This lecture is on fiber-optics that consist of strands of optical fibers made from pure glass and sometime plastics that are as thin as a human hair to carry digital data information over long distances.
The document describes the basic BGP configuration of routers R1, R2, and ISPs Airtel, Reliance, and Vodafone. It defines the interfaces of each router and ISP with IP addresses. It also outlines the BGP configuration of each entity with AS numbers, neighbor definitions, and network advertisements. Troubleshooting commands like show ip route, show ip bgp summary, and show ip bgp neighbor are listed.
This document provides an overview of IPv6 addressing and address types. It discusses the 128-bit IPv6 address space and address notation. The main types of IPv6 addresses covered are unicast addresses, including global unicast, link-local, and unique local addresses, as well as multicast addresses and their uses for neighbor discovery. Solicited-node addresses are described as a method for IPv6 nodes to resolve link-layer addresses without broadcasting.
Cisco Routing and Switching by yateendra sahu pptyateendrasahu
A network connects computing devices like computers, printers, and routers that can communicate with each other. There are several types of networks including local area networks (LANs) that connect devices within a building, metropolitan area networks (MANs) that connect LANs across a city, and wide area networks (WANs) that connect LANs over a larger geographic area. Networks use devices like switches, routers, and bridges to direct data between connected devices and allow communication. Routers in particular send data packets between different networks by maintaining routing tables that contain addressing information.
This document provides an overview of MPLS (Multi-Protocol Label Switching). It discusses the basic idea behind MPLS, the history and components. MPLS assigns labels to IP flows to create label switched paths between ingress and egress routers. Routers forward packets based on lookups of these labels rather than long IP addresses. MPLS supports traffic engineering and quality of service across networks while integrating technologies like IP, ATM, and Frame Relay.
networking and their Routing protocols with commands along with diagram ,(rip, IGRP and OSPF and BGP ) and knowledge about Network devices like Router and Switch. network define and definitions of Lan, router and all the routing protocols and their features.
OSPF stub areas, totally stubby areas, and not-so-stubby (NSSA) areas are specialized area types that control the routing information distributed within the area. Stub areas allow only Type 1 and 2 LSAs, and the ABR will advertise a default route into the stub area. NSSAs function similarly but also allow an ASBR to advertise external routes using Type 7 LSAs, which the ABR converts to Type 5 LSAs. A totally stubby area receives no Type 3 LSAs, while a totally NSSA area also filters Type 3 LSAs and relies on a default route from the ABR.
MPLS L3 VPN allows companies to offer Layer 3 VPN services with advantages like scalability, security, and support for duplicate IP addresses and different network topologies. The key components that enable this are VRF tables on PE routers that separate routing information for each customer to avoid duplicate IP issues, and MP-BGP which customizes VPN routing information using a Route Distinguisher, VPN label, and Route Target to support different VPN topologies. MPLS L3 VPN provides services like multi-homed sites for redundancy, hub-and-spoke networks, internet access with security, and extranets for inter-company communication.
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]APNIC
This document discusses deploying MPLS L3VPN. It begins with an overview of MPLS and VPN terminology. It then covers the MPLS reference architecture and different node types. It describes how IP/VPN technologies use separate routing tables at provider edge (PE) routers to provide independent virtual routing and forwarding (VRF) instances for each VPN customer. The control plane uses multiprotocol BGP (MP-BGP) to distribute VPN routes between PE routers using route distinguisher (RD), route target (RT), and labels. The forwarding plane uses these labels to encapsulate and transport customer IP packets across the MPLS core. The document then discusses various IP/VPN services including load sharing, hub-and-spoke
The document describes the basic BGP configuration of routers R1, R2, and ISPs Airtel, Reliance, and Vodafone. It defines the interfaces of each router and ISP with IP addresses. It also outlines the BGP configuration of each entity with AS numbers, neighbor definitions, and network advertisements. Troubleshooting commands like show ip route, show ip bgp summary, and show ip bgp neighbor are listed.
This document provides an overview of IPv6 addressing and address types. It discusses the 128-bit IPv6 address space and address notation. The main types of IPv6 addresses covered are unicast addresses, including global unicast, link-local, and unique local addresses, as well as multicast addresses and their uses for neighbor discovery. Solicited-node addresses are described as a method for IPv6 nodes to resolve link-layer addresses without broadcasting.
Cisco Routing and Switching by yateendra sahu pptyateendrasahu
A network connects computing devices like computers, printers, and routers that can communicate with each other. There are several types of networks including local area networks (LANs) that connect devices within a building, metropolitan area networks (MANs) that connect LANs across a city, and wide area networks (WANs) that connect LANs over a larger geographic area. Networks use devices like switches, routers, and bridges to direct data between connected devices and allow communication. Routers in particular send data packets between different networks by maintaining routing tables that contain addressing information.
This document provides an overview of MPLS (Multi-Protocol Label Switching). It discusses the basic idea behind MPLS, the history and components. MPLS assigns labels to IP flows to create label switched paths between ingress and egress routers. Routers forward packets based on lookups of these labels rather than long IP addresses. MPLS supports traffic engineering and quality of service across networks while integrating technologies like IP, ATM, and Frame Relay.
networking and their Routing protocols with commands along with diagram ,(rip, IGRP and OSPF and BGP ) and knowledge about Network devices like Router and Switch. network define and definitions of Lan, router and all the routing protocols and their features.
OSPF stub areas, totally stubby areas, and not-so-stubby (NSSA) areas are specialized area types that control the routing information distributed within the area. Stub areas allow only Type 1 and 2 LSAs, and the ABR will advertise a default route into the stub area. NSSAs function similarly but also allow an ASBR to advertise external routes using Type 7 LSAs, which the ABR converts to Type 5 LSAs. A totally stubby area receives no Type 3 LSAs, while a totally NSSA area also filters Type 3 LSAs and relies on a default route from the ABR.
MPLS L3 VPN allows companies to offer Layer 3 VPN services with advantages like scalability, security, and support for duplicate IP addresses and different network topologies. The key components that enable this are VRF tables on PE routers that separate routing information for each customer to avoid duplicate IP issues, and MP-BGP which customizes VPN routing information using a Route Distinguisher, VPN label, and Route Target to support different VPN topologies. MPLS L3 VPN provides services like multi-homed sites for redundancy, hub-and-spoke networks, internet access with security, and extranets for inter-company communication.
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]APNIC
This document discusses deploying MPLS L3VPN. It begins with an overview of MPLS and VPN terminology. It then covers the MPLS reference architecture and different node types. It describes how IP/VPN technologies use separate routing tables at provider edge (PE) routers to provide independent virtual routing and forwarding (VRF) instances for each VPN customer. The control plane uses multiprotocol BGP (MP-BGP) to distribute VPN routes between PE routers using route distinguisher (RD), route target (RT), and labels. The forwarding plane uses these labels to encapsulate and transport customer IP packets across the MPLS core. The document then discusses various IP/VPN services including load sharing, hub-and-spoke
This document chapter discusses spanning tree protocols, including Spanning Tree Protocol (STP), Rapid Spanning Tree Protocol (RSTP), and Multiple Spanning Tree (MST). It covers STP operations such as electing a root bridge, root ports, and designated ports. BPDU frame formats and port states are also explained. The chapter objectives are to provide an overview of spanning tree, implement RSTP, describe various STP features, and configure MST.
IS-IS is an interior gateway protocol that uses link-state routing and SPF algorithms to calculate the shortest path. It supports both CLNP and IP and has three routing levels - level 1 for intra-area routing, level 2 for inter-area routing, and level 1/2 routers that connect levels 1 and 2. There are three types of IS-IS routers: level 1 that exchange intra-area topology, level 2 that exchange inter-area topology, and level 1/2 that act as border routers between levels 1 and 2.
Traditional vs. SoC FPGA Design Flow A Video Pipeline Case StudyAltera Corporation
This presentation compares the impact of traditional FPGA engineering design flow to one employed with an SoC FPGA. The two approaches will be contrasted in terms of their impacts on system architecture design, debugging, risk mitigation, system integration, bring-up, feature enhancements, design obsolescence, and engineering effort. A case study is presented that explores these impacts within a video pipeline development effort.
IS-IS is an interior gateway protocol that builds a topological representation of the network and supports routing between areas and routers. It is a link-state protocol that is similar to OSPF, with OSPF areas corresponding to IS-IS levels and OSPF neighbors mapping to IS-IS adjacencies. IS-IS was developed for OSI but can also carry IPv4 and IPv6.
This document explains MPLS Layer 3 VPNs. It discusses how Layer 3 VPNs allow routing information to be shared between customer sites using protocols like OSPF and BGP across the service provider's MPLS network. It describes how Virtual Routing and Forwarding instances (VRFs), MP-BGP, Route Distinguishers (RDs), and Route Targets (RTs) work together to separate routing information for different customers and establish VPN connectivity between their sites while avoiding overlapping address spaces.
The document provides an overview of the Border Gateway Protocol (BGP). It discusses BGP concepts such as autonomous systems, path attributes, and the BGP protocol operation. Key points include that BGP establishes peering sessions to exchange routing information, uses route attributes like AS path, next hop, and communities to determine the best path, and supports techniques like route reflection and confederation to improve scalability in large networks.
Fibre optic FTTH FTTX network design, engineering and planning solutions,van den Dool Dick
Fibre optic FTTH FTTX network software solutions to design, engineer & plan FTTH / FTTX networks cost optimized automatically. Shows the required input, design phase and output to Autocad etc.
Presented by Mark Boxer & Jeff Bush of OFS
Agenda:
• Why Fiber?
• Fiber Feeds Everything
• Nuts and Bolts -The Components
• Installation Techniques
• Network Architectures and Planning
A PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
LDP allows MPLS routers to exchange label mapping information by establishing LDP sessions between peers. LDP defines procedures and messages for routers to advertise label bindings and establish label switched paths for forwarding traffic. LDP sessions can be directly connected over a single hop or nondirectly connected over multiple hops using targeted Hellos.
Dynamic routing protocols are used to automatically discover remote networks, maintain up-to-date routing information, and choose the best path to destination networks. There are two main types - interior gateway protocols (IGPs) like RIP, OSPF, and EIGRP that are used within an autonomous system, and exterior protocols like BGP that route between autonomous systems. IGPs use metrics like hop count or bandwidth to determine the best path. OSPF is a link-state protocol that floods link information, while EIGRP uses DUAL algorithm and maintains topology tables for fast convergence.
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
This document provides an overview of basic switching concepts and Cisco switch configuration. It explains Ethernet and how switches work to segment networks and reduce collisions. Switches operate at the data link layer and learn MAC addresses to forward frames efficiently. The document discusses switch configuration using commands like hostname, interface, duplex, and port security. It compares switching methods like store-and-forward and cut-through forwarding. The summary reiterates how switches divide collision domains to improve performance over shared-medium Ethernet.
IS-IS and OSPF are both link-state interior gateway protocols that use the SPF algorithm and support VLSM. However, IS-IS operates above layer 2 and routers belong to one area, while OSPF operates at the IP layer and routers can belong to multiple areas. Additionally, IS-IS uses DIS while OSPF uses DR/BDR, and OSPF supports virtual links while IS-IS does not.
Inter-VLAN routing is the process of forwarding network traffic from one VLAN to another VLAN using a
router.
VLANs divide broadcast domains in a LAN environment. Whenever hosts in one VLAN need to
communicate with hosts in another VLAN, the traffic must be routed between them. This is known as
inter-VLAN routing. On Catalyst switches it is accomplished by creating Layer 3 interfaces (Switch virtual
interfaces (SVI)).
The act of data collection using surveying devices such as GPS & others is very vital for a successful project implementation of Outside plant fiber Project
OSPFv3 is a link-state routing protocol that uses link-state advertisements (LSAs) to exchange routing information. Routers running OSPFv3 generate different types of LSAs to advertise IPv6 address prefixes, network links, and routing information between areas. OSPFv3 supports multi-area configurations with a backbone area and regular areas connected via area border routers that generate summary LSAs.
The document is a tutorial on L2VPN (Layer 2 Virtual Private Networks) that provides an agenda covering introductions, concepts, transports, services, pseudowire stitching, QoS, and demonstrations. It defines L2VPN as providing an end-to-end layer 2 connection across a service provider's MPLS or IP core, allowing legacy services like Frame Relay and ATM to be migrated to an MPLS/IP infrastructure. It also describes the need for L2VPN, models like VPLS and VPWS, basic building blocks of pseudowires, and control plane requirements.
This document provides an overview of Multi-Protocol Label Switching (MPLS) technology. It discusses MPLS fundamentals, components, operations, applications for traffic engineering, virtual private networks, and any transport over MPLS. It also outlines topics like MPLS label distribution, virtual private network models, and future developments in MPLS. The document is intended to guide readers on key concepts in MPLS and provide background for further study.
BGP (Border Gateway Routing Protocol) is a standardized exterior gateway protocol designed to
exchange routing and reachability information between autonomous systems (AS) on the Internet. The
Border Gateway Protocol makes routing decisions based on paths, network policies or rule-sets
configured by a network administrator, and are involved in making core routing decisions.
BGP is a very robust and scalable routing protocol, as evidenced by the fact that BGP is the routing
protocol employed on the Internet.
This document provides information about optical fibers and their applications. It discusses the materials and processes used to make optical fibers, including purifying silica, depositing layers through chemical vapor deposition, and drawing fibers from preforms. Optical fibers have advantages over copper wires for telecommunications, including lower cost, higher data capacity, and lower signal degradation. The document also describes how optical fibers are used for sensing applications and lists some of their properties. In summary, it outlines the fabrication and properties of optical fibers and their role in telecommunications and sensing.
Fiber optics (optical fibers) are long, thin strands of very pure glass about the diameter of a human hair. They are arranged in bundles called optical cables and used to transmit light signals over long distances.
This document chapter discusses spanning tree protocols, including Spanning Tree Protocol (STP), Rapid Spanning Tree Protocol (RSTP), and Multiple Spanning Tree (MST). It covers STP operations such as electing a root bridge, root ports, and designated ports. BPDU frame formats and port states are also explained. The chapter objectives are to provide an overview of spanning tree, implement RSTP, describe various STP features, and configure MST.
IS-IS is an interior gateway protocol that uses link-state routing and SPF algorithms to calculate the shortest path. It supports both CLNP and IP and has three routing levels - level 1 for intra-area routing, level 2 for inter-area routing, and level 1/2 routers that connect levels 1 and 2. There are three types of IS-IS routers: level 1 that exchange intra-area topology, level 2 that exchange inter-area topology, and level 1/2 that act as border routers between levels 1 and 2.
Traditional vs. SoC FPGA Design Flow A Video Pipeline Case StudyAltera Corporation
This presentation compares the impact of traditional FPGA engineering design flow to one employed with an SoC FPGA. The two approaches will be contrasted in terms of their impacts on system architecture design, debugging, risk mitigation, system integration, bring-up, feature enhancements, design obsolescence, and engineering effort. A case study is presented that explores these impacts within a video pipeline development effort.
IS-IS is an interior gateway protocol that builds a topological representation of the network and supports routing between areas and routers. It is a link-state protocol that is similar to OSPF, with OSPF areas corresponding to IS-IS levels and OSPF neighbors mapping to IS-IS adjacencies. IS-IS was developed for OSI but can also carry IPv4 and IPv6.
This document explains MPLS Layer 3 VPNs. It discusses how Layer 3 VPNs allow routing information to be shared between customer sites using protocols like OSPF and BGP across the service provider's MPLS network. It describes how Virtual Routing and Forwarding instances (VRFs), MP-BGP, Route Distinguishers (RDs), and Route Targets (RTs) work together to separate routing information for different customers and establish VPN connectivity between their sites while avoiding overlapping address spaces.
The document provides an overview of the Border Gateway Protocol (BGP). It discusses BGP concepts such as autonomous systems, path attributes, and the BGP protocol operation. Key points include that BGP establishes peering sessions to exchange routing information, uses route attributes like AS path, next hop, and communities to determine the best path, and supports techniques like route reflection and confederation to improve scalability in large networks.
Fibre optic FTTH FTTX network design, engineering and planning solutions,van den Dool Dick
Fibre optic FTTH FTTX network software solutions to design, engineer & plan FTTH / FTTX networks cost optimized automatically. Shows the required input, design phase and output to Autocad etc.
Presented by Mark Boxer & Jeff Bush of OFS
Agenda:
• Why Fiber?
• Fiber Feeds Everything
• Nuts and Bolts -The Components
• Installation Techniques
• Network Architectures and Planning
A PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
LDP allows MPLS routers to exchange label mapping information by establishing LDP sessions between peers. LDP defines procedures and messages for routers to advertise label bindings and establish label switched paths for forwarding traffic. LDP sessions can be directly connected over a single hop or nondirectly connected over multiple hops using targeted Hellos.
Dynamic routing protocols are used to automatically discover remote networks, maintain up-to-date routing information, and choose the best path to destination networks. There are two main types - interior gateway protocols (IGPs) like RIP, OSPF, and EIGRP that are used within an autonomous system, and exterior protocols like BGP that route between autonomous systems. IGPs use metrics like hop count or bandwidth to determine the best path. OSPF is a link-state protocol that floods link information, while EIGRP uses DUAL algorithm and maintains topology tables for fast convergence.
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
This document provides an overview of basic switching concepts and Cisco switch configuration. It explains Ethernet and how switches work to segment networks and reduce collisions. Switches operate at the data link layer and learn MAC addresses to forward frames efficiently. The document discusses switch configuration using commands like hostname, interface, duplex, and port security. It compares switching methods like store-and-forward and cut-through forwarding. The summary reiterates how switches divide collision domains to improve performance over shared-medium Ethernet.
IS-IS and OSPF are both link-state interior gateway protocols that use the SPF algorithm and support VLSM. However, IS-IS operates above layer 2 and routers belong to one area, while OSPF operates at the IP layer and routers can belong to multiple areas. Additionally, IS-IS uses DIS while OSPF uses DR/BDR, and OSPF supports virtual links while IS-IS does not.
Inter-VLAN routing is the process of forwarding network traffic from one VLAN to another VLAN using a
router.
VLANs divide broadcast domains in a LAN environment. Whenever hosts in one VLAN need to
communicate with hosts in another VLAN, the traffic must be routed between them. This is known as
inter-VLAN routing. On Catalyst switches it is accomplished by creating Layer 3 interfaces (Switch virtual
interfaces (SVI)).
The act of data collection using surveying devices such as GPS & others is very vital for a successful project implementation of Outside plant fiber Project
OSPFv3 is a link-state routing protocol that uses link-state advertisements (LSAs) to exchange routing information. Routers running OSPFv3 generate different types of LSAs to advertise IPv6 address prefixes, network links, and routing information between areas. OSPFv3 supports multi-area configurations with a backbone area and regular areas connected via area border routers that generate summary LSAs.
The document is a tutorial on L2VPN (Layer 2 Virtual Private Networks) that provides an agenda covering introductions, concepts, transports, services, pseudowire stitching, QoS, and demonstrations. It defines L2VPN as providing an end-to-end layer 2 connection across a service provider's MPLS or IP core, allowing legacy services like Frame Relay and ATM to be migrated to an MPLS/IP infrastructure. It also describes the need for L2VPN, models like VPLS and VPWS, basic building blocks of pseudowires, and control plane requirements.
This document provides an overview of Multi-Protocol Label Switching (MPLS) technology. It discusses MPLS fundamentals, components, operations, applications for traffic engineering, virtual private networks, and any transport over MPLS. It also outlines topics like MPLS label distribution, virtual private network models, and future developments in MPLS. The document is intended to guide readers on key concepts in MPLS and provide background for further study.
BGP (Border Gateway Routing Protocol) is a standardized exterior gateway protocol designed to
exchange routing and reachability information between autonomous systems (AS) on the Internet. The
Border Gateway Protocol makes routing decisions based on paths, network policies or rule-sets
configured by a network administrator, and are involved in making core routing decisions.
BGP is a very robust and scalable routing protocol, as evidenced by the fact that BGP is the routing
protocol employed on the Internet.
This document provides information about optical fibers and their applications. It discusses the materials and processes used to make optical fibers, including purifying silica, depositing layers through chemical vapor deposition, and drawing fibers from preforms. Optical fibers have advantages over copper wires for telecommunications, including lower cost, higher data capacity, and lower signal degradation. The document also describes how optical fibers are used for sensing applications and lists some of their properties. In summary, it outlines the fabrication and properties of optical fibers and their role in telecommunications and sensing.
Fiber optics (optical fibers) are long, thin strands of very pure glass about the diameter of a human hair. They are arranged in bundles called optical cables and used to transmit light signals over long distances.
1. The document discusses optical fibers, which are thin strands of glass that carry light signals for communication.
2. Optical fibers have a core and cladding structure that allows total internal reflection to guide light along the fiber.
3. Optical fibers have several advantages over metallic wires for communication, including very large bandwidth, immunity to interference, elimination of crosstalk, lighter weight, and greater security.
4. Key applications of optical fibers include long-distance communication networks, military equipment, sensors, and structural health monitoring of buildings, bridges, tunnels, and dams.
Fiber optics use thin strands of glass or plastic to transmit data using pulses of light. Light signals traveling through the fiber core are reflected off the cladding layer and travel long distances through total internal reflection. Fiber optic cables have enabled enormous increases in data transmission capacity over the decades and now carry nearly all long-distance communications traffic by transmitting multiple wavelengths of light simultaneously. Fiber optics provide advantages over metal cables including higher bandwidth, less weight and interference, and immunity to electromagnetic fields.
This slide presentation summarizes how fiber optics work. Fiber optics transmit light signals over long distances using thin glass strands called optical fibers. Light travels through the core of the fiber and is reflected through total internal reflection off the cladding. Fiber optic systems consist of transmitters that encode light signals, optical fibers that carry the signals long distances, and receivers that decode the signals. Fiber optics have advantages over copper wires like being less expensive to manufacture and install, having higher data carrying capacity, and being lighter weight and non-flammable. Optical fibers are made by drawing fiber strands from a preform cylinder of glass that is tested for quality control standards.
Garth naar - fiber optics and its applicationsgarthnaar
Fiber optics transports light in a very directional way. Light is focused into and guided through a cylindrical glass fiber. Inside the core of the fiber light bounces back and forth at angles to the side walls, making its way to the end of the fiber where it eventually escapes. The light does not escape through the side walls because of total internal reflection.
This document discusses fiber optic communication systems. It begins by introducing fiber optics as a major component of telecommunication infrastructure due to its high bandwidth capabilities and low signal attenuation. It then covers the basic building blocks of a fiber optic system including light sources, detectors, couplers and multiplexers. The document discusses the advantages of fiber optic systems such as long signal transmission distances, large bandwidth and small cable size. It also covers transmission windows, loss calculations and provides examples. In summary, the document provides an overview of the key concepts and components of fiber optic communication systems.
An optical fiber cable contains one or more optical fibers, which are individually coated and contained in a protective tube. Optical fibers transmit data via total internal reflection between the fiber's core and cladding layers, which have different refractive indices. Optical fiber cables are designed to protect the fragile fibers from damage and contamination through the use of protective coatings, tubes, powders, and armor.
Fiber optics technology uses thin glass fibers to carry signals in the form of light over long distances. Optical fibers have a core that light travels through surrounded by cladding. They transmit data using total internal reflection. Fiber optics development accelerated in the 1980s when it became the backbone of long-distance phone networks due to its thinness, low cost, high bandwidth, and resistance to electromagnetic interference. Optical fibers are now widely used for telecommunications, local networks, cable TV, and other applications.
The document discusses the history and components of fiber optics. It explains that fiber optics use thin glass strands called optical fibers to transmit light signals over long distances. The core of the fiber carries the light signals, while the cladding reflects them down the core. There are two main types of fibers: single-mode fibers which carry light in a single path, and multimode fibers which use graded or step indexes to carry light along multiple paths. Fiber optics are replacing copper wire for data transmission due to advantages like higher speeds, larger bandwidth, longer transmission distances, and lower maintenance costs.
1. Optical fibers transmit data using pulses of light and are able to carry much higher bandwidths than metal wires.
2. Fibers use total internal reflection to guide light along their length with less loss than wires and are immune to electromagnetic interference.
3. Fibers have various applications including long distance communications, local networks, imaging bundles, and sensors.
Fiber optics work by transmitting light through thin glass strands called optical fibers. Light travels down the core of the fiber via total internal reflection from the cladding layer. There are two main types of optical fibers: single-mode fibers which transmit infrared laser light using a small core, and multi-mode fibers which transmit infrared light from LEDs using a larger core. Fiber optic systems transmit digital data over long distances using a transmitter to encode light signals, fibers to conduct the signals, and a receiver to decode the signals. Fiber optics offer advantages over copper wires like lower signal degradation, higher data capacity, and ability to carry digital signals for computer networks.
Optical fiber communication involves transmitting light through thin glass or plastic fibers to carry information. Light is modulated to encode information and travels through the fiber's core via total internal reflection. At the receiver, the light is converted back to an electrical signal. Optical fibers allow much higher bandwidth than traditional copper cables and are immune to electromagnetic interference. Their small size and weight make them useful for long-distance telecommunications and high-speed networking.
This document provides an overview of optical fiber communication. It discusses the history and development of optical fibers, including the discovery of total internal reflection and development of glass coatings to reduce signal loss. It describes the basic components of an optical communication system including light sources, fiber cables, and light detectors. It also covers fiber types, advantages like high bandwidth and low signal degradation, and disadvantages such as higher initial cost compared to copper cables.
Fiber optics work by transmitting light through thin glass fibers. Light is reflected within the fiber's core by the cladding layer and travels long distances with little signal degradation. There are two main types of optical fibers: single-mode fibers which transmit infrared laser light through a small core, and multi-mode fibers which transmit infrared light through a larger core. Fiber optics have advantages over copper wires like being thinner, having higher carrying capacity, and less signal degradation over long distances.
This document provides an overview of optical fibers used in communication systems. It discusses the history of optical fiber communication and how total internal reflection allows light to propagate along the fiber. The key components of an optical fiber are the core and cladding. Optical fibers can be classified based on the materials used, number of modes supported, and refractive index profile. Optical fibers play an important role in modern communication systems by providing high bandwidth data transmission over long distances.
This document provides an overview of fibre optics, including its composition, operation, advantages, disadvantages, types of communication, cable types, pulse spreading, transmission loss, and conclusions. Fibre optics uses glass or plastic filaments to transmit light signals for communication. It has advantages over metal cables like greater bandwidth, less signal degradation, lighter weight, and security. Installation is more expensive than metal cables. Fibre optics enables both analog and digital communication and comes in step index or graded index cable types.
Fiber-optic cables transmit signals using light pulses through extremely thin glass or plastic strands. They can carry voice, data, and video signals over distances up to 50 km without needing repeaters. Optical fibers use the principle of total internal reflection to transmit light signals through the fiber. Fibers come in single-mode and multi-mode varieties and are constructed through processes like chemical vapor deposition and drawing from preforms. Fibers are tested for characteristics like attenuation and capacity before being installed.
An optical fiber (or optical fibre) is a flexible, transparent fiber made by drawing glass (silica) or plastic to a diameter slightly thicker than that of a human hair.Optical fibers are used most often as a means to transmit light between the two ends of the fiber and find wide usage in fiber-optic communications
Fiber optics use thin strands of glass called optical fibers to transmit light signals over long distances. An optical fiber consists of a core surrounded by cladding that reflects light internally through total internal reflection. Hundreds or thousands of fibers are bundled in cables. A fiber optic system includes a transmitter that encodes light signals, the optical fiber that conducts the signals, and a receiver that decodes the signals. Fiber optics offer advantages over copper wire including lower costs, higher data capacity, immunity to electromagnetic interference, lighter weight, and non-flammability.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
2. Physical – Layer 1 Protocol Data Unit
Fiber Optics Overview
Fiber optics (optical fibers) are long, thin strands of very pure glass about the diameter
of a human hair. They are arranged in bundles called optical cables and used to
transmit light signals
Plain English Optical fibers are used most as a means to transmit light between the two ends of the
fiber in fiber-optic communications
Technical
3. Physical – Layer 1 Protocol Data Unit
Technical
Fiber Optics Overview
Core: Thin glass center of the fiber where light travels
Cladding: Outer optical material surrounding the core that reflects the light back into the core
Primary & Secondary Buffer Coating: Plastic coating that protects the fiber from damage and moisture
Aramid Yarn: Class of heat-resistant and strong synthetic fibers that has the strength that is five times
that of steel
Fiber optic cable jacket colors can make it fast and simple to recognize exactly which type
of cable you are dealing with.
4. Physical – Layer 1 Protocol Data Unit
Technical
Fiber Optics Connectors
5. Physical – Layer 1 Protocol Data Unit
Technical
Fiber Optics Overview
Single-mode fibers have small cores (about 3.5 x 10-4
inches or 9 microns in diameter) and transmit infrared
laser light (wavelength = 1,300 to 1,550 nanometers)
Multi-mode fibers have larger cores (about 2.5 x 10-3
inches or 62.5 microns in diameter) and transmit infrared
light (wavelength = 850 to 1,300 nm) from light-emitting
diodes (LEDs).
Some optical fibers can be made from plastic. These
fibers have a large core (0.04 inches or 1 mm diameter)
and transmit visible red light (wavelength = 650 nm) from
LEDs
6. Physical – Layer 1 Protocol Data Unit
Technical
How Optical Fiber Transmit Light
Suppose you want to shine a flashlight beam down a long, straight
hallway. Just point the beam straight down the hallway -- light travels
in straight lines, so it is no problem. What if the hallway has a bend in
it? You could place a mirror at the bend to reflect the light beam
around the corner. What if the hallway is very winding with multiple
bends? You might line the walls with mirrors and angle the beam so
that it bounces from side-to-side all along the hallway. This is exactly
what happens in an optical fiber
The light in a fiber-optic cable travels through the core (hallway) by
constantly bouncing from the cladding (mirror-lined walls), a
principle called total internal reflection. Because the cladding
does not absorb any light from the core, the light wave can travel
great distances.
Some of the light signal degrades within the
fiber, mostly due to impurities in the glass. The
extent that the signal degrades depends on the
purity of the glass and the wavelength of the
transmitted light
11. Physical – Layer 1 Protocol Data Unit
Fiber-Optic Relay System
It receives and directs the optical device to turn the light
"on" and "off" in the correct sequence, thereby generating
a light signal.
Transmitter - Produces and encodes the light signals
Optical fiber - Conducts the light signals over a distance optical regenerators is spliced along the
cable to boost the degraded light signals.
Optical regenerator - May be necessary to boost the light signal (for long distances), optical
regenerators is spliced along the cable to boost the degraded light signals.
The regenerator is a laser amplifier for the incoming signal.
Optical receiver - Receives and decodes the light signals
The optical receiver is like the sailor on the deck of the
receiving ship. It takes the incoming digital light signals, decodes
them and sends the electrical signal to the other user's computer,
TV or telephone (receiving ship's captain). The receiver uses a
photocell or photodiode to detect the light. photodiode is a
semiconductor device that converts light into an electrical
current.
12. Physical – Layer 1 Protocol Data Unit
Fiber-Optic Advantages
Less expensive cheaper than equivalent lengths of copper wire
Thinner can be drawn to smaller diameters than copper wire
Higher carrying capacity more fibers can be bundled into a given-diameter cable than copper wires.
Less signal degradation loss of signal in optical fiber is less than in copper wire
Light signals - Unlike electrical signals in copper wires, light signals from one fiber do not interfere
with those of other fibers in the same cable.
Low power signals in optical fibers degrade less, lower-power transmitters can be used instead of the
high-voltage electrical transmitters needed for copper wires
Digital signals ideally suited for carrying digital information, which is especially useful in computer
networks.
Non-flammable no electricity is passed through optical fibers, there is no fire hazard
Lightweight optical cable weighs less than a comparable copper wire cable, takes up less weight
Flexible fiber optics are so flexible and can transmit and receive light, they are used in many flexible
digital cameras for the following purposes
Fiber optics are most notably telecommunications and computer networks. In telephone
a signal is bounced off a communications satellite, you often hear an echo on the line.
But with transatlantic fiber-optic cables, you have a direct connection with no echoes.
13. Physical – Layer 1 Protocol Data Unit
Fiber-Optic Construction
Optical fibers are made of extremely pure optical glass the glass in
an optical fiber has far fewer impurities than window-pane glass.
The quality of glass is as follows: If you were on top of an
ocean that is miles of solid core optical fiber glass, you could see the
bottom clearly.
Making optical fibers requires the following steps:
1.Making a preform glass cylinder
2.Drawing the fibers from the preform
3.Testing the fibers
14. Physical – Layer 1 Protocol Data Unit
Fiber-Optic Construction
Making the Preform Blank
The glass for the preform is made by a process called
modified chemical vapor deposition (MCVD).
In MCVD, oxygen is bubbled through solutions of silicon
chloride (SiCl4), germanium chloride (GeCl4) and/or
other chemicals. The precise mixture governs the various
physical and optical properties (index of refraction,
coefficient of expansion, melting point, etc.). The gas
vapors are then conducted to the inside of a synthetic
silica or quartz tube (cladding) in a special lathe. As
the lathe turns, a torch is moved up and down the outside
of the tube. The extreme heat from the torch causes two
things to happen:
Lathe used in preparing the
preform blank
The silicon and germanium react with oxygen, forming
silicon dioxide (SiO2) and germanium dioxide (GeO2).
The silicon dioxide and germanium dioxide deposit on the
inside of the tube and fuse together to form glass.
15. Physical – Layer 1 Protocol Data Unit
Fiber-Optic Construction
Lathe used in preparing the preform
blank
The lathe turns continuously to make an even coating and
consistent blank. The purity of the glass is maintained by
using corrosion-resistant plastic in the gas delivery system
(valve blocks, pipes, seals) and by precisely controlling the
flow and composition of the mixture. The process of
making the preform blank is highly automated and takes
several hours. After the preform blank cools, it is tested
for quality control (index of refraction).
16. Physical – Layer 1 Protocol Data Unit
Fiber-Optic Construction
Drawing Fibers from the Preform Blank
Once the preform blank has been tested, it gets loaded
into a fiber drawing tower.
Diagram of a fiber drawing tower used to draw
optical glass fibers from a preform blank
The blank gets lowered into a graphite furnace (3,452 to
3,992 degrees Fahrenheit or 1,900 to 2,200 degrees
Celsius) and the tip gets melted until a molten glob falls
down by gravity. As it drops, it cools and forms a thread.
17. Physical – Layer 1 Protocol Data Unit
Fiber-Optic Construction
The operator threads the strand through a series of
coating cups (buffer coatings) and ultraviolet light curing
ovens onto a tractor-controlled spool. The tractor
mechanism slowly pulls the fiber from the heated preform
blank and is precisely controlled by using a laser
micrometer to measure the diameter of the fiber and
feed the information back to the tractor mechanism.
Fibers are pulled from the blank at a rate of 33 to 66 ft/s
(10 to 20 m/s) and the finished product is wound onto the
spool. It is not uncommon for spools to contain more than
1.4 miles (2.2 km) of optical fiber.
18. Physical – Layer 1 Protocol Data Unit
Fiber-Optic Testing
•Tensile strength - Must withstand 100,000 lb/in2 or
more
•Refractive index profile - Determine numerical
aperture as well as screen for optical defects
•Fiber geometry - Core diameter, cladding dimensions and
coating diameter are uniform
•Attenuation - Determine the extent that light signals of
various wavelengths degrade over distance
•Information carrying capacity (bandwidth) -
Number of signals that can be carried at one time (multi-
mode fibers)
•Chromatic dispersion - Spread of various wavelengths
of light through the core (important for bandwidth)
•Operating temperature/humidity range
•Temperature dependence of attenuation
•Ability to conduct light underwater - Important for
undersea cables
Once the fibers have
passed the quality
control, they are sold
to telephone
companies, cable
companies and
network providers.
19. Physical – Layer 1 Protocol Data Unit
Fiber-Optic Reflection Physics
Total internal reflection
in an optical fiber
When light passes from a medium with one index of
refraction (m1) to another medium with a lower index of
refraction (m2), it bends or refracts away from an
imaginary line perpendicular to the surface (normal
line). As the angle of the beam through m1 becomes
greater with respect to the normal line, the refracted light
through m2 bends further away from the line.
At one particular angle (critical angle), the refracted
light will not go into m2, but instead will travel along the
surface between the two media (sine [critical angle] =
n2/n1 where n1 and n2 are the indices of refraction [n1 is
greater than n2]). If the beam through m1 is greater than
the critical angle, then the refracted beam will be reflected
entirely back into m1 (total internal reflection), even
though m2 may be transparent!
Fiber-optic critical angle = (90 degrees - physics critical
angle).
20. Physical – Layer 1 Protocol Data Unit
Fiber-Optic Reflection Physics
Total internal reflection
in an optical fiber
In an optical fiber, the light travels through the core (m1,
high index of refraction) by constantly reflecting from the
cladding (m2, lower index of refraction) because the angle
of the light is always greater than the critical angle. Light
reflects from the cladding no matter what angle the fiber
itself gets bent at, even if it's a full circle!
Because the cladding does not absorb any light from the
core, the light wave can travel great distances. However,
some of the light signal degrades within the fiber, mostly
due to impurities in the glass. The extent that the signal
degrades depends upon the purity of the glass and the
wavelength of the transmitted light (for example, 850 nm
= 60 to 75 percent/km; 1,300 nm = 50 to 60 percent/km;
1,550 nm is greater than 50 percent/km). Some premium
optical fibers show much less signal degradation -- less
than 10 percent/km at 1,550 nm.
21. Physical – Layer 1 Protocol Data Unit
References
Wiki Fiber Optics
https://en.wikipedia.org/wiki/Optical_fiber
What are Fiber Optics - How Fiber Optics Work
https://computer.howstuffworks.com/fiber-optic.htm
Wireless Transmission
https://www.slideshare.net/wanyabdullah/wireless-transmission-29919471
Sunny Fiber Optic Cable Multi-Mode vs Single Mode
https://youtu.be/eNa97A08wyU
Photodiode
https://en.wikipedia.org/wiki/Photodiode