同轴电缆网络连接-GuardIAN网络

使用GuardIAN网络同轴电缆享受轻松网络连接-高速、符合目标、线性接入层网络。

GuardIAN网络支持GuardIAN信标点和应急避险舱与GuardIAN 智能网络的集成。 GuardIAN网络是专为地下采矿环境而设计的,它使用单根同轴电缆来承载电源和数据。

Coaxial Cable Network Connection - GuardIANConnect

GuardIAN网络使电源与数据一起通过通信电缆传输,从而消除隔离分布。 电力中心可以每1-2公里合并一次。

以太网供电(PoE+)插座可从需要终端设备(如GuardIAN信标点和照明设备)的监护连接电缆上分接。

  • 分配可靠的、符合标准的电源
  • 全速以太网通信
  • 与站点的首选网络设备兼容
  • •可以由地下作业技术人员进行安装和维护-操作似漏水进料器一般简单

GuardIAN网络作为泄露电缆系统,易于安装,同时提供高速以太网网络,它采用经济适用的办法为地下网络连接提供高效解决方案。

地下技术人员可以轻松推进和分离网络,并根据需要添加其他端口。 即便在潮湿、肮脏的环境中,作业人员仍可仅使用基本工具便轻松修复受损网络。

同轴电缆网络连接-GuardIAN网络

门户站点

GuardIAN网络门户站点是连接现有数据网络边缘与同轴电缆的桥梁。

ELE-GC-COM-001

四端口

GuardIAN网络四端口可在需要的地方断开符合标准的以太网供电(PoE)端口,为任何行业的以太网设备提供电源和数据回传。

ELE-GC-COM-002

分配器

GuardIAN网络分配器平均分配同轴电缆,因此系统可以沿两个不同的方向前进。 存在于任何一个端口上的直流电源也将传递到分离器的其他端口。

ELE-GC-COM-005

分支

GuardIAN网络分支从同轴电缆中抽出一部分电源和信号,可以使四端点在需要的任何地方拼接到线路中。

ELE-GC-COM-007

直流接头

在直流电源之后立即安装GuardIAN网络直流接头,以使常规直流电源电缆适应同轴电缆格式; 保护同轴电缆和通信设备免于承受施加于系统的过大的电压。

ELE-GC-BRE-001

中继器

GuardIAN网络中继器以数字方式重新生成数据信号,从而可以无限延长同轴电缆段。 长度小于一公里的同轴电缆段不需要中继器。

ELE-GC-COM-004

电源插入器

GuardIAN网络电源插入器将直流电源导入到同轴电缆上。直流电源沿着同轴电缆流动,从而操作通信系统和连接到该系统本行业的以太网设备。

ELE-GC-PWR-001

同轴电缆

GuardIAN网络使电源与数据一起通过通信电缆传输,从而消除隔离分布。 电力中心可以每1-2公里合并一次。 提供半刚性铝和半英寸同轴电缆。

半刚性: ELE-GC-CBL-008 / 灵活: ELE-GC-CBL-009

纤维

  • 昂贵的部署和维护
  • 维修不切实际
  • 灵活性差
  • •每个以太网插座需要的电源,或通过单独的电缆发送

电缆调制解调器

  • 维护复杂
  • 头端(CMTS)是单点故障
  • 数据速率在所有端点之间共享
  • •断开以太网端口并为其供电是复杂且昂贵的

泄露馈线

  • 有限的数据速率
  • •仅适用于少数以太网端点

术语

描述

Protocol

A set of rules or common network language.

Protocol Stack

A protocol stack refers to a group of protocols that are concurrently running that are employed for the implementation of a network protocol suite.

The protocols in a stack determine the interconnectivity rules for a layered network model such as in the OSI or TCP/IP models. To become a stack, the protocols must be interoperable; being able to connect both vertically between the layers of the network and horizontally between the end-points of each transmission segment.

Protocol Data Unit

A Protocol Data Unit (PDU) is a specific block of information transferred over a network. It is often used in reference to the OSI model, since it describes the different types of data that are transferred from each layer.

Ethernet

Ethernet is the traditional technology for connecting wired local area networks (LANs), enabling devices to communicate with each other via a protocol.

Ethernet describes how network devices can format and transmit data packets so other devices on the same local or campus area network segment can recognise, receive and process them. An Ethernet cable is the physical, encased wiring over which the data travels.

Any device accessing a geographically localised network using a cable -- i.e., with a wired rather than wireless connection -- likely uses Ethernet.

The Ethernet protocol touches both Layer 1 - the physical layer, and Layer 2 - the data link layer, on the OSI network protocol model. Ethernet defines two units of transmission: packet and frame.

Frame

The frame includes not just the payload of data being transmitted, but also:

• the physical media access control (MAC) addresses of both the sender and receiver;
• VLAN tagging and quality of service information; and
• error correction information to detect transmission problems.

Packet

Each frame is wrapped in a packet that contains several bytes of information to establish the connection and mark where the frame starts.

Ethernet vs. Wireless

Compared to wireless LAN technology, Ethernet is typically less vulnerable to disruptions -- whether from radio wave interference, physical barriers or bandwidth hogs. It can also offer a greater degree of network security and control than wireless technology, as devices must connect using physical cabling.

Power over Ethernet

Power over Ethernet (PoE) is a technology for wired Ethernet local area networks (LANs) that allows the electrical current necessary for the operation of each device to be carried by the data cables rather than by power cords.

For PoE to work, the electrical current must go into the data cable at the power-supply end, and come out at the device end, in such a way that the current is kept separate from the data signal so that neither interferes with the other. The current enters the cable using a component called an injector. If the device at the other end of the cable is PoE compatible, then that device will function properly without modification. If the device is not PoE compatible, then a component called a picker (or tap) must be installed to remove the current from the cable.

Network Switch

Ethernet network switches are broadly categorised into two main categories – modular and fixed configuration.

Fixed configuration switches are switches with a fixed number of ports and are typically not expandable. The fixed configuration switch category is further broken down into unmanaged switches, smart switches, and managed L2 and L3 switches.

Managed Layer 2 Switch

Managed switches are designed to deliver the most comprehensive set of features to provide the best application experience, the highest levels of security, the most precise control and management of the network, and offer the greatest scalability in the fixed configuration category of switches. As a result, managed switches are deployed as aggregation/access switches in extensive networks or as core switches in relatively smaller networks. Managed switches should support both L2 switching
and L3 IP routing though you’ll find some with only L2 switching support.

From a security perspective, managed switches protect the data plane (user traffic being forwarded), control plane (traffic being communicated between networking devices to ensure user traffic goes to the right destination), and management plane (traffic used to manage the network or device itself). Managed switches also offer network storm control, denial-of-service protection, and much more.
The Access Control List capabilities allow for flexibly dropping, rate limiting, mirroring, or logging of traffic by L2 address, L3 address, TCP/UDP port numbers, Ethernet type, ICMP or TCP flags, etc.

Managed switches are rich in features that enable them to protect themselves and the network from deliberate or unintended Denial of Service attacks. It includes Dynamic ARP Inspection, IPv4 DHCP snooping, IPv6 First Hop Security with RA Guard, ND Inspection, Neighbor Binding Integrity, and much more.

Bit

A bit (short for binary digit) is the smallest unit of data in a computer. A bit has a single binary value, either 0 or 1.

Coaxial Cable

Coaxial cable aka coax is a type of copper cable specially built with a metal shield and other components engineered to block signal interference. Coaxial cables tend to carry signals at a greater distance and are a good choice for weak signals, due to their layered protection.

OSI Model

The Open Systems Interconnection (OSI) reference model is a layered, conceptual framework that stereotypes the communication functions of a networking or telecommunication system, without regard to its internal technology or structure.

The OSI model aims to define the interoperability of diverse communication systems with standard communication protocols. This methodology is achieved by dividing the networking process into seven logical layers, each with its unique functionality.
Information is passed from one layer to the next, starting at the Application layer on the transmitting host, and proceeding down the hierarchy to the Physical layer, then passing over the communications channel to the destination host, where the information moves back up the hierarchy, ending at the Application layer.

1. Physical 2. Data Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application

Learn More About GuardIAN Connect

Discover how GuardIAN Connect can in be utilised to connect the entire GuardIAN Intelligence Network... and more!

Click on the video opposite.

Related Products