Guided media, Computer Network Security

Guided Media

These are those that give a conduit from one machine to another that add twisted-pair, fiber-optic cable and coaxial cable. A signal traveling along any of these media is directed and is obtained by the physical limits of the transfer medium. Coaxial cable and twisted pair use metallic that transport and access signals in the form of electrical current. Optical fiber is a plastic or glass cable that transports and accepts signals in the form of wave. The term transmission medium also defines to a technical machine that employs the material substance to guide or transmit waves. Thus, a copper cable or an optical fiber is a transmission medium. Not only this but also is handling to guide the transmission of networks with guided transmission media, the waves are guided along a physical way.

 

1504_guided media.png

 

 

466_guided media transmission.png

Posted Date: 8/20/2012 2:42:58 AM | Location : United States







Related Discussions:- Guided media, Assignment Help, Ask Question on Guided media, Get Answer, Expert's Help, Guided media Discussions

Write discussion on Guided media
Your posts are moderated
Related Questions
(a) Describe briefly the difference between flow control and congestion control in relation to a connection-oriented protocol such as TCP. (b)  What is the initial rate of data

BUS TOPOLOGY In a bus topology all devices are attached to a single long cable and any device can send data to any other device. For this function, coordination is needed to d

Problem (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. The second screen capture is from the data portion of the frame.

QUESTION (a) A convex flow problem is a non linear network flow problem. Explain how a convex flow problem could be transformed into a Minimum Cost Flow problem. (b) Exp

Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th

Risk Determination For purpose of relative risk assessment, risk equals probability of vulnerability occurrence TIMES value MINUS percentage risk already controlled PLUS an elem

QUESTION (a) What do you meant by data spoliation? (b) Justify the following statement: "Disk imaging differs from creating a standard backup of disk." (c) Why do yo

Question: (a) Consider that you enter the given URL in the address bar of a popular web client and that both the client and server accepts HTTP version 1.1. i. What can be t

Selecting a Risk Control Strategy Risk controls involve selecting one of the 4 risk control strategies for every vulnerability. The flowchart is shown in the figure given below

CYCLIC REDUNDANCY CHECK (CRC) To activate a network system to check move error without increasing the amount of information in every packet another most successful method is m