What is Network Cabling?
Cable is the medium through which information usually moves from
one network device to another. There are several types of cable which
are commonly used with LANs. In some cases, a network will utilize only
one type of cable, other networks will use a variety of cable types. The
type of cable chosen for a network is related to the network's
topology, protocol, and size. Understanding the characteristics of
different types of cable and how they relate to other aspects of a
network is necessary for the development of a successful network.
The following sections discuss the types of cables used in networks and other related topics.
- Unshielded Twisted Pair (UTP) Cable
- Shielded Twisted Pair (STP) Cable
- Coaxial Cable
- Fiber Optic Cable
- Cable Installation Guides
- Wireless LANs
- Unshielded Twisted Pair (UTP) Cable
Twisted pair cabling comes in two varieties: shielded and
unshielded. Unshielded twisted pair (UTP) is the most popular and is
generally the best option for school networks (See fig. 1).
Fig.1. Unshielded twisted pair
The quality of UTP may vary from telephone-grade wire to
extremely high-speed cable. The cable has four pairs of wires inside the
jacket. Each pair is twisted with a different number of twists per inch
to help eliminate interference from adjacent pairs and other electrical
devices. The tighter the twisting, the higher the supported
transmission rate and the greater the cost per foot. The EIA/TIA
(Electronic Industry Association/Telecommunication Industry Association)
has established standards of UTP and rated six categories of wire
(additional categories are emerging).
Categories of Unshielded Twisted Pair
Category | Speed | Use |
---|---|---|
1 | 1 Mbps | Voice Only (Telephone Wire) |
2 | 4 Mbps | LocalTalk & Telephone (Rarely used) |
3 | 16 Mbps | 10BaseT Ethernet |
4 | 20 Mbps | Token Ring (Rarely used) |
5 | 100 Mbps (2 pair) | 100BaseT Ethernet |
1000 Mbps (4 pair) | Gigabit Ethernet | |
5e | 1,000 Mbps | Gigabit Ethernet |
6 | 10,000 Mbps | Gigabit Ethernet |
Unshielded Twisted Pair Connector
The standard connector for unshielded twisted pair cabling is an
RJ-45 connector. This is a plastic connector that looks like a large
telephone-style connector (See fig. 2). A slot allows the RJ-45 to be
inserted only one way. RJ stands for Registered Jack, implying that the
connector follows a standard borrowed from the telephone industry. This
standard designates which wire goes with each pin inside the connector.
Fig. 2. RJ-45 connector
Shielded Twisted Pair (STP) Cable
Although UTP cable is the least expensive cable, it may be
susceptible to radio and electrical frequency interference (it should
not be too close to electric motors, fluorescent lights, etc.). If you
must place cable in environments with lots of potential interference, or
if you must place cable in extremely sensitive environments that may be
susceptible to the electrical current in the UTP, shielded twisted pair
may be the solution. Shielded cables can also help to extend the
maximum distance of the cables.
Shielded twisted pair cable is available in three different configurations:
- Each pair of wires is individually shielded with foil.
- There is a foil or braid shield inside the jacket covering all wires (as a group).
- There is a shield around each individual pair, as well as around the entire group of wires (referred to as double shield twisted pair).
Coaxial Cable
Coaxial cabling has a single copper conductor at its center. A
plastic layer provides insulation between the center conductor and a
braided metal shield (See fig. 3). The metal shield helps to block any
outside interference from fluorescent lights, motors, and other
computers.
Fig. 3. Coaxial cable
Although coaxial cabling is difficult to install, it is highly
resistant to signal interference. In addition, it can support greater
cable lengths between network devices than twisted pair cable. The two
types of coaxial cabling are thick coaxial and thin coaxial.
Thin coaxial cable is also referred to as thinnet. 10Base2
refers to the specifications for thin coaxial cable carrying Ethernet
signals. The 2 refers to the approximate maximum segment length being
200 meters. In actual fact the maximum segment length is 185 meters.
Thin coaxial cable has been popular in school networks, especially
linear bus networks.
Thick coaxial cable is also referred to as thicknet. 10Base5
refers to the specifications for thick coaxial cable carrying Ethernet
signals. The 5 refers to the maximum segment length being 500 meters.
Thick coaxial cable has an extra protective plastic cover that helps
keep moisture away from the center conductor. This makes thick coaxial a
great choice when running longer lengths in a linear bus network. One
disadvantage of thick coaxial is that it does not bend easily and is
difficult to install.
Coaxial Cable Connectors
The most common type of connector used with coaxial cables is
the Bayone-Neill-Concelman (BNC) connector (See fig. 4). Different types
of adapters are available for BNC connectors, including a T-connector,
barrel connector, and terminator. Connectors on the cable are the
weakest points in any network. To help avoid problems with your network,
always use the BNC connectors that crimp, rather screw, onto the cable.
Fig. 4. BNC connector
Fiber Optic Cable
Fiber optic cabling consists of a center glass core surrounded
by several layers of protective materials (See fig. 5). It transmits
light rather than electronic signals eliminating the problem of
electrical interference. This makes it ideal for certain environments
that contain a large amount of electrical interference. It has also made
it the standard for connecting networks between buildings, due to its
immunity to the effects of moisture and lighting.
Fiber optic cable has the ability to transmit signals over much
longer distances than coaxial and twisted pair. It also has the
capability to carry information at vastly greater speeds. This capacity
broadens communication possibilities to include services such as video
conferencing and interactive services. The cost of fiber optic cabling
is comparable to copper cabling; however, it is more difficult to
install and modify. 10BaseF refers to the specifications for fiber optic
cable carrying Ethernet signals.
The center core of fiber cables is made from glass or plastic
fibers (see fig 5). A plastic coating then cushions the fiber center,
and kevlar fibers help to strengthen the cables and prevent breakage.
The outer insulating jacket made of teflon or PVC.
Fig. 5. Fiber optic cable
There are two common types of fiber cables -- single mode and
multimode. Multimode cable has a larger diameter; however, both cables
provide high bandwidth at high speeds. Single mode can provide more
distance, but it is more expensive.
Specification | Cable Type |
---|---|
10BaseT | Unshielded Twisted Pair |
10Base2 | Thin Coaxial |
10Base5 | Thick Coaxial |
100BaseT | Unshielded Twisted Pair |
100BaseFX | Fiber Optic |
100BaseBX | Single mode Fiber |
100BaseSX | Multimode Fiber |
1000BaseT | Unshielded Twisted Pair |
1000BaseFX | Fiber Optic |
1000BaseBX | Single mode Fiber |
1000BaseSX | Multimode Fiber |
Installing Cable - Some Guidelines
When running cable, it is best to follow a few simple rules:
- Always use more cable than you need. Leave plenty of slack.
- Test every part of a network as you install it. Even if it is brand new, it may have problems that will be difficult to isolate later.
- Stay at least 3 feet away from fluorescent light boxes and other sources of electrical interference.
- If it is necessary to run cable across the floor, cover the cable with cable protectors.
- Label both ends of each cable.
- Use cable ties (not tape) to keep cables in the same location together.
Wireless LANs
More and more networks are operating without cables, in the
wireless mode. Wireless LANs use high frequency radio signals, infrared
light beams, or lasers to communicate between the workstations, servers,
or hubs. Each workstation and file server on a wireless network has
some sort of transceiver/antenna to send and receive the data.
Information is relayed between transceivers as if they were physically
connected. For longer distance, wireless communications can also take
place through cellular telephone technology, microwave transmission, or
by satellite.
Wireless networks are great for allowing laptop computers,
portable devices, or remote computers to connect to the LAN. Wireless
networks are also beneficial in older buildings where it may be
difficult or impossible to install cables.
The two most common types of infrared communications used in
schools are line-of-sight and scattered broadcast. Line-of-sight
communication means that there must be an unblocked direct line between
the workstation and the transceiver. If a person walks within the
line-of-sight while there is a transmission, the information would need
to be sent again. This kind of obstruction can slow down the wireless
network. Scattered infrared communication is a broadcast of infrared
transmissions sent out in multiple directions that bounces off walls and
ceilings until it eventually hits the receiver. Networking
communications with laser are virtually the same as line-of-sight
infrared networks.
Wireless standards and speeds
The Wi-Fi Alliance is a global, non-profit organization that
helps to ensure standards and interoperability for wireless networks,
and wireless networks are often referred to as WiFi (Wireless Fidelity).
The original Wi-Fi standard (IEEE 802.11) was adopted in 1997. Since
then many variations have emerged (and will continue to emerge). Wi-Fi
networks use the Ethernet protocol.
Standard | Max Speed | Typical Range |
---|---|---|
802.11a | 54 Mbps | 150 feet |
802.11b | 11 Mbps | 300 feet |
802.11g | 54 Mbps | 300 feet |
802.11n | 100 Mbps | 300+ feet |
Wireless Security
Wireless networks are much more susceptible to unauthorized use
than cabled networks. Wireless network devices use radio waves to
communicate with each other. The greatest vulnerability to the network
is that rogue machines can "eves-drop" on the radio wave communications.
Unencrypted information transmitted can be monitored by a third-party,
which, with the right tools (free to download), could quickly gain
access to your entire network, steal valuable passwords to local servers
and online services, alter or destroy data, and/or access personal and
confidential information stored in your network servers. To minimize the
possibility of this, all modern access points and devices have
configuration options to encrypt transmissions. These encryption
methodologies are still evolving, as are the tools used by malicious
hackers, so always use the strongest encryption available in your access
point and connecting devices.
A NOTE ON ENCRYPTION: As of this writing WEP (Wired Equivalent
Privacy) encryption can be easily hacked with readily-available free
tools which circulate the internet. WPA and WPA2 (WiFi Protected Access
versions 1 and 2) are much better at protecting information, but using
weak passwords or passphrases when enabling these encryptions may allow
them to be easily hacked. If your network is running WEP, you must be
very careful about your use of sensitive passwords or other data.
Three basic techniques are used to protect networks from
unauthorized wireless use. Use any and all of these techniques when
setting up your wireless access points:
- Encryption.
- Enable the strongest encryption supported by the devices you will be connecting to the network. Use strong passwords (strong passwords are generally defined as passwords containing symbols, numbers, and mixed case letters, at least 14 characters long).
- Isolation.
- Use a wireless router that places all wireless connections on a subnet independent of the primary private network. This protects your private network data from pass-through internet traffic.
- Hidden SSID.
- Every access point has a Service Set IDentifier (SSID) that by default is broadcast to client devices so that the access point can be found. By disabling this feature, standard client connection software won't be able to "see" the access point. However, the eves-dropping programs discussed previously can easily find these access points, so this alone does little more than keep the access point name out of sight for casual wireless users.
Advantages of wireless networks:
- Mobility - With a laptop computer or mobile device, access can be available throughout a school, at the mall, on an airplane, etc. More and more businesses are also offering free WiFi access ("Hot spots").
- Fast setup - If your computer has a wireless adapter, locating a wireless network can be as simple as clicking "Connect to a Network" -- in some cases, you will connect automatically to networks within range.
- Cost - Setting up a wireless network can be much more cost effective than buying and installing cables.
- Expandability - Adding new computers to a wireless network is as easy as turning the computer on (as long as you do not exceed the maximum number of devices).
Disadvantages of wireless networks:
- Security - Be careful. Be vigilant. Protect your sensitive data with backups, isolated private networks, strong encryption and passwords, and monitor network access traffic to and from your wireless network.
- Interference - Because wireless networks use radio signals and similar techniques for transmission, they are susceptible to interference from lights and electronic devices.
- Inconsistent connections - How many times have you hears "Wait a minute, I just lost my connection?" Because of the interference caused by electrical devices and/or items blocking the path of transmission, wireless connections are not nearly as stable as those through a dedicated cable.
- Speed - The transmission speed of wireless networks is improving; however, faster options (such as gigabit Ethernet) are available via cables. If you are only using wireless for internet access, the actual internet connection for your home or school is generally slower than the wireless network devices, so that connection is the bottleneck. If you are also moving large amounts of data around a private network, a cabled connection will enable that work to proceed much faster.
What is Networking Hardware?
Networking hardware includes all computers, peripherals,
interface cards and other equipment needed to perform data-processing
and communications within the network. CLICK on the terms below to learn
more about those pieces of networking hardware.
- Workstations
- Hubs
- Bridges
- Firewalls
- Routers
- FileServers
- Repeaters
This section provides information on the following components:
- Network Servers
- Workstations
- Network Interface Cards
- Switches
- Repeaters
- Bridges
- Routers
- Firewalls
File/Network Servers
One or more network servers is a part of nearly every local area
network.These are very fast computers with a large amount of RAM
and storage space, along with a one or more fast network interface
card(s). The network operating system provides tools to share server
resources and information with network users. A sophisticated
permissions-handling system is included, so that access to sensitive
information can be carefully tailored to the needs of the users. For
small networks, a singe network server may provide access control, file
sharing, printer sharing, email, database, and other services.
The network server may be responding to requests from many
network users simultaneously. For example, it may be asked to load a
word processor program to one workstation, receive a database file from
another workstation, and store an e-mail message during the same time
period. This requires a computer that can store and quickly share large
amounts of information. When configuring such a server, budget is
usually the controlling factor. The following guidelines should be
followed:
- Fastest processor(s)
- Large amount of RAM
- multiple large, fast hard drives
- Extra expansion slots
- Fast network interface card(s)
Optionally (if no other such devices are available on the network):
- A RAID (Redundant Array of Inexpensive Disks) to preserve large amounts of data(even after a disk failure)
- A back-up unit (i.e. DAT tape drive, removable hard drives, or CD/DVD/BluRay burner)
Workstations
Computers that humans use are broadly categorized as
workstations. A typical workstation is a computer that is configured
with a network interface card, networking software, and the appropriate
cables. Workstations do not necessarily need large storage hard drives,
because files can be saved on the file server. Almost any computer can
serve as a network workstation.
Laptops/Mobile Devices
Laptops and other mobile devices are becoming more and more
common. These devices typically have modest internal storage, but enough
power to serve as a workstation for users on the go. These machines
nearly always have a wireless adapter to allow quick network connections
without cumbersome cabling. In a school environment with good wireless
coverage, a mobile device user can move about the campus freely, and
remain continuously connected to the network.
Network Interface Cards
The network interface card (NIC) provides the physical
connection between the network and the computer workstation. Most NICs
are internal, and they are included in the purchase of most computers.
Network interface cards are a major factor in determining the speed and
performance of a network. It is a good idea to use the fastest network
card available for the type of workstation you are using.
The most common network interface connections are Ethernet cards and wireless adapters.
Ethernet Cards
Ethernet cards are usually included with a computer, although
additional ethernet cards can be purchased and installed on most
computers,. Ethernet cards can contain connections for either coaxial or
twisted pair cables (or both) (See fig. 1). If it is designed for
coaxial cable, the connection will be BNC. If it is designed for twisted
pair, it will have a RJ-45 connection. Some Ethernet cards also contain
an AUI connector. This can be used to attach coaxial, twisted pair, or
fiber optics cable to an Ethernet card. When this method is used there
is always an external transceiver attached to the workstation. Only the
RJ-45 connector is found on most modern ethernet cards (See the Cabling section for more information on connectors.)
Fig. 1. Ethernet card.
From top to bottom:
RJ-45, AUI, and BNC connectors
Wireless Adapters
Wireless adapters are found in most portable devices, such as
laptops, smart phones, and tablet devices. External wireless adapters
can be purchased and installed on most computers having an open USB
(Universal Serial Bus) port, or unused expansion slot. (See the Cabling section for more information on connectors.)
Switches
An ethernet switch is a device that provides a central
connection point for cables from workstations, servers, and peripherals.
In a star topology, twisted-pair wire is run from each workstation to a
central switch/hub. Most switches are active, that is they electrically
amplify the signal as it moves from one device to another. The
predecessor of the switch was the hub, which broadcasted all inbound
packets out all ports of the device, creating huge amounts of
unnecessary network traffic. Modern switches build a port map of all IP
address which respond on each port, and only broadcasts on all ports
when it doesn't have a packet's target IP address already in its port
map. Switches are:
- Usually configured with 8, 12, or 24 RJ-45 ports
- Often used in a star or tree topology
- Available as "managed" or "unmanaged", with the later less expensive, but adequate for smaller networks
- direct replacements for hubs, immediately reducing network traffic in most networks
- Usually installed in a standardized metal rack that also may store network servers, bridges, or routers
Repeaters
Since a signal loses strength as it passes along a cable, it is
often necessary to boost the signal with a device called a repeater. The
repeater electrically amplifies the signal it receives and rebroadcasts
it. Repeaters can be separate devices or they can be incorporated into a
concentrator. They are used when the total length of your network cable
exceeds the standards set for the type of cable being used.
A good example of the use of repeaters would be in a local area
network using a star topology with unshielded twisted-pair cabling. The
length limit for unshielded twisted-pair cable is 100 meters. The most
common configuration is for each workstation to be connected by
twisted-pair cable to a multi-port active concentrator. The concentrator
amplifies all the signals that pass through it allowing for the total
length of cable on the network to exceed the 100 meter limit.
Bridges
A bridge is a device that allows you to segment a large network
into two smaller, more efficient networks. If you are adding to an older
wiring scheme and want the new network to be up-to-date, a bridge can
connect the two.
A bridge monitors the information traffic on both sides of the
network so that it can pass packets of information to the correct
location. Most bridges can "listen" to the network and automatically
figure out the address of each computer on both sides of the bridge. The
bridge can inspect each message and, if necessary, broadcast it on the
other side of the network.
The bridge manages the traffic to maintain optimum performance
on both sides of the network. You might say that the bridge is like a
traffic cop at a busy intersection during rush hour. It keeps
information flowing on both sides of the network, but it does not allow
unnecessary traffic through. Bridges can be used to connect different
types of cabling, or physical topologies. They must, however, be used between networks with the same protocol.
Routers
Routers are the traffic directors of the global internet. All
routers maintain complex routing tables which allow them to determine
appropriate paths for packets destined for any address. Routers
communicate with each other, and forward network packets out of or into a
network. Here's an example:
You want to search for something on the internet using a search
engine. You open a browser on your workstation. The browser opens to a
blank page (not usually the default, but appropriate for this example).
You type "http://www.google.com" into the URL (Universal Resource
Locator) address line of the browser. The browser software packages up
the URL you typed, and sends it with a request for an IP address to the
DNS (Domain Name Server) that has been set in your network adapter's
configuration. The domain server returns an IP, such as 74.125.67.103
(actual address returned by DNS for google.com on June 7th, 2011). The
browser ships the request for that IP address off to the network card,
which bundles the request into an ethernet packet, destined for
74.125.67.103. The network card sends the packet to the gateway of your
network, which opens the header of the packet, and makes a determination
that the packet is traveling out of your network, in search of
74.125.67.103. Your network's router has routing tables which it has
been building from communicating with other routers, and potentially
augmented with "static routes", which are specific paths added by your
network's administrators to make the task of accessing certain networks
easier, or faster, or in some cases, not possible. In this case, I find
that my router knows about another router at my ISP(Internet Service
Provider), which in turn has several more routers that are all on
networks of which I am just a small node, much like finding an atom of a
molecule of a piece of dust on a rock on a moon of a planet of a sun of
a galaxy of the universe. In any case, the packet gets passed from
router to router, each time moving out of the subnets of the packet
sender, towards a router that will know where the desired server is. The
packet finally reaches the router of the network at 74.125.67.103,
which dutifully delivers the packet to the server at that IP address.
The server carefully crafts a response, and sends a reply back, which
follows the same process to get the response "Yes. Go ahead" back to the
requester. Whew. And that's just the initial request.
While bridges know the addresses of all computers on each side
of the network, routers know the addresses other routers which in turn
know about their own networks. Routers can even "listen" to entire
networks to determine which sections are busiest -- they can then
redirect data around those sections until traffic congestion clears.
So, routers are network gateways. They move network packets from
one network to another, and many can convert from one network protocol
to another as necessary. Routers select the best path to route a
message, based on the destination address of the packet. The router can
direct traffic to prevent head-on collisions, and is smart enough to
know when to direct traffic along back roads and shortcuts.
If you have a school LAN that you want to connect to the
Internet, you will need to purchase a router. In this case, the router
serves as the forwarder between the information on your LAN and the
Internet. It also determines the best route to send the data over the
Internet.
Firewalls
A firewall is a networking device that is installed at the
entrance to a LAN when connecting a networks together, particularly when
connecting a private network to a public network, such as the internet.
The firewall uses rules to filter traffic into and out of the private
network, to protect the private network users and data from malevolent
hackers.
Firewalls are either hardware or software, depending on their
intended use. A firewall used to protect a network is a hardware device
that should be installed in the network between the router and the
network. Almost all hardware firewalls will have at least two ports,
labeled "Trusted" and "Untrusted". These terms imply the true nature of
the firewall's responsibility to the private network. The public network
is connected to the untrusted network port, and the private network is
connected to the trusted port.
Firewall rules are usually simple, consisting of a verb, either
allow or deny, the direction of the traffic, either inbound or outbound,
and an address or other network traffic identifier. Firewall rules are
cumulative, so general rules may be specified, and exceptions added as
necessary. Some examples are:
- Allow outbound all (all private network users can do anything on the public network)
- Deny inbound all (default setting to prevent all traffic from the public or untrusted port, to the private port)
- Allow inbound port 80 (allow internet web traffic to come into network to find web servers)
- Allow inbound port 80 destined to 170.200.201.25 (allow inbound web traffic to a specific web server on your private network)
- Deny inbound from 201.202.1.1/24 (deny all inbound traffic from a specific IP address or range of addresses)
________________________________________________________________________________
Assalammualaikum wbt,
this week I 've learned about cable and hardware . Without me realize there are
a variety of cables used in the present technology . I can distinguish and
identify the type of cable used in this modern technology. I was also able to
identify the capabilities of each cable is used. In addition, I also learned
about the hardware such as hubs, bridges, routers and many others. I already
know the functions of each of these hardware.
No comments:
Post a Comment