Black Box Explains...50-µm vs. 62.5-µm fiber optic cable.
As todays networks expand, the demand for more bandwidth and greater distances increases. Gigabit Ethernet and the emerging 10 Gigabit Ethernet are becoming the applications of choice for current and... more/see it nowfuture networking needs. Thus, there is a renewed interest in 50-micron fiber optic cable.
First used in 1976, 50-micron cable has not experienced the widespread use in North America that 62.5-micron cable has.
To support campus backbones and horizontal runs over 10-Mbps Ethernet, 62.5-micron fiber, introduced in 1986, was and still is the pre-dominant fiber optic cable because it offers high bandwidth and long distance.
One reason 50-micron cable did not gain widespread use was because of the light source. Both 62.5- and 50-micron fiber cable can use either LED or laser light sources. But in the 1980s and 1990s, LED light sources were common. Because 50-micron cable has a smaller aperture, the lower power of the LED light source caused a reduction in the power budget compared to 62.5-micron cablethus, the migration to 62.5-micron cable. At that time, laser light sources were not highly developed and were rarely used with 50-micron cable — and, when they were, it was mostly in research and technological applications.
The cables share many characteristics. Although 50-micron fiber cable features a smaller core (the light-carrying portion of the fiber), both 50- and 62.5-micron cable use the same cladding diameter of 125 microns. Because they have the same outer diameter, theyre equally strong and are handled in the same way. In addition, both types of cable are included in the TIA/EIA 568-B.3 standards for structured cabling and connectivity.
As with 62.5-micron cable, you can use 50-micron fiber in all types of applications: Ethernet, FDDI, 155-Mbps ATM, Token Ring, Fast Ethernet, and Gigabit Ethernet. It is recommended for all premise applications: backbone, horizontal, and intrabuilding connections. And it should be considered especially for any new construction and installations. IT managers looking at the possibility of 10 Gigabit Ethernet and future scalability will get what they need with 50-micron cable. collapse
Black Box Explains...10-Gigabit Ethernet.
10-Gigabit Ethernet, sometimes called 10-GbE or 10 GigE, is the latest improvement on the Ethernet standard, ratified in 2003 for fiber as the 802.3ae standard, in 2004 for twinax cable... more/see it now
as the 802.3ak standard, and in 2006 for UTP as the 802.3an standard.
10-Gigabit Ethernet offers ten times the speed of Gigabit Ethernet. This extraordinary throughput plus compatibility with existing Ethernet standards has resulted in 10-Gigabit Ethernet quickly becoming the new standard for high-speed network backbones, largely supplanting older technologies such as ATM over SONET. 10-Gigabit Ethernet has even made inroads in the area of storage area networks (SAN) where Fibre Channel has long been the dominant standard. This new Ethernet standard offers a fast, simple, relatively inexpensive way to incorporate super high-speed links into your network.
Because 10-Gigabit Ethernet is simply an extension of the existing Ethernet standards family, it’s a true Ethernet standard—it’s totally backwards compatible and retains full compatibility with 10-/100-/1000-Mbps Ethernet. It has no impact on existing Ethernet nodes, enabling you to seamlessly upgrade your network with straightforward upgrade paths and scalability.
10-Gigabit Ethernet is less costly to install than older high-speed standards such as ATM.
And not only is it relatively inexpensive to install, but the cost of network maintenance and management also stays low—10-Gigabit Ethernet can easily be managed by local network administrators.
10-Gigabit Ethernet is also more efficient than other high-speed standards. Because it uses the same Ethernet frames as earlier Ethernet standards, it can be integrated into your network using switches rather than routers. Packets don’t need to be fragmented, reassembled, or translated for data to get through.
Unlike earlier Ethernet standards, which operate in half- or full-duplex, 10-Gigabit Ethernet operates in full-duplex only, eliminating collisions and abandoning the CSMA/CD protocol used to negotiate half-duplex links. It maintains MAC frame compatibility with earlier Ethernet standards with 64- to 1518-byte frame lengths. The 10-Gigabit standard does not support jumbo frames, although there are proprietary methods for accommodating them.
Fiber 10-Gigabit Ethernet standards
There are two groups of physical-layer (PHY) 10-Gigabit Ethernet standards for fiber:
LAN-PHY and WAN-PHY.
LAN-PHY is the most common group of standards. It’s used for simple switch and router
connections over privately owned fiber and uses a line rate of 10.3125 Gbps with 64B/66B
The other group of 10-Gigabit Ethernet standards, WAN-PHY, is used with SONET/SDH
interfaces for wide area networking across cities, states—even internationally.
10GBASE-SR (Short-Range) is a serial short-range fiber standard that operates over two multimode fibers. It has a range of 26 to 82 meters (85 to 269 ft.) over legacy 62.5-µm 850-nm fiber and up to 300 meters (984 ft.) over 50-µm 850-nm fiber.
10GBASE-LR (Long-Range) is a serial long-range 10-Gbps Ethernet standard that operates at ranges of up to 25 kilometers (15.5 mi.) on two 1310-nm single-mode fibers.
10GBASE-ER (Extended-Range) is similar to 10GBASE-LR but supports distances up to 40 kilometers (24.9 mi.) over two 1550-nm single-mode fibers.
10GBASE-LX4 uses Coarse-Wavelength Division Multiplexing (CWDM) to achieve ranges of 300 meters (984 ft.) over two legacy 850-nm multimode fibers or up to 10 kilometers (6.2 mi.) over two 1310-nm single-mode fibers. This standard multiplexes four data streams over four different wavelengths in the range of 1300 nm. Each wavelength carries 3.125 Gbps to achieve 10-Gigabit speed.
In fiber-based Gigabit Ethernet, the 10GBASE-SR, 10GBASE-LR, and 10GBASE-ER LAN-PHY standards have WAN-PHY equivalents called 10GBASE-SW, 10GBASE-LW, and 10GBASE-EW. There is no WAN-PHY standard corresponding to 10GBASE-LX4.
WAN-PHY standards are designed to operate across high-speed systems such as SONET and SDH. These systems are often telco operated and can be used to provide high-speed data delivery worldwide. WAN-PHY 10-Gigabit Ethernet operates within SDH and SONET using an SDH/SONET frame running at 9.953 Gbps without the need to directly map Ethernet frames into SDH/SONET.
WAN-PHY is transparent to data—from the user’s perspective it looks exactly the same as LAN-PHY.
10-Gigabit Ethernet over Copper
10GBASE-CX4 is a standard that enables Ethernet to run over CX4 cable, which consists of four twinaxial copper pairs bundled into a single cable. CX4 cable is also used in high-speed InfiniBand® and Fibre Channel storage applications.
Although CX4 cable is somewhat less expensive to install than fiber optic cable, it’s limited to distances of up to 15 meters. Because this standard uses such a specialized cable at short distances, 10GBASE-CX4 is generally used only in limited data center applications such as connecting servers or switches.
10GBASE-Kx is backplane 10-Gigabit Ethernet and consists of two standards. 10GBASE-KR is a serial standard compatible with 10GBASE-SR, 10GBASE-LR, and 10GBASE-ER. 10GBASE-KX4 is compatible with 10GBASE-LX4. These standards use up to 40 inches of copper printed circuit board with two connectors in place of cable. These very specialized standards are used primarily for switches, routers, and blade servers in data center applications.
10GBASE-T is the 10-Gigabit standard that uses the familiar shielded or unshielded copper UTP cable. It operates at distances of up to 55 meters (180 ft.) over existing Category 6 cabling or up to 100 meters (328 ft.) over augmented Category 6, or “6a,” cable, which is specially designed to reduce crosstalk between UTP cables. Category 6a cable is somewhat bulkier than Category 6 cable but retains the familiar RJ-45 connectors.
To send data at these extremely high speeds across four-pair UTP cable, 10GBASE-T uses sophisticated digital signal processing to suppress crosstalk between pairs and to remove signal reflections.
10-Gigabit Ethernet Applications
> 10-Gigabit Ethernet is already being deployed in applications requiring extremely
> As a lower-cost alternative to Fibre Channel in storage area networking (SAN)
> High-speed server interconnects in server clusters.
> Aggregation of Gigabit segments into 10-Gigabit Ethernet trunk lines.
> High-speed switch-to-switch links in data centers.
> Extremely long-distance Ethernet links over public SONET infrastructure.
Although 10-Gigabit Ethernet is currently being implemented only by extremely high-volume users such as enterprise networks, universities, telecommunications carriers, and Internet service providers, it’s probably only a matter of time before it’s delivering video to your desktop. Remember that only a few years ago, a mere 100-Mbps was impressive enough to be called “Fast Ethernet.”
Black Box Explains...Remote access.
Remote access is the ability to access a network, a personal computer, a server, or other device from a distance for the purpose of controlling it or to access data.... more/see it nowToday, remote access is usually accomplished over the Internet, although a local IP network, telephone lines, cellular service, or leased lines may also be used. With today’s ubiquitous Internet availability, remote access is increasingly popular and often results in significant cost savings by enabling greater network access and reducing travel to remote sites.
Remote access is a very general term that covers a wide range of applications from telecommuting to resetting a distant server. Here are just a few of the applications that fall under the remote access umbrella:
Remote network access
A common use for remote access is to provide corporate network access to employees who work at home or are in sales or other traveling positions. This kind of remote access typically uses IPsec VPN tunnels to authenticate and secure connections.
Remote desktop access
Remote desktop access enables users to access a computer remotely from another computer and take control of it as if it were local. This kind of remote control requires that special software—which is included with most operating systems—be installed and enabled. It’s often used by those who travel frequently to access their “home” computer, and by network administrators for remote server access. This remote access method has some inherent security concerns and is usually incompatible with firewalls, so it’s important to be aware of its limitations and use adequate security precautions.
Remote KVM access
A common application in organizations that maintain servers across multiple sites is server administration through an IP-enabled KVM switch. These IP-addressable switches support one or more servers and have an integral Web server, enabling users to access them over the Internet through a Web browser. Because they’re intended for Internet use, these switches offer authentication and encryption for secure connections.
Remote power management
Anyone who’s ever had to get out of bed in the middle of the night to go switch a server off and back on again to reset it can appreciate the convenience of remote power management. Remote power managers have a wide range of capabilities ranging from simple power switching to reboot a device to sophisticated power monitoring, reporting, and management functions.
Remote environmental security monitoring
Remote environmental and security monitoring over the Internet is increasingly popular, largely because of the cost savings of using existing network infrastructure rather than a proprietary security system. This application requires IP-addressable hubs that support a variety of sensors ranging from temperature and humidity to power monitors. Some models even support surveillance cameras.
Black Box Explains…Remote monitoring.
Beyond virus protection.
It has become almost automatic to protect your data center by backing up your servers, installing firewalls and virus protection, and keeping the protection up-to-date.
But what about... more/see it nowmore tangible threats? Do you have hot spots in your racks? If the cooling system shuts down, how will you know when temperatures climb out of control? Are you
alerted to humidity changes or water leaks
that threaten your equipment?
Planning for the unexpected is a critical task because there are more systems performing mission-critical functions than ever before. These systems are often deployed without the proper environmental infrastructure to support them. Equipment density is increasing constantly, which is creating more stress on ventilation and power.
The top three IT risks:
1. Environmental disruption.
The number one cause of downtime for remote locations, environmental problems go beyond fires and floods and affect as much as 30% of a company’s mission-critical infrastructure. Cooling and power are key points of exposure and increase as equipment density does.
2. Unnecessary risk.
When systems are housed in less-than-optimal settings, or are in remote and unsupervised locations, any error causes downtime. Yet, it’s not practical to have someone babysitting the servers.
Regardless of the probability, terrorism is
now something each of us must plan for. Your systems can also be brought down from within if the proper security safeguards are not in place.
What’s an environmental
Environmental monitoring products enable you to actively monitor the conditions in your rack, server room, data center, or anywhere else you need to protect critical assets. Conditions
monitored include extreme temperatures, humidity, power spikes and surges, water leaks, smoke,
and chemical materials. With proper environmental monitoring, you’re alerted to any conditions that could have an adverse effect on your mission-critical equipment. These products can also
alert you to potential damage from human error, hacking, or prying fingers.
Environmental monitors consist of three main elements: a base unit, probes or sensors, and
network connectivity and integration. The base units may contain one or more built-in sensors,
as well as ports for hooking up external probes. Additionally, they include an Ethernet port and have software for remote configuration and graphing. This software may also work with
existing network management software,
such as SNMP systems.
An environmental monitoring appliance
displays the values measured by the attached probes, e.g. temperature, humidity, airflow,
status of dry contact, door, motion detector,
and other sensors.
Data collecting and graphing.
Measurements are periodically stored in the internal memory or external storage media and displayed as graphs.
When the measured value exceeds the
predefined threshold, it triggers an alert: a blinking LED on the front panel, an audible alarm, SNMP trap, e-mail, etc. The environmental monitoring appliance can also activate an external alarm
system like a siren or strobe light.
Benefits of environmental monitoring:
Reduced downtime—When things go wrong, you’re the first to know. Minimize downtime by being alerted about conditions that cause damage to servers and other network devices.
Increased profits—Environmental monitoring systems are easy to implement. Also, they help you cut replacement equipment costs and redistribute your workforce more effectively.
Increased employee satisfaction—With built-in notification features like e-mail, SMS, and SNMP traps, a remote monitoring system enables employees to better manage their work.
Envornmental and security monitoring systems can be used for a variety of applications, including:
Data center monitoring
Computer room monitoring
Rackmount industrial equipment
Food and beverage applications
Air conditioner/refrigerants/freezer monitoring
Black Box Explains...10-GbE, CAT6A, and ANEXT.
The IEEE released the 802.3an 10GBASE-T standard in June 2006. This standard specifies 10-Gbps data transmission
over four-pair copper cabling. 10-Gigabit Ethernet (10-GbE) transmission includes up to 37 meters of... more/see it nowCAT6 cable (with installation mitigation techniques), 100 meters of Augmented Category 6 (CAT6A) UTP or F/UTP cable or 100 meters
of S/FTP CAT7/Class F cable.
CAT6A is the ANSI/TIA 10-Gigabit Ethernet (10-GbE) over copper standard. Its requirements are covered in ANSI/TIA-568-C.2 (Balanced Twisted-Pair Communications Cabling and Components Standard) published in August 2009. It defines 10-Gigabit data transmission over a 4-connector twisted-pair CAT6A copper cable for a distance of 100 meters.
Category 6A cabling is designed to support next-generation applications, including the transfer of large amounts of data at high speeds, up to 10 Gbps. CAT6A extends electrical specifications to 500 MHz from 250 MHz for CAT6 cabling. CAT6A cables are fully backward compatible with previous categories, including CAT6 and 5e. Category 6A is also designed to support bundled cable installations up to 100 meters and PoE+ low-power implementations. The standard includes the performance parameter, Alien Crosstalk (ANEXT). Because of its higher performance transmission speeds and higher MHz rating, CAT6A cable needs to be tested for external noise outside the cable, which wasn’t a concern with previous cabling categories. CAT6A UTP also has a much larger diameter than previous cables.
Alien crosstalk (ANEXT) is a critical and unique measurement in 10-GbE systems. Crosstalk, measured in 10/100/1000BASE-T systems, is the mixing of signals between wire pairs within a cable. Alien Crosstalk, in 10-GbE systems, is the measurement of the unwanted signal coupling between wire pairs in different and adjacent cables or from one balanced twisted-pair component, channel, or permanent link to another.
The amount of ANEXT depends on a number of factors, including the type of cable, cable jacket, cable length, cable twist density, proximity of adjacent cables, and connectors, and EMI. Patch panels and connecting hardware are also affected by ANEXT.
With Alien Crosstalk, the affected cable is called the victim cable. The surrounding cables are the disturber cables.
There are a number of ways to mitigate the effects of ANEXT in CAT6A runs. According to the standards, ANEXT can be improved by laying CAT6A UTP cable loosely in pathways and raceways with space between the cables. This contrasts to the tightly bundled runs of CAT6/5e cable that we are used to. The tight bundles present a worst-case scenario of six cables around one, thus the center cable would be adversely affected by ANEXT. CAT6A UTP cable needs to be tested for ANEXT. This is a complex and time-consuming process in which all possible wire-pair combinations need to be tested for ANEXT and far-end ANEXT. It can take 50 minutes to test one link in a bundle of 24 CAT 6A UTP cables.
To virtually eliminate the problem of ANEXT, you can use CAT6A F/UTP cable. The F indicates an outer foil shield encasing four unshielded twisted pairs. This cable is also a good choice when security is an issue because it doesn’t emit signals. In addition, CAT6A F/UTP cable works well in noisy environments with a lot of EMI/RFI.
Installation of CAT6A F/UTP is simpler, too, because the cable features a smaller outside diameter than CAT6A UTP. Its construction makes it easier to pull and more resilient. The cable also has a smaller diameter so you can run more cables in a conduit or pathway, and have greater patch panel port density.
For more information, see the CAT6A F/UTP vs. UTP: What You Need to Know white paper in the Resources section at blackbox.com.
Black Box Explains...T1 channel banks.
T1 is a digital transmission method for multiplexing multiple voice and data channels over two pairs of wires.
By using a technique called Time-Division Multiplexing (TDM), T1 interleaves both voice and/or... more/see it nowLAN data across DS0 subchannels. The primary benefit of T1 is bandwidth—1.544 Mbps—available in 24 easily allocated 64-kbps DS0 subchannels.
T1 sends data in frames made up of 24 eight-bit words (one word for each subchannel) and one framing bit for a total of 193 bits per frame. A T1 channel transmits 8000 frames per second.
The framing bits on successive frames follow a pattern for a superframe format. T1 channel banks check this pattern to make sure synchronization is maintained.
T1 is the most flexible end-to-end digital service option available today. Its the preferred service for internetworking voice, data, fax, and video signals across an enterprise network. And Black Box is your supplier of T1 hardware with a broad range of solutions for consolidating your global high-speed network management. collapse
Black Box Explains...Remote Access Servers.
Remote access servers (RASs) are high-level intelligent devices with multiple asynchronous communication ports that connect to modems and provide remote users with dial-in access to a central site network.
You... more/see it nowcan configure your RAS to operate via remote control or remote node access.
Remote control operation enables remote users to send keystroke data and receive screen output from the central site. The actual processing takes place inside the communication server. Remote node access enables the remote user to become a network node and all remote workstations to function as if they were connected locally.
A fixed-port remote access server has a network connection to your LAN and one or more asynchronous RS-232 ports that connect to external modems. It usually comes equipped with 4, 8, or 16 async ports and is easy to install, support, and maintain. These devices are ideal for traveling workers who dont have a remote office but who need connections to the corporate network for short periods of time.
For configuration flexibility, scalability, and remote wide-area connection options, choose a modular remote-access server that you can change as your network grows. Most modular RASs accept a variety of modules, including:
• High-density async RS-232 modules that connect to external modems or ISDN terminal adapters. These modules typically have eight or more ports.
• High-density modem modules that usually incorporate eight modems on a single card, enabling you to consolidate equipment costs, increase reliability, and simplify management.
• Digital modules that enable you to make direct connections to high-speed digital lines. Instead of using multiple dialup lines, you can use these devices to bring a single high-speed digital phone line—known as a channelized T1— to your equipment.
The best way to determine what type of RAS you need—or whether you need a router or a RAS—is to identify what remote solution will meet your connectivity requirements. If you’re not sure what you need, contact our FREE Tech Support. collapse
Black Box Explains...Modem eliminators.
Understanding the process of elimination.
If your office environment has sync equipment, and if that equipment is also used for local data communications, you should consider replacing those modems with cost-effective... more/see it nowand versatile modem eliminators.
What does a modem eliminator do?
One modem eliminator can connect a local terminal and computer port in lieu of the pair of modems that they would normally connect to. Plus, a modem eliminator enables DCE-to-DTE data and control-signal connections that are not easily achieved by standard cables or connectors in a sync environment.
Basically, a modem eliminator simulates a sync data link. It does this two ways. First, it provides clocking, which is mandatory for sync devices to communicate. Second, it provides the handshaking that DCEs do.
Why should you use a modem eliminator?
One—if you have two sync DTEs in the same room or close to each other, you will need a modem eliminator.
Two—if you have a network with routers, you just found the perfect equipment tester.
A modem eliminator can enable in-house bench testing of routers or existing equipment. Theres no need to place routers all over your network only to find out they don’t work once you test the LAN. A modem eliminator tells you what equipment passes your tests before you install.
Three—a modem eliminator makes good economic sense. One does the job of two modems—and it does the job better. You get a high return on your investment. collapse
Black Box Explains... Manual switch chassis styles.
There are five manual switch chassis styles: three for standalone switches (Styles A, B, and C) and two for rackmount switches (Styles D and E). Below are the specifications for... more/see it noweach style.
Chassis Style A
Size — 2.5"H x 6"W x 6.3"D (6.4 x 15.2 x 16 cm
Weight — 1.5 lb. (0.7 kg)
Chassis Style B
Size — 3.5"H x 6"W x 6.3"D (8.9 x 15.2 x 16 cm)
Weight — 1.5 lb. (0.7 kg)
Chassis Style C
Size — 3.5"H x 17"W x 5.9"D (8.9 x 43.2 x 15 cm)
Weight — 8.4 lb. (3.8 kg)
Chassis Style D (Mini Chassis)
Size — 3.5"H x 19"W x 5.9"D (8.9 x 48.3 x 15 cm)
Chassis Style E (Standard Chassis)
Size — 7"H x 19"W x 5.9"D (17.8 x 48.3 x 15 cm) collapse
Black Box Explains...SCSI Ultra2 and LVD (Low-Voltage Differential).
Small Computer Systems Interface (SCSI), pronounced “scuzzy,” has been the dominant technology used to connect computers and high-speed peripherals since the 1980s. SCSI technology is constantly evolving to accommodate increased... more/see it nowbandwidth needs. One of the more recent developments is Ultra2 SCSI.
Because Ultra2 SCSI is backward compatible, it works with all legacy equipment. Ultra2 doubles the possible bandwidth on the bus from 40 to 80 MBps! Just as importantly, Ultra2 supports distances up to 12 meters (39.3 ft.) for a multiple-device configuration. Ultra2 uses Low-voltage Differential (LVD) techniques to transfer data at faster rates with fewer errors. Don’t confuse Ultra2 with LVD. Ultra2 is a data-transfer method; LVD is the signaling technique used to transfer the data.
Cables are very important when designing or upgrading a system to take advantage of Ultra2 SCSI. Cables and connectors must be of high quality and they should come from a reputable manufacturer to prevent crosstalk and minimize signal radiation. BLACK BOX® Ultra2 LVD cables are constructed of the finest-quality components to provide your system with the maximum protection and highest possible data-transfer rates. collapse