1 / 9

Chapter 4:

Chapter 4:. Cabling. Network Cabling. Travels from one network to another Several types of different cables Commonly used with LANs (Local Area Network). Twisted pair cabling. Comes in two different varieties UTP mostly used in schools STP helps to extend the maximum cable

bary
Download Presentation

Chapter 4:

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 4: Cabling

  2. Network Cabling • Travels from one network to another • Several types of different cables • Commonly used with LANs (Local Area Network)

  3. Twisted pair cabling • Comes in two different varieties • UTP mostly used in schools • STP helps to extend the maximum cable • 3 different configurations • Individually shielded with foil • Foil or braid shield • Shield around individual pair and the entire group of wires

  4. Coaxial Cable • Single copper conductor • Located In the center • Difficult to install • Highly resistant to interference • Can support greater cable length • Thick (thicknet) and thin (thinnet) • Thinnet popular in schools • Thicknet is harder to bend and install

  5. Fiber Optic Cable • Transmits signals over much longer distances • Capable to carry information greater speeds • More difficult to install/modify • Helps strengthen the cables and prevent breakage • Standard for connecting buildings

  6. Wireless LANs Uses high frequency radio signals, infrared signals or lasers to communicate Information relayed between receivers Can take place through cellular telephone technology, microwave transitions or satellite line-of-sight scattered broadcast

  7. Wireless Security • More susceptible to unauthorized use • Use radio waves to communicate • Vulnerable to eves-drop • Unencrypted information can be monitored by a 3rd party • 3 different basic techniques • Encryption • Isolation • Hidden SSID

  8. Advantages • Mobility • Fast Setup • Cost

  9. Disadvantages • Security • Interference • Inconsistent connections • Speed

More Related