Вы находитесь на странице: 1из 82

Networking

Basic Concepts 1
Networking Is All about Information

 Every business runs on info, whether the business is


banking, dry-cleaning, aerospace, or computer chip
manufacturing. Inventory and payroll, account
balances, contact lists, and customer preferences are
all types of information that are vital to a successful
business.
 The personal computer is a fantastic information
tool.
 It gives you the ability to control the flow of
information in your life.
2
Exchanging Information
 Before networks, even with the computer, people had
to personally move the info about, whether it was on
paper, over the phone, or on floppy disk or magnetic
tape.
 When you use a comp not connected to a network,
you are working in what is called a stand-alone
environment.
 You can use software to produce data, graphics, docs
spreadsheets, and so on, but to share your info you
must print it out or put it on floppy disk so that
someone else can use it.
 You are moving the information about yourself
rather than letting the computer do it for you.
3
The Network
 Computers connected over a network can
make that information exchange easier and
faster.
 The information moves directly from
computer to computer rather than through a
human intermediary.
 People can concentrate on getting their work
done rather than on moving information
around the company.
4
Network
 When you link computers together, you can
more swiftly and efficiently move
information between them.
 The computers can also share resources, such
as printers and fax modems, allowing you to
better use your hardware.
 A group of computers and other devices
connected together is called a network.
 The concept of connected computers sharing
resources is called networking.
5
Basic Network Concept
 Networks are an interconnection of
computers. These computers can be
linked together using a wide variety of
different cabling types, and for a wide
variety of different purposes.
 The basic reasons why computers are
networked are
 To share resources (files, printers, modems, fax machines)
 To share application software (MS Office)
 To increase productivity (make it easier to share data
amongst users)

6
Local Area Network

 A local area network (LAN) is a number


of computers connected to each other by
cable in a single location, usually a single
floor of a building or all the computers in
a small company
7
Wide Area Network
 While local area networks are perfect for sharing
resources within a building or campus, they cannot be
used to connect distant sites.
 Wide area networks (WANs) fill this need. Stated
simply, wide area networks are the set of connecting
links between local area networks.
 These links are made over telephone lines leased from
the various telephone companies. In rare instances,
WANs can be created with satellite links, packet radio,
or microwave transceivers.
 These options are generally far more expensive than
leased telephone lines, but they can operate in areas
where leased lines are not available.
8
Wide Area Network

A wide area network


links computers in
different locations.

9
Wide Area Network
 The Internet has emerged as both the largest
and the least expensive WAN in the world.
 WANs suffer from extremely limited
bandwidth.
 The fastest commercially feasible wide area
data links are many times slower than the
slowest local area links.
 This makes the sharing of resources over a
WAN difficult.

10
Sharing Information
 Just as a lot of information is moved about,
some information is centrally controlled and
shared.
 There is lot of info on the networked computers
and not everyone is given access to it.
 The information must be kept consistent and
secure, and timely access must be given to those
who need the information to run the business.

11
Types of Info
 Other types of information you might want
to centrally locate and share or control
include:
 Inventory
 Company letterhead and letter styles
 Sales contact information
 Company procedures manuals
 Sensitive financial record
 Service records
 Company memos
12
Server
If you select one computer
to store the shared info
and have all other comp
ref the info on that comp
over the network, the
comp can help you
centralize the info and
maintain control over it.
The central comp is often
called a server, and special
software and operating
systems are often used in
server computers.
13
Sharing Hardware Resources
 Computers that are not networked cannot
effectively share resources.
 A network allows anyone connected to the
network to use the printer, not just the
individual sitting at the computer to which
the printer is attached.

14
Sharing Hardware Resources
 Networked computers can also share
 Fax modems
 Scanners
 Hard disks
 Floppy disks
 CD-ROMs
 Tape backup units
 Plotters
 Almost any other device that can be attached to
a computer

15
Sharing Hardware Resources
You can attach some peripherals directly to the
network; they do not need to be attached to a
computer to be shared on the network. Figure
illustrates how anyone on a network can use a
shared printer.

16
Sharing Software Resources
 Software resources can also be used more effectively
over a network. With stand-alone computers, the
software used on the computer must be present on
each computer’s hard disk, whether or not that
computer is used at that moment for that task.
 Software costs can become prohibitive for a large
number of computers.
 It is also difficult and time consuming to install and
configure the software individually on every one of
the computers.
17
Sharing Software Resources
 With a network you can centrally install and
configure the software, vastly reducing the
work required to make computer programs
available to an organization.
 You can also restrict access to programs.

18
Preserving Information
 A network also allows for information to be
backed up to a central location.
 Important information can be lost by mistake
or accident when a stand-alone computer has
no backup.
 It is difficult to maintain regular backups on a
number of stand-alone computers.
 When you back up to a central location (often
to a tape cartridge in the network server), you
have one place to look for the lost information,
and you can be assured that the information is
being backed up.
19
Protecting Information
 A network provides a more secure environment for a
company’s important information.
 With stand-alone computers, access to the computers
often means access to the information on the
computers.
 Networks provide an additional layer of security by
way of passwords. You can give each network user a
different account name and password, allowing the
network server to distinguish among those who need
access to have it and protecting the information from
tampering by those who do not.

20
E-Mail
 The computer network can also help people
communicate.
 One of the greatest benefits to users of networks is
electronic mail, or e-mail.
 Rather than exchanging memos and directives on
paper, engaging printing costs and delays, network
users can instantly send messages to others and even
check to see whether their message has been received.
 You can attach electronic documents to mail
messages, instantly duplicate and forward mail, and
perform many more tasks
21
Networks
 Based on the roles of the computers attached to
them, networks are divided into three types:
 Server-based (also called client-server), containing
clients and the servers that support them.
 Peer (also called-peer-to-peer), which have no
servers and use the network to share resources
among independent peers.
 Hybrid network, which is a client-server network
that also has peers sharing resources. Most
networks are actually hybrid networks.

22
Server Based Networks
 Server-based networks are defined by the
presence of servers on a network that provide
security and administration of the network.
 Server-based networks divide processing tasks
between clients and servers. Clients request
services, such as file storage and printing, and
servers deliver them.
 Server computers typically are more powerful
than client computers, or are optimized to
function as servers.
23
Domains
 In Windows NT, server-based networks are organized
into what are called domains.
 Domains are collections of networks and clients that
share security trust information.
 Domain security and logon permission are controlled by
special servers called domain controllers.
 There is one master domain controller, called the
Primary Domain Controller (PDC), which may be
assisted by secondary domain controllers called Backup
Domain Controllers (BDC) during busy times or when
the PDC is not available for some reason.
 No computer users can access the resources of servers in
a domain until they have been authenticated by a domain
controller.
24
Bandwidth
Bandwidth is the capacity of a medium to convey
data.. One example of bandwidth is automobile
traffic. A two-lane road with a speed limit can
accommodate only so many cars before there are
too many and a traffic jam results. You can
increase the bandwidth of a road by making the
cars travel more quickly (which corresponds to
using a faster transmission method in networks)
or by making the road wider (which corresponds
to using more wires in networks).
25
Advantages of Server Based
Networks
 Server based networks have a great
many advantages, including:
 Strong central security
 Central file storage, which allows all users to
work from the same set of data and provides
easy backup of critical data
 Ability of servers to pool available hardware
and software, lowering overall costs
 Ability to share expensive equipment, such
as laser printers

26
Advantages of Server Based
Networks
 Optimized dedicated servers, which are faster
than peers at sharing network resources
 Less intrusive security, since a single password
allows access to all shared resources on the
network
 Freeing of users from the task of managing the
sharing of resources
 Easy manageability of a large number of users
 Central organization, which keeps data from
getting lost among computers
27
Disadvantages of Server Based
Networks
 Server-based networks do have some
disadvantages, although they are mostly
related to the cost of server equipment,
including:
 Expensive dedicated hardware
 Expensive network operating system software
and client licenses
 A dedicated network administrator (usually
required)

28
Peer Networks
 Peer networks are defined by a lack of central
control over the network. There are no servers
in peer networks; users simply share disk space
and resources, such as printers and faxes, as
they see fit.
 Peer networks are organized into workgroups.
Workgroups have very little security control.
There is no central login process. If you have
logged in to one peer on the network, you will
be able to use any resources on the network
that are not controlled by a specific password.

29
Peer Networks
 Access to individual resources can be controlled if the
user who shared the resource requires a password to
access it. Because there is no central security trust,
you will have to know the individual password for
each secured shared resource you wish to access. This
can be quite inconvenient.
 Peers are also not optimized to share resources.
Generally, when a number of users are accessing
resources on a peer, the user of that peer will notice
significantly degraded performance. Peers also
generally have licensing limitations that prevent more
than a small number of users from simultaneously
accessing resources.
30
Advantages of Peer Networks
 Peer computers have many advantages, especially
for small businesses that cannot afford to invest in
expensive server hardware and software:
 No extra investment in server hardware or software is
required
 Easy setup
 No network administrator required
 Ability of users to control resources sharing
 No reliance on other computers for their operation
 Lower cost for small networks

31
Disadvantages of Peer
 Peer networks,Networks
too, have their disadvantages,
including:
 Additional load on computers because of resource
sharing
 Inability of peers to handle as many network
connections as servers
 Lack of central organization, which can make data
hard to find
 No central point of storage for file archiving
 Requirement that users administer their own
computers
 Weak and intrusive security
 Lack of central management, which makes large
peer networks hard to work with
32
Hybrid Networks
 Hybrid networks have all three types of
computers operating on them and generally
have active domains and workgroups. This
means that while most shared resources are
located on servers, network users still have
access to any resources being shared by peers
in your workgroup. It also means network
users do not have to log on to the domain
controller to access workgroup resources being
shared by peers.

33
Advantages of Hybrid
Computing
 Hybrid computing provides these
advantages:
 The advantages of server-based networking
 Many of the advantages of peer-based
networking
 Ability of users and network administrators
to control security based on the importance
of the shared resource

34
Disadvantages of Hybrid
Computing

Hybrid computing shares the


disadvantages of server-based
networking.

35
Peer Security vs. Server
Security
 One large difference in the way peer-to-
peer and server-based networks operate
is in how they implement security.
 Peer-to-peer networks are usually less
secure than are server-based networks,
because peer-to-peer networks commonly
use share-level security, while server-
based networks commonly use file-level
or access permission security.
36
Peer Security vs. Server

Security
In Windows 98, for example, the user of the computer can
allow any other computer on the network to access a shared
directory or device. The user can assign a password to the
shared resource if some degree of security is required.
 However, the user cannot specify which users on the
network can access the resource—any user on the network
that knows the password can access the resource.
 Another limitation of peer-to-peer shares implemented in
this manner is that each shared resource that you wish to
control access to must have its own password. The number
of passwords to resources that you must remember can
quickly grow unwieldy in a large network.

37
Peer Security vs. Server
 Security
Most server-based networks implement security differently.
Instead of requiring a password for every shared resource you
wish to access, the server based network only requires one
password for you to access all resources on the network that you
have permission to use.
 The security advantage of peer-to-peer networking is that each
user controls access to their own resources.
 The security disadvantage of peer-to-peer networks is that you
cannot differentiate among network users when you allow access
to a resource.
 The security advantage of server-based networking is that each
user is allowed access to only those resources that the user has
the privilege to access.
 The security disadvantage of server-based networking is that
someone must centrally administer the security on your network.
38
Types of Servers
 Common server types include
 File servers
 Print servers
 Application servers
 Message servers
 Database servers
 Windows NT Server supports all of these capabilities.
In fact, one Windows NT Server can, by itself, serve in
all of these capacities simultaneously on a small
network.
 On larger networks, however, you need to spread these
roles among multiple servers.
39
File Servers
 File servers offer services that allow network users
to share files. File services are the network
applications that store, retrieve, and move data.
 With network file services, users can exchange, read,
write, and manage shared files and the data
contained in them.
 File servers are designed specifically to support the
file services for a network such as:
 File transfer
 File storage and data migration
 File update synchronization
 File archiving
40
Print Servers
 In a network printing can be done centrally
because a network can:-
 Allow users to share printers
 Allow you to place printers where convenient,
not just near individual computers
 Achieve better workstation performance by
using high-speed network data transfer, print
queues, and spooling
 Allow users to share network fax services

41
Print Services
 Print services manage and control printing on a network,
allowing multiple and simultaneous access to printing
facilities.
 The network operating system achieves this by using
print queues, which are special storage areas where print
jobs are stored and then sent to the printer in an
organized fashion.
 The user can then continue working in an application
while the network takes care of the printing.
 Network printing also cuts costs by allowing shared
access to printing devices. This is especially important
when it comes to the more expensive varieties of printers.
High-quality color printers, high-speed printers, and
large-format printers and plotters tend to cost a lot.
42
Print Services
 Another print service is fax services.
 With network print services, you can fax
straight from your workstation to a receiving
fax machine. This way, you can eliminate the
step of printing a hard copy and scanning it
into a fax machine.
 From an application, you can send a document
to a fax queue, which then takes care of the
faxing.
 Furthermore, with a fax server, you can receive
faxes directly on your workstation.
43
Application Server
 Application services allow client PCs to
access and use extra computing power
and expensive software applications that
reside on a shared computer. You can
add specialized servers to provide
specific applications on a network. For
example, if your organization needed a
powerful database, you could add a
server to provide this application.
44
Message Servers
 Message servers provide message services in a
wide variety of communication methods that go
far beyond simple file services. With file
services, data can pass between users only in
file form. With message services, data can take
the form of graphics, digitized video, or audio,
as well as text and binary data. As hypertext
links (electronic connections with other text,
images, sounds, and so on) become more
common in messages, message services are
becoming an extremely flexible and popular
means of transmitting data across a network.

45
Message Servers
 Message services must coordinate the complex
interactions between users, documents, and
applications. For example, with message
services, you can send an electronic note,
attached to a voice-mail message, to a fellow
user on a network.
 There are four main types of message services:
 Electronic mail
 Workgroup applications
 Object-oriented applications
 Directory services

46
Database Servers
 Database services can provide a network with
powerful database capabilities that are available
for use on relatively weak PCs.
 Most database systems are client-server based.
This means that the database applications run on
two separate components:
 The client-end portion of the application runs on the
client, providing an interface and handling less
intensive functions, such as data requests.
 The server-end portion of the application handles the
intensive performance of database operations. It runs
on the database server, managing the database,
processing queries, and replying to clients.

47
Characteristics of the Windows NT Operating System

48
An exabyte is slightly larger than one billion gigabytes.
Network Topologies

49
Network Topology
 The way in which the connections are made is called the
topology of the network.
 Network topology specifically refers to the physical layout
of the network, especially the locations of the computers
and how the cable is run between them.
 It is important to select the right topology for how the
network will be used.
 Each topology has its own strengths and weaknesses.
 The four most common topologies are
 the bus topology
 the star topology
 the ring topology
 the mesh topology
50
Bus Topology
 The bus topology is often used when a network
installation is small, simple, or temporary.
 On a typical bus network, the cable is just one or
more wires, with no active electronics to amplify
the signal or pass it along from computer to
computer.
 This makes the bus a passive topology.

51
How Bus Networks Works
 When one computer sends a signal up (and down)
the wire, all the computers on the network receive
the information, but only one (the one with the
address that matches the one encoded in the
message) accepts the information. The rest
disregard the message.
 Only one computer at a time can send a message;
therefore, the number of computers attached to a
bus network can significantly affect the speed of the
network. A computer must wait until the bus is free
before it can transmit.
 These factors also affect star and ring networks.

52
How Bus Networks Works
 Another important issue in bus networks is termination.
Since the bus is a passive topology, the electrical signal from
a transmitting computer is free to travel the entire length of
the cable. Without termination, when the signal reaches the
end of the wire, it bounces back and travels back up the wire.
 When a signal echoes back and forth along an unterminated
bus, it is called ringing. To stop the signals from ringing, you
attach terminators at either end of the segment. The
terminators absorb the electrical energy and stop the
reflections.
 Cables cannot be left unterminated in a bus network.
 Ethernet 10Base2 (also known as thinnet) is an inexpensive
network based on the bus topology.

53
Computers Connected in Bus
Topology Network

In a bus topology the computers are connected in a line.

54
Advantages of Bus Topology
 There are several advantages to a bus topology:
 The bus is simple, reliable in very small networks,
easy to use, and easy to understand.
 The bus requires the least amount of cable to
connect the computers together and is therefore less
expensive than other cabling arrangements.
 It is easy to extend a bus. Two cables can be joined
into one longer cable with a BNC barrel connector,
making a longer cable and allowing more computers
to join the network.
 A repeater can also be used to extend a bus; a
repeater boosts the signal and allows it to travel a
longer distance.
55
Disadvantages of Bus Topology
 A bus topology is commonly subject to the
following disadvantages:
 Heavy network traffic can slow a bus considerably.
Because any computer can transmit at any time, and
computers on most bus networks do not coordinate
with each other to reserve times to transmit, a bus
network with a lot of computers can spend a lot of its
bandwidth (capacity for transmitting information)
with the computers interrupting each other instead of
communicating. The problem only gets worse as more
computers are added to the network
Contd…
56
Disadvantages of Bus Topology
 Each barrel connector weakens the electrical
signal, and too many may prevent the signal
from being correctly received all along the bus.
 It is difficult to troubleshoot a bus. A cable
break or malfunctioning computer anywhere
between two computers can cause them not to
be able to communicate with each other. A
cable break or loose connector will also cause
reflections and bring down the whole network,
causing all network activity to stop.

57
Star Topology
 In a star topology, all the cables run from the computers
to a central location, where they are all connected by a
device called a hub.
 Each computer on a star network communicates with a
central hub that resends the message either to all the
computers (in a broadcast star network) or only to the
destination computer (in a switched star network). The
hub in a broadcast star network can be active or passive.
 An active hub regenerates the electrical signal and sends
it to all the computers connected to it. This type of hub is
often called a multiport repeater. Active hubs and
switches require electrical power to run.

58
Star Topology
 A passive hub, such as wiring panels or
punch-down blocks, merely acts as a
connection point and does not amplify or
regenerate the signal.
 Passive hubs do not require electrical power
to run.
 You can use several types of cable to
implement a star network. A hybrid hub can
accommodate several types of cable in the
same star network.
59
Star Topology

In a star topology
the computers
are all connected
by cables to a
central point.

60
Hybrid Star Network
You can expand a star
network by placing
another star hub where
a computer might
otherwise go, allowing
several more
computers or hubs to
be connected to that
hub. This creates a
hybrid star network,
like the one shown in
Fig

The hybrid star network has several central star network


61
points linked in a star.
Advantages of Star Network
 There are several advantages to a star
topology:
 It is easy to modify and add new computers to a
star network without disturbing the rest of the
network. You simply run a new line from the
computer to the central location and plug it into
the hub. When the capacity of the central hub is
exceeded, you can replace it with one that has a
larger number of ports to plug lines into.
 You can use several cable types in the same
network with a hub that can accommodate
multiple cable types.

62
Advantages of Star Network
 The center of a star network is a good place to
diagnose network faults.
 Intelligent hubs (hubs with microprocessors that
implement features in addition to repeating
network signals) also provide for centralized
monitoring and management of the network.
 Single computer failures do not necessarily bring
down the whole star network. The hub can detect
a network fault and isolate the offending
computer or network cable and allow the rest of
the network to continue operating.

63
Disadvantages of Star Network
 The star topology has a few disadvantages:
 If the central hub fails, the whole network fails
to operate.
 Many star networks require a device at the
central point to rebroadcast or switch network
traffic.
 It costs more to cable a star network because
all network cables must be pulled to one
central point, requiring more cable than other
networking topologies.

64
Ring Topology
 In a ring topology, each computer is connected
to the next computer, with the last one
connected to the first.
 Rings are used in high-performance networks,
networks requiring that bandwidth be reserved
for time-sensitive features such as video and
audio, or when even performance is needed
when a large number of clients access the
network.
65
Ring Topology
In a ring topology computers are connected in a circle.

66
How Ring Network Works
 Every computer is connected to the next computer in the
ring, and each retransmits what it receives from the previous
computer. The messages flow around the ring in one
direction. Since each computer retransmits what it receives, a
ring is an active network and is not subject to the signal loss
problems a bus experiences. There is no termination because
there is no end to the ring.
 Some ring networks do token passing. A short message called
a token is passed around the ring until a computer wishes to
send information to another computer. That computer
modifies the token, adds an electronic address and data, and
sends it around the ring. Each computer in sequence receives
the token and the information and passes them to the next
computer until either the electronic address matches the
address of a computer or the token returns to its origin.
Contd…
67
How Ring Network Works
 The receiving computer returns a message to the
originator indicating that the message has been
received. The sending computer then creates another
token and places it on the network, allowing another
station to capture the token and begin transmitting.
The token circulates until a station is ready to send
and captures the token.
 This all happens very quickly: a token can circle a
ring 200 meters in diameter at about 10,000 times a
second. Some even faster networks circulate several
tokens at once. Other ring networks have two counter-
rotating rings that help them recover from network
faults.
 FDDI is a fast fiber-optic network based on the ring
topology.
68
Advantages of Ring topology
 The ring topology offers the following
advantages:
 Because every computer is given equal access
to the token, no one computer can
monopolize the network.
 The fair sharing of the network allows the
network to degrade gracefully (continue to
function in a useful, if slower, manner rather
than fail once capacity is exceeded) as more
users are added.
69
Disadvantages of Ring topology
 The ring topology has the following
disadvantages:
 Failure of one computer on the ring
can affect the whole network.
 It is difficult to troubleshoot a ring
network.
 Adding or removing computers
disrupts the network.
70
Star Bus Topology
The star bus topology combines
the bus and the star, linking
several star hubs together with
bus trunks. If one computer CS Dept

fails, the hub can detect the


fault and isolate the computer.
If a hub fails, computers
connected to it will not be able
to communicate, and the bus CE Dept

network will be broken into


two segments that cannot
reach each other.

Trg Branch 71
Star Ring Topology
In the star ring, also called the
star wired ring, the network
cables are laid out much like a
star network, but a ring is
implemented in the central
hub. Outlying hubs can be
connected to the inner hub,
effectively extending a loop of
the inner ring.
Token Ring is considered a star
ring. Although its topology is
physically a star, it functions
logically in a ring.

72
Basic Network Components
 Network Adapter Cards
 A network adapter card plugs into the workstation,
providing the connection to the network. Adapter
cards come from many different manufacturers, and
support a wide variety of cable media and bus types
 On power-up, the computer detects the new network
card, assigns the correct resources to it, and then
installs the networking software required for
connection to the network. All the user need do is
assign the network details like computer name.
73
Basic Network Components
 For Ethernet cards, each card is identified by a
twelve digit hexadecimal number. This number
uniquely identifies the computer. These network
card numbers are used in the Medium Access
[MAC] Layer to identify the destination for the
data.
 When talking to another computer, the data you
send to that computer is prefixed with the
number of the card you are sending the data to.
 This allows intermediate devices in the network
to decide in which direction the data should go,
in order to transport the data to its correct
destination.

74
Basic Network Components
 A typical adapter card looks like

75
NIC Installation

76
How Peripheral Cards Work
 Peripheral cards require a software driver to
function. This software driver provides the
interface between the card and the
operating system, making the services
provided by the card available to the user.
 The software driver is normally configured
to match the resource settings of the card.
This is done by a configuration utility, and
stored either in the executable file, or a
separate file (like .ini or .cfg).

77
Place of NIC driver in OSI
Model
 Network adapter cards and drivers provide the services corresponding
to the data link layer in OSI model. In the IEEE model, the data link is
split into the Logical Link Control (LLC) sublayer, which corresponds
to the software drivers and the Media Access Control (MAC)
sublayer, which corresponds to the network adapter.

78
How Peripheral Cards Work
 The software driver provides the follow functions
 initialization routine
 interrupt service routine
 procedures to transmit and receive data
 procedures for status, configuration and control
 The basic operation looks something like,
 card receives data
 card generates interrupt by asserting interrupt request line
 processor responds to interrupt request and jumps to service routine
 Service routine instructs processor to read data from port location
 interrupt service routine releases processor to continue previous
work

79
Network Components
 Cabling
 Cable is used to interconnect computers and network
components together.
 There are three main cable types used today
 Twisted pair
 Coaxial cable
 Fiber optics
 The choice of cable depends upon a number of factors, like
 Cost
 Distance
 Number of computers involved
 Speed
 Requirements [bandwidth] i.e., how fast data is to
be transferred

80
Network Components
 Twisted Pair (Shielded Twisted Pair and
Unshielded Twisted Pair)
 Shielded twisted pair uses a special braided wire which
surrounds all the other wires, which helps to reduce unwanted
interference.
 The features of twisted pair cable are,
 used in token ring (4 or 16MBps), 10BaseT (Ethernet 10MBps)
100BaseT (100Mbps)
 reasonably cheap
 reasonably easy to terminate [special crimp connector tools are
necessary for reliable operation
 UTP is prone to interference, which limits speed and distances
 category 2 = up to 1Mbps (Telephone wiring)
 category 3 = up to 10Mbps (Ethernet and 10BaseT)
 category 5 = 100MBps (supports 10BaseT and 100BaseT)

81
Network Components
Unshielded Twisted Pair cable
used in Category 5

Category 5 cable uses 8 wires. The


various jack connectors used in the
wiring closet look like

The patch cord which connects the


workstation to the wall jack looks
like,
82

Вам также может понравиться