Nt1310 Network Networks

Improved Essays
NETWORK CABLES
Network cables are the medium used for information to move from one network device to another. There are many different types of cable which are often used in Local Area Networks. Most network set-ups are likely to use a variety of network cable types. Whereas in some other cases, a very basic network may only utilise one kind of network cable. The cable needed varies according to the client’s needs for example the size of the network (PAN, LAN, MAN, WAN), the network protocols and even the network topology. Different cables have different characteristics and it is important to learn about the different cables available on a network to develop a successful network. In this report I will be discussing and comparing the
…show more content…
UTP cables consist of four pairs of wires inside the ‘jacket’ with each pair been twisted with a different number of twists per inch to help reduce the chances of interference from other pairs in the jacket and other electrical devices. By tightly twisting the wires, the transmission rate supported will increase alongside with it as well as the price per inch. This cable type can range in a number of categories from level 1 (which is used commonly for in-home telephone wiring) to level 6 (for Ethernet networking). The Electronic Industry Association and the Telecommunication Industry Association are the ones who have established the standards of UTP and have provided five rated categories of wire where both Category 3 and Category 5 UTP have a maximum segment length of 100 metres. Although there has been a new category 6 introduced and is used for much faster gigabit …show more content…
The shield’s purpose is to minimise electrical and radio frequency interference. These days, coax cables are often used or associate with television and some other broadband/ADSL services. Ultimately, there are two kinds of coaxial cable: thin coaxial and thick coaxial.

Thin coaxial
Thin coaxial is also referred to as ‘thinnet’ and is 10Base2. What this means is that in terms of the specifications of thinnet being able to carry Ethernet signals, thinnet can deliver a maximum segment length of up to 200metres before deteriorating. It is common to find the thin coax cables in public school networks and especially with linear bus networks.

Thick coaxial
Thick coaxial cable is also referred to as ‘thicknet’ and is 10Base5. What this means that in terms of the specifications of thicknet being able to carry Ethernet signals, thicknet can deliver a maximum segment length of up to 500metres before deteriorating. Thick coaxial cabling tends to be more expensive than thin coaxial cabling due to the further range with its extra protective plastic layer used to prevent moisture from damaging the central

Related Documents

  • Improved Essays

    Nt1310 Unit 1 Case Study

    • 1039 Words
    • 5 Pages

    Amazon 5 Bullet Points: MONITOR LOVED ONES OR PATIENTS REMOTELY: Receive instant alerts when a loved one or patient exits the chair to enabling you to provide immediate assistance to reduce falls and prevent injuries. EASY SET UP: Easy to use sensor pad connection is wireless for convenience and portability for use in different settings. Alarm is easily reset by reapplying pressure to the sensor pad or turning off the alarm setting. COMFORTABLE WATERPROOF PAD:…

    • 1039 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    IPsec is often installed on today's IPv4 networks to protect communication over VPN networks. It is used to access VPN, as well as between VPNs. IPv6 transition mechanisms can use this kind of infrastructure to achieve a certain level of protection, even in the absence of IPv6 IPsec. Remote IPv4 hosts access private networks by establishing encrypted VPN access to a gateway device set up for this purpose. If the same host is capable of IPv6, it can break through an IPv6 tunnel over this IPv4-protected communication channel.…

    • 274 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Case Study

    • 693 Words
    • 3 Pages

    1. The advantage of using a very large memory cell size is that the computer can store larger values in its memory cells. The disadvantage is that there would be fewer cells available. 2. This question asks how many bits are needed in the MAR with the following numbers a. 1 million bytes = 20 bits b. 10 million bytes = 24 bits c. 100 million bytes = 27 bits d. 1 billion bytes = 30 bits 3.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Hi Marcos, That's no problem; I'm always happy to help! You can access and download the required files using the credential's below. Once you access the FTP server, you will find a “FreeFlyer_Releases” folder that contains the most recent version of FreeFlyer, FreeFlyer 7.1.1. Within that subfolder you can select the bitness version installed on your system and access the "Extras" folder. Once you're in the folder then you will find a "Network Licensing" folder that will contain an lmadmin folder from which you can download and save freeflyr.exe to your system.…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    The port types available are Standard, Fast and Gigabit Ethernet which transmits from a range of speeds from 10Mb/s to…

    • 1605 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Figure 3 demonstrates the 3 layers that make up the SDN structure. Lowest layer represents the Infrastructure Layer or Forwarding Plane, mainly focusing on data forwarding but it also takes care of monitoring local information and gathering statistics. Next layer represents the Control Layer or Control Plane which is responsible for programming and managing the Forwarding Plane. Control Plane makes use of the information gathered by the Forwarding Plane in order to define the route and operation of the network.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    So you have an old Dell PowerEdge 2900 Server laying around with a few hard drives and your thinking I would really like to use this equipment as a NAS drive. It could happen, in our case it did. There were some stumbling blocks on the way though. Here is how we got through them… The goals we wanted to accomplish were creating a RAID5 array of 8 (7+1 Hot Spare) 1TB hard drives and then wanted to connect this FreeNas volume through and iSCSI channel to a file server that will present the NAS as a shared folder all of our servers could use. We quickly found that using the factory PERC (PowerEdge RAID Controller) to create a RAID 5 Array was not going to work.…

    • 608 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 2 Case Study

    • 235 Words
    • 1 Pages

    This isn't a problem from the technical side of things, fairly easy and straight forward. There is some basic hardware we would need, the cost for the hardware/software is minimal and/or provided as part of the service with some of the vendor options. We will need to make sure we are compliant with PCI regulations and ensure we are meeting the minimum levels of security required to keep customers’ credit card information secure, this shouldn't be a problem. There are some business decisions to make as far as which vendor would be best for us, they vary a little regarding fee's etc. and I'm not sure what impact there would be if some of these vendors may be sitting on our cash flow vs being directly deposited into our account (eg. paypal/square…

    • 235 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 3 Case Study

    • 283 Words
    • 2 Pages

    The kernel is not a fast food venor in this case but the system in which the operating system of the computer (such as Mac, Windows, Linux etc…) communicates with the cpu. What this bug has caused is a massive breach in the way this communication is happening because it has halted the communication from being coded allowing hackers to come in and destroy peoples systems. There should be a full investigation on Intel and any of the other affected chip makers and to prevent this from happening with any other chipsets in the future there needs to be government inspectors in this industry. I hope to learn why Intel/ARM chipset makers did not notice this bug and why they didn’t notify the public of this when they 1st discovered it. I also hope to…

    • 283 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6 Essay

    • 565 Words
    • 3 Pages

    This specifies the general interface between the network layer (IP etc.) and the Data Link layer (Ethernet, Token Ring etc.) It’s the standard for the upper Data Link layer sublayer, also known as the Logical Link Control layer. It’s responsible for flow and error control. The Data Link layer wants to send some data over the network, 802.2 LLC helps make this possible. b. 802.3 – Ethernet 802.3 is the standard which Ethernet operates by.…

    • 565 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The essential requirements of the organization is voice correspondence on which the whole business depends. In this way, the administration needs to pick the alternative which can improve the execution of the voice correspondence alongside the system versatility, cost adequacy and adaptability. As indicated by the given situation, the organization is offering for two alternatives, an exchanged Ethernet 100-Base – T network or Wi-Fi network. Both of these choices have their advantages and disadvantages and should be picked by the necessity. The organization can likewise concentrate on introducing voice only lines which may have better reliability and high performance for voice transfer.…

    • 234 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    Use of multiple routers in interconnected networks: Exchanging information about destination addresses using a dynamic routing protocol. A router has different physical ways to operate network connections, such as: • Fibre optic • Copper cables • Wireless A router also contains several firmware for different networks’ protocol standards.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    When communicating and interacting effectively with residents and their families it's important to be able to comprehend their feelings toward the difficult and confusion news. A caregiver should also speak with truth and compassion to let them know your support will be there when needed. Provide clarification to the resident and their families about what psychosocial needs the resident may be going through. Also, providing options that can influence the resident to overcome the situation by assisting them with activities that allow the resident and their families to work together to help the resident start liking himself or to control his emotions.…

    • 102 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Ethernet Technology The Ethernet technology was mostly used in the LAN because; 1. We used Ethernet speed of 10mbps for areas in the LAN that required higher bandwidth 2. Our campus network model supports dual links between each distribution layer routers and case switches. We are there able to load balance the aggregate traffic from multiple access switches across the links.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    The Internet was originally called the ARPANET, and in order to enhance the ARPANET to be enable may different types of computer networks to all communicate with each other, an open source protocol needed to be created, hence the development of TCP/IP. TCP/IP improved communications throughout the network and allowed all computers to easily communicate with one another. Another technology that helped expand the ARPANET to more users in a specific location was the development of the Ethernet. Ethernet is a coaxial cable that is still used today in many local area networks. Ethernet is highly effective in moving data from one computer to another at high speeds.…

    • 790 Words
    • 4 Pages
    Improved Essays