Browse Definitions :
Definition

free-space optics (FSO)

Free-space optics (FSO), also called free-space photonics (FSP), refers to the transmission of modulated visible or infrared ( IR ) beams through the atmosphere to obtain broadband communications. Most frequently, laser beams are used, although non-lasing sources such as light-emitting diodes ( LED s) or IR-emitting diodes (IREDs) will serve the purpose.

The theory of FSO is essentially the same as that for fiber optic transmission. The difference is that the energy beam is collimated and sent through clear air or space from the source to the destination, rather than guided through an optical fiber. If the energy source does not produce a sufficiently parallel beam to travel the required distance, collimation can be done with lenses. At the source, the visible or IR energy is modulated with the data to be transmitted. At the destination, the beam is intercepted by a photodetector, the data is extracted from the visible or IR beam (demodulated), and the resulting signal is amplified and sent to the hardware.

FSO systems can function over distances of several kilometers. As long as there is a clear line of sight between the source and the destination, communication is theoretically possible. Even if there is no direct line of sight, strategically positioned mirrors can be used to reflect the energy. The beams can pass through glass windows with little or no attenuation (as long as the windows are kept clean!).

Although FSO systems can be a good solution for some broadband networking needs, there are limitations. Most significant is the fact that rain, dust, snow, fog, or smog can block the transmission path and shut down the network.

This was last updated in March 2011

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

Dateiendungen und Dateiformate

Gesponsert von:

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close