Unidad 5 - Planeación y Diseño Básico de una LAN

Share Embed Donate


Short Description

Download Unidad 5 - Planeación y Diseño Básico de una LAN...

Description

c

DEPARTAMENTO DE SISTEMAS Y COMPUTACION MATERIA REDES DE DE COMPUTADORAS HORARIO 12:00 a 13:00 HORAS CATEDRÁTICO JIMENEZ AGUILAR ARIADNA TRABAJO UNIDAD 5 PLANEACIÓN Y DISEÑO BÁSICO DE UNA LAN NOMBRE ALUMNOS CERVANTES VÁZQUEZ VERONICA RAMOS HERNÁNDEZ ROSA MARÍA FECHA DE ENTREGA MIÉRCOLES 1 DE DICIEMBRE 2010

c c c c

c

c

PLANEACIÓN Y DISEÑO BÁSICO DE UNA LAN c ! c cc    c !  c  ccc ccc !   c    cc c cc c !    c c c  c !    c "cc#c !        c !   c    cc %  c !   c% ccc !   c%( c)c *  +c !  c%+cc,cc -( c c-( c.c,c  / %  c ! c*+c)c1cc ,c c !  c +cc,c (  cc  c !  c1c  c* c  c !  c1cc#c c*c c3c ! c- +c)c   +c#cc,c  c !  c- +cc c#cc c - 5- c !  c- +cc%  c .  ccc !  c 3( +ccc  cc c !  c   +cc

 cc,  6c7 c c c !  !c c   c c c

c c

 c

c

c

c

c

c c c

!c $c $c

c c

&'c &c

c

&$c

c

&0c

c

2'c

c

2c

c

2c

c

2c

c

24c

c

2$c

c

&c

c

!c

c c

4c 'c

c

2|Página

UNIDAD ! - PLANEACIÓN Y DISEÑO BÁSICO DE UNA LAN !  Análisis De Requerimientos ¿Qué es un requerimiento? üc

+ccc c c   c c c c  c c  cc(  c

c c üc +ccc cc8" cc c c  c c 3 c c  6c   6c3+6c c c  +c3   c   c üc ,c+ccc cc c3 c cc  c üc (c cc  cc" cc c c cc  cc c c pipos de requerimientos c( 9cc  c8 c c cc     :c üc ,c     c3 :c c c c +ccc c c  cc" c  c cc     c 93c(c cc  c  (cc c;cc ; c üc ,c     cc3 :cc   6cc6c c   6c c  c   6c c "c c ;c  c ( 36c 1c  c  c  

 6c ( 9c  c  c  

 ccc 93Ec    c c c 36c  c 3 6c c 3 +c  c c  c   c  cc  

 c* c@* A6c +cc c=cFc  

 6c=c cc c3c( c3   c   c3c c c3 6c  c=c

c cc  c c  c   c c c c    c c c  c c c  c  (  :c üc ,c  cc* c@, *Acc üc F  c* cc üc ,cc 5%cc #  cc cc c c3 ccc(  c :cc üc CPU: c c  c c    c @  c * (c , Ac  c c c

cc  c3  c@D*,Ac   c cc  cc 

 cccc *,c c  c c c1c=c c ccc 6cc 6cc  c cc

 c c  

 c 

 c c  +c c  c c  c c c  c  cc  c *,c c3  ccc cc üc RAM:cc cc   c  c@ c cF  =Accc   c  +cc 

 c% c  cccc cc cc3 +c c c c c  c   c c 3 c c c c =c  c c c c c c 3 +c c  c 7   c c  +c c  c   c c &!c (= c@&!F#Acc   c Fc c" c c 9 c cc c  c Gc ,c c  c c c ( 3c  c  c   c c  c  6c  c    c    cc   c Fc "c = cc üc Disco Duro:  ccc cc   c  cc 

 cc 9c c c   c c c +(c c   c  c %  c c "c @3c =  Ac c ,-Gc c c (  c  c c  c  c " c c   c c  "c c( c ccc c>cc :ccccc c c c !|Página

üc üc

üc

üc

üc

üc

üc

üc

 c c9    c(cc  c cc  cccHH;IIc  cc  ( 6c c  c c cc ccc&c ( cc Consola: cccc"cc +c cc  cc c  cc  cc cc  ccc c  c  cc cc perminal: c  c   c c  +c c c  

 c >  c c c 8 c    c "c  c % --c "c c  ;c  c   cc  c c3 cc* c=c c  cGcc System Bus: ,c c c ccc +c

;c c    c3 +c   c  c c 3  c  c c  

 c c %=  c # c c c c c  c cc *,c=cc  cc  ccc   c c cc  c +c c c c c c cc8+ccc c cc   c( 3cc SCSI Bus: c% %-cc ;;=c c"c(cc cc  c c  c cc8+c c c  c =c c c  c c c  c c c c % %-c   c c c c (c c c  c ( cc  c c cc c =cc +cc c c  cc c( cc cc c  c ( ( c c cc  3 c3  cccc 

 cc(>c cc 3 6c c   c c   c c c  +c  c c  c  c =c 3  c c c c c  +c 

    c c  c % %-c c cc  +cc cc ccc&'cF#5cc Cache:cc"cc c   c 1c=c c cccc 33 cc c c @"("/c  33 A6c c  +c c  c   c c   c c  c=c ccc   c Fcc cc"cc *,c%cc"cc

;c c 3 c  c c  c    c c   c c c  (  c c  c cc Puertos:cc  ccc cc +cc  ccc 3? cc F%/CBc8 cc  c .FFc@ c  cc  +Ac=cc  c*c@ c c    6c  Ac c ,-Gc c   c  c  c

;c  ?c  c   c  (  c cc=cc 3cc>  c=ccc(cc Adaptador de Red: ,c   c c c   c   c c  +c c  c c  c  

 c c  c c c  

 c 7   c c c c  

 c

;c  c   c c c c  "  6c c   c c  c c c cc cc@ Ac c cc +c

;c (  c c 8+c @  Ac c c  *5-*c c ( c +c c c  "  c c c ccc  cc-cc Unidades de Cinta: %c c c    c (? c c  c ( c c (   c ( c  c c 3 +c 8 c c c  c c c c  c 3=c Jc c   c " c c  "c c  c c $/ c c c   c2c7#c cc

c c

!     Aplicaciones Que Corren £|Página

c cccc cc ccc(  :c üc

üc

c ?cc Ôc c @  

 c c (6c 1c  c  c  

 A6c  c c1c=ccc  cc( 9c=c   cc Ôc  c@ "  6c( (cc   6c%  c cc   c 5c( 9c5c +Acccc+cccc +c=c    6c +cc    c=c(   cc cc Ôc Fc@  

 c cF 3 (6cD +c  c c  

 A6c c c c ( 9c c   +6c  c c  c =c ( +c c  cc Ôc  c @ c (c

  6c 1c  +c

  ;A6c c c c 16c c =c  c c    c  ( 6c   c =c  c  c +cc Ôc %c@  

 c c%3 B c( (6c-( 9cc%3 B c  c  c  

 A6c c= ccc( +c  ccccccc c ccc+(c c 93cc Ôc 7-%c @7( "c -3  c %=  6c %  c c -3 +c 7( 3Ac  c +6c  c =c c c 3 +c  c   c ;c (( 36cccc 3 cc c( ;cc Ôc c  ccc  c 9 c=c3 ?

6ccc    c c c  +c9 6c cc 8   c 9 c=c  cc3 +cc   c 9 cc Ôc c cc ccc c cc 6c  +c=c   +c c  (c c =c G6c  c =c  6c 9c  c   cc3 +c cc" cc Ôc %  c c c c c  c c c  c  c c (+(c =c 9 c c cc Ôc %  c 8 6c c c ?c c  (  +c c  (c  36c  c c c  c  +c  +c c   6c 3 cc(+ cc3( +cc  

 cc c  c

üc c c3  c cc cc c cc  ccc  c3 cc  c,-Gc c c  c(>cc cc  6c c  c cc  c c cc(  :cc

üc  8:cc cc3 c8$!6cc c "cc( 6c c%*  cc üc % .%:c c  c c 3 c !$Kc 9c  c  c c 3 c %*  c c  c c

c%,cc üc % :cc cc3 c%*  cc%,cc üc , 8:cc cc3 cL Gcc( cc üc -G:cc cc3 cc cc cc-#Fc=c*B c* cc üc --G:cc cc3 cc cc cc%c7 "cc [|Página

c

!     Ancho De Banda   +cc ccc cc9c    c c;cc3 +6cc c cc    cccc  +c3 c c8cc-   cc"ccccc cc3 +ccc c cc  c  c c ?c c c 8+c c c c c  9c c  c c c "c c c c c (   c c  c  c ( c @#*%A6c J c  c ( c @JA6c c ( c c( c@ Ac cc cc 6cc"cccc  cc

;c c+ c cc cc

3 cc c/cc cc c cc c cc c  cc cc c  9c c @(   c c ( Ac  c c c "c c c c 8 c (   cc c@c Ac c( c@Acc6cc8 c c= c c ( c@#Ac,c + c c3 cc4!''cc cccc"cccc c + c c3 cc2$$''ccc c( 9cc c c ? cc

;c  ?c cc ? ccccc c 1c  c c cc  +c c   c c c +c c(   cc c +cc86c c cc c c"ccc%c cc c8cc "c c c cc  c  c c cc c cc +cc c"ccccc c c  96cc cc c c 3? c =c c @ c(9cc (cc"c(  cc c cEc c( EAcc  c c c "=c  c   c   c  c   c c 3? 6c  c c c "=c c  ( 9 c c c c  c  c   c c 8  c "=c   c c

 c  c c   c c 3?  c c  c =c 9c c  c c  cc c  c  c cc;cc3   cc cc c3 c c Ô |Página

  c c  6c  c  (c  c c    c c  c c   c  cc c  c c ˜entajas del uso de un entorno cliente/servidor c (9c 5  c c c  c  c c3 c "c c ccc  (;c,c  c 5  cc3c  c c    c + c  c   c 3 c c c c    c c c c c 3  6c   c c  c c 3c  ;+c  c c 93c  cc c 5  c+c9cc   cc c  cc ?ccc 6c  cc 3ccc c

El entorno de red c  cc c3 c +c c c   cc c=cc    cc c cc

ccc c@c    cc cc3 B cc c c c c c 5c@5%Acc "c   6c=c (c96cc  (cc  c cc cc  c  Ac c    c c c c c c  (  c c

c  c   c c   c  cc +6cc  cc cccc cc c

Controladores y el modelo OSI c  cc   cc c ccc cc cccc cc cccc cc cc 3 c.%-cccc cccc cc c c 3  c c   c c c   c c c c  c c c 39c c  c 6cc  cc   cc c( c c +c  c cc  c=cc   cc cN 6cc c;6c c cc cc c=cc  ccc c

Controladores y software de red c " c c c 3  c c c   c c c 3 ;c   c c  c c 3 B c c 6c c c c c   c c  c  c c c 3 B c c   c  cc c c  c c   c " B c c 3  c c   c   c  =c c   c c"c cc ccc  c  c- ccc  cc

c   c  cc"cc ccc  c  cc 6cc" c cc 3  c c c   c c c  =c   c  c c = 9c c   c   c   cc cc ccc   c%c  (6c cc   c c   6cc (  cc cc   c c c  c c3  cc c  c  cc c   c

Utilización de controladores c

;+cc  c c c  6c =c c +6c3( +6c  ;+c=c +c

Instalación de controladores

ÔÔ | P á g i n a

c  c  cc c c c c ? c c  c  c c = 9cc  c  cc c  c

;c  3c( 3c   6cc   cc(c c( 9cc  cc ?cc c * c 6cF 3 cCBcc%  c =c c

c c*cc c c  c   c c (c c c c   c c ?c c  c c   c c   cc   cc c

Configuración de controladores 7   6c c   c c   3;c c c c c 3( c c c  c  c    c c cc   c3 cc3 c c c = 9cc c   cc cc3( c c3 B cc* (cc*=c@**Acc "=c     c -*c c   c  c 3(  c c 3( +c c ;c  c c 3 B 6c  cc +ccc  cc c;c 6cc@ cc  c c  c c  c **6c c  c F 3 c CBc 0c c CBc 0$Ac c   c   c   c 3(  c c  c " B c 

    c  c    c CBcc'cc( cc  c**6c   c  c c c%cc  cc c  3  6c c   c c  c c   ;c c   c c c c   c cc3  c%c=c ccccc  c  6cc  c   c c c c ccCBcc+c  c

Actualización de controladores c 6c c 3  c  c    c c c c 3c  c c   6c  c   c c   c c c   c c 3  c  c  c  c  c c c   c  c  c c c   c ( 6c  c c c  9c +cc-   6cc cc c+cc ?cc c c c c"c F 3 c  B Jc @F%A6c   % c c c  c -   c c 3  c c   c  c  c ( cc  cc  c ;c c cc ;+cc  cc  ccc c +6c  c c c    c  c   c c   c  ( c (> c c  c c  "c  c   ccc3 B cc "c  cc3  cc   c  c c +c ( c  6c  cc cc (cc-   c c c  9c  +6c c c 3 c c  "c 

c c  c 6c  c c ccc  cc "c=cc "c

c ; cc +c

Eliminación de controladores cc6cc c  c  6c c cc  c (c c c3 ccc c  c%c c c c 6c c  ?c     c c   6c  c (  c c c c "=c 3 c  c c  ( c   c =c c  c c c c  c  c c  c c   c c   cc  ccc  c

Instalación de tarjetas de red

Ô2 | P á g i n a

c  +c c c   c c c  c  c c  c  c (  c c  c  3cc cc c3c3   cc  c ? c c  ; cc  c c ; c   c c 1c3+c  cc   c   cc 6c   c> c  c c  c c  c   c

pipo de tarjeta c c c   c c c c ( c  c c   c 1c  c  c  +c c 3  c  c c 8+6c c   c c c c 93c  c c c c c * c  6c c   c 1c  c  c c c   c  "  c c 3  c c c   cJc(c

˜elocidad de la red 8 c c c c  "  :c &'#c @&'c FAc c &''#Gc @&''c FAc F "c c c  c   cc c c3  cc   cc c6c cc   c  ( c+c3 cc&'cFc c1 c c 6c(> cc  cc  cc3

c ccc c* c c   c c3 c   c" c   cc ccc c c  c c   c c   c    c

Conexión al medio  c =c " c  6c 8 c  c c c ( c (> c c 8  c    cc   c c  6c c   c cc  ccccc c ( c   c c  c# ccO/cc  cc "cc

 c=c  c c>c cc  c Ô` | P á g i n a

c  +c =c +c c " B c c c  c 3   c c c 3+c c c    +cc c c%c cc ccc cc1 c c cc  cc 6c  c  c c 3  c c    c =c  c c   c c c   c  cc ; c c  6cc c cc" B c cc  c=c 9c cc 3 c cc  cc  cc c   c  6cc  c  c  cc+cc c   c* c  6cc c cc  +c c c  c @Gc c )A6c  (  c c c    c c Gc c  c    c c   c c )c =c  (  c c c    c c )c c  c    c c   c c Gc  c   c c   c   cc  c c  c cc ; c

Lectura de la documentación c cc  +ccc   c c* c c c" B cc c3 B c

(c c   6c c  c   c c 3 c c  c    c 7   6c c 3  c   c c3 c=c c c +c%cc  cc +ccc   +c   6c  c    c c c 3  c c    c =c  c 3 +c  c    c c   c * c c 3 +6c 8 c c  c Cc c3  c

Detección durante la instalación c   c c  c   c   c  c c  c c c 6c (   c  c  c    c    c c " B c c   c   c c  c c  +6c =c  ( c c   c  c  c c  c   c c  c c " B c   c =c (> c c c c c c  c c c  c * c  6c c  c  c c -  C 6c c

c c  +c 8  c 

    c  c  6c  c " B c c  c c  6c c c /.Fc =c   c c c %c c  c c 6c c   c  c  c c  c  c  (c 

    c

Comprobación de los requerimientos mínimos  c    c c  c c c  +6c (> c c c   c c     c 9 c cc  cc c c  c =cccc  6cc   c=cccccc   c c ? c c c     c 9 c  c   c  c     c 9 c c6c c 6c3  cc  cc  c c c ccc     c 9 c  c   c c   c c  1c * c " 6c  c  9c "c c 3c =c ÔG | P á g i n a

 c c c "c   c CBc c %  c 3  c c &!c F#c c  Fc =c c   cccFM;6c ccc" cc ;c

ardware de red c " B c c c c c c   c  c c 3 B c c c 3 c =c   c c   c  c  c @   6c  (6c 

 6c  

 c =c ( B=Ac 3 c c c c c 3  c c c c 3 c .%-c @c c 39c =c c c c  Ac  c  c  c c  c c "c c   c c c =c 3 c   cc  cc 6cc c c c  c3 c c 3  c c  c    c  c     c c  c $'28c c -c * c

 6c    c  c c  c c  c -c  c   c c  c  c c cc  c cc  cc>c +ccc c c  c   c c   c c   c  c c  c  c   c 3  c * c  6c c c  "  c =c Jc (c

;c ? c 3  c  c  ccc c* c  6c c c1c c  cc  c "  c$'2cc c  cc c c1c c  ccc  cJc(c$'2c

!    Servicios De Red c3cc c cc cc   ccc  c3  cc c (;+c  c" c c  c ccc  c  cc c cc   c(cc c (;+c 9cc (;c c c cc cc ccc cc  c  cc 6c c c :cc üc üc üc üc üc üc üc üc

F= c3cc +cc F ccc   cc F ccc cc( cc  +cc    c c cc cc  +ccc cc c c   cc F ccc  +ccc (  cc F ccc ( ccc cc F ccc  cc   cc üc D8ccc cc cc üc F= c cc (  cc üc F= c3cc cF c( cc c * c c c cc6cc cc   c c cc cc c   6c c :c üc cc üc D" cc üc -  +cc üc  cc üc -3 +cc üc . cc Ô! | P á g i n a

c * c c   +c c c  c c c c   c c 8 c   c c c c c c  c   c  c   c c   c =c  c c c c c c c   c  cc c ,c  c  cc cc c  cc (  c c  c=c cc cc  c c c  c > c   c  c  (  c    c c  c c  ccc   c=cc (ccc  c  c c* c 6cc  c   cc 6cc  cc? c3  ccc   c=c     c%(>c c3 cc  +ccc (  ccc 6c8 cc3 cc   c+(:cc

Cliente-servidor  c c c c c  c c c c c  c c  c  c  (  c c c 

c c c   c =c  c c c  +c c c c   c c c c    c  c c cc  ccc cc ccc c c cc ;+cc

c  6cc  cc cc ;cc  cc c cccccc c c c c c  6c c c  c c  c 

c c  c c   3;c c

  c @ c c  c c  c c   6c  6c  Ac =c c   c ;c c  ;c=c   cc cccc c c cc 6cc ccc c c9c c cc c c =:cc üc -   ccc   cc üc  cc  +cc cc   c  cc üc Dcc  +6cc  cc ccc  cc üc Dcc +cc

c Redes de pares (peer-to-peer)  c c  cc +c c   c@ Ac    cc  c c  c c c c c cc 3 cc c cc c c:cc üc %;c=c3cc +6c  +c=c cc üc D8c   c  +c  c  c c   c =c  c   c c 6c c   cc   c(>cc cc

c Acceso c ccccc c  c  cc 3+ccc cc   c  c   c ccc  ccc  c c c

; 6c c c c    cc8+cc   ccc cc ( c   cc

Control de acceso

Ô£ | P á g i n a

* cc cc6cc   cc 3 c cc c  ccc c c 

 3c  c c c c   c c   c =c c c c c %c  c c   6cc   c c  ccc cc

Acceso remoto c  c 6c c c c c  (;+c  c  c c c >c c   c c 8+c c  c c c  c c  ( c   c c c ? c

;c c  cc8+cc   c c cc c c c  cc

Ficheros c  c c 3" c  c c 3  c c c c ( c c c    c  c  ( c c   c c c c c  c  c   c   c  c c c ccc  6c  cc     ccc cc 3" cc c (ccc c c c cc

Impresión *  c    c    c c  c 6c c =c  c  c > c   6c  c9cc( c8 c c  cccc   c c cc cc cc cc  +6cc c  c cc cc  ( cc c3 +cc c ;c ,c  c c  c c   +c c c c c   c c 386c c  c cc ccc c  cc38c c c c c c? cc   c  +cc c6cc cc cc38c c c c +cc    cc

Correo c  c  +c c c +c c c c

;c *  c  c  c c c  +c3  cc c  c* c 6cc c+ c cc ?3c cc  c   c c  c   c  c c   6c c c  c c c   c  c

c c  c "c  c  c    c ( c  c c 3 +c D  c c  cc cc c ccc ;cc

Información c  cc3 +c cc  c3" cc3 +cc c c c  c cc  c" 8 6c ccccc c  +c.c6c c   c 3 +c   c  c  c  c  c c 6c  c c c c c c   cccc c

Otros c c c  6c c ( c c c  +6c   c 3  c  c 3  c c c  6c  c  c  c  (c c c  c   c c :cc

Ô[ | P á g i n a

üc üc üc üc

 c ( c@;c=c Acc 39c ( cc %  cc (cc L3 cc  cc

c c

!    Seguridad Y Protección ¿Qué es la seguridad de redes? c( cc cc ccc( c c(  ;c cc3   cc c c  cc c cc+  c =c c cc   cc  c  ccc  "c cc"cc:cc  c c  :cc üc   c c cc

 ;c  (ccc  cc3c (cc üc   c cc   c c c   c c c1 cc  cc üc (  cc c  cc +cc3cc üc 7  ; c ccc  cc c

c Las causas de inseguridad 7   6cc( c c ccc ( 9:cc üc ,c cc( c 6cc 6cc3 cc  cc   c cc c3 cc  6c( ccc c c c1c cc  c@ c  6cc  cc cc c cc   cc Acc üc ,c ccc(   cc  cc c@  Acc üc 3c c9 cc( c  c@ 16c +cc "c

Acc üc M(c cc

cc( c@ ( Acc

c Firewall c 

 c cc cc   c c  c9  cc  cc c"J cc  (9c c(   c cc"J c cc; cc c@  cc9c   cc  cc Acc cc c c c,c;c c  c c  

 6c c "J c  c c   c ?c c c   c c ( c  c 8  c =c

 cccc ccc  cc c

!   Selección De Una Red Igual A Igual O Cliente-Servidor c3 cc c c 6c cc ccc c-( cc-( ccc c  cc  c36cc c ccc cc  cc( c  c=ccc c cc c c=c  c c c  /%  cc cc   c c  cc cc c (  6cc  c3  c ;c cc c (  6cc  6c ccc   c

 c   c c cc  6c(  c=c3(  6c c ccc  c

c "c c c c c c-( cc-( c üc Compartir recursos:c,c  c c1c c3  ccc "c "cc    c  c c   c =c c ( c c  c c   c c   +cc ccc  c c c  c=c cc3 c  ;c  c  c  c   c  c ;c c 3 c  6c c c3cc; c=c   c cc  c cc c c üc Seguridad:c c ( c c c  c c ;+c    c  c  c c 3 c cc  ccc cc c  ccc  6c"=c c   c c 3c c 9 c =c c c c c c   c c c 6c  c (  c c ( c üc Redundancia:cF cc cc ? cccc( c c  cc  6c c  c c    c   c  c  c  c =c  c c

Ô | P á g i n a

9c ccccc c c1c c c c   cc   c c  6cc c  c ccc( ccc c c    c üc Número de usuarios: ,c ccc  c c  c cc   c üc ardware:cc" B ccc c c c  c  ccccc

  6c =c c c  c c  c c   c c @ FAc =c c    ccc c cc cc  c üc Centralización del control: 6c  cc ( ccc c c cc   cc3 c c c (  c c3 cc c1 cc  c c c

!  Planeación Y Diseño De Una LAN ,c c   c "c    9 c  c   c c    6c   c  c =c    c c   cc3 +c   cc cc c 3(c  cc  cc   cc+c cc c +cccc c c=c 3

c  cc8 c cc cc cc+cc c 1cc

c  c6c ccc  c c396c   c c+c 9 cc  c c +c c  c c (c  c  c c c "c c c   cc3  cc=c" cc  c6c c c   c    c c c c c 3

c %c    c  c c c c c c 6c c   +c =c c c c c (  c ( 9c c +c  c 3 c  c  c +cc +ccc cc ,c cc c  c 9  c cc cc cc cc c  c c  6c  c  c c  c % c  c   c  c =c    c c c M=c c 9c c c c c 3 +c c   6c c 3 +c  +c "c  c c ( c  (c c c 6c c 3 +c ( c c  c

;c  c c c   c c c   c c  +c c +c c c cc(  c(   :c &c 2c c c c

 cc   c %c #+(c , c

c * c  c c +c c c "=c c  c c   c c c c c c   c ; c M=c c c   c   c c  (  c c c c c c" cc  3c c  3;c c cc (  c c+c  c cc c c  cc+cc(  cccc+ccc cc    c +c  c c  

 6c  ?c c    c cc c  c c c   c c c   c c   6c  c  c c c  c c   c c  c c c  c c * c =  c c c +6c c c c ; c c c c  c c c

 c c  

 c c  +c c c c  c c c  c c  = c " cc  cc  "ccc c* c6c c  cc  cc(  :c Etapas de la red 2 |Página

INpERNA:c cc c3:cc c c@8c=c  c Ac c  c@,*c=c  c ( Ac EXpERNA:c c3c c  c@D cP c=c  c ( Ac c cc ; c   c cc  ccccc cc * ccc ccc cc  c c cc  c=c   cc  c c (  6c 9c  c c *+c c c    c  c c  c    6c =c c  c  c " c c +c c c c c  c  ccc cc" cc ; ccc3

c

Necesidades del cliente   ccc cc c@ cc  Ac cc c3ccc 3cc  c=c c c3  cc ccc c=5c  cc   cc cc c c=c3

c  cc8 c cc cc ccc +c c c  1c c c   c 6c c c c  c  c 396c   c c +c 9 c c  6c c +c c  c c (c  c  c cc "ccc  c c3  c c=c" c c  c6c c c   c    ccccc3

c%c   c cc cccc 6cc  +c=cc ccc(  c( 9cc+c c 3 c c c+cc +ccc cc

Planeación Etapa interna üc  cc cc c cc  c  cc c üc ; c c cc ( ccc  cc c üc ; c c  c c:c Ôc  3 cc cc Ôc cc cc=c c ccc cc Ôc cc +ccc c@ccc Ac Ôc  c@* HAc  6c cc c=c   9 c Ôc  3 cc (  c Ôc  cc   c Ôc cc3ccc  cc c Ôc  c cc cc c  c Ôc  cc cc cc  c Ôc c  c cc   ccc +c üc    cc cccc

; :c cc  c üc , c ( cc  c

2Ô | P á g i n a

üc üc üc üc üc üc

üc üc üc üc üc üc

 cc  c , c ( ccc cc c  cc cc c    cc  cc8+cc c ; c ;cc;+c cc +ccc ; c cc   c :c Ôc  ;+cc  c Ôc  ;+cc cc c Ôc  cc c@   Ac Ôc  c cc c Ôc ;+c Ôc  +c Ôc  cc3   c c(cc cc3 B c    c>  cc c c  ccc +c    cc  c  c cc +c   c ccc c ;c cc ;+ccc c    c c c  cc = c *   cc = cc ?c cc

c Desarrollo etapa interna üc - cc = ccc3"cc üc ; c c  c c9ccc c ;c üc üc üc üc

; cc +c ; c cc3   c  (cc = cc  c  c cc  +cc c cc = c

c

Desarrollo etapa externa üc - cc = ccc3"cc üc %   cc;+c8  c=c c6c ccc   c3cc c c üc ,c;c cc c   c  cc ( ccc +c üc ; c c  c c9ccc c ;c üc üc üc üc

; cc +c ; c cc3   c  (cc = cc  c  c cc  +cc c cc = c

c  c@cQ c B JAcc c c c c    c c9c c cc

c   c (( 3c c @ c   c c  c c c c K Ac % c  c   c   c  c c  c   c c c c c 6c c  6c c c c  c .3 c c c  +c  c @c c  c c FAc c c c

22 | P á g i n a

 +cc  c c cc 6c c(  cc cc cc c   ccc c  ccc c cc3 c"  cc c c cc:c üc  cc=c cc   ;c c c c c( c üc  ccc cc   ;c c c cc( c

c Determinación de las necesidades de la red

 c c  c =c6c c cc c 3(c ccc   cc c c c " c c   c c  c c c c c (  c  c c  (  c = cc 3 ccccc :c üc üc üc üc üc

 * c ?ccc Rc    ccc Rc   ccccc   Rc   ?cc c   c  Rcc    c  cc Rc

c La planeación üc  c  c c ( c (;cc üc *  cc  ccc cc cc; c üc    cc cc ?cc cc  c=c c c; cc

c c1 c c  c cc 1c3;ccc c c cc( 6cc

 c c    c c c    c c (  c c c c   c c  + c=c cc( c=c c ? c c(  c* c cc3  ;cc( c c 3;c c  c c c  c c c c  c c c  c c c 3 +c c c +c c +c  =c c +c c c =c  c =c c c  c   c   c c   c c  c c   c c c c c  (6c c * c   c c  ( c c c c c c  

 c   c =c c  c     c  cc

Ruteador Cable/DSL con Ethernet Alámbrico y Conexión Inalámbrica Interconstruidos ( c 

 c  =c  c c c 8+c  6c   c c   c c  c

 6c  c c c c  c   c c c c c 

 c  ?c 3 c  c  ccc  c cc(  c  cc  c

 cc =c  c=c c cc c 

 ccc"6c  cc

3c c c c c  c c 3c    c c c C 6c  c  c   c c 3 (c@D BAcc

Router DSL/Cable más un Punto de Acceso en la Misma Red %c c( ( c c* c  cc   c c "  6c

;cc cc c   c @# (Ac c

 c c 5%c   c c c c  

 c c c c   cccc-   cc  ccc  ccc* c  c  ccc c  "  cc c c3 6cc 

 c  c  c c +c-*ccc

 c (c  c  cc   c 

 ccc cc=c cc   cc ?cc 

 c

Access Point pipo Ruteador

2£ | P á g i n a

c  ccc  cc c8+c3 c c c 

 ccc"cc

cc  ccc ccc

c  c c

 6c c  c c 3c  c  c c 3c c c C c @   A6c  c c   c c 3 (c    ccc 

 c* cc c cc  c

!  Instalación Y Administración Básica De Una LAN Pasos a Seguir para la Construcción de la Red üc cc*.) .cc üc   c?cc üc   c ?cc 

 c üc   c?ccccQ ccc üc   c?cc%  cc cc üc   c ?cc%  cc7 +cccc üc   c ?cc ;+cc üc *    cc üc *cc üc 1c=c3+ccc cc üc   +ccc cc üc 3( +ccc cc c  c üc  c3(  c c cc  c :c *5-*cc üc - +cM B cc üc    c 8+cc-   cc üc 3( +c%  cc üc 3( +c  c üc F   cc cc

c c   +c c c c c   c c ?c  c c   c c c   6c 3 6c ( 6c     c   c =c c c +c  c =c    c  c % c c:cc üc F  c c   c c c  +c c c c c  c  c c  c=c   6cc  +cc  c=cc  cc  c üc M c c3 ccc c=c

; c  cc  6c c c 6cc"c cc üc   c c c cc cc( c=cc  c  cc c üc M c c c c ( 6c   (?c  c c c c 

 ;6c "c  c c cc c  cc3 +c c  ccc üc

  c  c =c  ;c c c c c c c c c c   c6ccc ccc   c

c 2[ | P á g i n a

c   +c c c c c  c c    c =c 39c c c  c c c c  c  cc(  :c üc F;cc c16c c;6c 6c (c=c( 3c üc -  8+cc c cc 6c cC 6c c=cF c üc c cc > c cc +6c c c ;6cc86c3 c + 6c ? 6c 6c3  c=c  c üc  c  cc +6c =c *5-*6c%*G5-*G6c% 6c.%-c üc c  c c "c   c   6c  c .%6c  B 6c CBc 6c ,S%6c .%52c üc  c    c c 6c  =c  "  c &'c c 6c D c  "  6c Jc (6cD-6c&''(/ =cc=cD c"c üc L c ? cc  +6c+(cc96c c

c c  cc  +cc c ccc(  cc:c &c

2c c c c !c

+c c 3 +c  c c  c c c c =c   c c   c c 3 +c  c c c  c c   :c  6c  

c =c c   c  3 +c c c 3 +c  c    c c 3  c  c  c c    cc   c   +ccc3 +cc c   cc cc c    ccc cccc cc c cc   c c  c  c c  c  c   c c cccc c  +c c(  cc c=c

  cc   cc c3c = c

c c   9 c3   cc c  cc  +cc c  cccc c c   c  6c ;c c  c  c   c =c  c c  c    c c c  c  c :c c cc  cc c c   c c c

!   Instalación De Cableado Bajo Las Normas pIA/EIA Cableado Estructurado    c" c c ccc3ccc"cc c  c cc = c c  c c +(c 9c c c "c  c c3+6c  c 6c   c ? 6c (396c ( 6c  6c    9 c c c  c 3  6c =c c  c  c c3c

  ;c

cc c3ccc cc c  cc( +c ;6cccc   8+c  c 6c=ccc cc c3   cc  c@;6c 6c

8 6c (A6c ; cc" cc3c ( cc ;c 2Ñ | P á g i n a

c c   c c c   c  c c 6c ;6c   6c    6c c =c  c  c c c  c  c  c   c c 3   cc  c(? cc c3cc  cc   9 cc  +c c  c   c c c " c c    c c   c  c c 3 c cc  cc(ccc ccc  c c   c c (c c 3c c c c   c =c   c @3   c (? A6c38cc +6ccc   c =c3cc   +c

Algunas Normas del Cableado Estructurado üc üc üc üc üc üc üc üc üc

%-5- 5- /!$/#c c c  c c 3c   c @+ c   cc Ac - 5- c!$/#&c    c( c - 5- c!$/#2c   ccc  c c ;cc - 5- c!$/#c   cc6cD c+ c %-5- 5- /!0/ c cc c=ccc +cc3c   c@  c

 ccAc %-5- 5- /4'/ c cc-3   ccc c %-5- 5- /!'!/ c  c c   +c c -3   c c  cc3c   c %-5- 5- /!'4c    c c cc  cc  cc  cc  cc3c   c %-5- 5- /4$c  c  /*   c c c c * c 8  c c

 c

c Componentes del Cableado Estructurado Área de prabajo cQ cc c 8 ccccc  c@.Ac" cc  +cc

c c c c  c c c c 1c  c  c    c  c c     c c c  c c  c  c  c  6c  c c  ( 6c  c c  c =c 3  c c   c c  c c c c ?36c D86c * T6c -   6cCc  c@c Ac  c +cc1ccc  c c cc cc&'c 2c=c cc c c cc  cccc c Cableado horizontal   c c c c c .c " c c  c c c - =c c 6c  cc8+c=cc c c ccc  cc   ccc cc  cc c cc (9c cc ccc ccc(>cc c cc c

; c c ,*c c c * c &''c U6c %*c c 2c  c &'c Uc =c D c P c   c c c 3 c !25&'c 2 | P á g i n a

( c :c üc  c 8 c cc.c=cc* "c*ccc0'c c cc c cc ?c

;c üc ccc  c    cc cc c üc %cc  ccc c c   c? 6c  c3   6c  6c c6ccc  c  c

c Cableado ˜ertical cc (cc    cc cc  6cc  cc c=cc   c %c cc,*6c%*6c=c3 c+ c  c=c   c c

;c=c c üc ,*c@;A:c$''c cD.c   :c2''' c üc %*c@;A:c4''c cD.c  :c'''c c üc ,*c@ A:c0'c c

c %c  c (9cc c F8 ccc  cc 8:c cc  c F8 c c 8c cc c=cc c Cableado Backbone cc c ccc c cc  c cc  +c=cc   c c cccc  c c  + c c c c Jc c    c   8c  c   c c  cc cc36c  cc c=c  cc  c - =cc8+c c ccc3cc cc  6c =c cc

 +c @A6c   c  c c   c c 8+c  ;c =c  c c c c (9c c  c   c   c  ?c  c

; c c

(9c c  c c c 6c c  c 8 c c cc   96c  c   c ( +ccc1c Centro Principal de pelecomunicaciones cc cc c3c

;c cc c8 cc cccc  cc cc  c ccc  cc ccc c  cc c? c c c c c  c c   c c  c c  c ;c c  ( c  cc  6c  cc c =c cc  8+c c

` |Página

Creación de Cables de Red y ˜erificación CÓDIGOS DE COLORES PARA CABLES UpP SEGUN EIA/pIA !-A Y EIA/pIA !-B Códigos de colores cc,*c cc  c cccc c  c:c üc @#5 ; A/ ; c üc @#5 A/ c üc @#5L A/L c üc @#5 3?A/ 3?c

c c   c O/c c $c "5c c c c  c  c c c c @c

? c Oc c c (  c OJAc  ?c 8 c   6c c !c c =c c c c @ c  6c c   c 3+c c c "c c  c O/&&Ac c   c c $c c  c   c c &c c $6c c ;  c c  "6c  c c   cc ccc c   cc(" c@c cccc  Ac c +(c c  c (>c c - 5- c !$/ c =c !$/#c  c " c c c ,*c

;c   cO/c@$cAcc  ccc(  c c * c " c c c  c c   6c c   c  c   c c  

 c c c   6c c   c   c c c c c   c Oc c c   c !$ c c c8  cc  6cc6c c8  ccc  c!$#c &c ; c c c c   c ccc 2c    c c 1c ccc  ccc@ 8c2c Ac c  ; c 8 c &2c  c c c  c   c =c  c c c   c Occ  cc   cc  cc   cc>  c c  6cc cc  cc  cc c c c c  cc  ccc  6c  c" c cc  cc c  c c  c  6cc c c c c c c c  ccc;c 8 cc ? ccc    :c

`2 | P á g i n a

üc

c  cc c    c c  6cc  c  c c   c c  cc  ccc +ccc c  cc üc %c   c @  Ac c c    c c   6c c  c  c c  c c c   c c  (  c   c  c   c c    c c   c c   c (>c c c  +c c   c   c c  c c   c c c  c 

 c (>c  c  (  c " c c c  (  c c   c"=ccc cc  cc c c   c    c c   c  c    c  c  c c c   +c  cc  c  c c=cc%  c.  ccc@  c  cc Ac * c  6c  c c  +c c   6c c   c c   c  c 

 c c  ccc *,cc c  ccc c  cc c

Componentes software c 3 B c  c c c c   c  c c   c   c 8  6c c  c   c   c c  c c c  =c 3 c  c c c . c   c   6c cCBc52'''6c ( cc  c  cc c=c  c  c c  c c  c c c  c   c  ( c c ( c  6c c  c c

;+c c  c %  c .  c c c c    c   c c  c c    c  c c 3( c   cc c   3 c %c c c c   cc  ccc  c  cV   Wc c c3  c c 3  c   c c c * c  6c c   c  C c  c     c @c  6c ccc  Acc  c C c=c  cCBc52'''c ,c  c  cc :c üc  c cc c=c 3? cc üc  cc3 cc cc 3? c=c cc üc *  c( c ccccc c=c 3? c

c cc  c cc3 B cc c:c üc c3 B cc c cc ccc cc üc c3 B cc c cc ccc  c

c Software de cliente c c  c

+ 6c c c   c c c c c cc c c ; c c  6cc +c  cc ?cc ccc c" cc *,cc  c * c 6cc  c c c cc   cc cccc c6cc *,c     c =c 

c c  +c =6c c   +6c  c c   c c  c c    cc c c %c   (6c c c   c c 6c  c c   c c c  +c  c

; c c  c c  c c c   c c  c  c c c 6c c     c c   c c  +cc c c 6cc  ( 6ccc cccc c=cc9cc  c c

cc  c c c9cc ;c cc    c

`` | P á g i n a

Redirector ,c    c cc9cc ccc3 B cc 6c c    c cc cX%"YccX(  cc Ycc    cc c 1c+cc +(cc c%  c.  ccc :c üc -   c ccc cc üc   c c c  c c    c c c  c c  c cc c  ( cc ?ccc cc c  c

c c cc    cccc c c c cc   c( cc +c c c  cc cc cc cc   cc 3c c 6c  c c  c ;c c +cc c  cc    c   cc +c=cc 9ccc c c   c  c c 8+c  c  c c    c c  c =c c   c ccc  c cc c 6cc cc  c c cc  c

Designadores    6c c   c   c    c 3  c c  c  c c    c  c  c  c c c    c   c =c (c c   c  c c ; c* c 6ccCBc52'''6c 9c

; ccc   c c c c c c 8  c c CBc 52'''c  c   c c c c c c  ?6c c( c c cc(+cc c cc( c c cc   cc c cc6cc3 c cc  c  ccc  ccc c c  3 c=c; cc    c  ?c ;c c(   ccc( cc

ccc  cc c

Periféricos c    c  c  c  c c c  3? 6c c ( c c c 9c c c    c  cc +cc  (ccc c (c=cc9cc ?ccc c c   c  c c  c 6c c  c c c   c c   +c  c c    c c c c    6c  c 3  c  c *&c c .F&c    c c c c  ( c c    ccc    c   c   c cc  +c (cc*&c=cc 9ccc   cc c3c c

;+cc    c  ccc   cc   cccc +c cc c cc 3? cccc cc cc8+cc c* c 6c  c ccc cc c cc 6cc   c+c c  cc( cc c c(ccc;+cc  c =cc    c  cc   c  c

Software de servidor

`G | P á g i n a

c 3 B c c   c   c c c   c c  c  6c =c c c  c  6c  c    c c  c =c  3? c c   c  =c    6c ; c =c    c %c c   c  c c  c c    c c c c  c   c   c c    c9cc +c cc 6cccc  cc "c c cc   c   c%ccc +c=cc  cc cc   c

Compartir recursos    c c c ? c

;c  c   c c  c c >  c  c c c   c   ccc cc = 9ccc  c  cc cc +c  c   6cc  ?c   cc( cc  +ccc c c  +cc  c =:c üc *   c3  c   cc3  cccccc  cc üc  +cc c c c c  c ( c c c   c c

;c c  c  ccc  c  c

c * c 6c c   cc c3c  c c c ccc cc3  c c c  c   c @ "A6c c 3 c c   c    c c   c %c   (6cc cccc  c  ?cc3 c :c üc üc

( c   c+c c cc ( c   c c c=c ; c 3cc?cc

c Gestión de usuarios c  c  cc c  cc   ccc c   cc 6cc ( c c  6c c  c c c c  c c c  c c c c c    cc c c c

; cc%  c.  ccc :c üc

 c cc   6c c c c  c  c c 6c cc ?c c

; cc cc üc ( cc( c cc   ccc cc üc   c   ccc cc   c c cc  c  cc cc c * c 3 cc  ccc( +cc   cc c( c 6cc  c  cc c   c c  +c c ( c c   c F c c 3+c c c  c c ( 6c c   c c( c cc ( ccc   cc c( c

 cc  c 6c(cc( c c c c cc ccc c c  c   6cc   c c( c c c   cc( c 6cc c   c c=c "c

Gestión de la red ( c  c  cc c;c =c"   cc( +c c= cc c   cc  cc    ccc c cc  c c  c c c 6c  c "   c c ( +c   c    c 9  c c c  c c `! | P á g i n a

  c=c   c c9  cc c( 3ccc c3  c c c"   6c c   ccc c c   cc+c  c cc cc  c (c c9ccc c c

!   Configuración De Las Estaciones De prabajo ,c +cc c@c(?cB J  Acc c 

 c c3 ccc   c c c c c   c =c  3? c c c c c 3 c c c  

 c 6c

c c   cc c=c c39  c c c ccc c c cc ( ccc  cc  c c  c=c cc c;c  ccc   c3  6cc  c c3 c36c  6c c=c   c;cc c  c   c 3c c   c c (  c c c c =c 3( +c c c  c c 6c c=c  c  :c üc c 

 cc ccc  c c(>c c3 B c@ (cc    c c3 B cc    Ac ccccc=c   c c cc   c c c c üc cc c@J c=c  Acc  cc3 B c  c c =c c9c cc>  c ;+cc  c=cc3+cc c üc  c    c "c  c   c3( +c  c@ +c-*6c %6c   c c c c 3  c 7 B=6c

c   6c  Ac c c  c c

c c c   6c c  c 3( c  c   c c  +c -*c 

    c üc %  c c c c  c c c 38c =c    c  "c c c  +cc  +c cc cc3 +c ccc üc  c +  cc ccc=c3( 6c=c  c c c ( c( c üc %c c  c 

 ;c c  c c 3  c  c 3  c  c c c 3( +c  c=c cc  3 c üc  c    c "c cc   c  cc( ( c  c

 cc3 B c cc" B ccc c üc  c     c  "c c c   c  c c  c c  ( c c c "cc(c üc c  c c 3(  c  c c  c c   c  *5-*c =c c   c   c c  c c@-*G5%*G6c 6c%F*6c Ac

c c c c

`£ | P á g i n a

!   Administración De Cuentas De Usuario, Grupos De prabajo ,c   c c   c c  c c c  c >c c c   c c c  6c 3 ?cccc c+ccc c c  cccc  cc c ccc cc+ccc c c c  cccc  cc c  c c

c c c (   c c  c c   c c   c c   c c

;c c  c+ c c   c ccc ccc c c* c 6c  c   cc>  cc" ccc c c   c c c c+ccc 6c    c c c c  c

; c c  6c ( c c c   c c   c c    c c  c cc c c   c c" cc c 6cc ?cc c  cc c  c=cc3( +cc "cc   cc 8 cc cc  cc   :c üc Cuentas creadas por nosotros como administradores del dominio:c  c   c  c 3 +c  c c   6c  =c c   c =c c  1c c

  6c   c c c   c c c +c c c c =6c c c  c  6c (cccc  ccc cc üc Cuentas predefinidas o incorporadas: %c  c c   c  c   c c  +ccCBcc c  c:ccc üc Invitado (Guess):cc  c  c- cc

;c c3  ccc   c cccc cc=c  cccc  cc c c cc* c 6c c c c c  ccc c  c

c  c  c c  c c   c - c  c " c c 3 c    cccc"  c c  cc c cc c( c* c = c( 6c cc  cc c  c=c9(c c 1ccc üc Administrador (Administrator):c c   c   c    c c

;c  c    cc3( +c(cc c=cc cc    c c ; c cc  6c cc +cc 3+cc  cc   c=cc ( 6cc  +ccc  cc( 6cc +cc   6c=cc (+cc c=c "ccc  cc   c c c (ccc c  ccc üc Otras cuentas:c c c c c  c  c   c c   c  3c * c  6c c   c c --%c c  c c   c -,%Z%  c  c8c+ c

c * c(  c c = c( cc( 6c c c  cc   c c c c

; c  c ; c c  c c    6c  c c   c c c   c    c=c+cc c+c c    c c ; c  c   c %c c  c  cc   cc cc  cc   ccc üc

 cc   cc :c,c  cc   cc cc c  cc    cc   c c c cc c c  cc   cc c  6c c   c c   c c  c   c c c c c  c c    c  c c * c c  c c c c   c c  c @# Ac c  c cccccc cc   c  c@% FAc,c;c c `[ | P á g i n a

c  cc   ccc* 6c c   c c cc+ccc cc    c ccc c* c c( c 

c" c ccccc c c  c c    c c c # c  ?c  ;c c c *  c   c     c * c  6c c c   c * 3 Z&6c * 3 Z2c =c * 3 Zc c cc c  c  cc  c c c 6cc ( c c( ccc ccc "c cc  cc c  c c( c c F  6c 1 c c "c ( c c c   c =c  c c ( c  "c  c  c c  c c  6c c c  c c  c   c  6c c c 6c c c c c (>c   c " c  c c c c c  c    c c ? c c c (c c  "c  c c  6c c  c "c c 3c   c c c c c c ( c c ( c   c @( c c c c   c c 3  c c c c  Ac c   c c c =c c c c c   c c 9c "cccc  c  cc cccc( c* c  6c c ( c  3c c   +c c    c c ? c 3c  c  c c  c c > c   c c   +c c ( c c ;c c c "   c   :c    cc,  c c c

Grupos Locales c( ccc

;c c ccc   c cccc c  cc c c  c cc cc c c ( c ?c   c c  c c  c  6c  c  6c c   6c c  "c c c    c c ( c c

 ?c c

;c  c    c c c   c c  "c  c ; c  c c   c c cc cc" cc c ccccc( c=cc   +cc  "cc( cc c3 c c   c=c( c c c  c  c c  c c c c   c =c c c   6c  c c  c  6c c  c  c cc3;cc c  c(>c( cc=c+ccc c ( c c=c "c c  cc cc

Grupos Globales `Ñ | P á g i n a

c( c (cc

;c c (; c   cc   cc 6c   c  c3 +cc +c(( 3c%c c  6cc cc > c c c c   cc c c c  cccc  c8  cc c 6c c( ( cc c ( ccc c c c c "cc c   c%c

c c  cc c  cc ccc c cc  ccc   c c( c(c c3 c+c c   cc c  c c@c  cc c cc( Ac=cc c  c(>c cc( c

Administración de cuentas 8 c   c=c"   c c c   c c

; c c ; c c

 c  c c 3 c 3 c =c   c c c c  3 c 3   c  c c ( ccc   c=c"   :cc üc  c c c( ( c c  cc   ccc üc ; c c    cc c  cc   cc üc 1 cc    c ccc  c c  ( cc cc üc F  c c   c c  c c 3 c c c   c c   c c  c c  c=cc  cc üc %  c c   c c  c  c c   c c  c   6c  c  c   cccc+ccc üc    c ( c c c  c    c  c c  +c c c    ccc c.  cc  :cc üc c   cc( c    c c ccc   c %c cc1c=cc    ccc( ccc cc üc c   c c ( c .  c c   c  c   6c   c =c 3 c   c c   6c ( c (c =c ( c c c   6c c  c 3 cc( c    c=c.  cc  c

c Plantillas de cuentas de usuario c cc  cc   cc  c c  c c c  c c   c c   c %c   c c   c   c  c c c  c c c c c   c c c  c * c  6c c c c  c c    ccD +c c c   cc( cF  6c c  c c  c cc ccc ccc( c* c

; c c c=c  ccc

c   c c   6c  c c  c c   c  c @   c   Ac =c ( c c   c c   c =c c  1c  c c  c   c c (  c c c  cc ccc c  cc   :c üc  +cc üc c   cc  cc 1ccc(  ccc+cc üc c   cc c  cc 1cc üc üc üc üc

c 1c c cc 7 cc * 3cc M cccc+c@+c  cc Acc ` | P á g i n a

üc - cc@+c  cc Acc üc  c@+c  cc Acc üc F c

c c "c=c ccc c  cc   c ccccc % ( c c  c :c üc

 c c  c  c c 3+c c  6c  c  6c  c c  6c 6c36c cc üc %c   c  c   c   cc  cc  6c   c c  c c " c c c c +c   6c 3c c  c c

c=c c  c cc üc c  c c c   c c  c  c c c    c c 3? 6c  c  c c    c c   =c @ZA6c c  c 3 c c  c   c  cc ccc ccc cE    cc,  Ecc c c

!  ! Recursos Compartidos L c 19c=c (;c c c  c c  c c( cc  c   ;c  c " c c 3c c ( +c c  c c c c   c    ccc  c c  c cc"c86c=cc""c8 c c   6c  c c c 3 c c   c c c    c c

c   c  c c   c   c  c (3c c c c   c  c c c c   c  c 6c  c c c  c c c  c  c   c =c "   c c( 6c c  cc 

+c  6c :c üc

c c c  6c    c c   6c c  c   c c c  c c   c F "c ( c "c 3 c c  c c c  c  c c c  c . cc=c  cCc  c39c c c cc c 93cc  c üc ,c cc cc c3 B cc c  cc c c  c  c c3 c c  cc  +c cc   c=cc  c c   6c  c  c c c c   c c * c  c  c c c  c   c   6c  c   c " (?6c c c ( c c  c 3 c c c c c .%c c  c  ( 6c  c   c "  (?cc üc ,c c c  c 6c  c  c c c   c     c c  c 6c c c  c cc c  c  cc396c" c c  c  ccc cc c c9cc ?cc-   c üc ,c +c c 3 B c c  c  c V B Wc c  + c c  c 3 B c c    c c 3  c  6c 3  c c c  c c +c c G |Página

cc cc  cc B 6ccc( c  cc   cc  cc  

+c  c%c 6cc +c c cc  c 9c c  c cc3 B cc( 6cc"=c c3  c>c c B c üc cc ccc>c cc  ;c=c (;cc  c c cc cc

c c c c  c c    c ?c  c  c  c c  c c  c  ?c c   ; c c   c  c (  c c c c c   ( cc  ?c   cc   c ccc 6cc8   c  cc cc cc   c* c6c c c  cc 

+c   6c  9c V   Wc  c   c c c c  c

;6c  c ( c   ccc ccc 6c=cc   ccc cc( c üc c  c c c c   c c   6c   c c c c (c c   c c c c =c "   c c

; c  c c  c c c 3  c   c =c   c 3  c  6c c c  c   c  c

 c   c  c 3  c c  c  (  c  c c c " c 3  c  c c c  c +c  c   c   6c c "c

 c=c "c (   c3  cc  c" cc ccc * c cc c   c  c c c  c c cc  cc  cc cc3  c  c c cc c

GÔ | P á g i n a

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF