Confidential
Network HardwareNetwork Hardware
Confidential
Types of Network TopologiesTypes of Network Topologies
BusBus
StarStar
RingRing
MeshMesh
Confidential
Bus TopologyBus Topology
1. A Bus Topology Network uses a long cable , called the BACKBONE
2. PC’s are connected to the BACKBONE with Small Cables ( called
DROP Cables ) using T-Connectors & BNC connectors .
3. To avoid Signal- Bouncing , the backbone is “Terminated” both ends
4. BUS is a Passive Topology as there are no Active electronics to
amplify the signal in this type of Network
Confidential
Bus TopologyBus Topology
1. Ethernet 10Base2 is a common BUS topology Network ( Thinnet )
Ethernet 10Base5 is known as Thicknet .
2. Cables used are Thick & Thin Co-Axial cable
3. Segment length is 185 metres for Thin Co-axial Cable ( RG-58 )&
500 metres for Thick Co-Axial Cable ( RG-11 )
4. Bandwidth is 10 MBPS
5. To increase the segment length REPEATERS are used .
Confidential
Advantages of BUS TopologyAdvantages of BUS Topology
1. The bus is simple, reliable in very small networks, easy to use & install , and easy to understand.
2. The bus requires the least amount of cable to connect the computers together and is therefore less expensive than other cabling arrangements.
3. It is easy to extend a bus. Two cables can be joined into one longer cable with a BNC barrel connector, making a longer cable and allowing more computers to join the network.
4. A repeater can also be used to extend a bus; a repeater boosts the signal and allows it to travel a longer distance.
Confidential
Disadvantages of BUS TopologyDisadvantages of BUS Topology
1. If there is any breakage in the BUS the whole network is down .
2. It is difficult to troubleshoot a bus. A cable break or malfunctioning computer anywhere between two computers can cause them not to be able to communicate with each other. A cable break or loose connector will also cause reflections and bring down the whole network, causing all network activity to stop.
Confidential
Star TopologyStar Topology
Confidential
In a star topology, all the cables run from the computers to a central location, where they are all connected by a device called a hub.
Stars are used in concentrated networks, where the endpoints are directly reachable from a central location; when network expansion is expected; and when the greater reliability of a star topology is needed.
Star TopologyStar Topology
Confidential
How a Star Network WorksHow a Star Network Works
Each computer on a star network communicates with a central hub that resends the message either to all the computers (in a broadcast star network) or only to the destination computer (in a switched star network).
An active hub regenerates the electrical signal and sends it to all the computers connected to it. This type of hub is often called a multiport repeater. Active hubs and switches require electrical power to run.
Ethernet 10baseT is a popular network based on the
star topology.
Confidential
Advantages of STAR TopologyAdvantages of STAR Topology
It is easy to modify and add new computers to a star network without disturbing the rest of the network.
Provides centralized monitoring and management of the network.
Single computer failures do not necessarily bring down the whole star Network.
Confidential
Disadvantages of STAR TopologyDisadvantages of STAR Topology
If the central hub fails, the whole network fails to operate.
It costs more to cable a star network because all network cables must be pulled to one central point, requiring more cable than other networking topologies.
Confidential
RING TopologyRING Topology
In a ring topology, each computer is connected to the next computer, with the last one connected to the first.
Confidential
How a Ring Network WorksHow a Ring Network Works
1. No terminators read.
2. Signals travels around the loop in one direction and passes through each computer .
3. It is an Active topology , because , each PC acts as a repeater to boost the signal to the next PC.
4. Because the signal passes through each PC , the failure of one PC can impact the entire network .
Confidential
5. One method of Transmitting data around the Ring is called Token passing.
6. The sending PC modifies the Token by putting electronic address on the data and sends it around the Ring .
7. The data passes through each PC until it finds the actual destination address PC that is encoded with the data .
8.The receiving PC returns a message to the sending PC indicating the receipt of data . After the acknowledgement is recd by the sending PC , it creates a new token and releases it on the network .
FDDI is a fast fiber-optic network based on the ring topology.
How a Ring Network Works (Cont.)How a Ring Network Works (Cont.)
Confidential
Advantages of RING TopologyAdvantages of RING Topology
Because every computer is given equal access to the token, no one computer can monopolize the network.
The fair sharing of the network allows the network to degrade gracefully (continue to function in a useful, if slower, manner rather than fail once capacity is exceeded) as more users are added.
Confidential
Failure of one computer on the ring can affect the whole network.
It is difficult to troubleshoot a ring network.
Adding or removing computers disrupts the network.
Advantages of RING TopologyAdvantages of RING Topology
Confidential
Mesh TopologyMesh Topology
4+3+2+1 = 10 concatenations
For 5 devices -------a Advantage :
1. Extremely fault tolerant
Disadvantage:
1. Very Complex to install & troubleshoot
2. High Cabling cost.
Confidential
Considerations When Choosing aTopology:
Money. A linear bus network may be the least expensive way to
install a network; you do not have to purchase concentrators.
Length of cable needed. The linear bus network uses shorter
lengths of cable.
Future growth. With a star topology, expanding a network is easily
done by adding another concentrator.
Cable type. The most common cable in schools is unshielded
twisted pair, which is most often used with star topologies.
Confidential
Summary Chart
Confidential
Network Media
Types of Network MediaTypes of Network Media
1. Cable Media
2. Wireless Media
Confidential
Cable Media:
1. Coaxial
2. Twisted Pair
3. Fiber-optic
Wireless Media :
1. Radio frequency
2. Microwave
3. Infrared
Confidential
CO-AXIALCO-AXIAL
Co-axial Cable (Commonly called “Coax”) is made of Two conductors that common axis , hence the name (“ co,” “axis” ). Typically the center of the cable is relatively stiff solid copper wire or stranded wire incased in insulating plastic foam . The foam is surrounded by the second conductor , a wire meshed tube ( Some include conductive foil wrap ), which serves as a shield from EMI. A tuff, insulating plastic tube forms the cover of the cable .
Confidential
1.Thin Ethernet
2.Thick Ethernet
3. Arc net
Types of Coaxial Cable:
Confidential
Parameters Thin Ethernet Thick Ethernet Arc net
Cable Code RG-58 RG-8,RG-11 RG-62
Terminator value 50 Ohm 50 Ohm 93 Ohm
Segment Length 185 Mts. 500 Mts. N / A
Connectors used BNC,T-connector AUI BNC
Data transmission rate 10 Mbps 10 Mbps 2.5 Mbps
Topology Bus Bus Star
Comparison between types of Co-axial CablesComparison between types of Co-axial Cables
Confidential
2. Twisted Pair2. Twisted Pair
Twisted pair cable uses one or more pairs of two twisted Copper wires. The twists in twisted - pair cable decrease cross talk because radiated signals from the twisted wires tend to cancel each other out.
Types of twisted-pair cables:
1. UTP
2. STP
Confidential
1. UTP (Unshielded twisted pair)
2. UTP cable consists of four pairs of twisted solid copper wires. All four pairs are colour coded and is encased in a plastic outer casing.
Normally category 3 and 5 (commonly known as CAT-3 & CAT-5) are used for computer networks . CAT-3 is meant for data transmission rate of 10 Mbps whereas CAT-5 is meant for upto 100 Mbps.
Connectors used is RJ – 45.
Topology is Physical STAR- Logical BUS
Confidential
Categories of Unshielded Twisted Pair
Confidential
2. STP (Shielded twisted pair)
STP has two pairs of color coded conductors
wrapped in a foil shielding above this shielding a
plastic encasement is provided.
STP cables are made for upto 155 Mbps data
transmission rate.
Confidential
3. Fiber optic 3. Fiber optic
Fiber optic cable is made of light-conducting glass or plastic core surrounded by more glass called Cladding, and a tuff outer sheet . The centre core provides the light path or wave-guide while the cladding is composed of varying layers of reflective glass. The Glass cladding is designed to refract light back in to the core. Each core and cladding strand is surrounded by a tight or loose sheath . Current fiber optic technologies allow data rates from 100 Mbps to 2 Gbps. Connectors used is ST connectors
Two types of fiber optic cables are available
1. Single-mode fiber ( Segment length = 40 Kms.)
2. Multi-mode fiber ( Segment length = 2 Kms.)
Confidential
SMF (Single-mode Fiber)
Narrow core through which laser-generated light travels over one path, reflecting very little
Accommodates high bandwidths and long distances
Expensive
Confidential
MMF (Multimode Fiber)
Benefits over copper cabling:
Nearly unlimited throughput
Very high resistance to noise
Excellent security
Ability to carry signals for much longer distances before
requiring repeaters than copper cable
Industry standard for high-speed networking
Confidential
MMF (continued)
Throughput: transmission rates exceed 10 Gigabits per
second
Cost: most expensive transmission medium
Connector: 10 different types of connectors
Typically use ST or SC connectors
Noise immunity: unaffected by EMI
Size and scalability: segment lengths vary from
150 to 40,000 meters
Optical loss: degradation of light signal after it travels a
certain distance away from its source
Confidential
Cable Design and Management
Cable plant: hardware making up enterprise-wide cabling
system
Structured cabling: TIA/EIA’s 568 Commercial Building
Wiring Standard
Entrance facilities point where building’s internal cabling
plant begins
Demarcation point: division between service carrier’s
network and internal network
Backbone wiring: interconnection between
telecommunications closets, equipment rooms, and
entrance facilities
Confidential
Cable Design and Management (continued)
Structured cabling (continued): Equipment room: location of significant networking
hardware, such as servers and mainframe hosts
Telecommunications closet: contains connectivity for groups of workstations in area, plus cross connections to equipment rooms
Horizontal wiring: wiring connecting workstations to closest telecommunications closet
Work area: encompasses all patch cables and horizontal wiring necessary to connect workstations, printers, and other network devices from NICs to telecommunications closet
Confidential
Installing Cable
Many network problems can be traced to poor cable installation
techniques
Two methods of inserting UTP twisted pairs into RJ-45 plugs:
TIA/EIA 568A and TIA/EIA 568B
Straight-through cable allows signals to pass “straight through”
between terminations
Crossover cable: termination locations of transmit and receive wires
on one end of cable reversed
Confidential
Wireless Transmission
Networks that transmit signals through the atmosphere via
infrared or RF waves are known as wireless networks or
wireless LANs (WLANs)
Confidential
The Wireless Spectrum
Figure : The wireless spectrum
Confidential
Characteristics of Wireless Transmission
Figure : Wireless transmission and reception
Confidential
Antennas
Radiation pattern describes relative strength over three-
dimensional area of all electromagnetic energy the antenna
sends or receives
Directional antenna issues wireless signals along a single
direction
Omnidirectional antenna issues and receives wireless
signals with equal strength and clarity in all directions
Range: geographical area an antenna or wireless system
can reach
Confidential
Signal Propagation
Figure : Multipath signal propagation
Confidential
Signal Degradation
Fading: change in signal strength resulting from
electromagnetic energy being scattered, reflected, or
diffracted after being issued by transmitter
Wireless signals experience attenuation
May be amplified and repeated
Interference is significant problem for wireless
communications
Atmosphere saturated with electromagnetic waves
Confidential
Narrowband, Broadband, and Spread Spectrum Signals
Narrowband: transmitter concentrates signal energy at
single frequency or in very small range of frequencies
Broadband: uses relatively wide band of wireless spectrum
Offers higher throughputs
Spread spectrum: use of multiple frequencies to transmit a
signal
Frequency hopping spread spectrum (FHSS)
Direct sequence spread spectrum (DSSS)
Confidential
Fixed versus Mobile
Fixed wireless system: locations of transmitter and receiver
do not move
Point-to-point link
Efficient use of signal energy
Mobile wireless system: receiver can be located anywhere
within transmitter’s range
More flexible
Confidential
Infrared Transmission
Transmitted by frequencies in the 300-GHz to 300,000-GHz
range
Most often used for communications between devices in
same room
Relies on the devices being close to each other
May require line-of-sight path
Throughput rivals fiber-optics
Confidential
Wireless LAN (WLAN) Architecture
Figure : An ad-hoc WLAN
Confidential
Wireless LAN Architecture (continued)
Figure : An infrastructure WLAN
Confidential
Wireless LAN Architecture (continued)
Figure : Wireless LAN interconnection
Confidential
NETWORK COMPONENTS OVERVIEW
Confidential
Fundamentals of LAN
• Typically Ethernet based• Star topology oriented• UTP (twisted pair) and fiber media• Conforms to IEEE 802.3 standard• Works at 10, 100, 1024 Mbps• Reduced throughput as the nodes
increase (Collision)
Confidential
IEEE Standards
An association that promotes engineering and electronic
improvement
IEEE 802 was started in February 1980
IEEE 802 committee defines frames, speed, distances and types of
cabling to use for networking
Confidential
Protocols and Procedures
Protocols are set of rules which are used by the nodes on a network to
communicate with each other
Protocols are developed by committees, different companies developed products
confirming to those protocols
Standard Protocols
Ethernet Token Ring ARCnet
Confidential
LAN Architecture - I
802.3
Defines a standard for physical layer and data link layer of the Ethernet
architecture that uses wired connection
Ethernet is an architecture that mainly uses bus topology
Defines various cabling used for different types of topologies
Confidential
LAN Architecture - II
802.4
Defines a standard for Token Bus architecture
Token bus is similar to token ring, but it uses coaxial cables
Confidential
LAN Architecture - III
802.5
Defines a standard for Token ring architecture
Uses the 10 Base T cabling standard
Uses twisted pair cabling to connect devices instead of coaxial cable
Passes data from one computer to another like in a token bus network
Confidential
IEEE 802.3 Logical relationship with OSI Reference Model
IEEE 802.3 physical layer
corresponds to the OSI physical
layer
OSI data link layer is divided into two
IEEE 802 sublayers
The Media Access Control
(MAC) sublayer
The MAC-client sublayer
Confidential
Ethernet
Defined by IEEE as the 802.3 standard
Most widely adapted LAN technology
Supports data transfer rates of 10 Mbps, 100 Mbps and 1 Gbps
Confidential
Introduction to Ethernet
Three data rates currently defined for the operation over optical fiber and
twisted-pair cables
10 Mbps – 10Base-T Ethernet
100 Mbps - Fast Ethernet
1000 Mbps - Gigabit Ethernet
Confidential
Working of Ethernet
Ethernet frame is used to transfer data over a network
Each device in an Ethernet network is uniquely identified by a 48 bit
(6 bytes) address called Ethernet address
Ethernet addresses are represented as six pairs of hexadecimal
digits separated by a colon.
Confidential
Elements of Ethernet System
Elements of Ethernet System
MediumSet of Medium Access
Control RulesEthernet frame
Confidential
Ethernet Medium
Transmits information over the network
Computer D transmits information for
Printer C
Computer B and A also receives the
information
All device inspects the destination
address
If the received frame is not meant for
them, they will reject the frame
Confidential
Data Transmission
When a computer wants to transmit, it listens to the cable
(transmission medium)
If two or more devices simultaneously transmit data on an idle
cable, collision may occur
Confidential
Example of Collision
Each device decides to broadcast
an Ethernet frame to other device
Devices listens to the Ethernet
medium and detects that no
carrier is present
Devices transmit simultaneously,
causing a collision
Confidential
Carrier Sense Multiple Access/ Collision Detection (CSMA/CD)
Permits one device to access to the network media at a time to
avoid collision
Networks using CSMA/CD technology such as Ethernet, network
devices compete for the network media
Confidential
Working of CSMA/CD
Confidential
Carrier Sensing Multiple Access / Collision Avoidance (CSMA/CA)
Set of rules that can avoid collisions, unlike CSMA/CD that handles network
transmissions once collisions are detected
In CSMA/CA, all devices are forced to wait for a random number of time
slots and sense the medium again
If the medium is sensed to be busy, the device stops the timer until it
becomes free again.
Confidential
Token Ring - I
Token Ring is a network architecture developed by IBM
Also known as IEEE 802.5
Uses logical ring topology
Multiple MAUs can be connected to extend the ring
Confidential
Token Ring - II
Data transfer is facilitated with the help of token passing mechanism
Confidential
Token Ring - III
Speed is either 4 or 16 Mbps Performance is significantly faster than Ethernet networks Uses physical star topology Hides logical ring inside a hub, known as Multistation Access Unit (MAU) Unshielded Twisted Pair (UTP) or Shielded Twisted Pair (STP) cables are
used connect nodes to the hub
Confidential
Token Ring - IV
Advantages:
Data collision does not occur
Every station is allowed to
transmit data
Time required to carry the
amount of data can be
calculated
Minimum cable requirement
Disadvantages:
System collapses if links
between nodes are
malfunctioning
No alternative link to transmit the
data
Data transmission is through
single direction
Performance degrades when
junk data is transmitted
Confidential
Token Ring Vs Ethernet
Token Ring Ethernet
Token Ring network uses token passing
mechanism.
Ethernet network use CSMA/CD mechanism.
Physical star topology is used. Any topology can be used as physical
topology.
Defined by IEEE 802.5 standard. Defined by IEEE 802.3 standard.
Devices in token ring may transmit only at
specific time.
Devices can transmit as soon as the medium is
free.
Support heavy network traffic and maintains
the network performance.
The performance of the Ethernet network
degrades as network traffic increases.
Token Ring network is deterministic. Ethernet network is not deterministic as token
ring.
Token ring network provides bandwidth
efficiency up to 90%.
Ethernet network provides bandwidth
efficiency up to 40%.
The network setup and maintenance of token
ring is expensive than Ethernet.
The cost of network equipment is lower for
Ethernet.
Confidential
Types of Ethernet
Cabling Standards
10Base5 10Base2 10Base-T 10Base-F
Confidential
10Base-5
Thick coaxial cable is also referred to as thicknet 10Base5 refers to specifications of thick coaxial cable carrying Ethernet
signals The 5 refers to the maximum segment length being 500 meters RG-8 coaxial cable is used A 15-pin female DB connector called AUI connector is used to connect the
device
Confidential
10Base-2
10Base-2 (thin coaxial cable) is also referred to as thinnet In 10Base-2, “2” refers to approximate maximum segment length of the
cable which is 185 meters 10Base2 uses RG-58 coaxial cable with BNC connectors
Confidential
10Base-T
Allows stations to be attached via twisted pair cable 10 refers to the transmission speed of 10 Mbps “T” refers to twisted pair cable In a 10BaseT network, each computer (node) is connected to a hub
Confidential
10 Base-F
Uses fiber optics
Possesses excellent noise immunity and is the method of choice when
running between buildings or widely separated hubs
10 Base-F is expensive as the connectors and terminators used in 10
Base-F are costly
Confidential
5-4-3 Rule - I
Developed to limit the size of an Ethernet collision domain. Implemented by Ethernet (IEEE 802.3) for number of repeaters and
segments on shared access The rule states that: Any two nodes in the network should not be separated
by more than 5 segments, 4 repeaters and 3 populated segments
Confidential
Network using 5-4-3 rule
5 – Specifies that maximum 5 segments can be used in the network 4 – Specifies the number of repeaters/concentrators used to connect the
network segments 3 – Specifies the number of populated segments
Confidential
Comparing Ethernet Types
Ethernet types 10Base5 10Base2 10BaseT 10BaseF
Media Type Thick coaxial
(RG8)
Thin coaxial
(RG58)
UTP Fiber-optic
Max.segment
length
(meters)
500 185 100 1000
Frequency(MHZ) 10 10 10 10
Max
Nodes/Segme
nt
100 30 1024 1024k
Confidential
Extending the network
A computer network can be extended using repeaters, hubs and bridges
In computer networks, a bridge is an Internetworking device
Repeater regenerates signal
Repeaters remove the unwanted noise in an incoming signal
A hub is a multi port repeater which provides a common point for the
connection of network devices
Confidential
Introduction to Advanced Ethernet
Ethernet is most widely used network technology
Introduced by IEEE 802.3
Ethernet systems are 10Base-T and 10Base-FL
High speed Ethernet includes
100Base Ethernet
Gigabit Ethernet
Switched Ethernet
Full Duplex Ethernet
Confidential
Features of Advanced Ethernet
Advanced Ethernet would use a physical star to match the robustness of
Token ring
It would not use more expensive coaxial cables and adopt inexpensive UTP
cabling
It would use the same frame types and speeds of the older Ethernets so
that new Ethernets will be compatible with older ones
Confidential
10BASE-T - I
Ethernet standard known as twisted pair Ethernet
Uses a star bus topology
Stations are connected to a hub using pairs of twisted cables
Features:
Failure of one system does not affect entire network
Easy troubleshooting
Addition and removal of device does not affect network
Confidential
10BASE-T Topology
It uses a physical star topology in which each node connects to a central hub The hub is a multiport repeater. It receives the signal from one port, regenerates
it and passes the signal to all the other ports
Confidential
Meaning of 10BASE-T
10 refer to 10 Mbps transmission speed, Base is for baseband signaling and
T stands for twisted pair cable
Confidential
10Base T Specifications and Limitations
Specifications include:
Fault Tolerant
Easy Troubleshooting
Easy Moves and Changes
Limitations include:
Distance
Sensitive to noise
Number of computers connected
Confidential
10BASE-FL
Ethernet standard that operates over fiber optic cable and covers a distance up
to 2 k.m.
Multimode fiber and Straight Tip (ST) connector are used to build 10Base-FL
segment
10Base FL components
Network MediumMedium Attachment
Unit (MAU)
Confidential
5-4-3 Rule - I
Developed to limit the size of an Ethernet collision domain. Implemented by Ethernet (IEEE 802.3) for number of repeaters and
segments on shared access The rule states that: Any two nodes in the network should not be separated
by more than 5 segments, 4 repeaters and 3 populated segments
Confidential
5-4-3 Rule - II
Categories of physical segments:
User segments used to connect the systems in the network. These
segments are also known as populated segments.
Link segments used to connect repeaters in the network. These segments
are also known as unpopulated segments.
Confidential
Network using 5-4-3 rule
5 – Specifies that maximum 5 segments can be used in the network 4 – Specifies the number of repeaters/concentrators used to connect the
network segments 3 – Specifies the number of populated segments
Confidential
High Speed Ethernet
Developed to increase connectivity speed between the terminals or computers in a network.
Ethernet Standards
Fast Ethernet(100Base Ethernet)
Gigabit Ethernet 10-Gigabit Ethernet
Confidential
100Base Ethernet
Supports data transfer rate up to 100 Mbps Also called as Fast Ethernet Makes use of CAT 5 cable and fiber cable
Confidential
Advantages and Disadvantages
Advantages Speed – Ten times faster than regular 10Base-T network Throughput – Faster for video, multimedia, graphics, Internet surfing and
other applications that require high speed Disadvantages Mode of data transfer – 100Base-T4 Ethernet cannot support full duplex
mode of data transfer Wiring – 100Base-T4 requires four pair of wiring for data transfer
Confidential
Gigabit Ethernet
Supports data transfer rate up to 1000 Mbit/s
Also called as 1000BASE-T Ethernet
Gigabit Ethernet
Standards
1000Base-SX 1000Base-LX 1000Base-CX 1000Base-T 1000Base-TX
Confidential
10-Gigabit Ethernet - I
Was developed by IEEE 802.3ae in 2002.
Supports data transfer rate that is ten times faster than Gigabit ethernet
Compatible with Synchronous Optical Network (SONET)
Supports segment length up to 40 Kms
Uses Media Access Control (MAC) protocol
Uses full-duplex mode of transmission and mostly run on fiber
Confidential
10-Gigabit Ethernet - II
Standards included:
10GBASE-CX4
10GBASE-T
10GBASE-SR (Short Range)
10GBASE-LRM (Long Reach Multimode)
10GBASE-LR (Long Range)
10GBASE-ER (Extended Range)
10GBASE-LX4
Confidential
Summary of Physical Layer Standard
Confidential
Summary of Physical Layer Standard (Contd)
Confidential
Switched Ethernet
Employs a switch instead of a repeater or an Ethernet hub to connect
individual hosts or segments
Uses three types of switching:
Cut-through
Store and forward
Fragment-free
Confidential
Basic Structure of Switched Ethernet
Confidential
Full-Duplex Ethernet
Devices at both ends can send and receive data at the same time
Provides twice the bandwidth of normal (half duplex) Ethernet
Each pairs of wires acts as a separate channel and allows the devices at
each end to communicate with one another in full duplex mode
Confidential
Case Study
The MoneyMaker bank has recently upgraded its Ethernet network from 10Base-T to 100Base-T network. It has also changed its cabling from CAT5 to CAT6 straight through cables and 10 Mbps NIC cards are replaced with 10/100 Mbps for future compatibility. After upgradation, some computers in the accounts department of the bank are facing the slower connectivity problems.
Confidential
Problem
Identifying problem related to cabling and crimping of RJ-45 jack for new CAT6 cables.
Confidential
Suggested Solution
Check the crimping of RJ-45 connector and configure the NIC to operate in 100 Base full duplex mode.
Confidential
Summary
Information can be transmitted via two methods: analog or digital
In multiplexing, the single medium is logically separated into multiple channels, or sub channels
Throughput is the amount of data that the medium can transmit during a given period of time
Baseband is a form of transmission in which digital signals are sent through direct current pulses applied to the wire
Noise is interference that distorts an analog or digital signal
Confidential
Summary (continued)
Analog and digital signals may suffer attenuation
Cable length contributes to latency, as does the presence
of any intervening connectivity device
Coaxial cable consists of a central copper core surrounded
by a plastic insulator, a braided metal shielding, and an
outer plastic cover (sheath)
Twisted-pair cable consists of color-coded pairs of
insulated copper wires
There are two types of twisted-pair cables: STP and UTP
Confidential
Summary (continued)
There are a number of Physical layer specifications for
Ethernet networks
Fiber-optic cable provides the benefits of very high
throughput, very high resistance to noise, and excellent
security
Fiber cable variations fall into two categories: single-mode
and multimode
Structured cabling is based on a hierarchical design that
divides cabling into six subsystems
Confidential
Summary (continued)
The best practice for installing cable is to follow the TIA/EIA
568 specifications and the manufacturer’s
recommendations
Wireless transmission requires an antenna connected to a
transceiver
Infrared transmission can be used for short-distance
transmissions
Confidential
THANK YOU