Interceptor Optical Network Security System. Design Guide. Chapter 3: Choosing between Encryption or a Protected Distribution System (PDS)
|
|
- Baldric Jessie Wells
- 8 years ago
- Views:
Transcription
1 Interceptor Optical Network Security System } Chapter 3: Choosing between Encryption or a Protected Distribution System (PDS)
2 Copyright 2010 Network Integrity Systems, Inc. All rights reserved. The information in this document is subject to change without notice. The statements, configurations, technical data, and recommendations in this document are believed to be accurate and reliable, but are presented without express or implied warranty. Users must take full responsibility for their applications of any products specified in this document. The information in this document is proprietary to Network Integrity Systems, Inc. The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of that license. The software license agreement is included in this document. Trademarks Network Integrity Systems, Inc., the Network Integrity Systems, Inc. logo, and Interceptor are trademarks of Network Integrity Systems, Inc. Other brands and product names are trademarks or registered trademarks of their respective holders. Statement of Conditions In the interest of improving internal design, operational function, and/or reliability, Network Integrity Systems, Inc. reserves the right to make changes to the products described in this document without notice. Network Integrity Systems, Inc. does not assume any liability that may occur due to the use or application of the product(s) or circuit layout(s) described herein.
3 This section of the is primarily intended for readers who are still uncertain about whether they should use encryption or a PDS, which are both approved options for protecting National Security information, or are trying to decide which type of a PDS to install. This section details some important criteria and factors that should be considered as part of the Information Assurance decision-making process. Thus, if the decision has already been made to utilize INTERCEPTOR as the PDS solution at your facility or on your network, skip to Chapter 4 of this Guide, which provides crucial details concerning the implementation of an INTERCEPTOR system. Key Decision: Whether encryption or a PDS provides the ideal solution for your particular network and application. Classified national security information must be protected. The primary protection methods include either: 1. NSA-approved, Type-I, in-line network encryptors, or 2. PDS systems. With the increased deployment of SIPRNet and JWICS, there are often significant economic, technical, and operational considerations that make a PDS a better solution than encryption for secure network deployments inside of a facility or across a campus or installation. Economic Considerations Associated With Encryption First, encryption requires an in-line encryptor to be installed on each end of the network. These encryptors individually cost about $9,000*. Therefore, the total cost of a single protected circuit is between $9,000 and $18,000*. Second, Type-I encryptors are COMSEC controlled items that must be secured in either CAAs or GSA-approved information processing system (IPS) security containers, such as a safe or a vault. Usually, one encryptor is contained in the red/black equipment room (an area where encrypted information arrives at a facility to be distributed unencrypted throughout the local network, which is usually a CAA), but the other encryptor is typically at a workstation, office, or conference room which is not a CAA; therefore, an IPS vault becomes necessary. The average cost for an IPS safe is between $4,000 and $18,000*. When deploying SIPRNet to multiple offices or locations in a facility, the encryptor and IPS costs accumulate quickly. *Published prices as of January Network Integrity Systems, Inc. All Rights Reserved Issue DG
4 Technical Considerations Associated With Encryption A Type-I encryptor protects data on a single two-fiber connection or circuit, whereas a PDS system protects all of the fibers, and in the case of Dense Wavelength Division Multiplex (DWDM) systems, all of the wavelengths, in the cable or cables within the PDS. Further, traditional Type-I encryptors also limit bandwidth to 100Mbps. Newer encryptors provide up to 1Gbps, but cost in excess of $25,000* each. With network speeds increasing to gigabit ethernet and beyond, 100Mbps encryptors create a sizeable bandwidth bottleneck. If the encryptors are configured in a point-to-multi-point configuration, then multiple encryptors share the 100Mbps, thus making the bottleneck increasingly restrictive. Finally, it is expected that DWDM (dense wavelength division multiplexing) technology will migrate into more data center/lan applications over the next few years to enhance the bandwidth of fiber optic networks. Whereas a Type-I encryptor will be required for each wavelength on each fiber being used for secure traffic, a single Interceptor port protects the entire cable, every fiber in it, and every wavelength on each fiber. Figure 1: Example of bandwidth degradation with multiple uplinks to users Mission-critical networks differ greatly from commercial networks in that when there is a crisis or combat operation, everyone is using the network. In these situations, when the network is needed the most, bandwidth bottlenecks will hurt the most. *Published prices as of January Network Integrity Systems, Inc. All Rights Reserved Issue DG
5 Operational Considerations Associated With Encryption In order to procure COMSEC items, government agencies must have the necessary authorizations on their COMSEC accounts. They also must closely monitor, track, and protect COMSEC items. Additionally, Type-I encryption is based on a public key infrastructure (PKI), which requires extensive user management and configuration. PKI management is a significant COMSEC and administrative function that many units simply cannot absorb or tolerate. Finally, as a COMSEC item, many encryptors have a six-or-more-month lead time once COMSEC authorizations are approved and MIPRs are processed. Many agencies or DOD units cannot wait that long. Key Decision: If these considerations do not present issues for you or do not create any concerns for the performance or scalability of your secure network, then encryption could be a workable solution for your network and application. However, if some of the considerations do indeed create concerns, then deploying a PDS system in place of encryption is likely the more prudent decision. For questions or additional guidance, please contact the CTTA that provides oversight to your organization. Protective Distribution Systems PDS systems are used to transmit unencrypted, classified national security information through areas of lesser classification or control. Since the classified information is unencrypted, the PDS must provide adequate electrical, electromagnetic, and physical safeguards to deter exploitation. PDS systems are not designed to prevent occurrences of tampering or penetration; rather, their primary purpose is to facilitate detection as soon as possible after they occur. Any PDS system can be compromised or penetrated given the opportunity and an adequate amount of time. There are two categories of PDS of which we will discuss the first: 1. Hardened Distribution Systems 2. Simple Distribution Systems Hardened Distribution Systems provide significant physical protection and can be implemented in one of three forms: 1. Hardened Carrier System 2. Alarmed Carrier System 3. Continuously Viewed Carrier System Hardened Carrier Systems In a Hardened Carrier System, the data cables are installed in a carrier constructed of electrical metallic tubing (EMT), ferrous conduit or pipe, or ridged sheet steel ducting. All of the connections in a Hardened Carrier System are permanently sealed completely around all surfaces, for instance with welds or epoxy. If the hardened carrier is buried under ground, for instance to secure cables running between buildings, the carrier containing the cables should be encased in concrete. In a Hardened Carrier PDS, detection is accomplished via the human inspections that are required to be performed periodically. Therefore, a Hardened Carrier System must be installed such that it is capable of being visually inspected (for instance below the ceilings and above the floor) to insure that no intrusions into it have been made. These periodic visual inspections (PVIs) occur at a frequency dependant upon the level of threat to the environment, the security classification of the data and the access control to the area Network Integrity Systems, Inc. All Rights Reserved Issue DG
6 There are basically two forms of Hardened Carrier PDS: 1. Systems custom constructed of Rigid Metallic Conduit or EMT 2. Aesthetically Engineered Raceway Photo 1: EMT Traditional Hardened Carrier PDS: Rigid Metallic Conduit / EMT In accordance with NSTISSI 7003, a ferrous, rigid metallic conduit system with epoxied fittings is required for any hardened carrier PDS systems in order to protect against overt, covert, and surreptitious attacks. As such, the traditional hardened carrier PDS system that has been deployed for decades is electrical metallic tubing (EMT) conduit and fittings. When SIPRNet and JWICS requirements were isolated to only a few facilities on a base or agency, installing EMT was a fairly minor concern. However, now that SIPRNet is being deployed in an increasingly large number of facilities including those that are newly constructed installing EMT throughout is neither desirable nor practical. When EMT is installed along a hallway or in an office, it significantly detracts from the environment and the aesthetics of the particular facility. It also requires extensive labor and installation, since the EMT system must be custom installed into each room or hallway. Finally, once installed, the EMT system is not easily scalable to meet any new requirements that may come into existence in the future. Many government agencies are moving away from using EMT for PDS systems as part of the recent focus on green building criteria and LEED credits for facility construction Network Integrity Systems, Inc. All Rights Reserved Issue DG
7 Photo 2: Engineered raceway Traditional Hardened Carrier PDS: Aesthetically Engineered Raceway Due to growing concerns about the use of rigid metallic conduit or EMT for PDS systems, a few commercial companies engineered a new raceway system that was aesthetically neutral (i.e., painted and designed to blend into the hallway or office) and re-enterable to facilitate possible moves, additions, and changes. In light of security concerns over the re-enterability of these systems, however, there has been much debate over the long-term security of them. As a result, several CTTAs have mandated compensating measures such as epoxying some or even all of the seams along the engineered raceway system. Nonetheless, engineered raceway systems account for up to fifty percent of new hardened carrier PDS installations. Engineered raceway systems are more expensive than the traditional rigid metallic conduit, and they often require extensive design and installation assistance from the manufacturer; this often comes at an added cost. Epoxying the seams of the raceway significantly detracts from the raceway system s re-enterability, thus decreasing the usefulness of the system as a modular and scalable option. Always consult your DAA or CTTA before installing an engineered raceway system in order to fully understand the requirements and limitations of the product from a certification and accreditation perspective Network Integrity Systems, Inc. All Rights Reserved Issue DG
8 Traditional Hardened Carrier PDS: Concrete Encased Ductbank For outside plant deployments, a hardened PDS system is usually constructed between buildings by encasing a duct bank with rebar and concrete. Per NSTISSI 7003, it should be buried a minimum of 1 meter below the surface and on the property owned or leased by the US Government or the contractor having control of the PDS. Building 2 Duct bank must be buried a minimum of 1 meter below the surface. In many cases, encased in 8 of concrete. Building 1 Concrete Duct Cables Figure 2: Concrete encased ductbank 2010 Network Integrity Systems, Inc. All Rights Reserved Issue DG
9 Alarmed Carrier PDS In the second alternative for a Hardened Distribution System, Alarmed Carrier System, the inspections are automated using an electronic monitoring or alarm system, which insures that reliable inspections occur continuously 24/7/365. Referred to as an Alarmed Carrier PDS, the carrier system is alarmed with specialized optical fibers deployed within the conduit for the purpose of sensing acoustic vibrations, which usually occur when an intrusion is being attempted on the conduit in order to gain access the cables. Alarmed Carrier systems improve upon the performance of Hardened Carrier Systems as they not only make it difficult to gain access to the cables, but they detect attempts to do so as well. Alarmed Carrier PDS modify the requirements as follows: 1. Eliminates the need for the welding and epoxying of the connections. 2. Eliminates the requirement for Periodic Visual Inspections (PVIs). 3. Because PVIs aren t required, the carrier can be hidden above the ceiling or below the floor. 4. The requirement for concrete encasement outdoors is eliminated. When using an alarmed carrier PDS, NSTISSI 7003 requires: Alarm system must be approved by the congnizant COMSEC and/or physical security authorities A Standard Operation Procedure (SOP) must be implemented to: - Verify performance - Insure response by security personnel within 15 minutes - Define action to be taken re: termination of transmission - Initiate investigation of an actual intrusion attempt The INTERCEPTOR Optical Network Security System is classified as an Alarmed Carrier PDS. However, the Interceptor improves upon legacy Alarmed Carrier PDS technology. Instead of monitoring the carrier containing the cables being protected, Interceptor monitors the fibers within (or intrinsic to) the cables being protected to turn those cables into sensors, which detect attempts to intrude upon them. In addition to the aforementioned benefit of the elimination of the human visual inspections, Alarm Carrier systems that monitor cables intrinsically, provide the opportunity to quickly secure pre-existing cable infrastructure as making simple connections to the end-points of the cable deploys these systems. This provides the added benefit of being able to quickly redeploy the alarm systems to keep pace with network rearrangements. Depending on the government organization, intrinsic cable monitoring of an Interlocking armored cable further allows the elimination of the carrier systems altogether and permits the cables being protected to be installed in existing conveyance (wire basket, ladder rack) or suspended cabling (on D-rings, J-Hooks, etc.) which drastically reduces the cost and simplifies the installation of the cable system. More discussion on the Interceptor Optical Network Security System will occur in Chapter 4. Keep in mind that there are several factors that must be considered when evaluating network security mechanisms, such as classification of traffic, facility security and access control, and perimeter distance, and that it is necessary to evaluate each project or deployment on its own characteristics and merits. A PDS system is but one layer in the Defense-in-Depth approach of securing and protecting missioncritical networks. For specific guidance on your network or facility, please contact your CTTA Network Integrity Systems, Inc. All Rights Reserved Issue DG
10 Deciding between a Hardened Carrier PDS and an Alarmed Carrier PDS: Minimizing the Total Cost of Ownership of a PDS System The cost of purchasing and installing a PDS system is not trivial; thus, it is important to factor in long-term scalability. For instance, such considerations could include: 1. Future required increases in the level of classification that the network will carry, 2. The need to modify or expand the PDS system for new users, 3. The risk of having to move or relocate into another facility or work center. Once the potential dynamics and growth issues that a PDS will have to endure have been mapped out, the next step is to consider the complexity and cost of modifying the PDS system over time. Relevant considerations here include: 1. Whether the PDS system is flexible and easy to modify, 2. Whether it will allow additional networks to be installed or support higher classifications, 3. How long until it will reach its full capacity and needs to be replaced or augmented by another PDS system, among others. As previously mentioned, for outside plant deployments, a hardened carrier PDS system is normally constructed using a rebar plus concrete-encased duct bank that is installed physically between two facilities. For deployments inside of a facility, the hardened carrier PDS system is primarily comprised of rigid metallic conduit or an engineered raceway system that is custom designed for the facility that it is installed in, firmly attached to the walls, and often epoxied together for increased security purposes and to detect tampering. As a result, hardened carrier systems are not easily scalable options. In fact, often hardened carrier PDS systems inside of a facility require a second or third hardened carrier to be installed adjacent to the original system to support SIPRNet and JWICS growth. Even engineered raceway systems, designed to be reenterable, cause the owning organization to suffer through high cost and complexity when requirements increase or the PDS system needs to be expanded, especially if the seams were required to be epoxied. If an organization relocates to a new facility, it is impossible to also move a concrete-encased duct bank, and it is neither practical nor cost-effective to remove and reinstall a hardened carrier system like rigid metallic conduit or engineered raceway. This cost is even greater than that of installing a completely new PDS system in the new facility. Conversely, INTERCEPTOR alarmed carrier PDS systems are by nature easy to grow or scale. In an alarmed carrier PDS, the system is built around the alarm sensor rather than the conduit or raceway that is installed throughout the facility and bolted to the walls, or the concrete-encased duct bank running between facilities. As a result, expanding the alarmed carrier PDS system is usually completely transparent and seamless to the end users. If an organization must relocate, then it will be able to quickly and easily transport the PDS alarm system to, and utilize it in, the new facility. By doing so, an organization will be able to recoup between seventy-five and eighty percent of the cost of the PDS system, thereby minimizing the total cost of ownership and providing rapid deployment of SIPRNet or JWICS connectivity. For more information on the differences between hardened and alarmed carrier PDS systems, please reference Network Integrity Systems, Inc. All Rights Reserved Issue DG
11 The Economic Considerations of a PDS System For most engineers and end users deploying SIPRNet/JWICS networks, the objective is to reach a cost-effective yet secure solution that meets certification and accreditation requirements while at the same time minimizing total cost of ownership. This section of the provides a thorough review of the deployment costs of INTERCEPTOR and a comparison of alternative deployments using in-line network encryptors, rigid metallic conduit, or aesthetically engineered raceway. For any network deployment, it is important to focus on the total installed cost as opposed to just the material cost or a portion of the cost of deployment. After all, an INTERCEPTOR does not operate by sitting in the box inside your red/ black equipment room. The same is true for the traditional PDS deployment of rigid metallic conduit. The conduit or EMT would do nothing if it were piled up outside the building or along a hallway. Both solutions must be designed and installed before they offer any protection. Thus, it is absolutely critical to factor in these additional design and installation costs when comparing the multiple available options. For a typical commercial network deployment, the total installed cost of the network is divided into three major cost categories: active equipment, cabling/connectivity, and installation/labor. The chart below shows the distribution of the total installed cost between these three categories. Chart 1: Commercial network deployment As you can see, the labor/installation component is by far the most expensive component of any network deployment. More importantly, however, is the fact that labor and installation costs would again be incurred if the network had to be re-deployed or over-built any time in the future. Also, the choices made concerning the active equipment and cable/ connectivity components have a direct impact on increasing or minimizing the labor/installation component. If a PDS solution is chosen that requires extensive design assistance, such as an aesthetically engineered raceway, or is custom installed into each room or hallway, such as a rigid metallic conduit, then the cost for labor and installation could increase substantially. In fact, the following charts show the new cost distribution for network deployments involving hardened carrier PDS systems Network Integrity Systems, Inc. All Rights Reserved Issue DG
12 Chart 2: Total Installed Cost Hardened PDS Deployment, Engineered Raceway Chart 3: Total Installed Cost Hardened PDS Deployment, Rigid Metallic Conduit Chart 4: Comparison of Total Costs of Hardened PDS Deployment As you can see, the design and deployment of a hardened carrier PDS system can easily add between twenty and thirty percent to the total installed cost for SIPRNet and JWICS deployments. In fact, this number can quickly jump to between forty and fifty percent when using aesthetically engineered raceway systems that require factory engineers or certified contractors to do the installation of the PDS and network cabling. Doing so usually results in a dramatic increase in the labor and installation costs of the network deployment Network Integrity Systems, Inc. All Rights Reserved Issue DG
13 Another important consideration for secure network deployments is the amount of time it will take the contractor to install the PDS and deploy the network cabling. Additionally, while not a direct cost component of the deployment, it is absolutely critical to factor in the logistics and storage area for materials, facility access, personnel security concerns, worksite disruption, and escort requirements. Each of these considerations indirectly contributes to the cost of deployment for hardened carrier systems. Finally, the scalability of the hardened carrier PDS system is important to consider, as well. With the explosion of SIPRNet and JWICS requirements, it is prudent to expect secure network access requirements to grow considerably over the next three to five years. Thus, any PDS system installed must account for future growth and scalability. For rigid metallic conduit systems and engineered raceway solutions where CTTAs still require seams to be epoxied this is usually accomplished by installing a second PDS raceway below the first one. From a net present value perspective, this requires the owning organization to double its PDS investment. For engineered raceway solutions that are not required to be fully epoxied, there is a significant savings, but there is still a significant investment in labor and installtion to deploy new cables in the PDS raceway. INTERCEPTOR Deployment Costs In contrast to hardened carrier PDS systems, INTERCEPTOR deployment costs are not measured by the linear footage of PDS raceway to be installed or simply by counting the number of SIPRNet/JWICS drops. When evaluating the deployment costs of the INTERCEPTOR system, it is important to first assess the number of buildings or users that need to be protected and the most cost-effective design methodology to be employed. INTERCEPTOR protection can be applied by dedicating an entire port to each individual cable, such as building-to-building connections or building riser networks, among others, or by using a single port to protect multiple cables, such as horizontal cabling or workstation drops. As demonstrated by the charts below, INTERCEPTOR equipment costs are easily calculated. Chart 5: INTERCEPTOR Equipment Costs: Point-to-Point Protection 2010 Network Integrity Systems, Inc. All Rights Reserved Issue DG
14 Chart 6: INTERCEPTOR Equipment Costs: Point-to-Multipoint Protection A critical advantage to protecting secure networks with INTERCEPTOR is that as long as INTERCEPTOR is monitoring and protecting as few as two fibers in the cable, ALL of the fibers in that cable (up to 144) will be protected and able to carry unencrypted national security information. Another consideration involved with deploying an INTERCEPTOR system is choosing the conveyance that will be used to distribute the cabling and provide some physical armoring or hardening of the network cables. For years, the traditional approach was to use EMT or rigid metallic conduit inside of buildings and concrete-encased duct banks in between buildings in order to protect SIPRNet and JWICS networks. Even for early deployments of alarmed carrier PDS systems, EMT and rigid metallic conduit were still used; they were just installed above the ceiling or below the floor since periodic visual inspections were not required due to the alarm system. In March of 2009, the DOD evaluated and approved the use of commercial off-the-shelf interlocking armored fiber optic cable to replace EMT or rigid metallic conduit provided that the cable is protected by INTERCEPTOR. This dramatically reduced the cost of deploying new secure networks as part of a building construction or modernization activity or when deploying an overlay SECRET or TS network. Rather than paying an average price of seven to ten dollars per foot for EMT or rigid metallic conduit, users can now pay an additional one to two dollars per foot to have a fiber optic cable armored. In additional to this dramatic material cost savings, the reduction in installation complexity provides even greater savings. All things considered, armored cable has the ability to save between sixty and eighty percent of the typical deployment costs associated with hardened carrier PDS systems. As demonstrated by the chart below, even if multiple fiber optic cables must be installed, the cost savings over the traditional EMT or rigid conduit hardened carrier PDS system is significant Network Integrity Systems, Inc. All Rights Reserved Issue DG
15 Chart 7: Cost savings of Armored Fiber Optic Cabling vs. EMT Conclusion Understanding deployment economics especially when considering recent approvals is absolutely essential in the context of the decision to deploy an INTERCEPTOR system. The distribution and relationship between material cost and deployment complexity (e.g., armored cable versus EMT) is also a key consideration that can significantly reduce deployment cost and total cost of ownership Network Integrity Systems, Inc. All Rights Reserved Issue DG
Interceptor Optical Network Security System. Design Guide. Chapter 4: INTERCEPTOR Optical Network Security System Alarmed Carrier PDS
Interceptor Optical Network Security System } Chapter 4: INTERCEPTOR Optical Network Security System Alarmed Carrier PDS Copyright 2010 Network Integrity Systems, Inc. All rights reserved. The information
More informationWhite Paper. Holocom PDS and Electrical Metallic Tubing (EMT) Cost Comparison of Initial and Retrofit SIPRNet Installations
White Paper Holocom PDS and Electrical Metallic Tubing (EMT) Cost Comparison of Initial and Retrofit SIPRNet Installations Holocom PDS and EMT Cost Comparison of Initial and Retrofit Installations OVERVIEW
More informationSECURITY FOR TODAY S PHYSICAL NETWORK AND DATA TRAFFIC
SECURITY FOR TODAY S PHYSICAL NETWORK AND DATA TRAFFIC End-to-end Infrastructure Protection for Institutions In the last few years, the demand for classified information experienced by many government
More informationPROTECTED DISTRIBUTION SYSTEMS (PDS)
CNSSI No.7003 September 2015 PROTECTED DISTRIBUTION SYSTEMS (PDS) THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION CNSS Secretariat (IE414) National
More informationHow To Create An Intelligent Infrastructure Solution
SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure
More informationB E C A U S E Y O U R B U S I N E S S R U N S T H R O U G H U S A BERK-TEK WHITE PAPER. Cabling for. Secure Government Networks. www.berktek.
B E C A U S E Y O U R B U S I N E S S R U N S T H R O U G H U S A BERK-TEK WHITE PAPER Cabling for Secure Government Networks www.berktek.com Cabling for Secure Government Networks Government networks,
More informationSafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and
SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and Management SafeNet Network Encryption and Isolation Solution
More informationIntroducing TransitVUE Perimeter IDS, the most advanced perimeter intrusion detection system available today! Protecting Perimeters Around the World
Introducing TransitVUE Perimeter IDS, the most advanced perimeter intrusion detection system available today! Introduction The rising demand for advanced perimeter security detection systems against intrusion
More informationINTRUSION ALARM SYSTEM
INTRUSION ALARM SYSTEM Case studies reveal most burglars are deterred by the mere presence of an alarm system. Burglars attack unprotected premises considerably more often than ones protected by alarm
More informationTransporting Legacy Switched Digital Circuits Using a Packet Network
Transporting Legacy Switched Digital Circuits Using a Packet Network Engage Communication is the manufacturer of high-speed data communications products, specifically targeting the growing market for converting
More informationSummitStack in the Data Center
SummitStack in the Data Center Abstract: This white paper describes the challenges in the virtualized server environment and the solution that Extreme Networks offers a highly virtualized, centrally manageable
More informationSummitStack in the Data Center
SummitStack in the Data Center Abstract: This white paper describes the challenges in the virtualized server environment and the solution Extreme Networks offers a highly virtualized, centrally manageable
More informationThe Optical Fiber Ribbon Solution for the 10G to 40/100G Migration
The Optical Fiber Ribbon Solution for the 10G to 40/100G Migration Bill Charuk, SR Product Manager, Data Center Solutions Introduction With the advent of data centers in communication infrastructure, various
More informationAddressing Scaling Challenges in the Data Center
Addressing Scaling Challenges in the Data Center DELL PowerConnect J-Series Virtual Chassis Solution A Dell Technical White Paper Dell Juniper THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY
More informationVideo Architectures Eyes on the Future: The Benefits of Wireless Technology for Fixed Video Surveillance
S O L U T I O N PA P E R Video Architectures Eyes on the Future: The Benefits of Wireless Technology for Fixed Video Surveillance Table of Contents Fixed Video Surveillance: The Big Three... 3 Wireless
More informationThe Evolution of Ethernet
June 2010 White Paper The Evolution of Ethernet How Ethernet solutions, such as NTT America s VLink, can help businesses reduce private networking costs while leveraging Ethernet technology. Introduction
More informationDepartment of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing
Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD
More informationSafety in Numbers. Using Multiple WAN Links to Secure Your Network. Roger J. Ruby Sr. Product Manager August 2002. Intelligent WAN Access Solutions
Copyright 2002 Quick Eagle Networks Inc. All rights reserved. The White Paper Series Safety in Numbers Using Multiple WAN Links to Secure Your Network Roger J. Ruby Sr. Product Manager August 2002 Executive
More informationRedundant Gigabit Backbone Adds Speed and Reliability to Industrial Networks
Adds Speed and Reliability to Industrial Networks by Harry Hsiao, MOXA Product Manager harry.hsiao@moxa.com Introduction Gigabit network applications are becoming more and more popular in the modern networking
More informationPhysical & Network Security Infrastructure Solutions
Physical & Network Security Infrastructure Solutions people. passion. expertise. gocsc.com What is the Secure(it) Program? Secure(it) is a bundle of the industry s latest solutions, designed to protect
More informationOPEN ITEMS LIST - CONSTRUCTION Project Name: East Central Middle School - Jackson County CLA#: 11003
OPEN ITEMS LIST - CONSTRUCTION Project Name: East Central Middle School - Jackson County CLA#: 11003 No. Discipline Sent to Name Item Date Noted Date Resolved How item was resolved Electrical Contractor
More informationComparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
More informationThings You Must Know About Gigabit Ethernet 1. Understanding Gigabit Ethernet
Things You Must Know About Gigabit Ethernet 1. Understanding Gigabit Ethernet Today s network managers know that modern demands on a network by its users can shrink bandwidth dramatically. Faster computers,
More informationHow To Get The Most Out Of A Pon From Commscope
Passive Optical Network (PON): Solutions for Federal Government Deployments Operational Efficiency Solutions Passive Optical Network (PON) solutions for federal government networks Discover opportunities
More informationHow Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper
How Proactive Business Continuity Can Protect and Grow Your Business For most companies, business continuity planning is instantly equated with disaster recovery the reactive ability of a business to continue
More informationManagement and Wireless in the Data Center
SOLUTIONS BRIEF Management and Wireless in the Data Center High Performance Wireless Networks Management and Wireless in the Data Center Worldwide demand for new and more powerful IT-based applications,
More informationObsolete Fiber Technology? Not in my Data Center!
Obsolete Fiber Technology? Not in my Data Center! White Paper October 2011 Author: James Young Technical Director, Asia Pacific www.commscope.com Do you remember when people used to say fiber optics are
More informationArchitectural and Engineering Specification for a Perimeter Intrusion Detection System. FiberPatrol-ZR
Architectural and Engineering Specification for a Perimeter Intrusion Detection System FiberPatrol-ZR Sept 3, 2014 Page 1 of 13 FLR1DA0315-001 Rev A This document is intended to provide performance specifications
More informationSECTION 17400 ACCESS CONTROL SYSTEM. CONDITIONS OF THE CONTRACT AND DIVISION 1, as applicable, apply to this Section.
SECTION 17400 ACCESS CONTROL SYSTEM CONDITIONS OF THE CONTRACT AND DIVISION 1, as applicable, apply to this Section. PART 1 - GENERAL 1.1 RELATED WORK A. 16060 Grounding and Bonding B. 16070 Electrical
More informationHealthcare: Network and infrastructure solutions for an evolving industry. Healthcare Solutions
Healthcare: Network and infrastructure solutions for an evolving industry Healthcare Solutions The business of healthcare is evolving faster than ever. Are your network and data center infrastructure up
More informationWireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products
More informationArchitectural and Engineering Specification for a Perimeter Intrusion Detection and Pipeline Third-Party Interference (TPI) Detection System
Architectural and Engineering Specification for a Perimeter Intrusion Detection and Pipeline Third-Party Interference (TPI) Detection System FiberPatrol-PR SECTIONS 1. SPECIFICATIONS FOR A PERIMETER INTRUSION
More informationWireless Remote Video Monitoring
February 2010 Page 1 An Emerson Smart Solution brings visual information into your control room. Increase Plant Safety Comply with Regulations Scalable Reduced Cost Secure and Reliable Communications Full
More informationService Provider Business Case Study: Operating Expenditures
Service Provider Business Case Study: Operating Expenditures Executive Summary Introduction The Metro Ethernet Forum worked with 36 service providers to identify actual OpEx savings for Metro Ethernet
More informationATTACHMENT F 050R6800016 - CABLE AND WIRING SERVICES FUNCTIONAL AREA I PRICE PROPOSAL FORM Amendment 6
050R6800016 CABLE AND WIRING SERVICES (Column A) (Column B) (Column C) (Column D) (Column E) (Column F) (Column G) (B+C+D+E)*F= G Item Description PER 100' RUN PER 150' RUN PER 200' RUN PER 300' RUN QUANTITY
More informationSpectralink IP-DECT Server 400 Base Units
Spectralink IP-DECT Server 400 Base Units Planning and Installation Guide When Ordering Handsets and Base Units Note: 8x8 recommends you plan your installation before ordering handsets and base units.
More informationConference Phone Buyer s Guide
Conference Phone Buyer s Guide Conference Phones are essential in most organizations. Almost every business, large or small, uses their conference phone regularly. Such regular use means choosing one is
More information2301.1 Scope: Communications and Electronic Systems addressed in this section include:
Chapter 23 COMMUNICATIONS / ELECTRONIC SYSTEMS SECTION 2301 - GENERAL 2301.1 Scope: Communications and Electronic Systems addressed in this section include: 1. Fire Alarm System 2. Telecommunication and
More informationWireless e-business by IBM Wireless Local Area Networks
IBM Global Services October 2001 Wireless e-business by IBM Wireless Local Area Networks Jyrki Korkki Global Offerings Development Executive, Global Services Page No. 2 Contents 2 Unwiring the business
More informationTransformation of the Enterprise Network Using Passive Optical LAN
WHITE PAPER Transformation of the Enterprise Network Using Passive Optical LAN Passive Optical LAN Study Completed by Network Strategy Partners, LLC Contents Executive Summary... 3 Introduction... 4 Modeling
More informationPresenters Brett Weiss, Gabe Martinez, Brian Kroeger.
1 Presenters Brett Weiss, Gabe Martinez, Brian Kroeger. Topics to be covered: Cable identification Purpose of the various cable types Installation techniques Building Infrastructure Overview of networking
More informationThe cost and performance benefits of 80 GHz links compared to short-haul 18-38 GHz licensed frequency band products
The cost and performance benefits of 80 GHz links compared to short-haul 18-38 GHz licensed frequency band products Page 1 of 9 Introduction As service providers and private network operators seek cost
More information(U) RED/BLACK Installation Guidance
CNSSAM TEMPEST/1-13 17 January 2014 (U) RED/BLACK Installation Guidance This document prescribes guidance to be used by a CTTA to determine the required standards for their department or agency. (U) FOREWORD
More informationCONTENTS. Yale University Design Standards. Underground Electrical Duct Bank. A. Summary. B. System Design and Performance Requirements
16600 Underground Electrical Duct Bank This document provides design standards only, and is not intended for use, in whole or in part, as a specification. Do not copy this information verbatim in specifications
More informationCommScope Intelligent Building Infrastructure Solutions (IBIS)
SYSTIMAX Solutions CommScope Intelligent Building Infrastructure Solutions (IBIS) Questions & Answers Q. What is an Intelligent Building? A. An intelligent building can be defined as one which provides
More informationKnowing When to Deploy PON for Federal Applications
White Paper Knowing When to Deploy PON for Federal Applications August 2013 Contents Doubling down on IT investments 3 Growth of passive optical networks 3 Making the grade in secure applications 4 A practical
More informationData Security Concerns for the Electric Grid
Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical
More informationCommercial Cable Installation Philadelphia PA
Commercial Cable Installation Philadelphia PA About Us Squid Wire is a low voltage cabling company which is dedicated to providing solid, reliable technology advice and solutions to support our clients
More informationServer Consolidation and Remote Disaster Recovery: The Path to Lower TCO and Higher Reliability
Server Consolidation and Remote Disaster Recovery: The Path to Lower TCO and Higher Reliability Executive Summary: To minimize TCO for server / data center consolidation and optimize disaster recovery
More informationFIBER COM CONNECT FIBERCOMCONNECT COMPANY PROFILE
FIBER COM CONNECT FIBERCOMCONNECT COMPANY PROFILE The property owner can now enjoy the benefit of having a world class telecommunications infrastructure INTRODUCTION TO OUR EXPERTISE Fiber Com Connect
More informationAuspex Support for Cisco Fast EtherChannel TM
Auspex Support for Cisco Fast EtherChannel TM Technical Report 21 Version 1.0 March 1998 Document 300-TC049, V1.0, 980310 Auspex Systems, Inc. 2300 Central Expressway Santa Clara, California 95050-2516
More informationLocal-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
More informationConducting Security System Site Surveys
Conducting Security System Site Surveys Written By: Harold C. Gillens, PSP, CFC, CHS-III Quintech Security Consultants, Inc. 102 Sangaree Park Court Suite 4 Summerville, SC 29483 CONDUCTING SECURITY SYSTEM
More informationClean VPN Approach to Secure Remote Access for the SMB
Clean VPN Approach to Secure Remote Access for the SMB A clean VPN approach delivers layered defense-in-depth protection for the core elements of business communications. CONTENTS Extending Business Beyond
More informationGovernment Transport Networks: Minimize Lifetime Costs
What You Will Learn Public sector organizations are preparing to upgrade their transport networks to accommodate a surge in traffic from business video and network-based backups. This white paper, intended
More informationVirtual Stacking. White Paper
White Paper Virtual Stacking November 2012 This document describes the benefits of Meraki s Virtual Stacking technology and how you can use it to manage a distributed network. In addition, this document
More informationComprehensive geospatial network management based on MapInfo. Supporting both physical and logical network resource management
Comprehensive geospatial network management based on MapInfo Supporting both physical and logical network resource management ConnectMaster is an open, integratable, scalable software solution for the
More informationRedundancy for Corporate Broadband
Redundancy for Corporate Broadband WHITE PAPER December, 2012 Introduction Over the past twenty years, broadband service providers have been using different mediums to deliver their services. From wireless
More information3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company
3M Cogent, Inc. White Paper Beyond Wiegand: Access Control in the 21st Century a 3M Company Unprecedented security features & capabilities Why Wiegand? The Problem with Wiegand In 1970, John Wiegand invented
More informationOPTICAL TRANSPORT NETWORKS
OPTICAL TRANSPORT NETWORKS EVOLUTION, NOT REVOLUTION by Brent Allen and James Rouse Nortel Networks, OPTera Metro Solutions KANATA, Canada This paper describes how the deployment today of an Optical Network
More informationInnovation. Volition Network Solutions. Leading the way in Network Migration through Innovative Connectivity Solutions. 3M Telecommunications
3M Telecommunications Solutions for Networks Volition Network Solutions Leading the way in Network Migration through Innovative Connectivity Solutions Innovation The Broadband Migration Path 3M TM Volition
More informationUpgrading Path to High Speed Fiber Optic Networks
SYSTIMAX Solutions Upgrading Path to High Speed Fiber Optic Networks White Paper April, 2008 www.commscope.com Contents Connectivity Method A 4 Upgrading Method A to Parallel Optics 4 Connectivity Method
More informationWhite Paper. Consolidate Network Security to Reduce Cost and Maximise Enterprise Protection
Consolidate Network Security to Reduce Cost and Maximise Enterprise Protection Table of Contents Security Consolidation 3 Application identification and control 3 User identification and control 3 Intrusion
More informationFail-Safe IPS Integration with Bypass Technology
Summary Threats that require the installation, redeployment or upgrade of in-line IPS appliances often affect uptime on business critical links. Organizations are demanding solutions that prevent disruptive
More informationSession 14 Cable Support Systems
Session 14 Cable Support Systems Cable Support Systems in the IEC World A new IEC Standard, IEC61537 2001 has been developed If full details of the cabling layout are available then the likely cable load
More informationUsing Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications
Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications Steve Frank Business Development Manager Moxa Inc. Introduction Cellular technology minimizes site visits
More informationPhysical Security. Paul Troncone CS 996
Physical Security Paul Troncone CS 996 NSTISSI 4011 Building Construction Alarms Access Controls Information Systems Centers Personnel Security Tamper Resistance Goals of Physical Security Safeguard personnel
More informationWireless Remote Video Monitoring
October 2014 Page 1 An Emerson Smart Solution brings visual information into your control room. Increase plant safety Comply with regulations Scalable Reduced cost Secure and reliable communications Full
More informationThe National Armored Cable Manufacturers Association Presents. Installation Standard for Types AC and MC Cables
The National Armored Cable Manufacturers Association Presents Installation Standard for Types AC and MC Cables An ANSI Standard Original document jointly produced by NECA and NACMA as Standard for Installing
More informationData Center. Pre-terminated. Patch Panel System. Cabling Systems Simplified. Patch Panels. 10G + Gigabit. Patch Cords. Plug & Play Installation
Data Center Pre-terminated Patch Panel System Patch Panels Plug & Play Installation 10G + Gigabit Patch Cords Bundled + Labeled Cabling Systems Simplified Our Mission At Cablesys, our mission is to simplify
More informationWhitepaper Modular Integration of Process Equipment Packages for Oil and Gas Facilities
Whitepaper Modular Integration of Process Equipment Packages for Oil and Gas Facilities Author: Allan Bozek P.Eng, MBA, EngWorks Inc, Calgary, Canada Abstract An integrated design approach to a modular
More informationMcAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.
Optimize your defense, resilience, and efficiency. Table of Contents Need Stronger Network Defense? Network Concerns Security Concerns Cost of Ownership Manageability Application and User Awareness High
More informationTCTC Cabling Specifications
TCTC Cabling Specifications Purpose: To provide a standard specification that will be used for all Tri County Technical College (TCTC) facilities requiring structured cabling installation. Product specifications,
More informationNavigating the Pros and Cons of Structured Cabling vs. Top of Rack in the Data Center
May 2013 Navigating the Pros and Cons of Structured Cabling vs. Top of Rack in the Data Center Executive Summary There is no single end-all cabling configuration for every data center, and CIOs, data center
More informationVIDEO SURVEILLANCE ECONOMICS
WHITE PAPER VIDEO SURVEILLANCE ECONOMICS WIRELESS VIDEO SURVEILLANCE: THE NEW PICTURE OF QUALITY AND ECONOMY SECURITY: THE EYES HAVE IT As the world becomes increasingly security conscious, municipalities,
More information1 Campus Cabling Systems Introduction
1 Campus Cabling Systems Introduction This document represents the campus cable and infrastructure standards adopted and supported by the XXXX. All new construction and renovation should conform to these
More informationMotorola Wireless Broadband. Point-to-Multipoint (PMP) Access Network Solutions
Motorola Wireless Broadband Point-to-Multipoint (PMP) Access Network Solutions Motorola Technology is as Simple as it is Powerful Motorola Wireless Broadband Point-to-Multipoint (PMP) solutions are streamlined,
More informationDesign Guide. Universal Connectivity Grid. SYSTIMAX Solutions from CommScope
Design Guide Universal Connectivity Grid SYSTIMAX Solutions from CommScope CONTENTS Introduction 3 Commercial building network overview 4 Zone cabling 5 Universal Connectivity Grid 6 UCG cell size 7 Integrating
More informationSUMMARY. Jan 30, 2001. Re: Technical Assistance Advisement 01A-009 Sales and Use Tax -- Security Systems Sections 212.05, 212.06, F.S.
SUMMARY QUESTION: Are contracts who install security and alarm systems contracts for real property improvements or sales of tangible personal property? ANSWER - Based on Facts Below: Contracts who furnish
More informationWHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
More informationTHE IMPACT OF CURRENT TRENDS ON THE DATA CENTER COMMUNICATIONS CABLING INFRASTRUCTURE
THE IMPACT OF CURRENT TRENDS ON THE DATA CENTER COMMUNICATIONS CABLING INFRASTRUCTURE Prepared by Michael Wood Senior Product Manager Data Center Infrastructure Systems Hubbell Premise Wiring www.hubbell-premise.com
More informationBest Practices for Wire-free Environmental Monitoring in the Data Center
White Paper 11800 Ridge Parkway Broomfiled, CO 80021 1-800-638-2638 http://www.42u.com sales@42u.com Best Practices for Wire-free Environmental Monitoring in the Data Center Introduction Monitoring for
More informationQUESTIONS & ANSWERS. Re: Invitation for Bid #11-208 (West Covina DMV Cabling, Electrical, and Hardware Installation Services)
STATE OF CALIFORNIA - BUSINESS, TRANSPORTATION AND HOUSING AGENCY DEPARTMENT OF MOTOR VEHICLES ADMINISTRATIVE SERVICES DIVISION P.O. BOX 932382 SACRAMENTO, CA 94232-3820 EDMUND G. BROWN JR., Governor QUESTIONS
More informationDatabase Security in Virtualization and Cloud Computing Environments
White Paper Database Security in Virtualization and Cloud Computing Environments Three key technology challenges in protecting sensitive data Table of Contents Securing Information in Virtualization and
More informationUnlock the Power of Ethernet Delivering 100 Mbps and PoE over CAT3 and Legacy Copper with ADTRAN ActivReach
Unlock the Power of Ethernet Delivering 100 Mbps and PoE over CAT3 and Legacy Copper with ADTRAN ActivReach Executive Summary For the last three decades, Ethernet has grown well beyond being simply a Local
More informationMPLS and NetEnforcer Synergy. Enhancing the control of MPLS-based, enterprise managed services with Allot's NetEnforcer
Solution Brief MPLS and NetEnforcer Synergy Enhancing the control of MPLS-based, enterprise managed services with Allot's NetEnforcer 2007 Allot Communications Ltd. Allot Communications, NetEnforcer and
More informationTechnical Brief: Introducing the Brocade Data Center Fabric
: Introducing the Brocade Data Center Fabric Enterprise data centers are undergoing a transformation driven by the need to reduce costs and increase performance. The evolving data center fabric exploits
More informationAutodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
More informationThe data can be transmitted through a variety of different communications platforms such as:
COMMUNICATION NETWORK General Overview of SCADA Communications Without a properly designed communication network system, a SCADA system cannot exist. All supervisory control and data acquisition aspects
More informationOptiNet Applications. A Review of the Unique Requirements for a Facility Monitoring System. White Paper Series
OptiNet Applications A Review of the Unique Requirements for a Facility Monitoring System White Paper Series A Review of the Unique Requirements for a Facility Monitoring System Overview The surging cost
More informationSECTION 28 05 00 COMMON WORK RESULTS FOR ELECTRONIC SAFETY AND SECURITY
SECTION 28 05 00 PART 1 - GENERAL 1.1 RELATED DOCUMENTS A. Drawings and general provisions of the Contract, including General and Supplementary Conditions and Division 01 Specifications Sections, apply
More informationEoVDSL: A Cost-Effective Solution for Transmitting Ethernet Data Over Existing Copper Wiring for ITS and Traffi c Applications
WHITE PAPER: Eo: A Cost-Effective Solution for Transmitting Ethernet Data Over Existing Copper Wiring for ITS and Traffi c Applications By Bruce M. Berman ComNet Vice President of New Business Development
More informationA Modern Framework for Network Security in the Federal Government
A Modern Framework for Network Security in the Federal Government 1 A MODERN FRAMEWORK FOR NETWORK SECURITY IN THE FEDERAL GOVERNMENT Trends in Federal Requirements for Network Security In recent years,
More informationhttp://www.usac.org/sl/applicants/beforeyoubegin/eligible-services/priority-one.aspx
Coronado Unified School District RFP# 2012-02 Addendum - Wide Area Network Lease Contractor shall indicate on Carrier Proposal Form that Addendum #1 issued on November 10, 2012 and Addendum #2 issued on
More informationA Guide to Simple IP Camera Deployment Using ZyXEL Bandwidth Solutions
A Guide to Simple IP Camera Deployment Using ZyXEL Bandwidth Solutions 2015/7/22 ZyXEL Communications Corporation Barney Gregorio Overview: This article contains guidelines on how to introduce IP cameras
More informationFTTH ARCHITECTURE WHITE PAPER SERIES
Not all FTTH networks are built the same. Since construction and outside plant account for the majority of total network costs, getting the architecture right has a major impact on the business case. The
More informationLayer-2 Design: Link Balancers Simplified
Technology White Paper Layer-2 Design: Link Balancers Simplified Build Smarter Networks Table of Contents 1. Executive Summary... 3 2. Overview of the Problem... 3 3. Layer-2 Design Principles... 4 4.
More informationMunicipal Operations Monitoring
How cities and regional traffic authorities can use extended Ethernet technology to remotely control traffic lights, metering systems, and surveillance cameras. Traditionally, telecommunications carriers
More information2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
More informationStableNet Monitoring out of the Cloud. Using the unified StableNet OSS Solution in a cloud-based environment
StableNet Monitoring out of the Cloud Using the unified StableNet OSS Solution in a cloud-based environment Steadily increasing IT complexity even in "non-it" companies Rapid developments in the last years
More information