Drop Cable


Drop Cable, in computer networking, is a cable connecting a computer’s network interface card (NIC) to a transceiver attached to a thicknet cable.

What is Drop Cable (in computer networking)?

In standard Ethernet networks, a cable connecting a computer’s network interface card (NIC) to a transceiver attached to a thicknet cable. A drop cable is also called a «transceiver cable».




Drop Cable - Fiber Optic

More generally, a drop cable is any short cable connecting a computer’s NIC to a wall plate. Drop cables allow computers to be easily disconnected and reconnected from the network so that you can move them around in the room. Drop cables are generally needed because horizontal cabling connecting patch panels in wiring closets terminates at wall plates in the work areas, but computers in the work areas are distributed throughout the entire room.



In a more permanent networking configuration, wall plates might be located on floors and very short drop cables might be used to connect the computers to the network.

Drop Cable Stripper
Drop Cable Stripper

If you are a networking professional you must have on your toolset a laser measuring tool. We have a very thorough review of the Bosh GLM165-10 and the conclusion was interesting. Check it out.




Editor

Articles posted after being checked by editors.

Recent Content

link to Public Key Infrastructure (PKI)

Public Key Infrastructure (PKI)

Public Key Infrastructure, also known as PKI, is a set of services that support the use of public-key cryptography in a corporate or public setting. A public key infrastructure (PKI) enables key pairs to be generated, securely stored, and securely transmitted to users so that users can send encrypted transmissions and digital signatures over distrusted public networks such as the Internet.
link to Digital Signature

Digital Signature

Digital Signature is an electronic signature that you can use to sign a document being transmitted by electronic means such as e-mail. Digital signatures validate the identity of the sender and ensure that the document they are attached to has not been altered by unauthorized parties during the transmission.