Black Box Explains...PoE phantom power.
10BASE-T and 100BASE-TX Ethernet use only two pairs of wire in 4-pair CAT5/CAT5e/CAT6 cable, leaving the other two pairs free to transmit power for Power over Ethernet (PoE) applications. However,... more/see it nowGigabit Ethernet or 1000BASE-T uses all four pairs of wires, leaving no pairs free for power. So how can PoE work over Gigabit Ethernet?
The answer is through the use of phantom power—power sent over the same wire pairs used for data. When the same pair is used for both power and data, the power and data transmissions don’t interfere with each other. Because electricity and data function at opposite ends of the frequency spectrum, they can travel over the same cable. Electricity has a low frequency of 60 Hz or less, and data transmissions have frequencies that can range from 10 million to 100 million Hz.
10- and 100-Mbps PoE may also use phantom power. The 802.3af PoE standard for use with 10BASE-T and 100BASE-TX defines two methods of power transmission. In one method, called Alternative A, power and data are sent over the same pair. In the other method, called Alternative B, two wire pairs are used to transmit data, and the remaining two pairs are used for power. That there are two different PoE power-transmission schemes isn’t obvious to the casual user because PoE Powered Devices (PDs) are made to accept power in either format.
Black Box Explains...Ethernet hubs vs. Ethernet switches.
Although hubs and switches look very similar and are connected to the network in much the same way, there is a significant difference in the way they function.
What is a... more/see it nowhub?
An Ethernet hub is the basic building block of a twisted-pair (10BASE-T or 100BASE-TX) Ethernet network. Hubs do little more than act as a physical connection. They link PCs and peripherals and enable them to communicate over a network. All data coming into the hub travels to all stations connected to the hub. Because a hub doesnt use management or addressing, it simply divides the 10- or 100-Mbps bandwidth among users. If two stations are transferring high volumes of data between them, the network performance of all stations on that hub will suffer. Hubs are good choices for small- or home-office networks, particularly if bandwidth concerns are minimal.
What is a switch?
An Ethernet switch, on the other hand, provides a central connection in an Ethernet network in which each connected device has its own dedicated link with full bandwidth. Switches divide LAN data into smaller, easier-to-manage segments and send data only to the PCs it needs to reach. They allot a full 10 or 100 Mbps to each user with addressing and management features. As a result, every port on the switch represents a dedicated 10- or 100-Mbps pathway. Because users connected to a switch do not have to share bandwidth, a switch offers relief from the network congestion a shared hub can cause.
What to consider when selecting an Ethernet hub:
• Stackability. Select a stackable hub connected with a special cable so you can start with one hub and add others as you need more ports. The entire stack functions as one device.
• Manageability. Choose an SNMP-manageable hub if you have a large, managed network.
What to consider when selecting an Ethernet switch:
• Manageability. Ethernet switches intended for large managed networks feature built-in management, usually SNMP.
• OSI Layer operation. Most Ethernet switches operate at “Layer 2,” which is for the physical network addresses (MAC addresses). Layer 3 switches use network addresses, and incorporate routing functions to actively calculate the best way to send a packet to its destination. Very advanced Ethernet switches, often known as routing switches, operate on OSI Layer 4 and route network traffic according to the application.
• Modular construction. A modular switch enables you to populate a chassis with modules of different speeds and media types. Because you can easily change modules, the modular switch is an adaptable solution for large, growing networks.
• Stackability. Some Ethernet switches can be connected to form a stack of two or more switches that functions as a single network device. This enables you to start with fewer ports and add them as your network grows. collapse
Black Box Explains...How fiber is insulated for use in harsh environments.
Fiber optic cable not only gives you immunity to interference and greater signal security, but it’s also constructed to insulate the fiber’s core from the stress associated with use in... more/see it nowharsh environments.
The core is a very delicate channel that’s used to transport data signals from an optical transmitter to an optical receiver. To help reinforce the core, absorb shock, and provide extra protection against cable bends, fiber cable contains a coating of acrylate plastic.
In an environment free from the stress of external forces such as temperature, bends, and splices, fiber optic cable can transmit light pulses with minimal attenuation. And although there will always be some attenuation from external forces and other conditions, there are two methods of cable construction to help isolate the core: loose-tube and tight-buffer construction.
In a loose-tube construction, the fiber core literally floats within a plastic gel-filled sleeve. Surrounded by this protective layer, the core is insulated from temperature extremes, as well as from damaging external forces such as cutting and crushing.
In a tight-core construction, the plastic extrusion method is used to apply a protective coating directly over the fiber coating. This helps the cable withstand even greater crushing forces. But while the tight-buffer design offers greater protection from core breakage, it’s more susceptible to stress from temperature variations. Conversely, while it’s more flexible than loose-tube cable, the tight-buffer design offers less protection from sharp bends or twists. collapse
Because Power over Ethernet (PoE) delivers power over the same cable as data, it’s popular for powering devices such as VoIP phones, wireless access points, and security cameras. It often... more/see it nowleads to significant savings by eliminating the need to install a separate power outlet.
Most PoE today is standards-based IEEE 802.3af or the newer higher-powered IEEE 802.3at PoE, which are very safe because power source equipment (PSE) doesn’t add power to the data line unless it detects a compatible powered device (PD) connected to the other end of the cable. This protects devices that do not support PoE. PSEs and PDs also negotiate power requirements, so a PD never receives too much power. Both PSEs and PDs have power supplies and regulators isolated from ground to minimize shock hazard.
But here’s where it gets complicated…
Because most PoE available today is standards-based 802.3af or 802.3at, it’s easy to forget that there are versions of PoE that are NOT standards based. Some of these non-standards-based versions of PoE feature power injectors that inject power without checking compatibility—and that can be very bad news for an innocent network device.
Non-standard PoE tends to fall into three categories: proprietary PoE, high-wattage proprietary PoE, and passive PoE.
Before the ratification of the 802.3af standard in 2003, PoE was a free-for-all with many vendors offering their own method of delivering power over data lines. Some vendors still offer their own proprietary PoE. These proprietary solutions offer varying degrees of communication between PSE and PD. Our Black Box® Wireless Point-to-Point Ethernet Extender Kit (LWE100A-KIT) uses Prorietary PoE in the form of 12 VDC running at 12 W, which is well below the 48 VDC and 15.4 W provided by standard 802.3af.
High-wattage Proprietary PoE.
Many vendors offer high-wattage PoE solutions designed to deliver from 50 watts to 100 or even 200 watts per port. High-wattage proprietary PoE is often used with high-powered outdoor wireless radios.
Passive PoE injects power into an Ethernet cable on Pins 4 and 5 with negative return on Pins 7 and 8 and absolutely no communication between PSE and PD. This method was once a very common “home brew” method of transferring power over data cable and is still commonly used in telecomm applications.
Document and label.
There’s nothing wrong with PoE that’s not standards based—these power methods work as well as 802.3af/at PoE to power network devices. You do, however, need to be aware of what kind of Power over Ethernet you have and what it will work with. Good network documentation and labeling are the keys that enable you to know that, for instance, that power injector is a high-wattage proprietary injector that will fry the IP camera you’re about to connect. Proper documentation, which is good practice in any case, becomes absolutely vital when you have components that may damage other components.
Black Box Explains...Single-strand fiber WDM.
Traditional fiber optic media converters perform a useful function but don’t really reduce the amount of cable needed to send data on a fiber segment. They still require two strands... more/see it nowof glass to send transmit and receive signals for fiber media communications. Wouldn’t it be better to combine these two logical communication paths within one strand?
That’s exactly what single-strand fiber conversion does. It compresses the transmit and receive wavelengths into one single-mode fiber strand.
The conversion is done with Wave-Division Multiplexing (WDM) technology. WDM technology increases the information-carrying capacity of optical fiber by transmitting two signals simultaneously at different wavelengths on the same fiber. The way it usually works is that one unit transmits at 1310 nm and receives at 1550 nm. The other unit transmits at 1550 nm and receives at 1310 nm. The two wavelengths operate independently and don’t interfere with each other. This bidirectional traffic flow effectively converts a single fiber into a pair of “virtual fibers,” each driven independently at different wavelengths.
Although most implementations of WDM on single-strand fiber offer two channels, four-channel versions are just being introduced, and versions offering as many as 10 channels with Gigabit capacity are on the horizon.
WDM on single-strand fiber is most often used for point-to-point links on a long-distance network. It’s also used to increase network capacity or relieve network congestion. collapse
Black Box Explains...Designing your wireless network.
Setting up wireless devices that belong to the 802.11 family is relatively simple, but you do have to pay attention to a few simple factors.
Ad-hoc or infrastructure... more/see it nowmode?
The 802.11 wireless standards support two basic configurations: ad-hoc mode and infrastructure mode.
In ad-hoc mode, wireless user devices such as laptop computers and PDAs communicate directly with each other in a peer-to-peer manner without the benefit of access points.
Ad-hoc mode is generally used to form very small spontaneous networks. For instance, with ad-hoc mode, laptop users in a meeting can quickly establish a small network to share files.
Infrastructure mode uses wireless access points to enable wireless devices to communicate with each other and with your wired network. Most networks use infrastructure mode.
The basic components of infrastructure mode networks include:
One or many access points?
- The radios embedded or installed within the wireless devices themselves. Many notebook computers and other Wi-Fi-compliant mobile devices, such as PDAs, come with the transmitters built in. But for others, you need to install a card-type device to enable wireless communications. Desktop PCs may also need an ISA or a PCI bus adapter to enable the cards to work.
- The access point, which acts as a base station that relays signals between the 802.11 devices.
Access points are standalone hardware devices that provide a central point of communication for your wireless users. How many you need in your application depends on the number of users and the amount of bandwidth required by each user. Bandwidth is shared, so if your network has many users who routinely send data-heavy multimedia files, additional access points may be required to accommodate the demand.
A small-office network with fewer than 15 users may need just 1 access point. Larger networks require multiple points. If the hardware supports it, you can overlap coverage areas to allow users to roam between cells without any break in network coverage. A user’s wireless device picks up a signal beacon from the strongest access point to maintain seamless coverage.
How many access points to use also depends on your operating environment and the required range. Radio propagation can be affected by walls and electrical interference that can cause signal reflection and fading. If you’re linking mobile users indoors-where walls and other obstructions impede the radiated signal-the typical maximum range is 150 feet. Outdoors, you can get greater WLAN range-up to 2000 feet (depending on your antenna type) where there’s a clear line of sight!
For optimal speed and range, install your wireless access point several feet above the floor or ground and away from metal equipment or large appliances that may emit interference.
Battle of the bands.
In addition to sharing bandwidth, users also share a band. Most IEEE 802.11 or 802.11b devices function in the 2.4-2.4835-GHz band. But these frequencies are often congested, so you may want to use devices that take advantage of the IEEE 802.11a 5.725-5.825-GHz band.
No matter what frequency you use, you’ll want to isolate your users from outsiders using the same frequency. To do this, assign your users a network identifier, such as an Extended Service Set Identifier (ESSID), as well as distinct channels.
Web and wired network links.
The access point links your wireless network to your wired network, enabling your wireless users to access shared data resources and devices across your LAN enterprise. Some access points even feature capabilities for routing traffic in one or both directions between a wired and wireless network.
For Internet access, connect a broadband router with an access point to an Internet connection over a broadband service such as DSL, cable modem, or satellite.
For connecting network printers, you can dedicate a computer to act as a print server or add a wireless print server device; this enables those on your wireless network to share printers.
When to use external antennas.
If you plan to install access points, you can boost your signal considerably by adding external antennas. Various mounting configurations and high- and low-gain options are available.
You can also use add-on antennas to connect nodes where the topology doesn’t allow for a clear signal between access points. Or use them to link multiple LANs located far apart.
Additional external antennas are also useful to help overcome the effects of multipath propagation in which a signal takes different paths and confuses the receiver. It’s also helpful to deploy antennas that propagate the signal in a way that fits the environment. For instance, for a long, narrow corridor, use an antenna that focuses the RF pattern in one direction instead of one that radiates the signal in all directions.
Plan ahead with a site survey.
A site survey done ahead of time to plot where the signal is the strongest can help you identify problem areas and avoid dead spots where coverage isn’t up to par or is unreliable. For this, building blueprints are helpful in revealing potential obstructions that you might not see in your physical site walkthrough.
To field test for a clear signal path, attach an antenna to an access point or laptop acting as the transmitter at one end. Attach another antenna to a wireless device acting as a receiver at the other end. Then check for interference using RF test equipment (such as a wireless spectrum analyzer) and determine whether vertical or horizontal polarization will work best.
Need help doing this? Call us. We even offer a Site Survey Kit that has a variety of antennas included. Great for installers, the kit enables you to test a variety of antennas in the field before placing a larger antenna order. collapse
Black Box Explains...Layer 2, 3, and 4 switches.
... more/see it now
E-Mail, Diagnostics, Word Processing, Database
Shells and Gateway Workstation Software
TR=Token Ring; A=ARCNET®; P=PhoneNET®
With the rapid development of computer networks over the last decade, high-end switching has become one of the most important functions on a network for moving data efficiently and quickly from one place to another.
Here’s how a switch works: As data passes through the switch, it examines addressing information attached to each data packet. From this information, the switch determines the packet’s destination on the network. It then creates a virtual link to the destination and sends the packet there.
The efficiency and speed of a switch depends on its algorithms, its switching fabric, and its processor. Its complexity is determined by the layer at which the switch operates in the OSI (Open Systems Interconnection) Reference Model (see above).
OSI is a layered network design framework that establishes a standard so that devices from different vendors work together. Network addresses are based on this OSI Model and are hierarchical. The more details that are included, the more specific the address becomes and the easier it is to find.
The Layer at which the switch operates is determined by how much addressing detail the switch reads as data passes through.
Switches can also be considered low end or high end. A low-end switch operates in Layer 2 of the OSI Model and can also operate in a combination of Layers 2 and 3. High-end switches operate in Layer 3, Layer 4, or a combination of the two.
Layer 2 Switches (The Data-Link Layer)
Layer 2 switches operate using physical network addresses. Physical addresses, also known as link-layer, hardware, or MAC-layer addresses, identify individual devices. Most hardware devices are permanently assigned this number during the manufacturing process.
Switches operating at Layer 2 are very fast because they’re just sorting physical addresses, but they usually aren’t very smart—that is, they don’t look at the data packet very closely to learn anything more about where it’s headed.
Layer 3 Switches (The Network Layer)
Layer 3 switches use network or IP addresses that identify locations on the network. They read network addresses more closely than Layer 2 switches—they identify network locations as well as the physical device. A location can be a LAN workstation, a location in a computer’s memory, or even a different packet of data traveling through a network.
Switches operating at Layer 3 are smarter than Layer 2 devices and incorporate routing functions to actively calculate the best way to send a packet to its destination. But although they’re smarter, they may not be as fast if their algorithms, fabric, and processor don’t support high speeds.
Layer 4 Switches (The Transport Layer)
Layer 4 of the OSI Model coordinates communications between systems. Layer 4 switches are capable of identifying which application protocols (HTTP, SNTP, FTP, and so forth) are included with each packet, and they use this information to hand off the packet to the appropriate higher-layer software. Layer 4 switches make packet-forwarding decisions based not only on the MAC address and IP address, but also on the application to which a packet belongs.
Because Layer 4 devices enable you to establish priorities for network traffic based on application, you can assign a high priority to packets belonging to vital in-house applications such as Peoplesoft, with different forwarding rules for low-priority packets such as generic HTTP-based Internet traffic.
Layer 4 switches also provide an effective wire-speed security shield for your network because any company- or industry-specific protocols can be confined to only authorized switched ports or users. This security feature is often reinforced with traffic filtering and forwarding features. collapse
Black Box Explains...Layer 3 switching.
In the last decade, network topologies have typically featured routers along with hubs or switches. The hub or switch acts as a central wiring point for LAN segments while the... more/see it nowrouter takes care of higher-level functions such as protocol translation, traffic between LAN segments, and wide-area access.
Layer 3 switching, which combines Layer 2 switching and Layer 3 IP routing, provides a more cost-effective way of setting up LANs by incorporating switching and routing into one device. While a traditional Layer 2 switch simply sends data along without examining it, a Layer 3 switch incorporates some features of a router in that it examines data packets before sending them on their way. The integration of switching and routing in a Layer 3 switch takes advantage of the speed of a switch and the intelligence of a router in one economical package.
There are two basic types of Layer 3 switching: packet-by-packet Layer 3 (PPL3) and cut-through Layer 3.
PPL3 switches are technically routers in that they examine all packets before forwarding them to their destinations. They achieve top speed by running protocols such as OSPF (Open Shortest Path First) and by using cache routing tables. Because these switches understand and take advantage of network topology, they can blow the doors off traditional routers with speeds of more than 7,000,000 (thats seven million!) packets per second.
Cut-through Layer 3 switching relies on a shortcut for top speed. Cut-through Layer 3 switches, rather than examining every packet, examine only the first in a series to determine its destination. Once the destination is known, the data flow is switched at Layer 2 to achieve high speeds. collapse
Black Box Explains...Media converters.
Media converters interconnect different cable types such as twisted pair, fiber, and coax within an existing network. They are often used to connect newer Ethernet equipment to legacy cabling.... more/see it nowThey can also be used in pairs to insert a fiber segment into copper networks to increase cabling distances and enhance immunity to electromagnetic interference (EMI).
Traditional media converters are purely Layer 1 devices that only convert electrical signals and physical media. They don’t do anything to the data coming through the link so they’re totally transparent to data. These converters have two ports—one port for each media type. Layer 1 media converters only operate at one speed and cannot, for instance, support both 10-Mbps and 100-Mbps Ethernet.
Some media converters are more advanced Layer 2 Ethernet devices that, like traditional media converters, provide Layer 1 electrical and physical conversion. But, unlike traditional media converters, they also provide Layer 2 services—in other words, they’re really switches. This kind of media converter often has more than two ports, enabling you to, for instance, extend two or more copper links across a single fiber link. They also often feature autosensing ports on the copper side, making them useful for linking segments operating at different speeds.
Media converters are available in standalone models that convert between two different media types and in chassis-based models that connect many different media types in a single housing.
Rent an apartment
Standalone converters convert between two media. But, like a small apartment, they can be outgrown. Consider your current and future applications before selecting a media converter. Standalone converters are available in many configurations, including 10BASE-T to multimode or single-mode fiber, 10BASE-T to Thin coax (ThinNet), 10BASE-T to thick coax (standard Ethernet), CDDI to FDDI, and Thin coax to fiber. 100BASE-T and 100BASE-FX models that connect UTP to single- or multimode fiber are also available. With the development of Gigabit Ethernet (1000 Mbps), media converters have been created to make the transition to high-speed networks easier.
...or buy a house.
Chassis-based or modular media converters are normally rackmountable and have slots that house media converter modules. Like a well-planned house, the chassis gives you room to grow. These are used when many Ethernet segments of different media types need to be connected in a central location. Modules are available for the same conversions performed by the standalone converters, and 10BASE-T, 100BASE-TX, 100BASE-FX, and Gigabit modules may also be mixed. collapse
Black Box Explains...Ethernet.
If you have an existing network, there’s a 90% chance it’s Ethernet. If you’re installing a new network, there’s a 98% chance it’s Ethernet—the Ethernet standard is... more/see it nowthe overwhelming favorite network standard today.
Ethernet was developed by Xerox®, DEC®, and Intel® in the mid-1970s as a 10-Mbps (Megabits per second) networking protocol—very fast for its day—operating over a heavy coax cable (Standard Ethernet).
Today, although many networks have migrated to Fast Ethernet (100 Mbps) or even Gigabit Ethernet (1000 Mbps), 10-Mbps Ethernet is still in widespread use and forms the basis of most networks.
Ethernet is defined by international standards, specifically IEEE 802.3. It enables the connection of up to 1024 nodes over coax, twisted-pair, or fiber optic cable. Most new installations today use economical, lightweight cables such as Category 5 unshielded twisted-pair cable and fiber optic cable.
How Ethernet Works
Ethernet signals are transmitted from a station serially, one bit at a time, to every other station on the network.
Ethernet uses a broadcast access method called Carrier Sense Multiple Access/Collision Detection (CSMA/CD) in which every computer on the network hears every transmission, but each computer listens only to transmissions intended for it.
Each computer can send a message anytime it likes without having to wait for network permission. The signal it sends travels to every computer on the network. Every computer hears the message, but only the computer for which the message is intended recognizes it. This computer recognizes the message because the message contains its address. The message also contains the address of the sending computer so the message can be acknowledged.
If two computers send messages at the same moment, a collision occurs, interfering with the signals. A computer can tell if a collision has occurred when it doesn’t hear its own message within a given amount of time. When a collision occurs, each of the colliding computers waits a random amount of time before resending the message.
The process of collision detection and retransmission is handled by the Ethernet adapter itself and doesn’t involve the computer. The process of collision resolution takes only a fraction of a second under most circumstances. Collisions are normal and expected events on an Ethernet network. As more computers are added to the network and the traffic level increases, more collisions occur as part of normal operation. However, if the network gets too crowded, collisions increase to the point where they slow down the network considerably.
Standard (Thick) Ethernet (10BASE5)
Thin Ethernet (ThinNet) (10BASE2)
- Uses thick coax cable with N-type connectors for a backbone and a transceiver cable with 9-pin connectors from the transceiver to the NIC.
- Both ends of each segment should be terminated with a 50-ohm resistor.
- Maximum segment length is 500 meters.
- Maximum total length is 2500 meters.
- Maximum length of transceiver cable is 50 meters.
- Minimum distance between transceivers is 2.5 meters.
- No more than 100 transceiver connections per segment are allowed.
Twisted-Pair Ethernet (10BASE-T)
- Uses "Thin" coax cable.
- The maximum length of one segment is 185 meters.
- The maximum number of segments is five.
- The maximum total length of all segments is 925 meters.
- The minimum distance between T-connectors is 0.5 meters.
- No more than 30 connections per segment are allowed.
- T-connectors must be plugged directly into each device.
Fiber Optic Ethernet (10BASE-FL, FOIRL)
- Uses 22 to 26 AWG unshielded twisted-pair cable (for best results, use Category 4 or 5 unshielded twisted pair).
- The maximum length of one segment is 100 meters.
- Devices are connected to a 10BASE-T hub in a star configuration.
- Devices with standard AUI connectors may be attached via a 10BASE-T transceiver.
- Uses 50-, 62.5-, or 100-micron duplex multimode fiber optic cable (62.5 micron is recommended).
- The maximum length of one 10BASE-FL (the new standard for fiber optic connections) segment is 2 kilometers.
- The maximum length of one FOIRL (the standard that preceded the new 10BASE-FL) segment is 1 kilometer.