Skip to main content

Cables

 

Twisted-Pair Cable

1. Twisted-Pair Cables Were Among The Earliest Guided Transmission Media, Along With Coaxial Cables.

2. Today, Twisted Pair Cables Are Used In Many Applications In Networking And Communications, For Example, In Telephone Lines, Digital Subscriber Lines And Local Area Networks.

Benefits Or Advantages Of Twisted Pair Cable

1. It Is The Most Expensive Means Of Delivery For Short Distances.

2. It Is Relatively Easy To Implement And Eliminate.

3. It Can Be Used To Carry Both Analog And Digital Data.

TYPES OF CABLE

1. SHIELD TWISTED-PAIR CABLE. (STP).

2. UNSHIELD TWISTRD-PAIR CABLE. (UTP).

STP CABLE

Shielded Twisted Pair (Stp) Is A Special Kind Of Copper Telephone And Local Area Network (Lan) Wiring Used In Some Business Installations.



UTP CABLE

UTP Cables Are Used As Ethernet Cables And Telephone Wires For Short To Medium Distances To Transfer Data And Audio Signals.


DIFFERENCE BETWEEN STP AND UDP

Diagram View


Details View

STRAIGHT CABLE

Connect Different Devices Together.

A Crossover Cable Is When Both End Of A Cable Are Wired Using The Same Standerd.

Colour Coding :  White Orange , Orange . White Green , Blue . White Blue , Green . White brown , Brown.


CROSSOVER CABLE

Connects The Same Devices Together.

A Crossover Cable Is When Both End Of A Cable Are Wired Using The Two Different Standerds. One Is 568A And Second Is 568B.

Colour Coding : White Green, Green . White Orange , Blue . White Blue , Orange . White Brown , Brown


RJ 45 CONNECTOR TYPES COLOURE CODE

____________

COAXIAL CABLE

Coaxial Cable Supports High-Speed Signal Transmission Over Greater Distances Than Other Cables Such As Twisted Pair Cables.

5 Unique Benefits Of Coaxial Cable

1. Coax Supports Higher Bandwidth Levels.

2. Coax Is Easy To Install.

3. Cox Is Easy To Find.

4. Coax Can Provide Power.

5. It Is Uneven.

Connector Coaxial Cable

Image Coaxial Cable

_____________

Fiber Optics Cable

1. Fiber Optic Internet, Commonly Referred To As Fiber Internet Or Simply "Fiber," Is A Broadband Connection That Can Reach Speeds Of Up To 940 Megabits Per Second With Low Latency.

2. Fiber Optics Is Used For Long-Distance And High-Performance Data Networking. It Is Also Commonly Used In Telecommunication Services, Such As The Internet, Television, And Telephone

3. Better Bandwidth.  Fiber Optic Cables Have Much Higher Bandwidth Than Metallic Cables.

BENIFITS OF HIS CABLE

1. More Bandwidth Means Faster Speeds.

2. Long Transmission Distance.

3. More Flexibility.

4. Better Latency.

5. Strong Security.

____________

DIFFERENCE ALL CABLES


________________

ETHERNET CABLE

ETHENET IS THE MOST COMMONLY USED FOR LAN NETWORK. IT IS USE HIGH SPEED NETWORK CABLE.

IT IS INEXPENSIVE AND RECIEVE DATA. ALL COMPUTERS IN ETHERNET USE SAME CABLE TO SEND RECIEVE DATA.

THEY MUST FOLLOW THE SAME RULES FOR COMMUNICATION.

TYPES OF ETHERNET CABLE

CAT 5

2 PAIR AND INTERNET SPEED IS 100 Mbps. LAYING UPTO 100 MRTER AND BANDWITH IS 100Mhz.
CAT 5e

4 PAIR AND INTERNET SPEED IS 1Gbps. LAYING UPTO 100 METER AND BANDWITH IS 100Mhz.

CAT 6

4 PAIR AND INTERNET SPEED IS 10Gbps. LAYING UPTO 100 METER AND BANDWITH IS 
500Mhz.
CAT 6A

4 PAIR AND INTERNET SPEED IS 10Gbps. LAYING UPTO 100 METER AND BANDWITH IS 
500Mhz.



CAT 8

4 PAIR AND INTERNET SPEED IS 40Gbps. LAYING UPTO 30 METER AND BANDWITH IS 
500Mhz.

RJ11 CABLE

1. COLOUR CODING

WITH ETHERNET CABLE.

2 PAIR USED HIS CONNECTOR (ORANGE AND GREEN).

MAKE HIS CONNECTOR  1st Side Is (Green , White Orange , Orange , White Green) . 2nd Side Is  (White Green , White Orange , Green , Orange).

MAKE THIS CONNECTOR (White Blue , Blue And Green , White Green). 2ND TYPE.


SAME HIS SECOND SIDE OF CABLE.


2. TYPE COLOUR CODING

WHEN YOU HAVE TELEPHONE LINE CABLE YOUR COLOUR CODIND IS RJ 11 CONNECTOR IS.

MAKE A CABLE RJ11 IS (BLACK , RED , GREE , YELLOW).


__________________

ALL CONNECTOR BETWEEN DIFFERENCE


________________


ANOTHER COLOUR CODING FOR ETHERNET CABLE

ONE SIDED

1. WHITE BLUE
2. BLUE
3. WHITE BROWN
4. ORANGE
5. WHITE ORANGE
6. BROWN
7. WHITE GREEN
8. GREEN.

SAME IS SECOND SIDE.

1 AND 2 AND 3 AND 6 PIN USED FOR DATA TRANSFER AND PIN USED ANY COLOUR BUT SAME PAIR.
AND REMAINING PIN 4 AND 5 AND 7 AND 8 IS USED FOR POWER AND PIN USED ANY COLOUR BUT SAME PAIR.

FOR EXAMPLE YOUR RJ45 CONNECTOR MISSING PIN  IS 2,5,8 SO MAKE A NEW RJ 45 CONNECTOR WITH HIS COLOUR CODING .

WHITE GREEN
GREEN 
WHITE BLUE
BROWN
WHITE BROWN
BLUE
WHITE ORANGE
ORANGE 


 

Comments

Popular posts from this blog

BRIDGE MODE AND NAT MODE AP

  BOTH BRIDGE MODE AND NAT MODE ARE WAYS TO CONFIGURE AN ACCESS POINT (AP) TO EXTEND A NETWORK, BUT THEY DIFFER IN HOW THEY HANDLE IP ADDRESSES AND NETWORK TRAFFIC: BRIDGE MODE: CONCEPT: ACTS AS A TRANSPARENT BRIDGE, SIMPLY RELAYING DATA BETWEEN WIRED AND WIRELESS DEVICES. IP ADDRESS: DEVICES OBTAIN THEIR IP ADDRESSES FROM AN UPSTREAM DHCP SERVER, TYPICALLY THE MAIN ROUTER ON THE NETWORK. NETWORK TRAFFIC: ALL DEVICES, BOTH WIRED AND WIRELESS, ARE SEEN AS PART OF THE SAME NETWORK AND CAN DIRECTLY COMMUNICATE WITH EACH OTHER. BENEFITS: SEAMLESS ROAMING: DEVICES CAN EFFORTLESSLY SWITCH BETWEEN APS WITHOUT LOSING THEIR IP ADDRESS OR CONNECTION. SIMPLIFIED NETWORK MANAGEMENT: ALL DEVICES ARE ON THE SAME SUBNET, MAKING CONFIGURATION AND TROUBLESHOOTING EASIER. INCREASED COMPATIBILITY: WORKS WITH DEVICES THAT DON'T SUPPORT NAT TRAVERSAL (E.G., SOME VPN CLIENTS). DRAWBACKS: LESS SECURITY : ALL DEVICES ARE DIRECTLY EXPOSED TO EACH OTHER, POTENTIALLY INCREAS

DOS AND DDOS ATTACK

A Dos (Denial-Of-Service) Attack and A DDOS (Distributed Denial-Of-Service) Attack Are Both Attempts to Make a Computer System or Network Resource Unavailable to Legitimate Users. However, They Differ in How They Achieve This: Dos Attack: Imagine A Single Person Throwing Rocks at A Castle Gate. A This Person Represents the Attacker, And the Rocks Represent the Malicious Traffic. The Castle Gate Represents the Target System or Network Resource. The Attacker Keeps Throwing Rocks, Trying to Overwhelm the Gate's Defenses and Gain Entry. Dos Attacks Are Typically Launched from A Single System. They Can Be Effective Against Small Systems or Networks, But Larger Systems Can Often Withstand Them. DDos Attack: Imagine An Army Throwing Rocks at A Castle Gate. This Army Represents the Attacker, And the Rocks Represent the Malicious Traffic. The Castle Gate Represents the Target System or Network Resource. The Attackers Coordinate Their Attack, Throwing Rocks from Multiple Directions at Once.

VSC (Virtual Cluster Switching)

  VIRTUAL CLUSTER SWITCHING (VCS): THIS IS A PROPRIETARY NETWORK FABRIC TECHNOLOGY DEVELOPED BY BROCADE, LATER ACQUIRED BY EXTREME NETWORKS. IT ALLOWS MULTIPLE PHYSICAL SWITCHES TO BE COMBINED AND MANAGED AS A SINGLE LOGICAL UNIT, OFFERING SEVERAL BENEFITS: SIMPLIFIED MANAGEMENT: MANAGE THE ENTIRE VCS AS ONE ENTITY, REDUCING CONFIGURATION OVERHEAD AND TROUBLESHOOTING COMPLEXITY. INCREASED PORT DENSITY: COMBINE PORTS FROM MULTIPLE SWITCHES TO CREATE A LARGER POOL OF AVAILABLE CONNECTIONS. IMPROVED PERFORMANCE:   ENHANCE LINK UTILIZATION AND LOAD BALANCING ACROSS MULTIPLE PHYSICAL LINKS, REDUCING BOTTLENECKS. ENHANCED REDUNDANCY:   PROVIDES FAILOVER PROTECTION IN CASE OF A SWITCH FAILURE. TRAFFIC WILL BE AUTOMATICALLY REROUTED TO OTHER SWITCHES WITHIN THE VCS. SIMPLIFIED NETWORK TOPOLOGY: ELIMINATES THE NEED FOR COMPLEX LINK AGGREGATION OR SPANNING TREE PROTOCOL (STP) CONFIGURATIONS. _________ VCS, OR VIRTUAL CLUSTER SWITCHING, CAN OPERATE IN DIFFERENT MODES DEPENDI