Attend IT Limited Blog

By accepting you will be accessing a service provided by a third-party external to https://www.attendit.net/

Getting to Know Technology: Fiber Optics

Getting to Know Technology: Fiber Optics

As hokey as it sounds, the Internet almost transcends other pieces of technology. While estimating the economic impact of the Internet is a formidable feat, Cisco came up with 19 trillion dollars - 21 percent of all the money in the world. So, with access to a resource this valuable, it’s silly not to make the most of it.

Fiber optic cabling can help everyone to do so. A type of network cable, fiber optic cables contain tiny strands of glass fibers, each wrapped in an insulated casing. These fibers, not much thicker than a human hair, transmit data by providing a pathway for it to travel through. These signals are maintained by the light being reflected by the cladding - a layer of glass that surrounds the core to insulate it.

As you may imagine, this is a very efficient way to transmit data - light is famous for being fast, after all. Furthermore, fiber optic cables can support a higher bandwidth as well as keep transmitted data more stable over longer distances. Now, a lot of the infrastructure that we use every day is supported by fiber optic cabling - including a lot of the Internet, telephone systems, and cable television.

The benefits of using fiber optic cabling include:

  • Higher Data Capacities - A fiber optic cable is capable of carrying far more data than copper cables could. Fiber cables can transmit 10 Gbps, 40 Gbps, and 100 Gbps.
  • Longer Distance - Light can go much further without losing its strength, eliminating the need for as many signal boosters.
  • Less Interference - By its nature, copper cabling is susceptible to external electromagnetic interference, and the shielding that is implemented to prevent this interference isn’t always effective. Fiber optic cable isn’t susceptible, and so interference of this kind isn’t a problem.

This makes fiber-optic cabling the preferred choice for long-distance connections, but some Internet providers use it for direct access for customers. Here are the ways these cables are deployed:

  • Fiber to the Premises (FTTP) - Fiber used to deliver media services to residential buildings.
  • Fiber to the Building/Block/Premises (FTTB) - This is fiber optic cables used to support commercial buildings.
  • Fiber to the Curb of a Node (FTTC/N) - This cable is connected to a node, which then uses copper cables to connect to customers.
  • Direct fiber - The is fiber optic cable that runs directly from the central hub to the customer, which costs a pretty penny.
  • Shared fiber - Essentially the same as direct fiber, but split to serve multiple customers.

While it is possible to get a fiber optic connection to your business, it is extremely expensive to do - prohibitively expensive, in fact. With the costs that it comes with, it may only become an option if your provider is actively rolling out a new infrastructure.

To learn more about the technology that powers today’s businesses, and how you can put it to use for you, keep reading our blog!

Automation Plays a Critical Role in Cybersecurity
Windows 7 Support is Coming to an End
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, August 05 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Network Security Business Computing Tip of the Week Cloud Best Practices Productivity Managed IT Services Privacy Disaster Recovery Hosted Solutions communications Business Backup Data Recovery Malware Data Hackers Innovation VoIP Outsourced IT Data Backup Cloud Computing IT Services Small Business Software Productivity Email IT Support Cybersecurity Efficiency Mobile Devices Business Continuity Computer IT Support Internet Upgrade Automation Internet of Things Business Management Saving Money Hardware Managed IT services Server Managed IT Phishing Information Technology Smartphone Microsoft User Tips Mobility Mobile Device Management Collaboration BDR Managed Service Provider BYOD Risk Management Budget Artificial Intelligence Windows 7 Compliance Avoiding Downtime Network Save Money Firewall Passwords Ransomware Smartphones History Cost Management Meetings Gadgets Communication Password Quick Tips Virtual Private Network Data Management Hosted Solution Covid-19 Remote Computing Spam Computers Employer-Employee Relationship Networking Document Management IT Service Recovery Paperless Office Manufacturing Content Filtering Marketing Managed Service Hard Drives Training Devices Wi-Fi Hybrid Cloud Workplace Tips VPN Solid State Drive Conferencing Remote Work Value Audit Google Business Technology Microsoft Office MSP Remote Workers Data Breach Saving Time Personal Information Automobile Data Security Printing Human Resources Windows 10 Wireless Redundancy Tech Term Android Telephone Systems Router Voiceover Internet Protocol Work/Life Balance Payroll Vulnerability Regulation Black Market Machine Learning Mobile Content Filter SaaS Managed IT Service Browser Hacking Gamification Hacker Phone System Outsource IT Bandwidth Mobile Device OneNote Voice over Internet Protocol Data Loss Data Protection End of Support Flexibility Entertainment Samsung Time Management Analysis Virtual Assistant Nanotechnology Social Engineering Application iPhone Business Telephone Office 365 Professional Services Workers Disaster Monitoring Save Time Smart Technology Windows 10 Cybercrime Azure Chromebook e-waste Fiber Optics Facebook Mobile Office Proactive HIPAA Workstations Alexa for Business Operating System Backup and Disaster Recovery Two-factor Authentication Computer Repair Lifestyle The Internet of Things Cybersecurty Travel Encryption Electronic Medical Records Printer Management Printers Project Management Students Utility Computing Advertising SMB Active Directory Virtualization Smart Tech Vendor Users Windows Server 2008 Commerce Update Development Transportation Break/Fix Window 10 Software as a Service Spyware Upgrades Legal IoT Telephony Downtime PCI DSS Financial Technology Employees Office Unified Communications Proactive IT Private Cloud Instant Messaging Windows Server Shadow IT Big Data Connectivity Employee-Employer Relationship Business Intelligence Social Media Mobile Computing Applications Administration Help Desk WPA3 Going Green Online Storage Apple Wireless Technology Antivirus Wasting Money Dark Web E-Commerce Regulations Compliance Copiers intranet Remote Monitoring Evernote Streaming Media App Wireless Internet Colocation Video Conferencing File Storage Government Customer Relationship Management User Error Money Holiday AI Computing Amazon Payment Cards Word Education Cleaning Managed Services Relocation Sabotage Sports IT budget Financial Apps Benchmarks Virtual Reality Audits Camera Edge Access Control Webinar WIndows Server 2008 Current Events Digital Signage Credit Cards Hard Drive Robot Law Enforcement eCommerce Twitter Telephone Touchscreen Windows Server 2008 R2 Smart Devices Sales Virus Unsupported Software Employee Managed Services Provider Windows Ink Device Security Worker Policy Video Games PC Cortana Blockchain Bring Your Own Device iOS Sync Text Messaging Solutions Projects WiFi Data Storage Google Docs Ciminal Memory Admin IT solutions Patch Management FAQ Music Internet Service Provider Reputation Procedure Computer Forensics Hyperlink IT Management Miscellaneous Scalability Troubleshooting Retail App store Root Cause Analysis Facebook Privacy Google Maps Battery Screen Mirroring Health Smartwatch Identities Computer Accessories Office Tips Updates Unified Threat Management Microsoft Excel Windows 10s Outlook Adobe Wireless Charging Analytics Settings YouTube Organization Gmail Wasting Time Internet Exlporer CRM Websites Company Culture Mobile Security Information Augmented Reality HaaS Point of Sale Cast Windows Server Maintenance Inventory Legislation Computer Fan Myths Tablets Microsoft Word Safety Holidays File Sharing Identity Theft Keyboard Shortcuts Hard Disk Drive Shortcut WannaCry Workstation Business Strategy Social PowerPoint Accessory Humor Keyboard Gifts Data Theft Politics Charger Net Neutrality Identity 5G Tech Support Consultant Google Drive Search Investment Communitications Comparison Language Vendor Management Threats NFL Maintenance Managing Stress Emergency Display OneDrive Storage Worker Commute Scam Excel PDF Best Practice Security Cameras Processor Licensing USB Books Telework Testing Chrome Peripheral Emails IT Solutions Alert How To Micrsosoft Experience Data Privacy Television CrashOverride Medical IT Fraud Google Assistant Co-Managed Services HBO ROI Hosted Desktop Specifications Computer Care Scams eWaste