Professional Documents
Culture Documents
Networking
Networking
1 Everything is Online
“Hey Shad, are you online?” “Of course, I am!” How many of us still think about whether or not we are
“online”? We expect our devices, cell phones, tablets, laptops and desktop computers to always be
connected to the global internet. We use this network to interact with our friends, shop, share pictures
and experiences, and learn. The internet has become such a part of everyday life that we almost take it
for granted.
Normally, when people use the term internet, they are not referring to the physical connections in the
real world. Rather, they tend to think of it as a formless collection of connections. It is the “place” people
go to find or share information.
Complete 1.1.2 Who Owns “The Internet”?1.1.2 Who Owns “The Internet”?
The internet is not owned by any individual or group. The internet is a worldwide collection of
interconnected networks (internetwork or internet for short), cooperating with each other to exchange
information using common standards. Through telephone wires, fiber-optic cables, wireless
transmissions, and satellite links, internet users can exchange information in a variety of forms, as shown
in the figure.
Everything that you access online is located somewhere on the global internet. Social media sites,
multiplayer games, messaging centers that provide email, online courses — all of these internet
destinations are connected to local networks that send and receive information through the internet.
Think about all of the interactions that you have during the day which require you to be online.
Local networks come in all sizes. They can range from simple networks consisting of two computers, to
networks connecting hundreds of thousands of devices. Networks installed in small offices, or homes
and home offices, are referred to as small office/home office (SOHO) networks. SOHO networks let you
share resources such as printers, documents, pictures, and music, between a few local users.
In business, large networks can be used to advertise and sell products, order supplies, and communicate
with customers. Communication over a network is usually more efficient and less expensive than
traditional forms of communication, such as regular mail or long distance phone calls. Networks allow for
rapid communication such as email and instant messaging, and provide consolidation and access to
information stored on network servers.
Business and SOHO networks usually provide a shared connection to the internet. The internet is
considered a "network of networks" because it is literally made up of thousands of local networks that
are connected to each other.
Small home networks connect a few computers to each other and to the internet.
Incomplete 1.1.4 Video - Different Network Connections1.1.4 Video - Different Network Connections
Play Video
Incomplete 1.1.5 Mobile Devices1.1.5 Mobile Devices
The internet connects more computing devices than just desktop and laptop computers. There are
devices all around that you may interact with on a daily basis that are also connected to the internet.
These include mobile devices, home devices, and a variety of other connected devices.
Smartphone
Smartphones are able to connect to the Internet from almost anywhere. Smart phones combine the
functions of many different products together, such as a telephone, camera, GPS receiver, media player,
and touch screen computer.
Smartphone
Tablet
Smartwatch
Smart Glasses
Many of the things in your home can also be connected to the internet so that they can be monitored
and configured remotely.
Security System
Appliances
Smart TV
Gaming Console
There are also many connected devices found in the world outside your home that provide convenience
and useful, or even vital, information.
Click below to learn more about these commonly found connected devices.
Smart Cars
RFID Tags
Medical Devices
This is a multiple choice question. Once you have selected an option, select the submit button below
What type of network allows computers in a home office or a remote office to connect to a corporate
network?
Submit
Show feedback
This is a multiple choice question. Once you have selected an option, select the submit button below
sensor
actuator
RFID tag
Submit
Show feedback
We hear about data all of the time. Customer data, personal data, health data, census data, but what
exactly is data? Perhaps the simplest definition of data is that data is a value that represents something.
In the physical world, we represent data as numbers, formulas, alphabetic characters, and pictures. Think
about all of the data that exists just about you. Some examples include birth records, baby pictures,
school records, and health records.
Most people use networks to transmit their data in order to share with others, or for long-term storage.
Every time you hit “send” or “share” in an app or computer application, you are telling your device to
send your data to a destination somewhere on the network. Sometimes, data is being sent by your
devices and you may not even be aware that this is happening. Examples of this are when you set up an
automatic backup utility, or when your device automatically searches for the router in a Wi-Fi hotspot.
Volunteered data - This is created and explicitly shared by individuals, such as social network profiles.
This type of data might include video files, pictures, text or audio files.
Observed data - This is captured by recording the actions of individuals, such as location data when using
cell phones.
Inferred data - This is data such as a credit score, which is based on analysis of volunteered or observed
data.
Did you know that computers and networks only work with binary digits, zeros and ones? It can be
difficult to imagine that all of our data is stored and transmitted as a series of bits. Each bit can only have
one of two possible values, 0 or 1. The term bit is an abbreviation of “binary digit” and represents the
smallest piece of data. Humans interpret words and pictures, computers interpret only patterns of bits.
A bit is stored and transmitted as one of two possible discrete states. This can include two directions of
magnetization, two distinct voltage or current levels, two distinct levels of light intensity, or any other
physical system of two discrete states. For example, a light switch can be either On or Off; in binary
representation, these states would correspond to 1 and 0 respectively.
Every input device (mouse, keyboard, voice-activated receiver) will translate human interaction into
binary code for the CPU to process and store. Every output device (printer, speakers, monitors, etc.) will
take binary data and translate it back into human recognizable form. Within the computer itself, all data
is processed and stored as binary.
Computers use binary codes to represent and interpret letters, numbers and special characters with bits.
A commonly used code is the American Standard Code for Information Interchange (ASCII). With ASCII,
each character is represented by eight bits. For example:
Number: 9 = 00111001
Each group of eight bits, such as the representations of letters and numbers, is known as a byte.
Codes can be used to represent almost any type of information digitally including computer data,
graphics, photos, voice, video, and music.
In the figure, enter up to five characters in the Characters field, then click the Show Me button to see the
ASCII bit translation. Click Reset to enter a different group of characters.
Show Me
Reset
Incomplete 1.2.4 Common Methods of Data Transmission1.2.4 Common Methods of Data Transmission
After the data is transformed into a series of bits, it must be converted into signals that can be sent
across the network media to its destination. Media refers to the physical medium on which the signals
are transmitted. Examples of media are copper wire, fiber-optic cable, and electromagnetic waves
through the air. A signal consists of electrical or optical patterns that are transmitted from one connected
device to another. These patterns represent the digital bits (i.e. the data) and travel across the media
from source to destination as either a series of pulses of electricity, pulses of light, or radio waves.
Signals may be converted many times before ultimately reaching the destination, as corresponding
media changes between source and destination.
Electrical signals - Transmission is achieved by representing data as electrical pulses on copper wire.
Optical signals - Transmission is achieved by converting the electrical signals into light pulses.
Wireless signals - Transmission is achieved by using infrared, microwave, or radio waves through the air.
Click Play in the figure to see an animation of the three types of signal transmissions.
In most homes and small businesses, network signals are transmitted across copper wires (cables) or Wi-
Fi enabled wireless connections. Larger networks employ fiber-optic cables in order to reliably carry
signals for longer distances.
Check your understanding of network types by choosing the correct answer to the following questions.
This is a multiple choice question. Once you have selected an option, select the submit button below
A basic unit of information that represents one of two discrete states is known as a:
bit
byte
octet
electrical signal
Submit
Show feedback
This is a multiple choice question. Once you have selected an option, select the submit button below
When using your credit card to make purchases at several places, the credit card company can use this
information to learn about your location and your preferences. This type of personal data is known as:
secret data
volunteered data
observed data
inferred data
Submit
Show feedback
This is a multiple choice question. Once you have selected an option, select the submit button below
Which of the following methods of signal transmission uses frequencies or pulses of light?
electrical signals
optical signals
wireless signals
Submit
Wireless Networks
Scroll to begin
Incomplete 2.1.1 Video - Types of Wireless Networks2.1.1 Video - Types of Wireless Networks
Play Video
A common way that people get online is through their mobile phones. Did you know that most mobile
phones can be connected to many different types of networks simultaneously? Let’s review some of the
ways that mobile phones, smart phones in particular, interact with the various network technologies and
learn some new terminology in the process.
Mobile phones use radio waves to transmit voice signals to antennas mounted on towers located in
specific geographic areas. Mobile phones are often referred to as “cell phones” because the geographic
area in which an individual tower can provide a signal to a phone is called a cell. When a telephone call is
made, the voice signal is relayed from one tower to another tower until it is delivered to its destination.
This type of network is used when you make a phone call to another mobile phone or to a wired
telephone. It is also used to send text messages directly from the phone. The most common type of
cellular telephone network is called a GSM network, an abbreviation of the title “Global System for
Mobile Communications”.
The design of the first cell phone radio transmitters did not allow for the efficient transmission of digital
data, so enhancements were made to improve the way that data is sent across cell phone networks. The
abbreviations 3G, 4G, 4G-LTE, and 5G are used to describe enhanced cell phone networks that are
optimized for the fast transmission of data. The “G” in these designations represents the word
“generation,” so 5G is the fifth generation of the cell network. Most mobile phones and smart phones
have an indicator that shows when a 4G or 5G signal is available.
Currently, 4G still dominates as the current mobile network used by most phones. 4G delivers speeds
that are 10 times the previous 3G networks. Introduced in 2019, 5G is the latest standard. It is more
efficient than previous standards. 5G holds the promise of delivering 100 times faster speeds than 4G
and connecting more devices to the network than ever before.
The figure shows that 4G will continue to be the dominant source of global mobile traffic in 2022.
However, 5G will use an increasingly larger portion.
In addition to the GSM and 4G/5G transmitters and receivers, smartphones make connections to
different types of networks.
Click below to learn more about other networks that are used by smartphones.
GPS
Wi-Fi
Bluetooth
Incomplete 2.1.6 Check Your Understanding - Wireless Networks2.1.6 Check Your Understanding -
Wireless Networks
Check your understanding of wireless networks by choosing the correct answer to the following
questions.
Which of the following is a low-power, shorter range wireless technology that is intended to replace
wired connectivity for accessories such as speakers or a mouse?
NFC
GPS
Wi-Fi
Bluetooth
Submit
Show feedback
NFC
GPS
Wi-Fi
Bluetooth
Scroll to begin
Incomplete 2.2.1 Video - Types of Network Components2.2.1 Video - Types of Network Components
Play Video
In addition to smart phones and mobile devices, there are many other components that can be part of a
local area network. Some examples of network components are personal computers, servers,
networking devices, and cabling. These components can be grouped into four main categories:
Hosts
Peripherals
Network devices
Network media
Hosts
Peripherals
Network Devices
Network Media
The network components that you are probably most familiar with are hosts and shared peripherals.
Remember that hosts are any devices that send and receive messages directly across the network.
Shared peripherals are not directly connected to the network, but instead are connected to hosts. The
host is then responsible for sharing the peripheral across the network. Hosts have software configured to
enable people on the network to use the attached peripheral devices.
The network devices, as well as the networking media, are used to interconnect hosts. Networking
devices are sometimes referred to as “intermediary devices” because they are usually located in the path
that messages take between a source host and a destination host.
The term network media describes the cables and wires used in wired networks, along with radio
frequency waves used in wireless networks. These wired and wireless networks provide the paths over
which messages travel between the various network components.
Some devices can play more than one role, depending on how they are connected. For example, a
printer that is directly connected to a host (local printer) is a peripheral. A printer that is directly
connected to a network device and participates directly in network communications is a host.
Ethernet is technology commonly used in local area networks. Developed at Xerox PARC, Ethernet was
commercially introduced in 1980 by Digital Equipment Corporation (DEC), Intel, and Xerox. Ethernet was
later standardized in 1983 as IEEE 802.3. Devices access the Ethernet LAN using an Ethernet Network
Interface Card (NIC). Each Ethernet NIC has a unique address permanently embedded on the card known
as a Media Access Control (MAC) address.
Play Video
To physically connect to a network, an end-user device must have a network interface card (NIC). The NIC
is a piece of hardware that enables the device to connect to the network medium, either wired or
wireless. It may be integrated into the device motherboard or may be a separately installed card.
In addition to the physical connection, some configuration of the operating system is required for the
device to participate in the network. Most networks connect to the internet and use the internet to
exchange information. An end-user device requires an Internet Protocol (IP) address, as well as other
information, to identify it to the other devices in the network. As shown in the figure, there are three
parts to the IP configuration which must be correct for the device to send and receive information on the
network:
Subnet mask - This is used to identify the network on which the host is connected.
Default gateway - This identifies the networking device that the host uses to access the internet or
another remote network.
Note: Most network applications use a domain name, such as www.cisco.com, instead of an IP address
when accessing information on the internet. A DNS server is used to translate the domain name to its IP
address. Without an IP address of a DNS server, the user will have difficulty accessing the internet.
Network Documentation
Scroll to begin
Incomplete 2.3.1 Device Names and Address Planning2.3.1 Device Names and Address Planning
As a network grows in size and complexity, it becomes increasingly important that it is well planned,
logically organized, and well documented, as shown in the figure.
Many organizations develop conventions for the naming and addressing of computers and other end-
user devices. These provide guidelines and rules that can be used by network support personnel when
performing these tasks.
Computer operating systems such as Microsoft Windows allow the naming of a device such as a
computer or a printer. Device names must be unique and should have a consistent format that conveys
meaningful information. This can help to determine device type, function, location, and sequence
number based on the device name. IP addresses must also be unique to each device.
The use of logical device naming and addressing conventions that are well documented can greatly
simplify the task of training and network management and can help as well with troubleshooting when
problems arise.
The figure is a simplified physical topology of the second floor of building C. The rooms are numbered
from 201 through 209 and each room contains two or four host computers. One of the host computers
in room 209 has a text block which reads My name is C209dash01. I am in building C, room 209. My I. P.
address is 192.168.3.1. They know where to find me if there is a problem.
In a simple network consisting of a few computers, it is easy for you to visualize how all of the various
components connect. As networks grow, it becomes more difficult to keep track of the location of each
component, and how each is connected to the network. Wired networks require lots of cabling and
network devices to provide connectivity for all network hosts. A diagram provides an easy way to
understand how the devices in a large network are connected.
When networks are installed, a physical topology diagram is created to record where each host is located
and how it is connected to the network. The physical topology diagram also shows where the wiring is
installed and the locations of the networking devices that connect the hosts. Such a diagram uses
symbols or icons to represent the different devices and connections that make up a network. The figure
illustrates some of the icons used to represent network components on diagrams.
Documenting the physical connections and devices in your network will provide you with the
information that you need to know when connecting new devices or finding problems with broken
connectivity. But there is other information that you must have when troubleshooting network
problems. This information cannot be “seen” from the physical view of the network. The device names,
IP addressing, configuration information, and network designations are logical pieces of information that
may change more frequently than the physical connectivity.
A diagram called a logical topology illustrates the relevant network configuration information.
Think about the devices in your home or school that access the internet. At home, do you have devices
that you can control or manage from your mobile phone or tablet? Draw a physical topology of the
network at your home or in your classroom. Compare your topology with those created by your
classmates.
Click below for an example of a physical and a logical network topology.
Physical Topology
Logical Topology
Incomplete 2.3.5 Check Your Understanding - Network Documentation2.3.5 Check Your Understanding -
Network Documentation
device names
Submit
Show feedback
Submit
Show feedback
Scroll to begin
Incomplete 2.4.1 What Did I Learn in this Module?2.4.1 What Did I Learn in this Module?
Wireless Networks
Network Documentation
Incomplete 2.4.2 Module 2 - Online Connections Quiz2.4.2 Module 2 - Online Connections Quiz
Which category of network components includes wires and cables used in a wired network?
hosts
devices
media
peripherals
Which wireless technology is used on smart phones to transmit data to another device within very close
proximity?
Bluetooth
Wi-Fi
NFC
3G/4G
Which IP configuration parameter provides the IP address of a network device that a computer would
use to access the internet?
DNS server
default gateway
subnet mask
host IP address
A traveling sales representative uses a cell phone to interact with the home office and customers, track
samples, make sales calls, log mileage, and upload/download data while at a hotel. Which internet
connectivity method would be a preferred method to use on the mobile device due to the low cost?
cellular
Wi-Fi
DSL
cable
Logical or Physical?
physical
logical
When the growth of a small network is being planned, which design element will include the physical
and logical topology of the network?
traffic analysis
network documentation
device inventory
budget
What are two recommendations for an organization that is implementing network device naming
standards? (Choose two.)
Each device name should include upper/lower case letters, numbers, and symbols.
Which type of technology is used to provide digital data transmissions over cell phone networks?
Bluetooth
Wi-Fi
NFC
4G
Bluetooth
Wi-Fi
NFC
4G-LTE
A teenager has asked the grandparents for a specific type of mobile technology. The grandparents do not
remember the specific name of the device, but remember that the teenager wants to receive a cell
phone call on it. Which technology is likely to be the one the teenager wants?
e-reader
smart watch
VR headset
GPS
Bluetooth
fiber-optic
Wi-Fi
Submit
There is incomplete content above. You must complete this before you can proceed through the course.
Scroll to begin
Incomplete 3.1.1 Video - Introduction to Cisco Packet Tracer3.1.1 Video - Introduction to Cisco Packet
Tracer
This is a media player component. Select the play / pause button to watch or listen.
Cisco Packet Tracer is an innovative network simulation and visualization tool. This free software helps
you to practice your network configuration and troubleshooting skills via your desktop computer. Packet
Tracer is available for both the Linux Windows and macOS desktop environments.
With Packet Tracer you can choose to build a network from scratch, use a pre-built sample network, or
complete lab activities. Packet Tracer allows you to easily explore how data traverses your network.
Packet Tracer provides an easy way to design and build networks of varying sizes without expensive lab
equipment. While this software is not a replacement for practicing on physical routers, switches,
firewalls, and servers, it provides too many benefits to ignore!
Click Play in the video to learn more about Cisco Packet Tracer.
Play Video
Scroll to begin
Incomplete 3.3.1 Video - Getting Started in Cisco Packet Tracer3.3.1 Video - Getting Started in Cisco
Packet Tracer
This is a media player component. Select the play / pause button to watch or listen.
Packet Tracer is a tool that allows you to simulate real networks. It provides three main menus that you
can use for the following:
Select, delete, inspect, label, and group components within your network
Click Play in the video to learn how to use the menus and how to create your first Packet Tracer network.
Play Video
If you have used any program such as a word processor or spreadsheet, you are already familiar with the
File menu commands located in the top menu bar. The Open, Save, Save As, and Exit commands work as
they would for any program, but there are two commands that are special to Packet Tracer:
The Open Samples command will display a directory of prebuilt examples of features and configurations
of various network and Internet of Things devices included within Packet Tracer.
The Exit and Logout command will remove the registration information for this copy of Packet Tracer and
require the next user of this copy of Packet Tracer to do the login procedure again.
Complete 3.3.2 Locate and Deploy Devices3.3.2 Locate and Deploy Devices
Because Packet Tracer simulates networks and network traffic, the physical aspects of these networks
also need to be simulated. This includes actually finding and deploying physical devices, customizing
those devices, and cabling those devices. After the physical deployment and cabling is done, then it is
time for configuration of the interfaces used to connect the devices.
Finding a device to deploy requires looking in the Device-Type Selection Box. The Device-Type Selection
Box works on the concept of categories and sub-categories, as shown in the figure.
The top row of icons represents the category list consisting of: [Networking Devices], [End Devices],
[Components], [Connections], [Miscellaneous], and [Multiuser]. Each category contains at least one sub-
category group.
Incomplete 3.3.3 Packet Tracer - Deploy Devices3.3.3 Packet Tracer - Deploy Devices
In this activity, you will open a sample file, locate and deploy multiple devices, and then save the file.
Deploy Devices
Deploy Devices
Incomplete 3.3.
Scroll to begin
Incomplete 3.4.1 Video - Device Configuration in Packet Tracer3.4.1 Video - Device Configuration in
Packet Tracer
This is a media player component. Select the play / pause button to watch or listen.
After your network has been created, it is time to configure the devices and components. Packet Tracer
lets you configure the different intermediate and end devices that make up your network. To access the
configuration interface of any devices, first click the device that you wish to configure. A popup window
will appear displaying a series of tabs. Different types of devices have different interfaces.
Click Play in the video to learn how to configure devices and components in your simulated network.
Play Video
Incomplete 3.4.2 GUI and CLI Configuration in Packet Tracer3.4.2 GUI and CLI Configuration in Packet
Tracer
Packet Tracer also provides a variety of tabs for device configuration including the following:
Physical
Config
CLI
Desktop
Services
The tabs that are shown depend on the device you are currently configuring.
Note: You may see other tabs on different devices. These additional tabs are beyond the scope of this
course.
Physical Tab
Config Tab
CLI Tab
Desktop Tab
Services Tab
Incomplete 3.4.3 Packet Tracer - Configure End Devices3.4.3 Packet Tracer - Configure End Devices
In this activity, you will construct a simple Packet Tracer network and complete basic configuration of end
devices.
Scroll to begin
Incomplete 3.5.1 Packet Tracer - Create a Simple Network3.5.1 Packet Tracer - Create a Simple Network
Incomplete 3.5.2 What Did I Learn in this Module?3.5.2 What Did I Learn in this Module?
Incomplete 3.5.3 Module 3 - Explore Networks with Packet Tracer Quiz3.5.3 Module 3 - Explore
Networks with Packet Tracer Quiz
It can be used to examine network data flows for a corporate network that connects to the internet.
Refer to the exhibit. Which network device is being configured within Packet Tracer?
laptop
PC
switch
Refer to the exhibit. A user is building a home wireless network within Packet Tracer. The user adds 2 PCs
and 2 laptops. Which device would be needed to create the network?
Refer to the exhibit. Which menu item would be used to bring up a web browser?
Physical
Config
Desktop
Programming
Attributes
Which type of cable connection would be used in Packet Tracer to connect a FastEthernet port on a PC to
a switch port?
console
crossover
fiber
straight-through
A student is creating a wired network in Packet Tracer. The student added six PCs. What other device is
needed so that the PCs can communicate with one another?
cloud
firewall
switch
IoT gateway
Command Prompt
IP Configuration
Web Browser
PC Wireless
Refer to the exhibit. A student is working on a Packet Tracer lab that includes a home wireless router to
be used for both wired and wireless devices. The router and laptop have been placed within the logical
workspace. The student adds a laptop device and wants to replace the wired network card with a
wireless network card. What is the first step the student should do to install the wireless card?
Drag the wired network card into the list on the left side.
Select the Config tab and then the wireless network card checkbox.
Select the WPC300N option from the left and drag that card to the side of the laptop.
A technician selected the GUI interface on a wireless router and added a DNS address of 208.67.220.220.
The technician then immediately exited the GUI interface. What will occur as a result of this
configuration?
All connected host devices, configured with DHCP, will automatically be sent the IP address of the DNS
server.
Because the technician forgot to save the configuration, the DNS server address will not be sent to
connected devices.
The technician should have used the Config tab to enter the DNS address
The technician should check the Physical tab to ensure that the wireless router is powered on.
Refer to the exhibit. Which Packet Tracer menu option would be used to change the preferences such as
showing port labels in the logical workspace?
File
Edit
Options
Tools
Extensions
Scroll to begin
Incomplete 4.1.1 Video - Network Media Types4.1.1 Video - Network Media Types
This is a media player component. Select the play / pause button to watch or listen.
Play Video
The four main criteria for choosing network media are these:
What is the maximum distance that the media can successfully carry a signal?
Modern networks primarily use three types of media to interconnect devices, as shown in the figure:
Glass or plastic fibers within cables (fiber-optic cable) - Data is encoded into pulses of light.
Wireless transmission - Data is encoded via modulation of specific frequencies of electromagnetic waves.
The three most common network cables are twisted-pair, coaxial cable, and fiber-optic cable.
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Incomplete 4.1.4 Check Your Understanding - Network Media Types4.1.4 Check Your Understanding -
Network Media Types
Check your understanding of network media types by choosing the correct answer to the following
questions.
This is a multiple choice question. Once you have selected an option, select the submit button below
The maximum distance that the media can successfully carry a signal
Submit
Show feedback
This is a multiple choice question. Once you have selected an option, select the submit button below
What is the most common type of wired media used by TV companies to connect and carry signals to a
set-top box within a home?
twisted-pair cable
coaxial cable
fiber-optic cable
Submit
Show feedback
This is a multiple choice question. Once you have selected an option, select the submit button below
Which type of wired media is used to carry digital information at very high speeds over long distances?
twisted-pair cable
coaxial cable
fiber-optic cable
Submit
Show feedback
This is a multiple choice question. Once you have selected an option, select the submit button below
Which is the most common type of wired media to connect end devices to an Ethernet LAN?
twisted-pair cable
coaxial cable
fiber-optic cable
Submit
Show feedback
Ethernet Cabling
Scroll to begin
The networks in most homes and schools are wired with twisted-pair copper cable. This type of cable is
inexpensive compared to other types of cabling, and it is readily available. The Ethernet patch cables
that you can purchase through the internet or at a retail store are an example of copper twisted-pair
cable
Twisted-pair cables consist of one or more pairs of insulated copper wires that are twisted together and
housed in a protective jacket. Like all copper cables, twisted-pair uses pulses of electricity to transmit
data.
Data transmission over copper cable is sensitive to electromagnetic interference (EMI), which can reduce
the data throughput rate that a cable can provide. Common items in a home that can create EMI include
microwave ovens and fluorescent light fixtures.
Another source of interference, known as crosstalk, occurs when cables are bundled together for long
lengths. The electrical impulses from one cable can cross over to an adjacent cable. This occurs most
frequently when cables are improperly installed and terminated. When data transmission is corrupted
due to interference such as crosstalk, the data must be retransmitted. This can degrade the data carrying
capacity of the medium.
Unshielded twisted-pair (UTP) - This is the most commonly encountered type of network cable in North
America and many other areas.
Shielded cables (STP) - These are used almost exclusively in European countries.
UTP Cable
UTP cable is inexpensive, offers a high bandwidth, and is easy to install. This type of cable is used to
connect workstations, hosts and network devices. It can come with many different numbers of pairs
inside the jacket, but the most common number of pairs is four. Each pair is identified by a specific color
code.
UTP Cable
STP Cable
Many different categories of UTP cables have been developed over time, as shown in the table. Each
category of cable was developed to support a specific technology and most are no longer encountered in
homes or offices. The cable types which are still commonly found include Categories 3, 5, 5e, and 6.
All categories of data grade UTP cable are traditionally terminated into an RJ-45 connector. There are still
some applications that require the smaller RJ-11 connector, such as analog phones and some fax
machines. In the figure below, an example of an RJ-11 connector is on the left. The RJ-45 connector is on
the right.
Incomplete 4.2.3 Check Your Understanding - Ethernet Cabling4.2.3 Check Your Understanding - Ethernet
Cabling
Check your understanding of Ethernet cabling by choosing the correct answer to the following questions.
This is a multiple choice question. Once you have selected an option, select the submit button below
A type of interference that occurs when cables are bundled together for long lengths is known as:
crosstalk
cross-interference
bundled-interference
crosscheck
Submit
Show feedback
This is a multiple choice question. Once you have selected an option, select the submit button below
What type of Ethernet twisted-pair cable may be required when the electrical environment has strong
EMI and RFI interference?
UTP
STP
fiber-optic
coaxial
Submit
Show feedback
This is a multiple choice question. Once you have selected an option, select the submit button below
Which of the following is the most common type of connector used to terminate twisted-pair cabling?
RJ-10
RJ-11
RJ-41
RJ-45
Submit
Show feedback