What is shielded twisted pair, Computer Networking

Q. What is Shielded Twisted Pair?

- A metal foil or braided-mesh covering encases every pair of insulated conductors to prevent electromagnetic noise called crosstalk

- Crosstalk take place when one line picks up some of the signals travelling over another line

- Uses RJ-45 connectors

- More expensive however less susceptible to noise

- STP also supports high Bandwidth over long distances

813_What is Shielded Twisted Pair.png

Posted Date: 7/20/2013 5:54:36 AM | Location : United States







Related Discussions:- What is shielded twisted pair, Assignment Help, Ask Question on What is shielded twisted pair, Get Answer, Expert's Help, What is shielded twisted pair Discussions

Write discussion on What is shielded twisted pair
Your posts are moderated
Related Questions
Q. How is computer networks used in teleconferencing? Teleconferencing: Teleconferencing allows conference to happen without the participants being in the same place. Applica

QUESTION (a) Briefly describe the steps involved in Network Simplex Method. (b) In Radix Heap Algorithm, the technique of buckets is employed. However this idea is an extens

iLab 2: Office Network Expansion Connect to the iLab here. Submit your assignment to the Dropbox located on the silver tab at the top of this page. (See "Due Da

Write the definition of SAN A SAN is a separate network to handle storage requirements. The SAN detaches storage tasks from specific servers and makes a shared storage facility

Tree interconnection network:   In tree interconnection network, processors are organised in a complete binary tree pattern. Figure: Tree interconnection network

What are firewalls? Firewalls serve to protect an internal network from external attacks. These external threats can be hackers who need to steal data or computer viruses that

What are the basic LAN topologies? The three simple LAN topologies that are combined to shape any practical topology are called as basic LAN topologies. They are, Bus Topology

Password Authentication Protocols (PAP) PAP  implements the  traditional username and password  authentication methods. At the  request from  an authenticator the client respon

Why Routine security audits are essential It is essential that regular security audits are conducted to find out physically which computer is connected and permits access to

Packet loss and retransmission in TCP TCP gets reliability by retransmission. An acknowledgement is used to check that data has arrived successfully. If acknowledgement does no