Solved

RG59 versus Cat 6 and Cat 5e

Posted on 2013-12-17
3
1,475 Views
Last Modified: 2013-12-22
what is the pros and cons of RG59 compared with Cat 6 and Cat 5e?
0
Comment
Question by:grnow
  • 2
3 Comments
 
LVL 93

Accepted Solution

by:
John Hurst earned 300 total points
ID: 39723954
RG59 is coaxial cable and CAT5/6 Ethernet are twisted pair. They are not the same thing. Ethernet cable mates with Ethernet connectors in routers and switches and computers. These devices do not have coax inputs and so coax does not apply.

RG59 is fairly old thin insulator coax. RG6 is new, fatter insulation around the center conductor and is faster cable.

However the two things are very different for very different purposes and they are in no way interchangeable.

.... Thinkpads_User
0
 
LVL 83

Assisted Solution

by:Dave Baldwin
Dave Baldwin earned 200 total points
ID: 39724826
As best I can find at the moment, RG59 has only been used for specialized adapters for ethernet.  The original Ethernet used RG58 10BASE2 (which is a different cable) and RG6 10BASE5 for 10Mbps connections.  RG58 is 50 ohm impedance and RG59 is 75 ohms which means they are not interchangeable for high frequency applications.

http://en.wikipedia.org/wiki/10BASE2
0
 
LVL 93

Expert Comment

by:John Hurst
ID: 39734547
@grnow - Thanks and I was happy to help.

.... Thinkpads_User
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If your business is like most, chances are you still need to maintain a fax infrastructure for your staff. It’s hard to believe that a communication technology that was thriving in the mid-80s could still be an essential part of your team’s modern I…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question