Network Cabling • majority of networks today are connected by some sort of wiring or cabling that acts as a network transmission medium that carries signals between computers. • Though there are so many cables, only three major groups of cabling connect the majority of networks: • Twisted-pair (unshielded and shielded) cable • Coaxial cable • Fiber-optic cable Twisted-Pair Cable • consists of two insulated strands of copper wire twisted around each other. • There are two types of twisted-pair cable: unshielded twisted-pair (UTP) and shielded twisted-pair (STP) cable. • twisting cancels out electrical noise from adjacent pairs and from other sources such as motors, relays, and transformers. 1
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Unshielded Twisted-Pair (UTP) Cable • using the 10BaseT specification, is the most popular type of twisted-pair cable. • It is the most popular LAN cabling. • The maximum cable length segment is 100 meters, about 328 feet. • Traditional UTP cable consists of two insulated copper wires. • The 568A Commercial Building Wiring Standard of the Electronic Industries Association and the Telecommunications Industries Association (EIA/TIA) specifies the type of UTP cable
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. These standards include seven categories of UTP: Category 1 - refers to traditional UTP telephone cable that can carry voice but not data transmissions. Consists of two twisted pairs of copper wires. Category 2 - certifies UTP cable for data transmissions up to 4 megabits per second (Mbps). It consists of four twisted pairs of copper wire. Category 3 - certifies UTP cable for data transmissions up to 16 Mbps. It consists of four twisted pairs of copper wire with three twists per foot. Category 4 - certifies UTP cable for data transmissions up to 20 Mbps. It consists of four twisted pairs of copper wire. Category 5 - certifies UTP cable for data transmissions up to 100 Mbps. It consists of four twisted pairs of copper wire. Category 5 Enhanced (Cat 5E ) - More twists per inch than Cat5 - supports short-run Gigabit Ethernet (1000 Mbps) networking by utilizing all four wire pairs and is backward- compatible with ordinary CAT5. 3
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Category 6 (Cat 6) - Unlike CAT5 but like Cat5e, Cat6 utilizes all four pairs. CAT6 supports Gigabit (1000 Mbps) Ethernet and supports communications at more than twice the speed of CAT5e, the other popular standard for Gigabit Ethernet cabling. • Twisted pair cable like CAT6 comes in two main varieties, solid and stranded. Solid CAT6 cable supports longer runs and works best in fixed wiring configurations like office buildings. • Stranded CAT6 cable, on the other hand, is more pliable and better suited for shorter-distance, movable cabling such as "patch" cables. Category 7 (Cat 7) this category is still in the development stage and will use a braided shield surrounding all four foil shielded pairs to reduce noise and interference. • Several new "Cat. 7" connectors are under Development. (e.g.: AMP, BKS, Siemon, Telesafe, T&B) • One potential problem with all types of cabling is crosstalk (signals from one line interfering with signals from another line).
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Pros/Advantage of UTP • It has a large installed base and is a familiar technology. (i.e. most buildings are already wired with UTP) hence it is available in the market • It is relatively inexpensive and easy to install. • It does not require grounding/bonding (process of binding things together) no ground fault Cons/Disadvantage UTP • High-quality UTP systems require specialized installation procedures. • More susceptible to EMI, RFI, crosstalk and attenuation than other media. • Not recommended for LAN that requires a high level of security because it can be tapped
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Shielded Twisted-Pair (STP) Cable • uses a woven copper-braid jacket that is more protective and of a higher quality than the jacket used by UTP. • STP also uses a foil wrap around each of the wire pairs. • This gives STP excellent shielding to protect the transmitted data from outside interference, which in turn allows it to support higher transmission rates over longer distances than UTP.
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Pros/Advantage STP • Provides better performance than UTP in environments with high noise levels of unwanted electrical signals. • Provides higher transmission rate than UTP Cons/Disadvantage STP • It is more labor-intensive than UTP to install. • More expensive than UTP • Susceptible to ground faults through the shield. Twisted-Pair Cabling Components Connection hardware: Twisted-pair cabling uses RJ-45 connectors to connect to a computer. The RJ-45 connector houses eight cable connections, while the RJ- 11 houses only four.
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Distribution racks and rack shelves: Distribution racks and rack shelves can create more room for cables where there isn't much floor space. Using them is a good way to organize a network that has a lot of connections. Expandable patch panels: come in various versions that support up to 96 ports and transmission speeds of up to 100 Mbps. Jack couplers: single or double RJ-45 jacks snap into patch panels and wall plates and support data rates of up to 100 Mbps. Wall plates: support two or more couplers.
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Twisted-Pair Cabling Considerations Use twisted-pair cable if: • Your LAN is under budget constraints. • You want a relatively easy installation in which computer connections are simple. Do not use twisted-pair cable if: • Your LAN requires a high level of security and you must be absolutely sure of data integrity. • You must transmit data over long distances at high speeds.
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Types of Crimping Crimping for creating Straight-through cables(||) • Router to hub • Router to switch • Switch to PC or server • Hub to PC or server • Network printer to hub or switch Crimping for creating Crossover cables (X) • Switch to switch • Switch to hub • Hub to hub • Router to router • PC to PC • Router to PC Crimping for creating Rolled Cable () • Although rolled cable isn’t used to connect any Ethernet connections together, you can use a rolled Ethernet cable to connect a computer to a router for configuration. 10
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Crimping standards
11
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Coaxial Cable • coaxial cable consists of a core of copper wire surrounded by insulation, a braided metal shielding, and an outer cover. • The term shielding refers to the woven or stranded metal mesh (or other material) that surrounds some types of cabling. Shielding protects transmitted data by absorbing stray electronic signals, called noise, so that they do not get onto the cable and distort the data. • Cable that contains one layer of foil insulation and one layer of braided metal shielding is referred to as dual shielded. • Quad shielding consists of two layers of foil insulation and two layers of braided metal shielding.
12
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. • The core of a coaxial cable carries the electronic signals that make up the data. This wire core can be either solid or stranded. • Surrounding the core is a dielectric insulating layer that separates it from the wire mesh. • The braided wire mesh acts as a ground and protects the core from electrical noise and crosstalk (signal overflow from an adjacent wire). The conducting core and the wire mesh must always be kept separate from each other. • If they touch, the cable will experience a short, and noise or stray signals on the mesh will flow onto the copper wire. • A non conducting outer shield—usually made of rubber, Teflon, or plastic—surrounds the entire cable. • Coaxial cable is more resistant to interference and attenuation than twisted-pair cabling. • Attenuation is the loss of signal strength that begins to occur as the signal travels farther along a copper cable. 13
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Types of Coaxial Cable Thinnet Cable: is a flexible coaxial cable about 0.64 centimeters (0.25 inches) thick. • Because this type of coaxial cable is flexible and easy to work with, it can be used in almost any type of network installation. • Thinnet coaxial cable can carry a signal for a distance of up to approximately 185 meters (about 607 feet) before the signal starts to suffer from attenuation. • Cable manufacturers have agreed upon specific designations for different types of cable. • Thinnet is included in a group referred to as the RG-58 family and has 50ohm impedance(the resistance, measured in ohms, to the alternating current that flows in a wire). • The principal distinguishing feature of the RG-58 family is the center core of copper. 14
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Stranded and Solid core
15
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Thicknet Cable: is a relatively rigid coaxial cable about 1.27 centimeters (0.5 inches) in diameter. • Thicknet cable is sometimes referred to as Standard Ethernet because it was the first type of cable used with the popular network architecture Ethernet. • Thicknet cable's copper core is thicker than a thinnet cable core. • Thicknet cable can carry a signal for 500 meters (about 1640 feet). • because of thicknet's ability to support data transfer over longer distances, it is sometimes used as a backbone to connect several smaller thinnet-based networks. • A transceiver connects the thinnet coaxial cable to the larger thicknet coaxial cable.
16
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. • A transceiver designed for thicknet Ethernet includes a connector known as a vampire tap, or a piercing tap, to make the actual physical connection to the thicknet core. • This connector is pierced through the insulating layer and makes direct contact with the conducting core. • Connection from the transceiver to the NIC is made using a transceiver cable (drop cable) to connect to the attachment unit interface (AUI) port connector on the card. • An AUI port connector for thicknet is also known as a Digital Intel Xerox (DIX) connector (named for the three companies that developed it and its related standards) or as a DB-15 connector.
17
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Thinnet vs. Thicknet Cable • As a general rule, the thicker the cable, the more difficult it is to work with. • Thin cable is flexible, easy to install, and relatively inexpensive. • Thick cable does not bend easily and is, therefore, harder to install. • Thick cable is more expensive than thin cable, but will carry a signal farther. Coaxial-Cable Connection Hardware • Both thinnet and thicknet cable use a connection component, known as a BNC connector, to make the connections between the cable and the computers. • The BNC cable connector: is either soldered or crimped to the end of a cable.
18
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Coaxial-Cabling Considerations • Transmit voice, video, and data. • Transmit data for greater distances than is possible with less expensive cabling. • Offer a familiar technology with reasonable data security. Coax advantages • It is less susceptible to interference than UTP (has noise- rejection characteristics ) • Better bandwidth • Transmit data for greater distances • Relatively inexpensive • Transmit voice, video, and data Coax disadvantages • Due to its high metallic content, coax cable is usually more expensive than UTP • Coaxial cable is more expensive to install than UTP • Requires grounding/bonding (i.e. poor shield connection creates big problem) 19
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Fiber-Optic Cable • optical fibers carry digital data signals in the form of modulated pulses of light. • This is a relatively safe way to send data because, unlike copper-based cables that carry data in the form of electronic signals, no electrical impulses are carried over the fiber-optic cable. • This means that fiber optic cable cannot be tapped, and its data cannot be stolen. • Fiber-optic cable is good for very high-speed, high-capacity data transmission because of the purity of the signal and lack of signal attenuation. Fiber-Optic Cable Composition • An optical fiber consists of an extremely thin cylinder of glass, called the core, surrounded by a concentric layer of glass, known as the cladding. 20
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. • Because each glass strand passes signals in only one direction, a cable includes two strands in separate jackets. One strand transmits and one receives. • A reinforcing layer of plastic surrounds each glass strand, and Kevlar fibers provide strength. • The Kevlar fibers in the fiber-optic connector are placed between the two cables. Just as their counterparts (twisted-pair and coaxial) are, fiber-optic cables are encased in a plastic coating for protection. • The fibers are sometimes made of plastic. Plastic is easier to install, but cannot carry the light pulses for as long a distance as glass. • Fiber-optic cable • Fiber-optic cable transmissions are not subject to electrical interference and are extremely fast, currently transmitting about 100 Mbps with demonstrated rates of up to 1 gigabit per second (Gbps). They can carry a signal—the light pulse—for many miles. 21
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Fiber-Optic Cabling Considerations • Need to transmit data at very high speeds over long distances in very secure media. Do not use fiber-optic cable if you: • Are under a tight budget. • Do not have the expertise available to properly install it and connect devices to it. Fiber Optic Cable Connectors • Straight Tip (ST) connector:- It is a connector that uses a mechanism similar to the BNC connectors used by thinnet. The most popular • Subscriber connector (SC):-are square shaped and have release mechanisms to prevent the cable from accidentally being unplugged
22
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. AWG: The Standard Cable Measurement Cable measurements are often expressed as numbers, followed by the initials AWG. As the thickness of the wire increases, the AWG number decreases. Telephone wire has a thickness of 22 AWG. A wire of 14 AWG is thicker than telephone wire, and wire of 26 AWG is thinner than telephone wire. Cabling Considerations • Installation Logistics • Shielding • Crosstalk • Transmission Rates • Cost • Signal Attenuation 23
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Comparing the different cables
24
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Wireless Networking • Most wireless networks actually consist of wireless components communicating with a network that uses the cabling Advantages of wireless networking • Provide temporary connections to an existing cabled network. • Help provide backup to an existing network. • Provide some degree of portability. • Extend networks beyond the limits of physical connectivity. Wireless connectivity can be especially useful for networking: • Busy locations, such as lobbies and reception areas. • Users who are constantly on the move • Isolated areas and buildings. • Departments in which the physical setting changes frequently and unpredictably. • Structures, such as historic buildings, for which cabling presents challenges. 25
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. • Although it uses radio frequencies instead of cables, it is commonly implemented in a switched network environment and its frame format is similar to Ethernet. Wireless networks can be classified broadly as: • Wireless Personal-Area Networks (WPAN) - Operates in the range of a few feet. Bluetooth or Wi-Fi Direct-enabled devices are used in WPANs. • Wireless LANs (WLANs) - Operates in the range of a few hundred feet such as in a room, home, office, and even campus environment. • Wireless Wide-Area Networks (WWANs) - Operates in the range of miles such as a metropolitan area, cellular hierarchy, or even on intercity links through microwave relays.
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. • Wireless technologies available to connect devices to these wireless networks: • Bluetooth - Originally an IEEE 802.15 WPAN standard that uses a device-pairing process to communicate over distances up to 100m. Supports speeds of up to 24 Mb/s. • Wi-Fi (wireless fidelity) - An IEEE 802.11 WLAN standard commonly deployed to provide network access to home and corporate users, to include data, voice and video traffic, to distances up to 300m. Variations include 802.11a/b/g/n/ac/ad. Speeds vary based on technology. • WiMAX (Worldwide Interoperability for Microwave Access) - An IEEE 802.16 WWAN standard that provides wireless broadband access of up to 50 km. WiMAX is an alternative to cable and DSL broadband connections which is used by service providers to provide cellular broadband. Supports speeds up to 1 Gb/s.
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. • Cellular broadband - Consists of various corporate, national, and international organizations using service provider cellular access to provide mobile broadband network connectivity. Cellular broadband access consisting of various standards supporting download speeds up to 5 Mb/s. Variations include 2G (using GSM, CDMA, or TDMA), 3G (using UMTS, CDMA2000, EDGE, or HSPA+) and 4G (using WiMAX or LTE). • Satellite broadband - Provides network access to remote sites through the use of a directional satellite dish that is aligned with a specific geostationary Earth orbit (GEO) satellite. It is usually more expensive and requires a clear line of sight. Supports download speeds up to 10 Mb/s and higher, depending on satellite provider infrastructure.
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. • All wireless devices operate in the radio waves range of the electromagnetic spectrum. • Wireless communication occurs in the radio waves range (i.e., 3 KHz to 300 GHz) of the electromagnetic spectrum. The radio waves range is subdivided into a radio frequencies section and a microwave frequencies section. Notice that WLANs, Bluetooth, cellular, and satellite communication all operate in the microwave UHF, SHF, and EHF ranges. • Wireless LAN devices have transmitters and receivers tuned to specific frequencies of the radio waves range. • Specifically, the following frequency bands are allocated to 802.11 wireless LANs: • 2.4 GHz (UHF) - 802.11b/g/n/ad • 5 GHz (SHF) - 802.11a/n/ac/ad • 60 GHz (EHF) - 802.11ad An evaluation version of novaPDF was used to create this PDF file. Purchase a license to generate PDF files without this notice. Comparing 802.11 Standards
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. WLANs Vs LANs
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Components of WLAN • The simplest wireless network requires a minimum of two devices. Each device must have a radio transmitter and a radio receiver tuned to the same frequencies. • However most wireless deployments require: • End devices with wireless NICs • Infrastructure device, such as a wireless router or wireless AP • To communicate wirelessly, end devices require a wireless NIC that incorporates a radio transmitter/receiver and the required software driver to make it operational. • Laptops, tablets, smart phones now all include integrated wireless NICs. However, if a device does not have an integrated wireless NIC, then a USB wireless adapter can be used. An evaluation version of novaPDF was used to create this PDF file. Purchase a license to generate PDF files without this notice. • The type of infrastructure device that an end device associates and authenticates with varies on the size and requirement of the WLAN. • For instance, a home user typically interconnects wireless devices using a small, integrated wireless router. These smaller, integrated routers serve as: • Access point - Provides 802.11a/b/g/n/ac wireless access • Switch - Provides a four-port, full-duplex, 10/100/1000 Ethernet switch to connect wired devices • Router - Provides a default gateway for connecting to other network infrastructures • The wireless router connects to the ISP DSL modem and advertises its services by sending beacons containing its shared service set identifier (SSID). Internal devices wirelessly discover the router SSID and attempt to associate and authenticate with it to access the Internet.
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. • Organizations providing wireless connectivity to their users require a WLAN infrastructure to provide additional connectivity options. • IEEE 802.11 refers to a wireless client as a station (STA). The term wireless client is used to describe any wireless capable device. • In 802.3 Ethernet LAN each client connects to a switch using a network cable. The switch is the point where the clients gain access to the network. Notice that the wireless AP also connects to the switch. • Wireless clients use their wireless NIC to discover nearby APs advertising their SSID. Clients then attempt to associate and authenticate with an AP. After being authenticated, wireless users have access to network resources. An evaluation version of novaPDF was used to create this PDF file. Purchase a license to generate PDF files without this notice. WLAN Topologies • Wireless LANs can accommodate various network topologies. The 802.11 standard identifies two main wireless topology modes: • Ad hoc mode - When two devices connect wirelessly without the aid of an infrastructure device, such as a wireless router or AP. Examples include Bluetooth and Wi-Fi Direct. The IEEE 802.11 standard refers to an ad hoc network as an independent basic service set (IBSS). • A variation of the ad hoc topology is when a smart phone or tablet with cellular data access is enabled to create a personal hotspot. This feature is sometimes referred to as Tethering. A hotspot is usually a temporary quick solution that enables a smart phone to provide the wireless services of a Wi-Fi router. Other devices can associate and authenticate with the smart phone to use the Internet connection
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Ad Hoc Summary
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. • Infrastructure mode - When wireless clients interconnect via a wireless router or AP, such as in WLANs. APs connect to the network infrastructure using the wired distribution system (DS), such as Ethernet. It defines two infrastructure mode topology building blocks: a Basic Service Set (BSS) and an Extended Service Set (ESS). • A BSS consists of a single AP interconnecting all associated wireless clients. The area in which the wireless clients of the BSS may remain in communication is known as Basic Service Area (BSA). • When a single BSS provides insufficient RF coverage, two or more BSSs can be joined through a common distribution system (DS) into an ESS. • An ESS is the union of two or more BSSs interconnected by a wired DS.
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Basic Service Set Summary
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Extended Service Set Summary
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. • For wireless devices to communicate over a network, they must first associate with an AP or wireless router. An important part of the 802.11 process is discovering a WLAN and subsequently connecting to it. • Management frames are used by wireless devices to complete the following three-stage process: • Discover new wireless AP. • Authenticate with AP. • Associate with AP. • To associate, a wireless client and an AP must agree on specific parameters. Parameters must be configured on the AP and subsequently on the client to enable the negotiation of these processes.
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Common configurable wireless parameters include: • SSID - An SSID is a unique identifier that wireless clients use to distinguish between multiple wireless networks in the same vicinity. The SSID name appears in the list of available wireless network on a client. Depending on the network configuration, several APs on a network can share an SSID. Names are usually 2 to 32 characters long. • Password - Required from the wireless client to authenticate to the AP. A password is sometimes called the security key. It prevents intruders and other unwanted users from accessing the wireless network. • Network mode - Refers to the 802.11a/b/g/n/ac/ad WLAN standards. APs and wireless routers can operate in a Mixed mode meaning that it can simultaneously use multiple standards. • Security mode - Refers to the security parameter settings, such as WEP, WPA, or WPA2. Always enable the highest security level supported. • Channel settings - Refers to the frequency bands being used to transmit wireless data. Wireless routers and AP can choose the channel setting or it can be set manually if there is interference with another AP or wireless device.
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. The 802.11 standard was originally developed with two authentication mechanisms: • Open authentication - Fundamentally a NULL authentication where the wireless client says “authenticate me” and the AP responds with “yes”. Open authentication provides wireless connectivity to any wireless device and should only be used in situations where security is of no concern. • Shared key authentication - Technique is based on a key that is pre-shared between the client and the AP.
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. There are three shared key authentication techniques available: • Wired Equivalent Privacy (WEP) - Original 802.11 specification designed to provide privacy similar to connecting to a network using a wired connection. The data is secured using the RC4 encryption method with a static key. However, the key never changes when exchanging packets making it easy to hack. • Wi-Fi Protected Access (WPA) - A Wi-Fi Alliance standard that uses WEP, but secures the data with the much stronger Temporal Key Integrity Protocol (TKIP) encryption algorithm. TKIP changes the key for each packet making it much more difficult to hack. • IEEE 802.11i/WPA2 - IEEE 802.11i is the industry standard for securing wireless networks. The Wi-Fi alliance version is called WPA2. 802.11i and WPA2; both use the Advanced Encryption Standard (AES) for encryption. AES is currently considered the strongest encryption protocol.
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. CHAPTER 4 Inter-connectivity Devices Network Interface Card (NIC) • provide the interface between cables and computers. • network cable is attached to the card's port to make the actual physical connection between the computer and the rest of the network. The role of the NIC is to: • Prepare data from the computer for the network cable. • Send the data to another computer. • Control the flow of data between the computer and the cabling system. • Receive incoming data from the cable and translate it into bytes that can be understood by the computer's central processing unit (CPU). 44
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Modem • A modem is a device that makes it possible for computers to communicate over a telephone line. • When computers are too far apart to be joined by a standard computer cable, a modem can enable communication between them. • Computers cannot simply be connected to each other over a telephone line, because computers communicate by sending digital electronic pulses (electronic signals), and a telephone line can send only analog waves (sound). • a sending modem MOdulates digital signals into analog signals, and a receiving modem DEModulates analog signals back into digital signals.
45
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Repeater • As signals travel along a cable, they degrade and become distorted in a process called "attenuation." Repeaters regenerate/amplify the attenuated signals and resend them out on other segments • In short ,repeater is used for signal regeneration Hub • When the hub receives the incoming signal, it amplifies and sends it out over all its ports. • Hubs typically provide from 8 to 24 ports • Hubs can also be connected to each other (cascaded) by means of BNC AUI/daisy chain ports Crossover cables 46
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Bridge • Like a repeater, a bridge can join segments or workgroup LANs. • However, a bridge can also divide a network to isolate traffic or problems. • Listens to all traffic. • Checks the source and destination addresses of each packet. • Builds a MAC address table, as information becomes available. • Forwards packets in the following manner: • If the destination is not listed in the MAC address table, the bridge forwards the packets to next segment. • If the destination is listed in the MAC address table, the bridge forwards the packets to that segment (unless it is the same segment as the source).
47
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Switch • In modern star-topology networking, when you need bridging functionality you often buy a switch. • But bridging is not the only benefit of switch implementation. • Switches also provide the benefit of micro-LAN segmentation, which means that every node connected to a switched port receives its own dedicated bandwidth. • Switches are multiport bridges. Sometimes they are called smart hubs or switching hub. • They filter traffic between the ports on the switch by using the MAC address of computers transmitting through them. Switches can be used when greater performance is needed or when collisions need to be reduced. 48
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice. Router • Routers are used to connect complicated networks with many segments • Routers use IP addresses to handle data routing(i.e. delivery of data packets to multiple LANS and over WAN links as shown in the figure below) Brouter • A brouter, as the name implies, combines the qualities of both a bridge and a router. A brouter can act as a router for one protocol and as a bridge for all the others. • Can use either MAC addresses or IP addresses to handle data routing. Gateway • In general, the role of the gateway is to overcome problems associated with protocol incompatibility. • This is a problem, which most often occurs when totally different systems, usually developed independently, need to be linked. 49
An evaluation version of novaPDF was used to create this PDF file.
Purchase a license to generate PDF files without this notice.