Unit 3
Key concept 1: cables types 6a cabling can do 10 GB over it, however 10 Gig switches are expensive.
Cable structure UTP
4 pairs of copper cable
Number of twists varies per inch
N shielding
Very easy to work with
Most common cable for LAN
Cat 3, Cat 5, Cat 5e, Cat 6, Cat 7 will be defined in standards later in the course
Most susceptible to Electromagnetic Interference (EMI)
STP
Similar to UTP
Pairs shielded
Core shielded
SCTP
Coax
Single conducting core
FO
Central glass core
Cladding prevents light loss
Single-Mode – laser SINGLE BEAM SMALLER CORE
USUALLY WAN
Multi- mode – led Multiple beams
Larger core
Usually LAN
CABLE DESIGN CONSIDERATIONS
Usage
General purpose Plenum Riser UTP ~ Twists per inch ~ Gauge ~ Length
~ Solid/stranded Standards Standards Organization
FCC
NEMA
TIA
ISO
IEEE
NIST
Brief Tour of 568-C
T568A and T568B termination standards
Specify required UTP pin-out orders for termination
TIA-569-B specifies entrance facility and equipment rooms
Equipment room
Rack
Raised for access underneath
Network Topology
Topology refer to the physical layout
Bus
Single cable connects all machines.
Each machine links to the cable using a t-connector.
Each end of the cable requires a terminator (resistor).
A break in the cable results in a total communication Failure.
Ring
Single cable connects all machines
Each machine links to the cable
Star
Single cable connects each machine to central
Full mesh
Partial mesh
Network Applications
Fiber Data Distributed Interface (FDDI)
Data Communications 101
Bandwidth
Maximum frequency at each data can be transmitted and received effectively
A function of distance, frequency, and signal to noise (SNR)
Data Rate
The number of bits per second that are transmitted on a cable
Common measure for copper and fibber
Attenuation
Transmission Challenges
Noise
Anything electrical on the cable that is not part of the original signal
Crosstalk
You May Also Find These Documents Helpful
-
The final device is an Arduino-based ball sorter that uses a two-stage approach to sorting the balls. The device starts by isolating a single ball and measuring its weight. Afterwards, the device categorizes the ball based on the measured weight and deposits it in the appropriate receptacle.…
- 346 Words
- 2 Pages
Good Essays -
Although Zigbee implements a wide assortment of security measures, there are still a variety of vulnerabilities and attack methods that can be used. These attacks and how they can be carried out will be described in this Section.…
- 734 Words
- 3 Pages
Good Essays -
STUDY GUIDE FOR EXAM 3.. THESE ARE QUESTIONS AND TOPICS THAT WILL BE COVERED ON THE EXAM.…
- 544 Words
- 3 Pages
Powerful Essays -
The directory and file structure is not indexed, so searching within a directory with a large amount of files can be time consuming.…
- 297 Words
- 2 Pages
Satisfactory Essays -
The CMOS, or Complementary Metal Oxide Semiconductor, is the chip in a computer that holds the most basic of settings for a computer. These settings include the date, time, and system setup parameters. The most common way to access the CMOS to change these parameters is hitting a specific key during the computer’s initial startup (CMOS, 2013). Since the inception there have been many changes made to the CMOS. The CMOS memory has been changed from analog to digital and the speed at which it is accessed has been increased (CMOS, 2013).…
- 244 Words
- 1 Page
Satisfactory Essays -
Disk fragmentation is caused by the continual writing and deletion of data on the hard drive. This causes files to become fragmented, that makes it harder for the computer to access. Disk fragmentation also leaves pockets of empty space on the hard drive and take up space. When you defragment the hard drive it reorganizes files and removes the empty spaces.…
- 107 Words
- 1 Page
Satisfactory Essays -
This is where we will house our skeletal frame that holds our servers and networking equipment. We will run the horizontal cables to all of the room wall plates. We will leave the patch cables to the person in charge of the room arrangements. If there are multiple floors in the building we will install backbone cables through the risers so we can have another telecommunication room for the other floors. Depending on where the plenum is for the floor we will run the horizontal cables under the floor or on top of the false ceiling. If the plenum is over the false ceiling we will need to install a ladder rack and cable…
- 553 Words
- 3 Pages
Satisfactory Essays -
6 . For an unconditional approach to a particular part of a complex PL/SQL block, which of the following control structures can be used?…
- 1980 Words
- 8 Pages
Good Essays -
lower your attack surface, Windows 2008 Server Core would be installed on a group of your servers.…
- 235 Words
- 2 Pages
Satisfactory Essays -
2. What are the different types of category 6 cables and what should be recommended this network?…
- 987 Words
- 4 Pages
Good Essays -
10. What is the difference between STP and UTP cable? What might an application be for each type?…
- 896 Words
- 3 Pages
Powerful Essays -
4) LANs that span distances of several kilometers by using multimode fiber are made possible…
- 829 Words
- 4 Pages
Satisfactory Essays -
The set of rules for delivering Web page files over the Internet is in a protocol called the Hypertext Transfer Protocol (HTTP).…
- 2055 Words
- 9 Pages
Powerful Essays -
Section 2(d) of the Copyright Act, 1957 defines the term “author” in the context of several copyrightable works. Section 2(d) (VI) states that in relation to any literary, dramatic, musical or artistic work which is computer-generated, the person who causes the work to be created shall be the author. The definition in itself doesn’t provide for the legal personality of the author. Imagine a situation wherein a painting app has been created by a robot? Who would be the author here? The person who has owns the robot or the one who programmed this robot or the user who generates something new through this application?…
- 650 Words
- 3 Pages
Good Essays -
Given this scenario, how have Linda and Larry handled the conflict thus far? What should they do now?…
- 1105 Words
- 5 Pages
Good Essays