Guided media, Computer Network Security

Guided Media

These are those that give a conduit from one machine to another that add twisted-pair, fiber-optic cable and coaxial cable. A signal traveling along any of these media is directed and is obtained by the physical limits of the transfer medium. Coaxial cable and twisted pair use metallic that transport and access signals in the form of electrical current. Optical fiber is a plastic or glass cable that transports and accepts signals in the form of wave. The term transmission medium also defines to a technical machine that employs the material substance to guide or transmit waves. Thus, a copper cable or an optical fiber is a transmission medium. Not only this but also is handling to guide the transmission of networks with guided transmission media, the waves are guided along a physical way.

 

1504_guided media.png

 

 

466_guided media transmission.png

Posted Date: 8/20/2012 2:42:58 AM | Location : United States







Related Discussions:- Guided media, Assignment Help, Ask Question on Guided media, Get Answer, Expert's Help, Guided media Discussions

Write discussion on Guided media
Your posts are moderated
Related Questions
ADDRESS RESOLUTION WITH CLOSED-FORM COMPUTATION For networks use reliable addressing, it is possible to select an address that creates closed-form address resolution possible.

MegaCorp INC. is a large manufacturing firm that operates 5 factories in Dallas, 4  factories in Los Angeles, and 5 factories in Albany, New York.  It operates a tightly  connected

Information System Security 1. Write about: a. Potential Risks to Information Systems b. Factors to be addressed for making information systems more secure 2. Write about t

Digital Signatures Digital Signatures are encrypted messages which can be proven mathematically to be authentic. These are created in response to rising requirement to verify in

Problem 1 . Show various features of a 1G network Total three features for each feature of 1G Problem 2. Describe how a cellular network works with functional block diagram

(a) Show four Network Security attacks. How do they compromise security? (b) In what ways do the following devices or services contribute to security: (i) Firewall (ii) In

ACCESS CONTROL DEVICES Successful access control system includes number of components, which depends on system’s requirements for authentication and authorization. Powerful auth

Problem (a) The IEEE 802 series of standards describe both the Physical and Data Link layers of their respective technologies. Two important standards are 802.3 and 802.5, respect

Question 1 a) Provide three advantages of using optical fiber. b) Distinguish between "Direct Sequence Modulation" and "Frequency Hopping" c) Decribe the purpose of using "

Intercultural sensitivity: recognising differences You represent a Mauritian computer company which is negotiating to buy hardware from a manufacturer in Japan. In your first