Black Box Explains...Types of KVM switches.
Black Box has the keyboard/video switches you need to share one CPU between several workstations or to control several CPUs from one monitor and keyboard.
If you do a lot of... more/see it nowswitching, you need premium switches—our top-of-the-line ServSwitch™ KVM switches give you the most reliable connections for the amount of KVM equipment supported. With ServSwitch KVM switches, you can manage as many CPUs as you want from just one workstation, and you can access any server in any computer room from any workstation. Eliminating needless equipment not only saves you money, it also gives you more space and less clutter. Plus, you can switch between PCs, Sun®, and Mac® CPUs. ServSwitch KVM switches can also cut your electricity and cooling costs because by sharing monitors, you use less power and generate less heat.
If your switching demands are very minor, you may not need products as advanced as ServSwitch. Black Box offers switches to fill less demanding needs. Most of these are manual switches or basic electronic switches, which don’t have the sophisticated emulation technology used by the ServSwitch.
For PCs with PS/2® keyboards, try our Keyboard/Video Switches. They send keyboard signals, so your CPUs boot up as though they each have their own keyboard.
With the RS/6000™ KVM Switch, you can run up to six RS/6000 servers from one workstation. Our Keyboard/ Video Switch for Mac enables you to control up to two Mac CPUs from one keyboard and monitor.
With BLACK BOX® KVM Switches, you can share a workstation with two or four CPUs. They’re available in IBM® PC and Sun Workstation® configurations.
You’ll also find that our long-life manual Keyboard/Video Switches are perfect for basic switching applications. collapse
Black Box Explains... Multiplatform cabling environments.
When using a ServSwitch™ with multiple computer platforms, choosing which peripherals to use to control your diverse group of CPUs can be confusing. Because of the wide variation in connector... more/see it nowtypes and compatibilities, there is a hierarchy to follow when choosing your user station keyboard, monitor, and mouse.
1. If you have at least one Sun® computer in your application, you should use a Sun keyboard and mouse to control your CPUs.
2. If you have a mixture of PCs and Mac® computers, use your PC-style keyboard and mouse to control your CPUs. collapse
Black Box Explains...Digital Visual Interface (DVI) connectors.
The DVI (Digital Video Interface) technology is the standard digital transfer medium for computers while the HDMI interface is more commonly found on HDTVs, and other high-end displays.
The Digital... more/see it nowVisual Interface (DVI) standard is based on transition-minimized differential signaling (TMDS). There are two DVI formats: Single-Link and Dual-Link. Single-link cables use one TMDS-165 MHz transmitter and dual-link cables use two. The dual-link cables double the power of the transmission. A single-link cable can transmit a resolution ?of 1920 x 1200 vs. 2560 x 1600 for a dual-link cable.
There are several types of connectors: ?DVI-D, DVI-I, DVI-A, DFP, and EVC.
- DVI-D is a digital-only connector for use between a digital video source and monitors. DVI-D eliminates analog conversion and improves the display. It can be used when one or both connections are DVI-D.
- DVI-I (integrated) supports both digital and analog RGB connections. It can transmit either a digital-to-digital signals or an analog-to-analog signal. It is used by some manufacturers on products instead of separate analog and digital connectors. If both connectors are DVI-I, you can use any DVI cable, but a DVI-I is recommended.
- DVI-A (analog) is used to carry an DVI signal from a computer to an analog VGA device, such as a display. If one or both of your connections are DVI-A, use this cable. ?If one connection is DVI and the other is ?VGA HD15, you need a cable or adapter ?with both connectors.
- DFP (Digital Flat Panel) was an early digital-only connector used on some displays.
- EVC (also known as P&D, for ?Plug & Display), another older connector, handles digital and analog connections.
Black Box Explains... Using fiber optics for KVM extension.
If you‘re sending KVM signals between buildings for an extended distance, in areas supplied by different power sources, in an electrically noisy environment, or where data security is a big... more/see it nowconcern, you need to use a fiber optic-based KVM extender.
Optical fiber is an ideal transmission medium not only for backbone and horizontal connection, but also for workstation-to-backracked CPU or server links. It works very well in applications where you need to transfer large, bandwidth-consuming data files over long distances, and where you require immunity from electrical interference or data theft.
The choice for extraordinary reach.
Fiber doesn’t have the 100-meter (328-ft.) distance limitation that UTP copper without a booster does. Fiber distances can range from 300 meters (984.2 ft.) to 70 kilometers (24.8 mi.), depending on the cable, wavelength, and network. With fiber-based KVM extenders, the transmitter converts conventional data signals into a modulated light beam, then transports the beam via the fiber to a receiver, which converts the light back into electrical signals.
Many newer fiber-based KVM extenders support both analog and digital transmission. Often, they work by digitizing video output from a local CPU, then sending it across fiber link to a remote unit, which converts it back to the original analog signal. In many cases, one fiber of the fiber pair transmits monitor video serially and the second fiber sends remote mouse and keyboard information back to the local CPU.
The choice for ensuring signal integrity.
Because fiber is made of glass, which is an insulator, no electric current can flow through. It’s immune to electromagnetic interference and radio-frequency interference (EMI/RFI), crosstalk, impedance problems, and more. This is why fiber-based KVM extenders are beneficial to users in process control, engineering, utility, and factory automation applications. The users need to keep critical information safe and secure off the factory floor but be able to access that data from workstations and control consoles within the harsh environments. Plus, fiber is also less susceptible to temperature fluctuations than copper is, and it can be submerged ?in water.
The choice for greater signal fidelity.
Fiber-based KVM extenders can carry more information with greater fidelity than copper-based ones can. For this reason, they’re ideal for high-data-rate systems in which multimedia workstations are used.
Newer KVM extenders enable you to send both DVI and keyboard and mouse signals over the same fiber cable, transmitting video digitally for zero signal loss. This way, you can get HD-quality resolution even at very long distances from the source. Users in university or government R&D, broadcasting, healthcare—basically anyone who depends on detailed image rendering—can benefit from this technology.
The choice for data security.
Plus, your data is safe when using fiber to connect a workstation with a CPU or server under lock and key. It doesn’t radiate signals and is extremely difficult to tap. If the cable is tapped, it’s very easy to monitor because the cable leaks light, causing the entire system to fail. If an attempt is made to break the physical security of your fiber system, you’ll know it.
Many IT managers in military, government, finance, and healthcare choose fiber-based KVM extenders for this very reason. Plus corporations, aware of rising data privacy concerns over customer billing information and the need to protect intellectual property, use this type of extension technology in their offices, too.
Considerations for fiber-based KVM extension.
Before selecting a fiber-based KVM extender, it’s important to know the limitations of your system. You need to know where couplers, links, interconnect equipment, and other devices are going to be placed. If it’s a longer run, you have to determine whether multimode or single-mode fiber cable is needed.
The most important consideration in planning cabling for fiber-based KVM extension is the power budget specification of device connection. The receiver at the remote end has to receive the light signal at a certain level. This value, called the loss budget, tells you the amount of loss in decibels (dB) that can be present in the link between the two devices before the units fail to perform properly.
Specifically, this value takes the fiber type (multimode or single-mode) and wavelength you intend to use—and the amount of expected in-line attenuation—into consideration. This is the decrease of signal strength as it travels through the fiber cable. In the budget loss calculation, you also have to account for splices, patch panels, and connectors, where additional dBs may lost in the entire end-to-end fiber extension. If the measured loss is less than the number calculated by your loss budget, your installation is good.
Testers are available to determine if the fiber cabling supports your intended application. You can measure how much light is going to the other end of the cable. Generally, these testers give you the results in dB lost, which you then compare to the loss budget to determine your link loss margin.
Also, in some instances, particularly when using single-mode fiber to drive the signal farther, the signal may be too strong between connected devices. This causes the light signal to reflect back down the fiber cable, which can corrupt data, result in a faulty transmission, and even damage equipment. To prevent this, use fiber attenuators. They’re used with ?single-mode fiber optic devices and cable to filter the strength of the fiber optic signal from the transmitter’s LED output so it doesn’t overwhelm the receiver. Depending on the type of attenuator attached to the devices at each end of the link, you can diminish the strength of the light signal a variable amount by a certain number of decibels.
Need help calculating your budget loss? Call our FREE Tech Support. If necessary, they can even recommend a fusion splicing fiber kit, a fiber tester, or a signal attenuator for your specific requirements.
Black Box Explains...KVMoIP access technology.
KVMoIP access technology extends keyboard, video, and mouse (KVM) signals from any computer or server over TCP/IP via a LAN, WAN, or Internet connection. Through this KVM over IP (KVMoIP)... more/see it nowconnection, remote users can access and control a number of servers simultaneously from wherever they are, inside or outside the organization, and anywhere in the world. This technology works in diverse hardware environments and is ideal for managing multilocation data centers and branch offices.
These capabilities translate into real savings for companies having to deal with the proliferation of servers in many offices, particularly for corporations and government agencies required to deliver 24/7 uptime and real-time access to mission-critical servers 365 days a year.
KVMoIP products combine the advantages of remote access software with the benefits of KVM switching technology. Like most KVM switches, KVMoIP products don’t require any software to be loaded on the host computers. They interface directly with the keyboard, monitor, and mouse connectors of the host computer or KVM switch. Circuitry within the KVMoIP device digitizes the incoming video signal and processes it into digital data that is communicated to a viewer program running on a remote client computer over a LAN/WAN or the public Internet.
By addressing network issues from a remote location, you can simply manage issues from your desk, or even save yourself the hassle of traveling to a site in the middle of the night. Use a browser-based connection, even a cell phone or PDA, to reboot or administer a roomful of servers remotely—a real convenience.
KVMoIP products that feature virtual media technology take that convenience further. They enable a remote user to effortlessly move files from a mass storage device—a USB flash drive or CD-ROM drive, for instance—from your location to the computer on which you’re working. Cost savings are realized through reduced downtime and less travel. Plus, in some cases, there‘s no to need replace existing KVM switches with proprietary ones to get a KVMoIP server-control solution.
The Black Box difference
Black Box® ServSwitch™ KVMoIP solutions go further than many other KVMoIP products on the market. They not only enable you to access remote servers, but they do this at the BIOS level—important when you go need to troubleshoot from off-site and don’t want to a dispatch
a technician. Install or recover software applications and install OS patches from your location anywhere in the world. Plus, this BIOS-level control is possible regardless of the server’s brand or model and even works if the operating system is down.
The ServReach™ system is also designed for IT managers seeking global centralized KVM management in a world of mushrooming servers and complexity. This global platform works by consolidating all server access and devices via locally connected KVMoIP devices. All this hardware is then united under a single management appliance or software “umbrella” providing global, yet fully secure, out-of-band control.
The ServReach system works seamlessly with more than 500 variations of analog KVM switches from a multitude of vendors and manufacturers. Because it’s vendor independent, you don’t need to replace your data center’s entire KVM infrastructure. ServReach simply
grafts global centralized KVM management onto the existing server room/data center, aligning with third-party KVM switches already in place. This is done with the ServReach KVMGate (KVIP1000A), an IP gateway device designed to connect to each of the legacy KVM devices to provide global centralized KVM management for a fraction of the cost of competitive systems, ensuring a faster and greater ROI.
If you’re planning on opening or acquiring a new data center or a large number of new servers, the ServReach KVManager (KVMGR) is the answer. It can provide any-by-any access via the ServReach KVMCube (KVIP1001A), a compact, rackmountable, digital matrix IP device that gives fully secure, non-blocking access for any of the users to any of the servers simultaneously.
In addition, the servers controlled by legacy KVM switches via KVMGate can still be managed by the ServReach KVManager at
the same time as the new servers controlled through a gateway. With all the servers under the same KVManager umbrella, data centers can now easily acquire new servers and devices without having to worry about how to incorporate the new infrastructure with the old.
For more information on Black Box KVMoIP solutions, visit blackbox.com/go/ServReach. Find out more by watching a KVMoIP demo and accessing related white papers. collapse
Black Box Explains...CAT5: When more isnt always better.
In data communications applications, using products that exceed required capacities is usually not a problem. For example, if a 28.8K modem is required, a 33.6K or 56K model will work... more/see it nowjust fine.
But sometimes, more isnt better. Take KVM extenders designed to expect CAT5 and only CAT5 cable. Youd expect that Category 3 cable wouldnt be effective with these products, and you would be right.
But you may also assume that if Category 5 cable works fine, Category 5e, Category 6, and other higher-capacity cables would work even better. Unfortunately, this isnt the case, and heres why:
KVM extenders from many manufacturers, including ServSwitch CAT5 KVM Extenders, are designed specifically for the Category 5 specs defined by the TIA/EIA standard. Higher-level cables, such as Category 5e, have different characteristics and specifications. Although differences—specifically twist ratios—might seem small, they can have a negative impact on these extenders, which are expecting a true Category 5 transmission.
So with ServSwitch CAT5 KVM Extenders, you can think big with CAT5—just dont think bigger. collapse
Black Box Explains...Category 5, 5e, and 6 copper wiring standards.
The ABCs of standards
There are two primary organizations dedicated to developing and setting structured cabling standards. In North America, standards are issued by the Telecommunications Industry Association (TIA),... more/see it nowwhich is accredited by the American National Standards Institute (ANSI). The TIA was formed in April 1988 after a merger with the Electronics Industry Association (EIA). That’s why its standards are commonly known as ANSI/TIA/EIA, TIA/EIA, or TIA.
Globally, the organizations that issue standards are the International Electrotechnical Commission (IEC) and the International Organization for Standardization (ISO). Standards are often listed as ISO/IEC. Other organizations include the Canadian Standards Association (CSA), CENELEC (European Committee for Electrotechnical Standardizations), and the Japanese Standards Association (JSA/JSI).
The committees of all these organizations work together and the performance requirements of the standards are very similar. But there is some confusion in terminology.
The TIA cabling components (cables, connecting hardware, and patch cords) are labeled with a ”category.” These components together form a permanent link or channel that is also called a ”category.” The ISO/IEC defines the link and channel requirements with a ”class” designation. But the components are called a ”category.”
Category 5 (CAT5), ratified in 1991, was the de facto standard for 100-Mbps networks during the 1990s. It is no longer recognized by the TIA/EIA for use in data networking.
Category 5e (CAT5e)–ISO/IEC 11801 Class D, ratified in 1999, is designed to enable twisted-pair cabling to support full-duplex, 4-pair transmission in 100-MHz applications. The CAT5e standard added more headroom and established new requirements to support Gigabit Ethernet over a worst case four-connector channel. These include stricter specs for Near-End Crosstalk (NEXT) and Return Loss (RL). The standard also introduced the required measurements for Power Sum Near-End Crosstalk (PS-NEXT), Equal-Level Far-End Crosstalk (EL-FEXT), and Power Sum Equal-Level Far-End Crosstalk (PS-ELFEXT). CAT5e is still used in many organizations, although it is no longer recognized for new installations.
Category 6 (CAT6)–Class E has a specified frequency of 250 MHz, significantly improved bandwidth capacity over CAT5e, and easily handles Gigabit Ethernet transmissions. In recent years, it has been the cable of choice for new structured cabling systems. CAT6 supports 1000BASE-T and, depending on the installation, 10GBASE-T (10-GbE).
10-GbE over CAT6 introduces the problem of Alien Crosstalk (ANEXT), the unwanted coupling of signals between adjacent pairs and cables. Because ANEXT in CAT6 10-GbE networks is so dependent on installation practices, TSB-155 qualifies 10-GbE over CAT6 up to 55 meters and requires it to be 100% tested. To mitigate ANEXT in CAT6, it is recommended that you unbundle the cables and increase the separation between the cables.
Augmented Category 6 (CAT6a)–Class Ea was ratified in February 2008. This standard calls for 10-Gigabit Ethernet data transmission over a 4-pair copper cabling system up to 100 meters. CAT6a extends CAT6 electrical specifications from 250 MHz to 500 MHz. It introduces the ANEXT requirement. It also replaces the term Equal Level Far-End Crosstalk (ELFEXT) with Attenuation to Crosstalk Ratio, Far-End (ACRF) to mesh with ISO terminology. CAT6a provides improved insertion loss over CAT6. It is a good choice for noisy environments with lots of EMI. CAT6a is also well-suited for use with PoE+.
CAT6a UTP cable is significantly larger than CAT6 cable. It features larger conductors, usually 22 AWG, and is designed with more space between the pairs to minimize ANEXT. The outside diameter of CAT6a cable averages 0.29–0.35" compared to 0.21–0.24" for CAT6 cable. This reduces number of cables you can fit in a conduit. At a 40% fill ratio, you can run three CAT6a cables in a 3/4" conduit vs. five CAT6 cables.
There are two types of CAT6a cable, UTP and F/UTP. For a discussion of the differences, see the white paper in our Resources section.
Category 7 (CAT7)–Class F was published in 2002 by the ISO/IEC. It is not a TIA recognized standard. Class 7 specifies minimum performance standards for fully shielded cable (individually shielded pairs surrounded by an overall shield) transmitting data at rates up to 600 MHz. It offers greater capacity for demanding applications such as broadband video. It’s also well suited for applications where fiber optic cable would typically be used—but it costs less. Because each CAT7 pair is fully shielded, it's ideal for areas prone to EMI/RFI. Class 7 cable offers two connector styles: the standard RJ plug and a non-RJ-style plug and socket interface specified in IEC 61076-2-104:2.
Category 7a (CAT7a)–Class Fa is currently in ISO standards for channel performance in Amendment 1, recently component performance has been ratified in Amendment 2. The formal names are ISO 11801 Amendment 1 (2008) and ISO 11801 Amendment 2 (2010). Class Fa cable is a fully shielded cable that extends frequency from 600 MHz to 1000 MHz. It can easily handle 10-GbE and offers users a lifespan of 15 years or more. It has even been discussed that Class Fa cable is the future for 40GBASE-T or more.
For a comparison chart of category performance standards, see the Buyer's Guide in the Resources section.
Black Box Explains...USB 2.0 and USB OTG.
The Universal Serial Bus (USB) hardware (plug-and-play) standard makes connecting peripherals to your computer easy.
USB 1.1, introduced in 1995, is the original USB standard. It has two data rates:... more/see it now12 Mbps for devices such as disk drives that need high-speed throughput and 1.5 Mbps for devices such as joysticks that need much lower bandwidth.
In 2002, a newer specification, USB 2.0, or Hi-Speed USB 2.0, gained wide acceptance in the industry. This version is both forward- and backward-compatible with USB 1.1. It increases the speed of the peripheral to PC connection from 12 Mbps to 480 Mbps, or 40 times faster than USB 1.1!
This increase in bandwidth enhances the use of external peripherals that require high throughput, such as CD/DVD burners, scanners, digital cameras, video equipment, and more. USB 2.0 supports demanding applications, such as Web publishing, in which multiple high-speed devices run simultaneously. USB 2.0 also supports Windows® XP through a Windows update.
An even newer USB standard, USB On-The-Go (OTG), is also in development. USB OTG enables devices other than a PC to act as a host. It enables portable equipment—such as PDAs, cell phones, digital cameras, and digital music players—to connect to each other without the need for a PC host.
USB 2.0 specifies three types of connectors: the A connector, the B connector, and the Mini B connector. A fourth type of connector, the Mini A (used for smaller peripherals such as mobile phones), was developed as part of the USB OTG specification. collapse
Black Box Explains...Upgrading from VGA to DVI video.
Many new PCs no longer have traditional Cathode Ray Tube (CRT) computer monitors with a VGA interface. The latest high-end computers have Digital Flat Panels (DFPs) with a Digital Visual... more/see it nowInterface (DVI). Although most computers still have traditional monitors, the newer DFPs are coming on strong because flat-panel displays are not only slimmer and more attractive on the desktop, but they’re also capable of providing a much sharper, clearer image than a traditional CRT monitor.
The VGA interface was developed to support traditional CRT monitors. The DVI interface, on the other hand, is designed specifically for digital displays and supports the high resolution, the sharper image detail, and the brighter and truer colors achieved with DFPs.
Most flat-panel displays can be connected to a VGA interface, even though using this interface results in inferior video quality. VGA simply cant support the image quality offered by a high-end digital monitor. Sadly, because a VGA connection is possible, many computer users connect their DFPs to VGA and never experience the stunning clarity their flat-panel monitors can provide.
It’s important to remember that for your new DFP display to work at its best, it must be connected to a DVI video interface. You should upgrade the video card in your PC when you buy your new video monitor. Your KVM switches should also support DVI if you plan to use them with DFPs. collapse
Black Box Explains…TEMPEST.
TEMPEST is an acronym for Telecommunications Electronics Material Protected from Emanating Spurious Transmissions. It pertains to technical security countermeasures, standards, and instrumentation that prevent or minimize the exploitation of vulnerable... more/see it nowdata communication equipment by technical surveillance or eavesdropping.
What puts your data communication equipment at risk?
Many things. But first and foremost, its microchip.
Any device with a microchip generates an electromagnetic field, often called a “compromising emanation” by security experts. With the proper surveillance equipment, these emanations can be intercepted and the signal reconstructed and analyzed. Unprotected equipment can, in fact, emit a signal into the air like a radio station—and nobody wants to risk his or her job and a whole lot more by broadcasting national security or trade secrets to the wrong people.
Some of the most vulnerable devices are speakerphones, printers, fax machines, scanners, external disc drives, and other high-speed, high-bandwidth peripherals. If the snoop is using a high-quality interception device, your equipment’s signals can be acquired up to several hundred feet away.
Arguably one of the most vulnerable pieces of equipment is an analog VGA monitor. If a spy were to introduce a Trojan into your system, he or she could monitor and store key presses and passwords used during the day. When the system’s not in use at night, the spy could pulse the VGA screen with grayscale images that have a strong signal at particular frequencies. VGA uses single-ended signaling that has a high common-mode emission level not protected by cable shielding, and it’s possible to monitor these signals outside the secure zone using a radio receiver. Even without a Trojan, a sophisticated receiver located nearby picks up and views what’s on the VGA monitor.
What TEMPEST is and isn’t.
It should come as no surprise that the Federal government became concerned about signal leakage. In fact, its interest goes back to the days of World War I when the Army was trying to exploit weaknesses of enemy combat phones and radio transmitters. Since then, the scope of the government’s interests has broadened beyond battlefield equipment. In the last
40 years, the National Security Agency (NSA) has taken several industry measurement standards and greatly beefed them up. These enhanced criteria are commonly referred to as the TEMPEST standards (although the NSA also calls them EMSEC standards, short for “emissions security”).
TEMPEST disciplines involve designing circuits to minimize emanations and the application of appropriate shielding, grounding, and bonding. Some methods used include radiation screening, alarms, and isolation.
A TEMPEST-approved device resembles its non-secure version with a few key differences. If it’s a network component such as a switch, it comes in a heavy metal case. It also has special shielding, a modified power supply, and perhaps a few other modifications from the standard model. If you need to open the device’s case,
a special torque wrench for use with TEMPEST-only products is required.
TEMPEST test equipment is very expensive and is sold exclusively to government agencies. Nobody can sell you commercial TEMPEST testing equipment. And if someone offers you a “TEMPEST surveillance system,” you need to be aware of two things: First, TEMPEST is counter-surveillance science and the offer is a fraud; second, the salesperson is committing a federal felony.
If you buy surveillance equipment—authentic or not—then you have also commited a felony. Construction of, possession of, attempting a sale of, or attempting a purchase of said surveillance equipment is illegal. Even if the product purchased is a hoax, the law will take your intentions into account as much as the salesperson’s. Don’t be surprised if you
both go to jail.
In the United States, you can learn about TEMPEST testing only in special schools sanctioned by, if not run by, the NSA. Courses to earn the TEMPEST Technician or TEMPEST Engineer certifications are very expensive. These classes are offered to a limited number of people who have a very high level of security clearance and who will be working on TEMPEST-approved equipment all the time.
All TEMPEST-approved communication devices have a rating based on their application and/or environment.
Type 1: This rating is for classified cryptographic equipment used for national security purposes. It’s endorsed by the NSA for securing telecommunications and automated information systems and for the protection of classified or sensitive U.S. Government information.
Type 2: This rating is for unclassified cryptographic equipment used by U.S. Government agencies, state and local governments, and sponsored U.S. Government contractors. It’s endorsed by the NSA for securing telecommunications and automated information systems and for the protection of unclassified but sensitive information, such as contract bids.
Type 3: This rating is for unclassified commercial cryptographic equipment that implements an algorithm registered with the National Institute of Standards and Technology (NIST). It’s for use in protecting sensitive information, like a corporation’s network communications. collapse