Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Facts about Fiber Optic Cables
1.Outer insulating jacket is made of Teflon or PVC.
2.Kevler fiber helps to strengthen the cable and prevent breakage.
3.A plastic coating is used to cushion the fiber canter.
4. Center ( core) is made of glass or plastic fiber.
Optical fiber consists of thin glass fibers than can information at frequencies in the visible light spectrums and beyond. The typical optical fibe consists of a very narrow strand of glass called the core around the core there is a concentric layer of glass called the cladding. Coating the cladding is a protective coasting consisting of plastic it is called jacket.
figure Single fibre and a sheath of three fibres
Advantages and Disadvantages of optical fibers
Advantages: Fiber optic cable has several ad van ages over metallic cable( twisted pair or coaxial).
What is the full form of FDM and TDM It is both. Each of the 100 channels is possess its own frequency band (FDM), and on every channel two logical streams are intermixed by th
Retransmission of packets The disadvantage of thronging away a correctly received packet is that the subsequent retransmission of the packet might be lost or garbled and
In Windows 2000, a domain describes both an administrative boundary and a security boundary for a collection of objects that are relevant to a particular group of users on a networ
Fixed version of rdt 2.0 rdt 2.1 The rdt 2.1 sender and receiver FSM each now have twice as many states as before. This is because the protocols state must now refle
In quantum computing, we use the method of qubits, superposition and coherence. A normal bit can be in only two states - 0 and 1. But a qubit it can be in 0, 1, or in the superposi
What is a pseudo tty? A pseudo tty or false terminal enables external machines to connect by Telnet or rlogin. Without a pseudo tty, no connection can take place.
Introduction: This is a specialized protocol designed for CS5244. It provides a distributed means to access a BasicEnrollmentManager implementation through client-server communica
Q. Example on Multiplicative Decrease? w = 1 for (each new ACK received) w = w+1 until (loss detected or w >= ssthresh) Not so slow - Exponential increase
Destination Port Number This is port number used by the process running on the destination host. It is also 16 bits long if the destination host if server ( a client sen
Use Packet Tracer software to model the network that you have designed, and configure the network to make sure it is running properly. The following requirements should be met:
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd