CHAPTER 2

                                      BASIC NETWORK MEDIA

 

Lesson 1:  Network Cabling . . . . . . . . . . . . . . .        50

Lesson 2:  The Network Interface Card . . . . .        73

Lesson 3:  Wireless Networking . . . . . . . . . . .         89

 

 

 

NETWORK CABLING

 

Building on our understanding of the different network topologies that connect computer, we focus

next on the cables that connect them. The type of construction, features, and operation of each type of

cable, and the advantages, and disadvantages.

 

PRIMARY CABLE TYPES

 

There are three types of cable used in the industry, and they are Coaxial Cable, Twisted Pair, and

fiber-optic cable.

 

Coaxial Cable

 

At one time coaxial cable was very popular, and widely used and relatively inexpensive.  It was light

and easy to work with for installations.  The core of the coaxial cable carries the electronic signals that

make up the data. This wire core can be either solid or stranded.  If the core is solid, it is usually copper.

 

Coaxial cable is more resistant to interference and attenuation than twisted-pair cabling.

 

Coaxial cable is a good choice for longer distances and for reliably supporting higher data ranges with

less sophisticated equipment.

 

 

Types of Coaxial Cable

 

There are two types of coaxial cable, Thinnet and Thicknet.  Thinnet  can carry a data signal for 185m

before suffering from attenuation.  Thicknet cable is relatively rigid coaxial cable, and it can carry a data

signal for 500M before loosing its signal.

 

 

 

======================================================================

 

netnotes2.html                                                  PAGE 2                                                    2001/09/29

 

 

 

A tranceiver connects the thinnet coaxial cable to the larger thicknet coaxial cable.  A tranceiver was

designed for thicknet Ethernet includes a connector known as a vampire trap, or a piercing tap, to make

the actual physical connection to the thicknet core.  Connecton from the tranceiver to the NIC is made

using a tranceiver cable (drop cable) to connect to the attachment unit interface (AUI) port connector

on the card.

 

Thinnet vs Thicknet Card

 

As a general rule, the thicker the cable, the more difficult it is to work with.  Thin cable is flexible and

easy to work with, and easy to install, and relatively inexpensive.  Thicknet cable is more expensive,

harder to install because of its inability to bend, but Thicknet  will carry a signal farther than thinnet.

 

 

Coaxial-Cable Connection Hardware

 

Both thinnet and thicknet cable use a connection component, known as BNC connector, to make the

connections between the cable and the computers.

 

The BNC T Connector joins the NIC care in the computer to the network cable.

It gets its name from the British Army from WWII.

 

The BNC Barrel Connector joins two lengths of thinnet cable to make one longer length.

 

The BNC Terminator  closes each end of the bus cable to absorb stray signals.

 

 

Coaxial-Cable Grades and Fire Codes

 

Coaxial cable comes in two types of grades, PVC and Plenum grade which is fireproof.   PVC or

polyvinyl chloride is a type of plastic used to construct the insulation and cable jacket for most types

of coaxial cable.  PVC coaxial cable is flexible and can be easily routed through the exposed areas

of an office. However, when it burns it can give off poisonous gases.  A plenum is the shallow space in

many building between the false ceiling and the floor above, it is used to circulate warm and cold air

through the building. Fire codes give very specific instructions about the type of wiring that can be routed

through this area, because any smoke or as in the plenum will eventually blend with the air breathed by

everyone in the building.

 

 

 

 

======================================================================

 

netnotes2.html                                               PAGE 3                                                      2001/09/29

 

 

Plenum-grade cabling contains special materials in its insulation and cable jacket.  These materials are

certified to be fire resistant and produce a minimum amount of smoke, this reduces poisonous

chemical fumes.  Plenum cable can be used in plenum area and in vertical runs, without conduit. 

However, plenum cabling is more expensive and less flexible than PVC cable.

 

 

When to use Coaxial Cable

 

a)      Transmit voice, video and data

b)      Transmit data for greater distances than is possible with less expensive cabling

c)      Offer a familiar technology with reasonable data security

 

 

Twisted-Pair Cable

 

Twisted-pair cable consists of two insulated strands of copper wire twisted around each other.  There

are two types of twisted pair cable, UTP Unshielded twisted-pair, and STP Shielded twisted-pair.   

 

A number of twisted-pair wires are often grouped together and enclosed in a protective sheath to

form a cable.   The total number of pairs in a cable varies.  The twisting cancels out electrical noise

from adjacent pairs and from other sources such as motors, relays, and transformers.

 

 

Unshielded Twisted-Pair (UTP) Cable

 

UTP, using the 10BaseT specification is the most popular type of twisted-pair cable and fast

becoming the more popular LAN cabling.  The maximum cable length is 100 meters.

 

UTP consists of two insulated copper wires.  In North America, UTP cable is the most commonly used

cable for existing telephone systems and is already installed in many office buildings.

 

 

 

 

 

======================================================================

 

netnotes2.html                                                 PAGE 4                                                    2001/09/29

 

 

 

   Category Number

Type of Transmission

           Comments

                1

Out-of date

 

                2

Replaced cat 1 is   telephone grade 4 Mbps

Used by ArcNet

                3

Worked well for Networking, 16 Mbps

Token Ring Network

                4

Disappeared as soon as became available, 20 Mbps

Used on Token Ring

                5

Most commonly used          100 Mbps. Uses RJ-45 connectors.

Most technicians know how to make up Cat 5

 

 

Most telephone systems use a type of UTP.  That is why UTP is so popular because many buildings

are already pre-wired for twisted-pair telephone systems.  As part of the prewiring process, extra

UTP is often installed to meet future cabling needs.  If the preinstalled UTP is of sufficient grade to

support data transmissions, it can be used in a computer network.  But telephone wire may not have

sufficient twisting required, you can have fuzzy data transmission.  If the wire is placed near any

lighting, you can have crosstalk.   Therefore the greater number of twists in the wire, the less the

opportunity for crosstalk to occur.

 

 

Shielded Twisted-Pair (STP) Cable

 

STP cable uses a woven copper-braid jacket that is more protective and of a higher quality than the

 jacket used by UTP.  This gives STP an excellent shielding to protect the transmitted data from

outside interference, which in turn allows it to support higher transmission rates over longer

distances than UTP.

 

 

Connection Hardware Needed

 

The RJ-45 connector houses eight cable connections, while the RJ-11 houses only 4.

 

 

When to use Twisted-Pair Cabling

 

a)      Your LAN is under budget constraints

b)      You want a simple and easy installation

 

=======================================================================

 

netnotes2.html                                                 PAGE 5                                                      2001/09/29

 

 

When not to use Twisted-Pair Cabling

 

a)      Your LAN requires a high level of security and you must be absolutely sure of data integrity.

b)      You must transmit data over long distances at high speeds.

 

 

FIBER-OPTIC CABLE

 

In fiber-optic cable the data is carried by digital signals, in the form of pulses of light.  Fiber-optic

cable cannot be tapped, and is therefore a very secure form of data transmission.  It is very  good

for very high-speed data transmission because of the purity of the signal and lack of signal

attenuation.

 

 

Fiber-optic cable consists of an extremely thin cylinder of glass, called the core, surrounded by a

concentric layer of glass, known as the cladding.  The fibers are sometimes made of plastic.  Plastic

 is easier to install, but cannot carry the light pulses for a long a distance as glass. 

 

Because the glass strand passes signals in only one direction, a cable includes two strands in separate

jackets.  One strand transmits and on receives.

 

The only problem with fiber-optic is it requires a very skilled technician for installing, and it is very

expensive, and is priced/foot.    Fiber-optic cable transmissions are not subject to electrical

interference and are extremely fast, currently transmitting about 100Mbps, and can sometimes

reach 1 Gbps.

 

 

When to Use Fiber-Optic Cabling

 

If you need to transmit data at very high speeds over long distances and be secure.

 

When Not to use Fiber-Optic  Cabling

 

Are under a tight budget, and you do not have the expertise to install the cable

 

 

SIGNAL TRANSMISSION

 

There are two types of signal transmission, baseband and broadband.

 

 

 

========================================================================

 

netnotes2.html                                                  PAGE 6                                                       2001/09/29

 

 

Baseband Transmission

 

Baseband transmissions use digital signaling over a single channel.   The digital signal uses the complete

bandwidth of the cable, which constitutes a single channel.  The term bandwidth refers to the data

transfer capacity, or speed of transmission, of a digital communication system as measured in bits per

second (bps).

 

To reduce the occurrence of attenuation, baseband sytems sometimes use repeaters to receive incoming

signals and retransmit them at their original strength and definition.  This increases the practical length of

a cable.

 

 

Broadband Transmission

 

Broadband transmissions uses analog signaling and it uses a range of frequencies. 

With analog transmission, the signals are continuous and nondiscrete.  With broadband transmissions,

the signal flow is unidirectional.

 

Broadband also uses amplifiers to regenerate the analog signals to their original strength.

 

 

Increasing Bandwidth Performance

 

Simplex:   the signal is sent in one direction only, from sender to the receiver.

 

Half-duplex transmission: means the data is sent in both directions, but only one at a time.

 

Full-duplex transmission:  means the data can be sent and received at the same time,

eg. Telephone, TV and Internet.

 

 

Selecting Cabling

 

a)      How heavy will the network traffic be

b)      Is Security and issue

c)      Are there any restriction on cabling locations, cement walls, historic etc.

d)      What is the cabling Budget?

e)      What is the distance the cable must cover?

 

======================================================================

 

netnotes2.html                                                   PAGE 7                                                   2001/09/29

 

 

Cabling Considerations

 

 

As with most network components, there are trade-offs with the type of cable you purchase.  If you

work for a large organization and choose the least expensive cable, the accountants might initially be

pleased, but you might soon notice that the LAN is inadequate in both transmission speed and data

security.

 

Ask yourself how easy is this cable to install, and work with, are there any small areas to put the

cable.  Is it in an electrical area, is shielding required on the cable.  Will the data suffer from attenuation

and crosstalk, think about that.

 

Is speed an issue?  What about cost, and security.

 

 

NETWORK INTERFACE CARD

 

Network Interface Cards (NICs) or NAC’s (network adapter cards) provide the interface between

cables and the computers.  A NIC is the actual physical interface or connection between the computer

and the network cable.  If a computer is on a Network it must have a NIC to be able to communicate

with the other computers.  It is also important to get a good quality NIC, there are some cheap ones

on the market, and you will get what you pay for.

 

 

What is the Role of Network Interface Card

 

Network Interface Cards, usually referred to as NIC’s act as the physical interface or connection

between the computer and network cable.  The cards are installed in an expansion slot in each

computer and server on the network.  After the NIC has been installed, the network cable is attached

to the card’s port to make the actual physical connection between the computer and the rest of

the network.

 

a)      prepares data from the computer for the network cable

b)      sends the data to another computer

c)      controls the flow of data between the computer and the cabling system

d)      receive incoming data from the cable and translate it into bytes that can be understood by the

        computer’s CPU.

 

 

=======================================================================

 

netnotes2.html                                                   PAGE 8                                                    2001/09/29

 

 

Preparing the Data

 

Before data can be sent over the network, the NIC must change it from a form the computer can

understand to a form that can travel over a network cable.  The data moves through the computer

along paths called buses.   These are actually several data paths placed side by side.  Because the

paths are side by side (parallel), data can move along them in lateral groups instead of in a single

(serial) data stream.

 

Think of a 32-bit bus as a 32-lane highway with 32 cars moving side by side (moving in parallel),

each carrying one bit of data.  When data travels on a network cable it is said to be traveling as a

serial transmission because one bit follows another.

 

The NIC takes data that is traveling in parallel as a group and restructures it so that it will flow

through the 1-bit-serial path of the network cable.  This is accomplished through the translation of

the computer’s digital signals into electrical or optical signals that can travel on the network’s cables.

The component responsible for this is the transceiver (transmitter/receiver).

 

 

Network Address

 

In addition to transforming data, the NIC also has to advertise its own location or address, to the

rest of the network to distinguish it from all the other cards on the network.  The NIC address is

permanently burned onto the card, it is also called the MAC address.

 

Because data can often more faster on the bus or the cable than the NIC can handle, the data is

sent to the card’s  buffer, a reserved portion of RAM.  Here it is held temporarily during both

the transmission and reception of data.

 

Sending and Controlling Data

 

Before the sending NIC actually sends data over the network, it carries on an electronic dialog

with the receiving NIC so that both cards agree on the following:

 

a)      The maximum size of the groups of data to be sent

b)      The amount of data to be sent before confirmation of receipt is given

c)      The time intervals between sending data chunks (or packets)

d)      The amount of time to wait before confirmation is sent

e)      How much data each card can hold before it overflows (buffer size)

f)        The speed of the data transmission

 

 

 

=====================================================================

 

netnotes2.html                                                PAGE 9                                                   2001/09/29

 

 

 

CONFIGURATION OPTIONS AND SETTINGS

 

Network interface cards often have configurable options that must be set in order for the card to

function properly.

 

a)      IRQ Settings

b)      Base I/O address

c)      Base Memory Address (BMA)

d)      Tranceiver

 

 

NOTE:  Settings on older NIC’s are made by means of software, jumpers, or a combination of both.

 

 

Interrupt Request (IRQ) Lines

 

Interrupt request lines (IRQs) are hardware lines over which devices such as I/O ports, the keyboard,

disk drives and NIC’s can send interrupts or requests for service to the computer’s microprocessor.

 

 

IRQ’s are built into the computers internal hardware and are assigned different levels of priority.

 

When the NIC sends a request to the computer, it uses an interrupt, an electronic

signal sent to the computer’s CPU.  Each device on the computer must have its own unique IRQ line.

 

NIC cards usually use the IRQ of 5 as a default, but it can also use a 3 too.

 

 

Base I/O Port

 

The base I/O port specifies a channel through which information flows between the computer’s

hardware and its CPU.  Each hardware device on the system must have a separate I/O port

number.

 

Base Memory Address

 

The base memory address identifies a location in a computer’s memory (RAM).  The NIC uses

this location as a buffer area to store the incoming and outgoing data frames.

 

 

 

======================================================================

 

netnotes2.html                                                 PAGE 10                                                  2001/09/29

 

 

 

Selecting the Tranceiver

 

The NIC can have other settings that need to be defined during configuration.  Some NIC’s

have internal and external transceivers.

 

 

NIC, Bus, and Cable Compatibility

 

To ensure compatibility between the computer and the network, the NIC must:

 

a)      Fit with the computer’s internal structure (data bus architecture)

b)      Have the right type of cable connector for the cabling

 

NIC cards must have a connection on them to attach to thinnet, thicknet and fiber-optic cabling.

 

 

 

                                              Networking Cards

                                                                                                                                               

                     CARD NAME

           DESCRIPTION

NIC card or NAC

Common, translates parallel data from the computer to serial data

ISA

8-bit 4.77 mhtz, wait states, slows down the sytem

EISA

ISA cards fit in it, 16/32 bit

PCI

Slots white on the mother board (33 mhtz) MacIntosh adapted this standard

AGP

Video port

 

 

Network Performance

 

Because of the effect it has on data transmission, the NIC has a significant effect on the performance

of the entire network.  If the card is slow, data will not pass to and from the network quickly.  This

is why it is important to use a good quality NIC.  On a bus topology, where you have to take your

turn to transmit data,  a slow card can increase the wait times for all the users.

 

 

 

 

 

=======================================================================

 

netnotes2.html                                                 PAGE 11                                                     2001/09/09

 

 

You can speed up the performance of your NIC card with the following enhancements:

 

a)      Direct Memory Access (DMA)  The computer moves the data directly from the NIC’s

         buffer to the computer’s memory, without using the computer’s Microprocessor.

b)      Shared Adapter Memory  The NIC contains RAM that it shares with the computer.  The

         computer identifies this RAM as if it is actually installed in the computer.

c)      Shared system memory  The NIC’s processor selects a section of the computer’s memory

         and uses it to process data.

d)      Bus Mastering The NIC takes temporary control of the computer’s but, bypasses the computer’s

               CPU, and moves data directly to the computer’s system memory.  This will speed up the operation.

               Bus mastering can be expensive, but it can speed up memory by 20 – 70 %.

e)      RAM Buffering Network traffic often travels too fast for most NIC’s to              

  Handle.  RAM chips on the NIC serve as a buffer.  Similar to cashing.

f)     On-board microprocessor The NIC does not need the computer to help

  Process the data.

 

 

Wireless NIC’s

 

Wireless NICs are available that support the major network operating systems. These NIC’s can be used 

to create an all-wireless LAN or to add wireless stations to a cabled LAN (antenna at the back)

 

Remote-Boot PROM’s

 

These are workstations like at GM, in the plant all the dumb terminals.  They were attached to the

Mainframe in Oshawa, but all they had was a screen and a keyboard attached.  This way it is more

secure, there are no floppy drives and CD-ROMS.  This way the users cannot take any of the data

from the site.

 

However, because computers normally start from either a floppy or a hard disk there has to be another

source for the software that initially starts (boots) the computer and connects it to a network.  The NIC

can be equipped with a special chip called a remote-boot PROM (programmable read-only memory)

that contains the hardwired code that starts the computer and connects the user to the network.

 

 

 

 

======================================================================

 

netnotes2.html                                                  PAGE 12                                                 2001/09/29

 

 

 

NIC Summary

 

The Network interface cards (NICs) are computer expansion cards that provide the interface between

the network cabling and the computer.

 

The function of the NIC is to prepare, send and receive, and in a Ring topology retransmit data

on the network.

 

A NIC is installed just like any other expansion card.  You must properly set the IRQ, the base I/O

port address, and the base memory address.

 

In order for a NIC to be physically installed in a computer and connected to the network, it must both

match the computer’s expansion bus type and have the proper connector fittings for the network cabling.

 

 

 

WIRELESS NETWORKING

 

 

The phrase “wireless environment” is misleading because it implies a network completely free of cabling.

 

 

 

Types of Wireless Networks

 

a)      LAN’s

b)      Extended LAN’s

c)      Mobile computing

 

 

LANS

 

LANS  that are wireless have a NIC with a tranceiver installed in each computer.  The users communicate

with the network just as if they were using cabled computers.

 

Access Points is another name for a tranceiver, and it broadcasts and receives signals to and from the

surrounding computers and passes data back and forth between the wireless computers and the cables

network.

 

 

 

 

=====================================================================

 

netnotes2.html                                                PAGE 13                                                  2001/09/29

 

 

 

Wireless Networks use 4 transmission techniques:

 

a)      Infrared Transmission operates by a infrared light beam to carry the data between devices.

  You cannot be near a window or a light source for this type of transmission to work.  There are

  4 kinds of infrared, line-of-sight networks, scatter infrared networks, reflective networks, and

  broadband optical telepoint.

b)      Laser Transmission is similar to infrared technology in that it requires a direct line of sight,

              and any person or thing that breaks the laser beam will block the transmission.

c)      Narrowband (Single-Frequency) Radio Transmission is similar to broadcasting from a radio

              station.

d)      Spread-Spectrum Radio Transmission, uses radio broadcast signals over a range of freq-

        uencies. It picks random frequencies to send data, therefore can be a more secure way to

        transmit data.  Uses encrypting, outdoors can go up to 2 miles, and indoors can go up to

        800 feet.

 

NOTE:  Point-to-Point transmission uses wireless serial data transfer

 

 

Extended LANs

 

A wireless LAN Bridge, for example can connect networks up to 4.8 kilometers (three miles) away.

A wireless bridge is a component that offers an easy way to link buildings without using cable.

 

 

 

Mobile Computing

 

Wireless mobile networks use telephone carriers and public services to transmit and receive signals

using:

 

a)      Packet-radio communication

b)      Cellular networks

c)      Satellite stations

 

Mobile computing incorporates wireless adapters that use cellular-telephone technology to connect

portable computers with the cabled network.  Portable computers use small antennas to communicate

with radio towers in the surrounding area.  Satellites in near-earth orbit pick up lot-powered signals from

portable and mobile networked devices.

 

 

 

========================================================================

 

netnotes2.html                                               PAGE 14                                                         2001/09/29

 

 

Satellite Stations

 

Microwave systems are a good choice for interconnecting buildings in small, short-distance systems such

as those on a campus or in an industrial park.  Microwave transmission is currently the most widely used

long-distance transmission method in the United States.