Twisted pair cable - computer network, Computer Networking

Assignment Help:

Twisted Pair Cable

Twisted pair cable  consists of two insulated copper  wires  each  about 1 mm  thick arranged in a regular spiral  pattern. The wires  are twisted together to reduce the  electrical  interference from similar pairs  which are closely by. Typically a number of pairs  are bundled together in  a cable by wrapping the  pairs in  protective  shield. A wire pair constructions it  communication  link. Unshielded  twisted pair (UTP) is commonly  used for  compute network  within a building  that is for  LAN data rate for  LAN using  twisted pair today range from 10Mbps  to 1 Gbps. The data rates  can be achieved depend on  the thickness of the wire and the distance between transmitter and receiver.  The  least expensive and most commonly used guided transmission medium is twisted pair  copper wire. For over a  hundred years it has been used by telephone  networks. In fact  more  than 99 percent of  the wired  connections from  the telephone  handset to the local  telephone switch  use twisted pair copper  wire. Most  of us have seen twisted pair at our homes and work  environments.

The most  common  twisted pair cable  used in communication is refereed to as unshielded twisted pair(UTP). IBM has also produced a version of twisted pair cable for its  use called  shielded twisted pair cable(STP). STP cable has metal foil of braided mesh covering that encase each pair  of insulated conductors. Although casing  improves the quality of cable  by preventing the penetration of noise  or cross talk it is bulkier and more  expensive figure 2.8 shows the difference between UTP and STP.

The electronic  industries association(EIA) has developed  standard to classify unshielded twisted pair cable into  seven categories. Categories are determined by cable  quality with 1 at  lowest 5 UTP can achieve data rates of 100Mbps  for distances up to  few  hundred  meters. Even  higher data  transfer rates are possible  over shorter distance.

Twisted pair  cables  are used  in telephone lines to provide different voice  and data  channels. The local loop is  that line which  connects and subscribes to the central telephone  office commonly.

 


Related Discussions:- Twisted pair cable - computer network

Different type of networking and internetworking device, What is the differ...

What is the different type of networking / internetworking devices? Repeater: Also called a regenerator, it is an electronic device that operates only at physical layer. I

Distant vector protocols, RIP and IGRP are Distance Vectoring protocols tha...

RIP and IGRP are Distance Vectoring protocols that send their whole routing tables to their neighbours. In some Cisco literature, EIGRP is listed as an 'advanced distance vector

Explain the layer which is closer to the user, There is only an applicatio...

There is only an application layer which is closer to user and also gives many application which user directly linked.for ex:- web browser

Determine teh term - selection of computing infrastructure, Selection of co...

Selection of computing infrastructure The computing equipment on an Intranet must be selected in such a manner that they do not get obsolete very quickly or become too costly f

Retransmission of packets - transport layer, Retransmission of packets ...

Retransmission of packets The disadvantage  of thronging away a correctly received packet is that  the subsequent retransmission  of the  packet might  be lost  or garbled and

What are the important topologies for networks, What are the important topo...

What are the important topologies for networks? BUS topology: In this every computer is directly linked to primary network cable in a single line. Advantages: Inexpensive,

Show the basic handover types in umts, Question: (a) Show the main elem...

Question: (a) Show the main elements of the GSM system architecture and describe their functions. (b) Looking at the HLR/VLR database approach used in GSM-how does this arc

Define the term socks- network security, Define the term Socks- Network sec...

Define the term Socks- Network security As it is well known, each type of network security protects data at a different layer of the OSI model. Built-in at each layer lies the

Architecture of cisco ios software, Architecture of Cisco IOS software ...

Architecture of Cisco IOS software Cisco IOS might not  applications like ms word,multimedia softwares. It is mainly for switching data packet and concentrated on switching p

Host system in tcp-ip model, Q. Host System in TCP-IP model? - Standard...

Q. Host System in TCP-IP model? - Standards adopted because of widespread use like (Internet) - The protocols came first plus the model was really just a description of the

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd