Definition

conductance

Conductance is an expression of the ease with which electric current flows through a substance. In equations, conductance is symbolized by the uppercase letter G. The standard unit of conductance is the siemens (abbreviated S), formerly known as the mho.

When a current of one ampere (1 A) passes through a component across which a voltage of one volt (1 V) exists, then the conductance of that component is 1 S. The siemens is, in fact, equivalent to one ampere per volt. If G is the conductance of a component (in siemens), I is the current through the component (in amperes), and E is the voltage across the component (in volts), then:

G = I/E

In general, when the applied voltage is held constant, the current in a direct-current (DC) circuit is directly proportional to the conductance. If the conductance is doubled, the current is also doubled; if the conductance is cut to 1/10 its initial value, the current also becomes 1/10 as great. This rule also holds for most low-frequency alternating-current (AC) systems, such as household utility circuits. In some AC circuits, especially at high frequencies, the situation is more complex, because some components in these systems store and release energy, as well as dissipating or converting it.

Conductance is inversely related to resistance. If R is the resistance of a component or device (in ohms), then the conductance G (in siemens) is given by:

G = 1/R

This was last updated in September 2005

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

SearchSDN

• Consider the Ethernet option for primary SD-WAN connectivity

SD-WAN connectivity offers the ability to use a variety of links. While most enterprises opt to use cable or DSL as the primary ...

• SD-branch network concept as next stage of WAN connectivity

SD-branch uses SD-WAN technology to simplify the branch network. It integrates multiple network functions now housed in separate ...

• Existing branch routers could be replaced as SD-WAN matures

Enterprises are moving away from traditional branch routers, as SD-WAN capabilities mature and offer consolidated network ...

SearchEnterpriseWAN

• How to calculate network bandwidth requirements

Figuring out how to calculate bandwidth requirements is vital to ensuring your network runs smoothly, and it's best to get the ...

• How types of noise in data communication systems affect the network

Learn about the different types of noise in data communication -- including thermal, intermodulation, cross-talk, impulse and ...

• The best VPNs for enterprise use

This slideshow highlights the best VPNs used in enterprise wide-area networks (WANs) and offers principles for designing and ...

SearchUnifiedCommunications

• Email collaboration evolves in the modern enterprise

Messaging apps are great for team collaboration, but bridging the gap between internal and external communication remains a ...

• Enterprises given clarity on cost of cloud services

Enterprises are gaining greater clarity about the cost of cloud services for UCC, as many IT departments are discovering that ...

• The evolution of unified communications technologies

Over the years, unified communications tools have evolved to incorporate different modes of collaboration. Enterprises need to be...

SearchMobileComputing

• Five steps to effective usability testing for mobile apps

To avoid costly mistakes down the road, conduct usability testing and get a grasp on users' reactions to an app before rolling it...

• The new role of identity and authentication in the enterprise

It's increasingly important to use identity and access management systems in the enterprise. Luckily, an emerging market fills ...

• How to manage multi-factor authentication for Office 365

Security is a priority now more than ever. IT pros can manage MFA for Office 365 using conditional and application access to ...

SearchDataCenter

• Evaluate read-intensive and write-intensive SSD use cases

Consider write wear, performance and other factors when choosing between read-intensive, write-intensive and mixed-use ...

• Some hyper-converged infrastructure use cases pose pitfalls

Hyper-converged infrastructure adoption is skyrocketing, but that doesn't mean that the technology is the best choice for every ...

• Dell hyper-converged reorg streamlines products, ups CI odds

Market pressures and manufacturing synergies drove Dell to integrate its HCI and CI products with its core business units, but ...

SearchITChannel

• Anomali targets managed security service providers for global expansion

Threat management platform vendor Anomali said it will tap MSSPs for help reaching medium-sized businesses; other channel news ...

• Carbonite agrees to acquire competitor Mozy

Carbonite stays busy with its pending acquisition of Mozy and a forthcoming DRaaS product. The data protection vendor also ...

• CloudCoreo deal portends VMware cloud security tool

VMware cloud security tools will get a boost from the company's acquisition of CloudCoreo, a security and management startup ...

Close