Fiber optic cable - computer network, Computer Networking

Assignment Help:

Fiber Optic Cable

A fiber  optic  cable is made  of glass or plastic and transmits signals in the form of light pulses. An optical fiber  is a thin  flexible medium  conducts pulses of light with each  pulse representing a bit. A single  optical  fiber  can support  tremendous bit rates up to  tens or even hundred  of gigabits per second.

A thin glass  fiber is encased in a plastic jacket which  allows  the fiber to bend  without  breaking. A transmitter at one end  uses  light emitting diode ( LED) or laser to send  pulses of light down  the fiber which  are detected at the other end by a  light  sensitive  transistor. Fibe optic  cabling  consists of a canter  core surrounded by several  layers of protective materials.

It transmits light  rather than electronic signals eliminating teh problem of electrical interference. This make it ideal for certain environments that contain a large amount of  electrical interference. It  has also  made it  the standard for connecting networks  between  buildings due to its immunity to the effects of moisture and lighting

 Fiber optic  cable  has the ability to   transmit signals over much longer distances than coaxial and twisted pair. It also  has the capability to carry information at vastly greater speeds. This capacity  broadens communication possibilities to include services such as  video conferencing and interactive services. The cost of  fiber optic  cabling is similar to copper  cabling. However  it is more difficult  to install and modify.

 

 

 


Related Discussions:- Fiber optic cable - computer network

Explain the bit-level encryption, Q. Explain the Bit-Level Encryption? ...

Q. Explain the Bit-Level Encryption? Bit-Level Encryption - Data is divided into blocks of bits then altered by encoding/decoding, permutation, substitution, exclusive OR

What is cam, CAM- Content Address Memory.  Its another name of MAC address ...

CAM- Content Address Memory.  Its another name of MAC address table.

Explain the types of security threats, Q. Explain the types of Security Thr...

Q. Explain the types of Security Threats? (a) Normal Flow (b) Interruption: An asset of a system develops into unavailable or unusable. (c) Interception: A few unaut

Additional bandwidth does each scheme require, Recalling two FEC schemes fo...

Recalling two FEC schemes for internet phone described. Suppose the first scheme generates a redundant chunk for every four original chunks. Suppose the second scheme uses a low-ra

Different kinds of firewall architectures, What are the different kinds of ...

What are the different kinds of firewall architectures?

Compute the hash - part of the packet, In this question, we study Nested ES...

In this question, we study Nested ESP in AH, that is, we combine ESP with AH. Let's look at the site-to-site VPN scenario shown again in Figure 1. Let's assume that Alice's desktop

What are the advantages of adaptive routing, What are the Advantages of ada...

What are the Advantages of adaptive routing  (1) An adaptive routing method can improve performance, as realised by the network user. (2) An adaptive routing method can aid

What is an arp and how does it work, ARP(ADDRESS RESOLUTION PROTOCOL) is a ...

ARP(ADDRESS RESOLUTION PROTOCOL) is a network layer protocol which associates the physical hardware address of a network node(commonly called as a MAC ADDRESS) to its ip address. n

Show about alternate mark inversion, Q. Show about Alternate mark inversion...

Q. Show about Alternate mark inversion? Bipolar AMI - Neutral, zero voltage represents binary 0 - Binary 1s symbolized by alternating positive and negative voltages

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd