Jumat, 16 Desember 2011
Senin, 28 November 2011
Laporan Observasi ISP
Kelompok 8 | LAPORAN SURVEY JARINGAN DI ISP | Kelas |
- Cahya Maulana Yusuf - M. Indra Firmansyah - Rasta Eki Saputra - Rika Yanti | XI Teknik Komputer dan Jaringan B | |
Pemateri | ||
- Bpk. Rudi Haryadi | ||
- Ibu Chandra Dewi Lestari |
I. Pendahuluan
Selaku teknisi tentang komputer dan jaringan kita harus mengerti tentang IP Subnet serta penggunaan IP Subnet pada kehidupan nyata. Jadi kami melakukan observasi mengenai jaringan dan pernggunaan IP.
Dengan hal tersebut maka kami melakukan penelitian ke sebuah ISP tepatnya di Telkom Plasa di Jl.Lembong No.11.
II. Langkah kerja dan Hasil Penelitian
Observasi ini kami lakukan di ruangan HR.
a. Survei jaringan
Jumlah PC Gedung utama : 229 PC (sudah termasuk ruang HR)
Topologi : Star
Luas ruangan HR : 8mx5m
Host : PC
Penghubung : Switch
Perangkat Tambahan : Printer
b. IP Address : Tidak diberi tahu, tetapi menggunakan /24.
III. Kesimpulan
Jadi setelah observasi pada perusahaan yang menyediakan ISP bahwa perusahaan tersebut menggunakan penggunaan IP Subnet yang sangat berguna karena sangat berbahaya sekali jika IP tidak di subnet maka kemungkinan terjadinya pembobolan IP yang dapat sangat merugikan perusahaan.
Subneting
1.
Diketahui : Network awal 192.168.11.0/23
Ditanya : Buat menjadi 16 subnetwork
Jawab :
16=2^n n=4 192.168.11.0/27
32-27=5
Jumlah subnet : 16 subnet
Jumlah host persubnet : 2^5=32host
Range dari ip address 192.168.11.0/27 s/d 192.168.12.254/27
Diketahui : Network awal 192.168.10.14/26
Ditanya : Buat menjadi 7 subnetwork
Jawab :
2^n≥7 n=3 192.168.10.14/29
32-29=3
Jumlah subnet = 7 subnet
Jumlah host persubnet : 2^3=8 host
Range dari ip address 192.168.10.14/29 s/d 192.168.10.68/29
Diketahui : Network awal 192.168.112.0/20
Ditanya : tentukan alokasi subnetwork yang masing-masing terdiri atas 600 host
Jawab :
600+2≤2^n n=10 192.168.10.14/22
32-10=22
Jumlah subnet = 4 subnet
Jumlah host persubnet : 600 host
Range dari ip address 192.168.112.0/22 s/d 192.168.124.92/22
Berikut 4 network yang masing-masing range IP terdiri dari 600 host :
192.168.112.1 - 192.168.114.90
192.168.114.93 - 192.168.116.183
192.168.116.186 - 192.168.116.32
192.168.119.35 - 192.168.121.124
4.
Diketahui : Network awal 100.100.10.10/28
Ditanya : tentukan alokasi subnetwork yang masing-masing terdiri atas 8 host
Jawab :
2^n=8 n=3 100.100.10.10/28
Jumlah subnet = 1 subnet
Jumlah host persubnet = 16 host
Range dari ip address 100.100.10.10/28 s/d 100.100.10.25/28
Senin, 19 September 2011
DCE, DTE, CPE, Topologi Fisik
Data terminal equipment
(February 2008) |
Basically, V.35 is a high-speed serial interface designed to support both higher data rates and connectivity between DTEs (data-terminal equipment) or DCEs (data-communication equipment) over digital lines.
Two different types of devices are assumed on each end of the interconnecting cable for a case of simply adding DTE to the topology (e.g. to a hub, DCE), which also brings a less trivial case of interconnection of devices of the same type: DTE-DTE or DCE-DCE. Such cases need crossover cables, such as for the Ethernet or null modem for RS-232.
A DTE is the functional unit of a data station that serves as a data source or a data sink and provides for the data communication control function to be performed in accordance with the link protocol.
The data terminal equipment may be a single piece of equipment or an interconnected subsystem of multiple pieces of equipment that perform all the required functions necessary to permit users to communicate. A user interacts with the DTE (e.g. through a human-machine interface), or the DTE may be the user.
Usually, the DTE device is the terminal (or a computer emulating a terminal), and the DCE is a modem or another carrier-owned device.
A general rule is that DCE devices provide the clock signal (internal clocking) and the DTE device synchronizes on the provided clock (external clocking). D-sub connectors follow another rule for pin assignment.
- 25 pin DTE devices transmit on pin 2 and receive on pin 3.
- 25 pin DCE devices transmit on pin 3 and receive on pin 2.
- 9 pin DTE devices transmit on pin 3 and receive on pin 2.
- 9 pin DCE devices transmit on pin 2 and receive on pin 3.
Sumber : http://en.wikipedia.org/wiki/Data_terminal_equipment\
Distributed Computing Environment
From Wikipedia, the free encyclopedia
The Distributed Computing Environment (DCE) is a software system developed in the early 1990s by a consortium that included Apollo Computer (later part of Hewlett-Packard), IBM, Digital Equipment Corporation, and others. The DCE supplies a framework and toolkit for developing client/server applications. The framework includes a remote procedure call (RPC) mechanism known as DCE/RPC, a naming (directory) service, a time service, an authentication service and a distributed file system (DFS) known as DCE/DFS. DCE was a big step in direction to standardisation of architectures, which were manufacturer dependent before. Transforming the concept in software for different platforms has been given up after a short period. Similar to the OSI model DCE was not granted success, the underlying concepts however prevailed.History
Open Software Foundation (OSF) came about to a large degree as part of the Unix wars of the 1980s. After Sun Microsystems and AT&T worked together to produce UNIX System V Release 4 (SVR4) and refused to commit to fair and open licensing of Unix source code, many of the other Unix vendors felt their own market opportunities were unduly disadvantaged. The Distributed Computing Environment is a component of the OSF offerings, along with Motif and Distributed Management Environment (DME).As part of the formation of OSF, various members contributed many of their ongoing research projects as well as their commercial products. For example, HP/Apollo contributed its Network Computing Environment (NCS) and CMA Threads products. Siemens Nixdorf contributed its X.500 server and ASN/1 compiler tools. At the time, network computing was quite popular, and many of the companies involved were working on similar RPC-based systems. By integrating security, RPC and other distributed services on a single "official" distributed computing environment, OSF could offer a major advantage over SVR4, allowing any DCE-supporting system (namely OSF/1) to interoperate in a larger network.
The DCE system was, to a large degree, based on independent developments made by each of the partners. DCE/RPC was derived from the Network Computing System (NCS) created at Apollo Computer. The naming service was derived from work done at Digital. DCE/DFS was based on the Andrew File System (AFS) originally developed at Carnegie Mellon University. The authentication system was based on Kerberos, and the authorization system based on Access Control Lists (ACLs). By combining these features, DCE offers a fairly complete C-based system for network computing. Any machine on the network can authenticate its users, gain access to resources, and then call them remotely using a single integrated API.
The rise of the Internet, Java and web services stole much of DCE's mindshare through the mid-to-late 1990s, and competing systems such as CORBA muddied the waters as well.
One of the major uses of DCE today is Microsoft's DCOM and ODBC systems, which use DCE/RPC (in MSRPC) as their network transport layer.
OSF and its projects eventually became part of The Open Group, which released DCE 1.2.2 under a free software license (the LGPL) on 12 January 2005. DCE 1.1 was available much earlier under the OSF BSD license, and resulted in FreeDCE being available since 2000. FreeDCE contains an implementation of DCOM.
Architecture
The largest unit of management in DCE is a cell. The highest privileges within a cell are assigned to a role called cell administrator, normally assigned to the "user" cell_admin. Note that this need not be a real OS-level user. The cell_admin has all privileges over all DCE resources within the cell. Privileges can be awarded to or removed from the following categories : user_obj, group_obj, other_obj, any_other for any given DCE resource. The first three correspond to the owner, group member, and any other DCE principal respectively. The last group contains any non-DCE principal. Multiple cells can be configured to communicate and share resources with each other. All principals from external cells are treated as "foreign" users and privileges can be awarded or removed accordingly. In addition to this, specific users or groups can be assigned privileges on any DCE resource, something which is not possible with the traditional UNIX filesystem, which lacks ACLs.Major components of DCE within every cell are:
- The Security Server that is responsible for authentication
- The Cell Directory Server (CDS) that is the respository of resources and ACLs and
- The Distributed Time Server that provides an accurate clock for proper functioning of the entire cell
While it is possible to implement a distributed file system using the DCE underpinnings by adding filenames to the CDS and defining the appropriate ACLs on them, this is not user-friendly. DCE/DFS is a DCE based application which provides a distributed filesystem on DCE. DCE/DFS can support replicas of a fileset (the DCE/DFS equivalent of a filesystem) on multiple DFS servers - there is one read-write copy and zero or more read only copies. Replication is supported between the read-write and the read-only copies. In addition, DCE/DFS also supports what are called "backup" filesets, which if defined for a fileset are capable of storing a version of the fileset as it was prior to the last replication.
DCE/DFS is believed to be the world's only distributed filesystem that correctly implements the full POSIX filesystem semantics, including byte range locking. DCE/DFS was sufficiently reliable and stable to be utilised by IBM to run the back-end filesystem for the 1996 Olympics web site, seamlessly and automatically distributed and edited worldwide in different timezones.
Sumber: http://en.wikipedia.org/wiki/Distributed_Computing_Environment
Customer-premises equipment
From Wikipedia, the free encyclopedia
Customer-premises equipment or customer-provided equipment (CPE) is any terminal and associated equipment located at a subscriber's premises and connected with a carrier's telecommunication channel(s) at the demarcation point ("demarc"). The demarc is a point established in a building or complex to separate customer equipment from the equipment located in either the distribution infrastructure or central office of the Communications Service Provider.CPE generally refers to devices such as telephones, routers, switches, RGs, set-top boxes, fixed mobile convergence products, home networking adaptors and internet access gateways that enable consumers to access Communications Service Providers' services and distribute them around their house via a LAN (Local Access Network).
Also included are key telephone systems and most private branch exchanges. Excluded from CPE are overvoltage protection equipment and pay telephones.
CPE can refer to both devices purchased by the subscriber and provided by the operator or service provider.
History
The two phrases, "customer-premises equipment" and "customer-provided equipment", reflect the history of this equipment.Under the Bell System monopoly in the United States (post Communications Act of 1934), the Bell System owned the phones, and one could not attach one's own devices to the network, or even attach anything to the phones (a popular saying was "Ma Bell has you by the calls"). Thus phones were property of the Bell System, located on customers' premises – hence, customer-premises equipment. In the U.S. Federal Communications Commission (FCC) proceeding the Second Computer Inquiry, the FCC ruled that telecommunications carriers could no longer bundle CPE with telecommunications service, uncoupling the market power of the telecommunications service monopoly from the CPE market, and creating a competitive CPE market.[1]
With the gradual breakup of the Bell monopoly, starting with Hush-A-Phone v. United States [1956], which allowed some non-Bell owned equipment to be connected to the network (a process called interconnection), equipment on customers' premises became increasingly owned by customers, not the telco. Indeed, one eventually became able to purchase one's own phone – hence, customer-provided equipment.
In the Pay TV industry many operators and service providers offer subscribers a set-top box with which to receive video services, in return for a monthly fee. As offerings have evolved to include multiple services [voice and data] operators have increasingly given consumers the opportunity to rent additional devices like access modems, internet gateways and video extenders that enable them to access multiple services, and distribute them to a range of Consumer Electronics devices around the home.
Technology Evolution
Hybrid devices
The growth of multiple-service operators, offering triple or quad-play services, required the development of hybrid CPE to make it easy for subscribers to access voice, video and data services. The development of this technology was led by Pay TV operators looking for a way to deliver video services via both traditional broadcast and broadband IP networks. Spain’s Telefonica was the first operator to launch a hybrid broadcast and broadband TV service in 2003 with its Imagineo DTT/IPTV offering[2], while Polish satellite operator 'n' was the first to offer its subscribers a [Three-way hybrid]] (or Tri-brid) broadcast and broadband TV service[3], which launched in 2009Set-back Box
The term Set-Back Box is used in the digital TV industry to describe a piece of consumer hardware that enables them to access both linear broadcast and internet-based video content, plus a range of interactive services like Electronic Programme Guides (EPG), Pay Per View (PPV) and Video on Demand (VOD) as well as internet browsing, and view them on a large screen television set. Unlike standard set-top boxes , which sit on top of or below the TV, a set-back box has a smaller form factor to enable it to be mounted to the rear of the display panel flat panel TV, hiding it from view.Home Gateway
A residential gateway is a home networking device used to connect devices in the home to the Internet or other WAN. It is an umbrella term, used to cover multi-function networking appliances used in homes, which may combine a DSL modem or cable modem, a network switch, a consumer-grade router, and a wireless access point. In the past, such functions were provided by separate devices, but in recent years technological convergence has enabled multiple functions to merged into a single device.One of the first home gateway devices to be launched was selected by Telecom Italia to enable the operator to offer triple play services in 2002 . Along with a SIP VoIP handset for making voice calls, it enabled subscribers to access voice, video and data services over a 10MB symmetrical ADSL fiber connection.
Virtual Gateway
The virtual gateway concept enables consumers to access video and data services and distribute them around their homes using software rather than hardware. The first virtual gateway was introduced in 2010 by Advanced Digital Broadcast at the IBC exhibition in Amsterdam[4][5][6]. The ADB Virtual Gateway uses software that resides within the middleware and is based on open standards, including DLNA home networking and the DTCP-IP standard, to ensure that all content, including paid-for encrypted content like Pay TV services, can only be accessed by secure CE devices[7].Broadband
A subscriber unit, or SU is a broadband radio that is installed at a business or residential location to connect to an access point to send/receive high speed data wired or wirelessly. Devices commonly referred to as a subscriber unit include cable modems,, access gateways, home networking adapters and mobile phones.WAN
The terms “customer-premises equipment,” “Customer-provided Equipment,” or “CPE” may also refer to any devices that terminate a WAN circuit, such as an ISDN, E-carrier/T-carrier, DSL, or metro Ethernet. This includes any customer-owned hardware at the customer′s site: routers, firewalls, switches, PBXs, VoIP gateways, sometimes CSU/DSU and modems.Application Areas
- Connected Home
- Pay TV
- Over-The-Top Video services
- Broadband
- IP Telephony
- Fixed Mobile Convergence [FMC]
Other uses
- Cellular carriers may sometimes internally refer to cellular phones a customer has purchased without a subsidy or from a third party as "customer provided equipment."
- It is also notable that the fully qualified domain name and the PTR record of DSL and cable lines connected to a residence will often contain 'cpe'.
Sumber : http://en.wikipedia.org/wiki/Customer-premises_equipment
Topologi fisik jaringan
Topologi fisik jaringan adalah bentuk fisik bagaimana komputer terhubung antara satu dengan lainnya. Jika Anda perhatikan kembali pada gambar 4, Anda dapat membayangkan bagaimana bentuk hubungan antar komputer pada masing-masing ruangan di sekolah.Secara umum ada tiga macam topologi fisik yang sering digunakan dalam LAN, yaitu:
A. Topologi Bus
B. Topologi Ring (Cincin)
C. Topologi Star (Bintang)
A. Topologi Bus
Pada topologi bus biasanya menggunakan kabel koaksial. Seluruh jaringan biasanya merupakan satu saluran kabel yang kedua ujungnya diterminasi dengan alat berupa Terminator.
Topologi ini mempunyai keuntungan dan kerugian sebagai berikut:
Keuntungan
- Hemat kabel
- Layout kabel sederhana
- Mudah dikembangkan
Kerugian
- Deteksi dan isolasi kesalahan sangat kecil
- Kepadatan lalu lintas data
- Bila salah satu client rusak, maka jaringan tidak bisa berfungsi.
- Diperlukan repeater untuk jarak jauh
B. Topologi Ring (Cincin)
Pada topologi ini kabel yang digunakan akan membentuk lingkaran tertutup sehingga mengesankan cincin tanpa ujung. Secara umum layout topologi ring juga relatif sederhana.
Keuntungan
- Hemat kabel
Kerugian
- Peka kesalahan
- Pengembangan jaringan lebih kaku
C. Topologi Star (Bintang)
Pada topologi star setiap node pada jaringan akan berkomunikasi melalui sebuah pusat atau konsentrator. Aliran data setiap node akan menuju konsentrator (HUB) terlebih dahulu sebelum ke node tujuan.
Dengan menggunakan topologi jenis ini maka jaringan mudah dikembangkan dengan menarik kabel ke konsentrator/node pusat.
Keuntungan
- Paling fleksibel
- Pemasangan/perubahan stasiun sangat mudah dan tidak mengganggu bagian jaringan lain
- Kontrol terpusat
- Kemudahan deteksi dan isolasi kesalahan/kerusakan
- Kemudahaan pengelolaan jaringan
Kerugian
- Boros kabel
- Perlu penanganan khusus
- Kontrol terpusat (HUB) jadi elemen kritis
Selain topologi di atas ada beberapa topologi yang ada antara lain topologi mesh dan tree (pohon).
Pada topologi mesh tiap komputer saling terhubung dengan banyaknya komputer yang ada, sedangkan pada Tree tiap komputer terhubung secara bebas ke dalam jaringan.
Sumber : http://prihadipati.blogspot.com/2010/07/topologi-fisik-jaringan.html
Rabu, 03 Agustus 2011
Bounded dan Unbounded Media
Data Transmission
Data transmission is the process of conveying data between two points by way of a communication medium. A wide variety of media are available, but they fall into two classes: bounded and unbounded.
Bounded media confine the data to specific physical pathways. Common examples of bounded media are wire and optical fiber cables. Cable TV uses bounded media.
Unbounded media transmit the data-carrying signal through space, independent of a cable. Broadcast radio and television are examples of unbounded media.
By far the most common media employed for data transmission are defined as bounded -- the data signal is confined in a specific transmission pathway. When practical, cable represents a low-cost and reliable means of transmitting data between computing devices.
Practicality is a relative thing. Certainly cables are likely to be the logical choice within a building or even a building complex. It may not be possible, however, to run a cable between two buildings on different sides of a public road, and it is certainly a major undertaking when the buildings are located on different continents. Such conditions may call for use of unbounded media.
You should be alert to several characteristics when examining cables:
- Resistance to electromagnetic interference (EMI).
- Bandwidth, the range of frequencies that the cable can accommodate. LANs generally carry data rates of 1 to 100 megabits per second and require moderately high bandwidth.
- Attenuation characteristics. Attenuation describes how cables reduce the strength of a signal with distance. Resistance is one factor that contributes to signal attenuation.
- Cost.
NOTE: EMI (ElectroMagnetic Interference) can be a major headache for LAN technicians. Many electrical devices generate magnetic fields that produce unwanted electrical currents in data cables. The noise that results from these currents can degrade data signals, sometimes stopping communication altogether due to excessive error rates. Electrical motors and fluorescent lights are common sources of EMI, and it can be a genuine challenge to cable a network in environments such as factories that contain many electrical devices.
Cables fall into two broad categories -- electrical conductors and fiber optic -- with various types of cables available in each category. Prior to an examination of fiber optic cables, this section examines two types of electrical cables: coaxial and twisted pair.
NOTE: Electrical cable types are frequently referred to as "copper" because that metal is the most frequently used conductor. You may hear fiber optic cables called simply "fiber" or "glass".
This type of cable is called coaxial (or coax for short) because two conductors share a COmmon AXis. A typical coaxial cable has the following components:
- Center conductor. This conductor usually consists of a fairly heavy, solid yet flexible wire; stranded wires can also be used. Solid conductors are preferred for permanent wiring, but stranded conductors make the cable more flexible and easier to connect to equipment.
- Insulation layer. Also called a dielectric layer, this layer provides electrical insulation and keeps the inner and outer conductors in precise coaxial relationship.
- Outer conductor or shield. This layer shields the inner conductor from outside electrical interference. The shield can consist of braided wires, metal foil, or a combination of both. Because of this shield, coax is highly resistant to electromagnetic interference (EMI).
- Jacket or sheath. A durable PVC plastic or Teflon jacket coats the cable to prevent damage.
Coax has many desirable characteristics. It is highly resistant to EMI and can support high bandwidths. Some types of coax have heavy shields and center conductors to enhance these characteristics and to extend the distances that signals can be transmitted reliably.
A wide variety of coax cable is available. You must use cable that exactly matches the requirements of a particular type of network. Coax cables vary in a measurement known as the impedance (measured in a unit called the ohm), which is an indication of the cable's resistance to current flow. The specifications of a given cabling standard indicate the required impedance of the cable.
Here are some common examples of coaxial cables used in LANs, along with their impedances, and the LAN standards with which they are associated:
- RG-8 and RG-11 are 50 ohm coax cables required for thickwire Ethernet. (10Base5 - ThinkNet)
- RG-58 is a smaller 50 ohm coax cable required for use with thinwire Ethernet. (10Base2 - ThinNet)
- RG-59 is a 75 ohm coax cable most familiar when used to wire cable TV (CATV) and is also used to cable broadband Ethernet (10Broad36).
- RG-62 is a 93 ohm cable used for ARCnet. It is also commonly employed to wire terminals in an IBM SNA (minicomputers & mainframes) network.
Some advantages of coaxial cable are as follows:
- Highly insensitive to EMI
- Supports high bandwidths
- Heavier types of coax are sturdy and can withstand harsh environments
- Represents a mature technology that is well understood and consistently applied among vendors
Coax also has some disadvantages including the following:
- Although fairly insensitive to RF, coax remains vulnerable to EMI in harsh conditions such as factories.
- Coax is among the most expensive types of wire cables.
- Coax can be bulky.
This image shows how two conductors are twisted together to form the cable type known as twisted pair (TP/UTP). Cables can be constructed of multiple twisted pairs of cables contained in a common jacket.
The twists in the conductor pairs are an important part of the electrical characteristics of UTP cable. Twists reduce the cable's sensitivity to outside EMI and the degree to which the cables radiate radio frequency signals (RF). Remember that the frequencies at which LANs operate fall into the range of radio signals. If UTP cable is left insufficiently twisted when terminated (end connectors put on), the cable can function as an antenna and radiate significant amounts of radio signals (NEXT) that can interfere with local broadcast reception equipment.
Twisted pair cable used in early networks was most frequently surrounded by a braided shield that served to reduce both EMI sensitivity and radio emissions. An example of this shielded twisted pair (STP) cable is IBM Type 1, Type 6, and Type 9 cable used in Token Ring installations. In the past, shielded twisted pair cable (STP) was required for all high-performance networks such as IBM Token Ring. STP cable, however, is expensive and bulky, and manufacturers of network equipment have devoted extensive research to enabling high-speed networks to work with unshielded twisted pair (UTP).
UTP is the cost leader among network cables. The 10Base-T, 100Base-TX, and Gigabit Ethernet standards define Ethernet configurations that utilizes UTP. Work by IBM and other vendors have developed network equipment that can use UTP even for the higher speed 16 megabit per second Token Ring. In most cases, UTP cable is implemented using telephone-type modular connectors such as the RJ-11 (2 pair) and RJ-45 (4 pair) connectors. Telephone type modular connectors are inexpensive and easy to install, serving to further reduce the cost of UTP cabling systems.
NOTE: UTP looks much like the cable used to wire voice grade telephones. In newer telephone installations, it may indeed be possible to use the wiring installed for the voice grade telephone system as data grade cable in a network. UTP cable comes in a variety of grades, ranging from CAT3 (low quality) to CAT6 (high quality). When investigating the use of UTP cabling, be sure to determine the cable quality required for your network.
When utilizing UTP cable, it is necessary to ensure that all components in the data network are data grade. Voice grade components used in voice telephone systems are not of sufficiently high quality for the bandwidth needed for networking.
Shielded twisted pair cable (STP) types are the standard cables specified for IBM's Token Ring networks and for Apple's LocalTalk.
Unshielded twisted pair cables (UTP) can be utilized for some configurations of Token Ring, Ethernet, and ARCnet networks.
Here are some advantages of twisted pair wiring:
- Telephone cable standards are mature and well established. Materials are plentiful, and a wide variety of cable installers are familiar with the installation requirements.
- It may be possible to use in-place telephone wiring if it is of sufficiently high quality.
- UTP represents the lowest cost cabling. The cost for STP is higher and is comparable to the cost of coaxial cable.
Some disadvantages of twisted pair are as follows:
- STP can be expensive and difficult to work with.
- Compared to fiber optic cable, all UTP cable is more sensitive to EMI.
- UTP especially may be unsuitable for use in high-EMI environments.
- Cable segment lengths are also more limited with UTP.
- UTP cables are regraded as being less suitable for high-speed transmissions than coax or fiber optic. Technology advances, however, are pushing upward the data rates possible with UTP.
Fiber optic cables utilize light waves to transmit data through a thin glass or plastic fiber. The structure of a typical fiber optic cable is shown in the graphic. The parts of the fiber optic cable are as follows:
- The light conductor is a very fine fiber core. Glass is the most common material, allowing signals to be transmitted for several kilometers without being refreshed. Plastic is used in some circumstances, but plastic cables allow only short cable runs.
- The cladding is a glass layer that surrounds the optical fiber core. The optical characteristics of the cladding reflect light back to the core, ensuring that very little of the light signal is lost.
- A sheath or jacket protects the cable from damage. A single sheath can be used to bundle multiple core/cladding fibers into a multi-fiber cable.
The light signals on fiber optic cables are generated either by light emitting diodes (LEDs) or by injection laser diodes (ILDs), which are similar to LEDs but produce laser light. The purity of laser light is desirable, increasing both data rates and transmission distance. Light Signals are received by photodiodes, solid state devices that detect variations in light intensity.
The interface devices required to operate with fiber optic cable are more expensive than those required for copper cable. The higher cost is the result of several factors, including cost of the components and tighter design characteristics because fiber optic cables generally are operated at high data rates. The cost of fiber optic cable installation, however, is trending downward.
Fiber optic cables have many desirable characteristics. Because the fibers are small in diameter, a cable of a given size can contain more fibers than copper wire pairs. Because fiber optic cables use light pulses instead of electrical signals, they offer very high bandwidth. Bandwiths of 100 megabits (million bits per second) are commonplace, and bandwidths in the Gigabit (billion bits per second) and 10 Gigibit (10 billion bits per second) range are available.
Because the signal in a fiber optic cable consists of light pulses, the signal cannot be affected by electromagnetic interference. Nor can the cables radiate radio frequency noise. Optical fibers are, therefore, suitable for use in the noisiest and most sensitive environments. Because these cables radiate no electromagnetic energy, it is impossible to intercept the data signal with electronic eavesdropping equipment. Fiber optic transmissions are extremely secure.
Installation of fiber optic cable requires greater skill than is necessary to install most copper cables. Cables must not be bent too sharply, and connectors must be installed by skilled technicians using special tools. However, new connector technologies have simplified installation and reduced cost.
Here are some advantages of fiber optic cable:
- Very high bandwidth.
- Immunity to EMI; fiber optic cables can be used in environments that make copper wire cables unusable.
- No radio frequency (RF) emissions; signals on fiber optic cables cannot interfere with nearby electronic devices and cannot be detected by conventional electronic eavesdropping techniques.
Summary of Cable Characteristics | ||||
Cable Type | Cable Cost | Installation Cost | EMI Sensitivity | Data Bandwidth |
UTP STP Coax Fiber Optic | Lowest Medium Medium Highest | Lowest Moderate Moderate Highest | Highest Low Low None | Lowest Moderate High Very high |
Langganan:
Postingan (Atom)