Fiber optic cable - computer network, Computer Networking

Assignment Help:

Fiber Optic Cable

A fiber  optic  cable is made  of glass or plastic and transmits signals in the form of light pulses. An optical fiber  is a thin  flexible medium  conducts pulses of light with each  pulse representing a bit. A single  optical  fiber  can support  tremendous bit rates up to  tens or even hundred  of gigabits per second.

A thin glass  fiber is encased in a plastic jacket which  allows  the fiber to bend  without  breaking. A transmitter at one end  uses  light emitting diode ( LED) or laser to send  pulses of light down  the fiber which  are detected at the other end by a  light  sensitive  transistor. Fibe optic  cabling  consists of a canter  core surrounded by several  layers of protective materials.

It transmits light  rather than electronic signals eliminating teh problem of electrical interference. This make it ideal for certain environments that contain a large amount of  electrical interference. It  has also  made it  the standard for connecting networks  between  buildings due to its immunity to the effects of moisture and lighting

 Fiber optic  cable  has the ability to   transmit signals over much longer distances than coaxial and twisted pair. It also  has the capability to carry information at vastly greater speeds. This capacity  broadens communication possibilities to include services such as  video conferencing and interactive services. The cost of  fiber optic  cabling is similar to copper  cabling. However  it is more difficult  to install and modify.

 

 

 


Related Discussions:- Fiber optic cable - computer network

What is proxy ARP, What is Proxy ARP? Is using a router to give answer ...

What is Proxy ARP? Is using a router to give answer ARP requests. This will be completed when the originating host believes that a destination is local, when in fact is lies be

Advantages of firewall, Firewall The NAT router allows receiving of num...

Firewall The NAT router allows receiving of number of a data streams. If it receives a transmission in the form of acknowledgement or data streams or error responses from an ex

Explain how contract net works, Question 1 Contract Net Protocol is the...

Question 1 Contract Net Protocol is the best known and most widely used cooperation protocol Explain how contract net works Discuss the benefits and limitations of con

Define some solutions of security, What is Security solutions Though t...

What is Security solutions Though there are a number of security solutions available due to sophistication in technology, there are a number of risks and difficulties attached

How xor operations can implement key stream attacks, Question: a) In a...

Question: a) In a wireless network where WEP is enforced as security mechanism, what procedure would the network manager adopt for changing WEP default keys. b) Using Pla

Show the steps used at sender end by check sum, Q. Show the steps used at s...

Q. Show the steps used at sender end by check sum? The sender follows these steps: The data unit is divided into "k" sections, each off "n" bits All sections ar

Threats to information can include, Threats to information can include ...

Threats to information can include Deletion of a file or files. Corruption, caused either by hardware problems or by a bug in the software. Theft of company data

D2D communication, I need to discuss with some one who expert in D2D commun...

I need to discuss with some one who expert in D2D communications in 5G networks.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd