Types of cables used to communicate physically through pc to switch to router to ISP
What is the most common type of network cabling?
The most commonly used types of network cable are the twisted pair, coaxial, Ethernet cross over, and fiber optic. The unshielded twisted pair (UTP) cable is used in many Ethernet networks. It has four pairs of wires that are housed inside of the lining of the cable.
RJ45 CONNECTERS USED IN CROSSOVER CABLE
how to build a cross over cable by seeing below image you can make a crossover cable tools used to make it are a crimping tool and a analyzer to check the cable is working from both end
UTP (UNSHIELDED TWISTED PAIR CABLE) STP(SHEILDED TWISTED PAIR CABLE)on left figure you will see staright through wiring scheme and in right cross over wiring scheme HERE YOU CAN COMPARE IN TWO DEVICES WHICH CABLE TO USED IF SAME DEVICES ARE USE CROSS OVER CABLE AND IF DIFFERENT DEVICES USE STRAIGHT THROUGH CABLE BUT IF YOU PLACE WRONG CABLE NO WORRY SWITCH OR ROUTER INTERNALLY MAKE A WRONG CABLE TO ITS USE AND MAKE IT RIGHT.
It doesn’t take much to move all your information in the blink of an eye.
Fibre optic sample cable
There are over 550,000 miles of cable littering the ocean floor, shuttling unfathomable amounts of information across the globe at roughly the speed of light (they’re also used by the government to monitor us, recent reports have revealed). In the U.S. alone, these fiber lines can transfer roughly 20.6 terabits per second, which comes out to about about 27,600,000 emails in the blink of an eye. As it turns out though, this impressive speed doesn’t take very much in terms of wiring.
This photo, posted to imgur, shows that the majority of the actual cable is sheathing, used to protect the wires in the depths, leaving only a few strands to do the legwork of moving mountains of data from continent to continent (one imgur commenter claiming to be a fiber optic technician notes that this may be a sample cable, but calls it “a good example”). I mean, seriously, just look at all these cables!
Each of the past three centuries has been dominated by a single technology.
The eighteenth century was the time of the great mechanical systems accompanying the Industrial Revolution.
• The nineteenth century was the age of the steam engine. • During the twentieth century, the key technology has been information gathering,processing and distribution.
These areas are rapidly converging, and the differences between collecting, transporting,storing and processing information are quickly disappearing. The old model of a single computer serving all of the organisations computationalneeds, is rapidly being replaced by one in which a large number of separate, but interconnectedcomputers do the job. These systems are called computer networks.
Therefore computer network means an interconnected collection of autonomous computer, “If one computer can forcibly start, stop or control another one, the computers are not autonomous”. NEED OF COMPUTER NETWORKS Computer Network satisfy a broad range of purposes and meet various requirements. Need of computer network arises for various purposes, and these are: 1. To provide sharing of resources such as information or processors. 2. To provide inter-process communication among users and processors. 3. To provide distribution of processing functions. 4. To provide centralised control for a geographically distributed system. 5. To provide centralised management and allocation of network resources. 6. To provide compatibility of dissimilar equipment and software. 7. To provide network users with maximum performance at minimum cost. 8. To provide an efficient means of transport large volumes of data among remote locations.
NETWORK MODELS 1. Centralised network model: Here the terminals allows user has to enter data. But the processing is done on the server. It gives the ability to the user to access the data from the remote location. 2. Distributed network model: Here data storage and processing is done on the local computer. Hence the computers used in the distributed network are capable of working as stand alone. But can be network together to increase functionality. In a large network it is not easy to find a path and routes it gets confusing and unmanageable to overcome this issue Routing and Switching come into existance by using its features one can easily manage smaller or bigger network. now comming on point
What Are Routing and Switching?
The way a network operates is to connect computers and peripherals using two pieces of equipment – switches and routers. These two let the devices connected to your network talk with each other as well as talk to other networks. Though they look quite similar, routers and switches perform very different functions in a network:
fig:-switches
Switches are used to connect multiple devices on the same network within a building or campus. For example, a switch can connect your computers, printers and servers, creating a network of shared resources. The switch would serve as a controller, allowing the various devices to share information and talk to each other.
Through information sharing and resource allocation, switches save you money and increase productivity. There are two basic types of switches: managed and unmanaged.
An unmanaged switch works out of the box and does not allow you to make changes. Home-networking equipment often will have unmanaged switches.
A managed switch allows you access to program it. This provides greater flexibility because the switch can be monitored and adjusted locally or remotely to give you control on how traffic travels over the network and who has access to your network.
fig:-routers
Routers are used to tie multiple networks together. For example, you would use a router to connect your networked computers to the Internet and thereby share an Internet connection among many users. The router will act as a dispatcher, choosing the best route for your information to travel so that you receive it quickly. Routers analyze the data being sent over a network, change how it is packaged and send it to another network or over a different type of network. They connect your business to the outside world, protect your information from security threats, and can even decide which computers get priority over others. Depending on your business and your networking plans, you can choose from routers that include different capabilities. These can include functions such as:
Firewall: specialized software that examines incoming data and protects your business network against attacks
Virtual Private Network (VPN): A way to allow remote employees to safely access your network remotely
IP Phone network : Combine your company’s computer and telephone network, using voice and conferencing technology, to simplify and unify your communications.
The common type of IP address (is known as IPv4, for “version 4”). Here’s an example of what an IP address might look like:
192.168.1.10
An IPv4 address consists of four numbers, each of which contains one to three digits, with a single dot (.) separating each number or set of digits. Each of the four numbers can range from 0 to 255.
Thanks to our IP addresses, we’re pretty much guaranteed that our emails will come and go as expected, and that all our Google searches and website visits will work to perfection.
What would happen if we ran out of IP addresses?
Guess what—we did!
Suddenly, major companies (even Microsoft!) were scrambling to buy unused IP addresses from other companies…for millions of dollars.
What went wrong?
The past decade has seen explosive growth in mobile devices including mobile phones, notebook computers, and wireless handheld devices. The format for IPv4 wasn’t designed to handle the sheer number of IP addresses.
Fortunately, there was a backup IP address type waiting in the wings
The IPv6.
it is a 128 bit hexadecimal address
It’s called IPv6 and it offers a maximum number of IP address for today and for the future.
Whereas IPv4 supports a maximum of approximately 4.3 billion unique IP addresses, IPv6 supports, in theory, a maximum number that will never run out.
A theoretical maximum of 340,282,366,920,938,463,463,374,607,431,768,211,456. To be exact. In other words, we will never run out of IP addresses again.
An IPv6 address consists of eight octets or groups of four hexadecimal digits. If a group consists of four zeros, the notation can be shortened using a colon to replace the zeros. Here’s an example IPv6 address:
2001:0db8:85a3:0000:0000:8a2e:0370:6455
MAC ADDRESS (media access control)
it is 48 bit hexadecimal address
Hey Nick. Meet Mac.
Every NIC(network interface card) has a hardware address that’s known as a MAC, for Media Access Control. Where IP addresses are associated with TCP/IP (networking software), MAC addresses are linked to the hardware of network adapters.
A MAC address is given to a network adapter when it is manufactured. It is hardwired or hard-coded onto your computer’s network interface card (NIC) and is unique to it. Something called the ARP (Address Resolution Protocol) translates an IP address into a MAC address. The ARP is like a passport that takes data from an IP address through an actual piece of computer hardware.
Once again, that’s hardware and software working together, IP addresses and MAC addresses working together.
For this reason, the MAC address is sometimes referred to as a networking hardware address, the burned-in address (BIA), or the physical address. Here’s an example of a MAC address for an Ethernet NIC: 00:0a:95:9d:68:16.
As you’ve probably noticed, the MAC address itself doesn’t look anything like an IP address (see yours here). The MAC address is a string of usually six sets of two-digits or characters, separated by colons.
Some well-known manufacturers of network adapters or NICs are Dell, Belkin, Nortel and Cisco. These manufacturers all place a special number sequence (called the Organizationally Unique Identifier or OUI) in the MAC address that identifies them as the manufacturer. The OUI is typically right at the front of the address.
For example, consider a network adapter with the MAC address “00-14-22-01-23-45.” The OUI for the manufacture of this router is the first three octets—”00-14-22.” Here are the OUI for other some well-known manufacturers.
It’s common for the larger manufacturers of networking equipment to have more than one set of OUIs.
ARP (Address Resolution Protocol)
Already we know that importance of IP addressing. In simple terms, it makes addressing
on the Internet uniform. However, having only the IP address of a node is not good enough.
There must be a process for obtaining the physical address of a computer based on its IP
address, in order to be able to finally actually transmit the frame/datagram over the network
to which the node belongs. This process is called address resolution. This is required
because at the hardware level, computers identify each other based on the physical addresses
hard-coded on their Network Interface Cards (NICs). They neither know the relationship
between the IP address prefix and a physical network, nor the relationship between on IP
address suffix and a particular computer.
Networking hardware demands that a datagram contain the physical address of the
intended recipient. It has no clue to the IP addresses. To solve the problem, the Address
Resolution Protocol (ARP) was developed. ARP takes the IP address of a host as input and
gives its corresponding physical address as the output which is shown in Figure 10.13
Any time a host, or a router, needs to find the MAC address of another host or router
on its network, it sends an ARP query packet. The packet includes the physical and IP
addresses of the sender and the IP address of the receiver. Because the sender does not
know the physical address of the receiver, the query is broadcast over the network as shown
in Figure 10.14.
Every host or router on the network receives and processes the ARP query packet, but
only the intended recipient recognizes its IP address and sends back on ARP response
packet. The response packet contains the recipient’s IP and physical addresses.
The packet is unicast directly to the inquirer using the physical address received in the
query packet.
In the Figure 10.14 (a), the System on the left (A) has a packet that needs to be
delivered to another System (B) with IP address 141.23.56.23. System A needs to pass the
packet to its data link layer for the actual delivery, but it does not know the physical address
of the recipient. It uses the services of ARP to send a broadcast request packet to ask for
the physical address of a system with an IP address of 141.23.56.23.
This packet is received by every system on the physical network, but only System B will
answer it, as shown in Figure 10.14 (b). System B sends on ARP reply packet that includes
its physical address. Now System A can send all the packets it has for this destination,usingthe physical address it received.
RARP (Reverse Address Resolution Protocol)
There is one more protocol in the ARP suite of protocols. The Reverse Address
Resolution Protocol (RARP) is used to obtain the IP address of a host based on its
physical address. That is, it performs a job that is exactly opposite to that of the ARP. An
obvious question would be : is this really needed? After all, a host should have the IP address
stored on its hard disk! However, there are situations when this is not the case. Firstly,
a host may not have a hard disk at all (e.g., a diskless workstation). Secondly, when a new host is being connected to a network for the very first time, it does not know its IP address.
Finally, a computer may be discarded and replaced by another computer, but the same
network card could be reused. In all these situations, the computer does not know it own IP address.
RARP works in very similar way to ARP, but in the exactly opposite direction as shown
in Figure 10.15.
In RARP, the host interested in knowing its IP address broadcasts on RARP query
datagram. This datagram contains its physical address. Every other computer on the network
receives the datagram. All the computers except a centralized computer (the server computer)
ignore this datagram. However, the server recognizes this special kind of datagram and
sends the broadcasting computer its IP address. The server contains a list of the physical
addresses and their corresponding IP addresses for all diskless workstations which is shown in Figure 10.16.
In the Figure 10.16 (a), the system on the left (A) has a packet that needs to be
delivered to another System (B) with physical address A46EF45983AB. System A needs to
pass the packet to its data link layer for the actual delivery, but it does not know the IP
address of the recipient. It uses the services of RARP to send a broadcast request packet to
ask for the IP address of a system with the physical address 0FA46EF45983AB.
This packet is received by every system on the physical network, but only System B will
answer it, as shown in Figure 10.16 (b). System B sends an RARP reply packet that include
its IP address. Now System A can send all the packets it has for this destination using the
IP address it received.