Black Box Explains...The 13W3 connector.
The 13W3 connector, also called a 13C3 or DB13W3 connector, is an unusual connector that combines a 10-pin D-shell with three analog video conductors. It supports very-high-resolution analog video signals... more/see it nowand has been used by Sun Microsystems®, SGI, NeXt, Intergraph, and other manufacturers. Although 13W3 connectors from different manufacturers look the same, they may be pinned differently.
Pinning for a standard Sun® 13W3 connector:
2: Vertical Sync*
3: Sense 2
4: Sense Ground
5: Composite Sync
6: Horizontal Sync*
8: Sense 1
9: Sense 0
10: Composite Ground
* Considered obsolete; may not be connected. collapse
Black Box Explains...Dry Contacts
A dry contact, also called a volt-free contact, is a relay contact that does not supply voltage. The relay energizes or de-energizes when a change to its input has occurred.... more/see it nowIn other words, a dry contact simply detects whether or not an input switch is open or closed.
The dry contacts in the ServSensor Contact provide a simple two-wire interface that can be easily adapted to third-party sensors and devices. Because you define what the open or closed condition means, dry contacts are infinitely adaptable.
Use dry contacts to monitor alarms such as fire alarms, burglar alarms, and alarms on power systems such as UPSs. A very common use for dry contacts is to detect whether a cabinet door is open or closed.
Black Box Explains...HDBaseT
HDBaseT is a connectivity standard for distribution of uncompressed HD multimedia content. HDBaseT technology converges full HD digital video, audio, 100BaseT Ethernet, power over cable, and various control signals through... more/see it nowa single LAN cable. This is referred to as 5Play™, a feature set that sets HDBaseT technology above the current standard.
HDBaseT delivers full HD/3D and 2K/4K uncompressed video to a network of devices or to a single device (point-to-point). HDBaseT supports all key HDMI 1.4 features, including EPG, Consumer Electronic Controls (CEC), EDID, and HDCP. The unique video coding scheme ensure the highest video quality at zero latency.
As with the video, HDBaseT audio is passed through from the HDMI chipset. All standard formats are supported, including Dolby Digital, DTS, Dolby TrueHD, DTS HD-Master Audio.
HDBaseT supports 100Mb Ethernet, which enables communications between electronic devices including televisions, sound systems, computers, and more. Additionally, Ethernet support enables access to any stored multimedia content (such as video or music streaming).
HDBaseT's wide range of control options include CEC, RS-232, and infrared (IR). IP control is enabled through Ethernet channel support.
The same cable that delivers video, audio, Ethernet, and control can deliver up to 100W of DC power. This means users can place equipment where one wants to, not just those locations with an available power source.
HDBaseT sends video, audio, Ethernet, and control from the source to the display, but only transfers 100Mb of data from display to source (Ethernet and control data). The asymmetric nature of HDBaseT is based on a digital signal processing (DSP) engine and an application front end (AFE) architecture.
HDBaseT uses a proprietary version of Pulse Amplitude Modulation (PAM) technology, where digital data is represented as a coding scheme using different levels of DC voltage at high rates. This special coding provides a better transfer quality to some kinds of data without the need to "pay" the protecting overhead for the video content, which consumes most of the bandwidth. HDBaseT PAM technology enables the 5Play feature-set to be maintained over a single 330-foot (100 m) CAT cable without the electrical characteristics of the wire affecting performance.
Black Box Explains…TEMPEST.
TEMPEST is an acronym for Telecommunications Electronics Material Protected from Emanating Spurious Transmissions. It pertains to technical security countermeasures, standards, and instrumentation that prevent or minimize the exploitation of vulnerable... more/see it nowdata communication equipment by technical surveillance or eavesdropping.
What puts your data communication equipment at risk?
Many things. But first and foremost, its microchip.
Any device with a microchip generates an electromagnetic field, often called a “compromising emanation” by security experts. With the proper surveillance equipment, these emanations can be intercepted and the signal reconstructed and analyzed. Unprotected equipment can, in fact, emit a signal into the air like a radio station—and nobody wants to risk his or her job and a whole lot more by broadcasting national security or trade secrets to the wrong people.
Some of the most vulnerable devices are speakerphones, printers, fax machines, scanners, external disc drives, and other high-speed, high-bandwidth peripherals. If the snoop is using a high-quality interception device, your equipment’s signals can be acquired up to several hundred feet away.
Arguably one of the most vulnerable pieces of equipment is an analog VGA monitor. If a spy were to introduce a Trojan into your system, he or she could monitor and store key presses and passwords used during the day. When the system’s not in use at night, the spy could pulse the VGA screen with grayscale images that have a strong signal at particular frequencies. VGA uses single-ended signaling that has a high common-mode emission level not protected by cable shielding, and it’s possible to monitor these signals outside the secure zone using a radio receiver. Even without a Trojan, a sophisticated receiver located nearby picks up and views what’s on the VGA monitor.
What TEMPEST is and isn’t.
It should come as no surprise that the Federal government became concerned about signal leakage. In fact, its interest goes back to the days of World War I when the Army was trying to exploit weaknesses of enemy combat phones and radio transmitters. Since then, the scope of the government’s interests has broadened beyond battlefield equipment. In the last
40 years, the National Security Agency (NSA) has taken several industry measurement standards and greatly beefed them up. These enhanced criteria are commonly referred to as the TEMPEST standards (although the NSA also calls them EMSEC standards, short for “emissions security”).
TEMPEST disciplines involve designing circuits to minimize emanations and the application of appropriate shielding, grounding, and bonding. Some methods used include radiation screening, alarms, and isolation.
A TEMPEST-approved device resembles its non-secure version with a few key differences. If it’s a network component such as a switch, it comes in a heavy metal case. It also has special shielding, a modified power supply, and perhaps a few other modifications from the standard model. If you need to open the device’s case,
a special torque wrench for use with TEMPEST-only products is required.
TEMPEST test equipment is very expensive and is sold exclusively to government agencies. Nobody can sell you commercial TEMPEST testing equipment. And if someone offers you a “TEMPEST surveillance system,” you need to be aware of two things: First, TEMPEST is counter-surveillance science and the offer is a fraud; second, the salesperson is committing a federal felony.
If you buy surveillance equipment—authentic or not—then you have also commited a felony. Construction of, possession of, attempting a sale of, or attempting a purchase of said surveillance equipment is illegal. Even if the product purchased is a hoax, the law will take your intentions into account as much as the salesperson’s. Don’t be surprised if you
both go to jail.
In the United States, you can learn about TEMPEST testing only in special schools sanctioned by, if not run by, the NSA. Courses to earn the TEMPEST Technician or TEMPEST Engineer certifications are very expensive. These classes are offered to a limited number of people who have a very high level of security clearance and who will be working on TEMPEST-approved equipment all the time.
All TEMPEST-approved communication devices have a rating based on their application and/or environment.
Type 1: This rating is for classified cryptographic equipment used for national security purposes. It’s endorsed by the NSA for securing telecommunications and automated information systems and for the protection of classified or sensitive U.S. Government information.
Type 2: This rating is for unclassified cryptographic equipment used by U.S. Government agencies, state and local governments, and sponsored U.S. Government contractors. It’s endorsed by the NSA for securing telecommunications and automated information systems and for the protection of unclassified but sensitive information, such as contract bids.
Type 3: This rating is for unclassified commercial cryptographic equipment that implements an algorithm registered with the National Institute of Standards and Technology (NIST). It’s for use in protecting sensitive information, like a corporation’s network communications. collapse
Black Box Explains... Industrial modem benefits.
Not all modems shuttle data in air-conditioned, climate-controlled comfort. And modems that operate in cozy environments have absolutely no business being exposed to harsh industrial conditions or to the elements.
But... more/see it nowjust because you work in a rough-and-tumble place doesnt mean you have to sacrifice the convenience of a good modem. Instead, you should opt for an industrial modem. There are many industrial modems built for various degrees of extremity.
Survivability depends on reliability.
Sure, standard modems give you access to data in remote sites or enable you to service equipment on the plant floor—and you can do all this from the convenience of your office. However, these benefits are only possible if your modem can continue to function in its environment. And since standard modems arent built for adverse conditions, theyre not going to be reliable.
No penalties for interference.
Electrical control equipment—such as motors, relays, compressors, and generators—emit electromagnetic interference (EMI) that can affect the performance and reliability of a standard telephone modem.
EMI is emitted through power lines, the RS-232 communications cable, or through the telephone line itself. The very means of data communication, cable, is often the worst enemy of the standard modems that use it.
An industrial modem, on the other hand, has filters and superior EMI immunity to protect itself and your data. If you build your electrical cabinets to UL® or CSA standards, remember that your modem must also conform to UL® standard 508.
They go to extremes.
Temperature is the biggest killer of electronic equipment in industrial environments. The heat generated by industrial equipment in sealed enclosures or where space is a premium can make the temperature as much as 50 °F higher than the surrounding environment.
So standard modems cant take the heat. But what about being outdoors in the other extreme, cold weather? Well, standard modems cant take the cold either.
If you install your equipment in remote outdoor locations, it must work on the coldest days— especially those cold days when you least want to get in the car and go to the site to repair a standard modem that froze up.
Whether theyre placed in manufacturing environments or the great outdoors, industrial modems get the data through when you need it. They go to extremes for you.
Heavy metal for all kinds of banging around.
Industrial modems are built with durable metal enclosures that protect circuitry in rough conditions and ward off signal-disrupting EMI. Plus, they feature steel-bolt flanges to anchor them. In short, industrial modems can take the physical, heavy-duty punishment thrown their way.
So where exactly can you use an industrial modem?
• Heavy industry and manufacturing
• Oil and gas fields
• Storage sites
• Utility substations
• Agricultural projects
• Military facilities
• Research installations
• Water/wastewater systems
and another thing!
If dedicated copper lines cant be run through industrial environments, or if the fiber optic option is cost-prohibitive, there are also wireless industrial modems that make line-of-sight connections. If theres a way to get the data through, industrial modems will get the job done.
Industrial modems remain in service for a very long time. But if you ever need a replacement that is hardware or software compatible, be assured that Black Box continues to support its products year after year—so you don’t spend your time re-engineering systems if you have to make a replacement. collapse
Black Box Explains...FDDI
Fiber Distributed Data Interface (FDDI) is a networking standard for operating at speeds of up to 100 Mbps. The standard FDDI network is set up in a ring topology with... more/see it nowtwo rings that transmit signals in opposite directions to a series of nodes. FDDI accommodates up to 500 nodes per dual-ring network with spacing up to 2 kilometers between adjacent nodes. FDDI uses the same token-passing scheme as the IEEE 802.5 Token Ring network to control transmission around the loop. collapse
Black Box Explains...UARTs at a glance.
Universal Asynchronous Receiver/Transmitters (UARTs) are integrated circuits that convert bytes from the computer bus into serial bits for transmission. By providing surplus memory in a buffer, UARTs help applications overcome... more/see it nowthe factors that can hinder system performance, providing maximum throughput to high-performance peripherals without slowing down CPUs.
Early UARTs such as 8250 and 16450 did not include buffering (RAM or memory). With the advent of higher-speed devices, the need for UARTs that could handle more data became critical. The first buffered UART was the 16550, which incorporates a 16-byte First In First Out (FIFO) buffer and provides greater throughput than its predecessors.
Manufacturers have been developing enhanced UARTs that continue to increase performance standards. These faster chips provide improvements such as larger buffers and increased speeds. Here are the rates of todays common UARTs:
UART FIFO Buffer Rate Supported
16550 16-byte 115.2 kbps
16554 16-byte 115.2 kbps
16650 32-byte 460.8 kbps (burst rate)
16654 64-byte 460.8 kbps (burst rate)
16750 64-byte 460.8 kbps (burst rate)
16850 128-byte 460.8 kbps (sustained rate)
16854 128-byte 460.8 kbps (sustained rate) collapse
Black Box Explains... Standard and ThinNet Ethernet cabling.
The Ethernet standard supports 10-, 100-, and 1000-Mbps speeds. It supports both half- and full-duplex configurations over twisted-pair and fiber cable, as well as half-duplex over coax cable.
However, the Thick... more/see it nowand ThinNet Ethernet standards support only 10-Mbps speeds.
Standard (Thick) Ethernet (10BASE5)
• Uses “Thick” coax cable with N-type connectors for a backbone and a transceiver cable with 15-pin connectors from the transceiver to the network interface card.
• The maximum number of segments is five, but only three can have computers attached. The others are for network extension.
• The maximum length of one segment is 500 meters.
• The maximum total length of all segments is 2500 meters.
• The maximum length of one transceiver cable is 50 meters.
• The minimum distance between transceivers is 2.5 meters.
• No more than 100 transceiver connections per segment are allowed. A repeater counts as a station for both segments.
Thin Ethernet (ThinNet) (10BASE2)
• Uses “Thin” coax cable (RG-58A/U or RG-58C/U).
• The maximum length of one segment is 185 meters.
• The maximum number of segments is five.
• The maximum total length of all segments is 925 meters.
• The minimum distance between T-connectors is 0.5 meters.
• No more than 30 connections per segment are allowed.
• T-connectors must be plugged directly into each device. collapse
Black Box Explains...Digital Visual Interface (DVI) connectors.
The DVI (Digital Video Interface) technology is the standard digital transfer medium for computers while the HDMI interface is more commonly found on HDTVs, and other high-end displays.
The Digital... more/see it nowVisual Interface (DVI) standard is based on transition-minimized differential signaling (TMDS). There are two DVI formats: Single-Link and Dual-Link. Single-link cables use one TMDS-165 MHz transmitter and dual-link cables use two. The dual-link cables double the power of the transmission. A single-link cable can transmit a resolution ?of 1920 x 1200 vs. 2560 x 1600 for a dual-link cable.
There are several types of connectors: ?DVI-D, DVI-I, DVI-A, DFP, and EVC.
- DVI-D is a digital-only connector for use between a digital video source and monitors. DVI-D eliminates analog conversion and improves the display. It can be used when one or both connections are DVI-D.
- DVI-I (integrated) supports both digital and analog RGB connections. It can transmit either a digital-to-digital signals or an analog-to-analog signal. It is used by some manufacturers on products instead of separate analog and digital connectors. If both connectors are DVI-I, you can use any DVI cable, but a DVI-I is recommended.
- DVI-A (analog) is used to carry an DVI signal from a computer to an analog VGA device, such as a display. If one or both of your connections are DVI-A, use this cable. ?If one connection is DVI and the other is ?VGA HD15, you need a cable or adapter ?with both connectors.
- DFP (Digital Flat Panel) was an early digital-only connector used on some displays.
- EVC (also known as P&D, for ?Plug & Display), another older connector, handles digital and analog connections.
Black Box Explains... Crosstalk.
One of the most important cable measurements is Near-End Crosstalk (NEXT). Its signal interference from one pair that adversely affects another pair on the same end.
Not only can crosstalk... more/see it nowoccur between adjacent wire pairs (pair-to-pair NEXT), but all other pairs in a UTP cable can also contribute their own levels of both near-end and far-end crosstalk, multiplying the adverse effects of this interference onto a transmitting or receiving wire pair.
Because such compounded levels of interference can prove crippling in high-speed networks, some cable manufacturers have begun listing Power Sum NEXT (PS-NEXT), FEXT, ELFEXT, and PS-ELFEXT ratings for their CAT5e and CAT6 cables. Here are explanations of the different types of measurements:
NEXT measures an unwanted signal transmitted from one pair to another on the near end.
PS-NEXT (Power Sum crosstalk) is a more rigorous crosstalk measurement that includes the total sum of all interference that can possibly occur between one pair and all the adjacent pairs in the same cable sheath. It measures the unwanted signals from multiple pairs at the near end onto another pair at the near end.
FEXT (Far-End crosstalk) measures an unwanted signal from a pair transmitting on the near end onto a pair at the far end. This measurement takes full-duplex operation into account where signals are generated simultaneously on both ends.
ELFEXT (Equal-Level Far-End Crosstalk) measures the FEXT in relation to the received signal level measured on that same pair. It basically measures interference without the effects of attenuationthe equal level.
PS-ELFEXT (Power Sum Equal-Level Far-End Crosstalk), an increasingly common measurement, measures the total sum of all intereference from pairs on the far end to a pair on the near end without the effects of attenuation. collapse