Documente Academic
Documente Profesional
Documente Cultură
S-NW-B-1.0
Document History
Date
Version
By
Remarks
24 Aug. 2007
1.00
T. Sasahara
First version
9 June. 2008
1.10
T.D. Phyu
Adding
Analysis
Network
and
Requirement
Network
and
Infrastructure
Topics
S-NW-B-1.0
Contents at a Glance
1.
2.
S-NW-B-1.0
Table of Contents
1.
1.1.1.
1.1.2.
1.1.3.
1.1.4.
1.1.5.
1.2.
1.2.1.
1.2.2.
1.3.
2.
Introduction .............................................................................................................. 6
1.3.1.
1.3.2.
1.3.3.
Gathering Information..................................................................................... 19
1.3.4.
1.3.5.
2.1.1.
Bus Topology.................................................................................................. 22
2.1.2.
Ring Topology................................................................................................. 23
2.1.3.
2.1.4.
Tree Topology................................................................................................. 25
2.1.5.
2.1.6.
Hybrid Topology.............................................................................................. 26
2.1.7.
2.2.
Network Protocol.................................................................................................... 26
2.2.1.
Ethernet .......................................................................................................... 27
2.2.2.
2.2.3.
2.2.4.
2.2.5.
FDDI................................................................................................................ 28
2.2.6.
ATM ................................................................................................................ 28
S-NW-B-1.0
2.2.7.
Gigabit Ethernet.............................................................................................. 29
2.2.8.
2.3.
Network Cabling..................................................................................................... 31
2.3.1.
2.3.2.
2.3.3.
2.3.4.
2.4.
2.5.
S-NW-B-1.0
Network Design
Network Requirement and Analysis <Day 1>
Introduction
Network Design
Network Requirement and Analysis <Day 1>
Introduction
fits together, and what goes where.
An IP network that has not been designed in a systematic fashion will invariably run into
problems from the beginning of the implementation stage. When you are upgrading an
existing network, there are usually legacy networks that need to be connected. Introducing
of new technology without studying the limitations of the current network may lead to
unforeseen problems. You may end up trying to solve a problem that was created
unnecessarily. For example, the introduction of an Ethernet network in a token-ring
environment has to be carefully studied.
The design of the network must take place before any implementation takes place. The
design of the network must also be constantly reviewed as requirements change over time.
A good network design also includes detailed documentation of the network for future
reference. A well designed IP network should be easy to implement, with few surprises.
S-NW-B-1.0
Network Design
Network Requirement and Analysis <Day 1>
Introduction
Modularity: An important concept to adopt is the modular design approach in building a
network. Modularity divides a complex system into smaller, manageable ones and makes
implementation much easier to handle. Modularity also ensures that a failure at a certain
part of the network can be isolated so that it will not bring down the entire network. The
expendability of a network is improved by implementing a modular design. For example,
adding a new network segment or a new application to the network will not require
re-addressing all the hosts on the network if the network has been implemented in a
modular design.
Security: The security of an organizations network is an important aspect in a design,
especially when the network is going to interface with the Internet. Considering security risks
and taking care of them in the network design stage is essential for complete certitude in the
network. Considering security at a later stage leaves the network open to attack until all
security holes are closed, a reactive rather than proactive approach that sometimes is very
costly. Although new security holes may be found as the hackers get smarter, the basic
known security problems can easily be incorporated into the design stage.
Network Management: Network management should not be an afterthought of building a
network. Network management is important because it provides a way to monitor the health
of the network, to ascertain operating conditions, to isolate faults and configure devices to
effect changes. Implementing a management framework should be integrated into the
design of the network from the beginning.
Economics: A network design that meets all of the requirements of the organization but is
may need to be reviewed. Balancing cost and meeting requirements are perhaps the most
difficult aspects of a good network design.
Network Design
Network Requirement and Analysis <Day 1>
Introduction
requirement as a Voice over IP application. Voice and data compression have not reached
that level yet. It is obvious that the applications your network will need to support determine
the type of network you will finally design. It is not a good idea to design a network without
considering what applications you currently require, and what applications your business
needs will require your network to support in the future.
Performance Requirements: The performance requirements of the users of the
applications must be considered. A user of the network may be willing to wait for a slow
response from an HTTP or FTP application, but they will not accept delays in a Voice over
IP application - its hard to understand what someone is saying when its all broken up.
The delay in the delivery of network traffic also needs to be considered. Long delays will not
be acceptable to applications that stream data, such as video over IP applications. The
accuracy with which the network is able to provide data to the application is also relevant to
the network design. Differing infrastructure designs provide differing levels of accuracy from
the network.
Quality of Service: Quality of Service (QoS) arises simply for one reason: some users data
is more "important" then others. The requirement for QoS and ToS that gets incorporated
into an application also has implications for the network design. The connecting devices, the
routers and switches, have to be able to ensure "premium" delivery of information so as to
support the requirement of the application.
Proxy-Enabled: The ability of an application protocol to be proxyed has implications on the
bandwidth requirements and the security of the network. An HTTP application will be easily
manageable when a firewall is installed for security, as a proxy service can be placed
outside the firewall in a demilitarized zone to serve HTTP traffic through the firewall to the
application.
Whether the workstation meets the basic performance requirement in terms of CPU
speed, memory size, disk space and so on
Network Design
Network Requirement and Analysis <Day 1>
Introduction
Of these questions, features and performance criteria are easy to understand and
information is readily obtainable. The connectivity option is a difficult one to handle because
it can involve many fact findings, some of which may not be easily available. Many times,
these tasks are learned through painful experience. Take for example, the following
questions that may need to be answered if we want to develop an application that runs on
TCP/IP.
You may want to develop a multimedia application and make use of ATMs superb delivery
capability. But the truth is, not all workstations support ATM cards.
Even if the network interface card is available, it may not have the required cabling option
such as a UTP port or multimode fiber SC connection port. You may need a UTP port
because UTP cabling is cost effective.
Network Design
Network Requirement and Analysis <Day 1>
Introduction
The Internet as we have it today grew out of circumstances. In the beginning, it was not
designed to be what it is today. In fact, there was not any planning or design work done for it.
It is merely a network of different networks put together, and we have already seen its
problems and limitations:
Work has begun on building the so-called New Generation Internet (NGI) and it is supposed
to be able to address most, if not all, of the problems that we are experiencing with the
Internet today. The NGI will be entirely different from what we have today, as it is the first
time that a systematic approach has been used to design and build an Internet.
Network Design
Network Requirement and Analysis <Day 1>
Analyzing Business Goals and Constraints
support a business needs. From the network infrastructure to the various system designs,
server deployments, security considerations and types of client workstations, they all have
to be well coordinated. A minor error could mean back to the drawing board for the system
designer, and lots of money for the board of directors.
Analyze requirements. In this phase, the network analyst interviews users and
technical personnel to gain an understanding of the business and technical goals for a
new or enhanced system. The task of characterizing the existing network, including the
logical and physical topology and network performance, flows.
Develop the logical design. This phase deals with a logical topology for the new or
enhanced network, network layer addressing, naming and switching and routing
protocols. Logical design also includes security planning, network management design,
and the initial investigation into which service providers can meet WAN and remote
access requirements.
Develop the physical design. During the physical design phase, specific technologies
and products to realize the logical design are selected. Also, the investigation into
service providers, which began during the logical design phase, must be completed
during this phase.
Test, optimize, and document the design. The final steps in top-down network
design are to write and implement a test plan, build a prototype or pilot, optimize the
network design, and document your work with a network design proposal.
S-NW-B-1.0
Network Design
Network Requirement and Analysis <Day 1>
Analyzing Business Goals and Constraints
Analyze
Requirements
Monitor and
Optimize
Network
Performance
Develop
Logical Design
Develop
Physical
Design
Implement
and Test
Network
Test, Optimize
and Document
Design
Plan. Network requirement are identified in this phase. This phase also includes an
analysis of areas where the network will be installed and an identification of users who
will require network service.
Design. In this phase, the network designers accomplish the bulk of the logical and
physical design, according to requirements gathered during the plan phase.
Implement. After the design has been approved, implementation begins. The network
is built according to the design specifications. Implementation also serves to verify the
design.
Operate. Operation is the final test of the effectiveness of the design. The network is
monitored during this phase for performance problems and any faults, to provide input
into the optimize phase of the network life cycle.
Retire. When the network, or a part of the network, is out-of-date, it may be taken out of
production.
Network Design
Network Requirement and Analysis <Day 1>
Planning for a New Network
network design. Considering a thorough analysis of your customers business objectives,
you can propose a network design that will meet with your customers approval. If you keep
in mind the changes in business strategies and enterprise networking, it becomes possible
to list some typical network design business goals.
Reduce costs
At the point of the design process, it is now time to focus on the real reason networks exist:
applications. Identification of your customers application should include both current
applications and new applications.
Assessing needs
Determining costs
Gathering information
If you are choosing wireless, there are also special concerns that must be considered, such
as compatibility and interoperability, which wireless standards to follow and which wireless
technology to use.
Network Design
Network Requirement and Analysis <Day 1>
Planning for a New Network
process. In reality it should be the first question that is asked. Sometimes changing a
procedure or adding personnel may solve the problem, making an investment in a new
computer network unnecessary. However, determining the need can sometimes be difficult
because the solution may not be just to invest in technology but to assess a combination of
several different resources.
1.
The first step in assessing the need is to look at the organization or business as a whole.
Some questions to ask include:
Although these questions may seem very basic, they often reveal a great deal that can help
you assess needs. For example, a business that is rapidly losing market share and has
changed presidents three times in the last six months may not be in a position to invest
heavily in new networking technologies. On the other hand, a business that has captured a
niche in the marketplace and currently has no serious competitors may be poised for rapid
growth, and a new network may become the backbone of that growth. Obtaining a firm
conceptual grip on the organization as a whole and its current status will reveal whether an
investment today in technology is a wise step.
2.
The next step in assessing the need for a wireless network is to look at how the organization
or business uses its current network. For example, answer these questions:
Some organizations, such as banks or brokerage firms, require networks that have a very
high degree of security. Other organizations require networks to be completely fault-tolerant
and cannot afford any downtime. How the network supports the organization is an important
consideration. Examining the current status of the network, especially the applications that
run on the network and the number of users, can reveal much of this information.
The question regarding the strengths and weaknesses of the network can begin to identify
S-NW-B-1.0
Network Design
Network Requirement and Analysis <Day 1>
Planning for a New Network
why a new network may be needed. If the current network can be upgraded or adapted to
meet the current needs, then a new network may not be necessary. However, if the current
network cannot support the anticipated future growth of the business or is based on a very
old technology then investing in a new network may be the answer.
3.
This is a good time to document the current network in detail. It is sometimes surprising to
see just exactly what the current network does. Documentation of the current network may
include a table that summarizes information about the network. An example of such a table
is shown in Table 1. Depending on the complexity of the network, a diagram of the network
may also be necessary as seen in Figure 2 (Physical Network Diagram) and Figure 3
(Logical Network Diagram). After assessing the needs and examining the networks current
status and technical documentation, then you can decide whether to upgrade the network,
replace it, or add a new network to meet the needs.
Table 1 Current Network Summary
Number of clients
11
Types of clients
Number of servers
Type of network
Category 5 enhanced
3 laser printers
CISCO 1600 router connects to the Internet
by ADSL (50Mbps/3Mbps)
S-NW-B-1.0
Network Design
Network Requirement and Analysis <Day 1>
Planning for a New Network
10
11
12
14
13
Wiring closet
15
Server room
16
19
17
20
18
S-NW-B-1.0
Network Design
Network Requirement and Analysis <Day 1>
Planning for a New Network
OS
CPU
Mem
HDD
Serial
2G
800G
AAAA
2G
200G
BBBB
1.86GHz
10
Core 2 Duo
2.33GHz
11
Network Design
Network Requirement and Analysis <Day 1>
Planning for a New Network
additional training for the technical staff.
Although a WLAN may seem expensive to purchase and install compared to a wired LAN, it
is a viable alternative, and in many cases it is the only option. Many organizations pay
thousands of dollars in electrical contracting and related fees to add new users as they
expand wired networks or move to another location. These organizations are turning to
wireless technology as a less expensive alternative to installing wiring, as well as a faster
way to get the network up and running.
Network Design
Network Requirement and Analysis <Day 1>
Planning for a New Network
how much it should cost. Once the RFPs have been returned and analyzed, the
organization can make a final decision.
Instead of RFP, the Request for Quotation (RFQ) is also used. RFQ is used where
discussions are not required with bidders (mainly when the specifications of a product or
service are already known), and the price is the main or only factor in selecting the
successful bidder.
1.
Assess Business
2.
3.
4.
5.
6.
Training
Training provides users as well as network support specialists the knowledge to operate and
support the new LAN effectively. Training is vital to the use of a LAN. Users must know how
to use the hardware and software, and the support staff needs to know how to manage the
network and diagnose problems. Training increases the effectiveness of the new LAN
because users have less of a learning curve. This, in turn, minimizes the drop in productivity
that is normally associated with the installation of a new system. Also, well-trained users will
have fewer questions and require less support after they start using the new system.
Support
Whereas training is primarily done before the new system is turned on, support involves
continuing follow-up in answering questions and assisting users. User support functions can
be organized in a variety of ways, including the following:
Network Design
Network Requirement and Analysis <Day 1>
Planning for a New Network
Each of these options has its strengths and weaknesses. However, establishing and staffing
an internal help desk has proven to be one of the most effective means of support. A help
desk is a central point of contact for users who need assistance using the network. The help
desk manages customer problems and requests, and then provides support services to
solve the problem. Here are some suggestions regarding a help desk:
Plan for increased call volume after the new network is installed
S-NW-B-1.0
Network Design
The Network Infrastructure <Day 2>
Network Topologies
Network Design
The Network Infrastructure <Day 2>
Network Topologies
networks work best with a limited number of devices. If more than a few dozen computers
are added to a network bus, performance problems will likely result. In addition, if the
backbone cable fails, the entire network effectively becomes unusable.
S-NW-B-1.0
Network Design
The Network Infrastructure <Day 2>
Network Topologies
Network Design
The Network Infrastructure <Day 2>
Network Topologies
The protocols used with star configurations are usually Ethernet or LocalTalk.
S-NW-B-1.0
Network Design
The Network Infrastructure <Day 2>
Network Protocol
Network Design
The Network Infrastructure <Day 2>
Network Protocol
Token Ring
FDDI
ATM
2.2.1. Ethernet
The Ethernet protocol is by far the most widely used. Ethernet uses an access method
called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system
where each computer listens to the cable before sending anything through the network. If
the network is clear, the computer will transmit. If some other node is already transmitting on
the cable, the computer will wait and try again when the line is clear. Sometimes, two
computers attempt to transmit at the same instant. When this happens a collision occurs.
Each computer then backs off and waits a random amount of time before attempting to
retransmit. With this access method, it is normal to have collisions. However, the delay
caused by collisions and retransmitting is very small and does not normally affect the speed
of transmission on the network.
The Ethernet protocol allows for linear bus, star, or tree topologies. Data can be transmitted
over wireless access points, twisted pair, coaxial, or fiber optic cable at a speed of 10 Mbps
up to 1000 Mbps.
Network Design
The Network Infrastructure <Day 2>
Network Protocol
or tree topologies using twisted pair cable. A primary disadvantage of Local Talk is speed.
Its speed of transmission is only 230 Kbps.
2.2.5. FDDI
Fiber Distributed Data Interface (FDDI) is a network protocol that is used primarily to
interconnect two or more local area networks, often over large distances. The access
method used by FDDI involves token-passing. FDDI uses a dual ring physical topology.
Transmission normally occurs on one of the rings; however, if a break occurs, the system
keeps information moving by automatically using portions of the second ring to create a new
complete ring. A major advantage of FDDI is speed. It operates over fiber optic cable at 100
Mbps.
2.2.6. ATM
Asynchronous Transfer Mode (ATM) is a network protocol that transmits data at a speed of
155 Mbps and higher. ATM works by transmitting all data in small packets of a fixed size;
whereas, other protocols transfer variable length packets. ATM supports a variety of media
such as video, CD-quality audio, and imaging. ATM employs a star topology, which can
work with fiber optic as well as twisted pair cable.
ATM is most often used to interconnect two or more local area networks. It is also frequently
used by Internet Service Providers to utilize high-speed access to the Internet for their
clients. As ATM technology becomes more cost-effective, it will provide another solution for
constructing faster local area networks.
S-NW-B-1.0
Network Design
The Network Infrastructure <Day 2>
Network Protocol
Cable
Speed
Topology
Ethernet
10 Mbps
Fiber
Fast Ethernet
100 Mbps
Star
LocalTalk
Twisted Pair
.23 Mbps
Token Ring
Twisted Pair
4 Mbps - 16 Mbps
Star-Wired Ring
FDDI
Fiber
100 Mbps
Dual ring
ATM
155-2488 Mbps
Network Design
The Network Infrastructure <Day 2>
Network Protocol
and procedures of a protocol or protocol group are often defined by a lengthy document. For
example, IETF uses RFCs (Request for Comments) to define protocols and updates to the
protocols.
A wide variety of communication protocols exists. These protocols were defined by many
different standard organizations throughout the world and by technology vendors over years
of technology evolution and development. One of the most popular protocol suites is TCP/IP,
which is the heart of Internetworking communications. The IP, the Internet Protocol, is
responsible for exchanging information between routers so that the routers can select the
proper path for network traffic, while TCP is responsible for ensuring the data packets are
transmitted across the network reliably and error free. LAN and WAN protocols are also
critical protocols in network communications. The LAN protocols suite is for the physical and
data link layers of communications over various LAN media such as Ethernet wires and
wireless radio waves. The WAN protocol suite is for the lowest three layers and defines
communication over various wide-area media, such as fiber optic and copper cables.
Network communication has slowly evolved. Today's new technologies are based on the
accumulation over years of technologies, which may be either still existing or obsolete.
Because of this, the protocols which define the network communication are highly
inter-related. Many protocols rely on others for operation. For example, many routing
protocols use other network protocols to exchange information between routers.
In addition to standards for individual protocols in transmission, there are now also interface
standards for different layers to talk to the ones above or below (usually operating system
specific). For example: Winsock and Berkeley sockets between layers 4 and 5; NDIS and
ODI between layers 2 and 3.
The protocols for data communication cover all areas as defined in the OSI model. However,
the OSI model is only loosely defined. A protocol may perform the functions of one or more
of the OSI layers, which introduces complexity to understanding protocols relevant to the
OSI 7 layer model. In real-world protocols, there is some argument as to where the
distinctions between layers are drawn; there is no one black and white answer.
To develop a complete technology that is useful for the industry, very often a group of
protocols is required in the same layer or across many different layers. Different protocols
often describe different aspects of a single communication; taken together, these form a
protocol suite. For example, Voice over IP (VOIP), a group of protocols developed by many
S-NW-B-1.0
Network Design
The Network Infrastructure <Day 2>
Network Cabling
vendors and standard organizations, has many protocols across the 4 top layers in the OSI
model. Protocols can be implemented either in hardware or software or a mixture of both.
Typically, the lower layers are implemented in hardware, with the higher layers being
implemented in software.
Protocols could be grouped into suites (or families, or stacks) by their technical functions, or
origin of the protocol introduction, or both. A protocol may belong to one or multiple protocol
suites, depending on how you categorize it. For example, the Gigabit Ethernet protocol IEEE
802.3z is a LAN (Local Area Network) protocol and it can also be used in MAN (Metropolitan
Area Network) communications. Most recent protocols are designed by the IETF for
Internetworking communications and by the IEEE for local area networking (LAN) and
metropolitan area networking (MAN). The ITU-T contributes mostly to wide area networking
(WAN) and telecommunications protocols. ISO has its own suite of protocols for
internetworking communications, which is mainly deployed in European countries.
Network Design
The Network Infrastructure <Day 2>
Network Cabling
When electrical current flows through a wire, it creates a small, circular magnetic field
around the wire. When two wires in an electrical circuit are placed close together, their
magnetic fields are the exact opposite of each other. Thus, the two magnetic fields cancel
each other out. They also cancel out any outside magnetic fields. Twisting the wires can
enhance this cancellation effect. Using cancellation together with twisting the wires, cable
designers can effectively provide self-shielding for wire pairs within the network media. Two
basic types of twisted-pair cable exist: unshielded twisted pair (UTP) and shielded twisted
pair (STP). The following sections discuss UTP and STP cable in more detail.
S-NW-B-1.0
Network Design
The Network Infrastructure <Day 2>
Network Cabling
Figure 11 RJ-45
UTP used as a networking medium has an impedance of 100 ohms; this differentiates it
from other types of twisted-pair wiring such as that used for telephone wiring, which has
impedance of 600 ohms.
UTP cable offers many advantages. Because UTP has an external diameter of
approximately 0.43 cm (0.17 inches), its small size can be advantageous during installation.
Because it has such a small external diameter, UTP does not fill up wiring ducts as rapidly
as other types of cable. This can be an extremely important factor to consider, particularly
when installing a network in an older building. UTP cable is easy to install and is less
expensive than other types of networking media. In fact, UTP costs less per meter than any
other type of LAN cabling. And because UTP can be used with most of the major networking
architectures, it continues to grow in popularity.
Disadvantages also are involved in using twisted-pair cabling, however. UTP cable is more
prone to electrical noise and interference than other types of networking media, and the
distance between signal boosts is shorter for UTP than it is for coaxial and fiber-optic cables.
Although UTP was once considered to be slower at transmitting data than other types of
cable, this is no longer true. In fact, UTP is considered the fastest copper-based medium
today. The following summarizes the features of UTP cable:
Speed and throughput10 to 1000 Mbps
Average cost per nodeLeast expensive
Media and connector sizeSmall
Maximum cable length100 m (short)
Commonly used types of UTP cabling are as follows:
Category1: Used for telephone communications. Not suitable for transmitting data.
Category2: Capable of transmitting data at speeds up to 4 megabits per second
S-NW-B-1.0
Network Design
The Network Infrastructure <Day 2>
Network Cabling
(Mbps).
Category3: Used in 10BASE-T networks. Can transmit data at speeds up to 10
Mbps.
Category4: Used in Token Ring networks. Can transmit data at speeds up to 16
Mbps.
Category5: Can transmit data at speeds up to 100 Mbps.
Category5e: Used in networks running at speeds up to 1000 Mbps (1 gigabit per
second [Gbps]).
Category6: Typically, Category6 cable consists of four pairs of 24 American Wire
Gauge (AWG) copper wires. Category6 cable is currently the fastest standard for
UTP.
Network Design
The Network Infrastructure <Day 2>
Network Cabling
Media and connector sizeMedium to large
Maximum cable length100 m (short)
When comparing UTP and STP, keep the following points in mind:
The speed of both types of cable is usually satisfactory for local-area distances.
These are the least-expensive media for data communication. UTP is less
expensive than STP.
Because most buildings are already wired with UTP, many transmission standards
are adapted to use it, to avoid costly rewiring with an alternative cable type.
Network Design
The Network Infrastructure <Day 2>
Fiber Optics Cables
cable increases, so does the difficulty in working with it. Many times cable must be pulled
through existing conduits and troughs that are limited in size. Coaxial cable comes in a
variety of sizes. The largest diameter (1 centimeter [cm]) was specified for use as Ethernet
backbone cable because historically it had greater transmission length and noise-rejection
characteristics. This type of coaxial cable is frequently referred to as Thicknet. As its
nickname suggests, Thicknet cable can be too rigid to install easily in some situations
because of its thickness. The general rule is that the more difficult the network medium is to
install, the more expensive it is to install. Coaxial cable is more expensive to install than
twisted-pair cable. Thicknet cable is almost never used except for special-purpose
installations.
A connection device known as a vampire tap was used to connect network devices to
Thicknet. The vampire tap then was connected to the computers via a more flexible cable
called the attachment unit interface (AUI). Although this 15-pin cable was still thick and tricky
to terminate, it was much easier to work with than Thicknet.
The following summarizes the features of coaxial cables:
Speed and throughput10 to 100 Mbps
Average cost per nodeInexpensive
Media and connector sizeMedium
Maximum cable length500 m (medium)
Network Design
The Network Infrastructure <Day 2>
Fiber Optics Cables
SMF (single-mode fiber) uses a narrow core (less than 10 microns in diameter) through
which light generated by a laser travels over one path, reflecting very little. Because it
reflects little, the light does not disperse as the signal travels along the fiber. This continuity
allows single-mode fiber to accommodate high bandwidths and long distances (without
requiring repeaters). Single-mode fiber may be used to connect a carriers two facilities.
However, it costs too much to be considered for use on typical data networks.
MMF (multimode fiber) contains a core with a larger diameter than single-mode fiber
(between 50 and 115 microns in diameter; the most common size is 62.5 microns) over
which many pulses of light generated by a laser or LED travel at different angles. It is
commonly found on cables that connect a router to a switch or a server on the backbone of
a network.
Because of its reliability, fiber is currently used primarily as a cable that connects the many
segments of a network. Fiber-optic cable provides the following benefits over copper cabling:
Network Design
The Network Infrastructure <Day 2>
Comparing Media Types
Maximum
Type
Segment Length
UTP
100 m
STP
Coaxial
100 m
Speed
Cost
Advantages
Disadvantages
10 Mbps to
Least
Susceptible
1000 Mbps
expensive
used
to
10 Mbps to
More
Reduced
crosstalk;
100 Mbps
expensive
than UTP
distance
500 m (Thicknet)
10 Mbps to
Relatively
Less susceptible
185 m (Thinnet)
100 Mbps
inexpensive,
(Thicknet);
limited
but
bandwidth;
limited
media
application
(Thinnet);
costly
more
than
to
UTP
bring
down
entire
network
Fiber-Optic
10 km and farther
100 Mbps to
Expensive
(single-mode)
100
Gbps
2 km and farther
(single mode)
(multimode)
100 Mbps to
distances;
is
not
9.92
susceptible
to
EMI;
Gbps
(multimode)
Cannot be tapped, so
Difficult to terminate
coaxial
and
twisted-pair cable
S-NW-B-1.0
Network Design
Tables and Figures
Figures
Tables
Table 1 Current Network Summary ........................................................................... 16
Table 2 Equipment List .............................................................................................. 18
Table 3 Compare the Network Protocols................................................................... 29
Table 4 Media Type Comparison............................................................................... 38
S-NW-B-1.0