Thin ethernet wiring, Computer Networking

THIN ETHERNET WIRING:

Thin Ethernet needs thin coax cable that is cost effective and easier to install than thick Ethernet coax. In this case transceiver electronics are create into NIC and NIC connects directly to network phase.

Coax cable need BNC connector on NIC. Coax executes directly to back of each connected device by T-connector. The T-connector directly adds to NIC. This is given in the figure below.

1716_THIN ETHERNET WIRING.png

Thin Ethernet is very useful when several computers are located close to every one. It can be irreliable because any close connection disrupts entire network.

Posted Date: 10/27/2012 8:51:48 AM | Location : United States







Related Discussions:- Thin ethernet wiring, Assignment Help, Ask Question on Thin ethernet wiring, Get Answer, Expert's Help, Thin ethernet wiring Discussions

Write discussion on Thin ethernet wiring
Your posts are moderated
Related Questions
What are called Fat clients and Fat servers? If the bulk of the application runs on the Client side, then it is Fat clients. It is used for decision support and personal softwa

FDDI Media FDDI signifies a 100 Mbps token-passing dual-ring LAN that uses a fiber-optic transmission medium. Even though it operates at faster speeds FDDI is similar to Tok

Q. Subnet layer of the TCP-IP model? These two layers of the OSI correspond straight to the subnet layer of the TCP/IP model. Majority of the time the lower layers under the

OSI Model Facts The OSI model classifies and organizes the methods that hosts perform to maintain data for transport across the network. You should be familiar with the OSI m

Q. Show the Model for Network Access Security? Model for Network Access Security (1) Gatekeeper functions comprise Password-based login authentications. (2)

List of many potential users of the Intranet List of many potential users of the Intranet, both commonly used and not so commonly used. Company Documents o   Manu

configure a router . get the default gateway

Hosts are generally, individual machines at a specific location. Normally Resources of host machine are shared and can be used by any user on Internet. Hosts & local networks are g

1.  Consider these two potential additions to the MIPS instruction set and explain how they would restrict pipelining. a)  cp d1(r1), d2(r2) copy contents of word at address

FDDI -(Fiber Distributed Data Interface) FDDI Basics: FDDI (Fiber Distributed Data Interface) came about because system managers became concerned with network reliability i