Thursday, March 26, 2009

AUI Connector

An Attachment Unit Interface (AUI) is a 15 pin connection that provides a path between a node's Ethernet interface and the Medium Attachment Unit (MAU), sometimes known as a transceiver. It is the part of the IEEE Ethernet standard located between the Media Access Control (MAC), and the MAU. An AUI cable may be up to 50 metres long, although frequently the cable is omitted altogether and the MAU and MAC are directly attached to one another.
An AUI connector is a DA-15 (D-subminiature). It has a sliding clip in place of the thumbscrews normally found on a D-connector to hold two connectors together. This clip permits the MAU and MAC to be directly attached to one another even when their size and shape would preclude the use of thumbscrews. This clip is however frequently found to be awkward and/or unreliable.
AUI connectors became rarer beginning in the early 1990s. This was because it became more common for computers and hubs to incorporate the MAU, particularly as the 10BASE-T standard became more common and use of 10BASE-5 (thicknet) and 10BASE-2 (thinnet) declined. The electrical AUI connection was still present inside the equipment. By the mid-1990s AUI had all but disappeared as fast Ethernet became more common (fast Ethernet has an equivalent known as MII). Gigabit Ethernet and 10 gigabit Ethernet have respectively the GBIC and XAUI standards which are equivalent to AUI.
A modified form using a smaller connector called the AAUI was used on Apple Macintosh computers in the early 1990s.
The pinout of the AUI is as follows:

BNC Connector

The BNC (Bayonet Neill-Concelman) connector is a very common type of RF connector used for terminating coaxial cable.

The BNC connector is used for RF signal connections, for analog and Serial Digital Interface video signals, amateur radio antenna connections, aviation electronics (avionics) and many other types of electronic test equipment. It is an alternative to the RCA connector when used for composite video on commercial video devices, although many consumer electronics devices with RCA jacks can be used with BNC-only commercial video equipment via a simple adapter. BNC connectors were commonly used on 10base2 thin Ethernet networks, both on cable interconnections and network cards, though these have largely been replaced by newer Ethernet devices whose wiring does not use coaxial cable. Some ARCNET networks use BNC-terminated coax.
-----------------------------------------------------------------------------------------------

RJ Connectors

A Registered jack (RJ) is a standardized physical Network Interface — both jack construction and wiring pattern — for connecting telecommunications, or data equipment (commonly, a telephone jack) or computer networking equipment to a service provided by a local exchange carrier, a long distance carrier, or a data network in the case of the RJ45 connector. The standard designs for these connectors and their wiring are named RJ11, RJ14, RJ45, etc. These interface standards are most commonly used in North America, though some interfaces are used world-wide[citation needed].
The physical connectors that Registration Jacks use are of the modular connector type, except RJ21X which is a 25-pair Amphenol connector. For example, RJ11 uses a 6 pin 4 conductor (6P4C) modular plug and jack.

Fiber Optic Cable

An optical fiber (or fibre) is a glass or plastic fiber that carries light along its length. Fiber optics is the overlap of applied science and engineering concerned with the design and application of optical fibers. Optical fibers are widely used in fiber-optic communications, which permits transmission over longer distances and at higher bandwidths (data rates) than other forms of communications. Fibers are used instead of metal wires because signals travel along them with less loss, and they are also immune to electromagnetic interference. Fibers are also used for illumination, and are wrapped in bundles so they can be used to carry images, thus allowing viewing in tight spaces. Specially designed fibers are used for a variety of other applications, including sensors and fiber lasers.
Light is kept in the core of the optical fiber by total internal reflection. This causes the fiber to act as a waveguide. Fibers which support many propagation paths or transverse modes are called multi-mode fibers (MMF), while those which can only support a single mode are called single-mode fibers (SMF). Multi-mode fibers generally have a larger core diameter, and are used for short-distance communication links and for applications where high power must be transmitted. Single-mode fibers are used for most communication links longer than 550 meters (600 yards).
Joining lengths of optical fiber is more complex than joining electrical wire or cable. The ends of the fibers must be carefully cleaved, and then spliced together either mechanically or by fusing them together with an electric arc. Special connectors are used to make removable connections.

Twisted Pair Cable

Twisted pair cabling is a form of wiring in which two conductors (the forward and return conductors of a single circuit) are twisted together for the purposes of canceling out electromagnetic interference (EMI) from external sources; for instance, electromagnetic radiation from unshielded twisted pair (UTP) cables, and crosstalk between neighboring pairs.

Explanation
In balanced pair operation, the two wires carry equal and opposite signals and the destination detects the difference between the two. This is known as differential mode transmission. Noise sources introduce signals into the wires by coupling of electric or magnetic fields and tend to couple to both wires equally. The noise thus produces a common-mode signal which is cancelled at the receiver when the difference signal is taken. This method starts to fail when the noise source is close to the signal wires; the closer wire will couple with the noise more strongly and the common-mode rejection of the receiver will fail to eliminate it. This problem is especially apparent in telecommunication cables where pairs in the same cable lie next to each other for many miles. One pair can induce crosstalk in another and it is additive along the length of the cable. Twisting the pairs counters this effect as on each half twist the wire nearest to the noise-source is exchanged. Providing the interfering source remains uniform, or nearly so, over the distance of a single twist, the induced noise will remain common-mode. Differential signaling also reduces electromagnetic radiation from the cable, along with the attenuation that it causes.
The twist rate (also called pitch of the twist, usually defined in twists per meter) makes up part of the specification for a given type of cable. Where nearby pairs have equal twist rates, the same conductors of the different pairs may repeatedly lie next to each other, partially undoing the benefits of differential mode. For this reason it is commonly specified that, at least for cables containing small numbers of pairs, the twist rates must differ.
In contrast to FTP (foiled twisted pair) and STP (shielded twisted pair) cabling, UTP (unshielded twisted pair) cable is not surrounded by any shielding. It is the primary wire type for telephone usage and is very common for computer networking, especially as patch cables or temporary network connections due to the high flexibility of the cables.

Coaxial Cable

Coaxial cable or coax, is a cable with an inner conductor surrounded by a tubular insulating layer typically of a flexible material with a high dielectric constant, all of which are surrounded by a conductive layer (typically of fine woven wire for flexibility, or of a thin metallic foil), and finally covered with a thin insulating layer on the outside. The term coaxial comes from the inner conductor and the outer shield sharing the same geometric axis. Coaxial cable is used as a transmission line for radio frequency signals, in applications such as connecting radio transmitters and receivers with their antennas, computer network (Internet) connections, and distributing cable television signals. One advantage of coax over other types of transmission line is that in an ideal coaxial cable the electromagnetic field carrying the signal exists only in the space between the inner and outer conductors. This allows coaxial cable runs to be installed next to metal objects such as gutters without the power losses that occur in other transmission lines, and provides protection of the signal from external electromagnetic interference.
Coaxial cable should not be confused with other shielded cable used for carrying lower frequency signals such as audio signals. Shielded cable is similar in that it consists of a central wire or wires surrounded by a tubular shield conductor, but it is not constructed with the precise conductor spacing needed to function efficiently as a radio frequency transmission line.


Friday, March 13, 2009

Modem

Modem (from modulator-demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. Modems can be used over any means of transmitting analog signals, from driven diodes to radio.
The most familiar example is a voiceband modem that turns the digital 1s and 0s of a personal computer into sounds that can be transmitted over the telephone lines of Plain Old Telephone Systems (POTS), and once received on the other side, converts those 1s and 0s back into a form used by a USB, Ethernet, serial, or network connection. Modems are generally classified by the amount of data they can send in a given time, normally measured in bits per second, or "bps". They can also be classified by Baud, the number of times the modem changes its signal state per second.
Baud is not the modem's speed in bit/s, but in symbols/s. The baud rate varies, depending on the modulation technique used. Original Bell 103 modems used a modulation technique that saw a change in state 300 times per second. They transmitted 1 bit for every baud, and so a 300 bit/s modem was also a 300-baud modem. However, casual computerists confused the two. A 300 bit/s modem is the only modem whose bit rate matches the baud rate. A 2400 bit/s modem changes state 600 times per second, but due to the fact that it transmits 4 bits for each baud, 2400 bits are transmitted by 600 baud, or changes in states.
Faster modems are used by Internet users every day, notably cable modems and ADSL modems. In telecommunications, "radio modems" transmit repeating frames of data at very high data rates over microwave radio links. Some microwave modems transmit more than a hundred million bits per second. Optical modems transmit data over optical fibers. Most intercontinental data links now use optical modems transmitting over undersea optical fibers. Optical modems routinely have data rates in excess of a billion (1x109) bits per second. One kilobit per second (kbit/s or kb/s or kbps) as used in this article means 1000 bits per second and not 1024 bits per second. For example, a 56k modem can transfer data at up to 56,000 bits (7kB) per second over the phone line.

LAN Card

A network card, network adapter, network interface controller (NIC), network interface card, or LAN adapter is a computer hardware component designed to allow computers to communicate over a computer network. It is both an OSI layer 1 (physical layer) and layer 2 (data link layer) device, as it provides physical access to a networking medium and provides a low-level addressing system through the use of MAC addresses. It allows users to connect to each other either by using cables or wirelessly.
Although other network technologies exist, Ethernet has achieved near-ubiquity since the mid-1990s. Every Ethernet network card has a unique 48-bit serial number called a MAC address, which is stored in ROM carried on the card. Every computer on an Ethernet network must have a card with a unique MAC address. Normally it is safe to assume that no two network cards will share the same address, because card vendors purchase blocks of addresses from the Institute of Electrical and Electronics Engineers (IEEE) and assign a unique address to each card at the time of manufacture.
Whereas network cards used to be expansion cards that plug into a computer bus, the low cost and ubiquity of the Ethernet standard means that most newer computers have a network interface built into the motherboard. These either have Ethernet capabilities integrated into the motherboard chipset or implemented via a low cost dedicated Ethernet chip, connected through the PCI (or the newer PCI express bus). A separate network card is not required unless multiple interfaces are needed or some other type of network is used. Newer motherboards may even have dual network (Ethernet) interfaces built-in.
The card implements the electronic circuitry required to communicate using a specific physical layer and data link layer standard such as Ethernet or token ring. This provides a base for a full network protocol stack, allowing communication among small groups of computers on the same LAN and large-scale network communications through routable protocols, such as IP.
There are four techniques used to transfer data, the NIC may use one or more of these techniques.
Polling is where the microprocessor examines the status of the peripheral under program control.
Programmed I/O is where the microprocessor alerts the designated peripheral by applying its address to the system's address bus.
Interrupt-driven I/O is where the peripheral alerts the microprocessor that it's ready to transfer data.
DMA is where the intelligent peripheral assumes control of the system bus to access memory directly. This removes load from the CPU but requires a separate processor on the card.
A network card typically has a twisted pair, BNC, or AUI socket where the network cable is connected, and a few LEDs to inform the user of whether the network is active, and whether or not there is data being transmitted on it. Network Cards are typically available in 10/100/1000 Mbit/s varieties. This means they can support a transfer rate of 10, 100 or 1000 Megabits per second.
A Network Interface Controller (NIC) is a hardware interface that handles and allows a network capable device access to a computer network such as the internet. The NIC has a ROM chip that has a unique Media Access Control (MAC) Address burned into it. The MAC address identifies the vendor MAC address which identifies it on the LAN. The NIC exists on both the ' Physical Layer' (Layer 1) and the 'Data Link Layer' (Layer 2) of the OSI model.
Sometimes the words 'controller' and 'card' are used interchangeably when talking about networking because the most common NIC is the Network Interface Card. Although 'card' is more commonly used, it is less encompassing. The 'controller' may take the form of a network card that is installed inside a computer, or it may refer to an embedded component as part of a computer motherboard, a router, expansion card, printer interface, or a USB device.
A MAC Address is a 48 bit network hardware identifier that is burned into a ROM chip on the NIC to identify that device on the network. The first 24 bits is called the Organizationally Unique Identifier (OUI) and is largely manufacturer dependent. Each OUI allows for 16,777,216 Unique NIC Addresses.
Smaller manufacturers that do not have a need for over 4096 unique NIC addresses may opt to purchase an Individual Address Block (IAB) instead. An IAB consists of the 24 bit OUI, plus a 12 bit extension (taken from the 'potential' NIC portion of the MAC address)

Hub

A network hub or repeater hub is a device for connecting multiple twisted pair or fiber optic Ethernet devices together and thus making them act as a single network segment. Hubs work at the physical layer (layer 1) of the OSI model. The device is thus a form of multiport repeater. Repeater hubs also participate in collision detection, forwarding a jam signal to all ports if it detects a collision.
Hubs also often come with a BNC and/or AUI connector to allow connection to legacy 10BASE2 or 10BASE5 network segments. The availability of low-priced network switches has largely rendered hubs obsolete but they are still seen in older installations and more specialized applications.
A network hub is a fairly un-sophisticated broadcast device. Hubs do not manage any of the traffic that comes through them, and any packet entering any port is broadcast out on every other port. Since every packet is being sent out through every other port, packet collisions result--which greatly impedes the smooth flow of traffic.
The need for hosts to be able to detect collisions limits the number of hubs and the total size of the network. For 10 Mbit/s networks, up to 5 segments (4 hubs) are allowed between any two end stations. For 100 Mbit/s networks, the limit is reduced to 3 segments (2 hubs) between any two end stations, and even that is only allowed if the hubs are of the low delay variety. Some hubs have special (and generally manufacturer specific) stack ports allowing them to be combined in a way that allows more hubs than simple chaining through Ethernet cables, but even so, a large Fast Ethernet network is likely to require switches to avoid the chaining limits of hubs.
Most hubs detect typical problems, such as excessive collisions on individual ports, and partition the port, disconnecting it from the shared medium.[citation needed] Thus, hub-based Ethernet is generally more robust than coaxial cable-based Ethernet,[citation needed] where a misbehaving device can disable the entire segment. Even if not partitioned automatically, a hub makes troubleshooting easier because status lights can indicate the possible problem source or, as a last resort, devices can be disconnected from a hub one at a time much more easily than a coaxial cable. They also remove the need to troubleshoot faults on a huge cable with multiple taps.
Hubs classify as Layer 1 devices in the OSI model. At the physical layer, hubs can support little in the way of sophisticated networking. Hubs do not read any of the data passing through them and are not aware of their source or destination. Essentially, a hub simply receives incoming packets, possibly amplifies the electrical signal, and broadcasts these packets out to all devices on the network - including the one that originally sent the packet.
Technically speaking, three different types of hubs exist:
1. Passive2. Active3. Intelligent
Passive hubs do not amplify the electrical signal of incoming packets before broadcasting them out to the network. Active hubs, on the other hand, do perform this amplification, as does a different type of dedicated network device called a repeater. Some people[who?] use the terms concentrator when referring to a passive hub and multiport repeater when referring to an active hub.[citation needed]
Intelligent hubs add extra features to an active hub that are of particular importance to businesses. An intelligent hub typically is stackable (built in such a way that multiple units can be placed one on top of the other to conserve space). It also typically includes remote management capabilities via SNMP and virtual LAN (VLAN) support.
Hubs remain a very popular device for small networks because of their low costs.

Monday, March 9, 2009

Switches

Cisco Inter-Switch Link (ISL) is a Cisco Systems proprietary protocol that maintains VLAN information as traffic flows between switches and routers, or switches and switches.
ISL is Cisco's VLAN encapsulation method and supported only on Cisco's equipment through Fast and Gigabit Ethernet links. The size of an Ethernet encapsulated ISL frame can be expected to start from 94 bytes and increase up to 1548 bytes due to the overhead (additional fields) the protocol creates via encapsulation. ISL adds a 26-byte header (containing a 15-bit VLAN identifier) and a 4-byte CRC trailer to the frame. ISL functions at the Data-Link layer of the OSI model. ISL is used to maintain redundant links.
Another related Cisco protocol, Dynamic Inter-Switch Link Protocol (DISL) simplifies the creation of an ISL trunk from two interconnected Fast Ethernet devices. Fast EtherChannel technology enables aggregation of two full-duplex Fast Ethernet links for high-capacity backbone connections. DISL minimizes VLAN trunk configuration procedures because only one end of a link needs to be configured as a trunk.
Cisco's ISL competes with the IEEE 802.1Q protocol, a widely used non-proprietary VLAN tagging protocol.
Trunk Ports and the Native VLAN
Clause 9 of the 1998 802.1Q standard defines the encapsulation protocol used to multiplex VLANs over a single link, by adding VLAN tags. However, it is possible to send frames either tagged or untagged, so to help explain which frames will be sent with or without tags, some vendors (most notably Cisco) use the concepts of a) Trunk Ports and b) the Native VLAN for that trunk.
The concept of a Trunk Port is that once a port is designated as a Trunk Port, it will forward and receive tagged frames.
Frames belonging to the Native VLAN do NOT carry VLAN tags when sent over the trunk. Conversely, if an untagged frame is received on a trunk port, the frame is associated with the Native VLAN for this port.
For example, if an 802.1Q port has VLANs 2, 3 and 4 assigned to it with VLAN 2 being the Native VLAN, frames on VLAN 2 that egress (exit) the aforementioned port are not given an 802.1Q header (ie., they are plain Ethernet frames). Frames which ingress (enter) this port and have no 802.1Q header are put into VLAN 2. Behaviour of traffic relating to VLANs 3 & 4 is as to be expected - frames arriving for VLANs 3 & 4 are expected to be carrying tags that identify them so, and frames leaving the port for VLANs 3 & 4 will carry their respective VLAN tag.
Not all vendors use the concept of Trunk Ports and Native VLANS. Annex D to the 1998 802.1Q standard uses the concept of Trunk Links, but the current (IEEE Std 802.1D™- 2004) standard does not use the terms Trunk or Native.

Routers

A device that forwards data packets from one local area network (LAN) or wide area network (WAN) to another. Based on routing tables and routing protocols, routers read the network address in each transmitted frame and make a decision on how to send it based on the most expedient route (traffic load, line costs, speed, bad lines, etc.). Routers work at layer 3 in the protocol stack, whereas bridges and switches work at the layer 2.
Routers are used to segment LANs in order to balance traffic within workgroups and to filter traffic for security purposes and policy management. Routers are also used at the edge of the network to connect remote offices. Multiprotocol routers support several protocols such as IP, IPX, AppleTalk and DECnet.
Routers can only route a message that is transmitted by a routable protocol such as IP or IPX. Messages in non-routable protocols, such as NetBIOS and LAT, cannot be routed, but they can be transferred from LAN to LAN via a bridge. Because routers have to inspect the network address in the protocol, they do more processing and add more overhead than a bridge or switch, which both work at the data link (MAC) layer.
Most routers are specialized computers that are optimized for communications; however, router functions can also be implemented by adding routing software to a file server. For example, the NetWare operating system includes routing software that can route from one subnetwork to another if each one is connected to its own network adapter (NIC) in the server. The major router vendors are Cisco Systems and Nortel Networks.
Within an enterprise, routers serve as an internet backbone interconnecting all networks. This architecture strings several routers together via a high-speed LAN topology such as Fast Ethernet or Gigabit Ethernet. Within the global Internet, routers do all the packet switching in the backbones.
Another approach within an enterprise is the collapsed backbone, which uses a single router with a high-speed backplane to connect the subnets, making network management simpler and improving performance.
In older Novell terminology, a router is a network-layer bridge. Routers also used to be called "gateways." For more understanding of how the network layer 3 works within the protocol stack, see TCP/IP abc's. See layer 3 switch, route server, router cluster and routing protocol.

Wednesday, March 4, 2009

Computers


Computers

A computer is a machine that manipulates data according to a list of instructions.

The first devices resembling a modern computer were developed in the mid-20th century (1940–1945), although similar machines had been constructed earlier. The first electronic computers were the size of a large room, consuming as much power as several hundred modern personal computers (PC).[1] Modern computers based on tiny integrated circuits are millions to billions of times more capable than the early machines, and occupy a fraction of the space.[2] Simple computers are small enough to fit into a wristwatch, and can be powered by a watch battery. Personal computers in their various forms are icons of the Information Age, what most people think of as a "computer", but the embedded computers found in devices ranging from fighter aircraft to industrial robots, digital cameras, and children's toys are the most numerous.

The ability to store and execute lists of instructions called programs makes computers extremely versatile, distinguishing them from calculators. The Church–Turing thesis is a mathematical statement of this versatility: any computer with a certain minimum capability is, in principle, capable of performing the same tasks that any other computer can perform. Therefore computers ranging from a personal digital assistant to a supercomputer are all able to perform the same computational tasks, given enough time and storage capacity.

Benefit of Making Network


1 Fast Communication

2 Sharing data

3 Sharing Resources (Printer, Scanner, Optical Drives, Magnetical Drives etc)

4 Cost effective (by using one device by many computers)

5 Security (Domain)

6 Centralize Administration

7 Electronic Mail

8 Electronic Commerce

9 And many more.

Resources of Making Network



1 Computers














2 LAN Cards/NIC/Ethernet Card




3 Media (Cable, Waves)

4 Connectors


(BNC, AUI,



RJ45, Fiber Clips)


5 HUB/Switch (Star Topology)
6 Router (in case of WAN)
7 NOS (Network Operating System)

Types of Network According to Area

1: LAN (Local Area Network)
2: MAN (Metropolitan Area Network)
3: WAN (Wide Area Network)
LANA Local Area Network is the Network of different Computers in well defines and Small Area like a Network of any organization in one building or cluster of buildings But should be with in 1KM.
MANA Metropolitan Area Network is the Network of different remote access buildingsIn one city. A city can be large and small. OR the Network of different LANs in one City is called MAN.
WANA wide Area Network is Network of different LANs which exist in different cities or Different countries.

Types of Network According to Configuration

1: Workgroup (Peer to Peer Network)2: Domain (Server Based Network)Workgroup (Peer to Peer Network)Ø In this type of Network there is no dedicated (specific) Server.Ø Every Computer is Server and Client at the same time.Ø In this network every user is responsible for the security of their System.Ø Every Computer is known as a Workstation.Ø No workstation can assign any restriction on any other workstation.Ø The recommended size of Computers is 10 for this Network. But we canConnect more then 10 Computers.Ø Peer to Peer Network is good for sharing of Software and Resources, but thereNo security.Domain (Sever Based Network)Ø In this type of Network there is a dedicated server which is responsible for theØ Management of all other Computers in the Network which are called Clients.Ø In a Domain all security is centrally administrated by the Server.Ø Server is responsible to share different kinds of Resources and Software to every Client Computer.Ø No Client Computer can log on in the Network without the permission ofServer.Ø A server based network may have thousands of Computers.

NOS (Network Operating System)

Workstation O.S Client O.S Server O.SWindows NT Workstation Windows NT Workstation Win NT ServerWindows 95 Windows 2000 Professional Win 2000 ServerWindows 97 Windows XP Professional Win 2003 ServerWindows 98 UNIXWindows 2000 professional LinuxWindows XP professional Novel Netware

Media

The way on which data travels from Source Computer to the Destination Computer is called Media OR the object which makes a link between Sender and Receiver.
Types of Media
1: Guided Media (Bounded Media)
2: Unguided Media (Unbounded Media)
1: Guided Media: (Cables)
We have three types of Guided Media
1 Coaxial Cable
2 Twisted Pair Cable
3 Fiber Optic Cable
Coaxial CableThere are two types of Coaxial Cable
Thin net Coaxial Cable
Thick net Coaxial CableThin net Coaxial (10 base 2)
1 It is used in base band transmission
2 It can flow the data up to 185 to 200 Meter
3 We use this type cable in Bus Topology and Ring Topology
4 It has a speed of 10 Mbps (Mega bit per second)
5 The connector for this cable is called BNC (British Naval Connector)
Thick net Coaxial (10 base 5)
1 It is used in base band transmission.
2 It can flow the data up to 500 meter.
3 It is used in Bus and Ring Topology.
4 It has a speed of 10 Mbps
5 The connector for this cable is called AUI (Attachment Unit Interface)
Twisted Pair Cable STP (Shielded Twisted Pair Cable)
UTP (Unshielded Twisted Pair Cable)
There are six Categories available in Twisted Pair Cable
RJ: Registered Jack
Making of Twisted Pair Cable
We make Twisted Pair Cable in three different ways for Network
1: Cross Cable
2: Straight Cable
3: Roll Over Cable
Cross Cable is used to connect two same devices like Computer to Computer, hub to Hub or Switch to Switch.
Straight Cable this type of cable is used to connect different devices .It is also used in Star topology. It is used to connect Computer to Hub, Computer to Switch or switch to Router (MAN or WAN)
Roll Over Cable this type of cable is used to only and only connect Computer to Router; we connect system to Router in order to configuration the Router by the help of IOS (Internet work Operating System).
We have two Standards to make the above three Cables. 568A and 568B
Cross Cable
568A _________________568B
Straight Cable
568A ___________________568A
568B ___________________ 568B
Roll Over Cable
568A ____________________ 568 A-1
Fiber Optic Cable It is used in LAN, MAN, WAN.The speed of this cable is up to 2000 Mbps.It can Flow the Data up to 10 KM.In the cable instead of conductor there is glass or plastic covered by Fibers.Data flows in the form of Light.Light is encoding in digital signals.It is used in base band transmission.The connector for this cable is called Fiber Clip.

Topology

The physical arrangement of Computers is called Topology OR the physicalConnectivity of different computers via different cables is called topology.Types of Topology1: Bus Topology 2: Ring Topology3 Star Topology4: Mesh TopologyBus TopologyIn Bus Topology all Computers on the Network are connected to a single cable called Bus. Coaxial cable is used in this topology. The bus topology is easy to install and the cost is usually lower then for other network topologies. But the cable failure shuts down the network, and it can be extremely difficult to locate broken cables on large Networks. Only one Computer can send the data at one time via bus. Data goes to every computer on the way of the destination computer.
Ring TopologyIn ring topology we connect all computers in the form of a ring with the help of a single coaxial cable. Last Computer is connected to first computer. Both way communications is possible. Ring topology is easy to install, but in the case of failure of any 1 computer all network get disconnect.Star TopologyIn star topology each computer is connected to a central device with its own dedicated cable. The central device is called Hub and Switch. Every computer can send the data at one time. Troubleshooting is easy .In the case of failure of any cable only one computer get disconnects.
Mesh TopologyIn mesh topology every computer is connected to every other computer in the network. A lot of cable is used in this network. Coaxial bale is used for connectivity.

Network Devices

1: LAN Card (Local Area Network Card)
It is also called NIC (Network Interface Card). It is used to connect a computer to a Local Area Network. LAN cards are available in different port like AUI, BNC and RJ45.
2: MODEM (Modulator and Demodulator)
It is used for conversion of digital data into analog data (modulation) and analog data in digital data (demodulation).it is used to connect a computer to inter network via telephone line it has RJ 11 port.
3: HUB
It is a centralized device .it is used to make a link between different computers in star topology. It has no addressing scheme. It is used to broad cast the data. It takes the data from one computer and sends that to all other computer, and then at last the destination computer receives the data.
3: Switch
It is used as a centralized device in star topology. All computer are connected with each other via switch in star topology .it has addressing scheme. It is used to unicast the data. It takes the data from one computer and sends that data direct to the destination computer.
4: Router
It is used to connect different Network with each other. It is used in MAN and WAN to connect two remote access Networks .In WAN every Network should has a Router. We connect a computer to the router with the help of roll over cable in order to configure the Router by the help of IOS (Inter Network Operating System).

Protocol

The set of rules which is used to exchange data between different computer andDifferent Operating systems in a network.OR, the language with is used to exchange data between the different computers inA network is called protocol.Without protocol computers can’t communicate between each other.Types of Protocol1: NETBEUI (NetBIOS Extended User Interface)This protocol can only communicate between the computers having any operatingSystem of Microsoft.2: IPX/SPX (Internet Packet Exchange /Simple Packet Exchange)This is the protocol of Novel Netware (NOS) .this protocol can only communicateBetween the computers having the Novel Netware.3: TCP / IP (Transmission Control Protocol / Internet Protocol)This is universal Protocol .It can communicate between all types of OperatingSystems. It is also using in Inter Network Communication.

IP Addressing

It is the address scheme of TCP/IP protocol. We can assign IP address to every Computer in case of TCP/IP protocol. So that if any computer wants to connect.To another computer in the network it connects with the help of IP address.It is a 32 bit address which is divided into 4 octets. 1 octet is consisting of 8 bits.
We assign IP address in decimal numbers.We classify IP address in three classes.Class RangeClass A 1-126Class B 128-191Class C 192-223127 is reserved IP address, it is also called Lope back IP address. It is used in troubleshooting and to check connectivity.In Network ID we write the address of Network while in Host ID we write The address of the Computer.

Subnet Mask

We assign a subnet mask address to every IP address. This address is used toDefine Network ID and Host ID in an IP address.We put 255 for network ID and 0 for host id in a subnet mask address.For Exp:IP Addres : 50 . 0 . 0 . 1Subnet Mask : 255 . 0 . 0 . 0IP Addres : 130 . 0 . 0 . 25Subnet Mask : 255 . 255 . 0 . 0IP Addres : 215 . 0 . 0 .10Subnet Mask : 255 . 255 . 255 .0
Posted by Rahmat Ullah at 3:36 AM.

OSI Model

The Open Systems Interconnection Reference Model (OSI Reference Model or OSI Model) is an abstract description for layered communications and computer network protocol design. It was developed as part of the Open Systems Interconnection (OSI) initiative.[1] In its most basic form, it divides network architecture into seven layers which, from top to bottom, are the Application, Presentation, Session, Transport, Network, Data-Link, and Physical Layers. It is therefore often referred to as the OSI Seven Layer Model.A layer is a collection of conceptually similar functions that provide services to the layer above it and receives service from the layer below it. For example, a layer that provides error-free communications across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that make up the contents of the path.
Contents1 History2 Description of OSI layers2.1 Layer 7: Application Layer2.2 Layer 6: Presentation Layer2.3 Layer 5: Session Layer2.4 Layer 4: Transport Layer2.5 Layer 3: Network Layer2.6 Layer 2: Data Link Layer2.6.1 WAN Protocol architecture2.6.2 IEEE 802 LAN architecture2.7 Layer 1: Physical LayerHistoryIn 1977, 2work on a layered model of network architecture was started, and the International Organization for Standardization (ISO) began to develop its OSI framework architecture. OSI has two major components: an abstract model of networking, called the Basic Reference Model or seven-layer model, and a set of specific protocols.Note: The standard documents that describe the OSI model can be freely downloaded from the ITU-T as the X.200-series of recommendations.[2] A number of the protocol specifications are also available as part of the ITU-T X series. The equivalent ISO and ISO/IEC standards for the OSI model are available from the ISO, but only some of the ISO/IEC standards are available as cost-free downloads.[3]All aspects of OSI design evolved from experiences with the CYCLADES network, which also influenced Internet design. The new design was documented in ISO 7498 and its various addenda. In this model, a networking system is divided into layers. Within each layer, one or more entities implement its functionality. Each entity interacts directly only with the layer immediately beneath it, and provides facilities for use by the layer above it.Protocols enable an entity in one host to interact with a corresponding entity at the same layer in another host. Service definitions abstractly describe the functionality provided to an (N)-layer by an (N-1) layer, where N is one of the seven layers of protocols operating in the local host.Description of OSI layersLayer 7: Application LayerMain article: Application LayerThe application layer is the OSI layer closest to the end user, which means that both the OSI application layer and the user interact directly with the software application. This layer interacts with software applications that implement a communicating component. Such application programs fall outside the scope of the OSI model. Application layer functions typically include identifying communication partners, determining resource availability, and synchronizing communication. When identifying communication partners, the application layer determines the identity and availability of communication partners for an application with data to transmit. When determining resource availability, the application layer must decide whether sufficient network resources for the requested communication exist. In synchronizing communication, all communication between applications requires cooperation that is managed by the application layer. Some examples of application layer implementations include Telnet, Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP) , and Simple Mail Transfer Protocol (SMTP).Layer 6: Presentation LayerMain article: Presentation LayerThe Presentation Layer establishes a context between Application Layer entities, in which the higher-layer entities can use different syntax and semantics, as long as the Presentation Service understands both and the mapping between them. The presentation service data units are then encapsulated into Session Protocol Data Units, and moved down the stack.This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.The original presentation structure used the Basic Encoding Rules of Abstract Syntax Notation One (ASN.1), with capabilities such as converting an EBCDIC-coded text file to an ASCII-coded file, or serializing objects and other data structures into and out of XML. ASN.1 has a set of cryptographic encoding rules that allows end-to-end encryption between application entities.[edit] Layer 5: Session LayerMain article: Session LayerThe Session Layer controls the dialogues (connections) between computers. It establishes, manages and terminates the connections between the local and remote application. It provides for full-duplex, half-duplex, or simplex operation, and establishes checkpointing, adjournment, termination, and restart procedures. The OSI model made this layer responsible for "graceful close" of sessions, which is a property of TCP, and also for session checkpointing and recovery, which is not usually used in the Internet Protocol Suite. The Session Layer is commonly implemented explicitly in application environments that use remote procedure calls (RPCs).Layer 4: Transport LayerMain article: Transport LayerThe Transport Layer provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers. The Transport Layer controls the reliability of a given link through flow control, segmentation/desegmentation, and error control. Some protocols are state and connection oriented. This means that the Transport Layer can keep track of the segments and retransmit those that fail.Although not developed under the OSI Reference Model and not strictly conforming to the OSI definition of the Transport Layer, the best known examples of a Layer 4 protocol are the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).[citation needed]Of the actual OSI protocols, there are five classes of transport protocols ranging from class 0 (which is also known as TP0 and provides the least error recovery) to class 4 (which is also known as TP4 and is designed for less reliable networks, similar to the Internet). Class 0 contains no error recovery, and was designed for use on network layers that provide error-free connections. Class 4 is closest to TCP, although TCP contains functions, such as the graceful close, which OSI assigns to the Session Layer. Detailed characteristics of TP0-4 classes are shown in the following table.Perhaps an easy way to visualize the Transport Layer is to compare it with a Post Office, which deals with the dispatch and classification of mail and parcels sent. Do remember, however, that a post office manages the outer envelope of mail. Higher layers may have the equivalent of double envelopes, such as cryptographic presentation services that can be read by the addressee only. Roughly speaking, tunneling protocols operate at the Transport Layer, such as carrying non-IP protocols such as IBM's SNA or Novell's IPX over an IP network, or end-to-end encryption with IPsec. While Generic Routing Encapsulation (GRE) might seem to be a Network Layer protocol, if the encapsulation of the payload takes place only at endpoint, GRE becomes closer to a transport protocol that uses IP headers but contains complete frames or packets to deliver to an endpoint. L2TP carries PPP frames inside transport packet.Layer 3: Network LayerMain article: Network LayerThe Network Layer provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks, while maintaining the quality of service requested by the Transport Layer. The Network Layer performs network routing functions, and might also perform fragmentation and reassembly, and report delivery errors. Routers operate at this layer—sending data throughout the extended network and making the Internet possible. This is a logical addressing scheme – values are chosen by the network engineer. The addressing scheme is hierarchical.The best-known example of a Layer 3 protocol is the Internet Protocol (IP). It manages the connectionless transfer of data one hop at a time, from end system to ingress router, router to router, and from egress router to destination end system. It is not responsible for reliable delivery to a next hop, but only for the detection of errored packets so they may be discarded. When the medium of the next hop cannot accept a packet in its current length, IP is responsible for fragmenting the packet into sufficiently small packets that the medium can accept.A number of layer management protocols, a function defined in the Management Annex, ISO 7498/4, belong to the Network Layer. These include routing protocols, multicast group management, Network Layer information and error, and Network Layer address assignment. It is the function of the payload that makes these belong to the Network Layer, not the protocol that carries them.Layer 2: Data Link LayerMain article: Data Link LayerThe Data Link Layer provides the functional and procedural means to transfer data between network entities and to detect and possibly correct errors that may occur in the Physical Layer. Originally, this layer was intended for point-to-point and point-to-multipoint media, characteristic of wide area media in the telephone system. Local area network architecture, which included broadcast-capable multiaccess media, was developed independently of the ISO work, in IEEE Project 802. IEEE work assumed sublayering and management functions not required for WAN use. In modern practice, only error detection, not flow control using sliding window, is present in modern data link protocols such as Point-to-Point Protocol (PPP), and, on local area networks, the IEEE 802.2 LLC layer is not used for most protocols on Ethernet, and, on other local area networks, its flow control and acknowledgment mechanisms are rarely used. Sliding window flow control and acknowledgment is used at the Transport Layer by protocols such as TCP, but is still used in niches where X.25 offers performance advantages.Both WAN and LAN services arrange bits, from the Physical Layer, into logical sequences called frames. Not all Physical Layer bits necessarily go into frames, as some of these bits are purely intended for Physical Layer functions. For example, every fifth bit of the FDDI bit stream is not used by the Layer.WAN Protocol architectureConnection-oriented WAN data link protocols, in addition to framing, detect and may correct errors. They also are capable of controlling the rate of transmission. A WAN Data Link Layer might implement a sliding window flow control and acknowledgment mechanism to provide reliable delivery of frames; that is the case for SDLC and HDLC, and derivatives of HDLC such as LAPB and LAPD.IEEE 802 LAN architecturePractical, connectionless LANs began with the pre-IEEE Ethernet specification, which is the ancestor of IEEE 802.3. This layer manages the interaction of devices with a shared medium, which is the function of a Media Access Control sublayer. Above this MAC sublayer is the media-independent IEEE 802.2 Logical Link Control (LLC) sublayer, which deals with addressing and multiplexing on multiaccess media.While IEEE 802.3 is the dominant wired LAN protocol and IEEE 802.11 the wireless LAN protocol, obsolescent MAC layers include Token Ring and FDDI. The MAC sublayer detects but does not correct errors.Layer 1: Physical LayerMain article: Physical LayerThe Physical Layer defines the electrical and physical specifications for devices. In particular, it defines the relationship between a device and a physical medium. This includes the layout of pins, voltages, cable specifications, Hubs, repeaters, network adapters, Host Bus Adapters (HBAs used in Storage Area Networks) and more.To understand the function of the Physical Layer in contrast to the functions of the Data Link Layer, think of the Physical Layer as concerned primarily with the interaction of a single device with a medium, where the Data Link Layer is concerned more with the interactions of multiple devices (i.e., at least two) with a shared medium. The Physical Layer will tell one device how to transmit to the medium, and another device how to receive from it (in most cases it does not tell the device how to connect to the medium). Standards such as RS-232 do use physical wires to control access to the medium.The major functions and services performed by the Physical Layer are:--Establishment and termination of a connection to a communications medium.Participation in the process whereby the communication resources are effectively shared among multiple users. For example, contention resolution and flow control.Modulation, or conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel. These are signals operating over the physical cabling (such as copper and optical fiber) or over a radio link.Parallel SCSI buses operate in this layer, although it must be remembered that the logical SCSI protocol is a Transport Layer protocol that runs over this bus. Various Physical Layer Ethernet standards are also in this layer; Ethernet incorporates both this layer and the Data Link Layer. The same applies to other local-area networks, such as Token ring, FDDI, and IEEE 802.11, as well as personal area networks such as Bluetooth and IEEE 802.15.4.
Posted by Rahmat Ullah at 10:11 PM