Professional Documents
Culture Documents
A given network can also be characterized by the type of data transmission technology in use on it
(for example, a TCP/IP or Systems Network Architecture network); by whether it carries voice,
data, or both kinds of signals; by who can use the network (public or private); by the usual nature of
its connections (dial-up or switched, dedicated or no switched, or virtual connections); and by the
types of physical links (for example, optical fiber, coaxial cable, and Unshielded Twisted Pair).
Large telephone networks and networks using their infrastructure (such as the Internet) have sharing
and exchange arrangements with other companies so that larger networks are created.
NETWORKING
Definition: - In the world of computers, networking is the practice of linking two or more
computing devices together for the purpose of sharing data. Networks are built with a mix of
computer hardware and computer software.
Area Networks: -
Networks can be categorized in several different ways. One approach defines the type of network
according to the geographic area it spans. Local area networks (LANs), for example, typically reach
across a single home, whereas wide area networks (WANs), reach across cities, states, or even
across the world. The Internet is the world's largest public (WANs).
1- Graphical Types
• L.A.N Local Area Network
• M.A.N Metropolitan Area Network
• W.A.N Wide Area Network
2- Functional Types
• Workgroup It Works Directly
• Domain It Works Indirectly
Topologies
Topology refers to the way in which the network of computers is connected. Each topology is suited
to specific tasks and has its own advantages and disadvantages.
1
• FDDI
• Mesh
• Tree
Bus Topology: -
• all workstations connect to the same cable segment
• commonly used for implementing Ethernet at 10mbps
• the cable is terminated at each end
• wiring is normally done point to point
• a faulty cable or workstation will take the entire LAN down
• two wire, generally implemented using coaxial cable during the 1980's
The bus cable carries the transmitted message along the cable. As the message arrives at each
workstation, the workstation computer checks the destination address contained in the message to
see if it matches it's own. If the address does not match, the workstation does nothing more.
If the workstation addresses matches that contained in the message, the workstation processes the
message. The massage is transmitted a long the cable and is visible to all Computers connected to
that cable.
There are THREE common wiring implementations for bus networks
• 10Base2 (thin-net, Cheaper Net) 50-ohm cable using BNC T connectors, cards provide
transceiver
• 10Base5 (Thick Net) 50-ohm cable using 15-pin AUI D-type connectors and external
transceivers
• 10BaseT (UTP) UTP cable using RJ45 connectors and a wiring centre
The above diagram shows a number of computers connected to a Bus cable, in this case,
implemented as Thin Ethernet. Each computer has a network card installed, which directly attaches
to the network bus cable via a T-Connector.
It is becoming common to use 10BaseT (UTP) for implementing Ethernet LANS. Each workstation
is wired in star fashion back to a concentrator wiring centre (hub). The hub is a multi-port device
2
supporting up to about 32 ports. One of these ports is connected to a server, or the output of the hub
can be connected to other hubs.
Rules
• each end of the trunk segment is terminated in 50-ohms
• one of the terminators is grounded
• connector splices are kept to a minimum
Cabling
• BNC-T type connectors
• RG58-AU 50-ohm cable, 0.2"
3
Rules
• each end of the trunk segment is terminated in 50-ohm
• one of the terminators is grounded
• connector splices are kept to a minimum
Cabling
• Transceivers 802.3
• 50-ohm cable RG-11
• Male DIX connector
4
10BaseT UTP NETWORK LAYOUT
Limitations
• maximum segment length of 100 Meters
• Hub to Hub or repeater to repeater links limited to 100 Meters
Rules
• star topology
• 4 repeater/5 segment rule of 10Base5 is retained
• only two nodes per segment are allowed
Cabling
• RJ-45 Connectors
• Category 3 UTP minimum, preferably Category 5
5
Ring Topology: -
• workstations connect to the ring
• faulty workstations can be bypassed
• more cabling required than bus
• the connectors used tend to cause a lot of problems
• commonly used to implement token ring at 4 and 16mbps
• four wire, generally STP or UTP
Wiring is performed in a physical star fashion, with cables wired directly from each workstation
back to the MAU.
6
A station which wants to transmit waits for the token to arrive. When the token arrives, the station
changes it from a token to a connector message, and appends its message. This new message is then
placed on the outgoing side of the ring.
Each station passes on received tokens if they have nothing to transmit. They monitor connector
messages to see if the message is addressed to them. If connector messages are addressed to them,
they copy the message, modify it to signify its receipt, then send it on around the ring. Connector
messages which are not addressed to them are passed directly on to the next station in the ring.
When the connector message travels full circle and arrives at the original sending station, it checks
the message to see if it's been received. It then discards the message and replaces it with a token.
7
Either
Or
8
Physical Ring Cable Limits
TOKEN RING NETWORK LAYOUT
Limitations
• maximum number of workstations = 96
• maximum number of 8228 Mau’s = 12
• maximum patch cable distance between an 8228 MAU and a station (not including 8'
adapter cable) = 150 feet (45 meters)
• maximum patch cable distance between two 8228's = 150 feet (45 meters)
• maximum patch cable connecting all 8228's = 400 feet (120 meters)
Rules
• patch cables generally type 6 (26 wags) or 1 (22 wags)
• type 1 for lengths > 66 feet (20 meters)
• IBM 8310574 MIC connectors
• alternatively, UTP with RJ45 connectors
Star Topology: -
• all wiring is done from a central point (the server or hub)
• has the greatest cable lengths of any topology (and thus uses the most amount of cable)
• generally STP or UTP, four wire
9
Star Topology: Summary
Advantages Disadvantages
Hub failure cripples all workstations
Easy to add new workstations
connected to that hub
Centralized control Hubs are slightly more expensive than thin-Ethernet
Centralized network/hub monitoring
FDDI Topology: -
• 100mbps
• normally implemented over fiber optic (fast-Ethernet, UTP)
• dual redundancy built in by use of primary and secondary ring
• automatic bypassing and isolation of faulty nodes
10
Mesh Topology: -
Definition: - A type of network setup where each of the computers and network devices are
interconnected with one another, allowing for most transmissions to be distributed, even if one of
the connections go down. This type of topology is not commonly used for most computer networks
as it is difficult and expensive to have redundant connection to every computer. However, this type
of topology is commonly used for wireless networks. Below is a visual example of a simple
computer setup on a network using a mesh topology?
Tree Topology: -
Definition: - Also known as a star bus topology, tree topology is one of the most common types of
network setups that is similar to a bus topology and a star topology. A tree topology connects
multiple star networks to other star networks. Below is a visual example of a simple computer setup
on a network using the star topology?
11
In the above example picture if the main cable or trunk between each of the two star topology
networks failed, those networks would be unable to communicate with each other. However,
computers on the same star topology would still be able to communicate with each other.
Protocols: -
Definition: - A network protocol defines a "language" of rules and conventions for communication
between network devices. A protocol includes formatting rules that specify how data is packaged
into messages. It also may include conventions like message acknowledgement or data compression
to support reliable and/or high-performance network communication.
Many protocols exist in computer networking ranging from the high level to the low level. The
Internet Protocol family includes IP and all higher-level network protocols built on top of it, such as
TCP, UDP, HTTP, and FTP. Modern operating systems include services or daemons that implement
support for a given network protocol. Some protocols, like TCP/IP, have also been implemented in
silicon hardware for optimized performance.
Definition: - Software rules and regulations on the basis of which two or more than two computers.
TCP/IP: -
IP Stands For (Internet Protocols)
TCP Stands For (Transmission Control Protocols)
TCP/IP (The Transmission Control Protocol/Internet Protocol) is the protocol suite that drives the
Internet. Specifically, TCP/IP handles network communications between network nodes
(computers, or nodes, connected to the net).
The suite is actually composed of several protocols including IP which handles the movement of
data between host computers, TCP which manages the movement of data between applications,
UDP which also manages the movement of data between applications but is less complex and
reliable than TCP, and ICMP which transmits error messages and network traffic statistics.
(Pronounced as separate letters) Short for Transmission Control Protocol/Internet Protocol, the suite
of communications protocols used to connect hosts on the Internet. TCP/IP uses several protocols,
the two main ones being TCP and IP. TCP/IP is built into the UNIX operating system and is used
by the Internet, making it the de facto standard for transmitting data over networks. Even network
operating systems that have their own protocols, such as Netware, also support TCP/IP.
IP is a 32 Bit unique identifier for every node in a network.
1. Class A = 1 -------- 126
2. Class B = 127 -------- 191
3. Class C = 192 -------- 223
Subnet Mask: -
12
Definition: - A mask used to determine what subnet an IP address belongs to. An IP address has
two components, the network address and the host address. For example, consider the IP address
150.215.017.009. Assuming this is part of a Class B network, the first two numbers (150.215)
represent the Class B network address, and the second two numbers (017.009) identify a particular
host on this network.
Sub netting enables the network administrator to further divide the host part of the address into two
or more subnets. In this case, a part of the host address is reserved to identify the particular subnet.
This is easier to see if we show the IP address in binary format. The full address is:
10010110.11010111.00010001.00001001
If this network is divided into 14 subnets, however, then the first 4 bits of the host address (0001)
are reserved for identifying the subnet.
The subnet mask is the network address plus the bits reserved for identifying the sub network. (By
convention, the bits for the network address are all set to 1, though it would also work if the bits
were set exactly as in the network address.) In this case, therefore, the subnet mask would be
11111111.11111111.11110000.00000000. It's called a mask because it can be used to identify the
subnet to which an IP address belongs by performing a bitwise AND operation on the mask and the
IP address. The result is the sub network address:
Note that the TX (transmitter) pins are connected to corresponding RX (receiver) pins, plus to plus
and minus to minus. And that you must use a crossover cable to connect units with identical
interfaces. If you use a straight-through cable, one of the two units must, in effect, perform the
cross-over function.
Two wires color-code standards apply: EIA/TIA 568A and EIA/TIA 568B. The codes are
commonly depicted with RJ-45 jacks as follows (the view is from the front of the jacks):
13
If we apply the 568A color code and show all eight wires, our pin-out looks like this:
Note that pins 4, 5, 7, and 8 and the blue and brown pairs are not used in either standard. Quite
contrary to what you may read elsewhere, these pins and wires are not used or required to
implement 100BASE-TX duple Xing--they are just plain wasted.
However, the actual cables are not physically that simple. In the diagrams, the orange pair of wires
is not adjacent. The blue pair is upside-down. The right ends match RJ-45 jacks and the left ends
do not. If, for example, we invert the left side of the 568A "straight"-thru cable to match a 568A
jack--put one 180° twist in the entire cable from end-to-end--and twist together and rearrange the
appropriate pairs, we get the following can-of-worms:
14
diagram for a 568B straight-thru cable. If we cross the green and orange pairs in the 568A diagram
we will arrive at a simplified diagram for a crossover cable. All three are shown below.
It makes no functional difference which standard you use for a straight-thru cable. You can start a
crossover cable with either standard as long as the other end is the other standard. It makes no
functional difference which end is which. Despite what you may have read elsewhere, a 568A
patch cable will work in a network with 568B wiring and 568B patch cable will work in a 568A
network. The electrons couldn't care less.
My preference is to use the 568A standard for straight-thru cables and to start crossover
cables with a 568A end. That way all I have to remember is the diagram for the 568A end,
that a straight-thru cable has two of them, and that the green and orange pairs are swapped at
the other end of a crossover cable.
LET'S MAKE SOME CABLES
15
1. Pull the cable off the reel to the desired length and cut. I have a box of cable at one end of my
shop and a mark on the floor 10' away. For cable lengths which are a fraction of ten feet, I
eye-ball the length as I pull the cable out of the box (also, my feet are about one foot long).
For longer cables, I pull it out to the ten foot mark and go back to the box and pull the
remaining fraction or another ten feet. If you are pulling cables through walls, a hole in the
floor, etc., it easier to attach the RJ-45 plugs after the cable is pulled. The total length of wire
segments between a PC and a hub or between two PC's cannot exceed 100 Meters (328 feet or
about the length of a football field) for 100BASE-TX (and 10BASE-T).
2. Strip one end of the cable with the stripper or a knife and digs.
If you are using the stripper, place the cable in the groove on the blade (left)
Side of the stripper and align the end of the cable with the right side of the
Stripper. This is about right to strip a little over 1/2" of the jacket off the cable.
Turn the stripper about one turn or so. If you turn it much more, you will
Probably nick the wires. The idea is to score the outer jacket, but not go
All the way through. Once scored, you should be able to twist the end of the
Jacket loose and pull it off with one hand while holding the rest of the cable
With the other. If you are using a knife and digs, carefully slit the cable for about
An inch or so and neatly trim around the circumference of the cable with the digs to remove the
jacket.
3. Inspect the wires for nicks. Cut off the end and start over if you see any. You may have to
adjust the blade with the screw at the front stripper. Cable diameters and jacket thicknesses vary.
4. Spread and arrange the pairs roughly in the order of the desired Cable end.
5. Untwist the pairs and arrange the wires in the order of the desired cable end.
Flatten the end between your thumb and forefinger. Trim the ends of the wires so
they are even with one another. It is very important that the outstripped (untwisted)
end be slightly less than 1/2" long. If it is longer than 1/2" it will be out-of-spec and
susceptible to crosstalk. If it less than slightly less than 1/2" it will not be properly
clinched when RJ-45 plug is crimped on. Flatten again. There should be little or no
space between the wires.
6. Hold the RJ-45 plug with the clip facing down or away from you. Push the wire firmly into the
plug. Now, inspect the darn thing... before crimping and wasting the plug! Looking through the
bottom of the plug, the wire on the far left side will have a white background. The wires should
alternate light and dark from left to right. The furthest right wire is brown. The wires should all
end evenly at the front of the plug. The jacket should end just about where you see it in the
diagram--right on the line. Aren't you glad you didn't crimp the plug?
16
1. Hold the wire near the RJ-45 plug with the clip down and firmly push it into the left side of the
front of the crimpier (it will only go in one way). Hold the wire in place squeeze the crimpier
handles quite firmly. This is what will happen:
(Crimp it once.) The crimpier pushes two plungers down on the RJ-45 plug. One forces what
amounts to a cleverly designed plastic plug/wedge onto the cable jacket and very firmly clinches it.
The other seats the "pins," each with two teeth at its end, through the insulation and into the
conductors of their respective wires.
2. Test the crimp... If done properly an average person will not be able to pull the plug off the
cable with his or her bare hands. And that quite simply, besides lower cost, is the primary
advantage of twisted-pair cables over the older thin wire, coaxial cables. In fact, I would say the
RJ-45 and ease of its installation is the main reason coaxial cable is no longer widely used for small
Ethernets. But, don't pull that hard on the plug. It could stretch the cable and change its
characteristics. Look at the side of the plug and see if it looks like the diagram and give it a fairly
firm tug to make sure it is crimped well.
3. Prepare the other end of the cable so it has the desired end and crimp.
4. If both ends of the cable are within reach, hold them next to each other and with RJ-45 clips
facing away. Look through the bottom of the plugs. If the plugs are wired correctly, and they are
identical, it is a straight-thru cable. If they are wired correctly and they are different, it is a
crossover cable.
5. If you have an operational network, test the cable. Copy some large files.
6. If the cable doesn't work, inspect the ends again and make sure you have the right cable and that
it is plugged into the correct units for the type of cable. Try power-cycling (cold booting) the
involved computers.
7. If you have many straight-thru cables and a crossover cable in your system, you should
consider labeling the crossover cable or using a different colored cable for the crossover cable so
you don't mix them up. I do not recommend implementing the crossover function, as recommended
elsewhere, with two RJ-45 jacks, appropriately wired back to back, and two straight-thru cables.
This method costs noticeably more, introduces more than the necessary number of components and
connections, increases the complexity and time of assembly, and decreases reliability.
CABLING RULES
1. Try to avoid running cables parallel to power cables.
2. Do not bend cables to less than four times the diameter of the cable.
3. If you bundle a group of cables together with cable ties (zip ties), do not over-cinch them. Its
okay to snug them together firmly; but don't tighten them so much that you deform the cables.
4. Keep cables away from devices which can introduce noise into them. Here's a short
list: copy machines, electric heaters, speakers, printers, TV sets, fluorescent lights,
copiers, welding machines, microwave ovens, telephones, fans, elevators, motors, electric
ovens, dryers, washing machines, and shop equipment.
5. Avoid stretching UTP cables (tension when pulling cables should not exceed 25 LBS).
17
6. Do not run UTP cable outside of a building. It presents a very dangerous lightning hazard!
7. Do not use a stapler to secure UTP cables. Use telephone wire/RG-6 coaxial wire hangers which
are available at most hardware stores.
HUB
This is a hardware device that is used to network multiple computers together. It is a central
connection for all the computers in a network, which is usually Ethernet-based. Information sent to
the hub can flow to any other computer on the network. If you need to connect more than two
computers together, a hub will allow you to do so. If you only need to network two computers
together, a simple crossover Ethernet cable will do the trick.
How To Give An IP Address To Computer?
As I mentioned on the top about TCP/IP, In here I will teach you about (How To Give An IP
Address To Computer?).
First (Right Click) On My Network Places => Then Click On The (Properties) => The (Network
Connections) Will Open => In There We Have An Icon By The Name Of (Local Area Connection)
=> (Right Click) On That Icon => Click On The (Properties) => Then A Box Will Open In That
Box We Have Four Options:
1- Client For Microsoft Networks
2- File And Printer Sharing For Microsoft Networks
3- QoS Packet Scheduler
4- Internet Protocol (TCP/IP)
We will (Click) on the option number 4 => Then (Click) on the (Properties) button => After that we
will have two options:
1- Obtain An IP Address Automatically
2- Use The Following IP Address
We Will Select the Second Option, When We Select The Second Option Then Tree Boxes Will On
First Write Your (IP Address) In IP Address Box => Then (Click) On The Subnet Mask Or Just
Press (Tab) Button On Your Keyboard It Will Automatically Write In Subnet Mask Box From Your
Computer => Then Click (OK) => Then Click (Close).
IP Address: . . . .
Subnet Mask: . . . .
Default Gateway: . . . .
18
First Of All (Right Click) On (My Computer) => Then (Click) On The (Properties) => Then Select
From Menu Bar (Computer Name) => Then (Click) On (Change) Button => Then A Box Will Open
In There Write Your (Computer Name) By Your Choice => Then In There We Have Two Options:
1- Domain
2- Workgroup
We Will Select The Second Option (Workgroup) We Will Write In Workgroup Box Name Of The
Server Workgroup => Then Click (OK) => Then The Computer Will Send You A Massage (You
Must Restart Your Computer For The Changes To Take Effect) => Then Your Computer Will
Restart Automatically. After Restarting Computer For Checking That Your Computers Has
Communication Between Each Other I Mean (Network) Or Not, For Checking Go To (Start) Then
(Run) Write In Run Box (Command)Then Dos Program Will Open Write (Ping “IP Address”) And
Press (Enter).
19