Professional Documents
Culture Documents
Institusi Latihan
Jabatan Tenaga Manusia
TEKNOLOGI TELEKOMUNIKASI
KERTAS PENERANGAN
Semester 5
ESTABLISHMENT
SIGN
TERHAD
Edisi Pertama Jun 2016
Hak Milik Terpelihara. Dokumen ini diklasifikasikan sebagai TERHAD untuk kegunaan
ILJTM SAHAJA. Pihak luar tidak dibenarkan mengeluar ulang mana-mana bahagian
dalam kandungan Bahan Pembelajaran Bertulis (WIM) dalam apa jua bentuk sebelum
mendapat keizinan bertulis daripada Jabatan Tenaga Manusia (JTM).
Bahan Pembelajaran SEMESTER LIMA ini dibangunkan bagi kursus sepenuh masa di
Institusi Latihan Jabatan Tenaga Manusia (ILJTM) oleh Ahli Jawatankuasa
Pembangunan WIM dan disemak serta diluluskan oleh Jawatankuasa Pemandu
Kurikulum untuk tujuan gunapakai bagi semua ILJTM yang terlibat.
Dengan ini adalah dimaklumkan bahawa Bahan Pembelajaran Bertulis (WIM) Kluster
Elektronik bagi kursus peringkat Sijil Teknologi Telekomunikasi - Semester Lima telah
DISEMAK dan DISAHKAN dalam Mesyuarat Jawatankuasa Pemandu Kurikulum (MJPK)
Bil.1/2016 yang diadakan pada 14 Jun 2016. Sehubungan itu, Bahan Pembelajaran
Bertulis (WIM) ini hendaklah digunapakai bermula Julai 2016 di seluruh Institusi Latihan
Jabatan Tenaga Manusia (ILJTM).
............................................. ................................................
(MOHAMAD HISAM BIN MOHD ADAM ) (SYED MOHAMAD NOOR BIN SYED MAT ALI)
Pengerusi Kluster Pengerusi
Jawatankuasa Pemandu Kurikulum
TABLE OF CONTENT
Committee Member :
Secretariat :
Session 1 :
Development date : 25 – 28 Mei 2015
Place : Hotel Wana Riversid, Melaka
Session 2 :
Development date : 27– 30 Julai 2015
Place : Hotel Midah, Kuala Lumpur
Session 3 :
Development date : 28 – 1 Oktober 2015
Place : Hotel Cititel Express, Kuala Lumpur
i
SHORT LIST
IS INFORMATION SHEET
WS WORK SHEET
AS ASSIGNMENT SHEET
KOD KURSUS
SEMESTER
KOD MODUL
NO. LA
JENIS WIM
L03-05-21-LA1-IS
ii
INFORMATION
SHEET MODULE 1
L03-05-21 TRANSMISSION MANAGEMENT
GROUP CLUSTERING MODULE 1
2
INSTITUSI LATIHAN
JABATAN TENAGA MANUSIA
KEMENTERIAN SUMBER MANUSIA
MALAYSIA
INFORMATION SHEET
COURSE CODE
L03 DIPLOMA IN TELECOMMUNICATION TECHNOLOGY
AND NAME
MODULE CODE
L03-05-21 TRANSMISSION MANAGEMENT
AND NAME
C04.01/L4,
C04.02/L4,
CU.WA NO./
C04.03/L4,
LEVEL
C04.04/L4,
C04.05/L4
WIM/L03/12016/S05 PAGE 3
LA1 CONDUCT HIGH END EQUIPMENT INSTALLATION ACTIVITIES
• Funding source (if a Special Service Request and funding has been
Identified) Account
• Time Frame
• Work orders will be assigned a numerical number and entered into our
computer system. Work orders are assigned a priority as to completion
time:
ii. Head end technicians perform similar work to central office installers and
repairers, but work at distribution centers for cable and television companies,
called head ends.
iii. PBX installers and repairers set up and service private branch exchange
or PBX switchboards. This equipment relays incoming, outgoing, and
L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 10
interoffice telephone calls at a single location. Some systems use computers
to run Internet access, network applications, and telephone communications,
and support Voice over Internet Protocol or VoIP technology.
vi. When customers have problems, station repairers test the customer’s
lines to determine if the problem is inside or outside. If the problem is inside,
they try to repair it. If the problem is outside, they refer the problem to line
repairers.
Devices, is mandatory to use the elasticized band (around the wrist) and
the coiled cord joined connect with the ground rack during the touching
of the equipment.
• ROUTINE
• CORRECTIVE
Since the Troubleshooting procedure is carried out with the use of the
Craft Terminal, please refer, for details, to the Maintenance Section of
the Operator's Handbook.
The screw tightening torque for fixing the units (and modules, if any and
if fixed by screws) into the subrack must be:
These alarm indications are also displayed on the Fans front panel.
• unscrew the screws that ensure the Fan unit to the fans shelf
• extract the Fan unit from the Fan shelf by means the extractors kit,
using the central hole under the led
• ensure the Fan unit to the “FAN shelf“ using the relevant screw
• unscrew the screws that ensure the Fan unit to the fans shelf
• extract the Fan unit from the shelf by means the two card lever
• ensure the Fan unit to the “FAN shelf“ using the relevant screw
Site plan
Floor plans
Elevation plans
L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 16
Roof plans
Does the fault history for the link indicate a likely cause?
Tool kits.
Recommended:
SITE
EQUIPMENT TYPE
EQUIPMENT RELEASE
Slot 1
Slot 2
Slot 3
Slot 4
Slot 5
Slot 6
Slot 7
Slot 8
Slot 9
Slot 10
Slot 11
Slot 12
Slot 13
Slot 14
Slot 15
Slot 16
Slot 17
Slot 18
Slot 19
Slot 20
Slot 21
Slot 22-30
2 Mbit/s
– Multi-demultiplexing check and AIS 0 errors errors
forwarding to the ports. 0 errors errors
– EPS protection check. 0 errors errors
– Electrical ports Daisy Chain.
34/45 Mbit/s
0 errors errors
– Multi-demultiplexing check and AIS
forwarding to the ports. 0 errors errors
– EPS protection check. 0 errors errors
0 errors . errors
GETH MB/ATX 0 errors errors
– Multi-demultiplexing check and AIS
forwarding to the ports
– EPS protection chec
DVB-ASI check
– Multi-demultiplexing MPEG2 check. 0 errors errors
– EPS protection check. 0 errors errors
Add-Drop and
Crossconnect
features
–Cross- (256 x 256) STM1 equivalent ports at VC12 and VC3 levels
Connections (384 x 384) STM-1 equivalent ports at VC-4 level.
capacity
–Cross connect 1660SM has a symmetrical architecture. All traffic port (PDH
features SDH) of the same type have the same functionality and
behavior and there is no inherent split between tributaries and
aggregates. This means that it is possible the allocation of the
PDH and VCi signals into every port.
Connection of concatenated AU4-4c among STM4,STM-16,
STM-64 ports is supported
Transmission 125 μs maximum for any traffic pathway
delay
L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 23
1.9. Functionality of High End equipment
B. MATRIXE unit
Synchronization functions
C. SERVICE unit
Auxiliary channels
D. CONGI unit
i. Commissioning
Inventory
Configuration
Date/time
Site information
Radio
Advanced Radio
TDM cross-connections
Networking
Backup / restore
Monitoring
Normalized
Adaptive modulation
Monitoring
L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 26
iii. Troubleshooting
Inventory
Troubleshooting
Monitoring
iv. Maintenance
Inventory
Monitoring
Figure 1.4 : Station interconnections with MPT-HC V2/9558HC (Power Injector card)
Grounding kits
Overview
The figures 1.16 in this section describes the possible final
hardware configurations of MPR-e in Single NE with 7705 SAR.
C. Hardware installation
Power consumption
A Equipment list
34/45 Mbit/s
Radio Synthesis
Safety rules
Cable grounding
Procedure:
Remove the rear cover in order to access the sub rack Back Panel.
Remove the upper and lower guides from the sub rack access area
by unscrewing the relevant screws
Remove the two guides of the “basic area" and the two optical fibre
ducts by pulling them out.
Unscrew all the screws present on the other “side wall" in order to
complete the sub rack dis assembly.
REFERENCES:
BUKU:
L.R.Mauri-L.Fenzi, Alcatel -Lucent 1660SM Rel.5.5 (Operator’s Handbook),
Sept 2010,Ed.03, “STM-64 Multiservice Metro Node ”, K. O’Rourke-
M.Modena -G.Grassi.
INTERNET :
http://www.alcatel-lucent.com/myaccess,9500 MPR for ANSI and ETSI,
28.1.2014,11.45AM
- Check that the equipment is operating with all the shields properly
positioned (dummy covers, ESD connector protections, etc.
• unscrew the screws that ensure the Metallic filter to the shelf
• Insert and ensure the “Metallic filter" to the shelf using the relevant
screw
Dust Liter Substitution: Replace the “Dust filter" from the “FANS
Shelf" or from the “Mechanical Structure with Integrated Fans" as follow:
• unscrew the screws that ensure the dust filter to the shelf
• extract the Dust filter
• insert the new Dust filter
• ensure the “Dust filter" to the shelf using the relevant screw
Replace Fan Unit :- Procedure is carried out with the use of the Craft
Terminal
• unscrew the screws that ensure the Fan unit to the fans shelf
• extract the Fan unit from the Fan shelf by means the extractors kit,
using the central hole under the led
• insert the new Fan unit into the Fan shelf
• ensure the Fan unit to the “FAN shelf“ using the relevant screw
ii. With the “Mechanical Structure with Integrated Fans"
• unscrew the screws that ensure the Fan unit to the fans shelf
• extract the Fan unit from the shelf by means the two card lever
L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 43
• insert the new Fan unit into the Fan shelf
• ensure the Fan unit to the “FAN shelf“ using the relevant screw
– Remove the two screws (F) from the side cover plate as indicated
in Figure 2.4
– Extract from the top the contact spring (G) as indicated in Figure
2.4 (refer for info about hazardous parts dismantling).
– Extract the fibers from the cavity (H) as indicated in Figure 2.4
M L
N
N
- Remove the two screws (O) on the other side of the board that
fixes the dissipator to the Printed Circuit Board (PCB) as indicated in
Figure 2.6
P
P
P
P
Daughter Board
R
Q Q
– Remove screws (T) that fix the metal support to the mother board
U
Metal Support
a) Unscrew the top and bottom screws before extracting the units.
b) Open the levers gently as shown in the picture.
c) Slide the unit out of the sub rack.
a) Open the two levers and then line up circuit card edges in orange
plastic card guides.
b) Push on the front panel without pushing on the levers until the
front panel touches the front of the subrack. The unit connectors
are now starting to mate with the backplane connectors.
c) Close the levers in order to finish the unit/pack insertion.
3) Press the slide latch to the SFP module in order to unlock the
module.
[1] CRI - Critical alarm Synthesis of alarms relevant to the reach ability
of the NE (typical: NE isolation)
[3] MIN - Minor (Not Urgent) alarm Synthesis of alarms for which an
intervention can be deferred
Alarms surveillance
It is possible to show all the Alarms or filter the alarms report. Select
the diagnosis pull down menu. You can then select the following option from
the Alarms pull down menu:
– Object Alarms: only the alarms of the selected object are listed in
the Alarm Surveillance report
– Sub trees Alarm: only the alarms of the selected object and of the
relevant sub trees are listed in the Alarm Surveillance report
The Inside failure “Additional Text” is a field of the “AS current: more
alarm information” window as displayed in Figure 2.17.
This function improves, the diagnostic associated to the hardware
failure.
The presence of a failure on RX or Tx side for the signal incoming/outgoing
from/to the active/ standby Matrix board is detected.
• Loopback
• Protection units (in case of EPS, SNCP and MSP) are in lockout or
in forced status
The EML-USM view is the first window presented to the operator after
the login. The first view is different according to the Equipment type but the
navigation principles are the same for all. Figure 2.21 . shows an example.
Menu bar
View title
Management
Message/state area states control panel
EML-USM view contains the following fields, that provide you with
information needed to manage the NE:
• View title
• View area
• Message/state area
L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 62
The Menu bar and the View area contained in the same NE view
permits to performs all the configuration and supervision and display the
specific selected item.
The view organization is detailed in the Basic Craft Terminal Operator
Handbook to which refer for the description, except for the following
information, that differs according the NE type:
Domain alarm synthesis
The different alarm domain type in which can be subdivided the NE are:
Synchronization, External Point, Equipment, Transmission.
Information about the alarms and status is given in the Maintenance
section of this handbook.
NE management states
The elementary building blocks of any telecommunication network are
the Network Elements (NEs).Operating with the Craft Terminal the NE can
present different management states according to the condition of the
connection (supervision, local access, connection state, etc). Also general
Alarm status are presented. Management states are present at Network
Element Synthesis view level and at USM-EML view level.
The Network Element Synthesis views enable you to get access to the
current NE EML-USM view described in this handbook. The Network
Element Synthesis views enable you to work on “local" or “remote" NE,
selecting it and activating “Supervision" and “Show Equipment", as described
in the Basic Craft Terminal Operator's Handbook.
If the LAC is "Denied" that means the OS manages the NE and the CT
is not allowed to modify NE configuration (it can only “read"), the icon “LCA"
has a cyan circular shape.
The following dialogue box is opened from which you can get and/or
set the local NE time and check the NTP Status.
It displays (read only) the time of the Network Element and of the OS
(Craft Terminal).
It permits to align the NE time with the time of the Craft Terminal.
In this case, the NTP Main and NTP Spare are empty (greyed); the Set
NE Time With OS Time message is operative and the user can set manually
the NE Time (i.e. change the NE time with the Time of the Craft Terminal).
EXERCISES
4. List down five tools that required disassembling high end equipment.
6. Give five different alarm severity levels and describes the meaning of each.
REFERENCES:
1. TX300 Portable SDH/ Ethernet Test Set, 2008
2. 9500 MPR(Microwave Packet Radio), R5.0 Global Market Node (MSS-
1/MSS-4/MSS-8) Functional and Jhardware Description, Edition 1, 2008
68
GROUP CLUSTERING MODULE 2
PAGE 69
INSTITUSI LATIHAN
JABATAN TENAGA MANUSIA
KEMENTERIAN SUMBER MANUSIA
MALAYSIA
INFORMATION SHEET
COURSE CODE
L03 DIPLOMA IN TELECOMMUNICATION TECHNOLOGY
AND NAME
MODULE CODE
L03-05-22 NETWORK MANAGEMENT
AND NAME
C05.01/L4,
CU.WA NO./ C05.02/L4,
LEVEL C05.03/L4
C05.04/L4
WIM/L03/12016/S05 PAGE 70
LA1 PLAN PROVISIONING AND MONITORING ACTIVITIES
1. NETWORKING
A network can be defined as a group of computers and other devices
Binary numbers are well and good for computers but having only two
digits to work with means that your place-columns get very large very fast. As
it turns out, there is another numbering scheme that is very common when
dealing with computers: Hexadecimal. Hex means six, and recall that dec
means ten, so hexadecimal numbers are part of a Base-16 numbering
scheme.
Years ago, when computers were still a pretty new-fangled contraption,
the people designing them realized that they needed to create a standard for
storing information. Since computers can only think in binary numbers, letters,
text and other symbols have to be stored as numbers. Not only that, but they
had to make sure that the number that represented 'A' was the same number
on every computer. To facilitate this ASCII standard was born. The ASCII
Chart listed 128 letters (both upper- and lower-case), punctuation and symbols
that could be used and recognized by any computer that conformed to the
ASCII standard. It also included non-printable values that aren't displayed but
perform some other function, such as a tab placeholder (09), an audible bell
(07) or an end-of-line marker (13). The various combinations of only eight
binary digits, or bits, could be used to represent any character on the ASCII
Chart (28 = 128). (There were also other competing standards at the time,
some of which used a different number of bits and defined different charts, but
in the end ASCII became the dominant standard.)
128 characters may have seemed like a lot but it didn't take long to
notice that the ASCII Chart lacked many of the special vowels used by latin-
based languages other than English, such as ä, é, û and Æ. Also lacking were
common mathematical symbols (±, µ, °, ¼) and monetary symbols other than
In the OSI model, each layer provides services to the layer above, while
hiding from that layer the processes used to implement the services. Ideally,
changes can be made to any layer without requiring changes to any of the
other layers, as long as the inputs and outputs of the changed layer remain the
same.
For example, specifications for transmission over optical fiber cabling
can be incorporated into Layer 1 of an existing Layer 2 network technology
(e.g., Ethernet) without modifying any of the existing Layer 2 specifications.
Service access points (SAPs) are the connection points between layers.
As we can see from the above figure, presentation and session layers
are not there in TCP/IP model. Also note that the Network Access Layer in
TCP/IP model combines the functions of Datalink Layer and Physical Layer.
Layer 5. Application Layer
Application layer is the top most layer of four layer TCP/IP model.
Application layer is present on the top of the Transport layer. Application layer
defines TCP/IP application protocols and how host programs interface with
Transport layer services to use the network.
Application layer includes all the higher-level protocols like DNS (Domain
Naming System), HTTP (Hypertext Transfer Protocol), Telnet, SSH, FTP (File
Transfer Protocol), TFTP (Trivial File Transfer Protocol), SNMP (Simple
Network Management Protocol), SMTP (Simple Mail Transfer Protocol) ,
DHCP (Dynamic Host Configuration Protocol), X Windows, RDP (Remote
Desktop Protocol) etc.
Layer 4. Transport Layer
Transport Layer is the third layer of the four layer TCP/IP model. The
position of the Transport layer is between Application layer and Internet layer.
The purpose of Transport layer is to permit devices on the source and
destination hosts to carry on a conversation. Transport layer defines the level
of service and status of the connection used when transporting data.
The main protocols included at Transport layer are TCP (Transmission
Control Protocol) and UDP (User Data gram Protocol).
Layer 3. Internet Layer
Almost all protocols used in the Internet are common standards defined
by RFC (Request for Comments).
Examples of standard network protocols are TCP (Transmission Control
Protocol), UDP (User Datagram Protocol), IP (Internet Protocol), ARP
(Address Resolution Protocol), HTTP (Hypertext Transfer Protocol), FTP (File
Transfer Protocol), TFTP (Trivial File Transfer Protocol), SMTP (Simple Mail
Transfer Protocol), SSH (Secure Shell), Telnet etc.
Devices participating in network communication should know about the
common network protocol and communicate according to the way, defined by
the network protocol. In other words, standard network protocol software must
be running on both devices participating in network communication.
To explain it more clearly, if you are using your browser to browse web
pages from a web server (example, www.omnisecu.com), you are using a
protocol called HTTP (Hypertext Transfer Protocol). Your computer must
request web pages from web server using HTTP and the web server must
response back to your computer using HTTP.
How HTTP (Hypertext Transfer Protocol) should work is defined as a
common standard, RFC (Request for Comments) 2616. Anyone can follow the
common standard and create their own Browser or Web server.
Two terms are often used in networking industry, when describing
network protocols.
1) Proprietary Protocol 2) Standard Protocol
Proprietary protocols are usually developed by a single company for the
devices (or Operating System) which they manufacture. Apple talk is a
proprietary protocol developed by Apple Inc. Apple talk protocol may work well
L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 79
in network environments consisting only Apple devices. But other vendors may
not support Apple talk protocol. Proprietary protocols will not scale well in
network environments consisting of multi-vendor equipments.
Standard protocols are agreed and accepted by whole industry.
Standard protocols are not vendor specific. Standard protocols are often
developed by collaborative effort of experts from different organizations.
Examples of standard protocols are IP, TCP, UDP etc. A RFC (Request
for Comments) is an IETF platform to develop Standard Protocols. A RFC
(Request for Comments) is a pure technical document published by the
Internet Engineering Task Force (IETF). Request for Comments (RFCs) are
mainly used to develop a "standard" network protocol, a function of a network
protocol or any feature which is related with network communication.
In a ring topology, all computers are connected via a cable that loops in
a ring or circle. A ring topology is a circle that has no start and no end and
terminators are not necessary in a ring topology. Signals travel in one direction
on a ring while they pass from one computer to the next, with each computer
regenerating the signal so that it may travel the distance required.
The main advantage of Ring topology is that the signal degeneration is
low since each workstation participating in the network is responsible for
regenerating the weak signal. The disadvantage of ring topology is, if one
workstation fails, the entire network will fail
Since analog modems are built into most new computers, they represent
the most convenient method of connecting to the Internet for the first time and
are very familiar to most computer users. “Modems”(a modulator/demodulator)
convert analog data transmitted over phone lines into digital data that
computers can read (demodulation) and also convert digital data into analog
data so it can be transmitted (modulation) Because they use regular analog
phone lines, these are called analog modems to distinguish them from other
sorts of modems.
Speed: the common speeds were 14.4 kilobits per second (Kbps), 28.8
Kbps and 33.6Kbps, and currently the fastest speed is 56 Kbps, which is built
into almost every computer. Individuals and small businesses that find they
surfing the web with increasing frequency often regard these low-speed
modems as an inconvenience. There is an important thing to remember
regarding the speed-not just of analog modems-. Even if one has a fast
modem, this doesn’t mean that one is able to connect at the fastest possible
speed. For example, 56 Kbps modems are represented as being capable of
transmission up to 56 Kbps. In fact, due to quality problems with most
conventional phone lines, maximum connection speeds of 40 kbps to 48 kbps
are far more typical. The actual connection speed varies depending on the
amount of static on the telephone line as well as the amount of traffic caused
by Internet and telephone users traveling the networks.
ISDN uses fully digital signals over copper phone wire, a standard
telephone line. This means there is no conversion from digital to analog and
back again in the manner that an analog modem works. Most ISDN lines
offered by telephone companies give users two lines at once, called B
channels. The users can use one line for voice and the other for data, or they
can use both lines for data to give them data rates of 128 Kbps. Another
version, called B-ISDN, is able to support transmission rates of 1.5 Mbps. B-
ISDN requires fiber optic cables and is not widely available.
Speed: At the time it was introduced (a decade ago), ISDN offered very
significant speed advantage over regular modems, which were then limited to
14.4 Kbps or slower. Most of the other broadband connections did not exist at
Installation is easy
Flexible
Cheap
This cable has a metal foil or braided-mesh covering which encases each
pair of insulated conductors. Electromagnetic noise penetration is prevented
by metal casing. Shielding also eliminates crosstalk (explained in KEY TERMS
Chapter).
It has same attenuation as unshielded twisted pair. It is faster the
unshielded and coaxial cable. It is more expensive than coaxial and
unshielded twisted pair.
Easy to install
Performance is adequate
Eliminates crosstalk
Disadvantages :
Difficult to manufacture
Heavy points
Coaxial is called by this name because it contains two conductors that are
parallel to each other. Copper is used in this as centre conductor which can be
a solid wire or a standard one. It is surrounded by PVC installation, a sheath
which is encased in an outer conductor of metal foil, barid or both.
Outer metallic wrapping is used as a shield against noise and as the
second conductor which completes the circuit. The outer conductor is also
encased in an insulating sheath. The outermost part is the plastic cover which
protects the whole cable. Connector type used are bnc and F connector.
Here the most common coaxial standards.
This is a 50 ohm (Ω) coaxial cable which is used for digital transmission.
It is mostly used for LAN’s. Baseband transmits a single signal at a time with
very high speed. The major drawback is that it needs amplification after every
1000 feet.
BroadBand
Bandwidth is high
All cables are comprised of layers of protection for the fibers. Most all start
with standard fiber with a primary buffer coating (250 microns) and add:
Tight buffer coating (tight buffer cables like simplex, zipcord, distribution
and breakout types): A soft protective coating applied directly to the 250
micron coated fiber to provide additional protection for the fiber, allowing
easier handling, even direct termination on the fiber.
Loose Tubes (loose tube cables): Small, thin plastic tubes containing as
many as a dozen 250 micron buffered fibers used to protect fibers in cables
rated for outside plant use. They allow the fibers to be isolated from high
pulling tension and can be filled with water-blocking materials to prevent
moisture entry.
Strength members and stiffeners: Usually aramid yarn, the same used in
bulletproof vests, often called by the duPont trade name Kevlar, which absorbs
the tension needed to pull the cable and provides cushioning for the fibers.
Aramid fibers are used not only because they are strong, but they do not
stretch. If pulled hard, they will not stretch but eventually break when tension
exceeds their limits. This ensures that the strength members will not stretch
and then relax, binding the fibers in the cable. The proper method of pulling
fiber optic cables is always to attach the pull rope, wire or tape to the strength
members.
Jacket: The outermost layer of protection for the fibers that is chosen to
withstand the environment in which the cable is installed. Outside cables will
generally be black polyethelene (PE) which resists moisture and sunlight
exposure. Indoor cables use flame-retardant jackets that can be color-coded
to identify the fibers inside the cable. Some outdoor cables may have double
jackets with a metallic armor between them to protect from chewing by rodents
or kevlar for strength to allow pulling by the jackets. Indoor-outdoor cables
have a PE outer jacket that can be removed to expose a flame-retardant inner
jacket for use within buildings.
Cable Types
Tight buffer cables (Simplex, Zipcord, Distribution and Breakout) are used
where cable flexibility and ease of termination are important, more so than
ruggedness and pulling strength which characterize loose tube and ribbon
types of cable. Generally, tight buffer cables are used indoors and loose
tube/ribbon cables outdoors.
These types are used mostly for patch cord and backplane applications, but
zipcord can also be used for desktop connections. Simplex cables are one
fiber, tight-buffered (coated with a 900 micron buffer over the primary buffer
coating) with Kevlar (aramid fiber) strength members and jacketed for indoor
use. The jacket is usually 3mm (1/8 in.) diameter. Zipcord is simply two of
these joined with a thin web.
L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 96
Distribution cables
Distribution cable is the most popular indoor cable, as it is small in size and
light in weight. They contain several tight-buffered fibers bundled under the
same jacket with Kevlar strength members and sometimes fiberglass rod
reinforcement to stiffen the cable and prevent kinking. These cables are small
in size, and used for short, dry conduit runs, riser and plenum applications.
The fibers are double buffered and can be directly terminated, but because
their fibers are not individually reinforced, these cables need to be broken out
with a "breakout box" or terminated inside a patch panel or junction box to
protect individual fibers.
Breakout cables
Loose tube cables are the most widely used cables for outside plant trunks
because it offers the best protection for the fibers under high pulling tensions
and can be easily protected from moisture with water-blocking gel or
tapes.These cables are composed of several fibers together inside a small
plastic tube, which are in turn wound around a central strength member,
surrounded by aramid strength members and jacketed, providing a small, high
fiber count cable. This type of cable is ideal for outside plant trunking
applications, as it can be made with the loose tubes filled with gel or water
absorbent powder to prevent harm to the fibers from water. It can be used in
conduits, strung overhead or buried directly into the ground. Some outdoor
cables may have double jackets with a metallic armor between them to protect
Ribbon Cable
Ribbon cable is preferred where high fiber counts and small diameter cables
are needed.This cable has the most fibers in the smallest cable, since all the
fibers are laid out in rows in ribbons, typically of 12 fibers, and the ribbons are
laid on top of each other. Not only is this the smallest cable for the most
number of fibers, it's usually the lowest cost. Typically 144 fibers only has a
cross section of about 1/4 inch or 6 mm and the jacket is only 13 mm or 1/2
inch diameter! Some cable designs use a "slotted core" with up to 6 of these
144 fiber ribbon assemblies for 864 fibers in one cable! Since it's outside plant
cable, it's gel-filled for water blocking or dry water-blocked. Another advantage
of ribbon cable is Mass Fusion Splicers can join a ribbon (12 fibers) at once,
making installation fast and easy. Ribbon pigtails are spliced onto the cable for
quick termination.
Armored Cable
Aerial cables are for outside installation on poles. They can be lashed to a
messenger or another cable (common in CATV) or have metal or aramid
strength members to make them self supporting. The cable shown has a steel
messenger for support. It must be grounded properly.
A widely used aerial cable is optical power ground wire (OPGW) which is a
high voltage distribution cable with fiber in the center. The fiber is not affected
by the electrical fields and the utility installing it gets fibers for grid
management and communications. This cable is usually installed on the top of
high voltage towers but brought to ground level for splicing or termination.
Network Cables
Most network cable testers can test two basic types of cable: coaxial and
twisted pair.. Coaxial cable, the kind used for cable TV, uses a single shielded
conductor that runs down the center of the cable. Twisted pair relies on
multiple pairs of wire wrapped together. Both kinds of twisted pair use similar
connectors, but the one for an is larger than that for telephone. Coaxial cable
L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 99
normally uses the same kind of barrel connectors found in cable TV
installations
Never connect a cable tester to a live circuit. Always remove the cable
from both the computer and router or modem before connecting the tester.
The majority of testers consist of two main components: the tester itself and
the remote. Most testers have either two or three connectors: RJ-45 for
Ethernet, RJ-11 for telephone cable, and BNC for coaxial cable.. The smaller
remote has two connectors, one each for RJ-11 and RJ-45. If the network
cable tester supports coaxial cable networking, it comes with a terminator..
Users simply plug the network cable into the appropriate port on the cable
tester itself, and then connect the remote to the other end of the cable.
The standard network cable tester has a row of 10 LEDs on the body and 9
LEDs on the remote to match up with the standard connector pinouts. The
tester sends a signal down each pair in turn, lighting the LEDs up. The order in
which they either light or do not light indicates the cable type and whether or
not it is working.
When striping back the jacket make sure that the depth of your stripper is set
deep enough to cut the jacket but not so deep that it nicks the conductors. If
you do nick the conductors while stripping the cable, the cable may work fine
Step 2: Now that we have the jacket stripped back we'll want to separate and
straighten the pairs. We'll start by pulling the first pair and the last pair to their
respective sides (Orange to the left and Brown to the right). Untwist these
pairs making sure not to untwist the cable any further than you've stripped
back the jacket. Now we'll split the green pair. Pull the white/green conductor
to the left and the green conductor to the right. This leaves you with the blue
pair in the middle. Untwist the blue taking care to ensure that the white/blue
conductor is on the left and the blue conductor on the right.
Step 3: Now that we've separated and straightened the pairs we need to
arrange the conductors in the proper order according to which wiring standard
you are using. For this example we will be wiring via the 568-B standard (most
common in patch cables). Please consult the pin-out for the proper color
codes. After you have the wires arranged, place them tightly together as show
Step 4: Now we need to trim the conductors down to fit into the RJ45
connector. While trimming, make sure you make a nice clean cut at a 90
degree angle about 1/2 of an inch from the end of the jacket. If you fail to
make a straight cut, some of the conductors may not reach the connector
contacts. If you cut the conductors too short, again they will not make contact.
If you leave the conductors too long, when crimping the connector, the
jacketing will not be gripped leaving the strain on the conductors. This is not a
good situation! For proper trimming, hold the wires securely just at the end of
the jacket as shown in the picture to the left. Be sure to keep the conductors in
the proper order.
Step 5: Our Cat5e patch cable is almost done. While still holding the cable
firmly, we now need to place the conductors into their proper location in the
RJ45 Cat5e Modular Connector. Hold the RJ45 modular plug with the
contacts facing up (towards you) and carefully insert the conductors in their
Figure 1.16: UTP Cable inserted to RJ45 for Cat5e and Cat6 connector
Step 6: Carefully insert the assembly which you have just completed into a
modular crimping tool, taking care to verify the conductors stay fully inserted.
When crimping the connector, use the full stroke of the crimp tool so that the
contacts properly "bite" into the conductors. After you have completed the
crimp, take time to look at the connector and make sure all the pins were
crimped and that they made good contact with the conductors.
Step 7: That's it! Use a tester to test for continuity and your diy Cat 5, 5e
patch cable is complete.
a. Data encapsulation
The network interface adapter and its driver are responsible for building
the frame around the data generated by the network layer protocol, in
preparation for transmission. The network interface adapter also reads the
contents of incoming frames and passes the data to the appropriate network
layer protocol.
d. Data buffering
g. HUB
Networks using a Star topology require a central point for the devices to
connect. Originally this device was called a concentrator since it consolidated
the cable runs from all network devices. The basic form of concentrator is the
hub. the hub is a hardware device that contains multiple, independent ports
that match the cable type of the network. Most common hubs interconnect
Category 3 or 5 twisted-pair cable with RJ-45 ends, although Coax BNC and
Fiber Optic BNC hubs also exist. The hub is considered the least common
denominator in device concentrators. Hubs offer an inexpensive option for
transporting data between devices, but hubs don't offer any form of
intelligence. Hubs can be active or passive.
h. SWITCHES
i. BRIDGE
j. Routers
Time and cost savings - by reducing the time and expense of having
electrical power cabling installed. Network cables do not require a qualified
electrician to fit them, and can be located anywhere.
POE has many applications, but the three key areas are:
VoIP phones - the original POE application. Using POE means phones
have a single connection to a wall socket, and can be remotely powered
down, just like with the older analog systems.
Wireless - Wifi and Bluetooth APs and RFID readers are commonly
PoE-compatible, to allow remote location away from AC outlets, and
relocation following site surveys.
Bridge and switch work at layer 2 ( Data Link Layer). Bridge and switch
both are capable to read frames. Switching is a method of dealing with
frames. Switching is described in Layer 2 of OSI model. Switch is the
upgraded version of bridge. Bridge was the earlier implementation that has
been replaced by the switch.
1.6.2. Bandwidth
Bandwidth is the data ( in data unit such as kb, mb, gb etc) transferred
through the media in particular time unit ( such as second, minute, hour ). It is
a measurement of bit-rate of available or consumed data communication
resources expressed in bits per second or multiples of it.
1.6.3. Collision
In LAN network multiple devices can share the same segment that
create the collision. Collision is the effect of two devices sending
transmissions simultaneously in Ethernet. When they meet on the physical
media, the frames from each device collide and damaged.
Collision domain
Group of devices that share same collision effects over the Ethernet
network.
1.6.4. CSMA/CD
It is mechanism of removing collision from network. When two or more
nodes simultaneously sense the wire and found no frame, and each device
places its frame on the wire. These frame would be collide in wire and a
collision will occur. NIC (Network Interface Card) actually examine wire
before placing any frame on it, this collision detection method is known as
CSMA/CD.
1.7. IP Addressing
But you have two physical interfaces on your router that connect to
switches with 5 VLANs. Classless routing allows me to break up this IP
address into more useful segments.
Switch 1 Switch 2
Still have spare room in the 172.16.0.0/16 for lots more sub-nets. If we
want to create another group, do the binary math, next available sub-nets are
172.16.24.0 255.255.248.0. If #no auto-summary command on routing
protocol. We can place the new 172.16.x.x sub-nets anywhere in my
network.
1.7.3. IP v4 vs IPv6
IPv6 is the sixth revision to the Internet Protocol and the successor to
IPv4. It functions similarly to IPv4 in that it provides the unique, numerical IP
addresses necessary for Internet-enabled devices to communicate. However,
it does sport one major difference: it utilizes 128-bit addresses. As previously
stated, IPv6 utilizes 128-bit Internet addresses. Therefore, it can support
2^128 Internet addresses—
340,282,366,920,938,000,000,000,000,000,000,000,000 of them to be exact.
That's a lot of addresses, so many that it requires a hexadecimal system to
display the addresses. In other words, there are more than enough IPv6
addresses to keep the Internet operational for a very, very long time. Most
operating systems actually support IPv6, including Mac OS X 10.2 and
L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 116
Windows XP SP 1. However, many routers and servers don't support it,
making a connection between a device with an IPv6 address to a router or
server that only supports IPv4 impossible. IPv6 is also still in its infancy; it
has a lot of bugs and security issues that still need to be fixed, which could
result in one giant mess.
The figure divides the IPv4 address into two parts, network part and
network host, which are described in the next context.
50.56 Host part of the IPv4 address. The host part uniquely identifies
an interface on a system on a network. Note that for each interface on a local
network, the network part of the address is the same, but the host part must
be different.
If you receive TCP/IP errors in the Event Viewer system log, resolve
each error received as indicated by the error message. For example, if you
receive an error stating that the IP address parameter is incorrect, you should
verify that your IP address is valid.
If there are no errors in the Event Viewer system log, follow these steps
to make sure that the correct TCP/IP configuration information is being used:
ping 127.0.0.1
ii. Click TCP/IP Protocol to select it, click Remove, and then click yes.
iii. Click Close, and then click Yes to restart the computer.
vi. Click Add, click TCP/IP Protocol to select it, and then click OK.
viii. When prompted, type the path for the Windows NT source files,
click Continue, and then click Close.
If you are not using DHCP, you are prompted for your TCP/IP
configuration information. Provide the appropriate values, and then click OK.
If you are not sure what the appropriate values are, contact your network
administrator.
Click No when you are prompted to restart your computer. If you have
installed a Windows NT Service Pack, you need to re-install the Service Pack
before you restart your computer.
If you can ping the loop back address successfully, attempt to ping your
own IP address by typing ping <IP address> at a command prompt, where
<IP address> is your computer's IP address.
NOTE: If you do not know your computer's IP address, you can obtain
that information by typing ipconfig at a command prompt.
ii. Click your network adapter driver to select it, click Remove, and
then click Yes.
iii. Click Close, and then click Yes to restart your computer.
vi. Click Add, click your network adapter driver to select it, and then
click OK.
vii. Use the dialog box(es) provided to configure your network adapter,
and then click OK.
viii. When prompted, type the path for the Windows NT source files,
click Continue, and then click Close.
Click No when you are prompted to restart your computer. If you have
installed a Windows NT Service Pack, you need to re-install the Service Pack
before you restart your computer.
To remove any incorrect entries in the ARP cache, clear all entries
using the following command:
For more information on the syntax, options, and usage of the ARP
command, type arp -? at a command prompt.
When you have verified that you have the correct IP address for your
default gateway, use the PING command to verify that you can ping your
default gateway's IP address. You should receive a response similar to the
following:
Try to ping the IP address of the other computer. To do so, type ping
<IP address> where <IP address> is the IP address of the other computer.
You should receive a response similar to the following:
Active Routes:
Verify with your network administrator that all persistent entries in your
computer's route table are valid.
2 50 ms 50 ms 51 ms <###.###.###.###>
3 250 ms 80 ms 50 ms <###.###.###.###>
Trace complete.
If there is a problem with one of the routers that the network packet
tries to cross, you may receive a response similar to the following:
2 50 ms 50 ms 51 ms <###.###.###.###>
You may also receive a response similar to the one above when there
is a proxy or a firewall between your computer and the other computer.
If you are not able to obtain a successful response using the TRACERT
command to trace the route between your computer and the other computer,
Verify that the appropriate server services are running on the other
computer. For example, if you are attempting to use the Telnet tool to
connect to the other computer, make sure that the other computer is
configured as a Telnet server.
Port settings for services on the other computer may be different than
the port settings you are using to connect. The following chart lists some
standard port settings for various protocols:
Port: Protocol:
----- ---------
80 HTTP
21 FTP
23 Telnet
70 Gopher
If you are able to connect to the other computer using its IP address,
but you are not able to connect to the other computer using its host or
NetBIOS name, there may be a name resolution problem. There are many
methods that can be used to accomplish name resolution on a network
including the following:
i. HOSTS files
The HOSTS file is a text file that you can edit with any text editor (such
as Notepad). If your network uses HOSTS files for host name resolution and
you cannot connect to the other computer using its host name, there may be
an invalid entry in your HOSTS file. Search your HOSTS file for the host
name of the other computer, verify that there is only one entry per host name,
and then verify that the entry for the host name of the other computer is valid.
For more information on the HOSTS file, see the sample HOSTS file in
the %SystemRoot%\System32\Drivers\Etc folder.
ii. Verify that you can communicate with your DNS server by pinging
your DNS server's IP address. You should see a reply similar to
the following:
iv. If you can ping the IP address of your DNS server, but cannot
resolve the host name of the other computer, your DNS server may
not be resolving host names properly. If more than one DNS server
is available on your network, configure your computer to use a
different DNS server. If another DNS server resolves the host
name of the other computer properly or if there is no other DNS
server to use, contact your network administrator to correct the
problem with the original DNS server.
v. When you have verified the correct IP address for your DNS
server, update your computer's TCP/IP settings. If you are using a
dial-up connection to connect to your network, you need to change
only the TCP/IP settings in your Dial-Up Networking phone book
entry with the correct IP address for your DNS server.
ii. Click TCP/IP Protocol to select it, click Properties, and then click
the DNS tab.
iii. If you are adding a DNS server, click Add. If you are editing an
existing server, click the IP address for the appropriate DNS
server, and then click Edit.
iv. Type the correct IP address for the DNS server, and then click OK.
v. Click OK, and then click OK again. You may need to restart your
computer after this step.
vi. To change or add a valid IP address for your DNS server for a
Dial-Up Networking phone book entry, follow these steps:
viii. Click more, and then click Edit Entry and Modem Properties.
ix. Click the Server tab, and then click the TCP/IP Settings button.
x. Click Specify Name Server Addresses, and then type the correct IP
address in the Primary DNS box.
The LMHOSTS file is a text file that you can edit with any text editor
(such as Notepad). If your network uses LMHOSTS files for NetBIOS name
resolution and you cannot connect to the other computer using its NetBIOS
name, there may be an invalid entry in your LMHOSTS file. Search your
LMHOSTS file for the NetBIOS name of the other computer, verify that there
is only one entry per NetBIOS name, and then verify that the entry for the
NetBIOS name of the other computer is correct.
ii. Verify that you can communicate with your WINS server by pinging
your WINS server's IP address. You should see a reply similar to
the following:
If you cannot ping the IP address of your WINS server, contact your
network administrator to verify that you have the correct IP address for your
WINS server and that your WINS server is connected to the network and
functioning properly.
If you can ping the IP address of your WINS server, but cannot resolve
the NetBIOS name of the other computer, your WINS server may not be
resolving NetBIOS names properly. If more than one WINS server is
available on your network, configure your computer to use a different WINS
server. If another WINS server resolves the NetBIOS name of the other
computer properly or if there is no other WINS server to use, contact your
network administrator to correct the problem with the original WINS server.
When you have verified the correct IP address for your WINS server,
update your computer's TCP/IP settings. If you are using a dial-up
connection to connect to your network, you need to change only the TCP/IP
settings in your Dial-Up Networking phone book entry with the correct IP
address for your WINS server.
ii. Click TCP/IP Protocol to select it, click Properties, and then click
the WINS Address tab.
iii. Type the correct WINS server IP address in the Primary WINS
Server box, and then click OK.
iv. Click Close, and then click Yes to restart your computer.
To change or add a valid IP address for your WINS server for a Dial-Up
Networking phonebook entry, follow these steps:
ii. Click more, and then click Edit Entry and Modem Properties.
iii. Click the Server tab, and then click the TCP/IP Settings button.
iv. Click Specify Name Server Addresses, and then type the correct IP
address in the Primary WINS box.
Standard:
i. Boundary Protection:
iii. Access:
iv. Transport:
v. Management:
vi. Recommended:
vii. Definitions:
viii. Responsibilities:
Maintain a daily log book with recorded maintenance activity. The log
book is extremely useful for diagnosing problems. The log book should
describe the activity, indicate who performed it, and when it was performed.
Include the following activities:
installations
upgrades
c. hardware replacement
e. problem investigation
Rate
Although every network has its own unique features, many common
elements are candidates for documentation. These include:
a. Network topology
This is usually done in the form of a diagram that shows the major
network nodes, such as routers, switches, firewalls, and servers, and how
they are all interconnected. Normally, printers and workstations are not
included.
b. Server information
This is all of the information on servers that you will need to manage or
administer them, such as name, functions, IP address, disk configuration, OS
and service pack, date and place of purchase, warranty, and so forth.
Network services, such as DNS, WINS, DHCP, and RAS, are critical to
the operation of the network. You should describe in detail how they are
structured. Although it would be possible to derive that information by
inspecting the servers, the point is to save that time by having it documented
in an easy-to-decipher format.
You can restrict the capabilities of network users with the Policy Editor
in Windows NT or with Group Policies in Windows 2000. You can also create
roaming profiles that are stored on a server rather than on local machines.
This kind of configuration, if used, should be documented.
f. Mission-critical applications
g. Procedures
Conclusion
1.10.3.Maintenance Report
Since the Organization may possess information systems and tools
purchased from different vendors in a long time period, an efficient record
keeping of the systems in hand is essential for maintenance management;
hence performing a hardware, software and telecommunications inventory is
the first step of an efficient maintenance program. Appropriate maintenance
of the records and transaction monitoring result to keeping the information
up-to-date, which in turn allows statistical data extraction to be used as input
to further consideration about system maintainability, sustainability and
related costs. For record keeping, simple techniques like spreadsheets and
custom databases may be used;
EXERCISES
3 What is the difference between unshielded and shielded twisted Pair cable?
RUJUKAN:
BUKU:
Patrick Reagen, Local Area Network, Prentice Hall, 2004
INTERNET :