Preview

Nt1310 Unit 7 Assignment 1

Satisfactory Essays
Open Document
Open Document
395 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 7 Assignment 1
Baldeo Persaud
NT1310
Unit 7 Assignment 1: Refraction, Reflection and Optics
A good example of refraction of light and reflection of light is a rainbow. Sunlight enters the rain droplet at a specific angle and the rain droplet separates the white light into many different colors. This angle is a fixed measurement between your eye and the sun. What color is refracted depends upon the critical angle, which is the angle the sunlight strikes the back of the rain droplet. Red light bends the least while violet light bends the most all the other colors bend at an angle that is between the two. Each rain droplet reflects all colors at a given point and time, but only one color comes back to your eye, requiring millions of rain droplets to create a rainbow. As the rain droplets fall
…show more content…
Gigabit) single-mode communications links. Chromatic dispersion is the effect of having a wide spectrum of light as the single-mode light source, and as result have light rays of traveling at slightly different speeds due to differing wavelengths. The differences in light ray speeds result in the equivalent of timing jitter at the receiver. Chromatic dispersion is caused by waveguide dispersion and material dispersion.
Modal Dispersion is only a factor in multi-mode communication links. Modal dispersion is the optical equivalent of timing jitter, where light signals of the same bit travel different paths along the fiber and cause an inability to accurately differentiate bits. Modal dispersion is a function of data rate. Modal dispersion is caused by different path lengths of the fibers in the cable.
Attenuation can be losses attributed to microscopic and macroscopic impurities in the fiber material and structure, which cause absorption and scattering of the light signal. Attenuation is a function of the wavelength, and the loss is usually stated in dB/km. Attenuation can be caused by improper connections, bend radius and

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 8 Assignment 1

    • 1415 Words
    • 6 Pages

    This project used an Atmega644 microcontroller clocked at 20MHz in each of the two functional modules for processing. Memory storage is provided by a standard Secure Digital (SD) card. Xbee modules provide bidirectional wireless communication and we use the TLV5616 DAC chip for generating analog audio. The LM358 dual op amp provides active filtering to the output of the DAC. Music files can be added to the SD card using any computer with a multimedia card reader. Once the base station detects an SD card inserted into the holder, it awaits data requests from the portable module. The portable module requests data when required and feeds these values into the DAC. The DAC output is low-pass filtered by the op amp, which also buffers the DAC output before it reaches the audio output…

    • 1415 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    It is important to test the cables before you install them and after they are installed. Although there are many tools that are used for testing the cables in a network this paper is only going to talk about three. The first one is the multifunction cable scanner, they are available for testing both copper and fiber optic cable. One such model is the Hobbes 258898 it can test every pin of almost 20 often used cables from coax to 40 pin ribbon cables. It identifies opens, shorts and mis-wires at the pin level. With a multifunction cable tester you can perform a range of tests that you would normally need a few different testers to do. You can do wire-mapping, test for the length of the cable, test the attenuation, and you can test NEXT (near end crosstalk) for copper cables. They will also test for optical power and signal loss in fiber optic cables. A lot of the multifunction cable testers perform other more comprehensive test such as PS-NEXT, ACRF, PS-ACRF, delay…

    • 659 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Now, select a virtual switch depending on how you have configured the host. Proceed to the configuration of port properties. Give the port a specific name. I have given the label as ‘VMK’. Enter VLAN ID if there is any or else chose ‘None’. Put a check next to the ‘Virtual SAN traffic’ box and then click ‘Next’. Now start with configuring IPv4 settings for this port. After completing that, click ‘Next’. Click on the finish button to end the configuration for port group creation. Make sure that the group is created. Again a new window will pop up showing the devices created and their respective IP addresses. After confirming that the host is created, repeat this procedure two more times, since we require at least three hosts for configuring VSAN.…

    • 229 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The benefits of creating a Virtual Local Area Network (VLAN) are numerous and include such things as less bandwidth consumption, greater security, and the ability for users to be in different geographical locations while still sharing resources. One plan to segment the network is to divide it into broadcast domains, reducing network congestion and also increasing security. The network will be segmented according to group functions. For instance, the engineering department will have one segment, the call center will have another segment, operations will have another segment, and the marketing department will have another segment.…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Grandfather – father – Son: According to this backup rotation schedule incremental backups are performed daily, while full backups are done weekly and monthly.…

    • 770 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Assignment 1

    • 407 Words
    • 2 Pages

    II. Analysis. The intent for this program is to calculate the square footage of a house with no more than four rooms that are rectangular in shape. In order to do this we will identify each room, input the length (l) and width (w) of each room, multiply the l x w of each room to get the square foot, and add the sum of each room to secure the total square footage of the house.…

    • 407 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I recently had to deal with a problem with the Event Name as: BlueScreen. The Locale ID of the fault can be designated by the numerical value as: 5146. I am a touch apprehensive as to whether such a typical fault has been triggered owing to a virus attack. What should I do to eliminate the fault and ensure that the problem does not occur all over again?…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 3 Assignment 1

    • 2019 Words
    • 9 Pages

    Subnetting IP Addressing • Internet Protocol (IP) • A unique indentifier for a host, or node, on an IP network • 32-bit binary number, usually expressed as 4 “dotted decimal” values. • Each decimal value represents 8 bits, in the range of 0 to 255 Example 140.179.220.200 140 Written in binary form: .179 .220 .200…

    • 2019 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 3 Assignment 1

    • 6320 Words
    • 26 Pages

    “A bus network topology is a network architecture in which a set of clients are connected via a shared communications line/cables” (Abu, 2013). There are several common instances of the bus architecture, including one in the motherboard of most computers. Bus networks may be the simplest way to connect multiple clients even though many may have problems. When two clients want to transmit at the same time on the same bus, this may cause some problems. Thus systems use bus networks normally some may have scheme for collision handling or collision avoidance for communication on the bus. Though this may be quite often in using Carrier Sense Multiple Access or the presence of a bus master’s who controls access to the shared bus resource.…

    • 6320 Words
    • 26 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 2469 Words
    • 10 Pages

    “Tell me and I forget. Show me and I remember. Involve me and I understand.” Chinese proverb One’s understanding of network protocols can often be greatly deepened by “seeing protocols in action” and by “playing around with protocols” – observing the sequence of messages exchanged between two protocol entities, delving down into the details of protocol operation, and causing protocols to perform certain actions and then observing these actions and their consequences. This can be done in simulated scenarios or in a “real” network environment such as the Internet. The Java applets that…

    • 2469 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Nt1210 Chapter 6

    • 829 Words
    • 4 Pages

    4) LANs that span distances of several kilometers by using multimode fiber are made possible…

    • 829 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Any public wireless hotspots, such as at restaurants, hotels, parks are not a good place to use any website that requires personal or financial information. When using an unsecure network, a hacker can easily get access to any webpage you access. They can access documents, pictures, bank information, your phone number, address, credit card information and passwords. Once the hacker has your username and password for one website they can try to log in as you on multiple other websites. This is why it is best to never use the same username and password on different websites. When you are connecting to a wireless network, if it does not ask you for a WEP, WPA, or WPA2 password, then your connection is not secure, meaning none of the data you access with be encrypted.…

    • 356 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Reflection is the change in direction of a wavefront at an interface between two different media so that the wavefront returns into the medium from which it originated. In computer science, reflection is the ability of a computer program to examine and modify the structure and behavior of the program at runtime. Reflection also occurs at the surface of transparent media, such as water or glass.…

    • 307 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    2. N = C/v where N is the index of refraction C is the speed of light in a vacuum and V is the speed of light in the medium.…

    • 1265 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Rayleigh scattering theory describes the interaction of sunlight with molecules in a simple way. It applies to particles much smaller than the wavelength of the incoming radiation.…

    • 1843 Words
    • 8 Pages
    Powerful Essays