This website uses cookies to ensure you have the best experience. Learn more

Characteristics Of Computer Network Media Essay

1519 words - 6 pages

Characteristics of Computer Network Media

With the emergence of the Ethernet LAN (Local Area Network) introduced in the early 1970s by Xerox, the telecommunications world has welcomed this newfound gift with open arms. Since communications is such a vital aspect of all businesses these days, proper acquaintance with this marvelous technology can greatly enhance your company's productivity and efficiency. In this paper, we will reflect into the many different characteristics of media that the LANs are based upon and compare/contrast these different medias.
There are basically four types of media used for Local Area Networks. The most commonly used are twisted copper pairs, Coaxial cables, Fiber Optic, and the Wireless technology.
Twisted copper wire, also known, as the common telephone wire is very similar to the wires used in telephone systems. However, the twisted pair wire required for reliable data transmission is of a heavier gauge than the telephone wire. It uses 24 to 26 AWG (American Wire Gauge, The purpose of twisting the copper wires together is to minimize the interference between the two adjacent wires. Otherwise, there would be too much line noise to transfer voice or data efficiently. There are two different types of twisted pairs that are used to transmit data. The STP (Shielded Twisted Pair) and the UTP (Unshielded Twisted Pair). Just like it sounds, the STP is a special kind of copper telephone wiring used in some business installations. An outer covering or a shield is added to the twisted pair acting as a ground. This process shields the twisted pair from EMI (Electro-magnetic Interference), which will disturb the data transmission greatly. The UTP is just a twisted pair without the extra shielding. It just relies on the copper twists to protect it from the EMI. The twisted pairs are grades into five different categories by their data carrying ability. The 6th grade is still in the works. (Please refer to the diagram below:

Category Maximum data rate Usual application
CAT 1 Less than 1 Mbps Analog voice (plain old telephone service)ISDN Basic Rate InterfaceDoorbell wiring
CAT 2 4 Mbps Mainly used in the IBM Cabling System for Token Ring networks
CAT 3 16 Mbps Voice and data on 10BASE-T Ethernet
CAT 4 20 Mbps Used in 16Mbps Token RingOtherwise not used much
CAT 5 100 Mbps 100 Mbps TPDDI155 Mbps ATM
As you can see, the twisted pairs can range greatly in bandwidth by the different levels of CATs. For a LAN environment, the CAT 2 and above are used because they can transmit greater amounts of data. These generally are used for Token Ring LANs except for the CAT 3, which is only supported by the Ethernet LANs. Most companies who have networks in the offices use twisted pair system to run their LAN. Using the twisted pair media for LANs is very attractive because of its low cost; mainly the UTP setup because it cost much less than the STPs and the STP...

Find Another Essay On Characteristics of Computer Network Media

Network Design Essay

1566 words - 6 pages Network Design Network Design is very important when it comes to implementing a connection between a computer and a server. According to Network world Websites, Network is defined as a “connected collection or devices and end systems, such as computers and servers, that can communicate with each other”(McQuerry). Network carry data in many types of environment, such as homes, small businesses, and large enterprises. Network

Computer Network Management Essay

1391 words - 6 pages The Basics of Network Management In the computer world, networks are the primary means of inter-computer communications. The building and maintenance of a network is the responsibility of the network manager. The network manager must have the expertise to design and implement an appropriate network for his client. The proper design of a network is based on more than a few principles. However, the job of the network manager encompasses

advantages of topologies

731 words - 3 pages ” (Mansfield, K. C., & Antaonakos, J. L., 2010, p. 27). Among some of the advantages of the ring topology is its organization, the reduction of collision and the one direction traffic flow at very high speed. Another advantage is that for connectivity between workstations, there is no need for network server to control such connectivity and each computer system has the same access to all network resources. One disadvantage of the ring topology is that

Networks and Modern Communications

3036 words - 12 pages expands the capability of checking up on someone's personal background or receiving an electronic list of prospective customers quickly and inexpensively. Indeed we are moving perilously close to the reality of immediate online personal data. Network Types There are two types of computer networks. The first is called a peer-to-peer network. Although it sounds complicated, it just means all the

Antivirus Programs APA Style Word 2007

376 words - 2 pages Antivirus ProgramsAntivirus ProgramsSimple simonApplied Information ProcessingMIS 330Victoria DUpraOctober 31, 2008Antivirus ProgramsToday people rely on computers to create, store, and manage critical information, many times via a home computer network. Information transmitted over networks has a higher degree of security risk than information kept in a user's home or company premises. Thus, it is crucial that they take measures to protect

OSI Model

2117 words - 8 pages level is the level where most users will interact with the computers. For this reason, it is sometimes referred to as the highest level in the model. The application level is where network requests originate. For example, this is the level where someone using a word processing program will originate the command to print using a network computer. Thus, the application level is the link between the user and the network. Some of the required

Using Networks to Develop a Smart Home

1159 words - 5 pages INTRODUCTION A network is a set of communication devices that connected by wired or wireless to others device media link. The common network types are Personal Area Network (PAN), Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN). Instead LAN, PAN also can be built using either wired or wireless technology. In this assignment, i will focus on Wireless Personal Area Network (WPAN) which is implemented IEEE

Poke Me Poke You - A Connected Community

810 words - 3 pages Sites: The Role of Networked Publics in Teenage Social Life. In D. Buckingham (Ed.), MacArthur Foundation Series on Digital Media and Learning (Vol. Youth, Identity, and Digital Media, pp. 119-142). Cambridge MA: MIT Press. boyd, d. m., & Ellison, N., B. . (2008). Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication, 13(1), 210-230. Downes, S. (2005). Semantic networks and social networks. The

Bead Bar: Computer Network Design: Network Topology and Architecture

1543 words - 6 pages they will use the network to make improvements in a company. For example, a LAN that allows users to collaborate on projects may change an organization in which everyone is used to working alone.Network Topology and ArchitectureNow that the need for a computer network system has been identified, the network topology and architecture needs to be configured. Topology is the physical layout of a network combined with its logical characteristics

Workplace Systems Support

637 words - 3 pages diverse security levels for different clients and users. Also, when deemed necessary, the administrator can remove and/or lock any removable media drives on the client computer terminals.As the network administrator, a large portion of systems support is to monitor the network's performance. This step is necessary to prevent overloading of the network. The administrator can see whether or not new hardware is needed by viewing how much memory and

Artificial Intelligence Applied to Computer Forensics

952 words - 4 pages digital storages media in particular or modern science in generally make the cyber-crime investigation increasingly complex because the more and more data in bigger digital storage media while current forensic investigation tools were not powerful enough to analyze a large amount of evidence found. That leads to the result of consuming too much time of the computer experts to perform the test, also the existing infrastructure to do forensic

Similar Essays

The Life Of A Network & Computer Specialist

1821 words - 8 pages Lee JohnstonConnie WongGen 300February 2, 2004The Life of a Network & Computer SpecialistInformation Technology is an exhilarating profession that requires commitment and hard work. A specialist may sit at a desk or out in the field correcting problems. The problems could consist of fixing programs, technical briefs, and an assortment of other assignments. In the beginning, a specialist starts below an analyst. In several years a specialist

Dell Computer: Organization Of A Global Production Network

6388 words - 26 pages INTRODUCTIONIn 2001, Dell Computer became the world's largest personal computer vendor, continuing togain market share and post profits in an industry struggling with slumping sales and billions ofdollars in losses. Dell sells 90% of its PCs directly to the final customer, largely bypassing thereseller channel that accounts for most of the world's PC sales. This direct customer relationshipis the key to Dell's business model, and provides

The Use Of Social Network Or Social Media For Recruitment Purposes

814 words - 4 pages The use of social network or social media for recruitment purposes provide a substantial prospects for employers to search and recruit potential candidates. Since social media and online resources are the most available and effective tools in the 21st century, they are more convenient and appropriate to use for recruitment purposes nowadays. But as there are number of advantages there are also couple of significant challenges for employers if

Computer Crimes Need To Be Prevented And Halted Through Increased Computer Network Security Measures As Well As Tougher Laws And Enforcement Of Those Laws In Cyberspace

3335 words - 13 pages Legion of Doom, have been exposed in the media recently. These groups and most malicious hackers are involved in computer crime for the profit available to them.Individual hackers are often male teenagers. They comprise the majority of the computer criminals, although they do pose a major threat to society's computer uses.Computer criminals have various reasons for doing what they do. The main reason computer crimes are being committed on the large