Attend IT Limited Blog

Getting to Know Technology: Fiber Optics

Getting to Know Technology: Fiber Optics

As hokey as it sounds, the Internet almost transcends other pieces of technology. While estimating the economic impact of the Internet is a formidable feat, Cisco came up with 19 trillion dollars - 21 percent of all the money in the world. So, with access to a resource this valuable, it’s silly not to make the most of it.

Fiber optic cabling can help everyone to do so. A type of network cable, fiber optic cables contain tiny strands of glass fibers, each wrapped in an insulated casing. These fibers, not much thicker than a human hair, transmit data by providing a pathway for it to travel through. These signals are maintained by the light being reflected by the cladding - a layer of glass that surrounds the core to insulate it.

As you may imagine, this is a very efficient way to transmit data - light is famous for being fast, after all. Furthermore, fiber optic cables can support a higher bandwidth as well as keep transmitted data more stable over longer distances. Now, a lot of the infrastructure that we use every day is supported by fiber optic cabling - including a lot of the Internet, telephone systems, and cable television.

The benefits of using fiber optic cabling include:

  • Higher Data Capacities - A fiber optic cable is capable of carrying far more data than copper cables could. Fiber cables can transmit 10 Gbps, 40 Gbps, and 100 Gbps.
  • Longer Distance - Light can go much further without losing its strength, eliminating the need for as many signal boosters.
  • Less Interference - By its nature, copper cabling is susceptible to external electromagnetic interference, and the shielding that is implemented to prevent this interference isn’t always effective. Fiber optic cable isn’t susceptible, and so interference of this kind isn’t a problem.

This makes fiber-optic cabling the preferred choice for long-distance connections, but some Internet providers use it for direct access for customers. Here are the ways these cables are deployed:

  • Fiber to the Premises (FTTP) - Fiber used to deliver media services to residential buildings.
  • Fiber to the Building/Block/Premises (FTTB) - This is fiber optic cables used to support commercial buildings.
  • Fiber to the Curb of a Node (FTTC/N) - This cable is connected to a node, which then uses copper cables to connect to customers.
  • Direct fiber - The is fiber optic cable that runs directly from the central hub to the customer, which costs a pretty penny.
  • Shared fiber - Essentially the same as direct fiber, but split to serve multiple customers.

While it is possible to get a fiber optic connection to your business, it is extremely expensive to do - prohibitively expensive, in fact. With the costs that it comes with, it may only become an option if your provider is actively rolling out a new infrastructure.

To learn more about the technology that powers today’s businesses, and how you can put it to use for you, keep reading our blog!

Automation Plays a Critical Role in Cybersecurity
Windows 7 Support is Coming to an End


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, January 27 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Network Security Technology Business Computing Tip of the Week Best Practices Cloud Managed IT Services Hosted Solutions Privacy Disaster Recovery Malware Hackers Data Recovery Data Backup communications Outsourced IT Data Business Innovation Productivity Backup Productivity IT Services Cloud Computing Email IT Support Cybersecurity Software VoIP Small Business Mobile Devices Computer Business Continuity Internet of Things Saving Money Upgrade Internet Microsoft Efficiency Business Management Managed IT Automation IT Support Information Technology Managed IT services BDR Mobile Device Management Smartphone Hardware Server Mobility Phishing Risk Management Budget Windows 7 Collaboration Artificial Intelligence BYOD Avoiding Downtime Save Money Virtual Private Network Data Management Ransomware Password User Tips Spam Compliance Managed Service Provider History Quick Tips Hosted Solution Firewall Remote Computing Cost Management Network Hybrid Cloud Hard Drives Conferencing Value Communication Audit Passwords Business Technology Workplace Tips Remote Workers Solid State Drive MSP Data Breach Recovery Saving Time Automobile Gadgets Printing Data Security Windows 10 Redundancy Personal Information Computers Tech Term Android Networking Document Management Telephone Systems Router Smartphones IT Service Paperless Office Manufacturing Content Filtering Managed Service Devices Lifestyle The Internet of Things Cybersecurty Travel Encryption Electronic Medical Records Management Printers iPhone Computer Repair Students Utility Computing Windows 10 Cybercrime SMB Active Directory Virtualization Smart Tech Vendor Windows Server 2008 Project Management Commerce Facebook Development Operating System Break/Fix Window 10 Software as a Service Spyware Browser IoT Telephony Downtime Financial Technology Upgrades Unified Communications Advertising Windows Server Shadow IT Big Data Social Engineering Connectivity Employee-Employer Relationship Business Intelligence Employees Update Help Desk WPA3 Online Storage Apple Marketing Antivirus Wasting Money Dark Web E-Commerce Legal Remote Monitoring Human Resources Instant Messaging Evernote Streaming Media App Copiers intranet Wireless Internet Administration File Storage Customer Relationship Management User Error Wireless Technology Holiday Computing Amazon Payment Cards Word Education Cleaning VPN Work/Life Balance Employer-Employee Relationship Payroll Vulnerability Regulation Machine Learning Mobile Transportation Content Filter SaaS Managed IT Service Voiceover Internet Protocol Gamification Colocation Phone System Microsoft Office Bandwidth Mobile Device OneNote Government Voice over Internet Protocol Data Loss Hacking Google Money Entertainment Samsung Proactive IT Private Cloud Analysis Virtual Assistant Nanotechnology Application Social Media Data Protection Office 365 Mobile Computing Applications Black Market Professional Services Workers Disaster Going Green Monitoring Business Telephone Hacker Azure Chromebook Meetings e-waste Fiber Optics Save Time Smart Technology End of Support Flexibility Mobile Office Proactive HIPAA Training Alexa for Business Backup and Disaster Recovery Two-factor Authentication Identities Wi-Fi Computer Accessories Alert Text Messaging Updates Unified Threat Management Screen Mirroring Video Games Smartwatch Windows 10s Outlook Adobe Wireless Charging Analytics Settings Reputation YouTube Microsoft Excel Scalability Websites Company Culture Mobile Security Information Augmented Reality Point of Sale Gmail Wasting Time Server Maintenance Inventory Legislation Computer Fan Office Tips Myths Tablets Microsoft Word Safety Robot Cast Health Keyboard Shortcuts Hard Disk Drive Shortcut WannaCry Business Strategy Holidays File Sharing Identity Theft Office Internet Exlporer Gifts Data Theft Politics Charger Identity HaaS 5G Tech Support PowerPoint Accessory Investment Communitications Comparison Language Vendor Management Threats NFL Maintenance Managing Stress Emergency Display Consultant Windows Worker Commute Scam Miscellaneous Excel Security Cameras Processor Licensing USB Books Testing Social OneDrive Storage Peripheral Emails IT Solutions Humor Micrsosoft Experience Data Privacy Television CrashOverride Medical IT Fraud ROI Hosted Desktop Specifications Computer Care Scams eWaste Users Google Assistant Co-Managed Services HBO Search Financial PDF Best Practice Benchmarks Virtual Reality Camera Wireless Sabotage Sports IT budget Access Control Webinar WIndows Server 2008 How To Digital Signage Credit Cards Hard Drive eCommerce Edge Windows Server 2008 R2 Smart Devices Sales Virus Unsupported Software Employee Managed Services Provider Windows Ink Device Security Worker Twitter Telephone Touchscreen Cortana Blockchain Bring Your Own Device iOS Sync Apps Projects WiFi Data Storage Relocation PC Google Drive Memory Admin IT solutions Patch Management Current Events FAQ Music Law Enforcement Google Docs Ciminal Retail App store Root Cause Analysis Facebook Privacy Google Maps Battery Chrome Computer Forensics Hyperlink IT Management