Black Box Explains...Using repeaters to extend your network.
A repeater is a signal regenerator. It amplifies and regenerates received data and relays data from one length of cable to another—this can be between two segments of the same... more/see it nowcable type (such as UTP to UTP) or between two lengths of entirely different cable types (such as UTP to ThinNet). Because repeaters operate at the Data Link layer of the OSI model, having too many repeaters on a network introduces delays and causes problems with signal timing. Ethernet allows a maximum of two IRLs (InterRepeater Links) between any two devices and up to four per network. A hub also counts as a repeater. (If simple media conversion is your goal, use media converters instead. For details, contact Tech Suport.)
Repeaters boost distance by amplifying the signal.
A repeater actually regenerates and amplifies the signal to gain distance. The repeater not only changes the media type, it also gives the signal a boost to send it over a longer distance.
Repeaters boost distance through a change in media.
In addition to amplifying the signal, a repeater can also add distance to your network by enabling you to change to a media type such as fiber that supports longer distances. collapse
Black Box Explains...T1 and E1.
If you manage a heavy-traffic data network and demand high bandwidth for high speeds, you need digital super-fast T1 or E1.
Both T1 and E1 are foundations of global communications. Developed... more/see it nowmore than 35 years ago and commercially available since 1983, T1 and E1 go virtually anywhere phone lines go, but theyre much faster. T1, used primarily in the U.S., sends data up to 1.544 Mbps; E1, used primarily in Europe, supports speeds to 2.048 Mbps. No matter where you need to connectNorth, South, or Central America, Europe, or the Pacific RimT1 and E1 can get your data there fast!
T1 and E1 are versatile, too. Drive a private, point-to-point line; provide corporate access to the Internet; enable inbound access to your Web Servereven support a voice/data/fax/video WAN that extends halfway around the world! T1 and E1 are typically used for:
• Accessing public Frame Relay networks or Public Switched Telephone Networks (PSTNs) for voice or fax.
• Merging voice and data traffic. A single T1 or E1 line can support voice and data simultaneously.
• Making super-fast LAN connections. Todays faster Ethernet speeds require the very high throughput provided by one or more T1 or E1 lines.
• Sending bandwidth-intensive data such as CAD/CAM, MRI, CAT-scan images, and other large files.
Basic T1 service supplies a bandwidth of 1.536 Mbps. However, many of todays applications demand much more bandwidth. Or perhaps you only need a portion of the 1.536 Mbps that T1 supplies. One of T1s best features is that it can be scaled up or down to provide just the right amount of bandwidth for any application.
A T1 channel consists of 24 64-kbps DS0 (Digital Signal [Zero]) subchannels that combine to provide 1.536 Mbps throughput. Because they enable you to combine T1 lines or to use only part of a T1, DS0s make T1 a very flexible standard.
If you dont need 1.536 Mbps, your T1 service provider can rent you a portion of a T1 line, called Fractional T1. For instance, you can contract for half a T1 line768 kbpsand get the use of DS0s 112. The service provider is then free to sell DS0s 1324 to another customer.
If you require more than 1.536 Mbps, two or more T1 lines can be combined to provide very-high-speed throughput. The next step up from T1 is T1C; it offers two T1 lines multiplexed together for a total throughput of 3.152 on 48 DS0s. Or consider T2 and get 6.312 Mbps over 96 DS0s by multiplexing four T1 lines together to form one high-speed connection.
Moving up the scale of high-speed T1 services is T3. T3 is 28 T1 lines multiplexed together for a blazing throughput of 44.736 Mbps, consisting of 672 DS0s, each of which supports 64 kbps.
Finally theres T4. It consists of 4032 64-kbps DS0 subchannels for a whopping 274.176 Mbps of bandwidththats 168 times the size of a single T1 line!
These various levels of T1 service can by implemented simulta-neously within a large enterprise network. Of course, this has the potential to become somewhat overwhelming from a management standpoint. But as long as you keep track of DS0s, you always know exactly how much bandwidth you have at your disposal.
T1s cousin, E1, can also have multiple lines merged to provide greater throughput. collapse
Black Box Explains...Designing your wireless network.
Setting up wireless devices that belong to the 802.11 family is relatively simple, but you do have to pay attention to a few simple factors.
Ad-hoc or infrastructure... more/see it nowmode?
The 802.11 wireless standards support two basic configurations: ad-hoc mode and infrastructure mode.
In ad-hoc mode, wireless user devices such as laptop computers and PDAs communicate directly with each other in a peer-to-peer manner without the benefit of access points.
Ad-hoc mode is generally used to form very small spontaneous networks. For instance, with ad-hoc mode, laptop users in a meeting can quickly establish a small network to share files.
Infrastructure mode uses wireless access points to enable wireless devices to communicate with each other and with your wired network. Most networks use infrastructure mode.
The basic components of infrastructure mode networks include:
One or many access points?
- The radios embedded or installed within the wireless devices themselves. Many notebook computers and other Wi-Fi-compliant mobile devices, such as PDAs, come with the transmitters built in. But for others, you need to install a card-type device to enable wireless communications. Desktop PCs may also need an ISA or a PCI bus adapter to enable the cards to work.
- The access point, which acts as a base station that relays signals between the 802.11 devices.
Access points are standalone hardware devices that provide a central point of communication for your wireless users. How many you need in your application depends on the number of users and the amount of bandwidth required by each user. Bandwidth is shared, so if your network has many users who routinely send data-heavy multimedia files, additional access points may be required to accommodate the demand.
A small-office network with fewer than 15 users may need just 1 access point. Larger networks require multiple points. If the hardware supports it, you can overlap coverage areas to allow users to roam between cells without any break in network coverage. A user’s wireless device picks up a signal beacon from the strongest access point to maintain seamless coverage.
How many access points to use also depends on your operating environment and the required range. Radio propagation can be affected by walls and electrical interference that can cause signal reflection and fading. If you’re linking mobile users indoors-where walls and other obstructions impede the radiated signal-the typical maximum range is 150 feet. Outdoors, you can get greater WLAN range-up to 2000 feet (depending on your antenna type) where there’s a clear line of sight!
For optimal speed and range, install your wireless access point several feet above the floor or ground and away from metal equipment or large appliances that may emit interference.
Battle of the bands.
In addition to sharing bandwidth, users also share a band. Most IEEE 802.11 or 802.11b devices function in the 2.4-2.4835-GHz band. But these frequencies are often congested, so you may want to use devices that take advantage of the IEEE 802.11a 5.725-5.825-GHz band.
No matter what frequency you use, you’ll want to isolate your users from outsiders using the same frequency. To do this, assign your users a network identifier, such as an Extended Service Set Identifier (ESSID), as well as distinct channels.
Web and wired network links.
The access point links your wireless network to your wired network, enabling your wireless users to access shared data resources and devices across your LAN enterprise. Some access points even feature capabilities for routing traffic in one or both directions between a wired and wireless network.
For Internet access, connect a broadband router with an access point to an Internet connection over a broadband service such as DSL, cable modem, or satellite.
For connecting network printers, you can dedicate a computer to act as a print server or add a wireless print server device; this enables those on your wireless network to share printers.
When to use external antennas.
If you plan to install access points, you can boost your signal considerably by adding external antennas. Various mounting configurations and high- and low-gain options are available.
You can also use add-on antennas to connect nodes where the topology doesn’t allow for a clear signal between access points. Or use them to link multiple LANs located far apart.
Additional external antennas are also useful to help overcome the effects of multipath propagation in which a signal takes different paths and confuses the receiver. It’s also helpful to deploy antennas that propagate the signal in a way that fits the environment. For instance, for a long, narrow corridor, use an antenna that focuses the RF pattern in one direction instead of one that radiates the signal in all directions.
Plan ahead with a site survey.
A site survey done ahead of time to plot where the signal is the strongest can help you identify problem areas and avoid dead spots where coverage isn’t up to par or is unreliable. For this, building blueprints are helpful in revealing potential obstructions that you might not see in your physical site walkthrough.
To field test for a clear signal path, attach an antenna to an access point or laptop acting as the transmitter at one end. Attach another antenna to a wireless device acting as a receiver at the other end. Then check for interference using RF test equipment (such as a wireless spectrum analyzer) and determine whether vertical or horizontal polarization will work best.
Need help doing this? Call us. We even offer a Site Survey Kit that has a variety of antennas included. Great for installers, the kit enables you to test a variety of antennas in the field before placing a larger antenna order. collapse
Black Box Explains...Gigabit Ethernet.
As workstations and servers migrated from ordinary 10-Mbps Ethernet to 100-Mbps speeds, it became clear that even greater speeds were needed. Gigabit Ethernet was developed for an even faster Ethernet... more/see it nowstandard to handle the network traffic generated on the server and backbone level by Fast Ethernet. Gigabit Ethernet delivers an incredible 1000 Mbps (or 1 Gbps), 100 times faster than 10BASE-T. At that speed, Gigabit Ethernet can handle even the traffic generated by campus network backbones. Plus it provides a smooth upgrade path from 10-Mbps Ethernet and 100-Mbps Fast Ethernet at a reasonable cost.
Gigabit Ethernet is a true Ethernet standard. Because it uses the same frame formats and flow control as earlier Ethernet versions, networks readily recognize it, and its compatible with older Ethernet standards. Other high-speed technologies (ATM, for instance) present compatibility problems such as different frame formats or different hardware requirements.
The primary difference between Gigabit Ethernet and earlier implementations of Ethernet is that Gigabit Ethernet almost always runs in full-duplex mode, rather than the half-duplex mode commonly found in 10- and 100-Mbps Ethernet.
One significant feature of Gigabit Ethernet is the improvement to the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) function. In half-duplex mode, all Ethernet speeds use the CSMA/CD access method to resolve contention for shared media. For Gigabit Ethernet, CSMA/CD has been enhanced to maintain the 200-meter (656.1-ft.) collision diameter.
Affordability and adaptability
You can incorporate Gigabit Ethernet into any standard Ethernet network at a reasonable cost without having to invest in additional training, cabling, management tools, or end stations. Because Gigabit Ethernet blends so well with your other Ethernet applications, you have the flexibility to give each Ethernet segment exactly as much speed as it needsand if your needs change, Ethernet is easily adaptable to new network requirements.
Gigabit Ethernet is the ideal high-speed technology to use between 10-/100-Mbps Ethernet switches or for connection to high-speed servers with the assurance of total compatibility with your Ethernet network.
When Gigabit Ethernet first appeared, fiber was crucial to running Gigabit Ethernet effectively. Since then, the IEEE802.3ab standard for Gigabit over Category 5 cable has been approved, enabling short stretches of Gigabit speed over existing copper cable. Today, you have many choices when implementing Gigabit Ethernet:
1000BASE-X refers collectively to the IEEE802.3z standards: 1000BASE-SX, 1000BASE-LX, and 1000BASE-CX.
The S in 1000BASE-SX stands for short. It uses short wavelength lasers, operating in the 770- to 860-nanometer range, to transmit data over multimode fiber. Its less expensive than 1000BASE-LX, but has a much shorter range of 220 meters over typical 62.5-µm multimode cable.
The L stands for long. It uses long wavelength lasers operating in the wavelength range of 1270 to 1355 nanometers to transmit data over single-mode fiber optic cable. 1000BASE-LX supports up to 550 meters over multimode fiber or up to 10 kilometers over single-mode fiber.
The C stands for copper. It operates over special twinax cable at distances of up to 25 meters. This standard never really caught on.
Gigabit over CAT5—1000BASE-TX
The 802.3ab specification, or 1000BASE-TX, enables you to run IEEE-compliant Gigabit Ethernet over copper twisted-pair cable at distances of up to 100 meters of CAT5 or higher cable.
Gigabit Ethernet uses all four twisted pairs within the cable, unlike 10BASE-T and 100BASE-TX, which only use two of the four pairs. It works by transmitting 250 Mbps over each of the four pairs in 4-pair cable. collapse
Black Box Explains...vDSL.
VDSL (Very High Bit-Rate Digital Subscriber Line or Very High-Speed Digital Subscriber Line) is a “last-mile” broadband solution for both businesses and homes, providing economical, high-speed connections to fiber optic... more/see it nowbackbones.
VDSL enables the simultaneous transmission of voice, data, and video on existing voice-grade copper wires. Depending on the intended applications, you can set VDSL to run symmetrically or asymmetrically. VDSL’s high bandwidth allows for applications such as high-definition television, video-on-demand (VOD), high-quality videoconferencing, medical imaging, fast Internet access, and regular voice telephone services—all over a single voice-grade twisted pair. The actual VDSL distances you achieve vary based on line rate, gauge and type of wire, and noise/crosstalk environment.
Black Box Explains...PoE phantom power.
10BASE-T and 100BASE-TX Ethernet use only two pairs of wire in 4-pair CAT5/CAT5e/CAT6 cable, leaving the other two pairs free to transmit power for Power over Ethernet (PoE) applications. However,... more/see it nowGigabit Ethernet or 1000BASE-T uses all four pairs of wires, leaving no pairs free for power. So how can PoE work over Gigabit Ethernet?
The answer is through the use of phantom power—power sent over the same wire pairs used for data. When the same pair is used for both power and data, the power and data transmissions don’t interfere with each other. Because electricity and data function at opposite ends of the frequency spectrum, they can travel over the same cable. Electricity has a low frequency of 60 Hz or less, and data transmissions have frequencies that can range from 10 million to 100 million Hz.
10- and 100-Mbps PoE may also use phantom power. The 802.3af PoE standard for use with 10BASE-T and 100BASE-TX defines two methods of power transmission. In one method, called Alternative A, power and data are sent over the same pair. In the other method, called Alternative B, two wire pairs are used to transmit data, and the remaining two pairs are used for power. That there are two different PoE power-transmission schemes isn’t obvious to the casual user because PoE Powered Devices (PDs) are made to accept power in either format.
Black Box Explains…Energy-Efficient Ethernet.
The IEEE 802.3az Ethernet standard, ratified in 2010, provides a standardized way for some Ethernet devices to reduce power consumption. Energy-Efficient Ethernet devices have a low-power idle (LPI) mode that... more/see it nowcan cut power use by 50% or more during periods of low data activity. Because energy-efficient Ethernet devices scale down power consumption when the load is lower, they save both the energy used to power processors and the energy used to cool them.
These energy savings are currently available for 100BASE-TX, 1000BASE-T, and 10GBASE-T Ethernet as well as some backplane Ethernet. 802.3az can be found on most types of network equipment, including NICs, switches, routers, and media converters. Because these devices are totally backwards compatible with other Ethernet devices, all you need to do to reap energy savings is to swap out devices.
Black Box Explains...Layer 2, 3, and 4 switches.
... more/see it now
E-Mail, Diagnostics, Word Processing, Database
Shells and Gateway Workstation Software
TR=Token Ring; A=ARCNET®; P=PhoneNET®
With the rapid development of computer networks over the last decade, high-end switching has become one of the most important functions on a network for moving data efficiently and quickly from one place to another.
Here’s how a switch works: As data passes through the switch, it examines addressing information attached to each data packet. From this information, the switch determines the packet’s destination on the network. It then creates a virtual link to the destination and sends the packet there.
The efficiency and speed of a switch depends on its algorithms, its switching fabric, and its processor. Its complexity is determined by the layer at which the switch operates in the OSI (Open Systems Interconnection) Reference Model (see above).
OSI is a layered network design framework that establishes a standard so that devices from different vendors work together. Network addresses are based on this OSI Model and are hierarchical. The more details that are included, the more specific the address becomes and the easier it is to find.
The Layer at which the switch operates is determined by how much addressing detail the switch reads as data passes through.
Switches can also be considered low end or high end. A low-end switch operates in Layer 2 of the OSI Model and can also operate in a combination of Layers 2 and 3. High-end switches operate in Layer 3, Layer 4, or a combination of the two.
Layer 2 Switches (The Data-Link Layer)
Layer 2 switches operate using physical network addresses. Physical addresses, also known as link-layer, hardware, or MAC-layer addresses, identify individual devices. Most hardware devices are permanently assigned this number during the manufacturing process.
Switches operating at Layer 2 are very fast because they’re just sorting physical addresses, but they usually aren’t very smart—that is, they don’t look at the data packet very closely to learn anything more about where it’s headed.
Layer 3 Switches (The Network Layer)
Layer 3 switches use network or IP addresses that identify locations on the network. They read network addresses more closely than Layer 2 switches—they identify network locations as well as the physical device. A location can be a LAN workstation, a location in a computer’s memory, or even a different packet of data traveling through a network.
Switches operating at Layer 3 are smarter than Layer 2 devices and incorporate routing functions to actively calculate the best way to send a packet to its destination. But although they’re smarter, they may not be as fast if their algorithms, fabric, and processor don’t support high speeds.
Layer 4 Switches (The Transport Layer)
Layer 4 of the OSI Model coordinates communications between systems. Layer 4 switches are capable of identifying which application protocols (HTTP, SNTP, FTP, and so forth) are included with each packet, and they use this information to hand off the packet to the appropriate higher-layer software. Layer 4 switches make packet-forwarding decisions based not only on the MAC address and IP address, but also on the application to which a packet belongs.
Because Layer 4 devices enable you to establish priorities for network traffic based on application, you can assign a high priority to packets belonging to vital in-house applications such as Peoplesoft, with different forwarding rules for low-priority packets such as generic HTTP-based Internet traffic.
Layer 4 switches also provide an effective wire-speed security shield for your network because any company- or industry-specific protocols can be confined to only authorized switched ports or users. This security feature is often reinforced with traffic filtering and forwarding features. collapse
Black Box Explains...Terminal Servers
A terminal server (sometimes called a serial server) is a hardware device that enables you to connect serial devices across a network.
Terminal servers acquired their name because they were originally... more/see it nowused for long-distance connection of dumb terminals to large mainframe systems such as VAX™. Today, the name terminal server refers to a device that connects any serial device to a network, usually Ethernet. In this day of network-ready devices, terminal servers are not as common as they used to be, but they’re still frequently used for applications such as remote connection of PLCs, sensors, or automatic teller machines.
The primary advantage of terminal servers is that they save you the cost of running separate RS-232 devices. By using a network, you can connect serial devices even over very long distances—as far as your network stretches. It’s even possible to connect serial devices across the Internet. A terminal server connects the remote serial device to the network, and then another terminal server somewhere else on the network connects to the other serial device.
Terminal servers act as virtual serial ports by providing the appropriate connectors for serial data and also by grouping serial data in both directions into Ethernet TCP/IP packets. This conversion enables you to connect serial devices across Ethernet without the need for software changes.
Because terminal servers send data across a network, security is a consideration. If your network is isolated, you can get by with an inexpensive terminal server that has few or no security functions. If, however, you’re using a terminal server to make network connections across a network that’s also an Internet subnet, you should look for a terminal server that offers extensive security features. collapse
The ANSI/ISA Standard and Hazardous Locations
Fires and explosions are a major safety concern in industrial plants. Electrical equipment that must be installed in these locations should be specifically designed and tested to operate under extreme... more/see it nowconditions. The hazardous location classification system was designed to promote the safe use of electrical equipment in those areas “where fire or explosion hazards may exist due to flammable gases or vapors, flammable liquids, combustible dust, or ignitable fibers of flyings.”
The NEC and CSA define hazardous locations by three classes:
Class 1: Gas or vapor hazards
Class 2: Dust hazards
Class 3: Fibers and flyings
Division 1: An environment where ignitable gases, liquids, vapors or dusts can exist
Division 2: Locations where ignitables are not likely to exist
Hazardous classes are further defined by groups A, B, C, D, E, F, and G:
C. Ethlene, carbon monoxide
D. Hydrocarbons, fuels, solvents
F. Carbonaceous dusts including coal, carbon black, coke
G. Flour, starch, grain, combustible plastic or chemical dust
Our line of Industrial Ethernet Switches (LEH1208A, LEH1208A-2GMMSC, LEH1216A and LEH1216A-2GMMSC) is fully compliant with ANSI/ISA 12.12.01, a construction standard for Nonincendive Electrical Equipment for Use in Class I and II, Division 2 and Class III, Divisions 1 and 2 Hazardous (Classified) Locations. ANSI/ISA 12.12.01-2000 is similar to UL1604, but is more stringent (for a full list of changes, see Compliance Today). UL1604 was withdrawn in 2012 and replaced with ISA 12.12.01.
The standard provides the requirements for the design, construction, and marking of electrical equipment or parts of such equipment used in Class I and Class II, Division 2 and Class III, Divisions 1 and 2 hazardous (classified) locations. This type of equipment, in normal operation, is not capable of causing ignition.
The standard establishes uniformity in test methods for determining the suitability of equipment as related to their potential to ignite to a specific flammable gas or vapor-in-air mixture, combustible dust, easily ignitable fibers, or flyings under the following ambient conditions:
a) an ambient temperature of -25°C to 40°C.
b) an oxygen concentration of not greater than 21 percent by volume.
c) a pressure of 80 kPa (0.8 bar) to 110 kPa (1.1 bar).
The standard is available for purchase at www.webstore.ansi.org. To learn more about ANSI/ISA 12.12.01 and hazardous location types, visit https://www.osha.gov/doc/outreachtraining/htmlfiles/hazloc.html.