why we twist the cable in case of twisted pair cable?plz
give me technical answer.
Answers were Sorted based on User's Feedback
Answer / jass
the cables are twisted to cancel the effect of any external
magnetict field which can distort the signal.the twists
cancels that effect
| Is This Answer Correct ? | 42 Yes | 5 No |
Answer / vaibhav kadam
wenever a signal transmits in a cable,itself produces interference.this interfernce can damage the signal.using a twisted pair..we use two pairs of cable.
both the cable pairs are loosely coupled from each other.
where in the single pair is tightly coupled so the interference get cancelled...so we use twisted pair..simpeeel...
| Is This Answer Correct ? | 15 Yes | 6 No |
Answer / shaikhsadik
becuase of elecromagnetic radiation effect we can twist the
cable in twisted pair un shielded
| Is This Answer Correct ? | 2 Yes | 1 No |
Answer / s.m.feroz ahmed
Hi,
Twisted pair cable one just twist the wire in order to get
the climping of RJ45 jack in a proper way to climp wires in
RJ45 jack in a sequence manner for communication between 2
similar devices we require cross cabling and for
communication between 2 dissimilar devices one requires
straight cabling.The sequence of straight cabling is
green,whiteofgreen,orangewhiteofbrown,brown,whiteoforange,bl
ue,whiteofblue and this is purely techinical solution.
| Is This Answer Correct ? | 0 Yes | 9 No |
Mention what are the ranges for the private ips?
Identify the type of hardware required to connect a Token ring network to an Ethernet network? A.) Repeater B.) TR-Enet C.) Router D.) Token Ring to Ethernet translation hub
Which cable we connect in db-9?
What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer
Given the following IP address from the Class C address range 192.168.21.12. Your network plan needs addresses for 28 small prkps Each office uses its own shored. The network design specifies that you confound for five bits of subnetting. When you confound for this in Cisco IOS software which shored mask should you use? A. 255.255.0.28 B. 255.255.255.0 C. 255.255.255.28 D. 255.255.255.248 E. 255.255.255.252
What is the difference between dynamic NAT and NAT overloading
Identify the switching method that receives the entire frame then dispatches it? A.) Cut-through B.) Receive and forward C.) Store and forward D.) Fast forward
What is the IP extended access list range? A.) 1000-1099 B.) 100-199 C.) 1-99 D.) 101-200
Which frame has a Type field to identify the upper-layer protocol? A.) 802.3 B.) 802.2 C.) 802.5 D.) Ethernet_II
If there is only 2 host in bus topology is that possible collision accord?
Which of the following are logged when IP access list logging is enabled? A.) source address B.) protocol C.) source port D.) destination address E.) access list number F.) destination port
Your company has been assigned the IP address of 201.222.5.0 and require having 20 subnets. As the company’s network administrator, find the following: a) the subnet mask (2 marks) b) the number of useable subnets (2 marks) c) the subnetwork address for the 4th subnet (2 marks) d) the first usable IP address for the 4th subnet (2 marks) e) the last usable IP address for the 4th subnet (2 marks) f) the broadcast address for the 4th subnet. (2 marks)