Anda di halaman 1dari 3

CABLING INFRASTRUCTURE

by Pete Pela

ITIL helps keep network fit


The health of Layer 1 will impact the performance of all other aspects of the network.
hile organizations invest in tools that monitor the health of applications, packet flow and dozens of other network parameters, most completely ignore the foundation layer of those networks-Layer 1-where the cables, routers, switches, wall jacks and other physical devices interconnect. If that layer is not healthy, then the performance and security of the network layers above it will be negatively affected, no matter what tools and systems are operating. Perhaps no recent initiative better reflects the realities of this approach than the IT Infrastructure Library, or ITIL-a set of best practices that ^^^^ delineates the various aspects that need to be addressed in Documenting and managing order to optimize the delivery of IT services. While not laying the physical layer is critically out those practices step-by-step, they will from important in order to adhere to as company varyneed tocompany to and be indiit the principles set out in ITIL. vidualized, anddoes provide both guidelines a framework for implementation. Included in the ITIL documentation is a section called the configuration management database (CMDB), which addresses the physical side of the network. When considering the multiple, yet often transparent physical connections in any end-toend circuit trace, documenting and managing the physical layer is critically important in order to adhere to the principles set out in ITIL. There are three options for implementation: manually document and manage the physical layer, automate management, or use a mixture of both. Manually documenting the location and connection of every cable, wall jack, switch port and other device on the network is a daunting task, preventing most IT departments from tackling this project in the first place. The next challenge would be how to document this information efPete Pela is chairman, ficiently and physically. It could be applied to a chief technology officer blueprint or CAD drawing of the building, but and founder of iTRACS overlaying the information would be another Corp., Tempe. Ariz. painstaking, time-consuming task. For more information: The same applies to the numerous connections rsleads.com/602cn-25g
32 - COMMUNICATIONS NEWS February 2006

along every circuit. Any time a change is made, that change would again have to be documented, so in most cases the documentation isfluid.As a result, the challenge of documenting the physical layer is so significant it frequently is never overcome. Automation using the new breed of intelligent infrastructure management software provides an alternative. With this type of software, connections are discovered and then continually monitored electronically, from the server to the wiring closet to the wall jack, andfinallyto the end device, thereby generating documentation of the entire physical layer automatically (including overlaying it onto a CAD drawing of the building). MORE PRODUCTIVE, LESS COSTLY With this method, a single person can implement the intelligent infrastructure-management software, rather than tying up an entire department with physical traces. Since all the connections are traced at once, the amount of time from inception to completion is reduced. When changes are made, they are reflected in real time in the organization's records, thereby avoiding what are often long delays in manual-based systems. Automatically surveying the physical network, creating the documentation and transferring it to a CAD drawing removes the human error factor. More importantly, the organization winds up with an accurate record of all connectivity points and connections, meeting the ITIL best practices requirement of establishing and maintaining a CMDB. In some cases, obstacles to a completely automated solution may require the use of a mix of automated and manual solutions. Without comprehensive and accurate documentation of the physical layer, achieving a state of best practices as set forth in ITIL is not possible. Any ITIL processes and procedures developed need to assume that the necessary IT documentation exists and is accurate. This includes the physical layer. A good example is the IT planning that forms part of service and application delivery. A portion of provisioning new users requires connecting them to the network. This will be faster, more
Continued on page 34 www.comnews.com

CABLING INFRASTRUCTURE
reliable and more cost effective if the existing infrastructure is reused rather than installing new every time a new user connects to the network. Yet, without clear and accurate documentation, the most common course of action will be to drop new cable and install new devices. DOCUMENTATION IS IMPORTANT Even installations in a new building could be more complicated than necessary without accurate documentation. The connectivity paths selected may work, but may not be the most efficient or balanced, given the rest ofthe physical layout and connectivity. Diverse routing and load balancing are also important IT considerations. In addition, if the new installations are not continually documented, they will compound the problem in the future. Ongoing management is another area that will benefit from a well-documented physical layer. This includes knowing what is connected to what, and who is connected to it. Yet, many organizations lack this basic but essential information. In one real life example, a virus penetrates the network through an infected PC. As the virus propagates, the antivirus software sets off alerts identifying the IP address ofthe affected device (s). Then there is typically a race against time to either find the infected device (s) or disconnect them from the network at the switch. Without accurate documentation, this exercise is like trying to push water uphill. You simply will not be able to react fast enough to restrain damage to the infected PCs alone. If you have intelligent infrastructure management in place, you can quickly get to the physical location ofthe virus or the switch port connecting it to the network and stop the spread before it becomes widespread. In another scenario, many organizations have cabinets of switch ports connected to cables that once served users, but now essentially lead to nowhere. Yet, they appear to be utilized because a patch cord was not recovered. This is both a security vulnerability and under-utilization of the switch capacity. Without accurate documentation, IT is unaware of this spare capacity, and simply adds more switch ports as users are added. By becoming aware of unused capacity, the organization can improve security, reduce its cost and save rack space. Utilizing spare capacity also qualifies as a best practice.

iniJT THE 'IIMWIRINR'i


by Bill Schultz
The emergence of power over Ethernet (PoE) enables companies to leverage their existing cable infrastructure to support long distances and expanding networks. With PoE, power and data can be run over the same four-pair Category 5 cable, providing a wide range of benefits concerning cost, network simplicity, packet-based efficiency and remote management. PoE's advantages include easier/greater flexibility for installation of equipment and lower costs than running individual wiring for power. It allows network devices to be powered in remote locations where access to power is unavailable or difficult to install, and enables electrical currents of an end device to be carried by the data cables rather than by power cords within the wired LAN. PoE is based on 802,3af, the IEEE standard that defines how devices can be made to supply and accept power over data cable. Two devices defined by the standard support PoE-the power source equipment (PSE) and the powered device (PD). The PSE provides the power and the PD accepts the power. A mid-span hub, such as a lO/IOO-Mbps switch that is PoE capable, is an example of power source equipment. For PoE to work, the electrical current must travel on a standard CAT 5 Ethernet cable or better. A CAT 5 cable has four twisted pairs, but only two of the pairs are used for data. The 802.3af specification allows either the spare pairs or the data pairs to be used to carry the power. Four-pair cable is required by the standard. A PSE provides a maximum of 15.4 watts of power at -48 VDC and a PD can have a maximum input power requirement of 12.95 watts; this accounts for degradation of power over the cable. For applications that are within 100 meters of a data closet, users can install one of the PoE switches that are available on the market or use a standard switch with a midspan injector, which combines the data and power and transmits over the data cable. A network manager needs to be cautious when using midspan injectors, because, unlike 802.3af-compliant devices, midspan injectors do not verify that the end device they are powering is a PD. A discovery protocol was implemented in the 802,3af standard that requires a PSE to probe the end device and determine if it is a PD and, if it is, what its capability is. This prevents damage from occurring to non-PD devices. An alternative for running data and power on remote devices is to incorporate a PoE media converter into the network, combining the benefits of media conversion with the benefits of 802.3af With a PoE media converter, network managers can utilize current data centers and run fiberto a PoE media converter. The converter then converts the data from fiberto copper, adds power and transmits it to the PD, Utilizing a PoE media converter provides a network manager with more options when deploying new technologies. For example, if a network manager has remote devices that need to receive power and data, but are beyond theiOO-meter reach of copper, a remote data closet would need to be added. With a PoE media converter, the network manager can utilize the current data center, run fiber to a PoE media converter, which converts the data from fiber to copper, adds power and transmits it to the PD. Today's hottest technology segments depend on PoE as they evolve, such as voice over IP and 802.11 Wi-Fi wireless networks. For example, a major change to the networking landscape in the past several years has been the deployment of broadband wireless networks. These networks are based on the alphabet of 802.11 standards and are built by deploying a mesh of wireless access points throughout an area to provide network access for mobile computers and PDAs. A network infrastructure of this nature requires equipment to be deployed in several locations over a large area to provide adequate network coverage. PoE media converters can provide network designers with the flexibility of maintaining a central data closet ^ " i ^ " " " " " " and still deploy Bill Schultz is vice wireless access president. Transition points beyond the Networks, Minneapolis. loO-meter reach For more information: of copper cable. rsleads.com/602-260

34 COMMUNICATIONS NEWS February 2006

www.comnew5.com

Anda mungkin juga menyukai