Browse Definitions :
Definition

municipal broadband

Contributor(s): Matthew Haughn

Municipal broadband is high-bandwidth internet access that is funded either in part or completely by municipal government. Where existing commercial service fails to provide adequate bandwidth for a community, municipal broadband can sometimes fill connectivity needs.

Often, municipal broadband provides high speed-access for a lower cost than offered by traditional providers or even free of cost, making it a concern of ISPs (internet service providers). Municipal broadband may be provided by way of unlicensed wireless methods like Wi-Fi, through wireless mesh networks or through licensed ones such as WiMAX.

Fiber to the Home (FTTH) deployment can make the most sense in the long run, although it is expensive, considering constantly rising bandwidth use. Sometimes existing unused dark fiber can be used for municipal connectivity, exploiting existing untapped infrastructure investment while lowering costs. A municipal broadband network may be publicly run and funded or privately run with public funds.

In 2016, the Federal Communications Commission (FCC) lost a battle with ISPs to keep individual states from limiting expansion of municipal broadband. The effort was to increase competition in the broadband market. The FCC was relying on the congress-provided authorization to remove barriers to investment. However, the hearing found that the FCC's case was not thoroughly supported by the quoted section 706 of the Telecommunications act of 1996.

This was last updated in April 2017

Continue Reading About municipal broadband

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Should ISPs have the right to limit the development of municipal broadband?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close