Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Fiber Optic Cable
A fiber optic cable is made of glass or plastic and transmits signals in the form of light pulses. An optical fiber is a thin flexible medium conducts pulses of light with each pulse representing a bit. A single optical fiber can support tremendous bit rates up to tens or even hundred of gigabits per second.
A thin glass fiber is encased in a plastic jacket which allows the fiber to bend without breaking. A transmitter at one end uses light emitting diode ( LED) or laser to send pulses of light down the fiber which are detected at the other end by a light sensitive transistor. Fibe optic cabling consists of a canter core surrounded by several layers of protective materials.
It transmits light rather than electronic signals eliminating teh problem of electrical interference. This make it ideal for certain environments that contain a large amount of electrical interference. It has also made it the standard for connecting networks between buildings due to its immunity to the effects of moisture and lighting
Fiber optic cable has the ability to transmit signals over much longer distances than coaxial and twisted pair. It also has the capability to carry information at vastly greater speeds. This capacity broadens communication possibilities to include services such as video conferencing and interactive services. The cost of fiber optic cabling is similar to copper cabling. However it is more difficult to install and modify.
Hardware difficulty of Benz Network: - Benz network uses smaller switches and it gives excellent connectivity. To find hardware difficulty of Benz network let us presume that
Fat tree: It is a customized version of tree network. In this network bandwidth of edge (or connecting wire between nodes) increases in the direction of root. It's a more realisti
State the methods to keep the attackers at bay Another best methods to keep the attackers at bay is known as network address translator or NAT. The philosophy behind the design
QUESTION 1. A system analyst has to install a particular type of topology in a textile industry. (a) Describe using diagrams the three most common topologies in terms of nod
How do we diactivate auto-summarization in RIP?
Question: Consider that you have to configure a small WLAN of 8 computers using Wired Equivalent Privacy (WEP) and that you have to best make use of its available security f
After going through this part, you should be capable to: Describe the concepts of message passing programming; List out the various communication modes for communication
This lab introduces basic network capture concepts using Wireshark. Setup You will need a PC running Windows for this lab and you will need to install the Wireshark softwar
Q. Unshielded Twisted Pair - transmission media? - A most common kind suitable for both voice and data transmission - Categories are determined by chain quality - Cat 3 c
What is VRC? It is the most common and least costly mechanism for Error Detection. In VRC, a parity bit is added to each data unit so that the total number of 1s becomes even f
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd