Category Archives: IT Services

Devising a Deployment Strategy that Smoothly Integrates Digital Transformation

Every forward-looking business knows that to effectively compete they must shift their thinking to the Digital Edge. In fact, 60 percent of executives believe that failure to adapt to hyper-connectivity is their company’s biggest risk.

As discussed in our previous blog, the first step in creating an Intelligent Digital Edge is developing a design roadmap that not only accounts for an organisation’s specific goals and requirements but is also nimble enough to adapt to wider, ever-changing shifts in both technology and business needs.

That said, putting a rock-solid design plan in place is merely a first step; equally important is identifying the deployment solution that is uniform, consistent, and scalable. This is a stage in the process that should never be taken lightly. The larger and more broadly deployed your enterprise, the greater the complexity – and the greater the risk of dissatisfying customers and employees due to inconsistent and unpredictable user experiences.

More than 70 percent of most IT organisations’ time is spent simply ‘keeping the lights on’, according to 2016 Global Operating Model Research from Accenture Strategy. As a result, one of the biggest impediments to deployment for many organisations is the commitment it takes to focus on the physical roll-out.

There are best practices which utilise agile processes that consistently save clients time, headaches, and money. In most cases, a true partner that can establish a centralised command and control location to optimise deployments by geography during the planning and execution phases, and can provide uniform on-site standards and localised deliverables tailored to regions, will be the difference in ensuring that every solution is deployed the same every time.

Whether a deployment is scaling from the 100s to the 1000s or from the 10,000s to the 100,000s, a key to assuring a business is getting it right is aligning itself with a partner that boasts a depth and breadth of experience at the digital edge – this means a partner that has extensive experience updating hundreds of locations worldwide every night. It also means a company with a large army of highly-trained technicians – on a global scale – who can guarantee that any wrinkles in deployment can be smoothed quickly and competently.

The sooner you deploy your Intelligent Digital Edge, the faster you can unlock the value that digital transformation can deliver for your enterprise. To get started, you can speak with a Black Box representative about how we can devise and execute a deployment strategy that will seamlessly deliver your digital transformation

Designing an Intelligent Digital Edge that Transforms Business

We understand. You’re doing your best to deliver the technologies users demand across the enterprise. However, as we covered in our previous blog post, with the influx of IoT and mobility, challenges at the digital edge may be standing between you and your digital transformation goals. The simple fact is, before you can create more interactive, immersive and scalable user experience, you need to embrace the Intelligent Digital Edge.

However, not every digital edge approach is created equal.  How can you ensure the design of the digital edge will meet your organisation’s needs now and in the future?

A digital roadmap that is powerfully aligned to your organisation’s unique goals and needs will help you to quickly adapt to changing technology and business requirements – and supercharge innovation, scale and velocity.

The roadmap begins with a fine-tuned discovery process that can expose critical business drivers and align them with sound technical solutions, including mission-critical mobility, intelligent networking and built-in security.  It should also identify the right mix of enabling technologies to create the high-performance experiences that transform businesses. Finally, even the most innovative roadmaps need to be deployed with precision to enable consistent and repeatable experiences.

The larger and more distributed your enterprise, the greater the complexity. To transform at scale, you need a partner who can deploy both nationally and globally with speed and agility—regardless of the amount of technology or the number of locations.

As deployments move from 1000s of locations to 10,000s of IoT devices in a single location, Black Box is there.  And once deployed, we offer extensive managed services solutions that are proactive and tailored to meet your unique needs.

Ready to get started? To speak with a Black Box representative about how we can design your Intelligent Digital Edge for your digital transformation visit http://web3.blackbox.com/contact-me.

Social Engineering and the Weakest Link – Your Employees

Today, social engineering is recognised as one of the greatest security threats facing organisations of all sizes.

Social engineering involves psychological manipulation and human interaction. It is an attack that centres on fooling unsuspecting employees into revealing confidential information or performing some action, like clicking on a link or transferring money. The request usually includes some violating of the organisation’s security policies and procedures.

Social engineering takes many forms. It often begins with a phone call or an email, but can also include text messages and even in-person dialogue. The attacker will attempt to establish legitimacy and gain the confidence of the employee by pretending to be a superior, like your company’s CEO, a co-worker at a remote office or a vendor or contractor.

Once the attacker has established credibility, which may take multiple contacts, they will ask for something, usually with a sense of urgency leading the victim (your employee) to promptly reveal sensitive information. Requests can be as simple as “I just need” something—someone’s schedule, a password, a username, PIN or even access to a building. Clicking a malicious link or opening a malicious file in an email can grant the attacker remote access to your network where they can access bank accounts, customer information, employee records and other corporate data. Requests can also be more blatant in terms of asking for payment for services or credit card information.

While it may be time-consuming and expensive, your staff needs to be trained and regularly retrained on what red flags to look for and how to report suspicious activity. More and more organisations are finding that educating employees about threats is more effective and important than hardware and software defences.

Training can include teaching employees to be wary of unsolicited communications. They need to know how to verify that a caller asking for information is really a co-worker by getting their number from the company directory and calling them back. The same tactic can be used when requests come from so-called vendors. If it’s a legit communication, the caller won’t mind.

Teach employees simple methods to recognise threats such as mouse-overs and how to reach an email address or domain name. Look for links in emails with misspelled URLs, such as blackb0x.com. Other tip offs are poor spelling and grammar, an offer that seems to be too good to be true or even a threat if the request isn’t met. Employees shouldn’t click on any suspicious email or link and may want to forward it to an information security mailbox.

Don’t forget social media either. Employees access Facebook, LinkedIn and Twitter from their mobile devices and work computers. Social media is so easy to use, people lower their guard. It’s really a no-trust environment. It’s too easy for employees to share too much information on public websites. Establish social media ‘Do and Don’t’ training to teach users how to protect themselves—and your company.

People are the weakest link in your company’s security program because they’re generally trusting and helpful. This basic human nature is the vulnerability that is exploited in a social engineering attack. Based on findings from security engineers and penetration testers, social engineering is often the easiest way into an organisation. It’s up to you to make sure employees are aware of the dangers.

 

A Quick Start Guide to Your Intelligent Digital Edge Journey

Fuelled by mobility and IoT, digital transformation is under way in every industry and in companies of all sizes. In fact, 20-billion devices are expected to be added over the next five years – that is nearly half a million devices per hour. In addition to the explosion of devices and connections, user expectations are evolving. Users demand easy, real-time connections to digital services and experiences wherever they are and on any device. In fact, more than half of all digital strategists cite “evolving customer behaviours and preferences” as the primary catalyst for change.

Companies that will come out ahead in digital transformation are replacing legacy solutions and embracing the Intelligent Digital Edge.  The digital edge is where people, data, and devices meet – in an office, a retail store, a hospital, or a manufacturing site.   Adding intelligence to the digital edge is proven to accelerate digital transformations and deliver the foundation needed to keep pace with evolving technology demands.

To successfully digitally transform at the edge, companies need to adopt and deploy two types of technologies: foundational and enabling. Foundational technology lays the ground work for organisations to be future-ready and rapidly adopt new, enabling technology to drive specific business outcomes.

Foundational technology includes:
• Enterprise Wireless Technologies: mission-critical mobility with Wi-Fi, 4G/5G, and public safety
• Intelligent Networking and Cabling & Connectivity: comprehensive intelligent networking that includes the basics of structured cabling and carrier/internet connectivity
• Built-in Security – both network and physical
• Edge Analytics

Examples of enabling technology are:
• Location solutions to permit in-store wayfinding and inventory optimization
• Unified communication and smart board solutions that enhance team collaboration
• Specialised IoT devices that drive new outcomes

Companies must be able to design and deploy both the foundational and enabling technologies with uniformity and consistency to deliver the results end-users demand and once deployed, they must be able to manage the technology.

Black Box can help.  With more than 40 years of experience connecting people, devices, and data, we are the trusted digital partner to bring intelligence to the edge.  By understanding the intricacies and nuances of each customer’s business, we deliver industry-specific designs, global deployment capabilities and managed services that help companies tap into an Intelligent Digital Edge to accelerate digital transformations.

We engineer Intelligent Digital Edge solutions that enable our customers to mobilise more people and devices, leverage more data, dial-up capacity as needed, and defend the information flowing in and out of your enterprise.

To speak with a Black Box representative to start the Intelligent Digital Edge journey, visit: http://web3.blackbox.com/contact-me.

The Intelligent Digital Edge: The Key to Accelerating Digital Transformation

Today’s business landscape is quickly evolving with IoT on the rise and anytime, anywhere, any device mobile user experiences in high demand. The companies that digitally transform to embrace the evolving digital world will succeed, and those that don’t will be left behind with catastrophic results. To meet this challenge head on, companies must adjust strategies and embrace the Intelligent Digital Edge.

The digital edge is that space in and around office buildings, hotels, factories, hospitals – virtually any facility where people and devices meet. It’s where users are located, where data is created and consumed, and where applications are shared. This is where the real opportunity is to make digital transformation happen; however, to be effective, the digital edge needs to be transformed through more intelligent solutions.

The exponential explosion in the number and diversity of devices and applications has made one thing abundantly clear – legacy IT architectures and deployment models are simply not adequate. Complexity challenges are overwhelming network, computing, and staff IT resources while the technical demands just keep escalating.

To drive superior experiences, ensure capacity flexibility, and secure uninterrupted service, a new digital edge is needed – one that is driven by intelligence. When designed, deployed, and managed correctly, the Intelligent Digital Edge enables:

  • High-performance User Experience: Bridging the physical and digital worlds, experiences at the edge are localised and uniform across all locations. Digital and real-time in nature, it scales to leverage IoT and analytics to drive business outcomes. By being analytics-enabled it drives better user experiences and real-time business decisions.
  • Mobile-first Capacity: Capacity has reached critical mass and it is no longer acceptable to provide simple connectivity. Anytime mobility at the edge is required for uninterrupted operations – all with mission-critical performance and on-demand capacity to drive efficient and unhindered operations. The intelligent edge is software-driven to enable mobile workflows while dynamically optimising capacity and traffic.
  • Built-in Security: Theft of data or loss of connectivity can be devastating. The Intelligent Digital Edge has security built in, so you can see and prevent threats and interruptions before they happen. Providing and protecting the edge eliminates downtime and ensures timely decision-making in highly-regulated and latency-sensitive settings.

We understand that many companies lack the existing skillsets, resources, and expertise to design, deploy, and manage at the edge to deliver a scalable digital transformation quickly and consistently. This is why Black Box is the trusted digital partner. Our proven success in connecting people, devices, and data – right where they need to be for maximum impact – is possible by bringing together our global team of skilled technicians, unique partnerships, processes, and network operating centres. Our industry-specific consulting, mission-critical designs, global deployment capabilities, and customer dedication is a combination that sets Black Box apart.

When you unlock the power of the Intelligent Digital Edge, you enable secure, uniform, mobile, future-ready experiences that are available anywhere people and devices meet in your facilities.

To speak with a Black Box representative about embracing the intelligent edge for your digital transformation visit http://web3.blackbox.com/contact-me

 

‘How to’ Guide for Specifying an IT Cabling System [Part 4] – ‘Testing of Copper and Fibre Links’

The final instalment in our four part series where we offer guidelines on how to produce a specification for an IT cabling system.  In Part 4 we review the different methods of testing data cabling (Certification, Qualification and Verification), and evaluate the importance of a warranty.

TESTING OF BALANCED COPPER LINKS

A structured cabling specification should state how the cabling system is to be tested and to what standard.  There are three forms of testing:

  • Certification – Tests all parameters required by ratified standards and provides a certificate for each channel or permanent link
  • Qualification – Only tests the cabling to work for particular applications or network standards
  • Verification – Tests only the most essential parameters.

Black Box Network Services recommends certification testing for every channel or permanent link. This should prove cost effective in the long term. It is a condition of most manufacturers’ warranties that the cabling system is 100% certified. The permanent link is the link from the distribution panels and the outlets whilst the channel also includes the patch core and equipment cables.

For every installation, where either certification or qualification testing is undertaken, complete individual test reports (or certificates where appropriate) configured in accordance with the agreed standard, should be included with the installation documentation. The format and material on which these reports are to be presented should form part of the contract.

CERTIFICATION TESTING OF BALANCED CABLING

Certification is carried out with a standards-compliant tester with the required accuracy for the Class or Category of cabling installed. You should state that the cabling system be certified to the BS EN 50173 series of standards, or your own country’s standards. By definition, certification testing includes qualification testing.

QUALIFICATION TESTING OF BALANCED CABLING

Where a manufacturer warranty is not offered, qualification is a less stringent alternative to certification.

  • Uses less accurate test equipment to compare installed cabling performance with the requirements of specific applications
  • Can only provide results for existing application standards
  • Cannot provide any form of ‘future proofing’ as it deals only with existing applications
  • Is limited to the ‘Channel’ test model, i.e. includes the equipment, patch and work area type cords.

VERIFICATION TESTING OF BALANCED CABLING

This will eliminate common installation errors but will not guarantee that the cabling system will support the network or bandwidth requirements. It provides:

  • Minimum test and inspection for copper cabling
  • A visual inspection of the terminations
  • Wire-mapping test to confirm there are no open circuits, short circuits or crossed wires, including the cable screen if present. It will also confirm that telecommunication outlets and patch panels are identified and labelled correctly.

Plus, as an optional requirement, it can provide:

  • Cable length
  • Test to ensure there are no split pairs.

TESTING OF OPTICAL FIBRE CABLING

For optical fibre cabling, certification and qualification are essentially the same thing. There is not an acceptable less accurate alternative to the Loss/Length test set.

Certification / Qualification of Optical Fibre Cabling

Provides:

  • Polarity proofing by use of a visible light source
  • Link length
  • End-to-end power loss at the transmission wavelengths identified in the selected standard
  • Calculation of power loss budget in accordance with the selected standard, allowing for the total number of connections and splices within the link
  • Stringent adherence to the test method defined in the selected standard
  • A final check for end-face cleanliness after certification, and cleaned as required with the correct materials.

Verification of Optical Fibre Cabling

Provides:

  • A visual inspection of terminations and splices
  • Inspection for dirt and scratches using appropriate inspection microscopes, and where necessary cleaned with correct materials
  • Optical fibre loss measurements using a light source and power meter to calculate loss budgets.

Plus, as an optional requirement, it can provide:

  • OTDR measurements to determine length, and locate damage and poor connections.

MAINTENANCE AND SERVICES

 BS EN 50174-1 states that “Repair and maintenance are generally captured by the contract between the cabling owner and the cabling maintainer”. Additional consideration should be made to ensure:

  • A suitable maintainer (i.e. installations company/service provider) is identified where desired
  • Records are updated to reflect moves and changes
  • Alterations upgrades and enhancements are carried out in accordance with existing warranties, topology and standards
  • Emergency support is considered.

WARRANTY

Most cabling systems come with a warranty that covers the materials and installation for fifteen years or more (Black Box Network Services can offer a lifetime warranty). Some warrant that the cabling system will support specific applications whilst others guarantee to conform to a particular standard. These warranties are valuable and reassure you that the manufacturer has confidence in the cabling system. However, the warranties do not usually specify a response time or a fix time.

A few installers offer an enhanced warranty providing, for example, a timed response to a fault call. Cabling is often a critical part of your network so this type of warranty is beneficial for business continuity. There may be an extra charge and conditions attached to these enhanced warranties, which would be fully covered with a Service Level Agreement (SLA) for a cabling infrastructure.  At Black Box we have a dedicated help desk facility, enabling us to provide tailored support contracts to suit customer requirements. We work to defined SLAs, covering response times, performance and fault resolution.

_________________________

Depending on your experience and the complexity of the installation, expert assistance may be needed to complete the specification.

Find out more about Black Box’s design and installation services here, or register for a free consultation.

Download as PDF

‘How to’ Guide for specifying an IT Cabling System [Part 3] – ‘Cable Pathways, Installation Techniques and Documentation’

This is the third in a series of posts where we offer guidelines on how to produce a specification for an IT cabling system.

Today we look at what you should consider when installing containment and cable, and we list the components which make up a well-documented cabling system.

CABLE PATHWAYS AND CONTAINMENT

Cable pathways can be located above ceilings, under floors, in risers between floors, underground or overhead between buildings. In most instances, the cabling will require dedicated containment such as trunking, conduit, cable tray, matting, cable basket or ducts.

The following should be considered:

  • Designing pathways that keep cable lengths within limits
  • Specifying the most suitable containment for the pathway
  • Consider who has responsibility for the pathways and designing the containment system, e.g. architect, mechanical and electrical contractor or the cabling installer
  • Capacity, allowing for future growth and to keep fill ratios within the requirements of the BS and EN standards
  • Segregation from other services, particularly electricity supply cabling in accordance with your country’s standards, in the case of the UK it is BS 6701 and BS EN 50174-2 series
  • Suitability for standards conformity e.g. to allow correct bend radii for cables
  • You have permission from the landowner for the installation of ducts
  • Protection of the cable from water, heat, sunlight, physical damage and rodents.

INSTALLATION TECHNIQUES

Suitably qualified installers, complying with relevant standards should be selected to undertake the cabling work. Qualifications would include evidence of the cable manufacturer’s training or training undertaken at a specialised training establishment and supported by a recognized certification.

The installation should adhere to standards, including, where applicable:

  • BS 6701
  • BS EN 7671 (IEE) Wiring Regulations – 17th Edition
  • BS EN 50174 series of standards
  • BS EN 50310
  • BS EN 50346

A good installer will not:

  • Exceed the minimum bend radii for cables
  • Exceed the maximum pulling force for cables
  • Crush cable (e.g. by over tightening cable ties)
  • Strip too much cable sheath at termination points
  • Install cables where they could be damaged
  • Untwist too much of each cable pair
  • Use incorrect tools or fixing techniques.

A good installer will:

  • Work safely
  • Adhere to the necessary standards
  • Always follow the manufacturer’s guidelines.

LABELLING, RECORDS AND DOCUMENTATION

If your cabling system is well documented, any implementation, moves, additions or changes will be made simpler and problems more quickly diagnosed. You should develop a full administration scheme, complying with BS 6701 or your own country’s standards.

The level of detail will depend on the size and nature of your network and will include the following:

Labelling and records:

  • Identifiers
  • Labels
  • Records
  • Reports
  • Drawings
  • Work Orders (documenting all moves, additions and changes).

Documentation should contain some or all of the following:

  • Topology diagram (schematic layout)
  • Floor plans routes
  • Equipment room layout
  • Outlet locations
  • Patching closet location
  • Equipment termination location
  • Telecommunications or equipment room layout
  • Cabinet layout
  • Patching / cross connect records
  • Test schedules / results
  • Identification of test equipment used
  • Certificate of conformity.

Depending on your experience and the complexity of the installation, expert assistance may be needed to complete the specification.

Find out more about Black Box’s design and installation services here, or register for a free consultation.

Watch out for the final post on how to specify an IT cabling system:-

  • Testing of Copper and Fibre Links [Part 4]

‘How to’ Guide for specifying an IT Cabling System [Part 2] – Selecting an ICT Cabling System

This is the second in a series of posts where we offer guidelines on how to produce a specification for an IT cabling system.  Today we review industry standards, the types of cable available, and the capabilities of copper and fibre.

Standards

Cabling systems are often specified using USA standards, e.g. Cat 5e or Cat 6. However, you should get assurance from your installer that your new cabling system will comply with your country’s structured cabling standards. For the purpose of this document we are using BS EN (British Standard, European Norm) standards, namely:

  • BS EN 50173 series for performance and components
  • BS EN 50174 series for design, installation, operation and maintenance
  • BS 6701 for installation, operation and maintenance
  • BS EN 50310 for grounding and bonding
  • BS EN 50346 for testing.

The standards specify a range of Classes or Categories of copper cabling systems, correctly referred to as balanced cabling systems. Amongst these are:

  • Class D – Comparable with TIA Cat 5e, supporting Gigabit Ethernet (1000BASE-T)
  • Class E – Comparable with TIA Cat 6, supporting Gigabit Ethernet (1000BASE-T) and 10Gigabit Ethernet (10GBASE-T) to a distance of 35m
  • Class EA – Comparable with TIA Cat 6A, supporting 10 Gigabit Ethernet (10GBASE-T)
  • Class F – Comparable with TIA Cat 7, supporting 10 Gigabit Ethernet (10GBASE-T)
  • Class FA – Supporting 10 Gigabit Ethernet (10GBASE-T).

Choose a class that will meet your bandwidth requirements for the foreseeable future and that will fit within your budget. Bear in mind that higher class cabling is more expensive, and requires larger containment and pathways as the cables have a bigger diameter.

Choice of Cabling Medium

Bandwidth, lengths of cable runs, and environmental influences will determine your choice of cabling medium. In a typical enterprise installation, it is customary to use balanced twisted pair copper cables to service work areas although optical fibre cabling may be a better choice if security or electromagnetic interference are significant considerations.

Class D (Cat 5e), Class E (Cat 6) and Class EA (Cat 6A) cables are available as unshielded (UTP) and shielded (e.g. STP, FTP). Class F and Class FA have an overall shield only and each pair is individually foil-shielded. Unshielded cable is suitable for some installations but shielded cable may be required if high levels of electromagnetic interference are present or if a high “tempest” rating is required for security purposes. Also, in the case of Class EA, the unshielded variant has a larger diameter so requires larger containment.

The following circumstances, commonly found in backbones, may make it necessary to select optical fibre cabling:

  • If the length of a cable run is over 90m
  • If each end of the cable terminates in different electrical earth zones. This is often the case if nodes are in different buildings – a non-metallic optical fibre cable is far less likely to conduct damaging electricity in the event of a lightning strike
  • If the cable is routed externally. In this case sheaths need to be more rugged and weatherproof. This is more often available for optical fibre cables
  • If the space in the cable containment is limited; a multi-core fibre can carry many times the volume of data cable
  • If a high level of security is required; optical fibre is secure against unauthorized access.

Selecting the Right Optical Fibre Cable

The selection of OM1, OM2, OM3, OM4 or OS1/OS2 optical fibre cabling depends on the network application and the distance. OM1-OM4 cables are multimode whilst OS1 and OS2 cables are singlemode.

*Distances listed are industry minimums.

Mechanical Protection and Physical Properties

The selection of cable sheath material such as PVC, Low Smoke Zero Halogen (LSZH) or plenum rated, depends on the attitude to risk, local regulations and the requirements of other interested parties e.g. premises owners and insurance companies.

Optical fibre cables may need to be armoured and rodent-resistant to give protection in ducts or for direct burial.

Lifetime Cost Effectiveness

A cabling system represents the element of a network that has the longest life span so should be designed and installed with at the very least 10 years of useable life. To ensure consistent performance throughout the life of the system, the following should be considered:

  • Warranty and performance guarantees from the component manufacturer
  • Quality components proven to meet appropriate standards
  • Manufacturer and supplier support
  • The installers have relevant qualifications and training and their installation methods fully comply with country standards.

Depending on your knowledge and the complexity of your requirement, expert assistance may be needed to complete the specification.

Find out more about Black Box’s design and installation services here, or register for a free consultation.

Watch out for future posts on how to specify an IT cabling system, including:-

  • Cable Pathways, Installation Techniques and Documentation [Part 3]
  • Testing of Copper and Fibre Links [Part 4]

MPO vs. MTP: What’s the difference?

MPO stands for multi-fibre push-on connector. It is a connector for multi-fibre ribbon cable that generally contains 6, 8, 12 or 24 fibres. It is defined by IEC-61754-7 and TIA-604-5-D, also known as FOCIS 5. The MPO connector, combined with lightweight ribbon cable, represents a huge technological advancement over traditional multi-fibre cables. It’s lighter, more compact, easier to install and less expensive.

A single MPO connector replaces up to 12 or 24 fibre strands in a single connector. This very high density means lower space requirements and reduced costs for your installation. Traditional, tight-buffered multi-fibre cable needs to have each fibre individually terminated by a skilled technician. But MPO fibre optic cable, which carries multiple fibres, comes pre-terminated. Just plug it in and you’re ready to go.

MPO connectors feature an intuitive push-pull latching sleeve mechanism with an audible click upon connection and are easy to use. The MPO connector is similar to the MT-RJ connector. The MPO’s ferrule surface of 2.45 x 6.40 mm is slightly bigger than the MT-RJ’s, and the latching mechanism works with a sliding sleeve latch rather than a push-in latch.

The MPO connector can be either male or female. You can tell the male connector by the two alignment pins protruding from the end of the ferrule. MPO female connectors will have holes in the ferrule to accept the alignment pins from the male connector. The MPO ferrule is generally flat for multimode applications and angled for single-mode applications.

MPO connectors are also commonly called MTP® connectors, which is a registered trademark of US Conec. The MTP connector is an MPO connector engineered with particular enhancements to improve optical and mechanical performance. Significant MTP enhancements include an elliptical pin shape, a floating ferrule design, a removable housing and more. Details can be found at usconec.com. MPO and MTP connectors are compatible.

A 12-strand MPO connector features 12 fibres in a straight line, 1–12, left to right.

A 24-strand connector features two rows of fibre 1–12 and 13–24 with the white dot also indicating pin 1.

Each connector has a key on one side of the connector body. When the key sits on top, it is referred to as key up. When the key sits on the bottom, it’s called key down.

When planning your system, keep in mind that you can’t mix and match 12-strand and 24-strand cable versions.

Find out more about our MPO/MTP cables and fibre services, or contact us today for a free consultation.

‘How to’ Guide for Specifying an IT Cabling System [Part 1] – Requirements and Preparation

Over a series of posts we offer guidelines on how to produce a specification for an IT cabling system that meets your organisation’s needs and gives you value for money.

Today we provide a checklist of the elements you should include and the information you should gather before starting work on the specification.

Requirements

Assuming you need a conventional structured cabling system using RJ45 connectors, the completed specification should include details on all or some of the following:

  • The Class or Category of cabling system e.g. Class D/Cat 5e, Class E/Cat 6 etc.
  • The number and locations of outlets
  • The location and type of telecommunications rooms and spaces
  • Backbone cabling between telecommunications rooms and spaces
  • Cabling pathways and containment
  • Labelling systems and methods
  • Patching facilities and patch cords
  • Testing
  • Administration system
  • Minimum warranty period.

Preparation

Before starting work on the specification, gather and document all the following information if relevant to your installation:

  • A plan (preferably) or dimensions of the areas to be cabled
  • The number of staff requiring IT and/or voice services
  • The services required per workstation, e.g. voice, data
  • Business expansion plans
  • Applications to be supported
  • The highest network speed anticipated during the expected life of the cabling system
  • Ethernet switches and other IT infrastructure hardware to be supported
  • Printers and other peripherals to be supported
  • Voice backbone / distribution requirements
  • The maximum backbone bandwidth expected during the life of the cabling system
  • Building management systems integration
  • Telephone system details
  • Location of Telecommunications Rooms (for edge networking hardware)
  • Location of Equipment Rooms (for core networking hardware)
  • Location of Entrance Facilities for incoming telecommunications lines
  • Locations for cabinets or racks, or space in existing cabinets and racks
  • Cable routes between floors, across floors and between buildings
  • Existing earthing facilities
  • The fire rating requirement of the cable
  • Any known or potential hazards e.g. asbestos, exposed high voltages, etc.

Depending on your knowledge and the complexity of your requirement, expert assistance may be needed to complete the specification.
Find out more about Black Box’s design and installation services here, or register for a free consultation.

Watch out for future posts on how to specify an IT cabling system, including:-

Selecting an ICT Cabling System [Part 2]
Cable Pathways, Installation Techniques and Documentation [Part 3]
Testing of Copper and Fibre Links [Part 4]

Simplify Your Data Centre Build-outs and Upgrades

Enterprises today face new challenges for managing and storing vast amounts of data. The growth in ‘Big Data’, the Internet of Things, a remote workforce and the massive uptake in personal devices have all had an impact on how and where data is stored, and have attributed to the proliferation of data centres.

Building an end-to-end data centre solution requires evaluation, planning, design and deployment skills, whether it is 6 cabinets in a room, or 6000 cabinets spread over a campus site.

Your service supplier should have the relevant processes in place, and the qualified staff to make the transition as simple as possible, including:

APPROACH

  • Standardisation of processes
  • Uniformity with build layouts and designs
  • Certified Data Centre Design Professionals (CDCDP)
  • Registered Communications Distribution Designers (RCDD)
  • PRINCE2 Project Managers and fully trained Data Engineers
  • Project engineering – AutoCAD® and Visio® with isometric renderings
  • Materials control through kitting, optimum stocking, and delivery planning
  • Seamless worldwide project coordination, if required.

SERVICES

  • End-state design and build
  • Containment systems
  • Rack and stack
  • Structured cabling – pre-terminated copper and fibre
  • Wireless
  • Environmental monitoring
  • KVM solutions
  • Security
  • Project management
  • Relocations
  • Multi-site rollouts
  • Permanent on-site Engineers and Project Managers

Black Box has more than 40 years’ experience implementing data centres throughout the world.  We have a large staff of BICSI Registered Communications Distribution Designers so clients can rest assured that the design will be future-proofed for their needs today, tomorrow and in years to come.

Our global footprint, extensive technical and project management resources, diverse experience and established industry relationships make Black Box a trusted partner for any data centre project.

Find out more about our services here or contact us today for a free consultation.

Why Organisations Are Turning To IT Service Providers

Enterprise IT requires time, attention and resources.  Increasingly organisations are turning to external IT Service providers to assist in the daily running of their networks.  Some of the main reasons include:

  1. Increased demand on IT

    Continuous advances in IT are rapidly changing the way companies do business.  Changes in user requirements, challenges with managing both legacy and new technology, and shifts in managing IT expenses are shaping corporate IT landscapes.

  2. Chief Information Officers are concerned they are missing the IT expertise

    Many IT departments find it challenging to stay current and proficient with the rapid evolution of new IT business technologies and applications.  Supporting complex, enterprise-critical technology requires a depth of expertise and knowledge not always available internally.

  3. To reduce IT costs and align with cash flow

    The strategic use of IT Services makes sense for companies driven to improve cost efficiency and maximise their IT spend.  IT Services provide companies with the flexibility to determine the best use of their IT budget.  Utilising IT Services also helps to adjust and balance CAPEX and OPEX expenditures to align with cash flow and finance objectives.

How Black Box Can Help

Black Box offers an intelligent, customised portfolio of IT Service Solutions that meet a variety of needs.  We partner with our customers to identify, design, and execute time-saving and cost-effective strategies that are in line with their current and evolving enterprise objectives.

Comprehensive IT Services Portfolio

The Black Box team blends seamlessly into your workflow—assuming responsibilities and offering unobtrusive, yet focused and high-quality, support.
For more information download our IT Service Solutions brochure here or request a free consultation.

“The Black Box team is an integral part of the day-to-day-operations … they understand what we need to run smoothly, and our two teams work seamlessly as one.”