batessecuredatasa-blog
batessecuredatasa-blog
Data Storage Systems
17 posts
Purchase wide range of USB sticks, Cable certifier, USB flash drives and network tester at Bates Secure Data and purchase best quality product here.
Don't wanna be here? Send us removal request.
batessecuredatasa-blog · 8 years ago
Text
Learning How to Use the Network Tester
This is a really handy tool that allows you to test the network coverage in a simple way that does not require you to put any code into the module. One of the main features of this tool is that it also has GPS. So, you can walk outside with it, and it will plot the coverage of the map for you.
Network Diagnostics
Network Testers normally take about a minute or so to find a gateway. There is also a mac ID, and you will need that when you get into a webpage. When you get into network diagnostics of the device, you will see a very good signal strength if you are close to the gateway. The display will show the gateway ID, as well as the channel that it is on. If you are going to be outside, you can take GPS data. As you test the sensors on the board, and transmit that data back over the area that’s in sync with the gateway and the gateway is going to use WiFi to transmit data to the conductor in the backed, which you will be able to see in your screen.
Sensor Diagnostics
When you do a sensor test, and if you are actually moving around and want to send data every 10 seconds or 30 seconds, you have an option to choose the frequency of the data being sent. In the conductor interface, you launch the network tester by syncing the device with the interface on your PC, and that will take you to the interface for the network tester. All the data that you see on your screen can be exported by taking a screen shot, or downloading data as a .csv file. That way you can take it back and do some analytics around the network coverage.
Ways to test an optic fiber cable
There are two ways to test an optic fiber cable. You can use a bare fiber adapter, or you can use a cam splice. These are the kinds of fiber optic cable testers. Testing will confirm fiber type in specification. These traces are saved using an OTDR. You can also splice optic fiber cable manually.
0 notes
batessecuredatasa-blog · 8 years ago
Text
Evolution of Data Storage Systems
From the dawn of civilization, man tried to find a way to store information for longer periods of time. It is estimated that on a single day people exchange as much information as our grandparents did in the early 1950s in an entire year. So, where is all this data stored?
Punched cards were first used around 1725 for controlling textile looms in France. In 1881, Herman Hollerith, who would later form IBM, invented the recording of data on a medium that could be then read by a machine. It had taken the U.S. Census Bureau eight years to complete the 1880 census, but thanks to Hollerith’s invention, that time was reduced to just one year. Similar to punch cards, paper tape contained patterns of holes to represent recorded data. But unlike its rigid counterpart, rolls of paper tape could feed much more data in one continuous stream, and it was incredibly cheap to boot. In 1973, a floppy disk came by which could store 256KB of data plus it was possible to write new data again and again. Since then the trend has been the same – smaller floppy disks that could store more data.
Today, data storage systems are on the cloud. To have accelerated business responsiveness, storage systems are so powerful that they would deliver simplified operations, availability, and the performance you need. The choices available for cloud integration, high density, and superior all-flash performance would make your cloud connected storage systems the most powerful available in the current market. Other storage systems available are data infrastructure that virtualizes your data storage with scalable and non-disruptive features.As communications and data networks work hand-in-hand, a Network Cable certifier is the only thing that you would need to test data and gather information to certify that all your systems are working just fine.
 All Network Cable Certifiers are not the same. While some certify category 5e and 6 standards, others test fiber cable connections. You should probably look out for one that suits your organization’s needs.
0 notes
batessecuredatasa-blog · 8 years ago
Text
Basic Guide to Resolving Events in OTDR Testing
By following some standard checks during the use of an OTDR fibre tester will enable the technician to spend less time on trying to find the cause of errors. OTDRs are the most important device in network testers.
Always select the correct fibre type in the OTDR setup. Mismatched cable due to wrong core size of patch cord, fibre segment may result in erroneous measurements. Back scatter coefficient and mode field diameter also reflect errors due to mismatched cabling.
Bad fusion of splice is a common complaint. Ensuring splice is correct is an important part of cabling. Using a top of the line fusion splicer will save plenty of heartache down the line. Mechanical splices are still prevalent although out of reckoning. Older networks still have remnants of mechanical splicing. Replacing such splices with newer methods will make the network more reliable. The OTDR trace is an effective tool in searching and rectifying such faults.
The above faults are normal reporting for overall loss conditions. During a largest event fails situation it is best to check the OTDR event table for high-loss reflective event. It is usually a dirty or damaged connector.
When the fibre length fails it is indicative of cabling measures either too long or too short. In such cases the OTDR will map the exact distance where the fibre is broken. It also indicates if the connection is open. Sometimes the wrong test limit maybe selected.  Change the OTDR tab in the setup.
High loss indication due to reflective events - This is the result of cracked or misaligned conductor. The misalignment can occur due to a hasty splice. The connectors may be unseated which causes large reflections which are indicated by ghost lines on the OTDR. This issue also occurs when there is a tight bend which is indicated as a break event. To locate the fault use a VFS – visual fault locator to identify the precise location.
0 notes
batessecuredatasa-blog · 8 years ago
Text
Network Security and POPI Law
Modern communication is filled with video and audio on broadband networks. It becomes necessary that the connector ends of fibre optic cables are clean. Debris collecting in unprotected ends is the reason for high transmission losses. The repercussion of such losses jeopardises the efficiency of the network and results in severe loss of revenue. Dirt also affects other equipment which can damage the system. Using an optical inspection scope is necessary for checking for damage and taking action if there are any. Once the debris is cleared, it is important that an OTDR fibre tester checks the system for performance testing. The OTDR (optical time domain reflectometer) identifies the distance to faults and also checks the attenuation property. It can also measure the distance to splice losses and fibre damage. The OTDR measures the total length of the system as well as the distance to fibre breaks. Damages to the fibre can occur due to kinks, sharp bends or tight bends. Other causes could occur from tightening cable ties excessively around agroup of fibres.
The principle of the OTDR fibre tester is simple. It sends a light down the fibre and measures the reflection due to the backscatter. This device is playing a significant role in detecting human made breaks made for tapping into networks for stealing data. System administrators are becoming extra cautious about protecting customer data due to POPI compliance laws in South Africa. Other countries also have such laws which ensure that Protection of Personal Information is a responsibility of users and service providers. Network admins insist on accurate documentation of measurement of optical power and fibre attenuation. The Government is strict about POPI implementation, and the only way for businesses to prove that they have complied with the protection of customer personal information is through documentation.
0 notes
batessecuredatasa-blog · 8 years ago
Text
Hardware Encrypted Disk Drives – Ultimate In Data Protection
According to Quora( thesite where users ask questions and users answer those questions- knowledge sharing website), The Panama Papers are the largest leaked documents. The file consisted of 11.5 million records from Panamanianlaw company that was an advisor and helped to create tax sanctuaries for wealthy clients. The amount of data stolen was put at 2.6 terabytes that included emails, images, pictures, spreadsheet entries, pdf documents. The records went as far back as 1970.
Here is the interesting bit. If a fast server were to download this file on a 1Mbps connection, it would take 252 days of round the clock download activity. It is possible that hackers used 42.zip which is a compression algorithm of multiple layers of zipping called a zip bomb (Source: Wikipedia). The result is a 42Kb file that contains 4.5 petabytes of bits.
So how can an individual protect their household or company datasecurely? The best way is not to connect your valuable information on the internet. Second store such information in a data storage system such as the DiskAshur hard disk that is AES 256-bit hardware encrypted. What this means to a lay person is the hard drive has a pin enabled keypad that takes passwordencrypted inputs of 7 digit to 15 digits. It Is protected against DDOS attacks (also called as brute force attacks) when more than 10 tries to break the password will result in resetting the encryption key and destroying the data. Assuming that the disk is connected to a network, it can be locked for a predetermined time of your choosing.
Networks also ned to be protected. The first task is to check and certify that the network is able to carry the data load on cables as perspecification. Using a cable certifier such as the LAN TEK II 500 modelwill prove the credentials of the network.
0 notes
batessecuredatasa-blog · 8 years ago
Text
Personal information data is not to be trifled
OTDR (Optical Time Domain Reflectometer) is one of the most important devices in optical fiber testing. It is used to analyze reflective and non-reflective issues. This means that disturbances in an optical fiber link can be tested for expected events such as splices, connectors and problems in fiber ends among others. The OTDR can also identify faults in unexpected events such as bends in the fiber, cable breaks among others. The versatile nature of an OTDR fiber tester allows identification and testing of network connectivity.
Networks are advancing technology wise with each passing day. As more spectrum, is made available communications has reached 5g capability. In a very short period of time cellular and data networks have quickly crossed the divided from 2g to 5g. There is already research on new protocols for 6g networks. This has resulted in data explosion that is pervading everyday living. The IOT (internet of things) technology is allowing sensors to stream data for every aspect of commerce, living, services and education. Privacy has become the biggest issue as data mining is dissecting human lives in thinner slices of information.
Fortunately lawmakers and think tanks around the world have understood the power of information. New legislation such as POPI (Protection of Personal Information) in South Africa (to give an example) has been implemented making it mandatory for users of personal information to ensure safety of the data. Breach of this law entails sever punitive damages that are heavy and can even lead to prison. POPI compliance is serious business in South Africa as the law is stringent. The principle behind the law is very simple; personal information of individuals is a right of only that individual. Without the permission of the individual nobody has the right to use the information in a manner that may appear harmful to the interest of the individual.
0 notes
batessecuredatasa-blog · 9 years ago
Text
Strategies for Network Security
Three primary safeguards for deploying network security include the following RVS principals
·         Resilience
·         Vigilance
·         Secure
Being resilient means to adapt to situations such as a data breach quickly and find solutions for
·         Reason of data breach
·         Stop the data breach by plugging
·         Prevent future data breaches
Being vigilant is a process of monitor the networks continuously. This is akin to a CGM (continuous glucose monitoring) in diabetic conditions which help in regulating insulin deficiency. Using the same analogy recognizing threats and responding proactively will go a long way in protecting data.
Being secure is to allocate timely resources during the planning. Resources include the deployment of network testers across the entire expanse of the network. The use of OTDR fiber tester (optical time domain reflectometer) is invaluable. One method is to employ hackers and plug weak areas of the network from the planning stage. This proactive step will boost the culture of security and create awareness in the organization. For example, using capital letters and numbers in passwords add additional layers of security. This should be drilled into each and every employee from day one.
Further protective measures for protecting customer data are to implement two stage verification processes. This adds further layers for protection of data considering the plethora of devices that connect to the network using the same username and passwords. Instilling the habit of frequent changes of passwords as a mandatory function in the employees as well as the software protection programs to automate this function will eliminate sloppy password creation. Research has proved that data breaches via weak passwords are the most common form for hacker penetration.
Last but not the least is to encrypt data whether in transit or at rest. With cloud services gaining traction several companies are storing data on the cloud. It makes sense to store only relevant information and delete risk based information. Reducing digital content is a key to data security.
0 notes
batessecuredatasa-blog · 9 years ago
Text
Disruption Countered With Intelligent Data Storage
Edward Snowden is back in the news. Internet freedom aficionado's hail him for exposing the level of Government intrusion into an individual's privacy; the American Government wants him extradited for stealing data. The release of the Oliver Stone / Kieran Fitzgerald helmed film in late Sep 2016 has thrown the spotlight on protection of data. The need for data storage systems in preventing Snowden-type thieving (however laudable the intentions) or copying sensitive company data by disgruntled employees is now the need of the hour. The best technology presently available is the DiskAshur storage systems that allow hardware encryption on the device itself. The data is accessed, via an on-board keypad that needs 7 to 15 character input. Unauthorized access using brute force attacks are prevented, as the inbuilt safeguards will lockdown the disk after 10 unsuccessful tries. There is nothing comparable to this state-of-the-art disk storage system in the market. The DiskAshur series are available in USB sized pen drives, disks and solid state drive of various storage capacities.
While on the topic of data, unauthorized data breaches in a fiber network are easily tested using the FTE 1700 OTDR model. Testing is simple and the handheld device with Bluetooth capability can instantly share information with experts. The multi function device is equipped with video scope that is standard and an optional video probe. The power meter function will quickly analyze signal strengths. The visual fault locator function can determine whether the fault is a physical damage or an unauthorized ingress into the data cable. The feature of trace analysis is perhaps the best in its class with reporting systems enabled by the Telecordia software that is inbuilt into the OTDR (optical time domain reflectometer) fiber tester. The device can store information of 1000 traces that is downloadable via USB interface for further analysis. Edward Snowdens of the future - you are warned.
0 notes
batessecuredatasa-blog · 9 years ago
Text
Sophisticated splicing and testing equipment for optical fiber
Fiber optic networks are the result of advances made in understanding spectrum and harnessing the technology for faster transmission of data. Communications have merged that voice, data are treated alike, and every transmission is interpreted and decoded into its binary form. The technologies are also prone to physical damage. Fibers get bent or the joints may suffer kinks due to routing problems. Technicians have to carry a fusion splicer as part of maintenance equipment. Fusion splicing is the method employed to weld two fibers via electric arc. This method offers the strongest joint with least resistance and negligible loss of transmission speeds. Presently single mode fibers are easy to splice. The multimode fibers are another issue as several layers of glass pose matching issues. This problem is more when fibers of different manufacturers of optic cable require splicing.
 Fusion splicing instruments require presetting the splicing requirements to control the splicing process. Another key device is the use of a fiber cleaver. This instrument performs cleaving (cutting the fiber) with precision that allows matching the two ends perfectly. The better the match during the cleaving process better will be the quality of the splice minimizing transmission speeds. Along with cleaver the Mini 6S core alignment splicer is gaining popularity. It is small and extremely reliable. The heating time is very fast that offers unmatched efficiency.
 Once the splicing operation is completed, testing the cable by using the Signal Tek II FO Cable and Network transmission tester model R156001 will immediately give the result of the splice. Network tester’s tool such as the handheld Signal tester is multi-cable in operation as both copper and fiber networks are tested. The main feature of the tester is full bi-directional testing capability allowing wire mapping by pin as well as paired conductors.
0 notes
batessecuredatasa-blog · 9 years ago
Text
Cyber Security and POPI
Cyber security is the most critical aspect for all business enterprises today. There is no single magic elixir for maintaining security of information. Just as the way the internet evolved (it started in 1989 with Tim Berners-Lee) human beings are finding ways to be responsible. Government is also doing its bit by legislating POPI compliance as mandatory for businesses in South Africa. In plain language, the POPI (Protection of Personal Information) legislation empowers each individual's personal information as "precious goods" that enjoys rights of protection which can be exercised by the owner (meaning yourself). Therefore when any business (or even government entities) gathers your personal information for ecommerce or for any other reason then, it is the responsibility of the business to keep the information secure.
Ensuring data security - ways and means
Ensure that employees entrusted with the responsibility of gathering data understand what is at stake. Misuse of information entails government levying hefty fines of half-a-million pounds (by the ICO - Information Commissioner's Office). Secondly, save only that amount of data that is required and encrypt it on the fly. Do not keep unnecessary data. Anonymizing data is the key and even if there is a data breach, the information cannot lead back to the customer. Hiring the services of a hacker will enable organizations to plug the loopholes in the system. This is money well spent.
 Check the networks for any breach by using an OTDR fiber tester. The FTE 7500A PON OTDR is an entry level in service OTDR (optical time domain reflectometer) that boasts rugged and robust construction with several functions such as:
 ·         fiber inspection scope with probe
·         broadband auto-test loss test set
·         visible fault locator
 This instrument is very easy to use and priced attractively. Equipped with help system that is context-sensitive it is ideal for learning and fine tuning networks as well as tweaking performance.
0 notes
batessecuredatasa-blog · 9 years ago
Text
Fiber Optic Testing Are Device Rich
Fiber optic cables are physical entities that are subject to wear and tear. What this means is that the fiber can break, have kinks or damages may occur. Fiber optics troubleshooting follow a golden rule of zero downtime – meaning signal transmission cannot be interrupted. Downtime is terribly expensive for the networks and they cannot afford the attendant issues of stopping signal transmission. Fortunately, technological innovations allow repairs to be undertaken without any downtime of signals. Standby fiber optic cables take the transmission load while the damaged cable is repaired.
 Fiber optic repair kits are sophisticated tools and the TK100P Fiber Optic Fusion Splicer tool kit is perhaps the best example of a top rated repair kit. This tool is very useful in fiber optic cables
·         Construction
·         Inspection
·         Maintenance
 The tool kit is employed for buried fiber or aerial as well as duct optic cables. The tool kit provides in service stripping while the fiber is still in operation thus ensuring any service interruption.
 Network testers are the main elements for installation or troubleshooting fiber or copper networks. The suite of testing equipment range from basic cable testers to sophisticated OTDRs (optical time domain reflectometers). OTDRs can multi-task with several testing modes such as light source and fault detection among other functions. Other network testing equipment comprises fusion splicers, LAN testers, and cleavers. Among fiber optic testing equipment, they include a range of accurate instrumentation such as
·         OSA (optical spectrum analyzer)
·         TLS -Tuneable Laser Source
·         VOA - Variable Optical attenuator
·         VIS- Video inspection systems
·         Power meters
·         LTS - Loss test set
·         VFL - Visual Fault locator
 Fiber optic testing equipment is an acronym rich mixture of names that spans the alphabet and is straight out of 80s science fiction movie.
0 notes
batessecuredatasa-blog · 9 years ago
Text
Cable certifying for POPI adherence
Customers of network cabling are getting smarter. They are insisting that optic fiber cabling runs are terminated properly and installers provide complete data sheets for each cable run and certified. Customers insist on a proper cable certifier to be carried by every technician
Some customers have even gone to the extent of checking whether the cable-certifying instrument carried by the installer is the correct type. They check the specification of the model and verify with the manufacturer over the internet whether this model satisfies their requirement and cable certifying capability.
Customers are also aware of the network testing capability of the instrument. They are also aware that particular models can check existing network traffic. Instead of relying on third party software, the cable certifier's network testing capability can be leveraged to identify problems.
Why has the customer become smarter? Is he showing off his knowledge? or that he knows how to search for information on the internet. Is the customer behaving like a patient and enumerates to the doctor medical jargon confusing the doctor further? No these answers are just a safe guard by the customer ensuring that POPI compliance efficiency is not bartered at the altar of leakage of data in the network. Hackers or data thieves look for unguarded or weak access points on the network that can lead to sensitive data loss and personal information of employees, clients, shoppers (if it is an eCommerce portal or service organization) leaked to hackers. The Protection of Personal Information (POPI) Act is the law in South Africa signed by the President that mandates how enterprises can process personal information. Once an entity has personal information they have to safeguard it. Losing it to data loss and hackers does not prevent hefty penalties imposed on them.
0 notes
batessecuredatasa-blog · 9 years ago
Text
Reducing Network Testing Expenditure
Networks are evolving rapidly. Telecommunication protocols that are standard today look obsolete in a very short period of time. Network testing equipment suffers, badly in this regard. Constant protocol changes necessitates that network installers upgrade test equipment regularly.  This equipment is expensive when new testers are made available in the market.
One method to prevent frequent upgrading network testers is to combine cable certifiers with gigabit performance testers. The logic of this approach embraces the following parameters.
Not all testing require the latest certifier. A smaller number of up to date cable certifiers can be carried with the company while a larger number of performance testers are deployed. Performance testers include measuring frequency, splices, troubleshooting connections and faults. Maintenance expenditure can be reduced with this logical approach
Handheld otdr (optical time domain reflectometer) can reduce downtime with built-in functions of transferring test data to the technician's mobile phone. PDF and CSV test data shared with back office or other technicians remotely allows faster troubleshooting and solutions to problems without wasting time in the field.
Another advantage of using otdr fiber tester is quickly identifying problems in networks and ethernet devices. As soon as a fault is diagnosed, going directly to the point rather than checking the entire network saves time. It is also better for testing devices to possesses, WiFi interface that allows technicians to connect and diagnose problems by performing a WiFi site survey. Establishing access point IDs, signal strength, encryption parameters and channel numbers gives solutions to connection issues of overlaps and improper SSID (service set identifier) setup.
The example of the FTE-7800 is a true robust multi-tasking network tester that performs all of the functions listed above and more. Importantly the USB interface transfers data that is stored. The data storing capability consists of 500 OTDR traces, 50 Video Scope images, 1000 CWDM scans and 10000 LTS measurements.
0 notes
batessecuredatasa-blog · 9 years ago
Text
Small Fusion Splicer Big On Performance
The new breed of network technicians has sophisticated tools in their tool bag. The equipment is reminiscent of tools that were just imagined fantasy in sci-fi movies of the 80s and 90s, In those movies gadgetry glowed and zapped. The commander would witness on hand-held screens of the ongoing action. Well, reality has happened. Network cabling with optical fiber require tools that glow, zap and instant feedback via image capture technology has become standard. One such tool is the fusion splicer. This equipment fuses or welds two optical fibers by means of an electric arc. This method ensure reliability in the joint, minimizes power loss and reflectance of light. One of the finest fusion splicers in the market is the Mini 6S. Touted as the smallest core alignment splicer the convenience of portability in the robustly built 1.3 kilogram (without the battery) is a veritable pocket powerhouse.
 Essential features of the Mini 6S Fusion splicer are
·         Anti-shock body construction
·         Drop test from arm height keeps the splicer performing flawlessly
·         Waterproof and Dustproof
 Performance metrics include
·         The fastest heating time
·         Has a universal holder to hold different fibers
·         Fastest splicing time of 0.7 seconds for single mode fiber
·         Touch screen graphic user interface
·         Tempered glass that has anti-shock properties
·         Splice-On Connector compatible
·         Automatic fiber detection
·         Evaluation of splicing quality
·         Built-in cleaver
·         Pair of CCD (charge coupled devices) cameras
 Fusion splicing by optical core alignment utilize images recognized by the software to align the core automatically. Splice loss measurement is checked by measuring actual loss against estimated loss as quantified by otdr fiber tester (optical time domain reflectometer)
 Korean company Fiber Fox spearheads the new generation machines in photonics (engineering technology dealing with properties of transmission of photons as in optical fiber). They not only have a mission statement of "All Happiness Humanism" but also practice it by actionable management philosophies leading to co-prosperity of customer happiness.
0 notes
batessecuredatasa-blog · 9 years ago
Text
More than Moore Driving Cabling Infrastructure
The speed with which networks are evolving makes it imperative that infrastructure keeps pace. Data transmission speeds are doubling and it is not a surprise that Moore's law is less relevant. To the uninitiated Gordon Moore (Intel co-founder born 1929) observed that integrated components doubled each year (this was revised to 24 months). Today with IOT (Internet of Things) and smartphone technology the law is changed to "More than Moore". Low powered processor technology; carbon nanotube along with graphene driving research has shifted focus from doubling components to integrating different manufacturing processes as well as alternative materials.
What this means to network communication is verifying that the installation of optical fiber network is capable of handling transmission capacity. Scaling up the network to meet ever-growing capacity means that cable testing is also keeping pace. Cabling tests include measurements of length of cable, attenuation, return loss and possible fault locations among others. Disruption of networks due to wrong cabling infrastructure can lead to disastrous consequences. New standards have to coexist with existing and present standards. Cable testing equipment classification falls in three areas namely certification, qualification and verification testers. Though some test parameters have a common ground in these tests each of these qualifiers have a specific testing methodology assuring that the installation is able to perform as specified. It all begins with cable certifiers giving a 'Pass' or 'Fail' signal that the cabling is meeting industry standards. Structured cabling standards are determined by ISO (International Organization of Standards) aided by its electro-technical commission.  Certification is critical in determining whether a cabling link is in accordance with category (example Cat 6) of cable. Newer network technologies base designs and algorithms on these standards. Cable analyzers and or OTDR fiber testers (optical time domain reflectometer) are the tools that determine whether existing cabling infrastructure supports newer network technologies.
0 notes
batessecuredatasa-blog · 9 years ago
Text
KSA and James Bond Data Encryption
Modern day telecommunication networks require technical competence not only from product designers but also of the people who install and later on monitor optical fiber networks. The field technician has to have a thorough understanding of what is termed in industry parlance KSA (not to be confused with Kingdom of Saudi Arabia but is an acronym for Knowledge, Skills and Abilities).
The test and measurement equipment industry leaders have brought out cable certifiers that check whether the copper cables have integrity. In simple terms this test instrument can look for faults in wire mapping, split pairs, shorts and open ended connections. This is a versatile tool in the toolkit of optic fiber technicians. Most cable testers are multi-functional. They can measure distance and very accurate fault detection via TDR (time-domain reflectometer).
The iphone / ipad is protected by a password that needs to be input on a screen keypad. Ina takeoff with a twist is the innovative PIN code encrypted flash drive and solid state drives. The hardware encryption via a keypad on the face of the device is a product that has been in use by the military (the device is protected by Federal Information Processing Standard (FIPS) Publication 140-2). The keypad accepts a PIN that can be 7 to 15 digits long. When data is transferred into the memory stick the encryption happens on the fly because of inbuilt hardware that is powered by rechargeable Li-ion batteries. When the USB stick is removed from the PC the device is in lock down mode and only the input of the password will allow access. Inputting wrong PIN (at least 10 times) will render the USB stick to self-destruct. This is a disk storage system straight out of a James Bond movie. The device is impenetrable to brute force attacks as it has nil dependency on external computing device.
0 notes
batessecuredatasa-blog · 9 years ago
Text
Understanding OTDR testing
OTDR stands for optical time-domain reflect meters which is perhaps the most important testing equipment in network testers where fiber optic cabling is concerned.
To understand OTDR fiber tester an explanation of insertion loss test is necessary. This test is made with a light source that is placed at one end of the cable and a power meter measures loss at the other end.
In an OTDR the test is similar to radar. A pulse signal is sent down the fiber and looks for a return signal. The display is read as a trace or signature. Two factors determine the shape of the signature - reflectance and backscatter.
Reflectance signals are the peaks in the OTDR trace that are produced by the polished fiber end at a connector or splice where light is reflected back up the fiber.
Backscatter is a smaller signal caused by the interaction of the light with the molecules in the fiber. When light strikes the molecules of the glass, some light is scattered and a small amount goes back up the fiber to the OTDR where it is amplified and measured. Both reflectance and backscatter are measured in decibels (dB) on the vertical axis of the OTDR trace.
The OTDR signal has the following characteristics
·  Uses a pulse traveling down the fiber
·  Signal varies over time
·  Graph on display is optical power in dB (decibels) versus length of fiber
Signal loss is attenuated due to scattering and ‘absorption
On the display the trace is
·   A line sloping down
·   Reads the attenuation coefficient of the fiber
When test signal goes past a splice
·  The loss of splice causes signal to decrease
·  Seen as a drop in the trace line
·  The drop indicates where the splice is located
The OTDR trace can also detect connection joints
·  Line will show a drop
·  Also show reflectance in connection
·  Line will show a peak
Drawbacks of an OTDR
·   They are expensive
·   They are complex devices
·   Setting up OTDR needs expert knowledge
Errors in interpreting OTDR data can be avoided
·   By having trained and experienced user
·   Who understands ghosts, gainers and other quirks of OTDR traces.
1 note · View note