Fast Ethernet Standards: Fiber Optics

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 5

Fast Ethernet Standards

There are four Fast Ethernet media specifications, three of which use UTP wire and one of which uses fiber optic cable.

Fast Ethernet Cabling Options Standard Cable type 100BASE-TX Category 5 UTP (uses 2 pairs of wire) 100BASE-T4 100BASE-T2 Category 3 UTP (uses 4 pairs of wire) Category 3 UTP (uses 2 pairs of wire)

1. 100BASE FX standard. 2. Fast Ethernet fiber optics requires two cables, one for transmitting and one for receiving.

Fiber Optics
Three standards deal with Gigabit Ethernet networks built from fiber optic cable. 1. I O00BASE-CX: Designed for the direct interconnection of clusters of equipment. 2. I O00BASE-SX: Designed for horizontal cabling using multimode fiber. 3. I O00BASE-LX: Designed for interconnecting network segments, including vertical runs through buildings, using single mode fiber. Standard Diameter Bandwidth Cable length (in microns) (MHz*km) (in meters) 1000BASE-SX 62.5 160 2-230 62.5 200 2-275 50 400 2-500 50 500 2-550
1000BASE-LX 62.5 50 50 9 5 500 400 500 n/a 5000 2-550 2-550 2-550 2-5000 2-5000

Thin Ethernet= bus topology(IEEE 802.4) Singlemode fiber typically has a core diameter of 8.3 microns, and the thickness of the core and cladding together is 125 microns. This is generally referred to as 8.3/125 Singlemode fiber uses a single-wavelength laser as a light source, and as a result, it can carry signals for extremely long distances. is less suited to LAN installations because it is much more expensive than multimode cable and it has a higher bend radius, meaning that it cannot be bent around corners as tightly. Most of the multimode fiber used in data networking is rated as 62.5/125. Multimode fiber, by contrast, uses a light-emitting diode (LED) as a light source instead of a laser and carries multiple wavelengths. If the core is 62.5 microns in diameter, the maximum length is approximately 275 meters; 50 micron fiber can go as far as 550 meters. A cable with just a single fiber is known as simplex; a two-wire cable is duplex.

ring a network interface adapter is a matter of configuring it to use certain hardware resources, such as the following:

Interrupt requests (IRQs). Input/output (I/O) port addresses.

Direct memory access (DMA) channels. Memory addresses. an intelligent hub uses the Simple Network Management Protocol (SNMP) to transmit periodic reports to a centralized network management console. Almost every Ethernet hub on the market has an extra port called anuplink port, which is used to connect to another hub instead of to a computer. The uplink port is wired differently from the other ports in the hub. The uplink port is the one port in the hub that does not have the crossover circuit. UTP cables are wired straight through, meaning that each of the eight pins in the connector at one end of the cable is wired to the corresponding pin in the connector at the other end. Unlike Ethernet hubs, Token Ring MAUs are passive devices, meaning that they are not repeaters. bridging protocol can be used to prevent bridge looping when more than one physical path exists between two or more network segments-STP What is the primary protocol used for Name Resolution-TCP/IP By default, ARP entries are retained in memory for: 2 minutes unless they have been reused, then they'll be retained up to 10 minutes two driver interfaces that allow a NIC to communicate on more than one protocolNDIS and ODI What is the file name that resides locally on a host and contains host names and their IP addresses? Host file ICMP performs many different functions, which are generally divided into errors and queries. NTP is a protocol that enables computers to synchronize their clocks with other computers on the network by exchanging time signals. An ASCII text file used by Windows TCP/IP computers to resolve NetBIOS names into IP addresses. Like the HOSTS file used to resolve host names into IP addresses, an LMHOSTS file is a list of the NetBIOS names assigned to computers on the network and their corresponding IP addresses.

Network News Transfer Protocol (NNTP)


A TCP/IP protocol used to post, distribute, and retrieve Usenet messages to and from news servers throughout the Internet. Usenet is a worldwide, text-based Internet bulletin board system that consists of tens of thousands of newsgroups devoted to every topic you could possibly imagine.

Asymmetrical Digital Subscriber Line (ADSL)


A point-to-point, digital WAN technology that uses standard telephone lines to provide consumers with high-speed Internet access, remote LAN access, and other services.

asymmetric refers to the fact that the service provides a higher transmission rate for downstream than for upstream traffic. Downstream transmission rates can be up to 8.448 Mbps, whereas upstream rates range up to 640 Kbps.

Digital Subscriber Line (DSL)


A type of point-to-point, digital WAN connection that uses standard telephone lines to provide high-speed communications. DSL is available in many different forms, including Asymmetrical Digital Subscriber Line (ADSL) and High-bit-rate Digital Subscriber Line (HDSL). The most common DSL services are HDSL, used by phone companies and large corporations for wide area network (WAN) links, and ADSL, which is the service that ISPs use to provide Internet access to end users.

High-bit-rate Digital Subscriber Line (HDSL)


A point-to-point, digital WAN technology used by telephone companies and other large corporations to transmit data at T1 speeds. FDDI FDDI networks are cabled using a ring topology and employ the token passing MAC mechanism, but there are several important differences between FDDI and Token Ring. FDDI supports several different types of fiber optic cable, including the 62.5/125 micron multimode cable that is the industry standard for fiber optic LANs, which provides for network segments up to 100 kilometers long with up to 500 workstations placed as far as 2 kilometers apart. Single mode fiber optic cables provide even longer segments, with up to 60 kilometers between workstations. A computer that is connected to both rings is called a dual attachment station (DAS) A double ring FDDI network in this condition is called a wrapped ring. A FDDI network can be deployed using the double ring, the star topology, or both. The double ring is better suited to use as a backbone network, and the star to a segment network connecting desktop computers.

Fiber Distributed Data Interface (FDDI)


A data-link layer LAN protocol running at 100 Mbps, designed for use with fiber optic cable. Typically used for backbone networks, FDDI uses the token passing Media Access Control (MAC) mechanism and supports a double ring topology that provides fault tolerance in the event of a system disconnection or cable failure.

Network Address Translation (NAT)


A firewall technique that enables TCP/IP client computers using unregistered IP addresses to access the Internet. Client computers send their Internet service requests to a NAT-equipped router, which substitutes its own registered IP address for the client's unregistered address, and forwards the request on to the specified server. The server sends its reply to the NAT router,

which then relays it back to the original client. This renders the unregistered clients invisible to the Internet, preventing direct access to them.

Serial Line Internet Protocol (SLIP)


A data-link layer TCP/IP protocol used for WAN connections, especially dial-up connections to the Internet and other service providers. Because it is used for connections between two computers only, SLIP does not need many of the features found in LAN protocols, such as address fields for each packet and a Media Access Control (MAC) mechanism. SLIP is the simplest of protocols, consisting only of a single End Delimiter byte that is transmitted after each IP datagram.

spanning tree algorithm (SPA)


Using the SPA, the redundant bridges communicate among themselves and select one of the bridges to process packets, while the others remain idle until the active bridge fails.

storage area network (SAN)


A dedicated LAN that connects servers with storage devices, often using the Fibre Channel protocol, reducing the storage-related traffic on the user network.

striping
A data availability technique in which data is written to clusters on multiple drives in an alternating pattern (that is, one cluster is written to one drive, then the next cluster to a different drive, and so on). The drives appear as a single volume to users, but because the computer is reading data from two or more physical drives, it is possible for the heads in one drive to be moving to the next cluster while the heads in the other drive are actually reading a cluster. This speeds up the disk read process, because one of the drives is always reading data; if only a single drive were used, it would have to stop reading after every cluster so the heads could move to their next location. The drawback of the striping method is that the failure of one drive causes the loss of the entire volume. translation bridge In addition to selectively propagating packets to the other network segment, this type of bridge also strips off the data-link layer protocol header and rebuilds a new one using the other protocol. transparent bridge A transparent bridge records the address of every packet it processes to build a list of the computers on each of the network segments it connects. This prevents the network administrator from having to manually identify the computers on each network segment.

virtual LAN (VLAN)

A technique often used on switched networks to make a group of computers behave as though they are connected to the same local area network (LAN), even though they are physically connected to different network segments.

virtual private network (VPN)


A technique for connecting to a network at a remote location using the Internet as a network medium. A user can dial into a local Internet service provider (ISP) and connect through the Internet to a private network at a distant location, using a protocol like the Point-to-Point Tunneling Protocol (PPTP) to secure the private traffic.

You might also like