Best-Fit Topology - BEST ALL
Best-Fit Topology - BEST ALL
MODULE TITLE:
Determining Best-Fit Topology
MODULE CODE:
EIS ICT HNS3 01 1221
The network administrator provides each new user with a user ID and starter
password. In this way centralized administration and support can be achieved.
Number
One Computer for One Computer for Many Computers
Many People One Person for One Person
11
Network Hardware Components
Cabling system and Connectors
COPPER MEDIA
Twisted-Pair Cable
12
Unshielded Twisted-Pair (UTP) Cable
UTP, using the 10BaseT specification, is the most popular type of
twisted-pair cable and is fast becoming the most popular LAN
cabling.
The maximum cable length segment is 100 meters, about 328 feet.
13
There are 7 standards categories of UTP:
• Category 1
Consists of two twisted pairs of copper wire
Voice-grade cable
Traditional UTP telephone cable that can carry voice but not data
transmissions
• Category 2
Consists of four twisted pairs of copper wire with three twists per foot .
Certifies UTP for data transmissions
Bandwidth = 4 MBPS
14
• Category 3
Consists of four twisted pairs of copper wire.
Certifies UTP cable for data transmissions
Bandwidth = 16 MBPS
• Category 4
Consists of four twisted pairs of copper wire.
Certifies UTP cable for data transmissions
Bandwidth = 20 MBPS
• Category 5
Consists of four twisted pairs of copper wire.
Certifies UTP cable for data transmissions
Bandwidth = 100 MBPS 15
• Category 5e
Improved version of category 5
Bandwidth = 1000 MBPS
• Category 6
Similar to CAT 5e.
Contains a physical separator between the 4 pairs to reduce electromagnetic
interference
Bandwidth = 1000 MBPS
16
What is potential problem with all types of cabling?
»Crosstalk
Crosstalk occurs when signals from one line bleed into another
line 17
Twisted-Pair Cabling Components
19
20
Twisted-Pair advantages/disadvantages
Pros/Advantage
- It has a large installed base and is a familiar technology. (i.e. most buildings
are already wired with UTP) hence it is available in the market
- It is relatively inexpensive and easy to install.
- It does not require grounding/bonding (process of binding things together)
no ground fault
Cons/Disadvantage
High-quality UTP systems require specialized installation
procedures.
More susceptible to EMI, RFI, crosstalk and attenuation than other
media (i.e. Data transmission length is limited to 100m max.
Not recommended for LAN that requires a high level of security
because it can be tapped
21
Shielded Twisted-Pair (STP) Cable
22
Advantage and Disadvantage of STP Cable
Pros/Advantage
Cons/Disadvantage
The term shielding refers to the woven or stranded metal mesh (or
other material) that surrounds some types of cabling.
27
Thinnet vs. Thicknet Cable
Thick cable does not bend easily and is, therefore, harder to install.
Thick cable is more expensive than thin cable, but will carry a
signal farther.
28
Coaxial-Cable Connection Hardware
29
The BNC T connector the This connector joins the network
interface card (NIC) in the computer to the network cable.
30
The BNC barrel connector . This connector is used to join two
lengths of thinnet cable to make one longer length.
31
The BNC terminator: A BNC terminator closes each end of the
bus cable to absorb stray signals. Otherwise, the signal will
bounce(rebound) and all network activity will stop.
32
Coax cable advantage and disadvantages
Coax advantages
- It is less susceptible to interference than UTP (has noise-rejection
characteristics )
- Better bandwidth
- Transmit data for greater distances
- Relatively inexpensive
- Transmit voice, video, and data
Coax disadvantages
- Due to its high metallic content, coax cable is usually more expensive than
UTP
- Coaxial cable is more expensive to install than UTP
- requires grounding/bonding (i.e. poor shield connection creates big
problem)
33
Optical Media
Fiber-Optic Cable
Optical fiber cable contains glass (or in some cases, plastic) fibers
rather than copper wire.
Signals are transmitted across these fibers in the form of light
pulses rather than electrical pulses.
Optical fiber strands are thin filaments of glass consisting of an
inner core and an outer cladding.
Both the core and the cladding are glass (plastic), and each has a
different refractive index (light passing capability) less dense
medium has more refractive index than more dense medium
When these light pulses strike the cladding (dense medium) they
are reflected back into the core because the cladding has a lower
refractive index than the core. This keeps the transmitted signal34
within the core as it travels down the fiber.
The diameter of the core varies with the type of optical
fiber. Single-mode optical fiber has a core diameter of
approximately 8.5 µm while the most commonly used
type of multimode optical fiber has a core diameter of
62.5 µm. The cladding diameter for both is 125 µm.
The symbol µm represents a unit of length known as a
micron or micrometer. It is equal to one-millionth of a
meter (0.000001 meter).
The potential bandwidth, or information-transmission
capacity, of optical fiber is greater than that of twisted-pair
or coax cable.
For this and other reasons, the use of optical fiber has 35
continued to grow in LAN implementations.
Optical fiber advantages
Expensive
37
38
Fiber optic cable (Indoor)
39
40
41
Single-mode versus multimode fiber
42
Fiber Optic Cable Connectors
45
Selecting Cabling
46
Cable Comparison Summary
1-
47
1-
48
49
Media converters
Media converters interconnect different cable types—twisted pair,
fiber, and Thin or thick coax—within an existing network.
50
Fundamentals of Communication Signals
51
Digital Signals
52
1. Analog signal
Analog signal is a continuous time signal and they are
characterized by their wave length, amplitude and frequency.
53
Amplitude: the maximum value
Wavelength: the distance between two consecutive peak values
Frequency is the number of times per second that the wave cycle
repeats or oscillates. Shorter wave length produce higher
frequencies b/c the waves are closer together
The unit used to measure the frequency is Hertz which means
cycles/second. The unit can be expanded by adding prefixes as
follows.
Kilo (K) = 103 = 1 Thousand
Mega (M) = 106 =1 Million
Giga (G) = 109 = 1 Billion
Tera (T) = 1012 = 1 Trillion
54
Peta (P) = 1015 = 1 Quadrillion
Exa (p) = 1018 = 1 Quintillion
- 1 kilohertz = 1000 Cycles/second
- 1 Megahertz = 1000,000 Cycles/second
- 1Gigahertz = 1000,000,000 Cycles/second
- 1 Terahertz = 1000,000,000,000 Cycles/second etc.
55
In analog communication, Bandwidth is the width of the range (or
band) of frequencies that an electronic signal uses on a given
transmission medium.
57
In digital communication, bandwidth is often used as a synonym for
data transfer rate - the amount of data that can be carried from one
point to another in a given time period (usually a second). This kind
of bandwidth is usually expressed in bits (of data) per second (bps).
Occasionally, it's expressed as bytes per second (Bps).
Note: The bandwidth of digital signals is usually measured in bits
per second (BPS). The unit can be expanded by adding prefixes as
follows.
1 Kilo = 1000 approximately
1 Kilo= 1024= 210 Exactly 58
Bit and Baud rate
A character is represented by 8 bits. When a character is sent to
the communication channel by the transmitter, additional bits are
added to it like start and stop bits as shown in the figure below.
59
Baud rate total number of bits per second, regardless of the
information content of the signal.
Data signals can be sent over a network cable in one of two ways:
broadband or baseband
61
BROADBAND TRANSMISSION
- It divides the available bandwidth into multiple channels.
- Since there are many channels available for transmission, more than one device
can transmit at a time; therefore, simultaneous transmissions can occur without
collisions.
- It is not limited to handling only digital transmission but also can support
analog traffic, making it capable of handling traditional voice and video signals
simultaneously with data.
- Broadband transmission was designed for signaling over long distances, with
channel lengths measured in kilometers or miles hence it is best suited for
62
WAN
STANDARD ETHERNET WIRING SCHEME
CRIMPING (TERMINATING TWISTED PAIR CABLES)
Types of CRIMPING
There are two types of crimping:-
Straight-through cables(||)
Crossover cables (X)
Rolled Cable ()
64
Crimping Standards
Example: T568B
Steps
You must strip the jacket 3 to 5 cm using striper
65
•There are orange, green, blue, and brown pairs. Each pair has one wire with solid-color
insulation and one wire that is white with bands of the pair’s color
•Arrange the wires in their correct order, as per the standard given above
• Cut the wires straight across so that no more than 1.25 cm (a half inch) of wires are
exposed from the jacket. This controls terminal cross-talk interference
• Be sure to cut straight across or the wires will not all reach the pins when you push
them into the connector
66
2. crimping for creating Crossover cables (X)
67
•This also crimps the cord at the back end of the connector for strain relief to keep the cord from
pulling out if the cord is pulled.
After you have connected both ends, test your cord. Misconnection is very common, so every
cord must be checked using network cable tester
Note
•Pin 1 & Pin 2 are transmit
•Pin 3 & Pin 6 are receive
68
Or
Example: T568B
69
Instruments required for crimping are the following
•RJ-45/11 Crimpier
•Punch Down Tool
70
Punch Down Tool is used for Connecting on RJ-45 Jack using one of the two standards
71
72
2. Cable ducting/ trunking
•Standard products
73
3.5. 3 TERMINATING CO-AX CABLE
The BNC cable connector is either soldered or crimped to the end of a cable.
Basic tools required for terminating coaxial cable.
•Crimp tool
•Sheath striper
•Pair of snips
74
Step 1 Remove the sheath/outer insulator
75
Step 4 Crimp the connector
76
Network Interface Card (NIC)
After the NIC has been installed, the network cable is attached to the
card's port to make the actual physical connection between the
computer and the rest of the network.
77
78
The role of the NIC is to:
Control the flow of data between the computer and the cabling
system.
Receive incoming data from the cable and translate it into bytes that
can be understood by the computer's central processing unit (CPU).
79
The NIC takes data that is traveling in parallel as a group and
restructures it so that it will flow through the 1-bit-serial path of the
network cable.
81
Server
Servers are usually very powerful computers both in processing
power and in their storage capacity. Different dedicated servers can
be configured depending on the need of the organizations, such as:
Types of server
File servers – servers that provide centralized data storage which
will be shared among the LAN users.
Print server – servers that control one or more printers and provide
print service to LAN users.
Database server – servers that centrally store database and provide
data to client application in the LAN.
Web server – servers that store web pages that will be viewed using
browsers in the network.
82
Email server – servers that are used to manage and control email
communications across the network.
Workstation
A workstation is a high-end microcomputer designed for technical
or scientific applications. Intended primarily to be used by one
person at a time, they are commonly connected to a local area
network and run multi-user operating systems. The term
workstation has also been used to refer to a mainframe computer
83
terminal or a PC connected to a network.
Network Operating System (NOS)
- Ensuring the security of data and devices on the network through centralized
administration tools.
In short the NOS loaded on server has the following functions?
- NOS manages network resources
- Controls the flow of data
- Maintain security
- Tracks user accounts
- NOS enables clients to access remote drives as if they were on the clients own
machine
- Allow servers to process requests from clients and decide whether that client
85
can use a particular resource
Examples of NOS:-
- Novel Netware,
- Windows NT server
- Windows 2000/2k server
- Windows 2000/2k advanced server
- UNIX
NOS has two components
- Network server software
- Network client software
In most cases, software must be installed on the server and client
for interoperability.
86
Network server software
- Installed on a file server
2. Access methods
- CSMA/CD
- CSMA/CA
- TOKEN PASSING
- DEMAND PRIORITY
3. Transmission technique
88
What is network architecture?
If asked to define the word architecture, one may answer that it is the
design and related information needed to construct something.
Just as the architecture of a building determines its appearance and
function, LAN architecture defines the appearance and influences the
function of the LAN.
The appearance of the LAN is primarily determined by its
transmission channel infrastructure—normally, this is its cabling
system.
The function of a LAN is influenced by the manner in which the
devices on the LAN communicate with each other.
The word architecture groups together the fundamental technical
ingredients that, combined together, make a LAN.
89
Five components are used to define the architecture of a LAN. They
are as follows:
Transmission medium
- This defines what is used to connect the devices on the LAN.
Topology
- This defines how the transmission medium is used to connect the devices on the
LAN.
Access method
- This is the way in which a station on the LAN obtains the opportunity to send
or receive signals over the transmission medium.
Transmission technique
- This is the manner(way) by which the signals or messages sent by a station
travel through the transmission medium.
Transmission speed
- This is the rate at which the signals or messages are able to travel through the
transmission medium.
90
The original Ethernet standard was developed in 1983 and had a
maximum speed of 10 Mbps (phenomenal at the time) over coaxial
cable.
The Ethernet protocol allows for bus, star, or tree topologies,
depending on the type of cables used and other factors. This heavy
coaxial cabling was expensive to purchase, install, and maintain,
and very difficult to retrofit into existing facilities.
The current standards are now built around the use of twisted pair
wire.
Common twisted pair standards are 10BaseT, 100BaseT, and
1000BaseT. The number (10, 100, 1000) ands for the speed of
transmission (10/100/1000 megabits per second); the "Base" stands
for "baseband" meaning it has full control of the wire on a single
frequency; and the "T" stands for "twisted pair" cable.
91
Fiber cable can also be used at this level in 10BaseFL.
Fast Ethernet
The Fast Ethernet protocol supports transmission up to 100 Mbps.
Fast Ethernet requires the use of different, more expensive network
concentrators/hubs and network interface cards.
In addition, category 5 twisted pair or fiber optic cable is necessary.
Fast Ethernet standards include:
- 100BaseT - 100 Mbps over 2-pair category 5 or better UTP cable.
- 100BaseFX - 100 Mbps over fiber cable.
- 100BaseSX -100 Mbps over multimode fiber cable.
- 100BaseBX - 100 Mbps over single mode fiber cable.
92
Gigabit Ethernet
Gigabit Ethernet standard is a protocol that has a transmission
speed of 1 Gbps (1000 Mbps).
It can be used with both fiber optic cabling and copper.
- 1000BaseT - 1000 Mbps over 2-pair category 5 or better UTP cable.
- 1000BaseTX - 1000 Mbps over 2-pair category 6 or better UTP cable.
- 1000BaseFX - 1000 Mbps over fiber cable.
- 1000BaseSX -1000 Mbps over multimode fiber cable.
- 1000BaseBX - 1000 Mbps over single mode fiber cable.
The Ethernet standards continue to evolve. with 10 Gigabit
Ethernet (10,000 Mbps) and 100 Gigabit Ethernet (100,000 Mbps),
93
Ethernet Protocol Summary
94
Access Methods
The set of rules that defines how a computer puts data onto the
network cable and takes data from the cable is called an access
method.
Once data is moving on the network, access methods help to
regulate the flow of network traffic.
Traffic Control on the Cable
To understand traffic on a computer network, it helps to use an
analogy.
A network is in some ways like a railroad track, along which
several trains run.
When a train is on the track, all other trains must abide by a
procedure that governs how and when they enter the flow of traffic.
Without such a procedure, entering trains would collide with the95
96
If data is to be sent over the network from one user to another, or
accessed from a server, there must be some way for the data to
access the cable without running into other data.
And the receiving computer must have reasonable assurance that
the data has not been destroyed in a data collision during
transmission.
Access methods need to be consistent in the way they handle data.
If different computers were to use different access methods, the
network would fail because some methods would dominate the
cable.
Access methods prevent computers from gaining simultaneous
access to the cable.
By making sure that only one computer at a time can put data on
the network cable, access methods ensure that the sending and
receiving of network data is an orderly process.
97
The four Major Access Methods designed to prevent simultaneous use of the
network media include:
4. Demand-Priority Methods.
98
Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) Access
method
99
Each computer determines its own waiting period; this reduces the
chance that the computers will once again transmit simultaneously.
100
With these points in mind, the name of the access method—carrier-
sense multiple access with collision detection (CSMA/CD)—makes
sense.
The more computers there are on the network, the more network
traffic there will be.
With more traffic, collision avoidance and collisions tend to
increase, which slows the network down, so CSMA/CD can be a
slow-access method.
After each collision, both computers will have to try to retransmit
their data. If the network is very busy, there is a chance that the
attempts by both computers will result in collisions with packets
from other computers on the network.
If this happens, four computers (the two original computers and the
two computers whose transmitted packets collided with the
original computer's retransmitted packets) will have to attempt to
retransmit. These proliferating retransmissions can slow the
102
network to a near standstill.
The CSMA/CD process /Algorithm/
Step 1
• Anode listens to the network activity for a carrier signal (CS) that indicates
the network is in use.
• At any given time, multiple nodes may be listening.
• If a node hears a signal, the node defers (backs off) for a random amount
103
of time.
Step 2
• Hearing no carrier signal (CS), a node sends its packet (s) onto the network
and monitor the channel to make certain there are no collisions.
• Note that the transmission moves in both directions along the bus.
• This is necessary to ensure that all nodes get the message at the same time,
so that each node hears the same network. 104
Step 3
• Because of the multiple access (MA) property, another node may have
done the same thing, so that the two messages are moving along the bus
at the same time.
105
Step 4
It is a contention method
With more traffic, collision avoidance and collisions tend to
increase, which slows the network down, so CSMA/CD can be a
slow-access method.
Using a CSMA/CD network with many users running several
database applications can be very frustrating because of heavy
network traffic.
CSMA/CD works best when most network activity is light.
To use this access method, a node must be able to detect network
activity (carrier sense (CS) and to detect collisions (Collision
detection (CD). Both of these capabilities are implemented in
hardware on board of the NIC.
Used by Ethernet networks
107
It is a probabilistic access method
Carrier-Sense Multiple Access with Collision
Avoidance (CSMA/CA) Access Method
• Anode listens to the network activity for a carrier signal (CS) that
indicates the network is in use.
• At any given time, multiple nodes may be listening.
• If a node hears a signal, the node defers (backs off) for a random 109
amount of time.
Step 2
• Hearing no CS, a node sends a request to send (RTS) signal onto the
network.
• The signal is broadcast in both directions.
110
Step 3
113
Token-Passing Access Method
In the access method known as token passing, a special type of
packet, called a token, circulates around a cable ring from computer
to computer.
When any computer on the ring needs to send data across the
network, it must wait for a free token.
NOTE:
The first computer that is turned on creates the token.
The token-passing scheme is most commonly used in ring- or star-
wired ring topologies.
Network architecture that supports token passing as an access
method include ARCnet, FDDI, and IBM’s Token Ring. 117
Demand Priority Access Method
The hub scans its ports and then allocates bandwidth according
each frames priority.
In demand priority, each hub knows only about the end nodes and
repeaters directly connected to it, whereas in a CSMA/CD
environment, each hub knows the address of every node in the
network.
120
Demand priority offers several advantages over CSMA/CD
including:
- The use of four pairs of wires.
- By using four pairs of wires, computers can transmit and receive at the
same time.
- Transmissions are not broadcast to all the other computers on the network.
The computers do not contend on their own for access to the cable, but
operate under the centralized control of the hub.
121
The DEMAND-PRIORITY process