Skip to main content

Cables

 

Twisted-Pair Cable

1. Twisted-Pair Cables Were Among The Earliest Guided Transmission Media, Along With Coaxial Cables.

2. Today, Twisted Pair Cables Are Used In Many Applications In Networking And Communications, For Example, In Telephone Lines, Digital Subscriber Lines And Local Area Networks.

Benefits Or Advantages Of Twisted Pair Cable

1. It Is The Most Expensive Means Of Delivery For Short Distances.

2. It Is Relatively Easy To Implement And Eliminate.

3. It Can Be Used To Carry Both Analog And Digital Data.

TYPES OF CABLE

1. SHIELD TWISTED-PAIR CABLE. (STP).

2. UNSHIELD TWISTRD-PAIR CABLE. (UTP).

STP CABLE

Shielded Twisted Pair (Stp) Is A Special Kind Of Copper Telephone And Local Area Network (Lan) Wiring Used In Some Business Installations.



UTP CABLE

UTP Cables Are Used As Ethernet Cables And Telephone Wires For Short To Medium Distances To Transfer Data And Audio Signals.


DIFFERENCE BETWEEN STP AND UDP

Diagram View


Details View

STRAIGHT CABLE

Connect Different Devices Together.

A Crossover Cable Is When Both End Of A Cable Are Wired Using The Same Standerd.

Colour Coding :  White Orange , Orange . White Green , Blue . White Blue , Green . White brown , Brown.


CROSSOVER CABLE

Connects The Same Devices Together.

A Crossover Cable Is When Both End Of A Cable Are Wired Using The Two Different Standerds. One Is 568A And Second Is 568B.

Colour Coding : White Green, Green . White Orange , Blue . White Blue , Orange . White Brown , Brown


RJ 45 CONNECTOR TYPES COLOURE CODE

____________

COAXIAL CABLE

Coaxial Cable Supports High-Speed Signal Transmission Over Greater Distances Than Other Cables Such As Twisted Pair Cables.

5 Unique Benefits Of Coaxial Cable

1. Coax Supports Higher Bandwidth Levels.

2. Coax Is Easy To Install.

3. Cox Is Easy To Find.

4. Coax Can Provide Power.

5. It Is Uneven.

Connector Coaxial Cable

Image Coaxial Cable

_____________

Fiber Optics Cable

1. Fiber Optic Internet, Commonly Referred To As Fiber Internet Or Simply "Fiber," Is A Broadband Connection That Can Reach Speeds Of Up To 940 Megabits Per Second With Low Latency.

2. Fiber Optics Is Used For Long-Distance And High-Performance Data Networking. It Is Also Commonly Used In Telecommunication Services, Such As The Internet, Television, And Telephone

3. Better Bandwidth.  Fiber Optic Cables Have Much Higher Bandwidth Than Metallic Cables.

BENIFITS OF HIS CABLE

1. More Bandwidth Means Faster Speeds.

2. Long Transmission Distance.

3. More Flexibility.

4. Better Latency.

5. Strong Security.

____________

DIFFERENCE ALL CABLES


________________

ETHERNET CABLE

ETHENET IS THE MOST COMMONLY USED FOR LAN NETWORK. IT IS USE HIGH SPEED NETWORK CABLE.

IT IS INEXPENSIVE AND RECIEVE DATA. ALL COMPUTERS IN ETHERNET USE SAME CABLE TO SEND RECIEVE DATA.

THEY MUST FOLLOW THE SAME RULES FOR COMMUNICATION.

TYPES OF ETHERNET CABLE

CAT 5

2 PAIR AND INTERNET SPEED IS 100 Mbps. LAYING UPTO 100 MRTER AND BANDWITH IS 100Mhz.
CAT 5e

4 PAIR AND INTERNET SPEED IS 1Gbps. LAYING UPTO 100 METER AND BANDWITH IS 100Mhz.

CAT 6

4 PAIR AND INTERNET SPEED IS 10Gbps. LAYING UPTO 100 METER AND BANDWITH IS 
500Mhz.
CAT 6A

4 PAIR AND INTERNET SPEED IS 10Gbps. LAYING UPTO 100 METER AND BANDWITH IS 
500Mhz.



CAT 8

4 PAIR AND INTERNET SPEED IS 40Gbps. LAYING UPTO 30 METER AND BANDWITH IS 
500Mhz.

RJ11 CABLE

1. COLOUR CODING

WITH ETHERNET CABLE.

2 PAIR USED HIS CONNECTOR (ORANGE AND GREEN).

MAKE HIS CONNECTOR  1st Side Is (Green , White Orange , Orange , White Green) . 2nd Side Is  (White Green , White Orange , Green , Orange).

MAKE THIS CONNECTOR (White Blue , Blue And Green , White Green). 2ND TYPE.


SAME HIS SECOND SIDE OF CABLE.


2. TYPE COLOUR CODING

WHEN YOU HAVE TELEPHONE LINE CABLE YOUR COLOUR CODIND IS RJ 11 CONNECTOR IS.

MAKE A CABLE RJ11 IS (BLACK , RED , GREE , YELLOW).


__________________

ALL CONNECTOR BETWEEN DIFFERENCE


________________


ANOTHER COLOUR CODING FOR ETHERNET CABLE

ONE SIDED

1. WHITE BLUE
2. BLUE
3. WHITE BROWN
4. ORANGE
5. WHITE ORANGE
6. BROWN
7. WHITE GREEN
8. GREEN.

SAME IS SECOND SIDE.

1 AND 2 AND 3 AND 6 PIN USED FOR DATA TRANSFER AND PIN USED ANY COLOUR BUT SAME PAIR.
AND REMAINING PIN 4 AND 5 AND 7 AND 8 IS USED FOR POWER AND PIN USED ANY COLOUR BUT SAME PAIR.

FOR EXAMPLE YOUR RJ45 CONNECTOR MISSING PIN  IS 2,5,8 SO MAKE A NEW RJ 45 CONNECTOR WITH HIS COLOUR CODING .

WHITE GREEN
GREEN 
WHITE BLUE
BROWN
WHITE BROWN
BLUE
WHITE ORANGE
ORANGE 


 

Comments

Popular posts from this blog

DOS AND DDOS ATTACK

A Dos (Denial-Of-Service) Attack and A DDOS (Distributed Denial-Of-Service) Attack Are Both Attempts to Make a Computer System or Network Resource Unavailable to Legitimate Users. However, They Differ in How They Achieve This: Dos Attack: Imagine A Single Person Throwing Rocks at A Castle Gate. A This Person Represents the Attacker, And the Rocks Represent the Malicious Traffic. The Castle Gate Represents the Target System or Network Resource. The Attacker Keeps Throwing Rocks, Trying to Overwhelm the Gate's Defenses and Gain Entry. Dos Attacks Are Typically Launched from A Single System. They Can Be Effective Against Small Systems or Networks, But Larger Systems Can Often Withstand Them. DDos Attack: Imagine An Army Throwing Rocks at A Castle Gate. This Army Represents the Attacker, And the Rocks Represent the Malicious Traffic. The Castle Gate Represents the Target System or Network Resource. The Attackers Coordinate Their Attack, Throwing Rocks from Multiple Directions at Once. ...

Types Of Attack in Network

Common Network Attacks Explained. 1. Overwhelming a Network (DoS/DDoS): Imagine a restaurant that's flooded with too many customers. In a DoS/DDoS attack: A website is overwhelmed with too much traffic. 2. Eavesdropping on Conversations (MitM): Imagine someone listening in on your phone call. In a MitM attack: An attacker listens to your online conversations. 3. Tricking You (Phishing): Imagine receiving a fake email from your bank. In phishing: Attackers try to trick you into giving them your personal information. 4. Finding a Weakness in a Website (SQL Injection): Imagine finding a hole in a fence. In an SQL injection attack: An attacker finds a weakness in a website to steal or change data. 5. Planting a Hidden Camera (XSS): Imagine someone hiding a camera in a party. In an XSS attack: An attacker hides harmful code on a website to spy on you. 6. Guessing Your Password (Password Attck): Imagine trying to guess a friend's password. In a pas...

FLAOT ROUTE + NAT

  TOPOLOGY GO TO ISP-1 ROUTER AND ENTER THIS COMMANDS IN CONFIGURATION TERMINAL MODE . inter f0/0 ip address 202.56.215.1 255.255.255.0 no shutdown exit ip dhcp excluded-address 202.56.215.1 202.56.215.20  ip dhcp pool isp1 network 202.56.215.0 255.255.255.0 default-router 202.56.215.1 exit inter loopback 0  ip address 8.8.8.8 255.0.0.0 no shutdown exit write GO TO ISP- 2 ROUTER AND ENTER THIS COMMANDS IN CONFIGURATION TERMINAL MODE . inter f1/1 ip address 200.200.200.1 255.255.255.0 no shutdown exit ip dhcp excluded-address 200.200.200.1 200.200.200.100  ip dhcp pool isp2 network 200.200.200.0 255.255.255.0 default-router 200.200.200.1 exit inter loopback 0  ip address 8.8.8.8 255.0.0.0 no shutdown exit write GO TO R1 ROUTER AND ENTER THIS COMMANDS IN CONFIGURATION TERMINAL MODE . inter fa0/0 ip address 192.168.100.1 255.255.255.0 no shut exit inter f1/0 ip address dhcp no shutdown inter f1/1 ip address dhcp no shut ip dhcp pool manan network 192.168.100.0 255....