Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Fiber Optic Cable
A fiber optic cable is made of glass or plastic and transmits signals in the form of light pulses. An optical fiber is a thin flexible medium conducts pulses of light with each pulse representing a bit. A single optical fiber can support tremendous bit rates up to tens or even hundred of gigabits per second.
A thin glass fiber is encased in a plastic jacket which allows the fiber to bend without breaking. A transmitter at one end uses light emitting diode ( LED) or laser to send pulses of light down the fiber which are detected at the other end by a light sensitive transistor. Fibe optic cabling consists of a canter core surrounded by several layers of protective materials.
It transmits light rather than electronic signals eliminating teh problem of electrical interference. This make it ideal for certain environments that contain a large amount of electrical interference. It has also made it the standard for connecting networks between buildings due to its immunity to the effects of moisture and lighting
Fiber optic cable has the ability to transmit signals over much longer distances than coaxial and twisted pair. It also has the capability to carry information at vastly greater speeds. This capacity broadens communication possibilities to include services such as video conferencing and interactive services. The cost of fiber optic cabling is similar to copper cabling. However it is more difficult to install and modify.
Data Link Layer Sub layers · Logical Link Control (LLC) - upper layer · Handles control information, logical addressing and data · MAC (Medium Access Control) - lower layer ·
This ICT-related issue that has been raised in the contemporary media, and the article is required to be included as part of the essay: Undertake further research about this top
What is Security solutions Though there are a number of security solutions available due to sophistication in technology, there are a number of risks and difficulties attached
Error Detecting Code - Parity bit: The general idea for achieving error detection and correction is to add some redundancy (i.e., some extra data) to a message, which receiver
PVM uses two environment variables when starting and running. Every PVM user needs to set these two variables to use PVM. The initial variable is PVM_ROOT, which is set to the loca
Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4
Q. What is Domain Names ? - Full domain name is a sequence of labels separated by dots (.) - Fully competent domain name (FQDN) contains the full name of a host cis.usouthal
what is meaning of internet marketing trends
What are the Communication tools ? Voice mail ? Email ? Fax ? Video conferencing applications
Describe IP datagram fragmentation and MTU
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd