Black Box Explains...KVMoIP access technology.
KVMoIP access technology extends keyboard, video, and mouse (KVM) signals from any computer or server over TCP/IP via a LAN, WAN, or Internet connection. Through this KVM over IP (KVMoIP)... more/see it nowconnection, remote users can access and control a number of servers simultaneously from wherever they are, inside or outside the organization, and anywhere in the world. This technology works in diverse hardware environments and is ideal for managing multilocation data centers and branch offices.
These capabilities translate into real savings for companies having to deal with the proliferation of servers in many offices, particularly for corporations and government agencies required to deliver 24/7 uptime and real-time access to mission-critical servers 365 days a year.
KVMoIP products combine the advantages of remote access software with the benefits of KVM switching technology. Like most KVM switches, KVMoIP products don’t require any software to be loaded on the host computers. They interface directly with the keyboard, monitor, and mouse connectors of the host computer or KVM switch. Circuitry within the KVMoIP device digitizes the incoming video signal and processes it into digital data that is communicated to a viewer program running on a remote client computer over a LAN/WAN or the public Internet.
By addressing network issues from a remote location, you can simply manage issues from your desk, or even save yourself the hassle of traveling to a site in the middle of the night. Use a browser-based connection, even a cell phone or PDA, to reboot or administer a roomful of servers remotely—a real convenience.
KVMoIP products that feature virtual media technology take that convenience further. They enable a remote user to effortlessly move files from a mass storage device—a USB flash drive or CD-ROM drive, for instance—from your location to the computer on which you’re working. Cost savings are realized through reduced downtime and less travel. Plus, in some cases, there‘s no to need replace existing KVM switches with proprietary ones to get a KVMoIP server-control solution.
The Black Box difference
Black Box® ServSwitch™ KVMoIP solutions go further than many other KVMoIP products on the market. They not only enable you to access remote servers, but they do this at the BIOS level—important when you go need to troubleshoot from off-site and don’t want to a dispatch
a technician. Install or recover software applications and install OS patches from your location anywhere in the world. Plus, this BIOS-level control is possible regardless of the server’s brand or model and even works if the operating system is down.
The ServReach™ system is also designed for IT managers seeking global centralized KVM management in a world of mushrooming servers and complexity. This global platform works by consolidating all server access and devices via locally connected KVMoIP devices. All this hardware is then united under a single management appliance or software “umbrella” providing global, yet fully secure, out-of-band control.
The ServReach system works seamlessly with more than 500 variations of analog KVM switches from a multitude of vendors and manufacturers. Because it’s vendor independent, you don’t need to replace your data center’s entire KVM infrastructure. ServReach simply
grafts global centralized KVM management onto the existing server room/data center, aligning with third-party KVM switches already in place. This is done with the ServReach KVMGate (KVIP1000A), an IP gateway device designed to connect to each of the legacy KVM devices to provide global centralized KVM management for a fraction of the cost of competitive systems, ensuring a faster and greater ROI.
If you’re planning on opening or acquiring a new data center or a large number of new servers, the ServReach KVManager (KVMGR) is the answer. It can provide any-by-any access via the ServReach KVMCube (KVIP1001A), a compact, rackmountable, digital matrix IP device that gives fully secure, non-blocking access for any of the users to any of the servers simultaneously.
In addition, the servers controlled by legacy KVM switches via KVMGate can still be managed by the ServReach KVManager at
the same time as the new servers controlled through a gateway. With all the servers under the same KVManager umbrella, data centers can now easily acquire new servers and devices without having to worry about how to incorporate the new infrastructure with the old.
For more information on Black Box KVMoIP solutions, visit blackbox.com/go/ServReach. Find out more by watching a KVMoIP demo and accessing related white papers. collapse
Black Box Explains...Digital Visual Interface (DVI) connectors.
The DVI (Digital Video Interface) technology is the standard digital transfer medium for computers while the HDMI interface is more commonly found on HDTVs, and other high-end displays.
The Digital... more/see it nowVisual Interface (DVI) standard is based on transition-minimized differential signaling (TMDS). There are two DVI formats: Single-Link and Dual-Link. Single-link cables use one TMDS-165 MHz transmitter and dual-link cables use two. The dual-link cables double the power of the transmission. A single-link cable can transmit a resolution ?of 1920 x 1200 vs. 2560 x 1600 for a dual-link cable.
There are several types of connectors: ?DVI-D, DVI-I, DVI-A, DFP, and EVC.
- DVI-D is a digital-only connector for use between a digital video source and monitors. DVI-D eliminates analog conversion and improves the display. It can be used when one or both connections are DVI-D.
- DVI-I (integrated) supports both digital and analog RGB connections. It can transmit either a digital-to-digital signals or an analog-to-analog signal. It is used by some manufacturers on products instead of separate analog and digital connectors. If both connectors are DVI-I, you can use any DVI cable, but a DVI-I is recommended.
- DVI-A (analog) is used to carry an DVI signal from a computer to an analog VGA device, such as a display. If one or both of your connections are DVI-A, use this cable. ?If one connection is DVI and the other is ?VGA HD15, you need a cable or adapter ?with both connectors.
- DFP (Digital Flat Panel) was an early digital-only connector used on some displays.
- EVC (also known as P&D, for ?Plug & Display), another older connector, handles digital and analog connections.
Black Box Explains... Plasma vs. LCD Screens
When deciding whether to use plasma or liquid crystal diode (LCD) displays for your applications, you need to consider many factors. Both provide brilliant color, sharp text contrast, and crystal-clear... more/see it nowimages. But the way in which plasma and LCD screens process and display incoming video/computer signals is markedly different.
Compare and contrast.
Both plasma and LCD technology provide stark enough contrasts to make displays sharp and pleasing. But when it comes to contrast output, plasma technology outperforms LCD screens. Some plasma displays have a 3000:1 contrast ratio, which is the measure of the blackest black compared to the whitest white. LCDs use electric charges to untwist liquid crystals, thereby blocking light and emitting darker pixels. Despite this process, LCD displays dont produce more than a 1000:1 contrast ratio.
Clarity thats light waves ahead.
Pixels contain enough information to produce every color in the spectrum. Because plasmas use each and every pixel on their screens, color information is reproduced more accurately. Plasma screens display moving images with remarkable clarity, though burn-in can be an issue. For displays with lots of light and dark imagery, plasma panels provide excellent performance with their high-contrast levels, color saturation, and overall brightness.
LCD displays, on the other hand, manipulate light waves and reproduce colors by subtracting colors from white light. Though this makes it more difficult to maintain color accuracy and vibrancy compared to plasma screens, LCDs have an advantage with their higher-than-average number of pixels per square inch. These additional pixels make LCD technology better at displaying static images from computers or VGA sources in full-color detail. Plus, theres no flicker and very little screen burn-in.
Applications with large amounts of data—such as those found on spreadsheets—display particularly well on LCD monitors.
Brilliant displays that go on and on.
With LCD screens, there are essentially no parts to wear out. LCD screens last as long as their backlights do, with displays lasting, on average, 50,000–75,000 hours. Thats why LCD screens are especially good for long-term applications, such as digital signage or displays that require around-the-clock use.
Plasma screens, however, use a combination of electric currents and noble gases (argon, neon, and xenon) to produce a glow, which in turn yields brilliant color. The half-life of these gases, however, is only around 25,000 hours. The glow they produce grows dimmer over time.
The right angle can make all the difference.
Plasmas light every pixel on the screen, making the brightness on the screen consistent and giving plasmas the edge when it comes to viewing angles. In fact, plasma screens have as much as a 160° viewing angle compared to LCDs. This makes viewing the images on the screen easier to see from a variety of angles. In doing so, however, plasmas consume much more power.
LCDs display at 130–140° angles, but their use of fluorescent backlighting requires much less power to operate than plasmas. This also makes LCDs less prone to burn-in or ghosting of images.
Black Box Explains... Using fiber optics for KVM extension.
If you‘re sending KVM signals between buildings for an extended distance, in areas supplied by different power sources, in an electrically noisy environment, or where data security is a big... more/see it nowconcern, you need to use a fiber optic-based KVM extender.
Optical fiber is an ideal transmission medium not only for backbone and horizontal connection, but also for workstation-to-backracked CPU or server links. It works very well in applications where you need to transfer large, bandwidth-consuming data files over long distances, and where you require immunity from electrical interference or data theft.
The choice for extraordinary reach.
Fiber doesn’t have the 100-meter (328-ft.) distance limitation that UTP copper without a booster does. Fiber distances can range from 300 meters (984.2 ft.) to 70 kilometers (24.8 mi.), depending on the cable, wavelength, and network. With fiber-based KVM extenders, the transmitter converts conventional data signals into a modulated light beam, then transports the beam via the fiber to a receiver, which converts the light back into electrical signals.
Many newer fiber-based KVM extenders support both analog and digital transmission. Often, they work by digitizing video output from a local CPU, then sending it across fiber link to a remote unit, which converts it back to the original analog signal. In many cases, one fiber of the fiber pair transmits monitor video serially and the second fiber sends remote mouse and keyboard information back to the local CPU.
The choice for ensuring signal integrity.
Because fiber is made of glass, which is an insulator, no electric current can flow through. It’s immune to electromagnetic interference and radio-frequency interference (EMI/RFI), crosstalk, impedance problems, and more. This is why fiber-based KVM extenders are beneficial to users in process control, engineering, utility, and factory automation applications. The users need to keep critical information safe and secure off the factory floor but be able to access that data from workstations and control consoles within the harsh environments. Plus, fiber is also less susceptible to temperature fluctuations than copper is, and it can be submerged ?in water.
The choice for greater signal fidelity.
Fiber-based KVM extenders can carry more information with greater fidelity than copper-based ones can. For this reason, they’re ideal for high-data-rate systems in which multimedia workstations are used.
Newer KVM extenders enable you to send both DVI and keyboard and mouse signals over the same fiber cable, transmitting video digitally for zero signal loss. This way, you can get HD-quality resolution even at very long distances from the source. Users in university or government R&D, broadcasting, healthcare—basically anyone who depends on detailed image rendering—can benefit from this technology.
The choice for data security.
Plus, your data is safe when using fiber to connect a workstation with a CPU or server under lock and key. It doesn’t radiate signals and is extremely difficult to tap. If the cable is tapped, it’s very easy to monitor because the cable leaks light, causing the entire system to fail. If an attempt is made to break the physical security of your fiber system, you’ll know it.
Many IT managers in military, government, finance, and healthcare choose fiber-based KVM extenders for this very reason. Plus corporations, aware of rising data privacy concerns over customer billing information and the need to protect intellectual property, use this type of extension technology in their offices, too.
Considerations for fiber-based KVM extension.
Before selecting a fiber-based KVM extender, it’s important to know the limitations of your system. You need to know where couplers, links, interconnect equipment, and other devices are going to be placed. If it’s a longer run, you have to determine whether multimode or single-mode fiber cable is needed.
The most important consideration in planning cabling for fiber-based KVM extension is the power budget specification of device connection. The receiver at the remote end has to receive the light signal at a certain level. This value, called the loss budget, tells you the amount of loss in decibels (dB) that can be present in the link between the two devices before the units fail to perform properly.
Specifically, this value takes the fiber type (multimode or single-mode) and wavelength you intend to use—and the amount of expected in-line attenuation—into consideration. This is the decrease of signal strength as it travels through the fiber cable. In the budget loss calculation, you also have to account for splices, patch panels, and connectors, where additional dBs may lost in the entire end-to-end fiber extension. If the measured loss is less than the number calculated by your loss budget, your installation is good.
Testers are available to determine if the fiber cabling supports your intended application. You can measure how much light is going to the other end of the cable. Generally, these testers give you the results in dB lost, which you then compare to the loss budget to determine your link loss margin.
Also, in some instances, particularly when using single-mode fiber to drive the signal farther, the signal may be too strong between connected devices. This causes the light signal to reflect back down the fiber cable, which can corrupt data, result in a faulty transmission, and even damage equipment. To prevent this, use fiber attenuators. They’re used with ?single-mode fiber optic devices and cable to filter the strength of the fiber optic signal from the transmitter’s LED output so it doesn’t overwhelm the receiver. Depending on the type of attenuator attached to the devices at each end of the link, you can diminish the strength of the light signal a variable amount by a certain number of decibels.
Need help calculating your budget loss? Call our FREE Tech Support. If necessary, they can even recommend a fusion splicing fiber kit, a fiber tester, or a signal attenuator for your specific requirements.
Black Box Explains... TEMPEST standard and Common Criteria (EAL4+)
Common Criteria (EAL4+) defines a common set of tests regarding the process of the design, testing, verification, and shipping of new security products. Common Criteria enables customers to assess a... more/see it nowlevel of trust in how a product has been designed, tested, built, and shipped.
TEMPEST testing, while classified, is regarded as a process that assesses the threat of data linking by various covert electromagnetic eavesdropping mechanisms. The TEMPEST designation is often required by military organizations. TEMPEST, as a security standard, pertains to technical security countermeasures, standards, and instrumentation that prevent or minimize the exploitation of vulnerable data
communications equipment by technical surveillance or
Both testing standards are important, they just test for different things.
TEMPEST-Secure KVM Switches
For 2 or 4 ports, with USB, and DVI-I or VGA the ServSwitch Secure KVM Switch with USB (page 382) provides control and separation of up to four PCs connected to secure and unsecure networks through just one keyboard, monitor, and mouse.
High port-to-port electrical isolation, which facilitates data separation (RED/BLACK).
NSA tested and TEMPEST approved for and by the U.S. Air Force.
The low radiated emissions profile meets the appropriate national requirements for conducted/radiated electromagnetic emissions.
Switches are permanently hard wired, preventing access from one CPU to the others or access from one network to others.
External tamper-evident seals make it easy to spot attempted tampering.
Channel-to-channel 60-dB crosstalk isolation protects against signal snooping, so software tools and applications cannot be used to access any connected computer from another connected computer.
Users can safely switch among as many as four computers operating at different classification levels.
Common Criteria Evaluation Assurance to Level 4+
A newly developed switch, the ServSwitch Secure with USB and DVI, or VGA, or VGA and a Card Reader (pages 384–385), is being evaluated for Common Criteria Evaluation Assurance to Level 4+ (EAL4+). Common Criteria is an international standardized process for information technology security evaluation, validation, and certification. The Common Criteria scheme is supported by the National Security Agency through the National Information Assurance Program (NIAP).
The ServSwitch Secure KVM Switch with USB surpasses the security profiles of most other KVM switches. Along with the tamper-evident seals and other security features already mentioned, ServSwitch Secure KVM Switch with USB models feature these security measures:
The flow of keyboard and mouse data is unidirectional, so it’s not possible for the computer to send data along the keyboard and mouse signaling channels.
Keyboard and mouse devices can only be enumerated at the keyboard and mouse ports. Any other USB peripherals connected to these ports will be prohibited from operating, preventing, for example, a USB thumb drive from uploading or downloading unauthorized data.
At each channel switchover, the USB host controller circuit, which controls shared peripherals, erases its entire RAM. This prevents residual data from remaining in the channel after a channel change and being transferred to another computer.
Every time the channel is changed, shared USB peripherals are powered down, reset, and re-enumerated.
Every time the channel is changed, the USB host controller is also powered down and reset, further ensuring no transfer of residual data.
Dedicated DDC bus and EDID memory emulation at each port prevent the shared monitor link from being used as a covert attack channel.
With only one selection button per channel, the ServSwitch Secure models enable direct and unambiguous channel selection.
Hotkey and mouse switching are excluded, preventing remote control of the switch.
Ports are powered through the computer’s USB ports, while the shared keyboard, mouse, and monitor are powered by the switch’s power supply. The lack of a common power supply minimizes electronic signaling.
The switches with card readers have additional features, including active authentication verification and active tamper detection. collapse
Black Box Explains...Multi-user ServSwitch products vs. multipoint access ServSwitch products.
A multi-user ServSwitch, such as the Matrix ServSwitch, enables two or more users to access different servers at the same time. So, for instance, one user can access “Server A”... more/see it nowwhile another user accesses “Server B.” This is considered a “true two-channel” architecture because two users have independent access to CPUs. It should be pointed out that multiple users cannot access the same server at the same time.
A multipoint access ServSwitch, such as the ServSwitch Duo, provides two access points for control stations but requires that both users view the same server at the same time. So, if one user is accessing “Server A” on his screen, the other user is also seeing “Server A” on his screen. If the second user switches to “Server B,“ the first user will also switch to “Server B.” Only one of these users is actually in control. The user in control stays in control until his workstation is inactive for a period of time (selectable). Then the other station can take control.
A multipoint access ServSwitch is useful when simultaneous, independent access is not required—just the ability to access CPUs from more than one place.
Black Box Explains...Types of KVM switches.
Black Box has the keyboard/video switches you need to share one CPU between several workstations or to control several CPUs from one monitor and keyboard.
If you do a lot of... more/see it nowswitching, you need premium switches—our top-of-the-line ServSwitch™ KVM switches give you the most reliable connections for the amount of KVM equipment supported. With ServSwitch KVM switches, you can manage as many CPUs as you want from just one workstation, and you can access any server in any computer room from any workstation. Eliminating needless equipment not only saves you money, it also gives you more space and less clutter. Plus, you can switch between PCs, Sun®, and Mac® CPUs. ServSwitch KVM switches can also cut your electricity and cooling costs because by sharing monitors, you use less power and generate less heat.
If your switching demands are very minor, you may not need products as advanced as ServSwitch. Black Box offers switches to fill less demanding needs. Most of these are manual switches or basic electronic switches, which don’t have the sophisticated emulation technology used by the ServSwitch.
For PCs with PS/2® keyboards, try our Keyboard/Video Switches. They send keyboard signals, so your CPUs boot up as though they each have their own keyboard.
With the RS/6000™ KVM Switch, you can run up to six RS/6000 servers from one workstation. Our Keyboard/ Video Switch for Mac enables you to control up to two Mac CPUs from one keyboard and monitor.
With BLACK BOX® KVM Switches, you can share a workstation with two or four CPUs. They’re available in IBM® PC and Sun Workstation® configurations.
You’ll also find that our long-life manual Keyboard/Video Switches are perfect for basic switching applications. collapse