Guided media, Computer Network Security

Guided Media

These are those that give a conduit from one machine to another that add twisted-pair, fiber-optic cable and coaxial cable. A signal traveling along any of these media is directed and is obtained by the physical limits of the transfer medium. Coaxial cable and twisted pair use metallic that transport and access signals in the form of electrical current. Optical fiber is a plastic or glass cable that transports and accepts signals in the form of wave. The term transmission medium also defines to a technical machine that employs the material substance to guide or transmit waves. Thus, a copper cable or an optical fiber is a transmission medium. Not only this but also is handling to guide the transmission of networks with guided transmission media, the waves are guided along a physical way.

 

1504_guided media.png

 

 

466_guided media transmission.png

Posted Date: 8/20/2012 2:42:58 AM | Location : United States







Related Discussions:- Guided media, Assignment Help, Ask Question on Guided media, Get Answer, Expert's Help, Guided media Discussions

Write discussion on Guided media
Your posts are moderated
Related Questions
Question: (a) Give 2 benefits of using IPsec. (b) IPSec uses two protocol for security: Authentication Header protocol (AH) and the Encapsulated Security Header Protocol (

Feasibility Studies Before deciding on strategy, all information of economic or non economic consequences of vulnerability of information asset should be explored. A number of w

Secure Socket Layer (SSL) accepts a combination of asymmetric and symmetric (public-key) encryption to accomplish integrity, confidentiality, authentication and non-repudiation for

Network can be distinguished by shape. According to which there are three most popular methodologies, which are shown as follows; Star Ring Bus

What do you understand by cryptanalysis? Discuss about the transposition ciphers substitution cipher, and onetime pads. The messages which are intended to transmit secretly and

IDS RESPONSE BEHAVIOR Once IDS detects an anomalous network situation, it has a number of options. IDS responses to external stimulation can be classified as active or passive.

Scenario: A network with individual hosts (really, virtual machines) can run HTTP (web) servers that are available to the outside. (Here, available means the ability to read and wr

Question: (a) A Wireless Mesh Network (WMN) is a communications network made up of radio nodes organized in a mesh topology. i. Describe the function of a TAP in WMNs. ii.

You have been asked to setup a remote temperature sensing system for an electric furnace. The system consists of a sensor unit which feeds an analogue signal to a PCM encoder. The

(a) Illustrate what you understand by Nyquist Capacity Theorem? (b) Consider we wish to transmit at a rate of 64 kbps over a 4 kHz noisy but error-free channel. What is the mini