You are on page 1of 3

NAME: MUHAMMAD HASEEB LIAQAT

ROLL NUMBER: 119

DEPARTMENT: BBA

SUBJECT : COMPUTING SKILLS

SUBMITTED TO : RANA FAISAL HAYAT SIR

Q: what is twisted pair cables? Why we use it?

Twisted pair is the ordinary copper wire that connects home and business computers to the telephone
company. To reduce crosstalk or electromagnetic induction between pairs of wires, two insulated copper
wires are twisted around each other. Each connection on twisted pair requires both wires.

Uses of twisted pair cable :

Compared to a single conductor or an untwisted balanced pair, a twisted pair reduces electromagnetic
radiation from the pair and crosstalk between neighboring pairs and improves rejection of external
electromagnetic interference. It was invented by Alexander Graham Bell.

Q : Explain Coxial and fiber optic cable? Why we use this cable and which scanrio we are used this
type of cable?

Coaxial cable Is commonly used by cable operators, telephone companies, and internet providers around
the world to convey data, video, and voice communications to customers. It has also been used
extensively within homes.Coaxial cable has been around for a long time as a technology (since the early
20th century) and has many singular advantages for reliable, accurate transmission.It also has
limitations that will cause it to be replaced in some cases by fiber optic cable, category cable or,
sometimes, by wireless signals.

The key to coaxial cable’s success has been its shielded design, which allows the cable’s copper core to
transmit data quickly, without succumbing to interference or damage from environment factors.

The three most common cable sizes are RG-6, RG-11 and RG-59:

RG stands for “radio guide.” The numbers of the various versions of RG cable refer to the diameter (59
meaning .059, and 6 meaning .06, etc.). They are also called RF cables, which stands for “radio
frequency”.

Most non-industrial coax is now known as RG-6, but installers may use a thicker cable, like RG-11.

RG cables used in homes should be 75 ohm impedance.

Q : Difference between WEP and WPA? Which scanrio we used WEP And WPA?

WEP (Wired Equivalent Privacy) is the oldest and most common Wi-Fi security protocol. It was the
privacy component established in the IEEE 802.11, a set of technical standards that aimed to provide a
wireless local area network (WLAN) with a comparable level of security to a wired local area network
(LAN).

The Wi-Fi Alliance ratified WEP as a security standard in 1999. Once touted to offer the same security
benefits as a wired connection, WEP has been plagued over the years by many security flaws. And as
computing power has increased, these vulnerabilities have worsened. Despite efforts to improve WEP,
it’s still vulnerable to security breaches. The Wi-Fi Alliance officially retired WEP in 2004.

Any systems still using WEP should be either upgraded or replaced.

WPA :

WPA (Wi-Fi Protected Access) is a wireless security protocol released in 2003 to address the growing
vulnerabilities of its predecessor, WEP. The WPA Wi-Fi protocol is more secure than WEP, because it uses
a 256-bit key for encryption, which is a major upgrade from the 64-bit and 128-bit keys used by the WEP
system.

WPA also uses the Temporal Key Integrity Protocol (TKIP), which dynamically generates a new key for
each packet, or unit of data. TKIP is much more secure than the fixed-key system used by WEP.

Still, WPA is not without flaws. TKIP, the core component of WPA, was designed to be implemented onto
WEP-enabled systems via firmware updates. This resulted in WPA still relying on easily exploitable
elements.
WPA VS WEP

WPA (Wi-Fi Protected Access) and WPA2 (Wi-Fi Protected Access 2) are two security standards that
protect wireless networks. WPA2 is the second generation of the Wi-Fi Protected Access security
standard and so is more secure than its predecessor, WPA.

Your Wi-Fi router likely includes both WPA and WPA2 security protocol options. When turning on Wi-Fi
encryption on your router, choose WPA2 for the most secure Wi-Fi protection.

To check your Wi-Fi security protocol, open the Windows Start menu, then type Wi-Fi settings. Click the
Wi-Fi network you’re connected to and scroll to Properties . If you have an older computer, note that
WPA2 requires more processing power to protect your network. But this only concerns older access
points using WPA2 via a firmware upgrade. Most current access points are equipped with hardware
capable of processing WPA2 without a problem.

If your connection speed is slow even with modern hardware, learn how to speed up your internet
connection or check out our guide to speeding up your computer.

You might also like