?
Solved

Networking with 10Base2.

Posted on 1999-07-02
8
Medium Priority
?
339 Views
Last Modified: 2010-04-27
You have a pc with a network card that has an AUI connector. You want to connect the pc to a 10Base2 ethernet network. What 2 components do you need? In what order?

     __________
    |                   |
    |NIC W/AUI   |-----|
    |__________ |     |           Possible Choices:
                             |                  1) Tranceiver
                    _____|_____          2) Bridge
                   |_____?_____|         3) BNC T Connector
                             |                   4) Vampire Tap
                    _____|_____
                   |_____?_____|
                             |
   10Base2-------------|-------------------10Base2
0
Comment
Question by:jmayhew
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
  • +2
8 Comments
 

Author Comment

by:jmayhew
ID: 1158345
Edited text of question.
0
 
LVL 17

Accepted Solution

by:
mikecr earned 150 total points
ID: 1158346
You only need one, an AUI to BNC adapter converter.

Mike

PS: None of the listed choices would work except for maybe the bridge.
0
 
LVL 5

Expert Comment

by:hiandras
ID: 1158347
mikecr,
Actually an "AUI to BNC adapter converter" is called Tranceiver.
And you will also need the BNC T Connector (which supposed to be packed with a Tranceiver) to connect to the two ends of the coax cable.
0
Are You Ready for GDPR?

With the GDPR deadline set for May 25, 2018, many organizations are ill-prepared due to uncertainty about the criteria for compliance. According to a recent WatchGuard survey, a staggering 37% of respondents don't even know if their organization needs to comply with GDPR. Do you?

 
LVL 6

Expert Comment

by:kschang
ID: 1158348
If 10base2, that's ThinNet, right? You need a two-step solution. First, AUI to UTP:

http://www.blackbox.com/catalog/14lan/808.PDF
(Upper right hand corner)

Second, UTP to ThinNet

http://www.blackbox.com/catalog/14lan/806.PDF
(center down)

Haven't seen any single box solution for this conversion, probably not enough demand.


0
 
LVL 6

Expert Comment

by:kschang
ID: 1158349
If 10base2, that's ThinNet, right? You need a two-step solution. First, AUI to UTP:

http://www.blackbox.com/catalog/14lan/808.PDF
(Upper right hand corner)

Second, UTP to ThinNet

http://www.blackbox.com/catalog/14lan/806.PDF
(center down)

Haven't seen any single box solution for this conversion, probably not enough demand.


0
 
LVL 5

Expert Comment

by:hiandras
ID: 1158350
kschang,
I have seen and used AUI/BNC Tranciever. But I don't know any catalog number for them.
0
 

Expert Comment

by:danster
ID: 1158351
AUI/BNC transceivers do exist. They cost about £20 here in the UK if you shop around. I use a Lantronix LTX-2A on an old hub at home to link it directly to the 10base2 cabling.
0
 

Expert Comment

by:danster
ID: 1158352
hiandras has the correct answer.
0

Featured Post

10 Questions to Ask when Buying Backup Software

Choosing the right backup solution for your organization can be a daunting task. To make the selection process easier, ask solution providers these 10 key questions.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Arrow Electronics was searching for a KVM  (Keyboard/Video/Mouse) switch that could display on one single monitor the current status of all units being tested on the rack.
Backups and Disaster RecoveryIn this post, we’ll look at strategies for backups and disaster recovery.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

718 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question