using Negative acknowledgement (NAK) in data link layer protocols? 02 OR (b) 1. Differentiate between wireless and mobile systems with example 05 2. Briefly explain any two forms of E-Commerce 02 Q.3 (a) 1. Write a note on: UTP (Unshielded Twisted Pair) Cables 03 2. Explain the working of fiber optic networks with diagram 04 (b) 1. Differentiate between packet switching and circuit switching 05 2. Briefly explain the need and application of ISM band in wireless communications 02 OR Q
Premium Ethernet OSI model Internet
Computer Networks NETWORKING CONCEPTS Network A network is basically an interconnection of various points to make a connected system e.g Road‚ Telephone‚ Social Data Network A computer network therefore refers to an interconnection of computers and other peripherals by use of a communication link Peer to Peer Networks In a peer-to-peer network‚ all computers are considered equal; they all have the same abilities to use the resources available on the network. Peer-to-peer networks are designed
Premium Ethernet Data transmission Modulation
cards (NIC)‚ this allows the server to communicate with any computer on the network. [pic] 12. Your network consists of a 24-port bridge‚ two servers‚ and 15 workstations. Each computer interfaces with the bridge using its own segment of CAT 5 twisted-pair cable‚ which is terminated at both ends with RJ-45 connectors. What type of physical topology do you have? a. Mesh b. Bus c. Ring d. Star I believe this to be a star topology because each of the 15 work station connects to a central point
Premium Twisted pair Computer network Ethernet
jack such as this does what two things to each wire? Secures the wire into the slot and cuts the insulation on the wire 6. What is the most critical part of the termination procedure to ensure low crosstalk on the connection? Keep the wires twisted as much as possible until reaching the termination point (RJ-45 connector): 7. How is the outer insulation covering each wire cut through during the termination procedure? When using the punch tool‚ press down halfway to secure the wire‚ then
Premium Twisted pair Cable Ethernet
problem with leaving abandoned cable in place in a building? Abandoned cable can really be a fire hazard 5. Why must the twisting in the individual wires be maintained in a UTP cable? When twisting cable it is very important because if it gets un twisted it can cause a lot of crosstalk and other interference. 6. How many wires does a gigabit cable use? It would be 8 wires 7. Is the labeling standard commonly used or not used? It is used about half the time 8. Grounding should be attached to what
Premium Twisted pair Ethernet Cable
INDUSTRIAL TRAINING REPORT Submitted by:- Meenakshi Gupta 6040 1184751 Ece -5b LUDHIANA COLLEGE Of Engineering and Technology‚ Ludhiana Acknowledgement I would like to add a few heartfelt words for the people who were
Premium Network topology GSM Twisted pair
connected to the patch panel mounted in a relay rack in each of building closets. Cat6 is the most advanced cable in its category. . Cat 6 cable supports up to 10 Gigabit Ethernet for up to about 37 meters or 121 feet. Cat6 cables are made up of four twisted sets of copper wire and its abilities surpass cat5 and cat5e types of data cabling because it has a structural difference in its longitudinal separator 3. Should fiber optic horizontal cabling be installed but not terminated as future proofing
Premium Network topology Cable Ethernet
entries in Table 4- 1. Use your textbook and Internet research to compose your answer. The common connector for interfacing UTP wires to a computer for networking is the Registered Jack 45 ( RJ- 45) interface. This uses eight copper wires ( four twisted pairs) to complete the connection between interfaces. The pinout for these wires defines the order in which the individual wires connect to the network interface card and how the wires transition from one end of the cable to the other. A straight
Premium Twisted pair Coaxial cable Wire
International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3‚ Issue 2‚ March -April 2013‚ pp.401-409 Twisted Amplitude Phase Shift Keying ABSTRACT Several modulation techniques are defined in digital modulation‚ Here we are discussing about in four modulation techniques‚8-PSK‚8-TAPSK‚16TAPSK and 16-QAM. In the paper we derive minimum non coherent distance(dnc)of block coded TAPSK and compare it with different modulation techniques‚ i.e. 8-PSK and
Premium Modulation
BUTERE DISTRICT JOINT EVALUATION TEST - 2010 451/1 Computer studies PAPER 1 MARKING SHEME 1. (a) Purpose of registers in a computer systems. To temporarily hold data that is waiting to be processed or after processing. 1mk (b) Types of register found in the central processing unit. - Addressing register - Storage register 1mk 2. Comparison between a data matrix and a laser printer. Dot matrix – Low print quality‚ noisy‚ Low cost Laser – High
Premium Computer Spreadsheet Computer science