Coaxial Cable - computer network, Computer Networking

Coaxial Cable

Coaxial  cable  carries signals  of higher  frequency ranges than those in twisted pair cable. In part  because the two media are constructed quite  differently. Instead of having two  in wires. Coaxial  cable  has a central core conductor of solid or standard wire ( usually copper)  enclosed in an insulating sheath which  is in turn encased in an outer conductor  of metal  foil braid or a combination of the two. The outer metallic  wrapping servers both as a shield against noise and as  the second conductor  which completes the circuit. The  outer conductor is also enclosed in an insulating sheath and the whole  cable is protected by a  plastic cover  with this  construction and a special  insulation and shielding coaxial  cable can have high  bit rate.

223_Coaxial Cable.jpg

        figure Coaxial Cable

In past coaxial cable was  widely  used in  analog  telephone  networks  where a single  coaxial  network  could  carry 10,000 voice  signals. Latte it was used in digital telephone networks.  Where  a single  coaxial  cable  could carry digital data up to 600Mbps. However coaxial  cable in telephone  networks  has largely been replaced today  with fiber optic cable.

Coaxial cables  are categorized  by their  radio government (RG) rating. Each  cable  defined  by RG rating  is adapted for  a specialized functions  as shown  in table below.




Posted Date: 3/4/2013 12:11:39 AM | Location : United States

Related Discussions:- Coaxial Cable - computer network, Assignment Help, Ask Question on Coaxial Cable - computer network, Get Answer, Expert's Help, Coaxial Cable - computer network Discussions

Write discussion on Coaxial Cable - computer network
Your posts are moderated
Related Questions
DVMRP • Distance vector multicast routing protocol: Distance vector multicast routing protocol are abbreviated as DVMRP. These protocols are suitable for small networks which

Token Bus Physical order of stations doesn't matter Line is broadcast medium "Send" token by addressing neighbour Provisions for deleting, adding stations

Question: (a) (i) Distinguish between Physical topology and Logical topology. (ii) Explain the following statement with the help of a diagram: "A star topology can have a l

Question : a) Give three examples of vulnerable services which are among the overwhelming majority of successful attacks. b) Name the five outside sources which can be the

Create and simulate a network similar to the one shown here, using the NetML system. The network is a little more complex, as depicted at the right. There is an extra node

Database servers connected as a cluster to the main server There could be three database servers connected as a cluster to the main server to provide better connectivity and se

Can you give an overview of the components in IPSec?

Has a central core conductor covered in an insulating sheath encased in an outer conductor of metal foil  RG numbers indicate physical specs such as thickness and type of insula

The address for a device as it is recognized at the Media Access Control (MAC) layer in the network architecture. MAC address is usually stored in ROM on the network adapter card a