Categories (x) > Networking > Switches > Commercial/Office Grade > 8- to 10-Port (x)

Results 1-10 of 28 1 2 3 > 

Black Box Explains…Energy-Efficient Ethernet.

The IEEE 802.3az Ethernet standard, ratified in 2010, provides a standardized way for some Ethernet devices to reduce power consumption. Energy-Efficient Ethernet devices have a low-power idle (LPI) mode that... more/see it nowcan cut power use by 50% or more during periods of low data activity. Because energy-efficient Ethernet devices scale down power consumption when the load is lower, they save both the energy used to power processors and the energy used to cool them.

These energy savings are currently available for 100BASE-TX, 1000BASE-T, and 10GBASE-T Ethernet as well as some backplane Ethernet. 802.3az can be found on most types of network equipment, including NICs, switches, routers, and media converters. Because these devices are totally backwards compatible with other Ethernet devices, all you need to do to reap energy savings is to swap out devices. collapse

Product Data Sheets (pdf)...Express Ethernet Switches

  • Quick Start Guide... 
  • Gigabit Managed Switch QSG
    Quick Start Guide for LGB1108A, LGB1126A, LGB1148A (Version 2)

Product Data Sheets (pdf)...Palm-Sized Ethernet Switches,

  • Manual... 
  • Unmanaged 802.3at PoE Gigabit Ethernet Switch, 8-Port User Manual
    User Manual for Unmanaged 802.3at PoE Gigabit Ethernet Switch, 8-Port (1)

Black Box Explains...Ethernet.

If you have an existing network, there’s a 90% chance it’s Ethernet. If you’re installing a new network, there’s a 98% chance it’s Ethernet—the Ethernet standard is... more/see it nowthe overwhelming favorite network standard today.

Ethernet was developed by Xerox®, DEC®, and Intel® in the mid-1970s as a 10-Mbps (Megabits per second) networking protocol—very fast for its day—operating over a heavy coax cable (Standard Ethernet).

Today, although many networks have migrated to Fast Ethernet (100 Mbps) or even Gigabit Ethernet (1000 Mbps), 10-Mbps Ethernet is still in widespread use and forms the basis of most networks.

Ethernet is defined by international standards, specifically IEEE 802.3. It enables the connection of up to 1024 nodes over coax, twisted-pair, or fiber optic cable. Most new installations today use economical, lightweight cables such as Category 5 unshielded twisted-pair cable and fiber optic cable.

How Ethernet Works

Ethernet signals are transmitted from a station serially, one bit at a time, to every other station on the network.

Ethernet uses a broadcast access method called Carrier Sense Multiple Access/Collision Detection (CSMA/CD) in which every computer on the network “hears” every transmission, but each computer “listens” only to transmissions intended for it.

Each computer can send a message anytime it likes without having to wait for network permission. The signal it sends travels to every computer on the network. Every computer hears the message, but only the computer for which the message is intended recognizes it. This computer recognizes the message because the message contains its address. The message also contains the address of the sending computer so the message can be acknowledged.

If two computers send messages at the same moment, a “collision” occurs, interfering with the signals. A computer can tell if a collision has occurred when it doesn’t hear its own message within a given amount of time. When a collision occurs, each of the colliding computers waits a random amount of time before resending the message.

The process of collision detection and retransmission is handled by the Ethernet adapter itself and doesn’t involve the computer. The process of collision resolution takes only a fraction of a second under most circumstances. Collisions are normal and expected events on an Ethernet network. As more computers are added to the network and the traffic level increases, more collisions occur as part of normal operation. However, if the network gets too crowded, collisions increase to the point where they slow down the network considerably.

Standard (Thick) Ethernet (10BASE5)

  • Uses “thick” coax cable with N-type connectors for a backbone and a transceiver cable with 9-pin connectors from the transceiver to the NIC.
  • Both ends of each segment should be terminated with a 50-ohm resistor.
  • Maximum segment length is 500 meters.
  • Maximum total length is 2500 meters.
  • Maximum length of transceiver cable is 50 meters.
  • Minimum distance between transceivers is 2.5 meters.
  • No more than 100 transceiver connections per segment are allowed.
Thin Ethernet (ThinNet) (10BASE2)

  • Uses "Thin" coax cable.
  • The maximum length of one segment is 185 meters.
  • The maximum number of segments is five.
  • The maximum total length of all segments is 925 meters.
  • The minimum distance between T-connectors is 0.5 meters.
  • No more than 30 connections per segment are allowed.
  • T-connectors must be plugged directly into each device.
Twisted-Pair Ethernet (10BASE-T)

  • Uses 22 to 26 AWG unshielded twisted-pair cable (for best results, use Category 4 or 5 unshielded twisted pair).
  • The maximum length of one segment is 100 meters.
  • Devices are connected to a 10BASE-T hub in a star configuration.
  • Devices with standard AUI connectors may be attached via a 10BASE-T transceiver.
Fiber Optic Ethernet (10BASE-FL, FOIRL)

  • Uses 50-, 62.5-, or 100-micron duplex multimode fiber optic cable (62.5 micron is recommended).
  • The maximum length of one 10BASE-FL (the new standard for fiber optic connections) segment is 2 kilometers.
  • The maximum length of one FOIRL (the standard that preceded the new 10BASE-FL) segment is 1 kilometer.

Product Data Sheets (pdf)...10-, 26-, and 48-Port Gigabit Managed Switches

  • Manual... 
  • Gigabit Managed Switch CLI Guide
    CLI Guide for the LGB1108A, LGB1126A, and LGB1148A (Version 1)
  • Video...Power over Ethernet Explained

    There are a lot of misconceptions and myths surrounding Power over Ethernet (PoE). Learn what PoE is—and is not—and clarify how it can be an important part of your network.

Black Box Explains...Layer 2, 3, and 4 switches.

...more/see it now
OSI Layer Physical
7-Application Applicaton Software

LAN-Compatible Software
E-Mail, Diagnostics, Word Processing, Database

Network Applications
6-Presentation Data-
Conversion Utilities
Vendor-Specific Network Shells and Gateway™ Workstation Software
5-Session Network Operating System SPX NetBIOS DECnet™ TCP/IP AppleTalk®
4-Transport Novell® NetWare® IPX™ PC LAN LAN Mgr DECnet PC/TCP® VINES™ NFS TOPS® Apple
3-Network Control
2-Data Link Network E A TR P TR E TR E E E P E P
1-Physical E=Ethernet; TR=Token Ring; A=ARCNET®; P=PhoneNET®

With the rapid development of computer networks over the last decade, high-end switching has become one of the most important functions on a network for moving data efficiently and quickly from one place to another.

Here’s how a switch works: As data passes through the switch, it examines addressing information attached to each data packet. From this information, the switch determines the packet’s destination on the network. It then creates a virtual link to the destination and sends the packet there.

The efficiency and speed of a switch depends on its algorithms, its switching fabric, and its processor. Its complexity is determined by the layer at which the switch operates in the OSI (Open Systems Interconnection) Reference Model (see above).

OSI is a layered network design framework that establishes a standard so that devices from different vendors work together. Network addresses are based on this OSI Model and are hierarchical. The more details that are included, the more specific the address becomes and the easier it is to find.

The Layer at which the switch operates is determined by how much addressing detail the switch reads as data passes through.

Switches can also be considered low end or high end. A low-end switch operates in Layer 2 of the OSI Model and can also operate in a combination of Layers 2 and 3. High-end switches operate in Layer 3, Layer 4, or a combination of the two.

Layer 2 Switches (The Data-Link Layer)

Layer 2 switches operate using physical network addresses. Physical addresses, also known as link-layer, hardware, or MAC-layer addresses, identify individual devices. Most hardware devices are permanently assigned this number during the manufacturing process.

Switches operating at Layer 2 are very fast because they’re just sorting physical addresses, but they usually aren’t very smart—that is, they don’t look at the data packet very closely to learn anything more about where it’s headed.

Layer 3 Switches (The Network Layer)

Layer 3 switches use network or IP addresses that identify locations on the network. They read network addresses more closely than Layer 2 switches—they identify network locations as well as the physical device. A location can be a LAN workstation, a location in a computer’s memory, or even a different packet of data traveling through a network.

Switches operating at Layer 3 are smarter than Layer 2 devices and incorporate routing functions to actively calculate the best way to send a packet to its destination. But although they’re smarter, they may not be as fast if their algorithms, fabric, and processor don’t support high speeds.

Layer 4 Switches (The Transport Layer)

Layer 4 of the OSI Model coordinates communications between systems. Layer 4 switches are capable of identifying which application protocols (HTTP, SNTP, FTP, and so forth) are included with each packet, and they use this information to hand off the packet to the appropriate higher-layer software. Layer 4 switches make packet-forwarding decisions based not only on the MAC address and IP address, but also on the application to which a packet belongs.

Because Layer 4 devices enable you to establish priorities for network traffic based on application, you can assign a high priority to packets belonging to vital in-house applications such as Peoplesoft, with different forwarding rules for low-priority packets such as generic HTTP-based Internet traffic.

Layer 4 switches also provide an effective wire-speed security shield for your network because any company- or industry-specific protocols can be confined to only authorized switched ports or users. This security feature is often reinforced with traffic filtering and forwarding features.


Results 1-10 of 28 1 2 3 > 


Delivering superior technical support is our highest priority. Depending on the products or services we provide for you, please visit your appropriate support area.


You have added this item to your cart.

Important message about your cart:

You requested more of "" than the currently available. The quantity has been changed to them maximum quantity available. View your cart.

Black Box 1-800-316-7107 Black Box Network Services