KVM: |
A KVM switch (with KVM being an abbreviation for Keyboard, Video, Mouse) is a hardware device that allows a user to control multiple computers from a single keyboard, video monitor and mouse. Although multiple computers are connected to the KVM, typically a smaller number of computers can be controlled at any given time. Modern devices have also added the ability to share USB devices and speakers with multiple computers. Some KVM switches can also function in reverse - that is, a single PC can be connected to multiple monitors, keyboards, and mice. |
KVM OVER IP: |
KVM over IP devices use a dedicated microcontroller and potentially specialized video capture hardware to capture the video signals keyboard and mouse signals, compress and packetize them, and send them over an Ethernet link to a remote console application that unpacks and reconstitutes the dynamic graphical image. This KVM over IP subsystem is typically connected to a system's standby power plane so that it's available during the entire BIOS boot process. These devices allow multiple computers to be controlled remotely across a wide area network, local area network or telephone-line using the TCP/IP protocols. There are performance issues related with LAN/WAN hardware, standard protocols and network latency so user management is commonly referred to as "near real time". And, remote KVM over IP devices offer much smaller matrix frameworks. Access to most remote or "KVM" over IP devices today use a web browser but proprietary viewer software can increase performance. A consideration of the viewer software relative to a browser based application is the area of ActiveX or Java security. Well formed implementations can be found across the major vendors today, yet there are many entry-level implementations that may not be as robust when it comes to security, performance and reliability. Important to note is that many of the stand-alone viewer software applications provided by many manufacturers are also reliant on ActiveX or Java. In addition, each major manufacturer is free to use various licensing mechanisms, some based on numbers of target devices, some based on numbers of users, and some based on numbers of sessions. In comparison to conventional methods of remote administration (for example Virtual Network Computing or Terminal Services), a KVM switch has the advantage that it doesn't depend on a software component running on the remote computer, thus allowing remote interaction with base level BIOS settings and monitoring of the entire booting process before during and after the operating system loads. Modern KVM over IP appliances or switches typically use at least 128-bit data encryption securing the KVM configuration over a WAN or LAN (leveraging SSL, and thus MD5 or AES). KVM over IP devices have been implemented in many different ways. For the graphics capture portion, PCI based KVM over IP cards use a variation of a technique known as screen scraping where the PCI bus master KVM over IP card would access graphics data directly from the graphics memory buffer. In these cases, the PCI card must know which graphics chip it is working with, and what graphics mode this chip is currently in so that the contents of the buffer can be interpreted correctly as picture data. Newer techniques such as those used by OPMA management subsystem cards and other implementations obtain the video data directly from the graphics chip using the industry standard DVI bus. There are also a variety of ways to emulate the keyboard and the mouse remotely, but newer implementations emulate USB based keyboards and mice using the management controller.
|
Cat6 KVM Switch: |
Local Remote KVM device design allows users to control computer equipment up to 1000' feet away from the user consoles (keyboard, monitor, and mouse). They include support for standard category 5 cabling between computers and users interconnected by the switch device. Category 5 based KVM device communication uses proprietary protocols across what can be considered a "closed loop" local area network infrastructure. In contrast to remote over IP devices, users operate computers in "real time" because there is no noticeable latency in communication between user consoles and computers. Small interface devices at the computers connect to the keyboard, video, and mouse ports of the computer. They convert these signals to a format suitable for category 5 cable and transmit this data to the user stations that decode it into normal analog signals suitable for the peripherals. Similar devices exist for KVM over IP that only support transmitting the signals at distances of thirty to fifty feet. While interface, switch, and user devices are interconnected using category 5 cabling and can be patched through non-active patch panels, the data signals are not the equivalent of ethernet (see Tron: Category 5 - Ethernet vs KVM Networks ) so care must be taken not to cross connect these KVM components to ethernet switches. Local remote KVM systems can support over 256 access points with access to over 8000 computers. The closed loop backbone is inherently secure and the long distance connectivity allows users and computer equipment to be distributed across many different locations throughout a facility. Where users need to manage the connected computers from off site locations, local remote KVM devices are configured with Remote over IP KVM support.
|
KVM Extender: |
CAT5 KVM extension solutions provide additional flexibility to your CAT5 KVM management and control systems, by allowing you to set up local CAT5 KVM consoles at varying distances from the computer or server. Some extenders allow distances of up to 300m/1000ft. The real test of an extender, however, is not the distance but the quality of video for the distance. Better performing CAT5 KVM extenders will provide near-local user experience at the console, even if it is relatively far away from the computer. Some CAT5 KVM extenders allow additional options, for example, a local user option at the computer or 2-port CAT5 KVM switching.
|
KVM Dongle: |
Dongles “Computer Interface Module” (CIM) connects each PC Computer (USB, SUN, PS/2, PS/2, VGA) to the CAT-5 KVM Switching Unit via standard single Cat5 Cable.
|
Auto Scan: |
Auto Scan is a network scanner. s a computer program used to retrieve user names, and info on groups, shares and services of networked computers. This type of program scans networks for vulnerabilities in the security of that network. If there is a vulnerability with the security of the network, it will send a report back to a hacker who may use this info to exploit that network glitch to gain entry to the network or for other malicious activities. Ethical hackers often also use the information to remove the glitches and strengthen their network. |
Hot Plug: |
Hot plugging is also knowns as hot swapping. These are terms used to describe the functions of replacing system components without shutting down the system. Hot swapping describes replacing components without significant interruption to the system, while hot plugging describes the addition of components that would expand the system without significant interruption to the operation of the system. For hot swapping once the appropriate software is installed on the computer, a user can plug and unplug the component without rebooting. A well-known example of this functionality is the Universal Serial Bus (USB) that allows users to add or remove peripheral components such as a mouse, keyboard, or printer. Hot plugging is used whenever it is desirable to change the configuration or repair a working system without interrupting its operation.
|
Resolution: |
This is a basic measurement of how much information is on the screen. It is usually described as "some number" by "some number". The first "some number" is the horizontal (across the screen) resolution and the second "some number" is the vertical resolution (down the screen). The higher the number, the better, since that means there is more detail. Resolution is measured in the number of discrete observable lines that can be reproduced on a system. The higher the resolution a system is capable of producing, the sharper the picture will appear. In TV, resolution is measured in vertical and horizontal lines or the total number of observable black to white line transitions observable in the picture. Horizontal resolution is limited by the bandwidth of the television circuit, while vertical resolution is limited by the total number of TV scan lines. A high-resolution video camera or monitor can display 700 horizontal lines of resolution and 480 vertical lines or 700 x 480 resolution. While influenced by the number of pixels in an image (for high definition approximately 2,000 x 1,000, broadcast NTSC TV 720 x 487, broadcast PAL TV 720 x 576), note that the pixel numbers do not define ultimate resolution but merely the resolution of that part of the equipment. The quality of lenses, display tubes, film process and film scanners, etc., used to produce the image on the screen must all be taken into account. This is why a live broadcast of the Super Bowl looks better than a broadcast recorded and played off of VHS, while all are NTSC or PAL. Amount of detail in the video image is measured along both the horizontal and vertical axes. In digital systems, resolution is the number of pixels on a display surface. Computer CRT resolutions are usually given as the number of pixels per scan line and the number of scan lines, e.g. 640 x 480. Video resolution is measured in terms of lines of detail per horizontal scan line (horizontal resolution) and total number of scan lines (vertical resolution). The clarity or graininess of a video or computer image as measured by lines or pixels; the smallest resolvable detail in the image. The perceivable detail, or the ability of an image reproducing system to reproduce fine detail
|
Matrix: |
Matrix KVM switches are designed for modern data centers that require reliable, high security access and control of multiple servers. It has an efficient system management with simultaneous multi-user access. Our MKCS series Matrix Cat6 KVM switch provides multi KVM ports (16/32) which connects to the server and multi user console (2 to 4) to work independently and simultaneously control up to 16/32 directly connected servers. The RJ-45 Cat6 KVM ports can be connected to the server by Cat6 ethernet cable with a particular dongle(USB or PS/2 type). The console users can access the server through a remote RJ-45 ethernet cable with a receiver, on-board local console port, and RJ-45 KVM over IP switch port. Locally the user manages the server through via intuitive hotkey combinations or On Screen Display (OSD) menus (no software required) and supports multiplatform ( PC, Mac, and Sun). Remotely the user manages the server through JAVA-base WEB-browser, The embedded firmware provides user login in and event log on one Syslog server. Fireware upgrades can be performed through the network.
|
Cascade: |
A cascade cable is used to link multiple PS/2 KVM Switches together. It can have up to 8 levels and 64-128 servers (depending on the model). It interconnects with Matrix KVM Switch.
|
Secure Sockets Layer (SSL): |
Secure Sockets Layer, which is SSL for short, is a protocol developed by Netscape for transmitting private documents via the Internet. SSL uses a cryptographic system that uses two keys to encrypt data − a public key known to everyone and a private or secret key known only to the recipient of the message. Both Netscape Navigator and Internet Explorer support SSL, and many Web sites use the protocol to obtain confidential user information, such as credit card numbers. By convention, URLs that require an SSL connection start with https: instead of http:. |
Receiver Box: |
A cascade cable is used to link multiple PS/2 KVM Switches together. It can have up to 8 levels and 64-128 servers (depending on the model). It interconnects with Matrix KVM Switch.
|
Secure Transmission: |
Secure Transmission refers to the transfer of data such as confidential or proprietary information over a secure channel. Many secure transmission methods require a type of encryption. Software and hardware implementations which attempt to detect and prevent the unauthorized transmission of information from the computer systems to an organization on the outside may be referred to as Information Leak Detection and Prevention (ILDP), Information Leak Prevention (ILP), Content Monitoring and Filtering (CMF) or Extrusion Prevention systems and are used in connection with other methods to ensure secure transmission of data. |
User Console: |
A user console is the individual provides the user to access to different modules in the software according to their user levels. The console will give a user total control and seamless workflow. Different users can log in with their own username and password and they can set reminders & alerts on their own as well. |
|
|