Tag Archive for 2019

Why Shielded Cables?

Why Shielded Cables?With high bandwidth applications emerging in and out of the data center, the need for shielded cable has increased. Many of these new installations are in harsh environments.  Robotic equipment, motors, generators, air conditioners, fluorescent lights, printers, and they often generate a large amount of EMI (Electromagnetic Interference) and RFI (Radio Frequency Interference). You may need to install shielded cables in these harsh environments.

interference will cause increased errorsEMI and RFI can cause crosstalk between circuits and interfere with data transmission on a copper cable. The interference will cause increased errors resulting in mire network traffic due to packet retransmissions, and downtime.

Shielded cables reduce interfernece

EMI is an unwanted signal that is induced into the cable. EMI typically comes from a source that is external to the cable, such as an electrical cable or device. Cables can be both a source and receiver of EMI. As a source, the cable can either conduct noise to other equipment or act as an antenna radiating noise. As a receiver, the cable can pick up EMI radiated from other sources.

RFI is a disturbance that affects an electrical circuit due to either electromagnetic conduction or radiation emitted from an external source. Conducted RFI is unwanted high frequencies that ride on the AC waveform. Radiated RFI is emitted through the air.

Ethernet cables can be shielded to deal with EMI and RFI.  The shield surrounds the inner signal carrying conductors. Shielded Ethernet cables can deal with interference in two ways. It can reflect the energy, or it can pick up the interference and conduct it to ground. Both methods use shielding to cut the EMI and RFI reaching the twisted pairs located under the shielding. Whether the EMI/RFI is reflected off the shield or “rides” the shield to ground, some energy can still pass through the shielding, but since it is so highly attenuated it will not cause interference.

Types of shielded cables

Two basic types of shielded cables are available. The first are cables with an overall shield known generically as STP. STP cable may be made either with a foil or a braid for the shield. STP cables with an overall foil are often known as FTP. In practice, FTP and STP cables may be interchanged with no apparent difference in performance according to BlackBox

Cable types
The second type of shielded cable is S/STP. S/STP cables have a shield around each individual pair and an overall outer shield. BlackBox says the purpose of the inner shields is to cut the Alien Cross Talk parameter in CAT7 and CAT6a systems.On both STP and S/STP the primary task of the outer shield is to resist external RF noise such as electrical spikes.  S/STP cables may also have an extra braid for strength and to simplify connection to the metal shields around the connectors.
Cable constructionTo reduce EMI/RFI interference, shielded Ethernet cables must use shielded connectors to maintain the benefits of STP cabling. High-quality shielded cable includes a drain wire to provide grounding that cancels the effects of EMI and can ease termination of the cable shield for crimping or soldering.

Redi WattProper Ground connections

The shielded cable system must have proper ground connections for the shields. Incorrect grounding opens the possibility for ground loop currents and associated interference to the Ethernet signal. In the worst cases with no proper grounding, the shields can actually act as antenna broadcasting high-frequency signals out into the environment interfering with electronic equipment and allowing external detection of the Ethernet data.

Standards bodies have requirements for shielded Ethernet systems. The American National Standards Institute (ANSI) specifics how shielded communications cables are properly grounded. Normal practice says the cable shields should be grounded in the telecommunications closet (TC). Typically, the cable shield is grounded through the connector to the patch panel. Then the panel is grounded to the rack, which is grounded to the telecommunications grounding busbar in the TC. Do not ground the cable shield at the work-area outlet. Fortunately, many of today’s shielded outlets automatically connect to the patch panel’s ground so there’s no need to set up ground paths for each cable.

ISO/IEC requires that shielding must be complete for an entire channel, shielded and shielded cables, connectors or network controllers should not be mixed.

Cable Types

Category cable types comparison.
Max Data RateMax TX RateMax LengthSheildingYear IntroducedStatus
Cat 310Mbps16MHz100mNo1983Obsolete
Cat 5 1,000Mbps100MHz100mOptional1995Obsolete
Cat 5e1,000Mbps250MHz100mOptional2001Obsolete
Cat 6 10,000Mbps500MHz100mOptional2002
Cat 6a10,000Mbps500MHz100mOptional2008
Cat 7 10,000Mbps600MHz100mRequired2002Not recognized by TIA
Cat 7a10,000Mbps1GHz100mRequired2010Not recognized by TIA
Cat 8.140,000Mbps2GHz30mRequired2016Backward compatible with Cat 6A
Cat 8.240,000Mbps2GHz30mRequired2016Not recognized by TIA

rb-

interference is not a new problem. It dates back to the earliest communication systems. In 1881 Alexander Graham described the interaction between many twisted pairs in US Patent 244,426.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Marriott Data Breach One Of Biggest Ever

Updated July 17, 2019 – The Brits slapped Marriott with a £99m ($124m) fine for “infringements of the GDPR.” The Information Commissioner’s Office said that Marriott failed to undertake sufficient due diligence when it bought Starwood, and should also have done more to secure its systems prior to the data breach.

___

Marriott Data Breach One Of Biggest EverThe internet is a dangerous place for data. Hotel chain Marriott (MAR) proved that once again. Marriott revealed that hackers stole personal information from 500 million Starwood Preferred Guest program participants. The data stolen in the data breach included sensitive personally identifiable information (PII).

Marriott

Marriott said it got an alert on September 8, 2018, about an attempt to access the Starwood database and enlisted security experts to assess the situation. During the investigation, Marriott claims to have discovered that the unauthorized access to the Starwood network started in 2014.

Investigators found that an unauthorized party had copied and encrypted information from the database and had taken steps toward removing it. The company was able to decrypt the information on November 19, 2018, and found that the contents were from the Starwood guest reservation database. The hotel chain then waited until November 30, 2018, to tell its customers of the data theft.

What was lost on the data breach

personally identifiable informationFor about 327 million Marriott customers, the compromised information includes some combination of name, address, phone number, email address, passport number, Starwood Preferred Guest (‘SPG’) account information, date of birth, gender, arrival and departure information, reservation date, and communication preferences. Marriott added that the data breach included payment card information. About 170 million impacted Marriott customers only had their names and basic information like address or email address stolen.

Marriott says that about 20.3 million encrypted passport numbers and approximately 8.6 million encrypted payment cards were compromised in the breach.

Chinese hackers Several sources report that state-sponsored Chinese hackers working for the intelligence services and the military were behind the attack. The stolen data would be an espionage bonanza for government hackers. Sources point out that the Starwood attacks began in 2014, shortly after the attack on the U.S. government’s Office of Personnel Management (OPM) compromised sensitive data on tens of millions of employees, including application forms for security clearances.

Sadly, the 500 million records Marriott hack only ranks as the third-largest known data breach to date. This list of fails illustrates, no matter what you’re doing online every time you put your information on the internet, you risk it being stolen.

RankCompanyAccounts HackedDate of Hack
1Yahoo3 BillionAugust 2013
2River City Media1.3 BillionMay 2017
3Aadhaar1.1 BillionJanuary 2018
4Marriott500 Million2014 - 2018
5Yahoo500 MillionLate 2014
6Adult Friend Finder412 MiltonOctober 2016
7MySpace360 MillionMay 2016
8Exactis340 MillionJune 2018
9Twitter330 MillionMay 2018
10Experian200 MillionMarch 2012
11Deep Root Analytics198 MillionJune 2017
12Adobe152 MillionOctober 2013
13Under Armor150 MillionFebruary 2018
14Equifax145.5 MillionJuly 2017
15Ebay145 MillionMay 2014
16Heartland Payment Systems134 MillionMay 2008`
17Alteryx123 MillionDecember 2017
18Nametests120 MillionJune 2018
19LinkedIn117 MillionJune 2012
20Target110 MillionNovember 2013
21Quora100 millionNovember 2018
22VK100 MillionDecember 2018
23Firebase100 MillionJune 2018

rb-

There is something else fishy here. Reports claim that the data was encrypted using AES-128 but not all the stolen data. Attackers were able to steal nearly 20 million passport numbers, and 8.6 million encrypted payment cards.

Marriott says that the attackers were able to gain access to 5.25 million unencrypted passport numbers and 2,000 unencrypted payment card numbers.

I’m sure that regulators (GDPR) and lawyers will ask why unencrypted sensitive info like passports and credit card numbers lying around waiting to be stolen?

 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Happy New Year 2019

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here. 

IPv4 Update

IPv4 UpdateThe IPocalypse struck the United States in 2015 and three years later – nobody cares. The end of IPv4 was going to mean the Internet Protocol version 6 (IPv6) takes over the world. Well, recent updates say IPv4 is still the dominant protocol on the Internet.

IPv4 number trading between private partiesIPv4 number trading between private parties has proved to be an effective means of extending the life of IPv4 by redistributing previously allocated IPv4 numbers. Trading between private parties is very active in North America, Europe, and the Asia-Pacific regions. This has allowed IPv4 network operators to support and extend their IP networks with excess unused supply through the IPv4 market.

Janine Goodman, Vice President and co-founder of Avenue4 LLC., a Washington DC-based IPv4 broker and advisory firm posted a 2018 Q3 update on the IPv4 market for CircleID. In the update, the author noted that during Q3 of 2018 there is still a voracious appetite for IPv4 numbers – 18 million IPv4 numbers were transferred in the quarter. There were nearly 42 million IPv4 addresses changing hands in the 2018 year to date, a 160% jump compared to 2017

will not hit the 50% mark until sometime in 2020The article states that IPv6 adoption in the U.S. (based on Google user stats) fell after the beginning of the year and has yet to recover. Ms.Goodman cites predictive models which suggest that U.S. IPv6 adoption will not hit the 50% mark until sometime in 2020. Globally, IPv6 adoption has been slow, peaking at 21.5% during weekdays and 25% during weekends. The data from Avenue4 confirms that IPv4 continues to be the dominant Internet protocol.

For those firms purchasing IPv4 addresses, the most common IP block size is the /24 (256 addresses), followed by the /16 block (65,536 numbers). Nearly 90% of those /16 blocks were transferred to large block buyers. The /17 (32,768 addresses) and /18 (16,384 addresses) are also popular as large block buyers are increasingly willing to accept a collection of smaller non-contiguous ranges from sellers.

prices are being driven up by fierce competitionBlock prices will rise over the next 6-12 months. The article reports that most block sizes are north of $17.00 / number with larger blocks reaching and occasionally exceeding $20.00 / number. Avenue4 says fierce competition among large block buyers is driving unit prices up. Until this demand is met, pricing should continue to escalate. IPv4 prices were $11.25 / address when I first wrote about Microsoft’s purchase of Nortel’s IPv4 addresses in 2011.

rb-

The switch to IPv6 is being slowed by two factors. The first is network address translation (NAT) which has become better understood and implemented. The other is the evolution of the buying and selling of IPv4 addresses, led by firms like Avenue4 and IPv4 Brokers.

One of the knocks against moving to IPv6 is CAPEX and OPEX costs. But neither really holds water anymore. The data from Avenue4 says that firms are willing to pay over $1.3 million for a \16 block. Firms could leverage $1.3 million to update to IPv6.  IPv6 is fully built into modern operating systems and networking hardware. Buy the right devices during your regular update cycles.

Microsoft (MSFT) recently decided to embark on the tricky transition from IPv6 and IPv4 or ‘dual stack’ to IPv6-only, which Microsoft believes will solve its problems with IPv4 shortages and enable simpler network management.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.