You are on page 1of 60

ICT TODAY

THE OFFICIAL TRADE JOURNAL OF BICSI


July/August 2017 Volume 38, Number 4

PLUS: + Addressing Cybersecurity Concerns in Building Automation


System Installations + Cabling Designs for Hyperconvergence + Smart
Cities and the Internet of Things + 400 Gb and the New Test Revolution
Connect to smarter, higher-density
rack space utilization

Corning’s award-winning EDGE8™ solution is the industry’s


first modular, tip-to-tip optical cabling system to feature a Base-8
design to maximize per-rack-unit density for better network
scalability and improved link performance. And now our EDGE8
solution includes port tap modules: completely passive, purely
optical splitters – no power or IP configuration required.

Are You Corning Connected?

Visit www.corning.com/edge8/bicsi to learn how EDGE8


solutions deliver value to your data center from 10 to 400G.

© 2017 Corning Optical Communications. LAN-2176-AEN / July 2017


July/August 2017 I Volume 38, Issue 4 contents
FROM THE PRESIDENT
36
05
Building Smarter Emergency
It’s Summer Time, but There’s No Rest for Communications Systems—Distributed
BICSI! By Brian Ensign, RCDD, NTS, OSP, RTPM, CSI Architecture Brings Intelligence to Life Safety:
Today’s ECS solutions offer intelligent and
COVER STORY
06 Monitoring Networks with Passive
automated functions to achieve the latest
standards in emergency communications.
Optical TAPs Creates Traffic Visibility without By L. William Nattress III, CTS-D, CTS-I

42
Disruption: Learn why passive optical TAPs
have become a popular choice for enhancing Smart Cities and the Internet of Things:
network visibility and security. By Dave Mullen The internet of things is creating smart cities.

16
Who is driving the design decisions to support
Addressing Cybersecurity Concerns the required networked systems? It should be
in Building Automation System Installations: ICT designers and installers. By Aaron Hesse,
Proper cybersecurity methods are a necessity in PE, RCDD

48
addressing the threat posed by network hacking
to today’s smart devices. By Pook-Ping Yao New Perspectives in Testing—400 Gb

22
and the New Test Revolution: As 400 Gb
TSB-184-A—Guidelines for Supporting components and modules are developed,
Power Delivery and Data Over Twisted-Pair a new approach is needed to successfully
Cabling: As data consumption explodes, new validate and test optics. By Paul Brooks, Ph.D.

54
standards are defining the supply of power
and data over the same cable. By Cindy The Interaction Between Precision
Montstream, RCDD, NTS, EE, CPLP Inspection and Precision Cleaning of Optical

30
Fiber Connections: A call to upgrade the
Cabling Designs for Hyperconvergence: industry’s understanding of inspection and
With data center topologies evolving to hyper- cleaning to maximize the effectiveness of
convergence, cabling is being compacted. these critical links. By Edward J. Forrest, Jr.
Planning ahead can help identify the best cable
for the connection. By Dave Fredricks, DCDC

SUBMISSION POLICY
ICT TODAY is published bimonthly in January/February, March/April, May/June, July/August, September/October, and November/December by BICSI, Inc., and is mailed Standard A to BICSI members, RCDDs,
RITPs, RTPMs, DCDCs, BICSI Installers and Technicians and ESS, NTS, OSP and WD credential holders. ICT TODAY subscription is included in BICSI members’ annual dues and is available to othersthrough a
purchased yearly subscription.
ICT TODAY welcomes and encourages submissions and suggestions from its readers. Articles of a technical, vendor-neutral nature are gladly accepted for publication with approval from the Editorial
Review Board. However, BICSI, Inc., reserves the right to edit and alter such material for space or other considerations and to publish or otherwise use such material. The articles, opinions and ideas expressed
herein are the sole responsibility of the contributing authors and do not necessarily reflect the opinion of BICSI, its members or its staff. BICSI is not liable in any way, manner or form for the articles, opinions
and ideas, and readers are urged to exercise professional caution in undertaking any of the recommendations or suggestions made by authors. No part of this publication may be reproduced in any form or by any means,
electronic or mechanical, without permission from BICSI, Inc.
ADVERTISING: Advertising rates and information are provided upon request. Contact the BICSI Sales Department for information at +1 813.979.1991 or 800.242.7405 (U.S. and Canada toll-free) or
sales@bicsi.org. Publication of advertising should not be deemed as endorsement by BICSI, Inc. BICSI reserves the right in its sole and absolute discretion to reject any advertisement at any time by any party.
POSTMASTER: Send change of address notices to BICSI, Customer Care, 8610 Hidden River Pkwy, Tampa, FL 33637-1000; Phone: +1 813.979.1991 or 800.242.7405 (U.S. and Canada toll-free)
© Copyright BICSI, 2017. All rights reserved. BICSI and RCDD are registered trademarks of BICSI, Inc.

July/August 2017 I 3
ICT TODAY
THE OFFICIAL TRADE JOURNAL OF BICSI

2017 BICSI BOARD OF DIRECTORS ADVERTISER’S INDEX


President Brian Ensign, RCDD, NTS, OSP, RTPM, CSI AFL .............................................. Back Cover
President-Elect Jeffrey Beavers, RCDD, OSP, CFHP Cablesys ......................................................41
Secretary Carol Everett Oliver, RCDD, ESS Corning............................ Inside Front Cover
Treasurer Christy A. Miller, RCDD, DCDC, RTPM, CT
Hitachi .........................................................29
Canadian Region Director Greg Porter, RCDD
ICC .................................................................9
Global Region Director Honorico “Rick” Ciordia, RCDD, DCDC, RTPM, CT, PE

U.S. North-Central Region Director Chris Scharrer, RCDD, NTS, OSP BICSI INFORMATION
U.S. Northeast Region Director Matthew Odell, RCDD Writers Needed...........................................13
U.S. South-Central Region Director Todd W. Taylor, RCDD, NTS, OSP BICSI Learning Academy............................ 15
U.S. Southeast Region Director Mel Lesperance, RCDD
DC101: Introduction to Data Center Design
U.S. Western Region Director Pat McMurray, RCDD, DCDC, NTS, OSP, PMP ......................................................................19

Executive Director & Chief Executive Officer John D. Clark Jr., CAE Student Membership .................................35

BICSI 007: Rise of the Intelligent Building


EDITORIAL REVIEW BOARD ......................................................................39

Chris Scharrer, RCDD, NTS, OSP, WD Exhibitor Pavillion ........................................45

Jonathan L. Jew Fall Conferenece & Exhibition ............ 46-47

F. Patrick Mahoney, RCDD, CDT BICSI CONNECT Online Training................51

ICT Cabling Installation Program ..............59


PUBLISHER
BICSI, Inc. 8610 Hidden River Pkwy., Tampa, FL 33637-1000 CONTRIBUTE TO
Phone: +1 813.979.1991 Web: bicsi.org ICT TODAY
ICT Today is BICSI’s premier publication
EDITOR that aims to provide authoritative, vendor-
neutral coverage and insight on next
Steve Cardone, icttoday@bicsi.org generation and emerging technologies,
standards, trends and applications in the

PUBLICATION STAFF global ICT community. Consider sharing


your industry knowledge and expertise by
Wendy Hummel, Creative becoming a contributing writer to this
informative publication.
Amy Morrison, Content Editor

Clarke Hammersley, Technical Editor Contact icttoday@bicsi.org if you are


interested in submitting an article.
Jeff Giarrizzo, Technical Editor

Allen Dean, Technical Editor ADVERTISING SALES


+1 813.979.1991 or sales@bicsi.org

4 I ICT TODAY
From the President, Brian Ensign, RCDD, NTS, OSP, RTPM, CSI

It’s Summer Time, but


There’s No Rest for BICSI!
I hope you are enjoying your summer and investment in Credentialing 2020
My focus, along all the fun activities related to this time of (credentialing programs) and Education
year. Like me, I’m sure many of you will 2020 (modularization of manuals). My
with the rest of the
take some time with family and friends to focus, along with the rest of the Board of
Board of Directors,
recharge your batteries, giving you the Directors, is to maintain a healthy financial
is to maintain a
energy you need to make a real impact in position where smart operational spending
healthy financial
your work. In the midst of a very busy travel supports future growth and investment.
position where schedule, I was able to plan for some We must not be afraid of investing now to
smart operational great family time in Disney World and ensure future member benefits and the
spending supports at the beach this summer. (What would relevance of our great association.
future growth and we do without cell phones and wireless
investment. networks?) 2. Board Officer Nominations and
Election Cycle
As you read this, we are more than This is also the time when the slate of
halfway through the second year of my candidates for the BICSI Board of Directors
term as BICSI President, and there are is set through self-nominations, leading to
many important projects and activities in the election process in September. I am
progress. I want to give you an update excited to see the names of those running
on a couple of key activities that are for the open positons of President-Elect,
happening now and are critical to the Treasurer, U.S. Northeast Region Director,
future of our association. and U.S. North-Central Region Director.
This is something the BICSI Nominating
1. Budget Committee takes very seriously when
At this time of year, the Finance and reviewing candidates, as Duty of Care and
Audit Committee develops the budget Loyalty are front-and-center among the
for the current fiscal year, which runs from committee’s responsibilities. I’m very proud
July 1 to June 30, 2018. I am happy to of the Nominating Committee members—
report the budget has been developed they show such dedication as they help
and approved by the BICSI Board of shape the leadership of BICSI!
Directors. This is critical as we consider
operating and strategic investment While these are just two of the key activities
costs and opportunities. When the BICSI going on at BICSI this time of year, they
Annual Report is released later this year, are critical to our future. I thank everyone
you will see the BICSI financial report involved in these programs for all of your
on the previous fiscal year, and in the time and effort. And, as always, thanks for
coming months you will see updates on showing your member pride!
our strategic investments going forward.
Key projects include our continuing

July/August 2017 I 5
COVER ARTICLE

6 I ICT TODAY
By Dave Mullen

Network visibility is a top priority for many IT


managers. When networks become larger and
more complex, monitoring for performance
and security becomes critical. Industries such
as financial, medical and telecommunications
markets need visibility tools to manage their
networks and handle troubleshooting quickly
and efficiently, without adding any disruptions
to the network. For these reasons, more
directors are using optical fiber traffic analysis
points (TAPs) to monitor network links.

What Is a Traffic Analysis Point (TAP)?


A TAP is designed to allow for monitoring of traffic
sent over an optical fiber path for security or network
performance. The TAP is positioned in the passive
cabling system between a host and recipient device.
TAPs create greater visibility into a network. They
provide a window into data for security or surveillance.
But they also make it possible to look at data packets
and advise the network administrator on how the
network is performing in real time.
Analyzing data in real time can be as simple as
viewing a bank transaction or seeing if a health care
record was placed in the correct file. And when there are
millions of transactions happening constantly, TAPs will
help identify any bottlenecks in the network.

TAP Versus Switch Port Analyzer (SPAN)


Monitoring
A SPAN is another common way to monitor traffic.
It is a software function in a switch that is offered
by most network switch manufacturers. A SPAN
provides mirror port functionality, duplicating traffic
of incoming and outgoing ports. Since it is a software
function within the switch, SPANs do not require
placing an additional device into the network link.

July/August 2017 I 7
CHANNEL 1 (HOST TRANSMIT)
COM 1 (INPUT FROM HOST)
REFLECT 1 (OUTPUT HOST Tx TO MONITOR)
PASS 1 (OUTPUT TO RECIPIENT)

CHANNEL 2 (RECIPIENT TRANSMIT)


COM 2 (INPUT FROM RECIPIENT)
REFLECT 2 (OUTPUT RECIPIENT Tx TO MONITOR)
PASS 2 (OUTPUT TO HOST)

FIGURE 1: An optical TAP divides light into two or more outputs while combining two or more inputs into a single output.

However, there are limitations when using SPAN only for highly specialized applications, such as switch-
ports. First, they can negatively impact the functionality ing TAPs or aggregation TAPs. Active TAPs require power
of the network by slowing down traffic and creating to generate the signals, and any power disruptions can
potential bottlenecks. Also, SPAN ports can become impact the functionality of the active solutions in the
oversubscribed so they end up becoming the lowest network.
priority on the network, resulting in dropped packets Passive optical TAPs are much more common in
and less accurate visibility. As a software function within enterprise data centers, as they offer a number of distinct
the switch itself, SPAN traffic can be reconfigured daily, advantages:
which may result in inconsistent reporting. n Passive TAPs pass all link traffic for monitoring. Even
While SPAN solutions have their limitations, TAPs corrupt data will not be rejected, so users are able to
are not necessarily ideal for every scenario either. For see everything in real time.
example, in a network or link where traffic is not under n Unlike SPAN ports, there is no programming or
a manager’s direct control, the introduction of a TAP can switch configuring required with a passive TAP.
create a potential security risk. It can also be difficult n They are invisible to the network; they place no
to schedule maintenance to deploy TAPs in an existing burden on the network, nor do they create any
network, as it may create interruptions. And there changes to packets or data transmitted through
are cases where TAPs provide more monitoring than the link.
is required; a SPAN might be a better solution when n They offer full duplex port monitoring with a
monitoring is only an occasional requirement. transmit and receive path that is scalable at data
Some active equipment manufacturers are beginning rates, eliminating the possibility of oversubscription.
to offer switches that combine both SPAN and TAP ports. n TAPs that are built into the existing patching
For example, Arista’s data analyzer switch uses both environment reduce the number of connections
mirrored ports and TAP ports, which then communicates required in the structured cabling, taking at least
with monitoring tools from other vendors. two connections out of the link.

Two Types of TAPs How a Passive TAP Works


There are two primary TAP types available: active An optical TAP is essentially a splitter that divides
solutions and passive solutions. Active optical TAPs are the light into two or more outputs. It can also combine
primarily used for applications that require manipulation two or more inputs into a single output. In one example
of the signal sent to the monitoring port. This is required (Figure 1), the input in a channel (C1) from the host

An optical TAP is essentially a splitter that divides the light into two or more outputs. It can
also combine two or more inputs into a single output.

8 I ICT TODAY
PAYING TOO MUCH?

ICC Elite Installers SAVE 20 - 40% on ICC Premise Cable, jacks and patch panels. Our fiber enclosures are 50% less
than comparable brands, our racks are 60% less, and our residential enclosures are 40% less. So if you think you are paying
too much for structured cabling products, talk to us! If you are already an ICC Elite Installer, call us for a project discount.

icc.com/distributor csr@icc.com 888-ASK-4ICC


Premise Cables . Workstation Outlets . Patch Panels . RCM . Fiber Optics . Residential Enclosures
© 2017, ICC July/August 2017 I 9
live and 30 monitoring). A 70/30 split ratio is generally
the preferred method, as it dedicates a higher percentage
for network traffic, avoiding any dropped packets. The
70/30 split is most commonly used in 1 gigabit per
second (Gb/s) and 10 Gb/s networks. However, at higher
speeds such as 40 and 100 Gb/s, the 50/50 ratio is more
commonly used in order to meet power budgets.
FIGURE 2: TAP splitter types. Table 1 lists the maximum insertion loss for TAP
cassettes in both 50/50 and 70/30 split ratios. The
numbers listed include the loss from the splitter inside,
is passed through the TAP to the recipient (P1). The as well as the connections on the rear and front. TAP
transmit not only pushes through the live traffic to cassettes on the monitoring side can become much
the recipient, it also transmits through the TAP to the “lossier” (in terms of decibels [dB]) than conventional
monitoring tool (R1). network cassettes, so it is important to consider low-loss
There are two primary technology options for solutions for these connections.
creating a TAP splitter: a fused biconical taper or thin film
filters (Figure 2). The fused biconical taper is the older of Addressing Network Speeds and Fiber Types
the two technologies, and while it is easier to produce To select the appropriate model of passive TAP, it is
than thin film filters, it creates a higher insertion loss. important to know what network speed, wavelength or
The thin film filter—which is made up of a stack of layers link distance will be used, as these factors will affect the
of refraction that both reflect and transmit light—is power budgets in the network.
the preferred method. It provides the lower loss that is
critical for a TAP solution, since that loss can impact the Singlemode: Typically, singlemode optical fiber is used in
power budget in the link. longer distance links, but it is gaining popularity in data
The construction of a splitter makes the flow of data center links as short as ≈150 meters (m [492 feet (ft)]).
directionally specific. The monitoring outputs (reflect These singlemode installations are typically for higher
fibers) only receive traffic. In each TAP, one monitoring/ data rates, such as 40 and 100 Gb/s. There are singlemode
reflect output receives transmitted traffic from the TAP solutions designed specifically for these applications.
original host device and the other receives response
transmission from the recipient device. Multimode: Most multimode optical fiber is used
Each TAP cassette has multiple tap splitters based on for short-reach and data center applications, and the
the number of designed outputs. Each signal (per TAP transceivers used for multimode are usually short
splitter) is split to “live” and “monitoring” output signals reach products that use 850 nanometer vertical cavity
at a pre-determined ratio—typically 50/50 or 70/30 (70 surface emitting lasers (VCSELs), such as QSFP+ 40G-

MPO-LC MPO-MPO
Split Ratio 50/50 70/30 50/50 70/30
Multimode
Max Insertion Loss (Network) 4.3 dB 2.3 dB 4.3 dB 2.3 dB
Optical Taps
Max Insertion Loss (Monitor) 4.3 dB 6.3 dB 4.5 dB 6.5 dB

Split Ratio 50/50 70/30 50/50 70/30


Singlemode
Max Insertion Loss (Network) 4.3 dB 2.3 dB 4.3 dB 2.3 dB
Optical Taps
Max Insertion Loss (Monitor) 4.3 dB 6.3 dB 4.5 dB 6.5 dB

TABLE 1: Maximum insertion loss for TAPs.

10 I ICT TODAY
FIGURE 3: MPO-LC TAP cassette.

SR4 and SFP+ 10G-SR4. However, newer transceivers the rear of the cassette instead of the front, no patching
on the market can operate at wider spectral ranges or density is lost. Figure 3 shows a 1 rack unit (RU) panel
use multiple wavelengths. These different options will with the TAP cassette removed and the rear multi-fiber
function differently inside a passive optical TAP. push on (MPO) TAP port in blue. This design allows for
For example, a CISCO 40G BiDi transceiver carries monitoring of all 72 ports in the panel.
both transmit and receive traffic on the same fiber. This
requires a special TAP splitter to support this distinctly Placing TAPs in the Network
different technology. One would not be able to use the When TAPs are integrated into patching cassettes as
exact splitter technology shown in Figure 1 on page 8, described above, they can then be located anywhere that
as it does not consider dual wavelengths and transmit normal patching is installed. This includes the main dist-
and receive paths on a single fiber. ribution area, top-of-rack, end-of-row or middle-of-row.
Optical fiber connectors and the passive splitter Figure 4 shows a typical example of a common leaf-
can both impact the optical power budget available for spine architecture. The green icons represent potential
the link and monitoring equipment. In addition, the locations where a TAP could be placed. There are scenarios
optical fiber type can also impact the budget. While where it would be necessary to monitor traffic in every
both optical multimode 3 (OM3) and OM4 multimode direction and at every level of the leaf-spine architecture.
fiber are the most common data center fibers deployed, This is especially true in networks that require as much
OM4 offers higher bandwidth and improved distances. perimeter security as possible. When a port is compro-
For this reason, an OM4 solution is recommended when mised due to hacking, the threat will try to move laterally
deploying passive TAPs into a network. to avoid leaving any fingerprints in the network. By
tapping every location in the perimeter, the TAP can
Deploying Passive TAPs in the Network find the threat before it jumps around in the network.
Traditionally, when installing a passive TAP, one
would add a dedicated TAP panel and extend a patch
cord from the TAP panel to the network patching
environment. Today, however, TAPs are available that are
built into an existing cassette footprint so it can be part
of the patching environment instead of an additional
element added to the network. This integration elimi-
nates the need for a dedicated TAP panel and therefore
removes two additional connections from the channel.
This integrated design also conserves rack space, since FIGURE 4: TAP locations in a spine-leaf architecture.
no additional TAP panel is required. With TAP ports on

July/August 2017 I 11
Component Link Loss
MPO-LC cassette 0.5 dB
This topology has a total link loss of 2.89 dB, as
100-foot MPO trunk cable 0.09 dB
seen in Table 2. Whenever a TAP is used, the link loss
MPO-LC TAP cassette (70/30 ratio) 2.3 dB
immediately exceeds the IEEE® recommendation of
Total link loss 2.89 dB
two connectors and a maximum distance. For a 10
Gb/s channel, these are 2.9 dB and ≈550 m (1804 ft),
TABLE 2: Link loss in a 10 Gb/s channel.
respectively. However, because this is a short link over
OM4 multimode fiber, the channel can use loss allocated
to the transmitter and dispersion penalty (TDP). For
TAPs in a 10 Gigabit per Second (Gb/s) longer links, a 50/50 splitter at the edge is recommended.
Channel
In a traditional two-rack system, typical construction
TAPs in a 40 Gb/s Channel
of a 10 Gb/s solution uses a passive TAP. An MPO-LC
Figure 5 shows a 40 Gb/s channel over a ≈30 m (98
TAP cassette includes the TAP solution, with the optical
ft) link, which will require MPO connectivity for the 40
splitter device built into the cassette. The TAP uses a
Gb/s ports. As in the previous example, the TAP is located
70/30 split ratio. A harness used to plug into the port of
in the cassette on the right. The cassette monitors three
the TAP cassette then breaks out into LCs to connect to
40 Gb/s ports, and a 24-fiber harness breaks out into
the monitoring tool.
three 8-fiber connections at the monitoring tool.
The monitoring tool can be located in the same rack,
In this channel, it may become more critical to
which is often the case for applications with higher data
install the monitoring tool in the same rack, as there
rates and less power budget to spare. The monitoring tool
will be less power budget in a 40 Gb/s channel. A 50/50
can also be aggregated with other monitoring tools in a
splitter may be required to have sufficient power to reach
single location and connected over a longer harness, as
the monitoring device. The IEEE maximum insertion loss
long as channel link distances are compatible with the
for a 40 Gb/s channel is 1.5 dB and maximum distance
transceiver power budget.
is ≈150 m (492 ft). Again, because this is a short link over
OM4 fiber, the channel can use loss allocated to the TDP.

TAP Output to
Monitoring Devices
24F MPO to MPO MPO Harness
Cassettes MPO to LC TAP Cassette
0.7 dB 50/50 4.3 dB

Patch from
Core Switches Patch to Servers
MPO 8F Array Cords
MPO 8F Array Cords
24F Method B MPO
100 ft Trunk
Switch cabinet
with 400 ports 0.09 dB Server Cassettes

FIGURE 5: TAPs in a 40 Gb/s channel over a ≈30 m (98 ft) link.

12 I ICT TODAY
HELP GUIDE THE
FUTURE OF THE INDUSTRY

Subject Matter
Experts (SMEs) Needed
to Contribute to BICSI
Manuals and Standards.

Visit bicsi.org/volunteer to apply to sit on these committees and help shape the future of ICT.

WRITING OPPORTUNITIES
MANUALS:The Technical STANDARDS:The Standards OTHER:Write articles
Information and Methods (TI&M) Committee participates for BICSI’s premier trade
Committee is responsible for in the development of publication, ICT Today. Writers
writing and updating the BICSI telecommunications-related share vendor-neutral, relevant
design and installation technical standards, as well as notifies and authoritative insight on
manuals. The committee is BICSI’s membership of ICT design and installation
composed of SME members changes within applicable practices and solutions to
and other non-committee standards that may affect help our readers expand their
SMEs, from all over the world, them. Several different scope of work and enhance
who assist in writing, performing subcommittees make up the their professional stature. It’s
reviews, making suggestions Standards Committee. an excellent opportunity to
for applicable revisions and share your knowledge and
updates, and agreeing expertise with your industry
on changes through a peers. Send your article
consensus-based process. ideas to icttoday@bicsi.org!
Component Link Loss
MPO-LC cassette 0.7 dB
100-foot MPO trunk cable 0.09 dB
MPO-LC TAP cassette (70/30 ratio) 2.3 dB
Total link loss 3.09 dB

TABLE 3: Link loss in a 40 Gb/s channel.

Connect to Link and Test


Side A
Port 2

Even Legs M1 (LIVE)

M1

TAP Cassette
MPO to LC Cassette
Main Remote

FIGURE 6: Test 1 — Verify the TAP port from Side A.

M1 (LIVE)
Testing through the "Live Traffic"
side of TAP Cassette
Side B

Even Legs

M2 (TAP)
Even Legs M1
TAP Cassette

MPO to LC Cassette

Main Remote

FIGURE 7: Test 2 — Verify the TAP port from Side B.

14 I ICT TODAY
Testing
Don’t Stop Learning.
When installing TAPs, testing requires some
additional considerations compared to traditional
cassettes. Primarily, testing needs to be done in two
We Won’t Stop Teaching.
different directions. Also, tests should be done with
an encircled flux compliant light source. This is critical
for ensuring that the results will be most compatible
with the data from factory test results.
Figure 6 shows testing from side A of the 10 Gb/s
channel, with the TAP on the right side. The blue
port designates the TAP port. Figure 7 shows testing
in the opposite direction, and the tester plugging into
the front side or “live side” of the TAP cassette. It is
important for this testing to be done on both sides in
order to ensure performance.

Conclusion
Passive optical TAPs have become a popular choice
for creating network visibility and enhancing network
security. They place no burden on the network, and
do not contribute to dropped packets. The popularity
of passive TAP adoption will continue to grow, with
products now available that can be built into the
existing patching environment, reducing the number
of connections required in the structured cabling
infrastructure, and in turn lowering channel insertion
loss. When considering passive TAPs, it is important to
choose low-loss components that will contribute to the
best channel performance for the network. n

AUTHOR BIOGRAPHY: Dave Mullen is the Senior Product


With BICSI Learning
Manager, Fiber & Data Center for Leviton Network Solutions. As part
Academy, access to high-quality ICT
of the Leviton Data Center team, Mullen works closely with Leviton
training is at your fingertips. Made up of three
customers to understand their applications. As a result, he’s had a distinct facets designed to work in harmony,
hand in bringing many of Leviton’s recent fiber optic solutions to the the Academy gives you the ability to choose where
market, such as the Opt-X® Unity 40/100G Fiber System, OM4+ and how you learn. Whether it’s online, at BICSI World
Violet System, and e2XHD Patching System. He brings a wealth of Headquarters or in your area, BICSI courses are available
experience to the role, with nearly 20 years working in fiber optics to suit your needs. We offer introductory, intermediate
and more than 10 years in electronics. He currently sits on two TIA and advanced-level training so you can continue to
fiber optic committees: TR-42.11 Optical System (568) and TR-42.12 advance throughout your professional career.
Optical Fibers and Cables. He can be reached at dmullen@leviton.com.

Data Centers. Cable Infrastructure Design.


Project Management.
Cabling Installation. Outside Plant.

Learn more at bicsi.org/academy.


July/August 2017 I 15
By Pook-Ping Yao

Addressing Cybersecurity Concerns in


Building Automation System Installations
FORGET THE COMMON WISDOM ABOUT CYBERSECURITY.
Security is not about making the A variety of encryption, firewall and anti-
network 100 percent impenetrable. In fact, virus protections can be used as deterrents,
it is unlikely that any system in the world is but it only takes a single slip to let a hacker
completely secure. Hacking is an attack of past these safeguards. That does not mean
opportunity, and if criminals see a way into firewall and encryption best practices should
a building, they will take advantage. But be disregarded. Instead, it encourages a
if sufficient obstacles are in place to deter holistic approach that looks at staff, policies
them, they will likely look elsewhere for an and procedures. All these factors work in
easier mark. concert to keep networks secure.

16 I ICT TODAY
of energy. Over the lifetime of a In IT, for example, firewalls
building, construction accounts for are put in place to protect internet
only about 20 percent of total costs, access. In the OT world, too often
while the rest is consumed by energy multiple service providers will
and maintenance. Technology like put in their own DSL connections
LED lighting and smart thermostats for things like HVAC systems or
can easily reduce this energy solar panels. These often do not
consumption by 50 percent. go through the IT firewall. But
In addition to the financial imagine that connectivity could be
and energy savings, smart building enforced through proper firewalls to
technology appeals to tenants. the internet. Is protecting internet
People notice when a building is access enough? What about the
clearly a product of the 20th century, thermostat in the bathroom, the
with archaic technology and clunky, security cameras in the parking
slow processes. They also notice garage, or the sprinkler on the front
when buildings are adaptive and lawn? If someone gained physical
reactive, fast-paced and flexible. The access to these devices, there may be
lights, windows and cooling systems connections that they could leverage.
all contribute to sleek modern spaces End-point protection is another
that provide seamless experiences. strategy, and it can work well in
More and more, people are IT. With computers, for example,
recognizing the benefits of smart operating systems (OS) can typically
buildings. By the end of 2017, be kept up to date, patched and
there will be more than eight controlled. The world of OT is
GROWTH OF BUILDING billion connected devices installed another story: devices can run on an
AUTOMATION worldwide. Plenty of hackers will old OS and are not kept up to date.
As a growing number of hunt through this wealth of targets Authentication and encryption on
connected devices are installed, for their next cash grab. Building these devices are often not offered.
concerns about cyberattacks are managers must make smart buildings The concept of convergence is
increasing. Even with these risks, the smarter while remaining aware of widely discussed and debated. It is
benefits of smart building technology the latest threats. a beautiful idea in theory, but can
are simply too immense to ignore. be a nightmare in real life. Many
Regular brick-and-mortar IT VERSUS OT: MANAGEMENT different vendors with different
buildings consume roughly one-third AND SECURITY requirements do not work the same
of all energy in the United States All this technology might look, way. Consequently, managing them
and Canada. This includes lighting, feel and smell like information on the same network can be tricky,
heating, ventilation, air conditioning technology (IT), but it is smart, if not seriously ill-advised. That does
and the rest of the building’s connected, shiny and new. not mean that systems should not
operations. While it is easy to forget Operational technology (OT) is be converged at all, but merely that
about all these operational devices very different, and it is not so easily a new approach is required. Assets
whirring away in the background, managed with conventional IT on the IT side can be very sensitive;
they consume a massive amount methods. should the building system be

July/August 2017 I 17
PEOPLE
PROCESS
HNOLOGY
TEC

ITY
ASS E T S

AVA
L
TIA

ILA
EN

BIL
FID
ASSETS

ITY
N
CO
INTEGRITY

FIGURE 1: The CIA Triad highlights the importance of confidentiality, availability and integrity.

put on the IT network just to save website; and spyware infects the vulnerabilities: technology, people
money on a few switches? computer and gathers information, and policies.
Securing a building is not the including usernames, passwords and Technologies like firewalls,
same as securing computers and other sensitive information, without authentication, encryption and
servers. The people are different, the user’s knowledge. visualization software are standard
the flow of information is different The strategies are different, best practices for a reason. Sufficient
and the devices are fundamentally but the core approach is to evaluate protection makes it harder for a
different. Attempting to manage the vulnerability of a system and hacker to ram through firewalls.
them in the same ways does not attack the surface. A hacker’s Do not forget about the
make sense and can make both lifecycle is research, infiltration, possibility for human error in the
networks less secure. discovery, capture, exfiltration and organization. Properly and regularly
bringing assets to market. If there training staff on security is critical.
BASICS OF CYBERSECURITY are vulnerabilities in a system, they
Everyone must understand that the
There are many different kinds threats of cyberattacks are very real
will likely find them—even if it
of attacks: malware, ransomware, and serious. Ideally, this message
requires sheer trial and error.
pharming, spoofing and spyware are should come from the top down: get
just a few examples. Malware can the executives and board of directors
VULNERABILITY involved in championing the
infiltrate IT systems with viruses and
worms; ransomware takes over and
MANAGEMENT organization’s cybersecurity efforts.
limits access to computer files, Vulnerability management is In addition to training staff,
demanding a ransom for the safe the practice of identifying, classify- the organization should have
return of files or documents; pharm- ing, remediating and mitigating policies and procedures in place to
ing redirects users from a legitimate weaknesses. This should be a cyclical respond to cyberattacks swiftly and
website to a fraudulent one; spoofing process, not a one-time evaluation appropriately. The system will likely
uses what appears to be a legitimate that is quickly forgotten. There are never be 100 percent impenetrable,
email address to send spam, and three key places to review in order so establish policies to deal with the
may direct the user to a fraudulent to understand a building network’s worst-case scenario.

18 I ICT TODAY
The First Step
to Data Center
Design Expertise
DC101: Introduction to Data Center Design

A self-paced, online course designed


to cover foundational knowledge of
data center design.
Learn the fundamentals: data
center design process, design
criteria, systems,components,
sustainability, commissioning
and maintenance.

bicsi.org/dc101
FIGURE 2: MAC address filtering can be set so that ports will not work with unrecognized devices and MAC addresses.

RESPONDING TO HACKS: Availability means that data is between these three core tenets
accessible whenever it is needed. will keep networks more secure and
THE CIA TRIAD This is especially powerful in a will provide a basis for cyberattack
There is no one-size-fits-all
ransomware situation, where responses.
response to cyberattacks, as each
important documents are taken
hack is different. However, there
are some core principles to refer
hostage. Backing up important files SECURING THE NETWORK
helps safeguard against this sort of There are a few different
to. The CIA Triad (which is in
data loss. methods of protecting a smart
no way connected to the Central
Intelligence Agency) is at the heart building network, all of which
of information security, and it Integrity means that information should be a part of the system:
functions as a sort of checklist. The is not altered between sending n Physical security, with locks
triad highlights the importance and receiving. For example, and protected wiring.
of confidentiality, availability and encryption of files to protect against n End-point protection through
integrity (Figure 1). cyberattacks should not change the authentication and encryption.
integrity of the data. n Network security with WAN
Confidentiality means that only and LAN.
those who are authorized can get Cybersecurity is tough because
access to information. Ensuring it is, by nature, uneasy. It forces One of the most underutilized
confidentiality could entail compromises such as privacy methods is to use the network itself
encryption to keep communications versus convenience and security to provide a solid layer of protection
secure from end-to-end. versus cost. Maintaining a balance with a LAN. The network is scalable

20 I ICT TODAY
and covers almost everything, so it Controllability entails managing for example. Review network
can be a useful shield. access to the network. Set proper management log files for user logins.
These different methods have passwords, refresh them, and use Keep track of and manage who
many layers. Each one is important authentication. Be sure to renew or has access to your building network.
and has its own advantages and delete accounts, as necessary, so it Control the flow of information.
disadvantages. All of them should is clear exactly who has access to Disable unused ports so no one can
be a part of the system, though they network systems. No one should be plug their laptop into an available
might be implemented into the able to get into the network without port and communicate on your
network differently. the manager’s knowledge. network. In addition, set MAC
address filtering so that ports will
THREE KEY PRINCIPLES TO TAKE BASIC ACTION TODAY not work with unrecognized devices
SECURE BUILDING NETWORKS Cybersecurity does not need to and MAC addresses (Figure 2).
When securing the building be overwhelming or difficult. For
network, there are three key the most part, cybersecurity is about CONCLUSION
principles to keep in mind: isolation, thinking logically and strategically. Network hacking is a serious,
observability and controllability. A few alterations can be made to growing threat that needs to be
To isolate sensitive data and the network immediately. Above all, addressed by proper cybersecurity.
keep it secure, create trusted islands, implement policies and procedures Smart devices bring immense
whether physical or logical. Air gaps, that are based on the CIA Triad of benefits to our daily lives, but we
where two networks are completely confidentiality, availability and have to understand how to properly
separated—for example, keeping integrity. The Internet of Things secure them. No one wants to
a secure network totally separate (IoT) is very predictable and see their building in the news for
from an unsecured one—can help well-behaved, so use this to your some catastrophic hack and leak of
protect confidential assets. Another advantage. Develop policies and information. Implementing some of
approach is to create completely procedures that will keep sensitive these best practices is the first step in
physically dedicated networks. assets secure in the case of a safeguarding against cyberattacks.
There may be cost trade-offs to these cyberattack or threat. Protect the network, protect the
security strategies, but isolating Look at realistic ways to isolate system. Start today. n
is one way to ensure a vulnerable networks. Consider isolating
AUTHOR BIOGRAPHY: Pook-Ping Yao
network won’t open the door to building systems from IT, for
is CEO and Director of Optigo Networks.
sensitive assets. example. Use a dedicated building
A proven business leader with an excellent
Observability means knowing network, with separate virtual local understanding of world-wide networking
about anomalies on the network. area network (VLAN) for each service markets and extensive international business
Be aware of what is happening provider and vendor. Isolation experience, he is a recognized expert in smart
in the network, and when it has is a straightforward way to limit buildings, networking and cybersecurity
technologies combined with first-class
been compromised. One example connections between vulnerable
communications skills, drive and management
of observability is in Gmail: set up networks and confidential data. skills. Prior to co-founding Optigo, he spent
notifications for unrecognized logins Observe what is happening 12 years at PMC-Sierra (now Microsemi) in
from unknown IP addresses. There on the networks. It is important network design and applications. He can be
are many ways to get reports on to understand how the network reached at ping@optigo.net.
link status and user logins in your normally behaves and to recognize
building network. Put these systems anomalies. Ask for regular reports
in place to identify malicious activity on the number of connected devices
on the network. and number of disconnected ports,

July/August 2017 I 21
By Cindy Montstream, RCDD, NTS, EE, CPLP

TSB-184-A:
Guidelines for Supporting Power Delivery
and Data Over Twisted-Pair Cabling
Balanced twisted-pair copper cable the ability to have power and data over the
is not just for data communications same cable very appealing.
anymore. The number of devices capable New standards are defining the supply
of being powered through their network of up to 100 watts (W) of power with
connection is growing. Trends like the 1000 milliamps (mA) of current per pair.
Internet of Things (IoT) and internet Power can cause heat, and heat can cause
protocol (IP)-enabled devices are driving up reduced data transmission performance in
the number of connections to the network. a balanced twisted-pair copper cable. Cable
The growing deployments of wireless life is usually expected to be at least 10
access points (WAPs) needed to support years on average. Therefore, it is important
increasing data consumption are making to understand the impact on performance

22 I ICT TODAY
Watts Up to 15.4 Up to 30 Up to 60 Up to 100
Power PoE PoE+ PoE++ PoE++
(Type 1) (Type 2) (Type 3) (Type 4)
UPoE PoH

Applications Thin client RFID readers Access controls Desktop computers


Biometric access controls Video IP phones Point-of-sale Televisions
802.11n AP Pan-tilt-zoom cameras Nurse call Videoconferencing
Occupancy sensors Alarm systems 802.11ac LED lighting
Laptops High-power Wi-Fi
Cameras
Information kiosks

TABLE 1: Examples of power requirements for a variety of devices.

and installation considerations for (°F)]). Managing the temperature rise device to 100 W, with about 1
twisted-pair cabling today because of the cable can reduce long-term ampere (A) per pair. (Note: 1 A is
the same cable might also deliver cable degradation. The negative equal to 1000 mA). This standard is
power in the future. TSB-184 effect of higher temperatures on expected to be completed in early
provides guidelines for supporting transmission performance will also 2018. In response to this standard,
power delivery over twisted-pair be minimized and the amount TIA updated TSB-184 and published
cabling simultaneously with data. of heat added to the surrounding the A revision (TIA TSB-184-A) in
environment will be reduced. March 2017.
What Is TSB-184? TSB-184 was originally published
TSB-184 is a technical service by the Telecommunications Industry THE NEED FOR TSB-184
bulletin that provides guidelines for Association (TIA) in 2009. This is the The need to develop TSB-184
twisted-pair cabling to support the same year that IEEE published the was motivated by applications
remote delivery of power in parallel 802.3at standard for Type 2 power like the IEEE Standard 802.3 Data
with data transmission. There are over Ethernet (PoE), commonly Terminal Equipment (DTE) Power to
many factors that can impact the referred to as PoE+. This standard support LAN devices with remote
ability of a cable to support both doubled the power delivered by the power. There have been apparatuses
data and power, including how the sourcing device to 30 W and almost in the market for a while that can
cable is installed, whether the cable doubled the current per pair to 600 be supported by remote powering,
is bundled or unbundled, the type of mA over the original PoE standard such as WAPs, along with building
pathway, and the gauge of the cable. (Type 1). automation and security devices
The purpose of the guidelines is to IEEE has been working on a like remote cameras, IP telephones,
help limit and manage temperature new PoE standard (IEEE802.3bt) biometric access controls and
rise of the cable so it does not for Type 3 PoE (PoE++) and Type 4 multimedia devices.
increase by more than 15 degrees PoE (4PPoE), elevating the potential As the number and types of
Celsius (°C [27 degrees Fahrenheit power delivered by the sourcing apparatus have increased, so has the

July/August 2017 I 23
Standard IEEE 802.3af IEEE 802.3at IEEE 802.3bt Not an IEEE Standard

PoE PoE+ PoE++ 4PPoE Cisco UPoE HDBaseT PoH

Type 1 2 3 4 N/A

Status 2003 2009 Draft (2017) Exists today

Maximum number of energized pairs 2 2 4 4 4 4

Maximum dc current per pair 350 mA 600 mA 600 mA 960 mA 600 mA >1000 mA

Maximum power delivered by the


15.4 W 30.0 W 60.0 W 99.9 W 60 W >100 W
power sourcing equipment (PSE)

Minimum required power at


12.95 W 25.5 W 51.0 W 71.0 W 51 W >100 W
the powered device (PD)

Maximum data rate 1000 BASE-T 1000 BASE-T 10 GBASE-T Varies

TABLE 2: IEEE & non-IEEE remote powering standards.

required power to operate them. The table shows that PoE and mA) per pair. Also notice that Type 1
Devices like thin clients, 802.11n PoE+ (Type 1 and Type 2) both use and Type 2 PoE are capable of being
WAPs and sensors typically require two pairs for power delivery. PoE+ supported with up to 1000BASE-T
up to 15 W to operate. However, doubled the PoE power from the (1 Gigabit Ethernet). Type 3 and
radio-frequency identification (RFID) sourcing device from 30 W to 60 W Type 4 can be supported with up to
readers, video IP phones and pan- and almost doubled the current from 10GBASE-T (10 Gigabit Ethernet).
tilt-zoom IP cameras may require up 350 mA to 600 mA. Both of these This standard is expected to be
to 30 W. The support of point-of- standards have been available for completed in early 2018.
sale devices, laptops, larger cameras some time. UPOE is similar to IEEE Type
and information kiosks can require Type 3 PoE and Type 4 PoE 3 PoE in that it can provide up
as much as 60 W; and TVs, desktop extend the power level supplied to 60 W at the source with 600
computers, video conferencing and from the source device to 60 W mA per pair using all four pairs. It
LED lighting can require as much as and 100 W, respectively. Type 3 was developed to extend network
100 W of power to operate. These PoE doubles the maximum power power to a broad range of devices,
latter devices are the type driving delivered by the sourcing equipment including virtual desktop terminals,
the new IEEE standard for Type 3 over Type 2; however, the maximum compact switches, building man-
and Type 4 PoE. Table 1 provides current per pair remains the same agement gateways, LED lights,
examples of power requirements for at 600 mA. Type 3 PoE is able to WAPs and IP phones. UPOE is not
different devices. double the power (to 60 W) without standards based; if any PoE-enabled
Table 2 summarizes the IEEE PoE doubling the current (600 mA) by device is connected to equipment
standards that have been published using all four pairs to supply the supporting UPOE, it cannot be
or are in development. There are two power. Type 3 provides the option guaranteed that it will work. It must
other remote powering options listed of using just two pairs; however, all be confirmed that the device is
that are not IEEE standards: Power four pairs are required to provide capable of being powered by UPOE
over HDBaseT (PoH) and Cisco’s 60 W. Type 4 requires the use of all before it is connected.
Universal Power over Ethernet four pairs for 100 W from the power The other non-IEEE power
(UPoE). sourcing device at almost 1 A (1000 delivery option is PoH. HDBase-T

24 I ICT TODAY
is a connectivity standard for
AWG cable Ohms per 100 m solid Ohms per 100 m stranded
transmission of uncompressed high-
definition (HD) video, audio, 23 7.32 6.92
power, Ethernet, USB and some 24 9.38 8.76
control signals over a balanced
twisted-pair cable (category 5e or 26 14.8 14
above) using RJ45 (8P8C modular)
TABLE 3: AWG DC resistance at 20 °C (68 °F).
connectors. PoH uses all four pairs to
deliver up to 100 W of power with 1
A of current on each pair. The data
rate supported will be dependent on
the category performance rating of
the cable; however, cable supporting
HDBase-T audio and video is not
intended to support a data network FIGURE 1: Placing and securing thermocouple.
simultaneously.
TSB-184 was driven by IEEE’s
PoE and PoE+ standards and the
concern for temperature rise in
bundled cable that could lead
to long-term cable degradation
and have a negative impact on
transmission performance. Type 3 s
3 meter
and Type 4 PoE, along with non-IEEE
standards for power delivery like
UPoE and PoH, with much higher
power delivery and current per pair,
drove the significant changes in the
A revision of TSB-184.

What’s New in Revision A?


FIGURE 2: Test set-up for bundles in air and in conduit.
There are a number of
significant changes in TSB-184-A.
One key change is that the highest included, along with additional conductor cable; and all categories of
current considered has been specifications for pair-to-pair direct cord cable are represented by the 26
increased from 720 mA to 1000 mA current (dc) resistance unbalance. A AWG stranded value.
(1 A) per pair. Category 8 cable has table was also added that summarizes Dc loop resistance is important
been added along with 26 AWG the dc resistance per 100 meters (m) because it is related to energy
cable. 26 AWG was added because it for three common gauges of cable: consumption; however, the heating
is a common gauge for cordage. TIA- 23, 24 and 26 AWG (solid and in cabling is directly related to the
568-C.2 recognizes 22-24 AWG for stranded) as shown in Table 3. For dc resistance per length of the cable.
horizontal cable and 22-26 AWG for the purposes of this table, category 5e Therefore, small conductor size cable
cordage such as equipment cords, horizontal cable is assumed to be 24 (such as 26 AWG) will heat up faster
patch cables and work area cables. AWG solid conductor cable; category than larger conductor cable (23 or 24
Additional bundling and install- 6, 6A and 8 horizontal cables AWG) and should not be bundled in
ation recommendations have been are assumed to be 23 AWG solid large bundles.

July/August 2017 I 25
26 AWG Category 5e Category 6 Category 6A Category 8
Number
of Cables Air Conduit Air Conduit Air Conduit Air Conduit Air Conduit

1 0.69 1.12 0.04 0.61 0.29 0.47 0.26 0.39 0.18 0.29

7 2.06 3.28 1.27 1.86 0.94 1.43 0.81 1.18 0.51 0.84

19 3.78 5.94 2.43 3.48 1.83 2.67 1.57 2.20 0.91 1.49

24 4.39 6.87 2.85 4.07 2.16 3.12 1.85 2.56 1.05 1.71

37 5.82 9.04 3.86 5.46 2.96 4.19 2.51 3.42 1.36 2.22

48 6.94 10.72 4.67 6.55 3.59 5.02 3.04 4.09 1.61 2.62

52 7.33 11.30 4.95 6.94 3.81 5.32 3.23 4.32 1.69 2.75

61 8.18 12.57 5.58 7.78 4.31 5.96 3.64 4.84 1.88 3.05

64 8.46 12.99 5.78 8.06 4.47 6.17 3.78 5.00 1.94 3.14

74 9.36 14.33 6.45 8.96 5.01 6.86 4.22 5.55 2.13 3.45

91 10.85 16.53 7.56 10.44 5.89 8.00 4.96 6.46 2.44 3.96

97 11.36 17.29 7.95 10.95 6.20 8.39 5.21 6.77 2.55 4.13

100 11.61 17.66 8.14 11.21 6.35 8.58 5.34 6.92 2.60 4.21

127 13.83 20.92 9.82 13.44 7.70 10.29 6.46 8.28 3.07 4.95

169 17.12 25.74 12.36 16.79 9.74 12.85 8.15 10.3 3.74 6.03

Note: Installation conditions and current values that result in temperature rise above 15 degrees (shown in gray) are not recommended.
TABLE 3: Temperature rise for a category of cable vs. number of cables in bundle (600 mA per pair).

TSB-184-A also expands on shown in Figure 2 (page 25). A single disturb them. This was done so that
installation guidelines related to length of cable was wrapped around the same bundles used for testing
bundling of cables to minimize two anchored PVC pipes that were in air could be used in the conduit
temperature rise within the bundle. 3 m apart. The conductors exposed testing without introducing other
The equations used to model the on each end were soldered together variables that might alter the results.
temperature rise vs. cable bundle in a way that allows current to flow The ends of the conduit were stuffed
are reviewed in a new Annex B. through each pair of the cable. In with insulating material to prevent
This model was based on refined both pictures, the bundle on the left convection air from entering the
measurement procedures that were contains 61 cables and the bundle conduit. The size of the conduit was
used to develop the models. The on the right contains 37 cables. selected for a conduit fill ratio at or
setup was done to attain worst- The picture on the left in Figure below 40 percent.
case temperature rise results. The 2 shows the testing for temperature
measurement procedure began with rise in open air. The picture on the Temperature Rise vs. Category
securing a thermocouple in the right shows testing for temperature and Number of Cables
center of a cable (Figure 1, page 25) rise in a closed conduit. For the As a result of the improved
and then placing this cable in the testing in conduit, the conduit was measurement procedures and
center of a bundle. split down the center and assembled additional modeling, TSB-184-A
An example of the test setup is around the bundles so as not to provides tables that summarize

26 I ICT TODAY
26 AWG Category 5e 24 AWG Category 6 23 AWG Category 6A 23 AWG Category 8 23 AWG

Air Conduit Air Conduit Air Conduit Air Conduit Air Conduit

600 mA 141 79 214 146 281 205 349 272 1039 580

720 mA 86 45 136 90 183 128 227 171 660 359

1000 mA 33 16 58 36 81 53 101 71 280 144

TABLE 4: Maximum bundle size for 15 °C (27 °F) temperature rise at 20 °C (68 °F) ambient.

Center Temp q 25% Max Temp q 30%


were more total cables (111) in the
1 inch smaller bundles. Separating the
smaller cable bundles by an inch
reduced the maximum temperature
rise by another 30 percent. The
smaller bundles have more surface
91-cable bundle Three 37-cable bundles Three 37-cable bundles area to dissipate heat and separation
allows for more airflow so both can
FIGURE 3: Impact of reducing bundle size and adding separation. help mitigate temperature rise.

temperature rise for the different in gray, are not recommended.


Considerations When
cable categories vs. the number of Using the modeling, a table Selecting Cable
cables in a bundle. Categories 5e, 6, was created to summarize recom- When selecting cable that
6A and 8 are included in the table. 26 mendations for the maximum may be used for both data and
AWG is also included for cord cable. bundle size for a 15 °C (27 °F) remote powering, there are several
The TSB assumes that the results temperature rise. Table 4 summar- things to keep in mind. First, cable
for 26 AWG apply to all balanced izes the maximum bundle size construction impacts temperature
twisted-pair cables of that gauge size when the ambient temperature is rise. Larger gauge cable has less dc
for all categories of performance. 20 °C (68 °F). An additional table resistance and heating in a cable is
Three separate tables are provided summarizes the maximum bundle directly related to dc resistance per
based on the current used to energize size when the ambient temperature unit length. As a result, larger copper
all pairs of every cable. is 45 °C (113 °F) in TSB-184-A. gauge cables generate less heat and
Table 3 shows the temperature Testing showed that separating are better at dissipating heat so they
rise for category cable versus the a larger cable bundle into several are better at limiting heat rise.
number of cables in a bundle in air smaller cable bundles can help Higher temperature can cause
and conduit when every cable pair reduce the temperature rise (Figure additional insertion loss in cables.
is energized with 600 mA. There are 3). Comparing the measured Cables with a higher temperature
similar tables showing results when temperature rise in the center of a rating are better able to mitigate the
energizing all pairs with 720 mA and large 91-cable bundle to the worst impact of temperature rise. Plenum
1000 mA in TSB-184-A. case maximum temperature rise in cables (100 percent fluorinated
As noted in the table, installa- the center of three smaller 37-cable ethylene propylene [FEP] insulation)
tion conditions and current values bundles, the center temperature of will have a higher temperature rating
that result in a temperature rise the three smaller bundles was about than riser cables (with partial FEP
greater than 15 °C (27 °F), shown 25 percent lower even though there or polyolefin insulation). Shielded

July/August 2017 I 27
products dissipate heat down the Conclusion A per pair; 500 mA per conductor)
length of the cable and therefore The next generation of PoE is with all four pairs energized. The
help abate temperature rise. coming and it will make it possible administration system, as defined
The design of the cabling system to connect significantly more devices in ANSI/TIA-606-B, may be used to
should take into consideration the because of the higher power. The distribute channels supplying power
temperature along the whole cable adverse side to higher power is the in different bundles to help mitigate
pathway. Higher temperature may generation of additional heat, which temperature rise.
result in insertion loss and could can impact the cable’s performance. Some argue that in 2017
require de-rating the maximum Temperature rise can cause signal remote power delivery is primarily
channel length. Also consider the degradation and long-term damage accomplished over two pairs and
manufacturer’s headroom warranties to the cable if the temperature IEEE 802.3bt standard for Type 3 and
to estimate performance. exceeds the cable rating. 4 PoE will not be published until
TSB-184-A recommendations 2018, whereas the modeling done in
Related Standards Work are based on minimizing the the TSB was based on all pairs being
Additional work is being done in temperature rise of cables to 15 °C energized in all cables. Standards will
the TIA Engineering Subcommittee (27 °F). The TSB recommends always be based on the worst case
TR-42.3, which is responsible for the category 6A or higher performance, because they are providing guidance
pathways and spaces standard ANSI/ balanced four-pair cabling as that can be used no matter what
TIA-569-D. The work will become a specified in ANSI/TIA-568-C.2. manufacturer’s product is used for
second addendum to the standard This is because category 6A has the an extended amount of time. Cable
(ANSI/TIA-569-D-2) when complete. best thermal performance, can be plant life can be anything from
The addendum provides bundled in the largest bundle sizes three to five years for some or, more
additional guidelines for pathway without exceeding a temperature commonly, 10 to 15 years or more
systems supporting copper cabling increase of 15 °C (27 °F) and for others.
used for remote power delivery. It supports 10 GBASE-T (10 gigabit It is important to remember the
identifies key considerations when Ethernet). The TSB recognizes following key concepts related to
designing pathway systems for new category 5e or higher for existing supporting the delivery of remote
installations and for optimizing the installations. power to find the best solution:
use of existing pathway systems for TSB-184-A also recommends n All categories can support
better thermal performance. This leaving cables unbundled in remote powering. Higher
addendum refers to TIA TSB-184-A pathways. If bundling is necessary, category cable is larger gauge
for guidelines on limiting bundle then the guidelines for maximum resulting in lower dc resistance
sizes of different cable categories. bundle sizes provided by the tables and therefore less heat
The TIA TR-42.7 Subcommittee for in Annex A of the TSB, like that generated.
copper cabling and components is shown in Table 3 for 600 mA per n Limit bundle size of smaller
currently reviewing a suggestion to pair, should be followed. As a gauge cable where heat may be a
include 28 AWG cable for cordage. general rule, TSB-184-A recommends problem. Separation of bundles
Work is still in the early stages; limiting the bundle size to 24 cables can also help reduce temperature
technically, however, 28 AWG will in typical pathway conditions like rise significantly.
support remote power. Refer to the conduit or tray without insulation. n When designing the cabling
manufacturer for guidelines for the This takes into consideration system, consider the bundle
support of PoE over 28 AWG cords. installation practices, possible high size recommendations for
ambient temperature, the use of 26 planning the location and
AWG cords, and higher current (1 grouping of horizontal

28 I ICT TODAY
cables, consolidation points identifying the fastest data
and work area outlets. application and highest level
If larger bundles are needed of remote power expected to
because of the number of be delivered over the life of the
cables in a particular cable, will help in the selection,
pathway, use smaller design and installation of the
adjacent bundles instead. right cabling system solution for
n Make certain that the the life of the cable plant. n
ambient temperature
plus cable temperature AUTHOR BIOGRAPHY: Cindy
rise (maximum increase Montstream, RCDD, NTS, EE, CPLP,
of 15°C [(27 °F)]) does not is the Director of eLearning and Standards
exceed the temperature at the Data Communications Division of
rating of the cable. This Legrand, North America, headquartered
must be considered for in New London, CT. She received
the whole path of the cable. her Bachelor of Science in Electrical
Consider cables with higher Engineering from Northeastern University
temperature ratings if and her Masters of Technology Education
needed. from Central Connecticut State University.
n Channels can be de-rated Montstream also received her Certified
to compensate for insertion Professional in Learning and Performance
loss. certification from the American Society
n Cables can be unbundled for Training & Development in 2010.
or put into smaller bundles, She has 26 years of experience teaching
or bundles can be separated technical subjects and working in the
to mitigate temperature rise. telecommunications industry. She
currently participates on the TR-42
All cable sizes and TIA subcommittees, holding a Vice Chair
performance categories can position on the TR42.6 and TR-42.16
support PoE; however, they committees and the Chair position on the
may require smaller bundles TR-42.3 committee, and participates on
or no bundling, or even de- the TIA FOTC committee as a Vice Chair
rating the channel length. of Standards. She is a frequent presenter
Consider the manufacturer’s and author for industry-related events and
headroom warranty when publications. She can be reached at cindy.
evaluating performance. Some montstream@legrand.us.
manufacturers have developed
cables for accommodating
various specific needs (e.g., low
data rates supporting higher
power delivery vs. high data
rates supporting high power
delivery). Keeping TSB-184-A
guidelines in mind, along with

July/August 2017 I 29
By Dave Fredricks, DCDC

30 I ICT TODAY
The leaf-spine topology is easily scalable. The links between the leaf and spine layer can be either
routed or switched. All links are forwarding—which means that none of the links are blocked in a path.

Core
Spine
Aggregation
Leaf
Access
FIGURE 1: In three-layer design, the bottom FIGURE 2: In leaf-spine topology, leaf switches form the access layer.
(or access) layer connects hosts to the network.

When considering the impact While this design is simple, it Transparent Interconnection of Lots
converged infrastructure and places limitations on scalability. of Links (TRILL) or Shortest Path
hyperconvergence are having It can be subject to bottlenecks Bridging (SPB) software. All links are
on cabling, it is important to if uplinks between layers are forwarding, which means that none
first understand how data center oversubscribed. This can result from of the links are blocked in a path.
topologies are evolving. Over the latency incurred as traffic flows
past several years, the emergence of through each layer and from the Converged Infrastructure and
software-defined networking (SDN) blocking of redundant links using Apache Hadoop
has pushed data center designs from protocols like spanning tree. Converged infrastructure works
three-layer topologies to leaf-spine Leaf-spine topology (Figure 2) by grouping multiple technology
topologies. is an alternative design in which components into a single compu-
In three-layer design (Figure leaf switches form the access ting package. Components of
1), the bottom (or access) layer layer. These leaf switches are fully a converged infrastructure may
connects hosts to the network. The mesh connected to all the spine include servers, data storage devices,
middle layer is the distribution or switches. The mesh ensures that network hardware, and software for
aggregation layer. The core layer each leaf switch is no more than one IT management.
provides routing services to other connection away from any other Many customers are using
parts of the data center, as well as leaf switch. converged infrastructure to build
services outside of the data center This topology is easily scalable. Apache™ Hadoop® clusters. Apache
space, such as internet access and The links between the leaf and Hadoop is an open-source software
connectivity to other data center spine layers can be routed or framework written in Java for
locations. switched, using technology such as distributed storage and distributed

July/August 2017 I 31
(1) 48 fiber MPO/24 to MPO/24 OM4 trunk (1) 8 fiber/4LC OM4 cable assembly
data connections and two as
management ports.
The cabinet on the right is
the compute cabinet and has two
top-of-rack (ToR) switches. This
configuration uses one ToR for
data at 10 gigabit (Gb) or 25 Gb
and one for management at 1 Gb
or 10 Gb. The ToR switches are
connected back to the EoR cabinet
using 8-fiber/4-port LC-to-LC cable
assemblies. Below the ToR switches
in the compute cabinets are servers
and disk arrays.
With a data center converged
infrastructure, all the components
of a data center (servers, data
storage devices, networking
equipment and software) can be
contained in a group of cabinets or
one cabinet. As data center owners
need more computing power,
they can add infrastructure either
one cabinet at a time or multiple
10 G or 25 G Data ports 1 G or 10 G Management ports cabinets at a time.
Core #1 Core #1 When end users install these
10 G or 25 G Data ports 1 G or 10 G Management ports systems, in-cabinet connectivity
Core #2 Core #2
can become a challenge due to the
different media types available.
FIGURE 3: Apache Hadoop clusters use an open-source software framework written These media types include twinaxial
in Java for distributed storage and distributed processing of very large data sets.
direct attach copper (DAC), active
optical cables (AOCs) and tradi-
processing of very large data sets. On the backside of the MPO tional transceivers and optics with
Figure 3 shows a typical Hadoop coupler panels are 48-fiber MPO- patch cords and jumpers. Note:
cluster. to-MPO trunks with two 24-MPO DAC can be supplied as either passive
The core cabinet on the left is connectors used as backbone cabling or active.
a modular switch chassis with 12- running into the back of 24-port
port muxponder (MXP) line cards. MPO-LC cassette modules. Each In-Cabinet Connectivity Using
Connecting out of the line cards are 24-port cassette module replicates Twinaxial DAC Cables
24-fiber multi-fiber push on (MPO)- one core switch to connect a row of In-cabinet connectivity uses
to-MPO trunks going up into MPO compute cabinets. twinaxial DAC cabling (Figure 4).
coupler panels. Each MXP line card The center cabinet, or end-of- The DAC cables plug into the
has 12 ports and each MPO coupler row (EoR) or middle-of-row (MoR) servers and software appliances
panel has 12 couplers for one-to-one cabinet, replicates four network to the network switch or uplink
line card mirroring. core switches with two as main switch. Generally, DAC cables that

32 I ICT TODAY
are shorter than five meters (m) are A limitation of using AOCs
passive and do not consume power. is that they only support one
They do nothing to the signal, acting transmission speed and vendor type.
only as a pass-through transmission When the next equipment upgrade
medium. occurs, the AOC cables will most
Prior to the signal entering the likely need to be replaced. Although
passive DAC cable, the switch will less expensive than individual optics
set signal conversion, conditioning, and jumpers, they are not scalable to
amplification and equalization or higher speeds.
skew. Properly utilizing passive
FIGURE 4: DAC cables that are shorter DAC cables requires switches that In-Cabinet Connectivity
than five meters generally are passive and have signal processing chipsets to
do not consume power. They do nothing to maintain acceptable skew.
Using Jumpers, Harnesses
the signal, acting only as a pass-through
transmission medium. Typically, DAC cables longer and Patch Cords
than five m are active and draw When using transceivers
power from each end, but this may mounted in devices, copper patch
vary from vendor to vendor. Active cords can be used effectively to
cables cost three times more than run speeds from 1 Gb to 10 Gb.
passive cables on average. SFP+ DAC Category 6 (CAT6) copper cabling is
is a popular choice for 10 Gb. It the current industry leader for these
reaches up to ≈10 m (33 ft), has low connections.
latency and lower cost. Recently released mini CAT6
One of the challenges of using cabling (Figure 6) has reduced the
DAC comes with cable management. diameter of standard CAT6 by 50
DAC cables come in standard lengths percent. Mini CAT6 also has a more
FIGURE 5: AOC are more expensive than DAC and breakouts, which can leave flexible copper core to better route
but can run longer distances at higher speeds.
long service loops and cause cable the cable within the cabinet. It can
congestion. Generally, DAC cables be bundled to break out and stagger
can support 1 Gb to 1 Gb, 10 Gb to on each end. One end can stagger
10 Gb, 40 Gb to 40 Gb and 100 Gb into a ToR switch and the other end
to 100 Gb connections. They can into any server or appliance ports
also break out from 40 Gb to four 10 needed.
Gb and 100 Gb to four 25 Gb. If the application uses patch
panels or a ToR switch with required

FIGURE 6: Mini CAT6 has a more flexible In-Cabinet Connectivity Using optical ports, optical fiber jumpers
copper core to better route the cable within Active Optical Cables and harnesses (Figure 7) can be
the cabinet than standard products. used effectively. One advantage of
AOCs are made of glass optical
fiber with optics attached to each using pre-terminated optical fiber
end (Figure 5). They are more is that the lengths can be precisely
expensive than DAC but can run manufactured to make the required
longer distances at higher speeds up connection. Each connector can
to 100 Gb per second (Gb/s). be pre-labeled to port destination
AOCs can support 10 Gb to 10 for ease of installation. This greatly
Gb, 40 Gb to 40 Gb and 100 Gb to reduces the service loops in-cabinet
100 Gb connections. They can also and helps with managing all other
FIGURE 7: Pre-terminated fiber can be made break out from 40 Gb to four 10 Gb connections, such as power cables
to precise lengths to fit the required connection. and 100 Gb to four 25 Gb. and monitoring equipment.

July/August 2017 I 33
Another advantage is a longer
potential lifespan. Unlike DAC
cables that feature a shorter length
and lower power capabilities, optical
fiber jumpers and harnesses will 3/4" stagger
be forward-compatible as speeds
increase.
Custom optical fiber harnesses
(Figure 8) can also be made to
specific lengths and breakouts
and can be pre-labeled for ease of 8-fiber * Calculate length from breakout to breakout using
installation and repeatability. OM4 longest distance of four servers to be connected.
multimode
Hyperconvergence
Hyperconvergence uses a
software architecture to integrate
compute, storage, networking,
virtualization and other technologies
in a single hardware box. As data
3" stagger 5" stagger
centers started to use converged
infrastructure to bring compute
systems into several cabinets (or just
one cabinet), hyperconvergence has
now reduced that footprint to 1 unit
(U) or 2U of rack space.
This new technology has relied
FIGURE 8: Custom optical fiber harnesses can be made to specific lengths
on the advances of SDN. The and breakouts and pre-labeled for ease of installation and repeatability.
software can communicate with
all of the required components in
the compute cycle, not just in one SDN on their equipment and NFV has more in-cabinet connections
location but in many locations. will allow them to appear and act as than both three-layer topologies and
Along with SDN, network the same compute system to the user. converged infrastructure because of
functions virtualization (NFV) has the number of converged machines
become a predominant enterprise In-Cabinet Connectivity used per cabinet. Understanding the
data center model. The implication When deploying hyper- connections necessary by speed and
of these models is far reaching. As convergence, the devices used are optimizing media type usage will
an example, an organization may 1U and 2U in rack space and many reduce costs and best support the
have its main data center located can be installed in a single cabinet. components in the cabinet.
at its headquarters. This institution Each of these devices would typically
could have a disaster recovery site require two or four connections Cable Kitting
in another state that is housed in to an uplink switch. This uplink As data centers deploy hyper-
a colocation facility. It could also switch can be mounted at the top of convergence, proper planning
have its email and other business the cabinet or in the center of the can help prepare for in-cabinet
applications in the cloud, using a cabinet to reduce the length of the connections. For instance, determ-
large cloud vendor. Each of these in-cabinet connectivity. ining the best lengths for DAC
three locations can run the same Generally, hyperconvergence cables, breakouts, harnesses and

34 I ICT TODAY
power cords is highly recommended. to converged infrastructure and Generally, hyperconvergence
Once power cord lengths are deter- hyperconvergence. has more in-cabinet connections
mined, they can be color-coded for As the individual components than both three-layer topologies and
both power strips. for computing are coming in smaller converged infrastructure because of
In addition, selecting the packages, such as 1U and 2U rack the number of converged machines
necessary optics per cabinet ahead unit machines, the cabling is being used per cabinet. n
of time will help with quick and compacted. The vast majority of the
efficient deployment. Optics can be connections are now being made AUTHOR BIOGRAPHY: Dave Fredricks,
programmed to work with several in-cabinet and accomplished with DCDC, is a data center infrastructure architect
different vendors’ equipment to twinaxial DAC cabling or AOCs. at CABLExpress with more than 20 years of
reduce the amount of part numbers Planning ahead and standard- experience in fiber optic and structured cabling
to stock and manage. A single izing on cabinet equipment rack solutions. He has authored a number of white
cabling supplier box can include all positions can help identify the best papers, including Conflicts in Data Center
the needed connectivity and optics cable for the connection. Acquiring Fiber Structured Cabling Standards, Meeting
for one cabinet. the cables at proper length, 40/100G Ethernet and 32GFC, and 28GFCp
breakout, color and labeling will Light Budgets with a Structured Cabling
Conclusion ease installation, cable congestion, Design. He has comprehensive knowledge
Data center topologies continue cooling and repeatability. This, in of the TIA and IEEE® industry standards for
to migrate from three-layer to leaf- turn, will reduce downtime related network and storage connectivity. He can be
spine. SDN is helping the evolution to connectivity. reached at dfredricks@cxtec.com.

ENJOYING
ICTHouse
TODAY?
ad
Tell a Student!
BICSI’s new Student
Membership is available
at a discounted rate and
includes a subscription
to ICT Today!

bicsi.org/membership .

July/August 2017 I 35
By L. William Nattress III, CTS-D, CTS-I

Building Smarter Emergency Communications Systems:


Distributed Architecture Brings
Intelligence to Life Safety
In this age of information, people expect The guidelines defining how this is accomp-
to receive instructions clearly and immediately lished come from the National Fire Protection
during emergency situations. Fulfilling the Association (NFPA) Part 72 in the United States and
need for concise and timely information is why the EN-54 within the European Union. The NFPA
emergency communications systems (ECS) is a code providing a foundation for local muni-
continue to evolve, incorporating multiple modes cipalities to set their own life safety requirements
of getting messages and directions out to people. that drive the ECS solution. EN-54 is a law stipulat-
ECS inform people about what to do and where to ing that products must meet specific requirements
go in an emergency, providing a measure of order of certification. While this article focuses on the
in a potentially chaotic and stressful situation. NFPA, the concepts apply to EN-54, as well.

36 I ICT TODAY
The NFPA Part 72 is updated technologies such as steerable fail, only that device is impacted,
every three years—with the 2016 arrays must be employed to and the remainder of the system is
version being the most current— increase the speech intelligibility still in place. Required monitoring
providing more comprehensive of the ECS. immediately reports any failure so
terms, definitions and requirements corrective measures can be taken.
of emergency communications The Evolution of Emergency Redundancies built into the system
systems. The NFPA 72 defines three Communications Systems also ensure that any failures will be
critical terms every ECS must address: ECS solutions need to backed up by another device.
Audibility requires the alarm Perhaps one of the biggest
n intelligently and automatically
tone to be 15 decibels (dB) above revisions in the 2016 version
address each of the terms within
any ambient noise (this applies of the NFPA code is that it now
the revised 2016 NFPA Part 72
only the alarm tone, not voice allows Ethernet to be used as a
code. Utilizing audio digital
messaging). viable transport of emergency
signal processing technology and
Intelligible refers to the ability communication systems messaging.
n integration with other building
Referring to it as Class N, the code
of the intended audience to systems, devices can apply
classification focuses on transmission
understand the directions. intelligence to the emergency
type, pathway requirements,
Consider this example: If a alert systems. One example is to
redundancies, device connectivity
first-time visitor to an office precede alert messages with a tone
and end-to-end communication
space is on the fifth floor, and that is picked up by an ambient
verification.
is given verbal instruction to noise-sensing device that measures
Transmission types within ECS
exit out of Stairwell 3 because how loud the space is at that given
refer to the vehicle by which the
a fire has broken out, the visitor moment. This ensures that the
signal can be distributed across the
is unlikely to know where to go. ensuing alarm plays the required 15
network. NFPA 72-2016 does not
Giving that direction, even at dB louder than the ambient noise in
specify a cable type in networking
an audible volume, does not the area. The system automatically
infrastructure, but the conveyance
make it more intelligible. As adjusts to the appropriate volume of that signal is explicitly defined.
required by the NFPA code, to broadcast the instructions—even This will depend upon the type of
messaging must make sense to in several languages—to meet the building, occupancy, construction
everyone in the space, and intelligibility requirement of the methods and whether there are fire
signage (either active or passive) space. Finally, a closing tone sounds suppression systems included within
must be used to clearly indicate again at the prescribed 15 dB above the building. Cross referencing other
the escape route or location of the ambient volume. NFPA documents, survivability of
refuge. In the ECS marketplace, the cabling is the focus so long as
n Intelligibility is the acoustic consideration of a distributed, the conveyance protection is aligned
measurement of a space to decentralized architecture should with the type of construction. This
provide the optimal environ- be on the list of possible solutions. means that standard category cables
ment for hearing the system’s Many emergency communication may be utilized along with optical
voice messages. The code systems use a centralized processor. fiber infrastructure for the longer
requires an average sound If that processor fails, the entire haul as long as they are protected
transmission index of 0.5 for system fails. Decentralized correctly from the surrounding
the entire space. This means architecture utilizes networking environment. 802.11 Wi-Fi may
that, in large spaces with hard with system intelligence residing in also be employed with appropriate
reflective surfaces, acoustic each local device. Should a device redundancies.

July/August 2017 I 37
Decentralized architecture utilizes networking with system intelligence residing in each local device.
Should a device fail, only that device is impacted, and the remainder of the system is still in place.

Pathway redundancies are These devices must be supported critical to the success of the solution
already designed into most by redundant network connectivity deployed.
modern cabling infrastructures. so that they are always able to
Consideration for Class N communicate. Layer 1 - in-building emergency
redundancies begins with the riser Prior to the 2016 code revisions, communication systems: Typically
and the construction type that all ECS connectivity required line centered on the fire alarm system,
surrounds it. This information is status monitoring. This meant that the ECS are being augmented by
defined within the architectural all interconnections and pathways visual displays supporting the NFPA’s
plans. If the telecommunications needed to be supervised so that focus on visual and audible means.
room (TR) is enclosed by rated fire any technical problems could be This layer is directly supported by
walls, the redundant path may addressed immediately. The 2016 the building infrastructure and
route through the same room but addition of Class N addressed this requires the redundant pathways
must be physically separated. In the differently, in that it was not feasible defined by the type of construction.
event that standard wall separations to supervise the entire signal path of
are used, the redundant pathway an Ethernet network. For this reason, Layer 2 - wide-area mass notifi-
must be contained in a protected the code focused on verification of cation systems: Environmentally
conveyance and be located outside end-to-end communication between protected communication devices
of the room. It is also advisable to the devices as the means of signal that are located to provide an
run horizontal riser interconnect integrity. audible communication to the entire
between TRs to allow for network campus or metropolitan area. Alert
cross connections in the event of a Mass Notification Systems sirens and large voice amplification
total riser failure. Mass notification solutions are solutions are employed in these
The code now looks at two present within many organizations solutions. These deployments are
component types to define the today. These systems leverage supported by the outside plant
redundant connection requirements numerous technologies to com- infrastructure requiring redundant
for device connectivity: data municate critical information to pathways not unlike the in-building
endpoint and data forwarding occupants of an environment, ECS solutions.
equipment. Any device that only whether employees or the general
senses or interacts with a single public. This means that these Layer 3 - distributed recipient mass
point or requirement is classified communication methods must notification system: Leveraging
as a data endpoint. Since the be able to succeed without the devices such as computers, tablets,
interaction is only at that device, individual being registered on the telephones and smartphones, urgent
the code allows for that device to local network. messages can be distributed to
be supported with a single cable. The NFPA 72-2016 defines four registered devices on the campus.
Redundancy is built into the design layers for a mass notification system. Utilizing the newer location-based
by having another device nearby No less than two must be deployed services technologies, non-registered
handle the requirement. Devices within any built environment so devices can also be reached.
that communicate with many other that every occupant can receive the
devices or systems are classified notification. Understanding the Layer 4 - public measures: This
as data forwarding equipment. audience type within these layers is layer encompasses the broadcast

38 I ICT TODAY
Starring Structured Cabling, BAS, Low-Voltage Lighting and
Integration with appearances by Zone Cabling and Direct Connect

COMING
SUMMER
2017
From the Studio
that brought
you BICSI 005:
What About ESS?

Produced by BICSI’s International Standards Program

BICSI 007
AND THE RISE OF INTELLIGENT BUILDING
July/August 2017 I 39
How Communication Types Stack Up
solutions of the area. Messages
are sent via radio and television
to all receiving devices within the
geographic region.

ECS Notification Layers and


What They Mean
The modern ECS is not just an
alarm. Instead, ECS provide a multi-
layered technology platform to
more fully inform occupants. These
technical layers consist of voice,
visual and personal notification,
and each one has more or less value
based on the environment:
n Voice refers to the voice message
and alarm notification tones
issued by the emergency FIGURE 1: A modern ECS provide a multi-layered
communications system that platform to more fully inform occupants of emergencies.
communicates what to do in
a crisis.
n Visual refers to digital signage ability. Even cellular quality layers work together for an integrated
and strobe lighting. A visual between networks can vary so solution. At the personal notification
such as strobe lighting only greatly that while one person layer, for example, technologies such
informs people that there is can receive the message in a as app-based and location-based
an urgent condition; used in matter of moments, another services are changing how facilities
conjunction with a digital person on another network may can push and receive information. In
signage solution or ticker receive it too late or not at all. an ECS, location-based technology
displays and the voice layer, can be used to determine if a device
the system can tell everyone The emergency communications is in proximity to send it an alarm.
what that situation is and plan looks at these three technical These layers are also advancing
provide further instruction. layers and defines how they should the intelligence of emergency com-
n Personal notification is the be used in each environment (Figure munications. In an office building
layer that sends an email or 1). For example, in an office building utilizing an access control system,
text message to occupants’ where there is a good idea of who information can be gathered to know
smartphones. The reliability of is in the environment, these three who is in the building and in what
cellular networks presents a layers are highly effective. In public general area they are located. Security
major obstacle for this layer, environments such as shopping cameras can put eyes on an entire
particularly when coverage is malls or performing arts centers, it campus to spot when and where
inadequate. Also challenging is harder to determine who is in the an emergency, such as a fire, has
is the fact that during emergency space; therefore, the voice and visual occurred. These security analytics,
situations, the cellular network layers would be priority. both video and access control,
may be flooded, causing slow Continued technological provide critical data for planning
delivery or network unavail- advances are improving how these evacuations.

40 I ICT TODAY
Intelligence and Flexibility over the alarm that may be occurring AUTHOR BIOGRAPHY: L. William Nattress
at the same time. For example, in III, CTS-D, CTS-I, is the Director of Channel
The fire alarm bell is no longer
the event of a fire in a healthcare Strategy – Paging for Biamp Systems. His
the be-all-end-all for emergency
extensive experience includes specialization
notification. Previously, if the fire environment, a fire alarm tone is
in areas including project management in
alarm was going off, everything sounded, but if a medical emergency
the design, engineering, installation, and
else took a back seat. Recent occurs at the same time, the fire integration of audio, video, conferencing,
situations have made the authority alarm system can be silenced briefly and control systems. In addition, Nattress
having jurisdiction (AHJ) realize while the medical code call goes out, conceptualized the technology that led to the
and then resume when the code construction of Chicago’s Millennium Park
that numerous systems must be
Video Fountains landmark, which was awarded
employed, and employed in different is over. These are all intelligent and
first place honors by ARCHI-TECH magazine.
ways, depending on the nature of automated functions that advanced
Nattress is a Senior University Faculty member
the emergency. Alarms are never ECS solutions must address to achieve for InfoComm, and was named InfoComm’s
deactivated or ignored; instead the latest standards in emergency Educator of the Year in 2009. He can be
verbal direction is now allowed (in communications, whether deemed reached at bill.nattress@biamp.com.
predefined ways) to take precedence critical now or in the future. n

Fiber Enclosures

Save 50% or More


1

Patch Panels

• Same day shipping 2

• Free shipping over $99 3

cablesys.com cs@cablesys.com 800-555-7176 • 1000+ SKUs in stock


© Copyright 2017, Cablesys 1. Compared to big brands. 2. Online orders only. 3. Please visit cablesys.com for shipping policy. • Build to order, build to spec cs@cablesys.com
Patch Cords
Cablesys BICSI Half Page July-August 2017.indd 1 6/5/2017 2:16:36 PM

July/August 2017 I 41
By Aaron Hesse, PE, RCDD

Smart Cities and the Internet of Things


Everything seems to be getting owners with the data and trends necessary
smarter: phones, cars, and—with the to help them make smarter decisions. If
increasing trend of networked devices— this trend of convergence, big data and
even kitchen appliances. The term being interconnectivity is taken a step further, we
used to define this trend is the Internet can begin to imagine smart cities.
of Things (IoT). In building technology,
it is no secret that the many systems What Is a Smart City?
found in today’s buildings are converging A smart city can be defined in a
onto the network data plant. From this variety of ways. To some, the power of
convergence comes the concept of the the smart city is in a distributed network
smart building. Such a building can react of instruments that collect data about its
to data collected within the building inhabitants. Healthcare professionals, law
using the IoT and make adjustments to enforcement and city planners can use
building systems automatically, alert staff this data to help improve and monitor
of abnormalities and provide building the city and its services as it grows and

42 I ICT TODAY
evolves. Some see the increased use
of technology as a way to narrow
the digital divide, while others see
it as increasing the disadvantage of
those without access to technology.
Regardless of the social impact
of this trend, this market should
not be underestimated. Arup, the
international engineering company,
has estimated that the smart city
industry will reach $400 billion US
by 2020. Using a somewhat broader
definition of smart cities, which
includes smart city infrastructure, a
report by Merrill Lynch and Bank FIGURE 1: Cities such as Philadelphia are planning a network infrastructure through a partnership that
of America indicates the market will install a high-speed singlemode optical fiber network connecting more than 200 city buildings.
will increase to $1.6 trillion US
by 2020. Taking a similar approach The building automation system Much of this data, such as rain and
to the analysis, Frost & Sullivan (BAS) could reduce the temperature air composition sensors, do not
has estimated the global industry faster in rooms that are not in use. necessarily require a large amount
will increase to $1.5 trillion US Occupancy sensors used in lighting of bandwidth. However, some
by 2020. controls could reduce the time initiatives, such as using analytics
it takes for a light to timeout, or in networked security devices and
How Smart Cities and Smart dim the lighting in areas without cameras, can consume an enormous
Buildings Can Benefit from occupancy. Charging for electric amount of bandwidth if the analytics
Each Other vehicles could slow during peak are performed on the backend
Imagine a city where time- usage and speed up during non-peak instead of at the network edge.
of-usage pricing could be hours. These measures would have Cities such as Philadelphia
communicated from the utility to little or no effect on the occupancy are planning their network
the smart buildings it serves. The while saving the owner money. infrastructure in partnership
building would then, based on the This future is within reach but will with Comcast (Figure 1). This
owner’s preferences, automatically not arrive without upgrades to partnership will install a high-speed
reduce energy usage during peak infrastructure and local data centers singlemode optical fiber network
time-of-use metering and increase and an intense and deliberate focus connecting more than 200 city
energy use during times when on collaboration. buildings. The fiber infrastructure
energy is less expensive. Not only being used in this project will last
would this reduce the burden of Smart Cities Need Smart the city for a significant period of
peak demand on energy utilities, but Infrastructure time. This type of approach works
it could save the owner substantial One great challenge of smart well for connecting areas that are
amounts of money. cities is the requirement for scalable, both geographically compact and
There are a number of systems reliable network infrastructure continuous. For extended reach,
that could be integrated and to aggregate all of this data from something other than optical fiber
communicate with the smart meter. a geographically expansive area. will need to be used. Other cities are

July/August 2017 I 43
More Bandwidth mesh network. This band of RF is and Accountability Act (HIPAA).
unregulated and free to use. Each The biggest challenge to data
Surveillance Cameras node would then talk to the next centers will be the increased need
Optical Fiber
Traffic Cameras node until the information can for resiliency and redundancy.
reach the main headend. The traffic For many city and county data
Water Level
generated on this type of network centers, the additional cost of
Rain Level
would need to be limited as the size increasing electrical and data
Traffic Sensors
Cellular of traffic can increase exponentially pathway redundancy is not currently
Transit Location
or Wi-Fi Air Quality as the mesh approaches the central justifiable. The ability to perform
Barometer head end. Figure 2 shows the full routine and scheduled maintenance
Temperature spectrum of devices and typical without an outage is, in many cases,
Bridge Safety Monitors communication approaches. omitted. This will change when
Seismic Monitors A major issue for these devices more smart devices begin to be
will be the resiliency of the network handled by the city data center.
Energy Metering used for communication. If traffic is BICSI’s published standard for
Radio Water Metering being adjusted in real time with the data center design, ANSI/BICSI
Frequency Gunshot Detectors use of traffic cameras and analytics, 002-2014, Data Center Design
Hydrant Status
the loss of that camera feed could and Implementation Best Practices,
Parking Status
result in worsening traffic issues. indicates five main classes of data
“Laggy” or lost data packets over centers. The standard goes into
Less Bandwidth
Long-Term Evolution (LTE) or RF great detail to determine which
FIGURE 2: The spectrum of devices and could result in large holes in the components need to be redundant
typical communication approaches using data or useless data. In order to in order to achieve certain classes.
a 900 megahertz (MHz) radio frequency combat this, most of this technology Table 1 provides a summary.
(RF) signal in a mesh network. will require a secondary mode of While many city data centers
communication. Where a cell tower may fall into the F2 or F3 category
going the wireless route through signal is an option, LTE makes a great currently, the data center will need
either a mesh network or the use of backup, even if the cost of using it as to be upgraded to Class F4 when
cellular LTE. a primary source is too high. they start running critical smart city
Providers such as AT&T and applications.
Verizon have already started Impact on Data Centers
partnering with cities to provide The amount of traffic generated Concerns about Security
them with connectivity through by the numerous devices in a fully One factor that could inhibit
their existing wireless infrastructure. realized smart city will be staggering. the growth of smart devices is the
Cities tend to choose this option In order to handle this type of traffic, concern over network security
because the infrastructure is the city-owned data centers will need and the community’s privacy. The
already in place and is not owned to become significantly more capable addition of numerous networked
or maintained by the city. Unlike than they currently are. devices placed on the network
optical fiber infrastructure, the The privacy of this data will also edge opens up a number of new
cost of using the cellular network require some attention. Data centers avenues for attack. This is especially
is ongoing but requires very little that handle smart city applications concerning when these networked
initial capital expense. will need to be heavily regulated. In devices are not within a secure
Technology that needs to reach some cases, these data centers may building, but instead are spread out
an even broader area may consider handle a small amount of private over a city. While there are a number
the use of a 900 megahertz (MHz) data and may need to be regulated of things that can be done to combat
radio frequency (RF) signal in a by the Health Insurance Portability this concern, there are a couple of

44 I ICT TODAY
Class FO A single path data center that meets the minimum requirments of the standard
but does not meet the requirements of an F1 or higher level data center.

Class F1 The single path data center.


Introducing
Class F2 The single path data center with redundant components.
the NEW First-Time
Class F3 The concurrently maintainable and operable data center.
Exhibitor Pavilion
Class F4 The fault tolerant data center.

TABLE 1: BICSI 002-2014 summary of data center resilience classes.

approaches that the ICT designer is going to be implemented in a new


should focus on when interacting building, it would be good practice
with clients and stakeholders. to keep the network separated from Come see firsthand
The first is the physical security the owner’s enterprise network.
what it's like to Exhibit at the
of the networked device. Many
devices, like security cameras, have The Importance of Collaboration BICSI Fall Conference & Exhibition
options for vandal-proof enclosures. One of the greatest challenges of in Las Vegas, September 25-27.
It may be necessary to create smart city initiatives is the intense
similarly hardened enclosures for need for collaboration. Many of Email sales@bicsi.org for details.
devices such as networked sensors. these initiatives tend to spring up
Come prepared with a solution, even within a single department and fail
a custom one, to physically protect to be communicated across the city
end devices deployed in the public. organization. For example, the water
If the device cannot be physically department may have its own plan
tampered with, the possibility of to use networked devices to measure
being compromised is reduced. water use, while law enforcement
The second approach is the may be more interested in mounting
use of a dedicated and separate gunshot detectors on street lamps.
physical layer to the network. These examples can be the gateways
When a new building is in the into a smarter, more connected
early stages of construction, that city, but if vendors and the ICT
is the time to include additional community are not reaching out to
infrastructure for use by the city. these departments, they may not get
This may require close collaboration a chance to be involved.
with the enterprise architect if Similarly, the potential of the
the client has one. The city may smart city will be limited if the
request some dark fiber be installed construction and ICT industries
in parallel to the enterprise fiber do not coordinate closely with
backbone. The city may wish to smart city planners. Simple smart
house additional equipment in the city measures alone cannot realize
telecommunications rooms and the lofty dreams promised by the
light the fiber up using their own IoT. Similarly, smart cities without
equipment. If the smart city concept smart buildings will never reach

bicsi.org/fall

July/August 2017 I 45
Save the Date

BICSI Fall
CONFERENCE & EXHIBITION
SEPTEMBER 24-28 | LAS VEGAS, NV
2017

Make plans now to attend this exciting


event in fabulous Las Vegas!

Register now at bicsi.org/fall


It All Adds Up!
the utopian future envisioned by than many policy makers. If an
so many smart city advocates. The opportunity for smart building or 5 days of education
use of smart meters and the smart smart city initiatives presents itself, and networking
grid will cause smart buildings to be the ICT professional should be the
intrinsically linked to the functions one to approach policy makers and + 23 engaging technical
of the overall city. be an advocate for the technology
As result, the ICT designer of and for the client. This approach
sessions
new buildings should be collabo- will ensure that policy makers and
rating with local utilities that use those in city government are not
+ 2 renowned keynote
smart meters and with the local creating solutions and then looking speakers
government. The use of open and for problems. Technology should
nonproprietary protocols will be not drive the innovation; customer + 140+ industry
paramount to successfully integrated needs should. exhibitors
building systems with the overall
smart city. Lighting control and Conclusion + 1 fantastic location
HVAC protocols are notoriously The networked future is a
proprietary. Protocols such as xAP, bright one and dominates the
X10, Zigbee and BACnet are open imagination of many. The benefits A conference you
source and are being used more often. to building owners, city dwellers
can’t afford to miss!
If a more proprietary system and the ICT industry are expected
is required, look for ways to work to be substantial. By continuing to
with the manufacturer to export build real solutions to real problems,
data from the control system. For ICT professionals can be a part of
example, even something as archaic this rapidly expanding market.
as a dry contact can be suitable for However, the need for broader and
interconnecting different automated more deliberate collaboration is
systems together. When the different critical to success. The organizations
systems within the building are and individuals who will emerge
coordinated together and with as leaders in this field will not be
the overall smart city, substantial those who are masters of these new
changes will result. technologies; they will be those who
Smart city technology should excel at what may be humanity’s
not be driven by what technology oldest skill: working together. n
is available. The ICT community
should stay focused on solving AUTHOR BIOGRAPHY: Aaron Hesse, PE,
customer problems. This industry RCDD, is a professional electrical engineer for
Avista Utilities in Spokane, WA. He studied
is usually working on a regular
Electrical Engineering at Eastern Washington
basis with the client or client University and is licensed by the states of
representative, and thus, is more Washington and California. He can be reached
aware of their needs and problems at aaron.hesse@avistacorp.com.

bicsi.org/fall

July/August 2017 I 47
By Paul Brooks, Ph.D.

NEW PERSPECTIVES IN TESTING:


400 Gb and the
New Test Revolution
Until and through the introduction of 100 gigabit (Gb), validating and testing client optics
was a relatively simple task. An optical module would be operated through a test channel,
then the corresponding bit error rate (BER) was measured and used as a pass/fail limit.
In most cases, an error-free result was expected over a typical measurement period.

48 I ICT TODAY
By comparison, 400 Gb client optics have moved gives a very simple pass/fail criterion. Indeed, there is
from non-return to zero (NRZ) to pulse amplitude a current ecosystem expectation that all client optics
modulation-4 (PAM-4) and now also use forward-error should run error-free for at least a “coffee break” interval
correction (FEC) for all physical medium dependents in the lab in an optical loopback.
(PMDs). This advancement significantly complicates
optical module test and validation. The relationship A Short Introduction to 400 Gb Client Optics
between error statistics (and root causes) and the FEC The IEEE P802.3bs project for 400 Gb (and 200 Gb)
characteristics are intimately linked so a simple pass/fail is making good progress, and standardization is expected
limit can no longer be used. around the latter half of 2017. While the Ethernet
This article describes the challenges that arise with portion of the draft standard is very familiar, innovative
400 Gb optics and how they call for a new perspective technologies (from a client-side perspective) need to be
on testing and validation. This new approach will allow adopted to allow 400 Gb technology to meet the cost and
a higher probability of detecting bad optics and passing size expectations of the broader market. Some of these
good optics without significantly adding to the test new technologies include:
burden. n PAM-4 modulation, which uses four levels of signal
rather than the traditional 0 or 1 used in NRZ. This
Current Best Practice with 100 Gb and Lower allows twice as much information to be sent in the
Experience testing on 25 and 40 Gb-based NRZ same time interval. The gap between the signal levels
systems have shown the current links can be treated as is much smaller so the signal is more susceptible to
“very low” BER when designed and built properly. The noise.
test methodology has been rather simple: n FEC coding, which allows all errors in the transmitted
1. Run an unframed BER test. signal (which can occur through mechanism
2. Count errors (hopefully zero). including noise, interference and reflections) to be
3. Accept optics as “known good” stressors (different corrected by additional bits of information added
patterns, clock rates, skew and even SRS can be during the coding phase. FEC codes have found
added, but the ultimate threshold for a pass/fail universal applications in CDs, DVDs, radio frequency
remains a BER). (RF) and optical fiber communications.
n Raw error rate (the error rate occurring over the
This method is ideally suited to client optics that physical medium before FEC has corrected any
run “error free” without use of a client FEC (such as the errors).
100 Gb LR4), but is also applicable to other PMDs that n Frame loss, or the number of Ethernet frames lost
nominally require a FEC such as SR4 at 100 Gb. An FEC due to errors that cannot be corrected and so the
is required as the physical medium (such as multimode whole frame of data must be discarded.
optical fiber) can cause errors on the transmitted data. n Mean-time-to-false-frame-acceptance (MTTFFA),
FEC allows a low-cost physical medium to be used as it or the mean time a link runs before a data packet is
can correct many of the errors that occur over the link. so badly corrupted that the error protection and
The reality is that these optics can run error-free or at detection afforded by the FEC code and checksum
very low error rates (below 10-12) in a loopback, so this can no longer indicate a packet is corrupted.

July/August 2017 I 49
FIGURE 1: A detailed, unframed BER test can be run with
a range of aggressive patterns using a 400 Gb test set.

Why Counting Bits Is No Longer Relevant burst length, and this knowledge can be used to build out
The FEC is not a magic solution that can convert all an idea of the margin in the module. Questions on the
10-4 pre-FEC BER into zero-errored-frames post-FEC. nature of the burst are important: Is it classic bit error, a
In fact, it is heavily impacted by the nature of the error pattern slip, or a flooring? For example, when error bits
statistics—with the burst length being of particular impact. were only “1” or “0”, one would get valuable information
It is entirely plausible to have one module which on the root cause and therefore allow the appropriate
runs at a raw error rate of 10-4 (and will operate error- corrective action to be taken. Optimal testing should
free post-FEC as its error distribution is random with identify issues with clock data recovery (CDR) bandwidth
bonded burst length) and another module running at challenges, pattern sensitivity, and linearity (especially
10 . However, due to design and performance, the error
-10
over the demanding dynamic range required at the
characteristics of the latter lead to uncorrectable errors. photonic receiver).
So, a simple BER test—even with a significant guard Tools such as bit-capture allow complete visibility of
band (106)—can still lead to failing perfectly good
the events leading up to errors and bursts as well as the
modules and passing modules with fundamental
ability to reconcile the bit capture in terms of the coded
performance limitations.
PAM-4 signal at the photonic layer. Again, this allows the
root cause of errors to be explored and corrected.
Fingerprinting Error Statistics
The very nature of the errors requires fingerprinting
to determine the error statistics per key parameters such
A New Recipe for Module Testing and Validation
With 400 Gb test sets, a detailed, unframed BER test
as burst length, burst gap and whether the burst is a true
can be run with a range of aggressive patterns (Figure 1).
error or a pattern slip. This level of detail is required to
determine the root cause of the errors, to take corrective It is important to target the right aggressors in the

design action, and to build enough margin into the photonic domain where most of the error budget is
module to run error-free with the FEC. allocated. This will require the ability to generate specific
With error burst length and nature, there is an upper PRBS_Q and SSPR_Q patterns via the AUI-8 and AUI-16
bond to the length of burst that can be corrected by the interface which correctly translate to the true pattern at
FEC. This sets an important limit to the manageable the photonic layer.

The FEC is not a magic solution that can convert all 10-4 pre-FEC BER into zero-errored-frames post-FEC. In fact,
it is heavily impacted by the nature of the error statistics—with the burst length being of particular impact.

50 I ICT TODAY
BICSI CONNECT NEVER SLEEPS
That’s why so many people rely on BICSI online training.

Enjoy the diversity


of 70+ courses.

Multilingual
navigation
available.

Earn
CECs
24/7.

BICSI CONNECT provides added flexibility when considering a


BICSI course. With industry training at your fingertips, this is an ideal
way to earn industry CECs without leaving your home or office.
Course topics include project management, workplace safety,
data centers, structured cabling systems and many more!

bicsi.org/connect
July/August 2017 I 51
FIGURE 2: Graphical tracking of burst error length
indicates a high number of bursts occurring longer
than 32 bits.

Advanced error analysis can also be used to can be investigated to find a root cause and hence drive
fully understand the nature of the errors. The error better module performance.
distribution and statistics are critical—especially with
respect to burst errors. The burst length and spacing are Graphical Tracking of Burst Error Length: An error
crucial parameters for understanding how the FEC will burst is a case where a number of bits or symbols are
perform. Furthermore, having a detailed understanding corrupted due to a single event. This single event, due
of the error statistics means that, in many cases, the root to its nature and/or generation, corrupts several bits or
cause (e.g., CDR performance, bandwidth, electrical or symbols within a definitive time window. Figure 2 shows
photonic crosstalk, linearity) can be addressed, resulting the burst count versus burst size. It indicates a high
in increased module performance. Of course, it is also number of bursts occurring longer than 32 bits, a sign of
important to stress the module during this phase and errors which the FEC cannot correct.
classic stressors can include:
n Aggressive mix of patterns (including SSPR_Q) Distance between Errors: The distance between errors
n Dynamic skew variation can give valuable insight into the error statistics. Figure
n Clock rate variation (both ramp and step-change 3 shows a typical roll-off with gap. This is typical of
or “jump”) a random Poisson process. Distinct peaks in the error
n Jitter injection distance indicate some deterministic mechanism which
n Aggressive control bus activity (high duty cycle I2C can include a pattern sensitivity, and crosstalk (from
or MDIO read/write activity) power supply unit [PSU] and microcontroller circuitry).
For example, a 1 megahertz (MHz) repetition signal burst
These stressors can be used to bring out module would couple in at around 25,000 bits; such a peak could
design issues and margin. Again, certain failure modes be clearly recognized with this view.

52 I ICT TODAY
FIGURE 3: A roll-off with gap that is
typical of a random Poisson process.

Capturing and Displaying Pattern Slips: Determining A New Approach


what is an error burst and what is a pattern slip is critical Throughout the history of Ethernet technology, the
in finding and rectifying the root cause. An optical task of validating and testing client optics was relatively
network terminal (ONT) advanced error analysis can show simple. Today, as 400 Gb components and modules are
that a pattern slip is occurring. Conventional tools show developed, a new approach is required to successfully
errors only but do not provide full visibility of the true validate and test optics. The complexity of PAM-4 coupled
issue. Bit slips typically occur with the CDR function so with the highly non-linear behavior of the FEC means we
this is where investigations should focus. must finally move beyond the simple error counting of
After the performance of the module has been the past. The new, more sophisticated approach outlined
optimized via unframed deterministic patterns, the in this article enables improved detection of bad optics
module can now be run in a real traffic scenario. Module and passage of good optics without adding a significant
characteristics are established with live Ethernet traffic burden to the testing phase. n
and detailed monitoring of pre-FEC and post-FEC error
rates (hopefully zero). Of course, this is how the module AUTHOR BIOGRAPHY: Paul Brooks, Ph.D., leads up the strategy for
will be used in the real world, so a live traffic test is a the lab and production business unit at Viavi, with a focus on high-speed
critical step. In this step, the pre-FEC error rate should optical transport technology. He is actively involved with IEEE standards
remain relatively constant and well within the margin and the Ethernet Alliance. A veteran of the test and measurement
industry, he has been involved in multiple technologies, from copper and
of the FEC capability. The post-FEC error rate should be
xDSL to 400 gigabit Ethernet, and has served in various roles in R&D
zero. With this information and the raw error statistical
and marketing with Wandel & Goltermann, Acterna, JDSU and Viavi. He
characters gathered earlier, the module vendor and served as a weapons officer in the Royal Navy where he completed a Ph.D.
user will have confidence the module will operate with in optoelectronics at Southampton University. He can be reached at
sufficient margin when deployed in the field. paul.brooks@viavisolutions.com.

July/August 2017 I 53
By Edward J. Forrest, Jr.

The Interaction
Between Precision
Inspection

AND
Precision
Cleaning oF
Optical Fiber
Connections

54 I ICT TODAY
The most reliable means to measure
the three-dimensional (3D) nature of
contamination is with an instrument
called an interferometer.

No one in the ICT industry fiber and the outer circle includes
would dispute that cleaning the cladding and contact surface.
an optical fiber connection is More significantly, the larger circle
FIGURE 1: A clean fiber core and surface
important. Yet, the topic continues designates the limited visual field of
area within the standard range that
to be discussed and disputed. One view of most video inspections, as has zero contamination.
reason may be that no matter how well as the area considered by ‘auto
strong the need, there are still far too detect go/no-go’ inspection devices.
few video inspection devices being The surface considered by IEC process should begin with a dry
used. The other is that the current 61300-3-35 is two dimensional. technique; if that is not successful, a
instructions are actually the reverse Of course, connectors are three- wet-to-dry process is recommended.
of what should be done to properly dimensional structures. There is IEC 61300-3-35 suggests cleaning up
clean any of these surfaces. no disagreement that there is zero to five times. Figure 1 shows a clean
tolerance for debris of any type on fiber core, as well as a surface area
How Do You Clean Something the fiber core. within the standard range that has
That Cannot Be Seen? The standard continues to zero contamination.
Existing inspection and cleaning accept an amount of debris on
techniques are standardized what is called the horizontal Understanding the Nature
by a 30-year-old International surface within the area of the larger of Contamination
Electrotechnical Commission circle. The debris is measured in As is the case with a connector
(IEC) document that was updated two-dimensional diameter and its surface, debris is also three dimen-
in January 2016. IEC 61300-3-35 acceptability within the standard sional (3D). The most reliable
forms the basis for many training is based on the distance and means to measure the 3D nature
programs and numerous products juxtaposition to the fiber core. of contamination is an instrument
designed to meet the standard. In general, any debris within the called an interferometer. The
The standard considers a portion circle and under a certain diameter interferometer is a dynamic device,
of the end face surface (Figure 1) is acceptable; however, any debris yet its images only portray a two-
and suggests a cleaning technique. within the circle and larger than a dimensional aspect (horizontal
The two circles seen in the image certain diameter is not. Most debris plane) of 3D contamination.
indicate the area specified as an outside the outer circle is acceptable The 3D nature of contamination
inspection and cleaning dimension within IEC 61300-3-35. is only one characteristic. The
within this standard. The inner The most contemporary others are the physical natures of
circle outlines the core of the optical instruction is that the cleaning the infinite types of debris that

July/August 2017 I 55
are present in an optical fiber Oftentimes there is a fourth
deployment. The general nature zone—the adhesive area between
of “dry debris” is that it tends to the core and cladding. The IEC
remain in place either: standard uses the size and location
1. Laying on the end face surface. of scratches and defects on the end
5 2. As miniscule debris embedded face surface to determine the extent
into miniscule imperfections of of cleanliness.
the surface. However, two aspects are not
4 3. Through adhesion by a surface considered: the first is the movement
(the tendency of dissimilar of fluids from areas not seen or
materials to cling together). detected by auto-detect equipment
4. Held in place by a static field. and the other is the presence of
debris on areas not considered
FIGURE 2: Suggested 4th zone cleaning
Fluidic contamination is the or governed by this standard. As
surface (horizontal end face ferrule)
and 5th zone vertical ferrule. opposite of dry debris. A fluid moves speeds and capacities of fiber optic
and compresses. Therefore, a fluid transmissions increase, there is a
within the circles will tend to move need for a higher standard and
outside the circles. Likewise, a fluid understanding of the structure of
outside the circles will tend to move both connectors and contamination.
within them. What is being suggested here
There is a third debris type: is a 3D standard for the connector
5 this is a combination of the dry that increases the existing three-
and fluidic types. All types may be zone characterization to five zones
present on an optical fiber surface. (Figure 2). Zone 4 is the complete
This becomes especially problematic horizontal end face ferrule. Zone 5 is
in two instances: the vertical ferrule structure, as well
1. When there is no inspection as other sectors of the connector not
used at the time of cleaning. characterized or considered by any
2. When the inspection device existing standard.
FIGURE 3: Adapter and alignment sleeve, cannot see surface areas that Figure 3 shows an aspect of
both contaminated by dust. are outside the horizontal two- precision cleaning and inspection
dimensional field of view or heretofore not considered: the
those areas that cannot be adapter and alignment sleeve which,
viewed by existing inspection in this image, are both contaminated
devices. by dust. From time to time, even
the most skilled technicians may
Characterizing a Connector inadvertently touch the side of an
The surfaces within the circles adapter during the insertion of the
are characterized in IEC 61300-3-35 mating jumper.
by zones. Should the alignment sleeve
n Zone 1 is the optical fiber core. become contaminated, it must also
n Zone 2 is the cladding area. be cleaned so that the insertion will
n Zone 3 is the contact zone. not push dust toward the back-plane
connector.

56 I ICT TODAY
Zone 5 is all other sectors of in Telcordia GR-2923-Core (which would be cleaned with a dry wiper.
the connector that can create either is a hybrid or combination of the Imagine a muddy car surface: would
direct or cross contamination. It is wet-to-dry technique) and a fourth a dry cloth be used? In the same way,
a major concern to clean individual process (likely the most common wet-to-dry cleaning is best when the
fibers on the MT connector types as of all), so-called blind cleaning debris is identified as a dry soil.
shown in Figure 3; however, there is without benefit of inspection. While From 2005 to 2006, Cisco
debris within the alignment pin and there is an intense need to inspect, studied optical fiber cleaning with
other sectors of the connector that experience shows that as many as a seminal study called “The Cisco
can migrate. With existing video 60 percent of all connections are Series.” In this study, an unusual and
inspection, these contamination cleaned using the blind cleaning exceptionally wide range of debris
points are not seen. procedure. This was re-confirmed was systematically placed on an end
Precision cleaning and inspection in March 2017, in a training session face; debris included metal shards,
should mean that the complete with more than 30 fiber technicians graphite, dried water, dryer lint and
connector surface is considered with working for an important network
Simethicone (sticky medication). In
the intent of arriving at a first-time supplier, none of which had video
2014, this test strategy was emulated
cleaning process and not ineffective inspection.
with a series of dry debris and wet
multiple cleaning procedures that Some were using a fiber identifier
debris and, for the first time, removal
often result in jumper replacement or to determine cleanliness while others
of combination contamination of
return of expensive components on assumed that a light source/power
both types.
warranty repair. reading indicated “clean.” Others
The results of the two studies
used a visual fault locator. Those
proved that 95 percent of existing
Selecting a First-Time skilled using an optical time domain
cleaning products have first-time
Cleaning Process reflectometer can interpret insertion
enhanced cleaning when they are
IEC 61300-3-35 has established loss and reflectance: the only way to
used in the method described in
itself and numerous other formal assure the connector surface is clean
and internal standards. These is video inspection. The simplifying Telcordia GR-2923-Core.* Use of
include TIA 455-240, an SAE introduction of pass/fail inspection a small amount of optical fiber-
Aerospace AS-3 Standard, and IPC- only complicates this discussion. grade cleaner in a cost-effective way
8497-1. Additionally, virtually all significantly decreases cleaning from
major Regional Bell Operating What’s Behind the Current five times to one time.
Companies, cable TV multiple Confusion? While inspection is critical and
system operators, and professional Cleaning an optical fiber surface highly desirable, the implication is
trainers utilize these standards as a is like cleaning anything else. that any end face can be cleaned
foundation for training. Imagine that a drink is spilled: with almost any tool if and when
While there are variations, the would a wet or dry wiper be used inspection is not practical. A simple
general instruction per IEC 61300- to absorb the fluid? The same process change cleans better.
3-35 limits cleaning to five times application-specific logic applies Over the last 20 years, optical
and may instruct the technician to dry cleaning an optical fiber fiber cleaning has been promoted as
to clean three times using a dry connector. Dry cleaning an optical an application-specific procedure.
method followed by two wet-to-dry fiber surface should be the preferred New inspection devices have been
applications. method if the contamination is a developed to demonstrate what
It is suggested that there should fluid since dry cleaning is a mopping should be obvious: a connector
actually be four processes: the two action. Conversely, when presented and debris are 3D. In the same time
mentioned, an additional one noted with dry debris, it is unlikely that it frame, new automatic detection

*See YouTube https://www.youtube.com/watch?v=OGIfFQXZmz4 or Vimeo https://vimeo.com/204423271 for details of the Telcordia process.

July/August 2017 I 57
instruments have begun to flood
the market. Some of these provide
images and others simply a
“green/red light.” Figure 4 shows
a device designed to encourage
those without access to video
inspection to understand the nature
of the connector, contamination
and impact of existing cleaning
procedures. The limited surface area
as typically seen thorough 200-400x
instruments does not provide an
accurate foundation to understand
the 3D nature of a connector or the
3D nature of contamination.

Conclusion FIGURE 4: New automatic detection instruments are designed to encourage those
Since the inception of IEC without access to video inspection to understand the nature of the connector,
61300-3-35, many thousands of contamination and impact of existing cleaning procedures.
technicians in all parts of the world
have been undertrained. This
important standard was conceived transmissions regularly advance AUTHOR BIOGRAPHY: Edward J. Forrest,
for a production line and has from theoretical to practical. Jr., has nine patents, with more pending, in
morphed to use in field services The standardization process the area of precision cleaning and precision
inspection of optical fiber connections. He has
which are totally different physical itself can also be reconsidered. A
more than 40 years of expertise in precision
and practical environments. The 10-year time frame between updates cleaning and protecting various surfaces. His
production line is a controlled is not a realistic or desirable span work is non-commercial and designed to offer
physical plant with repeated actions for a rapidly evolving science such insights into various types of contamination
of inspection and cleaning; field as fiber optics. Instead, standards and how these interact and influence fiber
services are the exact opposite. The could be blog-based and updated optic transmissions. He feels that the precision
inspection and cleaning process begins
contamination on a production line in a rolling fashion. All involved
with network designers who can influence
is more easily anticipated; in field in the industry should have open installations and trainers to look to the future
service, many operators struggle to access to the procedure, instead of and understand that cleaning and inspection
clean an end face when the contam- a limited few. Global access via the are not optional but a critical first step to
ination might emanate from outside internet can channel input from network reliability and customer satisfaction.
field service personal and trainers He is available for special projects and training
the limits of existing inspection in
and can be reached at edforrest@live.com.
Zone 4 or one of the sectors of Zone in all disciplines so that standards
5. Technicians may click many meetings continue to exist, only in a
times only to realize the data is not more efficient and diverse format. n
passing. It is time to upgrade under-
standing of precision inspection
and precision cleaning as fiber optic

58 I ICT TODAY
FLEX YOUR INSTALLATION MUSCLES!

THE NEW BICSI ICT CABLING INSTALLATION PROGRAM HAS ARRIVED!


This is your chance to learn the latest techniques and trends to be the best cabling installer you can be!

Choose from beginner to advanced-level training, earn a BICSI credential


and give yourself a boost above your competition.

Get started today at bicsi.org/installation.


July/August 2017 I 59
WRAPPING TUBE
CABLE

ACTUAL SIZE

1.34"

0.870"

Typical 1728 Fiber 1728 Fiber


RILT Construction Wrapping Tube Cable (WTC) with SWR®

Doing more with less


AFL’s Wrapping Tube Cable (WTC) with SpiderWeb® Ribbon (SWR) is a true game changer. The unique construction
of the ribbon fiber makes it easier to work with compared to traditional ribbon fibers, saving installation and splicing
time. SWR is easily bunched together allowing more fibers to be used in a smaller space. With AFL’s WTC, you can
now run 1728-ribbon fiber cables in the same duct that would usually hold a traditional 864-ribbon fiber.

These are not exaggerations. Let us show you the difference our new WTC with SWR can make for you.

www.AFLglobal.com/ICT
864.433.0333

You might also like