Types of wires, Computer Networking

Assignment Help:

TYPES OF WIRES:

 Cable used for wiring would match the following:

  • The intended speed
  • The distance between computers
  • The amount of noise
  • Anticipated future requirements
  • price

Some types and their typical uses are given in the figure below.1661_TYPES OF WIRES.png

Figure 

WIRING SCHEMES AND OTHER NETWORK TECHNOLOGIES:

 Multiple wiring functions are not limited to Ethernet technology. Almost every network methods use different wiring procedures. IBM's token ring also needs hubs to run a logical ring network.

 


Related Discussions:- Types of wires

Define remote procedure call (rpc), RPC adumbrates the intricacies of the ...

RPC adumbrates the intricacies of the network by using the ordinary procedure call mechanism familiar to each programmer. A client process calls a function on a remote server and

Explain full duplex data transmission, Q. Explain Full Duplex data transmis...

Q. Explain Full Duplex data transmission? - Have two separate Communication channels as well as use each one for simplex Data traffic (in different directions). - If this is

Explain tree interconnection network, Tree interconnection network:   In tr...

Tree interconnection network:   In tree interconnection network, processors are organised in a complete binary tree pattern. Figure: Tree interconnection network

Networking & computer architecture long question, Write discussion on Assoc...

Write discussion on Associative mapping - computer architecture.

What is the beaconing, An FDDI frame or Token Ring frames those points to s...

An FDDI frame or Token Ring frames those points to serious problem with the ring, like a broken cable. The beacon frame carries the address of the station thought to be down.

What are called fat clients and fat servers, If the amount of the applicati...

If the amount of the application runs on the Client side, then it is Fat clients. It is mostly used for decision support and personal software. If the amount of the application

CEI45 Network Communications, How could a VPN be used to facilitate secure ...

How could a VPN be used to facilitate secure remote administration of a server?

Explain the term- bits and bitmap, Explain teh term- Bits and Bitmap ...

Explain teh term- Bits and Bitmap Many tiny dots, which are put together to make a picture. Bits are combined to make a graphic image called a bitmap. GIF and JPEG files are

List some most useful advantages of token ring, List some most useful advan...

List some most useful advantages of Token Ring. Here are Token ring's most useful advantages: a. It depends excellent throughput under high-load conditions. b. Token Ring

Network design with configuration, hi. this is 700 words assignment..how mu...

hi. this is 700 words assignment..how much charges will be for this..?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd