Rethinking Cabling

Blog Date:  6/25/2018
Author:  Ray Coulombe

Cat 5e became an ANSI/TIA/EIA standard in 2001, Cat 6 in 2002, and Cat 6a in 2008. However, it may be extremely useful to consider taking advantage of other existing cabling infrastructure in lieu of running new. Alternatives may include single twisted pair, coax, and even fiber, but require a conversion from the standard cable. Suppliers of these converters include NVT Phybridge, Altronix, and Veracity. Media converters are normally bought in a set, and typically modulate the data signal to a higher frequency. Intelligent planning and application can save both time and money on material, installation, and even facility costs.

Recently, I had the chance to visit NVT Phybridge to learn more about their managed “Long Reach” switch products. Phybridge started in 2006 and focuses on opportunities in the VoIP (Voice over Internet Protocol) area. The company acquired NVT in 2015 to expand its footprint in security.

As telephony began its analog to digital VoIP migration, it created a massive cabling challenge. Miles of installed two conductor UTP cable, terminated in RJ11 blocks, were on the threshold of obsolescence and replacement with network cabling. Phybridge products were conceived and designed to provide 2-wire interfaces built into the Ethernet switch to directly connect to the existing cable infrastructure. Today’s Power over Long Reach Ethernet (PoLRE) series provides 24 or 48 ports of PoE over a single pair reliably up to 1200 feet.

I learned that, not only is the technology suitable for cost-saving retrofit, but that this integral cabling-switch technology has its place in new installations also, particularly with Cat-rated cabling. With conventional technology, edge switches must be within 328 feet of the connected end points. The Long Reach technology potentially allows fewer switch locations (and switches) to be provisioned because the reach can now extend to over 2000 feet. With the reduction in switch locations also comes reduction in the supporting physical, electrical, power, and security infrastructure. That translates to fewer equipment rooms and closets, UPS units, door controls, racks, patch panels, etc. As a bonus, the managed switch’s GUI is clear, user friendly, and very instructive in the information displayed. My favorite part is a dynamic bar graph for each port showing a display of current power consumed.

With the advent of PoE (Power over Ethernet) and suppliers’ own product developments, product line extensions have multiplied! For example, Altronix, with its roots in traditional power supplies, now offers products such as Ethernet/power over coax multi-port mid-span injectors, hybrid fiber-copper Ethernet switches, and units configurable to provide 60 W of high PoE power. Increasingly, the market is seeing an expanding array of switch products, both unmanaged and managed, providing built-in ports with something other than standard RJ-45 physical interfaces for the local (non-uplink) ports.

These opportunities are not unique to security but apply also to any Operational Technology (OT) networks, where distances vary greatly and PoE requirements are common.

But a word of caution with any PoE switch: Be sure to understand the probable power consumption of your loads relative to the total power capability of the PoE Switch. Just because an 8-port switch is capable of providing 30 W PoE+ power from each port, that switch might not necessarily be rated for 240 W (required if each port was used to the max). Also, be mindful of the standby power requirements. If switches are provisioned by IT, they may not fully understand the time requirements for security devices to function in the absence of primary power and may under provision the Uninterruptible Power Supply (UPS).


Resource Blogs

Most Recent Blog List for Blog Author: Ray Coulombe

Security Specifier Blog List Image for  Stay Safe! While Traveling This Summer

Stay Safe! While Traveling This Summer

It’s summer vacation time! The last thing you need to worry about it is getting your identity stolen while you’re sitting on a beach somewhere exotic. In 2016, more than 15 million Americans were victims of identity theft, up 16 percent from the previous year, according to Experian. Plus, about 33 percent of that fraud took place when people were traveling. Here’s a few tips to staying safe all summer while traveling...
read more -->

Security Specifier Blog List Image for Off the Beaten Path at ISC West

Off the Beaten Path at ISC West

This year at ISC (the International Security Conference and Exposition), I was determined to try to see the latest iStechnologies hiding in the nooks and crannies—literally! I visited booths in the back, the basement, small kiosks hidden inside larger vendor books, and throughout the Emerging Technology Zone.

In case you missed the show, I’ll round up some of the best new technologies and companies to keep an eye on. Read more.
read more -->

Security Specifier Blog List Image for Cyber Crime Taking Down Cities

Cyber Crime Taking Down Cities

Earlier this year, in March, the City of Atlanta’s nearly 8,000 employees heard words they never thought they would hear: “It’s okay to turn your computers on.” Their computers were powered off for five days. In those five days Atlanta residents could not pay traffic tickets, water bills, or report city issues. Read how ransomware impacted this metropolitan area.
read more -->

Security Specifier Blog List Image for A Few Thoughts on K-12 School Security

A Few Thoughts on K-12 School Security

There is no one size fits all when it comes to K-12 school security. Schools vary in so many ways: size, age, local environment, affluence, culture, governance, and more. Read some helpful tips and resources that might just help your school be better prepared.
read more -->

Security Specifier Blog List Image for Voice Identification: Not Just for the Chatty Kathy

Voice Identification: Not Just for the Chatty Kathy

Learn the meaning of micro-articulometry. A term for the technology used to deduce human profile parameters, employing Artificial Intelligence (AI) to discover micro-patterns (or micro-signatures) contained in speech. And how this technology is coupling with security.
read more -->

Copyright Ⓒ 2010 SecuritySpecifiers™