Guided media, Computer Network Security

Guided Media

These are those that give a conduit from one machine to another that add twisted-pair, fiber-optic cable and coaxial cable. A signal traveling along any of these media is directed and is obtained by the physical limits of the transfer medium. Coaxial cable and twisted pair use metallic that transport and access signals in the form of electrical current. Optical fiber is a plastic or glass cable that transports and accepts signals in the form of wave. The term transmission medium also defines to a technical machine that employs the material substance to guide or transmit waves. Thus, a copper cable or an optical fiber is a transmission medium. Not only this but also is handling to guide the transmission of networks with guided transmission media, the waves are guided along a physical way.


1504_guided media.png



466_guided media transmission.png

Posted Date: 8/20/2012 2:42:58 AM | Location : United States

Related Discussions:- Guided media, Assignment Help, Ask Question on Guided media, Get Answer, Expert's Help, Guided media Discussions

Write discussion on Guided media
Your posts are moderated
Related Questions
Thinking ethically is difficult without a background in moral philosophy. Asking people to embrace ethics without offering practical explanation of the efficacy of so doing, is a t

Question: (a) Describe how IPSec provides data source authentication. (b) Which protocol can be used to provide limited traffic analysis confidentiality? Why is it "limite

Suppose you are working for one of the leading credit reporting agencies that manages users' credit rating info with different financial institutions.  The company wishes to implem

QUESTION (a) Define and distinguish between Electronic Commerce and Electronic Business (b) According to you what are the benefits that Electronic Commerce can brings to org

1. Network Design Design your network giving appropriate IP addresses for your hosts. Provide a topology and table showing your addressing scheme. 2. F i re wall po

Question: (a) What is the main security vulnerability of IPv4? (b) Which protocol can be used for secure remote login? (c) Distinguish between the transport and tunnel

SECURITY ANALYSIS Overview •    Know yourself: examine, identify, and understand the information and systems which are currently in place •    Know the enemy: examine, identify,

QUESTION (a) Describe the two possible configurations for 3DES (b) What is the main disadvantage of 3DES? (c) Why are most modern symmetric algorithm block ciphers? (d

Question 1 Explain any two types of security policies Question 2 What is security attack? Explain with examples Question 3 Explain different characteristics that i