What is Fiber Optics?

 

As opposed to information traveling through wire cables or radio waves, like when you use landlines or cell phones, fiber optics send information a different way. Fiber-optic cables send information coded in a beam of light down a glass or plastic pipe. In the 1960s, engineers found a way to use fiber optic technology to send information at the speed of light!

Optical Technology

 

A fiber-optic cable is comprised of extremely thin strands of glass called optical fibers. Each strand is less than 10% as thick as a strand of human hair, but has the ability to carry approximately 25,000 telephone calls – so an entire fiber-optic cable can carry millions of calls. They carry information between two places using entirely optical – or light-based – technology.

Types of Fiber-Optic Cables

 

Single-Mode: This is the simplest type of optical fiber. A mode is simply a path that a light beam of information travels down the fiber. A single-mode optical fiber has a very thin core, and all signals travel straight down the middle of it. Cable television, telephone signals, and Internet are commonly carried by a huge bundle of single-mode fibers. These cables can send information over 100 kilometers.

Multi-Mode: The optical fibers in a multi-mode cable are 10 times bigger than single-mode cables. Light beams in multi-mode cables can travel in a variety of paths. These modes can send information short distances and are generally used to link together computer networks.

Uses for Fiber Optics

 

Computer networks

Rather than using copper cables, fiber-optic cables are now the preferred method of transmitting information over long distances because of three main advantages:

  • No Crosstalk: Copper cables are known to have electromagnetic interference, unlike fiber optical fibers. Less interference means better quality.
  • Less Signal Loss: With fiber-optic cables, your information travels about 10 times further before there is need for amplification. This makes fiber networks easier to operate and cheaper.
  • Higher bandwidth: Fiber-optic cables are able carry much more data than copper cables.

Television Broadcasting

 

Originally, television companies used coaxial cables to carry a handful of analog television signals. However, once more and more viewers began connecting to cable and networks began offering more and more programs, operators decided that they needed to make the switch from analog broadcasting and coaxial cables to digital broadcasting and optical fibers.

Back in the early 20th century, radio and TV broadcasting were born from a relatively simple idea: it was quite easy to shoot electromagnetic waves through the air from a single transmitter (at the broadcasting station) to thousands of antennas on people’s homes. These days, while radio still beams through the air, we’re just as likely to get our TV through fiber-optic cables because a single optical fiber can carry enough data for hundreds of television channels.

Optical fibers offer higher capacity, less interference, and much better picture and sound quality. They are also able to travel much longer distances and are much more cost effective.

Medicine

 

Over 50 years ago, fiber optics was originally used in medical equipment as a way to help doctors look inside out bodies without slicing into them. Today, fiber optics continues to create significant new methods of medical diagnosis and scanning.

Military

 

Fiber-optic cables are a perfect way to connect military bases to missile launch sites and radar tracking stations due to the fact that they are thin, lightweight, inexpensive, secure, and safe against attack for the most part. They are also tough against electromagnetic interference since they don’t carry electrical signals or give off electromagnetic radiation that the enemy can attack.
Military planes, tanks, and helicopters have all been switching to fiber-optic cables because they are lightweight compared to bulky and expensive metal cables.

FREE QUOTE

Hire Us Today!

714-592-0063

Acceptable Interruption Window,Acceptable Use Policy,Access Control List (ACL),Access Path,Access Point,Access Profile,Access Rights,Access Type,Accountability,Accounting Legend Code,Account Management (user),Active Security Testing,Ad Hoc Network,Administrative Safeguards,Advanced Encryption Standard (AES),Advanced Penetration Testing,Advanced Persistent Threat (APT),Adversary,Adware,Alert Situation,Alternate Facilities,Alternate Process,Analog,Anti-Malware,Anti-Virus Software,App Attack,Application Layer,Architecture,Asset,Asymmetric Key (Public Key),Attack,Attack Mechanism,Attack Vector,Attenuation,Audit Trail,Authentication,Authenticity,Availability,Backdoor,Bandwidth,Banner,Banner Grabbing,Baseline Security,Bastion,Bastion Host,Behavioral Outcome,Biometrics,Bit Error Rate,Black Core,Blended Attack,Block Cipher,Block Cipher Algorithm,Botnet,Boundary,Bridge,Bring Your Own Device (BYOD),Broadcast,Brute Force,Brute Force Attack,Buffer Overflow,Business Continuity Plan,Business Impact Analysis/Assessment,Category,Central Services Node,Certificate Authority (CA),Certificate Management,Certification Revocation List,Chain of Custody,Chain of Evidence,Challenge Response Protocol,Checksum,Chief Information Security Officer,Chief Security Officer,Cipher,Cipher Text,Ciphony,Claimant,Cleartext,Clinger-Cohen Act of 1996,Cloud Computing,Cold Site,Collision,Common Access Card (CAC),Common Attack Pattern Enumeration and Classification (CAPEC),Compartmentalization,Compliance,Compliance Documents,Computer Emergency Response Team (CERT),Computer Forensics,Confidentiality,Configuration Management,Consumerization,Containment,Content Filtering,Control,Countermeasure,Critical Infrastructure,Criticality,Criticality Analysis,Cross-Site Scripting (XSS),Cryptography,Cryptosystem,Cybercop,Cyberespionage,Cyber Security Architecture,Cyber Security,Cyberwarfare,Data Asset,Data Classification,Data Custodian,Data Element,Data Encryption Standard,Data Flow Control,Data Leakage,Data Owner,Data Retention,Data Transfer Device (DTD),Database,Decentralization,Decryption,Decryption Key,Defense-in-Depth,Demilitarized Zone,Denial of Service Attack,Digital Certificate,Digital Evidence,Digital Forensics,Digital Signature,Disaster,Disaster Recovery Plan,Discretionary Access Control,Disk Imaging,Disruption,Distributed Denial of Service (DDoS),Domain Name System ,Domain Name Systems (DNS) Exfiltration,Dual-Use Certificate,Due Care,Due Diligence,Duplicate Digital Evidence,Dynamic Ports,E-Commerce,E-Government,Eavesdropping,Easter Egg,Egress,Egress Filtering,Electronic Key Entry,Electronic Key Management System,Electronic Signature,Electronically Generated Key,Elliptical Curve Cryptography (ECC),Embedded Cryptographic System,Embedded Cryptography,Encapsulation Security Payload,Encipher,Encryption,Encryption Algorithm,Encryption Certificate,Encryption Key,End Cryptographic Unit,End-to-End Encryption,Enterprise,Enterprise Architecture,Enterprise Risk Management,Entrapment,Eradication,Ethernet,Event,Evidence,Exercise Key,Exploit,Exploit Code,Exploitable Channel,External Network,External Security Testing,Fail Safe,Fail Soft,Failover,False Positive,Federal Information System,Federal Public Key Infrastructure Policy Authority (FPKI PA),File Encryption,File Name Anomaly,File Protection,File Security,File Transfer Protocol (FTP),Fill Device,Firewall,Firewall Control Proxy,Firmware,Flaw Hypothesis Methodology,Flooding,Focused Testing,Forensic Copy,Forensic Examination,Forensic Specialist,Forensically Clean,Forensics,Forward Cipher,Freeware,Full Disk Encryption (FDE),Gateway,gethostbyaddr,gethostbyname,Get Nearest Server,Global Information Grid (GIG),Global Information Infrastructure (GII),GNU,Gnutella,Governance,Governance, Risk Management and Compliance ,Graduated Security,Group Authenticator,Guard System,Guessing Entropy,Guideline,Hacker,Handshaking Procedures,Hard Copy Key,Hardening,Hardware,Hardwired Key,Hash Value,Hash-based Message Authentication Code (HMAC),Hashing,Hash Function,Hash Functions,Hash Total ,Header,High Assurance Guard (HAG),High Availability,High Impact,High Impact System,Hijack Attack,Hijacking ,HoneyClient,Honeypot,Honeymonkey,Hops,Host,Host-Based Intrusion Detection System (HIDS),Hot Site,Hot Wash,HTTP Proxy,HTTPS,Hub,Hybrid Attack,Hybrid Encryption,Hybrid Security Control,Hyperlink,Hypertext Markup Language (HTML),Hypertext Transfer Protocol (HTTP),Identity,Incident,Incident Handling,Incremental Backups,Inetd,Inference Attack,Information Warfare,Ingress Filtering,Input Validation Attacks,Integrity,Integrity Star Property,Internet,Internet Control Message Protocol (ICMP),Internet Engineering Task Force (IETF),Internet Message Access Protocol (IMAP),Internet Protocol (IP),Internet Protocol Security (IPsec),Internet Standard,Interrupt,Intranet,Intrusion Detection (ID) ,IP Address,IP Flood,IP Forwarding,IP Spoofing,ISO,Issue-Specific Policy,ITU-T,Jitter,Jump Bag,Kerberos,Kernel,Lattice Techniques,Layer 2 Forwarding Protocol (L2F),Layer 2 Tunneling Protocol (L2TP),Least Privilege,Legion,Lightweight Directory Access Protocol (LDAP),Link State,List Based Access Control,Loadable Kernel Modules (LKM),Log Clipping,Logic Bombs,Logic Gate,Loopback Address,MAC Address,Malicious Code,Malware,Mandatory Access Control (MAC),Masquerade Attack,md5,Measures of Effectiveness (MOE),Monoculture,Morris Worm,Multi-Cast,Multi-Homed,Multiplexing,NAT,National Institute of Standards and Technology (NIST),Natural Disaster,Netmask,Network Mapping,Network Taps,Network-Based IDS,Non-Printable Character,Non-Repudiation,Null Session,Octet,One-Way Encryption,One-Way Function,Open Shortest Path First (OSPF),OSI,OSI layers,Overload,Packet,Packet Switched Network (PSN),Partitions,Password Authentication Protocol (PAP),Password Cracking,Password Sniffing,Patch,Patching,Payload,Penetration,Penetration Testing,Permutation,Personal Firewall,pharming,Phishing,Ping of Death,Ping Scan,Ping Sweep,Plaintext,Point-to-Point Protocol (PPP),Point-to-Point Tunneling Protocol (PPTP),Poison Reverse,Polyinstantiation,Polymorphism,Port,Port Scan,Possession,Post Office Protocol, Version 3 (POP3),Practical Extraction and Reporting Language (Perl),Preamble Pretty Good Privacy (PGP)TM,Private Addressing,Program Infector,Program Policy,Promiscuous Mode,Proprietary Information,Protocol,Protocol Stacks (OSI),Proxy Server,Public Key,Public Key Encryption,Public Key Infrastructure (PKI),Public-Key Forward Secrecy (PFS),QAZ,Race Condition,Radiation Monitoring,Reconnaissance,Reflexive ACLs (Cisco),Registry,Regression Analysis,Request for Comment (RFC),Resource Exhaustion,Response,Reverse Address Resolution Protocol (RARP),Reverse Engineering,Reverse Lookup,Reverse Proxy,Risk,Risk Assessment,Risk Averse,Rivest-Shamir-Adleman (RSA),Role Based Access Control,Root,Rootkit,Router,Routing Information Protocol (RIP),Routing Loop,RPC Scans,Rule Set Based Access Control (RSBAC),S/Key,S/MIME,Safety,Safeguards,Safeguarding Statement,Salt,Sandboxing,Sanitization,Scanning,Scatternet,Scavenging,Scoping Guidance,Secret Key,Secret Key (symmetric) Cryptographic Algorithm,Secret Seed,Secure Electronic Transactions (SET),Secure Communication Protocol,Secure Communications,Secure Erase,Secure Hash Algorithm (SHA),Secure Hash Standard,Secure Shell (SSH),Secure Sockets Layer (SSL),Secure State,Secure Subsystyem,Security,Security Association,Security Attribute,Security Banner,Security Authorization Boundary,Security Assertion Markup Language (SAML),Security Categorization,Security Category,Security Concept of Operations ,Security Content Automation Protocol (SCAP) ,Security Control Assessment,Security Control Assessor ,Security Control Baseline ,Security Control Effectiveness ,Security Control Enhancements,Security Control Inheritance,Security Controls,Security Controls Baseline,Security Domain,Security Engineering,Security Fault Analysis (SFA),Security Features Users Guide,Security Filter,Security Functions,Security Goals,Security Impact Analysis,Security Information and Event Management (SIEM) Tool,Security Inspection,Security Kernel,Security Label,Security Level,Security Management Dashboard,Security Markings,Security Mechanism,Security Net Control Station,Security Objective,Security Perimeter,Security Plan,Security Policy,Security Posture,Security Program Plan,Security Range,Security-Relevant Change,Security-Relevant Event,Security-Relevant Information,Security Requirements,Security Requirements Baseline,Security Requirements Traceability Matrix (SRTM),Security Safeguards,Security Service,Security Specification,Security Strength,Security Tag,Security Target,Security Test & Evaluation (ST&E),Security Testing,Seed Key,Segment,Sensitive Information,Separation of Duties,Server,Session,Session Hijacking,Session Key,SHA1,Shadow Password Files,Share,Shell,Signals Analysis,Signature,Simple Integrity Property,Simple Network Management Protocol (SNMP),Simple Security Property,Smartcard,Smurf Attack,Sniffer,Sniffing,Social Engineering,Socket,Socket Pair,SOCKS,Software,Source Port,Spam,Spanning Port,Split Horizon,Split Key,Spoof,SQL Injection,Stack Mashing,Standard ACLs (Cisco),Star Network,Star Property,State Machine,Stateful Inspection,Static Host Tables,Static Routing,Stealthing,Steganalysis,Steganography,Stimulus,Store-and-Forward,Straight-Through Cable,Stream Cipher,Strong Star Property,Sub Network,Subnet Mask,Switch,Switched Network,Symbolic Links,Symmetric Cryptography,Symmetric Key,SYN Flood,Synchronization,Syslog,System Security Officer (SSO),System-Specific Policy,T1, T3,Tamper,TCP Fingerprinting,TCP Full Open Scan,TCP Half Open Scan,TCP Wrapper,TCP/IP,TCPDump,TELNET,Threat,Threat Assessment,Threat Model,Threat Vector,Time to Live,Tiny Fragment Attack,Token Ring,Token-Based Access Control,Token-Based Devices,Topology,Traceroute (tracert.exe),Transmission Control Protocol (TCP),Transport Layer Security (TLS),Triple DES,Triple-Wrapped,Trojan Horse,Trunking,Trust,Trusted Ports,Trusted Certificate,Tunnel,UDP Scan,Unicast,Uniform Resource Identifier (URI),Uniform Resource Locator (URL),Unix,Unprotected Share,User,User Contingency Plan,User Datagram Protocol (UDP),Virtual Private Network (VPN),Virus,Voice Firewall,Voice Intrusion Prevention System (VIPS),War Chalking,War Dialer,War Dialing,Wardriving,Web of Trust,Web Server,WHOIS,Windowing,Windowing System,Windump,Wired Equivalent Privacy (WEP),Wireless Application Protocol (WAP),Wiretapping,World Wide Web (“the Web”, WWW, W3),Worm,X.400,XNS,XHTML,XML,XMPP,XMT,Y2K,Yottabyte,Ymodem,Zero Day,Zero-day Attack,Zombies, cyber security company, cyber security in orange county, cyber security in California, cyber security in los angeles, cyber security in brea, cyber security in brea ca, managed it services, managed it support, it services, it support, managed it support orange county, managed it services orange county

Brea,Fullerton,Yorba Linda,City of Industry,Irvine,Anaheim,Santa Ana,Villa Park,Fountain Valley,East Irvine,Ontario,Diamond Bar,Buena Park,Walnut,Orange,Placentia,La Palma,Pomona,Montclair,North Tustin