Escolar Documentos
Profissional Documentos
Cultura Documentos
- The first thing I'd like to talk about in networking are the topologies. As the name topologies implies, topologies have
to do with the shape of a network. Topologies come in two types.They come in logical toplogy and physical
toplogies. Physical toplogy refers to the actual shape or layout of the wires in a network. The logical topology, on the
other hand, refers more to how the data moves through the network. Another way of looking at this is we can say the
logical topology refers to the pattern of the data flow in a network.
One of the interesting things about topologies in networks is that the same network can haveone physical topology
but have a different logical topology. What this means is the physical layout of the wires in the network follow one
pattern, while the data moves the network in an entirely different pattern. We will actually see a couple examples of
this a little bit later.
"mesh", "bus", "ring" topologijos
- The first types of topologies I would like to talk about are the mesh, bus, and ring topologies.As far as mesh topologies go, there are actually two
types. There's the full mesh, and then there's also the partial mesh. In the full mesh topology, all the devices are directly connected to all other
devices. This provides full redundancy for the network. While each device being connected to all other devices provides great redundancy, it also
increases the cost significantly for the network.
The reason the full mesh node is so expensive is because each computer in the network is required to have multiple NICs and cables. In fact, it's
required to have just as many NICs and just as many cables as there are computers in the full mesh network. The most likely place you'll find a full
mesh configuration would be in a WAN environment. These are seldom, if ever, used in LAN environments. This diagram illustrates what the full mesh
environment looks like.
Because it's normally a WAN technology, I've used the example of cities to illustrate the nodes. As you can see, each city in this full mesh is connected
to each other city in the network. What that means in this case is the node in that city has to have three NICs to connect to the other three cities that it
is connected to. With the full mesh, we also have a partial mesh. In the partial mesh, all devices are directly connected to at least two other devices.
This provides strong redundancy for the network but not the full redundancy that the full mesh provides. Because it doesn't require the full
redundancy, or it doesn't require that every device is connected to every other device in the network but only a minimum of two, it's not as
expensive as the full mesh. However, it is still a very expensive configuration to have.Again, just like with a full mesh, multiple NICs and cables are
required for each machineconnected into the partial mesh.
Again, a partial mesh is most likely found in a WAN environment. In fact, perhaps the most famous WAN of all, the Internet, is a partial mesh
configuration network. Again, in this diagram, I've illustrated the partial mesh. As previously, since it's normally a WAN technology, I've used cities to
illustrate the nodes. As you can see, not all the cities are connected to all the other cities. Instead, couple of the cities are only connected to two other
cities, while a couple of them are connected to three other cities.
The result is that we do not have to have a full mesh where every city is connected to every other city, thereby reducing the cost of this particular
configuration. The bus topology is the next one I want to talk about. The bus topology is the oldest network technology available.With the bus
technology, all the nodes or computers are connected directly to a main cablethat runs through the network called the bus. The bus topology is very
simple to put togetherbecause you just have a single backbone cable, and then you have each one of the deviceson the network connecting to that
cable.
One of the disadvantages of the bus topology is that only one node or one computer can send a signal at a time. To determine which computer gets to
send a signal, the bus topology uses something called contention. Basically, what happens is each computer on the bus network competes with each
other to send the signal first. Each device listens to the network.If it doesn't hear a signal on a network at that time, it'll then send out its own signal.
Unfortunately, if two devices listen to the network and don't hear a signal at the same time,they will send their signal at the same time, and this will
result in a collision. A collision is where the two signals hit each other and effectively cancel each other out. The more nodes and the more computers
you have on a bus network, the more likely you are to have collisions. After a collision takes place, the contention to see which device gets to send its
signal next starts all over again.
If you have too many collisions on a network, it can actually bring down the entire network. In other words, if you have sufficient number of collisions on
the network, which is sometimes referred to as a network storm, you can actually bring down the entire network just from collisions. In fact, this is the
idea behind many of the denial-of-service attacks you hear aboutin network security. One thing about bus topologies to remember is that it's generally
recommended for networks with less than 30 nodes.
Otherwise, the contentions became so prevalent that you run the risk of bringing down your network. Now, some advantages to bus topology is the
least expensive of the various technologies we're going to look at. However, on the down side, a single bad node or cable on a bus topology
network can bring down the entire network. Perhaps the biggest disadvantage of the bus topology, though, is that it's not part of the current TIA/EIA
568-C standard for LAN networks.
This diagram illustrates what a bus topology would look like. As you can see, we have the main wire going through the network, and each one of the
computers or nodes then connects directly to that main wire, resulting in a bus topology. When using a bus topology, you need to make sure that
there's a terminator, also called a terminating resistor, on both ends of the main bus cable there. The next topology I'd like to look at is the ring
topology.
The ring topology is also one of the older network topologies available to us, and it is similar to the bus topology in that you have a single backbone
cable that all the nodes connect to or all the computers connect to. The difference is, instead of having that backbone cable just laying out there like in
the bus topology, that backbone cable is basically connected to itselfto form a ring or a circle. Packets are then able to move around the circle in a ring
pattern.
This is where the ring in the ring topology comes from. As the packet moves through the ring,it stops at each node and gives each node the opportunity
to send a signal. This results in no contention between the nodes because every node gets a turn to send a signal. If it doesn't need to send a signal, it
will say, "No, I don't need it," and pass it on. If it does need to send a signal, it gets its opportunity to send a signal.
While heavy traffic will not bring down a ring topology, heavy traffic can slow it down because if you have multiple computers trying to all send a
packet or signal at one time, then basically each computer has to take its turn. The result is that things can come very slow as the token or the packet
is moving around and giving each computer on the ring an opportunity to send its packet. Also, like the bus topology, a single damaged node or cable
can bring down the entire network.
Again, the ring topology is not part of the current TIA/EIA 568-C standard for LAN networks. In this diagram, we can see what a ring network looks
like. As you can see, our main wire there in the middle is formed in a ring, and each one of our nodes or each one of our computers are then tied
into that central ring shaped backbone wire. As the token goes around the network,it basically gives each computer an opportunity to send a signal.
And once it sends its signal, then the next computer gets a chance to send its signal and so on and so forth around the ring.
vaigds ir hibridins vaigds topologijos
- The next two topologies I'd like to talk about are the star and hybrid topologies. The star topology, which
is more commonly called the hierarchical star topology, is the most common topology used in LANs
today. This topology is more expensive than bus topology because it needs more cables. However, one
damaged node or cable will not bring down the entire network. In a hierarchical star topology, all the
nodes connect to a central hub or switch.
This makes it very easy to troubleshoot a hierarchical star configuration. The main problem with a
hierarchical star configuration is that it is susceptible to a single point of failure.However, if the whole
network goes down because a central device has a problem, then you know where the problem is, you
just go look at the central device. You don't have to wonder why my network went down because if
everything went down, it will be the cause of the central device that everything is connected to.
On the other hand, if only a single node goes down, then the problem is going to be that nodeand not
somewhere else within the network. The biggest advantage of the hierarchical star topology is that its the
only topology that is recognized in the TIA/EIA 568-C standard when it comes to LAN networks. This
diagram shows what a hierarchical star topology network would look like. We have a central
device, which in this case is a switch, and each one of our nodes or computers are then connected
directly to that central switch device inside the hierarchical star.
Beyond the basic types of topology we've already talked about, we also have something called hybrid
topologies. Basically, a hybrid topology is one that combines one topology with another. Hybrid topologies
come in several types. One type is the physical hybrid topology.Another type is the physical-logical hybrid
topology. In the physical hybrid topology, basically you have a network that contains two or more physical
topologies within the network itself.
An example would be, part of a network may be a physical Ring, while another part of the network may
be a physical star. Another example of a physical hybrid topology, and this is one that you'll see quite
commonly, is that you'll have multiple switches within a network and each one of those switches are
linked together as a bus, but from each switch you'll have a physical star going out from that switch. So
the result is that we have a physical busconnection our switches, and logical stars contained on each
switch.
Another type of hybrid topology is the physical-logical hybrid topology. In this case, you have a network
that physically looks one way, or looks like one topology physically, but functions like a different
technology. In other words, your wires are laid out one way, but your data pattern is laid out another. A
very common physical-logical hybrid topology that you may see is a network that functions like a ring, but
it looks like a star.
Most of the IBM token ring networks follow this pattern. They have a central device that all the nodes are
connected to, but inside that device, that central device, it actually behaves in a ring pattern. Another
physical-logical hybrid topology you may see is a star network that uses a hub. In this situation, you have
various nodes connected to the hub in a physical star pattern,but inside the hub, data is moved about in
the shape of a bus.
In that situation, we have a network that physically looks like a star, but functions like a bus.This
illustration here shows us what a physical-logical hybrid star ring would look like.Externally, the network
looks like a star, but when you look inside the central device, you see that everything is connected to a
central ring and so this network actually behaves like a ringeven though it looks like a star. Another
example would be this hub situation.
Again, on the outside, it looks like a star physically, but if you notice inside the hub, each device is
connected to a central bus, and so even though this network physically looks like a star, it actually
behaves like a bus topology.
"point-to-point" ir "point-to-multipoint" tinklai
- The final two topologies we're going to look at are the Point-to-Point and the Point-to-
Multipoint topologies. In a Point-to-Point topology you basically have two different nodes
that are connected directly to each other with no intervening device. This topology is
commonly used to connect two different ends of a WAN connection. Alternatively, it is
also used to connect a computer or node directly to the switch. The connection between
the switch and the computer is in reality a Point-to-Point connection.
Additionally, Point-to-Point connections can be used to connect switches or routers to
each other as well. Another Point-to-Point connection you may see is a Cross-over
cable connecting two different computers together enabling the two computers to talk to
each other directly without having to use a hub or a switch. Point-to-Point topologies are
often part of a hybrid system where the Point-to-Point connections will often form the
bus connecting multiple connecting devices together.
Such as multiple switches together, multiple routers together, that sort of thing. A
variation on the Point-to-Point topology is the Point-to-Multipoint topology. Basically it's
the same as a Point-to-Point topology, except instead of one device connecting directly
to one other deviceyou'll have one device connecting directly to more than one
device. This illustration shows what a Point-to-Point and a Point-to-Multipoint topology
would look like. At the top you see a Point-to-Point topology where you have one switch
connecting one computer, or one node.
In the lower portion of the diagram you have a Point-to-Multipoint topology where you
have one switch connecting three different nodes. Now in this illustration each one of
those nodes is a computer, but they can also switches, or routers, or other devices as
well.
klientas-serveris ir "peer-to-peer" susijungimas
- Now that we've looked at topologies, the next topic I want to look at is network management models. There are
basically two network management models that are available for a local area network. One of those is the Peer-to-
Peer Network Management Model. In a peer-to-peer model, every computer on the network is responsible for its own
security and its own management. Basically, each computer is managed as a separate device, and therefore, the
management is built around individual computers.
Normally, this model will only be found on very small networks. In the case of Microsoft operating systems, if you set
up a peer-to-peer network, Microsoft limits the number of systems on that network to 10 systems. Homegroups and
Workstations and some of the more recent versions of Windows Professional and Windows operating
systems actually are designed to make it easier to configure a peer-to-peer network in a home environment, or a very
small business environment.
When used in a small business environment, generally you don't want to have more than two or three computers in
the business, if you want to use a peer-to-peer model. In other words, a home office or some place like that would be
a good situation where a peer-to-peer network model may work for you. Most home networks are also a peer-to-peer
model. Because most home networks don't have a server that they set up in their home and connect everything to
that. In stead, each computer in the house is set up with its own security, its own username, its own login and they all
are able to access the internet, or whatever, in the house simply by logging on.
And so, home networks are probably the most common place you'll see a peer-to-peer type network management
model. This illustration here shows what a peer-to-peer net management model would look like. As you can see, we
have a network here with six computers, and you'll notice there is a little symbol inside each one of those
computers. That is a symbol for a policy and security configuration. So, as you can see, each computer has its own
policy, its own security configuration, and so each computer is responsible for its own management, and for
management of the resources it may be connected to.
The other management model is the Client Server Network Management Model. In a client server configuration, all
devices access the resources on the network through a central server. In this case, for a device to get on the
network, it needs to connect to the server, and every device on the network that is not the server is called a
client. The device or devices that control access to the network and the resources on the network are called
servers. Servers can just control access to the network, they can also control access to files, access to printers, and
many other things.
But any device that actually controls access to something on the network is a server of some sort. In a client server
network model, the network management is overseen by a central server. All security is located in that central
server, and therefore, security's built around access to the server Some of the things that the server controls is
access to network resources. The server's also able to control who is allowed to log on to the network, or who is
allowed to authenticate onto the network.
One of the drawbacks of the client server network management model is that if the server goes down, no one is
able to access the server, and therefore, no one is able to access the resources on the network until the server is
brought back up, replaced, fixed, whatever. This diagram here illustrates what a client server network model would
look like. You'll notice you still have six computers in our network, but you'll notice that each one of the
workstations, or each one of the small computers, desktop computers, doesn't have a security policy symbol inside it.
That's because each computer does not control security for the network, or even for itself.The security is controlled by
the domain controller. And this is shown by the symbol for the security policy located on the domain controller in
stead of the workstations, or the desktops.For any one of those desktops to get access to the network, or any
resource on the network,it first has to go to the domain controller and basically get permission, or get a list of what it
can and can't do.
Once a client is authenticated by a domain controller, then it can gain access to any resources on the network that
the domain controller has permitted it access to.
tinklo kolizijos (incidentai), CSMA/CD ir CSMA/CA
- Next we want to address two common ways that nodes or computers use to access the network directly. In other words, to be able
to get onto the network not necessarily to get resources but to actually access the physical network itself. The two ways we're going
to look at are both Contention-Based Network Access methods which were briefly mentioned in a previous video. Basically, in a
Contention-Based Network Access method the computers compete for network access. There are two types of contention-based
access that are commonly used in modern networks.
One of those is the Carrier Sensing Media Access/Collision Detection Access Method. Also called CSMA/CD. This method is most
commonly used by wired Ethernet insulations. The other contention method that's commonly used is Carrier Sensing Media
Access/Collision Avoidance. Also called CSMA/CA. This access method is most commonly going to be seen in Wi-Fi networks.
A fun fact about Wi-Fi is that the term Wi-Fi actually doesn't mean anything specifically. The person invented Wi-Fi, when asked why
he called it Wi-Fi simply said, "I thought it sounded cool "so that's what I called it." Let's go ahead and look at the
CSMA/CD contention method first. In a CSMA/CD contention method, basically what happens is each node or computer on the
network listens for traffic going by on the network.
If it doesn't hear any traffic then the node will release a packet onto the network. However, if two nodes were listening to the network
at the same time and neither one of them hear any traffic on the network they will both release their packet at the same time. When
this happens the packets end up hitting each other and we have what is called a collision. The result of a collision is basically when
the packets hit each other, they cause a power spike that is then heard by all the nodes on the network.
Also, when two packets collide with each other they destroy the data those contain in both the packets. This diagram here
illustrates what a collision would look like. Basically what happened is Computer 1 and Computer 5 both listen to the network and
decided to send the packet at the same time. Well, when they did their packets ended up hitting each other,somewhere in the
middle of the network, causing a collision, and therefore, the data was lost and the collision was heard by all the computers on the
network.
If a collision doesn't take place then CSMA/CD considers that the transmission was successfuland now the network is freed up for
another node to transmit. When a collision doesn't take place this is generally how a CSMA/CD Operation would take
place. Computer 1 needs to send a packet to Computer 3. Therefore, Computer 1 will listen to the network, if it doesn't hear any
traffic on the network it will then release its packet onto the network and the pack will then travel down the network to Computer 3.
Once the packet gets to Computer 3 the other computers will have heard the packet go byand they'll know that that was now freed
up for them to send their own packets. And so, the contention starts all over again. If a collision does occur, then all the nodes on
the network will hear it and they'll start an internal clock that's set to a random number of milliseconds. Once a clock on a specific
node or computer runs down to zero then that particular node or computerwill attempt to send a packet again.
This diagram, here, illustrates what happened. A collision took place and so a timer or a clockon each one of the computers on the
network randomly generated a number of millisecondsand set the clock to that number of milliseconds. Now each node has a
different number of milliseconds on their clock. And so as each nodes clock runs down they then attempt to send their packet and
this way is hope that they will avoid any further collisions. The other type of contention method I want to look at is CSMA/CA.
The CSMA/CA works very similarly to the CSMA/CD. The main difference is, instead of releasing the packet on the network when it
hears the network is clear it releases a warning packet on the network. That warning packet basically runs down the network and
basically warns all the other nodes that a packet is about to be transmitted. When the other nodes on the network hear the warning
packet they won't transmit until after they hear the data packet go by.
Once they hear the data packet go by they'll then attempt to transmit their own warning packet before they transmit their data
packet. However, if two warning packets are transmitted at the same time, just like in the previous example where two data packets
were transmitted at the same time, again, it will result in a collision. And the collision is handled exactly the same way as with the
CSMA/CD method. This diagram here, illustrates how the CSMA/CA method works.
Computer 1 again, wants to send a packet to Computer 3 and so Computer 1 releases a warning on the network. All the computers
on the network hear the warning go by and so they refrain from trying to transmit a warning packet of their own. Once the warning
goes by and everybody has a chance to hear it Computer 1 will then release its data packet onto the network. The data packet will
move down the network to a computer seeing and as each node hears the data packet go by they will then try to release their own
warning packet firstso they have the opportunity to send the next data packet.
WAN, MAN
- The next topic I want to look at is the topic of WANs and MANs. A WAN is a wide area network. Generally, a WAN is one large
network that covers a large geographical area. One of the best known WANs would be the internet. While WANs cover large
geographical areas,they don't have to be one single network covering the large geographical area. A WAN can be made up of a
lot of different smaller networks in different parts of a geographic area that are all linked together to form a large wide area network.
In the event that you have a lot of smaller networks all linked together into a large wide area network, and that configuration is
owned by a single company or single organization, then that kind of a network is often referred to as an enterprise network. Because
of the size and scale of WANs, generally use routers and occasionally switches to connect up all the disparatenetworks that make
up a large WAN. Another type of network is called a MAN.
A MAN stands for metropolitan area network and it uses the same technology as a WAN. The difference is a MAN covers a much
smaller area. In general, a MAN is only going to cover an area of only about 50 kilometers across, give or take a little. One thing to
keep in mind about the term MAN is that it is falling out of use. Instead, more and more we're using the term WANto apply to both
WANs and MANs.
- Now that we've talked about WANs and MANs, let's talk about networks on a little bit smaller scale. Let's go ahead and talk about
LANs, WLANs, and PANs. A LAN stands for a local area network, and is generally a network that is limited to a very small size, or
very small geographical area. It's very common for LAN to be as small as a single room or they can even be as big as an entire
building. Once in a while, you may even run across a LAN that spans several buildings that are close together.
If the buildings are far apart, for example, different parts of town, or something like that, at that point we no longer have a LAN, but
we have a MAN, like we talked about previously. The TIA/EIA 568-C standard defines the characteristics that make up a local area
or LAN network.LANs will usually use twisted pair cabling to connect the nodes, or computers, to a central device. If you're setting
up a new LAN in a building that's just being constructed, or possibly you're putting up a LAN in a building that's never had a LAN
before, you want to be sure to go ahead and use CAT 6 or CAT 6A cabling for the LAN.
The reason you want to use the CAT 6 or CAT 6A calbing instead of some of the older versions of the twisted pair cabling, is
because the CAT 6 and CAT 6A have been optimized to accomodate future technologies that aren't even out yet in some
cases. And so, by using CAT 6 and CAT 6A, in a way, you're future proofing the land you're building in the sense that the cabling
infrastructure will be able to support newer, more advanced technologies as they come out.
One thing to keep in mind about LANs is that the TIA/EIA 568-C standard only recognizes thehierarchical star topology as the only
valid topology that you can use in a local area network.The essential device that you connect different nodes or computers into in a
LAN is generallygoing to be a switch, or in some older situations, hubs. While I said that twisted pair cabling is generally what's used
to connect nodes or computers to essential devices, oftentimes you'll have the central devices or the switches be connected
together with fiber.
As a result, we have the situation where your computer is linked to the switch using twisted pair, but if you have multiple switches in
your network, or in your LAN, you might have those switches connected together with fiber optic cabling. Another kind of LAN
technology is WLANs. WLAN stands for wireless LANs. As the name suggests, the way you link up LANs in a WLAN is using
wireless technologies.
The wireless technologies that's used in a WLAN are commonly referred to as Wi-Fi. The Wi-Fi technologies used in a wireless
LAN are defined by the IEEE 802.11 standard group. The IEE 802.11ac is the most current Wi-Fi standard at this point in
time. However, a more advanced wireless standard, the IEEE 802.11ax is being developed, so at some point in the future, the
802.11ax standard will replace the 802.11ac standard as the most current and most advanced Wi-Fi standard.
PANs stand for personal area network, and they are another type of small network that uses wireless technologies. PANs don't use
the same wireless technology that WLANs do. In fact, most commonly, you're going to find a PAN using the Blue Tooth technologies
for connecting up devices, rather than the Wi-Fi technologies. One of the limits of PANs over wireless LANs is that a PAN has a
limited range of less than 30 feet.
However, this limited range does have an advantage because it doesn't take as much power to generate a signal if you're only going
30 feet, rather than the much longer distances thatwireless LANs are able to connect at. A place you may see PAN technology
would be examples of the wireless keyboards and mice that are often connected up to computers.Those wireless keyboards and
mice are actually using Blue Tooth PAN technologies to connect to the computer.
Aside from wireless mice and keyboards, also many phones and smartphones use PAN technologies as well, specifically PAN Blue
Tooth, to connect up accessories. Some accessories used with your phone that have Blue Tooth technology or PAN
technology would be things like the earbuds that are used so you can do hands-free phone talking while you're driving. In more
recent times, those watches that you see that connect up to your smartphones and what have you, those are also using the Blue
Tooth PAN technologies.
While PANs normally use Blue Tooth technology, PANs don't have to use Blue Tooth technology. PANs can also, in some
situations, use infrared signals as an alternative to Blue Tooth for connecting up devices in the network.
SCADA/ICS
- Now we've talked about a few generalized network technologies, let's talk about a few specialized network technologies. The
specialized network technologies I want to look at,right now, are SCADA/ICS and Medianet technologies. SCADA stands for
Supervisory Control and Data Acquisition. ICS stands for Industrial Control System. Both of these technologiesrefer to networks and
technologies, that are used to control industrial applications, to some degree, and to some scale.
In the case of SCADA, which is a subset of the larger ICS technologies, when we use the term SCADA, we're describing systems
that span large geographical areas. Some examples of SCADA systems, that span large geographical areas, are pipelines, power
distribution, water management, sewage management, and even things as common as street lights. ICS, while is the more generic
term, when people use the term ICS, generally what they have in mind is smaller-scale systems.
The smaller-scale systems they have in mind, when they use the ICS term, would be things like industrial automation, control
systems for power plants, control systems for factories, and even control systems for HVAC, or heating and air-conditioning
systems. Another type of specialized network technology are medianets. Medianets refers to networking technology,that's been
optimized for distributing large video applications and similar technologies. Some medianets you may have heard of are things
like Hulu, Netflix, WebEx, and GoToMeeting, among others.
One of the ways a medianet can handle such large-scale video applications is by using something called smart bandwidth detection
systems. The smart bandwidth detection systems allow medianets to adjust to higher or lower-bandwidth devices. The result is that
the medianet is able to provide smooth video transmission on any platform, whether it is a slower or faster platform. You'll still get
the same kind of smooth video, that you're used to, in these various technologies.
tinklo valdiklis (NIC)
- The next major topic I want to discuss is the hardware and devices used for accessing a network. The first device to look at is the
NIC. NIC stands for network interface card ornetwork interface controller. Network interface card is a little bit older term
because back when this term was first used, almost all the network interface devices that you put into a computer came in the form
of an expansion card. However, now a days, the network interface is generally built into the motherboard or directly into the device.
Because of this, we've begun to use the term network interface controller to refer to the NIC.What the NIC does is it allows a
computer or other device to gain access to the hardware of a network. The NIC that does this with the device it does this can come
in the form of the ? expansion card. It can also be built directly into the motherboard. And even more recently, the device that gives
a computer access to the hardware can even come in the form of a USB device.
Either way whatever form it comes into is still referred to as the NIC. The NIC works on layers one and two of the OSI model. When
you're purchases a NIC, you need to make sure that the NIC matches up to the technology that's being used. There's several
different considerationsto keep in mind when you do this. First, you need to make sure that the media technologymatches up to the
NIC you are using. For example, if I'm using 802.11n Wi-Fi network, the NIC I use to gain access to that network also has to be able
to support the 802.11 standard.
In the same way if I'm using unshielded twisted pair to connect to my network, I need to make sure that the NIC I put in the
computer to do that, is also able to use the unshielded twisterd pair. Speed is another consideration when you're purchasing or
choosing a NIC to use on your network. If I have a Gigabit Ethernet network running, I need to make sure that the NIC that I use to
gain access to that network is also capable of using the Gigabit Ethernet standard.
A final consideration is I need to make sure that the NIC I use matches the network architecture being used. For example, if I'm
using a Token Ring architecture on my network, the NIC I use to gain access to that network, needs to also follow the Token Ring
architecture.In the same way, if I'm using Ethernet as my network architecture, the NIC I use has to be able to interface and use the
Ethernet architecture.
koncentratorius-akotuvas ("hub")
- The next type of device I'd like to talk about are hubs. Hubs are older technology that you won't see too much of anymore, and
that's because hubs are basically falling out of favor in preference to the more modern switches. The hub actually worked on layer 1
of the OSI model. Also, logically, the hubs functioned as a bus. What that means is a signal that came into a hub would then be
broadcasted to all the other devices connected to the hub, thereby generating a bus topology.
This meant, of course, that computers connected to the hub had to use contention to find out who could send their data on the
network first. If you had too many hosts on a single hub you could actually have too many collisions taking place, and if you had too
many hosts, it could eventually get to the point where a collision would actually bring down the entire network.There were three main
types of hubs. There were the Passive hubs, Active hubs, and finally, Intelligent hubs.
The Passive hubs worked a lot like a cable splitter. Basically what that means is that when a signal came in and was splitted out, the
more devices connected to the Passive hub, the weaker the signal got for each device. The reason the signal got weaker for each
device is because depending on how many devices you had, you had to divide the power of the signal that many times so each
device could receive the signal. Active hubs were an imporvement over the Passive hubs because Active hubs needed a power
source.
The reason Active hubs need a power source is because they added power to a signal when passed through a port. In this way,
Active hubs were able to prevent the weakening of a signal by having multiple devices connected to it. Active hubs, just like Passive
hubs did, however, repeat the signal to all the other devices connected to the hub, thus creating a bus environment again, with the
inherent weaknesses of a bus environment. Aside from connecting devices to the network, the Active hub could also be used to
connect other Active hubs together.
However, when we connected multiple Active hubs together, we had to make sure that we followed the 5-4-3 Rule. The 5-4-3 Rule
basically says this: One, you can have no more than five segments total on your network. Two, you can only have up to four
devices, or Active hubs, linking the network together, and Three, only three of your five segments were allowed to be populated by
computers.
This diagram helps illustrate that. As you can see, when you count all the computers on eitherend of the network, you have a total
of five different segments. Those five segments are in turn connected together by four different active hubs. But only three of those
segments are able to have computers connected to them. Thus, this illustration shows what a 5-4-3 Rulewould look like in
practice. Beyond Active hubs, we have Intelligent hubs. Intelligent hubs were basically Active hubs with additional features added to
them.
One of the most common features to put on an Intelligent hub was the ability to run network diagnostics. A hub that had the ability to
run network diagnostics was able to troubleshoot the network and send back a report of any problems that were on the
network. That report could then be used to go in and fix the problem. The Intelligent hub could also sometimes use that report to
route around problems it found on the network. Another feature added, or another ability added to Intelligent hubs was the ability to
manage their own ports, or "Manager Ability." Intelligent hubs that had the Management Ability had the ability to turn on and turn off
ports as needed to more efficiently manage the devices connected to that hub.
There were a few other abilities that were added to Intelligent hubs, but they weren't nearly as common or as widely used as the two
we just mentioned.
("Bridge")
- The next device I want to look at is a device called a bridge. Bridges were used to take a large network and break it into smaller
segments. If you remember previously I told you if you put too many computers on a segment then those computers would begin
creating so many collisions that you couldn't send data through the segment. Well, bridges were a device intended to minimize
that or put a stop to it. The way the bridge would do that is you would take the large segment with a lot of devices, you'd place the
bridge in the middle of that segment, thereby effectively creating two smaller segments with half the number of computers on them.
The result would be fewer collisions and better ability to get the packets through the network communications link. Bridges are an
older technology, but they are relevant to talk aboutbecause the bridges are the forerunner to the modern switches that we use
today. The bridge, just like the switch, works on the layer 2 of the OSI model. What makes the bridge have the ability to separate a
segment into two smaller segments is the fact that the bridge can read the frames that come into it and by looking at the address in
the frame it can determine whether a frame was allowed to pass through the segment or should be blocked because it's
coming from a location that already has that address on it.
In this way bridges are able to reduce the amount of traffic on a network by dividing it up into multiple segments.
komutatorius ("switch")
- The next type of networking device I would like to talk about are switches. Switches are devices that are used to connect multiple
computers together. Switches also, like bridges, primarily work on layer 2 of the OSI model. However, there are some switches that
can work on layers above layer 2 as well as layer 2. In the event that a switch is able to work on more than one layer of the OSI
model, it is called a multilayer switch.
The basic switch is the most common type of switch you'll see out in the real world. A basic switch is essentially a multiport
bridge. What that means is the switch can be used to take a much larger network and separate it into smaller networks or smaller
segments called collision domains. The way the switch sets up these collision domains is it takes two devices that wantto talk to
each other and links only the two ports that are relevant to each other so the two devices can effectively have a point-to-point
communication between each other.
This results in a collision domain of only two machines. And since only two machines are involved in the collision domain and both
machine has a send and receive pair of wires, the result is you don't have any collisions on your network. Another advantage of
setting up the point-to-point connection between two devices and letting them talk is that it enables the basic switch to set up a
communication between the two ports at full speed. Without this point-to-point communication the switch would have to divide the
signal coming in by the number of ports it has on it, much like a hub would.
But by setting up the point-to-point connections, or setting up multiple point-to-point connections, as different devices want to talk to
each other, the basic switch avoids the necessity of dividing up its bandwidth thus allowing the ports to communicate at full
speed.This also has the added advantage if computers are connecting to each other and talking to each other directly in a point-to-
point type configuration that it makes it much more difficult for somebody to listen in to the traffic of the network and hear everything
that's going on in it.
Beyond using basic switches to divide up the network and to set up point-to-point connections, basic switches can also commonly
be used to convert media from one type to another. A very common configuration you'll find in a basic switch, especially those using
a corporate environment, is that you'll find fiber coming into the switch, but the ports going out of the switch and connecting up
various devices to the switch, use copper twisted pair ports.
This effectively creates a switch that has fiber coming in and copper going out. Thereby converting the media from a fiber optic to a
copper twisted pair. Managed switch and unmanaged switches are two variations on the basic switch. Managed switches are
switches that are programmable. The reason that you would program a switch is because by programming the switch you can
control how data behaves on your network.
This type of programmable basic switch or managed switch as it's called, is the most common switch you will find in a corporate
environment. Unmanaged switches, on the other hand, are not fully programmable. Instead, they come with a default
configuration. While many unmanaged switches will allow you to change the default configuration, they'll only allow the changes to
take place in a predefined limited way. Outside the predefined limited changesthat are allowed in the default configuration, you really
can't change the programming of an unmanaged switch.
In fact, some unmanaged switches go to the extreme that you can't change a configuration at all. Basically, whatever configuration
comes on the unmanaged switch, that's the configuration you are stuck with. Most home networks or SOHO neworks will use the
unmanaged style basic switch to set up their networks
marrutizatorius ("router")
- The next networking device I would like to talk about is routers. Routers are used to move data around large networks such as
WANs. Primarily, a router's going to work on layer three and layer four of the OSI model. Though some routers can actually
use higher layers as well.Routers are also intelligent devices. Routers have to be intelligent, because they need to be able to
make independent decisions about sending data around the network. When making decisions about sending data around a network,
there are a number of criteria that routers can use to do this.
One such criteria is hops. Hops refer to the number of nodes a packet has to pass through in order to get to its destination. The
router will count the hops available by different routes, and it'll choose the route with the smallest number of hops necessary to get
to the destination it is trying to send the packet to. Routers can also use network traffic as a criteria for determining the best route. In
this situation, the router looks at how much traffic is on the network, and which routes from the network have more traffic over those
routers that have less traffic, and if it's appropriate, the router will choose routes that have less traffic in order to speed up the data
getting to the destination it is intended for.
Beyond traffic, a router can also use throughput as a way to determine the best route.Throughput refers to how fast data can move
through a particular connection. Or, another way of saying that, is throughput is the amount of data that can pass through a link in a
specific amount of time. Routers will look at a throughput of various routes to different destinations, and they'll see the route that
takes the least time to send the data through, and they'll choose that route as opposed to a route that has slower throughput.
Another criteria routers can use is network reliability. In other words, the router's able to keep track of how reliable different routes
are on the network. By keeping a long-term log of reliability of different routes, the router's able to choose the route that has the
most reliability.Reliability referring of course, to the route that's most likely to not be down or most likely to get the data where it
needs to get sent to. Routers will use all this information that they gather, as well as other information determined by the routing
protocols they use.
And they'll create tables that help them generate a set of paths to send the data to all thedestinations they're connected to. Routers
will also use this information to keep the tables up to date, because just because a certain route is the best route now, doesn't mean
something can't happen to that route later, which makes it a poor choice. And so using this information that the router's constantly
gathering, it can keep its routing tables up to date as well. Routers are also programmable, just like switches are.
Some of the things you can program into routers, is their interface configuration. Another thing you can program into routers, is you
can tell them which networks they are connected to. You can also use programming to define for the router, what type of
information or what type of packet is allowed through a router, and what type of packet is not allowed through a router.Finally, you
can also program multiple protocols into the router, thereby making the router more flexible.
- If you wanna pass the Network+ exam, you've got to know about coaxial cable. Even though coaxial cable really isn't used in
networking too much anymore, it's used enough that we need to be able to discuss the aspects of what makes coaxial
cable, coaxial. So what I wanna start off with is this big ol' evil cable. This is an original. What was known as thick ethernet
cablesince, a long, long time ago. Let's just say I had a lot of hair back then. Anyway, even though we don't use this cable for
networking anymore, it's a good way to explain coaxial.
So if you take a look at this, this is a very classic piece of coaxial cable. We've got a little conductor here in the center, and then
we've got some insulator, and then another conductor on the outside. And that's where the term coaxial comes from. Because you
have two conductive materials that are centered around a single axis. So anytime you see that, you always know that you're gonna
have two types of conductors. And that's what coaxial cable's all about. Now when you're talking about a coaxial cable, there are
two things to keep in mind.
Number one, the name of the cable. This type of cable was called, still is called RG8. So coaxials will always have a number that
starts with RG and then a number that separates them.The other thing to keep in mind is that coaxial cables are measured by an
impedance. So for example, this RG8 cable has an impedance of 50 Ohms. Now... Let's take a look at another type of coaxial. This
was also used in networking a long time ago. It's kind of faded out and this particular type of cable is called RG58.
Now I what I want you see more than anything else is this connector. Oh by the way, RG58also runs at a 50 Ohm impedance, but
it's the connector right here that the Network+ is interested in. This is called a BNC, Bob Nancy Charlie, connector. And here's
something to connect it into, give it a little twist, and it's connected. This little guy right here is known as a T-connector. Back in the
old days, we would plug this part into the network card and each end would run out to other network cards. Back in the old days,
there were no switches or hubs.
We just ran everything on a daisy chain like this. And who was ever on the end, would get this little guy. This is a Terminator. And
you would put that at the end of each run of cable. Now,even though RG8 and RG58 are gone, there is one place that we still see a
lot of coaxial. And that's with cable modems. So I've got right here a piece of RG6. RG6 is 75 Ohm, and it's gonna be distinct, and
it's gonna have what's known as an F-connector. Anybody who has a cable television's probably seen this.
It's a screw-in connector and it's pretty much a guarantee that you've got a cable connection of some type. So the F-connector is
very important. So, even though coax isn't used that much, it is on the Network+, and if you've got a cable modem network, you're
definitely gonna be running into some of this. So remember, you've got different grades, will now always start with an RG. RG6 is
the big one I want you to remember 'cause that's one we use today more than anything else, and that's for cable modems. And also
make sure that you can recognize a BNC connector from an F-type.
It will be on the test.
optini skaidul kabeliai, LED (multimode) ir lazerinis (singlemode) perdavimas, jungtys: ST, SC,
FC, LC, MT-RJ
- The Network+ exam talks a lot about fiber-optic cabling. So in this episode, what I want to dois introduce you to fiber-optics, and
talk about the many, many connectors that you're going to be seeing on Network+. But before we talk about the connectors, let's
first make sure we understand what a fiber-optic cable actually is. So what I have in front of me here is a chunk of fiber-optic
cable. And a fiber-optic cable, well, it's hard for me to show you, so let me put up a little graphic so you could see.
So a fiber-optic cable is going to have a fiber optic, which actually carries the light, and it's going to be surrounded by a Cladding,
and that's what the light is actually reflecting off of as itstays inside the fiber itself. And then outside of that is a fiber-optic Jacket,
that actually just protects the entire setup. So, now that you've seen at a microscopic level what it looks like,there are two types of
fiber-optic cable out there. There's Multimode and there is Single-mode. Multimode is designed to propagate light.
So if you were to take a look at a fiber-optic network card, you would see first of all it always has two connectors, always has two
connectors, and that fiber-optic network card, if it's Multimode, actually just has a little LED in there that lights up. And the LED lights
up and that's what propagates the light down through the cable. Single-mode, I actually have a piece here,Single-mode cable is
designed to be used with lasers, so a Single-mode cable, it actually has a much thinner piece of fiber-optic in it, and the Cladding is
a little bit tighter, and it's designed to go really, really long distances, and again there'll always be two connectors into your network
card, or your switch, or whatever it is, and that's really the only difference there is.
You can't, like, have a switch that's designed for Multimode and just plug Single-mode into it.You have to have the right type
of device for the right type of cabling. Okay. So color does come into play a little bit. Multimode is almost always orange, and Single-
mode is almost always yellow. You can run into exceptions with this. This aqua is a very special type of Multimode. But for the
exam, make sure you recognize these two colors. Okay.
This next thing I need you to take a look at is the fact that, remember I just told you you always use two connectors. So, I'm want to
zero in on this guy a little bit. And what I want you to look at is that you could see there are two connectors. It almost looks like a
lamp cord. We call this duplex. So most of the time when you're dealing with fiber-optic, you're going to be dealing with duplex
cables. Alright. Now for the fun part. Network+ loves to talk about all the different types of connectors.
So we're going to have a little march-through of the many, many types of connectors that have been used over the years in fiber-
optic. You'll see all of these connector types on the Network+ exam, but I need to warn you, there's a lot more connectors than
this. This is just kind of a, the ones you'll see on the exam. But these are the big ones. Alright. So let's start off with one of the grand-
daddy's. This is an ST connector. ST connectors are one of the earliest types of connectors that were ever out there. You'll notice
that it looks kind of like a B&C.
You punch it in and you twist it, and then it stays in place. So that is an ST. Notice that an ST is a round connector. Equally old and
equally popular are these guys. This is an SC connector.SC connectors are square, and you punch them in, and then you pull them
out. So they just go straight in. Now there's another type of connector that looks a whole lot like an ST, but it's not.
So I'm going to put an ST right next to this guy so you compare them. So I want you to look at these two connectors. Now if you look
at them really close, I'm going to pull these little protective tabs off. If you look at them real close, they seem to be the same. They're
both round, but if you'll notice this one is the ST right here, and that's a, you push it in and twist.This is an FC. The FC screws in, just
like for your cable television or something like that.
So, make sure you can appreciate the difference between the ST and FC. And that's just because one twists in, and the other one
screws in. All three of these connectors, ST, SC, and FC, are old. Now just 'cause they're old, that doesn't mean that nobody uses
them anymore.But one of the challenges we ran into with fiber-optic is that we were always running duplex. It was always two. So
people started to get the bright idea of saying, "Why don't we just make one connector that holds two fibers." And that's where we
get in a lot of these high-density type connections, and I want to show you these next.
So let's start off with this fellow right here. This is an LC connector. LC connectors are, notice how much smaller it is. This is two
connectors, but kind of built into one, although you can still see there's two very clear separate cables. So LC connectors are used a
lot, especially when you have a whole bunch of fiber-optic connections together. The last one is MT-RJ. Now MT-RJ is a little bit
hard to see, even with this, but there really are two connectors in there.
And if you look at the cable, it doesn't reflect the duplex. But there are. There's two connectors in there. So MT-RJ's are also another
real popular type of high density connector.Alright. The last thing I want to talk about is color and connections. When you cut a piece
of fiber-optic, you have to go through all this polishing stuff before you put on the ferrule, the connector piece. And there's a term for
that. We call it polishing. And over the years there's been a few different types of polishing.
So let's take a quick peek at the three types you're going to see. This first one on the left is a classic regular polish. And they call this
a PC connector. The one in the middle is called Ultra PC. Now PC stands for Polish Connector here. And you'll notice that the Ultra
is a little bit more rounded than the other one. The rounded-ness actually allows it to propagate light better than the PC Connector.
Now if you really want a great connection, you use an APC, or an Angled Polish Connector.APC's have an angle, and when these
two mesh, there is very little little light loss. So we see APC in situations where we want a really, really good connection. And by the
way, these two types of connectors, the UPC and APC, are substantially more difficult, and more expensive, than the regular PC-
type connector. Now this is just an overview of the different types of fiber-optics you're going to be running out there and seeing
today.
Keep in mind that, unlike with a lot of different types of cabling, where I bet a lot of you know about an RJ45, a lot of different types
use that. There isn't a perfect correlation there. You can have one type of connection, and you actually create interchanges between
those connections based on what you need to use at any given moment. So there's no perfect thing to say, like, "100BaseT only
always uses ST." It doesn't. It's got its own set-up and its own rule sets for that.
The important thing I need you to get out of this episode is Multimode uses LED's. Single-mode uses lasers. And make sure, that if
you see a picture of any of these connectors, you can identify the type of connector that it is.
Ethernet 10BaseT
- Here's the Ethernet segment from the previous episode. Now, these old Ethernets worked great back in the day, but they had one
really ugly Achilles heel, and that was this. If the segment itself broke, at any location, the entire network would drop. And that was a
problem with these old versions of Ethernet. So, it was something we put up with until a little tiny company called IBM came
along, and they came up with a competitor to Ethernet, called Token Ring.
So we're talkin' late 1980s here. Token Ring, when it came out, didn't use a bus. What they did, is they basically had a box and you
would plug all your different computers into this box. It was called a MSAU, multi-station access unit, whatever, but they changed
the idea. And with Token Ring, if any one of the computers broke, it didn't take down the entire network. Now, Token Ring was great
stuff, but it had two problems. The first problem was, well, it was proprietary, it came from IBM, and nobody else could, you know,
you couldn't like make your own Token Ring stuff.
The other big problem with Token Ring is that it was very, very expensive. Token Ring was many, many dollars per foot, it was
pricey stuff. But, because it was so robust compared to Ethernet, we saw massive installed bases. By the early 1990s, there were
hundreds of thousands, if not millions of computers running Token Ring back in the day. So the Ethernet folks, in order to stay
competitive, realized that they had to make a change, and they made a very clever change. What they did is they took one big long
bus and they shrunk it down into a box.
So this is basically a bus in a box. And instead of using expensive co-axial cabling, they just used cheap Unshielded Twisted
Pair, and that is what we call 10BaseT. 10BaseT is old and slow and out of date now, nobody uses hubs anymore, we all use
switches, nobody really runs the 10 megabits anymore, even the 100 gigabit, even 10 gigabits out there today, but, the important
thing is that, that cornerstone of having a bus in a box with individual cables, running to individual computers is the cornerstone
topology that every later version of Ethernet uses.
And that's why everybody has a switch today, because it all started with the big daddy of Ethernet, 10BaseT. Now, you're gonna be
running into 10BaseT on the Network+ exam, so let's go ahead and cover some of the important points. Number one, 10BaseT runs
at 10 Megabits per second. You can have a maximum of 100 meters between your hub or switch and the individual nodes. You can
have no more than 1024 nodes per hub or switch, and good luck finding a hub or switch that big.
And last, 10BaseT was designed to run on CAT 3 cable or better. Keep in mind all of these points, it's on the Network+.
In the 1990s, the ethernet powers that be came up with Gigabit Ethernet. And Gigabit Ethernet really changed things in that it took
us from 100 megabits per second to 1,000 megabits per second. So, when we're talking about Gigabit Ethernet, traditionally what
we're talking about is 1000BASE something. Now, there are 4 Gigabit Ethernet standards that you're going to see on the Network+
exam. First of all, is a very old one and a weird one called 1000BASECX.
1000BASECX is weird because it's a copper standard but it uses a very strange coaxial cable called twinax. And it was a whopping
25 meters between your switch and the individual nodes. Now, there actually is some 1000BASECX out there. I've seen a few
installations. But, it's, for the most part, rare and weird. The other three use more traditional fiber optic or UTP type cabling. On the
fiber optic side, you have two. You have 1000BASESX which uses multimode fiber optic cable and can have distances up to about
500 meters.
Then you have 1000BASELX which uses single-mode and has distances up to about five meters. For good old unshielded twisted
pair, we have just 1000BaseT. 1000BaseT originally was designed to work with CAT 5E, but we really use CAT 6, and it has a
traditional distance of about 100 meters. So, you need to know about-- Hey, hey, hey, hey, get back here. Look. I know some of
these facts are a little dull but it's important because they are on the Network+and you should be aware of these standards.
So, stay with me here, ok? Alright. Great. So, let's go ahead and talk about the next guy in line, 10 Gigabit Ethernet. Now, with 10
Gigabit Ethernet, you have a number of very strange standards. The reason they're strange is because you have standards that are
designed to work with a different type of networking technology, which is the backbone of the internet, called SONET. So, these
types of standards come in two versions: the type to work with ethernet LANs, and the type that work with these SONET high-end,
tier one internet kind of things.
So, to give you an example, let's talk about... well first of all, the most simple one, which is good ol' 10GBaseT. So, you need to
understand this nomenclature. So, we say 10GBaseT. So, that is designed to work, really, on either CAT 6 or CAT 6A. If it's running
on CAT 6, you can only have distances of 55 meters. If you're running on CAT 6A, the way you should, it'll run the more traditional
100 meters that you see for all the versions of unshielded twisted pair ethernet.
Now, there are three main versions of fiber optic that we use for 10 Gigabit. The most basic one is 10GBaseSR. 10GBaseSR runs
on multimode cable and it's linked as a little bit variabledepending on a number of different factors like: the type of multimode cable
you use. So, it can run, from anywhere as low as 26 meters up to about 400 meters. The other two versions run on single-mode but
the difference is the light wave length, believe it or not, that they use.
So, the first one is 10GBaseLR. 10GBaseLR, long range, runs on single-mode but it runs on, you ready, 1310 nanometer single-
mode fiber. And it can run up to 10 kilometers. Now, then there's 10GBaseER. Now, 10GBaseER is also single-mode but it has
1550 nanometer single-mode cable and it can run up to 40 kilometers. Now, for each one of these standards,10GBaseSR, ER, or
LR, there is an equivalent SW, LW, or EW version.
These W version have the exact same values I just gave you but they're designed to work on these old school SONET
networks. So, for example, if I were to say, "Tommy has a 10GBaseLW network. How long can the cables run?" It's still 10
kilometers. It doesn't change anything. So, you just need to be aware of these. These are very, very important. And Net+ has an
obsession about asking you the minutiae of the different 10 Gigabit Ethernet standards.
- What's kind of interesting in the networking world is that the only time we use little RJ45 crimps is for patch cables. Pretty much the
rest all the rest of the time we use a totally different type of connector called a 110 punch down. Now, what I have here is a patch
panel and I've also got a little jack that goes to a wall outlet and if we take a look at these we're gonna see that we don't use
crimps, we use 110 punch downs. Let me show you what I mean. So, welcome to your first 110 punch down. This is the back of my
patch panel and this is a 24 port patch panel, there's 24 connectors on the front, so there's 24, and each one's numbered, 110
punch downs that correspond to each one of the RJ45s in the front of this guy.
Now, there's a couple things I want to bring to your attention. First of all notice there is a CAT rating to the patch panel. Everything in
the networking world has a CAT rating, so it's not just cables, patch panels, crimps, connectors, everything has a CAT rating to it
and you want to make sure that that CAT rating matches up. all the way across the board. Now, the other thing to appreciate here is
that what we're gonna do is we're gonna use this little tool right here called a 110 punch down tool to actually punch down the
individual connections.
Now, before we do that, we're gonna have to lay the wires out properly. So what I want you do to come look over here just a little
bit, and you'll see that there are 568A and 568B color codes for punching these guys down. Now if you look at this very carefully
you'll see that this does not correspond to earlier episodes where you had the blues in the middle and you split the oranges or split
the greens and that's okay, that's because inside this patch panel it does the splitting for us so we don't have to worry about that.
So, let's come on back over here, and what we're gonna do is we're gonna go ahead and do a punch down. Now I'm 568B so I'm
going to be using the lower one, and what I've done is I've actually already kinda pre-wired one end of my horizontal run to lay out
properly for this.So, I'm gonna go ahead and use this one right here, the one that's a little bit closer to ya, and we kind of orient this
guy a little bit. So we go ahead and get it into the first connection.
Then you just kind of push it down by hand. And then I put the last one in, so that kind of gets it lined up for me. Now, take a look at
this 110 punch down tool. You'll see that it's got a sharp edge? That's the edge that's gonna cut the wire off. So you want to make
sure this is oriented properly, so I want to orient it like this, and I give it a punch, and I've not got one of my punches in properly. I'm
gonna go ahead and do the last one now, and let's go ahead and get the rest in.
It's always a good idea to take one more quick peek and make sure everybody's in the right position. Let's punch 'em down. Now
this is a nice little 110 punch down for the back of my patch panel. This cable, in turn, is gonna be using cable management and it's
gonna be runone way or the other off to the side and it'll all be nicely bundled up in whatever it has to do to be nice and pretty but
I've got that guy all punched down. Now keep in mind there's two ends to a horizontal run.
Once we've got the patch panel punched down well now it's time to do the outlet, so I've got a little, tiny RJ45 outlet here, let's go
through the same process. So this is a little RJ45 connector. These are, these are little covers and we'll use those once we've got
everything punched down. So here's the RJ45 end and that's what's gonna be sticking out of the face plate and we go ahead and
we punch down into these little tiny 110s. Now, again, we still have to deal with CAT rating, you can see this one's a CAT 6. Let me
turn that for you, there you go, CAT 6.
And then there's also 568A and B. On this particular one the top set of colors are for A and the bottom set are for B. So, since I want
to punch this as B, I'm gonna have to start with my orange and my greens on this side. Now luckily I've already got 'em pretty much
lined up. Get that kevlar out of the way.
All right, so the idea here is that we're gonna punch everything down and it's gonna line up about like this. Notice how it's oriented,
that's kind of important. One of the big issues about higher CAT ratings is the distance from the punch to the last twist. For the most
part it's half an inch, now I'm actually cheating here a little bit because, well, this is for demonstration purposes only, and I don't think
that I'll quite make that half inch rule, but let's just go ahead and get a couple of these guys placed in. I'm just gonna worry about
one side at a time.
So I'm just gonna, get out of the way kevlar. So I'm gonna get the first one in and the last one in on just this side, so that's orange
and green white. And, again, I'm looking down at the bottom here and double checking 'cause I hate putting these things in and
getting it wrong.And now I'm gonna use my punch down tool. And I'll get these two in.
These guys will go flying if you don't keep a good grip on 'em so I'm holding on for dear life here. Ahhh, I hate it when that
happens. Okay, so half of them are in and, again, corresponding to the lower one which is 568B, I know I'm in good shape so let's
go ahead and do the other side.
Now that is a beautifully crimped RJ45 jack. So let's put the covers on. And this guy is ready to be snapped right into a wall
plate. Now this is a completely punched down horizontal run. On this end I'm gonna have this coming out of the wall someplace
near the user's computers and this guy's gonna be sitting on an equipment rack over in the equipment room and they're pretty
much ready to go.
Now keep in mind I cheated here a little bit. For example, if there was a professional cable puncher downer person right now
watching this they would probably be having heart palpitations particularly because I unwind a lot of wire, a little bit more than a
professional would do and also I'm a little bit slow on a few things. One of the really cool things to watch is a professional cable
installer do their thing. They're about eight times faster than me.
- Welcome to the equipment room for Total Seminars. Now, in a structured cabling situationlike what we have here, we have a pretty
small network. So, I have just this one little rack with some equipment on it. Now, first of all, this is a 19-inch rack and that's pretty
much the standard for all equipment racks. Now, if you take a look behind me, you can actually see the blue and white cables that
are the horizontal runs coming in for all the devices all over my network. Now, there are two different ways that we can look at the
equipment room.
Number one, you're going to have what's known as your Main Distribution Frame, or MDF. In my office, this is the Main Distribution
Frame. You can see behind me, there's all kinds of connections to the outside world and this is where it all comes together, is right
here. Now, in ten years, when Total Seminars becomes this huge meglopolis of training, and we have a six-story building, I'll have
equipment racks on every floor. And while this one will stay the Main Distribution Frame, there'll be other equipment racks on other
floors which would act as what we call Intermediate Distribution Frames.
So make sure you're comfortable with MDF and IDF. Now, there's a lot of different pieces that are on my equipment rack, so let's
take a look at 'em, starting up at the top. Okay, so starting up at the top of the equipment rack, the first thing I want you to notice is
my patch panel. So the back of that patch panel has 110 punch-downs, and you can actually see the blue and white cables that are
coming from the top, and those are all terminated into the back of my patch panel. Now, scrolling down here just a little bit, that is
cable management, folks.
I don't like my patch cables draped all the way down, so I push 'em into that little area there.And it's just a convenient way to keep
things a little bit neater. Now, directly below that is my primary switch. This is the switch that everybody's connected to on my
network. And you can tell by all the little lights, they're a little bit hard to see, but you can see them towards the left,that this is a very,
very busy switch. Directly below that is a router. Now this router is a developmental router, so I haven't really got it up and working
right now, but you can see there's one piece of ethernet cable going into one end.
Later, I'll have it working a little bit better. So these are the main pieces of my structured cabling system. But what I want you to
notice is that they're different heights, and these are called "Us." So let's zoom in a little bit onto one side of the equipment rack, so
that we can understand what a "U" is. Now, keep in mind that people put all kinds of stuff into these 19-inch equipment racks, so we
have to have a standardized height. This standardized height is called a "U" and you can actually see they're marked here very, very
prettily on my equipment rack.
So one U right here is an inch and three quarters. So this switch right here is a one U switch.This cable management clump is two
U. So everything that you buy that you put into an equipment rack is going to be measure in Us so it'll fit. Everything uses the same
type of screw and they fit in nicely, and it allows for a nice, uniform look on equipment racks. Pretty much the only thing left on my
equipment rack are my servers. Total Seminars really isn't that big of a company, so we don't have racks and racks of servers like
you'd see at larger companies.
However, we do have a few servers here. Let me show 'em to you. Now, starting up at the top, I've got two one U servers. I can tell
they're one U because they fit within the one U marker.So there's these two guys. They're actually not even turned on right
now. They're developmental. I use 'em when I'm playing around and experimenting. We have two servers that do most of the heavy
lifting. So right here is a server. This is a one U server, and we actually call these "pizza box servers" 'cause well, they kinda look
like pizza boxes. The reason they slide out like this is for maintenance.
You see this with a lot of servers today. It's very, very convenient. Down here is a five U server. You can actually see, it sits five, five
Us. This is a big server. Now, this guy is my primary file server. He's just got tons of storage and he's actually a desktop system
that's tilted over. Anyway, the bottom line is that, this is, I've got tons of hard drives in here, he works really really hard for a
living. Okay, so that's basically what it boils down to in terms of my equipment rack. I've got some UPSs at the bottom for power and
things like that, but that's really what it's all about here.
Now, do keep in mind that this is my Main Distribution Frame, and, as an MDF, it has internet connectivity. I would like to show you
what I have behind you, but before I do that, I gotta head you over to the Demarc. Welcome to the Demarc for my office
building. The Demarc separates that which is the property of the phone company or the cable company, versus what's yours. So
what we're looking at here is a bunch of equipment that's owned by phone company, or cable company, whatever it might be. Now
typically, the Demarc separates the telephone company or cable company's equipment from yours.
But this is a leased building, so things are a little bit different here. To help explain that, let's take a look at this cable connection right
here. This right here is a, it's basically a multiplex or a splitter that comes from the cable company. We've got a great big chunk of
coax coming to the bottom of this, and this little splitter is designed to service four different customers. Now, if you're gonna be doing
cable, you need a cable modem. So, typically, in the Demarc area, we would have a cable modem that would act as our true
Demarc.
But because this is a leased office, we have offices all over this building, everybody has their own piece of equipment. So we cannot
end the Demarc right here. We actually have to run this cable over to our office and create a Demarc Extension. Welcome back to
my equipment room! Now, what we're seeing here is this big cable here on the right is the one that just, we saw at the Demarc. So
it's coming down here in my equipment room and it's running down along here. Yeah, they shoved me in here somehow to get this
shot.
And it comes down along. It goes through some splitters 'cause we use this for television as well as our internet. And this connector
right here comes up and connects into my cable modem. So we couldn't bring my network to the Demarc, so we extended the
Demarc to my network. And that's why this box, which is not my property, is the Demarc extension. This piece of ethernet cable right
here, I own that. So this is really where the separation takes place. So that's a Demarc Extension.
Wow. We covered a lot of ground in this episode. There's a lot to do when it comes to equipment rooms. For the network plus, keep
in mind that I want you to remember there's a difference between a Main Distribution Frame and an Intermediate Distribution
Frame. That equipment racks are 19-inch. The height of the U, and also keep in mind that you need to know the difference between
a Demarc and a Demarc Extension. You're gonna see all this on the network plus.
- When it comes to problems within a structured cable environment, the number one place to look is always gonna be in the work
area. The work area is exposed to crazy users and cleaning people, and all kinds of folks who can abuse that part of the
system, and its usually where most problems manifest themselves. However, from time to time, we can actually have
problems within the equipment room, or the MDF, whatever you want to call it. In these cases, you're gonna have to be looking for
issues that tend to effect more than one user. Here's a great example.
What happens if the switch itself goes down? Well, if this switch goes down, every computer connected to it is also gonna go
down. So watch out for questions on the Network+ that talkabout things like everybody in the network is down, versus just Tommy
and his computer going down. It'll help you figure out those individual questions. When individual big pieces of equipment in the
equipment room go down, the first thing I'm going to be suspecting is the electricity. Electricity can be bad, and it happens all the
time. So a good volt meter to be able to test the voltage, to make sure that you're getting good electricity to your equipment room is
absolutely important.
Along with that, we have tools like Voltage Monitors. A voltage monitor is a device that we plug in, and will actually watch the
voltage over an extended period of time. This will help for little problems like at five thirty, when all the elevators start kicking in in
your building, and they start causing all these sags, its voltage monitors that will help you diagnose stuff like that. Most of the time,
the fix for these is pretty simple. You get UPSs, uninterruptible power supplies installed. 19 inch equipment rack mounted
UPSs, and they'll, most of the time, take pretty good care of those types of issues.
Also keep in mind, they're electronics. So they're not gonna like too much moisture, they're not gonna like too much heat. So we
have all these different types of environmental and temperature monitors, that you can actually put into the equipment closet and
watch whats taking place to be able to determine if there's any problems like that. The other problem that can take place within
structured cabling, are problems with the horizontal run itself. Now these are incredibly rare. Keep in mind, the horizontal run, the
way we treat it, by putting it behindpatch panels and wall outlets, is to leave it alone, to not perturb it.
So as a result of that, we want to make sure that its never never messed with. But from time to time, things do happen. If you think
you got a problem with the horizontal run, your best buddy is going to be using your TDR. Put a TDR onto your patch panel at your
wall outlet. And if the TDR says that its only running 18 feet, and you know that its, about I don't know, 65 feet over to the closet, you
know you've got a break. Breaks are extremely rare though. The other big thing you've got to watch out for is interference, and this
is the one thing that will drive horizontal runs crazy.
Now keep in mind, that the guys who installed your horizontal runs took their cable certifier,and that cable certifier verifies all kinds
of stuff. It makes sure that there's low crosstalk, or acceptable for whatever your level is. It can actually listen to the amount of
interference its running along that horizontal run. And when they put that in there, they certify it. That's why its called a cable
certifier. That its going to work at whatever speed you paid them to make it work at. However, that doesn't take care of things that
happen retroactively. For example, if somebody installs a new air conditioning system, and someone put the motors a little bit too
close to your cables running up to the ceiling, you're going to have issues that'll take place.
Now a lot of times these issues can give you clues as to what the problem is. It only happens when it hot. It only happens when its
five o'clock, and people are doing things. So look for questions like that on the Network+ to give you some clues. Keep in mind that
unshielded twisted pair is very very susceptible to interference issues. And the only way you're going to be able to verify that is to
run some kind of cable tester, in particular a high-end certifier, which usually means you're going to pay somebody to come back
in to look for any type of interference.
And while we're talking about interference, there's one little weird thing that's on the Network+ I want to mention. When you have
fiber optic cabling, fiber optic cabling, in particular multi-mode fiber optic cabling, is susceptible to something called Modal
Distortion. Yep, I said that right, Modal Distortion. Modal Distortion simply means that when you have light travelling down a piece of
fiber optic cable, light travels in different modes. Now keep in mind, if you have a regular LED, that LED will have a color, so its not a
wavelength thing.
Its kind of like how the light comes out of the gate and how it bounces along. Now what will happen is overtime, what you think is
this perfect beam of light, by the time it gets to the other end, kinda breaks down into kind of a fuzzy beam. And now that's only
gonna happen on multi-mode cables. On single mode, because its a laser, lasers do not suffer from multi-mode distortions. So,
keep in mind of that subtle difference for the Network+ itself. The bottom line is, is that if you're gonna be having trouble within your
structured cabling system, nine times out of ten, don't go looking in the equipment room, go over to the work area cause that's
where most of the trouble takes place.
- I installed this power outlet and this RJ45 connection about a year ago, the idea here is I'm gonna plug a projector up in here, and
the projector's going to be network aware, it's gonna be really cool. Now, I'm gettin' ready to install the projector, but I got a problem,
and the problem is I forgot where this connection goes into my patch panel over in my equipment room, so in order to figure
out which connection in my patch panel corresponds to this wall outlet, I've gotta use this little guy. This is a Fox and a Hound.
Fox and Hound are registered trademarks of Triplett Corporation, so the more generic term is a Tone Generator and a Tone
Probe. The idea is simple, this guy creates a tone and then this guy, (repetitive tone) as you get close to whoever he's connected
to, then generates that tone, so you can find cables. Now this has an RJ11 connection on it, and for the record, RJ11s snap into
RJ45s just fine, isn't that cool? They just snap into the center like that, and what I can do is I can run back with this tone probe, back
to my patch panel, and figure out where he's connected.
Now, I can do that, but while I'm in here I wanna show you something kinda cool. What I have here, and one of the reasons that
this fluke device costs so much money is it's also a tone generator, so I've got it set to a particular tone now, (cheerful electronic
tone) so this is such a all-in-one device, I'm gonna go ahead and use this. Meet me back over at the patch panel, and let's find
out exactly where this wall outlet connects. Okay, so here I am at my little home patch panel.
This is a little patch panel, I installed this when I was settin' up all my wired networking. What, you don't have a wired network in
your house? Come on. Anyway, so now I'm gonna use my tone probe and I'm gonna just punch it into this big cluster of cables
here. Now you'll notice that I've actually unplugged the switch, and the reason I unplugged it is because the network activity will
make a lot of interference and make it hard to hear this thing, so I've gone aheadand unplugged it, so I'm just gonna hold the button
down. (loud buzzing followed by cheerful tone) Alright, so I can actually trace it down to an individual cable, but I what I need is to
know exactly which outlet it is.
(loud buzzing followed by cheerful tone) Perfect. So it's the second outlet, so what I'm gonna need to do now is, I don't wanna do
this again, so I'm gonna write home theater right on the label of the patch panel to make sure I don't have to go through this
rigmarole again but that's what a tone probe and a tone generator are all about, they're designed to help you find cables when you
forgot to label and you've got nothin' but a big pile, these guys can be your best friend.