Black Box Explains...Electronic vs. manual switches.
Whats the difference between electronic and manual switches? Are the benefits of electronic switches worth the price increase over manual switches?
As you might imagine, the inner workings of manual switches... more/see it noware far simpler than those of electronic switches. When you turn the dial of a manual switch, internal connections are physically moved. This is great for less complex applications, but it can cause voltage spikes that can damage particularly sensitive equipment such as laser printers.
Because electronic switches do their switching with solid-state components, you have more control in advanced applications. For example, our AC-powered, code-operated, and fallback switches offer numerous options for out-of-band management of critical network resources. They give you the remote control your operation may need. You can control your high-end applications and sensitive equipment via computer, modem, or even touch-tone phone—a convenience simply not available with manual switches. collapse
Black Box Explains...What to consider when choosing a rack.
There are several things you should consider when choosing a rack.
What kind of equipment will you be putting in it? If you need frequent access to all sides of... more/see it nowthe equipment, an open rack is more convenient than a cabinet. If your equipment needs ventilation, a rack poses no air circulation limitations. And don’t neglect aesthetics. Will customers or clients see your installation? A rack with cable management looks much neater.
Finally, consider security. Because a rack is open, you need to take steps to secure your equipment. Set up your rack in a locked room so prying fingers can’t access your network equipment.
Racks come in various sizes and installation styles. Some are freestanding; some are designed to be wallmounted. Some can be a combination of both styles, sitting on the floor but attaching to the wall for more stability.
Understanding rack measurements.
The main component of a rack is a set of vertical rails with mounting holes to which you attach your equipment or shelves.
The first measurement you need to know is the width between the two rails. It’s commonly given in inches, measured from one mounting hole to the corresponding hole on the opposing rail. The most common rail width is 19"; 23" rails and racks are also available. Most rackmount equipment is designed to fit 19" rails but can be adapted for wider racks.
The next important specification is the number of rack units, which is abbreviated as “U.” This is a measurement of the vertical space available on the rails. Cabinets and racks and rackmount equipment are all measured in rack units. One rack unit (1U) is equal to 1.75" of usable vertical space. So, for example, a device that’s 2U high takes up 3.5" of rack space. A rack that’s 20U high has 35" of usable space.
Because the widths are standard, the amount of vertical space is what determines how much equipment you can actually install. Remember this measurement of usable vertical space is smaller than the external height of the rack.
Getting power to your equipment.
Unless you want to have a tangle of extension cords, you’ll need to get one or more power strips for your rack. Consider which kind would be best for your installation. Rackmount power strips come in versions that mount either vertically or horizontally. Some have outlets that are spaced widely to accommodate transformer blocks—a useful feature if most of your equipment uses bulky power transformers.
Surge protection is another important issue. Some power strips have built-in surge protection; some don’t. With the money you have invested in rackmount equipment, you’ll certainly want to make sure it’s protected.
Any mission-critical equipment should also be connected to an uninterruptible power supply (UPS). A UPS prevents your equipment from crashing during a brief blackout or brownout and allows enough time to shut everything down properly in the event of an extended power outage. Choose a rackmount UPS for the most critical equipment or plug the whole rack into a standalone UPS.
Your equipment may look very tidy when it’s all mounted. But unless you’re very careful with your cables, you can create a tangle you’ll never be able to unravel.
Plotting your connections in advance helps you to decide the most efficient way to organize the cables. Knowing where the connections are tells you whether it’s better to run cables horizontally or vertically. Most network problems are in the cabling, so if you let your cables get away from you now, you’re sure to pay for it down the road.
There are many cable management accessories that can simplify your racks. collapse
Black Box Explains… Category 7/Class F.
Category 7/Class F (ISO/IEC 11801:2002) specifies a frequency range of 1–600 MHz over 100 meters of fully shielded twisted-pair cabling. It encompasses four individually shielded pairs inside an overall shield,... more/see it nowcalled Shielded/Foiled Twisted Pair (S/FTP) or Foiled/ Foiled Twisted Pair (F/FTP). There is a pending class Fa, based on the use of S/FTP cable to 1000 MHz. It can support 10GBASE-T transmissions.
With both types of cable, each twisted pair is enclosed in foil. In S/FTP cable, all four pairs are encased in an overall metal braid. In F/FTP, the four pairs are encased in foil.
Category 7/Class F cable can be terminated with two interface designs as specified in IEC 6063-7-7 and IEC 61076-3-104. One is an RJ-45 compatible GG-45 connector. The other is the more common TERA connector, which was launched in 1999.
Category 7/Class F is backwards compatible with traditional CAT6 and CAT5 cable, but it has far more stringent specifications for crosstalk and system noise. The fully shielded cable virtually eliminates crosstalk between the pairs. In addition, the cable is noise resistant, which makes the Category 7/Class F systems ideal for high EMI areas, such as industrial and medical imaging facilities.
Category 7/Class F cable can also increase security by preventing the emission of data signals from the cable to nearby areas. collapse
Black Box Explains... Standard and ThinNet Ethernet cabling.
The Ethernet standard supports 10-, 100-, and 1000-Mbps speeds. It supports both half- and full-duplex configurations over twisted-pair and fiber cable, as well as half-duplex over coax cable.
However, the Thick... more/see it nowand ThinNet Ethernet standards support only 10-Mbps speeds.
Standard (Thick) Ethernet (10BASE5)
• Uses “Thick” coax cable with N-type connectors for a backbone and a transceiver cable with 15-pin connectors from the transceiver to the network interface card.
• The maximum number of segments is five, but only three can have computers attached. The others are for network extension.
• The maximum length of one segment is 500 meters.
• The maximum total length of all segments is 2500 meters.
• The maximum length of one transceiver cable is 50 meters.
• The minimum distance between transceivers is 2.5 meters.
• No more than 100 transceiver connections per segment are allowed. A repeater counts as a station for both segments.
Thin Ethernet (ThinNet) (10BASE2)
• Uses “Thin” coax cable (RG-58A/U or RG-58C/U).
• The maximum length of one segment is 185 meters.
• The maximum number of segments is five.
• The maximum total length of all segments is 925 meters.
• The minimum distance between T-connectors is 0.5 meters.
• No more than 30 connections per segment are allowed.
• T-connectors must be plugged directly into each device. collapse
Black Box Explains...50-µm vs. 62.5-µm fiber optic cable.
As todays networks expand, the demand for more bandwidth and greater distances increases. Gigabit Ethernet and the emerging 10 Gigabit Ethernet are becoming the applications of choice for current and... more/see it nowfuture networking needs. Thus, there is a renewed interest in 50-micron fiber optic cable.
First used in 1976, 50-micron cable has not experienced the widespread use in North America that 62.5-micron cable has.
To support campus backbones and horizontal runs over 10-Mbps Ethernet, 62.5-micron fiber, introduced in 1986, was and still is the pre-dominant fiber optic cable because it offers high bandwidth and long distance.
One reason 50-micron cable did not gain widespread use was because of the light source. Both 62.5- and 50-micron fiber cable can use either LED or laser light sources. But in the 1980s and 1990s, LED light sources were common. Because 50-micron cable has a smaller aperture, the lower power of the LED light source caused a reduction in the power budget compared to 62.5-micron cablethus, the migration to 62.5-micron cable. At that time, laser light sources were not highly developed and were rarely used with 50-micron cable — and, when they were, it was mostly in research and technological applications.
The cables share many characteristics. Although 50-micron fiber cable features a smaller core (the light-carrying portion of the fiber), both 50- and 62.5-micron cable use the same cladding diameter of 125 microns. Because they have the same outer diameter, theyre equally strong and are handled in the same way. In addition, both types of cable are included in the TIA/EIA 568-B.3 standards for structured cabling and connectivity.
As with 62.5-micron cable, you can use 50-micron fiber in all types of applications: Ethernet, FDDI, 155-Mbps ATM, Token Ring, Fast Ethernet, and Gigabit Ethernet. It is recommended for all premise applications: backbone, horizontal, and intrabuilding connections. And it should be considered especially for any new construction and installations. IT managers looking at the possibility of 10 Gigabit Ethernet and future scalability will get what they need with 50-micron cable. collapse
Black Box Explains...Gigabit Ethernet.
As workstations and servers migrated from ordinary 10-Mbps Ethernet to 100-Mbps speeds, it became clear that even greater speeds were needed. Gigabit Ethernet was developed for an even faster Ethernet... more/see it nowstandard to handle the network traffic generated on the server and backbone level by Fast Ethernet. Gigabit Ethernet delivers an incredible 1000 Mbps (or 1 Gbps), 100 times faster than 10BASE-T. At that speed, Gigabit Ethernet can handle even the traffic generated by campus network backbones. Plus it provides a smooth upgrade path from 10-Mbps Ethernet and 100-Mbps Fast Ethernet at a reasonable cost.
Gigabit Ethernet is a true Ethernet standard. Because it uses the same frame formats and flow control as earlier Ethernet versions, networks readily recognize it, and its compatible with older Ethernet standards. Other high-speed technologies (ATM, for instance) present compatibility problems such as different frame formats or different hardware requirements.
The primary difference between Gigabit Ethernet and earlier implementations of Ethernet is that Gigabit Ethernet almost always runs in full-duplex mode, rather than the half-duplex mode commonly found in 10- and 100-Mbps Ethernet.
One significant feature of Gigabit Ethernet is the improvement to the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) function. In half-duplex mode, all Ethernet speeds use the CSMA/CD access method to resolve contention for shared media. For Gigabit Ethernet, CSMA/CD has been enhanced to maintain the 200-meter (656.1-ft.) collision diameter.
Affordability and adaptability
You can incorporate Gigabit Ethernet into any standard Ethernet network at a reasonable cost without having to invest in additional training, cabling, management tools, or end stations. Because Gigabit Ethernet blends so well with your other Ethernet applications, you have the flexibility to give each Ethernet segment exactly as much speed as it needsand if your needs change, Ethernet is easily adaptable to new network requirements.
Gigabit Ethernet is the ideal high-speed technology to use between 10-/100-Mbps Ethernet switches or for connection to high-speed servers with the assurance of total compatibility with your Ethernet network.
When Gigabit Ethernet first appeared, fiber was crucial to running Gigabit Ethernet effectively. Since then, the IEEE802.3ab standard for Gigabit over Category 5 cable has been approved, enabling short stretches of Gigabit speed over existing copper cable. Today, you have many choices when implementing Gigabit Ethernet:
1000BASE-X refers collectively to the IEEE802.3z standards: 1000BASE-SX, 1000BASE-LX, and 1000BASE-CX.
The S in 1000BASE-SX stands for short. It uses short wavelength lasers, operating in the 770- to 860-nanometer range, to transmit data over multimode fiber. Its less expensive than 1000BASE-LX, but has a much shorter range of 220 meters over typical 62.5-µm multimode cable.
The L stands for long. It uses long wavelength lasers operating in the wavelength range of 1270 to 1355 nanometers to transmit data over single-mode fiber optic cable. 1000BASE-LX supports up to 550 meters over multimode fiber or up to 10 kilometers over single-mode fiber.
The C stands for copper. It operates over special twinax cable at distances of up to 25 meters. This standard never really caught on.
Gigabit over CAT5—1000BASE-TX
The 802.3ab specification, or 1000BASE-TX, enables you to run IEEE-compliant Gigabit Ethernet over copper twisted-pair cable at distances of up to 100 meters of CAT5 or higher cable.
Gigabit Ethernet uses all four twisted pairs within the cable, unlike 10BASE-T and 100BASE-TX, which only use two of the four pairs. It works by transmitting 250 Mbps over each of the four pairs in 4-pair cable. collapse
Black Box Explains...Power over Ethernet (PoE).
What is PoE?
The seemingly universal network connection, twisted-pair Ethernet cable, has another role to play, providing electrical power to low-wattage electrical devices. Power over Ethernet (PoE) was ratified by the... more/see it nowInstitute of Electrical and Electronic Engineers (IEEE) in June 2000 as the 802.3af-2003 standard. It defines the specifications for low-level power delivery—roughly 13 watts at 48 VDC—over twisted-pair Ethernet cable to PoE-enabled devices such as IP telephones, wireless access points, Web cameras, and audio speakers.
Recently, the basic 802.3af standard was joined by the IEEE 802.3at PoE standard (also called PoE+ or PoE plus), ratified on September 11, 2009, which supplies up to 25 watts to larger, more power-hungry devices. 802.3at is backwards compatible with 802.3af.
How does PoE work?
The way it works is simple. Ethernet cable that meets CAT5 (or better) standards consists of four twisted pairs of cable, and PoE sends power over these pairs to PoE-enabled devices. In one method, two wire pairs are used to transmit data, and the remaining two pairs are used for power. In the other method, power and data are sent over the same pair.
When the same pair is used for both power and data, the power and data transmissions don’t interfere with each other. Because electricity and data function at opposite ends of the frequency spectrum, they can travel over the same cable. Electricity has a low frequency of 60 Hz or less, and data transmissions have frequencies that can range from 10 million to 100 million Hz.
There are two types of devices involved in PoE configurations: Power Sourcing Equipment (PSE) and Powered Devices (PD).
PSEs, which include end-span and mid-span devices, provide power to PDs over the Ethernet cable. An end-span device is often a PoE-enabled network switch that’s designed to supply power directly to the cable from each port. The setup would look something like this:
End-span device → Ethernet with power
A mid-span device is inserted between a non-PoE device and the network, and it supplies power from that juncture. Here is a rough schematic of that setup:
Non-PoE switch → Ethernet without PoE → Mid-span device → Ethernet with power
Power injectors, a third type of PSE, supply power to a specific point on the network while the other network segments remain without power.
PDs are pieces of equipment like surveillance cameras, sensors, wireless access points, and any other devices that operate on PoE.
PoE applications and benefits.
• Use one set of twisted-pair wires for both data and low-wattage appliances.
• In addition to the applications noted above, PoE also works well for video surveillance, building management, retail video kiosks, smart signs, vending machines, and retail point-of-information systems.
• Save money by eliminating the need to run electrical wiring.
• Easily move an appliance with minimal disruption.
• If your LAN is protected from power failure by a UPS, the PoE devices connected to your LAN are also protected from power failure.
Black Box Explains...MT-RJ fiber optic connectors.
Bringing fiber to the desktop is a great way to provide your users with increased bandwidth. The first step in achieving this goal is to provide an inexpensive fiber optic... more/see it nowsystem that is intuitive to the end user, easy to terminate in the field, and widely supported by equipment manufacturers. MT-RJ could be the answer to all these requirements.
A collaborative effort by leading fiber optic manufacturers, MT-RJ has an intuitive RJ latch that users recognize from copper Category 5 patch cords and traditional telephone cords, and it operates in the same way. The plug and jack are also similar in size to traditional RJ-type connectors.
Field installation, a common concern, is easier because of MT-RJs no-polish, no-epoxy, quick-termination design. MT-RJ is available in single- or multimode configurations and is backwards compatible for integration into existing networks. Since MT-RJ has duplex polarity, you dont have to worry about the polarity reversal that happens with traditional ST type connectors. The TIA/EIA recently voted to accept MT-RJ, indicating wide acceptance of the new design and possible future inclusion in the TIA/EIA 568A standard.
Black Box, the name you trust to keep you up with the latest industry developments, supports this new technology. collapse
Black Box Explains…TEMPEST.
TEMPEST is an acronym for Telecommunications Electronics Material Protected from Emanating Spurious Transmissions. It pertains to technical security countermeasures, standards, and instrumentation that prevent or minimize the exploitation of vulnerable... more/see it nowdata communication equipment by technical surveillance or eavesdropping.
What puts your data communication equipment at risk?
Many things. But first and foremost, its microchip.
Any device with a microchip generates an electromagnetic field, often called a “compromising emanation” by security experts. With the proper surveillance equipment, these emanations can be intercepted and the signal reconstructed and analyzed. Unprotected equipment can, in fact, emit a signal into the air like a radio station—and nobody wants to risk his or her job and a whole lot more by broadcasting national security or trade secrets to the wrong people.
Some of the most vulnerable devices are speakerphones, printers, fax machines, scanners, external disc drives, and other high-speed, high-bandwidth peripherals. If the snoop is using a high-quality interception device, your equipment’s signals can be acquired up to several hundred feet away.
Arguably one of the most vulnerable pieces of equipment is an analog VGA monitor. If a spy were to introduce a Trojan into your system, he or she could monitor and store key presses and passwords used during the day. When the system’s not in use at night, the spy could pulse the VGA screen with grayscale images that have a strong signal at particular frequencies. VGA uses single-ended signaling that has a high common-mode emission level not protected by cable shielding, and it’s possible to monitor these signals outside the secure zone using a radio receiver. Even without a Trojan, a sophisticated receiver located nearby picks up and views what’s on the VGA monitor.
What TEMPEST is and isn’t.
It should come as no surprise that the Federal government became concerned about signal leakage. In fact, its interest goes back to the days of World War I when the Army was trying to exploit weaknesses of enemy combat phones and radio transmitters. Since then, the scope of the government’s interests has broadened beyond battlefield equipment. In the last
40 years, the National Security Agency (NSA) has taken several industry measurement standards and greatly beefed them up. These enhanced criteria are commonly referred to as the TEMPEST standards (although the NSA also calls them EMSEC standards, short for “emissions security”).
TEMPEST disciplines involve designing circuits to minimize emanations and the application of appropriate shielding, grounding, and bonding. Some methods used include radiation screening, alarms, and isolation.
A TEMPEST-approved device resembles its non-secure version with a few key differences. If it’s a network component such as a switch, it comes in a heavy metal case. It also has special shielding, a modified power supply, and perhaps a few other modifications from the standard model. If you need to open the device’s case,
a special torque wrench for use with TEMPEST-only products is required.
TEMPEST test equipment is very expensive and is sold exclusively to government agencies. Nobody can sell you commercial TEMPEST testing equipment. And if someone offers you a “TEMPEST surveillance system,” you need to be aware of two things: First, TEMPEST is counter-surveillance science and the offer is a fraud; second, the salesperson is committing a federal felony.
If you buy surveillance equipment—authentic or not—then you have also commited a felony. Construction of, possession of, attempting a sale of, or attempting a purchase of said surveillance equipment is illegal. Even if the product purchased is a hoax, the law will take your intentions into account as much as the salesperson’s. Don’t be surprised if you
both go to jail.
In the United States, you can learn about TEMPEST testing only in special schools sanctioned by, if not run by, the NSA. Courses to earn the TEMPEST Technician or TEMPEST Engineer certifications are very expensive. These classes are offered to a limited number of people who have a very high level of security clearance and who will be working on TEMPEST-approved equipment all the time.
All TEMPEST-approved communication devices have a rating based on their application and/or environment.
Type 1: This rating is for classified cryptographic equipment used for national security purposes. It’s endorsed by the NSA for securing telecommunications and automated information systems and for the protection of classified or sensitive U.S. Government information.
Type 2: This rating is for unclassified cryptographic equipment used by U.S. Government agencies, state and local governments, and sponsored U.S. Government contractors. It’s endorsed by the NSA for securing telecommunications and automated information systems and for the protection of unclassified but sensitive information, such as contract bids.
Type 3: This rating is for unclassified commercial cryptographic equipment that implements an algorithm registered with the National Institute of Standards and Technology (NIST). It’s for use in protecting sensitive information, like a corporation’s network communications. collapse