Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Know Your Tech: Fiber Optics

Know Your Tech: Fiber Optics

The Internet is more than a piece of technology, it fuels huge swaths of the modern world. The economic benefits of the Internet are hard to estimate, but Cisco has tried, giving it a $19 trillion valuation, or about 21 percent of the total amount of money that is currently available in the world. So, if you have a resource that is valued at almost a quarter of humanity’s total monetary worth, you try to maximize the use of it.

Fiber optic cable is a network cable that contains small strains of glass fiber. Those glass strains are covered by an insulated casing. They transmit data through light. They are often not much thicker than a human hair. They are made up of the core, which is the pathway for light to travel. The core is surrounded by a layer of glass called cladding that keeps light in via reflection to avoid signal loss and keep transmissions true as the wire bends. 

Since the transmission of light is so fast, data can travel long distances quickly.  These cables provide higher bandwidth and can maintain the integrity of data transmission over long distances. Today, this technology supports much of the world’s Internet, cable television, and telephone systems. Their main benefits include:

  • Higher capacity data - The amount of data that a fiber optic cable can carry exceeds that of traditional copper cable. Fiber cables are rated at 10 Gbps, 40 Gbps, and 100 Gbps. 
  • Longer Distances - Since light travels for much longer distances without losing strength, there is less need for signal boosters. 
  • Less Interference - Copper cables require shielding to protect it from electromagnetic interference, but this shielding doesn’t always work. The physical makeup of fiber optic cables works to avoid this outside interference. 

Most fiber optic cable is installed to run long-distance connections, there are some Internet providers that roll out fiber optics for direct access to customers. They are deployed the following ways:

  • Fiber to the Premises (FTTP) - Fiber that is laid to support the use of media services to residential buildings.
  • Fiber to the Building (FTTB) - Also called Fiber to the Block or Fiber to the Business - This is fiber optic cable that supports commercial buildings.
  • Fiber to the Curb of Node (FTTC/N) - This is fiber cable that is laid to the node, while copper wires complete connections to customers.
  • Direct fiber - Fiber that leaves the central hub and is attached directly to a customer. Some of the most expensive network cabling on the market. 
  • Shared fiber - Much like direct fiber, but at the end it’s split up to other customers. 

Deploying fiber optic cable to your place of business is possible, but it is extraordinarily expensive. Due to the mounting costs associated with it, it may not be an option unless your provider is rolling out new infrastructure. 

If you would like to learn more about the technology your business uses, and what kind of effect it can have on your business, return to our blog regularly. 

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 15 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity IT Support Smartphones Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Collaboration Productivity Quick Tips Cybersecurity Users Business Management Phishing Windows Upgrade Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Office Cloud Computing Server Save Money Passwords Windows 10 Virtualization Saving Money Holiday Gadgets Tech Term Chrome Social Media Managed IT Services Managed Service Microsoft Office Automation Computers Cybercrime Operating System Artificial Intelligence Facebook Health BYOD Mobile Device Management Networking IT Support Internet of Things Hacking Wi-Fi Covid-19 Spam Information Office 365 Managed Service Provider Telephone Systems Alert Information Technology Remote Employer-Employee Relationship Recovery Router Bandwidth BDR Social Engineering Mobility Mobile Computing Encryption Human Resources Applications Application Remote Monitoring Law Enforcement Big Data Data Breach App History Password Money How To Remote Computing Blockchain Paperless Office Mobile Office Government Data Storage Patch Management Private Cloud Managed IT Office Tips Training Apps VPN Marketing Data Security Settings WiFi IT solutions Entertainment Two-factor Authentication Website Google Drive Budget Mouse HaaS Avoiding Downtime Vulnerability Windows 7 Word Infrastructure Voice over Internet Protocol Servers Wireless Bring Your Own Device Data Management Work/Life Balance Gmail Flexibility End of Support Firewall Education Vendor Physical Security Safety Managed Services Display Virtual Reality Sports HIPAA Apple USB Redundancy Social Keyboard Staff Software as a Service Employee/Employer Relationship Telephone System User Error Conferencing Machine Learning RMM Meetings Connectivity Remote Work Scam Save Time Risk Management Hacker Vendor Management The Internet of Things Lithium-ion battery Cleaning Data Protection Current Events Customer Service Telephony Battery Environment Shadow IT Comparison Samsung Legal Fax Server Managed Services Provider Printer CES Internet Exlporer Database Value Bluetooth SaaS Remote Workers Spam Blocking Electronic Medical Records Business Technology Content Management Access Control PDF Processor Network Congestion Hiring/Firing Virtual Assistant Proactive IT Authentication eWaste IT Consultant Hard Drive Best Practice YouTube Humor Black Market Computing Update Business Intelligence Wearable Technology Retail Hard Drives Google Docs Document Management Audit Worker Instant Messaging Robot Wireless Technology Excel Identity Theft IT Management Solid State Drive How to Downtime Botnet Digital Signage Biometrics Virtual Desktop IT Plan Data storage Automobile Augmented Reality Fraud Unsupported Software DDoS Procurement Virus Workplace Strategy Net Neutrality SharePoint Computing Infrastructure Charger Remote Worker Going Green Unified Threat Management Help Desk Compliance Cryptocurrency Computer Accessories Printing OneNote Computer Care Techology Laptop Cache Video Conferencing Amazon Web Services ROI Bitcoin Shortcuts Netflix Customers Two Factor Authentication Safe Mode Sales Cameras Criminal Point of Sale Hosted Computing Personal Audiobook Cryptomining Root Cause Analysis Antivirus GDPR Knowledge Touchpad Music Wireless Internet Windows 8 Supply Chain Management Online Shopping HBO Batteries Skype IT service File Sharing Monitoring Windows 8.1 Inventory Digitize Specifications Politics Data loss Advertising Camera Leadership Troubleshooting Wire Tablet Evernote Windows Server 2008 R2 Outlook Start Menu Travel Domains Notifications Customer relationships Printer Server Printers Email Best Practices IT Assessment Millennials Manufacturing Screen Mirroring Loyalty IaaS Maintenance Books Smart Office Wireless Charging Frequently Asked Questions Managed IT Service Mobile Security Cameras Windows 10s Relocation Bloatware Computer Tips Virtual Private Network Virtual CIO OneDrive Workforce Biometric Security Cast Video Games webinar Emergency Tablets Peripheral Cables Tip of the week Using Data Professional Services Worker Commute Public Cloud Employer Employee Relationship Entrepreneur Digital Security Cameras Project Management Nanotechnology Copiers Telecommuting Experience 5G Assessment Scalability Shortcut Quick Tip Cortana Windows Server 2008 Digital Signature Tools Business Owner Smartwatch Cost Management Ergonomics Warranty Social Networking NarrowBand Development OLED Television Search Consultant HVAC PCI DSS Google Apps Virtual Machine Analysis Fiber Optics Employee iPhone 2FA Analytics Administrator Devices Messaging Cabling Running Cable Public Computer Regulations Transportation Best Available Enterprise Content Management Memory Policy Hypervisor Dark mode Accountants Trend Micro Computer Fan Files Rootkit WIndows 7 MSP Microchip Chromecast Thought Leadership SMS Credit Cards Default App Saving Time Workers Benefits Password Management Procedure Password Manager dark theme Shopping Multi-Factor Security Google Search FENG Colocation Uninterrupted Power Supply IBM Search Engine Twitter Science AI IT Infrastructure Flash Bing Monitor Smart Technology NIST FinTech Business Mangement PowerPoint Smart Tech Social Network Windows Media Player Trending User Supercomputer Customer Relationship Management Addiction Amazon Investment Software Tips Distributed Denial of Service Employee/Employer Relationships Sync Emails Reputation Analyitcs Streaming Media Employees Recycling Windows 365 Practices Content ISP Managing Stress Wiring Programming Tech Support

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code