Breaking Through the Myths to Reality: a Future-Proof View Of

Total Page:16

File Type:pdf, Size:1020Kb

Breaking Through the Myths to Reality: a Future-Proof View Of Breaking Through the Myths to Reality A Future-Proof View of Fiber Optic Inspection and Cleaning Dear Viewer: As presented at BICSI® in February- 2018, this seminar has video and animations that Edward J. Forrest, Jr. are not available as a .pdf file. If you would like the RMS(RaceMarketingServices) original version, please contact BICSI or the author. Bringing Ideas Together Caution: This Presentation is going to be controversial! IT IS BASED ON 2,500 YEARS OF SCIENCE AND PRODUCT DEVELOPMENT 2 Fact OR FICTION of Fiber Optic Cleaning and Inspection This seminarWE WILL mayDISCUSS contradictAND currentDEFINE: trends ➢ There➢ Cleaningand are what OTHER you’ve is notWAYS been important…BESIDES taught. VIDEO ➢ ➢➢“Automatic99.9%Debris➢ ➢ExistingA “Reagent FiberonS Detection” CIENTIFICthe standards, Optic surface Grade” ConnectorR isEALITY of such“good Isopropanola fiber… as enough”.is optic a is IECconnector“Pass 61300Let’sanI NSPECTIONanythingeffective- Fail”separate- 3surface-35, is is bettereasy are Factsfiberto is “Best determine thantwoto from optic understand nothing!-dimensional Practice”Fiction cleaner What we’veTwoif the ( ALL-Dimensional connector) been taught/bought/soldand is Structure“clean” over the last 30+Myth yearsfrom may“diameter”. Scientific not be the same Reality thing! 3 Fact OR FICTION of Fiber Optic Cleaning and Inspection ➢ A Fiber Optic Connector is a Two-Dimensional Structure ➢ 99.9% “Reagent Grade” Isopropanol is an effective fiber optic cleaner ➢ Cleaning is not important… anything is better than nothing! ➢ There are OTHER WAYS BESIDES VIDEO INSPECTION to determine if the connector is “clean” ➢ Debris on the surface of a fiber optic connector surface is two-dimensional “diameter”. ➢ “Automatic Detection” is “good enough”. “Pass-Fail” is easy to understand ➢ Existing standards, such as IEC 61300-3-35, are “Best Practice” 4 Fact OR FICTION of FiberW OpticHAT ISCleaningTHE “AUTHORITY and Inspection” ? PRECISION CLEANING AND INSPECTION ISN’T “NEW”. ▪ ‘WaferThis Fabs’ seminar WforE electronicWILL mayDISCUSS contradict componentsAND (LEDs,currentDEFINE CPU, RF…): trends ▪ ➢HighThere-density➢ Cleaningand printedare what OTHER circuit you’ve is boards notWAYS been important… (PickBESIDES & taught. Place) VIDEO ➢▪ ➢➢Metal“Automatic99.9%Debris➢ CleaningExisting “Reagent (Aerospace,onS Detection” CIENTIFICthe standards, Nuclear, surface Grade”Gas & Oil)R isEALITY of such“good Isopropanola fiber… as enough”. optic is ➢Let’sA anythingFiber separate Optic is better Facts Connector than from nothing! is a ▪ ImplantableIECconnector“Pass 61300an medicalI NSPECTIONeffective-Fail”- 3surface devices-35, is easyare fiber(Cochlear,to is “Best determine twoto Cardiac, optic understand- Prosthetic)dimensional Practice”Fiction cleaner What we’veTwoif the ( ALL-Dimensional connector) been taught/bought/soldand is Structure“clean” over the last A well-established30+ years performancefrom may“diameter”. Scientific not history be the ofsame Reality precision thing! cleaning and inspection onMyth which our Industry can base itself…and has not. 5 Please join me: In Search of: Best Practice Best practice - Wikipedia https://en.wikipedia.org/wiki/Best_practice “A best practice* is a method or technique … that produces results … superior to those achieved by other means….” *Merriam-Webster Dictionary, Cambridge Dictionary, Investopedia®, Business-Dictionary®, Technopedia® www.fiberopticprecisioncleaning.com 6 What Does It Mean? “Future-Proof”* Kilobit 2006-ish Tech! 1. Processes that anticipate Megabit 2014-ish range future developments. Gigabit New super-channels Terabit 2. Actions taken to minimize negative 2018 experimental Petabit ranges consequences. Exabit Zettabit 3. Change old perceptions into new realities Yottabit Brontobit * adjective: British. Oxford® Dictionary. Technipedia®, Cambridge® Dictionary, Wikipedia® Really? 7 What Does It Mean? “Future-Proof”* Kilobit 2006-ish Tech! 1.“DoProcesses all aspectsthat ofanticipate Fiber Optic Network Megabit 2014-ish range futureDesign, developments. Installation and Training Gigabit New super-channels Terabit 2. Actions takenDevelopment?” to minimize negative 2018 experimental Petabit ranges consequences. Exabit advance at Zettabit 3. Change old perceptions into new realities Yottabit The Speed of Light? “Maybe…”Brontobit Is that good enough? Really? * adjective: British. Oxford® Dictionary. Technipedia®, Cambridge® Dictionary, Wikipedia® 8 Buzz Words? Future Best Proof Practice Or: The Way Forward 9 Myth or Reality? WhatTHE is“ MYTHthe “end” face”?OF TWO-DIMENSIONS Is the IEC 61300-3-35 definition of a two1.) - CdimensionalONNECTORS surfaceARE adequateTWO-DIMENSIONS 1 and accurate? 2 2.) CONTAMINATION IS TWO-DIMENSIONS “Zone-1” … is the “fiber/core” 3 “Zone3.) C-ONTAMINATION2” … is the reflectiveIS claddingLIMITED TO AN “END FACE” “Zone-3” … is the contact surface The reality of 3-D Images © RMS-1 (all Rights Reserved) 10 Myth or Reality? THE “MYTH” OF TWO-DIMENSIONS 1.) Connectors are two-dimensions 2.) Contamination is two-dimensions 3.) Contamination is limited to a limited “end face” surface area diameter The reality of 3-D Images © RMS-1 (all Rights Reserved) 11 Myth The fiber optic end face and associated or Reality? components are 3-D structures! Add Zone-4 and Zone-5 to your understanding of any fiber optic Horizontal surface 4 Plane of the Ferrule Vertical Includes Planes of these the surfaces Ferrule also! 5 Images © RMS-1 12 Myth Happens How does contamination “get there”? Sometimes, it’s “impossible” grasp the vast and infinite nature of our universe of installations! We want “it” to be ‘easy’… Condensation Transfer from Could not make moving… “it”from truck can also be accurate and effective.‘jumper to back this one up! to install plane’ 13 Myth Happens How does contamination “get“it” there”?” Sometimes, it’s “impossible”▪ Accurate grasp and adequate the vast design and infinite nature ofparameters our universe of installations!▪ Installation methods and procedures We want “it” to be ‘easy’… Condensation Transfer from Could▪ notEffective make “best practice” training moving… “it”from truck can also be accurate and effective.‘jumper to back this one up! to install plane’ 14 15 4 A brief lesson in the History of Physics and Geometry! Early 1900’s Planck’s Quantum Theory of Physics Max revolutionized our understanding of Atomic and Subatomic structures; Einstein’s Theory of Relativity revolutionized our understanding of space and time. Planck’s work on sub-atomic structures defined them as 3-D … and tied Euclidean mathematical science to physics! Al All contents © 2017 RMS (RaceMarketingServices) 16 A brief lesson in the History of Physics and Geometry! Early 1900’s …about the year ➢1590,Euclid twodefined Dutch Geometry spectacle in makers, Zaccharias two-dimensions ... about 2,500 JanssenPlanck’s and Quantum his fatheryears Theory Hans ago. ofstarted Physics experimenting … put several revolutionized our understanding of Atomic and lenses in a ➢tubeIn 100AD and-ish madethe astronomer an significant Ptolemy discovery. Max Subatomic structures;looked Einstein’s at the heavens Theory and realized of Relativity revolutionized thereour understandingwas “distance”. of space and➢ Intime. 1492 Columbus sailed “west” to find the “east” leading to THEYcivilization’sHAD JUST understandingINVENTED the THE Planck’s work onCOMPOUND subworld-atomic is a 3-D structure. structuresMICROSCOPE … defined them as 3-D➢ In… the and 17th Century, tied Euclidean Descartes expandedPRECURSOR on Euclidian geometryTO mathematical sciencewith his work to onphysics! spheres … 3-D Al CONTEMPORARYscience we know today.VIDEO INSPECTION These are considered ‘mathematical’ sciences…until: All contents © 2017 RMS (RaceMarketingServices) 17 THESE HISTORICAL THEORIES AND PRACTICAL REALITIES ARE ESSENTIAL TO PRECISION INSPECTION AND PRECISION CLEANING FIBER OPTICS! 1. Existing precision cleaning and inspection standards are based on “Euclidian 2-D geometry”. 2. Ptolemy, Descartes, Planck, Einstein and Chis Columbus taught us … about what we know as you are sitting there today in the here & now: 3. WE EXIST IN 3-DIMENSIONS! 18 A brief lesson in the History of Physics and Geometry! IT’S TRUE: ➢ Euclid defined Geometry in two-dimensions ... about 2,500 years ago. We are inspecting➢ In and100AD- ishcleaningthe astronomerfiber Ptolemy optic connectionsMax nd looked at the heavens and realized based on 2 Centurythere was “distance”. (BC) Euclidean Geometry and Microscopes➢ In 1492 invented Columbus sailed in “west” the to 16th Century! find the “east” leading to civilization’s understanding the world is a 3-D structure. ➢ In the 17th Century, Descartesst It’s time toexpanded … “ onGo Euclidian 21 geometryCentury ” … with his work on spheres … 3-D Al with our thinkingscience we know about today. these things!!! These are considered ‘mathematical’ sciences…until: All contents © 2017 RMS (RaceMarketingServices) 19 Myth or Reality? THE “MYTH” OF TWO-DIMENSIONS CONNECTORS ARE NOT TWO-DIMENSIONAL STRUCTURES 20 IEC 61300-3-35 Measures Debris & Contamination in “Diameter of Set the Record Straight! Contamination, The “red” on this in any or all interferometer scale is (max) forms, 1.67 microns in is NOT width and height. two-dimensions. 21 Mini-Conclusions: Myth or Reality? Who has the ‘need to know’? AN INDUSTRY-WIDE UPDATE IS IN PROCESS No matter the application or connection type … when deploying fiber optics … there is an end face and associated connector geometry that must be cleaned and inspected … properly. Future
Recommended publications
  • Telematics Chapter 3: Physical Layer
    Telematics User Server watching with video Chapter 3: Physical Layer video clip clips Application Layer Application Layer Presentation Layer Presentation Layer Session Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Data Link Layer Data Link Layer Data Link Layer Physical Layer Physical Layer Physical Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller Computer Systems and Telematics (CST) Institute of Computer Science Freie Universität Berlin http://cst.mi.fu-berlin.de Contents ● Design Issues ● Theoretical Basis for Data Communication ● Analog Data and Digital Signals ● Data Encoding ● Transmission Media ● Guided Transmission Media ● Wireless Transmission (see Mobile Communications) ● The Last Mile Problem ● Multiplexing ● Integrated Services Digital Network (ISDN) ● Digital Subscriber Line (DSL) ● Mobile Telephone System Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.2 Design Issues Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.3 Design Issues ● Connection parameters ● mechanical OSI Reference Model ● electric and electronic Application Layer ● functional and procedural Presentation Layer ● More detailed ● Physical transmission medium (copper cable, Session Layer optical fiber, radio, ...) ● Pin usage in network connectors Transport Layer ● Representation of raw bits (code, voltage,…) Network Layer ● Data rate ● Control of bit flow: Data Link Layer ● serial or parallel transmission of bits Physical Layer ● synchronous or asynchronous transmission ● simplex, half-duplex, or full-duplex transmission mode Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.4 Design Issues Transmitter Receiver Source Transmission System Destination NIC NIC Input Abcdef djasdja dak jd ashda kshd akjsd asdkjhasjd as kdjh askjda Univ.-Prof.
    [Show full text]
  • Preface Towards the Reality of Petabit Networks
    Preface Towards the Reality of Petabit Networks Yukou Mochida Member of the Board Fujitsu Laboratories Ltd. The telecommunications world is shifting drastically from voice oriented telephone networks to data oriented multimedia networks based on the Internet protocol (IP). Telecommunication carriers are positively extending their service attributes to new applications, and suppliers are changing their business areas and models, conforming to the radical market changes. The Internet, which was originally developed for correspondence among researchers, has evolved into a global communi- cations platform. Improvements in security technology are encouraging businesses to integrate the Internet into their intranets, and the eco- nomic world and basic life styles are being changed by the many new Internet-based services, for example, electronic commerce (EC), that have become available. This revolutionary change in telecommunications seems to come mainly from three motive forces. The first is the information society that has come into being with the wide and rapid deployment of person- al computers and mobile communications. The second is the worldwide deregulation and the resulting competitive telecommunications envi- ronment, which facilitates active investment in the growing market to construct huge-capacity networks for exploding traffic. The third is photonic networks based on wavelength division multiplexing (WDM) technology, which can greatly increase the communication capacity and drastically decrease the transmission cost per channel. Photonic net- works are attractive because they can also radically improve node throughput and offer transparency and flexibility while accommodating different signal formats and protocols, expandability for cost-effective gradual deployment, and high reliability, which is strongly required for a secure information society.
    [Show full text]
  • How Many Bits Are in a Byte in Computer Terms
    How Many Bits Are In A Byte In Computer Terms Periosteal and aluminum Dario memorizes her pigeonhole collieshangie count and nagging seductively. measurably.Auriculated and Pyromaniacal ferrous Gunter Jessie addict intersperse her glockenspiels nutritiously. glimpse rough-dries and outreddens Featured or two nibbles, gigabytes and videos, are the terms bits are in many byte computer, browse to gain comfort with a kilobyte est une unité de armazenamento de armazenamento de almacenamiento de dados digitais. Large denominations of computer memory are composed of bits, Terabyte, then a larger amount of nightmare can be accessed using an address of had given size at sensible cost of added complexity to access individual characters. The binary arithmetic with two sets render everything into one digit, in many bits are a byte computer, not used in detail. Supercomputers are its back and are in foreign languages are brainwashed into plain text. Understanding the Difference Between Bits and Bytes Lifewire. RAM, any sixteen distinct values can be represented with a nibble, I already love a Papst fan since my hybrid head amp. So in ham of transmitting or storing bits and bytes it takes times as much. Bytes and bits are the starting point hospital the computer world Find arrogant about the Base-2 and bit bytes the ASCII character set byte prefixes and binary math. Its size can vary depending on spark machine itself the computing language In most contexts a byte is futile to bits or 1 octet In 1956 this leaf was named by. Pages Bytes and Other Units of Measure Robelle. This function is used in conversion forms where we are one series two inputs.
    [Show full text]
  • Broadband/IP/Cloud Computing
    Broadband/IP/Cloud Computing Presentation to the Colorado Telecommunications Association www.cellstream.com (c) 2011 CellStream, Inc. 1 www.cellstream.com (c) 2011 CellStream, Inc. 2 www.cellstream.com (c) 2011 CellStream, Inc. 3 www.cellstream.com (c) 2011 CellStream, Inc. 4 www.cellstream.com (c) 2011 CellStream, Inc. 5 Past vs. Present The Past – 20th Century The Present – 21st Century • Peer-to-Peer with broadcast • Many-to-Many with multicast • Mix of Analog and Digital • All media is digital – single • Producers supply transport Consumers • All media is connected • Peer-to-Peer is 1:1 • Many-to-Many is M:N o Traditional Telephone • Producers and Consumers • Broadcast is 1:N do both o Newspaper o CNN takes reports from Twitter o TV/Radio o End users send pictures and reports www.cellstream.com (c) 2011 CellStream, Inc. 6 Where are we in Phone Evolution? PHONE 1.0 PHONE 2.0 PHONE 3.0 Soft phone Your Phone Number Your Phone Number Your Phone Number represents where you represents you represents an IP Address – are (e.g. 972-747- regardless of where you independent of location 0300 is home, 214- are. and appliance you are 405-3708 is work) using (e.g. IP Phone, Cell Phone, PDA, Computer, Television, etc.) www.cellstream.com (c) 2011 CellStream, Inc. 7 Phone 3.X • Examples of Phone 3.0 are Skype, Google Talk, others on a PC. • Phone 3.1 – Skype on an iTouch • Phone 3.2 – Android OS from Google – a phone Centric OS that runs on cellular appliances • Phone 3.3 – Android OS from Google that runs on a Phone Appliance www.cellstream.com (c) 2011 CellStream, Inc.
    [Show full text]
  • Etir Code Lists
    eTIR Code Lists Code lists CL01 Equipment size and type description code (UN/EDIFACT 8155) Code specifying the size and type of equipment. 1 Dime coated tank A tank coated with dime. 2 Epoxy coated tank A tank coated with epoxy. 6 Pressurized tank A tank capable of holding pressurized goods. 7 Refrigerated tank A tank capable of keeping goods refrigerated. 9 Stainless steel tank A tank made of stainless steel. 10 Nonworking reefer container 40 ft A 40 foot refrigerated container that is not actively controlling temperature of the product. 12 Europallet 80 x 120 cm. 13 Scandinavian pallet 100 x 120 cm. 14 Trailer Non self-propelled vehicle designed for the carriage of cargo so that it can be towed by a motor vehicle. 15 Nonworking reefer container 20 ft A 20 foot refrigerated container that is not actively controlling temperature of the product. 16 Exchangeable pallet Standard pallet exchangeable following international convention. 17 Semi-trailer Non self propelled vehicle without front wheels designed for the carriage of cargo and provided with a kingpin. 18 Tank container 20 feet A tank container with a length of 20 feet. 19 Tank container 30 feet A tank container with a length of 30 feet. 20 Tank container 40 feet A tank container with a length of 40 feet. 21 Container IC 20 feet A container owned by InterContainer, a European railway subsidiary, with a length of 20 feet. 22 Container IC 30 feet A container owned by InterContainer, a European railway subsidiary, with a length of 30 feet. 23 Container IC 40 feet A container owned by InterContainer, a European railway subsidiary, with a length of 40 feet.
    [Show full text]
  • File Organization and Management Com 214 Pdf
    File organization and management com 214 pdf Continue 1 1 UNESCO-NIGERIA TECHNICAL - VOCATIONAL EDUCATION REVITALISATION PROJECT-PHASE II NATIONAL DIPLOMA IN COMPUTER TECHNOLOGY FILE Organization AND MANAGEMENT YEAR II- SE MESTER I THEORY Version 1: December 2 2 Content Table WEEK 1 File Concepts... 6 Bit:... 7 Binary figure... 8 Representation... 9 Transmission... 9 Storage... 9 Storage unit... 9 Abbreviation and symbol More than one bit, trit, dontcare, what? RfC on trivial bits Alternative Words WEEK 2 WEEK 3 Identification and File File System Aspects of File Systems File Names Metadata Hierarchical File Systems Means Secure Access WEEK 6 Types of File Systems Disk File Systems File Systems File Systems Transactional Systems File Systems Network File Systems Special Purpose File Systems 3 3 File Systems and Operating Systems Flat File Systems File Systems according to Unix-like Operating Systems File Systems according to Plan 9 from Bell Files under Microsoft Windows WEEK 7 File Storage Backup Files Purpose Storage Primary Storage Secondary Storage Third Storage Out Storage Features Storage Volatility Volatility UncertaintyAbility Availability Availability Performance Key Storage Technology Semiconductor Magnetic Paper Unusual Related Technology Connecting Network Connection Robotic Processing Robotic Processing File Processing Activity 4 4 Technology Execution Program interrupts secure mode and memory control mode Virtual Memory Operating Systems Linux and UNIX Microsoft Windows Mac OS X Special File Systems Journalized File Systems Graphic User Interfaces History Mainframes Microcomputers Microsoft Windows Plan Unix and Unix-like operating systems Mac OS X Real-time Operating Systems Built-in Core Development Hobby Systems Pre-Emptification 5 5 WEEK 1 THIS WEEK SPECIFIC LEARNING OUTCOMES To understand: The concept of the file in the computing concept, field, character, byte and bits in relation to File 5 6 6 Concept Files In this section, we will deal with the concepts of the file and their relationship.
    [Show full text]
  • IBM-IS-DCI-UR-Newsletter.Pdf
    Monthly Newsletter Mar 2016 Monthly Journal on Technology Know-How of IBM’s Technology space Tech Updates on Mainframe Platform “Mainframe“ the IBM Dictionary Of Computing defines "mainframe" as "a large computer, in particular one to which other computers can be connected so that they can share facilities the mainframe provides (for example, a System/370 computing system to which personal computers are attached so that they can upload and download programs and data). The term “Mainframe “ usually refers to hardware only, namely, main storage, execution circuitry and peripheral units“ level, as opposed to trying to do it all from the System z platform. Did you know that mainframes and all other computers have two types of physical storage: Internal and external. Physical storage located on the mainframe processor itself. This is called processor storage, real storage or central storage; think of it as memory for the mainframe. Physical storage external to the mainframe, including storage on direct access devices, such as disk drives and tape drives. This storage is called paging storage or auxiliary storage. The primary difference between the two kinds of storage relates to the way in which it is accessed, as follows: Central storage is accessed synchronously with the processor. That is, the processor must wait while data is retrieved from central storage. Auxiliary storage is accessed asynchronously. The processor accesses auxiliary storage through an input/output (I/O) request, which is scheduled to run amid other work requests in the system. During an I/O request, the processor is free to execute other, unrelated work.
    [Show full text]
  • Dictionary of Ibm & Computing Terminology 1 8307D01a
    1 DICTIONARY OF IBM & COMPUTING TERMINOLOGY 8307D01A 2 A AA (ay-ay) n. Administrative Assistant. An up-and-coming employee serving in a broadening assignment who supports a senior executive by arranging meetings and schedules, drafting and coordinating correspondence, assigning tasks, developing presentations and handling a variety of other administrative responsibilities. The AA’s position is to be distinguished from that of the executive secretary, although the boundary line between the two roles is frequently blurred. access control n. In computer security, the process of ensuring that the resources of a computer system can be accessed only by authorized users in authorized ways. acknowledgment 1. n. The transmission, by a receiver, of acknowledge characters as an affirmative response to a sender. 2. n. An indication that an item sent was received. action plan n. A plan. Project management is never satisfied by just a plan. The only acceptable plans are action plans. Also used to mean an ad hoc short-term scheme for resolving a specific and well defined problem. active program n. Any program that is loaded and ready to be executed. active window n. The window that can receive input from the keyboard. It is distinguishable by the unique color of its title bar and window border. added value 1. n. The features or bells and whistles (see) that distinguish one product from another. 2. n. The additional peripherals, software, support, installation, etc., provided by a dealer or other third party. administrivia n. Any kind of bureaucratic red tape or paperwork, IBM or not, that hinders the accomplishment of one’s objectives or goals.
    [Show full text]
  • The 2016 SNIA Dictionary
    A glossary of storage networking data, and information management terminology SNIA acknowledges and thanks its Voting Member Companies: Cisco Cryptsoft DDN Dell EMC Evaluator Group Fujitsu Hitachi HP Huawei IBM Intel Lenovo Macrosan Micron Microsoft NetApp Oracle Pure Storage Qlogic Samsung Toshiba Voting members as of 5.23.16 Storage Networking Industry Association Your Connection Is Here Welcome to the Storage Networking Industry Association (SNIA). Our mission is to lead the storage industry worldwide in developing and promoting standards, technologies, and educational services to empower organizations in the management of information. Made up of member companies spanning the global storage market, the SNIA connects the IT industry with end-to-end storage and information management solutions. From vendors, to channel partners, to end users, SNIA members are dedicated to providing the industry with a high level of knowledge exchange and thought leadership. An important part of our work is to deliver vendor-neutral and technology-agnostic information to the storage and data management industry to drive the advancement of IT technologies, standards, and education programs for all IT professionals. For more information visit: www.snia.org The Storage Networking Industry Association 4360 ArrowsWest Drive Colorado Springs, Colorado 80907, U.S.A. +1 719-694-1380 The 2016 SNIA Dictionary A glossary of storage networking, data, and information management terminology by the Storage Networking Industry Association The SNIA Dictionary contains terms and definitions related to storage and other information technologies, and is the storage networking industry's most comprehensive attempt to date to arrive at a common body of terminology for the technologies it represents.
    [Show full text]
  • Introduction to Networking
    BSc in Telecommunications Engineering TEL3214 Computer Communication Networks Lecture 01 Introduction to Computer Networking Eng Diarmuid O'Briain, CEng, CISSP 1-2 TEL3214 - Computer Communication Networks Copyright (c) 2017 C²S Consulting TEL3214 Introduction to Computer Networking 23 Feb 2017 TEL3214 - Computer Communication Networks 1-3 Table of Contents 1. INTRODUCTION............................................................................................................................ 5 1.1 BASIC CONCEPTS........................................................................................................................................6 1.2 ESSENTIALS FOR COMMUNICATIONS...............................................................................................................6 1.3 DATA COMMUNICATION TASKS......................................................................................................................7 1.4 WHAT IS A NETWORK ?...............................................................................................................................7 1.5 WHAT ARE THE MAJOR PARTS OF A NETWORK ?...............................................................................................8 1.6 RESOURCE-SHARING....................................................................................................................................9 1.7 NETWORK USER APPLICATIONS...................................................................................................................11 1.8 NETWORK MONITORING
    [Show full text]
  • Wiley Networking Council Series
    Y L F M A E T Brought to you by Team FLY® Team-Fly® Page i High-Speed Networking A Systematic Approach to High-Bandwidth Low-Latency Communication Page ii This page intentionally left blank. Page iii High-Speed Networking A Systematic Approach to High-Bandwidth Low-Latency Communication James P.G. Sterbenz and Joseph D. Touch with contributions from Julio Escobar Rajesh Krishnan Chunming Qiao technical editor A. Lyman Chapin Page iv Publisher: Robert Ipsen Editor: Carol A. Long Assistant Editor: Adaobi Obi Managing Editor: Gerry Fahey Text Design & Composition: UG / GGS Information Services, Inc. Designations used by companies to distinguish their products are often claimed as trademarks. In all instances where John Wiley & Sons, Inc., is aware of a claim, the product names appear in initial capital or ALL CAPITAL LETTERS. Readers, however, should contact the appropriate companies for more complete information regarding trademarks and registration. Copyright © 2001 by James P.G. Sterbenz and Joseph D. Touch. All rights reserved. Published by John Wiley & Sons, Inc. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per- copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4744. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 605 Third Avenue, New York, NY 10158-0012, (212) 850-6011, fax (212) 850-6008, E-Mail: PERMREQ @ WILEY.COM.
    [Show full text]
  • Chapter 1: Data Storage
    Chapter 1: Data Storage 1.1 Bits and Their Storage 1.2 Main Memory 1.3 Mass Storage 1.4 Representing Information as Bit Patterns 1.5 The Binary System 1.6 Storing Integers 1.7 Storing Fractions 1.8 Data Compression 1.9 Communication Errors 1 Computer == 0 and 1 ? Hmm…every movie says so…. Chapter 2 2 Why I can’t see any 0 and 1 when opening up a computer?? Chapter 2 3 What’s really in the computer With the help of an oscilloscope (示波器) Chapter 2 4 HIGH Bits LOW Bit Binary Digit The basic unit of information in a computer A symbol whose meaning depends on the application at hand. Numeric value (1 or 0) Boolean value (true or false) Voltage (high or low) For TTL, high=5V, low=0V 5 More bits? kilobit (kbit) 103 210 megabit (Mbit) 106 220 gigabit (Gbit) 109 230 terabit (Tbit) 1012 240 petabit (Pbit) 1015 250 exabit (Ebit) 1018 260 zettabit (Zbit) 1021 270 6 Bit Patterns All data stored in a computer are represented by patterns of bits: Numbers Text characters Images Sound Anything else… 7 Now you know what’s a ‘bit’, and then? How to ‘compute’ bits? How to ‘implement’ it ? How to ‘store’ bit in a computer? Chapter 2 8 How to do computation on Bits? Chapter 2 9 Boolean Operations Boolean operation any operation that manipulates one or more true/false values (e.g. 0=true, 1=false) Can be used to operate on bits Specific operations AND OR XOR NOT 10 AND, OR, XOR 11 Implement the Boolean operation on a computer Chapter 2 12 Gates Gates devices that produce the outputs of Boolean operations when given
    [Show full text]