Black Box Explains...Fiber optic attenuators.
Attenuators are used with single-mode fiber optic devices and cable to filter the strength of the fiber optic signal. Depending on the type of attenuator attached to the devices at... more/see it noweach end of the fiber optic cable, you can diminish the strength of the light signal a variable amount, measured in decibels (dB).
Why would you want to filter the strength of the fiber optic signal? Single-mode fiber is designed to carry a fiber optic signal long distances—as much as 70 kilometers (or 43.4 miles). Fiber devices send this signal with great force to ensure that the signal, and your data, arrive at the other end intact.
But when two fiber devices connected with single-mode fiber cable are close to each other, the signal may be too strong. As a result, the light signal reflects back down the fiber cable. Data can be corrupted and transmissions can be faulty. A signal that is too strong can even damage the attached equipment.
Because its probably not feasible to move your fiber equipment farther apart, the easiest solution is to attach an attenuator to each fiber device. Just as sunglasses filter the strength of sunlight, attenuators filter the strength of the light signal transmitted along single-mode fiber cable. Within the attenuator, theres doping that reduces the strength of the signal passing through the fiber connection and minute air gaps where the two fibers meet. Fiber grooves may also be intentionally misaligned by several microns—but only enough to slow the fiber optic signal to an acceptable rate as it travels down the cable.
Before selecting an attenuator, you need to check the type of adapter on your fiber devices. Attenuators typically fit into any patch panel equipped with FC, SC, or LC adapters that contain either PC or APC contacts. In addition to the type of adapter, you also need to determine the necessary attenuation value, such as 5 or 10 dB. This value varies, depending on the strength of fiber optic signal desired. collapse
Black Box Explains...How fiber is insulated for use in harsh environments.
Fiber optic cable not only gives you immunity to interference and greater signal security, but it’s also constructed to insulate the fiber’s core from the stress associated with use in... more/see it nowharsh environments.
The core is a very delicate channel that’s used to transport data signals from an optical transmitter to an optical receiver. To help reinforce the core, absorb shock, and provide extra protection against cable bends, fiber cable contains a coating of acrylate plastic.
In an environment free from the stress of external forces such as temperature, bends, and splices, fiber optic cable can transmit light pulses with minimal attenuation. And although there will always be some attenuation from external forces and other conditions, there are two methods of cable construction to help isolate the core: loose-tube and tight-buffer construction.
In a loose-tube construction, the fiber core literally floats within a plastic gel-filled sleeve. Surrounded by this protective layer, the core is insulated from temperature extremes, as well as from damaging external forces such as cutting and crushing.
In a tight-core construction, the plastic extrusion method is used to apply a protective coating directly over the fiber coating. This helps the cable withstand even greater crushing forces. But while the tight-buffer design offers greater protection from core breakage, it’s more susceptible to stress from temperature variations. Conversely, while it’s more flexible than loose-tube cable, the tight-buffer design offers less protection from sharp bends or twists. collapse
Black Box Explains: M1 connectors.
In 2001, the Video Electronics Standards Association (VESA) approved the M1 Display Interface System for digital displays. The M1 system is a versatile and convenient system designed for computer displays,... more/see it nowspecifically digital projectors. M1 supports both analog and digital signals.
M1 is basically a modified DVI connector that can support DVI, VGA, USB and IEEE-1394 signals. The single connector replaces multiple connectors on projectors. An M1 cable can also be used to power accessories, such as interface cards for PDAs.
There are three primary types of M1 connectors:
–M1-DA (digital and analog). This is the most common connector, and it supports VGA, USB and DVI signals.
–M1-D (digital) supports DVI signals.
–M1-A (analog) supports VGA signals.
The M1 standard does not cover any signal specifications or detailed connector specifications. collapse
Black Box Explains... Buffers
A buffer (also called a spooler or a cache) is a temporary storage device used to share printers and compensate for a difference in speed and data flow between two... more/see it nowdevices. Buffers use RAM (Random-Access Memory) to take in data and hold it until the receiving device handles it.
A buffer serving a computer can be installed either internally or externally. Internal computer buffers are common in the forms of keyboard inputs, data caches, and video memory. An external buffer is usually used for printing.
An external buffer downloads jobs to the printer, freeing the computer so you can get back to work sooner.
A print buffers ports can be serial, parallel, or serial and parallel. Because a buffers ports operate independently of each other, a buffer also can be made to perform serial-to-parallel or parallel-to-serial conversion or to change the word structure and/or serial data rate (baud rate) of the data.
While most buffers are FIFO (First In, First Out), some advanced units can function as random-access buffers. For most serial buffers, hardware flow control is required, but some also support software (X-ON/X-OFF) control. Most buffers support printing of multiple copies of a document, provided the buffer has enough memory to store the entire print job. collapse
Black Box Explains...Fiber optic cable construction.
Fiber optic cable consists of a core, cladding, coating, strengthening fibers, and cable jacket.
This is the physical medium that transports optical data signals from an attached light source to... more/see it nowa receiving device. The core is a single continuous strand of glass or plastic thats measured (in microns) by the size of its outer diameter. The larger the core, the more light the cable can carry.
All fiber optic cable is sized according to its cores outer diameter.
The three multimode sizes most commonly available are 50, 62.5, and 100 microns. Single-mode cores are generally less than 9 microns.
This is a thin layer that surrounds the fiber core and serves as a boundary that contains the light waves and causes the refraction, enabling data to travel throughout the length of the fiber segment.
This is a layer of plastic that surrounds the core and cladding to reinforce the fiber core, help absorb shocks, and provide extra protection against excessive cable bends. These buffer coatings are measured in microns (µ) and can range from 250 to 900 microns.
These components help protect the core against crushing forces and excessive tension during installation.
The materials can range from Kevlar® to wire strands to gel-filled sleeves.
This is the outer layer of any cable. Most fiber optic cables have an orange jacket, although some types can have black or yellow jackets. collapse
Black Box Explains...Benefits of T1 and E1.
If you manage a heavy-traffic data network and you demand high bandwidth for high speeds, Black Box has what you need to send your data digitally over super-fast T1 or... more/see it nowE1 communication lines.
Both T1 and E1 are foundations of global voice communication.
Developed more than 30 years ago and commercially available since 1983, T1 and E1 go virtually anywhere phone lines go, but faster.
T1 sends data up to 1.544 Mbps. E1 supports speeds to 2.048 Mbps. No matter where you need to connect—North, South, or Central America, Europe, or the Pacific Rim—T1 and E1 can get your data there—fast!
Both services provide flexibility for a multitude of applications.
Whether you need to drive a private, point-to-point line or a high-speed circuit; provide corporate access to the Internet or inbound access to your own webserver; or support a voice/data/fax/video WAN that extends halfway around the world, T1 or E1 can make the connection.
Both offer cost-effective connections.
In recent years, competition among telco service providers has led to increasingly more affordable prices for T1 and E1 services. In fact, most companies seriously considering a shift to T1 or E1 find they can negotiate even better rates with just a little comparative cost analysis.
• Trunking of V.90 and ISDN remote connection to a central location.
• Accessing public Frame Relay networks for voice, fax, and data.
• Merging voice and data traffic. A single T1 or E1 line can give you several additional voice and data lines at no additional cost.
• Making LAN connections. If you’re linking LANs, a T1 or E1 line offers excellent performance.
• Sending bandwidth-intensive data such as CAD/CAM, MRI, CAT-scan images, and other graphics with large files. collapse
Black Box Explains…TEMPEST.
TEMPEST is an acronym for Telecommunications Electronics Material Protected from Emanating Spurious Transmissions. It pertains to technical security countermeasures, standards, and instrumentation that prevent or minimize the exploitation of vulnerable... more/see it nowdata communication equipment by technical surveillance or eavesdropping.
What puts your data communication equipment at risk?
Many things. But first and foremost, its microchip.
Any device with a microchip generates an electromagnetic field, often called a “compromising emanation” by security experts. With the proper surveillance equipment, these emanations can be intercepted and the signal reconstructed and analyzed. Unprotected equipment can, in fact, emit a signal into the air like a radio station—and nobody wants to risk his or her job and a whole lot more by broadcasting national security or trade secrets to the wrong people.
Some of the most vulnerable devices are speakerphones, printers, fax machines, scanners, external disc drives, and other high-speed, high-bandwidth peripherals. If the snoop is using a high-quality interception device, your equipment’s signals can be acquired up to several hundred feet away.
Arguably one of the most vulnerable pieces of equipment is an analog VGA monitor. If a spy were to introduce a Trojan into your system, he or she could monitor and store key presses and passwords used during the day. When the system’s not in use at night, the spy could pulse the VGA screen with grayscale images that have a strong signal at particular frequencies. VGA uses single-ended signaling that has a high common-mode emission level not protected by cable shielding, and it’s possible to monitor these signals outside the secure zone using a radio receiver. Even without a Trojan, a sophisticated receiver located nearby picks up and views what’s on the VGA monitor.
What TEMPEST is and isn’t.
It should come as no surprise that the Federal government became concerned about signal leakage. In fact, its interest goes back to the days of World War I when the Army was trying to exploit weaknesses of enemy combat phones and radio transmitters. Since then, the scope of the government’s interests has broadened beyond battlefield equipment. In the last
40 years, the National Security Agency (NSA) has taken several industry measurement standards and greatly beefed them up. These enhanced criteria are commonly referred to as the TEMPEST standards (although the NSA also calls them EMSEC standards, short for “emissions security”).
TEMPEST disciplines involve designing circuits to minimize emanations and the application of appropriate shielding, grounding, and bonding. Some methods used include radiation screening, alarms, and isolation.
A TEMPEST-approved device resembles its non-secure version with a few key differences. If it’s a network component such as a switch, it comes in a heavy metal case. It also has special shielding, a modified power supply, and perhaps a few other modifications from the standard model. If you need to open the device’s case,
a special torque wrench for use with TEMPEST-only products is required.
TEMPEST test equipment is very expensive and is sold exclusively to government agencies. Nobody can sell you commercial TEMPEST testing equipment. And if someone offers you a “TEMPEST surveillance system,” you need to be aware of two things: First, TEMPEST is counter-surveillance science and the offer is a fraud; second, the salesperson is committing a federal felony.
If you buy surveillance equipment—authentic or not—then you have also commited a felony. Construction of, possession of, attempting a sale of, or attempting a purchase of said surveillance equipment is illegal. Even if the product purchased is a hoax, the law will take your intentions into account as much as the salesperson’s. Don’t be surprised if you
both go to jail.
In the United States, you can learn about TEMPEST testing only in special schools sanctioned by, if not run by, the NSA. Courses to earn the TEMPEST Technician or TEMPEST Engineer certifications are very expensive. These classes are offered to a limited number of people who have a very high level of security clearance and who will be working on TEMPEST-approved equipment all the time.
All TEMPEST-approved communication devices have a rating based on their application and/or environment.
Type 1: This rating is for classified cryptographic equipment used for national security purposes. It’s endorsed by the NSA for securing telecommunications and automated information systems and for the protection of classified or sensitive U.S. Government information.
Type 2: This rating is for unclassified cryptographic equipment used by U.S. Government agencies, state and local governments, and sponsored U.S. Government contractors. It’s endorsed by the NSA for securing telecommunications and automated information systems and for the protection of unclassified but sensitive information, such as contract bids.
Type 3: This rating is for unclassified commercial cryptographic equipment that implements an algorithm registered with the National Institute of Standards and Technology (NIST). It’s for use in protecting sensitive information, like a corporation’s network communications. collapse
Black Box Explains…HDMI
The High-Definition Multimedia Interface (HDMI®) is the first digital interface to combine uncompressed high-definition video, up to eight channels of uncompressed digital audio, and intelligent format and command data in... more/see it nowa single cable. It is now the de facto standard for consumer electronics and high-definition video and is gaining ground in the PC world.
HDMI supports standard, enhanced, and high-definition video. It can carry video signals at resolutions up to and beyond 1080p at 60 Hz (Full HD). The latest version eve support 4K video resolutions.
HDMI offers an easy, standardized way to set up home theaters and AV equipment over one cable. Use it to connect audio/video equipment, such as DVD players, set-top boxes, and A/V receivers with an audio and/or video equipment, such as a digital TVs, PCs, cameras, and camcorders. It also supports multiple audio formats from standard stereo to multichannel surround sound. Plus it provides two-way communications between the video source and the digital TV, enabling simple remote, point-and-click configurations.
NOTE: HDMI also supports HDCP (High-bandwidth Digital Content Protection), which prevents the copying of digital audio and video content transmitted over HDMI able. If you have a device between the source and the display that supports HDMI but not HDCP, your transmission won't work, even over an HDMI cable.
HDMI offers significant benefits over older analog A/V connections. It's backward compatible with DVI equipment, such as PCs. TVs, and other electronic devices using the DVI standard. A DVI-to-HDMI adapter can be used without a loss of video quality. Because DVI only supports video signals, no audio, the DVI device simply ignores the extra audio data.
The HDMI standard was introduced in December 2002. Since then, there have been a number of versions with increasing bandwidth and/or transmission capabilities.
With the introduction of HDMI (June 2006), more than doubled the bandwidth from 4.95 Gbps to 10.2 Gbps (340 MHz). It offers support for 16-bit color, increased refresh rates, and added support for 1440p WQXGA. It also added support for xvYCC color space and Dolby True HD and DTS-HD Master Audio standards. Plus it added features to automatically correct audio video synchronization. Finally, it added a mini connector.
HDMI 1.3a (November 2006), HDMI 1.3b (March 2007, HDMI 1.3b1 (November 2007), and 1.3c (August 2008) added termination recommendations, control commands, and other specification for testing, etc.
HDMI 1.4 (May 2009) increased the maximum resolution to 4Kx 2K (3840 x 2160 p/24/25/30 Hz). It added an HDMI Ethernet channel for a 100-Mbps connection between two HDMI devices. Other advancements include: an Audio Return Channel, stereoscopic 3D over HDMI (HDMI 1.3 devices will only support this for 1080i), an automotive connection system, and the micro HDMI connector.
HDMI 1.4a (March 2010) adds two additional 3D formats for broadcast content.
HDMI 2.0 (August 2013), which is backwards compatible with earlier versions of the HDMI specification, significantly increases bandwidth up to 18 Gbps and adds key enhancements to support market requirements for enhancing the consumer video and audio experience.
HDMI 2.0 also includes the following advanced features:
Resolutions up to 4K@50/60 (2160p), which is four times the clarity of 1080p/60 video resolution, for the ultimate video experience.
Up to 32 audio channels for a multi-dimensional immersive audio experience.
Up to 1536Hz audio sample frequency for the highest audio fidelity.
Simultaneous delivery of dual video streams to multiple users on the same screen.
Simultaneous delivery of multi-stream audio to multiple users (up to four).
Support for the wide angle theatrical 21:9 video aspect ratio.
Dynamic synchronization of video and audio streams.
CEC extensions provide more expanded command and control of consumer electronics devices through a single control point.
There are four HDMI connector types. Type A and Type B are defined in the HDMI 1.0 specification. Type C is defined in HDMI 1.3, and Type D is defined in HDMI 1.4.
Type A: 19 pins. It supports all SDTV, EDTV, and HDTV modes. It is electrically compatible with single-link DVI-D.
Type B: 29 pins. Offers double the video bandwidth of Type A. Use for very high-resolution displays such as WQUXGA. It's electronically compatible with dual-link DVI-D.
Type C Mini: 19 pins. This mini connector is intended for portable devices. It is smaller than Type A but has the same pin configuration and can be connected to Type A cable via an adapter or adapter cable.
Type D Micro: 19 pins. This also has the 19-pin configuration of Type A but is about the size of a micro-USB connector.
Recently, HDMI Licnsing, LLC announced that all able would be tested as either Standard or High-Speed cables. Referring to cables based on HDMI standard (e.g. 1.2, 1.3 etc.) is no longer allowed.
Standard HDMI cable is designed for use with digital broadcast TV, cable TV, satellites TV, Blu-ray, and upscale DVD payers to reliably transmit up to 1080i or 720p video (or the equivalent of 75 MHz or up to 2.25 Gbps).
High-Speed HDMI reliably transmits video resolutions of 1080p and beyond, including advanced display technologies such as 4K, 3D, and Deep Color. High-Speed HDMI is the recommended cable for 1080p video. It will perform at speeds of 600 MHz or up to 18 Gbps, the highest bandwidth urgently available over an HDMI cable.
Additional resources and licensing information is available at HDMI.org. collapse
Black Box Explains... RJ-48
An RJ-48 plug is often mistaken for RJ-45. On the outside, the two look identical—both are housed in a miniature 8-position jack. The difference is in the pairing of the... more/see it nowwires.
In RJ-48, two of the wires are for transmit, two are for receive, and two are for the drain. The last two wires are reserved for future use.
There are three subsets within RJ-48: RJ-48C, RJ-48X, and RJ-48S.
RJ-48C and RJ-48X are very similar. Both use lines 1, 2, 4, and 5 and connect T1 lines. The RJ-48C is more common. The difference is that RJ-48X connectors have shorting bars.
RJ-48S uses lines 1, 2, 7, and 8. It connects 56K DDS lines. collapse
Black Box Explains...Dry contacts.
A dry contact, also called a volt-free contact, is a relay contact that does not supply voltage. The relay energizes or de-energizes when a change to its input has occurred.... more/see it nowIn other words, a dry contact simply detects whether or not an input switch is open or closed.
The dry contacts in the ServSensor Contact provide a simple two-wire interface that can be easily adapted to third-party sensors and devices. Because you define what the open or closed condition means, dry contacts are infinitely adaptable.
Use dry contacts to monitor alarms such as fire alarms, burglar alarms, and alarms on power systems such as UPSs. A very common use for dry contacts is to detect whether a cabinet door is open or closed.