Вы находитесь на странице: 1из 135

NETWORKING TECHNOLOGIES

What is a Computer Network


• is created when two or more computers can
communicate with each other.
• is any collection of independent computers
that communicate with one another over a
shared network medium
• nothing more than two or more computers
connected to each other so that they can
exchange information, such as e-mail
messages or documents, or share resources,
such as disk storage or printers.
What is the Purpose of Networking
• Sharing information -Networks allow users to
share information in several different ways.
• Sharing resources - Certain computer resources,
such as printers or hard drives, can be set up so
that network users can share them. Sharing these
resources can result in significant cost savings.
• Sharing applications - One of the most common
reasons for networking in many businesses is so
that several users can work together on a single
business application.
Requirements of every Network Computer
• At least two computers Server or Client
workstation.
• Networking Interface Card's (NIC)
• A connection medium, usually a wire or cable,
although wireless communication between
networked computers and peripherals is also
possible.
• Network Operating system software, such as
Microsoft Windows NT or 2000, Novell
NetWare, Unix and Linux.
Category of Network
Networks can be
• PAN
categorized by • LAN
several methods, • Wireless LAN.
including the • MAN
technology used, • WAN
the size and
physical area they
cover.
PAN (personal area network)
• consists of personal devices at close
range such as a cell phone, PDA, and
notebook computer in
communication. PANs can use wired
connections (such as USB or
FireWire) or wireless connections
(such as Bluetooth or infrared).
LAN (local area network)
• covers a small local area such as a home,
office, other building, or small group of
buildings. LANs can use wired (most
likely Ethernet) or wireless (most likely
802.11, also called Wi-Fi) technologies. A
LAN is used for workstations, servers,
printers, and other devices to
communicate and share resources
Wireless LAN (WLAN)
• covers a limited geographical area,
and is popular in places where
networking cables are difficult to
install, such as outdoors, in public
places, and in homes that are not
wired for networks. They are also
useful in hotel rooms.
MAN (metropolitan area network)
• covers a large campus or city. (A small
MAN is sometimes called a CAN or campus
area network.) Newer technologies used
are wireless and Ethernet with fiber-optic
cabling. Older technologies used are ATM
and FDDI.
• ATM (Asynchronous Transfer Mode)
• FDDI (Fiber-Distributed Data Interface)
WAN (wide area network)
• covers a large geographical area and is
made up of many smaller networks. The
best-known WAN is the Internet. Some
technologies used to connect a single
computer or LAN to the Internet include
DSL, cable modem, satellite, cellular
WAN, and fiber optic.
Bandwidth
• Networks are built using one or more
technologies that provide varying degrees
of bandwidth.
• Bandwidth (the width of the band) is the
theoretical number of bits that can be
transmitted over a network at one time,
similar to the number of lanes on a
highway.
What is the purpose of Bandwidth
• In practice, however, the networking industry refers
to bandwidth as a measure of the maximum rate of
data transmission in bits per second (bps),
thousands of bits per second (Kbps), millions of bits
per second (Mbps), or billions of bits per second
(Gpbs). Bandwidth is the theoretical or potential
speed of a network, whereas data throughput is the
actual speed.
• In practice, network transmissions experience
delays that result in slower network performance.
Latency – Network transmission delay

• Latency is measured by the round-


trip time it takes for a data packet to
travel from source to destination and
back to source.
Internet Service Provider (ISP)
• it refers to a company that provides Internet
services, including personal and business access
to the Internet. For a monthly fee, the service
provider usually provides a software package,
username, password and access phone number.
Equipped with a modem, you can then log on to
the Internet and browse the World Wide
Web and USENET, and send and receive e-mail.
For broadband access you typically receive the
broadband modem hardware or pay a monthly
fee for this equipment that is added to your ISP
account billing.
ISP –SET UP
List of Network Technology
Technology Maximum Speeds Common Uses
Wireless Networks
Bluetooth 2.0 (BT2) Up to 2 Mbps Short-range wireless technology
used for
a PAN (personal area network).
GSM mobile phone Up to 3 Mbps Cellular wireless technology used
service for
voice and data transmissions over
mobile phones; first became
popular in
Europe.
CDMA mobile Up to 3 Mbps Cellular wireless technology used
phone service for
(Code Division mobile phones; losing popularity.
Multi. Access)
List of Network Technology
G3 mobile phone service Up to 2.4 Mbps Cellular mobile phone technology
allows for transmitting data, video,
and text.
Wi-Fi 802.11b wireless Up to 11 Mbps First 802.11 standard that was
widely
used, but is being replaced by
802.11g
and n.
Bluetooth 3.0 (BT3) Up to 24 Mbps Latest Bluetooth standard just
released
that is not yet available in devices.
Wi-Fi 802.11a wireless Up to 54 Mbps Shorter range than 802.11b, but
faster.
Wi-Fi 802.11g wireless Up to 54 Mbps Compatible with and replacing
802.11b.
List of Network Technology
802.16 wireless (WiMAX) Up to 75 Mbps Offers ranges up to 6 miles.
802.11n wireless Up to 160 Mbps Latest Wi-Fi technology.
Wired Networks
Dial-up or regular Up to 56 Kbps Slow access to an ISP using a
telephone Up to 56 Kbps modem
Slow access to an ISP using and dial-up connection
a modem
(POTS, for plain old and
dial-up connection.
telephone service)
SDSL (Symmetric Digital Up to 2.3 Mbps Equal bandwidths in both directions.
Up to 2.3 Mbps Equal Subscriber Line) SDSL is a type of
bandwidths in both broadband technology.
(Broadband refers to a networking
directions.
technology
Subscriber Line) that carries more than one type
of signal, such as DSL and telephone.)
BROADBAND TECHNOLOGIES
• Broadband • Types of broadband
technologies a high technology:
data rate
• cable modem
transmission used to
connect to the • DSL
Internet. • fiber-optic
• Satellite
• ISDN
Cable modem
• communication uses cable lines that already exist in
millions of households. Just as with cable TV, cable
modems are always connected (always up).
• With a cable modem, the TV signal to your television
and the data signals to your PC share the same coax
cable.
• Just like a dial-up modem, a cable modem converts a
PC’s digital signals to analog when sending them and
converts incoming analog data to digital.
Cable modem Set-up
DSL (Digital Subscriber Line)
• is a group of broadband technologies that
covers a wide range of speeds.
• uses ordinary copper phone lines and a range
of frequencies on the copper wire that are not
used by voice, making it possible for you to
use the same phone line for voice and DSL at
the same time.
DSL – setup
SATELLITE Internet Access
• is Internet access provided through satellites. The
service can be provided to users world-wide
through Low Earth Orbit (LEO) satellites.
•  Geostationary satellites can offer higher data speeds,
but their signals cannot reach some polar regions of
the world.
• Different types of satellite systems have a wide range
of different features and technical limitations, which
can greatly affect their usefulness and performance
in specific applications.
SATELLITE Internet Access setup
What is Fiber Optic Technology?
• A technology that uses glass (or plastic)
threads (fibers) to transmit data.
• A fiber optic cable consists of a bundle of glass
threads, each of which is capable of
transmitting messages modulated onto light
waves.
Fiber Optic Cable
DEDICATED INTERNET LINE USING
FIBER OPTIC
• The technology uses a dedicated fiber optic line
from the ISP to the place of business or
residence.
• This dedicated line is called a point-to-point
(PTP) connection because no other business or
residence shares the fiber optic line.
• Many types of cabling can be used for dedicated
lines, but fiber-optic cabling is becoming
popular.
Fiber Optic Internet setup
Check Point
• When using DSL to connect to the Internet,
the data transmission shares the cabling with
what other technology?
• When using a cable modem to connect to the
Internet, the data transmission shares the
cabling with what other technology?
• Among satellite, cable modem, and DSL,
which technology experiences more latency?
WI-FI OR 802.11 WIRELESS
• By far, the most popular technology for
wireless local networks is IEEE 802.11, first
published in 1990.
• These standards are also called Wi-Fi
(Wireless Fidelity).
• Most wireless devices today support three
IEEE standards; look for 802.11b/g/n on the
packages.
Several IEEE 802.11 Standard
• 802.11g and 802.11b
• 802.11n
• 802.11a
• 802.11k and 802.11r
• 802.11d
Wireless 802.11g and 802.11b
• These two standards use a frequency range of
2.4 GHz in the radio band and have a distance
range of about 100 meters.
• 802.11b/g has the disadvantage that many
cordless phones use the 2.4-GHz frequency
range and cause network interference.
• 802.11g runs at 54 Mbps and 802.11b runs at
11 Mbps.
Wireless 802.11n
• This latest Wi-Fi standard uses multiple
input/multiple output (MIMO) technology
whereby two or more antennas are used at
both ends of transmission.
• 802.11n can use the 2.4 GHz range and be
compatible with 802.11b/g, or it can use the
5.0 GHz range and be compatible with the
older 802.11a standard.
Wireless 802.11n
Wireless 802.11a
• This standard is no longer widely used.
• It works in the 5.0-GHz frequency range and
is, therefore, not compatible with 802.11b/g.
• It has a shorter range from a wireless device
to an access point (50 meters compared with
100 meters for 802.11b/g), supports 54 Mbps,
and does not encounter interference from
cordless phones, microwave ovens, and
Bluetooth devices, as does 802.11b/g.
Wireless 802.11a HUB
Wireless 802.11k and 802.11r
• These two standards were designed to help manage
connections between wireless devices and access
points.
• The 802.11k standard defines how wireless network
traffic can better be distributed over multiple access
points covering a wide area so that the access point
with the strongest signal is not overloaded.
• The 802.11r standard defines how a mobile wireless
device can easily and quickly transition as it moves
out of range of one access point and into the range
of another.
Wireless 802.11k and 802.11r
Wireless 802.11d
• This standard is designed to run in countries
outside the United States where other 802.11
versions do not meet the legal requirements
for radio band technologies.
WIMAX OR 802.16 WIRELESS
• A newer IEEE wireless standard is WiMAX,
which is defined under IEEE 802.16d and
802.16e.
• WiMAX supports up to 75 Mbps with a range
up to several miles and uses 2- to 11-GHz
frequency.
WiMax range
• For a wide-area network such as: WiMAX
cellular towers - generally placed 1.5 miles
apart to assure complete coverage.
• WiMAX is used in wide-area public hot spots
and as a wireless broadband solution for
business and residential use.
CELLULAR WAN
• A cellular network or cellular WAN can be
used when a wireless network must cover a
wide area.
• The network consists of cells and each cell is
controlled by a base station
• The base station is a fixed transceiver and
antenna
CELLULAR WAN
Cell phone Technology networks
• GSM (Global System for Mobile
Communications) is an open standard that uses
digital communication of data, and is accepted
and used worldwide.
• CDMA (Code Division Multiple Access) is used by
most cell phone service providers in the United
States for domestic calls.
• TDMA (Time Division Multiple Access) is an
older, outdated technology used in the United
States.
Categories of Network according
to connections
• Peer-to-peer connection.
• Server – based connection.
Peer-to-peer
• In peer-to-peer networking there are no
dedicated servers or hierarchy among the
computers.
• All of the computers are equal and therefore
known as peers.
• Normally each computer serves as Client/Server
and there is no one assigned to be an
administrator responsible for the entire
network.
Server – based.
• The term Client/server refers to the concept
of sharing the work involved in processing
data between the client computer and the
most powerful server computer.
Advantage of client/server network
• Databases and management of applications
such as Spreadsheets, Accounting,
Communications and Document
management.
• Network management.
• Centralized file storage.
The OSI Model
• Open System Interconnection (OSI) reference model has become
an International standard and serves as a guide for networking.
• This model is the best known and most widely used guide to
describe networking environments.
• Vendors design network products based on the specifications of
the OSI model.
• It provides a description of how network hardware and software
work together in a layered fashion to make communications
possible.
• It also helps with trouble shooting by providing a frame of
reference that describes how components are supposed to
function.
The OSI Model
7 layers of OSI Model
• Physical Layer
• Data Link Layer
• Network Layer
• Transport Layer
• Session Layer
• Presentation Layer
• Application Layer
Physical Layer
• is just that the physical parts of the network
such as wires, cables, and there media along
with the length. Also this layer takes note of
the electrical signals that transmit data
throughout system.
Data Link Layer
• this layer is where we actually assign meaning
to the electrical signals in the network.
• The layer also determines the size and format
of data sent to printers, and other devices.
Also called nodes in the network.
• This layer will also allow and define the error
detection and correction schemes that insure
data was sent and received.
Network Layer
• this layer provides the definition for the
connection of two dissimilar networks.
• is responsible for establishing paths for data
transfer through the network.
• is also responsible for packet sequencing,
congestion control, and error handling.
Transport Layer
• this layer allows data to be broken into smaller
packages for data to be distributed and addressed to
other nodes (workstations).
• provides end-to-end communication services for
applications within a layered architecture of network
components and protocols.
• The transport layer provides convenient services
such as connection-oriented data stream support,
reliability, flow control, and multiplexing.
Session Layer
• this layer helps out with the task to carry
information from one node (workstation) to
another node (workstation).
• A session has to be made before we can
transport information to another computer.
• It responds to service requests from the
presentation layer and issues service requests
to the transport layer.
Presentation Layer
• this layer is responsible to code and decode
data sent to the node.
• is responsible for defining the syntax which
two network hosts use to communicate.
• resides above the Session Layer and below the
Application Layer.
Application Layer
• this layer allows you to use an application that
will communicate with say the operation
system of a server.
• A good example would be using your web
browser to interact with the operating system
on a server such as Windows NT, which in turn
gets the data you requested.
OSI MODEL Data Flow
LEVELS OF NETWORK
COMMUNICATION
• When your computer at home is connected to
your ISP off somewhere in the distance, your
computer and a computer on the Internet are
communicating at the application, operating
system, and hardware levels.
• The computers need a way to address each
other at each level.
3 LEVELS IN NETWORK
COMMUNICATION
• Level 1: Hardware level.
• Level 2: Operating system level.
• Level 3: Application level.
Hardware level
• At the root level of communication is hardware.
• The hardware or physical connection might be
wireless or might use network cables, phone
lines (for DSL or dial-up), or TV cable lines (for
cable modem).
• For local wired or wireless networks, a network
adapter inside your computer is part of this
physical network.
Flow of Network Communication
Operating system level
• An OS is responsible for managing
communication between itself and another
computer, using rules for communication that
both operating systems understand.
Application level
• When you use the Internet to surf the Web or
download your e-mail, you are using an application
on your computer called an Internet client.
• The client communicates with another application
somewhere on the Internet, called a web server.
• The client and server applications are each assigned
a number that uniquely identifies the application
on the computer.
Understanding Protocols
• A protocol is a set of rules that enables
effective communications to occur.
Making Phone call protocol
• Pick-up the hand set.
• Listen for a dial tone before dialing the number.
• After hearing dial tone.
• Initiate a call by dialing a number.
» Local call or Long Distance call
• Wait until you hear a series of long ringing tones.
• Wait until the other person answers the phone.
• If you hear a voice say, “Hello,”
• you can begin a conversation with the other party.
Computer Protocol
• Computer networks depend upon many different types
of protocols in order to work.
• These protocols are very rigidly defined, and for good
reason.
• Network cards must know how to talk to other network
cards in order to exchange information.
• Operating systems must know how to talk to network
cards in order to send and receive data on the network.
• Application programs must know how to talk to
operating systems in order to know how to retrieve a file
from a network server.
Understanding Standards
• A standard is an agreed-upon definition of a
protocol.
• In the early days of computer networking, each
computer manufacturer developed its own networking
protocols. As a result, you weren’t able to easily mix
equipment from different manufacturers on a single
network.
• Standards are industry-wide protocol definitions that are
not tied to a particular manufacturer.
• With standard protocols, you can mix and match
equipment from different vendors.
Organizations involved in setting
standards for networking
• American National Standards Institute (ANSI)
• Institute of Electrical and Electronics
Engineers (IEEE)
• International Organization for
Standardization (ISO)
• Internet Engineering Task Force (IETF)
• World Wide Web Consortium (W3C)
Network Protocols
• Network protocols are standards that allow
computers to communicate
• A protocol defines how computers identify
one another on a network, the form that the
data should take in transit, and how this
information is processed once it reaches its
final destination.
Important networking Protocols

Protocol Acronym Its Job

Point-To-Point TCP/IP The backbone protocol of the


internet. Popular also for intranets
using the internet
Transmission Control TCP/IP The backbone protocol of the
Protocol/internet internet. Popular also for intranets
Protocol using the internet
Internetwork Package IPX/SPX This is a standard protocol for
Exchange/Sequenced Novell Network Operating System
Packet Exchange
NetBIOS Extended User NetBEUI This is a Microsoft protocol that
Interface doesn't support routing to other
networks
File Transfer FTP Used to send and receive files
Protocol from a remote host

Hyper Text HTTP Used for the web to send


Transfer documents that are encoded in HTML.
Protocol
Network File NFS Allows network nodes or workstations
Services to access files and drives as if they were
their own.
Simple Mail SMTP Used to send Email over a network
Transfer
Protocol
Telnet   Used to connect to a host and emulate
a
terminal that the remote server can
recognize
What Is TCP/IP?
• TCP stands for Transmission Control Protocol
and IP stands for Internet Protocol.
• The term TCP/IP is not limited just to these
two protocols, however.
• Frequently, the term TCP/IP is used to refer to
a group of protocols related to the TCP and IP
protocols such as the User Datagram Protocol
(UDP), File Transfer Protocol (FTP), Terminal
Emulation Protocol (TELNET), and so on.
The Origins of TCP/IP
• In the late 1960s, DARPA (the Defense Advanced Research
Project Agency), in the United States, noticed that there
was a rapid proliferation of computers in military
communications. Computers, because they can be easily
programmed, provide flexibility in achieving network
functions that is not available with other types of
communications equipment. The computers then used in
military communications were manufactured by different
vendors and were designed to interoperate with
computers from that vendor only. Vendors used
proprietary protocols in their communications equipment.
The military had a multi vendor network but no common
protocol to support the heterogeneous equipment from
different vendors
Common TCP/IP port assignments
for client/server applications
Port Protocol Service Description
20 FTP FTP File transfer data.
21 FTP FTP File transfer control information.
22 SSH Secure Remote control to a networked computer that
Shell includes encrypting transmitted login information
and data.
23 Telnet Telnet Remote control to a networked computer from a
command prompt that does not use encryption.
25 SMTP Email Simple Mail Transfer Protocol; used by a client to
send e-mail.
53 DNS DNS Domain Name Service; used to find an IP address
server when a computer’s character-based name is known.
80 HTTP Web World Wide Web protocol.
server
Port Protocol Service Description

110 POP3 Email Post Office Protocol, version 3; used by a client


to receive e-mail.
143 IMAP Email Internet Message Access Protocol, a newer protocol
used by clients to receive e-mail.
443 HTTPS Web HTTP with added security that includes authentication
server and encryption.
3389 RDP Remote Remote Desktop Protocol used to connect to a
Desktop computer. Transmissions are encrypted. Remote
Desktop and Remote Assistance both use RDP.
Function and Purpose of TCP/IP

•  is the basic communication language or


protocol of the Internet. 
• It can also be used as a communications
protocol in a private network (either
an intranet or an extranet).
– When we set up with direct access to the Internet,
computer is provided with a copy of the TCP/IP program
just as every other computer that send messages to or get
information from also has a copy of TCP/IP.
Two-layer Program in TCP/IP
• Transmission Control Protocol -The higher layer
• Internet Protocol – The lower layer
Transmission Control Protocol
• Transmission Control Protocol -The higher layer
– manages the assembling of a message or file into
smaller packets that are transmitted over the
Internet and received by a TCP layer that
reassembles the packets into the original
message. 
Internet Protocol
• handles the address part of each packet so that
it gets to the right destination. 
– Each gateway computer on the network checks this address
to see where to forward the message. Even though some
packets from the same message are routed differently than
others, they'll be reassembled at the destination.
Flow of Packets
UNDERSTANDING IP ADDRESSES
AND HOW THEY ARE USED
• An IP address is 32 bits long, made up of 4
bytes, each 8 bits long.
• IP address is expressed as four decimal
numbers separated by periods.
• as in this address: 190.180.40.120.
• The largest possible 8-bit number is 11111111.
• The largest possible IP address in decimal is
255.255.255.255
Parts of the IP address
• The first part of an IP
address identifies
the network
• The last part
identifies the host.
– Example :
– 102.168.212.226
– 168.212.226.204
– 190.180.40.120
CLASSES OF IP ADDRESS
• Class A Network IP Address
• Class B Network IP Address
• Class C Network IP Address
• Class D Network IP Address
• Class E Network IP Address
Class A Network
• Binary address start with 0, therefore the
decimal number can be anywhere from 1 to
126. 
• The first 8 bits (the first octet) identify the
network and the remaining 24 bits indicate
the host within the network.
• An example of a Class A IP address is 102.168.212.226,
where "102" identifies the network and "168.212.226"
identifies the host on that network.
Class B Network
• Binary addresses start with 10, therefore the
decimal number can be anywhere from 128 to
191.
• The first 16 bits (the first two octets) identify
the network and the remaining 16 bits
indicate the host within the network. 
•  An example of a Class B IP address is 168.212.226.204
where "168.212" identifies the network and "226.204"
identifies the host on that network.
Class C Network
•  Binary addresses start with 110, therefore the
decimal number can be anywhere from 192 to
223.
• The first 24 bits (the first three octets) identify
the network and the remaining 8 bits indicate
the host within the network.
• An example of a Class C IP address is 200.168.212.226
where "200.168.212" identifies the network and "226"
identifies the host on that network.
Class D Network
• Binary addresses start with 1110, therefore
the decimal number can be anywhere from
224 to 239.
• Class D networks are used to support
multicasting.
• multicast is the delivery of a message or information to
a group of destination computers simultaneously in a
single transmission from the source creating copies
automatically in other network elements, such as
routers, only when the topology of the network
requires it.
Class E Network
• Binary addresses start with 1111, therefore
the decimal number can be anywhere from
240 to 255.
• Class E networks are used for
experimentation. They have never been
documented or utilized in a standard way.
Network Cables and Connectors
• Several variations of Ethernet cables and
connectors have evolved over the years, and
are primarily identified by their speeds and
the types of connectors used to wire these
networks.
•Ethernet is a protocol that controls the way
data is transmitted over a local area
network (LAN).
• It uses wires (meaning it is not a wireless
technology).
Types of Network Cables and
Connectors
• Thick Coaxial Cable
• Thin Coaxial Cable
• Fiber Optic Cable
• Twisted Pair Cables
• Shielded Twisted Pair (STP)
• Unshielded Twisted Pair (UTP)
Thick coaxial
• Thick coaxial cable is also referred to as
thicknet.
• 10Base5 refers to the specifications for
thick coaxial cable carrying Ethernet
signals.
• The 5 refers to the maximum segment
length being 500 meters.
• Thick coaxial cable has an extra protective
plastic cover that helps keep moisture
away from the center conductor.
• This makes thick coaxial a great choice
when running longer lengths in a linear
bus network.
• One disadvantage of thick coaxial is that it
does
Thin Coaxial Cable
• Thin coaxial cable is also
referred to as thinnet.
10Base2 refers to the
specifications for thin coaxial
cable carrying Ethernet
signals. The 2 refers to the
approximate maximum
segment length being 200
meters. In actual fact the
maximum segment length is
185 meters.
Connectors for Thick and Thin
Coaxial cables
Fiber Optic Cable
• Fiber optic cabling consists of a
center glass core surrounded by
several layers of protective
materials
• It transmits light rather than
electronic signals eliminating
the problem of electrical
interference. This makes it ideal
for certain environments that
contain a large amount of
electrical interference. It has
also made it the standard for
connecting networks between
Four types of fiber-optic
connectors
Shielded Twisted Pair Cables
• Shielded Twisted Pair (STP)
-Is more common in high-
speed networks. The
biggest difference you will
see in the UTP and STP is
that the STP use's metallic
shield wrapping to protect
the wire from interference.
Unshielded Twisted Pair (UTP

• Unshielded Twisted Pair (UTP) This


is the most popular form of cables
in the network and the cheapest
form that you can go with. The
UTP has four pairs of wires and all
inside plastic sheathing. The
biggest reason that we call it
Twisted Pair is to protect the wires
from interference from
themselves. Each wire is only
protected with a thin plastic
sheath.
STP, UTP CABLE AND RJ-45
CONNECTOR
Network Cable or Patch Cable
• Types of Network or Patch Cable
– Standard or Straight Trough cable
– Cross Over cable
\
Standard or Straight Trough cable
• A straight-through cable is where the pins on
one side of the connector are wired to the
same pins on the other end. It is used for
interconnecting nodes on the network.
Standard or Straight Trough cable
Uses of straight-through cable
1. Connecting a router to a hub
2. Connecting a computer to a swtich
3.  Connecting a LAN port to a switch, hub, or
computer
Straight Trough cable connection

Computer to Switch

Router to Hub

Computer to Hub
Crossover cable
• Directly connects two network devices of the
same type to each other over Ethernet.
• Ethernet crossover cables are commonly used
when temporarily networking two devices in
situations where a network
router, switch or hub is not present.
Crossover cable
Uses of crossover cable
•  Connecting a computer to a router
•  Connecting a computer to a computer
•  Connecting a router to a router
•  Connecting a switch to a switch
•  Connecting a hub to a hub
Crossover cable connection

Computer to computer

Computer to router Switch to Switch

Hub to Hub
Router to Router
Steps and Procedure
1) Start by stripping off about 2 inches of the plastic jacket
off the end of the cable.
Be very careful at this point, as to not nick or cut into
the wires, which are inside. Doing so could alter the
characteristics of your cable, or even worse render is
useless. Check the wires, one more time for nicks or cuts.
If there are any, just whack the whole end off, and start
over.
2) Spread the wires apart, but be sure to
hold onto the base of the jacket with your
other hand.
3) Decide which end you are making and
examine the associated wiring guide.

568a -
Crossed
standard end
over end
(you will need
wire pattern
one of the ends
(you will
on
want the
your cable to
other end to
look like this)
look
like this)
568a - standard Crossed over
end end wire pattern
(you will need (you will want
one of the ends the other end to
on look
your cable to like this)
look like this)
Do’s and Don'ts in making Network
cable
• Begin to untwist the twisted exposed wires on
your cable
• Use caution so that you do not untwist them
down inside the jacket.
• Once you have all the wires untwisted begin
to arrange them in the proper order based on
the pictures above.
Do’s and Don'ts in making Network
cable
• Once you get all the wired arranged in the
proper order, make sure your wire cutters are
within reach then grasp them right at the
point where they enter the jacket.
• Be sure at this point that you are both 1/2
inch above the jacket, and that your cutters
are aligned straight across the wires.
• Line them up along your prepared wires about
1/2 inch above the jacket.
• 4) Grab your jack, and begin to slide the wires into the jack
about 3/8 of an inch of the jacket will be inside the jack. Like
the pictures below.
• 5) Grab those crimpers - Be sure to keep a
good grip on the jack and the cable. Insert the
jack into the crimper. It should only go in one
way, Begin to compress those crimpers. You
will hear a clicking sound.

Insert the jack into the crimper Crimp it! Crimp it good
6) Examine the cable .
Look at the end of the jack, you should see that the copper
connectors should not be pressed down into the wires.
Toward the back of the jack (where the jacket meets the jack)
it should be crimped securely holding the jacket / cable in the
jack. If something has gone wrong, don't worry, its not the
end of the world. Grab those cutters, and just whack the
whole jack off and start back at step 1 so go back to step one,
and make the other end.
Ethernet and Ethernet Cables
Cable System Speed Cables and Connectors Medium Cable
Length
10Base2
(ThinNet)
What is Network Architectures
• is the logical and structural layout of the
network consisting of transmission
equipment, software and communication
protocols and infrastructure (wired or
wireless) transmission of data and
connectivity between components .
• is the design of a communications network.
What is the purpose of Network
Architecture
• To make better communication and decrease
the administrative task.
• To avoid error and conflict in between
network.
• To provide better security for data.
• To avoid misuse for data and services.
• To implement Server structure and software
deployment services.

Вам также может понравиться