...INTRODUCTION TO STRUCTURED CABLING Compiled by Sonam Dukda Division of Information Technology Ministry of Communication September 2000 TABLE OF CONTENTS 1 2 INTRODUCTION .......................................................................................................................... 4 NETWORKING ............................................................................................................................. 5 2.1 Objectives ................................................................................................................................ 5 2.2 Choice of Software and Hardware........................................................................................... 5 3 NETWORKING TRENDS ............................................................................................................. 6 4 STANDARDS................................................................................................................................. 6 4.1 International Standards ............................................................................................................ 6 4.2 Industry Standards. .................................................................................................................. 6 4.3 Structured Cabling standards................................................................................................... 6 4.4 Highlights of the EIA/TIA-568A standards.................................................
Words: 5055 - Pages: 21
...They would also like to include an Electronic Medical Record system such as AllScripts, EPIC, or NexGen that will need to be accessible to all employees and doctors. This will be a new satellite office for an existing office that is ten miles away. What we plan to cover in this paper will be the specifications it will take to get this office’s network up, running, and able to support the equipment, software, and databases they are trying to implement, while also giving them the ability to communicate with their Main office. We will also have to ensure that what we create is very secure, and follows all HIPPA requirements for the network and data storage. We will go over the networks design including topology, Network Interface Cards (NICs), network operating system (NOS), cabling, where will the companies devices be located (servers, hubs or switches, printers, firewalls and routers, modems etc.), and how many users will they have. We will also discuss security measures such as, backup processes, and power it will take to sustain this network and its devices. For security we will discuss Virus protection, user passwords, firewalls, data encryption, and what physical security measures may need to be used. When designing the backup plan we will discuss capacity, how it will be done, can it sustain growth, frequency, and how and where it will be stored (on campus, off campus, or both). And lastly we will discuss the source of power and ventilation it will take to sustain the company’s...
Words: 3347 - Pages: 14
...Question | Answer | What is an example of software that creates packs for moving data across networks? | Internet Protocol | What most often provides the physical connection between the PC and the network? | NIC | What enables a computer to send a packet that every other PC on the network will process? | The Broadcast address | What can you use to connect two very different networks? | A router | Every NIC has a hard-coded identifier called what? | MAC Address | What provides an excellent tool for conceptualizing how a network works? | OSI 7 layer model | On a sending machine, data gets broken up at what layer of the OSI 7 layer model? | Transport layer or layer 4 | NIC's encapsulate data into a _________ for sending that data over a network. | Frame | A ______ enables multiple machines to connect over a network. | Hub | The ________ provides the key interface between the physical and network layers. | Data link layer | Which layer of the osi 7 layer model converts the ones and zeroes to electrical signals and places these signals on the cable? | Physical layer | The term "unshielded twisted pair" is best described by what network component? | Cable | What best describes the contents of a typical network frame? | Recipient's MAC address, sender's MAC address, data, CRC | 23.4F.17.8A.4C.10 is most likely to be what type of address assigned to a NIC? | MAC Address | Which layer of the OSI model involves routing? | Network layer | How much data can...
Words: 1951 - Pages: 8
...IT130 Introduction to Networking Final Exam Study Guide These are the facts from which your exam questions will be drawn. If you know these facts, you will do well on the exam. All models are a simplified representation of the real thing, having at least all the major functions of the real item. What constitutes a major rather than a minor function is open to opinion. Most networks use a cable known in the industry as an unshielded twisted pair (UTP), usually containing four pairs of wires that can transmit and receive data. Cabling and hubs operate at the Layer 1 (Physical) layer of the OSI model. In the command window, when the utility to show the IP address and other NIC information is run, the MAC address is listed as the Physical address in the third section of the information. All NICs on the same network must use the same frame type, or they will not be able to comunicate with other NICs. 67.21.321.4 is not a valid IP address, as the third octet (321) is greater than 255. IP uses a rather unique dotted decimal notation (sometimes referred to as a dotted-octet numbering system) based on four 8-bit numbers. Each 8-bit number ranges from 0-255, and the four numbers are separated by periods. The TCP/IP model has four layers (Link, Internet, Transport, Application), unlike the OSI model which has seven layers. Transmission Control Protocol (TCP) is a connection-oriented protocol, meaning, it requires verification that a good connection has been established before transmission...
Words: 1908 - Pages: 8
...IT130 Introduction to Networking Final Exam Study Guide These are the facts from which your exam questions will be drawn. If you know these facts, you will do well on the exam. All models are a simplified representation of the real thing, having at least all the major functions of the real item. What constitutes a major rather than a minor function is open to opinion. Most networks use a cable known in the industry as an unshielded twisted pair (UTP), usually containing four pairs of wires that can transmit and receive data. Cabling and hubs operate at the Layer 1 (Physical) layer of the OSI model. In the command window, when the utility to show the IP address and other NIC information is run, the MAC address is listed as the Physical address in the third section of the information. All NICs on the same network must use the same frame type, or they will not be able to comunicate with other NICs. 67.21.321.4 is not a valid IP address, as the third octet (321) is greater than 255. IP uses a rather unique dotted decimal notation (sometimes referred to as a dotted-octet numbering system) based on four 8-bit numbers. Each 8-bit number ranges from 0-255, and the four numbers are separated by periods. The TCP/IP model has four layers (Link, Internet, Transport, Application), unlike the OSI model which has seven layers. Transmission Control Protocol (TCP) is a connection-oriented protocol, meaning, it requires verification that a good connection has been established before transmission...
Words: 1908 - Pages: 8
...1. Application: Application is the term used within the Information Technology industry to reference software. The software can be for the end user which is known as the application software or it can be a Systems application software. 2. Unshielded twisted-pair: UTP, is also known as Category 5, and or Category 6. Consisting of 2 twisted pair of copper wire. UTP is the main type of cable used in LAN topography. 3. Shielded Twisted-Pair: Is similar to UTP, the main difference is that it is has an additional layer of shielding, this shield helps in preventing EMI, and other interference. STP is great application when a cable is being applied near power lines, metal pipes and is not in protected by plenum or conduit. 4. Fiber Optic Cable: Is a great long distance cable. There is Single mode, in which laser is transmitted and there is multimode, in which LED is transmitted. Both fiber cables are use to cover great distances up to allow data to traverse the fiber optic cable near the speed of light. 5. Dark Fiber is fiber optic cable is this idle and is not currently being used. 6. Coaxial Cable is an older cable that has a grounding copper core that is surrounded by a plastic protective insulating sheath, and then a protective grounding shield, and then there is the black outer protective plastic covering. 7. Plenum is a space or area that is intentional provided to allow for cables, pipes, tubing and other various plumbing. This space is typically...
Words: 932 - Pages: 4
...of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installations, testing and troubleshooting techniques for a computer network. MAJOR INSTRUCTIONAL AREAS 1. 2. 3. 4. 5. 6. 7. 8. 9. Telecommunications Cabling Specifications and Constraints Cabling Tools and Media Network Equipment for Wired and Wireless Networks Cable Testing Fiber Optics and Light Principles Fiber-Optic Cables, Splicing and Connectors Fiber-Optic Light Sources, Detectors and Receivers Fiber-Optic Considerations and Testing COURSE OBJECTIVES 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. Distinguish between bandwidth, frequency, and data rate in a data network Explain the importance of codes, standards, and specifications. Compare and contrast network topologies Describe the characteristics of different copper cables Explain the purpose of network tools Compare and contrast fiber-optic and copper transmission Differentiate between twisted-pair cable connectors, coaxial cable connectors, and fiber-optic cable connectors Construct a network based on specifications using repeaters, hubs, bridges, switches, servers, and routers Demonstrate how to...
Words: 1770 - Pages: 8
...Plenum The air-handling space between the walls, under structural floors, and above drop ceilings when used to circulate and otherwise handle air in a building. Plenum-grade cable can be run through these spaces if local building codes permit it. Decibel (dB) A standard unit used to express a relative measurement of signal strength or to express gain or loss in optical or electrical power. A unit of measure of signal strength, usually the relation between a received signal and a standard signal source. The decibel scale is a logarithmic scale, expressed as the logarithmic ratio of the strength of a received signal to the strength of the originally transmitted signal. For example, every 3dB equals 50 percent of signal strength, so therefore a 6dB loss equals a loss of 75 percent of total signal strength. Signal Attenuation A reduction of signal strength during transmission, such as when sending data collected through automated monitoring. Attenuation is represented in decibels (dB), which is ten times the logarithm of the signal power at a particular input divided by the signal power at an output of a specified medium. Crosstalk The coupling or transfer of unwanted signals from one pair within a cable to another pair. Crosstalk can be measured at the same (near) end or far end with respect to the signal source. Crosstalk is considered noise or interference and is expressed in decibels. Federal Communications Commission - FCC An independent U.S. government regulatory...
Words: 1272 - Pages: 6
...Chapter 3: Transmission Basics and networking media Transmission Basics Transmit: to issue signals along a network medium such as a cable. Transmission: Refers to either the process of transmitting or the progress of signals after they have been transmitted. * Analog and Digital Signaling: * On a data network, information can be transmitted via one of two signaling methods, analog or digital. * Voltage: the strength of an electrical signal * Analog: * One benefit to analog signals is that, because they are more variable than digital signals, they can convey greater subtleties with less energy. * One drawback to analog signals is that their voltage is varied and imprecise. Thus, analog transmission is more susceptible to transmission flaws such as noise, or any type of interference that may degrade a signal, than digital signals. * Digital: Composed of pulses of precise, positive voltages and zero voltages. A pulse of positive voltage represents a 1, a pulse of zero voltage represents a 0. * Continuous * Amplitude: Waves amplitude is a measure of its strength at any given point in time. The amplitude is the height of the wave at any point in time. * for example, the wave has an amplitude of 5 volts at .25 seconds, an amplitude of 0 volts at .5 seconds, and an amplitude of -5 volts at .75 seconds. * Frequency: the number of times that a waves amplitude cycles from its starting point, through its highest amplitude and its...
Words: 4165 - Pages: 17
...portions of material that were originally submitted during [8/19/2012 -9/26/2012] in [ENGL205-1203B-04] with [Carmen Kimble]." IT326-1401A-01: Network Infrastructure Administration D & S Residential Services Network Implementation Plan-2014 Titius Ivie February 3, 2014 Table of Contents Target Organization 5 Corporate Structure 5 Business Goal 5 Part 1: Proposed Network Solution 7 Network Configuration 7 Transmission Media 7 Targeted Users 8 Hardware and Software Requirements 8 Production Applications 10 External and Internal Costs 11 Personnel (External Costs) 11 Hardware and Software (Internal Costs) 12 Short Term and Long Term Benefits to the Organization 13 Part 2: Network Design 14 Physical Topology 14 Part 3: Installation and Configuration 15 Installation and Configuration Steps 15 Part 4: Maintenance and Troubleshooting 19 Maintaining servers on the network 19 Maintaining PCs on the network 19 Implementing security 20 Managing network connections 21 Unauthorized Usage 21 Proper Network Operating System 22 Training users 23 Conclusion 24 Part 5: Remote Access 26 Network Pro Prep Toolkit Screenshots 27 Screenshot of Completed Labs--Phase 1 27 Screenshot of Completed Labs--Phase 2 28 Screenshot of Completed Labs--Phase 3 32 References 35 Target Organization D & S Residential Services has been providing services for individuals with intellectual and developmental disabilities for more than 20...
Words: 4303 - Pages: 18
...Chapter 1 – Chapter 2 – Chapter 3 – 1) What is different about the method used to boost a digital signal’s strength, compared with the method of boosting an analog signal’s strength? • A digital signal requires a repeater, which retransmits the signal in its original form, and an analog signal requires an amplifier, which increases the strength of both the signal and the noise it has accumulated. 2) Which of the following decimal numbers corresponds to the binary number 00001001? • 9 3) A wave with which of the following frequencies would have the longest wavelength? • 10 MHz 4) Ethernet relies on which of the following transmission types? • full-duplex 5) In wavelength division multiplexing, two modulated signals are guaranteed to differ in what characteristic? • Color 6) Which of the following can increase latency on a network? • Adding 50 meters to the length of the network 7) What part of a cable protects it against environmental damage? • Sheath 8) You are helping to install a cable broadband system in your friend’s home. She wants to bring the signal from where the service provider’s cable enters the house to a room on another floor, which means you have to attach a new cable to the existing one. What type of cable should this be? • RG-6 9) With everything else being equal, a network using which of the following UTP types will suffer the most cross talk? • Cat 3 10) Which of the following is not a source of EMI? • Megaphone 11) Which...
Words: 1818 - Pages: 8
...WEST VISAYAS STATE UNIVERSITY INSTITUTE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY La Paz, Iloilo City A Digital Scrapbook in Basic Networking Submitted to: ARNEL N. SECONDES Subject Instructor Submitted by: Frenze Chloe Baluco Janice Gayapa Christian John Elnacin BSIT 2A October 3, 2014 TABLE OF CONTENTS Title Page Table of Contents Introduction Networking Fundamentals Networking Lexicon Network Types Network Design Standard Topologies Hubs Switches Variation of Major Topologies Network Media Network Cabling: Tangible Physical Media Primary Cable Types Wireless Networking: Intangible Media Types of Wireless Network Network Interface Card Network Interface Card (NIC) Basics Special-Purpose NIC’s References ------------------------------------------------- Networking Fundamentals Networking History and Evolution The earliest form of electronic networking for the purpose of message transfer was the local telephone exchange, which has evolved to become a carrier network providing transport services for both voice and data traffic on a global scale. Data networks designed exclusively for computing environments followed the introduction of business computing in the 1950s. Prior to that time, computers were used mostly for research and national defense purposes. Milestones in the history of data networking include: * 1960s—The first large-scale commercial computer network is created for an airline reservation application...
Words: 7158 - Pages: 29
...ITT Technical Institute NT1310 Physical Networking Student Course Package Bring this document with you each week Students are required to complete each assignment and lab in this course package on time whether or not they are in class. Late penalties will be assessed for any assignments or labs handed in past the due date. The student is responsible for replacement of the package if lost. Table of Contents Syllabus 2 Student Professional Experience 19 Graded Assignments and Exercises 23 Labs 47 Documenting your Student Professional Experience 57 ITT Technical Institute NT1310 Physical Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580...
Words: 10839 - Pages: 44
...a few recognised courses on structured cabling systems which offer some hands-on experience, or you could take one of the many courses offered by the manufacturers of cabling components. Obviously the manufacturers try to sell their own products, but their courses are usually cheaper and they can still provide some of the basic cabling skills. | There are also lots of books on the subject of cabling and a selection of these can be found in the Network Cabling Help shop, my personal favourite is The Cabling Handbook 2nd Edition by John Vacca. It has over 1300 pages covering all aspects of network cabling and includes chapters on The Standards, Network Design, Wireless Communications, Fibre and Home Wiring. If you don't want to invest any money on training until you are seeing some financial results, then you can gain valuable experience by actually doing some work for an existing cabling company. Here are some basic questions you may be asking yourself if you have never installed a structured cabling system before. What are 'The standards' ? There are three main cabling standards: * EIA/TIA 568A - This is the American standard and was the first to be published (1991). * ISO/IEC 11801 - The International standard for structured cabling systems. * CENELEC EN 50173 - The European cabling standard. The reason for having a 'Standard' is to define a method of connecting all types of vendors voice and data equipment, over a cabling system that uses a common media...
Words: 5043 - Pages: 21
...Section 1: Networking Concepts CompTIA Network+ N10-005: 1.1a – The OSI Model Through the years, the OSI model has been the fundamental model for networking. In this video, you’ll get an overview of the OSI model and a detailed breakdown of each of each OSI layer. CompTIA Network+ N10-005: 1.1b – The TCP/IP Model The OSI model isn’t the only model in town. In this video, you’ll learn about the TCP/IP model and how real-world applications are associated with each layer. CompTIA Network+ N10-005: 1.2 – The OSI Model in the Real World The OSI model is a useful reference, but how does it really work in the real world? In this video, we’ll investigate how the OSI model maps into an encrypted email conversation with Google Mail. CompTIA Network+ N10-005: 1.3a – Binary Math Calculating in binary is an important skill for any network professional. In this video, you’ll learn the fundamentals for converting between decimal and binary numbers. CompTIA Network+ N10-005: 1.3b – IP Classes The history of TCP/IP includes numerous changes in network technologies and subnetting. In this video, you’ll learn how the IP class-based numbering system was used in the past and how it’s used today. CompTIA Network+ N10-005: 1.3c – Classless Inter-Domain Routing CIDR-block addressing has added new flexibility to IP subnetting. In this video, you’ll learn about classless inter-domain routing and the notation used to designate a CIDR-block address. CompTIA Network+ N10-005: 1...
Words: 4714 - Pages: 19