The days of the dedicated fiber technician are over. In an effort to keep pace with demand, every technician is expected to test fiber.
The challenges these technicians face can be intimidating. Strict loss budgets leave little room for mistakes and new standards have been developed to ensure proper deployment, but most technicians don’t understand the best practices required when handling fiber. This is where VIAVI Solutions can help.
With over 35 years of experience working closely with customers at every stage of fiber testing (from labs and manufacturers to field technicians and end-users), our goal is to equip technicians with the right tools and resources to install, certify, and maintain fiber networks, while at the same time, efficiently apply the industry’s best practices. VIAVI Solutions can help you and your technicians Get Fiber Smart!
Achieving IEC Standard Compliance for Fiber Optic Connector Quality through Automation of the Systematic Proactive End Face Inspection Process
IEC Standard 61300-3-35 specifies pass/fail requirements for end face quality inspection before connection. Designed to be a common reference of product quality, its use supports product quality throughout the entire fiber optic life cycle but only when compliance to the standard occurs at each stage.
VIAVI Solutions offers the most comprehensive product portfolio supporting the installation, testing, and monitoring of FTTH networks.
Contamination is the #1 cause for troubleshooting in optical networks. This document sets the test requirements for qualifying the fiber portion of a fiber-to-the-home (FTTH) network prior to equipment installation and turn-up.
In this case study, we profile a major European service provider who has worked with VIAVI Solutions to reduce some of the cost challenges associated with FTTH deployment for consumers and businesses alike.
Fiber networks bring unprecedented speed and bandwidth dimensions. However, data is still exposed to a wide range of network threats including hackers and corporate/foreign espionage, to name a few. Corporate and government network owners must increasingly mitigate threats of data hijacking on public, private, and secure networks.