Black Box Explains...Optical isolation and ground loops.
Optical isolation protects your equipment from dangerous ground loops. A ground loop is a current across a conductor, created by a difference in potential between two grounded points, as in... more/see it nowequipment in two buildings connected by a run of RS-232 or other data line. When two devices are connected and their potentials are different, voltage flows from high to low by traveling through the data cable. If the voltage potential is large enough, your equipment wont be able to handle the excess voltage and one of your ports will be damaged.
Ground loops can also exist in industrial environments. They can be created when power is supplied to your equipment from different transformers or when someone simply turns equipment on and off. Ground loops can also occur when there is a nearby lightning strike. During an electrical storm, the ground at one location can be charged differently than the other location, causing a heavy current flow through the serial communication lines that damage components.
You cant test for ground loops. You dont know you have one until a vital component fails. Only prevention works. For data communication involving copper cable, optical isolation is key.
With optical isolation, electrical data is converted to an optical beam, then back to an electrical pulse. Because there is no electrical connection between the DTE and DCE sides, an optical isolator unlike a surge suppressorwill not pass large sustained power surges through to your equipment. Since data only passes through the optical isolator, your equipment is protected against ground loops and other power surges. collapse
Black Box Explains... Pulling eyes and fiber cable.
Fiber optic cable can be damaged if pulled improperly. Broken or cracked fiber, for example, can result from pulling on the fiber core or jacket instead of the strength member.... more/see it nowAnd too much tension or stress on the jacket, as well as too tight of a bend radius, can damage the fiber core. If the cables core is harmed, the damage can be difficult to detect.
Once the cable is pulled successfully, damage can still occur during the termination phase. Field termination can be difficult and is often done incorrectly, resulting in poor transmission. One way to eliminate field termination is to pull preterminated cable. But this can damage the cable as well because the connectors can be knocked off during the pulling process. The terminated cable may also be too bulky to fit through ducts easily. To help solve all these problems, use preterminated fiber optic cable with a pulling eye. This works best for runs up to 2000 feet (609.6 m).
The pulling eye contains a connector and a flexible, multiweave mesh-fabric gripping tube. The latched connector is attached internally to the Kevlar®, which absorbs most of the pulling tension. Additionally, the pulling eyes mesh grips the jacket over a wide surface area, distributing any remaining pulling tension and renders it harmless. The end of the gripping tube features one of three different types of pulling eyes: swivel, flexible, or breakaway.
Swivel eyes enable the cable to go around bends without getting tangled. They also prevent twists in the pull from being transferred to the cable. A flexible eye follows the line of the pull around corners and bends, but its less rigid. A breakaway eye offers a swivel function but breaks if the tension is too great. We recommend using the swivel-type pulling eye.
A pulling eye enables all the fibers to be preterminated to ensure better performance. The terminated fibers are staggered inside the gripping tube to minimize the diameter of the cable. This enables the cable to be pulled through the conduit more easily. collapse
Black Box Explains... G.703.
G.703 is the ITU-T recommendation covering the 4-wire physical interface and digital signaling specification for transmission at 2.048 Mbps (E1). G.703 also includes specifications for U.S. 1.544-Mbps T1 but is... more/see it nowstill generally used to refer to the European 2.048-Mbps transmission interface. collapse
Black Box Explains...How to maximize your wireless range.
There are four simple rules that enable you to transmit wireless communications up to their maximum range:
• Try to keep a direct line between the transmitter and receiver.
• Minimize... more/see it nowthe number of walls and ceilings between the transmitter and receiver. Such obstructions reduce the range.
• If there are obstructions, be sure the wireless signal passes through drywall or open doorways and not other materials.
• Keep the transmitter and receiver at least 3 to 6 feet (0.9 to 1.8 m) away from electrical devices or appliances, especially those that generate extreme RF noise. collapse
Black Box Explains...Ethernet.
If you have an existing network, there’s a 90% chance it’s Ethernet. If you’re installing a new network, there’s a 98% chance it’s Ethernet—the Ethernet standard is... more/see it nowthe overwhelming favorite network standard today.
Ethernet was developed by Xerox®, DEC®, and Intel® in the mid-1970s as a 10-Mbps (Megabits per second) networking protocol—very fast for its day—operating over a heavy coax cable (Standard Ethernet).
Today, although many networks have migrated to Fast Ethernet (100 Mbps) or even Gigabit Ethernet (1000 Mbps), 10-Mbps Ethernet is still in widespread use and forms the basis of most networks.
Ethernet is defined by international standards, specifically IEEE 802.3. It enables the connection of up to 1024 nodes over coax, twisted-pair, or fiber optic cable. Most new installations today use economical, lightweight cables such as Category 5 unshielded twisted-pair cable and fiber optic cable.
How Ethernet Works
Ethernet signals are transmitted from a station serially, one bit at a time, to every other station on the network.
Ethernet uses a broadcast access method called Carrier Sense Multiple Access/Collision Detection (CSMA/CD) in which every computer on the network hears every transmission, but each computer listens only to transmissions intended for it.
Each computer can send a message anytime it likes without having to wait for network permission. The signal it sends travels to every computer on the network. Every computer hears the message, but only the computer for which the message is intended recognizes it. This computer recognizes the message because the message contains its address. The message also contains the address of the sending computer so the message can be acknowledged.
If two computers send messages at the same moment, a collision occurs, interfering with the signals. A computer can tell if a collision has occurred when it doesn’t hear its own message within a given amount of time. When a collision occurs, each of the colliding computers waits a random amount of time before resending the message.
The process of collision detection and retransmission is handled by the Ethernet adapter itself and doesn’t involve the computer. The process of collision resolution takes only a fraction of a second under most circumstances. Collisions are normal and expected events on an Ethernet network. As more computers are added to the network and the traffic level increases, more collisions occur as part of normal operation. However, if the network gets too crowded, collisions increase to the point where they slow down the network considerably.
Standard (Thick) Ethernet (10BASE5)
Thin Ethernet (ThinNet) (10BASE2)
- Uses thick coax cable with N-type connectors for a backbone and a transceiver cable with 9-pin connectors from the transceiver to the NIC.
- Both ends of each segment should be terminated with a 50-ohm resistor.
- Maximum segment length is 500 meters.
- Maximum total length is 2500 meters.
- Maximum length of transceiver cable is 50 meters.
- Minimum distance between transceivers is 2.5 meters.
- No more than 100 transceiver connections per segment are allowed.
Twisted-Pair Ethernet (10BASE-T)
- Uses "Thin" coax cable.
- The maximum length of one segment is 185 meters.
- The maximum number of segments is five.
- The maximum total length of all segments is 925 meters.
- The minimum distance between T-connectors is 0.5 meters.
- No more than 30 connections per segment are allowed.
- T-connectors must be plugged directly into each device.
Fiber Optic Ethernet (10BASE-FL, FOIRL)
- Uses 22 to 26 AWG unshielded twisted-pair cable (for best results, use Category 4 or 5 unshielded twisted pair).
- The maximum length of one segment is 100 meters.
- Devices are connected to a 10BASE-T hub in a star configuration.
- Devices with standard AUI connectors may be attached via a 10BASE-T transceiver.
- Uses 50-, 62.5-, or 100-micron duplex multimode fiber optic cable (62.5 micron is recommended).
- The maximum length of one 10BASE-FL (the new standard for fiber optic connections) segment is 2 kilometers.
- The maximum length of one FOIRL (the standard that preceded the new 10BASE-FL) segment is 1 kilometer.
Black Box Explains... Using fiber optics for KVM extension.
If you‘re sending KVM signals between buildings for an extended distance, in areas supplied by different power sources, in an electrically noisy environment, or where data security is a big... more/see it nowconcern, you need to use a fiber optic-based KVM extender.
Optical fiber is an ideal transmission medium not only for backbone and horizontal connection, but also for workstation-to-backracked CPU or server links. It works very well in applications where you need to transfer large, bandwidth-consuming data files over long distances, and where you require immunity from electrical interference or data theft.
The choice for extraordinary reach.
Fiber doesn’t have the 100-meter (328-ft.) distance limitation that UTP copper without a booster does. Fiber distances can range from 300 meters (984.2 ft.) to 70 kilometers (24.8 mi.), depending on the cable, wavelength, and network. With fiber-based KVM extenders, the transmitter converts conventional data signals into a modulated light beam, then transports the beam via the fiber to a receiver, which converts the light back into electrical signals.
Many newer fiber-based KVM extenders support both analog and digital transmission. Often, they work by digitizing video output from a local CPU, then sending it across fiber link to a remote unit, which converts it back to the original analog signal. In many cases, one fiber of the fiber pair transmits monitor video serially and the second fiber sends remote mouse and keyboard information back to the local CPU.
The choice for ensuring signal integrity.
Because fiber is made of glass, which is an insulator, no electric current can flow through. It’s immune to electromagnetic interference and radio-frequency interference (EMI/RFI), crosstalk, impedance problems, and more. This is why fiber-based KVM extenders are beneficial to users in process control, engineering, utility, and factory automation applications. The users need to keep critical information safe and secure off the factory floor but be able to access that data from workstations and control consoles within the harsh environments. Plus, fiber is also less susceptible to temperature fluctuations than copper is, and it can be submerged ?in water.
The choice for greater signal fidelity.
Fiber-based KVM extenders can carry more information with greater fidelity than copper-based ones can. For this reason, they’re ideal for high-data-rate systems in which multimedia workstations are used.
Newer KVM extenders enable you to send both DVI and keyboard and mouse signals over the same fiber cable, transmitting video digitally for zero signal loss. This way, you can get HD-quality resolution even at very long distances from the source. Users in university or government R&D, broadcasting, healthcare—basically anyone who depends on detailed image rendering—can benefit from this technology.
The choice for data security.
Plus, your data is safe when using fiber to connect a workstation with a CPU or server under lock and key. It doesn’t radiate signals and is extremely difficult to tap. If the cable is tapped, it’s very easy to monitor because the cable leaks light, causing the entire system to fail. If an attempt is made to break the physical security of your fiber system, you’ll know it.
Many IT managers in military, government, finance, and healthcare choose fiber-based KVM extenders for this very reason. Plus corporations, aware of rising data privacy concerns over customer billing information and the need to protect intellectual property, use this type of extension technology in their offices, too.
Considerations for fiber-based KVM extension.
Before selecting a fiber-based KVM extender, it’s important to know the limitations of your system. You need to know where couplers, links, interconnect equipment, and other devices are going to be placed. If it’s a longer run, you have to determine whether multimode or single-mode fiber cable is needed.
The most important consideration in planning cabling for fiber-based KVM extension is the power budget specification of device connection. The receiver at the remote end has to receive the light signal at a certain level. This value, called the loss budget, tells you the amount of loss in decibels (dB) that can be present in the link between the two devices before the units fail to perform properly.
Specifically, this value takes the fiber type (multimode or single-mode) and wavelength you intend to use—and the amount of expected in-line attenuation—into consideration. This is the decrease of signal strength as it travels through the fiber cable. In the budget loss calculation, you also have to account for splices, patch panels, and connectors, where additional dBs may lost in the entire end-to-end fiber extension. If the measured loss is less than the number calculated by your loss budget, your installation is good.
Testers are available to determine if the fiber cabling supports your intended application. You can measure how much light is going to the other end of the cable. Generally, these testers give you the results in dB lost, which you then compare to the loss budget to determine your link loss margin.
Also, in some instances, particularly when using single-mode fiber to drive the signal farther, the signal may be too strong between connected devices. This causes the light signal to reflect back down the fiber cable, which can corrupt data, result in a faulty transmission, and even damage equipment. To prevent this, use fiber attenuators. They’re used with ?single-mode fiber optic devices and cable to filter the strength of the fiber optic signal from the transmitter’s LED output so it doesn’t overwhelm the receiver. Depending on the type of attenuator attached to the devices at each end of the link, you can diminish the strength of the light signal a variable amount by a certain number of decibels.
Need help calculating your budget loss? Call our FREE Tech Support. If necessary, they can even recommend a fusion splicing fiber kit, a fiber tester, or a signal attenuator for your specific requirements.
Black Box Explains...10GBASE-T standard.
In June 2006, the IEEE approved the standard for 10 Gigabit/sec Ethernet, or 10GBASE-T (10-GbE). 10-GbE transmission requires a bandwidth of 500 MHz.
The 10-GbE standards.
The cabling industry is developing... more/see it nowtwo different standards that can be used in 10-GbE applications. One is for use with Category 6 (CAT6) cable, and one is for Augmented Category 6 (CAT6a).
Before discussing the standards, a definition of Alien Crosstalk is needed.
Alien Crosstalk (ANEXT) is a critical measurement unique to 10-GbE systems. Crosstalk, measured in 10/100/1000BASE-T systems, is the mixing of signals between wire pairs within a cable. Alien Crosstalk is the measurement of the signal coupling between wire pairs in different, adjacent cables.
The amount of ANEXT depends on a number of factors, including the promixity of adjacent cables and connectors, the cable length, cable twist density, and EMI. Patch panels and connecting hardware are also affected by ANEXT.
With ANEXT, the affected cable is
called the disturbed or victim cable. The surrounding cables are the disturbers.
10-GbE using CAT6.
The first set of standards defines cabling performance when using Category 6/Class E cabling for 10-GbE applications. The TIA/EIA version will be the Technical Systems Bulletin 155 (TSB 155). ISO/IEC TR 24750 is a technical report to be used for measuring existing Class E systems.
No matter what the cable length is, CAT6 cable must meet 10-GbE electrical and ANEXT specifications up to 500 MHz. However, the CAT6 standard now specifies measurements only to 250 MHz, and it does not have an ANEXT requirement. There is no guarantee CAT6 can support a 10-GbE system. But the TSB provides guidelines for ways to help mitigate ANEXT. One way to lessen or eliminate ANEXT is to use shielded equipment and cables. Another way is to follow installation guidelines, such as using non-adjacent patch panels, separating equipment cords, unbundling horizontal cabling, etc.
10GbE using CAT6a.
The second set of standards will define Augmented Category 6 (CAT6a) and Augmented Class E (Class Ea) cabling. The newer, augmented cabling systems are designed to support 10-GbE over a 100-meter horizontal channel.
The TIA/EIA version is in draft and will be published as ANSI/TIA/EIA-568B.2-AD10. It recognizes both UTP and STP CAT6a systems. It also extends CAT6 electrical parameters such as NEXT, FEXT, return loss, insertion loss, and more to 500 MHz. It specifies near- and far-end Alien Crosstalk (ANEXT, AFEXT) to 500 MHz. It also goes beyond IEEE 802.3an by establishing the electrical requirements for the permanent link and cabling components. The ISO Class Ea standard will be published in a new edition of the 11801 standard.
These standards specify requirements for each component in the channel, such as cable and connecting hardware, as well as for the permanent link and the channel. collapse
Black Box Explains... SCSI termination
This is the oldest method of termination. A passive terminator sits on the bus to minimize reflections at the end of the cable. Passive terminators simply provide impedance close... more/see it nowto that of the cable. The terminator is “passive” because it doesnt do any work to regulate power for termination; it relies on the interface card to provide steady power.
This is a more stable form of terminating SCSI cables. Active terminators control the impedance at the end of the SCSI bus by using a voltage regulator, not just the power supplied by the interface card.
Of all SCSI terminators, this is the most complex. A cable with a forced-perfect terminator can actually change its impedance to compensate for variations along the bus. Forced-perfect terminators force the impedance of the cable to match each device through diode switching and biasing. collapse
Black Box Explains...Flexible microphones.
A headset featuring a flexible, swing-away microphone boom is easy to adjust—all you need to do is bend the boom until the microphone is in the correct position. Plus, you... more/see it nowcan easily swing the microphone out of your way if you wish to take a sip of coffee or soda while you’re on the phone. collapse
Black Box Explains...Ceramic and composite ferrules.
Cables manufactured with ceramic ferrules are ideal for mission-critical applications or connections that are changed frequently. These cables are high quality and typically have a very long life. Ceramic ferrules... more/see it noware more precisely molded and fit closer to the fiber than their composite counterparts, which gives them a lower optical loss.
On the other hand, cables with composite ferrules are ideal for less critical applications or connections that won’t be changed frequently. Composite ferrule cables are characterized by low loss, good quality, and long life. collapse