Draw and explain fiber optic cable.

1 Answer

Answer :

image

As shown in the figure, at the center is the glass core through which the light propagates. In multimode fibers, the core is typically 50 microns in diameter. In single mode fibers, the core is 8 to 10 microns. The core is surrounded by a glass cladding with a lower index of refraction than the core, to keep all the light in the core. A thin plastic jacket is used to protect the cladding. Fibers are grouped in bundles, protected by an outer sheath.

Fibers can be connected in three different ways. First they can terminate in connectors and be plugged into fiber sockets. Connectors lose about 10 to 20 percent of the light, but they make it easy to reconfigure systems. Second they can be spliced mechanically. Mechanical splices just lay the two carefully – cut ends next to each other in a special sleeve and clamp them in place. Alignment can be improved by passing light through the junction and then making small adjustments to maximize the signal. Third, two pieces of fiber can be fused to form a solid connection. A fusion splice is almost as good as a single drawn fiber.

Related questions

Description : Explain different modes of fibre optic cable.

Last Answer : Current technology supports two modes for propagating light along optical channels. 1. Multimode. 2. Single mode.  Multimode can be implemented in two form:  1. Step ... All the beams arrive at the destination together and can be recombined with little distortion to the signal.

Description : Draw and explain Co-axial cable.

Last Answer : Coaxial cable (also called as coax) has an inner central copper conductor surrounded by an insulating sheath, which in turn is enclosed in the metal mesh. This outer conductor (shield) acts not ... building where a number of twists and turns are required.  4. limited to size of network.

Description : The loss in signal power as light travels down the fiber is called ............. A) Attenuation B) Propagation C) Scattering D) Interruption

Last Answer : A) Attenuation

Description : A simple cabling method, known as the..................topology allows about 30 computers on a maximum cable length of about 600 feet. A) Ring B) Bus C) Star D) Mesh

Last Answer : Bus

Description : s the predominant form of Fast Ethernet, and runs over two pairs of category 5 or above cable. A) 100 BASE-T B) 100 BASE-TX C) 100 BASE-T4 D) 100 BASE-T2

Last Answer : B) 100 BASE-TX

Description : 8............. was the first step in the evolution of Ethernet from a coaxial cable bus to hubmanaged, twisted pair network. A) Star LAN B) Ring LAN C) Mesh LAN D) All of the above

Last Answer : A) Star LAN

Description : Give any two disadvantages of unshielded twisted pair cable.

Last Answer : Disadvantages of unshielded twisted pair cable. 1. Highly prone to crosstalk. 2. Unable to provide secured transmission of data.

Description : It is desired to connect five computers that are joined at a single point called central node. i) Draw the setup. ii) Name the topology. iii) State two advantages and disadvantages of this topology.

Last Answer : i. Setup:  ii. Name of topology: Star topology iii. Advantages of Star Topology 1) As compared to Bus topology it gives far much better performance, signals don't necessarily get ... as well number of nodes which can be added in such topology is depended on capacity of central device.

Description : Two unpedauces given by Z1 = 10 + j5 and Z2 = 8 + j9 are joined in parallel and connected across a voltage of V = 200 + j0. Calculate the circuit current and branch currents. Draw the vector diagram.

Last Answer : Solution: Given, Z1=10+j5, Z2=8+j9, V=200+j0

Description : For R-C series circuit draw (i) Circuit diagram (ii) Vector diagram (iii) Waveform of voltage and current

Last Answer : i) Circuit diagram ii)Vector diagram iii)Waveform of voltage and current

Description : Draw – (i) Practical voltage source (ii) Ideal current source

Last Answer : i) Practical voltage source  ii) Ideal current source Where, Is = Current Source Rs = internal resistance of source

Description : The method of Internet access that requires a phone line, but offers faster access speeds than dialup is the _____ connection. a) cable access b) satellite access c) fiber-optic service d) modem e) None of these

Last Answer : d) modem

Description : Explain handoff procedure in mobile communication.

Last Answer : Assume that there is a call going on between two parties over a voice channel. When the mobile unit moves out of coverage area of a particular cell site the reception becomes weak. Then the cell ... arranges the handoff requests in a queue instead of rejecting them, if the new cell sites are busy.

Description : Explain the architecture of Bluetooth technology with suitable diagram.

Last Answer : Bluetooth is short range wireless technology. Range of Bluetooth is 10 meters. Bluetooth Architecture defines 2 types of networks. 1)Piconet 2)Scatternet Piconet: - It is a Bluetooth network that ... . This node is called bridge slave. This node cannot be the master of two piconets.

Description : Explain four features of computer networks.

Last Answer : A computer network is interconnection of two or more computers connected to each other so that they can exchange information such as e-mail, messages or documents, or share resources such as disk storage or printer. ... Digital Network (ISDN). 4. Cable TV. 5. Digital Subscriber Line (DSL).

Description : Explain Satellite communication with neat diagram

Last Answer : SATELLITE COMMUNICATION: In satellite communication, signal transferring between the sender and receiver is done with the help of satellite. In this process, the signal which is basically a beam ... of satellite: Satellite television digital cinema satellite radio satellite internet access

Description : Explain the function of each layer of OSI reference model with neat diagram.

Last Answer : OSI model (open system interconnection) model was developed by ISO (international standard organization) Function of OSI model: i. It provides way to understand how internetwork operates. ... Network virtual terminal file transfer access and management mail services and directory services

Description : Explain following: I. Telnet II. FTP 

Last Answer : 1. Telnet: TELNET is abbreviation for Terminal Network. It is standard TCP/IP protocol for virtual terminal services proposed by ISO. TELNET enables establishment of connection to a remote system in such ... . FTP uses port 21 for the control connection and port 20 for the data connection. 

Description : Explain connectionless and connection oriented protocol. Give the example for each type.

Last Answer : Connection less protocol: These protocols do not establish a connection between devices. It is manually achieved by transmitting information in one direction, from source to destination without checking to ... SMTP establish a TCP connection between Sender And port number 25 of receiver

Description : Explain horizontal and vertical communication.

Last Answer : Horizontal communication Fig: Horizontal Communication in OSI Model. 1) The horizontal communication is the logical connection between the layers, there is no direct communication ... communication, it becomes protocol at each layer simultaneously. Fig:Vertical communication

Description : Explain sub-netting and super-netting with example.

Last Answer : Sub-netting:subnet mask is a net mask with the only real difference being that breaking a larger network into smaller parts and each smaller section will use different sets of address ... address) AND 11111111.11111111.11111100.00000000 (supernet mask) Returns 11000000.10101000.01000000.00000000

Description : Explain following protocols: I. PPP II. SLIP

Last Answer : (i)PPP:-PPP means point to point protocol. It is a much more developed protocol than SLIP(which is why it is replacing it).It transfers additional data, better suited to data transmission over the ... character(the END character, the ASCII code of which is 192).A SLIP frame looks like:

Description : Explain the services provided by transport layer in TCP/IP model.

Last Answer : Responsibility of process to process delivery of message Ensure that whole message arrives in order. 1. Service point addressing: -several programs run at a time on computer. Delivery is ... transport layer without error(damage or loss or duplication). Error correction is done by retransmission.

Description : Explain encapsulation with example.

Last Answer : Each layer in the layered architecture provides service to the layers which are directly above and below it. The outgoing information will travel down through the layers to the lowest layer. While ... to each packet obtained from layer 3 and pass it to layer 1 for physical transmission. 

Description : Explain PAN with suitable diagram. Differentiate between PAN and CAN.

Last Answer : A personal area network(PAN) is a network organized around an individual person. A PAN can also be used for communication among personal devices themselves(interpersonal communication).PAN network can be ... used for personal communication. 4. CAN is mainly used for corporate campuses.

Description : Explain infrared communication. List any two disadvantages of infrared communication.

Last Answer : Infrared communication (IR) is an example of wireless communication. However, it is limited to very simple applications & suffers from several disadvantages, mainly very small bandwidth & distances ... areas require multiple emitter panels, which will increase the cost of the system.

Description : Explain importance characteristics of fiber optic cable.

Last Answer : 1. Fiber optic cabling can provide extremely high bandwidths in the range from 100 mbps to 2 gigabits because light has a much higher frequency than electricity. 2. The number of nodes which a fiber ... to twisted pair and co-axial. 6. The installation of fiber optic cables is difficult and tedious.

Description : ..................mode is used whenever either end of a security association is gateway. A) Tunnel B) Encapsulating C) Transport D) Gateway

Last Answer : A) Tunnel

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False

Last Answer : A) True, False

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol

Last Answer : A) SSL handshake protocol

Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322

Last Answer : C) 443

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec

Last Answer : A) IPsec

Description : In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above

Last Answer : C) Both A and B

Description : The................is used to provide integrity check, authentication and encryption to IPdatagram. A) SSL B) ESP C) TSL D) PSL

Last Answer : B) ESP

Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : State true or false. i) Socks are a standard for circuit level gateways. ii) The NAT is used for small number of the hosts in a private network. A) True, False B) False, True C) True, True D) False, False

Last Answer : C) True, True

Description : In.................. Mode, the authentication header is inserted immediately after the IP header. A) Tunnel B) Transport C) Authentication D) Both A and B

Last Answer : A) Tunnel

Description : .................... is used to carry traffic of one protocol over network that does not support that protocol directly. A) Tunneling

Last Answer : A) Tunneling

Description : The components of IP security includes …………………. A) Authentication Header (AH) B) Encapsulating Security Payload (ESP) C) Internet key Exchange (IKE) D) All of the above

Last Answer : D) All of the above

Description : Which of the following is / are the types of firewall? A) Packet Filtering Firewall B) Dual Homed Gateway Firewall C) Screen Host Firewall D) All of the above

Last Answer : D) All of the above

Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point

Last Answer : A) Chock point

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : ................is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation

Last Answer : A) Encryption

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Description : A WAN typically spans a set of countries that have data ratesless than................ Mbps. A) 2 B) 1 C) 4 D) 100

Last Answer : B) 1

Description : ............. is a set of information that is exchanged between a client and web browser and a web server during an HTTP transaction. A) infoset B) clientinfo C) cookie D) transkie

Last Answer : C) cookie

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv