ري
Wireless Networks
ري
تھ نا
1 تو ا
ھ نا
ھ نا
ري
Wireless Networks
ا"
و
تا !
Wireless Networks
ا %ا$ول :ا "
تا !
ﻤﺤﻁﺔ ﺍﻝﻌﻤل ﺍﻝﻼﺴﻠﮑﻴﺔ ا
ت
ﻁﺭﻴﻘﺔ ﺇﻋﺩﺍﺩ ﺸﺒﮑﺔ ﻻﺴﻠﮑﻴﺔ ﺒﺴﻴﻁﺔ ﺯﻴﺎﺩﺓ ﻗﻭﺓ ﺍﻹﺸﺎﺭﺓ ﻓﻲ ﺍﻝﺸﺒﮑﺎﺕ ﺍﻝﻼﺴﻠﮑﻴﺔ
ا %ا * ﻧ& :و!( ا'ر! ل ا & %وا ! & ا ھ
ا %ا * :+ا "
VPN
ﻤﻤﻴﺯﺍﺕ ﺸﺒﮑﺔ VPN ﺘﺠﻬﻴﺯ ﺨﺎﺩﻡ VPN
ا %ا ا :.أ ,ا "
2 تو ا
تا !
ھ نا
ري
Wireless Networks
ا %ا$ول :ا "
تا !
ﺘﻭﻓﺭ ﺍﻷﺴﻼﻙ ﺨﻴﺎﺭﺍﺕ ﻓﻌﺎﻝﺔ ﻝﺘﺒﺎﺩل ﺍﻝﺒﻴﺎﻨﺎﺕ ﻭﺍﻝﻤﻭﺍﺭﺩ ﻋﺒﺭ ﺍﻝـﺸﺒﮑﺎﺕ ،ﻭﻝﮑـﻥ ﺍﻷﺴﻼﻙ ﮑﻭﺴﻁ ﺇﺭﺴﺎل ﻻ ﻴﺨﻠﻭ ﻤﻥ ﺍﻝﻌﻴﻭﺏ ،ﺍﻝﺘﻲ ﺃﻫﻤﻬﺎ ﻋﺩﻡ ﻤﺭﻭﻨﺘﻬﺎ ،ﻷﻨﻬﺎ ﺇﺫﺍ ﻤﺩﺕ ﻭﺭﮑﺒﺕ ﻴﺼﺒﺢ ﻤﻥ ﺍﻝﺼﻌﺏ ﻨﺴﺒﻴﺎﹰ ﺇﻋﺎﺩﺓ ﺘﺭﮑﻴﺒﻬﺎ ﻓﻲ ﻤﮑﺎﻥ ﺁﺨﺭ ﺩﻭﻥ ﺒﺫل ﺠﻬﺩ ﻭﻤﻀﺎﻴﻘﺔ ﻻ ﻝﻠﻤﺴﺘﺨﺩﻤﻴﻥ ﮑﺜﻴﺭﻱ ﺍﻝﺘﻨﻘل. ﻝﻠﻤﺴﺘﺨﺩﻤﻴﻥ ،ﮑﻤﺎ ﺃﻨﻬﺎ ﻻ ﺘﻭﻓﺭ ﺍﺘﺼﺎ ﹰ ﻻ ﻝﻠﺘـﺸﺒﻴﻙ ﻓـﻲ ﺒﺩﺃﺕ ﺍﻝﺸﺒﮑﺎﺕ ﺍﻝﻤﺤﻠﻴﺔ ﺍﻝﻼﺴﻠﮑﻴﺔ LAN Wirelessﺘﺸﮑل ﺨﻴﺎﺭﹰﺍ ﻓﻌﺎ ﹰ ﺍﻵﻭﻨﺔ ﺍﻷﺨﻴﺭﺓ ،ﻭﺍﻝﺴﺒﺏ ﻓﻲ ﺫﻝﻙ ﻴﺘﻠﺨﺹ ﻓﻲ: -1ﺍﻝﺘﻁﻭﺭﺍﺕ ﺍﻝﻤﺘﻼﺤﻘﺔ ﻓﻲ ﺍﻝﺘﻘﻨﻴﺎﺕ ﻭﺍﻝﻤﻨﺘﺠﺎﺕ ﺍﻝﻼﺴﻠﮑﻴﺔ. -2ﺍﻻﻨﺨﻔﺎﺽ ﺍﻝﻤﺘﻭﺍﺼل ﻓﻲ ﺍﻷﺴﻌﺎﺭ ،ﻨﻅﺭﹰﺍ ﻝﻠﺘﻨﺎﻓﺱ ﺍﻝﻤﺘﺯﺍﻴﺩ ﺒﻴﻥ ﺍﻝﻤﺼﻨﻌﻴﻥ. -3ﺍﻝﻁﻠﺏ ﺍﻝﻤﺘﺯﺍﻴﺩ ﻋﻠﻰ ﻫﺫﻩ ﺍﻝﺸﺒﮑﺎﺕ ﺒﺴﺒﺏ ﺍﻝﺤﺭﻴﺔ ﺍﻝﮑﺒﻴﺭﺓ ﺍﻝﺘﻲ ﺘﻭﻓﺭﻫﺎ ﻝﻠﻤﺴﺘﺨﺩﻤﻴﻥ ﻓﻲ ﺍﻝﺘﻨﻘل ﺩﻭﻥ ﺃﻥ ﻴﺅﺜﺭ ﺫﻝﻙ ﻋﻠﻰ ﻋﻤﻠﻬﻡ. ﺘﺴﺘﻁﻴﻊ ﺍﻝﻤﮑﻭﻨﺎﺕ ﺍﻝﻼﺴﻠﮑﻴﺔ ﺃﺩﺍﺀ ﺍﻝﻤﻬﺎﻡ ﺍﻝﺘﺎﻝﻴﺔ: -1ﺘﻭﻓﻴﺭ ﺍﺘﺼﺎﻻﺕ ﻤﺅﻗﺘﺔ ﻝﺸﺒﮑﺎﺕ ﺴﻠﮑﻴﺔ ﻓﻲ ﺤﺎل ﻓـﺸل ﻫـﺫﻩ ﺍﻷﺴـﻼﻙ ﺒﺘـﻭﻓﻴﺭ ﺍﻻﺘﺼﺎل ﺍﻝﻤﻁﻠﻭﺏ ﻷﻱ ﺴﺒﺏ ﮑﺎﻥ. -2ﺍﻝﻤﺴﺎﻋﺩﺓ ﻓﻲ ﻋﻤل ﻨﺴﺨﺔ ﺍﺤﺘﻴﺎﻁﻴﺔ ﻤﻥ ﺍﻝﺒﻴﺎﻨﺎﺕ ﻋﻠﻰ ﺸﺒﮑﺔ ﺴﻠﮑﻴﺔ ﺇﻝـﻰ ﺠﻬـﺎﺯ ﻤﺘﺼل ﻻﺴﻠﮑﻴﺎﹰ. -3ﺘﻭﻓﻴﺭ ﺩﺭﺠﺔ ﻤﻥ ﺍﻝﺤﺭﻴﺔ ﻓﻲ ﺍﻝﺘﻨﻘل ﻝﺒﻌﺽ ﺍﻝﻤﺴﺘﺨﺩﻤﻴﻥ ﻓﻲ ﺸﺒﮑﺔ ﺴﻠﮑﻴﺔ. ﺘﻌﺘﺒﺭ ﺍﻝﺸﺒﮑﺎﺕ ﺍﻝﻼﺴﻠﮑﻴﺔ ﻤﻔﻴﺩﺓ ﻓﻲ ﺍﻝﺤﺎﻻﺕ ﺍﻝﺘﺎﻝﻴﺔ: -1ﺘﻭﻓﻴﺭ ﺍﺘﺼﺎﻻﺕ ﻓﻲ ﺍﻷﻤﺎﮑﻥ ﺍﻝﻤﺯﺩﺤﻤﺔ. -2ﺘﻭﻓﻴﺭ ﺍﺘﺼﺎﻻﺕ ﻝﻠﻤﺴﺘﺨﺩﻤﻴﻥ ﮑﺜﻴﺭﻱ ﺍﻝﺘﻨﻘل. -3ﺒﻨﺎﺀ ﺸﺒﮑﺎﺕ ﻓﻲ ﺍﻷﻤﺎﮑﻥ ﺍﻝﻤﻌﺯﻭﻝﺔ ﺍﻝﺘﻲ ﻴﺼﻌﺏ ﺘﻭﺼﻴﻠﻬﺎ ﺒﺄﺴﻼﻙ.
3 تو ا
ھ نا
ري
Wireless Networks
ﻭﻴﻤﮑﻥ ﺘﺸﺒﻴﻪ ﺍﻝﺸﺒﮑﺎﺕ ﺍﻝﻼﺴﻠﮑﻴﺔ ﺒﺸﺒﮑﺎﺕ ﺍﻝﻬﺎﺘﻑ ﺍﻝﻤﺤﻤﻭ،ل ﻓﺎﻝﻤﺴﺘﺨﺩﻡ ﻴﺴﺘﻁﻴﻊ ﻼ ﺒﺸﺒﮑﺘﻪ ﻤﺎ ﺩﺍﻡ ﻴﻘﻊ ﻓﻲ ﺍﻝﻤﺩﻯ ﺍﻝﺫﻱ ﺍﻝﺘﻨﻘل ﺇﻝﻰ ﺃﻱ ﻤﮑﺎﻥ ﻴﺤﻠﻭ ﻝﻪ ﻭﻴﺒﻘﻰ ﻤﻊ ﺫﻝﻙ ﻤﺘﺼ ﹰ ﺘﻐﻁﻴﻪ ﺍﻝﺸﺒﮑﺔ .ﻗﺩ ﻴﮑﻭﻥ ﻤﺼﻁﻠﺢ ﻻﺴﻠﮑﻲ ﻤﻀﻠل ﻨﻭﻋ ﹰﺎ ﻤﺎ ﻓﺄﻏﻠﺏ ﺍﻝـﺸﺒﮑﺎﺕ ﻻ ﺘﮑـﻭﻥ ﻻﺴﻠﮑﻴﺔ ﺘﻤﺎﻤﺎ ،ﻓﻔﻲ ﺃﻏﻠﺏ ﺍﻷﺤﻴﺎﻥ ﺘﮑﻭﻥ ﻫﺫﻩ ﺍﻝﺸﺒﮑﺎﺕ ﻋﺒﺎﺭﺓ ﻋﻥ ﺨﻠﻴﻁ ﻤﻥ ﺍﻷﺠﻬـﺯﺓ ﺍﻝﻤﻭﺼﻠﺔ ﺒﺄﺴﻼﻙ ﻭﺃﺠﻬﺯﺓ ﺃﺨﺭﻯ ﻤﻭﺼﻠﺔ ﻻﺴﻠﮑﻴﺎ ،ﻫﺫﺍ ﺍﻝﻨﻭﻉ ﻤﻥ ﺍﻝﺸﺒﮑﺎﺕ ﻴﻁﻠﻕ ﻋﻠﻴﻬﺎ ﺸﺒﮑﺎﺕ ﻫﺠﻴﻨﺔ .Hybrid
4 تو ا
ھ نا
ري
Wireless Networks
ﻤﺤﻁﺔ ﺍﻝﻌﻤل ﺍﻝﻼﺴﻠﮑﻴﺔ: ﻭﺘﻌﻤل ﺒﺸﮑل ﻤﺸﺎﺒﻪ ﻝﻠﻤﺤﻁﺎﺕ ﺍﻝﺴﻠﮑﻴﺔ ﻭﺍﻻﺨﺘﻼﻑ ﺍﻝﻭﺤﻴﺩ ﻴﺘﻤﺜﻝـ ﻓـﻲ ﻭﺴـﻁ ﺍﻹﺭﺴﺎل ﺍﻝﻤﺴﺘﺨﺩﻡ .ﮑل ﺠﻬﺎﺯ ﻓﻲ ﺍﻝﺸﺒﮑﺎﺕ ﺍﻝﻼﺴﻠﮑﻴﺔ ﻴﺤﺘﻭﻱ ﻋﻠﻰ ﮑﺎﺭﺕ ﺸﺒﮑﺔ ﻻﺴﻠﮑﻴﺔ ﻤﻊ ﻤﺭﺴل ﻤﺴﺘﻘﺒل Transceiverﻻﺴﻠﮑﻲ .ﻭﻴﻘﻭﻡ Transceiverﺒﺈﺫﺍﻋﺔ ﻭﺍﺴـﺘﻘﺒﺎل ﺍﻹﺸﺎﺭﺍﺕ ﻤﻥ ﻭﺇﻝﻰ ﺃﺠﻬﺯﺓ ﺍﻝﺤﺎﺴﺏ ﺍﻝﻤﺤﻴﻁﺔ ﺒﻪ .ﺃﻤﺎ ﻓـﻲ ﺍﻝـﺸﺒﮑﺎﺕ ﺍﻝﻬﺠﻴﻨـﺔ ﻓـﺈﻥ Transceiverﻴﺴﻤﺢ ﻝﻸﺠﻬﺯﺓ ﺍﻝﻼﺴﻠﮑﻴﺔ ﺒﺎﻻﺘﺼﺎل ﻤﻊ ﺍﻷﺠﻬـﺯﺓ ﺍﻝﻤﮑﻭﻨـﺔ ﻝﻠـﺸﺒﮑﺔ ﺍﻝﺴﻠﮑﻴﺔ. ﻫﻨﺎﻙ ﺜﻼﺙ ﺘﻘﻨﻴﺎﺕ ﺃﺴﺎﺴﻴﺔ ﺘﺴﺘﺨﺩﻡ ﻓﻲ ﺇﺭﺴﺎل ﺍﻝﺒﻴﺎﻨﺎﺕ ﻓﻲ ﺍﻝﺸﺒﮑﺎﺕ ﺍﻝﻼﺴﻠﮑﻴﺔ ﺍﻝﻤﺤﻠﻴﺔ: • ﻤﻭﺠﺎﺕ ﺍﻝﺭﺍﺩﻴﻭ ﺃﺤﺎﺩﻴﺔ ﺍﻝﺘﺭﺩﺩ Radio Single-Frequencyﻭﺘﺴﻤﻰ ﺃﺤﻴﺎﻨـ ﹰﺎ ﻤﻭﺠﺎﺕ ﺍﻝﺭﺍﺩﻴﻭ ﻋﺎﻝﻴﺔ ﺍﻝﺘﺭﺩﺩ ﻀﻴﻘﺔ ﺍﻝﻨﻁﺎﻕ. Narrow-Band High-Frequency Radio . • ﻤﻭﺠﺎﺕ ﺭﺍﺩﻴﻭ ﺍﻝﻁﻴﻑ ﺍﻹﻨﺘﺸﺎﺭﻱ Spread-Spectrum Radio. • ﻤﻭﺠﺎﺕ ﺍﻷﺸﻌﺔ ﺘﺤﺕ ﺍﻝﺤﻤﺭﺍﺀ .Infrared ﻴﻌﻤل ﺍﻻﺘﺼﺎل ﺒﻤﻭﺠﺎﺕ ﺍﻝﺭﺍﺩﻴﻭ ﻓﻲ ﺸﺒﮑﺎﺕ ﺍﻝﺤﺎﺴﺏ ﺒﺸﮑل ﻤﺸﺎﺒﻪ ﻝﻤﺎ ﻫﻭ ﻋﻠﻴﻪ ﻓﻲ ﺸﺒﮑﺎﺕ ﺍﻹﺫﺍﻋﺔ ،ﻓﺎﻝﺠﻬﺎﺯ ﺍﻝﻤﺭﺴل ﻴﻘﻭﻡ ﺒﺈﺭﺴﺎل ﺇﺸﺎﺭﺍﺘﻪ ﺒﺎﺴﺘﺨﺩﺍﻡ ﺘﺭﺩﺩ ﻤﻌﻴﻥ ﻭﻴﻘﻭﻡ ﺍﻝﺠﻬﺎﺯ ﺍﻝﻤﺴﺘﻘﺒل ﺒﻀﺒﻁ ﺘﺭﺩﺩﻩ ﻝﻴﺘﻭﺍﻓﻕ ﻤﻊ ﺘﺭﺩﺩ ﺍﻝﺠﻬﺎﺯ ﺍﻝﻤﺭﺴل ﻝﮑـﻲ ﻴـﺘﻤﮑﻥ ﻤـﻥ ﺍﺴﺘﻘﺒﺎل ﺍﻹﺸﺎﺭﺍﺕ .ﺍﻻﺨﺘﻼﻑ ﺍﻝﻭﺤﻴﺩ ﺒﻴﻥ ﺸﺒﮑﺎﺕ ﺤﺎﺴﺏ ﺍﻝﺭﺍﺩﻴﻭ ﻭﺸﺒﮑﺎﺕ ﺍﻹﺫﺍﻋﺔ ﻫﻭ ﺃﻥ ﺍﻝﺸﺒﮑﺎﺕ ﺒﻤﻭﺠﺎﺕ ﺍﻝﺭﺍﺩﻴﻭ ﺘﻘﻭﻡ ﺒﺈﺭﺴﺎل ﺍﻝﺒﻴﺎﻨﺎﺕ ﻭﻝﻴﺱ ﺍﻝﺭﺴﺎﺌل ﺍﻝﺼﻭﺘﻴﺔ ﮑﻤﺎ ﻓـﻲ ﺸﺒﮑﺎﺕ ﺍﻹﺫﺍﻋﺔ .ﻭﻴﻌﻤل Transceiverﺃﺤﺎﺩﻱ ﺍﻝﺘﺭﺩﺩ ﮑﻤﺎ ﻴﻅﻬﺭ ﻤﻥ ﺍﺴﻤﻪ ﺒﺎﺴـﺘﺨﺩﺍﻡ ﺘﺭﺩﺩ ﻭﺍﺤﺩ ﻓﻘﻁ.
5 تو ا
ھ نا
ري
Wireless Networks
ﺘﺴﺘﻁﻴﻊ ﺃﻨﻅﻤﺔ ﺍﻝﺭﺍﺩﻴﻭ ﺃﺤﺎﺩﻱ ﺍﻝﺘـﺭﺩﺩ Radio Single-Frequencyﺍﻝﻌﻤﻝـ ﺒﺎﺴﺘﺨﺩﺍﻡ ﺃﻱ ﺘﺭﺩﺩ ﻴﻨﺘﻤﻲ ﺇﻝﻰ ﻤﺩﻯ ﺘﺭﺩﺩﺍﺕ ﺍﻝﺭﺍﺩﻴـﻭ Radio Frequency Range ) ،(RFﻭﺒﺸﮑل ﻋﺎﻡ ﺘﺴﺘﺨﺩﻡ ﺸﺒﮑﺎﺕ ﺍﻝﺤﺎﺴﺏ ﺍﻝﻤﺩﻯ ﺍﻝﻌﺎﻝﻲ ﻤﻥ ﻁﻴﻑ ﺘﺭﺩﺩﺍﺕ ﺍﻝﺭﺍﺩﻴـﻭ ﻭﺍﻝﺘﻲ ﺘﻘﺎﺱ ﺒﺎﻝﻐﻴﻐﺎﻫﻴﺭﺘﺯ ،ﻭﺫﻝﻙ ﻷﻨﻬﺎ ﺘﻭﻓﺭ ﻤﻌﺩﻻﺕ ﺇﺭﺴﺎل ﺃﻋﻠﻰ ﻝﻠﺒﻴﺎﻨﺎﺕ. ﻭﺒﺸﮑل ﻋﺎﻡ ،ﻓﺈﻥ ﺃﻨﻅﻤﺔ ﺇﺭﺴﺎل ﺍﻝﺭﺍﺩﻴﻭ ﺴﻬﻠﺔ ﺍﻝﺘﺭﮑﻴﺏ ﻭﺍﻹﻋﺩﺍﺩ ،ﻭﻝﮑﻥ ﺍﺴﺘﺨﺩﺍﻡ ﺃﻨﻅﻤﺔ ﻋﺎﻝﻴﺔ ﺍﻝﻁﺎﻗﺔ ﻝﺘﻐﻁﻴﺔ ﻤﺴﺎﺤﺎﺕ ﮑﺒﻴﺭﺓ ﻴﻌﺘﺒﺭ ﺃﮑﺜﺭ ﺘﻌﻘﻴﺩﹰﺍ ﻷﻨﻬﺎ ﺘـﺴﺘﺨﺩﻡ ﺃﺠﻬـﺯﺓ ﻋﺎﻝﻴﺔ ﺍﻝﺠﻬﺩ ﻭﺘﺤﺘﺎﺝ ﺇﻝﻰ ﺼﻴﺎﻨﺔ ﻤﺴﺘﻤﺭﺓ ﻭﺃﻴﺩﻱ ﻋﺎﻤﻠﺔ ﺨﺒﻴﺭﺓ .ﻭﺘﺫﮑﺭ ﺃﻥ ﺍﻹﻋﺩﺍﺩ ﺍﻝﺴﻴﺊ ﻷﺠﻬﺯﺓ ﺍﻝﺘﺭﺩﺩ ﺍﻷﺤﺎﺩﻱ ﻗﺩ ﻴﺅﺩﻱ ﺇﻝﻰ: • ﺇﺸﺎﺭﺍﺕ ﻤﺯﻴﻔﺔ. • ﺍﺴﺘﺨﺩﺍﻡ ﻀﻌﻴﻑ ﻝﻘﻭﺓ ﺍﻹﺭﺴﺎل. • ﻤﻌﺩﻻﺕ ﺇﺭﺴﺎل ﺒﻴﺎﻨﺎﺕ ﻤﻨﺨﻔﻀﺔ. ﻴﻌﺘﻤﺩ ﺍﻝﺘﻀﻌﻴﻑ ﻓﻲ ﺇﺸﺎﺭﺍﺕ ﺍﻝﺭﺍﺩﻴﻭ ﻋﻠﻰ ﺘﺭﺩﺩ ﻭﻗﻭﺓ ﺍﻹﺸﺎﺭﺓ ﺍﻝﻤﺭﺴﻠﺔ ،ﻓﮑﻠﻤـﺎ ﺍﺭﺘﻔﻊ ﺍﻝﺘﺭﺩﺩ ﻭﻗﻭﺓ ﺍﻹﺸﺎﺭﺓ ﮑﻠﻤﺎ ﺃﺼﺒﺢ ﺍﻝﺘﻀﻌﻴﻑ ﺃﻗل .ﻭﺤﻴﺙ ﺃﻥ ﺃﺠﻬﺯﺓ ﺍﻝﺭﺍﺩﻴـﻭ ﺫﺍﺕ ﺍﻝﺘﺭﺩﺩ ﺍﻷﺤﺎﺩﻱ ﺭﺨﻴﺼﺔ ﺍﻝﺜﻤﻥ ﺘﻌﻤل ﺒﺎﺴﺘﺨﺩﺍﻡ ﺘﺭﺩﺩ ﻤﻨﺨﻔﺽ ﻭﻗﻭﺓ ﻤﺤﺩﻭﺩﺓ ﻓﺈﻨﻬﺎ ﻋﺎﺩﺓ ﺘﻌﺎﻨﻲ ﻤﻥ ﻤﻌﺩﻻﺕ ﺘﻀﻌﻴﻑ ﻋﺎﻝﻴﺔ ،ﻭﻝﻬﺫﺍ ﻓﺈﻨﻬﺎ ﻻ ﺘﺴﺘﻁﻴﻊ ﺘﻐﻁﻴﺔ ﻤـﺴﺎﺤﺔ ﮑﺒﻴـﺭﺓ ﻭﻻ ﺘﺴﺘﻁﻴﻊ ﺍﻝﻤﺭﻭﺭ ﺨﻼل ﺍﻷﺠﺴﺎﻡ ﺍﻝﮑﺜﻴﻔﺔ ﻭﺍﻝﻤﺼﻤﺘﺔ .ﻭﺒﺸﮑل ﻋﺎﻡ ﺘﻌﺘﺒﺭ ﺃﺠﻬﺯﺓ ﺍﻝﺭﺍﺩﻴـﻭ ﺃﺤﺎﺩﻱ ﺍﻝﺘﺭﺩﺩ ﺃﻗل ﺘﮑﻠﻔﺔ ﻤﻥ ﻏﻴﺭﻫﺎ ﻤﻥ ﺍﻝﻭﺴﺎﺌﻁ ﺍﻝﻼﺴﻠﮑﻴﺔ ﻭﺘﻌﻤﻝـ ﺒﺘـﺭﺩﺩﺍﺕ ﺃﮑﺜـﺭ ﺍﻨﺨﻔﺎﻀﺎ ﻭﻻ ﺘﺘﺠﺎﻭﺯ ﻗﻭﺓ ﺍﻹﺸﺎﺭﺓ ﺃﮑﺜﺭ ﻤﻥ ﻭﺍﺕ ﻭﺍﺤﺩ .ﻭﺘﺘﺭﺍﻭﺡ ﺴﺭﻋﺔ ﻨﻘل ﺍﻝﺒﻴﺎﻨـﺎﺕ ﻓﻲ ﺸﺒﮑﺎﺕ ﺍﻝﺭﺍﺩﻴﻭ ﺃﺤﺎﺩﻴﺔ ﺍﻝﺘﺭﺩﺩ ﺒﻴﻥ 1ﻤﻴﺠﺎﺒﺕ ﻓﻲ ﺍﻝﺜﺎﻨﻴﺔ ﻭ 10ﻤﻴﺠﺎﺒﺕ ﻓﻲ ﺍﻝﺜﺎﻨﻴﺔ. ﺘﻌﺘﺒﺭ ﺇﺸﺎﺭﺍﺕ ﺍﻝﺭﺍﺩﻴﻭ ﺃﺤﺎﺩﻱ ﺍﻝﺘﺭﺩﺩ ﻋﺭﻀﺔ ﻝﻠﺘﺩﺍﺨل ﺍﻝﮑﻬﺭﻭﻤﻐﻨﺎﻁﻴﺴﻲ ﻭﺨﺎﺼﺔ ﻓـﻲ ﻤﺩﻯ ﺍﻝﺘﺭﺩﺩ ﺍﻝﻤﻨﺨﻔﺽ ﻭﺍﻝﺫﻱ ﻴﺘﺩﺍﺨل ﻤﻊ ﻤﻭﺠﺎﺕ ﺃﺠﻬﺯﺓ ﺍﻝﻤﺴﺘﻬﻠﮑﻴﻥ ﻤﺜل ﺃﺠﻬﺯﺓ ﻓـﺘﺢ ﺃﺒﻭﺍﺏ ﻤﺭﺁﺏ ﺍﻝﺴﻴﺎﺭﺍﺕ .ﺇﻥ ﺍﻋﺘﺭﺍﺽ ﺍﻹﺸﺎﺭﺍﺕ ﻭﺍﻝﺘﺠﺴﺱ ﻋﻠﻴﻬﺎ ﻓﻲ ﻫﺫﻩ ﺍﻷﻨﻅﻤﺔ ﺃﻤﺭ 6 تو ا
ھ نا
ري
Wireless Networks
ﻏﺎﻴﺔ ﻓﻲ ﺍﻝﺴﻬﻭﻝﺔ ﺇﺫﺍ ﻋﺭﻑ ﺘﺭﺩﺩ ﺍﻹﺭﺴﺎل .ﺃﻤﺎ ﺸﺒﮑﺎﺕ ﺭﺍﺩﻴﻭ ﺍﻝﻁﻴـﻑ ﺍﻹﻨﺘـﺸﺎﺭﻱ ﺃﻭ ﻤﺘﻌﺩﺩ ﺍﻝﺘﺭﺩﺩ Spread-Spectrum Radioﻓﻬﻲ ﺘﻌﺘﺒﺭ ﺍﻝﺘﻘﻨﻴﺔ ﺍﻷﮑﺜﺭ ﺍﺴﺘﺨﺩﺍﻤ ﹰﺎ ﻓـﻲ ﺍﻝﺸﺒﮑﺎﺕ ﺍﻝﻼﺴﻠﮑﻴﺔ ،ﻭﻗﺩ ﻁﻭﺭﺕ ﻫﺫﻩ ﺍﻝﺘﻘﻨﻴﺔ ﺃﻭل ﻤﺭﺓ ﻤﻥ ﻗﺒل ﺍﻝﺠﻴﺵ ﺍﻷﻤﺭﻴﮑﻲ ﺨـﻼل ﺍﻝﺤﺭﺏ ﺍﻝﻌﺎﻝﻤﻴﺔ ﺍﻝﺜﺎﻨﻴﺔ ﻝﻤﻨﻊ ﻋﻤﻠﻴﺎﺕ ﺍﻝﺘﺠﺴﺱ ﻋﻠﻰ ﺇﺭﺴﺎل ﺍﻝﺭﺍﺩﻴﻭ. ﺘﺴﺘﺨﺩﻡ ﺸﺒﮑﺎﺕ ﺭﺍﺩﻴﻭ ﺍﻝﻁﻴﻑ ﺍﻹﻨﺘﺸﺎﺭﻱ ﻋﺩﺓ ﺘﺭﺩﺩﺍﺕ ﻤﻌ ﹰﺎ ﻝﻨﻘل ﺍﻹﺸـﺎﺭﺓ ﻤﻤـﺎ ﻴﻘﻠل ﻤﻥ ﺍﻝﻤﺸﺎﮑل ﺍﻝﻤﺘﻌﻠﻘﺔ ﺒﺎﻹﺭﺴﺎل ﺃﺤﺎﺩﻱ ﺍﻝﺘﺭﺩﺩ .ﻭﻫﻨﺎﻙ ﺘﻘﻨﻴﺘﺎﻥ ﺃﺴﺎﺴﻴﺘﺎﻥ ﺘﺴﺘﺨﺩﻤﺎﻥ ﻓﻲ ﺸﺒﮑﺎﺕ ﺭﺍﺩﻴﻭ ﺍﻝﻁﻴﻑ ﺍﻹﻨﺘﺸﺎﺭﻱ ﻫﻤﺎ: • ﺍﻝﺘﺘﺎﺒﻊ ﺍﻝﻤﺒﺎﺸﺭ .Modulation Direct Sequence • ﺍﻝﻘﻔﺯﺍﺕ ﺍﻝﺘﺭﺩﺩﻴﺔ Frequency Hopping. ﺘﻌﺘﺒﺭ ﺘﻘﻨﻴﺔ ﺍﻝﺘﺘﺎﺒﻊ ﺍﻝﻤﺒﺎﺸﺭ ﺃﮑﺜﺭ ﺍﺴﺘﺨﺩﺍﻤ ﹰﺎ ﻤﻥ ﺍﻝﺘﻘﻨﻴﺔ ﺍﻷﺨﺭﻯ .ﺒﻴﺎﻨﺎﺘﻬﺎ ﺍﻝﻤﺸﻔﺭﺓ ﻋﺒﺭ ﻤﺠﻤﻭﻋﺔ ﻤﻥ ﺘﺭﺩﺩﺍﺕ ﺍﻝﺭﺍﺩﻴﻭ ﻓﻲ ﻨﻔﺱ ﺍﻝﻭﻗﺕ ﻭﺘﻘﻭﻡ ﺃﻴـﻀﺎﹰ ﺒﺈﻀـﺎﻓﺔ Bitsﻤـﻥ ﺍﻝﺒﻴﺎﻨﺎﺕ ﺍﻝﻤﺯﻭﺭﺓ ﺍﻝﺘﻲ ﻝﻴﺱ ﻝﻬﺎ ﺃﻱ ﻓﺎﺌﺩﺓ ﺴﻭﻯ ﺘـﻀﻠﻴل ﺍﻷﺠﻬـﺯﺓ ﺍﻝﻤـﺴﺘﻘﺒﻠﺔ ﻏﻴـﺭ ﺍﻝﻤﺭﺨﺹ ﻝﻬﺎ ﺒﺎﺴﺘﻘﺒﺎل ﻫﺫﻩ ﺍﻝﺒﻴﺎﻨﺎﺕ ،ﻭﻴﻁﻠﻕ ﻋﻠﻰ ﻫﺫﻩ ﺍﻝـ Bitsﺍﻝﻤﺯﻭﺭﺓ ﺍﺴﻡ Chips ﻭﻴﻌﺭﻑ ﺍﻝﺠﻬﺎﺯ ﺍﻝﻤﺭﺨﺹ ﻝﻪ ﺒﺎﻻﺴﺘﻘﺒﺎل ﻤﺴﺒﻘ ﹰﺎ ﺍﻝﺘﺭﺩﺩﺍﺕ ﺍﻝﺘﻲ ﺴـﺘﺤﺘﻭﻱ ﻋﻠـﻰ ﺒﻴﺎﻨﺎﺕ ﺼﺎﻝﺤﺔ ﻓﻴﻘﻭﻡ ﺒﺠﻤﻊ ﻫﺫﻩ ﺍﻝﺒﻴﺎﻨﺎﺕ ﻭﺍﺴﺘﺒﻌﺎﺩ ﺍﻹﺸﺎﺭﺍﺕ ﻏﻴﺭ ﺍﻝﺼﺎﻝﺤﺔ .ﺃﻤـﺎ ﻓـﻲ ﺘﻘﻨﻴﺔ ﺍﻝﻘﻔﺯﺍﺕ ﺍﻝﺘﺭﺩﺩﻴﺔ Frequency Hoppingﻓﺈﻥ ﺍﻹﺸﺎﺭﺍﺕ ﺘﻨﺘﻘل ﺒﺴﺭﻋﺔ ﻤﻥ ﺘﺭﺩﺩ ﺇﻝﻰ ﺁﺨﺭ ،ﻭﻴﮑﻭﻥ ﻫﻨﺎﻙ ﺘﻔﺎﻫﻡ ﻤﺴﺒﻕ ﺒﻴﻥ ﺍﻝﺠﻬﺎﺯ ﺍﻝﻤﺭﺴل ﻭﺍﻝﺠﻬـﺎﺯ ﺍﻝﻤـﺴﺘﻘﺒل ﻋﻠـﻰ ﺍﺴﺘﺨﺩﺍﻡ ﻨﻤﻭﺫﺝ ﻤﻌﻴﻥ ﻓﻲ ﺘﻨﻅﻴﻡ ﺍﻝﻘﻔﺯﺍﺕ ﺒﻴﻥ ﺍﻝﺘﺭﺩﺩﺍﺕ ﺍﻝﻤﺨﺘﻠﻔﺔ ﻭﺍﻝﻔﺘﺭﺍﺕ ﺍﻝﺯﻤﻨﻴﺔ ﺍﻝﺘﻲ ﺘﻔﺼل ﺒﻴﻥ ﮑل ﻗﻔﺯﺓ ﻭﺃﺨﺭﻯ. ﻴﺘﺒﻊ ﮑل ﻤﺼﻨﻊ ﺃﻭ ﻤﻨﺘﺞ ﻨﻤﻭﺫﺠﻪ ﺍﻝﺨﺎﺹ ﻓﻲ ﺍﻝﺨﻭﺍﺭﺯﻤﻴﺔ ﺍﻝﻤﺘﺒﻌﺔ ﻓﻲ ﺍﻝﻘﻔـﺯﺍﺕ ﺍﻝﺘﺭﺩﺩﻴﺔ ﺍﻝﺘﻲ ﻴﺴﺘﺨﺩﻤﻬﺎ ﺍﻝﺠﻬﺎﺯ ﺃﻥ ﺍﻝﻤﺭﺴل ﻭﺍﻝﻤﺴﺘﻘﺒل .ﻭﺘﻌﺘﺒﺭ ﺴﻌﺔ ﻨﻁﺎﻕ ﺍﻝﺒﺙ ﻓـﻲ ﺘﻘﻨﻴﺔ ﺍﻝﻘﻔﺯﺍﺕ ﺍﻝﺘﺭﺩﺩﻴﺔ ﺃﮑﺒﺭ ﻤﻨﻬﺎ ﻓﻲ ﺘﻘﻨﻴﺔ ﺍﻝﺘﺘﺎﺒﻊ ﺍﻝﻤﺒﺎﺸـﺭ ﻭﺫﻝـﻙ ﻨﺘﻴﺠـﺔ ﻷﻥ ﮑﻝـ
7 تو ا
ھ نا
ري
Wireless Networks
ﺍﻝﺘﺭﺩﺩﺍﺕ ﻓﻲ ﺍﻝﻨﻁﺎﻕ ﺘﮑﻭﻥ ﻤﺘﺎﺤﺔ ﻝﻼﺴﺘﺨﺩﺍﻡ ﻤﻥ ﻗﺒل ﺘﻘﻨﻴﺔ ﺍﻝﻘﻔﺯﺍﺕ ﺍﻝﺘﺭﺩﺩﻴـﺔ ﺒﻌﮑـﺱ ﺘﻘﻨﻴﺔ ﺍﻝﺘﺘﺎﺒﻊ ﺍﻝﻤﺒﺎﺸﺭ ﺍﻝﺘﻲ ﺘﺴﺘﺨﺩﻡ ﻤﺠﻤﻭﻋﺔ ﻤﻥ ﺍﻝﺘﺭﺩﺩﺍﺕ ﻭﻝﮑﻥ ﻝﻴﺱ ﮑﻠﻬـﺎ .ﻭﺘﻌﺘﺒـﺭ ﺃﻨﻅﻤﺔ ﺍﻝﻁﻴﻑ ﺍﻹﻨﺘﺸﺎﺭﻱ ﻤﻌﺘﺩﻝﺔ ﺍﻝﺘﮑﻠﻔﺔ ﻨﺴﺒﻴﺎﹰ ﻭﺫﻝﻙ ﻭﻓﻘ ﹰﺎ ﻝﻸﺠﻬﺯﺓ ﺍﻝﻤﺴﺘﺨﺩﻤﺔ.
8 تو ا
ھ نا
ري
Wireless Networks
ﺴﺭﻋﺔ ﻨﻘل ﺍﻝﺒﻴﺎﻨﺎﺕ:
ﺘﺘﺭﺍﻭﺡ ﺴﺭﻋﺔ ﻨﻘل ﺍﻝﺒﻴﺎﻨﺎﺕ ﻓﻲ ﻫﺫﺍ ﺍﻝﻨﻅﺎﻡ ﻤﺎ ﺒﻴﻥ 2ﻭ 6ﻤﻴﺠﺎﺒﺕ ﻓﻲ ﺍﻝﺜﺎﻨﻴـﺔ
ﻭﻝﮑﻥ ﻤﻊ ﺍﺴﺘﺨﺩﺍﻡ ﻁﺎﻗﺔ ﺃﮑﺒﺭ ﻭﻨﻁﺎﻕ ﺃﻋﻠﻰ ﻤﻥ ﺍﻝﺘﺭﺩﺩ ﻤﻥ ﺍﻝﻤﻤﮑـﻥ ﺍﻝﺤـﺼﻭل ﻋﻠـﻰ ﺴﺭﻋﺎﺕ ﺃﮑﺒﺭ ﺒﮑﺜﻴﺭ .ﻭﻝﮑﻥ ﻨﻅﺭﺍ ﻻﺴﺘﺨﺩﺍﻡ ﻁﺎﻗﺔ ﻤﻨﺨﻔﻀﺔ ﻝﻺﺭﺴـﺎل ﻓـﻲ ﺍﻝـﺸﺒﮑﺎﺕ ﻤﺘﻭﺍﻀﻌﺔ ﺍﻝﺘﮑـﺎﻝﻴﻑ ﻓﺈﻨﻬـﺎ ﺘﮑـﻭﻥ ﻋﺭﻀـﺔ ﻝﻠﺘـﻀﻌﻴﻑ ،ﺃﻤـﺎ ﺒﺎﻝﻨـﺴﺒﺔ ﻝﻠﺘـﺩﺍﺨل ﺍﻝﮑﻬﺭﻭﻤﻐﻨﺎﻁﻴﺴﻲ ﻓﻨﻼﺤﻅ ﺃﻥ ﻨﻅﺎﻡ ﺭﺍﺩﻴﻭ ﺍﻝﻁﻴﻑ ﺍﻹﻨﺘﺸﺎﺭﻱ ﻴﻌﺘﺒﺭ ﺃﮑﺜﺭ ﻤﻨﺎﻋﺔ ﻀﺩ ﻫﺫﺍ ﺍﻝﺘﺩﺍﺨل ﻤﻥ ﺍﻷﻨﻅﻤﺔ ﺍﻷﺨﺭﻯ ،ﻭﻤﻤﮑﻥ ﺘﻭﻀﻴﺢ ﺫﻝﻙ ﺒﺄﻥ ﺍﻹﺸﺎﺭﺍﺕ ﻴـﺘﻡ ﺒﺜﻬـﺎ ﻋﺒـﺭ ﺘﺭﺩﺩﺍﺕ ﻤﺨﺘﻠﻔﺔ ،ﻭﺒﺎﻝﺘﺎﻝﻲ ﻓﺈﻥ ﺃﻱ ﺘﺩﺍﺨل ﻗﺩ ﻴﺘﻡ ﻤﻊ ﺃﺤﺩ ﻫﺫﻩ ﺍﻝﺘﺭﺩﺩﺍﺕ ﺩﻭﻥ ﻏﻴﺭﻫﺎ ﻤﻤﺎ ﻻ ﻴﺅﺜﺭ ﻋﻠﻰ ﺍﻹﺸﺎﺭﺓ ﮑﮑل ﻭﺍﻝﺘﻲ ﺘﮑﻭﻥ ﻤﻭﺯﻋﺔ ﻋﻠﻰ ﺘﺭﺩﺩﺍﺕ ﻤﺨﺘﻠﻔﺔ ﻤﻊ ﻤﻼﺤﻅﺔ ﺃﻨـﻪ ﻤﻊ ﺯﻴﺎﺩﺓ ﻤﻌﺩل ﻨﻘل ﺍﻝﺒﻴﺎﻨﺎﺕ ﻋﺒﺭ ﺍﻝﺘﺭﺩﺩﺍﺕ ﺍﻝﻤﺨﺘﻠﻔﺔ ﻴﺯﺩﺍﺩ ﻤﻌﺩل ﺍﻝﺘﺩﺍﺨل ﻨﻅﺭﹰﺍ ﻝﺯﻴﺎﺩﺓ ﻤﻌﺩل ﺍﺴﺘﺨﺩﺍﻡ ﺍﻝﺘﺭﺩﺩﺍﺕ ﺍﻝﻤﻌﺭﻀﺔ ﻝﻠﺘﺩﺍﺨل ﻓﻲ ﻭﻗﺕ ﻤﻌﻴﻥ. ﺇﻥ ﺍﻋﺘﺭﺍﺽ ﺇﺸﺎﺭﺍﺕ ﺭﺍﺩﻴﻭ ﺍﻝﻁﻴﻑ ﺍﻹﻨﺘﺸﺎﺭﻱ ﻤﻤﮑﻥ ﻭﻝﮑﻥ ﺍﻝﺘﺠﺴﺱ ﻋﻠﻰ ﻫﺫﻩ ﺍﻹﺸﺎﺭﺍﺕ ﺸﺒﻪ ﻤﺴﺘﺤﻴل ﻭﺨﺎﺼﺔ ﺃﻥ ﺍﻝﻤﺘﺠﺴﺱ ﻻ ﻴﻌﺭﻑ ﺍﻝﺘﺭﺩﺩﺍﺕ ﺍﻝﻤﺨﺘﻠﻔﺔ ﺍﻝﻤﺴﺘﺨﺩﻤﺔ ﻓﻲ ﺍﻹﺭﺴﺎل ﻭﻻ ﻴﻌﺭﻑ ﺍﻝﺘﻔﺭﻴﻕ ﺒﻴﻥ ﺍﻝﺒﻴﺎﻨﺎﺕ ﺍﻝﺼﺎﻝﺤﺔ ﺃﻭ ﻏﻴﺭ ﺍﻝﻁﺎﻝﺤـﺔ .ﻭﺘـﺴﺘﺨﺩﻡ ﺒﻌﺽ ﺍﻝﺸﺒﮑﺎﺕ ﺍﻝﻼﺴﻠﮑﻴﺔ ﺍﻝﻀﻭﺀ ﻝﻨﻘل ﺍﻝﺒﻴﺎﻨﺎﺕ ﻭﻫﻲ ﻨﻭﻋﺎﻥ: • ﺸﺒﮑﺎﺕ ﺍﻷﺸﻌﺔ ﺘﺤﺕ ﺍﻝﺤﻤﺭﺍﺀ. • ﺸﺒﮑﺎﺕ ﺍﻝﻠﻴﺯﺭ ﻭ ﻫﻲ ﺘﻭﻓﺭ ﺴﺭﻋﺎﺕ ﻋﺎﻝﻴﺔ ﺠﺩﹰﺍ ﻝﮑﻥ ﺘﮑﻠﻔﺘﻬﺎ ﻤﺭﺘﻔﻌﺔ ﺠﺩﹰﺍ ﺃﻴﻀﺎﹰ. ﺍﻝﺒﻴﺎﻨﺎﺕ ﺒﺎﺴﺘﺨﺩﺍﻡ ﺍﻝﺼﻤﺎﻡ ﺍﻝﺜﻨﺎﺌﻰ ﺒﺎﻋﺙ ﻝﻠﻀﻭﺀ Emitting Diode (LED) Light ﺃﻭ ﺍﻝﺼﻤﺎﻡ ﺍﻝﺜﻨﺎﺌﻰ ﻗﺎﺫﻑ ﺍﻝﻠﻴﺯﺭ ) .Injection Laser Diode (ILDﮑﻤﺎ ﺃﻥ ﺇﺸﺎﺭﺍﺕ ﺍﻷﺸﻌﺔ ﺘﺤﺕ ﺍﻝﺤﻤﺭﺍﺀ ﻻ ﺘﺴﺘﻁﻴﻊ ﺍﺨﺘﺭﺍﻕ ﺍﻝﺠﺩﺭﺍﻥ ﺃﻭ ﺍﻷﺠﺴﺎﻡ ﺍﻝﺼﻠﺒﺔ ﮑﻤﺎ ﺃﻨﻬﺎ ﺘﻀﻌﻑ ﺇﺫﺍ ﺘﻌﺭﻀﺕ ﻹﻀﺎﺀﺓ ﺸﺩﻴﺩﺓ.
9 تو ا
ھ نا
ري
Wireless Networks
ﺇﺫﺍ ﺍﻨﻌﮑﺴﺕ ﺇﺸﺎﺭﺍﺕ ﺍﻷﺸﻌﺔ ﺘﺤﺕ ﺍﻝﺤﻤﺭﺍﺀ ﻋﻥ ﺍﻝﺠﺩﺭﺍﻥ ﻓﺈﻨﻬﺎ ﺘﺨـﺴﺭ ﻨـﺼﻑ ﻁﺎﻗﺘﻬﺎ ﻤﻊ ﮑل ﺍﻨﻌﮑﺎﺱ ،ﻭﻨﻅﺭﹰﺍ ﻝﻤﺩﺍﻫﺎ ﻭﺜﺒﺎﺘﻬﺎ ﺍﻝﻤﺤﺩﻭﺩ ﻓﺈﻨﻬﺎ ﺘﺴﺘﺨﺩﻡ ﻋﺎﺩﺓ ﻓﻲ ﺍﻝﺸﺒﮑﺎﺕ ﺍﻝﻤﺤﻠﻴﺔ ﺍﻝﺼﻐﻴﺭﺓ .ﻭﻴﺘﺭﺍﻭﺡ ﺍﻝﻤﺩﻯ ﺍﻝﺘﺭﺩﺩﻱ ﺍﻝﺫﻱ ﺘﻌﻤل ﻓﻴﻪ ﺍﻷﺸﻌﺔ ﺘﺤﺕ ﺍﻝﺤﻤﺭﺍﺀ ﻤـﺎ ﺒﻴﻥ 100ﻏﻴﻐﺎﻫﺭﺘﺯ ﻭ 300ﺘﻴﺭﺍﻫﺭﺘﺯ .ﻭﻨﻅﺭﻴ ﹰﺎ ﺘﺴﺘﻁﻴﻊ ﺍﻷﺸﻌﺔ ﺘﺤﺕ ﺍﻝﺤﻤﺭﺍﺀ ﺘﻭﻓﻴﺭ ﺴﺭﻋﺎﺕ ﺇﺭﺴﺎل ﻋﺎﻝﻴﺔ ﻭﻝﮑﻥ ﻋﻤﻠﻴ ﹰﺎ ﻓﺈﻥ ﺍﻝﺴﺭﻋﺔ ﺍﻝﻔﻌﻠﻴﺔ ﺍﻝﺘﻲ ﺘﺭﺴﻠﻬﺎ ﺃﺠﻬﺯﺓ ﺍﻹﺭﺴـﺎل ﺒﺎﻷﺸﻌﺔ ﺘﺤﺕ ﺍﻝﺤﻤﺭﺍﺀ ﺃﻗل ﻤﻥ ﺫﻝﻙ ﺒﮑﺜﻴﺭ .ﻭﺘﻌﺘﻤﺩ ﺘﮑﻠﻔﺔ ﺃﺠﻬﺯﺓ ﺍﻷﺸﻌﺔ ﺘﺤﺕ ﺍﻝﺤﻤﺭﺍﺀ ﻋﻠﻰ ﺍﻝﻤﻭﺍﺩ ﺍﻝﻤﺴﺘﺨﺩﻤﺔ ﻓﻲ ﺘﻨﻘﻴﺔ ﻭﺘﺭﺸﻴﺢ ﺍﻷﺸﻌﺔ ﺍﻝﻀﻭﺌﻴﺔ .ﻭﺘﺴﺘﺨﺩﻡ ﺸﺒﮑﺎﺕ ﺍﻹﺭﺴﺎل ﺒﺎﺴﺘﺨﺩﺍﻡ ﺍﻷﺸﻌﺔ ﺘﺤﺕ ﺍﻝﺤﻤﺭﺍﺀ ﺜﻼﺙ ﺘﻘﻨﻴﺎﺕ ﻫﻰ: • ﻨﻘﻁﺔ ﺇﻝﻰ ﻨﻘﻁﺔ .Point To Point • ﺇﺭﺴﺎل ﻤﻨﺘﺸﺭ ﺃﻭ ﺇﺫﺍﻋﻲ .Broadcast • ﺍﻹﺭﺴﺎل ﺍﻝﻌﺎﮑﺱ .Reflective ﺘﺘﻁﻠﺏ ﺘﻘﻨﻴﺔ ﻨﻘﻁﺔ ﺇﻝﻰ ﻨﻘﻁﺔ ﺨﻁ ﹰﺎ ﻤﺒﺎﺸﺭﹰﺍ ﻴﺴﻤﺢ ﻝﮑل ﻤـﻥ ﺍﻝﺠﻬـﺎﺯ ﺍﻝﻤﺭﺴﻝـ ﻭﺍﻝﻤﺴﺘﻘﺒل ﺭﺅﻴﺔ ﺃﺤﺩﻫﻤﺎ ﺍﻵﺨﺭ ﻝﺫﺍ ﻴﺘﻡ ﺘﺼﻭﻴﺒﻬﻤﺎ ﺒﺩﻗﺔ ﻝﻴﻭﺍﺠﻪ ﮑل ﻤﻨﻬﻤﺎ ﺍﻵﺨﺭ ،ﻓﺈﺫﺍ ﻝﻡ ﻴﺘﻭﻓﺭ ﺨﻁ ﻤﺒﺎﺸﺭ ﺒﻴﻥ ﺍﻝﺠﻬﺎﺯﻴﻥ ﻓﺴﻴﻔﺸل ﺍﻻﺘﺼﺎل. ﻭﻤﺜﺎل ﻋﻠﻰ ﻫﺫﻩ ﺍﻝﺘﻘﻨﻴﺔ ﻫﻭ ﺠﻬﺎﺯ ﺍﻝﺘﺤﮑﻡ ﺒـﺎﻝﺘﻠﻔﺯﻴﻭﻥ .ﻭﻨﻅـﺭﺍﹰ ﻝﻠﺤﺎﺠـﺔ ﺇﻝـﻰ ﺍﻝﺘﺼﻭﻴﺏ ﺍﻝﺩﻗﻴﻕ ﻝﻸﺠﻬﺯﺓ ﻓﺈﻥ ﺘﺭﮑﻴﺏ ﻫﺫﻩ ﺍﻷﻨﻅﻤﺔ ﻓﻴﻪ ﺼﻌﻭﺒﺔ .ﻭﺘﺘﺭﺍﻭﺡ ﺴﺭﻋﺔ ﻨﻘﻝـ ﺍﻝﺒﻴﺎﻨﺎﺕ ﺒﺎﺴﺘﺨﺩﺍﻡ ﻫﺫﻩ ﺍﻝﺘﻘﻨﻴﺔ ﺒﻴﻥ ﺒﻀﻊ ﮑﻴﻠﻭﺍﺕ ﻤﻥ Bitsﻓﻲ ﺍﻝﺜﺎﻨﻴﺔ ﻭﻗﺩ ﺘﺼل ﺇﻝﻰ 16 ﻤﻴﺠﺎﺒﺕ ﻓﻲ ﺍﻝﺜﺎﻨﻴﺔ ﻋﻠﻰ ﻤﺩﻯ ﮑﻴﻠﻭﻤﺘﺭ ﻭﺍﺤﺩ .ﻭﻴﻌﺘﻤﺩ ﻤﻘﺩﺍﺭ ﺍﻝﺘﻀﻌﻴﻑ ﻓـﻲ ﺇﺸـﺎﺭﺍﺕ ﺍﻷﺸﻌﺔ ﺘﺤﺕ ﺍﻝﺤﻤﺭﺍﺀ ﻋﻠﻰ ﮑﺜﺎﻓﺔ ﻭﻭﻀﻭﺡ ﺍﻷﺸﻌﺔ ﺍﻝﻤﺒﺜﻭﺜﺔ ﮑﻤﺎ ﻴﻌﺘﻤﺩ ﻋﻠﻰ ﺍﻝﻅـﺭﻭﻑ ﺍﻝﻤﻨﺎﺨﻴﺔ ﻭﺍﻝﻌﻘﺒﺎﺕ ﻓﻲ ﻁﺭﻴﻕ ﺍﻷﺸﻌﺔ ،ﻭﮑﻠﻤﺎ ﮑﺎﻨﺕ ﺍﻷﺸﻌﺔ ﻤﺼﻭﺒﺔ ﺒﺸﮑل ﺃﺩﻕ ﮑﻠﻤﺎ ﻗل ﻤﺴﺘﻭﻯ ﺍﻝﺘﻀﻌﻴﻑ ﮑﻤﺎ ﺃﻨﻪ ﻴﺼﺒﺢ ﻤﻥ ﺍﻝﺼﻌﺏ ﺍﻋﺘﺭﺍﺽ ﺍﻷﺸﻌﺔ ﺃﻭ ﺍﻝﺘﺠﺴﺱ ﻋﻠﻴﻬﺎ.
10 تو ا
ھ نا
ري
Wireless Networks
ﺃﻤﺎ ﺘﻘﻨﻴﺔ ﺍﻹﺭﺴﺎل ﺍﻝﻤﻨﺘﺸﺭ ﻓﺈﻥ ﺍﻷﺸﻌﺔ ﻴﺘﻡ ﻨﺸﺭﻫﺎ ﻋﻠﻰ ﻤﺴﺎﺤﺔ ﻭﺍﺴﻌﺔ ﻭﻴﻁﻠـﻕ ﻋﻠﻰ ﺸﺒﮑﺎﺕ ﺍﻹﺭﺴﺎل ﺍﻝﻤﻨﺘﺸﺭ ﺃﺤﻴﺎﻨﺎﹰ ﺸﺒﮑﺎﺕ ﺍﻷﺸﻌﺔ ﺘﺤﺕ ﺍﻝﺤﻤﺭﺍﺀ ﺍﻝﻤﺒﻌﺜﺭﺓ Scatter .Infrared Networks ﻭﻫﻨﺎ ﻴﺴﺘﻁﻴﻊ ﺠﻬﺎﺯ ﻭﺍﺤﺩ ﺍﻻﺘﺼﺎل ﻤﻊ ﺃﮑﺜﺭ ﻤﻥ ﺠﻬﺎﺯ ﻓﻲ ﻭﻗﺕ ﻭﺍﺤـﺩ ﻭﻫـﺫﺍ ﺍﻷﻤﺭ ﻴﻌﺘﺒﺭ ﻤﻴﺯﺓ ﻤﻥ ﻨﺎﺤﻴﺔ ﻭﻋﻴﺏ ﻤﻥ ﻨﺎﺤﻴﺔ ﺃﺨﺭﻯ ﺤﻴﺙ ﺃﻨـﻪ ﻴـﺴﻤﺢ ﻻﻋﺘـﺭﺍﺽ ﺍﻹﺸﺎﺭﺓ ﻭﺍﻝﺘﺠﺴﺱ ﻋﻠﻴﻬﺎ .ﻭﻨﺠﺩ ﺃﻥ ﺴﺭﻋﺔ ﻨﻘل ﺍﻝﺒﻴﺎﻨﺎﺕ ﻓﻲ ﻫﺫﻩ ﺍﻝﺘﻘﻨﻴﺔ ﺃﻗل ﻤﻨﻬـﺎ ﻓـﻲ ﺍﻝﺘﻘﻨﻴﺔ ﺍﻝﺴﺎﺒﻘﺔ ﻓﻬﻲ ﻻ ﺘﺘﺠﺎﻭﺯ 1ﻤﻴﺠﺎﺒﺕ ﻓﻲ ﺍﻝﺜﺎﻨﻴﺔ ﻭﻤﺭﺸﺤﺔ ﻝﻠﺯﻴﺎﺩﺓ ﻓـﻲ ﺍﻝﻤـﺴﺘﻘﺒ،ل ﻭﻝﮑﻥ ﻓﻲ ﺍﻝﻤﻘﺎﺒل ﻓﺈﻥ ﺇﻋﺩﺍﺩﻫﺎ ﺃﺴﺭﻉ ﻭﺃﺴﻬل ﻭ ﺃﮑﺜﺭ ﻤﺭﻭﻨﺔ ،ﻭﻫﻲ ﺃﻴﻀ ﹰﺎ ﺘﺘـﺄﺜﺭ ﺴـﻠﺒ ﹰﺎ ﺒﺎﻝﻀﻭﺀ ﺍﻝﻤﺒﺎﺸﺭ ﻭﺒﺎﻝﻌﻭﺍﻤل ﺍﻝﺠﻭﻴﺔ ،ﻭﻻ ﻴﺘﺠﺎﻭﺯ ﺍﻝﻤﺩﻯ ﺍﻝﺫﻱ ﺘﻐﻁﻴﻪ ﻫـﺫﻩ ﺍﻝﺘﻘﻨﻴـﺔ ﺇﺫﺍ ﮑﺎﻨﺕ ﻁﺎﻗﺘﻬﺎ ﻀﻌﻴﻔﺔ ﺒﻀﻊ ﻋﺸﺭﺍﺕ ﻤﻥ ﺍﻷﻤﺘﺎﺭ. ﺃﻤﺎ ﺍﻝﻨﻭﻉ ﺍﻝﺜﺎﻝﺙ ﻭﻫﻭ ﺍﻝﻌﺎﮑﺱ Reflectiveﻓﻬﻭ ﻋﺒﺎﺭﺓ ﻋـﻥ ﺩﻤـﺞ ﻝﻠﻨـﻭﻋﻴﻥ ﺍﻝﺴﺎﺒﻘﻴﻥ ،ﻭﻓﻴﻪ ﻴﻘﻭﻡ ﮑل ﺠﻬﺎﺯ ﺒﺎﻹﺭﺴﺎل ﻨﺤﻭ ﻨﻘﻁﺔ ﻤﻌﻴﻨﺔ ﻭﻓﻲ ﻫـﺫﻩ ﺍﻝﻨﻘﻁـﺔ ﻴﻭﺠـﺩ Transceiverﻴﻘﻭﻡ ﺒﺈﻋﺎﺩﺓ ﺇﺭﺴﺎل ﺍﻹﺸﺎﺭﺓ ﺇﻝﻰ ﺍﻝﺠﻬﺎﺯ ﺍﻝﻤﻁﻠﻭﺏ.
11 تو ا
ھ نا
ري
Wireless Networks
ﻁﺭﻴﻘﺔ ﺇﻋﺩﺍﺩ ﺸﺒﮑﺔ ﻻﺴﻠﮑﻴﺔ ﺒﺴﻴﻁﺔ:
ﺍﻷﻤﺭ ﺃﺒﺴﻁ ﺒﮑﺜﻴﺭ ﻤﻤﺎ ﻴﺘﺼﻭﺭﻩ ﺍﻝﺒﻌﺽ ،ﻫﻨﺎ ﺴﻴﺘﻡ ﺸﺭﺡ ﺇﻋﺩﺍﺩ ﺸﺒﮑﺔ ﻻﺴـﻠﮑﻴﺔ
ﻤﮑﻭﻨﺔ ﻤﻥ ﺠﻬﺎﺯ ﺤﺎﺴﺏ ﻤﻨﺯﻝﻲ ﻭﺠﻬﺎﺯ ﺤﺎﺴﺏ ﻤﺤﻤﻭل ﻭﻨﻘﻁﺔ ﺍﺘـﺼﺎل ﺃﻭ Access Point.ﮑﻤﺎ ﻫﻭ ﻤﻌﻠﻭﻡ ﻓﻲ ﺍﻝﺸﺒﮑﺎﺕ ﺍﻝﻼﺴﻠﮑﻴﺔ ﺍﻝﻤﮑﻭﻨﺔ ﻤﻥ 3ﺃﺠﻬﺯﺓ ﻤﺜﻼﹰ ،ﻓـﺈﻥ ﮑﻝـ ﺠﻬﺎﺯ ﻴﺠﺏ ﺃﻥ ﻴﺤﻭﻱ ﻋﻠﻰ ﮑﺭﺕ ﺸﺒﮑﺔ ﻭﮑل ﺍﻷﺠﻬﺯﺓ ﺘﮑﻭﻥ ﻤﻭﺼـﻠﺔ ﺒﺎﻝــ hubﺃﻭ ﺒﺎﻝـ switchﻝﻴﺘﻡ ﺘﺒﺎﺩل ﺍﻝﻤﻠﻔﺎﺕ ﻭ ﺍﻝﺒﻴﺎﻨﺎﺕ ﻤﻥ ﺨﻼل ﻭﺤﺩﺓ ﻤﻭﺯﻋﺔ ﻝﻬﻡ. ﻤﺘﻁﻠﺒﺎﺕ ﺍﻝﺸﺒﮑﺔ ﺍﻝﻼﺴﻠﮑﻴﺔ ﻓﻲ ﻤﺜﺎﻝﻨﺎ ﻫﻲ: ﻻ ﻨﺄﺨﺫ ﻨﻭﻉ Wireless D-Link USB ﮑﺭﺕ ﺸﺒﮑﺔ ﻻﺴﻠﮑﻴﺔ ﻝﻠﺠﻬﺎﺯ ﺍﻝﻤﻨﺯﻝﻲ ﻤﺜﺎ ﹰ
ﺍﻝﮑﺭﺕ ﺍﻷﻭل :Wireless D-Link USB Adapter DWL 120,ﻫﻭ ﮑـﺭﺕ ﻴـﺘﻡ ﺘﺭﮑﻴﺒﻪ ﺒﺎﻝﺤﺎﺴﺏ ﻝﻴﺘﻤﮑﻥ ﺍﻝﺤﺎﺴﺏ ﻤﻥ ﺍﻻﺘﺼﺎل ﺒﺎﻝﺸﺒﮑﺔ ﺍﻝﻼﺴﻠﮑﻴﺔ ﺍﻝﻤﻭﺠﻭﺩﺓ ﻓـﻲ ﻤـﺩﺍﻩ ﺒﺩﻭﻥ ﺃﺴﻼﻙ! ﻴﺘﻡ ﺘﻭﺼﻴل ﻫﺫﺍ ﺍﻝﮑﺭﺕ ﺒﻭﺍﺴﻁﺔ ﻤﻨﻔﺫ ﺍﻝـ USBﺍﻝﻤﻌﺭﻭﻑ .ﮑـﺭﻭﺕ ﺍﻝـﺸﺒﮑﺎﺕ ﺍﻝﻼﺴﻠﮑﻴﺔ ﺍﻝﻤﺴﺘﺨﺩﻤﺔ ﻝﻠﺤﺎﺴﺏ ﻓﻲ ﺍﻝﻤﺎﻀﻲ ،ﮑﺎﻥ ﻴﺘﻡ ﺘﻭﺼﻴﻠﻬﺎ ﻤﻥ ﺨﻼل ﮑﺭﺕ ﺨـﺎﺹ ﻤﻥ ﻨﻭﻉ PCIﻭ ﻻ ﺘﺯﺍل ﻫﺫﻩ ﺍﻝﮑﺭﻭﺕ ﻤﻭﺠﻭﺩﺓ ،ﻝﮑﻥ ﻤﻊ ﺘﻁﻭﺭ ﺍﻝﺘﻘﻨﻴـﺔ ،ﺘـﻡ ﺇﻨﺘـﺎﺝ ﮑﺭﻭﺕ ﻴﺘﻡ ﺘﻭﺼﻴﻠﻬﺎ ﺒﻤﻨﻔﺫ ﺍﻝـ USBﺴﺭﻋﺔ ﻫﺫﺍ ﺍﻝﮑﺭﺕ 11ﻤﻴﻐﺎ ﺒﺕ ﻓﻲ ﺍﻝﺜﺎﻨﻴﺔ ﺤﻴﺙ ﺍﻨﻪ ﻴﺴﺎﻭﻱ )ﺘﻘﺭﻴﺒﺎﹰ( ﺴﺭﻋﺔ ﺍﻝﺸﺒﮑﺎﺕ ﺍﻝﺴﻠﮑﻴﺔ )ﺫﺍﺕ ﺍﻝـ 10ﻤﻴﻐﺎ ﺒـﺕ ﻓـﻲ ﺍﻝﺜﺎﻨﻴـﺔ(.
12 تو ا
ھ نا
ري
Wireless Networks
ﻴﺠﺏ ﺍﺘﺒﺎﻉ ﺍﻝﺨﻁﻭﺍﺕ ﺍﻝﻤﻭﺠﻭﺩﺓ ﻓﻲ ﺍﻝﺩﻝﻴل ﺍﻝﺨﺎﺹ ﺒﺘﻌﺭﻴﻑ ﺍﻝﮑﺭﺕ .ﻤﻊ ﻫﺫﺍ ﺍﻝﮑﺭﺕ ﻓﻲ ﺍﻝﺒﺩﺍﻴﺔ ﻴﺘﻡ ﺇﺩﺨﺎل ﺍﻝﻘﺭﺹ ﺍﻝﻤﺩﻤﺞ )ﺍﻝﺴﻲ ﺩﻱ( ﺍﻝﺨﺎﺹ ﺒﺎﻝﮑﺭﺕ ﻭ ﻴﺘﻡ ﺘﺨﺯﻴﻥ ﺍﻝﺒﺭﻨـﺎﻤﺞ ﺍﻝﺨﺎﺹ ﺒﻪ ،ﻭ ﺒﻌﺩﻫﺎ ﺴﻴﻁﻠﺏ ﻤﻨﻙ ﺍﻝﺠﻬﺎﺯ ﺇﻋﺎﺩﺓ ﺍﻝﺘﺸﻐﻴل. ﺍﻵﻥ ﻗﻡ ﺒﺘﻭﺼﻴل ﻭﺼﻠﺔ ﺍﻝـ USBﺒﺎﻝﺤﺎﺴﺏ ﻭ ﺜﻡ ﺸﻐل ﺍﻝﺤﺎﺴـﺏ ,ﺴـﻴﺨﺒﺭﻙ ﺍﻝﻭﻴﻨﺩﻭﺯ ﺃﻥ ﻫﻨﺎﻙ ﺠﻬﺎﺯ ﺠﺩﻴﺩ ﺘﻡ ﺘﻭﺼﻴﻠﻪ ﺒﺎﻝﺤﺎﺴﺏ ﻭﻴﺠﺏ ﺘﻌﺭﻴﻔـﻪ ،ﺍﮑﻤﻝـ ﻋﻤﻠﻴـﺔ ﺍﻝﺘﻌﺭﻴﻑ ﮑﻤﺎ ﻫﻭ ﻤﻌﺘﺎﺩ. ﻤﻼﺤﻅﺔ ﻴﺘﻡ ﺘﻭﺼﻴل ﮑﺒل ﺍﻝـ USBﺒﺎﻝﻔﺘﺤﺔ ﺍﻝﺼﻐﻴﺭﺓ ﺍﻝﻤﻭﺠﻭﺩﺓ ﻓﻲ ﻤﻘﺩﻤـﺔ ﺍﻝﮑـﺭﺕ ﻭﺍﻝﻁﺭﻑ ﺍﻵﺨﺭ ﻴﻭﺼل ﺒﺎﻝﺠﻬﺎﺯ. ﺍﻝﮑﺭﺕ ﺍﻝﺜﺎﻨﻲ :Wireless D-Link PCMCIA Adapter DWL-650+ﻫﻭ ﮑﺭﺕ ﻴﺘﻡ ﺘﺭﮑﻴﺒﻪ ﻓﻲ ﺃﺠﻬﺯﺓ ﺍﻝﺤﺎﺴﺏ ﺍﻝﻤﺤﻤﻭﻝﺔ ،ﻓﻬﻭ ﻴﺴﺘﺨﺩﻡ ﻤﻨﻔﺫ ﺍﻝـ PCMCIAﻁﺭﻴﻘـﺔ ﺘﻌﺭﻴﻔﻪ ﻫﻲ ﻤﺜل ﺍﻝﮑﺭﺕ ﺍﻝﺴﺎﺒﻕ .ﻭﻝﻴﺘﻤﮑﻥ ﺍﻝﺤﺎﺴﺏ ﺍﻝﻤﺤﻤﻭل ﻤـﻥ ﺍﻻﺘـﺼﺎل ﺒﺎﻝـﺸﺒﮑﺔ ﺍﻝﻼﺴﻠﮑﻴﺔ ﺍﻝﻤﻭﺠﻭﺩﺓ ﻓﻲ ﻤﺩﺍﻩ ﺒﺩﻭﻥ ﺃﺴﻼﻙ! ﻭ ﺤﺴﺏ ﺍﻝﻨﻭﻋﻴﺔ ﺘﺼل ﺴﺭﻋﺘﻬﺎ ﺇﻝـﻰ 22 ﻤﻴﻐﺎ ﺒﺕ ﻓﻲ ﺍﻝﺜﺎﻨﻴﺔ. ﻤﻼﺤﻅﺔ :ﻴﻤﮑﻥ ﺍﺴﺘﺨﺩﺍﻡ ﺍﻝﮑﺭﺕ ﺍﻷﻭل ﺃﻴﻀ ﹰﺎ ﻤﻨﻔﺫ USB
ﺍﻝﺤﺎﺴﺒﺎﺕ ﺍﻝﻤﺤﻤﻭﻝﺔ ﻓﻲ ﺤـﺎل ﺘـﻭﻓﺭ ﻓﻲ
ﻨﻘﻁﺔ ﺍﺘﺼﺎ،ل ﮑﻤﺜﺎل ﻨﺄﺨﺫ ﻨﻭﻉ: Wireless D-Link DWL 900AP+ Access Point ﻋﻤل ﻫﺫﺍ ﺍﻝﺠﻬﺎﺯ ﻫﻭ ﻨﻔﺱ ﻋﻤل ﺍﻝـ HUBﺃﻭ ﺍﻝـ Switchﻓـﻲ ﺍﻝﺸﺒﮑﺎﺕ ﺍﻝﺴﻠﮑﻴﺔ ،ﻓﮑﺭﻭﺕ ﺍﻝﺸﺒﮑﺔ ﻋﻨﺩ ﺘﺸﻐﻴﻠﻬﺎ ﺘﺒﺤﺙ ﻋﻥ ﺃﻱ ﻨﻘﻁﺔ ﺍﺘﺼﺎل ﻓﻲ ﻤﺩﺍﻫﺎ ﻝﺘﺘﺼل ﺒﻪ .ﺠﺩﻴﺭ ﺒﺎﻝﺫﮑﺭ ﺃﻥ ﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل ﻝﻴﺴﺕ ﻤﺤﺩﻭﺩﺓ ﺒﻌﺩﺩ ﻤﻌﻴﻥ ﻤﻥ ﺃﺠﻬﺯﺓ ﺍﻝﺤﺎﺴﺏ ﺍﻝﻤﺘﺼﻠﺔ ﺒﻬﺎ ،ﻴﻤﮑﻥ ﺘﻭﺼﻴل
13 تو ا
ھ نا
ري
Wireless Networks
ﻋﺩﺩ ﮑﺒﻴﺭ ﻤﻥ ﺍﻷﺠﻬﺯﺓ ﺒﻨﻘﻁﺔ ﺍﺘﺼﺎل ﻭﺍﺤﺩﺓ ﻓﻘﻁ ﺒﺨﻼﻑ ﺍﻝـ hubﺤﻴﺙ ﺍﻨـﻪ ﻤﺤـﺩﻭﺩ ﺒﻌﺩﺩ ﻤﻌﻴﻥ ﻤﻥ ﺍﻝﻤﻨﺎﻓﺫ .ﻭﻝﮑﻥ ﻋﻨﺩ ﺍﺭﺘﻔﺎﻉ ﻋﺩﺩ ﺍﻷﺠﻬﺯﺓ ﺍﻝﻤﺘﺼﻠﺔ ﻓﺎﻥ ﺍﻝـﺴﺭﻋﺔ ﺴـﺘﻘل ﻭﺍﻷﺩﺍﺀ ﺴﻴﻀﻌﻑ ﺒﻁﺒﻴﻌﺔ ﺍﻝﺤﺎل. ﻫﺫﻩ ﺍﻝﺼﻭﺭﺓ ﺘﻭﻀﺢ ﺍﻝﺘﻭﺼﻴل ﺍﻝﺸﺒﮑﻲ ﻓﻲ ﺍﻝﺒﻴﺌﺔ ﺍﻝﻼﺴﻠﮑﻴﺔ:
ﻝﮑل ﻨﻘﻁﺔ ﺍﺘﺼﺎل ﻤﺩﻯ ﻤﻌﻴﻥ ﻴﺴﺘﻁﻴﻊ ﺃﻥ ﻴﻐﻁﻴﻪ ﻭﻓﻲ ﻤﺜﺎﻝﻨﺎ ﻓﺎﻥ ﺍﻝﻤﺩﻯ ﻴﺼل ﺇﻝﻰ 100 ﻤﺘﺭ ﺘﻘﺭﻴﺒ ﹰﺎ ﻓﻲ ﺍﻷﻤﺎﮑﻥ ﺍﻝﻤﻔﺘﻭﺤﺔ ﻭﻴﻨﺨﻔﺽ ﺍﻝﻤﺩﻯ ﻓﻲ ﺍﻷﻤﺎﮑﻥ ﺍﻝﺩﺍﺨﻠﻴﺔ. ﻭﮑﻤﺎ ﺫﮑﺭﻨﺎ ﺴﺎﺒﻘ ﹰﺎ ﻓﺎﻥ ﮑل ﮑﺭﺕ ﻋﻨﺩ ﺘﺸﻐﻴﻠﻪ ﻓﺎﻨﻪ ﻴﺒﺤﺙ ﻋﻥ ﺃﻱ ﻨﻘﻁﺔ ﺍﺘﺼﺎل ﻓﻲ ﻤـﺩﺍﻩ ﮑﻲ ﻴﺘﺼل ﺒﻬﺎ ﻭ ﻫﺫﺍ ﺍﻝﻭﻀـﻊ )ﺍﺘـﺼﺎل ﺍﻝﺤﺎﺴـﺏ ﺒﻨﻘﻁـﺔ ﺍﺘـﺼﺎل( ﻴـﺴﻤﻰ ﺒــ Infrastructure Modeﻴﻤﮑﻥ ﺃﻴﻀﺎ ﺘﻭﺼﻴل ﺠﻬﺎﺯﻴﻥ ﻤﻊ ﺒﻌﻀﻬﻤﺎ ﻤﻥ ﻏﻴﺭ ﻭﺠـﻭﺩ ﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل ﻫﺫﺍ ﺍﻝﻭﻀﻊ ﻴﺴﻤﻰ Ad Hocﮑﻤﺎ ﻫﻭ ﻤﺒﻴﻥ ﻓﻲ ﺍﻝﺼﻭﺭﺓ
14 تو ا
ھ نا
ري
Wireless Networks
ﺇﻋﺩﺍﺩﺍﺕ ﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل: ﺒﻌﺩ ﺍﻻﻨﺘﻬﺎﺀ ﻤﻥ ﺘﻌﺭﻴﻑ ﮑﺭﻭﺕ ﺍﻝﺸﺒﮑﺔ ﻭﺘﺸﻐﻴل ﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل )ﻴﮑﻔﻲ ﺃﻥ ﻨﻭﺼل ﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل ﺒﺎﻝﮑﻬﺭﺒﺎﺀ ﻭ ﺴﺘﻌﻤل ﺒﺎﻹﻋﺩﺍﺩﺍﺕ ﺍﻻﻓﺘﺭﺍﻀﻴﺔ( ﻴﺠﺏ ﺃﻥ ﻨﺨﺘﺎﺭ ﻭﻨﺤﺩﺩ IP Addressﻝﮑل ﮑﺭﺕ ،ﻻﻥ ﺍﻝـ DHCP Serverﺍﻝﻤﻭﺠﻭﺩ ﻓﻲ ﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل ﻏﻴـﺭ ﻤﻔﻌل ﻓﻲ ﺍﻹﻋﺩﺍﺩﺍﺕ ﺍﻻﻓﺘﺭﺍﻀﻴﺔ. ﻴﺘﻡ ﺘﺤﺩﻴﺩ ﺍﻝـ IP Addressﻝﮑل ﺠﻬﺎﺯ ﻋﻥ ﻁﺭﻴﻕ ﺍﺘﺒﺎﻉ ﺍﻝﺘﻌﻠﻴﻤﺎﺕ ﺍﻝﺘﺎﻝﻴﺔ: ﺍﺘﺠﻪ ﺇﻝﻰ startﺜﻡ settingsﺜﻡ control panelﺜﻡ Network and dial up connections,ﺍﻵﻥ ﺒﺎﻝﺯﺭ ﺍﻷﻴﻤﻥ ﺍﻨﻘﺭ ﻨﻘﺭﺓ ﻋﻠﻰ ﺍﻝـ Local Area Connection ﺍﻝﺫﻱ ﺘﻡ ﻋﻤﻠﻪ ﻝﮑﺭﺕ ﺍﻝﺸﺒﮑﺔ ﺍﻝﻼﺴﻠﮑﻴﺔ ﻭ ﺴﺘﺤﺼل ﻋﻠﻰ ﺍﻝﺘﺎﻝﻲ:
ﺍﻨﻘﺭ ﻨﻘﺭﺘﻴﻥ ﻋﻠﻰ Internet Protocol -TCP/IPﻭﻨﺴﺠل ﺭﻗﻡ ﺍﻝـ IPﻭﻗﻨﺎﻉ ﺍﻝﺸﺒﮑﺔ.
15 تو ا
ھ نا
ري
Wireless Networks
ﻁﺒﻌ ﹰﺎ ﻴﻤﮑﻥ ﺘﻐﻴﻴﺭ ﺭﻗﻡ ﺍﻝـ IPﺇﻝﻰ ﺭﻗﻡ ﺸﺒﻴﻪ ﻝﮑﻥ ﻫﺫﺍ ﻤﺠﺭﺩ ﻤﺜﺎل .ﺍﻵﻥ ﺍﻀﻐﻁ ﻤﺭﺘﻴﻥ ﻋﻠﻰ OKﻭ ﺃﻋﺩ ﺘﺸﻐﻴل ﺍﻝﺠﻬﺎﺯ ﺇﻥ ﻁﻠﺏ ﻤﻨﻙ ﺫﻝﻙ .ﺍﻋﺩ ﻨﻔﺱ ﺍﻝﻌﻤﻠﻴﺔ ﻤﻊ ﺍﻝﺠﻬﺎﺯ ﺍﻵﺨﺭ ﻤﻊ ﺘﻐﻴﻴﺭ ﺭﻗﻡ ﺍﻝـ IPﺇﻝﻰ ﻤﺜﻼ .192.168.0.8ﻻﺤﻅ ﺃﻨﻨﺎ ﻏﻴﺭﻨﺎ ﺍﻝﺨﺎﻨﺔ ﺍﻷﺨﻴﺭﺓ ﻭﻫﻲ ﺍﻝﺨﺎﺼﺔ ﺒﺭﻗﻡ ﺍﻝﺠﻬﺎﺯ ﻋﻠﻰ ﺍﻝﺸﺒﮑﺔ. ﺍﻵﻥ ﺃﺼﺒﺤﺕ ﺠﺎﻫﺯ ﻝﻼﺘﺼﺎل ﺒﺎﻝﺸﺒﮑﺔ ﺍﻝﻼﺴﻠﮑﻴﺔ .ﻭﻴﻤﮑﻨﻨﺎ ﻤﻌﺭﻓﺔ ﻤﻌﻠﻭﻤﺎﺕ ﻋﻥ ﺤﺎﻝﺔ ﺍﻝﺸﺒﮑﺔ ﻤﻥ ﺨﻼل ﺍﻝﺒﺭﺍﻤﺞ ﺍﻝﻤﺭﺍﻓﻘﺔ ﻝﻠﺘﺠﻬﻴﺯﺍﺕ ﻭﻝﻨﺘـﺎﺒﻊ ﻤـﻊ ﺍﻝﺘﺠﻬﻴـﺯﺍﺕ ﺍﻝﺘـﻲ ﺍﺨﺘﺭﻨﺎﻫﺎ ﻭﻫﺫﻩ ﻭﺍﺠﻬﺔ ﺍﻝﺒﺭﻨﺎﻤﺞ ﺍﻝﺘﻲ ﺴﺘﺨﺒﺭﻙ ﺒﺤﺎﻝﺔ ﺍﻝﺸﺒﮑﺔ ﺍﻝﻼﺴﻠﮑﻴﺔ:
16 تو ا
ھ نا
ري
Wireless Networks
ﻝﻨﺸﺭﺡ ﻤﺎ ﺘﺤﺘﻭﻱ ﺍﻝﺼﻭﺭﺓ ﻤﻥ ﺃﻤﻭﺭ: Status : Associated BSSID=00-08-C8-AC-7F-E0 ﻫﺫﻩ ﺘﻌﻨﻲ ﺃﻥ ﮑﺭﺕ ﺍﻝﺸﺒﮑﺔ ﺍﻝﻼﺴﻠﮑﻴﺔ ﻤﺘﺼل ﺒﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل ﺍﻝﺘﻲ ﺘﺤﻤل ﻋﻨﻭﺍﻥ ﺍﻝـ MAC Addressﺍﻝﺘﺎﻝﻲ00-08-C8-AC-7F-E0 : ﻭﺍﻝـ MAC Addressﻫﻭ Media Access Control Addressﻭﻫـﻭ ﺍﻝﻌﻨـﻭﺍﻥ ﺍﻝﻔﻴﺯﻴﺎﺌﻲ ﻝﮑﺭﺕ ﺍﻝﺸﺒﮑﺔ ﺍﻝﻼﺴﻠﮑﻴﺔ ﺍﻻﺘﺼﺎل ﺘﺤﺘﻭﻱ ﻋﻠﻰ ﮑﺭﺕ ﺸـﺒﮑﺔ ﻻﺴـﻠﮑﻲ ﻓﻨﻘﻁﺔ ﺒﺩﺍﺨﻠﻬﺎ ،ﻭﻫﺫﺍ ﺍﻝﻌﻨﻭﺍﻥ ﻋﻨﻭﺍﻥ ﺜﺎﺒﺕ ﻴﺄﺘﻲ ﻤﻥ ﺍﻝﺸﺭﮑﺔ ﺍﻝﻤﺼﻨﻌﺔ ﻭﻴﮑﻭﻥ ﺍﻝﺭﻗﻡ ﺭﻗﻡ ﻤﻤﻴﺯ ﻤﻥ ﺍﻝﻤﻔﺘﺭﺽ ﺃﻥ ﻴﻤﻠﻙ ﮑل ﮑﺭﺕ ﺸﺒﮑﺔ ﺴﻭﺍﺀ ﺴﻠﮑﻲ ﺃﻭ ﻻﺴﻠﮑﻲ ﺭﻗﻡ ﺨﺎﺹ ﺒﻪ ﻻ ﻴﺘﮑﺭﺭ ﻤﻊ ﮑﺭﻭﺕ ﺃﺨﺭﻯ ﻴﻌﻁﻰ ﻤﻥ ﺍﻝﺸﺭﮑﺔ ﺍﻝﻤﻨﺘﺠﺔ.
17 تو ا
ھ نا
ري
Wireless Networks
SSID ﻭﻫﻭ ﺍﻝـ Service Set IDentifierﻭﻫﻭ ﺭﻗﻡ ﺃﻭ ﻤﻌﺭﻑ ﻝﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل .ﮑل ﻨﻘﻁﺔ ﺍﺘﺼﺎل ﻝﺩﻴﻬﺎ ﻤﻌﺭﻑ ﺨﺎﺹ ﺒﻬﺎ ﺘﺭﺴﻠﻪ ﺒﺸﮑل ﻤﺴﺘﻤﺭ ﮑﻲ ﺘﻠﺘﻘﻁﻪ ﮑﺭﻭﺕ ﺍﻝـﺸﺒﮑﺔ ﺍﻝﻼﺴﻠﮑﻴﺔ ﺍﻝﻤﻭﺠﻭﺩﺓ ﻓﻲ ﻤﺩﺍﻫﺎ ﻝﺘﻌﺭﻑ ﻫﺫﻩ ﺍﻝﮑﺭﻭﺕ ﺃﻥ ﻨﻘﻁﺔ ﺍﺘـﺼﺎل ﺫﺍﺕ ﺍﻝﻤﻌـﺭﻑ ﺍﻝﻔﻼﻨﻲ ﻤﻭﺠﻭﺩﺓ ﻓﻲ ﻤﺩﺍﻫﺎ .ﻤﻥ ﺍﻝﻨﺎﺤﻴﺔ ﺍﻷﻤﻨﻴﺔ ﻴﻔﻀل ﺘﻌﻁﻴل ﺨﺎﺼﻴﺔ ﺇﺭﺴﺎل ﺍﻝﻤﻌـﺭﻑ ﻤﻥ ﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل ﻷﻨﻪ ﺇﺫﺍ ﮑﺎﻥ ﺍﻝﻤﺩﻯ ﺒﻌﻴﺩ ﻨﺴﺒﻴﺎﹰ ﻓﺎﻥ ﺃﻱ ﺸﺨﺹ ﻴﻤﮑﻨﻪ ﺍﻝﺩﺨﻭل ﻝﻠﺸﺒﮑﺔ ﺍﻝﺨﺎﺼﺔ ﺒﻙ ﺒﺩﻭﻥ ﻋﻨﺎﺀ ﻤﻌﺭﻓﺔ ﺭﻗﻡ ﺍﻝﻤﻌﺭﻑ ﺍﻝﺨﺎﺹ ﺒﺎﻝﺸﺒﮑﺔ! ﻓﺒﺸﮑل ﺍﻓﺘﺭﺍﻀﻲ ﻤﻊ ﺸﺭﮑﺔ D LINKﻓﺎﻥ ﺍﻝﻤﻌﺭﻑ ﻴﮑﻭﻥ ﮑﻠﻤﺔ defaultﻴﻤﮑﻥ ﺃﻥ ﺘﻐﻴﺭﻫﺎ ﻷﻱ ﮑﻠﻤﺔ ﺃﻭ ﺭﻗﻡ ﺘﺸﺎﺀ. Tx Rate ﻭﻫﻭ ﻤﻌﺩل ﺍﻝﺴﺭﻋﺔ ﺍﻝﻤﺘﻭﻓﺭﺓ ﻝﻠﮑﺭﺕ ﻓﻲ ﻫﺫﻩ ﺍﻝﻤﺴﺎﻓﺔ .ﮑﻠﻤﺎ ﺒﻌﺩ ﺍﻝﺠﻬـﺎﺯ ﻋـﻥ ﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل ﻗﻠﺕ ﺴﺭﻋﺔ ﺍﻝﻨﻘل. Channel ﺍﻝﻘﻨﺎﺓ ﺍﻝﺘﻲ ﻴﺘﻡ ﺍﻻﺘﺼﺎل ﺒﻬﺎ ﺒﻴﻥ ﮑﺭﺕ ﺍﻝﺸﺒﮑﺔ ﻭ ﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل ﻭﻴﻤﮑﻥ ﺍﺨﺘﻴـﺎﺭ ﺭﻗﻡ 6 , 3 , 1ﺃﻭ .11 Link Quality ﻭﻫﻲ ﺠﻭﺩﺓ ﺍﻻﺘﺼﺎل ﺇﺫﺍ ﮑﻨﺕ ﻤﺘﺼل ﺒﺤﺎﺴﺏ ﻤﻌﻴﻥ ﻓﻲ ﺍﻝﺸﺒﮑﺔ ﺍﻝﻼﺴﻠﮑﻴﺔ ﻭﮑﻨﺕ ﺘﻨﻘل ﻤﻠﻑ ﻤﻌﻴﻥ ﻓﺎﻥ ﻫﺫﺍ ﺍﻷﻤﺭ ﻴﺒﻴﻥ ﻝﻙ ﺠﻭﺩﺓ ﺍﻻﺘﺼﺎل ﺒﻴﻨﻙ ﻭ ﺒﻴﻥ ﺍﻝﺠﻬﺎﺯ ﺍﻵﺨﺭ ﻓـﻲ ﺍﻝﻠﺤﻅﺔ ﺫﺍﺘﻬﺎ.
18 تو ا
ھ نا
ري
Wireless Networks
Signal Strength ﻭﻫﻲ ﻗﻭﺓ ﺍﻹﺭﺴﺎل ﮑﻠﻤﺎ ﺍﺒﺘﻌﺩﺕ ﻋﻥ ﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل ﮑﻠﻤﺎ ﻀﻌﻑ ﺍﻹﺭﺴﺎل. Data Rate ﻴﺒﻴﻥ ﻋﻠﻰ ﺸﮑل ﺭﺴﻭﻡ ﺒﻴﺎﻨﻴﺔ ﺤﺭﮑﺔ ﻨﻘل ﺍﻝﻤﻠﻔﺎﺕ ﺒﻴﻥ ﺍﻷﺠﻬﺯﺓ ﺒﺎﻝـﻀﻐﻁ ﻋﻠـﻰ SiteSurveyﺍﻝﻤﻭﺠﻭﺩ ﻋﻠﻰ ﺍﻝﻴﺴﺎﺭ ﻴﻤﮑﻨﻨﺎ ﻤﺸﺎﻫﺩﺓ ﻨﻘﺎﻁ ﺍﻻﺘﺼﺎل ﺍﻝﻤﻭﺠﻭﺩﺓ ﻓﻲ ﻤـﺩﻯ ﮑﺭﺕ ﺍﻝﺸﺒﮑﺔ ﻨﺴﺘﻁﻴﻊ ﺍﺨﺘﻴﺎﺭ ﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل ﺍﻝﻤﺭﺍﺩ ﺍﻻﺘﺼﺎل ﺒﻬﺎ ﻭﺍﻝﺩﺨﻭل ﻓﻲ ﺍﻝـﺸﺒﮑﺔ ﺍﻝﺨﺎﺼﺔ ﺒﻬﺎ )ﻓﻲ ﺤﺎل ﻭﺠﻭﺩ ﺍﮑﺜﺭ ﻤﻥ ﻨﻘﻁﺔ ﺍﺘﺼﺎل ﻓﻲ ﻨﻔﺱ ﺍﻝﻤﻨﻁﻘﺔ( ﻨﻅﻠﻠﻬﺎ ﻭﻨﻀﻐﻁ ﻋﻠﻰ Connectﻓﻴﻘﻭﻡ ﮑﺭﺕ ﺍﻝﺸﺒﮑﺔ ﺒﺎﻻﺘﺼﺎل ﺒﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل ﻫﺫﻩ ﺍﻝـﺼﻭﺭﺓ ﺘﻭﻀـﺢ ﻨﻘﻁﺔ ﺍﺘﺼﺎل ﻭﺍﺤﺩﺓ ﻤﻭﺠﻭﺩﺓ ﻓﻲ ﻨﻔﺱ ﺍﻝﻤﺩﻯ:
ﻭﻤﻥ ﺍﻝﺠﺩﻴﺭ ﺒﺎﻝﺫﮑﺭ ﺃﻥ ﻫﻨﺎﻙ ﺒﻌﺽ ﺍﻷﻤﻭﺭ ﺍﻝﺘﻲ ﺘﻌﻴﻕ ﻭﺘﻀﻌﻑ ﺍﻹﺭﺴﺎل ﻓـﻲ ﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل .ﻤﻨﻬﺎ ﺃﻥ ﻴﮑﻭﻥ ﺍﻝﺤﺎﺴﺏ ﺒﻌﻴﺩﹰﺍ ﻋﻥ ﻨﻘﻁﺔ ﺍﻻﺘﺼﺎ،ل ﻭﺍﻥ ﻴﮑﻭﻥ ﺍﻝﻔﺎﺼﻝـ ﺒﻴﻨﻬﻤﺎ ﺠﺩﺭﺍﻥ ﻋﺩﻴﺩﺓ ﺴﻭﺍﺀ ﺇﺴﻤﻨﺘﻴﺔ ﺃﻭ ﻤﻥ ﻏﻴﺭﻩ ،ﻭﻭﺠﻭﺩ ﻋﺩﺓ ﺃﺠﻬﺯﺓ ﮑﻬﺭﺒﺎﺌﻴﺔ ﺘﻌﻤﻝـ ﻓﻲ ﻨﻔﺱ ﻤﮑﺎﻥ ﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل ﮑﺸﺎﺸﺔ ﺍﻝﺤﺎﺴﺏ ﻭﻏﻴﺭﻫﺎ ،ﻭﻗﺭﺏ ﺍﻝﻤﻨﺯل ﻤـﻥ ﻤﺤﻁـﺔ
19 تو ا
ھ نا
ري
Wireless Networks
ﺘﻘﻭﻴﺔ ﺇﺭﺴﺎل ﻝﺸﺭﮑﺔ ﺍﻻﺘﺼﺎﻻﺕ ﺃﻭ ﺍﻝﻤﻁﺎﺭ ﻭﺨﻼﻓﻪ .ﮑل ﻫﺫﻩ ﺍﻷﻤﻭﺭ ﺘﺅﺜﺭ ﺴﻠﺒ ﹰﺎ ﻓﻲ ﻗﻭﺓ ﺇﺭﺴﺎل ﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل ﻓﻴﺠﺏ ﺘﺠﻨﺒﻬﺎ ﻗﺩﺭ ﺍﻹﻤﮑﺎﻥ ﻝﻠﺤﺼﻭل ﻋﻠﻰ ﺍﻓﻀل ﺘﻐﻁﻴﺔ.
20 تو ا
ھ نا
ري
Wireless Networks
ﺯﻴﺎﺩﺓ ﻗﻭﺓ ﺍﻹﺸﺎﺭﺓ ﻓﻲ ﺍﻝﺸﺒﮑﺎﺕ ﺍﻝﻼﺴﻠﮑﻴﺔ: ﻝﻠﻭﺼﻭل ﺇﻝﻰ ﺫﻝﻙ ﻨﺘﺒﻊ ﻫﺫﻩ ﺍﻝﻤﻼﺤﻅﺎﺕ:
• ﺍﻝﻤﻭﻗﻊ
ﻫﺫﻩ ﻨﻘﻁﻪ ﻤﻬﻤﺔ ﺠﺩﺍ ﺤﻴﺙ ﺇﻥ ﺍﻝﻤﻭﻗﻊ ﻴﻠﻌﺏ ﺩﻭﺭﹰﺍ ﺃﺴﺎﺴﻴ ﹰﺎ ﻓﻲ ﺍﻻﺘﺼﺎل ﻭﻗﻭﺓ ﺍﻹﺸﺎﺭﺓ ﮑﻤﺎ
ﻨﻌﻠﻡ ﻓﺈﻨﻪ ﮑﻠﻤﺎ ﺯﺍﺩ ﺍﻝﺒﻌﺩ ﻋﻥ ﻨﻘﻁﺔ ﺍﻝﻭﺼﻭل " " access pointﺘﻘﻝـ ﻗـﻭﺓ ﺍﻹﺸـﺎﺭﺓ ﻭﺃﻴﻀ ﹰﺎ ﮑﻠﻤﺎ ﺯﺍﺩﺕ ﺍﻝﻌﻭﺍﺌﻕ ﺍﻝﻁﺒﻴﻌﻴﺔ ﻤﺎ ﺒﻴﻥ ﻨﻘﻁﺔ ﺍﻝﻭﺼﻭل ﻭﺍﻝﻤـﺴﺘﺨﺩﻡ ﺃﻴـﻀﺎ ﺘﻘﻝـ ﺍﻹﺸﺎﺭﺓ ﻝﺫﻝﻙ ﻋﻠﻴﻨﺎ ﺒﺎﻝﺘﻔﮑﻴﺭ ﻓﻲ ﺍﻝﻤﮑﺎﻥ ﻭﺍﻝﻤﻭﻗﻊ ﻭﺍﻝﻤﻭﻀﻊ ﺍﻷﻨﺴﺏ ﻝﻭﻀﻊ ﺠﻬﺎﺯ ﺍﻝــ access pointﺒﻪ.
• ﺍﻝﺤﻭﺍﺠﺯ ﻭﺍﻝﻤﻭﺍﻨﻊ:
ﻫﻲ ﺍﻝﺤﻭﺍﺠﺯ ﺍﻝﻤﺎﺩﻴﺔ ﻭﺍﻝﻤﻌﺩﻨﻴﺔ ﻭﺍﻝﺤﺠﺭﻴﺔ ﻓﻬﻲ ﺘﺅﺜﺭ ﻋﻠﻰ ﺍﻝﻤﻭﺠﻪ ﺒﺸﮑل ﮑﺒﻴﺭ ﺠﺩﹰﺍ ﻭﻗﺩ ﺘﻘﻁﻌﻬﺎ ﻨﻬﺎﺌﻴﺎﹰ ﻭﻝﺫﻝﻙ ﻻ ﺘﺠﻌل access pointﻗﺭﻴﺒ ﹰﺎ ﻤﻥ ﺇﻱ ﻤﻨﻬﺎ ﺃﻭ ﻤﻼﺼﻕ ﻝﻬﺎ ﺤﺘـﻰ ﻻ ﺘﺘﻌﺭﺽ ﺍﻝﻤﻭﺠﻪ ﺇﻝﻰ ﺍﻝﻘﻁﻊ ﺃﻭ ﺍﻝﻀﻌﻑ.
• ﻏﻴﺭ ﺍﻝﻬﻭﺍﺌﻲ:
ﻨﻘﻁﻪ ﻤﻬﻤﺔ ﺠﺩﹰﺍ ﻭﻫﻲ ﻝﻴﺴﺕ ﻋﻴﺏ ﻓﻲ ﺍﻝﺘﺼﻨﻴﻊ ﻭﺇﻨﻤﺎ ﺤﺴﺏ ﺍﻝﻬﻨﺩﺴﺔ ﺍﻝﺸﺨﺼﻴﺔ ﻝﻌﻤﻠﻴـﺔ ﺍﻻﺘﺼﺎل ﻓﮑﻤﺎ ﻨﻌﻤل ﺃﻥ ﮑل ﺍﻝـ access pointﺍﻝﺘﻲ ﺘﺒﺎﻉ ﻓﻲ ﺍﻷﺴﻭﺍﻕ ﺘﻤﻠﻙ ﻫﻭﺍﺌﻲ ﺃﻭ ﺍﺜﻨﻴﻥ omni-directionalﻭﻫﻲ ﻤﻥ ﺍﻝﻨﻭﻋﻴﺎﺕ ﺍﻝﺘﻲ ﺘﻘﻭﻡ ﺒﺼﻨﻊ ﻤﻭﺠﻪ ﻋﻠﻰ ﺸﮑل ﺩﺍﺌﺭﺓ
ﮑﺎﻤﻠﺔ ﺫﺍﺕ ﻨﺼﻑ ﻗﻁﺭ ﻗﺩ ﻴﮑﻭﻥ ﻤﻔﻴﺩﺍ ﺒﺎﻝﻨﺴﺒﺔ ﻝﻙ ﺍﺴﺘﺨﺩﺍﻡ ﻤﺜل ﻫﺫﺍ ﺍﻝﻬﻭﺍﺌﻲ ﻓﻲ ﺤـﺎل ﮑﺎﻥ access pointﻓﻲ ﻤﻨﺘﺼﻑ ﺍﻷﺠﻬﺯﺓ ﺍﻝﻤﺘﺼﻠﺔ ﺒﻪ ﺤﻴﺙ ﺴﻴﻘﻭﻡ ﺒﺘﻐﻁﻴـﻪ ﺍﻝـﺩﺍﺌﺭﺓ ﺍﻝﻤﺤﻴﻁﺔ ﺒﻪ ﻝﮑﻥ ﻤﺎﺫﺍ ﻝﻭ ﮑﺎﻥ ﻝﺩﻴﻙ access pointﻓﻲ ﺍﻝﻐﺭﻓﺔ ﺍﻷﺨﻴﺭﺓ ﻓﻲ ﺍﻝﺒﻴﺕ ﻭﺒﻘﻴﺔ ﺍﻷﺠﻬﺯﺓ ﺍﻝﻤﺘﺼﻠﺔ ﻓﻲ ﺍﻝﻐﺭﻑ ﺍﻝﻤﺠﺎﻭﺭﺓ ؟؟ ﻓﻲ ﻫﺫﻩ ﺍﻝﺤﺎﻝﺔ ﺴﻨﮑﻭﻥ ﺒﺤﺎﺠﺔ ﺇﻝﻰ ﻫـﻭﺍﺌﻲ
21 تو ا
ھ نا
ري
Wireless Networks
ﺃﻭ ﻝﺼﺤﻥ ﻻﻗﻁ ﺨﺎﺭﺠﻲ ﺇﻻ ﺃﻨﻪ ﻴﺘﻌﺎﻤل ﻤﻊ ﺍﻹﺸﺎﺭﺓ ﺒﺸﮑل ﻤﻭﺠﻪ )ﻤﺨﺭﻭﻁﻲ( ﻭﻝـﻴﺱ ﺒﺸﮑل ﺩﺍﺌﺭﻱ.
• ﻤﮑﺭﺭ ﺇﺭﺴﺎل" : " Wireless Repeater ﮑﻠﻤﺎ ﺯﺍﺩﺕ ﺍﻝﻤﺴﺎﻓﺔ ﺯﺍﺩﺕ ﻨﺴﺒﺔ ﺍﻝﺨﻁﺄ ﺒﺸﮑل ﻋﺎﻡ ﻭﻫﻭ ﻨﻔﺱ ﺍﻝﺤﺎل ﻤﻊ ﺍﻝـﺸﺒﮑﺎﺕ ﺍﻝﻼﺴﻠﮑﻴﺔ ﻓﺒﺩﻻﹰ ﻤﻥ ﺸﺭﺍﺀ Access Pointﺁﺨﺭ ﺴﻨﻘﻭﻡ ﺒﺸﺭﺍﺀ Wireless Repeater ﻝﻠﻐﺭﻓﺔ ﺍﻝﺘﻲ ﻻ ﺘﺼﻠﻬﺎ ﺍﻹﺸﺎﺭﺓ ﺒﺸﮑل ﮑﺎﻓﻲ ﻭﺴﺘﻌﻭﺩ ﺍﻹﺸﺎﺭﺓ ﺇﻝﻰ ﻨﻔﺱ ﺍﻝﻘﻭﻩ ﺍﻝﺘﻲ ﮑﺎﻨﺕ ﻋﻠﻴﻪ.
• ﺘﻐﻴﻴﺭ ﻗﻨﺎﺓ ﺍﻹﺸﺎﺭﺓ: ﮑﻤﺎ ﻨﻌﻠﻡ ﻓﺈﻥ ﺍﻝـ Access Pointﻴﻌﻤل ﻤﺘﻭﺍﻓﻘ ﹰﺎ ﻤﻥ 11ﻗﻨﺎﺓ ﺍﺘـﺼﺎل ﻭﻴﻨـﺼﺢ ﺒﺎﺴﺘﺨﺩﺍﻡ ﻗﻨﻭﺍﺕ ﺭﺍﺩﻭﻴﻪ ﻗﻠﻴﻠﺔ ﺍﻻﺴﺘﺨﺩﺍﻡ ﻓﻲ ﺍﻝﻤﺤﻴﻁ ﻝﻠﺘﻘﻠﻴل ﻤﻥ ﻨﺴﺒﺔ ﺍﻝﺨﻁﺄ ﻓﻲ ﺍﻹﺸﺎﺭﺓ ﻭﺒﺈﻤﮑﺎﻨﻙ ﺍﻝﺩﺨﻭل ﺇﻝﻰ ﻝﻭﺤﺔ ﺍﻝﺘﺤﮑﻡ ﺍﻝﺨﺎﺹ ﺒﺎﻝـ Access Pointﻭﺘﻐﻴﻴﺭ ﺍﻝﻘﻨﺎﺓ ﺤﺘـﻰ ﺘﺼل ﺇﻝﻰ ﻗﻨﺎﺓ ﺘﻌﻁﻴﻙ ﺇﺸﺎﺭﺓ ﺍﻓﻀل ﻭﻻ ﺘﺤﺘﺎﺝ ﺇﻝﻰ ﺍﻝﺘﻌﺩﻴل ﻓﻲ ﺠﻬﺎﺯ ﺍﻝﮑﻤﺒﻴﻭﺘﺭ ﺤﻴـﺙ ﺃﻥ ﺍﻝﮑﺭﻭﺕ ﺘﻘﻭﻡ ﺒﻠﻘﻁ ﺍﻹﺸﺎﺭﺓ ﻭﻤﺤﻁﺘﻬﺎ ﺃﻭﺘﻭﻤﺎﺘﻴﮑﻴﹰﺎ.
• ﺃﺒﻌﺩ ﻫﺫﻩ ﺍﻷﺠﻬﺯﺓ ﻋﻨﻙ: ﻨﻌﻠﻡ ﺒﺄﻥ ﺍﻝـ Access Pointﺍﻝﺤﺩﻴﺜﺔ ﺘﻌﻤل ﻋﻠﻰ ﺒﺭﻭﺘﻭﮑﻭل bﺃﻭ gﻭﺍﻝﺘﻲ ﺘﻌﻤل ﻋﻠﻰ ﺇﺸﺎﺭﺓ ﻗﺩﺭﺘﻬﺎ 2400ﻤﻴﺠﺎ ﻫﻴﺭﺘﺯ ﺃﻤﺎ ﺒﺭﻭﺘﻭﮑﻭل aﻓﻬﻭ ﻴﻌﻤل ﻋﻠﻰ ﺇﺸﺎﺭﺓ ﻗـﺩﺭﺘﻬﺎ 5000ﻤﻴﺠﺎ ﻫﻴﺭﺘﺯ ﻭﻫﻨﺎﻙ ﺍﻝﻌﺩﻴﺩ ﻤﻥ ﺍﻷﺠﻬﺯﺓ ﮑﺎﻝﻤﺎﻴﮑﺭﻭﻭﻴﻑ ﻭﺍﻝﺘﻠﻔﻭﻨـﺎﺕ ﺍﻝﻼﺴـﻠﮑﻴﺔ ﻭﺒﻌﺽ ﺍﻷﺠﻬﺯﺓ ﺍﻷﺨﺭﻯ ﮑﺄﺠﻬﺯﺓ
ﺍﻝﺒﻠﻭﺘﻭﺙ ﻭﺍﻝﺠﻭﺍل ﻗﺩ ﺘﻘـﻭﻡ ﺒﻌﻤﻝـ ﺘـﺩﺍﺨل ﻤـﻊ
ﺍﻹﺸﺎﺭﺍﺕ ﺍﻝﻤﺭﺴﻠﺔ ﻤﻥ ﺍﻝـ Access Pointﻭﺘﻘﻭﻡ ﺒﺯﻴﺎﺩﺓ ﻨﺴﺒﺔ ﺍﻝﺘﺸﻭﻴﺵ " " noise ﺤﺘﻰ ﻗﺩ ﺘﻘﻁﻊ ﺍﻻﺘﺼﺎل ﻓﻲ ﺒﻌﺽ ﺍﻷﺤﻴﺎﻥ ﺒﻴﻥ ﺍﻝﻤﺴﺘﺨﺩﻡ ﻭﺍﻝـ Access Pointﻭﻝﺫﻝﻙ ﻴﻔﻀل ﺃﻥ ﺘﺒﺤﺙ ﻋﻥ ﺃﺠﻬﺯﻩ ﻻ ﺘﻌﻤل ﻓﻲ ﺍﻝﻤﺠﺎل ﺍﻝﺨﺎﺹ ﺒﻙ.
22 تو ا
ھ نا
ري
Wireless Networks
• ﺘﺤﺩﻴﺙ ﺘﻌﺭﻴﻑ ﮑﺭﺕ ﺍﻝﺸﺒﮑﺔ ﺍﻝﻼﺴﻠﮑﻲ: ﺇﻥ ﺍﻝﺸﺭﮑﺎﺕ ﺍﻝﺘﻲ ﺘﻘﻭﻡ ﺒﺈﻨﺘﺎﺝ ﺘﻌﺭﻴﻔﺎﺕ ﻝﻸﺠﻬﺯﺓ ،ﺘﻘﻭﻡ ﺃﻴﻀ ﹰﺎ ﺒﺈﺼﻼﺡ ﺃﺨﻁﺎﺀ ﺍﻝﺘﻌﺭﻴﻔﺎﺕ ﺍﻝﺴﺎﺒﻘﺔ ﺃﻭ ﺇﻀﺎﻓﺔ ﺨﺩﻤﺎﺕ ﺠﺩﻴﺩﻩ ﻗﺩ ﺘﻔﻴﺩ ﻓﻲ ﺘﻘﻭﻴﻪ ﺍﻹﺸﺎﺭﺓ ﺒﺸﮑل ﺍﻓﻀل. ﻝﺫﺍ ﻓﻤﻥ ﺍﻝﻀﺭﻭﺭﻱ ﻤﺘﺎﺒﻌﺔ ﻫﺫﻩ ﺍﻷﻤﻭﺭ ﻭﺇﺠﺭﺍﺀ ﺍﻝﺘﺤﺩﻴﺜﺎﺕ ﺍﻝﻤﻨﺎﺴﺒﺔ ﺒﺸﮑل ﺩﺍﺌﻡ.
• ﺘﻭﺤﻴﺩ ﺍﻝﺸﺭﮑﺔ ﺍﻝﻤﻨﺘﺠﺔ ﻋﻥ ﺍﻝﺘﺠﻬﻴﺯ: ﻻ ﻨﺴﺘﻁﻴﻊ ﺍﻝﻘﻭل ﺒﺄﻥ ﺍﻝﺘﺠﻴﺯﺍﺕ ﺘﮑﻭﻥ ﻏﻴﺭ ﻤﺘﻭﺍﻓﻘﺔ ﻓﻲ ﺤﺎل ﺍﺨﺘﻴﺎﺭﻨﺎ ﺇﻝﻰ ﻋﺩﺓ ﻤﺼﺎﺩﺭ ﻝﻬﺎ ﻭﻝﮑﻥ ﻤﻥ ﺍﻷﻓﻀل ﺩﻭﻤ ﹰﺎ ﻓﻲ ﺤﺎﻝﺔ ﺍﻝﺸﺒﮑﺎﺕ ﺒﺸﮑل ﻋﺎﻡ ﻤﺤﺎﻭﻝﺔ ﺘﻭﺤﻴﺩ ﺍﻝﻤﺼﺎﺩﺭ ﺍﻝﻤﻌﺘﻤﺩﺓ ﻝﻠﺘﺠﻬﻴﺯﺍﺕ ﻝﺘﺤﻘﻴﻕ ﺍﻝﺘﻭﺍﻓﻘﻴﺔ ﺍﻷﻤﺜل ﻭﮑﺫﻝﻙ ﻝﺴﻬﻭﻝﺔ ﺍﻝﺨﺩﻤﺎﺕ ﻭﺍﻝﺘﺤﺩﻴﺜﺎﺕ.
• ﻗﻡ ﺒﺘﺤﺩﻴﺙ ﺒﺭﻭﺘﻭﮑﻭل b 802.11ﺇﻝﻰ 802.11g ﻤﻥ ﺍﻝﻤﺘﻌﺎﺭﻑ ﻋﻠﻴﻪ ﺃﻥ ﺘﻘﻨﻴﺔ b 802.11ﻫﻲ ﺍﻷﮑﺜﺭ ﺍﻨﺘﺸﺎﺭﺍﹰ ﻓﻲ ﺍﻝﻌﺎﻝﻡ ﺤﻴﺙ ﺃﻨﻬﺎ ﺠﺎﺀﺕ ﺒﻌﺩ ﺍﺴﺘﻘﺭﺍﺭ ﺘﻘﻨﻴﺔ Hi-Fiﻭﻝﮑﻥ ﻓﻲ ﻨﻔﺱ ﺍﻝﻭﻗﺕ ﺘﻌﺘﺒﺭ ﻤﺘﺨﻠﻔﺔ ﻋـﻥ ﺘﻘﻨﻴـﺔ g 802.11 ﺍﻷﺤﺩﺙ ﻭﺍﻝﺘﻲ ﺘﻌﺩ ﺃﺴﺭﻉ ﺒﺨﻤﺱ ﺃﻀﻌﺎﻑ ﻤﻥ ﺘﻘﻨﻴﺔ b 802.11ﻓﺎﻥ ﻝﻡ ﺘﮑﻥ ﺴﻌﻴﺩﹰﺍ ﻤـﻊ ﺘﻘﻨﻴﺔ 802.11ﻗﻡ ﺒﺘﻐﻴﻴﺭ ﮑﺭﻭﺘﻙ ﻭﺍﻝـ Access Pointﺍﻝﺨﺎﺹ ﺒـﻙ ﺇﻝـﻰ ﺘﻘﻨﻴـﺔ b g 802.11ﻤﻊ ﺍﻝﻌﻠﻡ ﺃﻥ ﻫﻨﺎﻙ ﺘﻭﺍﻓﻘﻴﻪ ﻋﺎﻝﻴﺔ ﺒﻴﻥ ﺍﻝﺘﻘﻨﻴﺘﻴﻥ ﻨﻅﺭﹰﺍ ﻷﻨﻬﻤﺎ ﻴﻌﻤﻼﻥ ﻓﻲ ﻨﻔﺱ ﺍﻝﻘﺩﺭﺓ 2400ﻤﻴﺠﺎ ﻫﻴﺭﺘﺯ ﻭﻝﮑﻥ ﻴﻨﺼﺢ ﺒﺎﻝﺘﺭﻗﻴﺔ ﻝﺯﻴﺎﺩﺓ ﺍﻝﻘﻭﻩ ﻓﻲ ﺍﻷﺩﺍﺀ.
23 تو ا
ھ نا
ري
Wireless Networks
ا %ا * ﻧ& :و!( ا'ر! ل ا & %وا ! & ﺘﻘﻊ ﻭﺴﺎﺌﻁ ﺍﻹﺭﺴﺎل ﺘﺤﺕ ﻓﺌﺘﻴﻥ ﺭﺌﻴﺴﻴﺘﻴﻥ ﻫﻤﺎ: -1ﻭﺴﺎﺌﻁ ﺴﻠﮑﻴﺔ. -2ﻭﺴﺎﺌﻁ ﻻﺴﻠﮑﻴﺔ. ﺍﻝﻭﺴﺎﺌﻁ ﺍﻝﺴﻠﮑﻴﺔ ﺘﮑﻭﻥ ﺇﻤﺎ ﻤﻥ ﺃﺴﻼﻙ ﻤﻌﺩﻨﻴﺔ ﺃﻭ ﺃﻝﻴﺎﻑ ﻭﺘﻭﺼل ﺍﻝﮑﻬﺭﺒﺎﺀ ﻭﺍﻝـﻀﻭﺀ ﻋﻠﻰ ﺍﻝﺘﻭﺍﻝﻲ. ﺃﻤﺎ ﺍﻹﺭﺴﺎل ﺍﻝﻼﺴﻠﮑﻲ ﻓﻴﺴﺘﺨﺩﻡ ﺍﻝﻐﻼﻑ ﺍﻝﺠﻭﻱ ﮑﻭﺴﻁ ﺇﺭﺴﺎل ﻝﻨﻘل ﺍﻹﺸﺎﺭﺓ. • ﺘﺘﻀﻤﻥ ﺍﻝﻭﺴﺎﺌﻁ ﺍﻝﻼﺴﻠﮑﻴﺔ: -1ﻤﻭﺠﺎﺕ ﺍﻝﺭﺍﺩﻴﻭ. -2ﻤﻭﺠﺎﺕ ﺍﻝﻤﻴﮑﺭﻭﻭﻴﻑ. -3ﺍﻷﺸﻌﺔ ﺘﺤﺕ ﺍﻝﺤﻤﺭﺍﺀ. ﺘﺴﺘﺨﺩﻡ ﺍﻝﻭﺴﺎﺌﻁ ﺍﻝﺴﻠﮑﻴﺔ ﻋﺎﺩﺓ ﻓﻲ ﺍﻝﺸﺒﮑﺎﺕ ﺍﻝﻤﺤﻠﻴﺔ ﺍﻝﺼﻐﻴﺭﺓ ﺃﻤـﺎ ﻓـﻲ ﺍﻝـﺸﺒﮑﺎﺕ ﺍﻝﻭﺍﺴﻌﺔ ﻓﺘﺴﺘﺨﺩﻡ ﻤﺠﻤﻭﻋﺔ ﻤﻥ ﺍﻝﻭﺴﺎﺌﻁ ﺍﻝﺴﻠﮑﻴﺔ ﻭﺍﻝﻼﺴﻠﮑﻴﺔ. ﮑﻤﺎ ﻤﻥ ﺍﻝﻤﻤﮑﻥ ﺍﺴﺘﺨﺩﺍﻡ ﺍﻝﻭﺴﺎﺌﻁ ﺍﻝﻼﺴﻠﮑﻴﺔ ﻝﺘﺤﻘﻴﻕ ﺍﻻﺘـﺼﺎل ﺒـﻴﻥ ﺍﻝﮑﻤﺒﻴـﻭﺘﺭﺍﺕ ﺍﻝﻤﺤﻤﻭﻝﺔ ﻭﺍﻝﺸﺒﮑﺎﺕ ﺍﻝﻤﺤﻠﻴﺔ.
24 تو ا
ھ نا
ري
Wireless Networks
ﻭﻗﺒل ﺃﻥ ﻨﺤﺩﺩ ﻭﺴﻁ ﺍﻹﺭﺴﺎل ﺍﻷﻨﺴﺏ ﻝﻠﺸﺒﮑﺔ ﻋﻠﻴﻨﺎ ﺍﻹﺠﺎﺒﺔ ﻋﻠﻰ ﻫﺫﻩ ﺍﻷﺴﺌﻠﺔ: -1ﻤﺎ ﻫﻭ ﻤﻘﺩﺍﺭ ﺜﻘل ﺃﻭ ﺍﺯﺩﺤﺎﻡ ﺤﺭﮑﺔ ﺍﻝﻤﺭﻭﺭ ﺍﻝﻤﺘﻭﻗﻊ ﻋﻠﻰ ﺍﻝﺸﺒﮑﺔ؟ -2ﻤﺎ ﻫﻲ ﺍﻝﻤﺴﺎﻓﺔ ﺍﻝﺘﻲ ﻋﻠﻰ ﻭﺴﻁ ﺍﻻﺘﺼﺎل ﺘﻐﻁﻴﺘﻬﺎ ﺃﻭ ﺍﻝﻭﺼﻭل ﺇﻝﻴﻬﺎ؟ -3ﻤﺎ ﻫﻲ ﺍﻻﺤﺘﻴﺎﺠﺎﺕ ﺍﻷﻤﻨﻴﺔ ﻝﻠﺸﺒﮑﺔ؟ -4ﻤﺎ ﻫﻲ ﺍﻝﻤﻴﺯﺍﻨﻴﺔ ﺍﻝﻤﺨﺼﺼﺔ ﻝﻭﺴﻁ ﺍﻻﺘﺼﺎ؟ل ﺃﻤﺎ ﺍﻻﻋﺘﺒﺎﺭﺍﺕ ﺍﻝﺘﻲ ﺘﺅﺜﺭ ﻋﻠﻰ ﺴﻌﺭ ﻭﺃﺩﺍﺀ ﻭﺴﻁ ﺍﻹﺭﺴﺎل ﻓﺘﺘﻀﻤﻥ: -1ﺴﻬﻭﻝﺔ ﺍﻹﻋﺩﺍﺩ ﻭﺍﻝﺘﺭﮑﻴﺏ. -1ﻤﺩﻯ ﺴﻌﺔ ﻨﻁﺎﻕ ﺍﻝﺒﺙ. ﺒﺸﮑل ﻋﺎﻡ ﻓﺈﻥ ﺘﮑﻠﻔﺔ ﻭﺴﻁ ﺍﻹﺭﺴﺎل ﺘﺭﺘﻔﻊ ﻤﻊ ﺍﺭﺘﻔـﺎﻉ ﺴـﺭﻋﺘﻪ ﻭﻨﻘﺎﻭﺘـﻪ ﻭﻤﺩﻯ ﻤﺴﺘﻭﻯ ﺃﻤﻨﻪ. ﻴﻌﺒﺭ ﻋﻥ ﻤﺩﻯ ﺍﻝﺘﺭﺩﺩﺍﺕ ﺍﻝﻤﻘﺎﺴﻪ ﺒﺎﻝﻬﻴﺭﺘﺯ ﻭﺍﻝﺘﻲ ﻴﺴﺘﻁﻴﻊ ﻭﺴﻁ ﺍﻹﺭﺴـﺎل ﻓﻴﺯﻴﺎﺌﻴﺎﹰ ﺍﺴﺘﻴﻌﺎﺒﻬﺎ ﺒﺴﻌﺔ ﻨﻁﺎﻕ ﺍﻝﺒﺙ .bandwidthﻭﻫﻲ ﺘﻌﺭﻑ ﺒـﺎﻝﻔﺭﻕ ﺒـﻴﻥ ﺃﻋﻠﻰ ﺍﻝﺘﺭﺩﺩﺍﺕ ﻭﺃﺨﻔﻀﻬﺎ ﻭﺍﻝﺘﻲ ﻴﺴﺘﻁﻴﻊ ﻭﺴﻁ ﺍﻹﺭﺴﺎل ﺤﻤﻠﻬﺎ. ﻫﺫﻩ ﺍﻝﺴﻌﺔ ﻗﺩ ﺘﺘﻔﺎﻭﺕ ﻭﻓﻘ ﹰﺎ ﻝﻠﻤﺴﺎﻓﺔ ﻭﺘﻘﻨﻴﺔ ﺒﺙ ﺍﻹﺸﺎﺭﺓ ﺍﻝﻤﺴﺘﺨﺩﻤﺔ. -2ﻀﻌﻑ ﺍﻹﺸﺎﺭﺓ . attenuation ﻴﻌﺭﻑ ﺍﻝـ attenuationﺒﺄﻨﻪ ﻗﺎﺒﻠﻴﺔ ﺍﻝﻤﻭﺠﺎﺕ ﺍﻝﮑﻬﺭﻭﻤﻐﻨﺎﻁﻴﺴﻴﺔ ﻝﻠﻀﻌﻑ ﻭﺍﻝﺘﻼﺸﻲ ﺨﻼل ﺍﻹﺭﺴﺎل.
25 تو ا
ھ نا
ري
Wireless Networks
ﻭﺨﻼل ﻤﺭﻭﺭ ﺍﻝﻤﻭﺠﺎﺕ ﺍﻝﮑﻬﺭﻭﻤﻐﻨﺎﻁﻴﺴﻴﺔ ﻓﻲ ﻭﺴﻁ ﺍﻹﺭﺴﺎل ﻴﺘﻌﺭﺽ ﺠـﺯﺀ ﻤـﻥ ﻁﺎﻗﺘﻬﺎ ﻝﻼﻤﺘﺼﺎﺹ ﻭﺍﻝﺒﻌﺜﺭﺓ ﺒﺴﺒﺏ ﺍﻝﺨﻭﺍﺹ ﺍﻝﻔﻴﺯﻴﺎﺌﻴﺔ ﻝﻠﻭﺴﻁ. ﻴﺠﺏ ﺍﻻﻨﺘﺒﺎﻩ ﻝﻬﺫﺍ ﺍﻷﻤﺭ ﺨﺎﺼﺔ ﻋﻨﺩ ﺍﻝﺘﺨﻁﻴﻁ ﻻﺴﺘﺨﺩﺍﻡ ﻭﺴﻁ ﻤﺎ ﻤﻥ ﺍﻝﻤﻔـﺭﻭﺽ ﺃﻥ ﻴﻐﻁﻲ ﻤﺴﺎﺤﺔ ﺸﺎﺴﻌﺔ. ﻻ ﺘﺴﺘﻁﻴﻊ ﺃﻏﻠﺏ ﻭﺴﺎﺌﻁ ﺍﻹﺭﺴﺎل ﻋﺯل ﺍﻝﻤﻭﺠﺎﺕ ﺍﻝﮑﻬﺭﻭﻤﻐﻨﺎﻁﻴﺴﻴﺔ ﻋﻥ ﺍﻝﺘﺩﺍﺨل ﻤﻊ ﻤﻭﺠﺎﺕ ﺨﺎﺭﺠﻴﺔ. -4ﺍﻝﻤﻨﺎﻋــــــﺔ ﻤــــــﻥ ﺍﻝﺘــــــﺩﺍﺨل ﺍﻝﮑﻬﺭﻭﻤﻐﻨﺎﻁﻴــــــﺴﻲ immunity from electromagnetic interference. ﻴﺤﺩﺙ ﺍﻝﺘﺩﺍﺨل ﺍﻝﮑﻬﺭﻭﻤﻐﻨﺎﻁﻴﺴﻲ ﻋﻨﺩﻤﺎ ﺘﻘﻭﻡ ﻤﻭﺠﺎﺕ ﮑﻬﺭﻭﻤﻐﻨﺎﻁﻴﺴﻴﺔ ﻏﻴﺭ ﻤﺭﻏﻭﺏ ﺒﻬﺎ ﺒﺎﻝﺘﺄﺜﻴﺭ ﻋﻠﻰ ﺍﻹﺸﺎﺭﺓ ﺍﻝﻤﻨﻘﻭﻝﺔ ﻋﺒﺭ ﻭﺴﻁ ﺍﻹﺭﺴﺎل. ﮑﻤﺎ ﺃﻨﻪ ﻤﻥ ﺍﻝﺴﻬل ﺍﻋﺘﺭﺍﺽ ﺍﻝﻤﻭﺠﺎﺕ ﺍﻝﮑﻬﺭﻭﻤﻐﻨﺎﻁﻴﺴﻴﺔ ﻭﺍﻝﺘﺼﻨﺕ ﻋﻠﻴﻬﺎ ﻭﻫـﺫﺍ ﺃﻤـﺭ ﺨﻁﻴﺭ ﺇﺫﺍ ﮑﺎﻨﺕ ﺸﺒﮑﺘﻙ ﺘﺤﺘﻭﻱ ﻋﻠﻰ ﻤﻌﻠﻭﻤﺎﺕ ﺤﺴﺎﺴﺔ.
26 تو ا
ھ نا
ري
Wireless Networks
ا %ا * :+ا "
ا ھ
VPN
ﺍﻝﺸﺒﮑﺔ VPNﻤﻥ ﺍﻝﻨﺎﺤﻴﺔ ﺍﻝﻨﻅﺭﻴﺔ ﻫﻲ ﺭﺒﻁ ﻋﻤﻴل ﺒﻌﻴﺩ ﺒﻤﻠﻘﻡ VPNﻋﻥ ﻁﺭﻴﻕ ﺍﻹﻨﺘﺭﻨﺕ ،ﺸﺒﮑﺔ ﺍﻹﻨﺘﺭﻨﺕ ﺒﮑل ﺍﻝﺒﻨﻴﺔ ﺍﻝﺘﺤﺘﻴﺔ ﻫﻲ ﺍﻝﻭﺴﻴﻁ ﺒﻴﻥ ﺍﻝﻌﻤﻴل ﻭﻤﻠﻘـﻡ . VPN ﻭﻴﮑﻭﻥ ﺍﻻﺭﺘﺒﺎﻁ ﺒﻴﻥ ﺍﻝﺤﺎﺴﺒﻴﻥ ﮑﻤﺎ ﻝﻭ ﮑﺎﻨﻭﺍ ﻓﻲ ﺸﺒﮑﺔ ﺨﺎﺼﺔ ﺤﻘﻴﻘﻴﺔ ﻤﻘﻔﻠﺔ ،ﻭﻴﻤﮑﻥ ﺃﻥ ﻴﮑﻭﻥ ﻫﺫﺍ ﺍﻻﺘﺼﺎل ﺒﻴﻥ ﻓﺭﻋﻴﻥ ﺃﻭ ﺸﺭﮑﺎﺀ ﻋﻤل. ﺘﺘﻡ ﻤﺼﺎﺩﻗﺔ ﺍﺘﺼﺎﻻﺕ ﺍﻝﺸﺒﮑﺔ ﺍﻝﺨﺎﺼﺔ ﺍﻝﻅﺎﻫﺭﻴﺔ ) (VPNﺍﻝﺘـﻲ ﺘـﻡ ﺘﻤﮑـﻴﻥ PPTPﻭ L2TPﻋﻠﻴﻬﺎ ﺒﺎﺴﺘﺨﺩﺍﻡ ﺃﺴﺎﻝﻴﺏ PPP ﻴﺘﻀﻤﻥ ﺒﺭﻭﺘﻭﮑﻭل ﻤﺼﺎﺩﻗﺔ ﮑﻠﻤﺔ ﺍﻝﻤﺭﻭﺭ
ﻤـﺴﺘﻭﻯ ﺍﻝﻤـﺴﺘﺨﺩﻡ .ﻫـﺫﺍ ﻝﻤﺼﺎﺩﻗﺔ ﻭﺒﺭﻭﺘﻭﮑـﻭل ﺍﻝﻤـﺼﺎﺩﻗﺔ ﻝﺘﻌـﺎﺭﻑ ،PAP
ﺍﻻﺭﺘﻴـ ﺎﺏ ،CHAPﻭﺒﺭﻭﺘﻭﮑـﻭل Shivaﻝﻤـﺼﺎﺩﻗﺔ ﮑﻠﻤـﺔ ﺍﻝﻤـ ﺭﻭﺭ )،(SPAP ﻭﺒﺭﻭﺘﻭﮑـﻭل ﺍﻝﻤـﺼﺎﺩﻗﺔ ﻝﺘﻌـﺎﺭﻑ ﺍﻻﺭﺘﻴـﺎﺏ ) (MS CHAPﻝــ ،Microsoft ﻭﺒﺭﻭﺘﻭﮑﻭل ﺍﻝﻤﺼﺎﺩﻗﺔ ﺍﻝﻘﺎﺒل ﻝﻺﻝﺤﺎﻕ EAPﮑﺨﻴﺎﺭ ﺇﻀﺎﻓﻲ.
27 تو ا
ھ نا
ري
Wireless Networks
ﺒﺎﺴﺘﺨﺩﺍﻡ ﺨﻴﺎﺭﺍﺕ ﺃﻤﺎﻥ ﺒﺭﻭﺘﻭﮑﻭل ﺇﻨﺘﺭﻨﺕ IPSecﻭﺒﺭﺘﻭﮑﻭل ﺍﻝﻤﺼﺎﺩﻗﺔ ﺍﻝﻘﺎﺒل ﻝﻺﻝﺤﺎﻕ ) (EAPﺍﻝﺠﺩﻴﺩ ،ﺘﻭﻓﺭ ﺸﺒﮑﺔ ﺍﻻﺘﺼﺎل ﺍﻝﺨﺎﺼـﺔ ﺍﻝﻅﺎﻫﺭﻴـﺔ ﺃﻤـﺎﻥ ﻤﺤـﺴﻥ ﻝﻠﻤﺴﺘﺨﺩﻤﻴﻥ ﺍﻝﺒﻌﻴﺩﻴﻥ .ﻋﻠﻰ ﺴﺒﻴل ﺍﻝﻤﺜﺎ،ل ﺇﺫﺍ ﺘﻡ ﺘﮑﻭﻴﻥ ﻤﻠﻘﻡ ﺍﻝﻭﺼﻭل ﺍﻝﺒﻌﻴـﺩ ﻝﻁﻠـﺏ EAPﻝﻠﻤﺼﺎﺩﻗﺔ ،ﻴﺘﻡ ﻓﺭﺽ ﺍﻝﻤﺴﺘﻭﻯ ﺍﻷﻋﻠﻰ ﻤﻥ ﺍﻝﻤﺼﺎﺩﻗﺔ ﻻﺘﺼﺎﻻﺕ ﺍﻝﻁﻠﺏ ﺍﻝﻬﺎﺘﻔﻲ ﻭﻻﺘﺼﺎﻻﺕ ﺸﺒﮑﺔ ﺍﻻﺘﺼﺎل ﺍﻝﻅﺎﻫﺭﻴﺔ ﻝﻤﻠﻘﻡ ﺍﻝﻭﺼﻭل ﺍﻝﺒﻌﻴﺩ .ﺒﺎﻻﺴﺘﻔﺎﺩﺓ ﻤـﻥ ﺨﻴـﺎﺭﺍﺕ ﺍﻝﺘﺸﻔﻴﺭ ﻭﻤﺼﺎﺩﻗﺔ ﺒﺭﻭﺘﻭﮑﻭل ﻨﻘﻁﺔ ﺇﻝﻰ ﻨﻘﻁﺔ ،PPPﻭﺘﻌﺭﻴﻑ ﺘـﺼﻔﻴﺔ PPTPﻋﻠـﻰ ﻤﻠﻘﻡ ﺍﻝﻭﺼﻭل ﺍﻝﺒﻌﻴﺩ ﺍﻝﺨﺎﺹ ﺒﻙ ،ﻭﺘﻘﻴﻴﺩ ﻤﻠﻘﻡ ﺍﻝﻭﺼﻭل ﺍﻝﺒﻌﻴﺩ ﻋﻠﻰ ﺇﻨﺘﺭﻨﺕ ﻝﻴﻘﺒل ﻓﻘـﻁ ﻋﻤﻼﺀ PPTPﺍﻝ ﺼﺎﺩﻕ ﻋﻠﻴﻬﻡ ﺍﻝﺫﻴﻥ ﻗﺎﻤﻭﺍ ﺒﺘﺸﻔﻴﺭ ﺍﻝﺒﻴﺎﻨﺎﺕ ،ﻴﻤﮑﻥ ﻝﻤـﺴﺅﻭل ﺍﻝﻨﻅـﺎﻡ ﺘﺤﺴﻴﻥ ﺃﻤﺎﻥ ﺍﻝﺒﻴﺎﻨﺎﺕ ﻭﺇﺩﺍﺭﺓ ﺍﻝﻤﺴﺘﺨﺩﻤﻴﻥ ﺍﻝﺒﻌﻴﺩﻴﻥ ﺒﺸﮑل ﺃﮑﺜﺭ ﻓﻌﺎﻝﻴﺔ. ﻴﻭﺠﺩ ﻓﻲ ﺒﻌﺽ ﺍﻝﺒﻴﺌﺎﺕ ﺒﻴﺎﻨﺎﺕ ﻫﺎﻤﺔ ﺠﺩﹰﺍ ﺒﺤﻴﺙ ﻴﺠﺏ ﻋﺯﻝﻬﺎ ،ﻭﺇﺨﻔﺎﺅﻫﺎ ،ﺒﺸﮑل ﻓﻌﻠﻲ ﻋﻥ ﺃﻏﻠﺒﻴﺔ ﺍﻝﻤﺴﺘﺨﺩﻤﻴﻥ ﻓﻲ ﺍﻝﺸﺭﮑﺔ .ﻤﺜل ﺍﻝﺒﻴﺎﻨﺎﺕ ﺍﻝﻤﺎﻝﻴـﺔ ﺃﻭ ﺒﻴﺎﻨـﺎﺕ ﺍﻝﻤـﻭﺍﺭﺩ ﺍﻝﺒﺸﺭﻴﺔ .ﻭﺘﺴﺘﻌﻤل ﺍﻝﺸﺭﮑﺎﺕ ﺍﺘﺼﺎﻻﺕ VPNﻋﺒﺭ ﻤﻠﻘﻡ VPNﻝﻔﺭﺯ ﺍﻝﺒﻴﺎﻨﺎﺕ ﺒﺎﻝﻐـﺔ ﺍﻷﻫﻤﻴﺔ ﺒﺸﮑل ﻓﻌﻠﻲ ،ﻤﻊ ﺍﻝﺴﻤﺎﺡ ﺒﺎﻝﻭﺼﻭل ﺍﻵﻤﻥ ﺇﻝﻴﻬﺎ ﻤﻥ ﻗﺒل ﻤﺴﺘﺨﺩﻤﻴﻥ ﻤﺨﺘـﺎﺭﻴﻥ. ﻴﺴﺘﻁﻴﻊ ﺍﻝﻤﺴﺘﺨﺩﻤﻭﻥ ﺍﻝﻤﻭﺠﻭﺩﻭﻥ ﻋﻠﻰ ﺸﺒﮑﺔ ﺍﻨﺘﺭﺍﻨﺕ ﻝﻠﺸﺭﮑﺔ ﻭﺍﻝﺫﻴﻥ ﻨﺤﻭﺍ ﺍﻷﺫﻭﻨﺎﺕ ﺍﻝﻤﻨﺎﺴﺒﺔ ،ﺘﺄﺴﻴﺱ ﺍﺘﺼﺎل ﻋﻤﻴل VPNﺒﻌﻴﺩ ﻤﻊ ﻤﻠﻘﻡ VPNﻭﻴﺴﺘﻁﻴﻌﻭﻥ ﺍﻝﻭﺼﻭل ﺇﻝﻰ ﺍﻝﻤﻭﺍﺭﺩ ﺍﻝﻤﺤﻤﻴﺔ ﻋﻠﻰ ﺸﺒﮑﺔ ﺍﻝﻘﺴﻡ ﺍﻝﺤ ﺎﺱ .ﺒﺎﻹﻀﺎﻓﺔ ﺇﻝﻰ ﺫﻝﻙ ،ﺘﮑﻭﻥ ﮑﺎﻓﺔ ﺍﻻﺘﺼﺎﻻﺕ ﻋﺒﺭ VPNﻤﺸﻔﺭﺓ ﻤﻥ ﺃﺠل ﺴﺭﻴﺔ ﺍﻝﺒﻴﺎﻨﺎﺕ .ﻭﺍﻝﻤﺴﺘﺨﺩﻤﻭﻥ ﺍﻝﺫﻴﻥ ﻻ ﻴﻤﻠﮑﻭﻥ ﺍﻷﺫﻭﻨﺎﺕ ﺍﻝﻤﻨﺎﺴﺒﺔ ﻝﺘﺄﺴﻴﺱ ﺍﺘﺼﺎل VPNﻤﻊ ﻤﻠﻘﻡ VPNﻻ ﻴﺴﺘﻁﻴﻌﻭﻥ ﺭﺅﻴﺔ ﺍﻝﻤﻠﻘﻡ ﺍﻝﻤﺨﻔﻲ. ﻭﻗﺩ ﺤﻠﺕ ﺍﻝﺸﺒﮑﺔ ﺍﻝﻅﺎﻫﺭﻴﺔ ﻤﺸﮑﻠﺔ ﺘﮑﻠﻔﺔ ﺍﻻﺘﺼﺎل ﺍﻝﺒﻌﻴﺩ ﺒﻴﻥ ﺍﻝـﺸﺒﮑﺎﺕ ﺴـﻭﺍﺀ ﻓﺭﻭﻉ ﺍﻝﺸﺒﮑﺎﺕ ﻓﻲ ﺍﻷﻤﺎﮑﻥ ﺍﻝﺒﻌﻴﺩﺓ ﺃﻭ ﺍﻝﺸﺭﮑﺎﺀ ﺍﻝﻤﺨﺘﻠﻔﻴﻥ ،ﻭﮑﺎﻨﺕ ﺍﻝﺘﮑﻠﻔﺔ ﺍﻝﮑﺒﻴﺭﺓ ﻝﺭﺒﻁ ﺸﺒﮑﺘﻴﻥ ﺒﻌﻴﺩﺘﻴﻥ ﻋﺎﺌﻕ ﺤﻘﻴﻘﻲ ﺃﻤﺎﻡ ﺒﻌﺽ ﺍﻝﺸﺭﮑﺎﺕ ﺍﻝﺘﻲ ﺘﺭﻏﺏ ﻓﻲ ﺘﻭﺴﻴﻊ ﺩﺍﺌﺭﺓ ﺍﻹﺩﺍﺭﺓ ﻭﺍﻝﺘﺤﮑﻡ ﻭﻨﻘل ﺍﻝﻤﻌﻁﻴﺎﺕ ﺒﻴﻥ ﻓﺭﻭﻋﻬﺎ.
28 تو ا
ھ نا
ري
Wireless Networks
ﻭﺠﺎﺀﺕ ﺍﻝﺸﺒﮑﺔ ﺍﻝﺨﺼﻭﺼﻴﺔ ﺍﻝﻭﻫﻤﻴﺔ ﻝﺘﺤل ﻫﺫﻩ ﺍﻝﻤﺸﮑﻠﺔ ﺒﺘﺨﻔﻴﺽ ﮑﺒﻴﺭ ﻓﻲ ﮑﻠﻔﺔ ﺍﻻﺘﺼﺎل ﺍﻝﺒﻌﻴﺩ.
ﻤﻤﻴﺯﺍﺕ ﺸﺒﮑﺔ VPN ﺭﺨﻴﺼـﺔ: ﻴﻌﺘﺒﺭ ﺭﺨﺹ ﺍﻝﺘﮑﻠﻔﺔ ﻓﻲ ﺸﺒﮑﺔ VPNﻫﻲ ﺍﻝﻤﻴﺯﺓ ﺍﻷﮑﺒﺭ ﻓﻴﻬﺎ ﻤﻊ ﻤﻘﺎﺭﻨﺔ ﺍﻻﺘـﺼﺎل ﺒﺎﺴﺘﺨﺩﺍﻡ ﻁﺭﻴﻘﺔ ﺃﺨﺭﻯ ﻤﺜل ﺩﺍﺭﺓ ﻁﻭﻴﻠﺔ ﻤﺅﺠﺭﺓ ﻓﺎﻝﺭﺒﻁ ﻴﮑـﻭﻥ ﺒﺎﻻﺘـﺼﺎل ﺒـﺎﻝﻤﺯﻭﺩ ﻻ ﺒـﺸﺒﮑﺔ ﺍﻝﻤﺤﻠﻲ ﻝﻺﻨﺘﺭﻨﺕ ﺜﻡ ﺘﻨﺸﺎﺀ ﺸﺒﮑﺔ VPNﻝﻠﻤﻠﻘﻡ ﺍﻝﻬﺩﻑ ﺍﻝﺫﻱ ﻴﮑﻭﻥ ﻤﻭﺼـﻭ ﹰ ﺍﻹﻨﺘﺭﻨﺕ ﺒﺨﻁ DSLﻤﻊ ﻋﻨﻭﺍﻥ IPﺜﺎﺒﺕ . ،، ﺁﻤﻨﺔ: ﻭﻫﻲ ﺸﺒﮑﺔ ﺁﻤﻨﺔ ﺤﻴﺙ ﺘﺴﺘﺨﺩﻡ ﻓﻲ ﺍﻻﺘﺼﺎل ﺍﺘﻔﺎﻗﻴﺎﺕ ﺍﻻﺘﺼﺎل ﺍﻵﻤـﻥ ،ﻭﻴـﺩﻋﻡ ﻭﻴﻨﺩﻭﺯ 2000ﺍﺘﻔﺎﻗﻴﺘﻴﻥ ﻭﻫﻲ PPTPﻨﻘﻁﺔ ﺇﻝﻰ ﻨﻘﻁﺔ ،ﻭﺍﺘﻔﺎﻗﻴﺔ L2TPﻭﻫﺫﻩ ﺍﻻﺘﻔﺎﻗﺎﺕ ﻫﻲ ﻋﺒﺎﺭﺓ ﻋﻥ ﺒﺭﻭﺘﻭﮑﻭﻻﺕ ﺁﻤﻨﺔ ﺘﻨﻘل ﺍﻝﻤﻌﻁﻴﺎﺕ ﻋﺒﺭ ﺍﻹﻨﺘﺭﻨﺕ ﻓﻲ ﺸـﺒﮑﺔ ، VPN ﻭﺍﻝﺒﺭﻭﺘﻭﮑﻭل L2TPﻫﻭ ﺍﻷﻗﻭﻯ ﺤﻴﺙ ﺃﻨﻪ ﻴﻌﺘﺒﺭ ﺨﻠﻴﻁ ﻤـﻥ ﺍﻝﺒﺭﻭﺘﻭﮑـﻭل PPTPﻭ L2F
ﻤـﻭﺜـﻭﻗـﺔ: ﻭﻫﻲ ﻤﻭﺜﻭﻗﺔ ﺤﻴﺙ ﻤﻥ ﻭﺍﻗﻊ ﺘﺠﺭﺒﺔ ﮑﺜﻴﺭ ﻤﻥ ﺍﻝﺸﺭﮑﺎﺕ ﻭﺍﻝﻘﻁﺎﻋﺎﺕ ﺤﺘﻰ ﺍﻝﺴﺭﻴﺔ ﻤﻨﻬـﺎ ﺘﻌﺘﺒﺭ ﺘﺠﺎﺭﺏ ﻨﺎﺠﺤﺔ ﻭﻫﻲ ﺴﻬﻠﺔ ﻓﻲ ﺇﻋﺩﺍﺩ ﺨﺎﺩﻡ VPNﻭﺴﻬﻠﺔ ﻓﻲ ﻭﺼل ﻋﻤﻴل ﺍﻝﺸﺒﮑﺔ ﺴﻭﺍﺀ ﮑﺎﻥ ﻋﻤﻴل ﻭﻴﻨﺩﻭﺯ 2000ﺃﻭ ﻋﻤﻴل XPﺃﻭ ﺤﺘﻰ ﻭﻴﻨﺩﻭﺯ . x9 ﺴـﻬﻠﺔ: ﺍﻝﺘﺠﻬﻴﺯ ﺤﺘﻰ ﺘﮑﻭﻥ ﻤﺴﺘﻌﺩ ﻝﻌﻤل ﺍﻝﺸﺒﮑﺔ ﻴﻠﺯﻡ ﺍﻝﺘﺄﮑﺩ ﻤﻥ ﻋﺩﺩ ﻤﻥ ﺍﻷﻤﻭﺭ ﻤﻨﻬﺎ:
29 تو ا
ھ نا
ري
Wireless Networks
• ﺨﺎﺩﻡ ﺍﻝـ VPNﻴﮑﻭﻥ ﻤﻭﺼﻭل ﺒﺸﺒﮑﺔ ﺍﻹﻨﺘﺭﻨﺕ ﺒﺨﻁ DSLﻤﻊ ﻋﻨـﻭﺍﻥ IP ﺜﺎﺒﺕ. • ﺨﺎﺩﻡ ﺍﻝـ VPNﻴﮑﻭﻥ ﻤﺜﺒﺕ ﻋﻠﻴﻪ ﺃﻭ ﻋﻠﻰ ﺨﺎﺩﻡ ﺜﺎﻨﻲ ﻓﻲ ﻨﻔﺱ ﺍﻝﺸﺒﮑﺔ ﺨﺩﻤـﺔ DHCP • ﻋﻤﻼﺀ ﺍﻝﻭﺼﻭل ﺍﻝﺒﻌﻴﺩ ﻝﻬﻡ ﺤﺴﺎﺏ ﻓﻲ ﺍﻝﺸﺒﮑﺔ ﺒﺎﺴﻡ ﻭﮑﻠﻤﺔ ﻤﺭﻭﺭ. • ﺃﺠﻬﺯﺓ ﺍﻝﻌﻤﻼﺀ ﻗﺎﺩﺭﺓ ﻋﻠﻰ ﺘﺄﺴﻴﺱ ﺍﻻﺘﺼﺎل ﺒﺘﺩﺭﻴﺏ ﺃﺼﺤﺎﺒﻬﺎ ﺃﻭ ﺘﻘﻭﻡ ﺒﺘﺠﻬﻴﺯﻫﺎ ﺃﻨﺕ. ﺘﺘﻠﺨﺹ ﺍﻝﻔﮑﺭﺓ ﻓﻲ ﺍﺴﺘﺨﺩﺍﻡ ﺸﺒﮑﺔ ﺍﻹﻨﺘﺭﻨﺕ ﻝﺘﻤﮑﻴﻥ ﺭﺠـﺎل ﺍﻷﻋﻤـﺎل ﻭ ﮑﺒـﺎﺭ ﺍﻝﻤﻭﻅﻔﻴﻥ ﺃﻭ ﺃﻱ ﺸﺨﺹ ﻤﺼﺭﺡ ﻝﻪ ﺒﺫﻝﻙ ﻤﻥ ﺍﻝﺩﺨﻭل ﺇﻝﻰ ﺍﻝﺸﺒﮑﺔ ﺍﻝﻤﺤﻠﻴﺔ ﺍﻝﺨﺎﺼﺔ ﺒﻤﻘﺭ ﺍﻝﻌﻤل ﻝﻠﺩﺨﻭل ﺇﻝﻰ ﺠﻤﻴﻊ ﺍﻝﺒﺭﺍﻤﺞ ﻭ ﺍﻝﻤﻌﻠﻭﻤﺎﺕ ﻭ ﻷﺩﺍﺀ ﻭ ﺘﻨﻔﻴﺫ ﺒﻌﺽ ﺍﻝﻤﻬـﺎﻡ ﺃﺜﻨـﺎﺀ ﺘﻭﺍﺠﺩﻫﻡ ﺨﺎﺭﺝ ﺍﻝﻤﮑﺘﺏ ﺃﻭ ﺃﺜﻨﺎﺀ ﺍﻝﺴﻔﺭ ﺒﻌﻴﺩﺍ ﻋﻥ ﻤﻘﺭ ﺍﻝﻌﻤل. ﮑﻴﻔﻴﺔ ﻋﻤﻠﻬﺎ ﻴﺘﻡ ﺇﺭﺴﺎل ﻭﺍﺴﺘﻘﺒﺎل ﺍﻝﻤﻌﻠﻭﻤﺎﺕ ﻋﻠﻰ ﺸﮑل ﺠﻴﻭﺏ ﺼﻐﻴﺭﺓ ﻤـﻥ ﺍﻝﻤﻌﻠﻭﻤـﺎﺕ، ﺒﺤﻴﺙ ﻴﺘﻡ ﺘﻘﺴﻴﻡ ﺍﻝﻤﻌﻠﻭﻤﺎﺕ ﺇﻝﻰ ﻫﺫﻩ ﺍﻝﺠﻴﻭﺏ ﺍﻝﺼﻐﻴﺭﺓ ﻝﺘﺴﻬل ﻤﻥ ﻋﻤﻠﻴﺔ ﻨﻘﻠﻬـﺎ ﻋﻠـﻰ ﺸﺒﮑﺔ ﺍﻹﻨﺘﺭﻨﺕ ﻭﮑل ﺠﻴﺏ ﻴﺤﻤل ﻋﻨﻭﺍﻥ ﺍﻝﻤﺭﺴل ﻭﺍﻝﻤﺴﺘﻘﺒل ﻭﮑﺫﻝﻙ ﺒﻁﺎﻗﺔ ﻤﻤﻴﺯﺓ ﺘﺴﺎﻋﺩ ﻋﻠﻰ ﺘﻭﺠﻴﻪ ﺍﻝﺠﻴﺏ ﻋﻨﺩ ﺍﻝﻭﺼﻭل ﺇﻝﻰ ﺠﻬﺎﺯ ﺍﻝﻤﺴﺘﻘﺒل ﻨﻅﺭﹰﺍ ﻝﻠﻤﺨﺎﻁﺭ ﺍﻝﻤﻭﺠﻭﺩﺓ ﻋﻠـﻰ ﺸﺒﮑﺔ ﺍﻹﻨﺘﺭﻨﺕ ﻓﺈﻥ ﺠﻤﻴﻊ ﺍﻝﺠﻴﻭﺏ ﻴﺘﻡ ﺘﺸﻔﻴﺭﻫﺎ ﻭﻴﺘﻡ ﺇﻀﺎﻓﺔ ﺍﻝﺘﻭﻗﻴﻊ ﺍﻹﻝﮑﺘﺭﻭﻨﻲ ﻝﻠﻤﺭﺴل ﻝﻴﺘﻡ ﺍﻝﺘﺄﮑﺩ ﻤﻥ ﻫﻭﻴﺘﻪ ﻭﻴﺘﻡ ﺘﻐﻠﻴﻑ ﻫﺫﻩ ﺍﻝﺠﻴﻭﺏ ﺍﻝﻤﺸﻔﺭﺓ ﺒﻌﺩ ﺫﻝﻙ ﺒﻐﻼﻑ ﺨـﺎﺭﺠﻲ ﻭﻻ ﻴﻅﻬﺭ ﻤﻥ ﺍﻝﻤﻌﻠﻭﻤﺎﺕ ﺴﻭﻯ ﻋﻨﻭﺍﻥ ﺍﻝﻤﺭﺴل ﺇﻝﻴﻪ ﻭ ﺘﺴﻤﻰ ﻫﺫﻩ ﺍﻝﻌﻤﻠﻴﺔ ﺒﺈﻨﺸﺎﺀ ﺍﻷﻨﺒـﻭﺏ .Tunneling ﺒﻌﺩ ﻭﺼﻭل ﺍﻝﺠﻴﻭﺏ ﺇﻝﻰ ﺍﻝﺠﻬﺎﺯ ﺍﻝﻤﺴﺘﻘﺒل ﻴﺘﻡ ﺍﻝﺘﺄﮑﺩ ﻤﻥ ﺃﻨﻬﺎ ﻤﻥ ﻁﺭﻑ ﺸﺨﺹ ﻤﺨﻭل ﻝﻪ ﺒﺎﺴﺘﺨﺩﺍﻡ ﺍﻝﺸﺒﮑﺔ ﺍﻻﻓﺘﺭﺍﻀﻴﺔ ﻭﻴﺘﻡ ﻓﻙ ﺍﻝﺸﻔﺭﺓ ﻭﻴﺘﻡ ﺘﺠﻤﻴﻊ ﺍﻝﻤﻌﻠﻭﻤﺎﺕ ﻭﺘﺭﺘﻴﺒﻬﺎ ﻤﺭﺓ ﺃﺨﺭﻯ ﻭﺇﺭﺴﺎﻝﻬﺎ ﺇﻝﻰ ﺍﻝﺸﺨﺹ ﺃﻭ ﺍﻝﺠﻬﺎﺯ ﺍﻝﻤﺭﺴل ﺇﻝﻴﻪ ﺩﺍﺨل ﺍﻝﺸﺒﮑﺔ ﺍﻝﻤﺤﻠﻴﺔ.
30 تو ا
ھ نا
ري
Wireless Networks
ﺘﺠﻬﻴﺯ ﺸﺒﮑﺔ :VPN ﻝﺘﺠﻬﻴﺯ ﺍﻝﺨﺎﺩﻡ ﻝﻘﺒﻭل ﺍﺘﺼﺎﻻﺕ VPNﻨﺤﺘﺎﺝ ﺇﻝﻰ ﺘﺜﺒﻴﺕ ﺍﻝﺨﺩﻤﺔ RRASﻭﻫـﻲ ﺘﮑﻭﻥ ﻤﺜﺒﺘﻪ ﻤﻊ ﺘﺜﺒﻴﺕ ﺍﻝﻭﻴﻨﺩﻭﺯ 2000ﻭﻝﮑﻥ ﺘﮑﻭﻥ ﻏﻴﺭ ﻤﻤﮑﻨﺔ ﻭﺘﺤﺘﺎﺝ ﺇﻝـﻰ ﺘﻔﻌﻴ،ﻝـ ﻭﺴﻨﻘﻭﻡ ﺒﺘﻤﮑﻴﻥ ﺍﻝﺨﺩﻤﺔ ﻋﻠﻰ ﻤﻠﻘﻡ ﻭﻴﻨﺩﻭﺯ ،2000ﻭﻝﮑﻥ ﻨﻔﺘﺭﺽ ﻓﻲ ﻫﺫﺍ ﺍﻝﺸﺭﺡ ﻭﺠﻭﺩ ﺨﺩﻤﺔ ﺍﻝـ DHCPﻋﻠﻰ ﻨﻔﺱ ﺍﻝﺨﺎﺩﻡ ،ﻤﻊ ﺍﺘﺼﺎل ﺩﺍﺌﻡ ﺒﺎﻹﻨﺘﺭﻨﺕ ﻤﻊ ﻤﻌﺭﻓﺘﻙ ﺒﻌﻨـﻭﺍﻥ IPﺍﻝﺜﺎﺒﺕ ،ﺴﻨﻘﻭﻡ ﻓﻲ ﻤﺜﺎﻝﻨﺎ ﻫﺫﺍ ﺒﺈﻋﺩﺍﺩ ﻤﺨﺩﻡ ، VPN PPTPﻷﻥ ﻫﺫﺍ ﺍﻝﻤﺨﺩﻡ ﻴﻌﺘﺒﺭ ﺍﺴﻬل ﻓﻲ ﺍﻹﻋﺩﺍﺩ ﻭﺍﻝﻭﺼﻭل ﺇﻝﻴﻪ ﺒﺴﺒﺏ ﺍﺴﺘﺨﺩﺍﻤﻪ ﻝﻭﺜﺎﺌﻕ Logonﻝﻠﻤﺴﺘﺜﻤﺭ ﻓﻘﻁ ،ﺃﻤـﺎ ﻤﺨﺩﻡ VPN L2TPﻓﻬﻭ ﻴﺴﺘﺨﺩﻡ ﻓﻲ ﮑﺜﻴﺭ ﻤﻥ ﺍﻝﺤﺎﻻﺕ ﺒﻴﻥ ﺍﻝﻤﺨﺩﻤﺎﺕ ﻝﻤﺎ ﻝـﻪ ﻤـﻥ ﻤﺯﺍﻴﺎ ﻓﻲ ﺍﻷﻤﻥ ﺍﮑﺒﺭ .ﺍﺨﺘﺭ Programs < Administrative Tools < Routing and Remote Access
ﺜﻡ ﻤﻥ ﻋﻠﻰ ﺍﺴﻡ ﺍﻝﺨﺎﺩﻡ ﺒﺎﻝﺯﺭ ﺍﻷﻴﻤﻥ ﺍﺨﺘﺭ Configure And Enable Routing And Remote Access
ﻴﻔﺘﺢ ﻝﻙ ﻤﻌﺎﻝﺞ ﺍﻝﺘﺜﺒﻴﺕ ﺍﻨﻘﺭ Nextﻤﻥ ﻫﺫﻩ ﺍﻝﻨﺎﻓﺫﺓ ﺍﺨﺘﺭ ﺍﻝﺨﻴﺎﺭ ﺸﺒﮑﺔ VPN ﻓﻲ ﺍﻝﻨﺎﻓﺫﺓ ﺍﻝﺘﺎﻝﻴﺔ ﺘﺄﮑﺩ ﻤﻥ ﻭﺠﻭﺩ ﺍﻝﺒﺭﻭﺘﻭﮑﻭل TCP/IPﻭﺍﺘﺭﻙ ﺍﻝﺨﻴﺎﺭ ﺍﻝﻤﺨﺘـﺎﺭ ﮑﻤﺎ ﻫﻭ ﺜﻡ Nextﺴﺘﺸﺎﻫﺩ ﺍﻵﻥ ﺍﺘﺼﺎﻻﺕ ﺍﻝﺨﺎﺩﻡ ﻭﻤﻨﻬﺎ ﺍﺘﺼﺎل ﺍﻹﻨﺘﺭﻨﺕ ﺍﺨﺘﺭ ﺍﻻﺘﺼﺎل ﺍﻝﺩﺍﺌﻡ ﺜﻡ Nextﻓﻲ ﻫﺫﻩ ﺍﻝﻨﺎﻓﺫﺓ ﺘﺨﺘﺎﺭ ﺃﻤﺎ ﺇﺴﻨﺎﺩ ﻋﻨﺎﻭﻴﻥ ﻤﺤـﺩﺩﺓ ﻝﻠﻌﻤـﻼﺀ ﺃﻭ ﺇﺴـﻨﺎﺩ ﺍﻝﻌﻨﺎﻭﻴﻥ ﻤﻥ DHCPﺍﻗﺒل ﺍﻝﺨﻴﺎﺭ Automaticallyﻝﻘﺒﻭل ﺍﺴﺘﺨﺩﺍﻡ DHCPﺍﻝﻤﺤﻠﻲ ﻝﻠﻌﻤﻼﺀ ﺍﻝﻤﺘﺼﻠﻴﻥ. ﻤﻥ ﺃﺨﺭ ﻨﺎﻓﺫﺓ ﺍﺨﺘﺭ ﺍﻝﺨﻴﺎﺭ ﺍﻝﺘﻠﻘﺎﺌﻲ ﻓﻴﻬﺎ ﻭﻫﻲ ﻋﺩﻡ ﺍﺴﺘﺨﺩﺍﻡ ﺍﻝﺨﺩﻤـﺔ RADIUS ﻝﺘﺤﻘﻕ ﻤﻥ ﺼﺤﺔ ﺍﻝﻤﻌﻠﻭﻤﺎﺕ ﺍﻝﻤﻘﺩﻤﺔ ﻤﻥ ﺍﻝﻤﺘﺼﻠﻴﻥ ،ﻻﻥ ﺘﻭﺜﻴﻕ ﺍﻝﻭﻴﻨﺩﻭﺯ ﺍﻝﺘﻠﻘﺎﺌﻲ ﻴﻔﻲ ﺒﮑل ﻤﺘﻁﻠﺒﺎﺘﻙ ﺍﻷﻤﻨﻴﺔ ﻋﻨﺩﻤﺎ ﺘﮑﻭﻥ ﺘﻤﻠﻙ ﺨﺎﺩﻡ RASﻭﺤﻴﺩ ﻋﻠﻰ ﺍﻝﺸﺒﮑﺔ ﺍﻨﻘـﺭ Next
31 تو ا
ھ نا
ري
Wireless Networks
ﻓﺘﻅﻬﺭ ﻝﻙ ﺭﺴﺎﻝﺔ ﺘﺤﺫﻴﺭ ﻤﻥ DHCPﻭﻫﻲ ﻏﻴﺭ ﻀﺭﻭﺭﻴﺔ ﺇﻻ ﻓﻲ ﺤﺎﻝﺔ ﻭﺠﻭﺩ ﻤﺨـﺩﻡ DHCPﻋﻠﻰ ﺸﺒﮑﺔ ﻓﺭﻋﻴﺔ ﺃﺨﺭﻯ ﺍﻨﻘﺭ OKﺘﻅﻬﺭ ﻝﻙ ﻨﺎﻓﺫﺓ ﺍﻝﺘﺠﻬﻴﺯ ﻝﻌﻤل ﺍﻝﺨﺩﻤﺔ. ﺍﻵﻥ ﺘﺸﺎﻫﺩ ﺍﻝﻌﻼﻤﺔ ﺍﻝﺤﻤﺭﺍﺀ ﺍﻝﺘﻲ ﮑﺎﻨﺕ ﻋﻠﻰ ﺍﺴﻡ ﺍﻝﺨﺎﺩﻡ ﺃﺼﺒﺤﺕ ﺒﻠﻭﻥ ﺍﺨـﻀﺭ، ﻭﺒﻬﺫﺍ ﺘﮑﻭﻥ ﻗﺩ ﻤﮑﻨﺕ ﺍﻝﻤﻠﻘﻡ ﻤﻥ ﺍﻻﺴﺘﻌﺩﺍﺩ ﻻﺴﺘﻘﺒﺎل ﺍﻝﻌﻤﻼﺀ ﻋﺒـﺭ ﺒﻭﺍﺒـﺔ ﺍﻹﻨﺘﺭﻨـﺕ، ﻭﻁﺒﻌ ﹰﺎ ﻤﻊ ﻫﺫﺍ ﺍﻝﺘﺜﺒﻴﺕ ﺍﻻﻓﺘﺭﺍﻀﻲ ﺘﻭﺠﺩ ﺒﻌﺽ ﺍﻝﺨﺼﺎﺌﺹ ﺍﻝﺘﻲ ﻤﻥ ﺍﻝﻤﻤﮑـﻥ ﺘﻐﻴﺭﻫـﺎ ﺤﺴﺏ ﺤﺎﺠﺘﻙ ﻤﺜل ﻋﺩﺩ ﺍﻝﻤﻨﺎﻓﺫ ﻝﮑل ﺒﺭﻭﺘﻭﮑﻭل ﻭﻝﮑل ﺒﺭﻭﺘﻭﮑﻭل ﻋﻨﺩ ﺍﻝﺘﺜﺒﻴﺕ ﻋﺩﺩ 128 ﻤﻨﻔﺫ ﻴﻤﮑﻥ ﺘﺨﻔﻴﺽ ﻤﻨﺎﻓﺫ ﺍﻝﺒﺭﻭﺘﻭﮑﻭل PPTPﺇﻝﻰ 1ﻤﻨﻔﺫ ﻭﻝﮑﻥ ﻫﺫﺍ ﻋﺩﺩ ﻗﻠﻴل ﺠﺩﹰﺍ ﺤﺩﺩ ﻋﺩﺩ ﻤﻌﻘﻭ،ل ﻭﺍﻝﺒﺭﻭﺘﻭﮑﻭل L2TPﻴﻤﮑﻥ ﺃﻥ ﺘﺤﺩﺩ ﺍﻝﺭﻗﻡ 0ﻴﻌﻨﻲ ﻻ ﻴﻭﺠﺩ ﻤﻨﻔﺫ ،ﻝﺘﺤﺩﻴﺩ ﺃﻭ ﺇﻝﻐﺎﺀ ﺍﻝﻤﻨﺎﻓﺫ ﻤﻥ ﻋﻼﻤﺔ +ﺒﺠﺎﻨﺏ ﺍﺴﻡ ﺨﺎﺩﻡ VPNﺘﻅﻬﺭ ﻝﻙ Portsﺒﺎﻝﺯﺭ ﺍﻷﻴﻤﻥ ﻝﻠﻤﺎﻭﺱ ﻨﺨﺘﺎﺭ ﺨﺼﺎﺌﺹ ﺜﻡ ﻤﻥ ﺍﻝﻨﺎﻓﺫﺓ ﻨﺨﺘﺎﺭ ﺃﺤـﺩ
ﺜـﻡ ﻤـﻥ ﺍﻝـﺯﺭ ﺍﻝﺒﺭﻭﺘﻭﮑـﻭﻝﻴﻥ
Configureﺜﻡ ﺃﻤﺎﻡ Maximum portsﺍﮑﺘﺏ ﺍﻝﺭﻗﻡ ﺍﻝﻤﻁﻠﻭﺏ. ﻭﻝﻠﺘﻭﺴﻊ ﺃﮑﺜﺭ ﻓﻲ ﻫﺫﺍ ﺍﻝﻤﺠﺎل ﻴﻤﮑﻨﻙ ﺍﻝﺭﺠﻭﻉ ﺇﻝﻰ ﻤﻭﻗﻊ ﺸﺭﮑﺔ Microsoft ﻤﻭﻗﻊ ﺠﻴﺩ ﮑﻤﺭﺠﻊ: http://www.windowsnetworking.com ﺨﻁﻭﺍﺕ ﺍﻝﺘﻁﺒﻴﻕ ﻭﺍﻝﻤﺭﺍﺤل: .1ﺃﻭل ﻤﺎ ﺘﺤﺘﺎﺠﻪ ﻫﻭ ﻨﻅﺎﻡ ﺘﺸﻐﻴل ﻴﺩﻋﻡ ﻫﺫﻩ ﺍﻝﺸﺒﮑﺔ .2ﺍﻝﺤﺼﻭل ﻋﻠﻰ ﻨﻅﺎﻡ ﺘﺸﻐﻴل ﻴﺩﻋﻡ ﺍﻝﺸﺒﮑﺔ ﺍﻻﻓﺘﺭﺍﻀﻴﺔ ﻤﺜل ﻭﻴﻨﺩﻭﺯ Xpﺤﻴﺙ ﺍﻨﻪ ﻴﺩﻋﻡ ﺍﻝﺸﺒﮑﺔ ﺍﻻﻓﺘﺭﺍﻀﻴﺔ. .3ﻴﺠﺏ ﺃﻥ ﺘﻤﻠﻙ ﺭﻗﻡ ﺃﻱ ﺒﻲ ﺨﺎﺹ ﺒﻙ ﺃﻭ ﺍﺴﻡ ﻨﻁﺎﻕ. ﻹﻨﺸﺎﺀ ﺸﺒﮑﺔ VPNﻨﻘﻭﻡ ﺒﺎﻝﺨﻁﻭﺍﺕ ﺍﻝﺘﺎﻝﻴﺔ : 1ـ ﺍﻝﺩﺨﻭل ﺇﻝﻰ ﻝﻭﺤﺔ ﺍﻝﺘﺤﮑﻡ ﻭﺍﺨﺘﻴﺎﺭ ﺍﺘﺼﺎﻻﺕ ﺸﺒﮑﺔ ﺍﻻﺘﺼﺎل ﻭﺍﻹﻨﺘﺭﻨﺕ ﻨﺨﺘـﺎﺭ ﻤﻥ ﻫﺫﻩ ﺍﻝﻘﺎﺌﻤﺔ ﺇﻨﺸﺎﺀ ﺍﺘﺼﺎل ﻓﻲ ﻤﮑﺎﻥ ﺍﻝﻌﻤل ﻓﺘﻅﻬﺭ ﻝﻨﺎ ﻗﺎﺌﻤﺔ ﻤﻌﺎﻝﺞ ﺍﺘﺼﺎل ﺠﺩﻴﺩ.
32 تو ا
ھ نا
ري
Wireless Networks
ﻨﺨﺘﺎﺭ ﺍﻝﺒﻨﺩ ﺍﻝﺜﺎﻨﻲ ﺍﺘﺼﺎل ﺸﺒﮑﺔ ﺨﺎﺼﺔ ﻅﺎﻫﺭﻴﺔ VPNﻭﻨﻀﻐﻁ ﺍﻝﺘﺎﻝﻲ ﻓﺘﻅﻬﺭ ﻝﻨﺎ ﻗﺎﺌﻤﺔ ﺘﻁﻠﺏ ﺇﺩﺨﺎل ﺍﺴﻡ ﺍﻝﺸﺭﮑﺔ ﺃﻭ ﺍﻻﺴﻡ ﺍﻝﺫﻱ ﻨﺭﻴﺩ ﺘﺴﻤﻴﺔ ﺍﻻﺘﺼﺎل ﺒﻪ. ﺇﺩﺨﺎل ﺃﻱ ﺍﺴﻡ ﻨﺭﻴﺩﻩ ﺃﻭ ﺍﺴﻡ ﻤﻠﻘﻡ ﻤﺜﻼ ،ﻋﻨﺩ ﺍﻝﻀﻐﻁ ﻋﻠﻰ ﺍﻝﺘﺎﻝﻲ ﺴـﺘﻅﻬﺭ ﻝﺘـﺎ ﻴﻤﮑﻥ ﺍﻝﻼﺌﺤﺔ ﺍﻝﺘﺎﻝﻴﺔ:
ﻤﻥ ﻫﻨﺎ ﻴﺘﻴﺢ ﻝﻨﺎ ﻨﻅﺎﻡ ﺍﻝﺘﺸﻐﻴل ﺇﻤﮑﺎﻨﻴﺔ ﺍﺨﺘﻴﺎﺭ ﻁﻠﺏ ﺍﻻﺘﺼﺎل ﺍﻷﻭﻝﻲ ﺇﻝﻰ ﺍﻹﻨﺘﺭﻨـﺕ ﺃﻭ ﺇﻝﻰ ﺸﺒﮑﺔ ﺍﻻﺘﺼﺎل ﻓﻲ ﺤﺎل ﮑﺎﻥ ﺍﻝﺠﻬﺎﺯ ﺍﻝﺫﻱ ﻨﺴﺘﺨﺩﻤﻪ ﻤﻭﺼـﻭل ﺇﻝـﻰ ﺸـﺒﮑﺔ،ﻋﻨﺩ 33 تو ا
ھ نا
ري
Wireless Networks
ﺍﻻﻨﺘﻘﺎل ﺇﻝﻰ ﺍﻝﻤﺭﺤﻠﺔ ﺍﻝﺘﺎﻝﻴﺔ ﻴﻁﻠﺏ ﻤﻌﺎﻝﺞ ﺍﺘﺼﺎل ﺠﺩﻴﺩ ﻤﻥ ﺍﻝﻤـﺴﺘﺨﺩﻡ ﺇﺩﺨـﺎل ﺍﺴـﻡ ﺍﻝﻤﻀﻴﻑ ﺃﻭ ﻋﻨﻭﺍﻥ ﺒﺭﻭﺘﻭﮑﻭل ﺇﻨﺘﺭﻨﺕ ﻝﺠﻬﺎﺯ ﺍﻝﮑﻤﺒﻴﻭﺘﺭ ﺍﻝﺫﻱ ﻨﺘﺼل ﺒﻪ ﻭ ﻫﻨﺎ ﻴﺠﺏ ﺍﻻﻨﺘﺒﺎﻩ ﺇﻝﻰ ﻋﻨـﻭﺍﻥ IPﺍﻝﺫﻱ ﻴﺠﺏ ﺇﺩﺨﺎﻝﻪ ,ﻴﺠﺏ ﺃﻥ ﻴﮑﻭﻥ ﻋﻨﻭﺍﻥ IP ﺍﻹﻨﺘﺭﻨـﺕ ﻝﻠﺠﻬـﺎﺯ ﺍﻝﻤـﻀﻴﻑ ﻭﻝﻴﺱ ﻋﻨﻭﺍﻥ ﺍﻝﺸﺒﮑﺔ ﻓﻲ ﺤـﺎل ﮑﺎﻥ ﺍﻝﺠﻬﺎﺯ ﻤﻭﺼﻭل ﺇﻝﻰ ﺸﺒﮑﺔ. ﻭﻝﮑﻥ ﮑﻴﻑ ﻨﺤـﺼل ﻋﻠـﻰ IP ﺍﻹﻨﺘﺭﻨﺕ ﺍﻝﺫﻱ ﻨﺭﻴﺩﻩ ؟ ﺇﺫﺍ ﮑﺎﻥ ﺍﻝﺠﻬﺎﺯ ﻤﺘﺼل ﻋﻠﻰ ﺍﻹﻨﺘﺭﻨﺕ ﻴﻭﺠﺩ ﻤﻭﺍﻗﻊ ﺘﻌﻁﻴﻨﺎ IPﻝﻠﺠﻬﺎﺯ ﺍﻝﺫﻱ ﻨـﺴﺘﺨﺩﻤﻪ ,ﺃﻭ ﻨﺤﺼل ﻋﻠﻴﻪ ﻤﻥ MS-DOSﻭﻫﻨﺎ ﺃﻭﺩ ﺍﻝﺘﻨﻭﻴﻪ ﺇﻝﻰ ﺃﻫﻤﻴﺔ MS-DOSﻭﺍﻝﺤﺎﺠـﺔ ﺇﻝﻴﻪ ﻤﻊ ﺃﻱ ﻨﻅﺎﻡ ﺘﺸﻐﻴل ﻤﻥ ﺇﺼﺩﺍﺭﺍﺕ ﻭﻴﻨﺩﻭﺯ ﺍﻝﻤﺨﺘﻠﻔﺔ . ﻨﺩﺨل ﺇﻝﻰ
MS-DOSﻭ ﻨﮑﺘﺏ ﺍﻷﻤﺭ ﺍﻝﺘﺎﻝﻲ IPCONFIGﺴﻴﻌﻁﻴﻨﺎ IPﺍﻹﻨﺘﺭﻨـﺕ
ﻭﺍﻝﺸﺒﮑﺔ ﻓﻲ ﺤﺎل ﻭﺠﻭﺩﻫﺎ.
34 تو ا
ھ نا
ري
Wireless Networks
ﺒﻌﺩ ﺍﻝﺘﺄﮑﺩ ﻤﻥ ﺇﺩﺨﺎل ﺍﻝـ IPﻨﻀﻐﻁ ﺍﻝﺘﺎﻝﻲ ﻓﻅﻬﺭ ﺍﻝﻘﺎﺌﻤﺔ ﺍﻝﺘﺎﻝﻴﺔ ﻭﺍﻝﺘﻲ ﺘﺸﻴﺭ ﺇﻝﻰ ﻨﻬﺎﻴﺔ ﻋﻤل ﻤﻌﺎﻝﺞ ﺍﺘﺼﺎل ﺠﺩﻴﺩ ﻭﺘﻌﻁﻴﻨﺎ ﺇﻤﮑﺎﻨﻴﺔ ﺇﻀﺎﻓﺔ ﺍﺨﺘﺼﺎﺭ ﻝﻠﺸﺒﮑﺔ ﺇﻝﻰ ﺴﻁﺢ ﺍﻝﻤﮑﺘﺏ ﻤﻊ ﻤﻼﺤﻅﺔ ﺃﻥ ﺍﻻﺨﺘﺼﺎﺭ ﻴﮑﻭﻥ ﺸﻔﺎﻑ ﺇﻝﻰ ﺃﻥ ﻴﺘﻡ ﺘﻔﻌﻴل ﺍﻻﺘﺼﺎل . ﻋﻨﺩ ﺍﻝﻀﻐﻁ ﻋﻠﻰ ﺍﻻﺨﺘﺼﺎﺭ ﺍﻝﻤﻭﺠﻭﺩ ﻋﻠﻰ ﺴﻁﺢ ﺍﻝﻤﮑﺘﺏ ﺴﺘﻅﻬﺭ ﻝﺘﺎ ﻗﺎﺌﻤﺔ ﺘﺘﻁﻠﺏ ﺍﺴﻡ ﺍﻝﻤﺴﺘﺨﺩﻡ ﻭﮑﻠﻤﺔ ﺍﻝﻤـﺭﻭﺭ ﻝﻠـﺩﺨﻭل ﺇﻝـﻰ ﺍﻹﻨﺘﺭﻨﺕ ﻭﺍﺘﻤﺎﻡ ﺍﻻﺘﺼﺎل ﺒﻴﻥ ﺍﻝﺠﻬﺎﺯﻴﻥ.
ﻫل ﻴﻤﮑﻨﻙ ﺍﻝﺤﺼﻭل ﻋﻠﻰ IPﺩﺍﺌﻡ؟؟؟!!! ﻫﺫﻩ ﺍﻝﺨﻁﻭﺓ ﻤﻬﻤﺔ ﺠﺩﹰﺍ ﻓﻔﻲ ﺤﺎل ﻭﺠﻭﺩ ﺃﻱ ﺨﻁﺄ ﻓﻲ ﺍﻝﻤﺭﺍﺤل ﺍﻝﺴﺎﺒﻘﺔ ﺃﻭ ﺇﺩﺨﺎل ﺨﺎﻁﺊ ﻝﻠﻌﻨﻭﺍﻥ ﻝﻥ ﺘﺘﻡ ﻋﻤﻠﻴﺔ ﺍﻝﺘﻭﺼﻴل ﺒﻴﻥ ﺍﻝﺠﻬﺎﺯﻴﻥ ﻭﺴﻴﮑﻭﻥ ﻋﻠﻴﻨـﺎ ﺇﻋـﺎﺩﺓ ﺍﻝﺨﻁﻭﺍﺕ ﺍﻝﺴﺎﺒﻘﺔ ﻤﻥ ﺠﺩﻴﺩ .ﻭﻓﻲ ﺤﺎل ﻋﺩﻡ ﻭﺠﻭﺩ ﺃﺨﻁﺎﺀ ﺃﻭ ﻤﺸﺎﮑل ﺴـﺘﻅﻬﺭ ﻝﻨﺎ ﻗﺎﺌﻤﺔ ﻤﻨﺒﺜﻘﺔ ﺘﻅﻬﺭ ﻤﺤﺎﻭﻝﺔ ﺍﻻﺘﺼﺎل ﺒﻴﻥ ﺍﻝﺠﻬﺎﺯﻴﻥ ﻭﻨﺠﺎﺡ ﻫـﺫﺍ ﺍﻻﺘـﺼﺎل ﻭﻫﻨﺎ ﻴﺼﺒﺢ ﺍﻻﺨﺘﺼﺎﺭ ﺍﻝﺫﻱ ﻭﻀﻌﻨﺎﻩ ﻋﻠﻰ ﺴﻁﺢ ﺍﻝﻤﮑﺘﺏ ﻤﻔﻌﻼﹰ.ﻨﺴﺘﻁﻴﻊ ﺍﻝﺘﺄﮑـﺩ ﻤـﻥ ﺍﻝﺩﺨﻭل ﺇﻝﻰ ﺍﻝﺠﻬﺎﺯ ﺍﻝﻤﻀﻴﻑ ﺒﺎﻝﺩﺨﻭل ﺇﻝﻰ ﻝﻭﺤﺔ ﺍﻝﺘﺤﮑﻡ ﻭﺍﺨﺘﻴـﺎﺭ ﺍﺘـﺼﺎﻻﺕ ﺸـﺒﮑﺔ ﺍﻻﺘﺼﺎل ﻭﺍﻹﻨﺘﺭﻨﺕ ﻓﻴﻅﻬﺭ ﺇﻀﺎﻓﺔ ﻝﺸﺒﮑﺔ ﺍﻹﻨﺘﺭﻨﺕ ﺍﻝﺘﻲ ﻨﺴﺘﺨﺩﻤﻬﺎ ﺍﺨﺘﺼﺎﺭ ﺇﻝﻰ ﺍﻝﺸﺒﮑﺔ ﺍﻝﻭﻫﻤﻴﺔ ﺍﻝﺘﻲ ﺃﻨﺸﺄﻨﺎﻫﺎ .ﻤﻥ ﺨﻼل ﺍﻝﺸﺒﮑﺔ ﺍﻝﻭﻫﻤﻴﺔ ﻨﺴﺘﻁﻴﻊ ﺍﻝﻭﺼﻭل ﺇﻝﻰ ﺒﻴﺎﻨﺎﺕ ﺍﻝﺠﻬﺎﺯ ﺍﻝﻤﻀﻴﻑ ﺍﻝﻤﺼﺭﺡ ﺒﺎﻝﻭﺼﻭل ﺇﻝﻴﻬﺎ ﻓﻼ ﻨﺴﺘﻁﻴﻊ ﺍﻝﻌﺒﺙ ﺒﺎﻝﺒﻴﺎﻨﺎﺕ ﺍﻝﻤﺤﻤﻴﺔ ﻓﻲ ﺠﻬـﺎﺯﻩ، ﻭﺇﻤﮑﺎﻨﻴﺔ ﺍﻝﻭﺼﻭل ﻭﺍﻝﻨﻘل ﺃﻭ ﺍﻝﻨﺴﺦ ﺘﮑﻭﻥ ﻤﺤﺩﺩﺓ ﻤﻥ ﻗﺒل ﺒﺭﺘﻭﮑﻭﻻﺕ ﺍﻝﺸﺒﮑﺔ ﺍﻝﻭﻫﻤﻴﺔ.
35 تو ا
ھ نا
ري
Wireless Networks
ﺘﮑﻭﻴﻥ ﻤﺼﺎﺩﻗﺔ ﺍﻝﻬﻭﻴﺔ ﻭﺍﻋﺩﺍﺩﺍﺕ ﺘﺸﻔﻴﺭ ﺍﻝﺒﻴﺎﻨﺎﺕ ﻻﺘﺼﺎل ﻁﻠﺏ ﻫﺎﺘﻔﻲ: ﻝﺘﮑﻭﻴﻥ ﻤﺼﺎﺩﻗﺔ ﺍﻝﻬﻭﻴﺔ ﻭﺇﻋﺩﺍﺩﺍﺕ ﺘﺸﻔﻴﺭ ﺍﻝﺒﻴﺎﻨﺎﺕ ﻻﺘﺼﺎل ﺍﻝﻁﻠﺏ ﺍﻝﻬﺎﺘﻔﻲ • ﺍﻓﺘﺢ ﺍﺘﺼﺎﻻﺕ ﺸﺒﮑﺔ ﺍﻻﺘﺼﺎل. • ﺍﻨﻘﺭ ﻓﻭﻕ ﺍﺘﺼﺎل ﺍﻝﻁﻠﺏ ﺍﻝﻬﺎﺘﻔﻲ ﺍﻝﺫﻱ ﺘﺭﻴﺩ ﺘﮑﻭﻴﻨﻪ ،ﺜـﻡ ﺘﺤـﺕ ﻤﻬـﺎﻡ ﺸـﺒﮑﺔ ﺍﻻﺘﺼﺎ،ل ﺍﻨﻘﺭ ﻓﻭﻕ ﺘﻐﻴﻴﺭ ﺇﻋﺩﺍﺩﺍﺕ ﻫﺫﺍ ﺍﻻﺘﺼﺎل. • ﻓﻲ ﺍﻝﺘﺒﻭﻴﺏ ﺍﻷﻤﺎﻥ ،ﻗﻡ ﺒﺈﺠﺭﺍﺀ ﻭﺍﺤﺩ ﻤﻤﺎ ﻴﻠﻲ: • ﻝﺘﺤﺩﻴﺩ ﻤﺠﻤﻭﻋﺔ ﺃﺴﺎﻝﻴﺏ ﻤﺼﺎﺩﻗﺔ ﺍﻝﻬﻭﻴﺔ ﻭﻤﺘﻁﻠﺒﺎﺕ ﺘﺸﻔﻴﺭ ﺍﻝﺒﻴﺎﻨـﺎﺕ ﺍﻝﻤﮑﻭﻨـﺔ ﻤﺴﺒﻘﹰﺎ ،ﺍﻨﻘﺭ ﻓﻭﻕ ﻨﻤﻭﺫﺠﻲ )ﺍﻹﻋﺩﺍﺩﺍﺕ ﺍﻝﻤﻭﺼﻰ ﺒﻬﺎ( ،ﻭﻓﻲ ﺍﻝﺘﺤﻘﻕ ﻤﻥ ﺼـﺤﺔ ﻫﻭﻴﺘﻲ ﮑﺎﻝﺘﺎﻝﻲ ،ﺍﻨﻘﺭ ﻓﻭﻕ ﺍﻷﺴﻠﻭﺏ ﺍﻝﺫﻱ ﺘﺭﻴﺩ ﺍﺴﺘﺨﺩﺍﻤﻪ ﻝﻠﺘﺤﻘﻕ. • ﺍﺴﺘﻨﺎﺩﹰﺍ ﺇﻝﻰ ﺘﺤﺩﻴﺩ ﺍﻝﺘﺤﻘﻕ ﻤﻥ ﺼﺤﺔ ﻫﻭﻴﺘﻲ ،ﻴﻤﮑﻨﻙ ﺘﺤﺩﻴﺩ )ﺘﻤﮑـﻴﻥ( ﺃﻭ ﻤـﺴﺢ )ﺘﻌﻁﻴل( ﺨﺎﻨﺎﺕ ﺍﻻﺨﺘﻴﺎﺭ ﺍﺴﺘﺨﺩﺍﻡ ﺍﺴﻡ ﺘﺴﺠﻴل ﺍﻝﺩﺨﻭل ﺇﻝﻰ Windowsﻭﮑﻠﻤﺔ ﺍﻝﻤﺭﻭﺭ )ﻭﺍﻝﻤﺠﺎل ﺇﺫﺍ ﻭﺠﺩ( ﺘﻠﻘﺎﺌﻴﺎﹰ ﺃﻭ ﻤﻁﻠﻭﺏ ﺘﺸﻔﻴﺭ ﺍﻝﺒﻴﺎﻨﺎﺕ )ﻗﻁﻊ ﺍﻻﺘﺼﺎل ﺇﺫﺍ ﻝﻡ ﻴﺘﻡ ﺫﻝﻙ(.
36 تو ا
ھ نا
ري
Wireless Networks
ا %ا ا :.أ ,ا "
تا
!
ﺇﻥ ﻝﻠﺸﺒﮑﺔ ﺍﻝﻼﺴﻠﮑﻴﺔ ﺃﺨﻁﺎﺭﺍﹰ ﺘﻬﺩﺩ ﺃﻤﻨﻬﺎ ﮑﻐﻴﺭﻫﺎ ﻤﻥ ﺍﻝﺸﺒﮑﺎﺕ ،ﺴﻭﺍﺀ ﮑﺎﻨﺕ ﻫـﺫﻩ ﺍﻝﻤﺨﺎﻁﺭ ﻤﺸﺘﺭﮑﺔ ﺒﻴﻥ ﺍﻝﺸﺒﮑﺎﺕ ﺍﻝﺴﻠﮑﻴﺔ ﻭﺍﻝﻼﺴﻠﮑﻴﺔ ﺃﻭ ﮑﺎﻨﺕ ﻤﺨـﺎﻁﺭ ﻤﺨﺼـﺼﺔ ﺃﻭ ﻤﻭﺠﻭﺩﺓ ﻓﻘﻁ ﻓﻲ ﺍﻝﺸﺒﮑﺎﺕ ﺍﻝﻼﺴﻠﮑﻴﺔ ﻭﻤﺎ ﺘﺤﺘﻭﻴﻪ ﻤﻥ ﻤﻌﺎﻴﻴﺭ ﻭﻏﻴﺭﻫﺎ. ﻭﻫﻨﺎ ﺴﻨﺤﺎﻭل ﻗﺩﺭ ﺍﻹﻤﮑﺎﻥ ﺍﻝﺘﺭﮑﻴﺯ ﻋﻠﻰ ﺘﺄﻤﻴﻥ ﺍﻝﺒﻴﺌﺔ ﺍﻝﺸﺒﮑﻴﺔ ﺍﻝﻼﺴﻠﮑﻴﺔ ﻤﻥ ﺃﻏﻠﺏ ﺍﻝﻤﺨﺎﻁﺭ ﺍﻝﺘﻲ ﻗﺩ ﺘﻬﺩﺩﻫﺎ .ﻓﻼ ﻴﻭﺠﺩ ﺃﻤﻥ %100ﻭﻝﮑﻥ ﻋﻠﻴﻨﺎ ﻗﺩﺭ ﺍﻹﻤﮑﺎﻥ ﺃﻥ ﻨﻘﺘـﺭﺏ ﻤﻥ ﻫﺫﻩ ﺍﻝﻨﺴﺒﺔ ﺒﺘﻨﻔﻴﺫ ﺒﻌﺽ ﺍﻷﻤﻭﺭ ﺍﻝﺘﻲ ﺴﺘﺴﺎﻋﺩ ﻋﻠﻰ ﺠﻌل ﺍﻝﺸﺒﮑﺔ ﺁﻤﻨﺔ ﻗﺩﺭ ﺍﻹﻤﮑﺎﻥ. ﻤﻥ ﺍﻝﻤﻌﺭﻭﻑ ﺃﻥ ﻤﻥ ﺃﺨﻁﺭ ﻤﺎ ﻴﻬﺩﺩ ﺍﻝﺸﺒﮑﺎﺕ ﻫﺫﻩ ﺍﻷﻴﺎﻡ ﻫـﻲ ﻫﺠﻤـﺎﺕ ﺤﺠـﺏ ﺍﻝﺨﺩﻤﺔ ﺍﻝﺘﻲ ﻗﺩ ﺘﺘﻌﺭﺽ ﻝﻬﺎ ﻭﻓﻲ ﮑﺜﻴﺭ ﻤﻥ ﺍﻷﺤﻴﺎﻥ ﻴﺼﻌﺏ ﺘﻔﺎﺩﻴﻬﺎ ﺇﻥ ﺘﻤﺕ ﺒـﺼﻭﺭﺓ ﺩﻗﻴﻘﺔ ﻭﻤﺭﮑﺯﺓ .ﺇﻥ ﻤﻨﻔﺫﻱ ﻫﺠﻤﺎﺕ ﺤﺠﺏ ﺍﻝﺨﺩﻤﺔ ﺍﻝﻤﻭﺯﻋﺔ DDoSﺃﻭ Distributed Service Denial ofﻴﺤﺘﺎﺠﻭﻥ ﺇﻝﻰ ﻋﺩﺩ ﮑﺒﻴﺭ ﻤﻥ ﺍﻷﺠﻬﺯﺓ ﻝﮑﻲ ﻴﻨﻔـﺫﻭﺍ ﻫﺠﻤـﺎﺘﻬﻡ ﻓﺘﺭﺍﻫﻡ ﻴﺒﺭﻤﺠﻭﻥ ﺒﺭﻤﺠﻴﺎﺕ ﺘﻌﻤل ﻋﻠﻰ ﺃﺘﻤﺘﺔ ﺍﻝﻬﺠﻭﻡ ﻭﺍﻻﺴﺘﻴﻼﺀ ﻋﻠﻰ ﺃﺠﻬﺯﺓ ﺍﻝﺤﺎﺴـﺏ ﻭﻤﻥ ﺜﻡ ﺍﻻﻨﺘﻘﺎل ﺇﻝﻰ ﺍﻷﺠﻬﺯﺓ ﺍﻝﻤﺠﺎﻭﺭﺓ ﻭﻏﻴﺭﻫﺎ ﺒﺼﻭﺭﺓ ﺘﻠﻘﺎﺌﻴﺔ ﺴﺭﻴﻌﺔ ﻭﺇﺫﺍ ﮑﺎﻥ ﺠﻬﺎﺯ ﺍﻝﺤﺎﺴﺏ ﻏﻴﺭ ﻤﺤﻤﻲ ﺒﺼﻭﺭﺓ ﮑﺎﻓﻴﺔ ﻓﺎﻨﻪ ﺴﻴﻘﻊ ﻀﻤﻥ ﻗﺎﺌﻤﺔ ﺍﻷﺠﻬﺯﺓ ﺍﻝﺘﻲ ﺘﻨﺘﻅﺭ ﺍﻷﻭﺍﻤﺭ ﻤﻥ ﺍﻝﻤﻬﺎﺠﻤﻴﻥ ﻝﺘﻨﻔﺫ ﺍﻝﻬﺠﻭﻡ .ﻓﻲ ﺍﻝﻌﺎﺩﺓ ﻓﺎﻥ ﺍﻷﺠﻬﺯﺓ ﺍﻝﻤﺼﺎﺒﺔ ﻻ ﻴﺘﻡ ﺤﺫﻑ ﺍﻝﻤﻠﻔﺎﺕ ﻤﻨﻬﺎ ﻝﮑﻥ ﻴﺘﻡ ﺍﺴﺘﻌﻤﺎﻝﻬﺎ ﺠﻤﻴﻌﺎﹰ ﻓﻲ ﻭﻗﺕ ﻭﺍﺤﺩ ﻓﻲ ﺍﻝﻬﺠﻭﻡ ﻋﻠﻰ ﺸﺒﮑﺔ ﻤﻌﻴﻨﺔ ﺃﻭ ﻤﻭﻗﻊ ﻤﻌـﻴﻥ ﻭﺘﻠﻙ ﺍﻷﺠﻬﺯﺓ ﺘﺴﻤﻰ ﺒﺎل.zombies ﻤﻥ ﺃﮑﺜﺭ ﺍﻝﺠﻬﺎﺕ ﺍﻝﺘﻲ ﻴﻨﺼﺏ ﺍﻫﺘﻤﺎﻡ ﺍﻝﻤﻬﺎﺠﻤﻴﻥ ﻋﻠﻰ ﺍﻻﺴﺘﻴﻼﺀ ﻋﻠﻰ ﺃﺠﻬﺯﺘﻬﺎ ﻫﻲ ﺍﻝﺸﺭﮑﺎﺕ ﺍﻝﮑﺒﻴﺭﺓ ﻭﺍﻝﺠﺎﻤﻌﺎﺕ ﻭﺍﻝﮑﻠﻴﺎﺕ ﺍﻝﺘﻲ ﺘﺤﻤل ﻋﺩﺩ ﮑﺒﻴﺭ ﻤـﻥ ﺃﺠﻬـﺯﺓ ﺍﻝﺤﺎﺴـﺏ ﺍﻝﻤﺘﺼﻠﺔ ﺒﺎﻹﻨﺘﺭﻨﺕ ﺒﺸﮑل ﻤﺘﻭﺍﺼل ﻭﺇﻥ ﻝﻡ ﻴﺘﺨﺫ ﺍﻝﻤﺴﺅﻭﻝﻴﻥ ﻋﻥ ﻫﺫﻩ ﺍﻝﺸﺒﮑﺎﺕ ﺍﻝﺤـﺫﺭ ﻤﻥ ﺃﻤﻭﺭ ﻋﺩﻴﺩﺓ ﻓﺎﻥ ﻨﺴﺒﺔ ﺘﻌﺭﺽ ﺃﺠﻬﺯﺓ ﺸﺒﮑﺘﻬﻡ ﻝﻼﺸﺘﺭﺍﻙ ﻓﻲ ﻫﺠﻭﻡ ﺃﻤﺭ ﻭﺍﺭﺩ.
37 تو ا
ھ نا
ري
Wireless Networks
ﻭ ﺒﻤﺎ ﺃﻥ ﺍﻏﻠﺏ ﺍﻝﺸﺭﮑﺎﺕ ﻭﺍﻝﺠﺎﻤﻌﺎﺕ ﺒﺩﺃﺕ ﺒﺎﻝﺘﻭﺠﻪ ﺇﻝـﻰ ﺍﺴـﺘﻌﻤﺎل ﺍﻝـﺸﺒﮑﺎﺕ ﺍﻝﻼﺴﻠﮑﻴﺔ ﻓﺎﻥ ﻨﺴﺒﺔ ﺍﻝﺨﻁﺭ ﻓﻲ ﻀﻠﻭﻉ ﺃﺠﻬﺯﺘﻬﺎ ﺒﻁﺒﻴﻌﺔ ﺍﻝﺤﺎل ﺘﺭﺘﻔﻊ ﻷﺴـﺒﺎﺏ ﻋﺩﻴـﺩﺓ ﺃﻭﻝﻬﺎ ﺃﻥ ﺍﻷﺠﻬﺯﺓ ﻝﻥ ﺘﮑﻭﻥ ﻓﻲ ﺍﻝﻌﺎﺩﺓ ﻤﻭﺠﻭﺩﺓ ﻓﻲ ﻤﮑﺎﻥ ﺜﺎﺒﺕ ﺒل ﺘﺘﺤﺭﻙ ﻭﺭﺒﻤﺎ ﺘﺨﺭﺝ ﻤﻥ ﻤﺒﻨﻰ ﺍﻝﺸﺭﮑﺔ ﻨﻔﺴﻬﺎ! ﻝﺫﺍ ﻭﺠﺏ ﺍﻝﺤﺫﺭ ﻤﻥ ﺍﺘﺨﺎﺫ ﮑﺎﻓﺔ ﺍﻝﻭﺴﺎﺌل ﺍﻝﻤﻤﮑﻨﺔ ﻤـﻥ ﺠﻌﻝـ ﺍﻝﺸﺒﮑﺔ ﺍﻝﻼﺴﻠﮑﻴﺔ ﺁﻤﻨﺔ ﻗﺩﺭ ﺍﻝﻤﺴﺘﻁﺎﻉ. ﺇﻥ ﺍﻷﺠﻬﺯﺓ ﺍﻝﻤﺤﻤﻭﻝﺔ ﺍﻝﺘﻲ ﺘﻤﻠﻙ ﮑﺭﺕ ﺸﺒﮑﺔ ﻻﺴﻠﮑﻲ ﻤﻭﺼل ﺒﻤﻘﻭﻱ ﻝﻺﺭﺴـﺎل, ﺒﺈﻤﮑﺎﻨﻬﺎ ﺃﻥ
ﻓﻲ ﻨﻘل ﺍﻝﻤﻠﻔﺎﺕ ﻭﺍﻝﺘﻌﺎﻤل ﮑﻤﺎ ﻝﻭ ﮑﺎﻨﺕ ﻓـﻲ ﻤﺒﻨـﻰ ﺍﻝﺠﺎﻤﻌـﺔ ﺃﻭ ﺘﺸﺎﺭﻙ
ﺍﻝﺸﺭﮑﺔ ﺃﻭ ﺍﻝﮑﻠﻴﺔ ﻭﻓﻲ ﺍﻝﺤﻘﻴﻘﺔ ﻤﻥ ﺍﻝﻤﻤﮑﻥ ﺃﻥ ﺘﺒﻌﺩ ﮑﻴﻠﻭﻤﺘﺭﺍﺕ ﻋﻨﻬﺎ! ﻭﺇﺫﺍ ﮑﺎﻨﺕ ﻨﻘـﺎﻁ ﺍﻻﺘﺼﺎل ﺍﻝﻤﻭﺠﻭﺩﺓ ﻓﻲ ﺍﻝﻤﺅﺴﺴﺔ ﺃﻭ ﺍﻝﺠﺎﻤﻌﺔ ﻝﻡ ﻴﺘﻡ ﺘﻀﺒﻴﻁ ﺇﻋﺩﺍﺩﺍﺘﻬﺎ ﺒﻁﺭﻴﻘﺔ ﺴﻠﻴﻤﺔ ﻭﻝﻡ ﻴﺘﻡ ﺘﻌﺩﻴل ﺍﻹﻋﺩﺍﺩﺍﺕ ﺍﻻﻓﺘﺭﺍﻀﻴﺔ ﺍﻝﻤﻌﺭﻭﻓﺔ ﻝﺩﻯ ﮑل ﺒﺎﺤﺙ ,ﻓﺎﻥ ﺃﻱ ﺸﺨﺹ ﻋﻠﻰ ﺒﻌـﺩ ﺃﻤﻴﺎل )ﺒﺎﺴﺘﺨﺩﺍﻡ ﻤﻘﻭﻱ ﻝﻺﺭﺴﺎل( ﻴﺴﺘﻁﻴﻊ ﺍﻝﺩﺨﻭل ﺒﮑل ﺴﻬﻭﻝﺔ ﻋﻠﻰ ﺍﻝﺸﺒﮑﺔ. ﺇﻥ ﺃﻏﻠﺏ ﺍﻷﻤﻭﺭ ﺍﻝﺘﻲ ﻤﻥ ﺍﻝﻤﻤﮑﻥ ﺃﻥ ﻴﺘﻡ ﺍﺴﺘﻐﻼﻝﻬﺎ ﻫﻲ ﺍﻹﻋﺩﺍﺩﺍﺕ ﺍﻻﻓﺘﺭﺍﻀـﻴﺔ ﻝﻨﻘﺎﻁ ﺍﻻﺘﺼﺎل ,Points Accessﻭﻓﻲ ﻤﺎ ﻴﻠﻲ ﺒﻌﺽ ﺍﻷﻤﻭﺭ ﺍﻝﺘﻲ ﺴﺘﺴﺎﻋﺩ ﻓﻲ ﺘﻘﻠﻴل ﻤﺨﺎﻁﺭ ﺍﻹﻋﺩﺍﺩﺍﺕ ﺍﻻﻓﺘﺭﺍﻀﻴﺔ: ﻤﻌﺭﻑ ﺍﻝﺨﺩﻤﺔ ﺃﻭ ﺍﻝـ SSID ﺍﻝـ SSIDﺃﻭ ﺍﻝـ IDentifier Set Service
ﻤﻌّ◌ﺭﻑ ﺍﻝﺨﺩﻤﺔ .ﺃﻥ ﮑﻝـ ﺘﻌﻨﻲ
ﻨﻘﻁﺔ ﺍﺘﺼﺎل ﺘﻤﻠﻙ ﻤﻌﺭﻑ ﻴﮑﻭﻥ ﻋﺒﺎﺭﺓ ﻋﻥ ﮑﻠﻤﺔ ﺃﻭ ﺭﻗﻡ ﺃﻭ ﺨﻠﻴﻁ ﺒﻴﻥ ﺤﺭﻭﻑ ﻭﺃﺭﻗﺎﻡ. ﻴﻘﻭﻡ ﻫﺫﺍ ﺍﻝﻤﻌﺭﻑ ﺒﺎﻝﺘﻌﺭﻴﻑ ﻋﻥ ﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل ﻭﻝﻨﻔﺭﺽ ﺃﻥ ﻨﻘﻁﺔ ﺍﺘﺼﺎل ﻤﻌﻴﻨﺔ ﺘﻤﻠﻙ SSIDﻤﻌﻴﻥ ﻋﻠﻰ ﺴﺒﻴل ﺍﻝﻤﺜﺎل ﻫﻭ ﺍﻷﮑﺎﺩﻴﻤﻴﺔ .ﺇﻥ ﺃﻱ ﺸﺨﺹ ﻤﻭﺠـﻭﺩ ﻓـﻲ ﻤـﺩﻯ ﺍﻝﺘﻐﻁﻴﺔ ﺍﻝﺘﻲ ﺘﻐﻁﻴﻬﺎ ﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل )ﺍﻝﻤﺩﻯ ﻴﻌﺘﻤﺩ ﻋﻠﻰ ﺃﻤﻭﺭ ﻋﺩﻴﺩﺓ ﻗﺩ ﺘﺼل ﺇﻝﻰ ﮑﻴﻠﻭ ﻤﺘﺭﺍﺕ ﺴﻭﺍﺀ ﮑﺎﻥ ﻓﻲ ﻨﻔﺱ ﺍﻝﺒﻴﺕ ﺃﻭ ﺍﻝﻤﺒﻨﻰ ﺃﻭ ﮑﺎﻥ ﻓﻲ ﺍﻝـﺸﺎﺭﻉ ﺍﻝﻤﺠـﺎﻭﺭ ﻝﻠﺒﻴـﺕ( ﻴﺴﺘﻁﻴﻊ ﺃﻥ ﻴﺩﺨل ﺇﻝﻰ ﺍﻝﺸﺒﮑﺔ ﺍﻝﺨﺎﺼﺔ ﺒﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل ﺫﺍﺕ ﺍﻝﻤﻌﺭﻑ )ﺍﻷﮑﺎﺩﻴﻤﻴـﺔ( ﺇﺫﺍ ﻋﺭﻑ ﺃﻥ ﮑﻠﻤﺔ )ﺍﻷﮑﺎﺩﻴﻤﻴﺔ( ﻫﻲ ﺍﻝـ SSIDﺍﻝﺨﺎﺹ ﺒﻬﺎ .ﺃﻏﻠﺏ ﻨﻘﺎﻁ ﺍﻻﺘﺼﺎل ﺘﺤﻤﻝـ 38 تو ا
ھ نا
ري
Wireless Networks
ﺇﻋﺩﺍﺩﺍﺕ ﺍﻓﺘﺭﺍﻀﻴﺔ ﻭﻴﮑﻭﻥ ﺍﻝﻤﻌﺭﻑ ﻝﻬﺎ ﻤﻌﺭﻭﻓ ﹰﺎ ﻭﻓﻲ ﺍﻝﻐﺎﻝﺏ ﻴﮑﻭﻥ ﮑﻠﻤﺔ .defaultﺇﺫﺍ ﻝﻡ ﻴﺘﻡ ﺘﻐﻴﻴﺭ ﻫﺫﺍ ﺍﻝﻤﻌﺭﻑ ﺇﻝﻰ ﺃﻱ ﺸﻲ ﺁﺨﺭ ,ﻓﺎﻥ ﺃﻱ ﺸﺨﺹ ﻴﻘﻊ ﻓﻲ ﻀﻤﻥ ﻤﺩﻯ ﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل ﻴﺴﺘﻁﻴﻊ ﺍﻝﺩﺨﻭل ﻝﻠﺸﺒﮑﺔ ﺍﻝﺨﺎﺼﺔ ﺒﻬﺎ ﺒﺩﻭﻥ ﻋﻭﺍﺌﻕ! ﻤﻥ ﺍﻷﻤﻭﺭ ﺍﻝﻤﻭﺠﻭﺩﺓ ﻓﻲ ﺍﻹﻋﺩﺍﺩﺍﺕ ﺍﻻﻓﺘﺭﺍﻀﻴﺔ ﺍﻝﺨﺎﺼﺔ ﺒﺎﻝـ SSIDﻫﻭ ﺍﻝــ .Broadcasting SSIDﺘﻘﻭﻡ ﻨﻘﺎﻁ ﺍﻻﺘﺼﺎل ﺒﺎﻝﺘﻌﺭﻴﻑ ﻋﻥ ﻨﻔﺴﻬﺎ ﺒﺸﮑل ﻤﺴﺘﻤﺭ ﻋﻠﻰ ﻤﺩﻯ ﺍﻝﺘﻐﻁﻴﺔ ﺍﻝﺘﻲ ﺘﻐﻁﻴﻪ ﻓﺘﻘﻭﻡ ﺒﺼﻭﺭﺓ ﻤﺴﺘﻤﺭﺓ ﺒﺈﺭﺴﺎل ﺇﺸﺎﺭﺍﺕ ﺘﻘﻭﻡ ﺒﺎﻝﺘﻌﺭﻴﻑ ﻋـﻥ ﻨﻔﺴﻬﺎ ﻭﺒﻤﻌ ّ◌ﺭﻓﻬﺎ ﺍﻝﺨﺎﺹ .ﺒﻬﺫﻩ ﺍﻝﻁﺭﻴﻘﺔ ﻴﻤﮑﻥ ﻷﻱ ﺸﺨﺹ ﻴﻤﻠـﻙ ﺠﻬـﺎﺯ ﺨـﺎﺹ ﺃﻭ ﮑﻤﺒﻴﻭﺘﺭ ﻤﺤﻤﻭل ﺒﻪ ﮑﺭﺕ ﺸﺒﮑﺔ ﻻﺴﻠﮑﻴﺔ ﺃﻥ ﻴﺘﺠﻪ ﺇﻝﻰ ﺍﻝﻤﻨﻁﻘﺔ ﺍﻝﺘـﻲ ﺘﻐﻁﻴﻬـﺎ ﻨﻘﻁـﺔ ﺍﻻﺘﺼﺎل ﻓﻴﺤﺼل ﺒﺸﮑل ﺘﻠﻘﺎﺌﻲ ﻋﻠﻰ ﺍﻹﺸﺎﺭﺓ ﻤﻊ ﺭﻗﻡ ﺍﻝﻤﻌﺭﻑ ﻓﻴﻌﺭﻑ ﺍﻨﻪ ﺍﻵﻥ ﻴﻤﮑﻨـﻪ ﺍﻻﺘﺼﺎل ﺒﺸﺒﮑﺔ ﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل )ﺍﻷﮑﺎﺩﻴﻤﻴﺔ( ﻤﻥ ﻤﻭﻗﻌﻪ .ﻴﺠﺏ ﺘﻌﻁﻴل ﻫـﺫﻩ ﺍﻝﺨﺎﺼـﻴﺔ ﺍﻝﺘﻲ ﺘﺄﺘﻲ ﺒﺼﻭﺭﺓ ﺍﻓﺘﺭﺍﻀﻴﺔ ﻓﻲ ﺍﻝﻌﺎﺩﺓ ﺤﺘﻰ ﻻ ﻴﺘﻤﮑﻥ ﻀﻌﺎﻑ ﺍﻝﻨﻔـﻭﺱ ﻤـﻥ ﺍﻝـﺫﻴﻥ ﻴﻤﻠﮑﻭﻥ ﺃﺠﻬﺯﺓ ﻤﺤﻤﻭﻝﺔ ﺫﺍﺕ ﮑﺭﻭﺕ ﺸﺒﮑﺔ ﻻﺴﻠﮑﻴﺔ ﻤﻥ ﺍﻻﻗﺘـﺭﺍﺏ ﻭﻤﻌﺭﻓـﺔ ﺍﻷﻤـﺎﮑﻥ )ﺍﻝﻘﺭﻴﺒﺔ( ﻤﻥ ﺍﻝﻤﻨﺯل ﺍﻭ ﺍﻝﻤﺒﻨﻰ ﻭﺍﻝﺘﻲ ﻤﻥ ﺨﻼﻝﻬﺎ ﻴﺴﺘﻁﻴﻌﻭﻥ ﺍﻝـﺩﺨﻭل ﻋﻠـﻰ ﺍﻝـﺸﺒﮑﺔ ﺍﻝﻼﺴﻠﮑﻴﺔ .ﻴﻔﻀل ﻗﺩﺭ ﺍﻹﻤﮑﺎﻥ ﺘﻐﻴﻴﺭ ﺍﻝﻤﻌﺭﻑ ﺒﺼﻭﺭﺓ ﻤﺴﺘﻤﺭﺓ ﺒﻴﻥ ﺤﻴﻥ ﻭﺁﺨﺭ ﺤﺘﻰ ﺇﻥ ﺤﺼل ﺃﺤﺩ ﺍﻝﺫﻴﻥ ﻴﺤﺎﻭﻝﻭﻥ ﺍﺨﺘﺭﺍﻕ ﺍﻝﺸﺒﮑﺔ ﻋﻠﻰ ﺍﻝﻤﻌﺭﻑ ﺍﻝﺨﺎﺹ ﺒﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل ﻓـﻲ ﻭﻗﺕ ﻤﻌﻴﻥ ﻓﺎﻨﻪ ﻋﻨﺩ ﺘﻐﻴﻴﺭﻩ ﺒﺼﻭﺭﺓ ﻤﺴﺘﻤﺭﺓ ﺴﺘﺼﻌﺏ ﻤﻬﻤﺘﻪ ﺍﮑﺜﺭ. ﻤﻥ ﺍﻝﻤﻤﮑﻥ ﺃﻴﻀﺎ ﺘﻘﻠﻴل ﻨﺴﺒﺔ ﺍﻹﺭﺴﺎل ﻝﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل ﺒﺤﻴﺙ ﺃﻥ ﻴﮑﻭﻥ ﻤﺩﺍﻫﺎ ﻗﺩﺭ ﺍﻹﻤﮑﺎﻥ ﻋﻠﻰ ﺍﻝﻤﺤﺩﻭﺩ ﺍﻝﻤﻁﻠﻭﺒﺔ ﻭﺍﻝﻤﺴﻤﻭﺡ ﺒﻬﺎ ﻻ ﺃﻥ ﺘﺘﺨﻁﻰ ﻫﺫﻩ ﺍﻝﺤـﺩﻭﺩ ﻭﺘﻐﻁـﻲ ﻤﺴﺎﺤﺎﺕ ﺨﺎﺭﺝ ﻨﻁﺎﻕ ﺍﻝﻤﻨﺯل ﺃﻭ ﺍﻝﺸﺭﮑﺔ ﻭﺍﻝﺘﻲ ﻗﺩ ﻴﺴﺘﻐﻠﻬﺎ ﺍﻝﺒﻌﺽ ﻓﻲ ﺍﻝﺩﺨﻭل ﻝﻠﺸﺒﮑﺔ ﺍﻝﺨﺎﺼﺔ. ﻨﺴﺘﻁﻴﻊ ﺘﻤﺜﻴل ﻤﺴﺄﻝﺔ ﺨﺭﻭﺝ ﻤﺩﻯ ﺍﻝﺘﻐﻁﻴﺔ ﻋﻥ ﺤﺩﻭﺩ ﺍﻝﻤﺅﺴﺴﺔ ﺃﻭ ﺍﻝﻤﻨـﺯل ﺇﻝـﻰ ﻤﺴﺎﻓﺎﺕ ﻻ ﺩﺍﻋﻲ ﻝﻬﺎ ﮑﻭﺼﻭل ﺍﻝﻤﺩﻯ ﺇﻝﻰ ﺍﻝﺸﺎﺭﻉ ﺍﻝﻤﺠﺎﻭﺭ ﺒﺘﻭﺯﻴﻊ ﺃﺴـﻼﻙ ﻭﮑـﺒﻼﺕ ﺨﺎﺼﺔ ﺒﺎﻝﺸﺒﮑﺔ ﺍﻝﺩﺍﺨﻠﻴﺔ ﻤﺎ ﻋﻠﻰ ﺍﻝﻨﺎﺱ ﺇﻻ ﺃﻥ ﻴﺤﻀﺭﻭﺍ ﺃﺠﻬﺯﺘﻬﻡ ﻭﻴﻭﺼـﻠﻭﻥ ﮑـﺭﻭﺕ
39 تو ا
ھ نا
ري
Wireless Networks
ﺍﻝﺸﺒﮑﺔ ﺒﺎﻝﮑﺒﻼﺕ ﻭﺍﻷﺴﻼﻙ ﻭﻴﺩﺨﻠﻭﻥ ﻋﻠﻰ ﺍﻝﺸﺒﮑﺔ ﺍﻝﺩﺍﺨﻠﻴﺔ ﻭﻫﻡ ﺠﺎﻝﺴﻭﻥ ﻓﻲ ﺍﻝـﺸﺎﺭﻉ ﺍﻝﻤﺠﺎﻭﺭ!
ﻓﻠﺘﺭﺓ ﺍﻝـ MAC Address ﺍﻝـ MAC Addressﺃﻭ ﺍﻝــ Media Access Control Addressﻫـﻭ ﺍﻝﻌﻨﻭﺍﻥ ﺍﻝﻔﻴﺯﻴﺎﺌﻲ ﻝﮑﺭﻭﺕ ﺍﻝﺸﺒﮑﺔ .ﮑل ﮑﺭﺕ ﺸﺒﮑﺔ ﻓﻲ ﺍﻝﻌﺎﻝﻡ ﻴﺤﻤل ﺭﻗﻡ ﻴﻤﻴـﺯﻩ ﻋـﻥ ﻏﻴﺭﻩ ,ﺘﻘﻭﻡ ﺍﻝﺸﺭﮑﺎﺕ ﺍﻝﻤﻨﺘﺠﺔ ﺒﻭﻀﻊ ﺃﺭﻗﺎﻡ ﺨﺎﺼﺔ ﻋﻠﻰ ﺃﺴﺎﺱ ﻨﻅﺎﻡ ﺍﻝﻬﮑـﺱ ﻝﺘﻤﻴـﺯ ﮑﺭﻭﺕ ﺍﻝﺸﺒﮑﺔ ﻋﻥ ﺒﻌﻀﻬﺎ ﻭﻤﻥ ﺍﻝﻤﻔﺘﺭﺽ ﺃﻥ ﻻ ﺘﮑﻭﻥ ﻫﺫﻩ ﺍﻷﺭﻗﺎﻡ ﻤﮑﺭﺭﺓ ﺃﺒﺩﺍﹰ .ﺒﻁﺒﻴﻌﺔ ﺍﻝﺤﺎل ﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل ﺘﻌﺘﺒﺭ ﻤﻥ ﺍﻝﻁﺒﻘﺔ ﺍﻝﺜﺎﻨﻴﺔ ﻓﻲ ﺍﻝـ OSI Modelﺃﻭ ﺍﻝــ Open System Interconnectﻴﻌﻨﻲ ﻓﻲ ﻁﺒﻘﺔ ﺍﻝـ Data Linkﮑﺎﻝﺴﻭﻴﺘﺸﺎﺕ ﻓﺎﻥ ﺘﻌﺎﻤﻠﻬﺎ ﻴﮑﻭﻥ ﻤﻊ ﺍﻝـ MAC Addressﻭﻝﻴﺱ ﻤـﻊ ﺍﻝــ .IP Addressﻭﻫﻨـﺎ ﻴـﺴﺘﻁﻴﻊ ﻴﺴﻤﺢ ﻝﻬـﺎ ﺒﺎﺴـﺘﺨﺩﺍﻡ ﻨﻘﻁـﺔ ﺍﻝﻤﺴﺅﻭل ﻋﻥ ﺍﻝﺸﺒﮑﺔ ﺍﻝﻼﺴﻠﮑﻴﺔ ﺃﻥ ﻴﺤﺩﺩ ﺍﻷﺠﻬﺯﺓ ﺍﻝﺘﻲ ﺍﻻﺘﺼﺎل ﺍﻝﺨﺎﺼﺔ ﺒﻪ. ﮑﻤﺎ ﻨﻌﺭﻑ ﻓﺎﻥ ﮑل ﺠﻬﺎﺯ ﺤﺘﻰ ﻴﺘﺼل ﺒﺎﻝﺸﺒﮑﺔ ﺍﻝﻼﺴﻠﮑﻴﺔ ﻴﺠﺏ ﺃﻥ ﻴﺤﺘﻭﻱ ﻋﻠـﻰ ﮑﺭﺕ ﺸﺒﮑﺔ ﻻﺴﻠﮑﻴﺔ ﻭﮑل ﮑﺭﺕ ﺸﺒﮑﺔ ﻻﺴﻠﮑﻴﺔ ﺘﻤﻠﻙ ﺭﻗﻡ ﺨﺎﺹ ﻤﻤﻴﺯ ﻭﻫﻭ ﺍﻝـ MAC Addressﻭﻤﻥ ﺍﻝﻤﻔﺘﺭﺽ ﺃﻥ ﺍﻝﻤﺴﺅﻭل ﻋﻥ ﺍﻝﺸﺒﮑﺔ ﻴﻌﻲ ﻭﻴﻌﻠﻡ ﻋﺩﺩ ﺍﻷﺠﻬﺯﺓ ﺍﻝﻤﻭﺠﻭﺩﺓ ﻝﺩﻴﻪ ﺃﻭ ﻝﺩﻯ ﺸﺭﮑﺘﻪ ﻭﺍﻝﺘﻲ ﻴﺭﻴﺩﻫﺎ ﺃﻥ ﺘﺴﺘﺨﺩﻡ ﺸﺒﮑﺘﻪ ﺍﻝﻼﺴﻠﮑﻴﺔ .ﻋﻨﺩﻫﺎ ﻴﺴﺘﻁﻴﻊ ﻓﻠﺘـﺭﺓ ﺍﺴﺘﺨﺩﺍﻡ ﻨﻘﻁ ﺍﻻﺘﺼﺎل ﻝﺩﻴﻪ ﻭﻴﺤﺩﺩ ﺍﻷﺠﻬﺯﺓ ﺒﻭﺍﺴﻁﺔ ﺇﻀﺎﻓﺔ ﺃﺭﻗﺎﻡ ﺍﻝـ MACﺍﻝﺨﺎﺼـﺔ ﺒﻬﺫﻩ ﺍﻷﺠﻬﺯﺓ ﻓﻲ ﻗﺎﺌﻤﺔ ﺍﻷﺠﻬﺯﺓ ﺍﻝﻤﺴﻤﻭﺡ ﻝﻬﺎ ﺒﺎﺴـﺘﺨﺩﺍﻡ ﺍﻝـﺸﺒﮑﺔ ﺃﻭ
ﻨﻘـﻁ ﺍﺴـﺘﺨﺩﺍﻡ
ﺍﻻﺘﺼﺎل ﻭﻻ ﻴﺴﻤﺢ ﺒﻐﻴﺭ ﻫﺫﻩ ﺍﻷﺠﻬﺯﺓ ﻤﻬﻤﺎ ﮑﺎﻨﺕ ﺒﺎﺴﺘﺨﺩﺍﻡ ﻨﻘﺎﻁ ﺍﻻﺘـﺼﺎل ﺍﻝﺨﺎﺼـﺔ ﺒﺸﺒﮑﺘﻪ. ﺘﺸﻔﻴﺭ ﺍﻝﺒﻴﺎﻨﺎﺕ ﺒﺎﺴﺘﺨﺩﺍﻡ ﺍﻝـ WEP
40 تو ا
ھ نا
ري
Wireless Networks
ﺃﻏﻠﺏ ﻨﻘﻁ ﺍﻻﺘﺼﺎل ﺘﻤﻠﻙ ﺇﻤﮑﺎﻨﻴﺔ ﺍﻝﺘﻌﺎﻤل ﻤﻊ ﺍﻝﺒﻴﺎﻨﺎﺕ ﺍﻝﻤﺸﻔﺭﺓ .ﺒﺎﺴﺘﺨﺩﺍﻡ ﺘﻘﻨﻴـﺔ ﺍﻝـ WEPﺃﻭ Wired Equivalent Privacyﻓﺎﻥ ﺘﻔﻌﻴﻠﻬﺎ ﻓﻲ ﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل ﻴﻤﮑـﻥ ﺘﺸﻔﻴﺭ ﺍﺴﺘﻼﻡ ﻭﺘﻤﺭﻴﺭ ﺍﻝﺒﻴﺎﻨﺎﺕ ﺍﻝﻤﺸﻔﺭﺓ ﻓﻘﻁ .ﻝﺫﺍ ﻴﺠﺏ ﻋﻠﻰ ﮑل ﻤﺴﺘﺨﺩﻡ ﻴﺭﻴﺩ ﺍﺴﺘﺨﺩﺍﻡ ﺍﻝﺸﺒﮑﺔ ﺍﻝﻼﺴﻠﮑﻴﺔ ﺃﻥ ﻴﻔﻌل ﺨﺎﺼﻴﺔ ﺍﻝـ WEPﺃﻱ ﺍﻝﺘﺸﻔﻴﺭ ﻓﻲ ﺠﻬﺎﺯﻩ ﮑﻲ ﻴـﺘﻡ ﺘﺒـﺎﺩل ﺍﻝﺒﻴﺎﻨﺎﺕ ﺒﺼﻭﺭﺓ ﻤﺸﻔﺭﺓ ﺘﺼﻌﺏ ﻓﻲ ﻤﻌﻅﻡ ﺍﻷﺤﻴﺎﻥ ﻤﻌﺭﻓﺔ ﻤﺤﺘﻭﺍﻫﺎ ﺇﻥ ﺘﻡ ﻨﺴﺦ ﻫـﺫﻩ ﺍﻝﺒﻴﺎﻨﺎﺕ ﺃﺜﻨﺎﺀ ﻤﺭﻭﺭﻫﺎ ﺒﻴﻥ ﺍﻷﺠﻬﺯﺓ. ﻭ ﮑﺨﻁ ﺩﻓﺎﻉ ﺜﺎﻨﻲ ﻋﻨﺩ ﺍﺴﺘﺨﺩﺍﻡ ﻤﻴﺯﺓ ﺍﻝﺘﺸﻔﻴﺭ ﻴﺠﺏ ﺘﺒﺎﺩل ﻤﻔﺘﺎﺡ ﺍﻝﺘﺸﻔﻴﺭ ﺍﻝﻤﺴﻤﻰ ﺒـ WEP Keyﻓﻬﻭ ﻋﺒﺎﺭﺓ ﻋﻥ ﺃﺭﻗﺎﻡ ﻋﻠﻰ ﺃﺴﺎﺱ Hexﺘﺤﺩﺩ ﺩﺭﺠﺔ ﺍﻝﺘﺸﻔﻴﺭ ﻭﮑﻠﻤـﺎ ﺯﺍﺩ ﺤﺠﻡ ﺍﻝﺭﻗﻡ ﺯﺍﺩﺕ ﺼﻌﻭﺒﺔ ﮑﺴﺭ ﺍﻝﺘﺸﻔﻴﺭ ﻭﺃﻴﻀ ﹰﺎ ﺯﺍﺩﺕ ﺍﻝﻤﺩﺓ ﺍﻝﺘﻲ ﻴﺘﻡ ﻨﻘل ﺍﻝﺒﻴﺎﻨـﺎﺕ ﺒﻌﺩ ﺘﺸﻔﻴﺭﻫﺎ ﻭﺍﺴﺘﻼﻤﻬﺎ ﻭﻤﻥ ﺜﻡ ﻓﻙ ﺘﺸﻔﻴﺭﻫﺎ .ﻭﻴﻌﺘﺒﺭ ﺍﻝﻤﻔﺘﺎﺡ ﺨﻁ ﺩﻓﺎﻉ ﺜﺎﻨﻲ ﻷﻨﻪ ﻴﺠﺏ ﻋﻠﻰ ﺍﻷﻁﺭﺍﻑ ﺍﻝﻤﺴﺘﺨﺩﻤﺔ ﻝﻠﺸﺒﮑﺔ ﻤﻌﺭﻓﺔ ﻫﺫﺍ ﺍﻝﻤﻔﺘﺎﺡ ﮑﻲ ﻴﺘﻡ ﺘﺸﻔﻴﺭ ﺍﻝﺒﻴﺎﻨـﺎﺕ ﻋﻠـﻰ ﺃﺴﺎﺴﻪ ﻭﻴﻔﻀل ﺘﻐﻴﻴﺭﻩ ﺒﻴﻥ ﻓﺘﺭﺓ ﻭﺃﺨﺭﻯ ﺤﺘﻰ ﺇﻥ ﻭﻗﻊ ﻓﻲ ﻴﺩ ﺃﺤﺩ ﺍﻝﻤﺘﻁﻔﻠﻴﻥ ﻓﺎﻨـﻪ ﻝـﻥ ﻴﺴﺘﺨﺩﻤﻪ ﻝﻔﺘﺭﺓ ﻁﻭﻴﻠﺔ. ﺍﻝﮑﻠﻤﺔ ﺍﻝﺴﺭﻴﺔ ﺍﻻﻓﺘﺭﺍﻀﻴﺔ Default Password ﺘﺄﺘﻲ ﻨﻘﻁ ﺍﻻﺘﺼﺎل ﻤﻥ ﺍﻝﺸﺭﮑﺎﺕ ﺍﻝﻤﻨﺘﺠﺔ ﻝﻬﺎ ﺒﮑﻠﻤﺔ ﺴﺭﻴﺔ ﻤﻌﻴﻨﺔ ﻤﻭﺤﺩﺓ ﻭﻤﻌﺭﻭﻓﺔ ﻴﺠﺩﻫﺎ ﺍﻝﻤﺴﺘﺨﺩﻡ ﻓﻲ ﺍﻝﺩﻝﻴل ﺍﻝﺨﺎﺹ ﺒﺎل Access Pointﻭﻓﻲ ﺒﻌﺽ ﺍﻷﺤﻴـﺎﻥ ﺘﮑـﻭﻥ ﺍﻝﮑﻠﻤﺔ ﺍﻝﺴﺭﻴﺔ ﺨﺎﻝﻴﺔ ﻴﻌﻨﻲ ﺃﻥ ﻋﻨﺩ ﺘﺴﺠﻴل ﺍﻝﺩﺨﻭل ﻝﻨﻘﻁﺔ ﺍﻻﺘﺼﺎل ﻝﺘﻐﻴﻴـﺭ ﺍﻹﻋـﺩﺍﺩﺍﺕ ﻴﮑﻭﻥ ﺍﺴﻡ ﺍﻝﻤﺴﺘﺨﺩﻡ ﻫﻭ ﻤﺜﻼ adminﻭﺍﻝﮑﻠﻤﺔ ﺍﻝﺴﺭﻴﺔ ﻏﻴﺭ ﻤﻭﺠﻭﺩﺓ! ﻤﻥ ﺍﻝﻭﺍﻀﺢ ﺍﻨـﻪ ﻴﺠﺏ ﺘﻐﻴﻴﺭﻫﺎ ﺇﻝﻰ ﮑﻠﻤﺔ ﺴﺭﻴﺔ ﺼﻌﺒﺔ ﻤﮑﻭﻨﺔ ﻤﻥ ﺃﺭﻗﺎﻡ ﻭﺤﺭﻭﻑ .ﻫﺫﻩ ﻫﻲ ﺍﻹﻋـﺩﺍﺩﺍﺕ ﺍﻻﻓﺘﺭﺍﻀﻴﺔ ﺍﻝﺘﻲ ﻭﺠﺩﺕ ﻝﺘﺴﻬل ﺍﻝﻌﻤﻠﻴﺔ ﻋﻠﻰ ﺍﻝﻤﺴﺘﺨﺩﻤﻴﻥ ﻝﮑﻥ ﺇﻥ ﺒﻘﻴﺕ ﻫﮑﺫﺍ ﻓﺈﻨﻬﺎ ﻗـﺩ ﺘﺅﺩﻱ ﺇﻝﻰ ﻤﺼﺎﺌﺏ ﮑﺒﻴﺭﺓ ﻴﻤﮑﻥ ﺍﻝﺤﺩ ﻤﻨﻬﺎ ﻭﻗـﺩ ﻴﻤﮑـﻥ ﺘﻼﻓﻴﻬـﺎ ﺒﺎﺘﺒـﺎﻉ ﺍﻝﺘﻌﻠﻴﻤـﺎﺕ ﻭﺍﻝﻨﺼﺎﺌﺢ.
41 تو ا
ھ نا
ري
Wireless Networks
ﻫﺫﻩ ﺒﻌﺽ ﺍﻷﻤﻭﺭ ﺍﻝﺘﻲ ﺴﺘﺴﺎﻋﺩ ﻓﻲ ﺘﻘﻭﻴﺔ ﺃﻤﻥ ﺍﻝـﺸﺒﮑﺎﺕ ﺍﻝﻼﺴـﻠﮑﻴﺔ ﺭﻏـﻡ ﺃﻥ ﺍﻝﺤﺩﻴﺙ ﻋﻥ ﺃﻤﻥ ﺍﻝﺸﺒﮑﺎﺕ ﺃﻤﺭ ﻭﺍﺴﻊ ﺠﺩﹰﺍ ﻭﻻ ﻴﻤﮑﻥ ﺤﺼﺭﻩ ﻓـﻲ ﺩﺭﺱ ﺇﻻ ﺃﻥ ﻭﻀـﻊ ﺍﻝﻨﻘﺎﻁ ﻋﻠﻰ ﺍﻝﺤﺭﻭﻑ ﺃﻤﺭ ﻤﻁﻠﻭﺏ ﻝﻤﻌﺭﻓﺔ ﺃﻫﻡ ﺍﻷﻤﻭﺭ ﺍﻝﺘﻲ ﻴﺠﺏ ﺍﻝﺘﺭﮑﻴﺯ ﻋﻠﻴﻬﺎ ﻝﺘﻘﻠﻴل ﺍﻝﻤﺨﺎﻁﺭ ﺍﻝﺘﻲ ﻗﺩ ﻴﻭﺍﺠﻬﻬﺎ ﺃﻱ ﻤﺴﺅﻭل ﻋﻥ ﺍﻝﺸﺒﮑﺎﺕ.
ﻣﻊ ﲤﻨﻴﺎﺗﻨﺎ ﻟﻜﻢ ﺑﺎﻟﺘﻮﻓﻴﻖ ﻭﺍﻟﻨﺠﺎﺡ ﺍﻟﺪﺍﺋﻤﲔ 42 تو ا
ري
Wireless Networks
42 0
تو ا
ھ نا