠﻪ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺩﺭ ﺍﻳﻦ ﺍﺳﺖ ﻛﻪ ﺍﺯ
ﺗﮓ ﻫﺎﻱ Html-Likeﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ ) ﺩﺭ ASP.NETﺍﺯ ﺯﺑﺎﻧﻬﺎﻱ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﻲ ﻭ
ﺍﺷﻴﺎﺀ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ( .ﻳﻜﻲ ﺩﻳﮕﺮ ﺍﺯ ﻧﻜﺎﺕ ﻣﻬﻢ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺩﺭ ﺍﻳﻦ ﺍﺳﺖ
ﻛﻪ ﺗﻬﻴﻪ ﺁﻥ ﺭﺍﻳﮕﺎﻥ ﻧﺒﻮﺩﻩ ﻭ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻴﺶ ﺍﺯ ﻫﺰﺍﺭ ﺩﻻﺭ ﺑﺮﺍﻱ ﺗﻬﻴﻪ ﺁﻥ ﻫﺰﻳﻨﻪ ﻧﻤﻮﺩ!
26
ﻣﻲ ﻛﻨﺪ .ﺯﺑﺎﻧﻬﺎﺋﻲ ﻧﻈﻴﺮ Python, Perl ، Jscript.NET ، C# ، VB.NETﻧﻤﻮﻧﻪ
ﻫﺎﺋﻲ ﺍﺯ ﺯﺑﺎﻧﻬﺎﺋﻲ ﻣﻲ ﺑﺎﺷﻨﺪ ﻛﻪ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺁﻧﻬﺎ ﺑﻬﻤﺮﺍﻩ ASP.NETﺍﺳﺘﻔﺎﺩﻩ ﻛﺮﺩ.
ﺍﻣﺮﻭﺯﻩ ﺑﻴﺶ ﺍﺯ ﭘﺎﻧﺼﺪ ﻣﻴﻠﻴﻮﻥ ﻧﻔﺮ ﺩﺭ ﺳﺮﺍﺳﺮ ﺩﻧﻴﺎ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﺗﻌﺪﺍﺩ ﺻﻔﺤﺎﺕ ﻭﺏ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﻣﺮﺯ ﭼﻬﺎﺭ ﻣﻴﻠﻴﺎﺭﺩ ﮔﺬﺷﺘﻪ ﻭ ﻫﻤﭽﻨﺎﻥ ﺍﻳﻦ ﺭﻭﻧﺪ ﺑﺎ
ﺳﺮﻋﺘﻲ ﺑﺎﻭﺭﻧﮑﺮﺩﻧﻲ ﺭﻭ ﺑﻪ ﺍﻓﺰﺍﻳﺶ ﺍﺳﺖ .ﺣﺠﻢ ﻣﺒﺎﺩﻻﺕ ﺗﺠﺎﺭﻱ ﺑﺮ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ،ﺍﺯ ﻣﺮﺯ
ﻧﻴﻢ ﺗﺮﻳﻠﻴﻮﻥ ﺩﻻﺭ ﮔﺬﺷﺘﻪ ﻭ ﺍﻓﻖ ﺟﺪﻳﺪﻱ ﺭﺍ ﺑﺮﺍﻱ ﺗﻤﺎﻣﻲ ﺑﻨﮕﺎﻩ ﻫﺎﻱ ﺗﺠﺎﺭﻱ ﺩﺭ ﺳﺮﺗﺎﺳﺮ ﺩﻧﻴﺎ
ﺍﻳﺠﺎﺩ ﻧﻤﻮﺩﻩ ﺍﺳﺖ .ﺭﺷﺪ ﻭ ﮔﺴﺘﺮﺵ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﺗﻤﺎﻣﻲ ﻋﺮﺻﻪ ﻫﺎ ،ﺗﻌﺠﺐ ﺍﮐﺜﺮ ﮐﺎﺭﺷﻨﺎﺳﺎﻥ ﻭ
ﻣﺘﺨﺼﺼﻴﻦ ﺭﺍ ﺑﺎﻋﺚ ﺷﺪﻩ ﺍﺳﺖ .ﺑﻪ ﺍﻋﺘﻘﺎﺩ ﺍﻏﻠﺐ ﮐﺎﺭﺷﻨﺎﺳﺎﻥ ﻫﻨﻮﺯ ﺩﺭ ﻣﻴﺎﻧﻪ ﺭﺍﻩ ﺑﻮﺩﻩ ﻭ ﻳﮏ
ﺍﻧﻘﻼﺏ ﺩﻳﺠﻴﺘﺎﻟﻲ ﮐﺎﻣﻞ ﻭ ﺑﺴﻴﺎﺭ ﻓﺮﺍﮔﻴﺮ ﺭﺍ ﺩﺭ ﺁﻳﻨﺪﻩ ﺷﺎﻫﺪ ﺧﻮﺍﻫﻴﻢ ﺑﻮﺩ.
ﻭﺿﻌﻴﺖ ﻓﻌﻠﻲ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﺍﻏﻠﺐ ﻣﻮﺍﺭﺩ ،ﻣﺸﺎﺑﻪ ﻭﺿﻌﻴﺖ ﻣﺪﻝ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﺑﺰﺭﮒ
) (Mainfarameﺩﺭ ﮔﺬﺷﺘﻪ ﺍﺳﺖ .ﺩﺭ ﻗﻴﺎﺱ ﻓﻮﻕ ،ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﺑﻤﻨﺰﻟﻪ ﺗﺮﻣﻴﻨﺎﻝ ﻫﺎﻱ
ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﺑﺰﺭﮒ ﺑﻮﺩﻩ ﻭ ﺩﻗﻴﻘﺎ" ﺩﺭ ﻫﻤﺎﻥ ﺭﺍﺳﺘﺎ ﺍﻳﻔﺎﻱ ﻭﻇﻴﻔﻪ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺗﻤﺎﻡ ﺍﻃﻼﻋﺎﺕ
ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﺣﺎﻝ ﺣﺎﺿﺮ ﺩﺭ ﺑﺎﻧﮏ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻣﺘﻤﺮﮐﺰ ﺷﺪﻩ ﺍﻱ ،ﺫﺧﻴﺮﻩ
ﺷﺪﻩ ﺍﺳﺖ .ﮐﺎﺭﺑﺮﺍﻥ ﺩﺭ ﻫﺮ ﻟﺤﻈﻪ ﻗﺎﺩﺭ ﺑﻪ ﺩﺭﻳﺎﻓﺖ ﻳﮏ ﺻﻔﺤﻪ ﻭﺏ ﺍﺯ ﻳﮏ ﻭﺏ ﺳﺎﻳﺖ
ﻣﻲ ﺑﺎﺷﻨﺪ .ﺻﻔﺤﺎﺕ ﻭﺏ ،ﺻﺮﻓﺎ" ﺗﺼﻮﻳﺮﻱ ﺍﺯ ﺩﺍﺩﻩ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﮐﺎﺭﺑﺮﺍﻥ ﺑﻮﺩﻩ ﻭ ﺩﺍﺩﻩ
ﻫﺎﻱ ﻭﺍﻗﻌﻲ ﻭ ﺍﺳﺎﺳﻲ ﺭﺍ ﺷﺎﻣﻞ ﻧﻤﻲ ﮔﺮﺩﻧﺪ ) .ﺷﺎﻣﻞ ﺧﻮﺩ ﺩﺍﺩﻩ ﻫﺎ ﻧﻤﻲ ﺑﺎﺷﻨﺪ ( .ﺍﻃﻼﻋﺎﺕ
ﻣﻮﺟﻮﺩ ﺩﺭ ﺻﻔﺤﺎﺕ ﻭﺏ ﺭﺍ ﻣﻲ ﺗﻮﺍﻥ ﺩﺭﻳﺎﻓﺖ ﮐﺮﺩ ،ﻭﻟﻲ ﺍﻣﮑﺎﻥ ﻭﻳﺮﺍﻳﺶ ،ﺗﻔﺴﻴﺮ ﻫﺎﻱ ﺟﺎﻧﺒﻲ
ﻭ ﻳﺎ ﺳﺎﻳﺮ ﻋﻤﻠﻴﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺳﻔﺎﺭﺷﻲ ﻧﻤﻮﺩﻥ ﺩﺍﺩﻩ ﻫﺎ ،ﺍﻣﺮﻱ ﺑﺴﻴﺎﺭ ﻣﺸﮑﻞ ﻭ ﺩﺭ ﺑﺮﺧﻲ
ﺣﺎﻻﺕ ﻏﻴﺮﻣﻤﮑﻦ ﺍﺳﺖ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺑﺮﺧﻲ ﮐﺎﺭﺑﺮﺍﻥ ﻗﺼﺪ ﺍﺳﺘﺨﺮﺍﺝ ﻭ ﺟﻤﻊ ﺁﻭﺭﻱ
ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﭼﻨﺪﻳﻦ ﻭﺏ ﺳﺎﻳﺖ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺭ ﻧﻬﺎﻳﺖ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ
ﺭﺍ ﺍﺯ ﺻﻔﺤﺎﺕ ﻭﺏ ﻣﺘﻔﺎﻭﺕ ﺍﻧﺘﺨﺎﺏ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺩﺭ ﻳﮏ ﻓﺎﻳﻞ ﺩﻳﮕﺮ ﮐﻪ ﺑﺎ ﻳﮏ ﺍﺩﻳﺘﻮﺭ ﺧﺎﺹ
27
ﻧﻈﻴﺮ notepadﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ ،ﻗﺮﺍﺭ ﺩﻫﻨﺪ .ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ﺑﺼﻮﺭﺕ ﮐﺎﻣﻼ" ﺩﺳﺘﻲ ﺗﻮﺳﻂ
ﮐﺎﺭﺑﺮﺍﻥ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﻭ ﻋﻤﻼ" ﻳﮏ ﺣﺮﮐﺖ ﺳﻴﺴﺘﻤﺎﺗﻴﮏ ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﺍﻧﺠﺎﻡ ﻧﻤﻲ ﮔﻴﺮﺩ" .ﺗﻴﻢ
ﺑﺮﻧﺮﺯ ﻟﻲ" ،ﻣﺒﺘﮑﺮ ﻭﺏ ،ﺩﺭ ﺯﻣﺎﻥ ﺍﻳﺠﺎﺩ ﻭﺏ ﺑﺮ ﺧﺎﺻﻴﺖ " ﻣﺤﻴﻂ ﻣﺤﺎﻭﺭﻩ ﺍﻱ " ﺁﻥ ﺗﺎﮐﻴﺪ
ﻓﺮﺍﻭﺍﻥ ﺩﺍﺷﺖ .ﻭﺿﻌﻴﺖ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺍﺳﺘﺨﺮﺍﺝ ﻭ ﺟﻤﻊ ﺁﻭﺭﻱ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ
ﺍﺯ ﻭﺏ ﺳﺎﻳﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ،ﺑﺎ ﺍﻳﺪﻩ ﻣﻄﺮﺡ ﺷﺪﻩ ﻓﻮﻕ ﻓﺎﺻﻠﻪ ﺯﻳﺎﺩﻱ ﺩﺍﺭﺩ.
ﺑﻤﻨﻈﻮﺭ ﮔﺬﺭ ﺍﺯ ﻭﺿﻌﻴﺖ ﻓﻌﻠﻲ ﻭﺏ ﻭ ﺍﺭﺗﻘﺎﺀ ﺁﻥ ﺑﻪ ﻣﺤﻴﻄﻲ ﮐﻪ ﺻﺮﻓﺎ" ﻧﻤﺎﻳﺶ ﺩﻫﻨﺪﻩ
ﺍﻃﻼﻋﺎﺕ ﺍﻳﺴﺘﺎ ﻧﺒﺎﺷﺪ ،ﻻﺯﻡ ﺍﺳﺖ ﻧﺴﻞ ﺟﺪﻳﺪﻱ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﮐﻪ ﭘﺎﺳﺨﮕﻮﻱ ﻧﻴﺎﺯ ﻫﺎ ﻭ ﺍﻧﺘﻈﺎﺭﺍﺕ
ﻓﻌﻠﻲ ﻭ ﻣﺸﮑﻼﺕ ﻣﻮﺟﻮﺩ ﺑﺎﺷﺪ ،ﺑﻮﺟﻮﺩ ﺁﻳﺪ .ﻭﺏ ﺳﺎﻳﺖ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﻣﺸﺎﺑﻪ ﺟﺰﺍﻳﺮ
ﺍﻃﻼﻋﺎﺗﻲ ﺑﻮﺩﻩ ﮐﻪ ﮔﺮﭼﻪ ﺩﺭ ﻫﺮ ﻳﮏ ﺍﺯ ﺟﺰﺍﻳﺮ ﻓﻮﻕ ﻣﻤﮑﻦ ﺍﺳﺖ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺼﻮﺭﺕ ﭘﻮﻳﺎ ﻧﻴﺰ
ﺍﻳﺠﺎﺩ ﮔﺮﺩﺩ ،ﻭﻟﻲ ﻫﻴﭽﮕﻮﻧﻪ ﺗﻌﺎﻣﻞ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻴﻦ ﺟﺰﺍﻳﺮ ﻓﻮﻕ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ .ﺗﻨﻬﺎ ﺗﻌﺎﻣﻞ
ﺍﺭﺗﺒﺎﻃﻲ ﺑﺎ ﺟﺰﺍﻳﺮ ﻓﻮﻕ ﺗﻮﺳﻂ ﮐﺎﺭﺑﺮﺍﻥ ﺁﻥ ﺳﺎﻳﺖ ﺍﻳﺠﺎﺩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﻻﺯﻡ ﺍﺳﺖ ،
ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ،ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻫﻮﺷﻤﻨﺪ ،ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ﺩﺭ ﻳﮏ ﻫﻤﻴﺎﺭﻱ ﻭ ﻫﻤﮑﺎﺭﻱ
ﺗﻌﺮﻳﻒ ﺷﺪﻩ ،ﺯﻣﻴﻨﻪ ﺍﺭﺗﺒﺎﻁ ﻭ ﺗﻌﺎﻣﻞ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻴﻦ ﻫﺮ ﻳﮏ ﺍﺯ ﺟﺰﺍﻳﺮ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﻓﺮﺍﻫﻢ
ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﻧﺴﻞ ﻗﺒﻠﻲ ﺍﻳﻨﺘﺮﻧﺖ ﺗﻤﺎﻡ ﺗﻼﺵ ﺩﺭ ﺟﻬﺖ ﺑﻬﺒﻮﺩ ﻧﺤﻮﻩ ﺍﺭﺗﺒﺎﻁ ﮐﺎﺭﺑﺮﺍﻥ ﺑﺎ ﻫﺮ ﻳﮏ ﺍﺯ
ﺟﺰﺍﻳﺮ ﺍﻃﻼﻋﺎﺗﻲ ﺻﺮﻑ ﮔﺮﺩﻳﺪ ،ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺩﺭ ﻧﺴﻞ ﺟﺪﻳﺪ ﺍﻳﻨﺘﺮﻧﺖ ﻻﺯﻡ ﺍﺳﺖ ،ﺗﻌﺎﻣﻞ
ﺍﻃﻼﻋﺎﺗﻲ ﺑﻴﻦ ﺟﺰﺍﻳﺮ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻮﺟﻮﺩ ﺁﻳﺪ ﻭ ﻓﺼﻞ ﺟﺪﻳﺪﻱ ﺑﺎ ﻧﺎﻡ " ﮔﻔﺘﻤﺎﻥ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ "
ﻣﻮﺟﻮﺩ ﺩﺭ ﻫﺮ ﻳﮏ ﺍﺯ ﺟﺰﺍﻳﺮ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺷﺎﻫﺪ ﺑﺎﺷﻴﻢ ،ﺑﺎ ﺣﺮﮐﺖ ﺑﺴﻤﺖ ﻣﺪﻝ ﻓﻮﻕ ،ﺟﺰﺍﻳﺮ
ﺍﻃﻼﻋﺎﺗﻲ ﺍﻳﺰﻭﻟﻪ ﺷﺪﻩ ﺍﺯ ﺣﺎﻟﺖ ﻣﺤﺪﻭﺩ ﺧﻮﺩ ﺧﺎﺭﺝ ﺷﺪﻩ ﻭ ﺑﻴﻦ ﺟﺰﺍﻳﺮ ﻓﻮﻕ ،ﭘﻞ ﻫﺎﻱ
ﻣﺘﻔﺎﻭﺕ ﺍﻃﻼﻋﺎﺗﻲ ﺍﻳﺠﺎﺩ ﻭ ﻋﻤﻼ" ﺑﺎ ﺗﺤﻮﻟﻲ ﺷﮕﺮﻑ ﻣﻮﺍﺟﻪ ﺧﻮﺍﻫﻴﻢ ﺷﺪ .ﺍﻏﻠﺐ ﺳﺮﻭﻳﺲ ﻫﺎ
ﻭ ﺍﻣﮑﺎﻧﺎﺕ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺑﻪ ﮐﺎﺭﺑﺮﺍﻥ ﺗﺎﮐﻨﻮﻥ ﺍﺯ ﻃﺮﻳﻖ ﻫﻤﻴﻦ ﺟﺰﺍﻳﺮ ﺍﻃﻼﻋﺎﺗﻲ ﺍﻳﺰﻭﻟﻪ ﺷﺪﻩ ﻗﺮﺍﺭ
ﻣﻲ ﮔﺮﻓﺖ ،ﺩﺭ ﺻﻮﺭﺕ ﺍﺭﺗﺒﺎﻁ ﺍﻃﻼﻋﺎﺗﻲ ﻭ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺑﻴﻦ ﺟﺰﺍﻳﺮ ﺍﻃﻼﻋﺎﺗﻲ ،ﺩﺳﺘﺎﻭﺭﺩﻫﺎﻱ
ﺑﻤﺮﺍﺗﺐ ﮔﺴﺘﺮﺩﻩ ﺗﺮﻱ ﻧﺴﺒﺖ ﺑﻪ ﻭﺿﻌﻴﺖ ﻓﻌﻠﻲ ﺭﺍ ﺑﺪﻧﺒﺎﻝ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ.
28
،(Language Extensible Markup(XMLﻫﺴﺘﻪ ﺍﺳﺎﺳﻲ ﮔﺬﺭ ﺍﺯ ﻣﺮﺣﻠﻪ ﻓﻌﻠﻲ
ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﻗﺪﻡ ﮔﺬﺍﺷﺘﻦ ﺩﺭ ﻧﺴﻞ ﺟﺪﻳﺪ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺖ ، XML .ﻳﮏ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺻﻨﻌﺘﻲ ﺍﺭﺍﺋﻪ
ﺷﺪﻩ ﺗﻮﺳﻂ ﮐﻨﺴﺮﺳﻴﻮﻡ ﻭﺏ ﺍﺳﺖ ﮐﻪ ﺗﻮﺳﻂ ﺍﮐﺜﺮ ﺷﺮﮐﺖ ﻫﺎﻱ ﻋﻈﻴﻢ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺩﺭ ﺳﻄﺢ
ﺩﻧﻴﺎ ﭘﺬﻳﺮﻓﺘﻪ ﺷﺪﻩ ﻭ ﺑﻌﻨﻮﺍﻥ ﻣﺤﻮﺭ ﺗﻮﺳﻌﻪ ﺩﺭ ﻧﺴﻞ ﺟﺪﻳﺪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﻭ ﺍﻫﺘﻤﺎﻡ ﺟﺪﻱ
ﺍﺳﺖ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ، XMLﺑﻴﻦ ﻧﺤﻮﻩ ﻧﻤﺎﻳﺶ ﺍﻃﻼﻋﺎﺕ ﻭ ﺧﻮﺩ ﺍﻃﻼﻋﺎﺕ ،ﻳﮏ ﺗﻤﺎﻳﺰ ﻭ
ﺗﻔﮑﻴﮏ ﺍﻳﺠﺎﺩ ﻣﻲ ﮔﺮﺩﺩ XML .ﺩﺭ ﻣﻮﺍﺭﺩ ﻣﺘﻌﺪﺩ ،ﺩﺍﺭﺍﻱ ﻋﻤﻠﮑﺮﺩﻱ ﻣﺸﺎﺑﻪ HTML
ﺍﺳﺖ .ﺩﺭ HTMLﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﮓ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ،ﻧﺤﻮﻩ ﻧﻤﺎﻳﺶ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺻﻔﺤﺎﺕ ﻭﺏ
ﺗﻌﺮﻳﻒ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ XMLﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﮓ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ،ﺳﺎﺧﺘﺎﺭ ﻣﻨﺎﺳﺒﻲ ﺑﺮﺍﻱ
ﺍﻃﻼﻋﺎﺕ ﺗﻌﺮﻳﻒ ﻭ ﺍﻣﮑﺎﻥ ﺍﺭﺳﺎﻝ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺍﺩﻩ ﻫﺎ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ
ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﺷﺪ ، XML .ﺍﻣﮑﺎﻥ ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ،ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﻲ ،ﻭﻳﺮﺍﻳﺶ ﻭ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ
ﺑﺎ ﺳﺎﻳﺮ ﺳﺎﻳﺖ ﻫﺎ ،ﺑﺮﻧﺎﻣﻪ ﻭ ﺩﺳﺘﮕﺎﻫﻬﺎ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﺁﻭﺭﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﻫﺮ ﻳﮏ ﺍﺯ ﺻﻔﺤﺎﺕ
ﻭﺏ ﺩﺍﺭﺍﻱ ﻳﮏ ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﻲ ﮐﻮﭼﮏ ﺷﺪﻩ ) ﺍﻃﻼﻋﺎﺕ ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﺎﺧﺘﺎﺭﻫﺎﻱ (XMLﮐﻪ
ﺑﺮﺍﺣﺘﻲ ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺳﺎﺧﺘﺎﺭ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺑﺮﺍﻱ ﺩﺍﺩﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ،ﺍﺯ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ
ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﻲ ﺩﺭ ﺟﻬﺖ ﻧﻴﻞ ﺑﻪ ﺧﻮﺍﺳﺘﻪ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺑﺎ
ﺁﮔﺎﻫﻲ ﺍﺯ ﺳﺎﺧﺘﺎﺭ ﺩﺍﺩﻩ ﻫﺎﻱ ﺫﺧﻴﺮﻩ ﺷﺪﻩ )ﺳﺎﺧﺘﻤﺎﻥ ﺩﺍﺩﻩ( ﻗﺎﺩﺭ ﺑﻪ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻣﺘﻔﺎﻭﺕ ﻭ
ﮔﻮﻧﺎﮔﻮﻧﻲ ﺧﻮﺍﻫﺪ ﺷﺪ .ﻣﺜﻼ" ﺑﺎ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﻗﻴﻤﺖ ﺳﻬﺎﻡ ﺍﺯ ﻭﺏ ﺳﺎﻳﺖ
ﻣﺮﺑﻮﻃﻪ ،ﻣﻲ ﺗﻮﺍﻥ ﺑﺮ ﺭﻭﻱ ﺳﺎﻳﺖ ﺧﻮﺩ ﺍﻧﻮﺍﻉ ﺗﺤﻠﻴﻞ ﻫﺎﻱ ﭘﻮﻳﺎ ﻭ ﮔﺰﺍﺭﺷﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﭘﺲ
ﺍﺯ ﺍﻧﺠﺎﻡ ﭘﺮﺩﺍﺯﺵ ﻫﺎﻱ ﻻﺯﻡ ،ﺍﺭﺍﺋﻪ ﺩﺍﺩ .ﭘﺮﺩﺍﺯﺵ ﻫﺎﻱ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺩﺭ ﻳﮏ ﻭﺏ ﺳﺎﻳﺖ ﺑﺮ ﺭﻭﻱ
ﺩﺍﺩﻩ ﻫﺎ) ﺩﺍﺩﻩ ﻫﺎ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺳﺎﺧﺘﺎﺭ ﻣﻨﺎﺳﺐ ﻣﺒﺘﻨﻲ ﺑﺮ XMLﺗﻌﺮﻳﻒ ﻣﻲ ﮔﺮﺩﻧﺪ (
ﻣﻤﮑﻦ ﺍﺳﺖ ﺑﺎ ﭘﺮﺩﺍﺯﺵ ﻫﺎﻱ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺩﺭ ﻭﺏ ﺳﺎﻳﺖ ﺩﻳﮕﺮ ﻣﺘﻔﺎﻭﺕ ﺑﺎﺷﺪ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ
ﺩﺭ ﺍﺑﺘﺪﺍ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺎﻳﻞ ﻫﺎﻱ XMLﺩﺭﻳﺎﻓﺖ ﻭ ﭘﺲ ﺍﺯ ﺍﻧﺠﺎﻡ ﭘﺮﺩﺍﺯﺵ ﻫﺎﻱ
ﻻﺯﻡ ﻭ ﺩﻟﺨﻮﺍﻩ ،ﺑﺎ ﻓﻮﺭﻣﺖ ﻣﻮﺭﺩ ﻧﻈﺮ ) ﻧﻪ ﺗﺤﻤﻴﻠﻲ ( ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﮐﺎﺭﺑﺮﺍﻥ ﺳﺎﻳﺖ ﻗﺮﺍﺭ ﺩﺍﺩﻩ
ﺧﻮﺍﻫﺪ ﺷﺪ XML .ﺩﺭ ﺳﻨﺎﺭﻳﻮﻱ ﻓﻮﻕ ﺑﻤﻨﺰﻟﻪ ﭘﻞ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻮﺩﻩ ﮐﻪ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﺮ ﺍﺳﺎﺱ
29
ﺳﺎﺧﺘﺎﺭ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺳﺎﻳﺮ ﺳﺎﻳﺖ ﻫﺎ )ﻧﻤﺎﻳﻨﺪﮔﺎﻥ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﻣﺮﺑﻮﻃﻪ( ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ
ﺩﺍﺩ.
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ، XMLﻭﺏ ﺳﺎﻳﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﻗﺎﺩﺭ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﻃﻼﻋﺎﺕ ﺑﻴﻦ
ﻳﮑﺪﻳﮕﺮ ﺑﻮﺩﻩ ﻭ ﺿﺮﻭﺭﺗﻲ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺯﺑﺎﻥ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﻲ ﻭ ﻳﺎ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺧﺎﺹ
ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﻭﺏ ﺳﺎﻳﺖ ﻫﺎ ﺑﺎ ﺍﻳﺠﺎﺩ ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ،ﻗﺎﺩﺭ ﺑﻪ ﺍﻳﺠﺎﺩ
ﻳﮏ ﺍﺭﺗﺒﺎﻁ ﻭ ﺗﻌﺎﻣﻞ ﻫﻮﺷﻤﻨﺪﺍﻧﻪ ﺑﻴﻦ ﺧﻮﺩ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺍﻃﻼﻋﺎﺕ ﺑﺴﺎﺩﮔﻲ ﺑﻴﻦ
ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺣﺮﮐﺖ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
ﻧﺴﻞ ﺟﺪﻳﺪ ﺍﻳﻨﺘﺮﻧﺖ ﻳﮏ ﭘﻼﺕ ﻓﻮﺭﻡ ﺍﺭﺗﺒﺎﻃﻲ ﻭ ﻣﺤﺎﺳﺒﺎﺗﻲ ﻧﻈﻴﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺷﺨﺼﻲ
ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺑﺮﻧﺎﻣﻪ ﻫﺎﺋﻲ ﮐﻪ ﺑﺮﺍﻱ ﺍﻳﻨﺘﺮﻧﺖ ﻧﻮﺷﺘﻪ ﻣﻲ ﮔﺮﺩﻧﺪ ) ﻧﻈﻴﺮ ﺑﺮﻧﺎﻣﻪ ﻫﺎﺋﻲ ﮐﻪ ﺑﺮﺍﻱ
ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺷﺨﺼﻲ ﻧﻮﺷﺘﻪ ﻣﻲ ﺷﻮﺩ ( ،ﺩﺭ ﻭﺏ ﺳﺎﻳﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﻗﺎﺑﻠﻴﺖ ﺍﺟﺮﺍﺀ ﺭﺍ ﺩﺍﺷﺘﻪ
ﻭ ﭘﺲ ﺍﺯ ﺍﺧﺬ ﺍﻃﻼﻋﺎﺕ ﻭ ﺧﺪﻣﺎﺕ ﺍﺯ ﻳﮑﺪﻳﮕﺮ ،ﺑﺎ ﺗﺮﮐﻴﺐ ﻭ ﺗﻮﺯﻳﻊ ﺁﻧﻬﺎ ﺑﺎ ﺍﺷﮑﺎﻝ ﮐﺎﻣﻼ"
ﺧﺎﺹ ﻭ ﺳﻔﺎﺭﺷﻲ ،ﺍﻣﮑﺎﻥ ﺍﺭﺳﺎﻝ ﺁﻧﻬﺎ ﺑﺮﺍﻱ ﻫﺮ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ،ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﻓﺎﺻﻠﻪ ﻣﻮﺟﻮﺩ ﺑﻴﻦ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﺨﺼﻲ ﻭ ﻳﺎ ﺳﺎﻳﺮ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺣﺬﻑ ﻭ ﻧﺮﻡ
ﺍﻓﺰﺍﺭﻫﺎﻱ ﭘﻴﺸﺮﻓﺘﻪ ﺍﻱ ﺑﺼﻮﺭﺕ ﺍﺗﻮﻣﺎﺗﻴﮏ ،ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﮐﺎﺭﺑﺮﺍﻥ ﺭﺍ ﺑﺼﻮﺭﺕ ﻣﺤﻠﻲ ﻭ
ﻳﺎ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺟﻤﻊ ﺁﻭﺭﻱ ﻭ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻣﺘﻘﺎﺿﻴﺎﻥ ﻗﺮﺍﺭ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ.
ﺩﺭ ﻧﺴﻞ ﺟﺪﻳﺪ ﺍﻳﻨﺘﺮﻧﺖ ﻓﺎﺻﻠﻪ ﻣﻮﺟﻮﺩ ﺑﻴﻦ ﺍﻃﻼﻋﺎﺕ ، onlineﺳﺮﻭﻳﺲ ﻫﺎ ﻭ ﺩﺳﺘﮕﺎﻫﻬﺎ،
ﺷﮑﺴﺘﻪ )ﺣﺬﻑ( ﺷﺪﻩ ﻭ ﺍﻧﻘﻼﺑﻲ ﺩﺭ ﺯﻣﻴﻨﻪ ﻧﺤﻮﻩ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺁﻧﻬﺎ ﺭﺍ ﺷﺎﻫﺪ ﺧﻮﺍﻫﻴﻢ ﺑﻮﺩ .ﺍﻣﺮﻭﺯﻩ،
ﮐﺎﺭﺑﺮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻭ ﺑﮑﺎﺭﮔﻴﺮﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﺠﺰﺍ ﺑﺮﺍﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﻋﻤﻠﻴﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ
ﺧﻮﺩ ،ﺍﻣﮑﺎﻥ ﺍﺧﺬ ﺍﻃﻼﻋﺎﺕ ،ﻧﻮﺷﺘﻦ ﻭ ﻳﺎ ﻭﻳﺮﺍﻳﺶ ﻧﺎﻣﻪ ﻫﺎﻱ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ﻭ ﻳﺎ ﭘﻴﺎﻡ ﻫﺎﻱ
ﻓﻮﺭﻱ ﻭ ﺳﺎﻳﺮ ﻣﻮﺍﺭﺩ ﺩﻟﺨﻮﺍﻩ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺭﻧﺪ .ﺩﺭ ﻧﺴﻞ ﺟﺪﻳﺪ ﺍﻳﻨﺘﺮﻧﺖ ،ﺑﺎ ﺭﻭﻳﮑﺮﺩﻱ
ﮐﺎﻣﻼ" ﻣﺠﺘﻤﻊ ﻭ ﻫﻤﮕﻦ ﻣﻮﺍﺟﻪ ﺧﻮﺍﻫﻴﻢ ﺑﻮﺩ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ،ﮐﺎﺭﺑﺮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ
30
ﺍﻳﻨﺘﺮﻓﻴﺲ ) ﺭﺍﺑﻂ( ﻭﺍﺣﺪ ،ﻗﺎﺩﺭ ﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻃﻲ ﺷﻔﺎﻑ ﺑﻴﻦ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﺨﺼﻲ ﻭ
ﻳﺎ ﺳﺎﻳﺮﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺑﻮﺩﻩ ﻭ ﺍﺯ ﺍﻳﻦ ﻃﺮﻳﻖ ﺍﻣﮑﺎﻥ ﻣﺸﺎﻫﺪﻩ ،ﻭﻳﺮﺍﻳﺶ ،ﺯﻣﺎﻧﺒﻨﺪﻱ،
ﺍﺭﺗﺒﺎﻁ ﻭ ﺁﻧﺎﻟﻴﺰ ﺩﺍﺩﻩ ﻫﺎ ﺭﺍ ﭘﻴﺪﺍ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ .ﮐﺎﺭﺑﺮﺍﻥ ﻗﺎﺩﺭﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﺎﺯﻣﺎﻥ ﻣﺘﺒﻮﻉ
ﺧﻮﺩ ﺑﮑﻤﮏ ﺭﻭﺵ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﺍﻣﺮﻭﺯﻩ ﺗﻌﺪﺍﺩ ﻧﺎﻣﻪ ﻫﺎﻱ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ﮐﻪ ﻫﺮ
ﻓﺮﺩ ﺩﺭﻳﺎﻓﺖ ﻭ ﺣﺎﻭﻱ ﻧﻮﺷﺘﻪ ﻫﺎﻱ ﺗﺎﻳﭗ ﺷﺪﻩ ﻭ ﻳﺎ ﺣﺎﺷﻴﻪ ﻧﻮﻳﺴﻲ ﺻﻮﺗﻲ ﻣﻲ ﺑﺎﺷﻨﺪ ،ﺑﺴﻴﺎﺭ
ﻣﺤﺪﻭﺩ ﺍﺳﺖ .ﺩﺭ ﺁﻳﻨﺪﻩ ،ﺍﮐﺜﺮ ﭘﻴﺎﻡ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺎ ﻓﻮﺭﻣﺘﻲ ﺑﺠﺰ ﻣﺘﻦ ﻫﺎﻱ ﺗﺎﻳﭗ ﺷﺪﻩ ﺩﺭ
ﺍﺧﺘﻴﺎﺭ ﻣﺨﺎﻃﺒﺎﻥ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﮔﺮﻓﺖ.
ﺑﻬﺮﺣﺎﻝ ﻭﺿﻌﻴﺖ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﻭﺏ ﺑﺴﺮﻋﺖ ﺩﺭ ﺣﺎﻝ ﺗﻐﻴﻴﺮ ﺍﺳﺖ .ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺗﺤﺖ ﻭﺏ ﺩﺍﺭﺍﻱ
ﻣﺴﺌﻮﻟﻴﺘﻲ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮ ﻧﺴﺒﺖ ﺑﻪ ﮔﺬﺷﺘﻪ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺳﻄﺢ ﺍﻧﺘﻈﺎﺭﺍﺕ ﻭ ﺧﻮﺍﺳﺘﻪ ﻫﺎ ﺧﻮﺍﻫﻨﺪ
ﺑﻮﺩ .ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺗﺪﻭﻳﻦ ،ﻃﺮﺍﺣﻲ ﻭ ﻋﺮﺿﻪ ﺷﺪﻩ ﺍﺳﺖXML .
ﺳﺘﺎﺭﻩ ﺍﻱ ﺑﻲ ﻓﺮﻭﻍ ﺩﺭ ﺑﻴﻦ ﺗﻤﺎﻡ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺑﻮﺩﻩ ﮐﻪ ﺑﻌﻨﻮﺍﻥ ﺷﺎﻩ ﮐﻠﻴﺪ ﻃﻼﺋﻲ
ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺍﻳﻔﺎﻱ ﻭﻇﻴﻔﻪ ﻣﻲ ﻧﻤﺎﻳﺪ .ﻭﺏ ﺳﺎﻳﺖ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ، HTMLﺩﺭ ﺁﻳﻨﺪﻩ ﺍﻱ ﻧﻪ
ﭼﻨﺪﺍﻥ ﺩﻭﺭ ﺑﻪ ﺳﺎﻳﺖ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ XMLﺗﺒﺪﻳﻞ ﺗﺎ ﺑﺘﻮﺍﻧﻨﺪ ﺩﺭ ﺑﻴﻦ ﻣﻴﻠﻴﻮﻥ ﻫﺎ ﻭﺏ ﺳﺎﻳﺖ
ﻣﻮﺟﻮﺩ ،ﺯﺑﺎﻧﻲ ﺑﺮﺍﻱ ﮔﻔﺘﻦ ﻭ ﮔﻮﺷﻲ ﺑﺮﺍﻱ ﺷﻨﻴﺪﻥ ،ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﻭﺏ ﺳﺎﻳﺖ
ﻫﺎ ﺍﺯ ﺣﺎﻟﺖ ﺍﻳﺰﻭﻟﻪ ﻭ ﻣﺤﺪﻭﺩ ﻭ ﻣﺤﺼﻮﺭ ﺩﺭ ﻳﮏ ﺣﺼﺎﺭ ﻓﻴﺰﻳﮑﻲ ﻭ ﻣﻨﻄﻘﻲ ﺧﺎﺭﺝ ﻭ ﺯﻣﻴﻨﻪ
ﺍﺭﺗﺒﺎﻁ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻴﻦ ﺁﻧﻬﺎ ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﺷﺪ .ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﺑﺎﻻﺗﺮﻳﻦ ﺑﻬﺮﻩ ﺭﺍ
ﺧﻮﺍﻫﻨﺪ ﺑﺮﺩ .ﺁﻧﺎﻥ ﻓﻘﻂ ﺧﻮﺍﺳﺘﻪ ﺧﻮﺩ ﺭﺍ ﻣﻄﺮﺡ ﻭ ﺑﺎ ﺗﻤﻬﻴﺪﺍﺕ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ،ﺩﺭ ﺳﺮﻳﻌﺘﺮﻳﻦ ﺯﻣﺎﻥ
ﻣﻤﮑﻦ ،ﻣﻨﻄﻘﻲ ﺗﺮﻳﻦ ﻭ ﻣﺒﺴﻮﻁ ﺗﺮﻳﻦ ﭘﺎﺳﺦ ﺑﻪ ﺁﻧﻬﺎ ﺍﺭﺍﺋﻪ ﺧﻮﺍﻫﺪ ﺷﺪ ، .ﭘﺎﺳﺨﻲ ﮐﻪ ﺑﺮﺍﻱ
ﺑﺪﺳﺖ ﺁﻭﺭﺩﻥ ﺁﻥ ،ﻭﺏ ﺳﺎﻳﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﺩﺭ ﺗﻌﺎﻣﻞ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺗﺎ
ﺑﺘﻮﺍﻧﻨﺪ ﺳﻄﺢ ﺟﺪﻳﺪﻱ ﺍﺯ ﺍﻧﺘﻈﺎﺭﺍﺕ ﻭ ﺧﻮﺍﺳﺘﻪ ﻫﺎ ﺭﺍ ﺗﺤﻘﻖ ﻧﻤﺎﻳﻨﺪ .ﻧﺴﻞ ﺟﺪﻳﺪ ﺍﻳﻨﺘﺮﻧﺖ
ﻣﺴﺘﻠﺰﻡ ﻭﺟﻮﺩ ﺳﺎﻳﺖ ﻫﺎﺋﻲ ﺍﺳﺖ ﮐﻪ ﻳﺎﺩ ﮔﺮﻓﺘﻪ ﺍﻧﺪ ﭼﮕﻮﻧﻪ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻣﺮﺍﻭﺩﻩ ﺍﻃﻼﻋﺎﺗﻲ
ﺩﺍﺷﺘﻪ ﻭ ﻫﺮ ﺭﻭﺯ ﻧﻴﺰ ﺑﺮ ﺍﻳﻦ ﺗﻮﺍﻥ ﻭ ﭘﺘﺎﻧﺴﻴﻞ ﻧﻴﺰ ﻣﻲ ﺍﻓﺰﺍﻳﻨﺪ.
31
ﺗﻌﺎﺭﻳﻒ ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﻲ ﺗﺤﺖ ﻭﺏ
ﺑﺮﺍﻱ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﺑﺮﻧﺎﻣﻪ ﻫﺎﺋﻲ ﺑﺎ ﻗﺎﺑﻠﻴﺖ ﺍﺟﺮﺍﺀ ﺑﺮ ﺭﻭﻱ ﻭﺏ ،ﺍﺯ ﻭﺍﮊﻩ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ Web-based ، Web-enabled :ﻭ Web applicationﻧﻤﻮﻧﻪ
ﻫﺎﺋﻲ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻭﺍﮊﻩ ﻫﺎﻱ Web-Basedﻭ Web-enabledﺩﺭ ﺑﺮﺧﻲ
ﻣﻮﺍﺭﺩ ﺑﺠﺎﻱ ﻳﮑﺪﻳﮕﺮ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺗﺎ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻧﻮﺷﺘﻪ ﺷﺪﻩ ﺑﺮﺍﻱ ﺍﺟﺮﺍﺀ ﺑﺮ ﺭﻭﻱ ﻭﺏ،
ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺍﻳﻨﺘﺮﻧﺖ ﻧﻈﻴﺮ ﺍﻳﻨﺘﺮﺍﻧﺖ ﻫﺎ ﺭﺍ ﺗﺸﺮﻳﺢ ﻭ ﻣﺸﺨﺺ ﻧﻤﺎﻳﻨﺪ .ﺑﻪ ﻫﺮ ﻳﮏ ﺍﺯ
ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻓﻮﻕ ،ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﻣﺮﻭﺭﮔﺮ ﺩﺳﺘﻴﺎﺑﻲ ﭘﻴﺪﺍ ﮐﺮﺩ .ﺍﻳﻦ ﻧﻮﻉ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﺩﺭ
ﻣﻮﺍﺭﺩ ﻣﺘﻌﺪﺩﻱ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻣﺘﻔﺎﻭﺕ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻃﺮﺍﺣﻲ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ) Web-Basedﻣﺒﺘﻨﻲ
ﺑﺮ ﻭﺏ ( ،ﺑﮕﻮﻧﻪ ﺍﻱ ﺍﺳﺖ ﮐﻪ ﻗﺎﺑﻠﻴﺖ ﺍﺟﺮﺍﺀ ﺑﺮ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﻭﺏ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ،ﺩﺭ
ﻣﻘﺎﺑﻞ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ، Web-enabledﺩﺍﺭﺍﻱ ﻳﮏ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻣﺒﺘﻲ ﺑﺮ ﻭﺏ ﺑﻤﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﻧﺮﻡ ﺍﻓﺮﺍﺭﻫﺎﻱ ﻣﻮﺟﻮﺩ ) ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺳﻨﺘﻲ ( ﻣﻲ ﺑﺎﺷﻨﺪ .ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻓﻮﻕ
ﻗﺒﻞ ﺍﺯ ﻣﻄﺮﺡ ﺷﺪﻥ ﻭﺏ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﻭ ﺑﺎ ﻃﺮﺍﺣﻲ ﻳﮏ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ
ﺍﻣﮑﺎﻧﺎﺕ ﺁﻧﻬﺎ ﺩﺭ ﺻﻔﺤﺎﺕ ﻭﺏ ﻧﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﻣﺜﻼ" ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﻃﺮﺍﺣﻲ ﻳﮏ ﻓﺮﻡ ﻻﺯﻡ،
ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺍﺯ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺧﺬ ﻭ ﺑﺎ ﻣﺮﺍﺟﻌﻪ ﺑﻪ ﺑﺎﻧﮏ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻣﻮﺟﻮﺩ ،ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ
ﻧﻈﺮ ﺭﺍ ﺍﺳﺘﺨﺮﺍﺝ ﻭ ﻧﺘﺎﻳﺞ ﺭﺍ ﺑﺎ ﻳﮏ ﻓﺮﻣﺖ ﻣﻨﺎﺳﺐ ﺑﺮﺍﻱ ﻣﺮﻭﺭﮔﺮ ﺍﺭﺳﺎﻝ ﮐﺮﺩ .ﺑﻬﺮﺣﺎﻝ ﺑﺮﻧﺎﻣﻪ
ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ،ﺍﺯ ﺁﻏﺎﺯ ﺑﺎ ﺭﻭﻳﮑﺮﺩ ﻭﺏ ،ﻃﺮﺍﺣﻲ ﻭ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺷﺪﻩ ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺑﺮﻧﺎﻣﻪ
ﻫﺎﻱ ، Web-enabledﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﮑﻤﮏ ﻳﮏ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻣﺒﺘﻲ ﺑﺮ ﻭﺏ
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
32
ﻣﻲ ﺁﻭﺭﺩ Gateway .ﻣﻮﺟﻮﺩ ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻤﺎﻡ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻭﺟﻮﺩ ﺭﺍ
ﻓﺮﺍﻫﻢ ﻧﺨﻮﺍﻫﺪ ﮐﺮﺩ ﻭ ﺻﺮﻓﺎ" ﭘﺎﺳﺨﮕﻮ ﺑﻪ ﺑﺨﺶ ﻣﺤﺪﻭﺩﻱ ﺍﺯ ﺍﻧﺘﻈﺎﺭﺍﺕ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺑﺪﻳﻬﻲ
ﺍﺳﺖ
ﺑﺨﺶ ﻫﺎﺋﻲ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﻮﺟﻮﺩ )ﺳﻨﺘﻲ( ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺎ ﺭﻭﻳﮑﺮﺩ ﻭﺏ ﺑﺎﺯﻧﻮﻳﺴﻲ ﺷﺪﻩ ﺗﺎ
ﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﺁﻧﺎﻥ ﺑﺎ Gatewayﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ.
ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺑﺮﺧﻲ ﺍﺯ ﺳﺎﻳﺖ ﻫﺎ ﻧﻈﻴﺮ :ﺧﺮﻳﺪ ﮐﺎﻻ ،ﮐﺘﺎﺏ ،ﺭﺯﻭ ﺑﻠﻴﻂ ﻫﻮﺍﭘﻴﻤﺎ ،
ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﻧﺎﻣﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ) ﻧﻈﻴﺮ ( hotmailﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ
ﻭﺏ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺎ ﺑﺮﺧﻲ ﺗﻌﺎﺭﻳﻒ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺗﺤﺖ ﻭﺏ ﺁﺷﻨﺎ ﻣﻲ ﺷﻮﻳﻢ:
● ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﮐﻪ ﺍﺯ ﭘﺮﻭﺗﮑﻞ Httpﺑﻌﻨﻮﺍﻥ ﻫﺴﺘﻪ ﭘﺮﻭﺗﮑﻞ ﺍﺭﺗﺒﺎﻃﻲ ﺧﻮﺩ ﺑﻤﻨﻈﻮﺭ
ﺗﻮﺯﻳﻊ ﻭ ﺍﺭﺍﺋﻪ ﺍﻃﻼﻋﺎﺕ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ﻭ ﺑﺎ ﻓﺮﻣﺖ Htmlﺍﺳﺘﻔﺎﺩﻩ ﻭ ﺁﻧﺎﻥ ﺭﺍ ﺑﺮﺍﻱ ﮐﺎﺭﺑﺮﺍﻥ
ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
33
▪ ﻳﮏ ﻻﻳﻪ ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﻲ
ﺑﺮﺍﻱ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺗﺤﺖ ﻭﺏ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﻭ ﻣﺘﻔﺎﻭﺗﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ
ﮔﺮﺩﺩ .ﺑﻤﻨﻈﻮﺭ ﻃﺮﺍﺣﻲ ﻭ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ﺻﺮﻓﺎ" ﻳﮏ ﺭﻭﺵ ﻭﺟﻮﺩ
ﻧﺪﺍﺷﺘﻪ ﻭ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺭﻭﺵ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﮐﻪ ﻫﺮ ﻳﮏ ﺑﺮﺧﺎﺳﺘﻪ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ
ﻣﻲ ﺑﺎﺷﻨﺪ ،ﺑﻪ ﻫﺪﻑ ﺧﻮﺩ ﺩﺳﺖ ﭘﻴﺪﺍ ﮐﺮﺩ.
34
ﺑﺮﺧﻲ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﻣﺘﻌﻠﻖ ﺑﻪ ﺷﺮﮐﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺑﻮﺩﻩ ﮐﻪ ﺩﺭ
ﺣﺎﻻﺗﻲ ﻣﻤﮑﻦ ﺍﺳﺖ ﺩﺍﺭﺍﻱ ﻋﻤﻠﮑﺮﺩﻫﺎﻱ ﻣﺸﺎﺑﻪ ﺑﺎﺷﻨﺪ .ﮐﻨﺴﺮﺳﻴﻮﻡ ﻭﺏ ﻣﺴﺌﻮﻟﻴﺖ ﺍﺳﺘﺎﻧﺪﺍﺭ
ﻧﻤﻮﺩﻥ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﺮﺗﺒﻂ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ .ﭘﺲ ﺍﺯ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻧﻤﻮﺩﻥ ﻫﺮ ﻳﮏ
ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ،ﺗﻤﺎﻡ ﺗﻮﻟﻴﺪﮐﻨﻨﺪﮔﺎﻥ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻭ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﺳﻌﻲ ﺩﺭ ﺭﻋﺎﻳﺖ
ﻣﻮﺍﺭﺩ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺷﺪﻩ ﮐﺮﺩﻩ ﺗﺎ ﺑﺪﻳﻦ ﻃﺮﻳﻖ ﻣﺨﺎﻃﺒﺎﻥ ﺑﻴﺸﺘﺮﻱ ﺭﺍ ﺟﺬﺏ ﻭ ﺯﻣﻴﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻭﺳﻴﻊ
ﺗﺮ ﻭ ﮔﺴﺘﺮﺩﻩ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻓﻮﻕ ،ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ.
ﻋﻤﻠﮑﺮﺩ ﺍﮐﺜﺮ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺗﺤﺖ ﻭﺏ ﺩﺭ ﻣﻮﺍﺭﺩ ﺑﺴﻴﺎﺭﻱ ﻣﺸﺎﺑﻪ ﻳﮑﺪﻳﮕﺮ ﺍﺳﺖ:
ﺍﺭﺍﺋﻪ ﻳﮏ ﺑﺨﺶ ﺭﺍﺑﻂ ﮐﺎﺭﺑﺮ ﺑﻤﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﮐﺎﺭﺑﺮﺍﻥ :ﺩﺭﻳﺎﻓﺖ ﺧﻮﺍﺳﺘﻪ ﻫﺎ ﻭ ﻳﺎ ﻧﻤﺎﻳﺶ
ﻧﺘﺎﻳﺞ
ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻣﻨﺎﺑﻊ ﺩﺍﺩﻩ ﺋﻲ ) ﺑﺎﻧﮏ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ( ﻭ ﺍﻧﺠﺎﻡ ﭘﺮﺩﺍﺯﺵ ﻫﺎﻱ ﻻﺯﻡ
ﺍﺭﺳﺎﻝ ﻧﺘﺎﻳﺞ ﺑﺪﺳﺘﺖ ﺁﻣﺪﻩ ﺍﺯ ﭘﺮﺩﺍﺯﺵ ﻫﺎﻱ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ
35
ﻫﺪﻑ ﺍﺭﺍﺋﻪ ﻳﮏ ﻣﺪﻝ ﻋﻤﻠﻴﺎﺗﻲ ﺑﺮﺍﻱ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ
ﻣﻲ ﺑﺎﺷﺪ .ﻣﺪﻝ ﭘﻴﺸﻨﻬﺎﺩﻱ ،ﻣﺴﺘﻘﻞ ﺍﺯ ﻧﻮﻉ ﺗﮑﻨﻮﻟﻮﮊﻱ ،ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﻣﺪﻝ ﺻﺮﻓﻨﻈﺮ
ﺍﺯ ﻧﻮﻉ ﺗﮑﻨﻮﻟﻮﮊﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ،ﻣﻲ ﺗﻮﺍﻥ ﺗﻤﺎﻣﻲ ﻋﻤﻠﻴﺎﺗﻲ ﺭﺍ ﮐﻪ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ
ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﺪ ﺭﺍ ﺩﺭ ﭼﻬﺎﺭ ﻻﻳﻪ ﻣﺘﻔﺎﻭﺕ ﺗﺒﻴﻦ ﻭ ﺗﻌﺮﻳﻒ ﮐﺮﺩ.
ﻻﻳﻪ ﺍﺭﺗﺒﺎﻃﻲ
ﻻﻳﻪ ﻣﻴﺎﻧﻲ
ﻻﻳﻪ ﺩﺍﺩﻩ
36
ﻫﺮ ﻳﮏ ﺍﺯ ﻻﻳﻪ ﻫﺎﻱ ﻓﻮﻕ ﻣﺴﺌﻮﻟﻴﺖ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻣﺘﻔﺎﻭﺗﻲ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺷﺘﻪ ﻭ ﺩﺭ ﺍﻳﻦ
ﺭﺍﺳﺘﺎ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ،ﺟﺎﻳﮕﺎﻩ ﻫﺮ ﻳﮏ ﺍﺯ ﻻﻳﻪ ﻫﺎﻱ
ﻓﻮﻕ ﺩﺭ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ﺗﺸﺮﻳﺢ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺗﺒﻴﻦ ﺟﺎﻳﮕﺎﻩ ﻫﺮ ﻳﮏ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ
ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭﻻﻳﻪ ﻫﺎ ،ﭘﺮﺩﺍﺧﺘﻪ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺁﺷﻨﺎﺋﻲ ﺑﺎ ﻋﻤﻠﮑﺮﺩ ﻫﺮ ﻻﻳﻪ ﻭ ﺷﻨﺎﺧﺖ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ،ﺯﻣﻴﻨﻪ ﺷﻨﺎﺧﺖ ﺍﺻﻮﻟﻲ،
ﻣﻨﻄﻘﻲ ﻭ ﺳﻴﺴﺘﻤﺎﺗﻴﮏ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ﺭﺍ ﺑﻮﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺁﻭﺭﺩ .ﺩﺍﻣﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
ﺑﺮﺧﻲ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎ ﺻﺮﻓﺎ" ﺩﺭ ﺣﺪ ﻭ ﺍﻧﺪﺍﺯﻩ ﻳﮏ ﻻﻳﻪ ﺑﻮﺩﻩ ﻭ ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎ
ﺩﺍﺭﺍﻱ ﻋﻤﺎﮐﺮﺩﻱ ﻓﺮﺍ ﻻﻳﻪ ﺍﻱ ﺑﻮﺩﻩ ﻭ ﻣﻤﮑﻦ ﺍﺳﺖ ﺩﺭ ﭼﻨﺪﻳﻦ ﻻﻳﻪ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﻧﺪ.
37
ﻻﻳﻪ ﺭﺍﺑﻂ ﮐﺎﺭﺑﺮ
ﻻﻳﻪ ﺭﺍﺑﻂ ﮐﺎﺭﺑﺮ ﺑﺨﺸﻲ ﺍﺯ ﻳﮏ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺑﻮﺩﻩ ﮐﻪ ﻣﺴﺌﻮﻟﻴﺖ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﮐﺎﺭﺑﺮﺍﻥ ﺭﺍ
ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ .ﮐﺎﺭﺑﺮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻣﮑﺎﻧﺎﺕ ﻻﻳﻪ ﻓﻮﻕ ،ﻗﺎﺩﺭ ﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻧﺮﻡ ﺍﻓﺰﺍﺭ
ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻣﮑﺎﻧﺎﺕ ﻭ ﭘﺘﺎﻧﺴﻴﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﻻﻳﻪ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﺯﻳﺮ
ﺍﺳﺖ :
ﺭﺍﺑﻂ ﮐﺎﺭﺑﺮ ﺑﻌﻨﻮﺍﻥ ﻳﮏ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺑﻴﻦ ﺩﻧﻴﺎﻱ ﮐﺎﺭﺑﺮﺍﻥ ﻭ ﺩﻧﻴﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺳﺖ.
ﺑﺨﺶ ﺭﺍﺑﻂ ﮐﺎﺭﺑﺮ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺮﻭﺭﮔﺮ ،ﺍﺭﺍﺋﻪ
ﻣﻲ ﮔﺮﺩﺩ.
ﺗﻤﺎﻡ ﺑﺤﺚ ﻫﺎ ﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﻻﻳﻪ ﺭﺍﺑﻂ ﮐﺎﺭﺑﺮ ،ﺑﺎ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﺁﻏﺎﺯ ﻣﻲ ﮔﺮﺩﺩ.
ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﺩﺍﺭﺍﻱ ﺍﻣﮑﺎﻧﺎﺕ ﻻﺯﻡ ﺑﺮﺍﻱ ﺗﻔﺴﻴﺮ ﺗﮓ ﻫﺎﻱ Htmlﻭ ﻧﺤﻮﻩ ﻧﻤﺎﻳﺶ
ﺁﻧﺎﻥ ﻣﻲ ﺑﺎﺷﻨﺪ.
38
ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ ﻻﻳﻪ ﻭﺍﺑﺴﺘﻪ ﺑﻪ ﻧﻮﻉ ﻣﺮﻭﺭﮔﺮ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﻣﻤﮑﻦ ﺍﺳﺖ
ﺑﺮﺧﻲ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎ ﺗﻮﺳﻂ ﺑﺮﺧﻲ ﺍﺯ ﻣﺮﻭﺭﮔﺮﻫﺎ ﺣﻤﺎﻳﺖ ﻧﺸﺪﻩ ﻭ ﻳﺎ ﺑﺮﺧﻲ ﺍﺯ
ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎ ﺍﺯ ﻳﮏ ﻧﺴﺨﻪ ﺧﺎﺹ ﺩﺭ ﻣﺮﻭﺭﮔﺮ ﭘﻴﺶ ﺑﻴﻨﻲ ﺷﺪﻩ ﺑﺎﺷﻨﺪ.
ﻣﺮﻭﺭﮔﺮ ﻭﺏ ،ﺑﺮﻧﺎﻣﻪ ﺍﻱ ﺍﺳﺖ ﮐﻪ ﺍﻃﻼﻋﺎﺕ ﺩﺭﺧﻮﺍﺳﺖ ﺷﺪﻩ ﺗﻮﺳﻂ ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ
ﺍﻃﻼﻉ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻭﺏ ﺭﺳﺎﻧﺪﻩ ﻭ ﭘﺲ ﺍﺯ ﺍﺧﺬ ﺍﻃﻼﻋﺎﺕ ،ﺁﻧﻬﺎ ﺭﺍ ﺑﺎ ﻳﮏ ﻓﺮﻣﺖ
ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺑﺮ ﺭﻭﻱ ﺻﻔﺤﺎﺕ ﻧﻤﺎﻳﺸﮕﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﮐﺎﺭﺑﺮﺍﻥ ،ﻧﻤﺎﻳﺶ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ.
ﻳﮏ ﻣﺮﻭﺭﮔﺮ ﻭﺏ ،ﺑﺮﻧﺎﻣﻪ ﺍﻱ ﺍﺳﺖ ﮐﻪ ﺑﻪ ﻣﺘﻘﺎﺿﻲ ﺻﻔﺤﺎﺕ ﻭﺏ ،ﺍﻣﮑﺎﻥ ﻣﺸﺎﻫﺪﻩ
ﺻﻔﺤﺎﺕ ﻭ ﺧﻮﺍﻧﺪﻥ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺭﺍ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ Internet
(IE(Explorerﻭ Navigator Netscapeﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﻣﺘﺪﺍﻭﻝ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ
ﻣﻲ ﺑﺎﺷﻨﺪ.
39
ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ،ﺑﺮﻧﺎﻣﻪ ﻫﺎﺋﻲ ﻣﻲ ﺑﺎﺷﻨﺪ ﮐﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﺎﻥ ﺍﻣﮑﺎﻥ ﻣﺸﺎﻫﺪﻩ ﺻﻔﺤﺎﺕ
ﻭﺏ ،ﺍﺧﺬ ﻓﺎﻳﻞ ﻭ ﺳﺎﻳﺮ ﻋﻤﻠﻴﺎﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﮐﺎﺭﺑﺮﺍﻥ ﺩﺭ ﺯﻣﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﻓﺮﺍﻫﻢ
ﺧﻮﺍﻫﺪ ﺷﺪ.
ﻣﺮﻭﺭﮔﺮﻫﺎ ،ﺻﻔﺤﺎﺕ ﻭﺏ ﺭﺍ ﮐﻪ ﺍﻏﻠﺐ ﺑﺼﻮﺭﺕ ﺗﮓ ﻫﺎﻱ Htmlﻣﻲ ﺑﺎﺷﻨﺪ ،ﺧﻮﺍﻧﺪﻩ ﻭ ﭘﺲ
ﺍﺯ ﺗﻔﺴﻴﺮ ﮐﺪﻫﺎﻱ ﻣﻮﺟﻮﺩ ،ﺯﻣﻴﻨﻪ ﻧﻤﺎﻳﺶ ﻣﺤﺘﻮﻳﺎﺕ ﻭ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ
ﺁﻭﺭﻧﺪ.
ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﻋﻼﻭﻩ ﺑﺮ ﺍﻣﮑﺎﻥ ﺗﻔﺴﻴﺮ ﺗﮓ ﻫﺎﻱ Htmlﺑﻤﻨﻈﻮﺭ ﺗﺒﻴﻦ ﻧﺤﻮﻩ ﻧﻤﺎﻳﺶ ،ﺩﺍﺭﺍﻱ
ﻋﻨﺎﺻﺮ ﻻﺯﻡ ﺑﻤﻨﻈﻮﺭ ﺗﻔﺴﻴﺮ ﺍﺳﮑﺮﻳﭙﺖ ﻫﺎﻱ ﻧﻮﺷﺘﻪ ﺷﺪﻩ ﺑﺎ ﻳﮑﻲ ﺍﺯ ﺯﺑﺎﻧﻬﺎﻱ ﺍﺳﮑﺮﻳﭙﺖ ﻧﻴﺰ
ﻣﻲ ﺑﺎﺷﻨﺪ.
40
ﻣﺮﻭﺭﮔﺮ InterNet Explorer
ﻃﺮﺍﺣﻲ ،ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻭ ﺗﻮﺳﻌﻪ ﻣﺮﻭﺭﮔﺮﻫﺎﻱ ﻭﺏ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﻣﻄﺮﺡ ﺷﺪﻥ ﻭﺏ ،ﺁﻏﺎﺯ ﻭ
ﻫﻤﭽﻨﺎﻥ ﺍﺩﺍﻣﻪ ﺩﺍﺭﺩ
41
.
. WorldWideWebﺍﻳﻦ ﻣﺮﻭﺭﮔﺮ ﺗﻮﺳﻂ " ﺗﻴﻢ .ﺑﺮﻧﺮﺯ ﻟﻲ " ﺩﺭ ﺳﺎﻝ ١٩٩٠ﻭ ﺑﺮ
ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ NeXTﺩﺭ CERNﻧﻮﺷﺘﻪ ﮔﺮﺩﻳﺪ.
42
ﻣﻮﺯﺍﺋﻴﮏ .ﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ ﺗﻮﺳﻂ " "Andreessen Marcﻭ " "Eric Binaﺍﺯ NCSA
ﺩﺭ ﺳﺎﻝ ١٩٩٣ﺑﺮﺍﻱ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ X-Windowsﻭ ﺑﺮ ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ
ﻳﻮﻧﻴﮑﺲ ﻋﺮﺿﻪ ﮔﺮﺩﻳﺪ .ﭼﻨﺪ ﻣﺎﻩ ﺑﻌﺪ ﻧﺴﺨﻪ ﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ ﺑﻤﻨﻈﻮﺭ ﺍﺟﺮﺍﺀ ﺑﺮ ﺭﻭﻱ ﺳﻴﺴﺘﻢ
ﻫﺎﻱ ﻣﮑﻴﻨﺘﺎﺵ ﺗﻮﺳﻂ " "Aleks Toticﻃﺮﺍﺣﻲ ﻭ ﻋﺮﺿﻪ ﮔﺮﺩﻳﺪ .ﻣﻮﺯﺍﺋﻴﮏ ،ﺍﻭﻟﻴﻦ
ﻣﺮﻭﺭﮔﺮﻱ ﺑﺎ ﻗﺎﺑﻠﻴﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺑﺮ ﺭﻭﻱ ﭘﻼﺕ ﻓﻮﺭﻡ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﺑﻮﺩ .ﺍﻳﻦ ﻣﺮﻭﺭﮔﺮ ﺩﺍﺭﺍﻱ
ﺍﻣﮑﺎﻧﺎﺕ ﻣﺘﻌﺪﺩ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺻﻮﺕ ،ﺗﺼﻮﻳﺮ ،ﻓﺎﻳﻞ ﻫﺎﻱ ﺳﻮﺍﺑﻖ ﻭ ...ﺑﻮﺩ .ﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ
ﭘﺲ ﺍﺯ ﻣﺪﺕ ﺯﻣﺎﻥ ﮐﻮﺗﺎﻫﻲ ﺑﻌﻨﻮﺍﻥ ﺭﺍﻳﺞ ﺗﺮﻳﻦ ﻣﺮﻭﺭﮔﺮ ﻏﻴﺮ ﺍﻗﺘﺼﺎﺩﻱ ﻣﻄﺮﺡ ﮔﺮﺩﻳﺪ .ﺩﺭ
ﺍﮔﻮﺳﺖ ﺳﺎﻝ NCSA ، ١٩٩٤ﺣﻖ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ ﺭﺍ ﺑﻪ ﺷﺮﮐﺖ Spyglass
ﻭﺍﮔﺬﺍﺭ ﮐﺮﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺷﺮﮐﺖ ﻓﻮﻕ ،ﺍﻣﺘﻴﺎﺯ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺮﻭﺭﮔﺮ ﻣﻮﺯﺍﺋﻴﮏ ﺭﺍ ﺑﻪ ﺷﺮﮐﺖ
ﻫﺎﻱ ﺩﻳﮕﺮ ﻧﻈﻴﺮ ﻣﺎﮐﺮﻭﺳﺎﻓﺖ ﻭﺍﮔﺬﺍﺭ ﮐﺮﺩ NCSA .ﻋﻤﻠﻴﺎﺕ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻭ ﺗﻮﺳﻌﻪ
ﻣﺮﻭﺭﮔﺮ ﻣﻮﺯﺍﺋﻴﮏ ﺭﺍ ﺩﺭ ﺳﺎﻝ ١٩٩٧ﻣﺘﻮﻗﻒ ﮐﺮﺩ.
43
. Operaﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ ﺩﺭ ﺳﺎﻝ ١٩٩٤ﺗﻮﺳﻂ ﻋﺪﻩ ﺍﻱ ﺍﺯ ﻣﺤﻘﻘﻴﻦ ﻳﮏ ﺷﺮﮐﺖ
ﻣﺨﺎﺑﺮﺍﺗﻲ ﺩﺭ ﺍﺳﻠﻮ ﻧﺮﻭﮊ ،ﺑﺎ ﻧﺎﻡ Telenorﻃﺮﺍﺣﻲ ﮔﺮﺩﻳﺪ .ﺩﺭ ﺳﺎﻝ ﻫﺎﻱ ﺑﻌﺪ ﺩﻭ ﺗﻦ
ﺍﺯ ﺍﻋﻀﺎﻱ ﮔﺮﻭﻩ ﻓﻮﻕ ،ﺍﺯ Telenorﺟﺪﺍ ﺷﺪﻩ ﻭ ﺷﺮﮐﺖ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ Operaﺭﺍ ﺑﺎ
ﻫﺪﻑ ﺗﻮﻟﻴﺪ ﺗﺠﺎﺭﻱ ﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ ،ﺗﺎﺳﻴﺲ ﮐﺮﺩﻧﺪ .ﻧﺴﺨﻪ Oper 2.1ﺩﺭ ﺳﺎﻝ
١٩٩٦ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻋﻤﻮﻡ ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﻋﺮﺿﻪ ﮔﺮﺩﻳﺪ.
. Mozillaﺩﺭ ﺍﮐﺘﺒﺮ ﺳﺎﻝ ، ١٩٩٤ﺷﺮﮐﺖ ﻧﺖ ﺍﺳﮑﻴﭗ ،ﺍﻭﻟﻴﻦ ﻧﺴﺨﻪ ﻣﺮﻭﺭﮔﺮ ﺧﻮﺩ ﺭﺍ
ﺑﺎ ﻧﺎﻡ Mozilla 0.96bﻋﺮﺿﻪ ﻧﻤﻮﺩﻧﺪ ) .ﻧﺴﺨﻪ ﻓﻮﻕ ﻧﺴﺨﻪ ﺑﺘﺎ ﺑﻮﺩ ( .ﺩﺭ ﺩﺳﺎﻣﺒﺮ
ﻫﻤﺎﻥ ﺳﺎﻝ ،ﻧﺴﺨﻪ ﻧﻬﺎﺋﻲ ﻣﺮﻭﺭﮔﺮ ﻓﻮﻕ ﺑﺎ ﻧﺎﻡ ١,٠ Mozillaﻋﺮﺿﻊ ﮔﺮﺩﻳﺪ .ﻣﺮﻭﺭﮔﺮ
ﻓﻮﻕ ﺍﻭﻟﻴﻦ ﻣﺮﻭﺭﮔﺮ ﺗﺠﺎﺭﻱ ﺩﺭ ﻋﺮﺻﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺖ .
44
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻭﺍﮊﻩ "ﻣﺮﻭﺭﮔﺮ " ﺑﺮﺍﻱ. ﻭ ﻳﺎ ﺳﺎﻳﺮ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪHttp
ﭼﺮﺍﮐﻪ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻓﻮﻕ ﻋﻼﻭﻩ ﺑﺮ، ﺍﻳﻦ ﻧﻮﻉ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎ ﭼﻨﺪﺍﻥ ﻣﻨﻄﻘﻲ ﺑﻨﻈﺮ ﻧﻤﻲ ﺭﺳﺪ
ﺩﺍﺭﺍﻱ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﻭ ﻓﺮﺍﻭﺍﻧﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺑﺮﻧﺎﻣﻪ، ﺍﻣﮑﺎﻥ ﺑﺎﺯﻳﺎﺑﻲ ﻭ ﻧﻤﺎﻳﺶ ﺍﻃﻼﻋﺎﺕ
.ﻧﻮﻳﺴﻲ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﺏ ﻣﻲ ﺑﺎﺷﻨﺪ
ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻓﻮﻕ ﺑﻤﻨﺰﻟﻪ ﻳﮏ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻣﻨﺎﺳﺐ ﺑﺮﺍﻱ ﭘﺮﺩﺍﺯﺵ ﻭ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻣﺘﻔﺎﻭﺕ
ﺑﺮﻧﺎﻣﻪ ﻧﻮﻳﺴﺎﻥ ﻭﺏ ﺑﺪﻭﻥ ﺷﻨﺎﺧﺖ ﻭ ﺗﻮﺟﻪ ﺑﻪ ﭘﺘﺎﻧﺴﻴﻞ ﻭ ﺍﻣﮑﺎﻧﺎﺕ.ﺍﻳﻔﺎﻱ ﻭﻇﻴﻔﻪ ﻣﻲ ﻧﻤﺎﻳﻨﺪ
. ﺧﻮﺩ ﻧﺨﻮﺍﻫﻨﺪ ﺑﻮﺩ، ﻗﺎﺩﺭ ﺑﻪ ﺁﻓﺮﻳﻨﺶ ﺁﺛﺎﺭ ﻣﺎﻧﺪﮔﺎﺭ،ﻣﺮﻭﺭﮔﺮﻫﺎ
Windows
Table I java font font plug-
XML dhtmlgif89 CSS tablesframes javabrowsers
color frames script color size ins
n n n n n n N y y n y y n AOL 3.0
n n n n n n N n n n n n n AOL 1.0
y y y y y y Y y y y y y y IE 5.5
s y y y y y Y y y y y y y IE 5.0
n y y y y y Y y y y y y y IE 4.0
n y y n y y Y y y y y y y IE 3.0
n n n n n n N y y n y n n IE 2.0
n n n n n n N y y n y n n IE 1.0
n n n n n n N n y n y y n Mosaic 3.0
n n n n n n N n n n n n n Mosaic 1.0
y y n y y y Y y y y y y y NS 6
n y n y y y Y y y y y y y NS 4.7
n y n y y y Y y y y y y y NS 4.5
n y n n y n Y y y y y y y NS 3.0
n n n n y n S y y y y y y NS 2.0
n n n n n n N n y n y n n NS 1.1
y y n n y y Y y y s y y y Opera 4.2
n y n n y y Y y y y y y n Opera 3.60
n y n n y n Y y y y y y n Opera 3.5
n n n n n n N n n n y y n Lynx
Macintosh
Table I java font font plug-
XML dhtmlgif89 CSS tablesframes javabrowsers
color frames script color size ins
n n n n n n N n n n n n n AOL 2.7
n n n n n n N n n n n n n AOL 1.0
Cyberdog
n n n n y n N y y n y y n
2.0
s y y y y y Y y y y y y y IE 5.0
n y y y y y Y y y y y y y IE 4.0
n y y n y y Y y y y y y y IE 3.0
n n n n n n N y y y y y n IE 2.0
n n n n n n N y y n y y n Mosaic 3.07
n n n n n n N n n n y n n Mosaic 2.0
n n n n n n N n n n n n n Mosaic 1.0
y y n y y y Y y y y y y y NS 6
n y n y y y Y y y y y y y NS 4.74
n y n y y y Y y y y y y y NS 4.5
45
n y n y y s Y y y y y y y NS 4.06
n y n n y s Y y y y y y y NS 3.0
n n n n y n S y y y y y n NS 2.0
n n n n n n N n y n y n n NS 1.1
Unix
Table I java font font plug-
XML dhtmlgif89 CSS tablesframes javabrowsers
color frames script color size ins
y y y y y y Y y y y y y y IE 4.01
n y y y y y Y y y y y y y IE 4.01
n n n n n n N n n n y n n Mosaic 2.75
n n n n n n N n n n n n n Mosaic 1.0
y y n y y n Y y y y y y y NS 4.6
n y n y y n Y y y y y y y NS 4.06
n n n n y n Y y y y y y y NS 3.0
n n n n y n S y y y y y y NS 2.0
n n n n n n N n y n y n n NS 1.1
n n n n n y N n y n y n n Arena 3
n n n n n n N n n n y y n Lynx
Linux
Table I java font font plug-
XML dhtmlgif89 CSS tablesframes javabrowsers
color frames script color size ins
y y n y y y Y y y y y y y NS 6
y y n n y y Y y y y y y s Mozilla
n n y n s y Y y y y y y y NS 4.7
y y n n y y N y y n y y n Amaya
y y n n y y N y y s y y n Opera 4a
n n n n n n N n n n y y n Lynx
Television
Table I java font font plug-
XML dhtmlgif89 CSS tablesframes javabrowsers
color frames script color size ins
n y n n y n Y y y n y y n WebTV
NextStep
Table I java font font plug-
XML dhtmlgif89 CSS tablesframes javabrowsers
color frames script color size ins
OmniWeb
n n n s n n n y y n y y n
2.1
OmniWeb
n n n n n n n y y n n n n
1.0
OS/2
Table I java font font plug-
XML dhtmlgif89 CSS tablesframes javabrowsers
color frames script color size ins
n n n n y n n y y n y n n NS 2.02
n n n n n n n y y n y n n Web IE 1.1
n n n n y n y y y n y y n Opera
n n n n n n n n n n y y n Lynx
46
ﺯﻳﺮ ﺳﺎﺧﺖ ﺍﻳﻨﺘﺮﻧﺖ
47
ﺳﻠﺴﻠﻪ ﻣﺮﺍﺗﺐ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ
ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﮐﻪ ﺑﻪ ﺷﺒﮑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ ،ﺑﺨﺸﻲ ﺍﺯ ﺷﺒﮑﻪ ﺗﻠـــــﻘﻲ
ﻣﻲ ﮔﺮﺩﺩ .ﻣﺜﻼ" ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻠﻔﻦ ) ﻣﻨﺰﻝ ( ﺑﻪ ﻳﮏ ﻣﺮﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ
ﺍﻳﻨﺘﺮﻧﺖ ) (ISPﻣﺘﺼﻞ ﻭ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺭﺩ ﻧﻈﺮ
ﺑﻌﻨﻮﺍﻥ ﺑﺨﺸﻲ ﺍﺯ ﺷﺒﮑﻪ ﺑﺰﺭﮒ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺤﺴﻮﺏ ﺧﻮﺍﻫﺪ ﺷﺪ. .ﺑﺮﺧﻲ ﺍﺯ ﮐﺎﺭﺑﺮﺍﻥ ﺩﺭ ﺍﺩﺍﺭﺍﺕ
ﺧﻮﺩ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺴﺘﺮ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ،ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ،ﮐﺎﺭﺑﺮﺍﻥ
ﺩﺭ ﺍﺑﺘﺪﺍ ﺍﺯ ﺷﺒﮑﻪ ﻣﺤﻠﻲ ﻧﺼﺐ ﺷﺪﻩ ﺩﺭ ﺳﺎﺯﻣﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺷﺒﮑﻪ ﻓﻮﻕ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
ﺧﻄﻮﻁ ﻣﺨﺎﺑﺮﺍﺗﻲ ﺧﺎﺹ ﻭ ﻳﺎ ﺳﺎﻳﺮ ﺍﻣﮑﺎﻧﺎﺕ ﻣﺮﺑﻮﻃﻪ ﺑﻪ ﻳﮏ ﻣﺮﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ
ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﺷﺪﻩ ﺍﺳﺖ .ﻣﺮﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺖ ﻧﻴﺰ ﻣﻤﮑﻦ ﺍﺳﺖ ﺑﻪ ﻳﮏ ﺷﺒﮑﻪ
ﺑﺰﺭﮔﺘﺮ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﺎﺷﺪ .ﺍﻳﻨﺘﺮﻧﺖ ،ﺷﺒﮑﻪ ﺍﻱ ﺍﺳﺖ ﮐﻪ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﻴﺸﻤﺎﺭﻱ ﺗﺸﮑﻴﻞ ﺷﺪﻩ
ﺍﺳﺖ ) ﺷﺒﮑﻪ ﺍﻱ ﺍﺯ ﺳﺎﻳﺮ ﺷﺒﮑﻪ ﻫﺎ (
ﺍﮐﺜﺮ ﺷﺮﮐﺖ ﻫﺎﻱ ﻣﺨﺎﺑﺮﺍﺗﻲ ﺑﺰﺭﮒ ﺩﺍﺭﺍﻱ ﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ ﺍﺧﺘﺼﺎﺻﻲ ﺑﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﻧﺎﺣﻴﻪ ﻫﺎﻱ
ﻣﺘﻔﺎﻭﺕ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﻫﺮ ﻧﺎﺣﻴﻪ ،ﺷﺮﮐﺖ ﻣﺨﺎﺑﺮﺍﺗﻲ ﺩﺍﺭﺍﻱ ﻳﮏ " ﻧﻘﻄﻪ ﺣﻀﻮﺭ" ): POP
(Point of Presenceﺍﺳﺖ ، POP .ﻣﮑﺎﻧﻲ ﺍﺳﺖ ﮐﻪ ﮐﺎﺭﺑﺮﺍﻥ ﻣﺤﻠﻲ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ
ﺑﻪ ﺷﺒﮑﻪ ﺷﺮﮐﺖ ﻣﺨﺎﺑﺮﺍﺗﻲ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ ) .ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺷﺒﮑﻪ ﺍﺯ ﺧﻄﻮﻁ ﺗﻠﻔﻦ
ﻣﻌﻤﻮﻟﻲ ﻭ ﻳﺎ ﺧﻄﻮﻁ ﺍﺧﺘﺼﺎﺻﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ(.
ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ،ﭼﻨﺪﻳﻦ ﺷﺒﮑﻪ ﺳﻄﺢ ﺑﺎﻻ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﮐﻪ ﺗﻮﺳﻂ " ﻧﻘﺎﻁ ﺩﺳﺘﻴﺎﺑﻲ ﺷﺒﮑﻪ"
) (Network Access Points: NAPﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺮﺗﺒﻂ ﻣﻲ ﮔﺮﺩﻧﺪ.
48
ﻓﺮﺽ ﮐﻨﻴﺪ ،ﺷﺮﮐﺖ Aﻳﮏ ﻣﺮﮐﺰﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺰﺭﮒ ﺑﺎﺷﺪ .ﺩﺭﻫﺮ ﺷﻬﺮﺳﺘﺎﻥ
ﺍﺻﻠﻲ ،ﺷﺮﮐﺖ Aﺩﺍﺭﺍﻱ ﻳﮏ POPﺍﺳﺖ .ﻫﺮ ﻳﮏ ﺍﺯ POPﻫﺎ ﺩﺍﺭﺍﻱ ﺍﻣﮑﺎﻧﺎﺕ ﮔﺴﺘﺮﺩﻩ ﺍﻱ
ﺑﻪ ﻣﻨﻈﻮﺭ ﺗﻤﺎﺱ ﮐﺎﺭﺑﺮﺍﻥ ﻣﺤﻠﻲ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺷﺮﮐﺖ Aﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ POPﻫﺎ ﺑﻴﮑﺪﻳﮕﺮ
ﻭ ﺷﺮﮐﺖ ،ﺍﺯ ﺧﻄﻮﻁ ﺍﺧﺘﺼﺎﺻﻲ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﻓﺮﺽ ﮐﻨﻴﺪ ﺷﺮﮐﺖ ،Bﻳﮏ
ﻣﺮﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺖ ﻫﻤﮑﺎﺭﺑﺎﺷﺪ.ﺷﺮﮐﺖ ، Bﺳﺎﺧﺘﻤﺎﻧﻬﺎﻱ ﺑﺰﺭﮔﻲ ﺭﺍ ﺩﺭ
ﺷﻬﺮﻫﺎﻱ ﺍﺻﻠﻲ ﺍﻳﺠﺎﺩ ﻭ ﻣﺎﺷﻴﻦ ﻫﺎﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﺩﺭ ﺁﻧﻬﺎ ﻣﺴﺘﻘﺮ ﻧﻤﻮﺩﻩ
ﺍﺳﺖ .ﺷﺮﮐﺖ Bﺍﺯ ﺧﻄﻮﻁ ﺍﺧﺘﺼﺎﺻﻲ ﻓﻴﺒــﺮﻧﻮﺭﻱ ﺑﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﺳﺎﺧﺘـﻤﺎﻧﻬﺎﻱ ﺍﺳﺘﻔـــﺎﺩﻩ
ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ،ﺗﻤﺎﻡ ﻣﺸﺘﺮﮐﻴﻦ ﺷﺮﮐﺖ Aﻗﺎﺩﺭ ﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻳﮑﺪﻳﮕﺮ
ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﻭﺿﻌﻴﺖ ﻣﺸﺘﺮﮐﻴﻦ ﺷﺮﮐﺖ Bﻧﻴﺰ ﻣﺸﺎﺑﻪ ﻣﺸﺘﺮﮐﻴﻦ ﺷﺮﮐﺖ Aﺍﺳﺖ .ﺁﻧﻬﺎ ﻧﻴﺰ
ﻗﺎﺩﺭ ﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﺍﻣﮑﺎﻥ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ
ﻣﺸﺘﺮﮐﻴﻦ ﺷﺮﮐﺖ Aﻭ ﻣﺸﺘﺮﮐﻴﻦ ﺷﺮﮐﺖ Bﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﺷﺮﮐﺖ ﻫﺎﻱ Aﻭ B
ﺗﺼﻤﻴﻢ ﻣﻲ ﮔﻴﺮﻧﺪ ﺍﺯ ﻃﺮﻳﻖ NAPﺩﺭ ﺷﻬﺮﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺑﻴﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﮔﺮﺩﻧﺪ .ﺗﺮﺍﻓﻴﮏ
ﻣﻮﺟﻮﺩ ﺑﻴﻦ ﺩﻭ ﺷﺮﮐﺖ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﮑﻪ ﻫﺎﻱ ﺩﺍﺧﻠﻲ ﻭ NAPﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ،ﻫﺰﺍﺭﺍﻥ ﻣﺮﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺰﺭﮒ ﺍﺯ ﻃﺮﻳﻖ NAPﺩﺭ ﺷﻬﺮﻫﺎﻱ
ﻣﺘﻔﺎﻭﺕ ﺑﻴﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺩﺭ ﻧﻘﺎﻁ ﻓﻮﻕ ) (NAPﺭﻭﺯﺍﻧﻪ ﻣﻴﻠﻴﺎﺭﺩﻫﺎ ﺑﺎﻳﺖ
ﺍﻃﻼﻋﺎﺕ ﺟﺎﺑﺠﺎ ﻣﻲ ﮔﺮﺩﺩ .ﺍﻳﻨﺘﺮﻧﺖ ،ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺴﻴﺎﺭ ﺑﺰﺭﮒ ﺑﻮﺩﻩ ﮐﻪ ﺗﻤﺎﻡ
ﺁﻧﻬﺎ ﺍﺯ ﻃﺮﻳﻖ NAPﺑﻴـــﮑﺪﻳﮕﺮ ﻣﺮﺗﺒﻂ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺟﻮﺩ
ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﺎﻳﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
ﺗﻤﺎﻡ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺯ ﻃﺮﻳﻖ ،NAPﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﻭ ﺭﻭﺗﺮ ﻗﺎﺩﺭ ﺑﻪ
ﺍﺭﺗﺒﺎﻁ ﺑﺎﻳﮑﺪﻳﮕﺮ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﭘﻴﺎﻡ ﺍﺭﺳﺎﻟﻲ ﺗﻮﺳﻂ ﻳﮏ ﮐﺎﺭﺑﺮ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﭼﻨﺪﻳﻦ ﺷﺒﮑﻪ
ﻣﺘﻔﺎﻭﺕ ﻋﺒﻮﺭ ﺗﺎ ﺑﻪ ﮐﺎﻣــــﭙﻴﻮﺗﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺮﺳــﺪ .ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ﺩﺭ ﮐﻤـﺘﺮ ﺍﺯ ﻳﮏ ﺛﺎﻧﻴﻪ
ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ.
49
ﺭﻭﺗﺮ ،ﻣﺴﻴﺮﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺭﺳﺎﻟﻲ ﺗﻮﺳﻂ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﻳﮕﺮ ﺭﺍ ﺗﻌﻴﻴﻦ
ﻣﻲ ﮐﻨﺪ .ﺭﻭﺗﺮﻫﺎ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺧﺎﺻﻲ ﻣﻲ ﺑﺎﺷﻨﺪ ﮐﻪ ﭘﻴﺎﻡ ﻫﺎﻱ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺗﻮﺳﻂ ﮐﺎﺭﺑﺮﺍﻥ
ﺍﻳﻨﺘﺮﻧﺖ ﺑﺎ ﻭﺟﻮﺩ ﻫﺰﺍﺭﺍﻥ ﻣﺴﻴﺮ ﻣﻮﺟﻮﺩ ﺭﺍ ﻣﺴﻴﺮﻳﺎﺑﻲ ﻭ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﮔﺎﻥ ﻣﺮﺑﻮﻃﻪ
ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺭﻭﺗﺮ ﺩﻭ ﮐﺎﺭ ﺍﺳﺎﺳﻲ ﺭﺍ ﺩﺭ ﺷﺒﮑﻪ ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﺪ:
ﺍﻳﺠﺎﺩ ﺍﻃﻤﻴﻨﺎﻥ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻋﺪﻡ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﻣﮑﺎﻧﻬﺎﺋﻲ ﮐﻪ ﺑﻪ ﺁﻧﻬﺎ ﻧﻴﺎﺯ •
ﻧﻤﻲ ﺑﺎﺷﺪ.
ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺍﺭﺳﺎﻝ ﺻﺠﻴﺢ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈﺮ •
ﺭﻭﺗﺮﻫﺎ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﻭ ﺷﺒﮑﻪ ﻣﺠﺰﺍ ﺭﺍ ﺑﻴﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ
ﻧﻤﺎﻳﻨﺪ .ﺭﻭﺗﺮ ﺑﺎﻋﺚ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ ﺷﺒﮑﻪ ﺩﻳﮕﺮ ،ﺣﻔﺎﻇﺖ ﺷﺒﮑﻪ ﻫﺎ ﺍﺯ
ﻳﮑﺪﻳﮕﺮ ﻭ ﭘﻴﺸﮕﻴﺮﻱ ﺍﺯ ﺗﺮﺍﻓﻴﮏ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﻫﺰﺍﺭﺍﻥ ﺷﺒﮑﻪ
ﮐﻮﭼﮑﺘﺮ ﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺍﺳﺖ ،ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺗﺮ ﻳﮏ ﺿﺮﻭﺭﺕ ﺍﺳﺖ.
ﺩﺭ ﺳﺎﻝ ١٩٨٧ﻣﻮﺳﺴﻪ ، NSFﺍﻭﻟﻴﻦ ﺷﺒﮑﻪ ﺑﺎ ﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ ﭘﺮ ﺳﺮﻋﺖ ﺭﺍ ﺍﻳﺠﺎﺩ ﮐﺮﺩ .ﺷﺒﮑﻪ
ﻓﻮﻕ NSFNETﻧﺎﻣﻴﺪﻩ ﺷﺪ .ﺩﺭ ﺍﻳﻦ ﺷﺒﮑﻪ ﺍﺯ ﻳﮏ ﺧﻂ ﺍﺧﺘﺼﺎﺻﻲ T1ﺍﺳﺘﻔﺎﺩﻩ ﻭ ١٧٠
ﺷﺒﮑﻪ ﮐﻮﭼﮑﺘﺮ ﺑﻴﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻳﺪﻧﺪ .ﺳﺮﻋﺖ ﺷﺒﮑﻪ ﻓﻮﻕ ١,٥٤٤ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ
ﺑﻮﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺷﺮﮐﺖ ﻫﺎﻱ MCI ، IBMﻭ ، Meritﺷﺒﮑﻪ ﻓﻮﻕ ﺭﺍ ﺗﻮﺳﻌﻪ ﻭ ﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ
ﺁﻥ ﺭﺍ ﺑﻪ T3ﺗﺒﺪﻳﻞ ﮐﺮﺩﻧﺪ) ٤٥ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ( .ﺑﺮﺍﻱ ﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ ﺷﺒﮑﻪ ﺍﺯ ﺧﻄﻮﻁ
ﻓﻴﺒﺮﻧﻮﺭﻱ ) (fiber optic trunkﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﻳﺪ.ﻫﺮ trunkﺍﺯ ﭼﻨﺪﻳﻦ ﮐﺎﺑﻞ ﻓﻴﺒﺮ
ﻧﻮﺭﻱ ﺗﺸﮑﻴﻞ ﻣﻲ ﮔﺮﺩﺩ) ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻓﺰﺍﻳﺶ ﻇﺮﻓﻴﺖ(.
ﭘﺮﻭﺗﮑﻞ ﺍﻳﻨﺘﺮﻧﺖ
ﻫﺮ ﻣﺎﺷﻴﻦ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺍﺭﺍﻱ ﻳﮏ ﺷﻤﺎﺭﻩ ﺷﻨﺎﺳﺎﺋﻲ ﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ ﺍﺳﺖ .ﺍﻳﻦ ﺷﻤﺎﺭﻩ
ﺷﻨﺎﺳﺎﺋﻲ ،ﺁﺩﺭﺱ (Internet Protocol(IPﻧﺎﻣﻴﺪﻩ ﻣﻲ ﮔﺮﺩﺩ .ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﻣﺸﺎﺑﻪ
ﻳﮏ ﺯﺑﺎﻥ ﺍﺭﺗﺒﺎﻃﻲ ﻣﺸﺘﺮﮎ ﺑﺮﺍﻱ ﮔﻔﺘﮕﻮﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ
50
،ﺑﻪ ﻣﺠﻤﻮﻋﻪ ﻗﻮﺍﻧﻴﻨﻲ ﺍﻃﻼﻕ ﻣﻲ ﮔﺮﺩﺩ ﮐﻪ ﺑﺎ ﺍﺳﺘﻨﺎﺩ ﺑﻪ ﺁﻥ ﮔﻔﺘﮕﻮ ﻭ ﺗﺒﺎﺩﻝ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻴﻦ ﺩﻭ
ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻴﺴﺮ ﺧﻮﺍﻫﺪ ﺷﺪ IP .ﺩﺍﺭﺍﻱ ﻓﺮﻣﺘﻲ ﺑﺼﻮﺭﺕ ٢١١,٢٧,٦٥,١٣٨:ﺍﺳﺖ.
ﺑﺨﺎﻃﺮ ﺳﭙﺮﺩﻥ ﺁﺩﺭﺱ ﻫﺎﻱ IPﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺭﺩ ﻧﻄﺮ ،ﻣﺸﮑﻞ ﺍﺳﺖ.
ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺍﺭﺍﻱ ﻧﺎﻡ ﺍﻧﺤﺼﺎﺭﻱ ﺧﻮﺩ ﺷﺪﻩ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﺳﻴﺴﺘﻤﻲ ﺩﻳﮕﺮ،
ﺁﺩﺭﺱ IPﺑﻪ ﻧﺎﻡ ﺩﺭﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ،ﻧﺴﺒﺖ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ.
ﺩﺭ ﺁﻏﺎﺯ ﺷﮑﻞ ﮔﻴﺮﻱ ﺍﻳﻨﺘﺮﻧﺖ ،ﺗﻌﺪﺍﺩ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺑﺴﻴﺎﺭ ﮐﻢ ﺑﻮﺩ ﻭ ﻫﺮ
ﮐﺎﺭﺑﺮ ﮐﻪ ﻗﺼﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺷﺒﮑﻪ ﺭﺍ ﺩﺍﺷﺖ ،ﭘﺲ ﺍﺯ ﺍﺗﺼﺎﻝ ﺑﻪ ﺷﺒﮑﻪ ﺍﺯ ﺁﺩﺭﺱ IPﮐﺎﻣﭙﻴﻮﺗﺮ
ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮐﺮﺩ .ﺭﻭﺵ ﻓﻮﻕ ﻣﺎﺩﺍﻣﻴﮑﻪ ﺗﻌﺪﺍﺩ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ
ﻣﻴﺰﺑﺎﻥ ﮐﻢ ﺑﻮﺩﻧﺪ ،ﻣﻔﻴﺪ ﻭﺍﻗﻊ ﮔﺮﺩﻳﺪ ﻭﻟﻲ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺍﻓﺰﺍﻳﺶ ﺗﻌﺪﺍﺩ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ﺩﺭ
ﺷﺒﮑﻪ ﺍﻳﻨﺘﺮﻧﺖ ،ﮐﺎﺭﺁﺋﻲ ﺭﻭﺵ ﻓﻮﻕ ﺑﺸﺪﺕ ﺍﻓﺖ ﻭ ﻏﻴﺮﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﻳﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺣﻞ
ﻣﺸﮑﻞ ﻓﻮﻕ ﺍﺯ ﻳﮏ ﻓﺎﻳﻞ ﺳﺎﺩﻩ ﻣﺘﻨﻲ ﮐﻪ ﺗﻮﺳﻂ " ﻣﺮﮐﺰ ﺍﻃﻼﻋﺎﺕ ﺷﺒﮑﻪ " ) (NICﭘﺸﺘﻴﺒﺎﻧﻲ
ﻣﻲ ﮔﺮﺩﻳﺪ ،ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﻳﺪ .ﺑﻤﻮﺍﺯﺍﺕ ﺭﺷﺪ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﻭﺭﻭﺩ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ﺑﻴﺸﺘﺮ ﺩﺭ
ﺷﺒﮑﻪ ،ﺣﺠﻢ ﻓﺎﻳﻞ ﻓﻮﻕ ﺍﻓﺰﺍﻳﺶ ﻭ ﺑﺪﻟﻴﻞ ﺳﺎﻳﺮ ﻣﺴﺎﺋﻞ ﺟﺎﻧﺒﻲ ،ﻋﻤﻼ" ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ ﻓﻮﻕ
ﺑﺮﺍﻱ ﺑﺮﻃﺮﻑ ﻣﺸﮑﻞ " ﺗﺒﺪﻳﻞ ﻧﺎﻡ ﺑﻪ ﺁﺩﺭﺱ " ﻓﺎﻗﺪ ﮐﺎﺭﺁﺋﻲ ﻻﺯﻡ ﺑﻮﺩ .ﺩﺭﺳﺎﻝ ، ١٩٨٣ﺳﻴﺴﺘﻢ
(DNS(Domain Name Systemﺍﺭﺍﺋﻪ ﮔﺮﺩﻳﺪ .ﺳﻴﺴﺘﻢ ﻓﻮﻕ ﻣﺴﺌﻮﻝ ﺗﻄﺒﻴﻖ ﻧﺎﻡ ﺑﻪ
ﺁﺩﺭﺱ ،ﺑﺼﻮﺭﺕ ﺍﺗﻮﻣﺎﺗﻴﮏ ﺍﺳﺖ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﺑﻪ ﻳﮏ
ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻴﺰﺑﺎﻥ ،ﺻﺮﻓﺎ" ﻣﻲ ﺗﻮﺍﺗﻨﺪ ﻧﺎﻡ ﺁﻥ ﺭﺍ ﻣﺸﺨﺺ ﮐﺮﺩﻩ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ،DNS
ﺁﺩﺭﺱ IPﻣﺮﺑﻮﻃﻪ ﺁﻥ ﻣﺸﺨﺺ ﺗﺎ ﺯﻣﻴﻨﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ.
51
ﻧﺎﻡ ﺑﻪ ﺁﺩﺭﺱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﻮﺩ .ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ DNSﺩﺭﺧﻮﺍﺳﺖ ﻫﺎﺋﻲ ﺭﺍ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﻭ
ﻳﺎ ﺳﺎﻳﺮ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ DNSﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺒﺪﻳﻞ ﻧﺎﻡ ﺑﻪ ﺁﺩﺭﺱ ﺩﺭﻳﺎﻓﺖ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺩﺭ ﺯﻣﺎﻥ ﺩﺭﻳﺎﻓﺖ ﻳﮏ ﺩﺭﺧﻮﺍﺳﺖ ،ﺑﺮ ﺍﺳﺎﺱ ﻳﮑﻲ ﺍﺯ ﺭﻭﺵ ﻫﺎﻱ ﺯﻳﺮ
ﺑﺎ ﺁﻥ ﺑﺮﺧﻮﺭﺩ ﺧﻮﺍﻫﺪ ﮐﺮﺩ:
ﻗﺎﺩﺭ ﺑﻪ ﭘﺎﺳﺦ ﺩﺍﺩﻥ ﺑﻪ ﺩﺭﺧﻮﺍﺳﺖ ﺍﺳﺖ IP .ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺮﺍﻱ ﻧﺎﻡ ﺩﺭﺧﻮﺍﺳﺖ ﺷﺪﻩ ﺭﺍ •
52
ﺩﺭﺧﻮﺍﺳﺖ ﺁﺩﺭﺱ IPﺳﺎﻳﺖ ﻣﻮﺭﺩ ﻧﻄﺮ ﺭﺍ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺁﺩﺭﺱ IP
ﺳﺎﻳﺖ ﺩﺭﺧﻮﺍﺳﺖ ﺷﺪﻩ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺷﻤﺎ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﺩﺍﺩ.
ﺑﺎ ﻣﺸﺨﺺ ﺷﺪﻩ ﺁﺩﺭﺱ IPﺳﺎﻳﺖ ﻣﻮﺭﺩ ﻧﻈﺮ ،ﺍﻣﮑﺎﻥ ﺍﺗﺼﺎﻝ ﺑﻪ ﺳﺎﻳﺖ ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺍﺯ ﻧﮑﺎﺕ ﻗﺎﺑﻞ ﺗﻮﺟﻪ ﺳﻴﺴﺘﻢ ﻓﻮﻕ ،ﻭﺟﻮﺩ ﭼﻨﺪﻳﻦ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻫﻢ ﺳﻄﺢ DNSﺍﺳﺖ
.ﺑﻨﺎﺑﺮﺍﻳﻦ ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﻳﮑﻲ ﺍﺯ ﺁﻧﻬﺎ ﺑﺎ ﺍﺷﮑﺎﻝ ﻣﻮﺍﺟﻪ ﮔﺮﺩﺩ ،ﺍﺯ ﺳﺎﻳﺮ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﺑﻪ
ﻣﻨﻈﻮﺭ ﺗﺮﺟﻤﻪ ﻧﺎﻡ ﺑﻪ ﺁﺩﺭﺱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻳﮑﻲ ﺩﻳﮕﺮ ﺍﺯ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﺳﻴﺴﺘﻢ ﻓﻮﻕ،
ﺍﻣﮑﺎﻥ Cacheingﺍﺳﺖ .ﺯﻣﺎﻧﻴﮑﻪ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺑﻪ ﻳﮏ ﺩﺭﺧﻮﺍﺳﺖ ﭘﺎﺳﺦ
ﻻﺯﻡ ﺭﺍ ﺩﺍﺩ ،ﺁﺩﺭﺱ IPﻣﺮﺑﻮﻃﻪ ﺍﻱ ﺭﺍ Cacheﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺯﻣﺎﻧﻴﮑﻪ ﺩﺭﺧﻮﺍﺳﺘﻲ
ﺑﺮﺍﻱ ﻳﮑﻲ ﺍﺯ ﺣﻮﺯﻩ ﻫﺎﻱ COMﻭﺍﺻﻞ ﮔﺮﺩﺩ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺍﺯ ﺁﺩﺭﺱ Cache
ﺷﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ DNSﺭﻭﺯﺍﻧﻪ ﺑﻪ ﻣﻴﻠﻴﺎﺭﺩﻫﺎ ﺩﺭﺧﻮﺍﺳﺖ ﭘﺎﺳﺦ ﻣﻲ ﺩﻫﻨﺪ .ﺳﻴﺴﺘﻢ ﻓﻮﻕ ﺍﺯ
ﻳﮏ ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﻲ ﺗﻮﺯﻳﻊ ﺷﺪﻩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﺑﻪ ﻣﺘﻘﺎﺿﻴﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ.
53
ﺩﻫﻨﺪﻩ ﺻﻔﺤﻪ ﺩﺭﺧﻮﺍﺳﺘﻲ ﺭﺍ ﭘﻴﺪﺍ ﻭ ﺁﻥ ﺭﺍ ﺑﺮﺍﻱ ﻣﺘﻘﺎﺿﻲ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ
ﮐﺎﺭﺑﺮﺍﻥ ﻭ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ﺍﺯ ﻳﮏ ﻣﺮﻭﺭﮔﺮ ﻭﺏ ﺑﺮﺍﻱ ﺍﻋﻼﻡ ﺩﺭﺧﻮﺍﺳﺖ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻭ
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻭﺏ ﻣﺴﺌﻮﻝ ﺩﺭﻳﺎﻓﺖ ﺩﺭﺧﻮﺍﺳﺖ ﻭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺮﺍﻱ
ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ﻣﻲ ﺑﺎﺷﻨﺪ.
ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺩﺍﺭﺍﻱ ﻳﮏ ﺁﺩﺭﺱ IPﺍﻳﺴﺘﺎ ) ﺛﺎﺑﺖ ( ﺑﻮﺩﻩ ﮐﻪ ﺗﻐﻴﻴﺮ ﻧﺨﻮﺍﻫﺪ ﮐﺮﺩ.
ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﮐﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻳﺪ ،ﺩﺍﺭﺍﻱ ﻳﮏ IPﻣﺘﻐﻴﺮ ﺑﻮﺩﻩ ﮐﻪ
ﺗﻮﺳﻂ ISPﻣﺮﺑﻮﻃﻪ ﺑﻪ ﺷﻤﺎ ﺍﺧﺘﺼﺎﺹ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺁﺩﺭﺱ IPﺗﺨﺼﻴﺺ ﻳﺎﻓﺘﻪ ﺩﺭ ﻃﻮﻝ
ﻣﺪﺕ ﺍﺗﺼﺎﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ) ﻳﮏ ﺟﻠﺴﻪ ﮐﺎﺭﻱ ( ﺛﺎﺑﺖ ﺑﻮﺩﻩ ﻭ ﺗﻐﻴﻴﺮ ﻧﺨﻮﺍﻫﺪ ﮐﺮﺩ .ﺁﺩﺭﺱ IP
ﻧﺴﺒﺖ ﺩﺍﺩﻩ ﺑﻪ ﺷﻤﺎ ﺩﺭ ﺁﻳﻨﺪﻩ ﻭ ﺗﻤﺎﺱ ﻣﺠﺪﺩ ﺑﺎ ISPﻣﻤﮑﻦ ﺍﺳﺖ ﺗﻐﻴﻴﺮ ﻧﻤﺎﻳﺪ .ﻣﺮﺍﮐﺰ ISP
ﺑﺮﺍﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎﻱ ﺧﻮﺩ ﻳﮏ IPﺍﻳﺴﺘﺎ ﺭﺍ ﻧﺴﺒﺖ ﻣﻲ ﺩﻫﻨﺪ .ﺑﺪﻳﻬﻲ ﺍﺳﺖ ﺩﺭ ﺁﻳﻨﺪﻩ
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﭘﻮﺭﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﮐﻪ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺷﻤﺎ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ ،ﻣﻤﮑﻦ ﺍﺳﺖ ﺁﺩﺭﺱ IP
ﻧﺴﺒﺖ ﺑﻪ ﻗﺒﻞ ﻣﺘﻔﺎﻭﺕ ﺑﺎﺷﺪ.
ﻫﺮ ﻳﮏ ﺍﺯ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ،ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﭘﻮﺭﺕ ﻫﺎﻱ ﻣﺸﺨﺼﻲ ﺍﻧﺠﺎﻡ
ﻣﻲ ﺩﻫﻨﺪ .ﻣﺜﻼ" ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﻣﺎﺷﻴﻦ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻭﺏ ﻭ FTPﻣﺴﺘﻘﺮ
ﺷﺪﻩ ﺑﺎﺷﻨﺪ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﻣﻌﻤﻮﻻ" ﺍﺯ ﭘﻮﺭﺕ ٨٠ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ FTPﺍﺯ ﭘﻮﺭﺕ
٢١ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ﺍﺯ ﺧﺪﻣﺎﺕ ﻳﮏ ﺳﺮﻭﻳﺲ
ﺧﺎﺹ ﮐﻪ ﺩﺍﺭﺍﻱ ﻳﮏ ﺁﺩﺭﺱ IPﻭ ﻳﮏ ﺷﻤﺎﺭﻩ ﭘﻮﺭﺕ ﻣﻨﺨﺼﺮ ﺑﻔﺮﺩ ﺍﺳﺖ ،ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ،ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﭘﻮﺭﺕ ﺧﺎﺹ ﺑﻪ ﻳﮏ ﺳﺮﻭﻳﺲ ﻣﺘﺼﻞ
ﻣﻲ ﮔﺮﺩﺩ ،ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺮﻭﻳﺲ ﻣﻮﺭﺩ ﻧﻈﺮ ،ﺍﺯ ﻳﮏ ﭘﺮﻭﺗﮑﻞ ﺧﺎﺹ ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﺪ
ﺷﺪ ..ﭘﺮﻭﺗﮑﻞ ﻫﺎ ﺍﻏﻠﺐ ﺑﺼﻮﺭﺕ ﻣﺘﻨﻲ ﺑﻮﺩﻩ ﻭ ﻧﺤﻮﻩ ﻣﮑﺎﻟﻤﻪ ﺑﻴﻦ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻭ ﺳﺮﻭﻳﺲ
ﺩﻫﻨﺪﻩ ﺭﺍ ﺗﺒﻴﻦ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻭﺏ ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﺍﺯ ﭘﺮﻭﺗﮑﻞ
(Hypertext Transfer Protocol(HTTPﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ ﻣﮑﺎﻟﻤﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻴﻦ
ﺧﻮﺩ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
54
ﺷﺒﮑﻪ ﻫﺎ ،ﺭﻭﺗﺮﻫﺎ ،ISPs ،NAPs ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ DNSﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ
ﻗﺪﺭﺗﻤﻨﺪ ،ﻫﻤﮕﻲ ﺳﻬﻤﻲ ﺩﺭ ﺷﮑﻞ ﮔﻴﺮﻱ ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻲ ﺑﺰﺭﮔﺘﺮﻳﻦ ﺷﺒﮑﻪ ﻣﻮﺟﻮﺩ ﺩﺭ ﺳﻄﺢ
ﺟﻬﺎﻥ ) ﺍﻳﻨﺘﺮﻧﺖ ( ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﻧﺪ .ﻋﻨﺎﺻﺮ ﻓﻮﻕ ﺩﺭ ﺯﻧﺪﮔﻲ ﻣﺪﺭﻥ ﺍﻣﺮﻭﺯﻱ ﺟﺎﻳﮕﺎﻫﻲ ﻭﻳﮋﻩ
ﺩﺍﺭﻧﺪ .ﺑﺪﻭﻥ ﻭﺟﻮﺩ ﺁﻧﻬﺎ ،ﺍﻳﻨﺘﺮﻧﺘﻲ ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ ﻭ ﺑﺪﻭﻥ ﻭﺟﻮﺩ ﺍﻳﻨﺘﺮﻧﺖ ،ﺯﻧﺪﮔﻲ
ﺍﻣﺮﻭﺯ ﺑﺸﺮﻳﺖ ﺭﺍ ﺗﻌﺮﻳﻔﻲ ﺩﻳﮕﺮ ﻻﺯﻡ ﺍﺳﺖ!
55
ISP
ISPﭼﻴﺴﺖ ؟
ﻳﮏ ISPﻭ ﻳﺎ ، Internet Service Providerﺷﺮﮐﺘﯽ ﺍﺳﺖ ﮐﻪ ﺍﻣﮑﺎﻥ ﺩﺳﺘﻴﺎﺑﯽ
ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﺳﺎﻳﺮ ﺳﺮﻭﻳﺲ ﻫﺎﯼ ﻭﺏ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﯽ ﻧﻤﺎﻳﺪ .ﻣﺮﺍﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ
ﺍﻳﻨﺘﺮﻧﺖ ﻋﻼﻭﻩ ﺑﺮ ﻧﮕﻬﺪﺍﺭﯼ ﻭ ﭘﺸﺘﻴﺒﺎﻧﯽ ﺍﺯ ﻳﮏ ﺧﻂ ﻣﺴﺘﻘﻴﻢ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ،ﻓﻌﺎﻟﻴﺖ ﻫﺎﯼ
ﻣﺘﻌﺪﺩ ﺩﻳﮕﺮﯼ ﻧﻈﻴﺮ ﻧﮕﻬﺪﺍﺭﯼ ﻭ ﭘﺸﺘﻴﺎﻧﯽ ﺍﺯ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻭﺏ ﺭﺍ ﻧﻴﺰ ﺍﻧﺠﺎﻡ ﻣﯽ ﺩﻫﻨﺪ.
ﻣﺮﺍﮐﺰ ﻓﻮﻕ ﺑﺎ ﺍﺭﺍﺋﻪ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﯼ ﻻﺯﻡ ) ﺩﺭ ﺻﻮﺭﺕ ﺿﺮﻭﺭﺕ ( ،ﻳﮏ ﺭﻣﺰ ﻋﺒﻮﺭ ﺣﻔﺎﻇﺖ
ﺷﺪﻩ ﻭ ﻳﮏ ﺷﻤﺎﺭﻩ ﺗﻠﻔﻦ ﺑﺮﺍﯼ ﺗﻤﺎﺱ ﺑﺎ ﺷﺒﮑﻪ ،ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﻣﺒﺎﺩﻟﻪ ﻧﺎﻣﻪ ﻫﺎﯼ
ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻣﺘﻘﺎﺿﻴﺎﻥ ﻗﺮﺍﺭ ﻣﯽ ﺩﻫﻨﺪ .ﺑﺮﺧﯽ ﺍﺯ ﻣﺮﺍﮐﺰ ISPﺧﺪﻣﺎﺕ ﺍﺿﺎﻓﻪ
ﺩﻳﮕﺮﯼ ﺭﺍ ﻧﻴﺰ ﺍﺭﺍﺋﻪ ﻣﯽ ﻧﻤﺎﻳﻨﺪ.
ﻣﺮﺍﮐﺰ ISPﺩﺍﺭﺍﯼ ﺍﺑﻌﺎﺩ ﻭ ﺍﻧﺪﺍﺯﻩ ﻫﺎﯼ ﻣﺘﻔﺎﻭﺗﯽ ﻣﯽ ﺑﺎﺷﻨﺪ .ﺑﺮﺧﯽ ﺍﺯ ﺁﻧﺎﻥ ﺗﻮﺳﻂ ﺍﻓﺮﺍﺩﯼ
ﺍﻧﺪﮎ ﺍﺩﺍﺭﻩ ﻣﯽ ﺷﻮﻧﺪ ﻭ ﺗﻌﺪﺍﺩﯼ ﺩﻳﮕﺮ ﺷﺮﮐﺖ ﻫﺎﺋﯽ ﺑﺰﺭﮒ ﻣﯽ ﺑﺎﺷﻨﺪ ﮐﻪ ﺧﺪﻣﺎﺕ ﻣﺘﻨﻮﻋﯽ
ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﮐﺎﺭﺑﺮﺍﻥ ﻗﺮﺍﺭ ﻣﯽ ﺩﻫﻨﺪ .ﻣﺮﺍﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺍﺭﺍﯼ ﺣﻮﺯﻩ ﻫﺎﯼ
ﻋﻤﻠﻴﺎﺗﯽ ﻣﺘﻔﺎﻭﺗﯽ ﻧﻴﺰ ﻣﯽ ﺑﺎﺷﻨﺪ .ﻣﺜﻼ" ﺑﺮﺧﯽ ﺍﺯ ﺁﻧﺎﻥ ﺧﺪﻣﺎﺕ ﺧﻮﺩ ﺭﺍ ﺻﺮﻓﺎ" ﺩﺭ ﺳﻄﺢ ﻳﮏ
ﺷﻬﺮﺳﺘﺎﻥ ﺍﺭﺍﺋﻪ ﺩﺍﺩﻩ ﻭ ﺑﺮﺧﯽ ﺩﻳﮕﺮ ﺩﺍﺭﺍﯼ ﻗﺎﺑﻠﻴﺖ ﻫﺎﯼ ﻣﻨﻄﻘﻪ ﺍﯼ ﻭ ﺣﺘﯽ ﺑﻴﻦ ﺍﻟﻤﻠﻠﯽ
ﻣﯽ ﺑﺎﺷﻨﺪ.
56
ﻣﺮﺍﮐﺰ ISPﭼﻪ ﺳﺮﻭﻳﺲ ﻫﺎﺋﯽ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﯽ ﺩﻫﻨﺪ ؟
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﺍﺷﺎﺭﻩ ﮔﺮﺩﻳﺪ ،ﺧﺪﻣﺎﺗﯽ ﮐﻪ ﺗﻮﺳﻂ ﻣﺮﺍﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺭﺍﺋﻪ
ﻣﻴﮕﺮﺩﺩ ﺑﺴﻴﺎﺭ ﻣﺘﻨﻮﻉ ﻭ ﺩﺭ ﻋﻴﻦ ﺣﺎﻝ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ:
ﺗﻘﺮﻳﺒﺎ" ﺗﻤﺎﻣﯽ ﻣﺮﺍﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺖ ،ﺳﺮﻭﻳﺲ ﻫﺎﺋﯽ ﻧﻈﻴﺮ ﭘﺴﺖ •
ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻣﺘﻘﺎﺿﻴﺎﻥ ﻗﺮﺍﺭ ﻣﯽ ﺩﻫﻨﺪ ، DSL ، Dial-up ) .ﻣﻮﺩﻡ ﻫﺎﯼ ﮐﺎﺑﻠﯽ( .ﺑﺮﺧﯽ
ﺍﺯ ﻣﺮﺍﮐﺰ ISPﺍﻣﮑﺎﻥ ﺩﺳﺘﻴﺎﺑﯽ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﺻﺮﻓﺎ" ﺍﺯ ﻃﺮﻳﻖ ﺧﻄﻮﻁ ﻣﻌﻤﻮﻟﯽ ﺗﻠﻔﻦ
ﻓﺮﺍﻫﻢ ﻣﯽ ﻧﻤﺎﻳﻨﺪ.
ﺍﮐﺜﺮ ﻣﺮﺍﮐﺰ ISPﻋﻤﻠﻴﺎﺕ ﻣﺘﻔﺎﻭﺗﯽ ﻧﻈﻴﺮ ﺗﻬﻴﻪ Backupﺍﺯ ﻧﺎﻣﻪ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻭ •
ﻓﺎﻳﻞ ﻫﺎﯼ ﻭﺏ ﺭﺍ ﻧﻴﺰ ﺍﻧﺠﺎﻡ ﻣﯽ ﺩﻫﻨﺪ .ﺩﺭ ﺻﻮﺭﺗﯽ ﮐﻪ ﺑﺎﺯﻳﺎﻓﺖ ﻧﺎﻣﻪ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ
ﻭ ﻓﺎﻳﻞ ﻫﺎﯼ ﻭﺏ ﺑﺮﺍﯼ ﺷﻤﺎ ﻣﻬﻢ ﺍﺳﺖ ) ﺩﺭ ﺻﻮﺭﺕ ﺑﺮﻭﺯ ﺍﺷﮑﺎﻝ ( ،ﻳﮏ ISPﺭﺍ
ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ ﮐﻪ Backupﮔﺮﻓﺘﻦ ﺍﺯ ﺩﺍﺩﻩ ﻫﺎ ﺭﺍ ﺩﺭ ﺩﺳﺘﻮﺭ ﮐﺎﺭ ﺧﻮﺩ ﻗﺮﺍﺭ ﺩﺍﺩﻩ
ﺍﺳﺖ.
57
ﭼﮕﻮﻧﻪ ﻳﮏ ISPﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﻢ؟
ﺑﺮﺍﯼ ﺍﻧﺘﺨﺎﺏ ﻳﮏ ISPﭘﺎﺭﺍﻣﺘﺮﻫﺎﯼ ﻣﺘﻌﺪﺩﯼ ﺑﺮﺭﺳﯽ ﻣﯽ ﮔﺮﺩﺩ:
ﺍﻣﻨﻴﺖ :ﺁﻳﺎ ISPﺍﻧﺘﺨﺎﺑﯽ ﺍﺯ ﺭﻭﻳﮑﺮﺩﻫﺎﯼ ﻣﻨﺎﺳﺐ ﺍﻣﻨﻴﺘﯽ ﺩﺭ ﺟﻬﺖ ﺣﻔﺎﻇﺖ •
ﺣﺮﻳﻢ ﺧﺼﻮﺻﯽ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺳﺖ ؟ ﺁﻳﺎ ﺧﻴﺎﻝ ﺷﻤﺎ ﺍﺯ ﺍﻳﻦ ﺑﺎﺑﺖ ﺭﺍﺣﺖ ﺍﺳﺖ ﮐﻪ ﭼﻪ
ﺍﻓﺮﺍﺩﯼ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﺷﻤﺎ ﺩﺳﺘﻴﺎﺑﯽ ﺩﺍﺭﻧﺪ؟ ﻧﺤﻮﻩ ﺑﺮﺧﻮﺭﺩ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺁﻧﺎﻥ ﺍﺯ ﺍﻃﻼﻋﺎﺕ
ﺑﻪ ﭼﻪ ﺻﻮﺭﺕ ﺍﺳﺖ؟
ﺳﺮﻭﻳﺲ ﻫﺎ :ﺁﻳﺎ ISPﺍﻧﺘﺨﺎﺑﯽ ﺳﺮﻭﻳﺲ ﻫﺎﯼ ﻣﻮﺭﺩ ﻧﻈﺮ ﺷﻤﺎ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﯽ ﻧﻤﺎﻳﺪ؟ ﺁﻳﺎ •
ﺳﺮﻭﻳﺲ ﻫﺎﯼ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺗﺎﻣﻴﻦ ﮐﻨﻨﺪﻩ ﻧﻴﺎﺯ ﺷﻤﺎ ﻣﯽ ﺑﺎﺷﻨﺪ؟ ﺁﻳﺎ ﭘﺸﺘﻴﺒﺎﻧﯽ ﻻﺯﻡ ﺑﻪ
ﻣﻨﻈﻮﺭ ﺍﺭﺍﺋﻪ ﺳﺮﻭﻳﺲ ﻫﺎ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺷﻤﺎ ﮔﺬﺍﺷﺘﻪ ﻣﯽ ﺷﻮﺩ؟
ﻗﻴﻤﺖ :ﺁﻳﺎ ﻗﻴﻤﺖ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﺗﻮﺳﻂ ISPﻗﺎﺑﻞ ﻗﺒﻮﻝ ﺍﺳﺖ؟ ﺁﻳﺎ ﻗﻴﻤﺖ ﺍﺭﺍﺋﻪ ﺷﺪﻩ •
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺗﻌﺪﺍﺩ ﻭ ﻧﻮﻉ ﺳﺮﻭﻳﺲ ﻫﺎﯼ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ،ﻣﻨﻄﻘﯽ ﺍﺳﺖ؟ ﺁﻳﺎ ﺑﻪ ﻣﻨﻈﻮﺭ
ﺩﺭﻳﺎﻓﺖ ﺧﺪﻣﺎﺕ ﺍﺭﺯﺍﻥ ﺗﺮ ،ﺍﺯ ﮐﻴﻔﻴﺖ ﻭ ﺍﻣﻨﻴﺖ ﭼﺸﻢ ﭘﻮﺷﯽ ﻣﯽ ﻧﻤﺎﺋﻴﺪ؟
ﺍﻋﻤﺘﺎﺩ ﭘﺬﻳﺮﯼ :ﺁﻳﺎ ﺑﻪ ﺳﺮﻭﻳﺲ ﻫﺎﯼ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺗﻮﺳﻂ ISPﺍﻧﺘﺨﺎﺑﯽ ﻣﯽ ﺗﻮﺍﻥ ﺍﻋﺘﻤﺎﺩ •
ﺩﺍﺷﺖ ﻭ ﻳﺎ ﺩﺭ ﺍﻏﻠﺐ ﻣﻮﺍﺭﺩ ﺳﺮﻭﻳﺲ ﻫﺎﯼ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﺩﻻﻳﻞ ﻣﺘﻔﺎﻭﺗﯽ ﻧﻈﻴﺮ
ﭘﺸﺘﻴﺒﺎﻧﯽ ﻭ ﻧﮕﻬﺪﺍﺭﯼ ،ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩ ﮐﺎﺭﺑﺮﺍﻥ ﻭ ،...ﻏﻴﺮ ﻓﻌﺎﻝ ﺑﻮﺩﻩ ﻭ ﻋﻤﻼ" ﺍﻣﮑﺎﻥ
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﺎﻥ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ .ﺩﺭ ﺻﻮﺭﺗﯽ ﮐﻪ ﺑﻪ ﺩﻻﻳﻞ ﻣﺘﻔﺎﻭﺗﯽ ﻻﺯﻡ ﺍﺳﺖ ﺑﺮﺧﯽ ﺍﺯ
ﺳﺮﻭﻳﺲ ﻫﺎﯼ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﻏﻴﺮ ﻓﻌﺎﻝ ﮔﺮﺩﻧﺪ ﺁﻳﺎ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﮑﺎﻧﻴﺰﻡ ﻫﺎﯼ
ﺧﺎﺻﯽ ﺑﻪ ﺷﻤﺎ ﺍﻃﻼﻉ ﺩﺍﺩﻩ ﻣﯽ ﺷﻮﺩ؟
ﭘﺸﺘﻴﺒﺎﻧﯽ ﮐﺎﺭﺑﺮﺍﻥ :ﺁﻳﺎ ISPﺍﻧﺘﺨﺎﺑﯽ ﺩﺍﺭﺍﯼ ﺑﺨﺶ ﭘﺸﺘﻴﺒﺎﻧﯽ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺳﺖ؟ ﻧﺤﻮﻩ •
ﺑﺮﺧﻮﺭﺩ ﭘﺮﺳﻨﻞ ﺑﺨﺶ ﭘﺸﺘﻴﺒﺎﻧﯽ ﺑﻪ ﭼﻪ ﺻﻮﺭﺕ ﺍﺳﺖ؟ ﺁﻳﺎ ﺁﻧﺎﻥ ﺩﺍﺭﺍﯼ ﺩﺍﻧﺶ ﻻﺯﻡ ﺑﻪ
ﻣﻨﻈﻮﺭ ﭘﺎﺳﺨﮕﻮﺋﯽ ﻣﻨﻄﻘﯽ ﺑﻪ ﺳﻮﺍﻻﺕ ﺷﻤﺎ ﻣﯽ ﺑﺎﺷﻨﺪ؟
58
ﺳﺮﻋﺖ :ﺳﺮﻋﺖ ﺍﺗﺼﺎﻝ ISPﺍﻧﺘﺨﺎﺑﯽ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﭼﮕﻮﻧﻪ ﺍﺳﺖ ؟ ﺁﻳﺎ ﺍﻳﻦ ﺳﺮﻋﺖ ﺑﻪ •
ﺧﻮﺩ ﺍﺳﺖ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻨﺪﮔﺎﻧﯽ ﮐﻪ ﻗﺒﻼ" ﺍﺯ ﺧﺪﻣﺎﺕ ﺁﻧﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩﻩ ﺍﻧﺪ ،ﺍﺯ
ﮐﻴﻔﻴﺖ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﺭﺍﺿﯽ ﻣﯽ ﺑﺎﺷﻨﺪ؟
59
DSL
ﺑﺮﺍﯼ ﺍﺗﺼﺎﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﺭﻭﺵ ﻫﺎﯼ ﻣﺘﻔﺎﻭﺗﯽ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻮﺩﻡ
ﻣﻌﻤﻮﻟﯽ ،ﻣﻮﺩﻡ ﮐﺎﺑﻠﯽ ،ﺷﺒﮑﻪ ﻣﺤﻠﯽ ﻭ ﻳﺎ ﺧﻄﻮﻁ ،(Digital Subscriber Line(DSL
ﻧﻤﻮﻧﻪ ﻫﺎﺋﯽ ﺍﺯ ﺭﻭﺵ ﻫﺎﯼ ﻣﻮﺟﻮﺩ ﺑﺮﺍﯼ ﺍﺗﺼﺎﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﯽ ﺑﺎﺷﻨﺪ ، DSL .ﻳﮏ ﺍﺗﺼﺎﻝ
ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﯼ ﻣﻌﻤﻮﻟﯽ ﺗﻠﻔﻦ ﺑﺮﺍﯼ ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﻓﺮﺍﻫﻢ
ﻣﯽ ﻧﻤﺎﻳﺪ.
ﻣﺰﺍﻳﺎﯼ DSL
ﺩﺭ ﺯﻣﺎﻥ ﺍﺗﺼﺎﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ،ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﻂ ﺗﻠﻔﻦ ﺑﺮﺍﯼ ﺗﻤﺎﺱ ﻫﺎﯼ ﻣﻮﺭﺩ ﻧﻈﺮ •
ﻧﻴﺎﺯ ﺑﻪ ﮐﺎﺑﻞ ﮐﺸﯽ ﺟﺪﻳﺪ ﻧﺒﻮﺩﻩ ﻭ ﻫﻤﭽﻨﺎﻥ ﻣﯽ ﺗﻮﺍﻥ ﺍﺯ ﺧﻄﻮﻁ ﺗﻠﻔﻦ ﻣﻮﺟﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ •
ﮐﺮﺩ.
ﺷﺮﮐﺖ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ، DSLﻣﻮﺩﻡ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺩﺭ ﺯﻣﺎﻥ ﻧﺼﺐ ﺧﻂ ﻓﻮﻕ ﺩﺭ ﺍﺧﺘﻴﺎﺭ •
ﺯﻥ ﻣﻨﻄﻘﯽ (
ﺳﺮﻭﻳﺲ ﻓﻮﻕ ﺩﺭ ﻫﺮ ﻣﺤﻞ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺱ ﻧﻤﯽ ﺑﺎﺷﺪ. •
60
ﻣﺒﺎﻧﯽ DSL
ﺩﺭ ﺯﻣﺎﻥ ﻧﺼﺐ ﻳﮏ ﺗﻠﻔﻦ ) ﺍﺳﺘﺎﻧﺪﺍﺭﺩ( ﺩﺭ ﺍﻏﻠﺐ ﮐﺸﻮﺭﻫﺎ ﺍﺯ ﻳﮏ ﺯﻭﺝ ﮐﺎﺑﻞ ﻣﺴﯽ
ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﺷﻮﺩ .ﮐﺎﺑﻞ ﻣﺴﯽ ﺩﺍﺭﺍﯼ ﭘﻬﻨﺎﯼ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮﯼ ﻧﺴﺒﺖ ﺑﻪ ﺁﻥ ﭼﻴﺰﯼ ﺍﺳﺖ ﮐﻪ
ﺩﺭ ﻣﮑﺎﻟﻤﺎﺕ ﺗﻠﻔﻨﯽ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ ) ﺑﺨﺶ ﻋﻤﺪﻩ ﺍﯼ ﺍﺯﻇﺮﻓﻴﺖ ﭘﻬﻨﺎﯼ ﺑﺎﻧﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﯽ
ﮔﺮﺩﺩ ( DSL .ﺍﺯ ﭘﻬﻨﺎﯼ ﺑﺎﻧﺪ ﺑﻼﺍﺳﺘﻔﺎﺩﻩ ﺑﺪﻭﻥ ﺗﺎﺛﻴﺮ ﮔﺬﺍﺭﯼ ﻣﻨﻔﯽ ﺑﺮ ﮐﻴﻔﻴﺖ ﻣﮑﺎﻟﻤﺎﺕ
ﺻﻮﺗﯽ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﺪ ) .ﺗﻄﺒﻴﻖ ﻓﺮﮐﺎﻧﺲ ﻫﺎﯼ ﺧﺎﺹ ﺑﻪ ﻣﻨﻈﻮﺭﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﺧﺎﺹ(.
ﺑﻪ ﻣﻨﻈﻮﺭ ﺷﻨﺎﺧﺖ ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ ، DSLﻻﺯﻡ ﺍﺳﺖ ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﺎ ﻳﮏ ﺧﻂ ﺗﻠﻔﻦ ﻣﻌﻤﻮﻟﯽ
ﺁﺷﻨﺎ ﺷﻮﻳﻢ .ﺍﮐﺜﺮ ﺧﻄﻮﻁ ﺗﻠﻔﻦ ﻭ ﺗﺠﻬﻴﺰﺍﺕ ﻣﺮﺑﻮﻃﻪ ﺩﺍﺭﺍﯼ ﻣﺤﺪﻭﺩﻳﺖ ﻓﺮﮐﺎﻧﺴﯽ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ
ﺳﻮﺋﻴﭻ ،ﺗﻠﻔﻦ ﻭ ﺳﺎﻳﺮ ﺗﺠﻬﻴﺰﺍﺗﯽ ﻣﯽ ﺑﺎﺷﻨﺪ ﮐﻪ ﺑﻨﻮﻋﯽ ﺩﺭ ﻓﺮﺁﻳﻨﺪ ﺍﻧﺘﻘﺎﻝ ﺳﻴﮕﻨﺎ ﻝ ﻫﺎ ﺩﺧﺎﻟﺖ
ﺩﺍﺭﻧﺪ .ﺻﺪﺍﯼ ﺍﻧﺴﺎﻥ ) ﺩﺭ ﻳﮏ ﻣﮑﺎﻟﻤﻪ ﺻﻮﺗﯽ ﻣﻌﻤﻮﻟﯽ ( ﺗﻮﺳﻂ ﺳﻴﮕﻨﺎﻝ ﻫﺎﺋﯽ ﺑﺎ ﻓﺮﮐﺎﻧﺲ
ﺑﻴﻦ ﺻﻔﺮ ﺗﺎ ٣٤٠٠ﻗﺎﺑﻞ ﺍﻧﺘﻘﺎﻝ ﺍﺳﺖ .ﻣﺤﺪﻭﺩﻩ ﻓﻮﻕ ﺑﺴﻴﺎﺭ ﻧﺎﭼﻴﺰ ﺍﺳﺖ )ﻣﺜﻼ" ﺍﻏﻠﺐ
ﺑﻠﻨﺪﮔﻮﻫﺎﯼ ﺍﺳﺘﺮﻳﻮ ﮐﻪ ﺩﺍﺭﺍﯼ ﻣﺤﺪﻭﺩﻩ ﺑﻴﻦ ٢٠ﺗﺎ ٢٠,٠٠٠ﻫﺮﺗﺰ ﻣﯽ ﺑﺎﺷﻨﺪ( .ﮐﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ
ﺷﺪﻩ ﺩﺭ ﺳﻴﺴﺘﻢ ﺗﻠﻔﻦ ﻗﺎﺩﺭ ﺑﻪ ﺍﻧﺘﻘﺎﻝ ﺳﻴﮕﻨﺎﻝ ﻫﺎﺋﯽ ﺑﺎ ﻇﺮﻓﻴﺖ ﭼﻨﺪﻳﻦ ﻣﻴﻠﻴﻮﻥ ﻫﺮﺗﺰ ﻣﯽ ﺑﺎﺷﺪ.
ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺩﺭ ﻣﮑﺎﻟﻤﺎﺕ ﺻﻮﺗﯽ ﺻﺮﻓﺎ" ﺍﺯ ﺑﺨﺶ ﺑﺴﻴﺎﺭ ﻣﺤﺪﻭﺩﯼ ﺍﺯ ﭘﻬﻨﺎﯼ ﺑﺎﻧﺪ ﻣﻮﺟﻮﺩ،
ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻬﻨﺎﯼ ﺑﺎﻧﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻧﺸﺪﻩ ﻣﯽ ﺗﻮﺍﻥ ﻋﻼﻭﻩ ﺑﺮ ﺑﻬﺮﻩ ﺑﺮﺩﺍﺭﯼ ﺍﺯ
ﭘﺘﺎﻧﺴﻴﻞ ﻫﺎﯼ ﻣﻮﺟﻮﺩ ،ﺑﮕﻮﻧﻪ ﺍﯼ ﻋﻤﻞ ﻧﻤﻮﺩ ﮐﻪ ﮐﻴﻔﻴﺖ ﻣﮑﺎﻟﻤﺎﺕ ﺻﻮﺗﯽ ﻧﻴﺰ ﺩﭼﺎﺭ ﺍﻓﺖ
ﻧﮕﺮﺩﻧﺪ .ﺗﺠﻬﻴﺰﺍﺕ ﭘﻴﺸﺮﻓﺘﻪ ﺍﯼ ﮐﻪ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﺼﻮﺭﺕ ﺩﻳﺠﻴﺘﺎﻝ ﺍﺭﺳﺎﻝ ﻣﯽ ﻧﻤﺎﻳﻨﺪ ،ﻗﺎﺩﺭ
ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻇﺮﻓﻴﺖ ﺧﻄﻮﻁ ﺗﻠﻔﻦ ﺑﺼﻮﺭﺕ ﮐﺎﻣﻞ ﻣﯽ ﺑﺎﺷﻨﺪ DSL .ﭼﻨﻴﻦ ﻫﺪﻓﯽ ﺭﺍ ﺩﻧﺒﺎﻝ
ﻣﯽ ﻧﻤﺎﻳﺪ.
ﺩﺭ ﺍﻏﻠﺐ ﻣﻨﺎﺯﻝ ﻭ ﺍﺩﺍﺭﺍﺕ ﺑﺮﺧﯽ ﺍﺯ ﮐﺸﻮﺭﻫﺎﯼ ﺩﻧﻴﺎ ،ﮐﺎﺭﺑﺮﺍﻥ ﺍﺯ ﻳﮏ DSLﻧﺎﻣﺘﻘﺎﺭﻥ
) (ADSLﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﻨﺪ ADSL .ﻓﺮﮐﺎﻧﺲ ﻫﺎﯼ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺱ ﺩﺭﻳﮏ ﺧﻂ ﺭﺍ ﺗﻘﺴﻴﻢ ﺗﺎ
ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﻗﺎﺩﺭ ﺑﻪ ﺩﺭﻳﺎﻓﺖ ﻭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺎﺷﻨﺪ .ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ،ﻓﺮﺽ ﺑﺮ ﺍﻳﻦ
61
ﮔﺬﺍﺷﺘﻪ ﺷﺪﻩ ﺍﺳﺖ ﮐﻪ ﺳﺮﻋﺖ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮ ﺍﺯ ﺳﺮﻋﺖ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ
ﺑﺎﺷﺪ.
ﺻﻮﺕ ﻭ ﺩﺍﺩﻩ
ﮐﻴﻔﻴﺖ ﺩﺭﻳﺎﻓﺖ ﻭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﻃﺮﻳﻖ ، DSLﺑﻪ ﻣﺴﺎﻓﺖ ﻣﻮﺟﻮﺩ ﺑﻴﻦ ﺍﺳﺘﻔﺎﺩﻩ
ﮐﻨﻨﺪﻩ ﻭ ﺷﺮﮐﺖ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ ﻓﻮﻕ ﺑﺴﺘﮕﯽ ﺩﺍﺭﺩ ADSL .ﺍﺯ ﻳﮏ ﺗﮑﻨﻮﻟﻮﮊﯼ ﺑﺎ ﻧﺎﻡ "
ﺗﮑﻨﻮﻟﻮﮊﯼ ﺣﺴﺎﺱ ﺑﻪ ﻣﺴﺎﻓﺖ " ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﺪ .ﺑﻤﻮﺍﺯﺍﺕ ﺍﻓﺰﺍﻳﺶ ﻃﻮﻝ ﺧﻂ ﺍﺭﺗﺒﺎﻃﯽ،
ﮐﻴﻔﻴﺖ ﺳﻴﮕﻨﺎﻝ ﺍﻓﺖ ﻭ ﺳﺮﻋﺖ ﺧﻂ ﺍﺭﺗﺒﺎﻃﯽ ﮐﺎﻫﺶ ﭘﻴﺪﺍ ﻣﯽ ﻧﻤﺎﻳﺪ ADSL .ﺩﺍﺭﺍﯼ
ﻣﺤﺪﻭﺩﻳﺖ ١٨,٠٠٠ﻓﻮﺕ ) ٥,٤٦٠ﻣﺘﺮ ( ﺍﺳﺖ .ﮐﺎﺭﺑﺮﺍﻧﯽ ﮐﻪ ﺩﺭ ﻣﺠﺎﻭﺭﺕ ﻭ ﻧﺰﺩﻳﮑﯽ
ﺷﺮﮐﺖ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ DSLﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ ،ﺩﺍﺭﺍﯼ ﮐﻴﻔﻴﺖ ﻭ ﺳﺮﻋﺖ ﻣﻨﺎﺳﺒﯽ ﺑﻮﺩﻩ ﻭ
ﺑﻤﻮﺍﺯﺍﺕ ﺍﻓﺰﺍﻳﺶ ﻣﺴﺎﻓﺖ ،ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﻧﻈﺮ ﮐﻴﻔﻴﺖ ﻭ ﺳﺮﻋﺖ ﺩﭼﺎﺭ ﺍﻓﺖ ﺧﻮﺍﻫﻨﺪ
ﺷﺪ .ﺗﮑﻨﻮﻟﻮﮊﯼ ADSLﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺍﺋﻪ ﺑﺎﻻﺗﺮﻳﻦ ﺳﺮﻋﺖ ﺩﺭ ﺣﺎﻟﺖ " ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﮐﺎﺭﺑﺮ "
) (Downstreamﺗﺎ ٨ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺍﺳﺖ ) .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﯽ ﺣﺪﺍﮐﺜﺮ ﻣﺴﺎﻓﺖ
٦,٠٠٠ﻓﻮﺕ ﻭ ﻳﺎ ١,٨٢٠ﻣﺘﺮ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ( .ﺳﺮﻋﺖ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ " ﺍﺯ ﮐﺎﺭﺑﺮ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ"
) (Upstreamﺩﺍﺭﺍﯼ ﻣﺤﺪﻭﺩﻩ ٦٤٠ﮐﻴﻠﻮﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺩﺭ ﻋﻤﻞ ،ﺑﻬﺘﺮﻳﻦ
ﺳﺮﻋﺖ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﮐﺎﺭﺑﺮ ١,٥ ،ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﻭ
ﺳﺮﻋﺖ ﺍﺭﺳﺎﻝ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺗﻮﺳﻂ ﮐﺎﺭﺑﺮ ﺑﺮ ﺭﻭﯼ ﺍﻳﻨﺘﺮﻧﺖ ٦٤٠ ،ﮐﻴﻠﻮﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ
ﺍﺳﺖ.
ﻣﻤﮑﻦ ﺍﺳﺖ ﺍﻳﻦ ﺳﻮﺍﻝ ﺩﺭ ﺫﻫﻦ ﺧﻮﺍﻧﻨﺪﮔﺎﻥ ﻣﻄﺮﺡ ﮔﺮﺩﺩ ﮐﻪ ﺍﮔﺮ ﺗﮑﻨﻮﻟﻮﮊﯼ DSLﺩﺍﺭﺍﯼ
ﻣﺤﺪﻭﺩﻳﺖ ﻓﺎﺻﻠﻪ ﺍﺳﺖ ،ﭼﺮﺍ ﻣﺤﺪﻭﺩﻳﺖ ﻓﻮﻕ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻣﮑﺎﻟﻤﺎﺕ ﺻﻮﺗﯽ ﺻﺪﻕ
ﻧﻤﯽ ﮐﻨﺪ؟ ﺩﺭ ﭘﺎﺳﺦ ﺑﺎﻳﺪ ﺑﻪ ﻭﺟﻮﺩ ﻳﮏ ﺗﻔﻮﻳﺖ ﮐﻨﻨﺪﻩ ﮐﻮﭼﮏ ﮐﻪ Loading coilsﻧﺎﻣﻴﺪﻩ
ﻣﯽ ﺷﻮﺩ ،ﺍﺷﺎﺭﻩ ﮐﺮﺩ .ﺷﺮﮐﺖ ﻫﺎﯼ ﺗﻠﻔﻦ ﺍﺯ ﺗﻔﻮﻳﺖ ﮐﻨﻨﺪﻩ ﻓﻮﻕ ،ﺑﻪ ﻣﻨﻈﻮﺭ ﺗﻘﻮﻳﺖ ﺳﻴﮕﻨﺎﻝ
ﺻﻮﺗﯽ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﻣﺘﺎﺳﻔﺎﻧﻪ ﺗﻘﻮﻳﺖ ﮐﻨﻨﺪﻩ ﻓﻮﻕ ﺑﺎ ﺳﻴﮕﻨﺎﻝ ﻫﺎﯼ ADSLﺳﺎﺯﮔﺎﺭ
62
ﻧﻴﺴﺖ .ﻻﺯﻡ ﺑﻪ ﺫﮐﺮ ﺍﺳﺖ ﮐﻪ ﺳﻴﮕﻨﺎﻝ ﻫﺎﯼ ، ADSLﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺑﺨﺸﯽ ﺍﺯ ﺧﻂ ﺍﺭﺗﺒﺎﻃﯽ
ﺍﺯ ﻧﻮﻉ ﻓﻴﺒﺮ ﻧﻮﺭﯼ ﺑﺎﺷﺪ ،ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﻧﺨﻮﺍﻫﻨﺪ ﺑﻮﺩ.
ﺗﻘﺴﻴﻢ ﺳﻴﮕﻨﺎﻝ
ﺍﺯ ﺩﻭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻣﺘﻔﺎﻭﺕ ﺑﺮﺍﯼ ﺗﻘﺴﻴﻢ ﺳﻴﮕﻨﺎﻟﻬﺎ ) ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺳﺎﺯﮔﺎﺭ ﻧﻤﯽ ﺑﺎﺷﻨﺪ(،
ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ .ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ،ANSIﺑﺮﺍﯼ ADSLﺳﻴﺴﺘﻤﯽ ﺑﺎ ﻧﺎﻡ Discrete
Multitoneﺍﺳﺖ .(DMT) .ﺍﮐﺜﺮ ﺗﻮﻟﻴﺪﮐﻨﻨﺪﮔﺎﻥ ﺗﺠﻬﻴﺰﺍﺕ DSLﺍﺯ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻓﻮﻕ
ﺗﺒﻌﻴﺖ ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺩﻳﮕﺮﯼ ﮐﻪ ﻧﺴﺒﺖ ﺑﻪ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ DMTﻗﺪﻳﻤﯽ ﺗﺮ ﻭ ﺑﺴﺎﺩﮔﯽ
ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﻣﯽ ﮔﺮﺩﺩ ،ﺍﺳﺘﺎﻧﺪﺍﺭﺩ Carrierless Amplitude phase/ﺍﺳﺖ).(CAP
ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ، CAPﺳﻴﮕﻨﺎﻝ ﻫﺎ ﺭﺍ ﺑﻪ ﺳﻪ ﺑﺎﻧﺪ ﻣﺠﺰﺍ ﺗﻘﺴﻴﻢ ﻣﯽ ﻧﻤﺎﻳﺪ :ﻣﮑﺎﻟﻤﺎﺕ ﺗﻠﻔﻦ ﺩﺍﺭﺍﯼ
ﺑﺎﻧﺪ ﺻﻔﺮ ﺗﺎ ٤ﮐﻴﻠﻮ ﻫﺮﺗﺰ ،ﮐﺎﻧﺎﻝ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﮐﺎﺭﺑﺮ ﺑﺮﺍﯼ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺩﺍﺭﺍﯼ
ﺑﺎﻧﺪﯼ ﺑﻴﻦ ٢٥ﺗﺎ ١٦٠ﮐﻴﻠﻮ ﻫﺮﺗﺰ ) (Upstreamﻭ ﮐﺎﻧﺎﻝ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﺳﺮﻭﻳﺲ
ﺩﻫﻨﺪﻩ ﺑﺮﺍﯼ ﮐﺎﺭﺑﺮ ،ﺩﺍﺭﺍﯼ ﻣﺤﺪﻭﺩﻩ ﺍﯼ ﮐﻪ ﺍﺯ ٢٤٠ﮐﻴﻠﻮ ﻫﺮﺗﺰ ﺷﺮﻭﻉ ﻣﯽ ﮔﺮﺩﺩ .ﺣﺪﺍﮐﺜﺮ
ﺑﺎﻧﺪ ﻓﻮﻕ ﺑﻪ ﻋﻮﺍﻣﻞ ﺗﻔﺎﻭﺗﯽ ﻧﻈﻴﺮ :ﻃﻮﻝ ﺧﻂ ،ﺗﻌﺪﺍﺩ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﺮﮐﺖ ﺗﻠﻔﻨﯽ
ﺧﺎﺹ ﻭ ...ﺑﺴﺘﮕﯽ ﺩﺍﺭﺩ ،ﺑﻬﺮﺣﺎﻝ ﺣﺪﺍﮐﺜﺮ ﻣﺤﺪﻭﺩﻩ ﺑﺎﻧﺪ ﻓﻮﻕ ﺍﺯ ١,٥ﻣﮕﺎﻫﺮﺗﺰ ﺗﺠﺎﻭﺯ
ﻧﺨﻮﺍﻫﺪ ﮐﺮﺩ .ﺳﻴﺴﺘﻢ CAPﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻪ ﮐﺎﻧﺎﻝ ﻓﻮﻕ ،ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﺳﻴﮕﻨﺎﻝ ﻫﺎﯼ
ﻣﺮﺑﻮﻃﻪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ، DMTﻧﻴﺰ ﺳﻴﮕﻨﺎﻝ ﻫﺎﯼ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﺑﻪ ﮐﺎﻧﺎﻝ ﻫﺎﯼ ﻣﺠﺰﺍ ﺗﻘﺴﻴﻢ ﻣﯽ ﻧﻤﺎﻳﺪ.ﺩﺭ
ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻓﻮﻕ ﺍﺯ ﺩﻭ ﮐﺎﻧﺎﻝ ﻣﺠﺰﺍ ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺩﺍﺩﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﯽ ﮔﺮﺩﺩ،DMT .
ﺩﺍﺩﻩ ﺭﺍ ﺑﻪ ٢٤٧ﮐﺎﻧﺎﻝ ﻣﺠﺰﺍ ﺗﻘﺴﻴﻢ ﻣﯽ ﻧﻤﺎﻳﺪ.ﻫﺮ ﮐﺎﻧﺎﻝ ﺩﺍﺭﺍﯼ ﺑﺎﻧﺪ ٤ﮐﻴﻠﻮ ﻫﺮﺗﺰ ﻣﯽ ﺑﺎﺷﻨﺪ.
) ﻭﺿﻌﻴﺖ ﻓﻮﻕ ﻣﺸﺎﺑﻪ ﺁﻥ ﺍﺳﺖ ﮐﻪ ﺷﺮﮐﺖ ﺗﻠﻔﻦ ﻣﺮﺑﻮﻃﻪ ،ﺧﻂ ﻣﺴﯽ ﻣﻮﺟﻮﺩ ﺭﺍ ﺑﻪ ٢٤٧
63
ﺧﻂ ٤ﮐﻴﻠﻮ ﻫﺮﺗﺰﯼ ﻣﺠﺰﺍ ﺗﻘﺴﻴﻢ ﻭ ﻫﺮ ﻳﮏ ﺍﺯ ﺧﻄﻮﻁ ﻓﻮﻕ ﺭﺍ ﺑﻪ ﻳﮏ ﻣﻮﺩﻡ ﻣﺘﺼﻞ ﻧﻤﻮﺩﻩ
ﺍﺳﺖ .ﺍﺳﺘﻔﺎﺩﻩ ﻫﻤﺰﻣﺎﻥ ﺍﺯ ٢٤٧ﻣﻮﺩﻡ ﮐﻪ ﻫﺮ ﻳﮏ ﺩﺍﺭﺍﯼ ﺑﺎﻧﺪ ٤ﮐﻴﻠﻮﻫﺮﺗﺰ ﻣﯽ ﺑﺎﺷﻨﺪ( .ﻫﺮ
ﻳﮏ ﺍﺯ ﮐﺎﻧﺎﻝ ﻫﺎ ،ﮐﻨﺘﺮﻝ ﻭ ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﮐﻴﻔﻴﺖ ﻳﮏ ﮐﺎﻧﺎﻝ ﺍﻓﺖ ﻧﻤﺎﻳﺪ ،ﺳﻴﮕﻨﺎﻝ ﺑﺮ ﺭﻭﯼ
ﮐﺎﻧﺎﻝ ﺩﻳﮕﺮ ﺷﻴﻔﺖ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﻓﺮﺁﻳﻨﺪ ﺷﻴﻔﺖ ﺩﺍﺩﻥ ﺳﻴﮕﻨﺎ ﻝ ﻫﺎ ﺑﻴﻦ ﮐﺎﻧﺎﻝ ﻫﺎﯼ
ﻣﺘﻔﺎﻭﺕ ﻭ ﺟﺴﺘﺠﻮ ﺑﺮﺍﯼ ﻳﺎﻓﺘﻦ ﺑﻬﺘﺮﻳﻦ ﮐﺎﻧﺎﻝ ،ﺑﺼﻮﺭﺕ ﭘﻴﻮﺳﺘﻪ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺑﺮﺧﯽ ﺍﺯ
ﮐﺎﻧﺎﻝ ﻫﺎ ﺑﺼﻮﺭﺕ ﺩﻭ ﻃﺮﻓﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﺷﻮﻧﺪ )ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ( ﮐﻨﺘﺮﻝ ﻭ ﻣﺮﺗﺐ
ﺳﺎﺯﯼ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﮐﺎﻧﺎﻝ ﻫﺎﯼ ﺩﻭ ﻃﺮﻓﻪ ﻭ ﻧﮕﻬﺪﺍﺭﯼ ﮐﻴﻔﻴﺖ ﻫﺮ ﻳﮏ ﺍﺯ ٢٤٧ﮐﺎﻧﺎﻝ ﻣﻮﺟﻮﺩ،
ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ DMTﺭﺍ ﻧﺴﺒﺖ ﺑﻪ CAPﺑﻤﺮﺍﺗﺐ ﭘﻴﭽﻴﺪﻩ ﺗﺮ ﻧﻤﻮﺩﻩ ﺍﺳﺖ .ﺍﺳﺘﺎﻧﺪﺍﺭﺩ
DMTﺩﺍﺭﺍﯼ ﺍﻧﻌﻄﺎﻑ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮﯼ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﮐﻴﻔﻴﺖ ﺧﻄﻮﻁ ﻭ ﮐﺎﻧﺎﻝ ﻫﺎ ﯼ ﻣﺮﺑﻮﻃﻪ
ﺍﺳﺖ .
ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﯼ CAPﻭ DMTﺍﺯ ﺩﻳﺪ ﮐﺎﺭﺑﺮ ﺩﺍﺭﺍﯼ ﻳﮏ ﺷﺒﺎﻫﺖ ﻣﯽ ﺑﺎﺷﻨﺪ .ﺩﺭ ﻫﺮ ﺩﻭ ﺣﺎﻟﺖ
ﺍﺯ ﻳﮏ ﻓﻴﻠﺘﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﻓﻴﻠﺘﺮ ﻧﻤﻮﺩﻥ ﺳﻴﮕﻨﺎﻝ ﻫﺎﯼ ﻣﺮﺑﻮﻃﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ .ﻓﻴﻠﺘﺮﻫﺎﯼ ﻓﻮﻕ
ﺍﺯ ﻧﻮﻉ Low-Passﻣﯽ ﺑﺎﺷﻨﺪ .ﻓﻴﻠﺘﺮﻫﺎﯼ ﻓﻮﻕ ﺩﺍﺭﺍﯼ ﺳﺎﺧﺘﺎﺭﯼ ﺳﺎﺩﻩ ﺑﻮﺩﻩ ﻭ ﺗﻤﺎﻡ
ﺳﻴﮕﻨﺎﻝ ﻫﺎﯼ ﺑﺎﻻﺗﺮ ﺍﺯ ﻳﮏ ﻣﺤﺪﻭﺩﻩ ﺭﺍ ﺑﻼﮎ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ .ﻣﮑﺎﻟﻤﺎﺕ ﺻﻮﺗﯽ ﺩﺭ ﻣﺤﺪﻭﺩﻩ
ﭘﺎﻳﻴﻦ ﺗﺮ ﺍﺯ ٤ﮐﻴﻠﻮ ﻫﺮﺗﺰ ﺍﻧﺠﺎﻡ ﻣﯽ ﮔﻴﺮﻧﺪ ،ﺑﻨﺎﺑﺮﺍﻳﻦ ﻓﻴﻠﺘﺮﻫﺎﯼ ﻓﻮﻕ ﺗﻤﺎﻡ ﺳﻴﮕﻨﺎ ﻝ ﻫﺎﯼ ﺑﺎﻻﺗﺮ
ﺍﺯ ﻣﺤﺪﻭﺩﻩ ﻓﻮﻕ ﺭﺍ ﺑﻼﮎ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺍﺯ ﺗﺪﺍﺧﻞ ﺳﻴﮕﻨﺎﻝ ﻫﺎﯼ ﺩﺍﺩﻩ ﺑﺎ
ﻣﮑﺎﻟﻤﺎﺕ ﺗﻠﻔﻨﯽ ﺟﻠﻮﮔﻴﺮﯼ ﺑﻌﻤﻞ ﻣﯽ ﺁﻳﺪ.
ﺗﺠﻬﻴﺰﺍﺕ DSL
ADSLﺍﺯ ﺩﻭ ﺩﺳﺘﮕﺎﻩ ﺧﺎﺹ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﺪ .ﻳﮑﯽ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎ ﺩﺭ ﻣﺤﻞ ﻣﺸﺘﺮﮐﻴﻦ ﻭ
ﺩﺳﺘﮕﺎﻩ ﺩﻳﮕﺮ ﺑﺮﺍﯼ ، ISPﺷﺮﮐﺖ ﺗﻠﻔﻦ ﻭ ﻳﺎ ﺳﺎﺯﻣﺎﻧﻬﺎﯼ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ ، DSL
ﻧﺼﺐ ﻣﯽ ﮔﺮﺩﺩ .ﺩﺭ ﻣﺤﻞ ﻣﺸﺘﺮﮐﻴﻦ ﺍﺯ ﻳﮏ ﺗﺮﺍﻧﺴﻴﻮﺭ DSLﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ .ﺷﺮﮐﺖ ﺍﺭﺍﺋﻪ
ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ DSLﺍﺯ ﻳﮏ DSL Access Multiplexerﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﺪ
64
) .(DSLAMﺍﺯ ﺩﺳﺘﮕﺎﻩ ﻓﻮﻕ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺭﻳﺎﻓﺖ ﺍﺗﺼﺎﻻﺕ ﻣﺸﺘﺮﮐﻴﻦ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ .ﺩﺭ
ﺍﺩﺍﻣﻪ ﺑﻪ ﺗﺸﺮﻳﺢ ﻫﺮ ﻳﮏ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎﯼ ﻓﻮﻕ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ.
ﺗﺮﺍﻧﺴﻴﻮﺭ DSL
ﺍﮐﺜﺮ ﻣﺸﺘﺮﮐﻴﻦ ، DSLﺗﺮﺍﻧﺴﻴﻮﺭ DSLﺭﺍ ﻣﻮﺩﻡ DSLﻣﯽ ﻧﺎﻣﻨﺪ .ﻣﻬﻨﺪﺳﻴﻦ ﻭ ﮐﺎﺭﺷﻨﺎﺳﺎﻥ
ﺷﺮﮐﺖ ﻫﺎﯼ ﺗﻠﻔﻦ ﺑﻪ ﺩﺳﺘـﮕﺎﻩ ﻓﻮﻕ ATU-Rﻣﯽ ﮔﻮﻳﻨﺪ .ﺻﺮﻓـﻨﻈﺮ ﺍﺯ ﻫﺮ ﻧﺎﻣﯽ ﮐﻪ ﺑﺮﺍﯼ ﺁﻥ
ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﺷﻮﺩ ،ﺩﺳﺘﮕﺎﻩ ﻓﻮﻕ ﻧﻘﻄﻪ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﮐﺎﻣﭙﻴﻮﺗﺮ ﮐﺎﺭﺑﺮ ﻭ ﻳﺎ ﺷﺒﮑﻪ ﺑﻪ ﺧﻂ
DSLﺍﺳﺖ .ﺗﺮﺍﻧﺴﻴﻮﺭ ﺑﺎ ﺍﺳﺘــﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ ﻫـﺎﯼ ﻣــﺘﻔﺎﻭﺕ ﺑﻪ ﺩﺳـﺘﮕﺎﻩ ﻣﺸﺘﺮﮐﻴﻦ ﻣﺘﺼﻞ
ﻣﯽ ﮔﺮﺩﺩ .ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﺭﻭﺵ ،ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺗﺼﺎﻻﺕ USBﻭ ﻳﺎ ﺍﺗﺮﻧﺖ ﺍﺳﺖ.
DSLAM
ﺩﺳﺘﮕﺎﻩ ﻓﻮﻕ ﺩﺭ ﻣﺮﺍﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ DSLﻧﺼﺐ ﻭ ﺍﻣﮑﺎﻥ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ
ﻣﺒﺘﻨﯽ ﺑﺮ DSLﺭﺍ ﻓﺮﺍﻫﻢ ﻣﯽ ﻧﻤﺎﻳﺪ DSLAM .ﺍﺗﺼﺎﻻﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺗﻌﺪﺍﺩﯼ ﺍﺯ ﻣﺸﺘﺮﮐﻴﻦ
ﺭﺍ ﮔﺮﻓﺘﻪ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺑﻪ ﻳﮏ ﺍﺗﺼﺎﻝ ﺑﺎ ﻇﺮﻓﻴﺖ ﺑﺎﻻ ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﺑﺮ ﺭﻭﯼ ﺍﻳﻨﺘﺮﻧﺖ ﺗﺒﺪﻳﻞ
ﻣﯽ ﻧﻤﺎﻳﺪ .ﺩﺳﺘﮕﺎﻫﻬﺎﯼ DSLAMﺩﺍﺭﺍﯼ ﺍﻧﻌﻄﺎﻑ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﻄﻮﻁ
DSLﻣﺘﻔﺎﻭﺕ ،ﭘﺮﻭﺗﮑﻞ ﻫﺎﯼ ﻣﺘﻔﺎﻭﺕ ﻭ ﻣﺪﻭﻻﺳﻴﻮﻥ ﻣﺘﻔﺎﻭﺕ ) (Cap,DMTﻣﯽ ﺑﺎﺷﻨﺪ.
ﺩﺭ ﺑﺮﺧﯽ ﺍﺯ ﻣﺪﻝ ﻫﺎﯼ ﻓﻮﻕ ﺍﻣﮑﺎﻥ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﺧﺎﺻﯽ ﻧﻈﻴﺮ ﺍﺧﺘﺼﺎﺹ ﭘﻮﻳﺎﯼ ﺁﺩﺭﺱ
ﻫﺎﯼ IPﺑﻪ ﻣﺸﺘﺮﮐﻴﻦ ،ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺭﺩ.
ﻳﮑﯽ ﺍﺯ ﺗﻔﺎﻭﺕ ﻫﺎﯼ ﻣﻬﻢ ﺑﻴﻦ ADSLﻭ ﻣﻮﺩﻡ ﻫﺎﯼ ﮐﺎﺑﻠﯽ ،ﻧﺤﻮﻩ ﺑﺮﺧﻮﺭﺩ ﻭ ﺭﻓﺘﺎﺭ
DSLAMﺍﺳﺖ .ﮐﺎﺭﺑﺮﺍﻥ ﻣﻮﺩﻡ ﻫﺎﯼ ﮐﺎﺑﻠﯽ ﺍﺯ ﻳﮏ ﺷﺒﮑﻪ ﺑﺴﺘﻪ ﺑﺼﻮﺭﺕ ﺍﺷﺘﺮﺍﮐﯽ ﺍﺳﺘﻔﺎﺩﻩ
65
ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻳﮑﻪ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺍﻓﺰﺍﻳﺶ ﺗﻌﺪﺍﺩ ﮐﺎﺭﺑﺮﺍﻥ ،ﮐﺎﺭﺁﺋﯽ ﺁﻧﻬﺎ ﺗﻨﺰﻝ ﭘﻴﺪﺍ
ﺧﻮﺍﻫﺪ ﮐﺮﺩ ADSL .ﺑﺮﺍﯼ ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﺭﺑﺮﺍﻥ ﻳﮏ ﺍﺭﺗﺒﺎﻁ ﺍﺧﺘﺼﺎﺻﯽ ﺍﻳﺠﺎﺩ ﻭ ﺁﻥ ﺭﺍ ﺑﻪ
DSLAMﻣﺘﺼﻞ ﻣﯽ ﻧﻤﺎﻳﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺍﻓﺰﺍﻳﺶ ﮐﺎﺭﺑﺮﺍﻥ ،ﮐﺎﺭﺁﺋﯽ ﻣﺮﺑﻮﻃﻪ ﺗﻨﺰﻝ
ﭘﻴﺪﺍ ﻧﺨﻮﺍﻫﺪ ﮐﺮﺩ .ﻭﺿﻌﻴﺖ ﻓﻮﻕ ﺗﺎ ﺯﻣﺎﻧﻴﮑﻪ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺯ ﺗﻤﺎﻡ ﻇﺮﻓﻴﺖ ﻣﻮﺟﻮﺩ ﺧﻂ ﺍﺭﺗﺒﺎﻃﯽ ﺑﺎ
ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻧﮑﺮﺩﻩ ﺑﺎﺷﻨﺪ ،ﺍﺩﺍﻣﻪ ﺧﻮﺍﻫﺪ ﻳﺎﻓﺖ .ﺩﺭ ﺻﻮﺭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻤﺎﻡ ﻇﺮﻓـﻴﺖ
ﺧﻂ ﺍﺭﺗﺒﺎﻃﯽ ﺍﻳﻨﺘﺮﻧﺖ ،ﻣﺮﺍﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ DSLﻣﯽ ﺗﻮﺍﻧﻨﺪ ﻧﺴﺒﺖ ﺑﻪ ﺍﺭﺗﻘﺎﺀ ﺧﻂ
ﺍﺭﺗﺒﺎﻃﯽ ﺍﻳﻨﺘﺮﻧﺖ ﺍﻗﺪﺍﻡ ﺗﺎ ﺗﻤﺎﻡ ﻣﺸﺘﺮﮐﻴﻦ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ DSLAMﺩﺍﺭﺍﯼ ﮐﺎﺭﺁﺋﯽ ﻣﻄﻠﻮﺏ
ﺩﺭ ﺯﻣﻴﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﮔﺮﺩﻧﺪ.
ﺁﻳﻨﺪﻩ DSL
ADSLﺑﺎ ﺳﺎﻳﺮ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﯼ ﻣﺮﺑﻮﻁ ﺑﻪ ﺩﺳﺘﻴﺎﺑﯽ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻧﻈﻴﺮ ﻣﻮﺩﻡ ﻫﺎﯼ
ﮐﺎﺑﻠﯽ ﻭ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺎﻫﻮﺍﺭﻩ ﺍﯼ ﺭﻗﺎﺑﺖ ﻣﯽ ﻧﻤﺎﻳﺪ .ﺑﺮ ﻃﺒﻖ ﺁﻣﺎﺭ ﺍﺧﺬ ﺷﺪﻩ ﺩﺭ ﺳﺎﻝ ،١٩٩٩
ﺑﻴﺶ ﺍﺯ ٣٣٠,٠٠٠ﻣﻨﺰﻝ ﺩﺭ ﺍﻣﺮﻳﮑﺎ ﺍﺯ DSLﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩﻩ ﺍﻧﺪ .ﺗﻌﺪﺍﺩ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
ﻣﻮﺩﻡ ﻫـﺎﯼ ﮐﺎﺑﻠﯽ ﺗﺎ ﺳﺎﻝ ١٩٩٩ﺑﻪ ﻣﺮﺯ ١,٣٥٠,٠٠٠ﮐﺎﺭﺑﺮ ﺭﺳﻴﺪﻩ ﺍﺳﺖ .ﺑﺮ ﺍﺳﺎﺱ ﭘﻴﺶ
ﺑﻴﻨﯽ ﺑﻌﻤﻞ ﺁﻣﺪﻩ ﺗﺎ ﺍﻭﺍﺧﺮ ﺳﺎﻝ ،٢٠٠٣ﺗــﻌﺪﺍﺩ ﻣـــﺸﺘﺮﮐﻴﻦ ﻣﻮﺩﻡ ﻫﺎﯼ ﮐﺎﺑــﻠﯽ ﺑﻪ ﻣﺮﺯ
٨,٩٨٠,٠٠٠ﻭ ﻣﺸﺘﺮﮐﻴﻦ DSLﺑﻪ ٩,٣٠٠,٠٠٠ﺧﻮﺍﻫﺪ ﺭﺳﻴﺪ.
ﺳﺮﻋﺖ ADSLﺩﺭ ﺣﺎﻝ ﺣﺎﺿﺮ ﺣﺪﺍﮐﺜﺮ ١,٥ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺍﺳﺖ .ﺍﺯ ﻟﺤﺎﻅ ﺗﺌﻮﺭﯼ
ﺭﺳﻴﺪﻥ ﺑﻪ ﻣﺮﺯ ٧ﻣﮕﺎﺑﺎﻳﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺩﻭﺭ ﺍﺯ ﺩﺳﺘﺮﺱ ﻧﻤﯽ ﺑﺎﺷﺪ .ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺗﺤﻘﻴﻘﺎﺕ
ﻋﻤﺪﻩ ﺍﯼ ﺻﻮﺭﺕ ﮔﺮﻓﺘﻪ ﻭ ﺗﮑﻨﻮﻟﻮﮊﯼ VDSLﻣﻄﺮﺡ ﺷﺪﻩ ﺍﺳﺖ.
66
VDSL
67
ﺍﮐﺜﺮ ﻣﺸﺘﺮﮐﻴﻦ ،DSLﺗﺮﺍﻧﺴﻴﻮﺭ DSLﺭﺍ ﻣﻮﺩﻡ DSLﻣﯽ ﻧﺎﻣﻨﺪ .ﻣﻬﻨﺪﺳﻴﻦ ﻭ ﮐﺎﺭﺷﻨﺎﺳﺎﻥ
ﺷﺮﮐﺖ ﻫﺎﯼ ﺗﻠﻔﻦ ﺑﻪ ﺩﺳﺘﮕﺎﻩ ﻓﻮﻕ ATU-Rﻣﯽ ﮔﻮﻳﻨﺪ .ﺻﺮﻓﻨﻈﺮ ﺍﺯ ﻫﺮ ﻧﺎﻣﯽ ﮐﻪ ﺑﺮﺍﯼ ﺁﻥ
ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﺷﻮﺩ ،ﺩﺳﺘﮕﺎﻩ ﻓﻮﻕ ﻧﻘﻄﻪ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﮐﺎﻣﭙﻴﻮﺗﺮ ﮐﺎﺭﺑﺮ ﻭ ﻳﺎ ﺷﺒﮑﻪ ﺑﻪ ﺧﻂ
DSLﺍﺳﺖ .ﺗﺮﺍﻧﺴﻴﻮﺭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ ﻫﺎﯼ ﻣﺘﻔﺎﻭﺕ ﺑﻪ ﺩﺳﺘﮕﺎﻩ ﻣﺸﺘﺮﮐﻴﻦ ﻣﺘﺼﻞ
ﻣﯽ ﮔﺮﺩﺩ .ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﺭﻭﺵ ،ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺗﺼﺎﻻﺕ USBﻭ ﻳﺎ ﺍﺗﺮﻧﺖ ﺍﺳﺖ.
ﺩﺳﺘﮕﺎﻩ ﻓﻮﻕ ﺩﺭ ﻣﺮﺍﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ DSLﻧﺼﺐ ﻭ ﺍﻣﮑﺎﻥ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﻣﺒﺘﻨﯽ ﺑﺮ
DSLﺭﺍ ﻓﺮﺍﻫﻢ ﻣﯽ ﻧﻤﺎﻳﺪ DSLAM .ﺍﺗﺼﺎﻻﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺗﻌﺪﺍﺩﯼ ﺍﺯ ﻣﺸﺘﺮﮐﻴﻦ ﺭﺍ ﮔﺮﻓﺘﻪ
ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺑﻪ ﻳﮏ ﺍﺗﺼﺎﻝ ﺑﺎ ﻇﺮﻓﻴﺖ ﺑﺎﻻ ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﺑﺮ ﺭﻭﯼ ﺍﻳﻨﺘﺮﻧﺖ ﺗﺒﺪﻳﻞ ﻣﯽ ﻧﻤﺎﻳﺪ.
ﺩﺳﺘﮕﺎﻫﻬﺎﯼ DSLAMﺩﺍﺭﺍﯼ ﺍﻧﻌﻄﺎﻑ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﻄﻮﻁ DSL
ﻣﺘﻔﺎﻭﺕ ،ﭘﺮﻭﺗﮑﻞ ﻫﺎﯼ ﻣﺘﻔﺎﻭﺕ ﻭ ﻣﺪﻭﻻﺳﻴﻮﻥ ﻣﺘﻔﺎﻭﺕ ) (Cap,DMTﻣﯽ ﺑﺎﺷﻨﺪ .ﺩﺭ
ﺑﺮﺧﯽ ﺍﺯ ﻣﺪﻝ ﻫﺎﯼ ﻓﻮﻕ ﺍﻣﮑﺎﻥ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﺧﺎﺻﯽ ﻧﻈﻴﺮ ﺍﺧﺘﺼﺎﺹ ﭘﻮﻳﺎﯼ ﺁﺩﺭﺱ ﻫﺎﯼ
IPﺑﻪ ﻣﺸﺘﺮﮐﻴﻦ ،ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺭﺩ.
ﻳﮑﯽ ﺍﺯ ﺗﻔﺎﻭﺕ ﻫﺎﯼ ﻣﻬﻢ ﺑﻴﻦ ADSLﻭ ﻣﻮﺩﻡ ﻫﺎﯼ ﮐﺎﺑﻠﯽ ،ﻧﺤﻮﻩ ﺑﺮﺧﻮﺭﺩ ﻭ ﺭﻓﺘﺎﺭ
DSLAMﺍﺳﺖ .ﮐﺎﺭﺑﺮﺍﻥ ﻣﻮﺩﻡ ﻫﺎﯼ ﮐﺎﺑﻠﯽ ﺍﺯ ﻳﮏ ﺷﺒﮑﻪ ﺑﺴﺘﻪ ﺑﺼﻮﺭﺕ ﺍﺷﺘﺮﺍﮐﯽ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻳﮑﻪ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺍﻓﺰﺍﻳﺶ ﺗﻌﺪﺍﺩ ﮐﺎﺭﺑﺮﺍﻥ ،ﮐﺎﺭﺁﺋﯽ ﺁﻧﻬﺎ ﺗﻨﺰﻝ ﭘﻴﺪﺍ
ﺧﻮﺍﻫﺪ ﮐﺮﺩ ADSL .ﺑﺮﺍﯼ ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﺭﺑﺮﺍﻥ ﻳﮏ ﺍﺭﺗﺒﺎﻁ ﺍﺧﺘﺼﺎﺻﯽ ﺍﻳﺠﺎﺩ ﻭ ﺁﻥ ﺭﺍ ﺑﻪ
DSLAMﻣﺘﺼﻞ ﻣﯽ ﻧﻤﺎﻳﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺍﻓﺰﺍﻳﺶ ﮐﺎﺭﺑﺮﺍﻥ ،ﮐﺎﺭﺁﺋﯽ ﻣﺮﺑﻮﻃﻪ ﺗﻨﺰﻝ
ﭘﻴﺪﺍ ﻧﺨﻮﺍﻫﺪ ﮐﺮﺩ .ﻭﺿﻌﻴﺖ ﻓﻮﻕ ﺗﺎ ﺯﻣﺎﻧﻴﮑﻪ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺯ ﺗﻤﺎﻡ ﻇﺮﻓﻴﺖ ﻣﻮﺟﻮﺩ ﺧﻂ ﺍﺭﺗﺒﺎﻃﯽ ﺑﺎ
ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻧﮑﺮﺩﻩ ﺑﺎﺷﻨﺪ ،ﺍﺩﺍﻣﻪ ﺧﻮﺍﻫﺪ ﻳﺎﻓﺖ .ﺩﺭ ﺻﻮﺭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻤﺎﻡ ﻇﺮﻓﻴﺖ ﺧﻂ
ﺍﺭﺗﺒﺎﻃﯽ ﺍﻳﻨﺘﺮﻧﺖ ،ﻣﺮﺍﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ DSLﻣﯽ ﺗﻮﺍﻧﻨﺪ ﻧﺴﺒﺖ ﺑﻪ ﺍﺭﺗﻘﺎﺀ ﺧﻂ
ﺍﺭﺗﺒﺎﻃﯽ ﺍﻳﻨﺘﺮﻧﺖ ﺍﻗﺪﺍﻡ ﺗﺎ ﺗﻤﺎﻡ ﻣﺸﺘﺮﮐﻴﻦ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ DSLAMﺩﺍﺭﺍﯼ ﮐﺎﺭﺁﺋﯽ ﻣﻄﻠﻮﺏ
ﺩﺭ ﺯﻣﻴﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﮔﺮﺩﻧﺪ.
68
ﺳﺮﻋﺖ VDSL
ﻋﻤﻠﮑﺮﺩ ، VDSLﺩﺭ ﺍﻏﻠﺐ ﻣﻮﺍﺭﺩ ﻣﺸﺎﺑﻪ ADSLﺍﺳﺖ .ﻋﻠﻴﺮﻏﻢ ﺷﺒﺎﻫﺖ ﻫﺎﯼ ﻣﻮﺟﻮﺩ ﺩﺭ
ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺍﺧﺘﻼﻓﺎﺕ ﻣﺘﻌﺪﺩﯼ ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺭﺩ VDSL .ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺍﺋﻪ ﺳﺮﻋﺖ ٥٢ﻣﮕﺎﺑﻴﺖ ﺩﺭ
ﺛﺎﻧﻴﻪ ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﮐﺎﺭﺑﺮ ) (Downstreamﻭ ١٦ﻣﮕﺎﺑﻴﺖ ﺩﺭ
ﺛﺎﻧﻴﻪ ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﮐﺎﺭﺑﺮ ﺑﺮ ﺭﻭﯼ ﺍﻳﻨﺘﺮﻧﺖ ) (Upstreamﺍﺳﺖ.
ﺳﺮﻋﺖ ﻫﺎﯼ ﻓﻮﻕ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮ ﺍﺯ ADSLﺍﺳﺖ .ﺩﺭ ADSLﺣﺪﺍﮐﺜﺮ ﺳﺮﻋﺖ ﺍﺭﺳﺎﻝ
ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﮐﺎﺭﺑﺮ ٨ ،ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﻭ ﺳﺮﻋﺖ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﮐﺎﺭﺑﺮ ﺑﻪ
ﺍﻳﻨﺘﺮﻧﺖ ٨٠٠ﮐﻴﻠﻮﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺍﺳﺖ VDSL .ﺳﺮﻋﺖ ﺑﺎﻻﯼ ﺧﻮﺩ ﺭﺍ ﻣﺪﻳﻮﻥ ﻣﺤﺪﻭﺩﺗﺮ
ﺷﺪﻥ ﻓﺎﺻﻠﻪ ﺑﻴﻦ ﻣﺸﺘﺮﮐﻴﻦ ﻭ ﻣﺮﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ ﻓﻮﻕ ﺍﺳﺖ .ﺣﺪﺍﮐﺜﺮ ﻣﺴﺎﻓﺖ
ﻣﻮﺟﻮﺩ ٤,٠٠٠ﻓﻮﺕ ) ١,٢٠٠ﻣﺘﺮ ( ﺍﺳﺖ.
ﺷﺮﮐﺖ ﻫﺎﯼ ﺗﻠﻔﻦ ﺩﺭ ﺣﺎﻝ ﺟﺎﻳﮕﺰﻳﻦ ﻧﻤﻮﺩﻥ ﺍﻏﻠﺐ ﺗﺠﻬﻴﺰﺍﺕ )ﻣﺮﺑﻮﻁ ﺑﻪ ﺗﻐﺬﻳﻪ ﺍﻃﻼﻋﺎﺕ(
ﺑﻪ ﻓﻴﺒﺮ ﻧﻮﺭﯼ ﻣﯽ ﺑﺎﺷﻨﺪ .ﺍﮐﺜﺮ ﺷﺮﮐﺖ ﻫﺎﯼ ﺗﻠﻔﻦ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﯼ Fiber to the (FTTC
(curbﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﺷﺮﮐﺖ ﻫﺎﯼ ﻓﻮﻕ ﻗﺼﺪ ﺩﺍﺭﻧﺪ ﮐﻪ ﺗﻤﺎﻡ ﺧﻄﻮﻁ ﻣﺴﯽ ﻣﻮﺟﻮﺩ ﺭﺍ
ﺗﺎ ﻣﺤﻠﯽ ﮐﻪ ﺍﺯ ﺁﻧﻬﺎ ﺍﻧﺸﻌﺎﺏ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﻭ ﺑﻪ ﻣﻨﺎﺯﻝ ﻣﺸﺘﺮﮐﻴﻦ ﺗﻮﺯﻳﻊ ﻣﯽ ﮔﺮﺩﺩ ،ﺗﻌﻮﻳﺾ
ﻧﻤﺎﻳﻨﺪ .ﺷﺮﮐﺖ ﻫﺎﯼ ﺗﻠﻔﻦ ﺩﺭ ﺗﻼﺵ ﺑﺮﺍﯼ ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﺳﻴﺴﺘﻢ Fiber To the
(FFTN(Neighborhoodﻣﯽ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺭﻭﺵ ﻓﻮﻕ ﺩﺭ ﻋﻮﺽ ﻧﺼﺐ ﮐﺎﺑﻞ ﻓﻴﺒﺮ
ﻧﻮﺭﯼ ﺩﺭ ﻫﺮﺧﻴﺎﺑﺎﻥ FFTN ،ﺩﺍﺭﺍﯼ ﻓﻴﺒﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﺗﺎ ﺟﻌﺒﻪ ﺍﺗﺼﺎﻻﺕ ) ﺍﻧﺸﻌﺎﺑﺎﺕ ( ﺑﺮﺍﯼ
ﻳﮏ ﻫﻤﺴﺎﻳﻪ ) ﻣﺸﺘﺮﮎ ( ﺧﺎﺹ ﺍﺳﺖ.
ﺑﺎ ﺍﺍﺳﺘﻘﺮﺍﺭ ﻳﮏ ﺗﺮﺍﻧﺴﻴﻮﺭ VDSLﺩﺭ ﻣﻨﺰﻝ ﻭ ﻳﮏ VDSL gatewayﺩﺭ ﺟﻌﺒﻪ ﺗﻘﺴﻴﻢ
ﺍﺗﺼﺎﻻﺕ ،ﻣﺤﺪﻭﺩﻳﺖ ﻓﺎﺻﻠﻪ ﮐﻢ ﺭﻧﮓ ﺧﻮﺍﻫﺪ ﺷﺪ gateway .ﺑﺎﻋﺚ ﻣﺮﺍﻗﺒﺖ ﺍﺯ ﺗﺒﺪﻳﻼﺕ
ﺁﻧﺎﻟﻮﮒ ﺑﻪ ﺩﻳﺠﻴﺘﺎﻝ ﻭ ﺩﻳﺠﻴﺘﺎﻝ ﺑﻪ ﺁﻧﺎﻟﻮﮒ ﮐﻪ ﺑﺎﻋﺚ ﻏﻴﺮﻓﻌﺎﻝ ﺷﺪﻥ ADSLﺑﺮ ﺭﻭﯼ ﺧﻄﻮﻁ
ﻓﻴﺒﺮ ﻧﻮﺭﯼ ﻣﯽ ﮔﺮﺩﺩ Gateway .ﺩﺍﺩﻩ ﻫﺎﯼ ﻭﺭﻭﺩﯼ ﻭ ﺩﺭﻳﺎﻓﺖ ﺷﺪﻩ ﺍﺯ ﺗﺮﺍﻧﺴﻴﻮﺭ ﺭﺍ ﺑﻪ
ﭘﺎﻟﺲ ﻫﺎﯼ ﻧﻮﺭ ﺗﺒﺪﻳﻞ ﺗﺎ ﺯﻣﻴﻨﻪ ﺍﺭﺳﺎﻝ ﺁﻧﻬﺎ ﺍﺯ ﻃﺮﻳﻖ ﻓﻴﺒﺮ ﻧﻮﺭﯼ ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ .ﺯﻣﺎﻧﻴﮑﻪ ﺩﺍﺩﻩ ﻫﺎ
ﺑﺮﺍﯼ ﮐﺎﻣﭙﻴﻮﺗﺮ ﮐﺎﺭﺑﺮ ﺍﺭﺳﺎﻝ ﻣﯽ ﮔﺮﺩﻧﺪ) ﺑﺮﮔﺸﺖ ﺩﺍﺩﻩ ( Gateway ،ﻣﻮﺟﻮﺩ ﺳﻴﮕﻨﺎﻝ ﻫﺎﯼ
69
ﻭﺭﻭﺩﯼ ﺍﺯ ﻓﻴﺒﺮ ﻧﻮﺭﯼ ﺭﺍ ﺗﺒﺪﻳﻞ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺑﺮﺍﯼ ﺗﺮﺍﻧﺴﻴﻮﺭ ﮐﺎﺭﺑﺮ ﺍﺭﺳﺎﻝ ﻣﯽ ﻧﻤﺎﻳﺪ .ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ
ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ ﻣﻴﻠﻴﻮﻥ ﻫﺎ ﻣﺮﺗﺒﻪ ﺗﮑﺮﺍﺭ ﺧﻮﺍﻫﺪ ﮔﺮﺩﻳﺪ.
ADSLﻭ VDSLﺻﺮﻓﺎ" ﺩﻭ ﻧﻤﻮﻧﻪ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻁ ﻫﺎﯼ ﻣﺮﺑﻮﻁ ﺑﻪ DSL spectrum
ﻣﯽ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺑﺮﺭﺳﯽ ﺳﺎﻳﺮ ﻣﺪﻝ ﻫﺎﯼ ﻣﺮﺑﻮﻁ ﺑﻪ ﺗﮑﻨﻮﻟﻮﮊﯼ ﻓﻮﻕ ﺍﺷﺎﺭﻩ ﺧﻮﺍﻫﺪ
ﺷﺪ.
ﻣﻘﺎﻳﺴﻪ ﺍﻧﻮﺍﻉ DSL
ﻧﻤﻮﻧﻪ ﻫﺎﯼ ﻣﺘﻔﺎﻭﺗﯽ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﯼ DSLﺗﺎﮐﻨﻮﻥ ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﺷﺪﻩ ﺍﺳﺖ:
.(ADSL(Asymmetric DSLﺩﺭﻣﺪﻝ ﻓﻮﻕ ﺑﺪﻟﻴﻞ ﺗﻔﺎﻭﺕ ﺳﺮﻋﺖ ﺩﺭﻳﺎﻓﺖ ﻭ •
ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﻭﺍﮊﻩ " ﻧﺎﻣﺘﻘﺎﺭﻥ " ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺍﺳﺖ .ﻣﺎﻫﻴﺖ ﻋﻤﻠﻴﺎﺕ ﺍﻧﺠﺎﻡ
ﺷﺪﻩ ﺗﻮﺳﻂ ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﺑﮕﻮﻧﻪ ﺍﯼ ﺍﺳﺖ ﮐﻪ ﻫﻤﻮﺍﺭﻩ ﺣﺠﻢ ﺍﻃﻼﻋﺎﺕ ﺩﺭﻳﺎﻓﺘﯽ
ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻟﯽ ﺍﺳﺖ.
. (HDSL(High bit-rate DSLﺳﺮﻋﺖ ﻣﺪﻝ ﻓﻮﻕ ﺩﺭ ﺣﺪ ﺧﻄﻮﻁ T1ﺍﺳﺖ •
ISDNﻗﺮﺍﺭ ﮔﺮﻓﺖ ISDL .ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ﺳﺎﻳﺮ ﻣﺪﻝ ﻫﺎﯼ DSLﺩﺍﺭﺍﯼ ﭘﺎﻳﻴﻦ
ﺗﺮﻳﻦ ﺳﺮﻋﺖ ﺍﺳﺖ .ﺳﺮﻋﺖ ﺍﻳﻦ ﺧﻄﻮﻁ ١٤٤ﮐﻴﻠﻮﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺍﺳﺖ )ﺩﻭ ﺟﻬﺖ(.
. ( MSDSL(Multirate Symmetric DSLﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ﺳﺮﻋﺖ ﺍﺭﺳﺎﻝ •
ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﻳﮑﺴﺎﻥ ﺍﺳﺖ .ﻧﺮﺥ ﺳﺮﻋﺖ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺗﻮﺳﻂ ﻣﺮﮐﺰ ﺍﺭﺍﺋﻪ
ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ ، DSLﺗﻨﻈﻴﻢ ﻣﯽ ﮔﺮﺩﺩ.
. (RADSL(Rate Adaptiveﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﻣﺪﻝ ADSLﺑﻮﺩﻩ ﻭ ﺍﻳﻦ ﺍﻣﮑﺎﻥ ﺭﺍ •
ﺑﻪ ﻣﻮﺩﻡ ﺧﻮﺍﻫﺪ ﺩﺍﺩ ﮐﻪ ﺳﺮﻋﺖ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﺭﺍ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻋﻮﺍﻣﻠﯽ ﻧﻈﻴﺮ ﻣﺴﺎﻓﺖ
ﻭ ﮐﻴﻔﻴﺖ ﺧﻂ ﺗﻌﻴﻴﻦ ﻧﻤﺎﻳﺪ.
70
. ( SDLS(Symmetric DSLﺳﺮﻋﺖ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﻳﮑﺴﺎﻥ •
71
ﺍﻳﻨﺘﺮﻧﺖ ﻣﺎﻫﻮﺍﺭﻩ ﺍﯼ
72
ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺎﻫﻮﺍﺭﻩ ﺍﯼ ﺩﻭ ﻃﺮﻓﻪ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﯼ IP multicastingﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﺷﻮﺩ .ﺩﺭ
ﺍﻳﻦ ﺣﺎﻟﺖ ﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ٥,٠٠٠ﮐﺎﻧﺎﻝ ﺑﺼﻮﺭﺕ ﻫﻤﺰﻣﺎﻥ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﺻﺮﻓﺎ" ﻳﮏ ﻣﺎﻫﻮﺍﺭﻩ
ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﺷﺪ ، IP multicasting .ﺩﺍﺩﻩ ﻫﺎﯼ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺍﺯ ﻳﮏ ﻧﻘﻄﻪ ﺑﻪ ﭼﻨﺪﻳﻦ
ﻧﻘﻄﻪ ﻭ ﺑﺼﻮﺭﺕ ﻓﺸﺮﺩﻩ ،ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ) ﺩﺭ ﻳﮏ ﺯﻣﺎﻥ ( .ﺑﺎ ﻓﺸﺮﺩﻩ ﺳﺎﺯﯼ ﺍﻃﻼﻋﺎﺕ،
ﺣﺠﻢ ﺩﺍﺩﻩ ﻫﺎ ﮐﺎﻫﺶ ﻭ ﺍﺯ ﭘﻬﻨﺎﯼ ﺑﺎﻧﺪ ﻣﻮﺟﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺑﻬﻴﻨﻪ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺩﺭ ﺳﻴﺴﺘﻢ ) DirectPCﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺗﻮﺳﻂ ، (DirectTVﮐﺎﺭﺑﺮﺍﻥ ﻫﻤﭽﻨﺎﻥ ﻣﯽ ﺑﺎﻳﺴﺖ ﺍﺯ
ﻳﮏ ISPﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ﮐﺎﺭﺑﺮﺍﻥ ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺍﺑﺘﺪﺍ ﻣﯽ ﺑﺎﻳﺴﺖ
ﺑﺎ ISPﺗﻤﺎﺱ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﻭ ﻳﺎ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﻧﻤﺎﻳﻨﺪ.
73
VOIP
IPﺗﻠﻔﻨﯽ ،ﺍﺭﺳﺎﻝ ﻣﮑﺎﻟﻤﺎﺕ ﺗﻠﻔــﻨﯽ ﺑﺮ ﺭﻭﯼ ﻳﮏ ﺷﺒـﮑﻪ ﻣﺒﺘﻨﯽ ﺑﺮ ﺩﺍﺩﻩ ﺍﺳﺖ .ﺑﻪ
ﻧﮑﻨﻮﻟﻮﮊﯼ ﻓﻮﻕ (Voice-over IP(VoIPﻧﻴﺰ ﮔﻔﺘﻪ ﻣﯽ ﺷﻮﺩ .ﺍﻣﺮﻭﺯﻩ ﻣﮑﺎﻟﻤﺎﺕ ﮔﺴﺘﺮﺩﻩ
ﺍﯼ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﮑﻪ ﻫﺎﯼ ﻣﺒﺘﻨﯽ ﺑﺮ ﺩﺍﺩﻩ ) ﻧﻈﻴﺮ ﺍﻳﻨﺘﺮﻧﺖ ( ﺍﻧﺠﺎﻡ ﻣﯽ ﺷﻮﺩ.
Circuit Switching
Circuit ﺷﺮﮐﺖ ﻫﺎﯼ ﺗﻠﻔﻦ ﺑﻴﺶ ﺍﺯ ﻳﮑﺼﺪ ﺳﺎﻝ ﺍﺳﺖ ﮐﻪ ﺍﺯ ﺗﮑــﻨﻮﻟﻮﮊﯼ
Switchingﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺭﻭﺵ ﻓﻮﻕ ﺑﻤﺤﺾ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒـــﺎﻁ ﺑﻴﻦ ﺩﻭ ﻧﻔﺮ،
ﺩﺭ ﺗﻤﺎﻡ ﻣﺪﺕ ﺯﻣﺎﻥ ﻣﮑﺎﻟﻤﻪ ﻳﮏ ﻣﺪﺍﺭ ﺍﺧﺘﺼﺎﺻﯽ ﺑﺮﺍﯼ ﺁﻧﻬﺎ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺑﺪﻳﻦ
ﺗﺮﺗﻴﺐ ﺑﺮﺍﯼ ﺩﻭ ﻧﻘﻄﻪ ﻣﺮﺑﻮﻃﻪ ﻳﮏ ﺍﺭﺗﺒﺎﻁ ﺩﻭ ﺳﻮﻳﻪ ﺍﻳﺠﺎﺩ ﻣﯽ ﮔﺮﺩﺩ .ﻧﺤﻮﻩ ﺍﻧﺠﺎﻡ ﻳﮏ
ﻣﮑﺎﻟﻤﻪ ﺻﻮﺗﯽ ﺑﻪ ﺻﻮﺭﺕ ﺯﻳﺮ ﺍﺳﺖ:
ﭘﺲ ﺍﺯ ﺑﺮﺩﺍﺷﺘﻦ ﮔﻮﺷﯽ ﺗﻠﻔﻦ ﻳﮏ ﺑﻮﻕ ﺷﻨﻴﺪﻩ ﻣﯽ ﮔﺮﺩﺩ .ﺑﻮﻕ ﻓﻮﻕ ﺑﻤﻨﺰﻟﻪ ﺑﺮﻗﺮﺍﺭﯼ •
ﺍﺭﺗﺒﺎﻁ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺯ ﻃﺮﻳﻖ ﻣﺠﻤﻮﻋﻪ ﺍﯼ ﺍﺯ ﺳﻮﺋﻴﺞ ﻫﺎ ﻋﺒﻮﺭ ﺩﺍﺩﻩ ﺷﺪﻩ ﺗﺎ ﺑﻪ ﻣﺨﺎﻃﺐ •
ﻣﮑﺎﻟﻤﻪ ﺑﺎ ﻣﺨﺎﻃﺐ ﻣﻮﺭﺩ ﻧﻈﺮ ﺩﺭ ﻣﺪﺕ ﺯﻣﺎﻥ ﺩﻟﺨﻮﺍﻩ ﺍﻧﺠﺎﻡ ﻣﯽ ﮔﻴﺮﺩ. •
ﭘﺲ ﺍﺯ ﻗﻄﻊ ﻣﮑﺎﻟﻤﻪ ،ﻣﺪﺍﺭ ﻓﻌﺎﻝ ﺷﺪﻩ ﺑﻴﻦ ﺷﻤﺎ ﻭ ﻣﺨﺎﻃﺐ ﻏﻴﺮ ﻓﻌﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ. •
74
ﻓﺮﺽ ﮐﻨﻴﺪ ﻣﺪﺕ ﺯﻣﺎﻥ ﻣﮑﺎﻟﻤﻪ ﺷﻤﺎ ﺩﻩ ﺩﻗﻴﻘﻪ ﺑﺎﺷﺪ ،ﺩﺭ ﻃﻮﻝ ﻣﺪﺕ ﺯﻣﺎﻥ ﻓﻮﻕ ﻣﺪﺍﺭ ﺍﻳﺠﺎﺩ
ﺷﺪﻩ ﺑﻴﻦ ﺩﻭ ﺗﻠﻔﻦ ﺑﺼﻮﺭﺕ ﭘﻴﻮﺳﺘﻪ ﻓﻌﺎﻝ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺩﺭ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﻗﺪﻳﻤﯽ ﻣﺨﺎﺑﺮﺍﺗﯽ،
ﻣﮑﺎﻟﻤﻪ ﺗﻠﻔﻨﯽ ﺑﺎ ﻧﺮﺥ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺛﺎﺑﺖ ٦٤ﮐﻴﻠﻮ ﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﻭ ﻳﺎ ١٠٢٤ﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ
ﺩﺭ ﻫﺮ ﺟﻬﺖ ﺍﻧﺠﺎﻡ ﻣﯽ ﮔﺮﻓﺖ ) ﻣﺠﻤﻮﻉ ﻧﺮﺥ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ١٢٨ﮐﻴﻠﻮﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ( .ﺑﺎ
ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﺩﺭ ﻫﺮ ﮐﻴﻠﻮﺑﺎﻳﺖ ،ﻫﺸﺖ ﮐﻴﻠﻮﺑﻴﺖ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ،ﺑﻨﺎﺑﺮﺍﻳﻦ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ ١٦ﮐﻴﻠﻮ
ﺑﺎﻳﺖ ﻭ ﻳﺎ ﺩﺭ ﻫﺮ ﺩﻗﻴﻘﻪ ٩٦٠ﮐﻴﻠﻮﺑﺎﻳﺖ ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻝ ﻣﯽ ﮔﺮﺩﺩ) ﺯﻣﺎﻧﯽ ﮐﻪ ﻣﺪﺍﺭ ﻓﻌﺎﻝ
ﺍﺳﺖ ( .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺩﺭ ﻣﺪﺕ ﺯﻣﺎﻥ ﺩﻩ ﺩﻗﻴﻘﻪ ﺍﺭﺗﺒﺎﻁ ﺗﻠﻔﻨﯽ ،ﻣﺠﻤﻮﻉ ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻝ ﺷﺪﻩ
٩٦٠٠ﮐﻴﻠﻮ ﺑﺎﻳﺖ ) ٩/٤ﻣﮕﺎﺑﺎﻳﺖ ( ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
ﺩﺭ ﻳﮏ ﻣﮑﺎﻟﻤﻪ ﺗﻠﻔﻨﯽ ﺍﮐﺜﺮ ﺩﺍﺩﻩ ﻫﺎﯼ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺑﻴﻬﻮﺩﻩ ﻣﯽ ﺑﺎﺷﻨﺪ .ﺯﻣﺎﻧﯽ ﮐﻪ ﺷﻤﺎ ﺣﺮﻑ
ﻣﯽ ﺯﻧﻴﺪ ،ﻣﺨﺎﻃﺐ ﺻﺮﻓﺎ" ﮔﻮﺵ ﻣﯽ ﺩﻫﺪ .ﺍﻳﻦ ﺑﺪﺍﻥ ﻣﻌﻨﯽ ﺍﺳﺖ ﮐﻪ ﺩﺭ ﻫﺮ ﻣﻘﻄﻊ ﺯﻣﺎﻧﯽ،
ﺍﺯﻧﺼﻒ ﺧﻂ ﺍﺭﺗﺒﺎﻃﯽ ﺑﻴﺸﺘﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﯽ ﮔﺮﺩﺩ ) .ﺳﮑﻮﺕ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﯼ ﺧﻂ ﺩﺭ ﻣﺪﺕ
ﺯﻣﺎﻥ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﺯﻳﺎﺩ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ( ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ﺣﺠﻢ ﺍﻃﻼﻋــــﺎﺕ ﺍﺭﺳﺎﻝ ﺷﺪﻩ،
ﺑﻪ ٤/٧ﻣﮕﺎﺑﺎﻳﺖ ﺗﻨﺰﻝ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
ﺷﺒﮑﻪ ﻫﺎﯼ ﻣﺒﺘﻨﯽ ﺑﺮ ﺩﺍﺩﻩ ﺍﺯ ﺭﻭﺵ Circuit switchingﺍﺳﺘﻔﺎﺩﻩ ﻧﮑﺮﺩﻩ ﻭ ﺩﺭ ﻣﻘﺎﺑﻞ،
ﺭﻭﺵ Packet Switchingﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ.
Packet Switching
75
ﺭﻭﺵ ﻓﻮﻕ ﺑﺴﻴﺎﺭ ﮐﺎﺭﺁ ﺑﻮﺩﻩ ﻭ ﺯﻣﺎﻥ ﻓﻌﺎﻝ ﺑﻮﺩﻥ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﮔﻴﺮﻧﺪﻩ ﺭﺍ ﺑﻪ ﺣﺪﺍﻗﻞ
ﻣﻘﺪﺍﺭ ﺧﻮﺩ ﻣﯽ ﺭﺳﺎﻧﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺗﺮﺍﻓﻴﮏ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﯼ ﺷﺒﮑﻪ ﻧﻴﺰ ﮐﺎﻫﺶ ﺧﻮﺍﻫﺪ
ﻳﺎﻓﺖ .ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﯼ ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﮔﻴﺮﻧﺪﻩ ﺩﺭ ﺯﻣﺎﻥ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻗﺎﺩﺭ ﺑﻪ ﺩﺭﻳﺎﻓﺖ ﻭ ﻳﺎ
ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﯼ ﺳﺎﻳﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻧﻴﺰ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ.
ﺗﮑﻨﻮﻟﻮﮊﯼ VoIPﺍﺯ ﺭﻭﺵ Packet Switchingﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮐﻨﺪ .ﺑﺎﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ
ﻓﻮﻕ ﺍﻣﮑﺎﻥ ﺑﺮﻗﺮﺍﺭﯼ ﭼﻨﺪﻳﻦ ﻣﮑﺎﻟﻤﻪ ﺗﻠﻔﻨﯽ ﻓﺮﺍﻫﻢ ﻣﯽ ﮔﺮﺩﺩ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ، PSTNﻳﮏ
ﻣﮑﺎﻟﻤﻪ ﺩﻩ ﺩﻗﻴﻘﻪ ﺍﯼ ،ﺩﻩ ﺩﻗﻴﻘﻪ ﮐﺎﻣﻞ ﺍﺯ ﺯﻣﺎﻥ ﺍﻧﺘﻘﺎﻝ ﺑﺎ ﻧﺮﺥ ١٢٨ﮐﻴﻠﻮﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺭﺍ ﺍﺷﻐﺎﻝ
ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺩﺭ ﺭﻭﺵ ، VoIPﻣﮑﺎﻟﻤﻪ ﺩﻩ ﺩﻗﻴﻘﻪ ﺍﯼ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﺻﺮﻓﺎ" ٥/٣ﺩﻗﻴﻘﻪ ﺯﻣﺎﻥ
ﺍﻧﺘﻘﺎﻝ ﺭﺍ ﺑﺎ ﻧﺮﺥ ٦٤ﮐﻴﻠﻮﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺍﺷﻐﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ٦٤ﮐﻴﻠﻮﺑﻴﺖ ﺩﺭ
ﺛﺎﻧﻴﻪ ﺑﺮﺍﯼ ﻣﺪﺕ ٥/٣ﺩﻗﻴﻘﻪ ،ﻭ ١٢٨ﮐﻴﻠﻮﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺑﺮﺍﯼ ﺯﻣﺎﻥ ﺑﺎﻗﻴﻤﺎﻧﺪﻩ ٦/ ٥ﺁﺯﺍﺩ
ﺧﻮﺍﻫﺪ ﻣﺎﻧﺪ.
ﻓﺮﺽ ﮐﻨﻴﺪ ﮐﻪ ﺷﺮﮐﺖ ﺷﻤﺎ ﺩﺳﺘﮕﺎﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻤﻨﻄﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺮﻭﻳﺲ VoIPﺭﺍ
ﺧﺮﻳﺪﺍﺭﯼ ﻭ ﻧﺼﺐ ﮐﺮﺩﻩ ﺑﺎﺷﺪ .ﺩﺭ ﺷﺮﮐﺖ ﻣﺮﺑﻮﻃﻪ ﺻﺪﻫﺎ ﺗﻠﻔﻦ ﻭ ﻳﮏ Private (PBX
(branch exchangeﻧﻴﺰ ﻧﺼﺐ ﺷﺪﻩ ﺍﺳﺖ PBX .ﺳﻮﺋﻴﭽﯽ ﺍﺳﺖ ﮐﻪ ﺍﺯ ﺁﻥ ﺑﻤﻨﻈﻮﺭ
ﺍﺭﺗﺒﺎﻁ ﻣﺠﻤﻮﻋﻪ ﺍﯼ ﺍﺯ ﺗﻠﻔﻦ ﻫﺎ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻭ ﺑﻪ ﻳﮏ ﻳﺎ ﭼﻨﺪﻳﻦ ﺧﻂ ﺧﺎﺭﺝ ﺍﺯ ﺷﺮﮐﺖ
ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ .ﺩﺭ ﻣﺜﺎﻝ ﻓﻮﻕ PBXﺑﺼﻮﺭﺕ ﻳﮏ gatewayﺍﺳﺖ.
ﺍﺯ gatewayﺑﻤﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺩﺳﺘﮕﺎﻫﻬﺎﯼ ﻣﻮﺟﻮﺩ ﺩﺭ ﺩﻭ ﺷﺒﮑﻪ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻴﮕﺮﺩﺩ PBX .ﻳﮏ Gatewayﺍﺳﺖ ).ﭼﻮﻥ ﺳﻴﮕﻨﺎﻝ ﻫﺎﯼ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ circuit-
switchingﻫﺮ ﻳﮏ ﺍﺯ ﺗﻠﻔﻦ ﻫﺎ ﺭﺍ ﺑﻪ ﺩﺍﺩﻩ ﻫﺎﯼ ﺩﻳﺠﻴﺘﺎﻝ ﺑﻤﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ
ﺷﺒﮑﻪ ﻣﺒﺘﻨﯽ ﺑﺮ IPﻭ Packet Switchingﺗﺒﺪﻳﻞ ﻣﯽ ﻧﻤﺎﻳﺪ(.
ﺭﻭﺵ ﺑﺮﻗﺮﺍﺭﯼ ﻳﮏ ﻣﮑﺎﻟﻤﻪ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﺷﺒﮑﻪ Packet-Switchingﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
VoIPﺑﺼﻮﺭﺕ ﺯﻳﺮ ﺍﺳﺖ :
ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﺭﺍ ﻓﻌﺎﻝ ﺗﺎ ﺍﺯ ﻃﺮﻳﻖ ﺁﻥ ﻳﮏ ﺳﻴﮕﻨﺎﻝ ﺑﺮﺍﯼ PBXﺍﺭﺳﺎﻝ ﮔﺮﺩﺩ. •
76
ﻓﺮﺳﺘﻨﺪﻩ ﺍﻗﺪﺍﻡ ﺑﻪ ﺷﻤﺎﺭﻩ ﮔﻴﺮﯼ ﺗﻠﻔﻦ ﻣﺨﺎﻃﺐ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﻣﯽ ﻧﻤﺎﻳﺪ .ﺷﻤﺎﺭﻩ ﻓﻮﻕ ﺩﺭ •
ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺩﺭﻓﺮﺁﻳﻨﺪ ﺗﻄﺒﻴﻖ ،ﺷﻤﺎﺭﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﺁﺩﺭﺱ IPﺩﺳﺘﮕﺎﻩ ﺩﻳﮕﺮ ﮐﻪ
"ﻣﻴﺰﺑﺎﻥ "IPﻧﺎﻣﻴﺪﻩ ﻣﯽ ﮔﺮﺩﺩ ،ﻣﻠﺤﻖ ﻣﯽ ﮔﺮﺩﺩ" .ﻣﻴﺰﺑﺎﻥ "IPﻋﻤﻼ" ﻳﮏ PBX
ﺩﻳﺠﻴﺘﺎﻟﯽ ﺩﻳﮕﺮ ﺍﺳﺖ ﮐﻪ ﺑﻪ ﺳﻴﺘﻢ ﺗﻠﻔﻦ ﻣﺤﻠﯽ ﮐﻪ ﺑﺎ ﺁﻥ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﺷﺪﻩ ،ﻧﺼﺐ
ﺷﺪﻩ ﺍﺳﺖ .ﺩﺭ ﻣﻮﺍﺭﺩ ﺧﺎﺻﯽ ﮐﻪ ﻣﺨﺎﻃﺐ ﺍﺯ ﻳﮏ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ VoIPﻣﺒﺘﻨﯽ ﺑﺮ
ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﺪ " ،ﻣﻴﺰﺑﺎﻥ ، "IPﺳﻴﺴﺘﻤﯽ ﺍﺳﺖ ﮐﻪ ﻗﺼﺪ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ
ﺑﺎ ﺁﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ.
ﻳﮏ sessionﺑﻴﻦ PBXﺍﺩﺍﺭﻩ ﺗﻤﺎﺱ ﮔﻴﺮﻧﺪﻩ ﻭ "ﻣﻴﺰﺑﺎﻥ "IPﺑﺮﻗﺮﺍﺭ ﻣﯽ ﮔﺮﺩﺩ .ﻫﺮ •
ﭘﺲ ﺍﺯ ﻗﻄﻊ ﺍﺭﺗﺒﺎﻁ ،ﻣﺪﺍﺭ) ﺍﺭﺗﺒﺎﻁ ( ﻣﻮﺟﻮﺩ ﺑﻴﻦ ﺗﻠﻔﻦ ﺗﻤﺎﺱ ﮔﻴﺮﻧﺪﻩ ﻭ PBXﺁﺯﺍﺩ •
ﻣﯽ ﮔﺮﺩﺩ.
PBXﺳﻴﮕﻨﺎﻟﯽ ﺭﺍ ﺑﺮﺍﯼ ﻣﻴﺰﺑﺎﻥ IPﺍﺭﺳﺎﻝ ﻭ ﺧﺎﺗﻤﻪ ﻣﮑﺎﻟﻤﻪ ﺭﺍ ﺍﻋﻼﻡ ﻣﯽ ﻧﻤﺎﻳﺪ. •
ﭘﺲ ﺍﺯ ﺍﺗﻤﺎﻡ ، sessionﺩﺳﺘﮕﺎﻩ PBXﺷﻤﺎﺭﻩ ﺗﻠﻔﻦ ﺗﻄﺒﻴﻖ ﺩﺍﺩﻩ ﺷﺪﻩ ﺑﻪ "ﻣﻴﺰﺑﺎﻥ •
77
ﺑﻤﻨﻈﻮﺭ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﺍﺯ ﻃﺮﻳﻖ ﺗﻠﻔﻦ ﺑﺎ ﺩﺳﺘﮕﺎﻫﻬﺎﺋﯽ ﻧﻈﻴﺮ :ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺭ ﻃﻮﻝ ﻳﮏ
ﺷﺒﮑﻪ ،ﻣﯽ ﺑﺎﻳﺴﺖ ﺍﺯ ﻳﮏ ﭘﺮﻭﺗﮑﻞ ﻣﺸﺘﺮﮎ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ.
ﭘﺮﻭﺗﮑﻞ
ﺍﺯ ﺩﻭ ﭘﺮﻭﺗﮑﻞ ﻋﻤﺪﻩ ﺑﺮﺍﯼ VoIPﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﺷﻮﺩ .ﭘﺮﻭﺗﮑﻞ ﻫﺎﯼ ﻓﻮﻕ ﺭﻭﺵ ﻫﺎﯼ ﻣﺮﺑﻮﻁ
ﺑﻪ ﺍﺭﺗﺒﺎﻁ ﺩﺳﺘﮕﺎﻫﻬﺎﯼ ﻣﺘﻔﺎﻭﺕ ﺍﺯ ﻃﺮﻳﻖ VoIPﺭﺍ ﻣﺸﺨﺺ ﻭ Codecﻫﺎﯼ ﺻﻮﺗﯽ ﺭﺍ
ﻧﻴﺰ ﺗﻌﻴﻴﻦ ﻣﯽ ﻧﻤﺎﻳﺪ" .ﮐﺪﮎ " ﺍﺯ ﺗﻠﻔﻴﻖ ﺩﻭ ﻭﺍﮊﻩ Codeﻭ Decodeﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺍﺳﺖ.
ﮐﺪﮎ ،ﻳﮏ ﺳﻴﮕﻨﺎﻝ ﺻﻮﺗﯽ ﺭﺍ ﺑﻪ ﻳﮏ ﺳﻴﮕﻨﺎﻝ ﺩﻳﺠﻴﺘﺎﻟﯽ ﻓﺸﺮﺩﻩ ﺷﺪﻩ ﺗﺒﺪﻳﻞ ﻣﯽ ﻧﻤﺎﻳﺪ.
ﺍﻭﻟﻴﻦ ﭘﺮﻭﺗﮑﻞ H.323ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺗﻮﺳﻂ
) ITU(International Telecommunication Unionﺍﺳﺖ H.323 .ﻳﮏ
ﭘﺮﻭﺗﮑﻞ ﭘﻴﺸﺮﻓﺘﻪ ﻭ ﭘﻴﭽﻴﺪﻩ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﻣﺸﺨﺼﺎﺕ ﻻﺯﻡ ﺑﺮﺍﯼ ﻭﻳﺪﺋﻮﮐﻨﻔﺮﺍﻧﺲ ﻫﺎﯼ
ﻣﺤﺎﻭﺭﻩ ﺍﯼ ﻭ ﺍﺷﻨﺘﺮﺍﮎ ﺩﺍﺩﻩ ﻭ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﯼ ﺻﻮﺗﯽ ﻧﻈﻴﺮ IPﺗﻠﻔﻨﯽ ﺭﺍ ﺗﻌﺮﻳﻒ ﻣﯽ ﻧﻤﺎﻳﺪ.
H.323ﺩﺍﺭﺍﯼ ﻣﺠﻤﻮﻋﻪ ﺍﯼ ﺍﺯ ﺳﺎﻳﺮ ﭘﺮﻭﺗﮑﻞ ﻫﺎ ﺑﻮﺩﻩ ﮐﻪ ﻫﺮ ﻳﮏ ﺩﺍﺭﺍﯼ ﮐﺎﺭﺑﺮﺩ ﺧﺎﺹ
ﺧﻮﺩ ﻣﯽ ﺑﺎﺷﻨﺪ.
H.323 Protocol
Transport Data Audio Video
H.225 T.122 G.711 H.261
H.235 T.124 G.722 H.263
H.245 T.125 G.723.1
H.450.1 T.126 G.728
H.450.2 T.127 G.729
H.450.3
RTP
X.224.0
78
ﺧﻴﺮﺍ" ﭘﺮﻭﺗﮑﻞ ﺩﻳﮕﺮﯼ ﺑﺎ ﻧﺎﻡ (session Initiation Protocol(SIPﺗﻮﺳﻂ IETF
ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ SIP.ﻧﺴﺒﺖ ﺑﻪ H.323ﺩﺍﺭﺍﯼ ﮐﺎﺭﺍﺋﯽ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮﯼ ﺑﻮﺩﻩ ﻭ ﺻﺮﻓﺎ"
ﺑﺮﺍﯼ IPﺗﻠﻔﻨﯽ ﻃﺮﺍﺣﯽ ﻭ ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﺷﺪﻩ ﺍﺳﺖ.
ﻣﺘﻌﺪﺩﯼ ،ﺧﺪﻣﺎﺕ ﻓﻮﻕ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﯽ ﺩﻫﻨﺪ .ﺑﺮﺍﯼ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ ﻓﻮﻕ ﺑﻪ ﻧﺮﻡ ﺍﻓﺰﺍﺭ
ﻣﺮﺑﻮﻃﻪ ،ﻣﻴــﮑﺮﻭﻓﻦ ،ﺑﻠــﻨﺪﮔﻮ ،ﮐﺎﺭﺕ ﺻﺪﺍ ﻭ ﺧﻂ ﺍﺭﺗﺒﺎﻃﯽ ﺑﺎ ﺳﺮﻋﺖ ﻣﻨﺎﺳﺐ
) ﺧﻄﻮﻁ DSLﻭ ﻳﺎ ﻣﻮﺩﻡ ﻫﺎﯼ ﮐﺎﺑﻠﯽ ( ﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺑﻮﺩ MSN Explorer .ﻳﮏ
ﻧﻤﻮﻧﻪ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﯼ ﻣﺮﺑﻮﻃﻪ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺍﺳﺖ.
ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺗﻠﻔﻦ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ ﻓﻮﻕ ﻣﯽ ﺗﻮﺍﻥ ﺍﺯ ﻃﺮﻳﻖ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﺎ ﻫﺮ •
ﺷﺨﺺ ﮐﻪ ﺩﺍﺭﺍﯼ ﻳﮏ ﺧﻂ ﺗﻠﻔﻦ ﺍﺳﺖ ،ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﮐﺮﺩ .ﺑﺮﺍﯼ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ
ﻓﻮﻕ ﺑﻪ ﻳﮏ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻓﻮﻕ ﺍﻏﻠﺐ
ﺑﺼﻮﺭﺕ ﺭﺍﻳﮕﺎﻥ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻋﻼﻗﻪ ﻣﻨﺪﺍﻥ ﻗﺮﺍﺭ ﻣﯽ ﮔﻴﺮﺩ .ﻫﺰﻳﻨﻪ ﻣﮑﺎﻟﻤﺎﺕ ﺍﻧﺠﺎﻡ ﺷﺪﻩ،
ﺑﻤﺮﺍﺗﺐ ﭘﺎﻳﻴﻦ ﺗﺮ ﺍﺯ ﺭﻭﺵ ﻫﺎﯼ ﻗﺪﻳﻤﯽ ﺍﺳﺖ.
ﺗﻠﻔﻦ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ .ﺑﺮﺧﯽ ﺍﺯ ﺷﺮﮐﺖ ﻫﺎ ،ﺷﻤﺎﺭﻩ ﺗﻠﻔﻦ ﻫﺎﯼ ﺧﺎﺻﯽ ﺭﺍ ﺑﻤﻨﻈﻮﺭ ﺗﻤﺎﺱ •
ﮐﺎﺭﺑﺮﺍﻥ ﻣﻌﻤﻮﻟﯽ ﺗﻠﻔﻦ ﺑﺎ ﮐﺎﺭﺑﺮﺍﻥ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻓﺮﺍﻫﻢ ﻧﻤﻮﺩﻩ ﺍﻧﺪ .ﻧﺼﺐ ﻳﮏ ﻧﺮﻡ ﺍﻓﺰﺍﺭ
ﺧﺎﺹ ﺑﻤﻨﻈﻮﺭ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ،ﺑﺮ ﺭﻭﯼ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ،ﺍﻟﺰﺍﻣﯽ
ﺍﺳﺖ.
ﺗﻠﻔﻦ ﺑﻪ ﺗﻠﻔﻦ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ Gatewaysﻣﯽ ﺗﻮﺍﻥ ﺑﺎ ﻫﺮ ﺗﻠﻔﻦ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺩﺭ ﺳﻄﺢ •
ﺩﻧﻴﺎ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﮐﺮﺩ .ﺑﺮﺍﯼ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺮﻭﻳﺲ ﻓﻮﻕ ﮐﻪ ﺗﻮﺳﻂ ﺑﺮﺧﯽ ﺍﺯ ﺷﺮﮐﺖ
ﻫﺎ ﺍﺭﺍﺋﻪ ﻣﯽ ﮔﺮﺩﺩ ،ﻣﯽ ﺑﺎﻳﺴﺖ ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﺎ ﻳﮑﯽ ﺍﺯ Gatewayﻫﺎﯼ ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﻧﺎﻥ
ﺗﻤﺎﺱ ﺑﺮﻗﺮﺍﺭ ﮐﺮﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺷﻤﺎﺭﻩ ﺗﻠﻔﻦ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﺭﺍ ﻣﺸﺨﺺ ﻭ ﻧﻬﺎﻳﺘﺎ" ﺗﻮﺳﻂ
79
ﺷﺮﮐﺖ ﻣﺮﺑﻮﻃﻪ ﺍﻣﮑﺎﻥ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺷﺒﮑﻪ ﻣﺒﺘﻨﯽ ﺑﺮ IPﻓﺮﺍﻫﻢ
ﺧﻮﺍﻫﺪ ﺷﺪ .ﺩﺭ ﺍﻳﻦ ﺭﻭﺵ ،ﻻﺯﻡ ﺍﺳﺖ ﮐﻪ ﺩﺭ ﺍﺑﺘﺪﺍ ﺍﺯ ﻳﮏ ﺷﻤﺎﺭﻩ ﺧﺎﺹ ﺍﺳﺘﻔﺎﺩﻩ
ﮔﺮﺩﺩ ).ﺷﻤﺎﺭﻩ ﻣﺮﺑﻮﻁ ﺑﻪ Gatewayﺷﺮﮐﺖ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ ﻓﻮﻕ (.
ﺍﮐﺜﺮ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﻣﻮﺳﺴﺎﺕ ﺑﺎ ﻧﺼﺐ ﺳﻴﺴﺘﻢ ﻫﺎﯼ VoIPﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ IPﺗﻠﻔﻨﯽ ﺭﺍ
ﺑﺮﺍﯼ ﮐﺎﺭﺑﺮﺍﻥ ﺧﻮﺩ ﻓﺮﺍﻫﻢ ﻧﻤﻮﺩﻩ ﺍﻧﺪ .ﺗﮑﻨﻮﻟﻮﮊﯼ ﻓﻮﻕ ﺑﺎ ﺳﺮﻋﺖ ﺩﺭ ﺣﺎﻝ ﺭﺷﺪ ﻭ ﮔﺴﺘﺮﺵ
ﻫﻤﮕﺎﻧﯽ ﺍﺳﺖ .ﮐﻴﻔﻴﺖ ﺑﺎﻻ ﻭ ﻫﺰﻳﻨﻪ ﭘﺎﻳﻴﻦ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﺩﻻﻳﻞ ﻓﺮﺍﮔﻴﺮ ﺷﺪﻥ ﺗﮑﻨﻮﻟﻮﮊﯼ ﻓﻮﻕ
ﺍﺳﺖ.
80
ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ
ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺩﺭ ﺳﺎﻟﻴﺎﻥ ﺍﺧﻴﺮ ﺑﺎ ﺍﺳﺘﻘﺒﺎﻝ ﮔﺴﺘﺮﺩﻩ ﺟﻮﺍﻣﻊ ﺑﺸﺮﯼ ﺭﻭﺑﺮﻭ ﺷﺪﻩ ﺍﺳﺖ.
ﺍﻣﺮﻭﺯﻩ ﮐﻤﺘﺮ ﺷﺨﺼﯽ ﺭﺍ ﻣﯽ ﺗﻮﺍﻥ ﻳﺎﻓﺖ ﮐﻪ ﻭﺍﮊﻩ ﻓﻮﻕ ﺑﺮﺍﯼ ﺍﻭ ﺑﻴﮕﺎﻧﻪ ﺑﺎﺷﺪ .ﻧﺸﺮﻳﺎﺕ،
ﺭﺍﺩﻳﻮ ﻭ ﺗﻠﻮﻳﺰﻳﻮﻥ ﺑﻪ ﺻﻮﺭﺕ ﺭﻭﺯﺍﻧﻪ ﻣﻮﺿﻮﻋﺎﺗﯽ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺭﺍ ﻣﻨﺘﺸﺮ
ﻭ ﺍﻓﺮﺍﺩ ﻭ ﮐﺎﺭﺷﻨﺎﺳﺎﻥ ﺍﺯ ﺯﻭﺍﻳﺎﯼ ﻣﺘﻔﺎﻭﺕ ﺑﻪ ﺑﺮﺭﺳﯽ ﻣﻘﻮﻟﻪ ﻓﻮﻕ ﻣﯽ ﭘﺮﺩﺍﺯﻧﺪ .ﺷﺮﮐﺖ ﻫﺎ ﻭ
ﻣﻮﺳﺴﺎﺕ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺕ ﻫﻤﮕﺎﻡ ﺑﺎ ﺳﻴﺮ ﺗﺤﻮﻻﺕ ﺟﻬﺎﺗﯽ ﺩﺭ ﺯﻣﻴﻨﻪ ﺗﺠﺎﺭﺕ
ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺩﺭ ﺗﻼﺵ ﺑﺮﺍﯼ ﺗﻐﻴﻴﺮ ﺳﺎﺧﺘﺎﺭ ﻣﻨﻄﻘﯽ ﻭ ﻓﻴﺰﻳﮑﯽ ﺳﺎﺯﻣﺎﻥ ﺧﻮﺩ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ
ﻣﯽ ﺑﺎﺷﻨﺪ.
ﺗﺠﺎﺭﺕ
ﻗﺒﻞ ﺍﺯ ﺑﺮﺭﺳﯽ " ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ " ،ﻻﺯﻡ ﺍﺳﺖ ﺩﺭ ﺍﺑﺘﺪﺍ ﻳﮏ ﺗﺼﻮﻳﺮ ﺫﻫﻨﯽ ﻣﻨﺎﺳﺐ ﺍﺯ
ﺗﺠﺎﺭﺕ ﺳﻨﺘﯽ ﺭﺍ ﺍﺭﺍﺋﻪ ﻧﻤﺎﺋﻴﻢ .ﺩﺭ ﺻﻮﺭﺕ ﺷﻨﺎﺧﺖ " ﺗﺠﺎﺭﺕ " ،ﺑﺎ " ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ "
ﻧﻴﺰ ﺁﺷﻨﺎ ﺧﻮﺍﻫﻴﻢ ﺷﺪ.
ﺑﺮﺍﯼ ﻭﺍﮊﻩ "ﺗﺠﺎﺭﺕ" ﺩﺭ ﺍﮐﺜﺮ ﻭﺍﮊﻩ ﻧﺎﻣﻪ ﻫﺎ ﺗﻌﺎﺭﻳﻒ ﺯﻳﺮ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ:
ﻣﺒﺎﺩﻻﺕ ﺍﺟﺘﻤﺎﻋﯽ :ﺗﺒﺎﺩﻝ ﺍﻳﺪﻩ ﻫﺎ ،ﻋﻘﺎﻳﺪ ﻭ ﺗﻤﺎﻳﻼﺕ ) ﺧﻮﺍﺳﺘﻪ ﻫﺎ ( •
ﻣﺒﺎﺩﻟﻪ ﻳﺎ ﺧﺮﻳﺪ ﻭ ﻓﺮﻭﺵ ﮐﺎﻻ ﺩﺭ ﻣﻘﻴﺎﺱ ﺑﺎﻻ ﮐﻪ ﺑﻪ ﻫﻤﺮﺍﻩ ﺣﻤﻞ ﮐﺎﻻ ﺍﺯ ﻧﻘﻄﻪ ﺍﯼ ﺑﻪ •
81
ﺍﺯ ﺯﻧﺠﻴﺮﻩ ﻫﺎﯼ ﺗﺠﺎﺭﺕ ﺷﺪﻩ ﺍﻳﺪ .ﺗﻤﺎﻡ ﺟﻠﻮﻩ ﻫﺎﯼ ﺗﺠﺎﺭﺕ ﺑﺎ ﻫﺮ ﺭﻭﻳﮑﺮﺩ ﻭ ﺳﻴﺎﺳﺘﯽ ﺩﺍﺭﺍﯼ
ﺧﺼﺎﻳﺺ ﺯﻳﺮ ﻣﯽ ﺑﺎﺷﻨﺪ:
ﺧﺮﻳﺪﺍﺭﺍﻥ .ﺍﻓﺮﺍﺩﻳﮑﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻮﻝ ﺧﻮﺩ ﻗﺼﺪ ﺧﺮﻳﺪ ﻳﮏ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺕ ﺭﺍ •
ﺩﺍﺭﻧﺪ.
ﻓﺮﻭﺷﻨﺪﮔﺎﻥ .ﺍﻓﺮﺍﺩﻳﮑﻪ ﮐﺎﻻ ﻭ ﺧﺪﻣﺎﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺧﺮﻳﺪﺍﺭﺍﻥ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﯽ ﺩﻫﻨﺪ. •
ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺑﻪ ﺩﻭ ﮔﺮﻭﻉ ﻋﻤﺪﻩ ﺗﻘﺴﻴﻢ ﻣﯽ ﮔﺮﺩﻧﺪ :ﺧﺮﺩﻩ ﻓﺮﻭﺷﺎﻥ ،ﮐﻪ ﮐﺎﻻ ﻭ ﻳﺎ
ﺧﺪﻣﺎﺗﯽ ﺭﺍ ﻣﺴﺘﻘﻴﻤﺎ" ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻣﺘﻘﺎﺿﻴﺎﻥ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﻭ ﻋﻤﺪﻩ ﻓﺮﻭﺷﺎﻥ ﻭ ﻋﻮﺍﻣﻞ
ﻓﺮﻭﺵ ،ﮐﻪ ﮐﺎﻻ ﻭ ﺧﺪﻣﺎﺕ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺧﺮﺩﻩ ﻓﺮﻭﺷﺎﻥ ﻭ ﺳﺎﻳﺮ ﻣﻮﺳﺴﺎﺕ
ﺗﺠﺎﺭﯼ ﻣﯽ ﻧﻤﺎﻳﻨﺪ.
ﺗﻮﻟﻴﺪﮐﻨﻨﺪﮔﺎﻥ .ﺍﻓﺮﺍﺩﻳﮑﻪ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺗﯽ ﺭﺍ ﺍﻳﺠﺎﺩ ﺗﺎ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺁﻧﻬﺎ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ •
ﺧﺮﻳﺪﺍﺭﺍﻥ ﻗﺮﺍﺭ ﺩﻫﻨﺪ .ﻳﮏ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺎﻫﻴﺖ ﮐﺎﺭ ﺧﻮﺩ ﻫﻤﻮﺍﺭﻩ ﻳﮏ
ﻓﺮﻭﺷﻨﺪﻩ ﻧﻴﺰ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺗﻮﻟﻴﺪﮐﻨﻨﺪﮔﺎﻥ ﮐﺎﻻﯼ ﺗﻮﻟﻴﺪﯼ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﻋﻤﺪﻩ ﻓﺮﻭﺷﺎﻥ ،
ﺧﺮﺩﻩ ﻓﺮﻭﺷﺎﻥ ﻭ ﻳﺎ ﻣﺴﺘﻘﻴﻤﺎ" ﺑﻪ ﻣﺼﺮﻑ ﮐﻨﻨﺪﻩ ﮔﺎﻥ ﻣﯽ ﻓﺮﻭﺷﻨﺪ.
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﻣﺸﺎﻫﺪﻩ ﻣﯽ ﮔﺮﺩﺩ " ،ﺗﺠﺎﺭﺕ " ﺍﺯ ﺯﺍﻭﻳﻪ ﻓﻮﻕ ﺩﺍﺭﺍﯼ ﻣﻔﺎﻫﻴﻢ ﺳﺎﺩﻩ ﺍﯼ ﺍﺳﺖ.
ﺗﺠﺎﺭﺕ ﺍﺯ ﺧﺮﻳﺪ ﻳﮏ ﻣﺤﺼﻮﻝ ﺳﺎﺩﻩ ﻧﻈﻴﺮ " ﺑﺴﺘﻨﯽ " ﺗﺎ ﻣﻮﺍﺭﺩ ﭘﻴﭽﻴﺪﻩ ﺍﯼ ﻧﻈﻴﺮ ﺍﺟﺎﺭﻩ
ﻣﺎﻫﻮﺍﺭﻩ ﺭﺍ ﺷﺎﻣﻞ ﻣﯽ ﮔﺮﺩﺩ .ﺗﻤﺎﻡ ﺟﻠﻮﻩ ﻫﺎﯼ ﺗﺠﺎﺭﺕ ﺍﺯ ﺳﺎﺩﻩ ﺗﺮﻳﻦ ﺳﻄﺢ ﺗﺎ ﭘﻴﭽﻴﺪﻩ ﺗﺮﻳﻦ
ﺣﺎﻟﺖ ﺁﻥ ،ﺑﺮ ﻣﻘﻮﻻﺗﯽ ﻫﻤﭽﻮﻥ :ﺧﺮﻳﺪﺍﺭﺍﻥ ،ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻭ ﺗﻮﻟﻴﺪﮐﻨﻨﺪﮔﺎﻥ ﻣﺘﻤﺮﮐﺰ ﺧﻮﺍﻫﺪ
ﺑﻮﺩ.
ﻋﻨﺎﺻﺮ ﺗﺠﺎﺭﺕ
ﺯﻣﺎﻧﻴﮑﻪ ﻗﺼﺪ ﻣﻌﺮﻓﯽ ﻋﻨﺎﺻﺮ ﺫﻳﺮﺑﻂ ﺩﺭ ﺗﺠﺎﺭﺕ ﻭ ﻓﻌﺎﻟﻴﺖ ﻫﺎﯼ ﺗﺠﺎﺭﯼ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ،
ﻣﻮﺿﻮﻋﺎﺕ ﻭ ﻣﻮﺍﺭﺩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺪﻟﻴﻞ ﺩﺭﮔﻴﺮ ﺷﺪﻥ ﺑﺎ ﺟﺰﺋﻴﺎﺕ ﭘﻴﭽﻴﺪﻩ ﺗﺮ ﺑﻨﻈﺮ ﺧﻮﺍﻫﻨﺪ ﺁﻣﺪ.
ﻋﻨﺎﺻﺮ ﺫﻳﻞ ﺗﻤﺎﻡ ﺍﻟﻤﺎﻥ ﻫﺎﯼ ﺫﻳﺮﺑﻂ ﺩﺭ ﻳﮏ ﻓﻌﺎﻟﻴﺖ ﺗﺠﺎﺭﯼ ﻣﻌﻤﻮﻟﯽ ﺭﺍ ﺗﺸﺮﻳﺢ ﻣﯽ ﻧﻤﺎﻳﺪ.
ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ،ﻓﻌﺎﻟﻴﺖ ﺷﺎﻣﻞ ﻓﺮﻭﺵ ﺑﺮﺧﯽ ﻣﺤﺼﻮﻻﺕ ﺗﻮﺳﻂ ﻳﮏ ﺧﺮﺩﻩ ﻓﺮﻭﺵ ﺑﻪ
ﻣﺼﺮﻑ ﮐﻨﻨﺪﻩ ﺍﺳﺖ :
82
ﺩﺭ ﺻﻮﺭﺕ ﺗﻤﺎﻳﻞ ﻓﺮﻭﺵ ﻣﺤﺼﻮﻝ ﻭ ﻳﺎ ﻣﺤﺼﻮﻻﺗﯽ ﺑﻪ ﻳﮏ ﻣﺼﺮﻑ ﮐﻨﻨﺪﻩ ،ﻣﺴﺌﻠﻪ •
ﺍﺳﺎﺳﯽ ﺩﺍﺷﺘﻦ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺗﯽ ﺧﺎﺹ ﺑﺮﺍﯼ ﻋﺮﺿﻪ ﺍﺳﺖ .ﮐﺎﻻ ﻣﯽ ﺗﻮﺍﻧﺪ ﻫﺮ ﭼﻴﺰﯼ
ﺭﺍ ﺷﺎﻣﻞ ﮔﺮﺩﺩ .ﻓﺮﻭﺷﻨﺪﻩ ،ﻣﻤﮑﻦ ﺍﺳﺖ ﮐﺎﻻﯼ ﺧﻮﺩ ﺭﺍ ﻣﺴﺘﻘﻴﻤﺎ" ﺍﺯ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ ﻭ ﻳﺎ
ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﻋﺎﻣﻞ ﻓﺮﻭﺵ ﺗﻬﻴﻪ ﮐﺮﺩﻩ ﺑﺎﺷﺪ .ﺩﺭ ﺑﺮﺧﯽ ﺣﺎﻻﺕ ﻣﻤﮑﻦ ﺍﺳﺖ ﻓﺮﻭﺷﻨﺪﻩ
،ﺧﻮﺩ ﮐﺎﻻﺋﯽ ﺭﺍ ﺗﻮﻟﻴﺪ ﻭ ﺑﻘﺮﻭﺵ ﻣﯽ ﺭﺳﺎﻧﺪ.
ﻓﺮﻭﺷﻨﺪﻩ ﺑﺮﺍﯼ ﻓﺮﻭﺵ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺕ ﻣﯽ ﺑﺎﻳﺴﺖ " ﻣﮑﺎﻧﯽ ﻣﻨﺎﺳﺐ " ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ •
ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ .ﻣﮑﺎﻥ ﻣﻮﺭﺩ ﻧﻈﺮ ﻣﯽ ﺗﻮﺍﻧﺪ ﺩﺭ ﺑﺮﺧﯽ ﺣﺎﻻﺕ ﺑﺴﻴﺎﺭ ﻣﻮﻗﺘﯽ ﺑﺎﺷﺪ .ﻣﺜﻼ"
ﻳﮏ ﺷﻤﺎﺭﻩ ﺗﻠﻔﻦ ﺧﻮﺩ ﺑﻤﻨﺰﻟﻪ ﻳﮏ ﻣﮑﺎﻥ ﺍﺳﺖ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﯼ ﻣﺘﻘﺎﺿﯽ ﮐﺎﻻ ﻭ ﻳﺎ
ﺧﺪﻣﺎﺕ ﺑﺎ ﺗﻤﺎﺱ ﺗﻠﻔﻨﯽ ﺑﺎ ﻓﺮﻭﺷﻨﺪﻩ ﻗﺎﺩﺭ ﺑﻪ ﺛﺒﺖ ﺳﻔﺎﺭﺵ ﻭ ﺩﺭﻳﺎﻓﺖ ﮐﺎﻻﯼ ﻣﻮﺭﺩ
ﻧﻈﺮ ﺧﻮﺩ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺑﺮﺍﯼ ﺍﮐﺜﺮ ﮐﺎﻻﻫﺎﯼ ﻓﻴﺰﻳﮑﯽ ﻣﯽ ﺑﺎﻳﺴﺖ ﻣﮑﺎﻥ ﺍﺭﺍﺋﻪ ﮐﺎﻻ ،ﻳﮏ
ﻣﻐﺎﺯﻩ ﻭ ﻳﺎ ﻓﺮﻭﺷﮕﺎﻩ ﺑﺎﺷﺪ.
ﺑﺮﺍﯼ ﻓﺮﻭﺵ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺕ ،ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﻣﯽ ﺑﺎﻳﺴﺖ ﺍﺯ ﺭﺍﻫﮑﺎﺭﻫﺎﺋﯽ ﺑﺮﺍﯼ ﺟﺬﺏ •
ﺍﻓﺮﺍﺩ ﺑﻪ ﻣﮑﺎﻥ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ .ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ " ﻣﺎﺭﮐﺘﻴﻨﮓ " ﻧﺎﻣﻴﺪﻩ ﻣﯽ ﺷﻮﺩ .ﺩﺭ
ﺻﻮﺭﺗﻴﮑﻪ ﺍﻓﺮﺍﺩ ﺍﺯ ﻣﺤﻞ ﻭ ﻣﮑﺎﻥ ﺍﺭﺍﺋﻪ ﻳﮏ ﮐﺎﻻ ﻭ ﺧﺪﻣﺎﺕ ﺁﮔﺎﻫﯽ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ،
ﺍﻣﮑﺎﻥ ﻓﺮﻭﺵ ﻫﻴﭽﮕﻮﻧﻪ ﮐﺎﻻﺋﯽ ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﺍﻧﺘﺨﺎﺏ ﻣﺤﻞ ﺍﺭﺍﺋﻪ ﮐﺎﻻ ﺩﺭ
ﻳﮏ ﻣﺮﮐﺰ ﺗﺠﺎﺭﯼ ﺷﻠﻮﻍ ،ﻳﮑﯽ ﺍﺯ ﺭﻭﺵ ﻫﺎﯼ ﺍﻓﺰﺍﻳﺶ ﺗﺮﺩﺩ ﺑﻪ ﻣﮑﺎﻥ ﺍﺭﺍﺋﻪ ﮐﺎﻻ ﺍﺳﺖ.
ﺍﺭﺳﺎﻝ ﭘﺴﺘﯽ ﮐﺎﺗﻮﻟﻮﮒ ﻫﺎ ﯼ ﻣﺮﺑﻮﻁ ﺑﻪ ﻣﺤﺼﻮﻻﺕ ،ﻳﮑﯽ ﺩﻳﮕﺮ ﺍﺯ ﺭﻭﺵ ﻫﺎﯼ
ﻣﻌﺮﻓﯽ ﻣﮑﺎﻥ ﺍﺭﺍﺋﻪ ﻳﮏ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺕ ﺍﺳﺖ .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺷﻴﻮﻩ ﻫﺎﯼ ﻣﺘﻔﺎﻭﺕ
ﺗﺒﻠﻴﻐﺎﺗﯽ ،ﺭﺍﻫﮑﺎﺭﯼ ﺩﻳﮕﺮ ﺩﺭ ﻣﻌﺮﻓﯽ ﻣﮑﺎﻥ ﺍﺭﺍﺋﻪ ﮐﺎﻻ ﺍﺳﺖ.
ﻓﺮﻭﺷﻨﺪﻩ ﻧﻴﺎﺯﻣﻨﺪ ﺭﻭﺷﯽ ﺑﺮﺍﯼ ﺩﺭﻳﺎﻓﺖ ﺳﻔﺎﺭﺷﺎﺕ ﺍﺳﺖ .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻠﻔﻦ ﻭ ﻧﺎﻣﻪ، •
ﻧﻤﻮﻧﻪ ﻫﺎﺋﯽ ﺍﺯ ﺭﻭﺵ ﻫﺎﯼ ﺩﺭﻳﺎﻓﺖ ﺳﻔﺎﺭﺵ ﻣﺘﻘﺎﺿﻴﺎﻥ ﻣﯽ ﺑﺎﺷﺪ .ﺣﻀﻮﺭ ﻓﻴﺰﻳﮑﯽ ﺩﺭ
ﻣﮑﺎﻥ ﺍﺭﺍﺋﻪ ﻳﮏ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺕ ﺍﺯ ﺩﻳﮕﺮ ﺭﻭﺵ ﻫﺎﯼ ﺳﻨﺘﯽ ﺑﺮﺍﯼ ﺛﺒﺖ ﺳﻔﺎﺭﺵ ﮐﺎﻻ
ﺍﺳﺖ .ﭘﺲ ﺍﺯ ﺛﺒﺖ ﺳﻔﺎﺭﺵ ،ﻓﺮﺁﻳﻨﺪﻫﺎﯼ ﻻﺯﻡ ﺗﻮﺳﻂ ﭘﺮﺳﻨﻞ ﺷﺎﻏﻞ ﺩﺭ ﺷﺮﮐﺖ ﻭ ﻳﺎ
ﻣﻮﺳﺴﻪ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺕ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﮔﺮﻓﺖ.
83
ﻓﺮﻭﺷﻨﺪﻩ ﻧﻴﺎﺯﻣﻨﺪ ﺭﻭﺷﯽ ﺑﺮﺍﯼ ﺩﺭﻳﺎﻓﺖ ﭘﻮﻝ ﺍﺳﺖ .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭼﮏ ،ﮐﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﯼ ﻭ •
ﻳﺎ ﭘﻮﻝ ﻧﻘﺪ ﺭﻭﺵ ﻫﺎﯼ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻣﯽ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺑﺮﺧﯽ ﺍﺯ ﻓﻌﺎﻟﻴﺖ ﻫﺎﯼ
ﺗﺠﺎﺭﯼ ﺍﺯ ﻓﺮﻭﺷﻨﺪﻩ ﺗﺎ ﺯﻣﺎﻥ ﺗﻮﺯﻳﻊ ﮐﺎﻻ ﭘﻮﻟﯽ ﺩﺭﻳﺎﻓﺖ ﻧﻤﯽ ﮔﺮﺩﺩ.
ﻓﺮﻭﺷﻨﺪﻩ ﻧﻴﺎﺯﻣﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺷﯽ ﺑﺮﺍﯼ ﻋﺮﺿﻪ ﻭ ﺗﻮﺯﻳﻊ ﮐﺎﻻ ﻭ ﻳﺎ ﺧﺪﻣﺎﺕ ﻣﯽ ﺑﺎﺷﺪ. •
ﺩﺭ ﺑﺮﺧﯽ ﺍﺯ ﺳﻴﺴﺘﻢ ﻫﺎ ﺑﻤﺤﺾ ﺍﻧﺘﺨﺎﺏ ﮐﺎﻻ ﺗﻮﺳﻂ ﻣﺸﺘﺮﯼ ﻭ ﭘﺮﺩﺍﺧﺖ ﻭﺟﻪ ﺁﻥ،
ﻋﻤﻠﻴﺎﺕ ﺗﻮﺯﻳﻊ ﮐﺎﻻ ﺑﺼﻮﺭﺕ ﺍﺗﻮﻣﺎﺗﻴﮏ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺩﺭ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﺛﺒﺖ
ﺳﻔﺎﺭﺵ ﻣﺒﺘﻨﯽ ﺑﺮ ﻧﺎﻣﻪ ،ﮐﺎﻻﯼ ﺧﺮﻳﺪﺍﺭﯼ ﺷﺪﻩ ﭘﺲ ﺍﺯ ﺑﺴﺘﻪ ﺑﻨﺪﯼ ﺑﻪ ﻣﻘﺼﺪ ﻣﺸﺘﺮﯼ
ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺩﺭ ﻣﻮﺍﺭﺩﻳﮑﻪ ﺣﺠﻢ ﮐﺎﻻ ﺯﻳﺎﺩ ﻧﺒﺎﺷﺪ ﺍﺯ ﻣﺒﺎﺩﻻﺕ ﭘﺴﺘﯽ ﺑﻪ ﻣﻨﻈﻮﺭ
ﺍﺭﺳﺎﻝ ﮐﺎﻻ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﻭ ﺩﺭ ﻣﻮﺍﺭﺩﻳﮑﻪ ﺣﺠﻢ ﮐﺎﻻ ﺯﻳﺎﺩ ﺑﺎﺷﺪ ﺍﺯ ﮐﺎﻣﻴﻮﻥ ،ﻗﻄﺎﺭ ﻭ ﻳﺎ
ﮐﺸﺘﯽ ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﻭ ﺗﻮﺯﻳﻊ ﮐﺎﻻ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ.
ﺩﺭ ﺑﺮﺧﯽ ﻣﻮﺍﺭﺩ ،ﺧﺮﻳﺪﺍﺭﺍﻥ ﻳﮏ ﮐﺎﻻ ﺗﻤﺎﻳﻞ ﻭ ﻋﻼﻗﻪ ﺍﯼ ﻧﺴﺒﺖ ﺑﻪ ﺁﻥ ﭼﻴﺰﯼ ﮐﻪ •
ﺧﺮﻳﺪﺍﺭﯼ ﻧﻤﻮﺩﻩ ﺍﻧﺪ ﻧﺪﺍﺷﺘﻪ ﻭ ﻗﺼﺪ ﺑﺮﮔﺸﺖ ﺁﻥ ﺭﺍ ﺩﺍﺭﻧﺪ .ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﮐﺎﻻ ﻭ ﻳﺎ
ﺧﺪﻣﺎﺕ ﻣﯽ ﺑﺎﻳﺴﺖ ﺍﺯ ﺭﻭﺵ ﻫﺎﺋﯽ ﺑﺮﺍﯼ ﻗﺒﻮﻝ ﻣﻮﺍﺭﺩ "ﺑﺮﮔﺸﺖ ﺍﺯ ﻓﺮﻭﺵ " ﺍﺳﺘﻔﺎﺩﻩ
ﻧﻤﺎﻳﻨﺪ.
ﺩﺭ ﺑﺮﺧﯽ ﻣﻮﺍﺭﺩ ﻣﻤﮑﻦ ﺍﺳﺖ ﮐﺎﻻﺋﯽ ﺩﺭ ﺯﻣﺎﻥ ﺗﻮﺯﻳﻊ ﺁﺳﻴﺐ ﺩﻳﺪﻩ ﺑﺎﺷﺪ .ﻓﺮﻭﺷﻨﺪﮔﺎﻥ •
84
ﺩﺭ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺗﻤﺎﻡ ﻋﻨﺎﺻﺮ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ،ﺣﻀﻮﺭﯼ ﻣﺸﻬﻮﺩ ﺑﺎ ﺗﻐﻴﻴﺮﺍﺕ ﺧﺎﺻﯽ ﺩﺍﺭﻧﺪ.
ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺪﻳﺮﻳﺖ ﻭ ﺍﺟﺮﺍﯼ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﻪ ﻋﻨﺎﺻﺮ ﺯﻳﺮ ﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺑﻮﺩ:
ﻳﮏ ﻣﺤﺼﻮﻝ •
ﻣﺤﻠﯽ ﺑﺮﺍﯼ ﻓﺮﻭﺵ ﮐﺎﻻ .ﺩﺭ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻳﮏ ﻭﺏ ﺳﺎﻳﺖ ﺑﻤﻨﺰﻟﻪ ﻣﮑﺎﻥ ﺍﺭﺍﺋﻪ •
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺷﯽ ﺑﺮﺍﯼ ﺛﺒﺖ ﺳﻔﺎﺭﺵ ).ﺍﻏﻠﺐ ﺑﺼﻮﺭﺕ ﻓﺮﻡ ﻫﺎ ﺋﯽ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ •
ﻣﯽ ﺷﻮﺩ(
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺷﯽ ﺑﺮﺍﯼ ﺩﺭﻳﺎﻓﺖ ﭘﻮﻝ ) .ﮐﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﯼ ﺍﺯ ﻧﻤﻮﻧﻪ ﻫﺎﯼ ﻣﺘﺪﺍﻭﻝ ﺍﺳﺖ ( •
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺷﯽ ﺑﺮﺍﯼ ﻣﻮﺍﺭﺩ ﺑﺮﮔﺸﺖ ﺩﺍﺩﻩ ﺷﺪﻩ ﺗﻮﺳﻂ ﺧﺮﻳﺪﺍﺭﺍﻥ •
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺷﯽ ﺑﺮﺍﯼ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﭘﺲ ﺍﺯ ﻓﺮﻭﺵ ) ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﺍﺭﺍﺋﻪ •
85
٧٠ﺩﺭﺻﺪ ﮐﺎﺭﺑﺮﺍﻥ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻨﺪﮔﺎﻥ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺭ ﻣﻨﺰﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﻭ ﺍﻳﻦ •
ﮐﺘﺎﺏ •
ﻣﻮﺯﻳﮏ •
ﭘﻮﺷﺎﮎ •
ﺍﻃﻼﻋﺎﺕ •
86
Dellﻳﮑﯽ ﺍﺯ ﺻﺪﻫﺎ ﺷﺮﮐﺘﯽ ﺍﺳﺖ ﮐﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﯼ ﺷﺨﺼﯽ ﺗﻮﻟﻴﺪﯼ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ
ﻣﺸﺘﺮﻳﺎﻥ ﺣﻘﻴﻘﯽ ﻭ ﻳﺎ ﺣﻘﻮﻗﯽ ﻗﺮﺍﺭ ﻣﯽ ﺩﻫﺪ .ﻓﻌﺎﻟﻴﺖ ﺍﻗﺘﺼﺎﺩﯼ Dellﺑﺎ ﺩﺭﺝ ﺁﮔﻬﯽ ﺩﺭ ﭘﺸﺖ
ﺟﻠﺪ ﻣﺠﻼﺕ ﮐﺎﻣﭙﻴﻮﺗﺮﯼ ﻭ ﻓﺮﻭﺵ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺯ ﻃﺮﻳﻖ ﺗﻠﻔﻦ ،ﺁﻏﺎﺯ ﮔﺮﺩﻳﺪ .ﺍﻣﺮﻭﺯﻩ ﺣﻀﻮﺭ
ﺷﺮﮐﺖ Dellﺩﺭ ﻋﺮﺻﻪ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﺴﺮﻋﺖ ﻣﺘﺪﺍﻭﻝ ﻭ ﻋﻤﻮﻣﯽ ﺷﺪﻩ ﺍﺳﺖ
.ﺷﺮﮐﺖ ﻓﻮﻕ ،ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺍﺋﻪ ﮐﺎﻻﻫﺎﯼ ﺑﻴﺸﻤﺎﺭﯼ ﺍﺯ ﻃﺮﻳﻖ ﻭﺏ ﺷﺪﻩ ﺍﺳﺖ .ﺑﺮ ﺍﺳﺎﺱ ﺁﻣﺎﺭﻫﺎﯼ
ﻣﻮﺟﻮﺩ ،ﻓﺮﻭﺵ ﺭﻭﺯﺍﻧﻪ ، Dellﭼﻬﺎﺭﺩﻩ ﻣﻴﻠﻴﻮﻥ ﺩﻻﺭ ﺑﻮﺩﻩ ﻭ ﺗﻘﺮﻳﺒﺎ" ٢٥ﺩﺭﺻﺪ ﻓﺮﻭﺵ ﺍﻳﻦ
ﺷﺮﮐﺖ ﺍﺯ ﻃﺮﻳﻖ ﻭﺏ ﺍﻧﺠﺎﻡ ﻣﯽ ﮔﻴﺮﺩ .ﺷﺮﮐﺖ Dellﻗﺒﻞ ﺍﺯ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ،
ﺍﮐﺜﺮ ﺳﻔﺎﺭﺷﺎﺕ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺗﻠﻔﻦ ﺍﺧﺬ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺴﺖ ﺁﻧﻬﺎ ﺭﺍ ﺑﺮﺍﯼ ﺧﺮﻳﺪﺍﺭﺍﻥ
ﺧﻮﺩ ،ﺍﺭﺳﺎﻝ ﻣﯽ ﮐﺮﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻓﺮﻭﺵ ٢٥ﺩﺭﺻﺪﯼ ﺷﺮﮐﺖ ﻓﻮﻕ ﺍﺯ ﻃﺮﻳﻖ ﻭﺏ ﻣﯽ ﺗﻮﺍﻥ
ﺑﻪ ﺟﺎﻳﮕﺎﻩ ﻭ ﺍﻫﻤﻴﺖ ﻣﻮﺿﻮﻉ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﻴﺶ ﺍﺯ ﮔﺬﺷﺘﻪ ﻭﺍﻗﻒ ﮔﺮﺩﻳﺪ .ﺩﺭ ﺍﻳﻦ
ﺭﺍﺳﺘﺎ ﻣﯽ ﺗﻮﺍﻥ ﺑﻪ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﺍﺷﺎﺭﻩ ﮐﺮﺩ:
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺷﺮﮐﺖ Dellﺗﻮﺍﻧﺴﺘﻪ ﺑﺎﺷﺪ ،ﻣﻴﺰﺍﻥ ﻓﺮﻭﺵ ﺍﺯ ﻃﺮﻳﻖ ﺗﻠﻔﻦ ﺭﺍ ٢٥ •
ﻣﺒﺘﻨﯽ ﺑﺮ ﺗﻠﻔﻦ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﺩﺳﺖ ﻧﺪﻫﺪ ،ﭼﻪ ﺍﺗﻔﺎﻗﯽ ﻣﯽ ﺍﻓﺘﺪ؟ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﻣﯽ ﺗﻮﺍﻧﺪ
ﺻﺤﺖ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ،ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺑﻪ ﺗﻤﺎﻳﻞ ﻋﺪﻩ ﺍﯼ ﺑﺮﺍﯼ ﺧﺮﻳﺪ ﮐﺎﻻ ﺍﺯ ﻃﺮﻳﻖ ﻭﺏ
87
ﺑﺴﺘﮕﯽ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﮔﺮﺍﻳﺶ ﺑﺴﻤﺖ ﺧﺮﻳﺪ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺼﻮﺭﺕ ﻳﮏ ﻧﻴﺎﺯ
ﻣﻄﺮﺡ ﺷﺪﻩ ﺍﺳﺖ ﻭ ﺍﺯ ﺍﻳﻦ ﺑﺎﺑﺖ ﻧﮕﺮﺍﻧﯽ ﭼﻨﺪﺍﻧﯽ ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ.
ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻓﺮﻭﺵ ﻋﻘﻴﺪﻩ ﺍﯼ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﮐﻪ :ﺯﻣﺎﻧﻴﮑﻪ ﻳﮏ ﻣﺸﺘﺮﯼ ﮐﺎﺭ ﺧﻮﺩ ﺭﺍ ﺑﺎ ﻳﮏ •
ﻓﺮﻭﺷﻨﺪﻩ ﺁﻏﺎﺯ ﻣﯽ ﻧﻤﺎﻳﺪ ،ﻧﮕﻬﺪﺍﺭﯼ ﺁﻥ ﻣﺸﺘﺮﯼ ﺑﺮﺍﯼ ﻓﺮﻭﺷﻨﺪﻩ ﺑﻤﺮﺍﺗﺐ ﺭﺍﺣﺖ ﺗﺮ ﺍﺯ
ﺟﺬﺏ ﻣﺸﺘﺮﻳﺎﻥ ﺟﺪﻳﺪ ﺍﺳﺖ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺗﺼﻤﻴﻢ ﺑﻪ ﺍﻳﺠﺎﺩ ﻳﮏ ﻭﺏ ﺳﺎﻳﺖ
ﺯﻭﺩﺗﺮ ﺍﺗﺤﺎﺫ ﮔﺮﺩﺩ ،ﻧﺴﺒﺖ ﺑﻪ ﺳﺎﻳﺮ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﮐﻪ ﺑﻌﺪﺍ" ﺗﺼﻤﻴﻢ ﻓﻮﻕ ﺭﺍ ﺍﺗﺨﺎﺫ
ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ ،ﭘﻴﺸﻘﺪﻡ ﺧﻮﺍﻫﻴﺪ ﺑﻮﺩ .ﺷﺮﮐﺖ Dellﺳﺎﻳﺖ ﺧﻮﺩ ﺭﺍ ﺧﻴﻠﯽ ﺯﻭﺩ ﻃﺮﺍﺣﯽ
ﻭ ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﻧﻤﻮﺩﻩ ﻭ ﺍﺯ ﺍﻳﻦ ﻃﺮﻳﻖ ﺍﺯ ﺳﺎﻳﺮ ﺭﻗﺒﺎﯼ ﺧﻮﺩ ﭘﻴﺸﯽ ﮔﺮﻓﺘﻪ ﺍﺳﺖ
ﻋﻮﺍﻣﻞ ﺳﻪ ﮔﺎﻧﻪ ﻓﻮﻕ ،ﺩﻻﻳﻞ ﻋﻤﺪﻩ ﺑﺴﻤﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺳﺖ.
ﮔﻴﺮﺍﺋﯽ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ
ﺩﻻﻳﻞ ﺯﻳﺮ ﻋﻠﻞ ﮔﻴﺮﺍﺋﯽ ﻭ ﺟﺎﺫﺑﻪ ﻓﺮﺍﻭﺍﻥ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺳﺖ:
ﮐﺎﻫﺶ ﻫﺰﻳﻨﻪ ﻫﺎ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺳﺎﻳﺖ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﺨﻮﺑﯽ ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﮔﺮﺩﺩ •
،ﻫﺰﻳﻨﻪ ﻫﺎﯼ ﻣﺮﺑﻮﻁ ﺑﻪ ﺛﺒﺖ ﺳﻔﺎﺭﺵ ﻗﺒﻞ ﺍﺯ ﺍﺭﺍﺋﻪ ﮐﺎﻻ ﻭ ﻫﺰﻳﻨﻪ ﻫﺎﯼ ﺧﺪﻣﺎﺕ ﭘﺲ
ﺍﺯ ﻓﺮﻭﺵ ﺑﻌﺪ ﺍﺯ ﺍﺭﺍﺋﻪ ﮐﺎﻻ ﮐﺎﻫﺶ ﻣﯽ ﻳﺎﺑﺪ.
ﺧﺮﻳﺪ ﺑﻴﺸﺘﺮ ﺩﺭ ﻫﺮ ﺗﺮﺍﮐﻨﺶ .ﺳﺎﻳﺖ ﺁﻣﺎﺯﻭﻥ ﻭﻳﮋﮔﯽ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﯽ ﺩﻫﺪ ﮐﻪ ﺩﺭ •
ﺗﺠﺎﺭﺕ ﺩﺭﮔﻴﺮ ﺷﺪﻩ ﺑﺎﺷﺪ ،ﺍﻣﮑﺎﻥ ﺍﺧﺬ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮﯼ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻭﺿﻌﻴﺖ ﮐﺎﻻﯼ
ﺧﺮﻳﺪﺍﺭﯼ ﺷﺪﻩ ﺑﺮﺍﯼ ﻣﺸﺘﺮﻳﺎﻥ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﻣﺜﻼ" ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺷﺮﮐﺖ
88
Dellﻭﺿﻌﻴﺖ ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺭﺍ ﺍﺯ ﻣﺮﺣﻠﻪ ﺗﻮﻟﻴﺪ ﺗﺎ ﻋﺮﺿﻪ ،ﺛﺒﺖ ﻧﻤﺎﻳﺪ ،ﻣﺸﺘﺮﻳﺎﻥ ﺩﺭ
ﻫﺮ ﻟﺤﻈﻪ ﻗﺎﺩﺭ ﺑﻪ ﻣﺸﺎﻫﺪﻩ ﺁﺧﺮﻳﻦ ﻭﺿﻌﻴﺖ ﺳﻔﺎﺭﺵ ﺧﻮﺩ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ.
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﻓﺮﺍﺩ ﻗﺎﺩﺭ ﺑﻪ ﺍﻧﺘﺨﺎﺏ ﮐﺎﻻﯼ ﺧﻮﺩ ﺑﺎ ﺭﻭﺵ ﻫﺎﯼ •
ﻣﺘﻔﺎﻭﺗﯽ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﻭﺏ ﺳﺎﻳﺖ ﻫﺎﯼ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺍﻣﮑﺎﻧﺎﺕ ﺯﻳﺮ ﺭﺍ ﺍﺭﺍﺋﻪ
ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ:
-ﺍﻣﮑﺎﻥ ﺛﺒﺖ ﻳﮏ ﺳﻔﺎﺭﺵ ﻃﯽ ﭼﻨﺪ ﺭﻭﺯ
-ﺍﻣﮑﺎﻥ ﭘﻴﮑﺮﺑﻨﺪﯼ ﻣﺤﺼﻮﻝ ﻭ ﻣﺸﺎﻫﺪﻩ ﻗﻴﻤﺖ ﻫﺎﯼ ﻭﺍﻗﻌﯽ
-ﺍﻣﮑﺎﻥ ﺍﻳﺠﺎﺩ ﺁﺳﺎﻥ ﺳﻔﺎﺭﺵ ﻫﺎﯼ ﺍﺧﺘﺼﺎﺻﯽ ﭘﻴﭽﻴﺪﻩ
-ﺍﻣﮑﺎﻥ ﻣﻘﺎﻳﺴﻪ ﻗﻴﻤﺖ ﮐﺎﻻ ﺑﻴﻦ ﭼﻨﺪﻳﻦ ﻓﺮﻭﺷﻨﺪﻩ
-ﺍﻣﮑﺎﻥ ﺟﺴﺘﺠﻮﯼ ﺁﺳﺎﻥ ﺑﺮﺍﯼ ﮐﺎﺗﻮﻟﻮﮒ ﻫﺎﯼ ﻣﻮﺭﺩ ﻧﻴﺎﺯ
ﮐﺎﺗﻮﻟﻮﮒ ﻫﺎﯼ ﺑﺰﺭﮔﺘﺮ .ﻳﮏ ﺷﺮﮐﺖ ﻗﺎﺩﺭ ﺑﻪ ﺍﻳﺠﺎﺩ ﻳﮏ ﮐﺎﺗﻮﻟﻮﮒ ﺑﺮ ﺭﻭﯼ ﻭﺏ ﺑﻮﺩﻩ •
ﮐﻪ ﻫﺮﮔﺰ ﺍﻣﮑﺎﻥ ﺍﺭﺳﺎﻝ ﺁﻥ ﺍﺯ ﻃﺮﻳﻖ ﭘﺴﺖ ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﻣﺜﻼ" ﺁﻣﺎﺯﻭﻥ ﺑﻴﺶ
ﺍﺯ ﺳﻪ ﻣﻴﻠﻴﻮﻥ ﮐﺘﺎﺏ ﺭﺍ ﺑﻔﺮﻭﺵ ﻣﯽ ﺭﺳﺎﻧﺪ ،ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﮐﺘﺐ ﻓﻮﻕ ﺍﺯ ﻃﺮﻳﻖ
ﺳﺎﻳﺖ ﺁﻣﺎﺯﻭﻥ ﺍﺭﺍﺋﻪ ﻭﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻣﺮﺍﺟﻌﻪ ﮐﻨﻨﺪﮔﺎﻥ ﻗﺮﺍﺭ ﻣﯽ ﮔﻴﺮﺩ ،ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ
ﻓﻮﻕ ﺍﺯ ﻃﺮﻳﻖ ﭘﺴﺖ ،ﺑﺴﻴﺎﺭ ﻣﺸﮑﻞ ﻭ ﻳﺎ ﻏﻴﺮﻣﻤﮑﻦ ﺑﻨﻈﺮ ﻣﯽ ﺁﻳﺪ.
ﺑﻬﺒﻮﺩ ﺍﺭﺗﺒﺎﻁ ﻣﺘﻘﺎﺑﻞ ﺑﺎ ﻣﺸﺘﺮﻳﺎﻥ .ﺑﺎ ﻃﺮﺍﺣﯽ ﻣﻨﺎﺳﺐ ﺳﺎﻳﺖ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺑﺰﺍﺭ ﻫﺎﯼ •
ﻣﺮﺑﻮﻃﻪ ،ﺍﻣﮑﺎﻥ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﻣﺘﻘﺎﺑﻞ ﺑﺎ ﻣﺸﺘﺮﻳﺎﻥ ﺑﺎ ﺭﻭﺵ ﻫﺎﯼ ﻣﻄﻤﺌﻦ ﺗﺮ ﻭ ﺑﺪﻭﻥ
ﺻﺮﻑ ﻫﺰﻳﻨﻪ ،ﻓﺮﺍﻫﻢ ﻣﯽ ﮔﺮﺩﺩ .ﻣﺜﻼ" ﻣﺸﺘﺮﯼ ﭘﺲ ﺍﺯ ﺛﺒﺖ ﺳﻔﺎﺭﺵ ﺑﺎ ﺩﺭﻳﺎﻓﺖ ﻳﮏ
ﻧﺎﻣﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺯ ﺛﺒﺖ ﺳﻔﺎﺭﺵ ﺧﻮﺩ ﻣﻄﻤﺌﻦ ﺷﺪﻩ ﻭ ﻳﺎ ﺩﺭ ﺻﻮﺭﺕ ﺍﺭﺳﺎﻝ ﮐﺎﻻ
ﺑﺮﺍﯼ ﻣﺸﺘﺮﯼ ،ﻣﯽ ﺗﻮﺍﻥ ﺍﺯ ﻃﺮﻳﻖ ﻧﺎﻣﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻭﯼ ﺭﺍ ﻣﻄﻠﻊ ﻧﻤﻮﺩ .ﻫﻤﻮﺍﺭﻩ ﻳﮏ
ﻣﺸﺘﺮﯼ ﺭﺍﺿﯽ ﻭ ﺧﻮﺷﺤﺎﻝ ﺗﻤﺎﻳﻞ ﺑﻪ ﺧﺮﻳﺪ ﻣﺠﺪﺩ ﺍﺯ ﺷﺮﮐﺖ ﻭ ﻳﺎ ﻣﻮﺳﺴﻪ ﺍﺭﺍﺋﻪ
ﺩﻫﻨﺪﻩ ﮐﺎﻻ ﺭﺍ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ.
ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺫﮐﺮ ﻳﮏ ﻧﮑﺘﻪ ﺩﻳﮕﺮ ﺿﺮﻭﺭﯼ ﺑﻨﻈﺮ ﻣﯽ ﺭﺳﺪ .ﺗﺠﺎﺭﺕ
ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﻪ ﺍﻓﺮﺍﺩ ﻭ ﻳﺎ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﻣﻮﺳﺴﺎﺕ ﺍﻣﮑﺎﻥ ﺍﻳﺠﺎﺩ ﻣﺪﻝ ﻫﺎﯼ ﮐﺎﻣﻼ" ﺟﺪﻳﺪ ﺗﺠﺎﺭﯼ
89
ﺭﺍ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺩﺭ ﺷﺮﮐﺖ ﻫﺎﯼ ﺗﺠﺎﺭﯼ ﻣﺒﺘﻨﯽ ﺑﺮ ﺛﺒﺖ ﺳﻔﺎﺭﺵ ﭘﺴﺘﯽ ،ﻫﺰﻳﻨﻪ ﻫﺎﯼ ﺯﻳﺎﺩﯼ
ﺻﺮﻑ ﭼﺎﭖ ﻭ ﺍﺭﺳﺎﻝ ﮐﺎﺗﻮﻟﻮﮒ ﻫﺎ ،ﭘﺎﺳﺨﮕﻮﺋﯽ ﺑﻪ ﺗﻠﻔﻦ ﻫﺎ ﻭ ﺭﺩﻳﺎﺑﯽ ﺳﻔﺎﺭﺷﺎﺕ،
ﻣﻴﮕﺮﺩﺩ .ﺩﺭ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﻫﺰﻳﻨﻪ ﺗﻮﺯﻳﻊ ﮐﺎﺗﻮﻟﻮﮒ ﻭ ﺭﺩﻳﺎﺑﯽ ﺳﻔﺎﺭﺷﺎﺕ ﺑﺴﻤﺖ ﺻﻔﺮ
ﻣﻴﻞ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺍﻣﮑﺎﻥ ﻋﺮﺿﻪ ﮐﺎﻻ ﺑﺎ ﻗﻴﻤﺖ ﺍﺭﺯﺍﻧﺘﺮ ﻓﺮﺍﻡ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺗﻤﺎﻳﻞ ﺍﻓﺮﺍﺩ ﺑﻪ ﺧﺮﻳﺪ ﮐﺎﻻ ﺍﺯ ﺳﺎﻳﺖ .ﻣﺮﺍﺟﻌﻪ ﺑﻪ ﺳﺎﻳﺖ ﻳﮏ ﻣﻮﺿﻮﻉ ﻭ ﺧﺮﻳﺪ ﺍﺯ ﺳﺎﻳﺖ •
ﺍﻣﺮﻭﺯﻩ ﺑﺮ ﺭﻭﯼ ﺍﻳﻨﺘﺮﻧﺖ ﺳﺎﻳﺖ ﻫﺎﯼ ﺑﻴﺸﻤﺎﺭﯼ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﻭ ﺍﻳﺠﺎﺩ ﻳﮏ ﺳﺎﻳﺖ ﺟﺪﻳﺪ
ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﮐﺎﺭ ﻣﺸﮑﻠﯽ ﻧﻴﺴﺖ ﻭﻟﯽ ﺟﺬﺏ ﻣﺨﺎﻃﺒﻴﻦ ﺟﻬﺖ ﻣﺮﺍﺟﻌﻪ ﺑﻪ ﺳﺎﻳﺖ ﻭ
ﺧﺮﻳﺪ ﺍﺯ ﺁﻥ ،ﻣﻬﻤﺘﺮﻳﻦ ﻣﺴﺌﻠﻪ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺍﺳﺖ.
ﻣﻮﺍﺭﺩﻳﮑﻪ ﺍﺯ ﺁﻧﻬﺎ ﺑﻌﻨﻮﺍﻥ ﻋﻤﻠﻴﺎﺕ ﺳﺎﺩﻩ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻳﺎﺩ ﻣﯽ ﺷﻮﺩ،
ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ :
ﺍﻳﺠﺎﺩ ﻳﮏ ﻭﺏ ﺳﺎﻳﺖ •
90
ﺍﻳﺠﺎﺩ ﻳﮏ ﺳﺎﻳﺖ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ
ﺩﺭ ﺯﻣﺎﻥ ﺍﻳﺠﺎﺩ ﻳﮏ ﺳﺎﻳﺖ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﻣﯽ ﺑﺎﻳﺴﺖ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﻗﺮﺍﺭ
ﮔﻴﺮﺩ:
ﺗﺎﻣﻴﻦ ﮐﻨﻨﺪﮔﺎﻥ .ﺑﺪﻭﻥ ﻭﺟﻮﺩ ﺗﺎﻣﻴﻦ ﮐﻨﻨﺪﮔﺎﻥ ﺧﻮﺏ ﺍﻣﮑﺎﻥ ﻋﺮﺿﻪ ﮐﺎﻻ ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ •
ﺩﺍﺷﺖ.
ﻗﻴﻤﺖ .ﻳﮑﯽ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﺑﺨﺶ ﻫﺎﯼ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﻋﺮﺿﻪ ﮐﺎﻻ ﺑﺎ ﻗﻴﻤﺖ •
ﻣﻨﺎﺳﺐ ﺍﺳﺖ .ﺍﻣﮑﺎﻥ ﻣﻘﺎﻳﺴﻪ ﻗﻴﻤﺖ ﻳﮏ ﮐﺎﻻ ﺑﺴﺎﺩﮔﯽ ﺑﺮﺍﯼ ﻣﺸﺘﺮﻳﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﻭ
ﻫﻤﻮﺍﺭﻩ ﻗﻴﻤﺖ ﻳﮏ ﮐﺎﻻ ﺑﺎ ﻣﻮﺍﺭﺩ ﻣﺸﺎﺑﻪ ﮐﻪ ﺍﺯ ﻃﺮﻳﻖ ﺳﺎﻳﺮ ﻓﺮﻭﺷﻨﺪﮔﺎﻥ ﺍﺭﺍﺋﻪ ﻣﯽ ﮔﺮﺩﺩ
،ﻣﻘﺎﻳﺴﻪ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺍﺭﺗﺒﺎﻃﺎﺕ ﺑﺎ ﻣﺸﺘﺮﯼ .ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻣﺠﻤﻮﻋﻪ ﺍﯼ ﻣﺘﻨﻮﻉ ﺍﺯ ﺭﻭﺵ ﻫﺎﯼ ﻣﻮﺟﻮﺩ •
ﺟﻬﺖ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻣﺸﺘﺮﯼ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﯽ ﻧﻤﺎﻳﺪ .ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﭘﺎﻳﮕﺎﻩ ﻫﺎﯼ
ﺩﺍﻧﺶ ،ﺗﺎﻻﺭﻫﺎﯼ ﻣﺒﺎﺣﺜﻪ ،ﺍﺗﺎﻕ ﻫﺎﯼ ﮔﻔﺘﮕﻮ ﻭ ...ﻧﻤﻮﻧﻪ ﻫﺎﺋﯽ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ
ﻣﯽ ﺑﺎﺷﻨﺪ .ﻣﺸﺘﺮﯼ ﻫﻤﻮﺍﺭﻩ ﻣﯽ ﺑﺎﻳﺴﺖ ﺍﺣﺴﺎﺱ ﻧﻤﺎﻳﺪ ﮐﻪ ﺩﺭ ﺻﻮﺭﺕ ﺑﺮﻭﺯ ﻣﺸﮑﻞ ﻭ
ﻳﺎ ﺩﺭﺧﻮﺍﺳﺖ ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ،ﺑﺪﻭﻥ ﭘﺎﺳﺦ ﻧﺨﻮﺍﻫﻨﺪ ﻣﺎﻧﺪ.
ﺗﻮﺯﻳﻊ ﮐﺎﻻ ،ﺧﺪﻣﺎﺕ ﭘﺲ ﺍﺯ ﻓﺮﻭﺵ ﻭ ﺍﻣﮑﺎﻥ ﺑﺮﮔﺸﺖ ﺍﺯ ﻓﺮﻭﺵ ﺍﺯ ﺟﻤﻠﻪ ﻣﻮﺍﺭﺩﯼ •
91
ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻣﺮﺑﻮﻁ ﺑﻪ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻣﯽ ﺑﺎﻳﺴﺖ ﺍﻣﮑﺎﻧﺎﺕ ﻓﻮﻕ ﺭﺍ ﻓﺮﺍﻫﻢ ﻧﻤﺎﻳﺪ،
ﺩﺭﻏﻴﺮﺍﻳﻨﺼﻮﺭﺕ ﺍﻧﺠﺎﻡ ﻫﺮ ﻳﮏ ﺍﺯ ﻣﻮﺍﺭﺩ ﻓﻮﻕ ﺑﺎ ﻣﺸﮑﻞ ﻣﻮﺍﺟﻪ ﻣﯽ ﮔﺮﺩﺩ.
92
ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﻳﮏ ﺳﺎﻳﺖ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮏ
ﺳﻪ ﺭﻭﺵ ﻋﻤﺪﻩ ﺑﺮﺍﯼ ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﻳﮏ ﺳﺎﻳﺖ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮏ ﻭﺟﻮﺩ ﺩﺍﺭﺩ:
. Enterprise Computingﺩﺭ ﺭﻭﺵ ﻓﻮﻕ ﺷﺮﮐﺖ ﻭ ﻳﺎ ﻣﻮﺳﺴﻪ ﻣﺮﺑﻮﻁ •
ﺍﻗﺪﺍﻡ ﺑﻪ ﺗﻬﻴﻪ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ،ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻭ ﮐﺎﺭﺷﻨﺎﺳﺎﻥ ﻭﺭﺯﻳﺪﻩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﻭﺏ
ﺳﺎﻳﺖ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺧﻮﺩ ﻣﯽ ﻧﻤﺎﻳﺪ .ﺁﻣﺎﺯﻭﻥ ﻭ ﺳﺎﻳﺮ ﺷﺮﮐﺖ ﻫﺎﯼ ﺑﺰﺭﮒ ﺍﺯ
ﺭﻭﺵ ﻓﻮﻕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﺍﻧﺘﺨﺎﺏ ﺭﻭﺵ ﻓﻮﻕ ﻣﺸﺮﻭﻁ ﺑﻪ ﻭﺟﻮﺩ ﻋﻮﺍﻣﻞ ﺯﻳﺮ
ﺍﺳﺖ
-ﺷﺮﮐﺖ ﻣﺮﺑﻮﻃﻪ ﺩﺍﺭﺍﯼ ﺗﺮﺍﻓﻴﮏ ﺑﺴﻴﺎﺭ ﺑﺎﻻﺋﯽ ﺍﺳﺖ ) ﭼﻨﺪﻳﻦ ﻣﻴﻠﻴﻮﻥ ﺩﺭ ﻫﺮ ﻣﺎﻩ (
-ﺷﺮﮐﺖ ﻣﺮﺑﻮﻃﻪ ﺩﺍﺭﺍﯼ ﻳﮏ ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﯽ ﺑﺰﺭﮒ ﺑﻮﺩﻩ ﮐﻪ ﺷﺎﻣﻞ ﮐﺎﺗﻮﻟﻮﮒ ﻫﺎﯼ
ﻣﺮﺑﻮﻁ ﺑﻪ ﻣﺤﺼﻮﻻﺕ ﺍﺳﺖ ) ﻣﺨﺼﻮﺻﺎ" ﺍﮔﺮ ﮐﺎﺗﻮﻟﻮﮒ ﻫﺎ ﺑﺴﺮﻋﺖ ﺗﻐﻴﻴﺮﻣﯽ ﻳﺎﺑﻨﺪ(.
-ﺷﺮﮐﺖ ﻣﺮﺑﻮﻃﻪ ﺩﺍﺭﺍﯼ ﻳﮏ ﭼﺮﺧﻪ ﻓﺮﻭﺵ ﭘﻴﭽﻴﺪﻩ ﺑﻮﺩﻩ ﮐﻪ ﻣﺴﺘﻠﺰﻡ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺮﻡ
ﻫﺎﯼ ﺍﺧﺘﺼﺎﺻﯽ ،ﺟﺪﺍﻭﻝ ﻣﺘﻔﺎﻭﺕ ﻗﻴﻤﺖ ﻭ ...ﺍﺳﺖ .
-ﺷﺮﮐﺖ ﻣﺮﺑﻮﻃﻪ ﺩﺍﺭﺍﯼ ﺳﺎﻳﺮ ﭘﺮﺩﺍﺯﺵ ﻫﺎﯼ ﺗﺠﺎﺭﯼ ﺑﻮﺩﻩ ﻭ ﻗﺼﺪ ﺍﺭﺗﺒﺎﻁ ﻭﭘﻴﻮﺳﺘﮕﯽ
ﺁﻧﻬﺎ ﺑﺎ ﺳﺎﻳﺖ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻭﺟﻮﺩ ﺩﺍﺭﺩ.
ﺳﺮﻭﻳﺲ ﻫﺎﯼ ﻣﻴﺰﺑﺎﻧﯽ ﻣﺠﺎﺯﯼ .ﻓﺮﻭﺷﻨﺪﻩ ﺗﺠﻬﻴﺰﺍﺕ ﻭ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﯼ ﻣﺮﺑﻮﻁ ﺭﺍ •
ﺑﻌﻨﻮﺍﻥ ﻳﮏ ﺑﺴﺘﻪ ﻧﺮﻡ ﺍﻓﺰﺍﺭﯼ ﺍﺧﺘﺼﺘﺎﺻﯽ ﻋﺮﺿﻪ ﻣﯽ ﻧﻤﺎﻳﺪ .ﺑﺨﺸﯽ ﺍﺯ ﺑﺴﺘﻪ ﻧﺮﻡ
ﺍﻓﺰﺍﺭﯼ ﺷﺎﻣﻞ ﺍﻣﻨﻴﺖ ﺍﺳﺖ .ﺩﺳﺘﻴﺎﺑﯽ ﺑﻪ ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﯽ ﻧﻴﺰ ﺑﺨﺶ ﺩﻳﮕﺮﯼ ﺍﺯ ﺑﺴﺘﻪ
ﻧﺮﻡ ﺍﻓﺰﺍﺭﯼ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺘﺎﻧﺴﻴﻞ ﻫﺎﯼ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﺩﺍﻣﻪ ﺷﺮﮐﺖ ﻣﺮﺑﻮﻃﻪ
ﻣﯽ ﺗﻮﺍﻧﺪ ﺑﺎ ﺑﺨﺪﻣﺖ ﮔﺮﻓﺘﻦ ﻃﺮﺍﺣﺎﻥ ﻭﺏ ﻭ ﭘﻴﺎﺩﻩ ﮐﻨﻨﺪﮔﺎﻥ ﻣﺮﺑﻮﻃﻪ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﻳﺠﺎﺩ ﻭ
ﻧﮕﻬﺪﺍﺭﯼ ﺳﺎﻳﺖ ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺧﻮﺩ ﻧﻤﺎﻳﺪ.
ﺗﺠﺎﺭﺕ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺳﺎﺩﻩ .ﺍﮐﺜﺮ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﺷﺮﮐﺖ ﻫﺎ ﺍﺯ ﺭﻭﺵ ﻓﻮﻕ ﺑﺮﺍﯼ ﭘﻴﺎﺩﻩ •
93
ﻳﺎﺩﮔﻴﺮﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ
ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﻋﺮﺻﻪ ﻫﺎﯼ ﺁﻣﻮﺯﺷﯽ ﻧﻴﺰ ﭼﺎﻟﺶ ﻫﺎﯼ ﺟﺪﻳﺪﯼ ﺭﺍ ﺍﻳﺠﺎﺩ ﮐﺮﺩﻩ ﺍﺳﺖ.
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺯﻳﺮﺳﺎﺧﺖ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺮﺍﯼ ﺁﻣﻮﺯﺵ ،ﺩﺭ ﺳﺎﻟﻴﺎﻥ ﺍﺧﻴﺮ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﮐﺎﺭﺷﻨﺎﺳﺎﻥ ﻭ
ﻣﺮﺍﮐﺰ ﻋﻠﻤﯽ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺍﺳﺖ .ﺁﻣﻮﺯﺵ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﺁﻣﻮﺯﺵ ﻣﺒﺘﻨﯽ ﺑﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ )،(CBT
ﺁﻣﻮﺯﺵ ﻣﺒﺘﻨﯽ ﺑﺮ ﺍﻳﻨﺘﺮﻧﺖ ) (IBTﻭ ﺁﻣﻮﺯﺵ ﻣﺒﺘﻨﯽ ﺑﺮ ﻭﺏ ) (WBTﻧﻤﻮﻧﻪ ﺍﺳﺎﻣﯽ ﺍﻧﺘﺨﺎﺏ
ﺷﺪﻩ ﺑﺮﺍﯼ ﺭﻭﺵ ﻫﺎﯼ ﺟﺪﻳﺪ ﺁﻣﻮﺯﺷﯽ ﻣﯽ ﺑﺎﺷﻨﺪ .ﺁﻣﻮﺯﺵ ) ﻳﺎﺩ ﺩﺍﺩﻥ ﻭ ﻳﺎﺩ ﮔﻴﺮﯼ ( ،ﻃﯽ
ﺳﺎﻟﻴﺎﻥ ﺁﻳﻨﺪﻩ ﺑﺎ ﺍﻧﻘﻼﺑﯽ ﺑﺰﺭﮒ ﺭﻭﺑﺮﻭ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺍﻣﮑﺎﻧﺎﺕ ﺳﺨﺖ ﺍﻓﺰﺍﺭﯼ ﻭ ﻧﺮﻡ ﺍﻓﺮﺍﺭﯼ
ﻣﻮﺟﻮﺩ ،ﺑﺸﺮﻳﺖ ﺭﺍ ﺑﻪ ﺳﻤﺖ ﻳﮏ ﺍﻧﻘﻼﺏ ﺑﺰﺭﮒ ﺁﻣﻮﺯﺷﯽ ﺳﻮﻕ ﻣﯽ ﺩﻫﺪ.
ﺁﻣﻮﺯﺵ ﻫﺎﯼ Onlineﺍﺯ ﺳﺎﻝ ١٩٩٠ﻣﻄﺮﺡ ﻭ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺭﺷﺪ ﺗﺠﻬﻴﺰﺍﺕ ﻭ ﺍﻣﮑﺎﻧﺎﺕ
ﻣﺮﺑﻮﻃﻪ ﺩﺭ ﺩﻫﻪ ﮔﺬﺷﺘﻪ ،ﮔﺎﻡ ﻫﺎﯼ ﻣﻮﺛﺮﯼ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺑﺮﺩﺍﺷﺘﻪ ﺷﺪﻩ ﻭ ﺍﻳﻨﮏ ﺩﺭ ﻧﻘﻄﻪ
ﻋﻄﻔﯽ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺍﺳﺖ .ﺁﺷﻨﺎﺋﯽ ﺑﺎ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﺁﻣﻮﺯﺷﯽ ﺟﺪﻳﺪ ﺑﺮﺍﯼ ﺗﻤﺎﻣﯽ ﺩﺳﺖ
ﺍﻧﺪﺭﮐﺎﺭﺍﻥ ﺍﻣﺮ ﺁﻣﻮﺯﺵ ،ﺣﺎﺋﺰ ﺍﻫﻤﻴﺖ ﺍﺳﺖ .ﺍﮔﺮ ﺩﺍﻧﺎﺋﯽ ﺭﺍ ﻋﻴﻦ ﺗﻮﺍﻧﺎﺋﯽ ﺑﺪﺍﻧﻴﻢ ،ﺟﻮﺍﻣﻌﯽ ﺍﺯ
ﺑﺸﺮﻳﺖ ﺑﻪ ﺗﻮﺍﻧﺎﺋﯽ ﻭ ﺧﻮﺩ ﺑﺎﻭﺭﯼ ﺧﻮﺍﻫﻨﺪ ﺭﺳﻴﺪ ﮐﻪ ﺯﻳﺮ ﺳﺎﺧﺖ ﻣﻨﺎﺳﺒﯽ ﺭﺍ ﺑﺮﺍﯼ ﺳﻴﺴﺘﻢ
ﻫﺎﯼ ﺁﻣﻮﺯﺷﯽ ﺧﻮﺩ ﺍﻧﺘﺨﺎﺏ ﻭ ﺑﺮ ﻫﻤﻴﻦ ﺍﺳﺎﺱ ﺣﺮﮐﺎﺕ ﻫﺪﻓﻤﻨﺪ ﻭ ﺳﻴﺴﺘﻤﺎﺗﻴﮏ ﺁﻣﻮﺯﺷﯽ ﺭﺍ
ﺑﺎ ﺗﺎﮐﻴﺪ ﺑﺮ ﻋﻨﺎﺻﺮ ﻣﺘﻔﺎﻭﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺳﻴﺴﺘﻢ ﺁﻣﻮﺯﺷﯽ ،ﺁﻏﺎﺯ ﻧﻤﺎﻳﻨﺪ .ﺁﻣﻮﺯﺵ
ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻓﺮﺻﺖ ﻣﻨﺎﺳﺒﯽ ﺭﺍ ﺑﺮﺍﯼ ﺗﻤﺎﻣﯽ ﺩﺳﺖ ﺍﻧﺪﺭﮐﺎﺭﺍﻥ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﺁﻣﻮﺯﺷﯽ ﻓﺮﺍﻫﻢ
ﻧﻤﻮﺩﻩ ﺍﺳﺖ ﺗﺎ ﺑﺘﻮﺍﻧﻨﺪ ﺑﺎ ﺑﻬﺮﻩ ﮔﻴﺮﯼ ﺍﺯ ﺁﺧﺮﻳﻦ ﻓﻦ ﺁﻭﺭﯼ ﻫﺎﯼ ﻣﻮﺟﻮﺩ ،ﻣﻬﻤﺘﺮﻳﻦ ﺭﺳﺎﻟﺖ
ﺧﻮﺩ ﺭﺍ ﮐﻪ ﻫﻤﺎﻥ ﺁﻣﻮﺯﺵ ﺍﺳﺖ ﺑﺎ ﺳﺮﻋﺖ ﻭﮐﻴﻔﻴﺘﯽ ﻣﻄﻠﻮﺏ ﺩﺭﺍﺧﺘﻴﺎﺭ ﻣﺘﻘﺎﺿﻴﺎﻥ ﻗﺮﺍﺭ ﺩﻫﻨﺪ.
94
ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﺮﺍﯼ ﻋﻼﻗﻪ ﻣﻨﺪﺍﻥ ﻓﺮﺍﻫﻢ ﻣﯽ ﮔﺮﺩﺩ .ﻋﻤﻠﮑﺮﺩ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺭ ﺁﻣﻮﺯﺵ ﻫﺎﯼ
ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻧﻈﻴﺮ ﻋﻤﻠﮑﺮﺩ ﻣﻮﺑﺎﻳﻞ ﺩﺭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﺳﺖ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻭ ﭘﻴﮑﺮﺑﻨﺪﯼ ﻣﻨﺎﺳﺐ
ﻣﻮﺑﺎﻳﻞ ﺍﻣﮑﺎﻥ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﻣﺴﺘﻘﻞ ﺍﺯ ﺯﻣﺎﻥ ﻭ ﻣﮑﺎﻥ ﺧﺎﺹ ﺑﺮﺍﯼ ﺍﻓﺮﺍﺩ ﺑﻮﺟﻮﺩ ﻣﯽ ﺁﻳﺪ.
ﺁﻣﻮﺯﺵ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻣﯽ ﺗﻮﺍﻧﺪ ﻣﺒﺘﻨﯽ ﺑﺮ ، CD-ROMﺷﺒﮑﻪ ،ﺍﻳﻨﺘﺮﺍﻧﺖ ﻭ ﻳﺎ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺎﺷﺪ.
ﺁﻣﻮﺯﺵ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﺮﺍﯼ ﺍﺭﺍﺋﻪ ﻣﺤﺘﻮﯼ ﺍﺯ ﻋﻨﺎﺻﺮ ﺍﻃﻼﻋﺎﺗﯽ ﺑﺎ ﻓﺮﻣﺖ ﻫﺎﯼ ﻣﺘﻔﺎﻭﺕ ﻧﻈﻴﺮ:
ﻣﺘﻦ ،ﻭﻳﺪﺋﻮ ،ﺻﺪﺍ ،ﺍﻧﻴﻤﻴﺸﻦ ،ﮔﺮﺍﻓﻴﮏ ﻭ ﻣﺤﻴﻂ ﻫﺎﯼ ﻣﺠﺎﺯﯼ ﻭ ﻳﺎ ﺷﺒﻴﻪ ﺳﺎﺯﯼ ﺷﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﯽ ﻧﻤﺎﻳﺪ .ﺗﺠﺎﺭﺏ ﺑﺪﺳﺖ ﺁﻣﺪﻩ ﺍﺯ ﺁﻣﻮﺯﺵ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﻤﺮﺍﺗﺐ ﮔﺴﺘﺮﺩﻩ ﺗﺮ ﺍﺯ ﺗﺠﺎﺭﺏ
ﺁﻣﻮﺯﺷﯽ ﺑﺪﺳﺖ ﺁﻣﺪﻩ ﺩﺭ ﻳﮏ ﮐﻼﺱ ﺩﺭﺱ ﺳﻨﺘﯽ ﺍﺳﺖ .ﺁﻫﻨﮓ ﻓﺮﺍﮔﻴﺮﯼ ﺩﺭ ﺳﻴﺴﺘﻢ ﻫﺎﯼ
ﺁﻣﻮﺯﺷﯽ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺯ ﻳﮏ ﺭﻭﻧﺪ ﻣﺸﺨﺺ ﻭ ﺳﻴﺴﺘﻤﺎﺗﻴﮏ ﺗﺒﻌﻴﺖ ﮐﺮﺩﻩ ﻭ ﻣﺨﺎﻃﺒﺎﻥ ﺧﻮﺩ
ﺭﺍ ﺑﺎ ﻫﺮ ﻧﻮﻉ ﺳﻠﻴﻘﻪ ﻭ ﮔﺮﺍﻳﺶ ﺑﺴﺮﻋﺖ ﺟﺬﺏ ﻣﯽ ﻧﻤﺎﻳﺪ.
ﺁﻣﻮﺯﺵ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺭﻣﺰ ﻣﻮﻓﻘﻴﺖ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺷﻴﻮﻩ ﺍﺭﺍﺋﻪ ،ﻧﻮﻉ ﻣﺤﺘﻮﻳﺎﺕ ﻭ ﺗﻮﺯﻳﻊ
) ﻋﺮﺿﻪ ( ﻣﻨﺎﺳﺐ ﻣﯽ ﺩﺍﻧﻨﺪ .ﺩﺭ ﺁﻣﻮﺯﺵ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺯ ﺍﻏﻠﺐ ﻣﺴﺎﺋﻞ ﻣﻮﺟﻮﺩ ﺩﺭ
ﺁﻣﻮﺯﺵ ﻫﺎﯼ ﺳﻨﺘﯽ ﻧﻈﻴﺮ :ﺳﺨﻨﺮﺍﻧﯽ ﻫﺎﯼ ﻳﮑﻄﺮﻓﻪ ،ﺗﻌﺎﻣﻞ ﻭ ﺍﺭﺗﺒﺎﻁ ﺿﻌﻴﻒ ﺑﺎ ﻓﺮﺍﮔﻴﺮﺍﻥ،
ﺍﺟﺘﻨﺎﺏ ﻣﯽ ﮔﺮﺩﺩ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﯼ ﻣﺮﺑﻮﻁ ﺑﻪ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﺁﻣﻮﺯﺵ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ
ﻣﯽ ﺗﻮﺍﻥ ﺑﺴﺮﻋﺖ ﻣﺤﻴﻂ ﻫﺎﯼ ﺁﻣﻮﺯﺷﯽ ﻣﻮﺛﺮ ﻭ ﮐﺎﺭﺁ ﺭﺍ ﺑﺎ ﺑﻬﺮﻩ ﮔﻴﺮﯼ ﺍﺯ ﻋﻨﺎﺻﺮ ﻣﺘﻔﺎﻭﺕ
ﺁﻣﻮﺯﺷﯽ ﺍﻳﺠﺎﺩ ﮐﺮﺩ.
ﺳﻄﻮﺡ ﺁﻣﻮﺯﺵ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ
ﺁﻣﻮﺯﺵ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺩﺭ ﭼﻬﺎﺭ ﮔﺮﻭﻩ ﻋﻤﺪﻩ ﻃﺒﻘﻪ ﺑﻨﺪﯼ ﻣﯽ ﮔﺮﺩﺩ .ﮔﺮﻭﻩ ﻫﺎﯼ ﻓﻮﻕ ﺳﻄﻮﺡ
ﻣﺘﻔﺎﻭﺕ ﺁﻣﻮﺯﺷﯽ ﺍﺯ ﺍﺑﺘﺪﺍﺋﯽ ﺗﺎ ﺳﻄﻮﺡ ﭘﻴﺸﺮﻓﺘﻪ ﺭﺍ ﺗﻀﻤﻴﻦ ﻣﯽ ﻧﻤﺎﻳﻨﺪ:
ﭘﺎﻳﮕﺎﻩ ﻫﺎﯼ ﺩﺍﻧﺶ .ﭘﺎﻳﮕﺎﻩ ﻫﺎﯼ ﺩﺍﻧﺶ ﻭ ﺍﻃﻼﻋﺎﺕ ﺧﻮﺩ ﺑﻌﻨﻮﺍﻥ ﻳﮏ ﺁﻣﻮﺯﺵ ﻭﺍﻗﻌﯽ •
ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﻧﻤﯽ ﺷﻮﻧﺪ .ﺑﺎﻧﮏ ﻫﺎﯼ ﺍﻃﻼﻋﺎﺗﯽ ﺷﮑﻞ ﺍﻭﻟﻴﻪ ﺍﯼ ﺍﺯ ﺁﻣﻮﺯﺵ
ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻣﯽ ﺑﺎﺷﻨﺪ .ﺑﺎﻧﮏ ﻫﺎﯼ ﺍﻃﻼﻋﺎﺗﯽ ﻓﻮﻕ ﺭﺍ ﻣﯽ ﺗﻮﺍﻥ ﺩﺭ ﺳﺎﻳﺖ ﻫﺎﯼ ﻧﺮﻡ
ﺍﻓﺰﺍﺭﯼ ﻣﺘﻌﺪﺩ ،ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺸﺎﻫﺪﻩ ﻧﻤﻮﺩ .ﺑﺎﻧﮏ ﻫﺎﯼ ﺍﻃﻼﻋﺎﺗﯽ ﺑﺎ ﻳﮏ ﺭﻭﺵ
ﺳﻴﺴﺘﻤﺎﺗﻴﮏ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺍﺋﻪ ﺗﻮﺿﻴﺤﺎﺕ ﻭ ﺭﺍﻫﻨﻤﺎﺋﯽ ﻫﺎﯼ ﺿﺮﻭﺭﯼ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ
95
ﺳﻮﺍﻻﺕ ﻣﻄﺮﺡ ﺷﺪﻩ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻣﯽ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ
ﻫﺎﯼ ﻻﺯﻡ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﺧﺎﺹ ﺗﻮﺳﻂ ﻳﮏ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺑﺼﻮﺭﺕ ﻣﺮﺣﻠﻪ ﺑﻪ
ﻣﺮﺣﻠﻪ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻣﺘﻘﺎﺿﻴﺎﻥ ﻗﺮﺍﺭ ﻣﯽ ﮔﻴﺮﺩ.ﺑﺎﻧﮏ ﻫﺎﯼ ﺍﻃﻼﻋﺎﺗﯽ ﻓﻮﻕ ،ﺍﻏﻠﺐ
ﺑﺼﻮﺭﺕ ﻣﺘﻌﺎﻣﻞ ﺑﺎ ﮐﺎﺭﺑﺮﺍﻥ ﺧﻮﺩ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﻣﺜﻼ" ﮐﺎﺭﺑﺮﺍﻥ ﻣﯽ ﺗﻮﺍﻧﻨﺪ
ﮐﻠﻤﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺑﺨﺶ ﻣﺮﺑﻮﻃﻪ ﺗﺎﻳﭗ ﺗﺎ ﺯﻣﻴﻨﻪ ﺟﺴﺘﺠﻮ ﺩﺭ ﺑﺎﻧﮏ
ﺍﻃﻼﻋﺎﺗﯽ ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﺍﻣﮑﺎﻥ ﺍﻧﺘﺨﺎﺏ ﻣﻮﺿﻮﻉ ﻣﻮﺭﺩ ﻋﻼﻗﻪ ﺑﺮ ﺍﺳﺎﺱ
ﻟﻴﺴﺖ ﻫﺎﯼ ﻣﺮﺗﺐ ﺷﺪﻩ ) ﻣﻮﺿﻮﻋﯽ ﻭ ﻳﺎ ﺍﻟﻔﺒﺎﺋﯽ ( ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺭﺩ.
ﺣﻤﺎﻳﺖ ﻓﻨﯽ . onlineﺣﻤﺎﻳﺖ onlineﻧﻴﺰ ﻧﻮﻉ ﺧﺎﺻﯽ ﺍﺯ ﺁﻣﻮﺯﺵ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ •
ﺑﻮﺩﻩ ﮐﻪ ﺩﺭ ﻣﻮﺍﺭﺩﯼ ﺷﺒﺎﻫﺖ ﻫﺎﺋﯽ ﺑﺎ ﭘﺎﻳﮕﺎﻩ ﻫﺎﯼ ﺩﺍﻧﺶ ،ﺩﺍﺭﺩ .ﺑﺮﺍﯼ ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ
ﺣﻤﺎﻳﺖ ﻫﺎﯼ ﻓﻨﯽ ، onlineﺍﺯ ﺭﻭﺵ ﻫﺎﯼ ﻣﺘﻌﺪﺩﯼ ﻧﻈﻴﺮ :ﺗﺎﻻﺭﻫﺎﯼ ﻣﺒﺎﺣﺜﻪ ،ﺍﺗﺎﻕ
ﻫﺎﯼ ﮔﻔﺘﮕﻮ ،ﺳﻴﺴﺘﻢ ﻫﺎﯼ ، BBSﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻭ ﻳﺎ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﻓﻮﺭﯼ ﻭ ﺯﻧﺪﻩ
،ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﺷﻮﺩ .ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﻓﻮﻕ ﺗﻌﺎﻣﻞ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮﯼ ﺭﺍ ﻧﺴﺒﺖ ﺑﻪ ﭘﺎﻳﮕﺎﻩ
ﻫﺎﯼ ﺩﺍﻧﺶ ﺑﺎ ﻣﺨﺎﻃﺐ ،ﺑﺮﻗﺮﺍﺭ ﻣﯽ ﻧﻤﺎﻳﻨﺪ.
ﺁﻣﻮﺯﺵ ﻧﺎﻣﺘﻘﺎﺭﻥ .ﺳﻴﺴﺘﻢ ﻓﻮﻕ ﺩﺭ ﺁﻣﻮﺯﺵ ﻫﺎﯼ ﺍﻭﻟﻴﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺳﺘﻔﺎﺩﻩ •
ﻣﯽ ﮔﺮﺩﻳﺪ .ﺩﺭ ﺭﻭﺵ ﻓﻮﻕ ﺍﻣﮑﺎﻥ ﺧﻮﺩ ﺁﻣﻮﺯﯼ ﺑﺎ ﻣﺤﻮﺭﻳﺖ ﻓﺮﺍﮔﻴﺮﺍﻥ ﻓﺮﺍﻫﻢ
ﻣﯽ ﮔﺮﺩﺩ .ﺑﺮﺍﯼ ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﻭ ﺍﺟﺮﺍﯼ ﺳﻴﺴﺘﻢ ﻓﻮﻕ ﺍﺯ ﺍﻣﮑﺎﻧﺎﺕ ﻭ ﺭﻭﺵ ﻫﺎﯼ
ﻣﺘﻌﺪﺩﯼ ﻧﻈﻴﺮ :ﺁﻣﻮﺯﺵ ﻫﺎﯼ ﻣﺒﺘﻨﯽ ﺑﺮ ، CD-ROMﺍﻳﻨﺘﺮﺍﻧﺖ ﻭ ﻳﺎ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﯽ ﮔﺮﺩﺩ .ﺩﺳﺘﻴﺎﺑﯽ ﺑﻪ ﻣﺠﻤﻮﻋﻪ ﺍﯼ ﺍﺯ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺠﺎﻡ ﻳﮏ ﻋﻤﻠﻴﺎﺕ
ﺧﺎﺹ ﺍﺯ ﻃﺮﻳﻖ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ، BBSﮔﺮﻭﻩ ﻫﺎ ﻭ ﺗﺎﻻﺭﻫﺎﯼ ﻣﺘﻔﺎﻭﺕ ﻣﺒﺎﺣﺜﻪ ﻭ ﭘﺴﺖ
ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻧﻤﻮﻧﻪ ﻫﺎﺋﯽ ﺍﺯ ﺍﻣﮑﺎﻧﺎﺕ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺗﻮﺳﻂ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﻓﻮﻕ ﻣﯽ ﺑﺎﺷﻨﺪ.
ﺩﺭ ﺑﺮﺧﯽ ﻣﻮﺍﺭﺩ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﻓﻮﻕ ،ﺑﺼﻮﺭﺕ ﮐﺎﻣﻼ" ﺧﻮﺩ ﺁﻣﻮﺯ ﺑﻮﺩﻩ ﻭ ﺍﺯ ﻟﻴﻨﮏ ﻫﺎﯼ
ﺧﺎﺻﯽ ﺑﺮﺍﯼ ﻣﺮﺍﺟﻌﻪ ﺑﻪ ﻣﻨﺎﺑﻊ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ .ﺩﺭﺍﻳﻦ ﻧﻮﻉ ﺳﻴﺴﺘﻢ ﻫﺎ ،ﺍﺯ
ﻣﺮﺑﻴﺎﻥ ﺁﻣﻮﺯﺷﯽ ﮐﻪ ﺑﺼﻮﺭﺕ ﺯﻧﺪﻩ ﻓﻌﺎﻟﻴﺖ ﻫﺎﯼ ﺁﻣﻮﺯﺷﯽ ﻓﺮﺍﮔﻴﺮﺍﻥ ﺭﺍ ﻣﺪﻳﺮﻳﺖ
96
ﻣﯽ ﻧﻤﺎﻳﻨﺪ ،ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﯽ ﮔﺮﺩﺩ .ﭼﺎﺭﭼﻮﺏ ﻭ ﺳﺎﺧﺘﺎﺭ ﺍﺭﺍﺋﻪ ﻣﻮﺿﻮﻉ ﻭ ﻣﺤﺘﻮﯼ ﺍﻏﻠﺐ
ﺑﺼﻮﺭﺕ ﺧﻮﺩﺁﻣﻮﺯ ﺑﺎ ﻫﺪﺍﻳﺖ ﻟﻴﻨﮏ ﻫﺎﯼ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺩﺭ ﻣﻮﺿﻮﻋﺎﺕ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ.
ﺁﻣﻮﺯﺵ ﻫﻤﺰﻣﺎﻥ .ﺁﻣﻮﺯﺵ ﻫﻤﺰﻣﺎﻥ ﺑﺼﻮﺭﺕ ﺑﻼﺩﺭﻧﮓ ﺑﺎ ﮐﻤﮏ ﻳﮏ ﻣﺮﺑﯽ ﺁﻣﻮﺯﺷﯽ •
ﮐﻪ ﺑﺼﻮﺭﺕ ﺯﻧﺪﻩ ﻧﺎﻇﺮ ﺗﻤﺎﻡ ﻓﻌﺎﻟﻴﺖ ﻫﺎﯼ ﺁﻣﻮﺯﺷﯽ ﻓﺮﺍﮔﻴﺮﺍﻥ ﺍﺳﺖ ﺍﻧﺠﺎﻡ ﻣﯽ ﮔﻴﺮﺩ.
ﺩﺭ ﺳﻴﺴﺘﻢ ﻓﻮﻕ ،ﻓﺮﺍﮔﻴﺮﺍﻥ ﺑﺎ ﻭﺭﻭﺩ ﺑﻪ ﮐﻼﺱ ﻣﺠﺎﺯﯼ ،ﻗﺎﺩﺭ ﺑﻪ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ
ﻣﺴﺘﻘﻴﻢ ﺑﺎ ﻣﺮﺑﯽ ﻭ ﺳﺎﻳﺮ ﻓﺮﺍﮔﻴﺮﺍﻥ ﻣﻮﺟﻮﺩ ﺩﺭ ﮐﻼﺱ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ
ﺁﻣﻮﺯﺵ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﺗﻤﺎﻡ ﻭﻳﮋﮔﯽ ﻫﺎﯼ ﻳﮏ ﮐﻼﺱ ﺩﺭﺱ ﺑﺼﻮﺭﺕ ﻣﺠﺎﺯﯼ ﺷﺒﻴﻪ
ﺳﺎﺯﯼ ﻭ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻣﺮﺑﯽ ﻭ ﻓﺮﺍﮔﻴﺮﺍﻥ ﻗﺮﺍﺭ ﻣﯽ ﮔﻴﺮﺩ .ﻣﺜﻼ" ﻣﯽ ﺗﻮﺍﻥ ﺑﺼﻮﺭﺕ ﻣﺠﺎﺯﯼ
ﺩﺳﺖ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﯼ ﺳﻮﺍﻝ ﮐﺮﺩﻥ ﺑﺎﻻ ﺑﺮﺩﻩ ﻭ ﻳﺎ ﺣﺘﯽ ﺍﺯ ﻳﮏ ﺗﺨﺘﻪ ﺳﻴﺎﻩ ﻣﺠﺎﺯﯼ
ﺍﺳﺘﻔﺎﺩﻩ ﻭ ﻣﺤﺘﻮﻳﺎﺕ ﻧﻮﺷﺘﻪ ﺷﺪﻩ ﺑﺮ ﺭﻭﯼ ﺁﻥ ﺭﺍ ﻣﺸﺎﻫﺪﻩ ﻧﻤﻮﺩ .ﺟﻠﺴﺎﺕ ﺁﻣﻮﺯﺷﯽ
ﻣﻤﮑﻦ ﺍﺳﺖ ﺻﺮﻓﺎ" ﺩﺭ ﺣﺪ ﻭ ﺍﻧﺪﺍﺯﻩ ﻳﮏ ﺟﻠﺴﻪ ﺑﻮﺩﻩ ﻭ ﻳﺎ ﻫﻔﺘﻪ ﻫﺎ ،ﻣﺎﻩ ﻫﺎ ﻭ ﻳﺎ ﺣﺘﯽ
ﺳﺎﻝ ﻫﺎ ،ﺑﻄﻮﻝ ﺍﻧﺠﺎﻣﺪ .ﺍﻳﻦ ﻧﻮﻉ ﺁﻣﻮﺯﺵ ﻫﺎ ﻣﻌﻤﻮﻻ" ﺍﺯ ﻃﺮﻳﻖ ﻭﺏ ﺳﺎﻳﺖ ﻫﺎﯼ
ﺍﻳﻨﺘﺮﻧﺖ ،ﮐﻨﻔﺮﺍﻧﺲ ﻫﺎﯼ ﺻﻮﺗﯽ ﻭ ﻳﺎ ﺗﺼﻮﻳﺮﯼ ،ﺍﻳﻨﺘﺮﻧﺖ ﺗﻠﻔﻨﯽ ﺍﻧﺠﺎﻡ ﻣﯽ ﮔﻴﺮﺩ.
ﺭﻭﺍﻧﺸﻨﺎﺳﯽ ﻳﺎﺩﮔﻴﺮﯼ
ﭼﻪ ﻧﻮﻉ ﺗﺤﻮﻻﺕ ﻭ ﻳﺎ ﺍﺗﻔﺎﻗﺎﺗﯽ ﺩﺭ ﻣﻐﺰ ﺍﻧﺴﺎﻥ ﺩﺭ ﺯﻣﺎﻥ ﻓﺮﺍﮔﻴﺮﯼ ،ﺑﻮﺟﻮﺩ ﻣﯽ ﺁﻳﺪ؟ ﺁﻣﻮﺯﺵ
ﺩﺭ ﺍﺑﺘﺪﺍ ﻧﻴﺎﺯﻣﻨﺪ ﻣﺤﺮﮎ ﻫﺎﯼ ﻻﺯﻡ ﺍﺳﺖ .ﺑﻪ ﻣﻨﻈﻮﺭ ﻓﺮﺍﮔﻴﺮﯼ ﻣﻮﺛﺮ ﻭ ﮐﺎﺭﺁ ،ﻣﺤﺮﮎ ﻫﺎﯼ
ﻣﻮﺟﻮﺩ ﻣﯽ ﺑﺎﻳﺴﺖ ﻧﮕﻬﺪﺍﺭﯼ ﮔﺮﺩﻧﺪ .ﻣﺘﺎﺳﻔﺎﻧﻪ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﻧﺮﻭﻧﯽ )ﻋﺼﺒﯽ( ﻣﻮﺟﻮﺩ ﺩﺭ ﻣﻐﺰ
ﮐﻪ ﻣﺴﺌﻮﻝ ﮐﻨﺘﺮﻝ ﻣﺤﺮﮎ ﻫﺎ ﻭ ﺫﺧﻴﺮﻩ ﺳﺎﺯﯼ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺣﺎﻓﻈﻪ ﻣﯽ ﺑﺎﺷﺪ ،ﺑﺴﺮﻋﺖ ﺩﭼﺎﺭ
ﺧﺴﺘﮕﯽ ﻣﯽ ﮔﺮﺩﻧﺪ )ﭘﺲ ﺍﺯ ﮔﺬﺷﺖ ﭼﻨﺪ ﺩﻗﻴﻘﻪ( .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺁﻧﻬﺎ ﻧﻴﺎﺯﻣﻨﺪ ﺑﺎﺯﺳﺎﺯﯼ ﺩﺭ
ﻓﻮﺍﺻﻞ ﺑﻴﻦ ﺳﻪ ﺗﺎ ﭘﻨﺞ ﺩﻗﻴﻘﻪ ﻣﯽ ﺑﺎﺷﻨﺪ ،ﺩﺭ ﻏﻴﺮ ﺍﻳﻨﺼﻮﺭﺕ ﻣﻴﺰﺍﻥ ﭘﺎﺳﺨﮕﻮﺋﯽ ﻭ ﻓﺮﺍﮔﻴﺮﯼ ﺁﻧﻬﺎ
ﺩﭼﺎﺭ ﺍﻓﺖ ﻣﯽ ﮔﺮﺩﺩ .ﺁﻧﻬﺎ ﺑﺴﺮﻋﺖ ﺑﺎﺯﺳﺎﺯﯼ ﻣﯽ ﮔﺮﺩﻧﺪ ،ﺳﻴﺴﺘﻢ ﺁﻣﻮﺯﺷﯽ ﻣﯽ ﺑﺎﻳﺴﺖ
ﺑﺴﺮﻋﺖ ﺑﺎ ﺧﺴﺘﮕﯽ ﻭ ﺩﻟﺰﺩﮔﯽ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﺑﺮﺍﯼ ﻓﺮﺍﮔﻴﺮﺍﻥ ﺑﺮﺧﻮﺭﺩ ﻣﻨﺎﺳﺐ ﺭﺍ ﺩﺍﺷﺘﻪ ،ﺗﺎ
ﺍﻣﮑﺎﻥ ﻳﺎﺩﮔﻴﺮﯼ ﻣﻮﺛﺮﺗﺮ ﺑﻮﺟﻮﺩ ﺁﻳﺪ.
97
ﻳﺎﺩﮔﻴﺮﯼ ﺑﺮ ﺍﺳﺎﺱ ﺍﻟﮕﻮ ﻫﺎ ،ﻣﻮﺛﺮﺗﺮﻳﻦ ﻣﺪﻝ ﻳﺎﺩﮔﻴﺮﯼ ﻣﺤﺴﻮﺏ ﻣﯽ ﮔﺮﺩﺩ .ﺩﺭ ﺍﻳﻦ ﺭﻭﺵ،
ﺍﻟﮕﻮﻫﺎ ﺍﺯ ﻣﺠﻤﻮﻋﻪ ﺍﯼ ﺑﻪ ﻣﺠﻤﻮﻋﻪ ﺩﻳﮕﺮ ﺟﺎﺑﺠﺎ ﻣﯽ ﮔﺮﺩﻧﺪ .ﺍﻟﮕﻮﻫﺎﺋﯽ ﮐﻪ ﻧﺮﻭﻥ ﻫﺎﯼ ﻣﺮﺑﻮﻁ
ﺑﺨﻮﺩ ﺭﺍ ﻣﺴﺌﻮﻝ ﭘﺎﺳﺨﮕﻮﺋﯽ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ ،ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﻣﺘﻔﺎﻭﺕ ﺩﺭ ﻣﺤﻞ ﻫﺎﯼ ﻣﺘﻔﺎﻭﺕ ﻣﻐﺰ
ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﻣﺜﻼ"
ﮔﻮﺵ ﺩﺍﺩﻥ ﺑﻪ ﻳﮏ ﺣﻘﻴﻘﺖ .ﺯﻣﺎﻧﻴﮏ ﺁﺭﺩ ﺑﺎ ﺗﺨﻢ ﻣﺮﻍ ﺗﺮﮐﻴﺐ ﻣﯽ ﮔﺮﺩﺩ ،ﺧﻤﻴﺮﯼ •
ﻃﺮﻳﻖ ﮐﺮﺑﻮﻫﻴﺪﺭﺍﺕ ﺗﺎﻣﻴﻦ ﻣﯽ ﻧﻤﺎﻳﻨﺪ ،ﺑﻨﺎﺑﺮﺍﻳﻨﻦ ﻗﺒﻞ ﺍﺯ ﺑﺎﺯﯼ ﻳﮏ ﻭﻋﺪﻩ ﻏﺬﺍ ﻣﻨﺎﺳﺐ
ﺧﻮﺍﻫﻨﺪ ﺩﺍﺷﺖ.
ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﻓﻮﻕ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻣﺮﺗﺒﻂ ﺑﻮﺩﻩ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﻫﻤﮑﺎﺭﯼ ﺑﺎﻳﮑﺪﻳﮕﺮ ﺣﺎﻓﻈﻪ ﺭﺍ ﺷﮑﻞ
ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ ) ﻳﺎﺩﮔﻴﺮﯼ ( ﻫﺪﻑ ﺷﮑﻞ ﺩﻫﯽ ﺣﺎﻓﻈﻪ ،ﺩﺭ ﻫﺮﻳﮏ ﺍﺯ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﻧﺮﻭﻧﯽ
ﻣﺮﺑﻮﻃﻪ ﺍﺳﺖ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺍﻃﻼﻋﺎﺗﯽ ﮐﻪ ﺑﮕﻮﻧﻪ ﺍﯼ ﻃﺮﺍﺣﯽ ﻣﯽ ﮔﺮﺩﻧﺪ ﺗﺎ ﺍﺯ ﻳﮏ ﺳﻴﺴﺘﻢ ﻧﺮﻭﻧﯽ
ﺑﻪ ﺳﻴﺴﺘﻢ ﻧﺮﻭﻧﯽ ﺩﻳﮕﺮ ﺣﺮﮐﺖ ﻧﻤﺎﻳﻨﺪ ،ﺩﺍﺭﺍﯼ ﮐﺎﺭﺁﺋﯽ ﺑﻴﺸﺘﺮﯼ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻳﺎﺩﮔﻴﺮﯼ
ﻣﯽ ﺑﺎﺷﻨﺪ.
ﻳﺎﺩﮔﻴﺮﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﻪ ﭼﻪ ﺻﻮﺭﺕ ﻧﮕﻬﺪﺍﺷﺖ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﻬﺒﻮﺩ ﻣﯽ ﺑﺨﺸﺪ ؟
ﺁﻣﻮﺯﺵ ﻋﻼﻭﻩ ﺑﺮ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﻧﺮﻭﻧﯽ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ،ﻣﺴﺘﻠﺰﻡ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻋﻨﺎﺻﺮ ﺩﻳﮕﺮ
ﻧﻈﻴﺮ :ﺍﺭﺗﺒﺎﻁ ﻣﺘﻘﺎﺑﻞ ،ﺗﺨﻴﻞ ﻭ ﻓﻴﺪﺑﮏ ﺍﺳﺖ .ﻳﺎﺩﮔﻴﺮﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻋﻨﺎﺻﺮ
ﻣﺘﻔﺎﻭﺕ ،ﮐﻪ ﺑﺎﻋﺚ ﺍﻳﺠﺎﺩ ﻋﻨﺎﺻﺮ ﺟﺪﻳﺪ ﺁﻣﻮﺯﺷﯽ ﻣﯽ ﮔﺮﺩﺩ ،ﻓﺮﺁﻳﻨﺪ ﻓﺮﺍﮔﻴﺮﯼ ﺭﺍ ﺣﺬﺍﺏ ﺗﺮ
ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺍﻳﺠﺎﺩ ﺟﺬﺍﺑﻴﺖ ﺩﺭ ﻳﺎﺩﮔﻴﺮﯼ ﻳﮑﯽ ﺍﺯ ﺩﻻﻳﻞ ﻣﻮﻓﻘﻴﺖ ﺁﻣﻮﺯﺵ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ
ﺍﺳﺖ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺍﺯ ﻋﻨﺎﺻﺮ ﺟﺪﻳﺪ ﺩﺭ ﺳﻴﺴﺘﻢ ﻫﺎﯼ ﺁﻣﻮﺯﺵ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺳﺘﻔﺎﺩﻩ ﻧﮕﺮﺩﺩ،
ﻋﻤﻼ" ﺟﺬﺍﺑﻴﺖ ﻫﺎﯼ ﻻﺯﻡ ﺑﺮﺍﯼ ﺁﻣﻮﺯﺵ ﺭﺍ ﺍﺯ ﺩﺳﺖ ﺩﺍﺩﻩ ﺍﻳﻢ .ﺑﺮﺍﯼ ﻣﻮﻓﻘﻴﺖ ﺩﺭ ﺁﻣﻮﺯﺵ
ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻧﮑﺎﺕ ﺯﻳﺮ ﻣﯽ ﺑﺎﻳﺴﺖ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﻗﺮﺍﺭ ﮔﻴﺮﺩ.
98
ﺑﺮﺭﺳﯽ ﻧﻮﻉ ﻣﺤﺘﻮﻳﺎﺕ .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﺼﺎﻭﻳﺮ ،ﺻﺪﺍ ﻭ ﻣﺘﻦ ﻭ ﺗﺮﮐﻴﺐ ﻣﻨﺎﺳﺐ ﺁﻧﻬﺎ ﺑﺎ •
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺎﺯﻳﻬﺎ ،ﺍﻣﺘﺤﺎﻧﺎﺕ ﮐﻮﺗﺎﻩ ﻣﺪﺕ ﺑﺮﺍﯼ ﺍﺧﺬ ﻓﻴﺪﺑﮏ ﺳﺮﻳﻊ ﺍﺯ ﻓﺮﺍﮔﻴﺮﺍﻥ
ﻣﻨﺎﺳﺐ ﺗﺮﻳﻦ ﺭﻭﺵ ﺑﺮﺍﯼ ﺳﻨﺠﺶ ﻣﻴﺰﺍﻥ ﻣﻮﻓﻘﻴﺖ ﺩﺭ ﺁﻣﻮﺯﺵ ﺍﺳﺖ.
ﺍﻳﺠﺎﺩ ﻓﻴﺪﺑﮏ ﻫﺎﯼ ﺳﺮﻳﻊ .ﺩﻭﺭﻩ ﻫﺎﯼ ﺁﻣﻮﺯﺵ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻣﯽ ﺑﺎﻳﺴﺖ ﺍﺯ ﺭﻭﺵ ﻫﺎﺋﯽ •
ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺧﺬ ﻓﻴﺪ ﺑﮏ ﺳﺮﻳﻊ ﺍﺳﺘﻔﺎﺩﻩ ﺗﺎ ﺩﺭ ﺻﻮﺭﺕ ﺍﺷﮑﺎﻝ ﻭ ﻳﺎ ﻋﺪﻡ ﻣﻮﻓﻘﻴﺖ،
ﺳﺮﻳﻌﺎ" ﻧﺴﺒﺖ ﺑﻪ ﺑﺮﻃﺮﻑ ﻧﻤﻮﺩﻥ ﺁﻥ ﺍﻗﺪﺍﻡ ﻧﻤﺎﻳﻨﺪ .ﻓﻴﺪﺑﮏ ﻫﺎﯼ ﻣﺮﺑﻮﻃﻪ ﻣﯽ ﺑﺎﻳﺴﺖ
ﺩﺭ ﺳﺮﻳﻌﺘﺮﻳﻦ ﺯﻣﺎﻥ ﻣﻤﮑﻦ ﺍﺧﺬ ﮔﺮﺩﻧﺪ .ﺁﻣﻮﺯﺵ ﺩﺭ ﻫﺮ ﻣﺮﺣﻠﻪ ﺑﺮ ﺍﺳﺎﺱ ﺁﻣﻮﺯﺵ ﺩﺭ
ﻣﺮﺣﻠﻪ ﻗﺒﻞ ﺍﻳﺠﺎﺩ ﻣﯽ ﮔﺮﺩﺩ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺗﺸﺨﻴﺺ ﻭ ﺍﺧﺬ ﻓﻴﺪﺑﮏ ﻫﺎﯼ ﺳﺮﻳﻊ ،ﻣﺮﺍﺣﻞ
ﻣﺘﻔﺎﻭﺕ ﺁﻣﻮﺯﺷﯽ ﺭﺍ ﺑﺪﺭﺳﺘﯽ ﺗﺒﻴﻦ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺩﺭ ﻳﮏ ﻣﺮﺣﻠﻪ
ﻣﻮﻓﻘﻴﺘﯽ ﺣﺎﺻﻞ ﻧﺸﺪﻩ ﺑﺎﺷﺪ ،ﻣﺮﺣﻠﻪ ﺑﻌﺪ ﮐﻪ ﺑﺮ ﺍﺳﺎﺱ ﻣﺮﺣﻠﻪ ﻗﺒﻞ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ،
ﺩﺭ ﺍﻣﺮ ﺁﻣﻮﺯﺵ ﺗﻮﻓﻴﻖ ﭼﻨﺪﺍﻧﯽ ﺍﻳﺠﺎﺩ ﻧﺨﻮﺍﻫﺪ ﮐﺮﺩ.
ﺍﺭﺗﺒﺎﻃﺎﺕ ﺻﻤﻴﻤﯽ ﺑﺎ ﺳﺎﻳﺮ ﻓﺮﺍﮔﻴﺮﺍﻥ ﻭ ﻣﺮﺑﻴﺎﻥ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺗﺎﻕ ﻫﺎﯼ •
ﮔﻔﺘﮕﻮ ،ﺗﺎﻻﺭﻫﺎﯼ ﻣﺒﺎﺣﺜﻪ ،ﭘﻴﺎﻡ ﻫﺎﯼ ﻓﻮﺭﯼ ﻭ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺩﺭ ﺍﻳﺠﺎﺩ ﺍﺭﺗﺒﺎﻁ
ﻣﺘﻘﺎﺑﻞ ﺑﺎ ﻓﺮﺍﮔﻴﺮﺍﻥ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﺴﻴﺎﺭ ﻣﻮﺛﺮ ﻭ ﮐﺎﺭﺳﺎﺯ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺍﻳﺠﺎﺩ ﮐﻤﻴﺘﻪ ﻫﺎﯼ
Onlineﺑﻄﺮﺯ ﭼﺸﻤﮕﻴﺮﯼ ﺩﺭ ﻋﻤﻠﮑﺮﺩ ﺑﺮﻧﺎﻣﻪ ﻫﺎﯼ ﺁﻣﻮﺯﺷﯽ ﺗﺎﺛﻴﺮ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ.
ﺁﻣﻮﺯﺵ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺑﻪ ﻓﺮﺍﮔﻴﺮﺍﻥ ﺍﻳﻦ ﺍﻣﮑﺎﻥ ﺭﺍ ﺧﻮﺍﻫﺪ ﺩﺍﺩ ﺗﺎ ﻫﺮ ﻓﺮﺩ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ
ﻣﺴﺎﻳﻞ ﻭ ﺗﻮﺍﻧﺎﺋﯽ ﺧﻮﺩ ،ﺁﻫﻨﮓ ﻳﺎﺩﮔﻴﺮﯼ ﺭﺍ ﺧﻮﺩ ﻣﺸﺨﺺ ﻧﻤﺎﻳﺪ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﯼ ،ﻓﺮﺍﮔﻴﺮﺍﻥ
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺑﻪ ﺩﻻﻳﻠﯽ ،ﭼﻨﺪ ﺭﻭﺯﯼ ﺍﺯ ﺳﻴﺴﺘﻢ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻨﻤﺎﻳﻨﺪ ﻭ ﺍﺯ ﺁﻣﻮﺯﺵ ﺩﻭﺭ ﺑﺎﺷﻨﺪ،
ﭘﺲ ﺍﺯ ﺑﺮﻃﺮﻑ ﺷﺪﻥ ﻣﺸﮑﻼﺕ ،ﻣﺠﺪﺩﺍ" ﻗﺎﺩﺭ ﺑﻪ ﺍﺩﺍﻣﻪ ﺁﻣﻮﺯﺵ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺩﻭﺭﻩ ﻫﺎﯼ
ﺁﻣﻮﺯﺷﯽ ﻣﺒﺘﻨﯽ ﺑﺮ ﺁﻣﻮﺯﺵ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺩﺍﺭﺍﯼ ﻋﻨﺎﺻﺮ ﻗﺎﺑﻞ ﮐﻨﺘﺮﻟﯽ ﺑﻮﺩﻩ ﮐﻪ ﺗﻮﺳﻂ ﮐﺎﺭﺑﺮﺍﻥ
ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﻧﺪ .ﻋﻨﺎﺻﺮ ﮐﻨﺘﺮﻟﯽ ﻓﻮﻕ ﺩﺭ ﮐﻼﺱ ﻫﺎ ﯼ ﺁﻣﻮﺯﺵ ﻣﻌﻤﻮﻟﯽ ﺍﺳﺘﻔﺎﺩﻩ ﻧﺸﺪﻩ ﻭ
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﺎﻥ ﺩﺭ ﺁﻣﻮﺯﺵ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﻓﺮﺍﮔﻴﺮﺍﻥ ﻗﺎﺩﺭ ﺑﻪ ﮐﻨﺘﺮﻝ ﻓﺮﺁﻳﻨﺪ ﺁﻣﻮﺯﺵ،
99
ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﻗﺎﺑﻠﻴﺖ ﺗﻨﻈﻴﻢ ﺁﻫﻨﮓ ﺁﻣﻮﺯﺵ ﺗﻮﺳﻂ ﻓﺮﺍﮔﻴﺮﺍﻥ ﻳﮑﯽ ﺍﺯ ﺩﻻﻳﻞ ﻣﻬﻢ ﺩﺭ ﺭﺍﺑﻄﻪ
ﺑﺎ ﻣﻮﺛﺮ ﺑﻮﺩﻥ ﺁﻣﻮﺯﺵ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺳﺖ.
100
ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ
ﺷﻬﺮﻭﻧﺪﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﺭﻭﺯﺍﻧﻪ ﻣﻴﻠﻴﻮﻥ ﻫﺎ ﻧﺎﻣﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺭﺍ ﺑﺮﺍﯼ ﻳﮑﺪﻳﮕﺮ ﺍﺭﺳﺎﻝ ﻣﯽ ﻧﻤﺎﻳﻨﺪ.
ﻣﺒﺎﺩﻟﻪ ﻧﺎﻣﻪ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻳﮑﯽ ﺍﺯ ﺍﻭﻟﻴﻦ ﺳﺮﻭﻳﺲ ﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺤﺴﻮﺏ ﺷﺪﻩ ﻭ ﺍﻣﺮﻭﺯﻩ
ﺍﺯ ﺁﻥ ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﮏ ﺍﺑﺰﺍﺭ ﺍﺭﺗﺒﺎﻃﯽ ﻗﺪﺭﺗﻤﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ .ﺩﺭ ﺯﻣﺎﻥ ﺍﺭﺳﺎﻝ ﻳﮏ ﻧﺎﻣﻪ
ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﻓﺮﺁﻳﻨﺪ ﮔﺴﺘﺮﺩﻩ ﻭ ﻣﺴﻴﺮﯼ ﻃﻮﻻﻧﯽ ﻃﯽ ﺧﻮﺍﻫﺪ ﺷﺪ.
101
ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﺑﺮﻧﺎﻣﻪ ﻫﺎﯼ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺻﺮﻓﻨﻈﺮ ﺍﺯ ﻧﻮﻉ ﺧﻮﺩ ،ﺩﺍﺭﺍﯼ ﻭﻇﺎﻳﻒ ﺯﻳﺮ
ﻣﯽ ﺑﺎﺷﻨﺪ:
ﻧﻤﺎﻳﺶ ﻟﻴﺴﺖ ﺗﻤﺎﻡ ﭘﻴﺎﻡ ﻫﺎﯼ ﻣﻮﺟﻮﺩ ﺩﺭ ﺻﻨﺪﻭﻕ ﭘﺴﺘﯽ ﺍﺯ ﻃﺮﻳﻖ " ﻋﻨﺎﻭﻳﻦ ﭘﻴﺎﻡ ﻫﺎ " . •
ﻋﻨﻮﺍﻥ ﻳﮏ ﭘﻴﺎﻡ ﻣﺸﺨﺺ ﮐﻨﻨﺪﻩ ﻓﺮﺳﺘﻨﺪﻩ ،ﻣﻮﺿﻮﻉ ،ﺗﺎﺭﻳﺦ ﻭ ﺯﻣﺎﻥ ﻭ ﺍﻧﺪﺍﺯﻩ ﭘﻴﺎﻡ ﺍﺳﺖ.
ﺍﻣﮑﺎﻥ ﺍﻧﺘﺨﺎﺏ ﻳﮏ ﭘﻴﺎﻡ ﺍﺯ ﻃﺮﻳﻖ ﻋﻨﻮﺍﻥ ﺁﻥ ﻓﺮﺍﻫﻢ ﺷﺪﻩ ﻭﻣﻄﺎﻟﻌﻪ ﻣﺤﺘﻮﻳﺎﺕ ﭘﻴﺎﻡ •
ﺍﻣﮑﺎﻥ ﺍﻳﺠﺎﺩ ﭘﻴﺎﻡ ﻫﺎﯼ ﺟﺪﻳﺪ ﻭ ﺍﺭﺳﺎﻝ ﺁﻧﻬﺎ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﻳﮏ •
ﭘﻴﺎﻡ ﻣﯽ ﺑﺎﻳﺴﺖ ﺁﺩﺭﺱ ﮔﻴﺮﻧﺪﻩ ،ﻣﻮﺿﻮﻉ ﭘﻴﺎﻡ ﺭﺍ ﻣﺸﺨﺺ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﻣﺤﺘﻮﻳﺎﺕ ﭘﻴﺎﻡ
ﺭﺍ ﺗﺎﻳﭗ ﮐﺮﺩ.
ﺍﮐﺜﺮ ﺑﺮﻧﺎﻣﻪ ﻫﺎﯼ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﭘﻴﺎﻡ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﻣﮑﺎﻥ ﺍﺿﺎﻓﻪ ﮐﺮﺩﻥ ﺿﻤﺎﺋﻢ ﺑﻪ •
ﻳﮏ ﭘﻴﺎﻡ ﺭﺍ ﻧﻴﺰ ﻓﺮﺍﻫﻢ ﻣﯽ ﺁﻭﺭﻧﺪ .ﺑﺮﻧﺎﻣﻪ ﻫﺎﯼ ﻓﻮﻕ ﻫﻤﭽﻨﻴﻦ ﺍﻣﮑﺎﻥ ﺫﺧﻴﺮﻩ ﮐﺮﺩﻥ
ﺿﻤﺎﺋﻢ ﻣﻮﺟﻮﺩ ﺩﺭ ﭘﻴﺎﻡ ﻫﺎﯼ ﺩﺭﻳﺎﻓﺖ ﺷﺪﻩ ﺭﺍ ﻧﻴﺰ ﺩﺍﺭﺍ ﻣﯽ ﺑﺎﺷﻨﺪ.
102
ﻫﺮ ﺷﺨﺺ ﺑﺮ ﺭﻭﯼ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺩﺍﺭﺍﯼ ﻳﮏ Accountﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﻭ •
ﻣﯽ ﺑﺎﻳﺴﺖ ﻳﮏ ﭘﻴﺎﻡ ﻣﺘﻨﯽ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﻨﺪ.
ﭘﺲ ﺍﺯ ﺁﻣﺎﺩﻩ ﻧﻤﻮﻥ ﭘﻴﺎﻡ ،ﺑﺎ ﻓﺸﺮﺩﻥ ﺩﮐﻤﻪ "ﺍﺭﺳﺎﻝ" ،ﭘﻴﺎﻡ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺮﺍﯼ ﮔﻴﺮﻧﺪﻩ
ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺑﺎ ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ
ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻭ ﭘﻴﺎﻡ ﺣﺎﻭﯼ ﺁﺩﺭﺱ ﻓﺮﺳﺘﻨﺪﻩ ،ﮔﻴﺮﻧﺪﻩ ﻭ ﻣﺤﺘﻮﻳﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺑﺮﺍﯼ
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺭﺳﺎﻝ ﻣﯽ ﻧﻤﺎﻳﺪ.
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻣﻤﮑﻦ ﺍﺳﺖ ﺍﻃﻼﻋﺎﺕ ﺩﺭﻳﺎﻓﺖ ﺷﺪﻩ ﺭﺍ ﺑﺎ ﻳﮏ ﻓﺮﻣﺖ ﻣﻨﺎﺳﺐ ﺑﻪ •
ﺍﻧﺘﻬﺎﯼ ﻓﺎﻳﻞ ﻣﺘﻨﯽ ﮐﻪ ﺑﺮﺍﯼ ﻫﺮ ﻓﺮﺩ ﺑﺎ ﻧﺎﻡ Accountﻭﯼ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ،ﺍﺿﺎﻓﻪ
ﻣﯽ ﻧﻤﺎﻳﺪ.
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻣﻤﮑﻦ ﺍﺳﺖ ﺍﻃﻼﻋﺎﺕ ﺩﻳﮕﺮ ﻧﻈﻴﺮ :ﺯﻣﺎﻥ ﻭ ﺗﺎﺭﻳﺦ ﺩﺭﻳﺎﻓﺖ ﭘﻴﺎﻡ ﺭﺍ ﻧﻴﺰ •
ﺫﺧﻴﺮﻩ ﻧﻤﺎﻳﺪ .ﺩﺭ ﺻﻮﺭﺕ ﺍﺭﺳﺎﻝ ﻧﺎﻣﻪ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺩﻳﮕﺮ ﺑﺮﺍﯼ ﻳﮏ ﮔﻴﺮﻧﺪﻩ
ﺧﺎﺹ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﭘﻴﺎﻡ ﻫﺎﯼ ﺩﺭﻳﺎﻓﺖ ﺷﺪﻩ ﺭﺍ ﺑﻪ ﺍﻧﺘﻬﺎﯼ ﻓﺎﻳﻞ ﻣﺘﻨﯽ )ﺣﺎﻭﯼ
ﭘﻴﺎﻡ ﻫﺎﯼ ﻣﺮﺑﻮﻃﻪ( ﺍﺿﺎﻓﻪ ﻣﯽ ﻧﻤﺎﻳﺪ .ﮔﻴﺮﻧﺪﻩ ﭘﻴﺎﻡ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ
ﮔﻴﺮﻧﺪﻩ ﺧﻮﺩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺭﻳﺎﻓﺖ ﻭ ﻣﺸﺎﻫﺪﻩ ﻧﺎﻣﻪ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﺪ":
ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺍﺯ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻣﯽ ﺧﻮﺍﻫﺪ ﮐﻪ ﻳﮏ ﻧﺴﺨﻪ ﺍﺯ ﻓﺎﻳﻞ ﻣﺘﻨﯽ •
ﺣﺬﻑ ﻧﻤﺎﻳﺪ.
ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻗﺎﺩﺭ ﺑﻪ ﺫﺧﻴﺮﻩ ﺳﺎﺯﯼ ﻓﺎﻳﻞ ﻣﺘﻨﯽ ﺣﺎﻭﯼ ﭘﻴﺎﻡ ﻫﺎ ﺑﺮ ﺭﻭﯼ •
103
ﺩﺭ ﻓﺎﻳﻞ ﻣﺘﻨﯽ ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺑﺪﻧﺒﺎﻝ ﺧﻄﻮﻃﯽ ﺑﺎﺷﺪ ﮐﻪ ﺑﺎ ﻋﻨﻮﺍﻥ "ﺍﺯ" ﻭﺟﻮﺩ ﺩﺍﺭﻧﺪ. •
ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻗﺎﺩﺭ ﺑﻪ ﻧﻤﺎﻳﺶ ﻟﻴﺴﺖ ﺗﻤﺎﻡ ﭘﻴﺎﻡ ﻫﺎ ﺑﺮ ﺍﺳﺎﺱ ﻋﻨﺎﻭﻳﻦ ﻣﺮﺑﻮﻃﻪ •
ﺍﺳﺖ.
ﻣﺜﺎﻝ ﻓﻮﻕ ﺻﺮﻓﺎ" ﻳﮏ ﺳﻴﺴﺘﻢ ﺑﺴﻴﺎﺭ ﺳﺎﺩﻩ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺭﺍ ﻧﺸﺎﻥ
ﻣﯽ ﺩﺍﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺑﺮﺭﺳﯽ ﻳﮏ ﺳﻴﺴﺘﻢ ﻭﺍﻗﻌﯽ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ.
ﺳﻴﺴﺘﻢ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻭﺍﻗﻌﯽ
ﺳﻴﺴﺘﻢ ﻭﺍﻗﻌﯽ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺩﺍﺭﺍﯼ ﺩﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻣﺘﻔﺎﻭﺕ ﺑﻮﺩﻩ ﮐﻪ ﺑﺮ ﺭﻭﯼ ﻳﮏ
ﻣﺎﺷﻴﻦ ﺍﺟﺮﺍﺀ ﻣﯽ ﮔﺮﺩﻧﺪ.
ﻳﮑﯽ ﺍﺯ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ Simple Mail Transfer(SMTP
(Protocolﺑﻮﺩﻩ ﻭ ﻣﺴﺘﻮﻟﻴﺖ ﭘﻴﺎﻡ ﻫﺎﯼ ﺍﺭﺳﺎﻟﯽ ) ﺧﺮﻭﺝ ( ﻧﺎﻣﻪ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﺭﺍ
ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ .ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺩﻭﻡ ( Post office Protocol (POP3 ،ﻧﺎﻣﻴﺪﻩ ﺷﺪﻩ ﻭ
ﻣﺴﺪﻭﻟﻴﺖ ﭘﻴﺎﻡ ﻫﺎﯼ ﺩﺭﻳﺎﻓﺘﯽ ) ﻭﺭﻭﺩ ( ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ .ﺷﮑﻞ ﺯﻳﺮ ﺟﺎﻳﮕﺎﻩ ﻫﺮ ﻳﮏ ﺍﺯ
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﺭﺍ ﻧﺸﺎﻥ ﻣﯽ ﺩﻫﺪ.
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ SMTPﺑﻪ ﭘﻮﺭﺕ ٢٥ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ POP3ﺑﻪ ﭘﻮﺭﺕ ١١٠ﮔﻮﺵ
ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ.
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ SMTP
ﺯﻣﺎﻧﻴﮑﻪ ﺍﺯ ﻃﺮﻳﻖ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺧﻮﺩ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﻧﺎﻣﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻣﯽ ﻧﻤﺎﺋﻴﺪ ،ﺑﺮﻧﺎﻣﻪ
ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺑﺎ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ SMTPﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﻧﺎﻣﻪ ﻫﺎﯼ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﺍﺭﺗﺒﺎﻁ
ﺑﺮﻗﺮﺍﺭ ﻣﯽ ﻧﻤﺎﻳﺪ .ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ SMTPﻣﻮﺟﻮﺩ ،ﻣﻤﮑﻦ ﺍﺳﺖ ﺑﺎ ﺳﺎﻳﺮ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ
104
SMTPﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ) ﺗﻮﺯﻳﻊ ( ﻧﺎﻣﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻧﻤﺎﻳﺪ .ﺷﮑﻞ ﺯﻳﺮ ﻧﺤﻮﻩ
ﻋﻤﻠﮑﺮﺩ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻓﻮﻕ ﺭﺍ ﻧﺸﺎﻥ ﻣﯽ ﺩﻫﺪ.
ﮐﺎﺭﺑﺮﺍﻥ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﻧﺎﻣﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺗﻮﺳﻂ ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ،ﻣﯽ ﺑﺎﻳﺴﺖ
ﺗﻨﻈﻴﻤﺎﺕ ﻻﺯﻡ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ .ﻓﺮﺽ ﮐﻨﻴﺪ ﺁﺩﺭﺱ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺷﻤﺎ
[email protected]ﺑﺎﺷﺪ ،ﺩﺭ ﺯﻣﺎﻥ ﺗﻨﻈﻴﻢ ﭘﺎﺭﺍﻣﺘﺮﻫﺎﯼ ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ )ﺑﻌﻨﻮﺍﻥ
ﻣﺜﺎﻝ ،(Outlook :ﻧﺎﻡ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻣﯽ ﺑﺎﻳﺴﺖ ﻣﺸﺨﺺ ﮔﺮﺩﺩ
) ﻓﺮﺽ ﮐﻨﻴﺪ ﻧﺎﻡ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ mail.test.comﺑﺎﺷﺪ( .ﭘﺲ ﺍﺯ
ﺁﻣﺎﺩﻩ ﻧﻤﻮﺩﻥ ﻧﺎﻣﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻭ ﻓﺸﺮﺩﻥ ﺩﮐﻤﻪ "ﺍﺭﺳﺎﻝ" ،ﻋﻤﻠﻴﺎﺕ ﺯﻳﺮ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ:
ﺑﺮﻧﺎﻣﻪ ،Outlook expressﺑﺎ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ SMTPﻣﻮﺟﻮﺩ ﺩﺭ •
105
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﮔﻴﺮﻧﺪﻩ ﭘﻴﺎﻡ ﺩﺍﺭﺍﯼ ﺻﻨﺪﻭﻕ ﭘﺴﺘﯽ ﺑﺮ ﺭﻭﯼ ﻫﻤﺎﻥ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ •
106
ﺩﻫﻨﺪﻩ SMTPﻣﻮﺟﻮﺩ ﺩﺭ ﺣﻮﺯﻩ ، Test2.comﭘﻴﺎﻡ ﺍﺭﺳﺎﻟﯽ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻭ ﺁﻥ ﺭﺍ
ﺩﺭ ﺻﻨﺪﻭﻕ ﭘﺴﺘﯽ ﻣﺮﺑﻮﻁ ﺑﻪ ﮔﻴﺮﻧﺪﻩ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﺩﺍﺩ.
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻣﻮﺟﻮﺩ ﺩﺭ ﺣﻮﺯﻩ Test1.comﻗﺎﺩﺭ ﺑﻪ ﺑﺮﻗﺮﺍﺭﯼ ﺍﺭﺗﺒﺎﻁ ﺑﺎ
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ SMTPﻣﻮﺟﻮﺩ ﺩﺭ ﺣﻮﺯﻩ Test2.comﻧﮕﺮﺩﺩ ،ﭘﻴﺎﻡ ﻣﻮﺭﺩ ﻧﻈﺮ ﺩﺭ
ﻣﺤﻠﯽ ﺧﺎﺹ ﺩﺭ ﻧﻮﺑﺖ ﻗﺮﺍﺭ ﻣﯽ ﮔﻴﺮﺩ .ﺳﺮﻳﺲ ﺩﻫﻨﺪﻩ SMTPﺩﺭ ﺍﮐﺜﺮ ﻣﺎﺷﻴﻦ ﻫﺎ ﺍﺯ ﺑﺮﻧﺎﻣﻪ
ﺍﯼ ﺑﺎ ﻧﺎﻡ Sendmailﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﻭﺍﻗﻌﯽ ﻳﮏ ﭘﻴﺎﻡ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩﻩ ﻭ ﺑﺮﺍﯼ ﭘﻴﺎﻡ
ﻫﺎﯼ ﻣﻮﺟﻮﺩ ﺩﺭ ﺻﻒ ،ﺍﺯ ﺻﻔﯽ ﺑﺎ ﻧﺎﻡ sendmail queueﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﮔﺮﺩﺩ .ﺑﺮﻧﺎﻣﻪ
Sendmailﺑﺼﻮﺭﺕ ﺍﺩﻭﺍﺭﯼ) ﺗﮑﺮﺍﺭﯼ( ﺳﻌﯽ ﺩﺭ ﺍﺭﺳﺎﻝ ﻣﺠﺪﺩ ﭘﻴﺎﻡ ﻫﺎﯼ ﻣﻮﺟﻮﺩ ﺩﺭ
ﺻﻒ ﻣﯽ ﻧﻤﺎﻳﺪ .ﻣﺜﻼ" ﻣﻤﮑﻦ ﺍﺳﺖ ﻫﺮ ١٥ﺩﻗﻴﻘﻪ ﻳﮑﺒﺎﺭ ﺗﻼﺵ ﻣﺠﺪﺩ ﺧﻮﺩ ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﺭﺍ
ﺍﻧﺠﺎﻡ ﺩﻫﺪ .ﭘﺲ ﺍﺯ ﮔﺬﺷﺖ ﭼﻬﺎﺭ ﺳﺎﻋﺖ ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ ﮐﻨﻨﺪﻩ ﻧﺎﻣﻪ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ،ﭘﻴﺎﻣﯽ ﻣﺒﻨﯽ
ﺑﺮ ﻭﺟﻮﺩ ﺍﺷﮑﺎﻝ ﺩﺭ ﺍﺭﺳﺎﻝ ﻧﺎﻣﻪ ،ﻓﺮﺳﺘﺎﺩﻩ ﻣﯽ ﺷﻮﺩ .ﭘﺲ ﺍﺯ ﭘﻨﺞ ﺭﻭﺯ ،ﺍﮐﺜﺮ ﺑﺮﻧﺎﻣﻪ ﻫﺎﯼ
ﭘﻴﮑﺮﺑﻨﺪﯼ Sendmailﭘﻴﺎﻣﯽ ﻣﺒﻨﯽ ﺑﺮ ﻋﺪﻡ ﻣﻮﻓﻘﻴﺖ ﺩﺭ ﺗﻮﺯﻳﻊ ﭘﻴﺎﻡ ﺭﺍ ﺑﺮﺍﯼ ﺍﺭﺳﺎﻝ
ﻣﯽ ﺩﺍﺭﻧﺪ.
107
ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺗﯽ ﺑﻴﻦ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ SMTPﺑﺎ
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺯﺑﺎﻥ ﺳﺎﺩﻩ ﻣﺘﻨﯽ ﻭ ﺧﻮﺍﻧﺎ ،ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﯽ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﺮﻧﺎﻣﻪ
ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺧﻮﺩ ﺭﺍ ﻣﻌﺮﻓﯽ ،ﺁﺩﺭﺱ ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﮔﻴﺮﻧﺪﻩ ﻭ ﻣﺤﺘﻮﻳﺎﺕ ﭘﻴﺎﻡ ﺭﺍ ﻣﺸﺨﺺ
ﺧﻮﺍﻫﺪ ﮐﺮﺩ ) .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﻧﺎﻣﻪ telnetﻣﯽ ﺗﻮﺍﻥ ﺑﺎ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﯽ
ﻭ ﺍﺯ ﻃﺮﻳﻖ ﭘﻮﺭﺕ ٢٥ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﮐﺮﺩ(.ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ SMTPﺍﺯ ﺩﺳﺘﻮﺭﺍﺕ ﺳﺎﺩﻩ ﺍﯼ
ﻧﻈﻴﺮ HELLO,MAIL,RCPT,DATAﻭ ...ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﺪ.
.HELLOﻣﻌﺮﻓﯽ ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ •
108
ﺭﺍﺩﻳﻮ ﺍﻳﻨﺘﺮﻧﺘﯽ
ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭ ﻋﺮﺻﻪ ﭘﺨﺶ ﺻﻮﺕ ) ﺻﺪﺍ ( ﻭ ﺗﺼﻮﻳﺮ ،ﻧﻴﺰ ﺗﺤﻮﻻﺕ ﭼﺸﻤﮕﻴﺮﯼ ﺭﺍ
ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩﻩ ﺍﺳﺖ .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ،ﻣﻬﻤﺘﺮﻳﻦ ﺗﺤﻮﻝ ﺩﺭ ﺯﻣﻴﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
ﺭﺍﺩﻳﻮ ﺍﺯ ﺳﺎﻝ ١٩٢٠ﺍﺳﺖ .ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﺍﺯ ﺍﻭﺍﺧﺮ ﺳﺎﻝ ١٩٩٠ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﺟﺪﯼ
ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﺍﻧﺪ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﺍﺩﻳﻮﻫـﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﻣﯽ ﺗﻮﺍﻥ ﺍﺯ ﻫﺮ ﻣﺤﻞ ﻭ ﺗﻮﺳﻂ ﺻﺮﻓﺎ" ﻳـﮏ
ﺩﺳﺘﮕﺎﻩ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﻣﻨﺘﺸﺮ ﺷﺪﻩ ،ﺩﺳﺘﻴﺎﺑﯽ ﭘﻴﺪﺍ ﮐﺮﺩ.
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﺍﺩﻳﻮ ﺑﻪ ﻣﻨﻈﻮﺭ ﻧﺸﺮ ﺍﻃﻼﻋﺎﺕ ،ﺍﺯ ﺍﻭﺍﻳﻞ ﺳﺎﻝ ١٩٢٠ﻣﻄﺮﺡ ﮔﺮﺩﻳﺪ .ﺩﺭ ﺳﺎﻝ
١٩٥٤ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺍﺑﺪﺍﻉ ﺗﺮﺍﺗﺰﻳﺴﺘﻮﺭ ،ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﺍﺩﻳﻮ ﺑﺸﺪﺕ ﺭﺷﺪ ﻭ ﻣﺘﺪﺍﻭﻝ ﮔﺮﺩﻳﺪ.
ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﺩﺭ ﺍﻭﺍﺧﺮ ﻗﺮﻥ ﺑﻴﺴﺘﻢ ﻭ ﺍﻭﺍﻳﻞ ﻗﺮﻥ ﺑﻴﺴﺖ ﻭ ﻳﮑﻢ ﻣﻄﺮﺡ ﻭ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ
ﺯﻳﺮﺳﺎﺧﺖ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺴﺮﻋﺖ ﺑﺎ ﺍﺳﺘﻘﺒﺎﻝ ﻣﻮﺍﺟﻪ ﮔﺮﺩﻳﺪﻧﺪ .ﺑﺮﺍﯼ ﺩﺳﺘﻴﺎﺑﯽ ﺑﻪ ﺭﺍﺩﻳﻮﻫﺎﯼ
ﺍﻳﻨﺘﺮﻧﺘﯽ ﺑﻪ ﻳﮑﺪﺳﺘﮕﺎﻩ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﺨﺼﯽ ﻭ ﺍﻳﻨﺘﺮﻧﺖ ﻧﻴﺎﺯ ﺍﺳﺖ .ﺩﺳﺘﻴﺎﺑﯽ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ
ﺑﺼﻮﺭﺕ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ،ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﺭﺍ ﺩﺭ ﺍﺗﻮﻣﺒﻴﻞ PDA ،ﻭ ﺗﻠﻔﻦ
ﻫﺎﯼ ﺳﻠﻮﻟﯽ ﻓﺮﺍﻫﻢ ﮐﺮﺩﻩ ﺍﺳﺖ .ﻧﺴﻞ ﺟﺪﻳﺪ ﺩﺳﺘﮕﺎﻫﻬﺎﯼ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ،ﺩﺍﺭﺍﯼ ﻗﺎﺑﻠﻴﺖ ﻫﺎﯼ
ﮔﺴﺘﺮﺩﻩ ﺍﯼ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﯽ ﺑﻪ ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ.
ﺍﻣﻮﺍﺝ ﺭﺍﺩﻳﻮﺋﯽ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺱ ) ﺻﺪﻫﺎ ﺍﻳﺴﺘﮕﺎﻩ ﻣﺤﻠﯽ ﻣﻤﮑﻦ ﺍﺳﺖ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ •
ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﺩﺍﺭﺍﯼ ﻣﺤﺪﻭﺩﻳﺖ ﺟﻐﺮﺍﻓﻴﺎﺋﯽ ﻧﻤﯽ ﺑﺎﺷﻨﺪ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺍﻧﺘﺸﺎﺭ ﺍﻃﻼﻋﺎﺕ
ﺗﻮﺳﻂ ﻳﮏ ﺭﺍﺩﻳﻮﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﺩﺭ ﺷﺮﻕ ،ﻗﺎﺑﻞ ﺷﻨﻴﺪﻥ ﺩﺭ ﻏﺮﺏ ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
109
ﭘﺘﺎﻧﺴﻴﻞ ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﺑﺴﻴﺎﺭ ﮔﺴﺘﺮﺩﻩ ﺍﺳﺖ .ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ﺭﺍﺩﻳﻮﻫﺎﯼ
ﺳﻨﺘﯽ ﮐﻪ ﺻﺮﻓﺎ" ﺍﺯ ﺻﻮﺕ ﺑﺮﺍﯼ ﭘﺨﺶ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﯽ ﻧﻤﺎﻳﻨﺪ ،ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
ﺗﺼﺎﻭﻳﺮ ،ﮔﺮﺍﻓﻴﮏ ،ﻣﺘﻦ ،ﻟﻴﻨﮏ ﻫﺎﯼ ﻣﺮﺑﻮﻃﻪ ﻭ ﺍﺭﺗﺒﺎﻁ ﻣﺘﻘﺎﺑﻞ ﺑﺎ ﺷﻨﻮﻧﺪﻩ ﺭﺍ ﻧﻴﺰ ﺍﺭﺍﺋﻪ
ﻣﯽ ﺩﻫﻨﺪ.
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺎﻫﻴﺖ ﻋﻤﻠﮑﺮﺩ ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﺎﻥ ﺩﺭ ﻣﻮﺍﺭﺩ ﻣﺘﻌﺪﺩﯼ
ﺗﻮﺻﻴﻪ ﻣﯽ ﮔﺮﺩﺩ .ﻣﺜﻼ" ﺩﺭ ﻳﮏ ﺳﻴﺴﺘﻢ ﺁﻣﻮﺯﺷﯽ ﻭ ﻳﺎ ﺁﻣﻮﺯﺵ ﻫﺎﯼ ﻣﺒﺘﻨﯽ ﺑﺮ ﻭﺏ ،ﺍﺳﺘﻔﺎﺩﻩ
ﺍﺯ ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﺑﻪ ﻣﻨﻈﻮﺭ ﻧﺸﺮ ﺍﻃﻼﻋﺎﺕ ﺑﺴﻴﺎﺭ ﺣﺎﺋﺰ ﺍﻫﻤﻴﺖ ﺍﺳﺖ .ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ
ﺍﺯ ﻃﻴﻒ ﮔﺴﺘﺮﺩﻩ ﺍﯼ ﺍﺯ ﺍﻣﻮﺍﺝ ﺑﺮﺍﯼ ﻧﺸﺮ ﺍﻃﻼﻋﺎﺕ ﺧﺼﻮﺻﺎ" ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻣﻮﺯﻳﮏ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﯽ ﻧﻤﺎﻳﻨﺪ.
ﮐﺎﻣﭙﻴﻮﺗﺮ
ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﯼ ﻭﻳﺮﺍﻳﺶ ﻭ ﺿﺒﻂ ﺻﺪﺍ •
ﻣﻴﮑﺮﻭﻓﻦ •
ﺑﺮﺍﯼ ﻧﺸﺮ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﻃﺮﻳﻖ ﺭﺍﺩﻳﻮﻫﺎﯼ ﺍﻳﻨﺘﺮﻧﺘﯽ ﻣﺮﺍﺣﻞ ﺯﻳﺮ ﺩﻧﺒﺎﻝ ﻣﯽ ﮔﺮﺩﺩ:
110
ﺍﻃﻼﻋﺎﺕ ﺻﻮﺗﯽ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﮐﺎﺭﺕ ﺻﺪﺍ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﻭﺍﺭﺩ ﻣﯽ ﮔﺮﺩﻧﺪ. •
ﺗﺒﺪﻳﻞ ﻣﯽ ﻧﻤﺎﻳﺪ. Streaming ﻳﺴﺘﻢ ﻓﻮﻕ ،ﺍﻃﻼﻋﺎﺕ ﺻﻮﺗﯽ ﺩﺭﻳﺎﻓﺘﯽ ﺭﺍ ﺑﻪ ﻓﺮﻣﺖ •
ﺍﻃﻼﻋﺎ ﺕ ﺻﻮﺗﯽ ﺩﺭﻳﺎﻓﺘﯽ ،ﻧﻤﻮﻧﻪ ﺳﺎﺯﯼ ﻭ ﭘﺲ ﺍﺯ ﻗﺸﺮﺩﻩ ﺳﺎﺯﯼ ﺁﻣﺎﺩﻩ ﺍﺭﺳﺎﻝ ﺑﺮ
ﺭﻭﯼ ﺍﻳﻨﺘﺮﻧﺖ ﺧﻮﺍﻫﻨﺪ ﺷﺪ.
ﺍﻃﻼﻋﺎﺕ ﺻﻮﺗﯽ ﻓﺸﺮﺩﻩ ﺷﺪﻩ ،ﺑﺮﺍﯼ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺍﺭﺳﺎﻝ ﻣﯽ ﮔﺮﺩﻧﺪ .ﺳﺮﻭﻳﺲ •
111
ﺍﻓﺰﺍﺭ ﻣﺮﺑﻮﻃﻪ ﺑﺮ ﺭﻭﯼ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ streamingﻗﺮﺍﺭ ﺧﻮﺍﻫﻨﺪ ﮔﺮﻓﺖ .ﺑﺎﺗﻮﺟﻪ ﺑﻪ
ﺣﺠﻢ ﺑﺎﻻﯼ ﻋﻤﻠﻴﺎﺕ ﻣﺤﺎﺳﺒﺎﺗﯽ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ Streamingﻣﯽ ﺑﺎﻳﺴﺖ ﻳﮏ ﺳﺮﻭﻳﺲ
ﺩﻫﻨﺪﻩ ﻗﺪﺭﺗﻤﻨﺪ ﻭ ﺍﺧﺘﺼﺎﺻﯽ ﺑﺎﺷﺪ.
112
113
ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ
114
ﻳﮏ ﺷﺒﮑﻪ LANﺩﺭ ﺳﺎﺩﻩ ﺗﺮﻳﻦ ﺣﺎﻟﺖ ﺍﺯ ﺍﺟﺰﺍﻱ ﺯﻳﺮ ﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺍﺳﺖ:
ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﺨﺼﻲ .ﻳﮏ ﺷﺒﮑﻪ ﻣﻲ ﺗﻮﺍﻧﺪ ﺷﺎﻣﻞ ﭼﻨﺪ ﺻﺪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﺎﺷﺪ .ﺣﺪﺍﻗﻞ •
ﺍﺳﺖ ﮐﻪ ﺑﺮﺍﻱ ﻣﻮﺩﻡ ﻭ ﺻﺪﺍ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﻣﺴﺌﻮﻝ
ﺩﺭﻳﺎﻓﺖ ،ﺍﻧﺘﻘﺎﻝ ،ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﻭ ﺫﺧﻴﺮﻩ ﺳﺎﺯﻱ ﻣﻮﻗﺖ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻃﻮﻝ ﺷﺒﮑﻪ ﺍﺳﺖ.
ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺠﺎﻡ ﻭﻇﺎﻳﻒ ﻓﻮﻕ ﮐﺎﺭﺕ ﻫﺎﻱ ﺷﺒﮑﻪ ﺩﺍﺭﺍﻱ ﭘﺮﺩﺍﺯﻧﺪﻩ ،ﺣﺎﻓﻈﻪ ﻭ ﮔﺬﺭﮔﺎﻩ
ﺍﺧﺘﺼﺎﺻﻲ ﺧﻮﺩ ﻫﺴﺘﻨﺪ.
ﺗﻘﺴﻴﻢ ﺑﻨﺪﻱ ﺑﺮ ﺍﺳﺎﺱ ﺗﻮﭘﻮﻟﻮﮊﻱ
ﺍﻟﮕﻮﻱ ﻫﻨﺪﺳﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺟﻬﺖ ﺍﺗﺼﺎﻝ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ،ﺗﻮﭘﻮﻟﻮﮊﻱ ﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ.
ﺗﻮﭘﻮﻟﻮﮊﻱ ﺍﻧﺘﺨﺎﺏ ﺷﺪﻩ ﺑﺮﺍﻱ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺷﺒﮑﻪ ﻫﺎ ،ﻋﺎﻣﻠﻲ ﻣﻬﻢ ﺩﺭ ﺟﻬﺖ ﮐﺸﻒ ﻭ ﺑﺮﻃﺮﻑ
ﻧﻤﻮﺩﻥ ﺧﻄﺎﺀ ﺩﺭ ﺷﺒﮑﻪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺍﻧﺘﺨﺎﺏ ﻳﮏ ﺗﻮﭘﻮﻟﻮﮊﻱ ﺧﺎﺹ ﻧﻤﻲ ﺗﻮﺍﻧﺪ ﺑﺪﻭﻥ ﺍﺭﺗﺒﺎﻁ
ﺑﺎ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﻭ ﺭﻭﺵ ﻫﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﻂ ﻣﻄﺮﺡ ﮔﺮﺩﺩ .ﻧﻮﻉ ﺗﻮﭘﻮﻟﻮﮊﻱ ﺍﻧﺘﺨﺎﺑﻲ ﺟﻬﺖ
ﺍﺗﺼﺎﻝ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ،ﻣﺴﺘﻘﻴﻤﺎ" ﺑﺮ ﻧﻮﻉ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﻭ ﺭﻭﺵ ﻫﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﻂ
ﺗﺎﺛﻴﺮ ﻣﻲ ﮔﺬﺍﺭﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺗﺎﺛﻴﺮ ﻣﺴﺘﻘﻴﻢ ﺗﻮﭘﻮﻟﻮﮊﻱ ﺍﻧﺘﺨﺎﺑﻲ ﺩﺭ ﻧﻮﻉ ﮐﺎﺑﻞ ﮐﺸﻲ ﻭ ﻫﺰﻳﻨﻪ
ﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﻥ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺎ ﺩﻗﺖ ﻭ ﺗﺎﻣﻞ ﺑﻪ ﺍﻧﺘﺨﺎﺏ ﺗﻮﭘﻮﻟﻮﮊﻱ ﻳﮏ ﺷﺒﮑﻪ ﻫﻤﺖ
115
ﮔﻤﺎﺷﺖ .ﻋﻮﺍﻣﻞ ﻣﺨﺘﻠﻔﻲ ﺟﻬﺖ ﺍﻧﺘﺨﺎﺏ ﻳﮏ ﺗﻮﭘﻮﻟﻮﮊﻱ ﺑﻬﻴﻨﻪ ﻣﻄﺮﺡ ﻣﻲ ﺷﻮﺩ .ﻣﻬﻤﺘﺮﻳﻦ ﺍﻳﻦ
ﻋﻮﺍﻣﻞ ﺑﺸﺮﺡ ﺫﻳﻞ ﺍﺳﺖ:
-ﻫﺰﻳﻨﻪ .ﻫﺮ ﻧﻮﻉ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﮐﻪ ﺑﺮﺍﻱ ﺷﺒﮑﻪ LANﺍﻧﺘﺨﺎﺏ ﮔﺮﺩﺩ ،ﺩﺭ ﻧﻬﺎﻳﺖ ﻣﻲ ﺑﺎﻳﺴﺖ
ﻋﻤﻠﻴﺎﺕ ﻧﺼﺐ ﺷﺒﮑﻪ ﺩﺭ ﻳﮏ ﺳﺎﺧﺘﻤﺎﻥ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﮔﺮﺩﺩ .ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﻓﺮﺁﻳﻨﺪﻱ ﻃﻮﻻﻧﻲ
ﺟﻬﺖ ﻧﺼﺐ ﮐﺎﻧﺎﻝ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺑﻪ ﮐﺎﺑﻞ ﻫﺎ ﻭ ﻣﺤﻞ ﻋﺒﻮﺭ ﮐﺎﺑﻞ ﻫﺎ ﺩﺭ ﺳﺎﺧﺘﻤﺎﻥ ﺍﺳﺖ .ﺩﺭ
ﺣﺎﻟﺖ ﺍﻳﺪﻩ ﺁﻝ ﮐﺎﺑﻞ ﮐﺸﻲ ﻭ ﺍﻳﺠﺎﺩ ﮐﺎﻧﺎﻝ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﻗﺒﻞ ﺍﺯ ﺗﺼﺮﻑ ﻭ
ﺑﮑﺎﺭﮔﻴﺮﻱ ﺳﺎﺧﺘﻤﺎﻥ ﺍﻧﺠﺎﻡ ﮔﺮﻓﺘﻪ ﺑﺎﺷﺪ .ﺑﻬﺮﺣﺎﻝ ﻣﻲ ﺑﺎﻳﺴﺖ ﻫﺰﻳﻨﻪ ﻧﺼﺐ ﺷﺒﮑﻪ ﺑﻬﻴﻨﻪ ﮔﺮﺩﺩ.
-ﺍﻧﻌﻄﺎﻑ ﭘﺬﻳﺮﻱ .ﻳﮑﻲ ﺍﺯ ﻣﺰﺍﻳﺎﻱ ﺷﺒﮑﻪ ﻫﺎﻱ ،LANﺗﻮﺍﻧﺎﺋﻲ ﭘﺮﺩﺍﺯﺵ ﺩﺍﺩﻩ ﻫﺎ ﻭ
ﮔﺴﺘﺮﺩﮔﻲ ﻭ ﺗﻮﺯﻳﻊ ﮔﺮﻩ ﻫﺎ ﺩﺭ ﻳﮏ ﻣﺤﻴﻂ ﺍﺳﺖ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺗﻮﺍﻥ ﻣﺤﺎﺳﺒﺎﺗﻲ ﺳﻴﺴﺘﻢ ﻭ
ﻣﻨﺎﺑﻊ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺗﻤﺎﻡ ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻨﺪﮔﺎﻥ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﮔﺮﻓﺖ .ﺩﺭ ﺍﺩﺍﺭﺍﺕ ﻫﻤﻪ ﭼﻴﺰ
ﺗﻐﻴﻴﺮ ﺧﻮﺍﻫﺪ ﮐﺮﺩ).ﻟﻮﺍﺯﻡ ﺍﺩﺍﺭﻱ ،ﺍﺗﺎﻗﻬﺎ ﻭ .(...ﺗﻮﭘﻮﻟﻮﮊﻱ ﺍﻧﺘﺨﺎﺑﻲ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺴﺎﺩﮔﻲ ﺍﻣﮑﺎﻥ
ﺗﻐﻴﻴﺮ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺩﺭ ﺷﺒﮑﻪ ﺭﺍ ﻓﺮﺍﻫﻢ ﻧﻤﺎﻳﺪ .ﻣﺜﻼ" ﺍﻳﺴﺘﮕﺎﻫﻲ ﺭﺍ ﺍﺯ ﻧﻘﻄﻪ ﺍﻱ ﺑﻪ ﻧﻘﻄﻪ ﺩﻳﮕﺮ
ﺍﻧﺘﻘﺎﻝ ﻭ ﻳﺎ ﻗﺎﺩﺭ ﺑﻪ ﺍﻳﺠﺎﺩ ﻳﮏ ﺍﻳﺴﺘﮕﺎﻩ ﺟﺪﻳﺪ ﺩﺭ ﺷﺒﮑﻪ ﺑﺎﺷﻴﻢ.
ﺳﻪ ﻧﻮﻉ ﺗﻮﭘﻮﻟﻮﮊﻱ ﺭﺍﻳﺞ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ LANﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ:
BUS
STAR
RING
ﺗﻮﭘﻮﻟﻮﮊﻱ BUS
ﻳﮑﻲ ﺍﺯ ﺭﺍﻳﺠﺘﺮﻳﻦ ﺗﻮﭘﻮﻟﻮﮊﻱ ﻫﺎ ﺑﺮﺍﻱ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺷﺒﮑﻪ ﻫﺎﻱ LANﺍﺳﺖ .ﺩﺭ ﻣﺪﻝ
ﻓﻮﻕ ﺍﺯ ﻳﮏ ﮐﺎﺑﻞ ﺑﻪ ﻋﻨﻮﺍﻥ ﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ ﺍﺻﻠﻲ ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﻭ ﺗﻤﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ
ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ )ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ،ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ( ﺑﻪ ﺁﻥ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ.
116
ﻣﺰﺍﻳﺎﻱ ﺗﻮﭘﻮﻟﻮﮊﻱ BUS
ﮐﻢ ﺑﻮﺩﻥ ﻃﻮﻝ ﮐﺎﺑﻞ .ﺑﺪﻟﻴﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺧﻂ ﺍﻧﺘﻘﺎﻝ ﺟﻬﺖ ﺍﺗﺼﺎﻝ ﺗﻤﺎﻡ •
ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ،ﺩﺭ ﺗﻮﭘﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺍﺯ ﮐﺎﺑﻞ ﮐﻤﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ .ﻣﻮﺿﻮﻉ ﻓﻮﻕ ﺑﺎﻋﺚ
ﭘﺎﻳﻴﻦ ﺁﻣﺪﻥ ﻫﺰﻳﻨﻪ ﻧﺼﺐ ﻭ ﺍﻳﺠﺎﺩ ﺗﺴﻬﻴﻼﺕ ﻻﺯﻡ ﺩﺭ ﺟﻬﺖ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺷﺒﮑﻪ ﺧﻮﺍﻫﺪ
ﺑﻮﺩ.
ﺳﺎﺧﺘﺎﺭ ﺳﺎﺩﻩ .ﺗﻮﭘﻮﻟﻮﮊﻱ BUSﺩﺍﺭﺍﻱ ﻳﮏ ﺳﺎﺧﺘﺎﺭ ﺳﺎﺩﻩ ﺍﺳﺖ .ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ •
ﮐﺮﺩ .ﺩﺭ ﺻﻮﺭﺕ ﺍﺿﺎﻓﻪ ﺷﺪﻥ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﺑﻴﺸﺘﺮ ﺩﺭ ﻳﮏ ﺳﮕﻤﻨﺖ ،ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ
ﺗﻘﻮﻳﺖ ﮐﻨﻨﺪﻩ ﻫﺎﺋﻲ ﺑﻪ ﻧﺎﻡ Repeaterﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ.
ﺍﺷﺘﺒﺎﻩ ﺭﺍ ﮐﺎﻫﺶ ﻣﻲ ﺩﻫﻨﺪ ،ﻭﻟﻲ ﺩﺭ ﺻﻮﺭﺕ ﺑﺮﻭﺯ ﺧﻄﺎﺀ ﮐﺸﻒ ﺁﻥ ﺳﺎﺩﻩ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ.
ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﺋﻲ ﮐﻪ ﺍﺯ ﺗﻮﭘﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﮐﻨﺘﺮﻝ ﺷﺒﮑﻪ ﺩﺭ ﻫﺮ ﮔﺮﻩ
ﺩﺍﺭﺍﻱ ﻣﺮﮐﺰﻳﺖ ﻧﺒﻮﺩﻩ ﻭ ﺩﺭ ﺻﻮﺭﺕ ﺑﺮﻭﺯ ﺧﻄﺎﺀ ﻣﻲ ﺑﺎﻳﺴﺖ ﻧﻘﺎﻁ ﺯﻳﺎﺩﻱ ﺑﻪ ﻣﻨﻈﻮﺭ
ﺗﺸﺨﻴﺺ ﺧﻄﺎﺀ ﺑﺎﺯﺩﻳﺪ ﻭ ﺑﺮﺭﺳﻲ ﮔﺮﺩﻧﺪ.
ﺍﻳﺰﻭﻟﻪ ﮐﺮﺩﻥ ﺧﻄﺎﺀ ﻣﺸﮑﻞ ﺍﺳﺖ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺭ ﺗﻮﭘﻮﻟﻮﮊﻱ ﻓﻮﻕ •
ﺩﭼﺎﺭ ﻣﺸﮑﻞ ﮔﺮﺩﺩ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺭﺍ ﺩﺭ ﻣﺤﻠﻲ ﮐﻪ ﺑﻪ ﺷﺒﮑﻪ ﻣﺘﺼﻞ ﺍﺳﺖ ﺭﻓﻊ
ﻋﻴﺐ ﻧﻤﻮﺩ .ﺩﺭ ﻣﻮﺍﺭﺩ ﺧﺎﺹ ﻣﻲ ﺗﻮﺍﻥ ﻳﮏ ﮔﺮﻩ ﺭﺍ ﺍﺯ ﺷﺒﮑﻪ ﺟﺪﺍ ﮐﺮﺩ .ﺩﺭ ﺣﺎﻟﺘﻴﮑﻪ
ﺍﺷﮑﺎﻝ ﺩﺭ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺑﺎﺷﺪ ،ﺗﻤﺎﻡ ﻳﮏ ﺳﮕﻤﻨﺖ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﺷﺒﮑﻪ ﺧﺎﺭﺝ ﮔﺮﺩﺩ.
ﻣﺎﻫﻴﺖ ﺗﮑﺮﺍﺭﮐﻨﻨﺪﻩ ﻫﺎ .ﺩﺭ ﻣﻮﺍﺭﺩﻳﮑﻪ ﺑﺮﺍﻱ ﺗﻮﺳﻌﻪ ﺷﺒﮑﻪ ﺍﺯ ﺗﮑﺮﺍﺭﮐﻨﻨﺪﻩ ﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ •
ﻣﻲ ﮔﺮﺩﺩ ،ﻣﻤﮑﻦ ﺍﺳﺖ ﺩﺭ ﺳﺎﺧﺘﺎﺭ ﺷﺒﮑﻪ ﺗﻐﻴﻴﺮﺍﺗﻲ ﻧﻴﺰ ﺩﺍﺩﻩ ﺷﻮﺩ .ﻣﻮﺿﻮﻉ ﻓﻮﻕ
ﻣﺴﺘﻠﺰﻡ ﺑﮑﺎﺭﮔﻴﺮﻱ ﮐﺎﺑﻞ ﺑﻴﺸﺘﺮ ﻭ ﺍﺿﺎﻓﻪ ﻧﻤﻮﺩﻥ ﺍﺗﺼﺎﻻﺕ ﻣﺨﺼﻮﺹ ﺷﺒﮑﻪ ﺍﺳﺖ.
117
ﺗﻮﭘﻮﻟﻮﮊﻱ STAR
ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺗﻮﭘﻮﻟﻮﮊﻱ ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﺍﺯ ﻧﺎﻡ ﺁﻥ ﻣﺸﺨﺺ ﺍﺳﺖ ،ﺍﺯ ﻣﺪﻟﻲ ﺷﺒﻴﻪ
"ﺳﺘﺎﺭﻩ" ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺍﻳﻦ ﻣﺪﻝ ﺗﻤﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻣﻌﻤﻮﻻ" ﺑﻪ ﻳﮏ
ﺩﺳﺘﮕﺎﻩ ﺧﺎﺹ ﺑﺎ ﻧﺎﻡ " ﻫﺎﺏ " ﻣﺘﺼﻞ ﺧﻮﺍﻫﻨﺪ ﺷﺪ.
ﻧﻘﻄﻪ ﻣﺮﮐﺰﻱ ﺍﺳﺖ .ﻭﻳﮋﮔﻲ ﻓﻮﻕ ﺗﻐﻴﻴﺮ ﺩﺭ ﺳﺎﺧﺘﺎﺭ ﻭ ﺳﺮﻭﻳﺲ ﺷﺒﮑﻪ ﺭﺍ ﺁﺳﺎﻥ
ﻣﻲ ﻧﻤﺎﻳﺪ.
ﺩﺭ ﻫﺮ ﺍﺗﺼﺎﻝ ﻳﮑﺪﺳﺘﮕﺎﻩ .ﻧﻘﺎﻁ ﺍﺗﺼﺎﻟﻲ ﺩﺭ ﺷﺒﮑﻪ ﺫﺍﺗﺎ" ﻣﺴﺘﻌﺪ ﺍﺷﮑﺎﻝ ﻫﺴﺘﻨﺪ .ﺩﺭ •
ﻫﺮ ﺍﻳﺴﺘﮕﺎﻩ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻣﺘﺼﻞ ﺍﺳﺖ ،ﺍﺷﮑﺎﻻﺕ ﻭ ﺍﻳﺮﺍﺩﺍﺕ ﺩﺭ ﺷﺒﮑﻪ ﺑﺴﺎﺩﮔﻲ
ﺗﺸﺨﻴﺺ ﻭ ﻣﻬﺎﺭ ﺧﻮﺍﻫﻨﺪ ﮔﺮﺩﻳﺪ.
ﺭﻭﺵ ﻫﺎﻱ ﺳﺎﺩﻩ ﺩﺳﺘﻴﺎﺑﻲ .ﻫﺮ ﺍﺗﺼﺎﻝ ﺩﺭ ﺷﺒﮑﻪ ﺷﺎﻣﻞ ﻳﮏ ﻧﻘﻄﻪ ﻣﺮﮐﺰﻱ ﻭ ﻳﮏ ﮔﺮﻩ •
ﺟﺎﻧﺒﻲ ﺍﺳﺖ .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺣﻬﺖ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ
ﺍﻃﻼﻋﺎﺕ ﺩﺍﺭﺍﻱ ﺍﻟﮕﻮﺭﻳﺘﻤﻲ ﺳﺎﺩﻩ ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
ﻣﻌﺎﻳﺐ ﺗﻮﭘﻮﻟﻮﮊﻱ STAR
ﺯﻳﺎﺩ ﺑﻮﺩﻥ ﻃﻮﻝ ﮐﺎﺑﻞ .ﺑﺪﻟﻴﻞ ﺍﺗﺼﺎﻝ ﻣﺴﺘﻘﻴﻢ ﻫﺮ ﮔﺮﻩ ﺑﻪ ﻧﻘﻄﻪ ﻣﺮﮐﺰﻱ ،ﻣﻘﺪﺍﺭ ﺯﻳﺎﺩﻱ •
ﮐﺎﺑﻞ ﻣﺼﺮﻑ ﻣﻲ ﺷﻮﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﻫﺰﻳﻨﻪ ﮐﺎﺑﻞ ﻧﺴﺒﺖ ﺑﻪ ﺗﻤﺎﻡ ﺷﺒﮑﻪ،ﮐﻢ ﺍﺳﺖ،
118
ﺗﺮﺍﮐﻢ ﺩﺭ ﮐﺎﻧﺎﻝ ﮐﺸﻲ ﺟﻬﺖ ﮐﺎﺑﻞ ﻫﺎ ﻭ ﻣﺴﺎﺋﻞ ﻣﺮﺑﻮﻁ ﺑﻪ ﻧﺼﺐ ﻭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺁﻧﻬﺎ
ﺑﻄﻮﺭ ﻗﺎﺑﻞ ﺗﻮﺟﻬﻲ ﻫﺰﻳﻨﻪ ﻫﺎ ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﺧﻮﺍﻫﺪ ﺩﺍﺩ.
ﻣﺸﮑﻞ ﺑﻮﺩﻥ ﺗﻮﺳﻌﻪ .ﺍﺿﺎﻓﻪ ﻧﻤﻮﺩﻥ ﻳﮏ ﮔﺮﻩ ﺟﺪﻳﺪ ﺑﻪ ﺷﺒﮑﻪ ﻣﺴﺘﻠﺰﻡ ﻳﮏ ﺍﺗﺼﺎﻝ ﺍﺯ •
ﻧﻘﻄﻪ ﻣﺮﮐﺰﻱ ﺑﻪ ﮔﺮﻩ ﺟﺪﻳﺪ ﺍﺳﺖ .ﺑﺎ ﺍﻳﻨﮑﻪ ﺩﺭ ﺯﻣﺎﻥ ﮐﺎﺑﻞ ﮐﺸﻲ ﭘﻴﺶ ﺑﻴﻨﻲ ﻫﺎﻱ ﻻﺯﻡ
ﺟﻬﺖ ﺗﻮﺳﻌﻪ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﻣﻲ ﺷﻮﺩ ،ﻭﻟﻲ ﺩﺭ ﺑﺮﺧﻲ ﺣﺎﻻﺕ ﻧﻈﻴﺮ ﺯﻣﺎﻧﻴﮑﻪ ﻃﻮﻝ
ﺯﻳﺎﺩﻱ ﺍﺯ ﮐﺎﺑﻞ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺑﻮﺩﻩ ﻭ ﻳﺎ ﺍﺗﺼﺎﻝ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﮔﺮﻩ ﻫﺎﻱ ﻏﻴﺮ ﻗﺎﺑﻞ ﭘﻴﺶ
ﺑﻴﻨﻲ ﺍﻭﻟﻴﻪ ،ﺗﻮﺳﻌﻪ ﺷﺒﮑﻪ ﺭﺍ ﺑﺎ ﻣﺸﮑﻞ ﻣﻮﺍﺟﻪ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
ﻭﺍﺑﺴﺘﮕﻲ ﺑﻪ ﻧﻘﻄﻪ ﻣﺮﮐﺰﻱ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻧﻘﻄﻪ ﻣﺮﮐﺰﻱ )ﻫﺎﺏ( ﺩﺭ ﺷﺒﮑﻪ ﺑﺎ ﻣﺸﮑﻞ •
ﺗﻮﭘﻮﻟﻮﮊﻱ RING
ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺗﻮﭘﻮﻟﻮﮊﻱ ﺗﻤﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺑﺼﻮﺭﺕ ﻳﮏ ﺣﻠﻘﻪ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺮﺗﺒﻂ
ﻣﻲ ﮔﺮﺩﻧﺪ .ﺗﻤﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ )ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ،ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ( ﺑﻪ ﻳﮏ
ﮐﺎﺑﻞ ﮐﻪ ﺑﺼﻮﺭﺕ ﻳﮏ ﺩﺍﻳﺮﻩ ﺑﺴﺘﻪ ﺍﺳﺖ ،ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ﻫﺮ ﮔﺮﻩ ﺑﻪ ﺩﻭ ﻭ
ﻓﻘﻂ ﺩﻭ ﻫﻤﺴﺎﻳﻪ ﻣﺠﺎﻭﺭ ﺧﻮﺩ ﻣﺘﺼﻞ ﺍﺳﺖ .ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﮔﺮﻩ ﻣﺠﺎﻭﺭ ﺩﺭﻳﺎﻓﺖ ﻭ ﺑﻪ ﮔﺮﻩ ﺑﻌﺪﻱ
ﺍﺭﺳﺎﻝ ﻣﻲ ﺷﻮﻧﺪ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺩﺍﺩﻩ ﻫﺎ ﻓﻘﻂ ﺩﺭ ﻳﮏ ﺟﻬﺖ ﺣﺮﮐﺖ ﮐﺮﺩﻩ ﻭ ﺍﺯ ﺍﻳﺴﺘﮕﺎﻫﻲ ﺑﻪ
ﺍﻳﺴﺘﮕﺎﻩ ﺩﻳﮕﺮ ﺍﻧﺘﻘﺎﻝ ﭘﻴﺪﺍ ﻣﻲ ﮐﻨﻨﺪ.
119
ﮐﺎﻫﺶ ﺗﻌﺪﺍﺩ ﺍﺗﺼﺎﻻﺕ )ﮐﺎﻧﮑﺘﻮﺭ( ﺩﺭ ﺷﺒﮑﻪ ﺷﺪﻩ ﻭ ﺿﺮﻳﺐ ﺍﻋﺘﻤﺎﺩ ﺑﻪ ﺷﺒﮑﻪ ﺭﺍ
ﺍﻓﺰﺍﻳﺶ ﺧﻮﺍﻫﺪ ﺩﺍﺩ.
ﻧﻴﺎﺯ ﺑﻪ ﻓﻀﺎﺋﻲ ﺧﺎﺹ ﺟﻬﺖ ﺍﻧﺸﻌﺎﺑﺎﺕ ﺩﺭ ﮐﺎﺑﻞ ﮐﺸﻲ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ.ﺑﺪﻟﻴﻞ ﺍﺳﺘﻔﺎﺩﻩ •
ﺍﺯ ﻳﮏ ﮐﺎﺑﻞ ﺟﻬﺖ ﺍﺗﺼﺎﻝ ﻫﺮ ﮔﺮﻩ ﺑﻪ ﮔﺮﻩ ﻫﻤﺴﺎﻳﻪ ﺍﺵ ،ﺍﺧﺘﺼﺎﺹ ﻣﺤﻞ ﻫﺎﺋﻲ
ﺧﺎﺹ ﺑﻪ ﻣﻨﻈﻮﺭ ﮐﺎﺑﻞ ﮐﺸﻲ ﺿﺮﻭﺭﺗﻲ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ.
ﻣﻨﺎﺳﺐ ﺟﻬﺖ ﻓﻴﺒﺮ ﻧﻮﺭﻱ .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺑﺎﻋﺚ ﺑﺎﻻ ﺭﻓﺘﻦ ﻧﺮﺥ ﺳﺮﻋﺖ •
ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺖ .ﭼﻮﻥ ﺩﺭ ﺗﻮﭘﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺗﺮﺍﻓﻴﮏ ﺩﺍﺩﻩ ﻫﺎ ﺩﺭ ﻳﮏ
ﺟﻬﺖ ﺍﺳﺖ ،ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ .ﺩﺭ ﺻﻮﺭﺕ
ﺗﻤﺎﻳﻞ ﻣﻲ ﺗﻮﺍﻥ ﺩﺭ ﻫﺮ ﺑﺨﺶ ﺍﺯﺷﺒﮑﻪ ﺍﺯ ﻳﮏ ﻧﻮﻉ ﮐﺎﺑﻞ ﺑﻪ ﻋﻨﻮﺍﻥ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ
ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ .ﻣﺜﻼ" ﺩﺭ ﻣﺤﻴﻂ ﻫﺎﻱ ﺍﺩﺭﺍﻱ ﺍﺯ ﻣﺪﻝ ﻫﺎﻱ ﻣﺴﻲ ﻭ ﺩﺭ ﻣﺤﻴﻂ ﮐﺎﺭﺧﺎﻧﻪ ﺍﺯ
ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ.
ﻣﻌﺎﻳﺐ ﺗﻮﭘﻮﻟﻮﮊﻱ RING
ﺍﺷﮑﺎﻝ ﺩﺭ ﻳﮏ ﮔﺮﻩ ﺑﺎﻋﺚ ﺍﺷﮑﺎﻝ ﺩﺭ ﺗﻤﺎﻡ ﺷﺒﮑﻪ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺻﻮﺭﺕ ﺑﺮﻭﺯ •
ﺍﺷﮑﺎﻝ ﺩﺭ ﻳﮏ ﮔﺮﻩ ،ﺗﻤﺎﻡ ﺷﺒﮑﻪ ﺑﺎ ﺍﺷﮑﺎﻝ ﻣﻮﺍﺟﻪ ﺧﻮﺍﻫﺪ ﺷﺪ .ﻭ ﺗﺎ ﺯﻣﺎﻧﻴﮑﻪ ﮔﺮﻩ
ﻣﻌﻴﻮﺏ ﺍﺯ ﺷﺒـﮑﻪ ﺧﺎﺭﺝ ﻧﮕﺮﺩﺩ ،ﻫــﻴﭽﮕﻮﻧﻪ ﺗﺮﺍﻓﻴــــﮏ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺭﻭﻱ ﺷﺒــﮑﻪ
ﻧﻤﻲ ﺗﻮﺍﻥ ﺩﺍﺷﺖ.
ﺍﺷﮑﺎﻝ ﺯﺩﺍﺋﻲ ﻣﺸﮑﻞ ﺍﺳﺖ .ﺑﺮﻭﺯ ﺍﺷﮑﺎﻝ ﺩﺭ ﻳﮏ ﮔﺮﻩ ﻣﻲ ﺗﻮﺍﻧﺪ ﺭﻭﻱ ﺗﻤﺎﻡ •
ﮔﺮﻫﻬﺎﻱ ﺩﻳﮕﺮ ﺗﺎﺛﻴﺮ ﮔﺬﺍﺭ ﺑﺎﺷﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﻋﻴﺐ ﻳﺎﺑﻲ ﻣﻲ ﺑﺎﻳﺴﺖ ﭼﻨﺪﻳﻦ ﮔﺮﻩ
ﺑﺮﺭﺳﻲ ﺗﺎ ﮔﺮﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﭘﻴﺪﺍ ﮔﺮﺩﺩ.
ﺗﻐﻴﻴﺮ ﺩﺭﺳﺎﺧﺘﺎﺭﺷﺒﮑﻪ ﻣﺸﮑﻞ ﺍﺳﺖ .ﺩﺭ ﺯﻣﺎﻥ ﮔﺴﺘﺮﺵ ﻭ ﻳﺎ ﺍﺻﻼﺡ ﺣﻮﺯﻩ •
ﺟﻐﺮﺍﻓﻴﺎﺋﻲ ﺗﺤﺖ ﭘﻮﺷﺶ ﺷﺒﮑﻪ ،ﺑﺪﻟﻴﻞ ﻣﺎﻫﻴﺖ ﺣﻠﻘﻮﻱ ﺷﺒﮑﻪ ﻣﺴﺎﺋﻠﻲ ﺑﻮﺟﻮﺩ ﺧﻮﺍﻫﺪ
ﺁﻣﺪ.
ﺗﻮﭘﻮﻟﻮﮊﻱ ﺑﺮ ﺭﻭﻱ ﻧﻮﻉ ﺩﺳﺘﻴﺎﺑﻲ ﺗﺎﺛﻴﺮ ﻣﻲ ﮔﺬﺍﺭﺩ .ﻫﺮ ﮔﺮﻩ ﺩﺭ ﺷﺒﮑﻪ ﺩﺍﺭﺍﻱ •
ﻣﺴﺌﻮﻟﻴﺖ ﻋﺒﻮﺭ ﺩﺍﺩﻥ ﺩﺍﺩﻩ ﺍﻱ ﺍﺳﺖ ﮐﻪ ﺍﺯ ﮔﺮﻩ ﻣﺠﺎﻭﺭ ﺩﺭﻳﺎﻓﺖ ﺩﺍﺷﺘﻪ ﺍﺳﺖ .ﻗﺒﻞ ﺍﺯ
120
ﺍﻳﻨﮑﻪ ﻳﮏ ﮔﺮﻩ ﺑﺘﻮﺍﻧﺪ ﺩﺍﺩﻩ ﺧﻮﺩ ﺭﺍ ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ ﺑﺮﺳﺪ
ﮐﻪ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺎﺑﻞ ﺩﺳﺘﻴﺎﺑﻲ ﺍﺳﺖ.
ﺷﺒﮑﻪ ﻫﺎﻱ . LANﺣﻮﺯﻩ ﺟﻐﺮﺍﻓﻴﺎﺋﻲ ﮐﻪ ﺗﻮﺳﻂ ﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎ ﭘﻮﺷﺶ ﺩﺍﺩﻩ
ﻣﻲ ﺷﻮﺩ ،ﻳﮏ ﻣﺤﻴﻂ ﮐﻮﭼﮏ ﻧﻈﻴﺮ ﻳﮏ ﺳﺎﺧﺘﻤﺎﻥ ﺍﺩﺍﺭﻱ ﺍﺳﺖ .ﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎ ﺩﺍﺭﺍﻱ
ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﺯﻳﺮ ﻣﻲ ﺑﺎﺷﻨﺪ:
ﺗﻮﺍﻧﺎﺋﻲ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ •
ﻗﺎﺑﻠﻴﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺤﻴﻂ ﻣﺨﺎﺑﺮﺍﺗﻲ ﺍﺭﺯﺍﻥ ﻧﻈﻴﺮ ﺧﻄﻮﻁ ﺗﻠﻔﻦ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ •
ﺍﻃﻼﻋﺎﺕ
ﻧﺮﺥ ﭘﺎﻳﻴﻦ ﺧﻄﺎﺀ ﺩﺭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺤﺪﻭﺩ ﺑﻮﺩﻥ ﻓﺎﺻﻠﻪ •
ﺷﺒﮑﻪ ﻫﺎﻱ . MANﺣﻮﺯﻩ ﺟﻐﺮﺍﻓﻴﺎﺋﻲ ﮐﻪ ﺗﻮﺳﻂ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ﭘﻮﺷﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ،
ﺩﺭ ﺣﺪ ﻭ ﺍﻧﺪﺍﺯﻩ ﻳﮏ ﺷﻬﺮ ﻭ ﻳﺎ ﺷﻬﺮﺳﺘﺎﻥ ﺍﺳﺖ .ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎ ﺑﺸﺮﺡ
ﺯﻳﺮ ﺍﺳﺖ:
ﭘﻴﭽﻴﺪﮔﻲ ﺑﻴﺸﺘﺮ ﻧﺴﺒﺖ ﺑﻪ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺤﻠﻲ •
121
ﺷﺒﮑﻪ ﻫﺎﻱ . WANﺣﻮﺯﻩ ﺟﻐﺮﺍﻓﻴﺎﺋﻲ ﮐﻪ ﺗﻮﺳﻂ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ﭘﻮﺷﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ،
ﺩﺭ ﺣﺪ ﻭ ﺍﻧﺪﺍﺯﻩ ﮐﺸﻮﺭ ﻭ ﻗﺎﺭﻩ ﺍﺳﺖ .ﻭﻳﮋﮔﻲ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ﺑﺸﺮﺡ ﺯﻳﺮ ﺍﺳﺖ:
ﻗﺎﺑﻠﻴﺖ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﻴﻦ ﮐﺸﻮﺭﻫﺎ ﻭ ﻗﺎﺭﻩ ﻫﺎ •
ﮐﺎﺑﻞ ﺩﺭ ﺷﺒﮑﻪ
ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺤﻠﻲ ﺍﺯ ﮐﺎﺑﻞ ﺑﻪ ﻋﻨﻮﺍﻥ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﻭ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺍﺯﭼﻨﺪﻳﻦ ﻧﻮﻉ ﮐﺎﺑﻞ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺤﻠﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺑﺮﺧﻲ
ﻣﻮﺍﺭﺩ ﻣﻤﮑﻦ ﺍﺳﺖ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺻﺮﻓﺎ" ﺍﺯ ﻳﮏ ﻧﻮﻉ ﮐﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻭ ﻳﺎ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺷﺮﺍﻳﻂ
ﻣﻮﺟﻮﺩ ﺍﺯ ﭼﻨﺪﻳﻦ ﻧﻮﻉ ﮐﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ .ﻧﻮﻉ ﮐﺎﺑﻞ ﺍﻧﺘﺨﺎﺏ ﺷﺪﻩ ﺑﺮﺍﻱ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ
ﻋﻮﺍﻣﻞ ﻣﺘﻔﺎﻭﺗﻲ ﻧﻈﻴﺮ :ﺗﻮﭘﻮﻟﻮﮊﻱ ﺷﺒﮑﻪ ،ﭘﺮﻭﺗﮑﻞ ﻭ ﺍﻧﺪﺍﺯﻩ ﺷﺒﮑﻪ ﺑﺴﺘﮕﻲ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ.
ﺁﮔﺎﻫﻲ ﺍﺯ ﺧﺼﺎﻳﺺ ﻭ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎ ﻭ ﺗﺎﺛﻴﺮ ﻫﺮ ﻳﮏ ﺍﺯ ﺁﻧﻬﺎ ﺑﺮ
ﺳﺎﻳﺮ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﺷﺒﮑﻪ ،ﺑﻪ ﻣﻨﻈﻮﺭ ﻃﺮﺍﺣﻲ ﻭ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻳﮏ ﺷﺒﮑﻪ ﻣﻮﻓﻖ ﺑﺴﻴﺎﺭ ﻻﺯﻡ
ﺍﺳﺖ.
ﮐﺎﺑﻞ (UTP( Unshielded Twisted pair
ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﻧﻮﻉ ﮐﺎﺑﻠﻲ ﮐﻪ ﺩﺭ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ ،ﮐﺎﺑﻞ ﻫﺎﻱ ﺑﻬﻢ ﺗﺎﺑﻴﺪﻩ
ﻣﻲ ﺑﺎﺷﻨﺪ .ﺍﻳﻦ ﻧﻮﻉ ﮐﺎﺑﻞ ﻫﺎ ﺩﺍﺭﺍﻱ ﺩﻭ ﺭﺷﺘﻪ ﺳﻴﻢ ﺑﻪ ﻫﻢ ﭘﻴﭽﻴﺪﻩ ﺑﻮﺩﻩ ﮐﻪ ﻫﺮ ﺩﻭ ﻧﺴﺒﺖ
ﺯﻣﻴﻦ ﺩﺍﺭﺍﻱ ﻳﮏ ﺍﻣﭙﺪﺍﻧﺶ ﻳﮑﺴﺎﻥ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺍﻣﮑﺎﻥ ﺗﺎﺛﻴﺮ ﭘﺬﻳﺮﻱ ﺍﻳﻦ ﻧﻮﻉ
ﮐﺎﺑﻞ ﻫﺎ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ﻣﺠﺎﻭﺭ ﻭ ﻳﺎ ﺳﺎﻳﺮ ﻣﻨﺎﺑﻊ ﺧﺎﺭﺟﻲ ﮐﺎﻫﺶ ﺧﻮﺍﻫﺪ ﻳﺎﻓﺖ .ﮐﺎﺑﻞ ﻫﺎﻱ ﺑﻬﻢ
ﺗﺎﺑﻴﺪﻩ ﺩﺍﺭﺍﻱ ﺩﻭ ﻣﺪﻝ ﻣﺘﻔﺎﻭﺕ) Shielded :ﺭﻭﮐﺶ ﺩﺍﺭ( ﻭ ) Unshieldedﺑﺪﻭﻥ
ﺭﻭﮐﺶ( ﻣﻲ ﺑﺎﺷﻨﺪ .ﮐﺎﺑﻞ UTPﻧﺴﺒﺖ ﺑﻪ ﮐﺎﺑﻞ STPﺑﻤﺮﺍﺗﺐ ﻣﺘﺪﺍﻭﻝ ﺗﺮ ﺑﻮﺩﻩ ﻭ ﺩﺭ ﺍﮐﺜﺮ
ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺤﻠﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
122
ﮐﻴﻔﻴﺖ ﮐﺎﺑﻞ ﻫﺎﻱ UTPﻣﺘﻐﻴﺮ ﺑﻮﺩﻩ ﻭ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ﻣﻌﻤﻮﻟﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺑﺮﺍﻱ ﺗﻠﻔﻦ ﺗﺎ
ﮐﺎﺑﻞ ﻫﺎﻱ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ﺭﺍ ﺷﺎﻣﻞ ﻣﻲ ﮔﺮﺩﺩ .ﮐﺎﺑﻞ ﺩﺍﺭﺍﻱ ﭼﻬﺎﺭ ﺯﻭﺝ ﺳﻴﻢ ﺑﻮﺩﻩ ﻭ ﺩﺭﻭﻥ
ﻳﮏ ﺭﻭﮐﺶ ﻗﺮﺍﺭ ﻣﻲ ﮔﻴﺮﻧﺪ .ﻫﺮ ﺯﻭﺝ ﺑﺎ ﺗﻌﺪﺍﺩ ﻣﺸﺨﺼﻲ ﭘﻴﭻ ﺗﺎﺑﺎﻧﺪﻩ ﺷﺪﻩ ) ﺩﺭ ﻭﺍﺣﺪ ﺍﻳﻨﭻ
( ﺗﺎ ﺗﺎﺛﻴﺮ ﭘﺬﻳﺮﻱ ﺁﻥ ﺍﺯ ﺳﺎﻳﺮ ﺯﻭﺝ ﻫﺎ ﻭ ﻳﺎﺳﺎﻳﺮ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺍﻟﮑﺘﺮﻳﮑﻲ ﮐﺎﻫﺶ ﻳﺎﺑﺪ.
ﮐﺎﺭﺑﺮﺩ Type
Cat 1ﻓﻘﻂ ﺻﻮﺕ ) ﮐﺎﺑﻞ ﻫﺎﻱ ﺗﻠﻔﻦ (
123
ﻣﻌﺎﻳﺐ ﮐﺎﺑﻞ ﻫﺎﻱ ﺑﻬﻢ ﺗﺎﺑﻴﺪﻩ :
ﺗﻀﻌﻴﻒ ﻓﺮﮐﺎﻧﺲ •
ﺑﺪﻭﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﮑﺮﺍﺭﮐﻨﻨﺪﻩ ﻫﺎ ،ﻗﺎﺩﺭ ﺑﻪ ﺣﻤﻞ ﺳﻴﮕﻨﺎﻝ ﺩﺭ ﻣﺴﺎﻓﺖ ﻫﺎﻱ ﻃﻮﻻﻧﻲ •
ﻧﻤﻲ ﺑﺎﺷﻨﺪ.
ﭘﺎﻳﻴﻦ ﺑﻮﺩﻥ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ •
ﺑﺪﻟﻴﻞ ﭘﺬﻳﺮﺵ ﭘﺎﺭﺍﺯﻳﺖ ﺩﺭ ﻣﺤﻴﻂ ﻫﺎﻱ ﺍﻟﮑﺘﺮﻳﮑﻲ ﺳﻨﮕﻴﻦ ﺑﺨﺪﻣﺖ ﮔﺮﻓﺘﻪ ﻧﻤﻲ ﺷﻮﻧﺪ. •
ﮐﺎﻧﮑﺘﻮﺭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺑﺮﺍﻱ ﮐﺎﺑﻞ ﻫﺎﻱ ،UTPﺍﺯ ﻧﻮﻉ RJ-45ﻣﻲ ﺑﺎﺷﺪ .ﮐﺎﻧﮑﺘﻮﺭ ﻓﻮﻕ ﺷﺒﺎﻫﺖ
ﺯﻳﺎﺩﻱ ﺑﻪ ﮐﺎﻧﮑﺘﻮﺭﻫﺎﻱ ﺗﻠﻔﻦ ) (RJ-11ﺩﺍﺭﺩ .ﻫﺮ ﻳﮏ ﺍﺯ ﭘﻴﻦ ﻫﺎﻱ ﮐﺎﻧﮑﺘﻮﺭ ﻓﻮﻕ
ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺪﺭﺳﺘﻲ ﭘﻴﮑﺮﺑﻨﺪﻱ ﮔﺮﺩﻧﺪ( Jack Registered:RJ ) .
ﮐﺎﺑﻞ ﮐﻮﺍﮐﺴﻴﺎﻝ
ﻳﮑﻲ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﻣﺤﻴﻂ ﻫﺎﻱ ﺍﻧﺘﻘﺎﻝ ﺩﺭ ﻣﺨﺎﺑﺮﺍﺕ ﮐﺎﺑﻞ ﮐﻮﺍﮐﺴﻴﺎﻝ ﻭ ﻳﺎ ﻫﻢ ﻣﺤﻮﺭ
ﻣﻲ ﺑﺎﺷﺪ .ﺍﻳﻦ ﻧﻮﻉ ﮐﺎﺑﻞ ﻫﺎ ﺍﺯ ﺳﺎﻝ ١٩٣٦ﺑﺮﺍﻱ ﺍﻧﺘﻘﺎﻝ ﺍﺧﺒﺎﺭ ﻭ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺩﻧﻴﺎﺭ ﺑﻪ ﮐﺎﺭ
ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺍﻧﺪ .ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﮐﺎﺑﻞ ﻫﺎ ،ﺩﻭ ﺳﻴﻢ ﺗﺸﮑﻴﻞ ﺩﻫﻨﺪﻩ ﻳﮏ ﺯﻭﺝ ،ﺍﺯ ﺣﺎﻟﺖ ﻣﺘﻘﺎﺭﻥ
ﺧﺎﺭﺝ ﺷﺪﻩ ﻭ ﻫﺮ ﺯﻭﺝ ﺍﺯ ﻳﮏ ﺳﻴﻢ ﺩﺭ ﻣﻐﺰ ﻭ ﻳﮏ ﻻﻳﻪ ﻣﺴﻲ ﺑﺎﻓﺘﻪ ﺷﺪﻩ ﺩﺭ ﺍﻃﺮﺍﻑ ﺁﻥ
ﺗﺸﮑﻴﻞ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﻧﻮﻉ ﺩﻳﮕﺮ ﮐﺎﺑﻞ ﻫﺎﻱ ﮐﻮﺍﮐﺴﻴﺎﻝ ،ﺑﻪ ﺣﺎﻱ ﻻﻳﻪ ﻣﺴﻲ ﺑﺎﻓﺘﻪ ﺷﺪﻩ ،ﺍﺯ
ﺗﻴﻮﭖ ﻣﺴﻲ ﺍﺳﺘﻮﺍﻧﻪ ﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ .ﻣﺎﺩﻩ ﺍﻱ ﭘﻼﺳﺘﻴﮑﻲ ﺍﻳﻦ ﺩﻭ ﻫﺎﺩﻱ ﺭﺍ ﺍﺯ ﻳﮑﺪﻳﮕﺮ
ﺟﺪﺍ ﻣﻲ ﮐﻨﺪ .ﻣﺎﺩﻩ ﭘﻼﺳﺘﻴﮑﻲ ﻣﻤﮑﻦ ﺍﺳﺖ ﺑﺼﻮﺭﺕ ﺩﻳﺴﮑﻬﺎﻱ ﭘﻼﺳﺘﻴﮑﻲ ﻳﺎ ﺷﻴﺸﻪ ﺍﻱ ﺩﺭ
ﻓﻮﺍﺻﻞ ﻣﺨﺘﻠﻒ ﺍﺳﺘﻔﺎﺩﻩ ﻭ ﻣﺎﻧﻊ ﺍﺯ ﺗﻤﺎﺱ ﺩﻭ ﻫﺎﺩﻱ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺷﻮﺩ ﻭ ﻳﺎ ﻣﻤﮑﻦ ﺍﺳﺖ ﺩﻭ
ﻫﺎﺩﻱ ﺩﺭ ﺗﻤﺎﻡ ﻃﻮﻝ ﮐﺎﺑﻞ ﺑﻮﺳﻴﻠﻪ ﻣﻮﺍﺩ ﭘﻼﺳﺘﻴﮑﻲ ﺍﺯ ﻳﮑﺪﻳﮕﺮ ﺟﺪﺍ ﮔﺮﺩﻧﺪ.
124
ﻣﺰﺍﻳﺎﻱ ﮐﺎﺑﻞ ﻫﺎﻱ ﮐﻮﺍﮐﺴﻴﺎﻝ :
ﻗﺎﺑﻠﻴﺖ ﺍﻋﺘﻤﺎﺩ ﺑﺎﻻ •
ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻧﺴﺒﺘﺎ" ﻭﺳﻴﻊ ﮐﻪ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺍﮐﺜﺮ ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﻣﺨﺎﺑﺮﺍﺗﻲ ﺍﺯ ﺟﻤﻠﻪ ﺗﻠﻪ •
125
ﺷﺒﮑﻪ ﻭ ﺍﻧﻮﺍﻉ ﺁﻥ
126
TCP/IPﻳﮑﻲ ﺍﺯ ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﭘﺮﻭﺗﮑﻞ ﻫﺎ ﺩﺭ ﺯﻣﻴﻨﻪ ﺷﺒﮑﻪ ﺑﻮﺩﻩ ﮐﻪ ﺧﻮﺩ ﺍﺯ ﻣﺠﻤﻮﻋﻪ •
ﭘﺮﻭﺗﮑﻞ ﻫﺎﺋﻲ ﺩﻳﮕﺮ ،ﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺍﺳﺖ .ﺟﺪﻭﻝ ﺯﻳﺮ ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ
TCP/IPﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ .ﺩﺭ ﮐﻨﺎﺭ ﺟﺪﻭﻝ ﻓﻮﻕ ،ﻣﺪﻝ ﻣﺮﺟﻊ OSIﻧﻴﺰ ﺍﺭﺍﺋﻪ ﺷﺪﻩ
ﺍﺳﺖ ﺗﺎ ﻣﺸﺨﺺ ﮔﺮﺩﺩ ﮐﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻓﻮﻕ ﺩﺭ ﭼﻪ ﻻﻳﻪ ﺍﻱ ﺍﺯ ﻣﺪﻝ
OSIﮐﺎﺭ ﻣﻲ ﮐﻨﻨﺪ .ﺑﻪ ﻣﻮﺍﺯﺍﺕ ﺣﺮﮐﺖ ﺍﺯ ﭘﺎﺋﻴﻦ ﺗﺮﻳﻦ ﻻﻳﻪ )ﻻﻳﻪ ﻓﻴﺰﻳﮑﻲ( ﺑﻪ ﺑﺎﻻﺗﺮﻳﻦ
ﻻﻳﻪ )ﻻﻳﻪ ،(Applicationﻫﺮ ﻳﮏ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﺮﺗﺒﻂ ﺑﺎ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ
ﺩﺭ ﻫﺮ ﻻﻳﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺠﺎﻡ ﭘﺮﺩﺍﺯﺵ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ،ﺯﻣﺎﻧﻲ ﺭﺍ ﺻﺮﻑ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ.
ﻣﺪﻝ ﻣﺮﺟﻊ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ TCP/IP
OSI
127
ﻫﺎﻱ ﺩﻳﮕﺮ ﻧﻈﻴﺮ ،IBMﺳﺎﺯﮔﺎﺭ ﻧﺒﻮﺩ .ﻣﺜﻼ" ﺯﻣﺎﻧﻲ ﮐﻪ ﺷﻤﺎ ﭼﻬﻞ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺭﺍ ﺑﺮﺍﻱ
ﺷﺮﮐﺖ ﺧﻮﺩ ﺗﻬﻴﻪ ﻣﻲ ﻧﻤﻮﺩﻳﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺳﺎﻳﺮ ﺗﺠﻬﻴﺰﺍﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺷﺒﮑﻪ ﻧﻴﺰ ﺍﺯ
ﻫﻤﺎﻥ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ ﺧﺮﻳﺪﺍﺭﻱ ﻣﻲ ﮔﺮﺩﻳﺪ)ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﻭﺟﻮﺩ ﺳﺎﺯﮔﺎﺭﻱ ﺑﻴﻦ ﺁﻧﺎﻥ(.
ﻣﺸﮑﻞ ﻓﻮﻕ ﭘﺲ ﺍﺯ ﻣﻌﺮﻓﻲ ﻣﺪﻝ ﻣﺮﺟﻊ ،OSIﺑﺮﻃﺮﻑ ﮔﺮﺩﻳﺪ.
ﻣﺪﻝ OSIﺩﺍﺭﺍﻱ ﻫﻔﺖ ﻻﻳﻪ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ ﮐﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﺁﻧﺎﻥ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺠﺎﻡ
ﻋﻤﻠﻴﺎﺗﻲ ﺧﺎﺻﻲ ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺍﻧﺪ .ﺑﺎﻻﺗﺮﻳﻦ ﻻﻳﻪ ،ﻻﻳﻪ ﻫﻔﺖ ) ( Applicationﻭ
ﭘﺎﺋﻴﻦ ﺗﺮﻳﻦ ﻻﻳﻪ ،ﻻﻳﻪ ﻳﮏ ) (Physiacalﻣﻲ ﺑﺎﺷﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻗﺼﺪ ﺍﺭﺳﺎﻝ
ﺩﺍﺩﻩ ﺑﺮﺍﻱ ﻳﮏ ﮐﺎﺭﺑﺮ ﺩﻳﮕﺮ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ،ﺩﺍﺩﻩ ﻫﺎ ﺣﺮﮐﺖ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﻻﻳﻪ ﻫﻔﺘﻢ
ﺷﺮﻭﻉ ﻧﻤﻮﺩﻩ ﻭ ﭘـﺲ ﺍﺯ ﺗـــﺒﺪﻳﻞ ﺑﻪ ﺳﮕﻤﻨﺖ ،datagram ،ﺑﺴـﺘﻪ
) ( Packetﻭ ﻓﺮﻳﻢ ،ﺩﺭ ﻧﻬﺎﻳﺖ ﺩﺭ ﻃﻮﻝ ﮐﺎﺑﻞ ) ﻋﻤﻮﻣﺎ" ﮐﺎﺑﻞ ﺍﻃﻼﻋــــــﺎﺗﻲ
ﻫﺎﻱ ( twisted pairﺍﺭﺳﺎﻝ ﺗﺎ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺑﺮﺳﺪ.
ﻣﻌﻤﺎﺭﻱ ،ﺑﻪ ﺩﻭ ﮔﺮﻭﻩ ﻋﻤﺪﻩ ﻣﻌﻤﺎﺭﻱ ﮐﻪ ﻋﻤﺪﺗﺎ" ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺳﺘﻔﺎﺩﻩ •
ﻣﻲ ﮔﺮﺩﺩ ،ﺍﺷﺎﺭﻩ ﻣﻲ ﻧﻤﺎﻳﺪ Peer- Peer-To :ﻭ .Server - Clientﺩﺭ ﺷﺒﮑﻪ
ﻫﺎﻱ Peer-To-Peerﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺍﺧﺘﺼﺎﺻﻲ ﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻪ ﻭ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺍﺯ
ﻃﺮﻳﻖ workgroupﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺷﺘﺮﺍﮎ ﻓﺎﻳﻞ ﻫﺎ ،ﭼﺎﭘﮕﺮﻫﺎ ﻭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ،
ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ.
] ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ، Server - Clientﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭ ﻳﺎ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻧﻲ •
128
MAC Addressﭼﻴﺴﺖ؟
ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒــﮑﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳـﺎﻳﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ،ﻣﻲ ﺑﺎﻳﺴﺖ
ﺷﻨﺎﺳﺎﺋﻲ ﻭ ﺩﺍﺭﺍﻱ ﻳﮏ ﺁﺩﺭﺱ ﻣﻨﺤﺼﺮﺑﻔﺮﺩ ﺑﺎﺷﺪ .ﻗﻄﻌﺎ" ﺗﺎﮐﻨﻮﻥ ﺑﺎ ﺁﺩﺭﺱ ﻫﺎﻱ IPﻭ ﻳـﺎ
) MACﺍﻗﺘﺒﺎﺱ ﺷﺪﻩ ﺍﺯ ﮐﻠﻤﺎﺕ ( Media Access Controlﺑﺮﺧﻮﺭﺩ ﺩﺍﺷﺘﻪ ﺍﻳﺪ
ﻭ ﺷﺎﻳﺪ ﺍﻳﻦ ﺳﻮﺍﻝ ﺑﺮﺍﻱ ﺷﻤﺎ ﻣﻄﺮﺡ ﺷﺪﻩ ﺑﺎﺷﺪ ﮐﻪ ﺍﻭﻻ" ﺿﺮﻭﺭﺕ ﻭﺟﻮﺩ ﺩﻭ ﻧﻮﻉ ﺁﺩﺭﺱ
ﭼﻴﺴﺖ ﻭ ﺛﺎﻧﻴﺎ" ﺟﺎﻳﮕﺎﻩ ﺍﺳﻔﺎﺩﻩ ﺍﺯ ﺁﻧﺎﻥ ﭼﻴﺴﺖ؟
، MAC Addressﻳﮏ ﺁﺩﺭﺱ ﻓﻴﺰﻳﮑﻲ ﺍﺳﺖ ﺩﺭ ﺣﺎﻟﻲ ﮐﻪ ﺁﺩﺭﺱ ﻫﺎﻱ ، IPﺑﻪ ﻣﻨﺰﻟﻪ
ﺁﺩﺭﺱ ﻫﺎﻱ ﻣﻨﻄﻘﻲ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺁﺩﺭﺱ ﻫﺎﻱ ﻣﻨﻄﻘﻲ ﺷﻤﺎ ﺭﺍ ﻣﻠﺰﻡ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ﮐﻪ ﺑﻪ ﻣﻨــﻈﻮﺭ
ﭘﻴﮑﺮﺑﻨﺪﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻭ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ،ﺩﺭﺍﻳﻮﺭﻫﺎ ﻭ ﻳﺎ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺧﺎﺻـﻲ ﺭﺍ ﺩﺭ ﺣﺎﻓــﻈﻪ
ﻣﺴﺘﻘﺮ ﻧﻤﺎﺋﻴﺪ ) ﻣﺜﻼ" ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ .( IPﺍﻳﻦ ﻭﺿﻌﻴﺖ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ
MAC Addressﺻﺪﻕ ﻧﺨﻮﺍﻫﺪ ﮐﺮﺩ ﻭ ﺍﻳﻨﮕﻮﻧﻪ ﺁﺩﺭﺱ ﻫﺎ ﻧﻴﺎﺯﻣﻨﺪ ﺩﺭﺍﻳﻮﺭﻫﺎﻱ ﺧﺎﺻﻲ
ﻧﺨﻮﺍﻫﻨﺪ ﺑﻮﺩ ،ﭼﺮﺍﮐﻪ ﺁﺩﺭﺱ ﻫﺎﻱ ﻓﻮﻕ ﺩﺭﻭﻥ ﺗﺮﺍﺷﻪ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﻗﺮﺍﺭ ﻣﻲ ﮔﻴﺮﻧﺪ.
129
ﻣﺪﻝ OSI
...
Networkﻻﻳﻪ ﺳﻮﻡ ﺁﺩﺭﺱ IPﺩﺭ ﺍﻳﻦ
ﻻﻳﻪ ﻗﺮﺍﺭ ﺩﺍﺭﺩ Layer
130
ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﺁﻥ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻭ ﺑﺎ ﺍﺭﺳﺎﻝ ﺁﻥ ﺑﻪ ﻻﻳﻪ ﺳﻮﻡ ،ﺁﺩﺭﺱ ﺷﺒﮑﻪ ﺍﻱ ﺑﺴﺘﻪ
ﺍﻃﻼﻋﺎﺗﻲ ) ( IPﺑﺮﺭﺳﻲ ﺗﺎ ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﮔﺮﺩﺩ ﮐﻪ ﺁﺩﺭﺱ ﻓﻮﻕ ﺑﺎ ﺁﺩﺭﺱ ﺷﺒﮑﻪ ﺍﻱ
ﮐﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺎ ﺁﻥ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺷﺪﻩ ﺍﺳﺖ ﺑﺪﺭﺳﺘﻲ ﻣﻄﺎﺑﻘﺖ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﺳﺎﺧﺘﺎﺭ MAC Address
ﻳﮏ MAC Addressﺑﺮ ﺭﻭﻱ ﻫﺮ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﻫﻤﻮﺍﺭﻩ ﺩﺍﺭﺍﻱ ﻃﻮﻟﻲ ﻣﺸﺎﺑﻪ ﻭ ﻳﮑﺴﺎﻥ
ﻣﻲ ﺑﺎﺷﻨﺪ ) .ﺷﺶ ﺑﺎﻳﺖ ﻭ ﻳﺎ ٤٨ﺑﻴﺖ ( .ﺩﺭ ﺻﻮﺭﺕ ﺑﺮﺭﺳﻲ Address MACﻳﮏ
ﮐﺎﻣﭙﻴﻮﺗﺮ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﺁﻥ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﻧﺼﺐ ﺷﺪﻩ ﺍﺳﺖ ،ﺁﻥ ﺭﺍ ﺑﺎ ﻓﺮﻣﺖ ﻣﺒﻨﺎﻱ ﺷﺎﻧﺰﺩﻩ
) ،( Hexﻣﺸﺎﻫﺪﻩ ﺧﻮﺍﻫﻴﺪ ﺩﻳﺪ .ﻣﺜﻼ" MAC Addressﮐﺎﺭﺕ ﺷﺒﮑﻪ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ
ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﻪ ﺻﻮﺭﺕ ﺯﻳﺮ ﺑﺎﺷﺪ:
ﻣﺸﺎﻫﺪﻩ MAC Address
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘﻮﺭ IPconfig/allﻭ ﻣﺸﺎﻫﺪﻩ ﺑﺨﺶ Physical
: address
6A DB 79 BA 50 00
ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺗﻮﺳﻂ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺗﻮﺳﻂ
IEEEﺑﺎ ﺗﻮﺟﻪ ﺑﻪ RFC
١٧٠٠
ﺯﻣﺎﻧﻲ ﮐﻪ ﻳﮏ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ ﻧﻈﻴﺮ ﺍﻳﻨﺘﻞ ،ﮐﺎﺭﺕ ﻫﺎ ﻱ ﺷﺒﮑﻪ ﺧﻮﺩ ﺭﺍ ﺗﻮﻟﻴﺪ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺁﻧﺎﻥ ﻫﺮ
ﺁﺩﺭﺱ ﺩﻟﺨﻮﺍﻫﻲ ﺭﺍ ﻧﻤﻲ ﺗﻮﺍﻧﻨﺪ ﺑﺮﺍﻱ MAC Addressﺩﺭ ﻧﻈﺮ ﺑﮕﻴﺮﻧﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ
ﺗﻤﺎﻣﻲ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ ﮐﺎﺭﺕ ﻫﺎﻱ ﺷﺒﮑﻪ ﺑﺨﻮﺍﻫﻨﺪ ﺑﺪﻭﻥ ﻭﺟﻮﺩ ﻳﮏ ﺿﺎﺑﻄﻪ ﺧﺎﺹ ،ﺍﻗﺪﺍﻡ ﺑﻪ
ﺗﻌﺮﻳﻒ ﺁﺩﺭﺱ ﻫﺎﻱ ﻓﻮﻕ ﻧﻤﺎﻳﻨﺪ ،ﻗﻄﻌﺎ" ﺍﻣﮑﺎﻥ ﺗﻌﺎﺭﺽ ﺑﻴﻦ ﺁﺩﺭﺱ ﻫﺎﻱ ﻓﻮﻕ ﺑﻮﺟﻮﺩ ﺧﻮﺍﻫﺪ
ﺁﻣﺪ ) .ﻋﺪﻡ ﺗﺸﺨﻴﺺ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ ﮐﺎﺭﺕ ﻭ ﻭﺟﻮﺩ ﺩﻭ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺍﺯ ﺩﻭ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ
ﻣﺘﻔﺎﻭﺕ ﺑﺎ ﺁﺩﺭﺱ ﻫﺎﻱ ﻳﮑﺴﺎﻥ ( .ﺣﺘﻤﺎ" ﺍﻳﻦ ﺳﻮﺍﻝ ﺑﺮﺍﻱ ﺷﻤﺎ ﻣﻄﺮﺡ ﻣﻲ ﮔﺮﺩﺩ ﮐﻪ
131
MAC Addressﺗﻮﺳﻂ ﭼﻪ ﺍﻓﺮﺍﺩ ﻭ ﻳﺎ ﺳﺎﺯﻣﺎﻥ ﻫﺎﺋﻲ ﻭ ﺑﻪ ﭼﻪ ﺻﻮﺭﺕ ﺑﻪ ﮐﺎﺭﺕ ﻫﺎﻱ
ﺷﺒﮑﻪ ﻧﺴﺒﺖ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ؟ ﺑﻪ ﻣﻨﻈﻮﺭ ﺑﺮﺧﻮﺭﺩ ﺑﺎ ﻣﺸﮑﻼﺕ ﻓﻮﻕ ،ﮔﺮﻭﻩ ، IEEEﻫﺮ
MAC Addressﺭﺍ ﺑﻪ ﺩﻭ ﺑﺨﺶ ﻣﺴﺎﻭﻱ ﺗﻘﺴﻴﻢ ﮐﻪ ﺍﺯ ﺍﻭﻟﻴﻦ ﺑﺨﺶ ﺁﻥ ﺑﻪ ﻣﻨﻈﻮﺭ
ﺷﻨﺎﺳﺎﺋﻲ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ ﮐﺎﺭﺕ ﻭ ﺩﻭﻣﻴﻦ ﺑﺨﺶ ﺑﻪ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ ﺍﺧﺘﺼﺎﺹ ﺩﺍﺩﻩ ﺷﺪﻩ ﺗﺎ ﺁﻧﺎﻥ
ﻳﮏ ﺷﻤﺎﺭﻩ ﺳﺮﻳﺎﻝ ﺭﺍ ﺩﺭ ﺁﻥ ﺩﺭﺝ ﻧﻤﺎﻳﻨﺪ.
ﮐﺪ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ ﺑﺮ ﺍﺳﺎﺱ RFC-1700ﺑﻪ ﺁﻧﺎﻥ ﻧﺴﺒﺖ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺩﺭ ﺻﻮﺭﺕ
ﻣﺸﺎﻫﺪﻩ RFCﻓﻮﻕ ﺣﺘﻤﺎ" ﻣﺘﻮﺟﻪ ﺧﻮﺍﻫﻴﺪ ﺷﺪ ﮐﻪ ﺑﺮﺧﻲ ﺍﺯ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ ﺩﺍﺭﺍﻱ ﺑﻴﺶ ﺍﺯ
ﻳﮏ ﮐﺪ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻋﻠﺖ ﺍﻳﻦ ﺍﻣﺮ ﺑﻪ ﺣﺠﻢ ﮔﺴﺘﺮﺩﻩ ﻣﺤﺼﻮﻻﺕ ﺗﻮﻟﻴﺪﻱ ﺁﻧﺎﻥ ﺑﺮﻣﻲ ﮔﺮﺩﺩ.
ﺑﺎ ﺍﻳﻦ ﮐﻪ MAC Addressﺩﺭ ﺣﺎﻓﻈﻪ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺛﺒﺖ ﻣﻲ ﮔﺮﺩﺩ ،ﺑﺮﺧﻲ ﺍﺯ ﺗﻮﻟﻴﺪ
ﮐﻨﻨﺪﮔﺎﻥ ﺑﻪ ﺷﻤﺎ ﺍﻳﻦ ﺍﺟﺎﺯﻩ ﺭﺍ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ ﮐﻪ ﺑﺎ ﺩﺭﻳﺎﻓﺖ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﺧﺎﺹ،
ﺑﺘﻮﺍﻧﻴﺪ ﺑﺨﺶ ﺩﻭﻡ MAC Addressﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺧﻮﺩ ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﻫﻴﺪ) ﺷﻤﺎﺭﻩ ﺳﺮﻳﺎﻝ
ﮐﺎﺭﺕ ﺷﺒﮑﻪ ( .ﻋﻠﺖ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﺠﺪﺩ ﺍﺯ ﺳﺮﻳﺎﻝ ﻫﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﺳﺎﻳﺮ
ﻣﺤﺼﻮﻻﺕ ﺗﻮﻟﻴﺪ ﺷﺪﻩ ﺗﻮﺳﻂ ﺁﻧﺎﻥ ﺑﺮﻣﻲ ﮔﺮﺩﺩ )ﺗﺠﺎﻭﺯ ﺍﺯ ﻣﺤﺪﻭﺩ ﻣﻮﺭﺩ ﻧﻈﺮ(.
ﺩﺭ ﺣﺎﻝ ﺣﺎﺿﺮ ﺍﺣﺘﻤﺎﻝ ﺍﻳﻦ ﮐﻪ ﺷﻤﺎ ﺩﻭ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺭﺍ ﺧﺮﻳﺪﺍﺭﻱ ﻧﻤﺎﺋﻴﺪ ﮐﻪ ﺩﺍﺭﺍﻱ MAC
Addressﻳﮑﺴﺎﻧﻲ ﺑﺎﺷﻨﺪ ،ﺑﺴﻴﺎﺭ ﺿﻌﻴﻒ ﻭ ﺷﺎﻳﺪ ﻫﻢ ﻏﻴﺮﻣﻤﮑﻦ ﺑﺎﺷﺪ.
132
ﻣﺪﻝ ﻣﺮﺟﻊ OSI
133
ﻋﻤﻠﮑﺮﺩ ﻫﺮ ﻳﮏ ﺍﺯ ﻻﻳﻪ ﻫﺎﻱ ﻣﺪﻝ ﻣﺮﺟﻊ : OSI
□ ﺍﺭﺍﺋﻪ ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﺷﺒﮑﻪ ﺑﻪ ﺑﺮﻧﺎﻣﻪ ﻫﺎ)ﻧﻈﻴﺮ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ،ﺍﺭﺳﺎﻝ ﻓﺎﻳﻞ ﻫﺎ ﻭ(...
□ ﺗﺸﺨﻴﺺ ﺯﻣﺎﻥ ﻻﺯﻡ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺷﺒﮑﻪ
ﻻﻳﻪ ) Presentationﻻﻳﻪ ﺷﺸﻢ ( •
□ ﺍﻳﺠﺎﺩ ﺍﻃﻤﻴﻨﺎﻥ ﻻﺯﻡ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺑﻮﺩﻥ ﺩﺍﺩﻩ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻢ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ
□ ﻓﺮﻣﺖ ﺩﺍﺩﻩ
□ ﺳﺎﺧﺘﻤﺎﻥ ﻫﺎﻱ ﺩﺍﺩﻩ
□ ﺗﻮﺍﻓﻖ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﮔﺮﺍﻣﺮ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﻩ ﺑﺮﺍﻱ ﻻﻳﻪ Application
□ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺩﺍﺩﻩ
ﻻﻳﻪ ) Sessionﻻﻳﻪ ﭘﻨﺠﻢ ( •
134
□ ﺗﺸﺨﻴﺺ ﻭ ﺑﺮﻃﺮﻑ ﻧﻤﻮﺩﻥ ﺧﻄﺎﺀ
□ ﺗﻘﺴﻴﻢ ﺩﺍﺩﻩ ﺑﻪ ﻓﺮﻳﻢ ﻭ ﻧﺴﺒﺖ ﺩﻫﻲ ﻳﮏ ﺩﻧﺒﺎﻟﻪ ﻋﺪﺩﻱ ﻣﻨﺎﺳﺐ ﺑﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﺁﻧﺎﻥ
□ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ UDP ،TCPﻭ SPXﺩﺭ ﺍﻳﻦ ﻻﻳﻪ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ.
ﻻﻳﻪ ) Networkﻻﻳﻪ ﺳﻮﻡ ( •
135
OSI
ﺑﻪ ﻣﻨﻈﻮﺭ ﺷﻨﺎﺧﺖ ﻣﻨﺎﺳﺐ ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ ﭘﺮﻭﺗﮑﻞ ﺩﺭ ﺷﺒﮑﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺎ ﺑﺮﺧﻲ ﺍﺯ
ﻣﺪﻝ ﻫﺎﻱ ﺭﺍﻳﺞ ﺷﺒﮑﻪ ﮐﻪ ﻣﻌﻤﺎﺭﻱ ﺷﺒﮑﻪ ﺭﺍ ﺗﺸﺮﻳﺢ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﺁﺷﻨﺎ ﮔﺮﺩﻳﺪ.
ﻣﺪﻝ ( Open Systems Interconnection ) OSIﻳﮏ ﻣﺮﺟﻊ ﻣﻨﺎﺳﺐ
ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺍﺳﺖ .ﺍﻳﻦ ﻣﺪﻝ ﺩﺭ ﺳﺎﻝ ١٩٨٤ﺗﻮﺳﻂ ) ISOﻳﮏ ﺳﺎﺯﻣﺎﻥ ﺑﻴﻦ ﺍﻟﻤﻠﻠﻲ
ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺳﺎﺯﻱ ﺑﺎ ﺑﻴﺶ ﺍﺯ ١٣٠ﻋﻀﻮ( ﺍﺭﺍﺋﻪ ﮔﺮﺩﻳﺪ .ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ﺍﺯ ﻫﻔﺖ ﻻﻳﻪ ﺑﺮﺍﻱ
ﺗﺸﺮﻳﺢ ﻓﺮﺁﻳﻨﺪﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻫﺮﻳﮏ ﺍﺯ ﻻﻳﻪ ﻫﺎ ﻣﺴﻴﻮﻟﻴﺖ ﺍﻧﺠﺎﻡ
ﻋﻤﻠﻴﺎﺕ ﺧﺎﺻﻲ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﻧﺪ ..ﻣﺪﻝ OSIﺑﻪ ﻋﻨﻮﺍﻥ ﻳﮏ ﻣﺮﺟﻊ ﻭ ﺭﺍﻫﻨﻤﺎ ﺑﺮﺍﻱ ﺷﻨﺎﺧﺖ
ﻋﻤﻠﻴﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺁﺷﻨﺎ ﺋﻲ ﺑﺎ ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ ﻳﮏ
ﺷﺒﮑﻪ ،ﻣﻄﺎﻟﻌﻪ ﻣﺪﻝ ﻓﻮﻕ ،ﻣﻔﻴﺪ ﻣﻲ ﺑﺎﺷﺪ .ﺷﮑﻞ ﺯﻳﺮ ﻫﻔﺖ ﻻﻳﻪ ﻣﺪﻝ OSIﺭﺍ ﻧﺸﺎﻥ
ﻣﻲ ﺩﻫﺪ.
ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﻃﺮﻳﻖ ﻻﻳﻪ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﮔﻴﺮﻧﺪﻩ
ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺩﺍﺩﻩ ﻫﺎ ﺗﻮﺳﻂ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﻭ ﺗﻮﺳﻂ ﮐﺎﺭﺑﺮ ﺗﻮﻟﻴﺪ ﺧﻮﺍﻫﻨﺪ ﺷﺪ ) ﻧﻈﻴﺮ ﻳﮏ
ﭘﻴﺎﻡ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ( .ﺷﺮﻭﻉ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﻫﺎ ﺍﺯ ﻻﻳﻪ Applicationﺍﺳﺖ .ﺩﺭ ﺍﺩﺍﻣﻪ ﻭ ﺑﺎ
ﺣﺮﮐﺖ ﺑﻪ ﺳﻤﺖ ﭘﺎﻳﻴﻦ ،ﺩﺭ ﻫﺮ ﻻﻳﻪ ﻋﻤﻠﻴﺎﺕ ﻣﺮﺑﻮﻃﻪ ﺍﻧﺠﺎﻡ ﻭ ﺩﺍﺩﻩ ﻫﺎﺋﻲ ﺑﻪ ﺑﺴﺘﻪ ﻫﺎﻱ
ﺍﻃﻼﻋﺎﺗﻲ ﺍﺿﺎﻓﻪ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺩﺭ ﺁﺧﺮﻳﻦ ﻻﻳﻪ )ﻻﻳﻪ ﻓﻴﺰﻳﮑﻲ( ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ
ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ،ﺩﺍﺩﻩ ﻫﺎ ﺑﻪ ﺳﻴﮕﻨﺎﻟﻬﺎﻱ ﺍﻟﮑﺘﺮﻳﮑﻲ ،ﭘﺎﻟﺲ ﻫﺎﺋﻲ ﺍﺯ ﻧﻮﺭ ﻭ ﻳﺎ ﺳﻴﮕﻨﺎﻟﻬﺎﻱ ﺭﺍﺩﻳﻮﺋﻲ
136
ﺗﺒﺪﻳﻞ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﮐﺎﺑﻞ ﻭ ﻳﺎ ﻫﻮﺍ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﭘﺲ ﺍﺯ ﺩﺭﻳﺎﻓﺖ
ﺩﺍﺩﻩ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ،ﻋﻤﻠﻴﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ )ﻣﻌﮑﻮﺱ ﻋﻤﻠﻴﺎﺕ ﺍﺭﺳﺎﻝ( ﺗﻮﺳﻂ ﻫﺮ ﻳﮏ ﺍﺯ
ﻻﻳﻪ ﻫﺎ ﺍﻧﺠﺎﻡ ﻭ ﺩﺭ ﻧﻬﺎﻳﺖ ﺑﺎ ﺭﺳﻴﺪﻥ ﺩﺍﺩﻩ ﺑﻪ ﻻﻳﻪ Applicationﻭ ﺑﮑﻤﮏ ﻳﮏ ﺑﺮﻧﺎﻣﻪ،
ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻟﻲ ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺷﮑﻞ ﺯﻳﺮ ﻧﺤﻮﻩ ﺍﻧﺠﺎﻡ ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ
ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ.
ﮐﺎﺭﺑﺮﺩﻱ ﺍﺭﺗﺒﺎﻁ ﺩﺍﺭﺩ .ﮐﺎﺭﺑﺮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﮐﺎﺭﺑﺮﺩﻱ ﻣﺘﻔﺎﻭﺕ ﻗﺎﺩﺭ ﺑﻪ
ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻣﺮﺗﺒﻂ ﺑﺎ ﺷﺒﮑﻪ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﻣﺜﻼ" ﮐﺎﺭﺑﺮﺍﻥ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ
ﻓﺎﻳﻞ ﺧﻮﺍﻧﺪﻥ ﭘﻴﺎﻡ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﻭ ...ﻧﻤﺎﻳﻨﺪ.
ﻻﻳﻪ ﺷﺶ ) . (Presentationﻻﻳﻪ ﻓﻮﻕ ﺩﺍﺩﻩ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﻻﻳﻪ •
Applicationﺍﺧﺬ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺑﮕﻮﻧﻪ ﺍﻱ ﺗﺒﺪﻳﻞ ﺧﻮﺍﻫﺪ ﮐﺮﺩ ﮐﻪ ﺗﻮﺳﻂ ﺳﺎﻳﺮ ﻻﻳﻪ ﻫﺎ
ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺑﺎﺷﺪ.
137
ﻻﻳﻪ ﭘﻨﺞ ) . (Sessionﻻﻳﻪ ﻓﻮﻕ ﻣﺴﺌﻮﻝ ﺍﻳﺠﺎﺩ ،ﭘﺸﺘﻴﺒﺎﻧﻲ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻣﺮﺑﻮﻃﻪ •
ﻭ ﺑﺮﺭﺳﻲ ﺧﻄﺎﺀ ﻭ ﺑﺎﺯﻳﺎﺑﻲ ﺍﻃﻼﻋﺎﺕ ﺑﻴﻦ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ .ﮐﻨﺘﺮﻝ ﺟﺮﻳﺎﻥ
ﺩﺍﺩﻩ ﻫﺎ ،ﺑﺪﻳﻦ ﻣﻌﻨﻲ ﺍﺳﺖ ﮐﻪ ﻻﻳﻪ ﻓﻮﻕ ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﭼﻨﺪﻳﻦ ﺑﺮﻧﺎﻣﻪ
ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺑﺎﺷﺪ ،ﺩﺍﺩﻩ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺑﻪ ﻫﺮ ﺑﺮﻧﺎﻣﻪ ﺭﺍ ﺑﻪ ﻳﮏ streamﺁﻣﺎﺩﻩ ﺗﺒﺪﻳﻞ
ﺗﺎ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺷﺒﮑﻪ ﻓﻴﺰﻳﮑﻲ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﺷﻮﻧﺪ.
ﻻﻳﻪ ﺳﻪ ) . (Networkﺩﺭ ﻻﻳﻪ ﻓﻮﻕ ﺭﻭﺵ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﻫﺎ ﺑﺮﺍﻱ ﺩﺳﺘﮕﺎﻩ ﮔﻴﺮﻧﺪﻩ •
ﺗﻌﻴﻴﻦ ﺧﻮﺍﻫﺪ ﺷﺪ .ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻨﻄﻘﻲ ،ﺭﻭﺗﻴﻨﮓ ﻭ ﺁﺩﺭﺱ ﺩﻫﻲ ﺩﺭ ﺍﻳﻦ ﻻﻳﻪ ﺍﻧﺠﺎﻡ
ﺧﻮﺍﻫﺪ ﺷﺪ.
ﻻﻳﻪ ﺩﻭ ) .( Dataﺩﺭ ﻻﻳﻪ ﻓﻮﻕ ،ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻓﻴﺰﻳﮑﻲ ﺑﻪ ﺩﺍﺩﻩ ﺍﺿﺎﻓﻪ ﺧﻮﺍﻫﻨﺪ •
ﺷﺪ .ﺩﺭ ﺍﻳﻦ ﻻﻳﻪ ﻧﻮﻉ ﺷﺒﮑﻪ ﻭ ﻭﺿﻌﻴﺖ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ) (Packetﻧﻴﺰ ﺗﻌﻴﻴﻦ
ﻣﻲ ﮔﺮﺩﻧﺪ.
ﻻﻳﻪ ﻳﮏ ) . (Physicalﻻﻳﻪ ﻓﻮﻕ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﻣﺴﺘﻘﻴﻢ ﺑﺎ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﺑﻮﺩﻩ ﻭ •
138
ﻻﻳﻪ ﻳﮏ ) . (Interface Networkﻻﻳﻪ ﻓﻮﻕ ،ﻻﻳﻪ ﻫﺎﻱ Physicalﻭ •
Dataﺭﺍ ﺗﺮﮐﻴﺐ ﻭ ﺩﺍﺩﻩ ﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺭﺍ
ﺭﻭﺕ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
ﻻﻳﻪ ﺩﻭ ) . (Internetﻻﻳﻪ ﻓﻮﻕ ﻣﺘﻨﺎﻇﺮ ﻻﻳﻪ Networkﺩﺭ ﻣﺪﻝ OSIﺍﺳﺖ. •
139
ﻧﺤﻮﻩ ﻣﺒﺎﺩﻟﻪ ﺩﺍﺩﻩ ﺑﻴﻦ ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ
ﺁﻳﺎ ﺗﺎﮐﻨﻮﻥ ﺑﺮﺍﻱ ﺷﻤﺎ ﺍﻳﻦ ﺳﻮﺍﻝ ﻣﻄﺮﺡ ﺷﺪﻩ ﺍﺳﺖ ﮐﻪ ﻧﺤﻮﻩ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺑﻴﻦ ﺩﻭ
ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ ﭼﻪ ﺻﻮﺭﺕ ﺍﺳﺖ؟ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ
ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺗﺎﺑﻊ ﻣﺪﻝ ﻣﺮﺟﻊ OSIﻣﻲ ﺑﺎﺷﻨﺪ .ﻣﺪﻝ ﻓﻮﻕ ،ﻫﻤﺎﻧﻨﺪ ﻳﮏ
ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﺍﺟﺮﺍﺋﻲ ﺑﻮﺩﻩ ﻭ ﻋﻤﻠﻴﺎﺕ ﻻﺯﻡ ﺩﺭ ﺯﻣﺎﻥ ﺍﺭﺳﺎﻝ ﻭ ﻳﺎ ﺩﺭﻳﺎﻓﺖ ﺩﺍﺩﻩ ﺭﺍ ﺑﺮﺍﻱ ﻳﮏ
ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺁﺷﻨﺎﺋﻲ ﻭ ﺁﻧﺎﻟﻴﺰ ﻓﺮﺁﻳﻨﺪ ﻣﺒﺎﺩﻟﻪ ﺩﺍﺩﻩ ﺑﻴﻦ ﺩﻭ ﮐﺎﻣﭙــﻴﻮﺗﺮ
ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ ﺑﺮﺭﺳﻲ ﻳﮏ ﻧﻤﻮﻧﻪ ﻣﺜﺎﻝ ﮐﺎﺭﺑﺮﺩﻱ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ.
ﺯﻣﺎﻧﻲ ﮐﻪ ﻳﮏ ﺍﺗﻮﻣﺒﻴﻞ ﺩﺭ ﮐﺎﺭﺧﺎﻧﻪ ﺍﻱ ﺗﻮﻟﻴﺪ ﻣﻲ ﮔﺮﺩﺩ ،ﻳﮏ ﻧﻔﺮ ﺗﻤﺎﻣﻲ ﮐﺎﺭﻫﺎ ﺭﺍ ﺍﻧﺠﺎﻡ
ﻧﺨﻮﺍﻫﺪ ﺩﺍﺩ .ﺗﻮﻟﻴﺪ ﻳﮏ ﺍﺗﻮﻣﺒﻴﻞ ﺑﺮ ﺍﺳﺎﺱ ﻳﮏ ﺧﻂ ﺗﻮﻟﻴﺪ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﻭ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺣﺮﮐﺖ
ﺍﺗﻮﻣﺒﻴﻞ ﺩﺭ ﺧﻂ ﺗﻮﻟﻴﺪ ﻫﺮ ﺷﺨﺺ ﺑﺨﺶ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺭﺍ ﺑﻪ ﺁﻥ ﺍﺿﺎﻓﻪ ﻧﻤﻮﺩﻩ ﻭ ﺯﻣﺎﻧﻲ ﮐﻪ
ﺑﻪ ﺍﻧﺘﻬﺎﻱ ﺧﻂ ﺗﻮﻟﻴﺪ ﻣﻲ ﺭﺳﻴﻢ ،ﺍﺗﻮﻣﺒﻴﻞ ﻣﻮﺭﺩ ﻧﻈﺮ ﺗﻮﻟﻴﺪ ﻭ ﺁﻣﺎﺩﻩ ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
ﻭﺿﻌﻴﺖ ﻓﻮﻕ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺩﺍﺩﻩ ﺍﺭﺳﺎﻟﻲ ﺍﺯ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﻳﮕﺮ ﻧﻴﺰ ﺻﺪﻕ ﻣﻲ ﮐﻨﺪ.
ﻣﺪﻝ OSIﮐﻪ ﺗﻮﺳﻂ ﮐﻤﻴﺘﻪ IEEEﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ ،ﻗﻮﺍﻧﻴﻦ ﻻﺯﻡ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺒﺎﺩﻟﻪ
ﺍﻃﻼﻋﺎﺕ ﺑﻴﻦ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﻭ ﺑﺎ ﭘﻴﺮﻭﻱ ﺍﺯ ﻣﺠﻤﻮﻋﻪ
ﺭﻫﻨﻤﻮﺩﻫﺎﻱ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺩﺭ ﻣﺪﻝ ﻣﺮﺟﻊ ،OSIﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻗﺎﺩﺭ ﺑﻪ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﺳﺎﻳﺮ
ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ) ﺻﺮﻓﻨﻈﺮ ﺍﺯ ﻧﻮﻉ ﮐﺎﻣﭙﻴﻮﺗﺮ ( ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺣﺮﮐﺖ ﺩﺍﺩﻩ ﺑﺎ ﺩﻭ ﺭﻭﺵ ﻣﺘﻔﺎﻭﺕ ﺩﺭ
ﻣﺪﻝ ﻣﺮﺟﻊ OSIﺍﻧﺠﺎﻡ ﻣﻲ ﺷﻮﺩ .ﺩﺭ ﺳﻤﺖ ﻓﺮﺳﺘﻨﺪﻩ ) ﺑﻪ ﻃﺮﻑ ﭘﺎﺋﻴﻦ ( ،ﺩﺍﺩﻩ ﻫﺎ ﮐﭙﺴﻮﻟﻪ
ﺷﺪﻩ ﻭ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﮔﻴﺮﻧﺪﻩ ﺍﺭﺳﺎﻝ ﻣﻲ ﺷﻮﻧﺪ .ﺩﺭ ﺳﻤﺖ ﮔﻴﺮﻧﺪﻩ ) ﺑﻪ ﻃﺮﻑ ﺑﺎﻻ ( ،ﺩﺍﺩﻩ ﻫﺎ
ﺍﺯ ﺣﺎﻟﺖ ﮐﭙﺴﻮﻟﻪ ﺧﺎﺭﺝ ﺷﺪﻩ ﻭ ﺩﺭ ﻧﻬﺎﻳﺖ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﮔﻴﺮﻧﺪﻩ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﻧﺪ.
140
ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ :ﺷﮑﻞ ﺯﻳﺮﻧﺤﻮﻩ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺗﻮﺳﻂ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ:
ﺗﻮﺿﻴﺤﺎﺕ :
ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ،ﻗﺼﺪ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﻳﮕﺮ ﺭﺍ ﺩﺍﺭﺩ .ﺩﺭ ﻻﻳﻪ •
ﺍﺿﺎﻓﻪ ﻣﻲ ﮔﺮﺩﺩ .ﺑﻪ ﺩﺍﺩﻩ ﻣﻮﺟﻮﺩ ﺩﺭ ﻻﻳﻪ " ، Transportﺳﮕﻤﻨﺖ" ﮔﻔﺘﻪ ﻣﻲ ﺷﻮﺩ
.ﻫﺮ ﺳﮕﻤﻨﺖ ﺷﻤﺎﺭﻩ ﮔﺬﺍﺭﻱ ﺷﺪﻩ ﺗﺎ ﺍﻣﮑﺎﻥ ﺑﺎﺯﺳﺎﺯﻱ ﻣﺠﺪﺩ ﺁﻧﺎﻥ ﺩﺭ ﻣﻘﺼﺪ ﻭﺟﻮﺩ
ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ) ﺍﻧﺘﻈﺎﺭ ﺩﺍﺭﻳﻢ ﺩﺍﺩﻩ ﺩﺭﻳﺎﻓﺘﻲ ﺗﻮﺳﻂ ﮔﻴﺮﻧﺪﻩ ﻫﻤﺎﻥ ﺩﺍﺩﻩ ﺍﺭﺳﺎﻟﻲ ﺗﻮﺳﻂ
ﻓﺮﺳﺘﻨﺪﻩ ﺑﺎﺷﺪ(.
ﻫﺮ ﺳﮕﻤﻨﺖ ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺁﺩﺭﺱ ﺩﻫﻲ ﺷﺒﮑﻪ )ﻣﻨﻈﻮﺭ ﺁﺩﺭﺱ ﺩﻫﻲ ﻣﻨﻄﻘﻲ •
ﺍﺳﺖ( ﻭ ﺭﻭﺗﻴﻨﮓ ﻣﻨﺎﺳﺐ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻻﻳﻪ Networkﻗﺮﺍﺭ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺑﻪ ﺩﺍﺩﻩ
ﻣﻮﺟﻮﺩ ﺩﺭ ﻻﻳﻪ ،Networkﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻭ ﻳﺎ Packetﮔﻔﺘﻪ ﻣﻲ ﺷﻮﺩ.
141
ﻻﻳﻪ ،Networkﻫﺪﺭ IPﺧﻮﺩ ﺭﺍ ﺑﻪ ﺁﻥ ﺍﺿﺎﻓﻪ ﻧﻤﻮﺩﻩ ﻭ ﺁﻥ ﺭﺍ ﺑﺮﺍﻱ ﻻﻳﻪ
DataLinkﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﺩﺭ ﻻﻳﻪ DataLinkﺑﻪ ﺩﺍﺩﻩ ﺋﻲ ﮐﻪ ﻫﻢ ﺍﻳﻨﮏ ﺷﺎﻣﻞ ﻫﺪﺭ ﻻﻳﻪ ﻫﺎﻱ Transportﻭ •
Networkﺍﺳﺖ" ،ﻓﺮﻳﻢ" ﮔﻔﺘﻪ ﻣﻲ ﺷﻮﺩ .ﺩﺭ ﺍﻳﻦ ﻻﻳﻪ ،ﻫﺮ ﻳﮏ ﺍﺯ ﺑﺴﺘﻪ ﻫﺎﻱ
ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭﻳﺎﻓﺘﻲ ،ﮐﭙﺴﻮﻟﻪ ﺷﺪﻩ ﻭ ﺩﺭ ﻳﮏ ﻓﺮﻳﻢ ﺑﻪ ﻫﻤﺮﺍﻩ ﺁﺩﺭﺱ ﺳﺨـﺖ
ﺍﻓـــــﺰﺍﺭﻱ) ﺁﺩﺭﺱ ( MACﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﮔﻴﺮﻧﺪﻩ ﺳﺎﺯﻣﺎﻧﺪﻫﻲ
ﻣﻲ ﺷﻮﻧﺪ .ﺩﺭ ﻓﺮﻳﻢ ﻓﻮﻕ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ) LLCﻧﻮﻉ ﭘﺮﻭﺗﮑﻞ ﺍﺭﺳﺎﻟﻲ ﺗﻮﺳﻂ
ﻻﻳﻪ ﻗﺒﻠﻲ ﺯﻣﺎﻧﻲ ﮐﻪ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﻣﻲ ﺭﺳﺪ( ،ﻧﻴﺰ ﺍﺿﺎﻓﻪ ﻣﻲ ﺷﻮﺩ .ﺩﺭ ﺑﺨﺶ
ﺍﻧﺘﻬﺎﺋﻲ ﻓﺮﻳﻢ ،ﻓﻴﻠﺪﻱ ﺑﺎ ﻧﺎﻡ FCSﮐﻪ ﺍﺯ ﮐﻠﻤﺎﺕ Frame Check Sequence
ﺍﻗﺘﺒﺎﺱ ﺷﺪﻩ ﺍﺳﺖ ﺑﻪ ﻣﻨﻈﻮﺭ ﺑﺮﺭﺳﻲ ﺧﻄﺎﺀ ﺍﺿﺎﻓﻪ ﻣﻲ ﮔﺮﺩﺩ.
ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺑﺎﺷﺪ ،ﻓﺮﻳﻢ ﺑﻪ ﺭﻭﺗﺮ •
ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻝ ﺗﺒﺪﻳﻞ ﺷﻮﻧﺪ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﮐﻪ ﻳﮏ ﻓﺮﻳﻢ ﻣﺸﺘﻤﻞ ﺑﺮ ﻣﺠﻤﻮﻋﻪ
ﺍﻱ ﺍﺯ ﺻﻔﺮ ﻭ ﻳﮏ ﺍﺳﺖ ،ﻻﻳﻪ Physicalﻋﻤﻠﻴﺎﺕ ﮐﭙﺴﻮﻟﻪ ﻧﻤﻮﺩﻥ ﺍﺭﻗﺎﻡ ﻣﻮﺟﻮﺩ ﺩﺭ
ﻓﺮﻳﻢ ﺑﻪ ﻳﮏ ﺳﻴﮕﻨﺎﻝ ﺩﻳﺠﻴﺘﺎﻝ ﺭﺍ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺩﺍﺩ.
ﺩﺭ ﺍﺑﺘﺪﺍﻱ ﻓﺮﻳﻢ ﻭ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻫﻤﺰﻣﺎﻥ ﺳﺎﺯﻱ )ﻫﻤﺎﻫﻨﮓ ﺷﺪﻥ ﺩﺭﻳﺎﻓﺖ •
142
ﺩﺭﻳﺎﻓﺖ ﺩﺍﺩﻩ :ﺷﮑﻞ ﺯﻳﺮ ﻧﺤﻮﻩ ﺩﺭﻳﺎﻓﺖ ﺩﺍﺩﻩ ﺗﻮﺳﻂ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ:
ﺗﻮﺿﻴﺤﺎﺕ :
ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﻪ ﻣﻨﻈﻮﺭ ﻫﻤﺎﻫﻨﮓ ﮐﺮﺩﻥ ﺧﻮﺩ ﺑﺎ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻓﺮﺳﺘﻨﺪﻩ •
ﺩﺭ ﺟﻬﺖ ﺧﻮﺍﻧﺪﻥ ﺳﻴﮕﻨﺎﻝ ﺩﻳﺠﻴﺘﺎﻝ ،ﺗﻌﺪﺍﺩ ﻣﺤﺪﻭﺩﻱ ﺍﺯ ﺑﻴﺖ ﻫﺎ ﺭﺍ ﻣﻲ ﺧﻮﺍﻧﺪ .ﭘﺲ ﺍﺯ
ﺍﺗﻤﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻫﻤﺰﻣﺎﻥ ﺳﺎﺯﻱ ﻭ ﺩﺭﻳﺎﻓﺖ ﺗﻤﺎﻣﻲ ﻓﺮﻳﻢ ﺁﻥ ﺭﺍ ﺑﻪ ﻻﻳﻪ ﺑﺎﻻﺗﺮ )ﻻﻳﻪ
،( DataLinkﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﻻﻳﻪ ، DataLinkﺩﺭ ﺍﺑﺘﺪﺍ ﺑﺮﺭﺳﻲ ﻻﺯﻡ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻭﺟﻮﺩ ﺧﻄﺎﺀ ) ( CRCﻭ ﻳﺎ •
143
ﺩﺭ ﻻﻳﻪ ، Networkﺁﺩﺭﺱ IPﻣﻮﺟﻮﺩ ﺩﺭ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺎ ﺁﺩﺭﺱ IPﮐﺎﻣﭙﻴﻮﺗﺮ •
ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﻣﻘﺎﻳﺴﻪ ﺷﺪﻩ ﻭ ﺩﺭ ﺻﻮﺭﺕ ﻣﻄﺎﺑﻘﺖ ،ﻫﺪﺭ ﻻﻳﻪ Networkﻭ ﻳﺎ
ﻫﺪﺭ IPﺍﺯ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺩﺍﺷﺘﻪ ﺷﺪﻩ ﻭ ﻣﺎﺑﻘﻲ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺍﻱ ﻻﻳﻪ ﺑﺎﻻﺗﺮ
) ﻻﻳﻪ ،( Transportﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ .ﺑﻪ ﺩﺍﺩﻩ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ ﻻﻳﻪ ،ﺳﮕﻤﻨﺖ
ﮔﻔﺘﻪ ﻣﻲ ﺷﻮﺩ.
ﺳﮕﻤﻨﺖ ﺩﺭ ﻻﻳﻪ Transportﭘﺮﺩﺍﺯﺵ ﻭ ﻋﻤﻠﻴﺎﺕ ﺑﺎﺯﺳﺎﺯﻱ ﻣﺠﺪﺩ ﺩﺍﺩﻩ ﺩﺭﻳﺎﻓﺘﻲ، •
ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺩﺭ ﺯﻣﺎﻥ ﺑﺎﺯﺳﺎﺯﻱ ﻣﺠﺪﺩ ﺩﺍﺩﻩ ﺩﺭﻳﺎﻓﺘﻲ ﺗﻮﺳﻂ ﮐﺎﻣﭙﻴﻮﺗﺮ ﮔﻴﺮﻧﺪﻩ ﺑﻪ
ﻓﺮﺳﺘﻨﺪﻩ ﺍﻃﻼﻉ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ ﮐﻪ ﻭﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﺑﺨﺶ ﻫﺎ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻧﻤﻮﺩﻩ ﺍﺳﺖ ﺗﺎ
ﺧﻠﻠﻲ ﺩﺭ ﺑﺎﺯﺳﺎﺯﻱ ﻣﺠﺪﺩ ﺩﺍﺩﻩ ﺍﻳﺠﺎﺩ ﻧﮕﺮﺩﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﺭﺳﺎﻝ ﻳﮏ ACKﺑﺮﺍﻱ
ﻓﺮﺳﺘﻨﺪﻩ ) ﺍﻋﻼﻡ ﻭﺿﻌﻴﺖ ﺳﮕﻤﻨﺖ ﺩﺭﻳﺎﻓﺘﻲ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻓﺮﺳﺘﻨﺪﻩ ( ،ﺍﺯ ﭘﺮﻭﺗﮑﻞ TCP
ﺩﺭ ﻣﻘﺎﺑﻞ UDPﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺍﺳﺖ .ﭘﺲ ﺍﺯ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ،ﺩﺍﺩﻩ ﺩﺭﻳﺎﻓﺘﻲ ﺩﺭ
ﺍﺧﺘﻴﺎﺭ ﻻﻳﻪ Applicationﮔﺬﺍﺷﺘﻪ ﻣﻲ ﺷﻮﺩ .ﺩﺭ ﺯﻣﺎﻥ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺑﻴﻦ
ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ،ﮐﺎﺭﺑﺮﺍﻥ ﺩﺭﮔﻴﺮ ﺟﺰﺋﻴﺎﺕ ﻣﺴﺌﻠﻪ ﻧﺸﺪﻩ ﻭ ﺗﻤﺎﻣﻲ
ﻓﺮﺁﻳﻨﺪﻫﺎﻱ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﺑﻪ ﺻﻮﺭﺕ ﺍﺗﻮﻣﺎﺗﻴﮏ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ.
144
ﭘﻮﻳﺶ ﭘﻮﺭﺕ ﻫﺎ
145
ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﭘﻮﻳﺶ ﭘﻮﺭﺕ ﻫﺎ
ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﭘﻮﻳﺶ ﭘﻮﺭﺕ ﻫﺎ ﺩﺭ ﺍﺑﺘﺪﺍ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﻳﮏ ﺩﺭﺧﻮﺍﺳﺖ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ
ﻫﺪﻑ ﻭ ﺑﺮ ﺭﻭﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎ ﻧﻤﻮﺩﻩ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﺘﺎﻳﺞ ﺑﺪﺳﺖ ﺁﻣﺪﻩ ،ﻗﺎﺩﺭ
ﺑﻪ ﺗﺸﺨﻴﺺ ﻭﺿﻌﻴﺖ ﻳﮏ ﭘﻮﺭﺕ ﻣﻲ ﺑﺎﺷﻨﺪ )ﺑﺎﺯ ﺑﻮﺩﻥ ﻭ ﻳﺎ ﺑﺴﺘﻪ ﺑﻮﺩﻥ ﻳﮏ ﭘﻮﺭﺕ( .ﺩﺭ
ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﻳﻨﮕﻮﻧﻪ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﺑﺎ ﺍﻫﺪﺍﻑ ﻣﺨﺮﺏ ﺑﻪ ﺧﺪﻣﺖ ﮔﺮﻓﺘﻪ ﺷﻮﻧﺪ ،ﻣﻬﺎﺟﻤﺎﻥ ﻗﺎﺩﺭ ﺑﻪ
ﺗﺸﺨﻴﺺ ﻭﺿﻌﻴﺖ ﭘﻮﺭﺕ ﻫﺎ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺳﻴﺴﺘﻢ ﻭ ﻳﺎ ﺷﺒﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﻣﻲ ﺷﻮﻧﺪ .ﺁﻧﺎﻥ ﻣﻲ
ﺗﻮﺍﻧﻨﺪ ﺗﻬﺎﺟﻢ ﺧﻮﺩ ﺭﺍ ﺑﮕﻮﻧﻪ ﺍﻱ ﺑﺮﻧﺎﻣﻪ ﺭﻳﺰﻱ ﻧﻤﺎﻳﻨﺪ ﮐﻪ ﻧﺎﺷﻨﺎﺧﺘﻪ ﺑﺎﻗﻲ ﻣﺎﻧﺪﻩ ﻭ ﺍﻣﮑﺎﻥ
ﺗﺸﺨﻴﺺ ﺁﻧﺎﻥ ﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ .ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻧﺼﺐ ﺷﺪﻩ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺷﺒﮑﻪ
ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﮕﻮﻧﻪ ﺍﻱ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺷﻮﻧﺪ ﮐﻪ ﺩﺭ ﺻﻮﺭﺕ ﺗﺸﺨﻴﺺ ﺍﻳﺠﺎﺩ ﻳﮏ
ﺍﺭﺗﺒﺎﻁ ﻭ ﭘﻮﻳﺶ ﻣﺴﺘﻤﺮ ﻭ ﺑﺪﻭﻥ ﻭﻗﻔﻪ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎ ﺩﺭ ﻳﮏ ﻣﺤﺪﻭﺩﻩ ﺯﻣﺎﻧﻲ
ﺧﺎﺹ ﺗﻮﺳﻂ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ،ﻫﺸﺪﺍﺭﻫﺎﻱ ﻻﺯﻡ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻣﺪﻳﺮﻳﺖ ﺳﻴﺴﺘﻢ ﻗﺮﺍﺭ ﺩﻫﻨﺪ.
ﻣﻬﺎﺟﻤﺎﻥ ﺑﻪ ﻣﻨﻈﻮﺭ ﭘﻮﻳﺶ ﭘﻮﺭﺕ ﻫﺎ ﺍﺯ ﺩﻭ ﺭﻭﺵ ﻋﻤﺪﻩ "ﺁﺷﮑﺎﺭ" ﻭ ﻳﺎ " ﻣﺨﻔﻲ" ،ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺭﻭﺵ ﭘﻮﻳﺶ ﺁﺷﮑﺎﺭ ،ﻣﻬﺎﺟﻤﺎﻥ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﻌﺪﺍﺩ ﭘﻮﺭﺕ ﻫﺎﺋﻲ ﮐﻪ ﻗﺼﺪ
ﺑﺮﺭﺳﻲ ﺁﻧﺎﻥ ﺭﺍ ﺩﺍﺭﻧﺪ ،ﺩﺍﺭﺍﻱ ﻣﺤﺪﻭﺩﻳﺖ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ ) ﺍﻣﮑﺎﻥ ﭘﻮﻳﺶ ﺗﻤﺎﻣﻲ ٦٥،٥٣٥
ﭘﻮﺭﺕ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ( .ﺩﺭ ﭘﻮﻳﺶ ﻣﺨﻔﻲ ،ﻣﻬﺎﺟﻤﺎﻥ ﺍﺯ ﺭﻭﺵ ﻫﺎﺋﻲ ﻧﻈﻴﺮ " ﭘﻮﻳﺶ ﮐﻨﺪ "
ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩﻩ ﺗﺎ ﺍﺣﺘﻤﺎﻝ ﺷﻨﺎﺳﺎﺋﻲ ﺁﻧﺎﻥ ﮐﺎﻫﺶ ﻳﺎﺑﺪ .ﺑﺎ ﭘﻮﻳﺶ ﭘﻮﺭﺕ ﻫﺎ ﺩﺭ ﻳﮏ ﻣﺤﺪﻭﺩﻩ
ﺯﻣﺎﻧﻲ ﺑﻴﺸﺘﺮ ،ﺍﺣﺘﻤﺎﻝ ﺗﺸﺨﻴﺺ ﺁﻧﺎﻥ ﺗﻮﺳﻂ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺍﻣـــﻨﻴﺘﻲ ﻧﺼﺐ ﺷﺪﻩ ﺩﺭ ﻳﮏ
ﺷﺒﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﮐﺎﻫﺶ ﭘﻴﺪﺍ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﭘﻮﻳﺶ ﭘﻮﺭﺕ ﻫﺎ ﺑﺎ ﺗﻨﻈﻴﻢ ﻓﻼﮒ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ TCPﻭ ﻳﺎ ﺍﺭﺳﺎﻝ ﺍﻧﻮﺍﻉ ﻣﺘﻔﺎﻭﺗﻲ
ﺍﺯ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ TCPﻗﺎﺩﺭ ﺑﻪ ﺍﻳﺠﺎﺩ ﻧﺘﺎﻳﺞ ﻣﺘﻔﺎﻭﺕ ﻭ ﺗﺸﺨﻴﺺ ﭘﻮﺭﺕ ﻫﺎﻱ ﺑﺎﺯ ﺑﺮ
ﺍﺳﺎﺱ ﺭﻭﺵ ﻫﺎﻱ ﻣﺨﺘﻠﻔﻲ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻣﺜﻼ" ﻳﮏ ﭘﻮﻳﺶ ﻣﺒﺘﻨﻲ ﺑﺮ SYNﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﺘﺎﻳﺞ
ﺑﺪﺳﺖ ﺁﻣﺪﻩ ﺍﻋﻼﻡ ﻣﻲ ﻧﻤﺎﻳﺪ ﮐﻪ ﮐﺪﺍﻡ ﭘﻮﺭﺕ ﺑﺎﺯ ﻭ ﻳﺎ ﮐﺪﺍﻡ ﭘﻮﺭﺕ ﺑﺴﺘﻪ ﺍﺳﺖ ﻭ ﻳﺎ ﺩﺭ ﻳﮏ
ﭘﻮﻳﺶ ﻣﺒﺘﻨﻲ ﺑﺮ FINﺑﺮ ﺍﺳﺎﺱ ﭘﺎﺳﺨﻲ ﮐﻪ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎﻱ ﺑﺴﺘﻪ ﺩﺭﻳﺎﻓﺖ ﻣﻲ ﻧﻤﺎﻳﺪ ) ﭘﻮﺭﺕ
ﻫﺎﻱ ﺑﺎﺯ ﭘﺎﺳﺨﻲ ﺭﺍ ﺍﺭﺳﺎﻝ ﻧﺨﻮﺍﻫﻨﺪ ﮐﺮﺩ( ﻭﺿﻌﻴﺖ ﻳﮏ ﭘﻮﺭﺕ ﺭﺍ ﺗﺸﺨﻴﺺ ﺧﻮﺍﻫﺪ ﺩﺍﺩ.
146
ﻧﺤﻮﻩ ﭘﻴﺸﮕﻴﺮﻱ ﻭ ﺣﻔﺎﻇﺖ
ﻣﺪﻳﺮﺍﻥ ﺷﺒﮑﻪ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻣﮑﺎﻧﺎﺕ ﻣﺘﻨﻮﻋﻲ ﮐﻪ ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﺍﺯ
ﭘﻮﻳﺶ ﭘﻮﺭﺕ ﻫﺎ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﺗﻮﺳﻂ ﻣﻬﺎﺟﻤﺎﻥ ﺁﮔﺎﻩ ﮔﺮﺩﻧﺪ .ﻣﺜﻼ" ﻣﻲ ﺗﻮﺍﻥ ﺗﻤﺎﻣﻲ ﭘﻮﻳﺶ
ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ SYNﺭﺍ ﺛﺒﺖ ﺗﺎ ﺩﺭ ﺍﺩﺍﻣﻪ ﺍﻣﮑﺎﻥ ﺑﺮﺭﺳﻲ ﺩﻗﻴﻖ ﺁﻧﺎﻥ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ.
)ﺗﺸﺨﻴﺺ ﺍﺭﺳﺎﻝ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ SYNﺑﻪ ﭘﻮﺭﺕ ﻫﺎﻱ ﺑﺎﺯ ﻭ ﻳﺎ ﺑﺴﺘﻪ(.
ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻓﺰﺍﻳﺶ ﺍﻳﻤﻦ ﺳﺎﺯﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻭ ﻳﺎ ﺷﺒﮑﻪ ﻣﻮﺭﺩ ﻧﻈﺮ ﻣﻲ ﺗﻮﺍﻥ ﺧﻮﺩ ﺭﺍﺳﺎ" ﺍﻗﺪﺍﻡ ﺑﻪ
ﭘﻮﻳﺶ ﭘﻮﺭﺕ ﻫﺎ ﻧﻤﻮﺩ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﺋﻲ ﻧﻈﻴﺮ NMapﻣﻲ ﺗﻮﺍﻥ ﻣﺤﺪﻭﺩﻩ ﺍﻱ ﺍﺯ
ﺁﺩﺭﺱ ﻫﺎﻱ IPﻭ ﭘﻮﺭﺕ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺑﺮﺭﺳﻲ ﻧﻤﻮﺩ ) ﺷﺒﻴﻪ ﺳﺎﺯﻱ ﻳﮏ ﺗﻬﺎﺟﻢ ( .ﭘﺲ
ﺍﺯ ﻣﺸﺨﺺ ﺷﺪﻥ ﻭﺿﻌﻴﺖ ﻫﺮ ﻳﮏ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﻗﺪﺍﻣﺎﺕ ﻻﺯﻡ ﺣﻔﺎﻇﺘﻲ ﺩﺭ ﺍﻳﻦ
ﺧﺼﻮﺹ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﺍﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺑﻪ ﻭﺟﻮﺩ ) ﺑﺎﺯ ﺑﻮﺩﻥ ( ﻳﮏ ﭘﻮﺭﺕ ﻧﻴﺎﺯ ﻧﻤﻲ ﺑﺎﺷﺪ،
ﻣﻲ ﺑﺎﻳﺴﺖ ﺁﻧﺎﻥ ﺭﺍ ﻏﻴﺮ ﻓﻌﺎﻝ ﻧﻤﻮﺩ .ﺩﺭ ﺻﻮﺭﺕ ﺿﺮﻭﺭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﭘﻮﺭﺕ ،ﻣﻲ ﺑﺎﻳﺴﺖ
ﺑﺮﺭﺳﻲ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺗﻬﺪﻳﺪﺍﺗﻲ ﮐﻪ ﻣﻤﮑﻦ ﺍﺳﺖ ﺍﺯ ﺟﺎﻧﺐ ﺁﻥ ﭘﻮﺭﺕ ﻣﺘﻮﺟﻪ ﺳﻴﺴﺘﻢ ﻭ
ﻳﺎ ﺷﺒﮑﻪ ﮔﺮﺩﺩ ﺭﺍ ﺍﻧﺠﺎﻡ ﻭ ﺑﺎ ﻧﺼﺐ patchﻫﺎﻱ ﻣﺮﺗﺒﻂ ﺑﺎ ﺁﻧﺎﻥ ﺍﻣﮑﺎﻥ ﺳﻮﺀ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
ﭘﻮﺭﺕ ﻫﺎﻱ ﺑﺎﺯ ﺭﺍ ﮐﺎﻫﺶ ﺩﺍﺩ.
ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﭘﻮﻳﺶ ﭘﻮﺭﺕ ﻫﺎ
ﺑﻪ ﻣﻨﻈﻮﺭ ﭘﻮﻳﺶ ﭘﻮﺭﺕ ﻫﺎ ﻭ ﺁﮔﺎﻫﻲ ﺍﺯ ﻭﺿﻌﻴﺖ ﭘﻮﺭﺕ ﻫﺎﻱ TCPﻭ UDPﻣﻲ ﺗﻮﺍﻥ ﺍﺯ
ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ :
) Nmapﻳﺎ ( Network Mapper •
147
ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﭘﻮﺭﺕ ﻫﺎﻱ ﺷﺒﮑﻪ ﺩﺭ ﻭﻳﻨﺪﻭﺯ
148
ﺩﺳﺘﻮﺭ ﻭ ﻳﺎ ﺯﺑﺎﻥ ﻫﺎﻱ ﺍﺳﮑﺮﻳﭙﺖ ﻧﻮﻳﺴﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻫﺮ ﺳﺮﻭﻳﺲ ﺳﻴﺴﺘﻢ
ﻣﻤﮑﻦ ﺍﺳﺖ ﻳﮏ ﻭ ﻳﺎ ﭼﻨﺪﻳﻦ ﺳﺮﻭﻳﺲ ﺷﺒﮑﻪ ﺍﻱ ﺭﺍ ﺍﺭﺍﺋﻪ ﻧﻤﺎﻳﺪ.
ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ، Applicationﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺳﻄﺢ ﺑﺎﻻﻱ ﺷﺒﮑﻪ ﺑﻮﺩﻩ ﮐﻪ ﺍﺯ ﻳﮏ •
ﻣﻲ ﮐﻨﻨﺪ .ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ TCP/IPﻓﺮﻣﺖ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻱ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺩﺳﺘﮕﺎﻩ
ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺷﺒﮑﻪ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ) .ﭘﺮﻭﺗﮑﻞ TCP/IPﺷﺎﻣﻞ
ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺩﻳﮕﺮﻱ ﻧﻈﻴﺮ UDP ، TCPﻭ ICMPﺍﺳﺖ(.
ﭘﻮﺭﺕ .ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﺳﻴﺴﺘﻢ ﺑﺎ ﮔﻮﺵ ﺩﺍﺩﻥ ﺑﻪ ﭘﻮﺭﺕ ﻫﺎ ﻗﺎﺩﺭ ﺑﻪ ﺗﺸﺨﻴﺺ ﺗﺮﺍﻓﻴﮏ •
ﺟﺪﻭﻝ ﺯﻳﺮ ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﭘﻮﺭﺕ ﻫﺎﻱ ﺷﺒﮑﻪ ﺩﺭ ﻣﺤﺼﻮﻻﺕ ﺍﺻﻠﻲ ﻭﻳﻨﺪﻭﺯ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ:
149
Simple TCP/IP Discard UDP 9
Services
Simple TCP/IP Daytime TCP 13
Services
Simple TCP/IP Daytime UDP 13
Services
Simple TCP/IP Quotd TCP 17
Services
Simple TCP/IP Quotd UDP 17
Services
Simple TCP/IP Chargen TCP 19
Services
Simple TCP/IP Chargen UDP 19
Services
FTP Publishing FTP default TCP 20
Service data
FTP Publishing FTP control TCP 21
Service
Application Layer FTP control TCP 21
Gateway Service
Telnet Telnet TCP 23
Simple Mail SMTP TCP 25
Transfer Protocol
Simple Mail SMTP UDP 25
Transfer Protocol
Exchange Server SMTP TCP 25
Exchange Server SMTP UDP 25
Windows WINS TCP 42
Internet Name Replication
Service
Windows WINS UDP 42
Internet Name Replication
Service
DNS Server DNS TCP 53
150
DNS Server DNS UDP 53
Internet DNS TCP 53
Connection
Firewall/Internet
Connection
Sharing
DHCP Server DHCP Server UDP 67
Internet DHCP Server UDP 67
Connection
Firewall/Internet
Connection
Sharing
Trivial FTP TFTP UDP 69
Daemon Service
Windows Media HTTP TCP 80
Services
World Wide Web HTTP TCP 80
Publishing
Service
SharePoint Portal HTTP TCP 80
Server
Kerberos Key Kerberos TCP 88
Distribution
Center
Kerberos Key Kerberos UDP 88
Distribution
Center
Microsoft X.400 TCP 102
Exchange MTA
Stacks
Microsoft POP3 POP3 TCP 110
Service
Exchange Server POP3 TCP 110
Network News NNTP TCP 119
151
Transfer Protocol
Windows Time NTP UDP 123
Windows Time SNTP UDP 123
Message RPC TCP 135
Queuing
Remote RPC TCP 135
Procedure Call
Exchange Server RPC TCP 135
Certificate RPC TCP 135
Services
Cluster Service RPC TCP 135
Distributed File RPC TCP 135
System
Distributed Link RPC TCP 135
Tracking
Distributed RPC TCP 135
Transaction
Coordinator
Event Log RPC TCP 135
Fax Service RPC TCP 135
File Replication RPC TCP 135
Local Security RPC TCP 135
Authority
Remote Storage RPC TCP 135
Notification
Remote Storage RPC TCP 135
Server
Systems RPC TCP 135
Management
Server 2.0
Terminal RPC TCP 135
Services
Licensing
Terminal RPC TCP 135
152
Services Session
Directory
Computer NetBIOS UDP 137
Browser Name
Resolution
Server NetBIOS UDP 137
Name
Resolution
Windows NetBIOS UDP 137
Internet Name Name
Service Resolution
Net Logon NetBIOS UDP 137
Name
Resolution
Systems NetBIOS UDP 137
Management Name
Server 2.0 Resolution
Computer NetBIOS UDP 138
Browser Datagram
Service
Messenger NetBIOS UDP 138
Datagram
Service
Server NetBIOS UDP 138
Datagram
Service
Net Logon NetBIOS UDP 138
Datagram
Service
Distributed File NetBIOS UDP 138
System Datagram
Service
Systems NetBIOS UDP 138
Management Datagram
153
Server 2.0 Service
License Logging NetBIOS UDP 138
Service Datagram
Service
Computer NetBIOS TCP 139
Browser Session
Service
Fax Service NetBIOS TCP 139
Session
Service
Performance NetBIOS TCP 139
Logs and Alerts Session
Service
Print Spooler NetBIOS TCP 139
Session
Service
Server NetBIOS TCP 139
Session
Service
Net Logon NetBIOS TCP 139
Session
Service
Remote NetBIOS TCP 139
Procedure Call Session
Locator Service
Distributed File NetBIOS TCP 139
System Session
Service
Systems NetBIOS TCP 139
Management Session
Server 2.0 Service
License Logging NetBIOS TCP 139
Service Session
Service
154
Exchange Server IMAP TCP 143
SNMP Service SNMP UDP 161
SNMP Trap SNMP Traps UDP 162
Service Outbound
Local Security LDAP Server TCP 389
Authority
Local Security LDAP Server UDP 389
Authority
Distributed File LDAP Server TCP 389
System
Distributed File LDAP Server UDP 389
System
HTTP SSL HTTPS TCP 443
World Wide Web HTTPS TCP 443
Publishing
Service
SharePoint Portal HTTPS TCP 443
Server
Fax Service SMB TCP 445
Print Spooler SMB TCP 445
Server SMB TCP 445
Remote SMB TCP 445
Procedure Call
Locator
Distributed File SMB TCP 445
System
License Logging SMB TCP 445
Service
Net Logon SMB TCP 445
Local Security IPSec ISAKMP UDP 500
Authority
TCP/IP Print LPD TCP 515
Server
File Server for File Server for TCP 548
155
Macintosh Macintosh
Windows Media RTSP TCP 554
Services
Network News NNTP over TCP 563
Transfer Protocol SSL
Remote RPC over TCP 593
Procedure Call HTTP
Exchange Server RPC over TCP 593
HTTP
Local Security LDAP SSL TCP 636
Authority
Local Security LDAP SSL UDP 636
Authority
Exchange Server IMAP over TCP 993
SSL
Exchange Server POP3 over TCP 995
SSL
Microsoft MOM- TCP 1270
Operations Encrypted
Manager 2000
Microsoft SQL SQL over TCP TCP 1433
Server
MSSQL$UDDI SQL over TCP TCP 1433
Microsoft SQL SQL Probe UDP 1434
Server
MSSQL$UDDI SQL Probe UDP 1434
Internet Legacy UDP 1645
Authentication RADIUS
Service
Internet Legacy UDP 1646
Authentication RADIUS
Service
Routing and L2TP UDP 1701
Remote Access
156
Routing and PPTP TCP 1723
Remote Access
Windows Media MMS TCP 1755
Services
Windows Media MMS UDP 1755
Services
Message MSMQ TCP 1801
Queuing
Message MSMQ UDP 1801
Queuing
Internet RADIUS UDP 1812
Authentication Authentication
Service
Internet RADIUS UDP 1813
Authentication Accounting
Service
SSDP Discovery SSDP UDP 1900
Service
Message MSMQ-DCs TCP 2101
Queuing
Message MSMQ-RPC TCP 2103
Queuing
Message MSMQ-RPC TCP 2105
Queuing
Message MSMQ-Mgmt TCP 2107
Queuing
SQL Server: OLAP Services TCP 2393
Downlevel OLAP 7.0
Client Support
SQL Server: OLAP Services TCP 2394
Downlevel OLAP 7.0
Client Support
Windows Media MS Theater UDP 2460
Services
157
DHCP Server MADCAP UDP 2535
SMS Remote SMS Remote TCP 2701
Control Agent Control
(control)
SMS Remote SMS Remote UDP 2701
Control Agent Control
(control)
SMS Remote SMS Remote TCP 2702
Control Agent Control (data)
SMS Remote SMS Remote UDP 2702
Control Agent Control (data)
SMS Remote SMS Remote TCP 2703
Control Agent Chat
SMS Remote SMS Remote UPD 2703
Control Agent Chat
SMS Remote SMS Remote TCP 2704
Control Agent File Transfer
SMS Remote SMS Remote UDP 2704
Control Agent File Transfer
SQL Analysis SQL Analysis TCP 2725
Server Services
UPNP Device UPNP TCP 2869
Host
SSDP Discovery SSDP event TCP 2869
Service notification
Local Security Global TCP 3268
Authority Catalog
Server
Local Security Global TCP 3269
Authority Catalog
Server
Cluster Service Cluster UDP 3343
Services
NetMeeting Terminal TCP 3389
158
Remote Desktop Services
Sharing
Terminal Terminal TCP 3389
Services Services
Message MSMQ-Ping UDP 3527
Queuing
Remote BINL UDP 4011
Installation
Local Security NAT-T UDP 4500
Authority
SSDP DiscoverySSDP legacy TCP 5000
Service event
notification
Windows Media RTP UDP 5004
Services
Windows Media RTCP UDP 5005
Services
ASP.NET State ASP.Net TCP 42424
Service Session State
Microsoft MOM-Clear TCP 51515
Operations
Manager 2000
ﺳﺎﻳﺖ ﻣﺎﻳﮑﺮﻭﺳﺎﻓﺖ: ﻣﻨﺒﻊ
159
ﭘﺮﻭﺗﮑﻞ TCP/IP
TCP/IPﭘﺮﻭﺗﮑﻞ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺩﺭ ﺍﮐﺜﺮ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺰﺭﮒ ﺍﺳﺖ .ﺑﺎ ﺍﻳﻨﮑﻪ ﭘﺮﻭﺗﮑﻞ
ﻓﻮﻕ ﮐﻨﺪ ﻭ ﻣﺴﺘﻠﺰﻡ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻨﺎﺑﻊ ﺯﻳﺎﺩﻱ ﺍﺳﺖ ،ﻭﻟﻲ ﺑﺪﻟﻴﻞ ﻣﺰﺍﻳﺎﻱ ﺑﺎﻻﻱ ﺁﻥ ﻧﻈﻴﺮ :ﻗﺎﺑﻠﻴﺖ
ﺭﻭﺗﻴﻨﮓ ،ﺣﻤﺎﻳﺖ ﺩﺭ ﺍﻏﻠﺐ ﭘﻼﺕ ﻓﻮﺭﻡ ﻫﺎ ﻭ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻋﺎﻣﻞ ﻫﻤﭽﻨﺎﻥ ﺩﺭ ﺯﻣﻴﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ
ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎ ﺣﺮﻑ ﺍﻭﻝ ﺭﺍ ﻣﻲ ﺯﻧﺪ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﮐﺎﺭﺑﺮﺍﻥ ﺑﺎ ﺩﺭ ﺍﺧﺘﻴﺎﺭ
ﺩﺍﺷﺘﻦ ﻭﻳﻨﺪﻭﺯ ﻭ ﭘﺲ ﺍﺯ ﺍﺗﺼﺎﻝ ﺑﻪ ﺷﺒﮑﻪ ﺍﻳﻨﺘﺮﻧﺖ ،ﺑﺮﺍﺣﺘﻲ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﮐﺎﺭﺑﺮﺍﻥ ﺩﻳﮕﺮ
ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ ﮐﻪ ﺍﺯ ﻣﮑﻴﻨﺘﺎﺵ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮐﻨﺪ
ﺍﻣﺮﻭﺯﻩ ﮐﻤﺘﺮ ﻣﺤﻴﻄﻲ ﺭﺍ ﻣﻲ ﺗﻮﺍﻥ ﻳﺎﻓﺖ ﮐﻪ ﻧﻴﺎﺯﺑﻪ ﺩﺍﻧﺶ ﮐﺎﻓﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ TCP/IPﻧﺒﺎﺷﺪ.
ﺣﺘﻲ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﺷﺒﮑﻪ ﺍﻱ ﻧﺎﻭﻝ ﮐﻪ ﺳﺎﻟﻴﺎﻥ ﻣﺘﻤﺎﺩﻱ ﺍﺯ ﭘﺮﻭﺗﮑﻞ IPX/SPXﺑﺮﺍﻱ
ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮐﺮﺩ ،ﺩﺭﻧﺴــﺨﻪ ﺷﻤﺎﺭﻩ ﭘﻨﺞ ﺧﻮﺩ ﺑﻪ ﺿـــﺮﻭﺭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﮑﻞ
ﻓﻮﻕ ﻭﺍﻗﻒ ﻭ ﻧﺴﺨﻪ ﺍﺧﺘﺼﺎﺻﻲ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺍﺭﺍﺋﻪ ﻧﻤﻮﺩ.
ﭘﺮﻭﺗﮑﻞ TCP/IPﺩﺭ ﺍﺑﺘﺪﺍ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺷﺒﮑﻪ ) ARPAnetﻧﺴﺨﻪ ﻗﺒﻠﻲ ﺍﻳﻨﺘﺮﻧﺖ (
ﻃﺮﺍﺣﻲ ﮔﺮﺩﻳﺪ .ﻭﺯﺍﺭﺕ ﺩﻓﺎﻉ ﺍﻣﺮﻳﮑﺎ ﺑﺎ ﻫﻤﮑﺎﺭﻱ ﺑﺮﺧﻲ ﺍﺯ ﺩﺍﻧﺸﮕﺎﻫﻬﺎ ﺍﻗﺪﺍﻡ ﺑﻪ ﻃﺮﺍﺣﻲ ﻳﮏ
ﺳﻴﺴﺘﻢ ﺟﻬﺎﻧﻲ ﻧﻤﻮﺩ ﮐﻪ ﺩﺍﺭﺍﻱ ﻗﺎﺑﻠﻴﺖ ﻫﺎ ﻭ ﻇﺮﻓﻴﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﺣﺘﻲ ﺩﺭ ﺻﻮﺭﺕ ﺑﺮﻭﺯ
ﺟﻨﮓ ﻫﺴﺘﻪ ﺍﻱ ﺑﺎﺷﺪ .ﭘﺮﻭﺗﮑﻞ ﺍﺭﺗﺒﺎﻃﻲ ﺑﺮﺍﻱ ﺷﺒﮑﻪ ﻓﻮﻕ TCP/IP ،ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪ.
160
ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻻﻳﻪ Networkﭘﺮﻭﺗﮑﻞ TCP/IP
ﭘﺮﻭﺗﮑﻞ ،(Transmission Control Protocol)TCPﻣﻬﻤﺘﺮﻳﻦ ﻭﻇﻴﻔﻪ •
ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺻﺤﺖ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺍﺻﻄﻼﺣﺎ"
Connection-orientedﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ .ﻋﻠﺖ ﺍﻳﻦ ﺍﻣﺮ ﺍﻳﺠﺎﺩ ﻳﮏ ﺍﺭﺗﺒﺎﻁ
ﻣﺠﺎﺯﻱ ﺑﻴﻦ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﮔﻴﺮﻧﺪﻩ ﺑﻌﺪ ﺍﺯ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ
ﻫﺎﺋﻲ ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ،ﺍﻣﮑﺎﻧﺎﺕ ﺑﻴﺸﺘﺮﻱ ﺭﺍﺑﻪ ﻣﻨﻈﻮﺭ ﮐﻨﺘﺮﻝ ﺧﻄﺎﻫﺎﻱ ﺍﺣﺘﻤﺎﻟﻲ ﺩﺭ ﺍﺭﺳﺎﻝ
ﺍﻃﻼﻋﺎﺕ ﻓﺮﺍﻫﻢ ﻧﻤﻮﺩﻩ ﻭﻟﻲ ﺑﺪﻟﻴﻞ ﺍﻓﺰﺍﻳﺶ ﺑﺎﺭ ﻋﻤﻠﻴﺎﺗﻲ ﺳﻴﺴﺘﻢ ﮐﺎﺭﺍﺋﻲ ﺁﻧﺎﻥ ﮐﺎﻫﺶ
ﺧﻮﺍﻫﺪ ﻳﺎﻓﺖ .ﺍﺯ ﭘﺮﻭﺗﮑﻞ TCPﺑﻪ ﻋﻨﻮﺍﻥ ﻳﮏ ﭘﺮﻭﺗﮑﻞ ﻗﺎﺑﻞ ﺍﻃﻤﻴﻨﺎﻥ ﻧﻴﺰ ﻳﺎﺩ
ﻣﻲ ﺷﻮﺩ .ﻋﻠﺖ ﺍﻳﻦ ﺍﻣﺮ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻭ ﮐﺴﺐ ﺁﮔﺎﻫﻲ ﻻﺯﻡ ﺍﺯ ﮔﻴﺮﻧﺪﻩ ﺍﻃﻼﻋﺎﺕ
ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺻﺤﺖ ﺍﺭﺳﺎﻝ ﺗﻮﺳﻂ ﻓﺮﺳﺘﻨﺪﻩ ﺍﺳﺖ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺑﺴﺘﻪ ﻫﺎﻱ
ﺍﻃﻼﻋﺎﺗﻲ ﺑﺪﺭﺳﺘﻲ ﺩﺭﺍﺧﺘﻴﺎﺭ ﻓﺮﺳﺘﻨﺪﻩ ﻗﺮﺍﺭ ﻧﮕﻴﺮﻧﺪ ،ﻓﺮﺳﺘﻨﺪﻩ ﻣﺠﺪﺩﺍ" ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ
ﺍﻃﻼﻋﺎﺕ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﭘﺮﻭﺗﮑﻞ . (Datagram Protocol User(UDPﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﻧﻈﻴﺮ ﭘﺮﻭﺗﮑﻞ •
TCPﺩﺭ ﻻﻳﻪ " ﺣﻤﻞ " ﻓﻌﺎﻟﻴﺖ ﻣﻲ ﻧﻤﺎﻳﺪ UDP .ﺑﺮ ﺧﻼﻑ ﭘﺮﻭﺗﮑﻞ TCP
ﺑﺼﻮﺭﺕ " ﺑﺪﻭﻥ ﺍﺗﺼﺎﻝ " ﺍﺳﺖ .ﺑﺪﻳﻬﻲ ﺍﺳﺖ ﮐﻪ ﺳﺮﻋﺖ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﻧﺴﺒﺖ ﺑﻪ
TCPﺳﺮﻳﻌﺘﺮ ﺑﻮﺩﻩ ﻭﻟﻲ ﺍﺯ ﺑﻌﺪ ﮐﻨﺘﺮﻝ ﺧﻄﺎﺀ ﺗﻈﻤﻴﻨﺎﺕ ﻻﺯﻡ ﺭﺍ ﺍﺭﺍﺋﻪ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺩ.
ﺑﻬﺘﺮﻳﻦ ﺟﺎﻳﮕﺎﻩ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺩﺭ ﻣﻮﺍﺭﺩﻱ ﺍﺳﺖ ﮐﻪ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ
ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﻳﮏ ﺳﻄﺢ ﺑﺎﻻ ﺍﺯ ﺍﻃﻤﻴﻨﺎﻥ ،ﻧﻴﺎﺯ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ.
ﭘﺮﻭﺗﮑﻞ . (Internet Protocol(IPﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺩﺭ ﻻﻳﻪ ﺷﺒﮑﻪ ﺍﻳﻔﺎﻱ ﻭﻇﻴﻔﻪ •
161
ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻻﻳﻪ Applicationﭘﺮﻭﺗﮑﻞ TCP/IP
ﭘﺮﻭﺗﮑﻞ TCP/IPﺻﺮﻓﺎ" ﺑﻪ ﺳﻪ ﭘﺮﻭﺗﮑﻞ UDP ،TCPﻭ IPﻣﺤﺪﻭﺩ ﻧﺸﺪﻩ ﻭ ﺩﺭ ﺳﻄﺢ
ﻻﻳﻪ Applicationﺩﺍﺭﺍﻱ ﻣﺠﻤﻮﻋﻪ ﮔﺴﺘﺮﺩﻩ ﺍﻱ ﺍﺯ ﺳﺎﻳﺮ ﭘﺮﻭﺗﮑﻞ ﻫﺎ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ
ﻓﻮﻗﺒﻪ ﻋﻨﻮﺍﻥ ﻣﺠﻤﻮﻋﻪ ﺍﺑﺰﺍﺭﻫﺎﺋﻲ ﺑﺮﺍﻱ ﻣﺸﺎﻫﺪﻩ ،ﺍﺷﮑﺎﻝ ﺯﺩﺍﺋﻲ ﻭ ﺍﺧﺬ ﺍﻃﻼﻋﺎﺕ ﻭ ﺳﺎﻳﺮ
ﻋﻤﻠﻴﺎﺕ ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲ ﮔﻴﺮﻧﺪ .ﺩﺭ ﺍﻳﻦ ﺑﺨﺶ ﺑﻪ ﻣﻌﺮﻓﻲ ﺑﺮﺧﻲ ﺍﺯ ﺍﻳﻦ ﭘﺮﻭﺗﮑﻞ ﻫﺎ
ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ.
ﭘﺮﻭﺗﮑﻞ . (File Transfer Protocol(FTPﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺑﺮﺍﻱ ﺗﮑﺜﻴﺮ ﻓﺎﻳﻞ •
ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺧﺬ ﺍﻃﻼﻋﺎﺕ ﺁﻣﺎﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻳﮏ ﺳﻴﺴﺘﻢ
ﻣﺪﻳﺮﻳﺘﻲ ،ﺩﺭﺧﻮﺍﺳﺖ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﻳﮏ ﺁﮊﺍﻧﺲ SNMPﻣﻄﺮﺡ ﻭ ﻣﺎﺣﺼﻞ ﻋﻤﻠﻴﺎﺕ
ﮐﺎﺭ ﺩﺭ ﻳﮏ MIB-Management Information Baseﺫﺧﻴﺮﻩ
ﻣﻲ ﮔﺮﺩﺩ MIB .ﻳﮏ ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻮﺩﻩ ﮐﻪ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ
ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺭﺍ ﺩﺭ ﺧﻮﺩ ﻧﮕﻬﺪﺍﺭﻱ ﻣﻲ ﻧﻤﺎﻳﺪ) .ﻣﺜﻼ" ﭼﻪ ﻣﻴﺰﺍﻥ ﻓﻀﺎ ﻱ ﻫﺎﺭﺩ
ﺩﻳﺴﮏ ﻭﺟﻮﺩ ﺩﺍﺭﺩ(.
ﭘﺮﻭﺗﮑﻞ . TelNetﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﮐﺎﺭﺑﺮﺍﻥ ﻗﺎﺩﺭ ﺑﻪ ، log onﺍﺟﺮﺍﻱ •
ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﻭ ﻣﺸﺎﻫﺪﻩ ﻓﺎﻳﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﻣﻲ ﺑﺎﺷﻨﺪ.
ﻭﻳﻨﺪﻭﺯ ﺩﺍﺭﺍﻱ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭ ﮔﻴﺮﻧﺪﻩ ﺟﻬﺖ ﻓﻌﺎﻝ ﻧﻤﻮﺩﻥ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
ﭘﺘﺎﻧﺴﻴﻞ ﻓﻮﻕ ﺍﺳﺖ.
162
ﭘﺮﻭﺗﮑﻞ .( simple Mail Transfer Protocol (SMTPﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ •
ﻣﺸﻬﻮﺭﺗﺮﻳﻦ ﭘﺮﻭﺗﮑﻞ ﺩﺭ ﺍﻳﻦ ﮔﺮﻭﻩ ﺑﻮﺩﻩ ﻭ ﺍﺯ ﺁﻥ ﺑﺮﺍﻱ ﺭﺍﻳﺞ ﺗﺮﻳﻦ ﺳﺮﻭﻳﺲ ﺍﻳﻨﺘﺮﻧﺖ
ﻳﻌﻨﻲ ﻭﺏ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻗﺎﺩﺭ ﺑﻪ ﻣﺒﺎﺩﻟﻪ
ﻓﺎﻳﻞ ﻫﺎ ﺑﺎ ﻓﺮﻣﺖ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ )ﻣﺘﻦ ،ﺗﺼﺎﻭﻳﺮ،ﮔﺮﺍﻓﻴﮑﻲ ،ﺻﺪﺍ ،ﻭﻳﺪﺋﻮ ﻭ (...ﺧﻮﺍﻫﻨﺪ
ﺑﻮﺩ .ﺑﺮﺍﻱ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﺍﺳﺘﻨﺎﺩ ﺑﻪ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﻣﻲ ﺑﺎﻳﺴﺖ ،ﺳﺮﻭﻳﺲ ﻓﻮﻕ ﺍﺯ
ﻃﺮﻳﻖ ﻧﺼﺐ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﻓﻌﺎﻝ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﮐﺎﺭﺑﺮﺍﻥ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻨﺪﮔﺎﻥ ﺑﺎ
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﻣﺮﻭﺭﮔﺮ ﻭﺏ ﻗﺎﺩﺭ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺮﻭﻳﺲ ﻓﻮﻕ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ.
ﭘﺮﻭﺗﮑﻞ .(Protocol Network News Transfer (NNTPﺍﺯ ﭘﺮﻭﺗﮑﻞ •
ﻓﻮﻕ ﺑﺮﺍﻱ ﻣﺪﻳﺮﻳﺖ ﭘﻴﺎﻡ ﻫﺎﻱ ﺍﺭﺳﺎﻟﻲ ﺑﺮﺍﻱ ﮔﺮﻭﻩ ﻫﺎﻱ ﺧﺒﺮﻱ ﺧﺼﻮﺻﻲ ﻭ ﻋﻤﻮﻣﻲ
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺮﺍﻱ ﻋﻤﻠﻴﺎﺗﻲ ﻧﻤﻮﺩﻥ ﺳﺮﻭﻳﺲ ﻓﻮﻕ ﻣﻲ ﺑﺎﻳﺴﺖ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ
NNTPﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺪﻳﺮﻳﺖ ﻣﺤﻞ ﺫﺧﻴﺮﻩ ﺳﺎﺯﻱ ﭘﻴﺎﻡ ﻫﺎﻱ ﺍﺭﺳﺎﻟﻲ ﻧﺼﺐ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ
ﮐﺎﺭﺑﺮﺍﻥ ﻭ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﺍﻱ ﻣﻮﺳﻮﻡ ﺑﻪ NewsReader
ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ.
ﻣﺪﻝ ﺁﺩﺭﺱ ﺩﻫﻲ IP
ﻋﻼﻭﻩ ﺑﺮ ﺟﺎﻳﮕﺎﻩ ﭘﺮﻭﺗﮑﻞ ﻫﺎ ،ﻳﮑﻲ ﺩﻳﮕﺮ ﺍﺯ ﻋﻨﺎﺻﺮ ﻣﻬﻢ ﺩﺭ ﺯﻳﺮﺳﺎﺧﺖ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ
TCP/IPﻣﺪﻝ ﺁﺩﺭﺱ ﺩﻫﻲ IPﺍﺳﺖ .ﻣﺪﻝ ﺍﻧﺘﺨﺎﺑﻲ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ ﺭﺍ ﺑﻮﺟﻮﺩ
ﺁﻭﺭﺩ ﮐﻪ ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻟﻲ ﺑﺪﺭﺳﺘﻲ ﺑﻪ ﻣﻘﺼﺪ ﺧﻮﺍﻫﻨﺪ ﺭﺳﻴﺪ.
ﻧﺴﺨﻪ ﺷﻤﺎﺭﻩ ﭼﻬﺎﺭ ) IPﻧﺴﺨﻪ ﻓﻌﻠﻲ ( ﺍﺯ ٣٢ﺑﻴﺖ ﺑﺮﺍﻱ ﺁﺩﺭﺱ ﺩﻫﻲ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩﻩ ﮐﻪ ﺑﻪ
ﻣﻨﻈﻮﺭ ﺗﺴﻬﻴﻞ ﺩﺭ ﺍﻣﺮ ﻧﻤﺎﻳﺶ ﺑﺼﻮﺭﺕ ﭼﻬﺎﺭ ﻋﺪﺩ ﺻﺤﻴﺢ ) ﻣﺒﻨﺎﻱ ﺩﻩ ( ﮐﻪ ﺑﻴﻦ ﺁﻧﻬﺎ ﻧﻘﻄﻪ
ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺍﺳﺖ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﻧﺪ.
163
ﻧﺤﻮﻩ ﺍﺧﺘﺼﺎﺹ IP
ﻧﺤﻮﻩ ﺍﺧﺘﺼﺎﺹ IPﺑﻪ ﻋﻨﺎﺻﺮ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ TCP/IPﻳﮑﻲ ﺍﺯ ﻣﻮﺍﺭﺩ
ﺑﺴﻴﺎﺭ ﻣﻬﻢ ﺍﺳﺖ .ﺍﺧﺘﺼﺎﺹ IPﻣﻤﮑﻦ ﺍﺳﺖ ﺑﺼﻮﺭﺕ ﺩﺳﺘﻲ ﻭ ﺗﻮﺳﻂ ﻣﺪﻳﺮﻳﺖ ﺷﺒﮑﻪ
ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﻭ ﻳﺎ ﺍﻧﺠﺎﻡ ﺭﺳﺎﻟﺖ ﻓﻮﻕ ﺑﺮ ﻋﻬﺪﻩ ﻋﻨﺎﺻﺮ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﻧﻈﻴﺮ
DHCPﻭ ﻳﺎ NATﮔﺬﺍﺷﺘﻪ ﮔﺮﺩﺩ
Subnetting
ﻳﮑﻲ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﻋﻤﻠﻴﺎﺕ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺍﺧﺘﺼﺎﺹ IPﻣﺴﺌﻠﻪ Subnettingﺍﺳﺖ .ﻣﺴﺌﻠﻪ
ﻓﻮﻕ ﺑﻪ ﻋﻨﻮﺍﻥ ﻫﻨﺮ ﻭ ﻋﻠﻤﻲ ﺍﺳﺖ ﮐﻪ ﻣﺎﺣﺼﻞ ﺁﻥ ﺗﻘﺴﻴﻢ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺷﺒﮑﻪ
ﻫﺎﻱ ﮐﻮﭼﮑﺘﺮ ) (Subnetﺍﺯ ﻃﺮﻳﻖ ﺑﺨﺪﻣﺖ ﮔﺮﻓﺘﻦ ۳۲ﺑﻴﺖ ﺑﺎ ﻧﺎﻡ Subnet mask
ﺑﻮﺩﻩ ﮐﻪ ﺑﻨﻮﻋﻲ ﻣﺸﺨﺼﻪ ) (IDﺷﺒﮑﻪ ﺭﺍ ﻣﺸﺨﺺ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﻣﺸﺎﻫﺪﻩ ﻣﻲ ﮔﺮﺩﺩ ،ﻫﺮ IPﺍﺯ ٣٢ﺑﻴﺖ ﺗﺸﮑﻴﻞ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ
ﻣﻲ ﺗﻮﺍﻥ ﺣﺪﺍﮐﺜﺮ ٤,٢٩٤,٩٦٧,٢٩٦ﺁﺩﺭﺱ ﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ ﺭﺍ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ) .( ٢٣٢
164
ﻣﺜﻼ" ﺁﺩﺭﺱ ٢٥٥,٢٥٥,٢٥٥,٢٥٥ﺑﺮﺍﻱ ) Broadcastﺍﻧﺘﺸﺎﺭ ﻋﺎﻡ ( ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
ﻧﻤﺎﻳﺶ ﻳﮏ IPﺑﺼﻮﺭﺕ ﭼﻬﺎﺭ ﻋﺪﺩ ) (Octetﺻﺮﻓﺎ" ﺑﺮﺍﻱ ﺭﺍﺣﺘﻲ ﮐﺎﺭ ﻧﺒﻮﺩﻩ ﻭ ﺍﺯ ﺁﻧﺎﻥ
ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ " ﮐﻼﺱ ﻫﺎﻱ " IPﻧﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
ﻫﺮ Octetﺑﻪ ﺩﻭ ﺑﺨﺶ ﻣﺠﺰﺍ ﺗﻘﺴﻴﻢ ﻣﻲ ﮔﺮﺩﺩ :ﺷﺒﮑﻪ ) (Netﻭ ﻣﻴﺰﺑﺎﻥ ).(Host
ﺍﻭﻟﻴﻦ octetﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﺷﺒﮑﻪ ﺑﻮﺩﻩ ﻭ ﺍﺯ ﺁﻥ ﺑﺮﺍﻱ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﺷﺒﮑﻪ ﺍﻱ ﮐﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ
ﺑﻪ ﺁﻥ ﺗﻌﻠﻖ ﺩﺍﺭﺩ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺳﻪ ﺑﺨﺶ ﺩﻳﮕﺮ ،octetﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﺁﺩﺭﺱ ﮐﺎﻣﭙﻴﻮﺗﺮ
ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺖ
ﭘﻨﺞ ﮐﻼﺱ ﻣﺘﻔﺎﻭﺕ IPﺑﻬﻤﺮﺍﻩ ﺑﺮﺧﻲ ﺁﺩﺭﺱ ﻫﺎﻱ ﺧﺎﺹ ،ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺍﺳﺖ:
. Default Networkﺁﺩﺭﺱ ، ٠,٠,٠,٠ IPﺑﺮﺍﻱ ﺷﺒﮑﻪ ﭘﻴﺶ ﻓﺮﺽ ﺩﺭ ﻧﻈﺮ •
ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺍﺳﺖ .ﺁﺩﺭﺱ ﻓﻮﻕ ﺑﺮﺍﻱ ﻣﻮﺍﺭﺩﻳﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻴﺰﺑﺎﻥ ﺍﺯ ﺁﺩﺭﺱ ﺧﻮﺩ
ﺁﮔﺎﻫﻲ ﻧﺪﺍﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺗﺎ ﺑﻪ ﭘﺮﻭﺗﮑﻞ ﻫﺎﺋﻲ ﻧﻈﻴﺮ DHCPﺍﻋﻼﻡ ﻧﻤﺎﻳﺪ ﺑﺮﺍﻱ ﻭﻱ
ﺁﺩﺭﺳﻲ ﺭﺍ ﺗﺨﺼﻴﺺ ﺩﻫﺪ.
ﮐﻼﺱ . Aﮐﻼﺱ ﻓﻮﻕ ﺑﺮﺍﻱ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺴﻴﺎﺭ ﺑﺰﺭﮒ ﻧﻈﻴﺮ ﻳﮏ ﺷﺮﮐﺖ ﺑﻴﻦ ﺍﻟﻤﻠﻠﻲ •
ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﻣﻲ ﺷﻮﺩ .ﺁﺩﺭﺱ ﻫﺎﺋﻲ ﮐﻪ ﺍﻭﻟﻴﻦ octetﺁﻧﻬﺎ ١ﺗﺎ ١٢٦ﺑﺎﺷﺪ ،ﮐﻼﺱ
Aﻣﻲ ﺑﺎﺷﻨﺪ .ﺍﺯ ﺳﻪ octetﺩﻳﮕﺮﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ
ﻣﻴﺰﺑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﻣﺠﻤﻮﻉ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﻼﺱ ، Aﻣﻌﺎﺩﻝ ١٢٦ﻭ
ﻫﺮ ﻳﮏ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎﻱ ﻓﻮﻕ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ١٦,٧٧٧,٢١٤ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻴﺰﺑﺎﻥ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ.
) ﻋﺪﺩ ﻓﻮﻕ ﺍﺯ ﻃﺮﻳﻖ ﺣﺎﺻﻞ ٢٢٤ - ٢ﺑﺪﺳﺖ ﺁﻣﺪﻩ ﺍﺳﺖ ( .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺗﻌﺪﺍﺩ ﺗﻤﺎﻡ
ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﻼﺱ Aﻣﻌﺎﺩﻝ (٢٣١) ٢,١٤٧,٤٨٣,٦٤٨ﺍﺳﺖ.
ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﻼﺱ ، Aﺑﻴﺖ ﺑﺎ ﺍﺭﺯﺵ ﺑﺎﻻ ﺩﺭ ﺍﻭﻟﻴﻦ octetﻫﻤﻮﺍﺭﻩ ﻣﻘﺪﺍﺭ ﺻﻔﺮ
ﺭﺍ ﺩﺍﺭﺩ.
)Host (Node NET
24.53.107 115.
165
. LoopBackﺁﺩﺭﺱ ١٢٧,٠,٠,١ IPﺑﺮﺍﻱ LoopBackﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪﻩ •
ﺍﺳﺖ .ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻴﺰﺑﺎﻥ ﺍﺯ ﺁﺩﺭﺱ ﻓﻮﻕ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﻳﮏ ﭘﻴﺎﻡ ﺑﺮﺍﻱ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﮐﻨﺪ ).ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﮔﻴﺮﻧﺪﻩ ﭘﻴﺎﻡ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻲ ﺑﺎﺷﺪ( ﺁﺩﺭﺱ ﻓﻮﻕ ﺍﻏﻠﺐ ﺑﺮﺍﻱ
ﺗﺴﺖ ﻭ ﺍﺷﮑﺎﻝ ﺯﺩﺍﺋﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
ﮐﻼﺱ . Bﮐﻼﺱ ﻓﻮﻕ ﺑﺮﺍﻱ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺘﻮﺳﻂ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﻣﻲ ﺷﻮﺩ ).ﻣﺜﻼ" ﻳﮏ •
ﺩﺍﻧﺸﮕﺎﻩ ﺑﺰﺭﮒ ( ﺁﺩﺭﺱ ﻫﺎﺋﻲ ﮐﻪ ﺍﻭﻟﻴﻦ octetﺁﻧﻬﺎ ١٢٨ﺗﺎ ١٩١ﺑﺎﺷﺪ ،ﮐﻼﺱ B
ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﮐﻼﺱ ﻓﻮﻕ ﺍﺯ ﺩﻭﻣﻴﻦ octetﻫﻢ ﺑﺮﺍﻱ ﻣﺸﺨﺺ ﮐﺮﺩﻥ ﺷﺒﮑﻪ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﮔﺮﺩﺩ .ﺍﺯ ﺩﻭ octetﺩﻳﮕﺮ ﺑﺮﺍﻱ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ
ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ (٢١٤ ) ١٦,٣٨٤ﺷﺒﮑﻪ ﺍﺯ ﻧﻮﻉ ﮐﻼﺱ B
ﻭﺟﻮﺩ ﺩﺍﺭﺩ .ﺗﻌﺪﺍﺩ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ) ﻫﺮ ﺷﺒﮑﻪ ( ﻣﻌﺎﺩﻝ
( ٢ ١٦ - ٢) ٦٥,٥٣٤ﺍﺳﺖ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺗﻌﺪﺍﺩ ﺗﻤﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ
ﮐﻼﺱ Bﻣﻌﺎﺩﻝ (٢٣٠) ١,٠٧٣,٧٤١,٨٢٤ﺍﺳﺖ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﻼﺱ ،Bﺍﻭﻟﻴﻦ ﻭ
ﺩﻭﻣﻴﻦ ﺑﻴﺖ ﺩﺭ ﺍﻭﻟﻴﻦ octetﺑﻪ ﺗﺮﺗﻴﺐ ﻣﻘﺪﺍﺭ ﻳﮏ ﻭ ﺻﻔﺮ ﺭﺍ ﺩﺍﺭﺍ ﻣﻲ ﺑﺎﺷﻨﺪ.
)Host (Node NET
53.107 145.24.
ﮐﻼﺱ . Cﮐﻼﺱ ﻓﻮﻕ ﺑﺮﺍﻱ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﻮﭼﮏ ﺗﺎ ﻣﺘﻮﺳﻂ ﺩﺭ ﻧﻈﺮﮔﺮﻓﺘﻪ •
ﻣﻲ ﺷﻮﺩ .ﺁﺩﺭﺱ ﻫﺎﺋﻲ ﮐﻪ ﺍﻭﻟﻴﻦ octetﺁﻧﻬﺎ ١٩٢ﺗﺎ ٢٢٣ﺑﺎﺷﺪ ،ﮐﻼﺱ ) ( C
ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﮐﻼﺱ ﻓﻮﻕ ﺍﺯ ﺩﻭﻣﻴﻦ ﻭ ﺳﻮﻣﻴﻦ octetﻫﻢ ﺑﺮﺍﻱ ﻣﺸﺨﺺ ﮐﺮﺩﻥ
ﺷﺒﮑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺍﺯ ﺁﺧﺮﻳﻦ octetﺑﺮﺍﻱ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﻫﺮ ﻳﮏ ﺍﺯ
ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ( ٢ ٢١ ) ٢,٠٩٧,١٥٢
ﺷﺒﮑﻪ ﮐﻼﺱ Cﻭﺟﻮﺩ ﺩﺍﺭﺩ.ﺗﻌﺪﺍﺩ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ) ﻫﺮ
ﺷﺒﮑﻪ ( ﻣﻌﺎﺩﻝ ( ٢ ٨ - ٢) ٢٥٤ﺍﺳﺖ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺗﻌﺪﺍﺩ ﺗﻤﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ﺩﺭ
ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﻼﺱ Cﻣﻌﺎﺩﻝ ( ٢٢٩ ) ٥٣٦,٨٧٠,٩١٢ﺍﺳﺖ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﻼﺱ
166
، Cﺍﻭﻟﻴﻦ ،ﺩﻭﻣﻴﻦ ﻭ ﺳﻮﻣﻴﻦ ﺑﻴﺖ ﺩﺭ ﺍﻭﻟﻴﻦ octetﺑﻪ ﺗﺮﺗﻴﺐ ﻣﻘﺪﺍﺭ ﻳﮏ ،ﻳﮏ
ﻭ ﺻﻔﺮ ﺭﺍ ﺩﺍﺭﺍ ﻣﻲ ﺑﺎﺷﻨﺪ.
)Host(Node NET
107 195.24.53.
ﮐﻼﺱ . Dﺍﺯ ﮐﻼﺱ ﻓﻮﻕ ﺑﺮﺍﻱ multicastsﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ •
ﻳﮏ ﮔﺮﻩ ) ﻣﻴﺰﺑﺎﻥ( ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﻳﮏ ﮔﺮﻭﻩ ﺧﺎﺹ ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ.
ﺗﻤﺎﻡ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﮔﺮﻭﻩ ،ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﺧﻮﺍﻫﻨﺪ
ﮐﺮﺩ ) .ﻣﺜﻼ" ﻳﮏ ﺭﻭﺗﺮ ﺳﻴﺴﮑﻮ ﺁﺧﺮﻳﻦ ﻭﺿﻌﻴﺖ ﺑﻬﻨﮕﺎﻡ ﺷﺪﻩ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﺳﺎﻳﺮ
ﺭﻭﺗﺮﻫﺎﻱ ﺳﻴﺴﮑﻮ ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ ( ﮐﻼﺱ ﻓﻮﻕ ﻧﺴﺒﺖ ﺑﻪ ﺳﻪ ﮐﻼﺱ ﻗﺒﻠﻲ ﺩﺍﺭﺍﻱ
ﺳﺎﺧﺘﺎﺭﻱ ﮐﺎﻣﻼ" ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ .ﺍﻭﻟﻴﻦ ،ﺩﻭﻣﻴﻦ ،ﺳﻮﻣﻴﻦ ﻭ ﭼﻬﺎﺭﻣﻴﻦ ﺑﻴﺖ ﺑﻪ ﺗﺮﺗﻴﺐ
ﺩﺍﺭﺍﻱ ﻣﻘﺎﺩﻳﺮ ﻳﮏ ،ﻳﮏ ،ﻳﮏ ﻭ ﺻﻔﺮ ﻣﻲ ﺑﺎﺷﻨﺪ ٢٨.ﺑﻴﺖ ﺑﺎﻗﻴﻤﺎﻧﺪﻩ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺸﺨﺺ
ﻧﻤﻮﺩﻥ ﮔﺮﻭﻫﻬﺎﺋﻲ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻮﺩﻩ ﮐﻪ ﭘﻴﺎﻡ Multicastﺑﺮﺍﻱ ﺁﻧﺎﻥ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ
ﻣﻲ ﺷﻮﺩ .ﮐﻼﺱ ﻓﻮﻕ ﻗﺎﺩﺭ ﺑﻪ ﺁﺩﺭﺳﻲ ﺩﻫﻲ ( ٢٢٦) ٢٦٨,٤٣٥,٤٥٦ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺳﺖ.
)Host(Node NET
24.53.107 224.
ﮐﻼﺱ . Eﺍﺯ ﮐﻼﺱ ﻓﻮﻕ ﺑﺮﺍﻱ ﻣﻮﺍﺭﺩ ﺗﺠﺮﺑﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ .ﮐﻼﺱ ﻓﻮﻕ ﻧﺴﺒﺖ •
ﺑﻪ ﺳﻪ ﮐﻼﺱ ﺍﻭﻟﻴﻪ ﺩﺍﺭﺍﻱ ﺳﺎﺧﺘﺎﺭﻱ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ .ﺍﻭﻟﻴﻦ ،ﺩﻭﻣﻴﻦ ،ﺳﻮﻣﻴﻦ ﻭ
ﭼﻬﺎﺭﻣﻴﻦ ﺑﻴﺖ ﺑﻪ ﺗﺮﺗﻴﺐ ﺩﺍﺭﺍﻱ ﻣﻘﺎﺩﻳﺮ ﻳﮏ ،ﻳﮏ ،ﻳﮏ ﻭ ﻳﮏ ﻣﻲ ﺑﺎﺷﻨﺪ ٢٨ .ﺑﻴﺖ
ﺑﺎﻗﻴﻤﺎﻧﺪﻩ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﮔﺮﻭﻫﻬﺎﺋﻲ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻮﺩﻩ ﮐﻪ ﭘﻴﺎﻡ
Multicastﺑﺮﺍﻱ ﺁﻧﺎﻥ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﻣﻲ ﺷﻮﺩ .ﮐﻼﺱ ﻓﻮﻕ ﻗﺎﺩﺭ ﺑﻪ ﺁﺩﺭﺳﻲ ﺩﻫﻲ
( ٢٢٦) ٢٦٨,٤٣٥,٤٥٦ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺳﺖ
)Host(Node NET
24.53.107 240.
167
. BroadCastﭘﻴﺎﻡ ﻫﺎﺋﻲ ﺑﺎ ﺁﺩﺭﺳﻲ ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ،ﺑﺮﺍﻱ ﺗﻤﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺩﺭ •
ﺷﺒﮑﻪ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺍﻳﻦ ﻧﻮﻉ ﭘﻴﺎﻡ ﻫﺎ ﻫﻤﻮﺍﺭﻩ ﺩﺍﺭﺍﻱ ﺁﺩﺭﺱ ﺯﻳﺮ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ:
255.255.255.255
ﺁﺩﺭﺱ ﻫﺎﻱ ﺭﺯﻭ ﺷﺪﻩ .ﺁﺩﺭﺱ ﻫﺎﻱ IPﺯﻳﺮﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ •
168
ﻣﻔﺎﻫﻴﻢ ﺍﻭﻟﻴﻪ ﭘﺮﻭﺗﮑﻞ ) TCP/IPﻗﺴﻤﺖ ﺍﻭﻝ (
،TCP/IPﻳﮑﻲ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺳﺖ.
ﺍﻳﻨﺘﺮﻧﺖ ﺑﻌﻨﻮﺍﻥ ﺑﺰﺭﮔﺘﺮﻳﻦ ﺷﺒﮑﻪ ﻣﻮﺟﻮﺩ ،ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺑﻤﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ
ﻣﺘﻔﺎﻭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﭘﺮﻭﺗﮑﻞ ،ﻣﺠﻤﻮﻋﻪ ﻗﻮﺍﻧﻴﻦ ﻻﺯﻡ ﺑﻤﻨﻈﻮﺭ ﻗﺎﻧﻮﻧﻤﻨﺪ ﻧﻤﻮﺩﻥ ﻧﺤﻮﻩ
ﺍﺭﺗﺒﺎﻃﺎﺕ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺳﺖ .ﺩﺭ ﻣﺠﻤﻮﻋﻪ ﻣﻘﺎﻻﺗﻲ ﮐﻪ ﺍﺭﺍﺋﻪ ﺧﻮﺍﻫﺪ ﺷﺪ ﺑﻪ
ﺑﺮﺭﺳﻲ ﺍﻳﻦ ﭘﺮﻭﺗﮑﻞ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ .ﺩﺭ ﺍﻳﻦ ﺑﺨﺶ ﻣﻮﺍﺭﺩﻱ ﻫﻤﭽﻮﻥ :ﻓﺮﺁﻳﻨﺪ ﺍﻧﺘﻘﺎﻝ
ﺍﻃﻼﻋﺎﺕ ،ﻣﻌﺮﻓﻲ ﻭ ﺗﺸﺮﻳﺢ ﻻﻳﻪ ﻫﺎﻱ ﭘﺮﻭﺗﮑﻞ TCP/IPﻭ ﻧﺤﻮﻩ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻮﮐﺖ ﺑﺮﺍﻱ
ﺍﻳﺠﺎﺩ ﺗﻤﺎﻳﺰ ﺩﺭ ﺍﺭﺗﺒﺎﻃﺎﺕ ،ﺗﺸﺮﻳﺢ ﻣﻲ ﮔﺮﺩﺩ.
ﻣﻘﺪﻣﻪ
ﺍﻣﺮﻭﺯﻩ ﺍﮐﺜﺮ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺑﺰﺭﮒ ﻭ ﺍﻏﻠﺐ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻋﺎﻣﻞ ﻣﻮﺟﻮﺩ ﺍﺯ
ﭘﺮﻭﺗﮑﻞ ،TCP/IPﺍﺳﺘﻔﺎﺩﻩ ﻭ ﺣﻤﺎﻳﺖ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ، TCP/IP .ﺍﻣﮑﺎﻧﺎﺕ ﻻﺯﻡ ﺑﻤﻨﻈﻮﺭ
ﺍﺭﺗﺒﺎﻁ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻏﻴﺮﻣﺸﺎﺑﻪ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﺁﻭﺭﺩ.
ﺍﺯ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﻣﻬﻢ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ،ﻣﻲ ﺗﻮﺍﻥ ﺑﻪ ﻣﻮﺍﺭﺩﻱ ﻫﻤﭽﻮﻥ :ﻗﺎﺑﻠﻴﺖ ﺍﺟﺮﺍﺀ ﺑﺮ ﺭﻭﻱ
ﻣﺤﻴﻂ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ،ﺿﺮﻳﺐ ﺍﻃﻤﻴﻨﺎﻥ ﺑﺎﻻ ،ﻗﺎﺑﻠﻴﺖ ﮔﺴﺘﺮﺵ ﻭ ﺗﻮﺳﻌﻪ ﺁﻥ ،ﺍﺷﺎﺭﻩ ﮐﺮﺩ .ﺍﺯ
ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ،ﺑﻤﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﻣﺘﻨﻮﻉ ﺁﻥ ﻧﻈﻴﺮ ﻭﺏ ﻭ
ﻳﺎ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺗﻨﻮﻉ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﭘﺸﺘﻪ TCP/IPﻭ
ﺍﺭﺗﺒﺎﻁ ﻣﻨﻄﻘﻲ ﻭ ﺳﻴﺴﺘﻤﺎﺗﻴﮏ ﺁﻧﻬﺎ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ،ﺍﻣﮑﺎﻥ ﺗﺤﻘﻖ ﺍﺭﺗﺒﺎﻁ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ
ﺭﺍ ﺑﺎ ﺍﻫﺪﺍﻑ ﻣﺘﻔﺎﻭﺕ ،ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ .ﻓﺮﺁﻳﻨﺪ ﺑﺮﻗﺮﺍﺭﻱ ﻳﮏ ﺍﺭﺗﺒﺎﻁ ،ﺷﺎﻣﻞ ﻓﻌﺎﻟﻴﺖ ﻫﺎﻱ
ﻣﺘﻌﺪﺩﻱ ﻧﻈﻴﺮ :ﺗﺒﺪﻳﻞ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺁﺩﺭﺱ IPﻣﻌﺎﺩﻝ ،ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﻣﻮﻗﻌﻴﺖ ﮐﺎﻣﭙﻴﻮﺗﺮ
ﻣﻘﺼﺪ ،ﺑﺴﺘﻪ ﺑﻨﺪﻱ ﺍﻃﻼﻋﺎﺕ ،ﺁﺩﺭﺱ ﺩﻫﻲ ﻭ ﺭﻭﺗﻴﻨﮓ ﺩﺍﺩﻩ ﻫﺎ ﺑﻤﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﻣﻮﻓﻘﻴﺖ ﺁﻣﻴﺰ
ﺑﻪ ﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈﺮ ،ﺑﻮﺩﻩ ﮐﻪ ﺗﻮﺳﻂ ﻣﺠﻤﻮﻋﻪ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﭘﺸﺘﻪ TCP/IP
ﺍﻧﺠﺎﻡ ﻣﻲ ﮔﻴﺮﺩ.
169
ﻣﻌﺮﻓﻲ ﭘﺮﻭﺗﮑﻞ TCP/IP
، TCP/IPﭘﺮﻭﺗﮑﻠﻲ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺑﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﻣﺒﺘﻨﻲ
ﺑﺮ ﻭﻳﻨﺪﻭﺯ ۲۰۰۰ﺍﺳﺖ .ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ،ﺑﻤﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺰﺭﮒ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﮔﺮﺩﺩ .ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺍﺯ ﻃﺮﻳﻖ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﮐﻪ ﺩﺭ ﭼﻬﺎﺭﻻﻳﻪ ﻣﺠﺰﺍ
ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﺷﺪﻩ ﺍﻧﺪ ،ﻣﻴﺴﺮ ﻣﻲ ﮔﺮﺩﺩ .ﻫﺮ ﻳﮏ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﭘﺸﺘﻪ ، TCP/IP
ﺩﺍﺭﺍﻱ ﻭﻇﻴﻔﻪ ﺍﻱ ﺧﺎﺹ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ) ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ( ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺯﻣﺎﻥ ﺍﻳﺠﺎﺩ ﻳﮏ
ﺍﺭﺗﺒﺎﻁ ،ﻣﻤﮑﻦ ﺍﺳﺖ ﺩﺭ ﻳﮏ ﻟﺤﻈﻪ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ،ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ
ﻧﻤﺎﻳﻨﺪ ،TCP/IP .ﺩﺍﺭﺍﻱ ﻗﺎﺑﻠﻴﺖ ﺗﻔﮑﻴﮏ ﻭ ﺗﻤﺎﻳﺰ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ
ﺑﺎ ﺳﺎﻳﺮ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﺑﻮﺩﻩ ﻭ ﭘﺲ ﺍﺯ ﺩﺭﻳﺎﻓﺖ ﺩﺍﺩﻩ ﻫﺎ ﺍﺯ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ،ﺁﻧﻬﺎ ﺭﺍ ﺑﺮﺍﻱ ﺑﺮﻧﺎﻣﻪ ﻣﺘﻨﺎﻇﺮ
ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﻳﮕﺮ ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ .ﻧﺤﻮﻩ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺗﻮﺳﻂ ﭘﺮﻭﺗﮑﻞ
TCP/IPﺍﺯ ﻣﺤﻠﻲ ﺑﻪ ﻣﺤﻞ ﺩﻳﮕﺮ ،ﺑﺎ ﻓﺮﺁﻳﻨﺪ ﺍﺭﺳﺎﻝ ﻳﮏ ﻧﺎﻣﻪ ﺍﺯ ﺷـــﻬﺮﻱ ﺑﻪ ﺷــــﻬﺮ،
ﻗﺎﺑﻞ ﻣﻘﺎﻳﺴﻪ ﺍﺳﺖ.
ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﻣﺒﺘﻨﻲ ﺑﺮ ، TCP/IPﺑﺎ ﻓﻌﺎﻝ ﺷﺪﻥ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﺑﺮ ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍ ﺁﻏﺎﺯ
ﻣﻲ ﮔﺮﺩﺩ .ﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ،ﺩﺍﺩﻩ ﻫـﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺟﻬﺖ ﺍﺭﺳﺎﻝ ﺭﺍ ﺑﮕــﻮﻧﻪ ﺍﻱ ﺁﻣــﺎﺩﻩ ﻭ
ﻓﺮﻣـــﺖ ﻣﻲ ﻧﻤﺎﻳﺪ ﮐﻪ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﻗﺎﺑﻞ ﺧﻮﺍﻧﺪﻥ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺑﺎﺷﻨﺪ ) .ﻣﺸﺎﺑﻪ ﻧﻮﺷﺘﻦ
ﻧﺎﻣﻪ ﺑﺎ ﺯﺑﺎﻧﻲ ﮐﻪ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ،ﻗﺎﺩﺭ ﺑﻪ ﻣﻄﺎﻟﻌﻪ ﺁﻥ ﺑﺎﺷﺪ( .ﺩﺭ ﺍﺩﺍﻣﻪ ﺁﺩﺭﺱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ،
ﺑﻪ ﺩﺍﺩﻩ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺍﺿﺎﻓﻪ ﻣﻲ ﮔﺮﺩﺩ ) ﻣﺸﺎﺑﻪ ﺁﺩﺭﺱ ﮔﻴﺮﻧﺪﻩ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﻧﺎﻣﻪ ﻣﺸﺨﺺ
ﻣﻲ ﮔﺮﺩﺩ( .ﭘﺲ ﺍﺯ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ،ﺩﺍﺩﻩ ﺑﻬﻤﺮﺍﻩ ﺍﻃﻼﻋﺎﺕ ﺍﺿﺎﻓﻲ ) ﺩﺭﺧﻮﺍﺳﺘﻲ ﺑﺮﺍﻱ
ﺗﺎﺋﻴﺪ ﺩﺭﻳﺎﻓﺖ ﺩﺭ ﻣﻘﺼﺪ ( ،ﺩﺭ ﻃﻮﻝ ﺷﺒﮑﻪ ﺑﺤﺮﮐﺖ ﺩﺭﺁﻣﺪﻩ ﺗﺎ ﺑﻪ ﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺮﺳﺪ.
ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ،ﺍﺭﺗﺒﺎﻃﻲ ﺑﻪ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺷﺒﮑﻪ ﺑﻤﻨﻈﻮﺭ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻧﺪﺍﺷﺘﻪ ،ﻭ ﺗﺤﻘﻖ
ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﺑﺎ ﺭﻭﻳﮑﺮﺩﻱ ﻣﺴﺘﻘﻞ ﻧﺴﺒﺖ ﺑﻪ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ،ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ.
170
ﻻﻳﻪ ﻫﺎﻱ ﭘﺮﻭﺗﮑﻞ TCP/IP
، TCP/IPﻓﺮﺁﻳﻨﺪﻫﺎﻱ ﻻﺯﻡ ﺑﻤﻨﻈﻮﺭ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺭﺍ ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﻭ ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ
ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺩﺭ ﭘﺸﺘﻪ TCP/IPﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺑﻤﻨﻈﻮﺭ ﺍﻓﺰﺍﻳﺶ ﮐﺎﺭﺁﺋﻲ ﺩﺭ
ﺗﺤﻘﻖ ﻓﺮﺁﻳﻨﺪ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ،ﭘﺮﻭﺗﮑﻞ ﻫﺎ ﺩﺭ ﻻﻳﻪ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ،ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﺷﺪﻩ ﺍﻧﺪ.
ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﺩﺭﺱ ﺩﻫﻲ ﺩﺭ ﺍﻧﺘﻬﺎ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﻭ ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ
ﺷﺒﮑﻪ ﻗﺎﺩﺭ ﺑﻪ ﺑﺮﺭﺳﻲ ﺁﻥ ﺑﺎ ﺳﺮﻋﺖ ﻣﻄﻠﻮﺏ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ،ﺻﺮﻓﺎ" ﮐﺎﻣﭙﻴﻮﺗﺮﻱ
ﮐﻪ ﺑﻌﻨﻮﺍﻥ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﻣﻌﺮﻓﻲ ﺷﺪﻩ ﺍﺳﺖ ،ﺍﻣﮑﺎﻥ ﺑﺎﺯ ﻧﻤﻮﺩﻥ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻭ ﺍﻧﺠﺎﻡ
ﭘﺮﺩﺍﺯﺵ ﻫﺎﻱ ﻻﺯﻡ ﺑﺮ ﺭﻭﻱ ﺁﻥ ﺭﺍ ﺩﺍﺭﺍ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ، TCP/IP .ﺍﺯ ﻳﮏ ﻣﺪﻝ ﺍﺭﺗﺒﺎﻃﻲ ﭼﻬﺎﺭ
ﻻﻳﻪ ﺑﻤﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﻣﺤﻠﻲ ﺑﻪ ﻣﺤﻞ ﺩﻳﮕﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪApplication :
,Transport ,Internetﻭ ،Interface Networkﻻﻳﻪ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﭘﺮﻭﺗﮑﻞ
TCP/IPﻣﻲ ﺑﺎﺷﻨﺪ.ﻫﺮ ﻳﮏ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻭﺍﺑﺴﺘﻪ ﺑﻪ ﭘﺸﺘﻪ ، TCP/IPﺑﺎ ﺗﻮﺟﻪ ﺑﻪ
ﺭﺳﺎﻟﺖ ﺧﻮﺩ ،ﺩﺭ ﻳﮑﻲ ﺍﺯ ﻻﻳﻪ ﻫﺎﻱ ﻓﻮﻕ ،ﻗﺮﺍﺭ ﻣﻲ ﮔﻴﺮﻧﺪ.
ﻻﻳﻪ Application
ﻻﻳﻪ ، Applicationﺑﺎﻻﺗﺮﻳﻦ ﻻﻳﻪ ﺩﺭ ﭘﺸﺘﻪ TCP/IPﺍﺳﺖ .ﺗﻤﺎﻣﻲ ﺑﺮﻧﺎﻣﻪ ﻭ ﺍﺑﺰﺍﺭﻫﺎﻱ
ﮐﺎﺭﺑﺮﺩﻱ ﺩﺭ ﺍﻳﻦ ﻻﻳﻪ ،ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻻﻳﻪ ﻓﻮﻕ ،ﻗﺎﺩﺭ ﺑﻪ ﺩﺳﺘﺘﻴﺎﺑﻲ ﺑﻪ ﺷﺒﮑﻪ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ.
ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ ﻻﻳﻪ ﺑﻤﻨﻈﻮﺭ ﻓﺮﻣﺖ ﺩﻫﻲ ﻭ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﮔﺮﺩﻧﺪ HTTP .ﻭ FTPﺩﻭ ﻧﻤﻮﻧﻪ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎ ﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ ﻻﻳﻪ ﻣﻲ ﺑﺎﺷﻨﺪ.
171
ﭘﺮﻭﺗﮑﻞ .(HTTP)Hyper text Transfer Protocolﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ، •
ﺍﻃﻼﻋﺎﺕ ﺑﺪﻭﻥ ﭘﺬﻳﺮﻓﺘﻦ ﻣﺴﺌﻮﻟﻴﺘﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﻀﻤﻴﻦ ﺻﺤﺖ ﺗﻮﺯﻳﻊ ﺍﻃﻼﻋﺎﺕ ﺭﺍ
ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ.
ﻻﻳﻪ ﺍﻳﻨﺘﺮﻧﺖ
ﻻﻳﻪ "ﺍﻳﻨﺘﺮﻧﺖ" ،ﻣﺴﺌﻮﻝ ﺁﺩﺭﺱ ﺩﻫﻲ ،ﺑﺴﺘﻪ ﺑﻨﺪﻱ ﻭ ﺭﻭﺗﻴﻨﮓ ﺩﺍﺩﻩ ﻫﺎ ،ﺍﺳﺖ .ﻻﻳﻪ ﻓﻮﻕ ،ﺷﺎﻣﻞ
ﭼﻬﺎﺭ ﭘﺮﻭﺗﮑﻞ ﺍﺳﺎﺳﻲ ﺍﺳﺖ:
. (IP)Internet Protocolﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ،ﻣﺴﺌﻮﻝ ﺁﺩﺭﺳﻲ ﺩﺍﺩﻩ ﻫﺎ ﺑﻤﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ •
172
. (ICMP)Internet Control Message Protocolﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ،ﻣﺴﺌﻮﻝ •
ﺍﺭﺍﺋﻪ ﺗﻮﺍﺑﻊ ﻋﻴﺐ ﻳﺎﺑﻲ ﻭ ﮔﺰﺍﺭﺵ ﺧﻄﺎﺀ ﺩﺭ ﺻﻮﺭﺕ ﻋﺪﻡ ﺗﻮﺯﻳﻊ ﺻﺤﻴﺢ ﺍﻃﻼﻋﺎﺕ
ﺍﺳﺖ.
.(Protocol Managemant IGMP)Internet Groupﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ، •
173
ﺁﺩﺭﺱ IP
ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ،ﻣﺴﺘﻠﺰﻡ ﻣﺸﺨﺺ ﺷﺪﻥ ﺁﺩﺭﺱ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﺒﺪﺍﺀ ﻭ
ﻣﻘﺼﺪ ﺍﺳﺖ ) ﺷﺮﻁ ﺍﻭﻟﻴﻪ ﺑﻤﻨﻈﻮﺭ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺩﻭ ﻧﻘﻄﻪ ،ﻣﺸﺨﺺ ﺑﻮﺩﻥ ﺁﺩﺭﺱ ﻧﻘﺎﻁ
ﺩﺭﮔﻴﺮ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﺍﺳﺖ ( .ﺁﺩﺭﺱ ﻫﺮ ﻳﮏ ﺍﺯ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﺩﺭﮔﻴﺮ ﺩﺭ ﻓﺮﺁﻳﻨﺪ ﺍﺭﺗﺒﺎﻁ ،ﺗﻮﺳﻂ
ﻳﮏ ﻋﺪﺩ ﻣﻨﺤﺼﺮﺑﻔﺮﺩ ﮐﻪ IPﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ ،ﻣﺸﺨﺺ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺁﺩﺭﺱ ﻓﻮﻕ ﺑﻪ ﻫﺮﻳﮏ
ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻧﺴﺒﺖ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ ، ١٠,١,١ .١٠ : IP .ﻧﻤﻮﻧﻪ ﺍﻱ ﺩﺭ
ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺍﺳﺖ.
ﭘﻮﺭﺕ TCP/UDP
ﭘﻮﺭﺕ ﻣﺸﺨﺼﻪ ﺍﻱ ﺑﺮﺍﻱ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﻭ ﺩﺭ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺧﺎﺹ ﺍﺳﺖ .ﭘﻮﺭﺕ ﺑﺎ ﻳﮑﻲ
ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻻﻳﻪ "ﺣﻤﻞ" ) TCPﻭ ﻳﺎ ( UDPﻣﺮﺗﺒﻂ ﻭ ﭘﻮﺭﺕ TCPﻭ ﻳﺎ ﭘﻮﺭﺕ
، UDPﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ .ﭘﻮﺭﺕ ﻣﻲ ﺗﻮﺍﻧﺪ ﻋﺪﺩﻱ ﺑﻴﻦ ﺻﻔﺮ ﺗﺎ ۶۵۵۳۵ﺭﺍ ﺷﺎﻣﻞ ﺷﻮﺩ .ﭘﻮﺭﺕ
ﻫﺎ ﺑﺮﺍﻱ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ TCP/IPﺳﻤﺖ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ،ﺑﻌﻨﻮﺍﻥ ﭘﻮﺭﺕ ﻫﺎﻱ "ﺷﻨﺎﺧﺘﻪ ﺷﺪﻩ "
ﻧﺎﻣﻴﺪﻩ ﺷﺪﻩ ﻭ ﺑﻪ ﺍﻋﺪﺍﺩ ﮐﻤﺘﺮ ﺍﺯ ۱۰۲۴ﺧﺘﻢ ﻭ ﺭﺯﻭ ﻣﻲ ﺷﻮﻧﺪ ﺗﺎ ﻫﻴﭽﮕﻮﻧﻪ ﺗﻌﺎﺭﺽ ﻭ
ﺑﺮﺧﻮﺭﺩﻱ ﺑﺎ ﺳﺎﻳﺮ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﺑﻮﺟﻮﺩ ﻧﻴﺎﻳﺪ .ﻣﺜﻼ" ﺑﺮﻧﺎﻣﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ FTPﺍﺯ ﭘﻮﺭﺕ
TCPﺑﻴﺴﺖ ﻭ ﻳﺎ ﺑﻴﺴﺖ ﻭﻳﮏ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﺳﻮﮐﺖ )(Socket
ﺳﻮﮐﺖ ،ﺗﺮﮐﻴﺒﻲ ﺍﺯ ﻳﮏ ﺁﺩﺭﺱ IPﻭ ﭘﻮﺭﺕ TCPﻭﻳﺎ ﭘﻮﺭﺕ UDPﺍﺳﺖ .ﻳﮏ
ﺑﺮﻧﺎﻣﻪ ،ﺳﻮﮐﺘﻲ ﺭﺍ ﺑﺎ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﺁﺩﺭﺱ IPﻣﺮﺑﻮﻁ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻭ ﻧﻮﻉ ﺳﺮﻭﻳﺲ )TCP
ﺑﺮﺍﻱ ﺗﻀﻤﻴﻦ ﺗﻮﺯﻳﻊ ﺍﻃﻼﻋﺎﺕ ﻭ ﻳﺎ (UDPﻭ ﭘﻮﺭﺗﻲ ﮐﻪ ﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﺑﺮﻧﺎﻣﻪ ﺍﺳﺖ ،ﻣﺸﺨﺺ
ﻣﻲ ﻧﻤﺎﻳﺪ .ﺁﺩﺭﺱ IPﻣﻮﺟﻮﺩ ﺩﺭ ﺳﻮﮐﺖ ،ﺍﻣﮑﺎﻥ ﺁﺩﺭﺱ ﺩﻫﻲ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺭﺍ ﻓﺮﺍﻫﻢ ﻭ
ﭘﻮﺭﺕ ﻣﺮﺑﻮﻃﻪ ،ﺑﺮﻧﺎﻣﻪ ﺍﻱ ﺭﺍ ﮐﻪ ﺩﺍﺩﻩ ﻫﺎ ﺑﺮﺍﻱ ﺁﻥ ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ.
174
ﻣﻔﺎﻫﻴﻢ ﺍﻭﻟﻴﻪ ﭘﺮﻭﺗﮑﻞ ) TCP/IPﻗﺴﻤﺖ ﺩﻭﻡ (
ﺩﺭ ﻗﺴﻤﺖ ﺍﻭﻝ ،ﭘﺮﻭﺗﮑﻞ TCP/IPﺑﻬﻤﺮﺍﻩ ﻻﻳﻪ ﻫﺎﻱ ﺁﻥ ﻣﻌﺮﻓﻲ ﮔﺮﺩﻳﻴﺪ .ﺩﺭ ﺍﻳﻦ
ﻗﺴﻤﺖ ،ﺑﻪ ﺑﺮﺭﺳﻲ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ TCP/IPﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ.
، TCP/IPﺷﺎﻣﻞ ﺷﺶ ﭘﺮﻭﺗﮑﻞ ﺍﺳﺎﺳﻲ) ( ARP، TCP,UDP,IP,ICMP,IGMPﻭ
ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﮐﺎﺭﺑﺮﺩﻱ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻓﻮﻕ ،ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺍﺳﺘﺎﺩﻧﺪﺍﺭﺩﻫﺎ
ﻱ ﻻﺯﻡ ﺑﻤﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻭ ﺩﺳﺘﮕﺎﻫﻬﺎ ﺭﺍ ﺩﺭ ﺷﺒﮑﻪ ،ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺗﻤﺎﻣﻲ
ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﻭ ﺳﺎﻳﺮ ﭘﺮﻭﺗﮑﻞ ﻫﺎ ﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﭘﺮﻭﺗﮑﻞ ، TCP/IPﺑﻪ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺷﺶ ﮔﺎﻧﻪ
ﻓﻮﻕ ﻣﺮﺗﺒﻂ ﻭ ﺍﺯ ﺧﺪﻣﺎﺕ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺗﻮﺳﻂ ﺁﻧﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺗﺸﺮﻳﺢ
ﻋﻤﻠﮑﺮﺩ ﻭ ﺟﺎﻳﮕﺎﻩ ﻫﺮ ﻳﮏ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ،ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ.
175
ﺑﺮ ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻣﺒﺪﺍﺀ TCP ،ﺩﺍﺩﻩ ﻫﺎﺋﻲ ﮐﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺭﺳﺎﻝ ﮔﺮﺩﻧﺪ ﺭﺍ ﺩﺭ ﺑﺴﺘﻪ ﻫﺎﻱ
ﺍﻃﻼﻋﺎﺗﻲ ) (Packetﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ،TCP ،ﺑﺴﺘﻪ ﻫﺎﻱ
ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺗﺸﺨﻴﺺ ﻭ ﺩﺍﺩﻩ ﻫﺎﻱ ﺍﻭﻟﻴﻪ ﺭﺍ ﻣﺠﺪﺩﺍ" ﺍﻳﺠﺎﺩ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
176
ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ،ﺩﺭ ﺳﻪ ﻣﺮﺣﻠﻪ ﺻﻮﺭﺕ ﻣﻲ ﭘﺬﻳﺮﺩ:
ﻣﺮﺣﻠﻪ ﺍﻭﻝ :ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍﺀ ،ﺍﺗﺼﺎﻝ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ
، Sessionﻣﻘﺪﺍﺭﺩﻫﻲ ﺍﻭﻟﻴﻪ ﻣﻲ ﻧﻤﺎﻳﺪ ) ﻋﺪﺩ ﻣﺮﺑﻮﻁ ﺑﻪ ﻣﻮﻗﻌﻴﺖ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ
ﺑﻴﻦ ﺗﻤﺎﻡ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻭ ﺍﻧﺪﺍﺯﻩ ﻣﺮﺑﻮﻁ ﺑﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ(
ﻣﺮﺣﻠﻪ ﺩﻭﻡ :ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ،ﺑﻪ ﺍﻃﻼﻋﺎﺕ Sessionﺍﺭﺳﺎﻝ ﺷﺪﻩ ،ﭘﺎﺳﺦ ﻣﻨﺎﺳﺐ ﺭﺍ
ﺧﻮﺍﻫﺪ ﺩﺍﺩ.
ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍﺀ ،ﺍﺯ ﺷﺮﺡ ﻭﺍﻗﻌﻪ ﺑﮑﻤﮏ Acknowledgmentﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺗﻮﺳﻂ
ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ،ﺁﮔﺎﻫﻲ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
ﭘﺮﻭﺗﮑﻞ : UDPﻻﻳﻪ Transport
177
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﮑﻞ UDPﺩﺭ ﻣﻮﺍﺭﺩﻱ ﻫﻤﭽﻮﻥ )،media Multicasting Streamingﻧﻈﻴﺮ
ﻳﮏ ﻭﻳﺪﺋﻮ ﮐﻨﻔﺮﺍﻧﺲ ﺯﻧﺪﻩ( ﻭ ﻳﺎ ﺍﻧﺘﺸﺎﺭ ﻟﻴﺴﺘﻲ ﺍﺯ ﺍﺳﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﮐﻪ ﺑﻤﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻃﺎﺕ
ﻣﺤﻠﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﻧﺪ ،ﻣﺘﺪﺍﻭﻝ ﺍﺳﺖ .ﺑﻤﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ، UDPﺑﺮﻧﺎﻣﻪ ﻣﺒﺪﺍﺀ ﻣﻲ
ﺑﺎﻳﺴﺖ ﭘﻮﺭﺕ UDPﺧﻮﺩ ﺭﺍ ﻣﺸﺨﺺ ﻧﻤﺎﻳﺪ ﺩﻗﻴﻘﺎ" ﻣﺸﺎﺑﻪ ﻋﻤﻠﻴﺎﺗﻲ ﮐﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﮐﺎﻣﭙﻴﻮﺗﺮ
ﻣﻘﺼﺪ ﺍﻧﺠﺎﻡ ﺩﻫﺪ .ﻻﺯﻡ ﺑﻪ ﻳﺎﺩﺁﻭﺭﻱ ﺍﺳﺖ ﮐﻪ ﭘـﻮﺭﺕ ﻫﺎﻱ UDPﺍﺯ ﭘــــﻮﺭﺕ ﻫﺎﻱ TCP
ﻣﻲ ﺑﺎﺷﻨﺪ )ﺣﺘﻲ ﺍﮔﺮ ﺩﺍﺭﺍﻱ ﺷﻤﺎﺭﻩ ﭘﻮﺭﺕ ﻳﮑﺴﺎﻥ ﺑﺎﺷﻨﺪ(. ﻣﺠﺰﺍ ﻭ ﻣﺘــــﻤﺎﻳﺰ
ﭘﺮﻭﺗﮑﻞ : IPﻻﻳﻪ Internet
178
ﻋﻤﻠﻴﺎﺕ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺗﻮﺳﻂ IP
ﻣﻲ ﺗﻮﺍﻥ IPﺭﺍ ﺑﻌﻨﻮﺍﻥ ﻣﮑﺎﻧﻲ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺖ ﮐﻪ ﻋﻤﻠﻴﺎﺕ ﻣﺮﺗﺐ ﺳﺎﺯﻱ ﻭ ﺗﻮﺯﻳﻊ ﺑﺴﺘﻪ
ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﺁﻥ ﻣﺤﻞ ،ﺻﻮﺭﺕ ﻣﻲ ﭘﺬﻳﺮﺩ .ﺑﺴﺘﻪ ﻫﺎ ﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺗﻮﺳﻂ ﻳﮑﻲ ﺍﺯ
ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻻﻳﻪ ﺣﻤﻞ ) TCPﻭ ﻳﺎ (UDPﻭ ﻳﺎ ﺍﺯ ﻃﺮﻳﻖ ﻻﻳﻪ " ﺍﻳﺘﺮﻓﻴﺲ ﺷﺒﮑﻪ " ،ﺑﺮﺍﻱ
IPﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺍﻭﻟﻴﻦ ﻭﻇﻴﻔﻪ ،IPﺭﻭﺗﻴﻨﮓ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻤﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺑﻪ
ﻣﻘﺼﺪ ﻧﻬﺎﺋﻲ ﺍﺳﺖ .ﻫﺮ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ،ﺷﺎﻣﻞ ﺁﺩﺭﺱ IPﻣﺒﺪﺍﺀ ) ﻓﺮﺳﺘﻨﺪﻩ ( ﻭ ﺁﺩﺭﺱ IP
ﻣﻘﺼﺪ ) ﮔﻴﺮﻧﺪﻩ ( ﻣﻲ ﺑﺎﺷﺪ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ، IPﺁﺩﺭﺱ ﻣﻘﺼﺪﻱ ﺭﺍ ﻣﺸﺨﺺ ﻧﻤﺎﻳﺪ ﮐﻪ ﺩﺭ
ﻫﻤﺎﻥ ﺳﮕﻤﻨﺖ ﻣﻮﺟﻮﺩ ﺑﺎﺷﺪ ،ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻣﺴﺘﻘﻴﻤﺎ" ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺭﺳﺎﻝ
ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭﺻﻮﺭﺗﻴﮑﻪ ﺁﺩﺭﺱ ﻣﻘﺼﺪ ﺩﺭﻫﻤﺎﻥ ﺳﮕﻤﻨﺖ ﻧﺒﺎﺷﺪ ، IP،ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﻳﮏ ﺭﻭﺗﺮ
ﺍﺳﺘﻔﺎﺩﻩ ﻭ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﺮﺍﻱ ﺁﻥ ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﺪ.ﻳﮑﻲ ﺩﻳﮕﺮ ﺍﺯ ﻭﻇﺎﻳﻒ ، IPﺍﻳﺠﺎﺩ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ
ﻋﺪﻡ ﻭﺟﻮﺩ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ) ﺑﻼﺗﮑﻠﻴﻒ ! ( ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺖ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﻣﺤﺪﻭﺩﻳﺖ
ﺯﻣﺎﻧﻲ ﺧﺎﺻﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻣﺪﺕ ﺯﻣﺎﻥ ﺣﺮﮐﺖ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﻃﻮﻝ ﺷﺒﮑﻪ ،ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ
ﻣﻲ ﺷﻮﺩ .ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ،ﺗﻮﺳﻂ ﻧﺴﺒﺖ ﺩﺍﺩﻥ ﻳﮏ ﻣﻘﺪﺍﺭ (Time To Live)TTLﺑﻪ ﻫﺮ
ﻳﮏ ﺍﺯ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺻﻮﺭﺕ ﻣﻲ ﭘﺬﻳﺮﺩ ،TTL .ﺣﺪﺍﮐﺜﺮ ﻣﺪﺕ ﺯﻣﺎﻧﻲ ﺭﺍ ﮐﻪ ﺑﺴﺘﻪ
ﺍﻃﻼﻋﺎﺗﻲ ﻗﺎﺩﺭ ﺑﻪ ﺣﺮﮐﺖ ﺩﺭ ﻃﻮﻝ ﺷﺒﮑﻪ ﺍﺳﺖ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ) ﻗﺒﻞ ﺍﺯ ﺍﻳﻨﮑﻪ ﺑﺴﺘﻪ
ﺍﻃﻼﻋﺎﺗﻲ ﮐﻨﺎﺭ ﮔﺬﺍﺷﺘﻪ ﺷﻮﺩ(.
ﭘﺮﻭﺗﮑﻞ : ICMPﻻﻳﻪ Internet
179
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ، ICMPﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻭ ﺭﻭﺗﺮﻫﺎ ﮐﻪ ﺍﺯ IPﺑﻤﻨـــﻈﻮﺭ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﺳﺘــــﻔﺎﺩﻩ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﻗﺎﺩﺭ ﺑﻪ ﮔﺰﺍﺭﺵ ﺧﻄﺎﺀ ﻭ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻣﺤﺪﻭﺩ ﺩﺭ ﺭﺍﺑﻄﻪ ﻭﺿﻌﻴﺖ
ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻣﺜﻼ" ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ، IPﻗﺎﺩﺭ ﺑﻪ ﺗﻮﺯﻳﻊ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ
ﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈﺮ ﻧﺒﺎﺷﺪ ICMP ،ﻳﮏ ﭘﻴﺎﻡ ﻣﺒﺘﻨﻲ ﺑﺮ ﻏﻴﺮﻗﺎﺑﻞ ﺩﺳﺘﺮﺱ ﺑﻮﺩﻥ ﺭﺍ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ
ﻣﺒﺪﺍﺀ ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ .ﺑﺎ ﺍﻳﻨﮑﻪ ﭘﺮﻭﺗﮑﻞ IPﺑﻤﻨﻈﻮﺭ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﻩ ﺑﻴﻦ ﺭﻭﺗﺮﻫﺎﻱ ﻣﺘﻌﺪﺩ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﮔﺮﺩﺩ ،ﻭﻟﻲ ICMPﺑﻪ ﻧﻤﺎﻳﻨﺪﮔﻲ ﺍﺯ ،TCP/IPﻣﺴﺌﻮﻝ ﺍﺭﺍﺋﻪ ﮔﺰﺍﺭﺵ ﺧﻄﺎﺀ ﻭ ﻳﺎ ﭘﻴﺎﻡ
ﻫﺎﻱ ﮐﻨﺘﺮﻟﻲ ﺍﺳﺖ .ﺗﻼﺵ ، ICMPﺩﺭ ﺍﻳﻦ ﺟﻬﺖ ﻧﻴﺴﺖ ﮐﻪ ﭘﺮﻭﺗﮑﻞ IPﺭﺍ ﺑﻌﻨﻮﺍﻥ ﻳﮏ
ﭘﺮﻭﺗﮑﻞ ﻣﻄﻤﺌﻦ ﻣﻄﺮﺡ ﻧﻤﺎﻳﺪ ،ﭼﻮﻥ ﭘﻴﺎﻡ ﻫﺎﻱ ICMPﺩﺍﺭﺍﻱ ﻫﻴﭽﮕﻮﻧﻪ ﻣﺤﺘﻮﻳﺎﺗﻲ ﻣﺒﻨﻲ ﺑﺮ
ﺍﻋﻼﻡ ﻭﺻﻮﻝ ﭘﻴﺎﻡ ) ( Acknowledgmentﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻧﻤﻲ ﺑﺎﺷﻨﺪ ،ICMP .ﺻﺮﻓﺎ"
ﺳﻌﻲ ﺩﺭ ﮔﺰﺍﺭﺵ ﺧﻄﺎﺀ ﻭ ﺍﺭﺍﺋﻪ ﻓﻴﺪﺑﮏ ﻫﺎﻱ ﻻﺯﻡ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﺤﻘﻖ ﻳﮏ ﻭﺿﻌﻴﺖ ﺧﺎﺹ
ﺭﺍ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﭘﺮﻭﺗﮑﻞ : IGMPﻻﻳﻪ Internet
180
ﻣﺪﻳﺮﻳﺖ Multicasting IP
ﺗﻤﺎﻣﻲ ﺍﻋﻀﺎﺀ ﻳﮏ ﮔﺮﻭﻩ ، multicastﺑﻪ ﺗﺮﺍﻓﻴﮏ IPﻫﺪﺍﻳﺖ ﺷﺪﻩ ﺑﻪ ﻳﮏ ﺁﺩﺭﺱ
، Multicast IPﮔﻮﺵ ﺩﺍﺩﻩ ﻭ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺑﻪ ﺁﻥ ﺁﺩﺭﺱ ﺭﺍ ﺩﺭﻳﺎﻓﺖ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﭼﻨﺪﻳﻦ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻧﻴﺎﺯﻣﻨﺪ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻧﻈﻴﺮ Streaming
mediaﺑﺎﺷﻨﺪ ،ﻳﮏ ﺁﺩﺭﺱ IPﺭﺯﻭﺷﺪﻩ ﺑﺮﺍﻱ multicastingﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺭﻭﺗﺮﻫﺎ
ﮐﻪ ﺑﻤﻨﻈﻮﺭ ﭘﺮﺩﺍﺯﺵ multicastﭘﻴﮑﺮﺑﻨﺪﻱ ﻣﻲ ﮔﺮﺩﻧﺪ ،ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺑﺮﺍﻱ
ﺗﻤﺎﻣﻲ ﻣﺸﺘﺮﮐﻴﻦ ﮔﺮﻭﻩ multicastﺍﺭﺳﺎﻝ ) ( Forwardﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺑﻤﻨﻈﻮﺭ ﺭﺳﻴﺪﻥ
ﺍﻃﻼﻋﺎﺕ Multicastﺑﻪ ﮔﻴﺮﻧﺪﮔﺎﻥ ﻣﺮﺑﻮﻃﻪ ،ﻫﺮ ﻳﮏ ﺍﺯ ﺭﻭﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻣﺴﻴﺮ ﺍﺭﺗﺒﺎﻃﻲ
ﻣﻲ ﺑﺎﻳﺴﺖ ،ﻗﺎﺩﺭ ﺑﻪ ﺣﻤﺎﻳﺖ ﺍﺯ Multicastingﺑﺎﺷﻨﺪ .ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ
ﻭﻳﻨﻮﺯ ،٢٠٠٠ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ، IP Multicastﻣﻲ ﺑﺎﺷﻨﺪ.
ﭘﺮﻭﺗﮑﻞ : ARPﻻﻳﻪ Internet
181
ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺭﺳﻴﺪﻥ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﻻﻳﻪ IPﺑﻤﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺩﺭ ﺷﺒﮑﻪ ،ﺁﺩﺭﺱ ﻫﺎﻱ
MACﻣﺒﺪﺍﺀ ﻭ ﻣﻘﺼﺪ ﺑﻪ ﺁﻥ ﺍﺿﺎﻓﻪ ﻣﻲ ﮔﺮﺩﺩ.
،ARPﺍﺯ ﺟﺪﻭﻟﻲ ﺧﺎﺹ ﺑﻤﻨﻈﻮﺭ ﺫﺧﻴﺮﻩ ﺳﺎﺯﻱ ﺁﺩﺭﺱ ﻫﺎﻱ IPﻭ MACﻣﺮﺑﻮﻃﻪ ،ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﻧﻤﺎﻳﺪ .ﻣﺤﻠﻲ ﺍﺯ ﺣﺎﻓﻈﻪ ﮐﻪ ﺟﺪﻭﻝ ﻓﻮﻕ ﺩﺭ ﺁﻧﺠﺎ ﺫﺧﻴﺮﻩ ﻣﻲ ﮔﺮﺩﺩ Cache ARP ،ﻧﺎﻣﻴﺪﻩ
ﻣﻲ ﺷﻮﺩ ARP Cache .ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﺎﻣﻞ mappingﻻﺯﻡ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻭ
ﺭﻭﺗﺮﻫﺎﺋﻲ ﺍﺳﺖ ﮐﻪ ﺻﺮﻓﺎ" ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺳﮕﻤﻨﺖ ﻣﺸﺎﺑﻪ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ.
182
ﻣﻔﺎﻫﻴﻢ ﺍﻭﻟﻴﻪ ﭘﺮﻭﺗﮑﻞ ) TCP/IPﻗﺴﻤﺖ ﺳﻮﻡ (
183
. Hostnameﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ،ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻴﺰﺑﺎﻥ ﺭﺍ ﻧﻤﺎﻳﺶ ﻣﻲ ﺩﻫﺪ .ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
ﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ،ﮐﺎﻓﻲ ﺍﺳﺖ Hostnameﺭﺍ ﺩﺭ ﺧﻂ ﺩﺳﺘﻮﺭ ،ﺗﺎﻳﭗ ﻭ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺧﻮﺩ
ﺭﺍ ﻣﺸﺎﻫﺪﻩ ﻧﻤﻮﺩ.
. IPConfigﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ،ﭘﻴﮑﺮﺑﻨﺪﻱ ﺟﺎﺭﻱ ﭘﺮﻭﺗﮑﻞ TCP/IPﺭﺍ ﻧﻤﺎﻳﺶ ) ﺁﺩﺭﺱ
، IPﺁﺩﺭﺱ ﻓﻴﺰﻳﮑﻲ ،ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻭ ( ...ﻭ ﺍﻣﮑﺎﻥ ﺑﻬﻨﮕﺎﻡ ﺳﺎﺯﻱ ﺁﻥ ﺭﺍ ﻓﺮﺍﻫﻢ
ﻣﻲ ﻧﻤﺎﻳﺪ .ﺑﻤﻨﻈﻮﺭ ﺁﺷﻨﺎﺋﻲ ﺑﺎ ﭘﺘﺎﻧﺴﻴﻞ ﻫﺎﻱ ﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ipcongig/help ،ﺭﺍ ﺩﺭ
ﺧﻂ ﺩﺳﺘﻮﺭ ﺗﺎﻳﭗ ﺗﺎ ﺑﺎ ﻋﻤﻠﮑﺮﺩ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﻭ ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺁﺷﻨﺎ ﮔﺮﺩﻳﺪ.
. Nbtstatﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ،ﺟﺪﻭﻝ ﻣﺤﻠﻲ ﺍﺳﺎﻣﻲ NetBIOSﺭﺍ ﻧﻤﺎﻳﺶ ﻣﻲ ﺩﻫﺪ .ﺟﺪﻭﻝ
ﻓﻮﻕ ،ﺷﺎﻣﻞ ﻟﻴﺴﺘﻲ ﺍﺯ ﺍﺳﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺑﻬﻤﺮﺍﻩ IPﻣﺮﺑﻮﻃﻪ ﺍﺳﺖ )( mapping
. Netstatﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ،ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺟﻠﺴﻪ ﮐﺎﺭﻱ ) (Sessionﭘﺮﻭﺗﮑﻞ
TCP/IPﺭﺍ ﻧﻤﺎﻳﺶ ﻣﻲ ﺩﻫﺪ.
. Pingﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ،ﭘﻴﮑﺮﺑﻨﺪﻱ ﻭ ﺍﺭﺗﺒﺎﻁ ﻣﺒﺘﻨﻲ ﺑﺮ IPﺑﻴﻦ ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺭﺍ ﺑﺮﺭﺳﻲ ﻭ
ﺗﺴﺖ ﻣﻲ ﻧﻤﺎﻳﺪ Ping .ﻳﮏ ﺩﺭﺧﻮﺍﺳﺖ ICMPﺭﺍ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍﺀ ﺍﺭﺳﺎﻝ ﻭ
ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﭘﺎﺳﺦ ICMPﺑﻪ ﺁﻥ ﺟﻮﺍﺏ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺑﻤﻨﻈﻮﺭ ﺗﺴﺖ
ﻭ ﻳﺎ ﻧﺎﻡ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ، ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺁﺩﺭﺱ IP
ﻓﺮﻣﺎﻥ ] PING [IP_Address or Computer_Nameﺭﺍ ﺗﺎﻳﭗ ﻧﻤﺎﺋﻴﺪ.
ﺑﻤﻨﻈﻮﺭ ﺗﺴﺖ ﭘﻴﮑﺮﺑﻨﺪﻱ TCP/IPﺑﺮ ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺧﻮﺩ ،ﺍﺯ Local
Loopbackﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﺋﻴﺪ ،loopback Local .ﺷﺎﻣﻞ ﺁﺩﺭﺱ ١٢٧,٠,٠,١
ﺍﺳﺖ( Ping 127.0.0.1).
. Tracertﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ،ﺭﺩﻳﺎﺑﻲ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺗﺎ ﺭﺳﻴﺪﻥ ﺑﻪ ﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ
ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﺪ.
184
ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺍﺭﺗﺒﺎﻃﻲ
ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻓﻮﻕ ،ﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻣﺠﻤﻮﻋﻪ ﻭﺳﻴﻌﻲ ﺍﺯ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﻳﻨﺪﻭﺯ ﻭ
ﻳﺎ ﻏﻴﺮﻭﻳﻨﺪﻭﺯ ﻧﻈﻴﺮ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻳﻮﻳﻨﻴﮑﺲ ،ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﮐﺎﺭﺑﺮﺍﻥ ﻗﺮﺍﺭ ﻣﻲ ﺩﻫﻨﺪ .ﺑﺎ ﺍﻳﻨﮑﻪ ﺍﻳﻦ
ﻧﻮﻉ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﺍﻣﮑﺎﻥ ﺍﺭﺳﺎﻝ ﺳﺮﻳﻊ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ﻭﻟﻲ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺎﻫﻴﺖ
ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺗﻮﺳﻂ ﺁﻧﺎﻥ )ﺗﻤﺎﻣﻲ ﺍﻃﻼﻋﺎﺕ ﺷﺎﻣﻞ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺗﺎﺋﻴﺪ ﺍﻋﺘﺒﺎﺭ ﻭ
ﻫﻮﻳﺖ ﮐﺎﺭﺑﺮﺍﻥ ﺑﺼﻮﺭﺕ ﻣﺘﻦ ﺷﻔﺎﻑ ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ( ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﻗﺖ ﻻﺯﻡ ﺻﻮﺭﺕ ﭘﺬﻳﺮﺩ
.ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﺍﺭﺗﺒﺎﻃﻲ ﻣﻲ ﺑﺎﺷﻨﺪ:
. FTPﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ،ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ،TCPﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﻓﺎﻳﻞ ﺑﻴﻦ ﻭﻳﻨﺪﻭﺯ
٢٠٠٠ﻭ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﺋﻲ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﺁﻧﺎﻥ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ FTPﻧﺼﺐ ﺷﺪﻩ
ﺍﺳﺖ ،ﻣﻲ ﻧﻤﺎﻳﺪ.
. Telnetﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ،ﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺑﻪ ﻣﻨﺎﺑﻊ ﺷﺒﮑﻪ ﻣﻮﺟﻮﺩ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﺋﻲ
ﮐﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ Telnetﺑﺮ ﺭﻭﻱ ﺁﻧﺎﻥ ﻧﺼﺐ ﺷﺪﻩ ﺍﺳﺖ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ.
. Tftpﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ، UDPﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﻓﺎﻳﻞ ﻫﺎﻱ ﮐﻮﭼﮏ ﺑﻴﻦ ﻭﻳﻨﺪﻭﺯ
٢٠٠٠ﻭ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﺋﻲ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﺁﻧﺎﻥ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ Trivial File (TFTP
( Transfer Protocolﻧﺼﺐ ﺷﺪﻩ ﺍﺳﺖ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺳﻤﺖ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ
ﺍﻳﻦ ﻧﻮﻉ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎ ﺍﻣﮑﺎﻥ ﭼﺎﭖ ﻭ ﺍﻧﺘﺸﺎﺭ ﺳﺮﻭﻳﺲ ﻫﺎ ﺭﺍ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ﻣﺒﺘﻨﻲ ﺑﺮ
TCP/IPﺩﺭ ﻭﻳﻨﺪﻭﺯ ، ٢٠٠٠ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﺳﺮﻭﻳﺲ ﭼﺎﭖ . TCP/IPﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ،ﺳﺮﻭﻳﺲ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﭼﺎﭖ TCP/IPﺭﺍ •
ﺍﺭﺍﺋﻪ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺳﺮﻭﻳﺲ ﻓﻮﻕ ،ﺍﻣﮑﺎﻥ ﺍﺭﺳﺎﻝ ﭼﺎﭖ ﺭﺍ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﺋﻲ ﮐﻪ ﺑﺮ
ﺭﻭﻱ ﺁﻧﺎﻥ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻋﺎﻣﻠﻲ ﺑﺠﺰ ﻭﻳﻨﺪﻭﺯ ٢٠٠٠ﻧﺼﺐ ﺷﺪﻩ ﺑﺎﺷﺪ ،ﺑﻪ ﭼﺎﭘﮕﺮ ﻫﺎﻱ
ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﻳﻨﺪﻭﺯ ، ٢٠٠٠ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﻳﻨﺘﺮﻧﺖ ) .(IISﺑﺮﻧﺎﻣﻪ ، IISﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺳﺮﻭﻳﺲ •
ﺩﻫﻨﺪﻩ ﻣﺘﻌﺪﺩﻱ ﻧﻈﻴﺮ ﻭﺏ ،ﺍﺧﺒﺎﺭ ،ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ﻭ ﺍﺭﺳﺎﻝ ﻓﺎﻳﻞ ﻣﺒﺘﻨﻲ ﺑﺮ
185
TCP/IPﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻗﺮﺍﺭ ﻣﻲ ﺩﻫﺪ ،IIS .ﺩﺭ ﺳﻴﺴﺘﻢ ﻫﺎﺋﻲ ﮐﻪ ﺍﺯ ﻧﺴﺨﻪ ﻫﺎﻱ
Serverﻭﻳﻨﺪﻭﺯ ٢٠٠٠ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﺑﺼﻮﺭﺕ ﭘﻴﺶ ﻓﺮﺽ ﻧﺼﺐ ﻣﻲ ﮔﺮﺩﺩ.
ﭘﻴﺸﻨﻬﺎﺩ ﻣﻲ ﮔﺮﺩﺩ ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺑﻪ ﻋﻤﻠﮑﺮﺩ ﺍﻳﻦ ﺑﺮﻧﺎﻣﻪ ﻧﻴﺎﺯﻱ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ،ﺍﻗﺪﺍﻡ ﺑﻪ
ﺣﺬﻑ ) (Uninstallﺁﻥ ﺍﺯ ﺭﻭﻱ ﺳﻴﺴﺘﻢ ﻧﻤﻮﺩ.
ﻣﺜﺎﻝ
ﻣﺜﺎﻝ - ١ﻫﺪﻑ :ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﻧﺎﻣﻪ Pingﺑﻤﻨﻈﻮﺭ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺻﺤﺖ ﻋﻤﻠﮑﺮﺩ ﭘﺮﻭﺗﮑﻞ
TCP/IP
ﻣﺮﺣﻠﻪ ﻳﮏ :ﺑﻌﻨﻮﺍﻥ ﻳﮏ ﮐﺎﺭﺑﺮ ﻣﺠﺎﺯ ،ﺑﻪ ﺷﺒﮑﻪ ﻭﺍﺭﺩ ﺷﻮﻳﺪ.
ﻣﺮﺣﻠﻪ ﺩﻭ :ﮔﺰﻳﻨﻪ Prompt Commandﺭﺍ ﺍﺯ ﻣﺴﻴﺮ | Start | Programs
Accessoriesﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ.
ﻣﺮﺣﻠﻪ ﺳﻪ :ﺩﺳﺘﻮﺭ ١٢٧,٠,٠,١ Pingﺭﺍ ﺩﺭ ﭘﻨﺠﺮﻩ ﻣﺮﺑﻮﻃﻪ ﺗﺎﻳﭗ ﻧﻤﺎﺋﻴﺪ.
ﻧﺘﺎﻳﺞ :ﭘﺲ ﺍﺯ ﺍﻧﺠﺎﻡ ﻣﺮﺍﺣﻞ ﻓﻮﻕ ،ﻧﺘﺎﻳﺞ ﺯﻳﺮ ﻣﻲ ﺑﺎﻳﺴﺖ ﻧﺸﺎﻥ ﺩﺍﺩﻩ ﺷﻮﺩ:
ﻧﺘﻴﺠﻪ ﻳﮏ :ﻣﻲ ﺑﺎﻳﺴﺖ ﭼﻬﺎﺭ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺭﺳﺎﻝ ﻭ ﭼﻬﺎﺭ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭﻳﺎﻓﺖ ﻭ
ﻫﻴﭽﮕﻮﻧﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﮔﻢ ﻧﮕﺮﺩﺩ .ﺩﺭ ﻏﻴﺮ ﺍﻳﻨﺼﻮﺭﺕ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻧﺼﺐ TCP/IP
ﻣﺸﮑﻼﺗﻲ ﻭﺟﻮﺩ ﺩﺍﺭﺩ.
ﻧﺘﻴﺠﻪ ﺩﻭ :ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﭼﻬﺎﺭ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﮔﺮﺩﺩ ،ﻧﺸﺎﻧﺪﻫﻨﺪﻩ
ﺻﺤﺖ ﻋﻤﻠﮑﺮﺩ ﻭ ﻧﺼﺐ ﭘﺮﻭﺗﮑﻞ TCP/IPﺍﺳﺖ.
ﻧﺘﺎﻳﺞ ﺣﺎﺻﻞ ﺍﺯ ﺍﺟﺮﺍﻱ ﺑﺮﻧﺎﻣﻪ Ping
C:\>ping 127.0.0.1
Pinging 127.0.0.1 with 32 bytes of
data:
186
time<10ms TTL=128
Reply from 127.0.0.1: bytes=32
time<10ms TTL=128
Accessoriesﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ.
ﻣﺮﺣﻠﻪ ﺳﻪ :ﺩﺭ ﭘﻨﺠﺮﻩ ﻣﺮﺑﻮﻃﻪ ،ﺩﺳﺘﻮﺭ hostnameﺭﺍ ﺗﺎﻳﭗ ﻧﻤﺎﺋﻴﺪ. •
ﺗﺎﻳﭗ ﻧﻤﺎﺋﻴﺪ .ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ،ﻣﻘﺪﺍﺭ ﺑﺮﮔﺮﺩﺍﻧﺪﻩ ﺷﺪﻩ ﺩﺭ ﺍﺛﺮ ﺍﺟﺮﺍﻱ ﻓﺮﻣﺎﻥ hostname
ﺍﺳﺖ.
ﻧﺘﺎﻳﺞ :ﭘﺲ ﺍﺯ ﺍﻧﺠﺎﻡ ﻣﺮﺍﺣﻞ ﻓﻮﻕ ،ﻧﺘﺎﻳﺞ ﺯﻳﺮ ﻣﻲ ﺑﺎﻳﺴﺖ ﻧﺸﺎﻥ ﺩﺍﺩﻩ ﺷﻮﺩ:
ﻧﺘﻴﺠﻪ ﻳﮏ :ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ )ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺍﺭﺍﻱ ﻧﺎﻡ ﺍﺧﺘﺼﺎﺻﻲ ﻣﺮﺑﻮﻁ ﺑﻪ •
187
ﺑﻬﻤﺮﺍﻩ ﻧﺎﻡPing ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘﻮﺭ: ﻣﺮﺣﻠﻪ ﺩﻭﻡ
ﮐﺎﻣﭙﻴﻮﺗﺮ
C:> Ping Srco
Pinging Srco.Test.com [ 10.10.1.1]
with 32 bytes of data:
188
ﻣﻔﺎﻫﻴﻢ ﺍﻭﻟﻴﻪ ﭘﺮﻭﺗﮑﻞ ) TCP/IPﻗﺴﻤﺖ ﭼﻬﺎﺭﻡ (
189
ﺍﻧﻮﺍﻉ ﻧﺎﻡ
ﺩﻭ ﻧﻮﻉ ﻧﺎﻡ user friendlyﻭﺟﻮﺩ ﺩﺍﺭﺩ :ﺍﺳﺎﻣﻲ ﻣﻴﺰﺑﺎﻥ ) (Hostﻭ ﺍﺳﺎﻣﻲ
. NetBIOSﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ،ﻧﺎﻣﻲ ﺍﺳﺖ ﮐﻪ ﺑﻪ ﻳﮏ ﺁﺩﺭﺱ IPﮐﺎﻣﭙﻴﻮﺗﺮﻧﺴﺒﺖ ﺩﺍﺩﻩ ﺷﺪﻩ ﺗﺎ ﺁﻥ
ﺭﺍ ﺑﻌﻨﻮﺍﻥ ﻳﮏ ﻣﻴﺰﺑﺎﻥ TCP/IPﻣﺸﺨﺺ ﻧﻤﺎﻳﺪ .ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ،ﻣﻲ ﺗﻮﺍﻧﺪ ﺩﺍﺭﺍﻱ ﺣﺪﺍﮐﺜﺮ ٢٥٥
ﮐﺎﺭﺍﮐﺘﺮ ) ﺣﺮﻭﻑ ﺍﻟﻔﺒﺎﺋﻲ ،ﮐﺎﺭﺍﮐﺘﺮﻫﺎﻱ ﻋﺪﺩﻱ ،ﻧﻘﻄﻪ ﻭ ( hyphensﺑﺎﺷﺪ .ﺍﺳﺎﻣﻲ ﻣﻴﺰﺑﺎﻥ
ﺩﺍﺭﺍﻱ ﺍﺷﮑﺎﻝ ﻣﺘﻔﺎﻭﺗﻲ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻧﺎﻡ ﻣﺴﺘﻌﺎﺭ ) (Aliasﻭ ، names Domainﺩﻭ ﻧﻤﻮﻧﻪ
ﻣﺘﺪﺍﻭﻝ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻧﺎﻡ ﻣﺴﺘﻌﺎﺭ ،ﻧﺎﻣﻲ ﺧﺎﺹ ﻭ ﻣﺮﺗﺒﻂ ﺷﺪﻩ ﺑﻪ ﻳﮏ ﺁﺩﺭﺱ IP
ﺍﺳﺖ) .ﻧﻈﻴﺮ .( Tehran :ﻳﮏ ، Domain nameﺑﻤﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺑﺮ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ
ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﻭ ﺍﺯ ﻧﻘﻄﻪ ﺑﻌﻨﻮﺍﻥ ﻳﮏ ﺟﺪﺍﮐﻨﻨﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ
)ﻣﺜﻼ" ( Tehran.Citys.com
ﻧﺎﻡ ، NetBIOSﻳﮏ ﻧﺎﻡ ﺷﺎﻧﺰﺩﻩ ﮐﺎﺭﺍﮐﺘﺮﻱ ﺍﺳﺖ ﮐﻪ ﺍﺯ ﺁﻥ ﺑﻤﻨﻈﻮﺭ ﻣﺸﺨﺺ
ﻧﻤﻮﺩﻥ ﻳﮏ ﻣﻨﺒﻊ NetBIOSﺑﺮﺭﻭﻱ ﺷﺒﮑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺍﺯﻳﮏ ﻧﺎﻡNetBIOS
ﺑﻤﻨﻈﻮﺭ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﻳﮏ ﻭ ﻳﺎ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻴﮕﺮﺩﺩ.
ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ،ﺻﺮﻓﺎ" ﺍﺯ ﭘﺎﻧﺰﺩﻩ ﺣﺮﻑ ﺍﻭﻝ ﺁﻥ ﺑﺮﺍﻱ ﻧﺎﻡ ﻭ ﺍﺯ ﮐﺎﺭﺍﮐﺘﺮ ﻧﻬﺎﺋﻲ ﺑﻤﻨﻈﻮﺭ ﻣﺸﺨﺺ
ﻧﻤﻮﺩﻥ ﻣﻨﺒﻊ ﻭ ﻳﺎ ﺳﺮﻭﻳﺴﻲ ﮐﻪ ﺑﻪ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺷﺎﺭﻩ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻧﻤﻮﻧﻪ ﺍﻱ
ﺍﺯ ﻳﮏ ﻣﻨﺒﻊ ، NetBIOSﻋﻨﺼﺮ File and Print Sharing for Microsoft
Networksﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻭﻳﻨﺪﻭﺯ ٢٠٠٠ﺍﺳﺖ .ﺯﻣﺎﻧﻴﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻓﻌﺎﻟﻴﺖ ﺧﻮﺩ
ﺭﺍ ﺁﻏﺎﺯ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﻋﻨﺼﺮ ﻓﻮﻕ ،ﻳﮏ ﻧﺎﻡ ﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ NetBIOSﺭﺍ ﺭﻳﺠﺴﺘﺮ)ﺛﺒﺖ(
ﻣﻲ ﻧﻤﺎﻳﺪ .ﻧﺎﻡ ﺛﺒﺖ ﺷﺪﻩ ﺷﺎﻣﻞ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻭ ﮐﺎﺭﺍﮐﺘﺮﻱ ﺍﺳﺖ ﮐﻪ ﺑﻴﺎﻧﮕﺮ ﻋﻨﺼﺮ ﺛﺒﺖ ﮐﻨﻨﺪﻩ
ﺍﺳﺖ ) ﺑﺮﺍﻱ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻦ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺯ ﺣﺪﺍﮐﺜﺮ ﭘﺎﻧﺰﺩﻩ ﺣﺮﻑ ﻭ ﺑﺮﺍﻱ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ
ﻋﻨﺼﺮ ﺛﺒﺖ ﮐﻨﻨﺪﻩ ﻧﺎﻡ ،ﺍﺯ ﻳﮏ ﺣﺮﻑ ﺩﻳﮕﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ( .ﺩﺭﻭﻳﻨﺪﻭﺯ ، ٢٠٠٠ﻧﺎﻡ
، NetBIOSﻣﻲ ﺗﻮﺍﻧﺪ ﺣﺪﺍﮐﺜﺮ ﭘﺎﻧﺰﺩﻩ ﮐﺎﺭﺍﮐﺘﺮ ﺑﺎﺷﺪ .ﻭﻳﻨﺪﻭﺯ ، ٢٠٠٠ﺧﻮﺩ ﻧﻴﺎﺯﻱ ﺑﻪ ﺍﻳﻦ
ﻧﻮﻉ ﺍﺳﺎﻣﻲ ﻧﺪﺍﺷﺘﻪ ﻭ ﻧﺴﺨﻪ ﻫﺎﻱ ﻗﺒﻠﻲ ﻭﻳﻨﺪﻭﺯ ﻧﻴﺎﺯﻣﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺳﺎﻣﻲ NetBIOS
ﺑﻤﻨﻈﻮﺭ ﺣﻤﺎﻳﺖ ﺍﺯ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﺷﺒﮑﻪ ﺍﻱ ،ﺩﺍﺭﻧﺪ.
190
Static IP mapping
ﺯﻣﺎﻧﻴﮑﻪ ﮐﺎﺭﺑﺮﺍﻥ ﻳﮏ ﻧﺎﻡ ﺭﺍ ﺑﻤﻨﻈﻮﺭ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ،ﻣﺸﺨﺺ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﭘﺮﻭﺗﮑﻞ TCP/IPﻫﻤﭽﻨﺎﻥ ﻧﻴﺎﺯﻣﻨﺪ ﻳﮏ ﺁﺩﺭﺱ IPﺑﺮﺍﻱ ﺗﺤﻘﻖ ﺍﻧﺘﻘﺎﻝ
ﺍﻃﻼﻋﺎﺕ ﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﻻﺯﻡ ﺍﺳﺖ ﮐﻪ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﻳﮏ ﺁﺩﺭﺱ ، IPﻣﭗ ﮔﺮﺩﺩ.
ﻣﺎﺣﺼﻞ ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ) ،( mappingﺩﺭ ﻳﮏ ﺟﺪﻭﻝ ﺍﻳﺴﺘﺎ ﻭ ﻳﺎ ﭘﻮﻳﺎ ﺫﺧﻴﺮﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ
ﺻﻮﺭﺗﻴﮑﻪ ﺍﺯ ﻳﮏ ﺟﺪﻭﻝ ﺍﻳﺴﺘﺎ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ ،ﻧﺘﺎﻳﺞ ﻣﻮﺭﺩ ﻧﻈﺮ ﺩﺭ ﻳﮑﻲ ﺍﺯ ﻓﺎﻳﻞ ﻫﺎﻱ
Hostsﻭ ﻳﺎ Lmhostsﺫﺧﻴﺮﻩ ﻣﻲ ﮔﺮﺩﻧﺪ) ﻓﺎﻳﻞ ﻫﺎ ﻱ ﻓﻮﻕ ،ﻣﺘﻨﻲ ﻣﻲ ﺑﺎﺷﻨﺪ( .ﻣﻬﻤﺘﺮﻳﻦ
ﻣﺰﻳﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺟﺪﻭﻝ ﺍﻳﺴﺘﺎ ،ﺍﻣﮑﺎﻥ ﺳﻔﺎﺭﺷﻲ ﻧﻤﻮﺩﻥ ﺁﻥ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺎﻫﻴﺖ ﻓﺎﻳﻞ
) ﻣﺘﻨﻲ ( ﻭ ﻣﺤﻞ ﺫﺧﻴﺮﻩ ﺳﺎﺯﻱ ) ﺫﺧﻴﺮﻩ ﺑﺮ ﺭﻭﻱ ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ( ﺁﻥ ﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﻫﺮ
ﻳﮏ ﺍﺯ ﮐﺎﺭﺑﺮﺍﻥ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻣﻨﺎﺑﻌﻲ ﺑﺎ ﻓﺮﮐﺎﻧﺲ ﺑﺎﻻﻱ ﺩﺳﺘﻴﺎﺑﻲ ،ﺑﻪ ﻫﺮ ﻣﻴﺰﺍﻥ
ﮐﻪ ﺿﺮﻭﺭﺕ ﺩﺍﺭﺩ entry ،ﺩﺭ ﺟﺪﻭﻝ ﻓﻮﻕ ﺛﺒﺖ ﻧﻤﺎﻳﻨﺪ .ﺑﻬﻨﮕﺎﻡ ﺳﺎﺯﻱ ﺟﺪﺍﻭﻝ ﺍﻳﺴﺘﺎ ،ﻳﮑﻲ ﺍﺯ
ﭼﺎﻟﺶ ﻫﺎﻱ ﺍﺻﻠﻲ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺑﻮﺩﻩ ﻭ ﺩﺭ ﻣﻮﺍﺭﺩﻳﮑﻪ ﺗﻌﺪﺍﺩ ﺁﺩﺭﺱ ﻫﺎﻱ IPﻣﭗ ﺷﺪﻩ ،ﺯﻳﺎﺩ
ﻭ ﺁﺩﺭﺱ ﻫﺎﻱ ﻓﻮﻕ ﻣﺘﻨﺎﻭﺑﺎ" ﺗﻐﻴﻴﺮ ﻳﺎﺑﻨﺪ ،ﺑﻬﻨﮕﺎﻡ ﺳﺎﺯﻱ ﺟﺪﺍﻭﻝ ﺍﻳﺴﺘﺎ ﻣﺴﺎﺋﻞ ﺧﺎﺹ ﺧﻮﺩ ﺭﺍ
ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ.
ﻓﺎﻳﻞ . Hostsﻓﺎﻳﻞ ﻓﻮﻕ ،ﻳﮏ ﻓﺎﻳﻞ ﻣﺘﻨﻲ ﻭ ﺷﺎﻣﻞ ﺁﺩﺭﺱ ﻫﺎﻱ IPﻣﭗ ﺷﺪﻩ ﺑﻪ ﺍﺳﺎﻣﻲ
ﻣﻴﺰﺑﺎﻥ ﺍﺳﺖ .ﻓﺎﻳﻞ ﻓﻮﻕ ،ﺩﺍﺭﺍﻱ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﺯﻳﺮ ﺍﺳﺖ:
ﻣﻲ ﺗﻮﺍﻥ ﭼﻨﺪﻳﻦ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﺭﺍ ﺑﻪ ﺁﺩﺭﺱ IPﻣﺸﺎﺑﻬﻲ ﻧﺴﺒﺖ ﺩﺍﺩ .ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ، •
ﮐﻮﭼﮏ ﺣﺴﺎﺱ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﺋﻲ ﮐﻪ ﻭﻳﻨﺪﻭﺯ ٢٠٠٠ﻭ ﻳﺎ NT
ﺑﺮ ﺭﻭﻱ ﺁﻧﻬﺎ ﻧﺼﺐ ﺷﺪﻩ ﺍﺳﺖ ،ﺣﺴﺎﺳﻴﺖ ﻓﻮﻕ ،ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ.
191
ﻓﺎﻳﻞ . LmHostsﻓﺎﻳﻞ ﻓﻮﻕ ،ﻳﮏ ﻓﺎﻳﻞ ﻣﺘﻨﻲ ﻭﺷﺎﻣﻞ ﺁﺩﺭﺱ IPﻣﭗ ﺷﺪﻩ ﺑﻪ ﻧﺎﻡ
NetBIOSﺍﺳﺖ .ﺑﺨﺸﻲ ﺍﺯ ﻓﺎﻳﻞ Lmhostsﺩﺭ ﺍﺑﺘﺪﺍ ﻭﺍﺭﺩ ﺣﺎﻓﻈﻪ ﺷﺪﻩ ﻭ ﺑﻪ ﺁﻥ
ﺍﺻﻄﻼﺣﺎ" NetBIOS name Cacheﻣﻲ ﮔﻮﻳﻨﺪ.
mapping Dynamic IP
ﻣﻬﻤﺘﺮﻳﻦ ﻣﺰﻳﺖ ﺟﺪﺍﻭﻝ ﭘﻮﻳﺎ )ﻣﺴﺌﻮﻝ ﺫﺧﻴﺮﻩ ﺳﺎﺯﻱ IPﻣﭗ ﺷﺪﻩ( ،ﺑﻬﻨﮕﺎﻡ ﺳﺎﺯﻱ
ﺍﺗﻮﻣﺎﺗﻴﮏ ﺁﻧﺎﻥ ﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ،ﺟﺪﺍﻭﻝ ﭘﻮﻳﺎ ﺍﺯ ﺩﻭ ﺳﺮﻭﻳﺲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ:
(Domain Name System(DNSﻭ Windows Internet Neame (WINS
.(Serviceﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﻭ WINSﻋﻤﻠﻴﺎﺕ ﻣﺸﺎﺑﻪ ﺍﻱ ﺭﺍ ﻧﻈﻴﺮ ﻓﺎﻳﻞ ﻫﺎﻱ
Hostsﻭ Lmhostsﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ ) ﺑﺪﻭﻥ ﻧﻴﺎﺯ ﺑﻪ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺩﺳﺘﻲ (.
192
(Windows Internet Name Service(WINS
، WINSﻳﮏ ﺑﺎﻧـﮏ ﺍﻃﻼﻋــــﺎﺗﻲ ﺗﻮﺯﻳﻌﻲ ﺭﺍ ﺑﺮﺍﻱ ﺛﺒـــﺖ mappingﭘﻮﻳﺎﻱ ﺍﺳــﺎﻣﻲ
NetBIOSﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﺷﺒﮑﻪ ،ﺍﺭﺍﺋﻪ ﻣﻲ ﻧﻤﺎﻳﺪ ،WINS .ﺍﺳﺎﻣﻲ NetBIOSﺭﺍ ﺑـﻪ
ﺁﺩﺭﺱ ﻫﺎﻱ IPﻣﭗ ﻭ ﺍﻳﻦ ﺍﻣﮑﺎﻥ ﺭﺍ ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﺁﻭﺭﺩ ﮐﻪ ﺍﺳــﺎﻣﻲ NetBIOSﺩﺭ ﻃﻮﻝ
ﺭﻭﺗﺮﻫﺎ ،ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺑﺎﺷﻨﺪ.
ﻣﻲ ﻧﻤﺎﻳﺪ.
ﮐﺎﻣﭙﻴﻮﺗﺮ ، Aﺑﺮﺭﺳﻲ ﻣﻲ ﻧﻤﺎﻳﺪ ﮐﻪ ﺁﻳﺎ ﻧﺎﻡ ﻣﺸﺨﺺ ﺷﺪﻩ ﺑﺎ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﻣﺤﻠﻲ ﻣﻄﺎﺑﻘﺖ •
ﻣﻲ ﻧﻤﺎﻳﺪ.
193
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﻧﺎﻡ ﻣﺸﺨﺺ ﺷﺪﻩ ﺑﺎ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﻣﺤﻠﻲ ﻣﻄﺎﺑﻘﺖ ﻧﻨﻤﺎﻳﺪ ،ﮐﺎﻣﭙﻴﻮﺗﺮ ، A •
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﻧﺎﻡ ﻣﻴﺰﺑﺎﻥ ﭘﻴﺪﺍ ﮔﺮﺩﺩ ،ﺁﺩﺭﺱ
IPﻧﺴﺒﺖ ﺩﺍﺩﻩ ﺷﺪﻩ ﺑﻪ ﺁﻥ ﻣﺸﺨﺺ ﺧﻮﺍﻫﺪ ﺷﺪ .ﭘﺲ ﺍﺯ ﻣﺸﺨﺺ ﺷﺪﻥ ﺁﺩﺭﺱ IP
،ﺯﻣﻴﻨﻪ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺩﺭﺻﻮﺭﺗﻴﮑﻪ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻴﺰﺑﺎﻥ ﺩﺭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﭘﻴﺪﺍ ﻧﮕﺮﺩﺩ ،ﻭﻳﻨﺪﻭﺯ •
194
، NetBTﺍﺯ ﮐﻠﻤﺎﺕ NetBIOS over TCP/IPﺍﻗﺘﺒﺎﺱ ﺷﺪﻩ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ،
ﺍﻣﮑﺎﻥ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺭﺍ ﺑﺮﺍﻱ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ، NetBIOSﺗﻮﺳﻂ TCP/IPﻭ ﺍﺯ
ﻃﺮﻳﻖ ﺗﺮﺟﻤﻪ ﻧﺎﻡ NetBIOSﺑﻪ ﻳﮏ ﺁﺩﺭﺱ ،IPﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭﺻﻮﺭﺗﻴﮑﻪ ﺳﺮﻭﻳﺲ
ﺩﻫﻨﺪﻩ WINSﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ،ﭘﻴﮑﺮﺑﻨﺪﻱ ﺷﺪﻩ ﺑﺎﺷﺪ ،ﻓﺮﺁﻳﻨﺪ NetBIOS Name
، Resolutionﺑﺼﻮﺭﺕ ﺯﻳﺮ ﺧﻮﺍﻫﺪ ﺑﻮﺩ :
ﮐﺎﻣﭙﻴﻮﺗﺮ ، Aﺩﺳﺘﻮﺭﻱ ﻧﻈﻴﺮ Net useﺭﺍ ﺑﻬﻤﺮﺍﻩ ﻧﺎﻡ NetBIOSﮐﺎﻣﭙﻴﻮﺗﺮ ،B •
ﻭﺍﺭﺩ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﮐﺎﻣﭙﻴﻮﺗﺮ ، Aﺑﺮﺭﺳﻲ ﻣﻲ ﻧﻤﺎﻳﺪ ﮐﻪ ﺁﻳﺎ ﻧﺎﻡ ﻣﺸﺨﺺ ﺷﺪﻩ ﺩﺭ Cacheﺍﺳﺎﻣﻲ •
، NetBIOSﻣﻮﺟﻮﺩ ﺍﺳﺖ.
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﻧﺎﻡ ﻣﻮﺟﻮﺩ ﻧﺒﺎﺷﺪ ،ﮐﺎﻣﭙﻴﻮﺗﺮ Aﻳﮏ queryﺭﺍ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ •
WINSﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ.
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ WINSﻗﺎﺩﺭ ﺑﻪ ﻳﺎﻓﺘﻦ ﻧﺎﻡ ﻧﺒﺎﺷﺪ ،ﮐﺎﻣﭙﻴﻮﺗﺮ Aﺍﺯ •
ﻣﻲ ﻧﻤﺎﻳﺪ.
ﺩﺭ ﻗﺴﻤﺖ ﭘﻨﺠﻢ ﺑﻪ ﺑﺮﺭﺳﻲ ﻧﺤﻮﻩ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ.
195
ﻣﻔﺎﻫﻴﻢ ﺍﻭﻟﻴﻪ ﭘﺮﻭﺗﮑﻞ ) TCP/IPﻗﺴﻤﺖ ﭘﻨﺠﻢ (
196
ﻓﺮﺁﻳﻨﺪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ،ﺷﺎﻣﻞ ﻣﺮﺍﺣﻞ ﻣﺘــﻌﺪﺩﻱ ﺍﺳﺖ )ﺳﺎﺯﻣﺎﻧﺪﻫﻲ ﺩﺍﺩﻩ ﺩﺭﻭﻥ ﺑﺴﺘﻪ
ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍﺀ ﻭ ﺑﻬﻢ ﺑﺴﺘﻦ ﺁﻧﺎﻥ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺑﮕﻮﻧﻪ ﺍﻱ ﮐﻪ ﺷﮑﻞ
ﺍﻭﻟﻴﻪ ﻣﺠﺪﺩﺍ" ﺍﻳﺠﺎﺩ ﮔﺮﺩﺩ( .ﻫﺮ ﻻﻳﻪ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ، TCP/IPﺩﺍﺭﺍﻱ ﻧﻘﺸﻲ ﻣﻮﺛﺮ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ
ﻣﺒﺪﺍﺀ ﻭ ﻣﻘﺼﺪ ﺍﺳﺖ.
ﻭﺍﮊﮔﺎﻥ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ) ( Packets
ﺩﺭ ﻫﺮ ﻳﮏ ﺍﺯ ﻻﻳﻪ ﻫﺎﻱ TCP/IPﺍﺯ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ) ( packetﺑﺎ ﺍﺳﺎﻣﻲ ﻣﺘﻔﺎﻭﺗﻲ ﻧﺎﻡ
ﺑﺮﺩﻩ ﻣﻲ ﺷﻮﺩ .ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺣﺮﮐﺖ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﻳﮏ ﻻﻳﻪ ﺑﻪ ﻻﻳﻪ ﺩﻳﮕﺮ ﺩﺭ ﭘﺮﻭﺗﮑﻞ
، TCP/IPﻫﺮ ﻳﮏ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ،ﺍﻃﻼﻋﺎﺕ ﺍﺧﺘﺼﺎﺻﻲ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﺁﻥ ﺍﺿﺎﻓﻪ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺍﺯ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻬﻤﺮﺍﻩ ﺍﻃﻼﻋﺎﺕ ﺍﺿﺎﻓﻪ ﺷﺪﻩ ﺑﻪ ﺁﻥ ،ﺑﺎ ﺍﺳﺎﻣﻲ ﻓﻨﻲ ﺩﻳﮕﺮ ،ﻳﺎﺩ
ﻣﻲ ﮔﺮﺩﺩ .ﺍﻳﻦ ﺍﺳﺎﻣﻲ ) Segment :ﺳﮕﻤﻨﺖ ( ) message ،ﭘﻴﺎﻡ (datagram ،
) ﺩﻳﺘﺎﮔﺮﺍﻡ ( ﻭ ) frameﻓﺮﻳﻢ ( ،ﻣﻲ ﺑﺎﺷﻨﺪ.
ﺳﮕﻤﻨﺖ .ﺳﮕﻤﻨﺖ ﻭﺍﺣﺪ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺩﺭ TCPﺑﻮﺩﻩ ﻭ ﺷﺎﻣﻞ ﻳﮏ TCP •
197
. Headerﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ ﺑﺨﺶ ﺷﺎﻣﻞ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﻣﻲ ﺑﺎﺷﺪ:
ﻳﮏ ﺳﻴﮕﻨﺎﻝ ﻫﺸﺪﺍﺭﺩﻫﻨﺪﻩ ﻣﺒﻨﻲ ﺑﺮ ﺍﺭﺳﺎﻝ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ •
. Dataﺩﺭ ﺍﻳﻦ ﺑﺨﺶ ،ﺍﻃﻼﻋﺎﺕ ﻭﺍﻗﻌﻲ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺗﻮﺳﻂ ﺑﺮﻧﺎﻣﻪ ،ﻗﺮﺍﺭ ﻣﻲ ﮔﻴـــﺮﺩ .ﺍﻳﻦ
ﺑﺨﺶ ﺍﺯ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺍﺭﺍﻱ ﺍﻧﺪﺍﺯﻩ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺍﺳﺖ ) ﺑﺴﺘﮕﻲ ﺑﻪ ﻣﺤﺪﻭﺩﻳﺖ ﺍﻧﺪﺍﺯﻩ
ﺗﻨﻈﻴﻢ ﺷﺪﻩ ﺗﻮﺳﻂ ﺷﺒﮑﻪ ﺩﺍﺭﺩ( .ﺑﺨﺶ ، Dataﺩﺭ ﺍﮐﺜﺮ ﺷﺒﮑﻪ ﻫﺎ ﺍﺯ ﻧﻴﻢ ﮐﻴﻠﻮ ﺑﺎﻳﺖ ﺗﺎ ﭼﻬﺎﺭ
ﮐﻴﻠﻮ ﺑﺎﻳﺖ ﺭﺍ ﻣﻲ ﺗﻮﺍﻧﺪ ﺷﺎﻣﻞ ﺷﻮﺩ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ،ﺍﻧﺪﺍﺯﻩ ﺩﺍﺩﻩ ﺗﻘﺮﻳﺒﺎ" ﻣﻌﺎﺩﻝ ﻳﮏ ﻭ
ﻧﻴﻢ ﮐﻴﻠﻮ ﺑﺎﻳﺖ ﺍﺳﺖ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﺍﮐﺜﺮ ﺗﻨﻈﻴﻤﺎﺕ ﺩﺍﺩﻩ ﻫﺎﻱ ﺍﻭﻟﻴﻪ ،ﺑﻴﺶ ﺍﺯ ﭼﻬﺎﺭ ﮐﻴﻠﻮ
ﺑﺎﻳﺖ ﻣﻲ ﺑﺎﺷﻨﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺍﺩﻩ ﺑﻪ ﺑﺨﺶ ﻫﺎﻱ ﮐﻮﭼﮑﺘﺮﻱ ﺑﺎ ﻧﺎﻡ " ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋــﺎﺗﻲ "
) ،( packetﺗﻘﺴﻴﻢ ﮔﺮﺩﺩ .ﺩﺭ ﺯﻣﺎﻥ ﺍﻧﺘﻘﺎﻝ ﻳﮏ ﻓﺎﻳﻞ ﺑﺎ ﻇﺮﻓﻴﺖ ﺑﺎﻻ ،ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ
ﺯﻳﺎﺩﻱ ﺩﺭ ﻃﻮﻝ ﺷﺒﮑﻪ ﻣﻨﺘﻘﻞ ﺧﻮﺍﻫﻨﺪ ﺷﺪ.
. Trailerﻣﺤﺘﻮﻳﺎﺕ ، trailerﺍﺭﺗﺒﺎﻁ ﻣﺴﺘﻘﻴﻢ ﺑﻪ ﭘﺮﻭﺗﮑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﻻﻳﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ
ﺷﺒﮑﻪ ﺩﺍﺭﺩ ، trailer .ﻣﻌﻤﻮﻻ" ﺷﺎﻣﻞ ﺑﺨﺸﻲ ﺑﻤﻨﻈﻮﺭ ﺑﺮﺭﺳﻲ ﺧﻄﺎﺀ ﺑﻮﺩﻩ ﮐﻪ
،(Cyclical redundancy check(CRCﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ ،CRC.ﻋﺪﺩﻱ ﺍﺳﺖ ﮐﻪ
ﺗﻮﺳﻂ ﻳﮏ ﻣﺤﺎﺳﺒﻪ ﺭﻳﺎﺿﻲ ﺑﺮ ﺭﻭﻱ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺘﻲ ﺩﺭ ﻣﺒﺪﺍﺀ ) ﻓﺮﺳﺘﻨﺪﻩ( ،ﺗﻮﻟﻴﺪ ﻣﻲ ﮔﺮﺩﺩ.
ﺯﻣﺎﻧﻴﮑﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﻣﻘﺼﺪ ﺧﻮﺩ ﻣﻲ ﺭﺳﺪ ،ﻣﺠﺪﺩﺍ" ﻣﺤﺎﺳﺒﻪ ﻣﺮﺑﻮﻃﻪ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﻧﺘﺎﻳﺞ ﺑﺪﺳﺖ ﺁﻣﺪﻩ ،ﻳﮑﺴﺎﻥ ﺑﺎﺷﺪ ،ﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﺻﺤﺖ ﺍﺭﺳﺎﻝ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ
ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﻣﺎﺣﺼﻞ ﻣﺤﺎﺳﺒﻪ ﺩﺭ ﻣﻘﺼﺪ ﺑﺎ ﻧﺘﻴﺠﻪ ﻣﺤﺎﺳﺒﻪ ﺷﺪﻩ ﺩﺭ ﻣﺒﺪﺍﺀ،
198
ﻣﻐﺎﻳﺮﺕ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ،ﺑﺪﻳﻦ ﻣﻔﻬﻮﻡ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ﮐﻪ ﺩﺍﺩﻩ ﺩﺭ ﺯﻣﺎﻥ ﺍﻧﺘﻘﺎﻝ ،ﺗﻐﻴﻴﺮ ﻧﻤﻮﺩﻩ ﺍﺳﺖ .ﺩﺭ
ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ،ﮐﺎﻣﭙﻴﻮﺗﺰ ﻣﺒﺪﺍﺀ ،ﻣﺠﺪﺩﺍ" ﺩﺍﺩﻩ ﺭﺍ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
199
ﻻﻳﻪ Application
ﻓﺮﺁﻳﻨﺪ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﻻﻳﻪ applicationﺁﻏﺎﺯ ﻣﻲ ﮔﺮﺩﺩ .ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﻧﻈﻴﺮ ،FTP
ﭘﺮﺩﺍﺯﺵ ﺭﺍ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍﺀ ﻣﻘﺪﺍﺭ ﺩﻫﻲ ﺍﻭﻟﻴﻪ ﻣﻲ ﻧﻤﺎﻳﺪ )ﺁﻣﺎﺩﻩ ﻧﻤﻮﺩﻥ ﺩﺍﺩﻩ ﺑﻪ ﻓﺮﻣﺘﻲ ﮐﻪ
ﺑﺮﻧﺎﻣﻪ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ،ﻗﺎﺩﺭ ﺑﻪ ﺗﺸﺨﻴﺺ ﺁﻥ ﺑﺎﺷﺪ( .ﺑﺮﻧﺎﻣﻪ ﻣﻮﺟﻮﺩ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍﺀ،
ﮐﻨﺘﺮﻝ ﺗﻤﺎﻣﻲ ﻓﺮﺁﻳﻨﺪ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ.
ﻻﻳﻪ Transport
ﺍﺯ ﻻﻳﻪ ، Applicationﺩﺍﺩﻩ ﺑﻪ ﻻﻳﻪ transportﻣﻨﺘﻘﻞ ﻣﻲ ﮔﺮﺩﺩ .ﺍﻳﻦ ﻻﻳﻪ ﺷﺎﻣﻞ ﭘﺮﻭﺗﮑﻞ
ﻫﺎﻱ TCPﻭ UDPﺍﺳﺖ .ﺑﺮﻧﺎﻣﻪ ﻣﻮﺭﺩ ﻧﻈﺮ ﻧﻮﻉ ﭘﺮﻭﺗﮑﻞ "ﺣﻤﻞ" ﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ
) TCPﻳﺎ .( UDPﺩﺭ ﻫﺮ ﺩﻭ ﺣﺎﻟﺖ Checksumﺑﺮﺍﻱ TCPﻭ UDPﺍﺿﺎﻓﻪ ﺧﻮﺍﻫﺪ
ﺷﺪ.
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﭘﺮﻭﺗﮑﻞ ، TCPﺍﻧﺘﺨﺎﺏ ﮔﺮﺩﺩ:
ﻳﮏ ﺩﻧﺒﺎﻟﻪ ﻋﺪﺩﻱ ) ( number Sequenceﺑﻪ ﻫﺮ ﺳﮕﻤﻨﺖ ﻣﻨﺘﻘﻞ ﺷﺪﻩ ،ﺍﺿﺎﻓﻪ •
ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ Acknowledgmentﺑﺮﺍﻱ ﻳﮏ ﺍﺭﺗﺒﺎﻁ " ﺍﺗﺼﺎﻝ -ﮔﺮﺍ" ،ﺑﻪ •
ﻻﻳﻪ ﺍﻳﻨﺘﺮﻧﺖ
ﭘﺲ ﺍﺯ ﺍﻳﻨﮑﻪ ﺍﻃﻼﻋﺎﺕ "ﺣﻤﻞ " ﺍﺿﺎﻓﻪ ﮔﺮﺩﻳﺪ ،ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻻﻳﻪ "ﺍﻳﻨﺘﺮﻧﺖ "
ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺩﺭ ﺍﻳﻦ ﻻﻳﻪ ،ﺍﻃﻼﻋﺎﺕ ﺯﻳﺮ ﺑﻪ headerﺍﺿﺎﻓﻪ ﻣﻲ ﮔﺮﺩﺩ:
ﺁﺩﺭﺱ IPﻣﺒﺪﺍﺀ •
200
ﻣﻘﺪﺍﺭ checksum •
ﻋﻼﻭﻩ ﺑﺮ ﺍﻃﻼﻋﺎﺕ ﻓﻮﻕ ،ﻻﻳﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺴﺌﻮﻟﻴﺖ ﺑﺮ ﻃﺮﻑ ﻧﻤﻮﺩﻥ ﺁﺩﺭﺱ ﻫﺎﻱ IPﻣﻘﺼﺪ ﺑﻪ
ﻳﮏ ﺁﺩﺭﺱ MACﺭﺍ ﻧﻴﺰ ﺑﺮ ﻋﻬﺪﻩ ﺩﺍﺭﺩ .ﭘﺮﻭﺗﮑﻞ ، ARPﻣﺴﺌﻮﻝ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ،
ﺍﺳﺖ .ﺁﺩﺭﺱ MACﺑﻪ headerﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺿﺎﻓﻪ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ
ﺍﺧﺘﻴﺎﺭ ﻻﻳﻪ " ﺍﻳﻨﺘﺮﻓﻴﺲ ﺷﺒﮑﻪ " ،ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ.
ﻻﻳﻪ "ﺍﻳﻨﺘﺮﻓﻴﺲ ﺷﺒﮑﻪ "
ﻻﻳﻪ ﻓﻮﻕ ،ﭘﺲ ﺍﺯ ﺩﺭﻳﺎﻓﺖ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﻻﻳﻪ ، IPﺍﻃﻼﻋﺎﺕ ﺯﻳﺮ ﺭﺍ ﺑﻪ ﺁﻥ ﺍﺿﺎﻓﻪ
ﺧﻮﺍﻫﺪ ﮐﺮﺩ:
ﻳﮏ ) Preambleﻣﻘﺪﻣﻪ ( .ﺩﻧﺒﺎﻟﻪ ﺍﻱ ﺍﺯ ﺑﺎﻳﺖ ﻫﺎ ﺍﺳﺖ ﮐﻪ ﺍﺑﺘﺪﺍﻱ ﻳﮏ "ﻓﺮﻳﻢ " ﺭﺍ •
201
ﻗﺮﺍﺭ ﻣﻲ ﺩﻫﺪ ) TCPﻳﺎ .( UDPﺑﻤﻨﻈﻮﺭ ﺗﺼﻤﻴﻢ ﮔﻴﺮﻱ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻧﻮﻉ ﭘﺮﻭﺗﮑﻞ "ﺣﻤﻞ "
،ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ header IPﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﻻﻳﻪ "ﺣﻤﻞ" ،ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ
ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ TCPﺩﺭﻳﺎﻓﺖ ﺷﺪﻩ ﺑﺎﺷﺪ ،ﺩﻧﺒﺎﻟﻪ ﻋﺪﺩﻱ ) ( sequence numberﺑﺮ
ﺭﻭﻱ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺭﺳﻲ ﻭ ﻳﮏ acknowledgementﺑﺮﺍﻱ TCPﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍﺀ
ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﭘﻮﺭﺕ TCPﻣﻮﺟﻮﺩ ﺩﺭ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺗﺎ
ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺍﻱ ﺑﺮﻧﺎﻣﻪ ﻣﺮﺑﻮﻃﻪ ﺩﺭ ﻻﻳﻪ ، Applicationﺍﺭﺳﺎﻝ ﮔﺮﺩﺩ.
ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ UDPﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺍﺯ ﻻﻳﻪ "ﺍﻳﻨﺘﺮﻧﺖ" ﺩﺭﻳﺎﻓﺖ ﻧﻤﺎﻳﺪ ،ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﭘﻮﺭﺕ
UDPﻣﻮﺟﻮﺩ ﺩﺭ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺗﺎ ﺁﻥ ﺭﺍ ﺑﺮﺍﻱ ﺑﺮﻧﺎﻣﻪ ﻣﺮﺑﻮﻃﻪ ﺩﺭ ﻻﻳﻪ
Applicationﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﺪ ) .ﺑﺪﻭﻥ ﺍﺭﺳﺎﻝ ﻳﮏ acknowledgementﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ
ﻣﺒﺪﺍﺀ(.
ﭘﺲ ﺍﺯ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﺗﻮﺳﻂ ، Appliactionﭘﺮﺩﺍﺯﺵ ﻫﺎﻱ ﻻﺯﻡ ﻭ ﺿﺮﻭﺭﻱ ﺩﺭ ﺍﺭﺗﺒﺎﻁ
ﺑﺎ ﺁﻧﻬﺎ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ.
202
DNS
203
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﺍﺷﺎﺭﻩ ﮔﺮﺩﻳﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺑﺮﺍﻱ ﺑﺮﻃﺮﻑ ﻣﺸﮑﻞ ﺍﺳﺎﻣﻲ )ﺗﺮﺟﻤﻪ
ﻧﺎﻡ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺁﺩﺭﺱ ﻓﻴﺰﻳﮑﻲ ﻭ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ( ﺻﺮﻓﺎ" ﺑﺮﺍﻱ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺤﻠﻲ ﺑﺎ
ﺍﺑﻌﺎﺩ ﮐﻮﭼﮏ ﺗﻮﺻﻴﻪ ﺷﺪﻩ ﻭ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺰﺭﮒ ﻧﻈﻴﺮ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﺑﺎ ﻣﺎﻫﻴﺖ
Broadcast Basedﺑﺎ ﻣﺸﮑﻼﺕ ﻋﺪﻳﺪﻩ ﺍﻱ ﻣﻮﺍﺟﻪ ﺧﻮﺍﻫﻴﻢ ﺷﺪ.ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺑﺮﺧﻲ ﺍﺯ
ﺍﻳﻦ ﻣﺸﮑﻼﺕ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﺍﺳﺖ.
ﺑﻤﻮﺍﺯﺍﺕ ﺍﻓﺰﺍﻳﺶ ﺗﻌﺪﺍﺩ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺗﺮﺍﻓﻴﮏ ﺍﻧﺘﺸﺎﺭ ﺑﺴﺘﻪ ﻫﺎﻱ •
ﺑﺮﺍﻱ ﺭﻭﺗﻴﻨﮓ ﻧﺒﻮﺩﻩ ﻭ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺭﻭﺗﻴﻨﮓ ﺩﺭ ﻣﺸﺨﺼﻪ ﻓﺮﻳﻢ ﺑﺴﺘﻪ
ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ NetBIOSﺗﻌﺮﻳﻒ ﻧﺸﺪﻩ ﺍﺳﺖ.
ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﻣﮑﺎﻧﻲ ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ ﮐﻪ ﻗﺎﺑﻠﻴﺖ ﺭﻭﺗﻴﻨﮓ ﺑﻪ ﭘﻴﺎﻣﻬﺎﻱ NetBIOS •
204
Flat NetBios NameSpace
ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﻲ ﺍﮔﺮ ﺍﻓﺴﺮ ﺍﺩﺍﺭﻩ ﺭﺍﻫﻨﻤﺎﺋﻲ ﻭ ﺭﺍﻧﻨﺪﮔﻲ ﺭﺍﻧﻨﺪﻩ ﺍﻱ ﺭﺍ ﺑﺨﺎﻃﺮ ﺗﺨﻠﻒ ﻣﺘﻮﻗﻒ
ﻧﻤﻮﺩﻩ ﻭ ﺍﺯ ﻣﺮﮐﺰ ﻭ ﺑﺮ ﺍﺳﺎﺱ ﻧﺎﻡ ﻭﻱ ﺍﺳﺘﻌﻼﻡ ﻧﻤﺎﻳﺪ ﮐﻪ ﺁﻳﺎ " ﺭﺍﻧﻨﺪﻩ ﺍﻱ ﺑﺎ ﻧﺎﻡ ﺍﺣﻤﺪ ﻗﺒﻼ" ﻧﻴﺰ
ﻣﺮﺗﮑﺐ ﺗﺨﻠﻒ ﺷﺪﻩ ﺍﺳﺖ ﻳﺎ ﺧﻴﺮ ؟" ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﺯ ﻃﺮﻑ ﻣﺮﮐﺰ ﺑﻪ ﻭﻱ ﭘﺎﺳﺦ ﻣﺜﺒﺖ ﺩﺍﺩﻩ
ﺷﻮﺩ ﺍﻓﺴﺮ ﻣﺮﺑﻮﻃﻪ ﻫﻴﭽﮕﻮﻧﻪ ﺍﻃﻤﻴﻨﺎﻧﻲ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ ﮐﻪ ﺭﺍﻧﻨﺪﻩ ﺩﺭ ﻣﻘﺎﺑﻞ ﺁﻥ ﻫﻤﺎﻥ ﺍﺣﻤﺪ
ﻣﺘﺨﻠﻒ ﺍﺳﺖ ﮐﻪ ﻗﺒﻼ" ﻧﻴﺰ ﺗﺨﻠﻒ ﺩﺍﺷﺘﻪ ﺍﺳﺖ.
ﻳﮑﻲ ﺍﺯ ﺭﻭﺵ ﻫﺎﻱ ﺣﻞ ﻣﺸﮑﻞ ﻓﻮﻕ ،ﺍﻳﺠﺎﺩ ﺳﻴﺴﺘﻤﻲ ﺍﺳﺖ ﮐﻪ ﻣﺴﺌﻮﻟﻴﺖ ﺁﻥ ﺍﺭﺍﺋﻪ ﻧﺎﻡ
ﺑﺼﻮﺭﺕ ﺍﻧﺤﺼﺎﺭﻱ ﻭ ﻏﻴﺮﺗﮑﺮﺍﺭﻱ ﺑﺮﺍﻱ ﺗﻤﺎﻣﻲ ﺍﻓﺮﺍﺩ ﺩﺭ ﺳﻄﺢ ﺩﻧﻴﺎ ﺑﺎﺷﺪ .ﺩﺭ ﭼﻨﻴﻦ ﻭﺿﻌﻴﺘﻲ
ﺍﻓﺴﺮ ﺍﺩﺍﺭﻩ ﺭﺍﻫﻨﻤﺎﺋﻲ ﻭ ﺭﺍﻧﻨﺪﮔﻲ ﺩﺭ ﺑﺮﺧﻮﺭﺩ ﺑﺎ ﺍﻓﺮﺍﺩ ﻣﺘﺨﻠﻒ ﺩﭼﺎﺭ ﻣﺸﮑﻞ ﻧﺸﺪﻩ ﻭ ﻫﻤﻮﺍﺭﻩ
ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ ﮐﻪ ﺍﺳﺎﻣﻲ ﺑﺼﻮﺭﺕ ﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺍﺳﺖ .ﺩﺭ
ﭼﻨﻴﻦ ﺳﻴﺴﺘﻤﻲ ﭼﻪ ﺍﻓﺮﺍﺩ ﻭ ﻳﺎ ﺳﺎﺯﻣﺎﻧﻬﺎﺋﻲ ﻣﺴﺌﻠﻪ ﻋﺪﻡ ﺗﮑﺮﺍﺭ ﺍﺳﺎﻣﻲ ﺭﺍ ﮐﻨﺘﺮﻝ ﻭ ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ
ﺭﺍ ﺑﻮﺟﻮﺩ ﺧﻮﺍﻫﻨﺪ ﺁﻭﺭﻧﺪ ﮐﻪ ﺍﺳﺎﻣﻲ ﺑﺼﻮﺭﺕ ﺗﮑﺮﺍﺭﻱ ﺩﺭ ﺳﻄﺢ ﺩﻧﻴﺎ ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ؟.
ﺑﻬﺮﺣﺎﻝ ﺳﺎﺧﺘﺎﺭ ﺳﻴﺴﺘﻢ ﻧﺎﻣﮕﺬﺍﺭﻱ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﮕﻮﻧﻪ ﺍﻱ ﺑﺎﺷﺪ ﮐﻪ ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ ﺭﺍ ﺑﻮﺟﻮﺩ
ﺁﻭﺭﺩ ﮐﻪ ﻧﺎﻡ ﺍﻧﺘﺨﺎﺏ ﺷﺪﻩ ﻗﺒﻼ" ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﻳﮕﺮﻱ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﻧﺸﺪﻩ ﺍﺳﺖ .ﺩﺭ ﻋﻤﻞ ﭘﻴﺎﺩﻩ
205
ﺳﺎﺯﻱ ﺍﻳﻨﭽﻨﻴﻦ ﺳﻴﺴﺘﻢ ﻫﺎﺋﻲ ﻏﻴﺮ ﻣﻤﮑﻦ ﺍﺳﺖ.ﻣﺜﺎﻝ ﻓﻮﻕ ﻣﺤﺪﻭﺩﻳﺖ ﻧﺎﻣﮕﺬﺍﺭﻱ ﺑﺼﻮﺭﺕ
ﻣﺴﻄﺢ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ.
ﺳﻴﺴﺘﻢ ﻧﺎﻣﮕﺬﺍﺭﻱ ﺑﺮ ﺍﺳﺎﺱ NetBIOSﺑﺼﻮﺭﺕ ﻣﺴﻄﺢ ﺑﻮﺩﻩ ﻭ ﺍﻳﻦ ﺑﺪﺍﻥ ﻣﻌﻨﻲ ﺍﺳﺖ ﮐﻪ
ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺍﺭﺍﻱ ﻳﮏ ﻧﺎﻡ ﻣﺘﻤﺎﻳﺰ ﺍﺯ ﺩﻳﮕﺮﺍﻥ ﺑﺎﺷﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ
ﮐﻪ ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ NetBIOSﺩﺍﺭﺍﻱ ﺍﺳﺎﻣﻲ ﻳﮑﺴﺎﻧﻲ
ﺑﺎﺷﻨﺪ ﭘﻴﺎﻣﻬﺎﻱ ﺍﺭﺳﺎﻟﻲ ﺍﺯ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﻳﮕﺮ ﮐﻪ ﺩﺍﺭﺍﻱ ﭼﻨﺪﻳﻦ ﻧﻤﻮﻧﻪ )ﻧﺎﻡ
ﺗﮑﺮﺍﺭﻱ( ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺖ ،ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﺎﻋﺚ ﺑﺮﻭﺯ ﻣﺸﮑﻼﺕ ﺩﺭ ﺷﺒﮑﻪ ﻭ ﻋﺪﻡ ﺭﺳﻴﺪﻥ ﭘﻴﺎﻡ
ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺑﻪ ﻣﻘﺼﺪ ﺩﺭﺳﺖ ﺧﻮﺩ ﺑﺎﺷﺪ.
ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻓﻮﻕ ﻳﮑﻲ ﺍﺯ ﻣﺴﺎﺋﻞ ﺍﺳﺎﺳﻲ ﺩﺭ ﻧﺎﻣﮕﺬﺍﺭﻱ ﻭ ﺗﺮﺟﻤﻪ ﺍﺳﺎﻣﻲ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ
ﻣﺒﺘﻨﻲ ﺑﺮ TCP/IPﺭﺍ ﺑﻪ ﭼﺎﻟﺶ ﻣﻲ ﮐﺸﺎﻧﻨﺪ.ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻧﻮﺷﺘﻪ ﺷﺪﻩ ﮐﻪ ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ
NetBIOSﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ﺍﺯ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺑﻌﻨﻮﺍﻥ " ﻧﻘﻄﻪ ﺁﺧﺮ" ﺑﺮﺍﻱ ﺍﺭﺗﺒﺎﻃﺎﺕ
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ NetBIOSﺻﺮﻓﺎ" ﻣﺮﺍﻗﺒﺖ ﻫﺎﻱ ﻻﺯﻡ ﺭﺍ
ﺩﺭ ﺧﺼﻮﺹ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﻳﮏ sessionﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ .ﺩﺭ
ﺣﺎﻟﻴﮑﻪ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ (TCP/IP )IP,TCPﻫﻴﭽﮕﻮﻧﻪ ﺁﮔﺎﻫﻲ ﺍﺯ ﺍﺳﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ
206
NetBIOSﻧﺪﺍﺷﺘﻪ ﻭ ﺩﺭ ﺗﻤﺎﻣﻲ ﻣﻮﺍﺭﺩ ﻣﺮﺍﻗﺒﺖ ﻫﺎﻱ ﻻﺯﻡ ﺭﺍ ﺍﻧﺠﺎﻡ ﻧﺨﻮﺍﻫﻨﺪ ﺩﺍﺩ.
ﺑﻪ ﻣﻨﻈﻮﺭ ﺣﻞ ﻣﺸﮑﻞ ﻓﻮﻕ) ﺑﺮﻧﺎﻣﻪ ﻫﺎﺋﻲ ﮐﻪ ﺍﺯ NetBIOSﺑﮑﻤﮏ ﺍﻳﻨﺘﺮﻓﻴﺲ NetBIOS
ﺑﺎ ﭘﺮﻭﺗﮑﻞ TCP/IPﻣﺮﺗﺒﻂ ﺧﻮﺍﻫﻨﺪ ﺷﺪ( ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ netBTﻭ ﻳﺎ NetBIOS over
TCP/IPﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﺩﺭﺧﻮﺍﺳﺘﻲ ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻳﮏ ﻣﻨﺒﻊ ﺩﺭ ﺷﺒﮑﻪ ﺍﺯ
ﻃﺮﻳﻖ ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﺑﺎ ﺍﻳﻨﺘﺮﻓﻴﺲ NetBIOSﺍﺭﺍﺋﻪ ﻣﻲ ﮔﺮﺩﺩ ﻭ ﺑﻪ ﻻﻳﻪ Application
ﻣﻲ ﺭﺳﺪ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻓﻴﺲ NetBTﺑﺎ ﺁﻥ ﻣﺮﺗﺒﻂ ﺧﻮﺍﻫﺪ ﺷﺪ.ﺩﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ ﻧﺎﻡ
NetBIOSﺗﺮﺟﻤﻪ ﻭ ﺑﻪ ﻳﮏ IPﺗﺒﺪﻳﻞ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﻧﺎﻡ NetBIOSﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ
ﻳﮏ ﺁﺩﺭﺱ ﻓﻴﺰﻳﮑﻲ ﺗﺮﺟﻤﻪ ﻣﻲ ﮔﺮﺩﺩ ﺩﺭﺧﻮﺍﺳﺖ ﻣﺮﺑﻮﻃﻪ ﻣﻲ ﺗﻮﺍﻧﺪ ﻻﻳﻪ ﻫﺎﻱ ﺯﻳﺮﻳﻦ
ﭘﺮﻭﺗﮑﻞ TCP/IPﺭﺍ ﻃﻲ ﺗﺎ ﻭﻇﺎﻳﻒ ﻣﺤﻮﻟﻪ ﺩﻧﺒﺎﻝ ﮔﺮﺩﺩ .ﺷﮑﻞ ﺯﻳﺮ ﻧﺤﻮﻩ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ
ﻓﻮﻕ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ.
ﺍﻳﻨﺘﺮﻓﻴﺲ Winsock
ﺍﻏﻠﺐ ﺑﺮﻧﺎﻣﻪ ﻫﺎﺋﻲ ﮐﻪ ﺑﺮﺍﺳﺎﺱ ﭘﺮﻭﺗﮑﻞ TCP/IPﻧﻮﺷﺘﻪ ﻣﻲ ﮔﺮﺩﻧﻨﺪ ،ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ
Winsockﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺍﻳﻦ ﻧﻮﻉ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﻧﻴﺎﺯﻣﻨﺪ ﺁﮔﺎﻫﻲ ﺍﺯ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ
ﺑﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﻧﺒﻮﺩﻩ ﻭ ﺑﺎ ﺁﮔﺎﻫﻲ ﺍﺯ ﺁﺩﺭﺱ IPﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘــﺼﺪ ﻗﺎﺩﺭ ﺑﻪ ﺍﻳـﺠﺎﺩ ﻳﮏ ﺍﺭﺗــﺒﺎﻁ
ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ.
207
ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺟﻬﺖ ﮐﺎﺭ ﺑﺎ ﺍﻋﺪﺍﺩ ) ﺧﺼﻮﺻﺎ" ( IPﺩﺍﺭﺍﻱ ﻣﺴﺎﺋﻞ ﻭ ﻣﺸﮑﻼﺕ ﺑﺴﻴﺎﺭ ﻧﺎﭼﻴﺰﻱ
ﻣﻲ ﺑﺎﺷﻨﺪ.ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﻧﺴﺎﻥ ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﺩﺍﺭﺍﻱ ﻣﺸﮑﻼﺕ ﺧﺎﺹ ﺧﻮﺩ ﺍﺳﺖ .ﻗﻄﻌﺎ"
ﺑﺨﺎﻃﺮ ﺳﭙﺮﺩﻥ ﺍﻋﺪﺍﺩ ﺑﺰﺭﮒ ﻭ ﻃﻮﻻﻧﻲ ﺑﺮﺍﻱ ﻫﺮ ﺷﺨﺺ ﮐﺎﺭ ﻣﺸﮑﻠﻲ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﻫﺮ ﻳﮏ ﺍﺯ
ﻣﺎ ﻃﻲ ﺭﻭﺯ ﺑﻪ ﻭﺏ ﺳﺎﻳﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﻣﺮﺍﺟﻌﻪ ﻭ ﺻﺮﻓﺎ" ﺑﺎ ﺗﺎﻳﭗ ﺁﺩﺭﺱ ﻣﺮﺑﻮﻃﻪ ﮐﻪ
ﺑﺼﻮﺭﺕ ﻳﮏ ﻧﺎﻡ ﺧﺎﺹ ﺍﺳﺖ ) (www.test.comﺍﺯ ﺍﻣﮑﺎﻧﺎﺕ ﺳﺎﻳﺖ ﻣﺮﺑﻮﻃﻪ ﺑﻬﺮﻩ ﻣﻨﺪ
ﻣﻲ ﮔﺮﺩﻳﻢ .ﺁﻳﺎ ﻃﻲ ﺍﻳﻦ ﻧﻮﻉ ﻣﻼﻗﺎﺕ ﻫﺎ ﻣﺎ ﻧﻴﺎﺯﻣﻨﺪ ﺁﮔﺎﻫﻲ ﺍﺯ ﺁﺩﺭﺱ IPﺳﺎﻳﺖ ﻣﺮﺑﻮﻃﻪ ﺑﻮﺩﻩ
ﺍﻳﻢ؟ ﺑﻬﺮﺣﺎﻝ ﺑﺨﺎﻃﺮ ﺳﭙﺮﺩﻥ ﺍﺳﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺑﻤﺮﺍﺗﺐ ﺭﺍﺣﺖ ﺗﺮ ﺍﺯ ﺑﺨﺎﻃﺮ ﺳﭙﺮﺩﻥ ﺍﻋﺪﺍﺩ
) ﮐﺪ ( ﺍﺳﺖ .ﺍﺯ ﺁﻧﺠﺎﺋﻴﮑﻪ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ Winsockﻧﻴﺎﺯﻣﻨﺪ ﺁﮔﺎﻫﻲ ﺍﺯ ﻧﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻭ ﻳﺎ
Host Nameﻧﻤﻲ ﺑﺎﺷﻨﺪ ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﺭﻋﺎﻳﺖ ﺗﻤﺎﻣﻲ ﻣﺴﺎﺋﻞ ﺟﺎﻧﺒﻲ ﺍﺯ ﺭﻭﺵ ﻓﻮﻕ ﺑﺮﺍﻱ
(Host ﺍﺳﺎﻣﻲ)Name Resoulation ﺗﺮﺟﻤﻪ ﺍﺳﺎﻣﻲ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ.ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ﺭﺍ ﺗﺮﺟﻤﻪ
ﻣﻲ ﮔﻮﻳﻨﺪ.
DNS NameSpace
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﺍﺷﺎﺭﻩ ﮔﺮﺩﻳﺪ DNSﺍﺯ ﻳﮏ ﺳﺎﺧﺘﺎﺭ ﺳﻠﺴﻠﻪ ﻣﺮﺍﺗﺒﻲ ﺑﺮﺍﻱ ﺳﻴﺴﺘﻢ
ﻧﺎﻣﮕﺬﺍﺭﻱ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ.
208
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺎﻫﻴﺖ ﺳﻠﺴﻠﻪ ﻣﺮﺍﺗﺒﻲ ﺑﻮﺩﻥ ﺳﺎﺧﺘﺎﺭ ﻓﻮﻕ ،ﭼﻨﺪﻳﻦ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺩﺍﺭﺍﻱ
ﺍﺳﺎﻣﻲ ﻳﮑﺴﺎﻥ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺷﺒﮑﻪ ﺑﻮﺩﻩ ﻭ ﻫﻴﭽﮕﻮﻧﻪ ﻧﮕﺮﺍﻧﻲ ﺍﺯ ﻋﺪﻡ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﻫﺎ ﻭﺟﻮﺩ
ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﻭﻳﮋﮔﻲ ﻓﻮﻕ ﺩﺭﺳﺖ ﻧﻘﻄﻪ ﻣﺨﺎﻟﻒ ﺳﻴﺴﺘﻢ ﻧﺎﻣﮕﺬﺍﺭﻱ NetBIOSﺍﺳﺖ.
ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ﻗﺎﺩﺭ ﺑﻪ ﺍﻧﺘﺨﺎﺏ ﺩﻭ ﻧﺎﻡ ﻳﮑﺴﺎﻥ ﺑﺮﺍﻱ
ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺷﺒﮑﻪ ﻳﮑﺴﺎﻥ ﻧﺨﻮﺍﻫﻴﻢ ﻧﺒﻮﺩ.
ﺑﺎﻻﺗﺮﻳﻦ ﺳﻄﺢ ﺩﺭ DNSﺑﺎ ﻧﺎﻡ Root Domainﻧﺎﻣﻴﺪﻩ ﺷﺪﻩ ﻭ ﺍﻏﻠﺐ ﺑﺼﻮﺭﺕ ﻳﮏ “”.
ﻭ ﻳﺎ ﻳﮏ ﻓﻀﺎﻱ ﺧﺎﻟﻲ “” ﻧﺸﺎﻥ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺑﻼﻓﺎﺻﻠﻪ ﭘﺲ ﺍﺯ ﺭﻳﺸﻪ ﺑﺎ ﺍﺳﺎﻣﻲ ﻣﻮﺟﻮﺩ ﺩﺭ
ﺩﺍﻣﻨﻪ ﺑﺎﻻﺗﺮﻳﻦ ﺳﻄﺢ ) (Top Levelﺑﺮﺧﻮﺭﺩ ﺧﻮﺍﻫﻴﻢ ﮐﺮﺩ .ﺩﺍﻣﻨﻪ ﻫﺎﻱ Com , .net , .
.org , .eduﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺳﺎﺯﻣﺎﻧﻬﺎﺋﻲ ﮐﻪ ﺗﻤﺎﻳﻞ ﺑﻪ ﺩﺍﺷﺘﻦ ﻳﮏ
ﻭﺏ ﺳﺎﻳﺖ ﺑﺮ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺍﺭﻧﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﻳﮏ ﺩﺍﻣﻨﻪ ﺭﺍ ﮐﻪ ﺑﻌﻨﻮﺍﻥ ﻋﻀﻮﻱ ﺍﺯ ﺍﺳﺎﻣﻲ
ﺣﻮﺯﻩ Top Levelﻣﻲ ﺑﺎﺷﺪ ﺭﺍ ﺑﺮﺍﻱ ﺧﻮﺩ ﺍﺧﺘﻴﺎﺭ ﻧﻤﺎﻳﺪ .ﻫﺮ ﻳﮏ ﺍﺯ ﺣﻮﺯﻩ ﻫﺎﻱ ﺳﻄﺢ ﺑﺎﻻ
ﺩﺍﺭﺍﻱ ﮐﺎﺭﺑﺮﺩﻫﺎﻱ ﺧﺎﺻﻲ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻣﺜﻼ" ﺳﺎﺯﻣﺎﻥ ﻫﺎﻱ ﺍﻗﺘﺼﺎﺩﻱ ﺩﺭ ﺣﻮﺯﻩ com .ﻭ
ﻣﻮﺳﺴﺎﺕ ﺁﻣﻮﺯﺷﻲ ﺩﺭ ﺣﻮﺯﻩ edu.ﻭ domain ...ﺧﻮﺩ ﺭﺍ ﺛﺒﺖ ﺧﻮﺍﻫﻨﺪ ﻧﻤﻮﺩ.ﺷﮑﻞ ﺯﻳﺮ
ﺳﺎﺧﺘﺎﺭ ﺳﻠﺴﻠﻪ ﻣﺮﺍﺗﺒﻲ DNSﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ.
ﺩﺭ ﻫﺮ ﺳﻄﺢ ﺍﺯ ﺳﺎﺧﺘﺎﺭ ﺳﻠﺴﻠﻪ ﻣﺮﺍﺗﺒﻲ ﻓﻮﻕ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺳﺎﻣﻲ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻣﺘﻔﺎﻭﺕ ﺑﺎﺷﺪ.
ﻣﺜﻼ" ﻧﻤﻲ ﺗﻮﺍﻥ ﺩﻭ ﺣﻮﺯﻩ com.ﻭ ﻳﺎ ﺩﻭ ﺣﻮﺯﻩ net.ﺭﺍ ﺗﻌﺮﻳﻒ ﻭ ﻳﺎ ﺩﻭ ﺣﻮﺯﻩ
Microsoft.comﺩﺭ ﺳﻄﺢ ﺩﻭﻡ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﺳﺎﻣﻲ ﺗﮑﺮﺍﺭﻱ ﺩﺭ ﺳﻄﻮﺡ
209
ﻣﺘﻔﺎﻭﺕ ﻣﺠﺎﺯ ﺑﻮﺩﻩ ﻭ ﺑﻬﻤﻴﻦ ﺩﻟﻴﻞ ﺍﺳﺖ ﮐﻪ ﺍﻏﻠﺐ ﻭﺏ ﺳﺎﻳﺖ ﻫﺎ ﺩﺍﺭﺍﻱ ﻧﺎﻡ www
ﻣﻲ ﺑﺎﺷﻨﺪ.
ﺣﻮﺯﻩ ﻫﺎﻱ Top Levelﻭ Second levelﺗﻨﻬﺎ ﺑﺨﺸﻬﺎﺋﻲ ﺍﺯ ﺳﻴﺴﺘﻢ DNSﻣﻲ ﺑﺎﺷﻨﺪ
ﮐﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺼﻮﺭﺕ ﻣﺮﮐﺰﻱ ﻣﺪﻳﺮﻳﺖ ﻭ ﮐﻨﺘﺮﻝ ﮔﺮﺩﻧﻨﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺭﻳﺠﺴﺘﺮ ﻧﻤﻮﺩﻥ ﺩﺍﻣﻨﻪ
ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺎ ﺳﺎﺯﻣﺎﻥ ﻭ ﻳﺎ ﺷﺮﮐﺘﻲ ﮐﻪ ﻣﺴﺌﻮﻟﻴﺖ ﺭﻳﺠﺴﺘﺮ ﻧﻤﻮﺩﻥ ﺭﺍ ﺑﺮﻋﻬﺪﻩ
ﺩﺍﺭﺩ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻧﻤﻮﺩﻩ ﻭ ﺍﺯ ﺁﻧﻬﺎ ﺩﺭﺧﻮﺍﺳﺖ ﻧﻤﻮﺩ ﮐﻪ ﻋﻤﻠﻴﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺭﻳﺠﺴﺘﺮ ﻧﻤﻮﺩﻥ
ﺩﺍﻣﻨﻪ ﻣﻮﺭﺩ ﻧﻈﺮ ﻣﺎ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ .ﺩﺭ ﮔﺬﺷﺘﻪ ﺗﻨﻬﺎ ﺳﺎﺯﻣﺎﻧﻲ ﮐﻪ ﺩﺍﺭﺍﻱ ﻣﺠﻮﺯ ﻻﺯﻡ ﺑﺮﺍﻱ
ﺭﻳﺠﺴﺘﺮ ﻧﻤﻮﺩﻥ ﺣﻮﺯﻩ ﻫﺎﻱ ﺳﻄﺢ ﺩﻭﻡ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺷﺖ ﺷﺮﮐﺖ NSI)Network
(Solutions Intcorporatedﺑﻮﺩ .ﺍﻣﺮﻭﺯﻩ ﺍﻣﺘﻴﺎﺯ ﻓﻮﻕ ﺻﺮﻓﺎ" ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺷﺮﮐﺖ ﻓﻮﻕ
ﻧﺒﻮﺩﻩ ﻭ ﺷﺮﮐﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺍﻗﺪﺍﻡ ﺑﻪ ﺭﻳﺠﺴﺘﺮ ﻧﻤﻮﺩﻥ ﺣﻮﺯﻩ ﻫﺎ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
210
ﺩﻗﺖ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﮐﻪ wwwﺍﺯ ﻧﺎﻡ FQDNﻣﺜﺎﻝ ﻓﻮﻕ ﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﻳﮏ ﺷﻨﺎﺳﻪ ﺧﺪﻣﺎﺗﻲ
ﻧﺒﻮﺩﻩ ﻭ ﺻﺮﻓﺎ" ﻧﺎﻡ hostﻣﺮﺑﻮﻁ ﺑﻪ ﻣﺎﺷﻴﻦ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﻣﺸﺨﺺ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﻳﮏ ﻧﺎﻡ
FQDNﺍﺯ ﺩﻭ ﻋﻨﺼﺮ ﺍﺳﺎﺳﻲ ﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺍﺳﺖ:
: Labelﺷﺎﻣﻞ ﻧﺎﻡ ﺣﻮﺯﻩ ﻭ ﻳﺎ ﻧﺎﻡ ﻳﮏ hostﺍﺳﺖ. •
ﻫﺮ lableﺗﻮﺳﻂ ﻧﻘﻄﻪ ﺍﺯ ﻳﮑﺪﻳﮕﺮ ﺟﺪﺍ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﻫﺮ lableﻣﻲ ﺗﻮﺍﻧﺪ ﺣﺪﺍﮐﺜﺮ ﺩﺍﺭﺍﻱ
۶۳ﺑﺎﻳﺖ ﺑﺎﺷﺪ .ﺩﻗﺖ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﮐﻪ ﻃﻮﻝ ) ﺍﻧﺪﺍﺯﻩ ( ﻫﺮ lableﺑﺮ ﺣﺴﺐ ﺑﺎﻳﺖ ﻣﺸﺨﺺ
ﺷﺪﻩ ﺍﺳﺖ ﻧﻪ ﺑﺮ ﺣﺴﺐ ﻃﻮﻝ ﺭﺷﺘﻪ .ﻋﻠﺖ ﺍﻳﻦ ﺍﺳﺖ ﮐﻪ DNSﺩﺭ ﻭﻳﻨﺪﻭﺯ ٢٠٠٠ﺍﺯ
ﮐﺎﺭﺍﮐﺘﺮﻫﺎﻱ UTF-8ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺑﺮ ﺧﻼﻑ ﮐﺎﺭﺍﮐﺘﺮﻫﺎﻱ ﺍﺳﮑﻲ ﮐﻪ ﻗﺒﻼ" ﺍﺯ ﺁﻧﺎﻥ
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﻳﺪ .ﺑﻬﺮﺣﺎﻝ FQDNﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺍﺭﺍﻱ ﻃﻮﻟﻲ ﺑﻪ ﺍﻧﺪﺍﺯﻩ ﺣﺪﺍﮐﺜﺮ ٢٥٥ﺑﺎﻳﺖ
ﺑﺎﺷﺪ.
ﻃﺮﺍﺣﻲ ﻧﺎﻡ ﺣﻮﺯﻩ ﺑﺮﺍﻱ ﻳﮏ ﺳﺎﺯﻣﺎﻥ
ﻗﺒﻞ ﺍﺯ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺳﻴﺴﺘﻢ ) ﻣﺪﻝ ( DNSﺑﺮﺍﻱ ﻳﮏ ﺳﺎﺯﻣﺎﻥ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﻧﻤﻮﻧﻪ
ﺳﻮﺍﻻﺕ ﺫﻳﻞ ﺑﺪﺭﺳﺘﻲ ﭘﺎﺳﺦ ﺩﺍﺩ:
ﺁﻳﺎ ﺳﺎﺯﻣﺎﻥ ﻣﺮﺑﻮﻃﻪ ﺩﺭ ﺣﺎﻝ ﺣﺎﺿﺮ ﺑﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﺍﻳﻨﺘﺮﺍﻧﺘﻲ ﺧﻮﺩ ﺍﺯ DNSﺍﺳﺘﻔﺎﺩﻩ •
ﻣﻲ ﻧﻤﺎﻳﺪ؟
ﺁﻳﺎ ﺳﺎﺯﻣﺎﻥ ﻣﺮﺑﻮﻃﻪ ﺩﺍﺭﺍﻱ ﻳﮏ ﺳﺎﻳﺖ ﺍﻳﻨﺘﺮﻧﺘﻲ ﺍﺳﺖ؟ •
ﺁﻳﺎ ﺳﺎﺯﻣﺎﻥ ﻣﺮﺑﻮﻃﻪ ﺩﺍﺭﺍﻱ ﻳﮏ ﺣﻮﺯﻩ) ﺩﺍﻣﻨﻪ ( ﺛﺒﺖ ﺷﺪﻩ ) ﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ( ﺍﺳﺖ؟ •
ﺁﻳﺎ ﺳﺎﺯﻣﺎﻥ ﻣﺮﺑﻮﻃﻪ ﺍﺯ ﺍﺳﺎﻣﻲ ﺣﻮﺯﻩ ﻳﮑﺴﺎﻥ ﺑﺮﺍﻱ ﻣﻨﺎﺑﻊ ﻣﺮﺑﻮﻃﻪ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ •
211
ﻣﺎﺷﻴﻦ ﻫﺎ ﺑﻌﻨﻮﺍﻥ ﻋﻀﻮ ﻳﮏ ﺩﺍﻣﻨﻪ ﻳﮑﺴﺎﻥ ﻣﺤﺴﻮﺏ ﻭ ﮐﺎﺭﺑﺮﺍﻥ ﻧﻴﺎﺯ ﺑﻪ ﺑﺨﺎﻃﺮ ﺳﭙﺮﺩﻥ ﺩﺍﻣﻨﻪ
ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺑﺮ ﺍﺳﺎﺱ ﻧﻮﻉ ﻣﻨﺒﻊ ﮐﻪ ﻣﻤﮑﻦ ﺍﺳﺖ ﺩﺍﺧﻠﻲ ﻭ ﻳﺎ ﺧﺎﺭﺟﻲ ﺑﺎﺷﺪ ﻧﺨﻮﺍﻫﻨﺪ
ﺩﺍﺷﺖ ..ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻭﺟﻮﺩ ﻣﺰﺍﻳﺎﻱ ﻓﻮﻕ ،ﺑﮑﺎﺭﮔﻴﺮﻱ ﺍﻳﻦ ﺭﻭﺵ ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﺎﻋﺚ ﺑﺮﻭﺯ ﺑﺮﺧﻲ
ﻣﺸﮑﻼﺕ ﻧﻴﺰ ﮔﺮﺩﺩ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺣﻔﺎﻇﺖ ﺍﺯ ﻧﺎﺣﻴﻪ ) (Zoneﻫﺎﻱ DNSﺍﺯ ﺩﺳﺘﻴﺎﺑﻲ ﻏﻴﺮ
ﻣﺠﺎﺯ ﻧﻤﻲ ﺑﺎﻳﺴﺖ ﻫﻴﭽﮕﻮﻧﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻣﻨﺎﺑﻊ ﺩﺍﺧﻠﻲ ﺑﺮ ﺭﻭﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ
DNSﻧﮕﻬﺪﺍﺭﻱ ﻧﻤﻮﺩ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺮﺍﻱ ﻳﮏ ﺩﺍﻣﻨﻪ ﺍﺯ ﺩﻭ Zoneﻣﺘﻔﺎﻭﺕ ﺍﺳﺘﻔﺎﺩﻩ
ﻧﻤﻮﺩ .ﻳﮑﻲ ﺍﺯ Zoneﻫﺎ ﻣﻨﺎﺑﻊ ﺩﺍﺧﻠﻲ ﺭﺍ ﺩﻧﺒﺎﻝ ﻭ Zoneﺩﻳﮕﺮ ﻣﺴﺌﻮﻟﻴﺖ ﭘﺎﺳﺨﮕﻮﺋﻲ ﺑﻪ
ﻣﻨﺎﺑﻌﻲ ﺍﺳﺖ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ .ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﻗﻄﻌﺎ" ﺣﺠﻢ ﻭﻇﺎﻳﻒ ﻣﺪﻳﺮﻳﺖ
ﺳﺎﻳﺖ ﺭﺍ
ﺍﻓﺰﺍﻳﺶ ﺧﻮﺍﻫﺪ ﺩﺍﺩ.
212
ﺟﻬﺖ ﺣﻞ ﻣﺸﮑﻞ ﻓﻮﻕ Mirrorﻧﻤﻮﺩﻥ ﻣﻨﺎﺑﻊ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺼﻮﺭﺕ ﺩﺍﺧﻠﻲ ﺍﺳﺖ ﻭ ﺍﻳﺠﺎﺩ ﻳﮏ
zoneﺩﺭ DNSﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﮐﺎﺭﺑﺮﺍﻥ ﺑﻪ ﻣﻨﺎﺑﻊ ﺩﺍﺧﻠﻲ ﺿﺮﻭﺭﻱ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺯﻣﺎﻧﻴﮑﻪ
ﮐﺎﺭﺑﺮﻱ ﺩﺭﺧﻮﺍﺳﺖ www.test.comﺭﺍ ﺻﺎﺩﺭ ﻧﻤﺎﺋﻴﺪ ﺩﺭ ﺍﺑﺘﺪﺍ ﻣﺴﺌﻠﻪ ﻧﺎﻡ ﺍﺯ ﻃﺮﻳﻖ
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺩﺍﺧﻠﻲ DNSﺑﺮﻃﺮﻑ ﺧﻮﺍﻫﺪ ﺷﺪ ﮐﻪ ﺷﺎﻣﻞ zoneﺩﺍﺧﻠﻲ ﻣﺮﺑﻮﻃﻪ ﺍﺳﺖ.
ﺯﻣﺎﻧﻲ ﮐﻪ ﻳﮏ ﮐﺎﺭﺑﺮ ﺍﻳﻨﺘﺮﻧﺖ ﻗﺼﺪ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ www.test.comﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ
ﺩﺭﺧﻮﺍﺳﺖ ﻭﻱ ﺑﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺍﻳﻨﺘﺮﻧﺖ DNSﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪﺷﺪ ﮐﻪ ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ
ﺁﺩﺭﺱ IPﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺧﺎﺭﺟﻲ DNSﺑﺮﮔﺮﺩﺍﻧﺪﻩ ﺧﻮﺍﻫﺪ ﺷﺪ.
213
ﺑﺮﺍﻱ ﻧﺎﻣﮕﺬﺍﺭﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﺯﻳﺮ ﺩﺍﻣﻨﻪ ﻫﺎ ﻣﻲ ﺗﻮﺍﻥ ﺍﺳﺎﻣﻲ ﺍﻧﺘﺨﺎﺑﻲ ﺭﺍ ﺑﺮﺍﺳﺎﺱ ﻧﻮﻉ ﻓﻌﺎﻟﻴﺖ ﻭ
ﻳﺎ ﺣﻮﺯﻩ ﺟﻔﺮﺍﻓﻴﺎﺋﻲ ﺍﻧﺘﺨﺎﺏ ﻧﻤﻮﺩ.
Zones of Authority
DNSﺩﺍﺭﺍﻱ ﺳﺎﺧﺘﺎﺭﻱ ﺍﺳﺖ ﮐﻪ ﺍﺯ ﺁﻥ ﺑﺮﺍﻱ ﮔﺮﻭﻩ ﺑﻨﺪﻱ ﻭ ﺩﻧﺒﺎﻝ ﻧﻤﻮﺩﻥ ﻣﺎﺷﻴﻦ ﻣﺮﺑﻮﻃﻪ
ﺑﺮﺍﺳﺎﺱ ﻧﺎﻡ hostﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﻓﻌﺎﻝ ﻧﻤﻮﺩﻥ DNSﺩﺭ ﺟﻬﺖ
ﺗﺎﻣﻴﻦ ﺧﻮﺍﺳﺘﻪ ﺍﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﻣﻲ ﺑﺎﻳﺴﺖ ﺭﻭﺷﻲ ﺟﻬﺖ ﺫﺧﻴﺮﻩ ﻧﻤﻮﺩﻥ ﺍﻃﻼﻋﺎﺕ ﺩﺭ DNS
Zone ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ.ﺍﻃﻼﻋﺎﺕ ﻭﺍﻗﻌﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺩﺍﻣﻨﻪ ﻫﺎ ﺩﺭ ﻓﺎﻳﻠﻲ ﺑﺎ ﻧﺎﻡ
databaseﺫﺧﻴﺮﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺍﻳﻦ ﻧﻮﻉ ﻓﺎﻳﻞ ﻫﺎ ،ﻓﺎﻳﻞ ﻫﺎﻱ ﻓﻴﺰﻳﮑﻲ ﺑﻮﺩﻩ ﮐﻪ ﺑﺮ ﺭﻭﻱ
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺫﺧﻴﺮﻩ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﺁﺩﺭﺱ ﻣﺤﻞ ﻗﺮﺍﺭ ﮔﻴﺮﻱ ﻓﺎﻳﻞ ﻫﺎﻱ ﻓﻮﻕ
systemroot%\system32\dns%ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺩﺭ ﺍﻳﻦ ﺑﺨﺶ ﻫﺪﻑ ﺑﺮﺭﺳﻲ
Zoneﻫﺎﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺑﻮﺩﻩ ﮐﻪ ﺑﻪ ﺩﻭ ﻧﻮﻉ ﻋﻤﺪﻩ ﺗﻘﺴﻴﻢ ﺧﻮﺍﻫﻨﺪ ﺷﺪ.
Forward Lookup Zone •
214
Forward Lookup Zone
ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ Zoneﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻣﮑﺎﻧﻴﺰﻣﻲ ﺑﺮﺍﻱ ﺗﺮﺟﻤﻪ ﺍﺳﺎﻣﻲ hostﺑﻪ ﺁﺩﺭﺱ IP
ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ DNSﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ Zone .ﻫﺎ ﺩﺍﺭﺍﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻫﺴﺘﻨﺪ ﮐﻪ
ﺑﺼﻮﺭﺕ ﺭﮐﻮﺭﺩﻫﺎﻱ ﺧﺎﺹ ﺩﺭ ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﻲ ﻣﺮﺑﻮﻃﻪ ﺫﺧﻴﺮﻩ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﺍﻳﻦ ﻧﻮﻉ
ﺭﮐﻮﺭﺩﻫﺎ ﺭﺍ " ﺭﮐﻮﺭﺩﻫﺎﻱ ﻣﻨﺒﻊ " Record Resourceﻣﻲ ﮔﻮﻳﻨﺪ .ﺭﮐﻮﺭﺩﻫﺎﻱ ﻓﻮﻕ
ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻣﻨﺎﺑﻊ ﻗﺎﺑﻞ ﺩﺳﺘﺮﺱ ﺩﺭ ﻫﺮ Zoneﺭﺍ ﻣﺸﺨﺺ ﺧﻮﺍﻫﻨﺪ
ﮐﺮﺩ.
215
ﺩﺍﻣﻨﻪ ﻫﺎﻱ ﻫﻤﺠﻮﺍﺭ ﻭ ﻏﻴﺮ ﻫﻤﺠﻮﺍﺭ ﺩﺭ ﺷﮑﻞ ﻓﻮﻕ ﻧﺸﺎﻥ ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳﺖ .ﺩﺍﻣﻨﻪ ﻫﺎﻱ
ﻫﻤﺠﻮﺍﺭ ﻫﻤﺪﻳﮕﺮ ﺭﺍ ﺣﺲ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ ) ﺑﺮﺍﻱ ﻳﮑﺪﻳﮕﺮ ﻣﻠﻤﻮﺱ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ(.
ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻣﺜﺎﻝ ﻓﻮﻕ ﺩﺍﻣﻨﻪ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ Zone Microsoft.comﻫﻤﺠﻮﺍﺭ ﻭ ﺩﺍﻣﻨﻪ
ﻫﺎﻱ Msn.comﻭ Microsoft.comﻏﻴﺮ ﻫﻤﺠﻮﺍﺭ ﻫﺴﺘﻨﺪ.
Zoneﻫﺎ ﻣﺠﻮﺯ ﻭﺍﮔﺬﺍﺭﻱ ﻣﺴﺌﻮﻟﻴﺖ ﺑﺮﺍﻱ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻣﻨﺎﺑﻊ ﻣﻮﺟﻮﺩ ﺩﺭ Zoneﺭﺍ ﻓﺮﺍﻫﻢ
ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ Zone .ﻫﺎ ﺭﻭﺷﻲ ﺭﺍ ﺑﻪ ﻣﻨﻈﻮﺭ ﻭﺍﮔﺬﺍﺭﻱ ﻣﺴﺌﻮﻟﻴﺖ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻭ ﻧﮕﻬﺪﺍﺭﻱ
ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﻲ ﻣﺮﺑﻮﻃﻪ ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ .ﻓﺮﺽ ﮐﻨﻴﺪ ﺷﺮﮐﺘﻲ ﺑﺎ ﻧﺎﻡ TACteam
ﻭﺟﻮﺩﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ .ﺷﺮﮐﺖ ﻓﻮﻕ ﺍﺯ ﺩﺍﻣﻨﻪ ﺍﻱ ﺑﺎ ﻧﺎﻡ tacteam.netﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﺷﺮﮐﺖ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﺷﻌﺒﺎﺗﻲ ﺩﺭ and Boston ,San Francisco, Dallasﺍﺳﺖ.
ﺷﻌﺒﻪ ﺍﺻﻠﻲ ﺩﺭ Dallasﺑﻮﺩﻩ ﮐﻪ ﻣﺪﻳﺮﺍﻥ ﻣﺘﻌﺪﺩﻱ ﺑﺮﺍﻱ ﻣﺪﻳﺮﻳﺖ ﺷﺒﮑﻪ ﺩﺭ ﺁﻥ ﻓﻌﺎﻟﻴﺖ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺷﻌﺒﻪ San Franciscoﻧﻴﺰ ﺩﺍﺭﺍﻱ ﭼﻨﺪﻳﻦ ﻣﺪﻳﺮ ﻭﺭﺯﻳﺪﻩ ﺑﻪ ﻣﻨﻈﻮﺭ ﻧﻈﺎﺭﺕ ﺑﺮ
ﺳﺎﻳﺖ ﺍﺳﺖ .ﺷﻌﺒﻪ Bostonﺩﺍﺭﺍﻱ ﻣﺪﻳﺮﻳﺘﻲ ﮐﺎﺭﺁﻣﺪ ﺑﺮﺍﻱ ﻣﺪﻳﺮﻳﺖ DNSﻧﻤﻲ ﺑﺎﺷﺪ.
ﺑﻨﺎﺑﺮﺍﻳﻦ ﻫﻤﻮﺍﺭﻩ ﻧﮕﺮﺍﻧﻲ ﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﻭﺍﮔﺬﺍﺭﻱ ﻣﺴﺌﻮﻟﻴﺖ ﻧﮕﻬﺪﺍﺭﻱ ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ
ﻳﮏ ﻓﺮﺩ ﺩﺭ Bostonﺧﻮﺍﻫﻴﻢ ﺑﻮﺩ .ﻣﻨﺎﺑﻊ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺳﺎﻳﺖ Dallasﺩﺭ ﺣﻮﺯﻩ
tacteam.netﺑﻮﺩﻩ ﻭ ﻣﻨــــــﺎﺑﻊ ﻣﻮﺟـــﻮﺩ ﺩﺭ San Franciscoﺩﺭ ﺳﺎﻳـــﺖ
west.tacteam.netﻭ ﻣﻨــــــﺎﺑﻊ ﻣﻮﺟـــــﻮﺩ ﺩﺭ Bostonﺩﺭ ﺳﺎﻳـــﺖ
east.tacteam.netﻧﮕﻬﺪﺍﺭﻱ ﻣﻲ ﮔﺮﺩﻧﻨﺪ .ﺩﺭ ﭼﻨﻴﻦ ﻭﺿﻌﻴﺘﻲ ﻣﺎ ﺻﺮﻓﺎ" ﺩﻭ Zoneﺭﺍ
ﺑﺮﺍﻱ ﻣﺪﻳﺮﻳﺖ ﺳﻪ ﺩﺍﻣﻨﻪ ﺍﻳﺠﺎﺩ ﺧﻮﺍﻫﻴﻢ ﮐﺮﺩ .ﻳﮏ Zoneﺑﺮﺍﻱ tacteam.netﮐﻪ
ﻣﺴﺌﻮﻟﻴﺖ ﻣﻨﺎﺑﻊ ﻣﺮﺑﻮﻁ ﺑﻪ tacteam.netﻭ east.tacteam.netﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺷﺘﻪ
ﻭ ﻳﮏ Zoneﺩﻳﮕﺮ ﺑﺮﺍﻱ west.tacteam.netﮐﻪ ﻣﻨﺎﺑﻊ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺳﺎﻳﺖ
San Franciscoﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺧﻮﺍﻫﺪ ﮔﺮﻓﺖ .ﺍﺳﺎﻣﻲ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺮﺍﻱ ﻫﺮ Zoneﺑﻪ ﭼﻪ
ﺻﻮﺭﺕ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﻧﺘﺨﺎﺏ ﮔﺮﺩﻧﻨﺪ؟ ﻫﺮ Zoneﻧﺎﻡ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺭﻳﺸﻪ ﻭ ﻳﺎ ﺑﺎﻻﺗﺮﻳﻦ
ﺳﻄﺢ ﺩﺍﻣﻨﻪ ﺍﻗﺘﺒﺎﺱ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﺩﺭﺧﻮﺍﺳﺘﻲ ﺑﺮﺍﻱ ﻳﮏ ﻣﻨﺒﻊ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺩﺍﻣﻨﻪ
west.tacteam.netﺑﺮﺍﻱ DNSﻭﺍﺻﻞ ﮔﺮﺩﺩ ) ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﻣﺮﺑﻮﻁ ﺑﻪ
216
( tacteam.netﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ tacteam.netﺻﺮﻓﺎ" ﺷﺎﻣﻞ ﻳﮏ Zoneﻧﺨﻮﺍﻫﺪ
ﺑﻮﺩ.ﺩﺭ ﭼﻨﻴﻦ ﻭﺿﻌﻴﻨﻲ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﻳﮏ ) Delegationﻭﺍﮔﺬﺍﺭﻱ
ﻣﺴﺌﻮﻟﻴﺖ ( ﺑﻮﺩﻩ ﮐﻪ ﺑﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﻣﺮﺑﻮﻁ ﺑﻪ west.tacteam.netﺍﺷﺎﺭﻩ
ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺩﺭﺧﻮﺍﺳﺖ ﻣﺮﺑﻮﻃﻪ ﺑﺮﺍﻱ ﺗﺮﺟﻤﻪ ﺍﺳﺎﻣﻲ ﺑﻪ ﺁﺩﺭﺱ ﺑﺪﺭﺳﺘﻲ ﺑﻪ
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻣﺮﺑﻮﻃﻪ ﻫﺪﺍﻳﺖ ﺗﺎ ﻣﺸﮑﻞ ﺑﺮﻃﺮﻑ ﮔﺮﺩﺩ.
217
ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻗﺼﺪ ﻳﺎﻓﺘﻦ ﻳﮏ ﺷﻤﺎﺭﻩ ﺗﻠﻔﻦ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﺑﺎ ﺣﺮﮐﺖ ﺑﺮ ﺭﻭﻱ ﺣﺮﻑ
ﻣﺮﺑﻮﻃﻪ ﻭ ﺩﻧﺒﺎﻝ ﻧﻤﻮﺩﻥ ﻟﻴﺴﺖ ﮐﻪ ﺑﺘﺮﺗﻴﺐ ﺣﺮﻭﻑ ﺍﻟﻔﺒﺎﺀ ﺍﺳﺖ ﻗﺎﺩﺭ ﺑﻪ ﻳﺎﻓﺘﻦ ﻧﺎﻡ ﺷﺨﺺ
ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺍﻫﻴﺪ ﺑﻮﺩ .ﺍﮔﺮ ﻣﺎ ﺷﻤﺎﺭﻩ ﺗﻠﻔﻦ ﻓﺮﺩﻱ ﺭﺍ ﺑﺪﺍﻧﻴﻢ ﻭ ﻗﺼﺪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ ﺍﺯ ﻧﺎﻡ ﻭﻱ
ﻧﻴﺰ ﺁﮔﺎﻫﻲ ﭘﻴﺪﺍ ﻧﻤﺎﺋﻴﻢ ﭼﻪ ﻧﻮﻉ ﻓﺮﺁﻳﻨﺪﻱ ﺭﺍ ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﻧﺒﺎﻝ ﻧﻤﻮﺩ؟ .ﺍﺯ ﺁﻧﺠﺎﺋﻴﮑﻪ ﺩﻓﺘﺮﭼﻪ
ﺗﻠﻔﻦ ﺑﺮ ﺍﺳﺎﺱ ﻧﺎﻡ ﺍﻳﻨﺪﮐﺲ ﺷﺪﻩ ﺍﺳﺖ ﺗﻨﻬﺎ ﺭﺍﻩ ﺣﺮﮐﺖ ﻭ ﺟﺴﺘﺠﻮ ﺩﺭ ﺗﻤﺎﻡ ﺷﻤﺎﺭﻩ ﺗﻠﻔﻦ ﻫﺎ
ﻭ ﻳﺎﻓﺘﻦ ﻧﺎﻡ ﻣﺮﺑﻮﻃﻪ ﺍﺳﺖ .ﻗﻄﻌﺎ" ﺭﻭﺵ ﻓﻮﻕ ﺭﻭﺵ ﻣﻨﺎﺳﺒﻲ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺣﻞ
ﻣﺸﮑﻞ ﻓﻮﻕ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻳﺎﻓﺘﻦ ﻧﺎﻡ ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ IPﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ ﺍﺯ ﻳﮏ ﺩﺍﻣﻨﻪ ﺟﺪﻳﺪ ﺑﺎ
ﻧﺎﻡ in-addr.arpaﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺍﻣﻨﻪ ﻓﻮﻕ ﺍﺳﺎﻣﻲ ﻣﺮﺑﻮﻃﻪ ﺑﻪ ﺩﺍﻣﻨﻪ ﻫﺎ ﺭﺍ ﺑﺮ ﺍﺳﺎﺱ
ﺷﻨﺎﺳﻪ ﺷﺒﮑﻪ ) (Network IDﺍﻳﻨﺪﮐﺲ ﻭ ﺑﺎﻋﺚ ﺍﻓﺰﺍﻳﺶ ﺳﺮﻋﺖ ﻭ ﮐﺎﺭﺁﺋﻲ ﺩﺭ ﺑﺎﺯﻳﺎﺑﻲ
ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﻮﻉ ﺩﺭﺧﻮﺍﺳﺖ ﻫﺎ
ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺮﻧﺎﻣﻪ ﻣﺪﻳﺮﻳﺘﻲ DNSﻣﻲ ﺗﻮﺍﻥ ﺑﺮﺍﺣﺘﻲ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﻳﺠﺎﺩ ﺍﻳﻦ ﻧﻮﻉ Zoneﻫﺎ
ﻧﻤﻮﺩ .ﻣﺜﻼ" ﺍﮔﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺩﺍﺭﺍﻱ ﺁﺩﺭﺱ ١٩٢,١٦٨,١,٠ﺑﺎﺷﺪ ﻳﮏ ﺁﺩﺭﺱ ﻣﻌﮑﻮﺱ ﺍﻳﺠﺎﺩ ﻭ
Zoneﻣﺮﺑﻮﻃﻪ ﺑﺼﻮﺭﺕ ﺯﻳﺮ ﺧﻮﺍﻫﺪ ﺑﻮﺩ :
1.168.192.in-
addr.arpa.dns
218
ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ DNS
ﺗﺎﺭﻳﺨﭽﻪ DNS
، DNSﺯﻣﺎﻧﻲ ﮐﻪ ﺍﻳﻨﺘﺮﻧﺖ ﺗﺎ ﺑﻪ ﺍﻳﻦ ﺍﻧﺪﺍﺯﻩ ﮔﺴﺘﺮﺵ ﭘﻴﺪﺍ ﻧﮑﺮﺩﻩ ﺑﻮﺩ ﻭ ﺻﺮﻓﺎ" ﺩﺭ ﺣﺪ
ﻭ ﺍﻧﺪﺍﺯﻩ ﻳﮏ ﺷﺒﮑﻪ ﮐﻮﭼﮏ ﺑﻮﺩ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﻳﺪ .ﺩﺭ ﺁﻥ ﺯﻣﺎﻥ ،ﺍﺳﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ
ﻣﻴﺰﺑﺎﻥ ﺑﻪ ﺻﻮﺭﺕ ﺩﺳﺘﻲ ﺩﺭ ﻓﺎﻳﻠﻲ ﺑﺎ ﻧﺎﻡ HOSTSﺩﺭﺝ ﻣﻲ ﮔﺮﺩﻳﺪ .ﻓﺎﻳﻞ ﻓﻮﻕ ﺑﺮ ﺭﻭﻱ
ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻣﺮﮐﺰﻱ ﻗﺮﺍﺭ ﻣﻲ ﮔﺮﻓﺖ .ﻫﺮ ﺳﺎﻳﺖ ﻭ ﻳﺎ ﮐﺎﻣﭙﻴﻮﺗﺮ ﮐﻪ ﻧﻴﺎﺯﻣﻨﺪ ﺗﺮﺟﻤﻪ
ﺍﺳﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ﺑﻮﺩ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﻓﺎﻳﻞ ﻓﻮﻕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﻮﺩ .ﻫﻤﺰﻣﺎﻥ ﺑﺎ
ﮔﺴﺘﺮﺵ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﺍﻓﺰﺍﻳﺶ ﺗﻌﺪﺍﺩ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻴﺰﺑﺎﻥ ،ﺣﺠﻢ ﻓﺎﻳﻞ ﻓﻮﻕ ﻧﻴﺰ ﺍﻓﺰﺍﻳﺶ ﻭ
ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺑﺎ ﻣﺸﮑﻞ ﻣﻮﺍﺟﻪ ﮔﺮﺩﻳﺪ ) ﺍﻓﺰﺍﻳﺶ ﺗﺮﺍﻓﻴﮏ ﺷﺒﮑﻪ ( .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺴﺎﺋﻞ
ﻓﻮﻕ ،ﺩﺭ ﺳﺎﻝ ۱۹۸۴ﺗﮑﻨﻮﻟﻮﮊﻱ DNSﻣﻌﺮﻓﻲ ﮔﺮﺩﻳﺪ.
ﭘﺮﻭﺗﮑﻞ DNS
، DNSﻳﮏ "ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﻲ ﺗﻮﺯﻳﻊ ﺷﺪﻩ " ﺍﺳﺖ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﻣﺎﺷﻴﻦ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﻣﺴﺘﻘﺮ
ﻣﻲ ﺷﻮﺩ ) ﻣﺸﺎﺑﻪ ﺭﻳﺸﻪ ﻫﺎﻱ ﻳﮏ ﺩﺭﺧﺖ ﮐﻪ ﺍﺯ ﺭﻳﺸﻪ ﺍﺻﻠﻲ ﺍﻧﺸﻌﺎﺏ ﻣﻲ ﺷﻮﻧﺪ ( .ﺍﻣﺮﻭﺯﻩ
ﺍﮐﺜﺮ ﺷﺮﮐﺖ ﻫﺎ ﻭ ﻣﻮﺳﺴﺎﺕ ﺩﺍﺭﺍﻱ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﮐﻮﭼﮏ ﺩﺭ ﺳﺎﺯﻣﺎﻥ ﺧﻮﺩ
ﻣﻲ ﺑﺎﺷﻨﺪ ﺗﺎ ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ ﺍﻳﺠﺎﺩ ﮔﺮﺩﺩ ﮐﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺑﺪﻭﻥ ﺑﺮﻭﺯ ﻫﻴﭽﮕﻮﻧﻪ ﻣﺸﮑﻠﻲ ،ﻳﮑﺪﻳﮕﺮ
ﺭﺍ ﭘﻴﺪﺍ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﺯ ﻭﻳﻨﺪﻭﺯ ۲۰۰۰ﻭ ﺍﮐﺘﻴﻮ ﺩﺍﻳﺮﮐﺘﻮﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﺋﻴﺪ،
219
ﻗﻄﻌﺎ" ﺍﺯ DNSﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺮﺟﻤﻪ ﺍﺳﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺑﻪ ﺁﺩﺭﺱ ﻫﺎﻱ ، IPﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ.
ﺷﺮﮐﺖ ﻣﺎﻳﮑﺮﻭﺳﺎﻓﺖ ﺩﺭ ﺍﺑﺘﺪﺍ ﻧﺴﺨﻪ ﺍﺧﺘﺼﺎﺻﻲ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺧﻮﺩ ﺭﺍ ﺑﺎ ﻧﺎﻡ
Windows Internet Name Service ) WINSﻃﺮﺍﺣﻲ ﻭ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻧﻤﻮﺩ.
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻓﻮﻕ ﻣﺒﺘﻨﻲ ﺑﺮ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻗﺪﻳﻤﻲ ﺑﻮﺩ ﻭ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﺋﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ
ﮔﺮﺩﻳﺪ ﮐﻪ ﻫﺮﮔﺰ ﺩﺍﺭﺍﻱ ﮐﺎﺭﺍﺋﻲ ﻣﺸﺎﺑﻪ DNSﻧﺒﻮﺩﻧﺪ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﻃﺒﻴﻌﻲ ﺑﻮﺩ ﮐﻪ ﺷﺮﮐﺖ
ﻣﺎﻳﮑﺮﻭﺳﺎﻓﺖ ﺍﺯ WINSﻓﺎﺻﻠﻪ ﮔﺮﻓﺘﻪ ﻭ ﺑﻪ ﺳﻤﺖ DNSﺣﺮﮐﺖ ﮐﻨﺪ.
ﺍﺯ ﭘﺮﻭﺗﮑﻞ DNSﺩﺭ ﻣﻮﺍﺭﺩﻱ ﮐﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﻤﺎ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﻳﮏ ﺩﺭﺧﻮﺍﺳﺖ ﻣﺒﺘﻨﻲ ﺑﺮ
DNSﺑﺮﺍﻱ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻧﺎﻡ ﺑﻪ ﻣﻨﻈﻮﺭ ﻳﺎﻓﺘﻦ ﺁﺩﺭﺱ Domainﻣﻲ ﻧﻤﺎﻳﺪ،
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ .ﻣﺜﻼ" ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺩﺭ ﻣﺮﻭﺭﮔﺮ ﺧﻮﺩ ﺁﺩﺭﺱ www. Cisco.com
ﺭﺍ ﺗﺎﻳﭗ ﻧﻤﺎﺋﻴﺪ ،ﻳﮏ ﺩﺭﺧﻮﺍﺳﺖ ﻣﺒﺘﻨﻲ ﺑﺮ DNSﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﻤﺎ ﻭ ﺑﻪ ﻣﻘﺼﺪ ﻳﮏ
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺻﺎﺩﺭ ﻣﻲ ﺷﻮﺩ .ﻣﺎﻣﻮﺭﻳﺖ ﺩﺭﺧﻮﺍﺳﺖ ﺍﺭﺳﺎﻟﻲ ،ﻳﺎﻓﺘﻦ ﺁﺩﺭﺱ IP
ﻭﺏ ﺳﺎﻳﺖ Ciscoﺍﺳﺖ.
220
ﻓﺮﺁﻳﻨﺪ ﺍﺭﺳﺎﻝ ﻳﮏ ﺩﺭﺧﻮﺍﺳﺖ DNSﻭ ﺩﺭﻳﺎﻓﺖ ﭘﺎﺳﺦ ﺁﻥ ،ﻣﺘﻨﺎﺳﺐ ﺑﺎ ﻧﻮﻉ ﺳﻴﺴﺘﻢ
ﻋﺎﻣﻞ ﻧﺼﺐ ﺷﺪﻩ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺳﺖ .ﺑﺮﺧﻲ ﺍﺯ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻋﺎﻣﻞ ﺍﺟﺎﺯﻩ ﺍﺳﺘﻔﺎﺩﻩ
ﺍﺯ ﭘﺮﻭﺗﮑﻞ TCPﺑﺮﺍﻱ DNSﺭﺍ ﻧﺪﺍﺩﻩ ﻭ ﺻﺮﻓﺎ" ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﭘﺮﻭﺗﮑﻞ UDPﺑﻪ ﻣﻨﻈﻮﺭ
ﺣﻤﻞ ﺩﺍﺩﻩ ﺍﺳﺘﻔﺎﺩﻩ ﺷﻮﺩ .ﺑﺪﻳﻬﻲ ﺍﺳﺖ ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ﻫﻤﻮﺍﺭﻩ ﺍﻳﻦ ﺍﺣﺘﻤﺎﻝ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ
ﺩﺍﺷﺖ ﮐﻪ ﺑﺎ ﺧﻄﺎﻫﺎﺋﻲ ﻣﻮﺍﺟﻪ ﺷﺪﻩ ﻭ ﻋﻤﻼ" ﺍﻣﮑﺎﻥ ﺗﺮﺟﻤﻪ ﻧﺎﻡ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻭ ﻳﺎ
Domainﺑﻪ ﺁﺩﺭﺱ IPﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﺪ.
ﭘﺮﻭﺗﮑﻞ DNSﺍﺯ ﭘﻮﺭﺕ ۵۳ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﻳﮏ
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺑﻪ ﭘﻮﺭﺕ ۵۳ﮔﻮﺵ ﺩﺍﺩﻩ ﻭ ﺍﻳﻦ ﺍﻧﺘﻈﺎﺭ ﺭﺍ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ ﮐﻪ ﻫﺮ
ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺍﻱ ﮐﻪ ﺗﻤﺎﻳﻞ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺮﻭﻳﺲ ﻓﻮﻕ ﺭﺍ ﺩﺍﺭﺩ ﺍﺯ ﭘﻮﺭﺕ ﻣﺸﺎﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ
ﻧﻤﺎﻳﺪ .ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﻣﻤﮑﻦ ﺍﺳﺖ ﻣﺠﺒﻮﺭ ﺷﻮﻳﻢ ﺍﺯ ﭘﻮﺭﺕ ﺩﻳﮕﺮﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﺋﻴﻢ.
ﻭﺿﻌﻴﺖ ﻓﻮﻕ ﺑﻪ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﻧﺼﺐ ﺷﺪﻩ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ
ﺑﺴﺘﮕﻲ ﺩﺍﺭﺩ.
ﺳﺎﺧﺘﺎﺭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻧﺎﻡ ﺩﺍﻣﻨﻪ ﻫﺎ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ
ﺍﻣﺮﻭﺯﻩ ﺑﺮ ﺭﻭﻱ ﺍﻳﻨﺘﺮﻧﺖ ﻣﻴﻠﻴﻮﻥ ﻫﺎ ﺳﺎﻳﺖ ﺑﺎ ﺍﺳﺎﻣﻲ Domainﺛﺒﺖ ﺷﺪﻩ ﻭﺟﻮﺩ ﺩﺍﺭﺩ.
ﺷﺎﻳﺪ ﺍﻳﻦ ﺳﻮﺍﻝ ﺑﺮﺍﻱ ﺷﻤﺎ ﺗﺎﮐﻨﻮﻥ ﻣﻄﺮﺡ ﺷﺪﻩ ﺑﺎﺷﺪ ﮐﻪ ﺍﻳﻦ ﺍﺳﺎﻣﻲ ﭼﮕﻮﻧﻪ ﺳﺎﺯﻣﺎﻧﺪﻫﻲ
ﻣﻲ ﺷﻮﻧﺪ؟ ﺳﺎﺧﺘﺎﺭ DNSﺑﮕﻮﻧﻪ ﺍﻱ ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺍﺳﺖ ﮐﻪ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNS
ﺿﺮﻭﺭﺗﻲ ﺑﻪ ﺁﮔﺎﻫﻲ ﺍﺯ ﺗﻤﺎﻣﻲ ﺍﺳﺎﻣﻲ Domainﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ﻧﺪﺍﺷﺘﻪ ﻭ ﺻﺮﻓﺎ" ﻣﻴﺰﺍﻥ ﺁﮔﺎﻫﻲ
221
ﻭﻱ ﺑﻪ ﻳﮏ ﺳﻄﺢ ﺑﺎﻻﺗﺮ ﻭ ﻳﮏ ﺳﻄﺢ ﭘﺎﺋﻴﻦ ﺗﺮ ﺍﺯ ﺧﻮﺩ ﻣﺤﺪﻭﺩ ﻣﻲ ﮔﺮﺩﺩ .ﺷﮑﻞ ﺯﻳﺮ ﺑﺨﺶ
ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺳﺎﺧﺘﺎﺭ ﺳﻠﺴﻠﻪ ﻣﺮﺍﺗﺒﻲ DNSﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ:
222
Support, wwwﻭ ، Routersﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﺍﺯ ﺭﮐﻮﺭﺩﻫﺎﻱ ﻣﻨﺒﻊ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺩﺍﻣﻨﻪ
Cisco.comﻣﻲ ﺑﺎﺷﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ Subdomainﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﻳﮏ ﺑﺮﻧﺎﻣﻪ
ﻣﺪﻳﺮﻳﺘﻲ DNSﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ www .ﻭ ﻳﺎ ﻫﺮ ﻧﻮﻉ ﺭﮐﻮﺭﺩ ﻣﻨﺒﻊ ﺩﻳﮕﺮﻱ ﺭﺍ ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻓﻮﻕ ﺗﻌﺮﻳﻒ ﻧﻤﻮﺩ .ﭘﺲ ﺍﺯ ﺍﻋﻤﺎﻝ ﺗﻐﻴﻴﺮﺍﺕ ﺩﻟﺨﻮﺍﻩ ﺧﻮﺩ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ
، Domainﻣﺤﺘﻮﻳﺎﺕ ﻓﺎﻳﻞ ﻫﺎﻱ ﺧﺎﺻﻲ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺍﻧﺪ ﻧﻴﺰ
ﺗﻐﻴﻴﺮ ﻧﻤﻮﺩﻩ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﺗﻐﻴﻴﺮﺍﺕ ﻓﻮﻕ ﺑﻪ ﺳﺎﻳﺮ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﺗﺎﺋﻴﺪ ﺷﺪﻩ ﺍﻃﻼﻉ ﺩﺍﺩﻩ
ﻣﻲ ﺷﻮﺩ .ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻓﻮﻕ ،ﻣﺴﺌﻮﻟﻴﺖ Domainﺷﻤﺎ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺷﺘﻪ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ
ﺗﻤﺎﻣﻲ ﺍﻳﻨﺘﺮﻧﺖ ﮐﻪ ﺑﻪ ﺍﻳﻦ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ DNSﻣﺘﺼﻞ ﻣﻲ ﺷﻮﻧﺪ ﺍﺯ ﺗﻐﻴﻴﺮﺍﺕ ﺍﻳﺠﺎﺩ
ﺷﺪﻩ ﺁﮔﺎﻩ ﻭ ﻗﺎﺩﺭ ﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻫﺮ ﻳﮏ ﺍﺯ ﺑﺨﺶ ﻫﺎﻱ Domainﻣﻲ ﮔﺮﺩﻧﺪ.
ﻣﺜﻼ" ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻗﺼﺪ ﺍﺭﺗﺒﺎﻁ ﺑﺎ Support.Cisco.comﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ،ﮐﺎﻣﭙﻴﻮﺗﺮ
ﺷﻤﺎ ﺑﺎ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﮐﻪ ﻣﺴﺌﻮﻟﻴﺖ ﻣﺪﻳﺮﻳﺖ ﺩﺍﻣﻨﻪ ﻫﺎﻱ .Comﺭﺍ ﺩﺍﺭﺩ ،ﺍﺭﺗﺒﺎﻁ
ﺑﺮﻗﺮﺍﺭ ﻧﻤﻮﺩﻩ ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻓﻮﻕ ﺍﻃﻼﻋﺎﺕ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺩﺍﻣﻨﻪ Cisco.comﺭﺍ
ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺩﺭ ﻧﻬﺎﻳﺖ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﻣﺮﺑﻮﻁ ﺑﻪ Cisco.com
) ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻓﻮﻕ ،ﺗﻤﺎﻣﻲ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺗﺒﻂ ﺑﺎ ﺩﺍﻣﻨﻪ Cisco.comﺭﺍ ﺩﺭ ﺧﻮﺩ
ﻧﮕﻬﺪﺍﺭﻱ ﻣﻲ ﻧﻤﺎﻳﺪ ( ،ﺁﺩﺭﺱ IPﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺮﺑﻮﻁ ﺑﻪ Support.Cisco.comﺭﺍ
ﻣﺸﺨﺺ ﻧﻤﻮﺩﻩ ﺗﺎ ﺍﻣﮑﺎﻥ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺁﻥ ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ.
223
Queriesﻭ Resolution
ﻳﮏ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ DNSﻭ ﺍﺧﺬ ﭘﺎﺳﺦ ﻻﺯﻡ ﺍﺯ ﺩﻭ ﺭﻭﺵ ﻣﺘﻔﺎﻭﺕ
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ:
ﺩﺭ ﺭﻭﺵ ﺍﻭﻝ ،ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺑﺎ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻧﺎﻡ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﻲ ﻧﻤﺎﻳﺪ. •
ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ﻣﺎﺩﺍﻣﻴﮑﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻣﺠﺎﺯ ﺷﺎﻣﻞ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﭘﻴﺪﺍ ﻧﺸﻮﺩ،
ﺍﺩﺍﻣﻪ ﺧﻮﺍﻫﺪ ﻳﺎﻓﺖ )ﺭﻭﺵ .( non Recursive query
ﺩﺭ ﺭﻭﺵ ﺩﻭﻡ ،ﻣﺎﻣﻮﺭﻳﺖ ﺗﺮﺟﻤﻪ ﻧﺎﻡ ﺑﻪ ﺁﺩﺭﺱ ﺑﻪ DNSﻭﺍﮔﺬﺍﺭ ﻣﻲ ﺷﻮﺩ .ﺩﺭ ﺍﻳﻦ •
224
ﺑﻪ ﻣﻨﻈﻮﺭ ﺁﺷﻨﺎﺋﻲ ﺑﺎ ﻧﺤﻮﻩ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﺑﻪ ﺑﺮﺭﺳﻲ ﻳﮏ ﻧﻤﻮﻧﻪ ﻣﺜﺎﻝ ﻣﻲ ﭘﺮﺩﺍﺯﻳﻢ.
ﺯﻣﺎﻧﻲ ﮐﻪ ﺷﻤﺎ ﻗﺼﺪ ﻣﺸﺎﻫﺪﻩ ﻳﮏ ﻭﺏ ﺳﺎﻳﺖ ﻧﻈﻴﺮﻭﺏ ﺳﺎﻳﺖ) ( www.cisco.comﺭﺍ
ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ،
ﭘﺲ ﺍﺯ ﻓﻌﺎﻝ ﻧﻤﻮﺩﻥ ﻣﺮﻭﺭﮔﺮ ﻭﺏ ﻭ ﺗﺎﻳﭗ ﺁﺩﺭﺱ
http://www.cisco.comﻭ ﻳﺎ ، www.cisco.comﭘﺲ ﺍﺯ ﻣﺪﺕ ﺯﻣﺎﻥ
ﮐﻮﺗﺎﻫﻲ ! ﺻﻔﺤﻪ ﺍﺻﻠﻲ ﻭﺏ ﺳﺎﻳﺖ ﺩﺭ ﻣﺮﻭﺭﮔﺮ ﺷﻤﺎ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺑﺮﺍﻱ ﻳﺎﻓﺘﻦ
ﺁﺩﺭﺱ IPﻭﺏ ﺳﺎﻳﺖ ﺩﺭﺧﻮﺍﺳﺘﻲ ﻣﺮﺍﺣﻞ ﺯﻳﺮ ﺩﻧﺒﺎﻝ ﻣﻲ ﺷﻮﺩ :
ﻣﺮﺣﻠﻪ ﺍﻭﻝ :ﻓﻌﺎﻝ ﻧﻤﻮﺩﻥ ﻣﺮﻭﺭﮔﺮ ﻭ ﺩﺭﺝ ﺁﺩﺭﺱ www.cisco.comﺩﺭ ﺑﺨﺶ •
ﺁﺩﺭﺱ ﺁﻥ .ﺩﺭ ﺍﻳﻦ ﻣﻘﻄﻊ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﻤﺎ ﺩﺍﺭﺍﻱ ﺁﮔﺎﻫﻲ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺁﺩﺭﺱ IP
ﻭﺏ ﺳﺎﻳﺖ ﺳﻴﺴﮑﻮ ﻧﻤﻲ ﺑﺎﺷﺪ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﻳﮏ ﺩﺭﺧﻮﺍﺳﺖ DNSﺭﺍ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ
ﺩﻫﻨﺪﻩ DNSﻣﺮﺑﻮﻁ ﺑﻪ ﻣﺮﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ ﻫﺎﻱ ﺍﻳﻨﺘﺮﻧﺖ ) ( ISPﺍﺭﺳﺎﻝ ﻣﻲ
ﻧﻤﺎﻳﺪ .ﺣﺘﻤﺎ" ﺍﻳﻦ ﺳﻮﺍﻝ ﺑﺮﺍﻱ ﺷﻤﺎ ﻣﻄﺮﺡ ﺷﺪﻩ ﺍﺳﺖ ﮐﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﭼﻪ ﺻﻮﺭﺕ ﺍﺯ
ﺁﺩﺭﺱ IPﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺁﮔﺎﻫﻲ ﻣﻲ ﻳﺎﺑﺪ ﺗﺎ ﺩﺭﺧﻮﺍﺳﺖ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﻭﻱ
ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﺪ ؟ ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺷﻤﺎ ﺍﺯ ﻃﺮﻳﻖ up-Dialﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﺷﺪﻩ ﺍﻳﺪ
،ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻨﻈﻴﻤﺎﺕ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ) ﺍﻳﺴﺘﺎ ﻭ ﭘﻮﻳﺎ ( ﭘﺮﻭﺗﮑﻞ TCP/IP
ﻣﺮﺗﺒﻂ ﺑﺎ ﺁﺩﺍﭘﺘﻮﺭ ﻣﺠﺎﺯﻱ up-Dialﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺩﺍﺭﺍﻱ ﻳﮏ
ﺍﺗﺼﺎﻝ ﺩﺍﺋﻢ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﺷﺒﮑﻪ ﻣﺤﻠﻲ ﻣﻲ ﺑﺎﺷﻴﺪ ،ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺑﺎ
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯﺗﻨﻈﻴﻤﺎﺕ ﺍﻧﺠﺎﻡ ﺷﺪﻩ )ﺍﻳﺴﺘﺎ ﻭ ﭘﻮﻳﺎ( ﭘﺮﻭﺗﮑﻞ TCP/IPﻣﺮﺗﺒﻂ ﺑﺎ ﺁﺩﺍﭘﺘﻮﺭ
ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﻣﺮﺣﻠﻪ ﺩﻭﻡ :ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﻣﺮﮐﺰ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺖ ) ( ISPﺷﻤﺎ،
ﺁﺩﺭﺱ IPﻣﺮﺑﻮﻁ ﺑﻪ ﺳﺎﻳﺖ ﺳﻴﺴﮑﻮ ﺭﺍ ﻧﻤﻲ ﺩﺍﻧﺪ ﻭ ﺑﺪﻳﻦ ﺩﻟﻴﻞ ،ﺁﺩﺭﺱ ﺳﺎﻳﺖ ﻓﻮﻕ ﺭﺍ ﺍﺯ
ﻳﮑﻲ ﺍﺯ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻧﺎﻡ ﺭﻳﺸﻪ ﺩﺭﺧﻮﺍﺳﺖ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﻣﺮﺣﻠﻪ ﺳﻮﻡ :ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﺭﻳﺸﻪ ،ﺑﺎﻧﮏ ﺍﻃﻼﻋﺎﺗﻲ ﺧﻮﺩ ﺭﺍ ﺑﺮﺭﺳﻲ ﻧﻤﻮﺩﻩ ﻭ •
225
. ( ١٩٨,١٣٣,٢١٩,٢٥ﭘﺲ ﺍﺯ ﺁﮔﺎﻫﻲ ﺍﺯ ﺁﺩﺭﺱ IPﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﻣﺮﺑﻮﻁ
ﺑﻪ ، cisco.comﭘﺎﺳﺦ ﻻﺯﻡ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ISPﺷﻤﺎ ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ.
ﻣﺮﺣﻠﻪ ﭼﻬﺎﺭﻡ :ﺩﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ DNSﻣﺮﮐﺰ ISPﺷﻤﺎ ﺩﺍﻧﺶ ﻻﺯﻡ •
IPﻭﺏ ﺳﺎﻳﺖ ﺳﻴﺴﮑﻮ ﺑﻮﺩﻩ ﻭ ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﺎ ﺁﻥ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻧﻤﺎﻳﺪ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﮐﺎﻣﭙﻴﻮﺗﺮ
ﺷﻤﺎ ﻳﮏ ﺩﺭﺧﻮﺍﺳﺖ httpﺭﺍ ﻣﺴﺘﻘﻴﻤﺎ" ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﺳﻴﺴﮑﻮ ﺍﺭﺳﺎﻝ
ﻧﻤﻮﺩﻩ ﻭ ﺍﺯ ﻭﻱ ﺩﺭﺧﻮﺍﺳﺖ ﻳﮏ ﺻﻔﺤﻪ ﻭﺏ ﺭﺍ ﻣﻲ ﻧﻤﺎﻳﺪ.
226
ﺍﺗﺮﻧﺖ
ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﺭﻭﺵ ﻫﺎﻱ ﻣﻄﻤﺌﻦ ﻭ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ﻳﮑﻲ ﺍﺯ ﺭﻣﻮﺯ ﻣﻮﻓﻘﻴﺖ ﻫـﺮ
ﺳﺎﺯﻣﺎﻥ ﻭ ﻣﻮﺳﺴﻪ ﺍﺳﺖ .ﻃﻲ ﺳﺎﻟﻴﺎﻥ ﺍﺧﻴﺮ ﻫﺰﺍﺭﺍﻥ ﭘﺮﻭﻧﺪﻩ ﻭ ﮐﺎﻏﺬ ﮐﻪ ﺣﺎﻭﻱ ﺍﻃﻼﻋــﺎﺕ ﺑﺎ
ﺍﺭﺯﺵ ﺑﺮﺍﻱ ﻳﮏ ﺳﺎﺯﻣﺎﻥ ﺑﻮﺩﻩ ،ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺍﻧﺪ .ﺑﺎ ﺗﻐﺬﻳﻪ ﺩﺭﻳﺎﺋﻲ ﺍﺯ ﺍﻃﻼﻋﺎﺕ
ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ،ﺍﻣﮑﺎﻥ ﻣﺪﻳﺮﻳﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ﺍﻃﻼﻋﺎﺕ ﻓﺮﺍﻫﻢ ﺷﺪﻩ ﺍﺳﺖ .ﮐﺎﺭﺑﺮﺍﻥ ﻣﺘﻔﺎﻭﺕ ﺩﺭ
ﺍﻗﺼﻲ ﻧﻘﺎﻁ ﺟﻬﺎﻥ ﻗﺎﺩﺭﺑﻪ ﺍﺷﺘﺮﺍﮎ ﺍﻃﻼﻋﺎﺕ ﺑﻮﺩﻩ ﻭﺗﺼﻮﻳﺮﻱ ﺯﻳﺒﺎ ﺍﺯ ﻫﻤﻴﺎﺭﻱ ﻭﻫﻤﮑﺎﺭﻱ
ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﻪ ﻧﻤﺎﻳﺶ ﻣﻲ ﮔﺬﺍﺭﻧﺪ.
ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﻭ ﺟﻬﺖ ﻧﻴﻞ ﺑﻪ ﺍﻫﺪﺍﻑ ﻓﻮﻕ ﻧﻘﺶ ﺑﺴﻴﺎﺭ ﻣﻬﻤﻲ ﺭﺍ ﺍﻳﻔﺎﺀ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ.ﺍﻳﻨﺘﺮﻧﺖ ﮐﻪ ﻋﺎﻟﻲ ﺗﺮﻳﻦ ﺗﺒﻠﻮﺭ ﻳﮏ ﺷﺒﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺩﺭ ﺳﻄﺢ ﺟﻬﺎﻥ ﺍﺳﺖ،
ﺍﻣﺮﻭﺯﻩ ﺩﺭ ﻣﻘﻴﺎﺱ ﺑﺴﻴﺎﺭ ﮔﺴﺘﺮﺩﻩ ﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﻭ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﮔﺎﻥ ﺍﻃﻼﻋﺎﺕ ،ﺍﻃﻼﻋﺎﺕ ﻭ ﻳﺎ
ﻓﺮﺁﻭﺭﺩﻩ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﻗﺎﻟﺐ ﻣﺤﺼﻮﻻﺕ ﺗﻮﻟﻴﺪﻱ ﻭ ﻳﺎ ﺧﺪﻣﺎﺕ ﺩﺭ ﺍﺧﺘــﻴـﺎﺭ
ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻨﺪﮔﺎﻥ ﻗﺮﺍﺭﻣﻲ ﺩﻫﻨﺪ .ﻭﺏ ﮐﻪ ﻋﺎﻟﻲ ﺗﺮﻳﻦ ﺳﺮﻭﻳﺲ ﺧﺪﻣﺎﺗﻲ ﺍﻳﻨﺘﺮﻧﺖ ﻣﻲ ﺑﺎﺷﺪ
ﮐﺎﺭﺑﺮﺍﻥ ﺭﺍ ﻗﺎﺩﺭ ﻣﻲ ﺳﺎﺯﺩ ﮐﻪ ﺩﺭ ﺍﻗﺼﻲ ﻧﻘﺎﻁ ﺩﻧﻴﺎ ﺍﻗﺪﺍﻡ ﺑﻪ ﺧﺮﻳﺪ ،ﺁﻣﻮﺯﺵ ،ﻣﻄﺎﻟﻌﻪ ﻭ ...
ﻧﻤﺎﻳﻨﺪ.
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺷﺒﮑﻪ ،ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﻳﮕﺮ
ﺍﺳﺖ .ﺍﻳﻨﺘﺮﻧﺖ ﻧﻤﻮﻧﻪ ﺍﻱ ﻋﻴﻨﻲ ﺍﺯ ﻳﮏ ﺷﺒﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﺷﺒﮑﻪ ﻣﻴﻠﻴﻮﻥ ﻫﺎ
ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﺭ ﺍﻗﺼﻲ ﻧﻘﺎﻁ ﺟﻬﺎﻥ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﺷﺪﻩ ﺍﻧﺪ.ﺍﻳﻨﺘﺮﻧﺖ ﺷﺒﮑﻪ ﺍﻱ ﺍﺳﺖ ﻣﺸﺘﻤﻞ
ﺑﺮ ﺯﻧﺠﻴﺮﻩ ﺍﻱ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﻮﭼﮑﺘﺮﺍﺳﺖ .ﻧﻘﺶ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﻮﭼﮏ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺗﺼﻮﻳﺮﻱ
ﺑﺎ ﻧﺎﻡ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺴﻴﺎﺭ ﺣﺎﺋﺰ ﺍﻫﻤﻴﺖ ﺍﺳﺖ .ﺗﺼﻮﻳﺮﻱ ﮐﻪ ﻫﺮ ﮐﺎﺭﺑﺮ ﺑﺎ ﻧﮕﺎﻩ ﮐﺮﺩﻥ ﺑﻪ ﺁﻥ ﮔﻤﺸﺪﻩ
ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺁﻥ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺩﺭ ﺍﻳﻦ ﺑﺨﺶ ﺑﻪ ﺑﺮﺭﺳﻲ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﻭ ﺟﺎﻳﮕﺎﻩ
ﻣﻬﻢ ﺁﻧﺎﻥ ﺩﺭ ﺯﻣﻴﻨﻪ ﺗﮑﻨﻮﻟﻮﮊﻱ ﺍﻃﻼﻋﺎﺕ ﻭ ﻣﺪﻳﺮﻳﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ﺍﻃﻼﻋﺎﺕ ﺧﻮﺍﻫﻴﻢ ﺩﺍﺷﺖ.
227
ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺤﻠﻲ ﻭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮔﺴﺘﺮﺩﻩ
ﺗﺎﮐﻨﻮﻥ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺑﺮ ﺍﺳﺎﺱ ﻣﻮﻟﻔﻪ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺗﻘﺴﻴﻢ ﺑﻨﺪﻱ ﺷﺪﻩ ﺍﻧﺪ.
ﻳﮑﻲ ﺍﺯ ﺍﻳﻦ ﻣﻮﻟﻔﻪ ﻫﺎ " ﺣﻮﺯﻩ ﺟﻐﺮﺍﻓﻴﺎﺋﻲ " ﻳﮏ ﺷﺒﮑﻪ ﺍﺳﺖ .ﺑﺮ ﻫﻤﻴﻦ ﺍﺳﺎﺱ ﺷﺒﮑﻪ ﻫﺎ ﺑﻪ
ﺩﻭ ﮔﺮﻭﻩ ﻋﻤﺪﻩ (Local area network(LANﻭ Wide area (WAN
(networkﺗﻘﺴﻴﻢ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ LANﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ
ﺩﺭ ﻳﮏ ﺣﻮﺯﻩ ﺟﻐﺮﺍﻓﻴﺎﺋﻲ ﻣﺤﺪﻭﺩ ،ﻧﻈﻴﺮ ﻳﮏ ﺳﺎﺧﺘﻤﺎﻥ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺩﺭ
ﺷﺒﮑﻪ ﻫﺎﻱ WANﺗﻌﺪﺍﺩﻱ ﺩﺳﺘﮕﺎﻩ ﮐﻪ ﺍﺯ ﻳﮑﺪﻳﮕﺮ ﮐﻴﻠﻮﻣﺘﺮﻫﺎ ﻓﺎﺻﻠﻪ ﺩﺍﺭﻧﺪ ﺑﻪ ﻳﮑﺪﻳﮕﺮ
ﻣﺘﺼﻞ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﻣﺜﻼ" ﺍﮔﺮ ﺩﻭ ﮐﺘﺎﺑﺨﺎﻧﻪ ﮐﻪ ﻫﺮ ﻳﮏ ﺩﺭ ﻳﮏ ﻧﺎﺣﻴﻪ ﺍﺯ ﺷﻬﺮ ﺑﺰﺭﮔﻲ ﻣﺴﺘﻘﺮ
ﻣﻲ ﺑﺎﺷﻨﺪ ،ﻗﺼﺪ ﺍﺷﺘﺮﺍﮎ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺷﺒﮑﻪ ﺍﻱ WANﺍﻳﺠﺎﺩ ﻭ
ﮐﺘﺎﺑﺨﺎﻧﻪ ﻫﺎ ﺭﺍ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻧﻤﻮﺩ .ﺑﺮﺍﻱ ﺍﺗﺼﺎﻝ ﺩﻭ ﮐﺘﺎﺑﺨﺎﻧﻪ ﻓﻮﻕ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺍﻣﮑﺎﻧﺎﺕ
ﻣﺨﺎﺑﺮﺍﺗﻲ ﻣﺘﻔﺎﻭﺗﻲ ﻧﻈﻴﺮ ﺧﻄﻮﻁ ﺍﺧﺘﺼﺎﺻﻲ ) (Leasedﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﺷﺒﮑﻪ ﻫﺎﻱ LAN
ﻧﺴﺒﺖ ﺑﻪ ﺷﺒﮑﻪ ﻫﺎﻱ WANﺩﺍﺭﺍﻱ ﺳﺮﻋﺖ ﺑﻴﺸﺘﺮﻱ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺑﺎ ﺭﺷﺪ ﻭ ﺗﻮﺳﻌﻪ
ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﺘﻔﺎﻭﺕ ﻣﺨﺎﺑﺮﺍﺗﻲ ﻣﻴﺰﺍﻥ ﺳﺮﻋﺖ ﺷﺒﮑﻪ ﻫﺎﻱ ،WANﺗﻐﻴﻴﺮ ﻭ ﺑﻬﺒﻮﺩ ﭘﻴﺪﺍ ﮐﺮﺩﻩ
ﺍﺳﺖ .ﺍﻣﺮﻭﺯﻩ ﺑﺎ ﺑﮑﺎﺭﮔﻴﺮﻱ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ LANﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ
ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﺘﻌﺪﺩ ﮐﻪ ﺩﺭ ﻣﺴﺎﻓﺖ ﻫﺎﻱ ﻃﻮﻻﻧﻲ ﻧﺴﺒﺖ ﺑﻴﮑﺪﻳﮕﺮ ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ ،ﻓﺮﺍﻫﻢ ﺷﺪﻩ
ﺍﺳﺖ.
ﺍﺗﺮﻧﺖ
ﺩﺭ ﺳﺎﻝ ١٩٧٣ﭘﮋﻭﻫﺸﮕﺮﻱ ﺑﺎ ﻧﺎﻡ " "Metcalfeﺩﺭ ﻣﺮﮐﺰ ﺗﺤﻘﻴﻘﺎﺕ ﺷﺮﮐﺖ
ﺯﻳﺮﺍﮐﺲ ،ﺍﻭﻟﻴﻦ ﺷﺒﮑﻪ ﺍﺗﺮﻧﺖ ﺭﺍ ﺑﻮﺟﻮﺩ ﺁﻭﺭﺩ .ﻫﺪﻑ ﻭﻱ ﺍﺭﺗﺒﺎﻁ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﻳﮏ ﭼﺎﭘﮕﺮ
ﺑﻮﺩ .ﻭﻱ ﺭﻭﺷﻲ ﻓﻴﺰﻳﮑﻲ ﺑﻪ ﻣﻨﻈﻮﺭ ﮐﺎﺑﻞ ﮐﺸﻲ ﺑﻴﻦ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﺘﺼﻞ ﺑﻬﻢ ﺩﺭ ﺍﺗﺮﻧﺖ ﺍﺭﺍﺋﻪ
ﻧﻤﻮﺩ .ﺍﺗﺮﻧﺖ ﺩﺭ ﻣﺪﺕ ﺯﻣﺎﻥ ﮐﻮﺗﺎﻫﻲ ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﮑﻲ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﺭﺍﻳﺞ ﺑﺮﺍﻱ
ﺑﺮﭘﺎﺳﺎﺯﻱ ﺷﺒﮑﻪ ﺩﺭ ﺳﻄﺢ ﺩﻧﻴﺎ ﻣﻄﺮﺡ ﮔﺮﺩﻳﺪ .ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﭘﻴﺸﺮﻓﺖ ﻫﺎﻱ ﻣﻬﻢ ﺩﺭ ﺯﻣﻴﻨﻪ ﺷﺒﮑﻪ
ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ،ﺗﺠﻬﻴﺰﺍﺕ ﻭ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ،ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﻧﻴﺰ ﻫﻤﮕﺎﻡ ﺑﺎ
ﺗﺤﻮﻻﺕ ﻓﻮﻕ ﺷﺪﻩ ﻭ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺭﺍ ﺩﺭ ﺑﻄﻦ ﺧﻮﺩ ﺍﻳﺠﺎﺩ ﻧﻤﻮﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ
228
ﺗﻐﻴﻴﺮﺍﺕ ﻭ ﺍﺻﻼﺣﺎﺕ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ،ﻋﻤﻠﮑﺮﺩ ﻭ ﻧﺤﻮﻩ ﮐﺎﺭ ﺁﻧﺎﻥ ﻧﺴﺒﺖ
ﺑﻪ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﻭﻟﻴﻪ ﺗﻔﺎﻭﺕ ﭼﻨﺪﺍﻧﻲ ﻧﮑﺮﺩﻩ ﺍﺳﺖ .ﺩﺭ ﺍﺗﺮﻧﺖ ﺍﻭﻟﻴﻪ ،ﺍﺭﺗﺒﺎﻁ ﺗﻤﺎﻡ ﺩﺳﺘﮕﺎﻩ
ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﮐﺎﺑﻞ ﺍﻧﺠﺎﻡ ﻣﻲ ﮔﺮﻓﺖ ﮐﻪ ﺗﻮﺳﻂ ﺗﻤﺎﻡ ﺩﺳﺘﮕﺎﻫﻬﺎ ﺑﻪ
ﺍﺷﺘﺮﺍﮎ ﮔﺬﺍﺷﺘﻪ ﻣﻲ ﮔﺮﺩﻳﺪ .ﭘﺲ ﺍﺯ ﺍﺗﺼﺎﻝ ﻳﮏ ﺩﺳﺘﮕﺎﻩ ﺑﻪ ﮐﺎﺑﻞ ﻣﺸﺘﺮﮎ ،ﻣﻲ ﺑﺎﻳﺴﺖ
ﭘﺘﺎﻧﺴﻴﻞ ﻫﺎﻱ ﻻﺯﻡ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﺎﻳﺮ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﺮﺑﻮﻃﻪ ﻧﻴﺰ ﺩﺭ ﺑﻄﻦ ﺩﺳﺘﮕﺎﻩ
ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ )ﮐﺎﺭﺕ ﺷﺒﮑﻪ ( .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺍﻣﮑﺎﻥ ﮔﺴﺘﺮﺵ ﺷﺒﮑﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﭼﺪﻳﺪ ﺑﺮﺍﺣﺘﻲ ﺍﻧﺠﺎﻡ ﻭ ﻧﻴﺎﺯﻱ ﺑﻪ ﺍﻋﻤﺎﻝ ﺗﻐﻴﻴﺮﺍﺕ ﺑﺮ ﺭﻭﻱ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ
ﺩﺭ ﺷﺒﮑﻪ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ.
ﺍﺗﺮﻧﺖ ﻳﮏ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻣﺤﻠﻲ ) (LANﺍﺳﺖ .ﺍﮐﺜﺮ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﻭﻟﻴﻪ ﺩﺭ ﺣﺪ ﻭ ﺍﻧﺪﺍﺯﻩ ﻳﮏ
ﺳﺎﺧﺘﻤﺎﻥ ﺑﻮﺩﻩ ﻭ ﺩﺳﺘﮕﺎﻫﻬﺎ ﻧﺰﺩﻳﮏ ﺑﻪ ﻫﻢ ﺑﻮﺩﻧﺪ .ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺷﺒﮑﻪ
ﺍﺗﺮﻧﺖ ﺻﺮﻓﺎ" ﻗﺎﺩﺭ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭼﻨﺪ ﺻﺪ ﻣﺘﺮ ﮐﺎﺑﻞ ﺑﻴﺸﺘﺮﻧﺒﻮﺩﻧﺪ.ﺍﺧﻴﺮﺍ" ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺗﻮﺳﻌﻪ
ﺍﻣﮑﺎﻧﺎﺕ ﻣﺨﺎﺑﺮﺍﺗﻲ ﻭ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ،ﺯﻣﻴﻨﻪ ﺍﺳﺘﻘﺮﺍﺭ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺍﺗﺮﻧﺖ
ﺑﺎ ﻣﺴﺎﻓﺖ ﻫﺎﻱ ﭼﻨﺪ ﮐﻴﻠﻮﻣﺘﺮﻧﻴﺰ ﻓﺮﺍﻫﻢ ﺷﺪﻩ ﺍﺳﺖ.
ﭘﺮﻭﺗﮑﻞ
ﭘﺮﻭﺗﮑﻞ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺑﻪ ﻣﺠﻤﻮﻋﻪ ﻗﻮﺍﻧﻴﻨﻲ ﺍﻃﻼﻕ ﻣﻲ ﮔﺮﺩﺩ ﮐﻪ ﻧﺤﻮﻩ
ﺍﺭﺗﺒﺎﻃﺎﺕ ﺭﺍ ﻗﺎﻧﻮﻧﻤﻨﺪ ﻣﻲ ﻧﻤﺎﻳﺪ .ﻧﻘﺶ ﭘﺮﻭﺗﮑﻞ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻧﻈﻴﺮ ﻧﻘﺶ ﺯﺑﺎﻥ ﺑﺮﺍﻱ ﺍﻧﺴﺎﻥ
ﺍﺳﺖ .ﺑﺮﺍﻱ ﻣﻄﺎﻟﻌﻪ ﻳﮏ ﮐﺘﺎﺏ ﻧﻮﺷﺘﻪ ﺷﺪﻩ ﺑﻪ ﻓﺎﺭﺳﻲ ﻣﻲ ﺑﺎﻳﺴﺖ ﺧﻮﺍﻧﻨﺪﻩ ﺷﻨﺎﺧﺖ ﻣﻨﺎﺳﺒﻲ
ﺍﺯ ﺯﺑﺎﻥ ﻓﺎﺭﺳﻲ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﻣﻮﻓﻘﻴﺖ ﺁﻣﻴﺰ ﺩﻭ ﺩﺳﺘــﮕﺎﻩ ﺩﺭ ﺷــــﺒﮑﻪ
ﻣﻲ ﺑﺎﻳﺴﺖ ﻫﺮ ﺩﻭ ﺩﺳﺘﮕﺎﻩ ﺍﺯ ﻳﮏ ﭘﺮﻭﺗﮑﻞ ﻣﺸﺎﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ.
ﺍﺻﻄﻼﺣﺎﺕ ﺍﺗﺮﻧﺖ
ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﺍﺯ ﻣﺠﻤﻮﻋﻪ ﻗﻮﺍﻧﻴﻦ ﻣﺤﺪﻭﺩﻱ ﺑﻪ ﻣﻨﻈﻮﺭ ﻗﺎﻧﻮﻧﻤﻨﺪ ﮐﺮﺩﻥ ﻋﻤﻠﻴﺎﺕ
ﺍﺳﺎﺳﻲ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺷﻨﺎﺧﺖ ﻣﻨﺎﺳﺐ ﻗﻮﺍﻧﻴﻦ ﻣﻮﺟﻮﺩ ﻻﺯﻡ ﺍﺳﺖ ﮐﻪ
ﺑﺎ ﺑﺮﺧﻲ ﺍﺯ ﺍﺻﻄﻼﺣﺎﺕ ﻣﺮﺑﻮﻃﻪ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﺑﻴﺸﺘﺮ ﺁﺷﻨﺎ ﺷﻮﻳﻢ:
229
) Mediumﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ( .ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺍﺗﺮﻧﺖ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺑﻪ •
ﻳﮏ ﺳﻴﮕﻨﺎﻝ ﺍﺗﺮﻧﺖ ﺑﺮ ﺭﻭﻱ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺑﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﮔﺮﻩ ﻫﺎﻱ ﻣﺘﺼﻞ ﺷﺪﻩ ﺩﺭ ﻣﺤﻴﻂ
ﺍﻧﺘﻘﺎﻝ ﺧﻮﺍﻫﺪ ﺭﺳﻴﺪ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﺸﺨﺺ ﺷﺪﻥ ﺁﺩﺭﺱ ﻣﻘﺼﺪ ،ﺑﻪ ﻣﻨﻈﻮﺭﺩﺭﻳﺎﻓﺖ ﭘﻴﺎﻡ ﻧﻘﺸﻲ
230
ﺣﻴﺎﺗﻲ ﺩﺍﺭﺩ .ﻣﺜﻼ" ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ) Bﺷﮑﻞ ﺑﺎﻻ( ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﺮﺍﻱ ﭼﺎﭘﮕﺮ C
ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ Aﻭ Dﻧﻴﺰ ﻓﺮﻳﻢ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻭ ﺁﻥ ﺭﺍ ﺑﺮﺭﺳﻲ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ.
ﻫﺮ ﺍﻳﺴﺘﮕﺎﻩ ﺯﻣﺎﻧﻴﮑﻪ ﻓﺮﻳﻢ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻣﻲ ﺩﺍﺭﺩ ،ﺁﺩﺭﺱ ﺁﻥ ﺭﺍ ﺑﺮﺭﺳﻲ ﺗﺎ ﻣﻄﻤﺌﻦ ﮔﺮﺩﺩ ﮐﻪ
ﭘﻴﺎﻡ ﺑﺮﺍﻱ ﻭﻱ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺍﺳﺖ ﻳﺎ ﺧﻴﺮ؟ ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﭘﻴﺎﻡ ﺑﺮﺍﻱ ﺍﻳﺴﺘﮕﺎﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺭﺳﺎﻝ
ﻧﺸﺪﻩ ﺑﺎﺷﺪ ،ﺍﻳﺴﺘﮕﺎﻩ ﻓﺮﻳﻢ ﺭﺍ ﺑﺪﻭﻥ ﺑﺮﺭﺳﻲ ﻣﺤﺘﻮﻳﺎﺕ ﺁﻥ ﮐﻨﺎﺭﺧﻮﺍﻫﺪﮔـــﺬﺍﺷﺖ)ﻋﺪﻡ
ﺍﺳﺘﻔﺎﺩﻩ (.
ﻳﮑﻲ ﺍﺯ ﻧﮑﺎﺕ ﻗﺎﺑﻞ ﺗﻮﺟﻪ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺁﺩﺭﺱ ﺩﻫﻲ ﺍﺗﺮﻧﺖ ،ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻳﮏ ﺁﺩﺭﺱ
Broadcastﺍﺳﺖ .ﺯﻣﺎﻧﻴﮑﻪ ﺁﺩﺭﺱ ﻣﻘﺼﺪ ﻳﮏ ﻓﺮﻳﻢ ﺍﺯ ﻧﻮﻉ Broadcastﺑﺎﺷﺪ ،ﺗﻤﺎﻡ
ﮔﺮﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺁﻥ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻭ ﭘﺮﺩﺍﺯﺵ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ.
CSMA/CD
ﺗﮑﻨﻮﻟﻮﮊﻱ carrier-sense multiple access with collision( CSMA/CD
( detectionﻣﺴﺌﻮﻟﻴﺖ ﺗﺸﺮﻳﺢ ﻭ ﺗﻨﻈﻴﻢ ﻧﺤﻮﻩ ﺍﺭﺗﺒﺎﻁ ﮔﺮﻩ ﻫﺎ ﺑﺎ ﻳﮑﺪﻳﮕﺮﺭﺍ ﺑﺮﻋﻬﺪﻩ
ﺩﺍﺭﺩ .ﺑﺎ ﺍﻳﻨﮑﻪ ﻭﺍﮊﻩ ﻓﻮﻕ ﭘﻴﭽﻴﺪﻩ ﺑﻨﻈﺮ ﻣﻲ ﺁﻳﺪ ﻭﻟﻲ ﺑﺎ ﺗﻘﺴﻴﻢ ﻧﻤﻮﺩﻥ ﻭﺍﮊﻩ ﻓﻮﻕ ﺑﻪ ﺑﺨﺶ ﻫﺎﻱ
ﮐﻮﭼﮑﺘﺮ ،ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﻧﻘﺶ ﻫﺮ ﻳﮏ ﺍﺯ ﺁﻧﻬﺎ ﺳﺮﻳﻌﺘﺮ ﺁﺷﻨﺎ ﮔﺮﺩﻳﺪ.
ﺑﻪ ﻣﻨﻈﻮﺭ ﺷﻨﺎﺧﺖ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﻣﺜﺎﻝ ﺯﻳﺮ ﺭﺍ ﺩﻧﺒﺎﻝ ﻣﻲ ﻧﻤﺎﺋﻴﻢ.
ﻓﺮﺽ ﮐﻨﻴﺪ ﺳﮕﻤﻨﺖ ﺍﺗﺮﻧﺖ ،ﻣﺸﺎﺑﻪ ﻳﮏ ﻣﻴﺰ ﻧﺎﻫﺎﺭﺧﻮﺭﻱ ﺑﺎﺷﺪ .ﭼﻨﺪﻳﻦ ﻧﻔﺮ )ﻧﻈﻴﺮ ﮔﺮﻩ(
ﺩﻭﺭ ﺗﺎ ﺩﻭﺭ ﻣﻴﺰ ﻧﺸﺴﺘﻪ ﻭ ﺑﻪ ﮔﻔﺘﮕﻮ ﻣﺸﻐﻮﻝ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻭﺍﮊﻩ multiple access
)ﺩﺳﺘﻴﺎﺑﻲ ﭼﻨﺪﮔﺎﻧﻪ( ﺑﺪﻳﻦ ﻣﻔﻬﻮﻡ ﺍﺳﺖ ﮐﻪ :ﺯﻣﺎﻧﻴﮑﻪ ﻳﮏ ﺍﻳﺴﺘﮕﺎﻩ ﺍﺗﺮﻧﺖ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺍﺭﺳﺎﻝ
ﻣﻲ ﺩﺍﺭﺩ ﺗﻤﺎﻡ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﺩﻳﮕﺮ ﻣﻮﺟﻮﺩ ) ﻣﺘﺼﻞ ( ﺩﺭ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ،ﻧﻴﺰ ﺍﺯ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ
ﺁﮔﺎﻩ ﺧﻮﺍﻫﻨﺪ ﺷﺪ.).ﻧﻈﻴﺮ ﺻﺤﺒﺖ ﮐﺮﺩﻥ ﻳﮏ ﻧﻔﺮ ﺩﺭ ﻣﻴﺰ ﻧﺎﻫﺎﺭ ﺧﻮﺭﻱ ﻭ ﮔﻮﺵ ﺩﺍﺩﻥ ﺳﺎﻳﺮﻳﻦ
( .ﻓﺮﺽ ﮐﻨﻴﺪ ﮐﻪ ﺷﻤﺎ ﻧﻴﺰ ﺑﺮ ﺭﻭﻱ ﻳﮑﻲ ﺍﺯ ﺻﻨﺪﻟﻲ ﻫﺎﻱ ﻣﻴﺰ ﻧﺎﻫﺎﺭ ﺧﻮﺭﻱ ﻧﺸﺴﺘﻪ ﻭ ﻗﺼﺪ
ﺣﺮﻑ ﺯﺩﻥ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ،ﺩﺭ ﻫﻤﺎﻥ ﺯﻣﺎﻥ ﻓﺮﺩ ﺩﻳﮕﺮﻱ ﺩﺭ ﺣﺎﻝ ﺳﺨﻦ ﮔﻔﺘﻦ ﺍﺳﺖ ﺩﺭ ﺍﻳﻦ
ﺣﺎﻟﺖ ﻣﻲ ﺑﺎﻳﺴﺖ ﺷﻤﺎ ﺩﺭ ﺍﻧﺘﻈﺎﺭ ﺍﺗﻤﺎﻡ ﺳﺨﻨﺎﻥ ﮔﻮﻳﻨﺪﻩ ﺑﺎﺷﻴﺪ .ﺩﺭ ﭘﺮﻭﺗﮑﻞ ﺍﺗﺮﻧﺖ ﻭﺿﻌﻴﺖ
ﻓﻮﻕ carrier senseﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ.ﻗﺒﻞ ﺍﺯ ﺍﻳﻨﮑﻪ ﺍﻳﺴﺘﮕﺎﻫﻲ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ
231
ﺑﺎﺷﺪ ﻣﻲ ﺑﺎﻳﺴﺖ ﮔﻮﺵ ﺧﻮﺩ ﺭﺍ ﺑﺮ ﺭﻭﻱ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﮔﺬﺍﺷﺘﻪ ﻭ ﺑﺮﺭﺳﻲ ﻧﻤﺎﻳﺪ ﮐﻪ ﺁﻳﺎ ﻣﺤﻴﻂ
ﺍﻧﺘﻘﺎﻝ ﺁﺯﺍﺩ ﺍﺳﺖ؟ ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺻﺪﺍﺋﻲ ﺍﺯ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺑﻪ ﮔﻮﺵ ﺍﻳﺴﺘﮕﺎﻩ ﻣﺘﻘﺎﺿﻲ ﺍﺭﺳﺎﻝ
ﺍﻃﻼﻋﺎﺕ ﻧﺮﺳﺪ ،ﺍﻳﺴﺘﮕﺎﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﻗﺎﺩﺭ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﻭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ
ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
access Carrier-sense multipleﺷــﺮﻭﻉ ﻳﮏ ﮔﻔﺘﮕﻮ ﺭﺍ ﻗﺎﻧﻮﻧﻤﻨﺪ ﻭ ﺗﻨﻈــﻴﻢ
ﻣﻲ ﻧﻤﺎﻳﺪ ﻭﻟﻲ ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﻳﮏ ﻧﮑﺘﻪ ﺩﻳﮕﺮ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﮐﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺮﺍﻱ ﺁﻥ ﻧﻴﺰ
ﺭﺍﻫﮑﺎﺭﻱ ﺍﺗﺨﺎﺫ ﺷﻮﺩ.ﻓﺮﺽ ﮐﻨﻴﺪ ﺩﺭ ﻣﺜﺎﻝ ﻣﻴﺰ ﻧﺎﻫﺎﺭ ﺧﻮﺭﻱ ﺩﺭ ﻳﮏ ﻟﺤﻈﻪ ﺳﮑﻮﺗﻲ ﺣﺎﮐﻢ
ﺷﻮﺩ ﻭ ﺩﻭ ﻧﻔﺮ ﻧﻴﺰ ﻗﺼﺪ ﺣﺮﻑ ﺯﺩﻥ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ.ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﺩﺭ ﻳﮏ ﻟﺤﻈﻪ ﺳﮑﻮﺕ
ﻣﻮﺟﻮﺩ ﺗﻮﺳﻂ ﺩﻭ ﻧﻔﺮ ﺗﺸﺨﻴﺺ ﻭ ﺑﻼﻓﺎﺻﻠﻪ ﻫﺮ ﺩﻭ ﺗﻘﺮﻳﺒﺎ" ﺩﺭ ﻳﮏ ﺯﻣﺎﻥ ﻳﮑﺴﺎﻥ ﺷﺮﻭﻉ
ﺑﻪ ﺣﺮﻑ ﺯﺩﻥ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.ﭼﻪ ﺍﺗﻔﺎﻗﻲ ﺧﻮﺍﻫﺪ ﺍﻓﺘﺎﺩ؟ ﺩﺭ ﺍﺗﺮﻧﺖ ﭘﺪﻳﺪﻩ ﻓﻮﻕ ﺭﺍ ﺗﺼﺎﺩﻡ
) (Collisionﻣﻲ ﮔﻮﻳﻨﺪ ﻭ ﺯﻣﺎﻧﻲ ﺍﺗﻔﺎﻕ ﺧﻮﺍﻫﺪ ﺍﻓﺘﺎﺩ ﮐﻪ ﺩﻭ ﺍﻳﺴﺘﮕﺎﻩ ﻗﺼﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﻭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﺼﻮﺭﺕ ﻫﻤﺰﻣﺎﻥ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ .ﺩﺭ ﮔﻔﺘﮕﻮﻱ ﺍﻧﺴﺎﻥ ﻫﺎ،
ﻣﺸﮑﻞ ﻓﻮﻕ ﺭﺍ ﻣﻲ ﺗﻮﺍﻥ ﺑﺼﻮﺭﺕ ﮐﺎﻣﻼ" ﺩﻭﺳﺘﺎﻧﻪ ﺣﻞ ﻧﻤﻮﺩ .ﻣﺎ ﺳﮑﻮﺕ ﺧﻮﺍﻫﻴﻢ ﮐﺮﺩ ﺗﺎ ﺍﻳﻦ
ﺷﺎﻧﺲ ﺑﻪ ﺳﺎﻳﺮﻳﻦ ﺑﺮﺍﻱ ﺣﺮﻑ ﺯﺩﻥ ﺩﺍﺩﻩ ﺷﻮﺩ .ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﺩﺭ ﺯﻣﺎﻥ ﺣﺮﻑ ﺯﺩﻥ ﻣﻦ،
ﺩﻳﮕﺮﺍﻥ ﺍﻳﻦ ﻓﺮﺻﺖ ﺭﺍ ﺑﺮﺍﻱ ﻣﻦ ﺍﻳﺠﺎﺩ ﮐﺮﺩﻩ ﺑﻮﺩﻧﺪ! ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﺍﺗﺮﻧﺖ ﺯﻣﺎﻧﻴﮑﻪ ﻗﺼﺪ
ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ،ﺑﻪ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﮔﻮﺵ ﻓﺮﺍ ﺩﺍﺩﻩ ﺗﺎ ﺑﻪ ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ ﺑﺮﺳﻨﺪ
ﮐﻪ ﺗﻨﻬﺎ ﺍﻳﺴﺘﮕﺎﻩ ﻣﻮﺟﻮﺩ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ
ﺍﺭﺳﺎﻝ ﮐﻨﻨﺪﻩ ﺍﻃﻼﻋﺎﺕ ﻣﺘﻮﺟﻪ ﻧﻘﺺ ﺩﺭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺧﻮﺩ ﮔﺮﺩﻧﺪ ،ﺍﺯ ﺑﺮﻭﺯ ﻳﮏ ﺗﺼﺎﺩﻡ
ﺩﺭ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺁﮔﺎﻩ ﺧﻮﺍﻫﻨﺪ ﮔﺮﺩﻳﺪ .ﺩﺭ ﺯﻣﺎﻥ ﺑﺮﻭﺯ ﺗﺼﺎﺩﻡ ،ﻫﺮ ﻳﮏ ﺍﺯ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ
ﻣﺮﺑﻮﻃﻪ ﺑﻪ ﻣﺪﺕ ﺯﻣﺎﻧﻲ ﮐﺎﻣﻼ" ﺗﺼﺎﺩﻓﻲ ﺩﺭ ﺣﺎﻟﺖ ﺍﻧﺘﻈﺎﺭ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﻭ ﭘﺲ ﺍﺯ ﺍﺗﻤﺎﻡ ﺯﻣﺎﻥ
ﺍﻧﺘﻈﺎﺭ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺷﺮﻁ ﺁﺯﺍﺩ ﺑﻮﺩﻥ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺭﺍ ﺑﺮﺭﺳﻲ ﻧﻤﺎﻳﻨﺪ!
ﺗﻮﻗﻒ ﺗﺼﺎﺩﻓﻲ ﻭ ﺗﻼﺵ ﻣﺠﺪﺩ ﻳﮑﻲ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﺑﺨﺶ ﻫﺎﻱ ﭘﺮﻭﺗﮑﻞ ﺍﺳﺖ.
232
ﻣﺤﺪﻭﺩﻳﺖ ﻫﺎﻱ ﺍﺗﺮﻧﺖ
ﻳﮏ ﺷﺒﮑﻪ ﺍﺗﺮﻧﺖ ﺩﺍﺭﺍﻱ ﻣﺤﺪﻭﺩﻳﺖ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺍﺯ ﺍﺑﻌﺎﺩ ﮔﻮﻧﺎﮔﻮﻥ )ﺑﮑﺎﺭﮔﻴﺮﻱ
ﺗﺠﻬﻴﺰﺍﺕ ( ﺍﺳﺖ .ﻃﻮﻝ ﮐﺎﺑﻠﻲ ﮐﻪ ﺗﻤﺎﻡ ﺍﻳﺴﺘﮕﺎﻫﻬﺎ ﺑﺼﻮﺭﺕ ﺍﺷﺘﺮﺍﮐﻲ ﺍﺯ ﺁﻥ ﺑﻪ ﻋﻨﻮﺍﻥ ﻣﺤﻴﻂ
ﺍﻧﺘﻘﺎﻝ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ﻳﮑﻲ ﺍﺯ ﺷﺎﺧﺺ ﺗﺮﻳﻦ ﻣﻮﺍﺭﺩ ﺩﺭ ﺍﻳﻦ ﺯﻣﻨﻴﻪ ﺍﺳﺖ .ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ
ﺍﻟﮑﺘﺮﻳﮑﻲ ﺩﺭ ﻃﻮﻝ ﮐﺎﺑﻞ ﺑﺴﺮﻋﺖ ﻣﻨﺘﺸﺮ ﻣﻲ ﮔﺮﺩﻧﺪ .ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﻃﻲ ﻣﺴﺎﻓﺘﻲ ،ﺳﻴﮕﻨﺎﻝ ﻫﺎ
ﺿﻌﻴﻒ ﻣﻲ ﮔﺮﺩﻧﺪ .ﻭﭼﻮﺩ ﻣﻴﺪﺍﻥ ﻫﺎﻱ ﺍﻟﮑﺘﺮﻳﮑﻲ ﮐﻪ ﺗﻮﺳﻂ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﺠﺎﻭﺭ ﮐﺎﺑﻞ
ﻧﻈﻴﺮﻻﻣﭗ ﻫﺎﻱ ﻓﻠﻮﺭﺳﻨﺖ ﺍﻳﺠﺎﺩ ﻣﻲ ﮔﺮﺩﺩ ،ﺑﺎﻋﺚ ﺗﻠﻒ ﺷﺪﻥ ﺳﻴﮕﻨﺎﻝ ﻣﻲ ﮔﺮﺩﺩ .ﻃﻮﻝ
ﮐﺎﺑﻞ ﺷﺒﮑﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﮐﻮﺗﺎﻩ ﺑﻮﺩﻩ ﺗﺎ ﺍﻣﮑﺎﻥ ﺩﺭﻳﺎﻓﺖ ﺳﻴﮕﻨﺎﻝ ﺗﻮﺳﻂ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ
ﺩﻭ ﻧﻘﻄﻪ ﺍﺑﺘﺪﺍﺋﻲ ﻭ ﺍﻧﺘﻬﺎﺋﻲ ﮐﺎﺑﻞ ﺑﺼﻮﺭﺕ ﺷﻔﺎﻑ ﻭ ﺑﺎ ﺣﺪﺍﻗﻞ ﺗﺎﺧﻴﺮ ﺯﻣﺎﻧﻲ ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ.
ﻫﻤﻴﻦ ﺍﻣﺮ ﺑﺎﻋﺚ ﺑﺮﻭﺯ ﻣﺤﺪﻭﺩﻳﺖ ﺩﺭ ﻃﻮﻝ ﮐﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ،ﻣﻲ ﮔﺮﺩﺩ.
ﭘﺮﻭﺗﮑﻞ CSMA/CDﺍﻣﮑﺎﻥ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻱ ﺻﺮﻓﺎ" ﻳﮏ ﺩﺳﺘﮕﺎﻩ ﺭﺍ ﺩﺭ ﻫﺮ ﻟﺤﻈﻪ
ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﺤﺪﻭﺩﻳﺖ ﻫﺎﺋﻲ ﺍﺯ ﻟﺤﺎﻅ ﺗﻌﺪﺍﺩ ﺩﺳﺘﮕﺎﻫﻬﺎﺋﻲ ﮐﻪ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺑﺮ
ﺭﻭﻱ ﻳﮏ ﺷﺒﮑﻪ ﻣﺠﺰﺍ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ،ﻧﻴﺰ ﺑﻮﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺁﻣﺪ .ﺑﺎ ﺍﺗﺼﺎﻝ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ
ﻣﺘﻌﺪﺩ )ﻓﺮﺍﻭﺍﻥ ( ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺳﮕﻤﻨﺖ ﻣﺸﺘﺮﮎ ،ﺷﺎﻧﺲ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺑﺮﺍﻱ ﻫﺮ
ﻳﮏ ﺍﺯ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺳﮕﻤﻨﺖ ﮐﺎﻫﺶ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ﻫﺮ
ﺩﺳﺘﮕﺎﻩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻣﻲ ﺑﺎﻳﺴﺖ ﻣﺪﺕ ﺯﻣﺎﻥ ﺯﻳﺎﺩﻱ ﺭﺍ ﺩﺭ ﺍﻧﺘﻈﺎﺭ ﺳﭙﺮﻱ ﻧﻤﺎﻳﺪ.
ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ ﺗﺠﻬﻴﺰﺍﺕ ﺷﺒﮑﻪ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺭﺍ ﺑﻪ ﻣﻨﻈﻮﺭ ﻏﻠﺒﻪ ﺑﺮ ﻣﺸﮑﻼﺕ ﻭ
ﻣﺤﺪﻭﺩﻳﺖ ﮔﻔﺘﻪ ﺷﺪﻩ ،ﻃﺮﺍﺣﻲ ﻭ ﻋﺮﺿﻪ ﻧﻤﻮﺩﻩ ﺍﻧﺪ .ﺍﻏﻠﺐ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻓﻮﻕ ﻣﺨﺘﺺ ﺷﺒﮑﻪ
ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﻧﺒﻮﺩﻩ ﻭﻟﻲ ﺩﺭ ﺳﺎﻳﺮ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﺮﺗﺒﻂ ﺑﺎ ﺷﺒﮑﻪ ﻧﻘﺶ ﻣﻬﻤﻲ ﺭﺍ ﺍﻳﻔﺎﺀ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﺗﮑﺮﺍﺭﮐﻨﻨﺪﻩ )(Repeater
ﺍﻭﻟﻴﻦ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﮐﺎﺑﻞ ﻫﺎﻱ ﻣﺴﻲ ﮐﻮﺍﮐﺴﻴﺎﻝ ﺑﻮﺩ
ﮐﻪ ) Thicknetﺿﺨﻴﻢ( ﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﻧﺪ .ﺣﺪﺍﮐﺜﺮ ﻃﻮﻝ ﻳﮏ ﮐﺎﺑﻞ ﺿﺨﻴﻢ ٥٠٠ﻣﺘﺮ ﺍﺳﺖ
.ﺩﺭ ﻳﮏ ﺳﺎﺧﺘﻤﺎﻥ ﺑﺰﺭﮒ ،ﮐﺎﺑﻞ ٥٠٠ﻣﺘﺮﻱ ﺟﻮﺍﺑﮕﻮﻱ ﺗﻤﺎﻣﻲ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﺷﺒﮑﻪ ﻧﺨﻮﺍﻫﺪ
233
ﺑﻮﺩ .ﺗﮑﺮﺍﺭ ﮐﻨﻨﺪﻩ ﻫﺎ ﺑﺎ ﻫﺪﻑ ﺣﻞ ﻣﺸﮑﻞ ﻓﻮﻕ ،ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﻧﺪ . .ﺗﮑﺮﺍﺭﮐﻨﻨﺪﻩ ﻫﺎ ،ﺳﮕﻤﻨﺖ
ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﻳﮏ ﺷﺒﮑﻪ ﺍﺗﺮﻧﺖ ﺭﺍ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮐﻨﻨﺪ .ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ﺗﮑﺮﺍﺭﮐﻨﻨﺪﻩ
ﺳﻴﮕﻨﺎﻝ ﻭﺭﻭﺩﻱ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﻳﮏ ﺳﮕﻤﻨﺖ ﺍﺧﺬ ﻭ ﺑﺎ ﺗﻘﻮﻳﺖ ﺳﻴﮕﻨﺎﻝ ﺁﻥ ﺭﺍ ﺑﺮﺍﻱ ﺳﮕﻤﻨﺖ
ﺑﻌﺪﻱ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺑﺪﻳﻦ ﺗﺰﺗﻴﺐ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭼﻨﺪﻳﻦ ﺗﮑﺮﺍﺭ ﮐﻨﻨﺪﻩ ﻭ ﺍﺗﺼﺎﻝ ﮐﺎﺑﻞ
ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺗﻮﺳﻂ ﺁﻧﺎﻥ ،ﻣﻲ ﺗﻮﺍﻥ ﻗﻄﺮ ﻳﮏ ﺷﺒﮑﻪ ﺭﺍ ﺍﻓﺰﺍﻳﺶ ﺩﺍﺩ ) .ﻗﻄﺮ ﺷﺒﮑﻪ ﺑﻪ ﺣﺪﺍﮐﺜﺮ
ﻣﺴﺎﻓﺖ ﻣﻮﺟﻮﺩ ﺑﻴﻦ ﺩﻭ ﺩﺳﺘﮕﺎﻩ ﻣﺘﻤﺎﻳﺰ ﺩﺭ ﺷﺒﮑﻪ ﺍﻃﻼﻕ ﻣﻲ ﮔﺮﺩﺩ(
Bridgesﻭ ﺳﮕﻤﻨﺖ
ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺭﺷﺪ )ﺑﺰﺭﮒ ﺷﺪﻥ( ﺩﭼﺎﺭ ﻣﺸﮑﻞ ﺗﺮﺍﮐﻢ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺩﺭ
ﺻﻮﺭﺗﻲ ﮐﻪ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺍﻳﺴﺘﮕﺎﻩ ﺑﻪ ﻳﮏ ﺳﮕﻤﻨﺖ ﻣﺘﺼﻞ ﮔﺮﺩﻧﺪ ،ﻫﺮ ﻳﮏ ﺩﺍﺭﺍﻱ ﺗﺮﺍﻓﻴﮏ
ﺧﺎﺹ ﺧﻮﺩ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺩﺭ ﺷﺮﺍﻳﻂ ﻓﻮﻕ ،ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻣﺘﻌﺪﺩﻱ ﻗﺼﺪ ﺍﺭﺳﺎﻝ ﺍﻃﻼ ﻋﺎﺕ
ﺭﺍ ﺩﺍﺭﻧﺪ ﻭﻟﻲ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺎﻫﻴﺖ ﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎ ﺩﺭ ﻫﺮ ﻟﺤﻈﻪ ﻳﮏ ﺍﻳﺴﺘﮕﺎﻩ ﺷﺎﻧﺲ ﻭ
ﻓﺮﺻﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺭﺍ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺩﺭ ﭼﻨﻴﻦ ﻭﺿﻌﻴﺘﻲ ﺗﻌﺪﺍﺩ ﺗﺼﺎﺩﻡ ﺩﺭ
ﺷﺒﮑﻪ ﺍﻓﺰﺍﻳﺶ ﻳﺎﻓﺘﻪ ﻭ ﻋﻤﻼ" ﮐﺎﺭﺁﺋﻲ ﺷﺒﮑﻪ ﺍﻓﺖ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﻳﮑﻲ ﺍﺯ ﺭﺍﻩ ﺣﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ
ﺑﻪ ﻣﻨﻈﻮﺭ ﺑﺮﻃﺮﻑ ﻧﻤﻮﺩﻥ ﻣﺸﮑﻞ ﺗﺮﺍﮐﻢ ﺩﺭ ﺷﺒﮑﻪ ﺗﻘﺴﻴﻢ ﻳﮏ ﺳﮕﻤﻨﺖ ﺑﻪ ﭼﻨﺪﻳﻦ ﺳﮕﻤﻨﺖ
ﺍﺳﺖ .ﺑﺎ ﺍﻳﻦ ﮐﺎﺭ ﺑﺮﺍﻱ ﺗﺼﺎﺩﻡ ﻫﺎﺋﻲ ﮐﻪ ﺩﺭ ﺷﺒﮑﻪ ﺑﺮﻭﺯ ﺧﻮﺍﻫﺪ ﮐﺮﺩ ،ﺩﺍﻣﻨﻪ ﻭﺳﻴﻌﺘﺮﻱ ﺍﻳﺠﺎﺩ
ﻣﻲ ﮔﺮﺩﺩ.ﺭﺍﻩ ﺣﻞ ﻓﻮﻕ ﺑﺎﻋﺚ ﺑﺮﻭﺯ ﻳﮏ ﻣﺸﮑﻞ ﺩﻳﮕﺮ ﻣﻲ ﮔﺮﺩﺩ :ﺳﮕﻤﻨﺖ ﻫﺎ ﻗﺎﺩﺭ ﺑﻪ
ﺍﺷﺘﺮﺍﮎ ﺍﻃﻼﻋﺎﺕ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻧﺨﻮﺍﻫﻨﺪ ﺑﻮﺩ.
ﺑﻪ ﻣﻨﻈﻮﺭ ﺣﻞ ﻣﺸﮑﻞ ﻓﻮﻕ Bridges ،ﺩﺭ ﺷﺒﮑﻪ ﺍﺗﺮﻧﺖ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺷﺪﻩ ﺍﺳﺖ Bridge .
ﺩﻭ ﻭ ﻳﺎ ﭼﻨﺪﻳﻦ ﺳﮕﻤﻨﺖ ﺭﺍ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺩﺳﺘﮕﺎﻩ ﻓﻮﻕ
ﺑﺎﻋﺚ ﺍﻓﺰﺍﻳﺶ ﻗﻄﺮ ﺷﺒﮑﻪ ﺧﻮﺍﻫﺪ ﺷﺪ .ﻋﻤﻠﮑﺮﺩ Bridgeﺍﺯ ﺑﻌﺪ ﺍﻓﺰﺍﻳﺶ ﻗﻄﺮ ﺷﺒﮑﻪ ﻧﻈﻴﺮ
ﺗﮑﺮﺍﺭﮐﻨﻨﺪﻩ ﺍﺳﺖ ،ﺑﺎ ﺍﻳﻦ ﻧﻔﺎﻭﺕ ﮐﻪ Bridgeﻗﺎﺩﺭ ﺑﻪ ﺍﻳﺠﺎﺩ ﻧﻈﻢ ﺩﺭ ﺗﺮﺍﻓﻴﮏ ﺷﺒﮑﻪ ﻧﻴﺰ
ﺧﻮﺍﻫﺪ ﺑﻮﺩ Bridge .ﻧﻈﻴﺮ ﺳﺎﻳﺮ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ
ﺍﻃﻼﻋﺎﺕ ﺑﻮﺩﻩ ﻭﻟﻲ ﻋﻤﻠﮑﺮﺩ ﺁﻧﻬﺎ ﺩﻗﻴﻘﺎ" ﻣﺸﺎﺑﻪ ﻳﮏ ﺍﻳﺴﺘﮕﺎﻩ ﻧﻤﻲ ﺑﺎﺷﺪ Bridge .ﻗﺎﺩﺭ ﺑﻪ
234
ﺍﻳﺠﺎﺩ ﺗﺮﺍﻓﻴﮑﻲ ﮐﻪ ﺧﻮﺩ ﺳﺮﭼﺸﻤﻪ ﺁﻥ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ،ﻧﻴﺴﺖ ) ﻧﻈﻴﺮ ﺗﮑﺮﺍﺭﮐﻨﻨﺪﻩ ( Bridge.
ﺻﺮﻓﺎ" ﭼﻴﺰﻱ ﺭﺍ ﮐﻪ ﺍﺯ ﺳﺎﻳﺮ ﺍﻳﺴﺘﮕﺎﻫﻬﺎ ﻣﻲ ﺷﻨﻮﺩ ،ﻣﻨﻌﮑﺲ ﻣﻲ ﻧﻤﺎﻳﺪ Bridge ) .ﻗﺎﺩﺭ ﺑﻪ
ﺍﻳﺠﺎ ﺩ ﻳﮏ ﻧﻮﻉ ﻓــﺮﻳﻢ ﺧﺎﺹ ﺍﺗﺮﻧﺖ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳـــﺠﺎﺩ ﺍﺭﻧﺒـﺎﻁ ﺑﺎ ﺳــﺎﻳﺮ Bridgeﻫﺎ
ﻣﻲ ﺑﺎﺷﻨﺪ (.
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﻗﺒﻼ" ﺍﺷﺎﺭﻩ ﮔﺮﺩﻳﺪ ﻫﺮ ﺍﻳﺴﺘﮕﺎﻩ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺗﻤﺎﻡ ﻓﺮﻳﻢ ﻫﺎﻱ ﺍﺭﺳﺎﻝ ﺷﺪﻩ
ﺑﺮ ﺭﻭﻱ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻣﻲ ﻧﻤﺎﻳﺪ).ﺻﺮﻓﻨﻈﺮ ﺍﺯﺍﻳﻨﮑﻪ ﻣﻘﺼﺪ ﻓﺮﻳﻢ ﻫﻤﺎﻥ ﺍﻳﺴﺘﮕﺎﻩ
ﺑﺎﺷﺪ ﻭ ﻳﺎ ﻧﺒﺎﺷﺪ Bridge (.ﺑﺎ ﺗﺎﮐﻴﺪ ﺑﺮ ﻭﻳﮋﮔﻲ ﻓﻮﻕ ﺳﻌﻲ ﺑﺮ ﺗﻨﻈﻴﻢ ﺗﺮﺍﻓﻴﮏ ﺑﻴﻦ ﺳﮕﻤﻨﺖ
ﻫﺎ ﺩﺍﺭﺩ.
235
ﺑﺎ ﺍﺭﺳﺎﻝ ﻭ ﻫﺪﺍﻳﺖ ﻓﺮﻳﻢ ﺍﻃﻼﻋﺎﺗﻲ ﺗﻮﺳﻂ Bridgeﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﭼﻬﺎﺭ ﺩﺳﺘﮕﺎﻩ ﻣﻮﺟﻮﺩ ﺩﺭ
ﻣﻲ ﮔﺮﺩﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﮑﺎﻧﻴﺰﻡ ﻓﻴﻠﺘﺮ ﻧﻤﻮﺩﻥ ﻓﺮﻳﻢ ﻫﺎ ﺗﻮﺳﻂ ، Bridgeﺍﻳﻦ ﺷﺒﮑﻪ ﻓﺮﺍﻫﻢ
ﺍﻣﮑﺎﻥ ﺑﻮﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺁﻣﺪ ﮐﻪ ﺍﻳﺴﺘﮕﺎﻩ Aﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﺮﺍﻱ ﺍﻳﺴﺘﮕﺎﻩ Bﺍﺭﺳﺎﻝ ﻭ ﺩﺭ ﻫﻤﺎﻥ
ﻟﺤﻈﻪ ﻧﻴﺰ ﺍﻳﺴﺘﮕﺎﻩ Cﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﺮﺍﻱ ﺍﻳﺴﺘﮕﺎﻩ Dﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﺪ.ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺍﻣﮑﺎﻥ
ﺑﺮﻗﺮﺍﺭﻱ ﺩﻭ ﺍﺭﺗﺒﺎﻁ ﺑﺼﻮﺭﺕ ﻫﻤﺰﻣﺎﻥ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ ﺍﺳﺖ.
ﺭﻭﺗﺮﻫﺎ :ﺳﮕﻤﻨﺖ ﻫﺎﻱ ﻣﻨﻄﻘﻲ
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ Bridgeﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﻫﻤﺰﻣﺎﻥ ﺑﻴﻦ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﭼﻨﺪﻳﻦ
ﺳﮕﻤﻨﺖ ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ Bridge .ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﺮﺍﻓﻴﮏ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺳﮕﻤﻨﺖ ﻋﻤﻠﻴﺎﺕ
ﺧﺎﺻﻲ ﺭﺍ ﺍﻧﺠﺎﻡ ﻧﻤﻲ ﺩﻫﺪ .ﻳﮑﻲ ﺍﺯ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﻣﻬﻢ Bridgeﺍﺭﺳﺎﻟﻲ ﻓﺮﻳﻢ ﻫﺎﻱ
ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﻧﻮﻉ Broadcastﺑﺮﺍﻱ ﺗﻤﺎﻡ ﺳﮕﻤﻨﺖ ﻫﺎﻱ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﺍﺳﺖ.
ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺭﺷﺪ ﺷﺒﮑﻪ ﻭ ﮔﺴﺘﺮﺵ ﺳﮕﻤﻨﺖ ﻫﺎ ،ﻭﻳﮋﮔﻲ ﻓﻮﻕ ﻣﻲ ﺗﻮﺍﻧﺪ ﺳﺒﺐ ﺑﺮﻭﺯ ﻣﺴﺎﺋﻠﻲ
ﺩﺭ ﺷﺒﮑﻪ ﮔﺮﺩﺩ .ﺯﻣﺎﻧﻴﮑﻪ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺍﺯ ﺍﻳﺴﺘﮕﺎﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ
، Bridgeﻓﺮﻳﻢ ﻫﺎﻱ Broadcastﺭﺍ ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﺗﺮﺍﮐﻢ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻮﺟﻮﺩ ﺁﻣﺪﻩ
ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮ ﺍﺯ ﺯﻣﺎﻧﻲ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ﮐﻪ ﺗﻤﺎﻣﻲ ﺩﺳﺘﮕﺎﻫﻬﺎ ﺩﺭ ﻳﮏ ﺳﮕﻤﻨﺖ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ
ﺑﺎﺷﻨﺪ.
ﺭﻭﺗﺮ ﻳﮑﻲ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﭘﻴﺸﺮﻓﺘﻪ ﺩﺭ ﺷﺒﮑﻪ ﺑﻮﺩﻩ ﮐﻪ ﻗﺎﺩﺭ ﺑﻪ ﺗﻘﺴﻴﻢ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ ﭼﻨﺪﻳﻦ
ﺷﺒﮑﻪ ﻣﻨﻄﻘﻲ ﻣﺠﺰﺍ ﺍﺳﺖ .ﺭﻭﺗﺮ ﻫﺎ ﻳﮏ ﻣﺤﺪﻭﺩﻩ ﻣﻨﻄﻘﻲ ﺑﺮﺍﻱ ﻫﺮ ﺷﺒﮑﻪ ﺍﻳﺠﺎﺩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﺭﻭﺗﺮﻫﺎ ﺑﺮ ﺍﺳﺎﺱ ﭘﺮﻭﺗﮑﻞ ﻫﺎﺋﻲ ﮐﻪ ﻣﺴﺘﻘﻞ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﺧﺎﺹ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺍﺳﺖ،
ﻓﻌﺎﻟﻴﺖ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﻭﻳﮋﮔﻲ ﻓﻮﻕ ﺍﻳﻦ ﺍﻣﮑﺎﻥ ﺭﺍ ﺑﺮﺍﻱ ﺭﻭﺗﺮ ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﮐﺮﺩ ﮐﻪ ﭼﻨﺪﻳﻦ
ﺷﺒﮑﻪ ﺑﺎ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺭﺍ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺮﺗﺒﻂ ﻧﻤﺎﻳﺪ .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺗﺮ ﺩﺭ ﺷﺒﮑﻪ
ﻫﺎﻱ ﻣﺤﻠﻲ ﻭ ﮔﺴﺘﺮﺩﻩ ﺍﻣﮑﺎﻥ ﭘﺬﻳﺮﺍﺳﺖ.
236
ﻭﺿﻌﻴﺖ ﻓﻌﻠﻲ ﺍﺗﺮﻧﺖ
ﺍﺯ ﺯﻣﺎﻥ ﻣﻄﺮﺡ ﺷﺪﻥ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﺗﺎﮐﻨﻮﻥ ﺗﻐﻴﻴﺮﺍﺕ ﻓﺮﺍﻭﺍﻧﻲ ﺍﺯ ﺑﻌﺪ ﺗﻨﻮﻉ
ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ .ﺩﺭ ﺍﺑﺘﺪﺍ ﺍﺯ ﮐﺎﺑﻞ ﮐﻮﺍﮐﺴﻴﺎﻝ ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﻳﺪ.ﺍﻣﺮﻭﺯﻩ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺪﺭﻥ ﺍﺗﺮﻧﺖ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ﺑﻬﻢ ﺗﺎﺑﻴﺪﻩ ﻭ ﻳﺎ ﻓﻴﺒﺮ
ﻧﻮﺭﻱ ﺑﺮﺍﻱ ﺍﺗﺼﺎﻝ ﺍﻳﺴﺘﮕﺎﻩ ﻫﺎ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﻭﻟﻴﻪ ﺍﺗﺮﻧﺖ
ﺳﺮﻋﺖ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺑﻮﺩ ﻭﻟﻲ ﺍﻣﺮﻭﺯﻩ ﺍﻳﻦ ﺳﺮﻋﺖ ﺑﻪ ﻣﺮﺯ ١٠٠ﻭ
ﺣﺘﻲ ١٠٠٠ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺭﺳﻴﺪﻩ ﺍﺳﺖ .ﻣﻬﻤﺘﺮﻳﻦ ﺗﺤﻮﻝ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ
ﺍﺗﺮﻧﺖ ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﺍﺳﺖ .ﺳﮕﻤﻨﺖ ﻫﺎ ﺗﻮﺳﻂ ﺳﻮﺋﻴﭻ ﺑﻪ ﻳﮑﺪﻳﮕﺮ
ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ ) .ﻧﻈﻴﺮ Bridgeﺑﺎ ﺍﻳﻦ ﺗﻔﺎﻭﺕ ﻋﻤﺪﻩ ﮐﻪ ﺍﻣﮑﺎﻥ ﺍﺗﺼﺎﻝ ﭼﻨﺪﻳﻦ ﺳﮕﻤﻨﺖ
ﺗﻮﺳﻂ ﺳﻮﺋﻴﭻ ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ( ﺑﺮﺧﻲ ﺍﺯ ﺳﻮﺋﻴﭻ ﻫﺎ ﺍﻣﮑﺎﻥ ﺍﺗﺼﺎﻝ ﺻﺪﻫﺎ ﺳﮕﻤﻨﺖ ﺑﻪ
ﻳﮑﺪﻳﮕﺮ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺗﻤﺎﻡ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ،ﺳﻮﺋﻴﭻ ﻭ ﻳﺎ ﺍﻳﺴﺘﮕﺎﻩ
ﻣﻲ ﺑﺎﺷﻨﺪ .ﻗﺒﻞ ﺍﺯ ﺍﺭﺳﺎﻝ ﻓﺮﻳﻢ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺍ ﻱ ﻫﺮ ﺍﻳﺴﺘﮕﺎﻩ ،ﺳﻮﺋﻴﭻ ﻓﺮﻳﻢ ﻣﻮﺭﺩ ﻧﻈﺮ
ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻭ ﭘﺲ ﺍﺯ ﺑﺮﺭﺳﻲ ،ﺁﻥ ﺭﺍ ﺑﺮﺍﻱ ﺍﻳﺴﺘﮕﺎﻩ ﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﻣﺸﺎﺑﻪ Bridgeﺍﺳﺖ ،ﻭﻟﻲ ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ﻫﺮ ﺳﮕﻤﻨﺖ ﺩﺍﺭﺍﻱ ﺻﺮﻓﺎ" ﻳﮏ
ﺍﻳﺴﺘﮕﺎﻩ ﺍﺳﺖ ﻭ ﻓﺮﻳﻢ ﺻﺮﻓﺎ" ﺑﻪ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﻭﺍﻗﻌﻲ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ
ﺍﻣﮑﺎﻥ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﻫﻤﺰﻣﺎﻥ ﺑﻴﻦ ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺍﻳﺴﺘﮕﺎﻩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﻮﺋــﻴﭻ
ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﻣﻄﺮﺡ ﺷﺪﻥ ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﻣﺴﺌﻠﻪ Full-duplexﻧﻴﺰ ﻣﻄﺮﺡ ﮔﺮﺩﻳﺪFull- .
dulledﻳﮏ ﺍﺻﻄﻼﺡ ﺍﺭﺗﺒﺎﻃﻲ ﺍﺳﺖ ﮐﻪ ﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﻗﺎﺑﻠﻴﺖ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ
ﺑﺼﻮﺭﺕ ﻫﻤﺰﻣﺎﻥ ﺍﺳﺖ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﺍﻭﻟﻴﻪ ﻭﺿﻌﻴﺖ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ
ﺑﺼﻮﺭﺕ ﻳﮑﻄﺮﻓﻪ ) (half-duplexﺑﻮﺩ.ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﻮﺋﻴﭻ ،ﺍﻳﺴﺘﮕﺎﻫﻬﺎ
ﺻﺮﻓﺎ" ﺑﺎ ﺳﻮﺋﻴﭻ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﮐﺮﺩﻩ ﻭ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺗﺒﺎﻁ ﻣﺴﺘﻘﻴﻢ ﺑﺎ ﻳﮑﺪﻳﮕﺮﻧﻤﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺍﻳﻦ
ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ﺑﻬﻢ ﺗﺎﺑﻴﺪﻩ ﻭ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻭﺳﻮﺋﻴﭻ ﻣﺮﺑﻮﻃﻪ ﺩﺍﺭﺍﻱ
ﮐﺎﻧﮑﻨﻮﺭﻫﺎﻱ ﻻﺯﻡ ﺩﺭ ﺍﻳﻦ ﺧﺼﻮﺹ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﻮﺋﻴﭻ ﻋﺎﺭﻱ ﺍﺯ ﺗﺼﺎﺩﻡ
237
ﺑﻮﺩﻩ ﻭ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺗﻮﺳﻂ ﻳﮏ ﺍﻳﺴﺘﮕﺎﻩ ﺑﻪ ﺳﻮﺋﻴﭻ ،ﺍﻣﮑﺎﻥ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ
ﺗﻮﺳﻂ ﺳﻮﺋﻴﭻ ﺑﺮﺍﻱ ﺍﻳﺴﺘﮕﺎﻩ ﺩﻳﮕﺮ ﻧﻴﺰ ﻓﺮﺍﻫﻢ ﺧﻮﺍﻫﺪ ﺷﺪ.
238
ﮔﺬﺍﺷﺘﻪ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺭﻭﺵ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺗﺎﺑﻊ
CSMA/CDﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ ﻭ ﺍﺯ ﺭﻭﺵ passing Tokenﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺭﻭﺵ
ﻓﻮﻕ ﺩﺭ ﺍﺑﺘﺪﺍ ﻳﮏ ) Tokenﻧﻮﻉ ﺧﺎﺻﻲ ﺍﺯ ﻳﮏ ﻓﺮﻳﻢ ﺍﻃﻼﻋﺎﺗﻲ ( ﺍﻳﺠﺎﺩ ﻣﻲ ﮔﺮﺩﺩ.
Tokenﻓﻮﻕ ﺩﺭ ﻃﻮﻝ ﺣﻠﻘﻪ ﻣﻲ ﭼﺮﺧﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﻳﮏ ﺍﻳﺴﺘﮕﺎﻩ ﻗﺼﺪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺭﺍ
ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ Tokenﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﮔﺮﻓﺘﻪ ﻭ ﻓﺮﻳﻢ ﺍﻃﻼﻋﺎﺗﻲ ﺧﻮﺩ ﺭﺍ ﺑﺮ ﺭﻭﻱ
ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺍﺭﺳﺎﻝ ﺩﺍﺭﺩ .ﺯﻣﺎﻧﻴﮑﻪ ﻓﺮﻳﻢ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﻣﺠﺪﺩﺍ" ﺑﻪ ﺍﻳﺴﺘﮕﺎﻩ ﺍﺭﺳﺎﻝ ﮐﻨﻨﺪﻩ
ﺑﺮﮔﺸﺖ ﺩﺍﺩﻩ ﺷﺪ )ﻃﻲ ﻧﻤﻮﺩﻥ ﻣﺴﻴﺮ ﺣﻠﻘﻪ( ،ﺍﻳﺴﺘﮕﺎﻩ ﻓﺮﻳﻢ ﺧﻮﺩ ﺭﺍ ﺣﺬﻑ ﻭ ﻳﮏ Token
ﺟﺪﻳﺪ ﺭﺍ ﺍﻳﺠﺎﺩ ﻭﺁﻥ ﺭﺍ ﺑﺮ ﺭﻭﻱ ﺣﻠﻘﻪ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﮔﺮﻓﺘﻦ Tokenﺷﺮﻁ
ﻻﺯﻡ ﺑﺮﺍ ﻱ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺖ .ﺳﺮﻋﺖ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ﭼﻬﺎﺭ
ﺗﺎ ﺷﺎﻧﺰﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺍﺳﺖ.
ﺍﺗﺮﻧﺖ ﺑﺎ ﻳﮏ ﺭﻭﻧﺪ ﭘﻴﻮﺳﺘﻪ ﻫﻤﭽﻨﺎﻥ ﺑﻪ ﺭﺷﺪ ﺧﻮﺩ ﺍﺩﺍﻣﻪ ﻣﻲ ﺩﻫﺪ .ﭘﺲ ﺍﺯ ﮔﺬﺷﺖ
ﺣﺪﻭﺩ ﺳﻲ ﺳﺎﻝ ﺍﺯﻋﻤﺮ ﺷﺒﮑﻪ ﻫﺎﻱ ﻓﻮﻕ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺍﻳﺠﺎﺩ ﻭ ﺑﺮﺍﻱ ﻋﻤﻮﻡ
ﻣﺘﺨﺼﺼﻴﻦ ﺷﻨﺎﺧﺘﻪ ﺷﺪﻩ ﻫﺴﺘﻨﺪ ﻭ ﻫﻤﻴﻦ ﺍﻣﺮ ﻧﮕﻬﺪﺍﺭﻱ ﻭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﺭﺍ
ﺁﺳﺎﻥ ﻧﻤﻮﺩﻩ ﺍﺳﺖ .ﺍﺗﺮﻧﺖ ﺑﺎ ﺻﻼﺑﺖ ﺑﺴﻤﺖ ﺍﻓﺰﺍﻳﺶ ﺳﺮﻋﺖ ﻭ ﺑﻬﺒﻮﺩ ﮐﺎﺭﺁﺋﻲ ﻭ ﻋﻤﻠﮑﺮﺩ
ﮔﺎﻡ ﺑﺮﻣﻲ ﺩﺍﺭﺩ.
239
NAT
240
) ﺷﺒﮑﻪ ﺧﺼﻮﺻﻲ ( ﺭﻓﺘﺎﺭ ﻧﻤﺎﻳﺪ .ﺍﻳﻦ ﺑﺪﺍﻥ ﻣﻌﻨﻲ ﺍﺳﺖ ﮐﻪ ﺻﺮﻓﺎ" ﻳﮏ IPﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ ﺑﻪ
ﻣﻨﻈﻮﺭ ﻧﻤﺎﻳﺶ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ) ﻳﮏ ﮔﺮﻭﻩ ( ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
ﮐﻢ ﺑﻮﺩﻥ ﺗﻌﺪﺍﺩ IPﺻﺮﻓﺎ" ﻳﮑﻲ ﺍﺯ ﺩﻻﻳﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ NATﺍﺳﺖ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺑﺮﺭﺳﻲ ﻋﻠﻞ
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ NATﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ.
241
ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ ،ﻣﻔﻴﺪ ﻭ ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺳﺖ .ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ﻫﻤﻮﺍﺭﻩ
192.168.32.10ﺑﻪ IP 213.18.123.110ﺗﺮﺟﻤﻪ ﺧﻮﺍﻫﺪ ﺷﺪ. IP
NATﭘﻮﻳﺎ .ﻳﮏ ﺁﺩﺭﺱ IPﻏﻴﺮ ﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ﺭﺍ ﺑﻪ ﻳﮏ IPﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ﺗﺮﺟﻤﻪ •
ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭ ﺗﺮﺟﻤﻪ ﻓﻮﻕ ﺍﺯ ﮔﺮﻭﻫﻲ ﺁﺩﺭﺱ ﻫﺎﻱ IPﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ
ﺧﻮﺍﻫﺪ ﺷﺪ.
. OverLoadingﻣﺪﻝ ﻓﻮﻕ ﺷﮑﻞ ﺧﺎﺻﻲ ﺍﺯ NATﭘﻮﻳﺎ ﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﻣﺪﻝ •
ﺷﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮐﻨﺪ ﮐﻪ ﺗﻮﺳﻂ ﺷﺒﮑﻪ ﺩﻳﮕﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﻧﺪ NAT .ﻣﻲ ﺑﺎﻳﺴﺖ
ﺁﺩﺭﺱ ﻫﺎﻱ ﻓﻮﻕ ﺭﺍ ﺑﻪ ﺁﺩﺭﺱ ﻫﺎﻱ IPﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ﻣﻨﺤﺼﺮﺑﻔﺮﺩ ﺗﺮﺟﻤﻪ ﻧﻤﺎﻳﺪ.
NATﻫﻤﻮﺍﺭﻩ ﺁﺩﺭﺱ ﻫﺎﻱ ﻳﮏ ﺷﺒﮑﻪ ﺧﺼﻮﺻﻲ ﺭﺍ ﺑﻪ ﺁﺩﺭﺱ ﻫﺎﻱ ﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ
ﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ ﺗﺮﺟﻤﻪ ﻣﻲ ﻧﻤﺎﻳﺪ NAT .ﻫﻤﭽﻨﻴﻦ ﺁﺩﺭﺱ ﻫﺎﻱ ﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ﻋﻤﻮﻣﻲ
ﺭﺍ ﺑﻪ ﺁﺩﺭﺱ ﻫﺎﻱ ﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺧﺼﻮﺻﻲ ﺗﺮﺟﻤﻪ ﻣﻲ ﻧﻤﺎﻳﺪ) .ﺩﺭ ﻫﺮ
242
ﺣﺎﻟﺖ ﺧﺮﻭﺟﻲ ، NATﺁﺩﺭﺱ ﻫﺎﻱ IPﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺁﺩﺭﺱ ﻫﺎﻱ
ﻓﻮﻕ ﻣﻲ ﺗﻮﺍﻧﺪ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻋﻤﻮﻣﻲ ﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ﺟﻬﺎﻧﻲ ﺑﺎﺷﻨﺪ ﻭ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ
ﺧﺼﻮﺻﻲ ﺭﻳﺠﺴﺘﺮ ﺷﺪﻩ ﻣﺤﻠﻲ ﺑﺎﺷﻨﺪ (
ﺑﺮﺍﻱ ﺷﺮﮐﺖ ﺷﻤﺎ ﺩﺭ ﻧﻈﺮ ﻣﻲ ﮔﻴﺮﺩ .ﺁﺩﺭﺱ ﻫﺎﻱ ﻓﻮﻕ ﺭﻳﺠﺴﺘﺮ ﻭ ﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ
ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺁﺩﺭﺱ ﻫﺎﻱ ﻓﻮﻕ Inside globalﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﻧﺪ .ﺁﺩﺭﺱ ﻫﺎﻱ
IPﺧﺼﻮﺻﻲ ﻭ ﻏﻴﺮﺭﻳﭽﺴﺘﺮ ﺷﺪﻩ ﺑﻪ ﺩﻭ ﮔﺮﻭﻩ ﻋﻤﺪﻩ ﺗﻘﺴﻴﻢ ﻣﻲ ﮔﺮﺩﻧﺪ :ﻳﮏ ﮔﺮﻭﻩ
ﮐﻮﭼﮏ ﮐﻪ ﺗﻮﺳﻂ NATﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ) (Outside local addressﻭ ﮔﺮﻭﻩ
ﺑﺰﺭﮔﺘﺮﻱ ﮐﻪ ﺗﻮﺳﻂ ﺣﻮﺯﻩ ﻣﺤﻠﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﻨﺪ ﺷﺪ) .(Inside local dress
ﺁﺩﺭﺱ ﻫﺎﻱ Outside localﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺮﺟﻤﻪ ﺑﻪ ﺁﺩﺭﺱ ﻫﺎﻱ ﻣﻨﺤﺼﺮﺑﻔﺮﺩ IP
243
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﻧﺪ .ﺁﺩﺭﺱ ﻫﺎﻱ ﻣﻨـﺤﺼﺮ ﺑﻔﺮﺩ ﻓﻮﻕ outside global ،ﻧﺎﻣﻴﺪﻩ
ﺷﺪﻩ ﻭ ﺍﺧﺘﺼﺎﺹ ﺑﻪ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﻋﻤﻮﻣﻲ ) ﺍﻳﻨﺘﺮﻧﺖ( ﺩﺍﺭﻧﺪ.
ﺍﮐﺜﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺣﻮﺯﻩ ﺩﺍﺧﻠﻲ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ inside •
ﺷﺒﮑﻪ ﺑﺎﺷﻨﺪ ،ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ inside globalﺍﺳﺘﻔﺎﺩﻩ ﻭ ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﻧﻴﺎﺯﻱ ﺑﻪ
ﺗﺮﺟﻤﻪ ﻧﺨﻮﺍﻫﻨﺪ ﺩﺍﺷﺖ.
ﺯﻣﺎﻧﻴﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺟﻮﺩ ﺩﺭ ﺣﻮﺯﻩ ﻣﺤﻠﻲ ﮐﻪ ﺩﺍﺭﺍﻱ ﻳﮏ ﺁﺩﺭﺱ inside local •
ﺍﺳﺖ ،ﻗﺼﺪ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺧﺎﺭﺝ ﺷﺒﮑﻪ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻭﻱ ﺩﺭ
ﺍﺧﺘﻴﺎﺭ NATﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﮔﺮﻓﺖ.
NATﺟﺪﻭﻝ ﺭﻭﺗﻴﻨﮓ ﺧﻮﺩ ﺭﺍ ﺑﺮﺭﺳﻲ ﺗﺎ ﺑﻪ ﺍﻳﻦ ﺍﻃﻤﻴﻨﺎﻥ ﺑﺮﺳﺪ ﮐﻪ ﺑﺮﺍﻱ ﺁﺩﺭﺱ •
ﻣﻘﺼﺪ ﻳﮏ entryﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺩﺍﺭﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﭘﺎﺳﺦ ﻣﺜﺒﺖ ﺑﺎﺷﺪ NAT ،ﺑﺴﺘﻪ
ﺍﻃﻼﻋﺎﺗﻲ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﺗﺮﺟﻤﻪ ﻭ ﻳﮏ entryﺑﺮﺍﻱ ﺁﻥ ﺍﻳﺠﺎﺩ ﻭ ﺁﻥ ﺭﺍ ﺩﺭ ﺟﺪﻭﻝ
ﺗﺮﺟﻤﻪ ﺁﺩﺭﺱ ) (ATTﺛﺒﺖ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﭘﺎﺳﺦ ﻣﻨﻔﻲ ﺑﺎﺷﺪ ﺑﺴﺘﻪ
ﺍﻃﻼﻋﺎﺗﻲ ﺩﻭﺭ ﺍﻧﺪﺍﺧﺘﻪ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺁﺩﺭﺱ ، inside globalﺭﻭﺗﺮ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﻪ ﻣﻘﺼﺪ ﻣﻮﺭﺩ •
244
NATﺩﺭ ﺟﺪﻭﻝ ﻣﺮﺑﻮﻃﻪ ﺑﻪ ﺧﻮﺩ ﺟﺴﺘﺠﻮ ﻭ ﺁﺩﺭﺱ ﻣﻘﺼﺪ ﺭﺍ ﺗﺸﺨﻴﺺ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ •
245
VLAN
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﺩﺭ ﺷﮑﻞ ﻓﻮﻕ ﻣﺸﺎﻫﺪﻩ ﻣﻲ ﻧﻤﺎﺋﻴﺪ ،ﺑﻪ ﻳﮏ ﺳﻮﺋﻴﭻ ،ﺳﻪ ﺍﻳﺴﺘﮕﺎﻩ ﻣﺘﺼﻞ ﺷﺪﻩ
ﺍﺳﺖ .ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻓﻮﻕ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺑﻮﺩﻩ ﻭ ﻫﺮ ﻳﮏ ﺑﻪ ﻋﻨﻮﺍﻥ ﻋﻀﻮﻱ ﺍﺯ
ﻳﮏ Broadcast domainﻣﺸﺎﺑﻪ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ،ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﻳﺴﺘﮕﺎﻫﻲ
246
ﻳﮏ ﭘﻴﺎﻡ broadcastﺭﺍ ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﺪ ،ﺳﺎﻳﺮ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ ﺳﻮﺋﻴﭻ ﻧﻴﺰ ﺁﻥ ﺭﺍ
ﺩﺭﻳﺎﻓﺖ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺷﺖ.
ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﮐﻮﭼﮏ ،ﻭﺟﻮﺩ ﭘﻴﺎﻡ ﻫﺎﻱ Broadcastﻧﻤﻲ ﺗﻮﺍﻧﺪ ﻣﺸﮑﻞ ﻭ ﻳﺎ ﻣﺴﺌﻠﻪ ﻗﺎﺑﻞ
ﺗﻮﺟﻬﻲ ﺭﺍ ﺍﻳﺠﺎﺩ ﻧﻤﺎﻳﺪ ،ﻭﻟﻲ ﺩﺭ ﺻﻮﺭﺕ ﺭﺷﺪ ﺷﺒﮑﻪ ،ﻭﺟﻮﺩ ﭘﻴﺎﻡ ﻫﺎﻱ braodcast
ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﻪ ﻳﮏ ﻣﺸﮑﻞ ﺍﺳﺎﺳﻲ ﻭ ﻣﻬﻢ ﺗﺒﺪﻳﻞ ﮔﺮﺩﺩ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ﻭ ﺩﺭ ﺍﻏﻠﺐ ﻣﻮﺍﻗﻊ،
ﺳﻴﻼﺑﻲ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺑﻲ ﺍﺭﺯﺵ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﺩﺭ ﺣﺎﻝ ﺟﺎﺑﺠﺎﺋﻲ ﺑﻮﺩﻩ ﻭ ﻋﻤﻼ" ﺍﺯ ﭘﻬﻨﺎﻱ
ﺑﺎﻧﺪ ﺷﺒﮑﻪ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻄﻠﻮﺏ ﻧﺨﻮﺍﻫﺪ ﺷﺪ .ﺗﻤﺎﻣﻲ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ ﻳﮏ ﺳﻮﺋﻴﭻ،
ﭘﻴﺎﻡ ﻫﺎﻱ Braodcastﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﭼﺮﺍﮐﻪ ﺗﻤﺎﻣﻲ ﺁﻧﺎﻥ ﺑﺨﺸﻲ ﺍﺯ ﻳﮏ
Broadcast doaminﻣﺸﺎﺑﻪ ﻣﻲ ﺑﺎﺷﻨﺪ.
ﺩﺭ ﺻﻮﺭﺕ ﺍﻓﺰﺍﻳﺶ ﺗﻌﺪﺍﺩ ﺳﻮﺋﻴﭻ ﻫﺎ ﻭ ﺍﻳﺴﺘﮕﺎﻫﻬﺎ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ،ﻣﺸﮑﻞ ﺍﺷﺎﺭﻩ ﺷﺪﻩ
ﻣﻠﻤﻮﺱ ﺗﺮ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﻫﻤﻮﺍﺭﻩ ﺍﺣﺘﻤﺎﻝ ﻭﺟﻮﺩ ﭘﻴﺎﻡ ﻫﺎﻱ Braodcastﺩﺭ ﻳﮏ ﺷﺒﮑﻪ
ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ.
ﻳﮑﻲ ﺩﻳﮕﺮ ﺍﺯ ﻣﺴﺎﺋﻞ ﻣﻬﻢ ،ﻣﻮﺿﻮﻉ ﺍﻣﻨﻴﺖ ﺍﺳﺖ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﺋﻲ ﮐﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻮﺋﻴﭻ
ﺍﻳﺠﺎﺩ ﻣﻲ ﮔﺮﺩﻧﺪ ،ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﺭﺑﺮﺍﻥ ﺷﺒﮑﻪ ﻗﺎﺩﺭ ﺑﻪ ﻣﺸﺎﻫﺪﻩ ﺗﻤﺎﻣﻲ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ
ﺷﺒﮑﻪ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺩﺭ ﺷﺒﮑﻪ ﺍﻱ ﺑﺰﺭﮒ ﮐﻪ ﺩﺍﺭﺍﻱ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ ﻓﺎﻳﻞ ،ﺑﺎﻧﮏ ﻫﺎﻱ
ﺍﻃﻼﻋﺎﺗﻲ ﻭ ﺳﺎﻳﺮ ﺍﻃﻼﻋﺎﺕ ﺣﺴﺎﺱ ﻭ ﺣﻴﺎﺗﻲ ﺍﺳﺖ ،ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﻣﻲ ﺗﻮﺍﻧﺪ ﺍﻣﮑﺎﻥ ﻣﺸﺎﻫﺪﻩ
ﺗﻤﺎﻣﻲ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺭﺍ ﺑﺮﺍﻱ ﻫﺮ ﺷﺨﺺ ﻓﺮﺍﻫﻢ ﻧﻤﺎﻳﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﻣﻨﺎﺑﻊ
ﻓﻮﻕ ﺩﺭ ﻣﻌﺮﺽ ﺗﻬﺪﻳﺪ ﻭ ﺣﻤﻼﺕ ﺑﻴﺸﺘﺮﻱ ﻗﺮﺍﺭ ﺧﻮﺍﻫﻨﺪ ﮔﺮﻓﺖ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺣﻔﺎﻇﺖ ﺍﻳﻨﭽﻨﻴﻦ
ﺳﻴﺴﺘﻢ ﻫﺎﺋﻲ ﻣﻲ ﺑﺎﻳﺴﺖ ﻣﺤﺪﻭﺩﻳﺖ ﺩﺳﺘﻴﺎﺑﻲ ﺭﺍ ﺩﺭ ﺳﻄﺢ ﺷﺒﮑﻪ ﻭ ﺑﺎ ﺍﻳﺠﺎﺩ ﺳﮕﻤﻨﺖ ﻫﺎﻱ
ﻣﺘﻌﺪﺩ ﻭ ﻳﺎ ﺍﺳﺘﻘﺮﺍﺭ ﻳﮏ ﻓﺎﻳﺮﻭﺍﻝ ﺩﺭ ﺟﻠﻮﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﺣﻴﺎﺗﻲ ،ﺍﻧﺠﺎﻡ ﺩﺍﺩ.
ﻣﻌﺮﻓﻲ VLAN
ﺗﻤﺎﻣﻲ ﻣﺴﺎﺋﻞ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﺩﺭ ﺑﺨﺶ ﻗﺒﻞ ﺭﺍ ﻭ ﺗﻌﺪﺍﺩ ﺑﻴﺸﺘﺮﻱ ﺭﺍ ﮐﻪ ﺑﻪ ﺁﻧﺎﻥ ﺍﺷﺎﺭﻩ
ﻧﺸﺪﻩ ﺍﺳﺖ ﺭﺍ ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﺍﻳﺠﺎﺩ ﻳﮏ VLANﺑﻪ ﻓﺮﺍﻣﻮﺷﻲ ﺳﭙﺮﺩ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ،VLAN
247
ﺑﻪ ﻳﮏ ﺳﻮﺋﻴﭻ ﻻﻳﻪ ﺩﻭﻡ ﮐﻪ ﺍﻳﻦ ﺗﮑﻨﻮﻟﻮﮊﻱ ﺭﺍ ﺣﻤﺎﻳﺖ ﻧﻤﺎﻳﺪ ،ﻧﻴﺎﺯ ﻣﻲ ﺑﺎﺷﺪ .ﺗﻌﺪﺍﺩﻱ ﺯﻳﺎﺩﻱ
ﺍﺯ ﺍﻓﺮﺍﺩﻳﮑﻪ ﺟﺪﻳﺪﺍ" ﺑﺎ ﺩﻧﻴﺎﻱ ﺷﺒﮑﻪ ﺁﺷﻨﺎ ﺷﺪﻩ ﺍﻧﺪ ،ﺍﻏﻠﺐ ﺩﺍﺭﺍﻱ ﺑﺮﺩﺍﺷﺖ ﻣﻨﺎﺳﺒﻲ ﺩﺭ ﺍﻳﻦ
ﺧﺼﻮﺹ ﻧﻤﻲ ﺑﺎﺷﻨﺪ ﻭ ﺍﻳﻨﮕﻮﻧﻪ ﺍﺳﺘﻨﺒﺎﻁ ﻧﻤﻮﺩﻩ ﺍﻧﺪ ﮐﻪ ﺻﺮﻓﺎ" ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﻣﻨﻈﻮﺭ ﻓﻌﺎﻝ
ﻧﻤﻮﺩﻥ ، VLANﻳﮏ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺍﺿﺎﻓﻪ ﺭﺍ ﺑﺮ ﺭﻭﻱ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ﻭ ﻳﺎ ﺳﻮﺋﻴﭻ ﻧﺼﺐ
ﻧﻤﺎﻳﻨﺪ ) .ﺑﺮﺩﺍﺷﺘﻲ ﮐﺎﻣﻼ" ﺍﺷﺘﺒﺎﻩ ! ( .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﮐﻪ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ، VLANﻣﻴﻠﻴﻮﻥ ﻫﺎ
ﻣﺤﺎﺳﺒﺎﺕ ﺭﻳﺎﺿﻲ ﺍﻧﺠﺎﻡ ﻣﻲ ﺷﻮﺩ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﺧﺎﺻﻲ ﮐﻪ ﺩﺭﻭﻥ ﺳﻮﺋﻴﭻ
ﺗﻌﺒﻴﻪ ﺷﺪﻩ ﺍﺳﺖ ،ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ )ﺩﻗﺖ ﺩﺭ ﺯﻣﺎﻥ ﺗﻬﻴﻪ ﻳﮏ ﺳﻮﺋﻴﭻ(،ﺩﺭ ﻏﻴﺮ ﺍﻳﻨﺼﻮﺭﺕ ﺍﻣﮑﺎﻥ
ﺍﻳﺠﺎﺩ ﻳﮏ VLANﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻮﺋﻴﭻ ﺗﻬﻴﻪ ﺷﺪﻩ ،ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ.
ﻫﺮ VLANﮐﻪ ﺑﺮ ﺭﻭﻱ ﺳﻮﺋﻴﭻ ﺍﻳﺠﺎﺩ ﻣﻲ ﮔﺮﺩﺩ ،ﺑﻪ ﻣﻨﺰﻟﻪ ﻳﮏ ﺷﺒﮑﻪ ﻣﺠﺰﺍ ﻣﻲ ﺑﺎﺷﺪ .ﺑﺪﻳﻦ
ﺗﺮﺗﻴﺐ ﺑﺮﺍﻱ ﻫﺮ VLANﻣﻮﺟﻮﺩ ﻳﮏ broadcast domainﺟﺪﺍﮔﺎﻧﻪ ﺍﻳﺠﺎﺩ ﻣﻲ ﮔﺮﺩﺩ
.ﭘﻴﺎﻡ ﻫﺎﻱ ، broadcastﺑﻪ ﺻﻮﺭﺕ ﭘﻴﺶ ﻓﺮﺽ ،ﺍﺯ ﺭﻭﻱ ﺗﻤﺎﻣﻲ ﭘﻮﺭﺕ ﻫﺎﺋﻲ ﺍﺯ ﺷﺒﮑﻪ
ﮐﻪ ﻋﻀﻮﻱ ﺍﺯ ﻳﮏ VLANﻣﺸﺎﺑﻪ ﻧﻤﻲ ﺑﺎﺷﻨﺪ ،ﻓﻴﻠﺘﺮ ﻣﻲ ﮔﺮﺩﻧﺪ .ﻭﻳﮋﮔﻲ ﻓﻮﻕ ،ﻳﮑﻲ ﺍﺯ
ﻣﻬﻤﺘﺮﻳﻦ ﺩﻻﻳﻞ ﻣﺘﺪﺍﻭﻝ ﺷﺪﻥ VALNﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺰﺭﮒ ﺍﻣﺮﻭﺯﻱ ﺍﺳﺖ ) ﺗﻤﺎﻳﺰ ﺑﻴﻦ
ﺳﮕﻤﻨﺖ ﻫﺎﻱ ﺷﺒﮑﻪ ( .ﺷﮑﻞ ﺯﻳﺮ ﻳﮏ ﻧﻤﻮﻧﻪ ﺷﺒﮑﻪ ﺑﺎ ﺩﻭ VLANﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ:
248
ﺯﻣﺎﻧﻲ ﮐﻪ ﺍﻳﺴﺘﮕﺎﻩ ﺷﻤﺎﺭﻩ ﻳﮏ ﻣﺘﻌﻠﻖ ﺑﻪ ، VLAN1ﻳﮏ ﭘﻴﺎﻡ Braodcastﺭﺍ
ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ )ﻧﻈﻴﺮ ،( FF:FF:FF:FF:FF:FF:ﺳﻮﺋﻴﭻ ﻣﻮﺟﻮﺩ ﺁﻥ ﺭﺍ ﺻﺮﻓﺎ" ﺑﺮﺍﻱ
ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﺷﻤﺎﺭﻩ ﺩﻭ ﻭﺳﻪ ﻓﻮﺭﻭﺍﺭﺩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ﺳﺎﻳﺮ ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ
ﻣﺘﻌﻠﻖ ﺑﻪ ، VLAN2ﺁﮔﺎﻫﻲ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﭘﻴﺎﻡ ﻫﺎﻱ broadcastﺍﺭﺳﺎﻟﻲ ﺑﺮ ﺭﻭﻱ
VLAN1ﺭﺍ ﭘﻴﺪﺍ ﻧﮑﺮﺩﻩ ﻭ ﺩﺭﮔﻴﺮ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﻧﺨﻮﺍﻫﻨﺪ
ﺷﺪ.
ﺩﺭ ﺣﻘﻴﻘﺖ ،ﺳﻮﺋﻴﭽﻲ ﮐﻪ ﻗﺎﺩﺭ ﺑﻪ ﺣﻤﺎﻳﺖ ﺍﺯ VLANﻣﻲ ﺑﺎﺷﺪ ،ﺍﻣﮑﺎﻥ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﭼﻨﺪﻳﻦ
ﺷﺒﮑﻪ ﻣﺠﺰﺍ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ ) ﻣﺸﺎﺑﻪ ﺩﺍﺷﺘﻦ ﺩﻭ ﺳﻮﺋﻴﭻ ﺟﺪﺍﮔﺎﻧﻪ ﻭ ﺍﺗﺼﺎﻝ ﺳﻪ ﺍﻳﺴﺘﮕﺎﻩ ﺑﻪ
ﻫﺮ ﻳﮏ ﺍﺯ ﺁﻧﺎﻥ ﺩﺭ ﻣﻘﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ .( VLANﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺷﺎﻫﺪ ﮐﺎﻫﺶ ﭼﺸﻤﮕﻴﺮ ﻫﺰﻳﻨﻪ
ﻫﺎﻱ ﺑﺮﭘﺎﺳﺎﺯﻱ ﻳﮏ ﺷﺒﮑﻪ ﺧﻮﺍﻫﻴﻢ ﺑﻮﺩ.
ﻓﺮﺽ ﮐﻨﻴﺪ ﻗﺼﺪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ ﺯﻳﺮ ﺳﺎﺧﺖ ﺷﺒﮑﻪ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺳﺎﺯﻣﺎﻥ ﺑﺰﺭﮒ ﺭﺍ ﺑﻪ
ﺩﻭﺍﺯﺩﻩ ﺷﺒﮑﻪ ﺟﺪﺍﮔﺎﻧﻪ ﺗﻘﺴﻴﻢ ﻧﻤﺎﺋﻴﻢ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﺗﻬﻴﻪ ﺩﻭﺍﺯﺩﻩ ﺳﻮﺋﻴﭻ ﻭ ﺍﺗﺼﺎﻝ
ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﺁﻧﺎﻥ ،ﺩﻭﺍﺯﺩﻩ ﺷﺒﮑﻪ ﻣﺠﺰﺍ ﮐﻪ ﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺁﻧﺎﻥ
ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ ﺭﺍ ﺍﻳﺠﺎﺩ ﻧﻤﺎﺋﻴﻢ .ﻳﮑﻲ ﺩﻳﮕﺮ ﺍﺯ ﺭﻭﺵ ﻫﺎﻱ ﺗﺎﻣﻴﻦ ﺧﻮﺍﺳﺘﻪ ﻓﻮﻕ ،ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
VLANﺍﺳﺖ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﻳﮏ ﻭ ﻳﺎ ﭼﻨﺪﻳﻦ ﺳﻮﺋﻴﭻ ﮐﻪ VLANﺭﺍ ﺣﻤﺎﻳﺖ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﺍﺳﺘﻔﺎﺩﻩ ﻭ ﺩﻭﺍﺯﺩﻩ VLANﺭﺍ ﺍﻳﺠﺎﺩ ﻧﻤﻮﺩ .ﺑﺪﻳﻬﻲ ﺍﺳﺖ ،ﻫﺰﻳﻨﻪ ﺑﺮﭘﺎﺳﺎﺯﻱ ﭼﻨﻴﻦ
ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﻪ ﻣﺮﺍﺗﺐ ﮐﻤﺘﺮ ﺍﺯ ﺣﺎﻟﺘﻲ ﺍﺳﺖ ﮐﻪ ﺍﺯ ﺩﻭﺍﺯﺩﻩ ﺳﻮﺋﻴﭻ ﺟﺪﺍﮔﺎﻧﻪ ،ﺍﺳﺘﻔﺎﺩﻩ
ﺷﺪﻩ ﺑﺎﺷﺪ .
ﺩﺭ ﺯﻣﺎﻥ ﺍﻳﺠﺎﺩ ،VALNﻣﻲ ﺑﺎﻳﺴﺖ ﺗﻤﺎﻣﻲ ﺍﻳﺴﺘﮕﺎﻫﻬﺎ ﺭﺍ ﺑﻪ ﺳﻮﺋﻴﭻ ﻣﺘﺼﻞ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ،
ﺍﻳﺴﺘﮕﺎﻫﻬﺎﻱ ﻣﺮﺗﺒﻂ ﺑﺎ ﻫﺮ VLANﺭﺍ ﻣﺸﺨﺺ ﻧﻤﻮﺩ .ﻫﺮ ﺳﻮﺋﻴﭻ ﺩﺭ ﺻﻮﺭﺕ ﺣﻤﺎﻳﺖ ﺍﺯ
، VLANﻗﺎﺩﺭ ﺑﻪ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺍﺯ ﺗﻌﺪﺍﺩ ﻣﺸﺨﺼﻲ VLANﺍﺳﺖ .ﻣﺜﻼ" ﻳﮏ ﺳﻮﺋﻴﭻ ﻣﻤﮑﻦ
ﺍﺳﺖ ٦٤ﻭ ﻳﺎ VLAN ٢٦٦ﺭﺍ ﺣﻤﺎﻳﺖ ﻧﻤﺎﻳﺪ.
249
ﺷﺒﮑﻪ ﻫﺎﻱ VPN
ﺩﺭ ﻃﻲ ﺩﻩ ﺳﺎﻝ ﮔﺬﺷﺘﻪ ﺩﻧﻴﺎ ﺩﺳﺘﺨﻮﺵ ﺗﺤﻮﻻﺕ ﻓﺮﺍﻭﺍﻧﻲ ﺩﺭ ﻋﺮﺻﻪ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺑﻮﺩﻩ
ﺍﺳﺖ .ﺍﻏﻠﺐ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﻣﻮﺳﺴﺎﺕ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﮐﺎﻻ ﻭ ﺧﺪﻣﺎﺕ ﮐﻪ ﺩﺭ ﮔﺬﺷﺘﻪ ﺑﺴﻴﺎﺭ ﻣﺤﺪﻭﺩ
ﻭ ﻣﻨﻄﻘﻪ ﺍﻱ ﻣﺴﺎﺋﻞ ﺭﺍ ﺩﻧﺒﺎﻝ ﻭ ﺩﺭ ﺻﺪﺩ ﺍﺭﺍﺋﻪ ﺭﺍﻫﮑﺎﺭﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ﺑﻮﺩﻧﺪ ،ﺍﻣﺮﻭﺯﻩ ﺑﻴﺶ ﺍﺯ
ﮔﺬﺷﺘﻪ ﻧﻴﺎﺯﻣﻨﺪ ﺗﻔﮑﺮ ﺩﺭ ﻣﺤﺪﻭﺩﻩ ﺟﻬﺎﻧﻲ ﺑﺮﺍﻱ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﻭ ﮐﺎﻻﻱ ﺗﻮﻟﻴﺪﻩ ﺷﺪﻩ ﺭﺍ ﺩﺍﺭﻧﺪ.
ﺑﻪ ﻋﺒﺎﺭﺕ ﺩﻳﮕﺮ ﺗﻔﮑﺮﺍﺕ ﻣﻨﻄﻘﻪ ﺍﻱ ﻭ ﻣﺤﻠﻲ ﺣﺎﮐﻢ ﺑﺮ ﻓﻌﺎﻟﻴﺖ ﻫﺎﻱ ﺗﺠﺎﺭﻱ ﺟﺎﻱ ﺧﻮﺩ ﺭﺍ
ﺑﻪ ﺗﻔﮑﺮﺍﺕ ﺟﻬﺎﻧﻲ ﻭ ﺳﺮﺍﺳﺮﻱ ﺩﺍﺩﻩ ﺍﻧﺪ .ﺍﻣﺮﻭﺯﻩ ﺑﺎ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﺯﻳﺎﺩﻱ ﺑﺮﺧﻮﺭﺩ ﻣﻲ ﻧﻤﺎﺋﻴﻢ
ﮐﻪ ﺩﺭ ﺳﻄﺢ ﻳﮏ ﮐﺸﻮﺭ ﺩﺍﺭﺍﻱ ﺩﻓﺎﺗﺮ ﻓﻌﺎﻝ ﻭ ﺣﺘﻲ ﺩﺭ ﺳﻄﺢ ﺩﻧﻴﺎ ﺩﺍﺭﺍﻱ ﺩﻓﺎﺗﺮ ﻣﺘﻔﺎﻭﺗﻲ
ﻣﻲ ﺑﺎﺷﻨﺪ .ﺗﻤﺎﻡ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻓﻮﻕ ﻗﺒﻞ ﺍﺯ ﻫﺮ ﭼﻴﺰ ﺑﺪﻧﺒﺎﻝ ﻳﮏ ﺍﺻﻞ ﺑﺴﻴﺎﺭ ﻣﻬﻢ ﻣﻲ ﺑﺎﺷﻨﺪ:
ﻳﮏ ﺭﻭﺵ ﺳﺮﻳﻊ ،ﺍﻳﻤﻦ ﻭ ﻗﺎﺑﻞ ﺍﻋﺘﻤﺎﺩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺩﻓﺎﺗﺮ ﻭ ﻧﻤﺎﻳﻨﺪﮔﻲ ﺩﺭ
ﺍﻗﺼﻲ
ﻧﻘﺎﻁ ﻳﮏ ﮐﺸﻮﺭ ﻭ ﻳﺎ ﺩﺭ ﺳﻄﺢ ﺩﻧﻴﺎ.
ﺍﮐﺜﺮ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﻣﻮﺳﺴﺎﺕ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﻳﮏ ﺷﺒﮑﻪ WANﺍﺯ ﺧﻄﻮﻁ ﺍﺧﺘﺼﺎﺻﻲ
) (Leased Lineﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.ﺧﻄﻮﻁ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﺍﻧﻮﺍﻉ ﻣﺘﻔﺎﻭﺗﻲ ﻣﻲ ﺑﺎﺷﻨﺪ.
) ISDNﺑﺎ ﺳﺮﻋﺖ ١٢٨ﮐﻴﻠﻮﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ((Optical Carrier-3 OC3 ) ،
) ﺑﺎ ﺳﺮﻋﺖ ١٥٥ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ( ﺩﺍﻣﻨﻪ ﻭﺳﻴﻊ ﺧﻄﻮﻁ ﺍﺧﺘﺼﺎﺻﻲ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ .ﻳﮏ
ﺷﺒﮑﻪ WANﺩﺍﺭﺍﻱ ﻣﺰﺍﻳﺎﻱ ﻋﻤﺪﻩ ﺍﻱ ﻧﺴﺒﺖ ﺑﻪ ﻳﮏ ﺷﺒﮑﻪ ﻋﻤﻮﻣﻲ ﻧﻈﻴﺮ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﺑﻌﺪ
ﺍﻣﻨﻴﺖ ﻭﮐﺎﺭﺁﺋﻲ ﺍﺳﺖ .ﭘﺸﺘﻴﺎﻧﻲ ﻭ ﻧﮕﻬﺪﺍﺭﻱ ﻳﮏ ﺷﺒﮑﻪ WANﺩﺭ ﻋﻤﻞ ﻭ ﺯﻣﺎﻧﻴﮑﻪ ﺍﺯﺧﻄﻮﻁ
ﺍﺧﺘﺼﺎﺻﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ ،ﻣﺴﺘﻠﺰﻡ ﺻﺮﻑ ﻫﺰﻳﻨﻪ ﺑﺎﻻﺋﻲ ﺍﺳﺖ.
ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﻋﻤﻮﻣﻴﺖ ﻳﺎﻓﺘﻦ ﺍﻳﻨﺘﺮﻧﺖ ،ﺍﻏﻠﺐ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﻣﻮﺳﺴﺎﺕ ﺿﺮﻭﺭﺕ ﺗﻮﺳﻌﻪ ﺷﺒﮑﻪ
ﺍﺧﺘﺼﺎﺻﻲ ﺧﻮﺩ ﺭﺍ ﺑﺪﺭﺳﺘﻲ ﺍﺣﺴﺎﺱ ﮐﺮﺩﻧﺪ .ﺩﺭ ﺍﺑﺘﺪﺍ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﻳﻨﺘﺮﺍﻧﺖ ﻣﻄﺮﺡ
ﮔﺮﺩﻳﺪﻧﺪ.ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﺑﺼﻮﺭﺕ ﮐﺎﻣﻼ" ﺍﺧﺘﺼﺎﺻﻲ ﺑﻮﺩﻩ ﻭ ﮐﺎﺭﻣﻨﺪﺍﻥ ﻳﮏ ﺳﺎﺯﻣﺎﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ
ﺍﺯ ﺭﻣﺰ ﻋﺒﻮﺭ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ،ﻗﺎﺩﺭ ﺑﻪ ﻭﺭﻭﺩ ﺑﻪ ﺷﺒﮑﻪ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻨﺎﺑﻊ ﻣﻮﺟﻮﺩ ﻣﻲ ﺑﺎﺷﻨﺪ.
250
ﺍﺧﻴﺮﺍ" ،ﺗﻌﺪﺍﺩ ﺯﻳﺎﺩﻱ ﺍﺯ ﻣﻮﺳﺴﺎﺕ ﻭ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﻄﺮﺡ ﺷﺪﻥ ﺧﻮﺍﺳﺘﻪ ﻫﺎﻱ ﺟﺪﻳﺪ
) ﮐﺎﺭﻣﻨﺪﺍﻥ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ،ﺍﺩﺍﺭﺍﺕ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ( ،ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﻳﺠﺎﺩ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺧﺘﺼﺎﺻﻲ ﻣﺠﺎﺯﻱ
( Virtual Private Network (VPNﻧﻤﻮﺩﻩ ﺍﻧﺪ.
ﻳﮏ ، VPNﺷﺒﮑﻪ ﺍﻱ ﺍﺧﺘﺼﺎﺻﻲ ﺑﻮﺩﻩ ﮐﻪ ﺍﺯ ﻳﮏ ﺷﺒﮑﻪ ﻋﻤﻮﻣﻲ ) ﻋﻤﻮﻣﺎ" ﺍﻳﻨﺘﺮﻧﺖ ( ،ﺑﺮﺍﻱ
ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﺎﻳﺖ ﻫﺎﻱ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﻭ ﺍﺭﺗﺒﺎﻁ ﮐﺎﺭﺑﺮﺍﻥ ﺑﺎﻳﮑﺪﻳﮕﺮ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺍﻳﻦ ﻧﻮﻉ
ﺷﺒﮑﻪ ﻫﺎ ﺩﺭ ﻋﻮﺽ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﻄﻮﻁ ﻭﺍﻗﻌﻲ ﻧﻈﻴﺮ :ﺧﻄﻮﻁ ،Leasedﺍﺯ ﻳﮏ ﺍﺭﺗﺒﺎﻁ
ﻣﺠﺎﺯﻱ ﺑﮑﻤﮏ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺮﺍﻱ ﺷﺒﮑﻪ ﺍﺧﺘﺼﺎﺻﻲ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺑﻪ ﺳﺎﻳﺖ ﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﮐﻨﺪ.
ﻋﻨﺎﺻﺮ ﺗﺸﮑﻴﻞ ﺩﻫﻨﺪﻩ ﻳﮏ VPN
ﺩﻭ ﻧﻮﻉ ﻋﻤﺪﻩ ﺷﺒﮑﻪ ﻫﺎﻱ VPNﻭﺟﻮﺩ ﺩﺍﺭﺩ:
ﺩﺳﺘﻴﺎﺑﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ) . (Remote-Accessﺑﻪ ﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎ •
251
ﺳﺎﻳﺖ ﺑﻪ ﺳﺎﻳﺖ ) . (Site-to-Siteﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ﻳﮏ ﺳﺎﺯﻣﺎﻥ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ •
ﺳﻴﺎﺳﺖ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ،ﻗﺎﺩﺭ ﺑﻪ ﺍﺗﺼﺎﻝ ﭼﻨﺪﻳﻦ ﺳﺎﻳﺖ ﺛﺎﺑﺖ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﺷﺒﮑﻪ
ﻋﻤﻮﻣﻲ ﻧﻈﻴﺮ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺖ .ﺷﺒﮑﻪ ﻫﺎﻱ VPNﮐﻪ ﺍﺯ ﺭﻭﺵ ﻓﻮﻕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ،
ﺩﺍﺭﺍﻱ ﮔﻮﻧﻪ ﻫﺎﻱ ﺧﺎﺻﻲ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻣﻲ ﺑﺎﺷﻨﺪ:
-ﻣﺒﺘﻨﻲ ﺑﺮ ﺍﻳﻨﺘﺮﺍﻧﺖ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺳﺎﺯﻣﺎﻧﻲ ﺩﺍﺭﺍﻱ ﻳﮏ ﻭ ﻳﺎ ﺑﻴﺶ ﺍﺯ ﻳﮏ ﻣﺤﻞ
) ﺭﺍﻩ ﺩﻭﺭ( ﺑﻮﺩﻩ ﻭ ﺗﻤﺎﻳﻞ ﺑﻪ ﺍﻟﺤﺎﻕ ﺁﻧﻬﺎ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺍﺧﺘﺼﺎﺻﻲ ﺑﺎﺷﺪ ،ﻣﻲ ﺗﻮﺍﻥ
ﻳﮏ ﺍﻳﻨﺘﺮﺍﻧﺖ VPNﺭﺍ ﺑﻪ ﻣﻨﻈﻮﺭ ﺑﺮﻗﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﻫﺮ ﻳﮏ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺤﻠﻲ ﺑﺎ
ﻳﮑﺪﻳﮕﺮ ﺍﻳﺠﺎﺩ ﻧﻤﻮﺩ.
-ﻣﺒﺘﻨﻲ ﺑﺮ ﺍﮐﺴﺘﺮﺍﻧﺖ .ﺩﺭ ﻣﻮﺍﺭﺩﻳﮑﻪ ﺳﺎﺯﻣﺎﻧﻲ ﺩﺭ ﺗﻌﺎﻣﻞ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺴﻴﺎﺭ ﻧﺰﺩﻳﮏ
ﺑﺎ ﺳﺎﺯﻣﺎﻥ ﺩﻳﮕﺮ ﺑﺎﺷﺪ ،ﻣﻲ ﺗﻮﺍﻥ ﻳﮏ ﺍﮐﺴﺘﺮﺍﻧﺖ VPNﺭﺍ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺷﺒﮑﻪ
ﻫﺎﻱ ﻣﺤﻠﻲ ﻫﺮ ﻳﮏ ﺍﺯ ﺳﺎﺯﻣﺎﻧﻬﺎ ﺍﻳﺠﺎﺩ ﮐﺮﺩ .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻣﺘﻌﺪﺩ
ﻗﺎﺩﺭ ﺑﻪ ﻓﻌﺎﻟﻴﺖ ﺩﺭ ﻳﮏ ﻣﺤﻴﻂ ﺍﺷﺘﺮﺍﮐﻲ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ.
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ VPNﺑﺮﺍﻱ ﻳﮏ ﺳﺎﺯﻣﺎﻥ ﺩﺍﺭﺍﻱ ﻣﺰﺍﻳﺎﻱ ﻣﺘﻌﺪﺩﻱ ﻧﻈﻴﺮ :ﮔﺴﺘﺮﺵ ﻣﺤﺪﻭﻩ
ﺟﻐﺮﺍﻓﻴﺎﺋﻲ ﺍﺭﺗﺒﺎﻃﻲ ،ﺑﻬﺒﻮﺩ ﻭﺿﻌﻴﺖ ﺍﻣﻨﻴﺖ ،ﮐﺎﻫﺶ ﻫﺰﻳﻨﻪ ﻫﺎﻱ ﻋﻤﻠﻴﺎﺗﻲ ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ﺭﻭﺵ
ﻫﺎﻱ ﺳﻨﺘﻲ ، WANﮐﺎﻫﺶ ﺯﻣﺎﻥ ﺍﺭﺳﺎﻝ ﻭ ﺣﻤﻞ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻱ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ،ﺑﻬﺒﻮﺩ
ﺑﻬﺮﻩ ﻭﺭﻱ ،ﺗﻮﭘﻮﻟﻮﮊﻱ ﺁﺳﺎﻥ ...،ﺍﺳﺖ .ﺩﺭ ﻳﮑﻪ ﺷﺒﮑﻪ VPNﺑﻪ ﻋﻮﺍﻣﻞ ﻣﺘﻔﺎﻭﺗﻲ ﻧﻈﻴﺮ :ﺍﻣﻨﻴﺖ،
ﺍﻋﺘﻤﺎﺩﭘﺬﻳﺮﻱ ،ﻣﺪﻳﺮﻳﺖ ﺷﺒﮑﻪ ﻭ ﺳﻴﺎﺳﺖ ﻫﺎ ﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
252
ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﻫﺮ ﮐﺎﺭﻱ ﺭﺍ ﮐﻪ ﺷﻤﺎ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ ،ﺗﻮﺳﻂ ﺳﺎﻳﺮ ﻣﺴﺎﻓﺮﻳﻦ ﻗﺎﺑﻞ ﻣﺸﺎﻫﺪﻩ
ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﻓﺮﺽ ﮐﻨﻴﺪ ﻫﺮ ﻳﮏ ﺍﺯ ﺟﺰﺍﻳﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﻣﺸﺎﺑﻪ ﻳﮏ ﺷﺒﮑﻪ ﻣﺤﻠﻲ ) (LANﻭ
ﺍﻗﻴﺎﻧﻮﺱ ﻣﺎﻧﻨﺪ ﺍﻳﻨﺘﺮﻧﺖ ﺑﺎﺷﻨﺪ .ﻣﺴﺎﻓﺮﺕ ﺑﺎ ﻳﮏ ﮐﺸﺘﻲ ﻣﺴﺎﻓﺮﺑﺮﻱ ﻣﺸﺎﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ
ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﺏ ﻭ ﻳﺎ ﺳﺎﻳﺮ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺖ .ﺷﻤﺎ ﺩﺍﺭﺍﻱ
ﻧﻤﻲ ﺑﺎﺷﻴﺪ ) .ﻣﺸﺎﺑﻪ ﻫﻴﭽﮕﻮﻧﻪ ﮐﻨﺘﺮﻟﻲ ﺑﺮ ﺭﻭﻱ ﮐﺎﺑﻞ ﻫﺎ ﻭ ﺭﻭﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ
ﻋﺪﻡ ﮐﻨﺘﺮﻝ ﺷﻤﺎ ﺑﻪ ﻋﻨﻮﺍﻥ ﻣﺴﺎﻓﺮ ﮐﺸﺘﻲ ﻣﺴﺎﻓﺮﺑﺮﻱ ﺑﺮ ﺭﻭﻱ ﺳﺎﻳﺮ ﻣﺴﺎﻓﺮﻳﻦ ﺣﺎﺿﺮ ﺩﺭ ﮐﺸﺘﻲ
( .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺗﻤﺎﻳﻞ ﺑﻪ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺩﻭ ﺷﺒﮑﻪ ﺍﺧﺘﺼﺎﺻﻲ ﺍﺯ ﻃﺮﻳﻖ ﻣﻨﺎﺑﻊ ﻋﻤﻮﻣﻲ ﻭﺟﻮﺩ
ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ،ﺍﻭﻟﻴﻦ ﻣﺴﺌﻠﻪ ﺍﻱ ﮐﻪ ﺑﺎ ﭼﺎﻟﺶ ﻫﺎﻱ ﺟﺪﻱ ﺑﺮﺧﻮﺭﺩ ﺧﻮﺍﻫﺪ ﮐﺮﺩ ،ﺍﻣﻨﻴﺖ ﺧﻮﺍﻫﺪ
ﺑﻮﺩ .ﻓﺮﺽ ﮐﻨﻴﺪ ،ﺟﺰﻳﺮﻩ ﺷﻤﺎ ﻗﺼﺪ ﺍﻳﺠﺎﺩ ﻳﮏ ﭘﻞ ﺍﺭﺗﺒﺎﻃﻲ ﺑﺎ ﺟﺰﻳﺮﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺩﺍﺷﺘﻪ
ﺑﺎﺷﺪ .ﻣﺴﻴﺮ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﻳﮏ ﺭﻭﺵ ﺍﻳﻤﻦ ،ﺳﺎﺩﻩ ﻭ ﻣﺴﺘﻘﻴﻢ ﺑﺮﺍﻱ ﻣﺴﺎﻓﺮﺕ ﺳﺎﮐﻨﻴﻦ ﺟﺰﻳﺮﻩ
ﺷﻤﺎ ﺑﻪ ﺟﺰﻳﺮﻩ ﺩﻳﮕﺮ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﺁﻭﺭﺩ .ﻫﻤﺎﻧﻄﻮﺭ ﮐﻪ ﺣﺪﺱ ﺯﺩﻩ ﺍﻳﺪ ،ﺍﻳﺠﺎﺩ ﻭ ﻧﮕﻬﺪﺍﺭﻱ
ﻳﮏ ﭘﻞ ﺍﺭﺗﺒﺎﻃﻲ ﺑﻴﻦ ﺩﻭ ﺟﺰﻳﺮﻩ ﻣﺴﺘﻠﺰﻡ ﺻﺮﻑ ﻫﺰﻳﻨﻪ ﻫﺎﻱ ﺑﺎﻻﺋﻲ ﺧﻮﺍﻫﺪ ﺑﻮﺩ ).ﺣﺘﻲ ﺍﮔﺮ
ﺟﺰﺍﻳﺮ ﺩﺭ ﻣﺠﺎﻭﺭﺕ ﻳﮑﺪﻳﮕﺮ ﺑﺎﺷﻨﺪ ( .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺿﺮﻭﺭﺕ ﻭ ﺣﺴﺎﺳﻴﺖ ﻣﺮﺑﻮﻁ ﺑﻪ ﺩﺍﺷﺘﻦ
ﻳﮏ ﻣﺴﻴﺮ ﺍﻳﻤﻦ ﻭ ﻣﻄﻤﺌﻦ ،ﺗﺼﻤﻴﻢ ﺑﻪ ﺍﻳﺠﺎﺩ ﭘﻞ ﺍﺭﺗﺒﺎﻃﻲ ﺑﻴﻦ ﺩﻭ ﺟﺰﻳﺮﻩ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺍﺳﺖ.
ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺟﺰﻳﺮﻩ ﺷﻤﺎ ﻗﺼﺪ ﺍﻳﺠﺎﺩ ﻳﮏ ﭘﻞ ﺍﺭﺗﺒﺎﻃﻲ ﺑﺎ ﺟﺰﻳﺮﻩ ﺩﻳﮕﺮ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ﮐﻪ
ﺩﺭ ﻣﺴﺎﻓﺖ ﺑﺴﻴﺎﺭ ﻃﻮﻻﻧﻲ ﻧﺴﺒﺖ ﺑﻪ ﺟﺰﻳﺮﻩ ﺷﻤﺎ ﻭﺍﻗﻊ ﺍﺳﺖ
،ﻫﺰﻳﻨﻪ ﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﻭﺿﻌﻴﺖ ﻓﻮﻕ ،ﻧﻈﻴﺮ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ
ﺍﺧﺘﺼﺎﺻﻲ Leasedﺍﺳﺖ .ﻣﺎﻫﻴﺖ ﭘﻞ ﻫﺎﻱ ﺍﺭﺗﺒﺎﻃﻲ ) ﺧﻄﻮﻁ ﺍﺧﺘﺼﺎﺻﻲ ( ﺍﺯ ﺍﻗﻴﺎﻧﻮﺱ
) ﺍﻳﻨﺘﺮﻧﺖ ( ﻣﺘﻔﺎﻭﺕ ﺑﻮﺩﻩ ﻭ ﮐﻤﺎﮐﻦ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺗﺒﺎﻁ ﺟﺰﺍﻳﺮ) ﺷﺒﮑﻪ ﻫﺎﻱ (LANﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ.
ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﻣﻮﺳﺴﺎﺕ ﻣﺘﻌﺪﺩﻱ ﺍﺯ ﺭﻭﻳﮑﺮﺩ ﻓﻮﻕ ) ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺧﻄﻮﻁ ﺍﺧﺘﺼﺎﺻﻲ( ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﻣﻬﻤﺘﺮﻳﻦ ﻋﺎﻣﻞ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻭﺟﻮﺩ ﺍﻣﻨﻴﺖ ﻭ ﺍﻃﻤﻴﻨﺎﻥ ﺑﺮﺍﻱ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﻫﺮ
ﻳﮏ ﺳﺎﺯﻣﺎﻧﻬﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺍﺳﺖ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻣﺴﺎﻓﺖ ﺍﺩﺍﺭﺍﺕ ﻭ ﻳﺎ ﺷﻌﺐ ﻳﮏ
ﺳﺎﺯﻣﺎﻥ ﺍﺯ ﻳﮑﺪﻳﮕﺮ ﺑﺴﻴﺎﺭ ﺩﻭﺭ ﺑﺎﺷﺪ ،ﻫﺰﻳﻨﻪ ﻣﺮﺑﻮﻁ ﺑﻪ ﺑﺮﻗﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﻧﻴﺰ ﺍﻓﺰﺍﻳﺶ ﺧﻮﺍﻫﺪ
ﻳﺎﻓﺖ.
253
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﻮﺍﺭﺩ ﮔﻔﺘﻪ ﺷﺪﻩ ،ﭼﻪ ﺿﺮﻭﺭﺗﻲ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ VPNﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﻭ
VPNﺗﺎﻣﻴﻦ ﮐﻨﻨﺪﻩ ،ﮐﺪﺍﻣﻴﮏ ﺍﺯ ﺍﻫﺪﺍﻑ ﻭ ﺧﻮﺍﺳﺘﻪ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺳﺖ؟ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ
ﻣﻘﺎﻳﺴﻪ ﺍﻧﺠﺎﻡ ﺷﺪﻩ ﺩﺭ ﻣﺜﺎﻝ ﻓﺮﺿﻲ ،ﻣﻲ ﺗﻮﺍﻥ ﮔﻔﺖ ﮐﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ VPNﺑﻪ ﻫﺮﻳﮏ ﺍﺯ
ﺳﺎﮐﻨﻴﻦ ﺟﺰﻳﺮﻩ ﻳﮏ ﺯﻳﺮﺩﺭﻳﺎﺋﻲ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺯﻳﺮﺩﺭﻳﺎﺋﻲ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﺧﺼﺎﻳﺺ ﻣﺘﻔﺎﻭﺕ
ﻧﻈﻴﺮ :
ﺩﺍﺭﺍﻱ ﺳﺮﻋﺖ ﺑﺎﻻ ﺍﺳﺖ. •
ﻗﺎﺩﺭ ﺑﻪ ﺍﺳﺘﺘﺎﺭ) ﻣﺨﻔﻲ ﻧﻤﻮﺩﻥ( ﺷﻤﺎ ﺍﺯ ﺳﺎﻳﺮ ﺯﻳﺮﺩﺭﻳﺎ ﺋﻴﻬﺎ ﻭ ﮐﺸﺘﻲ ﻫﺎ ﺍﺳﺖ. •
ﭘﺲ ﺍﺯ ﺗﺎﻣﻴﻦ ﺍﻭﻟﻴﻦ ﺯﻳﺮﺩﺭﻳﺎﺋﻲ ،ﺍﻓﺰﻭﺩﻥ ﺍﻣﮑﺎﻧﺎﺕ ﺟﺎﻧﺒﻲ ﻭ ﺣﺘﻲ ﻳﮏ ﺯﻳﺮﺩﺭﻳﺎﺋﻲ •
ﺍﻣﻨﻴﺖ VPN
ﺷﺒﮑﻪ ﻫﺎﻱ VPNﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺎﻣﻴﻦ ﺍﻣﻨﻴﺖ )ﺩﺍﺩﻩ ﻫﺎ ﻭ ﺍﺭﺗﺒﺎﻃﺎﺕ( ﺍﺯ ﺭﻭﺵ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ:
254
ﻓﺎﻳﺮﻭﺍﻝ .ﻓﺎﻳﺮﻭﺍﻝ ﻳﮏ ﺩﻳﻮﺍﺭﻩ ﻣﺠﺎﺯﻱ ﺑﻴﻦ ﺷﺒﮑﻪ ﺍﺧﺘﺼﺎﻱ ﻳﮏ ﺳﺎﺯﻣﺎﻥ ﻭ ﺍﻳﻨﺘﺮﻧﺖ •
ﺍﻳﺠﺎﺩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺎﻳﺮﻭﺍﻝ ﻣﻲ ﺗﻮﺍﻥ ﻋﻤﻠﻴﺎﺕ ﻣﺘﻔﺎﻭﺗﻲ ﺭﺍ ﺩﺭ ﺟﻬﺖ ﺍﻋﻤﺎﻝ
ﺳﻴﺎﺳﺖ ﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻳﮏ ﺳﺎﺯﻣﺎﻥ ﺍﻧﺠﺎﻡ ﺩﺍﺩ .ﺍﻳﺠﺎﺩ ﻣﺤﺪﻭﺩﻳﺖ ﺩﺭ ﺗﻌﺪﺍﺩ ﭘﻮﺭﺕ ﻫﺎ
ﻓﻌﺎﻝ ،ﺍﻳﺠﺎﺩ ﻣﺤﺪﻭﺩﻳﺖ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﻪ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺧﺎﺹ ،ﺍﻳﺠﺎﺩ ﻣﺤﺪﻭﺩﻳﺖ ﺩﺭ
ﻧﻮﻉ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻭ ...ﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﺍﺯ ﻋﻤﻠﻴﺎﺗﻲ ﺍﺳﺖ ﮐﻪ ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ
ﺍﺯ ﻳﮏ ﻓﺎﻳﺮﻭﺍﻝ ﺍﻧﺠﺎﻡ ﺩﺍﺩ.
ﺭﻣﺰﻧﮕﺎﺭﻱ .ﻓﺮﺁﻳﻨﺪﻱ ﺍﺳﺖ ﮐﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺒﺪﺍﺀ ﺍﻃﻼﻋﺎﺗﻲ ﺭﻣﺰﺷﺪﻩ ﺭﺍ •
ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﻳﮕﺮ ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺳﺎﻳﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻱ ﻣﺠﺎﺯ ﻗﺎﺩﺭ ﺑﻪ ﺭﻣﺰﮔﺸﺎﺋﻲ
ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻟﻲ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﭘﺲ ﺍﺯ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺗﻮﺳﻂ
ﻓﺮﺳﺘﻨﺪﻩ ،ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﮔﺎﻥ ،ﻗﺒﻞ ﺍﺯ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﻗﺪﺍﻡ ﺑﻪ
ﺭﻣﺰﮔﺸﺎﺋﻲ ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﻧﻤﺎﻳﻨﺪ .ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺩﻭ
ﮔﺮﻭﻩ ﻋﻤﺪﻩ ﺗﻘﺴﻴﻢ ﻣﻲ ﮔﺮﺩﺩ :ﺭﻣﺰﻧﮕﺎﺭﻱ ﮐﻠﻴﺪ ﻣﺘﻘﺎﺭﻥ ﻭ ﺭﻣﺰﻧﮕﺎﺭﻱ ﮐﻠﻴﺪ ﻋـــﻤﻮﻣﻲ
ﺩﺭ ﺭﻣﺰ ﻧﮕﺎﺭﻱ " ﮐﻠﻴﺪ ﻣﺘﻘﺎﺭﻥ " ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺩﺍﺭﺍﻱ ﻳﮏ ﮐﻠﻴﺪ ) Secretﮐﺪ (
ﺑﻮﺩﻩ ﮐﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﻗﺎﺩﺭ ﺑﻪ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻗﺒﻞ ﺍﺯ ﺍﺭﺳﺎﻝ ﺩﺭ ﺷﺒﮑﻪ
ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﻳﮕﺮ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺭﻭﺵ ﻓﻮﻕ ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺭ ﺍﺑﺘﺪﺍ ﻧﺴﺒﺖ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﺋﻲ
ﮐﻪ ﻗﺼﺪ ﺑﺮﻗﺮﺍﺭﻱ ﻭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻱ ﻳﮑﺪﻳﮕﺮ ﺭﺍ ﺩﺍﺭﻧﺪ ،ﺁﮔﺎﻫﻲ ﮐﺎﻣﻞ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ
ﺑﺎﺷﺪ .ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺷﺮﮐﺖ ﮐﻨﻨﺪﻩ ﺩﺭ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺍﺭﺍﻱ ﮐﻠﻴﺪ
ﺭﻣﺰ ﻣﺸﺎﺑﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺭﻣﺰﮔﺸﺎﺋﻲ ﺍﻃﻼﻋﺎﺕ ﺑﺎﺷﻨﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻟﻲ ﻧﻴﺰ
ﺍﺯ ﮐﻠﻴﺪ ﻓﻮﻕ ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﺪ ﺷﺪ .ﻓﺮﺽ ﮐﻨﻴﺪ ﻗﺼﺪ ﺍﺭﺳﺎﻝ ﻳﮏ ﭘﻴﺎﻡ ﺭﻣﺰ ﺷﺪﻩ ﺑﺮﺍﻱ ﻳﮑﻲ ﺍﺯ
ﺩﻭﺳﺘﺎﻥ ﺧﻮﺩ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﺍﺯ ﻳﮏ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺧﺎﺹ ﺑﺮﺍﻱ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﺷﻮﺩ .ﺩﺭ ﺍﻟﮕﻮﺭﻳﺘﻢ ﻓﻮﻕ ﻫﺮ ﺣﺮﻑ ﺑﻪ ﺩﻭﺣﺮﻑ ﺑﻌﺪ ﺍﺯ ﺧﻮﺩ ﺗﺒﺪﻳﻞ ﻣﻲ ﮔﺮﺩﺩ) .ﺣﺮﻑ A
ﺑﻪ ﺣﺮﻑ ، Cﺣﺮﻑ Bﺑﻪ ﺣﺮﻑ .( Dﭘﺲ ﺍﺯ ﺭﻣﺰﻧﻤﻮﺩﻥ ﭘﻴﺎﻡ ﻭ ﺍﺭﺳﺎﻝ ﺁﻥ ،ﻣﻲ ﺑﺎﻳﺴﺖ
ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﭘﻴﺎﻡ ﺑﻪ ﺍﻳﻦ ﺣﻘﻴﻘﺖ ﻭﺍﻗﻒ ﺑﺎﺷﺪ ﮐﻪ ﺑﺮﺍﻱ ﺭﻣﺰﮔﺸﺎﺋﻲ ﭘﻴﺎﻡ ﻟﺮﺳﺎﻝ ﺷﺪﻩ ،ﻫﺮ
ﺣﺮﻑ ﺑﻪ ﺩﻭ ﺣﺮﻕ ﻗﺒﻞ ﺍﺯ ﺧﻮﺩ ﻣﻲ ﺑﺎﻳﺴﺖ ﺗﺒﺪﻳﻞ ﮔﺮﺩﺩ.
255
ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﺩﻭﺳﺖ ﺍﻣﻴﻦ ﺧﻮﺩ ،ﻭﺍﻗﻌﻴﺖ ﻓﻮﻕ ) ﮐﻠﻴﺪ ﺭﻣﺰ ( ﮔﻔﺘﻪ
ﺷﻮﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﭘﻴﺎﻡ ﻓﻮﻕ ﺗﻮﺳﻂ ﺍﻓﺮﺍﺩ ﺩﻳﮕﺮﻱ ﺩﺭﻳﺎﻓﺖ ﮔﺮﺩﺩ ،ﺑﺪﻟﻴﻞ ﻋﺪﻡ ﺁﮔﺎﻫﻲ ﺍﺯ
ﮐﻠﻴﺪ ،ﺁﻧﺎﻥ ﻗﺎﺩﺭ ﺑﻪ ﺭﻣﺰﮔﺸﺎﺋﻲ ﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻴﺎﻡ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﻧﺨﻮﺍﻫﻨﺪ ﺑﻮﺩ.
ﺩﺭ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻋﻤﻮﻣﻲ ﺍﺯ ﺗﺮﮐﻴﺐ ﻳﮏ ﮐﻠﻴﺪ ﺧﺼﻮﺻﻲ ﻭ ﻳﮏ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ.
ﮐﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺻﺮﻓﺎ" ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﻤﺎ ) ﺍﺭﺳﺎﻝ ﮐﻨﻨﺪﻩ( ﻗﺎﺑﻞ ﺷﻨﺎﺳﺎﺋﻲ ﻭ ﺍﺳﺘـﻔﺎﺩﻩ ﺍﺳﺖ.
ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺗﻮﺳﻂ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﻤﺎ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺗﻤﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺩﻳﮕﺮ ﮐﻪ ﻗﺼﺪ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺁﻥ
ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ،ﮔﺬﺍﺷﺘﻪ ﻣﻲ ﺷﻮﺩ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺭﻣﺰﮔﺸﺎﺋﻲ ﻳﮏ ﭘﻴﺎﻡ ﺭﻣﺰ ﺷﺪﻩ ،ﻳﮏ ﮐﺎﻣﭙﻴـﻮﺗﺮ
ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ ) ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺗﻮﺳﻂ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺭﺳﺎﻝ ﮐﻨﻨﺪﻩ ( ،ﮐﻠــﻴﺪ
ﺧﺼﻮﺻﻲ ﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ ﺍﻗﺪﺍﻡ ﺑﻪ ﺭﻣﺰﮔﺸﺎﺋﻲ ﭘﻴﺎﻡ ﺍﺭﺳﺎﻟﻲ ﻧﻤﺎﻳﺪ .ﻳﮑﻲ ﺍﺯ ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﺍﺑﺰﺍﺭ
"ﺭﻣﺰﻧﮕﺎﺭﻱ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ" ،ﺭﻭﺷﻲ ﺑﺎ ﻧﺎﻡ (Pretty Good Privacy(PGPﺍﺳﺖ.
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺵ ﻓﻮﻕ ﻣﻲ ﺗﻮﺍﻥ ﺍﻗﺪﺍﻡ ﺑﻪ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺩﻟﺨﻮﺍﻩ ﺧﻮﺩ ﻧﻤﻮﺩ.
. IPSecﭘﺮﻭﺗﮑﻞ ، (protocol Internet protocol security(IPsec •
256
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ . AAAﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﮔﺎﻥ) Authentication : AAA •
ﺳﺨﺖ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺍﺧﺘﺼﺎﺻﻲ ﻧﻈﻴﺮ ﻳﮏ " ﮐﺎﻧﮑﺘﻮﺭ "VPNﻭ ﻳﺎ ﻳﮏ ﻓﺎﻳﺮﻭﺍﻝ PIX •
ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ NASﮐﻪ ﺗﻮﺳﻂ ﻣﺮﮐﺰ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ •
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﺗﺎﮐﻨﻮﻥ ﻳﮏ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻗﺎﺑﻞ ﻗﺒﻮﻝ ﻭ ﻋﻤﻮﻣﻲ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﺵVPN
ﺍﻳﺠﺎﺩ ﻧﺸﺪﻩ ﺍﺳﺖ ،ﺷﺮﮐﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﻫﺮ ﻳﮏ ﺍﻗﺪﺍﻡ ﺑﻪ ﺗﻮﻟﻴﺪ ﻣﺤﺼﻮﻻﺕ ﺍﺧﺘﺼﺎﺻﻲ ﺧﻮﺩ
ﻧﻤﻮﺩﻩ ﺍﻧﺪ.
ﮐﺎﻧﮑﺘﻮﺭ . VPNﺳﺨﺖ ﺍﻓﺰﺍﺭ ﻓﻮﻕ ﺗﻮﺳﻂ ﺷﺮﮐﺖ ﺳﻴﺴﮑﻮ ﻃﺮﺍﺣﻲ ﻭ ﻋﺮﺿﻪ ﺷﺪﻩ •
ﺍﺳﺖ .ﮐﺎﻧﮑﺘﻮﺭ ﻓﻮﻕ ﺩﺭ ﻣﺪﻝ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﻭ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﮔﻮﻧﺎﮔﻮﻥ ﻋﺮﺿﻪ ﺷﺪﻩ
ﺍﺳﺖ .ﺩﺭ ﺑﺮﺧﻲ ﺍﺯ ﻧﻤﻮﻧﻪ ﻫﺎﻱ ﺩﺳﺘﮕﺎﻩ ﻓﻮﻕ ﺍﻣﮑﺎﻥ ﻓﻌﺎﻟﻴﺖ ﻫﻤﺰﻣﺎﻥ ١٠٠ﮐﺎﺭﺑﺮ ﺍﺯ
257
ﺭﺍﻩ ﺩﻭﺭ ﻭ ﺩﺭ ﺑﺮﺧﻲ ﻧﻤﻮﻧﻪ ﻫﺎﻱ ﺩﻳﮕﺮ ﺗﺎ ١٠,٠٠٠ﮐﺎﺭﺑﺮ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﻗﺎﺩﺭ ﺑﻪ ﺍﺗﺼﺎﻝ
ﺑﻪ ﺷﺒﮑﻪ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ.
ﺭﻭﺗﺮ ﻣﺨﺘﺺ . VPNﺭﻭﺗﺮ ﻓﻮﻕ ﺗﻮﺳﻂ ﺷﺮﮐﺖ ﺳﻴﺴﮑﻮ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ .ﺍﻳﻦ ﺭﻭﺗﺮ •
ﺩﺍﺭﺍﻱ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﻣﺤﻴﻂ ﻫﺎﻱ ﮔﻮﻧﺎﮔﻮﻥ ﺍﺳﺖ.
ﺩﺭ ﻃﺮﺍﺣﻲ ﺭﻭﺗﺮ ﻓﻮﻕ ﺷﺒﮑﻪ ﻫﺎﻱ VPNﻧﻴﺰ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﻭ ﺍﻣﮑﺎﻧﺎﺕ
ﻣﺮﺑﻮﻁ ﺩﺭ ﺁﻥ ﺑﮕﻮﻧﻪ ﺍﻱ ﺑﻬﻴﻨﻪ ﺳﺎﺯﻱ ﺷﺪﻩ ﺍﻧﺪ.
ﻓﺎﻳﺮﻭﺍﻝ ) . PIXﻓﺎﻳﺮﻭﺍﻝ eXchange Private Internet) PIXﻗﺎﺑﻠﻴﺖ •
IPSec,L2F,PPTP,L2TP,GREﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
ﭘﺮﻭﺗﮑﻞ ﻣﺴﺎﻓﺮ .ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﺋﻲ ﻧﻈﻴﺮ IPX,IP,NetBeuiﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﻩ •
258
ﻭ ﻳﺎ ﻣﻲ ﺗﻮﺍﻥ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﮐﻪ ﺍﺯ ﻳﮏ ﺁﺩﺭﺱ IPﻏﻴﺮ ﻗﺎﺑﻞ ﺭﻭﺕ ) ﺍﺧﺘﺼﺎﺻﻲ (
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺩﺭﻭﻥ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﮐﻪ ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ ﻣﻌﺘﺒﺮ IPﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮐﻨﺪ،
ﻣﺴﺘﻘﺮ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺭﺳﺎﻝ ﻧﻤﻮﺩ.
ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ VPNﺍﺯ ﻧﻮﻉ " ﺳﺎﻳﺖ ﺑﻪ ﺳﺎﻳﺖ " generic routing (GRE ،
(encapsulationﺑﻪ ﻋﻨﻮﺍﻥ ﭘﺮﻭﺗﮑﻞ ﮐﭙﺴﻮﻟﻪ ﺳﺎﺯﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ
ﻧﺤﻮﻩ ﺍﺳﺘﻘﺮﺍﺭ ﻭ ﺑﺴﺘﻪ ﺑﻨﺪﻱ " ﭘﺮﻭﺗﮑﻞ ﻣﺴﺎﻓﺮ" ﺍﺯ ﻃﺮﻳﻖ ﭘﺮﻭﺗﮑﻞ " ﺣﻤﻞ ﮐﻨﻨﺪﻩ " ﺑﺮﺍﻱ ﺍﻧﺘﻘﺎﻝ
ﺭﺍ ﺗﺒﻴﻦ ﻣﻲ ﻧﻤﺎﻳﺪ ) .ﭘﺮﻭﺗﮑﻞ ﺣﻤﻞ ﮐﻨﻨﺪﻩ ،ﻋﻤﻮﻣﺎ" IPﺍﺳﺖ( .ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ﺷﺎﻣﻞ ﺍﻃﻼﻋﺎﺗﻲ
ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻧﻮﻉ ﺑﺴﺖ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺍﻱ ﮐﭙﺴﻮﻟﻪ ﻧﻤﻮﺩﻥ ﻭ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺍﺭﺗﺒﺎﻁ
ﺑﻴﻦ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺍﺳﺖ .ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ) IPSecﺩﺭ
ﺣﺎﻟﺖ (tunnelﺑﺮﺍﻱ ﮐﭙﺴﻮﻟﻪ ﺳﺎﺯﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.ﭘﺮﻭﺗﮑﻞ ، IPSecﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ
ﺩﺭ ﺩﻭ ﻧﻮﻉ ﺷﺒﮑﻪ ) VPNﺳﺎﻳﺖ ﺑﻪ ﻳﺎﻳﺖ ﻭ ﺩﺳﺘﻴﺎﺑﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ( ﺍﺳﺖ .ﺍﻳﻨﺘﺮﻓﻴﺶ ﻫﺎﻱ
Tunnelﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺍﺭﺍﻱ ﺍﻣﮑﺎﻧﺎﺕ ﺣﻤﺎﻳﺘﻲ ﺍﺯ IPSecﺑﺎﺷﻨﺪ.
ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ VPNﺍﺯ ﻧﻮﻉ " ﺩﺳﺘﻴﺎﺑﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ " Tunneling ،ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ PPP
ﺍﻧﺠﺎﻡ ﻣﻲ ﮔﻴﺮﺩ PPP .ﺑﻪ ﻋﻨﻮﺍﻥ ﺣﻤﻞ ﮐﻨﻨﺪﻩ ﺳﺎﻳﺮ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ IPﺩﺭ ﺯﻣﺎﻥ ﺑﺮﻗﺮﺍﺭﻱ
ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﻳﮏ ﺳﻴﺴﺘﻢ ﻣﻴﺰﺑﺎﻥ ﻭ ﻳﮏ ﺳﻴﺴﺘﻢ ﺍﺯﻩ ﺩﻭﺭ ،ﻣﻮﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﻣﻲ ﮔﻴﺮﺩ.
ﻫﺮ ﻳﮏ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺯﻳﺮ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺎﺧﺘﺎﺭ ﺍﻭﻟﻴﻪ PPPﺍﻳﺠﺎﺩ ﻭ ﺗﻮﺳﻂ ﺷﺒﮑﻪ ﻫﺎﻱ
VPNﺍﺯ ﻧﻮﻉ " ﺩﺳﺘﻴﺎﺑﻲ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ " ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﻧﺪ:
. (Layer 2 Forwarding(F٢Lﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺗﻮﺳﻂ ﺳﻴﺴﮑﻮ ﺍﻳﺠﺎﺩ ﺷﺪﻩ •
ﺍﺳﺖ .ﺩﺭ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺍﺯ ﻣﺪﻝ ﻫﺎﻱ ﺗﻌﻴﻴﻦ ﺍﻋﺘﺒﺎﺭ ﮐﺎﺭﺑﺮ ﮐﻪ ﺗﻮﺳﻂ PPPﺣﻤﺎﻳﺖ
ﺷﺪﻩ ﺍﻧﺪ ،ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪ ﻩ ﺍﺳﺖ.
. (Point-to-Point Tunneling Protocol(PPTPﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ •
ﺗﻮﺳﻂ ﮐﻨﺴﺮﺳﻴﻮﻣﻲ ﻣﺘﺸﮑﻞ ﺍﺯ ﺷﺮﮐﺖ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ .ﺍﻳﻦ ﭘﺮﻭﺗﮑﻞ
ﺍﻣﮑﺎﻥ ﺭﻣﺰﻧﮕﺎﺭﻱ ٤٠ﺑﻴﺘﻲ ﻭ ١٢٨ﺑﻴﺘﻲ ﺭﺍ ﺩﺍﺭﺍ ﺑﻮﺩﻩ ﻭ ﺍﺯ ﻣﺪﻝ ﻫﺎﻱ ﺗﺎﺋﻴﺪ ﺍﻋﺘﺒﺎﺭ
ﮐﺎﺭﺑﺮ ﮐﻪ ﺗﻮﺳﻂ PPPﺣﻤﺎﻳﺖ ﻣﻲ ﮔﺮﺩﺩ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ.
259
. (Layer 2 Tunneling Protocol(L2TPﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺑﺎ ﻫﻤﮑﺎﺭﻱ •
ﭼﻨﺪﻳﻦ ﺷﺮﮐﺖ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺍﺯ ﻭﻳﮋﮔﻲ ﻫﺎﻱ PPTPﻭ L2F
ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩﻩ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ L2TPﺑﺼﻮﺭﺕ ﮐﺎﻣﻞ IPSecﺭﺍ ﺣﻤﺎﻳﺖ ﻣﻲ ﮐﻨﺪ.
ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﺗﻮﻧﻞ ﺑﻴﻦ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ :
-ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻭ ﺭﻭﺗﺮ
NAS -ﻭ ﺭﻭﺗﺮ
-ﺭﻭﺗﺮ ﻭ ﺭﻭﺗﺮ
ﻋﻤﻠﮑﺮﺩ Tunnelingﻣﺸﺎﺑﻪ ﺣﻤﻞ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺗﻮﺳﻂ ﻳﮏ ﮐﺎﻣﻴﻮﻥ ﺍﺳﺖ .ﻓﺮﻭﺷﻨﺪﻩ ،
ﭘﺲ ﺍﺯ ﺑﺴﺘﻪ ﺑﻨﺪﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ) ﭘﺮﻭﺗﮑﻞ ﻣﺴﺎﻓﺮ ( ﺩﺭﻭﻥ ﻳﮏ ﺟﻌﺒﻪ ) ﭘﺮﻭﺗﮑﻞ ﮐﭙﺴﻮﻟﻪ ﺳﺎﺯﻱ (
ﺁﻥ ﺭﺍ ﺗﻮﺳﻂ ﻳﮏ ﮐﺎﻣﻴﻮﻥ ) ﭘﺮﻭﺗﮑﻞ ﺣﻤﻞ ﮐﻨﻨﺪﻩ ( ﺍﺯ ﺍﻧﺒﺎﺭ ﺧﻮﺩ ) ﺍﻳﺘﺮﻓﻴﺲ ﻭﺭﻭﺩﻱ ﺗﻮﻧﻞ (
ﺑﺮﺍﻱ ﻣﺘﻘﺎﺿﻲ ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ.
ﮐﺎﻣﻴﻮﻥ ) ﭘﺮﻭﺗﮑﻞ ﺣﻤﻞ ﮐﻨﻨﺪﻩ ( ﺍﺯ ﻃﺮﻳﻖ ﺑﺰﺭﮔﺮﺍﻩ ) ﺍﻳﻨﺘﺮﻧﺖ ( ﻣﺴﻴﺮ ﺧﻮﺩ ﺭﺍ ﻃﻲ ،ﺗﺎ ﺑﻪ
ﻣﻨﺰﻝ ﺷﻤﺎ ) ﺍﻳﻨﺘﺮﻓﻴﺶ ﺧﺮﻭﺟﻲ ﺗﻮﻧﻞ ( ﺑﺮﺳﺪ .ﺷﻤﺎ ﺩﺭ ﻣﻨﺰﻝ ﺟﻌﺒﻪ ) ﭘﺮﻭﺗﮑﻞ ﮐﭙﺴﻮﻝ
ﺳﺎﺯﻱ ( ﺭﺍ ﺑﺎﺯ ﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ) ﭘﺮﻭﺗﮑﻞ ﻣﺴﺎﻓﺮ( ﺭﺍ ﺍﺯ ﺁﻥ ﺧﺎﺭﺝ ﻣﻲ ﻧﻤﺎﺋﻴﺪ.
260
ﺍﺷﺘﺮﺍﮎ ﻣﻨﺎﺑﻊ
ﻳﮑﻲ ﺍﺯ ﺍﻫﺪﺍﻑ ﺍﻭﻟﻴﻪ ﻭ ﻣﻬﻢ ﺩﺭﺑﺮﭘﺎﺳﺎﺯﻱ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ،ﺍﺷﺘﺮﺍﮎ ﻣﻨﺎﺑﻊ ﺍﺳﺖ.
ﻣﻨﺎﺑﻊ ﻣﻮﺟﻮﺩ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺩﻭ ﮔﺮﻭﻩ ﻋﻤﺪﻩ ﻣﻨﺎﺑﻊ ﻓﻴﺰﻳﮑﻲ )ﭼﺎﭘﮕﺮ( ﻭ ﻣﻨﺎﺑﻊ ﻣﻨﻄﻘﻲ ) ﻓﺎﻳﻞ
ﻫﺎ( ﺗﻘﺴﻴﻢ ﻣﻲ ﮔﺮﺩﻧﺪ .ﭘﺲ ﺍﺯ ﺍﻳﺠﺎﺩ ﻳﮏ ﺷﺒﮑﻪ ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺑﺴﺘﺮ ﺍﻳﺠﺎﺩ ﺷﺪﻩ
ﻋﻤﻠﻴﺎﺕ ﻣﺘﻔﺎﻭﺗﻲ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﺍﺩ:
ﺍﺷﺘﺮﺍﮎ ﻳﮏ ﭼﺎﭘﮕﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺗﻮﺳﻂ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ •
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺎﺯﻳﻬﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﮐﻪ ﭼﻨﺪﻳﻦ ﮐﺎﺭﺑﺮ ﺑﺼﻮﺭﺕ ﻫﻤﺰﻣﺎﻥ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺍﺯ ﺁﻥ •
ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ.
ﺍﺭﺳﺎﻝ ﺧﺮﻭﺟﻲ ﺩﺳﺘﮕﺎﻫﻬﺎﺋﻲ ﻧﻈﻴﺮ ﺩﻭﺭﺑﻴﻦ ﻫﺎﻱ ﻭﺏ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ •
ﺩﺭﺷﺒﮑﻪ
ﺑﻪ ﻣﻨﻈﻮﺭ ﺑﺮ ﭘﺎ ﺳﺎﺯﻱ ﻳﮏ ﺷﺒﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﮐﻮﭼﮏ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﻣﺮﺍﺣﻞ ﺯﻳﺮ ﺭﺍ ﺩﻧﺒﺎﻝ ﻧﻤﻮﺩ
:
ﺍﻧﺘﺨﺎﺏ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺟﻬﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺷﺒﮑﻪ .ﺍﺗﺮﻧﺖ ﺑﻪ ﻋﻨﻮﺍﻥ ﻣﻬﻤﺘﺮﻳﻦ •
ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺍﺭﺍﻱ ﻳﮏ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺑﺎﺷﻨﺪ.ﺩﺭ ﺻﻮﺭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﻮﭘﻮﻟﻮﮊﻱ ﺳﺘﺎﺭﻩ
)ﺩﺭ ﺣﺎﻝ ﺣﺎﺿﺮ ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﻧﻮﻉ ﺗﻮﭘﻮﻟﻮﮊﻱ ﺍﺳﺖ( ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﻳﮑﺪﺳﺘﮕﺎﻩ ﻫﺎﺏ ﻭ
ﺩﺭ ﻣﻮﺍﺭﺩ ﺣﺮﻓﻪ ﺍﻱ ﺗﺮ ﺍﺯ ﻳﮏ ﺩﺳﺘﮕﺎﻩ ﺳﻮﺋﻴﭻ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ .ﭘﺲ ﺍﺯ ﻧﺼﺐ ﻭ
ﭘﻴﮑﺮﺑﻨﺪﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﺭﺕ ﻫﺎﻱ ﺷﺒﮑﻪ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ،ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
ﮐﺎﺑﻞ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ) ﻋﻤﻮﻣﺎ" ﺍﺯ ﮐﺎﺑﻞ ﺑﻬﻢ ﺗﺎﺑﻴﺪﻩ Cat5ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ ( ﻫﺮ ﻳﮏ
ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺑﻪ ﻫﺎﺏ ﻭ ﻳﺎ ﺳﻮﺋﻴﭻ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ.
261
ﭘﻴﮑﺮﺑﻨﺪﻱ ﺳﻴﺴﺘﻢ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﻨﺎﺑﻊ ﻣﺸﺘﺮﮎ ﺩﺭ ﺳﻴﺴﺘﻢ :ﺍﻳﻦ ﻣﺮﺣـــﻠﻪ •
) ﭘﻴﮑﺮﺑﻨﺪﻱ ﺳﻴﺴﺘﻢ ( ،ﻳﮑﻲ ﺍﺯ ﻣﺮﺍﺣﻞ ﻣﻬﻢ ﺩﺭ ﺯﻣﻴﻨﻪ ﺁﻣﺎﺩﻩ ﺳﺎﺯﻱ ﺷﺒـــــﮑﻪ ﺑﺮﺍﻱ
ﺍﺳﺘﻔﺎﺩﻩ ﺗﻮﺳﻂ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺳﺖ.ﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﻋﻤﻠﻴﺎﺕ ﺯﻳﺮﺻﻮﺭﺕ ﭘﺬﻳﺮﺩ:
-ﻧﺎﻣﮕﺬﺍﺭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ
-ﺍﺷﺘﺮﺍﮎ ﻓﺎﻳﻞ ﻫﺎ
-ﺍﺷﺘﺮﺍﮎ ﭼﺎﭘﮕﺮ
-ﺍﻣﻨﻴﺖ
-ﺍﺷﺘﺮﺍﮎ ﺧﻂ ﺍﻳﻨﺘﺮﻧﺖ
ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﻪ ﺑﺮﺭﺳﻲ ﻧﺤﻮﻩ ﺍﻧﺠﺎﻡ ﻫﺮ ﻳﮏ ﺍﺯ ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﺧﻮﺍﻫﻴﻢ ﭘﺮﺩﺍﺧﺖ.
ﻧﺎﻣﮕﺬﺍﺭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ
ﻗﺒﻞ ﺍﺯ ﺍﻳﻨﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﮑﻲ ﺍﺯ ﮔﺮﻩ ﻫﺎﻱ ﺷﺒﮑﻪ ﻣﻄﺮﺡ ﮔﺮﺩﺩ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺮﺍﻱ ﺁﻥ
ﻧﺎﻡ ﻭ ﻳﮏ ﮔﺮﻭﻩ ﺭﺍ ﻣﺸﺨﺺ ﮐﺮﺩ .ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻣﻲ ﺑﺎﻳﺴﺖ
ﺩﺍﺭﺍﻱ ﻳﮏ ﻧﺎﻡ ﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ ﻭ ﻳﮏ ﻧﺎﻡ ﮔﺮﻭﻩ ﻳﮑﺴﺎﻥ ﺑﺎﺷﻨﺪ .ﺑﺮﺍﻱ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﻧﺎﻡ
ﮐﺎﻣﭙﻴﻮﺗﺮ ﻭ ﮔﺮﻭﻩ ،ﻋﻤﻠﻴﺎﺕ ﺯﻳﺮ ﺭﺍ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﻧﺠﺎﻡ ﺩﺍﺩ.
ﻣﺮﺣﻠﻪ ﺍﻭﻝ :ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﺋﻲ ﺑﺎ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻭﻳﻨﺪﻭﺯ ٩٨ﻭ ﻳﺎ ﻣﻴﻠﻴﻨﻴﻮﻡ ،ﻣﻮﺱ ﺭﺍ •
262
ﻣﺮﺣﻠﻪ ﺳﻮﻡ :ﭘﺲ ﺍﺯ ﻓﻌﺎﻝ ﺷﺪﻩ ﭘﻨﺠﺮﻩ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ،ﮔﺰﻳﻨﻪ Identificationﺭﺍ •
ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ .ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ﺳﻪ ﻓﻴﻠﺪ ﺍﻃﻼﻋﺎﺗﻲ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ.
ﻣﺮﺣﻠﻪ ﭼﻬﺎﺭﻡ :ﺩﺭﺍﻭﻟﻴﻦ ﻓﻴﻠﺪ ﺍﻃﻼﻋﺎﺗﻲ ،ﻧﺎﻡ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻭﺍﺭﺩ •
ﻧﻤﺎﺋﻴﺪ .ﻧﺎﻡ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﮐﺎﻣﻼ" ﺍﻧﺘﺨﺎﺑﻲ ﺍﺳﺖ ﻭ ﺗﻨﻬﺎ ﻣﺤﺪﻭﺩﻳﺖ ﻣﻮﺟﻮﺩ،
ﺗﮑﺮﺍﺭﻱ ﻧﺒﻮﺩﻥ ﺁﻥ ﺍﺳﺖ .ﺳﺎﻳﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻧﺒﺎﻳﺪ ﺍﺯ ﻧﺎﻡ ﻓﻮﻕ
ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩﻩ ﺑﺎﺷﻨﺪ.
ﻣﺮﺣﻠﻪ ﭘﻨﺠﻢ :ﺩﺭﺩﻭﻣﻴﻦ ﻓﻴﻠﺪ ﺍﻃﻼﻋﺎﺗﻲ ،ﻧﺎﻡ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺑﺮﺍﻱ ﮔﺮﻭﻩ ﺭﺍ ﻭﺍﺭﺩ •
263
) Neighborhoodﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺻﻔﺤﻪ ﺍﺻﻠﻲ( ﻗﺮﺍﺭﺩﺍﺩﻩ ﻭ ﮐﻠﻴﺪ ﺳﻤﺖ ﺭﺍﺳﺖ
ﻣﻮﺱ ﺭﺍ ﻓﻌﺎﻝ ﻧﻤﺎﺋﻴﺪ.ﮔﺰﻳﻨﻪ Propertiesﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﻣﻨﻮﻱ ﺩﺳﺘﻮﺭﺍﺕ ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ .ﺩﺭ
ﺍﺩﺍﻣﻪ ﭘﻨﺠﺮﻩ Network Propertiesﻓﻌﺎﻝ ﻣﻲ ﮔﺮﺩﺩ.
ﺩﺭ ﺍﺩﺍﻣﻪ ﮔﺰﻳﻨﻪ Configurationﻓﻌﺎﻝ ﻭ ﺩﺭ ﺑﺨﺶ ﭘﺎﻳﻴﻦ ﭘﻨﺠﺮﻩ ﻓﻮﻕ ،ﺍﻣﮑﺎﻥ Client
for Microsoft Networksﻣﻲ ﺑﺎﻳﺴﺖ ﻣﺸﺎﻫﺪﻩ ﮔﺮﺩﺩ .ﺯﻣﺎﻧﻴﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺑﻪ ﻋﻨﻮﺍﻥ
ﻳﮏ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ) (Clientﺩﺭ ﺷﺒﮑﻪ ﺍﻱ ﻣﻄﺮﺡ ﺑﺎﺷﺪ ،ﻗﺎﺩﺭ ﺑﻪ ﺗﺒﺎﺩﻝ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺎ ﺳﺎﻳﺮ
ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺯﻣﺎﻧﻴﮑﻪ ﻋﻤﻠﻴﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﭘﻴﮑﺮﺑﻨﺪﻱ ﻭ ﺗﻨﻈﻴﻢ
ﺷﺒﮑﻪ ﺩﺭ ﻭﻳﻨﺪﻭﺯﻫﺎﻱ ٩٨ﻭ ﻳﺎ ﻣﻴﻠﻴﻨﻴﻮﻡ ﺍﻧﺠﺎﻡ ﻣﻲ ﮔﻴﺮﺩ ،ﺍﻣﮑﺎﻥ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﺑﺼﻮﺭﺕ
ﺍﺗﻮﻣﺎﺗﻴﮏ ﺩﺭ ﺳﻴﺴﺘﻢ ﺍﺿﺎﻓﻪ ﺧﻮﺍﻫﺪ ﮔﺮﺩﻳﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﻣﮑﺎﻥ ﻓﻮﻕ ﺑﺼﻮﺭﺕ ﺍﺗﻮﻣﺎﺗﻴﮏ
ﺍﺿﺎﻓﻪ ﻧﺸﺪﻩ ﺑﺎﺷﺪ ،ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﺩﻧﺒﺎﻝ ﻧﻤﻮﺩﻥ ﻣﺮﺍﺣﻞ ﺯﻳﺮ ،ﺁﻥ ﺭﺍ ﻧﺼﺐ ﻧﻤﻮﺩ.
ﻧﻤﺎﺋﻴﺪ
ﻣﺮﺣﻠﻪ ﺩﻭﻡ :ﮔﺰﻳﻨﻪ Clientﺭﺍ ﺍﺯ ﻟﻴﺴﺖ ﺑﻨﻤﺎﻳﺶ ﺩﺭ ﺁﻣﺪﻩ ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ. •
ﻣﺮﺣﻠﻪ ﺳﻮﻡ :ﺑﺎ ﻓﻌﺎﻝ ﮐﺮﺩﻥ ﮔﺰﻳﻨﻪ Addﻟﻴﺴﺘﻲ ﺍﺯ ﺷﺮﮐﺖ ﻫﺎ ﻭ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ •
264
ﻣﺮﺣﻠﻪ ﭼﻬﺎﺭﻡ :ﮔﺰﻳﻨﻪ Microsoftﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﭘﺎﻧﻞ ﺳﻤﺖ ﭼﭗ ﺍﻧﺘﺨﺎﺏ ﻭ ﺩﺭ •
ﺍﺩﺍﻣﻪ ﻟﻴﺴﺘﻲ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻣﺎﻳﮑﺮﻭﺳﺎﻓﺖ ﺩﺭ ﭘﺎﻧﻞ ﺳﻤﺖ ﺭﺍﺳﺖ
ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﺧﻮﻭﺍﻫﻨﺪ ﺷﺪ.
ﻣﺮﺣﻠﻪ ﭘﻨﺠﻢ :ﺍﺯ ﻟﻴﺴﺖ ﻓﻮﻕ ،ﮔﺰﻳﻨﻪ Client for Microsoft Networksﺭﺍ •
ﺍﻧﺘﺨﺎﺏ ﻭ ﺩﮐﻤﻪ OKﺭﺍ ﻓﻌﺎﻝ ﻧﻤﺎﺋﻴﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻭﻳﻨﺪﻭﺯ ﺗﻤﺎﻡ ﻓﺎﻳﻞ ﻫﺎﻱ
ﺿﺮﻭﺭﻱ ﻭ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺭﺍ ﺑﺮ ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﺩﺍﺩ) ﺩﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ CD
ﻣﺮﺑﻮﻁ ﺑﻪ ﻭﻳﻨﺪﻭﺯ ﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺑﻮﺩ(
ﭘﺲ ﺍﺯ ﻧﺼﺐ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ،ﻣﻲ ﺗﻮﺍﻥ ﻋﻤﻠﻴﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﻓﺎﻳﻞ ﻫﺎ ﺭﺍ
ﺩﻧﺒﺎﻝ ﻧﻤﻮﺩ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﺩﺭ ﭘﻨﺠﺮﻩ ﺍﺻﻠﻲ ) ( Networkﺷﺒﮑﻪ ﻣﺴﺘﻔﺮ ﺷﺪﻩ ﻭ ﻣﺮﺍﺣﻞ ﺯﻳﺮ
ﺭﺍ ﺩﻧﺒﺎﻝ ﻧﻤﺎﺋﻴﺪ:
ﻣﺮﺣﻠﻪ ﺍﻭﻝ :ﺩﮐﻤﻪ ﻣﺮﺑﻮﻁ ﺑﻪ File and print sharingﺭﺍ ﻓﻌﺎﻝ ﻧﻤﺎﺋﻴﺪ •
ﻣﺮﺣﻠﻪ ﺩﻭﻡ :ﺩﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ ﺩﻭ ﺣﻖ ﺍﻧﺘﺨﺎﺏ ﻭﺟﻮﺩ ﺩﺍﺭﺩ .ﻳﮑﻲ ﺑﺮﺍﻱ ﺍﺷﺘﺮﺍﮎ ﻓﺎﻳﻞ ﻫﺎ •
ﻭ ﺩﻳﮕﺮﻱ ﺑﺮﺍﻱ ﺍﺷﺘﺮﺍﮎ ﭼﺎﭘﮕﺮ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻭﺿﻌﻴﺖ ﻣﻮﺟﻮﺩ ﺷﺒﮑﻪ ﻣﻲ ﺗﻮﺍﻥ ﻳﮏ ﻭ
ﻳﺎ ﻫﺮ ﺩﻭ ﺁﻳﺘﻢ ﺭﺍ ﺍﻧﺘﺨﺎﺏ ﮐﺮﺩ.
ﻣﺮﺣﻠﻪ ﺳﻮﻡ :ﭘﺲ ﺍﺯ ﺍﻧﺘﺨﺎﺏ ﻫﺮ ﻳﮏ ﺍﺯ ﮔﺰﻳﻨﻪ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ) ﻓﺎﻳﻞ ،ﭼﺎﭘﮕﺮ (، •
265
ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺍﺯ ﻓﺎﻳﻞ ﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ ،ﮔﺰﻳﻨﻪ Share-level Access Control
ﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ.
ﻣﺮﺣﻠﻪ ﭘﻨﺠﻢ :ﺑﺎ ﻓﻌﺎﻝ ﮐﺮﺩﻥ ﺩﮐﻤﻪ ، OKﭘﻨﺠﺮﻩ Networkﺑﺴﺘﻪ ﺧﻮﺍﻫﺪ ﺷﺪ. •
ﺩﺭ ﺍﺩﺍﻣﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﻓﻮﻟﺪﺭﻫﺎﺋﻲ ﺭﺍ ﮐﻪ ﻗﺼﺪ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﮔﺬﺍﺷﺘﻦ ﺁﻧﻬﺎ ﺭﺍ ﺩﺍﺭﻳﺪ ،ﻣﺸﺨﺺ
ﻧﻤﺎﺋﻴﺪ .ﺑﺎ ﺍﻳﺠﺎﺩ ﻓﻮﻟﺪﺭﻫﺎﻱ ﺩﻟﺨﻮﺍﻩ ﻭ ﺍﺳﺘﻘﺮﺍﺭ ﻓﺎﻳﻞ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ ﺩﺭﻫﺮ ﻳﮏ ﻣﻲ ﺗﻮﺍﻥ ﻳﮏ
ﺍﻧﻈﺒﺎﻁ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﺑﻌﺪ ﺫﺧﻴﺮﻩ ﺳﺎﺯﻱ ﺭﺍ ﺍﻳﺠﺎﺩ ﮐﺮﺩ .ﺑﺮﺍﻱ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﮔﺬﺍﺷﺘﻦ ﻳﮏ ﻓﻮﻟﺪﺭ
،ﺑﺮ ﺭﻭﻱ ﻓﻮﻟﺪﺭ ﻓﻮﻕ ﻣﺴﺘﻘﺮ ﻭ ﮐﻠﻴﺪ ﺳﻤﺖ ﺭﺍﺳﺖ ﻣﻮﺱ ﺭﺍ ﻓﻌﺎﻝ ﻧﻤﺎﺋﻴﺪ .ﮔﺰﻳﻨﻪ
Sharingﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﻣﻨﻮﻱ ﻣﺮﺑﻮﻃﻪ ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ ﭘﻨﺠﺮﻩ ﺍﻱ ﻓﻌﺎﻝ ﻣﻲ ﮔﺮﺩﺩ
ﮐﻪ ﺩﺭ ﺁﻥ ﺍﻣﮑﺎﻥ ﺍﻧﺘﺨﺎﺏ ﭼﻨﺪﻳﻦ ﺁﻳﺘﻢ ﻭﺟﻮﺩ ﺩﺍﺭﺩ .ﻣﻘﺪﺍﺭ ﭘﻴﺶ ﻓﺮﺽ ﺑﺮﺍﻱ Sharing
ﺑﺼﻮﺭﺕ Not Sharedﺍﺳﺖ .ﺑﺎ ﺗﻐﻴﻴﺮ ﻣﻘﺪﺍﺭ ﮔﺰﻳﻨﻪ ﻓﻮﻕ ﻭ ﺗﺒﺪﻳﻞ ﺁﻥ ﺑﻪ Shared As
ﻣﻲ ﺗﻮﺍﻥ ﺩﺭ ﻓﻴﻠﺪ ﺍﻃﻼﻋﺎﺗﻲ ، Name Shareﻧﺎﻡ ﺩﻟﺨﻮﺍﻩ ﺧﻮﺩ ﺭﺍ ﺑﺮﺍﻱ ﻓﻮﻟﺪﺭ ﺑﻪ ﺍﺷﺘﺮﺍﮎ
ﮔﺬﺍﺷﺘﻪ ﺷﺪﻩ ﻣﺸــﺨﺺ ﻧﻤﻮﺩ .ﻧﺎﻡ ﻓﻮﻕ ﻣﻲ ﺗــﻮﺍﻧﺪ ﺑﺎ ﻧﺎﻡ ﻭﺍﻗﻌﻲ ﻓﻮﻟﺪﺭ ﮐﺎﻣﻼ" ﻣﺘــﻔﺎﻭﺕ
ﻣﻲ ﺑﺎﺷﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻗﺒﻼ" ﮔﺰﻳﻨﻪ Share-level Access Controlﺭﺍ ﺍﻧﺘﺨﺎﺏ
ﮐﺮﺩﻩ ﺑﺎﺷﻴﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺭ ﺍﺩﺍﻣﻪ ﺳﻄﺢ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﻣﻨﻴﺘﻲ ) (Access Typeﺭﺍ ﻣﺸﺨﺺ
ﻭ ﺑﺮﺍﻱ ﺁﻥ ﻳﮏ ﺭﻣﺰ ﻋﺒﻮﺭ ﺭﺍ ﻧﻴﺰ ﻣﺸﺨﺺ ﻧﻤﻮﺩ .ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺭﻭﺵ Read-onlyﺑﺪﻳﻦ
ﻣﻔﻬﻮﻡ ﺍﺳﺖ ﮐﻪ ﻫﺮ ﮐﺎﺭﺑﺮ ﻗﺎﺩﺭ ﺑﻪ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻓﻮﻟﺪﺭ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﮑﻪ ﺑﻮﺩﻩ ﻭ ﺻﺮﻓﺎ" ﻗﺎﺩﺭ ﺑﻪ
ﻣﺸﺎﻫﺪﻩ ﻭ ﺑﺎﺯﻳﺎﺑﻲ ﻓﺎﻳﻞ ﻫﺎ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺍﻳﻦ ﻧﻮﻉ ﮐﺎﺭﺑﺮﺍﻥ ﻗﺎﺩﺭ ﺑﻪ ﺍﺳﺘﻘﺮﺍﺭ ﻓﺎﻳﻞ ﻫﺎﻱ ﺟﺪﻳﺪ
ﺩﺭ ﻓﻮﻟﺪﺭ ﻭ ﻳﺎ ﺣﺬﻑ ﻭ ﺍﺻﻼﺡ ﻓﺎﻳﻞ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻓﻮﻟﺪﺭ ﻧﺨﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ
ﺭﻭﺵ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻓﻮﻟﺪﺭ access Full ،ﺗﻌﻴﻴﻦ ﮔﺮﺩﺩ ،ﮐﺎﺭﺑﺮﺍﻥ ﻗﺎﺩﺭ ﺑﻪ ﻣﺸﺎﻫﺪﻩ ،ﻧﻮﺷﺘﻦ،
ﺍﻳﺠﺎﺩ ﻭ ﺣﺬﻑ ﻓﺎﻳﻞ ﺩﺭ ﻓﻮﻟﺪﺭ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﻮﻉ ﺭﻣﺰ ﻋﺒﻮﺭ ﻣﻲ ﺗﻮﺍﻥ
ﻫﺮ ﺩﻭ ﮔﺰﻳﻨﻪ ﺭﺍ ﺑﺼﻮﺭﺕ ﺷﻨﺎﻭﺭ ﻧﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ.
266
ﺍﺷﺘﺮﺍﮎ ﭼﺎﭘﮕﺮ
ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺷﺘﺮﺍﮎ ﻳﮏ ﭼﺎﭘﮕﺮ ﺩﺭ ﺍﺑﺘﺪﺍ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﺻﺤﺖ ﻋﻤﻠﻴﺎﺕ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﺧﺼﻮﺻﺎ"
ﻓﻌﺎﻝ ﺷﺪﻥ Sharing File and Printerﺍﻃﻤﻴﻨﺎﻥ ﺣﺎﺻﻞ ﮐﺮﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺎ ﺩﻧﺒـــﺎﻝ
ﻧﻤﻮﺩﻥ ﻣﺮﺍﺣﻞ ﺯﻳﺮ ﻣﻲ ﺗﻮﺍﻥ ﺑﺮﺍﻱ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﮔﺬﺍﺷﺘﻦ ﻳﮏ ﭼﺎﭘﮕﺮ ﻣﺮﺍﺣﻞ ﺯﻳﺮ ﺭﺍ ﺩﻧـــﺒﺎﻝ
ﻧﻤﻮﺩ.
ﻣﺮﺣﻠﻪ ﺍﻭﻝ :ﺍﺯ ﻃﺮﻳﻖ ﺩﮐﻤﻪ ، Startﮔﺰﻳﻨﻪ Settingﻭ ﺩﺭ ﺍﺩﺍﻣﻪ Printersﺭﺍ •
ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ.ﺩﺭ ﺍﺩﺍﻣﻪ ﭘﻨﺠﺮﻩ ﺍﻱ ﺷﺎﻣﻞ ﻟﻴﺴﺘﻲ ﺍﺯ ﺗﻤﺎﻡ ﭼﺎﭘﮕﺮﻫﺎﻱ ﻣﺤﻠﻲ ﻧﻤﺎﻳﺶ
ﺩﺍﺩﻩ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﻣﺮﺣﻠﻪ ﺩﻭﻡ :ﻣﻮﺱ ﺭﺍ ﺑﺮ ﺭﻭﻱ ﺁﻳﮑﻮﻥ ﭼﺎﭘﮕﺮﻱ ﮐﻪ ﻗﺼﺪ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﮔﺬﺍﺷﺘﻦ ﺁﻥ ﺭﺍ •
ﺩﺍﺭﻳﺪ ،ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﻭ ﮐﻠﻴﺪ ﺳﻤﺖ ﺭﺍﺳﺖ ﻣﻮﺱ ﺭﺍ ﻓﻌﺎﻝ ﻭ ﮔﺰﻳﻨﻪ Sharingﺭﺍ
ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ.
ﻣﺮﺣﻠﻪ ﺳﻮﻡ :ﺩﺭ ﺍﺩﺍﻣﻪ ﭘﻨﺠﺮﻩ Propertiesﻓﻌﺎﻝ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﻓﻴﻠﺪ ﺍﻃﻼﻋﺎﺗﻲ •
267
ﻣﺮﺣﻠﻪ ﭼﻬﺎﺭﻡ :ﺑﺎ ﻓﻌﺎﻝ ﮐﺮﺩﻥ ﺩﮐﻤﻪ ،OKﭘﻨﺠﺮﻩ ﻣﺮﺑﻮﻃﻪ ﺑﺴﺘﻪ ﺷﺪﻩ ﻭ ﭼﺎﭘﮕﺮ ﺑﻪ •
ﻣﺮﺣﻠﻪ ﺩﻭﻡ :ﻭﻳﺰﺍﺭﺩ) ﺑﺮﻧﺎﻣﻪ ﮐﻤﮑﻲ ( Add a Printerﺭﺍ ﻓﻌﺎﻝ ﻧﻤﺎﺋﻴﺪ. •
ﻣﺮﺣﻠﻪ ﺳﻮﻡ :ﮔﺰﻳﻨﻪ Network Printerﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻭ ﺩﮐﻤﻪ OKﺭﺍ ﻓﻌﺎﻝ ﻧﻤﺎﺋﻴﺪ. •
ﻣﺮﺣﻠﻪ ﭼﻬﺎﺭﻡ :ﻭﻳﺰﺍﺭﺩ ﻣﺮﺑﻮﻃﻪ ﺩﺭ ﺍﺩﺍﻣﻪ ﻟﻴﺴﺘﻲ ﺍﺯ ﭼﺎﭘﮕﺮﻫﺎﻱ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﮔﺬﺍﺷﺘﻪ •
ﺷﺪﻩ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﺭﺍ ﻧﻤﺎﻳﺶ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﭼﺎﭘﮕﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ
ﺍﻧﺘﺨﺎﺏ ﻭ ﺩﮐﻤﻪ Nextﺭﺍ ﻓﻌﺎﻝ ﻧﻤﺎﺋﻴﺪ .ﺩﺭ ﻧﻬﺎﻳﺖ ﻭﻳﺰﺍﺭﺩ ﻣﺮﺑﻮﻃﻪ ﺩﺭﺍﻳﻮﺭ ﻣﻮﺭﺩ ﻧﻈﺮ
ﺭﺍ ﻧﺼﺐ ﺧﻮﺍﻫﺪ ﮐﺮﺩ ) .ﺩﺭ ﺑﺮﺧﻲ ﺣﺎﻻﺕ ﻣﻤﮑﻦ ﺍﺳﺖ ﻧﻴﺎﺯ ﺑﻪ CDﻭ ﻳﺎ ﺩﻳﺴﮑﺖ
ﺣﺎﻭﻱ ﺩﺭﺍﻳﻮﺭ ﭼﺎﭘﮕﺮ ﻭﺟﻮﺩ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ(
268
ﺍﺷﺘﺮﺍﮎ ﺧﻂ ﺍﻳﻨﺘﺮﻧﺖ
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺭﺷﺪ ﺷﺒﮑﻪ ﻫﺎ ﻱ ﮐﻮﭼﮏ ،ﺷﺮﮐﺖ ﻣﺎﻳﮑﺮﻭﺳﺎﻓﺖ ﺍﺯ ﻧﺴﺨﻪ ﻭﻳﻨﺪﻭﺯ
CE٩٨ﺑﻪ ﺑﻌﺪ ﺍﻣﮑﺎﻧﻲ ﺑﺎ ﻧﺎﻡ (Internet Connection Sharing(ICSﺭﺍ ﺍﺿﺎﻓﻪ
ﻧﻤﻮﺩﻩ ﺍﺳﺖ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ICSﻣﻲ ﺗﻮﺍﻥ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺭﺍ ﮐﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮑﻲ ﺍﺯ ﺭﻭﺵ
ﻫﺎﻱ ﺭﺍﻳﺞ ﻧﻈﻴﺮ :ﻣﻮﺩﻡ ISDN ،DSL ،ﻭ ﻳﺎ ﮐﺎﺑﻞ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﺍﺳﺖ ،ﺑﻪ ﺍﺷﺘﺮﺍﮎ
ﮔﺬﺍﺷﺖ .ﻭﻳﻨﺪﻭﺯ CE٩٨ﻭ ﺳﺎﻳﺮ ﻧﺴﺨﻪ ﻫﺎﻱ ﻭﻳﻨﺪﻭﺯ ﺩﺍﺭﺍﻱ ﻳﮏ ﻭﻳﺰﺍﺭﺩ ﺑﻪ ﻣﻨﻈﻮﺭ ﻓﻌﺎﻝ
ﮐﺮﺩﻥ ﺍﻣﮑﺎﻥ ﻓﻮﻕ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻋﻨﺎﺻﺮ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ICSﺑﺼﻮﺭﺕ ﭘﻴﺶ ﻓﺮﺽ ﺑﺮ
ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻧﺼﺐ ﻧﻤﻲ ﮔﺮﺩﻧﺪ .ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﮐﻪ ﺍﻣﮑﺎﻥ ﻓﻮﻕ ﺻﺮﻓﺎ" ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺮ
ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﮐﻪ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ ﺍﺳﺖ ،ﻓﻌﺎﻝ ﮔﺮﺩﺩ .ﺑﺮﺍﻱ ﻓﻌﺎﻝ ﻧﻤﻮﺩﻥ ﺍﻣﮑﺎﻥ ﻓﻮﻕ
) ﺑﺮ ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﺋﻲ ﮐﻪ ﺍﺯ ﻧﺴﺨﻪ ﻭﻳﻨﺪﻭﺯ CE٩٨ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ( ﻣﻲ ﺑﺎﻳﺴﺖ ﻣﺮﺍﺣﻞ
ﺯﻳﺮ ﺭﺍ ﺩﻧﺒﺎﻝ ﮐﺮﺩ:
ﻣﺮﺣﻠﻪ ﺍﻭﻝ :ﺍﺯ ﻃﺮﻳﻖ ، Control PanelﮔﺰﻳﻨﻪPrograms Add/Remove •
ﺩﺭ ﺍﺩﺍﻣﻪ ﮐﻠﻴﺪ Nextﺭﺍ ﻓﻌﺎﻝ ﻧﻤﺎﺋﻴﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ICSﭘﻴﮑﺮﺑﻨﺪﻱ ﻧﺸﺪﻩ ﺑﺎﺷﺪ،
ﺑﺮﻧﺎﻣﻪ ﮐﻤﮑﻲ ) ﻭﻳﺰﺍﺭﺩ( ﻣﺮﺑﻮﻁ ﺑﻪ ICSﻓﻌﺎﻝ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﻣﻲ ﺗﻮﺍﻥ ﻋﻤﻠﻴﺎﺕ
ﭘﻴﮑﺮﺑﻨﺪﻱ ﻻﺯﻡ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﺍﺩ.
ﻣﺮﺣﻠﻪ ﭼﻬﺎﺭﻡ :ﭘﺲ ﺍﺯ ﺍﺧﺬ ﺍﻃﻼﻋﺎﺕ ﺿﺮﻭﺭﻱ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﮐﻪ ICSﺑﺮ •
ﺭﻭﻱ ﺁﻥ ﻓﻌﺎﻝ ﺷﺪﻩ ﺍﺳﺖ ،ﻭﻳﺰﺍﺭﺩ ﻣﺮﺑﻮﻃﻪ ﻧﻴﺎﺯ ﺑﻪ ﻳﮏ ﻋﺪﺩ ﺩﻳﺴﮑﺖ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ.
ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺑﺮ ﺭﻭﻱ ﺩﻳﺴﮑﺖ ﻓﻮﻕ ﺑﻪ ﻣﻨﻈﻮﺭ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺳﺎﻳﺮ
ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﮐﻪ ﺗﻤﺎﻳﻞ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺮﻭﻳﺲ ICSﺭﺍ ﺩﺍﺷﺘﻪ
ﺑﺎﺷﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
269
ﻣﺮﺍﺣﻞ ﻓﻌﺎﻝ ﻧﻤﻮﺩﻥ ﺳﺮﻭﻳﺲ ICSﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﺋﻲ ﮐﻪ ﺍﺯ ﻭﻳﻨﺪﻭﺯ ٢٠٠٠ﻭ ﻳﺎ XPﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ ﺑﻤﺮﺍﺗﺐ ﺭﺍﺣﺖ ﺗﺮ ﺍﺯ ﻣﺮﺍﺣﻞ ﮔﻔﺘﻪ ﺷﺪﻩ ﻓﻮﻕ ﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﭘﺲ ﺍﺯ ﺍﻳﺠﺎﺩ
ﻳﮏ ، Dial-upﺑﺎ ﺍﻧﺘﺨﺎﺏ ﺁﻥ ﻭ ﻓﻌﺎﻝ ﮐﺮﺩﻥ ﮐﻠﻴﺪ ﺳﻤﺖ ﺭﺍﺳﺖ ،ﮔﺰﻳﻨﻪ Propertiesﺭﺍ
ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ ﭘﻨﺠﺮﻩ Dial-up Connection propertiesﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ
ﻣﻲ ﺷﻮﺩ.
ﺑﺮﺍﻱ ﺍﺷﺘﺮﺍﮎ ﺧﻄﻲ ﺍﺭﺗﺒﺎﻁ ﮔﺰﻳﻨﻪ " "Sharingﺭﺍ ﺍﻧﺘﺨﺎﺏ ﻧﻤﺎﺋﻴﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ ﮔﺰﻳﻨﻪ
" "Enable internet connection sharing for this connectionﺭﺍ
ﺍﻧﺘﺨﺎﺏ ﻭ ﺳﺎﻳﺮ ﻣﻮﺍﺭﺩ ﻭ ﻋﻤﻠﻴﺎﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺑﺼﻮﺭﺕ ﺍﺗﻮﻣﺎﺗﻴﮏ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ.
270
ﻫﺎﺏ ﻭ ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ ﺁﻥ
271
ﻣﻲ ﻧﻤﺎﻳﻨﺪ ﻭﻟﻲ ﺩﺭ ﺧﺼﻮﺹ broadcast doaminﺑﺪﻳﻦ ﺷﮑﻞ ﺭﻓﺘﺎﺭ ﻧﻤﻲ ﻧﻤﺎﻳﻨﺪ.
ﺭﻭﺗﺮﻫﺎ broadcast domain ،ﻭ domain collisionﻣﺠﺰﺍﺋﻲ ﺭﺍ ﺍﻳﺠﺎﺩ ﻧﻤﻮﺩﻩ ﻭ
ﺩﺭ ﻣﻘﺎﺑﻞ ﻫﺎﺏ ،ﻗﺎﺩﺭ ﺑﻪ ﺍﻳﺠﺎﺩ broadcast doaminﻭ domain Collision
ﺟﺪﺍﮔﺎﻧﻪ ﻧﻤﻲ ﺑﺎﺷﺪ .ﺷﮑﻞ ﺯﻳﺮ ﻳﮏ ﻧﻤﻮﻧﻪ ﻫﺎﺏ ﻫﺸﺖ ﭘﻮﺭﺕ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ
) .( D-Link DE-808TP 10Mbps Ethernet 8-Port Mini-Hub
272
ﻫﺎﺏ ﻫﺎ ﺑﻪ ﻣﺘﺪﺍﻭﻟﻲ ﺍﻣﺮﻭﺯ ﻧﺒﻮﺩﻧﺪ ﻭ ﻗﻴﻤﺖ ﺁﻧﺎﻥ ﻧﻴﺰ ﮔﺮﺍﻥ ﺑﻮﺩ ،ﺩﺭ ﺍﮐﺜﺮ ﺷﺒﮑﻪ ﻫﺎﻱ ﻧﺼﺐ
ﺷﺪﻩ ﺩﺭ ﺍﺩﺍﺭﺍﺕ ﻭ ﻳﺎ ﻣﻨﺎﺯﻝ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ﮐﻮﺍﮐﺴﻴﺎﻝ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﻳﺪ.
ﻧﺤﻮﻩ ﮐﺎﺭ ﻫﺎﺏ ﺑﺴﻴﺎﺭ ﺳﺎﺩﻩ ﺍﺳﺖ .ﺯﻣﺎﻧﻲ ﮐﻪ ﻳﮑﻲ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ ﻫﺎﺏ ﺍﻗﺪﺍﻡ
ﺑﻪ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺋﻲ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺳﺎﻳﺮ ﭘﻮﺭﺕ ﻫﺎﻱ ﻫﺎﺏ ﻧﻴﺰ ﺁﻥ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ )ﺩﺍﺩﻩ
ﺍﺭﺳﺎﻟﻲ ﺗﮑﺮﺍﺭ ﻭ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﭘﻮﺭﺕ ﻫﺎﻱ ﻫﺎﺏ ﻧﻴﺰ ﻓﺮﺳﺘﺎﺩﻩ ﻣﻲ ﺷﻮﺩ( .ﺷﮑﻞ ﺯﻳﺮ ﻧﺤﻮﻩ
ﻋﻤﻠﮑﺮﺩ ﻫﺎﺏ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ.
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﺩﺭ ﺷﮑﻞ ﻓﻮﻕ ﻣﺸﺎﻫﺪﻩ ﻣﻲ ﻧﻤﺎﺋﻴﺪ ،ﮔﺮﻩ ﻳﮏ ﺩﺍﺩﻩ ﺋﻲ ﺭﺍ ﺑﺮﺍﻱ ﮔﺮﻩ ﺷﺶ
ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ ﻭﻟﻲ ﺗﻤﺎﻣﻲ ﮔﺮﻩ ﻫﺎﻱ ﺩﻳﮕﺮ ﻧﻴﺰ ﺩﺍﺩﻩ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ،
ﺑﺮﺭﺳﻲ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺩﺍﺩﻩ ﺍﺭﺳﺎﻟﻲ ﺗﻮﺳﻂ ﻫﺮ ﻳﮏ ﺍﺯ ﮔﺮﻩ ﻫﺎ ﺍﻧﺠﺎﻡ ﻭ ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ
ﺗﺸﺨﻴﺺ ﺩﺍﺩﻩ ﺷﻮﺩ ﮐﻪ ﺩﺍﺩﻩ ﺍﺭﺳﺎﻟﻲ ﻣﺘﻌﻠﻖ ﺑﻪ ﺁﻧﺎﻥ ﻧﻴﺴﺖ ،ﺁﻥ ﺭﺍ ﻧﺎﺩﻳﺪﻩ ﺧﻮﺍﻫﻨﺪ ﮔﺮﻓﺖ.
ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﺍﺯ ﻃﺮﻳﻖ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﮐﻪ ﺁﺩﺭﺱ MACﻣﻘﺼﺪ
ﻓﺮﻳﻢ ﺍﺭﺳﺎﻟﻲ ﺭﺍ ﺑﺮﺭﺳﻲ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺍﻧﺠﺎﻡ ﻣﻲ ﺷﻮﺩ .ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺑﺮﺭﺳﻲ ﻻﺯﻡ ﺭﺍ ﺍﻧﺠﺎﻡ ﻭ ﺩﺭ
ﺻﻮﺭﺕ ﻋﺪﻡ ﻣﻄﺎﺑﻘﺖ ﺁﺩﺭﺱ MACﻣﻮﺟﻮﺩ ﺩﺭ ﻓﺮﻳﻢ ،ﺑﺎ ﺁﺩﺭﺱ MACﮐﺎﺭﺕ ﺷﺒﮑﻪ ،ﻓﺮﻳﻢ
ﺍﺭﺳﺎﻟﻲ ﺩﻭﺭ ﺍﻧﺪﺍﺧﺘﻪ ﻣﻲ ﮔﺮﺩﺩ.
ﺍﮐﺜﺮ ﻫﺎﺏ ﻫﺎ ﺩﺍﺭﺍﻱ ﻳﮏ ﭘﻮﺭﺕ ﺧﺎﺹ ﻣﻲ ﺑﺎﺷﻨﺪ ﮐﻪ ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﻪ ﺻﻮﺭﺕ ﻳﮏ ﭘﻮﺭﺕ
ﻣﻌﻤﻮﻟﻲ ﻭ ﻳﺎ ﻳﮏ ﭘﻮﺭﺕ uplinkﺭﻓﺘﺎﺭ ﻧﻤﺎﻳﺪ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﭘﻮﺭﺕ uplinkﻣﻲ ﺗﻮﺍﻥ
ﻳﮏ ﻫﺎﺏ ﺩﻳﮕﺮ ﺭﺍ ﺑﻪ ﻫﺎﺏ ﻣﻮﺟﻮﺩ ،ﻣﺘﺼﻞ ﻧﻤﻮﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺗﻌﺪﺍﺩ ﭘﻮﺭﺕ ﻫﺎ ﺍﻓﺰﺍﻳﺶ
ﻳﺎﻓﺘﻪ ﻭ ﺍﻣﮑﺎﻥ ﺍﺗﺼﺎﻝ ﺗﻌﺪﺍﺩ ﺑﻴﺸﺘﺮﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺷﺒﮑﻪ ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ.
273
ﺭﻭﺵ ﻓﻮﻕ ﮔﺰﻳﻨﻪ ﺍﻱ ﺍﺭﺯﺍﻥ ﻗﻴﻤﺖ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻓﺰﺍﻳﺶ ﺗﻌﺪﺍﺩ ﮔﺮﻩ ﻫﺎ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺍﺳﺖ ﻭﻟﻲ
ﺑﺎ ﺍﻧﺠﺎﻡ ﺍﻳﻦ ﮐﺎﺭ ﺷﺒﮑﻪ ﺷﻠﻮﻍ ﺗﺮ ﺷﺪﻩ ﻭ ﻫﻤﻮﺍﺭﻩ ﺑﺮ ﺭﻭﻱ ﺁﻥ ﺣﺠﻢ ﺑﺎﻻﺋﻲ ﺩﺍﺩﻩ ﻏﻴﺮ ﺿﺮﻭﺭﻱ
ﺩﺭ ﺣﺎﻝ ﺟﺎﺑﺠﺎﺋﻲ ﺍﺳﺖ .ﺗﻤﺎﻣﻲ ﮔﺮﻩ ﻫﺎ ،ﻋﻀﻮﺀ ﻳﮏ Broadcast domainﻭ
collision domainﻳﮑﺴﺎﻧﻲ ﻣﻲ ﺑﺎﺷﻨﺪ ،ﺑﻨﺎﺑﺮﺍﻳﻦ ﺗﻤﺎﻣﻲ ﺁﻧﺎﻥ ﻫﺮ ﻧﻮﻉ collisionﻭ ﻳﺎ
Broadcastﺭﺍ ﮐﻪ ﺍﺗﻔﺎﻕ ﺧﻮﺍﻫﺪ ﺍﻓﺘﺎﺩ ،ﻣﻲ ﺷﻨﻮﻧﺪ.
ﺩﺭ ﺍﮐﺜﺮ ﻫﺎﺏ ﻫﺎ ﺍﺯ ﻳﮏ LEDﺑﻪ ﻣﻨﻈﻮﺭ ﻧﺸﺎﻥ ﺩﺍﺩﻥ ﻓﻌﺎﻝ ﺑﻮﺩﻥ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﺷﺪﻩ ﺑﻴﻦ
ﻫﺎﺏ ﻭ ﮔﺮﻩ ﻭ ﺍﺯ LEDﺩﻳﮕﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﻧﺸﺎﻥ ﺩﺍﺩﻥ ﺑﺮﻭﺯ ﻳﮏ ، collisionﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﮔﺮﺩﺩ ) .ﺩﻭ LEDﻣﺠﺰﺍﺀ ( .ﺩﺭ ﺑﺮﺧﻲ ﺍﺯ ﻫﺎﺏ ﻫﺎ ﺩﻭ LEDﻣﺮﺑﻮﻁ ﺑﻪ ﻓﻌﺎﻝ ﺑﻮﺩﻥ
ﻟﻴﻨﮏ ﺍﺭﺗﺒﺎﻃﻲ ﺑﻴﻦ ﻫﺎﺏ ﻭ ﮔﺮﻩ ﻭ ﻓﻌﺎﻟﻴﺖ ﭘﻮﺭﺕ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺗﺮﮐﻴﺐ ﻭ ﺯﻣﺎﻧﻲ ﮐﻪ ﭘﻮﺭﺕ ﺩﺭ
ﺣﺎﻝ ﻓﻌﺎﻟﻴﺖ ﺍﺳﺖ LED ،ﻣﺮﺑﻮﻃﻪ ﭼﺸﻤﮏ ﺯﻥ ﺷﺪﻩ ﻭ ﺯﻣﺎﻧﻲ ﮐﻪ ﻓﻌﺎﻟﻴﺘﻲ ﺍﻧﺠﺎﻡ ﻧﻤﻲ ﺷﻮﺩ،
LEDﻓﻮﻕ ﺑﻪ ﺻﻮﺭﺕ ﭘﻴﻮﺳﺘﻪ ﺭﻭﺷﻦ ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
274
ﺳﻮﺋﻴﭻ
ﭼﺎﭘﮕﺮ ﻭ ( ...
ﺳﮕﻤﻨﺖ .ﺳﮕﻤﻨﺖ ﻳﮏ ﺑﺨﺶ ﺧﺎﺹ ﺍﺯ ﺷﺒﮑﻪ ﺑﻮﺩﻩ ﮐﻪ ﺗﻮﺳﻂ ﻳﮏ ﺳﻮﺋﻴﭻ ،ﺭﻭﺗﺮ ﻭ •
275
ﺳﮕﻤﻨﺖ ﻫﺎﻱ ﺷﺒﮑﻪ ﺍﺳﺖ .ﻣﺜﻼ" ﻣﻤﮑﻦ ﺍﺳﺖ ﻧﺮﺥ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ
ﺷﺒﮑﻪ ١٠٠ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺑﻮﺩﻩ ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻧﺮﺥ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻫﺮ ﺳﮕﻤﻨﺖ
١٠ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺑﺎﺷﺪ.
ﺗﻮﭘﻮﻟﻮﮊﻱ .ﺭﻭﺷﻲ ﮐﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﮔﺮﻩ ﻫﺎ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ ﺭﺍ ﮔﻮﻳﻨﺪ. •
ﮐﺎﺭﺕ ﺷﺒﮑﻪ .ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺑﻪ ﺷﺒﮑﻪ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ.ﺩﺭ •
ﺍﮐﺜﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺷﺨﺼﻲ ،ﮐﺎﺭﺕ ﻓﻮﻕ ﺍﺯ ﻧﻮﻉ ﺍﺗﺮﻧﺖ ﺑﻮﺩﻩ ) ﺩﺍﺭﺍﻱ ﺳﺮﻋﺖ ١٠ﻭ ﻳﺎ
١٠٠ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ( ﻭ ﺩﺭ ﻳﮑﻲ ﺍﺯ ﺍﺳﻼﺕ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺭﻭﻱ ﺑﺮﺩ ﺍﺻﻠﻲ ﺳﻴﺴﺘﻢ،
ﻧﺼﺐ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺁﺩﺭﺱ . MACﺁﺩﺭﺱ ﻓﻴﺰﻳﮑﻲ ﻫﺮ ﺩﺳﺘﮕﺎﻩ ) ﮐﺎﺭﺕ ﺷﺒﮑﻪ ( ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺖ .ﺁﺩﺭﺱ •
ﻓﻮﻕ ﻳﮏ ﻋﺪﺩ ﺷﺶ ﺑﺎﻳﺘﻲ ﺑﻮﺩﻩ ﮐﻪ ﺳﻪ ﺑﺎﻳﺖ ﺍﻭﻝ ﺁﻥ ﻣﺸﺨﺺ ﮐﻨﻨﺪﻩ ﺳﺎﺯﻧﺪﻩ ﮐﺎﺭﺕ
ﺷﺒﮑﻪ ﻭ ﺳﻪ ﺑﺎﻳﺖ ﺩﻭﻡ ،ﺷﻤﺎﺭﻩ ﺳﺮﻳﺎﻝ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺍﺳﺖ.
. Unicastﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺗﻮﺳﻂ ﻳﮏ ﮔﺮﻩ ﺑﺎ ﺁﺩﺭﺱ ﺧﺎﺹ ﻭ ﺩﺭﻳﺎﻓﺖ •
ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻮﺋﻴﭻ
ﺩﺭ ﺍﮐﺜﺮ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺘﺪﺍﻭﻝ ،ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﮔﺮﻩ ﻫﺎ ﺍﺯ ﻫﺎﺏ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ .ﻫﻤﺰﻣﺎﻥ ﺑﺎ
ﺭﺷﺪ ﺷﺒﮑﻪ ) ﺗﻌﺪﺍﺩ ﮐﺎﺭﺑﺮﺍﻥ ،ﺗﻨﻮﻉ ﻧﻴﺎﺯﻫﺎ ،ﮐﺎﺭﺑﺮﺩﻫﺎﻱ ﺟﺪﻳﺪ ﺷﺒﮑﻪ ﻭ (...ﻣﺸﮑﻼﺗﻲ ﺩﺭ
ﺷﺒﮑﻪ ﻫﺎﻱ ﻓﻮﻕ ﺑﻮﺟﻮﺩ ﻣﻲ ﺁﻳﺪ:
276
. Scalabilityﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﻣﺒﺘﻨﻲ ﺑﺮ ﻫﺎﺏ ،ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺑﺼﻮﺭﺕ ﻣﺸﺘﺮﮎ •
ﺗﻮﺳﻂ ﮐﺎﺭﺑﺮﺍﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺤﺪﻭﺩ ﺑﻮﺩﻥ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ،ﻫﻤﺰﻣﺎﻥ ﺑﺎ
ﺗﻮﺳﻌﻪ ،ﮐﺎﺭﺁﺋﻲ ﺷﺒﮑﻪ ﺑﺸﺪﺕ ﺗﺤﺖ ﺗﺎﺛﻴﺮ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﮔﺮﻓﺖ .ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ
ﮐﻪ ﺍﻣﺮﻭﺯﻩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺟﺮﺍﺀ ﺑﺮ ﺭﻭﻱ ﻣﺤﻴﻂ ﺷﺒﮑﻪ ،ﻃﺮﺍﺣﻲ ﻣﻲ ﮔﺮﺩﻧﻨﺪ ﺑﻪ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ
ﻣﻨﺎﺳﺒﻲ ﻧﻴﺎﺯ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺷﺖ .ﻋﺪﻡ ﺗﺎﻣﻴﻦ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻣﻮﺭﺩ ﻧﻴﺎﺯﺑﺮﻧﺎﻣﻪ ﻫﺎ ،ﺗﺎﺛﻴﺮ ﻣﻨﻔﻲ
ﺩﺭ ﻋﻤﻠﮑﺮﺩ ﺁﻧﻬﺎ ﺭﺍ ﺑﺪﻧﺒﺎﻝ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ.
. Latencyﺑﻪ ﻣﺪﺕ ﺯﻣﺎﻧﻲ ﮐﻪ ﻃﻮﻝ ﺧﻮﺍﻫﺪ ﮐﺸﻴﺪ ﺗﺎ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﻣﻘﺼﺪ •
ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﺑﺮﺳﺪ ،ﺍﻃﻼﻕ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﻫﺮ ﮔﺮﻩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ
ﻣﺒﺘﻨﻲ ﺑﺮ ﻫﺎﺏ ﻣﻲ ﺑﺎﻳﺴﺖ ﻣﺪﺕ ﺯﻣﺎﻧﻲ ﺭﺍ ﺩﺭ ﺍﻧﺘﻈﺎﺭ ﺳﭙﺮﻱ ﮐﺮﺩﻩ )ﻣﻤﺎﻧﻌﺖ ﺍﺯ ﺗﺼﺎﺩﻡ
ﺍﻃﻼﻋﺎﺕ( ،ﺑﻤﻮﺍﺯﺍﺕ ﺍﻓﺰﺍﻳﺶ ﺗﻌﺪﺍﺩ ﮔﺮﻩ ﻫﺎ ﺩﺭ ﺷﺒﮑﻪ ،ﻣﺪﺕ ﺯﻣﺎﻥ ﻓﻮﻕ ﺍﻓﺰﺍﻳﺶ
ﺧﻮﺍﻫﺪ ﻳﺎﻓﺖ .ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻳﮑﻲ ﺍﺯ ﮐﺎﺭﺑﺮﺍﻥ ﻓﺎﻳﻞ ﺑﺎ ﻇﺮﻓﻴﺖ
ﺑﺎﻻﺋﻲ ﺭﺍ ﺑﺮﺍﻱ ﮐﺎﺭﺑﺮ ﺩﻳﮕﺮ ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﺪ ،ﺗﻤﺎﻡ ﮐﺎﺭﺑﺮﺍﻥ ﺩﻳﮕﺮ ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺭ ﺍﻧﺘﻈﺎﺯ
ﺁﺯﺍﺩ ﺷﺪﻥ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺎﺷﻨﺪ .ﺑﻬﺮﺣﺎﻝ ﺍﻓﺰﺍﻳﺶ ﻣﺪﺕ
ﺯﻣﺎﻧﻲ ﮐﻪ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﻣﻘﺼﺪ ﺧﻮﺩ ﺑﺮﺳﺪ ،ﻫﺮﮔﺰ ﻣﻮﺭﺩ ﻧﻈﺮ ﮐﺎﺭﺑﺮﺍﻥ ﻳﮏ
ﺷﺒﮑﻪ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ.
. Failure Networkﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﻫﺎﺏ ،ﻳﮑﻲ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ •
ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ ﻫﺎﺏ ﻗﺎﺩﺭ ﺑﻪ ﺍﻳﺠﺎﺩ ﻣﺴﺎﺋﻞ ﻭ ﻣﺸﮑﻼﺗﻲ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ
ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﻋﺎﻣﻞ ﺑﺮﻭﺯ ﺍﺷﮑﺎﻝ ﻣﻲ ﺗﻮﺍﻧﺪ ﻋﺪﻡ ﺗﻨﻈﻴﻢ ﻣﻨﺎﺳﺐ
ﺳﺮﻋﺖ )ﻣﺜﻼ" ﺗﻨﻈﻴﻢ ﺳﺮﻋﺖ ﻳﮏ ﻫﺎﺏ ﺑﺎ ﻗﺎﺑﻠﻴﺖ ١٠ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺑﻪ ١٠٠
ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ( ﻭ ﻳﺎ ﺍﺭﺳﺎﻝ ﺑﻴﺶ ﺍﺯ ﺣﺪ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﻧﻮﻉ
، Broadcastﺑﺎﺷﺪ.
. Collisionsﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺗﮑﻨﻮﻟﻮﮊﻱ ﺍﺗﺮﻧﺖ ﺍﺯ ﻓﺮﺁﻳﻨﺪﻩ ﺧﺎﺻﻲ ﺑﺎ •
ﻧﺎﻡ CSMA/CDﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ﻧﺤﻮﻩ
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﻗﺎﻧﻮﻧﻤﻨﺪ ﻣﻲ ﻧﻤﺎﻳﺪ.
277
ﺩﺭ ﭼﻨﻴﻦ ﺷﺒﮑﻪ ﻫﺎﺋﻲ ﺗﺎ ﺯﻣﺎﻧﻴﮑﻪ ﺑﺮ ﺭﻭﻱ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺗﺮﺍﻓﻴﮏ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺎﺷﺪ ،ﮔﺮﻩ •
ﺍﻱ ﺩﻳﮕﺮ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺩﻭ ﮔﺮﻩ ﺩﺭ ﻳﮏ
ﻟﺤﻈﻪ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻧﻤﺎﻳﻨﺪ ،ﻳﮏ ﺗﺼﺎﺩﻡ ﺍﻃﻼﻋﺎﺗﻲ ﺍﻳﺠﺎﺩ ﻭ ﻋﻤﻼ" ﺑﺴﺘﻪ
ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺭﺳﺎﻟﻲ ﺗﻮﺳﻂ ﻫﺮ ﻳﮏ ﺍﺯ ﮔﺮﻩ ﻫﺎ ﻧﻴﺰ ﺍﺯ ﺑﻴﻦ ﺧﻮﺍﻫﻨﺪ ﺭﻓﺖ .ﻫﺮ ﻳﮏ
ﺍﺯ ﮔﺮﻩ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ) ﺗﺼﺎﺩﻡ ﮐﻨﻨﺪﻩ ( ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻤﺪﺕ ﺯﻣﺎﻥ ﮐﺎﻣﻼ" ﺗﺼﺎﺩﻓﻲ ﺩﺭ
ﺍﻧﺘﻈﺎﺭ ﺑﺎﻗﻲ ﻣﺎﻧﺪﻩ ﻭ ﭘﺲ ﺍﺯ ﻓﺮﺍﻫﻢ ﺷﺪﻥ ﺷﺮﺍﻳﻂ ﺍﺭﺳﺎﻝ ،ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ
ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﻧﻤﺎﻳﻨﺪ.
ﻫﺎﺏ ﻣﺴﻴﺮ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﻳﮏ ﮔﺮﻩ ﺑﻪ ﮔﺮﻩ ﺩﻳﮕﺮ ﺭﺍ ﺑﻪ ﺣﺪﺍﻗﻞ ﻣﻘﺪﺍﺭ ﺧﻮﺩ
ﻣﻲ ﺭﺳﺎﻧﺪ ﻭﻟﻲ ﻋﻤﻼ" ﺷﺒﮑﻪ ﺭﺍ ﺑﻪ ﺳﮕﻤﻨﺖ ﻫﺎﻱ ﮔﺴﺴﺘﻪ ﺗﻘﺴﻴﻢ ﻧﻤﻲ ﻧﻤﺎﻳﺪ .ﺳﻮﺋﻴﭻ ﺑﻪ
ﻣﻨﻈﻮﺭ ﺗﺤﻘﻖ ﺧﻮﺍﺳﺘﻪ ﻓﻮﻕ ﻋﺮﺿﻪ ﺷﺪﻩ ﺍﺳﺖ .ﻳﮑﻲ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﺗﻔﺎﻭﺕ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﻴﻦ
ﻫﺎﺏ ﻭ ﺳﻮﺋﻴﭻ ،ﺗﻔﺴﻴﺮ ﻫﺮ ﻳﮏ ﺍﺯ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺍﺳﺖ .ﺗﻤﺎﻡ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ ﻫﺎﺏ،
ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻣﻮﺟﻮﺩ ﺭﺍ ﺑﻴﻦ ﺧﻮﺩ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﻣﻲ ﮔﺬﺍﺭﻧﺪ.ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻳﮏ ﺩﺳﺘﮕﺎﻩ ﻣﺘﺼﻞ
ﺷﺪﻩ ﺑﻪ ﺳﻮﺋﻴﭻ ،ﺩﺍﺭﺍﻱ ﺗﻤﺎﻡ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻣﺨﺘﺺ ﺧﻮﺩ ﺍﺳﺖ .ﻣﺜﻼ" ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺩﻩ ﮔﺮﻩ
ﺑﻪ ﻫﺎﺏ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﺎﺷﻨﺪ ) ،ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭﺛﺎﻧﻴﻪ( ﻫﺮ ﮔﺮﻩ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ
ﺑﺨﺸﻲ ﺍﺯ ﺗﻤﺎﻡ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻣﻮﺟﻮﺩ ) ﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ( ﺭﺍ ﺍﺷﻐﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ ) .ﺩﺭ
ﺻﻮﺭﺗﻲ ﮐﻪ ﺳﺎﻳﺮﮔﺮﻩ ﻫﺎ ﻧﻴﺰ ﻗﺼﺪ ﺍﺭﺗﺒﺎﻁ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ( .ﺩﺭ ﺳﻮﺋﻴﭻ ،ﻫﺮﻳﮏ ﺍﺯ ﮔﺮﻩ ﻫﺎ
ﻗﺎﺩﺭ ﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﺎﻳﺮﮔﺮﻩ ﻫﺎ ﺑﺎ ﺳﺮﻋﺖ ﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﻮﺋﻴﭻ ،ﺑﺮﺍﻱ ﻫﺮ ﮔﺮﻩ ﻳﮏ ﺳﮕﻤﻨﺖ ﺍﺧﺘﺼﺎﺻﻲ ﺍﻳﺠﺎﺩ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺳﮕﻤﻨﺖ ﻫﺎﻱ ﻓﻮﻕ ﺑﻪ ﻳﮏ ﺳﻮﺋﻴﭻ ﻣﺘﺼﻞ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﺩﺭ ﺣﻘﻴﻘﺖ ﺳﻮﺋﻴﭻ ﺍﻣﮑﺎﻥ ﺣﻤﺎﻳﺖ ﺍﺯ
ﭼﻨﺪﻳﻦ ) ﺩﺭ ﺑﺮﺧﻲ ﺣﺎﻻﺕ ﺻﺪﻫﺎ ( ﺳﮕﻤﻨﺖ ﺍﺧﺘﺼﺎﺻﻲ ﺭﺍ ﺩﺍﺭﺍ ﺍﺳﺖ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ
ﺗﻨﻬﺎ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻫﺮ ﺳﮕﻤﻨﺖ ﺳﻮﺋﻴﭻ ﮔﺮﻭﻩ ﻣﻲ ﺑﺎﺷﻨﺪ ،ﺳﻮﺋﻴﭻ ﻗﺎﺩﺭ ﺑﻪ ﺍﻧﺘﺨﺎﺏ
ﺍﻃﻼﻋﺎﺕ ،ﻗﺒﻞ ﺍﺯ ﺭﺳﻴﺪﻥ ﺑﻪ ﺳﺎﻳﺮ ﮔﺮﻩ ﻫﺎ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺳﻮﺋﻴﭻ ،ﻓﺮﻳﻢ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ
ﺭﺍ ﺑﻪ ﺳﮕﻤﻨﺖ ﻣﻮﺭﺩ ﻧﻈﺮ ﻫﺪﺍﻳﺖ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﻫﺮ ﺳﮕﻤﻨﺖ ﺩﺍﺭﺍﻱ ﺻﺮﻓﺎ"
ﻳﮏ ﮔﺮﻩ ﻣﻲ ﺑﺎﺷﺪ ،ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﻨﺪ ﺷﺪ.
278
ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﻮﺋﻴﭻ ﺍﻣﮑﺎﻥ ﭼﻨﺪﻳﻦ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺼﻮﺭﺕ
ﻫﻤﺰﻣﺎﻥ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ .
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻮﺋﻴﭻ ،ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﺑﺼﻮﺭﺕ full-duplexﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﻗﺒﻞ ﺍﺯ
ﻣﻄﺮﺡ ﺷﺪﻥ ﺳﻮﺋﻴﭻ ،ﺍﺗﺮﻧﺖ ﺑﺼﻮﺭﺕ half-duplexﺑﻮﺩ .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﺩﺍﺩﻩ ﻫﺎ ﺩﺭ ﻫﺮ
ﻟﺤﻈﻪ ﺍﻣﮑﺎﻥ ﺍﺭﺳﺎﻝ ﺩﺭ ﻳﮏ ﺟﻬﺖ ﺭﺍ ﺩﺍﺭﺍ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﻮﺋﻴﭻ ،ﻫﺮ
ﮔﺮﻩ ﺻﺮﻓﺎ" ﺑﺎ ﺳﻮﺋﻴﭻ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﻲ ﻧﻤﺎﻳﺪ ) ﮔﺮﻩ ﻫﺎ ﻣﺴﺘﻘﻴﻤﺎ" ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ
ﻧﻤﻲ ﻧﻤﺎﻳﻨﺪ( .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﺍﻃﻼﻋﺎﺕ ﺍﺯ ﮔﺮﻩ ﺑﻪ ﺳﻮﺋﻴﭻ ﻭ ﺍﺯ ﺳﻮﺋﻴﭻ ﺑﻪ ﮔﺮﻩ ﻣﻘﺼﺪ
ﺑﺼﻮﺭﺕ ﻫﻤﺰﻣﺎﻥ ﻣﻨﺘﻘﻞ ﻣﻲ ﮔﺮﺩﻧﺪ.
ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﻮﺋﻴﭻ ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ﺑﻬﻢ ﺗﺎﺑﻴﺪﻩ ﻭ ﻳﺎ ﻓﻴﺒﺮ ﻧﻮﺭﻱ
ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﮐﺎﻧﮑﺘﻮﺭﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ ﺑﺮﺍﻱ
ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻮﺋﻴﭻ ،ﺷﺒﮑﻪ ﺍﻱ ﻋﺎﺭﻱ ﺍﺯ ﺗﺼﺎﺩﻡ
ﺍﻃﻼﻋﺎﺗﻲ ﺑﻮﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺁﻣﺪ .ﺍﻧﺘﻘﺎﻝ ﺩﻭ ﺳﻮﻳﻪ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﻮﺋــﻴﭻ ،
ﺳﺮﻋﺖ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﺍﻓﺰﺍﻳﺶ ﻣﻲ ﻳﺎﺑﺪ.
ﺍﮐﺜﺮ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺳﻮﺋﻴﭻ ﺑﺪﻟﻴﻞ ﻗﻴﻤﺖ ﺑﺎﻻﻱ ﺳﻮﺋﻴﭻ ،ﺻﺮﻓﺎ" ﺍﺯ ﺳﻮﺋﻴﭻ ﺑﻪ ﺗﻨﻬﺎﺋﻲ
ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ﺍﺯ ﺗﺮﮐﻴﺐ ﻫﺎﺏ ﻭ ﺳﻮﺋﻴﭻ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻣﺜﻼ"
ﻳﮏ ﺳﺎﺯﻣﺎﻥ ﻣﻲ ﺗﻮﺍﻧﺪ ﺍﺯ ﭼﻨﺪﻳﻦ ﻫﺎﺏ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻫﺮ ﻳﮏ ﺍﺯ
ﺩﭘﺎﺭﺗﻤﺎﻧﻬﺎﻱ ﺧﻮﺩ ﺍﺳﺘﻔﺎﺩﻩ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺳﻮﺋﻴﭻ ﺗﻤﺎﻡ ﻫﺎﺏ ﻫﺎ)ﻣﺮﺑﻮﻁ ﺑﻪ ﻫﺮ
ﻳﮏ ﺍﺯ ﺩﭘﺎﺭﺗﻤﺎﻧﻬﺎ( ﺑﻴﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ.
279
ﻓﻌﺎﻟﻴﺖ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﻻﻳﻪ ﻓﻮﻕ ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ IPﺭ IPXﻭ ﻳﺎ Appeltalkﺍﺳﺘــﻔﺎﺩﻩ
ﻣﻲ ﺷﻮﺩ ) .ﺁﺩﺭﺱ ﻫﺎ ﻱ ﻣﻨﻄﻘﻲ ( .ﺍﻟﮕﻮﺭﻳﺘﻢ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺗﻮﺳﻂ ﺳﻮﺋﻴﭻ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺨﺎﺫ
ﺗﺼﻤﻴﻢ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻣﻘﺼﺪ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺎ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺗﻮﺳﻂ ﺭﻭﺗﺮ،
ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ.
ﻳﮑﻲ ﺍﺯ ﻣﻮﺍﺭﺩ ﺍﺧﺘﻼﻑ ﺍﻟﮕﻮﺭﻳﺘﻢ ﻫﺎﻱ ﺳﻮﺋﻴﭻ ﻭ ﻫﺎﺏ ،ﻧﺤﻮﻩ ﺑﺮﺧﻮﺭﺩ ﺁﻧﺎﻥ ﺑﺎ
Broadcastﺍﺳﺖ .ﻣﻔﻬﻮﻡ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﻧﻮﻉ Broadcastﺩﺭ ﺗﻤﺎﻡ ﺷﺒﮑﻪ ﻫﺎ
ﻣﺸﺎﺑﻪ ﻣﻲ ﺑﺎﺷﺪ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ،ﺩﺳﺘﮕﺎﻫﻲ ﻧﻴﺎﺯ ﺑﻪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺩﺍﺷﺘﻪ ﻭﻟﻲ ﻧﻤﻲ ﺩﺍﻧﺪ
ﮐﻪ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﺮﺍﻱ ﭼﻪ ﮐﺴﻲ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﺪ .ﺑﺪﻟﻴﻞ ﻋﺪﻡ ﺁﮔﺎﻫﻲ ﻭ ﺩﺍﻧﺶ ﻧﺴﺒﺖ
ﺑﻪ ﻫﻮﻳﺖ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﺍﻃﻼﻋﺎﺕ ،ﺩﺳﺘﮕﺎﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺼﻮﺭﺕ
broadcastﻣﻲ ﻧﻤﺎﻳﺪ .ﻣﺜﻼ" ﻫﺮ ﺯﻣﺎﻥ ﮐﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺟﺪﻳﺪ ﻭﻳﺎ ﻳﮑﺪﺳﺘﮕﺎﻩ ﺑﻪ ﺷﺒﮑﻪ ﻭﺍﺭﺩ
ﻣﻲ ﺷﻮﺩ ،ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﻧﻮﻉ Broadcastﺑﺮﺍﻱ ﻣﻌﺮﻓﻲ ﻭ ﺣﻀﻮﺭ ﺧﻮﺩ ﺩﺭ ﺷﺒﮑﻪ
ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ .ﺳﺎﻳﺮ ﮔﺮﻩ ﻫﺎ ﻗﺎﺩﺭ ﺑﻪ ﺍﻓﺰﻭﺩﻥ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﺩﺭ ﻟﻴﺴﺖ ﺧﻮﺩ ﻭ ﺑﺮﻗﺮﺍﺭﻱ
ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺁﻥ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﻧﻮﻉ Broadcastﺩﺭ ﻣﻮﺍﺭﺩﻳﮑﻪ
ﻳﮏ ﺩﺳﺘﮕﺎﻩ ﻧﻴﺎﺯ ﺑﻪ ﻣﻌﺮﻓﻲ ﺧﻮﺩ ﺑﻪ ﺳﺎﻳﺮ ﺑﺨﺶ ﻫﺎﻱ ﺷﺒﮑﻪ ﺭﺍ ﺩﺍﺷﺘﻪ ﻭ ﻳﺎ ﻧﺴﺒﺖ ﺑﻪ ﻫﻮﻳﺖ
ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﺍﻃﻼﻋﺎﺕ ﺷﻨﺎﺧﺖ ﻻﺯﻡ ﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﻧﺪ.
ﻫﺎﺏ ﻭ ﻳﺎ ﺳﻮﺋﻴﭻ ﻫﺎ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﺑﺴﺘﻪ ﺍﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﻧﻮﻉ Broadcastﺑﺮﺍﻱ ﺳﺎﻳﺮ
ﺳﮕﻤﻨﺖ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺣﻮﺯﻩ Broadcastﻣﻲ ﺑﺎﺷﻨﺪ.
280
ﺭﻭﺗﺮ ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﺭﺍ ﺍﻧﺠﺎﻡ ﻧﻤﻲ ﺩﻫﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺁﺩﺭﺱ ﻳﮑﺪﺳﺘﮕﺎﻩ ﻣﺸﺨﺺ
ﻧﮕﺮﺩﺩ ،ﺭﻭﺗﺮ ﻗﺎﺩﺭ ﺑﻪ ﻣﺴﻴﺮﻳﺎﺑﻲ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻣﻮﺭﺩ ﻧﻈﺮ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ .ﻭﻳﮋﮔﻲ ﻓﻮﻕ ﺩﺭ
ﻣﻮﺍﺭﺩﻳﮑﻪ ﻗﺼﺪ ﺟﺪﺍﺳﺎﺯﻱ ﺷﺒﮑﻪ ﻫﺎ ﺍﺯ ﻳﮑﺪﻳﮕﺮ ﻣﺪ ﻧﻈﺮ ﺑﺎﺷﺪ ،ﺑﺴﻴﺎﺭ ﺍﻳﺪﻩ ﺁﻝ ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
ﻭﻟﻲ ﺯﻣﺎﻧﻴﮑﻪ ﻫﺪﻑ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻴﻦ ﺑﺨﺶ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﻳﮏ ﺷﺒﮑﻪ ﺑﺎﺷﺪ ،ﻣﻄﻠﻮﺏ ﺑﻨﻈﺮ
ﻧﻤﻲ ﺁﻳﺪ .ﺳﻮﺋﻴﭻ ﻫﺎ ﺑﺎ ﻫﺪﻑ ﺑﺮﺧﻮﺭﺩ
ﺑﺎ ﻣﺸﮑﻞ ﻓﻮﻕ ﻋﺮﺿﻪ ﺷﺪﻩ ﺍﻧﺪ.
ﺳﻮﺋﻴﭻ ﻫﺎﻱ LANﺑﺮ ﺍﺳﺎﺱ ﺗﮑﻨﻮﻟﻮﮊﻱ packet-switchingﻓﻌﺎﻟﻴﺖ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﺳﻮﺋﻴﭻ ﻳﮏ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺩﻭ ﺳﮕﻤﻨﺖ ﺍﻳﺠﺎﺩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﻭﻟﻴﻪ ﺩﺭ ﻳﮏ
ﻣﺤﻞ ﻣﻮﻗﺖ ) ﺑﺎﻓﺮ( ﺫﺧﻴﺮﻩ ﻣﻲ ﮔﺮﺩﻧﺪ ،ﺁﺩﺭﺱ ﻓﻴﺰﻳﮑﻲ ) (MACﻣﻮﺟﻮﺩ ﺩﺭ ﻫﺪﺭ ﺧﻮﺍﻧﺪﻩ
ﺷﺪﻩ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺎ ﻟﻴﺴﺘﻲ ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺟﺪﻭﻝ ) Lookupﺟﺴﺘﺠﻮ( ﻣﻘﺎﻳﺴﻪ
ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ LANﻣﺒﺘﻨﻲ ﺑﺮ ﺍﺗﺮﻧﺖ ،ﻫﺮ ﻓﺮﻳﻢ ﺍﺗﺮﻧﺖ ﺷﺎﻣﻞ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ
ﺧﺎﺹ ﺍﺳﺖ .ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻓﻮﻕ ﺷﺎﻣﻞ ﻳﮏ ﻋﻨﻮﺍﻥ )ﻫﺪﺭ( ﺧﺎﺹ ﻭ ﺷﺎﻣﻞ ﺍﻃﻼﻋﺎﺕ
ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﺩﺭﺱ ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﮔﻴﺮﻧﺪﻩ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺳﺖ.
ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﻣﺒﺘﻨﻲ ﺑﺮ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺴﻴﺮﻳﺎﺑﻲ ﺗﺮﺍﻓﻴﮏ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺍﺯ
ﺳﻪ ﺭﻭﺵ ﺯﻳﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
• Cut-Through
• Store-and-forward
• Fragment-free
ﺳﻮﺋﻴﭻ ﻫﺎﻱ ، Cut-throughﺑﻼﻓﺎﺻﻠﻪ ﭘﺲ ﺍﺯ ﺗﺸﺨﻴﺺ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺗﻮﺳﻂ ﺳﻮﺋﻴﭻ
،ﺁﺩﺭﺱ MACﺧﻮﺍﻧﺪﻩ ﻣﻲ ﺷﻮﺩ .ﭘﺲ ﺍﺯ ﺫﺧﻴﺮﻩ ﺳﺎﺯﻱ ﺷﺶ ﺑﺎﻳﺖ ﺍﻃﻼﻋﺎﺕ ﮐﻪ ﺷﺎﻣﻞ
ﺁﺩﺭﺱ ﻣﻲ ﺑﺎﺷﻨﺪ ،ﺑﻼﻓﺎﺻﻠﻪ ﻋﻤـﻠﻴﺎﺕ ﺍﺭﺳﺎﻝ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﮔﺮﻩ ﻣﻘـــﺼﺪ ﺁﻏـــﺎﺯ
ﻣﻲ ﮔﺮﺩﺩ) .ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺩﺭﻳﺎﻓﺖ ﺳﺎﻳﺮ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺗﻮﺳﻂ ﺳﻮﺋﻴﭻ ( .ﺑﺎ ﺗﻮﺟﻪ
ﺑﻪ ﻋﺪﻡ ﻭﺟﻮﺩ ﮐﻨﺘﺮﻝ ﻫﺎﻱ ﻻﺯﻡ ﺩﺭ ﺻﻮﺭﺕ ﺑﺮﻭﺯ ﺧﻄﺎﺀ ﺩﺭ ﺭﻭﺵ ﻓﻮﻕ ،ﺳﻮﺋﻴﭻ ﻫﺎﻱ
ﺯﻳﺎﺩﻱ ﺍﺯ ﺭﻭﺵ ﻓﻮﻕ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲ ﻧﻤﺎﻳﻨﺪ.
281
ﺳﻮﺋﻴﭻ ﻫﺎﻱ ، store-and-forwardﺗﻤﺎﻡ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺩﺭ ﺑﺎﻓﺮ ﻣﺮﺑﻮﻃﻪ ﺫﺧﻴﺮﻩ ﻭ
ﻋﻤﻠﻴﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺑﺮﺭﺳﻲ ﺧﻄﺎﺀ ) (CRCﻭ ﺳﺎﻳﺮ ﻣﺴﺎﺋﻞ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﻗﺒﻞ ﺍﺯ ﺍﺭﺳﺎﻝ
ﺍﻃﻼﻋﺎﺕ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺍﺭﺍﻱ ﺧﻄﺎﺀ ﺑﺎﺷﺪ ،ﺑﺴﺘﻪ
ﺍﻃﻼﻋﺎﺗﻲ ﺩﻭﺭ ﺍﻧﺪﺍﺧﺘﻪ ﺧﻮﺍﻫﺪ ﺷﺪ. .ﺩﺭ ﻏﻴﺮﺍﻳﻨﺼﻮﺭﺕ ،ﺳﻮﺋﻴﭻ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﺩﺭﺱ، MAC
ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﺮﺍﻱ ﮔﺮﻩ ﻣﻘﺼﺪ ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺍﻏﻠﺐ ﺳﻮﺋﻴﭻ ﻫﺎ ﺍﺯ ﺗﺮﮐﻴﺐ ﺩﻭ ﺭﻭﺵ
ﮔﻔﺘﻪ ﺷﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺳﻮﺋﻴﭻ ﻫﺎ ﺍﺯ ﺭﻭﺵ cut-throughﺍﺳﺘﻔﺎﺩﻩ
ﺷﺪﻩ ﻭ ﺑﻤﺤﺾ ﺑﺮﻭﺯ ﺧﻄﺎﺀ ﺍﺯ ﺭﻭﺵ store-and-forwardﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳـﻨﺪ.
ﻳﮑﻲ ﺩﻳﮕﺮ ﺍﺯ ﺭﻭﺵ ﻫﺎﻱ ﻣﺴﻴﺮﻳﺎﺑﻲ ﺗﺮﺍﻓﻴﮏ ﺩﺭ ﺳﻮﺋﻴﭻ ﻫﺎ ﮐﻪ ﮐﻤﺘﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ،
fragment-freeﺍﺳﺖ .ﺭﻭﺵ ﻓﻮﻕ ﻣﺸﺎﺑﻪ cut-throughﺑﻮﺩﻩ ﺑﺎ ﺍﻳﻦ ﺗﻔﺎﻭﺕ ﮐﻪ
ﻗﺒﻞ ﺍﺯ ﺍﺭﺳﺎﻝ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ٦٤ﺑﺎﻳﺖ ﺁﻥ ﺫﺧﻴﺮﻩ ﻣﻲ ﮔﺮﺩﺩ.
ﺳﻮﺋﻴﭻ ﻫﺎﻱ LANﺩﺍﺭﺍﻱ ﻣﺪﻝ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺍﺯ ﻧﻘﻄﻪ ﻧﻈﺮ ﻃﺮﺍﺣﻲ ﻓﻴﺰﻳﮑﻲ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺳﻪ
ﻣﺪﻝ ﺭﺍﻳﺞ ﺩﺭ ﺣﺎﻝ ﺣﺎﺿﺮ ﺑﺸﺮﺡ ﺯﻳﺮ ﻣﻲ ﺑﺎﺷﻨﺪ:
. Shared memoryﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺳﻮﺋﻴﭻ ﻫﺎ ﺗﻤﺎﻡ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﻭﻟﻴﻪ •
ﺩﺭ ﺑﺎﻓﺮ ﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ ﺭﺍ ﺫﺧﻴﺮﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺑﺎﻓﺮ ﻓﻮﻕ ﺑﺼﻮﺭﺕ ﻣﺸﺘﺮﮎ ﺗﻮﺳﻂ
ﺗﻤﺎﻡ ﭘﻮﺭﺕ ﻫﺎﻱ ﺳﻮﺋﻴﭻ ) ﺍﺗﺼﺎﻻﺕ ﻭﺭﻭﺩﻱ ﻭ ﺧﺮﻭﺟﻲ ( ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ
ﺍﺩﺍﻣﻪ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﮑﻤﮏ ﭘﻮﺭﺕ ﻣﺮﺑﻮﻃﻪ ﺑﺮﺍﻱ ﮔﺮﻩ ﻣﻘﺼﺪ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﻨﺪ
ﺷﺪ.
.Matrixﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺳﻮﺋﻴﭻ ﻫﺎ ﺩﺍﺭﺍﻱ ﻳﮏ ﺷﺒﮑﻪ) ﺗﻮﺭ( ﺩﺍﺧﻠﻲ ﻣﺎﺗﺮﻳﺲ ﻣﺎﻧﻨﺪ ﺑﻮﺩﻩ •
ﮐﻪ ﭘﻮﺭﺕ ﻫﺎﻱ ﻭﺭﻭﺩﻱ ﻭ ﺧﺮﻭﺟﻲ ﻫﻤﺪﻳﮕﺮ ﺭﺍ ﻗﻄﻊ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﻳﮏ ﺑﺴﺘﻪ
ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮ ﺭﻭﻱ ﭘﻮﺭﺕ ﻭﺭﻭﺩﻱ ﺗﺸﺨﻴﺺ ﺩﺍﺩﻩ ﺷﺪ ،ﺁﺩﺭﺱ MACﺁﻥ ﺑﺎ ﺟﺪﻭﻝ
lookupﻣﻘﺎﻳﺴﻪ ﺗﺎ ﭘﻮﺭﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﺮﻭﺟﻲ ﺁﻥ ﻣﺸﺨﺺ ﮔﺮﺩﺩ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺳﻮﺋﻴﭻ
ﻳﮏ ﺍﺭﺗﺒﺎﻁ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﮑﻪ ﻭ ﺩﺭ ﻣﺤﻠﻲ ﮐﻪ ﭘﻮﺭﺕ ﻫﺎ ﻫﻤﺪﻳﮕﺮ ﺭﺍ ﻗﻄﻊ ﻣﻲ ﮐﻨﻨﺪ،
ﺑﺮﻗﺮﺍﺭ ﻣﻲ ﮔﺮﺩﺩ.
282
. Architecture Busﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺳﻮﺋﻴﭻ ﻫﺎ ﺑﺠﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺷﺒﮑﻪ •
) ﺗﻮﺭ( ،ﺍﺯ ﻳﮏ ﻣﺴﻴﺮ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺧﻠﻲ ) (Busﺍﺳﺘﻔﺎﺩﻩ ﻭ ﻣﺴﻴﺮ ﻓﻮﻕ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
TDMAﺗﻮﺳﻂ ﺗﻤﺎﻡ ﭘﻮﺭﺕ ﻫﺎ ﺑﻪ ﺍﺷﺘﺮﺍﮎ ﮔﺬﺍﺷﺘﻪ ﻣﻲ ﺷﻮﺩ .ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﻓﻮﻕ
ﺑﺮﺍﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎ ﺩﺍﺭﺍﻱ ﻳﮏ ﺣﺎﻓﻈﻪ ﺍﺧﺘﺼﺎﺻﻲ ﻣﻲ ﺑﺎﺷﻨﺪ.
Transparent Bridging
ﺍﮐﺜﺮ ﺳﻮﺋﻴﭻ ﻫﺎﻱ LANﻣﺒﺘﻨﻲ ﺑﺮ ﺍﺗﺮﻧﺖ ﺍﺯ ﺳﻴﺴﺘﻢ ﻱ ﺑﺎ ﻧﺎﻡ transparent bridging
ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﺟﺪﺍﻭﻝ ﺁﺩﺭﺱ lookupﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺗﮑﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺍﻣﮑﺎﻥ ﻳﺎﺩﮔﻴﺮﻱ
ﻫﺮ ﭼﻴﺰﻱ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻣﺤﻞ ﮔﺮﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ،ﺑﺪﻭﻥ ﺣﻤﺎﻳﺖ ﻣﺪﻳﺮﻳﺖ ﺷﺒﮑﻪ ﺭﺍ
ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺗﮑﻨﻮﻟﻮﮊﻱ ﻓﻮﻕ ﺩﺍﺭﻱ ﭘﻨﺞ ﺑﺨﺶ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺖ:
Learning •
Flooding •
Filtering •
Forwarding •
Aging •
ﺧﻮﺍﻫﻨﺪ ﺷﺪ.
ﮔﺮﻩ Aﺑﺮ ﺭﻭﻱ ﺍﻭﻟﻴﻦ ﺳﮕﻤﻨﺖ ) ﺳﮕﻤﻨﺖ ،( Aﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺩﻳــﮕﺮ •
283
ﺳﻮﺋﻴﭻ ﺍﻭﻟﻴﻦ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺍﺯ ﮔﺮﻩ Aﺩﺭﻳﺎﻓﺖ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺁﺩﺭﺱ MACﺁﻥ •
ﺑﺮﺍﻱ ﺗﻤﺎﻡ ﺳﮕﻤﻨﺖ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ )ﺑﺠﺰ ﺳﮕﻤﻨﺖ Aﮐﻪ ﺍﺧﻴﺮﺍ" ﻳﮑﻲ ﺍﺯ ﮔﺮﻩ
ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺁﻥ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻧﻤﻮﺩﻩ ﺍﺳﺖ (.ﻓﺮﺁﻳﻨﺪ ﺍﺭﺳﺎﻝ ﻳﮏ
ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺗﻮﺳﻂ ﺳﻮﺋﻴﭻ ،ﺑﻪ ﻣﻨﻈﻮﺭ ﻳﺎﻓﺘﻦ ﻳﮏ ﮔﺮﻩ ﺧﺎﺹ ﺑﺮﺍﻱ ﺗﻤﺎﻡ ﺳﮕﻤﻨﺖ
ﻫﺎ Flooding ،ﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ.
ﮔﺮﻩ Bﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻭ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﻪ ﻋﻨﻮﺍﻥ •
ﺑﻪ ﺫﺧﻴﺮﻩ ﮐﺮﺩﻥ ﺁﺩﺭﺱ MACﮔﺮﻩ Bﺩﺭ ﺟﺪﻭﻝ Lookupﺳﮕﻤﻨﺖ Cﻣﻲ ﺑﺎﺷﺪ.
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﺳﻮﺋﻴﭻ ﺍﺯ ﺁﺩﺭﺱ ﮔﺮﻩ Aﺁﮔﺎﻫﻲ ﺩﺍﺭﺩ ،ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﻣﺴﺘﻘﻴﻤﺎ"
ﺑﺮﺍﻱ ﺁﻥ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﮔﺮﻩ Aﺩﺭ ﺳﮕﻤﻨﺘﻲ ﻣﺘﻔﺎﻭﺕ ﻧﺴﺒﺖ ﺑﻪ ﮔﺮﻩ Bﻗﺮﺍﺭ
ﺩﺍﺭﺩ ،ﺑﻨﺎﺑﺮﺍﻳﻦ ﺳﻮﺋﻴﺞ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﻭ ﺳﮕﻤﻨﺖ ﺭﺍ ﺑﻪ
ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻧﻤﺎﺋﻴﺪ .ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ Forwardingﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ.
ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻌﺪﻱ ﺍﺯ ﮔﺮﻩ Aﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺑﺮﺍﻱ ﮔﺮﻩ Bﺑﻪ ﺳﻮﺋﻴﭻ •
ﻣﻲ ﺭﺳﺪ ،ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﺳﻮﺋﻴﺞ ﺍﺯ ﺁﺩﺭﺱ ﮔﺮﻩ Bﺁﮔﺎﻫﻲ ﺩﺍﺭﺩ ،ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ
ﻓﻮﻕ ﻣﺴﺘﻘﻴﻤﺎ" ﺑﺮﺍﻱ ﮔﺮﻩ Bﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﮔﺮﻩ Cﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺳﻮﺋﻴﭻ ﺑﺮﺍﻱ ﮔﺮﻩ Aﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ .ﺳﻮﺋﻴﭻ ﺁﺩﺭﺱ •
284
ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﻧﻴﺎﺯﻱ ﺑﻪ ﺍﺭﺗﺒﺎﻁ ﺳﮕﻤﻨﺖ Aﺑﺎ ﺳﮕﻤﻨﺖ ﺩﻳﮕﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ
ﺍﻃﻼﻋﺎﺕ ﮔﺮﻩ Cﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺳﻮﺋﻴﭻ ﺍﺯ ﺣﺮﮐﺖ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ
ﺑﻴﻦ ﮔﺮﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺳﮕﻤﻨﺖ ﻣﻤﺎﻧﻌﺖ ﻣﻲ ﻧﻤﺎﻳﺪ .ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ﺭﺍ
Filteringﻣﻲ ﮔﻮﻳﻨﺪ.
Learningﻭ Floodingﺍﺩﺍﻣﻪ ﻳﺎﻓﺘﻪ ﻭ ﺑﻤﻮﺍﺯﺍﺕ ﺁﻥ ﺳﻮﺋﻴﭻ ،ﺁﺩﺭﺱ ﻫﺎﻱ MAC •
285
ﻓﺮﺍﻭﺍﻧﻲ ﻭ ﺁﺷﻔﺘﮕﻲ ﺍﻧﺘﺸﺎﺭ
ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺎ ﺗﻮﭘﻮﻟﻮﮊﻱ ﺳﺘﺎﺭﻩ ) (Starﻭ ﻳﺎ ﺗﺮﮐﻴﺐ Busﻭ ﻭ Starﻳﮑﻲ ﺍﺯ ﻋﻨﺎﺻﺮ
ﺍﺻﻠﻲ ﺷﺒﮑﻪ ﮐﻪ ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﺎﻋﺚ ﺍﺯ ﮐﺎﺭ ﺍﻓﺘﺎﺩﻥ ﺷﺒﮑﻪ ﮔﺮﺩﺩ ،ﻫﺎﺏ ﻭ ﻳﺎ ﺳﻮﺋﻴﭻ ﺍﺳﺖ .ﻓﺮﺽ
ﮐﻨﻴﺪ ﺷﺒﮑﻪ ﺍﻱ ﺑﺎ ﺳﺎﺧﺘﺎﺭ ﺯﻳﺮ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ:
ﺩﺭ ﻣﺜﺎﻝ ﻓﻮﻕ ،ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺳﻮﺋﻴﭻ Aﻭ ﻳﺎ Cﺑﺎ ﻣﺸﮑﻞ ﻣﻮﺍﺟﻪ ﮔﺮﺩﻧﺪ ،ﺗﻤﺎﻡ ﮔﺮﻩ ﻫﺎﻱ
ﻣﺘﺼﻞ ﺑﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﻓﻮﻕ ﻧﻴﺰ ﺗﺤﺖ ﺗﺎﺛﻴﺮ ﺍﺷﮑﺎﻝ ﻓﻮﻕ ﻗﺮﺍﺭ ﺧﻮﺍﻫﻨﺪ ﮔﺮﻓﺖ.
ﮔﺮﻩ ﻫﺎﻱ ﻣﺘﺼﻞ ﺑﻪ ﺳﻮﺋﻴﭻ ﺩﻳﮕﺮ ) (Bﮐﻤﺎﮐﻦ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﺧﻮﺩ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺩﺭ
ﺻﻮﺭﺗﻲ ﮐﻪ ﺳﻮﺋﻴﭻ Cﺑﺎ ﺍﺷﮑﺎﻝ ﻣﻮﺍﺟﻪ ﮔﺮﺩﺩ ،ﺗﻤﺎﻡ ﺷﺒﮑﻪ ﺍﺯ ﮐﺎﺭ ﺧﻮﺍﻫﺪ ﺍﻓﺘﺎﺩ .ﺩﺭ ﺻﻮﺭﺕ
ﺍﺿﺎﻓﻪ ﮐﺮﺩﻥ ﺳﮕﻤﻨﺖ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﺳﻮﺋﻴﭻ Aﻭ Cﭼﻪ ﺍﺗﻔﺎﻗﻲ ﺧﻮﺍﻫﺪ ﺍﻓﺘﺎﺩ.
ﺩﺭ ﺣﺎﻟﺖ ﻓﻮﻕ ،ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻳﮑﻲ ﺍﺯ ﺳﻮﺋﻴﭻ ﻫﺎ ﺑﺎ ﺍﺷﮑﺎﻝ ﻣﻮﺍﺟﻪ ﮔﺮﺩﺩ ،ﺷﺒﮑﻪ ﮐﻤﺎﮐﻦ
ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺍﺋﻪ ﺧﺪﻣﺎﺕ ﺧﻮﺩﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺑﺎ ﺍﻓﺰﺩﻭﻥ ﺳﮕﻤﻨﺖ ﻓﻮﻕ ،ﺷﺒﮑﻪ ﺍﺯ ﺣﺎﻟﺖ ﻭﺍﺑﺴﺘﮕﻲ
ﺑﻪ ﻳﮏ ﻧﻘﻄﻪ ﺧﺎﺭﺝ ﻭ ﻳﮏ ﻧﻮﻉ " ﻓﺮﺍﻭﺍﻧﻲ" ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ.
ﺑﺎ ﺣﻞ ﻣﺸﮑﻞ ﻭﺍﺑﺴﺘﮕﻲ ﻋﻤﻠﻴﺎﺗﻲ ﺷﺒﮑﻪ ﺑﻪ ﻳﮏ ﻧﻘﻄﻪ ،ﻣﺸﮑﻞ ﺩﻳﮕﺮﻱ ﺑﻮﺟﻮﺩ ﻣﻲ ﺁﻳﺪ.
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﻗﺒﻼ" ﺍﺷﺎﺭﻩ ﮔﺮﺩﻳﺪ ،ﺳﻮﺋﻴﭻ ﻫﺎ ﺑﺼﻮﺭﺕ ﻫﻮﺷﻤﻨﺪﺍﻧﻪ ﺍﺯﺁﺩﺭﺱ ﻭ ﻣﺤﻞ ﻫﺮ ﻳﮏ
ﺍﺯ ﮔﺮﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺁﮔﺎﻩ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺷﺮﺍﻳﻂ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ،ﺗﻤﺎﻡ ﺳﻮﺋﻴﺞ
ﻫﺎ ﺩﺭ ﻳﮏ Loopﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ
ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺗﻮﺳﻂ ﻳﮏ ﮔﺮﻩ ،ﻣﻤﮑﻦ ﺍﺳﺖ ﺗﻮﺳﻂ ﺳﻮﺋﻴﭽﻲ ﺍﺯ ﺳﮕﻤﻨﺖ ﺩﻳﮕﺮ ﺁﻣﺪﻩ ﺑﺎﺷﺪ.
286
ﻣﺜﻼ" ﻓﺮﺽ ﻧﻤﺎﺋﻴﺪ ﮐﻪ ﮔﺮﻩ Bﺑﻪ ﺳﻮﺋﻴﭻ Aﻣﺘﺼﻞ ﻭ ﻗﺼﺪ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻱ ﮔﺮﻩ B
ﻣﻮﺟﻮﺩ ﺩﺭ ﺳﮕﻤﻨﺖ Bﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ .ﺳﻮﺋﻴﭻ Aﺷﻨﺎﺧﺘﻲ ﻧﺴﺒﺖ ﺑﻪ ﮔﺮﻩ Aﻧﺪﺍﺭﺩ ،ﺑﻨﺎﺑﺮﺍﻳﻦ
ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﮔﺮﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺳﮕﻤﻨﺖ ﻫﺎﻱ ﺩﻳﮕﺮ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺯ ﻃﺮﻳﻖ ﺳﮕﻤﻨﺖ ﻫﺎﻱ Aﻭ ﻳﺎ Cﺑﺮﺍﻱ ﺳﺎﻳﺮ ﺳﻮﺋﻴﭻ ﻫﺎ ) Bﻭ ﻳﺎ
(Cﺣﺮﮐﺖ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺳﻮﺋﻴﭻ ،Bﮔﺮﻩ Bﺭﺍ ﺑﻪ ﺟﺪﻭﻝ Lookupﺧﻮﺩ ﺍﺿـــــﺎﻓﻪ
ﻣﻲ ﻧﻤﺎﻳﺪ ) .ﺑﺮﺍﻱ ﺳﮕﻤﻨﺖ .(Aﺳﻮﺋﻴﭻ Cﺁﺩﺭﺱ ﮔﺮﻩ Bﺭﺍ ﺑﻪ ﻣﻨﻈﻮﺭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﺳﮕﻤﻨﺖ
Cﺩﺭ ﺟﺪﻭﻝ Lookupﺧﻮﺩ ﺫﺧﻴﺮﻩ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﻫﻴﭽﮑﺪﺍﻡ ﺍﺯ ﺳﻮﺋﻴﭻ ﻫﺎ
ﺗﺎﮐﻨﻮﻥ ﺷﻨﺎﺧﺘﻲ ﻧﺴﺒﺖ ﺑﻪ ﺁﺩﺭﺱ ﮔﺮﻩ Aﺑﺪﺳﺖ ﻧﻴﺎﻭﺭﺩﻩ ﺍﻧﺪ ،ﺳﮕﻤﻨﺖ Bﺑﺮﺍﻱ ﭘﻴﺪﺍ ﮐﺮﺩﻥ
ﮔﺮﻩ Aﻣﻮﺭﺩ ﺑﺮﺭﺳﻲ ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﮔﺮﻓﺖ .ﻫﺮ ﺳﻮﺋﻴﺞ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﺭﺍ
ﺩﺭﻳﺎﻓﺖ ﻭ ﻣﺠﺪﺩﺍ" ﺁﻥ ﺭﺍ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﺳﮕﻤﻨﺖ ﻫﺎ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﮐﺮﺩ ) .ﭼﻮﻥ ﻫﻴﭽﮑﺪﺍﻡ ﻫﻨﻮﺯ
ﺩﺍﻧﺸﻲ ﻧﺴﺒﺖ ﺑﻪ ﻣﺤﻞ ﮔﺮﻩ Aﺭﺍ ﮐﺴﺐ ﻧﮑﺮﺩﻩ ﺍﻧﺪ( ﺳﻮﺋﻴﺞ Aﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺭﺳﺎﻟﻲ ﺗﻮﺳﻂ
ﻫﺮ ﻳﮏ ﺍﺯ ﺳﻮﺋﻴﭻ ﻫﺎ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻭ ﻣﺠﺪﺩﺍ" ﺁﻥ ﺭﺍ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﺳﮕﻤﻨﺖ ﻫﺎ ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﺩﺭ ﺟﻨﻴﻦ ﺷﺮﺍﻳﻄﻲ ﻳﮏ ﻧﻮﻉ " ﺁﺷﻔﺘﮕﻲ ﺍﻧﺘﺸﺎﺭ " ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﺳﺖ .ﺷﺮﺍﻳﻂ ﻓﻮﻕ ﺑﺎﻋﺚ ﺍﻳﺠﺎﺩ
ﻣﺸﮑﻞ ﺗﺮﺍﻓﻴﮑﻲ ﺩﺭ ﺷﺒﮑﻪ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺣﻞ ﻣﺸﮑﻞ ﻓﻮﻕ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﺑﺎ ﻧﺎﻡ
Spanning treesﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ.
Spanning tress
ﺑﻪ ﻣﻨﻈﻮﺭﻱ ﭘﻴﺸﮕﻴﺮﻱ ﺍﺯ ﻣﺴﺌﻠﻪ " ﺁﺷﻔﺘﮕﻲ ﺍﻧﺘﺸﺎﺭ" ﻭ ﺳﺎﻳﺮ ﺍﺛﺮﺍﺕ ﺟﺎﻧﺒﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ
Loopingﺷﺮﮐﺖ DECﭘﺮﻭﺗﮑﻠﻲ ﺑﺎ ﻧﺎﻡ (Spanning-tree Protocol(STPﺭﺍ
ﺍﻳﺠﺎﺩ ﻧﻤﻮﺩﻩ ﺍﺳﺖ .ﭘﺮﻭﺗﮑﻞ ﻓﻮﻕ ﺑﺎ ﻣﺸﺨﺼﻪ d٨٠٢,١ﺗﻮﺳﻂ ﻣﻮﺳﺴﻪ IEEEﺍﺳﺘﺎﻧﺪﺍﺭﺩ
287
ﺷﺪﻩ ﺍﺳﺖ tree Spanning .ﺍﺯ ﺍﻟﮕﻮﺭﻳﺘﻢ (STA(Spanning-tree algoritm
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺍﻟﮕﻮﺭﻳﺘﻢ ﻓﻮﻕ ﺑﺮﺭﺳﻲ ﺧﻮﺍﻫﺪ ﮐﺮﺩ ﺁﻳﺎ ﻳﮏ ﺳﻮﺋﻴﭻ ﺩﺍﺭﺍﻱ ﺑﻴﺶ ﺍﺯ ﻳﮏ
ﻣﺴﻴﺮ ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻳﮏ ﮔﺮﻩ ﺧﺎﺹ ﺍﺳﺖ .ﺩﺭ ﺻﻮﺭﺕ ﻭﺟﻮﺩ ﻣﺴﻴﺮﻫﺎﻱ ﻣﺘﻌﺪﺩ ،ﺑﻬﺘﺮﻳﻦ
ﻣﺴﻴﺮ ﻧﺴﺒﺖ ﺑﻪ ﺳﺎﻳﺮ ﻣﺴﻴﺮﻫﺎ ﮐﺪﺍﻡ ﺍﺳﺖ؟ ﻧﺤﻮﻩ ﻋﻤﻠﻴﺎﺕ STPﺑﺸﺮﺡ ﺯﻳﺮ ﺍﺳﺖ:
ﺑﻪ ﻫﺮ ﺳﻮﺋﻴﺞ ،ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﻣﺸﺨﺼﻪ ﻫﺎ ) (IDﻧﺴﺒﺖ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ .ﻳﮑﻲ ﺍﺯ •
ﺍﺳﺎﺱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺗﻮﺳﻂ ﻣﻮﺳﺴﻪ IEEEﺍﺳﺖ .ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺤﺎﺳﺒﻪ
ﻣﻘﺎﺩﺭ ﻓﻮﻕ ١,٠٠٠ ،ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ) ﻳﮏ ﮔﻴﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ( ﺭﺍ ﺑﺮ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ
ﺳﮕﻤﻨﺖ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ ﭘﻮﺭﺕ ،ﺗﻘﺴﻴﻢ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﻳﮏ ﺍﺗﺼﺎﻝ ١٠ﻣﮕﺎﺑﻴﺖ
ﺩﺭ ﺛﺎﻧﻴﻪ ،ﺩﺍﺭﺍﻱ Costﺑﻪ ﻣﻴﺰﺍﻥ ١٠٠ﺍﺳﺖ ) ١,٠٠٠ﺗﻔﺴﻴﻢ ﺑﺮ .( ١٠ﺑﻪ ﻣﻨﻈﻮﺭ
ﻫﻤﺎﻫﻨﮓ ﺷﺪﻥ ﺑﺎ ﺍﻓﺰﺍﻳﺶ ﺳﺮﻋﺖ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ Costﻧﻴﺰ
ﺍﺻﻼﺡ ﻣﻲ ﮔﺮﺩﺩ .ﺟﺪﻭﻝ ﺯﻳﺮ ﻣﻘﺎﺩﻳﺮ ﺟﺪﻳﺪ STP Costﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ.
) ﻣﻘﺪﺍﺭ cost Pathﻣﻲ ﺗﻮﺍﻧﺪ ﻳﮏ ﻣﻘﺪﺍﺭ ﺩﻟﺨﻮﺍﻩ ﺑﻮﺩﻩ ﮐﻪ ﺗﻮﺳﻂ ﻣﺪﻳﺮﻳﺖ ﺷﺒﮑﻪ
ﺗﻌﺮﻳﻒ ﻭ ﻣﺸﺨﺺ ﻣﻲ ﮔﺮﺩﺩ (
STP Cost Value Bandwidth
250 4 Mbps
100 10 Mbps
62 16 Mbps
288
39 45 Mbps
19 100 Mbps
14 155 Mbps
6 622 Mbps
4 1 Gbps
2 10 Gbps
• ﻫﺮ ﺳﻮﺋﻴﭻ ﻓﺮﺁﻳﻨﺪﻱ ﺭﺍ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺘﺨﺎﺏ ﻣﺴﻴﺮﻫﺎﻱ ﺷﺒﮑﻪ ﮐﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺗﻮﺳﻂ ﻫﺮ
ﻳﮏ ﺍﺯ ﺳﮕﻤﻨﺖ ﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ ،ﺁﻏﺎﺯ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺍﻃﻼﻋﺎﺕ ﻓﻮﻕ ﺗﻮﺳﻂ ﺳﺎﻳﺮ
ﺳﻮﺋﻴﭻ ﻫﺎ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﭘﺮﻭﺗﮑﻞ ﺧﺎﺹ ﺑﺎ ﻧﺎﻡ Bridge(BPUD
(protocol data unitsﺑﻪ ﺍﺷﺘﺮﺍﮎ ﮔﺬﺍﺷﺘﻪ ﻣﻲ ﺷﻮﺩ .ﺳﺎﺧﺘﺎﺭ ﻳﮏ BPUD
ﺑﺸﺮﺡ ﺯﻳﺮ ﺍﺳﺖ :
. Root BID -ﭘﺎﺭﺍﻣﺘﺮ ﻓﻮﻕ BIDﻣﺮﺑﻮﻁ ﺑﻪ Root Bridgeﺟﺎﺭﻱ ﺭﺍ
ﻣﺸﺨﺺ ﻣﻲ ﮐﻨﺪ.
. Path Cost to Bridge -ﻣﺴﺎﻓﺖ root bridgeﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﻣﺜﻼ" ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺩﺍﺩﻩ ﺍﺯ ﻃﺮﻳﻖ ﻃﻲ ﻧﻤﻮﺩﻥ ﺳﻪ ﺳﮕﻤﻨﺖ ﺑﺎ ﺳﺮﻋﺘﻲ ﻣﻌﺎﺩﻝ ١٠٠
ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺑﺮﺍﻱ ﺭﺳﻴﺪﻥ ﺑﻪ Root bridgeﺑﺎﺷﺪ ،ﻣﻘﺪﺍﺭ costﺑﺼﻮﺭﺕ
) (٣٨=٠+١٩+١٩ﺑﺪﺳﺖ ﻣﻲ ﺁﻳﺪ .ﺳﮕﻤﻨﺘﻲ ﮐﻪ ﺑﻪ Root Bridgeﻣﺘﺼﻞ ﺍﺳﺖ
ﺩﺍﺭﺍﻱ Costﻣﻌﺎﺩﻝ ﺻﻔﺮ ﺍﺳﺖ.
. Sender BID -ﻣﺸﺨﺼﻪ BIDﺳﻮﺋﻴﭻ ﺍﺭﺳﺎﻝ ﮐﻨﻨﺪﻩ BPDUﺭﺍ ﻣﺸﺨﺺ
ﻣﻲ ﮐﻨﺪ.
. Port ID -ﭘﻮﺭﺕ ﺍﺭﺳﺎﻝ ﮐﻨﻨﺪﻩ BPDUﻣﺮﺑﻮﻁ ﺑﻪ ﺳﻮﺋﻴﭻ ﺭﺍ ﻣﺸﺨﺺ
ﻣﻲ ﻧﻤﺎﻳﺪ.
ﺗﻤﺎﻡ ﺳﻮﺋﻴﺞ ﻫﺎ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﺑﻬﺘﺮﻳﻦ ﻣﺴﻴﺮ ﺑﻴﻦ ﺳﮕﻤﻨﺖ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ،
ﺑﺼﻮﺭﺕ ﭘﻴﻮﺳﺘﻪ ﺑﺮﺍﻱ ﻳﮑﺪﻳﮕﺮ BPDUﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﺳﻮﺋﻴﭽﻲ ﻳﮏ BPDU
289
ﺭﺍ )ﺍﺯ ﺳﻮﺋﻴﭻ ﺩﻳﮕﺮ( ﺩﺭﻳﺎﻓﺖ ﻣﻲ ﺩﺍﺭﺩ ﮐﻪ ﻣﻨﺎﺳﺒﺘﺮ ﺍﺯ ﺁﻥ ﭼﻴﺰﻱ ﺍﺳﺖ ﮐﻪ ﺧﻮﺩ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ
ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻫﻤﺎﻥ ﺳﮕﻤﻨﺖ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩﻩ ﺍﺳﺖ BPDU ،ﺧﻮﺩ ﺭﺍ ﻣﺘﻮﻗﻒ ) ﺑﻪ ﺳﺎﻳﺮ
ﺳﮕﻤﻨﺖ ﻫﺎ ﺍﺭﺍﺳﺎﻝ ﻧﻤﻲ ﻧﻤﺎﻳﺪ ( ﻭ ﺍﺯ BPDUﺳﺎﻳﺮ ﺳﻮﺋﻴﭻ ﻫﺎ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ
ﺳﮕﻤﻨﺖ ﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
ﻳﮏ Root bridgeﺑﺮ ﺍﺳﺎﺱ ﻓﺮﺁﻳﻨﺪﻫﺎﻱ BPDUﺑﻴﻦ ﺳﻮﺋﻴﺞ ﻫﺎ ،ﺍﻧﺘﺨﺎﺏ •
ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺍﺑﺘﺪﺍ ﻫﺮ ﺳﻮﺋﻴﺞ ﺧﻮﺩ ﺭﺍ ﺑﻪ ﻋﻨﻮﺍﻥ Rootﺩﺭ ﻧﻈﺮ ﻣﻲ ﮔﻴﺮﺩ .ﺯﻣﺎﻧﻴﮑﻪ
ﻳﮏ ﺳﻮﺋﻴﭻ ﺑﺮﺍﻱ ﺍﻭﻟﻴﻦ ﺑﺎﺭ ﺑﻪ ﺷﺒﮑﻪ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ ،ﻳﮏ BPDUﺭﺍ ﺑﻬﻤﺮﺍﻩ BID
ﺧﻮﺩ ﮐﻪ ﺑﻪ ﻋﻨﻮﺍﻥ Root BIDﺍﺳﺖ ،ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﺳﺎﻳﺮ ﺳﻮﺋﻴﭻ ﻫﺎ
BPDUﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻣﻲ ﺩﺍﺭﻧﺪ ،ﺁﻥ ﺭﺍ ﺑﺎ BIDﻣﺮﺑﻮﻃﻪ ﺍﻱ ﮐﻪ ﺑﻪ ﻋﻨﻮﺍﻥ Root
BIDﺫﺧﻴﺮﻩ ﻧﻤﻮﺩﻩ ﺍﻧﺪ ،ﻣﻘﺎﻳﺴﻪ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ Root BIDﺟﺪﻳﺪ
ﺩﺍﺭﺍﻱ ﻳﮏ ﻣﻘﺪﺍﺭ ﮐﻤﺘﺮ ﺑﺎﺷﺪ ،ﺗﻤﺎﻡ ﺳﻮﺋﻴﭻ ﻫﺎ ﺁﻥ ﺭﺍ ﺑﺎ ﺁﻧﭽﻴﺰﻱ ﮐﻪ ﻗﺒﻼ" ﺫﺧﻴﺮﻩ ﮐﺮﺩﻩ
ﺍﻧﺪ ،ﺟﺎﻳﮕﺰﻳﻦ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ Root BIDﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺩﺍﺭﺍﻱ ﻣﻘﺪﺍﺭ
Root BID ﮐﻤﺘﺮﻱ ﺑﺎﺷﺪ ،ﻳﮏ BPDUﺑﺮﺍﻱ ﺳﻮﺋﻴﭻ ﺟﺪﻳﺪ ﺑﻬﻤﺮﺍﻩ BIDﻣﺮﺑﻮﻁ ﺑﻪ
ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ .ﺯﻣﺎﻧﻴﮑﻪ ﺳﻮﺋﻴﭻ ﺟﺪﻳﺪ BPDUﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻣﻲ ﺩﺍﺭﺩ ،ﺍﺯ Root
ﺑﻮﺩﻥ ﺧﻮﺩ ﺻﺮﻓﻨﻈﺮ ﻭ ﻣﻘﺪﺍﺭ ﺍﺭﺳﺎﻟﻲ ﺭﺍ ﺑﻪ ﻋﻨﻮﺍﻥ Root BIDﺩﺭ ﺟﺪﻭﻝ ﻣﺮﺑﻮﻁ ﺑﻪ
ﺧﻮﺩ ﺫﺧﻴﺮﻩ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺤﻞ ،Root Bridgeﺳﺎﻳﺮ ﺳﻮﺋﻴﭻ ﻫﺎ ﻣﺸﺨﺺ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ ﮐﻪ •
ﺍﺳﺖ .ﭘﻮﺭﺕ ﻓﻮﻕ ،ﺍﺗﺼﺎﻟﻲ ﺍﺳﺖ ﮐﻪ ﺗﻮﺳﻂ ﺁﻥ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺍﻱ ﻳﮏ
ﺳﮕﻤﻨﺖ ﺧﺎﺹ ﺍﺭﺳﺎﻝ ﻭ ﻳﺎ ﺍﺯ ﺁﻥ ﺩﺭﻳﺎﻓﺖ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﺑﺎ ﺩﺍﺷﺘﻦ ﺻﺮﻓﺎ" ﻳﮏ ﻧﻤﻮﻧﻪ
ﺍﺯ ﭘﻮﺭﺕ ﻫﺎﻱ ﻓﻮﻕ ،ﺗﻤﺎﻡ ﻣﺸﮑﻼﺕ ﻣﺮﺑﻮﻁ ﺑﻪ Loopingﺑﺮﻃﺮﻑ ﺧﻮﺍﻫﺪ ﺷﺪ.
290
ﭘﻮﺭﺕ ﻫﺎﻱ designatedﺑﺮ ﺍﺳﺎﺱ ﮐﻮﺗﺎﻫﺘﺮﺗﻦ ﻣﺴﻴﺮ ﺑﻴﻦ ﻳﮏ ﺳﮕﻤﻨﺖ ﺗﺎ root •
ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﻪ ﺳﮕﻤﻨﺖ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﻋﻨﻮﺍﻥ non -designated portﺩﺭ ﻧﻈﺮ
ﮔﺮﻓﺘﻪ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎﻱ designatedﻣﻲ ﺗﻮﺍﻥ ﺑﻪ
ﻳﮏ ﺳﮕﻤﻨﺖ ﻣﺘﺼﻞ ﮔﺮﺩﻳﺪ.
ﻫﺮ ﺳﻮﺋﻴﭻ ﺩﺍﺭﺍﻱ ﺟﺪﻭﻝ BPDUﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ ﺑﻮﺩﻩ ﮐﻪ ﺑﺼﻮﺭﺕ ﺧﻮﺩﮐﺎﺭ ﺑﻬﻨﮕﺎﻡ •
291
ﺯﻣﺎﻧﻴﮑﻪ ﺭﻭﺗﺮ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺩﺭ ﻻﻳﻪ ﺳﻮﻡ ﺑﺪﻧﺒﺎﻝ ﺁﺩﺭﺱ ﻫﺎﻱ
ﻣﺒﺪﺍﺀ ﻭ ﻣﻘﺼﺪ ﮔﺸﺘﻪ ﺗﺎ ﻣﺴﻴﺮ ﻣﺮﺑﻮﻁ ﺑﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﻣﺸﺨﺺ ﻧﻤﺎﻳﺪ .ﺳﻮﺋﻴﭻ ﻫﺎﻱ
ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ MACﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺸﺨﺺ ﮐﺮﺩﻥ ﺁﺩﺭﺱ ﻣﺒﺪﺍﺀ ﻭ ﻣﻘﺼﺪ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ ).ﺍﺯ ﻃﺮﻳﻖ ﻻﻳﻪ ﺩﻭﻡ( ﻣﻬﻤﺘﺮﻳﻦ ﺗﻔﺎﻭﺕ ﺑﻴﻦ ﻳﮏ ﺭﻭﺗﺮ ﻭ ﻳﮏ ﺳﻮﺋﻴﭻ ﻻﻳﻪ ﺳﻮﻡ،
ﺍﺳﺘﻔﺎﺩﻩ ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﻻﻳﻪ ﺳﻮﻡ ﺍﺯ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺑﻬﻴﻨﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺑﺎ ﺳﺮﻋﺖ
ﻣﻄﻠﻮﺏ ﻧﻈﻴﺮ ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﻻﻳﻪ ﺩﻭﻡ ﺍﺳﺖ .ﻧﺤﻮﻩ ﺗﺼﻤﻴﻢ ﮔﻴﺮﻱ ﺁﻧﻬﺎ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻣﺴﻴﺮﻳﺎﺑﻲ
ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻣﺸﺎﺑﻪ ﺭﻭﺗﺮ ﺍﺳﺖ .ﺩﺭ ﻳﮏ ﻣﺤﻴﻂ ﺷﺒﮑﻪ ﺍﻱ ، LANﺳﻮﺋﻴﭻ ﻫﺎﻱ ﻻﻳﻪ
ﺳﻮﻡ ﻣﻌﻤﻮﻻ" ﺩﺍﺭﺍﻱ ﺳﺮﻋﺘﻲ ﺑﻴﺸﺘﺮ ﺍﺯ ﺭﻭﺗﺮ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻋﻠﺖ ﺍﻳﻦ ﺍﻣﺮ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺨﺖ
ﺍﻓﺰﺍﺭﻫﺎﻱ ﺳﻮﺋﻴﭽﻴﻨﮓ ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺳﻮﺋﻴﭻ ﻫﺎ ﺍﺳﺖ .ﺍﻏﻠﺐ ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﻻﻳﻪ ﺳﻮﻡ ﺷﺮﮐﺖ
ﺳﻴﺴﮑﻮ ،ﺑﻤﻨﺰﻟﻪ ﺭﻭﺗﺮﻫﺎﺋﻲ ﻣﻲ ﺑﺎﺷﻨﺪ ﮐﻪ ﺑﻤﺮﺍﺗﺐ ﺍﺯ ﺭﻭﺗﺮ ﻫﺎ ﺳﺮﻳﻌﺘﺮ ﺑﻮﺩﻩ ) ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺍﺧﺘﺼﺎﺻﻲ ﺳﻮﺋﻴﭽﻴﻨﮓ ( ﻭ ﺩﺍﺭﺍﻱ ﻗﻴﻤﺖ ﺍﺭﺯﺍﻧﺘﺮﻱ ﻧﺴﺒﺖ ﺑﻪ
ﺭﻭﺗﺮ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻧﺤﻮﻩ matching Patternﻭ cachingﺩﺭ ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﻻﻳﻪ ﺳﻮﻡ
ﻣﺸﺎﺑﻪ ﻳﮏ ﺭﻭﺗﺮ ﺍﺳﺖ .ﺩﺭ ﻫﺮ ﺩﻭ ﺩﺳﺘﮕﺎﻩ ﺍﺯ ﻳﮏ ﭘﺮﻭﺗﮑﻞ ﺭﻭﺗﻴﻨﮓ ﻭ ﺟﺪﻭﻝ ﺭﻭﺗﻴﻨﮓ ،ﺑﻪ
ﻣﻨﻈﻮﺭ ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﺑﻬﺘﺮﻳﻦ ﻣﺴﻴﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺳﻮﺋﻴﭻ ﻫﺎﻱ ﻻﻳﻪ ﺳﻮﻡ ﻗﺎﺩﺭ ﺑﻪ
ﺑﺮﻧﺎﻣﻪ ﺭﻳﺰﻱ ﻣﺠﺪﺩ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﺑﺼﻮﺭﺕ ﭘﻮﻳﺎ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺭﻭﺗﻴﻨﮓ ﻻﻳﻪ ﺳﻮﻡ
ﻣﻲ ﺑﺎﺷﻨﺪ ﻭ ﻫﻤﻴﻦ ﺍﻣﺮ ﺑﺎﻋﺚ ﺳﺮﻋﺖ ﺑﺎﻻﻱ ﭘﺮﺩﺍﺯﺵ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻣﻲ ﮔﺮﺩﺩ .ﺳﻮﺋﻴﭻ
ﻫﺎﻱ ﻻﻳﻪ ﺳﻮﻡ ،ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺩﺭﻳﺎﻓﺖ ﺷﺪﻩ ﺗﻮﺳﻂ ﭘﺮﻭﺗﮑﻞ ﺭﻭﺗﻴﻨﮓ ﺑﻪ ﻣﻨﻈﻮﺭ ﺑﻬﻨﮕﺎﻡ ﺳﺎﺯﻱ
ﺟﺪﺍﻭﻝ ﻣﺮﺑﻮﻁ ﺑﻪ Cachingﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﻣﻼﺣﻈﻪ ﮔﺮﺩﻳﺪ ،ﺩﺭ ﻃﺮﺍﺣﻲ ﺳﻮﺋﻴﭻ ﻫﺎﻱ LANﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻧﻮﻉ ﺳﻮﺋﻴﭻ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ،ﺗﺎﺛﻴﺮ ﻣﺴﺘﻘﻴﻢ ﺑﺮ ﺳﺮﻋﺖ ﻭ ﮐﻴﻔﻴﺖ ﻳﮏ ﺷﺒﮑﻪ
ﺭﺍ ﺑﺪﻧﺒﺎﻝ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ.
292
ﻣﻔﻬﻮﻡ ﺭﻭﺗﻴﻨﮓ
ﺭﻭﺗﺮﻫﺎﻱ ﻣﺠﺎﻭﺭ ﮐﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻧﺎﻥ ﺍﻣﮑﺎﻥ ﺍﺧﺬ ﺍﻃﻼﻋﺎﺕ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺷﺒﮑﻪ •
ﻫﻤﮕﺮﺍﺋﻲ ) ( Convergence
ﻓﺮﺁﻳﻨﺪ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺑﺮﺍﻱ ﺗﻤﺎﻣﻲ ﺭﻭﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺑﻬﻨﮕﺎﻡ
ﺳﺎﺯﻱ ﺟﺪﺍﻭﻝ ﺭﻭﺗﻴﻨﮓ ﻭ ﺍﻳﺠﺎﺩ ﻳﮏ ﻧﮕﺮﺵ ﺳﺎﺯﮔﺎﺭ ﺍﺯ ﺷﺒﮑﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺭ ﺑﻬﺘﺮﻳﻦ ﻣﺴﻴﺮﻫﺎﻱ
ﻣﻮﺟﻮﺩ .ﺩﺭ ﺯﻣﺎﻥ ﺍﻧﺠﺎﻡ ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ )ﻫﻤﮕﺮﺍﺋﻲ( ،ﺩﺍﺩﻩ ﮐﺎﺭﺑﺮ ﺍﺭﺳﺎﻝ ﻧﺨﻮﺍﻫﺪ ﺷﺪ.
293
ﻣﺴﻴﺮ ﭘﻴﺶ ﻓﺮﺽ ) ( Default Route
ﻳﮏ ﻣﺴﻴﺮ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺩﺭﺝ ﺷﺪﻩ ﺩﺭ ﺟﺪﻭﻝ ﺭﻭﺗﻴﻨﮓ ﮐﻪ ﺑﻪ ﻋﻨﻮﺍﻥ ﺍﻭﻟﻴﻦ ﮔﺰﻳﻨﻪ ﺩﺭ ﻧﻈﺮ
ﮔﺮﻓﺘﻪ ﻣﻲ ﺷﻮﺩ .ﻫﺮ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﮐﻪ ﺗﻮﺳﻂ ﻳﮏ ﺩﺳﺘﮕﺎﻩ ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﻪ ﻣﺴﻴﺮ
ﭘﻴﺶ ﻓﺮﺽ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻣﺴﻴﺮ ﻓﻮﻕ ﻣﺸﮑﻞ ﺩﺍﺷﺘﻪ ﺑﺎﺷﺪ ،ﻳﮏ ﻣﺴﻴﺮ
ﺩﻳﮕﺮ ﺍﻧﺘﺨﺎﺏ ﻣﻲ ﮔﺮﺩﺩ.
ﻣﺴﻴﺮ ﺍﻳﺴﺘﺎ ) ( Static Route
ﻳﮏ ﻣﺴﻴﺮ ﺩﺍﺋﻢ ﮐﻪ ﺑﻪ ﺻﻮﺭﺕ ﺩﺳﺘﻲ ﺩﺭﻭﻥ ﻳﮏ ﺟﺪﻭﻝ ﺭﻭﺗﻴﻨﮓ ﺩﺭﺝ ﻣﻲ ﮔﺮﺩﺩ .ﻣﺴﻴﺮ
ﻓﻮﻕ ﺣﺘﻲ ﺩﺭ ﻣﻮﺍﺭﺩﻳﮑﻪ ﺍﺭﺗﺒﺎﻁ ﻏﻴﺮ ﻓﻌﺎﻝ ﺍﺳﺖ ﺩﺭ ﺟﺪﻭﻝ ﺭﻭﺗﻴﻨﮓ ﺑﺎﻗﻲ ﻣﺎﻧﺪﻩ ﻭ ﺻﺮﻓﺎ" ﺑﻪ
ﺻﻮﺭﺕ ﺩﺳﺘﻲ ﺣﺬﻑ ﻣﻲ ﮔﺮﺩﺩ.
ﻣﺴﻴﺮ ﭘﻮﻳﺎ ) ( Dynamic Route
ﻳﮏ ﻣﺴﻴﺮ ﮐﻪ ﺑﻪ ﺻﻮﺭﺕ ﭘﻮﻳﺎ ) ﺍﺗﻮﻣﺎﺗﻴﮏ ( ﻭ ﻣﺘﻨﺎﺳﺐ ﺑﺎ ﺗﻐﻴﻴﺮﺍﺕ ﺷﺒﮑﻪ ،ﺑﻬﻨﮕﺎﻡ
ﻣﻲ ﮔﺮﺩﺩ .ﻣﺴﻴﺮﻫﺎﻱ ﭘﻮﻳﺎ ﻧﻘﻄﻪ ﻣﻘﺎﺑﻞ ﻣﺴﻴﺮﻫﺎﻱ ﺍﻳﺴﺘﺎ ﻣﻲ ﺑﺎﺷﻨﺪ.
294
ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺭﻭﺗﻴﻨﮓ
ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺭﻭﺗﻴﻨﮓ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺭﻭﺗﺮﻫﺎ ،ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺍﻧﺪ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ
ﻓﻮﻕ ،ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺍﻧﺪ ﮐﻪ ﺍﻣﮑﺎﻥ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺟﺪﺍﻭﻝ ﺭﻭﺗﻴﻨﮓ ﺑﻴﻦ
ﺭﻭﺗﺮﻫﺎ ﺭﺍ ﻓﺮﺍﻫﻢ ﻧﻤﺎﻳﺪ .ﺗﺎﮐﻨﻮﻥ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﺋﻲ ﺑﺎ
ﺍﺑﻌﺎﺩ ﮔﻮﻧﺎﮔﻮﻥ ،ﻃﺮﺍﺣﻲ ﻭ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺷﺪﻩ ﺍﺳﺖ.
295
ﺩﺭ ﺭﻭﺗﻴﻨﮓ ﭘﻮﻳﺎ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺭﻭﺗﻴﻨﮓ ﺑﻪ ﻣﻨﻈﻮﺭ ﻧﻴﻞ ﺑﻪ ﺍﻫﺪﺍﻑ ﺯﻳﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
ﺗﺸﺨﻴﺺ ﻭ ﻧﮕﻬﺪﺍﺭﻱ ﭘﻮﻳﺎﻱ ﺭﻭﺗﺮﻫﺎ •
ﺩﺭ ﺻﻮﺭﺕ ﺑﺮﻧﺎﻣﻪ ﺭﻳﺰﻱ ﺍﻳﺴﺘﺎﻱ ﺭﻭﺗﺮﻫﺎ ،ﺍﻣﮑﺎﻥ ﻳﺎﻓﺘﻦ ﺭﻭﺗﺮﻫﺎ ﻭ ﻳﺎ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﺮﺍﻱ
ﺳﺎﻳﺮ ﺭﻭﺗﺮﻫﺎ ﻭﺟﻮﺩ ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﺁﻧﺎﻥ ﺩﺍﺩﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺑﺮ ﺭﻭﻱ ﺭﻭﺗﺮﻫﺎﺋﻲ ﮐﻪ ﺗﻮﺳﻂ
ﻣﺪﻳﺮ ﺷﺒﮑﻪ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺍﺳﺖ ،ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺭﻭﺗﻴﻨﮓ ﭘﻮﻳﺎ
ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﺍﺯ ﺳﻪ ﻧﻮﻉ) ﮔﺮﻭﻩ( ﭘﺮﻭﺗﮑﻞ ﺭﻭﺗﻴﻨﮓ ﭘﻮﻳﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺗﻔﺎﻭﺕ
ﻋﻤﺪﻩ ﺑﻴﻦ ﺁﻧﺎﻥ ،ﺭﻭﺵ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺑﻪ ﻣﻨﻈﻮﺭ ﻳﺎﻓﺘﻦ ﺭﻭﺗﺮﻫﺎ ﻭ ﻣﺤﺎﺳﺒﺎﺕ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ
ﻣﺴﻴﺮﻳﺎﺑﻲ ﺁﻧﺎﻥ ﺍﺳﺖ.
: Distance Vectorﺍﻳﻦ ﻧﻮﻉ ﺭﻭﺗﺮﻫﺎ ﺑﻬﺘﺮﻳﻦ ﻣﺴﻴﺮ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺍﻃﻼﻋﺎﺕ •
296
ﻓﺮﺁﻳﻨﺪ ﺭﻭﺗﻴﻨﮓ
297
ﻣﺮﺣﻠﻪ ﻳﮏ :ﮐﺎﻣﭙﻴﻮﺗﺮ)ﻣﻴﺰﺑﺎﻥ( Aﺍﺯ ﻃﺮﻳﻖ ﺧﻂ ﺩﺳﺘﻮﺭ ،ﻓﺮﻣﺎﻥ ping 200.200.200.5ﺭﺍ
ﺗﺎﻳﭗ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﻣﺮﺣﻠﻪ ﺩﻭﻡ :ﭘﺮﻭﺗﮑﻞ IPﺑﺎ ﭘﺮﻭﺗﮑﻞ ) ARPﺍﻗﺘﺒﺎﺱ ﺷﺪﻩ ﺍﺯ ﮐﻠﻤﺎﺕ Address
( protocol Resolutionﮐﺎﺭ ﻧﻤﻮﺩﻩ ﺗﺎ ﻣﺸﺨﺺ ﮔﺮﺩﺩ ﮐﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻓﻮﻕ ﻋﺎﺯﻡ
ﭼﻪ ﺷﺒﮑﻪ ﺍﻱ ﺍﺳﺖ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﺁﺩﺭﺱ IPﻭ Subnet Maskﮐﺎﻣﭙﻴﻮﺗﺮ Aﺑﺮﺭﺳﻲ
ﻣﻲ ﮔﺮﺩﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﮐﻪ ﺩﺭﺧﻮﺍﺳﺖ ﻓﻮﻕ ﺑﺮﺍﻱ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺭﺍﻩ ﺩﻭﺭ ﻣﻲ ﺑﺎﺷـــﺪ،
ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺍﻱ ﺭﻭﺗﺮ ) Gatewayﺷﺒﮑﻪ ( Aﺍﺭﺳﺎﻝ ﺗﺎ ﻭﻱ ﺑﺘﻮﺍﻧﺪ ﺁﻥ ﺭﺍ
ﺑﻪ ﺷﺒﮑﻪ ﻣﻮﺭﺩ ﻧﻈﺮ ﻫﺪﺍﻳﺖ ﻧﻤﺎﻳﺪ ) ﺩﺭ ﺍﻳﻦ ﻣﻮﺭﺩ ﺧﺎﺹ ﺷﺒﮑﻪ .( B
ﻣﺮﺣﻠﻪ ﺳﻮﻡ :ﮐﺎﻣﭙﻴﻮﺗﺮ Aﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺍﻱ ﺭﻭﺗﺮ ،ﻧﻴﺎﺯﻣﻨﺪ ﺁﮔﺎﻫﻲ ﺍﺯ
ﺁﺩﺭﺱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺭﻭﺗﺮ ﺍﺳﺖ ﮐﻪ ﺑﻪ ﺷﺒﮑﻪ Aﻣﺘﺼﻞ ﺷﺪﻩ ﺍﺳﺖ ).ﻣﻨﻈﻮﺭ
ﺁﺩﺭﺱ MACﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ E0ﺍﺳﺖ ﮐﻪ ﺷﺒﮑﻪ Aﺍﺯ ﻃﺮﻳﻖ ﺁﻥ ﺑﻪ ﺭﻭﺗﺮ ﻣﺘﺼﻞ ﺷﺪﻩ
ﺍﺳﺖ ( .ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺭﻳﺎﻓﺖ ﺁﺩﺭﺱ ،MACﮐﺎﻣﭙﻴﻮﺗﺮ Aﻣﺤﺘﻮﻳﺎﺕ ARP cacheﺧﻮﺩ ﺭﺍ
ﺑﺮﺭﺳﻲ ﻣﻲ ﻧﻤﺎﻳﺪ ،Cache ARP .ﻣﺤﻠﻲ ﺍﺯ ﺣﺎﻓﻈﻪ ﺍﺳﺖ ﮐﻪ ﺁﺩﺭﺱ ﻫﺎﻱ MACﺑﺮﺍﻱ
ﭼﻨﺪﻳﻦ ﺛﺎﻧﻴﻪ ﺩﺭ ﺁﻧﺠﺎ ﺫﺧﻴﺮﻩ ﻣﻲ ﮔﺮﺩﻧﺪ.
ﻣﺮﺣﻠﻪ ﭼﻬﺎﺭﻡ :ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺁﺩﺭﺱ MACﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺭﻭﺗﺮ ﮐﻪ ﺑﻪ ﺷﺒﮑﻪ A
ﻣﺘﺼﻞ ﺷﺪﻩ ﺍﺳﺖ ﺩﺭ ARP Cacheﮐﺎﻣﭙﻴﻮﺗﺮ Aﭘﻴﺪﺍ ﻧﺸﻮﺩ ،ﻧﺸﺎﻧﺪ ﻫﻨﺪﻩ ﺍﻳﻦ ﻣﻮﺿﻮﻉ
ﺍﺳﺖ ﮐﻪ ﻣﺪﺕ ﺯﻣﺎﻥ ﺯﻳﺎﺩﻱ ﺍﺯ ﺍﺭﺗﺒﺎﻁ ﻭﻱ ﺑﺎ ﺭﻭﺗﺮ ﮔﺬﺷﺘﻪ ﻭ ﻳﺎ ﻭﻱ ﻗﺎﺩﺭ ﺑﻪ ﻳﺎﻓﺘﻦ ﺁﺩﺭﺱ
MACﻣﺮﺑﻮﻁ ﺑﻪ ﺭﻭﺗﺮ ) ﺍﻳﻨﺘﺮﻓﻴﺴﻲ ﮐﻪ ﺑﻪ ﺷﺒﮑﻪ Aﻣﺘﺼﻞ ﺷﺪﻩ ﺍﺳﺖ ( ﻧﻤﻲ ﺑﺎﺷﺪ .ﺑﺎ ﺗﻮﺟﻪ
ﺑﻪ ﻭﺿﻌﻴﺖ ﻓﻮﻕ ،ﮐﺎﻣﭙﻴﻮﺗﺮ Aﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﻳﮏ ARP broadcastﻣﻲ ﻧﻤﺎﻳﺪ .ﭘﻴﺎﻡ
ﺍﺭﺳﺎﻟﻲ ﺩﺭ ﭘﻲ ﻳﺎﻓﺘﻦ ﭘﺎﺳﺨﻲ ﻣﻨﺎﺳﺐ ﺑﺪﻳﻦ ﺳﻮﺍﻝ ﺍﺳﺖ ﮐﻪ " :ﺁﺩﺭﺱ MACﻣﺮﺑﻮﻁ ﺑﻪ
IP:192.168.0.1ﭼﻴﺴﺖ ؟" .ﭘﺲ ﺍﺯ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ،broadcastﺭﻭﺗﺮ ﺗﺸﺨﻴﺺ
ﻣﻲ ﺩﻫﺪ ﮐﻪ ﺁﺩﺭﺱ IPﻣﺮﺑﻮﻁ ﺑﻪ ﻭﻱ ﺑﻮﺩﻩ ﻭ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﺩﺭﺧﻮﺍﺳﺖ ﻓﻮﻕ ،ﭘﺎﺳﺦ ﺩﻫﺪ.
ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ،ﺭﻭﺗﺮ ﺑﺎ ﺍﺭﺳﺎﻝ ﺁﺩﺭﺱ MACﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ ، E0ﭘﺎﺳﺦ ﻻﺯﻡ ﺭﺍ ﺑﻪ
ﮐﺎﻣﭙﻴﻮﺗﺮ Aﺧﻮﺍﻫﺪ ﺩﺍﺩ.
298
ﻳﮑﻲ ﺍﺯ ﺩﻻﻳﻠﻲ ﮐﻪ ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﻗﻊ ﺩﺳﺘﻮﺭ Pingﺩﺭ ﺍﻭﻟﻴﻦ ﻣﺮﺗﺒﻪ ﺑﺎ Time out
ﻣﻮﺍﺟﻪ ﻣﻲ ﺷﻮﺩ ﺑﻪ ﻣﻮﺿﻮﻉ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ﺑﺮﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ﻣﺪﺕ ﺯﻣﺎﻥ ﺯﻳﺎﺩﻱ
ﻃﻮﻝ ﺧﻮﺍﻫﺪ ﮐﺸﻴﺪ ﮐﻪ ﻳﮏ ARPﺍﺭﺳﺎﻝ ﻭ ﻣﺎﺷﻴﻦ ﻣﺮﺑﻮﻃﻪ ﺑﺎ ﺍﺭﺳﺎﻝ ﺁﺩﺭﺱ MACﺧﻮﺩ ﺑﻪ
ﺁﻥ ﭘﺎﺳﺦ ﺩﻫﺪ ) TTL:Time To Liveﺍﻭﻟﻴﻦ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ Pingﺑﻪ ﺳﺮ ﺁﻣﺪﻩ ﻭ ﭘﻴﺎﻡ
Time outﺭﺍ ﺧﻮﺍﻫﻴﻢ ﺩﺍﺷﺖ (.
ﻣﺮﺣﻠﻪ ﭘﻨﺠﻢ :ﺭﻭﺗﺮ ﺑﺎ ﺍﺭﺳﺎﻝ ﺁﺩﺭﺱ IP:192.168.0.1ﮐﻪ ﺑﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ E0ﺁﻥ ﻧﺴﺒﺖ
ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳﺖ ،ﭘﺎﺳﺦ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ،ﮐﺎﻣﭙﻴﻮﺗﺮ Aﺗﻤﺎﻣﻲ ﺍﻃﻼﻋﺎﺕ
ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﺧﺎﺭﺝ ﺍﺯ ﺷﻴﮑﻪ ﻭ ﺑﺮﺍﻱ ﺭﻭﺗﺮ ﺭﺍ ﺩﺍﺭﺍ ﻣﻲ
ﺑﺎﺷﺪ .ﻻﻳﻪ ﺷﺒﮑﻪ ﺑﻪ ﻻﻳﻪ DataLinkﮐﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺗﻮﺳﻂ ) Pingﻳﮏ ICMP
( echo requestﺗﻮﻟﻴﺪ ﻧﻤﻮﺩﻩ ﺍﺳﺖ ،ﺑﻪ ﻫﻤﺮﺍﻩ ﺁﺩﺭﺱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﺭﻭﺗﺮ ،ﺍﺷﺎﺭﻩ ﻣﻲ
ﻧﻤﺎﻳﺪ .ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺷﺎﻣﻞ ﺁﺩﺭﺱ ﻫﺎﻱ IPﻣﺒﺪﺍﺀ ﻭ ﻣﻘﺼﺪ ﺑﻪ ﻫﻤﺮﺍﻩ ICMP echo
ﺍﺳﺖ ﮐﻪ ﺩﺭ ﻻﻳﻪ ﺷﺒﮑﻪ ﻣﺸﺨﺺ ﺷﺪﻩ ﺍﺳﺖ.
299
ﻣﺮﺣﻠﻪ ﻫﻔﺘﻢ :ﻻﻳﻪ DataLinkﮐﺎﻣﭙﻴﻮﺗﺮ ، Aﻓﺮﻳﻢ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻻﻳﻪ ﻓﻴﺰﻳﮑﻲ ﻗﺮﺍﺭ ﺩﺍﺩﻩ ﺗﺎ
ﺻﻔﺮ ﻭ ﻳﮏ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺁﻥ ﺑﻪ ﻳﮏ ﺳﻴﮕﻨﺎﻝ ﺩﻳﺠﻴﺘﺎﻝ ﺗﺒﺪﻳﻞ ﻭ ﺑﺮ ﺭﻭﻱ ﻣﺤﻴﻂ ﻓﻴﺰﻳﮑﻲ
ﺷﺒﮑﻪ ﺍﺭﺳﺎﻝ ﮔﺮﺩﺩ .
ﻣﺮﺣﻠﻪ ﻫﺸﺘﻢ :ﺳﻴﮕﻨﺎﻝ ﺍﺭﺳﺎﻟﻲ ﺗﻮﺳﻂ ﺍﻳﻨﺘﺮﻓﻴﺲ E0ﺭﻭﺗﺮ ﺑﺮﺩﺍﺷﺘﻪ ﺷﺪﻩ ﻭ ﻓﺮﻳﻢ ﺧﻮﺍﻧﺪﻩ
ﻣﻲ ﺷﻮﺩ .ﺭﻭﺗﺮ ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﺨﺶ CRCﺁﻥ ﺭﺍ ﺑﺮﺭﺳﻲ ﻭ ﺁﻥ ﺭﺍ ﺑﺎ ﻣﻘﺪﺍﺭ CRCﺍﺿﺎﻓﻪ ﺷﺪﻩ ﺑﻪ
ﻓﺮﻳﻢ ﺗﻮﺳﻂ ﮐﺎﻣﭙﻴﻮﺗﺮ Aﻣﻘﺎﻳﺴﻪ ﻣﻲ ﻧﻤﺎﻳﺪ )ﺣﺼﻮﻝ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﻋﺪﻡ ﺧﺮﺍﺑﻲ ﻓﺮﻳﻢ(.
ﻣﺮﺣﻠﻪ ﻧﻬﻢ :ﺩﺭ ﺍﺩﺍﻣﻪ ،ﺁﺩﺭﺱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﻣﻘﺼﺪ ) ( MACﻓﺮﻳﻢ ﺩﺭﻳﺎﻓﺘﻲ ،ﺑﺮﺭﺳﻲ
ﻣﻲ ﮔﺮﺩﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻭﺟﻮﺩ ﻳﮏ ﻣﻮﺭﺩ ﺁﺩﺭﺱ ﮐﻪ ﺑﺎ ﺁﻥ ﻣﻄﺎﺑﻘﺖ ﺧﻮﺍﻫﺪ ﮐﺮﺩ ،ﻓﻴﻠﺪ "ﻧﻮﻉ
ﻓﺮﻳﻢ" ﺑﺮﺭﺳﻲ ﺗﺎ ﻧﺤﻮﻩ ﺑﺮﺧﻮﺭﺩ ﺭﻭﺗﺮ ﺑﺎ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ،ﻣﺸﺨﺺ ﮔﺮﺩﺩ IP .ﺩﺭ "ﻓﻴﻠﺪ ﻧﻮﻉ "
ﺑﻮﺩﻩ ﻭ ﺭﻭﺗﺮ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﭘﺮﻭﺗﮑﻞ IPﮐﻪ ﺑﺮ ﺭﻭﻱ ﺭﻭﺗﺮ ﺩﺭ ﺣﺎﻝ ﺍﺟﺮﺍﺀ
ﺍﺳﺖ ،ﻗﺮﺍﺭ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﻓﺮﻳﻢ ﺍﺯ ﻭﺿﻌﻴﺖ ﻣﻮﺟﻮﺩ ﺧﺎﺭﺝ ﻭ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﻭﻟﻴﻪ ﺍﻱ ﮐﻪ
ﺗﻮﺳﻂ ﮐﺎﻣﭙﻴﻮﺗﺮ Aﺗﻮﻟﻴﺪ ﺷﺪﻩ ﺍﺳﺖ ﺩﺭ ﺑﺎﻓﺮ ﺭﻭﺗﺮ ﺫﺧﻴﺮﻩ ﻣﻲ ﮔﺮﺩﺩ.
ﻣﺮﺣﻠﻪ ﺩﻫﻢ :ﭘﺮﻭﺗﮑﻞ IPﺑﺮﺭﺳﻲ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺁﺩﺭﺱ IPﻣﻘﺼﺪ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﺍﺩﻩ ﺗﺎ
ﻣﺸﺨﺺ ﮔﺮﺩﺩ ﮐﻪ ﺁﻳﺎ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺍﻱ ﺭﻭﺗﺮ ﺍﺳﺖ.ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﺁﺩﺭﺱ :IP
، ٢٠٠,٢٠٠,٢٠٠,٥ﻣﻲ ﺑﺎﺷﺪ ،ﺭﻭﺗﺮ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺟﺪﻭﻝ ﺭﻭﺗﻴﻨﮓ ﺧﻮﺩ ﺗﺸﺨﻴﺺ ﺧﻮﺍﻫﺪ ﺩﺍﺩ
ﮐﻪ ﺁﺩﺭﺱ ﻓﻮﻕ ﻣﺮﺑﻮﻁ ﺑﻪ ﺷﺒﮑﻪ ﺍﻱ ﺍﺳﺖ ﮐﻪ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻓﻴﺲ E1ﻣﺴﺘﻘﻴﻤﺎ" ﺑﻪ ﺭﻭﺗﺮ
ﻣﺘﺼﻞ ﺷﺪﻩ ﺍﺳﺖ.
300
ﻣﺮﺣﻠﻪ ﻳﺎﺯﺩﻫﻢ :ﺭﻭﺗﺮ ،ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺩﺭ ﺑﺎﻓﺮ ﺍﻳﻨﺘﺮﻓﻴﺲ E1ﻣﺴﺘﻘﺮ ﻧﻤﻮﺩﻩ ﻭ
ﻣﻲ ﺑﺎﻳﺴﺖ ﻳﮏ ﻓﺮﻳﻢ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻘﺼﺪ ﺭﺍ ﺗﻮﻟﻴﺪ ﻧﻤﺎﻳﺪ.
ﺭﻭﺗﺮ ﺩﺭ ﺍﺑﺘﺪﺍ ARP Cacheﺧﻮﺩ ﺭﺍ ﺑﻪ ﻣﻨﻈﻮﺭ ﻳﺎﻓﺘﻦ ﺁﺩﺭﺱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﻣﺮﺑﻮﻁ ﺑﻪ
، IP:200.200.200.5ﺑﺮﺭﺳﻲ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭ ﺻﻮﺭﺕ ﻋﺪﻡ ﻭﺟﻮﺩ ﺁﺩﺭﺱ ﻓﻮﻕ ﺩﺭ
، ARP cacheﺭﻭﺗﺮ ﻳﮏ broadcast ARPﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻓﻴﺲ E1ﺑﻪ ﻣﻨﻈﻮﺭ ﭘﻴﺪﺍ
ﻧﻤﻮﺩﻥ ﺁﺩﺭﺱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﻓﻮﻕ ،ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﻣﺮﺣﻠﻪ ﺩﻭﺍﺯﺩﻫﻢ :ﮐﺎﻣﭙﻴﻮﺗﺮ Bﺑﺎ ﺍﺭﺍﺋﻪ ﻳﮏ ARP Replyﭘﺎﺳﺦ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺁﺩﺭﺱ
ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ ﺭﺍ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ،ﺍﻳﻨﺘﺮﻓﻴﺲ E1
ﺭﻭﺗﺮ ﺗﻤﺎﻣﻲ ﺍﻃﻼﻋﺎﺕ ﻻﺯﻡ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﻣﻘﺼﺪ ﻧﻬﺎﺋﻲ ﺭﺍ ﺩﺍﺭﺍ
ﻣﻲ ﺑﺎﺷﺪ.
ﻣﺮﺣﻠﻪ ﺳﻴﺰﺩﻫﻢ :ﻓﺮﻳﻢ ﺗﻮﻟﻴﺪ ﺷﺪﻩ ﺗﻮﺳﻂ ﺍﻳﻨﺘﺮﻓﻴﺲ E1ﺭﻭﺗﺮ ﺩﺍﺭﺍﻱ ﺁﺩﺭﺱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ
ﻣﺒﺪﺍﺀ ﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ E1ﻭ ﺁﺩﺭﺱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﻣﻘﺼﺪ ﻣﺮﺑﻮﻁ ﺑﻪ ﮐﺎﺭﺕ ﺷﺒﮑﻪ
ﮐﺎﻣﭙﻴﻮﺗﺮ Bﻣﻲ ﺑﺎﺷﺪ.ﺑﺎ ﺍﻳﻦ ﮐﻪ ﺁﺩﺭﺱ ﻫﺎﻱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﻣﺒﺪﺍﺀ ﻭ ﻣﻘﺼﺪ ﻓﺮﻳﻢ ﺩﺭ ﻫﺮ ﻳﮏ
ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﺭﻭﺗﺮ ﺗﻐﻴﻴﺮ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺁﺩﺭﺱ IPﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﺒﺪﺍﺀ ﻭ ﻣﻘﺼﺪ ﻫﺮﮔﺰ
ﺗﻐﻴﻴﺮ ﭘﻴﺪﺍ ﻧﻤﻲ ﻧﻤﺎﻳﺪ ) ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻫﺮﮔﺰ ﺗﻐﻴﻴﺮ ﻧﮑﺮﺩﻩ ﻭ ﺻﺮﻓﺎ" ﻓﺮﻳﻢ ﺗﻐﻴﻴﺮ ﻣﻲ ﻧﻤﺎﻳﺪ(.
301
ﻣﺮﺣﻠﻪ ﭘﺎﻧﺰﺩﻫﻢ :ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﮐﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻳﮏ ﺩﺭﺧﻮﺍﺳﺖ ICMP echo
ﺍﺳﺖ ،ﮐﺎﻣﭙﻴﻮﺗﺮ Bﻳﮏ ICMP echo-replyﺟﺪﻳﺪ ﺭﺍ ﮐﻪ ﺷﺎﻣﻞ ﺁﺩﺭﺱ IPﻣﺒﺪﺍﺀ
) ﮐﺎﻣﭙﻴﻮﺗﺮ ( Bﻭ ﺁﺩﺭﺱ IPﻣﻘﺼﺪ ﻣﺮﺑﻮﻁ ﺑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ Aﻣﻲ ﺑﺎﺷﺪ ﺭﺍ ﺍﻳﺠﺎﺩ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ،ﻣﺠﺪﺩﺍ" ﻭ ﺩﺭ ﺟﻬﺖ ﻣﻌﮑﻮﺱ ﺗﮑﺮﺍﺭ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ ،ﺁﺩﺭﺱ ﺳﺨﺖ
ﺍﻓﺰﺍﺭﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭﻃﻮﻝ ﻣﺴﻴﺮ ﺷﻨﺎﺧﺘﻪ ﺷﺪﻩ ﺑﻮﺩﻩ ﻭ ﻫﺮ ﺩﺳﺘﮕﺎﻩ
ﺻﺮﻓﺎ" ﻧﻴﺎﺯﻣﻨﺪ ﺑﺮﺭﺳﻲ ARP cacheﻣﺮﺑﻮﻁ ﺑﻪ ﺧﻮﺩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺸﺨﻴﺺ ﺁﺩﺭﺱ ﺳﺨﺖ
ﺍﻓﺰﺍﺭﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ﻣﻲ ﺑﺎﺷﺪ ) ﺁﺩﺭﺱ .( MAC
302
ﺭﻭﺗﺮ
ﺍﻳﻨﺘﺮﻧﺖ ﻳﮑﻲ ﺍﺯ ﺷﺎﻫﮑﺎﺭﻫﺎﻱ ﺑﺸﺮﻳﺖ ﺩﺭ ﺯﻣﻴﻨﻪ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺍﺳﺖ .ﺑﺎ ﺍﻳﺠﺎﺩ ﺯﻳﺮ
ﺳﺎﺧﺖ ﻣﻨﺎﺳﺐ ﺍﺭﺗﺒﺎﻃﻲ ،ﮐﺎﺭﺑﺮﺍﻥ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻗﺼﻲ ﻧﻘﺎﻁ ﺩﻧﻴﺎ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﻧﺎﻣﻪ ﻫﺎﻱ
ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ،ﻣﺸﺎﻫﺪﻩ ﺻﻔﺤﺎﺕ ﻭﺏ ،ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﻓﺎﻳﻞ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﮐﻤﺘﺮ ﺍﺯ ﭼﻨﺪ
ﺛﺎﻧﻴﻪ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺷﺒﮑﻪ ﺍﺭﺗﺒﺎﻃﻲ ﻣﻮﺟﻮﺩ ﺑﺎ ﺑﮑﺎﺭﮔﻴﺮﻱ ﺍﻧﻮﺍﻉ ﺗﺠﻬﻴﺰﺍﺕ ﻣﺨﺎﺑﺮﺍﺗﻲ ،ﺳﺨﺖ
ﺍﻓﺰﺍﺭﻱ ﻭ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ،ﺯﻳﺮ ﺳﺎﺧﺖ ﻣﻨﺎﺳﺐ ﺍﺭﺗﺒﺎﻃﻲ ﺭﺍ ﺑﺮﺍﻱ ﻋﻤﻮﻡ ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﻓﺮﺍﻫﻢ
ﺁﻭﺭﺩﻩ ﺍﺳﺖ .ﻳﮑﻲ ﺍﺯ ﻋﻨﺎﺻﺮ ﺍﺻﻠﻲ ﻭ ﻣﻬﻢ ﮐﻪ ﺷﺎﻳﺪ ﺍﻏﻠﺐ ﮐﺎﺭﺑﺮﺍﻥ ﺍﻳﻨﺘﺮﻧﺖ ﺁﻥ ﺭﺍ ﺗﺎﮐﻨﻮﻥ
ﻣﺸﺎﻫﺪﻩ ﻧﻨﻤﻮﺩﻩ ﺍﻧﺪ ،ﺭﻭﺗﺮ ﺍﺳﺖ .ﺭﻭﺗﺮﻫﺎ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺧﺎﺻﻲ ﻫﺴﺘﻨﺪ ﮐﻪ ﭘﻴﺎﻡ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ
ﮐﺎﺭﺑﺮﺍﻥ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻫﺰﺍﺭﺍﻥ ﻣﺴــﻴﺮ ﻣﻮﺟﻮﺩ ﺑﻪ ﻣﻘﺎﺻــﺪ ﻣﻮﺭﺩ ﻧﻈﺮ ﻫﺪﺍﻳﺖ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
303
ﮔﺮﺍﻓﻴﺴﺖ ﻓﺎﻳﻠﻲ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﺷﺒﮑﻪ ﺑﺮﺍﻱ ﻫﻤﮑﺎﺭ ﺧﻮﺩ ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ ،ﺑﺪﻟﻴﻞ ﺣﺠﻢ
ﺑﺎﻻﻱ ﻓﺎﻳﻞ ﺍﺭﺳﺎﻟﻲ ،ﺍﮐﺜﺮ ﻇﺮﻓﻴﺖ ﺷﺒﮑﻪ ﺍﺷﻐﺎﻝ ﻭ ﺑﺪﻧﺒﺎﻝ ﺁﻥ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﮐﺎﺭﺑﺮﺍﻥ ،ﺷﺒﮑﻪ ﮐﻨﺪ
ﺧﻮﺍﻫﺪ ﺷﺪ .ﻋﻠﺖ ﻓﻮﻕ ) ﺗﺎﺛﻴﺮ ﻋﻤﻠﮑﺮﺩ ﻳﮏ ﮐﺎﺭﺑﺮ ﺑﺮ ﺗﻤﺎﻡ ﻋﻤﻠﮑﺮﺩ ﺷﺒﮑﻪ ﺑﺮﺍﻱ ﺳﺎﻳﺮ
ﮐﺎﺭﺑﺮﺍﻥ ( ﺑﻪ ﻣﺎﻫﻴﺖ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﺑﺮﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻓﻮﻕ ﻫﺮ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ
ﮐﻪ ﺗﻮﺳﻂ ﮐﺎﺭﺑﺮﻱ ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ ،ﺑﺮﺍﻱ ﺗﻤﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻧﻴﺰ ﺍﺭﺳﺎﻝ
ﺧﻮﺍﻫﺪ ﺷﺪ .ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺁﺩﺭﺱ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭﻳﺎﻓﺖ ﺷﺪﻩ ﺭﺍ ﺑﻪ ﻣﻨﻈﻮﺭ ﺁﮔﺎﻫﻲ ﺍﺯ ﻣﻘﺼﺪ
ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺮﺭﺳﻲ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺭﻭﻳﮑﺮﺩ ﻓﻮﻕ ﺩﺭ ﺭﻓﺘﺎﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ،ﻃﺮﺍﺣﻲ ﻭ
ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺁﻧﺎﻥ ﺭﺍ ﺳﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ ﻭﻟﻲ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﮔﺴﺘﺮﺵ ﺷﺒﮑﻪ ﻭ ﺍﻓﺰﺍﻳﺶ ﻋﻤﻠﻴﺎﺕ ﻣﻮﺭﺩ
ﺍﻧﺘﻈﺎﺭ ،ﮐﺎﺭﺁﺋﻲ ﺷﺒﮑﻪ ﮐﺎﻫﺶ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺳﺎﺯﻣﺎﻥ ﻣﻮﺭﺩ ﻧﻈﺮ ) ﺩﺭ ﻣﺜﺎﻝ ﻓﻮﻕ ( ﺑﺮﺍﻱ
ﺣﻞ ﻣﺸﮑﻞ ﻓﻮﻕ ﺗﺼﻤﻴﻢ ﺑﻪ ﺍﻳﺠﺎﺩ ﺩﻭ ﺷﺒﮑﻪ ﻣﺠﺰﺍ ﻣﻲ ﮔﻴﺮﺩ .ﻳﮏ ﺷﺒﮑﻪ ﺑﺮﺍﻱ ﮔﺮﺍﻓﻴﺴﺖ ﻫﺎ
ﺍﻳﺠﺎﺩ ﻭ ﺷﺒﮑﻪ ﺩﻭﻡ ﺑﺮﺍﻱ ﺳﺎﻳﺮﮐﺎﺭﺑﺮﺍﻥ ﺳﺎﺯﻣﺎﻥ ﺩﺭ ﻧﻈﺮﮔﺮﻓﺘﻪ ﻣﻲ ﺷﻮﺩ .ﺑﻪ ﻣﻨﻈﻮﺭﺍﺭﺗﺒﺎﻁ ﺩﻭ
ﺷﺒﮑﻪ ﻓﻮﻕ ﺑﻴﮑﺪﻳﮕﺮ ﻭ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺯ ﻳﮑﺪﺳﺘﮕﺎﻩ ﺭﻭﺗﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
ﺭﻭﺗﺮ ،ﺗﻨﻬﺎ ﺩﺳﺘﮕﺎﻩ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺖ ﮐﻪ ﺗﻤﺎﻡ ﭘﻴﺎﻣﻬﺎﻱ ﺍﺭﺳﺎﻟﻲ ﺗﻮﺳﻂ
ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺳﺎﺯﻣﺎﻥ ،ﺭﺍ ﻣﺸﺎﻫﺪﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺯﻣﺎﻧﻴﮑﻪ ﻳﮏ
ﮔﺮﺍﻓﻴﺴﺖ ،ﻓﺎﻳﻠﻲ ﺑﺎ ﻇﺮﻓﻴﺖ ﺑﺎﻻ ﺭﺍ ﺑﺮﺍﻱ ﮔﺮﺍﻓﻴﺴﺖ ﺩﻳﮕﺮﻱ ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ ،ﺭﻭﺗﺮ ﺁﺩﺭﺱ
ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﻓﺎﻳﻞ ﺭﺍ ﺑﺮﺭﺳﻲ ﻭ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﻓﺎﻳﻞ ﻣﻮﺭﺩ ﻧﻈﺮ ﻣﺮﺑﻮﻁ ﺑﻪ ﺷﺒﮑﻪ
ﮔﺮﺍﻓﻴﺴﺖ ﻫﺎ ﺩﺭ ﺳﺎﺯﻣﺎﻥ ﺍﺳﺖ ،ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺑﺴﻤﺖ ﺷﺒﮑﻪ ﻓﻮﻕ ﻫﺪﺍﻳﺖ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺩﺭ
ﺻﻮﺭﺗﻲ ﮐﻪ ﻳﮏ ﮔﺮﺍﻓﻴﺴﺖ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﺮﺍﻱ ﻳﮑﻲ ﺍﺯ ﭘﺮﺳﻨﻞ ﺷﺎﻏﻞ ﺩﺭ ﺑﺨﺶ ﻣﺎﻟﻲ ﺳﺎﺯﻣﺎﻥ
ﺍﺭﺳﺎﻝ ﺩﺍﺭﺩ ،ﺭﻭﺗﺮ ﺑﺎ ﺑﺮﺭﺳﻲ ﺁﺩﺭﺱ ﻣﻘﺼﺪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﺍﻳﻦ ﻧﮑﻨﻪ ﭘﻲ ﺧﻮﺍﻫﺪ ﺑﺮﺩ ﮐﻪ
ﭘﻴﺎﻡ ﻓﻮﻕ ﺭﺍ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﺷﺒﮑﻪ ﺩﻳﮕﺮ ﺍﻧﺘﻘﺎﻝ ﺩﻫﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺭﻭﺗﺮ ﻗﺎﺩﺭ ﺑﻪ ﻣﺴﻴﺮﻳﺎﺑﻲ
ﺻﺤﻴﺢ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻭ ﻫﺪﺍﻳﺖ ﺁﻥ ﺑﻪ ﺷﺒﮑﻪ ﻣﻮﺭﺩ ﻧﻈﺮ ﺷﺪﻩ ﺍﺳﺖ.
ﻳﮑﻲ ﺍﺯ ﺍﺑﺰﺍﺭﻫﺎﺋﻲ ﮐﻪ ﺭﻭﺗﺮ ﺍﺯ ﺁﻥ ﺑﺮﺍﻱ ﺗﻌﻴﻴﻦ ﻣﻘﺼﺪ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ،
" ﺟﺪﻭﻝ ﭘﻴﮑﺮﺑﻨﺪﻱ " ﺍﺳﺖ .ﺟﺪﻭﻝ ﻓﻮﻕ ﺷﺎﻣﻞ ﻣﺠﻤﻮﻋﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﺸﺮﺡ ﺫﻳﻞ ﺍﺳﺖ:
304
ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻧﺤﻮﻩ ﻫﺪﺍﻳﺖ ﺍﺗﺼﺎﻻﺕ ﺑﻪ ﺁﺩﺭﺱ ﻫﺎﻱ ﻣﻮﺭﺩ ﻧﻈﺮ •
ﺟﺪﻭﻝ ﻓﻮﻕ ﻣﻲ ﺗﻮﺍﻧﺪ ﺳﺎﺩﻩ ﻭﻳﺎ ﺷﺎﻣﻞ ﺻﺪﻫﺎ ﺧﻂ ﺑﺮﻧﺎﻣﻪ ﺩﺭ ﻳﮏ ﺭﻭﺗﺮﻫﺎﻱ ﮐﻮﭼﮏ ﺑﺎﺷﺪ.
ﺩﺭ ﺭﻭﺗﺮﻫﺎﻱ ﺑﺰﺭﮒ ﺟﺪﻭﻝ ﻓﻮﻕ ﭘﻴﭽﻴﺪﻩ ﺗﺮ ﺑﻮﺩﻩ ﺑﮕﻮﻧﻪ ﺍﻱ ﮐﻪ ﻗﺎﺩﺭ ﺑﻪ ﻋﻤﻠﻴﺎﺕ ﻣﺴﻴﺮﻳﺎﺑﻲ ﺩﺭ
ﺍﻳﻨﺘﺮﻧﺖ ﺑﺎﺷﻨﺪ .ﻳﮏ ﺭﻭﺗﺮ ﺩﺍﺭﺍﻱ ﺩﻭ ﻭﻇﻴﻔﻪ ﺍﺻﻠﻲ ﺍﺳﺖ:
ﺗﻀﻤﻴﻦ ﻋﺪﻡ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﻣﺤﻠﻲ ﮐﻪ ﺑﻪ ﺁﻧﻬﺎ ﻧﻴﺎﺯ ﻧﻴﺴﺖ •
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻭﻇﺎﻳﻒ ﺍﺳﺎﺳﻲ ﻓﻮﻕ ،ﻣﻨﺎﺳﺒﺘﺮﻳﻦ ﻣﺤﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﺭﻭﺗﺮ ،ﺍﺗﺼﺎﻝ ﺩﻭ ﺷﺒﮑﻪ
ﺍﺳﺖ .ﺑﺎ ﺍﺗﺼﺎﻝ ﺩﻭ ﺷﺒﮑﻪ ﺗﻮﺳﻂ ﺭﻭﺗﺮ ،ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﺩﺭ
ﺷﺒﮑﻪ ﺩﻳﮕﺮ ﻭ ﺑﺎﻟﻌﮑﺲ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﺗﺮﺟﻤﻪ ﻫﺎﻱ ﻻﺯﻡ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﭘﺮﻭﺗﮑﻞ
ﻫﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﻫﺮﻳﮏ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎ ،ﻧﻴﺰ ﺗﻮﺳﻂ ﺭﻭﺗﺮ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ .ﺭﻭﺗﺮ ﺷﺒﮑﻪ ﻫﺎ
ﺭﺍ ﺩﺭ ﻣﻘﺎﺑﻞ ﻳﮑﺪﻳﮕﺮ ﺣﻔﺎﻇﺖ ﻭ ﺍﺯ ﺗﺮﺍﻓﻴﮏ ﻏﻴﺮﺿﺮﻭﺭﻱ ﭘﻴﺸﮕﻴﺮﻱ ﻣﻲ ﻧﻤﺎﻳﺪ ) .ﺗﺎﺛﻴﺮ ﺗﺮﺍﻓﻴﮏ
ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺑﺮ ﺷﺒﮑﻪ ﺩﻳﮕﺮ ﺑﺎ ﻓﺮﺽ ﻏﻴﺮ ﻻﺯﻡ ﺑﻮﺩﻥ ﺍﻃﻼﻋﺎﺕ ﺣﺎﺻﻞ ﺍﺯ ﺗﺮﺍﻓﻴﮏ
ﺩﺭ ﺷﺒﮑﻪ ﺍﻭﻝ ﺑﺮﺍﻱ ﺷﺒﮑﻪ ﺩﻭﻡ( .ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﮔﺴﺘﺮﺵ ﺷﺒﮑﻪ ،ﺟﺪﻭﻝ ﭘﻴﮑﺮﺑﻨﺪﻱ ﻧﻴﺰ ﺭﺷﺪ ﻭ
ﺗﻮﺍﻥ ﭘﺮﺩﺍﺯﻧﺪﻩ ﺭﻭﺗﺮ ﻧﻴﺰ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﻓﺰﺍﻳﺶ ﻳﺎﺑﺪ .ﺻﺮﻓﻨﻈﺮ ﺍﺯ ﺗﻌﺪﺍﺩ ﺷﺒﮑﻪ ﻫﺎﺋﻲ ﮐﻪ ﺑﻪ ﻳﮏ
ﺭﻭﺗﺮ ﻣﺘﺼﻞ ﻣﻲ ﺑﺎﺷﻨﺪ ،ﻧﻮﻉ ﻭ ﻧﺤﻮﻩ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﺩﺭ ﺗﻤﺎﻣﻲ ﺭﻭﺗﺮﻫﺎ ﻣﺸﺎﺑﻪ ﺍﺳﺖ .ﺍﻳﻨﺘﺮﻧﺖ
ﺑﻪ ﻋﻨﻮﺍﻥ ﺑﺰﺭﮔﺘﺮﻳﻦ ﺷﺒﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺯ ﻫﺰﺍﺭﺍﻥ ﺷﺒﮑﻪ ﮐﻮﭼﮑﺘﺮ ﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺍﺳﺖ .ﺭﻭﺗﺮﻫﺎ
ﺩﺭ ﺍﺗﺼﺎﻝ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﻮﭼﮑﺘﺮ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺩﺍﺭﺍﻱ ﻧﻘﺸﻲ ﺍﺳﺎﺳﻲ ﻭ ﺿﺮﻭﺭﻱ ﻣﻲ ﺑﺎﺷﻨﺪ.
305
ﻣﺪﺍﺭ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﻣﻲ ﺑﺎﻳﺴﺖ ﻣﺮﺍﺣﻞ ﻣﺘﻔﺎﻭﺗﻲ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ﻣﺴﻲ ،ﺳﻮﺋﻴﭻ ﻫﺎ،
ﻓﻴﺒﺮ ﻫﺎﻱ ﻧﻮﺭﻱ ،ﻣﺎﮐﺮﻭﻭﻳﻮ ﻭ ﻣﺎﻫﻮﺍﺭﻩ ﺍﻧﺠﺎﻡ ﺩﻫﺪ .ﺗﻤﺎﻡ ﻣﺮﺍﺣﻞ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﻣﻨﻈﻮﺭ
ﺑﺮﭘﺎﺳﺎﺯﻱ ﻳﮏ ﺍﺭﺗﺒﺎﻁ ﭘﺎﻳﺪﺍﺭ ﺑﻴﻦ ﺗﻤﺎﺱ ﮔﻴﺮﻧﺪﻩ ﻭ ﻣﺨﺎﻃﺐ ﻣﻮﺭﺩ ﻧﻈﺮ ﺩﺭ ﻣﺪﺕ ﺯﻣﺎﻥ ﺗﻤﺎﺱ ،
ﺛﺎﺑﺖ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﮐﻴﻔﻴﺖ ﺧﻂ ﺍﺭﺗﺒﺎﻃﻲ ﻣﺸﺮﻭﻁ ﺑﻪ ﻋﺪﻡ ﺑﺮﻭﺯ ﻣﺸﮑﻼﺕ ﻓﻨﻲ ﻭ ﻏﻴﺮﻓﻨﻲ ﺩﺭ
ﻫﺮ ﻳﮏ ﺍﺯ ﺗﺠﻬﻴﺰﺍﺕ ﺍﺷﺎﺭﻩ ﺷﺪﻩ ،ﺩﺭ ﻣﺪﺕ ﺑﺮﻗﺮﺍﺭﻱ ﺗﻤﺎﺱ ﺛﺎﺑــﺖ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺑﺎ ﺑﺮﻭﺯ ﻫﺮ
ﮔﻮﻧـﻪ ﺍﺷﮑﺎﻝ ﻧﻈﻴﺮ ﺧــــﺮﺍﺑﻲ ﻳﮏ ﺳﻮﺋﻴﭻ ﻭ ..ﺧﻂ ﺍﺭﺗﺒﺎﻃﻲ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺑﺎ ﻣﺸﮑﻞ ﻣﻮﺍﺟﻪ
ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ) ﺻﻔﺤﺎﺕ ﻭﺏ ،ﭘﻴﺎﻡ ﻫﺎﻱ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ﻭ ( ...ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
ﺳﻴﺴﺘﻤﻲ ﺑﺎ ﻧﺎﻡ Packet -switching networkﺑﻪ ﺣﺮﮐﺖ ﺩﺭ ﻣﻲ ﺁﻳﻨﺪ .ﺩﺭ ﺳﻴﺴﺘﻢ
ﻓﻮﻕ ،ﺩﺍﺩﻩ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﭘﻴﺎﻡ ﻭ ﻳﺎ ﻳﮏ ﻓﺎﻳﻞ ﺑﻪ ﺑﺴﺘﻪ ﻫﺎﻱ ١٥٠٠ﺑﺎﻳﺘﻲ ﺗﻘﺴﻴﻢ
ﻣﻲ ﮔﺮﺩﻧﺪ .ﻫﺮ ﻳﮏ ﺍﺯ ﺑﺴﺘﻪ ﻫﺎﻱ ﻓﻮﻕ ﺷﺎﻣﻞ ﺍﻃﻼﻋﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ :ﺁﺩﺭﺱ ﻓﺮﺳﺘﻨﺪﻩ ،ﺁﺩﺭﺱ
ﮔﻴﺮﻧﺪﻩ ،ﻣﻮﻗﻌﻴﺖ ﺑﺴﺘﻪ ﺩﺭ ﭘﻴﺎﻡ ﻭ ﺑﺮﺭﺳﻲ ﺍﺭﺳﺎﻝ ﺩﺭﺳﺖ ﺍﻃﻼﻋﺎﺕ ﺗﻮﺳﻂ ﮔﻴﺮﻧﺪﻩ ﺍﺳﺖ .ﻫﺮ
ﻳﮏ ﺍﺯ ﺑﺴﺘﻪ ﻫﺎﻱ ﻓﻮﻕ ﺭﺍ Packetﻣﻲ ﮔﻮﻳﻨﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺴﺘﻪ ﻫﺎﻱ ﻓﻮﻕ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﻬﺘﺮﻳﻦ
ﻭ ﻣﻨﺎﺳﺒﺘﺮﻳﻦ ﻣﺴﻴﺮ ﺑﺮﺍﻱ ﻣﻘﺼﺪ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ﺳﻴﺴﺘﻢ
ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﺗﻠﻔﻦ ﭘﻴﭽﻴﺪﻩ ﺗﺮ ﺑﻨﻈﺮ ﻣﻲ ﺁﻳﺪ ،ﻭﻟﻲ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﻣﺒﺘﻨﻲ ﺑﺮ ﺩﺍﺩﻩ ﺩﻭﺩﻟﻴﻞ
) ﻣﺰﻳﺖ( ﻋﻤﺪﻩ ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﮑﻨﻮﻟﻮﮊﻱ Packet switchingﻭﺟﻮﺩ ﺩﺍﺭﺩ:
ﺷﺒﮑﻪ ﻗﺎﺩﺭ ﺑﻪ ﺗﻨﻈﻴﻢ ﻟﻮﺩ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ﺍﺳﺖ •
) ﻣﻴﻠﻲ ﺛﺎﻧﻴﻪ (
ﺩﺭ ﺻﻮﺭﺕ ﻭﺟﻮﺩ ﺍﺷﮑﺎﻝ ﺩﺭ ﻳﮏ ﺩﺳﺘﮕﺎﻩ ،ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﻣﺴﻴﺮ ﺩﻳﮕﺮ ﻋﺒﻮﺭ ﺩﺍﺩﻩ •
306
ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﺯ ﺍﻣﮑﺎﻥ Internet connection sharingﺑﻴﻦ ﺩﻭ •
ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﺁﻧﻬﺎ ﻭﻳﻨﺪﻭﺯ ٩٨ﻧﺼﺐ ﺷﺪﻩ ﺍﺳﺖ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ ،ﻳﮑﻲ ﺍﺯ
ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﮐﻪ ﺧﻂ ﺍﻳﻨﺘﺮﻧﺖ ﺑﻪ ﺁﻥ ﻣﺘﺼﻞ ﺷﺪﻩ ﺍﺳﺖ ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﮏ ﺭﻭﺗﺮ ﺳﺎﺩﻩ ﺭﻓﺘﺎﺭ
ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭ ﻣﺪﻝ ﻓﻮﻕ ﺭﻭﺗﺮ ،ﻋﻤﻠﻴﺎﺕ ﺳﺎﺩﻩ ﺍﻱ ﺭﺍ ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﺪ .ﺩﺍﺩﻩ ﻣﻮﺭﺩ ﻧﻈﺮ
ﺑﺮﺭﺳﻲ ﺗﺎ ﻣﻘﺼﺪ ﺁﻥ ﺑﺮﺍﻱ ﻳﮑﻲ ﺍﺯ ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺗﻌﻴﻴﻦ ﮔﺮﺩﺩ.
ﺭﻭﺗﺮﻫﺎﻱ ﺑﺰﺭﮔﺘﺮ ﻧﻈﻴﺮ ﺭﻭﺗﺮﻫﺎﺋﻲ ﮐﻪ ﻳﮏ ﺳﺎﺯﻣﺎﻥ ﮐﻮﭼﮏ ﺭﺍ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ﻣﺘﺼﻞ •
ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﻋﻤﻠﻴﺎﺕ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮﻱ ﺭﺍ ﻧﺴﺒﺖ ﺑﻪ ﻣﺪﻝ ﻗﺒﻠﻲ ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﻨﺪ.
ﺭﻭﺗﺮﻫﺎﻱ ﻓﻮﻕ ﺍﺯ ﻣﺠﻤﻮﻋﻪ ﻗﻮﺍﻧﻴﻦ ﺍﻣﻨﻴﺘﻲ ﺣﺎﮐﻢ ﺑﺮ ﺳﺎﺯﻣﺎﻥ ﻣﺮﺑﻮﻃﻪ ﺗﺒﻌﻴﺖ ﻭ
ﺑﺼﻮﺭﺕ ﺍﺩﻭﺍﺭﻱ ﺳﻴﺴﺘﻢ ﺍﻣﻨﻴﺘﻲ ﺗﺒﻴﻦ ﺷﺪﻩ ﺍﻱ ﺭﺍ ﺑﺮﺭﺳﻲ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﺭﻭﺗﺮﻫﺎﻱ ﺑﺰﺭﮔﺘﺮ ﻣﺸﺎﺑﻪ ﺭﻭﺗﺮﻫﺎﺋﻲ ﮐﻪ ﺗﺮﺍﻓﻴﮏ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺩﺭ ﻧﻘﻂ ﺣﺴﺎﺱ ﻭﻣﻬﻢ •
307
ﺧﻂ ﻓﻮﻕ ﺑﺼﻮﺭﺕ Backupﺑﻮﺩﻩ ﻭ ﺑﻤﺤﺾ ﺑﺮﻭﺯ ﺍﺷﮑﺎﻝ ﺩﺭ ﺧﻂ ﺍﺧﺘﺼﺎﺻﻲ) ﻣﺜﻼ"( T1
ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺧﻂ ﺩﻭﻡ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﺧﻂ ﻓﻮﻕ ﺑﺼﻮﺭﺕ ﻣﻮﻗﺖ ﻭ ﺩﺭ ﻣﻮﺍﻗﻊ
ﺍﺿﻄﺮﺍﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ ،ﻣﻲ ﺗﻮﺍﻥ ﻳﮏ ﺧﻂ ﺑﺎ ﺳﺮﻋﺖ ﭘﺎﻳﻴﻦ ﺗﺮﺭﺍ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ.
ﺭﻭﺗﺮﻫﺎ ﻋﻼﻭﻩ ﺑﺮ ﻗﺎﺑﻠﻴﺖ ﺭﻭﺗﻴﻨﮓ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺯ ﻳﮏ ﻧﻘﻄﻪ ﺑﻪ ﻧﻘﻄﻪ ﺩﻳﮕﺮ ،ﺩﺍﺭﺍﻱ
ﺍﻣﮑﺎﻧﺎﺕ ﻣﺮﺑﻮﻁ ﺑﻪ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺳﻴﺴﺘﻢ ﺍﻣﻨﻴﺘﻲ ﻧﻴﺰ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻣﺜﻼ" ﻣﻲ ﺗﻮﺍﻥ ﻣﺸﺨﺺ ﮐﺮﺩ
ﮐﻪ ﻧﺤﻮﻩ ﺩﺳﺘﻴﺎﺑﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺧﺎﺭﺝ ﺍﺯ ﺷﺒﮑﻪ ﺩﺍﺧﻠﻲ ﺳﺎﺯﻣﺎﻥ ﺑﻪ ﺷﺒﮑﻪ ﺩﺍﺧﻠﻲ ﺑﻪ ﭼﻪ
ﺻﻮﺭﺕ ﺍﺳﺖ .ﺍﮐﺜﺮ ﺳﺎﺯﻣﺎﻧﻬﺎ ﻭ ﻣﻮﺳﺴﺎﺕ ﺩﺍﺭﺍﻱ ﻳﮏ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻭ ﻳﺎ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﺧﺎﺹ
ﻓﺎﻳﺮﻭﺍﻝ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻋﻤﺎﻝ ﺳﻴﺎﺳــﺖ ﻫﺎﻱ ﺍﻣﻨﻴﺘﻲ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻗﻮﺍﻧــﻴﻦ ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺩﺭ ﺟﺪﻭﻝ
ﭘﻴﮑﺮﺑﻨﺪﻱ ﺭﻭﺗﺮ ﺍﺯ ﻟﺤﺎﻅ ﺍﻣﻨﻴﺘﻲ ﺩﺍﺭﺍﻱ ﺻﻼﺑﺖ ﺑﻴﺸﺘﺮﻱ ﻣﻲ ﺑﺎﺷﻨﺪ.
ﻳﮑﻲ ﺍﺯ ﻋﻤﻠﻴﺎﺕ ﺍﺩﻭﺍﺭﻱ ) ﺗﮑﺮﺍﺭﻱ ( ﮐﻪ ﻫﺮ ﺭﻭﺗﺮ ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﺪ ،ﺁﮔﺎﻫﻲ ﺍﺯ ﺍﺳﺘﻘﺮﺍﺭ ﻳﮏ
ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﺷﺒﮑﻪ ﺩﺍﺧﻠﻲ ﺍﺳﺖ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻣﺮﺑﻮﻁ ﺑﻪ ﺷﺒﮑﻪ
ﺩﺍﺧﻠﻲ ﺑﻮﺩﻩ ﻧﻴﺎﺯﻱ ﺑﻪ ﺭﻭﺕ ﻧﻤﻮﺩﻥ ﺁﻥ ﺗﻮﺳﻂ ﺭﻭﺗﺮ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ .ﺑﺪﻳﻦ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺯ
ﻣﮑﺎﻧﻴﺰﻣﻲ ﺑﺎ ﻧﺎﻡ Subnet maskﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ subnet .ﻣﺸﺎﺑﻪ ﻳﮏ ﺁﺩﺭﺱ IP
ﺑﻮﺩﻩ ﻭ ﺍﻏﻠﺐ ﺑﺼﻮﺭﺕ ٢٥٥,٢٥٥,٢٥٥,٠ﺍﺳﺖ .ﺁﺩﺭﺱ ﻓﻮﻕ ﺑﻪ ﺭﻭﺗﺮ ﺍﻋﻼﻡ ﻣﻲ ﻧﻤﺎﻳﺪ ﮐﻪ
ﺗﻤﺎﻡ ﭘﻴﺎﻡ ﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﻳﺎ ﮔﻴﺮﻧﺪﻩ ﮐﻪ ﺩﺍﺭﺍﻱ ﻳﮏ ﺁﺩﺭﺱ ﻣﺸﺘﺮﮎ ﺩﺭ ﺳﻪ ﮔﺮﻭﻩ
ﺍﻭﻝ ﻣﻲ ﺑﺎﺷﻨﺪ ،ﻣﺮﺑﻮﻁ ﺑﻪ ﻳﮏ ﺷﺒﮑﻪ ﻣﺸﺎﺑﻪ ﺑﻮﺩﻩ ﻭ ﻧﻴﺎﺯﻱ ﺑﻪ ﺍﺭﺳﺎﻝ ﺁﻧﻬﺎ ﺑﺮﺍﻱ ﻳﮏ ﺷﺒﮑﻪ
ﺩﻳﮕﺮ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ.
ﻣﺜﻼ" ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺑﺎ ﺁﺩﺭﺱ ١٥,٥٧,٣١,٤٠ﭘﻴﺎﻣﻲ ﺭﺍ ﺑﺮﺍﻱ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﺎ ﺁﺩﺭﺱ
١٥,٥٧,٣١,٥٢ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ .ﺭﻭﺗﺮ ﮐﻪ ﺩﺭ ﺟﺮﻳﺎﻥ ﺗﻤﺎﻡ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺳﺖ ،ﺳﻪ
ﮔﺮﻭﻩ ﺍﻭﻝ ﺩﺭ ﺁﺩﺭﺱ ﻫﺎﻱ ﻓﺮﺳﺘﻨﺪﻩ ﻭ ﮔﻴﺮﻧﺪﻩ ﺭﺍ ﻣﻄﺎﺑﻘﺖ ﻣﻲ ﻧﻤﺎﻳﺪ ﻭ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺑﺮ
ﺭﻭﻱ ﺷﺒﮑﻪ ﺩﺍﺧﻠﻲ ﻧﮕﻪ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ.
308
ﺁﮔﺎﻫﻲ ﺍﺯ ﻣﻘﺼﺪ ﻳﮏ ﭘﻴﺎﻡ
ﺭﻭﺗﺮ ﻳﮑﻲ ﺍﺯ ﻣﺠﻤﻮﻋﻪ ﺩﺳﺘﮕﺎﻫﻬﺎﺋﻲ ﺍﺳﺖ ﮐﻪ ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ .ﻫﺎﺏ،
ﺳﻮﺋﻴﭻ ﻭ ﺭﻭﺗﺮ ﺳﻴﮕﻨﺎﻝ ﻫﺎﺋﻲ ﺭﺍ ﺍﺭ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻭ ﻳﺎ ﺷﺒﮑﻪ ﻫﺎ ﺩﺭﻳﺎﻓﺖ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺑﺮﺍﻱ
ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻭ ﻳﺎ ﺷﺒﮑﻪ ﻫﺎﻱ ﺩﻳﮕﺮ ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﻧﺪ .ﺭﻭﺗﺮ ﺗﻨﻬﺎ ﺩﺳﺘﮕﺎﻩ ﻣﻮﺟﻮﺩ ﻣﻲ ﺑﺎﺷﺪ ﮐﻪ
ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﻣﺴﻴﺮ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺗﺼﻤﻴﻢ ﮔﻴﺮﻱ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ
ﻓﻮﻕ ،ﺭﻭﺗﺮﻫﺎ ﻣﻲ ﺑﺎﻳﺴﺖ ﻧﺴﺒﺖ ﺑﻪ ﺩﻭ ﻣﻮﺿﻮﻉ ﺁﮔﺎﻫﻲ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ :ﺁﺩﺭﺱ ﻫﺎ ﻭ ﺳﺎﺧﺘﺎﺭ
ﺷﺒﮑﻪ.
ﺯﻣﺎﻧﻴﮑﻪ ﺗﻮﺳﻂ ﻳﮑﻲ ﺍﺯ ﺩﻭﺳﺘﺎﻧﺘﺎﻥ ﺑﺮﺍﻱ ﺷﻤﺎ ﻳﮏ ﮐﺎﺭﺕ ﺗﺒﺮﻳﮏ ﺳﺎﻝ ﻧﻮ ﺍﺭﺳﺎﻝ ﻣﻲ ﮔﺮﺩﺩ ،
ﺍﺯ ﺁﺩﺭﺳﻲ ﻣﻄﺎﺑﻖ ﺯﻳﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ " :ﺗﻬﺮﺍﻥ -ﺧﻴﺎﺑﺎﻥ ﺍﻳﺮﺍﻥ -ﮐﻮﭼﻪ ﺷﻤﻴﺮﺍﻧﺎﺕ -ﭘﻼﮎ
" ١١٠ﺁﺩﺭﺱ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﭼﻨﺪﻳﻦ ﺑﺨﺶ ﺑﻮﺩﻩ ﮐﻪ ﺑﻪ ﺍﺩﺍﺭﻩ ﭘﺴﺖ ﻣﺮﺑﻮﻃﻪ ﺍﻣﮑﺎﻥ ﭘﻴﺪﺍ ﻧﻤﻮﺩﻥ
ﺁﺩﺭﺱ ﻓﻮﻕ ﺭﺍ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮐﺪ ﭘﺴﺘﻲ ﺑﺎﻋﺚ ﺳﺮﻋﺖ ﺩﺭ ﺍﺭﺳﺎﻝ ﮐﺎﺭﺕ ﺗﺒﺮﻳﮏ ﻭ
ﺩﺭﻳﺎﻓﺖ ﺁﻥ ﺗﻮﺳﻂ ﺷﺨﺺ ﻣﻮﺭﺩ ﻧﻈﺮ ﻣﻲ ﻧﻤﺎﻳﺪ .ﻭﻟﻲ ﺣﺘﻲ ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﺯ ﮐﺪ ﭘﺴﺘﻲ ﻫﻢ
ﺍﺳﺘﻔﺎﺩﻩ ﻧﺸﻮﺩ ،ﺍﻣﮑﺎﻥ ﺩﺭﻳﺎﻓﺖ ﮐﺎﺭﺕ ﺗﺒﺮﻳﮏ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺸﺨﺺ ﺷﺪﻥ ﺷﻬﺮﺳﺘﺎﻥ ،ﺧﻴﺎﺑﺎﻥ
،ﮐﻮﭼﻪ ﻭ ﭘﻼﮎ ﻧﻴﺰ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ.
ﺁﺩﺭﺱ ﻓﻮﻕ ﻳﮏ ﻧﻮﻉ ﺁﺩﺭﺱ ﻣﻨﻄﻘﻲ ﺍﺳﺖ .ﺁﺩﺭﺱ ﻓﻮﻕ ﺭﻭﺷﻲ ﺭﺍ ﺑﺮﺍﻱ ﺩﺭﻳﺎﻓﺖ ﮐﺎﺭﺕ
ﺗﺒﺮﻳﮏ ،ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺁﺩﺭﺱ ﻓﻮﻕ ﺑﻪ ﻳﮏ ﺁﺩﺭﺱ ﻓﻴﺰﻳﮑﻲ ﻣﺮﺗﺒﻂ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﻫﺮ ﻳﮏ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﻣﻮﺟﻮﺩ ﮐﻪ ﺑﻪ ﺷﺒﮑﻪ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ ،ﺩﺍﺭﺍﻱ ﻳﮏ ﺁﺩﺭﺱ ﻓﻴﺰﻳﮑﻲ
ﻣﻲ ﺑﺎﺷﻨﺪ .ﺁﺩﺭﺱ ﻓﻮﻕ ﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ ﺑﻮﺩﻩ ﻭ ﺗﻮﺳﻂ ﺩﺳﺘﮕﺎﻫﻲ ﮐﻪ ﺑﻪ ﮐﺎﺑﻞ ﺷﺒﮑﻪ ﻣﺘﺼﻞ
ﺍﺳﺖ ،ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺧﻮﺍﻫﺪ ﺷﺪ .ﻣﺜﻼ" ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﻤﺎ ﺩﺍﺭﺍﻱ ﻳﮏ ﮐﺎﺭﺕ ﺷﺒﮑﻪ
) (NICﻣﻲ ﺑﺎﺷﺪ ،ﮐﺎﺭﺕ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﻳﮏ ﺁﺩﺭﺱ ﻓﻴﺰﻳﮑﻲ ﺩﺍﺋﻤﻲ ﺑﻮﺩﻩ ﮐﻪ ﺩﺭ ﻳﮏ ﻣﺤﻞ
ﺧﺎﺹ ﺍﺯ ﺣﺎﻓﻈﻪ ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺍﺳﺖ .ﺁﺩﺭﺱ ﻓﻴﺰﻳﮑﻲ ﮐﻪ ﺁﺩﺭﺱ Media Access ( MAC
(Controlﻧﻴﺰ ﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ ،ﺩﺍﺭﺍﻱ ﺩﻭ ﺑﺨﺶ ﺑﻮﺩﻩ ﮐﻪ ﻫﺮ ﻳﮏ ﺳﻪ ﺑﺎﻳﺖ ﻣﻲ ﺑﺎﺷﻨﺪ.
ﺍﻭﻟﻴﻦ ﺳﻪ ﺑﺎﻳﺖ ،ﺷﺮﮐﺖ ﺳﺎﺯﻧﺪﻩ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﻭﻣﻴﻦ ﺳﻪ ﺑﺎﻳﺖ ﻳـﮏ
ﺷﻤﺎﺭﻩ ﺳﺮﻳﺎﻝ ﻣﺮﺑﻮﻁ ﺑﻪ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺍﺳﺖ.
309
ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻲ ﺗﻮﺍﻧﺪ ﺩﺍﺭﺍﻱ ﭼﻨﺪﻳﻦ ﺁﺩﺭﺱ ﻣﻨﻄﻘﻲ ﺩﺭ ﻳﮏ ﻟﺤﻈﻪ ﺑﺎﺷﺪ .ﻭﺿﻌﻴﺖ ﻓﻮﻕ
ﺩﺭﺭﺍﺑﻄﻪ ﺑﺎ ﺍﺷﺨﺎﺹ ﻧﻴﺰ ﺻﺪﻕ ﻣﻲ ﮐﻨﺪ .ﻣﺜﻼ" ﻳﮏ ﺷﺨﺺ ﻣﻲ ﺗﻮﺍﻧﺪ ﺩﺍﺭﺍﻱ ﺁﺩﺭﺱ ﭘﺴﺘﻲ،
ﺷﻤﺎﺭﻩ ﺗﻠﻔﻦ ،ﺁﺩﺭﺱ ﭘﺴﺖ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ﻭ ...ﺑﺎﺷﺪ .ﺍﺯ ﻃﺮﻳﻖ ﻫﺮ ﻳﮏ ﺍﺯ ﺁﺩﺭﺱ ﻫﺎﻱ ﻓﻮﻕ
ﺍﻣﮑﺎﻥ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﺑﺮﺍﻱ ﺷﻤﺎ ﻭﺟﻮﺩ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﺁﺩﺭﺱ ﻫﺎﻱ ﻣﻨﻄﻘﻲ ﺩﺭ ﮐﺎﻣﭙﻴﻮﻧﺮ ﻧﻴﺰ ﻣﺸﺎﺑﻪ
ﺳﻴﺴﺘﻢ ﻓﻮﻕ ﮐﺎﺭ ﻣﻲ ﮐﻨﻨﺪ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺳﺘﺎ ﻣﻤﮑﻦ ﺍﺳﺖ ﺍﺯ ﻣﺪﻝ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺁﺩﺭﺱ ﺩﻫﻲ ﻭ ﻳﺎ
ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺷﺒﮑﻪ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺑﻄﻮﺭ ﻫﻤﺰﻣﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ .ﺩﺭ ﺯﻣﺎﻥ ﺍﺗﺼﺎﻝ ﺑﻪ
ﺍﻳﻨﺘﺮﻧﺖ ،ﺷﻤﺎ ﺩﺍﺭﺍﻱ ﻳﮏ ﺁﺩﺭﺱ ﺑﻮﺩﻩ ﮐﻪ ﺍﺯ ﭘﺮﻭﺗﮑﻞ TCP/IPﻣﺸﺘﻖ ﺷﺪﻩ ﺍﺳﺖ .ﺩﺭ
ﺻﻮﺭﺗﻲ ﮐﻪ ﺩﺍﺭﺍﻱ ﻳﮏ ﺷﺒﮑﻪ ﮐﻮﭼﮏ ﻣﻲ ﺑﺎﺷﻴﺪ ،ﻣﻤﮑﻦ ﺍﺳﺖ ﺍﺯ ﭘﺮﻭﺗﮑﻞ NetBEUI
ﻣﺎﻳﮑﺮﻭﺳﺎﻓﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﺋﻴﺪ .ﺑﻬﺮﺣﺎﻝ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻲ ﺗﻮﺍﻧﺪ ﺩﺍﺭﺍﻱ ﭼﻨﺪﻳﻦ ﺁﺩﺭﺱ
ﻣﻨﻄﻘﻲ ﺑﻮﺩﻩ ﮐﻪ ﭘﺮﻭﺗﮑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﻗﺎﻟﺐ ﺁﺩﺭﺱ ﻓﻮﻕ ﺭﺍ ﻣﺸﺨﺺ ﺧﻮﺍﻫﺪ ﮐﺮﺩ.
ﺁﺩﺭﺱ ﻓﻴﺰﻳﮑﻲ ﻳﮏ ﮐﺎﻣﭙﻴﻮﻧﺮ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﻳﮏ ﺁﺩﺭﺱ ﻣﻨﻄﻘﻲ ﺗﺒﺪﻳﻞ ﮔﺮﺩﺩ .ﺍﺯ ﺁﺩﺭﺱ
ﻣﻨﻄﻘﻲ ﺩﺭ ﺷﺒﮑﻪ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺮﺍﻱ ﻣﺸﺎﻫﺪﻩ ﺁﺩﺭﺱ
ﻓﻴﺰﻳﮑﻲ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺧﻮﺩ ﻣﻲ ﺗﻮﺍﻧﻴﺪ ﺍﺯ ﺩﺳﺘﻮﺭ ) IPCONFIGﻭﻳﻨﺪﻭﺯ ٢٠٠٠ﻭ (XPﺍﺳﺘﻔﺎﺩﻩ
ﻧﻤﺎﻳﺪ.
ﭘﺮﻭﺗﮑﻞ ﻫﺎ
ﺍﻭﻟﻴﻦ ﻭ ﻣﻬﻤﺘﺮﻳﻦ ﻭﻇﻴﻔﻪ ﺭﻭﺗﺮ ،ﺁﮔﺎﻫﻲ ﺍﺯ ﻣﺤﻠﻲ ﺍﺳﺖ ﮐﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﻃﻼﻋﺎﺕ ﺍﺭﺳﺎﻝ
ﮔﺮﺩﻧﺪ.
310
ﺍﮐﺜﺮ ﺭﻭﺗﺮﻫﺎ ﮐﻪ ﻳﮏ ﭘﻴﺎﻡ ﺭﺍ ﺑﺮﺍﻱ ﺷﻤﺎ ﻣﺴﻴﺮﻳﺎﺑﻲ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﺍﺯ ﺁﺩﺭﺱ ﻓﻴﺰﻳﮑﻲ
ﮐﺎﻣﭙﻴﻮﺗﺮ ﺷﻤﺎ ﺁﮔﺎﻫﻲ ﻧﺪﺍﺭﻧﺪ .ﺭﻭﺗﺮﻫﺎ ﺑﻪ ﻣﻨﻈﻮﺭ ﺷﻨﺎﺧﺖ ﺍﮐﺜﺮ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺭﺍﻳﺞ ،ﺑﺮﻧﺎﻣﻪ
ﺭﻳﺰﻱ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺭﻭﺗﺮﻫﺎ ﻧﺴﺒﺖ ﺑﻪ ﻓﻮﺭﻣﺖ ﻫﺮ ﻳﮏ ﺍﺯ ﻣﺪﻝ ﻫﺎﻱ ﺁﺩﺭﺱ ﺩﻫﻲ
ﺩﺍﺭﺍﻱ ﺷﻨﺎﺧﺖ ﻣﻨﺎﺳﺐ ﻣﻲ ﺑﺎﺷﻨﺪ ) .ﺗﻌﺪﺍﺩ ﺑﺎﻳﺖ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻫﺮ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ،ﺁﮔﺎﻫﻲ
ﺍﺯ ﻧﺤﻮﻩ ﺍﺭﺳﺎﻝ ﺩﺭﺳﺖ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﻣﻘﺼﺪ ﻭ (...ﺭﻭﺗﺮﻫﺎ ﺑﻪ ﻋﻨﻮﺍﻥ ﻣﻬﻤﺘﺮﻳﻦ ﻋﻨﺎﺻﺮ ﺩﺭ
ﺍﻳﺠﺎﺩ ﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ ﺍﻳﻨﺘﺮﻧﺖ ﻣﻄﺮﺡ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺭﻭﺗﺮﻫﺎ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ ﻣﻴﻠﻴﻮﻥ ﻫﺎ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ
ﺭﺍ ﻣﺴﻴﺮﻳﺎﺑﻲ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺍﺭﺳﺎﻝ ﻳﮏ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﻣﻘﺼﺪ ﻣﻮﺭﺩ ﻧﻈﺮ ،ﺗﻨﻬﺎ ﻭﻇﻴﻔﻪ ﻳﮏ
ﺭﻭﺗﺮ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ .ﺭﻭﺗﺮﻫﺎ ﻣﻲ ﺑﺎﻳﺴﺖ ﻗﺎﺩﺭ ﺑﻪ ﻳﺎﻓﺘﻦ ﺑﻬﺘﺮﻳﻦ ﻣﺴﻴﺮ ﻣﻤﮑﻦ ﺑﺎﺷﻨﺪ .ﺩﺭﻳﮏ
ﺷﺒﮑﻪ ﭘﻴﺸﺮﻓﺘﻪ ﻫﺮ ﭘﻴﺎﻡ ﺍﻟﮑﺘﺮﻭﻧﻴﮑﻲ ﺑﻪ ﭼﻨﺪﻳﻦ ﺑﺨﺶ ﮐﻮﭼﮑﺘﺮ ﺗﻘﺴﻴﻢ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺨﺶ ﻫﺎﻱ
ﻓﻮﻕ ﺑﺼﻮﺭﺕ ﻣﺠﺰﺍ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭ ﻣﻘﺼﺪ ﻣﺠﺪﺩﺍ" ﺑﺎ ﺗﺮﮐﻴﺐ ﺑﺨﺶ ﻫﺎﻱ ﻓﻮﻕ ﺑﻴﮑﺪﻳﮕﺮ ،ﭘﻴﺎﻡ
ﺍﻭﻟﻴﻪ ﺷﮑﻞ ﻭﺍﻗﻌﻲ ﺧﻮﺩ ﺭﺍ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺑﺨﺶ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺍﺷﺎﺭﻩ ﺷﺪﻩ Packet
ﻧﺎﻣﻴﺪﻩ ﺷﺪﻩ ﻭ ﻫﺮ ﻳﮏ ﺍﺯﺁﻧﺎﻥ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺍﺯ ﻳﮏ ﻣﺴﻴﺮ ﺧﺎﺹ ﺍﺭﺳﺎﻝ ﮔﺮﺩﻧﺪ .ﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺷﺒﮑﻪ
ﻫﺎ ﺭﺍ network Packet-Switchedﻣﻲ ﮔﻮﻳﻨﺪ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻓﻮﻕ ﻳﮏ ﻣﺴﻴﺮ
ﺍﺧﺘﺼﺎﺻﻲ ﺑﻴﻦ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻓﺮﺳﺘﻨﺪﻩ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﻭ ﮔﻴﺮﻧﺪﻩ ﺍﻳﺠﺎﺩ ﻧﺨﻮﺍﻫﺪ ﮔﺮﺩﻳﺪ .ﭘﻴﺎﻡ
ﻫﺎﻱ ﺍﺭﺳﺎﻟﻲ ﺍﺯ ﻃﺮﻳﻖ ﻳﮑﻲ ﺍﺯ ﻫﺰﺍﺭﺍﻥ ﻣﺴﻴﺮ ﻣﻤﮑﻦ ﺣﺮﮐﺖ ﺗﺎ ﺩﺭ ﻧﻬﺎﻳﺖ ﺗﻮﺳﻂ ﮐﺎﻣﭙﻴﻮﺗﺮ
ﮔﻴﺮﻧﺪﻩ ،ﺩﺭﻳﺎﻓﺖ ﮔﺮﺩﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺗﺮﺍﻓﻴﮏ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻣﻤﮑﻦ ﺍﺳﺖ ﺩﺭ ﺑﺮﺧﻲ ﺣﺎﻻﺕ
ﻋﻨﺎﺻﺮ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﻟﻮﺩ ﺑﺎﻻﺋﻲ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻨﺪ ،ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ﺭﻭﺗﺮﻫﺎ ﺑﺎ ﻳﮑﺪﻳﮕﺮ
ﺍﺭﺗﺒﺎﻁ ﻭ ﺗﺮﺍﻓﻴﮏ ﺷﺒﮑﻪ ﺭﺍ ﺑﻬﻴﻨﻪ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ ) .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺴﻴﺮﻫﺎﻱ ﺩﻳﮕﺮ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ
ﺍﻃﻼﻋﺎﺕ ﺑﺎﺗﻮﺟﻪ ﺑﻪ ﻭﺟﻮﺩ ﺗﺮﺍﻓﻴﮏ ﺑﺎﻻ ﺩﺭ ﺑﺨﺶ ﻫﺎﻱ ﺧﺎﺻﻲ ﺍﺯ ﺷﺒﮑﻪ(
ﺭﺩﻳﺎﺑﻲ ﻳﮏ ﭘﻴﺎﻡ
ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﺯ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻭﻳﻨﺪﻭﺯ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﺋﻴﺪ ،ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘﻮﺭ
Tracerouteﻣﻲ ﺗﻮﺍﻧﻴﺪ ﻣﺴﻴﺮ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺩﻧﺒﺎﻝ ﻧﻤﺎﺋﻴﺪ.
311
ﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ ﺍﻳﻨﺘﺮﻧﺖ
ﺑﺎﺗﻮﺟﻪ ﺑﻪ ﮔﺴﺘﺮﺩﮔﻲ ﺍﻳﻨﺘﺮﻧﺖ ﻭ ﻭﺟﻮﺩ ﻣﻴﻠﻴﻮﻥ ﻫﺎ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ ﺑﻪ
ﻣﻨﻈﻮﺭ ﻣﺴﻴﺮﻳﺎﺑﻲ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﺭﻭﺗﺮﻫﺎﻱ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ﺍﺳﺘﻔﺎﺩﻩ ﺷﻮﺩ .ﺭﻭﺗﺮ ﺳﺮﻱ ١٢٠٠٠
ﺳﻴﺴﮑﻮ ﻳﮑﻲ ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ﺭﻭﺗﺮﻫﺎ ﺑﻮﺩﻩ ﮐﻪ ﺑﻪ ﻋﻨﻮﺍﻥ ﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ ﺍﺻﻠﻲ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﺷﻮﺩ .ﺗﮑﻨﻮﻟﻮﮊﻱ ﺑﮑﺎﺭ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺩﺭ ﻃﺮﺍﺣﻲ ﺭﻭﺗﺮﻫﺎﻱ ﻓﻮﻕ ﻣﺸﺎﺑﻪ ﺳﻮﭘﺮ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ
ﻣﻲ ﺑﺎﺷﺪ ) .ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﺩﺍﺯﻧﺪﻩ ﻫﺎﻱ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ﺑﻬﻤﺮﺍﻩ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺳﻮﻳﺌﭻ ﻫﺎﻱ ﭘﺮ
ﺳﺮﻋﺖ ( .ﺩﺭ ﺭﻭﺗﺮ ﻣﺪﻝ ١٢٠٠٠ﺍﺯ ﭘﺮﺩﺍﺯﻧﺪﻩ ﻫﺎﻱ MHZ MIPS R5000٢٠٠ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﺷﻮﺩ ، ١٢٠١٦ .ﻳﮑﻲ ﺍﺯ ﻣﺪﻝ ﻫﺎﻱ ﺳﺮﻱ ﻓﻮﻕ ﺍﺳﺖ .ﻣﺪﻝ ﻓﻮﻕ ﻗﺎﺩﺭ ﺩﺍﺭﺍﻱ ﺗﻮﺍﻥ
ﻋﻤﻠﻴﺎﺕ ٣٢٠ﻣﻴﻠﻴﺎﺭﺩ ﺑﻴﺖ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺩﺭ ﺛﺎﻧﻴﻪ ﺭﺍ ﺩﺍﺭﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻣﺪﻝ ﻓﻮﻕ ﺑﺎ
ﺗﻤﺎﻡ ﺗﻮﺍﻥ ﻭ ﻇﺮﻓﻴﺖ ﺧﻮﺩ ﻧﺼﺐ ﮔﺮﺩﺩ ،ﺍﻣﮑﺎﻥ ﺍﻧﺘﻘﺎﻝ ٦٠ﻣﻴﻠﻴﻮﻥ ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﻫﺮﺛﺎﻧﻴﻪ ﺭﺍ
ﺩﺍﺭﺍ ﺍﺳﺖ.
ﺭﻭﺗﺮﻫﺎ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺟﺪﻭﻝ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺧﻮﺩ ﻗﺎﺩﺭ ﺑﻪ ﻣﺴﻴﺮﻳﺎﺑﻲ ﺻﺤﻴﺢ ﺑﺴﺘﻪ ﻫﺎﻱ
ﺍﻃﻼﻋﺎﺗﻲ ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ .ﻗﻮﺍﻧﻴﻦ ﻣﻮﺟﻮﺩ ﺩﺭ ﺟﺪﻭﻝ ﻓﻮﻕ ﺳﻴﺎﺳﺖ ﻣﺴﻴﺮﻳﺎﺑﻲ ﻳﮏ ﺑﺴﺘﻪ
ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺗﺒﻴﻦ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ .ﻗﺒﻞ ﺍﺯ ﺍﺭﺳﺎﻝ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺗﻮﺳﻂ ﻣﺴﻴﺮ ﻣﺸﺨﺺ
ﺷﺪﻩ ،ﺭﻭﺗﺮ ﺧﻂ ) ﻣﺴﻴﺮ ( ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﺍﺯ ﺍﺯ ﻧﻘﻄﻪ ﻧﻈﺮ ﮐﺎﺭﺁﺋﻲ ﺑﺮﺭﺳﻲ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭ
ﺻﻮﺭﺗﻲ ﮐﻪ ﻣﺴﻴﺮ ﻓﻮﻕ ﻓﺎﻗﺪ ﮐﺎﺭﺁﺋﻲ ﻻﺯﻡ ﺑﺎﺷﺪ ،ﺭﻭﺗﺮ ﻣﺴﻴﺮ ﻓﻮﻕ ﺭﺍ ﭼﺸﻢ ﭘﻮﺷﻲ ﻧﻤﻮﺩﻩ ﻭ
ﻣﺠﺪﺩﺍ" ﻳﮏ ﻣﺴﻴﺮ ﺩﻳﮕﺮ ﺭﺍ ﻣﺸﺨﺺ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﭘﺲ ﺍﺯ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﮐﺎﺭﺁﺋﻲ ﻣﺴﻴﺮ ﻣﺸﺨﺺ
ﺷﺪﻩ ،ﺑﺴﺘﻪ ﺍﻃﻼﻋﺎﺗﻲ ﺗﻮﺳﻂ ﻣﺴﻴﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﺪ ﮔﺮﺩﻳﺪ .ﺗﻤﺎﻡ ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ
ﺻﺮﻓﺎ" ﺩﺭ ﮐﺴﺮﻱ ﺍﺯ ﺛﺎﻧﻴﻪ ﺍﻧﺠﺎﻡ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ ،ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ﻣﻴﻠﻴﻮﻥ ﻫﺎ ﻣﺮﺗﺒﻪ ﺗﮑﺮﺍﺭ
ﺧﻮﺍﻫﺪ ﺷﺪ.
ﺁﮔﺎﻫﻲ ﺍﺯ ﻣﺤﻠﻲ ﮐﻪ ﭘﻴﺎﻡ ﻫﺎ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺭﺳﺎﻝ ﮔﺮﺩﻧﺪ ،ﻣﻬﻤﺘﺮﻳﻦ ﻭﻇﻴﻔﻪ ﻳﮏ ﺭﻭﺗﺮ
ﺍﺳﺖ .ﺑﺮﺧﻲ ﺍﺯ ﺭﻭﺗﺮﻫﺎﻱ ﺳﺎﺩﻩ ،ﺻﺮﻓﺎ" ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﺍﺩﻩ ﻭ ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﺍﺯ
ﺭﻭﺗﺮﻫﺎ ﻋﻤﻠﻴﺎﺕ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮ ﻭ ﭘﻴﭽﻴﺪﻩ ﺗﺮﻱ ﺭﺍ ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﻨﺪ.
312
ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺍﻭﻟﻴﻪ ﺭﻭﺗﺮ
ﺭﻭﺗﺮ ﻳﻚ ﻧﻮﻉ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺧﺎﺹ ﺍﺳﺖ ﻛﻪ ﺩﺍﺭﺍﻱ ﻋﻨﺎﺻﺮ ﻣﺸﺎﺑﻪ ﻳﻚ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ
ﺷﺨﺼﻲ ﻧﻈﻴﺮ ﭘﺮﺩﺍﺯﻧﺪﻩ ،ﺣﺎﻓﻈﻪ ،ﺧﻄﻮﻁ ﺩﺍﺩﻩ ﻭ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻣﺨﺘﻠﻒ ﻭﺭﻭﺩﻱ ﻭ ﺧﺮﻭﺟﻲ
ﺍﺳﺖ .ﺭﻭﺗﺮﻫﺎ ﻧﻴﺰ ﻫﻤﺎﻧﻨﺪ ﻛﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻛﻪ ﺑﺮﺍﻱ ﺍﺟﺮﺍﻱ ﺑﺮﻧﺎﻣﻪ ﻫﺎ ﺑﻪ ﻳﻚ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻧﻴﺎﺯ
ﺩﺍﺭﻧﺪ ،ﺍﺯ ﺧﺪﻣﺎﺕ ﻳﻚ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﺩﺭ ﺍﺑﻌﺎﺩ ﮔﺴﺘﺮﺩﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﻓﺮﺁﻳﻨﺪ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺭﻭﺗﺮ ﺑﺎ ﺍﺳﺘﻘﺮﺍﺭ ﺑﺮﻧﺎﻣﻪ ، Bootstrapﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻭ ﻳﻚ ﻓﺎﻳﻞ
ﭘﻴﻜﺮﺑﻨﺪﻱ ﺩﺭ ﺣﺎﻓﻈﻪ ﺁﻏﺎﺯ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﻛﻪ ﺭﻭﺗﺮ ﻧﺘﻮﺍﻧﺪ ﻳﻚ ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﺍ ﭘﻴﺪﺍ
ﻧﻤﺎﻳﺪ Setup mode ،ﻓﻌﺎﻝ ﻭ ﭘﺲ ﺍﺯ ﺍﺗﻤﺎﻡ ﻋﻤﻠﻴﺎﺕ ﺩﺭ ﺍﻳﻦ ، modeﻣﻲ ﺗﻮﺍﻥ ﻳﻚ
ﻧﺴﺨﻪ backupﺍﺯ ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﺍ ﺩﺭ ﺣﺎﻓﻈﻪ NVRAMﺫﺧﻴﺮﻩ ﻧﻤﻮﺩ.
ﻫﺪﻑ ﺍﺯ ﺍﺟﺮﺍﻱ ﺭﻭﺗﻴﻦ ﻫﺎﻱ ﺭﺍﻩ ﺍﻧﺪﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ، IOSﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﻭ ﺁﻏﺎﺯ ﻓﻌﺎﻟﻴﺖ ﻫﺎﻱ ﻳﻚ
ﺭﻭﺗﺮ ﻣﻲ ﺑﺎﺷﺪ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﻻﺯﻡ ﺍﺳﺖ ﻋﻤﻠﻴﺎﺕ ﺯﻳﺮ ﺗﻮﺳﻂ ﺭﻭﺗﻴﻦ ﻫﺎﻱ ﺭﺍﻩ ﺍﻧﺪﺍﺯ ﺍﻧﺠﺎﻡ
ﺷﻮﺩ :
ﻳﺎﻓﺘﻦ ﻭ ﺑﻜﺎﺭﮔﻴﺮﻱ ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﺍﻩ ﺍﻧﺪﺍﺯ ﻭ ﻳﺎ ﻭﺭﻭﺩ ﺑﻪ setup mode •
ﭘﺲ ﺍﺯ ﺭﻭﺷﻦ ﻛﺮﺩﻥ ﺭﻭﺗﺮ ،ﺩﺭ ﺍﻭﻟﻴﻦ ﺍﻗﺪﺍﻡ ﺑﺮﻧﺎﻣﻪ ﺍﻱ ﻣﻮﺳﻮﻡ ﺑﻪ ) POSTﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ
( power-on self-testﺍﺟﺮﺍﺀ ﻣﻲ ﮔﺮﺩﺩ .ﺑﺮﻧﺎﻣﻪ ﻓﻮﻕ ﺩﺭ ﺣﺎﻓﻈﻪ ROMﺫﺧﻴﺮﻩ ﻭ
ﻣﺸﺘﻤﻞ ﺑﺮ ﺭﻭﺗﻴﻦ ﻫﺎﺋﻲ ﺍﺳﺖ ﻛﻪ ﺗﻤﺎﻣﻲ ﻋﻨﺎﺻﺮ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﺭﻭﺗﺮ ﻧﻈﻴﺮ ﭘﺮﺩﺍﺯﻧﺪﻩ ،ﺣﺎﻓﻈﻪ
ﻭ ﭘﻮﺭﺕ ﻫﺎﻱ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺷﺒﻜﻪ ﺭﺍ ﺑﺮﺭﺳﻲ ﻭ ﺗﺴﺖ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﭘﺲ ﺍﺯ ﺣﺼﻮﻝ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﺻﺤﺖ ﻋﻤﻠﻜﺮﺩ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ،ﻓﺮﺁﻳﻨﺪ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺭﻭﺗﺮ ﺑﺮ ﺍﺳﺎﺱ
ﻣﺮﺍﺣﻞ ﺯﻳﺮ ﺩﻧﺒﺎﻝ ﻣﻲ ﺷﻮﺩ:
313
ﻣﺮﺣﻠﻪ ﺍﻭﻝ :ﺍﺟﺮﺍﻱ ﺑﺮﻧﺎﻣﻪ loader bootstrapﻣﻮﺟﻮﺩ ﺩﺭ ﺣﺎﻓﻈﻪ •
ﺫﺧﻴﺮﻩ IOSﺭﺍ ﺗﻌﻴﻴﻦ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﻛﻪ ﻣﺸﺨﺺ ﺷﺪﻩ ﺑﺎﺷﺪ ﻛﻪ ﻣﻲ ﺑﺎﻳﺴﺖ
IOSﺍﺯ ﻃﺮﻳﻖ ﺣﺎﻓﻈﻪ ﻓﻠﺶ ﺩﺭ ﺣﺎﻓﻈﻪ ﻣﺴﺘﻘﺮ ﮔﺮﺩﺩ ﻭﻟﻲ IOSﺩﺭ ﺣﺎﻓﻈﻪ ﻓﻠﺶ
ﻣﻮﺟﻮﺩ ﻧﺒﺎﺷﺪ ،ﻳﻚ ﻧﺴﺨﻪ ﺍﺯ IOSﺑﺎ ﺍﻣﻜﺎﻧﺎﺕ ﻣﺤﺪﻭﺩﺗﺮ ﺍﺯ ﻃﺮﻳﻖ ﺣﺎﻓﻈﻪ ROM
ﺩﺭ ﺣﺎﻓﻈﻪ ﻣﺴﺘﻘﺮ ﺧﻮﺍﻫﺪ ﺷﺪ .
ﻣﺮﺣﻠﻪ ﺳﻮﻡ :ﺍﺳﺘﻘﺮﺍﺭ IOS imageﺩﺭ ﺣﺎﻓﻈﻪ .ﺩﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ IOSﺩﺭ •
ﺣﺎﻓﻈﻪ ﻣﺴﺘﻘﺮ ﻣﻲ ﮔﺮﺩﺩ .ﭘﺲ ﺍﺯ ﺍﺳﺘﻘﺮﺍﺭ IOSﺩﺭ ﺣﺎﻓﻈﻪ ﻭ ﻋﻤﻠﻴﺎﺗﻲ ﺷﺪﻥ ﺁﻥ ،ﻟﻴﺴﺘﻲ
ﺍﺯ ﻋﻨﺎﺻﺮ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﻭ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﻧﻤﺎﻳﺸﮕﺮ )ﻛﺎﻣﭙﻴﻮﺗﺮ ﻭ ﻳﺎ
ﺗﺮﻣﻴﻨﺎﻝ( ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ.
ﻣﺮﺣﻠﻪ ﭼﻬﺎﺭﻡ :ﺍﺳﺘﻘﺮﺍﺭ ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺩﺭ ﺣﺎﻓﻈﻪ ﻭ ﺍﺟﺮﺍﻱ ﺩﺳﺘﻮﺭﺍﺕ ﺁﻥ .ﺩﺭ •
ﺍﻳﻦ ﻣﺮﺣﻠﻪ ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺩﺭ ﺣﺎﻓﻈﻪ ، NVRAMﺩﺭﻭﻥ ﺣﺎﻓﻈﻪ ﺍﺻﻠﻲ
ﻗﺮﺍﺭ ﮔﺮﻓﺘﻪ ﻭ ﺩﺳﺘﻮﺭﺍﺕ ﺁﻥ ﻳﻜﻲ ﭘﺲ ﺍﺯ ﺩﻳﮕﺮﻱ ﺍﺟﺮﺍﺀ ﻣﻲ ﮔﺮﺩﻧﺪ.
ﻣﺮﺣﻠﻪ ﭘﻨﺠﻢ :ﻓﻌﺎﻝ ﺷﺪﻥ mode Setupﺩﺭ ﺻﻮﺭﺗﻲ ﻛﻪ IOSﺑﮕﻮﻧﻪ ﺍﻱ •
314
Setup mode
[0] Go to the IOS command prompt
without saving this config.
[1] Return back to the setup without
saving this config.
[2] Save this configuration to nvram
and exit.
Enter your selection [2]:
ﺩﺭ ﺯﻣﺎﻥ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺭﻭﺗﺮ ،ﻫﺮ LEDﻣﻮﺟﻮﺩ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺭﺳﺎﻟﺖ ﺧﻮﺩ ﻣﻲ ﺗﻮﺍﻧﺪ ﺍﻃﻼﻋﺎﺕ
ﻣﻔﻴﺪﻱ ﺭﺍ ﺍﺭﺍﺋﻪ ﻧﻤﺎﻳﺪ .ﻣﺜﻼ" LEDﻣﺮﺑﻮﻁ ﺑﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ،ﻭﺿﻌﻴﺖ ﻫﺮ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺭﺍ ﻧﺸﺎﻥ
ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﻛﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻓﻌﺎﻝ ﻭ ﺑﻪ ﺩﺭﺳﺘﻲ ﻣﺘﺼﻞ ﺷﺪﻩ ﺑﺎﺷﺪ ﻭﻟﻲ LEDﺁﻥ
ﺧﺎﻣﻮﺵ ﺍﺳﺖ ،ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮﺍﻱ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻳﻚ ﻣﺸﻜﻞ ﺧﺎﺹ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﺑﺎﺷﺪ.
"eraseﺩﺭ ﺯﻣﺎﻥ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺭﻭﺗﺮ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺭﺍ ﺍﻋﻼﻡ ﻣﻲ ﻧﻤﺎﻳﺪ ﻛﻪ ﺭﻭﺗﺮ ﺗﺎﻛﻨﻮﻥ
ﭘﻴﻜﺮﺑﻨﺪﻱ ﻧﺸﺪﻩ ﻭ ﻳﺎ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺣﺎﻓﻈﻪ NVRAMﺁﻥ ﺣﺬﻑ ﺷﺪﻩ ﺍﺳﺖ
.ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ﻻﺯﻡ ﺍﺳﺖ ﻛﻪ ﺭﻭﺗﺮ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﺪﻩ ﻭ ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺩﺭ ﺣﺎﻓﻈﻪ
NVRAMﺫﺧﻴﺮﻩ ﻭ ﺩﺭ ﺍﺩﺍﻣﻪ ﺍﺯ ﻓﺎﻳﻞ ﻓﻮﻕ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ .ﺗﻨﻈﻤﻴﺎﺕ ﭘﻴﺶ ﻓﺮﺽ ﺑﺮﺍﻱ
ﺭﻳﺠﺴﺘﺮ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻣﻘﺪﺍﺭ X2102٠ﻣﻲ ﺑﺎﺷﺪ ﻛﻪ ﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﺫﺧﻴﺮﻩ image IOS
315
ﺩﺭ ﺣﺎﻓﻈﻪ ﻓﻠﺶ ﺍﺳﺖ ﻭ ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﻃﺮﻳﻖ ﺣﺎﻓﻈﻪ ﻓﻮﻕ ﺑﻪ ﺩﺭﻭﻥ ﺣﺎﻓﻈﻪ ﺍﺻﻠﻲ
ﻣﻨﺘﻘﻞ ﮔﺮﺩﺩ .
ﻧﻤﺎﻳﺶ ﺍﻃﻼﻋﺎﺕ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﻭ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﺭﻭﺗﺮ .ﺩﺭ ﺯﻣﺎﻥ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺭﻭﺗﺮ، •
316
ﺁﺷﻨﺎﺋﻲ ﺑﺎ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﺭﻭﺗﺮ
317
ﺍﻛﺜﺮ ﺧﻄﻮﻁ ﺗﻮﻟﻴﺪ ﻣﺤﺼﻮﻻﺕ ﺷﺮﻛﺖ ﺳﻴﺴﻜﻮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻋﻤﻠﻜﺮﺩ IOSﺑﺎ ﺗﻮﺟﻪ ﺑﻪ
ﻧﻮﻉ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﺑﻴﻦ ﺷﺒﻜﻪ ﺍﻱ ﻣﺘﻔﺎﻭﺕ ﻣﻲ ﺑﺎﺷﺪ.
ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻣﺤﻴﻂ IOSﺍﺯ ﺭﻭﺵ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ:
ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺑﺨﺶ ﺭﺍﺑﻂ ﻛﺎﺭﺑﺮ ﺭﻭﺗﺮ ﻭ ﻳﺎ ﺳﻮﺋﻴﭻ ﺍﺯ ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﺗﺮﻣﻴﻨﺎﻝ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ
HyperTerminalﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﮔﺰﻳﻨﻪ ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﻣﻲ ﺑﺎﺷﺪ.
318
، IOSﻳﻚ ﺳﺮﻭﻳﺲ ﻣﻔﺴﺮ ﺩﺳﺘﻮﺭ ﺑﺎ ﻧﺎﻡ EXECﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲ ﻧﻤﺎﻳﺪ .ﭘﺲ ﺍﺯ ﺩﺭﺝ ﻫﺮ ﺩﺳﺘﻮﺭ،
EXECﺻﺤﺖ ﺁﻥ ﺭﺍ ﺑﺮﺭﺳﻲ ﻭ ﭘﺲ ﺍﺯ ﺗﺎﺋﻴﺪ ﺁﻥ ﺭﺍ ﺍﺟﺮﺍﺀ ﻣﻲ ﻧﻤﺎﻳﺪ .ﻧﺮﻡ ﺍﻓﺰﺍﺭ IOSﺩﺭ
ﺟﻬﺖ ﺍﻓﺰﺍﻳﺶ ﺍﻣﻨﻴﺖ ،ﺩﻭ ﺳﻄﺢ ﻣﺘﻔﺎﻭﺕ ﺩﺳﺘﻴﺎﺑﻲ user EXEC modeﻭ
privileged EXEC modeﺑﺎ ﻭﻳﮋﮔﻲ ﺯﻳﺮ ﺭﺍ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﻣﻔﺴﺮ ﺩﺳﺘﻮﺭ ) ( EXEC
ﺩﺭ ﻧﻈﺮ ﻣﻲ ﮔﻴﺮﺩ:
: EXEC mode userﺩﺭ ﺍﻳﻦ modeﺻﺮﻓﺎ" ﻣﻲ ﺗﻮﺍﻥ ﺗﻌﺪﺍﺩ ﻣﺤﺪﻭﺩﻱ ﺍﺯ •
ﺩﺳﺘﻮﺭﺍﺕ ﻣﺎﻧﻴﺘﻮﺭﻳﻨﮓ ﺭﺍ ﺍﺟﺮﺍﺀ ﻧﻤﻮﺩ .ﺑﻪ ﺍﻳﻦ ﻣﺪ view onlyﻧﻴﺰ ﮔﻔﺘﻪ ﺷﺪﻩ ﻭ
ﻧﻤﻲ ﺗﻮﺍﻥ ﺩﺳﺘﻮﺭﺍﺗﻲ ﺭﺍ ﻛﻪ ﺑﺎﻋﺚ ﺗﻐﻴﻴﺮ ﺩﺭ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﻭﺗﺮ ﻣﻲ ﮔﺮﺩﻧﺪ ،ﺍﺟﺮﺍﺀ ﻧﻤﻮﺩ.
: privileged EXEC modeﺩﺭ ﺍﻳﻦ modeﻣﻲ ﺗﻮﺍﻥ ﺑﻪ ﺗﻤﺎﻣﻲ •
ﺩﺳﺘﻮﺭﺍﺕ ﺭﻭﺗﺮ ﺩﺳﺘﻴﺎﺑﻲ ﺩﺍﺷﺖ .ﺑﺮﺍﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻦ modeﻭ ﺩﺭ ﺟﻬﺖ ﺍﻓﺰﺍﻳﺶ
ﺍﻣﻨﻴﺖ ،ﻣﻲ ﺗﻮﺍﻥ ﺭﻭﺗﺮ ﺭﺍ ﺑﮕﻮﻧﻪ ﺍﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻧﻤﻮﺩ ﻛﻪ ﻛﺎﺭﺑﺮﺍﻥ ﺭﺍ ﻣﻠﺰﻡ ﺑﻪ ﺩﺭﺝ ﻧﺎﻡ ﻭ
ﺭﻣﺰ ﻋﺒﻮﺭ ﺟﻬﺖ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺭﻭﺗﺮ ﻧﻤﺎﻳﺪ Global configuration mode .ﻭ
ﺳﺎﻳﺮ ﺣﺎﻻﺕ ﻣﺘﻔﺎﻭﺕ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺻﺮﻓﺎ" ﺍﺯ ﻃﺮﻳﻖ privileged EXEC mode
ﻗﺎﺑﻞ ﺩﺳﺘﻴﺎﺑﻲ ﻣﻲ ﺑﺎﺷﻨﺪ.
ﻛﺎﺭﺑﺮﺩ EXEC
Prompt
Mode
Router1> Userﺑﺮﺭﺳﻲ ﻭﺿﻌﻴﺖ ﺭﻭﺗﺮ
ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺣﺎﻻﺕ ﻣﺘﻔﺎﻭﺕ
Router1# privileged
ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﻭﺗﺮ
319
ﻫﻤﺎﻧﮕﻮﻧﻪ ﻛﻪ ﺩﺭ ﺷﻜﻞ ﻓﻮﻕ ﻣﺸﺎﻫﺪﻩ ﻣﻲ ﮔﺮﺩﺩ ،ﺟﻬﺖ ﻓﻠﺶ ﻗﺮﻣﺰ ﺭﻧﮓ ﺑﻪ ﺳﻤﺖ Global
Configuration Modeﻭ Privileged modeﺍﺳﺖ .ﺍﻳﻦ ﺑﺪﺍﻥ ﻣﻌﻨﻲ ﺍﺳﺖ ﻛﻪ
ﺟﻬﺖ ﻭﺭﻭﺩ ﺑﻪ ﺑﺮﺧﻲ ﺣﺎﻻﺕ ﺧﺎﺹ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﻃﺮﻳﻖ Global
Configuration Modeﺍﻗﺪﺍﻡ ﻧﻤﻮﺩ ﻭ ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﺩﻳﮕﺮ ﺍﻳﻦ ﻛﺎﺭ ﺍﺯ ﻃﺮﻳﻖ
Privileged modeﺍﻧﺠﺎﻡ ﻣﻲ ﮔﺮﺩﺩ .
ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ privileged EXEC modeﺍﺯ ﻃﺮﻳﻖ ، user EXEC mode
ﺍﺯ ﺩﺳﺘﻮﺭ enableﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﻛﻪ ﺭﻭﺗﺮ ﺑﮕﻮﻧﻪ ﺍﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺷﺪﻩ ﺍﺳﺖ
ﻛﻪ ﺟﻬﺖ ﻭﺭﻭﺩ ﺑﻪ privileged EXEC modeﻛﺎﺭﺑﺮﺍﻥ ﺭﺍ ﻣﻠﺰﻡ ﺑﻪ ﺩﺭﺝ ﻧﺎﻡ ﻭ ﺭﻣﺰ
ﻋﺒﻮﺭ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ ﺭﻣﺰ ﻋﺒﻮﺭ ﺭﺍ ﻧﻴﺰ ﻭﺍﺭﺩ ﻧﻤﻮﺩ .ﭘﺲ ﺍﺯ ﺩﺭﺝ ﺻﺤﻴﺢ
ﺭﻣﺰ ﻋﺒﻮﺭ ،ﺑﻪ EXEC mode privilegedﻭﺍﺭﺩ ﺷﺪﻩ ﻭ ﺑﺎ ﺩﺭﺝ ﻳﻚ ﻋﻼﻣﺖ ﺳﻮﺍﻝ ﻣﻲ
ﺗﻮﺍﻥ ﺩﺳﺘﻮﺭﺍﺕ ﻭ ﮔﺰﻳﻨﻪ ﻫﺎﻱ ﻣﺘﻌﺪﺩ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ modeﺭﺍ ﻣﺸﺎﻫﺪﻩ ﻧﻤﻮﺩ .ﺷﻜﻞ ﺯﻳﺮ
ﺭﺍ ﻧﺤﻮﻩ ﺣﺮﻛﺖ ﺑﻴﻦ user EXEC modeﻭ privileged EXEC mode
ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ.
320
ﻭﻳﮋﮔﻲ ﻧﺮﻡ ﺍﻓﺰﺍﺭ IOS
ﺷﺮﻛﺖ ﺳﻴﺴﻜﻮ ﺗﺎﻛﻨﻮﻥ ﻧﺴﺨﻪ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭ IOSﺭﺍ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻧﻤﻮﺩﻩ ﺍﺳﺖ .
ﻫﺮ imageﺩﺍﺭﺍﻱ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﻣﺨﺘﺺ ﺑﻪ ﺧﻮﺩ ﻣﻲ ﺑﺎﺷﺪ .ﻋﻠﻴﺮﻏﻢ ﺗﻨﻮﻉ ﺑﺴﻴﺎﺭ ﮔﺴـــﺘﺮﺩﻩ
IOS imagesﺑﺮﺍﻱ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﺳﻴﺴﻜﻮ ،ﺳﺎﺧﺘﺎﺭ ﺍﻭﻟﻴﻪ ﺩﺳﺘﻮﺭﺍﺕ ﭘﻴﻜﺮﺑﻨــﺪﻱ ﺩﺭ ﺁﻧﺎﻥ
ﻣﺸﺎﺑﻪ ﻣﻲ ﺑﺎﺷﺪ ﻭ ﺩﺭ ﺻﻮﺭﺕ ﻛﺴﺐ ﻣﻬﺎﺭﺕ ﻻﺯﻡ ﺑﻪ ﻣﻨﻈﻮﺭ ﭘﻴﻜﺮﺑﻨــﺪﻱ ﻭ ﺍﺷﻜﺎﻝ ﺯﺩﺍﺋﻲ ﻳﻚ
ﺩﺳﺘﮕﺎﻩ ﺧﺎﺹ ،ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺗﺠﺎﺭﺏ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﺎﻳﺮ ﺩﺳﺘﮕﺎﻩ ﻫﺎ ﻧﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ.
ﺍﺳﺎﻣﻲ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺑﺮﺍﻱ ﻫﺮ ﻳﻚ ﺍﺯ ﻧﺴﺨﻪ ﻫﺎﻱ IOSﺍﺯ ﺳﻪ ﺑﺨﺶ ﻋﻤﺪﻩ ﺗﺸـﻜﻴﻞ
ﻣﻲ ﮔﺮﺩﺩ:
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ Advisor Cisco Softwareﻣﻲ ﺗﻮﺍﻥ ﻭﻳﮋﮔﻲ ﻫﺎﻱ ﺧﺎﺻﻲ ﺍﺯ IOSﺭﺍ
ﺍﻧﺘﺨﺎﺏ ﻧﻤﻮﺩ .ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻓﻮﻕ ﻳﻚ ﺍﺑﺰﺍﺭ ﻣﺤﺎﻭﺭﻩ ﺍﻱ ﺍﺳﺖ ﻛﻪ ﭘﺲ ﺍﺯ ﻧﻤﺎﻳﺶ ﻭﺿﻌﻴﺖ
ﻣﻮﺟﻮﺩ ،ﺍﻣﻜﺎﻥ ﺍﻧﺘﺨﺎﺏ ﮔﺰﻳﻨﻪ ﻫﺎﺋﻲ ﻣﺘﻨﺎﺳﺐ ﺑﺎ ﻭﺍﻗﻌﻴﺖ ﻫﺎﻱ ﺷﺒﻜﻪ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﻳﻜﻲ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﻣﻮﺍﺭﺩﻱ ﻛﻪ ﺩﺭ ﺯﻣﺎﻥ ﺍﻧﺘﺨﺎﺏ ﻳﻚ IOS imageﺟﺪﻳﺪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﺁﻥ
ﺗﻮﺟﻪ ﮔﺮﺩﺩ ،ﺳﺎﺯﮔﺎﺭﻱ ﺁﻥ ﺑﺎ ﺣﺎﻓﻈﻪ ﻓﻠﺶ ﻭ RAMﺍﺳﺖ .ﻧﺴﺨﻪ ﻫﺎﻱ ﺟﺪﻳﺪﺗﺮ ﻋﻤﻮﻣﺎ"
321
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ. ﺩﺍﺭﺍﻱ ﺍﻣﻜﺎﻧﺎﺕ ﺑﻴﺸﺘﺮﻱ ﺑﻮﺩﻩ ﻭ ﺑﻪ ﺣﺎﻓﻈﻪ ﺑﻴﺸﺘﺮﻱ ﻧﻴﺰ ﻧﻴﺎﺯ ﺧﻮﺍﻫﻨﺪ ﺩﺍﺷﺖ
ﻣﻮﺟﻮﺩ ﻭ ﺣﺎﻓﻈﻪ ﻓﻠﺶ ﺭﺍ ﻣﺸﺎﻫﺪﻩimage ﻣﻲ ﺗﻮﺍﻥ ﻭﺿﻌﻴﺖShow version ﺩﺳﺘﻮﺭ
ﻣﻲ ﺑﺎﻳﺴﺖ ﻭﺿﻌﻴﺖ ﺣﺎﻓﻈﻪ ﺁﻥ، IOS ﻗﺒﻞ ﺍﺯ ﻧﺼﺐ ﻳﻚ ﻧﺴﺨﻪ ﺟﺪﻳﺪ ﺍﺯ ﻧﺮﻡ ﺍﻓﺰﺍﺭ. ﻧﻤﻮﺩ
. ﺑﺮﺭﺳﻲ ﮔﺮﺩﺩ، ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻃﻤﻴﻨﺎﻥ ﺍﺯ ﻭﺟﻮﺩ ﻇﺮﻓﻴﺖ ﻛﺎﻓﻲ
Configuration register is
0x2102
322
. ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩShow flash ﺑﺮﺍﻱ ﻣﺸﺎﻫﺪﻩ ﻣﻴﺰﺍﻥ ﺣﺎﻓﻈﻪ ﻓﻠﺶ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﺩﺳﺘﻮﺭ
323
ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺭﻭﺗﺮ :ﺍﻳﺠﺎﺩ ﻳﻚ Hyper Terminal Session
324
ﺍﻳﺠﺎﺩ ﻳﻚ HyperTerminal Session
ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻳﻚ HyperTerminal Sessionﻭ ﺍﺗﺼﺎﻝ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺭﻭﺗﺮ ﻣﺮﺍﺣﻞ ﺯﻳﺮ
ﺭﺍ ﺩﻧﺒﺎﻝ ﻣﻲ ﻧﻤﺎﺋﻴﻢ :
ﻣﺮﺣﻠﻪ ﺍﻭﻝ -ﭘﻴﻜﺮﺑﻨﺪﻱ ﺍﻭﻟﻴﻪ ﺭﻭﺗﺮ :ﺩﺭ ﺍﻭﻟﻴﻦ ﺍﻗﺪﺍﻡ ﻣﻲ ﺑﺎﻳﺴﺖ ﻛﺎﺑﻞ rolloverﺭﺍ ﺑﻪ
ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﺭﻭﺗﺮ ﻭ ﺳﺮ ﺩﻳﮕﺮ ﺁﻥ ﺭﺍ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺁﺩﺍﭘﺘﻮﺭ DB-9ﻭ ﻳﺎ DB-25ﺑﻪ
ﭘﻮﺭﺕ ﺳﺮﻳﺎﻝ ) ( COMﻛﺎﻣﭙﻴﻮﺗﺮ ﻣﺘﺼﻞ ﻧﻤﻮﺩ.
325
ﻣﺮﺣﻠﻪ ﭼﻬﺎﺭﻡ -ﺍﻧﺘﺨﺎﺏ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺍﺭﺗﺒﺎﻃﻲ ﻛﺎﻣﭙﻴﻮﺗﺮ :ﺩﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ ﻧﻮﻉ ﺍﻳﻨﺘﺮﻓﻴﺲ
ﺍﺭﺗﺒﺎﻃﻲ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺑﺎ ﺭﻭﺗﺮ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﺋﻴﻢ ) ﭘﻮﺭﺕ ﺳﺮﻳﺎﻝ .( COM1 :
326
ﻣﺮﺣﻠﻪ ﭘﻨﺠﻢ -ﻣﺸﺨﺺ ﻧﻤﻮﺩﻥ ﺧﺼﺎﻳﺺ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺍﺭﺗﺒﺎﻃﻲ :ﺩﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ ﺧﺼﺎﻳﺺ
ﭘﻮﺭﺕ ﺳﺮﻳﺎﻝ ﺍﻧﺘﺨﺎﺏ ﺷﺪﻩ ﺩﺭ ﻣﺮﺣﻠﻪ ﻗﺒﻞ ) ( COM1ﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﺋﻴﻢ .
327
ﺁﺷﻨﺎﺋﻲ ﺑﺎ ﻋﻨﺎﺻﺮ ﺩﺍﺧﻠﻲ ﺭﻭﺗﺮ
ﺭﻭﺗﺮ ﻳﻜﻲ ﺍﺯ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﺷﺒﻜﻪ ﺍﻱ ﻣﻬﻢ ﻭ ﺣﻴﺎﺗﻲ ﺍﺳﺖ ﻛﻪ ﺍﺯ ﺁﻥ ﺩﺭ ﺷﺒﻜﻪ ﻫﺎﻱ
LANﻭ WANﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺭﻭﺗﺮﻫﺎ ﺗﺎﻛﻨﻮﻥ ﺩﺭ ﻣﺪﻝ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﻭ ﺑﺎ ﻣﻌﻤﺎﺭﻱ
ﻣﺨﺘﻠﻒ ﻃﺮﺍﺣﻲ ،ﺗﻮﻟﻴﺪ ﻭ ﻋﺮﺿﻪ ﺷﺪﻩ ﺍﻧﺪ .ﺩﺭ ﺍﻳﻦ ﻣﻄﻠﺐ ﺑﺎ ﻋﻨﺎﺻﺮ ﺍﺻﻠﻲ ﺩﺍﺧﻠﻲ ﻳﻚ ﺭﻭﺗﺮ
ﺁﺷﻨﺎ ﺧﻮﺍﻫﻴﻢ ﺷﺪ.
ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ .ﻣﻘﺪﺍﺭﺩﻫﻲ ﺍﻭﻟﻴﻪ ﺳﻴﺴﺘﻢ ،ﻋﻤﻠﻴﺎﺕ ﺭﻭﺗﻴﻨﮓ ﻭ ﻛﻨﺘﺮﻝ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺷﺒﻜﻪ
ﺍﺯ ﺟﻤﻠﻪ ﻭﻇﺎﻳﻒ ﻳﻚ ﭘﺮﺩﺍﺯﻧﺪﻩ ﻣﻲ ﺑﺎﺷﺪ ،CPU .ﻳﻚ ﺭﻳﺰﭘﺮﺩﺍﺯﻧﺪﻩ ﺍﺳﺖ ﻭ ﺩﺭ
ﺭﻭﺗﺮﻫﺎﻱ ﺑﺰﺭﮒ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺯ ﭼﻨﺪﻳﻦ ﭘﺮﺩﺍﺯﻧﺪﻩ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ.
ﺣﺎﻓﻈﻪ ﺍﺻﻠﻲ ) : ( RAMﺍﺯ ﺣﺎﻓﻈﻪ ﻓﻮﻕ ﺑﻪ ﻣﻨﻈﻮﺭ ﺫﺧﻴﺮﻩ ﺍﻃﻼﻋﺎﺕ ﺟﺪﻭﻝ •
328
ﺣﺎﻓﻈﻪ ﻓﻠﺶ ) : ( Flashﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ﺣﺎﻓﻈﻪ ﻫﺎ ﺑﻪ ﻣﻨﻈﻮﺭ ﺫﺧﻴﺮﻩ ﻧﺴﺨﻪ ﻛﺎﻣﻞ ﻧﺮﻡ •
ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺭﻭﺗﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺑﺮﺧﻲ ﺩﺳﺘﮕﺎﻩ ﻫﺎ NVRAM ،ﺑﺮ ﺍﺳﺎﺱ
ﺗﻜﻨﻮﻟﻮﮊﻱ EEPROMsﻭ ﺩﺭ ﺳﺎﻳﺮ ﺩﺳﺘﮕﺎﻩ ﻫﺎ ﺑﻪ ﺻﻮﺭﺕ ﺣﺎﻓﻈﻪ ﻫﺎﻱ ﻓﻠﺶ ﭘﻴﺎﺩﻩ
ﺳﺎﺯﻱ ﻣﻲ ﮔﺮﺩﺩ .ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ NVRAMﭘﺲ ﺍﺯ ﺧﺎﻣﻮﺵ ﺷﺪﻥ ﻭ ﻳﺎ ﺭﺍﻩ
ﺍﻧﺪﺍﺯﻱ ﻣﺠﺪﺩ ﺭﻭﺗﺮ ﺍﺯ ﺑﻴﻦ ﻧﺨﻮﺍﻫﻨﺪ ﺭﻓﺖ.
ﮔﺬﺭﮔﺎﻩ ﻫﺎ ) : ( Busesﺍﻛﺜﺮ ﺭﻭﺗﺮﻫﺎ ﺷﺎﻣﻞ ﻳﻚ ﮔﺬﺭﮔﺎﻩ ﺳﻴﺴﺘﻢ ﻭ ﻳﻚ ﮔﺬﺭﮔﺎﻩ •
ﭘﺮﺩﺍﺯﻧﺪﻩ ﻣﻲﺑﺎﺷﻨﺪ .ﺍﺯ ﮔﺬﺭﮔﺎﻩ ﺳﻴﺴﺘﻢ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺑﻴﻦ ﭘﺮﺩﺍﺯﻧﺪﻩ ﻭ
ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ﻭ ﻳﺎ ﺗﺠﻬﻴﺰﺍﺕ ﺟﺎﻧﺒﻲ ﻧﺼﺐ ﺷﺪﻩ ﺩﺭ ﻳﻜﻲ ﺍﺯ ﺍﺳﻼﺕ ﻫﺎﻱ ﺳﻴﺴﺘﻢ،
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﮔﺬﺭﮔﺎﻩ ﻓﻮﻕ ﻣﺴﺌﻮﻟﻴﺖ ﻣﺒﺎﺩﻟﻪ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺑﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ
ﻫﺎ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ ) ﺩﺭﻳﺎﻓﺖ ﻭ ﺍﺭﺳﺎﻝ (.
ﮔﺬﺭﮔﺎﻩ ﭘﺮﺩﺍﺯﻧﺪﻩ ﺗﻮﺳﻂ ﭘﺮﺩﺍﺯﻧﺪﻩ ﻭ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﻲ ﻋﻨﺎﺻﺮ ﺍﺯ ﻃﺮﻳﻖ ﺣﺎﻓﻈﻪ
ﺍﺻﻠﻲ ﺭﻭﺗﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺍﻳﻦ ﮔﺬﺭﮔﺎﻩ ﻣﺴﺌﻮﻟﻴﺖ ﻣﺒﺎﺩﻟﻪ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎ ﻭ ﺩﺍﺩﻩ
ﺑﻪ ﻳﻚ ﺁﺩﺭﺱ ﺧﺎﺹ ﺍﺯ ﺣﺎﻓﻈﻪ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ ) ﺫﺧﻴﺮﻩ ﻭ ﺑﺎﺯﻳﺎﺑﻲ (.
329
ﺣﺎﻓﻈﻪ : ROMﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ﺣﺎﻓﻈﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺫﺧﻴﺮﻩ ﺩﺍﺋﻢ ﻛﺪ ﺍﺷﻜﺎﻝ ﺯﺩﺍﺋﻲ ﺭﺍﻩ ﺍﻧﺪﺍﺯ •
330
ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺍﺯ ﻃﺮﻳﻖ ﭘﻮﺭﺕ ﻫﺎﻱ ﺍﺭﺗﺒﺎﻃﻲ ﻛﺎﻣﭙﻴﻮﺗﺮ ﻭ ﻳﺎ ﻣﻮﺩﻡ ﺍﺳﺘﻔﺎﺩﻩ ﺑﻌﻤﻞ
ﻣﻲ ﺁﻳﺪ.
ﻣﻨﺒﻊ ﺗﻐﺬﻳﻪ :ﻣﻨﺒﻊ ﺗﻐﺬﻳﻪ ﺗﻮﺍﻥ ﻻﺯﻡ ﺑﺮﺍﻱ ﻋﻤﻠﻜﺮﺩ ﺻﺤﻴﺢ ﻋﻨﺎﺻﺮ ﺩﺍﺧﻠﻲ ﺭﻭﺗﺮ ﺭﺍ •
ﺗﺎﻣﻴﻦ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺭﻭﺗﺮﻫﺎﻱ ﺑﺰﺭﮒ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺍﺭﺍﻱ ﭼﻨﺪﻳﻦ ﻣﻨﺒﻊ ﺗﻐﺬﻳﻪ ﺑﺎﺷﻨﺪ .ﺩﺭ
ﺭﻭﺗﺮﻫﺎﻱ ﻛﻮﭼﻚ ﻣﻨﺒﻊ ﺗﻐﺬﻳﻪ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﻪ ﺻﻮﺭﺕ Externalﺑﺎﺷﺪ.
331
ﺷﻜﻞ ﺯﻳﺮ ﺑﺮﺧﻲ ﻛﺎﻧﻜﺘﻮﺭﻫﺎﻱ ﺧﺎﺭﺟﻲ ﻳﻚ ﺭﻭﺗﺮ ٢٦٠٠ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ.
332
ﺁﺷﻨﺎﺋﻲ ﺑﺎ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﺭﻭﺗﺮ
ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻣﺨﺘﺺ ﺷﺒﻜﻪ ﻣﺤﻠﻲ :ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻓﻮﻕ ﻳﻚ ﺭﻭﺗﺮ •
ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﻪ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﺷﺒﻜﻪ ﻣﺤﻠﻲ ﻣﺘﺼﻞ ﮔﺮﺩﺩ .ﺍﻳﻨﮕﻮﻧﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ﻣﻌﻤﻮﻻ"
ﻧﻮﻉ ﺧﺎﺻﻲ ﺍﺯ ﺍﺗﺮﻧﺖ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺑﺮﺧﻲ ﻣﻮﺍﺭﺩ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺯ ﺳﺎﻳﺮ ﺗﻜﻨﻮﻟﻮﮊﻱ
ﻫﺎﻱ LANﻧﻈﻴﺮ Token Ringﻭ ﻳﺎ ) ATMﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ Asynchronous
( Transfer Modeﻧﻴﺰ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ.
ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻣﺨﺘﺺ ﺷﺒﻜﻪ : WANﺍﻳﻦ ﻧﻮﻉ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ﺍﺗﺼﺎﻻﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ •
333
ﻣﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﻓﺮﻳﻢ ﻫﺎ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﻧﺪ ﻭﻟﻲ ﭘﻮﺭﺕ ﻫﺎﻱ ﻣﺪﻳﺮﻳﺘﻲ ﻳﻚ ﺍﺗﺼﺎﻝ ﻣﺒﺘﻨﻲ
ﺑﺮ ﻣﺘﻦ ﺑﻪ ﻣﻨﻈﻮﺭ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻭ ﺍﺷﻜﺎﻝ ﺯﺩﺍﺋﻲ ﺭﻭﺗﺮ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﭘﻮﺭﺕ ﻫﺎﻱ
ﻛﻤﻜﻲ ) ( auxilliaryﻭ ﻛﻨﺴﻮﻝ ) ( consoleﺩﻭ ﻧﻤﻮﻧﻪ ﻣﺘﺪﺍﻭﻝ ﺍﺯ ﭘﻮﺭﺕ ﻫﺎﻱ
ﻣﺪﻳﺮﻳﺖ ﺭﻭﺗﺮ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺍﻳﻦ ﻧﻮﻉ ﭘﻮﺭﺕ ﻫﺎ ،ﺍﺯ ﻧﻮﻉ ﭘﻮﺭﺕ ﻫﺎﻱ ﺳﺮﻳﺎﻝ ﻏﻴﺮﻫﻤﺰﻣﺎﻥ
EIA-232ﻣﻲ ﺑﺎﺷﻨﺪ ﻛﻪ ﺑﻪ ﻳﻚ ﭘﻮﺭﺕ ﺍﺭﺗﺒﺎﻃﻲ ﻛﺎﻣﭙﻴﻮﺗﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺩﺭ
ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ﺍﺯ ﻳﻚ ﺑﺮﻧﺎﻣﻪ ﺷﺒﻴﻪ ﺳﺎﺯ ﺗﺮﻣﻴﻨﺎﻝ ﺑﺮ ﺭﻭﻱ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﻳﻚ
ﺍﺭﺗﺒﺎﻁ ﻣﺒﺘﻨﻲ ﺑﺮ ﻣﺘﻦ ﺑﺎ ﺭﻭﺗﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻣﺪﻳﺮﺍﻥ ﺷﺒﻜﻪ ﻣﻲ ﺗﻮﺍﻧﻨﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ
ﺍﺯ ﺍﺭﺗﺒﺎﻁ ﺍﻳﺠﺎﺩ ﺷﺪﻩ ﻣﺪﻳﺮﻳﺖ ﻭ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺩﺳﺘﮕﺎﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ.
ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺎ ﻧﺤﻮﻩ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻓﻮﻕ ﺁﺷﻨﺎ ﺧﻮﺍﻫﻴﻢ ﺷﺪ.
334
ﺑﺮﺍﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻭ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﺍﻭﻟﻴﻪ ﺭﻭﺗﺮ ،ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﻳﻚ ﺗﺮﻣﻴﻨﺎﻝ ﻭ ﻳﺎ ﻛﺎﻣﭙﻴﻮﺗﺮ ﻛﻪ ﺑﻪ
ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﺭﻭﺗﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ ،ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﭘﺲ ﺍﺯ ﺍﺗﺼﺎﻝ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺭﻭﺗﺮ ،
ﻣﻲ ﺗﻮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘﻮﺭﺍﺕ ﭘﻴﻜﺮﺑﻨﺪﻱ ،ﺗﻨﻈﻴﻤﺎﺕ ﻣﺮﺑﻮﻃﻪ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﺍﺩ .ﭘﺲ ﺍﺯ ﭘﻴﻜﺮﺑﻨﺪﻱ
ﺭﻭﺗﺮ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﻭ ﻳﺎ ﻛﻤﻜﻲ ،ﺯﻣﻴﻨﻪ ﺍﺗﺼﺎﻝ ﺭﻭﺗﺮ ﺑﻪ ﺷﺒﻜﻪ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺷﻜﺎﻝ
ﺯﺩﺍﺋﻲ ﻭ ﻳﺎ ﻣﺎﻧﻴﺘﻮﺭﻳﻨﮓ ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ.
ﭘﻴﻜﺮﺑﻨﺪﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺷﺒﻴﻪ ﺳﺎﺯﻱ ﺗﺮﻣﻴﻨﺎﻝ ﺑﺮ ﺭﻭﻱ ﻛﺎﻣﭙﻴﻮﺗﺮ ) ﺍﻧﺘﺨﺎﺏ ﺷﻤﺎﺭﻩ ﭘﻮﺭﺕ •
ﻣﻨﺎﺳﺐ ﻭ ( ...
ﺍﺗﺼﺎﻝ ﻛﺎﻧﻜﺘﻮﺭ RJ-45ﻛﺎﺑﻞ rolloverﺑﻪ ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﺭﻭﺗﺮ •
335
ﺍﺗﺼﺎﻝ ﻛﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﺭﻭﺗﺮ
ﺑﺮﺍﻱ ﻣﺪﻳﺮﻳﺖ ﻭ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ﺭﻭﺗﺮ ،ﻣﻲ ﺗﻮﺍﻥ ﻳﻚ ﻣﻮﺩﻡ ﺭﺍ ﺑﻪ ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﻭ ﻳﺎ
ﻛﻤﻜﻲ ﺭﻭﺗﺮ ﻣﺘﺼﻞ ﻧﻤﻮﺩ .ﺷﻜﻞ ﺯﻳﺮ ﻧﺤﻮﻩ ﺍﺗﺼﺎﻝ ﺭﻭﺗﺮ ﺑﻪ ﻳﻚ ﻣﻮﺩﻡ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ :
ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺷﻜﺎﻝ ﺯﺩﺍﺋﻲ ﺭﻭﺗﺮ ،ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﻧﺴﺒﺖ ﺑﻪ ﭘﻮﺭﺕ ﻛﻤﻜﻲ ﺗﺮﺟﻴﺢ ﺩﺍﺩﻩ
ﻣﻲ ﺷﻮﺩ .ﺩﺭ ﺯﻣﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﺑﻪ ﺻﻮﺭﺕ ﭘﻴﺶ ﻓﺮﺽ ﭘﻴﺎﻡ ﻫﺎﻱ ﺧﻄﺎﺀ ،ﺍﺷﻜﺎﻝ
ﺯﺩﺍﺋﻲ ﻭ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﻧﺪ .ﺍﺯ ﭘﻮﺭﺕ ﻛﻨﺴﻮﻝ ﺩﺭ ﻣﻮﺍﺭﺩﻱ ﻛﻪ ﺳﺮﻭﻳﺲ ﻫﺎﻱ
ﺷﺒﻜﻪ ﻓﻌﺎﻝ ﻧﺸﺪﻩ ﻭ ﻳﺎ ﺑﺎ ﻣﺸﻜﻞ ﻣﻮﺍﺟﻪ ﺷﺪﻩ ﺍﻧﺪ ﻧﻴﺰ ﻣﻲ ﺗﻮﺍﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﭘﻮﺭﺕ
ﻛﻨﺴﻮﻝ ﮔﺰﻳﻨﻪ ﺍﻱ ﻣﻨﺎﺳﺐ ﺑﺮﺍﻱ ﺑﺎﺯﻳﺎﻓﺖ ﺭﻣﺰ ﻋﺒﻮﺭ ﻭ ﺳﺎﻳﺮ ﻣﺸﻜﻼﺕ ﻏﻴﺮﻗﺎﺑﻞ ﭘﻴﺶ ﺑﻴﻨﻲ ﻣﻲ
ﺑﺎﺷﺪ.
336
ﺍﺗﺮﻧﺖ ﺭﻭﺗﺮ ﻣﺴﺘﻘﻴﻤﺎ"ﺑﻪ ﻛﺎﻣﭙﻴﻮﺗﺮ ﻭ ﻳﺎ ﺭﻭﺗﺮ ﺩﻳﮕﺮﻱ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ﺍﺯ
ﻳﻚ ﻛﺎﺑﻞ Crossoverﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
ﺩﺭ ﺻﻮﺭﺕ ﻋﺪﻡ ﺍﺳﺘﻔﺎﺩﻩ ﺻﺤﻴﺢ ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ،ﻣﻤﻜﻦ ﺍﺳﺖ ﺭﻭﺗﺮ ﻭ ﻳﺎ ﺳﺎﻳﺮ ﺗﺠﻬﻴﺰﺍﺕ
ﺷﺒﻜﻪ ﺍﻱ ﺑﺎ ﻣﺸﻜﻞ ﻣﻮﺍﺟﻪ ﮔﺮﺩﻧﺪ.
ﺍﺗﺼﺎﻻﺕ WANﺩﺍﺭﺍﻱ ﺍﻧﻮﺍﻉ ﻣﺨﺘﻠﻔﻲ ﺑﻮﺩﻩ ﻭ ﺍﺯ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﺳﺮﻭﻳﺲ ﻫﺎﻱ WANﻣﻌﻤﻮﻻ" ﺍﺯ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﮔﺎﻥ ﺳﺮﻭﻳﺲ ﺍﺟﺎﺭﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺧﻄﻮﻁ
leasedﻭ ﻳﺎ packet-switchedﻧﻤﻮﻧﻪ ﻫﺎﺋﻲ ﺍﺯ ﺍﻧﻮﺍﻉ ﻣﺘﻔﺎﻭﺕ ﺍﺗﺼﺎﻻﺕ WAN
ﻣﻲ ﺑﺎﺷﻨﺪ.
ﺑﺮﺍﻱ ﻫﺮ ﻳﻚ ﺍﺯ ﺍﻧﻮﺍﻉ ﺳﺮﻭﻳﺲ ﻫﺎﻱ ، WANﺩﺳﺘﮕﺎﻩ ﻣﺸﺘﺮﻱ ) ﺍﻏﻠﺐ ﻳﻚ ﺭﻭﺗﺮ ﺍﺳﺖ ( ﺑﻪ
ﻣﻨﺰﻟﻪ ﻳﻚ ) DTEﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ ( data terminal equipmentﺭﻓﺘﺎﺭ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﭘﺎﻳﺎﻧﻪ ﻓﻮﻕ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﻚ ﺩﺳﺘﮕﺎﻩ ) DCEﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ data circuit-terminating
(equipmentﻛﻪ ﻣﻌﻤﻮﻻ" ﻳﻚ ﻣﻮﺩﻡ ﻭ ﻳﺎ ) CSU/DSUﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ channel
( service unit/data service unitﻣﻲ ﺑﺎﺷﺪ ﺑﻪ ﺍﺭﺍﺋﻪ ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ ﻣﺘﺼﻞ
ﻣﻲ ﮔﺮﺩﺩ .ﺍﺯ ﺩﺳﺘﮕﺎﻩ ﻓﻮﻕ ﺑﺮﺍﻱ ﺗﺒﺪﻳﻞ ﺩﺍﺩﻩ ﺍﺯ DTEﺑﻪ ﻳﻚ ﺷﻜﻞ ﻗﺎﺑﻞ ﻗﺒﻮﻝ ﺑﺮﺍﻱ ﺍﺭﺍﺋﻪ
ﺩﻫﻨﺪﻩ ﺳﺮﻭﻳﺲ ، WANﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
337
ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﺳﺮﻳﺎﻝ ،ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﺭﻭﺗﺮ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﻫﺎﻱ
WANﻣﻲ ﺑﺎﺷﻨﺪ .ﺑﺮﺍﻱ ﺍﻧﺘﺨﺎﺏ ﻛﺎﺑﻞ ﺳﺮﻳﺎﻝ ﻣﻨﺎﺳﺐ ،ﺑﺮﺭﺳﻲ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﭘﻴﺸﻨﻬﺎﺩ ﻣﻲ ﮔﺮﺩﺩ:
ﻧﻮﻉ ﺍﻳﻨﺘﺮﻓﻴﺲ :ﺭﻭﺗﺮﻫﺎﻱ ﺳﻴﺴﻜﻮ ﻣﻤﻜﻦ ﺍﺳﺖ ﺍﺯ ﻛﺎﻧﻜﺘﻮﺭﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺑﺮﺍﻱ •
ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﺳﺮﻳﺎﻝ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ .ﻣﺜﻼ" ﺩﺭ ﺑﺮﺧﻲ ﺭﻭﺗﺮﻫﺎ ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ
ﺳﺮﻳﺎﻝ smartﻭ ﻳﺎ ﻳﻚ ﺍﺗﺼﺎﻝ DB-60ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
ﻧﻮﻉ ﺍﺗﺼﺎﻝ ﺷﺒﻜﻪ :ﺁﻳﺎ ﺷﺒﻜﻪ ﺑﻪ ﻳﻚ ﺩﺳﺘﮕﺎﻩ DCEﻭ ﻳﺎ DTEﻣﺘﺼﻞ ﺍﺳﺖ؟ DCE •
ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﻫﺮ ﺍﺳـــﺘﺎﻧﺪﺍﺭﺩ ،ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﻛﺎﺑﻞ ﺭﺍ ﺗﻌﺮﻳﻒ ﻭ ﻧﻮﻉ
ﻛﺎﻧﻜﺘﻮﺭﻫﺎﻱ ﺩﻭ ﺳﺮ ﻛﺎﺑﻞ ﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ.
338
ﺭﻭﺗﺮ ﻭ ﺟﺎﻳﮕﺎﻩ ﺁﻥ ﺩﺭ ﺷﺒﻜﻪ ﻫﺎﻱ WAN
ﺭﻭﺗﺮ ﻳﻜﻲ ﺍﺯ ﺩﺳﺘﮕﺎﻩ ﻫﺎﻱ ﺷﺒﻜﻪ ﺍﻱ ﻣﻬﻢ ﻭ ﺣﻴﺎﺗﻲ ﺍﺳﺖ ﻛﻪ ﺍﺯ ﺁﻥ ﺩﺭ ﺷﺒﻜﻪ ﻫﺎﻱ
LANﻭ WANﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺍﻳﻦ ﻣﻄﻠﺐ ﭘﺲ ﺍﺯ ﺁﺷﻨﺎﺋﻲ ﺍﻭﻟﻴﻪ ﺑﺎ ﺭﻭﺗﺮ ،ﺑﺎ ﺟﺎﻳﮕﺎﻩ ﺁﻥ
ﺩﺭ ﺷﺒﻜﻪ ﻫﺎﻱ WANﺁﺷﻨﺎ ﺧﻮﺍﻫﻴﻢ ﺷﺪ.
339
ﺣﺎﻓﻈﻪ ) RAMﺑﺮﮔﺮﻓﺘﻪ ﺍﺯ : ( random access memoryﺣﺎﻓﻈﻪ RAM
ﻛﻪ ﺑﻪ ﺁﻥ ) DRAMﺣﺎﻓﻈﻪ RAMﭘﻮﻳﺎ ( ﻧﻴﺰ ﮔﻔﺘﻪ ﻣﻲﺷﻮﺩ ﺩﺍﺭﺍﻱ ﺧﺼﻮﺻﻴﺎﺕ ﻭ ﻭﻇﺎﻳﻒ
ﺯﻳﺮ ﻣﻲ ﺑﺎﺷﺪ :
ﺍﺭﺍﺋﻪ ﺣﺎﻓﻈﻪ ﻣﻮﻗﺖ ﺑﺮﺍﻱ ﻓﺎﻳﻞ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺩﺭ ﺯﻣﺎﻥ ﺭﻭﺷﻦ ﻛﺮﺩﻥ ﺭﻭﺗﺮ •
ﻋﺪﻡ ﻧﮕﻬﺪﺍﺭﻱ ﺍﻃﻼﻋﺎﺕ ﭘﺲ ﺍﺯ ﺧﺎﻣﻮﺵ ﻛﺮﺩﻥ ﻭ ﻳﺎ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﻣﺠﺪﺩ ﺭﻭﺗﺮ •
ﺑﻬﻨﮕﺎﻡ ﺳﺎﺯﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﺑﺪﻭﻥ ﺿﺮﻭﺭﺕ ﺗﻌﻮﻳﺾ ﻭ ﻳﺎ ﺟﺎﻳﮕﺰﻳﻨﻲ ﺗﺮﺍﺷﻪ ﻫﺎﻱ ﻣﻮﺟﻮﺩ •
340
ﺍﻣﻜﺎﻥ ﺣﺬﻑ ﺍﻃﻼﻋﺎﺕ ) ﻳﻚ ﻧﻮﻉ ﺧﺎﺹ ﺍﺯ ﺣﺎﻓﻈﻪ ﻫﺎﻱ ROMﺑﺎ ﻗﺎﺑﻠﻴﺖ ﺣﺬﻑ •
ﻧﮕﻬﺪﺍﺭﻱ ﺩﺳﺘﻮﺭﺍﻟﻌﻤﻞ ﻫﺎﻱ ﻻﺯﻡ ﺑﺮﺍﻱ ﺍﺷﻜﺎﻝ ﺯﺩﺍﺋﻲ ﻭ ﺍﺟﺮﺍﻱ ﺑﺮﻧﺎﻣﻪ POST •
ﻋﺎﻣﻞ
ﺗﻌﻮﻳﺾ ﺗﺮﺍﺷﻪ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﺮ ﺭﻭﻱ ﺑﺮﺩ ﺍﺻﻠﻲ ﺩﺭ ﺻﻮﺭﺕ ﻧﻴﺎﺯ ﺑﻪ ﺍﺭﺗﻘﺎﺀ ﻧﺮﻡ ﺍﻓﺰﺍﺭ •
ﺫﺧﻴﺮﻩ ﺷﺪﻩ
ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ﻣﻤﻜﻦ ﺍﺳﺖ ﺑﺮ ﺭﻭﻱ ﺑﺮﺩ ﺍﺻﻠﻲ ﻭ ﻳﺎ ﺑﻪ ﻋﻨﻮﺍﻥ ﻣﺎﮊﻭﻝ ﻫﺎﻱ ﺟﺪﺍﮔﺎﻧﻪ •
341
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺗﺮ ﺩﺭﻳﻚ ﺷﺒﻜﻪ ﻣﺤﻠﻲ ) ﻣﻨﺒﻊ :ﺳﺎﻳﺖ ﺳﻴﺴﻜﻮ (
ﺍﺯ ﺗﻜﻨﻮﻟﻮﮊﻱ ﻫﺎﻱ WANﺩﺭ ﺍﻛﺜﺮ ﻣﻮﺍﺭﺩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﺭﻭﺗﺮﻫﺎ ﺑﻪ ﻳﻜﺪﻳﮕﺮ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﮔﺮﺩﺩ ﻭ ﺭﻭﺗﺮﻫﺎ ﺑﺎ ﺍﺗﺼﺎﻻﺕ ﻣﺒﺘﻲ ﺑﺮ WANﺑﺎ ﻳﻜﺪﻳﮕﺮ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﺭﻭﺗﺮﻫﺎ ﻣﺴﺌﻮﻟﻴﺖ ﺍﻳﺠﺎﺩ ﺳﺘﻮﻥ ﻓﻘﺮﺍﺕ ﺩﺭ ﺷﺒﻜﻪ ﻫﺎﻱ ﺩﺍﺧﻠﻲ ﺑﺰﺭﮒ ) ﺍﻳﻨﺘﺮﺍﻧﺖ ( ﻭ ﻳﺎ
ﺍﻳﻨﺘﺮﻧﺖ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺷﺘﻪ ﻭ ﺩﺭ ﻻﻳﻪ ﺳﻮﻡ ﻣﺪﻝ ﻣﺮﺟﻊ OSIﻓﻌﺎﻟﻴﺖ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ) ﺍﺗﺨﺎﺫ
ﺗﺼﻤﻴﻢ ﺑﺮ ﺍﺳﺎﺱ ﺁﺩﺭﺱ ﻫﺎﻱ ﺷﺒﻜﻪ (.
342
ﺭﻭﺗﻴﻨﮓ ﺍﻳﺴﺘﺎ ﻭ ﻳﺎ ﭘﻮﻳﺎ •
ﺳﻮﺋﻴﭽﻴﻨﮓ •
343
ﻣﻮﺍﺭﺩ ﻛﻪ ﺩﺭ ﻣﺤﺪﻭﺩﻩ ﻣﺮﺯﻱ ﺑﻴﻦ ﻳﻚ ﺷﺒﻜﻪ LANﻭ WANﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ ،ﺩﺭ ﻳﻚ
ﻟﺤﻈﻪ ﻣﻲﺗﻮﺍﻧﺪ ﻫﻢ ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﻚ ﺩﺳﺘﮕﺎﻩ ﺷﺒﻜﻪ ﻣﺤﻠﻲ ﻭ ﻫﻢ ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﻚ ﺩﺳﺘﮕﺎﻩ WAN
ﻭﻇﺎﻳﻒ ﻣﺤﻮﻟﻪ ﺭﺍ ﺍﻧﺠﺎﻡ ﺩﻫﺪ .
ﻳﻜﻲ ﺍﺯ ﻭﻇﺎﻳﻒ ﺭﻭﺗﺮ ﺩﺭ ﺷﺒﻜﻪ ﻫﺎﻱ ، WANﻣﺴﻴﺮﺩﻫﻲ ﺑﺴﺘﻪ ﻫﺎﻱ ﺍﻃﻼﻋﺎﺗﻲ ﺩﺭ ﻻﻳﻪ ﺳﻮﻡ
ﺍﺳﺖ ﻭﻟﻲ ﺭﻭﺗﺮ ﺩﺭ ﻳﻚ ﺷﺒﻜﻪ ﻣﺤﻠﻲ ﻧﻴﺰ ﺩﺍﺭﺍﻱ ﭼﻨﻴﻦ ﻣﺴﺌﻮﻟﻴﺘﻲ ﺍﺳﺖ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﻧﻤﻲ ﺗﻮﺍﻥ
ﺭﻭﺗﻴﻨﮓ ﺭﺍ ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﻚ ﻭﻇﻴﻔﻪ ﺍﺧﺘﺼﺎﺻﻲ ﺑﺮﺍﻱ ﺭﻭﺗﺮ ﺩﺭ ﺷﺒﻜﻪ ﻫﺎﻱ WANﺩﺭ ﻧﻈﺮ
ﮔﺮﻓﺖ .ﺯﻣﺎﻧﻲ ﻛﻪ ﻳﻚ ﺭﻭﺗﺮ ﺍﺯ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﻭ ﭘﺮﻭﺗﻜﻞ ﻫﺎﻱ ﻣﺮﺗﺒﻂ ﺑﺎ WANﺩﺭ ﻻﻳﻪ ﻫﺎﻱ
ﻓﻴﺰﻳﻜﻲ ﻭ data linkﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﻭﻱ ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﻚ ﺩﺳﺘﮕﺎﻩ WANﺩﺭ ﺷﺒﻜﻪ
ﺍﻳﻔﺎﻱ ﻭﻇﻴﻔﻪ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺍﻭﻟﻴﻦ ﻭﻇﻴﻔﻪ ﺭﻭﺗﺮ ﺩﺭ ﻳﻚ ﺷﺒﻜﻪ WANﺭﻭﺗﻴﻨﮓ ﻧﻤﻲ ﺑﺎﺷﺪ ﻭ ﺍﮔﺮ
ﻗﺮﺍﺭ ﺍﺳﺖ ﺑﺮﺍﻱ ﺁﻥ ﻭﻇﻴﻔﻪ ﺍﻱ ﺍﺧﺘﺼﺎﺻﻲ ﺭﺍ ﺗﻌﺮﻳﻒ ﻧﻤﺎﺋﻴﻢ ﺑﻬﺘﺮ ﺍﺳﺖ ﮔﻔﺘﻪ ﺷﻮﺩ ﻛﻪ
ﻣﺴﺌﻮﻟﻴﺖ ﺭﻭﺗﺮ ﺩﺭ ﺷﺒﻜﻪ ﻫﺎﻱ ، WANﺍﺭﺍﺋﻪ ﺍﺗﺼﺎﻻﺕ ﻻﺯﻡ ﺑﻴﻦ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻣﺨﺘﻠﻒ
data linkﻭ ﻓﻴﺮﻳﻜﻲ WANﺍﺳﺖ.
ﻣﺜﻼ" ﻳﻚ ﺭﻭﺗﺮ ﻣﻤﻜﻦ ﺍﺳﺖ ﺩﺍﺭﺍﻱ ﻳﻚ ﺍﻳﻨﺘﺮﻓﻴﺲ ISDNﺑﺎﺷﺪ ﻛﻪ ﺍﺯ ﻛﭙﺴﻮﻟﻪ ﺳﺎﺯﻱ PPP
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ ﻭ ﻫﻤﭽﻨﻴﻦ ﺩﺍﺭﺍﻱ ﻳﻚ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺳﺮﻳﺎﻝ T1ﺑﺎﺷﺪ ﻛﻪ ﺩﺭ ﺁﻥ ﺍﺯ ﻛﭙﺴﻮﻟﻪ
ﺳﺎﺯﻱ Frame Relayﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﭼﻨﻴﻦ ﻭﺿﻌﻴﺘﻲ ﺭﻭﺗﺮ ﻣﻲ ﺑﺎﻳﺴﺖ ﻗﺎﺩﺭ ﺑﻪ
ﺍﻧﺘﻘﺎﻝ ﺑﻴﺖ ﻫﺎ ﺍﺯ ﻳﻚ ﻧﻮﻉ ﺳﺮﻭﻳﺲ ) ﻧﻈﻴﺮ ( ISDNﺑﻪ ﺳﺮﻭﻳﺲ ﺩﻳﮕﺮ )ﻧﻈﻴﺮ (T1ﻭ ﺗﻐﻴﻴﺮ
ﻛﭙﺴﻮﻟﻪ ﺳﺎﺯﻱ data linkﺍﺯ PPPﺑﻪ Frame Relayﺑﺎﺷﺪ.
ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎ ﻭ ﭘﺮﻭﺗﻜﻞ ﻫﺎﻱ ﻻﻳﻪ ﻓﻴﺰﻳﻜﻲ ﻭ data linkﺩﺭ ﺷﺒﻜﻪ ﻫﺎﻱ WAN
ﺑﺮﺧﻲﺍﺯ ﭘﺮﻭﺗﻜﻞ ﻫﺎ ﻭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻻﻳﻪ ﻓﻴﺰﻳﻜﻲ ﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ:
• EIA/TIA-232
• EIA/TIA-449
• V.24
• V.35
• X.21
• G.703
344
• EIA-530
• ISDN
• T1, T3, E1, and E3
• xDSL
• SONET (OC-3, OC-12, OC-48, OC-192)
345
ﺍﻧﻮﺍﻉ ﺭﻭﺗﺮ
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺗﺮﻫﺎ ﺩﺭ ﺷﺒﮑﻪ ﺑﻪ ﺍﻣﺮﻱ ﻣﺘﺪﺍﻭﻝ ﺗﺒﺪﻳﻞ ﺷﺪﻩ ﺍﺳﺖ .ﻳﮑﻲ ﺍﺯ ﺩﻻﻳﻞ ﻣﻬﻢ
ﮔﺴﺘﺮﺵ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺗﺮ ،ﺿﺮﻭﺭﺕ ﺍﺗﺼﺎﻝ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ ﭼﻨﺪﻳﻦ ﺷﺒﮑﻪ ﺩﻳﮕﺮ ) ﺍﻳﻨﺘﺮﻧﺖ ﻭ
ﻳﺎ ﺳﺎﻳﺮ ﺳﺎﻳﺖ ﻫﺎ ﻱ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ ( ﺩﺭ ﻋﺼﺮ ﺣﺎﺿﺮ ﺍﺳﺖ .ﻧﺎﻡ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺑﺮﺍﻱ
ﺭﻭﺗﺮﻫﺎ ،ﻣﺘﻨﺎﺳﺐ ﺑﺎ ﮐﺎﺭﻱ ﺍﺳﺖ ﮐﻪ ﺁﻧﺎﻥ ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﻨﺪ " :ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺍﺯ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ
ﺷﺒﮑﻪ ﺍﻱ ﺩﻳﮕﺮ" .ﻣﺜﻼ" ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻳﮏ ﺷﺮﮐﺖ ﺩﺍﺭﺍﻱ ﺷﻌﺒﻪ ﺍﻱ ﺩﺭ ﺗﻬﺮﺍﻥ ﻭ ﻳﮏ ﺩﻓﺘﺮ
ﺩﻳﮕﺮ ﺩﺭ ﺍﻫﻮﺍﺯ ﺑﺎﺷﺪ ،ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﺁﻧﺎﻥ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﻳﮏ ﺧﻂ leased
)ﺍﺧﺘﺼﺎﺻﻲ( ﮐﻪ ﺑﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﺭﻭﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺩﻓﺎﺗﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ ،ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ.
ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ،ﻫﺮ ﮔﻮﻧﻪ ﺗﺮﺍﻓﻴﮑﻲ ﮐﻪ ﻻﺯﻡ ﺍﺳﺖ ﺍﺯ ﻳﮏ ﺳﺎﻳﺖ ﺑﻪ ﺳﺎﻳﺖ ﺩﻳﮕﺮ ﺍﻧﺠﺎﻡ ﺷﻮﺩ ﺍﺯ
ﻃﺮﻳﻖ ﺭﻭﺗﺮ ﻣﺤﻘﻖ ﺷﺪﻩ ﻭ ﺗﻤﺎﻣﻲ ﺗﺮﺍﻓﻴﮏ ﻫﺎﻱ ﻏﻴﺮﺿﺮﻭﺭﻱ ﺩﻳﮕﺮ ﻓﻴﻠﺘﺮ ﻭ ﺩﺭ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻭ
ﻫﺰﻳﻨﻪ ﻫﺎﻱ ﻣﺮﺑﻮﻃﻪ ،ﺻﺮﻓﻪ ﺟﻮﺋﻲ ﻣﻲ ﮔﺮﺩﺩ.
ﺍﻧﻮﺍﻉ ﺭﻭﺗﺮﻫﺎ
ﺭﻭﺗﺮﻫﺎ ﺭﺍ ﻣﻲ ﺗﻮﺍﻥ ﺑﻪ ﺩﻭ ﮔﺮﻭﻩ ﻋﻤﺪﻩ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﻭ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺗﻘﺴﻴﻢ ﻧﻤﻮﺩ:
ﺭﻭﺗﺮﻫﺎﻱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ :ﺭﻭﺗﺮﻫﺎﻱ ﻓﻮﻕ ،ﺳﺨﺖ ﺍﻓﺰﺍﺭﻫﺎﺋﻲ ﻣﻲ ﺑﺎﺷﻨﺪ ﮐﻪ ﻧﺮﻡ •
ﺍﻓﺰﺍﺭﻫﺎﻱ ﺧﺎﺹ ﺗﻮﻟﻴﺪ ﺷﺪﻩ ﺗﻮﺳﻂ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ ﺭﺍ ﺍﺟﺮﺍﺀ ﻣﻲ ﻧﻤﺎﻳﻨﺪ )ﺩﺭﺣﺎﻝ
ﺣﺎﺿﺮ ﺻﺮﻓﺎ" ﺑﻪ ﺻﻮﺭﺕ black boxﺑﻪ ﺁﻧﺎﻥ ﻧﮕﺎﻩ ﻣﻲ ﮐﻨﻴﻢ (.ﻧﺮﻡ ﺍﻓﺰﺍﺭ ﻓﻮﻕ،
ﻗﺎﺑﻠﻴﺖ ﺭﻭﺗﻴﻨﮓ ﺭﺍ ﺑﺮﺍﻱ ﺭﻭﺗﺮﻫﺎ ﻓﺮﺍﻫﻢ ﻧﻤﻮﺩﻩ ﺗﺎ ﺁﻧﺎﻥ ﻣﻬﻤﺘﺮﻳﻦ ﻭ ﺷﺎﻳﺪ ﺳﺎﺩﻩ ﺗﺮﻳﻦ
ﻭﻇﻴﻔﻪ ﺧﻮﺩ ﮐﻪ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺍﺯ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ ﺷﺒﮑﻪ ﺩﻳﮕﺮ ﺍﺳﺖ ﺭﺍ ﺑﺨﻮﺑﻲ ﺍﻧﺠﺎﻡ ﺩﻫﻨﺪ.
ﺍﮐﺜﺮ ﺷﺮﮐﺖ ﻫﺎ ﺗﺮﺟﻴﺢ ﻣﻲ ﺩﻫﻨﺪ ﮐﻪ ﺍﺯ ﺭﻭﺗﺮﻫﺎﻱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﻳﻨﺪ
ﭼﺮﺍﮐﻪ ﺁﻧﺎﻥ ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ﺭﻭﺗﺮﻫﺎﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ،ﺩﺍﺭﺍﻱ ﺳﺮﻋﺖ ﻭ ﺍﻋﺘﻤﺎﺩ ﭘﺬﻳﺮﻱ
ﺑﻴﺸﺘﺮﻱ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺷﮑﻞ ﺯﻳﺮ ﻳﮏ ﻧﻤﻮﻧﻪ ﺭﻭﺗﺮ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪCisco 2600 ) .
( Series Multiservice Platform
346
ﻣﻨﺒﻊ :ﺳﺎﻳﺖ ﺳﻴﺴﮑﻮ
ﺭﻭﺗﺮﻫﺎﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ :ﺭﻭﺗﺮﻫﺎﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺩﺍﺭﺍﻱ ﻋﻤﻠﮑﺮﺩﻱ ﻣﺸﺎﺑﻪ ﺑﺎ ﺭﻭﺗﺮﻫﺎﻱ •
ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﺑﻮﺩﻩ ﻭ ﻣﺴﺌﻮﻟﻴﺖ ﺍﺻﻠﻲ ﺁﻧﺎﻥ ﻧﻴﺰ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﺍﺯ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ ﺷﺒﮑﻪ
ﺩﻳﮕﺮ ﺍﺳﺖ .ﻳﮏ ﺭﻭﺗﺮ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﻣﻲ ﺗﻮﺍﻧﺪ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ، NTﻳﮏ ﺳﺮﻭﻳﺲ
ﺩﻫﻨﺪﻩ ﻧﺖ ﻭﺭ ﻭ ﻳﺎ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻟﻴﻨﻮﮐﺲ ﺑﺎﺷﺪ .ﺗﻤﺎﻣﻲ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻋﺎﻣﻞ
ﺷﺒﮑﻪ ﺍﻱ ﻣﻄﺮﺡ ،ﺩﺍﺭﺍﻱ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﺭﻭﺗﻴﻨﮓ ﺍﺯ ﻗﺒﻞ ﺗﻌﺒﻴﻪ ﺷﺪﻩ ﻣﻲ ﺑﺎﺷﻨﺪ.
ﺩﺭ ﺍﮐﺜﺮ ﻣﻮﺍﺭﺩ ﺍﺯ ﺭﻭﺗﺮﻫﺎ ﺑﻪ ﻋﻨﻮﺍﻥ ﻓﺎﻳﺮﻭﺍﻝ ﻭ ﻳﺎ gatewayﺍﻳﻨﺘﺮﻧﺖ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﻻﺯﻡ ﺍﺳﺖ ﺑﻪ ﻳﮑﻲ ﺍﺯ ﻣﻬﻤﺘﺮﻳﻦ ﺗﻔﺎﻭﺕ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺑﻴﻦ ﺭﻭﺗﺮﻫﺎﻱ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ
ﻭ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ،ﺍﺷﺎﺭﻩ ﮔﺮﺩﺩ :ﺩﺭ ﺍﮐﺜﺮ ﻣﻮﺍﺭﺩ ﻧﻤﻲ ﺗﻮﺍﻥ ﻳﮏ ﺭﻭﺗﺮ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ ﺭﺍ ﺟﺎﻳﮕﺰﻳﻦ
ﻳﮏ ﺭﻭﺗﺮ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﻧﻤﻮﺩ ،ﭼﺮﺍﮐﻪ ﺭﻭﺗﺮﻫﺎﻱ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻱ ﺩﺍﺭﺍﻱ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﻻﺯﻡ ﻭ
ﺍﺯ ﻗﺒﻞ ﺗﻌﺒﻴﻪ ﺷﺪﻩ ﺍﻱ ﻣﻲ ﺑﺎﺷﻨﺪ ﮐﻪ ﺑﻪ ﺁﻧﺎﻥ ﺍﻣﮑﺎﻥ ﺍﺗﺼﺎﻝ ﺑﻪ ﻳﮏ ﻟﻴﻨﮏ ﺧﺎﺹ WAN
)ﺍﺯ ﻧﻮﻉ ISDN ، Frame Relayﻭ ﻳﺎ (ATMﺭﺍ ﺧﻮﺍﻫﺪ ﺩﺍﺩ .ﻳﮏ ﺭﻭﺗﺮ ﻧﺮﻡ ﺍﻓﺰﺍﺭﻱ
) ﻧﻈﻴﺮ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻭﻳﻨﺪﻭﺯ ( ﺩﺍﺭﺍﻱ ﺗﻌﺪﺍﺩﻱ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﺍﺳﺖ ﮐﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﺁﻧﺎﻥ ﺑﻪ
ﻳﮏ ﺷﺒﮑﻪ LANﻣﺘﺼﻞ ﺷﺪﻩ ﻭ ﺳﺎﻳﺮ ﺍﺗﺼﺎﻻﺕ ﺑﻪ ﺷﺒﮑﻪ ﻫﺎﻱ WANﺍﺯ ﻃﺮﻳﻖ ﺭﻭﺗﺮﻫﺎﻱ
ﺳﺨﺖ ﻓﺰﺍﺭﻱ ،ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ.
ﻣﺜﺎﻝ : ١ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺗﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﺩﻭ ﺷﺒﮑﻪ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻭ ﺍﺭﺗﺒﺎﻁ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ
ﻓﺮﺽ ﮐﻨﻴﺪ ﺍﺯ ﻳﮏ ﺭﻭﺗﺮ ﻣﻄﺎﺑﻖ ﺷﮑﻞ ﺯﻳﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﺩﻭ ﺷﺒﮑﻪ LANﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻭ
ﺍﻳﻨﺘﺮﻧﺖ ،ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺍﺳﺖ .ﺯﻣﺎﻧﻲ ﮐﻪ ﺭﻭﺗﺮ ﺩﺍﺩﻩ ﺍﻱ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﺷﺒﮑﻪ LANﻭ ﻳﺎ
ﺍﻳﻨﺘﺮﻧﺖ ﺩﺭﻳﺎﻓﺖ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﭘﺲ ﺍﺯ ﺑﺮﺭﺳﻲ ﺁﺩﺭﺱ ﻣﺒﺪﺍﺀ ﻭ ﻣﻘﺼﺪ ،ﺩﺍﺩﻩ ﺩﺭﻳﺎﻓﺘﻲ ﺭﺍ ﺑﺮﺍﻱ ﻫﺮ
ﻳﮏ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎ ﻭ ﻳﺎ ﺍﻳﻨﺘﺮﻧﺖ ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺭﻭﺗﺮ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﺷﮑﻞ ﺯﻳﺮ ،ﺷﺒﮑﻪ ﺭﺍ
347
ﺑﻪ ﺩﻭ ﺑﺨﺶ ﻣﺘﻔﺎﻭﺕ ﺗﻘﺴﻴﻢ ﻧﻤﻮﺩﻩ ﺍﺳﺖ ) .ﺩﻭ ﺷﺒﮑﻪ ﻣﺠﺰﺍﺀ ( .ﻫﺮ ﺷﺒﮑﻪ ﺩﺍﺭﺍﻱ ﻳﮏ ﻫﺎﺏ
ﺍﺳﺖ ﮐﻪ ﺗﻤﺎﻣﻲ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺑﻪ ﺁﻥ ﻣﺘﺼﻞ ﺷﺪﻩ ﺍﻧﺪ .ﻋﻼﻭﻩ ﺑﺮ ﻣﻮﺍﺭﺩ ﻓﻮﻕ،
ﺭﻭﺗﺮ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺍﺭﺍﻱ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻻﺯﻡ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﻫﺮ ﺷﺒﮑﻪ ﺑﻪ ﺁﻥ ﺑﻮﺩﻩ ﻭ ﺍﺯ
ﻳﮏ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺩﻳﮕﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻧﺖ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ،ﺭﻭﺗﺮ
ﻗﺎﺩﺭ ﺍﺳﺖ ﺩﺍﺩﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ ﺑﻪ ﻣﻘﺼﺪ ﺩﺭﺳﺖ ،ﺍﺭﺳﺎﻝ ﻧﻤﺎﻳﺪ.
348
ﻣﺜﺎﻝ :٣ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺭﻭﺗﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﺩﻭ ﺩﻓﺘﺮ ﮐﺎﺭ
ﻓﺮﺽ ﮐﻨﻴﺪ ،ﺑﺨﻮﺍﻫﻴـﻢ ﺍﺯ ﺭﻭﺗـــﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗــﺼﺎﻝ ﺩﻭ ﺩﻓﺘﺮ ﮐﺎﺭ ﻳﮏ ﺳﺎﺯﻣﺎﻥ ﺑﻪ ﻳﮑﺪﻳﮕﺮ،
ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﺎﺋﻴﻢ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﻫﺮ ﻳﮏ ﺍﺯ ﺭﻭﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ
ﭘﺮﻭﺗﮑﻞ WANﻧﻈﻴﺮ ISDNﺑﻪ ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﻧﺪ .ﻋﻤﻼ" ،ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﮐﺎﺑﻞ
ﮐﻪ ﺗﻮﺳﻂ ISPﻣﺮﺑﻮﻃﻪ ﺍﺭﺍﺋﻪ ﻣﻲ ﮔﺮﺩﺩ ،ﺍﻣﮑﺎﻥ ﺍﺗﺼﺎﻝ ﺑﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ WANﺭﻭﺗﺮ ﻓﺮﺍﻫﻢ
ﺷﺪﻩ ﻭ ﺍﺯ ﺁﻧﺠﺎ ﺳﻴﮕﻨﺎﻝ ﻣﺴﺘﻘﻴﻤﺎ" ﺑﻪ ﺷﺒﮑﻪ ISPﻣﺮﺑﻮﻃﻪ ﺭﻓﺘﻪ ﻭ ﺳﺮ ﺩﻳﮕﺮ ﺁﻥ ﺑﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ
WANﺭﻭﺗﺮ ﺩﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ .ﺭﻭﺗﺮﻫﺎ ،ﻗﺎﺩﺭ ﺑﻪ ﺣﻤﺎﻳﺖ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ WAN
ﻣﺘﻌﺪﺩﻱ ﻧﻈﻴﺮ HDLC , Frame Relay , ATMﻭ ﻳﺎ ، PPPﻣﻲ ﺑﺎﺷﻨﺪ.
ﺭﻭﺗﺮﻫﺎ ﻣﺎﺩﺍﻣﻴﮑﻪ ﺑﺮﻧﺎﻣﻪ ﺭﻳﺰﻱ ﻧﮕﺮﺩﻧﺪ ،ﺍﻣﮑﺎﻥ ﺗﻮﺯﻳﻊ ﺩﺍﺩﻩ ﺭﺍ ﻧﺨﻮﺍﻫﻨﺪ ﺩﺍﺷﺖ. •
ﺍﮐﺜﺮ ﺭﻭﺗﺮﻫﺎﻱ ﻣﻬﻢ ﺩﺍﺭﺍﻱ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﺍﺧﺘﺼﺎﺻﻲ ﺧﺎﺹ ﺧﻮﺩ ﻣﻲ ﺑﺎﺷﻨﺪ. •
ﺭﻭﺗﺮﻫﺎ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﺧﺎﺻﻲ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺒﺎﺩﻟﻪ ﺍﻃﻼﻋﺎﺕ ﺿﺮﻭﺭﻱ ﺧﻮﺩ ) ﻣﻨﻈﻮﺭ •
ﺑﻴﻦ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺩﺭ ﺗﻤﺎﻣﻲ ﻣﺪﺕ ﺯﻣﺎﻥ ﺍﻧﺠﺎﻡ ﺗﺮﺍﮐﺶ ﺛﺎﺑﺖ ﻭ
ﻳﮑﺴﺎﻥ ﻧﺒﻮﺩﻩ ﻭ ﻣﺘﻨﺎﺳﺐ ﺑﺎ ﻭﺿﻌﻴﺖ ﺗﺮﺍﻓﻴﮏ ﻣﻮﺟﻮﺩ ﻭ ﺩﺭ ﺩﺳﺘﺮﺱ ﺑﻮﺩﻥ ﻣﺴﻴﺮ ،ﺗﻐﻴﻴﺮ
ﻣﻲ ﻧﻤﺎﻳﺪ.
349
ﺭﻭﺗﺮﻫﺎﻱ ﺳﻴﺴﮑﻮ
ﺳﻴﺴﮑﻮ ﻳﮑﻲ ﺍﺯ ﻣﻌﺘﺒﺮﺗﺮﻳﻦ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ ﺭﻭﺗﺮ ﻭ ﺳﻮﺋﻴﭻ ﺩﺭ ﺳﻄﺢ ﺟﻬﺎﻥ ﺍﺳﺖ ﮐﻪ ﺍﺯ
ﻣﺤﺼﻮﻻﺕ ﺁﻥ ﺩﺭ ﻣﺮﺍﮐﺮ ﺷﺒﮑﻪ ﺍﻱ ﻣﺘﻌﺪﺩﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺍﻳﻦ ﺷﺮﮐﺖ ﺗﺎﮐﻨﻮﻥ ﻣﺪﻝ ﻫﺎﻱ
ﻣﺘﻌﺪﺩﻱ ﺍﺯ ﺭﻭﺗﺮﻫﺎ ﺭﺍ ﺑﺎ ﻗﺎﺑﻠﻴﺖ ﻫﺎﻱ ﻣﺨﺘﻠﻔﻲ ﺗﻮﻟﻴﺪ ﻧﻤﻮﺩﻩ ﺍﺳﺖ .ﺳﺮﻱ ٢٥٠٠ ، ١٦٠٠ﻭ
، ٢٦٠٠ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﻧﻤﻮﻧﻪ ﺩﺭ ﺍﻳﻦ ﺯﻣﻴﻨﻪ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺭﻭﺗﺮﻫﺎﻱ ﺗﻮﻟﻴﺪ ﺷﺪﻩ ﺗﻮﺳﻂ ﺍﻳﻦ ﺷﺮﮐﺖ
ﺍﺯ ﺳﺮﻱ ٦٠٠ﺷﺮﻭﻉ ﻭ ﺗﺎ ﺳﺮﻱ ١٢٠٠٠ﺍﺩﺍﻣﻪ ﻣﻲ ﻳﺎﺑﺪ) ﺩﺭ ﺣﺎﻝ ﺣﺎﺿﺮ ( .ﺷﮑﻞ ﺯﻳﺮ ﺑﺮﺧﻲ
ﺍﺯ ﻧﻤﻮﻧﻪ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ:
ﺳﺮﻱ ٢٦٠٠ ﺳﺮﻱ ١٢٠٠٠
ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ.
350
ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎ ﺷﺎﻣﻞ ﭘﻮﺭﺕ ﻫﺎﻱ ﺳﺮﻳﺎﻝ ﻭ ﺍﺗﺮﻧﺖ ﻣﺨﺘﻠﻔﻲ ﻣﻲ ﺑﺎﺷﻨﺪ ﮐﻪ ﺍﺯ ﺁﻧﺎﻥ ﺑﻪ •
ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﺭﻭﺗﺮ ﺑﻪ ﺷﺒﮑﻪ LANﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻫﺮ ﺭﻭﺗﺮ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﭘﺘﺎﻧﺴﻴﻞ
ﻫﺎﻱ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ،ﺩﺍﺭﺍﻱ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ ﺍﺳﺖ .ﺑﺮﺍﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ
ﺭﻭﺗﺮ ﺍﺯ ﻳﮏ ﻧﺎﻡ ﺧﺎﺹ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺟﺪﻭﻝ ﺯﻳﺮ ﺑﺮﺧﻲ ﺍﺯ ﺍﺳﺎﻣﻲ ﻣﺘﺪﺍﻭﻝ ﺭﺍ
ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ.
ﮐﺎﺭﺑﺮﺩ ﺍﻳﻨﺘﺮﻓﻴﺲ
first Ethernet interface E0
second Ethernet interface E1
first Serial interface S0
second Serial interface S1
first B channel for Basic BRI 0
ISDN
second B channel for Basic BRI 1
ISDN
ﺩﺭ ﺷﮑﻞ ﺯﻳﺮ ﻧﻤﺎﻱ ﭘﺸﺖ ﻳﮏ ﺭﻭﺗﺮ ﺳﻴﺴﮑﻮﺭﺍ ﺑﻪ ﻫﻤﺮﺍﻩ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺕ ﺁﻥ •
•
ﻣﻨﺒﻊ :ﺳﺎﻳﺖ ﺳﻴﺴﮑﻮ
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﻣﺸﺎﻫﺪﻩ ﻣﻲ ﻧﻤﺎﺋﻴﺪ ،ﺭﻭﺗﺮ ﻓﻮﻕ ﺣﺘﻲ ﺩﺍﺭﺍﻱ ﺳﻮﮐﺖ ﻫﺎﻱ ﻣﺨﺘﺺ ﺗﻠﻔﻦ •
ﻧﻴﺰ ﻣﻲ ﺑﺎﺷﺪ ،ﭼﺮﺍﮐﻪ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﮐﻪ ﺭﻭﺗﺮ ﻓﻮﻕ ﺍﺯ ﻧﻮﻉ ISDNﻣﻲ ﺑﺎﺷﺪ،
ﻣﻲ ﺑﺎﻳﺴﺖ ﻳﮏ ﺗﻠﻔﻦ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺭﺍ ﺑﻪ ﻳﮏ ﺧﻂ ISDNﻣﺘﺼﻞ ﻧﻤﻮﺩ .ﺭﻭﺗﺮ ﻓﻮﻕ
ﻋﻼﻭﻩ ﺑﺮ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ISDNﺩﺍﺭﺍﻱ ﻳﮏ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺍﺗﺮﻧﺖ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﺑﻪ ﻳﮏ
ﺩﺳﺘﮕﺎﻩ ﺩﺭ ﺷﺒﮑﻪ LANﺍﺳﺖ ) ﻣﻌﻤﻮﻻ" ﻳﮏ ﻫﺎﺏ ﻭ ﻳﺎ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ( .ﺩﺭ ﺻﻮﺭﺗﻲ
ﮐﻪ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻓﻮﻕ ﺭﺍ ﺑﻪ ﭘﻮﺭﺕ uplinkﻳﮏ ﻫﺎﺏ ﻣﺘﺼﻞ ﻧﻤﺎﺋﻴﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺳﻮﺋﻴﭻ
ﮐﻮﭼﮏ ﻣﻮﺟﻮﺩ ﺩﺭ ﭘﺸﺖ ﺭﻭﺗﺮ ﺭﺍ ﺩﺭ ﺣﺎﻟﺖ ﻫﺎﺏ ،ﺗﻨﻈﻴﻢ ﻧﻤﻮﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ
351
ﺍﻳﻨﺘﺮﻓﻴﺲ ﻓﻮﻕ ﺭﺍ ﺑﻪ ﻳﮏ ﺩﺳﺘﮕﺎﻩ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺘﺼﻞ ﻧﻤﺎﺋﻴﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﻭﺿﻌﻴﺖ ﺳﻮﺋﻴﭻ
ﺭﺍ ﺩﺭ ﺣﺎﻟﺖ nodeﻗﺮﺍﺭ ﺩﺍﺩ .ﭘﻮﺭﺕ Configﻭ ﻳﺎ Consoleﺍﺯ ﻧﻮﻉ ﮐﺎﻧﮑﺘﻮﺭ
) DB9ﻣﺎﺩﮔﻲ ( ﺑﻮﺩﻩ ﮐﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﮐﺎﺑﻞ ﺧﺎﺹ ﺑﻪ ﭘﻮﺭﺕ ﺳﺮﻳﺎﻝ ﮐﺎﻣﭙﻴﻮﺗﺮ
ﻣﺘﺼﻞ ﺗﺎ ﺍﻣﮑﺎﻥ ﭘﻴﮑﺮﺑﻨﺪﻱ ﻣﺴﺘﻘﻴﻢ ﺭﻭﺗﺮ ،ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ.
ﭘﺮﺩﺍﺯﻧﺪﻩ ) : ( CPUﺗﻤﺎﻣﻲ ﺭﻭﺗﺮﻫﺎﻱ ﺳﻴﺴﮑﻮ ﺩﺍﺭﺍﻱ ﻳﮏ ﭘﺮﺩﺍﺯﻧﺪﻩ ﺍﺻﻠﻲ •
ﻣﻲ ﺑﺎﺷﻨﺪ ﮐﻪ ﻣﺴﺌﻮﻟﻴﺖ ﺍﻧﺠﺎﻡ ﻋﻤﻠﻴﺎﺕ ﺍﺻﻠﻲ ﺩﺭ ﺭﻭﺗﺮ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﻧﺪ .ﭘﺮﺩﺍﺯﻧﺪﻩ ﺑﺎ
ﺗﻮﻟﻴﺪ ﻭﻗﻘﻪ ) ( IRQﺑﺎ ﺳﺎﻳﺮ ﻋﻨﺎﺻﺮ ﻣﻮﺟﻮﺩ ﺩﺭ ﺭﻭﺗﺮ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﺭﻭﺗﺮﻫﺎﻱ ﺳﻴﺴﮑﻮ ﺍﺯ ﭘﺮﺩﺍﺯﻧﺪﻩ ﻫﺎﻱ RISCﻣﻮﺗﻮﺭﻭﻻ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﻣﻌﻤﻮﻻ"
ﺩﺭﺻﺪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﺮﺩﺍﺯﻧﺪﻩ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺭﻭﺗﺮ ﻣﻌﻤﻮﻟﻲ ﺍﺯ ﺑﻴﺴﺖ ﺗﺠﺎﻭﺯ ﻧﻤﻲ ﻧﻤﺎﻳﺪ.
، IOSﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﺍﺻﻠﻲ ﺍﺟﺮﺍﺀ ﺷﺪﻩ ﺑﺮ ﺭﻭﻱ ﺭﻭﺗﺮﻫﺎ ﺍﺳﺖ IOS .ﺑﺮ ﺍﺳﺎﺱ •
352
ﺑﻪ ﺩﺍﺷﺘﻦ ﻳﮏ ﮐﺎﺭﺕ ﻓﻠﺶ ) ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﺩﺭ ﺧﺼﻮﺹ ﺭﻭﺗﺮﻫﺎﻱ ﺳﺮﻱ ١٦٠٠ﺍﺷﺎﺭﻩ
ﮔﺮﺩﻳﺪ( ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﻣﻲ ﺗﻮﺍﻥ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺍﮐﺜﺮ ﺭﻭﺗﺮﻫﺎﻱ ﺳﻴﺴﮑﻮ ﺭﺍ ﺑﻪ
ﻣﻨﻈﻮﺭ ﻟﻮﺩ image IOSﺍﺯ ﻃﺮﻳﻖ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ tftpﺷﺒﮑﻪ ﻭ ﻳﺎ ﺭﻭﺗﺮ
ﺩﻳﮕﺮﻱ ﮐﻪ ﺩﺍﺭﺍﻱ ﭼﻨﺪﻳﻦ IOS imageﺑﺮﺍﻱ ﺭﻭﺗﺮﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺍﺳﺖ ،ﺍﻧﺠﺎﻡ ﺩﺍﺩ.
ﺩﺭ ﭼﻨﻴﻦ ﺭﻭﺗﺮﻫﺎﺋﻲ ﺍﺯ ﻳﮏ ﻓﻠﺶ ﮐﺎﺭﺕ ﺣﺎﻓﻈﻪ ﺑﺎ ﻇﺮﻓﻴﺖ ﺑﺎﻻ ﺑﻪ ﻣﻨﻈﻮﺭ ﺫﺧﻴﺮﻩ ﺳﺎﺯﻱ
ﭼﻨﺪﻳﻦ ، ISO imageﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
، Image RXBootﮐﻪ ﺑﻪ ﺁﻥ Bootloaderﻧﻴﺰ ﮔﻔﺘﻪ ﻣﻲ ﺷﻮﺩ ،ﭼﻴﺰﻱ •
ﻣﻲ ﻧﻤﺎﻳﺪ .ﻋﻤﻠﮑﺮﺩ ﺣﺎﻓﻈﻪ ﻓﻮﻕ ﻣﺸﺎﺑﻪ ﺣﺎﻓﻈﻪ RAMﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﺳﺖ
)ﺍﺳﺘﻘﺮﺍﺭ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻭ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﮐﺎﺭﺑﺮﺩﻱ ﻣﺘﻔﺎﻭﺕ( .ﻣﻴﺰﺍﻥ ﺣﺎﻓﻈﻪ RAMﻣﻮﺭﺩ
ﻧﻴﺎﺯ ﻳﮏ ﺭﻭﺗﺮ ،ﺑﺴﺘﮕﻲ ﺑﻪ ﺍﻧﺪﺍﺯﻩ image IOSﻭ ﻓﺎﻳﻞ ﻫﺎﻱ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺩﺍﺭﺩ .ﺩﺭ
ﺍﮐﺜﺮ ﻣﻮﺍﺭﺩ ﻭ ﺩﺭ ﺭﻭﺗﺮﻫﺎﻱ ﮐﻮﭼﮏ ﺗﺮ ) ﺳﺮﻱ ،( ١٦٠٠ﺣﺎﻓﻈﻪ RAMﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ
ﺑﻴﻦ ﺩﻭﺍﺯﺩﻩ ﺗﺎ ﺷﺎﻧﺰﺩﻩ ﻣﮕﺎﺑﺎﻳﺖ ﻣﻲ ﺑﺎﺷﺪ.ﺍﻳﻦ ﻭﺿﻌﻴﺖ ﺩﺭ ﺭﻭﺗﺮﻫﺎﻱ ﺑﺰﺭﮔﺘﺮ ﮐﻪ
ﺩﺍﺭﺍﻱ image ISOﺑﻴﺸﺘﺮﻱ ﻣﻲ ﺑﺎﺷﻨﺪ ،ﺑﻴﻦ ﺳﻲ ﻭ ﺩﻭ ﺗﺎ ﺷﺼﺖ ﻭ ﭼﻬﺎﺭ
ﻣﮕﺎﺑﺎﻳﺖ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﺳﺘﻘﺮﺍﺭ ﺟﺪﺍﻭﻝ ﺭﻭﺗﻴﻨﮓ ﺩﺭ ﺣﺎﻓﻈﻪ ، RAMﺩﺭ
ﺻﻮﺭﺗﻲ ﮐﻪ ﺟﺪﺍﻭﻝ ﻓﻮﻕ ﺑﺰﺭﮒ ﻭ ﭘﻴﭽﻴﺪﻩ ﻣﻲ ﺑﺎﺷﻨﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﻳﮏ ﺭﻭﺗﺮ ﺑﺎ
ﻣﻴﺰﺍﻥ ﺣﺎﻓﻈﻪ RAMﻣﻨﺎﺳﺒﻲ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ.
ﺣﺎﻓﻈﻪ ) . Non-Volatile RAM ) NVRAMﺭﻭﺗﺮﻫﺎ ﺍﺯ ﺣﺎﻓﻈﻪ ﻓﻮﻕ ﺑﻪ •
353
ﭘﺲ ﺍﺯ ﭘﻴﮑﺮﺑﻨﺪﻱ ﻳﮏ ﺭﻭﺗﺮ ،ﻧﺘﺎﻳﺞ ﻭ ﻣﺎﺣﺼﻞ ﻋﻤﻠﻴﺎﺕ ﺩﺭ NVRAMﺫﺧﻴﺮﻩ
ﻣﻲ ﮔﺮﺩﺩ .ﺣﺠﻢ ﺣﺎﻓﻈﻪ ﻓﻮﻕ ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ﺣﺎﻓﻈﻪ ﻫﺎﻱ ،RAMﺍﻧﺪﮎ ﻣﻲ ﺑﺎﺷﺪ.
ﻣﺜﻼ" ﺩﺭ ﺭﻭﺗﺮﻫﺎﻱ ﺳﺮﻱ ، ١٦٠٠ﺣﺠﻢ ﺣﺎﻓﻈﻪ ﻓﻮﻕ ﺑﻪ ﻫﺸﺖ ﮐﻴﻠﻮﺑﺎﻳﺖ ﻣﻲ ﺭﺳﺪ .ﺩﺭ
ﺭﻭﺗﺮﻫﺎﻱ ﺑﺰﺭﮔﺘﺮﻱ ﻧﻈﻴﺮ ﺳﺮﻱ ،٢٦٠٠ﺣﺠﻢ ﺣﺎﻓﻈﻪ NVRAMﺑﻪ ﺳﻲ ﻭ ﺩﻭ
ﮐﻴﻠﻮﺑﺎﻳـﺖ ﻣﻲ ﺭﺳﺪ .ﭘﺲ ﺍﺯ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﻳﮏ ﺭﻭﺗﺮ ﻭ ﻟﻮﺩ ، ISO imageﻓﺎﻳﻞ
ﭘﻴﮑﺮﺑﻨﺪﻱ ﺍﺯ ﺣﺎﻓﻈﻪ NVRAMﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺠﺎﻡ ﭘﻴﮑﺮﺑﻨﺪﻱ ﺭﻭﺗﺮ ،ﻟﻮﺩ ﻣﻲ ﮔﺮﺩﺩ.
ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺍﺯ ﺣﺎﻓﻈﻪ ﻫﺎ ،ﭘﺎﮎ ﻧﺨﻮﺍﻫﺪ ﺷﺪ )ﺣﺘﻲ ﺯﻣﺎﻧﻲ ﮐﻪ ﺭﻭﺗﺮ
Reloadﻭ ﻳﺎ ﺧﺎﻣﻮﺵ ﺍﺳﺖ(.
ﺣﺎﻓﻈﻪ ، ROMﺍﺯ ﺣﺎﻓﻈﻪ ﻓﻮﻕ ﺑﻪ ﻣﻨﻈﻮﺭ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﻭ ﻧﮕﻬﺪﺍﺭﻱ ﺭﻭﺗﺮ ﺍﺳﺘﻔﺎﺩﻩ •
ﻣﻲ ﮔﺮﺩﺩ .ﺣﺎﻓﻈﻪ ﻓﻮﻕ ﺷﺎﻣﻞ ﺑﺮﺧﻲ ﮐﺪﻫﺎ ﻧﻈﻴﺮ Bootstrapﻭ POSTﺑﻮﺩﻩ ﮐﻪ
ﺗﺴﻬﻴﻼﺕ ﻻﺯﻡ ﺩﺭ ﺧﺼﻮﺹ ﺍﻧﺠﺎﻡ ﺗﺴﺖ ﻫﺎﻱ ﺍﻭﻟﻴﻪ ﻭ ﺭﺍﻩ ﺍﻧﺪﺍﺭﻱ ﺭﺍ ﺑﺮﺍﻱ ﺭﻭﺗﺮ
ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ .ﻣﺤﺘﻮﻳﺎﺕ ﺍﻳﻦ ﺣﺎﻓﻈﻪ ﺭﺍ ﻧﻤﻲ ﺗﻮﺍﻥ ﺗﻐﻴﻴﺮ ﺩﺍﺩ ) ﻓﻘﻂ ﺧﻮﺍﻧﺪﻧﻲ(.
ﺗﻤﺎﻣﻲ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺣﺎﻓﻈﻪ ROMﺗﻮﺳﻂ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ ﺫﺧﻴﺮﻩ ﺷﺪﻩ ﺍﺳﺖ.
ﺣﺎﻓﻈﻪ ﻓﻠﺶ ،ﻫﻤﺎﻥ ﮐﺎﺭﺗﻲ ﺍﺳﺖ ﮐﻪ ﺩﺭ ﺑﺨﺶ IOSﺑﻪ ﺁﻥ ﺍﺷﺎﺭﻩ ﮔﺮﺩﻳﺪ. •
، EEPROM )(Electrical Eraseable Programmable Read Only Memory ﺍﻳﻦ ﺣﺎﻓﻈﻪ ﺍﺯ ﻧﻮﻉ
ﻣﻲ ﺑﺎﺷﺪ .ﮐﺎﺭﺕ ﻓﻮﻕ ﺍﺯ ﻃﺮﻳﻖ ﺍﺳﻼﺗﻲ ﮐﻪ ﺩﺭ ﭘﺸﺖ ﻳﮏ ﺭﻭﺗﺮ ﻗﺮﺍﺭ ﺩﺍﺭﺩ ﺑﻪ ﺭﻭﺗﺮ
ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ ﻭ ﭼﻴﺰﻱ ﺑﻴﺶ ﺍﺯ image IOSﺭﺍ ﺩﺭ ﺧﻮﺩ ﺫﺧﻴﺮﻩ ﻧﻤﻲ ﻧﻤﺎﻳﺪ.
ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮐﻨﺴﻮﻝ ﺭﻭﺗﺮ ﻣﻲ ﺗﻮﺍﻥ ﺍﻃﻼﻋﺎﺗﻲ ﺭﺍ ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺣﺎﻓﻈﻪ ﻧﻮﺷﺖ ﻭ ﻳﺎ ﺍﻗﺪﺍﻡ
ﺑﻪ ﺣﺬﻑ ﺑﺮﺧﻲ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺟﻮﺩ ﻧﻤﻮﺩ .ﺣﺠﻢ ﺣﺎﻓﻈﻪ ﻓﻮﻕ ﺍﺯ ٤ﻣﮕﺎﺑﺎﻳﺖ ﺩﺭ
ﺭﻭﺗﺮﻫﺎﻱ ﺳﺮﻱ ١٦٠٠ﺷﺮﻭﻉ ﺷﺪﻩ ﻭ ﻣﺘﻨﺎﺳﺐ ﺑﺎ ﻣﺪﻝ ﺭﻭﺗﺮ ،ﺍﻓﺰﺍﻳﺶ ﻣﻲ ﻳﺎﺑﺪ.
ﺭﻳﺠﺴﺘﺮ ﭘﻴﮑﺮﺑﻨﺪﻱ ) ،( Configuration Registerﻧﻘﻄﻪ ﺷﺮﻭﻉ ﻓﺮﺁﻳﻨﺪ •
ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ IOSﺭﺍ ﻣﺸﺨﺺ ﻣﻲ ﻧﻤﺎﻳﺪ ) ﻓﻠﺶ ﮐﺎﺭﺕ ،ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ tftpﻭ ﻳﺎ
ﺻﺮﻓﺎ" ﻟﻮﺩ . ( RXBoot imageﺭﻳﺠﺴﺘﺮ ﻓﻮﻕ ،ﺷﺎﻧﺰﺩﻩ ﺑﻴﺘﻲ ﺍﺳﺖ.
354
ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﻭﺗﺮﻫﺎﻱ ﺳﻴﺴﻜﻮ
ﺑﺮﺍﻱ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﻭﺗﺮﻫﺎﻱ ﺳﻴﺴﻜﻮ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﻪ ﺑﺨﺶ ﺭﺍﺑﻂ ﻛﺎﺭﺑﺮﺁﻧﺎﻥ
ﺩﺳﺘﻴﺎﺑﻲ ﺩﺍﺷﺖ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ،ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﻳﻚ ﺗﺮﻣﻴﻨﺎﻝ ﻭ ﻳﺎ ﺩﺳﺘﻴﺎﺑﻲ ﺍﺯﺭﺍﻩ ﺩﻭﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ.
ﭘﺲ ﺍﺯ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺭﻭﺗﺮ ،ﺩﺭ ﺍﻭﻟﻴﻦ ﺍﻗﺪﺍﻡ ﻣﻲ ﺑﺎﻳﺴﺖ ﻋﻤﻠﻴﺎﺕ loggingﺭﺍ ﺍﻧﺠﺎﻡ ﺗﺎ ﺯﻣﻴﻨﻪ
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯﺳﺎﻳﺮ ﺩﺳﺘﻮﺭﺍﺕ ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺸﺎﻫﺪﻩ ﺁﺧﺮﻳﻦ ﻭﺿﻌﻴﺖ ﭘﻴﻜﺮﺑﻨﺪﻱ ﻭ ﻳﺎ ﺗﻐﻴﻴﺮ ﭘﻴﻜﺮﺑﻨﺪﻱ
ﺭﻭﺗﺮ ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ.
ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺍﺋﻪ ﻳﻚ ﻻﻳﻪ ﺍﻣﻨﻴﺘﻲ ﻣﻨﺎﺳﺐ ،ﺍﻣﻜﺎﻥ ﺑﺎﻟﻔﻌﻞ ﻛﺮﺩﻥ ﭘﺘﺎﻧﺴﻴﻞ ﻫﺎﻱ ﺍﺭﺍﺋﻪ ﺷﺪﻩ
) ﺩﺳﺘﻮﺭﺍﺕ( ﺭﻭﺗﺮ ﺩﺭ ﺩﻭ modeﻣﺘﻔﺎﻭﺕ ﻓﺮﺍﻫﻢ ﺷﺪﻩ ﺍﺳﺖ:
ﺍﺟﺮﺍﺀ ﻧﻤﻮﺩ ﻛﻪ ﻣﺎﺣﺼﻞ ﺍﺟﺮﺍﻱ ﺁﻧﺎﻥ ،ﻧﻤﺎﻳﺶ ﻭﺿﻌﻴﺖ ﭘﻴﻜﺮﺑﻨﺪﻱ ﺭﻭﺗﺮ ﺍﺳﺖ ﻭ
ﻧﻤﻲ ﺗﻮﺍﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺠﻤﻮﻋﻪ ﺍﻣﻜﺎﻧﺎﺕ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺩﺭ ﺍﻳﻦ ، modeﭘﻴﻜﺮﺑﻨﺪﻱ
ﺭﻭﺗﺮ ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﺍﺩ .
: Privileged EXEC modeﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻣﻜﺎﻧﺎﺕ ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ •
ﭘﺲ ﺍﺯ loginﺑﻪ ﺭﻭﺗﺮ ،ﭘﺮﺍﻣﭙﺖ user Exec modeﻧﺸﺎﻥ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ .ﺩﺳﺘﻮﺭﺍﺕ
ﻣﻮﺟﻮﺩ ﺩﺭ ﺍﻳﻦ ، modeﺯﻳﺮﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﺩﺳﺘﻮﺭﺍﺕ Privileged EXEC mode
ﻣﻲ ﺑﺎﺷﻨﺪ .ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻣﺠﻤﻮﻋﻪ ﻛﺎﻣﻞ ﺩﺳﺘﻮﺭﺍﺕ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ Privileged
EXEC modeﻭﺍﺭﺩ ﺷﺪ .ﺑﺎ ﺗﺎﻳﭗ ﺩﺳﺘﻮﺭ enableﻭ ﻳﺎ ﺷﻜﻞ ﻣﺨﻔﻒ ﺷﺪﻩ ﺁﻥ ﻳﻌﻨﻲ
، enuﺁﻣﺎﺩﻩ ﻭﺭﻭﺩ ﺑﻪ ﺍﻳﻦ modeﺧﻮﺍﻫﻴﻢ ﺷﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﻛﻪ ﺑﺮﺍﻱ ﺭﻭﺗﺮ ﺭﻣﺰ ﻋﺒﻮﺭﻱ
ﺗﻌﺮﻳﻒ ﺷﺪﻩ ﺑﺎﺷﺪ ،ﭘﺲ ﺍﺯ ﻧﻤﺎﻳﺶ passwordﻣﻲ ﺑﺎﻳﺴﺖ ﺭﻣﺰ ﻋﺒﻮﺭ ﺭﺍ ﻭﺍﺭﺩ ﻧﻤﻮﺩ.
ﭘﺲ ﺍﺯ ﺗﻜﻤﻴﻞ ﻓﺮﺁﻳﻨﺪ ، logginﺷﻜﻞ ﭘﺮﺍﻣﭙﺖ ) (promptﺗﻐﻴﻴﺮ ﻭ ﺑﻪ ﺻﻮﺭﺕ " "#ﻧﺸﺎﻥ
ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩ ﻛﻪ ﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﻭﺭﻭﺩ ﺑﻪ Privileged EXEC modeﻣﻲ ﺑﺎﺷﺪglobal .
355
، configuration modeﻳﻜﻲ ﺍﺯ ﺣﺎﻻﺗﻲ ﺍﺳﺖ ﻛﻪ ﺻﺮﻓﺎ" ﺍﺯ ﻃﺮﻳﻖ Privileged
EXEC modeﻗﺎﺑﻞ ﺩﺳﺘﻴﺎﺑﻲ ﺍﺳﺖ .ﺍﻣﻜﺎﻥ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺣﺎﻻﺕ ﺯﻳﺮ ﺍﺯ ﻃﺮﻳﻖ global
configuration modeﻭﺟﻮﺩ ﺩﺍﺭﺩ :
• Interface
• Subinterface
• Line
• Router
• Route-map
ﺑﺮﺍﻱ ﺗﻌﺮﻳﻒ ﺭﻣﺰ ﻋﺒﻮﺭ ﺟﻬﺖ ﻭﺭﻭﺩ ﺑﻪ ،Privileged EXEC modeﻣﻲ ﺗﻮﺍﻥ ﺍﺯ
ﺩﺳﺘﻮﺭﺍﺕ enable passwordﻭ enable secretﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ .ﺩﺭ ﺻﻮﺭﺕ
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺩﺳﺘﻮﺭﺍﺕ ﻓﻮﻕ ،ﺍﻭﻟﻮﻳﺖ ﺑﺎ ﺩﺳﺘﻮﺭ enable secretﻣﻲ ﺑﺎﺷﺪ.
356
ﺁﺷﻨﺎﺋﻲ ﺑﺎ ﺍﻣﻜﺎﻧﺎﺕ ﺑﺨﺶ ﺭﺍﺑﻂ ﻛﺎﺭﺑﺮ
، privileged EXEC mode ﻭ ﻳﺎuser EXEC mode ﺑﺎ ﺗﺎﻳﭗ ﻋﻼﻣﺖ "?" ﺩﺭ
ﺩﺳﺘﻮﺭﺍﺕ ﺻﻔﺤﻪ ﺑﻪ. ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﺩmode ﻟﻴﺴﺖ ﺩﺳﺘﻮﺭﺍﺕ ﻗﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﻫﺮ
ﻣﻲ ﺗﻮﺍﻥ ﺻﻔﺤﺎﺕ ﺑﻌﺪﻱ ﺭﺍ ﻣﺸﺎﻫﺪﻩenter ﺻﻔﺤﻪ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﺷﺪﻩ ﻭ ﺑﺎ ﻓﺸﺮﺩﻥ ﻛﻠﻴﺪ
.ﻧﻤﻮﺩ
357
mstat Show statistics after
multiple multicast traceroutes
mtrace Trace reverse multicast
path from destination to
source
name-connection Name an
existing network connection
pad Open a X.29 PAD
connection
ping Send echo messages
ppp Start IETF Point-to-Point
Protocol (PPP)
resume Resume an active
network connection
rlogin Open an rlogin
connection
show Show running system
information
slip Start Serial-line IP (SLIP)
systat Display information
about terminal lines
telnet Open a telnet
connection
terminal Set terminal line
parameters
--More--
358
privileged EXEC mode ﺩﺳﺘﻮﺭﺍﺕ
Exec commands:
access-enable Create a
temporary Access-List entry
access-profile Apply user-
profile to interface
access-template Create a
temporary Access-List entry
bfe For manual emergency
modes setting
clear Reset functions
clock Manage the system clock
configure Enter configuration
mode
connect Open a terminal
connection
copy Copy configuration or
#Router?
image data
debug Debugging functions
(see also 'undebug')
disable Turn off privileged
commands
disconnect Disconnect an
existing network connection
enable Turn on privileged
commands
erase Erase flash or
configuration memory
exit Exit from the EXEC
help Description of the
interactive help system
lock Lock the terminal
login Log in as a particular
359
user
logout Exit from the EXEC
mrinfo Request neighbor and
version information from a
multicast router
mstat Show statistics after
multiple multicast traceroutes
mtrace Trace reverse multicast
path from destination to
source
name-connection Name an
existing network connection
no Disable debugging
functions
pad Open a X.29 PAD
connection
ping Send echo messages
ppp Start IETF Point-to-Point
Protocol (PPP)
--More--
ﻳﻚ ﻧﻤﻮﻧﻪ ﻣﺜﺎﻝ ) ﺗﻨﻈﻴﻢ ﺳﺎﻋﺖ، ﺑﺮﺍﻱ ﺁﺷﻨﺎﺋﻲ ﺑﺎ ﻧﺤﻮﻩ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺑﺨﺶ ﺭﺍﺑﻂ ﻛﺎﺭﺑﺮ ﺭﻭﺗﺮ
: ﺭﻭﺗﺮ ( ﺭﺍ ﺑﺎ ﻫﻢ ﺩﻧﺒﺎﻝ ﻣﻲ ﻧﻤﺎﺋﻴﻢ
ﺗﺎﻳﭗ ﻋﻼﻣﺖ "?" ﺑﻪ ﻣﻨﻈﻮﺭ ﺁﮔﺎﻫﻲ ﺍﺯ ﺩﺳﺘﻮﺭﺍﺕ ﻣﻮﺟﻮﺩ ) ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ: ﻣﺮﺣﻠﻪ ﺍﻭﻝ •
( clock ﺩﺳﺘﻮﺭ
ﺑﺮﺭﺳﻲ ﮔﺮﺍﻣﺮ ﺩﺳﺘﻮﺭ ﻭ ﺍﻳﻦ ﻛﻪ ﺯﻣﺎﻥ ﺭﺍ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺎ ﭼﻪ ﻓﺮﻣﺘﻲ ﻭﺍﺭﺩ: ﻣﺮﺣﻠﻪ ﺩﻭﻡ •
. ﻧﻤﻮﺩ
ﺑﻪ ﺷﻤﺎ ﺍﻋﻼﻡ ﻣﻲ ﮔﺮﺩﺩ ﻛﻪ ﺑﻪ، ﺩﻗﻴﻘﻪ ﻭ ﺛﺎﻧﻴﻪ، ﭘﺲ ﺍﺯ ﺗﺎﻳﭗ ﺳﺎﻋﺖ: ﻣﺮﺣﻠﻪ ﺳﻮﻡ •
360
ﻣﺮﺣﻠﻪ ﭼﻬﺎﺭﻡ :ﺑﺎ ﻓﺸﺮﺩﻥ ﻛﻠﻴﺪﻫﺎﻱ ctrl-Pﻭ ﻳﺎ )ﻛﻠﻴﺪ ( up arrowﺩﺳﺘﻮﺭ •
ﺗﺎﻳﭗ ﺷﺪﻩ ﻗﺒﻠﻲ ﺗﻜﺮﺍﺭ ﻭ ﺑﺎ ﺍﺿﺎﻓﻪ ﻧﻤﻮﺩﻥ ﻋﻼﻣﺖ ﺳﻮﺍﻝ ﺑﻪ ﺍﻧﺘﻬﺎﻱ ﺁﻥ ،ﻭﺿﻌﻴﺖ
ﺁﺭﮔﻮﻣﺎﻥ ﻫﺎﻱ ﺍﺿﺎﻓﻲ ﺁﻥ ﻣﺸﺨﺺ ﻣﻲ ﮔﺮﺩﺩ.
ﻣﺮﺣﻠﻪ ﭘﻨﺠﻢ :ﺑﺎ ﻣﺸﺎﻫﺪﻩ ﻋﻼﻣﺖ "^" ﻭ ﭘﺎﺳﺦ ﺳﻴﺴﺘﻢ ،ﺷﺎﻫﺪ ﺑﺮﻭﺯ ﻳﻚ ﺧﻄﺎﺀ •
ﺧﻮﺍﻫﻴﻢ ﺑﻮﺩ .ﻣﺤﻞ ﻋﻼﻣﺖ "^" ،ﻣﻜﺎﻥ ﺍﺣﺘﻤﺎﻟﻲ ﺑﺮﻭﺯ ﺧﻄﺎﺀ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ .ﺑﺮﺍﻱ
ﺗﺎﻳﭗ ﺻﺤﻴﺢ ﺩﺳﺘﻮﺭ ،ﻣﺠﺪﺩﺍ" ﺩﺳﺘﻮﺭ ﺭﺍ ﺗﺎ ﻣﺤﻠﻲ ﻛﻪ ﻋﻼﻣﺖ "^" ﻣﺸﺨﺺ ﻧﻤﻮﺩﻩ
ﺗﺎﻳﭗ ﻛﺮﺩﻩ ﻭ ﺳﭙﺲ ﺍﺯ ﻋﻼﻣﺖ "?" ﺑﺮﺍﻱ ﺁﮔﺎﻫﻲ ﺍﺯ ﮔﺮﺍﻣﺮ ﻣﺮﺑﻮﻃﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﺋﻴﻢ
.
ﻣﺮﺣﻠﻪ ﺷﺸﻢ :ﭘﺲ ﺍﺯ ﺩﺭﺝ ﺳﺎﻋﺖ ،ﺩﻗﻴﻘﻪ ﻭ ﺛﺎﻧﻴﻪ ﺑﺮ ﺍﺳﺎﺱ ﻓﺮﻣﺖ ﺩﺭﺧﻮﺍﺳﺘﻲ ،ﺩﺭ •
ﺍﺩﺍﻣﻪ ﺳﺎﻝ ﺭﺍ ﻧﻴﺰ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻓﺮﻣﺖ ﻣﻮﺭﺩ ﻧﻈﺮ ﻭﺍﺭﺩ ﻣﻲ ﻧﻤﺎﺋﻴﻢ .
Router>enable
?Router#cl
clear clock
? Router#clock
set Set the time and date
? Router#clock set
hh:mm:ss Current Time
361
ﺩﺳﺘﻮﺭﺍﺕ ﺍﺿﺎﻓﻲ ﻭﻳﺮﺍﻳﺶ
ﺑﺨﺶ ﺭﺍﺑﻂ ﻛﺎﺭﺑﺮ ﺭﻭﺗﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻣﺠﺪﺩ ﺍﺯ ﺩﺳﺘﻮﺭﺍﺕ ﺗﺎﻳﭗ ﺷﺪﻩ ،ﺁﻧﺎﻥ ﺭﺍ ﺩﺭ
ﻳﻚ ﺑﺎﻓﺮ ﻭ ﺑﺎ ﻇﺮﻓﻴﺖ ﻣﺤﺪﻭﺩ ﻧﮕﻬﺪﺍﺭﻱ ﻣﻲ ﻧﻤﺎﻳﺪ ) ﺳﻮﺍﺑﻖ ﻭ ﻳﺎ ﺗﺎﺭﻳﺨﭽﻪ ﺩﺳﺘﻮﺭﺍﺕ ( .ﺑﺎ
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺍﻣﻜﺎﻧﺎﺕ ﻣﻮﺟﻮﺩ ﻣﻲ ﺗﻮﺍﻥ ﻋﻤﻠﻴﺎﺕ ﺯﻳﺮ ﺭﺍ ﺩﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﻮﺍﺑﻖ ﺩﺳﺘﻮﺭﺍﺕ ﺍﻧﺠﺎﻡ
ﺩﺍﺩ:
ﺳﻮﺍﺑﻖ ﺩﺳﺘﻮﺭﺍﺕ ﺑﻪ ﺻﻮﺭﺕ ﭘﻴﺶ ﻓﺮﺽ ﻓﻌﺎﻝ ﻣﻲ ﮔﺮﺩﺩ ﻭ ﻗﺎﺩﺭ ﺑﻪ ﺫﺧﻴﺮﻩ ﺣﺪﺍﻛﺜﺮ ﺩﻩ ﺧﻂ
ﺩﺳﺘﻮﺭ ﺩﺭ ﺑﺎﻓﺮ ﻣﺮﺑﻮﻃﻪ ﻣﻲ ﺑﺎﺷﺪ .ﺑﺮﺍﻱ ﺗﻐﻴﻴﺮ ﺗﻌﺪﺍﺩ ﺩﺳﺘﻮﺭﺍﺗﻲ ﻛﻪ ﻣﻲ ﺗﻮﺍﻥ ﺁﻧﺎﻥ ﺭﺍ ﺩﺭ ﻟﻴﺴﺖ
ﺳﻮﺍﺑﻖ ﻧﮕﻬﺪﺍﺭﻱ ﻧﻤﻮﺩ ،ﺍﺯ ﺩﺳﺘﻮﺭ terminal history sizeﻭ ﻳﺎ history size
362
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺣﺪﺍﻛﺜﺮ ٢٥٦ﺩﺳﺘﻮﺭ ﺭﺍ ﻣﻲ ﺗﻮﺍﻥ ﺩﺭ ﻟﻴﺴﺖ ﺳﻮﺍﺑﻖ ﻧﮕﻬﺪﺍﺭﻱ ﻧﻤﻮﺩ.
ﺑﺮﺍﻱ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺩﺳﺘﻮﺭﺍﺕ ﺗﺎﻳﭗ ﺷﺪﻩ ،ﺍﺯ ﻛﻠﻴﺪﻫﺎﻱ Ctrl-Pﻭ ﻳﺎ ﻛﻠﻴﺪ arrow Up
) ﺣﺮﻛﺖ ﺑﻪ ﺳﻤﺖ ﺍﺑﺘﺪﺍﻱ ﻟﻴﺴﺖ ( ﻭ ﻛﻠﻴﺪﻫﺎﻱ Ctrl-Nﻭ ﻳﺎ ) down arrowﺣﺮﻛﺖ
ﺑﻪ ﺳﻤﺖ ﭘﺎﺋﻴﻦ ﻟﻴﺴﺖ ( ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
363
ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ
ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﻳﮑﻲ ﺍﺯ ﭼﻨﺪﻳﻦ ﺭﻭﺵ ﻣﻮﺟﻮﺩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﭼﻨﺪ
ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻴﮑﺪﻳﮕﺮ ﻭ ﺍﻳﺠﺎﺩ ﻳﮏ ﺷﺒﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺳﺖ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻓﻮﻕ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ
ﺍﻃﻼﻋﺎﺕ ﺑﻴﻦ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺍﺯ ﺍﻣﻮﺍﺝ ﺭﺍﺩﻳﻮﺋﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ.
ﻣﺒﺎﻧﻲ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ
ﺗﮑﻨﻮﻟﻮﮊﻱ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﺍﺯ ﺍﻳﺪﻩ" ﺿﺮﻭﺭﺗﻲ ﺑﻪ ﮐﺎﺑﻞ ﻫﺎ ﻱ ﺟﺪﻳﺪ
ﻧﻤﻲ ﺑﺎﺷﺪ" ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ،ﺗﻤﺎﻡ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﻴﮕﻨﺎﻝ
ﻫﺎﺋﻲ ﺭﺍﺩﻳﻮﺋﻲ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﻧﺘﺸﺎﺭ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺮﺍﻱ ﻳﮑﺪﻳﮕﺮ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺍﻳﻦ ﻧﻮﻉ
ﺷﺒﮑﻪ ﻫﺎ ﺩﺍﺭﺍﻱ ﺳﺎﺧﺘﺎﺭﻱ ﺳﺎﺩﻩ ﺑﻮﺩﻩ ﻭ ﺑﺮﺍﺣﺘﻲ ﻣﻲ ﺗﻮﺍﻥ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺘﺼﻞ ﺑﻪ ﺍﻳﻦ ﻧﻮﻉ ﺍﺯ
ﺷﺒﮑﻪ ﻫﺎ ﺭﺍ ﻣﮑﺎﻥ ﻫﺎﻱ ﺩﻳﮕﺮ ﺍﺳﺘﻘﺮﺍﺭ ﻭ ﮐﻤﺎﮐﻦ ﺍﺯ ﺍﻣﮑﺎﻧﺎﺕ ﺷﺒﮑﻪ ﺑﻬﺮﻩ ﻣﻨﺪ ﮔﺮﺩﻳﺪ ﻣﺜﻼ" ﺩﺭ
ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ﺭﺍ ﺩﺭ ﻳﮏ ﻓﻀﺎﻱ ﮐﻮﭼﮏ ﻧﻈﻴﺮ ﻳﮏ ﺳﺎﺧﺘﻤﺎﻥ ﺍﺩﺍﺭﻱ ﺍﻳﺠﺎﺩ
ﮐﺮﺩﻩ ﺑﺎﺷﻴﻢ ﻭ ﺩﺍﺭﺍﻱ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ laptopﺑﺎﺷﻴﻢ ﮐﻪ ﺍﺯ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﻣﺨﺼﻮﺹ ﺑﺪﻭﻥ
ﮐﺎﺑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﺩﺭ ﻫﺮ ﻣﮑﺎﻧﻲ ﺍﺯ ﺍﺩﺍﺭﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﮐﻪ ﻣﺴﺘﻘﺮ ﺷﺪﻩ ﺑﺎﺷﻴﻢ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ
Laptopﻣﻲ ﺗﻮﺍﻥ ﺑﺴﺎﺩﮔﻲ ﺑﻪ ﺷﺒﮑﻪ ﻣﺘﺼﻞ ﻭ ﺍﺯ ﺍﻣﮑﺎﻧﺎﺕ ﻣﺮﺑﻮﻃﻪ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ.
ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺯ ﻧﻘﻈﻪ ﻧﻈﺮ ﻧﻮﻉ ﺧﺪﻣﺎﺕ ﻭﺳﺮﻭﻳﺲ ﺩﻫﻲ ﺑﻪ ﺩﻭ ﮔﺮﻭﻩ :ﻧﻈﻴﺮ ﺑﻪ ﻧﻈﻴﺮ
ﻭ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ /ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻧﻘﺴﻴﻢ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﻧﻈﻴﺮ ﺑﻪ ﻧﻈﻴﺮ ﻫﺮ
ﮐﺎﻣﭙﻴﻮﺗﺮ ﻗﺎﺩﺭ ﺑﻪ ﺍﻳﻔﺎﻱ ﻭﻇﻴﻔﻪ ﺩﺭ ﺩﻭ ﻧﻘﺶ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻭ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﺩﺭ ﻫﺮ
ﻟﺤﻈﻪ ﺍﺳﺖ .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ /ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ،ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺻﺮﻓﺎ"
ﻣﻲ ﺗﻮﺍﻧﺪ ﻳﮏ ﻧﻘﺶ ﺭﺍ ﺑﺎﺯﻱ ﻧﻤﺎﻳﺪ ) .ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ﻳﺎ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ( .ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ
ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﮐﻪ ﺑﺼﻮﺭﺕ ﻧﻈﻴﺮ ﺑﻪ ﻧﻈﻴﺮ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻣﻲ ﮔﺮﺩﻧﻨﺪ ،ﻫﺮ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺗﺒﺎﻁ
ﻣﺴﺘﻘﻴﻢ ﺑﺎ ﻫﺮ ﻳﮏ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﺷﺒﮑﻪ ﺍﺳﺖ .ﺑﺮﺧﻲ ﺩﻳﮕﺮ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ
ﮐﺎﺑﻞ ﺑﺼﻮﺭﺕ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ /ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ،ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ
ﺩﺍﺭﺍﻱ ﻳﮏ Access pointﻣﻲ ﺑﺎﺷﻨﺪ.
364
ﺩﺳﺘﮕﺎﻩ ﻓﻮﻕ ﻳﮏ ﮐﻨﺘﺮﻝ ﮐﻨﻨﺪﻩ ﮐﺎﺑﻠﻲ ﺑﻮﺩﻩ ﻭ ﻗﺎﺩﺭ ﺑﻪ ﺩﺭﻳﺎﻓﺖ ﻭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﻪ
ﺁﺩﺍﭘﺘﻮﺭﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ )ﮐﺎﺭﺕ ﻫﺎﻱ ﺷﺒﮑﻪ ﺑﺪﻭﻥ ﮐﺎﺑﻞ( ﻧﺼﺐ ﺷﺪﻩ ﺩﺭ ﻫﺮ ﻳﮏ ﺍﺯ
ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﻣﻲ ﺑﺎﺷﻨﺪ.
ﭼﻬﺎﺭ ﻧﻮﻉ ﻣﺘﻔﺎﻭﺕ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﻭﺟﻮﺩ ﺩﺍﺭﺩ )ﺍﺯ ﮐﻨﺪ ﻭ ﺍﺭﺯﺍﻥ ﺗﺎ ﺳﺮﻳﻊ ﻭﮔﺮﺍﻥ (
BlueTooth •
IrDA •
(SWAP(HomeRF •
(Wi-Fi(WECA •
ﺷﺒﮑﻪ ﻫﺎﻱ Bluetoothﺩﺭ ﺣﺎﻝ ﺣﺎﺿﺮ ﻋﻤﻮﻣﻴﺖ ﻧﺪﺍﺷﺘﻪ ﻭ ﺑﻨﻈﺮ ﻗﺎﺩﺭ ﺑﻪ ﭘﺎﺳﺨﮕﻮﺋﻲ ﺑﻪ
ﮐﺎﺭﺑﺮﺍﻥ ﺑﺮﺍﻱ ﺷﺒﮑﻪ ﻫﺎ ﻱ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ﻧﻤﻲ ﺑﺎﺷﻨﺪInfrared Data(IrDA .
(Associationﺍﺳﺘﺎﻧﺪﺍﺭﺩﻱ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺩﺳﺘﮕﺎﻫﻬﺎﺋﻲ ﺍﺳﺖ ﮐﻪ ﺍﺯ ﺳﻴﮕﻨﺎﻝ ﻫﺎ ﻱ
ﻧﻮﺭﻱ ﻣﺎﺩﻭﻥ ﻗﺮﻣﺰ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻓﻮﻕ ﻧﺤﻮﻩ ﻋﻤﻠﻴﺎﺕ ﮐﻨﺘﺮﻝ ﺍﺯ ﺭﺍﻩ ﺩﻭﺭ،
) ﺗﻮﻟﻴﺪ ﺷﺪﻩ ﺗﻮﺳﻂ ﻳﮏ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ ﺧﺎﺹ( ﻭ ﻳﮏ ﺩﺳﺘﮕﺎﻩ ﺭﺍﻩ ﺩﻭﺭ )ﺗﻮﻟﻴﺪ ﺷﺪﻩ ﺗﻮﺳﻂ
ﺗﻮﻟﻴـﺪ ﮐﻨﻨﺪﻩ ﺩﻳﮕﺮ( ﺭﺍ ﺗﺒﻴــﻦ ﻣﻲ ﮐﻨـــﺪ .ﺩﺳﺘــﮕﺎﻫﻬﺎﻱ IrDAﺍﺯ ﻧﻮﺭﻣﺎﺩﻭﻥ ﻗﺮﻣﺰ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﻗﺒﻞ ﺍﺯ ﺑﺮﺭﺳﻲ ﻣﺪﻝ ﻫﺎﻱ SWAPﻭ Wi-Fiﻻﺯﻡ ﺍﺳﺖ ﮐﻪ ﺩﺭ ﺍﺑﺘﺪﺍ ﺑﺎ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺍﻭﻟﻴﻪ ﺍﻱ
ﮐﻪ ﺩﻭ ﻣﺪ ﻝ ﻓﻮﻕ ﺑﺮ ﺍﺳﺎﺱ ﺁﻧﻬﺎ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﻧﺪ ،ﺑﻴﺸﺘﺮ ﺁﺷﻨﺎ ﺷﻮﻳﻢ .ﺍﻭﻟﻴﻦ ﻣﺸﺨﺼﺎﺕ ﺷﺒﮑﻪ
ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﺑﺪﻭ ﻥ ﮐﺎﺑﻞ ﺑﺎ ﻧﺎﻡ IEEE 802.11ﺗﻮﺳﻂ ﻣﻮﺳﺴﻪ IEEEﻋﺮﺿﻪ ﮔﺮﺩﻳﺪ .ﺩﺭ
ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻓﻮﻕ ﺩﻭ ﺭﻭﺵ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺩﺳﺘﮕﺎﻫﻬﺎ ﺑﺎ ﺳﺮﻋﺖ ﺩﻭ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ
ﻣﻄﺮﺡ ﺷﺪ .ﺩﻭ ﺭﻭﺵ ﻓﻮﻕ ﺑﺸﺮﺡ ﺯﻳﺮ ﻣﻲ ﺑﺎﺷﻨﺪ:
(spectrum Direct-sequence spread(DSSS •
365
، Spread Spectrumﺑﺪﻳﻦ ﻣﻌﻨﻲ ﺍﺳﺖ ﮐﻪ ﺩﺍﺩﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺮﺍﻱ ﺍﺭﺳﺎﻝ ﺑﻪ ﺑﺨﺶ ﻫﺎﻱ
ﮐﻮﭼﮑﺘﺮ ﺗﻘﺴﻴﻢ ﻭ ﻫﺮ ﻳﮏ ﺍﺯ ﺁﻧﻬﺎ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺮﮐﺎﻧﺲ ﻫﺎﻱ ﮔﺴﺴﺘﻪ ﻗﺎﺑﻞ ﺩﺳﺘﻴﺎﺑﻲ ﺩﺭ ﻫﺮ
ﺯﻣﺎﻥ ،ﺍﺭﺳﺎﻝ ﺧﻮﺍﻫﻨﺪ ﺷﺪ .ﺩﺳﺘﮕﺎﻫﻬﺎﺋﻲ ﮐﻪ ﺍﺯ DSSSﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﻫﺮ ﺑﺎﻳﺖ ﺩﺍﺩﻩ
ﺭﺍ ﺑﻪ ﭼﻨﺪﻳﻦ ﺑﺨﺶ ﻣﺠﺰﺍ ﺗﻘﺴﻴﻢ ﻭ ﺁﻧﻬﺎ ﺭﺍ ﺑﺼﻮﺭﺕ ﻫﻤﺰﻣﺎﻥ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺮﮐﺎﻧﺲ ﻫﺎﻱ
ﻣﺘﻔﺎﻭﺕ ،ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﻧﺪ.
DSSSﺍﺯ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺑﺴﻴﺎﺭ ﺑﺎﻻﺋﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ ) ﺗﻘﺮﻳﺒﺎ" ٢٢ﻣﮕﺎﻫﺮﺗﺰ( ﺩﺳﺘﮕﺎﻫﻬﺎﺋﻲ
ﮐﻪ ﺍﺯ FHSSﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﺩﺭﻳﮏ ﺯﻣﺎﻥ ﭘﻴﻮﺳﺘﻪ ﮐﻮﺗﺎﻩ ،ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﺩﺍﺩﻩ ﮐﺮﺩﻩ ﻭ
ﺑﺎ ﺷﻴﻔﺖ ﺩﺍﺩﻥ ﻓﺮﮐﺎﻧﺲ ) (hopﺑﺨﺶ ﺩﻳﮕﺮﻱ ﺍﺯ ﺍﻃﻼﻋﺎﺕ ﺭﺍ ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺑﺎ ﺗﻮﺟﻪ
ﺑﻪ ﺍﻳﻨﮑﻪ ﻫﺮ ﻳﮏ ﺍﺯ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ FHSSﮐﻪ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻣﺮﺗﺒﻂ ﻣﻲ ﮔﺮﺩﻧﺪ ،ﺑﺮ ﺍﺳﺎﺱ
ﻓﺮﮐﺎﻧﺲ ﻣﺮﺑﻮﻃﻪ ﺍﻱ ﮐﻪ ﻣﻲ ﺑﺎﻳﺴﺖ Hopﻧﻤﺎﻳﻨﺪ ﻭ ﺍﺯ ﻫﺮ ﻓﺮﮐﺎﻧﺲ ﺩﺭ ﻳﮏ ﺑﺎﺯﻩ ﺯﻣﺎﻧﻲ
ﺑﺴﻴﺎﺭ ﮐﻮﺗﺎﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ)ﺣﺪﻭﺩﺍ" ٤٠٠ﻣﻴﻠﻲ ﺛﺎﻧﻴﻪ( ،ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﭼﻨﺪﻳﻦ
ﺷﺒﮑﻪ FHSSﺩﺭ ﻳﮏ ﻣﺤﻴﻂ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ)ﺑﺪﻭﻥ ﺍﺛﺮﺍﺕ ﺟﺎﻧﺒﻲ( .ﺩﺳﺘﮕﺎﻫﻬﺎﻱ FHSSﺻﺮﻓﺎ"
ﺩﺍﺭﺍﻱ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻳﮏ ﻣﮕﺎﻫﺮﺗﺰ ﻭ ﻳﺎ ﮐﻤﺘﺮ ﻣﻲ ﺑﺎﺷﻨﺪ.
HomeRFﻭ SWAP
، HomeRFﺍﺗﺤﺎﺩﻳﻪ ﺍﻱ ﺍﺳﺖ ﮐﻪ ﺍﺳﺘﺎﻧﺪﺍﺭﻱ ﺑﺎ ﻧﺎﻡ Shared Wireless (SWAP
(Access protocolﺭﺍ ﺍﻳﺠﺎﺩ ﻧﻤﻮﺩﻩ ﺍﺳﺖ SWAP .ﺩﺍﺭﺍﻱ ﺷﺶ ﮐﺎﻧﺎﻝ ﺻﻮﺗﻲ ﻣﺘﻔﺎﻭﺕ
ﺑﺮ ﺍﺳﺎﺱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ DECTﻭ ٨٠٢,١١ﺍﺳﺖ .ﺩﺳﺘﮕﺎﻫﻬﺎﻱ SWAPﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ hop ٥٠
ﺍﻳﺠﺎﺩ ﻭ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﻳﮏ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺑﺮﺧﻲ ﺍﺯ ﻣﺪﻝ ﻫﺎ
ﻣﻴﺰﺍﻥ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺗﺎ ﺩﻭ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﻫﻢ ﻣﻲ ﺭﺳﺪ ، .ﺗﻮﺍﻧﺎﺋﻲ ﻓﻮﻕ ﺍﺭﺗﺒﺎﻁ ﻣﺴﺘﻘﻴﻢ
ﺑﻪ ﺗﻌﺪﺍﺩ ﺍﻳﻨﺘﺮﻓﻴﺲ ﻫﺎﻱ ﻣﻮﺟﻮﺩ ﺩﺭ ﻣﺠﻴﻂ ﻋﻤﻠﻴﺎﺗﻲ ﺩﺍﺭﺩ .ﻣﺰﺍﻳﺎﻱ SWAPﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ:
ﻗﻴﻤﺖ ﻣﻨﺎﺳﺐ •
366
ﺩﺍﺭﺍﻱ Access pointﻧﻴﺴﺖ •
ﺍﻣﮑﺎﻥ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﻤﻦ ﺳﺎﺯﻱ ﺩﺍﺩﻩ ﻫﺎ ﻭﺟﻮﺩ ﺩﺍﺭﺩ. •
ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺩﺍﺭﺍﻱ ﻓﻠﺰ ﻭ ﻳﺎ ﻭﺟﻮﺩ ﺩﻳﻮﺍﺭ ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﺎﻋﺚ ﺍﻓﺖ ﺍﺭﺗﺒﺎﻃﺎﺕ ﺷﻮﺩ. •
ﺗﺮﺍﺗﺴﻴﻮﺭ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﻭﺍﻗﻌﻲ ﺑﻬﻤﺮﺍﻩ ﻳﮏ ﺁﻧﺘﻦ ﮐﻮﭼﮏ ﺩﺭ ﻳﮏ ﮐﺎﺭﺕ PCI , ISAﻭ ﻳﺎ
PCMCIAﺍﻳﺠﺎﺩ) ﺳﺎﺧﺘﻪ ( ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﺯ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ Laptopﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﺷﻮﺩ ،ﮐﺎﺭﺕ PCMCIAﺑﺼﻮﺭﺕ ﻣﺴﺘﻘﻴﻢ ﺑﻪ ﻳﮑﻲ ﺍﺯ ﺍﺳﻼﺕ ﻫﺎﻱ PCMCIAﻣﺘﺼﻞ
ﺧﻮﺍﻫﺪ ﺷﺪ .ﺩﺭ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﻱ ﺷﺨﺼﻲ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﻳﮏ ﮐﺎﺭﺕ ﺍﺧﺘﺼﺎﺻﻲ ، ISAﮐﺎﺭﺕ
HomeRF PCIﻭ ﻳﺎ ﻳﮏ ﮐﺎﺭﺕ PCMCIAﺑﻬﻤﺮﺍﻩ ﻳﮏ ﺁﺩﺍﭘﺘﻮﺭ ﻣﺨﺼﻮﺹ ،ﺍﺳﺘﻔﺎﺩﻩ
ﮐﺮﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺿﺮﻭﺭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮐﺎﺭﺕ ﻫﺎﻱ ﺍﺧﺘﺼﺎﺻﻲ ،ﺻﺮﻓﺎ" ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺭﺍ ﻣﻲ ﺗﻮﺍﻥ
ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ SWAPﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ .ﭼﺎﭘﮕﺮﻫﺎ ﻭ ﺳﺎﻳﺮ ﻭﺳﺎﺋﻞ ﺟﺎﻧﺒﻲ ﻣﻲ ﺑﺎﻳﺴﺖ ﻣﺴﺘﻘﻴﻤﺎ"
ﺑﻪ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺘﺼﻞ ﻭ ﺗﻮﺳﻂ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﮏ ﻣﻨﺒﻊ ﺍﺷﺘﺮﺍﮐﻲ ﻣﻮﺭﺩ
ﺍﺳﺘﻔﺎﺩﻩ ﻗﺮﺍﺭ ﮔﻴﺮﻧﺪ.
ﺍﮐﺜﺮ ﺷﺒﮑﻪ ﻫﺎﻱ SWAPﺑﺼﻮﺭﺕ "ﻧﻈﻴﺮ ﺑﻪ ﻧﻈﻴﺮ" ﻣﻲ ﺑﺎﺷﻨﺪ .ﺑﺮﺧﻲ ﺍﺯ ﺗﻮﻟﻴﺪﮐﻨﻨﺪﮔﺎﻥ ﺍﺧﻴﺮﺍ"
ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻓﺰﺍﻳﺶ ﺩﺍﻣﻨﻪ ﺗﺎﺛﻴﺮ ﭘﺬﻳﺮﻱ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ Access point ،ﻫﺎﺋﻲ ﺭﺍ
ﺑﻪ ﺑﺎﺯﺍﺭ ﻋﺮﺿﻪ ﻧﻤﻮﺩﻩ ﺍﻧﺪ .ﺷﺒﮑﻪ ﻫﺎﻱ HomeRfﻧﺴﺒﺖ ﺑﻪ ﺳﺎﻳﺮ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ،
ﺩﺍﺭﺍﻱ ﻗﻴﻤﺖ ﻣﻨﺎﺳﺐ ﺗﺮﻱ ﻣﻲ ﺑﺎﺷﻨﺪ.
367
WECAﻭ Wi-Fi
(Alliance Wireless Ethernet Compatibility(WECAﺭﻭﻳﮑﺮﺩ ﺟﺪﻳﺪﻱ ﺭﺍ
ﻧﺴﺒﺖ ﺑﻪ HomeRFﺍﺭﺍﺋﻪ ﻧﻤﻮﺩﻩ ﺍﺳﺖ ، Wi-Fi .ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻱ ﺍﺳﺖ ﮐﻪ ﺑﻪ ﺗﻤﺎﻡ
ﺗﻮﻟﻴﺪﮐﻨﻨﺪﮔﺎﻥ ﺑﺮﺍﻱ ﺗﻮﻟﻴﺪ ﻣﺤﺼﻮﻻﺕ ﻣﺒﺘﻲ ﺑﺮ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ٨٠٢,١١ IEEEﺗﺎﮐﻴﺪ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﻣﺸﺨﺼﺎﺕ ﻓﻮﻕ FHSSﺭﺍ ﺣﺬﻑ ﻭ ﺗﺎﮐﻴﺪ ﺑﺮ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ DSSSﺩﺍﺭﺩ ) .ﺑﺪﻟﻴﻞ ﻇﺮﻓﻴﺖ ﺑﺎﻻ
ﺩﺭ ﻧﺮﺥ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ( .ﺑﺮ ﺍﺳﺎﺱ ، IEEE 802.11bﻫﺮ ﺩﺳﺘﮕﺎﻩ ﻗﺎﺩﺭ ﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ
ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﺳﺮﻋﺖ ﻳﺎﺯﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺍﺳﺖ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺳﺮﻋﺖ ﻓﻮﻕ ﭘﺎﺳﺨﮕﻮ ﻧﺒﺎﺷﺪ
،ﺑﺘﺪﺭﻳﺞ ﺳﺮﻋﺖ ﺑﻪ ٥/٥ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ،ﺩﻭ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﻭ ﻧﻬﺎﻳﺘﺎ" ﺑﻪ ﻳﮏ ﻣﮕﺎﺑﻴﺖ ﺩﺭ
ﺛﺎﻧﻴﻪ ﺗﻨﺰﻝ ﭘﻴﺪﺍ ﺧﻮﺍﻫﺪ ﮐﺮﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﺷﺒﮑﻪ ﺍﺯ ﺻﻼﺑﺖ ﻭ ﺍﻋﺘﻤﺎﺩ ﺑﻴﺸﺘﺮﻱ ﺑﺮﺧﻮﺭﺩﺍﺭ
ﺧﻮﺍﻫﺪ ﺑﻮﺩ.
ﻣﺰﺍﻳﺎﻱ Wi-Fiﻋﺒﺎﺭﺗﻨﺪ ﺍﺯ :
ﺳﺮﻋﺖ ﺑﺎﻻ )ﻳﺎﺯﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ( •
ﺩﺍﺭﺍﻱ ﺩﺍﻣﻨﻪ ﺑﺎﻻﺋﻲ ﻣﻲ ﺑﺎﺷﻨﺪ ) ١,٠٠٠ﻓﻮﺕ ﻳﺎ ٣٠٥ﻣﺘﺮ ﺩﺭ ﻗﻀﺎﻱ ﺑﺎﺯ ﻭ ٢٥٠ﺗﺎ ٤٠٠ •
Wi-Fiﺳﺮﻋﺖ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﺭﺍ ﺑﺪﻭﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮐﺎﺑﻞ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﻗﺮﺍﺭ ﻣﻲ ﺩﻫﺪ .ﮐﺎﺭﺕ
ﻫﺎﻱ ﺳﺎﺯﮔﺎﺭ ﺑﺎ Wi-Fiﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ " ﻧﻈﻴﺮ ﺑﻪ ﻧﻈﻴﺮ " ﻭﺟﻮﺩ ﺩﺍﺭﺩ ،ﻭﻟﻲ
ﻣﻌﻤﻮﻻ" Wi-Fiﺑﻪ Access Pointﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﺍﻏﻠﺐ Access pointﻫﺎ
368
ﺩﺍﺭﺍﻱ ﻳﮏ ﺍﻳﻨﺘﺮﻓﻴﺲ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﺑﻪ ﻳﮏ ﺷﺒﮑﻪ ﮐﺎﺑﻠﻲ ﺍﺗﺮﻧﺖ ﻧﻴﺰ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺍﮐﺜﺮ
ﺗﺮﺍﻧﺴﻴﻮﺭﻫﺎﻱ Wi-Fiﺑﺼﻮﺭﺕ ﮐﺎﺭﺕ ﻫﺎﻱ PCMCIAﻋﺮﺿﻪ ﺷﺪﻩ ﺍﻧﺪ .ﺑﺮﺧﻲ ﺍﺯ
ﺗﻮﻟﻴﺪﮐﻨﻨﺪﮔﺎﻥ ﮐﺎﺭﺕ ﻫﺎﻱ PCIﻭ ﻳﺎ ISAﺭﺍ ﻧﻴﺰ ﻋﺮﺿﻪ ﻧﻤﻮﺩﻩ ﺍﻧﺪ.
369
ﺍﻧﻮﺍﻉ ﺷﺒﮑﻪ ﻫﺎﻱ Wireless
ﻓﻮﻕ ،ﺍﻣﮑﺎﻥ ﺩﺳﺘﻴﺎﺑﻲ ﮐﺎﺭﺑﺮﺍﻥ ﺳﺎﮐﻦ ﺩﺭ ﻳﮏ ﻣﻨﻄﻘﻪ ﻣﺤﺪﻭﺩ ﻧﻈﻴﺮ ﻣﺤﻮﻃﻪ ﻳﮏ ﺩﺍﻧﺸﮕﺎﻩ
ﻭ ﻳﺎ ﮐﺘﺎﺑﺨﺎﻧﻪ ﺭﺍ ﺑﻪ ﺷﺒﮑﻪ ﻭ ﻳﺎ ﺍﻳﻨﺘﺮﻧﺖ ،ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ.
370
. Wireless Personal Area Networks :WPANSﺩﺭ ﺷﺒﮑﻪ •
ﻫﺎﻱ ﻓﻮﻕ ،ﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺩﺳﺘﮕﺎﻫﻬﺎﻱ ﺷﺨﺼﻲ )ﻧﻈﻴﺮ ( laptopﺩﺭ ﻳﮏ ﻧﺎﺣﻴﻪ
ﻣﺤﺪﻭﺩ )ﺣﺪﻭﺩ ٩١٤ﺳﺎﻧﺘﻲ ﻣﺘﺮ( ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ﺍﺯ ﺩﻭ
ﺗﮑﻨﻮﻟﻮﮊﻱ ﻣﺘﺪﺍﻭﻝ ( IR ) Infra Redﻭ ) ، IEEE 802.15 ) Bluetooth
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
. Wireless Metropolitan Area Networks :WMANSﺩﺭ •
ﺷﺒﮑﻪ ﻫﺎﻱ ﻓﻮﻕ ،ﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﭼﻨﺪﻳﻦ ﺷﺒﮑﻪ ﻣﻮﺟﻮﺩ ﺩﺭ ﻳﮏ ﺷﻬﺮ ﺑﺰﺭﮒ ﻓﺮﺍﻫﻢ
ﻣﻲ ﮔﺮﺩﺩ .ﺍﺯ ﺷﺒﮑﻪ ﻫﺎﻱ ﻓﻮﻕ ،ﺍﻏﻠﺐ ﺑﻪ ﻋﻨﻮﺍﻥ ﺷﺒﮑﻪ ﻫﺎﻱ backupﮐﺎﺑﻠﻲ )ﻣﺴﻲ
،ﻓﻴﺒﺮ ﻧﻮﺭﻱ( ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
. Wireless Wide Area Networks :WWANSﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ •
ﻓﻮﻕ ،ﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺷﻬﺮﻫﺎ ﻭ ﻳﺎ ﺣﺘﻲ ﮐﺸﻮﺭﻫﺎ ﻭ ﺍﺯ ﻃﺮﻳﻖ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻣﺎﻫﻮﺍﺭﻩ
ﺍﻱ ﻣﺘﻔﺎﻭﺕ ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ .ﺷﺒﮑﻪ ﻫﺎﻱ ﻓﻮﻕ ﺑﻪ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ) G٢ﻧﺴﻞ ﺩﻭﻡ(
ﻣﻌﺮﻭﻑ ﺷﺪﻩ ﺍﻧﺪ.
ﺍﻣﻨﻴﺖ
ﺑﺮﺍﻱ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺍﻣﻨﻴـﺖ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﺍﺯ ﺳﻪ ﺭﻭﺵ ﻣﺘﻔﺎﻭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ:
. Wired Equivalent Privacy : WEPﺩﺭ ﺭﻭﺵ ﻓﻮﻕ ،ﻫﺪﻑ •
ﺗﻮﻗﻒ ﺭﻩ ﮔﻴﺮﻱ ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﻓﺮﮐﺎﻧﺲ ﺭﺍﺩﻳﻮﺋﻲ ﺗﻮﺳﻂ ﮐﺎﺭﺑﺮﺍﻥ ﻏﻴﺮ ﻣﺠﺎﺯ ﺑﻮﺩﻩ ﻭ
ﺑﺮﺍﻱ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﻮﭼﮏ ﻣﻨﺎﺳﺐ ﺍﺳﺖ .ﻋﻠﺖ ﺍﻳﻦ ﺍﻣﺮ ﺑﻪ ﻋﺪﻡ ﻭﺟﻮﺩ ﭘﺮﻭﺗﮑﻞ ﺧﺎﺻﻲ
ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺪﻳﺮﻳﺖ "ﮐﻠﻴﺪ " ﺑﺮ ﻣﻲ ﮔﺮﺩﺩ .ﻫﺮ "ﮐﻠﻴﺪ " ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﻪ ﺻﻮﺭﺕ ﺩﺳﺘﻲ
ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ﺗﻌﺮﻳﻒ ﮔﺮﺩﺩ .ﺑﺪﻳﻬﻲ ﺍﺳﺖ ﺩﺭ ﺻﻮﺭﺕ ﺑﺰﺭﮒ ﺑﻮﺩﻥ ﺷﺒﮑﻪ،
ﻓﺮﺁﻳﻨﺪ ﻓﻮﻕ ﺍﺯ ﺟﻤﻠﻪ ﻋﻤﻠﻴﺎﺕ ﻭﻗﺖ ﮔﻴﺮ ﺑﺮﺍﻱ ﻫﺮ ﻣﺪﻳﺮ ﺷﺒﮑﻪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ،WEP .
ﻣﺒﺘﻨﻲ ﺑﺮ ﺍﻟﮕﻮﺭﻳﺘﻢ ﺭﻣﺰﻧﮕﺎﺭﻱ RC4ﺍﺳﺖ ﮐﻪ ﺗﻮﺳﻂ RSA Data Systemﺍﺭﺍﺋﻪ
ﺷﺪﻩ ﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﺗﻤﺎﻣﻲ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﮔﺎﻥ ﻭ Point Aceessﻫﺎ ﺑﮕﻮﻧﻪ ﺍﻱ
371
ﭘﻴﮑﺮﺑﻨﺪﻱ ﻣﻲ ﮔﺮﺩﻧﺪ ﮐﻪ ﺍﺯ ﻳﮏ ﮐﻠﻴﺪ ﻣﺸﺎﺑﻪ ﺑﺮﺍﻱ ﺭﻣﺰﻧﮕﺎﺭﻱ ﻭ ﺭﻣﺰﮔﺸﺎﺋﻲ ﺍﺳﺘﻔﺎﺩﻩ
ﻧﻤﺎﻳﻨﺪ.
.Service Set Identifier :SSIDﺭﻭﺵ ﻓﻮﻕ ﺑﻪ ﻣﻨﺰﻟﻪ ﻳﮏ "ﺭﻣﺰﻋﺒﻮﺭ" •
ﺑﻮﺩﻩ ﮐﻪ ﺍﻣﮑﺎﻥ ﺗﻘﺴﻴﻢ ﻳﮏ ﺷﺒﮑﻪ WLANﺑﻪ ﭼﻨﺪﻳﻦ ﺷﺒﮑﻪ ﻣﺘﻔﺎﻭﺕ ﺩﻳﮕﺮ ﮐﻪ ﻫﺮ
ﻳﮏ ﺩﺍﺭﺍﻱ ﻳﮏ ﺷﻨﺎﺳﻪ ﻣﻨﺤﺼﺮ ﺑﻔﺮﺩ ﻣﻲ ﺑﺎﺷﻨﺪ ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺷﻨﺎﺳﻪ ﻫﺎﻱ
ﻓﻮﻕ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺮﺍﻱ ﻫﺮ access pointﺗﻌﺮﻳﻒ ﮔﺮﺩﻧﺪ .ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺳﺮﻭﻳﺲ
ﮔﻴﺮﻧﺪﻩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻫﺮ ﺷﺒﮑﻪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﮕﻮﻧﻪ ﺍﻱ ﭘﮑﺮﺑﻨﺪﻱ ﮔﺮﺩﺩ ﮐﻪ
ﺩﺍﺭﺍﻱ ﺷﻨﺎﺳﻪ SSIDﻣﺮﺑﻮﻁ ﺑﻪ ﺷﺒﮑﻪ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺎﺷﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺷﻨﺎﺳﻪ
ﮐﺎﻣﭙﻴﻮﺗﺮ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺑﺎ ﺷﻨﺎﺳﻪ ﺷﺒﮑﻪ ﻣﻮﺭﺩ ﻧﻈﺮ ﻣﻄﺎﺑﻘﺖ ﻧﻤﺎﻳﺪ ،ﺍﻣﮑﺎﻥ ﺩﺳﺘﻴﺎﺑﻲ
ﺑﻪ ﺷﺒﮑﻪ ﺑﺮﺍﻱ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ.
ﻓﻴﻠﺘﺮﻳﻨﮓ ﺁﺩﺭﺱ ﻫﺎﻱ ) : Control Media Access ) MACﺩﺭ ﺭﻭﺵ •
372
ﭘﻴﮑﺮﺑﻨﺪﯼ ﻳﮏ ﺷﺒﮑﻪ Wireless
ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺑﻪ ﻣﻨﻈﻮﺭ ﭘﻴﮑﺮﺑﻨﺪﯼ ﻳﮏ ﺷﺒﮑﻪ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﺑﻪ ﺍﺑﻌﺎﺩ ﺷﺒﮑﻪ ﻣﻮﺭﺩ
ﻧﻈﺮ ﺑﺴﺘﮕﯽ ﺩﺍﺭﺩ .ﻋﻠﻴﺮﻏﻢ ﻣﻮﺿﻮﻉ ﻓﻮﻕ ،ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺷﺒﮑﻪ ﻫﺎ ﺍﻏﻠﺐ ﻭ ﺷﺎﻳﺪ ﻫﻢ ﻗﻄﻌﺎ" ﺑﻪ
ﻳﮏ access pointﻭ ﻳﮏ ﺍﻳﻨﺘﺮﻓﻴﺲ ﮐﺎﺭﺕ ﺷﺒﮑﻪ ﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺑﻮﺩ .ﺩﺭ ﺻﻮﺭﺗﯽ ﮐﻪ ﻗﺼﺪ
ﺍﻳﺠﺎﺩ ﻳﮏ ﺷﺒﮑﻪ ﻣﻮﻗﺖ ﺑﻴﻦ ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺭﺍ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ،ﺻﺮﻓﺎ" ﺑﻪ ﺩﻭ ﮐﺎﺭﺕ ﺷﺒــﮑﻪ ﺑﺪﻭﻥ
ﮐﺎﺑﻞ ﻧﻴﺎﺯ ﺧﻮﺍﻫﻴﺪ ﺩﺍﺷﺖ.
Access Pointﭼﻴﺴﺖ ؟
ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﻓﻮﻕ ،ﺑﻪ ﻋﻨﻮﺍﻥ ﻳﮏ ﭘﻞ ﺍﺭﺗﺒﺎﻃﯽ ﺑﻴﻦ ﺷﺒﮑﻪ ﻫﺎﯼ ﮐﺎﺑﻠﯽ ﻭ ﺩﺳﺘﮕﺎﻫﻬﺎﯼ
ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﻋﻤﻞ ﻣﯽ ﻧﻤﺎﻳﺪ .ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﻓﻮﻕ ،ﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﭼﻨﺪﻳﻦ ﺩﺳﺘﮕﺎﻩ
ﺑﻪ ﻣﻨﻈﻮﺭ ﺩﺳﺘﻴﺎﺑﯽ ﺑﻪ ﺷﺒﮑﻪ ﻓﺮﺍﻫﻢ ﻣﯽ ﮔﺮﺩﺩ point access.ﻣﯽ ﺗﻮﺍﻧﺪ ﺩﺍﺭﺍﯼ ﻋﻤﻠﮑﺮﺩﯼ
ﻣﺸﺎﺑﻪ ﻳﮏ ﺭﻭﺗﺮ ﻧﻴﺰ ﺑﺎﺷﺪ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﯼ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺩﺭ ﻣﺤﺪﻭﺩﻩ ﻭﺳﻴﻌﺘﺮﯼ ﺍﻧﺠﺎﻡ
ﺷﺪﻩ ﻭ ﺩﺍﺩﻩ ﺍﺯ ﻳﮏ point accessﺑﻪ access pointﺩﻳﮕﺮ ﺍﺭﺳﺎﻝ ﻣﯽ ﮔﺮﺩﺩ.
ﻳﮏ ﻧﻤﻮﻧﻪ ﺩﺳﺘﮕﺎﻩ access
point
373
ﺧﻮﺍﻫﻨﺪ ﺩﺍﺷﺖ .ﺁﻧﺘﻦ ﻫﺎﯼ ﻓﻮﻕ ﺑﺮ ﺭﻭﯼ ﺍﻏﻠﺐ ﺩﺳﺘﮕﺎﻫﻬﺎ ،ﺍﺧﺘﻴﺎﺭﯼ ﺑﻮﺩﻩ ﻭ ﺍﻓﺰﺍﻳﺶ ﺳﻴﮕﻨﺎﻝ
ﺑﺮ ﺭﻭﯼ ﮐﺎﺭﺕ ﺭﺍ ﺑﺪﻧﺒﺎﻝ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ.
374
ﭘﺲ ﺍﺯ ﺗﻬﻴﻪ ﺗﺠﻬﻴﺰﺍﺕ ﺳﺨﺖ ﺍﻓﺰﺍﺭﯼ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﻳﮏ ﺷﺒﮑﻪ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ،ﺩﺭ
ﺍﺩﺍﻣﻪ ﻣﯽ ﺑﺎﻳﺴﺖ ﺗﻤﺎﻣﯽ ﺗﺠﻬﻴﺰﺍﺕ ﺗﻬﻴﻪ ﺷﺪﻩ ﺭﺍ ﺑﺎ ﻫﺪﻑ ﺍﻳﺠﺎﺩ ﻭ ﺳﺎﺯﻣﺎﻧﺪﻫﯽ ﻳﮏ ﺷﺒﮑﻪ ﺑﻪ
ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﺗﺎ ﺍﻣﮑﺎﻥ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺁﻧﺎﻥ ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ .ﻗﺒﻞ ﺍﺯ ﻧﺼﺐ ﻭ ﭘﻴﮑﺮﺑﻨﺪﯼ ﻳﮏ ﺷﺒﮑﻪ
ﺑﺪﻭﻥ ﮐﺎﺑﻞ ،ﻻﺯﻡ ﺍﺳﺖ ﺑﻪ ﻣﻮﺍﺭﺩ ﺯﻳﺮ ﺩﻗﺖ ﻧﻤﺎﺋﻴﺪ:
ﺗﻬﻴﻪ ﺩﺭﺍﻳﻮﺭﻫﺎﯼ ﻣﺮﺑﻮﻃﻪ ﺍﺯ ﻓﺮﻭﺷﻨﺪﻩ ﺳﺨﺖ ﺍﻓﺰﺍﺭ ﻭ ﮐﺴﺐ ﺁﺧﺮﻳﻦ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ •
ﻧﻴﺎﺯ
ﻓﺎﺻﻠﻪ ﺑﻴﻦ ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﯽ ﺑﺎﻳﺴﺖ ﮐﻤﺘﺮ ﺍﺯ ﻳﮑﺼﺪ ﻣﺘﺮ ﺑﺎﺷﺪ. •
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺗﺠﻬﻴﺰﺍﺕ ﺳﺨﺖ ﺍﻓﺰﺍﺭﯼ ﻣﺮﺑﻮﻁ ﺑﻪ ﻳﮏ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﻩ ،ﺩﺍﺭﺍﯼ ﻣﺰﺍﻳﺎ ﻭ •
ﻣﻌﺎﻳﺒﯽ ﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﭘﻴﺸﻨﻬﺎﺩ ﻣﯽ ﮔﺮﺩﺩ ﻟﻴﺴﺘﯽ ﺍﺯ ﻭﻳﮋﮔﯽ ﻫﺎﯼ ﻫﺮ ﻳﮏ ﺍﺯ
ﺳﺨﺖ ﺍﻓﺰﺍﺭﻫﺎﯼ ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﻋﺮﺿﻪ ﺷﺪﻩ ﺗﻮﺳﻂ ﺗﻮﻟﻴﺪ ﮐﻨﻨﺪﮔﺎﻥ ﻣﺘﻌﺪﺩ ﺗﻬﻴﻪ ﺷﻮﺩ ﺗﺎ
ﺍﻣﮑﺎﻥ ﻣﻘﺎﻳﺴﻪ ﻭ ﺍﺧﺬ ﺗﺼﻤﻴﻢ ﻣﻨﺎﺳﺐ ،ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ.
ﻣﺮﺍﺣﻞ ﻻﺯﻡ ﺑﻪ ﻣﻨﻈﻮﺭ ﻧﺼﺐ ﻳﮏ ﺷﺒﮑﻪ ) ﻓﺮﺿﻴﺎﺕ :ﻣﺎ ﺩﺍﺭﺍﯼ ﻳﮏ ﺷﺒﮑﻪ ﮐﺎﺑﻠﯽ ﻣﻮﺟﻮﺩ
ﻫﺴﺘﻴﻢ ﻭ ﻗﺼﺪ ﭘﻴﺎﺩﻩ ﺳﺎﺯﯼ ﻳﮏ ﺷﺒﮑﻪ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺩﺳﺘﮕﺎﻫﻬﺎﯼ ﺑﺪﻭﻥ ﮐﺎﺑﻞ
ﺑﻪ ﺁﻥ ﺭﺍ ﺩﺍﺭﻳﻢ (:
ﺍﺗﺼﺎﻝ point accessﺑﻪ ﺑﺮﻕ ﻭ ﺳﻮﮐﺖ ﻣﺮﺑﻮﻁ ﺑﻪ ﺷﺒﮑﻪ ﺍﺗﺮﻧﺖ •
ﻣﺸﺎﻫﺪﻩ ﺁﻥ ﺗﻮﺳﻂ ﺷﺒﮑﻪ ﻣﻮﺟﻮﺩ ﻓﺮﺍﻫﻢ ﮔﺮﺩﺩ .ﻧﺤﻮﻩ ﭘﻴﮑﺮﺑﻨﺪﯼ point access
ﺑﺴﺘﮕﯽ ﺑﻪ ﻧﻮﻉ ﺁﻥ ﺩﺍﺭﺩ.
ﭘﻴﮑﺮﺑﻨﺪﯼ ﻣﻨﺎﺳﺐ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎﯼ ﺳﺮﻭﻳﺲ ﮔﻴﺮﻧﺪﻩ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺭﺗﺒﺎﻁ ﺑﺎ access •
375
ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻭ ﻣﻴﺰﺍﻥ ﺗﺎﺧﻴﺮ
ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺍﺯ ﺟﻤﻠﻪ ﻭﺍﮊﻩ ﻫﺎﻱ ﻣﺘﺪﺍﻭﻝ ﺩﺭ ﺩﻧﻴﺎﻱ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺳﺖ ﮐﻪ ﺑﻪ
ﻧﺮﺥ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﻩ ﺗﻮﺳﻂ ﻳﮏ ﺍﺗﺼﺎﻝ ﺷﺒﮑﻪ ﻭ ﻳﺎ ﻳﮏ ﺍﻳﻨﺘﺮﻓﻴﺲ ،ﺍﺷﺎﺭﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺍﻳﻦ ﻭﺍﮊﻩ ﺍﺯ
ﺭﺷﺘﻪ ﻣﻬﻨﺪﺳﻲ ﺑﺮﻕ ﺍﻗﺘﺒﺎﺱ ﺷﺪﻩ ﺍﺳﺖ .ﺩﺭ ﺍﻳﻦ ﺷﺎﺧﻪ ﺍﺯ ﻋﻠﻮﻡ ،ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻧﺸﺎﻥ ﺩﻫﻨﺪﻩ
ﻣﺠﻤﻮﻉ ﻓﺎﺻﻠﻪ ﻭ ﻳﺎ ﻣﺤﺪﻭﺩﻩ ﺑﻴﻦ ﺑﺎﻻﺗﺮﻳﻦ ﻭ ﭘﺎﺋﻴﻦ ﺗﺮﻳﻦ ﺳﻴﮕﻨﺎﻝ ﺑﺮ ﺭﻭﻱ ﮐﺎﻧﺎﻝ ﻫﺎﻱ
ﻣﺨﺎﺑﺮﺍﻧﻲ ) ﺑﺎﻧﺪ ( ،ﺍﺳﺖ .ﺑﻪ ﻣﻨﻈﻮﺭ ﺳـﻨﺠﺶ ﺍﻧﺪﺍﺯﻩ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺍﺯ ﻭﺍﺣﺪ " ﺗﻌـــﺪﺍﺩ ﺑﺎﻳﺖ
ﺩﺭﺛﺎﻧﻴﻪ " ﻭ ﻳﺎ bpsﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ.
ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺗﻨﻬﺎ ﻋﺎﻣﻞ ﺗﻌﻴﻴﻦ ﮐﻨﻨﺪﻩ ﺳﺮﻋﺖ ﻳﮏ ﺷﺒﮑﻪ ﺍﺯ ﺯﺍﻭﻳﻪ ﮐﺎﺭﺑﺮﺍﻥ ﻧﺒﻮﺩﻩ ﻭ ﻳﮑﻲ ﺩﻳﮕﺮ
ﺍﺯ ﻋﻨﺎﺻﺮ ﺗﺎﺛﻴﺮﮔﺬﺍﺭ" ،ﻣﻴﺰﺍﻥ ﺗﺎﺧﻴﺮ" ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺍﺳﺖ ﮐﻪ ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﺮﻧﺎﻣﻪ ﻫﺎﻱ ﻣﺘﻌﺪﺩﻱ
ﺭﺍ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﺍﺟﺮﺍﺀ ﻣﻲ ﮔﺮﺩﻧﺪ ،ﺗﺤﺖ ﺗﺎﺛﻴﺮ ﻗﺮﺍﺭ ﺩﻫﺪ.
376
ﺣﻤﺎﻳﺖ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪﻱ ﻣﻌﺎﺩﻝ Mbps١٠٠ﺍﺳﺖ ،ﻭﻟﻲ ﻋﻤﻼ" ﺍﻳﻦ ﻭﺿﻌﻴﺖ ﺩﺭ ﻋﻤﻞ ﻣﺤﻘﻖ
ﻧﺨﻮﺍﻫﺪ ﺷﺪ ) ﺗﻔﺎﻭﺕ ﻇﺮﻓﻴﺖ ﺗﺌﻮﺭﻱ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺑﺎ ﻇﺮﻓﻴﺖ ﻭﺍﻗﻌﻲ(.
377
ﺍﺳﺖ .ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻭﺍﻗﻌﻲ ﻣﺘﻐﻴﺮ ﺑﻮﺩﻩ ﻭ ﻣﻲ ﺗﻮﺍﻧﺪ ﻋﺎﻣﻞ ﺑﺮﻭﺯ ﺗﺎﺧﻴﺮ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ
ﮔﺮﺩﺩ .ﻭﺟﻮﺩ ﺗﺎﺧﻴﺮ ﺯﻳﺎﺩ ﺩﺭ ﭘﺮﺩﺍﺯﺵ ﺩﺍﺩﻩ ﺩﺭ ﺷﺒﮑﻪ ﻭ ﺩﺭ ﻳﮏ ﻣﺤﺪﻭﺩﻩ ﺯﻣﺎﻧﻲ ﮐﻮﺗﺎﻩ
ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﺎﻋﺚ ﺑﺮﻭﺯ ﻳﮏ ﺑﺤﺮﺍﻥ ﺩﺭ ﺷﺒﮑﻪ ﺷﺪﻩ ﻭ ﭘﻴﺎﻣﺪ ﺁﻥ ﭘﻴﺸﮕﻴﺮﻱ ﺍﺯ ﺣﺮﮐﺖ
ﺩﺍﺩﻩ ﺑﺮ ﺭﻭﻱ ﻣﺤﻴﻂ ﺍﻧﺘﻘﺎﻝ ﻭ ﮐﺎﻫﺶ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻮﺛﺮ ﺍﺯ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﺑﺎﺷﺪ.
378
ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻭ ﺗﺎﺧﻴﺮ ﺩﻭ ﻋﻨﺼﺮ ﺗﺎﺛﻴﺮ ﮔﺬﺍﺭ ﺩﺭ ﮐﺎﺭﺍﺋﻲ ﻳﮏ ﺷﺒﮑﻪ ﻣﻲ ﺑﺎﺷﻨﺪ .ﻣﻌﻤﻮﻻ" ﺍﺯ ﻭﺍﮊﻩ
) QoS ( Quality of Serviceﺑﻪ ﻣﻨﻈﻮﺭ ﻧﺸﺎﻥ ﺩﺍﺩﻥ ﻭﺿﻌﻴﺖ ﮐﺎﺭﺁﺋﻲ ﻳﮏ ﺷﺒﮑﻪ
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ ﮐﻪ ﺩﺭ ﺁﻥ ﺩﻭ ﺷﺎﺧﺺ ﻣﻬﻢ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻭ ﺗﺎﺧﻴﺮ ﻣﻮﺭﺩ ﺗﻮﺟﻪ ﻗﺮﺍﺭ
ﻣﻲ ﮔﻴﺮﺩ.
379
ﺍﻧﻮﺍﻉ ﮐﺎﺑﻞ
ﺍﻣﺮﻭﺯﻩ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ﻣﺨﺘﻠﻔﻲ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻧﻮﻉ ﻭ ﺳﻴﺴﺘﻢ ﮐﺎﺑﻞ
ﮐﺸﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﺩﺭ ﻳﮏ ﺷﺒﮑﻪ ﺑﺴﻴﺎﺭ ﺣﺎﺋﺰ ﺍﻫﻤﻴﺖ ﺍﺳﺖ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻗﺼﺪ ﺩﺍﺷﺘﻦ
ﺷﺒﮑﻪ ﺍﻱ ﺭﺍ ﺩﺍﺭﻳﻢ ﮐﻪ ﺩﺍﺭﺍﻱ ﺣﺪﺍﻗﻞ ﻣﺸﮑﻼﺕ ﺑﺎﺷﺪ ﻭ ﺑﺘﻮﺍﻧﺪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻔﻴﺪ ﺍﺯ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ
ﺑﻪ ﺩﺭﺳﺘﻲ ﺧﺪﻣﺎﺕ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﮐﺎﺭﺑﺮﺍﻥ ﻗﺮﺍﺭ ﺩﻫﺪ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﻳﮏ ﺳﻴﺴﺘﻢ
ﮐﺎﺑﻠﻴﻨﮓ ﻣﻨﺎﺳﺐ ،ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ .ﺩﺭ ﺯﻣﺎﻥ ﻃﺮﺍﺣﻲ ﻳﮏ ﺷﺒﮑﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺎ ﺭﻋﺎﻳﺖ ﻣﺠﻤﻮﻋﻪ
ﻗﻮﺍﻧﻴﻦ ﻣﻮﺟﻮﺩ ﺩﺭ ﺧﺼﻮﺹ ﺳﻴﺴﺘﻢ ﮐﺎﺑﻠﻴﻨﮓ ،ﺷﺒﮑﻪ ﺍﻱ ﺑﺎ ﺣﺪﺍﻗﻞ ﻣﺸﮑﻼﺕ ﺭﺍ ﻃﺮﺍﺣﻲ
ﻧﻤﻮﺩ.ﺑﺎ ﺍﻳﻦ ﮐﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﺪﻭﻥ ﮐﺎﺑﻞ ﻧﻴﺰ ﺩﺭ ﺍﺑﻌﺎﺩ ﻭﺳﻴﻌﻲ ﮔﺴﺘﺮﺵ ﻳﺎﻓﺘﻪ ﺍﺳﺖ،
ﻭﻟﻲ ﻫﻨﻮﺯ ﺑﻴﺶ ﺍﺯ ٩٥ﺩﺭﺻﺪ ﺳﺎﺯﻣﺎﻥ ﻫﺎ ﻭ ﻣﻮﺳﺴﺎﺕ ﺍﺯ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﺷﺒﮑﻪ ﺍﻱ ﻣﺒﺘﻨﻲ ﺑﺮ
ﮐﺎﺑﻞ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
380
ﺍﺳﺖ.ﺗﻠﮕﺮﺍﻑ ﻫﺎﻱ ﺍﻭﺍﺳﻂ ﻗﺮﻥ ، ١٩ﻗﺎﺩﺭ ﺑﻪ ﺍﺭﺳﺎﻝ ﭼﻬﺎﺭ ﺗﺎ ﭘﻨﺞ ﻧﻘﻄﻪ ﻭ ﻳﺎ ﺧﻂ ﻓﺎﺻﻠﻪ ﺩﺭ
ﻫﺮ ﺛﺎﻧﻴﻪ ﺑﻮﺩﻧﺪ ،ﺩﺭ ﺣﺎﻟﻲ ﮐﻪ ﻫﻢ ﺍﻳﻨﮏ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ ﺑﺎ ﺳﺮﻋﺘﻲ ﻣﻌﺎﺩﻝ ﻳﮏ ﮔﻴﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ
ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺍﺭﺗﺒﺎﻁ ﺑﺮﻗﺮﺍﺭ ﻣﻲ ﻧﻤﺎﻳﻨﺪ )ﺍﺭﺳﺎﻝ ١،٠٠٠،٠٠٠،٠٠٠ﺻﻔﺮ ﻭ ﻳﺎ ﻳﮏ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ(.
ﺗﻠﮕﺮﺍﻑ ﻭ ﺗﻠﻪ ﺗﺎﻳﭗ ﺭﺍﻳﺘﺮ ،ﭘﻴﺸﮕﺎﻡ ﻣﺒﺎﺩﻟﻪ ﺩﺍﺩﻩ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﻃﻲ ﺳﻲ ﻭ ﭘﻨﺞ ﺳﺎﻝ ﺍﺧﻴﺮ
ﻫﻤﻪ ﭼﻴﺰ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ﻭ ﻏﻴﺮﻗﺎﺑﻞ ﺗﺼﻮﺭﻱ ﺗﻐﻴﻴﺮ ﻧﻤﻮﺩﻩ ﺍﺳﺖ .ﺿﺮﻭﺭﺕ ﺍﺭﺗﺒﺎﻁ ﮐﺎﻣﭙﻴﻮﺗﺮﻫﺎ
ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﻭ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ،ﻣﻬﻤﺘﺮﻳﻦ ﻋﻠﻞ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺗﺠﻬﻴﺰﺍﺕ ﺷﺒﮑﻪ ﺍﻱ ﺳﺮﻳﻊ ،ﮐﺎﺑﻞ
ﻫﺎﺋﻲ ﺑﺎ ﻣﺸﺨﺼﺎﺕ ﺑﺎﻻ ﻭ ﺳﺨﺖ ﺍﻓﺰﺍﺭﻫﺎﻱ ﺍﺭﺗﺒﺎﻃﻲ ﭘﻴﺸﺮﻓﺘﻪ ﺍﺳﺖ.
381
ﻣﻮﺳﺴﻪ IEEEﺩﺭ ﺳﺎﻝ ١٩٨٣ﻧﺴﺨﻪ ﺭﺳﻤﻲ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺍﺗﺮﻧﺖ ﺭﺍ ﺑﺎ ﻧﺎﻡ IEEE
802.3ﻭ ﺩﺭ ﺳﺎﻝ ، ١٩٨٥ﻧﺴﺨﻪ ﺷﻤﺎﺭﻩ ﺩﻭ ﺭﺍ ﺑﺎ ﻧﺎﻡ IEEE 802.3aﺍﺭﺍﺋﻪ ﻧﻤﻮﺩ .ﺍﻳﻦ
ﻧﺴﺨﻪ ﺑﺎ ﻧﺎﻡ Thin Ethernetﻭ ﻳﺎ Base2١٠ﻣﻌﺮﻭﻑ ﮔﺮﺩﻳﺪ ) .ﺣﺪﺍﮐﺜﺮ ﻃﻮﻝ ﮐﺎﺑﻞ
١٨٥ﻣﺘﺮ ﻣﻲ ﺑﺎﺷﺪ ﻭ ﻋﺪﺩ ٢ﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺍﺳﺖ ﮐﻪ ﻃﻮﻝ ﮐﺎﺑﻞ ﻣﻲ ﺗﻮﺍﻧﺪ ﺗﺎ ﻣﺮﺯ
٢٠٠ﻣﺘﺮ ﻧﻴﺰ ﺑﺮﺳﺪ(
ﺍﺯ ﺳﺎﻝ ١٩٨٣ﺗﺎﮐﻨﻮﻥ ،ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ﺍﺳﺖ ﮐﻪ ﻳﮑﻲ ﺍﺯ ﺍﻫﺪﺍﻑ ﻣﻬﻢ ﺁﻧﺎﻥ
،ﺗﺎﻣﻴﻦ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻣﻨﺎﺳﺐ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺖ .ﻣﺎ ﺍﻣﺮﻭﺯﻩ ﺷﺎﻫﺪ ﺭﺳﻴﺪﻥ ﺑﻪ ﻣﺮﺯ
ﮔﻴﮕﺎﺑﻴﺖ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﻣﻲ ﺑﺎﺷﻴﻢ.
382
ﮔﺮﻭﻩ ﺳﺮﻋﺖ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺍﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ
CAT1 ﺣﺪﺍﮐﺜﺮ ﺗﺎ ﻳﮏ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻗﺪﻳﻤﻲ ﺗﻠﻔﻦ ISDN ،ﻭ
ﻣﻮﺩﻡ
ﺣﺪﺍﮐﺜﺮ ﺗﺎ ﭼﻬﺎﺭ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ CAT2 ﺷﺒﮑﻪ ﻫﺎﻱ Ring Token
CAT3 ﺷﺒﮑﻪ ﻫﺎﻱ ring Tokenﻭ BASE-١٠ﺣﺪﺍﮐﺜﺮ ﺗﺎ ﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ
T
CAT4 ﺣﺪﺍﮐﺜﺮ ﺗﺎ ﺷﺎﻧﺰﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ Ring Token
ﺛﺎﻧﻴﻪ
CAT5 ﺣﺪﺍﮐﺜﺮ ﺗﺎ ﻳﮑﺼﺪ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺍﺗﺮﻧﺖ ) ﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ( ،ﺍﺗﺮﻧﺖ
ﺳﺮﻳﻊ ) ﻳﮑﺼﺪ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ( ﻭ ﺷﺒﮑﻪ ﺛﺎﻧﻴﻪ
ﻫﺎﻱ ) Ring Tokenﺷﺎﻧﺰﺩﻩ ﻣﮕﺎﺑﻴﺖ ﺩﺭ
ﺛﺎﻧﻴﻪ (
CAT5e ﺣﺪﺍﮐﺜﺮ ﺗﺎ ﻳﮑﻬﺰﺍﺭ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ Gigabit Ethernet
ﺛﺎﻧﻴﻪ
CAT6 ﺣﺪﺍﮐﺜﺮ ﺗﺎ ﻳﮑﻬﺰﺍﺭ ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ Gigabit Ethernet
ﺛﺎﻧﻴﻪ
ﺗﻮﺿﻴﺤﺎﺕ :
ﺗﻘﺴﻴﻢ ﺑﻨﺪﻱ ﻫﺮ ﻳﮏ ﺍﺯ ﮔﺮﻭﻩ ﻫﺎﻱ ﻓﻮﻕ ﺑﺮ ﺍﺳﺎﺱ ﻧﻮﻉ ﮐﺎﺑﻞ ﻣﺴﻲ ﻭ Jackﺍﻧﺠﺎﻡ •
ﺷﺪﻩ ﺍﺳﺖ.
ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ، CAT1ﺑﻪ ﺩﻟﻴﻞ ﻋﺪﻡ ﺣﻤﺎﻳﺖ ﺗﺮﺍﻓﻴﮏ ﻣﻨﺎﺳﺐ ،ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ •
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﮐﺎﺑﻞ ﻫﺎﻱ ﻓﻮﻕ ،ﻗﺎﺩﺭ ﺑﻪ ﺣﻤﺎﻳﺖ ﺍﺯ ﺗﺮﺍﻓﻴﮏ ﺗﻠﻔﻦ ﻭ ﺷﺒﮑﻪ ﻫﺎﻱ
ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﻣﻲ ﺑﺎﺷﻨﺪ.
383
ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ CAT2ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ Token Ringﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﻭ ﺳﺮﻋﺘﻲ ﺑﺎﻟﻎ •
ﮐﺎﺑﻞ CAT6ﺑﺎ ﻫﺪﻑ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺍﺗﺮﻧﺖ ﮔﻴﮕﺎﺑﻴﺖ ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺍﺳﺖ. •
ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﺍﺳﺘﺎﻧﺪﺍﺭﺩﻫﺎﺋﻲ ﻧﻴﺰ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﮐﻪ ﺍﻣﮑﺎﻥ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﮔﻴﮕﺎﺑﻴﺖ ﺑﺮ
ﺭﻭﻱ ﮐﺎﺑﻞ ﻫﺎﻱ CAT5ﺭﺍ ﻓﺮﺍﻫﻢ ﻣﻲ ﻧﻤﺎﻳﺪ) .( CAT5eﮐﺎﺑﻞ ﻫﺎﻱ CAT6ﻣﺸﺎﺑﻪ
ﮐﺎﺑﻞ ﻫﺎﻱ CAT5ﺑﻮﺩﻩ ﻭﻟﻲ ﺑﻴﻦ ٤ﺯﻭﺝ ﮐﺎﺑﻞ ﺁﻧﺎﻥ ﺍﺯ ﻳﮏ ﺟﺪﺍﮐﻨﻨﺪﻩ ﻓﻴﺰﻳﮑﻲ ﺑﻪ
ﻣﻨﻈﻮﺭ ﮐﺎﻫﺶ ﭘﺎﺭﺍﺯﻳﺖ ﻫﺎﻱ ﺍﻟﮑﺘﺮﻭﻣﻐﻨﺎﻃﻴﺴﻲ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﻭ ﺳﺮﻋﺘﻲ ﺑﺎﻟﻎ ﺑﺮ ﻳﮑﻬﺰﺍﺭ
ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﺭﺍ ﺍﺭﺍﺋﻪ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
384
ﻓﻴﺒﺮ ﻧﻮﺭﻱ
ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﻳﮑﻲ ﺍﺯ ﻣﺤﻴﻂ ﻫﺎﻱ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﻩ ﺑﺎ ﺳﺮﻋﺖ ﺑﺎﻻ ﺍﺳﺖ .ﺍﺯ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺩﺭ
ﻣﻮﺍﺭﺩ ﻣﺘﻔﺎﻭﺗﻲ ﻧﻈﻴﺮ :ﺷﺒﮑﻪ ﻫﺎﻱ ﺗﻠﻔﻦ ﺷﻬﺮﻱ ﻭ ﺑﻴﻦ ﺷﻬﺮﻱ ،ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﻭ
ﺍﻳﻨﺘﺮﻧﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻓﻴﺒﺮﻧﻮﺭﻱ ﺭﺷﺘﻪ ﺍﻱ ﺍﺯ ﺗﺎﺭﻫﺎﻱ ﺷﻴﺸﻪ ﺍﻱ ﺑﻮﺩﻩ ﮐﻪ ﻫﺮ ﻳﮏ ﺍﺯ
ﺗﺎﺭﻫﺎ ﺩﺍﺭﺍﻱ ﺿﺨﺎﻣﺘﻲ ﻣﻌﺎﺩﻝ ﺗﺎﺭ ﻣﻮﻱ ﺍﻧﺴﺎﻥ ﺭﺍ ﺩﺍﺷﺘﻪ ﻭ ﺍﺯ ﺁﻧﺎﻥ ﺑﺮﺍﻱ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺩﺭ
ﻣﺴﺎﻓﺖ ﻫﺎﻱ ﻃﻮﻻﻧﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ.
385
ﻳﮏ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺍﺯ ﺳﻪ ﺑﺨﺶ ﻣﺘﻔﺎﻭﺕ ﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺍﺳﺖ:
ﻫﺴﺘﻪ ) . (Coreﻫﺴﺘﻪ ﻧﺎﺯﮎ ﺷﻴﺸﻪ ﺍﻱ ﺩﺭ ﻣﺮﮐﺰ ﻓﻴﺒﺮ ﮐﻪ ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﻧﻮﺭﻱ ﺩﺭ ﺁﻥ •
ﺣﺮﮐﺖ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
ﺭﻭﮐﺶ ) . (Claddingﺑﺨﺶ ﺧﺎﺭﺟﻲ ﻓﻴﺒﺮ ﺑﻮﺩﻩ ﮐﻪ ﺩﻭﺭﺗﺎﺩﻭﺭ ﻫﺴﺘﻪ ﺭﺍ ﺍﺣﺎﻃﻪ •
386
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻋﺪﻡ ﻭﺟﻮﺩ ﺧﻢ ﻭ ﻳﺎ ﭘﻴﭻ ﺩﺭ ﺭﺍﻫﺮﻭ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺗﺎﺑﺶ ﻧﻮﺭ ﭼﺮﺍﻍ ﻗﻮﻩ
ﻣﺸﮑﻠﻲ ﻭﺟﻮﺩ ﻧﺪﺍﺷﺘﻪ ﻭ ﭼﺮﺍﻍ ﻗﻮﻩ ﻣﻲ ﺗﻮﺍﻧﺪ ) ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﻮﻉ ﺁﻥ ( ﻣﺤﺪﻭﺩﻩ ﻣﻮﺭﺩ ﻧﻈﺮ ﺭﺍ
ﺭﻭﺷﻦ ﮐﺮﺩ .ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺭﺍﻫﺮﻭﻱ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﺧﻢ ﻭ ﻳﺎ ﭘﻴﭻ ﺑﺎﺷﺪ ،ﺑﺎ ﭼﻪ ﻣﺸﮑﻠﻲ ﺑﺮﺧﻮﺭﺩ
ﺧﻮﺍﻫﻴﻢ ﮐﺮﺩ؟ ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﻳﮏ ﺁﻳﻴﻨﻪ ﺩﺭ ﻣﺤﻞ ﭘﻴﭻ ﺭﺍﻫﺮﻭ ﺍﺳﺘﻔﺎﺩﻩ ﺗﺎ ﺑﺎﻋﺚ
ﺍﻧﻌﮑﺎﺱ ﻧﻮﺭ ﺍﺯ ﺯﺍﻭﻳﻪ ﻣﺮﺑﻮﻃﻪ ﮔﺮﺩﺩ.ﺩﺭ ﺻﻮﺭﺗﻴﮑﻪ ﺭﺍﻫﺮﻭﻱ ﻓﻮﻕ ﺩﺍﺭﺍﻱ ﭘﻴﭻ ﻫﺎﻱ ﺯﻳﺎﺩﻱ
ﺑﺎﺷﺪ ،ﭼﻪ ﮐﺎﺭ ﺑﺎﻳﺴﺖ ﮐﺮﺩ؟ ﺩﺭ ﭼﻨﻴﻦ ﺣﺎﻟﺘﻲ ﺩﺭ ﺗﻤﺎﻡ ﻃﻮﻝ ﻣﺴﻴﺮ ﺩﻳﻮﺍﺭ ﺭﺍﻫﺮﻭﻱ ﻣﻮﺭﺩ ﻧﻈﺮ،
ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺯ ﺁﻳﻴﻨﻪ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ .ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ ﻧﻮﺭ ﺗﺎﺑﺎﻧﺪﻩ ﺷﺪﻩ ﺗﻮﺳﻂ ﭼﺮﺍﻍ ﻗﻮﻩ )ﺑﺎ ﻳﮏ
ﺯﺍﻭﻳﻪ ﺧﺎﺹ( ﺍﺯ ﻧﻘﻄﻪ ﺍﻱ ﺑﻪ ﻧﻘﻄﻪ ﺍﻱ ﺩﻳﮕﺮ ﺣﺮﮐﺖ ﮐﺮﺩﻩ ) ﺟﻬﺶ ﮐﺮﺩﻩ ﻭ ﻃﻮﻝ ﻣﺴﻴﺮ
ﺭﺍﻫﺮﻭ ﺭﺍ ﻃﻲ ﺧﻮﺍﻫﺪ ﮐﺮﺩ( .ﻋﻤﻠﻴﺎﺕ ﻓﻮﻕ ﻣﺸﺎﺑﻪ ﺁﻧﭽﻴﺰﻱ ﺍﺳﺖ ﮐﻪ ﺩﺭ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺍﻧﺠﺎﻡ ﻣﻲ
ﮔﻴﺮﺩ.
ﻧﻮﺭ ،ﺩﺭ ﮐﺎﺑﻞ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺍﺯ ﻃﺮﻳﻖ ﻫﺴﺘﻪ )ﻧﻈﻴﺮ ﺭﺍﻫﺮﻭﻱ ﻣﺜﺎﻝ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ( ﻭ ﺗﻮﺳﻂ ﺟﻬﺶ
ﻫﺎﻱ ﭘﻴﻮﺳﺘﻪ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺳﻄﺢ ﺁﺑﮑﺎﺭﻱ ﺷﺪﻩ ) ) (Claddingﻣﺸﺎﺑﻪ ﺩﻳﻮﺍﺭﻫﺎﻱ ﺷﻴﺸﻪ ﺍﻱ
ﻣﺜﺎﻝ ﺍﺭﺍﺋﻪ ﺷﺪﻩ ( ﺣﺮﮐﺖ ﻣﻲ ﮐﻨﺪ ).ﻣﺠﻤﻮﻉ ﺍﻧﻌﮑﺎﺱ ﺩﺍﺧﻠﻲ ( .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻨﮑﻪ ﺳﻄﺢ
ﺁﺑﮑﺎﺭﻱ ﺷﺪﻩ ،ﻗﺎﺩﺭ ﺑﻪ ﺟﺬﺏ ﻧﻮﺭ ﻣﻮﺟﻮﺩ ﺩﺭ ﻫﺴﺘﻪ ﻧﻤﻲ ﺑﺎﺷﺪ ،ﻧﻮﺭ ﻗﺎﺩﺭ ﺑﻪ ﺣﺮﮐﺖ ﺩﺭ
ﻣﺴﺎﻓﺖ ﻫﺎﻱ ﻃﻮﻻﻧﻲ ﻣﻲ ﺑﺎﺷﺪ .ﺑﺮﺧﻲ ﺍﺯ ﺳﻴﮕﻨﺎ ﻝ ﻫﺎﻱ ﻧﻮﺭﻱ ﺑﺪﻟﻴﻞ ﻋﺪﻡ ﺧﻠﻮﺹ ﺷﻴﺸﻪ
ﻣﻮﺟﻮﺩ ،ﻣﻤﮑﻦ ﺍﺳﺖ ﺩﭼﺎﺭ ﻧﻮﻋﻲ ﺗﻀﻌﻴﻒ ﺩﺭ ﻃﻮﻝ ﻫﺴﺘﻪ ﮔﺮﺩﻧﺪ .ﻣﻴﺰﺍﻥ ﺗﻀﻌﻴﻒ ﺳﻴﮕﻨﺎﻝ
ﻧﻮﺭﻱ ﺑﻪ ﺩﺭﺟﻪ ﺧﻠﻮﺹ ﺷﻴﺸﻪ ﻭ ﻃﻮﻝ ﻣﻮﺝ ﻧﻮﺭ ﺍﻧﺘﻘﺎﻟﻲ ﺩﺍﺭﺩ ) .ﻣﺜﻼ" ﻣﻮﺝ ﺑﺎ ﻃﻮﻝ ٨٥٠
ﻧﺎﻧﻮﻣﺘﺮ ﺑﻴﻦ ٦٠ﺗﺎ ٧٥ﺩﺭﺻﺪ ﺩﺭ ﻫﺮ ﮐﻴﻠﻮﻣﺘﺮ ،ﻣﻮﺝ ﺑﺎ ﻃﻮﻝ ١٣٠٠ﻧﺎﻧﻮﻣﺘﺮ ﺑﻴﻦ ٥٠ﺗﺎ ٦٠
ﺩﺭﺻﺪ ﺩﺭ ﻫﺮ ﮐﻴﻠﻮﻣﺘﺮ ،ﻣﻮﺝ ﺑﺎ ﻃﻮﻝ ١٥٥٠ﻧﺎﻧﻮﻣﺘﺮ ﺑﻴﺶ ﺍﺯ ٥٠ﺩﺭﺻﺪ ﺩﺭ ﻫﺮ ﮐﻴﻠﻮﻣﺘﺮ(
ﺳﻴﺴﺘﻢ ﺭﻟﻪ ﻓﻴﺒﺮ ﻧﻮﺭﻱ
ﺑﻤﻨﻈﻮﺭ ﺁﮔﺎﻫﻲ ﺍﺯ ﻧﺤﻮﻩ ﺍﺳﺘﻔﺎﺩﻩ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺩﺭ ﺳﻴﺴﺘﻢ ﻫﺎﻱ ﻣﺨﺎﺑﺮﺍﺗﻲ ،ﻣﺜﺎﻟﻲ ﺭﺍ ﺩﻧﺒﺎﻝ
ﺧﻮﺍﻫﻴﻢ ﮐﺮﺩ ﮐﻪ ﻣﺮﺑﻮﻁ ﺑﻪ ﻳﮏ ﻓﻴﻠﻢ ﺳﻴﻨﻤﺎﺋﻲ ﻭ ﻳﺎ ﻣﺴﺘﻨﺪ ﺩﺭ ﺭﺍﺑﻄﻪ ﺑﺎ ﺟﻨﮓ ﺟـــﻬﺎﻧﻲ ﺩﻭﻡ
ﺍﺳﺖ .ﺩﺭ ﻓﻴﻠﻢ ﻓﻮﻕ ﺩﻭ ﻧﺎﻭﮔﺎﻥ ﺩﺭﻳﺎﺋﻲ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﺳﻄﺢ ﺩﺭﻳﺎ ﺩﺭ ﺣﺎﻝ ﺣﺮﮐﺖ ﻣﻲ ﺑﺎﺷﻨﺪ ،
ﻧﻴﺎﺯ ﺑﻪ ﺑﺮﻗﺮﺍﺭﻱ ﺍﺭﺗﺒﺎﻁ ﺑﺎ ﻳﮑﺪﻳﮕﺮ ﺩﺭ ﻳﮏ ﻭﺿﻌﻴﺖ ﮐﺎﻣﻼ" ﺑﺤﺮﺍﻧﻲ ﻭ ﺗﻮﻓﺎﻧﻲ ﺭﺍ ﺩﺍﺭﻧﺪ.
387
ﻳـﮑﻲ ﺍﺯ ﻧﺎﻭﻫﺎ ﻗﺼﺪ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﺑﺮﺍﻱ ﻧﺎﻭ ﺩﻳﮕﺮ ﺭﺍ ﺩﺍﺭﺩ.ﮐﺎﭘﻴﺘﺎﻥ ﻧﺎﻭ ﻓﻮﻕ ﭘﻴﺎﻣﻲ
ﺑﺮﺍﻱ ﻳﮏ ﻣﻠﻮﺍﻥ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﻋﺮﺷﻪ ﮐﺸﺘﻲ ﻣﺴﺘﻘﺮ ﺍﺳﺖ ،ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ .ﻣﻠﻮﺍﻥ ﻓﻮﻕ ﭘﻴﺎﻡ
ﺩﺭﻳﺎﻓﺘﻲ ﺭﺍ ﺑﻪ ﻣﺠﻤﻮﻋﻪ ﺍﻱ ﺍﺯ ﮐﺪﻫﺎﻱ ﻣﻮﺭﺱ ) ﻧﻘﻄﻪ ﻭ ﻓﺎﺻﻠﻪ ( ﺗﺮﺟﻤﻪ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭ ﺍﺩﺍﻣﻪ
ﻣﻠﻮﺍﻥ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﻧﻮﺭﺍﻓﮑﻦ ﺍﻗﺪﺍﻡ ﺑﻪ ﺍﺭﺳﺎﻝ ﭘﻴﺎﻡ ﺑﺮﺍﻱ ﻧﺎﻭ ﺩﻳﮕﺮ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﻳﮏ ﻣﻠﻮﺍﻥ ﺑﺮ ﺭﻭﻱ ﻋﺮﺷﻪ ﮐﺸﺘﻲ ﺩﻭﻡ ،ﮐﺪﻫﺎﻱ ﻣﻮﺭﺱ ﺍﺭﺳﺎﻟﻲ ﺭﺍ ﻣﺸﺎﻫﺪﻩ ﻣﻲ ﻧﻤﺎﻳﺪ .ﺩﺭ
ﺍﺩﺍﻣﻪ ﻣﻠﻮﺍﻥ ﻓﻮﻕ ﮐﺪﻫﺎﻱ ﻓﻮﻕ ﺭﺍ ﺑﻪ ﻳﮏ ﺯﺑﺎﻥ ﺧﺎﺹ ) ﻣﺜﻼ" ﺍﻧﮕﻠﻴﺴﻲ ( ﺗﺒﺪﻳﻞ ﻭ ﺁﻧﻬﺎ ﺭﺍ
ﺑﺮﺍﻱ ﮐﺎﭘﻴﺘﺎﻥ ﻧﺎﻭ ﺍﺭﺳﺎﻝ ﻣﻲ ﺩﺍﺭﺩ .ﻓﺮﺽ ﮐﻨﻴﺪ ﻓﺎﺻﻠﻪ ﺩﻭ ﻧﺎﻭ ﻓﻮﻕ ﺍﺯ ﻳﮑﺪﻳﮕﺮ ﺑﺴﻴﺎﺭ ﺯﻳﺎﺩ )
ﻫﺰﺍﺭﺍﻥ ﻣﺎﻳﻞ ( ﺑﻮﺩﻩ ﻭ ﺑﻤﻨﻈﻮﺭ ﺑﺮﻗﺮﺍﻱ ﺍﺭﺗﺒﺎﻁ ﺑﻴﻦ ﺁﻧﻬﺎ ﺍﺯ ﻳﮏ ﺳﻴﺴﺘﻢ ﻣﺨﺎﺑﺮﺍﺗﻲ ﻣﺒﺘﻨﻲ ﺑﺮ
ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﮔﺮﺩﺩ.
ﺳﻴﺴﺘﻢ ﺭﻟﻪ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺍﺯ ﻋﻨﺎﺻﺮ ﺯﻳﺮ ﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺍﺳﺖ:
ﻓﺮﺳﺘﻨﺪﻩ .ﻣﺴﺌﻮﻝ ﺗﻮﻟﻴﺪ ﻭ ﺭﻣﺰﻧﮕﺎﺭﻱ ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﻧﻮﺭﻱ ﺍﺳﺖ. •
ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﻣﺪﻳﺮﻳﺖ ﺳﻴﮑﻨﺎﻝ ﻫﺎﻱ ﻧﻮﺭﻱ ﺩﺭ ﻳﮏ ﻣﺴﺎﻓﺖ ﺭﺍ ﺑﺮﻋﻬﺪﻩ ﻣﻲ ﮔﻴﺮﺩ. •
ﺑﺎﺯﻳﺎﺏ ﻧﻮﺭﻱ .ﺑﻤﻨﻈﻮﺭ ﺗﻘﻮﻳﺖ ﺳﻴﮕﻨﺎ ﻝ ﻫﺎﻱ ﻧﻮﺭﻱ ﺩﺭ ﻣﺴﺎﻓﺖ ﻫﺎﻱ ﻃﻮﻻﻧﻲ •
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﻧﻮﺭﻱ .ﺳﻴﮕﻨﺎ ﻝ ﻫﺎﻱ ﻧﻮﺭﻱ ﺭﺍ ﺩﺭﻳﺎﻓﺖ ﻭ ﺭﻣﺰﮔﺸﺎﺋﻲ ﻣﻲ ﻧﻤﺎﻳﺪ. •
388
ﺑﺎﺯﻳﺎﺏ ) ﺗﻘﻮﻳﺖ ﮐﻨﻨﺪﻩ ( ﻧﻮﺭﻱ
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﻗﺒﻼ" ﺍﺷﺎﺭﻩ ﮔﺮﺩﻳﺪ ،ﺑﺮﺧﻲ ﺍﺯ ﺳﻴﮕﻨﺎﻝ ﻫﺎ ﺩﺭ ﻣﻮﺍﺭﺩﻳﮑﻪ ﻣﺴﺎﻓﺖ ﺍﺭﺳﺎﻝ
ﺍﻃﻼﻋﺎﺕ ﻃﻮﻻﻧﻲ ﺑﻮﺩﻩ ) ﺑﻴﺶ ﺍﺯ ﻳﮏ ﮐﻴﻠﻮﻣﺘﺮ ( ﻭ ﻳﺎ ﺍﺯ ﻣﻮﺍﺩ ﺧﺎﻟﺺ ﺑﺮﺍﻱ ﺗﻬﻴﻪ ﻓﻴﺒﺮ ﻧﻮﺭﻱ
) ﺷﻴﺸﻪ ( ﺍﺳﺘﻔﺎﺩﻩ ﻧﺸﺪﻩ ﺑﺎﺷﺪ ،ﺗﻀﻌﻴﻒ ﻭ ﺍﺯ ﺑﻴﻦ ﺧﻮﺍﻫﻨﺪ ﺭﻓﺖ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ﻭ
ﺑﻤﻨﻈﻮﺭ ﺗﻘﻮﻳﺖ ) ﺑﺎﻻ ﺑﺮﺩﻥ ( ﺳﻴﮕﻨﺎ ﻝ ﻫﺎﻱ ﻧﻮﺭﻱ ﺗﻀﻌﻴﻒ ﺷﺪﻩ ﺍﺯ ﻳﮏ ﻳﺎ ﭼﻨﺪﻳﻦ " ﺗﻘﻮﻳﺖ
ﮐﻨﻨﺪﻩ ﻧﻮﺭﻱ " ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺗﻘﻮﻳﺖ ﮐﻨﻨﺪﻩ ﻧﻮﺭﻱ ﺍﺯ ﻓﻴﺒﺮﻫﺎﻱ ﻧﻮﺭﻱ ﻣﺘﻌﻌﺪﺩ ﺑﻬﻤﺮﺍﻩ ﻳﮏ
ﺭﻭﮐﺶ ﺧﺎﺹ ) (dopingﺗﺸﮑﻴﻞ ﻣﻲ ﮔﺮﺩﻧﺪ .ﺑﺨﺶ ﺩﻭﭘﻴﻨﮓ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﻟﻴﺰﺭ ﭘﻤﭗ
ﻣﻲ ﮔﺮﺩﺩ .ﺯﻣﺎﻧﻴﮑﻪ ﺳﻴﮕﻨﺎﻝ ﺗﻀﻌﻴﻒ ﺷﺪﻩ ﺑﻪ ﺭﻭﮐﺶ ﺩﻭﭘﻴﻨﮕﻲ ﻣﻲ ﺭﺳﺪ ،ﺍﻧﺮﮊﻱ ﻣﺎﺣﺼﻞ ﺍﺯ
ﻟﻴﺰﺭ ﺑﺎﻋﺚ ﻣﻲ ﮔﺮﺩﺩ ﮐﻪ ﻣﻮﻟﮑﻮﻝ ﻫﺎﻱ ﺩﻭﭘﻴﻨﮓ ﺷﺪﻩ ،ﺑﻪ ﻟﻴﺰﺭ ﺗﺒﺪﻳﻞ ﻣﻲ ﮔﺮﺩﻧﺪ .ﻣﻮﻟﮑﻮﻝ
ﻫﺎﻱ ﺩﻭﭘﻴﻨﮓ ﺷﺪﻩ ﺩﺭ ﺍﺩﺍﻣﻪ ﺑﺎﻋﺚ ﺍﻧﻌﮑﺎﺱ ﻳﮏ ﺳﻴﮕﻨﺎﻝ ﻧﻮﺭﻱ ﺟﺪﻳﺪ ﻭ ﻗﻮﻳﺘﺮ ﺑﺎ ﻫﻤﺎﻥ
ﺧﺼﺎﻳﺺ ﺳﻴﮕﻨﺎﻝ ﻭﺭﻭﺩﻱ ﺗﻀﻌﻴﻒ ﺷﺪﻩ ،ﺧﻮﺍﻫﻨﺪ ﺑﻮﺩ ).ﺗﻘﻮﻳﺖ ﮐﻨﻨﺪﻩ ﻟﻴﺰﺭﻱ(
ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﻧﻮﺭﻱ
ﻭﻇﻴﻔﻪ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ،ﻣﺸﺎﺑﻪ ﻧﻘﺶ ﻣﻠﻮﺍﻥ ﺑﺮ ﺭﻭﻱ ﻋﺮﺷﻪ ﮐﺸﺘﻲ ﻧﺎﻭ ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﭘﻴﺎﻡ
ﺍﺳﺖ .ﺩﺳﺘﮕﺎﻩ ﻓﻮﻕ ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﻧﻮﺭﻱ ﺭﺍ ﺍﺧﺬ ﻭ ﭘﺲ ﺍﺯ ﺭﻣﺰﮔﺸﺎﺋﻲ ،ﺳﻴﮕﻨﺎ ﻝ
ﻫﺎﻱ ﺍﻟﮑﺘﺮﻳﮑﻲ ﺭﺍ ﺑﺮﺍﻱ ﺳﺎﻳﺮ ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻨﺪﮔﺎﻥ ) ﮐﺎﻣﭙﻴﻮﺗﺮ ،ﺗﻠﻔﻦ ﻭ ( ...ﺍﺭﺳﺎﻝ ﻣﻲ ﻧﻤﺎﻳﺪ.
ﺩﺭﻳﺎﻓﺖ ﮐﻨﻨﺪﻩ ﺑﻤﻨﻈﻮﺭ ﺗﺸﺨﻴﺺ ﻧﻮﺭ ﺍﺯ ﻳﮏ "ﻓﺘﻮﺳﻞ" ﻭ ﻳﺎ "ﻓﺘﻮﺩﻳﻮﺩ" ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮐﻨﺪ.
ﻣﺰﺍﻳﺎﻱ ﻓﻴﺒﺮ ﻧﻮﺭﻱ
ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ﺳﻴﻢ ﻫﺎﻱ ﻫﺎﻱ ﻣﺴﻲ ﺩﺍﺭﺍﻱ ﻣﺰﺍﻳﺎﻱ ﺯﻳﺮ ﺍﺳﺖ:
ﺍﺭﺯﺍﻧﺘﺮ .ﻫﺰﻳﻨﻪ ﭼﻨﺪﻳﻦ ﮐﻴﻠﻮﻣﺘﺮ ﮐﺎﺑﻞ ﻧﻮﺭﻱ ﻧﺴﺒﺖ ﺑﻪ ﺳﻴﻢ ﻫﺎﻱ ﻣﺴﻲ ﮐﻤﺘﺮ ﺍﺳﺖ. •
ﻧﺎﺯﮎ ﺗﺮ .ﻗﻄﺮ ﻓﻴﺒﺮﻫﺎﻱ ﻧﻮﺭﻱ ﺑﻤﺮﺍﺗﺐ ﮐﻤﺘﺮ ﺍﺯ ﺳﻴﻢ ﻫﺎﻱ ﻣﺴﻲ ﺍﺳﺖ. •
ﻇﺮﻓﻴﺖ ﺑﺎﻻ .ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺑﻤﻨﻈﻮﺭ ﺍﺭﺳﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮ ﺍﺯ •
389
ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﻧﻮﺭﻱ .ﺑﺮﺧﻼﻑ ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﺍﻟﮑﺘﺮﻳﮑﻲ ﺩﺭ ﻳﮏ ﺳﻴﻢ ﻣﺴﻲ ،ﺳﻴﮕﻨﺎ ﻝ •
ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﻲ ﺗﻮﺍﻥ ﺍﺯ ﻓﺮﺳﺘﻨﺪﻩ ﻫﺎﺋﻲ ﺑﺎ ﻣﻴﺰﺍﻥ ﺑﺮﻕ ﻣﺼﺮﻓﻲ ﭘﺎﻳﻴﻦ ﻧﺴﺒﺖ ﺑﻪ ﻓﺮﺳﺘﻨﺪﻩ
ﻫﺎﻱ ﺍﻟﮑﺘﺮﻳﮑﻲ ﮐﻪ ﺍﺯ ﻭﻟﺘﺎﮊ ﺑﺎﻻﺋﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ ،ﺍﺳﺘﻔﺎﺩﻩ ﮐﺮﺩ.
ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻝ .ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﻣﻨﺎﺳﺐ ﺑﻤﻨﻈﻮﺭ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺍﺳﺖ. •
ﻏﻴﺮ ﺍﺷﺘﻌﺎﻝ ﺯﺍ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻋﺪﻡ ﻭﺟﻮﺩ ﺍﻟﮑﺘﺮﻳﺴﻴﺘﻪ ،ﺍﻣﮑﺎﻥ ﺑﺮﻭﺯ ﺁﺗﺶ ﺳﻮﺯﻱ ﻭﺟﻮﺩ •
ﻧﺨﻮﺍﻫﺪ ﺩﺍﺷﺖ.
ﺳﺒﮏ ﻭﺯﻥ .ﻭﺯﻥ ﻳﮏ ﮐﺎﺑﻞ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺑﻤﺮﺍﺗﺐ ﮐﻤﺘﺮ ﺍﺯ ﮐﺎﺑﻞ ﻣﺴﻲ )ﻗﺎﺑﻞ ﻣﻘﺎﻳﺴﻪ( •
ﺍﺳﺖ.
ﺍﻧﻌﻄﺎﻑ ﭘﺬﻳﺮ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻧﻌﻈﺎﻑ ﭘﺬﻳﺮﻱ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﻭ ﻗﺎﺑﻠﻴﺖ ﺍﺭﺳﺎﻝ ﻭ ﺩﺭﻳﺎﻓﺖ •
ﻧﻮﺭ ﺍﺯ ﺁﻧﺎﻥ ،ﺩﺭ ﻣﻮﺍﺭﺩ ﻣﺘﻔﺎﻭﺕ ﻧﻈﻴﺮ ﺩﻭﺭﺑﻴﻦ ﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻝ ﺑﺎ ﻣﻮﺍﺭﺩ ﮐﺎﺭﺑﺮﺩﻱ ﺧﺎﺹ
ﻣﺎﻧﻨﺪ :ﻋﮑﺲ ﺑﺮﺩﺍﺭﻱ ﭘﺰﺷﮑﻲ ،ﻟﻮﻟﻪ ﮐﺸﻲ ﻭ ...ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻣﺰﺍﻳﺎﻱ ﻓﺮﺍﻭﺍﻥ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ،ﺍﻣﺮﻭﺯﻩ ﺍﺯ ﺍﻳﻦ ﻧﻮﻉ ﮐﺎﺑﻞ ﻫﺎ ﺩﺭ ﻣﻮﺍﺭﺩ ﻣﺘﻔﺎﻭﺗﻲ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﺷﻮﺩ .ﺍﮐﺜﺮ ﺷﺒﮑﻪ ﻫﺎﻱ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﻭ ﻳﺎ ﻣﺨﺎﺑﺮﺍﺕ ﺍﺯﺭﺍﻩ ﺩﻭﺭ ﺩﺭ ﻣﻘﻴﺎﺱ ﻭﺳﻴﻌﻲ ﺍﺯ
ﻓﻴﺒﺮ ﻧﻮﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ.
390
ﺍﻳﺠﺎﺩ ﮐﺎﺑﻞ X-Over
ﮐﺎﺑﻞ ﻫﺎﻱ ﮐﺮﺍﺱ CAT5 UTPﮐﻪ ﺍﺯ ﺁﻧﺎﻥ ﺑﺎ ﻧﺎﻡ X-overﻧﻴﺰ ﻧﺎﻡ ﺑﺮﺩﻩ ﻣﻲ ﺷﻮﺩ،
ﻳﮑﻲ ﺍﺯ ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﮐﺎﺑﻞ ﻫﺎﻱ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﭘﺲ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ Straightﻣﻲ ﺑﺎﺷﻨﺪ .ﺑﺎ
ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮐﺎﺑﻞ ﻫﺎﻱ ﻓﻮﻕ ،ﻣﻲ ﺗﻮﺍﻥ ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺭﺍ ﺑﺪﻭﻥ ﻧﻴﺎﺯ ﺑﻪ ﻳﮏ ﻫﺎﺏ ﻭ ﻳﺎ ﺳﻮﺋﻴﭻ ﺑﻪ
ﻳﮑﺪﻳﮕﺮ ﻣﺘﺼﻞ ﻧﻤﻮﺩ .ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺍﻳﻦ ﮐﻪ ﻫﺎﺏ ﻋﻤﻠﻴﺎﺕ X-overﺭﺍ ﺑﻪ ﺻﻮﺭﺕ ﺩﺍﺧﻠﻲ
ﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﺪ ،ﺩﺭ ﺯﻣﺎﻧﻲ ﮐﻪ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺭﺍ ﺑﻪ ﻳﮏ ﻫﺎﺏ ﻣﺘﺼﻞ ﻣﻲ ﻧﻤﺎﺋﻴﻢ ،ﺻﺮﻓﺎ" ﺑﻪ ﻳﮏ
ﮐﺎﺑﻞ Straightﻧﻴﺎﺯ ﻣﻲ ﺑﺎﺷﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻗﺼﺪ ﺍﺗﺼﺎﻝ ﺩﻭ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﺭﺍ
ﺑﺪﻭﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﻫﺎﺏ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﻢ ،ﻣﻲ ﺑﺎﻳﺴﺖ ﻋﻤﻠﻴﺎﺕ X-overﺭﺍ ﺑﻪ ﺻﻮﺭﺕ
ﺩﺳﺘﻲ ﺍﻧﺠﺎﻡ ﺩﺍﺩ ﻭ ﮐﺎﺑﻞ ﻣﺨﺘﺺ ﺁﻥ ﺭﺍ ﺍﻳﺠﺎﺩ ﻧﻤﻮﺩ.
391
ﮐﺎﺑﻞ CAT5 X-over
ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻳﺠﺎﺩ ﮐﺎﺑﻞ ﻫﺎﻱ ﮐﺮﺍﺱ CAT5ﺻﺮﻓﺎ" ﺍﺯ ﻳﮏ ﺭﻭﺵ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ.
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﻗﺒﻼ" ﺍﺷﺎﺭﻩ ﮔﺮﺩﻳﺪ ،ﻳﮏ ﮐﺎﺑﻞ X-overﭘﻴﻦ TXﻳﮏ ﺳﻤﺖ ﺭﺍ ﺑﻪ ﭘﻴﻦ RX
ﺳﻤﺖ ﺩﻳﮕﺮ ﻣﺘﺼﻞ ﻣﻲ ﻧﻤﺎﻳﺪ) ﻭ ﺑﺮﻋﮑﺲ( .ﺷﮑﻞ ﺯﻳﺮ ﺷﻤﺎﺭﻩ ﭘﻴﻦ ﻫﺎﻱ ﻳﮏ ﮐﺎﺑﻞ CAT5
ﻣﻌﻤﻮﻟﻲ X-overﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ.
ﺷﻤﺎﺭﻩ ﭘﻴﻦ ﻫﺎﻱ ﻳﮏ ﮐﺎﺑﻞ CAT5 X-
. over
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﺩﺭ ﺷﮑﻞ ﻓﻮﻕ ﻣﺸﺎﻫﺪﻩ ﻣﻲ ﮔﺮﺩﺩ ﺩﺭ ﮐﺎﺑﻞ ﻫﺎﻱ X-overﺻﺮﻓﺎ" ﺍﺯ ﭘﻴﻦ ﻫﺎﻱ
ﺷﻤﺎﺭﻩ ﻳﮏ ،ﺩﻭ ،ﺳﻪ ﻭ ﺷﺶ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﭘﻴﻦ ﻫﺎﻱ ﻳﮏ ﻭ ﺩﻭ ﺑﻤﻨﺰﻟﻪ ﻳﮏ ﺯﻭﺝ ﺑﻮﺩﻩ ﻭ
ﭘﻴﻦ ﻫﺎﻱ ﺳﻪ ﻭ ﺷﺶ ﺯﻭﺝ ﺩﻳﮕﺮ ﺭﺍ ﺗﺸﮑﻴﻞ ﻣﻲ ﺩﻫﻨﺪ .ﺍﺯ ﭘﻴﻦ ﻫﺎﻱ ﭼﻬﺎﺭ ،ﭘﻨﺞ ،ﻫﻔﺖ ﻭ
ﻫﺸﺖ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻲ ﮔﺮﺩﺩ ) .ﺻﺮﻓﺎ" ﺍﺯ ﭼﻬﺎﺭ ﭘﻴﻦ ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﻳﮏ ﮐﺎﺑﻞ ، X-overﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﮔﺮﺩﺩ (.
392
ﺷﮑﻞ ﺯﻳﺮ ﻧﺤﻮﻩ ﺍﺗﺼﺎﻝ ﺩﻭ ﻫﺎﺏ ﺑﻪ ﻳﮑﺪﻳﮕﺮ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻳﮏ ﮐﺎﺑﻞ Straightﻭ ﺍﺯ ﻃﺮﻳﻖ
ﭘﻮﺭﺕ Uplinkﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ:
393
ﺷﮑﻞ ﺯﻳﺮ ﺗﻔﺎﻭﺕ ﻣﻮﺟﻮﺩ ﺑﻴﻦ ﺷﻤﺎﺭﻩ ﭘﻴﻦ ﻫﺎﻱ ﻳﮏ ﮐﺎﺑﻞ Straightﻭ X-overﺭﺍ ﻧﺸﺎﻥ
ﻣﻲ ﺩﻫﺪ :
394
ﺍﻳﺠﺎﺩ ﮐﺎﺑﻞ Straight
ﮐﺎﺑﻞ ﮐﺸﻲ ﺷﺒﮑﻪ ﻳﮑﻲ ﺍﺯ ﻣﺮﺍﺣﻞ ﻣﻬﻢ ﺩﺭ ﺯﻣﺎﻥ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﻳﮏ ﺷﺒﮑﻪ ﮐﺎﻣﭙﻴﻮﺗﺮﻱ ﺍﺳﺖ
ﮐﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺑﺎ ﺩﻗﺖ،ﻇﺮﺍﻓﺖ ﺧﺎﺹ ﻭ ﭘﺎﻳﺒﻨﺪﻱ ﺑﻪ ﺍﺻﻮﻝ ﮐﺎﺑﻞ ﮐﺸﻲ ﺳﺎﺧﺖ ﻳﺎﻓﺘﻪ ،ﺍﻧﺠﺎﻡ
ﺷﻮﺩ .ﺑﺮﺍﻱ ﺍﻳﺠﺎﺩ ﮐﺎﺑﻞ ﻫﺎﻱ UTPﺍﺯ ﺗﺠﻬﻴﺰﺍﺕ ﺯﻳﺮ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ :
ﺗﺠﻬﻴﺰﺍﺕ ﻣﻮﺭﺩ ﻧﻴﺎﺯ
ﮐﺎﻧﮑﺘﻮﺭﻫﺎﻱ RJ-
ﮐﺎﺑﻞ UTP
45
ﺁﭼﺎﺭ ﭘﺮﺱ RJ-45ﺳﻴﻢ ﻟﺨﺖ ﮐﻦ
ﻳﮑﻲ ﺍﺯ ﻋﻮﺍﻣﻞ ﺗﺎﺛﻴﺮ ﮔﺬﺍﺭ ﺩﺭ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻭ ﻧﮕﻬﺪﺍﺭﻱ ﻳﮏ ﺷﺒﮑﻪ ،ﻧﺤﻮﻩ ﮐﺎﺑﻞ ﮐﺸﻲ ﺁﻥ ﺍﺳﺖ.
ﺑﺎ ﺭﻋﺎﻳﺖ ﺍﺻﻮﻝ ﮐﺎﺑﻞ ﮐﺸﻲ ﺳﺎﺧﺘﻴﺎﻓﺘﻪ ،ﺩﺭ ﺻﻮﺭﺕ ﺑﺮﻭﺯ ﺍﺷﮑﺎﻝ ﺩﺭ ﺷﺒﮑﻪ ،ﺗﺸﺨﻴﺺ ﻭ
ﺍﺷﮑﺎﻝ ﺯﺩﺍﺋﻲ ﺁﻥ ﺑﺎ ﺳﺮﻋﺘﻲ ﻣﻨﺎﺳﺒﻲ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺷﺪ.
395
ﻣﺮﺣﻠﻪ ﭘﻨﺠﻢ
ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ Mbit ١٠/١٠٠ﺍﺯ ﺯﻭﺝ ﻫﺎﻱ ﺩﻭ ﻭ ﺳﻪ ﺍﺳﺘﻔﺎﺩﻩ ﺷﺪﻩ ﻭ ﺯﻭﺝ ﻫﺎﻱ ﻳــﮏ ﻭ
ﭼﻬﺎﺭ ﺭﺯﻭ ﺷﺪﻩ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺷـــﺒﮑﻪ ﻫﺎﻱ ﮔﻴــﮕﺎﺍﺗﺮﻧﺖ ﺍﺯ ﺗــﻤﺎﻣﻲ ﭼﻬﺎﺭ ﺯﻭﺝ ﺍﺳـﺘﻔﺎﺩﻩ
ﻣﻲ ﮔﺮﺩﺩ .ﮐﺎﺑﻞ ﻫﺎﻱ CAT5ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﻧﻮﻉ ﮐﺎﺑﻞ UTPﺑﻮﺩﻩ ﮐﻪ ﺩﺍﺭﺍﻱ ﺍﻧﻌﻄﺎﻑ
ﻣﻨﺎﺳﺐ ﺑﻮﺩﻩ ﻭ ﻧﺼﺐ ﺁﻧﺎﻥ ﺑﺴﺎﺩﮔﻲ ﺍﻧﺠﺎﻡ ﻣﻲ ﺷﻮﺩ.
396
ﺍﻳﺠﺎﺩ ﻳﮏ ﮐﺎﺑﻞ UTPﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺑﻪ ﻫﺎﺏ ) ﻣﻌﺮﻭﻑ ﺑﻪ ﮐﺎﺑﻞ ﻫﺎﻱ
( Straight
ﺍﺗﺮﻧﺖ ﻋﻤﻮﻣﺎ" ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻫﺸﺖ ﮐﺎﺑﻞ ﻫﺎﺩﻱ ﺑﻪ ﻫﻤﺮﺍﻩ ﻫﺸﺖ ﭘﻴﻦ ﻣﺎﮊﻭﻻﺭ
، plugs/jacksﺩﺍﺩﻩ ﺭﺍ ﺣﻤﻞ ﻣﻲ ﮐﻨﺪ.
ﮐﺎﻧﮑﺘﻮﺭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ RJ-45 ،ﻧﺎﻣﻴﺪﻩ ﺷﺪﻩ ﻭ ﻣﺸﺎﺑﻪ ﮐﺎﻧﮑﺘﻮﺭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ RJ-11ﺍﺳﺖ ﮐﻪ ﺩﺭ
ﺗﻠﻔﻦ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻳﮏ ﺭﺷﺘﻪ ﮐﺎﺑﻞ CAT5ﺷﺎﻣﻞ ﭼﻬﺎﺭ ﺯﻭﺝ ﺳﻴﻢ ﺑﻬﻢ ﺗﺎﺑﻴﺪﻩ ﺍﺳﺖ ﮐﻪ
ﻫﺮ ﺯﻭﺝ ﺩﺍﺭﺍﻱ ﺩﻭ ﺭﺷﺘﻪ ﺳﻴﻢ ﺑﺎ ﺭﻧﮓ ﻫﺎﺋﻲ ﺧﺎﺹ ﺍﺳﺖ) .ﻳﮏ ﺭﺷﺘﻪ ﺭﻧﮕﻲ ﻭ ﻳﮏ ﺭﺷﺘﻪ
ﺳﻔﻴﺪ ﺑﺎ ﻧﻮﺍﺭﻱ ﺑﻪ ﺭﻧﮓ ﺭﺷﺘﻪ ﺯﻭﺝ ﻣﺮﺑﻮﻁ( .ﺑﻪ ﻣﻨﻈﻮﺭ ﺗﺴﻬﻴﻞ ﺩﺭ ﺍﻣﺮ ﻧﮕﻬﺪﺍﺭﻱ ،ﻣﻲ ﺑﺎﻳﺴﺖ
ﺑﻪ ﺍﻧﺪﺍﺯﻩ ﺿﺮﻭﺭﻱ ﺳﻴﻢ ﻫﺎﻱ ﺑﻬﻢ ﺗﺎﺑﻴﺪﻩ ﺭﺍ ﺍﺯ ﺣﺎﻟﺖ ﭘﻴﭽﺶ ﺧﺎﺭﺝ ﻧﻤﻮﺩ )ﻣﺜﻼ" ﺣﺪﻭﺩ ﻳﮏ
ﺳﺎﻧﺘﻴﻤﺘﺮ( .ﺯﻭﺝ ﻫﺎﻱ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻪ ﺷﺪﻩ ﺑﺮﺍﻱ ﺍﺗﺮﻧﺖ ﺩﻩ ﻭ ﻳﮑﺼﺪ ﻣﮕﺎﺑﻴﺖ ﺑﻪ ﺭﻧﮓ ﻧﺎﺭﻧﺠﻲ
ﻭ ﺳﺒﺰ ﻣﻲ ﺑﺎﺷﻨﺪ.
ﺍﺯ ﺩﻭ ﺯﻭﺝ ﺩﻳﮕﺮ )ﺭﻧﮓ ﻗﻬﻮﻩ ﺍﻱ ﻭ ﺁﺑﻲ( ﻣﻲ ﺗﻮﺍﻥ ﺑﻪ ﻣﻨﻈﻮﺭ ﻳﮏ ﺧﻂ ﺍﺗﺮﻧﺖ ﺩﻭﻡ ﻭ ﻳﺎ
ﺍﺗﺼﺎﻻﺕ ﺗﻠـﻔﻦ ﺍﺳﺘﻔﺎﺩﻩ ﻧﻤﻮﺩ.
ﺑﻪ ﻣﻨﻈﻮﺭ ﮐﺎﺑﻞ ﮐﺸﻲ ﮐﺎﺑﻞ ﻫﺎﻱ UTPﺍﺯ ﺩﻭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﻣﺘﻔﺎﻭﺕ ﺑﺎ ﻧﺎﻡ ) T-568Bﻳﺎ
( EIAﻭ ) T-568Aﻳﺎ ،( A٢٥٨ ، T&ATﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺗﻨﻬﺎ ﺗﻔﺎﻭﺕ ﻣﻮﺟﻮﺩ ﺑﻴﻦ
ﺁﻧﺎﻥ ﺗﺮﺗﻴﺐ ﺍﺗﺼﺎﻻﺕ ﺍﺳﺖ.
397
ﺷﻤﺎﺭﻩ ﭘﻴﻦ ﻫﺎﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ T568B
ﻫﻤﺎﻧﮕﻮﻧﻪ ﮐﻪ ﺩﺭ ﺟﺪﻭﻝ ﺯﻳﺮ ﻣﺸﺎﻫﺪﻩ ﻣﻲ ﮔﺮﺩﺩ ،ﺷﻤﺎﺭﻩ ﭘﻴﻦ ﻫﺎﻱ ﻓﺮﺩ ﻫﻤﻮﺍﺭﻩ ﺳﻔﻴﺪ
ﺑﻮﺩﻩ ﮐﻪ ﺑﺎ ﻳﮏ ﻧﻮﺍﺭ ﺭﻧﮕﻲ ﭘﻮﺷﺶ ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﻧﺪ.
ﮐﺪ ﺭﻧﮓ ﻫﺎ ﺩﺭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ B٥٦٨T
ﺷﻤﺎﺭﻩ
ﺭﻧﮓ ﺯﻭﺝ ﮐﺎﺭﺑﺮﺩ
ﭘﻴﻦ
ﺳﻔﻴﺪ/
ﻳﮏ ﺩﻭﻡ TxData+
ﻧﺎﺭﻧﺠﻲ
ﺩﻭ ﻧﺎﺭﻧﺠﻲ ﺩﻭﻡ TxData-
RecvData+ﺳﻮﻡ ﺳﻔﻴﺪ /ﺳﺒﺰ ﺳﻪ
ﭼﻬﺎﺭ ﺁﺑﻲ ﻳﮏ
ﭘﻨﺞ ﺳﻔﻴﺪ /ﺁﺑﻲ ﻳﮏ
ﺷﺶ ﺳﺒﺰ ﺳﻮﻡ RecvData-
ﺳﻔﻴﺪ/ﻗﻬﻮﻩ
ﻫﻔﺖ ﭼﻬﺎﺭﻡ
ﺍﻱ
ﻗﻬﻮﻩ ﺍﻱ ﻫﺸﺖ ﭼﻬﺎﺭﻡ
ﺍﺳﺘﺎﻧﺪﺍﺭﺩ B٥٦٨T
398
ﺷﻤﺎﺭﻩ ﭘﻴﻦ ﻫﺎﻱ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ T568A
ﺩﺭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ، T568Aﺍﺗﺼﺎﻻﺕ ﺳﺒﺰ ﻭ ﻧﺎﺭﻧﺠﻲ ﺑﺮﻋﮑﺲ ﺷﺪﻩ ﺍﺳﺖ ،ﺑﻨﺎﺑﺮﺍﻳﻦ
ﺯﻭﺝ ﻫﺎﻱ ﻳﮏ ﻭ ﺩﻭ ﺑﺮ ﺭﻭﻱ ﭼﻬﺎﺭ ﭘﻴﻦ ﻭﺳﻂ ﻗﺮﺍﺭ ﻣﻲ ﮔﻴﺮﻧﺪ )ﺳﺎﺯﮔﺎﺭﻱ ﺑﺎ ﺍﺗﺼﺎﻻﺕ
.( telco voice
ﮐﺪ ﺭﻧﮓ ﻫﺎ ﺩﺭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ A٥٦٨T
ﺷﻤﺎﺭﻩ ﭘﻴﻦ ﺭﻧﮓ ﺯﻭﺝ ﮐﺎﺭﺑﺮﺩ
ﻳﮏ ﺳﻔﻴﺪ /ﺳﺒﺰ RecvData+ﺳﻮﻡ
ﺩﻭ ﺳﺒﺰ RecvData-ﺳﻮﻡ
ﺳﻪ ﺩﻭﻡ ﺳﻔﻴﺪ /ﻧﺎﺭﻧﺠﻲ TxData+
ﭼﻬﺎﺭ ﺁﺑﻲ ﻳﮏ
ﭘﻨﺞ ﺳﻔﻴﺪ /ﺁﺑﻲ ﻳﮏ
ﺷﺶ ﻧﺎﺭﻧﺠﻲ ﺩﻭﻡ TxData-
ﻫﻔﺖ ﭼﻬﺎﺭﻡ ﺳﻔﻴﺪ/ﻗﻬﻮﻩ ﺍﻱ
ﻫﺸﺖ ﻗﻬﻮﻩ ﺍﻱ ﭼﻬﺎﺭﻡ
ﺍﺳﺘﺎﻧﺪﺍﺭﺩ A٥٦٨T
399
ﻣﻮﺍﺭﺩ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﺘﺪﺍﻭﻟﺘﺮﻳﻦ ﮐﺎﺭﺑﺮﺩ ﻳﮏ ﮐﺎﺑﻞ ، straightﺍﺗﺼﺎﻝ ﺑﻴﻦ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ﻭ ﻫﺎﺏ /ﺳﻮﺋﻴﭻ
ﺍﺳﺖ .ﺩﺭ ﭼﻨﻴﻦ ﻣﻮﺍﺭﺩﻱ ،ﮐﺎﻣﭙﻴﻮﺗﺮ ﻣﺴﺘﻘﻴﻤﺎ" ﺑﻪ ﻫﺎﺏ ﻭ ﻳﺎ ﺳﻮﺋﻴﭻ ﻣﺘﺼﻞ ﺷﺪﻩ ﮐﻪ ﺑﻪ ﺻﻮﺭﺕ
ﺍﺗﻮﻣﺎﺗﻴﮏ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺪﺍﺭﺍﺗﻲ ﺧﺎﺹ ،ﮐﺎﺑﻞ over crossﻣﻲ ﮔﺮﺩﺩ.
ﺷﮑﻞ ﻓﻮﻕ ﻳﮏ ﺍﺗﺼﺎﻝ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ straightﺩﺭ ﮐﺎﺑﻞ ﻫﺎﻱ CAT5ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ ﮐﻪ ﺍﺯ
ﺁﻥ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﺗﺼﺎﻝ ﻳﮏ PCﺑﻪ ﻫﺎﺏ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﻣﻤﮑﻦ ﺍﺳﺖ ﺑﺎ ﻣﺸﺎﻫﺪﻩ ﺷﮑﻞ
ﻓﻮﻕ ﺍﻧﺘﻈﺎﺭ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﮐﻪ TX+ﻳﮏ ﻃﺮﻑ ﺑﻪ TX+ﻃﺮﻑ ﺩﻳﮕﺮ ﻣﺘﺼﻞ ﮔﺮﺩﺩ ) ﻋﻤﻼ"
ﺍﻳﻦ ﺍﺗﻔﺎﻕ ﻧﻴﺎﻓﺘﺎﺩﻩ ﺍﺳﺖ ( .ﺯﻣﺎﻧﻲ ﮐﻪ ﻳﮏ PCﺑﻪ ﻫﺎﺏ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ ،ﻫﺎﺏ ﺑﻪ ﺻﻮﺭﺕ
ﺍﺗﻮﻣﺎﺗﻴﮏ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻣﺪﺍﺭﺍﺕ ﺩﺍﺧﻠﻲ ﺧﻮﺩ ﮐﺎﺑﻞ ﺭﺍ X-overﻧﻤﻮﺩﻩ ﻭ ﺑﺪﻳﻦ ﺗﺮﺗﻴﺐ،
ﭘﻴﻦ ﺷﻤﺎﺭﻩ ﻳﮏ ﺍﺯ ﮐﺎﻣﭙﻴﻮﺗﺮ ) ( TX +ﺑﻪ ﭘﻴﻦ ﺷﻤﺎﺭ ﻳﮏ ﻫﺎﺏ ) ( RX +ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ.
ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻫﺎﺏ ﻋﻤﻠﻴﺎﺕ x-overﺭﺍ ﺍﻧﺠﺎﻡ ﻧﺪﻫﺪ ) ﺩﺭ ﺯﻣﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻮﺭﺕ
، ( Uplinkﭘﻴﻦ ﺷﻤﺎﺭﻩ ﻳﮏ ﮐﺎﻣﭙﻴﻮﺗﺮ ) (TX +ﺑﻪ ﭘﻴﻦ ﺷﻤﺎﺭﻩ ﻳﮏ ﻫﺎﺏ ) ( TX +ﻣﺘﺼﻞ
ﻣﻲ ﮔﺮﺩﺩ .ﺑﻨﺎﺑﺮﺍﻳﻦ ﻣﻬﻢ ﻧﻴﺴﺖ ﮐﻪ ﭼﻪ ﻧﻮﻉ ﻋﻤﻠﻴﺎﺗﻲ ﺭﺍ ﺑﺎ ﭘﻮﺭﺕ HUBﺍﻧﺠﺎﻡ ﻣﻲ ﺩﻫﻴـــﻢ
) Uplinkﻭ ﻳﺎ ﻧﺮﻣﺎﻝ ( ،ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﻧﺴﺒﺖ ﺩﺍﺩﻩ ﺷﺪﻩ ﺑﻪ ﻫﺸﺖ ﭘﻴﻦ ﺳﻤﺖ ،PC
ﻫﻤﻮﺍﺭﻩ ﻳﮑﺴﺎﻥ ﺑﺎﻗﻲ ﻣﺎﻧﺪﻩ ﻭ ﻫﺎﺏ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﻮﻉ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﭘﻮﺭﺕ ) ﻧﺮﻣﺎﻝ ﻭ ﻳﺎ
(Uplinkﻋﻤﻠﻴﺎﺕ ﻻﺯﻡ ﺭﺍ ﺍﻧﺠﺎﻡ ﺧﻮﺍﻫﺪ ﺩﺍﺩ.
400
ﻧﺤﻮﻩ ﻋﻤﻠﮑﺮﺩ ﺧﻄﻮﻁ T1
ﺍﮐﺜﺮ ﺷﻤﺎ ﺑﺎ ﻳﮏ ﺧﻂ ﻣﺨﺎﺑﺮﺍﺗﻲ ﻣﻌﻤﻮﻟﻲ ﺁﺷﻨﺎ ﻫﺴﺘﻴﺪ .ﺩﺭ ﺍﻳﻦ ﻧﻮﻉ ﺧﻄﻮﻁ ﺍﺯ ﻳﮏ ﺯﻭﺝ
ﺳﻴﻢ ﻣﺴﻲ ﮐﻪ ﻣﺴﺌﻮﻟﻴﺖ ﺍﻧﺘﻘﺎﻝ ﺻﻮﺕ ﺭﺍ ﺑﻪ ﺻﻮﺭﺕ ﺳﻴﮕﻨﺎﻝ ﻫﺎﻱ ﺁﻧﺎﻟﻮﮒ ﺑﺮﻋﻬﺪﻩ ﺩﺍﺭﺩ،
ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ .ﺯﻣﺎﻧﻲ ﮐﻪ ﺍﻳﻦ ﻧﻮﻉ ﺧﻄﻮﻁ ﺭﺍ ﺑﻪ ﻳﮏ ﻣﻮﺩﻡ ﻣﻌﻤﻮﻟﻲ ﻣﺘﺼﻞ ﻣﻲ ﻧﻤﺎﺋﻴﻢ،
ﺍﻣﮑﺎﻥ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﻩ ﺗﺎ ٣٠ﮐﻴﻠﻮ ﺑﻴﺖ ﺩﺭ ﺛﺎﻧﻴﻪ ﻓﺮﺍﻫﻢ ﻣﻲ ﮔﺮﺩﺩ.
ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺗﺤﻮﻻﺕ ﮔﺴﺘﺮﺩﻩ ﺩﺭ ﻋﺮﺻﻪ ﻣﺨﺎﺑﺮﺍﺗﻲ ،ﺍﮐﺜﺮ ﺷﺮﮐﺖ ﻫﺎﻱ ﻣﺨﺎﺑﺮﺍﺗﻲ ﺩﺭﺻﺪﺩ
ﺍﻧﺘﻘﺎﻝ ﺗﻤﺎﻣﻲ ﺗﺮﺍﻓﻴﮏ ﺻﻮﺗﻲ ﺧﻮﺩ ﺑﻪ ﺻﻮﺭﺕ ﺩﻳﺠﻴﺘﺎﻝ ﺩﺭ ﻣﻘﺎﺑﻞ ﺁﻧﺎﻟﻮﮒ ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺍﻳﻦ
ﺭﺍﺑﻄﻪ ﻣﻲ ﺑﺎﻳﺴﺖ ﺧﻂ ﺁﻧﺎﻟﻮﮒ ﺷﻤﺎ ﺑﻪ ﻳﮏ ﺳﻴﮕﻨﺎﻝ ﺩﻳﺠﻴﺘﺎﻝ ﺗﺒﺪﻳﻞ ﮔﺮﺩﺩ .ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﺩﺭ
ﻫﺮ ﺛﺎﻧﻴﻪ ٨٠٠٠ﺍﻟﮕﻮ ﻭ ﺑﺎ ﺩﻗﺖ ﻫﺸﺖ ﺑﻴﺖ ،ﻧﻤﻮﻧﻪ ﺑﺮﺩﺍﺭﻱ ﻣﻲ ﮔﺮﺩﺩ ) ٦٤،٠٠٠ﺑﻴﺖ ﺩﺭ
ﺛﺎﻧﻴﻪ( .ﺩﺭ ﺣﺎﻝ ﺣﺎﺿﺮ ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﻩ ﻫﺎﻱ ﺩﻳﺠﻴﺘﺎﻝ ﻋﻤﻮﻣﺎ" ﺍﺯ ﻓﻴﺒﺮﻧﻮﺭﻱ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺍﻳﻦ ﺭﺍﺑﻄﻪ ﺷﺮﮐﺖ ﻫﺎﻱ ﻣﺨﺎﺑﺮﺍﺗﻲ ﺍﺯ ﮔﺰﻳﻨﻪ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺩﺭ ﺧﺼﻮﺹ
ﻇﺮﻓﻴﺖ ﻫﺮ ﺧﻂ ﻓﻴﺒﺮ ﻧﻮﺭﻱ ،ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﻣﺤﻞ ﮐﺎﺭ ﺷﻤﺎ ﺍﺯ ﻳﮏ ﺧﻂ
T1ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ ،ﻧﺸﺎﻧﺪﻫﻨﺪﻩ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﺍﺳﺖ ﮐﻪ ﺷﺮﮐﺖ ﻣﺨﺎﺑﺮﺍﺕ ﻭ ﺳﺎﻳﺮ ﺷﺮﮐﺖ
ﻫﺎﻱ ﻋﺮﺿﻪ ﮐﻨﻨﺪﻩ ﺳﺮﻭﻳﺲ ﻓﻮﻕ ،ﻳﮏ ﺧﻂ ﻓﻴــﺒﺮﻧﻮﺭﻱ ﺭﺍ ﺗﺎ ﻣﺤﻞ ﺍﺩﺍﺭﻩ ﺷﻤﺎ ﺁﻣﺎﺩﻩ ﻧﻤﻮﺩﻩ
ﺍﻧﺪ ) .ﻳﮏ ﺧﻂ T1ﻣﻤﮑﻦ ﺍﺳﺖ ﺑﻪ ﺻﻮﺭﺕ ﻣﺴﻲ ﻧﻴﺰ ﺍﺭﺍﺋﻪ ﮔﺮﺩﺩ( .ﻳﮏ ﺧﻂ T1ﻗﺎﺩﺭ ﺑﻪ
ﺣﻤﻞ ٢٤ﮐﺎﻧﺎﻝ ﺻﻮﺗﻲ ﺩﻳﺠﻴﺘﺎﻝ ﻭ ﻳﺎ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﻩ ﺑﺎ ﻣﻴﺰﺍﻥ ١ / ٥٤٤ﻣﮕﺎﺑﻴﺖ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ
ﺍﺳﺖ.
ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺧﻂ T1ﺑﻪ ﻣﻨﻈﻮﺭ ﻣﺒﺎﺩﻻﺕ ﺗﻠﻔﻨﻲ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ ،ﺧﻂ ﻓﻮﻕ ﺑﻪ ﺳﻴﺴﺘﻢ
ﺗﻠﻔﻦ ﺍﺩﺍﺭﻩ ﺷﻤﺎ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﺯ ﺧﻂ T1ﺑﻪ ﻣﻨﻈﻮﺭ ﺍﻧﺘﻘﺎﻝ ﺩﺍﺩﻩ ﺍﺳﺘﻔﺎﺩﻩ
ﻣﻲ ﮔﺮﺩﺩ ،ﺧﻂ ﻓﻮﻕ ﺑﻪ ﺭﻭﺗﺮ ﺷﺒﮑﻪ ﻣﺘﺼﻞ ﻣﻲ ﮔﺮﺩﺩ.
ﻳﮏ ﺧﻂ T1ﻗﺎﺩﺭ ﺑﻪ ﺣﻤﻞ ﺣﺪﻭﺩ ١٩٢،٠٠٠ﺑﺎﻳﺖ ﺩﺭ ﻫﺮ ﺛﺎﻧﻴﻪ ﺍﺳﺖ ) ٦٠ﻣﺮﺗﺒﻪ ﺑﻴﺶ ﺍﺯ
ﻳﮏ ﻣﻮﺩﻡ ﻣﻌﻤﻮﻟﻲ( .ﺿﺮﻳﺐ ﺍﻋﺘﻤﺎﺩ ﺑﻪ ﺍﻳﻨﮕﻮﻧﻪ ﺧﻄﻮﻁ ﺩﺭ ﻣﻘﺎﻳﺴﻪ ﺑﺎ ﻳﮏ ﻣﻮﺩﻡ ﺁﻧﺎﻟﻮﮒ
401
ﺑﻤﺮﺍﺗﺐ ﺑﻴﺸﺘﺮ ﺍﺳﺖ .ﻳﮏ ﺧﻂ T1ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﻪ ﺻﻮﺭﺕ ﻣﺸﺘﺮﮎ ﺗﻮﺳﻂ ﮐﺎﺭﺑﺮﺍﻥ ﻣﺘﻌﺪﺩﻱ
ﺍﺳﺘﻔﺎﺩﻩ ﺷﻮﺩ )ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﻧﻮﻉ ﺍﺳﺘﻔﺎﺩﻩ ﮐﺎﺭﺑﺮﺍﻥ( .ﻣﺜﻼ" ﺩﺭ ﺻﻮﺭﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻌﻤﻮﻟﻲ ﺍﺯ
ﺍﻳﻨﺘﺮﻧﺖ ،ﺻﺪﻫﺎ ﮐﺎﺭﺑﺮ ﻗﺎﺩﺭ ﺑﻪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﺸﺘﺮﮎ ﺍﺯ ﻳﮏ ﺧﻂ T1ﻣﻲ ﺑﺎﺷﻨﺪ .ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ
ﺗﻤﺎﻣﻲ ﮐﺎﺭﺑﺮﺍﻥ ﻓﺎﻳﻞ ﻫﺎﻱ MP3ﺭﺍ Downloadﻧﻤﻮﺩﻩ ﻭ ﻳﺎ ﻓﺎﻳﻞ ﻫﺎﻱ ﻭﻳﺪﺋﻮﺋﻲ ﺭﺍ ﺑﻄﻮﺭ
ﻫﻤﺰﻣﺎﻥ ﻣﺸﺎﻫﺪﻩ ﻧﻤﺎﻳﻨﺪ ،ﻇﺮﻓﻴﺖ ﻭ ﭘﻬﻨﺎﻱ ﺑﺎﻧﺪ ﻣﻮﺟﻮﺩ ﺟﻮﺍﺑﮕﻮ ﻧﺨﻮﺍﻫﺪ ﺑﻮﺩ ،ﮔﺮﭼﻪ ﺍﺣﺘﻤﺎﻝ
ﺗﺤﻘﻖ ﭼﻨﻴﻦ ﺷﺮﺍﻳﻄﻲ ﺩﺭ ﻳﮏ ﻣﻘﻄﻊ ﺯﻣﺎﻧﻲ ﺧﺎﺹ ﻭ ﺑﻄﻮﺭ ﻫﻤﺰﻣﺎﻥ ،ﮐﻢ ﻣﻲ ﺑﺎﺷﺪ.
ﻳﮏ ﺷﺮﮐﺖ ﺑﺰﺭﮒ ﺑﻪ ﭼﻴﺰﻱ ﺑﻴﺶ ﺍﺯ ﻳﮏ ﺧﻂ T1ﻧﻴﺎﺯ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ .ﺟﺪﻭﻝ ﺯﻳﺮ ﺑﺮﺧﻲ
ﺍﺯ ﮔﺰﻳﻨﻪ ﻫﺎﻱ ﻣﺘﺪﺍﻭﻝ ﺭﺍ ﻧﺸﺎﻥ ﻣﻲ ﺩﻫﺪ:
402