Skip to main content

Important aspects of designing a fiber optic cable

 


One of the most important aspects of designing a fiber optic cable is calculating the additional length of the fiber, which is the commonly used name for fiber spacing in terms of the length of cable it can absorb. Up to a certain limit, elongation that can occur during the installation phase. This parameter is especially important because overhead cables are permanently tensioned. This is achieved during the tube extrusion and wiring stages by combining and controlling many variables such as extrusion line speed, temperature profile, tube winding voltage, wiring stage, etc.


Managed Fiber services


Preventing water from entering the fiber optic cable and controlling propagation is very important for outdoor cables. This is because prolonged exposure to water can have a detrimental effect on the transmission properties of optical fibers. Until recently, the cable was secured with gelatin that fills the gaps in the optical core. In recent years, the pressure to reduce installation costs has eliminated the gelatin around the tube, avoiding a pre-melt cleaning. Therefore, conventional gelatin has been gradually replaced by dry materials in the form of strands and hydro-expanded tapes that expand when exposed to moisture and block the passage of water within the cable.


In certain applications where cables may be in permanent contact with water, the transverse stiffness provided by a polyethylene sheath is reinforced with polymer coated aluminum tape, applied along the length of the sheath in an extrusion operation, and welded with heat.


Cabelte offers a wide range of fiber optic cables for indoor and outdoor installations, which can be pulled or blown to suit existing installation processes.


Adopting the latest technology, the cable can be constructed from a large number of fibers with optimized diameter and weight and easy handling.


The gradual use of dielectric cables without incorporating metallic elements has led to the application of materials with excellent properties from the mechanical point of view. It is mainly used for ADSS type self-supporting overhead cables and fiberglass rods, as in the case of aramid, which can build high tensile strength and low weight cables, mainly used as a tensile strength element in the center of the cable, but in pipe. wiring and reinforcement "Also used as support for protection against buckling." However, for certain applications, metallic mechanical protection devices are also used. The steel tape is prominent, applied lengthwise and wavy so as not to affect the flexibility of the cable too much.


Product range


The scope provided by Cabelte is as follows:


-Installation via direct buried installation cable and conduit

-Cable for aerial installation

-OPGW cable protector cable for high voltage overhead lines with built-in optical fiber.


Regarding specific protection, the following stand out:


-Cable with ballistic protection

-Non-metallic protection cable against rodents

-Cable with improved fire behavior


Comments

Popular posts from this blog

Equifax security breach

  The data breach at Equifax, one of the nation’s largest credit reporting companies, exposed the personal information of more than 145 million Americans. security breach meaning Cybercriminals exploited a website application vulnerability. Unauthorized access to data occurred from between May and July 2017. Equifax announced the cybersecurity incident on September 7, 2017. Hackers accessed personally identifiable information that included names, Social Security numbers, birth dates, addresses, and, in some cases, driver’s license numbers. The breach arguably increased the risk of identity theft for millions of Americans. Facebook security breach Facebook, in September 2018, announced an attack on its computer network. The personal information of nearly 29 million users was exposed. Cybercriminals exploited three software flaws in Facebook’s system. Hackers were able to break into user accounts that included those of Facebook CEO Mark Zuckerberg and Chief Operating Officer Sheryl Sandb

Service Desk: Bigger than a Help Desk, manages IT as a service

ITIL (Information Technology Infrastructure Library) sets accepted point by point rehearses for IT administration the board that centers around adjusting IT administrations with the requirements of the business. As indicated by ITIL phrasing, a Service Desk is the single purpose of contact between the specialist organization and the clients. A commonplace help work area oversees episodes and administration demands and furthermore handles correspondence with the clients.  Outsourced Help Desk Basically, administration work areas are there to support clients, yet rather give very much arranged client support.  The manner in which IT administration the executives developed after the 80s, it requested something other than a handy solution for client issues. This prompted a progressively methodical way to deal with overseeing IT as a help; therefore, venturing up centralized server registering.  What everything is remembered for highlights of a Service work area, you sho

Fortify Security for BYOD with Cisco Managed Service

  Fortify Security for BYOD with Cisco Managed Service for  Security and Cisco Identity Services Engine  Cisco Managed Service for Security exploits the Cisco Identity Services  Motor (ISE), Cisco's security strategy the executives and control stage. Cisco ISE  robotizes and disentangles access control and security consistence for wired, remote,  furthermore, VPN network. With Cisco Managed Service for Security and ISE, we help  you oversee and work secure access and visitor access productively. So you can  uphold your BYOD activities and implement the use arrangements that bode well for your  business.  Managed Cisco services In particular, Cisco Managed Service for Security works with Cisco ISE in these territories:  Strategy Management  • It makes, conveys, and tests Cisco ISE validation, approval, act  evaluation, and gadget profiling arrangements in your BYOD climate.  • It conducts strategy appraisals and occasional surveys.  Rich Event Monitoring with Identity Heartbeat  • I