Professional Documents
Culture Documents
TIA/EIA-568B
Structured cabling divides
the entire infrastructure
into manageable blocks
and then attempts to
integrate these blocks to
produce high-
performance networks.
TIA/EIA
- This standards address commercial building
cabling for telecom products and services.
- TIA (Telecommunications Industry Association)
- EIA (Electronics Industry Alliance)
ADVANTAGES
• Consistency – has same cabling systems for data, voice and
video.
• Support for multi-vendor equipment – it will support
applications and hardware even with mix and match
vendors.
• Simplify moves/adds/changes
• Simplify troubleshooting – if problems are likely to down
the entire network, it is easier to isolate and fix.
ADVANTAGES
• Support for future applications – it supports
multimedia, video conferencing etc with little
or no upgrade pain.
• Fault isolation – dividing the entire
infrastructure into simple manageable blocks.
• Helps reduce maintenance costs.
SAMPLE PICTURES
UNSTRUCTURED CABLING
Networking
The first step is to establish the aims of network
implementation:
• Implementation of administrative and financial
database
• Staff access to company records
• Automation of letter, report or specification writing
• E-mail for staff
• Staff scheduling
• General Information automation
(including library, plans, graphics
and images)
• Learning or training aids
(interactive software)
• Computer skills training rooms
(word proessing, publishing,
CADD, spreadsheets, databases)
• Printer sharing
• File transfer
• Internet access (graphical, text,
news)
• Access to centralized information
sources (e.g. CD-ROM stacks)
• Automate software updates
• Centralize application software
Choice of Software and Hardware
• Identify which software
applications the network
operating system and hardware
must support.
• Exclude software or machines
that will be discarded for other
reasons from further networking
considerations.
After answering the following questions, it
should be possible to identify which PC’s will
initially be networked, and what existing
“legacy” networks should be supported and
grafted to the new network.
a) Which software packages are
proposed to implement the target
applications?
b) What hardware platform (type, size
and speed of PC) will be required
to run the software?
c) Can existing computers be used, or
will they require replacement?
d) Can existing computers be upgraded (higher speed
CPU, add DOS card to Mac, etc)?
e) If existing computers require replacement, should they
be redeployed to less demanding tasks?
f) To what extent will expenditure on replacement PC’s
and software reduce the available budget for
networking?
OVERVIEW IN NETWORKING
NETWORK
– it is a series of computers that can
communicate with one another by virtue of
their interconnectivity.
OVERVIEW IN NETWORKING
TOPOLOGY
– it is the shape or the design layout of a
network.
Mesh All devices are Extremely reliable (virtually Uses the most cabling to implement.
connected to all other no down time). Has a high administrative overhead, making
devices in the network. Data has access to fastest it impractical.
paths and can load balance.
• Passive hubs – a conduit that receives a signal and split it out all ports.
• Active hubs – retransmits and regenerates the signal out through all
ports, and requires a power source. They have troubleshooting tools in
the form of link lights, error lights, and collision lights.
Repeater – a device that receives a signal from one port,
copies it, and regenerates the signal to send out its other
port.
• BRIDGES
A bridge is a device used to connect LAN segments and
forward data packets based on the MAC address in the frame
header. Bridges can connect networks that use different
types of media.
• SWITCHES
Just as a hub is considered a multiport repeater,
a switch is basically a multiport bridge. The
switch creates a temporary switched or
dedicated path between the port where the
frame (data) originated and the port containing
the destination.
• ROUTERS
A routers connects multiple LANs together, similar
to bridges and switches. The difference is that while
bridges and switches filter data based on the
physical addresses, routers filter data based on
logical addresses (including the network segment
address). Routers are designed to connect different
types of media, topologies, and even networks using
different media access methods (as long as the
networks share a common networking protocol).
• GATEWAYS
Gateways connect networks using different topologies and
entirely distinct network protocols. You will see gateways in
networks that use mainframes and minicomputers.
802.2 The Logical Link Control (LLC) protocol specification used by the other 802
standards
802.6 Metropolitan area network based on bidirectional fiber optic bus topology
Fiber Optics
• Developed in the mid-1980s by the American National standards Institute
(ANSI), FDDI (fiddey) has both a physical and logical ring topology. It uses
a dual ring topology in which nodes are connected to each of the two
rings.. This topology also uses token passing for media access. One ring is
considered primary and is used for all data transmission. The second ring
is used for backup in case one of the brittle fiber optic cables breaks.
Benefits:
• Immunity to electromagnetic and radio-frequency interference
• Long-distance capabilities
• Large capacity for data throughput
• Resistance to traditional wiretap methods
Types of Cables and Connecting a Network
Devices
Straight-Through Cable - Four-pair, eight-wire,
straight-through cable, which means that the
color of wire on Pin 1 on one end of the cable is
the same as that of Pin 1 on the other end. Pin 2
is the same as Pin 2, and so on. The cable is
wired to either EIA/TIA T568B or T568A
standards for 10BASE-T Ethernet, which
determines what color wire is on each pin.
Crossover Cable - A crossover cable means that the
second and third pairs on one end of the cable will be
reversed on the other end. The pin-outs are T568A on
one end and T568B on the other end. All 8 conductors
(wires) should be terminated with RJ-45 modular
connectors. Crossover cable conforms to the structured
cabling standards. If the crossover cable is used between
switches, it's considered to be part of the "vertical"
cabling. Vertical cabling is also called backbone cabling. A
crossover cable can be used as a backbone cable to
connect two or more switches in a LAN, or to connect two
isolated hosts to create a mini-LAN. This will allow the
connection of two hosts or a server and a host without
the need for a hub between them.
Rollover Cable - A 4-pair "rollover" cable. This type of
cable is typically 3.05 m long but can be as long as 7.62 m.
A rollover cable can be used to connect a host or dumb
terminal to the console port on the back of a router or
switch. Both ends of the cable have RJ-45 connectors on
them. One end plugs directly into the RJ-45 console
management port on the back of the router or switch. Plug
the other end into an RJ-45-to-DB9 terminal adapter. This
adapter converts the RJ-45 to a 9-pin female D connector
for attachment to the PC or dumb terminal serial (COM)
port. A DB25 terminal adapter is also available to connect
with a PC or dumb terminal. This adapter uses a 25 pin
connector. Figure 18 shows a rollover console cable kit.
CONNECTING A NETWORK DEVICES
Fiber Optics
An optical transmission system has three key components:
the light source, the transmission medium, and the detector.
Conventionally, a pulse of light indicates a 1 bit and the
absence of light indicates a 0 bit. The transmission medium
is an ultra-thin fiber of glass or plastic. The detector
generates an electrical pulse when light falls on it. By
attaching a light source to one end of an optical fiber and a
detector to the other, we have a unidirectional data
transmission system that accepts an electrical signal,
converts and transmits it by light pulses, and then
reconverts the output to an electrical signal at the receiving
end.
Optical fiber links are used in all types of
networks, LAN and WAN. The frequency range
of fiber optics is approximately 180 THz to 330
THz.
There are two types of fiber optics cables:
• Multimode fiber
• Single-mode fiber
Warming: The laser light used with single-mode
has a longer wavelength than can be seen. The
laser can seriously damage eyes. Do not look at
the near end of a fiber that is connected to a
device at the far end. Do not look into the
transmit port on a NIC, switch, or router.
Remember to keep protective covers over the
ends of fiber and inserted into the fiber-optic
ports of switches and routers. Be very careful!
Client/Server Networks
• In client/server networks, workstations rely on
data and services from one or more
centralized servers. These servers can control
various systems including applications,
printing, communication, and administration.
What are client?
• Clients are PCs or workstations on which users
run applications. Clients rely on servers for
resources, such as files, devices, and even
processing power.
What are servers?
• Servers are powerful computers that manage
disk drives, printer services, network traffic,
and other network resources.
Advantages of Client/Server Networks
• Centralization. Centralization allows easier and more efficient
management. This is especially true in reference to file
storage. In a centralized file-management environment, you
control file and directory names, locations, sizes, and so on.
The drawback to this, of course, is that you’re responsible for
organization.
• Security. Most client/server environments have discretionary
access control, which allows you to incisively grant or deny
access to files, directories, and resources based on user, host,
time, or date.
• Logging. Finally, client/server networks typically have
excellent logging facilities, allowing you to debug your
network sessions.
Disadvantages of Client/Server
Networks
• Centralization. While centralized resources and
management are definite advantages, if your servers
go down, so does your productivity. Clients rely on
the server for data. In most cases, if the server dies,
your clients die with it. For this reason, you should
always have several, full-featured workstations on
hand.
• Complexity. Client/server networks are more difficult
to configure and administer. This can add to your cost
(for example, you may have to train your staff).
• Expense. Server operating systems, software, and
hardware are more expensive than their peer-to-
peer counterparts.
Types of server
• Application servers
• Communications servers
• Directory services servers
• Fax servers
• File servers
• Internet servers
• Mail servers
• Print server
Types of server
• Application Servers
• Application servers house applications such as
ledgers, databases, and office-oriented programs. In
an application server-based network, clients rarely
store information locally. Instead, clients make
inquiries and send updates to the servers.
• The principal advantage of application servers is
centralized management of data. Also, application
servers obviate the need to install full-blown
applications on client workstations. This saves space
and money.
Types of server
• Communications Servers
• Communications servers control traffic
between LANs, WANs, mainframes, the
Internet, and other communication
transmission media. Typically, communications
servers functions as entrances or gateways
into private networks, using a wide range of
networking devices (for example, modems,
routers, or dedicated lines).
Types of server
• Directory Services Server
• Directory services server contain indexes of
users, nodes, and network servers. Their chief
function is to enable easy administration of
large networks. Often, directory service
servers provide an index of absolutely
everything on the network.
Types of server
• Fax Servers
• Fax servers manage network fax traffic
through one or more fax/modem cards. Users
request faxes that have been sent or received
with software on their client or workstation. In
turn, the server reports (and can deliver)
those faxes to the user.
Types of server
• File Servers
• File servers centralize data storage. The server
stores files, and the client requests them.
Commonly used for development in software
design, file servers are excellent for use in
collaborative work environments.
Types of server
• Internet Servers
• Internet servers manage Internet or intranet
traffic. They allow you to create and publish
Web pages, sell products over the World Wide
Web, and gather contacts and feedback.
THE OSI MODEL
Session
Layer 5
Data-link
Layer 2 The bottom two layers provide the
Lower physical and logical topology and
layers enable the movement of data
Physical
across a single network segment
Layer 1
• The Physical Layer
Note that one protocol may encompass more than one layer.
• The Data Link Layer
• The data link layer is the only layer with two (2)
sub-layers: Media Access Control (MAC) and
Logical Link Control (LLC). Layer 2 supplies
hardware addresses, identifies errors, and
manages flow control.
• Token passing – the second most common type, it is used on both token
ring and FDDI.
Examples: TCP/IP
• Transport Layer
• The transport layer provides for a transparent transfer of data between the sender
and receiver nodes. The control information in the transport-layer header provides
end-to-end recovery and flow control. This ensures that data is completely
transferred.
• The transport layer uses port numbers to name the ends (sender and receiver) of
logical connections. Layer 4 also handles multiplexing services.
Examples: TCP/IP
– Connectionless – also called unreliable communications (this does not mean that data is not
received at the destination), connectionless protocols do not receive acknowledgments when
data is received.
• Bit order – the sending and receiving devices read each byte
from either the first or last bit received.