Fiber optic cable - computer network, Computer Networking

Assignment Help:

Fiber Optic Cable

A fiber  optic  cable is made  of glass or plastic and transmits signals in the form of light pulses. An optical fiber  is a thin  flexible medium  conducts pulses of light with each  pulse representing a bit. A single  optical  fiber  can support  tremendous bit rates up to  tens or even hundred  of gigabits per second.

A thin glass  fiber is encased in a plastic jacket which  allows  the fiber to bend  without  breaking. A transmitter at one end  uses  light emitting diode ( LED) or laser to send  pulses of light down  the fiber which  are detected at the other end by a  light  sensitive  transistor. Fibe optic  cabling  consists of a canter  core surrounded by several  layers of protective materials.

It transmits light  rather than electronic signals eliminating teh problem of electrical interference. This make it ideal for certain environments that contain a large amount of  electrical interference. It  has also  made it  the standard for connecting networks  between  buildings due to its immunity to the effects of moisture and lighting

 Fiber optic  cable  has the ability to   transmit signals over much longer distances than coaxial and twisted pair. It also  has the capability to carry information at vastly greater speeds. This capacity  broadens communication possibilities to include services such as  video conferencing and interactive services. The cost of  fiber optic  cabling is similar to copper  cabling. However  it is more difficult  to install and modify.

 

 

 


Related Discussions:- Fiber optic cable - computer network

the default settings of ipx delay number, The "ipx delay number" command w...

The "ipx delay number" command will permit an administrator to alter the default settings. Explain the default settings? Ans) For LAN interfaces, one tick; for WAN interfaces, s

Firewall architectures-screened host architecture, Screened Host Architectu...

Screened Host Architecture This architecture consists of two host machines: a Screening Router and a Screening Host. Screening Router is placed between a local network and the

What are the internal threats - security, What are the Internal Threats ...

What are the Internal Threats Internal security problems are probably the most common. One never knows what someone is going to do. Even the most loyal employees or workers can

Layered architecture - computer network, Layered Architecture The best...

Layered Architecture The best  way to  understand  any complex system is to break  it into  pieces  and then analyze what they  do and  how they interact. The most logical app

What are called transactions, The grouped SQL statements are known as Trans...

The grouped SQL statements are known as Transactions (or) A transaction is a collection of actions embused with ACID properties.

Enable wireless security - ccna, Enable Wireless Security Step : Confi...

Enable Wireless Security Step : Configure Windows to use WEP authentication.  Navigate to the Network Connections page again and right-click the Wireless Network Connection

Difference between windows 2000 and windows 2003, What is the difference am...

What is the difference among Windows 2000 and Windows 2003?

Define the difference among trusted and untrusted networks, Can you define ...

Can you define the difference among trusted and untrusted networks?

Define bandwidth and latency, Define Bandwidth and Latency? Network per...

Define Bandwidth and Latency? Network performance is calculated in Bandwidth (throughput) and Latency (Delay). Bandwidth of a network is given by the number of bits that can be

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd