Black Box Explains...NEMA 12 certification.
The National Electrical Manufacturers Association (NEMA) specifies guidelines for cabinet certifications. NEMA 12 cabinets are constructed for indoor use to provide protection against certain contaminants that might come in contact... more/see it nowwith the enclosed equipment. The NEMA 12 designation means a particular cabinet has met the guidelines, which include protection against falling dirt, circulating dust, lint, fibers, and dripping or splashing non-corrosive liquids. Protection against oil and coolant seepage is also a prerequisite for NEMA 12 certification.
Organizations with mission-critical equipment benefit from a NEMA 12 cabinet. Certain environments put equipment at a higher risk than others. For example, equipment in industrial plants is subject to varying degrees of extreme temperature. Even office buildings generate lots of dust and moisture, which is detrimental to equipment. NEMA 12 enclosures help to ensure that your operation suffers from as little downtime as possible. collapse
Black Box Explains...Advanced printer switches.
Matrix—A matrix switch is a switch with a keypad for selecting one of many input ports to connect to any one of many output ports.
Port-Contention—A port-contention switch is an... more/see it nowautomatic electronic switch that can be serial or parallel. It has multiple input ports but only one output port. The switch monitors all ports simultaneously. When a port receives data, it prints and all the other ports have to wait.
Scanning—A scanning switch is like a port-contention switch, but it scans ports one at a time to find one thats sending data.
Code-Operated—Code-operated switches receive a code (data string) from a PC or terminal to select a port.
Matrix Code-Operated—This matrix version of the code-operated switch can be an any-port to any-port switch. This means than any port on the switch can attach to any other port or any two or more ports can make a simultaneous link and transfer data. collapse
Black Box Explains...SCSI Ultra2 and LVD (Low-Voltage Differential).
Small Computer Systems Interface (SCSI), pronounced “scuzzy,” has been the dominant technology used to connect computers and high-speed peripherals since the 1980s. SCSI technology is constantly evolving to accommodate increased... more/see it nowbandwidth needs. One of the more recent developments is Ultra2 SCSI.
Because Ultra2 SCSI is backward compatible, it works with all legacy equipment. Ultra2 doubles the possible bandwidth on the bus from 40 to 80 MBps! Just as importantly, Ultra2 supports distances up to 12 meters (39.3 ft.) for a multiple-device configuration. Ultra2 uses Low-voltage Differential (LVD) techniques to transfer data at faster rates with fewer errors. Don’t confuse Ultra2 with LVD. Ultra2 is a data-transfer method; LVD is the signaling technique used to transfer the data.
Cables are very important when designing or upgrading a system to take advantage of Ultra2 SCSI. Cables and connectors must be of high quality and they should come from a reputable manufacturer to prevent crosstalk and minimize signal radiation. BLACK BOX® Ultra2 LVD cables are constructed of the finest-quality components to provide your system with the maximum protection and highest possible data-transfer rates. collapse
Black Box Explains... How Autocross conversion can work for you.
When using media converters with 10BASE-T or 100BASE-TX cable, you may need to connect your converter to a non-hub device such as a PC or printer.
According to IEEE 802.3 Ethernet... more/see it nowstandards, media converters originally needed a specially pinned crossover cable to connect to PCs. The crossover cable matches the devices transmit and receive pins. Now there are media converters that use straight-pinned 10BASE-T patch cable but incorporate an uplink or crossover connection—a switch on the converter thats set to support the PC-to-converter connection. By setting the uplink switch to “cross,” the converters internal mechanism crosses the pins on the RJ-45 connector to simulate a crossover cable.
Autocross conversion eliminates both the need to crosspin cables and set an uplink switch. It adapts to the pin assignment of the twisted-pair cable whether it’s crossed or uncrossed. And because it senses the pin configuration of any cable pinned to Ethernet specifications, it adjusts automatically without user configuration. collapse
Black Box Explains... Why go wireless?
• Its great for communicating in harsh climates or in areas where its expensive to run cable. Wireless solutions are well suited for use in military applications, farming, refineries, mining,... more/see it nowconstruction, and field research.
• Because sometimes you just cant run wire, like in historic buildings or hazmat areas.
• When its physically or legally impossible to support conventional hard-wired RS-232 communications, wireless networking may be your only answer.
• It gives you quick, temporary connections at trade shows, and fast reconfigurations—even troubleshooting or remote field testing.
• It provides reliable disaster relief when all else fails! Count on wireless networks to maintain mission-critical links when disaster strikes.
• Its more affordable, more reliable, and faster than ever before.
• Best of all, no FCC licensing required! collapse
Black Box Explains...Virtual LANs (VLANs).
True to their name, VLANs are literally virtual LANs—mini subLANs that, once configured, can exist and function logically as single, secure network segments, even though they may be part of... more/see it nowa much larger physical LAN.
VLAN technology is ideal for enterprises with far-reaching networks. Instead of having to make expensive, time-consuming service calls, system administrators can configure or reconfigure workstations easily or set up secure network segments using simple point-and-click, drag-and-drop management utilities. VLANs provide a way to define dynamic new LAN pathways and create innovative virtual network segments that can range far beyond the traditional limits of geographically isolated workstation groups radiating from centralized hubs.
For instance, using VLAN switches, you can establish a secure VLAN made up of select devices located throughout your enterprise (managers workstations, for example) or any other device that you decide requires full access to the VLAN youve created.
According to Cisco, a VLAN is a switched network logically segmented by functions, project teams, or applications regardless of the physical location of users. You can assign each switch port to a different VLAN. Ports configured in the same VLAN share broadcasts; ports that dont belong to the VLAN dont share the data.
VLAN switches group users and ports logically across the enterprise—they dont impose physical constraints like in a shared-hub architecture. In replacing shared hubs, VLAN switches remove the physical barriers imposed by each wiring closet.
To learn more about smart networking with VLANs, call the experts in our Local Area Network Support group at 724-746-5500, press 1, 2, 4. collapse
Black Box Explains...Fiber optic attenuators.
Attenuators are used with single-mode fiber optic devices and cable to filter the strength of the fiber optic signal. Depending on the type of attenuator attached to the devices at... more/see it noweach end of the fiber optic cable, you can diminish the strength of the light signal a variable amount, measured in decibels (dB).
Why would you want to filter the strength of the fiber optic signal? Single-mode fiber is designed to carry a fiber optic signal long distances—as much as 70 kilometers (or 43.4 miles). Fiber devices send this signal with great force to ensure that the signal, and your data, arrive at the other end intact.
But when two fiber devices connected with single-mode fiber cable are close to each other, the signal may be too strong. As a result, the light signal reflects back down the fiber cable. Data can be corrupted and transmissions can be faulty. A signal that is too strong can even damage the attached equipment.
Because its probably not feasible to move your fiber equipment farther apart, the easiest solution is to attach an attenuator to each fiber device. Just as sunglasses filter the strength of sunlight, attenuators filter the strength of the light signal transmitted along single-mode fiber cable. Within the attenuator, theres doping that reduces the strength of the signal passing through the fiber connection and minute air gaps where the two fibers meet. Fiber grooves may also be intentionally misaligned by several microns—but only enough to slow the fiber optic signal to an acceptable rate as it travels down the cable.
Before selecting an attenuator, you need to check the type of adapter on your fiber devices. Attenuators typically fit into any patch panel equipped with FC, SC, or LC adapters that contain either PC or APC contacts. In addition to the type of adapter, you also need to determine the necessary attenuation value, such as 5 or 10 dB. This value varies, depending on the strength of fiber optic signal desired. collapse
Black Box Explains...V.35, the Faster Serial Interface.
V.35 is the ITU (formerly CCITT) standard termed Data Transmission at 48 kbps Using 60108 KHz Group-Band Circuits.
Basically, V.35 is a high-speed serial interface designed to support both higher data... more/see it nowrates and connectivity between DTEs (data-terminal equipment) or DCEs (data-communication equipment) over digital lines.
Recognizable by its blocky, 34-pin connector, V.35 combines the bandwidth of several telephone circuits to provide the high-speed interface between a DTE or DCE and a CSU/DSU (Channel Service Unit/Data Service Unit).
Although its commonly used to support speeds ranging anywhere from 48 to 64 kbps, much higher rates are possible. For instance, maximum V.35 cable distances can theoretically range up to 4000 feet (1200 m) at speeds up to 100 kbps. Actual distances will depend on your equipment and cable.
To achieve such high speeds and great distances, V.35 combines both balanced and unbalanced voltage signals on the same interface. collapse
Black Box Explains...Token Ring Cabling
The original Token Ring specifications called for shielded twisted-pair (STP) cable using either a DB9 connector or a unique square connector called the IBM data connector. Later, Token Ring was... more/see it nowadapted to use conventional unshielded twisted-pair (UTP) cable with RJ-45 connectors. The most common kinds of Token Ring cabling in use to day are Type 1 and Type 6 STP as well as Type 3 UTP.
Type 1 shielded twisted-pair (STP) cable is the original wiring for Token Ring. In Type 1 cabling, each wire is constructed of 22 AWG solid copper. Type 1 cable is not as flexible as Type 6 cable and is generally used for long runs in areas where twists and turns are less likely, such as in walls or conduits.
Type 6 Token Ring cable is a lighter, more pliable version of Type 1 cable. It’s constructed of two stranded 26 AWG copper pairs that are surrounded by an overall braided shield. Type 6 cable is commonly used in offices and open areas, and its flexible construction enables it to negotiate multiple twists and turns.
Type 3 or UTP Token Ring cabling uses the same twisted-pair CAT3, CAT5, or CAT5e cabling with RJ-45 connectors as 10BASE-T Ethernet does. Attaching older Type 1 Token Ring to UTP Token Ring requires a balun or adapter. collapse
Black Box Explains...Connecting peripherals with USB.
Before Universal Serial Bus (USB), adding peripherals required skill. You had to open your computer to install a card, set DIP switches, and make IRQ settings. Now you can connect... more/see it nowdigital joysticks, scanners, speakers, cameras, or PC telephones to your computer instantly. With USB, anyone can make the connection because everything is automatic!
Because USB connections are hot-swappable, you can attach or remove peripherals without shutting down your computer. Also, USB hubs have additional ports that enable you to daisychain multiple devices together. More than 800 leading PC, peripheral, and software manufacturers support USB. collapse