We get a lot of the same questions from our customers and partners about how Interceptor works. My next few blog posts will attempt to address some of the most commonly asked questions. Here’s FAQs Part 1:
Q. How does Interceptor™ detect an intrusion into a fiber optic cable?
A: Interceptor launches a monitoring signal into a pair of fibers of the optical cable being protected, which turns the entire cable (up to 144 fibers) into a sensor. When any component of the cable is abnormally handled, for instance during an intrusion attempt, the monitored fibers sense the disturbance and Interceptor reports the event.
Q. How does Interceptor distinguish between true intrusions and everyday events that may cause nuisance alarms?
A: Interceptor incorporates a patented Smart Filtering™ technology to “auto-configure” itself and learn a baseline of normal, routine, benign, non-threatening affects upon the cable system. These normal events are thereafter ignored resulting in the elimination of false alarms.
Q. What type of fiber does Interceptor require for monitoring?
A: Interceptor uses the standard communications fibers inside the cable to perform the monitoring, and models are available for dark (unused) or active (transmitting data) fibers.
Q. Does Interceptor protect the cable or just individual fibers?
A: For most cable designs, monitoring as few as 2 fibers within the cable can protect an entire 144-fiber cable. If ingress into the cable is attempted, the protected fibers will sense the disturbance and issue an alarm.
Q. Is an Interceptor required at both ends of the cable run being protected?
A: In the case of dark fiber monitoring, a single Interceptor is required at one end of the cable. For monitoring active fibers, a single Interceptor Plus™ is required at one end of the cable along with a small passive device (Remote Termination Unit) at the far end.
Q. To how many separate buildings or drops can a single Interceptor provide a secure connection?
A: A single Interceptor can provide a secure connection to a minimum of four locations and typically, based upon the network architecture, to as many as sixteen and sometimes up to thirty-two.
If you have specific questions you would like us to address, feel free to email me at Amanda@networkintegritysystems.com.
Friday, January 22, 2010
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment