Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Fiber Optic Cable
A fiber optic cable is made of glass or plastic and transmits signals in the form of light pulses. An optical fiber is a thin flexible medium conducts pulses of light with each pulse representing a bit. A single optical fiber can support tremendous bit rates up to tens or even hundred of gigabits per second.
A thin glass fiber is encased in a plastic jacket which allows the fiber to bend without breaking. A transmitter at one end uses light emitting diode ( LED) or laser to send pulses of light down the fiber which are detected at the other end by a light sensitive transistor. Fibe optic cabling consists of a canter core surrounded by several layers of protective materials.
It transmits light rather than electronic signals eliminating teh problem of electrical interference. This make it ideal for certain environments that contain a large amount of electrical interference. It has also made it the standard for connecting networks between buildings due to its immunity to the effects of moisture and lighting
Fiber optic cable has the ability to transmit signals over much longer distances than coaxial and twisted pair. It also has the capability to carry information at vastly greater speeds. This capacity broadens communication possibilities to include services such as video conferencing and interactive services. The cost of fiber optic cabling is similar to copper cabling. However it is more difficult to install and modify.
Bridge A bridge operation sin both physical and data link layer of OSI model. At physical layer it works like repeater as it regenerates the signal and performs int
"arpa" is used by the Cisco IOS for which encapsulation types Ans) Ethernet_II
Q. Comparison and Contrast between the OSI and TCP-IP Model? This presentation would discuss a few comparison and contrast between the 2 main reference models which use the con
What is a Counter A software code that indicates how many times a site has been visited. It gets automatically updated and is usually represented by a small rectangle with n
Determine in detail about the world wide web The latest has been Web commerce that is currently making big news, and many businesses are setting up electronic shops on the Inte
DNS spoofing This process is generally refers to the process of responding a DNS request that was supposed to implement for another server. This can be in the case where the s
Token Bus Sublayer Protocol Send for some time then pass token If no data after that pass token right away Traffic classes 0, 2, 4 and 6 (highest) Internal s
DNS - Server Attacks It’s not so easy to list all the associated attacks as they are evolving way so fast. As any error of flaw is identified, a patch is released in response
Question: a) The cpio utility has three operating modes. What are they? b) The characters of the permission string are broken up into three groups of three characters. Ex
Selection of computing infrastructure The computing equipment on an Intranet must be selected in such a manner that they do not get obsolete very quickly or become too costly f
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd