Types of wires, Computer Networking

TYPES OF WIRES:

 Cable used for wiring would match the following:

  • The intended speed
  • The distance between computers
  • The amount of noise
  • Anticipated future requirements
  • price

Some types and their typical uses are given in the figure below.1661_TYPES OF WIRES.png

Figure 

WIRING SCHEMES AND OTHER NETWORK TECHNOLOGIES:

 Multiple wiring functions are not limited to Ethernet technology. Almost every network methods use different wiring procedures. IBM's token ring also needs hubs to run a logical ring network.

 

Posted Date: 10/27/2012 9:02:52 AM | Location : United States







Related Discussions:- Types of wires, Assignment Help, Ask Question on Types of wires, Get Answer, Expert's Help, Types of wires Discussions

Write discussion on Types of wires
Your posts are moderated
Related Questions
Configure Spanning Tree Step 1: Examine the default configuration of 802.1D STP. On each switch, display the spanning tree table with the show spanning-tree command. R

Bootp protocol normally use it in dhcp protocol, it is configured manually in order to give ip add or there relvent host. Rarp is a work just opposite of Arp. Rarp stand for rev

Q. Subnet layer of the TCP-IP model? These two layers of the OSI correspond straight to the subnet layer of the TCP/IP model. Majority of the time the lower layers under the

Internet addresses are divided in five distinct types of classes. The classes were designated A by E. class A address space lets a small number of networks although a large number

Q. Use of Two-Layer Switch? - Performs at the physical as well as data link layer - A bridge with many ports designed for faster performance - Allocates unique port to ea

Intrinsic Functions HPF introduces some new intrinsic functions in addition to those defined in F90. The two most regularly used in parallel programming are the system inquiry

Question 1 A) Explain briefly the advantages wireless communication systems                   B) What is a cellular network? Question 2 Explain fundamental architecture of

State the Security concerns The history of security concerns is not new. They have been of great worry to man and for many centuries man has been endeavouring to devise new tec

Tunnelling To guarantee privacy for the  organization, VPN specifies that each IP datagram destined for private  use of the  organization, must  first be  encrypted and then en

Q. Explain the types of Security Threats? (a) Normal Flow (b) Interruption: An asset of a system develops into unavailable or unusable. (c) Interception: A few unaut