ITU-T L 46-2000 Protection of Telecommunication Cables and Plant from Biological Attack (Study Group 6)《保护通信电缆和植物不受生物攻击的影响-系列L 建造 安装和电缆保护以及外部设备的其它元素第6研究组》.pdf
《ITU-T L 46-2000 Protection of Telecommunication Cables and Plant from Biological Attack (Study Group 6)《保护通信电缆和植物不受生物攻击的影响-系列L 建造 安装和电缆保护以及外部设备的其它元素第6研究组》.pdf》由会员分享,可在线阅读,更多相关《ITU-T L 46-2000 Protection of Telecommunication Cables and Plant from Biological Attack (Study Group 6)《保护通信电缆和植物不受生物攻击的影响-系列L 建造 安装和电缆保护以及外部设备的其它元素第6研究组》.pdf(23页珍藏版)》请在麦多课文档分享上搜索。
1、 INTERNATIONAL TELECOMMUNICATION UNION L.46TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (10/2000) SERIES L: CONSTRUCTION, INSTALLATION AND PROTECTION OF CABLES AND OTHER ELEMENTS OF OUTSIDE PLANT Protection of telecommunication cables and plant from biological attack ITU-T Recommendation L.46 (Fo
2、rmerly CCITT Recommendation) ITU-T L.46 (10/2000) i ITU-T Recommendation L.46 Protection of telecommunication cables and plant from biological attack Summary This Recommendation describes biological attacks and countermeasures for protection of telecommunication cables. It deals with the kinds of bi
3、ological attack, weakness of cables, features of damage, and considers alternative ways of protecting the plant including dependence on cable position. Source ITU-T Recommendation L.46 was prepared by ITU-T Study Group 6 (1997-2000) and approved by the World Telecommunication Standardization Assembl
4、y (Montreal, 27 September 6 October 2000). ii ITU-T L.46 (10/2000) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is resp
5、onsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the
6、ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborat
7、ive basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. INTELLECTUAL PROPERTY RIGHTS ITU draws attention to the possibility that the practice or implementat
8、ion of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As o
9、f the date of approval of this Recommendation, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementors are cautioned that this may not represent the latest information and are therefore strongly urged t
10、o consult the TSB patent database. Ge3 ITU 2001 All rights reserved. No part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from ITU. ITU-T L.46 (10/2000) iii CONTENTS Page 1
11、 Scope. 1 2 The kinds of biological attacks . 1 3 Types of damage experienced. 1 3.1 Mammals (e.g. squirrels, rats, mice and gophers) 1 3.2 Insects . 1 3.2.1 Termites and ants. 1 3.2.2 Beetles, larvae and other insects 1 3.3 Birds 2 3.4 Micro-organisms. 2 4 Type of protection. 2 4.1 Positioning of p
12、lant in certain locations . 2 4.2 Elimination of the pest 2 4.3 Protection of telecom plant . 3 4.4 Cable construction 3 Appendix I 4 Appendix II 5 ITU-T L.46 (10/2000) 1 ITU-T Recommendation L.46 Protection of telecommunication cables and plant from biological attack 1 Scope There is evidence that
13、the outside of the plant can be damaged from biological attack. Some attacks are localized to particular environments which nurture certain types of infestation. Sometimes movement of the plant away from these areas is enough to avoid damage. More typically, the plant is shielded against attack by p
14、reventing penetration of pests some of which are listed in clause 2. 2 The kinds of biological attacks It is known that cable damage may be caused by: mammals, squirrels, mice, rats, moles, gophers and other rodents; birds like woodpeckers and cockatoos; insects such as termites, ants, beetles, wasp
15、s and caterpillars; micro-organisms like bacteria, fungus and/or moulds. 3 Types of damage experienced From an investigation of the damage sustained it is possible to determine the type of pest involved. Typical features of damage are given below. 3.1 Mammals (e.g. squirrels, rats, mice and gophers)
16、 Vertical chiselling of incisors on the edge of irregular holes is typical of the damage caused by rodents. Spherical or cylindrical holes with smooth walls are characteristic for the attack of moles. The animals are often found in the hole. 3.2 Insects 3.2.1 Termites and ants Irregular holes that m
17、ay extend over the whole circumference, looking as though the sheath has been peeled off, are typical of termites and ants. A mat appearance, to a surface that has been chewed over, is typical of termite gnawing, because they dig and lever upward with their short squat mandibles. Scratch marks and a
18、 transverse assault on the cable are characteristic of the ant, which has long, sharp mandibles and adopts a cutting action. In the early stages, the attack is characterized by local gatherings of numerous, small, individual holes. Ants and termites can give off an acidic secretion that is corrosive
19、 to lead. 3.2.2 Beetles, larvae and other insects Horizontal traces of mandibles of different shapes on the edges of the holes, are indications of attacks by insects and larvae. Circular bores are typical of larvae and beetles. Depending on the angle at which they penetrate the sheath, they may look
20、 circular or elongated with a width equal to the diameter of the bore. 2 ITU-T L.46 (10/2000) 3.3 Birds Irregular nibbles by beaks on the edge of and around irregular holes, are signs of attacks by birds. NOTE Earwigs, spiders, pupas and other animals, often invade junction boxes and other open spac
21、es. If the ventilation holes are big enough, even bird-nests, squirrel-nests and mice-nests can be found in the boxes. The debris these animals (in 3.1 to 3.3) produce from their excrements, also contribute to the breakdown of the insulation of connectors and terminal blocks. 3.4 Micro-organisms Det
22、erioration of the mechanical properties of cellulose fibres and elasticized polymers, is characteristic of attacks by fungi and bacteria. These attacks depend on the material and its manufacturing process. Local aeration corrosion cells can be produced by the attachment of barnacles, which are tight
23、 enough to exclude oxygen. These cells can be the result of bacterial metabolism in a polluted environment. 4 Type of protection 4.1 Positioning of plant in certain locations Attacks on telecom plants may be confined to certain areas where the conditions allow the pests to thrive. If it is possible
24、to re-route the plant away from these areas, instances of attack and plant damage can be avoided. Examples of particular environments and the type of biological attacker found in them are shown in Table 1. Table 1/L.46 Typical environment for pests Environment Pest Breeding places in rubber estates
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ITUTL462000PROTECTIONOFTELECOMMUNICATIONCABLESANDPLANTFROMBIOLOGICALATTACKSTUDYGROUP6 保护 通信 电缆 植物 不受

链接地址:http://www.mydoc123.com/p-799516.html