Characteristics Of Computer Network Media Essay

1519 words - 6 pages

Characteristics of Computer Network Media

With the emergence of the Ethernet LAN (Local Area Network) introduced in the early 1970s by Xerox, the telecommunications world has welcomed this newfound gift with open arms. Since communications is such a vital aspect of all businesses these days, proper acquaintance with this marvelous technology can greatly enhance your company's productivity and efficiency. In this paper, we will reflect into the many different characteristics of media that the LANs are based upon and compare/contrast these different medias.
There are basically four types of media used for Local Area Networks. The most commonly used are twisted copper pairs, Coaxial cables, Fiber Optic, and the Wireless technology.
Twisted copper wire, also known, as the common telephone wire is very similar to the wires used in telephone systems. However, the twisted pair wire required for reliable data transmission is of a heavier gauge than the telephone wire. It uses 24 to 26 AWG (American Wire Gauge, The purpose of twisting the copper wires together is to minimize the interference between the two adjacent wires. Otherwise, there would be too much line noise to transfer voice or data efficiently. There are two different types of twisted pairs that are used to transmit data. The STP (Shielded Twisted Pair) and the UTP (Unshielded Twisted Pair). Just like it sounds, the STP is a special kind of copper telephone wiring used in some business installations. An outer covering or a shield is added to the twisted pair acting as a ground. This process shields the twisted pair from EMI (Electro-magnetic Interference), which will disturb the data transmission greatly. The UTP is just a twisted pair without the extra shielding. It just relies on the copper twists to protect it from the EMI. The twisted pairs are grades into five different categories by their data carrying ability. The 6th grade is still in the works. (Please refer to the diagram below:

Category Maximum data rate Usual application
CAT 1 Less than 1 Mbps Analog voice (plain old telephone service)ISDN Basic Rate InterfaceDoorbell wiring
CAT 2 4 Mbps Mainly used in the IBM Cabling System for Token Ring networks
CAT 3 16 Mbps Voice and data on 10BASE-T Ethernet
CAT 4 20 Mbps Used in 16Mbps Token RingOtherwise not used much
CAT 5 100 Mbps 100 Mbps TPDDI155 Mbps ATM
As you can see, the twisted pairs can range greatly in bandwidth by the different levels of CATs. For a LAN environment, the CAT 2 and above are used because they can transmit greater amounts of data. These generally are used for Token Ring LANs except for the CAT 3, which is only supported by the Ethernet LANs. Most companies who have networks in the offices use twisted pair system to run their LAN. Using the twisted pair media for LANs is very attractive because of its low cost; mainly the UTP setup because it cost much less than the STPs and the STP...

Find Another Essay On Characteristics of Computer Network Media

Networks and Modern Communications Essay

3036 words - 12 pages expands the capability of checking up on someone's personal background or receiving an electronic list of prospective customers quickly and inexpensively. Indeed we are moving perilously close to the reality of immediate online personal data. Network Types There are two types of computer networks. The first is called a peer-to-peer network. Although it sounds complicated, it just means all the

OSI Model Essay

2117 words - 8 pages level is the level where most users will interact with the computers. For this reason, it is sometimes referred to as the highest level in the model. The application level is where network requests originate. For example, this is the level where someone using a word processing program will originate the command to print using a network computer. Thus, the application level is the link between the user and the network. Some of the required

Bead Bar: Computer Network Design: Network Topology and Architecture

1543 words - 6 pages they will use the network to make improvements in a company. For example, a LAN that allows users to collaborate on projects may change an organization in which everyone is used to working alone.Network Topology and ArchitectureNow that the need for a computer network system has been identified, the network topology and architecture needs to be configured. Topology is the physical layout of a network combined with its logical characteristics

Workplace Systems Support

637 words - 3 pages diverse security levels for different clients and users. Also, when deemed necessary, the administrator can remove and/or lock any removable media drives on the client computer terminals.As the network administrator, a large portion of systems support is to monitor the network's performance. This step is necessary to prevent overloading of the network. The administrator can see whether or not new hardware is needed by viewing how much memory and

A Computer Engineering Careers

508 words - 2 pages with new software and hardware, and also applying algorithmic and object-oriented problem solving skills and techniques. Having a clear understanding of the way data and computer structures operate is an important aspect in computer engineering. As a career, computer engineering is used in different industries including manufacturing, industrial, media, web development, and many others. A computer engineer can also work in other programming

Poke Me Poke You - A Connected Community

810 words - 3 pages Sites: The Role of Networked Publics in Teenage Social Life. In D. Buckingham (Ed.), MacArthur Foundation Series on Digital Media and Learning (Vol. Youth, Identity, and Digital Media, pp. 119-142). Cambridge MA: MIT Press. boyd, d. m., & Ellison, N., B. . (2008). Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication, 13(1), 210-230. Downes, S. (2005). Semantic networks and social networks. The

Artificial Intelligence Applied to Computer Forensics

952 words - 4 pages digital storages media in particular or modern science in generally make the cyber-crime investigation increasingly complex because the more and more data in bigger digital storage media while current forensic investigation tools were not powerful enough to analyze a large amount of evidence found. That leads to the result of consuming too much time of the computer experts to perform the test, also the existing infrastructure to do forensic

Network Operating System

774 words - 3 pages other Windows computers. WINS (Windows Internet Naming Service) resolves Windows network computer names (also known as NetBIOS names) to Internet IP addresses, allowing Windows computers on a network to easily find and communicate with each other. Using a WINS server is essential for any Windows client computer to work with other Windows computers over the Internet. In addition, using a WINS server is essential for any Windows client computer at

OSI, TCP/IP models comparison

791 words - 3 pages layer, the presentation layer, and the application layer. Now we will talk about what each of these layers is responsible for."The physical layer is the physical point of connection between a computer and the network. This layer controls the transmission of information, while specifying the mechanical and electrical characteristics of the protocol in terms of connector size, pin assignments, and voltage levels" (Raja, Nwankwo, & Martha, n.d

Computer viruses

3440 words - 14 pages is capable of reproducing copies of itself and inserting them into other programs or files. It is often attached to a software or document that a computer user receives. When the software containing the virus is run or when the file is opened the virus may infect the computer's software and cause damage.A computer virus is so-called a virus because it has similar characteristics with a biological virus. In the same manner that a biological virus

contributions of Functionalism,Conflict & Symbolic Theories to education

8123 words - 32 pages designed for a town or city.home-area networks (HANs): A network contained within a user's home that connects a person's digital devices.In addition to these types, the following characteristics are also used to categorize different types of networks:topology : The geometric arrangement of a computer system. Common topologies include a bus, star, and ring. See the Network topology diagrams in the Quick Reference section of Webopedia.protocol : The

Similar Essays

Dell Computer: Organization Of A Global Production Network

6388 words - 26 pages INTRODUCTIONIn 2001, Dell Computer became the world's largest personal computer vendor, continuing togain market share and post profits in an industry struggling with slumping sales and billions ofdollars in losses. Dell sells 90% of its PCs directly to the final customer, largely bypassing thereseller channel that accounts for most of the world's PC sales. This direct customer relationshipis the key to Dell's business model, and provides

Computer Crimes Need To Be Prevented And Halted Through Increased Computer Network Security Measures As Well As Tougher Laws And Enforcement Of Those Laws In Cyberspace

3335 words - 13 pages Legion of Doom, have been exposed in the media recently. These groups and most malicious hackers are involved in computer crime for the profit available to them.Individual hackers are often male teenagers. They comprise the majority of the computer criminals, although they do pose a major threat to society's computer uses.Computer criminals have various reasons for doing what they do. The main reason computer crimes are being committed on the large

Network Design Essay

1566 words - 6 pages Network Design Network Design is very important when it comes to implementing a connection between a computer and a server. According to Network world Websites, Network is defined as a “connected collection or devices and end systems, such as computers and servers, that can communicate with each other”(McQuerry). Network carry data in many types of environment, such as homes, small businesses, and large enterprises. Network

Computer Network Management Essay

1391 words - 6 pages The Basics of Network Management In the computer world, networks are the primary means of inter-computer communications. The building and maintenance of a network is the responsibility of the network manager. The network manager must have the expertise to design and implement an appropriate network for his client. The proper design of a network is based on more than a few principles. However, the job of the network manager encompasses