I wish to know the specification that Ethernet adapter manufacturers should comply with regarding the electrical insulation/isolation between the data cable (RJ45 socket) connections and the Ethernet adapter circuitry earth.
Specifically the maximum permitted voltage and typical insulation resistance.
I am asking this question because the is an issue of un-reliable Ethernet comms between a local area network and a particular industrial control equipment (Omron) and one of the engineers has suggested that it might be an "Earth loop" problem.
Personally, I think that this is highly unlikely as there are several other industrial equipments on the same site that use the local area network without any problems and the eqipments are earthed quite well.
the site uses Cisco Catalyst Ethernet switches model 3650G
According to page 339 of:
the spec (for 10baseT) is 25V ptp at 500kHz or lower
Page 491 of:
Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.
I see many questions here on Experts Exchange regarding switch port configurations and trunks. This article is meant for beginners in the subject to help to get basic knowledge about Virtual Local Area Network (VLAN (http://en.wikipedia.org/wiki/Vir…
I eventually solved a perplexing problem setting up telnet for a new switch. I installed a new Cisco WS-03560X-24P switch connected to an existing Cisco 4506 running a WS-X4013-10GE Sup II-Plus.
After configuring vlans and trunking, I could no…
This Micro Tutorial hows how you can integrate Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease.
The following video show how to bind OSX Mavericks to …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …