Every structured cabling system is unique. This is due to variations in:
The practices we use to complete and maintain cabling installations are relatively standard. The standardization of these installations is necessary because of the need to ensure acceptable system performance from increasingly complex arrangements.
The industry term for a network installation that serves a small area is a local area network (LAN). There are also metropolitan area networks (MANs) and wide area networks (WANs).
Structured cabling installations typically include: entrance facilities; vertical and horizontal backbone pathways; vertical and horizontal backbone cables; horizontal pathways; horizontal cables; work area outlets; equipment rooms; telecommunications closets; cross-connect facilities; multi-user telecommunications outlet assemblies (MUTOA); transition points; and consolidation points.
The entrance facility includes the cabling components needed to provide a means to connect the outside service facilities to the premises cabling. This can include service entrance pathways, cables, connecting hardware, circuit protection devices, and transition hardware.
An entrance facility houses the transition outside plant cabling to cabling approved for intrabuilding construction. This usually involves transition to fire-rated cable. The entrance facility is also the network demarc between the SP and customer premises cabling (if required). National and regional electrical codes govern placement of electrical protection devices at this point.
The location of the entrance facility depends on the type of facility, route of the outside plant cabling (e.g. buried or aerial), building architecture, and aesthetic considerations. The four principal types of entrance facilities include underground, tunnel, buried, and aerial. (We will cover only aerial entrances in this article.)
In an aerial entrance, the SP cables provide service to a building via an overhead route. Aerial entrances usually provide the lowest installation cost, and they’re readily accessible for maintenance. However, they’re subject to traffic and pedestrian clearances, can damage a building’s exterior, are susceptible to environmental conditions (such wind and ice), and are usually joint-use installations with the power company, CATV company, and telephone or data service providers.
Backbone cabling. From the entrance facility, the structured cabling network branches out to other buildings, as well as from floor to floor within a building on the backbone cabling system. We use the term backbone to describe the cables handling the major network traffic.
Inter-building and intrabuilding are two types of backbone cables. Inter-building backbone cable handles traffic between buildings. Intra-building backbone cable handles traffic between closets in a single building.
This standard identifies two levels of backbone cabling. First-level backbone is a cable between a main cross-connect (MC) and intermediate cross-connect (IC) or horizontal cross-connect (HC). Second-level backbone exists between an IC and HC.
The useful life of a backbone cabling system consists of several planned growth periods (typically three to 10 years). This is shorter than the life expectancy of the premises cabling system.
In the case of fiber, it allows light impulses to transfer from one connector to another. For copper, it allows electrical signals to transfer from one connector to another.
A good connection requires aligning the connectors, preventing the connectors from unintentional separation, and efficient transferring of light or electricity from one connector to the other.
A connector demonstrates durability by withstanding hundreds of insertion and withdrawal cycles without failing. We calculate this as mean time between failures (MTBF).
Connectors are as essential to the integrity of the entire telecommunications network as is the cable itself. Connectors align, attach, and decouple the media to a transmitter, receiver, another media of same or similar type, an active telecommunications device, or a specified passive telecommunications device.
Broadband Internet access is ideal for a small to mid-size businesses such as retailers that need a connection for point of sale (POS) equipment. Willikins offers a variety of broadband speeds and technologies that allow for bandwidth flexibility and scalability in real time. Asymmetrical and symmetrical speeds ranging from 1Mbps to 300 Mbps download and 1 Mbps to 300 Mbps upload.
Dedicated Internet Access (DIA) provides a private, secure connection for any business. Access to world class networks and partnerships with leaders in the industry, Willikins can offer a unique and diversified solution. Guaranteed bandwidth, ranging from 1.5 Mbps up to 10 Gbps, provides scalability and reliable performance.
Willikins’ Hosted VoIP Phone Systems are a convenient, low-cost telephone substitute and fully-integrated unified communications solution, enabling your business to streamline how it communicates. VoIP, or Voice Over Internet Protocol, uses an IP connection to make and receive phone calls by converting voice traffic to a digital signal that can be sent over the internet, instantly reducing costs and increasing overall productivity.
Unified Communication is a way for a business to call, message, and meet with anyone, from any device. It includes HD video, voice, messaging, screen sharing, and conferencing in a single easy-to-use cloud application that integrates with other cloud business applications. These solutions provide a seamless and consistent communications experience on a PC, tablet or smartphone – ideal for organizations of any size with geographically dispersed teams and mobile employees working at the office, at home, or on the go.
Willikins’ business lines connect your phones, fax machine, modem, and/or office phone system to a secure network, and then to the world. With over 15 years in the business, you have our expertise at your disposal.
Firewalls protect against threats and can provide companies with costs savings by helping employees to be more productive. Firewalls also are required to comply with security regulations such as PCI-DSS, HIPAA, SOX, GLBA, and state based personal privacy laws. A firewalls primary purpose is to block traffic that is not authorized and therefore a potential threat. But beyond that, firewalls can block threats through the usage of Unified Threat Management (UTM).