All About USB 3.2

January 10, 2019 at 8:00 AM

 

We’ve discussed the difference between USB 3.1 Gen 1 vs. Gen 2, but now comes the next level for Universal Serial Bus - USB 3.2. What makes this newest USB standard stand out? First and foremost are increased bandwidth and USB Type-C connector and cable support. Here, we’ll take a look at all the specs, so you’ll know all about USB 3.2.

 

While USB 3.1 Gen 1 brought 5 Gbps and Gen 2 doubled that to 10 Gbps speeds, USB 3.2 then doubles down again to offer 20 Gbps speeds – the most notable feature of the new standard. The way it provides those speeds is a little different though. USB 3.2 utilizes what is being called multi-lane operation, where devices use two lanes of 5 Gbps or 10 Gbps running together to transfer data at the same time over extra wires inside the USB cables. This allows for a cumulative data transfer rate of 10 Gbps to 20 Gbps.

 

What does this new standard mean for older USB cables? Fortunately, the new standard will be backward compatible with older standards. Even more fortunately, if the host and recipient devices are USB 3.2 compatible, older USB cables will also see a boost in speeds as great as 2 Gbps. USB 3.2 will also support USB-C connectors and their features such as power delivery, alternate modes, and digital audio, video and data on the same cable.

 

Overall, the new USB 3.2 standard is a big upgrade in terms of speed, but otherwise, it’s not a huge shift – which might be good news for those not ready to replace all of their older USB equipment. Though faster speeds are always good news, so this update is sure to be a welcomed change.

 

Readers’ Choice -Top Blog Posts of 2018

December 20, 2018 at 8:00 AM

 

Our goal for this blog is to provide interesting and informative content for our readers. So we always enjoy taking a look back at the end of the year to see what the most popular posts were. To make sure you didn’t miss anything, here’s a list of the most read posts of 2018. We hope to see you back in 2019!

 

 

1.      Cat6 Cable: Shielded vs. Unshielded


Category 6 Ethernet cable is designed to provide high speed data rates, but how do you decide between shielded or unshielded? Here, we compare them side by side so you can choose which will work best for your application. Read more.

 

 

2.      10 of the Worst Cabling Nightmares

 

We pride ourselves on our commitment to provide the best connectivity solutions for our customers, helping them to manage their data centers. So it always comes as a shock when we see cabling infrastructure that is a complete nightmare. This post has some of the worst offenders we’ve seen on the web. Read more.

 

 

3.      The Advantages and Disadvantages of Shielded Ethernet Cable

 

When it comes to shielded Ethernet cable, there are pros and cons. This post takes a look at both the good and the bad to help you weigh your options. For example, shielding can offer protection from EMI/RFI but its weight and limited flexibility means it’s not ideal for every application. To help decide if shielded Ethernet cable is right for your installation, read the post.

 

 

4.      75 Ohm vs. 50 Ohm – Coaxial Comparison

 

Ohm may sound like something you’d say while meditating, but when it comes to coaxial cables, it is actually a unit of resistance. Ohms measure the impedance within the cable. Impedance is resistance to the flow of electrical current through a circuit. To see how 75 Ohm and 50 Ohm compare, read our post.

 

 

5.      Good Vibrations: Vibration-Proof USB Connectors


Universal Serial Bus (USB) is one of the most widely used technologies to connect and power devices. One fundamental flaw of USB is its sensitivity to vibration, causing the connector to dislodge. In this post we show you some solutions to keeping your USB connected. Read more.

 

Managing the Modern WAN

December 13, 2018 at 8:00 AM

 

Today’s enterprise networks are utilizing more and more platforms and services, including cloud and multi-cloud computing. With all of these additions, there is an increasing amount of ground to cover and more challenges to face for today’s wide area networks (WANs). Here are a few tips to managing the modern WAN.

 

The cloud computing services that are becoming increasingly popular are not always easy to navigate. Each cloud operates in its own way and has its own intricacies, so educating yourself on the ins and outs is imperative to being able to successfully managing a modern WAN. When in doubt, jump in feet first. Sometimes the best way to learn how to manage a network in a multi-cloud environment is to just do it. Setting up a lab for research allows technicians to experiment and gather firsthand knowledge, and it’s usually not an expensive investment.

 

When it comes to actually implementing all of the new technology coming to market, integration can get tricky. Making sure that the legacy local area networks (LANs) and the new WAN platforms all work cohesively is a challenge. Fortunately, new products that enable software-defined WAN are also being developed and can be very useful in easing integration difficulties, especially for large networks. In a perfect world, all parts of a WAN would have end-to-end connectivity for seamless integration. Unfortunately, that is not always the case. Thus, network administrators need to be able to adapt and be well-versed in alternative connection options such as load balancers, overlay networks and WAN accelerators. With a little savvy, you can achieve the performance goals of your WAN network while also staying within budget parameters.

 

Just like all other aspects of the world of technology, the parts that make up the modern day WAN are also changing. By staying current and educating yourself about new technology, and keeping a few tricks up your sleeve, you can integrate those changes and keep your network up to date.

 

Case Study: Performance Motion Devices

December 6, 2018 at 8:00 AM

 

Performance Motion Devices (PMD) is a global leader in the arena of motion control ICs, drives, cards and software. They specialize in supplying OEM customers with high-performance, cost-effective motion systems for medical devices, robotics, test instrumentation and industrial automation industries, to mention a few.

 

The company was in need of a new supplier for a 100-position SCSI cable used with one of their motion controller interface cards after their current supplier increased pricing. This type of cable is not only uncommon, it’s also difficult to build, but PMD needed the cables quickly and needed them to meet the company’s cost and technical requirements. Luckily, L-com was just the manufacturing partner for the job.

 

L-com’s engineering team got to work and was able to quickly and successfully design a custom 100-Position SCSI interface cable with a rugged, molded back-shell. They were even able to add a few design tweaks to make the cables’ appearance more appealing. Plus, the team at L-com was able to meet all of PMD’s design requirements in the time frame given and on budget. Overall, this project was a successful study in how L-com’s engineering and Product Management teams were capable of stepping up to meet the challenge to fulfill their customers’ needs.

 

To read the entire case study click here.

 

How Network Security is Changing

November 29, 2018 at 8:00 AM

 

With more users providing more information on more networks, and some of those networks being breached, it’s no wonder that network security is a hot topic for many people and businesses. In fact, network security is a top concern for many IT administrators. For, as network technology has become more advanced, so have the ways in which those networks can be hacked. Here, we’ll take a look some of the changes happening in network security to counteract those threats.

 

·        Network security will no longer be a small branch of IT, but rather a responsibility that encompasses the entire organization. The network is a part of every aspect of IT and thus it will need to be protected by all administrators. Plus, the network itself should be armed with tools to help avoid attacks by reinforcing network-based security such as firewalls and malware prevention.  

 

·        Today, so many things are being sent to the Cloud, and so will security. Many IT departments will take advantage of cloud-based services that will manage common security tasks as part of a contracted agreement. This allows a simple subscription plan to impart dynamic security measures that once took several hours for administrators to manage. Multi-Cloud security management platforms will also come into play to allow network security to be managed across public and private clouds via a single security control plane.

 

·        We’ve all seen the IT email alert go out warning of an email scam sent to employees to get them to click a link that then installs malware on the network. Because of these types of attacks, end-point security has become a priority. This has extended to include mobile device management for non-corporate owned devices. In the future, many of these end-point security measures will be simplified and condense the number of protection tools in place to provide better overall protection.

 

·        Penetration (pen) testing is a valuable tool used to detect security gaps that might not have been identified by IT staff. Outside firms are often hired to perform this testing for a true outside party perspective, but the service can be costly and needs to be done in a timely manner. With the development of new AI and automation technology, pen testing is becoming easier and less expensive, meaning that it can be done more often, which is especially beneficial to keep up with the increase of new viruses, malware and other cyber threats.

  

With these upgrades in network security, along with an increased focus on overarching enterprise wide security procedures, today’s networks will be able to keep up with tomorrow’s technology and do it securely.

 

© L-com, Inc. All Rights Reserved. L-com, Inc., 50 High Street, West Mill, Third Floor, Suite 30, MA 01845