GuardIAN网络支持GuardIAN信标点和应急避险舱与GuardIAN 智能网络的集成。 GuardIAN网络是专为地下采矿环境而设计的，它使用单根同轴电缆来承载电源和数据。
GuardIAN网络使电源与数据一起通过通信电缆传输，从而消除隔离分布。 电力中心可以每1-2公里合并一次。 提供半刚性铝和半英寸同轴电缆。
半刚性: ELE-GC-CBL-008 / 灵活: ELE-GC-CBL-009
A set of rules or common network language.
A protocol stack refers to a group of protocols that are concurrently running that are employed for the implementation of a network protocol suite.
The protocols in a stack determine the interconnectivity rules for a layered network model such as in the OSI or TCP/IP models. To become a stack, the protocols must be interoperable; being able to connect both vertically between the layers of the network and horizontally between the end-points of each transmission segment.
Protocol Data Unit
A Protocol Data Unit (PDU) is a specific block of information transferred over a network. It is often used in reference to the OSI model, since it describes the different types of data that are transferred from each layer.
Ethernet is the traditional technology for connecting wired local area networks (LANs), enabling devices to communicate with each other via a protocol.
Ethernet describes how network devices can format and transmit data packets so other devices on the same local or campus area network segment can recognise, receive and process them. An Ethernet cable is the physical, encased wiring over which the data travels.
Any device accessing a geographically localised network using a cable -- i.e., with a wired rather than wireless connection -- likely uses Ethernet.
The Ethernet protocol touches both Layer 1 - the physical layer, and Layer 2 - the data link layer, on the OSI network protocol model. Ethernet defines two units of transmission: packet and frame.
The frame includes not just the payload of data being transmitted, but also:
• the physical media access control (MAC) addresses of both the sender and receiver;
• VLAN tagging and quality of service information; and
• error correction information to detect transmission problems.
Each frame is wrapped in a packet that contains several bytes of information to establish the connection and mark where the frame starts.
Ethernet vs. Wireless
Compared to wireless LAN technology, Ethernet is typically less vulnerable to disruptions -- whether from radio wave interference, physical barriers or bandwidth hogs. It can also offer a greater degree of network security and control than wireless technology, as devices must connect using physical cabling.
Power over Ethernet
Power over Ethernet (PoE) is a technology for wired Ethernet local area networks (LANs) that allows the electrical current necessary for the operation of each device to be carried by the data cables rather than by power cords.
For PoE to work, the electrical current must go into the data cable at the power-supply end, and come out at the device end, in such a way that the current is kept separate from the data signal so that neither interferes with the other. The current enters the cable using a component called an injector. If the device at the other end of the cable is PoE compatible, then that device will function properly without modification. If the device is not PoE compatible, then a component called a picker (or tap) must be installed to remove the current from the cable.
Ethernet network switches are broadly categorised into two main categories – modular and fixed configuration.
Fixed configuration switches are switches with a fixed number of ports and are typically not expandable. The fixed configuration switch category is further broken down into unmanaged switches, smart switches, and managed L2 and L3 switches.
Managed Layer 2 Switch
Managed switches are designed to deliver the most comprehensive set of features to provide the best application experience, the highest levels of security, the most precise control and management of the network, and offer the greatest scalability in the fixed configuration category of switches. As a result, managed switches are deployed as aggregation/access switches in extensive networks or as core switches in relatively smaller networks. Managed switches should support both L2 switching
and L3 IP routing though you’ll find some with only L2 switching support.
From a security perspective, managed switches protect the data plane (user traffic being forwarded), control plane (traffic being communicated between networking devices to ensure user traffic goes to the right destination), and management plane (traffic used to manage the network or device itself). Managed switches also offer network storm control, denial-of-service protection, and much more.
The Access Control List capabilities allow for flexibly dropping, rate limiting, mirroring, or logging of traffic by L2 address, L3 address, TCP/UDP port numbers, Ethernet type, ICMP or TCP flags, etc.
Managed switches are rich in features that enable them to protect themselves and the network from deliberate or unintended Denial of Service attacks. It includes Dynamic ARP Inspection, IPv4 DHCP snooping, IPv6 First Hop Security with RA Guard, ND Inspection, Neighbor Binding Integrity, and much more.
A bit (short for binary digit) is the smallest unit of data in a computer. A bit has a single binary value, either 0 or 1.
Coaxial cable aka coax is a type of copper cable specially built with a metal shield and other components engineered to block signal interference. Coaxial cables tend to carry signals at a greater distance and are a good choice for weak signals, due to their layered protection.
The Open Systems Interconnection (OSI) reference model is a layered, conceptual framework that stereotypes the communication functions of a networking or telecommunication system, without regard to its internal technology or structure.
The OSI model aims to define the interoperability of diverse communication systems with standard communication protocols. This methodology is achieved by dividing the networking process into seven logical layers, each with its unique functionality.
Information is passed from one layer to the next, starting at the Application layer on the transmitting host, and proceeding down the hierarchy to the Physical layer, then passing over the communications channel to the destination host, where the information moves back up the hierarchy, ending at the Application layer.
1. Physical 2. Data Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application