This document discusses network topologies and design. It describes different physical topologies including bus, star, ring, and their advantages and disadvantages. It also covers the types of network cabling used in physical topologies like UTP, STP, coaxial, and fiber optic cabling. Horizontal and backbone cabling standards are discussed. Factors that influence network performance such as connection speeds, utilization, and calculating bandwidth are also summarized.
PPT on Network Topology including Topics such as Introduction, Different types of Network Topologies such as Bus Topology, Ring Topology, Mesh Topology, Tree Topology, Star Topology, Hybrid Topology including Diagrams.
The IP addresses used to identify systems on a TCP/IP network. The IP address is an absolute identifier of both the individual machine and the network on which it resides.
Every IP datagram packet transmitted over a TCP/IP network contains the IP addresses of the source system that generated it and the destination system for which it’s intended in its IP header.
PPT on Network Topology including Topics such as Introduction, Different types of Network Topologies such as Bus Topology, Ring Topology, Mesh Topology, Tree Topology, Star Topology, Hybrid Topology including Diagrams.
The IP addresses used to identify systems on a TCP/IP network. The IP address is an absolute identifier of both the individual machine and the network on which it resides.
Every IP datagram packet transmitted over a TCP/IP network contains the IP addresses of the source system that generated it and the destination system for which it’s intended in its IP header.
Upon completion of this chapter, you will be able to:
1) Describe the operation of the Ethernet sublayers.
2) Identify the major fields of the Ethernet frame.
3) Describe the purpose and characteristics of the Ethernet MAC address.
4) Describe the purpose of ARP.
5) Explain how ARP requests impact network and host performance.
6) Explain basic switching concepts.
7) Compare fixed configuration and modular switches.
8) Configure a Layer 3 switch.
Federated Cloud Computing - The OpenNebula Experience v1.0sIgnacio M. Llorente
The talk mostly focuses on private cloud computing to support Science and High Performance Computing environments, the different architectures to federate cloud infrastructures, the existing challenges for cloud interoperability, and the OpenNebula's vision for the future of existing Grid infrastructures.
Upon completion of this chapter, you will be able to:
1) Describe the operation of the Ethernet sublayers.
2) Identify the major fields of the Ethernet frame.
3) Describe the purpose and characteristics of the Ethernet MAC address.
4) Describe the purpose of ARP.
5) Explain how ARP requests impact network and host performance.
6) Explain basic switching concepts.
7) Compare fixed configuration and modular switches.
8) Configure a Layer 3 switch.
Federated Cloud Computing - The OpenNebula Experience v1.0sIgnacio M. Llorente
The talk mostly focuses on private cloud computing to support Science and High Performance Computing environments, the different architectures to federate cloud infrastructures, the existing challenges for cloud interoperability, and the OpenNebula's vision for the future of existing Grid infrastructures.
Home Automation Products and Suppliers in UAEBeatriz john
Home Automation
Home Automation has been a work in progress for several decades.
With complete control of home systems and appliances,
Today, automation is at its peak.
Smart homes are the latest in luxury living,
A few of its applications include:
Automated lighting:
lighting systems can be controlled remotely or through smart controls.
These smart controls include motion sensors and heat sensors.
Motion controlled Automated lighting is an effective power-saving technique,
It saves power using only those lights in rooms with activity.
Security and Surveillance:
With Home automation, you can
-Remotely control surveillance equipment, and
-Enjoy the ease of remote access control.
Smart security systems have proven to be extremely secure.
Homeowners get security updates when
-invalid PIN/passwords are entered,
-someone breaks in, and
-when doors are left unlocked or open.
Smart Sensors:
Smart sensors include heat and motion sensors.
Automation uses these sensors to
-save power, and
-detect threats like fires and burglars.
Today, Automation includes appliances that are not internet-connected.
IP-controlled power switches allow users to remotely power on/off appliances from anywhere.
Constant and rapid development in this field holds promises of complete control and effective power-saving features, with smart logical programming.
Visit yellowpages-uae.com to Contact Home Automation Products and Suppliers in UAE i.e. at http://www.yellowpages-uae.com/uae/home-automation
HEMS berkembang sejak tahun 2009 akhir ternyata dari system dan alur kerja bengkel sepeda motor ini dapat diterapkan pada alur kerja workshop alat berat pada site pertambangan batubara , sehingga SIB berubah menjadi MMIS ( Maintenance Management Information System ) sebuah system manajemen maintenance
perawatan dan perbaikan kendaraan dan alat berat
dengan dukungan software desktop berbasis Microsoft access,
yang tahap awal di implementasikan pada workshop site
pertambangan batubara di Kintap – Kalimantan Selatan,
dilanjutkan ke Ampah Kalimantan Tengah, Melak – Kalimantan
Utara, serta Semboja – Kalimantan Timur.
HEMS - Heavy Equipment Management System sebagai Sistem
manajemen perawatan dan perbaikan kendaraan dan alat berat
sampai tahun 2011 MMIS
disamping diimplementasikan masih di lingkungan tambang
batubara di Jambi dan Tamiang - Kalteng, namun disini sudah
berkembang ke bidang lain yaitu galangan kapal, pengurugan,
di Gresik – Jawa Timur dan mulai merambah ke kontraktor sipil
di Rembang dan Denpasar.
Kelanjutan dari kontaktor inilah yang tingkat perkembangannya
jadi sedemikian besar, MMIS sebagai sistem perawatan kendaraan
dan alat berat mulai diterapkan untuk mengelola peralatan pada
perusahaan kontraktor pilling ( tiang pancang ), pada posisi
ini sudah mulai menggunakan software aplikasi berbasis web
Perkembangan yang cukup drastis sebagai sebuah sistem informasi
khusus pengelolaan peralatan konstruksi untuk operasional dan
perawatan kendaraan mesin dan alat berat manajemen terjadi di
tahun 2017 dimana MMIS diharuskan berubah karena tuntutan
implementasi lapangan untuk mengelola perawatan peralatan
proyek tol Cimanggis – Cibitung sebuah project negara yang
sangat besar milik PT. Waskita Karya ( persero ) Tbk. dan
juga PT. Nindya Karya ( persero ) dengan modul dan fitur
yang jauh lebih lengkap untuk perusahaan jasa konstruksi
sehingga MMIS harus berubah menjadi HEMS ( Heavy Equipment
Management System ), perubahan yang sangat drastis dari
software yang berbasis desktop menjadi web khusus untuk
manajemen operasional dan perawatan kendaraan mesin dan
alat berat.
Perkembangan selanjutnya masih di sekitar BUMN, HEMS dipercaya
sebagai system manajemen tidak saja perawatan namun sudah
melebar ke operasional peralatan pada usaha rental dan jasa
konstruksi, dan kontraktor pekerjaan sipil di Bandar Lampung
, Manado.dan Pomalaa- Sulawesi Tenggara.
HEMS berkembang terus di tahun 2019 ke bidang usaha di luar
tambang dan kontraktor yaitu untuk manajemen distribusi pada
perusahaan distributor bahan bangunan di Kalimantan Barat,
dan untuk pengelolaan bengkel rekanan dari PT. Freeport dan
PT.Petrosea di Timika Papua.
tahun 2020 ini HEMS dipercaya dalam penanganan manajemen operasional dan perawatan peralatan kendaraan dan alat pada project
pembangunan PLTA ( Pembangkit Listrik Tenaga Air ) di Kerinci
Jambi dari PT. Kerinci Merangin Hydro, ( Bukaka - Kalla Group )
Vaginal cancer is a rare type of cancer most common in women 60 and older.
Women are more likely to develop vaginal cancer if they have the human papillomavirus (HPV) or if your birth mother took diethylstilbestol (DES) when she was pregnant.
There are several types of vaginal cancer:
Squamous cell carcinoma
About 70 of every 100 cases of vaginal cancer are squamous cell carcinomas. These cancers begin in the squamous cells that make up the epithelial lining of the vagina. These cancers are more common in the upper area of the vagina near the cervix. Squamous cell cancers of the vagina often develop slowly. First, some of the normal cells of the vagina get pre-cancerous changes. Then some of the pre-cancer cells turn into cancer cells. This process can take many years.
The medical term most often used for this pre-cancerous condition is vaginal intraepithelial neoplasia (VAIN). "Intraepithelial" means that the abnormal cells are only found in the surface layer of the vaginal skin (epithelium). There are 3 types of VAIN: VAIN1, VAIN2, and VAIN3, with 3 indicating furthest progression toward a true cancer. VAIN is more common in women who have had their uterus removed (hysterectomy) and in those who were previously treated for cervical cancer or pre-cancer.
In the past, the term dysplasia was used instead of VAIN. This term is used much less now. When talking about dysplasia, there is also a range of increasing progress toward cancer - first, mild dysplasia; next, moderate dysplasia; and then severe dysplasia.
Adenocarcinoma
Cancer that begins in gland cells is called adenocarcinoma. About 15 of every 100 cases of vaginal cancer are adenocarcinomas. The usual type of vaginal adenocarcinoma typically develops in women older than 50. One certain type, called clear cell adenocarcinoma, occurs more often in young women who were exposed to diethylstilbestrol (DES) in utero (when they were in their mother’s womb). (See the section called "What are the risk factors for vaginal cancer?" for more information on DES and clear cell carcinoma.)
Melanoma
Melanomas develop from pigment-producing cells that give skin its color. These cancers usually are found on sun-exposed areas of the skin but can form on the vagina or other internal organs. About 9 of every 100 cases of vaginal cancer are melanomas. Melanoma tends to affect the lower or outer portion of the vagina. The tumors vary greatly in size, color, and growth pattern. More information about melanoma can be found in our document called Melanoma Skin Cancer.
Sarcoma
A sarcoma is a cancer that begins in the cells of bones, muscles, or connective tissue. Up to 4 of every 100 cases of vaginal cancer are sarcomas. These cancers form deep in the wall of the vagina, not on its surface. There are several types of vaginal sarcomas. Rhabdomyosarcoma is the most common type of vaginal sarcoma. It is most often found in children and is rare in adults. A sarcoma called leiomyosarcoma is seen more often in adults.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
2. ObjectivesObjectives
• Discuss the different physical topologies
• Determine which type of network media to use
given a set of requirements
• Consider performance requirements and
improvements for given situations
3. Network TopologyNetwork Topology
• Topology
There are two types of topology:
physical and logical.
• The physical topology of a network refers to the
configuration of cables, computers, and other
peripherals.
• Logical topology is the method used to pass the
information between workstations.
4. Physical Topologies:Physical Topologies:
BusBus
• All devices are connected to a central cable,
called the bus or backbone. Bus networks are
relatively inexpensive and easy to install for
small networks. It has a single cable with
terminators at each end.
5. Physical Topologies:Physical Topologies:
BusBus
• A bus topology connects all stations in a linear fashion
Figure 4-1: Bus topology
Terminator - A device that provides electrical resistance at the end of a transmission line. Its function is to
absorb signals on the line, thereby keeping them from bouncing back and being received again by the network.
6. Physical Topologies:Physical Topologies:
BusBus
• Bus topology advantages:
– It is inexpensive
– It is easy to design and implement because the
stations are simply daisy-chained together
• Bus topology disadvantages:
– It is difficult to troubleshoot
– It requires termination
7. Physical Topologies:Physical Topologies:
StarStar
• The star network configuration is the most popular
physical topology
• In a star configuration, all computers or stations are
wired directly to a central location:
– Concentrator (a.k.a. hub)
– Multistation Access Unit (MAU)
• A data signal from any station goes directly to this
central device, which transmits the signal according
to the established network access method for the
type of network
• The protocols used with star configurations
are usually Ethernet or LocalTalk
9. Physical Topologies:Physical Topologies:
StarStar
• Star topology advantages:
– A break in one cable does not affect all other
stations as it does in bus technologies
– Problems are easier to locate because symptoms
often point to one station
– The second-easiest topology to design and install
– Does not require manual termination
• Instead the media is terminated in the station at the
transceiver on the NIC and in the hub or MAU
10. Physical Topologies:Physical Topologies:
StarStar
• Star topology disadvantages:
– Hubs, which are required for a star topology, are
more expensive than bus connectors
– A failure at the hub can affect the entire
configuration and all connected stations
– Uses more cable than bus topologies
11. Physical Topologies:Physical Topologies:
Star/bus/TreeStar/bus/Tree
• Bus and star topologies can be combined to form
a star/bus or bus/star physical topology
• Hubs that have connectors for coaxial cable as
well as for twisted-pair wiring are used to form
these types of networks
• When different physical topologies are applied to
a network, the result is often called a mixed
media network
15. Physical Topologies:Physical Topologies:
RingRing
• A ring network is a network topology in which each
node connects to exactly two other nodes, forming a
circular pathway for signals - a ring. Data travels
from node to node, with each node handling every
packet.
• Because a ring topology provides only one pathway
between any two nodes, ring networks may be
disrupted by the failure of a single link.
•
16. Physical Topologies:Physical Topologies:
RingRing
• A system of which each node or station is
connected to two others, ultimately forming a
loop (circular pathway for signals).
• Data are passed in one direction only, being
received by each node and then transferred to the
next node.
•
18. Physical Topologies:Physical Topologies:
RingRing
• Physical rings
– Most often seen in Fiber Distributed Data
Interface (FDDI) networks
• FDDI is a WAN technology
– Stations on a ring are wired to one another in a
circle around the entire network
19. Physical Topologies:Physical Topologies:
RingRing
• Ring topology advantages:
– It prevents network collisions because of the
media access method or architecture required
– Each station functions as a repeater, so the
topology does not require additional network
hardware, such as hubs
20. Physical Topologies:Physical Topologies:
RingRing
• Ring topology disadvantages:
– As in a bus network, a failure at one point can
bring down the network
– Because all stations are wired together, to add a
station the network must be shut down
temporarily
– Maintenance on a ring is more difficult than on a
star topology because an adjustment or
reconfiguration affects the entire ring
21. Physical Topologies:Physical Topologies:
Considerations When Choosing a Topology:
• Money. A linear bus network may be the least
expensive way to install a network; you do not have
to purchase concentrators.
• Length of cable needed. The linear bus network uses
shorter lengths of cable.
• Future growth. With a star topology, expanding a
network is easily done by adding another
concentrator.
• Cable type. The most common cable is unshielded
twisted pair, which is most often used with star
topologies.
36. Influence of the 5-4-3 Rule onInfluence of the 5-4-3 Rule on
TopologiesTopologies
• 5-4-3 rule states that between stations on a LAN, there can be no more
than five network segments connected, maximum number of repeaters is
four, and maximum number of segments with stations on them is three
Figure 4-3:
5-4-3 rule
37. Influence of the 5-4-3 Rule onInfluence of the 5-4-3 Rule on
TopologiesTopologies
Figure 4-4:
Mixed
topologies
38. Twisted-Pair CablingTwisted-Pair Cabling
• Common traits of all twisted-pair cabling
types and categories:
– The wires are copper
– The wires come in pairs
– The pairs of wires are twisted around each other
– The pairs of wires are usually enclosed in a cable
sheath individually and as a group of wires
39. Twisted-Pair CablingTwisted-Pair Cabling
• Crosstalk
– Signal bleed from one cable to another
– Usually occurs in poorly wired media
• Cancellation
– Insulates the signal from the effects of signal
bleeding
41. Unshielded Twisted-Pair (UTP)Unshielded Twisted-Pair (UTP)
• UTP advantages:
– Thin flexible cable that is easy to string between
walls
– Most modern buildings come with CAT 5 UTP
already wired into the wall outlets or at least run
between the floors
– Because UTP is small, it does not quickly fill up
wiring ducts
– Costs less per foot than other type of LAN cable
42. Unshielded Twisted-Pair (UTP)Unshielded Twisted-Pair (UTP)
• UTP disadvantages:
– More susceptible to interference than most other
types of cabling
• Pair twisting does help, but it does not make the cable
impervious to electrical noise
– Its unrepeated length limit is 100 meters
43. RJ-45 ConnectorsRJ-45 Connectors
• Registered Jacks (RJ)
– Type of telecommunication connector used for
twisted-pair cabling
– Typically RJ-45 connectors resemble the typical RJ-
11 connectors that connect the phone to the wall
• Difference between RJ-45 connectors and RJ-11 connectors is
that the former has eight wires (four-pair) and the latter four
(two-pair)
– Some RJ-11 connectors are used with three-pair (six-
wire) UTP
44. Shielded Twisted-Pair (STP)Shielded Twisted-Pair (STP)
• Cabling often seen in Token Ring networks
• Similar to UTP in that the wire pairs are
twisted around each other inside the cable
• The advantage of STP over UTP is that it has
greater protection from interference and
crosstalk due to the shielding
45. Shielded Twisted-Pair (STP)Shielded Twisted-Pair (STP)
• STP disadvantages as compared to UTP
include:
– A higher cost per foot
– The shield must be grounded at one end
• Improper grounding can cause serious interference
– Heavier and less flexible
– Because of its thickness, STP may not fit down
narrow cable ducts
46. Coaxial CablingCoaxial Cabling
• Consists of either:
– A solid inner core (often made of copper)
– Wire strand conductor surrounded by insulation
• The two most commonly used coaxial cable:
– Thicknet
– Thinnet
47. Coaxial CablingCoaxial Cabling
• Advantages of coaxial cabling on a LAN
include:
– The segment lengths are longer than UTP or STP
– Coaxial cable has greater interference immunity
than UTP
– Hubs between stations are not required
48. Coaxial CablingCoaxial Cabling
• Disadvantages of coaxial cable:
– Not as easy to install as UTP
– More expensive than UTP
– Supports a maximum bandwidth of only 10 Mbps
– Requires more room in wiring ducts than UTP
– Is relatively difficult to troubleshoot thinnet and
thicknet networks
– Connectors can be expensive.
– It is easily damaged and sometimes difficult to work
with, especially in the case of thick coaxial.
– Baseband coaxial cannot carry integrated voice, data,
and video signals.
50. Thinnet and Thicknet ConnectorsThinnet and Thicknet Connectors
• The most common connectors for RG-58 cabling
on thinnet networks are:
– Barrel connectors
– T-connectors
– Terminators
• BNC
– Hardware connector for coaxial cable with a
cylindrical shell with two small knobs allowing it to
be locked into place when twisted
51. Thinnet and Thicknet ConnectorsThinnet and Thicknet Connectors
• Attachment unit
interface (AUI)
port
– A 15-pin physical
connector
interface between
a computer’s
network NIC and
an Ethernet
networking that
uses 10Base5
coaxial cableFigure 4-6: Thinnet connectors
52. Fiber-Optic CableFiber-Optic Cable
• Carries light pulses rather than electrical
signals long its fibers
• Made of glass or plastic fibers, rather than
copper wire like most other network cabling
• Core of the cable is usually pure glass
– Surrounding the glass is a layer of cladding made
of glass or plastic, which traps the light in the core
53. Fiber-Optic CableFiber-Optic Cable
• Fiber-optic cabling advantages:
– Can transmit over long distances
– Not susceptible to electromagnetic interference or
crosstalk
– Supports extremely high transmission rates
– Cable has a smaller diameter and can be used in
narrow wiring ducts
– Not susceptible to eavesdropping
54. Fiber-Optic CableFiber-Optic Cable
• Fiber-optic cabling disadvantages:
– More expensive than other types of networking
media
– More difficult and more expensive to install than
any other network media
– Because it is fragile, it must be installed carefully
and protected after installation
55. Signal DegradationSignal Degradation
• Degradation sources can be internal or external
• When signals degrade over distance, attenuation
results
• Three internal factors can cause attenuation:
– Resistance
– Inductive reactance
– Capacitive reactance
56. Signal DegradationSignal Degradation
• When the internal opposition forces are combined
and measured, the measure is called impedance
– External forces affecting network signals include:
– Electromagnetic interference (EMI)
– Radio frequency interference (RFI)
– Both types of interference can degrade and corrupt
network signals as they travel through a wire
57. Ways to Reduce EMI/RFI onWays to Reduce EMI/RFI on
Network CablingNetwork Cabling
• Keep network media away from sources of
EMI
• Ensure that network media is installed
properly
• Use shielded cabling
• Use repeaters
• Ensure that you install high-quality cabling
58. Horizontal Cabling StandardsHorizontal Cabling Standards
• Horizontal cabling
– The twisted-pair or fiber-optic media connecting
workstations and wiring closets
• Electronics Industries Alliance and
Telecommunications Industry Association (EIA/TIA)
– Defines a set of specifications, EIA/TIA-568, which
covers outlets near the workstation, mechanical
terminations in wiring closets, and all cable running along
the horizontal path between wiring closet and workstation
60. Horizontal Cabling StandardsHorizontal Cabling Standards
• EIA/TIA-568B
– Specifies that the maximum distance for a UTP
horizontal cable run is 90 meters (295 feet)
– Also, patch cords (a.k.a. patch cables) located at
any cross-section cannot exceed six meters (20 feet)
• In addition to UTP, the following cable types
may be used for horizontal pathways:
– STP – two pairs of 150-ohm cabling
– Fiber-optic – a two-fiber 62.5/125 multimode cable
61. Wiring ClosetsWiring Closets
• Contain the wiring and wiring equipment for
connecting network devices, such as routers, bridges,
switches, patch panels, and hubs
• EIA/TIA-568 and EIA/TIA-569 standards apply to
the physical layout of media and wiring closets, with
the latter stating there must be a minimum of one
wiring closet per floor
– Furthermore, when a given floor area (catchment area)
exceeds 1,000 square meters, or the horizontal cabling
more than 90 meters, additional wiring closets are needed
62. Wiring ClosetsWiring Closets
• The main distribution facility (MDF) is the
central junction point for wiring of a star topology
• The additional closets are called intermediate
distribution facilities (IDFs)
• IDFs are required when:
– Catchment area of MDF is not large enough to capture all
nodes
– The LAN is in a multistory facility
– The LAN encompasses multiple buildings
63. Proximity to the POPProximity to the POP
• Ensure that
main wiring
closet is
close to the
point of
presence
(POP) to
the Internet
Figure 4-8:
Network spanning
multiple buildings
64. Proximity to the POPProximity to the POP
Figure 4-9:
Network
spanning
multiple
floors
65. BackboneBackbone
• Backbone cable (sometimes called vertical
cabling) connects wiring closets to each other in
an extended star topology
• EIA/TIA-568 specifies four different options for
backbone cabling:
– 100-ohm UTP
– 150-ohm STP
– 62.5/125-micron optical fiber
– Single-mode optical fiber
66. Performance Considerations:Performance Considerations:
Connection SpeedsConnection Speeds
• The real capacity of a network is sometimes
referred to as throughput
• Factors affecting throughput include:
– Type of network devices being used on the network
– Number of nodes
– Power issues
– Network architecture
– Other variables
68. Performance Considerations:Performance Considerations:
UtilizationUtilization
• Solutions for reducing network utilization
include:
– Segmenting a network with connectivity
– Reducing number of services provided on the segment
– Reducing number of protocols in use on the segment
– Disabling bandwidth-intensive applications or
protocols
– Relocating systems consuming the most bandwidth on
the segment
69. Performance Considerations:Performance Considerations:
Calculating Bandwidth and ThroughputCalculating Bandwidth and Throughput
• When considering an organization’s
bandwidth requirements, discover types of
bandwidth-intensive communications
conducted on its network
• Transmission time
– Time it takes a file to transfer from one location to
another
70. Performance Considerations:Performance Considerations:
Collisions and ContentionCollisions and Contention
• All stations on an Ethernet segment must share
the available connection with each other
– This means the stations contend with one another for
the opportunity to transmit on the wire
• When considering upgrading an existing network,
check the rate of collisions on the network using
a protocol analyzer or other network
performance-monitoring tool
80. Cable Testers:Cable Testers:
AttenuationAttenuation
• Attenuation is the loss of signal power over
the distance of a cable
• Signal injector
– Puts traffic on a wire so that a cable tester can
measure attenuation and crosstalk
• The lower the attenuation, the better
81. Cable Testers:Cable Testers:
NoiseNoise
• Alternating current (AC) signal noises are called
oscillations and can alter the digital signals that
computers receive on the wire
• The motherboard and other internal integrated circuits
of a computer use the chassis as their ground
• Faulty AC wiring can also cause problems with
transmissions because the signal reference ground is
the computer chassis and grounding plate
• A transformer steps voltage up or down where the hot
lead originates and the neutral wire is grounded
82. Cable Testers:Cable Testers:
NEXTNEXT
• Near end crosstalk (NEXT)
– Measure of interference from other wire pairs
• Causes of NEXT include:
– Split pairs
– Too much wire untwisted at the patch panel, jack,
or connectors
– Bends, kinks, or stretches in the cabling
84. Cable Testers:Cable Testers:
Distance MeasureDistance Measure
• EIA/TIA-568A specifies maximum cable
lengths for network media
• Cables that are too long can cause delays in
transmission and network errors
• Time-domain reflectometer (TDR)
– Cable tester that can detect the overall length of a
cable or the distance to a cable break
85. Cable Testers:Cable Testers:
BaselineBaseline
• Take baseline measurements to tell how well
the network is performing at a given moment
• Baseline measurements can include:
– Error rates
– Collision rates
– Network utilization
86. Network ArchitectureNetwork Architecture
• Logical topology
– Describes the way a signal travels in a network,
which is a function of the access method
• Usually a bus or a ring
• IEEE 802
– Covers issues concerning all types of networks
• LAN, MAN, WAN, and wireless
87. Logical Link Control (IEEE 802.2)Logical Link Control (IEEE 802.2)
• In the IEEE 802.2 specification, the Data Link layer is
divided into:
– The Media Access Control (MAC) sublayer
– The Logical Link Control (LLC) sublayer
• LLC sublayer is closer to software components of the
protocol stack because it controls data link
communications and defines Service Access Points
(SAP)
• MAC sublayer is closer to the underlying hardware
architecture
88. Logical Link Control (IEEE 802.2)Logical Link Control (IEEE 802.2)
Figure 4-20:
802.2
specification
89. CSMA/CD (802.3)CSMA/CD (802.3)
• IEEE 802.3 defines the access method used by
most Ethernet networks
• Jam signal
– 32-bit message to all computers on an Ethernet network
that tells all stations not to transmit
• 10BaseT
– Describes an Ethernet network connected by twisted-pair
cable that can support transmissions of 10 Mbps using
baseband (digital) signals
90. CSMA/CD (802.3)CSMA/CD (802.3)
• 10Base2
– Also known as thin Ethernet
• 10Base5
– Also known as thick Ethernet
• Fast Ethernet
– Also known as 100BaseT
• Gigabit Ethernet
– A more recent addition to the IEEE 802.3
specifications
91. Token Ring (802.5)Token Ring (802.5)
• In the 802.5 specification, Token Ring networks use
token-passing to keep track of which node is
communicating
• Star-ring
– Network architecture utilizing physical star topology with
logical ring topology
• Nearest active upstream neighbor (NAUN)
• Nearest active downstream neighbor (NADN)
92. Token Ring (802.5)Token Ring (802.5)
• Active monitor
– Computer in a Token Ring network that is
powered on first and that manages the beaconing
process
• Beaconing
– Fault-detection method implemented in Token
Ring networks
93. Wireless Technologies (802.11)Wireless Technologies (802.11)
• The 802.11 standard for wireless LANs specifies
parameters at both Physical and Data Link layers of
OSI model
• At the Physical layer, infrared (IR) or spread
spectrum technologies are supported
• At the Data Link layer, 802.11 specifies Carrier
Sense Multiple Access/Collision Avoidance
(CSMA/CA) as the network access method
94. FDDIFDDI
• Fiber Distributed Data Interface (FDDI)
standard
– Responsibility of the American National
Standards Institute (ANSI)
– Describes a network that can span up to 100
kilometers (62 miles) over single-mode fiber-optic
cabling
– Based on the Token Ring (802.5) specification but
with different limitations
95.
96. LAN Design ModelsLAN Design Models
• You can choose many different network
design models to implement on your network
• There are two basic designs strategies that are
typically followed:
– Mesh design
– Hierarchical design
98. LAN Design ModelsLAN Design Models
• Compared to a mesh design, a hierarchical
design:
– Is easier to manage
– Is easier to troubleshoot
– Has improved scalability
– Allows easier analysis
99. Three-Layer Network ModelThree-Layer Network Model
• Divides a network into three connectivity
layers
• Consists of:
– Core layer
– Distribution layer
– Access layer
101. Two-Layer Network ModelTwo-Layer Network Model
One-Layer Network ModelOne-Layer Network Model
• Two-layer network model
– Divides a network into two connectivity layers:
• Core
• Access
• One-layer network model
– Includes WAN connectivity equipment and organizes
a network so that is can be easily adapted to the two-
layer and three-layer design models in the future
106. Network-Management ToolsNetwork-Management Tools
• Other sophisticated network-management
tools can be used for daily network-
management and control functions
• These tools typically have three components:
– Agent
– Manager
– Administration system
107. Simple Network ManagementSimple Network Management
Protocol (SNMP)Protocol (SNMP)
• A Management
Information
Base (MIB) is a
database that
maintains
statistics and
information the
SNMP reports and
uses
Figure 4-25:
SNMP in action
108. Simple Network ManagementSimple Network Management
Protocol (SNMP)Protocol (SNMP)
• Management tasks include:
– Network traffic monitoring
– Automatic disconnection of problem nodes
– Connection or disconnection of nodes based on
time and/or date
– Port isolation for testing purposes
– Remote management capabilities
109. CMIPCMIP
• Common Management Information Protocol
• Similar to SNMP in that it uses the MIB to
monitor the network
• Not as widely implemented as SNMP
• More efficient than SNMP because the client
reports the information to the management
device
110. Chapter SummaryChapter Summary
• There are three basic physical LAN topologies
• These topologies typically involve cable
• The IEEE has defined many standards that
have influenced the way networks are
designed and implemented
• One of the largest contributions from the
IEEE is the 802 standard
111. Chapter SummaryChapter Summary
• Installing media on a network is multifaceted
project
• Obstructions and EMI/RFI must be overcome
• When implementing a network, you can
choose on of three hierarchical models
• Network administrators use network monitors
and network analyzers to manage a network
on daily basis
Editor's Notes
There are 5 main ways to arrange nodes in a network. In a ring network, devices are connected in a ring and message are routed around the ring from one device to the next. A bus network contains devices connected directly in a straight line. Each device can communicate directly with every other device one the network. In bus and ring topologies, there is no central coordinating computer. A hierarchical network is structured as an upside down tree like an organizational chart. Messages are passed to computers along the “branches”. As in the bus and ring networks, there is no coordinating computer. A star network has a central, coordinating device; each computer on the network is directly attached only to the central device. The central device is the vulnerability of the network – it can become a bottleneck under heavy traffic and the whole network fails if it fails.
Many organizations use a combination of these various topologies, or a hybrid network.
There are 5 main ways to arrange nodes in a network. In a ring network, devices are connected in a ring and message are routed around the ring from one device to the next. A bus network contains devices connected directly in a straight line. Each device can communicate directly with every other device one the network. In bus and ring topologies, there is no central coordinating computer. A hierarchical network is structured as an upside down tree like an organizational chart. Messages are passed to computers along the “branches”. As in the bus and ring networks, there is no coordinating computer. A star network has a central, coordinating device; each computer on the network is directly attached only to the central device. The central device is the vulnerability of the network – it can become a bottleneck under heavy traffic and the whole network fails if it fails.
Many organizations use a combination of these various topologies, or a hybrid network.
There are 5 main ways to arrange nodes in a network. In a ring network, devices are connected in a ring and message are routed around the ring from one device to the next. A bus network contains devices connected directly in a straight line. Each device can communicate directly with every other device one the network. In bus and ring topologies, there is no central coordinating computer. A hierarchical network is structured as an upside down tree like an organizational chart. Messages are passed to computers along the “branches”. As in the bus and ring networks, there is no coordinating computer. A star network has a central, coordinating device; each computer on the network is directly attached only to the central device. The central device is the vulnerability of the network – it can become a bottleneck under heavy traffic and the whole network fails if it fails.
Many organizations use a combination of these various topologies, or a hybrid network.
There are 5 main ways to arrange nodes in a network. In a ring network, devices are connected in a ring and message are routed around the ring from one device to the next. A bus network contains devices connected directly in a straight line. Each device can communicate directly with every other device one the network. In bus and ring topologies, there is no central coordinating computer. A hierarchical network is structured as an upside down tree like an organizational chart. Messages are passed to computers along the “branches”. As in the bus and ring networks, there is no coordinating computer. A star network has a central, coordinating device; each computer on the network is directly attached only to the central device. The central device is the vulnerability of the network – it can become a bottleneck under heavy traffic and the whole network fails if it fails.
Many organizations use a combination of these various topologies, or a hybrid network.
There are 5 main ways to arrange nodes in a network. In a ring network, devices are connected in a ring and message are routed around the ring from one device to the next. A bus network contains devices connected directly in a straight line. Each device can communicate directly with every other device one the network. In bus and ring topologies, there is no central coordinating computer. A hierarchical network is structured as an upside down tree like an organizational chart. Messages are passed to computers along the “branches”. As in the bus and ring networks, there is no coordinating computer. A star network has a central, coordinating device; each computer on the network is directly attached only to the central device. The central device is the vulnerability of the network – it can become a bottleneck under heavy traffic and the whole network fails if it fails.
Many organizations use a combination of these various topologies, or a hybrid network.
There are 5 main ways to arrange nodes in a network. In a ring network, devices are connected in a ring and message are routed around the ring from one device to the next. A bus network contains devices connected directly in a straight line. Each device can communicate directly with every other device one the network. In bus and ring topologies, there is no central coordinating computer. A hierarchical network is structured as an upside down tree like an organizational chart. Messages are passed to computers along the “branches”. As in the bus and ring networks, there is no coordinating computer. A star network has a central, coordinating device; each computer on the network is directly attached only to the central device. The central device is the vulnerability of the network – it can become a bottleneck under heavy traffic and the whole network fails if it fails.
Many organizations use a combination of these various topologies, or a hybrid network.
There are 5 main ways to arrange nodes in a network. In a ring network, devices are connected in a ring and message are routed around the ring from one device to the next. A bus network contains devices connected directly in a straight line. Each device can communicate directly with every other device one the network. In bus and ring topologies, there is no central coordinating computer. A hierarchical network is structured as an upside down tree like an organizational chart. Messages are passed to computers along the “branches”. As in the bus and ring networks, there is no coordinating computer. A star network has a central, coordinating device; each computer on the network is directly attached only to the central device. The central device is the vulnerability of the network – it can become a bottleneck under heavy traffic and the whole network fails if it fails.
Many organizations use a combination of these various topologies, or a hybrid network.
There are 5 main ways to arrange nodes in a network. In a ring network, devices are connected in a ring and message are routed around the ring from one device to the next. A bus network contains devices connected directly in a straight line. Each device can communicate directly with every other device one the network. In bus and ring topologies, there is no central coordinating computer. A hierarchical network is structured as an upside down tree like an organizational chart. Messages are passed to computers along the “branches”. As in the bus and ring networks, there is no coordinating computer. A star network has a central, coordinating device; each computer on the network is directly attached only to the central device. The central device is the vulnerability of the network – it can become a bottleneck under heavy traffic and the whole network fails if it fails.
Many organizations use a combination of these various topologies, or a hybrid network.
There are 5 main ways to arrange nodes in a network. In a ring network, devices are connected in a ring and message are routed around the ring from one device to the next. A bus network contains devices connected directly in a straight line. Each device can communicate directly with every other device one the network. In bus and ring topologies, there is no central coordinating computer. A hierarchical network is structured as an upside down tree like an organizational chart. Messages are passed to computers along the “branches”. As in the bus and ring networks, there is no coordinating computer. A star network has a central, coordinating device; each computer on the network is directly attached only to the central device. The central device is the vulnerability of the network – it can become a bottleneck under heavy traffic and the whole network fails if it fails.
Many organizations use a combination of these various topologies, or a hybrid network.
There are 5 main ways to arrange nodes in a network. In a ring network, devices are connected in a ring and message are routed around the ring from one device to the next. A bus network contains devices connected directly in a straight line. Each device can communicate directly with every other device one the network. In bus and ring topologies, there is no central coordinating computer. A hierarchical network is structured as an upside down tree like an organizational chart. Messages are passed to computers along the “branches”. As in the bus and ring networks, there is no coordinating computer. A star network has a central, coordinating device; each computer on the network is directly attached only to the central device. The central device is the vulnerability of the network – it can become a bottleneck under heavy traffic and the whole network fails if it fails.
Many organizations use a combination of these various topologies, or a hybrid network.
There are 5 main ways to arrange nodes in a network. In a ring network, devices are connected in a ring and message are routed around the ring from one device to the next. A bus network contains devices connected directly in a straight line. Each device can communicate directly with every other device one the network. In bus and ring topologies, there is no central coordinating computer. A hierarchical network is structured as an upside down tree like an organizational chart. Messages are passed to computers along the “branches”. As in the bus and ring networks, there is no coordinating computer. A star network has a central, coordinating device; each computer on the network is directly attached only to the central device. The central device is the vulnerability of the network – it can become a bottleneck under heavy traffic and the whole network fails if it fails.
Many organizations use a combination of these various topologies, or a hybrid network.