Fast Ethernet Standards: Fiber Optics
Fast Ethernet Standards: Fiber Optics
Fast Ethernet Standards: Fiber Optics
There are four Fast Ethernet media specifications, three of which use UTP wire and one of which uses fiber optic cable.
Fast Ethernet Cabling Options Standard Cable type 100BASE-TX Category 5 UTP (uses 2 pairs of wire) 100BASE-T4 100BASE-T2 Category 3 UTP (uses 4 pairs of wire) Category 3 UTP (uses 2 pairs of wire)
1. 100BASE FX standard. 2. Fast Ethernet fiber optics requires two cables, one for transmitting and one for receiving.
Fiber Optics
Three standards deal with Gigabit Ethernet networks built from fiber optic cable. 1. I O00BASE-CX: Designed for the direct interconnection of clusters of equipment. 2. I O00BASE-SX: Designed for horizontal cabling using multimode fiber. 3. I O00BASE-LX: Designed for interconnecting network segments, including vertical runs through buildings, using single mode fiber. Standard Diameter Bandwidth Cable length (in microns) (MHz*km) (in meters) 1000BASE-SX 62.5 160 2-230 62.5 200 2-275 50 400 2-500 50 500 2-550
1000BASE-LX 62.5 50 50 9 5 500 400 500 n/a 5000 2-550 2-550 2-550 2-5000 2-5000
Thin Ethernet= bus topology(IEEE 802.4) Singlemode fiber typically has a core diameter of 8.3 microns, and the thickness of the core and cladding together is 125 microns. This is generally referred to as 8.3/125 Singlemode fiber uses a single-wavelength laser as a light source, and as a result, it can carry signals for extremely long distances. is less suited to LAN installations because it is much more expensive than multimode cable and it has a higher bend radius, meaning that it cannot be bent around corners as tightly. Most of the multimode fiber used in data networking is rated as 62.5/125. Multimode fiber, by contrast, uses a light-emitting diode (LED) as a light source instead of a laser and carries multiple wavelengths. If the core is 62.5 microns in diameter, the maximum length is approximately 275 meters; 50 micron fiber can go as far as 550 meters. A cable with just a single fiber is known as simplex; a two-wire cable is duplex.
ring a network interface adapter is a matter of configuring it to use certain hardware resources, such as the following:
Direct memory access (DMA) channels. Memory addresses. an intelligent hub uses the Simple Network Management Protocol (SNMP) to transmit periodic reports to a centralized network management console. Almost every Ethernet hub on the market has an extra port called anuplink port, which is used to connect to another hub instead of to a computer. The uplink port is wired differently from the other ports in the hub. The uplink port is the one port in the hub that does not have the crossover circuit. UTP cables are wired straight through, meaning that each of the eight pins in the connector at one end of the cable is wired to the corresponding pin in the connector at the other end. Unlike Ethernet hubs, Token Ring MAUs are passive devices, meaning that they are not repeaters. bridging protocol can be used to prevent bridge looping when more than one physical path exists between two or more network segments-STP What is the primary protocol used for Name Resolution-TCP/IP By default, ARP entries are retained in memory for: 2 minutes unless they have been reused, then they'll be retained up to 10 minutes two driver interfaces that allow a NIC to communicate on more than one protocolNDIS and ODI What is the file name that resides locally on a host and contains host names and their IP addresses? Host file ICMP performs many different functions, which are generally divided into errors and queries. NTP is a protocol that enables computers to synchronize their clocks with other computers on the network by exchanging time signals. An ASCII text file used by Windows TCP/IP computers to resolve NetBIOS names into IP addresses. Like the HOSTS file used to resolve host names into IP addresses, an LMHOSTS file is a list of the NetBIOS names assigned to computers on the network and their corresponding IP addresses.
asymmetric refers to the fact that the service provides a higher transmission rate for downstream than for upstream traffic. Downstream transmission rates can be up to 8.448 Mbps, whereas upstream rates range up to 640 Kbps.
which then relays it back to the original client. This renders the unregistered clients invisible to the Internet, preventing direct access to them.
striping
A data availability technique in which data is written to clusters on multiple drives in an alternating pattern (that is, one cluster is written to one drive, then the next cluster to a different drive, and so on). The drives appear as a single volume to users, but because the computer is reading data from two or more physical drives, it is possible for the heads in one drive to be moving to the next cluster while the heads in the other drive are actually reading a cluster. This speeds up the disk read process, because one of the drives is always reading data; if only a single drive were used, it would have to stop reading after every cluster so the heads could move to their next location. The drawback of the striping method is that the failure of one drive causes the loss of the entire volume. translation bridge In addition to selectively propagating packets to the other network segment, this type of bridge also strips off the data-link layer protocol header and rebuilds a new one using the other protocol. transparent bridge A transparent bridge records the address of every packet it processes to build a list of the computers on each of the network segments it connects. This prevents the network administrator from having to manually identify the computers on each network segment.
A technique often used on switched networks to make a group of computers behave as though they are connected to the same local area network (LAN), even though they are physically connected to different network segments.