Show the refraction and reflection in Fiber-optic cable , Computer Networking

Assignment Help:

Q. Show the Refraction and Reflection in Fiber-optic cable ?

- Refraction often takes place when light bends as it passes from one medium to another less dense medium

- When this angle consequences in a refraction great enough reflection occurs and the light no longer passes into the less dense medium

311_Show the Refraction and Reflection.png

Reflection

- Optical fibers utilize reflection to guide light through a channel

- Information is encoded onto a beam of light like a series of on-off pulses representing 1s and 0s

1224_Show the Refraction and Reflection1.png


Related Discussions:- Show the refraction and reflection in Fiber-optic cable

Data bandwidth requirements, Calculate data bandwidth requirements from and...

Calculate data bandwidth requirements from and to each site.

Determine about the complete and proper security, Determine about the Compl...

Determine about the Complete and proper security Complete and proper security configuration and administration is indeed a complex issue. One should think carefully about the

Which layer are called upper layer, Three layers are called upper layers ...

Three layers are called upper layers a) Application Layer - 7 b) Presentation Layer - 6 c) Session Layer - 5

Fixed version of rdt , Fixed version of rdt 2.0 rdt 2.1 The  rdt 2.1 s...

Fixed version of rdt 2.0 rdt 2.1 The  rdt 2.1 sender and receiver  FSM each now  have  twice  as many  states  as before. This is because  the protocols  state must  now refle

Summary of special ip addresses, The table below gives a summary of special...

The table below gives a summary of special IP addresses.

Will the client send a tcp or udp packet, Question: (a) Explain the usa...

Question: (a) Explain the usage of the following parts of the IPv4 datagram format. i. VERS ii. HLEN iii. TOTAL LENGTH iv. SERVICE TYPE v. HEADER CHECKSUM (b) Na

Discuss an example of threats in computer software, Discuss an example of t...

Discuss an example of threats in computer software Assume only one attack out of the above list i.e., the virus attack. Though the present anti-virus software solutions can det

Bens network, Bens Network  Ben's network is a non-blocking network. ...

Bens Network  Ben's network is a non-blocking network.  It is a different  type of Clos network where initial and final stage consists of  2×2 switches (for n input  and m ou

Introduction to operations research, explain the three classification of op...

explain the three classification of operation research

How intranets encourage integration of applications, How Intranets encourag...

How Intranets encourage integration of applications Intranets encourage integration of applications; such as the simple word processing application could be easily linked with

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd