Sunteți pe pagina 1din 39

Network Technologies

Information and Communication Technology


Training Institute, Union of Myanmar
[Network Design]

S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


1/39

Document History
Date

Version

By

Remarks

24 Aug. 2007

1.00

T. Sasahara

First version

9 June. 2008

1.10

T.D. Phyu

Adding
Analysis

Network
and

Requirement

Network

and

Infrastructure

Topics

S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


2/39

Contents at a Glance
1.

Network Requirement and Analysis <Day 1> ................................................................. 6

2.

The Network Infrastructure <Day 2>............................................................................. 22

Tables and Figures............................................................................................................... 39

S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


3/39

Table of Contents
1.

Network Requirement and Analysis <Day 1> ................................................................. 6


1.1.

1.1.1.

Overall Design Considerations......................................................................... 7

1.1.2.

Application Considerations ............................................................................... 8

1.1.3.

Platform Considerations ................................................................................... 9

1.1.4.

Infrastructure Considerations ......................................................................... 10

1.1.5.

The Perfect Network....................................................................................... 11

1.2.

Analyzing Business Goals and Constraints........................................................... 12

1.2.1.

Using Network Design Methodology .............................................................. 12

1.2.2.

Analyzing Business Goal................................................................................ 13

1.3.

2.

Introduction .............................................................................................................. 6

Planning for a New Network .................................................................................. 14

1.3.1.

Assessing Needs ............................................................................................ 14

1.3.2.

Determining Costs .......................................................................................... 18

1.3.3.

Gathering Information..................................................................................... 19

1.3.4.

Requesting Vendor Proposals........................................................................ 19

1.3.5.

Providing Support ........................................................................................... 20

The Network Infrastructure <Day 2>............................................................................. 22


2.1.

Network Topologies ............................................................................................... 22

2.1.1.

Bus Topology.................................................................................................. 22

2.1.2.

Ring Topology................................................................................................. 23

2.1.3.

Star Topology ................................................................................................. 24

2.1.4.

Tree Topology................................................................................................. 25

2.1.5.

Mesh Topology ............................................................................................... 25

2.1.6.

Hybrid Topology.............................................................................................. 26

2.1.7.

Considerations When Choosing a Topology.................................................. 26

2.2.

Network Protocol.................................................................................................... 26

2.2.1.

Ethernet .......................................................................................................... 27

2.2.2.

Fast Ethernet .................................................................................................. 27

2.2.3.

Local Talk ....................................................................................................... 27

2.2.4.

Token Ring ..................................................................................................... 28

2.2.5.

FDDI................................................................................................................ 28

2.2.6.

ATM ................................................................................................................ 28
S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


4/39

2.2.7.

Gigabit Ethernet.............................................................................................. 29

2.2.8.

Network Protocol Overview ............................................................................ 29

2.3.

Network Cabling..................................................................................................... 31

2.3.1.

Twisted Pair Cable.......................................................................................... 31

2.3.2.

UTP Cable ...................................................................................................... 32

2.3.3.

Shielded Twisted-Pair Cable .......................................................................... 34

2.3.4.

Coaxial Cable ................................................................................................. 35

2.4.

Fiber Optics Cables ............................................................................................... 36

2.5.

Comparing Media Types........................................................................................ 38

Tables and Figures............................................................................................................... 39


Figures .............................................................................................................................. 39
Tables ............................................................................................................................... 39

S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


5/39

Network Design
Network Requirement and Analysis <Day 1>
Introduction

1. Network Requirement and Analysis <Day 1>


1.1. Introduction
If you do not take time to plan your network, the ease of interconnection through the use of
TCP/IP can lead to problems. In this book we will point out some of the problems and
highlight the types of decisions you will need to make as you consider implementing a
TCP/IP solution.
For example, lack of effective planning of network addresses may result in serious
limitations in the number of hosts you are able to connect to your network. Lack of
centralized coordination may lead to duplicate resource names and addresses, which may
prevent you from being able to interconnect isolated networks. Address mismatches may
prevent you from connecting to the Internet, and other possible problems may include the
inability to translate resource names to resource addresses because connections have not
been made between name servers.
Some problems arising from a badly designed or an unplanned network are trivial to correct.
Some, however, require significant time and effort to correct. Imagine manually configuring
every host on a 3000-host network because the addressing scheme chosen no longer fits a
business need.
When faced with the task of either designing a new network or allowing existing networks to
interconnect, there are several important design issues that will need to be resolved. For
example, how to allocate addresses to network resources, how to alter existing addresses,
whether to use static or dynamic routing, how to configure your name servers and how to
protect your network are all questions that need to be answered. At the same time the
issues of reliability, availability and backup will need to be considered, along with how you
will manage and administer your network.
Due to the simplicity and flexibility of IP, a network can be "hacked" together in an unordered
fashion. It is common for a network to be connected in this manner, and this may work well
for small networks. The problem arises when changes are required and documentation is
not found. Worst of all, if the network design/implementation teams leave the organization,
the replacements are left with the daunting task of finding out what the network does, how it
S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


6/39

Network Design
Network Requirement and Analysis <Day 1>
Introduction
fits together, and what goes where.
An IP network that has not been designed in a systematic fashion will invariably run into
problems from the beginning of the implementation stage. When you are upgrading an
existing network, there are usually legacy networks that need to be connected. Introducing
of new technology without studying the limitations of the current network may lead to
unforeseen problems. You may end up trying to solve a problem that was created
unnecessarily. For example, the introduction of an Ethernet network in a token-ring
environment has to be carefully studied.
The design of the network must take place before any implementation takes place. The
design of the network must also be constantly reviewed as requirements change over time.
A good network design also includes detailed documentation of the network for future
reference. A well designed IP network should be easy to implement, with few surprises.

1.1.1. Overall Design Considerations


Although much could be said about design considerations there are a few major points that
you need to know:
Scalability: A well designed network should be scalable, so as to grow with increasing
requirement. Introduction of new hosts, servers, or networks to the network should not
require a complete redesign of the network topology. The topology chosen should be able to
accommodate expansion due to business requirements.
Open Standards: The entire design and the components that build the network should be
based on open standards. Open standards imply flexibility, as there may be a need to
interconnect different devices from different vendors. Proprietary features may be suitable to
meet a short term requirement but in the long run, they will limit choices as it will be difficult
to find a common technology.
Availability/Reliability: Business requirements assuredly demand a level of availability and
reliability of the network. A stock trading system based on a network that guarantees
transaction response times of three seconds is meaningless if the network is down three out
of seven days a week. It is too late and costly to consider redundancy and reliability of a
network. It is too late and costly to consider redundancy and reliability of a network when
you are already halfway through the implementation stage.

S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


7/39

Network Design
Network Requirement and Analysis <Day 1>
Introduction
Modularity: An important concept to adopt is the modular design approach in building a
network. Modularity divides a complex system into smaller, manageable ones and makes
implementation much easier to handle. Modularity also ensures that a failure at a certain
part of the network can be isolated so that it will not bring down the entire network. The
expendability of a network is improved by implementing a modular design. For example,
adding a new network segment or a new application to the network will not require
re-addressing all the hosts on the network if the network has been implemented in a
modular design.
Security: The security of an organizations network is an important aspect in a design,
especially when the network is going to interface with the Internet. Considering security risks
and taking care of them in the network design stage is essential for complete certitude in the
network. Considering security at a later stage leaves the network open to attack until all
security holes are closed, a reactive rather than proactive approach that sometimes is very
costly. Although new security holes may be found as the hackers get smarter, the basic
known security problems can easily be incorporated into the design stage.
Network Management: Network management should not be an afterthought of building a
network. Network management is important because it provides a way to monitor the health
of the network, to ascertain operating conditions, to isolate faults and configure devices to
effect changes. Implementing a management framework should be integrated into the
design of the network from the beginning.
Economics: A network design that meets all of the requirements of the organization but is
may need to be reviewed. Balancing cost and meeting requirements are perhaps the most
difficult aspects of a good network design.

1.1.2. Application Considerations


The type of applications that the network needs to support and the types of network
resources these applications require must be taken into consideration when designing the
network. There are a number of these issues that must be considered for the network design,
some that are common to all applications, while others pertain to a subset of applications.
These issues will be defined and elaborated.
Bandwidth Requirements: Different applications require varying amounts of network
bandwidth. A simple SMTP e-mail application does not have the same bandwidth
S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


8/39

Network Design
Network Requirement and Analysis <Day 1>
Introduction
requirement as a Voice over IP application. Voice and data compression have not reached
that level yet. It is obvious that the applications your network will need to support determine
the type of network you will finally design. It is not a good idea to design a network without
considering what applications you currently require, and what applications your business
needs will require your network to support in the future.
Performance Requirements: The performance requirements of the users of the
applications must be considered. A user of the network may be willing to wait for a slow
response from an HTTP or FTP application, but they will not accept delays in a Voice over
IP application - its hard to understand what someone is saying when its all broken up.
The delay in the delivery of network traffic also needs to be considered. Long delays will not
be acceptable to applications that stream data, such as video over IP applications. The
accuracy with which the network is able to provide data to the application is also relevant to
the network design. Differing infrastructure designs provide differing levels of accuracy from
the network.
Quality of Service: Quality of Service (QoS) arises simply for one reason: some users data
is more "important" then others. The requirement for QoS and ToS that gets incorporated
into an application also has implications for the network design. The connecting devices, the
routers and switches, have to be able to ensure "premium" delivery of information so as to
support the requirement of the application.
Proxy-Enabled: The ability of an application protocol to be proxyed has implications on the
bandwidth requirements and the security of the network. An HTTP application will be easily
manageable when a firewall is installed for security, as a proxy service can be placed
outside the firewall in a demilitarized zone to serve HTTP traffic through the firewall to the
application.

1.1.3. Platform Considerations


An important step toward building an application is to find out the capabilities of the end
users workstation - the platform for the application. Some of the basic questions that have
to be answered include:


Whether the workstation supports graphics or only text

Whether the workstation meets the basic performance requirement in terms of CPU
speed, memory size, disk space and so on

Whether the workstation has the connectivity options required


S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


9/39

Network Design
Network Requirement and Analysis <Day 1>
Introduction

Of these questions, features and performance criteria are easy to understand and
information is readily obtainable. The connectivity option is a difficult one to handle because
it can involve many fact findings, some of which may not be easily available. Many times,
these tasks are learned through painful experience. Take for example, the following
questions that may need to be answered if we want to develop an application that runs on
TCP/IP.


Does the workstation support a particular network interface card?

You may want to develop a multimedia application and make use of ATMs superb delivery
capability. But the truth is, not all workstations support ATM cards.


Does the network interface card support certain cabling options?

Even if the network interface card is available, it may not have the required cabling option
such as a UTP port or multimode fiber SC connection port. You may need a UTP port
because UTP cabling is cost effective.

1.1.4. Infrastructure Considerations


The applications need a transport mechanism to share information, to transmit data or to
send requests for some services. The transport mechanism is provided by the underlying
layer called the network infrastructure. Building a network infrastructure can be a daunting
task for the inexperienced. Imagine building a network for a company with 100,000
employees and 90 different locations around the world. How do you go about building it?
And where do you begin? As in the application consideration, building a network
infrastructure involves many decision making processes:


What are the technologies out there?

Which technology should I use for the LAN?

Which technology should I use for the WAN?

How do I put everything together?

What is this thing called switching?

How should the network design look?

What equipment is required?

How should it grow?

How much does it cost?

Can I manage it?


S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


10/39

Network Design
Network Requirement and Analysis <Day 1>
Introduction


Can I meet the deployment schedule?

Is there a strategy to adopt?

The Internet as we have it today grew out of circumstances. In the beginning, it was not
designed to be what it is today. In fact, there was not any planning or design work done for it.
It is merely a network of different networks put together, and we have already seen its
problems and limitations:


It has almost run out of IP addresses

It has performance problems

It cannot readily support new generation applications

It does not have redundancy

It has security problems

It has erratic response time

Work has begun on building the so-called New Generation Internet (NGI) and it is supposed
to be able to address most, if not all, of the problems that we are experiencing with the
Internet today. The NGI will be entirely different from what we have today, as it is the first
time that a systematic approach has been used to design and build an Internet.

1.1.5. The Perfect Network


So, you may ask: Is there such a thing as a perfect network? If a network manager is
assigned to build a network for a company, he/she would have to know how to avoid all the
problems we have mentioned above. He or she would use the best equipment and would
have chosen the best networking technologies available, but may still not have built a
perfect network. Why? The truth is, there is no such thing as a perfect network. A network
design that is based on todays requirements may not address those of the future. Business
environments change and this has a spiraling effect on the infrastructure.
Expectations of employees change, the users requirements change, and new needs have
to be addressed by the applications, and these in turn affect how all the various systems tie
up together, which means there is a change in the network infrastructure involved. At best,
what the network could do is to scale and adapt to changes. Until the day it has reached its
technical limitation, these are the two criteria for a network to stay relevant; after that, a
forklift operation may be required.
Networks evolve over time. They have to do so to add value. The above sections have
highlighted that much work has to be done before an application gets to be deployed to
S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


11/39

Network Design
Network Requirement and Analysis <Day 1>
Analyzing Business Goals and Constraints
support a business needs. From the network infrastructure to the various system designs,
server deployments, security considerations and types of client workstations, they all have
to be well coordinated. A minor error could mean back to the drawing board for the system
designer, and lots of money for the board of directors.

1.2. Analyzing Business Goals and Constraints


1.2.1. Using Network Design Methodology
The network design is divided into four major phases that are carried out in a cyclical
fashion.


Analyze requirements. In this phase, the network analyst interviews users and
technical personnel to gain an understanding of the business and technical goals for a
new or enhanced system. The task of characterizing the existing network, including the
logical and physical topology and network performance, flows.

Develop the logical design. This phase deals with a logical topology for the new or
enhanced network, network layer addressing, naming and switching and routing
protocols. Logical design also includes security planning, network management design,
and the initial investigation into which service providers can meet WAN and remote
access requirements.

Develop the physical design. During the physical design phase, specific technologies
and products to realize the logical design are selected. Also, the investigation into
service providers, which began during the logical design phase, must be completed
during this phase.

Test, optimize, and document the design. The final steps in top-down network
design are to write and implement a test plan, build a prototype or pilot, optimize the
network design, and document your work with a network design proposal.

S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


12/39

Network Design
Network Requirement and Analysis <Day 1>
Analyzing Business Goals and Constraints

Analyze
Requirements
Monitor and
Optimize
Network
Performance

Develop
Logical Design

Develop
Physical
Design

Implement
and Test
Network
Test, Optimize
and Document
Design

Figure 1 Network Design and Implementation Cycle


It does not matter exactly which life cycle of a network you use, as long as you realize that
network design should be accomplished in a structured, planned, modular fashion, and that
feedback from the users of the operational network should be fed back into new network
projects to enhance or redesign the network. For that reason, the steps are listed here.


Plan. Network requirement are identified in this phase. This phase also includes an
analysis of areas where the network will be installed and an identification of users who
will require network service.

Design. In this phase, the network designers accomplish the bulk of the logical and
physical design, according to requirements gathered during the plan phase.

Implement. After the design has been approved, implementation begins. The network
is built according to the design specifications. Implementation also serves to verify the
design.

Operate. Operation is the final test of the effectiveness of the design. The network is
monitored during this phase for performance problems and any faults, to provide input
into the optimize phase of the network life cycle.

Optimize. The optimize phase is based on proactive network management which


identifies and resolves problems before network disruptions arise.

Retire. When the network, or a part of the network, is out-of-date, it may be taken out of
production.

1.2.2. Analyzing Business Goal


Understanding your customers business goals and constraints is a critical aspect of
S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


13/39

Network Design
Network Requirement and Analysis <Day 1>
Planning for a New Network
network design. Considering a thorough analysis of your customers business objectives,
you can propose a network design that will meet with your customers approval. If you keep
in mind the changes in business strategies and enterprise networking, it becomes possible
to list some typical network design business goals.


Increase revenues and profit

Increase market share

Expand into new markets

Increase competitive advantages over companies in the same market

Reduce costs

Increase employee productivity

Shorten product-development cycles

Offer new customer services

Avoid business disruption caused by network security problems

Avoid business disruption caused by natural and unnatural disasters.

Modernize outdated technologies

Reduce telecommunications and network costs, including overhead associated with


separate networks for voice, data, and video.

At the point of the design process, it is now time to focus on the real reason networks exist:
applications. Identification of your customers application should include both current
applications and new applications.

1.3. Planning for a New Network


If you fail to plan, then you plan to fail. This familiar quotation is especially true in planning
a network.


Assessing needs

Determining costs

Gathering information

Selecting a LAN technology

If you are choosing wireless, there are also special concerns that must be considered, such
as compatibility and interoperability, which wireless standards to follow and which wireless
technology to use.

1.3.1. Assessing Needs


Do we really need it? is a question that organizations often ask too late in the planning
S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


14/39

Network Design
Network Requirement and Analysis <Day 1>
Planning for a New Network
process. In reality it should be the first question that is asked. Sometimes changing a
procedure or adding personnel may solve the problem, making an investment in a new
computer network unnecessary. However, determining the need can sometimes be difficult
because the solution may not be just to invest in technology but to assess a combination of
several different resources.
1.

Look at the Organization as a Whole

The first step in assessing the need is to look at the organization or business as a whole.
Some questions to ask include:


What is the purpose or mission of the organization?

Is the current mission expected to change in the future?

What is the size of the organization?

How much growth is anticipated in the organization?

Although these questions may seem very basic, they often reveal a great deal that can help
you assess needs. For example, a business that is rapidly losing market share and has
changed presidents three times in the last six months may not be in a position to invest
heavily in new networking technologies. On the other hand, a business that has captured a
niche in the marketplace and currently has no serious competitors may be poised for rapid
growth, and a new network may become the backbone of that growth. Obtaining a firm
conceptual grip on the organization as a whole and its current status will reveal whether an
investment today in technology is a wise step.
2.

Look at Current Network Uses and Requirements

The next step in assessing the need for a wireless network is to look at how the organization
or business uses its current network. For example, answer these questions:


How does the current network support the organizations mission?

What applications run on the network?

How many users does it support?

What are the strengths and weaknesses of the current network?

Some organizations, such as banks or brokerage firms, require networks that have a very
high degree of security. Other organizations require networks to be completely fault-tolerant
and cannot afford any downtime. How the network supports the organization is an important
consideration. Examining the current status of the network, especially the applications that
run on the network and the number of users, can reveal much of this information.
The question regarding the strengths and weaknesses of the network can begin to identify
S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


15/39

Network Design
Network Requirement and Analysis <Day 1>
Planning for a New Network
why a new network may be needed. If the current network can be upgraded or adapted to
meet the current needs, then a new network may not be necessary. However, if the current
network cannot support the anticipated future growth of the business or is based on a very
old technology then investing in a new network may be the answer.
3.

Document the Current Network

This is a good time to document the current network in detail. It is sometimes surprising to
see just exactly what the current network does. Documentation of the current network may
include a table that summarizes information about the network. An example of such a table
is shown in Table 1. Depending on the complexity of the network, a diagram of the network
may also be necessary as seen in Figure 2 (Physical Network Diagram) and Figure 3
(Logical Network Diagram). After assessing the needs and examining the networks current
status and technical documentation, then you can decide whether to upgrade the network,
replace it, or add a new network to meet the needs.
Table 1 Current Network Summary
Number of clients

11

Types of clients

4 Windows Vista Business


8 Windows XP Professional
3 Windows 2000

Number of servers

1 Windows 2003 Standard Server

Type of network

Ethernet 100 Mbps switched

Type of media being used

Category 5 enhanced

Type of devices connected to the network

3 laser printers
CISCO 1600 router connects to the Internet
by ADSL (50Mbps/3Mbps)

S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


16/39

Network Design
Network Requirement and Analysis <Day 1>
Planning for a New Network

10

11

12

14
13

Wiring closet
15

Server room
16

19
17

20

18

Figure 2 Physical Network Diagram

S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


17/39

Network Design
Network Requirement and Analysis <Day 1>
Planning for a New Network

Figure 3 Logical Network Diagram


Table 2 Equipment List
#

OS

CPU

Mem

HDD

Serial

Win 2003 Server Standard

Quad Core Zeon Pro

2G

800G

AAAA

2G

200G

BBBB

1.86GHz
10

Win Vista Business

Core 2 Duo
2.33GHz

11

1.3.2. Determining Costs


Can we afford it? is the question that should be raised at this point of the process. It is
senseless to spend hundreds of hours in planning a network if you have not assessed the
costs and have not determined whether the project can be budgeted.
Hardware costs, for example a WLAN include purchasing access points and wireless NICs
for all devices and computers. The number of access points depends on the coverage area,
number of users, and types of services needed. Hardware costs may vary depending on
such factors as performance requirements, coverage requirements, and bandwidth.
Beyond assessing equipment costs, it is important to remember to take into account
installation and maintenance expenses, as well as to include in the budget support and
S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


18/39

Network Design
Network Requirement and Analysis <Day 1>
Planning for a New Network
additional training for the technical staff.
Although a WLAN may seem expensive to purchase and install compared to a wired LAN, it
is a viable alternative, and in many cases it is the only option. Many organizations pay
thousands of dollars in electrical contracting and related fees to add new users as they
expand wired networks or move to another location. These organizations are turning to
wireless technology as a less expensive alternative to installing wiring, as well as a faster
way to get the network up and running.

1.3.3. Gathering Information


Once it has been decided that a solution and it can be budgeted, the next step is to create a
plan for implementing the network. Many organizations turn to outside consultants and
vendors to provide information at this point. Some organizations may send out a Request
for Information (RFI).An RFI seeks to gain information about what a vendor may have to
offer. RFIs are general in their scope. For example, a broad statement such as, The vendor
will install a wireless network on the second floor of the building to accommodate 45 users:
may be enough to start things rolling. Vendors can then respond with information about the
particular products that they sell that will meet the stated needs.
Once the RFIs have been returned, the organization examines each of them in detail.
Generally a pattern will emerge from the RFIs. For example, if five vendors recommend a
radio-based DSSS wireless network based on the IEEE 802.11 standard, whereas one
vendor recommends its own infrared proprietary network, it becomes clearer which direction
to take. However, additional work and research are still needed at this point. Basing a
decision solely on information supplied by vendors may not be the wisest solution. The
organization still must compare the RFI against industry standards and the requirements of
the business.

1.3.4. Requesting Vendor Proposals


The next step is for the organization to submit a Request for Proposal (RFP). An RFP is a
detailed planning document that the organization sends to vendors with precise
specifications for the products and services that the organization intends to buy. RFPs are
much more detailed than RFIs. An RFP may start with a statement such as, The vendor will
install a 11g wireless network for 45 users in an area in which users are no more than 80
meter from the access point, and go on to include much more detailed information. The
RFP should contain detailed information from the vendor regarding what will be installed and
S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


19/39

Network Design
Network Requirement and Analysis <Day 1>
Planning for a New Network
how much it should cost. Once the RFPs have been returned and analyzed, the
organization can make a final decision.
Instead of RFP, the Request for Quotation (RFQ) is also used. RFQ is used where
discussions are not required with bidders (mainly when the specifications of a product or
service are already known), and the price is the main or only factor in selecting the
successful bidder.

1.

Assess Business

2.

Review current network

3.

Document current network

4.

Send out RFI

5.

Select a technology (i.e. wireless network, 11g/11a, WPA/WEP?)

6.

Send out RFP (RFQ)


Figure 4 Flow for selecting a LAN

1.3.5. Providing Support


Planning, selecting, designing, and installing a LAN are of little value if the users do not
receive the support they need to use the new system properly and effectively. Fortunately,
user support is receiving more attention today than in the past, as organizations realize its
value.


Training

Training provides users as well as network support specialists the knowledge to operate and
support the new LAN effectively. Training is vital to the use of a LAN. Users must know how
to use the hardware and software, and the support staff needs to know how to manage the
network and diagnose problems. Training increases the effectiveness of the new LAN
because users have less of a learning curve. This, in turn, minimizes the drop in productivity
that is normally associated with the installation of a new system. Also, well-trained users will
have fewer questions and require less support after they start using the new system.


Support

Whereas training is primarily done before the new system is turned on, support involves
continuing follow-up in answering questions and assisting users. User support functions can
be organized in a variety of ways, including the following:


Establishing informal peer-to-peer support groups


S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


20/39

Network Design
Network Requirement and Analysis <Day 1>
Planning for a New Network


Creating formal user support groups

Maintaining a help desk center

Assigning support to the information technology department

Outsourcing support to a third party

Each of these options has its strengths and weaknesses. However, establishing and staffing
an internal help desk has proven to be one of the most effective means of support. A help
desk is a central point of contact for users who need assistance using the network. The help
desk manages customer problems and requests, and then provides support services to
solve the problem. Here are some suggestions regarding a help desk:


Have one telephone number for the help desk

Plan for increased call volume after the new network is installed

Create a method to track problems effectively

Use surveys to determine user satisfaction

Periodically rotate network personnel to work at the help desk

Use information from the help desk to organize follow-up training

S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


21/39

Network Design
The Network Infrastructure <Day 2>
Network Topologies

2. The Network Infrastructure <Day 2>


2.1. Network Topologies
A physical topology is the physical layout, or pattern, of the nodes on a network. It depicts a
network in broad scope; that is, it does not specify device types, connectivity methods, or
addressing schemes for the network. Physical topologies are divided into three fundamental
geometric shapes: bus, ring, and star. These shapes can be mixed to create hybrid
topologies.
Before you design a network, you need to understand physical topologies, because they are
integral to the type of network (for example, Ethernet or Token Ring), cabling infrastructure,
and transmission media you use. You must also understand a networks physical topology
to troubleshoot its problems or change its infrastructure.
Network topologies are categorized into the following basic types:
 Bus Topology
 Ring Topology
 Star Topology
 Tree Topology
 Mesh Topology
 Hybrid Topology
More complex networks can be built as hybrids of two or more of the above basic
topologies.

2.1.1. Bus Topology


Bus networks use a common backbone to connect all devices. A single cable is used and
the backbone functions as a shared communication medium that devices attach or tap into
with an interface connector. A device wanting to communicate with another device on the
network sends a broadcast message onto the wire that all other devices see, but only the
intended recipient actually accepts and processes the message.
Ethernet bus topologies are relatively easy to install and don't require much cabling
compared to the alternatives. 10Base-2 ("ThinNet") and 10Base-5 ("ThickNet") both were
popular Ethernet cabling options many years ago for bus topologies. However, bus
S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


22/39

Network Design
The Network Infrastructure <Day 2>
Network Topologies
networks work best with a limited number of devices. If more than a few dozen computers
are added to a network bus, performance problems will likely result. In addition, if the
backbone cable fails, the entire network effectively becomes unusable.

Figure 5 Bus Topology


Advantages of a Linear Bus Topology
 Easy to connect a computer or peripheral to a linear bus.
 Requires less cable length than a star topology.
Disadvantages of a Linear Bus Topology
 Entire network shuts down if there is a break in the main cable.
 Terminators are required at both ends of the backbone cable.
 Difficult to identify the problem if the entire network shuts down.
Not meant to be used as a stand-alone solution in a large building.

2.1.2. Ring Topology


In a ring network, every device has exactly two neighbors for communication purposes. All
messages travel through a ring in the same direction (either "clockwise" or
"counterclockwise"). A failure in any cable or device breaks the loop and can take down the
entire network.
To implement a ring network, one typically uses FDDI, SONET, or Token Ring technology.
Ring topologies are found in some office buildings or school campuses.

S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


23/39

Network Design
The Network Infrastructure <Day 2>
Network Topologies

Figure 6 Ring Topology

2.1.3. Star Topology


Many home networks use the star topology. A star network features a central connection
point called a "hub" that may be a hub, switch or router. Devices typically connect to the hub
with Unshielded Twisted Pair (UTP) Ethernet.
Compared to the bus topology, a star network generally requires more cable, but a failure in
any star network cable will only take down one computer's network access and not the
entire LAN. (If the hub fails, however, the entire network also fails.)

Figure 7 Star Topology


Advantages of a Star Topology
 Easy to install and wire.
 No disruptions to the network then connecting or removing devices.
 Easy to detect faults and to remove parts.
Disadvantages of a Star Topology
 Requires more cable length than a linear topology.
 If the hub or concentrator fails, nodes attached are disabled.
 More expensive than linear bus topologies because of the cost of the concentrators.
S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


24/39

Network Design
The Network Infrastructure <Day 2>
Network Topologies

The protocols used with star configurations are usually Ethernet or LocalTalk.

2.1.4. Tree Topology


Tree topologies integrate multiple star topologies together onto a bus. In its simplest form,
only hub devices connect directly to the tree bus and each hub functions as the "root" of a
tree of devices. This bus/star hybrid approach supports future expandability of the network
much better than a bus (limited in the number of devices due to the broadcast traffic it
generates) or a star (limited by the number of hub connection points) alone.

Figure 8 Tree Topology


Advantages of a Tree Topology
 Point-to-point wiring for individual segments.
 Supported by several hardware and software venders.
Disadvantages of a Tree Topology
 Overall length of each segment is limited by the type of cabling used.
 If the backbone line breaks, the entire segment goes down.
 More difficult to configure and wire than other topologies.

2.1.5. Mesh Topology


Mesh topologies involve the concept of routes. Unlike each of the previous topologies,
messages sent on a mesh network can take any of several possible paths from source to
destination. (Recall that even in a ring, although two cable paths exist, messages can only
travel in one direction.) Some WANs, most notably the Internet, employ mesh routing. A
mesh network in which every device connects to every other is called a full mesh. As shown
in the illustration below, partial mesh networks also exist in which some devices connect
only indirectly to others.

S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


25/39

Network Design
The Network Infrastructure <Day 2>
Network Protocol

Figure 9 Mesh Topology

2.1.6. Hybrid Topology


Hybrid topology is a combination of any two or more network topologies. Instances can
occur where two basic network topologies, when connected together, can still retain the
basic network character, and therefore not be a hybrid network. For example, a tree network
connected to a tree network is still a tree network. Therefore, a hybrid network accrues only
when two basic networks are connected and the resulting network topology fails to meet one
of the basic topology definitions. For example, two star networks connected together exhibit
hybrid network topologies. A hybrid topology always accrues when two different basic
network topologies are connected.

2.1.7. Considerations When Choosing a Topology


Money: A linear bus network may be the least expensive way to install a network; you do
not have to purchase concentrators.
Length of cable needed: The linear bus network uses shorter lengths of cable.
Future growth: With a star topology, expanding a network is easily done by adding another
concentrator.
Cable type: The most common cable in schools is unshielded twisted pair, which is most
often used with star topologies.

2.2. Network Protocol


A protocol is a set of rules that governs the communications between computers on a
network. These rules include guidelines that regulate the following characteristics of a
network: access method, allowed physical topologies, types of cabling, and speed of data
transfer.
The most common network protocols are:
 Ethernet
 Local Talk
S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


26/39

Network Design
The Network Infrastructure <Day 2>
Network Protocol
 Token Ring
 FDDI
 ATM

2.2.1. Ethernet
The Ethernet protocol is by far the most widely used. Ethernet uses an access method
called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system
where each computer listens to the cable before sending anything through the network. If
the network is clear, the computer will transmit. If some other node is already transmitting on
the cable, the computer will wait and try again when the line is clear. Sometimes, two
computers attempt to transmit at the same instant. When this happens a collision occurs.
Each computer then backs off and waits a random amount of time before attempting to
retransmit. With this access method, it is normal to have collisions. However, the delay
caused by collisions and retransmitting is very small and does not normally affect the speed
of transmission on the network.
The Ethernet protocol allows for linear bus, star, or tree topologies. Data can be transmitted
over wireless access points, twisted pair, coaxial, or fiber optic cable at a speed of 10 Mbps
up to 1000 Mbps.

2.2.2. Fast Ethernet


To allow for an increased speed of transmission, the Ethernet protocol has developed a new
standard that supports 100 Mbps. This is commonly called Fast Ethernet. Fast Ethernet
requires the use of different, more expensive network concentrators/hubs and network
interface cards. In addition, category 5 twisted pair or fiber optic cable is necessary. Fast
Ethernet is becoming common that have been recently wired.

2.2.3. Local Talk


Local Talk is a network protocol that was developed by Apple Computer, Inc. for Macintosh
computers. The method used by Local Talk is called CSMA/CA (Carrier Sense Multiple
Access with Collision Avoidance). It is similar to CSMA/CD except that a computer signals
its intent to transmit before it actually does so. Local Talk adapters and special twisted pair
cable can be used to connect a series of computers through the serial port. The Macintosh
operating system allows the establishment of a peer-to-peer network without the need for
additional software. With the addition of the server version of AppleShare software, a
client/server network can be established. The Local Talk protocol allows for linear bus, star,
S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


27/39

Network Design
The Network Infrastructure <Day 2>
Network Protocol
or tree topologies using twisted pair cable. A primary disadvantage of Local Talk is speed.
Its speed of transmission is only 230 Kbps.

2.2.4. Token Ring


The Token Ring protocol was developed by IBM in the mid-1980s. The access method used
involves token-passing. In Token Ring, the computers are connected so that the signal
travels around the network from one computer to another in a logical ring. A single electronic
token moves around the ring from one computer to the next. If a computer does not have
information to transmit, it simply passes the token on to the next workstation. If a computer
wishes to transmit and receives an empty token, it attaches data to the token. The token
then proceeds around the ring until it comes to the computer for which the data is meant. At
this point, the data is captured by the receiving computer. The Token Ring protocol requires
a star-wired ring using twisted pair or fiber optic cable. It can operate at transmission speeds
of 4 Mbps or 16 Mbps. Due to the increasing popularity of Ethernet, the use of Token Ring
has decreased.

2.2.5. FDDI
Fiber Distributed Data Interface (FDDI) is a network protocol that is used primarily to
interconnect two or more local area networks, often over large distances. The access
method used by FDDI involves token-passing. FDDI uses a dual ring physical topology.
Transmission normally occurs on one of the rings; however, if a break occurs, the system
keeps information moving by automatically using portions of the second ring to create a new
complete ring. A major advantage of FDDI is speed. It operates over fiber optic cable at 100
Mbps.

2.2.6. ATM
Asynchronous Transfer Mode (ATM) is a network protocol that transmits data at a speed of
155 Mbps and higher. ATM works by transmitting all data in small packets of a fixed size;
whereas, other protocols transfer variable length packets. ATM supports a variety of media
such as video, CD-quality audio, and imaging. ATM employs a star topology, which can
work with fiber optic as well as twisted pair cable.
ATM is most often used to interconnect two or more local area networks. It is also frequently
used by Internet Service Providers to utilize high-speed access to the Internet for their
clients. As ATM technology becomes more cost-effective, it will provide another solution for
constructing faster local area networks.
S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


28/39

Network Design
The Network Infrastructure <Day 2>
Network Protocol

2.2.7. Gigabit Ethernet


The most recent development in the Ethernet standard is a protocol that has a transmission
speed of 1 Gbps. Gigabit Ethernet is primarily used for backbones on a network at this time.
In the future, it will probably be used for workstation and server connections also. It can be
used with both fiber optic cabling and copper. The 1000BaseTX, the copper cable used for
Gigabit Ethernet, is expected to become the formal standard in 1999.
Table 3 Compare the Network Protocols
Protocol

Cable

Speed

Topology

Ethernet

Twisted Pair, Coaxial,

10 Mbps

Linear Bus, Star, Tree

Fiber
Fast Ethernet

Twisted Pair, Fiber

100 Mbps

Star

LocalTalk

Twisted Pair

.23 Mbps

Linear Bus or Star

Token Ring

Twisted Pair

4 Mbps - 16 Mbps

Star-Wired Ring

FDDI

Fiber

100 Mbps

Dual ring

ATM

Twisted Pair, Fiber

155-2488 Mbps

Linear Bus, Star, Tree

2.2.8. Network Protocol Overview


The OSI model, and any other network communication model, provides only a conceptual
framework for communication between computers, but the model itself does not provide
specific methods of communication. Actual communication is defined by various
communication protocols. In the context of data communication, a protocol is a formal set of
rules, conventions and data structure that governs how computers and other network
devices exchange information over a network. In other words, a protocol is a standard
procedure and format that two data communication devices must understand, accept and
use to be able to talk to each other.
In modern protocol design, protocols are "layered" according to the OSI 7 layer model or a
similar layered model. Layering is a design principle which divides the protocol design into a
number of smaller parts, each part accomplishing a particular sub-task and interacting with
the other parts of the protocol only in a small number of well-defined ways. Layering allows
the parts of a protocol to be designed and tested without a combinatorial explosion of cases,
keeping each design relatively simple. Layering also permits familiar protocols to be
adapted to unusual circumstances.
The header and/or trailer at each layer reflect the structure of the protocol. Detailed rules
S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


29/39

Network Design
The Network Infrastructure <Day 2>
Network Protocol
and procedures of a protocol or protocol group are often defined by a lengthy document. For
example, IETF uses RFCs (Request for Comments) to define protocols and updates to the
protocols.
A wide variety of communication protocols exists. These protocols were defined by many
different standard organizations throughout the world and by technology vendors over years
of technology evolution and development. One of the most popular protocol suites is TCP/IP,
which is the heart of Internetworking communications. The IP, the Internet Protocol, is
responsible for exchanging information between routers so that the routers can select the
proper path for network traffic, while TCP is responsible for ensuring the data packets are
transmitted across the network reliably and error free. LAN and WAN protocols are also
critical protocols in network communications. The LAN protocols suite is for the physical and
data link layers of communications over various LAN media such as Ethernet wires and
wireless radio waves. The WAN protocol suite is for the lowest three layers and defines
communication over various wide-area media, such as fiber optic and copper cables.
Network communication has slowly evolved. Today's new technologies are based on the
accumulation over years of technologies, which may be either still existing or obsolete.
Because of this, the protocols which define the network communication are highly
inter-related. Many protocols rely on others for operation. For example, many routing
protocols use other network protocols to exchange information between routers.
In addition to standards for individual protocols in transmission, there are now also interface
standards for different layers to talk to the ones above or below (usually operating system
specific). For example: Winsock and Berkeley sockets between layers 4 and 5; NDIS and
ODI between layers 2 and 3.
The protocols for data communication cover all areas as defined in the OSI model. However,
the OSI model is only loosely defined. A protocol may perform the functions of one or more
of the OSI layers, which introduces complexity to understanding protocols relevant to the
OSI 7 layer model. In real-world protocols, there is some argument as to where the
distinctions between layers are drawn; there is no one black and white answer.
To develop a complete technology that is useful for the industry, very often a group of
protocols is required in the same layer or across many different layers. Different protocols
often describe different aspects of a single communication; taken together, these form a
protocol suite. For example, Voice over IP (VOIP), a group of protocols developed by many
S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


30/39

Network Design
The Network Infrastructure <Day 2>
Network Cabling
vendors and standard organizations, has many protocols across the 4 top layers in the OSI
model. Protocols can be implemented either in hardware or software or a mixture of both.
Typically, the lower layers are implemented in hardware, with the higher layers being
implemented in software.
Protocols could be grouped into suites (or families, or stacks) by their technical functions, or
origin of the protocol introduction, or both. A protocol may belong to one or multiple protocol
suites, depending on how you categorize it. For example, the Gigabit Ethernet protocol IEEE
802.3z is a LAN (Local Area Network) protocol and it can also be used in MAN (Metropolitan
Area Network) communications. Most recent protocols are designed by the IETF for
Internetworking communications and by the IEEE for local area networking (LAN) and
metropolitan area networking (MAN). The ITU-T contributes mostly to wide area networking
(WAN) and telecommunications protocols. ISO has its own suite of protocols for
internetworking communications, which is mainly deployed in European countries.

2.3. Network Cabling


Cable is the medium through which information usually moves from one network device to
another. There are several types of cable which are commonly used with LANs. In some
cases, a network will utilize only one type of cable, other networks will use a variety of cable
types. The type of cable chosen for a network is related to the network's topology, protocol,
and size. Understanding the characteristics of different types of cable and how they relate to
other aspects of a network is necessary for the development of a successful network.
The following sections discuss the types of cables used in networks and other related topics.
 Twisted Pair Cable
 Unshielded Twisted Pair (UTP) Cable
 Shielded Twisted Pair (STP) Cable
 Coaxial Cable
 Fiber Optic Cable
 Wireless LANs
 Cable Installation Guides

2.3.1. Twisted Pair Cable


Twisted-pair cable is a type of cabling that is used for telephone communications and most
modern Ethernet networks. A pair of wires forms a circuit that can transmit data. The pairs
are twisted to provide protection against crosstalk, the noise generated by adjacent pairs.
S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


31/39

Network Design
The Network Infrastructure <Day 2>
Network Cabling
When electrical current flows through a wire, it creates a small, circular magnetic field
around the wire. When two wires in an electrical circuit are placed close together, their
magnetic fields are the exact opposite of each other. Thus, the two magnetic fields cancel
each other out. They also cancel out any outside magnetic fields. Twisting the wires can
enhance this cancellation effect. Using cancellation together with twisting the wires, cable
designers can effectively provide self-shielding for wire pairs within the network media. Two
basic types of twisted-pair cable exist: unshielded twisted pair (UTP) and shielded twisted
pair (STP). The following sections discuss UTP and STP cable in more detail.

2.3.2. UTP Cable


UTP cable is a medium that is composed of pairs of wires in Figure 10. UTP cable is used in
a variety of networks. Each of the eight individual copper wires in UTP cable is covered by
an insulating material. In addition, the wires in each pair are twisted around each other.

Figure 10 UTP cable


UTP cable relies solely on the cancellation effect produced by the twisted wire pairs to limit
signal degradation caused by electromagnetic interference (EMI) and radio frequency
interference (RFI). To further reduce crosstalk between the pairs in UTP cable, the number
of twists in the wire pairs varies. UTP cable must follow precise specifications governing
how many twists or braids are permitted per meter (3.28 feet) of cable.
UTP cable often is installed using a Registered Jack 45 (RJ-45) connector in Figure 11. The
RJ-45 is an eight-wire connector used commonly to connect computers onto a local-area
network (LAN), especially Ethernets.

S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


32/39

Network Design
The Network Infrastructure <Day 2>
Network Cabling

Figure 11 RJ-45
UTP used as a networking medium has an impedance of 100 ohms; this differentiates it
from other types of twisted-pair wiring such as that used for telephone wiring, which has
impedance of 600 ohms.
UTP cable offers many advantages. Because UTP has an external diameter of
approximately 0.43 cm (0.17 inches), its small size can be advantageous during installation.
Because it has such a small external diameter, UTP does not fill up wiring ducts as rapidly
as other types of cable. This can be an extremely important factor to consider, particularly
when installing a network in an older building. UTP cable is easy to install and is less
expensive than other types of networking media. In fact, UTP costs less per meter than any
other type of LAN cabling. And because UTP can be used with most of the major networking
architectures, it continues to grow in popularity.
Disadvantages also are involved in using twisted-pair cabling, however. UTP cable is more
prone to electrical noise and interference than other types of networking media, and the
distance between signal boosts is shorter for UTP than it is for coaxial and fiber-optic cables.
Although UTP was once considered to be slower at transmitting data than other types of
cable, this is no longer true. In fact, UTP is considered the fastest copper-based medium
today. The following summarizes the features of UTP cable:
 Speed and throughput10 to 1000 Mbps
 Average cost per nodeLeast expensive
 Media and connector sizeSmall
 Maximum cable length100 m (short)
Commonly used types of UTP cabling are as follows:
 Category1: Used for telephone communications. Not suitable for transmitting data.
 Category2: Capable of transmitting data at speeds up to 4 megabits per second
S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


33/39

Network Design
The Network Infrastructure <Day 2>
Network Cabling
(Mbps).
 Category3: Used in 10BASE-T networks. Can transmit data at speeds up to 10
Mbps.
 Category4: Used in Token Ring networks. Can transmit data at speeds up to 16
Mbps.
 Category5: Can transmit data at speeds up to 100 Mbps.
 Category5e: Used in networks running at speeds up to 1000 Mbps (1 gigabit per
second [Gbps]).
 Category6: Typically, Category6 cable consists of four pairs of 24 American Wire
Gauge (AWG) copper wires. Category6 cable is currently the fastest standard for
UTP.

2.3.3. Shielded Twisted-Pair Cable


Shielded twisted-pair (STP) cable in Figure 12 combines the techniques of shielding,
cancellation, and wire twisting. Each pair of wires is wrapped in a metallic foil. The four pairs
of wires then are wrapped in an overall metallic braid or foil, usually 150-ohm cable. As
specified for use in Ethernet network installations, STP reduces electrical noise both within
the cable (pair-to-pair coupling, or crosstalk) and from outside the cable (EMI and RFI). STP
usually is installed with STP data connector, which is created especially for the STP cable.
However, STP cabling also can use the same RJ connectors that UTP uses.

Figure 12 STP Cable


Although STP prevents interference better than UTP, it is more expensive and difficult to
install. In addition, the metallic shielding must be grounded at both ends. If it is improperly
grounded, the shield acts like an antenna and picks up unwanted signals. Because of its
cost and difficulty with termination, STP is rarely used in Ethernet networks. STP is primarily
used in Europe.
The following summarizes the features of STP cable:
 Speed and throughput10 to 100 Mbps
 Average cost per nodeModerately expensive
S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


34/39

Network Design
The Network Infrastructure <Day 2>
Network Cabling
 Media and connector sizeMedium to large
 Maximum cable length100 m (short)
When comparing UTP and STP, keep the following points in mind:
 The speed of both types of cable is usually satisfactory for local-area distances.
 These are the least-expensive media for data communication. UTP is less
expensive than STP.
 Because most buildings are already wired with UTP, many transmission standards
are adapted to use it, to avoid costly rewiring with an alternative cable type.

2.3.4. Coaxial Cable


Coaxial cable in Figure 13 consists of a hollow outer cylindrical conductor that surrounds a
single inner wire made of two conducting elements. One of these elements, located in the
center of the cable, is a copper conductor. Surrounding the copper conductor is a layer of
flexible insulation. Over this insulating material is a woven copper braid or metallic foil that
acts both as the second wire in the circuit and as a shield for the inner conductor. This
second layer, or shield, can help reduce the amount of outside interference. Covering this
shield is the cable jacket.

Figure 13 Coaxial Cable


Coaxial cable supports 10 to 100 Mbps and is relatively inexpensive, although it is more
costly than UTP on a per-unit length. However, coaxial cable can be cheaper for a physical
bus topology because less cable will be needed. Coaxial cable can be cabled over longer
distances than twisted-pair cable. For example, Ethernet can run approximately 100 meters
(328 feet) using twisted-pair cabling. Using coaxial cable increases this distance to 500m
(1640.4 feet).
For LANs, coaxial cable offers several advantages. It can be run with fewer boosts from
repeaters for longer distances between network nodes than either STP or UTP cable.
Repeaters regenerate the signals in a network so that they can cover greater distances.
Coaxial cable is less expensive than fiber-optic cable, and the technology is well known; it
has been used for many years for all types of data communication.
When working with cable, you need to consider its size. As the thickness, or diameter, of the
S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


35/39

Network Design
The Network Infrastructure <Day 2>
Fiber Optics Cables
cable increases, so does the difficulty in working with it. Many times cable must be pulled
through existing conduits and troughs that are limited in size. Coaxial cable comes in a
variety of sizes. The largest diameter (1 centimeter [cm]) was specified for use as Ethernet
backbone cable because historically it had greater transmission length and noise-rejection
characteristics. This type of coaxial cable is frequently referred to as Thicknet. As its
nickname suggests, Thicknet cable can be too rigid to install easily in some situations
because of its thickness. The general rule is that the more difficult the network medium is to
install, the more expensive it is to install. Coaxial cable is more expensive to install than
twisted-pair cable. Thicknet cable is almost never used except for special-purpose
installations.
A connection device known as a vampire tap was used to connect network devices to
Thicknet. The vampire tap then was connected to the computers via a more flexible cable
called the attachment unit interface (AUI). Although this 15-pin cable was still thick and tricky
to terminate, it was much easier to work with than Thicknet.
The following summarizes the features of coaxial cables:
 Speed and throughput10 to 100 Mbps
 Average cost per nodeInexpensive
 Media and connector sizeMedium
 Maximum cable length500 m (medium)

2.4. Fiber Optics Cables


Fiber-optic cable, or simply fiber, contains one or several glass or plastic fibers at its center,
or core. Data is transmitted via pulsing light sent from a laser (in the case of 1- and
10-Gigabit technologies) or a light-emitting diode (LED) through the central fibers.
Surrounding the fibers is a layer of glass or plastic called cladding. The cladding is a
different density from the glass or plastic in the strands. It reflects light back to the core in
patterns that vary depending on the transmission mode. This reflection allows the fiber to
bend around corners without diminishing the integrity of the light-based signal. Outside the
cladding, a plastic buffer protects the cladding and core. Because it is opaque, it also
absorbs any light that might escape.
To prevent the cable from stretching, and to protect the inner core further, strands of Kevlar
(an advanced polymeric fiber) surround the plastic buffer. Finally, a plastic sheath covers the
strands of Kevlar. Figure 14 shows a fiber-optic cable with multiple, insulated fibers.
S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


36/39

Network Design
The Network Infrastructure <Day 2>
Fiber Optics Cables

Figure 14 F-Type connector


Like twisted-pair and coaxial cabling, fiber-optic cabling comes in a number of different varieties,
depending on its intended use and the manufacturer. However, all fiber cable variations fall into
two categories: single-mode and multimode.

SMF (single-mode fiber) uses a narrow core (less than 10 microns in diameter) through
which light generated by a laser travels over one path, reflecting very little. Because it
reflects little, the light does not disperse as the signal travels along the fiber. This continuity
allows single-mode fiber to accommodate high bandwidths and long distances (without
requiring repeaters). Single-mode fiber may be used to connect a carriers two facilities.
However, it costs too much to be considered for use on typical data networks.
MMF (multimode fiber) contains a core with a larger diameter than single-mode fiber
(between 50 and 115 microns in diameter; the most common size is 62.5 microns) over
which many pulses of light generated by a laser or LED travel at different angles. It is
commonly found on cables that connect a router to a switch or a server on the backbone of
a network.
Because of its reliability, fiber is currently used primarily as a cable that connects the many
segments of a network. Fiber-optic cable provides the following benefits over copper cabling:

 Nearly unlimited throughput


 Very high resistance to noise
 Excellent security
 Ability to carry signals for much longer distances before requiring repeaters than
copper cable
 Industry standard for high-speed networking
The most significant drawback to the use of fiber is its relatively high cost. Also, fiber-optic cable
requires special equipment to splice, which means that quickly repairing a fiber-optic cable in the
field (given little time or resources) can be difficult. Fiber has proved reliable in transmitting data
at rates that exceed 10 Gigabits (or 10,000 Megabits) per second.
S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


37/39

Network Design
The Network Infrastructure <Day 2>
Comparing Media Types

2.5. Comparing Media Types


Presented in Table 4 are comparisons of the features of the common network media. This
chart provides an overview of various media that you can use as a reference. The medium is
possibly the single most important long-term investment made in a network. The choice of
media type will affect the type of NICs installed, the speed of the network, and the capability
of the network to meet future needs.

Table 4 Media Type Comparison


Media

Maximum

Type

Segment Length

UTP

100 m

STP

Coaxial

100 m

Speed

Cost

Advantages

Disadvantages

10 Mbps to

Least

Easy to install; widely

Susceptible

1000 Mbps

expensive

available and widely

interference; can cover

used

only a limited distance

to

10 Mbps to

More

Reduced

crosstalk;

Difficult to work with;

100 Mbps

expensive

more resistant to EMI

can cover only a limited

than UTP

than Thinnet or UTP

distance

500 m (Thicknet)

10 Mbps to

Relatively

Less susceptible

185 m (Thinnet)

100 Mbps

inexpensive,

EMI interference than

(Thicknet);

limited

but

other types of copper

bandwidth;

limited

media

application

(Thinnet);

costly

more
than

to

Difficult to work with

damage to cable can

UTP

bring

down

entire

network
Fiber-Optic

10 km and farther

100 Mbps to

Expensive

(single-mode)

100

Gbps

security is better; can

2 km and farther

(single mode)

be used over great

(multimode)

100 Mbps to

distances;

is

not

9.92

susceptible

to

EMI;

Gbps

(multimode)

Cannot be tapped, so

Difficult to terminate

has a higher data rate


than

coaxial

and

twisted-pair cable

S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


38/39

Network Design
Tables and Figures
Figures

Tables and Figures


Figures
Figure 1 Network Design and Implementation Cycle ................................................ 13
Figure 2 Physical Network Diagram........................................................................... 17
Figure 3 Logical Network Diagram............................................................................. 18
Figure 4 Flow for selecting a LAN.............................................................................. 20
Figure 5 Bus Topology ............................................................................................... 23
Figure 6 Ring Topology.............................................................................................. 24
Figure 7 Star Topology............................................................................................... 24
Figure 8 Tree Topology.............................................................................................. 25
Figure 9 Mesh Topology ............................................................................................ 26
Figure 10 UTP cable .................................................................................................. 32
Figure 11 RJ-45.......................................................................................................... 33
Figure 12 STP Cable.................................................................................................. 34
Figure 13 Coaxial Cable............................................................................................. 35
Figure 14 F-Type connector....................................................................................... 37

Tables
Table 1 Current Network Summary ........................................................................... 16
Table 2 Equipment List .............................................................................................. 18
Table 3 Compare the Network Protocols................................................................... 29
Table 4 Media Type Comparison............................................................................... 38

S-NW-B-1.0

Network Technologies ICTTI, Union of Myanmar


39/39

S-ar putea să vă placă și