094 90 48200    Get SUPPORT

Aniar IT Services Blog

Know Your Tech: Fiber Optics

Know Your Tech: Fiber Optics

The Internet is more than a piece of technology, it fuels huge swaths of the modern world. The economic benefits of the Internet are hard to estimate, but Cisco has tried, giving it a $19 trillion valuation, or about 21 percent of the total amount of money that is currently available in the world. So, if you have a resource that is valued at almost a quarter of humanity’s total monetary worth, you try to maximize the use of it.

Fiber optic cable is a network cable that contains small strains of glass fiber. Those glass strains are covered by an insulated casing. They transmit data through light. They are often not much thicker than a human hair. They are made up of the core, which is the pathway for light to travel. The core is surrounded by a layer of glass called cladding that keeps light in via reflection to avoid signal loss and keep transmissions true as the wire bends. 

Since the transmission of light is so fast, data can travel long distances quickly.  These cables provide higher bandwidth and can maintain the integrity of data transmission over long distances. Today, this technology supports much of the world’s Internet, cable television, and telephone systems. Their main benefits include:

  • Higher capacity data - The amount of data that a fiber optic cable can carry exceeds that of traditional copper cable. Fiber cables are rated at 10 Gbps, 40 Gbps, and 100 Gbps. 
  • Longer Distances - Since light travels for much longer distances without losing strength, there is less need for signal boosters. 
  • Less Interference - Copper cables require shielding to protect it from electromagnetic interference, but this shielding doesn’t always work. The physical makeup of fiber optic cables works to avoid this outside interference. 

Most fiber optic cable is installed to run long-distance connections, there are some Internet providers that roll out fiber optics for direct access to customers. They are deployed the following ways:

  • Fiber to the Premises (FTTP) - Fiber that is laid to support the use of media services to residential buildings.
  • Fiber to the Building (FTTB) - Also called Fiber to the Block or Fiber to the Business - This is fiber optic cable that supports commercial buildings.
  • Fiber to the Curb of Node (FTTC/N) - This is fiber cable that is laid to the node, while copper wires complete connections to customers.
  • Direct fiber - Fiber that leaves the central hub and is attached directly to a customer. Some of the most expensive network cabling on the market. 
  • Shared fiber - Much like direct fiber, but at the end it’s split up to other customers. 

Deploying fiber optic cable to your place of business is possible, but it is extraordinarily expensive. Due to the mounting costs associated with it, it may not be an option unless your provider is rolling out new infrastructure. 

If you would like to learn more about the technology your business uses, and what kind of effect it can have on your business, return to our blog regularly. 

Former Trend Micro Employee Sold 68,000 Customer R...
IT and Professional Services: A Strategic Relation...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, August 08 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.aniar.ie/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Productivity Best Practices Cloud Privacy Network Security Innovation User Tips Hosted Solutions Email Workplace Tips Efficiency Internet IT Support Data Google Microsoft Hackers Hardware Software Data Backup Business Data Recovery Communication Small Business Managed IT Services Cloud Computing Cybersecurity Smartphones VoIP Computer Tech Term Malware Communications Collaboration Mobile Devices IT Services Windows 10 Phishing Mobile Device Gadgets Backup Android Users Smartphone Outsourced IT Business Continuity Network Browser Artificial Intelligence Saving Money Internet of Things Miscellaneous Windows Information Disaster Recovery Business Management Managed Service Facebook BDR Server Upgrade Spam Router Chrome Office 365 How To Quick Tips Social Media Automation Passwords Microsoft Office Computers Data Security Applications Data Storage Mobile Office Windows 7 Blockchain BYOD Paperless Office Holiday Apps Word Cybercrime Remote Monitoring Connectivity Settings Money Virtualization Display Encryption Managed IT Human Resources Infrastructure History Networking Staff Mobile Device Management Bandwidth Government Data Breach Vulnerability Remote Work Two-factor Authentication Wi-Fi Operating System Data Protection Patch Management Save Money HIPAA Ransomware Telephone System Vendor Procurement Private Cloud IT Plan OneNote Help Desk Google Docs Sports Machine Learning Access Control Compliance Digital Signage Law Enforcement Big Data Cryptocurrency Telephony Employee/Employer Relationship Website CES Unsupported Software Fraud Software as a Service Scam Training Update Business Intelligence Keyboard Content Management Botnet VPN Spam Blocking Processor Password Bring Your Own Device Virtual Assistant Managed IT services Business Technology Redundancy Voice over Internet Protocol Vendor Management IT Management App Telephone Systems Hard Drive Meetings Health Social Engineering Augmented Reality Avoiding Downtime Office Google Drive Education Managed Services Provider Identity Theft Servers Audit Comparison Unified Threat Management Cables Trend Micro Online Shopping Root Cause Analysis NIST Supply Chain Management Addiction OLED Using Data Credit Cards PDF HVAC Flash SMS Gmail Cast File Sharing ISP Value Workforce Data Management Printer Tip of the week Remote Computing IT Assessment Workers Specifications Batteries PCI DSS Mobile Computing Default App Shopping Evernote Cleaning Trending Managed Services Public Cloud Biometric Security Information Technology HaaS Virtual Machine AI Recycling Devices Cryptomining Computer Fan YouTube Mouse Windows Server 2008 Windows Server 2008 R2 OneDrive Authentication Data loss Google Search Virtual Private Network Policy Smart Office HBO IT Infrastructure Social Network Practices Safe Mode Security Cameras Covid-19 Cache Software Tips Telecommuting Manufacturing Computing Amazon Shortcuts Hypervisor Remote Wireless eWaste Thought Leadership Remote Worker Database Remote Workers FENG Microchip Computer Care Copiers Cortana Alert Save Time Procedure Document Management Camera Outlook Investment Printing Charger Hosted Computing Smartwatch Skype Peripheral Wireless Internet Travel Virtual Reality Professional Services Amazon Web Services Accountants Enterprise Content Management Mobility Going Green Legal Wiring Managed IT Service Search Engine Development Password Manager Nanotechnology Proactive IT Tools Work/Life Balance Solid State Drive FinTech Printers Frequently Asked Questions Recovery ROI Personal Wireless Charging Inventory Start Menu Project Management Quick Tip USB Firewall Cabling Fiber Optics Downtime Password Management Social Sync Multi-Factor Security Saving Time 5G Criminal Twitter Windows 10s Digital Signature Bing WiFi Messaging Business Mangement Smart Tech Screen Mirroring MSP Net Neutrality Millennials Wire Physical Security Apple Entertainment Warranty Excel GDPR Digitize Hacker Google Apps Employer-Employee Relationship Employee Bitcoin The Internet of Things Regulations Electronic Medical Records Budget Customer Relationship Management Financial Competition IP Address Hard Drives Customer Service Search Regulation Domains CrashOverride Windows 10 Company Culture Emergency Public Speaking Managed Service Provider Presentation Managing Stress Lithium-ion battery Hiring/Firing Tech Support Wireless Technology IBM Fun Personal Information Safety Marketing Productivity