Tuesday, November 29, 2016
Saturday, October 15, 2016
from BSNL press room
In a series of offering customer friendly schemes for the benefits of customers and to attract new customers to experience wireline Broadband services, BSNL is going to launch a very cost effective & affordable promotional unlimited Broadband plan ‘Experience Unlimited BB 249’ from 9th September 2016. Under this plan, customers can download unlimited Broadband data without bothering of any data limit in GB. BSNL shall offer 2 Mbps speed under this plan. If customer uses the above plan continuously in a month, he can download upto 300 GB data by paying only Rs. 249/-. Hence, per GB of data download cost comes out as less than Rs. 1/- per GB. After six months, customer will be migrated to one of the regular BB plan based on the choice of the customer. BSNL’s Chairman cum Managing Director Anupam Shrivastava told that BSNL is the only operator who is offering lowest per GB data download cost plan under Broadband services in the country. He further told that the above plan shall enhance the customer experience towards BSNL’s wireline Broadband services and shall attract new customers to experience BSNL Broadband services. New Broadband connection can be subscribed by visiting nearest BSNL customer service centre or by calling Toll Free number- 1800 345 1500. More details in this regard can be obtained by visiting BSNL website www.bsnl.co.in .".”
"suscribe BSNL landline" linestelecom
from BSNL press room
On this Independence Day on 15 Aug 2016 ,State owned telecom operator BSNL is adding more facility to its customers free call on 15 Aug 2016 and every Sunday from its landline phone in addition to existing Free night calling scheme. In this offer BSNL landline customers can call to any mobile or landline free of any charges.
Moreover there will be free calling facility on every Sunday for landline customers.
The announcement was made today by SH. Manoj Sinha, Hon'ble Minister of state ,communication (I/C) in a function held at Varanasi.
Sh. Anupam Shrivastava,CMD,BSNL said ," BSNL is committed to provide best and reliable service to its customer. This offer is one of our extension of hand for our valued customers on this Independence day. This facility is in addition of existing Free night calling scheme by BSNL.".”lines telecom, kerala
Moreover there will be free calling facility on every Sunday for landline customers.
The announcement was made today by SH. Manoj Sinha, Hon'ble Minister of state ,communication (I/C) in a function held at Varanasi.
Sh. Anupam Shrivastava,CMD,BSNL said ," BSNL is committed to provide best and reliable service to its customer. This offer is one of our extension of hand for our valued customers on this Independence day. This facility is in addition of existing Free night calling scheme by BSNL.".”lines telecom, kerala
Saturday, July 23, 2016
BEWARE LIGHTNING / anil kumar lines
A moving thunderstorm also gathers positively charged particles along the ground that travel with the storm. As the differences in charges continue to increase, positively charged particles rise up tall objects such as trees, houses, and telephone poles—and people.
• The negatively charged bottom part of the storm sends out an invisible charge toward the ground. When the charge gets close to the ground, it is attracted by all the positively charged objects, and a channel develops. The subsequent electrical transfer in the channel is lightning.
SHARE
RELATED
• If your hair stands up in a storm, it could be a bad sign that positive charges are rising through you, reaching toward the negatively charged part of the storm. That's not a good sign! Your best bet is to get yourself immediately indoors.
• The rapid expansion of heated air causes the thunder. Since light travels faster than sound, the thunder is heard after the lightning. If you see lightning and hear thunder at the same time, that lightning is in your neighborhood. If you see successive strokes of lightning in the same place on the horizon then you are in line with the storm, and it may be moving toward you.
• Not all lightning forms in the negatively charged area low in the thunderstorm cloud. Some lightning originates in the top of the thunderstorm, the area carrying a large positive charge. Lightning from this area is called positive lightning.
Positive lightning is particularly dangerous, because it frequently strikes away from the rain core, either ahead or behind the thunderstorm. It can strike as far as 5 or 10 miles (8 or 16 kilometers) from the storm, in areas that most people do not consider to be a lightning-risk area.
• During a thunderstorm, each flash of cloud-to-ground lightning is a potential killer. The determining factor on whether a particular flash could be deadly depends on whether a person is in the path of the lightning discharge.
In addition to the visible flash that travels through the air, the current associated with the lightning discharge travels along the ground. Although some victims are struck directly by the main lightning stroke, many victims are struck as the current moves in and along the ground.
• If you can hear thunder, you are within 10 miles (16 kilometers) of a storm—and can be struck by lightning. Seek shelter and avoid situations in which you may be vulnerable.
• Use the 30-30 rule, when visibility is good and there is nothing obstructing your view of the thunderstorm. When you see lightning, count the time until you hear thunder. If that time is 30 seconds or less, the thunderstorm is within six miles (ten kilometers) of you and is dangerous. Seek shelter immediately.
The threat of lightning continues for a much longer period than most people realize. Wait at least 30 minutes after the last clap of thunder before leaving shelter. Don't be fooled by sunshine or blue sky!
• Most lightning deaths and injuries in the United States occur during the summer months, when the combination of lightning and outdoor activities reaches a peak. People involved in activities such as boating, swimming, fishing, bicycling, golfing, jogging, walking, hiking, camping, or working outdoors all need to take the appropriate actions in a timely manner when thunderstorms approach.
• The Fourth of July is historically one of the most deadly times of the year for lightning in the U.S.. In summer, especially on a holiday, more people are outside, on the beach, golf course, mountains, or ball fields. Outdoor jobs such as construction and agriculture, and outdoor chores such as lawn mowing or house painting are at their peak, putting people involved in danger.
Where organized sports activities take place, coaches, umpires, referees, or camp counselors must protect the safety of the participants by stopping the activities sooner, so that the participants and spectators can get to a safe place before the lightning threat becomes significant.
• People on or in or near water are among those most at risk during thunderstorms.Swimming is particularly dangerous, as not only do swimmers protrude from the water, presenting a potential channel for electrical discharge, but also because water is a good conductor of electricity.
• Inside homes, people must also avoid activities which put their lives at risk from a possible lightning strike. As with the outdoor activities, these activities should be avoided before, during, and after storms.
In particular, people should stay away from windows and doors and avoid contact with anything that conducts electricity, including landline telephones. Most people hurt by lightning while inside their homes are talking on the telephone at the time.
• People may also want to take certain actions well before the storm to protect property within their homes, such as electronic equipment. Surge protectors do not protect against direct lightning strikes. Unplug equipment such as computers and televisions.
• If a person is struck by lightning, medical care may be needed immediately to save the person's life. Cardiac arrest and irregularities, burns, and nerve damage are common in cases where people are struck by lightning. However, with proper treatment, including CPR if necessary, most victims survive a lightning strike,although the long-term effects on their lives and the lives of family members can be devastating.
• A house or other substantial building offers the best protection from lightning. For a shelter to provide protection from lightning, it must contain a mechanism for conducting the electrical current from the point of contact to the ground. These mechanisms may be on the outside of the structure, may be contained within the walls of the structure, or may be a combination of the two.
On the outside, lightning can travel along the outer shell of the building or may follow metal gutters and downspouts to the ground. Inside a structure, lightning can follow conductors such as the electrical wiring, plumbing, and telephone lines to the ground.
• Unless specifically designed to be lightning safe, small structures do little, if anything, to protect occupants from lightning. Many small open shelters on athletic fields, on golf courses, in parks, at roadside picnic areas, in school yards, and elsewhere are designed to protect people from rain and sun, but not lightning.
A shelter that does not contain plumbing or wiring throughout or some other mechanism for grounding from the roof to ground is not safe. Small wooden, vinyl, or metal sheds offer little or no protection from lightning and should be avoided during thunderstorms.
• There are three main ways lightning enters homes and buildings: a direct strike, through wires or pipes that extend outside the structure and into the ground. Regardless of the method of entrance, once in a structure, the lightning can travel through the electrical, phone, plumbing, and radio or television reception systems. Lightning can also travel through any metal wires or bars in concrete walls or flooring.
• Phone use is the leading cause of indoor lightning injuries in the United States. Lightning can travel long distances in both phone and electrical wires, particularly in rural areas.
Do not lie on the concrete floor of a garage as it likely contains a wire mesh. In general, basements are a safe place to go during thunderstorms. However, avoid contact with concrete walls, which may contain metal reinforcing bars.
Avoid washers and dryers, since they not only have contacts with the plumbing and electrical systems but also contain an electrical path to the outside through the dryer vent.
Avoid contact with electrical equipment or cords. If you plan to unplug any electronic equipment, do so well before the storm arrives.
Avoid contact with plumbing. Do not wash your hands, do not take a shower, do not wash dishes, and do not do laundry.
• Victims of lightning do not retain the charge and are not "electrified." It is safe to help them.
• Rubber shoes will not give you any meaningful protection from lightning.
• Lightning can—and often does—strike in the same place twice. Tall buildings and monuments are frequently hit by lightning.
• A motor car with a metal top can offer you some protection—but keep your hands from the metal sides.
• An umbrella can increase your chances of being struck by lightning if it makes you the tallest object in the area.
• Always avoid being the highest object anywhere—or taking shelter near or under the highest object, including tall trees. Avoid being near a lightning rod or standing near metal objects such as a fence or underground pipes...LINES TELECOM
Tuesday, July 5, 2016
Ways to block UNWANTED Calls..LINESTELECOM
Ways to block unwanted calls from your home phone
There are several ways you can control who gets through to your home phone. You can use one of our calling features to block incoming calls. Change your directory listing so it's more difficult for unwanted callers to find you. If you're getting harassing or threatening calls, you can identify who's calling and then work with local law enforcement. Or, if you're specifically having problems with telemarketing calls, you can add your phone number to the National Do Not Call Registry.
Popular call-blocking tools
You can use calling features to block all incoming calls, certain types of calls or specific phone numbers. Anonymous Call Rejection and Call Rejection are two of our most popular call-blocking features.
Anonymous Call Rejection
Use Anonymous Call Rejection to stop calls from ANONYMOUS and PRIVATE numbers. For instance, if a sales guy calls you from a blocked number, he hears:
The party you are calling does not accept blocked calls. If you are calling from a blocked number, please hang up, pick up the receiver, press *87 and redial the phone number. When you do this, your name and number will appear for this call only.
In many areas Anonymous Call Rejection comes with Caller ID. In some areas, you need to order it separately. Either way, when it's initially installed, it's turned OFF, so you need to turn it ON.
This calling feature only stops ANONYMOUS and PRIVATE calls. Because they lack the necessary data, OUT OF AREA, UNAVAILABLE, UNKNOWN or NOT PROVIDED calls cannot be blocked.
Call Rejection
Use Call Rejection when you want to block specific phone numbers. To do this, you create a list of the phone numbers that you want to reject. Then, anyone calling from a number on your list can't get through.
For instance, you might use Call Rejection if an old boyfriend (or girlfriend) won't take the hint, a market research company has you on their speed dial or a political campaign thinks you're the Bank of Big Bucks. In these cases, you add the offending phone numbers to your "rejection list." Then, when someone calls from a number on that list, he/she hears a message saying you're not accepting calls.
Calls from numbers not on your list ring through to your home as usual.
You must order Call Rejection and have it added to your account. When it's initially installed, it's turned OFF, so you need to turn it ON.
With Call Rejection, you can block more than 10 numbers. If you need to block additional numbers (up to 25), Enhanced Call Rejection is available in some areas.
If neither of these calling features sound like they're going to do what you need done, we haveother calling features available that may block the particular calls that you don't want getting through.
More call-stopping ideas
Directory listing service
Sometimes limiting where, and how, your telephone number is published can make a world of difference. There are several ways for you to control how your name and number are shared.
You can request:
- To have your name removed, at no charge, from lists that we may provide to other companies for marketing purposes. (Non-listed and non-published numbers are automatically excluded from these lists.)
- A non-listed (semi-private) listing. In this case, your name, address and phone number aren.t included in the printed telephone directory, but your name and telephone number are available through Directory Assistance.
- A non-published (private) listing. With this type of listing, your name, address and phone number don't appear in the printed telephone directory and aren't available through Directory Assistance.
Harassment prevention
Telephone harassment is a crime. If you receive threatening or obscene phone calls, you cantrace who's calling you.
Call Trace is already installed on your line. You don't have to order it or have it installed, and you're only charged when you successfully complete a trace. (Note: This feature is available in most areas. However, if you attempt a trace and hear a fast-busy tone instead of recorded instructions, it's probably not offered in your area.)
After 3 successful traces, contact the CenturyLink Annoyance Call Bureau at 800-582-0655 for help resolving the problem. Or, if the situation is rapidly escalating and you feel your wellbeing is at risk, contact your local law enforcement agency for assistance.
If you're having problems blocking certain numbers, try these troubleshooting tips. If you have questions or would like to change or add calling features to your account, chat with us. We're here to help!
National Do Not Call RegistryThe National Do Not Call Registry (aka the "Do Not Call" list) is managed by the Federal Trade Commission and is meant to give people a way to stop relentless phone solicitors and telemarketers.If you would like to block unwanted calls to your (home or mobile) phone, adding your number(s) to the Do Not Call list is a good thing to do. It's a free service, and once your number has been on the list for at least 31 days, telemarketers are supposed to stop calling you. If they don't, you can file a complaint.Of course, the government recognizes that some business calls are legitimate so even if your number's on the list, you may occasionally still receive calls you don't entirely want. For example, you may get calls from political organizations, charities and telephone surveyors.You may also receive calls from companies that you've purchased from within the last 18 months or from companies that you've given written permission to. (Be extra careful to read the fine print in agreements you sign.)Did you know? If you ask a company to place your phone number on its internal do-not-call list, it must honor your request. (Of course, it's always a good idea to keep a record of the date you made the request. Just in case the company doesn't do as they should and you need to file a complaint.) for more google search "linestelecom"
Friday, June 17, 2016
BSNL - FTTH - Overview
Fibre to the Home (FTTH) is a unique technology being deployed by BSNL for the first time in India. The fibre connectivity having unlimited bandwidth and state of the art technology provides fix access platform to deliver the high speed broadband from 256 Kbps to 100 Mbps, IPTV having different type of contents like HDTV and future coming 3D TV and range of voice telephony services. It provides a comprehensive solution for the IP leased line, internet, Closed User Group (CUG), MPLS-VPN, VoIP, video conferencing, video calls etc whatever the services available on the internet platform, bandwidth on demand can be delivered by this connectivity to the without changing the access fibre and home device. Customer will get a CPE called Home Optical Network Termination (HONT) consist of 4X100 Mpbs Ethernet ports and 2 normal telephone ports. Each 100 Mbps ports will provide broadband, IPTVs, IP Video call and leased line etc as required by the customers. Customer will get power back unit having full load backup of four hours and normal backup of three days. This power backup will be AC input and connecting to the HONT on 12V DC.
Connectivity via FTTH:
BSNL will extend fibre from its nearest Central Office (CO) location directly or through franchisee and install HONT and battery backup at the customers identified locations. The services such as Voice, Broadband, IPTV etc. will be enabled as per the customer”s request plans for the same. 
The services over FTTH:
Basic internet Access Service controlled and uncontrolled from 256Kbps to 1000Mbps. - TV over IP Service (MPEG2).
- Video on Demand (VoD)(MPEG4) play like VCR
- Audio on Demand Service
- Bandwidth on Demand (User and or service configurable)
- Remote Education
- Point to Point and Point to Multi Point Video Conferencing, virtual classroom
- Voice and Video Telephony over IP: Connection under control of centrally located soft switches
- Interactive Gaming
- VPN on broadband
- Dial up VPN Service
- Virtual Private LAN Service (VPLS)..LINES TELECOM
Tuesday, May 24, 2016
protect your cordless phones / anil kumar lines
linestelecom/ india...whatsapp 00 91 9387648171
This article will educate you on how you can protect yourself from people who, for some reason, want to eavesdrop on your conversations by way of your cordless phone. Now, it's best to remind you that eavesdropping on other people's phone conversations is punishable by law. It's absolutely illegal! That's true in most countries of the world. I'll be blunt—don't attempt it. Don't even think about it. (Like you need telling!)
Old and reliable land line is still alive and dandy, in spite of all of the unlimited minute cellphone plans available today. Most homes still choose to cling to the old standard home phone land line. Most likely as a backup, or for longer conversations, and for a more reliable signal.
Several decades ago, cordless phones are a luxury, but, now, have become a necessity for most of us who use land lines, but who also want the freedom to move around while having conversations. The 21st century man have become so accustomed to the wireless lifestyle of this generation that the thought of using phones with cords seems, now, only fitted to the Flintstones!
No doubt about it cordless phone technology has advanced and have made leaps and bounds in the past years. Earlier models used primitive AM radio-based systems with almost no security features, now, these gadgets are equipped with digital systems with built-in encryption tech to prevent prying ears.
Is your cordless phone secure? If it is, how secure is it?
Can someone easily listen in on your cordless phone conversations? Or how easy is it for anyone to do this? The intelligent answer to this question depends on what technology your phone is using. If it's analog, then your calls can be easily intercepted. Newer phones use digital technology which utilizes 'Digital Spread Spectrum' (DSS) or DECT. Unless your phone specifies this, then your phone is analog.
While it's true that cordless phone models with analog tech are the most vulnerable to prying ears, digital phones are not completely protected from third intruders listening in.
Research about security and phone hackers have managed to hack some implementations of DECT communications standard being used by most cordless phone makers. Unfortunately, DECT which was thought of as a quite secure system has lost it's glory when hackers were able to crack the encryption implementation being utilized by a number of cordless phone makers.
Hackers usually use software applications and specialized hardware to listen to conversations on cordless DECT-based phones. The tool they use is an open source device specially made for auditors and security researchers and included in legitimate security tool suites such as the BackTrack Linux-live security distribution. The hacking software, combined with hard to find and specialized DECT-capable wireless network cards, or sometimes universal software radios are perfect for intercepting and decoding conversations on certain models of vulnerable DECT-based cordless phones.
The DECT standard is now evolving the standard to improve security measures, but improvements take a little time to apply and make them available to the commercial market.
Guard against cordless phone hackers
Casual hackers or script kids can't just pursue DECT hacking. They can't use the tools without extremely specialized radio hardware. The radio hardware required to intercept DECT traffic is not cheap and is hard to locate and the new universal software radios available and capable intercepting DECT calls can be on the high end with regards prices.
Unless you're a immensely high value target that is guarding classified info or top secret files then the risk of hackers listening in on your calls using DECT-based cordless phone is most probably low. An illegal eavesdropper must find a way to be get close to your location to pick up a signal.
Are you worried about nosy neighbors listening in on your calls? Then you must upgrade your grandma's old cordless phone (most probably analog) to digitally based designed phone. This will prevent most incidental crosstalk eavesdroppers.
If you are super paranoid about someone listening to your calls, then you may want to use either a corded phone (yes, they are still existing) or encrypted VOIP services. Kryptos is highly recommended.
Now, let's look at the bottom line. As long as you are using a digital cordless phone manufactured in the past few years, hackers and other eavesdropping toms being able to listen to your calls are quite slim. Given the scarcity of the hardware required they are also expensive. Hackers are more predisposed to try hacking your voicemail, rather than listen to your calls..The content of this article not applicable in some states only/ anil kumar lines/ linestelecom
laser in communication / anil kumar lines
google search:linestelecom/Optical fibers can be used to transmit light and thus information over long ditelestances. Fiber-based systems have largely replaced radio transmitter systems for long-haul optical data transmission. They are widely used for telephony, but also for Internet traffic, long high-speed local area networks (LANs), cable TV (CATV), and increasingly also for shorter distances within buildings. In most cases, silica fibers are used, except for very short distances, where plastic optical fibers can be advantageous.Compared with systems based on electrical cables, the approach of optical fiber communications (lightwave communications) has advantages, the most important of which are:See also our useful tutorial "Passive Fiber Optics"! This explains many aspects of fiber optics using interesting simulations.
- The capacity of fibers for data transmission is huge: a single silica fiber can carry hundreds of thousands of telephone channels, utilizing only a small part of the theoretical capacity. In the last 30 years, the progress concerning transmission capacities of fiber links has been significantly faster than e.g. the progress in the speed or storage capacity of computers.
- The losses for light propagating in fibers are amazingly small: ≈ 0.2 dB/km for modern single-mode silica fibers, so that many tens of kilometers can be bridged without amplifying the signals.
- A large number of channels can be reamplified in a single fiber amplifier, if required for very large transmission distances.
- Due to the huge transmission rate achievable, the cost per transported bit can be extremely low.
- Compared with electrical cables, fiber-optic cables are very lightweight.
- Fiber-optic cables are immune to problems that arise with electrical cables, such as ground loops or electromagnetic interference (EMI). Such issues are important, for example, for data links in industrial environments.
Mostly due to their very high data transmission capacity, fiber-optic transmission systems can achieve a much lower cost than systems based on coaxial copper cables, if high data rates are needed. For low data rates, where their full transmission capacity cannot be utilized, fiber-optic systems may have less of an economic advantage, or may even be more expensive (not due to the fibers, but the additional transceivers). The primary reason, however, for the still widespread use of copper cables for the “last mile” (the connection to the homes and offices) is simply that copper cables are already laid out, whereas new digging operations would be required to lay down additional fiber cables.Fiber communications are already extensively used within metropolitan areas (metro fiber links), and even fiber to the home (FTTH) spreads more and more – particularly in Japan, where private Internet users can already obtain affordable Internet connections with data rates of 100 Mbit/s – well above the performance of current ADSL systems, which use electrical telephone lines. In other countries, one often tries to squeeze out higher transmission capacities from existing copper cables, e.g. with the technique of vectoring, in order to avoid the cost of laying down fiber cables to the premises. This, however, is more and more seen only as a temporary solution, which cannot satisfy further growth of bandwidth demand.− Telecom Windows
Optical fiber communications typically operate in a wavelength region corresponding to one of the following “telecom windows”:
- The first window at 800–900 nm was originally used. GaAs/AlGaAs-based laser diodes and light-emitting diodes (LEDs) served as transmitters, and silicon photodiodes were suitable for the receivers. However, the fiber losses are relatively high in this region, andfiber amplifiers are not well developed for this spectral region. Therefore, the first telecom window is suitable only for short-distance transmission.
- The second telecom window utilizes wavelengths around 1.3 μm, where the loss of silica fibers is much lower and the fibers' chromatic dispersion is very weak, so that dispersive broadening is minimized. This window was originally used for long-haul transmission. However, fiber amplifiers for 1.3 μm (based on, e.g. on praseodymium-doped glass) are not as good as their 1.5-μm counterparts based on erbium. Also, low dispersion is not necessarily ideal for long-haul transmission, as it can increase the effect of optical nonlinearities.
- The third telecom window, which is now very widely used, utilizes wavelengths around 1.5 μm. The losses of silica fibers are lowest in this region, and erbium-doped fiber amplifiers are available which offer very high performance. Fiber dispersion is usually anomalous but can be tailored with great flexibility (→ dispersion-shifted fibers).
The second and third telecom windows are further subdivided into the following wavelength bands:
Band Description Wavelength range O band original 1260–1360 nm E band extended 1360–1460 nm S band short wavelengths 1460–1530 nm C band conventional (“erbium window”) 1530–1565 nm L band long wavelengths 1565–1625 nm U band ultralong wavelengths 1625–1675 nm The second and third telecom windows were originally separated by a pronounced loss peak around 1.4 μm, but they can effectively be joined with advanced fibers with low OH content which do not exhibit this peak...linestelecom@gmail.com
optical/ fibre optic receivers
google search "LINESTELECOM"
The main component of an optical receiver is a photodetector, which converts light into electricity using the photoelectric effect. The primary photodetectors for telecommunications are made from Indium gallium arsenide The photodetector is typically a semiconductor-based photodiode. Several types of photodiodes include p-n photodiodes, p-i-n photodiodes, and avalanche photodiodes. Metal-semiconductor-metal (MSM) photodetectors are also used due to their suitability for circuit integration inregenerators and wavelength-division multiplexers.
Optical-electrical converters are typically coupled with a transimpedance amplifier and a limiting amplifier to produce a digital signal in the electrical domain from the incoming optical signal, which may be attenuated and distorted while passing through the channel. Further signal processing such as clock recovery from data (CDR) performed by aphase-locked loop may also be applied before the data is passed on.
Fiber cable types
Main articles: Optical fiber and Optical fiber cable
An optical fiber cable consists of a core, cladding, and a buffer (a protective outer coating), in which the cladding guides the light along the core by using the method of total internal reflection. The core and the cladding (which has a lower-refractive-index) are usually made of high-quality silica glass, although they can both be made of plastic as well. Connecting two optical fibers is done by fusion splicing or mechanical splicing and requires special skills and interconnection technology due to the microscopic precision required to align the fiber cores.[9]
Two main types of optical fiber used in optic communications include multi-mode optical fibers and single-mode optical fibers. A multi-mode optical fiber has a larger core (≥ 50 micrometers), allowing less precise, cheaper transmitters and receivers to connect to it as well as cheaper connectors. However, a multi-mode fiber introduces multimode distortion, which often limits the bandwidth and length of the link. Furthermore, because of its higher dopant content, multi-mode fibers are usually expensive and exhibit higher attenuation. The core of a single-mode fiber is smaller (<10 allows="" and="" but="" components="" expensive="" higher-performance="" interconnection="" links.="" longer="" methods="" micrometers="" more="" much="" p="" requires="">
In order to package fiber into a commercially viable product, it typically is protectively coated by using ultraviolet (UV), light-cured acrylate polymers, then terminated with optical fiber connectors, and finally assembled into a cable. After that, it can be laid in the ground and then run through the walls of a building and deployed aerially in a manner similar to copper cables. These fibers require less maintenance than common twisted pair wires, once they are deployed.[10]
Specialized cables are used for long distance subsea data transmission, e.g. transatlantic communications cable. New (2011–2013) cables operated by commercial enterprises (Emerald Atlantis, Hibernia Atlantic) typically have four strands of fiber and cross the Atlantic (NYC-London) in 60-70ms. Cost of each such cable was about $300M in 2011. source: The Chronicle Herald.
Another common practice is to bundle many fiber optic strands within long-distance power transmission cable. This exploits power transmission rights of way effectively, ensures a power company can own and control the fiber required to monitor its own devices and lines, is effectively immune to tampering, and simplifies the deployment of smart grid technology.,..anil kumar lines
10>
Subscribe to:
Posts (Atom)