🧭 About Me
Matthew A. Porter
Former Intelligence Officer · Practical Technologist
TDS Field Services Technician · Founder, Amor Fati Labs
📡 Fiber Optic Physics
Q: How is fiber optic internet physically different from copper/coax?
TLDR — light through glass beats electricity through metal.
Traditional telco infrastructure (DSL, POTS) transmits electrical signals over copper twisted-pair, while coaxial cable uses a copper core with shielding. Fiber optic cable transmits data as pulses of light through ultra-pure glass or plastic strands. Single-mode fiber (SMF) — what TDS deploys for FTTH — uses a 9 µm core diameter to carry a single light mode with virtually no modal dispersion, enabling multi-gigabit speeds over distances exceeding 40 km without amplification.
References
- TDS Fiber — What to Expect
- ITU-T G.652 — Single-Mode Optical Fibre and Cable
- IEEE 802.3 Ethernet Standards
Total Internal Reflection — Why Light Stays in the Fiber
The critical angle
| Symbol | Meaning | Typical value |
|---|---|---|
| Critical angle | ~83.7° for SMF | |
| Refractive index, core | 1.468 (silica) | |
| Refractive index, cladding | 1.460 (silica cladding) |
When light strikes the core–cladding boundary at an angle greater than
Numerical Aperture
- Single-mode fiber: NA ≈ 0.12 — tight beam, one propagation mode, minimal dispersion
- Multi-mode fiber: NA ≈ 0.20–0.50 — wider acceptance cone, shorter distances
Optical Signal Attenuation Along a Fiber Span
Signal power at distance
Or equivalently in dB, where the received power in dBm is:
| Symbol | Meaning | Typical value |
|---|---|---|
| Launch power | +3 to +7 dBm (OLT transmitter) | |
| Attenuation coefficient | 0.35 dB/km @ 1310 nm · 0.20 dB/km @ 1550 nm | |
| Fiber span length (km) | — |
Example: A 20 km run at 1310 nm loses
Optical Splitter Insertion Loss
PON networks use passive 1:N optical splitters. Each split divides the optical power equally — but the dB loss does not divide equally: it adds logarithmically.
Ideal (theoretical) splitting loss for a 1:N splitter:
Actual (excess loss included) insertion loss:
Where
| Split ratio |
Ideal |
Typical actual |
|---|---|---|
| 1:2 | 3.0 dB | 3.4 dB |
| 1:4 | 6.0 dB | 6.7 dB |
| 1:8 | 9.0 dB | 9.8 dB |
| 1:16 | 12.0 dB | 13.0 dB |
| 1:32 | 15.1 dB | 16.0 dB |
| 1:64 | 18.1 dB | 19.2 dB |
Cascaded splitters (e.g. a 1:4 feeding four 1:8s) add losses cumulatively:
A 1:4 → 1:8 cascade gives an effective 1:32 split:
Total Optical Power Budget
The full end-to-end loss from OLT to ONT must stay within the optical power budget (OPB) of the system:
$$L_{\text{total}} = \underbrace{\alpha_f \cdot d}{\text{fiber}} + \underbrace{\sum IL{\text{split}}}{\text{splitters}} + \underbrace{N_c \cdot \alpha_c}{\text{connectors}} + \underbrace{N_s \cdot \alpha_s}{\text{splices}} + \underbrace{M}{\text{margin}}$$
| Term | Meaning | Typical value |
|---|---|---|
| Fiber attenuation | 0.35 dB/km (1310 nm) | |
| Fiber distance (km) | — | |
| Splitter insertion loss | See table above | |
| Connector loss per pair | 0.3–0.5 dB | |
| Splice loss per joint | 0.02–0.1 dB | |
| System margin (ageing, temp) | 1–3 dB |
XGS-PON (ITU-T G.9807.1) class N2: OPB = 29 dB — sufficient for a 1:32 split over ~20 km of feeder fiber.
References
Shannon–Hartley — Maximum Theoretical Throughput
| Symbol | Meaning |
|---|---|
| Channel capacity (bits/second) | |
| Bandwidth (Hz) | |
| Signal-to-noise ratio (linear) |
Fiber's near-zero noise floor and multi-THz optical bandwidth give it a theoretical capacity orders of magnitude above copper. A single SMF strand with dense wavelength-division multiplexing (DWDM) can carry >100 Tbps in laboratory conditions.
Q: Why does fiber have symmetrical upload and download speeds?
Copper-based technologies (DSL, cable) are engineered asymmetrically because electrical signal transmission over legacy plant degrades upstream frequencies faster than downstream. Fiber carries light — upload and download travel on separate wavelengths (1310 nm upstream / 1490 nm downstream on GPON, or time-division multiplexed on XGS-PON) with identical physical characteristics in both directions, yielding true symmetrical throughput.
Q: What is latency like on fiber vs. copper?
Light travels through silica fiber at approximately
Q: Do I need special equipment to use TDS Fiber?
TDS provides and installs an Optical Network Terminal (ONT) at your premises — a small device that converts the optical signal to Ethernet. You connect your router to the ONT's Ethernet port. No phone filters, DSL modems, or coax splitters needed.
References
⚛️ Quantum Physics of Fiber Optics & Telecom Security
Fiber optic networks are fundamentally quantum-mechanical — every bit transmitted is carried by photons whose behavior is governed by quantum physics. This section covers the quantum principles directly relevant to fiber optic signal transmission, quantum-secured telecommunications, and the physical limits of optical detection.
Photon Energy in Optical Fiber
Every signal in a fiber optic network is carried by photons. The energy of a single photon at the operating wavelength is:
| Symbol | Meaning | Typical value |
|---|---|---|
| Planck's constant |
|
|
| Photon frequency | ~229 THz (1310 nm) · ~194 THz (1550 nm) | |
| Speed of light in vacuum |
|
|
| Wavelength | 1310 nm (upstream) · 1550 nm (downstream) |
At 1550 nm, each photon carries approximately
Photon Coherence & Polarization in Fiber
Photons in fiber exhibit quantum properties that directly affect signal quality:
Coherence length determines how far a photon's wave packet maintains a stable phase relationship — critical for coherent detection in advanced PON and DWDM systems:
where
Polarization — each photon carries a polarization state that can be represented on the Poincaré sphere. Fiber birefringence rotates this state unpredictably (polarization mode dispersion, PMD), causing signal degradation:
| Symbol | Meaning | Typical value |
|---|---|---|
| Differential group delay | — | |
| PMD coefficient |
|
|
| Fiber length (km) | — |
PMD is a quantum-mechanical effect — it arises from photon polarization states coupling differently to stress-induced birefringence in the fiber.
Quantum Noise Limits on Fiber Optic Detection
The ultimate sensitivity of any fiber optic receiver is set by quantum shot noise — the irreducible noise arising from the discrete, random arrival of photons at the detector.
Shot noise power in a photodetector:
| Symbol | Meaning |
|---|---|
| Electron charge ( |
|
| Photocurrent (proportional to received optical power) | |
| Electrical bandwidth of the receiver |
Quantum-limited signal-to-noise ratio for direct detection:
where
Sensitivity at the quantum limit — the minimum number of photons per bit required for a given bit error rate (BER):
For
Coherent Detection — Homodyne & Heterodyne
Modern high-capacity fiber systems (100G+ DWDM) use coherent detection, which mixes the received signal with a local oscillator (LO) laser to recover both amplitude and phase. This is inherently quantum-mechanical — it measures the quadratures of the optical field.
Homodyne detection (LO frequency = signal frequency) measures one quadrature:
Heterodyne detection (LO offset by intermediate frequency
Coherent receivers achieve near-quantum-limited sensitivity and enable advanced modulation formats (QPSK, 16-QAM) that multiply fiber capacity. The quantum noise floor for coherent detection is one photon per mode — the standard quantum limit (SQL).
Quantum Key Distribution (QKD) Over Fiber
QKD is the primary application of quantum mechanics to telecom security. It uses the quantum properties of photons transmitted through fiber to establish provably secure encryption keys.
BB84 Protocol — the foundation of fiber-based QKD:
- Alice sends single photons through fiber, each randomly prepared in one of four polarization states across two bases:
- Rectilinear basis (
$+$ ):$|H\rangle$ or$|V\rangle$ (horizontal / vertical) - Diagonal basis (
$\times$ ):$|D\rangle$ or$|A\rangle$ (diagonal / anti-diagonal)
- Rectilinear basis (
- Bob randomly chooses a measurement basis for each received photon
- They publicly compare bases (not results) and keep only matching-basis measurements
- The no-cloning theorem guarantees that any eavesdropper (Eve) attempting to intercept and re-send photons introduces detectable errors
Quantum Bit Error Rate (QBER):
| QBER threshold | Meaning |
|---|---|
| Secure key extraction possible (BB84) | |
| Eavesdropper likely present — key discarded |
The QBER arises from fiber imperfections (polarization drift, dark counts in single-photon detectors), and any eavesdropping adds to it — this is the security guarantee.
Secure key rate for a decoy-state BB84 QKD system over fiber:
| Symbol | Meaning |
|---|---|
| Protocol efficiency factor (1/2 for BB84) | |
| Single-photon gain | |
| Single-photon error rate | |
| Overall gain at signal intensity |
|
| Overall QBER at signal intensity |
|
| Error correction efficiency (~1.16) | |
| Binary Shannon entropy: |
Practical fiber QKD performance:
| Parameter | Typical value |
|---|---|
| Operating wavelength | 1550 nm (C-band, lowest fiber loss) |
| Maximum fiber distance (standard BB84) | ~100 km |
| Maximum fiber distance (twin-field QKD) | ~600 km |
| Secure key rate (50 km fiber) | ~1–100 kbit/s |
| Single-photon detector | InGaAs APD or SNSPD |
Fiber attenuation limits QKD range. Since QKD requires single photons (which cannot be amplified without destroying their quantum state), the range is directly limited by fiber loss:
At 1550 nm (
Entanglement-Based QKD (E91 Protocol) Over Fiber
An alternative QKD approach uses entangled photon pairs distributed through fiber:
- A source generates polarization-entangled photon pairs (e.g., via spontaneous parametric down-conversion) and sends one photon to Alice and one to Bob through separate fibers
- Alice and Bob each randomly measure in one of three bases
- Bell's inequality violation confirms entanglement was preserved through the fiber — proving no eavesdropper intercepted the photons
The Bell inequality for the CHSH variant:
Quantum mechanics predicts
Post-Quantum Cryptography for Telecom Networks
While QKD secures the key exchange channel using physics, the broader telecom infrastructure must also prepare for the threat quantum computers pose to existing public-key cryptography used in network protocols (TLS, IPsec, MPLS signaling).
Shor's algorithm can factor large integers in polynomial time, breaking RSA and ECC:
This directly threatens the cryptographic foundations of telecom signaling, authentication, and session establishment. In response, NIST standardized post-quantum cryptographic algorithms (2024) for deployment across telecom infrastructure:
| Algorithm | Type | Telecom application |
|---|---|---|
| ML-KEM (CRYSTALS-Kyber) | Lattice-based key encapsulation | TLS key exchange in network management |
| ML-DSA (CRYSTALS-Dilithium) | Lattice-based digital signature | Certificate authentication for network elements |
| SLH-DSA (SPHINCS+) | Hash-based signature | Firmware signing for ONTs and OLTs |
References
📜 Certifications & Credentials
Full certificate index: certs/README.md
Selected credentials:
| Certificate | Provider |
|---|---|
| Introduction to Quantum Computing | LinkedIn Learning |
| CompTIA Security+ SY0-701 Prep | LinkedIn Learning |
| AI in RAN — Radio Access Network | LinkedIn Learning |
| Understanding Copper & Fiber Optic Systems | LinkedIn Learning |
| Introduction to Telecom Standards, Networks & Innovations | LinkedIn Learning |
| Linux System Engineer: Networking & SSH | LinkedIn Learning |
| ArcGIS Python Scripting | LinkedIn Learning |
| InfraWorks & ArcGIS AEC Collaboration | LinkedIn Learning |
| GitHub Actions | LinkedIn Learning |
| Project Management Foundations | LinkedIn Learning |
Views expressed here are my own and do not represent TDS Telecom.