elliot, b (2002) fiber optic cabling (2nd ed )

elliot, b. (2002). fiber optic cabling (2nd ed.)

elliot, b. (2002). fiber optic cabling (2nd ed.)

... reader to establish the validity of a proposed fiber optic cabling installation as an operating system based upon its bandwidth (or data capacity). Basic fiber parameters Optical fiber transmission ... established as the preferred medium for building backbone and campus cabling applications; indeed it is now the only media that could transport multi-gigabit traffic. Fiber optic...
Ngày tải lên : 18/04/2014, 12:28
  • 334
  • 518
  • 0
Tài liệu Fiber Optic CABLING SYSTEMS pptx

Tài liệu Fiber Optic CABLING SYSTEMS pptx

... cut and abrasion resistance ■ Available with 4–24 fibers ■ Excellent flame retardancy (UL Listed OFNR/OFCR) ■ UV stable jacket ■ Flexible design/easy to install ■ Color-coded buffered fibers ■ All ... (EIA-FOTP-33A): 1000 Newtons 1800 Newtons (224 lbs .) (403 lbs .) Maximum Safe Operating Load: 600 Newtons 1000 Newtons (134 lbs .) (224 lbs .) Minimum Bend Radius: At Max. Load: 2...
Ngày tải lên : 11/12/2013, 13:15
  • 2
  • 262
  • 0
decusatis, c. (2002). handbook of fiber optic data communication (2nd ed.)

decusatis, c. (2002). handbook of fiber optic data communication (2nd ed.)

... match-cladding single-mode fibers, (d, e) depressed-cladding, single- mode fibers, (f-h) dispersion-shifted fibers, and (i, j) dispersion-flattened fibers. Reprinted from Ref. [2], p. 125, ... (arcsin (g) - arcsin ( +)) I Cm#Ol V2 B - 1 4 (B - 1)( 7B - 3 1) u -A 8A 3(8A)3 c- . B = 4(C - l)2. The graphs in Fig. 1.4 were generated using Eqs. (1...
Ngày tải lên : 18/04/2014, 10:57
  • 854
  • 375
  • 0
Quantum mechanics   symmetries 2nd ed    w  greiner, b  muller

Quantum mechanics symmetries 2nd ed w greiner, b muller

... class="bi x0 y0 w1 h1" alt=""
Ngày tải lên : 17/03/2014, 14:43
  • 505
  • 315
  • 0
applied cryptography 2nd ed. -  b. schneier

applied cryptography 2nd ed. - b. schneier

... Arms Regulations (ITAR). This viewpoint turned out not even to be supported by the regulations themselves—which contained an explicit exemption for published material—but gave both the public practice ... algorithms is based in the key (or keys); none is based in the details of the algorithm. This means that the algorithm can be published and analyzed. Products using the algorithm can be mass...
Ngày tải lên : 31/03/2014, 15:54
  • 1K
  • 272
  • 0
maxfield, c. (2002). bebop to the boolean boogie (2nd ed.)

maxfield, c. (2002). bebop to the boolean boogie (2nd ed.)

... these humble beginnings, Boole established a new mathematical field known as symbolic logic, in which the logical relationship between propositions can be represented1 symbolically by such ... Maximus Unleashed (Banned in Alabama) and co-author of Bebop BYTES (An Unconventional Guide to Computers). to as an “industry notable” and a “semiconductor design expert” by someone...
Ngày tải lên : 18/04/2014, 11:07
  • 506
  • 443
  • 0
crisp, j. (2001). introduction to fiber optics (2nd ed.)

crisp, j. (2001). introduction to fiber optics (2nd ed.)

... called: (a) a fiber optic (b) a flashlight (c) an optic fiber (d) a xenon bulb 2 A simple fiber optic system would consist of: (a) a light source, an optic fiber and a photo-electric cell (b) a ... fiber is therefore used in a fiber optic system. ᭟ ᭟ fiber is a friendly abbreviation for either, so we could say that fiber is used in a fiber system. Optic fiber...
Ngày tải lên : 18/04/2014, 12:28
  • 238
  • 3.2K
  • 0
theodoridis, s. (2002). pattern recognition (2nd ed.)

theodoridis, s. (2002). pattern recognition (2nd ed.)

... algebra, and some probability theory basics. Anumber of mathe- matical tools, such as probability and statistics as well as constrained optimization. needed by various chapters, are treated ... become probabilities and will be denoted We now have all the ingredients to compute our conditional probabilities, as stated in the introduction. To this end, let us recall from our probability .....
Ngày tải lên : 18/04/2014, 12:33
  • 710
  • 537
  • 0
Firewalls 24 Seven 2nd Ed

Firewalls 24 Seven 2nd Ed

... service, if installed) RPC Locator Service (Windows NT only) NetBIOS Name Service (WINS servers only) NetBIOS Session Service (Windows network and SMB/CIFS servers only) LPR is used by the TCP/IP ... could be redirected using ICMP after establishment, especially if it's not encrypted. 16 • A hacker who monitored the establishment might be able to spoof the address of the authorized clien...
Ngày tải lên : 10/09/2012, 14:56
  • 411
  • 567
  • 3

Xem thêm

Từ khóa: