SlideShare a Scribd company logo
Bcit Citx1150 Structured Cabling Systems For
Computer Networks Advanced Cabling Systems James
Boulter download
https://ebookbell.com/product/bcit-citx1150-structured-cabling-
systems-for-computer-networks-advanced-cabling-systems-james-
boulter-48671976
Explore and download more ebooks at ebookbell.com
Here are some recommended products that we believe you will be
interested in. You can click the link to download.
Critical Reading And Writing Libs 7001 Course Reader Bcit June 2018
Marian Gracias
https://ebookbell.com/product/critical-reading-and-writing-
libs-7001-course-reader-bcit-june-2018-marian-gracias-55074180
The Vanishing Half Brit Bennett
https://ebookbell.com/product/the-vanishing-half-brit-bennett-46474494
The Vanishing Half Brit Bennett
https://ebookbell.com/product/the-vanishing-half-brit-bennett-47740580
Bit By Bit English For Information And Communications Technology
Doretta Ardu
https://ebookbell.com/product/bit-by-bit-english-for-information-and-
communications-technology-doretta-ardu-48058624
Meet Claudie An American Girl Of 1922 Brit Bennett Laura Freeman
https://ebookbell.com/product/meet-claudie-an-american-girl-
of-1922-brit-bennett-laura-freeman-48687514
Between Never And Forever The Hometown Heartless Brit Benson
https://ebookbell.com/product/between-never-and-forever-the-hometown-
heartless-brit-benson-51020218
Bit Of A Blur Illustrated Alex James
https://ebookbell.com/product/bit-of-a-blur-illustrated-alex-
james-52093110
Bait And Switch How Student Loan Debt Stifles Social Mobility Robert H
Scott
https://ebookbell.com/product/bait-and-switch-how-student-loan-debt-
stifles-social-mobility-robert-h-scott-53602214
Bait Stitch A Knitorious Murder Mystery Book 11 Reagan Davis
https://ebookbell.com/product/bait-stitch-a-knitorious-murder-mystery-
book-11-reagan-davis-54769516
Bcit Citx1150 Structured Cabling Systems For Computer Networks Advanced Cabling Systems James Boulter
Gourse Manual
Computer Systems Service Technician and
Network Administrator Associate Certificate
Programs
STRUCTURED CABLING SYSTEMS FOR COMPUTER
NETWORKS
&
ADVANCED CABLING SYSTEMS
ctTxl 150
November, 2007
Prepared by: James Boulter
Subject to change without notice
CITXI 150 & CSST2150 Revision.doc
AUIIIOR
] I ILE:
lSBlr
VEIIDOR
cl IXr Rollt ltR
CITX II50 STRUCIIJREO C6BLING SYSIt
11t27t2007
Bcit Citx1150 Structured Cabling Systems For Computer Networks Advanced Cabling Systems James Boulter
Section 1
A
C
D
Contents
Rationale for standardization page
B: ISO Open Systems lnterconnect Model
Protocols page
Channel Access Methods page
E: Topologies
F: Addresses
G: lnterfaces
Section 1 Summary page
Section 2 Leqacv Networks
A: Vendor & Function Specific Networks
B: POTS Networks page
C: Wide Area Networks page
D: Legacy Local Area Networks
section 3 Structured Cable System Standards
page
page
pa9e
Summary
A: ISO 11801 (in brief) page
B: TltuElA 5688 569, 606 and 607 in brief
C: TIA/EIA 5688 (CSA T-529B) Document
D: TIA/EIA 5688.3 page
E: Colour Code for 25 Pair Metallic Cables
F: Colour Code for Fiber Optics
5
page 7
10
15
17
23
26
30
Section 2 page
Section 4 TIA/EIA 569, 606 and 607 Documents
Section
page 31
31
33
page 34
36
A: TIA/EIA 569 Summary
B: TIA/EIA 606 Summary page
C: TIA/EIA 607 Summary page
D: Building and Electrical codes
3 Summary page
Section
37
page 38
page 40
55
page 60
page 61
62
CITX1 150 & CSST2150 Revision.doc
4 Summary page
page 64
83
101
page 107
110
-2- 11t27t2007
Section 5
Section 6
A:
B:
Section 7
A:
Section 9
t
A: The Desiln prccess
B: Request For eude
C: Bid Cheddist
D: Silng Forthe Fulrre
E: The Estimate process
F: The Rough ln
G: The Finish page
Section 5 Summary
Cable lnstallation
The Rough ln
The Finish page
Section 6 Summary
UTP
page
page
page
page
page
page
page
page
page
111
112
113
113
114
115
116
117
118
128
130
t
General Considerations page 131
page 133
page 135
page 137
140
page 142
144
page 146
page 150
151
155
page 156
158
page 162
164
page 167
190
B: Terminating Telecommunications Ouilets
C: Terminating B|X-type Hardware
D: Terminating 11O-type Hardware
E: Terminating patch panels page
F: Terminating Grounding & Bonding CableJ
Section 7 Summary page
Section 8
A: Theory of Fiber Optics in Brief
B: Special Handling Considerations
C: Hardware Employed page
Section 8 Summary page
A:
B:
C:
D:
E:
Section
Toner and lnductive Chaser
Linesman Test Set page
Category Testing: Cable scanners
Protocol Analyzers page
Structured Cable System TestJ
9 Summary page
CITX1 '150 & CSST2'150 Revision.doc 3 11t27t2007
Testinq Copper Networks
Section 10: Cable Testinq With the Fluke DSP4000
A: Power Point: Cable Testing
Section l l Troubleshooting
A:
B:
C:
D:
E:
F:
G:
H:
t:
J:
K:
Appendices
A:
B:
C:
D:
Troubleshooting Principles
Audit of the Network
Network Documentation page
Baseline studies of the Network
Protocols and Software page
Log Files page
6 Steps to Troubleshootin page
Troubleshooting Hints page
Network Specific Trouble Shooting
Physical Tests page
The Net Administrator's Too! box
t
page 181
Glossary
Telecommu n ications Outlets
Bibliography page
Sources of lllustrations page
page 195
page 195
196
page 197
198
198
199
200
page 2O2
206
page 217
220
page 233
237
238
page
CITX1150 & CSST2150 Revision.doc 4
I
11t27t2007
Bcit Citx1150 Structured Cabling Systems For Computer Networks Advanced Cabling Systems James Boulter
)
lf we want any two terminals to be able to communicate, regardless of the operating systems
used, the machine language employed orthe media used as the channel between the devices, we either
have to force allthe devices to use the same equipment, language etc., or create a standardized model.
This model could then be used by allthe vendors and software developers as a standard "canvas" on
which future development could be pursued.
Prior to the development of the Structure Cabling System, every type of network had its own
cabling requirements and topology. ln order to change the network topology or to upgrade the system, a
new cable structure had to be installed; a costly project once the building is built. Many older buildings still
have the remains of the previous networks, existing as unused wiring in the ceilings and walls of the
structure.
Many of the components of a commercial building have been standardized for years. The ac
power outlets, plumbing, heating, ventilation and air conditioning, for example, have long been built to an
acceptable standard. How often, for instance, do you need a power outlet and can not find one? Even the
telephone company had a plan to adequately provide phone service to the current and future users of the
office space.
ln the 1970s and 80s, when computing cost went down and business started providing PC to the
employees desk's, the need for a standard local network cabling system became obvious. The need to
access mass storage devices, to communicate between users and to share expensive resources became
a driving force behind the development of the Structured Cable System as we know it today.
One of the earliest Local Area Networks in use for business was the IBM Token Ring network,
which required IBM cabling in a ring topology, special IBM connectors, and, of course, IBM terminals and
network controllers. Aside from difficulties arising from the physical ring required (such as growth and
scalability), the user was restricted to IBM equipment and software only. Although this was good for lBM,
it was not good for the user, or for the other software developers or equipment manufacturers.
Wide Area Networks of the day tended to be point to point or multi-point tree structures. Again
IBM with its' 3270 and System Network Architecture (SNA) networks tended to dominate the business
world, at least in North America. Many companies combined a localtoken ring network, servicing branch
offices, with a Point to Point network, accessing the main frame computer for the company. These
networks tended to be unstable due to traffic patterns, bottlenecks and lack of redundant paths.
All this was before the lnternet existed, and before the home computer market, and the public's
interest in the lnternet, took off.
A number of groups sought to develop a network model which would provide the software
developers, the equipment manufacturers, and the physical medium companies a frame work of standard
processes and interfaces. The ultimate aim was to allow a business to buy one vendor's software, run it
on a second vendor's equipment, which was networked through a third vendor's carrier system.
The earliest example of such as model was developed by the Defence Advanced Research
Projects Agency of the U.S. Department of Defence. Their aim was to create a robust, multi-path network
which could join a number of different computer platforms, using different machine languages, access
methods and speeds, into a resilient network capable of withstanding an armed attack. The lnternet, as
we know it now, is the direct result of the work done by Jon Postell and a multitude of other professional
and amateur developers.
A: Rationale for standardization
l
I
CITX1 150 & CSST2150 Revision.doc 5 1112712007
Unlike much software development today, DARPA used an open-source system of development,
where literally anyone could suggest a method of achieving certain ends in a networking environment.
Software developers could then work on the'idea (if it seemed feasible) and either the ideas would pan
out, and become a standard, or would fall by the wayside. A 4-layer model was used to separate the
various tasks required to set-up, maintain and clear the network connection.
Figure 1-1 The DARPA 4-Layer Model
u
DARPA -Layer Network Model
Layer 4
Host to Host Application Layer
(roughly equal to Layers 7, 6 &5 of
the O.S.l. Model)
Layer 3
Transport Layer
(Roughly equal to Layer 4 of the
O.S.l. Model)
l-ayer 2
lnternetwork Layer
Rorghly equal to Layer 3 of the O.S.l.
Model)
l-ayer 1
Local Network Layer
(Rorghly equal to Layers 1 & 2 of the
O.S.l. Model)
CITX'1150&CSS-.':: =:.::-:cc -6- 1112712007
D
The lnternational Standards Organization (lSO), a branch of the United Nations, has established
a standardized model of communication between computers. lt is loosely based on the DARPA model,
but has 7 layers rather than 4. This permits a greater refinement in the functionality of each layer.
Structured Cable Systems use the OSI model as it has a separate layer for the physical network.
2 Structure and Function
The OSI model has 7 layers, which defines the interfaces between the various functions. This
ensures each layer can communicate with the layer above and below it. ln general each layer in one
computer communicates directly with the equivalent layer in the second computer. For example, when a
session is set up between 2 computers the Session Layer (Layer 5) of each computer communicate with
each other. Some of the functions of each layer are given below.
3 Function
These layers are implemented in different Protocol Stacks and hardware elements to different
levels, with Users talking on the Application Layers at both ends, and routers, gateways, WAN and LAN
components talking on varying layers during the course of the transmission.
An example may be two letter writers, speaking different languages, communicate to each other
only by using a number of interpreters and message handling groups. Each group would have specific
functions such as changing English to Spanish, checking the spelling, signing the document and passing
to the next group. The next group might do verification on the message, and generate an error number for
the message, address an envelope, and then mail it.
4 The O.S.l. Lavers
Layers 1 and 2 are the physical aspects of the OSI Model
a) Phvsical Laver
The Physical Layer is composed of the cables, connectivity hardware and transmission media
and electrical functional and mechanical interfaces. This layer is responsible for the translation the data
from its software, digitalform, into electrical or light pulses to send the message for a long distance.
Active elements of this layer do not "read" any of the data stream, but only amplify or distribute the signal,
and include devices such as repeaters, regenerators, and Hubs.
Layer 1 also deals with connectivity issues such as the physical interfaces between devices, and
is concerned with hardware construction, pin assignments, and level & type of signalling to be used.
Connectors include DBg, DB15 and DB25 fittings, BNC connectors for the various coax cable types used
in LANs, Centronics, Winchester, and DIN type connectors. Terms such as RS232C or V.35 refer to pin
assignments and voltage levels on the various physical interfaces
A whole range of Registered Jack (RJ) types exist, borrowing from telephone connectors and
running on UTP (Unshielded Twisted Pair). RJ11 and RJ12 wired for USOC2 or USOC3 for phones,
RJ31, RJ45, RJ48S, for various LAN implementations. Work area cords, between the PC and the UTP,
are further modified to provide specific services such as T568A, 1OBaseT, MMJ etc. The Physical Layer
interfaces upward with the Media Access Control sub-layer of Data Link Layer. Drawings of the major
outlet configurations are given in the Appendix.
1 Purpose of the O.S.l. Mode!
J
C|TX1150 & CSST2150 Revision.doc 7 1112712007
Layer 7 Application Layer
Application Software (i.e. Excel, CAD),
User application processes
Management functions.
Layer 6 Presentation Layer
User Logon
Network Redlrector,
Encryptron and de-encryption
Data interpretation Including format and code translation
Layer 5 Session Layer
Network security
Virtual sessions
Checkpoints
Administration and control of sessions when multi-tasking
Layer 4 Transport Layer
Enor recognition & recovery
Transparent data transfer
End to End control
Multiplexing & mapping
Layer 3 Network Layer
Fragmentation and re-assembly
Routing and interpretation of network (logical)
Swtching, segmenting, blocking
Flow control
addresses
Layer 2 Data Link Layer
Establish, maintain and release data links
Enor & flow control on the physical medium
Log cal Link Control (LLC)
Med a Access Control (MAC)
Serv ce primitives and handshaking
Layer Physical Layer
Physical link between
HarCware addresses.
Electrical, mechanical
computer and the network
& functional control of data circuits
Figure 1-2 The O.S.l. 7-Layer Model
CITX1 150 & CSST2'1 50 Revlsion,doc - 8 - 11t2712007
u
The Data Link Layer serves two major functions, and can be divided into two sub layers, the
Media Access Control (MAC) sub-layer, and the Logical Link Control (LLC) sub-layer.
The MAC sub-layer is required to convert the software data stream from the upper layers in the
work station into an acceptable form for the network in use. This includes packaging the information into
an acceptable protocol frame, such as Ethernet (1EEE802.3) or Token Ring (1EEE802.5), and the creation
of an error-detection value such as the Frame Check Sequence (FCS). The FCS is transmitted along with
the frame, to provide a method by which the receiving device can verify the received message was error-
free.
The LLC sub-layer functions include addressing the frame to the correct hardware on the
network. The MAC address, as used in Ethernet networks, is a unique 48 bit address which is burnt into
the Network lnterface Card (NlC). The LLC is also responsible for maintaining the Link, the connection
between the two devices. The LLC can do this by the transfer of positive acknowledgements (ACK),
which may mean "your message received correctly", or negative acknowledgements (NAK), "your
message received in errored condition".
The LLC and MAC sub-layers have 4 control paths between them, called the Service Primitives,
which operate in similar fashion to the modem handshake process. Both these sub-layers reside on the
NIC board in every addressable piece of equipment on the network. Other Layer 2 equipment includes
Layer 2 Switches, Multiple Service Access Units (MSAU) for Token networks, Wireless LAN transceivers,
and Optical/Electrical converters for fiber optic media networks
Layer 2 interfaces downward to the Physical Layer, the actual network cable or transmission
media, and upward to the computer via the Network Layer.
Layers 3 thru 5 are (loosely)the Network Operating System Layers
c)Network Laver
The first layer in computer RAM, this layer is responsible for translating logical addresses (user or
computer name or the lP address) to the physical 48 bit MAC address by using "look up tables". lt also
determines the routing path the data is to use and any fragmentation, bundling or re-assemble the data
requires. Fragmentation is the process of breaklng a large amount of data; say a graphics file, into
smaller packets for transmission on the network. Bundling refers to the grouping of multiple packets into a
coherent form and in order.
d) Transport Laver
The 4th Layer is responsible for error recognition and recovery of the received data. lf the data
was received with errors it is recognized here, and a recovery (retransmission of the same information)
may be requested. An example of a protocol using this mechanism is Transmission Control Protocol
(TCP). On the other hand, the information may not be important, and this layer could dump the message
without advising the source. User Datagram Protocol (UDP) uses this mechanism.
e) Session Laver
This layer is responsible for name recognition, Network security and check point placing, and
session establishment of a virtual connection. Name recognition is yet another address, this time the
lnternet address, which gives the Domain of the LAN, etc. The three addresses a single work station may
have include the user name (e.9. WWW.Microsoft.Com), the lnternet Address (e.9.213.127.89.70) and
the NIC address (e.9.4D.23.A1.76.83.14). Network security is provided during the session setup, by the
exchange of passwords and other encrypted mechanisms
b) Data Link Laver
CITXI 150 & CSST2150 Revision.doc I 1112712007
Checkpoint placing is the process of allowing executable portions of applications to start working
before the whole application is loaded. E.9., the Windows 95 logo "Starting Win 95" comes up long before
the full application is loaded. As the load proceeds, other parts of the application may start working. The
sending computer "places" these checkpoints, and the receiving computer reads them, and runs the
executable portions.
The Session Layer is also responsible for multitasking. Through the use of Source and
Destination Port "well-known" port numbers, this layer can establish multiple sessions at the same time.
An example could be running a Web-Browser and E-mail service while on the lnternet. Any new e-mail
messages could be received (or sent) while still keeping access to a particular web-page for reading.
Layers 6 & 7 are in the Local Operating System
f) Presentation Laver
The 6th Layer is responsible for Logon Security, data encryption, transmission coding, and
redirection. Logon security provides access to the local computer functions, but is not related to network
security. Encryption is the coding of data for transmission, which provides a certain level of security on
the network as the user messages will not be sent in plain English. The Transmission code used may be
either one of the ASCII codes, or EBCDIC coding. The transmission code determines the value of the bits
used in a byte to represent letters, characters and control codes. The redirector is a part of the Network
Operating System which determines if the users command requires network resources or local resources.
This layer gets it's name from it's function, which is to present the operating system to the user,
which may take the form of a command line interface (such as DOS or Linux) or a graphic user interface
(a GUl, such as Microsoft's Windows).
g)Application Laver
The 7th Layer is the application seen on the screen, and includes games, word processors,
spread sheets, graphics applications, etc. This layer is the direct interface upward with the user, and
downward to the Presentation Layer.
1) Rules for communication
A protocol is simply an accepted way of conducting an exchange of messages, which may or may
not include user data. An easily understood example is the way Canada Postal Service (figure 1-3)wants
us to address our letters. The address in the centre of the envelope is regarded as the Destination
Address, and must include the postal code number, a city name, the street address and the recipient's
name. A similar set of address data is placed in the upper left hand corner of the envelope, representing
the source address. Lastly a message validation, the stamp in our example, must be stuck to the upper
right hand corner. Without allthese things, in their correct location, the mail will not go through.
What if you are sending a cheque to pay a bill? There are firm protocols regarding writing a
cheque. You write the payee's name on one line, and write your signature on another line. You write out
the amount of the cheque, both in words a,nd in numbers, and a valid date. Further, the cheque has to
have your name and address, the name of the bank it is written on, and your bank account number. To
ensure the money is applied to your account most of also include the return stub for the bill. All of these
protocols have to be completed correctly in order for the goal, which is making your bill payment, is
successful.
Another example from everyday life is the protocol you use to greet your boss or your spouse.
Do you shake hands with the boss and hug our spouse, or is it the other way around? What if the boss is
the spouse? The correct protocol in this case could vary with conditions...are you at home or at work?
(
t
I
CITXl 150 & CSST2150 Revision.doc - 10 - 11127t2007
ln telecommunications, protocols are used to request diagnostics, send files, and cut steel. Long
messages can be fragmented, encoded, scrambled, all before it leaves the clients office. Once this data
string gets to the far end, the reverse process has to happen, in the same manner and order as the
process occurred. Protocols have been developed to govern exchanges of all manners, and at different
Layers with the OSI Model. Any one message, even "Good Morning" has to be packetized and
depacketized, framed and sequenced, dissembled and reassembled under the same protocol rules.
Otherwise the communication becomes chaos.
The Adams Family
'1313 Mockingbird Lane
A group of protocols maybe visualized as a stack of building blocks of various sizes and shapes,
each one performing the functions required by the O.S.l. Layer they operate on, joining the one below
and the one above in a smooth transaction. Further, these protocol suites and their various component
protocols can be placed within the OSI Modellayers as shown in Figure 1-4on the next page.
2) Protocol Enforcement
A protocol is enforced on the network by the use of various Fields of information, with each field
having a well defined location within the Protocol Header. For any particular protocol, the type of
informatlon in each field is known by both the source and destination equipment. A field may be of a fixed
length (many are 8 bits or multiples of 8 bits in length), or it may be of variable length, such as a data
field.
ln the Canada Post protocol illustration, the envelope could be considered the Header, and the
three groups of information would then be the Fields. The source and destination address fields are of
variable length and makeup, while the validation field (the stamp) has a defined length. Try sending a
letter with too short a stamp field (that is, a stamp of too small a value) and the letter gets returned.
Figure 1- 3 Envelope Protocol for Canada Posta! Service
CITX1 150 & CSST2150 Revision.doc - 11 11t27t2007
Samole TCP/IP Suite built on an Ethernet
Notes:
1)Request For Comments (RFCr .L'r 3e= ^c caied are current standard numbers
2) Well-knownportaddressincludeT'a=; T;ci Control (Ctrl),Client(Cl),Server(Svr),andMessage(Msg) portnumbers.
3) Location of the Protocols in tre a:c,e S'. :e o agram does not implytheir locations in any particular implementation of a
Protocol Stack.
7
Application
Layer
6
Presentation
Layer
File Transfer
Protocol
FTP
RFC 959
fIc 20 Clt121
Simple Mail
Transfer
Protocol
SMTP
RFC 821
TELNET
Protocol
RFC 854
Dynamic
Configuration
Protocol
DHCP
RFC ??
Cl 68 Svr 67
Domain Name
System
DNS
RFC 1035
Simple Network
Management Protocol
SNMP
RFC 1157
Msg 161 Traps 162
User Datagram Protocol
UDP
RFC 768
Transmission Control Protocol
TCP
RFC 793
lnternet Protocol
IP
RFC 791
lnternet Control
Message
Protocol
ICMP RFC 792
Address
Resolution
ARP RFC 826
RARP RFC 903
Token Passing
tEEE 802 5
Figure 1- 4 Partial TCP/IP Suite with RFC Numbers
CITX1'150 & CSST2'153 Re, s 3^ :cc 12- 11t27t2007
When a message is meant for Network delivery, the user message must pass through the various
layers of the source protocol stack so that the final data stream placed on the Physical Layer can be read,
accepted and passed up the destination's protocol stack for ultimate presentation to the destination user.
As the message goes down the stack in the source equipment, each protocol used will add a
header to the data, until Layer 2, which typically will add a header and a trailer. This process is called
encapsulation, and the reverse process has to be performed by the destination equipment. There the
destination's Layer 2 protocol reads the source's Layer 2 header and trailer, the destination's Layer 3
protocol reads the source's Layer 3 header, and so on. Each source Layer communicates its
requirements to the equivalent destination Layer. The destination Layer then performs the function
requested, such as "pass this message to your Web Browser" or "advise user of Ping status". Of course
these messages are not in plain English, but are expressed as a bit code within some field of the header.
The specific information in each Header is determined by the requirements of the protocol in use,
and the requirements of the O.S.l. Layer the particular protocol is operating on. Figure 1-5 shows an IEEE
802.3 (Ethernet) frame with 6 fields, such as addressing, length of the data being sent, and an error-
checking number. Ethernet is a Layer 2 protocol commonly used in Local Area Networks (LANs), having
a number of "flavours" including 10-Base-2, 1O-Base-S, 10-Base-T, 10O-Base-T and Gigabit networks.
The upper layer data section may be anywhere from 46 to 1500 octets long, and contains the headers for
the upper layer protocols and eventually the actual information being sent. Figure 1-6 shows the location
of the Ethernet header in relation to the complete serial string of data in the full frame.
7 0ct 1 oct 6 oct 6 oct 2 oct 46 to 1500 Oct 4 oct
I r-"y", 2 ---->llayer3 ---l l"y"r4-l Layers 5, o & 7
Destination
Address
Figure 1-5 Ethernet Header Construction used in Figure 1-6
Figure 1-6 The Encapsulated Frame Structure used in Figure 1-7
4) TGP/|Pv4/1EE802.3 Protocol Stack
As an example of the way a number of protocols are used in the same message, let us look at a
typical LAN implementation, using Ethernet (IEEE 802.3) on the Layer 2, TCP/IP as Layer 3 and 4
protocols, and File Transfer Protocol (FTP) as the upper layer (5, 6 and 7) protocol in use. This particular
implementation owes its structure to the DARPA model, with FTP functioning on the Host-to-Host
Application Layer (DARPA Layer 4, OSI Layers 7, 6 and 5). Figure 1-6 shows the encapsulated frame
structure used by the protocol stacks shown in Figure 1-7.
t
Layer 3 up
headers and data
CITXI 150 & CSST2150 Revision.doc
Frame Check
Sequence
User Data (Request for file)
- 13 - 11127 t2007
FTP is a sample of a ClienUServer relationship. The Client requests a service, in this case
delivery of some file, which resides on a FTP Server computer. The operation requires 3 basic operations, t
namely the call set-up process, where the Client contacts the Server to set up a FTP session, a request
for the transfer of a specific file, and the call clearing process.
The frame of information placed on the physical UTP network will consist of 4 headers, one for
each protocol used in the stack. The Headers will perform the necessary functions of each Layer to
ensure communication. For example, the Ethernet Header will contain the source and destination MAC
addresses and the FCS (as a Trailer), the lP Header will contain the Logical (lP) address, the TCP
Header will ensure error-free delivery to the Session Port address, and FTP Headers will establish
confirm the Source may access the Server, the file the Server has to look for, and other ClienVServer
functions required.
Sample Protocol Stack Using FTP. TGP/lP and Ethernet
To other stations
on UTP LAN
To other stations
on UTP LAN
File Transfer Protocol
Server
FTP
Traffic Control
Port 20 Porl21
File Transfer Protocol
Client
FTP
Transmission Control
Protocol
TCP
Transmission Control
Protocol
TCP
lnternet Protocol
IP
lnternet Protocol
IP
IEEE 802.3 Protocol
Ethernet on UTP
IEEE 802.3 Protocol
Ethernet on UTP
100 BaseT LAN
Figure 1-7 An lmplementation of TCP/IP on Ethernet
C|TX1150 & CSST2150 Revtsion doc - 14 - 11t2712007
Layers
7,6&5
Layers
7,6&5
Traffic
Port 2345
Layer 4 layet 4
Layer Layer I
Layer 2 Layer 2
Layer 1
100 BaseT LAN
laye( 1
D: Channel Access Methods
A Channel can best be understood as the path used to connect together the source and
destination terminal equipment. lt is the physical path which joins two active devices in a network. An
example would be a T.V. channel, where the desired show can be selected by choosing the correct
channel, at the correct time. ln this example, the Channel supports many shows during the course of the
day and the week, but only one show is on each Channel at any particular time. A T.V. show maybe sard
to a Baseband signal, because each show gets the full bandwidth of the Channel while it is on. The
Channel may also be described as a Time-Division Multiplexed channel, as each show has a specific
time slot it may use, such as 7 to 8 PM on Friday nights.
ln this example, the Channel could consist of the T.V. studio, an on-air radio transmitter, the
receiver at a cablevision office, the translation equipment in the cable vision office which puts the signal
onto the coaxial cable, which then provides cable T.V. service to its customers T.V. receiver. ln this
example a number of Links (e.9. the coaxial link between the cable company and the home, or the on-air
link) are used to form one Channel. A simpler example is the Channel between two people talking on the
telephone. Here the links would be the subscriber's loop, trunks between the telephone switches, and
possibly fiber optic undenrvater links for calls to other continents. The Channel would be all the links
required to connect the two telephone sets together.
A Channel may also be formed from a Broadband path. ln this case the path may divided into two
by Frequency Division Multiplexing. Returning to the T.V. example above, the various government
agencies have assigned a particular band of frequencies to the broadcast of T.V. signals. ln the case of
Channels 2 to 6 they occupy the radio spectrum from 54 Mega-Hertz to 88 MHZ. This 34 MHz band is
subdivided into 5 Channels of 6 MHz each, allowing 6 different shows to be broadcast simultaneously.
Another example of Broad-banding a path is ADSL on a telephone loop. The loop can carry up to
1 MHz of bandwidth, but only 3 kHz are required to transmit the voice signal on a phone. The frequencies
above this level may be used for a high speed digital signal, permitting both an internet connection and a
telephone conversation simultaneously. Each signal occupies its designated frequency bandwidth, and
does not use any of the other signal's frequencies.
ln general, most Local Area Networks provide a single Channel, which has to be shared amongst
all the users on the LAN. Most often this takes the form of a Baseband signal, with Time Division sharing
of the Channel. ln order to gain access to the Channel for transmitting a message, a number of Channel
Access protocols have been developed. The most common types are Contention Access, Poll and Select
Access and Token Passing Access.
2) Contention: CSMAJCD
The basic concept of contention access is that the first station to gain access to the channel gets
the Channel, provided no other station is already using the channel. The most common implementation of
this is on Ethernet networks, where contention is enforced by using Carrier Sense, Multiple Access/
Collision Detection. This access method is often used on Bus topology, where allthe work stations are
required to share a common physical path to communicate.
The contention part comes in the Carrier Sense process. Say Station A wants to gain access to
the channel, itfirst has to "listen" on the channelto determine if any station is currently using the channel.
lf the channel is already in use, the Station A will hold its transmission, but continue to listen. Once the
previous message is sent, the Station A waits a short time (the "inter-frame time") and then starts sending
its'message. Forthe duration of the message, which in IEEE 802.3 is a maximum of 1526 octets, Station
A has sole use of the full bandwidth of the channel, a 100 MHz on Category 5e cables. At the end its
message (or the maximum size frame), the Station A stops transmitting, and another station can then
access the channel.
1) Definition of the Channel
CITX1 150 & CSST2150 Revision.doc - 15 - 11t27t2007
The second part of CSMAJCD is the multiple access characteristic of the protocol. All work
stations have equal access to the channel; there are no priority stations or privileged stations which can
preferentially access the channel.
The third concept embedded in CSMfuCD is the process to be performed when a collision is
detected. ln Ethernet, collisions are to be expected; there is no way to prevent two (or more) stations from
trying to grab the quiet channel. The object is to ensure that the network can be restored to orderly
operation when a collision does occur. This process starts when both colliding stations put out a jabber
signal, which all listening stations will receive as a "collision detection" signal. The stations waiting for
access to the channel will then delay trying to access the network for a random amount of time. The
station with the shortest random time then accesses the channel and sends its message.
3) Poll and Select
The Poll and Select method of gaining access to the channel requires a single Host or "master"
station which controls all the communication on the network. The Tributaries or "drop" terminals can not
initiate a call, but must be permitted to send or receive traffic. This style of access is often implemented
on tree-topology.
The Host performs a regular "Poll", which is similar to a roll call of all the drops, which ensures
that the tributaries are active and capable of receiving or sending traffic. When a Tributary has to send a
message, the Tributary will respond to its poll with a request to send traffic. The Host will permit the
message to be sent, and either accept the message (if it is for the Host) or will buffer it for retransmlssion
to another Tributary. lf the message is for another Tributary, the Host will "Select" the Tributary and
forward the message on to the destination.
Although common in Wide Area Networks, this form of Channel Access is not common in Local
Area Networks except for the IEEE 802.4 Manufacturer's Automation Protocol, which is used to operate
assembly line robotics. Poll and Select is most often implemented on networks with a Tree Topology.
4) Token Passinq
The last form of channel access common in Local Area Networks is Token Access. Here an "ldle"
token is passed from station to station in a predetermined order. lf a station has traffic to go, it will remove
the idle token, and send out a "Data" token. complete with the information to be sent. Each station in turn
will receive the data token, and pass the token onward if is not for that particular station. When the data
token reaches its destination, that station will pass the message up its protocol stack. lt will also
exchange the source and destination addresses in the data token, and mark the token as "Read". The
read token then gets passed along to the remaining stations, eventually reaching the originator of the
message. This station accepts the message. recognizes the read token as being a copy of its original
message, thereby confirmlng receipt of the message at the target station.
Token passing networks are often implemented on Ring topology, but are also possible on a bus
ortreetopology. Token Passing networks tend to be more secure, and are popularwith banks and other
organizations concerned with security An added feature of Token passing is that selected work stations
can be prioritized, and capable of forc ng their messages to be sent ahead of another, lower priority
station.
CITXI'150 & CSST2'1 5i Re , s 31 ooc -16- 11t27t2007
t
The topology of a network refers to the shape formed by the channels and the physical
equipment, and takes two forms. The physical topology is defined by the physical relationship of the work
stations and the physical media, whereas the logical topology is defined by the operational shape of the
network. lt is common to find the physicaland logicaltopologies are different. See Figures 1-8 and 1-9
1) Phvsical or Loqical shape of the network
#:r .CSMAICDoperation
DroDs*rG by a GOmmOn but.
.Collirion Detection
,, bus bpology
.Carrier $enee
.Multiple Access
Figure 1-8 Ethernet on a Physical and Logical Bus
.Physical medium,
oo.axlal cable
.Physical and logical
.AIl nodes "home rull" to hub
.Physical star topology,
logica! bus topology
.Recommended topology
for structured cabling systems.
.Conversion from star to bus
CITXI 150 & CSST2150 Revision.doc
Figure 1-9 Ethernet as a Physical Star and Logica! Bus
at the hublconcentrator.
.Commonly wired with UTP
17- 1112712007
The Structured Cabling System defined by national and international standards states that the
preferred physicaltopology is a Star, with the physical media connecting the various networked devices
by cables which all home in on a common location. These "Home Run" cables are then cross connected
to active centralized equipment which then provides the logical or operational shape of the network.
ln older legacy type networks, the physical cabling had to support the physical and logical
topologies of the network desired, but this meant that the cable structure had to be removed and replaced
whenever the user wanted to change or upgrade the network. Many older buildings still have the obsolete
cabling in place for the three or four networks which had been used previously.
With the advent of a Structured Cable standard, the stake-holders in network, that is the cable
manufacturers, the software developers and the computer hardware developers now have an established
physical standard which they can aim their future developments towards.
2) Peers. Host (Master). Tributaries
The type of workstations in the network will largely determine the logical topology of the network.
Peers all have equal access to the network, which they share with other peers. Notice that this is a
different use for the term peer than in the "peer to peer" network. With this definition of the term, even
ClienUServer pairs on an Ethernet network are really peers, in that the server and client have to share the
single bus channel with all the other stations on the LAN.
A master Host station does not have any peers. Only the Host can initiate or fonruard traffic. ln this
type of logicaltopology, the remaining work stations are called Tributaries (or slaves). Channel access is
assigned by the Host during the polling process, which is when the Tributary polled may send traffic. The
Host then will select the destination workstation for the traffic, and forwards the traffic to that station.
Do not confuse Masterffributary relationships with ClienVServers. Clients on a LAN are capable
of communicating with each other, without the need for a server and whenever they want, provided the
transmitting station has access (CSMAJCD or Token passing)to the Channel. ln a Masterffributary
relation, only the Master can initiate communication, using the Poll/Select access process, and total
controlof the communication Channels is held by the Master Station on the network.
3) Point-to-Point Topoloqv
The simplest network topology involves two stations connected together in a physical point to
point circuit. The loglcal shape may take the form of a peer-to-peer, where either station may initiate a
data transfer, or a Host/Tributary operation, where only one end can initiate the transfer. The actual data
transfer can proceed in either direction in this case, but has to be initiated by the Host.
A typical example would be a dial-up modem for lnternet access. The computer at home operates
as the Host, dialling out to the Internet Service Provrder, establishing the connection, etc. The server at
the ISP responds to requests from the Host, providing an lP address if Dynamic Host Configuration
Protocol (DHCP) is used, and send ng request for web sites to the lnternet.
Although point to point netvrorks seem to be a trivial example, most LANS use a point to point
network to access the Wide Area Networks using bridges, routers, optical/electrical links, Asynchronous
Transfer Mode equipment or SONET
ln Figure 1-10 below Al and Bob have a point-to-pointrelationship. Provided the channel isfull
duplex, Al and Bob may each transmit and receive signals simultaneously. The actual channel in this
case may be as simple as ar Ethernet cross-over cable between the two NlCs on the stations, or as
complex as the Publ c Svr tched Telephone Network, with all its multiple switches, trunks etc. The main
characteristic is that onc€ ine ctannel is set up (say on the PSTN) only the two work stations are active
on the channel.
CITX1 150 & CSST2' 5l Re, s cn doc 18 - 11t27 t2007
ln a multi-point network, a single Host (Master)work station broadcasts its Poll and Selection
sequences to all active Tributaries. Each tributary will respond when it is polled, something like roll-call in
school. And like public school, the tributaries (the students) are not allowed to speak (that is send traffic)
unless permitted to by the Host (teacher). See figure 1-1 1 .
The analog with a classroom breaks down here, because even if AI wants to talk to Bob, Al's
traffic must first go the Host, then get redirected with a Select sequence to Bob. Bob can not respond
directly to Al's message, but is also required to transmit to the Host for redirection.
An example of this type of logical topology would be an airline reservation system. When Charlie
a travel agent, has a ticket to buy, his work station has to wait until it is polled, when the request is sent to
the Host. The Host would check the order, reserved the seat in its database, and then confirm the ticket
purchase by selecting Charlie's workstation and sending back the confirmation number. The Host could
also perform the poll/select process with a back-up host to ensure the main host has mirrored data in the
back-up host.
Figure 1-10 Point to Point Network
4) Multi-Point Topoloqv
A physical bus topology is one where all the stations share a common channel. Unlike the Multi-
point network above, there is no controlling Master, but any station on the bus can initiate a call at any
time, provided certain channel access rules are followed. Ethernet (1EEE802.3 and Ethernet 2) is the
classic bus network, and the channel access method is CSMAJCD. 1OBase2 (Thin-net or Cheaper-net)
and 1OBase5 (Thick-net)are logically and physically a bus, where the media used (50 ohm coaxial cable)
was used to link all the stations together. This physical topology was not easily scaled upward, and
adding a drop between two existing stations often required new cabling. See Figure 1-12
Figure 1-11 Multi-point Network
5) Bus Topoloqv
Cl'X''53 & CSST2'53 Re','s cr doc -19- 11t27 t2007
ln Structured Cable Systems, the physical topology is Star wiring, with every station wired to a
common location (the Telecommunications Room), where the logical bus operation is provided by an
Ethernet Hub or a Layer 2 Switch. These Ethernets stilloperate as buses, but a physically wired as stars.
The hub takes an incoming signal from one port, regenerates it, and sends it out to all the other ports. A
Layer 2 switch reads the Media Access Control (MAC) address on incoming messages, and only foruvards
the message to the port which has the required destination address attached to it. See Figure 1-16.
The majority of Local Area Networks today are Ethernets, and many are still operated as physical
buses, although new constructions are usually wired as stars. A physical bus network may also be
operated as a Token Bus (using Token passing access), or a Tree or Multi-point network using
Master/Tributary channel access.
Figure 1-12 Bus Topology
6) Rinq Topoloqv
Ring topologies where once very popular as Local Area Networks, especially with banks and
other businesses where secunty is very rmportant. Rings were originally designed by lBM, to operate on
Shielded Twisted Pair (STP ) cables which had only 2 pairs of conductors, or Twin-axial cables, which
contained 2 coaxial cables as a receive/transmit pair
ln the Ring, the message is passed from station to station, in a circular pattern. Each station in
turn reads the message, anC passes the message on if the message is not for that particular station.
Once the message reaches iire :arget station, the message is passed up the receiving station's protocol.
A duplicate "Read" message ls iren placed on the ring, targeting the original transmitter. When the
originaltransmitter receives :re -Read" message, it gets confirmation that its message was received
error-free. Rings normally have a Token Passing channel access, and are often referred to as Token
Rings, where this term refers :o ihe logical topology and the access method of the network. See Figure 1-
13
AI Bob Charlie Router
tr
t-t
Dave
Server
C|TX1150 & CSST215C Re. s r-r rcc -20- 1112712007
The tree topology is not often found in Local Area Networks, except as automation robotics in
industry. Stations on a Tree normally have a Masterffributary relationship, to provide for an orderly flow
on information. An industry example could be a drug company using assembly line techniques to package
their products. The company needs to count the pills, place them in a plastic container, top with a tamper-
proof seal, screw the cap on the container, place a label on the container, and lastly place them in
shipping container.
Although these jobs could be done by hand, a more efficient and faster way would be through the
use of a number of robotic machines, each performing a specific step in the process and controlled by the
Master station. Networks of this variety could use IEEE 802.4 Manufacturer's Automation Protocol (MAP)
as the Layer 2 protocol in use.
An important Wide Area Network which uses this physical topology is the IBM 3270 system,
which many banks still use as their chosen network to pass information between the tellers and work
stations to the main-frame computer which handles all traffic control and central storage of transactions.
See Figure 1-14.
Figure 1-13 Ring Topology
9)) Tree Topoloqv
CITX1 150 & CSST2150 Revision.doc
Figure 1-14 Tree Topology
-21 - 11127t2007
8) Mesh Topoloqv
Mesh topologies are not often found in LocalArea Networks, as the main benefit of this shape is
the redundancy in paths. For example, in Figure 1-15 below every node has a direct connection to every
other node. Say the channel between Node A and Node B goes down (fails), the two nodes could still
communicate by sending their messages to Node C or Node D, with a request for redirection to the
destination. A few uses for this topology in a LAN would be to join sub-networks together using routers
with redundant paths, or the use of mirrored Servers. A variety of channel access methods could be used
in these networks, including Master/Tributary protocols and Token passing, but due to the multiple
channels involved (6 in Figure 1-15), Point to Point protocols between each pair of Nodes is most
common.
Node A
Node C
Node B Node D
Figure 1-15 Mesh Topology
9) Star Topoloqv
The star topology is the chcsen physical shape that Structured Cable Systems take, because this
physical topology is capable of supporting all the other forms of logical topologies currently deployed.
A star shape will provide every work-station with direct link to a central location. From this location, the
links can be joined together us ng an Ethernet Hub into a logical bus, using a Token Ring hub (also called
a Multiple Station Access Unit N{SAU)to create a logical ring, ora Hoststation and clustercontrol
equipment to create a logical tree Of course, point-to-point networks can also be supported.
A few varieties of netwcr<s ',rcrk in a logical star, including E-mail servers, and the telephone
system. Plain Old Telephone Sys:ems (POTS)for example, requires that every telephone set is
connected bya dedicated linx,subscriber's loop)tothe CentralOfficeforswitching. See Figure 1-16.
Figure 1-16 Star Topology Network
tr
-
tr
:
C|TXI150 & CSST215C R.:, s r^ 3cc -22- 1112712007
t
F: Addresses
ln order to provide a reliable connection between two devices on a network, a number of address
types are required. These addresses should be unique to the network, and may in fact be globally unique.
The Physical address resides on the Data Link Layer (Layer 2) of the O.S.l. model, and its'function is to
identify the physical path or the attached equipment which must be accessed for communication to start.
On an Ethernet LAN, for example, every Network lnterface Card (NlC) has a globally unique
address, the Media Access Control (MAC) address, a 48-bit identifier burnt into the NIC card, which can
not be changed. lt is the responsibility of the NIC Manufacturers to ensure no two NlCs have the same
MAC address. The fist24 bits of the MAC identifies the manufacturer, and the remaining 24 bits are a
kind of serial number for that specific card.
Modems also have physical addresses, although they do not require a globally unique address,
as modems generally only participate in Point-to Point networks (such as an on-ramp to the lnternet), and
as only two devices are communicating, both devices can recognize the source and destination of every
message.
The POTS network also has a unique physical address for every one of its subscriber, namely the
physical cable between the subscriber and the Central Office. A typical physical address for the telephone
would be the cable number and pair that a particular telephone was connected to. The Cable may support
a number of houses or businesses, or it may only support a single building, such as an office tower or an
apartment. Cable 1234, pai 14 may go to Apartment2O4, while cable 1234, pair 15 serves Apartment
205.
It is important to understand that the physical address identifies a physical location of the
equipment. ln the POTS example above, say Al moved outof 204, and wanted to take his telephone
number with him. The new occupant of 204 would get a different phone number, but would be assigned
the same physical pair Al formerly used.
2) Unique Network Address (Loqical Address)
1) Unique Physica! Address (MAC)
As we can see in the above paragraph, we will need a second address, one which is portable,
that the user can carry with them, even when they move. ln the case of the POTS network, this is the
phone number that the telephone company has assigned the subscriber. Say Al's phone number was
604-525-1234 when he lived in 204. Now that he has moved into a house, he wants to retain the same
phone number, so his friends and business acquaintances can call him.
This calls for a unique logical or network address which to a large degree can be made portable.
This type of address may be globally unique, or just locally unique, and resides on the Network Layer
(Layer 3) of the O.S.l. Model. For example, the phone number 525-1234 may exist in Alberta, but its area
code will be 403. The POTS network can differentiate between 604-525-1234 in Vancouver and 403-525-
1234 in Alberta by looking at the full address.
The most common type of logical address used today is the lnternet Protocol address, a 32-bit
address, usually express as a dotted decimal. An example would be 197 .45.223.18. As diagrammed
earlier, the lP protocol resides on the Network Layer, above the Physical and Data-Link Layers. When an
lP datagram is placed on the lnternet, the routers will check the lP address, and forward by the fastest or
shortest means to the destination network. Once the message has been received by a router attached to
the target network, the router must use an address resolution protocol such as ARP to map the logical,
32- bit address, to the physical 48-bit address for final delivery of the message to the correct workstation.
CITXI 150 & CSST2150 Revision.doc -23 - 11127t2007
The use of the two addresses in conjunction with each other permits the user to change their
physical location or change the attached NlC, and still retain the logical lP address. lf the user wants to
take her lap{op home with her, and move from her work network (and her assigned lP Address) to her
home network, the logical address will change, but the physical address will not, and she has the ability to
participate in two different networks, albeit at separate times.
Many logical addresses are assigned on a temporary "as required" basis. As an example, lP uses
Dynamic Host Configuration Protocol to "lease" lP addresses to work-stations that do not require a
permanently assigned logical address.
Below are shown the Logical and Physical Addresses in three separate communication systems.
Figure 1- '17 shows the two address types as they apply in the Telephone Network. The physical address
used is the cable and pair number of the subscriber's loop. An alternate physical address could be the
physical termination of the loop to the telephone switch at the exchange. The Logical address is the
subscriber's phone number.
Figure 1 -17 Physical and Logical Addresses in the PSTN
Figure 1- 1B shows the logicaland physicaladdresses used in TCP/IP on an Ethernet LAN. Here
the physicaladdress resides in the NIC card at layer2, and logicaladdress is on Layer 3. An additional
logical address resides on the layer 415 boundary (the "well-known port" number) which allows the PC to
multi-task different upper layer protocols.
The use of lP logical addresses is best seen in the operation of Dynamic Host Configuration
Protocol (DHCP). Many nelworks have more workstations than they have lP addresses, and rather than
permanently assigning lP addresses the address is "leased" for a short duration to a work station as
required. ln this case, the same workstation may have different lP address each day of the week. There is
no fear that messages will get lost. as the physical (MAC) address does not change, and it the Router on
the LAN maintains an Address Resolution Protocol (ARP) table mapping the permanent MAC address to
the temporary lP address ARP is of course, the protocol used to maintain this table.
I
(
EE
tltl
:
r--T---T--t
F++t
Physical Address Cable
4785APair 127
Logical Address
604-555-1234
CITX1 150 & CSST215C Rev s on doc -24- 1112712007
I 7
6
5
4
3
2
1
O.S.l. Stack
Transmission Control
Protocol
Figure 1-19 shows the physicaland logical addresses used by the post office. Here the physical
address is the street address and city, while the logical address is the name of the source and destination
people. lf the person moves, the mail will still go to their old address, unless they pay to "redirect" their
mail to their new location, a human process which is similar to ARP mentioned above.
I
Figure 1-18 Physical and Logical Addresses in Ethernet & lP
LogicalAddress
216.34.56
Physical (MAC)
Address
00c4. 2947.a347
The Adams Family 1-
i 1313 Mockingbird Lane i
I Crr.pysville I
i I'tortt., Dakota i
i osast I
Figure 1-19 Physical and Logical Addresses in the Post Office World
C|TX1150 & CSST2150 Revision.doc
Destination
Physical Address
Field (Street etc.)
-25 - 1112712007
G: lnterfaces
1) Electrical. mechanical and functional interfaces
An interface can be viewed as any boundary between two devices, or software layers.
Networking requires crossing many such boundaries, and the hardware and software developers have to
meet the standard for each interface the code or equipment crosses. An interface may be a physical
connection such as the RS-232 serial interface used in modems or the NIC interface for an Ethernet
network, or a software connection like the boundary between the Transport and Session Layers, which
uses well-known port address to provide multitasking capabilities.
The interface may provide for common electrical parameters such as voltage levels, line code
type used (i.e. definition of a logic zero or a logic one), speed and pulse shape, to ensure all devices
attached to the channel "speak the same language". The mechanical shape of the physical connection is
also standardized as to its shape, size, number of connectors etc. The T568A outlets used in UTP
networks provide a ready example, as do the IBM data connectors used in legacy networks.
Lastly, the functional use of the physical connections (for physical interfaces) or the Application
Program lnterface (APl) handles must also be standardized. An example of this type of standardization
can be seen in the software boundaries between the various layers in the O.S.l. model. A programmer
can write any code they want which is sufficient to do the job, so long as it meets the next layer in the
proscribed manner.
2) Tvpes of Mechanical lnterfaces
a) T568A and T5688 Telecommunication Outlets
Structured cable systems based on 100 ohm UTP cables have been standardized to the use of
an 8-position, 8-conductor lnsulation Displacement Connector (lDC) which resembles a standard
household telephone outlet, but with more conductors. Both the T5684 and T5688 use the same physical
hardware (often mistakenly called a RJ45 jack), but the cable conductors are wired in two different
configurations.
The T568A outlet is used in the lnternational and Canadian standards, while the T5688 is an
optional variant in Canada, and is most common in American businesses in the U.S.A. Both
configurations provide for the termination of 4 physical pairs (8 conductors) in the outlet. See Figure 1-20.
Figure 1-20 Four T568 Outlets in a Surface Mount Module
CITX1 150 & CSST2150 Revision.doc -26 - 11t27 12007
r
I
t
The Network lnterface Card for modern Ethernet networks is equipped with a T5684 or T5688
outlet in order to interface with the 100 ohm UTP physical network. Some NIC cards still have a BNC (50
ohm coaxial connector) for use with Thin-net coaxial networks. The NIC card provides the Data Link
Layer 2 functions (e.9. the MAC address, calculating the Frame Check Sequence, etc.) and interfaces
with the Physical Layer 1 of a metallic cable.
The typical Ethernet NIC can transmit 10/100 Base-T in a serialfashion, using only two pairs,
conductors 11 2 and 3/6 as a transmiUreceive pair. Some implementations of IEEE 802.3, such as 100-
Base-T4 or 1000-Base-T, use all four pairs of conductors, send and receive data in parallel, 4 signals at a
time. Some high speed networks even send full-duplex, which means that a single device can be
transmitting at the same time as it is receiving a message from another computer.
Other NIC cards may have coaxialconnectors for'10-Base-2,15 pin DB-15 connectors for 10-
Base-S, 8p8c (telephone type) connectors for UTP networks, or twin-axial or STP connectors for IBM
Token Ring networks. See Figure 1-21.
b) Network lntedace Card
t
1 0-Ease-2
IBM was one of the first large players in Local Area Networks, and produced a number of
proprietary network systems such as the 4 Mbps and 16 Mbps Token Rings. This protocol has now been
standardized as the IEEE 803.5. Originally, these networks were designed to run on shielded 2-pair
cables. A special connector, the IBM Data Connector, was the physical interface chosen for these
networks.
Figure 1-21 NIC card with 3 different LAN interfaces
c) IBM Data Connectors
10/1ll[-Ease-T
lnterface (BpBc)
t
CITXl 150 & CSST2150 Revision.doc
Figure 1-22Rack Mounted IBM Data Connectors
-27 - 1112712007
With the advent of the IEEE 803.5 protocol and UTP networks, equipment manufacturers
developed baluns to the convert the unbalanced IBM equipment to work into a balanced 4-pair, structured
cable system.
d) Serial Peripheral lnterfaces
A common interface found on tower computers is the DB-9 or DB-25 style RS-232 serial interface
connector, which may be connected to a modem, or other serial device. lt may have between 3 and 25
active conductors, depending on the service provided, although most devices will use less than 9
conductors. See Figure 1-23. Additionalserial interfaces include the USB (Universal Serial Bus)
connector, which can access many addressed peripherals on the same interface, and the V.35 high
speed interface which may be found on carrier type equipment such as T-1 systems.
ttttt
fttt
Figure 1-23 Serial DB-g lnterface
e) Parallel Peripheral lnterfaces
Most computers also have a parallel interface port, also on a DB-25 connector, which is used to
connect to a parallel device such as a printer. Eight bits of information are sent to the printer at one time.
Although highly efficient and fast, parallel transmission suffers from clocking issues if the physical link is
too long. For this reason, parallel transmissions generally only occur on relatively short distances of
perhaps a few hundred meters. See Figure 1-24.
Figure 1 -24 Parallel "Centronics" type lnterface
CITX1 150 & CSST2'l 50 Revision.doc - 28 - 11t27 t2007
t Unlike the all the interfaces so far discussed, fiber optics do not have electrical characteristics.
lnstead the light transmission characteristics become critical to the interface performance. A number of
different types of connectors and splices for optical fiber are currently available, with the SC56B connector
type being the preferred standard under TIA/ElA-5688.
f) Fiber Optic lnterfaces
t
Figure 1-25 A Selection of Fiber Optic lnterfaces
CITX1 150 & CSST2150 Revision.doc 1112712007
Section 1 Summarv
Commercial requirement for a standard phvsical network
Recognized Media and Cable lnfrastructure
Performance Standards
Flexibility, Adaptability and Scalability
Open Svstem lnterconnect Model
7 Layer Model
Struitured Cable Systems are on Layer 1, the Physical Layer
Network lnterface Cards are on Layer 2, the Data Link Layer
Commu nication Protocols
Agreed upon rules for communicating
Frame and field enforcement
Encapsulation
ChannelAccess Methods
Contention: Carrier Sense, Multiple Access/Collision Detection (Ethernet)
Polland Select
Token Passing
Topoloqies
Physical and Logical ToPologies
Bus TopologY (Ethernet)
Ring TopologY (Token Rings)
Physical Star Topology (Ethernet)
Phvsical and Looical Addresses
Media Access Control address
I nternet Protocol address
lnterfaces
Electrical, Mechanical and Functional parameters
Physical and Software lnterfaces
T5684 and T568B Telecommunications Outlets
1
I
E
CITX1 150 & CSST2150 Revision.doc - 30 - 11t2712007
Bcit Citx1150 Structured Cabling Systems For Computer Networks Advanced Cabling Systems James Boulter
Bcit Citx1150 Structured Cabling Systems For Computer Networks Advanced Cabling Systems James Boulter
Prior to the advent of inexpensive desk-top computers in the 1980s, the only Local Area Networks
which existed were either Token Ring networks (at 4 Mbps), sometimes built from dumb terminals, or
point-to-point networks (up to 9.6 kbps) built up separately with no interconnection between them.
Banks and similar business would build an intra-building LAN which served their particular need,
say the requirement to copy money transactions and to store the information related to each and every
transaction. Memos and company directives were distributed by the company version of snail mail,
consisting of written memos sent to the recipients by the office mail delivery systems. Wide Area
Networks supplemented the LAN by use of a single node in every office, which was connected to a main-
frame computer at the (far-distant) head office by the use of a dedicated point-to-point modem circuits, or
a multi-point networks using Poll and Select access protocols. These two networks would work in
conjunction with each other to store daily traffic on the memory storage system of the LAN, with the wide
area network transmitting the daily information to the main frame by use of the WAN network after
business hours.
Whatever the source of the cabling, these early networks were vendor and function specific, and
a cable structure built for a specific vendor or product could not normally be adapted to another network
topology or protocol.
B: POTS Networks
The other major network which existed at this time was the telephone network. During this time
the phone companies provided the internal cabling in every business and residence requiring access the
Public Switched Telephone Network (PSTN). The telephone companies in turn provided the telephone
sets and in-building access to each phone set. The telephone system provided both voice and low speed
data communication (rarely usable above 9600 bps) between sites. This early cabling, and the limited
functionality of the network, is often referred to as the Plain Old Telephone Service (POTS). Features we
take for granted now, like Caller lD, Last number redial and Call Forwarding, were not available
As the main building cable installer, the telephone company provided the majority of media, in the
form of non-category cables, which businesses tried to use to satisfy their need for networking. And as
the only egress to the outside world, the telephone companies had a monopoly on access to the outside
world. ln addition, if another WAN supplier was contacted, that supplier had to cable in an acceptable
media for the network.
A: Vendor & Function Specific Networks
Leqacy Networks
Figure 2-l
ClTX1150 & CSST2150 Revision.doc
POTS wiring in the Residence
-31 -
On Hook
48 VDC
CO Battery
o
"8,s#ff{,
a
1112712007
As a result of these limitations and implementations, the physical media of these legacy networks
which could be 2-wire STP, 2, 3 or 4-wire UTP cabling, or coaxial cable, still exist in a lot of older
buildings. Structured Cable Systems cannot use the existing cable infrastructure because the cables fail
to meet the performance standard required of modern high speed networks, and do not have the physical
topology of required to support a Structured Cable System.
When desk top computers became a common piece of equipment in the business world, the need
for linking all the stations within a business became apparent, and the benefits of a LAN become more
evident. The first advance of the LAN was the establishment of low speed Ethernet networks at 10 Mbps,
These early networks supported what was then considered a High speed system, carried on 50 ohm
coaxial cables. The individual stations could then update a local server with the day's action, which in turn
could then be uploaded to the WAN as required. Advances in networking eventually lead to number of
different physical media which would support the newer networks. As a result, many buildings have
remnants of many former networking media, in the form of POTS cabling, coaxial cables and STP cables.
These cables lie unused in the darker spaces of the building as the cost of removing the cables was seen
as unnecessary by the user or building owner.
r l.rid"tlttbd
?rtbd-trrrE
t. tdd&k
I6U?*S"a
I
C. Qs.d WrE'
l5o4Hc&, xd'ldrird ur.l
KIE Fda wql<kexptr ! ?61d<'
s@ l&.-@6r, @ry?&
er:e'cl&
cAuirolr
od6hDhreMd-Lbffi6
#h ffi R rd@*i* {Lrin{ s
,filn qw Fr iu6 & r@@ *F rvJo ?JP,
@*'w e.r&i4r6*4ddre'rd?,@@iiq d{
Wrr €r6rro @*sr w[a6r66dlg ]$
N6*rs: %{ryrri{i%{w{r plr(*m$(wxrry
lMllt|4a ea te 4 lffird, aalMrM wa
roy w& l& &Brfd o8.vilr h UF
Figure 2-2 POTS Colour Gode to Structured Cable Colour code
The object of POTS cabling was to provide at least two pairs of conductors to every location
where a telephone could be desired. The actual telephone locations were largely decided by the building
contractor, with more or less adequate coverage. ln 8.C., the telephone companies started providing 25
pair cables to each phone location, which provided a large groMh factor to the phone, fax or data
networks. Unfortunately, the POTS non-category cabling provided by the phone company will not support
a 16 Mega-Hertz bandwidth required by lOBaseT networks.
POTS cabling can be successfully used as the media to support T-1, lntegrated Services Digital
Network (ISDN), and Asymmetric Digital Subscriber Line (ADSL) all of which run at 1.SMbps or less.
I
t
CITXI 150 & CSST2150 Revision.doc -32- 11t27t2007
PAIF 3 T w[@6,ee
R O(e6',/|tnKe
Wide Area Networks (WAN) are considered to be any network with distances beyond
those of the LAN or Municipal Area Networks. This is not just an arbitrary distinction. When analogue or
digitaltraffic has to be carried for long distances, the protocols and equipment used in LANs will no longer
work. For example, CSMA/CD can not function efficiently on a long Channel because of the time required
for the signal to travel the great distances. CSMfuCD works on 90 meters because the delay times are
around 2 microseconds. On a WAN of perhaps 1000 Kilometres, (e.9. Vancouver to Calgary)the delay
times are upward of 20 milliseconds. Other issues also come into play, such as reshaping and re-
amplifying the signal.
Legacy Wide Area Networks often made only a single appearance in the subscriber's premise.
The carrier company providing the WAN service would typically install a 4-wire pair (i.e. two twisted pairs
of conductors) to a specified location where the modem, line driver or other electrical interface would be
situated.
This appearance would be connected to a particular station, which could act as a Tributary to the
WAN, (Figure 2-3) or to some digital sharing device, which would split the incoming WAN to a number of
local stations (Figure 2-4).ln either case, the local members of the WAN were limited to a few (often one)
station.
G: Wide Area Networks
From Carrier
Company
Figure 2-3 WAN Tributary as Member of LAN
From Carrier
Company
To l-AN
Gateway
Workstation
to WAN
C|TX1150 & CSST2150 Revision.doc
Figure 2-4 Multi-drop Stations as Members of WAN
nt
33- 11t27t2007
D: Leqacv Local Area Networks
1) IBM Token Rinq on STP
One of the first LANs in wide use was the IBM Token Ring, operating at 4 Mbps initially and later
upgraded to 16 Mbps. Token Ring networks are still popular with banks and other businesses which are
concerned with security issues. Legacy Token Ring networks appeared on a number of physical media,
including coaxial cable, Twin-axial cable, and 150 ohm shielded twisted pair (STP) having 2 pairs.
Adapters called baluns (for balanced unbalanced transformer) were developed to permit
equipment designed to work into coaxial, unbalanced lines to operate on balanced twisted pair cables.
2) 10Base-2 and 10Base-5
The first versions of Ethernet were developed by Digital Networks, lntel and Xerox, the DIX
version of Ethernet, now referred to as Ethernet 2. This legacy network was designed to work onto a 50
ohm coaxial bus backbone (the Segment). 10Base-2 was also called Thin-net or Cheap-net and was
supported by a physically smaller cable running a maximum distance of 185 meters. The 2 in the name
came from the approximately 200 meter segments permitted.
1OBase-S ran on a thicker 50 ohm coaxial cable, and often referred to as Thick-net. 1OBase5
networks could support 500 meter segments. Although no longer installed as segments supporting an
active population of workstations, 1OBase5 is common as bridging network, joining distant 10 or 100 Base
T networks together.
1OBase-2 and 10Base-5 networks required 50 ohm terminators on both ends of the cable
segment, and all unequipped locations had to have barrel connectors rather than the tee-connectors
commonly found. A common problem with these two networks was reflections on the line, caused by
unterminated ends and open tees. These reflections would appear like traffic, causing echoes on the line
and higherthan expected collision rates. Thesetwo LAN types have largely between replaced by 100
UTP Structured Cable Systems.
Figure 2-5 10Base-2 and 10Base-5 Networks
3
I
C|TX1150 & CSST2150 Revision.doc -34- 11t27t2007
Since the 1970's, the use of customer owned telephone switches, called Private Branch
Exchanges (PBX) have been an economical method of providing telephone service to business. One of
the main ways businesses benefit through having their own PBX is by reducing the cost of leasing many
expensive trunks to the premises. lnstead of having to provide a separate outside line to every employee,
a smaller number of trunks would suffice to provide outside access to the user as required.
Legacy and modern PBX systems used the Star topology to provide a single channel from the
PBX to each telephone set. ln a way, the PBX cable topology supplied the model for Structured Cable
Systems.
3) PBX telephone svstem
*t
Central Office
PSTN Switch
Figure 2-6 The PBX in a Business
CITXl 150 & CSST2150 Revision.doc -35- 11t27t2007
Leqacv Networks
Function and Function Specific
Built as required
Public Switched Telephone Network (PSTN)
Plain Old Telephone Service (POTS)
Non-standard cabling and color codes
Wide Area Networks
Point to Point Dedicated Service
Leqacv Local Area Networks
Early Ethernet LANs
10Base-2 "Thin-net"
'10Base-S "Thick-net"
Private Branch Exchanges
CITX1 150 & CSST2150 Revision.doc - 36 - 11127t2007
f
Bcit Citx1150 Structured Cabling Systems For Computer Networks Advanced Cabling Systems James Boulter
Bcit Citx1150 Structured Cabling Systems For Computer Networks Advanced Cabling Systems James Boulter
Section 3: Structured Cable Svstem Standards
By the mid 1980's businesses were starting to have a Personal Computer (PC) on their
employees desks, and a need to network the work-stations together became apparent. The lnternational
Standards Organization created from of a number of sitting committees and delegations from the various
national standards organizations such as the Canadian Standard Association (CSA) and the American
National Standards lnstitute (ANSI) took this matter into consideration.
At the heart of this matter was the requirement for a standard physical cable structure which
would support the current and future requirements of the LAN. Vendor and product specific cable types
and topologies did not have the flexibility required by changes in technology, improvements in protocols
or increases in user populations. Additionally, the business community was finding the cost of re-cabling
their premises to support an improved LAN becoming excessive.
The ISO realized that their 7-Layer Model required a standardized interface at the Physical Layer.
After sessions with the software, hardware and cable manufacturers, an ISO standard, the ISO 11801 ,
was created. This standard identifies the major issues of concern, including the need for establishing
space requirements to support the LAN, adequate work area coverage to support current and future
populations, a flexible topology, test parameters, grounding and bonding and a documentation process to
record the "as-built" structure. This document was then taken back to the member nations, and eventually
became, more or less, the national standard. All these documents are considered "living" documents, in
that they are reviewed regularly, and updated to reflect the latest changes in LAN operation.
A: ISO 11801 (in briefl
i
tso 1
. Purpose:
- Defines an application independent open sydern
- Definea a fledble oabling sheme suoh that modifioatlonE
are bsth easr/ and economical
- Prwides guidance br building proftEsionals to allor ficr a
cabling infrastruc'ture beficre specific requirEmenE are
knorn
- Deflnee aoabling system that supporE curent
applicdions and is a basis hrfuture product development
for Customer Premisas Cabling
1 801
C|TX1150 & CSST2150 Revision.doc
Figure 3-1 ISO 11801 Standard
-37 - 11t2712007
Figure 3-2 Relationship of National Standards to the ISO Standards
CENELEC isthe standards body in France, and is used through mostof the French spe:' -;
world. AS/NZS is the Australian & New Zealand Standards body. ANSI is the American Nationa
Standards lnstitute, which has the Electronic lndustries Association (ElA)and Telecommunica:,-=
lndustry Association as sub-committees. The lnternational Electronic Committee is the sub-cc--:== :'
the lnternational Standards Organization which covers telecommunications. The CSA is the C=-.=:,=-
Standards Association which establishes the standards for Canada.
ln the case of Telecommunications standards, the CSA largely follows the TIAJEIA ::'::--*-=
B: TIAJEIA 568B 569, 606 and 607 in brief
ln America, ANSI turned the creation of a national standard over to the Telecom-'--,=:(:rs
lndustry Association/Electronics lndustries Alliance (TIAJEIA), a sub-committee concerrs'; *T
telecommunications and electronic matters. After consideration of the existing practices - --E - S : s
group brought out a number of standards, which although approaching the ISO stanca-: r: 1- r-tl',
agree with it. The four documents are concerned with the cable structure and compone-= tJ-rr-d --
create a structured cable standard. the building space requirements (largely for the bu ,: ni :rrlrP-=-
grounding and bonding, and the record documentation process.
ln Canada, the Canadian Standards Association (CSA) largely adopted the :.-ers: rnn -erts,
with only a few changes reflecting current practices in Canada. These documents e-=
=.a,#a=
s ='ee
through the CSA in Canada or the TlfuElA in the U.S.
1 ) Commercial Buildinq Telecommunications Cablinq Standa{
- ln Canada the CSA T529B document
- ln Amerrca the TIAJEIA 568-8 document
- Horizontal and backbone cable details
- Topologies required
- Establishment of rooms for specific network functions
- lnstallationpractices
- MethoCs of cross-connection cabling
- Cable transmission and performance standards
ClTX1150 & CSST215C Rev s c'r,ooc -38-
a
2l
- ln Canada the CSA T530-M90 document
- ln America the TIA/EIA 569-A document
- Acceptable pathways for telecommunication cables
- Horizontaland Backbone pathways
- Work area and furniture pathways
- Telecommunication Room functions, size and locations
- Equipment Room functions, size and locations
- Entrance Facility functions, size, physicalaccess
- Multi-residencebuilding considerations
- Fire-stopping and Grounding concerns
3) Desiqn Guidelines for Administration of Telecommunications
lnfrastructure in Commercial Buildinqs
)
ln Canada the CSA T528-93 document
ln America the TIA/EIA 606 document
Administrative concepts and component identifiers
Creation of permanent "as built" records
Linking the records of physical components
Presentation of records, reports drawings and work orders
Pathway and Space administration
Wiring system administration
Grounding and Bonding administration
Field labelling and colour coding
4) Commercial Buildinq Groundinq/Bondinq Requirements
- ln Canada the CSA T-527-94 document
- ln America the TIA/EIA 607 document
- lssues with electrical grounding and bonding
- Establishment of a separate grounding system for telecommunications
- Use of grounding bus-bars and grounding backbone conductors
- Labelling of conductors and components of the grounding system
)
CITX1 150 & CSST2150 Revision.doc -39- 11t27t2007
C: TIA/EIA 5688 (CSA T-529B) Document
The main document of the four is the T-529B (TlfuElA 5688) document, which establishes good
installation practices and the tests required to verify the passive cable structure will support the level of
service it was designed for. This document was divided into 3 parts in the 2002 revision, with 568-8.1
covering copper cable concerns and 568-8.2 covering parameter testing of the copper systems. 568-8.3
covers the installation and testing of optical fiber cables, and is summarized later in this document.
A few minor differences exist between the Canadian and American documents, which do not
concern us here. The following is a summary of the TIA/E|A-5688 Part 1 Commercial Buildinq
Telecommunications Cablinq Standard document, and as such is subject to errors of omission and
interpretation. Where accuracy and completeness is required, refer to the original document.
1) Horizontal Cable
The Horizontal cable extends from the W/A T/O to the Telecommunications Room
(T/R) terminating hardware (Figure 3-3)
Physicaltopology of the Horizontal cabling shall be a Star ("Home Run")
Maximum length from T/O to terminating hardware shallbe 90 meters
Recognized copper cables are -pair 100 ohm Unshielded Twisted Pair (UTP t
Recognized optical fibers are 2 fibers of 62.51125 micron or 501125 micron lr4ul: -
mode cable
150 ohm Shielded Twisted Pair (STP)although currently recognized, is not
recommended for new installations
Use of Consolidation Points (C/P) permitted
Bridge taps, splices or splitters shall not be permitted on Horizontal cables
Every work area shall have two Telecommunication Outlets, each suppcie: :.' 3
separate 4-pair cable, or by two optical fibers
These two outlets shall support:
One Category 3 or better cable, and be metallic, and
One Category 5e or better cable, which may be Multi-mode Optica = :=-
A single Consolidation Point or Transition may be used on the Horizc^:: :€:"=
If Screened Twisted Pair (ScTP)used, the screen shallbe bonded ic 3 l=--: -l
bus-bar
Grounding and Bonding requirements shall meet TIA/ElA 606 stanca':
e
I
90 meters maximum
Outlet to Terminating Hardware
Leoend
T.R. Telecommuni:dn
W.A. WorkArea
-
4-Pair Cat.3 l+
----- 4-Pai Cai i= -: : - :-
()oitas :- _':- :
-./ l ranstt or - :, - :
Consc :=::t -: -
X croa".o---,
tr
Figure 3-3 Horizontal Cabling to the Work Ate.
CITX1 150 & CSST2150 Revision.doc - 40 - a
2) Backbone Gable
- The Backbone cables shall be terminated in, and provide interconnections between;
- The Telecommunications Rooms and the Equipment Room
- The Entrance Facility (E/F)and the Equipment Room
- Backbone cables may be provided between Telecommunications Rooms as required
- Physical topology of the Backbone cabling shall be a hierarchical Star (Figure 3-4)
- No more than two hierarchical levels of cross-connects permitted on Backbone
cables
- Cross-connects for the Backbone may be located in the T/R, the E/R or the E/F
E.R. Equipment R@m
T.R. Tel@omm Rmm
W.A. Work Ar€
MC Main Crcs-connet
lC lntermediateCrcs-conn6t
HC HorizontalCrGs-connmt
X Cross-conn&t
--l TerminatinoHardware
^.
Teteommlouilet
-
Backbone Cable
----. Horizontal Cable
Figure 34 The Hierarchical Backbone Structure
- Recognized cables for Backbones are;
100 UTP 4-pair or Multi-Pair (25 pair or more)
r.n. srf{._s*onaary/
 t.".?
62.51125 micron or 501125 micron Multi-mode optical fibers
Single-mode optical fi bers
Backbone cables should be sized to meet current and short-term future requirements
Backbone cables may be installed in phases as required
When different backbone media are used, the media shall share the same topology
and physical locations
- Maximum Backbone length are application and media dependent
All Category 3 or Category 5e cables for data are 90 meters maximum
A 5 meter cord for interconnection is permitted at each end of the Backbone
Category 3 or 5e cables used for voice service are 800 meters maximum
62.51125 micron multi-mode optical fiber cables are 2000 meters maximum
Single-mode optical fiber cables are 3000 meters maximum (Figure 3-5)
- The distance between the E/F and the Main cross-connect shall be included in the
distance measurements when required by regulatory policies
- Cross-connect jumpers and patch cords shall not exceed 20 meters at either the
Main cross-connect or at the lntermediate cross-connect
- Grounding and Bonding requirements shall meet TIA/ElA 607 standard
CITXI 150 & CSST2'l50 Revision.doc - 41 - 1112712007
)
Figure 3-5 Backbone Media Maximum Lengths
3) Work Area
- Location of the user, measuring 10 square meters or 100 square feet
- Requires two telecommunications outlets
One category 3 or better metallic cable (normally for voice service)
One category 5e or better, which may be two multimode optical fibers (normally
for LAN)
- All 4 pairs of the horizontal metallic cable shall be terminated at the modular outlets
Figure 3-6 T568A and T5688 T/O Configurations
)
I
Media Tvoes and Distances
Media A B
MC
!c
HC
Entrance Point or
Demarcation Point
Main Cross-connect
I ntermed iate Cross-connect
Horizontal Cross-con nect
UTP Data
UTP Voice
Multi-mode
Single Mode
90 meters
800 meters
2000 meters
3000 meters
500 meters
500 meters
500 meters
300 meters
1500 meters
2500 meters
12345678
W-G G W-O BL W-BL O W.BR BR
12345678
W-O O W-G BL W-BL G W-BR BR
Pair 3
r')
Pai 4
a
Pai 4
a
Pat 2
a
CITX1 150 & CSST2150 Revision.doc - 42 - 11t27t2007
- Outlets supporting copper conductors shall be configured as T568A or T5688 outlets
(Figure 3-6)
- All outlets shall be 8 position, 8 conductor lnsulation Displacement Connectors
Optical fiber T/O shall be a duplexed 568SC connector. Other outlet types may be
considered
- A Work Area cord connecting the T/O to work area equipment;
Shall be 5 meters or less when no MUTOA is present
Shall be equipped with identical connectors on both ends except where an
application specific device is required.
- Work area and Equipment cordage ("Patch Cords") shall be factory built off stranded
copper conductors at, or above the Category rating of the Channel
- Application-specific devices, (e.g. "Y" adapters, Baluns, pair transposition etc.) shall
be external to the Permanent Link, that is, must be external to the Outlet.
Figure 3-7 lmplementation of a Multi-User Telecommunication Outlet Assembly
- Open Office cabling permits the use of a:
A Multi-User T/O Assembly (MUTOA) (Figure 3-7 and 3-10) which permits
a longer WA cord (Figure 3-8) or
A Consolidation Point (C.P., Figure 3-9 and 3-10) which facilitates cabling
flexibility
- MUTOAs shall not extend the Channel length to more than 100 meters (i.e. they
"an
on-ly
ertend the work area cord by reducing the length of the
HorizontalCable. See Figure 3-8)
- MUTOAs and Consolidation Points shall not be used to reconfigure or re-map the
Horizontalcable
la- WorkArea
I
!
CITX1 150 & CSST2150 Revision.doc -43- 11t27t2007
Length of
Horizontal
Cables
H
meters (ft)
24 AWG UTP/24 AWG
ScTP Patch Cords
26 AWG ScTP
Patch Cords
Maximum
length of work
area cable
meters (ft)
Maxtmum comotneo
length of work area
cables, patch cords
and equipment cable
c
meters (ft)
Maximum
length of work
area cable
W
meters (ft)
Maxtmum comDtneo
length of work area
cables, patch cords
and equipment cable
C
meters (ft)
90 (295) 5 (16) 10 (33) 4 (13) 8 (26)
85 (27s) e (30) 14 (46) 7 (23) 1 1 (35)
80 (262) 13 (44) 18 (5s) I I (35) 15 (4e)
75 (246) 17 (57). 22 (72) 14 (46) 1 8 (5s)
70 (23o) 22 172) 27 (8s) 17 (56) 27 (7o)
Figure 3-8 Maximum W/A Cord Lengths Supported by a MUTOA
- MUTOAs and C. P.s can support a maximum of 12 work areas (i.e. 24outlets)
- MUTOAS and C. P.s must be secured to a permanent building structure in an
u nobstructed location.
- MUTOAs must be accessible by the user
- Consolidation Points shall not be accessible by the user
- Work Area cords in a MUTOA implementation shall be identified at the equipment
end with the T/O used, and at the T/O end with the work area the cord serves
- Sample maximum lengths of copper WA cords are given in Figure 3-8
- Maximum length of optical fibers used in a MUTOA shall not be reduced (i.e.
maximum total length, including the two patch cords, shall be 100 meters)
- C. P.s shall not be located within 15 meters of the Horizontal cross-connect
Figure 3-9 lmplementation of a Consolidation Point
t
I
!
Equipment cable
Patch cords/Jumpers
'15 meters minimum
!
!
l.1- WorkArea
-----1
Horizontal Cabling
--+
C|TX1150 & CSST2150 Revision.doc -44- 11127t2007
I
Random documents with unrelated
content Scribd suggests to you:
Kun Sofia illalla tuli kotiin, oli Samuel jo tyyntynyt. Hän kertoi
seikkailuistaan tytölle äänen hiukkaakaan värähtämättä. Ja se oli
onneksi, sillä koskaan ei hän ollut voinut uneksiakaan aiheuttavansa
tytössä niin voimakasta mielenliikutusta, kuin kertomus aikaansai.
Miss Glady oli ollut Samuelin viimeinen toivo, mutta Sofialle oli hän
ollut ainoa ihanne. Tytön koko olemuksen täytti riemu siitä, että sai
työskennellä miss Gladyn hyväksi, ja kun hän nyt sai kuulla, miten
Samuelia oli kohdeltu, meni hän surusta melkein pois järjiltään.
Samueliin vaikuttivat hänen voimakkaat nyyhkytyksensä
pelottavasti.
— Rakas Sofia, sanoi hän kiertäen kätensä tytön vyötäisille, me
emme saa unohtaa velvollisuuttamme.
— Minä en enään voi mennä sinne! huudahti lapsi poissa
suunniltaan.
Minä kuolisin, jos minun täytyisi vielä nähdä hänet.
— En minä sitä tarkoita, sanoi Samuel nopeasti koettaen johtaa
hänen ajatuksiaan muihin asioihin. Mutta sinun täytyy muistaa, mitä
minun on tehtävä, ja auttaa minua.
Hän kertoi suunnitelmistaan nousta taisteluun Pyhän Matteuksen
kirkon omistamisesta.
— Emmekä me saa antaa katkerien tunteitten vaikuttaa itseemme,
sanoi hän. Olisi kovin syntistä, jos me työskentelisimme vihassa.
— Mutta miten voit sinä hillitä vihaasi? huudahti tyttö.
— Se on kyllä vaikeata, mutta minä olen taistellut itseni kanssa.
Me emme saa vihata noita ihmisiä. He ovat tehneet meille pahaa,
mutta he eivät sitä huomaa, he ovat kurjia ihmisolentoja kuten me
muutkin.
— Mutta he ovat huonoja, itsekkäitä ihmisiä! huudahti lapsi.
— Minä olen paljon ajatellut sitä asiaa, sanoi hän, minä olen koko
päivän kulkenut kadulla ja miettinyt sitä. Enkä minä salli itseni tuntea
heitä kohtaan muuta kuin sääliä. He ovat tehneet minulle vääryyttä,
mutta se vääryys ei ole mitään sen vääryyden rinnalla, jota he ovat
tehneet itselleen.
— Oi, Samuel, kuinka sinä olet hyvä! huudahti Sofia, ja Samuel
hämmästyi, sillä juuri samaa miss Gladykin oli sanonut.
— Minun täytyy olla selvillä itsestäni, ja nyt minä olenkin. Minun
on välttämätöntä taistella heitä vastaan, mutta minun täytyy samalla
olla varma, etten anna omalle kostonhimolleni valtaa.
— No, mitä aijot tehdä? kysyi Sofia.
— Minä esitän asian seurakunnan jäsenille. Elleivät he halua
mitään tehdä, niin esitän asian kansalle.
— Mutta millä tavoin, Samuel?
— Kutsun kokouksen. Katsos, tämän minä olen kirjoittanut.
Hän otti taskustaan paperin, johon suurin kirjaimin oli kirjoittanut:
"PYHÄN MATTEUKSEN SEURAKUNNAN JÄSENILLE.
Kirkossa vallitsee lahjomisjärjestelmä. Muutamat
kirkkoneuvoston jäsenet ovat lahjoneet kaupungin hallitusta.
He varastavat kansalta. Kirkkoneuvosto on kieltäytynyt
kuulemasta minua ja sulkenut minut kirkosta. Minä vetoon
seurakuntaan. Ensi keskiviikkona kello kahdeksan illalla puhun
minä eräässä kokouksessa rakentamattomalla tontilla kirkon
vastapäätä ja kerron mitä tiedän.
Samuel Prescott."
— No, mitä aijot tehdä tällä? kysyi Sofia hämmästyneenä.
— Aijon antaa painaa sen pienille paperilipuille ja jakaa ne
ihmisille, kun he huomenna aamupäivällä tulevat kirkosta.
— Oh, Samuel! huudahti tyttö pelästyneenä.
— Minun täytyy tehdä niin.
— Mutta, Samuel, joka ihminen tulee kokoukseen, väkeä joka
puolelta kaupunkia.
— Sitä en voi auttaa, vastasi hän. Minulla ei ole rahaa vuokrata
huonetta eikä minun annettaisi puhua kirkossa.
— Mutta voitko sinä saada tämän niin pian painetuksi?
— En tiedä. Täytyy ottaa selvää, kuka sellaisen työn ottaa
suorittaakseen.
— Oh, minä tiedän! huudahti Sofia taputtaen käsiään. Fredrik
Bremerillä on painokone.
— Mitä sanotkaan!
— Niin, hänen isällään oli tapana tehdä painotöitä. Meidän täytyy
kysyä heiltä.
He kiirehtivät, suomatta itselleen aikaa edes syömiseen,
Bremerille; ja vanhemmat ja lapset kuuntelivat ihmeissään Samuelin
kertomusta. Fredrik kiihtyi kovasti, vanhan Johanin punaiset kasvot
hehkuivat.
Hän ja hänen lapsensa auttoivat, eikä viipynyt kauvaa, ennenkuin
Samuelin julistus oli painettu.
Oli jo myöhäinen ilta, kun molemmat lapset astelivat kotiin
mukanaan kolmesataa kappaletta vallankumouksellista julistusta,
jotka olivat huolellisesti käärityt, jottei kukaan voisi niitä nähdä.
Tässä toimessaan he aivan unohtivat miss Gladyn.
Vasta kun Samuel yritti nukkua, alkoi hänen mielessään taas
väikkyä miss Gladyn kuva, ja kaikki hänen suloiset toiveensa
heräsivät ja alkoivat ilvehtiä hänen kanssaan. Mikä narri hän oli
ollutkaan! Kuinka mahdottoman hulluilta tuntuivatkaan hänestä nyt
kaikki aikaisemmat kuvitelmat. Näin vietti hän vielä kerran
unettoman yön vaipuen vasta päivänkoitteessa levottomaan uneen.
Vajaan tunnin ennen jumalanpalveluksen päättymistä asettui
Samuel vastapäätä kirkkoa toiselle puolelle katua. Hänen
sydämmensä sykki voimakkaasti. Hän tunsi, se täytyy tunnustaa,
melkein samaa kuin mies, joka aikoo toimeenpanna
dynamiittiräjähdyksen taikka salamurhan. Ilma oli lämmin ja kirkon
ovi avoinna, niin että hän voi kuulla tohtori Vincen kaikuvan äänen.
Urkujen säveleet nostivat hänen silmiinsä kyyneleitä. Hän rakasti
urkuja, eikä hän enään saisi niistä nauttia!
Viimeinkin loppui jumalanpalvelus, ja "salamurhaaja" asteli kadun
yli ottaen sopivan paikan. Ja koko seurakunnasta tuli ensinnä ulos
"olympialainen", mr Curtis, hän eikä kukaan muu!
— Saanko jättää yhden kappaleen, sir, virkkoi Samuel sydän
kurkussa. Ja mr Curtis, joka kuivasi nenäliinallaan otsaansa, säpsähti
kuin olisi nähnyt peikon.
— Poika mitä sinä teet! kivahti hän, mutta Samuel oli jo rientänyt
pois ja jakoi papereitaan ihmisjoukolle, joka molempien porttien
kautta virtasi ulos. Julistukset otettiin vastaan ja luettiin,
pysähdyttiin, ihmeteltiin ja ruvettiin keskustelemaan, niin että portit
aivan tukkeutuivat. Kun jo suuri joukko julistuksia oli jaettu, olivat
kirkkoneuvoston jäsenet ehtineet käsittää aseman, ja yritys tehtiin
jakamisen estämiseksi.
— Tämä on häpeällistä! kirkui mr Curtis koettaen tarttua Samuelia
käsivarteen. Mutta poika riuhtasi itsensä irti juosten sivuovelle, josta
kansaa virtasi ulos.
— Ottakaa yksi kappale! huuteli hän. Antakaa muillekin!
Ilmoittakaa kaikille! Ja niin sai hän jaetuksi vielä muutamia
kymmeniä julistuksia. Pitäen tarkoin silmällä mr Curtisia ja muita
kirkkoneuvoston jäseniä juoksi hän taas kirkon ympäri etusivulle ja
kiersi ihmisjoukon jakaen samalla julistuksiaan niin paljon kuin
ennätti. Ilmoittakaa kaikille! huuteli hän kaikuvalla äänellä.
Väärintekijät on karkoitettava kirkosta!
Yhtäkkiä tunkeutui mr Hamerton hengästyneenä ja kasvoiltaan
punaisena esiin väkijoukosta.
— Samuel! huusi hän tarttuen poikaan, täten ei saa jatkua!
— Sen täytyy! vastasi Samuel. Päästäkää minut!
Hän kohotti äänensä hurjaksi huudoksi:
— Kristuksen kirkossa on varkaita!
Kamppaillessa putosivat lentolehtiset maahan, ja mr Hamerton
kumartui ottamaan niitä ylös. Samuel otti niistä niin monta kuin voi
ja riensi taas sivuovelle, jossa useat ihmiset ahnaasti tarttuivat niihin.
Hän sai jaetuksi kaikki lehtisensä, ja niille henkilöille, joitten hän näki
vielä tulevan kirkosta, huusi hän käsiään heiluttaen:
— Tämän seurakunnan kirkkoneuvostossa löytyy miehiä, jotka
ovat lahjoneet Lockmanvillen kaupunginvaltuusmiehiä. Minä aijon
paljastaa heidät keskiviikkoiltana toisella puolella katua pidettävässä
kokouksessa.
Sen sanottuaan lähti hän tiehensä väistellen erästä hurjistunutta
kirkkoneuvoston jäsentä, joka yritti häntä lyödä. Kadulle päästyään
juoksi hän nopeasti kuin hirvi kotiinsa.
Hän oli vedonnut seurakuntaan!
XXVIII. Käynti poliisin luona.
Samuel syöksyi hengästyneenä kotiin kertoakseen tapahtumasta
Sofialle. Sieltä meni hän Bremerin luo, joka oli seurannut kohtausta
kauvempana. Molemmissa paikoissa täytyi hänen perinpohjin kertoa
jännittävästä tapahtumasta.
Vanha Bremer saapui kotiin ja hän tiesi, että Samuelin täytyi saada
poliisilta lupa kokouksen pitämiseen.
Samuel ei tuntenut erityistä halua käydä poliisiasemalla, jonka hän
jo ennestään kyllin hyvin tunsi; mutta hän olisi mennyt vaikka
leijonain luolaan silloin, kun hänen suuri asiansa sitä vaati. Hän
lähtikin seuraavana aamuna hyvissä ajoin poliisiasemalle. Mrs
Stedmanin avulla oli hän sitä ennen onnistunut vakuuttamaan
Sofialle, että Sofian tuli palata takaisin Wygantin luo.
Poliisiasemalla istui tällä kertaa kirjoituspöydän ääressä eräs toinen
ylikonstaapeli, muuan irlantilainen.
— Anteeksi, herra, sanoi poika. Saanko täältä lupatodistuksen?
— Mihinkä? kysyi ylikonstaapeli.
— Ulkoilmakokouksen pitämiseen.
— Minkälaatuisen kokouksen?
— Jaa… minulla on jotain sanottavaa kansalle.
— Jotain sanottavaa kansalle? toisti ylikonstaapeli ja kysyi
senjälkeen äkkiä:
— Mikä nimenne?
— Samuel Prescott. Ylikonstaapeli kohotti silmäkulmiaan.
— Oh! sanoi hän. Vai se veitikka!
— Mitä sanotte? kysyi Samuel.
— Komisarius tahtoo puhua kanssanne, lausui ylikonstaapeli sekä
ohjasi Samuelin erityiseen huoneeseen, jossa komisarius McGullagh
paksuna ja punakkana istui kirjotuspöydän ääressä. Nähtyään
Samuelin hypähti hän ylös.
— Siinä sinä kuitenkin olet? huudahti hän ja lisäsi, viitaten
sormellaan konstaapelille:
— Jättäkää meidät.
Kun hän oli sulkenut oven, meni hän Samuelin luo ja uhaten
sormellaan sanoi:
— Poika! sinä lupasit minulle jättää kaupungin!
— En. En minä ole luvannut.
— Mitä se on? kivahti komisarius.
— En minä luvannut, se oli Charlie Swift, joka sen lupauksen teille
antoi.
— Mitä sinä sitten lupasit?
— Lupasin etten puhu kenellekään herra… herra Albertista. Enkä
minä ole lupaustani rikkonut.
— Minä sanoin Charlie Swiftille, että hän veisi sinut mukanaan
kaupungista. Miksi et sinä ole mennyt?
— Hän ei lähtenyt…
Samuel keskeytti. Hän oli luvannut Charlielle, ettei puhuisi
kenellekään mitään.
— Jatka, käski komisarius.
— Minä… minä en voi puhua siitä, sammalsi Samuel.
— Mitä! Koetatko salata asiaa minulta? Etkö luule minun tietävän,
että hän vielä on kaupungissa ja että sinä ja hän yhdessä olette
tehneet kaikenlaisia lurjusmaisuuksia?
— Ei, Ei! huudahti Samuel säikähtyneenä.
— Älä koeta valehdella minulle! uhkaili komisarius. Ymmärrätkö,
että minä olen selvillä kaikesta, senkin nulikka.
Hän pysähtyi silmänräpäykseksi ja katsoi terävästi nuorukaiseen.
— Ja sinulla on otsaa tulla tänne, huudahti hän. Mitä sinä
oikeastaan tahdot?
— Minä… minä tahtoisin pitää kokouksen.
— Sanoppa, kuka on antanut sinulle luvan puuhailla puheita tässä
kaupungissa?
— Ei kukaan vielä — juuri saadakseni luvan olen tullut tänne.
— Älä yritä teeskennellä ja tehdä minusta pilkkaa, tiuskasi
komisarius.
Samuelilla ei ollut vähintäkään halua tehdä pilkkaa kenestäkään,
kaikkein vähimmin komisariuksesta. Hänen kaikki jäsenensä
vapisivat. Mies katsoi häneen kuin voimakas gorilla ja hänen
punaiset kasvonsa olivat aivan pelottavat katsella.
— Kuuleppa, nuori herraseni, jatkoi komisarius. Sinä et tule
saamaan lupaa minkäänlaiseen puhumiseen Lockmanvillessä. Muista
se nyt ja aina. Ymmärrätkö?
— Kyllä.
— Ja vielä lisäksi: sinä et tulekaan pitämään mitään puhetta.
Ymmärrätkö.
— Mutta… mutta… änkytti poika.
— Sinä et tule pitämään ensinkään mitään puhetta, et kaduilla
etkä missään muussakaan paikassa koko kaupungissa. Koeta painaa
se kalloosi, niin voit välttää ikävyyksiä. Saatuani kuulla, että sinä
jakelet joitakin paperilippuja kaduilla, niin pianpa silloin saat toivoa,
ettet olisi sitä tehnyt. Siinä kaikki! Ymmärrätkö?
— Ymmärrän, sai Samuel vaivoin puserretuksi huuliensa välistä.
— Se on hyvä, sanoi komisarius. Annan sinulle vielä hyvän
neuvon: Lähde pois Lockmanvillestä ensimäisellä junalla äläkä enään
koskaan pistä nenääsi tänne. Mene!
Samuel lähti pois kauhistuneena. Siten kiihottivat poliisit häntä.
Luonnollisesti tulisi hän pitämään puheensa. Hän ei voi antaa
poliisin kiellon häiritä itseään. Mutta hänelle selvisi heti, mitä
hankaluuksia hänellä oli voitettavana: jos poliisi tulee ja häiritsee
häntä, ennen kuin hän vielä on ehtinyt sanoa sanottavaansa, voisi
kaikki hänen aikeensa luhistua.
Hänen täytyi kysyä neuvoa joltakin, ja sentähden lähti hän heti
Bremerin luo, pieneen huoneeseen, missä isä ja poika puuhailivat
piirustuslautojensa ja maalauksiensa kanssa.
— Vai niin on asian laita, sanoi vanha Bremer kuultuaan miten oli
käynyt poliisiasemalla. Tulepa mukaan, niin mennään Tom Everleyn
luokse.
— Kuka on Tom Everley? kysyi Samuel.
— Eräs lakimies. Hän voi antaa sinulle niitä tietoja, joita tarvitset.
Hän on tämän paikkakunnan sosialistien sihteerinä.
— Sosialisti! huudahti Samuel pelästyneenä.
Everleyn pieni konttori sijaitsi eräällä syrjäkadulla. Hän oli reipas,
lähes poikamainen, nuori mies ulkonäöltään. Samuel tunsi heti
mieltymystä häneen.
— Toveri Everley, sanoi Bremer. Tässä on poika, jota sinun tulee
auttaa. Puhu hänelle kaikki, Samuel. Sinä voit luottaa häneen.
Samuel kertoi tarinansa vielä kerran. Everley kuunteli suurella
jännityksellä tuon tuostakin ilmaisten kummastusta tai
tyytyväisyyttä. Kun poika oli lopettanut, nousi Everley reippaasti ylös
ja tarttui hänen käteensä lausuen:
— Samuel Prescott, lyökäämme kättä. Te olette kunnon poika!
— Silloin te seisotte minun puolellani, huudahti Samuel tuntien
taakan putoavan hartijoiltaan.
— Seison puolellanne! Sen tulen tekemään niin kauvan kuin elän!
Senjälkeen hän istuutui uudelleen ja alkoi hermostuneesti
rummuttaa kirjotuspöytää lyijykynällään.
— Minä saatan kutsua paikallisen sosialistiosaston kokoon, sanoi
hän, ja esittää tämän asian siellä. Hiljaiseksi on Lockmanvillessä
käynyt viime aikoina ja taistelu, kuten tämä, on juuri tovereille
tarpeen.
— Mutta minä en ole mikään sosialisti, huomautti Samuel.
— Ei se mitään tee, vastasi Everley. Liitytte meihin myöhemmin.
Samuel ei ollut siitä oikein selvillä, mutta hän ei tiennyt, kuinka
voisi sen esittää.
— Minä voin saada paikallisyhdistyksen kokoon huomisillaksi,
jatkoi Everley. Ei ole aikaa tuhlattava. Meidän täytyy nopeasti levittää
suuri paljous kokouskutsumuksia kaupunkiin.
— Mutta minä haluaisin kokoukseen vain Pyhän Matteuksen
seurakuntalaisia, sanoi Samuel.
— Aina tulee muita myöskin, virkkoi Everley. Ja eikö kansalla ole
oikeus saada tietää, kuinka heiltä varastetaan?
— Kyllä, myönsi Samuel.
— Ja kenties, lisäsi Everley naurahtaen tulee seurakunta paljon
halukkaammin asiaa käsittelemään, jos sitä vähäsen painostetaan
ulkoapäin. Meidän tehtävämme on panna alkuun vapaa keskustelu
tässä asiassa ja avata kaupunkilaisten silmiä. Muuten kenties poliisi
tukahuttaa asian alkuunsa ja silloin kansa ei saa koskaan tietää
mitään siitä, mitä me olemme tarkottaneet.
— Teidän täytyy olla hyvin varovaisia levittäessänne
kokouskutsumuksia, huomautti Bremer. Ne tulevat tukahuttamaan
koko puuhan alkuunsa, jos vaan voivat.
— Aivan varmasti, sanoi Everley nauraen. Mitä siihen tulee, niin
voitte luottaa tovereihimme. Me tunnemme luotettavan kirjapainon.
Samuel huokasi syvään helpotuksesta. Tässä oli mies, joka
ymmärsi asian ja kävi siihen käsiksi koko voimallaan ja
vakaumuksellaan. Se oli vain harmillista, että hän oli sosialisti.
Everley otti lyijykynän ja kirjotti seuraavan uuden ilmotuksen:
"Kansalaisille Lockmanvillessä!
Sittenkuin minä olin havainnut, että St. Matteuksen kirkon
kirkkoneuvoston johtavat jäsenet ovat lahjoneet kaupungin
hallitusta, pyysin tutkimusta asiassa, mutta ainoana
seurauksena pyynnöstäni oli, että minut karkotettiin kirkosta.
Silloin kutsuin minä kokouksen valaistakseni seurakunnalle
asiaa, mutta minulta kiellettiin lupa kokouksen pitämiseen ja
puhumiseen. Poliisi antoi minun ymmärtää, etten koskaan tule
pitämään puheita tässä kaupungissa.
Tahdotteko seisoa minun puolellani?
Puhun ensitulevana keskiviikkona kello 8 illalla
rakentamattomalla tontilla vastapäätä kirkkoa.
Sananvapauden ja kansalaisoikeuksien nimessä
Samuel Prescott."
— Mitä pidätte tästä, kysyi Everley.
— Se on mainio, virkkoi Samuel ihastuneena.
— Minä kustannan kokouskutsumuksen levittämisen, lisäsi
lakimies. Huolehdin myös siitä, että tiedonanto paikallisosaston
jäsenille lähetetään postiin vielä tänä iltana. Tulkaa nyt, niin etsimme
käsiimme pari osaston jäsentä keskustellaksemme asiasta heidän
kanssaan.
He lähtivät ulos. Bremer palasi kotiin työhönsä, mutta Samuel ja
Everley menivät sisään erääseen sikarimyymälään, joka sijaitsi
saman kadun varrella. Myymälän omisti eräs vähäinen Venäjän
juutalainen, jonka hauskannäköisiltä kasvoilta tumma silmäpari
lausui vieraat tervetulleiksi.
— Toveri Lippman, sanoi Everley, saan esitellä sinulle herra
Prescottin.
Myöskin "toveri Minsky" tuli myymälään pihanpuolella olevasta
työhuoneesta. Hän oli sikarintekijä ja hänen paljaat käsivartensa
olivat hyvin keltaiset ja näivettyneet. Everley kertoi heille lyhyesti
Samuelin seikkailuista ja esitti mitä hän oli aikonut tehdä. Se tulinen
kiihko, jolla molemmat kuulijat vastaanottivat Everleyn kertomuksen
ja esityksen, ei jättänyt epäilyksen varjoakaan siitä, etteivät he olisi
asian puolella. Parisen korttelia etempänä, eräässä kulmauksessa,
sijaitsi pieni työhuone, jossa työssään harmaantunut vanha
puuseppä, "toveri Begg", tarttui Samuelin käteen ja piti sitä kuin
ruuvipihdissä ilmottaessaan hyväksyvänsä hänen menettelynsä.
Senjälkeen lähtivät he tohtori Bartonin, erään nuoren lääkärin luo,
jonka Everley sanoi olevan tukipisteenä kaupungin paikallisessa
sosialistiyhdistyksessä.
— Hän on saanut kasvatuksensa ulkomailla, selitti Everley, joten
hänellä ei ole meikäläisten lääkärien ahdasta käsityskantaa. Sen
lisäksi on hänen vaimonsa todellinen kaunopuhuja.
Mrs Barton oli nainen, jonka rakastettavat ja lempeät kasvot
muistuttivat Samuelille hänen äitinsä valokuvaa. Koko ajan, kun
Everley kertoi Samuelin seikkailuja, silmäili nuorukainen mrs Bartonia
ja koetti päästä selville hänen mielipiteistään ja siitä
kummallisuudesta, että hän oli sosialistipuhuja.
Hetkisen kuluttua tuli tohtori Barton sisälle ja hänelle piti Samuelin
seikkailut kertoa uudelleen. Molemmat kiintyivät niin vieraihinsa, että
pyysivät heitä jäämään murkinalle. Keskustelussa käsittelivät he
kysymystä koko laajuudessaan ja Samuel tunsi saavansa luottamusta
asiansa oikeuteen siitä varmuudesta, millä he kävivät asiaan käsiksi.
Ei tarvittu pitkiä selittelyjä heidän kanssaan, sillä he näkyivät jo
etukäteen tietävän mitä oli tehtävä. He näyttivät omaavan ikäänkuin
taika-avaimen, jonka avulla saattoivat päästä tunkeutumaan
Lockmanvillen sisäiseen elämään. Ja se teki heille mahdolliseksi
ymmärtää kaiken ja tuntea, kuten hän tunsi, sekä käsitellä asiaa
kaikkia mahdollisuuksia huomioonottaen.
Kaikki nämät olivat hämmästystä herättäviä kokemuksia
Samuelille. Vielä joku tunti sitten oli hän ollut huutavan äänenä
korvessa, villiytynyt ja yksinäinen ja täällä oli nyt joukko liittolaisia,
mitkä näyttivät nousseen ikäänkuin maasta. He olivat miehiä, jotka
tarkasti tiesivät, mitä tarvitaan ja kuinka voidaan saavuttaa se, johon
pyritään; miehiä, jotka eivät tarvitse mitään opastusta tarttuakseen
työhön käsiksi vahingoittamatta hänen korkeaa asiaansa. He
käsittelivät asiaa aivan kuin olisivat sentapaisissa asioissa puuhailleet
kaiken ikänsä. Hän tunsi itsensä siinä määrin hämmentyneeksi, että
oli vähällä unhottaa minkälaista väkeä he olivat.
Mutta se selvisi taas hänelle äkkiä, kun he olivat palanneet takaisin
Everleyn konttoriin. Hän istui ja tuijotti nuorta juristia niin
huolestuneella ilmeellä, että tämä kysyi:
— Miten nyt on laitanne?
— Sanokaa minulle, mister Everley, sanoi nuorukainen, kuinka
sellaiset ihmiset, kuin Bartonit, voivat uskoa vapaaseen rakkauteen?
— Uskoa vapaaseen rakkauteen! Mistä ihmeestä te olette tullut
siihen käsitykseen?
— Eivätkö he sitten usko vapaaseen rakkauteen? tiukkasi Samuel.
— Luonnollisesti ei. Kuka on sanonut, että he siihen uskovat?
— Mutta hehän ovat sosialisteja!
Everley lakkasi työstään ja nauroi sydämellisesti.
— Kuinka te olette saaneet sellaisen ajatuksen? kysyi hän.
— Kas, sanoi Samuel, minä olen kaikkialta lukenut että sosialistit
uskovat vapaaseen rakkauteen.
— Vartokaa kunnes olette päässeet kunnolliseen alkuun
uudistustyössänne, sanoi nuori lakimies nauraen, silloin näette, mitä
olette oppineet.
— Mutta, änkytti Samuel hämmästyneenä, eivätkö sitten sosialistit
usko vapaaseen rakkauteen?
— Yksi ja toinen heidän joukostaan voi tehdä niin, sanoi Everley.
Minä tunnen erään, joka uskoo peikkoon, toisen joka uskoo paaviin
ja kolmannen, joka lujasti uskoo Aatamiin ja Eevaan. Enkä minä voi
sanoa mihin he kaikki uskovat.
— Nähkääs, jatkoi Everley selittäen, me muodostamme valtiollisen
puolueen, joka ei voi estää henkilöitä vapaasti liittymästä meihin. Ja
sentähden, kun sosialistipuolue on alati kasvava puolue, lukeutuu
kannattajiimme kaikenlaista väkeä, joilla on mitä moninaisimpia
ihanteita. Me emme voi sitä auttaa!
— Mutta, huudahti Samuel, te olette uskonnon vihollisia!
— Meillä ei ole mitään tekemistä uskonnon kanssa, vastasi Everley.
Me olemme, kuten sanoin, valtiollinen puolue. Jotkut joukostamme
ovat huomanneet välttämättömäksi jättää kapitalistien kirkot, mutta
siitä ette suinkaan voi meitä moittia.
— Ei, ei suinkaan, myönsi Samuel, ja lisäsi senjälkeen:
— Mutta ettekö tahdo hävittää hallituksen?
— Päinvastoin, me tahdomme vahvistaa sitä. Mutta ensiksi täytyy
meidän ottaa se pois kapitalisteilta.
— Mutta mihin te sitten uskotte? kysyi Samuel hämmästyneenä.
Everley selitti, että sosialistit koettavat järjestää ja kasvattaa
työväenluokkaa jouduttaakseen välttämätöntä taloudellista
muutosta. He haluavat ottaa maan ja kaivokset, rautatiet ja tehtaat
kapitalistien käsistä.
— Me katsomme, että sellaiset laitokset eivät saa kuulua
yksityisille, vaan koko kansalle. Silloin tulee työtä jokaiselle ja
jokainen saa täyden korvauksen työstään eikä kenelläkään ole
tilaisuutta elää tekemättä työtä.
Samuel istui hetkisen hiljaa selvitellen asiata itselleen.
— Mutta, huudahti hän hyvin ällistyneenä, sehän on aivan niinkuin
minäkin uskon.
— Luonnollisesti, vastasi toinen, se on aivan niinkuin te uskotte ja
se on sitä, johon terve järki uskoo.
— Mutta — mutta — änkytti poika. Olenko minä sitten sosialisti?
— Yhdeksänkymmenettäosaa kansasta koko maassa on
sosialisteja, vastasi Everley, vaikka eivät vielä ole itse havainneet
sitä.
— Mutta, huudahti Samuel, teidän pitää opettaa heitä.
— Me teemme parhaamme, sanoi Everley myhäillen. Tulkaa
auttamaan meitä…
Samuelia tämä hämmästytti.
— Mutta kuinka on kansa saanut näin väärän käsityksen
sosialisteista, kysyi hän.
— Kansan käsitys on sellainen kuin heidän herransa ja isäntänsä
haluaa kansalla olevan.
Samuel tarttui suonenvedontapaisesti tuoliinsa.
— Se on niinmuodoin liittoutumista! huudahti hän.
— Aivan niin, sanoi Everley. Se on hallitsevan luokan liittoutumista
kansaa vastaan. He omistavat sanomalehdistön, kirjat, yliopistot,
kirkot ja hallituksen, joiden kautta he puhuvat kansalle valheita ja
pitävät kansaa heille kuuliaisena.
Samuel seisoi naama naamaa vastaan kapitalismin äärimäisen
hirviön kanssa. Se on kyllä huonosti, että kapitalismi omistaa ne
varat ja välikappaleet, joilla kansan on elettävä, ja että se niiden
avulla nälällä kiduttaa ja hivuttaa työläisten ruumiita. Mutta että
kapitalismi omistaa heidän sielunsakin ja johdattaa harhaan heidän
henkisen elämänsä?! Pidättää heitä tieltä, jota myöten — kulkemalla
voisivat pelastua. Se oli hänelle aivan uutta, sillä se oli hänen
mielestään suurin kaikista rikoksista.
— Minä en voi tätä uskoa, sanoi hän mielenliikutuksensa takia
vaikeasti hengittäen.
Nuori lakimies vastasi levollisesti:
— Tulkaa ja työskennelkää kanssamme jokunen aika, niin saatte
sen itse nähdä.
XXIX. Sanomalehtiuutinen ja varotus.
Saavuttuaan kotiinsa sai hän kokea uuden yllätyksen, sillä siellä
istui hieno ja hyvin puettu nuori mies, joka odotti häntä saadakseen
puhua hänen kanssaan.
— Nimeni on Pollard, sanoi hän, "Lockmanvillen Sanomain"
toimituksesta. Haluaisin saada uutisen teistä.
— Uutisen minusta! huudahti nuorukainen hämillään. —
— Niin, haastattelun, selitti mr Pollard. Minä haluan saada vähäsen
tietoja siitä kokouksesta, jonka aijotte pitää.
Samuel tunsi itsessään samallaista järkyttävää tunnetta, jota
jokainen yhteiskunnallinen uudistaja sekä ennen että vielä
myöhemminkin on saanut kokea. Hän istui mrs Stedmanin pienessä
arkihuoneessa ja kertoi vielä kerran seikkailunsa. Mr Pollard oli aivan
nuori äskettäin yliopistosta saapunut sanomalehtimies ja hänen
lyijykynänsä liikkui nopeasti muistiinpanokirjan lehdillä.
— Karaistukaa, selitti hän. Tämä on huomiota herättävä asia.
Samuelille olivat nämät erinomaisia uutisia. Ne hämmästyttivät
häntä niin, ettei hän joutanut niitä lähemmin miettimään. Mitä se
kannattaa kutsua kokousta ja pitää puheita, kun voidaan saada asia
painetuksi sanomalehteen? Siitähän jokainen saa sen lukea ja
pääsee oikeaan käsitykseen kaikesta eikä tarvitse pelätä mitään
virheitä ja erehdyksiä. Sitäpaitsi lukevat ihmiset sanomalehtiä
vapaahetkinään, jolloin heillä on hyvää aikaa asioita perinpohjin
ajatella.
Kun mr Pollard oli lähtenyt, riensi Samuel suurimmalla kiireellä
puhumaan asiasta Everleyn kanssa.
— Teidän ei tarvitse painattaa kokouskutsumusta, sanoi hän, minä
kerroin hänelle missä kokous tullaan pitämään.
Everley vaan hymähti Samuelin kiihkolle.
— Me toimitamme kokouskutsumukset jaetuksi kuitenkin, sanoi
hän.
Odottakaa siksi kun saatte nähdä mitä "Sanomat" asiasta kertovat.
— Mitä ajattelette? kysyi Samuel. Everley ei halunnut selittää
ajatuksiaan lähemmin, vaan kehotti Samuelia odottamaan. Samuelin
uutiset eivät näyttäneet tekevän häneen sitä vaikutusta kuin niiden
olisi pitänyt tehdä, tuumi Samuel.
Samuel palasi kotiinsa. Myöhemmin iltapäivällä, kun mrs Stedman
oli mennyt myymälään ostoksille, naputettiin hänen ovelleen. Samuel
riensi avaamaan ja suureksi hämmästyksekseen näki hän Bill
Finneganin edessään.
— Hyvää päivää, nuori ystäväiseni, sanoi Finnegan.
— Hyvää päivää, vastasi Samuel.
— Mitä minä olen kuullut — sinähän aijot pitää puheen?
— Kyllä. Mutta mistä te sen tiedätte?
— Olen saanut tietää sen Gallaganilta. Slattery oli puhunut siitä
hänelle.
— Slattery? Hänkin on niinmuodoin saanut tietää siitä?
— Tuhat tulimmaista, luuletko sinä häntä puoluejohtajaksi?
Finnegan katsoi ympärilleen tullakseen vakuutetuksi siitä, että he
olivat kahdenkesken.
— Sammy, sanoi hän. Minä olen tullut luoksesi kaikessa
ystävyydessä antaakseni sinulle vihjauksen ja toivon sinulla olevan
kylliksi ymmärrystä selviytyäksesi puuhasta jälkeenpäin.
— Mitä se on? kysyi Samuel.
— Älä vaivaa itseäsi puhumalla kokouksessa.
— Minkä vuoksi en saisi puhua?
— Senvuoksi, ettei sinun sallita sitä tehdä.
— Mutta kuinka voidaan minua siitä estää?
Seurasi hiljaisuus silmänräpäykseksi.
— Se on hullua, mitä aijot tehdä, sanoi Finnegan sen jälkeen. Sinä
voit luottaa minuun, että sinulle tulee jotakin tapahtumaan, jos sinä
aijot jatkaa puuhiasi.
— Mitä saattaisi tapahtua?
— En tiedä, poika — ehkä putoat virtaan.
— Putoan virtaan?
— Niin, — tai saat lyijysateen kalloosi jonakin iltana jossakin
pimeässä kujassa. Minä en tosin voi sanoa sinulle mitä tulee
tapahtumaan, ainoastaan sen, että sinä et tule pitämään aikomaasi
puhetta.
Samuel tuli aivan hämilleen.
— Se ei voi olla teiltä vakavasti sanottua, sopersi hän.
— Kyllä varmaan. Miksikä ei?
Samuel ei vastannut.
— Minä en voi ymmärtää, minkätähden tahdot tehdä tämän, jatkoi
Finnegan, tai kuka on sinun takanasi? Sen mukaan kun minä
ymmärrän, olet sinä päässyt selville joistakin rumista asioista, joita
sivumennen sanoen, vähäsen on tässä kaupungissa: Slattery, Patt
Mc Cullagh, kaupungin valtuusto, Wygant, Hickman ja myöskin
Bertie Lockman — eikö totta?
— Kyllä! sanoi Samuel. Mutta siitä en minä aikonut puhua.
— Eivät he tiedä mistä sinä aijot puhua, mutta heillä ei ole halua
asettaa itseään hyökkäystesi alaiseksi. Tämän vuoksi ei aijota antaa
sinun ensinkään puhua.
— Mutta voiko todellakin sellaista tapahtua? kysyi poika
mielenliikutuksen valtaamana.
— Sellaista sattuu alinomaa ja sehän on aivan luonnollista. Eihän
kansa muuten tulisi käsittämäänkään sellaisia asioita ja puhuisi
niistä?
— Kyllä, luonnollisesti, vastasi Samuel. Ja se se juuri minua
suuresti hämmästyttää.
— Jaa, sanoi Finnegan, mutta heidän ei anneta ymmärtää sitä.
Etkö sinä sitä käsitä?
— Kyllä, minä käsitän, kuiskasi Samuel.
— Katsoppas, Sammy, on olemassa eräs nurkkakopla, joka
hallitsee tässä kaupungissa ja he aikovat jatkaa edelleenkin
hallitustaan. Etkö luule heillä olevan keinoja, joita käyttämällä saavat
tukituksi sinunlaiseltasi suun.
— Mutta, mister Finnegan, sehän olisi samaa kuin murhaa!
— No niin, sitä ei heidän kuitenkaan tarvitsisi itse tehdä, kuten kai
ymmärrät. Kun mister Henry Hickman haluaa saada kananpojan
päivällisekseen, ei hänen ole pakko itse vääntää siltä niskoja nurin.
Samuelilla ei ollut mitään vastattavaa tähän. Hän istui kauhun
valtaamana.
— Minä tunnen nämät hommat, näetkös, sanoi Finnegan, ja minä
haluan vaan antaa sinulle ystävällisen neuvon. Ja mitä saakelia
tarvitsee sellaisen poikanaskalin, kuin sinä olet, puuhailla toisten
hyväksi?
— Mitä minä muutakaan voisin tehdä? kysyi Samuel.
— Tehdä? Hanki itsellesi sopivaa työtä ja nai sellainen tyttö, josta
pidät. Sinä et koskaan tule oikein ymmärtämään elämää, ennenkuin
olet saanut itsellesi lapsia.
Samuel puristeli vain päätään, sillä tämä ehdotus ei häntä
miellyttänyt.
— Minä tahdon koettaa pitää itseni kaukana kaikesta puuhasta,
sanoi hän, mutta tämä puhe minun täytyy pitää.
Finnegan lähti tiehensä tuumivaisena puristellen päätänsä ja
mutisten itseksensä. Samuel kiirehti takaisin ystävänsä lakimiehen
luokse. Seurauksena tästä käynnistä oli, että Everley vaati häneltä
juhlallisen lupauksen, ettei hän mene ulos pimeän tultua.
— Minä muistan, mitä tässä kaupungissa tehtiin lakon aikana,
sanoi Everley ja minulla ei ole vähintäkään halua asettaa itseäni tai
jotakin toista vaaroille alttiiksi. Senjälkeen, kun lopetettiin täkäläiset
ammattiyhdistykset, olemme me ainoastaan täällä jälellä.
Samuel pysyttäytyi illan kotona ja kertoi Sofialle kaikki
kokemuksensa sekä kuvaili niitä ihmisiä, joita oli oppinut tuntemaan.
Tyttö oli aivan haltioissaan ihastuksesta.
— Ah, tiesinhän minä, että apu oli tuleva! Minä tiesin, että apu oli
tuleva! huudahteli hän.
Vaikka olikin hyvin väsynyt, saattoi Samuel tuskin nukkua
mielenliikutuksensa takia. Aikaisin aamulla nousi hän ylös ja meni
ulos ostamaan "Lockmanvillen Sanomain" irtonaisnumeroa.
Hän seisahtui kadun kulmaukseen ja aukasi sanomalehden. Hän
heitti silmäyksen "Sanomain" ensi sivulle — siellä ei löytynyt mitään
kokouksesta. Hän tarkasti takasivun ja senjälkeen sivun toisensa
perästä löytääkseen uutisen. Mutta hän ei löytänyt siitä mitään.
Silloin ryhtyi hän uudelleen lukemaan lehteä entistä tarkempaan,
tutki jokaisen otsikon, löytämättä sittenkään sitä, mitä etsi. Vielä
kolmannen kerran hän kävi läpi lehden lukien tarkasti läpi jokaisen
pienimmänkin uutisen, mutta turhaan. Kun hän näin oli kuluttanut
"Sanomain" lukemiseen tunnin aikaa löytämättä mitään, tuli hän
vihdoinkin vakuutetuksi, ettei hänen asiastaan ollut lehdessä
riviäkään.
Kun Everley sinä aamuna saapui konttoriinsa, tapasi hän Samuelin
eteisessä odottamassa. Nähdessään sanomalehden hänen kädessään
nauroi nuori lakimies.
— No, oletteko löytäneet uutista? kysyi hän.
— En, sitä ei ole täällä! vastasi Samuel.
— Minä arvasin hyvin, että niin sen kanssa tulee käymään, sanoi
Everley. Mutta minä katsoin parhaaksi, että te itse voitte hankkia sen
kokemuksen itsellenne.
— Mutta mitä se merkitsee? kysyi Samuel.
— Se johtuu siitä, että Lockmanvillen hallitusherrain koplalla on
satatuhatta dollaria kiinitettynä "Sanomiin".
Samuel ällistyi ja seisoi ystäväänsä tirkistellen.
— Nyt näette mitä se on, kun tahtoo olla sosialistina! sanoi Everley
nauraen.
Ja Samuel näki sen.
XXX. Samuel sosialistikokouksessa.
Samana päivänä illallisen jälkeen tuli Everley yhdessä Fredrik
Bremerin kanssa noutamaan Samuelia sosialistien kokoukseen, missä
hänen tuli kertoa seikkailunsa.
Kokous pidettiin pimeässä salissa ruokatavarakaupan
yläkerroksessa. Siellä olivat kaikki ne henkilöt, jotka Samuel oli tullut
tuntemaan edellisenä iltana, ja parisenkymmentä muuta henkilöä.
Useimmat heistä olivat ammattityömiehiä, mutta olipa joukossa
myöskin jokusia, jotka näyttivät hyvin toimeentulevilta
myymälänomistajilta tai kirjanpitäjiltä. Samuel pani merkille, että
kaikki kutsuivat toisiaan tovereiksi ja jokuset niiden joukossa
puhuttelivat häntäkin samalla tavalla, mikä herätti omituisia tunteita
hänessä. Kokoukseen tuli myöskin muutamia naisia, joista yksi toimi
puheenjohtajana.
Everley piti aluksi puheen sekä luki Samuelin kehotuksen samalla
kertoen mistä se oli aiheutunut. Tämän jälkeen pyysi hän Samuelia
astumaan esiin. Nuorukainen sävähti. Hetken kuluttua valtasi hänet
kuolettava kauhistus. Ajatus, että jos hän kaikkien näiden
henkilöiden läsnäollessa ei voisikaan puhua, tunkeutui hänen
Welcome to our website – the perfect destination for book lovers and
knowledge seekers. We believe that every book holds a new world,
offering opportunities for learning, discovery, and personal growth.
That’s why we are dedicated to bringing you a diverse collection of
books, ranging from classic literature and specialized publications to
self-development guides and children's books.
More than just a book-buying platform, we strive to be a bridge
connecting you with timeless cultural and intellectual values. With an
elegant, user-friendly interface and a smart search system, you can
quickly find the books that best suit your interests. Additionally,
our special promotions and home delivery services help you save time
and fully enjoy the joy of reading.
Join us on a journey of knowledge exploration, passion nurturing, and
personal growth every day!
ebookbell.com

More Related Content

PDF
compo 131_banalnal
PPTX
14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx
PPT
Network in brief
PPT
Ccna day1
PPT
C C N A Day1
PPT
PPT
Ccna day1
DOCX
Computer network
compo 131_banalnal
14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx
Network in brief
Ccna day1
C C N A Day1
Ccna day1
Computer network

Similar to Bcit Citx1150 Structured Cabling Systems For Computer Networks Advanced Cabling Systems James Boulter (20)

PPT
What Is A Network made by Ms. Archika Bhatia
PDF
CCNA Report
PPTX
PPTX
98 366 mva slides lesson 7
PDF
Nt1310 Unit 8 Network Components
PPT
Chapter7 Computer Networks
DOCX
What is network architecture (full)
DOCX
Ethernet
PDF
Networking Basics
PDF
Introduction to Computer Networks: Basic concept of Computer networks Goals o...
PPT
1. computer networks u1 ver 1.0
PPT
Network architecture
PDF
Computer networking
PDF
Networking Standards ( Osi Layers )
PPT
5. telecomm & network security
PPTX
COMPUTER NETWORKS
PPTX
New microsoft power point presentation
PDF
Networking research — A reflection in the middle years
PPT
Computer Networking
PDF
What is network architecture
What Is A Network made by Ms. Archika Bhatia
CCNA Report
98 366 mva slides lesson 7
Nt1310 Unit 8 Network Components
Chapter7 Computer Networks
What is network architecture (full)
Ethernet
Networking Basics
Introduction to Computer Networks: Basic concept of Computer networks Goals o...
1. computer networks u1 ver 1.0
Network architecture
Computer networking
Networking Standards ( Osi Layers )
5. telecomm & network security
COMPUTER NETWORKS
New microsoft power point presentation
Networking research — A reflection in the middle years
Computer Networking
What is network architecture
Ad

Recently uploaded (20)

PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Complications of Minimal Access Surgery at WLH
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Institutional Correction lecture only . . .
PPTX
Cell Structure & Organelles in detailed.
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Lesson notes of climatology university.
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
01-Introduction-to-Information-Management.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
master seminar digital applications in india
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
Module 4: Burden of Disease Tutorial Slides S2 2025
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Complications of Minimal Access Surgery at WLH
human mycosis Human fungal infections are called human mycosis..pptx
Microbial disease of the cardiovascular and lymphatic systems
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Institutional Correction lecture only . . .
Cell Structure & Organelles in detailed.
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
VCE English Exam - Section C Student Revision Booklet
Computing-Curriculum for Schools in Ghana
Lesson notes of climatology university.
O5-L3 Freight Transport Ops (International) V1.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Final Presentation General Medicine 03-08-2024.pptx
01-Introduction-to-Information-Management.pdf
Supply Chain Operations Speaking Notes -ICLT Program
master seminar digital applications in india
Abdominal Access Techniques with Prof. Dr. R K Mishra
Ad

Bcit Citx1150 Structured Cabling Systems For Computer Networks Advanced Cabling Systems James Boulter

  • 1. Bcit Citx1150 Structured Cabling Systems For Computer Networks Advanced Cabling Systems James Boulter download https://ebookbell.com/product/bcit-citx1150-structured-cabling- systems-for-computer-networks-advanced-cabling-systems-james- boulter-48671976 Explore and download more ebooks at ebookbell.com
  • 2. Here are some recommended products that we believe you will be interested in. You can click the link to download. Critical Reading And Writing Libs 7001 Course Reader Bcit June 2018 Marian Gracias https://ebookbell.com/product/critical-reading-and-writing- libs-7001-course-reader-bcit-june-2018-marian-gracias-55074180 The Vanishing Half Brit Bennett https://ebookbell.com/product/the-vanishing-half-brit-bennett-46474494 The Vanishing Half Brit Bennett https://ebookbell.com/product/the-vanishing-half-brit-bennett-47740580 Bit By Bit English For Information And Communications Technology Doretta Ardu https://ebookbell.com/product/bit-by-bit-english-for-information-and- communications-technology-doretta-ardu-48058624
  • 3. Meet Claudie An American Girl Of 1922 Brit Bennett Laura Freeman https://ebookbell.com/product/meet-claudie-an-american-girl- of-1922-brit-bennett-laura-freeman-48687514 Between Never And Forever The Hometown Heartless Brit Benson https://ebookbell.com/product/between-never-and-forever-the-hometown- heartless-brit-benson-51020218 Bit Of A Blur Illustrated Alex James https://ebookbell.com/product/bit-of-a-blur-illustrated-alex- james-52093110 Bait And Switch How Student Loan Debt Stifles Social Mobility Robert H Scott https://ebookbell.com/product/bait-and-switch-how-student-loan-debt- stifles-social-mobility-robert-h-scott-53602214 Bait Stitch A Knitorious Murder Mystery Book 11 Reagan Davis https://ebookbell.com/product/bait-stitch-a-knitorious-murder-mystery- book-11-reagan-davis-54769516
  • 5. Gourse Manual Computer Systems Service Technician and Network Administrator Associate Certificate Programs STRUCTURED CABLING SYSTEMS FOR COMPUTER NETWORKS & ADVANCED CABLING SYSTEMS ctTxl 150 November, 2007 Prepared by: James Boulter Subject to change without notice CITXI 150 & CSST2150 Revision.doc AUIIIOR ] I ILE: lSBlr VEIIDOR cl IXr Rollt ltR CITX II50 STRUCIIJREO C6BLING SYSIt 11t27t2007
  • 7. Section 1 A C D Contents Rationale for standardization page B: ISO Open Systems lnterconnect Model Protocols page Channel Access Methods page E: Topologies F: Addresses G: lnterfaces Section 1 Summary page Section 2 Leqacv Networks A: Vendor & Function Specific Networks B: POTS Networks page C: Wide Area Networks page D: Legacy Local Area Networks section 3 Structured Cable System Standards page page pa9e Summary A: ISO 11801 (in brief) page B: TltuElA 5688 569, 606 and 607 in brief C: TIA/EIA 5688 (CSA T-529B) Document D: TIA/EIA 5688.3 page E: Colour Code for 25 Pair Metallic Cables F: Colour Code for Fiber Optics 5 page 7 10 15 17 23 26 30 Section 2 page Section 4 TIA/EIA 569, 606 and 607 Documents Section page 31 31 33 page 34 36 A: TIA/EIA 569 Summary B: TIA/EIA 606 Summary page C: TIA/EIA 607 Summary page D: Building and Electrical codes 3 Summary page Section 37 page 38 page 40 55 page 60 page 61 62 CITX1 150 & CSST2150 Revision.doc 4 Summary page page 64 83 101 page 107 110 -2- 11t27t2007
  • 8. Section 5 Section 6 A: B: Section 7 A: Section 9 t A: The Desiln prccess B: Request For eude C: Bid Cheddist D: Silng Forthe Fulrre E: The Estimate process F: The Rough ln G: The Finish page Section 5 Summary Cable lnstallation The Rough ln The Finish page Section 6 Summary UTP page page page page page page page page page 111 112 113 113 114 115 116 117 118 128 130 t General Considerations page 131 page 133 page 135 page 137 140 page 142 144 page 146 page 150 151 155 page 156 158 page 162 164 page 167 190 B: Terminating Telecommunications Ouilets C: Terminating B|X-type Hardware D: Terminating 11O-type Hardware E: Terminating patch panels page F: Terminating Grounding & Bonding CableJ Section 7 Summary page Section 8 A: Theory of Fiber Optics in Brief B: Special Handling Considerations C: Hardware Employed page Section 8 Summary page A: B: C: D: E: Section Toner and lnductive Chaser Linesman Test Set page Category Testing: Cable scanners Protocol Analyzers page Structured Cable System TestJ 9 Summary page CITX1 '150 & CSST2'150 Revision.doc 3 11t27t2007 Testinq Copper Networks
  • 9. Section 10: Cable Testinq With the Fluke DSP4000 A: Power Point: Cable Testing Section l l Troubleshooting A: B: C: D: E: F: G: H: t: J: K: Appendices A: B: C: D: Troubleshooting Principles Audit of the Network Network Documentation page Baseline studies of the Network Protocols and Software page Log Files page 6 Steps to Troubleshootin page Troubleshooting Hints page Network Specific Trouble Shooting Physical Tests page The Net Administrator's Too! box t page 181 Glossary Telecommu n ications Outlets Bibliography page Sources of lllustrations page page 195 page 195 196 page 197 198 198 199 200 page 2O2 206 page 217 220 page 233 237 238 page CITX1150 & CSST2150 Revision.doc 4 I 11t27t2007
  • 11. ) lf we want any two terminals to be able to communicate, regardless of the operating systems used, the machine language employed orthe media used as the channel between the devices, we either have to force allthe devices to use the same equipment, language etc., or create a standardized model. This model could then be used by allthe vendors and software developers as a standard "canvas" on which future development could be pursued. Prior to the development of the Structure Cabling System, every type of network had its own cabling requirements and topology. ln order to change the network topology or to upgrade the system, a new cable structure had to be installed; a costly project once the building is built. Many older buildings still have the remains of the previous networks, existing as unused wiring in the ceilings and walls of the structure. Many of the components of a commercial building have been standardized for years. The ac power outlets, plumbing, heating, ventilation and air conditioning, for example, have long been built to an acceptable standard. How often, for instance, do you need a power outlet and can not find one? Even the telephone company had a plan to adequately provide phone service to the current and future users of the office space. ln the 1970s and 80s, when computing cost went down and business started providing PC to the employees desk's, the need for a standard local network cabling system became obvious. The need to access mass storage devices, to communicate between users and to share expensive resources became a driving force behind the development of the Structured Cable System as we know it today. One of the earliest Local Area Networks in use for business was the IBM Token Ring network, which required IBM cabling in a ring topology, special IBM connectors, and, of course, IBM terminals and network controllers. Aside from difficulties arising from the physical ring required (such as growth and scalability), the user was restricted to IBM equipment and software only. Although this was good for lBM, it was not good for the user, or for the other software developers or equipment manufacturers. Wide Area Networks of the day tended to be point to point or multi-point tree structures. Again IBM with its' 3270 and System Network Architecture (SNA) networks tended to dominate the business world, at least in North America. Many companies combined a localtoken ring network, servicing branch offices, with a Point to Point network, accessing the main frame computer for the company. These networks tended to be unstable due to traffic patterns, bottlenecks and lack of redundant paths. All this was before the lnternet existed, and before the home computer market, and the public's interest in the lnternet, took off. A number of groups sought to develop a network model which would provide the software developers, the equipment manufacturers, and the physical medium companies a frame work of standard processes and interfaces. The ultimate aim was to allow a business to buy one vendor's software, run it on a second vendor's equipment, which was networked through a third vendor's carrier system. The earliest example of such as model was developed by the Defence Advanced Research Projects Agency of the U.S. Department of Defence. Their aim was to create a robust, multi-path network which could join a number of different computer platforms, using different machine languages, access methods and speeds, into a resilient network capable of withstanding an armed attack. The lnternet, as we know it now, is the direct result of the work done by Jon Postell and a multitude of other professional and amateur developers. A: Rationale for standardization l I CITX1 150 & CSST2150 Revision.doc 5 1112712007
  • 12. Unlike much software development today, DARPA used an open-source system of development, where literally anyone could suggest a method of achieving certain ends in a networking environment. Software developers could then work on the'idea (if it seemed feasible) and either the ideas would pan out, and become a standard, or would fall by the wayside. A 4-layer model was used to separate the various tasks required to set-up, maintain and clear the network connection. Figure 1-1 The DARPA 4-Layer Model u DARPA -Layer Network Model Layer 4 Host to Host Application Layer (roughly equal to Layers 7, 6 &5 of the O.S.l. Model) Layer 3 Transport Layer (Roughly equal to Layer 4 of the O.S.l. Model) l-ayer 2 lnternetwork Layer Rorghly equal to Layer 3 of the O.S.l. Model) l-ayer 1 Local Network Layer (Rorghly equal to Layers 1 & 2 of the O.S.l. Model) CITX'1150&CSS-.':: =:.::-:cc -6- 1112712007
  • 13. D The lnternational Standards Organization (lSO), a branch of the United Nations, has established a standardized model of communication between computers. lt is loosely based on the DARPA model, but has 7 layers rather than 4. This permits a greater refinement in the functionality of each layer. Structured Cable Systems use the OSI model as it has a separate layer for the physical network. 2 Structure and Function The OSI model has 7 layers, which defines the interfaces between the various functions. This ensures each layer can communicate with the layer above and below it. ln general each layer in one computer communicates directly with the equivalent layer in the second computer. For example, when a session is set up between 2 computers the Session Layer (Layer 5) of each computer communicate with each other. Some of the functions of each layer are given below. 3 Function These layers are implemented in different Protocol Stacks and hardware elements to different levels, with Users talking on the Application Layers at both ends, and routers, gateways, WAN and LAN components talking on varying layers during the course of the transmission. An example may be two letter writers, speaking different languages, communicate to each other only by using a number of interpreters and message handling groups. Each group would have specific functions such as changing English to Spanish, checking the spelling, signing the document and passing to the next group. The next group might do verification on the message, and generate an error number for the message, address an envelope, and then mail it. 4 The O.S.l. Lavers Layers 1 and 2 are the physical aspects of the OSI Model a) Phvsical Laver The Physical Layer is composed of the cables, connectivity hardware and transmission media and electrical functional and mechanical interfaces. This layer is responsible for the translation the data from its software, digitalform, into electrical or light pulses to send the message for a long distance. Active elements of this layer do not "read" any of the data stream, but only amplify or distribute the signal, and include devices such as repeaters, regenerators, and Hubs. Layer 1 also deals with connectivity issues such as the physical interfaces between devices, and is concerned with hardware construction, pin assignments, and level & type of signalling to be used. Connectors include DBg, DB15 and DB25 fittings, BNC connectors for the various coax cable types used in LANs, Centronics, Winchester, and DIN type connectors. Terms such as RS232C or V.35 refer to pin assignments and voltage levels on the various physical interfaces A whole range of Registered Jack (RJ) types exist, borrowing from telephone connectors and running on UTP (Unshielded Twisted Pair). RJ11 and RJ12 wired for USOC2 or USOC3 for phones, RJ31, RJ45, RJ48S, for various LAN implementations. Work area cords, between the PC and the UTP, are further modified to provide specific services such as T568A, 1OBaseT, MMJ etc. The Physical Layer interfaces upward with the Media Access Control sub-layer of Data Link Layer. Drawings of the major outlet configurations are given in the Appendix. 1 Purpose of the O.S.l. Mode! J C|TX1150 & CSST2150 Revision.doc 7 1112712007
  • 14. Layer 7 Application Layer Application Software (i.e. Excel, CAD), User application processes Management functions. Layer 6 Presentation Layer User Logon Network Redlrector, Encryptron and de-encryption Data interpretation Including format and code translation Layer 5 Session Layer Network security Virtual sessions Checkpoints Administration and control of sessions when multi-tasking Layer 4 Transport Layer Enor recognition & recovery Transparent data transfer End to End control Multiplexing & mapping Layer 3 Network Layer Fragmentation and re-assembly Routing and interpretation of network (logical) Swtching, segmenting, blocking Flow control addresses Layer 2 Data Link Layer Establish, maintain and release data links Enor & flow control on the physical medium Log cal Link Control (LLC) Med a Access Control (MAC) Serv ce primitives and handshaking Layer Physical Layer Physical link between HarCware addresses. Electrical, mechanical computer and the network & functional control of data circuits Figure 1-2 The O.S.l. 7-Layer Model CITX1 150 & CSST2'1 50 Revlsion,doc - 8 - 11t2712007 u
  • 15. The Data Link Layer serves two major functions, and can be divided into two sub layers, the Media Access Control (MAC) sub-layer, and the Logical Link Control (LLC) sub-layer. The MAC sub-layer is required to convert the software data stream from the upper layers in the work station into an acceptable form for the network in use. This includes packaging the information into an acceptable protocol frame, such as Ethernet (1EEE802.3) or Token Ring (1EEE802.5), and the creation of an error-detection value such as the Frame Check Sequence (FCS). The FCS is transmitted along with the frame, to provide a method by which the receiving device can verify the received message was error- free. The LLC sub-layer functions include addressing the frame to the correct hardware on the network. The MAC address, as used in Ethernet networks, is a unique 48 bit address which is burnt into the Network lnterface Card (NlC). The LLC is also responsible for maintaining the Link, the connection between the two devices. The LLC can do this by the transfer of positive acknowledgements (ACK), which may mean "your message received correctly", or negative acknowledgements (NAK), "your message received in errored condition". The LLC and MAC sub-layers have 4 control paths between them, called the Service Primitives, which operate in similar fashion to the modem handshake process. Both these sub-layers reside on the NIC board in every addressable piece of equipment on the network. Other Layer 2 equipment includes Layer 2 Switches, Multiple Service Access Units (MSAU) for Token networks, Wireless LAN transceivers, and Optical/Electrical converters for fiber optic media networks Layer 2 interfaces downward to the Physical Layer, the actual network cable or transmission media, and upward to the computer via the Network Layer. Layers 3 thru 5 are (loosely)the Network Operating System Layers c)Network Laver The first layer in computer RAM, this layer is responsible for translating logical addresses (user or computer name or the lP address) to the physical 48 bit MAC address by using "look up tables". lt also determines the routing path the data is to use and any fragmentation, bundling or re-assemble the data requires. Fragmentation is the process of breaklng a large amount of data; say a graphics file, into smaller packets for transmission on the network. Bundling refers to the grouping of multiple packets into a coherent form and in order. d) Transport Laver The 4th Layer is responsible for error recognition and recovery of the received data. lf the data was received with errors it is recognized here, and a recovery (retransmission of the same information) may be requested. An example of a protocol using this mechanism is Transmission Control Protocol (TCP). On the other hand, the information may not be important, and this layer could dump the message without advising the source. User Datagram Protocol (UDP) uses this mechanism. e) Session Laver This layer is responsible for name recognition, Network security and check point placing, and session establishment of a virtual connection. Name recognition is yet another address, this time the lnternet address, which gives the Domain of the LAN, etc. The three addresses a single work station may have include the user name (e.9. WWW.Microsoft.Com), the lnternet Address (e.9.213.127.89.70) and the NIC address (e.9.4D.23.A1.76.83.14). Network security is provided during the session setup, by the exchange of passwords and other encrypted mechanisms b) Data Link Laver CITXI 150 & CSST2150 Revision.doc I 1112712007
  • 16. Checkpoint placing is the process of allowing executable portions of applications to start working before the whole application is loaded. E.9., the Windows 95 logo "Starting Win 95" comes up long before the full application is loaded. As the load proceeds, other parts of the application may start working. The sending computer "places" these checkpoints, and the receiving computer reads them, and runs the executable portions. The Session Layer is also responsible for multitasking. Through the use of Source and Destination Port "well-known" port numbers, this layer can establish multiple sessions at the same time. An example could be running a Web-Browser and E-mail service while on the lnternet. Any new e-mail messages could be received (or sent) while still keeping access to a particular web-page for reading. Layers 6 & 7 are in the Local Operating System f) Presentation Laver The 6th Layer is responsible for Logon Security, data encryption, transmission coding, and redirection. Logon security provides access to the local computer functions, but is not related to network security. Encryption is the coding of data for transmission, which provides a certain level of security on the network as the user messages will not be sent in plain English. The Transmission code used may be either one of the ASCII codes, or EBCDIC coding. The transmission code determines the value of the bits used in a byte to represent letters, characters and control codes. The redirector is a part of the Network Operating System which determines if the users command requires network resources or local resources. This layer gets it's name from it's function, which is to present the operating system to the user, which may take the form of a command line interface (such as DOS or Linux) or a graphic user interface (a GUl, such as Microsoft's Windows). g)Application Laver The 7th Layer is the application seen on the screen, and includes games, word processors, spread sheets, graphics applications, etc. This layer is the direct interface upward with the user, and downward to the Presentation Layer. 1) Rules for communication A protocol is simply an accepted way of conducting an exchange of messages, which may or may not include user data. An easily understood example is the way Canada Postal Service (figure 1-3)wants us to address our letters. The address in the centre of the envelope is regarded as the Destination Address, and must include the postal code number, a city name, the street address and the recipient's name. A similar set of address data is placed in the upper left hand corner of the envelope, representing the source address. Lastly a message validation, the stamp in our example, must be stuck to the upper right hand corner. Without allthese things, in their correct location, the mail will not go through. What if you are sending a cheque to pay a bill? There are firm protocols regarding writing a cheque. You write the payee's name on one line, and write your signature on another line. You write out the amount of the cheque, both in words a,nd in numbers, and a valid date. Further, the cheque has to have your name and address, the name of the bank it is written on, and your bank account number. To ensure the money is applied to your account most of also include the return stub for the bill. All of these protocols have to be completed correctly in order for the goal, which is making your bill payment, is successful. Another example from everyday life is the protocol you use to greet your boss or your spouse. Do you shake hands with the boss and hug our spouse, or is it the other way around? What if the boss is the spouse? The correct protocol in this case could vary with conditions...are you at home or at work? ( t I CITXl 150 & CSST2150 Revision.doc - 10 - 11127t2007
  • 17. ln telecommunications, protocols are used to request diagnostics, send files, and cut steel. Long messages can be fragmented, encoded, scrambled, all before it leaves the clients office. Once this data string gets to the far end, the reverse process has to happen, in the same manner and order as the process occurred. Protocols have been developed to govern exchanges of all manners, and at different Layers with the OSI Model. Any one message, even "Good Morning" has to be packetized and depacketized, framed and sequenced, dissembled and reassembled under the same protocol rules. Otherwise the communication becomes chaos. The Adams Family '1313 Mockingbird Lane A group of protocols maybe visualized as a stack of building blocks of various sizes and shapes, each one performing the functions required by the O.S.l. Layer they operate on, joining the one below and the one above in a smooth transaction. Further, these protocol suites and their various component protocols can be placed within the OSI Modellayers as shown in Figure 1-4on the next page. 2) Protocol Enforcement A protocol is enforced on the network by the use of various Fields of information, with each field having a well defined location within the Protocol Header. For any particular protocol, the type of informatlon in each field is known by both the source and destination equipment. A field may be of a fixed length (many are 8 bits or multiples of 8 bits in length), or it may be of variable length, such as a data field. ln the Canada Post protocol illustration, the envelope could be considered the Header, and the three groups of information would then be the Fields. The source and destination address fields are of variable length and makeup, while the validation field (the stamp) has a defined length. Try sending a letter with too short a stamp field (that is, a stamp of too small a value) and the letter gets returned. Figure 1- 3 Envelope Protocol for Canada Posta! Service CITX1 150 & CSST2150 Revision.doc - 11 11t27t2007
  • 18. Samole TCP/IP Suite built on an Ethernet Notes: 1)Request For Comments (RFCr .L'r 3e= ^c caied are current standard numbers 2) Well-knownportaddressincludeT'a=; T;ci Control (Ctrl),Client(Cl),Server(Svr),andMessage(Msg) portnumbers. 3) Location of the Protocols in tre a:c,e S'. :e o agram does not implytheir locations in any particular implementation of a Protocol Stack. 7 Application Layer 6 Presentation Layer File Transfer Protocol FTP RFC 959 fIc 20 Clt121 Simple Mail Transfer Protocol SMTP RFC 821 TELNET Protocol RFC 854 Dynamic Configuration Protocol DHCP RFC ?? Cl 68 Svr 67 Domain Name System DNS RFC 1035 Simple Network Management Protocol SNMP RFC 1157 Msg 161 Traps 162 User Datagram Protocol UDP RFC 768 Transmission Control Protocol TCP RFC 793 lnternet Protocol IP RFC 791 lnternet Control Message Protocol ICMP RFC 792 Address Resolution ARP RFC 826 RARP RFC 903 Token Passing tEEE 802 5 Figure 1- 4 Partial TCP/IP Suite with RFC Numbers CITX1'150 & CSST2'153 Re, s 3^ :cc 12- 11t27t2007
  • 19. When a message is meant for Network delivery, the user message must pass through the various layers of the source protocol stack so that the final data stream placed on the Physical Layer can be read, accepted and passed up the destination's protocol stack for ultimate presentation to the destination user. As the message goes down the stack in the source equipment, each protocol used will add a header to the data, until Layer 2, which typically will add a header and a trailer. This process is called encapsulation, and the reverse process has to be performed by the destination equipment. There the destination's Layer 2 protocol reads the source's Layer 2 header and trailer, the destination's Layer 3 protocol reads the source's Layer 3 header, and so on. Each source Layer communicates its requirements to the equivalent destination Layer. The destination Layer then performs the function requested, such as "pass this message to your Web Browser" or "advise user of Ping status". Of course these messages are not in plain English, but are expressed as a bit code within some field of the header. The specific information in each Header is determined by the requirements of the protocol in use, and the requirements of the O.S.l. Layer the particular protocol is operating on. Figure 1-5 shows an IEEE 802.3 (Ethernet) frame with 6 fields, such as addressing, length of the data being sent, and an error- checking number. Ethernet is a Layer 2 protocol commonly used in Local Area Networks (LANs), having a number of "flavours" including 10-Base-2, 1O-Base-S, 10-Base-T, 10O-Base-T and Gigabit networks. The upper layer data section may be anywhere from 46 to 1500 octets long, and contains the headers for the upper layer protocols and eventually the actual information being sent. Figure 1-6 shows the location of the Ethernet header in relation to the complete serial string of data in the full frame. 7 0ct 1 oct 6 oct 6 oct 2 oct 46 to 1500 Oct 4 oct I r-"y", 2 ---->llayer3 ---l l"y"r4-l Layers 5, o & 7 Destination Address Figure 1-5 Ethernet Header Construction used in Figure 1-6 Figure 1-6 The Encapsulated Frame Structure used in Figure 1-7 4) TGP/|Pv4/1EE802.3 Protocol Stack As an example of the way a number of protocols are used in the same message, let us look at a typical LAN implementation, using Ethernet (IEEE 802.3) on the Layer 2, TCP/IP as Layer 3 and 4 protocols, and File Transfer Protocol (FTP) as the upper layer (5, 6 and 7) protocol in use. This particular implementation owes its structure to the DARPA model, with FTP functioning on the Host-to-Host Application Layer (DARPA Layer 4, OSI Layers 7, 6 and 5). Figure 1-6 shows the encapsulated frame structure used by the protocol stacks shown in Figure 1-7. t Layer 3 up headers and data CITXI 150 & CSST2150 Revision.doc Frame Check Sequence User Data (Request for file) - 13 - 11127 t2007
  • 20. FTP is a sample of a ClienUServer relationship. The Client requests a service, in this case delivery of some file, which resides on a FTP Server computer. The operation requires 3 basic operations, t namely the call set-up process, where the Client contacts the Server to set up a FTP session, a request for the transfer of a specific file, and the call clearing process. The frame of information placed on the physical UTP network will consist of 4 headers, one for each protocol used in the stack. The Headers will perform the necessary functions of each Layer to ensure communication. For example, the Ethernet Header will contain the source and destination MAC addresses and the FCS (as a Trailer), the lP Header will contain the Logical (lP) address, the TCP Header will ensure error-free delivery to the Session Port address, and FTP Headers will establish confirm the Source may access the Server, the file the Server has to look for, and other ClienVServer functions required. Sample Protocol Stack Using FTP. TGP/lP and Ethernet To other stations on UTP LAN To other stations on UTP LAN File Transfer Protocol Server FTP Traffic Control Port 20 Porl21 File Transfer Protocol Client FTP Transmission Control Protocol TCP Transmission Control Protocol TCP lnternet Protocol IP lnternet Protocol IP IEEE 802.3 Protocol Ethernet on UTP IEEE 802.3 Protocol Ethernet on UTP 100 BaseT LAN Figure 1-7 An lmplementation of TCP/IP on Ethernet C|TX1150 & CSST2150 Revtsion doc - 14 - 11t2712007 Layers 7,6&5 Layers 7,6&5 Traffic Port 2345 Layer 4 layet 4 Layer Layer I Layer 2 Layer 2 Layer 1 100 BaseT LAN laye( 1
  • 21. D: Channel Access Methods A Channel can best be understood as the path used to connect together the source and destination terminal equipment. lt is the physical path which joins two active devices in a network. An example would be a T.V. channel, where the desired show can be selected by choosing the correct channel, at the correct time. ln this example, the Channel supports many shows during the course of the day and the week, but only one show is on each Channel at any particular time. A T.V. show maybe sard to a Baseband signal, because each show gets the full bandwidth of the Channel while it is on. The Channel may also be described as a Time-Division Multiplexed channel, as each show has a specific time slot it may use, such as 7 to 8 PM on Friday nights. ln this example, the Channel could consist of the T.V. studio, an on-air radio transmitter, the receiver at a cablevision office, the translation equipment in the cable vision office which puts the signal onto the coaxial cable, which then provides cable T.V. service to its customers T.V. receiver. ln this example a number of Links (e.9. the coaxial link between the cable company and the home, or the on-air link) are used to form one Channel. A simpler example is the Channel between two people talking on the telephone. Here the links would be the subscriber's loop, trunks between the telephone switches, and possibly fiber optic undenrvater links for calls to other continents. The Channel would be all the links required to connect the two telephone sets together. A Channel may also be formed from a Broadband path. ln this case the path may divided into two by Frequency Division Multiplexing. Returning to the T.V. example above, the various government agencies have assigned a particular band of frequencies to the broadcast of T.V. signals. ln the case of Channels 2 to 6 they occupy the radio spectrum from 54 Mega-Hertz to 88 MHZ. This 34 MHz band is subdivided into 5 Channels of 6 MHz each, allowing 6 different shows to be broadcast simultaneously. Another example of Broad-banding a path is ADSL on a telephone loop. The loop can carry up to 1 MHz of bandwidth, but only 3 kHz are required to transmit the voice signal on a phone. The frequencies above this level may be used for a high speed digital signal, permitting both an internet connection and a telephone conversation simultaneously. Each signal occupies its designated frequency bandwidth, and does not use any of the other signal's frequencies. ln general, most Local Area Networks provide a single Channel, which has to be shared amongst all the users on the LAN. Most often this takes the form of a Baseband signal, with Time Division sharing of the Channel. ln order to gain access to the Channel for transmitting a message, a number of Channel Access protocols have been developed. The most common types are Contention Access, Poll and Select Access and Token Passing Access. 2) Contention: CSMAJCD The basic concept of contention access is that the first station to gain access to the channel gets the Channel, provided no other station is already using the channel. The most common implementation of this is on Ethernet networks, where contention is enforced by using Carrier Sense, Multiple Access/ Collision Detection. This access method is often used on Bus topology, where allthe work stations are required to share a common physical path to communicate. The contention part comes in the Carrier Sense process. Say Station A wants to gain access to the channel, itfirst has to "listen" on the channelto determine if any station is currently using the channel. lf the channel is already in use, the Station A will hold its transmission, but continue to listen. Once the previous message is sent, the Station A waits a short time (the "inter-frame time") and then starts sending its'message. Forthe duration of the message, which in IEEE 802.3 is a maximum of 1526 octets, Station A has sole use of the full bandwidth of the channel, a 100 MHz on Category 5e cables. At the end its message (or the maximum size frame), the Station A stops transmitting, and another station can then access the channel. 1) Definition of the Channel CITX1 150 & CSST2150 Revision.doc - 15 - 11t27t2007
  • 22. The second part of CSMAJCD is the multiple access characteristic of the protocol. All work stations have equal access to the channel; there are no priority stations or privileged stations which can preferentially access the channel. The third concept embedded in CSMfuCD is the process to be performed when a collision is detected. ln Ethernet, collisions are to be expected; there is no way to prevent two (or more) stations from trying to grab the quiet channel. The object is to ensure that the network can be restored to orderly operation when a collision does occur. This process starts when both colliding stations put out a jabber signal, which all listening stations will receive as a "collision detection" signal. The stations waiting for access to the channel will then delay trying to access the network for a random amount of time. The station with the shortest random time then accesses the channel and sends its message. 3) Poll and Select The Poll and Select method of gaining access to the channel requires a single Host or "master" station which controls all the communication on the network. The Tributaries or "drop" terminals can not initiate a call, but must be permitted to send or receive traffic. This style of access is often implemented on tree-topology. The Host performs a regular "Poll", which is similar to a roll call of all the drops, which ensures that the tributaries are active and capable of receiving or sending traffic. When a Tributary has to send a message, the Tributary will respond to its poll with a request to send traffic. The Host will permit the message to be sent, and either accept the message (if it is for the Host) or will buffer it for retransmlssion to another Tributary. lf the message is for another Tributary, the Host will "Select" the Tributary and forward the message on to the destination. Although common in Wide Area Networks, this form of Channel Access is not common in Local Area Networks except for the IEEE 802.4 Manufacturer's Automation Protocol, which is used to operate assembly line robotics. Poll and Select is most often implemented on networks with a Tree Topology. 4) Token Passinq The last form of channel access common in Local Area Networks is Token Access. Here an "ldle" token is passed from station to station in a predetermined order. lf a station has traffic to go, it will remove the idle token, and send out a "Data" token. complete with the information to be sent. Each station in turn will receive the data token, and pass the token onward if is not for that particular station. When the data token reaches its destination, that station will pass the message up its protocol stack. lt will also exchange the source and destination addresses in the data token, and mark the token as "Read". The read token then gets passed along to the remaining stations, eventually reaching the originator of the message. This station accepts the message. recognizes the read token as being a copy of its original message, thereby confirmlng receipt of the message at the target station. Token passing networks are often implemented on Ring topology, but are also possible on a bus ortreetopology. Token Passing networks tend to be more secure, and are popularwith banks and other organizations concerned with security An added feature of Token passing is that selected work stations can be prioritized, and capable of forc ng their messages to be sent ahead of another, lower priority station. CITXI'150 & CSST2'1 5i Re , s 31 ooc -16- 11t27t2007 t
  • 23. The topology of a network refers to the shape formed by the channels and the physical equipment, and takes two forms. The physical topology is defined by the physical relationship of the work stations and the physical media, whereas the logical topology is defined by the operational shape of the network. lt is common to find the physicaland logicaltopologies are different. See Figures 1-8 and 1-9 1) Phvsical or Loqical shape of the network #:r .CSMAICDoperation DroDs*rG by a GOmmOn but. .Collirion Detection ,, bus bpology .Carrier $enee .Multiple Access Figure 1-8 Ethernet on a Physical and Logical Bus .Physical medium, oo.axlal cable .Physical and logical .AIl nodes "home rull" to hub .Physical star topology, logica! bus topology .Recommended topology for structured cabling systems. .Conversion from star to bus CITXI 150 & CSST2150 Revision.doc Figure 1-9 Ethernet as a Physical Star and Logica! Bus at the hublconcentrator. .Commonly wired with UTP 17- 1112712007
  • 24. The Structured Cabling System defined by national and international standards states that the preferred physicaltopology is a Star, with the physical media connecting the various networked devices by cables which all home in on a common location. These "Home Run" cables are then cross connected to active centralized equipment which then provides the logical or operational shape of the network. ln older legacy type networks, the physical cabling had to support the physical and logical topologies of the network desired, but this meant that the cable structure had to be removed and replaced whenever the user wanted to change or upgrade the network. Many older buildings still have the obsolete cabling in place for the three or four networks which had been used previously. With the advent of a Structured Cable standard, the stake-holders in network, that is the cable manufacturers, the software developers and the computer hardware developers now have an established physical standard which they can aim their future developments towards. 2) Peers. Host (Master). Tributaries The type of workstations in the network will largely determine the logical topology of the network. Peers all have equal access to the network, which they share with other peers. Notice that this is a different use for the term peer than in the "peer to peer" network. With this definition of the term, even ClienUServer pairs on an Ethernet network are really peers, in that the server and client have to share the single bus channel with all the other stations on the LAN. A master Host station does not have any peers. Only the Host can initiate or fonruard traffic. ln this type of logicaltopology, the remaining work stations are called Tributaries (or slaves). Channel access is assigned by the Host during the polling process, which is when the Tributary polled may send traffic. The Host then will select the destination workstation for the traffic, and forwards the traffic to that station. Do not confuse Masterffributary relationships with ClienVServers. Clients on a LAN are capable of communicating with each other, without the need for a server and whenever they want, provided the transmitting station has access (CSMAJCD or Token passing)to the Channel. ln a Masterffributary relation, only the Master can initiate communication, using the Poll/Select access process, and total controlof the communication Channels is held by the Master Station on the network. 3) Point-to-Point Topoloqv The simplest network topology involves two stations connected together in a physical point to point circuit. The loglcal shape may take the form of a peer-to-peer, where either station may initiate a data transfer, or a Host/Tributary operation, where only one end can initiate the transfer. The actual data transfer can proceed in either direction in this case, but has to be initiated by the Host. A typical example would be a dial-up modem for lnternet access. The computer at home operates as the Host, dialling out to the Internet Service Provrder, establishing the connection, etc. The server at the ISP responds to requests from the Host, providing an lP address if Dynamic Host Configuration Protocol (DHCP) is used, and send ng request for web sites to the lnternet. Although point to point netvrorks seem to be a trivial example, most LANS use a point to point network to access the Wide Area Networks using bridges, routers, optical/electrical links, Asynchronous Transfer Mode equipment or SONET ln Figure 1-10 below Al and Bob have a point-to-pointrelationship. Provided the channel isfull duplex, Al and Bob may each transmit and receive signals simultaneously. The actual channel in this case may be as simple as ar Ethernet cross-over cable between the two NlCs on the stations, or as complex as the Publ c Svr tched Telephone Network, with all its multiple switches, trunks etc. The main characteristic is that onc€ ine ctannel is set up (say on the PSTN) only the two work stations are active on the channel. CITX1 150 & CSST2' 5l Re, s cn doc 18 - 11t27 t2007
  • 25. ln a multi-point network, a single Host (Master)work station broadcasts its Poll and Selection sequences to all active Tributaries. Each tributary will respond when it is polled, something like roll-call in school. And like public school, the tributaries (the students) are not allowed to speak (that is send traffic) unless permitted to by the Host (teacher). See figure 1-1 1 . The analog with a classroom breaks down here, because even if AI wants to talk to Bob, Al's traffic must first go the Host, then get redirected with a Select sequence to Bob. Bob can not respond directly to Al's message, but is also required to transmit to the Host for redirection. An example of this type of logical topology would be an airline reservation system. When Charlie a travel agent, has a ticket to buy, his work station has to wait until it is polled, when the request is sent to the Host. The Host would check the order, reserved the seat in its database, and then confirm the ticket purchase by selecting Charlie's workstation and sending back the confirmation number. The Host could also perform the poll/select process with a back-up host to ensure the main host has mirrored data in the back-up host. Figure 1-10 Point to Point Network 4) Multi-Point Topoloqv A physical bus topology is one where all the stations share a common channel. Unlike the Multi- point network above, there is no controlling Master, but any station on the bus can initiate a call at any time, provided certain channel access rules are followed. Ethernet (1EEE802.3 and Ethernet 2) is the classic bus network, and the channel access method is CSMAJCD. 1OBase2 (Thin-net or Cheaper-net) and 1OBase5 (Thick-net)are logically and physically a bus, where the media used (50 ohm coaxial cable) was used to link all the stations together. This physical topology was not easily scaled upward, and adding a drop between two existing stations often required new cabling. See Figure 1-12 Figure 1-11 Multi-point Network 5) Bus Topoloqv Cl'X''53 & CSST2'53 Re','s cr doc -19- 11t27 t2007
  • 26. ln Structured Cable Systems, the physical topology is Star wiring, with every station wired to a common location (the Telecommunications Room), where the logical bus operation is provided by an Ethernet Hub or a Layer 2 Switch. These Ethernets stilloperate as buses, but a physically wired as stars. The hub takes an incoming signal from one port, regenerates it, and sends it out to all the other ports. A Layer 2 switch reads the Media Access Control (MAC) address on incoming messages, and only foruvards the message to the port which has the required destination address attached to it. See Figure 1-16. The majority of Local Area Networks today are Ethernets, and many are still operated as physical buses, although new constructions are usually wired as stars. A physical bus network may also be operated as a Token Bus (using Token passing access), or a Tree or Multi-point network using Master/Tributary channel access. Figure 1-12 Bus Topology 6) Rinq Topoloqv Ring topologies where once very popular as Local Area Networks, especially with banks and other businesses where secunty is very rmportant. Rings were originally designed by lBM, to operate on Shielded Twisted Pair (STP ) cables which had only 2 pairs of conductors, or Twin-axial cables, which contained 2 coaxial cables as a receive/transmit pair ln the Ring, the message is passed from station to station, in a circular pattern. Each station in turn reads the message, anC passes the message on if the message is not for that particular station. Once the message reaches iire :arget station, the message is passed up the receiving station's protocol. A duplicate "Read" message ls iren placed on the ring, targeting the original transmitter. When the originaltransmitter receives :re -Read" message, it gets confirmation that its message was received error-free. Rings normally have a Token Passing channel access, and are often referred to as Token Rings, where this term refers :o ihe logical topology and the access method of the network. See Figure 1- 13 AI Bob Charlie Router tr t-t Dave Server C|TX1150 & CSST215C Re. s r-r rcc -20- 1112712007
  • 27. The tree topology is not often found in Local Area Networks, except as automation robotics in industry. Stations on a Tree normally have a Masterffributary relationship, to provide for an orderly flow on information. An industry example could be a drug company using assembly line techniques to package their products. The company needs to count the pills, place them in a plastic container, top with a tamper- proof seal, screw the cap on the container, place a label on the container, and lastly place them in shipping container. Although these jobs could be done by hand, a more efficient and faster way would be through the use of a number of robotic machines, each performing a specific step in the process and controlled by the Master station. Networks of this variety could use IEEE 802.4 Manufacturer's Automation Protocol (MAP) as the Layer 2 protocol in use. An important Wide Area Network which uses this physical topology is the IBM 3270 system, which many banks still use as their chosen network to pass information between the tellers and work stations to the main-frame computer which handles all traffic control and central storage of transactions. See Figure 1-14. Figure 1-13 Ring Topology 9)) Tree Topoloqv CITX1 150 & CSST2150 Revision.doc Figure 1-14 Tree Topology -21 - 11127t2007
  • 28. 8) Mesh Topoloqv Mesh topologies are not often found in LocalArea Networks, as the main benefit of this shape is the redundancy in paths. For example, in Figure 1-15 below every node has a direct connection to every other node. Say the channel between Node A and Node B goes down (fails), the two nodes could still communicate by sending their messages to Node C or Node D, with a request for redirection to the destination. A few uses for this topology in a LAN would be to join sub-networks together using routers with redundant paths, or the use of mirrored Servers. A variety of channel access methods could be used in these networks, including Master/Tributary protocols and Token passing, but due to the multiple channels involved (6 in Figure 1-15), Point to Point protocols between each pair of Nodes is most common. Node A Node C Node B Node D Figure 1-15 Mesh Topology 9) Star Topoloqv The star topology is the chcsen physical shape that Structured Cable Systems take, because this physical topology is capable of supporting all the other forms of logical topologies currently deployed. A star shape will provide every work-station with direct link to a central location. From this location, the links can be joined together us ng an Ethernet Hub into a logical bus, using a Token Ring hub (also called a Multiple Station Access Unit N{SAU)to create a logical ring, ora Hoststation and clustercontrol equipment to create a logical tree Of course, point-to-point networks can also be supported. A few varieties of netwcr<s ',rcrk in a logical star, including E-mail servers, and the telephone system. Plain Old Telephone Sys:ems (POTS)for example, requires that every telephone set is connected bya dedicated linx,subscriber's loop)tothe CentralOfficeforswitching. See Figure 1-16. Figure 1-16 Star Topology Network tr - tr : C|TXI150 & CSST215C R.:, s r^ 3cc -22- 1112712007 t
  • 29. F: Addresses ln order to provide a reliable connection between two devices on a network, a number of address types are required. These addresses should be unique to the network, and may in fact be globally unique. The Physical address resides on the Data Link Layer (Layer 2) of the O.S.l. model, and its'function is to identify the physical path or the attached equipment which must be accessed for communication to start. On an Ethernet LAN, for example, every Network lnterface Card (NlC) has a globally unique address, the Media Access Control (MAC) address, a 48-bit identifier burnt into the NIC card, which can not be changed. lt is the responsibility of the NIC Manufacturers to ensure no two NlCs have the same MAC address. The fist24 bits of the MAC identifies the manufacturer, and the remaining 24 bits are a kind of serial number for that specific card. Modems also have physical addresses, although they do not require a globally unique address, as modems generally only participate in Point-to Point networks (such as an on-ramp to the lnternet), and as only two devices are communicating, both devices can recognize the source and destination of every message. The POTS network also has a unique physical address for every one of its subscriber, namely the physical cable between the subscriber and the Central Office. A typical physical address for the telephone would be the cable number and pair that a particular telephone was connected to. The Cable may support a number of houses or businesses, or it may only support a single building, such as an office tower or an apartment. Cable 1234, pai 14 may go to Apartment2O4, while cable 1234, pair 15 serves Apartment 205. It is important to understand that the physical address identifies a physical location of the equipment. ln the POTS example above, say Al moved outof 204, and wanted to take his telephone number with him. The new occupant of 204 would get a different phone number, but would be assigned the same physical pair Al formerly used. 2) Unique Network Address (Loqical Address) 1) Unique Physica! Address (MAC) As we can see in the above paragraph, we will need a second address, one which is portable, that the user can carry with them, even when they move. ln the case of the POTS network, this is the phone number that the telephone company has assigned the subscriber. Say Al's phone number was 604-525-1234 when he lived in 204. Now that he has moved into a house, he wants to retain the same phone number, so his friends and business acquaintances can call him. This calls for a unique logical or network address which to a large degree can be made portable. This type of address may be globally unique, or just locally unique, and resides on the Network Layer (Layer 3) of the O.S.l. Model. For example, the phone number 525-1234 may exist in Alberta, but its area code will be 403. The POTS network can differentiate between 604-525-1234 in Vancouver and 403-525- 1234 in Alberta by looking at the full address. The most common type of logical address used today is the lnternet Protocol address, a 32-bit address, usually express as a dotted decimal. An example would be 197 .45.223.18. As diagrammed earlier, the lP protocol resides on the Network Layer, above the Physical and Data-Link Layers. When an lP datagram is placed on the lnternet, the routers will check the lP address, and forward by the fastest or shortest means to the destination network. Once the message has been received by a router attached to the target network, the router must use an address resolution protocol such as ARP to map the logical, 32- bit address, to the physical 48-bit address for final delivery of the message to the correct workstation. CITXI 150 & CSST2150 Revision.doc -23 - 11127t2007
  • 30. The use of the two addresses in conjunction with each other permits the user to change their physical location or change the attached NlC, and still retain the logical lP address. lf the user wants to take her lap{op home with her, and move from her work network (and her assigned lP Address) to her home network, the logical address will change, but the physical address will not, and she has the ability to participate in two different networks, albeit at separate times. Many logical addresses are assigned on a temporary "as required" basis. As an example, lP uses Dynamic Host Configuration Protocol to "lease" lP addresses to work-stations that do not require a permanently assigned logical address. Below are shown the Logical and Physical Addresses in three separate communication systems. Figure 1- '17 shows the two address types as they apply in the Telephone Network. The physical address used is the cable and pair number of the subscriber's loop. An alternate physical address could be the physical termination of the loop to the telephone switch at the exchange. The Logical address is the subscriber's phone number. Figure 1 -17 Physical and Logical Addresses in the PSTN Figure 1- 1B shows the logicaland physicaladdresses used in TCP/IP on an Ethernet LAN. Here the physicaladdress resides in the NIC card at layer2, and logicaladdress is on Layer 3. An additional logical address resides on the layer 415 boundary (the "well-known port" number) which allows the PC to multi-task different upper layer protocols. The use of lP logical addresses is best seen in the operation of Dynamic Host Configuration Protocol (DHCP). Many nelworks have more workstations than they have lP addresses, and rather than permanently assigning lP addresses the address is "leased" for a short duration to a work station as required. ln this case, the same workstation may have different lP address each day of the week. There is no fear that messages will get lost. as the physical (MAC) address does not change, and it the Router on the LAN maintains an Address Resolution Protocol (ARP) table mapping the permanent MAC address to the temporary lP address ARP is of course, the protocol used to maintain this table. I ( EE tltl : r--T---T--t F++t Physical Address Cable 4785APair 127 Logical Address 604-555-1234 CITX1 150 & CSST215C Rev s on doc -24- 1112712007
  • 31. I 7 6 5 4 3 2 1 O.S.l. Stack Transmission Control Protocol Figure 1-19 shows the physicaland logical addresses used by the post office. Here the physical address is the street address and city, while the logical address is the name of the source and destination people. lf the person moves, the mail will still go to their old address, unless they pay to "redirect" their mail to their new location, a human process which is similar to ARP mentioned above. I Figure 1-18 Physical and Logical Addresses in Ethernet & lP LogicalAddress 216.34.56 Physical (MAC) Address 00c4. 2947.a347 The Adams Family 1- i 1313 Mockingbird Lane i I Crr.pysville I i I'tortt., Dakota i i osast I Figure 1-19 Physical and Logical Addresses in the Post Office World C|TX1150 & CSST2150 Revision.doc Destination Physical Address Field (Street etc.) -25 - 1112712007
  • 32. G: lnterfaces 1) Electrical. mechanical and functional interfaces An interface can be viewed as any boundary between two devices, or software layers. Networking requires crossing many such boundaries, and the hardware and software developers have to meet the standard for each interface the code or equipment crosses. An interface may be a physical connection such as the RS-232 serial interface used in modems or the NIC interface for an Ethernet network, or a software connection like the boundary between the Transport and Session Layers, which uses well-known port address to provide multitasking capabilities. The interface may provide for common electrical parameters such as voltage levels, line code type used (i.e. definition of a logic zero or a logic one), speed and pulse shape, to ensure all devices attached to the channel "speak the same language". The mechanical shape of the physical connection is also standardized as to its shape, size, number of connectors etc. The T568A outlets used in UTP networks provide a ready example, as do the IBM data connectors used in legacy networks. Lastly, the functional use of the physical connections (for physical interfaces) or the Application Program lnterface (APl) handles must also be standardized. An example of this type of standardization can be seen in the software boundaries between the various layers in the O.S.l. model. A programmer can write any code they want which is sufficient to do the job, so long as it meets the next layer in the proscribed manner. 2) Tvpes of Mechanical lnterfaces a) T568A and T5688 Telecommunication Outlets Structured cable systems based on 100 ohm UTP cables have been standardized to the use of an 8-position, 8-conductor lnsulation Displacement Connector (lDC) which resembles a standard household telephone outlet, but with more conductors. Both the T5684 and T5688 use the same physical hardware (often mistakenly called a RJ45 jack), but the cable conductors are wired in two different configurations. The T568A outlet is used in the lnternational and Canadian standards, while the T5688 is an optional variant in Canada, and is most common in American businesses in the U.S.A. Both configurations provide for the termination of 4 physical pairs (8 conductors) in the outlet. See Figure 1-20. Figure 1-20 Four T568 Outlets in a Surface Mount Module CITX1 150 & CSST2150 Revision.doc -26 - 11t27 12007 r I t
  • 33. The Network lnterface Card for modern Ethernet networks is equipped with a T5684 or T5688 outlet in order to interface with the 100 ohm UTP physical network. Some NIC cards still have a BNC (50 ohm coaxial connector) for use with Thin-net coaxial networks. The NIC card provides the Data Link Layer 2 functions (e.9. the MAC address, calculating the Frame Check Sequence, etc.) and interfaces with the Physical Layer 1 of a metallic cable. The typical Ethernet NIC can transmit 10/100 Base-T in a serialfashion, using only two pairs, conductors 11 2 and 3/6 as a transmiUreceive pair. Some implementations of IEEE 802.3, such as 100- Base-T4 or 1000-Base-T, use all four pairs of conductors, send and receive data in parallel, 4 signals at a time. Some high speed networks even send full-duplex, which means that a single device can be transmitting at the same time as it is receiving a message from another computer. Other NIC cards may have coaxialconnectors for'10-Base-2,15 pin DB-15 connectors for 10- Base-S, 8p8c (telephone type) connectors for UTP networks, or twin-axial or STP connectors for IBM Token Ring networks. See Figure 1-21. b) Network lntedace Card t 1 0-Ease-2 IBM was one of the first large players in Local Area Networks, and produced a number of proprietary network systems such as the 4 Mbps and 16 Mbps Token Rings. This protocol has now been standardized as the IEEE 803.5. Originally, these networks were designed to run on shielded 2-pair cables. A special connector, the IBM Data Connector, was the physical interface chosen for these networks. Figure 1-21 NIC card with 3 different LAN interfaces c) IBM Data Connectors 10/1ll[-Ease-T lnterface (BpBc) t CITXl 150 & CSST2150 Revision.doc Figure 1-22Rack Mounted IBM Data Connectors -27 - 1112712007
  • 34. With the advent of the IEEE 803.5 protocol and UTP networks, equipment manufacturers developed baluns to the convert the unbalanced IBM equipment to work into a balanced 4-pair, structured cable system. d) Serial Peripheral lnterfaces A common interface found on tower computers is the DB-9 or DB-25 style RS-232 serial interface connector, which may be connected to a modem, or other serial device. lt may have between 3 and 25 active conductors, depending on the service provided, although most devices will use less than 9 conductors. See Figure 1-23. Additionalserial interfaces include the USB (Universal Serial Bus) connector, which can access many addressed peripherals on the same interface, and the V.35 high speed interface which may be found on carrier type equipment such as T-1 systems. ttttt fttt Figure 1-23 Serial DB-g lnterface e) Parallel Peripheral lnterfaces Most computers also have a parallel interface port, also on a DB-25 connector, which is used to connect to a parallel device such as a printer. Eight bits of information are sent to the printer at one time. Although highly efficient and fast, parallel transmission suffers from clocking issues if the physical link is too long. For this reason, parallel transmissions generally only occur on relatively short distances of perhaps a few hundred meters. See Figure 1-24. Figure 1 -24 Parallel "Centronics" type lnterface CITX1 150 & CSST2'l 50 Revision.doc - 28 - 11t27 t2007
  • 35. t Unlike the all the interfaces so far discussed, fiber optics do not have electrical characteristics. lnstead the light transmission characteristics become critical to the interface performance. A number of different types of connectors and splices for optical fiber are currently available, with the SC56B connector type being the preferred standard under TIA/ElA-5688. f) Fiber Optic lnterfaces t Figure 1-25 A Selection of Fiber Optic lnterfaces CITX1 150 & CSST2150 Revision.doc 1112712007
  • 36. Section 1 Summarv Commercial requirement for a standard phvsical network Recognized Media and Cable lnfrastructure Performance Standards Flexibility, Adaptability and Scalability Open Svstem lnterconnect Model 7 Layer Model Struitured Cable Systems are on Layer 1, the Physical Layer Network lnterface Cards are on Layer 2, the Data Link Layer Commu nication Protocols Agreed upon rules for communicating Frame and field enforcement Encapsulation ChannelAccess Methods Contention: Carrier Sense, Multiple Access/Collision Detection (Ethernet) Polland Select Token Passing Topoloqies Physical and Logical ToPologies Bus TopologY (Ethernet) Ring TopologY (Token Rings) Physical Star Topology (Ethernet) Phvsical and Looical Addresses Media Access Control address I nternet Protocol address lnterfaces Electrical, Mechanical and Functional parameters Physical and Software lnterfaces T5684 and T568B Telecommunications Outlets 1 I E CITX1 150 & CSST2150 Revision.doc - 30 - 11t2712007
  • 39. Prior to the advent of inexpensive desk-top computers in the 1980s, the only Local Area Networks which existed were either Token Ring networks (at 4 Mbps), sometimes built from dumb terminals, or point-to-point networks (up to 9.6 kbps) built up separately with no interconnection between them. Banks and similar business would build an intra-building LAN which served their particular need, say the requirement to copy money transactions and to store the information related to each and every transaction. Memos and company directives were distributed by the company version of snail mail, consisting of written memos sent to the recipients by the office mail delivery systems. Wide Area Networks supplemented the LAN by use of a single node in every office, which was connected to a main- frame computer at the (far-distant) head office by the use of a dedicated point-to-point modem circuits, or a multi-point networks using Poll and Select access protocols. These two networks would work in conjunction with each other to store daily traffic on the memory storage system of the LAN, with the wide area network transmitting the daily information to the main frame by use of the WAN network after business hours. Whatever the source of the cabling, these early networks were vendor and function specific, and a cable structure built for a specific vendor or product could not normally be adapted to another network topology or protocol. B: POTS Networks The other major network which existed at this time was the telephone network. During this time the phone companies provided the internal cabling in every business and residence requiring access the Public Switched Telephone Network (PSTN). The telephone companies in turn provided the telephone sets and in-building access to each phone set. The telephone system provided both voice and low speed data communication (rarely usable above 9600 bps) between sites. This early cabling, and the limited functionality of the network, is often referred to as the Plain Old Telephone Service (POTS). Features we take for granted now, like Caller lD, Last number redial and Call Forwarding, were not available As the main building cable installer, the telephone company provided the majority of media, in the form of non-category cables, which businesses tried to use to satisfy their need for networking. And as the only egress to the outside world, the telephone companies had a monopoly on access to the outside world. ln addition, if another WAN supplier was contacted, that supplier had to cable in an acceptable media for the network. A: Vendor & Function Specific Networks Leqacy Networks Figure 2-l ClTX1150 & CSST2150 Revision.doc POTS wiring in the Residence -31 - On Hook 48 VDC CO Battery o "8,s#ff{, a 1112712007
  • 40. As a result of these limitations and implementations, the physical media of these legacy networks which could be 2-wire STP, 2, 3 or 4-wire UTP cabling, or coaxial cable, still exist in a lot of older buildings. Structured Cable Systems cannot use the existing cable infrastructure because the cables fail to meet the performance standard required of modern high speed networks, and do not have the physical topology of required to support a Structured Cable System. When desk top computers became a common piece of equipment in the business world, the need for linking all the stations within a business became apparent, and the benefits of a LAN become more evident. The first advance of the LAN was the establishment of low speed Ethernet networks at 10 Mbps, These early networks supported what was then considered a High speed system, carried on 50 ohm coaxial cables. The individual stations could then update a local server with the day's action, which in turn could then be uploaded to the WAN as required. Advances in networking eventually lead to number of different physical media which would support the newer networks. As a result, many buildings have remnants of many former networking media, in the form of POTS cabling, coaxial cables and STP cables. These cables lie unused in the darker spaces of the building as the cost of removing the cables was seen as unnecessary by the user or building owner. r l.rid"tlttbd ?rtbd-trrrE t. tdd&k I6U?*S"a I C. Qs.d WrE' l5o4Hc&, xd'ldrird ur.l KIE Fda wql<kexptr ! ?61d<' s@ l&.-@6r, @ry?& er:e'cl& cAuirolr od6hDhreMd-Lbffi6 #h ffi R rd@*i* {Lrin{ s ,filn qw Fr iu6 & r@@ *F rvJo ?JP, @*'w e.r&i4r6*4ddre'rd?,@@iiq d{ Wrr €r6rro @*sr w[a6r66dlg ]$ N6*rs: %{ryrri{i%{w{r plr(*m$(wxrry lMllt|4a ea te 4 lffird, aalMrM wa roy w& l& &Brfd o8.vilr h UF Figure 2-2 POTS Colour Gode to Structured Cable Colour code The object of POTS cabling was to provide at least two pairs of conductors to every location where a telephone could be desired. The actual telephone locations were largely decided by the building contractor, with more or less adequate coverage. ln 8.C., the telephone companies started providing 25 pair cables to each phone location, which provided a large groMh factor to the phone, fax or data networks. Unfortunately, the POTS non-category cabling provided by the phone company will not support a 16 Mega-Hertz bandwidth required by lOBaseT networks. POTS cabling can be successfully used as the media to support T-1, lntegrated Services Digital Network (ISDN), and Asymmetric Digital Subscriber Line (ADSL) all of which run at 1.SMbps or less. I t CITXI 150 & CSST2150 Revision.doc -32- 11t27t2007 PAIF 3 T w[@6,ee R O(e6',/|tnKe
  • 41. Wide Area Networks (WAN) are considered to be any network with distances beyond those of the LAN or Municipal Area Networks. This is not just an arbitrary distinction. When analogue or digitaltraffic has to be carried for long distances, the protocols and equipment used in LANs will no longer work. For example, CSMA/CD can not function efficiently on a long Channel because of the time required for the signal to travel the great distances. CSMfuCD works on 90 meters because the delay times are around 2 microseconds. On a WAN of perhaps 1000 Kilometres, (e.9. Vancouver to Calgary)the delay times are upward of 20 milliseconds. Other issues also come into play, such as reshaping and re- amplifying the signal. Legacy Wide Area Networks often made only a single appearance in the subscriber's premise. The carrier company providing the WAN service would typically install a 4-wire pair (i.e. two twisted pairs of conductors) to a specified location where the modem, line driver or other electrical interface would be situated. This appearance would be connected to a particular station, which could act as a Tributary to the WAN, (Figure 2-3) or to some digital sharing device, which would split the incoming WAN to a number of local stations (Figure 2-4).ln either case, the local members of the WAN were limited to a few (often one) station. G: Wide Area Networks From Carrier Company Figure 2-3 WAN Tributary as Member of LAN From Carrier Company To l-AN Gateway Workstation to WAN C|TX1150 & CSST2150 Revision.doc Figure 2-4 Multi-drop Stations as Members of WAN nt 33- 11t27t2007
  • 42. D: Leqacv Local Area Networks 1) IBM Token Rinq on STP One of the first LANs in wide use was the IBM Token Ring, operating at 4 Mbps initially and later upgraded to 16 Mbps. Token Ring networks are still popular with banks and other businesses which are concerned with security issues. Legacy Token Ring networks appeared on a number of physical media, including coaxial cable, Twin-axial cable, and 150 ohm shielded twisted pair (STP) having 2 pairs. Adapters called baluns (for balanced unbalanced transformer) were developed to permit equipment designed to work into coaxial, unbalanced lines to operate on balanced twisted pair cables. 2) 10Base-2 and 10Base-5 The first versions of Ethernet were developed by Digital Networks, lntel and Xerox, the DIX version of Ethernet, now referred to as Ethernet 2. This legacy network was designed to work onto a 50 ohm coaxial bus backbone (the Segment). 10Base-2 was also called Thin-net or Cheap-net and was supported by a physically smaller cable running a maximum distance of 185 meters. The 2 in the name came from the approximately 200 meter segments permitted. 1OBase-S ran on a thicker 50 ohm coaxial cable, and often referred to as Thick-net. 1OBase5 networks could support 500 meter segments. Although no longer installed as segments supporting an active population of workstations, 1OBase5 is common as bridging network, joining distant 10 or 100 Base T networks together. 1OBase-2 and 10Base-5 networks required 50 ohm terminators on both ends of the cable segment, and all unequipped locations had to have barrel connectors rather than the tee-connectors commonly found. A common problem with these two networks was reflections on the line, caused by unterminated ends and open tees. These reflections would appear like traffic, causing echoes on the line and higherthan expected collision rates. Thesetwo LAN types have largely between replaced by 100 UTP Structured Cable Systems. Figure 2-5 10Base-2 and 10Base-5 Networks 3 I C|TX1150 & CSST2150 Revision.doc -34- 11t27t2007
  • 43. Since the 1970's, the use of customer owned telephone switches, called Private Branch Exchanges (PBX) have been an economical method of providing telephone service to business. One of the main ways businesses benefit through having their own PBX is by reducing the cost of leasing many expensive trunks to the premises. lnstead of having to provide a separate outside line to every employee, a smaller number of trunks would suffice to provide outside access to the user as required. Legacy and modern PBX systems used the Star topology to provide a single channel from the PBX to each telephone set. ln a way, the PBX cable topology supplied the model for Structured Cable Systems. 3) PBX telephone svstem *t Central Office PSTN Switch Figure 2-6 The PBX in a Business CITXl 150 & CSST2150 Revision.doc -35- 11t27t2007
  • 44. Leqacv Networks Function and Function Specific Built as required Public Switched Telephone Network (PSTN) Plain Old Telephone Service (POTS) Non-standard cabling and color codes Wide Area Networks Point to Point Dedicated Service Leqacv Local Area Networks Early Ethernet LANs 10Base-2 "Thin-net" '10Base-S "Thick-net" Private Branch Exchanges CITX1 150 & CSST2150 Revision.doc - 36 - 11127t2007 f
  • 47. Section 3: Structured Cable Svstem Standards By the mid 1980's businesses were starting to have a Personal Computer (PC) on their employees desks, and a need to network the work-stations together became apparent. The lnternational Standards Organization created from of a number of sitting committees and delegations from the various national standards organizations such as the Canadian Standard Association (CSA) and the American National Standards lnstitute (ANSI) took this matter into consideration. At the heart of this matter was the requirement for a standard physical cable structure which would support the current and future requirements of the LAN. Vendor and product specific cable types and topologies did not have the flexibility required by changes in technology, improvements in protocols or increases in user populations. Additionally, the business community was finding the cost of re-cabling their premises to support an improved LAN becoming excessive. The ISO realized that their 7-Layer Model required a standardized interface at the Physical Layer. After sessions with the software, hardware and cable manufacturers, an ISO standard, the ISO 11801 , was created. This standard identifies the major issues of concern, including the need for establishing space requirements to support the LAN, adequate work area coverage to support current and future populations, a flexible topology, test parameters, grounding and bonding and a documentation process to record the "as-built" structure. This document was then taken back to the member nations, and eventually became, more or less, the national standard. All these documents are considered "living" documents, in that they are reviewed regularly, and updated to reflect the latest changes in LAN operation. A: ISO 11801 (in briefl i tso 1 . Purpose: - Defines an application independent open sydern - Definea a fledble oabling sheme suoh that modifioatlonE are bsth easr/ and economical - Prwides guidance br building proftEsionals to allor ficr a cabling infrastruc'ture beficre specific requirEmenE are knorn - Deflnee aoabling system that supporE curent applicdions and is a basis hrfuture product development for Customer Premisas Cabling 1 801 C|TX1150 & CSST2150 Revision.doc Figure 3-1 ISO 11801 Standard -37 - 11t2712007
  • 48. Figure 3-2 Relationship of National Standards to the ISO Standards CENELEC isthe standards body in France, and is used through mostof the French spe:' -; world. AS/NZS is the Australian & New Zealand Standards body. ANSI is the American Nationa Standards lnstitute, which has the Electronic lndustries Association (ElA)and Telecommunica:,-= lndustry Association as sub-committees. The lnternational Electronic Committee is the sub-cc--:== :' the lnternational Standards Organization which covers telecommunications. The CSA is the C=-.=:,=- Standards Association which establishes the standards for Canada. ln the case of Telecommunications standards, the CSA largely follows the TIAJEIA ::'::--*-= B: TIAJEIA 568B 569, 606 and 607 in brief ln America, ANSI turned the creation of a national standard over to the Telecom-'--,=:(:rs lndustry Association/Electronics lndustries Alliance (TIAJEIA), a sub-committee concerrs'; *T telecommunications and electronic matters. After consideration of the existing practices - --E - S : s group brought out a number of standards, which although approaching the ISO stanca-: r: 1- r-tl', agree with it. The four documents are concerned with the cable structure and compone-= tJ-rr-d -- create a structured cable standard. the building space requirements (largely for the bu ,: ni :rrlrP-=- grounding and bonding, and the record documentation process. ln Canada, the Canadian Standards Association (CSA) largely adopted the :.-ers: rnn -erts, with only a few changes reflecting current practices in Canada. These documents e-= =.a,#a= s ='ee through the CSA in Canada or the TlfuElA in the U.S. 1 ) Commercial Buildinq Telecommunications Cablinq Standa{ - ln Canada the CSA T529B document - ln Amerrca the TIAJEIA 568-8 document - Horizontal and backbone cable details - Topologies required - Establishment of rooms for specific network functions - lnstallationpractices - MethoCs of cross-connection cabling - Cable transmission and performance standards ClTX1150 & CSST215C Rev s c'r,ooc -38- a
  • 49. 2l - ln Canada the CSA T530-M90 document - ln America the TIA/EIA 569-A document - Acceptable pathways for telecommunication cables - Horizontaland Backbone pathways - Work area and furniture pathways - Telecommunication Room functions, size and locations - Equipment Room functions, size and locations - Entrance Facility functions, size, physicalaccess - Multi-residencebuilding considerations - Fire-stopping and Grounding concerns 3) Desiqn Guidelines for Administration of Telecommunications lnfrastructure in Commercial Buildinqs ) ln Canada the CSA T528-93 document ln America the TIA/EIA 606 document Administrative concepts and component identifiers Creation of permanent "as built" records Linking the records of physical components Presentation of records, reports drawings and work orders Pathway and Space administration Wiring system administration Grounding and Bonding administration Field labelling and colour coding 4) Commercial Buildinq Groundinq/Bondinq Requirements - ln Canada the CSA T-527-94 document - ln America the TIA/EIA 607 document - lssues with electrical grounding and bonding - Establishment of a separate grounding system for telecommunications - Use of grounding bus-bars and grounding backbone conductors - Labelling of conductors and components of the grounding system ) CITX1 150 & CSST2150 Revision.doc -39- 11t27t2007
  • 50. C: TIA/EIA 5688 (CSA T-529B) Document The main document of the four is the T-529B (TlfuElA 5688) document, which establishes good installation practices and the tests required to verify the passive cable structure will support the level of service it was designed for. This document was divided into 3 parts in the 2002 revision, with 568-8.1 covering copper cable concerns and 568-8.2 covering parameter testing of the copper systems. 568-8.3 covers the installation and testing of optical fiber cables, and is summarized later in this document. A few minor differences exist between the Canadian and American documents, which do not concern us here. The following is a summary of the TIA/E|A-5688 Part 1 Commercial Buildinq Telecommunications Cablinq Standard document, and as such is subject to errors of omission and interpretation. Where accuracy and completeness is required, refer to the original document. 1) Horizontal Cable The Horizontal cable extends from the W/A T/O to the Telecommunications Room (T/R) terminating hardware (Figure 3-3) Physicaltopology of the Horizontal cabling shall be a Star ("Home Run") Maximum length from T/O to terminating hardware shallbe 90 meters Recognized copper cables are -pair 100 ohm Unshielded Twisted Pair (UTP t Recognized optical fibers are 2 fibers of 62.51125 micron or 501125 micron lr4ul: - mode cable 150 ohm Shielded Twisted Pair (STP)although currently recognized, is not recommended for new installations Use of Consolidation Points (C/P) permitted Bridge taps, splices or splitters shall not be permitted on Horizontal cables Every work area shall have two Telecommunication Outlets, each suppcie: :.' 3 separate 4-pair cable, or by two optical fibers These two outlets shall support: One Category 3 or better cable, and be metallic, and One Category 5e or better cable, which may be Multi-mode Optica = :=- A single Consolidation Point or Transition may be used on the Horizc^:: :€:"= If Screened Twisted Pair (ScTP)used, the screen shallbe bonded ic 3 l=--: -l bus-bar Grounding and Bonding requirements shall meet TIA/ElA 606 stanca': e I 90 meters maximum Outlet to Terminating Hardware Leoend T.R. Telecommuni:dn W.A. WorkArea - 4-Pair Cat.3 l+ ----- 4-Pai Cai i= -: : - :- ()oitas :- _':- : -./ l ranstt or - :, - : Consc :=::t -: - X croa".o---, tr Figure 3-3 Horizontal Cabling to the Work Ate. CITX1 150 & CSST2150 Revision.doc - 40 - a
  • 51. 2) Backbone Gable - The Backbone cables shall be terminated in, and provide interconnections between; - The Telecommunications Rooms and the Equipment Room - The Entrance Facility (E/F)and the Equipment Room - Backbone cables may be provided between Telecommunications Rooms as required - Physical topology of the Backbone cabling shall be a hierarchical Star (Figure 3-4) - No more than two hierarchical levels of cross-connects permitted on Backbone cables - Cross-connects for the Backbone may be located in the T/R, the E/R or the E/F E.R. Equipment R@m T.R. Tel@omm Rmm W.A. Work Ar€ MC Main Crcs-connet lC lntermediateCrcs-conn6t HC HorizontalCrGs-connmt X Cross-conn&t --l TerminatinoHardware ^. Teteommlouilet - Backbone Cable ----. Horizontal Cable Figure 34 The Hierarchical Backbone Structure - Recognized cables for Backbones are; 100 UTP 4-pair or Multi-Pair (25 pair or more) r.n. srf{._s*onaary/ t.".? 62.51125 micron or 501125 micron Multi-mode optical fibers Single-mode optical fi bers Backbone cables should be sized to meet current and short-term future requirements Backbone cables may be installed in phases as required When different backbone media are used, the media shall share the same topology and physical locations - Maximum Backbone length are application and media dependent All Category 3 or Category 5e cables for data are 90 meters maximum A 5 meter cord for interconnection is permitted at each end of the Backbone Category 3 or 5e cables used for voice service are 800 meters maximum 62.51125 micron multi-mode optical fiber cables are 2000 meters maximum Single-mode optical fiber cables are 3000 meters maximum (Figure 3-5) - The distance between the E/F and the Main cross-connect shall be included in the distance measurements when required by regulatory policies - Cross-connect jumpers and patch cords shall not exceed 20 meters at either the Main cross-connect or at the lntermediate cross-connect - Grounding and Bonding requirements shall meet TIA/ElA 607 standard CITXI 150 & CSST2'l50 Revision.doc - 41 - 1112712007
  • 52. ) Figure 3-5 Backbone Media Maximum Lengths 3) Work Area - Location of the user, measuring 10 square meters or 100 square feet - Requires two telecommunications outlets One category 3 or better metallic cable (normally for voice service) One category 5e or better, which may be two multimode optical fibers (normally for LAN) - All 4 pairs of the horizontal metallic cable shall be terminated at the modular outlets Figure 3-6 T568A and T5688 T/O Configurations ) I Media Tvoes and Distances Media A B MC !c HC Entrance Point or Demarcation Point Main Cross-connect I ntermed iate Cross-connect Horizontal Cross-con nect UTP Data UTP Voice Multi-mode Single Mode 90 meters 800 meters 2000 meters 3000 meters 500 meters 500 meters 500 meters 300 meters 1500 meters 2500 meters 12345678 W-G G W-O BL W-BL O W.BR BR 12345678 W-O O W-G BL W-BL G W-BR BR Pair 3 r') Pai 4 a Pai 4 a Pat 2 a CITX1 150 & CSST2150 Revision.doc - 42 - 11t27t2007
  • 53. - Outlets supporting copper conductors shall be configured as T568A or T5688 outlets (Figure 3-6) - All outlets shall be 8 position, 8 conductor lnsulation Displacement Connectors Optical fiber T/O shall be a duplexed 568SC connector. Other outlet types may be considered - A Work Area cord connecting the T/O to work area equipment; Shall be 5 meters or less when no MUTOA is present Shall be equipped with identical connectors on both ends except where an application specific device is required. - Work area and Equipment cordage ("Patch Cords") shall be factory built off stranded copper conductors at, or above the Category rating of the Channel - Application-specific devices, (e.g. "Y" adapters, Baluns, pair transposition etc.) shall be external to the Permanent Link, that is, must be external to the Outlet. Figure 3-7 lmplementation of a Multi-User Telecommunication Outlet Assembly - Open Office cabling permits the use of a: A Multi-User T/O Assembly (MUTOA) (Figure 3-7 and 3-10) which permits a longer WA cord (Figure 3-8) or A Consolidation Point (C.P., Figure 3-9 and 3-10) which facilitates cabling flexibility - MUTOAs shall not extend the Channel length to more than 100 meters (i.e. they "an on-ly ertend the work area cord by reducing the length of the HorizontalCable. See Figure 3-8) - MUTOAs and Consolidation Points shall not be used to reconfigure or re-map the Horizontalcable la- WorkArea I ! CITX1 150 & CSST2150 Revision.doc -43- 11t27t2007
  • 54. Length of Horizontal Cables H meters (ft) 24 AWG UTP/24 AWG ScTP Patch Cords 26 AWG ScTP Patch Cords Maximum length of work area cable meters (ft) Maxtmum comotneo length of work area cables, patch cords and equipment cable c meters (ft) Maximum length of work area cable W meters (ft) Maxtmum comDtneo length of work area cables, patch cords and equipment cable C meters (ft) 90 (295) 5 (16) 10 (33) 4 (13) 8 (26) 85 (27s) e (30) 14 (46) 7 (23) 1 1 (35) 80 (262) 13 (44) 18 (5s) I I (35) 15 (4e) 75 (246) 17 (57). 22 (72) 14 (46) 1 8 (5s) 70 (23o) 22 172) 27 (8s) 17 (56) 27 (7o) Figure 3-8 Maximum W/A Cord Lengths Supported by a MUTOA - MUTOAs and C. P.s can support a maximum of 12 work areas (i.e. 24outlets) - MUTOAS and C. P.s must be secured to a permanent building structure in an u nobstructed location. - MUTOAs must be accessible by the user - Consolidation Points shall not be accessible by the user - Work Area cords in a MUTOA implementation shall be identified at the equipment end with the T/O used, and at the T/O end with the work area the cord serves - Sample maximum lengths of copper WA cords are given in Figure 3-8 - Maximum length of optical fibers used in a MUTOA shall not be reduced (i.e. maximum total length, including the two patch cords, shall be 100 meters) - C. P.s shall not be located within 15 meters of the Horizontal cross-connect Figure 3-9 lmplementation of a Consolidation Point t I ! Equipment cable Patch cords/Jumpers '15 meters minimum ! ! l.1- WorkArea -----1 Horizontal Cabling --+ C|TX1150 & CSST2150 Revision.doc -44- 11127t2007 I
  • 55. Random documents with unrelated content Scribd suggests to you:
  • 56. Kun Sofia illalla tuli kotiin, oli Samuel jo tyyntynyt. Hän kertoi seikkailuistaan tytölle äänen hiukkaakaan värähtämättä. Ja se oli onneksi, sillä koskaan ei hän ollut voinut uneksiakaan aiheuttavansa tytössä niin voimakasta mielenliikutusta, kuin kertomus aikaansai. Miss Glady oli ollut Samuelin viimeinen toivo, mutta Sofialle oli hän ollut ainoa ihanne. Tytön koko olemuksen täytti riemu siitä, että sai työskennellä miss Gladyn hyväksi, ja kun hän nyt sai kuulla, miten Samuelia oli kohdeltu, meni hän surusta melkein pois järjiltään. Samueliin vaikuttivat hänen voimakkaat nyyhkytyksensä pelottavasti. — Rakas Sofia, sanoi hän kiertäen kätensä tytön vyötäisille, me emme saa unohtaa velvollisuuttamme. — Minä en enään voi mennä sinne! huudahti lapsi poissa suunniltaan. Minä kuolisin, jos minun täytyisi vielä nähdä hänet. — En minä sitä tarkoita, sanoi Samuel nopeasti koettaen johtaa hänen ajatuksiaan muihin asioihin. Mutta sinun täytyy muistaa, mitä minun on tehtävä, ja auttaa minua. Hän kertoi suunnitelmistaan nousta taisteluun Pyhän Matteuksen kirkon omistamisesta. — Emmekä me saa antaa katkerien tunteitten vaikuttaa itseemme, sanoi hän. Olisi kovin syntistä, jos me työskentelisimme vihassa. — Mutta miten voit sinä hillitä vihaasi? huudahti tyttö. — Se on kyllä vaikeata, mutta minä olen taistellut itseni kanssa. Me emme saa vihata noita ihmisiä. He ovat tehneet meille pahaa,
  • 57. mutta he eivät sitä huomaa, he ovat kurjia ihmisolentoja kuten me muutkin. — Mutta he ovat huonoja, itsekkäitä ihmisiä! huudahti lapsi. — Minä olen paljon ajatellut sitä asiaa, sanoi hän, minä olen koko päivän kulkenut kadulla ja miettinyt sitä. Enkä minä salli itseni tuntea heitä kohtaan muuta kuin sääliä. He ovat tehneet minulle vääryyttä, mutta se vääryys ei ole mitään sen vääryyden rinnalla, jota he ovat tehneet itselleen. — Oi, Samuel, kuinka sinä olet hyvä! huudahti Sofia, ja Samuel hämmästyi, sillä juuri samaa miss Gladykin oli sanonut. — Minun täytyy olla selvillä itsestäni, ja nyt minä olenkin. Minun on välttämätöntä taistella heitä vastaan, mutta minun täytyy samalla olla varma, etten anna omalle kostonhimolleni valtaa. — No, mitä aijot tehdä? kysyi Sofia. — Minä esitän asian seurakunnan jäsenille. Elleivät he halua mitään tehdä, niin esitän asian kansalle. — Mutta millä tavoin, Samuel? — Kutsun kokouksen. Katsos, tämän minä olen kirjoittanut. Hän otti taskustaan paperin, johon suurin kirjaimin oli kirjoittanut: "PYHÄN MATTEUKSEN SEURAKUNNAN JÄSENILLE. Kirkossa vallitsee lahjomisjärjestelmä. Muutamat kirkkoneuvoston jäsenet ovat lahjoneet kaupungin hallitusta.
  • 58. He varastavat kansalta. Kirkkoneuvosto on kieltäytynyt kuulemasta minua ja sulkenut minut kirkosta. Minä vetoon seurakuntaan. Ensi keskiviikkona kello kahdeksan illalla puhun minä eräässä kokouksessa rakentamattomalla tontilla kirkon vastapäätä ja kerron mitä tiedän. Samuel Prescott." — No, mitä aijot tehdä tällä? kysyi Sofia hämmästyneenä. — Aijon antaa painaa sen pienille paperilipuille ja jakaa ne ihmisille, kun he huomenna aamupäivällä tulevat kirkosta. — Oh, Samuel! huudahti tyttö pelästyneenä. — Minun täytyy tehdä niin. — Mutta, Samuel, joka ihminen tulee kokoukseen, väkeä joka puolelta kaupunkia. — Sitä en voi auttaa, vastasi hän. Minulla ei ole rahaa vuokrata huonetta eikä minun annettaisi puhua kirkossa. — Mutta voitko sinä saada tämän niin pian painetuksi? — En tiedä. Täytyy ottaa selvää, kuka sellaisen työn ottaa suorittaakseen. — Oh, minä tiedän! huudahti Sofia taputtaen käsiään. Fredrik Bremerillä on painokone. — Mitä sanotkaan!
  • 59. — Niin, hänen isällään oli tapana tehdä painotöitä. Meidän täytyy kysyä heiltä. He kiirehtivät, suomatta itselleen aikaa edes syömiseen, Bremerille; ja vanhemmat ja lapset kuuntelivat ihmeissään Samuelin kertomusta. Fredrik kiihtyi kovasti, vanhan Johanin punaiset kasvot hehkuivat. Hän ja hänen lapsensa auttoivat, eikä viipynyt kauvaa, ennenkuin Samuelin julistus oli painettu. Oli jo myöhäinen ilta, kun molemmat lapset astelivat kotiin mukanaan kolmesataa kappaletta vallankumouksellista julistusta, jotka olivat huolellisesti käärityt, jottei kukaan voisi niitä nähdä. Tässä toimessaan he aivan unohtivat miss Gladyn. Vasta kun Samuel yritti nukkua, alkoi hänen mielessään taas väikkyä miss Gladyn kuva, ja kaikki hänen suloiset toiveensa heräsivät ja alkoivat ilvehtiä hänen kanssaan. Mikä narri hän oli ollutkaan! Kuinka mahdottoman hulluilta tuntuivatkaan hänestä nyt kaikki aikaisemmat kuvitelmat. Näin vietti hän vielä kerran unettoman yön vaipuen vasta päivänkoitteessa levottomaan uneen. Vajaan tunnin ennen jumalanpalveluksen päättymistä asettui Samuel vastapäätä kirkkoa toiselle puolelle katua. Hänen sydämmensä sykki voimakkaasti. Hän tunsi, se täytyy tunnustaa, melkein samaa kuin mies, joka aikoo toimeenpanna dynamiittiräjähdyksen taikka salamurhan. Ilma oli lämmin ja kirkon ovi avoinna, niin että hän voi kuulla tohtori Vincen kaikuvan äänen. Urkujen säveleet nostivat hänen silmiinsä kyyneleitä. Hän rakasti urkuja, eikä hän enään saisi niistä nauttia!
  • 60. Viimeinkin loppui jumalanpalvelus, ja "salamurhaaja" asteli kadun yli ottaen sopivan paikan. Ja koko seurakunnasta tuli ensinnä ulos "olympialainen", mr Curtis, hän eikä kukaan muu! — Saanko jättää yhden kappaleen, sir, virkkoi Samuel sydän kurkussa. Ja mr Curtis, joka kuivasi nenäliinallaan otsaansa, säpsähti kuin olisi nähnyt peikon. — Poika mitä sinä teet! kivahti hän, mutta Samuel oli jo rientänyt pois ja jakoi papereitaan ihmisjoukolle, joka molempien porttien kautta virtasi ulos. Julistukset otettiin vastaan ja luettiin, pysähdyttiin, ihmeteltiin ja ruvettiin keskustelemaan, niin että portit aivan tukkeutuivat. Kun jo suuri joukko julistuksia oli jaettu, olivat kirkkoneuvoston jäsenet ehtineet käsittää aseman, ja yritys tehtiin jakamisen estämiseksi. — Tämä on häpeällistä! kirkui mr Curtis koettaen tarttua Samuelia käsivarteen. Mutta poika riuhtasi itsensä irti juosten sivuovelle, josta kansaa virtasi ulos. — Ottakaa yksi kappale! huuteli hän. Antakaa muillekin! Ilmoittakaa kaikille! Ja niin sai hän jaetuksi vielä muutamia kymmeniä julistuksia. Pitäen tarkoin silmällä mr Curtisia ja muita kirkkoneuvoston jäseniä juoksi hän taas kirkon ympäri etusivulle ja kiersi ihmisjoukon jakaen samalla julistuksiaan niin paljon kuin ennätti. Ilmoittakaa kaikille! huuteli hän kaikuvalla äänellä. Väärintekijät on karkoitettava kirkosta! Yhtäkkiä tunkeutui mr Hamerton hengästyneenä ja kasvoiltaan punaisena esiin väkijoukosta. — Samuel! huusi hän tarttuen poikaan, täten ei saa jatkua!
  • 61. — Sen täytyy! vastasi Samuel. Päästäkää minut! Hän kohotti äänensä hurjaksi huudoksi: — Kristuksen kirkossa on varkaita! Kamppaillessa putosivat lentolehtiset maahan, ja mr Hamerton kumartui ottamaan niitä ylös. Samuel otti niistä niin monta kuin voi ja riensi taas sivuovelle, jossa useat ihmiset ahnaasti tarttuivat niihin. Hän sai jaetuksi kaikki lehtisensä, ja niille henkilöille, joitten hän näki vielä tulevan kirkosta, huusi hän käsiään heiluttaen: — Tämän seurakunnan kirkkoneuvostossa löytyy miehiä, jotka ovat lahjoneet Lockmanvillen kaupunginvaltuusmiehiä. Minä aijon paljastaa heidät keskiviikkoiltana toisella puolella katua pidettävässä kokouksessa. Sen sanottuaan lähti hän tiehensä väistellen erästä hurjistunutta kirkkoneuvoston jäsentä, joka yritti häntä lyödä. Kadulle päästyään juoksi hän nopeasti kuin hirvi kotiinsa. Hän oli vedonnut seurakuntaan! XXVIII. Käynti poliisin luona. Samuel syöksyi hengästyneenä kotiin kertoakseen tapahtumasta Sofialle. Sieltä meni hän Bremerin luo, joka oli seurannut kohtausta kauvempana. Molemmissa paikoissa täytyi hänen perinpohjin kertoa jännittävästä tapahtumasta.
  • 62. Vanha Bremer saapui kotiin ja hän tiesi, että Samuelin täytyi saada poliisilta lupa kokouksen pitämiseen. Samuel ei tuntenut erityistä halua käydä poliisiasemalla, jonka hän jo ennestään kyllin hyvin tunsi; mutta hän olisi mennyt vaikka leijonain luolaan silloin, kun hänen suuri asiansa sitä vaati. Hän lähtikin seuraavana aamuna hyvissä ajoin poliisiasemalle. Mrs Stedmanin avulla oli hän sitä ennen onnistunut vakuuttamaan Sofialle, että Sofian tuli palata takaisin Wygantin luo. Poliisiasemalla istui tällä kertaa kirjoituspöydän ääressä eräs toinen ylikonstaapeli, muuan irlantilainen. — Anteeksi, herra, sanoi poika. Saanko täältä lupatodistuksen? — Mihinkä? kysyi ylikonstaapeli. — Ulkoilmakokouksen pitämiseen. — Minkälaatuisen kokouksen? — Jaa… minulla on jotain sanottavaa kansalle. — Jotain sanottavaa kansalle? toisti ylikonstaapeli ja kysyi senjälkeen äkkiä: — Mikä nimenne? — Samuel Prescott. Ylikonstaapeli kohotti silmäkulmiaan. — Oh! sanoi hän. Vai se veitikka! — Mitä sanotte? kysyi Samuel.
  • 63. — Komisarius tahtoo puhua kanssanne, lausui ylikonstaapeli sekä ohjasi Samuelin erityiseen huoneeseen, jossa komisarius McGullagh paksuna ja punakkana istui kirjotuspöydän ääressä. Nähtyään Samuelin hypähti hän ylös. — Siinä sinä kuitenkin olet? huudahti hän ja lisäsi, viitaten sormellaan konstaapelille: — Jättäkää meidät. Kun hän oli sulkenut oven, meni hän Samuelin luo ja uhaten sormellaan sanoi: — Poika! sinä lupasit minulle jättää kaupungin! — En. En minä ole luvannut. — Mitä se on? kivahti komisarius. — En minä luvannut, se oli Charlie Swift, joka sen lupauksen teille antoi. — Mitä sinä sitten lupasit? — Lupasin etten puhu kenellekään herra… herra Albertista. Enkä minä ole lupaustani rikkonut. — Minä sanoin Charlie Swiftille, että hän veisi sinut mukanaan kaupungista. Miksi et sinä ole mennyt? — Hän ei lähtenyt… Samuel keskeytti. Hän oli luvannut Charlielle, ettei puhuisi kenellekään mitään.
  • 64. — Jatka, käski komisarius. — Minä… minä en voi puhua siitä, sammalsi Samuel. — Mitä! Koetatko salata asiaa minulta? Etkö luule minun tietävän, että hän vielä on kaupungissa ja että sinä ja hän yhdessä olette tehneet kaikenlaisia lurjusmaisuuksia? — Ei, Ei! huudahti Samuel säikähtyneenä. — Älä koeta valehdella minulle! uhkaili komisarius. Ymmärrätkö, että minä olen selvillä kaikesta, senkin nulikka. Hän pysähtyi silmänräpäykseksi ja katsoi terävästi nuorukaiseen. — Ja sinulla on otsaa tulla tänne, huudahti hän. Mitä sinä oikeastaan tahdot? — Minä… minä tahtoisin pitää kokouksen. — Sanoppa, kuka on antanut sinulle luvan puuhailla puheita tässä kaupungissa? — Ei kukaan vielä — juuri saadakseni luvan olen tullut tänne. — Älä yritä teeskennellä ja tehdä minusta pilkkaa, tiuskasi komisarius. Samuelilla ei ollut vähintäkään halua tehdä pilkkaa kenestäkään, kaikkein vähimmin komisariuksesta. Hänen kaikki jäsenensä vapisivat. Mies katsoi häneen kuin voimakas gorilla ja hänen punaiset kasvonsa olivat aivan pelottavat katsella.
  • 65. — Kuuleppa, nuori herraseni, jatkoi komisarius. Sinä et tule saamaan lupaa minkäänlaiseen puhumiseen Lockmanvillessä. Muista se nyt ja aina. Ymmärrätkö? — Kyllä. — Ja vielä lisäksi: sinä et tulekaan pitämään mitään puhetta. Ymmärrätkö. — Mutta… mutta… änkytti poika. — Sinä et tule pitämään ensinkään mitään puhetta, et kaduilla etkä missään muussakaan paikassa koko kaupungissa. Koeta painaa se kalloosi, niin voit välttää ikävyyksiä. Saatuani kuulla, että sinä jakelet joitakin paperilippuja kaduilla, niin pianpa silloin saat toivoa, ettet olisi sitä tehnyt. Siinä kaikki! Ymmärrätkö? — Ymmärrän, sai Samuel vaivoin puserretuksi huuliensa välistä. — Se on hyvä, sanoi komisarius. Annan sinulle vielä hyvän neuvon: Lähde pois Lockmanvillestä ensimäisellä junalla äläkä enään koskaan pistä nenääsi tänne. Mene! Samuel lähti pois kauhistuneena. Siten kiihottivat poliisit häntä. Luonnollisesti tulisi hän pitämään puheensa. Hän ei voi antaa poliisin kiellon häiritä itseään. Mutta hänelle selvisi heti, mitä hankaluuksia hänellä oli voitettavana: jos poliisi tulee ja häiritsee häntä, ennen kuin hän vielä on ehtinyt sanoa sanottavaansa, voisi kaikki hänen aikeensa luhistua. Hänen täytyi kysyä neuvoa joltakin, ja sentähden lähti hän heti Bremerin luo, pieneen huoneeseen, missä isä ja poika puuhailivat
  • 66. piirustuslautojensa ja maalauksiensa kanssa. — Vai niin on asian laita, sanoi vanha Bremer kuultuaan miten oli käynyt poliisiasemalla. Tulepa mukaan, niin mennään Tom Everleyn luokse. — Kuka on Tom Everley? kysyi Samuel. — Eräs lakimies. Hän voi antaa sinulle niitä tietoja, joita tarvitset. Hän on tämän paikkakunnan sosialistien sihteerinä. — Sosialisti! huudahti Samuel pelästyneenä. Everleyn pieni konttori sijaitsi eräällä syrjäkadulla. Hän oli reipas, lähes poikamainen, nuori mies ulkonäöltään. Samuel tunsi heti mieltymystä häneen. — Toveri Everley, sanoi Bremer. Tässä on poika, jota sinun tulee auttaa. Puhu hänelle kaikki, Samuel. Sinä voit luottaa häneen. Samuel kertoi tarinansa vielä kerran. Everley kuunteli suurella jännityksellä tuon tuostakin ilmaisten kummastusta tai tyytyväisyyttä. Kun poika oli lopettanut, nousi Everley reippaasti ylös ja tarttui hänen käteensä lausuen: — Samuel Prescott, lyökäämme kättä. Te olette kunnon poika! — Silloin te seisotte minun puolellani, huudahti Samuel tuntien taakan putoavan hartijoiltaan. — Seison puolellanne! Sen tulen tekemään niin kauvan kuin elän! Senjälkeen hän istuutui uudelleen ja alkoi hermostuneesti rummuttaa kirjotuspöytää lyijykynällään.
  • 67. — Minä saatan kutsua paikallisen sosialistiosaston kokoon, sanoi hän, ja esittää tämän asian siellä. Hiljaiseksi on Lockmanvillessä käynyt viime aikoina ja taistelu, kuten tämä, on juuri tovereille tarpeen. — Mutta minä en ole mikään sosialisti, huomautti Samuel. — Ei se mitään tee, vastasi Everley. Liitytte meihin myöhemmin. Samuel ei ollut siitä oikein selvillä, mutta hän ei tiennyt, kuinka voisi sen esittää. — Minä voin saada paikallisyhdistyksen kokoon huomisillaksi, jatkoi Everley. Ei ole aikaa tuhlattava. Meidän täytyy nopeasti levittää suuri paljous kokouskutsumuksia kaupunkiin. — Mutta minä haluaisin kokoukseen vain Pyhän Matteuksen seurakuntalaisia, sanoi Samuel. — Aina tulee muita myöskin, virkkoi Everley. Ja eikö kansalla ole oikeus saada tietää, kuinka heiltä varastetaan? — Kyllä, myönsi Samuel. — Ja kenties, lisäsi Everley naurahtaen tulee seurakunta paljon halukkaammin asiaa käsittelemään, jos sitä vähäsen painostetaan ulkoapäin. Meidän tehtävämme on panna alkuun vapaa keskustelu tässä asiassa ja avata kaupunkilaisten silmiä. Muuten kenties poliisi tukahuttaa asian alkuunsa ja silloin kansa ei saa koskaan tietää mitään siitä, mitä me olemme tarkottaneet. — Teidän täytyy olla hyvin varovaisia levittäessänne kokouskutsumuksia, huomautti Bremer. Ne tulevat tukahuttamaan
  • 68. koko puuhan alkuunsa, jos vaan voivat. — Aivan varmasti, sanoi Everley nauraen. Mitä siihen tulee, niin voitte luottaa tovereihimme. Me tunnemme luotettavan kirjapainon. Samuel huokasi syvään helpotuksesta. Tässä oli mies, joka ymmärsi asian ja kävi siihen käsiksi koko voimallaan ja vakaumuksellaan. Se oli vain harmillista, että hän oli sosialisti. Everley otti lyijykynän ja kirjotti seuraavan uuden ilmotuksen: "Kansalaisille Lockmanvillessä! Sittenkuin minä olin havainnut, että St. Matteuksen kirkon kirkkoneuvoston johtavat jäsenet ovat lahjoneet kaupungin hallitusta, pyysin tutkimusta asiassa, mutta ainoana seurauksena pyynnöstäni oli, että minut karkotettiin kirkosta. Silloin kutsuin minä kokouksen valaistakseni seurakunnalle asiaa, mutta minulta kiellettiin lupa kokouksen pitämiseen ja puhumiseen. Poliisi antoi minun ymmärtää, etten koskaan tule pitämään puheita tässä kaupungissa. Tahdotteko seisoa minun puolellani? Puhun ensitulevana keskiviikkona kello 8 illalla rakentamattomalla tontilla vastapäätä kirkkoa. Sananvapauden ja kansalaisoikeuksien nimessä Samuel Prescott." — Mitä pidätte tästä, kysyi Everley.
  • 69. — Se on mainio, virkkoi Samuel ihastuneena. — Minä kustannan kokouskutsumuksen levittämisen, lisäsi lakimies. Huolehdin myös siitä, että tiedonanto paikallisosaston jäsenille lähetetään postiin vielä tänä iltana. Tulkaa nyt, niin etsimme käsiimme pari osaston jäsentä keskustellaksemme asiasta heidän kanssaan. He lähtivät ulos. Bremer palasi kotiin työhönsä, mutta Samuel ja Everley menivät sisään erääseen sikarimyymälään, joka sijaitsi saman kadun varrella. Myymälän omisti eräs vähäinen Venäjän juutalainen, jonka hauskannäköisiltä kasvoilta tumma silmäpari lausui vieraat tervetulleiksi. — Toveri Lippman, sanoi Everley, saan esitellä sinulle herra Prescottin. Myöskin "toveri Minsky" tuli myymälään pihanpuolella olevasta työhuoneesta. Hän oli sikarintekijä ja hänen paljaat käsivartensa olivat hyvin keltaiset ja näivettyneet. Everley kertoi heille lyhyesti Samuelin seikkailuista ja esitti mitä hän oli aikonut tehdä. Se tulinen kiihko, jolla molemmat kuulijat vastaanottivat Everleyn kertomuksen ja esityksen, ei jättänyt epäilyksen varjoakaan siitä, etteivät he olisi asian puolella. Parisen korttelia etempänä, eräässä kulmauksessa, sijaitsi pieni työhuone, jossa työssään harmaantunut vanha puuseppä, "toveri Begg", tarttui Samuelin käteen ja piti sitä kuin ruuvipihdissä ilmottaessaan hyväksyvänsä hänen menettelynsä. Senjälkeen lähtivät he tohtori Bartonin, erään nuoren lääkärin luo, jonka Everley sanoi olevan tukipisteenä kaupungin paikallisessa sosialistiyhdistyksessä.
  • 70. — Hän on saanut kasvatuksensa ulkomailla, selitti Everley, joten hänellä ei ole meikäläisten lääkärien ahdasta käsityskantaa. Sen lisäksi on hänen vaimonsa todellinen kaunopuhuja. Mrs Barton oli nainen, jonka rakastettavat ja lempeät kasvot muistuttivat Samuelille hänen äitinsä valokuvaa. Koko ajan, kun Everley kertoi Samuelin seikkailuja, silmäili nuorukainen mrs Bartonia ja koetti päästä selville hänen mielipiteistään ja siitä kummallisuudesta, että hän oli sosialistipuhuja. Hetkisen kuluttua tuli tohtori Barton sisälle ja hänelle piti Samuelin seikkailut kertoa uudelleen. Molemmat kiintyivät niin vieraihinsa, että pyysivät heitä jäämään murkinalle. Keskustelussa käsittelivät he kysymystä koko laajuudessaan ja Samuel tunsi saavansa luottamusta asiansa oikeuteen siitä varmuudesta, millä he kävivät asiaan käsiksi. Ei tarvittu pitkiä selittelyjä heidän kanssaan, sillä he näkyivät jo etukäteen tietävän mitä oli tehtävä. He näyttivät omaavan ikäänkuin taika-avaimen, jonka avulla saattoivat päästä tunkeutumaan Lockmanvillen sisäiseen elämään. Ja se teki heille mahdolliseksi ymmärtää kaiken ja tuntea, kuten hän tunsi, sekä käsitellä asiaa kaikkia mahdollisuuksia huomioonottaen. Kaikki nämät olivat hämmästystä herättäviä kokemuksia Samuelille. Vielä joku tunti sitten oli hän ollut huutavan äänenä korvessa, villiytynyt ja yksinäinen ja täällä oli nyt joukko liittolaisia, mitkä näyttivät nousseen ikäänkuin maasta. He olivat miehiä, jotka tarkasti tiesivät, mitä tarvitaan ja kuinka voidaan saavuttaa se, johon pyritään; miehiä, jotka eivät tarvitse mitään opastusta tarttuakseen työhön käsiksi vahingoittamatta hänen korkeaa asiaansa. He käsittelivät asiaa aivan kuin olisivat sentapaisissa asioissa puuhailleet
  • 71. kaiken ikänsä. Hän tunsi itsensä siinä määrin hämmentyneeksi, että oli vähällä unhottaa minkälaista väkeä he olivat. Mutta se selvisi taas hänelle äkkiä, kun he olivat palanneet takaisin Everleyn konttoriin. Hän istui ja tuijotti nuorta juristia niin huolestuneella ilmeellä, että tämä kysyi: — Miten nyt on laitanne? — Sanokaa minulle, mister Everley, sanoi nuorukainen, kuinka sellaiset ihmiset, kuin Bartonit, voivat uskoa vapaaseen rakkauteen? — Uskoa vapaaseen rakkauteen! Mistä ihmeestä te olette tullut siihen käsitykseen? — Eivätkö he sitten usko vapaaseen rakkauteen? tiukkasi Samuel. — Luonnollisesti ei. Kuka on sanonut, että he siihen uskovat? — Mutta hehän ovat sosialisteja! Everley lakkasi työstään ja nauroi sydämellisesti. — Kuinka te olette saaneet sellaisen ajatuksen? kysyi hän. — Kas, sanoi Samuel, minä olen kaikkialta lukenut että sosialistit uskovat vapaaseen rakkauteen. — Vartokaa kunnes olette päässeet kunnolliseen alkuun uudistustyössänne, sanoi nuori lakimies nauraen, silloin näette, mitä olette oppineet. — Mutta, änkytti Samuel hämmästyneenä, eivätkö sitten sosialistit usko vapaaseen rakkauteen?
  • 72. — Yksi ja toinen heidän joukostaan voi tehdä niin, sanoi Everley. Minä tunnen erään, joka uskoo peikkoon, toisen joka uskoo paaviin ja kolmannen, joka lujasti uskoo Aatamiin ja Eevaan. Enkä minä voi sanoa mihin he kaikki uskovat. — Nähkääs, jatkoi Everley selittäen, me muodostamme valtiollisen puolueen, joka ei voi estää henkilöitä vapaasti liittymästä meihin. Ja sentähden, kun sosialistipuolue on alati kasvava puolue, lukeutuu kannattajiimme kaikenlaista väkeä, joilla on mitä moninaisimpia ihanteita. Me emme voi sitä auttaa! — Mutta, huudahti Samuel, te olette uskonnon vihollisia! — Meillä ei ole mitään tekemistä uskonnon kanssa, vastasi Everley. Me olemme, kuten sanoin, valtiollinen puolue. Jotkut joukostamme ovat huomanneet välttämättömäksi jättää kapitalistien kirkot, mutta siitä ette suinkaan voi meitä moittia. — Ei, ei suinkaan, myönsi Samuel, ja lisäsi senjälkeen: — Mutta ettekö tahdo hävittää hallituksen? — Päinvastoin, me tahdomme vahvistaa sitä. Mutta ensiksi täytyy meidän ottaa se pois kapitalisteilta. — Mutta mihin te sitten uskotte? kysyi Samuel hämmästyneenä. Everley selitti, että sosialistit koettavat järjestää ja kasvattaa työväenluokkaa jouduttaakseen välttämätöntä taloudellista muutosta. He haluavat ottaa maan ja kaivokset, rautatiet ja tehtaat kapitalistien käsistä.
  • 73. — Me katsomme, että sellaiset laitokset eivät saa kuulua yksityisille, vaan koko kansalle. Silloin tulee työtä jokaiselle ja jokainen saa täyden korvauksen työstään eikä kenelläkään ole tilaisuutta elää tekemättä työtä. Samuel istui hetkisen hiljaa selvitellen asiata itselleen. — Mutta, huudahti hän hyvin ällistyneenä, sehän on aivan niinkuin minäkin uskon. — Luonnollisesti, vastasi toinen, se on aivan niinkuin te uskotte ja se on sitä, johon terve järki uskoo. — Mutta — mutta — änkytti poika. Olenko minä sitten sosialisti? — Yhdeksänkymmenettäosaa kansasta koko maassa on sosialisteja, vastasi Everley, vaikka eivät vielä ole itse havainneet sitä. — Mutta, huudahti Samuel, teidän pitää opettaa heitä. — Me teemme parhaamme, sanoi Everley myhäillen. Tulkaa auttamaan meitä… Samuelia tämä hämmästytti. — Mutta kuinka on kansa saanut näin väärän käsityksen sosialisteista, kysyi hän. — Kansan käsitys on sellainen kuin heidän herransa ja isäntänsä haluaa kansalla olevan. Samuel tarttui suonenvedontapaisesti tuoliinsa.
  • 74. — Se on niinmuodoin liittoutumista! huudahti hän. — Aivan niin, sanoi Everley. Se on hallitsevan luokan liittoutumista kansaa vastaan. He omistavat sanomalehdistön, kirjat, yliopistot, kirkot ja hallituksen, joiden kautta he puhuvat kansalle valheita ja pitävät kansaa heille kuuliaisena. Samuel seisoi naama naamaa vastaan kapitalismin äärimäisen hirviön kanssa. Se on kyllä huonosti, että kapitalismi omistaa ne varat ja välikappaleet, joilla kansan on elettävä, ja että se niiden avulla nälällä kiduttaa ja hivuttaa työläisten ruumiita. Mutta että kapitalismi omistaa heidän sielunsakin ja johdattaa harhaan heidän henkisen elämänsä?! Pidättää heitä tieltä, jota myöten — kulkemalla voisivat pelastua. Se oli hänelle aivan uutta, sillä se oli hänen mielestään suurin kaikista rikoksista. — Minä en voi tätä uskoa, sanoi hän mielenliikutuksensa takia vaikeasti hengittäen. Nuori lakimies vastasi levollisesti: — Tulkaa ja työskennelkää kanssamme jokunen aika, niin saatte sen itse nähdä. XXIX. Sanomalehtiuutinen ja varotus. Saavuttuaan kotiinsa sai hän kokea uuden yllätyksen, sillä siellä istui hieno ja hyvin puettu nuori mies, joka odotti häntä saadakseen puhua hänen kanssaan.
  • 75. — Nimeni on Pollard, sanoi hän, "Lockmanvillen Sanomain" toimituksesta. Haluaisin saada uutisen teistä. — Uutisen minusta! huudahti nuorukainen hämillään. — — Niin, haastattelun, selitti mr Pollard. Minä haluan saada vähäsen tietoja siitä kokouksesta, jonka aijotte pitää. Samuel tunsi itsessään samallaista järkyttävää tunnetta, jota jokainen yhteiskunnallinen uudistaja sekä ennen että vielä myöhemminkin on saanut kokea. Hän istui mrs Stedmanin pienessä arkihuoneessa ja kertoi vielä kerran seikkailunsa. Mr Pollard oli aivan nuori äskettäin yliopistosta saapunut sanomalehtimies ja hänen lyijykynänsä liikkui nopeasti muistiinpanokirjan lehdillä. — Karaistukaa, selitti hän. Tämä on huomiota herättävä asia. Samuelille olivat nämät erinomaisia uutisia. Ne hämmästyttivät häntä niin, ettei hän joutanut niitä lähemmin miettimään. Mitä se kannattaa kutsua kokousta ja pitää puheita, kun voidaan saada asia painetuksi sanomalehteen? Siitähän jokainen saa sen lukea ja pääsee oikeaan käsitykseen kaikesta eikä tarvitse pelätä mitään virheitä ja erehdyksiä. Sitäpaitsi lukevat ihmiset sanomalehtiä vapaahetkinään, jolloin heillä on hyvää aikaa asioita perinpohjin ajatella. Kun mr Pollard oli lähtenyt, riensi Samuel suurimmalla kiireellä puhumaan asiasta Everleyn kanssa. — Teidän ei tarvitse painattaa kokouskutsumusta, sanoi hän, minä kerroin hänelle missä kokous tullaan pitämään. Everley vaan hymähti Samuelin kiihkolle.
  • 76. — Me toimitamme kokouskutsumukset jaetuksi kuitenkin, sanoi hän. Odottakaa siksi kun saatte nähdä mitä "Sanomat" asiasta kertovat. — Mitä ajattelette? kysyi Samuel. Everley ei halunnut selittää ajatuksiaan lähemmin, vaan kehotti Samuelia odottamaan. Samuelin uutiset eivät näyttäneet tekevän häneen sitä vaikutusta kuin niiden olisi pitänyt tehdä, tuumi Samuel. Samuel palasi kotiinsa. Myöhemmin iltapäivällä, kun mrs Stedman oli mennyt myymälään ostoksille, naputettiin hänen ovelleen. Samuel riensi avaamaan ja suureksi hämmästyksekseen näki hän Bill Finneganin edessään. — Hyvää päivää, nuori ystäväiseni, sanoi Finnegan. — Hyvää päivää, vastasi Samuel. — Mitä minä olen kuullut — sinähän aijot pitää puheen? — Kyllä. Mutta mistä te sen tiedätte? — Olen saanut tietää sen Gallaganilta. Slattery oli puhunut siitä hänelle. — Slattery? Hänkin on niinmuodoin saanut tietää siitä? — Tuhat tulimmaista, luuletko sinä häntä puoluejohtajaksi? Finnegan katsoi ympärilleen tullakseen vakuutetuksi siitä, että he olivat kahdenkesken. — Sammy, sanoi hän. Minä olen tullut luoksesi kaikessa ystävyydessä antaakseni sinulle vihjauksen ja toivon sinulla olevan
  • 77. kylliksi ymmärrystä selviytyäksesi puuhasta jälkeenpäin. — Mitä se on? kysyi Samuel. — Älä vaivaa itseäsi puhumalla kokouksessa. — Minkä vuoksi en saisi puhua? — Senvuoksi, ettei sinun sallita sitä tehdä. — Mutta kuinka voidaan minua siitä estää?
  • 78. Seurasi hiljaisuus silmänräpäykseksi. — Se on hullua, mitä aijot tehdä, sanoi Finnegan sen jälkeen. Sinä voit luottaa minuun, että sinulle tulee jotakin tapahtumaan, jos sinä aijot jatkaa puuhiasi. — Mitä saattaisi tapahtua? — En tiedä, poika — ehkä putoat virtaan. — Putoan virtaan? — Niin, — tai saat lyijysateen kalloosi jonakin iltana jossakin pimeässä kujassa. Minä en tosin voi sanoa sinulle mitä tulee tapahtumaan, ainoastaan sen, että sinä et tule pitämään aikomaasi puhetta. Samuel tuli aivan hämilleen. — Se ei voi olla teiltä vakavasti sanottua, sopersi hän. — Kyllä varmaan. Miksikä ei? Samuel ei vastannut. — Minä en voi ymmärtää, minkätähden tahdot tehdä tämän, jatkoi Finnegan, tai kuka on sinun takanasi? Sen mukaan kun minä ymmärrän, olet sinä päässyt selville joistakin rumista asioista, joita sivumennen sanoen, vähäsen on tässä kaupungissa: Slattery, Patt Mc Cullagh, kaupungin valtuusto, Wygant, Hickman ja myöskin Bertie Lockman — eikö totta? — Kyllä! sanoi Samuel. Mutta siitä en minä aikonut puhua.
  • 79. — Eivät he tiedä mistä sinä aijot puhua, mutta heillä ei ole halua asettaa itseään hyökkäystesi alaiseksi. Tämän vuoksi ei aijota antaa sinun ensinkään puhua. — Mutta voiko todellakin sellaista tapahtua? kysyi poika mielenliikutuksen valtaamana. — Sellaista sattuu alinomaa ja sehän on aivan luonnollista. Eihän kansa muuten tulisi käsittämäänkään sellaisia asioita ja puhuisi niistä? — Kyllä, luonnollisesti, vastasi Samuel. Ja se se juuri minua suuresti hämmästyttää. — Jaa, sanoi Finnegan, mutta heidän ei anneta ymmärtää sitä. Etkö sinä sitä käsitä? — Kyllä, minä käsitän, kuiskasi Samuel. — Katsoppas, Sammy, on olemassa eräs nurkkakopla, joka hallitsee tässä kaupungissa ja he aikovat jatkaa edelleenkin hallitustaan. Etkö luule heillä olevan keinoja, joita käyttämällä saavat tukituksi sinunlaiseltasi suun. — Mutta, mister Finnegan, sehän olisi samaa kuin murhaa! — No niin, sitä ei heidän kuitenkaan tarvitsisi itse tehdä, kuten kai ymmärrät. Kun mister Henry Hickman haluaa saada kananpojan päivällisekseen, ei hänen ole pakko itse vääntää siltä niskoja nurin. Samuelilla ei ollut mitään vastattavaa tähän. Hän istui kauhun valtaamana.
  • 80. — Minä tunnen nämät hommat, näetkös, sanoi Finnegan, ja minä haluan vaan antaa sinulle ystävällisen neuvon. Ja mitä saakelia tarvitsee sellaisen poikanaskalin, kuin sinä olet, puuhailla toisten hyväksi? — Mitä minä muutakaan voisin tehdä? kysyi Samuel. — Tehdä? Hanki itsellesi sopivaa työtä ja nai sellainen tyttö, josta pidät. Sinä et koskaan tule oikein ymmärtämään elämää, ennenkuin olet saanut itsellesi lapsia. Samuel puristeli vain päätään, sillä tämä ehdotus ei häntä miellyttänyt. — Minä tahdon koettaa pitää itseni kaukana kaikesta puuhasta, sanoi hän, mutta tämä puhe minun täytyy pitää. Finnegan lähti tiehensä tuumivaisena puristellen päätänsä ja mutisten itseksensä. Samuel kiirehti takaisin ystävänsä lakimiehen luokse. Seurauksena tästä käynnistä oli, että Everley vaati häneltä juhlallisen lupauksen, ettei hän mene ulos pimeän tultua. — Minä muistan, mitä tässä kaupungissa tehtiin lakon aikana, sanoi Everley ja minulla ei ole vähintäkään halua asettaa itseäni tai jotakin toista vaaroille alttiiksi. Senjälkeen, kun lopetettiin täkäläiset ammattiyhdistykset, olemme me ainoastaan täällä jälellä. Samuel pysyttäytyi illan kotona ja kertoi Sofialle kaikki kokemuksensa sekä kuvaili niitä ihmisiä, joita oli oppinut tuntemaan. Tyttö oli aivan haltioissaan ihastuksesta. — Ah, tiesinhän minä, että apu oli tuleva! Minä tiesin, että apu oli tuleva! huudahteli hän.
  • 81. Vaikka olikin hyvin väsynyt, saattoi Samuel tuskin nukkua mielenliikutuksensa takia. Aikaisin aamulla nousi hän ylös ja meni ulos ostamaan "Lockmanvillen Sanomain" irtonaisnumeroa. Hän seisahtui kadun kulmaukseen ja aukasi sanomalehden. Hän heitti silmäyksen "Sanomain" ensi sivulle — siellä ei löytynyt mitään kokouksesta. Hän tarkasti takasivun ja senjälkeen sivun toisensa perästä löytääkseen uutisen. Mutta hän ei löytänyt siitä mitään. Silloin ryhtyi hän uudelleen lukemaan lehteä entistä tarkempaan, tutki jokaisen otsikon, löytämättä sittenkään sitä, mitä etsi. Vielä kolmannen kerran hän kävi läpi lehden lukien tarkasti läpi jokaisen pienimmänkin uutisen, mutta turhaan. Kun hän näin oli kuluttanut "Sanomain" lukemiseen tunnin aikaa löytämättä mitään, tuli hän vihdoinkin vakuutetuksi, ettei hänen asiastaan ollut lehdessä riviäkään. Kun Everley sinä aamuna saapui konttoriinsa, tapasi hän Samuelin eteisessä odottamassa. Nähdessään sanomalehden hänen kädessään nauroi nuori lakimies. — No, oletteko löytäneet uutista? kysyi hän. — En, sitä ei ole täällä! vastasi Samuel. — Minä arvasin hyvin, että niin sen kanssa tulee käymään, sanoi Everley. Mutta minä katsoin parhaaksi, että te itse voitte hankkia sen kokemuksen itsellenne. — Mutta mitä se merkitsee? kysyi Samuel. — Se johtuu siitä, että Lockmanvillen hallitusherrain koplalla on satatuhatta dollaria kiinitettynä "Sanomiin".
  • 82. Samuel ällistyi ja seisoi ystäväänsä tirkistellen. — Nyt näette mitä se on, kun tahtoo olla sosialistina! sanoi Everley nauraen. Ja Samuel näki sen. XXX. Samuel sosialistikokouksessa. Samana päivänä illallisen jälkeen tuli Everley yhdessä Fredrik Bremerin kanssa noutamaan Samuelia sosialistien kokoukseen, missä hänen tuli kertoa seikkailunsa. Kokous pidettiin pimeässä salissa ruokatavarakaupan yläkerroksessa. Siellä olivat kaikki ne henkilöt, jotka Samuel oli tullut tuntemaan edellisenä iltana, ja parisenkymmentä muuta henkilöä. Useimmat heistä olivat ammattityömiehiä, mutta olipa joukossa myöskin jokusia, jotka näyttivät hyvin toimeentulevilta myymälänomistajilta tai kirjanpitäjiltä. Samuel pani merkille, että kaikki kutsuivat toisiaan tovereiksi ja jokuset niiden joukossa puhuttelivat häntäkin samalla tavalla, mikä herätti omituisia tunteita hänessä. Kokoukseen tuli myöskin muutamia naisia, joista yksi toimi puheenjohtajana. Everley piti aluksi puheen sekä luki Samuelin kehotuksen samalla kertoen mistä se oli aiheutunut. Tämän jälkeen pyysi hän Samuelia astumaan esiin. Nuorukainen sävähti. Hetken kuluttua valtasi hänet kuolettava kauhistus. Ajatus, että jos hän kaikkien näiden henkilöiden läsnäollessa ei voisikaan puhua, tunkeutui hänen
  • 83. Welcome to our website – the perfect destination for book lovers and knowledge seekers. We believe that every book holds a new world, offering opportunities for learning, discovery, and personal growth. That’s why we are dedicated to bringing you a diverse collection of books, ranging from classic literature and specialized publications to self-development guides and children's books. More than just a book-buying platform, we strive to be a bridge connecting you with timeless cultural and intellectual values. With an elegant, user-friendly interface and a smart search system, you can quickly find the books that best suit your interests. Additionally, our special promotions and home delivery services help you save time and fully enjoy the joy of reading. Join us on a journey of knowledge exploration, passion nurturing, and personal growth every day! ebookbell.com