Top Banner
August/September 2008 www.RemoteMagazine.com A Webcom Publication ...on page 14 SECURITY ...on page 28 Advantech Expands Its Line of Managed Industrial Ethernet Switches Please look at the mailing label below and read the code in the red box. Code=A: You are receiving the complimentary issue due to your involvement in the industry. To start your free subscription today, please go to www.RemoteMagazine.com and subscribe. Code=B: Your subscription is about to expire. Go to www.RemoteMagazine.com and renew your subscription today Code=C: Your subscription is active and current. ABB Totalflow SCADAvantage Software Automates and Simplifies System Operations ABB’s Totalflow SCADAvantage software, which is designed to automate oil and gas operations. With self-config- uring maps, smart screen templates, on-screen analysis tools, real-time and historical graphic trends, and reports for manag- ing multiple aspects of the sys- tem, SCADAvantage automates and simplifies system operations for added lifecycle cost savings. More than two years ago, ABB Totalflow made a strategic decision to invest in the develop- ment of applications unique to the LDC market, and the compa- ny is gaining traction in the cate- gory. In addition to the functions and features of SCADAvantage for automation solutions, ABB touts the software’s cost, as well as the anticipated maintenance advantages over the life of the system. “Our customers tell us that the SCADAvantage standard daily nomination interface and gas schedule tracking are par- ticularly helpful,” said Ed Smyth, SCADA business develop- ment manager, ABB Totalflow. “Our system is unique in that these features are part of the existing functionality of the sys- tem, rather than a custom application like many other systems.” “We selected ABB because we were impressed by how SCADAvantage’s utilization of off- the-shelf software required little customization to meet all of our requirements, while being basic enough for our internal employees to maintain,” said Jim Larsen, SEMCO Energy Gas Company director of engineering services. “We wanted to avoid purchasing a system that required a high level of customization, which can add com- plexity to the initial implementation as well as future upgrades.” “The ability to integrate our GIS and GPS systems easily was also a real plus,” added Larsen. “ABB showed us that they had the complete SCADA solution for an LDC.” MIT Creates New Material for Fuel Cells ...on page 26 Securing Remote Site Access: A Securing Remote Site Access: A Defense-in-Depth Approach Defense-in-Depth Approach ...on page 30
40

Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

Jul 14, 2018

Download

Documents

nguyenkien
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

August/September 2008 www.RemoteMagazine.com A Webcom Publication

...on page 14

SECURITY...on page 28

Advantech Expands Its Line of Managed IndustrialEthernet Switches

Ple

ase

loo

k a

t the

ma

iling

lab

el b

elo

w a

nd

rea

d th

e c

od

e in

the

red

bo

x.

Code=A

: Yo

u a

re re

ce

ivin

g th

e c

om

plim

en

tary

issu

e d

ue

to y

ou

r invo

lve

me

nt in

the

ind

ustry.

To

sta

rt yo

ur fre

e s

ub

scrip

tion

tod

ay, p

lea

se

go

to w

ww

.Re

mo

teM

ag

azin

e.c

om

an

d s

ub

scrib

e.

Code=B

: Yo

ur s

ub

scrip

tion

is a

bo

ut to

exp

ire. G

o to

ww

w.R

em

ote

Ma

ga

zin

e.c

om

an

d re

ne

w y

ou

r su

bscrip

tion

tod

ay

Code=C

: Yo

ur s

ub

scrip

tion

is a

ctiv

e a

nd

cu

rren

t.

ABB Totalflow SCADAvantage Software Automates and Simplifies System Operations

ABB’s Totalflow SCADAvantage software, which is

designed to automate oil and gas operations. With self-config-

uring maps, smart screen templates, on-screen analysis tools,

real-time and historical graphic trends, and reports for manag-

ing multiple aspects of the sys-

tem, SCADAvantage automates

and simplifies system operations

for added lifecycle cost savings.

More than two years ago,

ABB Totalflow made a strategic

decision to invest in the develop-

ment of applications unique to

the LDC market, and the compa-

ny is gaining traction in the cate-

gory. In addition to the functions

and features of SCADAvantage

for automation solutions, ABB

touts the software’s cost, as well

as the anticipated maintenance

advantages over the life of the system.

“Our customers tell us that the SCADAvantage standard

daily nomination interface and gas schedule tracking are par-

ticularly helpful,” said Ed Smyth, SCADA business develop-

ment manager, ABB Totalflow. “Our system is unique in that

these features are part of the existing functionality of the sys-

tem, rather than a custom application like many other systems.”

“We selected ABB because we

were impressed by how

SCADAvantage’s utilization of off-

the-shelf software required little

customization to meet all of our

requirements, while being basic

enough for our internal employees

to maintain,” said Jim Larsen,

SEMCO Energy Gas Company

director of engineering services.

“We wanted to avoid purchasing a

system that required a high level of

customization, which can add com-

plexity to the initial implementation

as well as future upgrades.”

“The ability to integrate our GIS and GPS systems easily

was also a real plus,” added Larsen. “ABB showed us that they

had the complete SCADA solution for an LDC.”

MIT Creates New Material for Fuel Cells

...on page 26

Securing Remote Site Access: ASecuring Remote Site Access: ADefense-in-Depth ApproachDefense-in-Depth Approach

...on page 30

Page 3: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

Volume 8, Issue 4

Editor & PublisherDavid Webster

Director of ContentShannon Given

Associate EditorsNick Depperschmidt

Jeremy Martin

Assistant EditorsHeather Krier Joanna Larez

News EditorsScott Nash, Karen Poulson, Jessi Carter,

Jeremy Fleming, Sue Hannebrink

Finance & AdministrationMarsha Grillo, Director

Julie Williams, Office Manager

Advertising, Sales and MarketingScott Nash, Account Executive

Jessica Thebo, Jennifer Graham, Kristin Reming

Production Manager Julie McCann

Customer Service/CirculationDatabase/Directories

Mark Vang, Circulation ManagerJulianne Wood, Andy Gurukovich,

Ross Webster

REMOTE SITE & EQUIPMENT MANAGEMENT magazine (ISSN #1535-0347) is a publication of Webcom Communications Corp.Subscription free for qualified US, (six issues) $44 for non-qualifiedUS, $60 in all other countries. Single copies are $20 each plusshipping. Back issues are available. Payment must be made inUS funds in order to process the order. Direct all subscriptioninquiries, orders and address changes to Fulfillment Services.Third-class and fourth-class postage paid in Denver, Colo.Periodic postage paid in Greenwood Village, Colo. and atadditional mailing offices.

POSTMASTER:Send address changes to:Webcom Communications

7355 East Orchard Road, #100Greenwood Village, CO 80111

Photocopy Rights: Permission to photocopy for internal or per-sonal use, or the internal or personal use of specific clients isgranted by REMOTE SITE & EQUIPMENT MANAGEMENT for usersthrough Copyright Clearance Center, provided that the basefee of $2.50 per copy of the article, plus $1.00 per page is paiddirectly to the Copyright Clearance Center, 222 RosewoodDrive, Danvers, MA 01923 USA (508) 750-8400. For governmentand/or classroom use, the Copyright Clearance Center shouldbe contacted. The rate for this is 3 cents per page. Specify ISSN# 1535-0347 REMOTE SITE & EQUIPMENT MANAGEMENT.

© Copyright 2008 Webcom Communications Corp. Material inthis publication may not be reproduced in any form withoutwritten permission. Requests for permission should be directedto the customer service manager.

Webcom Communications Corp.Phone: 800-803-9488 / 720-528-3770

www.infowebcom.com

Editor’s Note

August/September 2008 Remote Site & Equipment Management 3www.RemoteMagazine.com

August/SeptemberContents

Welcome to the August/September issueof Remote Site and EquipmentManagement Magazine. To say we havesome good articles inside would be anunderstatement. If you’re looking for infor-mation on remote device networking I’dsuggest flipping to the middle of the bookand check out two articles covering deploy-ing a microwave network and how to maxi-mize the value of M2M wireless devices.

If security is your concern, we still haveyou covered. Uniloc, Inc. and IndustrialDefender has lent their expertise on the sub-ject of cyber security for critical infrastruc-ture and remote sites. Check those articlesout on pages 30 and 32.

Also included in this issue is our 2008 standalone resource guide. These once a yearguide features market update articles, profilesand listings for companies providing productsand services to the remote market. Keep thisat your desk and use it year-round to find solu-tions for your remote sites and equipment.

You’ll also find new information about theRemote 2008 Conference and Expo onpages 20 and 21. This includes new sessions,exhibitors and links for registration. Keep inmind that September 19th is the last day toregister at a discounted price!!

Nick DepperschmidtEditor, Remote [email protected]

Table of Contents

page 4

page 28

page 14

Proficy Real-Time Information Portal 3.0 IntroducedBy GE Fanuc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4

GreenPeak Launches its Emerald GP500CCommunication Controller . . . . . . . . . . . . . . . . .14

MIT Creates New Material for Fuel Cells . . . . . . . .26

Secure Asset Management now Available forTofino Security Users . . . . . . . . . . . . . . . . . . . . . .28

Updating Data Acquisition Systems to Utilize IntegratedCapabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

Executive Q&A with Spinwave Systems CEO William LaPointe . . . . . . . . . . . . . . . . . . . . . . . . . . .18

The Best Practices to Deploy a Reliable Microwave Network . . . . . . . . . . . . . . . . . . . . . . .22

Maximizing the Lifetime Value of M2M Wireless Devices . . . . . . . . . . . . . . . . . . . . . . . . . .24

Securing Remote Site Access: A Defense-in-DepthApproach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30

Ten Rules for Combating Cyber Security Attacks onCritical Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . .32

Industry News . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34Marketplace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36Web Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38New Literature . . . . . . . . . . . . . . . . . . . . . . . . . . . .38Calendar of Events/Advertiser Index . . . . . . . . .39

SCADA

Networking

Onsite Power

Features

Departments

Security

page 30

Page 4: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

Telemetric Releases IED Config forThe Remote Configuration of IED’sEquipped with RTMs

Telemetric Corp. has released a new IED Config fea-

ture for their Remote Telemetry Module (RTM). This

new feature allows Telemetric users to remotely change

settings and retrieve event logs

on Intelligent Electronic

Devices (IED’s) used for

equipment such as reclosers,

switches, capacitor banks and

voltage regulators using the

manufacturer’s standard con-

figuration software.

Users can now manage and

change the RTM configuration

using IED Config. The new

feature will enhance the pro-

ductivity of distribution engi-

neers by eliminating many site

visits to obtain event informa-

tion or make a routine setting

change. This feature works on

the nationwide AT&T cellular network.

IED Config can be added to any Telemetric RTM in

operation by updating the firmware in the unit. This

feature leverages Telemetric’s alliance with AT&T

Wireless to deliver fast and cost-effective IP-based

data communications throughout North America.

Telemetric RTM units can be installed anywhere AT&T

service is available. Telemetric products allow electric

utility customers to monitor, control and report

changes automatically via Telemetric’s PowerVista

applications or integrate directly to SCADA, energy

management systems, or other systems.

The IED Config software supports the manufactur-

er’s own configuration software by using IP tunneling

technology over the digital cellular network. Thus,

electric utility engineers or technicians can utilize the

same familiar software that they use when connecting

directly to a device in the field. Security features of

the system include the use of a VPN connection, user

name and password, multi-factor authentication and

data encryption.

Unlike private radio networks that require large

investments in communications infrastructure, the

Telemetric devices can deliver a cost effective solutions

that can be rapidly deployed with no infrastructure

investment. Users can be notified of events via text mes-

sage, e-mail or pager and the information can be deliv-

ered to their SCADA or energy management system.

They may also view and manage their device informa-

tion on their own secure account using Telemetric’s

PowerVista applications with a standard web browser.

Unlike simple modem-based solutions, Telemetric prod-

ucts combine intelligent remote devices with the AT&T

digital network to provide powerful applications that are

efficient and cost effective.

Control Microsystems ReleasesUSB Mass Storage Devices withData Logging Capabilities

Control Microsystems has released what it deems as

the first use of USB storage devices for data logging in

the demanding envi-

ronments of

SCADA applica-

tions. Using remov-

able USB storage

such as Flash mem-

ory sticks, Control

M i c r o s y s t e m s ’

SCADAPack 300-

series controllers

can now provide

easily configured

and accessible data

logs using the alter-

nate methods of

logging to internal

memory or to external mass storage devices.

“We are proud to offer the first RTU that provides

walk-up SCADA to our customers,” said Dale

Symington, VP product strategy. “This product allows

for quick and easy data import via a populated USB

device that is connected to any PC running our

SCADALog Data Converter utility.”

In addition to logging data to a pre-connected USB

mass storage device directly, this new feature also

allows for automatic transfer of logged files on internal

memory when a USB stick is inserted in the controller.

In systems requiring high power efficiency, the USB

port is powered-down and the data is first logged direct-

ly to controller RAM. Then at defined intervals the USB

port is powered-up and the data is transferred to the

memory stick.

Support for data logging to USB mass storage devices

is provided by the SCADAPack 330/334 and by the

SCADAPack 350/357 with firmware upgrade to version

1.41. These features are available free of charge on all

such SCADAPack controllers.

Visit Control Microsystems Booth at

Remote 2008 Conference and Expo

www.RemoteExpo.com

Data Translation ReleasesNetwork-Ready Ethernet VersionOf TEMPpoint Instrument

Data Translation has released the Ethernet (LXI) ver-

sion of its temperature

measurement instru-

ment, TEMPpoint. This

network-ready version

of the popular instru-

ment provides a stan-

dard Ethernet connec-

tion to support remote

monitoring and control

of thermocouples,

RTD's and voltages in

the field and on the fac-

tory floor.

TEMPpoint has

received full Class C

compliance and certification for LXI. Compatibility to

other LXI devices is now assured for large system con-

figurations. TEMPpoint offers 48 separate channels with

24-bit resolution, each with it's own A/D converter and

CJC circuit, while 1,000 V channel-to-channel isolation

protects signal integrity and rejects common mode noise.

TEMPpoint ships with a ready to measure Web-based

application. Using a web-based TEMPpoint application,

users can configure, measure and control the DT8871

and DT8872 instruments either locally or remotely. Web

pages are provided for configuring all aspects of your

TEMPpoint instrument: local area network (LAN), input

channels to measure, scan parameters, alarm limits and

digital I/O lines.

GE Fanuc Intelligent Platforms has released its real-time manufacturing intelli-

gence application, Proficy Real-Time Information Portal 3.0, allowing users to gain

business insight from plant data in real time. This application is designed to provide

visibility into plant floor operations. As a result, it enables real time decision support,

continuous process improvement and enhances the

return on current and future IT investments.

“GE Fanuc offers Proficy real-time information

portal as a part of its tightly-integrated suite of pro-

duction management solutions which improve our

customer’s productivity every day,” said Erik

Udstuen, general manager of software, GE Fanuc

Intelligent Platforms. “Additionally, GE Fanuc

embraces an open and layered technology approach

allowing Proficy Portal to report on plant floor data

from third-party manufacturing technologies. This

is an important element to preserving customer’s

investments while extending their capability to

improve performance Proficy Real-Time

Information Portal provides a rich, Web-based envi-

ronment for developing and deploying visualization,

analytical and reporting applications.”

As a pure web-based application, Proficy Portal allows the end user access to data

and control over how to visualize and analyze it. In addition, it features interactive

analysis of real-time and historical data sources through trend charts, grids and data

links. This provides users insight into the operation of their plant for making crucial

improvements to quality and efficiency.

A single Web client combines content from other GE Fanuc software applications,

such as Proficy HMI/SCADA – iFIX and data from

across all on-line data sources within the plant and

the organization allowing for real-time decision

making at all levels. Proficy Portal’s graphical pres-

entation rapidly communicates essential informa-

tion from more complex data sets for notification of

alerts, status changes and data summaries. As the

web client for the entire GE Fanuc software portfo-

lio, Proficy Real-Time Information Portal provides

a consistent set of tools for analyzing and reporting

disparate process, lab and shop-floor SPC systems,

along with interfaces to off line Six Sigma tools

such as Minitab.

Proficy Real-Time Information Portal is a thin

client application that runs under the Microsoft IIS

Web server and connects to plant floor technology

such as OPC, HMI/SCADA, quality systems, production management systems and

third-party databases. It provides self-service ad-hoc reporting, and presents data in its

natural presentation form.

4 Remote Site & Equipment Management August/September 2008

Products & ServicesSCADA

www.RemoteMagazine.com

Proficy Real-Time Information Portal 3.0 Introduced by GE Fanuc

Page 6: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

Onset Releases WiFi-BasedMonitoring Solution for RenewableEnergy Systems

Onset Computer Corp. has unveiled the HOBO

U30/Wi-Fi remote monitoring system, a web-based mon-

itoring system that provides real-time, remote access to

energy and environmental data over any WiFi network.

As the latest addition to Onset’s line of HOBO U30

monitoring systems, the HOBO U30/WiFi provides a

simple and cost-effective means of verifying the effec-

tiveness of green roofs, solar power systems, wind tur-

bines and other types of renewable energy systems. It

accurately measures, records and documents critical per-

formance data that can be used to obtain green/energy-

related rebates and credits.

“Verifying the performance of renewable energy sys-

tems is necessary not only for customer satisfaction, but

to also satisfy the criteria that various rebate agencies

have for documenting a system’s performance,” said

Tom Wineman, owner of Clean Energy Design, a renew-

able energy design company. “The HOBO U30/WiFi

makes it easy to measure and verify system performance

over time, and provides alarms for instant notification of

any system problems that might be occurring. For

installers, this can reduce or eliminate diagnostic time in

the field.”

The HOBO U30/WiFi combines rugged data logging

hardware with integrated WiFi communications, and is

versatile enough to use in both indoor and outdoor envi-

ronments. Users can quickly plug in their choice of sen-

sors and connect to a Wi-Fi network without having to

worry about communication cables or wiring. Sensors

are available for measuring air temperature, relative

humidity, sunlight, wind, kW, kWh, AC voltage, AC

amps, DC amps, pressure, CO2 and more.

To view and analyze data, Onset offers HOBOlink, a

new Web-enabled software platform. HOBOlink

allows users to access current and historical data, set

alarm notifications and relay activations, and manage

and control remote HOBO U30/WiFi systems right

from their desktop.

The HOBO U30/WiFi provides around-the-clock

monitoring of various types of renewable energy sys-

tems. For example, it can track wind turbine efficiency

by measuring wind speed, wind direction and output

power. In solar power applications, it can verify the per-

formance of photovoltaic (PV) array systems by moni-

toring solar radiation, DC power and other parameters.

On green roofs, it can document performance by track-

ing air temperature, wind, soil moisture and rainfall.

ComBrio Introduces VirtualService Infrastructure 5.0 with NewPortal Capabilities

ComBrio, Inc. has introduced its Virtual Service

Infrastructure (VSI) 5.0, the next generation of the com-

pany’s secure remote monitoring and management soft-

ware. VSI 5.0 features an innovative module called

VSIportal, which provides expanded flexibility to the

deployment and use of VSI.

The portal functionality reduces cost, increases cus-

tomer satisfaction and generates additional revenue

opportunities for equipment manufacturers and service

providers. Enterprise customers also benefit from

VSIportal through significant cost reduction due to effi-

cient centralized control of outsourced managed services.

“We see VSIportal as a crucial offering for equipment

manufacturers, service providers and large enterprises

that are looking to deliver remote services while keeping

the devices and applications that run on them protected

from security threats,” said Dave Boulos, VP of product

management, ComBrio. “VSIportal provides the oppor-

tunity to bilaterally increase customer satisfaction and

services revenue for equipment manufacturers and serv-

ice providers. Enterprises benefit from having all vendor

services centrally managed and controlled. The addition

of VSIportal to the suite of offerings in our VSI portfo-

lio, positions VSI as the most comprehensive RPS solu-

tion on the market. A solution that addresses the needs of

all parties associated with RPS, primary provider, sec-

ondary provider, and end-user.”

Hear ComBrio, Inc. Speak at the

Remote 2008 Conference and Expo!

Session Title: Achieving Great Profits from RemoteManagement in the Industrial Environment

www.RemoteExpo.com

Calisto 2 Detects Tank ProblemsAnd Overheated Cellulose

Morgan Schaffer

has introduced its new

Calisto 2 dissolved

hydrogen, carbon

monoxide and mois-

ture monitor.

Featuring added per-

formance and stability

for the measurement

of moisture and dis-

solved hydrogen,

which is the key gas

for detecting incipient

faults at their earliest

stage, Calisto 2 also offers independent carbon monox-

ide measurement, a gas often generated in large quanti-

ties when transformer cellulose overheats.

Calisto 2 is supplied standard with DNP3.0 and MOD-

BUS communication protocols thus allowing easy

deployment within existing communications and

SCADA networks. Calisto is a widely used instrument

for on-line detection and monitoring of transformer

faults. Calsito 2 now brings additional protection value to

the transformer specialist, allowing them to better protect

large fleets of transformers using a cost efficient solution.

Astro-Med Expands Portable DataRecorder Line with 20 ChannelRecording System

Astro-Med’s Test

& Measurement

Product Group has

released the Dash

20HF, the latest

addition to its high

frequency data

recorder family.

Engineered specifi-

cally for long term

capture of high fre-

quency data and transient signals, the unit supports

recording up to 20 analog channels to an internal hard

drive at sample rates of up to 500 kHz and a bandwidth

of 100 kHz per channel.

Designed for applications ranging from transient cap-

ture to remote troubleshooting in the electric utility, pulp

and paper, metal manufacturing and other industrial

fields, the Dash 20HF is portable and rugged enough to

handle any environment. The Dash 20HF provides the

user with a real-time display and analysis of data. High

frequency data captures can be saved directly to hard

drive for later review and analysis.

The recorder contains four 250 Vrms isolated inputs

for monitoring high voltage or power signals, and six-

teen 35 Vrms differential channels for monitoring low

level signals or inputs from sensors, signal conditioners

and other devices. Each channel input can be independ-

ently configured and has a dedicated 16 bit A/D con-

verter to assure the most accurate measurement.

The versatile digital signal processing of the Dash

20HF provides a wide variety of data capture filtering

capabilities, including low-pass, high-pass, band-pass,

RMS and notch filtering. Frequency counter inputs are

also included.

The Dash 20HF includes a dedicated, 250 GByte

internal hard drive for capturing data and a DVD burner

for archiving data. Other features include 1,000BaseT

Ethernet for data upload and host control along with two

USB 2.0 ports for archiving data to external peripherals.

The system is built into a compact, light and rugged

case for field use. Equipped with a 15 inch diagonal

monitor for intuitive touch-screen control and real-time

data viewing and analysis, the graphical user interface of

the Dash 20HF is optimized for ease of use. Simple

menus permit the user to set most parameters using but-

ton and checkbox controls.

Operating on either 120 or 240 VAC, the Dash 20HF

includes a capacitive backup to ensure proper shutdown

without data corruption if power is lost. Free Windows-

based AstroVIEW X software also allows data to be

imported to a PC for analysis and review. Using

AstroVIEW X, a user can export data to popular spread-

sheet and analysis programs including Excel, DADiSP

and MathCAD with a simple conversion command.

An optional high security version designated the

Dash 20HF-HS is available. The high security version

includes locking, removable hard drives for securing

confidential data.

Collect and Graph Data Without aComputer

The new TR-57U Data

Shuttle from TandD Corp.

is a handheld collector

with the capacity to col-

lect up to 256,000 read-

ings (16 completely full

loggers) from TandD Data

Loggers. The TR-57U fea-

tures a backlit graphical

display that allows on

location data analysis.

With a user friendly

thumbwheel navigator,

this collector can be pro-

grammed for data range

check and G/NG judg-

ment display.

The TR-57U can opti-

cally read TandD TR-5S

waterproof loggers and

includes a cable for reading TR-7U loggers. The unit is

battery operated with two AAA Batteries that will pro-

vide 100 hours of operation. An energy saving auto

power off function is provided. Additionally, data can be

downloaded to a PC for archive with a fast USB cable.

6 Remote Site & Equipment Management August/September 2008 www.RemoteMagazine.com

Products & ServicesSCADA

Page 8: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

8 Remote Site & Equipment Management August/September 2008

Products & ServicesSCADA

www.RemoteMagazine.com

APG’s LPU-2428 Loop Powered Ultrasonic Sensors areCSA Certified

LPU-2428 loop powered ultrasonic level sensors from Automation Products Group,

Inc. (APG) are now cCSAus certified for use in Class I, Div. 1, Groups C and D, and

Class I, Zone 0, Group IIB hazardous loca-

tions. These atmospheres contain ethyl-

ether vapors, ethylene, gasoline, hexane,

naptha, benzene, butane, propane, alcohol,

acetone, benzol, lacquer solvent vapors or

natural gas.

LPU-2428 sensors feature microproces-

sor control to internally perform volume,

flow and totalization calculations. They

provide a 1 to 25 ft. detection range on liq-

uids and a 1 to 10 ft. detection range on solids. These sensors are well suited for envi-

ronmental monitoring, water and wastewater control, and liquid tank measurement

applications. They are also suited for other industrial and process control applications

where liquid volume or flow needs to be monitored and controlled.

For determining flow rates, formulas for a variety of flumes and weirs are built into

the sensors. These include Parshall flumes, cut-throat flumes, California-pipe weirs,

rectangular weirs and v-notch weirs. Equation-based calculations are also possible.

LPU-2428 sensors provide an output directly proportional to the flow rate and users

can select flow rate units of per second, per minute, per hour or per day. Standard vol-

ume units include cubic feet, millions of cubic feet, gallons, cubic meters or liters. For

volume measurement, the sensors have built-in formulas for most industry-standard

tank shapes.

LPU-2428 sensors feature a rugged PVDF (Kynar) transducer housing and PC/PET

chemical resistant sensor housing, and are easy to install using industry standard 2-inch

NPT fittings. These sensors can operate in temperatures from -40°F to 140ºF and deliv-

er 0.1 inch resolution with accuracy of ±0.25 percent of the detected range, and

response time of 0.6 to three seconds depending on the output range.

The LPU-2428 features internal temperature compensation to automatically account

for changes in ambient temperature, as well as filtering options to account for other

variables such as waves on a liquid or tank irregularities. They are unaffected by the

color/translucency, dielectric constant, specific gravity or viscosity of the target.

Internal parameters are setup using a remote keypad and display unit.

Uplogix Launches Fully-Integrated RemoteManagement Appliance

Uplogix has released its Uplogix 430, a new compact, fixed four port version of the

Uplogix SRM appliance designed for large enterprises needing to cost-effectively man-

age a handful of devices at multiple

remote locations with limited or no local

IT support.

The Uplogix 430 is the first remote

management appliance that provides a

comprehensive integrated platform that

eliminates the dependency on a combi-

nation of more expensive point solu-

tions. The appliance is powered by the

Uplogix Remote Management Operating

System (Uplogix RMOS) software platform, which directs Uplogix SRM appliances to

remotely automate hundreds of routine system maintenance, configuration, fault diag-

nosis and recovery operations.

With its compact design and low power consumption, the Uplogix 430 is well-suit-

ed for deployments having physical space limitations or non-racked environments.

Targeting a new market segment of large organizations, the Uplogix 430 delivers the

option to manage more locations and devices remotely than ever before to save on labor

costs and stay within existing budgets without compromising service levels.

Hear Uplogix Speak at the Remote 2008 Conference and Expo!

Session Title: Ensuring Constant Connectivity and Secure Access to Remote Locations

www.RemoteExpo.com

Gecko Flow Transfer Standard Enables On-Site FlowMeter Calibrations

Flow Technology, Inc. has introduced the Gecko flow transfer standard for on-site

flow meter calibration. The compact Gecko system utilizes the EZ-Link portable inter-

face box and EZ-Cal menu-driven software for inline comparison calibrations with the

unit under test (UUT).

Designed for both liquid and gas applications,

Gecko is an alternative to primary standard cali-

brators for in-house calibrations or verifications.

The system consists of software and a USB inter-

face box that allows the user to interface with a

computer of their choice. Master flow meters can

be supplied by Flow Technology or the user can

choose to use virtually any meter technology they

desire for a master reference meter.

Gecko's EZ-Cal software receives inputs from

the master flow meter, temperature sensor and

pressure sensor (gas systems) for calculating both

volumetric and mass flow units. Overall system

accuracy is dependent on several factors, includ-

ing master flow meter calibration, repeatability

and primary standard accuracy, as well as temper-

ature/pressure sensor accuracies. This fundamentally

allows the user to tailor the accuracy of the system to meet their needs through the level

of master sensors they choose to utilize.

The Gecko system can be installed into an existing application utilizing the flow

source and actual conditions of the liquid or gas. In addition, a bypass system can be

built into the application for ease of installing the master meter with flow straighteners

for calibration of the UUT. Once the calibration is complete, the master flow meter can

be replaced with a recommended spool piece. The bypass approach maximizes accura-

cy while minimizing expensive downtime in production schedules.

There are no application limitations with the Gecko system with the correct master

flow meters, piping, sensors and calibrations. Thanks to recent advancements in elec-

tronics, Flow Technology has incorporated additional input capabilities for other flow

meter technologies to be used as master flow meters. This gives the metrologist the

ability to choose the flow meter design best suited for the process.

Page 9: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

Products & ServicesSCADA

August/September 2008 Remote Site & Equipment Management 9www.RemoteMagazine.com

Semaphore Introduces a NewModel in the T-Box SCADA SystemProduct Family

Semaphore has introduced its T-

Box LT-100 compact remote moni-

toring and control SCADA system.

The new advanced IP telemetry

system extends the T-Box product

family to small, decentralized

applications where its push and

Web technologies enable high per-

formance, economical implementa-

tion and operation.

The T-BOX product family is the

first IP-based telemetry solution that

enables complete integration of SCADA, control,

and communications functionality in one pack-

age. The LT-100 model is cost effective for instal-

lations, which require up to eight DI/DO points

and two counter inputs.

Like all members of the T-Box family, the LT-

100 model incorporates full Web server technolo-

gy with SMS reporting and remote control to pro-

vide real-time access anytime, anywhere through

a standard Web browser. Operators can receive

alarms and communicate with their sites remote-

ly using a mobile device such as a cell phone, lap-

top or PDA. Automatic alarm escalation allows

key maintenance personnel to receive any unac-

knowledged alarms.

Natis Launches the SBT-1Remote Smart Battery Tester

Natis Communications has released a new

smart battery tester. This battery tester is an intel-

ligent battery condition tester capable of being

retrofitted into multiple types of equipment where

knowledge of the condition of the local battery

needs to be known to ensure their safe operation.

By periodically imposing a load across the

battery and measuring the recovered voltage, the

tester can indicate a battery failure if the recov-

ered voltage is below a set level. A typical dura-

tion of the voltage test is approximately two sec-

onds of imposed load followed by a delay of

approximately 100 milliseconds and then a series

of 10 measurements are taken and averaged to

determine the recovered voltage reading. If the

recovered voltage reading is below the anticipat-

ed threshold set by the customer, then the unit

will signal a failed battery condition. The smart

battery tester disables the battery charger unit

during the duration of the test and re-enables the

battery charger unit once the test is completed.

With this smart battery tester installed, utilities

can fully automate battery monitoring from their

SCADA centers, thereby making the regular

monitoring of remote batteries economically fea-

sible, and thus enabling their quick replacement

whenever necessary so helping to reduce outage

minutes by pre-empting battery related problems.

The smart battery tester uses an embedded processor

to manage the testing cycles and to report the test results

and battery condition. The unit can be programmed by

the customer via selection on the DIP switch. The DIP

switch can be used to program the timing or frequency of

the test cycles; the acceptable test voltage levels and

acceptable test voltage levels.

The unit has three SCADA output points that can be

interfaced to an RTU to allow the customer to remotely

monitor for battery failure. The first output indicates a

battery failure. This alarm will only occur after a battery

fails the test routine. If the battery fails the test again after

a charging period, then the tester will go into a battery

disable mode.

The second output indicates a test in progress. This

can be used by the customers SCADA system to monitor

testing periods and to determine whether the testing is

functioning properly. The third output is a battery dis-

abled status indicating that the battery has been discon-

nected from the load. The unit also has a control function

that can be used to initiate a battery test locally at the

equipment site; customers can initiate the local battery

test using a button located on the face plate of the Smart

Battery Tester.

Submit New SCADA Products to Remote Magazine!

Submit releases to Nick Depperschmidt at

[email protected].

Page 10: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

Application FeatureSCADA

Engineers from Purdue and Notre Dame universities are working with Indiana

startup EmNet LLC on a wireless sensor network for the city of South Bend to pre-

vent raw sewage from overflowing into waterways, especially from surging runoff

during storms.

The system will use a citywide network of 105 manhole-mounted sensors and

"smart valves" to automatically hold back the flow of rainwater and sewage in exist-

ing sewer system pipes and retention basins until the storm has passed.

"To our knowledge, this monitoring system will be the first of its kind in the world

because it will be the largest wireless sensor network in a permanent, industrial set-

ting," said Luis Montestruque, CEO of EmNet, founded in 2004 and located in

Granger, Ind.

The system, called CSOnet, consists of numerous computer chips that communicate

with each other over a wireless radio network.

These microcomputers are embedded in the city

sewer system and are connected to flow sensors,

pressure sensors and valves in a network that

works in a cooperative manner to control storm

runoff, Montestruque said.

Such "embedded wireless sensor networks,"

or EmNets, also could be used in hundreds of cities around the world faced with simi-

lar sewage-overflow problems, he said.

Sensors are mounted on the undersides of manhole covers and will have to per-

form in an urban setting full of interference sources, said William Chappell, a

Purdue assistant professor of electrical and computer engineering who helped design

the sensor technology.

"The sensors must be made to operate in harsh conditions and adapt dynamically to

changes in the wireless system, such as interference or the presence of parked or mov-

ing cars," Chappell said. "And the system will need to broadcast sensing data generat-

ed underground to a network that operates above ground in a challenging environment."

The system is expected to be fully functional next summer, with work progressing in

stages as the system evolves to increase its monitoring capabilities, said Gary Gilot,

South Bend's public works director.

Research to develop the system began in 2004 under the direction of Jeffrey W.

Talley, an associate professor of civil and environmental engineering at Notre Dame.

Talley led a team of project participants at Notre Dame, Purdue, the city of South

Bend and EmNet that in 2005 deployed a small prototype of the CSOnet system in

the city. EmNet later took over the project to expand the earlier prototype into a city-

wide system.

The technology is an example of a "cyberphysical system," or a network of comput-

ers tightly integrated with sensors and motorized controls, said Michael Lemmon, a

Notre Dame professor of electrical engineering.

Such systems are currently being proposed for use in various applications, including

control of the national power grid, automated manufacturing, air traffic control, home-

land security and material distribution for industrial supply chains.

"There are many sensor networks in operation around the world, but few attempt to

do active control, and that's one of the innova-

tive aspects of this project," said Lemmon, who

is leading work to develop and test computer

algorithms that enable CSOnet to control storm

runoff in an optimal manner.

Saurabh Bagchi, a Purdue assistant professor

of electrical and computer engineering, has

developed critical software, called middleware, for the system. The software allows the

sensors to talk to each other in an "ad-hoc mesh network."

"The ad-hoc part means there is no need for preexisting infrastructure,"

Montestruque said. "It doesn't rely on a cell phone tower or telephone lines for the wire-

less portion of the communication to work. The mesh part means that between every

two devices there are a number of different paths for it to communicate, bypassing

interference and obstacles."

The adaptive capability made possible by the middleware is similar to how a human

brain reroutes signals around damaged nerve cells, said Bagchi, whose work is affiliat-

ed with Purdue's Center for Wireless Systems and Applications.

"Networks need to be reliable, which means you don't want to have one single

point of failure," Bagchi said. "This is particularly important because we are deal-

ing with devices that are prone to failure. They are affected by changing seasons

and environments."

Engineers Design 'Brain' of Smart Sewage-Control Network

To our knowledge, this monitoring system will be the first ofits kind in the world because it will be the largest wirelesssensor network in a permanent, industrial setting.

Page 11: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

Application FeatureSCADA

Unlike other wireless systems, the network does not require a command center

and can be reprogrammed wirelessly from a remote location. Information from the

sensors will be relayed to a server operated

by EmNet.

The sensor data will be used to monitor

hydraulic conditions in the sewer system,

indicating when excess runoff and raw

sewage are about to overflow. Then

valves will divert the flow into temporary

storage sites.

The sewage will be selectively released

later so that it flows into the treatment plant

when capacity is available, preventing the

waste from being dumped into Indiana

waterways, including the St. Joseph and

Wabash rivers.

Cities that have combined storm and

sanitary sewers are often overloaded during

major storms, forcing municipalities to

divert this "combined sewer outflow" into

waterways to prevent sewage from backing

up into homes and businesses.

More than 700 cities around the United

States and 100 Indiana cities have combined

storm and sewer systems, Montestruque said.

"And many more cities are affected in

Canada and Europe," he said. "People using

lakes and rivers for recreational purposes

can get sick, most likely because of sewage

contamination, which contains large E. coli

counts. Not just E. coli, but all sorts of

chemicals, metals and industrial waste. Raw sewage is very toxic. It's going to take

an estimated $50.6 billion to solve the problem in the United States alone. The

amount of sewage dumped into rivers, lakes and the oceans by combined sewer

overflows is equivalent to the water carried into the Gulf of Mexico by the

Mississippi River in one week. That's 850 billion gallons per year."

Cities are fined for failing to meet U.S. Environmental Protection Agency stan-

dards. It is estimated that $4 billion will be needed to bring Indiana within federal

guidelines over the next few years,

Montestruque said.

The system being developed for South

Bend will control flows at about 20 loca-

tions in the city sewer system.

Algorithms developed by Lemmon allow

each of these locations to make flow-

control decisions in a manner that

requires only information from neighbor-

ing points, an approach that assures opti-

mal control of storm-water flows while

greatly reducing the amount of informa-

tion that must be exchanged between dif-

ferent locations in the system.

"This results in a control algorithm

that is very efficient in its use of commu-

nication resources, or bandwidth,"

Lemmon said.

Gilot likens the concept to modern

traffic signal controls that adjust signal

timing in response to changing traffic

flow and demand.

"We are going to apply that same kind of

logic to sewers," Gilot said.

Talley, an environmental engineer, also

is developing a technique of using ultra-

sound to clean water diverted to temporary

holding facilities. The method works by

bombarding water with high-frequency

sound waves, producing bubbles that implode, generating high heat that purifies water.

The ultrasonic method may eventually be incorporated into the system. Water

cleaned using the ultrasonic method would be released directly into waterways, reduc-

ing the need to later route water to the municipal wastewater treatment facility.

Purdue electrical and computer engineering doctoral students Rajesh Krishna Panta, from right, and Jin Kyu Koodiscuss software needed for a wireless sensor network in South Bend, Ind., to prevent raw sewage from over-flowing into waterways, especially from surging runoff during storms. The software must be loaded into anten-na-equipped miniature computing nodes to control a citywide network of 105 manhole-mounted sensors and"smart valves." The system is designed to automatically hold back the flow of rainwater and sewage in existingsewer system pipes and retention basins until the storm has passed. The stored water would then be releasedin a controlled manner for subsequent treatment by the city's wastewater treatment plant. (Purdue NewsService photo/David Umberger)

Page 12: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

FeatureSCADA

12 Remote Site & Equipment Management August/September 2008

Justin Schmid, Vice President, Mobile and M2MSierra Wireless

R.I.P. AnalogThe communications industry is undergoing a massive shift from analog to digital

transmission. The evolution is happening in all types of mediums, television broad-

casts, radio and cellular communications.

For both consumers and enterprise customers moving from analog to digital signal

transmission is inevitable. As of March 1st 2008, all major US cellular phone service

providers stopped supporting analog coverage. In February of next year, over-the-air

analog broadcasts will ride off into the “analog sunset.” In fact, manufacturers have

not been allowed to ship or import video products with only an analog tuner for over

a year now.

Are there valid arguments for this forced migration to digital transmission? In fact

many analog enthusiasts argue that analog signal, represented as a continuous sine

wave, more accurately reproduces sound. The continuous signal of analog is also free

of potential error mechanisms that are inherent in digital signal, which breaks sound

into pulses or digits with varied amplitude.

Although analog signals do offer several advantages for sound quality, digital offers

many clear benefits of its own. Unlike analog recordings, where the properties of the

medium are directly related to the physical quality of the sound, data integrity enabled

by digital signal is maintained over time despite the media in which it is captured.

Repeaters in a digital signal remove the potential for cumulative transmission prob-

lems, allowing digital to transmit over longer distances. Since digital transmissions are

translated into binary language, digital signal is more easily encrypted and, therefore,

secure. Digital also enables easier multiplexing of large channel capacities. Perhaps the

most important aspect of digital communications is that it provides a means for send-

ing integrated voice, data and video over a single transmission.

Integrated Systems in Industrial ApplicationsThe ability for digital communications to provide integrated services is paving the

way to the deployment of sophisticated data acquisition systems. These systems are

typically used to gather information about a method or process. Some common appli-

cations are environmental measurements for weather, agriculture, wastewater, utilities

and traffic monitoring.

Standard equipment comprising a data acquisition system would be a data logger

with sensors and some form of stand-alone memory, but they are usually also reliant

on a server for additional storage capacity and for hosting software necessary for data

analysis and presentation. A data logger works with its sensors to convert physical

events into electronic signals, which then must be digitized and converted into binary

data in order to be analyzed using the aforementioned software.

Data Loggers: Stand-Alone Capabilities Lack Intelligent AdvantageBecause data loggers are developed for use in unattended applications, they are built

to be extremely dependable and to withstand harsh conditions. Since the instruments

may operate for extended periods with no supervision, reliability is critical. As a reli-

able power source is paramount for these applications, some data loggers are designed

with battery or solar power for backup, so these systems must be extremely power effi-

cient relative to computers.

However, even with the advancements made in data logger technology, the most

sophisticated models are still lacking in the areas of remote monitoring and control

capabilities. Though data loggers range from single-channel input to more complex

multi-channel instruments, with the newest versions able to serve web pages, the bot-

tom line is that data acquired from a data logger and measurements taken from sen-

sors is simply stored for future use. Though the measurements are taken in real-time,

the advantage of immediacy is lost when the data trail ends in the data loggers’ on-

board memory.

Intelligence at the End Point Enables Superior IntegratedCommunication Systems

Unlike solutions that use unconnected data loggers, data acquisition systems used in

conjunction with intelligent communications gateways provide access to the data in

real-time and from a centralized point. These intelligent gateways maintain an always-

on two-way connection, not only enabling pervasive access to the data but also facili-

tating remote control, management and maintenance of the remotely deployed solution

from anywhere in the network. For obvious reasons, always-connected solutions uti-

lizing intelligent gateways are outpacing data loggers in their power to utilize today’s

bleeding edge technology.

The utilities, wastewater and agriculture industries, to name a few, manage remote

assets deployed throughout expansive geographic areas and increasingly require real-

time, two-way communication to more efficiently manage measurement, collection

and distribution. Intelligent connectivity devices enable the streamlining of measure-

ment and control of transmission and distribution, automatic meter reading and man-

agement of infrastructure. Since legacy measurement equipment often utilizes various

forms of serial communication protocols, they are not natively ready to leverage

today’s vast IP based communications networks. In addition to persistent connectivity,

intelligent communications gateways perform complex packet assembly and disas-

sembly (PAD) operations to condition the data so that it can be transmitted over the

existing IP backbone. In some cases, modems must also be used to convert analog to

digital signals to permit transmission over IP networks, regardless of data source.

Wireless Advantage: Data Access from AnywhereSince many data acquisition solutions are remotely deployed, cellular-based commu-

nications play a very important role and require an intelligent and reliable wireless com-

munications gateway at the end-point. Cellular networks offer a number of advantages

over alternative solutions, including increased capacity, portability and better coverage.

Most importantly, cellular provides the wireless advantage of being able to transmit data

from isolated or distant locations where landline access just isn’t feasible.

Wireless, industrial remote monitoring solutions provide real-time data access mon-

itoring capabilities to quickly detect and fix issues or inefficiencies across vast territo-

ries. For example, unlawful removal of copper at remote transmission towers or

downed wires from natural or man-made disasters can cause a domino effect, includ-

ing large-scale service interruption to customers and destruction of transformers.

Undetected gas leaks can cause massive environmental damage and revenue loss. The

May 2007 leak at the BP Prudhoe Bay field was reported to have stopped nearly

100,000 barrels of oil production per day. With an associated revenue loss at 3 days x

100,000 bbl x $65, that equals a three-day revenue loss of almost $20 million.

Reducing Costs and Increasing Efficiency with Analog to Digital MigrationNot only does wireless connectivity provide immediate access to data from any-

where to help improve process efficiencies, but it is also a requirement for the grow-

ing demand for mobile or portable monitoring solutions. One such company faced with

www.RemoteMagazine.com

Updating Data Acquisition Systems to Utilize Integrated Capabilities

Page 13: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

August/September 2008 Remote Site & Equipment Management 13www.RemoteMagazine.com

FeatureSCADA

this dilemma is Progress Energy Florida (PEF), a subsidiary of Fortune 250 energy

company Progress Energy. PEF was faced with the need to upgrade its analog data log-

ger solution without incurring the exorbitant costs of replacing legacy equipment. PEF

provides electricity and related services to 1.7 million customers and serves a territory

encompassing more than 20,000 square miles. The company is pursuing a balanced

approach to meeting the future energy needs of the region, including increased energy

efficiency programs, investments in renewable energy technologies and a state-of-the-

art electricity system.

PEF recently undertook an end-use load research study to better understand its cus-

tomers and plan accordingly for future consumption trends. Customers willing to par-

ticipate in the PEF study agreed to a detailed analysis of their energy consumption, by

having equipment in their homes (e.g. washer, dryer, air conditioner, water heater) mon-

itored with a data logger installed near their panel box. To collect the recorded data, the

project used a circuit switched device connected to the customer’s phone line. During

the implementation phase, PEF began to encounter many homes that had migrated to

digital communications utilizing DSL and Voice

over IP (VoIP), or simply did not have landline

access in the proximity of their panel box.

To secure a dedicated connection for the data

logger, PEF considered installing new landlines

to customers’ homes. Since the devices must be

connected to the data logger, which was most

commonly located in a home’s garage, not a cus-

tomary location for a jack, the majority of homes

would require a new RJ-11 phone jack be

installed next to the device.

Installing a landline and jack was not only excep-

tionally costly up front, but also included a recurring

monthly usage fee and additional fee for discon-

necting the line at the completion of the study.

Since, the study consisted of temporary installations

in a series of customers homes, deploying a portable

solution was a key deliverable. This requirement

caused a great deal of concern at PEF, since the

landlines could not be used from project-to-project

or from customer-to-customer.

PEF discovered a wireless data solution that per-

formed the same function as the current circuit

switched, dial-up application. Through the use of an

RJ-11 IP gateway device integrated with intelligent,

wireless gateways running on a 3G cellular network,

PEF was able to effectively monitor load demand

without interfering with other communication serv-

ices and without installing any new landlines.

The RJ-11 IP gateway and intelligent wireless

gateway solution inherently eliminates the need

for a landline, eliminating the cost of installation

and usage fees. The RJ-11 IP gateway device has

the unique ability to connect legacy circuit

switched devices to the public Internet by encap-

sulating the analog signal to internet protocol (IP)

for transmission over digital cellular networks,

seamlessly migrating from analog to digital with-

out replacing system infrastructure.

Another advantage of

the intelligent wireless

gateway solution is the

feature-rich intelligence

enabling remote config-

uration, packet-level

diagnostics and reliable

network session persist-

ence. By using an intel-

ligent device at the end-

point instead of a tradi-

tional circuit switched

landline, PEF has the ability to communicate with

and configure their remote gateways with a suite

of easy to use remote management software.

Finally, since the solution is portable, it allows

PEF to re-use the technology in future programs.

After a pilot program using a small batch of

wireless gateways, PEF conducted an analysis.

The analysis confirmed that the ease of installa-

tion, accuracy and efficiency of data transmission

and cost savings provided a sufficient business case to continue with a wide scale

deployment. PEF currently has the portable wireless solution installed in more than 80

percent of participating customer homes. In addition to a greatly simplified installation

process, PEF has reduced cost by avoiding visits from field technicians needed to sup-

port the unreliable landline devices and eliminating landline installation and usage fees.

Enhancing Data Logger Solution with Remote Monitoring Via Intelligent,Wireless Gateway

Another company that has enhanced its data logger solution using an intelligent

wireless gateway for transmission and management is Western Weather Group (WWG).

WWG furnishes accurate and personalized weather solutions through its weather fore-

casting and environmental monitoring systems. The company comprises professional

meteorologists and scientists who have been working together for over 20 years,

acquiring extensive experience in the field of meteorology and weather technology.

Please see Sierra continued on page 36

Page 14: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

14 Remote Site & Equipment Management August/September 2008

Products & ServicesNETWORKING

www.RemoteMagazine.com

GreenPeak Launches its EmeraldGP500C Communication Controller

GreenPeak Technologies has launched its Emerald

GP500C communications controller chip for ultra low

power wireless sensor

networks. The Emerald

GP500C is the only

IEEE 802.15.4 standard

compliant chip avail-

able with extreme low

power features that

enable energy harvest-

ing solutions for wire-

less sensor networks.

The Emerald GP500C is a standards compliant com-

munications controller that incorporates a transceiver

with a fully integrated communications layer and an on-

chip energy manager. Unlike other solutions on the mar-

ket, the Emerald GP500C device is an autonomous trans-

ceiver able to drive and control the data communication

instead of being driven by a microcontroller. By reducing

energy consumption, this architectural concept enables

end nodes to run on energy harvesting devices and to be

truly wireless, free of power cords and free of batteries.

GreenPeak's new radio creates reliable communication

over a significant indoor range (100 to 150 feet) because

it utilizes embedded hardware based antenna diversity

that reduces dead spots. Furthermore, the Emerald

includes other link reliability features such as message-

over-message enabling, excellent sensitivity, a robust sig-

nal processing engine and interference detection and

avoidance mechanisms.

Designs using the Emerald GP500C communications

controller are fully IEEE 802.15.4 compliant. Developers

have the option to use GreenPeak's ultra low power net-

working protocol that reaches beyond standard imple-

mentations while maintaining standard compliance.

The Emerald GP500C consumes a fraction (10 to 25

percent) of the energy of traditional microcontroller

based designs by using a lower peak current, an ultra low

leakage current and very short transmission times via

just-in-time transmission scheduling. The GP500C's low

energy consumption allows developers to build sensor

systems with a peak current of about 20 mA and a system

sleep mode of below 100 nA without compromising the

network reliability.

The Emerald GP500C is delivered with a reference

design and development kit that allows OEMs to build

their own communication modules and applications. The

GP500C will also support a wide range of software

stacks that can run on different processors including

ZigBee Pro as well as low power routing, low power

sensing, a micro stack and other application-dedicated

low power protocols. In addition, since the GP500C is an

integrated solution, all key functions and features are

integrated and minimal external components are

required. The total system bill of material (BOM) will be

lower and makes the GP500C best in class for total sys-

tem cost, allowing for the opening of mass markets for

maintenance-free sense and control applications.

Hear GreenPeak at the

Remote 2008 Conference and Expo!

Session Title: Wireless Sensors NetworksEnable Remote Monitoring with no Network

Wiring or Power Supplieswww.RemoteExpo.com

Cermetek Releases NewEmbedded Modem Family

Cermetek Microelectronics has introduced its

newest embedded modems, the XE2400G and

XE5617G. These modems

integrate LSI modem tech-

nology into a small, com-

plete modem module.

Cermetek has targeted these

new modems toward remote

monitoring applications

where small size is critical.

The XE2400G and XE5617G utilize the

unique Cermetek Hybrid PLCC (HyPLCC) pack-

age. The HyPLCC package delivers a complete

modem in a 68-pin PLCC outline, less than one

inch square. When the modem serves as a system

option, the XE5617G and XE2400G can be

installed in a 68-pin PLCC socket, otherwise the

modules can be soldered directly to the PCB

The Industrial Automation Group of Advantech has introduced four new managed

industrial Ethernet switches with integrated 100 Mbps fiber optic ports. The switches

are named the EKI-7554MI, EKI-7554SI, EKI-7559MI and EKI-

7559SI, respectively. These compact and industrially hardened

switches offer advanced traffic control for optimum network per-

formance and security, along with rapid self-healing fiber optic ring

capabilities that ensure network uptime in adverse environments.

The EKI-7554MI and EKI-7554SI offer four 10/100Base-TX

ports and two 100Base-FX fiber ports, while the EKI-7559MI and

EKI-7559SI offer eight 10/100Base-TX ports and two 100Base-FX

fiber ports. All models are equipped with SC type optical fiber con-

nections and are available in multi-mode (MI models) and single-

mode (SI models) fiber configurations. Additionally, these ruggedi-

zed switches feature an extended operating temperature range of -40

to 167°F.

To meet the real-time fault-tolerant needs of manufacturing, the

dual fiber connections can be used to connect multiple managed

switches in a self-healing ring configuration, which provides a sec-

ondary communications path in the event that the primary is interrupt-

ed. In addition to open standard Spanning Tree (STP) and Rapid Spanning Tree

Protocol (RSTP), the EKI-7000 family switches also support Advantech’s ultra fast X-

Ring, which guarantees recovery in less than 10 ms.

Another key benefit of the EKI-7000 managed switches is advanced network traf-

fic management. Using Virtual Local Area Networks (VLANs), a physical network

can be logically subdivided in multiple logical networks, improving

performance and enhanced security. With the rising popularity of

Ethernet/IP and other industrial protocols that use multicast messag-

ing, IGMP Snooping can direct these messages to only the partici-

pating devices, without flooding all of the other devices with unnec-

essary multicast traffic.

Managed switches also offer a variety of built-in diagnostics tools

for quick network troubleshooting and maintenance. Port statistics

allows remote monitoring of device connection status and data traf-

fic throughput, and the switch can also pro-actively send an e-mail

message or SNMP trap (alarm) when a fault has been detected, min-

imizing network downtime. Also these switches support Simple

Network Management Protocol (SNMP), for centralized remote

management or integration with HMI and SCADA systems.

Designed for demanding environments, these switches have been

designed to withstand extreme shock and vibration, extended operat-

ing temperatures of -40°F to 167°F, and include redundant 12 to 48

VDC power inputs for resiliency. Packaged in a metal IP30 rated chassis, these

switches feature standard DIN-rail or direct panel mounts. Plus, they are UL/CSA,

FCC, CE and RoHS/WEEE certified.

Advantech Expands its Line of Managed Industrial Ethernet Switches

Page 15: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

August/September 2008 Remote Site & Equipment Management 15www.RemoteMagazine.com

Products & ServicesNETWORKING

using standard surface mount solder processes.

Each XE5617G and XE2400G modem includes trans-

ferable FCC Part 68 registration eliminating the need for

further Part 68 testing. LSI modem technology also per-

mits adjustments for compliance to country standards

around the world with a single AT command.

The LSI, CV92 modem chip serves as the foundation

for the XE5617G. The CV92 supports V.92, 56,000 bits

per second data transfer and with fallback all the way to

300 bits per second. CV92 also provides V.17 send and

receive fax capability. The XE2400G utilizes the LSI

CV22, 2400 bit per second modem chip for applications

transferring small amounts of data.

New ILC 150 VLC ControllerFrom Phoenix ContactFeatures Steeplechase VLC 7.2

With the introduction of

Steeplechase VLC 7.2 and

support for the new ILC

150 VLC controller,

Phoenix Contact now

offers a complete scalable

control solution for

EtherNet/IP applications.

The company's EtherNet/IP products include a

full range of programmable controllers, managed

switches with Internet Group Management

Protocol (IGMP) snooping capability and a vari-

ety of I/O devices.

EtherNet/IP is an industrial Ethernet technolo-

gy supported by hundreds of vendors around the

world. EtherNet/IP is a member of the family of

CIP Networks, a group of networking technolo-

gies built on the Common Industrial Protocol

(CIPT), and is managed by ODVA.

The ILC 150 VLC is a compact, low-cost

embedded control platform for small- to medium-

sized applications. This new control platform

adds a controller choice at the low end of the

Phoenix Contact VLC scalable controller archi-

tecture. The built-in Ethernet port on the ILC 150

VLC allows for easy networking and data

exchange to a supervisory system using the

EtherNet/IP protocol. All the VLC control plat-

forms now have integrated Ethernet/IP capability

for either scanning I/O or for serving up applica-

tion status information to a supervisory system.

The Steeplechase Visual Logic Controller

(VLC) is a flowchart-based programming tool. In

addition to the new ILC 150 VLC control plat-

form, VLC 7.2 can also target other controllers in

the Phoenix Contact product line such as the ILC

350 VLC and the S-MAX VLC as well as a tradi-

tional PC-based runtime control platform.

Adder Launches CATx KVMSwitch to Provide SMBs withEnterprise-Grade Control

Adder has launched the AdderView CATx

1000. The CATx 1000 is a compact, multiplat-

form KVM switch with audio support that allows

a user to control up to 16 computers connected to

the CATx switch via CAT 5 cable locally at the

switch or remotely up to 1,000 feet away.

The use of CATx cable from the computer to

the switch allows for a much smaller switch,

reduced cable bulk and more flexibility. Part of the CATx

series of Adder KVM devices, the CATx 1000 has been

designed to minimize space requirements where space is

at a premium and maximize flexibility both in use and

location. One or two of the KVM switches can be rack

mounted and cascaded with other CATx 1000s to support

up to 256 computers.

The CATx 1000 delivers a wide range of features

including digital stereo audio, high resolution video,

USB device control and an advanced on screen display

and serial control for remote switching, power control

and synchronizing with other CATx 1000 units. Users

can also leverage security profiles which identify the user

prior to handing over control and even duplicate the con-

nection profiles onto other CATx 1000 devices if

required. Another feature is Display Data Channel

(DDC) handling where the KVM uses specific informa-

tion transferred from the display device to ensure correct

video is maintained with host machines.

The CATx 1000 can be connected to just about any

type of host including PC, Server, Mac or Sun by lever-

aging Adder’s Computer Access Modules (CAMs) to

enable broad connectivity options. The CATx 1000 car-

ries keyboard country codes enabling different keyboards

from different countries to be used on Sun hosts. The

KVM switch also uses ‘keep alive’ technology which

maintains the impression of keyboard and mouse being

present, even when disconnected for a long period of

time between KVM selections.

Page 16: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

MeshNetics Ships First 900 MHzModule Using the ZigBee PROFeature Set

MeshNetics has launched the ZigBit 900, a RF module

for sub-1 GHz band that uses the ZigBee PRO feature

set. The new IEEE 802.15.4-2006 module is designed to

operate in the ISM

bands 915 MHz in

the US and 868 MHz

in Europe.

The ultra-compact

ZigBit 900 module

features sensitivity of

-110 dBm and output

power of 11 dBm

that result in the line-

of-sight range of up to 6,000 m (more than 3.7 miles). The

power consumption stays at a low level of less than 6 µA

in sleep mode, 11 mA in receive mode and 26 mA in

transmit mode, which translates into added years of bat-

tery life. The ZigBit 900 operates in the European ISM

band from 863 to 870 MHz and in the North American

ISM band from 902 to 928 MHz. The ZigBit 900 offers

regional alternatives to the global 2.4 GHz band where the

channel characteristics of the lower frequencies can result

in performance advantages in certain environments.

The ZigBit 900 module ships with BitCloud, a

802.15.4-2006/ZigBee PRO feature set used for all the

2.4 GHz MeshNetics modules. Supporting self-healing,

self-organizing mesh networks and up to 1 Mbit/s data

rates, BitCloud stack optimizes network traffic while

minimizing power consumption. Customers can choose

between the C API for embedded application develop-

ment and SerialNet, a ZigBee manufacturer specific pro-

file based on BitCloud supporting a serial AT-command

interface to ZigBit 900.

“We are actively working with other ZigBee Alliance

members to enable interoperable and certified ZigBee

applications for the sub-1 GHz frequency band,” said

Vasiliy Suvorov, CEO of MeshNetics. “ZigBee is experi-

encing tremendous growth across a wide variety of

industries and we believe that sub-1 GHz solutions will

further extend ZigBee’s appeal and fuel its growth.”

The ZigBit 900 module is based on Atmel’s hardware

platform featuring AVR microcontroller and the latest RF

transceiver. The brand new AT86RF212 is a low-power,

low-voltage transceiver designed specifically for low

cost IEEE 802.15.4-2006, ZigBee and high data rate ISM

applications. The AT86RF212 boasts added sensitivity

combined with the very low power consumption. Its

MAC and AES hardware accelerators improve overall

system power efficiency and timing. The ZigBit 900

packs the MCU, RF transceiver and all the circuitry in

just under half a square inch of space.

Enfora Introduces Spider SAWireless Modem for RemoteMonitoring and Control

Enfora has released

the Spider SA-G+

wireless modem. This

new modem, which

uses the Locosto sin-

gle-chip platform

from Texas

Instruments, can cap-

ture and analyze data

from remote sensors, RFID tags and other input sources,

and transmit the data to monitoring and control stations.

Furthermore, the modem readily integrates with Enfora’s

middleware that allows for exchange of data with enter-

prise IT systems.

“The SA-G+ is well suited to applications that

require an economical solution for remote monitoring

of assets in the field,” said Brian Murphy, vice presi-

dent, worldwide sales, Enfora. “Additionally, the SA-

G+ allows application providers to move from circuit-

switched to Internet Protocol (IP) connectivity as need-

ed for their applications.”

The Spider SA-G+ is a type approved quad-band

GSM/GPRS modem that enables simple integration

through a serial connection. Its flexible design allows

system integrators to address multiple markets and

geographies with a single design. Enfora’s Spider prod-

uct family of intelligent modems is designed to support

a variety of wireless applications and includes solutions

for asset management, tracking and remote monitoring

and control.

Connect Several Devices andComputers to GPRS/EDGE Wireless Networks

Computers and devices connected through Ethernet

cables can access the Internet freely from everywhere

without needing wired or satellite access with eDevice’s

new RouteD230. The

RouteD230 has been

engineered to provide

reliable wireless

Internet connectivity

that can be used as

backup for already-

connected sites or as a

main link for yet

unconnected or brand

new sites. Cellular network specific features like auto-

matic attachment management and link failure discovery

increase link reliability while dynamic DNS allows user

to work around the limitations of dynamic IP addressing.

For critical applications where link redundancy is

needed, the RouteD230 can easily be used as a wireless

backup to the regular network infrastructure. The plug

and play set-up of this unique backup feature is compat-

ible with the most basic routers and does not require

advanced and expensive features like VRRP.

When used as the main Internet/Intranet link, the

RouteD230 embeds an internal DHCP server for easy

and immediate IP address attribution throughout the

LAN. The wireless Internet access is shared between sev-

eral computers or LAN devices using network address

and port translation allowing servers to be hosted on the

LAN with the TCP port mapping technique.

The RouteD230 embeds a quad-band GSM/GPRS or

EDGE module and targets cellular carriers, IT resellers,

OEMs and integrators. It is designed to offer connectivi-

ty for networks of computers located in branch offices,

mobile sites, stores and point of sale. Additionally, the

integrated serial port and memory card holder pave the

way for fast adaptation to specific customer needs in the

Machine-to-Machine (M2M) area for applications such

as remote monitoring, automated meter reading and

video surveillance.

Laird Technologies DebutsMesh Technology for HarshEnvironments and ExtremeDistance Applications

Laird Technologies, Inc. has made available its

new Extreme Mesh software technology that

delivers reliable performance in harsh environ-

ments when used with the company’s AC4790

range of 900 MHz wireless modules. While

ZigBee is widely used in mesh technology and is

finding new uses in automation, energy conserva-

tion and building control, an even more robust

solution is required for a range of customers who

work in the harshest environments. Laird

Technologies is working to add performance, reli-

ability and usability in this market with the new

Extreme Mesh technology, complementing its

existing line of ZigBee Your Way modules.

The static mesh software is available for its

AC4790 range of 900 MHz wireless modules

with power outputs of up to 1 W. This industrial

strength solution allows users to build meshes

with inter-node distances well in excess of one

mile, providing redundancy and reliability for

applications such as pipeline monitoring.

“Customers require performance and need

technically advanced products when working in

the harshest environments,” said Dan Miller, vice

president of Wireless Systems, Laird

16 Remote Site & Equipment Management August/September 2008

Products & ServicesNETWORKING

www.RemoteMagazine.com

Page 17: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

August/September 2008 Remote Site & Equipment Management 17www.RemoteMagazine.com

Products & ServicesNETWORKING

Technologies. “This new mesh software delivers reliable

performance when coping with extreme, harsh tempera-

tures and interference.”

The Extreme Mesh software in conjunction with the

robust industrial wireless module, offers static mesh oper-

ation, frequency hopping, extended temperature range, as

well as extremely simple set-up and installation. The ease

of installation is key to the deployment of such systems in

remote locations where products need to work out of the

box. To aid developers, an AT command interface is pro-

vided to control the nodes of the mesh network.

MRV LX 4108T ConsolidatesRemote Power, Device and SensorManagement of RemoteWireless Sites

MRV Communications, Inc., has released the

LX 4108T remote site manager, a complete

remote-site out-of-band management system

that delivers console, power and sensor manage-

ment in a single system. The LX 4108T remote

site manager is a one rack unit high device suit-

ed for wireless network sites, remote telecom

locations, manufacturing facilities and data cen-

ters where space, power and remote manage-

ment are key issues.

When deployed at un-staffed facilities utiliz-

ing lights-out management, the 4108T can man-

age all communications equipment, power

sources, physical and environmental conditions

from any remote location. These capabilities

improve system availability while also reducing

staffing costs, as on-site technical staff is not

required to perform hands-on troubleshooting

tasks such as rebooting locked-up equipment.

The device has eight serial ports, providing

remote network connectivity to serially attached

devices such as switches, routers and servers, via

RS-232, Ethernet and\or V.92 modem connec-

tions. Sensor and alarm management is also inte-

grated into each serial port further consolidating

multiple management functions into the device.

Power connectivity is provided by four 5-20R

outlets with a maximum overall device rating of

20 Amps. Further easing installation tasks, the

device includes eight RJ45 10/100 Ethernet

switch ports providing connectivity for addition-

al devices and removing the need to install a sep-

arate standalone Ethernet device. Leveraging the

software features of the LX Series Console

Servers, a number of security mechanisms

including RADIUS, SecurID, TACACS+,

SSHv2, SNMPv3 and SSL are supported ensur-

ing secure communications from any location.

Power and environmental conditions play a

large part in determining the availability of com-

munications networks today. Advanced power

monitoring provides unparalleled troubleshoot-

ing and planning tools including utilization sta-

tistics for each individual power outlet. The

4108T provides the ability to enable/disable indi-

vidual power outlets allowing unresponsive

devices to be rebooted without the need to phys-

ically access the device. Environmental condi-

tions can also drastically affect network reliabil-

ity in remote locations. The 4108T provides the

ability to monitor temperature, humidity and

moisture which are common causes of outages in

remote locations.

Astron Wireless Technologies, Inc.Increases Frequency Range forHESA Technology

Astron Wireless Technology’s

HESA system now has the capa-

bility to run from 2 MHz to 18

GHz for all applications, where

previously it ran at 2 MHz to 3

GHz. The HESA DF platform

provides a flexible platform for

configuring multiple antenna ele-

ments in a small form factor. Most

surveillance applications typically require highly sensi-

tive signal capture requirements utilizing multiple fre-

quencies. By networking various elements and their asso-

ciated electronics such as amplifiers, multiple frequencies

can be co-located, therefore requiring less space.

The Astron HESA technology provides an environ-

ment that optimizes antenna and system efficiency, lead-

ing to greater signal capture and reduced error rates. As

result of HESA, additional frequencies can be added to

achieve more target bandwidth while maintaining accu-

racy in a miniaturized form factor.

Several miniaturized DF antenna systems utilizing the

HESA DF platform have been developed by Astron.

Systems have been developed for multiple applications.

Inherent in the HESA DF Platform is the ability to pro-

vide a customized DF antenna according to customer

requirements and applications.

Page 18: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

Nick Depperschmidt, Associate EditorRemote Site and Equipment Management Magazine

1. Please give a brief overview of what Spinwave

Systems provide to the remote monitoring market.

Spinwave Systems offers a unique blend of technolo-

gy, products and applications expertise to customers in

the remote monitoring market. Our wireless technology

features mesh networking and a frequency agility com-

munication protocol, which results in a highly reliable

system. Our products

include sensors, pulse

counters, input/output

modules, smart meter

interfaces, and a

range of gateways,

including MODBUS,

BACnet and LON,

designed to efficient-

ly transmit data to

computers, SCADA

systems and building

automation systems.

We also offer a MOD-

BUS radio that allows

users to wirelessly

enable any existing

MODBUS device.

Our market focus

has been on the build-

ing automation market

and our support team

has years of hands-on

experience supporting

customers in implementing monitoring and control appli-

cations. We have been extremely busy working with cus-

tomers to implement systems in every aspect of automa-

tion and data collection: profiling building operation per-

formance, aggregating and comparing data from groups

of buildings to identify problem sites, transmitting ener-

gy consumption data for analysis and billing, and meas-

uring the results of efforts to reduce energy consumption.

We’ve also become more heavily involved in creating

demand response solutions, including both the control

systems needed to shed load, and the monitoring systems

that ensure that buildings continue to operate at optimum

functionality during those sheds.

2. What has been the biggest success for Spinwave in

2008 in terms of new technology development?

Our technology and product architecture enables us to

be “agile” and responsive to our customers. We pride

ourselves on our ability to listen and respond. One of our

customers, a systems integrator in the buildings controls

sector, was working with a school district to profile the

energy consumption in each of the schools in the district.

The problem was collecting energy consumption data in

real time. Our customer asked if we could design a prod-

uct that could be interfaced to electric, water and gas

meters to wirelessly transmit consumption data to the

district’s buildings automation system for analysis.

His basic problem was the meters were located remote-

ly from the buildings; it would have required a very

expensive installation if they tried to implement a con-

ventional wired systems. We responded and designed a

battery powered wireless pulse counter that would inter-

face to the various meters in the schools and transmit

usage data to his data collection point. The wireless pulse

counter enabled him to rapidly and economically install

the system, resulting real time data that can be used to

improve the district’s energy efficiency programs.

We have subsequently released the product to the gen-

eral market and have been very successful with it.

3. What are some of the benefits of using your wire-

less sub metering line of products?

In general, the submetering enables a building owner

or facility manager to precisely track his energy con-

sumption. Data from meters (electric, gas, water) can be

aggregated and analyzed and strategies to more efficient-

ly utilize energy can be implemented. In general, a

Spinwave submetering product can be implemented

quickly, flexibly and economically.

Spinwave enables customers the ability to rapidly and

economically implement a submetering system. Wireless

eliminates the need for expensive wiring and installation.

Through industry protocols, we can interface to virtually

any SCADA system. Our devices work with nearly all

automation and monitoring systems. That level of flexi-

bility means that submetering is now feasible for many

types of facilities where it was not feasible before.

4. How has the added emphasis on energy efficiency

and green initiatives affected Spinwave in 2008?

Spinwave’s products are designed to transmit data to

management for analysis and action. Our team has been in

the building controls industry for some time and routine-

ly think about energy management and efficiency. The

increasing awareness of energy efficiency that has been

building due to awareness of the impact of global warm-

ing has provided a stimulus for companies like Spinwave.

Relative to 2008, the rapid rise in energy prices, partic-

ularly paying $4.00 and up per gallon at the gas pump, has

provided an increased sense of urgency in implementing

energy efficiency projects. The demand response market

has also expanded, as the need to shed load to avoid

brownouts has grown. Our wireless products, which

install quickly and economically, are a good fit for energy

managers looking to improve their operations.

We have found that more and more customers have

been extremely interested in energy efficiency projects.

The European markets, driven by legislation, have been

extremely active in developing energy efficiency initia-

tives and are utilizing our wireless products to imple-

ment them.

5. Controlling meters and building automation wire-

lessly can bring about cyber security concerns. What

is Spinwave doing to protect its customers?

I do not mean to downplay the issue; however,

cyber security has not been a big concern for our

customers. In general, our system is highly

secure. Our proprietary wireless communication

protocol is a frequency agility system, with ran-

dom channel hopping. The network changes com-

munication channels very rapidly and adaptively,

and each link in the network could be communi-

cating on different channels at any moment, mak-

ing communications break-ins very difficult. The

built-in DSSS that’s part of the standard further

reduces the likelihood of interference. In addition,

IEEE 802.15.4 supports AES encryption stan-

dards with encryption strength up to 128 bits.

Those implementations that add AES encryption

standard to our frequency agility have even more

outstanding security.

6. Your system uses the 802.15.4 protocol.

What are some of the benefits of it over other

wireless standards?

It works well for us in our target markets and

applications. We use it because of the its low

power consumption, which is critical to us since

we rely on battery powered devices. Another

advantage is that, thanks to the availability and

low cost of silicon, pricing can remain affordable,

even for networks using hundreds of nodes.

18 Remote Site & Equipment Management August/September 2008

FeatureNETWORKING

www.RemoteMagazine.com

Executive Q&A with Spinwave Systems CEO William LaPointe

Spinwave System’s wireless MODBUS radio

Spinwave’s wireless mesh sensor networks integrate with automationsystems via Linux-based gateways.

Spinwave’s wireless thermostat con-troller is a drop-in replacement for anyexisting non-communicating thermostat.

Page 19: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

Low data rates enable low power consumption, mak-

ing it possible to have battery life of two to eight years

in the typical device, depending on environmental factors

and transmission intervals. So it’s the ideal standard for

use in applications where configuration and maintenance

time need to be kept at a minimum.

7. Are there any plans to develop Spinwave products

for other protocols?

Not at this time. We are monitoring the progress of

low power wireless WiFi very closely and have strong

interest in it.

We frankly spend most of our time complying with

applications protocols. We are literate in BACnet, LON,

MODBUS and XML and are evaluating others

with which to interface.

8. With so many different standards in play,

where do you see the wireless sensor market

heading in the future?

WiFi appears slated to become a more preva-

lent standard in the market, as does Bluetooth.

However, the range of applications for wireless

sensors is too diverse for one standard to domi-

nate. I believe we’ll continue to see a range of

standards at the integration point, such as

BACnet and LON in building automation and

MODBUS, HART, Fieldbus and PROFIBUS, in

the industrial sector.

Our technical team is highly innovative and

we are confident that we will be able to adapt to

the market as it evolves.

9. What are some of the new and exciting

projects/applications Spinwave is working on

right now?

We have a lot on our plate. Our long term goal

is to be a wireless automation company with a

full line of wireless control products. Our initial

target market is the virtually untapped small

building market. Products for this market include

zone controllers, I/O devices, and communica-

tions gateways, as well as sensors.

In addition, we are partnering to provide a

complete solution for submetering customers and

are working with another partner to develop the

second generation of our smart communicating

thermostat. We see ourselves working with more

partners to broaden our offerings in sensors, and

developing expanded OEM relationships.

10. What is in store for Spinwave in 2008

And beyond?

We are looking to be a dominant long term

player in the wireless automation market. We will

be internally focused on rounding out our product

line and building sales momentum for the balance

of 2008 and into 2009. Once we are secure in our

market segments, growth through acquisition is

in our plans.

Spinwave Systems is a developer of wireless sensorsand controls. Specifically designed for commercial build-ing automation, Spinwave’s products enable highly ener-gy-efficient building operations and productive andhealthy environments. Spinwave’s unique system designand rapid deployment toolset allows seamless integrationof wireless sensors to existing building automation sys-tems from all major manufacturers. For more informationplease visit: www.spinwavesystems.com.

William LaPointe is president and CEO of SpinwaveSystems, Inc. He has more than 25 years of buildingautomation experience and a proven track record ofgrowing a startup company to industry leadership. Billwas the president of Andover Controls Corpo., a suppli-

er of DDC systems to thebuilding automation market,from Sept. 1979 to its acquisi-tion by Schneider Electric in2004. Under his direction,Andover grew from 9 employ-ees and under $1 million inannual revenue to over 650employees and revenues of$170 million. Prior to AndoverControls, Bill held positions of financial and operationsmanagement with companies in the general industrial,computing, and defense industries. He holds and M.S.degree in Accounting from Bentley College and a B.A.degree in finance from Northeastern University.

August/September 2008 Remote Site & Equipment Management 19www.RemoteMagazine.com

FeatureNETWORKING

Spinwave has recently added wireless I/O modules totheir line of energy management products.

Page 22: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

Harvey Lehpamer, Senior Transmission Engineer Communication Infrastructure Corp.

Introduction to Microwave Network Build-OutIt can be challenging and expensive undertaking to

build a large and very reliable microwave network and

similar to telecom service providers, utility companies

must deploy highly reliable networks to guarantee serv-

ice for their customers. In the material that follows, we

will discuss some of the good practices in designing

high-reliability microwave networks. These practices, if

implemented in a timely fashion, could reduce CAPEX

and OPEX required for the project completion. Although

utility companies are lately getting more and more

involved in the last-mile type of communications sys-

tems, discussed here are mainly point-to-point medium

and high capacity, long-haul microwave systems. Of

course, many engineering principles mentioned here are

very much applicable to any type of radio communica-

tions system.

It is important to notice that transmission and there-

fore microwave systems for wireless networks, tele-

phone operators, and government or utility companies

will have very different set of requirements that have to

be considered. For example, electric and other utility

telecommunications networks have some specific

requirements that are different from other telecom net-

works since they are not only used for communication

between operations and administrative staff but also for

the distribution and collecting of data related to control

equipment. Examples are, among others, SCADA

(supervisory control and data acquisition), powerline

fault location, loop and ring protective schemes and

direct transfer trip protective relaying. SCADA systems

are used extensively by power, water, gas and other util-

ity companies to monitor and manage distribution facil-

ities. Direct transfer trip transfers local protective relay-

ing tripping signals hundreds of miles to operate distant

circuit breaker. Delay issues and high end-to-end avail-

ability and reliability of the backbone microwave links

in utility telecommunications networks are just some of

the main challenges to focus on.

Regardless of the end user and/or application of the

microwave network, microwave build-out phases are

common to all of them (Figure 1). Planning (sometimes

called preliminary design) usually means high-level

decision-making process, budget and schedule defini-

tion and identifying team members required for the proj-

ect (creating Task Delineation List.) It also includes

defining frequency band(s), system capacity, and net-

work configuration and performance objectives. The

next step is to perform preliminary path engineering

using topographical maps and/or terrain database, iden-

tify material requirements and create preliminary BOM,

and develop budget and schedule. Timelines and sched-

ule will define resources required and/or available (and

vice-versa) for the successful completion of the project.

A preliminary cost estimate will be only as accurate

as the defined scope of a project. In cases where very

limited preliminary microwave engineering has been

undertaken, this estimate will likely reflect the cost of

equipment and engineering services contemplated in the

scope of the project. In cases where more extensive pre-

liminary design has been completed and the scope of the

project has been well defined, this estimate will likely

reflect the total project cost very closely.

System design is an actual detailed microwave link

engineering process, which may or may not include site

visits but requires reliable site information, detailed path

surveys, path engineering including interference analysis

and FCC licensing, creation of the detailed Bill of

Material, ordering equipment (MW radio, shelters, tow-

ers, other transmission hardware and software) and

ordering engineering, installation and other services, etc.

A microwave radio system requires careful planning and

a poorly designed path may result in periods of system

outages, increased system latency, decreased throughput,

or a complete failure to communicate across the link.

Deployment, also called implementation, includes all

the field activities like site acquisition (if required)

tower erection or modification, equipment installation,

creation of an as-built documentation, and acceptance

testing and commissioning.

Important Things to Consider when Designing aMicrowave Network

1) Performing Detailed Microwave Path and Site Surveys

A path profile is a graphical representation of the

path traveled by the radio waves between the two ends

of a link and a result of path survey [1]. The path pro-

file determines the location and height of the antenna

at each end of the link, and it insures that the link is

free of obstructions and propagation losses from radio

phenomena, such as multipath reflections. A path pro-

file is established from topographical maps, which, by

reference to the contours of the map, can be translated

into an elevation profile of the land between the two

sites in the path. Earth curvature can be added, as well

as obstacles (see Figure 2).

The Fresnel Zone calculation can then be applied

and an indication of any clearance problems gained.

There are various software tools available to assist this

process if required, but most are reliant upon the avail-

ability of topographical data in digitized format. The

surveyor must check the present obstructions and

allow for future obstructions (such as new buildings,

tree growth, cranes, etc.) that may impinge the radio

path. It is also important to notice if there are some large

bodies of water nearby since large reflecting surfaces

can produce problems due to increased multipath proba-

bility at frequencies below 10 GHz.

It is important to note that the “Line-of-Sight” is not

the same as “Path Survey”! For longer paths and higher

capacity systems it is an imperative to actually perform

physical path survey and not to rely just on the maps

and/or aerial photographs or quick LOS methods, like

balloons, flashing the path, etc.

2) Antenna Mounting Structure AssessmentAntenna mounting structures could be towers, poles,

tripods, walls, water towers, high-voltage transmission

towers, etc. Things to keep in mind during the detailed

design and deployment of the MW system:

• Sufficient space on the tower to install and pan the

microwave antenna

• Loading of the antenna mounting structure (MW

antenna, transmission lines and outdoor MW unit)

• Maximum allowed twist and sway of the antenna

mounting structure (in degrees) – it will depend on

the frequency and antenna type

It is important to notice that the requirements for the

twist and sway of the tower could be much more strin-

gent for the microwave than other RF installations. Table

1 shows maximum allowed antenna deflection (-10 dB

points) for certain bands and typical antenna sizes.

Towers and other antenna mounting structures that do

not satisfy these requirements will cause very severe

long-term outages (and therefore unavailability of the

microwave link) due to misalignment of the antennas. It

is very important to use expert tower company to calcu-

late the loading of the tower and maximum allowed twist

and sway of the structure and not to rely on the qualita-

tive perceptions or “gut feeling.”

3) Using Existing Electric Transmission Towers for Mounting Microwave Antennas

Large electric transmission towers provide a corridor

between generation stations and substations, placed in

remote locations. Their location and 150-foot-plus height

allow for placement of larger antenna arrays and excellent

antenna elevation. These towers are ideal as antenna loca-

tions for propagating radio signals over large areas and

with the LOS in different directions. Precise engineering

and care must be used when placing RF and/or

microwave antennas near transmission conductors to

avoid the dangers of electric arcing [2].

From strictly microwave prospective, these towers as

well as power lines are not an obstacle to install a

microwave system even if they obstruct the LOS of the

microwave system. Signal loss due to the obstructed

Fresnel’s zone would be relatively small, depending on

the type of the tower and its construction.

22 Remote Site & Equipment Management August/September 2008

FeatureNETWORKING

www.RemoteMagazine.com

The Best Practices to Deploy a Reliable Microwave Network

Figure 1: Microwave build-out phases

Figure 2: Optical Line-of-Sight and Fresnel zone

Table 1

Page 23: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

4) Split Configuration, All-Indoor, or All-OutdoorRadio Configuration?

Three different installation scenarios are possible and

they all have their pros and cons; decisions will be made

taking into consideration a number of factors, like avail-

able tower space, tower loading, environment and cli-

mate, location, proximity to the service centers, access,

ease of installation, cabinet/shelter space, etc.

All-indoor Microwave Radio consists of the entire

microwave and digital modem part being placed

indoors, microwave antenna mounted outside on the

tower and a waveguide (or a coaxial cable) connecting

the transceiver of the radio with the antenna. This solu-

tion is acceptable for the lower frequencies bellow 10

GHz and high-capacity (backbone) microwave systems

but quickly becomes unacceptable as frequency increas-

es due to the high losses in the coax or waveguide.

Split Configuration Microwave Radio has a

microwave terminal with an outdoor part, the radio unit(s)

and an indoor part, the access module (see Figure 3).

Whenever possible, split configuration microwave

radio is replacing

the, all-indoor con-

figuration. To

reduce losses

between transceiv-

er and antenna, the

Outdoor Unit

(ODU) containing

all the RF modules

can be mounted

nearby the antenna.

The ODU is con-

nected to the Indoor

Unit (IDU), containing baseband circuitry, modulator

and demodulator, by means of one single coaxial IF

Cable. From the operational prospective, split configu-

ration is easier and faster to install, less space and equip-

ment required, etc. but climbing tower to troubleshoot,

repair or replace ODU is not an easy task. It requires at

least two skilled, trained and licensed riggers to main-

tain the site.

All-outdoor microwave radio is not a new idea, but

becoming popular again, especially among pure

Ethernet radio suppliers and users. Occasionally, finding

even one or two rack spaces in the equipment cabinet

could be a challenge. For special cases where the shel-

ter/cabinet space is at a premium, all-outdoor version of

high-capacity Ethernet radios could be used. In that

case, all the electronics is in the outdoor unit and only

Ethernet cable and a power cable are brought down to

the cabinet, eliminating a need for space for indoor unit.

Access and maintenance challenges are the same as in

the case of the split configuration radios.

5) Equipment Ordering and RFQsFor large microwave projects, RFQ (request for quo-

tation) is required and it can be functional or technical in

its nature; a functional RFQ is the one where the client

describes the system and functional requirements of the

system while it is the total responsibility of the supplier

to make it work (turnkey project). For turnkey contracts,

a specific scope of work document is also included to

define the installation and test services being added to

the contract. Technical RFQ is very similar except that

the client will provide more starting data to the supplier.

For example, preliminary microwave plan has been

done and tentative equipment locations identified, which

will give all the bidders the same starting point. This will

eliminate big discrepancy in the initial approach

between bidders and therefore provide more realistic

and competitive pricing.

Equipment and services evaluation usually is, or

should be, based not only on the technical specs and

price but also on the other criteria, for example, experi-

ence of other customers (especially regarding the relia-

bility) with the same or similar type of equipment, war-

ranty and customer support, maintenance, etc. Issue an

RFQ for the equipment and services, perform due dili-

gence and pick the best (not necessarily the cheapest)

companies to do the job [3]. Properly designed and

installed microwave network will not cause problems

but all the shortcuts and oversights made during the

build-out process most likely will.

6) Network Availability and Performance PredictionsFor the network operators, one of the key factors to

the success is its ability to maintain a high standard of

network performance, which can only be achieved by

adopting the appropriate QoS metrics and measurement

tools. In any telecom network, outages due to software

and hardware contribute to almost half of the telecom-

munications network downtime. Scheduled maintenance

represents the single largest contributor to network

downtime and human errors are another major cause of

downtime. In the microwave network, path outages due

to rain, anomalous radio propagation, and other severe

conditions are other important contributors to over-all

unavailability of the network.

The "Five nines," term is used to describe the piece of

hardware working reliably 99.999 percent of the time

(statistically, about five minutes of downtime per year),

used widely in the legacy TDM networks, may not be

sufficient quality matrix in the world of IP/Ethernet. The

“five nines” requirement, correctly or incorrectly, has

been applied to almost everything – from the telecom-

munications equipment to microwave paths, fiber-optic

links, and sometimes even all-inclusive end-to-end link.

When talking about availability it is a good idea to

define what exactly these “five nines” include.

Unfortunately, to make things more complex, “five

nines” will mean different thing to different people and

could be a topic for a whole new article.

In North America, it is quite common to sometimes

arbitrarily network designers assign the same require-

ment of 99.999 percent of time availability to the

microwave path (regardless of its length, capacity

and/or importance) and a guarantee of Bit Error Rate

(BER) better than 10-3 (or even 10-6) during that peri-

od. In many cases, designers neglect an actual quality of

the link due to increased BER and focus only on the

availability; the fact that the microwave link (or any

other network connection) is available still does not

mean that the link (and therefore the entire network) is

working properly.

Requirement for the availability of the microwave

link carrying IP/Ethernet traffic is still under considera-

tion but at the moment most wireless operators in North

America are still using usual “five nines” requirement

per link while utilities are still typically using “five

nines” end-to-end. These days more attention is being

placed not only on availability but also performance of

the link during the available time. Millisecond jitter and

latency requirements as well as the committed through-

put are some of the challenges facing transport networks

based on Ethernet technology.

August/September 2008 Remote Site & Equipment Management 23www.RemoteMagazine.com

FeatureNETWORKING

Figure 3: Typical Split Configuration MW Radio

Please see Communication continued on page 37

Page 24: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

24 Remote Site & Equipment Management August/September 2008

FeatureNETWORKING

www.RemoteMagazine.com

Brian Tucker, SVP Global Product Management Telit Wireless Solutions, Inc.

Machine-to-machine (M2M) communications tech-

nology is increasingly common worldwide in a wide

variety of vertical markets. The worldwide M2M market

will grow from $20 billion today to more than $220 bil-

lion by 2010, predicts IDATE, a market research firm.

That outlook is based on strong adoption over the past

few years: Between 2005 and 2006, M2M module rev-

enues grew 34 percent, from $621 million to $830 mil-

lion, according to Gartner.

The projected annual growth rate of nearly 50 percent

through 2012 is due to M2M’s strong business case. By

enabling machines to communicate wirelessly with one

another or with a central control unit, enterprises are

streamlining their business practices. That translates into

a significant reduction in overhead costs and new rev-

enue opportunities.

A prime example is utilities, one of the first industries

to deploy M2M for applications such as automated meter

reading (AMR).

“The utility industry is a prime example of how, by

networking and remotely monitoring machines, data can

be analyzed and collective behavior understood in new

ways,” Juniper Research concluded in a 2007 report.

“For example, a real-time, unified view of how power is

used will help safeguard this increasingly rare resource.

And what can be measured can be controlled and ulti-

mately optimized.”

The Juniper report cites an Italian utility that increased

revenue by $1 billion after deploying AMR across 6 mil-

lion electric meters. That success prompted the company

to expand its AMR infrastructure to 30 million meters.

“Similar cost and benefit patterns are expected across the

whole of the wireless AMR segment,” Juniper wrote.

Despite these benefits, M2M also faces several chal-

lenges in terms of maintaining the technology and pro-

tecting the investment. These include:

• The Rapid Pace at Which Cellular Technology is

Constantly Evolving

For example, although many wireless carriers are in

the midst of deploying third-generation (3G) technolo-

gies such as High-Speed Downlink Packet Access

(HSDPA), they’re already preparing to launch fourth-

generation technologies such as Long Term Evolution

(LTE) and WiMAX – in some cases, as early as 2009.

• New Regulatory Requirements

For example, some European governments recently

required utilities to have the ability to control energy

usage in individual homes. If a utility doesn’t have an

M2M system flexible enough to meet those mandates, it

could have to physically replace all of its AMR devices

with compliant ones – an expensive, time-consuming

project. Even without government mandates, enterprises

often want to add capabilities, another reason why flexi-

bility is key.

• Patching Software and Firmware

AMR and automotive/trucking are two examples of

M2M applications where modules typically are deployed

for five to 18 years.

Sending an employee to physically update or replace an

M2M device in the field or recalling vehicles to the deal-

ership for software updates generates significant expense.

Putting off ObsolescenceTo maximize the lifetime value of its M2M devices,

enterprises are increasingly seeking solutions that sup-

port firmware over-the-air (FOTA) remote updating.

This feature lets enterprises quickly respond to network

changes and mandates, software updates and applica-

tion changes.

With FOTA, the mean time between failures (MTBF)

value can be optimized for integrated M2M modules, as

well as for all of the subsystems used in the application.

This design reduces the M2M application’s maintenance

costs, which in turn has a positive impact on the applica-

tion’s overall running costs. In the future, FOTA will be

able to update both the module software and the M2M

application’s device software, increasing the application

flexibility, utility and profitability.

But not all FOTA solutions are created alike. The ideal

solution should update modules using the smallest possi-

ble file size in order to minimize network data charges

and enable faster remote updates. For example, the Telit

Firmware Update Service – co-developed by Telit

Wireless Solutions, Inc., and Red Bend Software – uses

file sizes typically less than 100 kb. That’s roughly 5 to

10 percent of the original firmware file size, reducing net

usage costs by up to 95 percent.

The ideal FOTA solution also should be 100 percent

fail-safe, even if power is lost to the module during the

update process. Without this fail-safe feature, a device

could remain non-functioning until the application could

be physically reached and updated, replaced or repaired

by a technician, which would negate the business case for

deploying over-the-air updates.

All of these features produce a FOTA solution that is

always predictable and repeatable, with no limits on the

number of updates. It’s important to note that although

FOTA is a relatively new option in M2M, it’s been

widely used in the handset industry for several years. In

second quarter 2007, roughly one-third of all mobile

phones sold were FOTA-compatible, according to

Ovum, an independent research firm. That adoption

helps provide peace of mind for enterprises considering

FOTA M2M because it means that FOTA is a mature,

widely used technology.

To understand the benefits of FOTA, it helps to look at

how it’s used today in verticals such as OEM automotive,

utilities and data synchronization.

OEM AutomotiveAutomotive manufacturing is an excellent example of

an industry that will significantly benefit from the

implementation of M2M technology with FOTA

capabilities. Currently, vehicles are generally

designed for a lifetime of 10 years or 150,000

miles. FOTA helps ensure that the M2M module

can remain in service as long as the vehicle does.

A significant amount of a vehicle’s actual cost is

related to electronic components. This cost can

increase further because many expensive vehicle

recalls are related to electronic components.

When vehicles are recalled to the dealership for

software updates, this generates an enormous

expense for auto manufacturers. Not only does it

entail the costly maintenance on thousands of vehi-

cles, but it also involves expensive human interac-

tion at the dealership. Every time the vehicle needs

servicing for M2M application software upgrades

or changes in cellular networks, it requires a visit

to the dealership. That’s a hassle for vehicle own-

ers, and it can drive additional costs for the dealer-

ship if, for example, it has to maintain a fleet of

loaner vehicles or shuttles to minimize customer

inconvenience while service is performed.

By utilizing FOTA, auto manufacturers can dras-

tically cut back on vehicle recalls by simply

upgrading or solving software defects remotely.

Meanwhile, OEMs can remotely track and run

diagnostics on vehicles, often recognizing and

remotely solving electronic component problems in

Maximizing the Lifetime Value of M2M Wireless Devices

Figure 1: Illustration of the key components of a FOTA solution

Page 25: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

August/September 2008 Remote Site & Equipment Management 25www.RemoteMagazine.com

FeatureNETWORKING

the vehicle even before the consumer notices trouble.

Once the problem is recognized, the auto manufacturer

can make necessary changes on the assembly line prior to

deploying more potentially faulty components. Besides

saving money on recalls, avoiding those problems also

protects the vehicle manufacturer’s brand reputation and

market perception.

In addition to significantly reducing recall costs,

FOTA also lowers warranty costs and extends the life-

time of the vehicle. At the same time, FOTA can quickly

reprogram the M2M application to almost immediately

adjust to changes on the cellular network.

Networks throughout the world vary greatly with

respect to their configurations. While GSM is a global

standard, there are thousands of parameters with-

in any given network setup that are configured

by the network operator. These parameters

include such items as timeouts and registration

intervals. While interoperability testing greatly

improves the chances of a device operating cor-

rectly in a given network, there are no assur-

ances. Some network operators require certifica-

tion of the device on their network, but even this

level of testing is only valid for the current con-

figuration. Should a network operator change

settings, existing devices in the field may begin

to experience problems that were not apparent

when the device was validated. FOTA can help

to resolve these issues by updating the firmware

to a compatible configuration.

Utilities and MeteringMuch like the automotive industry, the utilities

and metering sector stands to benefit from signif-

icant cost savings by implementing M2M tech-

nology with FOTA capabilities. M2M enables

AMR to transmit utility usage data via cellular

networks at regular intervals. By implementing

an M2M application, this eliminates the need for

human meter readers, a significant cost savings.

Those savings are one of the reasons why M2M

deployments in the electric, water and gas indus-

tries will have a compound annual growth rate of

24 percent through 2013, according to a

December 2007 report by ABI Research.

FOTA enables quick response to a growing phe-

nomenon in the utilities and metering sector: gov-

ernment legislation. Recently, some European

governments mandated that utility companies have

the ability to control energy usage in individual

homes. Instead of physically replacing all meters

with technology programmed to meet the govern-

ment’s mandate, companies using FOTA-enabled

M2M devices would simply send an over-the-air

update to meters upgrading the application.

By implementing a FOTA-enabled M2M

device, companies also can upgrade a meter to

track and control energy usage as precise as an

individual appliance in a user’s home. Utilities

can then educate their customers about energy

and cost saving opportunities by sharing that

detailed usage information.

Data SynchronizationA relatively new concept that is taking off at

an incredible rate, data synchronization is a

function that is primarily a result of FOTA

capabilities. M2M enables cellular phones,

computers, MP3 players and other devices to

communicate with one another via a combina-

tion of cellular, Bluetooth, Wi-Fi and ZigBee

technologies. With the addition of FOTA capa-

bilities, devices can automatically synchronize

data when prompted.

FOTA not only enables quick over-the-air

updates, it also updates the differences between the two

devices. That approach significantly reduces airtime

costs and time spent downloading. In the process,

FOTA also frees up network capacity for revenue-gen-

erating applications, instead of using it for mundane

tasks such as synchronization.

Flexibility for the FutureFOTA provides an excellent solution for implement-

ing, maintaining and updating M2M devices in the field,

as well as maximizing their useful lives. FOTA protects

the enterprise’s M2M investment by giving it a graceful,

cost-effective way to adapt quickly to changes in net-

work configurations and software upgrades implemented

by the wireless carrier.

FOTA is particularly valuable for M2M applications that

involve devices and assets that are constantly moving or are

located in remote locations, such as shipping containers,

trucks and utility meters. For those applications, FOTA

helps preserve the business case for deploying M2M by

minimizing the cost of upgrading modules in the field.

Telit is a global wireless technology company. Itdevelops, manufactures and markets GSM/GPRS,UMTS/ HSDPA and CDMA/EVDO enterprise communi-cation modules for machine-to-machine (m2m) applica-tions. For more information about the company, pleasevisit www.telit.com.

Page 26: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

26 Remote Site & Equipment Management August/September 2008

Products & ServicesONSITE POWER

www.RemoteMagazine.com

FMP25.48 Rectifiers Save EnergyDeliver 25 kW Per Rack Unit forNetwork Power Applications

Power-One, Inc. has introduced the FMP25.48 rectifi-

er. This energy-saving 2,500 watt, -48 V product delivers

efficiencies exceeding 92 percent and power densities

surpassing 27 watts/cubic inch, while enabling 25 kW of

power in a one rack-unit 23 inch shelf. A wide variety of

distribution options are available to enhance flexibility

when powering site-level communications applications

such as wireless base stations, remote switches and

broadband access.

Additional features include a wide-range 90 to 300

VAC input, high-input-voltage shutdown and the ability

to withstand a loss

of phase or neutral

without damage.

Advanced reso-

nant soft-switch-

ing topology sig-

nificantly reduces

rectifier compo-

nent stresses to increase reliability. The FMP25.48 uti-

lizes a compact 4.2 by 13.2 by 1.6 inch package.

This rugged product is earthquake rated to GR 63 Core

Zone 4 and exceeds EN61000-4-5 surge immunity.

Safety agency approvals include EN 60950, UL 1950 and

IEC60950, and CSA C22-2 No. 950.

The PMP25.48 is compatible with Power-One’s

Guardian series of DC power solutions, which

includes rack and cabinet systems that can deliver up

to 500 amps with up to 720 Ah of backup battery capa-

bility. Medium and large power requirements are also

supported with 1,200 A per bay, up to 6,400 A.

GE Energy Releases New OpFlexExtended Turndown for 9FA+eGas Turbines

Citing the need in the power industry for additional

operational flexibility, GE Energy has introduced

OpFlex Extended Turndown, which enables customers

to operate their 9FA+e gas turbines with additional

turndown without jeopardizing performance, reliabili-

ty or emissions.

OpFlex Extended Turndown extends the reduced-

emissions operating range to lower load levels by

increasing gas turbine turndown capability. Currently,

the typical turndown minimum for the 9FA+e gas tur-

bine equipped with the DLN 2.6+ combustion system is

40 percent load at ISO conditions. OpFlex Extended

Turndown is targeted to provide a minimum of 5 percent

additional turndown. By reducing the turndown to 35

percent load, customers are able to reduce the amount of

fuel consumed during off-peak hours and avoid shut-

down and start-up costs, as well as minimize mainte-

nance requirements associated with shut-downs.

OpFlex Extended Turndown builds upon decades of

GE expertise and experience in the area of combustion

technology. This software solution optimizes the com-

bustion process and enables power generators to reduce

fuel costs significantly. CO2 emissions associated with

low-load operation are also reduced, while maintaining

low NOx and CO emission levels.

“OpFlex Extended Turndown is an exciting new

development that will provide our customers with addi-

tional flexibility to meet the challenges of maximizing

operational revenues while minimizing operational

costs,” said Dan Heintzelman, president of GE Energy’s

services business.

New Robust and Compact PowerConverter for Critical Applications

Schaefer, Inc. has intro-

duced the C4700 series of

2,500 Watt DC/DC converter,

AC/DC power supply and

battery charging products.

The series’ robust design,

using industrial grade com-

ponents, yields an efficient,

space-saving solution for

extreme environments in

industries such as controls

and communications equip-

ment, military applications,

alternative energy applica-

tions, transportation and process control systems.

The C4700 series features an extensive lineup of over

200 standard models, with requests for modifications

also welcomed. Nine standard DC input voltage options

span a range from 10 VDC to 800 VDC. AC input mod-

MIT engineers have improved the power output of one type of fuel cell by more

than 50 percent through technology that could help these environmentally friendly

energy storage devices find a much broader market. The new material key to the work

is also considerably less expensive than its conventional indus-

trial counterpart, among other advantages.

“Our goal is to replace traditional fuel-cell membranes

with these cost-effective, highly tunable and better-perform-

ing materials,” said Paula T. Hammond, Bayer Professor of

Chemical Engineering and leader of the research team. She

noted that the new material also has potential for use in other

electrochemical systems such as batteries.

Like a battery, a fuel cell has three principal parts, two

electrodes (a cathode and anode) separated by an electrolyte.

Chemical reactions at the electrodes produce an electronic

current that can be made to flow through an appliance con-

nected to the battery or fuel cell. What is the principal dif-

ference between the two? Fuel cells get their energy from an

external source of hydrogen fuel, while conventional batteries

draw from a finite source in a contained system.

The MIT team focused on direct methanol fuel cells (DMFCs), in which the

methanol is directly used as the fuel and reforming of alcohol down to hydrogen is not

required. Such a fuel cell is attractive because the only waste products are water and

carbon dioxide (the latter produced in small quantities). Also, because methanol is a

liquid, it is easier to store and transport than hydrogen gas, and is safer as it won't

explode. Methanol also has a high energy density-a little goes a long way, making it

especially interesting for portable devices.

The DMFCs currently on the market, however, have limitations. For example, the

material currently used for the electrolyte sandwiched between the electrodes is

expensive. Even more important, that material (known as Nafion) is permeable to

methanol, allowing some of the fuel to seep across the center of the fuel cell. Among

other disadvantages, this wastes fuel-and lowers the efficiency

of the cell because the fuel isn't available for the reactions

that generate electricity.

Using a relatively new technique known as layer-by-

layer assembly, the MIT researchers created an alternative

to Nafion.

“We were able to tune the structure of our film a few

nanometers at a time,” said Hammond. “This got around

some of the problems associated with other approaches. The

result is a thin film that is two orders of magnitude less per-

meable to methanol but compares favorably to Nafion in

proton conductivity.”

To test their creation, the engineers coated a Nafion mem-

brane with the new film and incorporated the whole into a

direct methanol fuel cell. The result was an increase in power

output of more than 50 percent.

The team is now exploring whether the new film could be used by itself, com-

pletely replacing Nafion. To that end, they have been generating thin films that stand

alone, with a consistency much like plastic wrap.

Interested in Direct Methanol Fuel Cells for Remote Power Applications?

If so then you should attend Smart Fuel Cells Remote 2008 Conference Session:

The New Alternative: Direct Methanol Fuel Cells for Remote Powerwww.RemoteExpo.com

MIT Creates New Material for Fuel Cells

Page 27: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

Products & ServicesONSITE POWER

August/September 2008 Remote Site & Equipment Management 27www.RemoteMagazine.com

els offer either 1-Phase or 3-Phase options as well as bat-

tery charging models. Single outputs are available in 12

standard ranges encompassing 4.5 VDC to 400 VDC. All

outputs are adjustable and fully regulated to 0.2 percent

or better (load) and 0.1 percent (line). DC/DC and

AC/DC models have remote sense capability, while effi-

ciencies are up to 95 percent. Operating temperature is -

20°C to 75°C, with -40°C to 75°C as an option.

The units are packaged in a space saving 6U by 19

inch by 306 mm rack module, a wall mount module, or a

newly introduced chassis mount configuration. Options

include decoupling diodes for parallel / redundant opera-

tion, further mechanical ruggedization, inhibit, Power

Fail / DC-OK alarms, system reset and program-

ming/monitoring functions.

Tripp Lite Introduces 8 kVASmartOnline UPS Systems withCorded Input

Tripp Lite has introduced two new 8 kVA SmartOnline

hot-swappable modular UPS systems named model

SU8000RT3UN50 and

SU8000RT3UN50TF.

The new models

include a convenient

corded input that elimi-

nates the need for an

electrician to install the

UPS via hardwire con-

nection. Model SU8000RT3UN50 features 200-240 V

input/output and model SU8000RT3UN50TF includes a

transformer module for additional 120 V output. Both

units include a 50 amp Hubbell twist-lock plug and

heavy-duty input power cord.

SmartOnline hot swappable modular UPS systems

have been designed from the ground up for the needs of

enterprise business customers. Tripp Lite's hot-swap-

pable design eliminates power-related downtime and

ensures maximum power availability. End users can per-

form all potential UPS maintenance, including complete

power module exchange, without powering down con-

nected equipment. Additional features include expand-

able runtime, cost-reducing user-service options, flexible

outlet configurations, remote management capability and

N+1 configurability for efficient fault tolerance.

Cellwatch.net Provides EmailOptions for Battery Monitoring

Cellwatch.net is now available to extend the

functionality of Cellwatch battery monitoring

systems by providing email alarm routing and a

web-based resource for disaster recovery and

uptime monitoring. Cellwatch is a permanently

wired battery monitoring system that warns users

of failing or degrading batteries in critical power

applications, such as a UPS. It can also alert

users of potential problems caused by a UPS,

such as overcharging batteries and causing poten-

tially harmful thermal conditions. Cellwatch

alarms and reports are typically routed to a dedi-

cated PC, but now Cellwatch.net adds the dimen-

sion of multiple email routings to widely dis-

persed personnel.

Cellwatch.net is a two part application, involv-

ing a dedicated program running on the

Cellwatch PC and a secure remote web site. The

Cellwatch.net web site provides users with email

routing options, five different alarm functions, a

complete alarm log for each site, a site heartbeat

monitor, complete data files and mapping. The

email function sends daily emails to specified

users with updated battery reports. Email routing

options allow alarm and heartbeat reports to be

sent to different people, or multiple people. The heartbeat

monitor notifies users if a battery monitoring system is

not reporting, so facility management can be alerted to

check the status.

By accessing the Cellwatch.net web site, users can

select from five different alarm functions (voltage, ohmic

value, temperature, discharge and system off-line), view

a complete alarm log and access the data restore facility,

which contains all files for discharge data, current and

temperature. The mapping facility provides a visual dis-

play of site locations, color coded to show system status.

Powerware BladeUPS MaintenanceBypass Cabinet Integrates ThreeFunctions In One Unit

Eaton Corp. has made avail-

able the new Powerware

BladeUPS maintenance bypass

cabinet (MBC). Information

technology (IT) and facilities

managers can now integrate

power transformation, power dis-

tribution and maintenance bypass

into a single cabinet.

The MBC complements a 60

kVA Powerware BladeUPS par-

allel system, an energy effi-

cient, rack-based uninterrupt-

ible power system (UPS)

designed and optimized for

high-powered blade servers and

high-density computing envi-

ronments. This three-in-one cabinet is designed to

allow the transfer of power to full system bypass to

perform service, testing and maintenance on up to a

full rack of Powerware BladeUPS without interrupting

power to the critical load.

The integral maintenance bypass is a mechanical way

to bypass the internal components of the UPS while still

sending utility power to the load. If the UPS must be

repaired internally, it can be completely isolated from

utility power and a technician can safely perform service

without voltage present.

The MBC uses a TP-1 transformer, which meets the

US Department of Energy standard for the Energy Star

program, to step down utility power from 480 V to

208/120 V to provide electrical isolation and appropriate

input voltage for Powerware BladeUPS modules. With

high efficiency, even at low loads, the TP-1 transformer

yields significant savings in utility costs.

Cummins Provides Backup PowerSystems for Critical Facilities

Cummins Power Generation now offers closed-transi-

tion bypass switches from 150 to 4,000 amps for critical

locations and facilities. Cummins' BTPC bypass switch-

es offer redundant power transfer capability for situations

where even a brief power interruption can have serious

consequences. The closed-transition BTPC switch auto-

matically transfers loads between two live sources (utili-

ty and backup) without interruption.

The BTPC consists of a rail-mounted, removable auto-

matic transfer switch (ATS) and a fixed, manually oper-

ated bypass switch. Before the ATS is pulled out for

repair or maintenance, the load power is diverted to the

bypass switch. By having the bypass switch activated

before the ATS is disconnected, the power supply contin-

ues without interruption. After the bypass switch is

engaged, the ATS can be placed in one of three positions:

connected (normal), test (powered but offline) and isolat-

ed (disconnected).

BTPC switches from Cummins Power Generation are

UL listed, having passed the tests required by UL 1008,

the strict standard for emergency, legally required and

standby applications. Safety features include closed-

door ATS isolation to protect against arc flash, and shut-

ters to protect the stationary bypass terminals during

removal. BTPC switches use field-configurable

PowerCommand microprocessor-based controllers fea-

turing easy-to-use push-button controls for activating

testing, programming timing delays and setting the exer-

cise clock. Flash memory retains settings, even if the

switch loses power. LED indicators provide at-a-glance

system status, and a digital display provides status infor-

mation on other ATS equipment in the facility. In a fully

integrated Cummins system, the ATS controller also dis-

plays generator set status information.

Page 28: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

28 Remote Site & Equipment Management August/September 2008

Products & ServicesSECURITY

www.RemoteMagazine.com

Extreme CCTV's EX36 IP DeliversNetworked Surveillance for Utilities

Extreme CCTV

has released the

EX36 IP camera,

combining perform-

ance optics, vandal-

resistant construction

and IP connectivity to

provide networked

surveillance for water

and energy sites.

EX36 IP features IP

infrared imaging (i3), which utilizes infrared illumination

to deliver high quality images day and night, integrating

with IP networks.

Low-noise images produce lower bandwidth than

standard IP cameras, helping ensure properly functioning

networks and real-time, instantaneous transmittal of crit-

ical surveillance video for improved response to security

breaches. EX36 IP incorporates a 45° tilt for vandal-

resistant monitoring of an entire room including the area

directly below the camera, while 940 nm infrared illumi-

nation enables covert night-time imaging.

New Add-On Universal Lock forHandwheel Valves

Dutch industrial

safety and valve con-

trol company

Netherlocks is

launching the SHL,

their new Smart Hand

wheel lock. The key

transfer lock can be

fitted easily like a

simple lock-out

device to any size or

type of hand wheel

operated valve. No

valve details, extra

parts or customized adaptors are needed, and it locks the

wheel into pre-set, safe positions controlled by the inter-

locking key release mechanism.

Traditionally, valve locks have depended on the precise

specification of each valve in order to be fitted effective-

ly. Detailed valve information would need to be collected

and used to fashion the mountings for the lock. The

unique design of this product means that it can be added

onto any existing hand wheel-operated valve to mechani-

cally secure it, without the need for such information.

The SHL attaches onto the valve stem underneath the

wheel without replacing or altering any part of the valve

assembly. No specially machined parts are needed, and the

innovative design that attaches the lock to the hand wheel

still leaves space to grip it. This makes it much easier to

simply, securely and safely provide interlocking for hand

wheel valves: no specific valve information is required, no

machined adaptors or mounting brackets are needed and

the lock can be fitted whilst the valve is still operational.

Interlocks minimized the danger caused by the poten-

tial for human error, as they prevent the valve from being

operated until it is safe to do so. The coded key to unlock

the valve is only released for use once the correct

sequence of precautions has been completed, with each

stage of the process enabled only once the previous one

is finished. This physically prevents accidental and

potentially dangerous actions from being performed,

negating the risk of human error.

OxBlue Releases Solar WebcamsOxBlue is now offering a line of professional grade

solar ready construction webcams and rugged solar power

stations to run them. The units provide the same high-def-

inition image capabilities of the OxBlue cameras and are

backed by OxBlue's comprehensive customer care.

The solar offering has been designed for remote sites

and simple installation. The solar power stations provide

digital readouts on system status and performance. They

are comprised of battery banks managed by an automated

charge controller system. The unit is housed in a pole-

mountable, lockable aluminum enclosure, with lightning

protection and circuit-breakers for both the solar array and

battery banks. Both the solar-ready camera and power sta-

tion are designed for easy client-installation, requiring

minimal setup.

While solar and green-friendly solutions have been

desired across the industry, the

accelerating demand resulted in

OxBlue's decision to begin pro-

duction of a standardized solar-

ready webcam solution.

"We've seen an increase in cus-

tomer demand for solar systems,

in tandem with an ever-increasing

use of security cameras, said

Chandler McCormack, CEO,

OxBlue. “We felt that it was time

to develop a truly integrated

solar-ready camera solution.”

“By redesigning the internal

power components of the system

and working with a team of expe-

rienced solar engineers, the solar-ready cameras can

afford an 80 percent drop in energy consumption allow-

ing for a power solution with five-plus days of solar

autonomy,” said McCormack. “We wanted to standardize

the system, to take the guess-work out of solar perform-

ance, reliability and pricing."

Secure Asset Management nowAvailable for Tofino Security Users

MTL Instruments has released a new loadable securi-

ty module (LSM) for its Tofino industrial security solu-

tion that discovers and identifies what devices are on the

network and creates the firewall rules to control the traf-

fic flowing to them, all without risk to the industrial

process. This latest LSM, known as the Tofino secure

asset management module, locates devices and generates

rules simply by analyzing the traffic on the network.

This innovation is a first in the industrial security

world and possibly also in the IT security market. Asset

management tools in the IT world have been available for

over a decade, but all are based on the principle of send-

ing probing messages onto the network to discover what

is deployed. Unfortunately for industrial users, there have

been many documented cases where these discovery

messages have caused SCADA and process control sys-

tems to crash.

As a result, many major energy and manufacturing

companies have banned the use of IT-style asset tools

on industrial networks, leaving control engi-

neers without any techniques to determine what

is actually connected to their network at any

given moment.

With the release of the Tofino secure asset

management module, engineers now have a safe

and secure means of locating what is on their con-

trol system networks. Designed specifically for

industrial control operations in critical industries

such as oil and gas, manufacturing, utilities and

power generation, the Tofino never probes the

control devices. Instead, it quietly listens for traf-

fic and then uses special characterization tech-

niques to determine the types of control devices

on the network. When it discovers a new device,

it prompts the system administrator to either

accept its deductions and insert the new device

into the network inventory diagram, or flag the

device as a potential intruder. This way, an up-to-

Page 29: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

August/September 2008 Remote Site & Equipment Management 29www.RemoteMagazine.com

Products & ServicesSECURITY

the-minute network map is always available to the con-

trol engineer.

“Passive scanning techniques have been discussed in

academic literature or released in open source projects

before, but as far as we are aware, this may be the first

successful commercial application of the technology in

the world, said Eric Byres, CTO at Byres Security Inc.”

The secure asset management module doesn’t rest on

its laurels once it discovers everything on the network. It

also guides the user through creating appropriate fire-

wall rules to allow or block messages, based on what it

has learned about the network traffic. Technical com-

plexities such as IP addressing and TCP/UDP port num-

bers are managed behind the scenes, making the normal-

ly byzantine art of firewall configuration easy for the

controls professional.

The new module is receiving very positive reviews

from the security professionals who have seen the pre-

release version. Charles Payne of Adventium Labs, a

noted firewall expert who has lead numerous US Navy

security projects, said "Tofino's novel context-sensitive

approach ensures appropriate security policies for each

protected device. The new automatic asset discovery and

automatic rule generation will ensure that nothing is

missed. These capabilities are critical for creating

informed security policy in the industrial world."

“The Asset Management module is a key step in our

Tofino Intrinsically Secure strategy”, said Byres. “Our

goal is to make security understandable for control engi-

neers, so that they can focus on keeping their process run-

ning safely and efficiently.”

New High Resolution CameraFeatures AL1 Lens for Picture Quality

VISIONtech has introduced its 6 mm AL1 IR bullet

camera that can see up to 100 feet at 0.0 LUX and fea-

tures 1/3 inch Sony Color 420 TVL Day/Night

CCD technology. Additionally, the AL1 lens pro-

vides added picture quality in any light situation.

Fully weatherproof, this camera is designed for

rugged environments. Its size and strong metal

structure offer easy installation and make it suit-

able for a wide variety of professional applications.

videoNEXT Launches ThreeNew Products

videoNEXT has introduced its v-MX video

wall solution, the v-IQ and its v-AC. All three

units are designed to help professionals manage

their security solutions.

The v-MX is a new virtual-multiplexing dis-

play system that enables videoNEXT's Security

Knowledge Manager (SKM) users to display live

and archived video and command and control

data to an infinite number of displays in their

command center.

Adding v-MX to an SKM installation enables

video wall and multiplexing functionality in a

pure IP-based environment. v-MX can scale to

route and display live video directly from any

number of cameras to a limitless number of video

wall configurations. Whether an organization

needs a dual monitor terminal or a massive, multi-

display command center video wall for hundreds

of cameras and monitors, v-MX is a value-rich

solution both techni-

cally and fiscally.

v i d e o N E X T ' s

SKM is an open, stan-

dards-based software

solution that works

with almost any IP,

digital or analog cam-

era, runs on any Intel

or compatible server

and uses an organiza-

tion's existing security and data infrastructure in new and

powerful ways. It provides an easy and scalable IP sur-

veillance and security solution. Combining this with full

policy-level administration and a flexible high availabil-

ity Storage Volume Manager - organizations now have a

highly capable, powerful, scalable and easy-to-use sur-

veillance and security tool.

videoNEXT’s new video analytics solution, v-IQ, is

designed to accurately mine and evaluate critical events

amidst a massive amount of video data. The v-IQ was

developed as a result of years of research and develop-

ment (R&D) and partnerships with leading universities,

computer vision scientists and an exclusive cooperative

R&D initiative with the US Army Research Lab.

videoNEXT has broken down the video analytic

dilemma into two components. The first is the actual

object tracking, down via advanced ground subtraction

algorithms to isolate objects from the background. The

second is the logic used to determine what the object is

doing. Applying this two-step method allows

videoNEXT to easily tailor its advanced video algorithms

for use in a multitude of environments. These v-IQ mod-

ules can be applied in real-time or in a forensic search to

recognize many behaviors, such as abandoned objects,

velocity and count of objects, access control tailgating,

directional violations, zone of protection violation and

camera-to-camera object hand off.

"Surveillance video technology is a valuable physical

security method for facilities, however, it is the ability to

analyze these videos that provides the real value to an

organization," said David Marra, chief technology officer,

videoNEXT. "Our v-IQ solution offers advanced analyti-

cal capabilities to enable users of our Security Knowledge

Manager (SKM) solution to easily detect and prevent

potential events or to review video for forensic purposes."

The third and final new product is videoNEXT’s access

control solution, v-AC. This addition to the videoNEXT

family of IP video and physical security information man-

agement products provides a framework for the integra-

tion of both legacy and new IP-enabled access control

systems with the company's Security Knowledge

Manager (SKM) command and control center.

v-AC provides a single command and control appli-

cation to monitor video and associated access control

alarms in real-time by visually interrogating access con-

trol alarms and automatically seeing the video from the

access points in question. It integrates with many legacy

systems, including SoftwareHouse and Lenel, and offers

door control functionality within the SKM command and

control display.

The videoNEXT v-AC solution also provides forensic

search capabilities for visual card holder interrogation.

If an employee unknowingly lost their access control

card, for example, and there had been a string of thefts

at the facility, the security team could use the v-AC solu-

tion to access the video that is correlated to the lost card

and see who is using the card during the time period

when the theft occurred. This feature of v-AC is a fre-

quently requested functionality by SKM users in all

types of industries.

Check out Remote 2008 Conference and Expo’s

New Security Session Track Online at:

www.remotemagazine.com/rem08_program.php

videoNext’s v-MX solution

videoNext’s SKM software solution

Page 30: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

www.RemoteMagazine.com

Todd Nicholson, Chief Marketing Officer Industrial Defender

Our nation’s resources, as well as our interconnected

global economy, depend on the security of our critical

infrastructure systems, which include the power, oil and

gas, transportation, water and chemical industries. And

yet, despite the grave potential social and economic con-

sequences of a critical infrastructure security breach,

these systems face growing risk from cyber security

threats that are doubling each year.

Why? The need for real-time business intelligence has

spurred changes in the critical infrastructure environment

that, while resulting in increased convenience, have also

increased cyber security risk.

Remote sites present a unique security challenge in

that they are often in relatively isolated locations, and

therefore not readily accessible as they are frequently

unattended and remotely operated. In addition, many

remote sites use legacy equipment (intelligent electronic

devices, meters, etc.) that support aging protocols, and

may be accessible only via dial-up telephony. Further,

these devices were first and foremost designed with pro-

duction and operational resiliency as top priorities and

security second.

Security of Legacy SystemsTraditionally, the security of legacy industrial control

and Supervisory Control and Data Acquisition (SCADA)

systems was inherent in their forced separation. By “air

gapping” the systems, the plant environment was pur-

posely disconnected from the enterprise, creating an

island of protection for mission-critical equipment.

Industrial control and SCADA systems were typically

used by the control automation experts in the plant or fac-

tory; management interested in obtaining data from this

environment had to pick up the phone or read the infor-

mation from a hard copy report. This has all changed due

to increased global competition as well as regulatory

compliance requirements which have driven the need for

real-time industrial control system data to enable timely

strategic business decisions.

Today, critical business data and information extracted

from the industrial control system environment is being

used to maximize production lifecycles, profit margins

and the return on corporate assets.

Thus, the need for the convergence of both enter-

prise IT and industrial control system and SCADA

domains has emerged as both a necessary — and dan-

gerous — initiative in terms of cyber security protec-

tion. In order to effectively protect a critical infra-

structure network, developing a comprehensive

defense-in-depth security strategy in no longer an

option, but rather a critical requirement.

Performance Challenges and the IncreasedUse of Remote Access Methods

It is essential that the plant environment is both reli-

able and accessible. Without exception, plants must

operate reliably 24x7x365. Remote access methods

including virtual private networks (VPN), dial-up tech-

nology and terminal servers enable flexible remote

access to be more conveniently achieved.

Previously, when the majority of plants were pur-

posefully air-gapped, there was no real need to pro-

vide remote access capability to support the plant net-

work. Today, with an increase in resource constraints

of plant operations staff and a shortage of qualified

industrial control system and SCADA expertise, some

plant employees (and even in some cases vendor per-

sonnel) are routinely allowed to remotely access the

plant network. With this increased convenience and

emphasis upon increased productivity undoubtedly

comes the increased threat of a major cyber security

breach or incident.

The requirement, then, is for a method of securing cen-

tral and remote plant systems while providing convenient

access to approved personnel. Current security best prac-

tices require active, real-time detection of suspicious

activity, from within or outside the facility, powerful

tools for management of user privileges and port access,

comprehensive logging and reporting features and ongo-

ing software updates to ensure protection from the latest

malicious activity.

A Unified Security Strategy: Defense-in-Depth According to a 2005 study from the UK-based compa-

ny NTA Monitor, over 90 percent of remote access VPN

systems have exploitable security vulnerabilities due to a

lack of security best practices. Clearly, the need for a

secure remote access strategy is inherent in order to

effectively support any type of remote access to the plant

network. The solution? A comprehensive defense-in-

depth approach to cyber security effectively enables the

efficient protection of the industrial control and SCADA

plant network environment.

This approach begins with securing the perimeter of

the network, specifying who is allowed access to the

network, as well as the explicit user privileges granted

to each individual user. Further, using this approach

will provide end customers with the ability to maintain

full control of all critical network devices while main-

taining the option to outsource the security manage-

ment, monitoring and reporting of those devices to

experts with industrial control system and SCADA

cyber security experience.

This unique method provides customers with the flex-

ibility to augment their plant network staff and selective-

ly choose the level of plant network control that is

required depending on the customer comfort level, expe-

rience and resource availability.

Ideally, a comprehensive and fully unified defense-in-

depth approach would offer comprehensive secu-

rity protection via the following components:

• UTM / Firewall Perimeter Protection

A comprehensive defense-in-depth approach to

securing remote critical infrastructure sites begins

with perimeter security protection. A

UTM/firewall device is used for creating a

boundary of the control system network to form a

virtual electronic perimeter. A UTM / firewall

device can be used for firewall protection, virus

protection, Intrusion prevention, virtual private

networking, and pre-planned lockdown states.

• Security Event Management

A security event management appliance is used

for monitoring, control, alarm management,

analysis, storage and reporting of security and

performance information. In addition, historical

data is captured and used to generate trend

graphs, reports and other data analysis functions.

• Network Intrusion Detection System

A network intrusion detection system is a sen-

sor-based device which detects attacks, rogue sys-

tems and unauthorized traffic within your network

perimeter. The network sensor should also proac-

tively detect the addition of new computers to the

network, for example, a contractor plugging in a

30 Remote Site & Equipment Management August/September 2008

FeatureSECURITY

Securing Remote Site Access: A Defense-in-Depth Approach

Page 31: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

FeatureSECURITY

August/September 2008 Remote Site & Equipment Management 31www.RemoteMagazine.com

laptop or a new connection to a wireless access point.

Since industrial control networks tend to be quite stable,

it is fairly simple to detect rogue devices being connected

with a NIDS sensor.

• Host Intrusion Detection System

Host intrusion detection sensors are miniature soft-

ware applications residing on control system computers

used to detect control application issues, internal or

external intrusions and misuse, as well as performance

bottlenecks on key servers and HMI's. Security sensors

are available for Unix, Windows or Linux operating sys-

tems. In addition to specific control applications, the

sensors report on platform-specific information such as

failed login attempts, password age, logged-in

user counts, event log activity and insertion of

removable media.

• Secure Remote Communications

An effective secure remote access solution

provides authorized users with transparent access

to remotely located devices, while also ensuring

that only individuals with appropriate credentials

are allowed access to the equipment, and proac-

tively blocking all other access attempts. All

activity at each point in the system must be

logged and collected at the central administrative

server, for inventory management, usage analy-

sis, fraud detection, etc., or to support regulatory

reporting requirements. Management software

tools should be provided for administration of

user rights (especially immediate revoking of

rights for problematic or former employees), spe-

cific port access for remote gateway devices, pro-

vision of certificates and password maintenance,

report generation, and providing software updates

to all system elements.

A decentralized architecture should be imple-

mented for maximum resiliency; a failure of one

element shouldn’t affect other parts of the system.

Most importantly, user access should always be

available, especially in critical conditions which

might require real-time configuration of remote

device settings. In addition, the system should be

designed to be protocol agnostic, supporting the

many legacy installations as well as modern con-

trol equipment.

Roaming technicians requiring access to

remote devices should be able to use their normal

communications/polling application without hin-

drance from excessive login routines or network

latency. In this scheme, they are required to occa-

sionally download time-based, port-specific

access credentials from the central host for access

to secured devices for a limited time.

A fundamental component of the remote

access system is the secure gateway or firewall

device (either dial-up or IP based depending on

the environment) which proactively blocks all

access unless from authorized users possessing

current security credentials and approved equip-

ment IDs. No device ports must ever be exposed

to the public network; rather they should pas-

sively “listen” for a predetermined signal, after

which a multipart handshake process will grant

port access.

ConclusionIn summary, it is important to develop a com-

prehensive defense-in-depth cyber risk protection

strategy for securing remote critical infrastructure

environments. With the rapid adoption of con-

verged corporate IT and critical infrastructure

plant networks in order to drive real time business

intelligence, the need for remote access capabili-

ty will continue to increase over time. Implementing a

defense-in-depth approach to cyber risk protection will

ensure the continuous reliability, availability, and securi-

ty of your industrial control system or SCADA network

as the needs of your company’s business evolve.

Todd Nicholsonis responsible for leading IndustrialDefender Inc.'s global marketing and product strategy..Todd brings over 16 years of experience in corporate andproduct marketing, product strategy, business develop-ment and sales working for emerging and mature tech-nology companies including Digital Equipment, EMC,IBM and InfiniSwitch. Todd joined Industrial Defenderfrom EMC, where he was responsible for directing prod-

uct marketing and product management for the compa-ny's grid and utility computing business unit. Todd holdsa B.S. in business administration from Nichols Collegewith a major in marketing.

Industrial Defender, Inc. offers a completely integratedDefense-in-Depth cyber security solution designed to pro-tect the industrial control system and SCADA environ-ment in a flexible and cost effective platform. Formerlyknown as Verano, Inc., Industrial Defender is a privatelyheld company with over 17 years of industrial control sys-tem and SCADA industry experience, and more than 6years of industrial cyber security experience. For moreinformation please visit: www.industrialdefender.com.

Page 32: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

32 Remote Site & Equipment Management August/September 2008

FeatureSECURITY

www.RemoteMagazine.com

Jim White, VP, Infrastructure SecurityUniloc, Inc.

SCADA networks have become increasingly intercon-

nected both with each other and with enterprise informa-

tion technology infrastructures. The risks of unauthorized

access to and manipulation of these systems has become

unacceptably high. Because these networks are frequent-

ly central to critical infrastructure systems, federal regula-

tors have begun mandating cyber security requirements.

While these networks deliver significant operational

efficiencies and are pervasive throughout North America,

security of these systems is often less than optimal

because emphasis has been placed on performance, reli-

ability, and safety – leaving these networks prone to

attack. In order to assist industries in securing these envi-

ronments, the following is a list of ten guidelines for pro-

tecting these networks against attack.

Begin with Your Environment1. Start with a Risk Analysis

Determine what your exposure is to identified threats,

their consequences, cost of mitigation and risk tolerance.

Critical assets have many vulnerabilities, but not all carry

the same level of consequence if attacked. Develop a risk

profile will be used as the basis for the development of

policies and procedures as well as the deployment of

technologies. As new threats are identified, the risk

analysis can be updated to provide guidance for imple-

mentation of mitigation strategies

2. Build Policies and Procedures

Before the implementation of any technical solution,

there must be a comprehensive set of policies and proce-

dures that serve as guidance to operators, security per-

sonnel, vendors, contractors, maintenance personnel,

management and all others who could have access to or

contact with SCADA systems and their critical compo-

nents. Standards such ISO/IEC 27000 series, NIST 800-

53, NIST 800-82 and ISA 99 are good sources of both

management and technical controls that should form the

basis of a workable set of policies and procedures.

3. Integrate Training at the Core of Your Defenses

Too often the most overlooked area of security train-

ing is one of the most important components of a viable

security plan. Having the right technical policies, proce-

dures and infrastructure will be rendered useless without

personnel having the knowledge of how to properly use

them. Training should encompass all aspects of the secu-

rity plan including but not limited to basic security

awareness training, physical access policies; cyber access

policies, e-mail policies, proper handling of internal doc-

uments (both in electronic format and hardcopy), tele-

phone policies (how to avoid social engineering

attempts), hardware and software upgrade policies,

authentication/authorization policies and proper use of

associated technologies, remote access, vendor and con-

tractor policies and procedures.

Technical personnel should have additional training to

include network and communications infrastructure stan-

dards and restrictions for SCADA systems, the proper

use and addition of network/ communications compo-

nents including use and setup of perimeter security

devices and use of standard security applications/devices

(anti-virus, IDS/IPS, firewalls, VPNs, etc.) in a real-time

SCADA environment.

4. Make Security Policies Important as Safety Policies

Security breaches by internal personnel should have

similar consequences as a safety breach. There should be

low tolerance within the organization for security breach-

es of any asset but in particular critical assets such as

SCADA systems. Security breaches in this environment

can be the leading edge of a serious safety breach that

could lead to loss of life, bodily injury or other conse-

quences such as a detrimental impact to the environment

or local community.

Too often, organizations treat security, particularly

cyber security of critical assets, as something that must

be justified on an ROI basis or as something that would

be “nice to have.” The treatment of SCADA security as

an afterthought or add-on is a recipe for disaster. Security

must be an integral part of every purchase, implementa-

tion, upgrade, hire, and contractor and vendor decision as

it relates to the security of critical assets. Never forget,

the low level service worker that has physical access to

the site of a critical asset could be a very sophisticated

intruder in disguise.

5. Integrate Physical and Cyber Security

Physical access controls and surveillance technolo-

gies need to be an integral part of an overall cyber secu-

rity infrastructure. Once used in isolation and by differ-

ent functional groups, these functions are now based on

the same technologies used by other assets such as

SCADA systems. Just as SCADA has migrated to the

use of IP protocols and COTs technologies, access and

surveillance functions have moved in parallel. What the

“good guys” use for surveillance, the “bad guys” can

use for reconnaissance. As such, these technologies

need to be integrated into the overall cyber/critical

infrastructure architecture. Integrating these functional-

ities allows for a more coordinated approach to protect-

ing critical systems than the typical standalone

approach in use in most organizations.

An IP based camera has similar vulnerabilities to hack-

ing attempts as other remotely accessible assets. A cyber

breach of access control or surveillance assets can have

consequences beyond just a physical threat. The devices

that provide these functions should be protected in the

same manner as other cyber assets. Authenticated access

and authorization for use is just as important for these

devices as for the assets they are intended to protect.

Know Your Enemy, Better Yet, Know Your Friends 6. Create a “Trust” Zone

Isolate cyber assets from all except those

specifically authorized. Focus on methodologies

and technologies that authenticate and authorize

only those who are trusted and prohibits all others

by default. Device-based endpoint security

devices provide multi-functional capabilities to

implement secure perimeters and controlled

access through multi-faceted authentication.

7. Authentication Should be for Both Users

And Devices/Systems

Device/system “fingerprinting” provides the

first layer in creating a “cyber fortress” architec-

ture. A cyber fortress creates a trust perimeter for

both SCADA systems and access clients based on

the actual physical fingerprint authentication of

systems and devices. Users are still required to

authenticate to the machine/application through

password combination of “what you know (pass-

word)” with “what you have (hardware authenti-

cated device)” provides a simple but sophisticat-

ed two factor authentication methodology.

8. Ensure Role Based Access Control at the

Application and Device Level

Only those physically authenticated systems

and clients are allowed to communicate across an

encrypted communications channel. All applica-

tions should use Role Based Access Control

(RBAC) implemented at both the application and

Ten Rules for Combating Cyber Security Attacks on Critical Infrastructure

Page 33: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

August/September 2008 Remote Site & Equipment Management 33www.RemoteMagazine.com

FeatureSECURITY

device level. Device fingerprinting technology allows

RBAC to be implemented at a second level that has not

been available before, the device itself. Only those with

the proper roles for access or use of the SCADA infra-

structure will be authenticated and authorized.

9. Integrate Dynamic Password Methodologies

The practice of periodically changing passwords is a

good best practice policy. However, in some cases the

policy can be restrictive and non enforceable. Using a

dynamic challenge and response mechanism between

hardware devices creates a hardware password that is

only known between trusted devices and is enforced

dynamically to remain flexible as situations require. The

hardware password is changed each time the

challenge is issued and the corresponding

response will also be different, thus guarding

against traffic sniffing technologies.

10. Ensure Multi-Factor Authentication

In most security schemas, humans are recog-

nized as the “weak link” and subject to social

engineering tactics that can often reveal the

“what they know”… password, IP address,

machine type, operating system. To mitigate this

risk, the use of multi-factor authentication is rec-

ommended. Common “factors” usually consist of

human biometrics such as retina scanning, smart

cards and fingerprinting. While all of these serve

to identify an authorized user, most are not prac-

tical in an industrial environment.

The alternative and better solution is to use

device fingerprinting as part of the multi-factor

equation. For example, PC characteristics can

produce variables on the order of human DNA to

differentiate one from the other, thereby render-

ing a “machine metric” or device fingerprint that

can be used in the same manner as biometrics

without the inherent problems of the latter.

Critical infrastructure security solutions using

physical device recognition restrict access to only

designated computers used by authorized person-

nel, including distributed field components and

control center systems. Solutions using device-

based authentication assure a user is on an author-

ized device to access control system networks.

Advanced systems provide notification and loca-

tion of unauthorized connection attempts to the

network as well as attempted physical connection

attempts to field controls. Solutions that defend

against Cyber attacks using device-based authen-

tication should also shield control systems against

malicious code threats, ensuring against network

vulnerabilities and allowing centralized field

security monitoring.

Core Capabilities of an InfrastructureDefense System Should Include:

• Protection of SCADA systems and field

controls from the effects of cyber attack

• Hack-resistance that improves upon

traditional router, switch and firewall security;

• Uncompromising security on any

infrastructure – including communication open

standards such as Ethernet, wireless and the

public Internet

• Field access control – prohibiting network

access from breached field substations or other

network access points

• Cross-platform compatibility with any and all

operating systems and field control hardware

• Notification and location of unauthorized

connection attempts

• Extraordinarily low impact on network performance.

About the AuthorJim White has 38 years experience in control system

automation and security technologies. Jim presently runsthe critical infrastructure security business for UnilocUSA, a leader in security technologies based on physicaldevice recognition.

Uniloc USA is the technology leader in electronicPhysical Device Recognition (PDR) for critical infra-structure security. The core technology platform drivingUniloc innovation is physical device fingerprinting, thecompany’s patented method of uniquely identifying a user

device, such as a PC or PDA, by the naturally occurring,inherent physical imperfections of that device, and thenincorporating that physical device fingerprint intolicenses or access credentials. Uniloc’s technologies canidentify devices with more comparable accuracy thanhuman DNA. Uniloc is the inventor and holder of theseminal physical device locking patent (U.S. 5,490,216)and has 9 related patents pending. Uniloc has applied itsPhysical Device Fingerprinting technical expertise toseveral vertical markets, including software publishing,network authentication, transportation, social network-ing and DVD retailing. For more detailed information,please visit www.uniloc.com.

Page 34: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

34 Remote Site & Equipment Management August/September 2008

Market InformationINDUSTRY NEWS

www.RemoteMagazine.com

OSI to Implement a Hot StandbyBackup Control Center System forSalt River Project

Open Systems International, Inc. (OSI) has been cho-

sen by the Salt River Project (SRP) to supply SRP’s

enhanced next-generation backup control center (BCC)

system. OSI’s high availability monarch backup control

center architecture, which supports virtual hot standby

operation with the primary control center, is the core

technology employed.

SRP provides electricity to more than 935,000 cus-

tomers in the greater Phoenix metropolitan area. It is part

of the critical Southwestern transmission grid that

includes large inter-area transfers due to the unprece-

dented growth in the Southwestern US. This growth and

mandated new industry regulations necessitate an

enhanced and modern BCC solution that not only main-

tains NERC regulatory compliance, but also increases

system reliability, safety, availability and control.

Benefits SRP can realize by upgrading to OSI’s hot

standby BCC solution include faster synchronization

time, seamless disaster recovery and seamless database

and display updates, as well as automatic failover capa-

bility and inter-site process monitoring for optimal con-

trol of applications at the backup site. In addition to

OSI’s standard applications, the hot standby environment

enables custom user applications to be executed at each

site and remotely health monitored.

Uplogix Expands into West AfricaWith UnoTelos Partnership

Uplogix is now partnering with Lagos-based

UnoTelos to deliver its fully-integrated remote manage-

ment platform to help Nigerian-based oil and gas compa-

nies address management challenges across highly dis-

persed remote locations. UnoTelos is Uplogix’ first sys-

tems integrator partner in Nigeria and is already experi-

encing high interest from customers seeking to go

beyond just monitoring.

“We had initially looked at basic remote monitoring

appliances but found functionality was limited to simple

SNMP reporting and event logging which is generally

not good enough to meet the needs of our clients, said

Jude Egbokwu, CEO and founder, UnoTelos. “After

careful evaluation of several vendors, we decided to part-

ner with Uplogix as it provides the most effective solu-

tion for our clients particularly suited in the oil and gas

industry with its large number of geographically dis-

persed sites both on land and offshore.”

UnoTelos was also impressed by the flexible connec-

tivity offered by the Uplogix solution. Each Uplogix

management appliance directly connects to an adminis-

tration station via the IP network, or in the event of a net-

work outage, via Satellite, PSTN or Cellular networks

allowing an always-available, secure and intelligent con-

nection to the devices being managed. The Uplogix solu-

tion is also able to automate many of the common admin-

istration tasks such as OS upgrades, password updates

and configuration changes, which is a major advantage

compared to simple monitoring devices.

“Within the oil and gas industry, there are always sites

in remote locations with critical IT infrastructure but with

no local IT support,” explains Egbokwu, “In the event of

a problem, the high cost of sending support staff to these

locations either by road or helicopter makes systems like

Uplogix extremely cost effective and also dramatically

improves operational efficiency. Our expertise with satel-

lite systems is a natural fit for the Uplogix solution and

gives us the ability to role out a secure remote manage-

ment solution to meet the operational needs of companies

within this sector.”

Although oil and gas is an initial target market,

Egbokwu also highlights the airline industry, telecommu-

nication providers and governmental agencies as future

potential customers for Uplogix. “The last decade has

seen a massive expansion of IT infrastructure across

Nigeria and the challenge for many organisations is to

reduce support costs and increase reliability. We believe

Uplogix has a significant role to play in helping them

achieve this goal.”

Hear Uplogix at the

Remote 2008 Conference and Expo!

Session Title: Ensuring Constant Connectivity andSecure Access to Remote Locations

www.RemoteExpo.com

Baltimore Gas and ElectricCompany to Pilot AclaraTechnology for Advanced Metering

Baltimore Gas and Electric Company (BGE), has

selected the Aclara Star Network system to support the

utility’s advanced metering infrastructure (AMI) pilot

program. As part of BGE’s Smart Energy Savers

ProgramS, BGE is evaluating selected AMI technologies

to transform and expand customer options to better man-

age energy use and lower energy consumption.

During the pilot BGE will evaluate Aclara’s Star

Network System as well as other AMI technologies in

two Maryland service areas – the urban Baltimore City

area as well as more rural Westminster. BGE is expected

to select an AMI technology based on the results of the

pilot and, upon approval by the Maryland Public Service

Commission, plans to implement its chosen AMI pro-

gram to its 1.2 million gas and electric customers begin-

ning in 2009.

The pilot will evaluate system performance with both

electric and gas meters and is scheduled to complete by the

end of the year. It also will test two-way communications

with demand-response devices, such as smart thermostats

and load-control switches, which permit remote control of

air conditioners, water heaters and other equipment. The

Star Network solution will integrate with BGE’s meter

data management system (MDMS), allowing transfer of

information such as meter reads, outage data, tamper mes-

sages and diagnostics between both systems.

“Two-way smart metering systems will allow our cus-

tomers more control of energy use because they enable

alternate time-of-use billing rates and provide customers

with innovative energy management tools,” said

Michael Butts, director of business transformation for

BGE. “We are eager to test the capabilities of the Star

Network RF-based system in our urban and rural areas,

and hope that the experience Aclara brings to the project

will result in an effective, functioning system that will

contribute to BGE’s energy conservation goals and

improved customer service.”

Interested in AMI?

If so then yo ushould attend Ember’s presentation at

the Remote 2008 Conference and Expo:

Leveraging the ZigBee Wireless Standard forAMI Networks

www.RemoteExpo.com

Arteco Working with theColumbus Division of ElectricityTo Prevent Copper Theft

Arteco has recently installed IVS systems in the

Columbus Division of Electricity utility substa-

tions, in Columbus, Ohio, for the purpose of pre-

venting copper theft and other security related

issues. With the demand for copper overseas driv-

ing up the price for scrap, increasing numbers of

criminals are engaging in metal theft. Among the

hardest hit victims of copper theft are electrical

utility substations because of the large amounts of

copper wire they use for electrical grounding and

transmission, and because these facilities are often

located remotely where theft is hard to monitor.

Recognizing its metal is an asset to protect, the

Columbus Division of Electricity has recently

turned to Arteco to proactively combat this prob-

lem. The Columbus Division of Electricity, part

of the Division of Power and Water for the City of

Columbus, Ohio, provides over one million resi-

dents and contracting communities with water

treatment and electric power distribution through

various water plants and utility substations.

Page 35: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

August/September 2008 Remote Site & Equipment Management 35www.RemoteMagazine.com

Market InformationINDUSTRY NEWS

Arteco’s Intelligent Video surveillance offers the

Columbus Division of Electricity a practical, efficient

resolution. After setting up a virtual perimeter around the

fence of the substations and areas within the substation

around the transformer, video analytics technology pro-

vides true object orientation and recognition and real-

time alerts that can prevent the theft.

Should a dog wander into this perimeter or trash be

blown in it, the system holds steady. If a man approach-

es the gate of the substation the system detects the size

and orientation immediately, and triggers an event with-

in the IVS. At the utility control center, an alert sounds

and a red box appears on a video monitor that draws

attention to the violated area. Personnel double-click on

the red box to instantly review video of the man entering

the gate while simultaneously watching the perpetrator

real-time in a second window. Security uses this infor-

mation to take the appropriate countermeasure.

Wurldtech Named to NERC Cyber-Security Drafting Team

Wurldtech Security Technologies has announced that

the company's VP of security services, Bryan Singer, has

been selected to join the North American Electric

Reliability Corporation’s cyber-security Standards Action

Request (SAR) drafting team. Singer was one of eleven

appointments made by the NERC Standards Committee.

“As advocates for standards-based industrial cyber-

security policies and practices, we are extremely pleased

to have Bryan selected to the NERC team,” said Tyler

Williams, president and CEO, Wurldtech Security

Technologies, Inc. "Bryan is a recognized subject matter

expert who brings unique experience in assisting ven-

dors, operators and government agencies in addressing

the constantly evolving cyber-security risks across criti-

cal infrastructure industries. We look forward to support-

ing the team’s efforts to ensure that the electric system

infrastructure in North America is secure."

As the federally designated Electric Reliability

Organization (ERO) in the US, NERC develops and

enforces reliability standards for the planning and opera-

tion of the bulk power system. Approved by the Federal

Energy Regulatory Commission (FERC) in the US and

governmental authorities in Ontario and New Brunswick,

the Critical Infrastructure Protection (CIP)

Standards are now mandatory and enforceable

across all users, owners and operators of the bulk-

power system in those jurisdictions. This SAR

drafting team is charged with developing the scope

for improving the current set of CIP standards.

"NERC is playing an instrumental role in defin-

ing the way that the entire electric industry incor-

porates reliability standards for cyber-security,"

said Singer. "I am extremely honored to join the

efforts of such a committed and influential organ-

ization within our industry and look forward to

addressing the ever-changing challenges of cyber-

security and reliability of critical infrastructure.”

Attend Wurldtech’s Presentation at

Remote 2008 Conference and Expo?

Session Title - Technical Network SecurityAssessments: Understanding Your Vulnerabilities

www.RemoteExpo.com

New Company to SpecializeIn Fiber Optic Video and DataTransmission with Emphasis onHardened Ethernet Solutions

Communication Networks, doing business as

ComNet, has been formed and will focus on pro-

viding connectivity and communications network

solutions to the security, intelligent transportation and

factory automation/industrial control markets.

The product line will consist of fiber optic video, data

and audio transmission products as well as a broad

Ethernet product line, for use in CCTV, access control,

traffic signalization, incident detection and WMS/CMS

control. The ComNet team is made up of proven per-

formers from the communications and networking prod-

ucts industry, with a goal of providing competence and

service to customers.

“One of the key reasons for the success of IFS was our

decision to be a true resource for the customers who chose

to partner with us” said George Lichtblau, founder,

ComNet. “That was a successful philosophy and one that

we plan to improve on at ComNet.”

Many of the most significant and appreciated benefits

of partnering with ComNet are the high levels of pre- and

post-sale technical support; design center services and cus-

tomer care available to every ComNet customer.

Harris Battery Expands withAcquisition of Discover Energy Branch

Harris Battery Co. has expanded its operations to the

West Coast with the acquisition of the Los Angeles,

Calif. branch of Discover Energy. Harris Battery's new

California operation features a 6,000 sq. ft. regional dis-

tribution center located in Westminster, Calif, and a

sales office in San Francisco, Calif. The market area

served by the new branch includes Arizona, California,

Hawaii, New Mexico, Nevada, Oregon, Texas,

Washington and Wyoming.

"The addition of California to our service area demon-

strates our commitment to the Clean & Green movement

and to the Discover product,” said Jerry Harris, president.

“These products not only use the highest levels of sus-

tainable and environmental stewardship, but are also

engineered to provide more energy while reducing our

environmental footprint.”

Harris Battery is the US factory warehouse for

Discover dry cell batteries, which carry the Clean &

Green trademark, identifying the company’s commit-

ment to provide responsible products that conserve

resources and help protect the environment. They are 98-

percent recyclable.

Additionally, Discover batteries are completely sealed,

leak-proof, spill proof and 100-percent maintenance free.

They are non-hazardous, non-gassing, approved for envi-

ronmentally sensitive areas and a direct replacement for

hazardous battery technology.

ISA100 Standards CommitteeForms WirelessHART ConvergenceSubcommittee

The ISA100 standards committee on wireless systems

for automation has created a new subcommittee to address

options for convergence of the ISA100.11a and

WirelessHART standards. This initiative is a key step in

the mission of the ISA100 committee to develop a family

of universal industrial wireless standards designed to sat-

isfy the needs of end users across a variety of applications.

The subcommittee will contrast and compare the tech-

nology within the ISA100.11a and WirelessHART stan-

dards, building on the experiences gained with industrial

applications of both standards, with an ultimate goal of

merging the best of both standards into a single con-

verged subsequent release of the ISA standard.

“This is an important development for industry since it

furthers the mission of ISA100 to embrace relevant indus-

trial wireless standards and serves the expressed needs of

the end user community,” said Paul Sereiko of Airsprite,

who has been invited, along with Dick Caro of CMC

Associates, to serve as co-chairs of the new subcommittee.

An early activity of the ISA100 WirelessHART

Convergence Subcommittee is to prepare the

WirelessHART standard in an ISA standard format by the

end of July to facilitate the evaluations.

“Adoption of the ISA100.11a standard in 2008 will be

an important step in fulfilling our ISA100 committee

mission and of significant value to industry. This new

subcommittee is the next logical step to helping industry

fully achieve the significant benefits of wireless technol-

ogy,” added Pat Schweitzer of ExxonMobil who serves

as co-chair of the ISA100 committee along with Wayne

Manges of Oak Ridge National Laboratories.

Hear Paul Sereiko, the Hart Foundation, ISA and Wayne

Manges Speak at Remote 2008 Conference and Expo!

Learn more at www.RemoteExpo.com

Page 36: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

36 Remote Site & Equipment Management August/September 2008

Continued FeatureSCADA

www.RemoteMagazine.com

Western Weather Group’s monitoring solutions act as a warning system, measuring

set parameters (e.g., temperature or movement) and then proactively notifying the end

user through email/text communication. WWG environmental monitoring systems are

typically used in businesses such as farming and agriculture, as well as meteorology

and environmental research projects. Applications include temperature monitoring to

alert vineyard or orchard owners when frost point has been reached and a sensor-based

security system that detects unauthorized access.

A WWG solution consists of

antennas, sensors and a data

logger. Units are solar-pow-

ered, with an additional small,

12 volt battery. WWG cus-

tomizes each solution by pro-

gramming the data logger to

recognize specific parameters

and take action once a thresh-

old is reached, such as opening

flood gates to depress water

levels, turning fans off or on to

regulate temperature, control-

ling irrigation pumps to reduce

or increase pressure and initi-

ating visual or audible alarms

with suspicious movement.

Many of WWG’s imple-

mentations involve weather

stations connected to analog

cellular telephones, utilizing

voice synthesizer modems that allow farmers and agricultural producers to remotely

view current weather conditions. With the sunset of analog networks, WWG was forced

to convert its analog cellular solutions to digital.

WWG considered many options, including radio telemetry and hardwire telephone

lines. Radio telemetry requires line-of-sight communication, which is not always avail-

able at weather station locations. Telephone lines require installation of new wires into

locations that aren’t already serviced, which is expensive and time-consuming.

WWG found the answer to its conversion question with the integration of intelligent

cellular gateways into its monitoring solution to provide reliable two-way connectivity

and enhanced remote monitoring capabilities. The wireless gateways access the expan-

sive cellular networks and have embedded intelligence that simplifies installation, oper-

ation and maintenance of any solution. These reliable communications platforms pro-

vide the “always-on” and “always-aware” connection management required for

unmanned applications. In addition, the use of sophisticated software tools allows

WWG to remotely configure the wireless gateways and troubleshoot problems from a

single location. Remote management capabilities drastically reduce the cost of total

ownership and lead the way to a rapid ROI (return on investment).

“The combination of new data logger technology and the digital gateways enables us

to send out text messages directly to a cellular phone or email address based on meas-

urements in the field,” said Don Schukraft, CEO of WWG. “This enables one to be

immediately notified when environmental parameters exceed a specific threshold.”

The WWG monitoring solution takes only a few hours to install and bring online.

Western Weather Group currently has about 25 digital wireless gateways in use by a

dozen customers. Additionally, ROI is realized in as little as one to two months depend-

ing on the application.

“If you can save grapes from a pending frost, you prevent revenue loss worth many

times the cost of the system,” explained Schukraft.

Intelligence is the AnswerAs the world moves toward integrated communication systems, industries dependent

on consistent data acquisition need an efficient way to provide the intelligence neces-

sary for advanced capabilities like remote monitoring and infrastructure management,

as well as the connectivity requirement to see and act on acquired data in real-time.

While an analog data logger is a reliable source to capture measurements, it is simply a

storage facility unless enhanced with an intelligent device that can transform the instru-

ment into a solution. By implementing intelligent wireless gateways with legacy ana-

log equipment business owners can monitor mission critical parameters in real-time,

and can troubleshoot equipment issues remotely. Having two-way wireless communi-

cation with remote equipment drastically reduces operating and maintenance costs and

generally leads to a rapid return on investment.

The remote nature and often geographically disparate deployments of monitoring

solutions lends itself to the use of cellular data networks as a communications medium.

Many deployments are located in areas with no landline access, and even when land-

line access is available, wireless has clear advantages. With a cellular solution cus-

tomers can utilize one provider for deployments across wide geographic areas, instead

of negotiating contracts with several regional providers.

There is no doubt that wireless communications are evolving towards digital trans-

missions, yet it can’t be ignored that legacy equipment is very often designed to com-

municate with an analog device. Companies that cross the chasm from analog to digi-

tal communications with the least amount of capital investment will be in the best posi-

tion to serve their customers.

Justin Schmid is Vice President for the Mobile and M2M Group at Sierra Wireless. Sierra Wireless modems and software connect people and systems to mobile broad-

band networks around the world. The company offers a diverse product portfolioaddressing enterprise, consumer, original equipment manufacturer, specialized verticalindustry, and machine-to-machine markets, and provides professional services to cus-tomers requiring expertise in wireless design, integration, and carrier certification. Formore information, please visit www.sierrawireless.com.

Sierra continued from page 13

Page 37: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

August/September 2008 Remote Site & Equipment Management 37www.RemoteMagazine.com

Continued FeatureNETWORKING

The ability to perform remote, in-service testing, one-

way delay and jitter monitoring, and to establish end-to-

end OAM is critical to ensure quality of service.

Every network, regardless of the type, will have brief

outages from time to time and microwave networks are

not an exception. So, we have to be careful enough not to

try to over-dimension the microwave network and make

it un-necessary costly.

7) Adaptive Modulation Radio (AMR)Microwave radio links work at frequencies which are

subject to rain fading (usually above 10 GHz) which may

cause links to fail during heavy rain. Adaptive modulation

is starting to be employed in microwave point-to-point

systems to combat rain fading by dynamically changing

the modulation scheme depending on weather

conditions. During good weather conditions an

efficient modulation scheme is used providing

a high data rate. During heavy rain, adaptive

modulation uses a more robust modulation

scheme to guarantee the high availability of the

link at the cost of a reduced data rate while the

most efficient modulation is used during good

weather conditions. The addition of adaptive

modulation is an efficient way to support

increased bandwidth requirements in backhaul

networks, while preserving limited available

frequency spectrum and re-using previously

installed equipment. Adaptive modulation on a

single link will ensure a high availability for

“guaranteed traffic” and a high data rate for

“best effort” traffic but lower availability.

8) Protected Microwave LinksRadio path has two transmitters and two receivers

always on-line (“hot”). A switch keeps one radio trans-

mitting or receiving until a failure occurs and at that

moment, signal is switched to the stand-by radio. The

MSHB configuration (1+1) protects against equipment

failures only, not path propagation problems.

Protected microwave links are used in cases where

there is a small chance of a quick microwave link repair

i.e. long MTTR (Mean Time-To-Repair). Some of the

examples would be difficult access sites - high towers

requiring tower climbers, remote microwave sites, high-

voltage towers, etc. High-capacity links are also good

candidates for protected radio configuration, unless they

are protected by ring network topology itself.

Engineers, Consultants, Contractors and Turn-key Solutions

Deployment of a large and/or complex communica-

tions system is not an easy task and more often than not,

companies do not have technical and managerial capacity

in terms of experience, education or available work force.

Many of the tasks can be given to contracting and/or

consulting companies and there is a significant trend

toward outsourcing in the telecommunications industry

today. It is important to ensure that you and your suppli-

ers have enough people working on a project since mis-

managing work force is a common problem on large

projects. It is easier to pull people out of the project later

on (when they are not required any longer) than mobilize

and bring up to speed new people in the middle of the

project. In addition, it is important to choose and inde-

pendent engineering company not affiliated with any

equipment manufacturer, so they can provide an optimal

and unbiased design.

There is no doubt about it - turnkey solutions on large-

scale microwave projects can save money. Using a single

point of contact to not just design, but also build, and

commission a telecommunications network involves

many obvious benefits like lowering overall costs, reduc-

ing cycle time, regulates quality and safety, and simpli-

fies administration and project management. The practi-

cal experience shows that using one company to coordi-

nate all aspects of the job, including resource planning

(people, equipment, material management), work sched-

ule, and cost management, will reduce cycle time and

duplication. It will maintain continuity for the project and

therefore reducing costs for materials, equipment, and

human resources, as it will not allow for any downtime

and overlap because of bad planning. Operator may

either retain comprehensive engineering services from a

project's start to finish, or develop a work plan for con-

tracting out specific phases of the telecom network proj-

ect to various parties. Operator should determine which

alternative is appropriate in their situation but in any case

it is an imperative to create detailed SOW (Scope of

Work) and carefully define who is doing what

(Responsibility Matrix). There is no such thing as “too

detailed scope of work.”

Common Missing Link - Change Orders, As-builtDocumentation, and Record Keeping

When a consulting/contracting company is hired for

the job, like on any other large-scale project, there are a

number of documents produced during the life of the

microwave buildout project (Figure 4). Document con-

trol should provide the administrative support and con-

trol of all project documentation; this should include, but

is not limited to, contract change proposals, manual

updates, drawing control, specification changes, etc. At

the end of the project, the documents that should be sup-

plied are technical manuals for the equipment supplied,

one set of interim as-built drawings

for each site, final as-built drawings

following final acceptance, factory

test results, relevant ATPs

(Acceptance Test Plans), training

manuals (if training specified), etc.

To avoid the trap of performing

the work during the fast-paced

build-out phase without the written

authorization, “Change

Notification Form” also called

“Change Order” has to be issued.

Contractor(s) or consultant(s) must

receive a written approval of

his/her deliverable prior to starting

the new task or making any

changes to the previously defined

task. Make sure that all the suppli-

ers, consultants, and contractors

leave behind detailed written trail

in the form of path calculations and

path profiles, drawings, test results,

(As-Built documentation), etc. You

will be running the network long

after they are all gone to other proj-

ects and clients [4].

ConclusionAt the end, we can summarize

and say that sound microwave engi-

neering practices, in the long run, will save money and

aggravation. Building and maintaining a reliable

microwave network does not have to be a difficult task;

assuming that the proper engineering practice had been

utilized from the start, using expert workforce and rep-

utable hardware and services suppliers.

References and Further Reading

1) Harvey Lehpamer, “Microwave TransmissionNetworks – Planning, Design and Deployment,”McGraw-Hill, 2004, ISBN 0-07-143249-3

2) Harvey Lehpamer, “Transmission Systems DesignHandbook for Wireless Networks,” Artech House, 2002,ISBN 1-58053-243-8

3) Articles, Q&A, and technical papers atwww.cicusa.com

4) Harvey Lehpamer, “How to Build aReliable and Cost-effective MicrowaveNetwork,” ENTELEC, Houston, Texas, 2006

About the Author

Harvey Lehpamer, MSEE, has over 25 yearsof experience in the planning, design anddeployment of transmission and microwavenetworks around the world. Mr. Lehpamer haspreviously worked for Ontario Hydro,Ericsson Wireless Communications, Inc.,Qualcomm Inc., and Clearnet, Inc. He is cur-rently working for CommunicationInfrastructure Corporation (CIC), microwaveengineering company, and has published threebooks. In addition to his daily engineeringresponsibilities, Harvey Lehpamer is teaching

Microwave Transmission Engineering at University ofCalifornia – SD Extension and math classes atSouthwestern College, both in San Diego, CA. He can becontacted at: [email protected] [email protected].

Hear Harvey Lehpamer Speak at the

Remote 2008 Conference and Expo

Learn more about his session at: www.remotemagazine.com/rem08_program.php#ci

Comminucation continued from page 23

Figure 4 Document control during the microwave project

Page 38: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

38 Remote Site & Equipment Management August/September 2008

New PublicationsLITERATURE

www.RemoteMagazine.com

Find the Right Sensor with Banner’s Newly Updated Catalog

Banner Engineering’s 2008-2009 sensor products catalog delivers new sensing prod-

ucts and applications in an improved design. The full-color catalog showcases Banner’s

industrial product line, which includes photoelec-

tric and special-purpose sensors as well as meas-

urement and inspection sensors. Highlights

include the expanded variety of vision sensors and

lighting accessories and the latest offerings from

Banner's two new product divisions, wireless net-

works and EZ-Light Indicators.

The catalog’s multiple navigation options sig-

nificantly improve its usability. Choose a sensor

solution with the comprehensive selection guide

that compares and contrasts sensor features.

Browse the “what’s new” section for the latest

innovations from the sensor experts. Quickly find

the right section using color-coded side tabs in

combination with the table of contents.

High-quality application illustrations show

Banner sensing products solving industrial automation problems, and page references

within these applications help users find the featured product. Scattered throughout are

thousands of “more info online” icons that directly link users with expanded and updat-

ed information on Banner's website.

Featured within the seven product sections are two sections showcasing Banner’s

SureCross wireless networks and EZ-Light indicators. An expanded and improved

machine vision section includes the following new products such as PresencePlus Pro

cameras, the PresencePlus ProIII controller and the two piece PresencePlus Pro Color

or one piece P4 Color Omni vision sensors. Other new product highlights include

World-Beam Q20 compact sensors, M12 miniature 12 mm barrel sensors, R-Gage

QT50R radar sensors, EZ-Array measuring light screens, and further expansions to the

flagship families of World-Beam Q12, QS18 and QS30.

Sixnet Releases "Best Edition Ever" Product CDSixnet has released a brand new CD which features the entire product line from their

automation, industrial connectivity and wireless connectivity divisions.

This free CD is packed full of easy access downloads and comprehensive informa-

tion detailing SIXNET's product portfolio. The completely new layout is also designed

to be easy to navigate. Product pages, datasheets, user manuals, software, AutoCAD

files and tech notes put all the information at user’s fingertips.

The "what's new" page provides a quick overview on the latest advancements from

Sixnet. The SL-8MG "all gigabit ethernet switch" is the newest addition to the Slim

Line product family. It offers 8 Gigabit ports for 10/100/1000 RJ45 Ethernet links, four

of which are combination ports that also accept industry standard SPF transceivers.

Sixnet's ISaGRAF Open Workbench is a seamless migration path for the tens of

thousands of installed ISaGRAF applications to upgrade to the newest generation, 32-

bit look and feel of ISaGRAF program development tools. The BT-6000 series, by

BlueTree Wireless Data, Inc. is a completely new generation of rugged cellular data

modems. Each modem has application specific functionality targeting the teleme-

try/SCADA, business continuity and mobile data markets, enabling SIXNET customers

the most appropriate cellular modem for their specific application requirements.

New Brochure Highlights Expanded Wago IO System WAGO Corp. has issued a new Wago-I/O-System

brochure. The brochure includes a removable four-

panel reference poster that outlines Wago’s

range of bus couplers, PLCs and more than 300

digital input/output, analog input/output and

specialty modules.

The brochure includes background on Wago,

the Wago-I/O-System and key 750/753 series

features. It lists available software tools such as

Wago-I/O-Check (commissioning) and Wago-

I/O-Pro (programming), as well as Wago-I/O-

Systems applications including industrial

automation, process engineering, facility manage-

ment and both onshore and offshore marine uses - with applicable worldwide cer-

tifications and approvals.

Videx Releases a Electronic Lock Product CatalogVidex, Inc. has released its new catalog that is packed with helpful information

on CyberLock electronic locks and intelligent padlocks. The catalog is free and

includes an instructive CD on electronic lock and key technology. CyberLock brings

electronic access control and an audit trail to mechanical locks and padlocks simply

by replacing the cylinders in the existing locks with CyberLock electronic cylinders.

ISA Releases Third Edition of Wireless NetworksResource Book

ISA has released the third edition of its book, Wireless Networks for Industrial

Automation by Dick Caro. Available in digital format, this book includes the

increasingly popular wireless application Radio Frequency Identification (RFID)

topic and also provides a clear, unbiased view of the emerging wireless communi-

cations market. Caro's goal is to help keep readers up-to-date with the wireless mar-

ket so they can make better decisions on the timing and strategy for implementing

wireless networks for automation projects.

According to Caro, going wireless is more than just plugging in some wireless

components to replace the wires. Residential networks are easily justified using

today's inexpensive wireless components to avoid costly or unsightly wire installa-

tions. Industrial use is not quite so clear due to privacy and security problems and

the potential for signal loss in plant environments.

Industrial use must have secure communications that never fails. However, the

cost of industrial wiring is so high, that wireless can usually be justified.

In this third edition, the author includes a general update of events that have

occurred since the previous edition. Of significance is an overview of new technol-

ogy, such as ISA100.11a, WirelessHART and WiFi, including IEEE 802.11n.

Attend ISA Pre-Conference Workshop at Remote 2008 Conference and Expo

Topic: Practical Applications of SCADA Systems IntegrationFor more information visit: www.remotemagazine.com/rem08_workshop.php

WEB GUIDESwww.digi.com/rdm

Leveraging expertise in cellular, Wi-Fi,

ZigBee/802.15.4 and proprietary RF tech-

nologies, Digi offers reliable wireless device

connectivity solutions. From simple cable

replacement, to sophisticated end-to-end

wireless device connectivity and management

with our unsurpassed Drop-in Networking

family of products, Digi knows wireless.

www.lem.com

LEM is a market leader in providing innovative

and high quality solutions for measuring electri-

cal parameters. Its core products – current and

voltage transducers - are used in a broad range of

applications in industrial, traction, energy and

automotive markets.

www.satelnorthamerica.com

Introducing Satel North America, where quality,

selection and service is our guarantee. Think

quality, think service, think wireless. Think

Satel. 800.292.9778

Data Comm for Business, Inc. (DCB) man-

ufactures and distributes a broad line of

data communications equipment including

DSU, Stat Mux, Statistical Multiplexer,

FRAD, Routers, Wireless, Remote Access,

RS-232, modems, FRADs, SCADA, and

remote interconnection equipment, The

DCB Website includes complete data sheets

for all DCB products, PDF versions of all

product manuals; and most importantly, in

the education section, hundreds of white

papers and tutorials covering communica-

tions technologies and methodologies.

www.dcbnet.com

Page 39: Advantech Expands Its Line of Managed Industrial Ethernet ... · Advantech Expands Its Line of Managed Industrial Ethernet Switches ... smart screen templates, ... e-mail or pager

August/September 2008 Remote Site & Equipment Management 39www.RemoteMagazine.com

Conferences/TrainingCALENDAR

August3-7, APCO, Kansas City, Mo. Contact www.apcointl.org

5-6, Solar Metering Performance and Monitoring Expo, Berkley, Calif. Contact www.solarelectricpower.org

5-7, 3rd Annual Water and Wastewater and Automatic Controls Symposium,Orlando, Fla. Contact www.isa.org/wwac

21-24, SPE Annual Technical Conf. & Exhibition (ATCE), Denver, Co. Contact www.spe.org/atce/2008

September7-10, Autovation 2008, Atlanta, Ga. Contact www.amra-intl.org

9-12, Field Service East, Atlanta, Ga. Contact www.FieldServiceEast.com

10-12, CTIA Wireless IT and Entertainment, San Francisco, Calif. Contactwww.wirelessit.com

14-18, INTELEC 2008, San Deigo, Calif. Contact www.intelec.org

15-18, ASIS International 2008, Atlanta, Ga. Contact www.asisonline.org

October8-10, WEEC, Washington DC, Contact: www.aeecenter.org/shows

14-16, ISA Expo, Houston, Texas, Contact www.isa.org

15-16, SATCON, New York, NY, Contact: www.satconexpo.com

CALENDAR

Campbell Scientific, Inc. 23www.campbell.com/m2m

Control Microsystems, Inc. 16www.controlmicrosystems.com

Data Comm for Business 12, 38www.dcbnet.com

Dielectric SPX 18www.arguson.com/remote1

Digi International, Inc. 5, 38www.digi.com

Eaton/Pulizzi Engineering Inc. 40www.powerware.com/ePDU

GE Security 7www.gesecurity.com

LEM 36, 38www.lem.com

Lemos International 36www.lemosint.com

Moxa Technologies 17www.moxa.com

Phoenix Contact 15www.phoenixcon.com/wireless

Precision Quincy Corp. 14www.precisionquincy.com

Prosoft Technology 8www.prosoft-technology.com

Radicom 37www.radi.com

Satel North America 22, 38www.satelnorthamerica.com

SEL Schweitzer Engineering 2www.selinc.com/remote6

Sensaphone 23www.sensaphone.com

SI Tech 36www.sitech-bitdriver.com

Tadiran Batteries 13www.tadiranbat.com

Tessco Technologies 10, 11, 19www.tessco.com

www.RemoteMagazine.com

ADVERTISER INDEX