Preview

Nt1310 Unit 7 Assignment 1

Satisfactory Essays
Open Document
Open Document
395 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 7 Assignment 1
Baldeo Persaud
NT1310
Unit 7 Assignment 1: Refraction, Reflection and Optics
A good example of refraction of light and reflection of light is a rainbow. Sunlight enters the rain droplet at a specific angle and the rain droplet separates the white light into many different colors. This angle is a fixed measurement between your eye and the sun. What color is refracted depends upon the critical angle, which is the angle the sunlight strikes the back of the rain droplet. Red light bends the least while violet light bends the most all the other colors bend at an angle that is between the two. Each rain droplet reflects all colors at a given point and time, but only one color comes back to your eye, requiring millions of rain droplets to create a rainbow. As the rain droplets fall
…show more content…

Gigabit) single-mode communications links. Chromatic dispersion is the effect of having a wide spectrum of light as the single-mode light source, and as result have light rays of traveling at slightly different speeds due to differing wavelengths. The differences in light ray speeds result in the equivalent of timing jitter at the receiver. Chromatic dispersion is caused by waveguide dispersion and material dispersion.
Modal Dispersion is only a factor in multi-mode communication links. Modal dispersion is the optical equivalent of timing jitter, where light signals of the same bit travel different paths along the fiber and cause an inability to accurately differentiate bits. Modal dispersion is a function of data rate. Modal dispersion is caused by different path lengths of the fibers in the cable.
Attenuation can be losses attributed to microscopic and macroscopic impurities in the fiber material and structure, which cause absorption and scattering of the light signal. Attenuation is a function of the wavelength, and the loss is usually stated in dB/km. Attenuation can be caused by improper connections, bend radius and


You May Also Find These Documents Helpful

  • Powerful Essays

    It is important to test the cables before you install them and after they are installed. Although there are many tools that are used for testing the cables in a network this paper is only going to talk about three. The first one is the multifunction cable scanner, they are available for testing both copper and fiber optic cable. One such model is the Hobbes 258898 it can test every pin of almost 20 often used cables from coax to 40 pin ribbon cables. It identifies opens, shorts and mis-wires at the pin level. With a multifunction cable tester you can perform a range of tests that you would normally need a few different testers to do. You can do wire-mapping, test for the length of the cable, test the attenuation, and you can test NEXT (near end crosstalk) for copper cables. They will also test for optical power and signal loss in fiber optic cables. A lot of the multifunction cable testers perform other more comprehensive test such as PS-NEXT, ACRF, PS-ACRF, delay…

    • 659 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    The benefits of creating a Virtual Local Area Network (VLAN) are numerous and include such things as less bandwidth consumption, greater security, and the ability for users to be in different geographical locations while still sharing resources. One plan to segment the network is to divide it into broadcast domains, reducing network congestion and also increasing security. The network will be segmented according to group functions. For instance, the engineering department will have one segment, the call center will have another segment, operations will have another segment, and the marketing department will have another segment.…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Assignment 1

    • 407 Words
    • 2 Pages

    II. Analysis. The intent for this program is to calculate the square footage of a house with no more than four rooms that are rectangular in shape. In order to do this we will identify each room, input the length (l) and width (w) of each room, multiply the l x w of each room to get the square foot, and add the sum of each room to secure the total square footage of the house.…

    • 407 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I recently had to deal with a problem with the Event Name as: BlueScreen. The Locale ID of the fault can be designated by the numerical value as: 5146. I am a touch apprehensive as to whether such a typical fault has been triggered owing to a virus attack. What should I do to eliminate the fault and ensure that the problem does not occur all over again?…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 3 Assignment 1

    • 2019 Words
    • 9 Pages

    Subnetting IP Addressing • Internet Protocol (IP) • A unique indentifier for a host, or node, on an IP network • 32-bit binary number, usually expressed as 4 “dotted decimal” values. • Each decimal value represents 8 bits, in the range of 0 to 255 Example 140.179.220.200 140 Written in binary form: .179 .220 .200…

    • 2019 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 3 Assignment 1

    • 6320 Words
    • 26 Pages

    “A bus network topology is a network architecture in which a set of clients are connected via a shared communications line/cables” (Abu, 2013). There are several common instances of the bus architecture, including one in the motherboard of most computers. Bus networks may be the simplest way to connect multiple clients even though many may have problems. When two clients want to transmit at the same time on the same bus, this may cause some problems. Thus systems use bus networks normally some may have scheme for collision handling or collision avoidance for communication on the bus. Though this may be quite often in using Carrier Sense Multiple Access or the presence of a bus master’s who controls access to the shared bus resource.…

    • 6320 Words
    • 26 Pages
    Powerful Essays
  • Satisfactory Essays

    Shared bandwidth: A term referring to hoe some networks mush share the right to send data by taking turns, which limits the total number of bits sent by all devices.…

    • 356 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT1330 Unit 3 Assignment 3

    • 1030 Words
    • 5 Pages

    Desktop and laptop grouping them together because they are so similar the device they self-are not security concerns. It the operation system that would have the security concerns, that is why they have patches for the OS.…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 2469 Words
    • 10 Pages

    “Tell me and I forget. Show me and I remember. Involve me and I understand.” Chinese proverb One’s understanding of network protocols can often be greatly deepened by “seeing protocols in action” and by “playing around with protocols” – observing the sequence of messages exchanged between two protocol entities, delving down into the details of protocol operation, and causing protocols to perform certain actions and then observing these actions and their consequences. This can be done in simulated scenarios or in a “real” network environment such as the Internet. The Java applets that…

    • 2469 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Lymphatic filariasis is an extremely painful infection of the lymphatic system. It is caused when thread-like filarial parasites are transmitted to humans through mosquitoes. There are three forms of the parasites which are Wuchereria bancrofti, Brugia malayi and Brugia timorican. The most common is Wuchereia bancrofti. When the mosquito bites the human, it injects the larvae into the blood stream which then circulates into the lymphatic system. The parasites can live up to six years in a human. The disease is most common in tropical areas and sub-tropical areas such as mid-Africa and southern Asia due to their elevated temperatures and moist climate CITATION Sab14 \l 1033 (Institute, 2014).…

    • 438 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1210 Chapter 6

    • 829 Words
    • 4 Pages

    4) LANs that span distances of several kilometers by using multimode fiber are made possible…

    • 829 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Any public wireless hotspots, such as at restaurants, hotels, parks are not a good place to use any website that requires personal or financial information. When using an unsecure network, a hacker can easily get access to any webpage you access. They can access documents, pictures, bank information, your phone number, address, credit card information and passwords. Once the hacker has your username and password for one website they can try to log in as you on multiple other websites. This is why it is best to never use the same username and password on different websites. When you are connecting to a wireless network, if it does not ask you for a WEP, WPA, or WPA2 password, then your connection is not secure, meaning none of the data you access with be encrypted.…

    • 356 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    An optical fiber is a flexible, transparent fiber made of extruded glass or plastic, slightly thicker than a human hair. It can function as a waveguide, to transmit light between the two ends of the fiber. The degragation of signal strength can be caused by light scattering, molecular level irregularities in the glass structure, and UV-Vis-IR absorption.…

    • 307 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    2. N = C/v where N is the index of refraction C is the speed of light in a vacuum and V is the speed of light in the medium.…

    • 1265 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Rayleigh scattering theory describes the interaction of sunlight with molecules in a simple way. It applies to particles much smaller than the wavelength of the incoming radiation.…

    • 1843 Words
    • 8 Pages
    Powerful Essays