Black Box Explains...DIN rails.
A DIN rail is an industry-standard metal rail, usually installed inside an electrical enclosure, which serves as a mount for small electrical devices specially designed for use with DIN rails.... more/see it nowThese devices snap right onto the rails, sometimes requiring a set screw, and are then wired together.
Many different devices are available for mounting on DIN rails: terminal blocks, interface converters, media converter switches, repeaters, surge protectors, PLCs, fuses, or power supplies, just to name a few.
DIN rails are a space-saving way to accommodate components. And because DIN rail devices are so easy to install, replace, maintain, and inspect, this is an exceptionally convenient system that has become very popular in recent years.
A standard DIN rail is 35-mm wide with raised-lip edges, its dimensions outlined by the Deutsche Institut für Normung, a German standardization body. Rails are generally available in aluminum or steel and may be cut for installation. Depending on the requirements of the mounted components, the rail may need to be grounded. collapse
The difference between unmanaged, managed, and Web-smart switches
With regard to management options, the three primary classes of switches are unmanaged, managed, and Web smart. Which you choose depends largely on the size of your network and how... more/see it nowmuch control you need over that network.
Unmanaged switches are basic plug-and-play switches with no remote configuration, management, or monitoring options, although many can be locally monitored and configured via LED indicators and DIP switches. These inexpensive switches are typically used in small networks or to add temporary workgroups to larger networks.
Managed switches support Simple Network Management Protocol (SNMP) via embedded agents and have a command line interface (CLI) that can be accessed via serial console, Telnet, and Secure Shell. These switches can often be configured and managed as groups. More recent managed switches may also support a Web interface for management through a Web browser.
These high-end switches enable network managers to remotely access a wide range of capabilities including:
Enabling and disabling individual ports or port Auto MDI/MDI-X.
Port bandwidth and duplex control.
IP address management.
MAC address filtering.
Port mirroring to monitor network traffic.
Prioritization of ports for quality of service (QoS).
802.1X network access control.
Link aggregation or trunking.
Managed switches, with their extensive management capabilities, are at home in large enterprise networks where network administrators need to monitor and control a large number of network devices. Managed switches support redundancy protocols for increased network availability.
Web-smart switches—sometimes called smart switches or Web-managed switches—have become a popular option for mid-sized networks that require management. They offer access to switch management features such as port monitoring, link aggregation, and VPN through a simple Web interface via an embedded Web browser. What these switches generally do not have is SNMP management capabilities or a CLI. Web-smart switches must usually be managed individually rather than in groups.
Although the management features found in a Web-smart switch are less extensive than those found in a fully managed switch, these switches are becoming smarter with many now offering many of the features of a fully managed switch. Like managed switches, they also support redundancy protocols for increased network availability.
Black Box Explains...Media converters.
Media converters interconnect different cable types such as twisted pair, fiber, and coax within an existing network. They are often used to connect newer Ethernet equipment to legacy cabling.... more/see it nowThey can also be used in pairs to insert a fiber segment into copper networks to increase cabling distances and enhance immunity to electromagnetic interference (EMI).
Traditional media converters are purely Layer 1 devices that only convert electrical signals and physical media. They don’t do anything to the data coming through the link so they’re totally transparent to data. These converters have two ports—one port for each media type. Layer 1 media converters only operate at one speed and cannot, for instance, support both 10-Mbps and 100-Mbps Ethernet.
Some media converters are more advanced Layer 2 Ethernet devices that, like traditional media converters, provide Layer 1 electrical and physical conversion. But, unlike traditional media converters, they also provide Layer 2 services—in other words, they’re really switches. This kind of media converter often has more than two ports, enabling you to, for instance, extend two or more copper links across a single fiber link. They also often feature autosensing ports on the copper side, making them useful for linking segments operating at different speeds.
Media converters are available in standalone models that convert between two different media types and in chassis-based models that connect many different media types in a single housing.
Rent an apartment
Standalone converters convert between two media. But, like a small apartment, they can be outgrown. Consider your current and future applications before selecting a media converter. Standalone converters are available in many configurations, including 10BASE-T to multimode or single-mode fiber, 10BASE-T to Thin coax (ThinNet), 10BASE-T to thick coax (standard Ethernet), CDDI to FDDI, and Thin coax to fiber. 100BASE-T and 100BASE-FX models that connect UTP to single- or multimode fiber are also available. With the development of Gigabit Ethernet (1000 Mbps), media converters have been created to make the transition to high-speed networks easier.
...or buy a house.
Chassis-based or modular media converters are normally rackmountable and have slots that house media converter modules. Like a well-planned house, the chassis gives you room to grow. These are used when many Ethernet segments of different media types need to be connected in a central location. Modules are available for the same conversions performed by the standalone converters, and 10BASE-T, 100BASE-TX, 100BASE-FX, and Gigabit modules may also be mixed. collapse
Black Box Explains...PoE phantom power.
10BASE-T and 100BASE-TX Ethernet use only two pairs of wire in 4-pair CAT5/CAT5e/CAT6 cable, leaving the other two pairs free to transmit power for Power over Ethernet (PoE) applications. However,... more/see it nowGigabit Ethernet or 1000BASE-T uses all four pairs of wires, leaving no pairs free for power. So how can PoE work over Gigabit Ethernet?
The answer is through the use of phantom power—power sent over the same wire pairs used for data. When the same pair is used for both power and data, the power and data transmissions don’t interfere with each other. Because electricity and data function at opposite ends of the frequency spectrum, they can travel over the same cable. Electricity has a low frequency of 60 Hz or less, and data transmissions have frequencies that can range from 10 million to 100 million Hz.
10- and 100-Mbps PoE may also use phantom power. The 802.3af PoE standard for use with 10BASE-T and 100BASE-TX defines two methods of power transmission. In one method, called Alternative A, power and data are sent over the same pair. In the other method, called Alternative B, two wire pairs are used to transmit data, and the remaining two pairs are used for power. That there are two different PoE power-transmission schemes isn’t obvious to the casual user because PoE Powered Devices (PDs) are made to accept power in either format.
Black Box Explains…A terminal server by any other name.
A terminal server (sometimes called a serial server or a console server or a device server) is a hardware device that enables you to connect serial devices across a network.
Terminal... more/see it nowservers acquired their name because they were originally used for long-distance connection of dumb terminals to large mainframe systems such as VAX™. Today, the name terminal server refers to a device that connects any serial device to a network, usually Ethernet. In this day of network-ready devices, terminal servers are not as common as they used to be, but they’re still frequently used for applications such as remote connection of PLCs, sensors, or automatic teller machines.
The primary advantage of terminal servers is that they save you the cost of running separate RS-232 devices. By using a network, you can connect serial devices even over very long distances—as far as your network stretches. It’s even possible to connect serial devices across the Internet. A terminal server connects the remote serial device to the network, and then another terminal server somewhere else on the network connects to the other serial device.
Terminal servers act as virtual serial ports by providing the appropriate connectors for serial data and also by grouping serial data in both directions into Ethernet TCP/IP packets. This conversion enables you to connect serial devices across Ethernet without the need for software changes.
Because terminal servers send data across a network, security is a consideration. If your network is isolated, you can get by with an inexpensive terminal server that has few or no security functions. But if you’re using a terminal server to make network connections across a network that’s also an Internet subnet, you should look for a terminal server that offers extensive security features.
Black Box Explains...vDSL.
VDSL (Very High Bit-Rate Digital Subscriber Line or Very High-Speed Digital Subscriber Line) is a “last-mile” broadband solution for both businesses and homes, providing economical, high-speed connections to fiber optic... more/see it nowbackbones.
VDSL enables the simultaneous transmission of voice, data, and video on existing voice-grade copper wires. Depending on the intended applications, you can set VDSL to run symmetrically or asymmetrically. VDSL’s high bandwidth allows for applications such as high-definition television, video-on-demand (VOD), high-quality videoconferencing, medical imaging, fast Internet access, and regular voice telephone services—all over a single voice-grade twisted pair. The actual VDSL distances you achieve vary based on line rate, gauge and type of wire, and noise/crosstalk environment.
Black Box Explains...Layer 2, 3, and 4 switches.
... more/see it now
E-Mail, Diagnostics, Word Processing, Database
Shells and Gateway Workstation Software
TR=Token Ring; A=ARCNET®; P=PhoneNET®
With the rapid development of computer networks over the last decade, high-end switching has become one of the most important functions on a network for moving data efficiently and quickly from one place to another.
Here’s how a switch works: As data passes through the switch, it examines addressing information attached to each data packet. From this information, the switch determines the packet’s destination on the network. It then creates a virtual link to the destination and sends the packet there.
The efficiency and speed of a switch depends on its algorithms, its switching fabric, and its processor. Its complexity is determined by the layer at which the switch operates in the OSI (Open Systems Interconnection) Reference Model (see above).
OSI is a layered network design framework that establishes a standard so that devices from different vendors work together. Network addresses are based on this OSI Model and are hierarchical. The more details that are included, the more specific the address becomes and the easier it is to find.
The Layer at which the switch operates is determined by how much addressing detail the switch reads as data passes through.
Switches can also be considered low end or high end. A low-end switch operates in Layer 2 of the OSI Model and can also operate in a combination of Layers 2 and 3. High-end switches operate in Layer 3, Layer 4, or a combination of the two.
Layer 2 Switches (The Data-Link Layer)
Layer 2 switches operate using physical network addresses. Physical addresses, also known as link-layer, hardware, or MAC-layer addresses, identify individual devices. Most hardware devices are permanently assigned this number during the manufacturing process.
Switches operating at Layer 2 are very fast because they’re just sorting physical addresses, but they usually aren’t very smart—that is, they don’t look at the data packet very closely to learn anything more about where it’s headed.
Layer 3 Switches (The Network Layer)
Layer 3 switches use network or IP addresses that identify locations on the network. They read network addresses more closely than Layer 2 switches—they identify network locations as well as the physical device. A location can be a LAN workstation, a location in a computer’s memory, or even a different packet of data traveling through a network.
Switches operating at Layer 3 are smarter than Layer 2 devices and incorporate routing functions to actively calculate the best way to send a packet to its destination. But although they’re smarter, they may not be as fast if their algorithms, fabric, and processor don’t support high speeds.
Layer 4 Switches (The Transport Layer)
Layer 4 of the OSI Model coordinates communications between systems. Layer 4 switches are capable of identifying which application protocols (HTTP, SNTP, FTP, and so forth) are included with each packet, and they use this information to hand off the packet to the appropriate higher-layer software. Layer 4 switches make packet-forwarding decisions based not only on the MAC address and IP address, but also on the application to which a packet belongs.
Because Layer 4 devices enable you to establish priorities for network traffic based on application, you can assign a high priority to packets belonging to vital in-house applications such as Peoplesoft, with different forwarding rules for low-priority packets such as generic HTTP-based Internet traffic.
Layer 4 switches also provide an effective wire-speed security shield for your network because any company- or industry-specific protocols can be confined to only authorized switched ports or users. This security feature is often reinforced with traffic filtering and forwarding features. collapse
Black Box Explains...Power over Ethernet (PoE).
What is PoE?
The seemingly universal network connection, twisted-pair Ethernet cable, has another role to play, providing electrical power to low-wattage electrical devices. Power over Ethernet (PoE) was ratified by the... more/see it nowInstitute of Electrical and Electronic Engineers (IEEE) in June 2000 as the 802.3af-2003 standard. It defines the specifications for low-level power delivery—roughly 13 watts at 48 VDC—over twisted-pair Ethernet cable to PoE-enabled devices such as IP telephones, wireless access points, Web cameras, and audio speakers.
Recently, the basic 802.3af standard was joined by the IEEE 802.3at PoE standard (also called PoE+ or PoE plus), ratified on September 11, 2009, which supplies up to 25 watts to larger, more power-hungry devices. 802.3at is backwards compatible with 802.3af.
How does PoE work?
The way it works is simple. Ethernet cable that meets CAT5 (or better) standards consists of four twisted pairs of cable, and PoE sends power over these pairs to PoE-enabled devices. In one method, two wire pairs are used to transmit data, and the remaining two pairs are used for power. In the other method, power and data are sent over the same pair.
When the same pair is used for both power and data, the power and data transmissions don’t interfere with each other. Because electricity and data function at opposite ends of the frequency spectrum, they can travel over the same cable. Electricity has a low frequency of 60 Hz or less, and data transmissions have frequencies that can range from 10 million to 100 million Hz.
There are two types of devices involved in PoE configurations: Power Sourcing Equipment (PSE) and Powered Devices (PD).
PSEs, which include end-span and mid-span devices, provide power to PDs over the Ethernet cable. An end-span device is often a PoE-enabled network switch that’s designed to supply power directly to the cable from each port. The setup would look something like this:
End-span device → Ethernet with power
A mid-span device is inserted between a non-PoE device and the network, and it supplies power from that juncture. Here is a rough schematic of that setup:
Non-PoE switch → Ethernet without PoE → Mid-span device → Ethernet with power
Power injectors, a third type of PSE, supply power to a specific point on the network while the other network segments remain without power.
PDs are pieces of equipment like surveillance cameras, sensors, wireless access points, and any other devices that operate on PoE.
PoE applications and benefits.
Use one set of twisted-pair wires for both data and low-wattage appliances.
In addition to the applications noted above, PoE also works well for video surveillance, building management, retail video kiosks, smart signs, vending machines, and retail point-of-information systems.
Save money by eliminating the need to run electrical wiring.
Easily move an appliance with minimal disruption.
If your LAN is protected from power failure by a UPS, the PoE devices connected to your LAN are also protected from power failure.
IEEE 802.3 af
|PoE IEEE 802.3 at
|Power available at powered device
|Maximum power delivered
|Voltage range at powred source
|Voltage range at powred device
|Maximum cable resistance