0% found this document useful (0 votes)
25 views78 pages

ITE8 Chp5

Chapter 5 of IT Essentials v8.0 covers networking concepts, including types of networks (PAN, LAN, VLAN, WLAN, etc.), network protocols, and services. It explains the purpose of various network devices and cables, as well as internet connection types such as DSL, cable, and fiber. Additionally, it discusses the roles of DHCP, DNS, print, file, web, and mail servers in network services.

Uploaded by

dahof30901
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views78 pages

ITE8 Chp5

Chapter 5 of IT Essentials v8.0 covers networking concepts, including types of networks (PAN, LAN, VLAN, WLAN, etc.), network protocols, and services. It explains the purpose of various network devices and cables, as well as internet connection types such as DSL, cable, and fiber. Additionally, it discusses the roles of DHCP, DNS, print, file, web, and mail servers in network services.

Uploaded by

dahof30901
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 78

Chapter 5: Networking

Concepts

IT Essentials v8.0
Chapter 5 - Sections & Objectives
 5.1 Network Components and Types

• Explain components and types of computer networks.


• Describe the types of networks.
• Describe internet connection types.
 5.2 Network Protocols, Standards, and Services
• Explain networking protocols, standards and services.
• Explain the purpose and characteristics of transport layer protocols.
• Explain the significance of application port numbers.
• Explain wireless protocols.
• Explain network services.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Chapter 5 - Sections & Objectives (Cont.)
 5.3 Network Devices

• Explain the purpose of devices on a network.


• Explain basic network devices.
• Explain security devices.
• Explain other network devices.
 5.4 Network Cables
• Explain the characteristics of network cables.
• Describe networking tools and their purpose.
• Explain the purpose and characteristics of common types of copper network cables and connectors.
• Explain the purpose and characteristics of common types of fiber network cables and connectors.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
5.1 Network Components
and Types

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Types of Networks
Network Icons

Network Media Icons

Intermediary Device Icons Host Device Icons

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Types of Networks
Network Topologies and Description
 PAN (personal area network) – Commonly uses
Bluetooth to connect mice, keyboards, phones, and
tablets.

 LAN (local area network) – A wired network


consisting of a switch and network devices in a
limited geographical area.

 VLAN (virtual LAN) – Extends beyond a traditional


LAN and groups users based on administratively
defined boundaries such as department or floor.

 WLAN (wireless LAN) – Connects multiple wireless


devices and uses an access point.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Types of Networks
Network Topologies and Description (Cont.)
 WMN (wireless mesh network) – Connects
multiple wireless access points together to expand
the wireless network.

 MAN (metropolitan area network) – A network that


spans a city.

 WAN (wide area network) – A network that spans a


large geographical area.

 VPN (virtual private network) – A method of


connecting to a network such as a company
network across an unsecure network.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Types of Networks
VLANs
 They provide segmentation and organizational flexibility in a switched network.

 A group of devices within a VLAN communicate as if each device was attached to the same switch.

 VLANs are based on logical connections, instead of physical connections, and they can be
segmented based on factors such as function, team, or application.
 For example, a faculty member computer (PC1) is
connected to S2 on VLAN 10.
 PC1 could communicate with another faculty
member using PC4 connected to S3.
 Notice how both hosts are configured on network
address 192.168.10.0/24.
 By default, all switch ports are assigned to VLAN 1.
 However, you can assign the PCs to
different VLANs by configuring their interconnecting © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8

port.
Types of Networks
VLANs (Cont.)
 Figure 2 displays a sample configuration of switch S2.

 Notice that we first create the VLANs and assign them names.

 This makes it easier to work with the VLANs.

 Next, we configure the ports connecting to the PCs to the


corresponding VLANs.
 Once the VLAN information is configured on the other
switches, the faculty member using PC1 would be able to
communicate with PC4 because they are on the same VLANs.
 If the faculty member wanted to send something to PC5 which is
assigned to VLAN 30, then the services of a router would
be required.
 VLANs help reduce excessive broadcast traffic and
implement access and security policies between groups of © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
users.
Internet Connection Types
Brief History of Connection Technologies
 Analog telephone access (dialup) – uses an
analog modem to call another modem.
 ISDN (Integrated Services Digital Network) – more
bandwidth than dialup. Can carry voice, video, and
data.
 Broadband – uses different frequencies to send
multiple signals over media.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Internet Connection Types
DSL, Cable, and Fiber
 DSL (digital subscriber line) – always on technology that uses phone lines; voice and data
carried on different frequencies; requires a filter on the port that connects to a phone.
• Very high-speed DSL (VDSL) attains much higher bit rates than DSL. A symmetric link can carry as
much as 26 Mbps in both directions while an asymmetric link can carry as much as 52 Mbps download
and 6 Mbps upload. VDSL2 can carry as much as 100 Mbps in both directions.
 Cable – Uses a cable modem to connect to a traditional cable TV network; shares the network with
multiple subscribers.
 Fiber – High bandwidth connection used in backbone
networks, large enterprise environments, large data
centers, and now part of some home internet
connections.
 In the figure, the cable connection includes a HFC
network in which fiber is used in the last mile to the
user’s home, and at the user’s home the network
switches back to copper coaxial cable (FTTC).
 Fiber to the premises (FTTP) brings the fiber to the
customer’s building. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Internet Connection Types
Line of Sight Wireless Internet Service
 Line of site wireless – always on technology that uses radio signals for connecting to the
internet.
• Clear path required
• Weather affects signal strength and performance

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Internet Connection Types
Satellite
 Satellite – broadband technology for remote areas

• Uses a satellite dish


• Not a good solution for time-sensitive applications like gaming, Voice over Internet
Protocol (VoIP), and video conferencing

 Low Earth Orbit (LEO) – far more


satellites orbiting the Earth in low
Earth orbit
• Can support up to approximately 100 Mbps
• Much lower latency than standard satellite,
between 100 and 200 ms

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Internet Connection Types
Cellular
 Cellular– relies on cell towers to create a network used by cell phones and
connectivity to the internet

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Internet Connection Types
Mobile Hotspot and Tethering
 Cell phone option that allows another device to connect to the
internet using Wi-Fi, Bluetooth, or USB cable
• The other device is using the phone’s cellular connection to
connect to the internet
• Called tethering or a hotspot
 A mobile hotspot is when a cell phone allows Wi-Fi devices to
connect and use the mobile data network.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
5.2 Networking Protocols,
Standards, and Services

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Video Explanation – Transport Layer Protocols
Transport Layer Protocols

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Transport Layer Protocols
The TCP/IP Model

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Transport Layer Protocols
TCP
 Three basic operations of reliability

• Numbering and tracking of data segments


• Acknowledgment of received data
• Retransmitting any unacknowledged data after a
period of time.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Transport Layer Protocols
UDP
 Very little overhead or data checking

 Best-effort delivery protocol (unreliable)

• No acknowledgment that the data is received by the destination

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Transport Layer Protocols
Video Explanation – Application Port Numbers

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Application Port Numbers
Classify Application Port Numbers

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Application Port Numbers
Classify Application Port Numbers (Cont.)

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Wireless Protocols
WLAN Protocols

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Wireless Protocols
Bluetooth, NFC, and RFID
 Bluetooth

• Up to 7 devices to create a PAN


• 802.15.1
• 2.4 to 2.485 GHz radio frequency range
 RFID

• Passive or active tags used to identify items


• Passive – rely on RFID reader to activate and
read
• Active – have a battery to broadcast the ID up to
100 meters
• 125 MHz to 960 MHz radio frequency range
 NFC (Near Field Communication)

• Devices must be in close proximity to exchange


data
• Used for payments, printing, public parking, etc. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Wireless Protocols
Zigbee and Z-Wave
 Zigbee

• Requires a ZigBee Coordinator to manage client


devices connected in a wireless mesh network.
• Devices commonly managed from a cell phone
app
• IEEE 802.15.4 standard
• 868 MHz to 2.4 GHz range up to 20 meters,
65,000 devices, and data speeds up to 250 kb/s
 Z-Wave

• Proprietary standard, but public version


available
• 232 devices can connect to a wireless mesh
network with data speeds up to 100 kb/s.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Wireless Protocols
Cellular Generations
 1G/2G – First generation was analog calls only. 2G introduced digital voice, conference calls, and
caller ID with speeds less than 9.6 Kb/s
 2.5G – supports web browsing, short audio and video clips with speeds up to 237 Kb/s.

 3G – full motion video and streaming music at speeds up to 2 Mb/s.

 3.5G – supports high-quality streaming video, high-quality video conferencing, and VoIP, at speeds
up to 16 Mb/s.
 4G - IPv6, IP-based voice, gaming services, high quality multimedia at speeds up to 672 Mb/s.

 LTE (Long Term Evolution) – means it meets the 4G speed standards and improves connectivity
while in motion. Speeds up to 100 Mb/s when mobile and up to 1 Gb/s when stationary.
 5G – supports augmented reality (AR), virtual reality (VR), smart homes, smart cars, and data
transfer between devices. Download speeds up to 3 Gb/s; upload speeds up to 1.5 Gb/s.
 6G – is currently in development. As of late 2022, no standard yet exists. It will support even faster
speeds required for AR/VR applications, AI applications, and instantaneous communications.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Network Services
Video Explanation – Network Services

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Network Services
Client – Server Roles

 File Client and Server

 Web Client and Server

 Email Client and Server

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Network Services
DHCP Server
 A host needs IP address information before it can send data on the network.

 DHCP is the service used by ISPs, network administrators, and wireless routers
to automatically assign IP addressing information to hosts, as shown in the
figure.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Network Services
DHCP Server (Cont.)
 DHCP works in a client/server mode,
where DHCP clients request available
IP configurations from a DHCP server.
 A DHCP server is configured with a
scope (i.e., a pool or a range) of
addresses that it can lease to
requesting DHCP clients.
 As shown in the figure, when the DHCP
client boots (or otherwise wants to join a
network), it initiates the following four-
step process to obtain a lease.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Network Services
DHCP Server (Cont.)
 The client must contact the DHCP server periodically to extend the lease.

 This lease mechanism ensures that moved or power-off clients do not keep addresses that
they no longer need.
 When a lease expires, the DHCP server returns the address to the pool where it can be
reallocated as necessary.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Network Services
DNS Server
 A DNS server translates domain names such as cisco.com to an IP address.

 The five steps in the DNS resolution process are:

Step 1 Step 3

Step 2

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Network Services
DNS Server (Cont.)
 The five steps in the DNS resolution process are:

Step 4 Step 5

The number is returned back to the client A domain name is resolved to its numeric
for use in making requests of the server. network device address by the DNS
protocol.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Network Services
Print Server
 A print server
• Can control multiple printers
• Provides client access to print resources
• Allows centralized print job administration
• Provides feedback to network clients

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Network Services
File Server

 A file server allows clients to access


files using a specific protocol
• FTP (File Transfer Protocol)
• FTPS (File Transfer Protocol Secure)
• SFTP (Secure Shell File Transfer
Protocol)
• SCP (Secure Copy)

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Network Services
Web Server
 A web server provides web resources using these protocols
• Hypertext Transfer Protocol (HTTP) operating on TCP port 80
• Secure HTTP (HTTPS) using Secure Sockets Layer (SSL) or Transport Layer Security (TLS)
operating on TCP port 443
 How a web page is opened in a browser:
• For this example, use the
http://www.cisco.com/index.html URL.
• First, the browser interprets the three parts of
the URL:
1. http (the protocol or scheme)
2. www.cisco.com (the server name)
3. index.html (the specific filename
requested)
 The browser then checks with a DNS to convert www.cisco.com into a numeric address, which it
uses to connect to the server.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Network Services
Web Server (Cont.)
 Step 1: Using HTTP requirements, the browser sends a GET request to the server and asks for
the index.html file.
 Step 2: The server sends the HTML code for this web page back to the client’s browser.

 Step 3: The browser interprets the HTML code and formats the page for the browser window.

Step 1 Step 2 Step 3

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Network Services
Mail Server

 Email messages are stored in


databases on mail servers
• Client communicates with server in
order to reach a different client
• Protocol used to send email
• Simple Mail Transfer Protocol (SMTP)
• Protocols used to retrieve email
• Post Office Protocol (POP)
• Internet Message Access Protocol (IMAP)

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Network Services
Proxy Server
 Proxy servers act on behalf of a client, thus hiding the real internal host

 Used to cache frequently accessed web pages

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Network Services
Authentication Server
 Authentication, Authorization, and Accounting (AAA) - Allows access to a network
device or a particular network

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Network Services
Syslog Server
 Syslog stores network messages sent by networking devices.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Network Services
Load Balancer
 Some network servers can experience very heavy loads.

 Some examples include streaming media servers, web servers, and email servers.

 Often, multiple servers are providing one service in order to provide timely content.

 A load balancer can be used distribute the demand of requests.

 It is placed in front of the servers to ensure each server is being used as much as the
others.
 This prevents things like network timeouts and slow responses.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Network Services
Scada
 A Supervisory Control and Data Acquisition (SCADA) system is used in an industrial
control system (ICS).
 This type of system provides automation for critical services such as national security,
water treatment plants, or power suppliers.
 SCADA software runs on a computer to gather data from the devices used by the ICS.

 The SCADA manages the devices remotely typically through the use of satellite or
cellular communications.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
5.3 Basic Network Devices

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Basic Network Devices
Video Explanation - Basic Network Devices

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Basic Network Devices
Network Interface Card
 Todays computers have wired and/or wireless network capability.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Basic Network Devices
Repeaters, Bridges, and Hubs
 Repeaters – Also called extenders
because they regenerate the signal so it
can be sent further.
 Hub – Receives data on one port and
sends to all other ports.
 Bridge – Divides a network into two or
more segments and tracks which
device is on each segment.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Basic Network Devices
Switches
 Ethernet switches record MAC
addresses for each device
connected to the switch.
• Data is sent to a specific device if
the MAC address of that device is
in the MAC address table.
• Managed switches are used in a
company environment and have
additional features.
• Unmanaged switches are used in
home or a small business
network.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Basic Network Devices
Wireless Access Points
 Wireless access points (APs) – provide
access to a wireless network for a limited
range.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Basic Network Devices
Routers
 Routers connect networks.

• Use an IP address to forward traffic to other networks


• Can be a multipurpose device (integrated router) that includes switching and wireless capabilities

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Security Devices
Video Explanation – Security Devices

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Security Devices
Firewalls
 A firewall protects data and
devices connected to a
network.
 Firewalls use access control
lists (ACLs) which are rules
used to determine whether
data is permitted (allowed
through) or denied.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
Security Devices
IDS and IPS
An Intrusion Detection System An Intrusion Prevention
(IDS) monitors traffic and is a System (IPS) actively monitors
passive system. traffic and takes action when
needed.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Security Devices
UTMs
 Universal Threat Management (UTM) is
an all-in-one security appliance. Features
are vendor-specific, but could include:
• Firewall services
• IDS/IPS services
• Additional security services against Zero
Day, Denial of Service (DoS) Distributed
Denial of Service (DDoS), and spyware
• Proxy and email filtering
• Network access control
• VPN services

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Security Devices
Endpoint Management Server
 An endpoint management server monitors end devices such as PCs, laptops, servers, tablets,
printers, etc.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
Security Devices
Spam Management
 The DNS service is commonly abused by threat actors to assist in their SPAM email
campaigns.
 For this reason, DNS servers now use TXT resource records to implement the anti-spam
security features detailed in the table.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Other Network Devices
Legacy and Embedded Systems
 A legacy system is a device on the network
no longer supported, but still in operation.
 An embedded system is a device built into
something else such as an appliance.
Embedded microchips are contained in
legacy systems and embedded systems.
 Legacy systems and embedded systems
could be a security risk.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Other Network Devices
Patch Panel

A centralized place where


network cables attach to the
back. Patch cables are used to
make a connection to another
patch panel which connects to a
different wiring closet, or to a
device such as a switch
mounted nearby.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Other Network Devices
Power over Ethernet and Ethernet over Power
 PoE devices like PoE switches, PoE injectors, Po PoE injector
E
IP cameras, Voice over IP (VoIP) phones, and sw
itc
h
wireless access points (WAPs) are the top five
most popular devices.
 Power can also be inserted in the middle of a
cable run using a PoE injector.
 There are several IEEE standards for PoE:

• 802.3af – Can supply up to 13 watts as 350mA


at 48 volts.
• 802.3at (PoE+) – Can supply up to 25 watts as
600 mA. Network cable
• 802.3bt (PoE++ or 4PPoE) – Can supply 51
watts (Type 3) or 73 watts (Type 4) Ethernet over Power (powerline
networking) uses existing electrical wiring
to create a network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Other Network Devices
Cloud-based Network Controller
 A cloud-based network controller
is a remote device used to
manage network devices like
access points or switches.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
5.4 Network Cables

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Network Tools
Video Explanation – Network Cable Tools

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
Network Tools
Network Tools and Descriptions

 Wire cutters or side cutters

 Crimper – used to securely attach an RJ-45


connector
 Wire strippers
 Punch down tool – used to terminate wires into
termination

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
Network Tools
Network Tools and Descriptions (Cont.)

 Multimeter

 Cable Tester

 Tone Generator
 Wi-Fi analyzer

 Loopback adapter –
used to check a port

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
Copper Cables and Connectors
Network Taps
 Sometimes it is necessary to capture network traffic to analyze it, and this can often be
done with software such as Wireshark.
 If this is not possible, a network tap can be used to capture the cable signals and send
them to analyzing software.
 A network tap can be passive or active (powered):

• Passive test access point (TAP) - This type of TAP is a box with network ports to carry signals
in and out. Inside, an inductor or optical splitter is used to copy the signal and send it out a
monitor port. The monitor port receives all the traffic from the cable.
• Active TAP - This type of TAP regenerates the signal. Due to the complexity of gigabit
signaling, a passive TAP is unable to be used. Also, some fiber links may become corrupt using
an optical splitter, so an active TAP is used instead.
 Network sniffing can also be completed using a special port on a network switch, knowning
as a switched port analyzer (SPAN)/mirror port.
 A mirror receives a copy of the traffic that are addressed to a specific port or all other ports.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66
Copper Cables and Connectors
Cable Types
 Cable types used in networking

• Twisted-pair
• Coaxial
• Fiber-optic

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67
Copper Cables and Connectors
Coaxial Cables
 Coaxial cable

• Copper or aluminum
• Used in cable TV systems and
satellite communication systems
• Harder to install, more expensive,
and harder to troubleshoot than
twisted-pair cabling

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68
Copper Cables and Connectors
Twisted-Pair Cables
 Twisted-pair cabling types

• Unshielded twisted-pair (UTP)


• Shielded twisted-pair (STP)
 UTP

• Most common UTP cabling


• Four pairs of color-coded wires
• Prone to electromagnetic
interference (EMI) and radio
frequency interference (RFI)
 STP

• Better protection against EMI and


STP cabling
RFI
• More expensive and harder to install
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69
Copper Cables and Connectors
Twisted-Pair Category Ratings
Cat 5 UTP

Cat 5e UTP

Cat 6 UTP

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70
Copper Cables and Connectors
Twisted-Pair Wire Schemes
T568A T568B

When creating a cable to


connect a network device to a
wall jack or from the patch
panel to a switch, make both
ends of the cable the same
standard.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71
Copper Cables and Connectors
Video Explanation – Build and Test a Network Cable

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 72
Copper Cables and Connectors
Lab – Build and Test Network Cables

• In this lab, you will build and test a straight-through Unshielded Twisted-Pair
(UTP) Ethernet network cable.

Note: With a straight-through cable, the color of wire used by pin 1 on one end is
the same color used by pin 1 on the other end, and similarly for the remaining
seven pins. The cable will be constructed using either TIA/EIA T568A or T568B
standards for Ethernet. This determines which color wire is to be used on each pin.
Straight-through cables are normally used to connect a host directly to a switch or
a wall plate in an office area.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 73
Fiber Cables and Connectors
Fiber-Optic Cables
 Fiber-Optic cables

• Use light to transmit signals


• Not affected by EMI or RFI

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74
Fiber Cables and Connectors
Types of Fiber Media
 Single-mode fiber (SMF)

• Small core
SMF
• Uses laser technology to send one
beam of light
• Long distances
 Multimode fiber (MMF)

• Larger core
• Uses LEDs to send light
• Light is injected at different angles MMF
• Cheaper
• Bandwidth up to 10 Gb/s up to 550
meters

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 75
Fiber Cables and Connectors
Fiber-Optic Connectors

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 76
5.5 Chapter Summary

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 77
Conclusion
Chapter 5: Network Concepts

• Explain components and types of computer networks.


• Explain networking protocols, standards and services.
• Explain the purpose of devices on a network.
• Explain the characteristics of network cables.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 78

You might also like