Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fiber Optics Engineering (Optical Networks)

Buy

The book covers the area of fiber optics from an engineering perspective. Emphasis is placed on data conversion between electrical and optical domains and the way limitations in each domain affect the other domain. Techniques to improve the fidelity of this conversion (both from electrical to optical domain, and vise versa) are also covered.

The first few chapters cover the required theoretical background including fundamentals of fiber optics communication, fiber optics networks, converting the electrical data to light, light transmission in the medium of fiber as well as converting light back to electrical signal. A critical chapter is dedicated to characterization of optical signals. The following chapters use the theoretical background to address the design of fiber optic transceivers. The author emphasizes issues that fiber optic engineers should be familiar with, but are rarely discussed in books because they belong to an area which is neither purely electrical nor optical. The last few chapters cover issues such as standards (ITU, IEEE, FSAN, etc.), test and measurement methodologies, and reliability (over temperature performance, aging, failure rates, shock and vibration, etc.).

(HTML tags aren't allowed.)

CCNP BCRAN Exam Certification Guide (CCNP Self-Study, 642-821), Second Edition
CCNP BCRAN Exam Certification Guide (CCNP Self-Study, 642-821), Second Edition

Prepare for the new CCNP 642-821 BCRAN Exam with the official exam preparation guide

* Learn the remote access design and management topics for the new Cisco CCNP 642-821 BCRAN exam with the only official preparation book
* Practice with more than 200 test questions, including simulation-based questions on the enclosed CD-ROM...

HTTP Pocket Reference : Hypertext Transfer Protocol
HTTP Pocket Reference : Hypertext Transfer Protocol

This book describes HTTP, the Hypertext Transfer Protocol. It provides a high level description of how the protocol works, along with reference information on client requests and server responses. Included are dumps of HTTP transactions, as well as tabular data that summarizes most of the standardized parameters used in...

Neuronal Activity in Tumor Tissue (Progress in Tumor Research, Vol. 39)
Neuronal Activity in Tumor Tissue (Progress in Tumor Research, Vol. 39)

This book summarizes the current knowledge on how tumors interact with the nervous system and what impact this might have for the progression and treatment of cancer. It begins with an introduction to the organization and physiology of the nervous system, especially of the peripheral nervous system with its high degree of plasticity....


Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking
Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking
"Disappearing Cryptography is a witty and entertaining look at the world of information hiding. Peter Wayner provides an intuitive perspective of the many techniques, applications, and research directions in the area of steganography. The sheer breadth of topics is outstanding and makes this book truly unique. A must read for...
Broadband Services: Business Models and Technologies for Community Networks
Broadband Services: Business Models and Technologies for Community Networks
Ubiquitous access to the internet is essential to prevent the deepening of modern society’s ‘digital divide’.

Remote communities are at a disadvantage when it comes to seeking better education, better jobs, and higher levels of civic participation. Governments around the world have recognised the damage...

Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.

The book begins with the chapter What is Cyber Crime? This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the
...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy