rollover cable

advertisement
DCN286
INTRODUCTION TO DATA COMMUNICATION
TECHNOLOGY
Network Physical Layer
Connection
Purpose of Physical Layer
The role of the OSI physical layer is to encode the
binary digits that represent data link layer frames
into signals and to transmit and receive these
signals across the physical media---- cooper
wires, optical fiber, and wireless that connect
network devices.
Network Access Layer
 The network access layer is concerned with all of the
issues that an IP packet requires to actually make a
physical link to the network media.
 It includes the LAN and WAN technology details, and all
the details contained in the OSI physical and data link
layers.
Popular Copper Media Standards
TIA (Telecommunications Industry
Association) and EIA (Electronic Industries
Alliance) work together to publish
commercial building telecommunications
cabling standards TIA/EIA-568-B which
defines how to use the pins on the
connectors on the ends of the cables.
IEEE (Institute of Electrical and Electronic
Engineers) publishes LAN standards such
as IEEE802.3 which will define cable
requirement.
Coaxial cable
Gradually outdated from LAN
Can run for longer distances than either
STP or UTP
Less expensive than fiber-optic cable
though it is expensive than STP or UTP
Still popular for TV and home internet
service
STP (Shielded Twisted Pair) cable
 Shielding provides better electrical
signals by reducing noise and
attenuation.
 Shielding makes the cable more
expensive, heavier and hard to
bend.
UTP (Unshielded Twisted Pair)
Flexible and easy install
Offer the same data speeds
Inexpensive
RJ45 connector (RJ11 is for phone cable).
UTP Implementation
UTP Implementation
Straight-through Cable
Switch to Router
Switch to PC or Server
Hub to PC or Server
Cross-over Cable
Switch to Switch; Switch to Hub; Hub to Hub
Router to Router; PC to PC; Router to PC
Roll-over Cable (Configuration Purposes)
PC to Router; PC to Switch
UTP Implementation
Straight-Through cable
A cable that maintains the pin connection all the
way through the cable.
Cat 5 and Cat5e: Only wires 1, 2, 3, and 6 are
used
Gigabit Ethernet uses all the wires
To connect devices such as PC or routers to
other devices as hub or switches.
UTP Implementation
Cross-over cable
A cable that crosses the critical pair to properly
align, transmit, and receive signals on the device
with line connections
Pin 1 at one end and Pin 3 at the other end
Pin 2 at one end and Pin 6 at the other end
Used to connect similar devices:
Switch to switch
Hub to hub
TIA/EIA568-A and B pin outs
Pin #
1
2
3
4
5
6
7
8
Function
TD+
TDRD+
Unused
Unused
RDUnused
Unused
568A wire color
White/Green
Green
White/Orange
Blue
White/Blue
Orange
White/Brown
Brown
568 B wire color
White/Orange
Orange
White/Green
Blue
White/Blue
Green
White/Brown
Brown
Straight through cable
Can be used to connect PC and other
network equipments to LAN hub/switch
Wire 1 and 2 are used to transmit data
Wire 3 and 6 are used to receive data
Cross-over cable
It is used to connect two same equipments
such as PC-to-PC.
Both ends need to send data on pin 1 and
2; receive data on pin 3 and 6.
In 568B, one end has white/orange and
orange on pin 1 and 2; another has
white/orange and orange on pin 3 and 6.
In 568B, one end has white/green and
green on pin 3 and 6; another end has
them on pin 1 and 2.
Rollover cable
Usually used as console cable.
Change the sequence on another end.
Rollover or Console Cable
The cable used between a terminal and a
console port is a rollover cable with RJ-45
connectors.
Rollover cable (or Console cable) has a
different pinout than the straight-through or
crossover cable.
The pinout for a rollover cable is:
1 to 8, 2 to 7, 3 to 6, 4 to 5, 5 to 4, 6 to 3, 7 to 2,
and 8 to 1.
Connector and Adapter
The 8 Position 8 Contact
(8P8C) (often called
RJ45) connector
Cross over adapter
Optic media
 Fiber-optic cable has the strongest ability to resist
EMI (electromagnetic interference), RFI (Radio
Frequency Interference)
 Fiber’s bandwidth is much higher than any other
media.
 Fiber is highly secure and it is easy to detect
intrusion.
 Fiber uses light signal transmission and its
attenuation is much less than electrical signals. Its
length could be very long
Optical fiber cable components
 Core: usually made by
silicon dioxide (from
sand)
 Cladding: coated on the
core to reflect light and
seal it inside
 Buffer: physical protect
cladding and core
 Jacket: prevent damage
from abrasion, solvents
and other contaminants
Optical Fiber Connector (Optional)
LC/PC connector and
SC/PC connectors
have caps covering
the ferrules
Other connectors are
ST, SC, MT, MT-RJ,
MU, etc, etc
Multimode fiber
Fiber with large (greater than 10 μm) core
diameter may allow light coming in with
different angles. (It must be in limit of
acceptance cone)
Single mode fiber
Fiber with a core diameter less than about
ten times the wavelength of the
propagating light and it can only allow light
coming in from one direction.
LAN Connectivity Devices
Repeaters
Hubs
Switches
Bridges
Routers
Repeaters
A repeater can be used to increase the length
of your network by eliminating the effect of
attenuation on the signal.
It connects two segments of the same network,
overcoming the distance limitations of the
transmission media.
Some repeaters also serve as transmission
media adapters, connecting two different types
of media.
Repeaters
Repeaters can connect segments that have the
same access method. (CSMA/CD, Token
Passing, Polling, etc.)
Disadvantages
Repeaters do not filter data
Its use is inappropriate when there is a heavy network
traffic.
Repeater
10base5 – 500meter cable length limit;
10base2 - 200meter cable length limit;
10BaseT - 100meter cable length limit;
Repeater is to amplify signal and extend the
cabling distance.
Working in layer 1 (Physical) of TCP/IP
model
Repeaters
Figure11-6
Hub
Central connection of Ethernet LAN.
Physically Star topology and could be
logically RING, Bus and/or Star
May have built-in repeater
Working in layer 1 (Physical) of TCP/IP
model
Hubs
A hub is used as a central point of
connection among media segments.
Cables from network devices plug in to the
ports on the hub.
Hubs are referred as Concentrators or multiport repeater
Hubs receive signals from connected
devices and transmit them to the other
connected devices
Hubs
Regenerate and repeat signals
Propagate signals through the network
Can not filter network traffic
Can not determine the best path
Are used as network concentration points.
Hubs
Types of Hubs
Passive Hubs
Active Hubs
Intelligent Hubs (Switches)
Passive Hub
It functions only as a connection point for
the signals
The signal pass through a passive hub
without regeneration or amplification.
Active Hub
It regenerates or amplifies the signal
before they are retransmitted.
Drawback:
The noise is also regenerated
Switch
Think switch as a hub with bridge functioning on
each port (interface):
1. Switch will offer central connection to all hosts.
2. Switch will only forward frame according to
destination MAC address on per-port base.
3. Will regenerate signals (repeater function)
4. Most switches are working in layer 2 (Data
Link) of TCP/IP model.
Switches
LAN Switch
broadcast
traffic
LAN switch
Broadcasts to all ports on LAN
sw itch.
Single Switch Virtual LANs
broadcast
source
Forwarding Frame based on Destination
MAC Address
 The switch maintain table, called a MAC table,
that maps destination MAC addresses with ports
used to connect to each node. For each
incoming frame, the destination MAC address in
the frame header is compared to the list of
addresses in the MAC table. If a match is found,
the port number in the table that is paired with
MAC address is used as exit port for the frame.
 The MAC table can be referred to by many
different name. It also called Switch table or
Bridge table.
Switch Operation
To accomplish Frame Forwarding, Ethernet LAN
switches use five basic operations:
Learning: The Mac table must be populated with
MAC addresses and their corresponding ports.
The learning process allows these mappings to
be dynamically acquired during normal
operation.
Aging: The entries in the MAC table acquired by
the learning process are time stamped. This time
stamp is used as a means for removing old
Continues Slide-37
entries in the MAC table. After it is made in the
MAC table, a procedure begins count down,
once it reaches count 0, the entry is aged out
and remove from the table.
Flooding: If a switch does not have a MAC address
entry in its MAC table that matches the
destination MAC address of received frame, the
switch will flood the frame. Flooding involves
sending a frame to all ports except the port on
which the frame arrived.
Switch Continues
Selective Forwarding:
Selective forwarding is the process of examining
the destination MAC address of a frame and
forwarding it out to the appropriate port.
Filtering: In some cases, a frame is not forwarded.
This process is called frame filtering e.g. a
switch does not forward a frame to the same
port on which it arrived. A switch will also drop a
corrupt frame. If a frame fails a CRC check, the
frame is dropped.
Ethernet Bridge
 Intelligent device to forward frame according to
destination Media Access Control (MAC)
address
 Forwarding: If the destination MAC address has
a port different to the originate port, the frame
will be sent.
 Filtering: If the destination MAC address is
reachable with the same interface when it
arrived, the frame will be discarded.
 Working in layer 2 (Data Link) of TCP/IP model
Layer 2 Bridging
Bridges
Segmentation
80% of LAN traffic stays on local LAN
20% of LAN
traffic travels
between LANs
LAN A
bridge
LAN B
Router
Redirect packets according to destination
logical address (IP address).
Can build routing path between different
network segments (subnets)
Can act as firewall
Can work as VPN (server) connection
Working in layer 3 (Network) of TCP/IP
model
Routers
Figure 11-7
Wireless tech introduction
 Infrared
 Bluetooth
 Microwave
 Radio
 Wi-Fi
In general, wireless network is secondary because
of two concerns: speed and security. But, it does
offer mobility and convenience.
Wireless Networking Media
Radio frequency (RF)
Laser
Infrared (IR)
Satellite/Microwaves
Wireless transmission techniques to carry
wireless signals
Wireless signals are electromagnetic waves
that travel through the air.
Wireless Networking Media
Infrared
Line of sight
Short distances
No obstacles between transmitter and receiver
Radiofrequency
Allows devices to be in different room or even
buildings
Limited radio
Can be single or multiple (Spread spectrum)
frequencies
Single Frequency
Is subject to outside interference and
geographic obstructions
Insecure (Easily monitored by others)
Spread Spectrum
Multiple frequencies
More secure
Security in the Wireless Environment
The first level of security in a wireless LAN
consists of protecting the radio frequency
waveform itself.
Security in the Wireless Environment
Wireless Access Points
Wireless Bridges
Encryption
WEP – Wireless Equivalence Privacy
EAP – Extensible Authentication Protocol
(IEEE 802.1X)
Wireless LAN Topology
Wireless Bridges
Wireless Security
If you think someone might eavesdrop on
your LAN radio links…..
Encryption is the key
Wireless Security Approaches
WEP – Wired Equivalency Privacy
IEEE 802.1X or Extensible Authentication
Protocol (EAP)
Wireless Equivalent Privacy
WEP
It is a security mechanism defined with the
IEEE 802.11 standard.
Designed to protect over the over-the-air
transmissions between wireless LAN access
points and NICs.
IEEE 802.11b requires 40-bit encryption keys
Cisco supports the optional 128-bit standard.
WEP Goals
Deny access to the network by
unauthorized users who do not possess
the appropriate WEP key.
Prevent the decoding of captured WLAN
traffic hat is WEP-encrypted without the
possession of the WEP key.
Should be supplemented with additional
higher-level security mechanisms such as
VPNs or Firewalls.
802.1X/EAP
Extensible Authentication Protocol
It is an alternative WLAN security approach
to WEP
802.1X/EAP focuses on providing:
Centralized authentication
Dynamic key distribution
It is a standard for port-based network
access control
Cabling the WAN
Wide Area Network (WAN) Services
To connect one network to a remote network
Provide different connection methods
Different cabling standards from those of LANs
Download