Types of wires, Computer Networking

Assignment Help:

TYPES OF WIRES:

 Cable used for wiring would match the following:

  • The intended speed
  • The distance between computers
  • The amount of noise
  • Anticipated future requirements
  • price

Some types and their typical uses are given in the figure below.1661_TYPES OF WIRES.png

Figure 

WIRING SCHEMES AND OTHER NETWORK TECHNOLOGIES:

 Multiple wiring functions are not limited to Ethernet technology. Almost every network methods use different wiring procedures. IBM's token ring also needs hubs to run a logical ring network.

 


Related Discussions:- Types of wires

What rate rtcp will limit, Consider an RTP session consisting of five users...

Consider an RTP session consisting of five users, all of which are sending and receiving RTP packets into the same multicast address. Each user sends video at 200kbps. a)  What

Debug ip igrp transaction, To monitor IP igrp traffic, we can use "debug IP...

To monitor IP igrp traffic, we can use "debug IP igrp transaction" or "debug IP igrp events". How do we show information about IPX routing update packets? Ans) Bu using debug ip

Illustrate about rsa encryption, Q. Illustrate about RSA Encryption? R...

Q. Illustrate about RSA Encryption? RSA Encryption - Public key encryption technique - Encryption steps: - Encode data to be encrypted as a number to create the pla

Determine the maximum output current, A logic gate drives a load, which has...

A logic gate drives a load, which has a resistance of 1 kÙ and a capacitance of 20 pF. The printed circuit track connecting the gate to its load has an 40 pF capacitance to ground.

Determine the term- cyberspace, Determine the term- Cyberspace The c...

Determine the term- Cyberspace The conceptual or virtual area where pages, data, images, and all the rest are stored. It is the area from where requests are accepted and ful

Determine about the proxy servers, Determine about the proxy servers T...

Determine about the proxy servers There are proxy servers that act as good firewall protection for the entire Intranet system. In some cases, firewall comes as a separate serv

Parts count method, PARTS COUNT METHOD This prediction method is appli...

PARTS COUNT METHOD This prediction method is applicable at preliminary stages, during bid proposal and early design phases; when insufficient information is available regardin

Distance vector and link-state protocol, What's the difference among distan...

What's the difference among distance vector and link-state protocol?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd