Upload
nguyenkien
View
220
Download
0
Embed Size (px)
Citation preview
August/September 2008 www.RemoteMagazine.com A Webcom Publication
...on page 14
SECURITY...on page 28
Advantech Expands Its Line of Managed IndustrialEthernet Switches
Ple
ase
loo
k a
t the
ma
iling
lab
el b
elo
w a
nd
rea
d th
e c
od
e in
the
red
bo
x.
Code=A
: Yo
u a
re re
ce
ivin
g th
e c
om
plim
en
tary
issu
e d
ue
to y
ou
r invo
lve
me
nt in
the
ind
ustry.
To
sta
rt yo
ur fre
e s
ub
scrip
tion
tod
ay, p
lea
se
go
to w
ww
.Re
mo
teM
ag
azin
e.c
om
an
d s
ub
scrib
e.
Code=B
: Yo
ur s
ub
scrip
tion
is a
bo
ut to
exp
ire. G
o to
ww
w.R
em
ote
Ma
ga
zin
e.c
om
an
d re
ne
w y
ou
r su
bscrip
tion
tod
ay
Code=C
: Yo
ur s
ub
scrip
tion
is a
ctiv
e a
nd
cu
rren
t.
ABB Totalflow SCADAvantage Software Automates and Simplifies System Operations
ABB’s Totalflow SCADAvantage software, which is
designed to automate oil and gas operations. With self-config-
uring maps, smart screen templates, on-screen analysis tools,
real-time and historical graphic trends, and reports for manag-
ing multiple aspects of the sys-
tem, SCADAvantage automates
and simplifies system operations
for added lifecycle cost savings.
More than two years ago,
ABB Totalflow made a strategic
decision to invest in the develop-
ment of applications unique to
the LDC market, and the compa-
ny is gaining traction in the cate-
gory. In addition to the functions
and features of SCADAvantage
for automation solutions, ABB
touts the software’s cost, as well
as the anticipated maintenance
advantages over the life of the system.
“Our customers tell us that the SCADAvantage standard
daily nomination interface and gas schedule tracking are par-
ticularly helpful,” said Ed Smyth, SCADA business develop-
ment manager, ABB Totalflow. “Our system is unique in that
these features are part of the existing functionality of the sys-
tem, rather than a custom application like many other systems.”
“We selected ABB because we
were impressed by how
SCADAvantage’s utilization of off-
the-shelf software required little
customization to meet all of our
requirements, while being basic
enough for our internal employees
to maintain,” said Jim Larsen,
SEMCO Energy Gas Company
director of engineering services.
“We wanted to avoid purchasing a
system that required a high level of
customization, which can add com-
plexity to the initial implementation
as well as future upgrades.”
“The ability to integrate our GIS and GPS systems easily
was also a real plus,” added Larsen. “ABB showed us that they
had the complete SCADA solution for an LDC.”
MIT Creates New Material for Fuel Cells
...on page 26
Securing Remote Site Access: ASecuring Remote Site Access: ADefense-in-Depth ApproachDefense-in-Depth Approach
...on page 30
Volume 8, Issue 4
Editor & PublisherDavid Webster
Director of ContentShannon Given
Associate EditorsNick Depperschmidt
Jeremy Martin
Assistant EditorsHeather Krier Joanna Larez
News EditorsScott Nash, Karen Poulson, Jessi Carter,
Jeremy Fleming, Sue Hannebrink
Finance & AdministrationMarsha Grillo, Director
Julie Williams, Office Manager
Advertising, Sales and MarketingScott Nash, Account Executive
Jessica Thebo, Jennifer Graham, Kristin Reming
Production Manager Julie McCann
Customer Service/CirculationDatabase/Directories
Mark Vang, Circulation ManagerJulianne Wood, Andy Gurukovich,
Ross Webster
REMOTE SITE & EQUIPMENT MANAGEMENT magazine (ISSN #1535-0347) is a publication of Webcom Communications Corp.Subscription free for qualified US, (six issues) $44 for non-qualifiedUS, $60 in all other countries. Single copies are $20 each plusshipping. Back issues are available. Payment must be made inUS funds in order to process the order. Direct all subscriptioninquiries, orders and address changes to Fulfillment Services.Third-class and fourth-class postage paid in Denver, Colo.Periodic postage paid in Greenwood Village, Colo. and atadditional mailing offices.
POSTMASTER:Send address changes to:Webcom Communications
7355 East Orchard Road, #100Greenwood Village, CO 80111
Photocopy Rights: Permission to photocopy for internal or per-sonal use, or the internal or personal use of specific clients isgranted by REMOTE SITE & EQUIPMENT MANAGEMENT for usersthrough Copyright Clearance Center, provided that the basefee of $2.50 per copy of the article, plus $1.00 per page is paiddirectly to the Copyright Clearance Center, 222 RosewoodDrive, Danvers, MA 01923 USA (508) 750-8400. For governmentand/or classroom use, the Copyright Clearance Center shouldbe contacted. The rate for this is 3 cents per page. Specify ISSN# 1535-0347 REMOTE SITE & EQUIPMENT MANAGEMENT.
© Copyright 2008 Webcom Communications Corp. Material inthis publication may not be reproduced in any form withoutwritten permission. Requests for permission should be directedto the customer service manager.
Webcom Communications Corp.Phone: 800-803-9488 / 720-528-3770
www.infowebcom.com
Editor’s Note
August/September 2008 Remote Site & Equipment Management 3www.RemoteMagazine.com
August/SeptemberContents
Welcome to the August/September issueof Remote Site and EquipmentManagement Magazine. To say we havesome good articles inside would be anunderstatement. If you’re looking for infor-mation on remote device networking I’dsuggest flipping to the middle of the bookand check out two articles covering deploy-ing a microwave network and how to maxi-mize the value of M2M wireless devices.
If security is your concern, we still haveyou covered. Uniloc, Inc. and IndustrialDefender has lent their expertise on the sub-ject of cyber security for critical infrastruc-ture and remote sites. Check those articlesout on pages 30 and 32.
Also included in this issue is our 2008 standalone resource guide. These once a yearguide features market update articles, profilesand listings for companies providing productsand services to the remote market. Keep thisat your desk and use it year-round to find solu-tions for your remote sites and equipment.
You’ll also find new information about theRemote 2008 Conference and Expo onpages 20 and 21. This includes new sessions,exhibitors and links for registration. Keep inmind that September 19th is the last day toregister at a discounted price!!
Nick DepperschmidtEditor, Remote [email protected]
Table of Contents
page 4
page 28
page 14
Proficy Real-Time Information Portal 3.0 IntroducedBy GE Fanuc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
GreenPeak Launches its Emerald GP500CCommunication Controller . . . . . . . . . . . . . . . . .14
MIT Creates New Material for Fuel Cells . . . . . . . .26
Secure Asset Management now Available forTofino Security Users . . . . . . . . . . . . . . . . . . . . . .28
Updating Data Acquisition Systems to Utilize IntegratedCapabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
Executive Q&A with Spinwave Systems CEO William LaPointe . . . . . . . . . . . . . . . . . . . . . . . . . . .18
The Best Practices to Deploy a Reliable Microwave Network . . . . . . . . . . . . . . . . . . . . . . .22
Maximizing the Lifetime Value of M2M Wireless Devices . . . . . . . . . . . . . . . . . . . . . . . . . .24
Securing Remote Site Access: A Defense-in-DepthApproach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30
Ten Rules for Combating Cyber Security Attacks onCritical Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . .32
Industry News . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34Marketplace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36Web Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38New Literature . . . . . . . . . . . . . . . . . . . . . . . . . . . .38Calendar of Events/Advertiser Index . . . . . . . . .39
SCADA
Networking
Onsite Power
Features
Departments
Security
page 30
Telemetric Releases IED Config forThe Remote Configuration of IED’sEquipped with RTMs
Telemetric Corp. has released a new IED Config fea-
ture for their Remote Telemetry Module (RTM). This
new feature allows Telemetric users to remotely change
settings and retrieve event logs
on Intelligent Electronic
Devices (IED’s) used for
equipment such as reclosers,
switches, capacitor banks and
voltage regulators using the
manufacturer’s standard con-
figuration software.
Users can now manage and
change the RTM configuration
using IED Config. The new
feature will enhance the pro-
ductivity of distribution engi-
neers by eliminating many site
visits to obtain event informa-
tion or make a routine setting
change. This feature works on
the nationwide AT&T cellular network.
IED Config can be added to any Telemetric RTM in
operation by updating the firmware in the unit. This
feature leverages Telemetric’s alliance with AT&T
Wireless to deliver fast and cost-effective IP-based
data communications throughout North America.
Telemetric RTM units can be installed anywhere AT&T
service is available. Telemetric products allow electric
utility customers to monitor, control and report
changes automatically via Telemetric’s PowerVista
applications or integrate directly to SCADA, energy
management systems, or other systems.
The IED Config software supports the manufactur-
er’s own configuration software by using IP tunneling
technology over the digital cellular network. Thus,
electric utility engineers or technicians can utilize the
same familiar software that they use when connecting
directly to a device in the field. Security features of
the system include the use of a VPN connection, user
name and password, multi-factor authentication and
data encryption.
Unlike private radio networks that require large
investments in communications infrastructure, the
Telemetric devices can deliver a cost effective solutions
that can be rapidly deployed with no infrastructure
investment. Users can be notified of events via text mes-
sage, e-mail or pager and the information can be deliv-
ered to their SCADA or energy management system.
They may also view and manage their device informa-
tion on their own secure account using Telemetric’s
PowerVista applications with a standard web browser.
Unlike simple modem-based solutions, Telemetric prod-
ucts combine intelligent remote devices with the AT&T
digital network to provide powerful applications that are
efficient and cost effective.
Control Microsystems ReleasesUSB Mass Storage Devices withData Logging Capabilities
Control Microsystems has released what it deems as
the first use of USB storage devices for data logging in
the demanding envi-
ronments of
SCADA applica-
tions. Using remov-
able USB storage
such as Flash mem-
ory sticks, Control
M i c r o s y s t e m s ’
SCADAPack 300-
series controllers
can now provide
easily configured
and accessible data
logs using the alter-
nate methods of
logging to internal
memory or to external mass storage devices.
“We are proud to offer the first RTU that provides
walk-up SCADA to our customers,” said Dale
Symington, VP product strategy. “This product allows
for quick and easy data import via a populated USB
device that is connected to any PC running our
SCADALog Data Converter utility.”
In addition to logging data to a pre-connected USB
mass storage device directly, this new feature also
allows for automatic transfer of logged files on internal
memory when a USB stick is inserted in the controller.
In systems requiring high power efficiency, the USB
port is powered-down and the data is first logged direct-
ly to controller RAM. Then at defined intervals the USB
port is powered-up and the data is transferred to the
memory stick.
Support for data logging to USB mass storage devices
is provided by the SCADAPack 330/334 and by the
SCADAPack 350/357 with firmware upgrade to version
1.41. These features are available free of charge on all
such SCADAPack controllers.
Visit Control Microsystems Booth at
Remote 2008 Conference and Expo
www.RemoteExpo.com
Data Translation ReleasesNetwork-Ready Ethernet VersionOf TEMPpoint Instrument
Data Translation has released the Ethernet (LXI) ver-
sion of its temperature
measurement instru-
ment, TEMPpoint. This
network-ready version
of the popular instru-
ment provides a stan-
dard Ethernet connec-
tion to support remote
monitoring and control
of thermocouples,
RTD's and voltages in
the field and on the fac-
tory floor.
TEMPpoint has
received full Class C
compliance and certification for LXI. Compatibility to
other LXI devices is now assured for large system con-
figurations. TEMPpoint offers 48 separate channels with
24-bit resolution, each with it's own A/D converter and
CJC circuit, while 1,000 V channel-to-channel isolation
protects signal integrity and rejects common mode noise.
TEMPpoint ships with a ready to measure Web-based
application. Using a web-based TEMPpoint application,
users can configure, measure and control the DT8871
and DT8872 instruments either locally or remotely. Web
pages are provided for configuring all aspects of your
TEMPpoint instrument: local area network (LAN), input
channels to measure, scan parameters, alarm limits and
digital I/O lines.
GE Fanuc Intelligent Platforms has released its real-time manufacturing intelli-
gence application, Proficy Real-Time Information Portal 3.0, allowing users to gain
business insight from plant data in real time. This application is designed to provide
visibility into plant floor operations. As a result, it enables real time decision support,
continuous process improvement and enhances the
return on current and future IT investments.
“GE Fanuc offers Proficy real-time information
portal as a part of its tightly-integrated suite of pro-
duction management solutions which improve our
customer’s productivity every day,” said Erik
Udstuen, general manager of software, GE Fanuc
Intelligent Platforms. “Additionally, GE Fanuc
embraces an open and layered technology approach
allowing Proficy Portal to report on plant floor data
from third-party manufacturing technologies. This
is an important element to preserving customer’s
investments while extending their capability to
improve performance Proficy Real-Time
Information Portal provides a rich, Web-based envi-
ronment for developing and deploying visualization,
analytical and reporting applications.”
As a pure web-based application, Proficy Portal allows the end user access to data
and control over how to visualize and analyze it. In addition, it features interactive
analysis of real-time and historical data sources through trend charts, grids and data
links. This provides users insight into the operation of their plant for making crucial
improvements to quality and efficiency.
A single Web client combines content from other GE Fanuc software applications,
such as Proficy HMI/SCADA – iFIX and data from
across all on-line data sources within the plant and
the organization allowing for real-time decision
making at all levels. Proficy Portal’s graphical pres-
entation rapidly communicates essential informa-
tion from more complex data sets for notification of
alerts, status changes and data summaries. As the
web client for the entire GE Fanuc software portfo-
lio, Proficy Real-Time Information Portal provides
a consistent set of tools for analyzing and reporting
disparate process, lab and shop-floor SPC systems,
along with interfaces to off line Six Sigma tools
such as Minitab.
Proficy Real-Time Information Portal is a thin
client application that runs under the Microsoft IIS
Web server and connects to plant floor technology
such as OPC, HMI/SCADA, quality systems, production management systems and
third-party databases. It provides self-service ad-hoc reporting, and presents data in its
natural presentation form.
4 Remote Site & Equipment Management August/September 2008
Products & ServicesSCADA
www.RemoteMagazine.com
Proficy Real-Time Information Portal 3.0 Introduced by GE Fanuc
Onset Releases WiFi-BasedMonitoring Solution for RenewableEnergy Systems
Onset Computer Corp. has unveiled the HOBO
U30/Wi-Fi remote monitoring system, a web-based mon-
itoring system that provides real-time, remote access to
energy and environmental data over any WiFi network.
As the latest addition to Onset’s line of HOBO U30
monitoring systems, the HOBO U30/WiFi provides a
simple and cost-effective means of verifying the effec-
tiveness of green roofs, solar power systems, wind tur-
bines and other types of renewable energy systems. It
accurately measures, records and documents critical per-
formance data that can be used to obtain green/energy-
related rebates and credits.
“Verifying the performance of renewable energy sys-
tems is necessary not only for customer satisfaction, but
to also satisfy the criteria that various rebate agencies
have for documenting a system’s performance,” said
Tom Wineman, owner of Clean Energy Design, a renew-
able energy design company. “The HOBO U30/WiFi
makes it easy to measure and verify system performance
over time, and provides alarms for instant notification of
any system problems that might be occurring. For
installers, this can reduce or eliminate diagnostic time in
the field.”
The HOBO U30/WiFi combines rugged data logging
hardware with integrated WiFi communications, and is
versatile enough to use in both indoor and outdoor envi-
ronments. Users can quickly plug in their choice of sen-
sors and connect to a Wi-Fi network without having to
worry about communication cables or wiring. Sensors
are available for measuring air temperature, relative
humidity, sunlight, wind, kW, kWh, AC voltage, AC
amps, DC amps, pressure, CO2 and more.
To view and analyze data, Onset offers HOBOlink, a
new Web-enabled software platform. HOBOlink
allows users to access current and historical data, set
alarm notifications and relay activations, and manage
and control remote HOBO U30/WiFi systems right
from their desktop.
The HOBO U30/WiFi provides around-the-clock
monitoring of various types of renewable energy sys-
tems. For example, it can track wind turbine efficiency
by measuring wind speed, wind direction and output
power. In solar power applications, it can verify the per-
formance of photovoltaic (PV) array systems by moni-
toring solar radiation, DC power and other parameters.
On green roofs, it can document performance by track-
ing air temperature, wind, soil moisture and rainfall.
ComBrio Introduces VirtualService Infrastructure 5.0 with NewPortal Capabilities
ComBrio, Inc. has introduced its Virtual Service
Infrastructure (VSI) 5.0, the next generation of the com-
pany’s secure remote monitoring and management soft-
ware. VSI 5.0 features an innovative module called
VSIportal, which provides expanded flexibility to the
deployment and use of VSI.
The portal functionality reduces cost, increases cus-
tomer satisfaction and generates additional revenue
opportunities for equipment manufacturers and service
providers. Enterprise customers also benefit from
VSIportal through significant cost reduction due to effi-
cient centralized control of outsourced managed services.
“We see VSIportal as a crucial offering for equipment
manufacturers, service providers and large enterprises
that are looking to deliver remote services while keeping
the devices and applications that run on them protected
from security threats,” said Dave Boulos, VP of product
management, ComBrio. “VSIportal provides the oppor-
tunity to bilaterally increase customer satisfaction and
services revenue for equipment manufacturers and serv-
ice providers. Enterprises benefit from having all vendor
services centrally managed and controlled. The addition
of VSIportal to the suite of offerings in our VSI portfo-
lio, positions VSI as the most comprehensive RPS solu-
tion on the market. A solution that addresses the needs of
all parties associated with RPS, primary provider, sec-
ondary provider, and end-user.”
Hear ComBrio, Inc. Speak at the
Remote 2008 Conference and Expo!
Session Title: Achieving Great Profits from RemoteManagement in the Industrial Environment
www.RemoteExpo.com
Calisto 2 Detects Tank ProblemsAnd Overheated Cellulose
Morgan Schaffer
has introduced its new
Calisto 2 dissolved
hydrogen, carbon
monoxide and mois-
ture monitor.
Featuring added per-
formance and stability
for the measurement
of moisture and dis-
solved hydrogen,
which is the key gas
for detecting incipient
faults at their earliest
stage, Calisto 2 also offers independent carbon monox-
ide measurement, a gas often generated in large quanti-
ties when transformer cellulose overheats.
Calisto 2 is supplied standard with DNP3.0 and MOD-
BUS communication protocols thus allowing easy
deployment within existing communications and
SCADA networks. Calisto is a widely used instrument
for on-line detection and monitoring of transformer
faults. Calsito 2 now brings additional protection value to
the transformer specialist, allowing them to better protect
large fleets of transformers using a cost efficient solution.
Astro-Med Expands Portable DataRecorder Line with 20 ChannelRecording System
Astro-Med’s Test
& Measurement
Product Group has
released the Dash
20HF, the latest
addition to its high
frequency data
recorder family.
Engineered specifi-
cally for long term
capture of high fre-
quency data and transient signals, the unit supports
recording up to 20 analog channels to an internal hard
drive at sample rates of up to 500 kHz and a bandwidth
of 100 kHz per channel.
Designed for applications ranging from transient cap-
ture to remote troubleshooting in the electric utility, pulp
and paper, metal manufacturing and other industrial
fields, the Dash 20HF is portable and rugged enough to
handle any environment. The Dash 20HF provides the
user with a real-time display and analysis of data. High
frequency data captures can be saved directly to hard
drive for later review and analysis.
The recorder contains four 250 Vrms isolated inputs
for monitoring high voltage or power signals, and six-
teen 35 Vrms differential channels for monitoring low
level signals or inputs from sensors, signal conditioners
and other devices. Each channel input can be independ-
ently configured and has a dedicated 16 bit A/D con-
verter to assure the most accurate measurement.
The versatile digital signal processing of the Dash
20HF provides a wide variety of data capture filtering
capabilities, including low-pass, high-pass, band-pass,
RMS and notch filtering. Frequency counter inputs are
also included.
The Dash 20HF includes a dedicated, 250 GByte
internal hard drive for capturing data and a DVD burner
for archiving data. Other features include 1,000BaseT
Ethernet for data upload and host control along with two
USB 2.0 ports for archiving data to external peripherals.
The system is built into a compact, light and rugged
case for field use. Equipped with a 15 inch diagonal
monitor for intuitive touch-screen control and real-time
data viewing and analysis, the graphical user interface of
the Dash 20HF is optimized for ease of use. Simple
menus permit the user to set most parameters using but-
ton and checkbox controls.
Operating on either 120 or 240 VAC, the Dash 20HF
includes a capacitive backup to ensure proper shutdown
without data corruption if power is lost. Free Windows-
based AstroVIEW X software also allows data to be
imported to a PC for analysis and review. Using
AstroVIEW X, a user can export data to popular spread-
sheet and analysis programs including Excel, DADiSP
and MathCAD with a simple conversion command.
An optional high security version designated the
Dash 20HF-HS is available. The high security version
includes locking, removable hard drives for securing
confidential data.
Collect and Graph Data Without aComputer
The new TR-57U Data
Shuttle from TandD Corp.
is a handheld collector
with the capacity to col-
lect up to 256,000 read-
ings (16 completely full
loggers) from TandD Data
Loggers. The TR-57U fea-
tures a backlit graphical
display that allows on
location data analysis.
With a user friendly
thumbwheel navigator,
this collector can be pro-
grammed for data range
check and G/NG judg-
ment display.
The TR-57U can opti-
cally read TandD TR-5S
waterproof loggers and
includes a cable for reading TR-7U loggers. The unit is
battery operated with two AAA Batteries that will pro-
vide 100 hours of operation. An energy saving auto
power off function is provided. Additionally, data can be
downloaded to a PC for archive with a fast USB cable.
6 Remote Site & Equipment Management August/September 2008 www.RemoteMagazine.com
Products & ServicesSCADA
8 Remote Site & Equipment Management August/September 2008
Products & ServicesSCADA
www.RemoteMagazine.com
APG’s LPU-2428 Loop Powered Ultrasonic Sensors areCSA Certified
LPU-2428 loop powered ultrasonic level sensors from Automation Products Group,
Inc. (APG) are now cCSAus certified for use in Class I, Div. 1, Groups C and D, and
Class I, Zone 0, Group IIB hazardous loca-
tions. These atmospheres contain ethyl-
ether vapors, ethylene, gasoline, hexane,
naptha, benzene, butane, propane, alcohol,
acetone, benzol, lacquer solvent vapors or
natural gas.
LPU-2428 sensors feature microproces-
sor control to internally perform volume,
flow and totalization calculations. They
provide a 1 to 25 ft. detection range on liq-
uids and a 1 to 10 ft. detection range on solids. These sensors are well suited for envi-
ronmental monitoring, water and wastewater control, and liquid tank measurement
applications. They are also suited for other industrial and process control applications
where liquid volume or flow needs to be monitored and controlled.
For determining flow rates, formulas for a variety of flumes and weirs are built into
the sensors. These include Parshall flumes, cut-throat flumes, California-pipe weirs,
rectangular weirs and v-notch weirs. Equation-based calculations are also possible.
LPU-2428 sensors provide an output directly proportional to the flow rate and users
can select flow rate units of per second, per minute, per hour or per day. Standard vol-
ume units include cubic feet, millions of cubic feet, gallons, cubic meters or liters. For
volume measurement, the sensors have built-in formulas for most industry-standard
tank shapes.
LPU-2428 sensors feature a rugged PVDF (Kynar) transducer housing and PC/PET
chemical resistant sensor housing, and are easy to install using industry standard 2-inch
NPT fittings. These sensors can operate in temperatures from -40°F to 140ºF and deliv-
er 0.1 inch resolution with accuracy of ±0.25 percent of the detected range, and
response time of 0.6 to three seconds depending on the output range.
The LPU-2428 features internal temperature compensation to automatically account
for changes in ambient temperature, as well as filtering options to account for other
variables such as waves on a liquid or tank irregularities. They are unaffected by the
color/translucency, dielectric constant, specific gravity or viscosity of the target.
Internal parameters are setup using a remote keypad and display unit.
Uplogix Launches Fully-Integrated RemoteManagement Appliance
Uplogix has released its Uplogix 430, a new compact, fixed four port version of the
Uplogix SRM appliance designed for large enterprises needing to cost-effectively man-
age a handful of devices at multiple
remote locations with limited or no local
IT support.
The Uplogix 430 is the first remote
management appliance that provides a
comprehensive integrated platform that
eliminates the dependency on a combi-
nation of more expensive point solu-
tions. The appliance is powered by the
Uplogix Remote Management Operating
System (Uplogix RMOS) software platform, which directs Uplogix SRM appliances to
remotely automate hundreds of routine system maintenance, configuration, fault diag-
nosis and recovery operations.
With its compact design and low power consumption, the Uplogix 430 is well-suit-
ed for deployments having physical space limitations or non-racked environments.
Targeting a new market segment of large organizations, the Uplogix 430 delivers the
option to manage more locations and devices remotely than ever before to save on labor
costs and stay within existing budgets without compromising service levels.
Hear Uplogix Speak at the Remote 2008 Conference and Expo!
Session Title: Ensuring Constant Connectivity and Secure Access to Remote Locations
www.RemoteExpo.com
Gecko Flow Transfer Standard Enables On-Site FlowMeter Calibrations
Flow Technology, Inc. has introduced the Gecko flow transfer standard for on-site
flow meter calibration. The compact Gecko system utilizes the EZ-Link portable inter-
face box and EZ-Cal menu-driven software for inline comparison calibrations with the
unit under test (UUT).
Designed for both liquid and gas applications,
Gecko is an alternative to primary standard cali-
brators for in-house calibrations or verifications.
The system consists of software and a USB inter-
face box that allows the user to interface with a
computer of their choice. Master flow meters can
be supplied by Flow Technology or the user can
choose to use virtually any meter technology they
desire for a master reference meter.
Gecko's EZ-Cal software receives inputs from
the master flow meter, temperature sensor and
pressure sensor (gas systems) for calculating both
volumetric and mass flow units. Overall system
accuracy is dependent on several factors, includ-
ing master flow meter calibration, repeatability
and primary standard accuracy, as well as temper-
ature/pressure sensor accuracies. This fundamentally
allows the user to tailor the accuracy of the system to meet their needs through the level
of master sensors they choose to utilize.
The Gecko system can be installed into an existing application utilizing the flow
source and actual conditions of the liquid or gas. In addition, a bypass system can be
built into the application for ease of installing the master meter with flow straighteners
for calibration of the UUT. Once the calibration is complete, the master flow meter can
be replaced with a recommended spool piece. The bypass approach maximizes accura-
cy while minimizing expensive downtime in production schedules.
There are no application limitations with the Gecko system with the correct master
flow meters, piping, sensors and calibrations. Thanks to recent advancements in elec-
tronics, Flow Technology has incorporated additional input capabilities for other flow
meter technologies to be used as master flow meters. This gives the metrologist the
ability to choose the flow meter design best suited for the process.
Products & ServicesSCADA
August/September 2008 Remote Site & Equipment Management 9www.RemoteMagazine.com
Semaphore Introduces a NewModel in the T-Box SCADA SystemProduct Family
Semaphore has introduced its T-
Box LT-100 compact remote moni-
toring and control SCADA system.
The new advanced IP telemetry
system extends the T-Box product
family to small, decentralized
applications where its push and
Web technologies enable high per-
formance, economical implementa-
tion and operation.
The T-BOX product family is the
first IP-based telemetry solution that
enables complete integration of SCADA, control,
and communications functionality in one pack-
age. The LT-100 model is cost effective for instal-
lations, which require up to eight DI/DO points
and two counter inputs.
Like all members of the T-Box family, the LT-
100 model incorporates full Web server technolo-
gy with SMS reporting and remote control to pro-
vide real-time access anytime, anywhere through
a standard Web browser. Operators can receive
alarms and communicate with their sites remote-
ly using a mobile device such as a cell phone, lap-
top or PDA. Automatic alarm escalation allows
key maintenance personnel to receive any unac-
knowledged alarms.
Natis Launches the SBT-1Remote Smart Battery Tester
Natis Communications has released a new
smart battery tester. This battery tester is an intel-
ligent battery condition tester capable of being
retrofitted into multiple types of equipment where
knowledge of the condition of the local battery
needs to be known to ensure their safe operation.
By periodically imposing a load across the
battery and measuring the recovered voltage, the
tester can indicate a battery failure if the recov-
ered voltage is below a set level. A typical dura-
tion of the voltage test is approximately two sec-
onds of imposed load followed by a delay of
approximately 100 milliseconds and then a series
of 10 measurements are taken and averaged to
determine the recovered voltage reading. If the
recovered voltage reading is below the anticipat-
ed threshold set by the customer, then the unit
will signal a failed battery condition. The smart
battery tester disables the battery charger unit
during the duration of the test and re-enables the
battery charger unit once the test is completed.
With this smart battery tester installed, utilities
can fully automate battery monitoring from their
SCADA centers, thereby making the regular
monitoring of remote batteries economically fea-
sible, and thus enabling their quick replacement
whenever necessary so helping to reduce outage
minutes by pre-empting battery related problems.
The smart battery tester uses an embedded processor
to manage the testing cycles and to report the test results
and battery condition. The unit can be programmed by
the customer via selection on the DIP switch. The DIP
switch can be used to program the timing or frequency of
the test cycles; the acceptable test voltage levels and
acceptable test voltage levels.
The unit has three SCADA output points that can be
interfaced to an RTU to allow the customer to remotely
monitor for battery failure. The first output indicates a
battery failure. This alarm will only occur after a battery
fails the test routine. If the battery fails the test again after
a charging period, then the tester will go into a battery
disable mode.
The second output indicates a test in progress. This
can be used by the customers SCADA system to monitor
testing periods and to determine whether the testing is
functioning properly. The third output is a battery dis-
abled status indicating that the battery has been discon-
nected from the load. The unit also has a control function
that can be used to initiate a battery test locally at the
equipment site; customers can initiate the local battery
test using a button located on the face plate of the Smart
Battery Tester.
Submit New SCADA Products to Remote Magazine!
Submit releases to Nick Depperschmidt at
Application FeatureSCADA
Engineers from Purdue and Notre Dame universities are working with Indiana
startup EmNet LLC on a wireless sensor network for the city of South Bend to pre-
vent raw sewage from overflowing into waterways, especially from surging runoff
during storms.
The system will use a citywide network of 105 manhole-mounted sensors and
"smart valves" to automatically hold back the flow of rainwater and sewage in exist-
ing sewer system pipes and retention basins until the storm has passed.
"To our knowledge, this monitoring system will be the first of its kind in the world
because it will be the largest wireless sensor network in a permanent, industrial set-
ting," said Luis Montestruque, CEO of EmNet, founded in 2004 and located in
Granger, Ind.
The system, called CSOnet, consists of numerous computer chips that communicate
with each other over a wireless radio network.
These microcomputers are embedded in the city
sewer system and are connected to flow sensors,
pressure sensors and valves in a network that
works in a cooperative manner to control storm
runoff, Montestruque said.
Such "embedded wireless sensor networks,"
or EmNets, also could be used in hundreds of cities around the world faced with simi-
lar sewage-overflow problems, he said.
Sensors are mounted on the undersides of manhole covers and will have to per-
form in an urban setting full of interference sources, said William Chappell, a
Purdue assistant professor of electrical and computer engineering who helped design
the sensor technology.
"The sensors must be made to operate in harsh conditions and adapt dynamically to
changes in the wireless system, such as interference or the presence of parked or mov-
ing cars," Chappell said. "And the system will need to broadcast sensing data generat-
ed underground to a network that operates above ground in a challenging environment."
The system is expected to be fully functional next summer, with work progressing in
stages as the system evolves to increase its monitoring capabilities, said Gary Gilot,
South Bend's public works director.
Research to develop the system began in 2004 under the direction of Jeffrey W.
Talley, an associate professor of civil and environmental engineering at Notre Dame.
Talley led a team of project participants at Notre Dame, Purdue, the city of South
Bend and EmNet that in 2005 deployed a small prototype of the CSOnet system in
the city. EmNet later took over the project to expand the earlier prototype into a city-
wide system.
The technology is an example of a "cyberphysical system," or a network of comput-
ers tightly integrated with sensors and motorized controls, said Michael Lemmon, a
Notre Dame professor of electrical engineering.
Such systems are currently being proposed for use in various applications, including
control of the national power grid, automated manufacturing, air traffic control, home-
land security and material distribution for industrial supply chains.
"There are many sensor networks in operation around the world, but few attempt to
do active control, and that's one of the innova-
tive aspects of this project," said Lemmon, who
is leading work to develop and test computer
algorithms that enable CSOnet to control storm
runoff in an optimal manner.
Saurabh Bagchi, a Purdue assistant professor
of electrical and computer engineering, has
developed critical software, called middleware, for the system. The software allows the
sensors to talk to each other in an "ad-hoc mesh network."
"The ad-hoc part means there is no need for preexisting infrastructure,"
Montestruque said. "It doesn't rely on a cell phone tower or telephone lines for the wire-
less portion of the communication to work. The mesh part means that between every
two devices there are a number of different paths for it to communicate, bypassing
interference and obstacles."
The adaptive capability made possible by the middleware is similar to how a human
brain reroutes signals around damaged nerve cells, said Bagchi, whose work is affiliat-
ed with Purdue's Center for Wireless Systems and Applications.
"Networks need to be reliable, which means you don't want to have one single
point of failure," Bagchi said. "This is particularly important because we are deal-
ing with devices that are prone to failure. They are affected by changing seasons
and environments."
Engineers Design 'Brain' of Smart Sewage-Control Network
To our knowledge, this monitoring system will be the first ofits kind in the world because it will be the largest wirelesssensor network in a permanent, industrial setting.
“
“
Application FeatureSCADA
Unlike other wireless systems, the network does not require a command center
and can be reprogrammed wirelessly from a remote location. Information from the
sensors will be relayed to a server operated
by EmNet.
The sensor data will be used to monitor
hydraulic conditions in the sewer system,
indicating when excess runoff and raw
sewage are about to overflow. Then
valves will divert the flow into temporary
storage sites.
The sewage will be selectively released
later so that it flows into the treatment plant
when capacity is available, preventing the
waste from being dumped into Indiana
waterways, including the St. Joseph and
Wabash rivers.
Cities that have combined storm and
sanitary sewers are often overloaded during
major storms, forcing municipalities to
divert this "combined sewer outflow" into
waterways to prevent sewage from backing
up into homes and businesses.
More than 700 cities around the United
States and 100 Indiana cities have combined
storm and sewer systems, Montestruque said.
"And many more cities are affected in
Canada and Europe," he said. "People using
lakes and rivers for recreational purposes
can get sick, most likely because of sewage
contamination, which contains large E. coli
counts. Not just E. coli, but all sorts of
chemicals, metals and industrial waste. Raw sewage is very toxic. It's going to take
an estimated $50.6 billion to solve the problem in the United States alone. The
amount of sewage dumped into rivers, lakes and the oceans by combined sewer
overflows is equivalent to the water carried into the Gulf of Mexico by the
Mississippi River in one week. That's 850 billion gallons per year."
Cities are fined for failing to meet U.S. Environmental Protection Agency stan-
dards. It is estimated that $4 billion will be needed to bring Indiana within federal
guidelines over the next few years,
Montestruque said.
The system being developed for South
Bend will control flows at about 20 loca-
tions in the city sewer system.
Algorithms developed by Lemmon allow
each of these locations to make flow-
control decisions in a manner that
requires only information from neighbor-
ing points, an approach that assures opti-
mal control of storm-water flows while
greatly reducing the amount of informa-
tion that must be exchanged between dif-
ferent locations in the system.
"This results in a control algorithm
that is very efficient in its use of commu-
nication resources, or bandwidth,"
Lemmon said.
Gilot likens the concept to modern
traffic signal controls that adjust signal
timing in response to changing traffic
flow and demand.
"We are going to apply that same kind of
logic to sewers," Gilot said.
Talley, an environmental engineer, also
is developing a technique of using ultra-
sound to clean water diverted to temporary
holding facilities. The method works by
bombarding water with high-frequency
sound waves, producing bubbles that implode, generating high heat that purifies water.
The ultrasonic method may eventually be incorporated into the system. Water
cleaned using the ultrasonic method would be released directly into waterways, reduc-
ing the need to later route water to the municipal wastewater treatment facility.
Purdue electrical and computer engineering doctoral students Rajesh Krishna Panta, from right, and Jin Kyu Koodiscuss software needed for a wireless sensor network in South Bend, Ind., to prevent raw sewage from over-flowing into waterways, especially from surging runoff during storms. The software must be loaded into anten-na-equipped miniature computing nodes to control a citywide network of 105 manhole-mounted sensors and"smart valves." The system is designed to automatically hold back the flow of rainwater and sewage in existingsewer system pipes and retention basins until the storm has passed. The stored water would then be releasedin a controlled manner for subsequent treatment by the city's wastewater treatment plant. (Purdue NewsService photo/David Umberger)
FeatureSCADA
12 Remote Site & Equipment Management August/September 2008
Justin Schmid, Vice President, Mobile and M2MSierra Wireless
R.I.P. AnalogThe communications industry is undergoing a massive shift from analog to digital
transmission. The evolution is happening in all types of mediums, television broad-
casts, radio and cellular communications.
For both consumers and enterprise customers moving from analog to digital signal
transmission is inevitable. As of March 1st 2008, all major US cellular phone service
providers stopped supporting analog coverage. In February of next year, over-the-air
analog broadcasts will ride off into the “analog sunset.” In fact, manufacturers have
not been allowed to ship or import video products with only an analog tuner for over
a year now.
Are there valid arguments for this forced migration to digital transmission? In fact
many analog enthusiasts argue that analog signal, represented as a continuous sine
wave, more accurately reproduces sound. The continuous signal of analog is also free
of potential error mechanisms that are inherent in digital signal, which breaks sound
into pulses or digits with varied amplitude.
Although analog signals do offer several advantages for sound quality, digital offers
many clear benefits of its own. Unlike analog recordings, where the properties of the
medium are directly related to the physical quality of the sound, data integrity enabled
by digital signal is maintained over time despite the media in which it is captured.
Repeaters in a digital signal remove the potential for cumulative transmission prob-
lems, allowing digital to transmit over longer distances. Since digital transmissions are
translated into binary language, digital signal is more easily encrypted and, therefore,
secure. Digital also enables easier multiplexing of large channel capacities. Perhaps the
most important aspect of digital communications is that it provides a means for send-
ing integrated voice, data and video over a single transmission.
Integrated Systems in Industrial ApplicationsThe ability for digital communications to provide integrated services is paving the
way to the deployment of sophisticated data acquisition systems. These systems are
typically used to gather information about a method or process. Some common appli-
cations are environmental measurements for weather, agriculture, wastewater, utilities
and traffic monitoring.
Standard equipment comprising a data acquisition system would be a data logger
with sensors and some form of stand-alone memory, but they are usually also reliant
on a server for additional storage capacity and for hosting software necessary for data
analysis and presentation. A data logger works with its sensors to convert physical
events into electronic signals, which then must be digitized and converted into binary
data in order to be analyzed using the aforementioned software.
Data Loggers: Stand-Alone Capabilities Lack Intelligent AdvantageBecause data loggers are developed for use in unattended applications, they are built
to be extremely dependable and to withstand harsh conditions. Since the instruments
may operate for extended periods with no supervision, reliability is critical. As a reli-
able power source is paramount for these applications, some data loggers are designed
with battery or solar power for backup, so these systems must be extremely power effi-
cient relative to computers.
However, even with the advancements made in data logger technology, the most
sophisticated models are still lacking in the areas of remote monitoring and control
capabilities. Though data loggers range from single-channel input to more complex
multi-channel instruments, with the newest versions able to serve web pages, the bot-
tom line is that data acquired from a data logger and measurements taken from sen-
sors is simply stored for future use. Though the measurements are taken in real-time,
the advantage of immediacy is lost when the data trail ends in the data loggers’ on-
board memory.
Intelligence at the End Point Enables Superior IntegratedCommunication Systems
Unlike solutions that use unconnected data loggers, data acquisition systems used in
conjunction with intelligent communications gateways provide access to the data in
real-time and from a centralized point. These intelligent gateways maintain an always-
on two-way connection, not only enabling pervasive access to the data but also facili-
tating remote control, management and maintenance of the remotely deployed solution
from anywhere in the network. For obvious reasons, always-connected solutions uti-
lizing intelligent gateways are outpacing data loggers in their power to utilize today’s
bleeding edge technology.
The utilities, wastewater and agriculture industries, to name a few, manage remote
assets deployed throughout expansive geographic areas and increasingly require real-
time, two-way communication to more efficiently manage measurement, collection
and distribution. Intelligent connectivity devices enable the streamlining of measure-
ment and control of transmission and distribution, automatic meter reading and man-
agement of infrastructure. Since legacy measurement equipment often utilizes various
forms of serial communication protocols, they are not natively ready to leverage
today’s vast IP based communications networks. In addition to persistent connectivity,
intelligent communications gateways perform complex packet assembly and disas-
sembly (PAD) operations to condition the data so that it can be transmitted over the
existing IP backbone. In some cases, modems must also be used to convert analog to
digital signals to permit transmission over IP networks, regardless of data source.
Wireless Advantage: Data Access from AnywhereSince many data acquisition solutions are remotely deployed, cellular-based commu-
nications play a very important role and require an intelligent and reliable wireless com-
munications gateway at the end-point. Cellular networks offer a number of advantages
over alternative solutions, including increased capacity, portability and better coverage.
Most importantly, cellular provides the wireless advantage of being able to transmit data
from isolated or distant locations where landline access just isn’t feasible.
Wireless, industrial remote monitoring solutions provide real-time data access mon-
itoring capabilities to quickly detect and fix issues or inefficiencies across vast territo-
ries. For example, unlawful removal of copper at remote transmission towers or
downed wires from natural or man-made disasters can cause a domino effect, includ-
ing large-scale service interruption to customers and destruction of transformers.
Undetected gas leaks can cause massive environmental damage and revenue loss. The
May 2007 leak at the BP Prudhoe Bay field was reported to have stopped nearly
100,000 barrels of oil production per day. With an associated revenue loss at 3 days x
100,000 bbl x $65, that equals a three-day revenue loss of almost $20 million.
Reducing Costs and Increasing Efficiency with Analog to Digital MigrationNot only does wireless connectivity provide immediate access to data from any-
where to help improve process efficiencies, but it is also a requirement for the grow-
ing demand for mobile or portable monitoring solutions. One such company faced with
www.RemoteMagazine.com
Updating Data Acquisition Systems to Utilize Integrated Capabilities
August/September 2008 Remote Site & Equipment Management 13www.RemoteMagazine.com
FeatureSCADA
this dilemma is Progress Energy Florida (PEF), a subsidiary of Fortune 250 energy
company Progress Energy. PEF was faced with the need to upgrade its analog data log-
ger solution without incurring the exorbitant costs of replacing legacy equipment. PEF
provides electricity and related services to 1.7 million customers and serves a territory
encompassing more than 20,000 square miles. The company is pursuing a balanced
approach to meeting the future energy needs of the region, including increased energy
efficiency programs, investments in renewable energy technologies and a state-of-the-
art electricity system.
PEF recently undertook an end-use load research study to better understand its cus-
tomers and plan accordingly for future consumption trends. Customers willing to par-
ticipate in the PEF study agreed to a detailed analysis of their energy consumption, by
having equipment in their homes (e.g. washer, dryer, air conditioner, water heater) mon-
itored with a data logger installed near their panel box. To collect the recorded data, the
project used a circuit switched device connected to the customer’s phone line. During
the implementation phase, PEF began to encounter many homes that had migrated to
digital communications utilizing DSL and Voice
over IP (VoIP), or simply did not have landline
access in the proximity of their panel box.
To secure a dedicated connection for the data
logger, PEF considered installing new landlines
to customers’ homes. Since the devices must be
connected to the data logger, which was most
commonly located in a home’s garage, not a cus-
tomary location for a jack, the majority of homes
would require a new RJ-11 phone jack be
installed next to the device.
Installing a landline and jack was not only excep-
tionally costly up front, but also included a recurring
monthly usage fee and additional fee for discon-
necting the line at the completion of the study.
Since, the study consisted of temporary installations
in a series of customers homes, deploying a portable
solution was a key deliverable. This requirement
caused a great deal of concern at PEF, since the
landlines could not be used from project-to-project
or from customer-to-customer.
PEF discovered a wireless data solution that per-
formed the same function as the current circuit
switched, dial-up application. Through the use of an
RJ-11 IP gateway device integrated with intelligent,
wireless gateways running on a 3G cellular network,
PEF was able to effectively monitor load demand
without interfering with other communication serv-
ices and without installing any new landlines.
The RJ-11 IP gateway and intelligent wireless
gateway solution inherently eliminates the need
for a landline, eliminating the cost of installation
and usage fees. The RJ-11 IP gateway device has
the unique ability to connect legacy circuit
switched devices to the public Internet by encap-
sulating the analog signal to internet protocol (IP)
for transmission over digital cellular networks,
seamlessly migrating from analog to digital with-
out replacing system infrastructure.
Another advantage of
the intelligent wireless
gateway solution is the
feature-rich intelligence
enabling remote config-
uration, packet-level
diagnostics and reliable
network session persist-
ence. By using an intel-
ligent device at the end-
point instead of a tradi-
tional circuit switched
landline, PEF has the ability to communicate with
and configure their remote gateways with a suite
of easy to use remote management software.
Finally, since the solution is portable, it allows
PEF to re-use the technology in future programs.
After a pilot program using a small batch of
wireless gateways, PEF conducted an analysis.
The analysis confirmed that the ease of installa-
tion, accuracy and efficiency of data transmission
and cost savings provided a sufficient business case to continue with a wide scale
deployment. PEF currently has the portable wireless solution installed in more than 80
percent of participating customer homes. In addition to a greatly simplified installation
process, PEF has reduced cost by avoiding visits from field technicians needed to sup-
port the unreliable landline devices and eliminating landline installation and usage fees.
Enhancing Data Logger Solution with Remote Monitoring Via Intelligent,Wireless Gateway
Another company that has enhanced its data logger solution using an intelligent
wireless gateway for transmission and management is Western Weather Group (WWG).
WWG furnishes accurate and personalized weather solutions through its weather fore-
casting and environmental monitoring systems. The company comprises professional
meteorologists and scientists who have been working together for over 20 years,
acquiring extensive experience in the field of meteorology and weather technology.
Please see Sierra continued on page 36
14 Remote Site & Equipment Management August/September 2008
Products & ServicesNETWORKING
www.RemoteMagazine.com
GreenPeak Launches its EmeraldGP500C Communication Controller
GreenPeak Technologies has launched its Emerald
GP500C communications controller chip for ultra low
power wireless sensor
networks. The Emerald
GP500C is the only
IEEE 802.15.4 standard
compliant chip avail-
able with extreme low
power features that
enable energy harvest-
ing solutions for wire-
less sensor networks.
The Emerald GP500C is a standards compliant com-
munications controller that incorporates a transceiver
with a fully integrated communications layer and an on-
chip energy manager. Unlike other solutions on the mar-
ket, the Emerald GP500C device is an autonomous trans-
ceiver able to drive and control the data communication
instead of being driven by a microcontroller. By reducing
energy consumption, this architectural concept enables
end nodes to run on energy harvesting devices and to be
truly wireless, free of power cords and free of batteries.
GreenPeak's new radio creates reliable communication
over a significant indoor range (100 to 150 feet) because
it utilizes embedded hardware based antenna diversity
that reduces dead spots. Furthermore, the Emerald
includes other link reliability features such as message-
over-message enabling, excellent sensitivity, a robust sig-
nal processing engine and interference detection and
avoidance mechanisms.
Designs using the Emerald GP500C communications
controller are fully IEEE 802.15.4 compliant. Developers
have the option to use GreenPeak's ultra low power net-
working protocol that reaches beyond standard imple-
mentations while maintaining standard compliance.
The Emerald GP500C consumes a fraction (10 to 25
percent) of the energy of traditional microcontroller
based designs by using a lower peak current, an ultra low
leakage current and very short transmission times via
just-in-time transmission scheduling. The GP500C's low
energy consumption allows developers to build sensor
systems with a peak current of about 20 mA and a system
sleep mode of below 100 nA without compromising the
network reliability.
The Emerald GP500C is delivered with a reference
design and development kit that allows OEMs to build
their own communication modules and applications. The
GP500C will also support a wide range of software
stacks that can run on different processors including
ZigBee Pro as well as low power routing, low power
sensing, a micro stack and other application-dedicated
low power protocols. In addition, since the GP500C is an
integrated solution, all key functions and features are
integrated and minimal external components are
required. The total system bill of material (BOM) will be
lower and makes the GP500C best in class for total sys-
tem cost, allowing for the opening of mass markets for
maintenance-free sense and control applications.
Hear GreenPeak at the
Remote 2008 Conference and Expo!
Session Title: Wireless Sensors NetworksEnable Remote Monitoring with no Network
Wiring or Power Supplieswww.RemoteExpo.com
Cermetek Releases NewEmbedded Modem Family
Cermetek Microelectronics has introduced its
newest embedded modems, the XE2400G and
XE5617G. These modems
integrate LSI modem tech-
nology into a small, com-
plete modem module.
Cermetek has targeted these
new modems toward remote
monitoring applications
where small size is critical.
The XE2400G and XE5617G utilize the
unique Cermetek Hybrid PLCC (HyPLCC) pack-
age. The HyPLCC package delivers a complete
modem in a 68-pin PLCC outline, less than one
inch square. When the modem serves as a system
option, the XE5617G and XE2400G can be
installed in a 68-pin PLCC socket, otherwise the
modules can be soldered directly to the PCB
The Industrial Automation Group of Advantech has introduced four new managed
industrial Ethernet switches with integrated 100 Mbps fiber optic ports. The switches
are named the EKI-7554MI, EKI-7554SI, EKI-7559MI and EKI-
7559SI, respectively. These compact and industrially hardened
switches offer advanced traffic control for optimum network per-
formance and security, along with rapid self-healing fiber optic ring
capabilities that ensure network uptime in adverse environments.
The EKI-7554MI and EKI-7554SI offer four 10/100Base-TX
ports and two 100Base-FX fiber ports, while the EKI-7559MI and
EKI-7559SI offer eight 10/100Base-TX ports and two 100Base-FX
fiber ports. All models are equipped with SC type optical fiber con-
nections and are available in multi-mode (MI models) and single-
mode (SI models) fiber configurations. Additionally, these ruggedi-
zed switches feature an extended operating temperature range of -40
to 167°F.
To meet the real-time fault-tolerant needs of manufacturing, the
dual fiber connections can be used to connect multiple managed
switches in a self-healing ring configuration, which provides a sec-
ondary communications path in the event that the primary is interrupt-
ed. In addition to open standard Spanning Tree (STP) and Rapid Spanning Tree
Protocol (RSTP), the EKI-7000 family switches also support Advantech’s ultra fast X-
Ring, which guarantees recovery in less than 10 ms.
Another key benefit of the EKI-7000 managed switches is advanced network traf-
fic management. Using Virtual Local Area Networks (VLANs), a physical network
can be logically subdivided in multiple logical networks, improving
performance and enhanced security. With the rising popularity of
Ethernet/IP and other industrial protocols that use multicast messag-
ing, IGMP Snooping can direct these messages to only the partici-
pating devices, without flooding all of the other devices with unnec-
essary multicast traffic.
Managed switches also offer a variety of built-in diagnostics tools
for quick network troubleshooting and maintenance. Port statistics
allows remote monitoring of device connection status and data traf-
fic throughput, and the switch can also pro-actively send an e-mail
message or SNMP trap (alarm) when a fault has been detected, min-
imizing network downtime. Also these switches support Simple
Network Management Protocol (SNMP), for centralized remote
management or integration with HMI and SCADA systems.
Designed for demanding environments, these switches have been
designed to withstand extreme shock and vibration, extended operat-
ing temperatures of -40°F to 167°F, and include redundant 12 to 48
VDC power inputs for resiliency. Packaged in a metal IP30 rated chassis, these
switches feature standard DIN-rail or direct panel mounts. Plus, they are UL/CSA,
FCC, CE and RoHS/WEEE certified.
Advantech Expands its Line of Managed Industrial Ethernet Switches
August/September 2008 Remote Site & Equipment Management 15www.RemoteMagazine.com
Products & ServicesNETWORKING
using standard surface mount solder processes.
Each XE5617G and XE2400G modem includes trans-
ferable FCC Part 68 registration eliminating the need for
further Part 68 testing. LSI modem technology also per-
mits adjustments for compliance to country standards
around the world with a single AT command.
The LSI, CV92 modem chip serves as the foundation
for the XE5617G. The CV92 supports V.92, 56,000 bits
per second data transfer and with fallback all the way to
300 bits per second. CV92 also provides V.17 send and
receive fax capability. The XE2400G utilizes the LSI
CV22, 2400 bit per second modem chip for applications
transferring small amounts of data.
New ILC 150 VLC ControllerFrom Phoenix ContactFeatures Steeplechase VLC 7.2
With the introduction of
Steeplechase VLC 7.2 and
support for the new ILC
150 VLC controller,
Phoenix Contact now
offers a complete scalable
control solution for
EtherNet/IP applications.
The company's EtherNet/IP products include a
full range of programmable controllers, managed
switches with Internet Group Management
Protocol (IGMP) snooping capability and a vari-
ety of I/O devices.
EtherNet/IP is an industrial Ethernet technolo-
gy supported by hundreds of vendors around the
world. EtherNet/IP is a member of the family of
CIP Networks, a group of networking technolo-
gies built on the Common Industrial Protocol
(CIPT), and is managed by ODVA.
The ILC 150 VLC is a compact, low-cost
embedded control platform for small- to medium-
sized applications. This new control platform
adds a controller choice at the low end of the
Phoenix Contact VLC scalable controller archi-
tecture. The built-in Ethernet port on the ILC 150
VLC allows for easy networking and data
exchange to a supervisory system using the
EtherNet/IP protocol. All the VLC control plat-
forms now have integrated Ethernet/IP capability
for either scanning I/O or for serving up applica-
tion status information to a supervisory system.
The Steeplechase Visual Logic Controller
(VLC) is a flowchart-based programming tool. In
addition to the new ILC 150 VLC control plat-
form, VLC 7.2 can also target other controllers in
the Phoenix Contact product line such as the ILC
350 VLC and the S-MAX VLC as well as a tradi-
tional PC-based runtime control platform.
Adder Launches CATx KVMSwitch to Provide SMBs withEnterprise-Grade Control
Adder has launched the AdderView CATx
1000. The CATx 1000 is a compact, multiplat-
form KVM switch with audio support that allows
a user to control up to 16 computers connected to
the CATx switch via CAT 5 cable locally at the
switch or remotely up to 1,000 feet away.
The use of CATx cable from the computer to
the switch allows for a much smaller switch,
reduced cable bulk and more flexibility. Part of the CATx
series of Adder KVM devices, the CATx 1000 has been
designed to minimize space requirements where space is
at a premium and maximize flexibility both in use and
location. One or two of the KVM switches can be rack
mounted and cascaded with other CATx 1000s to support
up to 256 computers.
The CATx 1000 delivers a wide range of features
including digital stereo audio, high resolution video,
USB device control and an advanced on screen display
and serial control for remote switching, power control
and synchronizing with other CATx 1000 units. Users
can also leverage security profiles which identify the user
prior to handing over control and even duplicate the con-
nection profiles onto other CATx 1000 devices if
required. Another feature is Display Data Channel
(DDC) handling where the KVM uses specific informa-
tion transferred from the display device to ensure correct
video is maintained with host machines.
The CATx 1000 can be connected to just about any
type of host including PC, Server, Mac or Sun by lever-
aging Adder’s Computer Access Modules (CAMs) to
enable broad connectivity options. The CATx 1000 car-
ries keyboard country codes enabling different keyboards
from different countries to be used on Sun hosts. The
KVM switch also uses ‘keep alive’ technology which
maintains the impression of keyboard and mouse being
present, even when disconnected for a long period of
time between KVM selections.
MeshNetics Ships First 900 MHzModule Using the ZigBee PROFeature Set
MeshNetics has launched the ZigBit 900, a RF module
for sub-1 GHz band that uses the ZigBee PRO feature
set. The new IEEE 802.15.4-2006 module is designed to
operate in the ISM
bands 915 MHz in
the US and 868 MHz
in Europe.
The ultra-compact
ZigBit 900 module
features sensitivity of
-110 dBm and output
power of 11 dBm
that result in the line-
of-sight range of up to 6,000 m (more than 3.7 miles). The
power consumption stays at a low level of less than 6 µA
in sleep mode, 11 mA in receive mode and 26 mA in
transmit mode, which translates into added years of bat-
tery life. The ZigBit 900 operates in the European ISM
band from 863 to 870 MHz and in the North American
ISM band from 902 to 928 MHz. The ZigBit 900 offers
regional alternatives to the global 2.4 GHz band where the
channel characteristics of the lower frequencies can result
in performance advantages in certain environments.
The ZigBit 900 module ships with BitCloud, a
802.15.4-2006/ZigBee PRO feature set used for all the
2.4 GHz MeshNetics modules. Supporting self-healing,
self-organizing mesh networks and up to 1 Mbit/s data
rates, BitCloud stack optimizes network traffic while
minimizing power consumption. Customers can choose
between the C API for embedded application develop-
ment and SerialNet, a ZigBee manufacturer specific pro-
file based on BitCloud supporting a serial AT-command
interface to ZigBit 900.
“We are actively working with other ZigBee Alliance
members to enable interoperable and certified ZigBee
applications for the sub-1 GHz frequency band,” said
Vasiliy Suvorov, CEO of MeshNetics. “ZigBee is experi-
encing tremendous growth across a wide variety of
industries and we believe that sub-1 GHz solutions will
further extend ZigBee’s appeal and fuel its growth.”
The ZigBit 900 module is based on Atmel’s hardware
platform featuring AVR microcontroller and the latest RF
transceiver. The brand new AT86RF212 is a low-power,
low-voltage transceiver designed specifically for low
cost IEEE 802.15.4-2006, ZigBee and high data rate ISM
applications. The AT86RF212 boasts added sensitivity
combined with the very low power consumption. Its
MAC and AES hardware accelerators improve overall
system power efficiency and timing. The ZigBit 900
packs the MCU, RF transceiver and all the circuitry in
just under half a square inch of space.
Enfora Introduces Spider SAWireless Modem for RemoteMonitoring and Control
Enfora has released
the Spider SA-G+
wireless modem. This
new modem, which
uses the Locosto sin-
gle-chip platform
from Texas
Instruments, can cap-
ture and analyze data
from remote sensors, RFID tags and other input sources,
and transmit the data to monitoring and control stations.
Furthermore, the modem readily integrates with Enfora’s
middleware that allows for exchange of data with enter-
prise IT systems.
“The SA-G+ is well suited to applications that
require an economical solution for remote monitoring
of assets in the field,” said Brian Murphy, vice presi-
dent, worldwide sales, Enfora. “Additionally, the SA-
G+ allows application providers to move from circuit-
switched to Internet Protocol (IP) connectivity as need-
ed for their applications.”
The Spider SA-G+ is a type approved quad-band
GSM/GPRS modem that enables simple integration
through a serial connection. Its flexible design allows
system integrators to address multiple markets and
geographies with a single design. Enfora’s Spider prod-
uct family of intelligent modems is designed to support
a variety of wireless applications and includes solutions
for asset management, tracking and remote monitoring
and control.
Connect Several Devices andComputers to GPRS/EDGE Wireless Networks
Computers and devices connected through Ethernet
cables can access the Internet freely from everywhere
without needing wired or satellite access with eDevice’s
new RouteD230. The
RouteD230 has been
engineered to provide
reliable wireless
Internet connectivity
that can be used as
backup for already-
connected sites or as a
main link for yet
unconnected or brand
new sites. Cellular network specific features like auto-
matic attachment management and link failure discovery
increase link reliability while dynamic DNS allows user
to work around the limitations of dynamic IP addressing.
For critical applications where link redundancy is
needed, the RouteD230 can easily be used as a wireless
backup to the regular network infrastructure. The plug
and play set-up of this unique backup feature is compat-
ible with the most basic routers and does not require
advanced and expensive features like VRRP.
When used as the main Internet/Intranet link, the
RouteD230 embeds an internal DHCP server for easy
and immediate IP address attribution throughout the
LAN. The wireless Internet access is shared between sev-
eral computers or LAN devices using network address
and port translation allowing servers to be hosted on the
LAN with the TCP port mapping technique.
The RouteD230 embeds a quad-band GSM/GPRS or
EDGE module and targets cellular carriers, IT resellers,
OEMs and integrators. It is designed to offer connectivi-
ty for networks of computers located in branch offices,
mobile sites, stores and point of sale. Additionally, the
integrated serial port and memory card holder pave the
way for fast adaptation to specific customer needs in the
Machine-to-Machine (M2M) area for applications such
as remote monitoring, automated meter reading and
video surveillance.
Laird Technologies DebutsMesh Technology for HarshEnvironments and ExtremeDistance Applications
Laird Technologies, Inc. has made available its
new Extreme Mesh software technology that
delivers reliable performance in harsh environ-
ments when used with the company’s AC4790
range of 900 MHz wireless modules. While
ZigBee is widely used in mesh technology and is
finding new uses in automation, energy conserva-
tion and building control, an even more robust
solution is required for a range of customers who
work in the harshest environments. Laird
Technologies is working to add performance, reli-
ability and usability in this market with the new
Extreme Mesh technology, complementing its
existing line of ZigBee Your Way modules.
The static mesh software is available for its
AC4790 range of 900 MHz wireless modules
with power outputs of up to 1 W. This industrial
strength solution allows users to build meshes
with inter-node distances well in excess of one
mile, providing redundancy and reliability for
applications such as pipeline monitoring.
“Customers require performance and need
technically advanced products when working in
the harshest environments,” said Dan Miller, vice
president of Wireless Systems, Laird
16 Remote Site & Equipment Management August/September 2008
Products & ServicesNETWORKING
www.RemoteMagazine.com
August/September 2008 Remote Site & Equipment Management 17www.RemoteMagazine.com
Products & ServicesNETWORKING
Technologies. “This new mesh software delivers reliable
performance when coping with extreme, harsh tempera-
tures and interference.”
The Extreme Mesh software in conjunction with the
robust industrial wireless module, offers static mesh oper-
ation, frequency hopping, extended temperature range, as
well as extremely simple set-up and installation. The ease
of installation is key to the deployment of such systems in
remote locations where products need to work out of the
box. To aid developers, an AT command interface is pro-
vided to control the nodes of the mesh network.
MRV LX 4108T ConsolidatesRemote Power, Device and SensorManagement of RemoteWireless Sites
MRV Communications, Inc., has released the
LX 4108T remote site manager, a complete
remote-site out-of-band management system
that delivers console, power and sensor manage-
ment in a single system. The LX 4108T remote
site manager is a one rack unit high device suit-
ed for wireless network sites, remote telecom
locations, manufacturing facilities and data cen-
ters where space, power and remote manage-
ment are key issues.
When deployed at un-staffed facilities utiliz-
ing lights-out management, the 4108T can man-
age all communications equipment, power
sources, physical and environmental conditions
from any remote location. These capabilities
improve system availability while also reducing
staffing costs, as on-site technical staff is not
required to perform hands-on troubleshooting
tasks such as rebooting locked-up equipment.
The device has eight serial ports, providing
remote network connectivity to serially attached
devices such as switches, routers and servers, via
RS-232, Ethernet and\or V.92 modem connec-
tions. Sensor and alarm management is also inte-
grated into each serial port further consolidating
multiple management functions into the device.
Power connectivity is provided by four 5-20R
outlets with a maximum overall device rating of
20 Amps. Further easing installation tasks, the
device includes eight RJ45 10/100 Ethernet
switch ports providing connectivity for addition-
al devices and removing the need to install a sep-
arate standalone Ethernet device. Leveraging the
software features of the LX Series Console
Servers, a number of security mechanisms
including RADIUS, SecurID, TACACS+,
SSHv2, SNMPv3 and SSL are supported ensur-
ing secure communications from any location.
Power and environmental conditions play a
large part in determining the availability of com-
munications networks today. Advanced power
monitoring provides unparalleled troubleshoot-
ing and planning tools including utilization sta-
tistics for each individual power outlet. The
4108T provides the ability to enable/disable indi-
vidual power outlets allowing unresponsive
devices to be rebooted without the need to phys-
ically access the device. Environmental condi-
tions can also drastically affect network reliabil-
ity in remote locations. The 4108T provides the
ability to monitor temperature, humidity and
moisture which are common causes of outages in
remote locations.
Astron Wireless Technologies, Inc.Increases Frequency Range forHESA Technology
Astron Wireless Technology’s
HESA system now has the capa-
bility to run from 2 MHz to 18
GHz for all applications, where
previously it ran at 2 MHz to 3
GHz. The HESA DF platform
provides a flexible platform for
configuring multiple antenna ele-
ments in a small form factor. Most
surveillance applications typically require highly sensi-
tive signal capture requirements utilizing multiple fre-
quencies. By networking various elements and their asso-
ciated electronics such as amplifiers, multiple frequencies
can be co-located, therefore requiring less space.
The Astron HESA technology provides an environ-
ment that optimizes antenna and system efficiency, lead-
ing to greater signal capture and reduced error rates. As
result of HESA, additional frequencies can be added to
achieve more target bandwidth while maintaining accu-
racy in a miniaturized form factor.
Several miniaturized DF antenna systems utilizing the
HESA DF platform have been developed by Astron.
Systems have been developed for multiple applications.
Inherent in the HESA DF Platform is the ability to pro-
vide a customized DF antenna according to customer
requirements and applications.
Nick Depperschmidt, Associate EditorRemote Site and Equipment Management Magazine
1. Please give a brief overview of what Spinwave
Systems provide to the remote monitoring market.
Spinwave Systems offers a unique blend of technolo-
gy, products and applications expertise to customers in
the remote monitoring market. Our wireless technology
features mesh networking and a frequency agility com-
munication protocol, which results in a highly reliable
system. Our products
include sensors, pulse
counters, input/output
modules, smart meter
interfaces, and a
range of gateways,
including MODBUS,
BACnet and LON,
designed to efficient-
ly transmit data to
computers, SCADA
systems and building
automation systems.
We also offer a MOD-
BUS radio that allows
users to wirelessly
enable any existing
MODBUS device.
Our market focus
has been on the build-
ing automation market
and our support team
has years of hands-on
experience supporting
customers in implementing monitoring and control appli-
cations. We have been extremely busy working with cus-
tomers to implement systems in every aspect of automa-
tion and data collection: profiling building operation per-
formance, aggregating and comparing data from groups
of buildings to identify problem sites, transmitting ener-
gy consumption data for analysis and billing, and meas-
uring the results of efforts to reduce energy consumption.
We’ve also become more heavily involved in creating
demand response solutions, including both the control
systems needed to shed load, and the monitoring systems
that ensure that buildings continue to operate at optimum
functionality during those sheds.
2. What has been the biggest success for Spinwave in
2008 in terms of new technology development?
Our technology and product architecture enables us to
be “agile” and responsive to our customers. We pride
ourselves on our ability to listen and respond. One of our
customers, a systems integrator in the buildings controls
sector, was working with a school district to profile the
energy consumption in each of the schools in the district.
The problem was collecting energy consumption data in
real time. Our customer asked if we could design a prod-
uct that could be interfaced to electric, water and gas
meters to wirelessly transmit consumption data to the
district’s buildings automation system for analysis.
His basic problem was the meters were located remote-
ly from the buildings; it would have required a very
expensive installation if they tried to implement a con-
ventional wired systems. We responded and designed a
battery powered wireless pulse counter that would inter-
face to the various meters in the schools and transmit
usage data to his data collection point. The wireless pulse
counter enabled him to rapidly and economically install
the system, resulting real time data that can be used to
improve the district’s energy efficiency programs.
We have subsequently released the product to the gen-
eral market and have been very successful with it.
3. What are some of the benefits of using your wire-
less sub metering line of products?
In general, the submetering enables a building owner
or facility manager to precisely track his energy con-
sumption. Data from meters (electric, gas, water) can be
aggregated and analyzed and strategies to more efficient-
ly utilize energy can be implemented. In general, a
Spinwave submetering product can be implemented
quickly, flexibly and economically.
Spinwave enables customers the ability to rapidly and
economically implement a submetering system. Wireless
eliminates the need for expensive wiring and installation.
Through industry protocols, we can interface to virtually
any SCADA system. Our devices work with nearly all
automation and monitoring systems. That level of flexi-
bility means that submetering is now feasible for many
types of facilities where it was not feasible before.
4. How has the added emphasis on energy efficiency
and green initiatives affected Spinwave in 2008?
Spinwave’s products are designed to transmit data to
management for analysis and action. Our team has been in
the building controls industry for some time and routine-
ly think about energy management and efficiency. The
increasing awareness of energy efficiency that has been
building due to awareness of the impact of global warm-
ing has provided a stimulus for companies like Spinwave.
Relative to 2008, the rapid rise in energy prices, partic-
ularly paying $4.00 and up per gallon at the gas pump, has
provided an increased sense of urgency in implementing
energy efficiency projects. The demand response market
has also expanded, as the need to shed load to avoid
brownouts has grown. Our wireless products, which
install quickly and economically, are a good fit for energy
managers looking to improve their operations.
We have found that more and more customers have
been extremely interested in energy efficiency projects.
The European markets, driven by legislation, have been
extremely active in developing energy efficiency initia-
tives and are utilizing our wireless products to imple-
ment them.
5. Controlling meters and building automation wire-
lessly can bring about cyber security concerns. What
is Spinwave doing to protect its customers?
I do not mean to downplay the issue; however,
cyber security has not been a big concern for our
customers. In general, our system is highly
secure. Our proprietary wireless communication
protocol is a frequency agility system, with ran-
dom channel hopping. The network changes com-
munication channels very rapidly and adaptively,
and each link in the network could be communi-
cating on different channels at any moment, mak-
ing communications break-ins very difficult. The
built-in DSSS that’s part of the standard further
reduces the likelihood of interference. In addition,
IEEE 802.15.4 supports AES encryption stan-
dards with encryption strength up to 128 bits.
Those implementations that add AES encryption
standard to our frequency agility have even more
outstanding security.
6. Your system uses the 802.15.4 protocol.
What are some of the benefits of it over other
wireless standards?
It works well for us in our target markets and
applications. We use it because of the its low
power consumption, which is critical to us since
we rely on battery powered devices. Another
advantage is that, thanks to the availability and
low cost of silicon, pricing can remain affordable,
even for networks using hundreds of nodes.
18 Remote Site & Equipment Management August/September 2008
FeatureNETWORKING
www.RemoteMagazine.com
Executive Q&A with Spinwave Systems CEO William LaPointe
Spinwave System’s wireless MODBUS radio
Spinwave’s wireless mesh sensor networks integrate with automationsystems via Linux-based gateways.
Spinwave’s wireless thermostat con-troller is a drop-in replacement for anyexisting non-communicating thermostat.
Low data rates enable low power consumption, mak-
ing it possible to have battery life of two to eight years
in the typical device, depending on environmental factors
and transmission intervals. So it’s the ideal standard for
use in applications where configuration and maintenance
time need to be kept at a minimum.
7. Are there any plans to develop Spinwave products
for other protocols?
Not at this time. We are monitoring the progress of
low power wireless WiFi very closely and have strong
interest in it.
We frankly spend most of our time complying with
applications protocols. We are literate in BACnet, LON,
MODBUS and XML and are evaluating others
with which to interface.
8. With so many different standards in play,
where do you see the wireless sensor market
heading in the future?
WiFi appears slated to become a more preva-
lent standard in the market, as does Bluetooth.
However, the range of applications for wireless
sensors is too diverse for one standard to domi-
nate. I believe we’ll continue to see a range of
standards at the integration point, such as
BACnet and LON in building automation and
MODBUS, HART, Fieldbus and PROFIBUS, in
the industrial sector.
Our technical team is highly innovative and
we are confident that we will be able to adapt to
the market as it evolves.
9. What are some of the new and exciting
projects/applications Spinwave is working on
right now?
We have a lot on our plate. Our long term goal
is to be a wireless automation company with a
full line of wireless control products. Our initial
target market is the virtually untapped small
building market. Products for this market include
zone controllers, I/O devices, and communica-
tions gateways, as well as sensors.
In addition, we are partnering to provide a
complete solution for submetering customers and
are working with another partner to develop the
second generation of our smart communicating
thermostat. We see ourselves working with more
partners to broaden our offerings in sensors, and
developing expanded OEM relationships.
10. What is in store for Spinwave in 2008
And beyond?
We are looking to be a dominant long term
player in the wireless automation market. We will
be internally focused on rounding out our product
line and building sales momentum for the balance
of 2008 and into 2009. Once we are secure in our
market segments, growth through acquisition is
in our plans.
Spinwave Systems is a developer of wireless sensorsand controls. Specifically designed for commercial build-ing automation, Spinwave’s products enable highly ener-gy-efficient building operations and productive andhealthy environments. Spinwave’s unique system designand rapid deployment toolset allows seamless integrationof wireless sensors to existing building automation sys-tems from all major manufacturers. For more informationplease visit: www.spinwavesystems.com.
William LaPointe is president and CEO of SpinwaveSystems, Inc. He has more than 25 years of buildingautomation experience and a proven track record ofgrowing a startup company to industry leadership. Billwas the president of Andover Controls Corpo., a suppli-
er of DDC systems to thebuilding automation market,from Sept. 1979 to its acquisi-tion by Schneider Electric in2004. Under his direction,Andover grew from 9 employ-ees and under $1 million inannual revenue to over 650employees and revenues of$170 million. Prior to AndoverControls, Bill held positions of financial and operationsmanagement with companies in the general industrial,computing, and defense industries. He holds and M.S.degree in Accounting from Bentley College and a B.A.degree in finance from Northeastern University.
August/September 2008 Remote Site & Equipment Management 19www.RemoteMagazine.com
FeatureNETWORKING
Spinwave has recently added wireless I/O modules totheir line of energy management products.
Harvey Lehpamer, Senior Transmission Engineer Communication Infrastructure Corp.
Introduction to Microwave Network Build-OutIt can be challenging and expensive undertaking to
build a large and very reliable microwave network and
similar to telecom service providers, utility companies
must deploy highly reliable networks to guarantee serv-
ice for their customers. In the material that follows, we
will discuss some of the good practices in designing
high-reliability microwave networks. These practices, if
implemented in a timely fashion, could reduce CAPEX
and OPEX required for the project completion. Although
utility companies are lately getting more and more
involved in the last-mile type of communications sys-
tems, discussed here are mainly point-to-point medium
and high capacity, long-haul microwave systems. Of
course, many engineering principles mentioned here are
very much applicable to any type of radio communica-
tions system.
It is important to notice that transmission and there-
fore microwave systems for wireless networks, tele-
phone operators, and government or utility companies
will have very different set of requirements that have to
be considered. For example, electric and other utility
telecommunications networks have some specific
requirements that are different from other telecom net-
works since they are not only used for communication
between operations and administrative staff but also for
the distribution and collecting of data related to control
equipment. Examples are, among others, SCADA
(supervisory control and data acquisition), powerline
fault location, loop and ring protective schemes and
direct transfer trip protective relaying. SCADA systems
are used extensively by power, water, gas and other util-
ity companies to monitor and manage distribution facil-
ities. Direct transfer trip transfers local protective relay-
ing tripping signals hundreds of miles to operate distant
circuit breaker. Delay issues and high end-to-end avail-
ability and reliability of the backbone microwave links
in utility telecommunications networks are just some of
the main challenges to focus on.
Regardless of the end user and/or application of the
microwave network, microwave build-out phases are
common to all of them (Figure 1). Planning (sometimes
called preliminary design) usually means high-level
decision-making process, budget and schedule defini-
tion and identifying team members required for the proj-
ect (creating Task Delineation List.) It also includes
defining frequency band(s), system capacity, and net-
work configuration and performance objectives. The
next step is to perform preliminary path engineering
using topographical maps and/or terrain database, iden-
tify material requirements and create preliminary BOM,
and develop budget and schedule. Timelines and sched-
ule will define resources required and/or available (and
vice-versa) for the successful completion of the project.
A preliminary cost estimate will be only as accurate
as the defined scope of a project. In cases where very
limited preliminary microwave engineering has been
undertaken, this estimate will likely reflect the cost of
equipment and engineering services contemplated in the
scope of the project. In cases where more extensive pre-
liminary design has been completed and the scope of the
project has been well defined, this estimate will likely
reflect the total project cost very closely.
System design is an actual detailed microwave link
engineering process, which may or may not include site
visits but requires reliable site information, detailed path
surveys, path engineering including interference analysis
and FCC licensing, creation of the detailed Bill of
Material, ordering equipment (MW radio, shelters, tow-
ers, other transmission hardware and software) and
ordering engineering, installation and other services, etc.
A microwave radio system requires careful planning and
a poorly designed path may result in periods of system
outages, increased system latency, decreased throughput,
or a complete failure to communicate across the link.
Deployment, also called implementation, includes all
the field activities like site acquisition (if required)
tower erection or modification, equipment installation,
creation of an as-built documentation, and acceptance
testing and commissioning.
Important Things to Consider when Designing aMicrowave Network
1) Performing Detailed Microwave Path and Site Surveys
A path profile is a graphical representation of the
path traveled by the radio waves between the two ends
of a link and a result of path survey [1]. The path pro-
file determines the location and height of the antenna
at each end of the link, and it insures that the link is
free of obstructions and propagation losses from radio
phenomena, such as multipath reflections. A path pro-
file is established from topographical maps, which, by
reference to the contours of the map, can be translated
into an elevation profile of the land between the two
sites in the path. Earth curvature can be added, as well
as obstacles (see Figure 2).
The Fresnel Zone calculation can then be applied
and an indication of any clearance problems gained.
There are various software tools available to assist this
process if required, but most are reliant upon the avail-
ability of topographical data in digitized format. The
surveyor must check the present obstructions and
allow for future obstructions (such as new buildings,
tree growth, cranes, etc.) that may impinge the radio
path. It is also important to notice if there are some large
bodies of water nearby since large reflecting surfaces
can produce problems due to increased multipath proba-
bility at frequencies below 10 GHz.
It is important to note that the “Line-of-Sight” is not
the same as “Path Survey”! For longer paths and higher
capacity systems it is an imperative to actually perform
physical path survey and not to rely just on the maps
and/or aerial photographs or quick LOS methods, like
balloons, flashing the path, etc.
2) Antenna Mounting Structure AssessmentAntenna mounting structures could be towers, poles,
tripods, walls, water towers, high-voltage transmission
towers, etc. Things to keep in mind during the detailed
design and deployment of the MW system:
• Sufficient space on the tower to install and pan the
microwave antenna
• Loading of the antenna mounting structure (MW
antenna, transmission lines and outdoor MW unit)
• Maximum allowed twist and sway of the antenna
mounting structure (in degrees) – it will depend on
the frequency and antenna type
It is important to notice that the requirements for the
twist and sway of the tower could be much more strin-
gent for the microwave than other RF installations. Table
1 shows maximum allowed antenna deflection (-10 dB
points) for certain bands and typical antenna sizes.
Towers and other antenna mounting structures that do
not satisfy these requirements will cause very severe
long-term outages (and therefore unavailability of the
microwave link) due to misalignment of the antennas. It
is very important to use expert tower company to calcu-
late the loading of the tower and maximum allowed twist
and sway of the structure and not to rely on the qualita-
tive perceptions or “gut feeling.”
3) Using Existing Electric Transmission Towers for Mounting Microwave Antennas
Large electric transmission towers provide a corridor
between generation stations and substations, placed in
remote locations. Their location and 150-foot-plus height
allow for placement of larger antenna arrays and excellent
antenna elevation. These towers are ideal as antenna loca-
tions for propagating radio signals over large areas and
with the LOS in different directions. Precise engineering
and care must be used when placing RF and/or
microwave antennas near transmission conductors to
avoid the dangers of electric arcing [2].
From strictly microwave prospective, these towers as
well as power lines are not an obstacle to install a
microwave system even if they obstruct the LOS of the
microwave system. Signal loss due to the obstructed
Fresnel’s zone would be relatively small, depending on
the type of the tower and its construction.
22 Remote Site & Equipment Management August/September 2008
FeatureNETWORKING
www.RemoteMagazine.com
The Best Practices to Deploy a Reliable Microwave Network
Figure 1: Microwave build-out phases
Figure 2: Optical Line-of-Sight and Fresnel zone
Table 1
4) Split Configuration, All-Indoor, or All-OutdoorRadio Configuration?
Three different installation scenarios are possible and
they all have their pros and cons; decisions will be made
taking into consideration a number of factors, like avail-
able tower space, tower loading, environment and cli-
mate, location, proximity to the service centers, access,
ease of installation, cabinet/shelter space, etc.
All-indoor Microwave Radio consists of the entire
microwave and digital modem part being placed
indoors, microwave antenna mounted outside on the
tower and a waveguide (or a coaxial cable) connecting
the transceiver of the radio with the antenna. This solu-
tion is acceptable for the lower frequencies bellow 10
GHz and high-capacity (backbone) microwave systems
but quickly becomes unacceptable as frequency increas-
es due to the high losses in the coax or waveguide.
Split Configuration Microwave Radio has a
microwave terminal with an outdoor part, the radio unit(s)
and an indoor part, the access module (see Figure 3).
Whenever possible, split configuration microwave
radio is replacing
the, all-indoor con-
figuration. To
reduce losses
between transceiv-
er and antenna, the
Outdoor Unit
(ODU) containing
all the RF modules
can be mounted
nearby the antenna.
The ODU is con-
nected to the Indoor
Unit (IDU), containing baseband circuitry, modulator
and demodulator, by means of one single coaxial IF
Cable. From the operational prospective, split configu-
ration is easier and faster to install, less space and equip-
ment required, etc. but climbing tower to troubleshoot,
repair or replace ODU is not an easy task. It requires at
least two skilled, trained and licensed riggers to main-
tain the site.
All-outdoor microwave radio is not a new idea, but
becoming popular again, especially among pure
Ethernet radio suppliers and users. Occasionally, finding
even one or two rack spaces in the equipment cabinet
could be a challenge. For special cases where the shel-
ter/cabinet space is at a premium, all-outdoor version of
high-capacity Ethernet radios could be used. In that
case, all the electronics is in the outdoor unit and only
Ethernet cable and a power cable are brought down to
the cabinet, eliminating a need for space for indoor unit.
Access and maintenance challenges are the same as in
the case of the split configuration radios.
5) Equipment Ordering and RFQsFor large microwave projects, RFQ (request for quo-
tation) is required and it can be functional or technical in
its nature; a functional RFQ is the one where the client
describes the system and functional requirements of the
system while it is the total responsibility of the supplier
to make it work (turnkey project). For turnkey contracts,
a specific scope of work document is also included to
define the installation and test services being added to
the contract. Technical RFQ is very similar except that
the client will provide more starting data to the supplier.
For example, preliminary microwave plan has been
done and tentative equipment locations identified, which
will give all the bidders the same starting point. This will
eliminate big discrepancy in the initial approach
between bidders and therefore provide more realistic
and competitive pricing.
Equipment and services evaluation usually is, or
should be, based not only on the technical specs and
price but also on the other criteria, for example, experi-
ence of other customers (especially regarding the relia-
bility) with the same or similar type of equipment, war-
ranty and customer support, maintenance, etc. Issue an
RFQ for the equipment and services, perform due dili-
gence and pick the best (not necessarily the cheapest)
companies to do the job [3]. Properly designed and
installed microwave network will not cause problems
but all the shortcuts and oversights made during the
build-out process most likely will.
6) Network Availability and Performance PredictionsFor the network operators, one of the key factors to
the success is its ability to maintain a high standard of
network performance, which can only be achieved by
adopting the appropriate QoS metrics and measurement
tools. In any telecom network, outages due to software
and hardware contribute to almost half of the telecom-
munications network downtime. Scheduled maintenance
represents the single largest contributor to network
downtime and human errors are another major cause of
downtime. In the microwave network, path outages due
to rain, anomalous radio propagation, and other severe
conditions are other important contributors to over-all
unavailability of the network.
The "Five nines," term is used to describe the piece of
hardware working reliably 99.999 percent of the time
(statistically, about five minutes of downtime per year),
used widely in the legacy TDM networks, may not be
sufficient quality matrix in the world of IP/Ethernet. The
“five nines” requirement, correctly or incorrectly, has
been applied to almost everything – from the telecom-
munications equipment to microwave paths, fiber-optic
links, and sometimes even all-inclusive end-to-end link.
When talking about availability it is a good idea to
define what exactly these “five nines” include.
Unfortunately, to make things more complex, “five
nines” will mean different thing to different people and
could be a topic for a whole new article.
In North America, it is quite common to sometimes
arbitrarily network designers assign the same require-
ment of 99.999 percent of time availability to the
microwave path (regardless of its length, capacity
and/or importance) and a guarantee of Bit Error Rate
(BER) better than 10-3 (or even 10-6) during that peri-
od. In many cases, designers neglect an actual quality of
the link due to increased BER and focus only on the
availability; the fact that the microwave link (or any
other network connection) is available still does not
mean that the link (and therefore the entire network) is
working properly.
Requirement for the availability of the microwave
link carrying IP/Ethernet traffic is still under considera-
tion but at the moment most wireless operators in North
America are still using usual “five nines” requirement
per link while utilities are still typically using “five
nines” end-to-end. These days more attention is being
placed not only on availability but also performance of
the link during the available time. Millisecond jitter and
latency requirements as well as the committed through-
put are some of the challenges facing transport networks
based on Ethernet technology.
August/September 2008 Remote Site & Equipment Management 23www.RemoteMagazine.com
FeatureNETWORKING
Figure 3: Typical Split Configuration MW Radio
Please see Communication continued on page 37
24 Remote Site & Equipment Management August/September 2008
FeatureNETWORKING
www.RemoteMagazine.com
Brian Tucker, SVP Global Product Management Telit Wireless Solutions, Inc.
Machine-to-machine (M2M) communications tech-
nology is increasingly common worldwide in a wide
variety of vertical markets. The worldwide M2M market
will grow from $20 billion today to more than $220 bil-
lion by 2010, predicts IDATE, a market research firm.
That outlook is based on strong adoption over the past
few years: Between 2005 and 2006, M2M module rev-
enues grew 34 percent, from $621 million to $830 mil-
lion, according to Gartner.
The projected annual growth rate of nearly 50 percent
through 2012 is due to M2M’s strong business case. By
enabling machines to communicate wirelessly with one
another or with a central control unit, enterprises are
streamlining their business practices. That translates into
a significant reduction in overhead costs and new rev-
enue opportunities.
A prime example is utilities, one of the first industries
to deploy M2M for applications such as automated meter
reading (AMR).
“The utility industry is a prime example of how, by
networking and remotely monitoring machines, data can
be analyzed and collective behavior understood in new
ways,” Juniper Research concluded in a 2007 report.
“For example, a real-time, unified view of how power is
used will help safeguard this increasingly rare resource.
And what can be measured can be controlled and ulti-
mately optimized.”
The Juniper report cites an Italian utility that increased
revenue by $1 billion after deploying AMR across 6 mil-
lion electric meters. That success prompted the company
to expand its AMR infrastructure to 30 million meters.
“Similar cost and benefit patterns are expected across the
whole of the wireless AMR segment,” Juniper wrote.
Despite these benefits, M2M also faces several chal-
lenges in terms of maintaining the technology and pro-
tecting the investment. These include:
• The Rapid Pace at Which Cellular Technology is
Constantly Evolving
For example, although many wireless carriers are in
the midst of deploying third-generation (3G) technolo-
gies such as High-Speed Downlink Packet Access
(HSDPA), they’re already preparing to launch fourth-
generation technologies such as Long Term Evolution
(LTE) and WiMAX – in some cases, as early as 2009.
• New Regulatory Requirements
For example, some European governments recently
required utilities to have the ability to control energy
usage in individual homes. If a utility doesn’t have an
M2M system flexible enough to meet those mandates, it
could have to physically replace all of its AMR devices
with compliant ones – an expensive, time-consuming
project. Even without government mandates, enterprises
often want to add capabilities, another reason why flexi-
bility is key.
• Patching Software and Firmware
AMR and automotive/trucking are two examples of
M2M applications where modules typically are deployed
for five to 18 years.
Sending an employee to physically update or replace an
M2M device in the field or recalling vehicles to the deal-
ership for software updates generates significant expense.
Putting off ObsolescenceTo maximize the lifetime value of its M2M devices,
enterprises are increasingly seeking solutions that sup-
port firmware over-the-air (FOTA) remote updating.
This feature lets enterprises quickly respond to network
changes and mandates, software updates and applica-
tion changes.
With FOTA, the mean time between failures (MTBF)
value can be optimized for integrated M2M modules, as
well as for all of the subsystems used in the application.
This design reduces the M2M application’s maintenance
costs, which in turn has a positive impact on the applica-
tion’s overall running costs. In the future, FOTA will be
able to update both the module software and the M2M
application’s device software, increasing the application
flexibility, utility and profitability.
But not all FOTA solutions are created alike. The ideal
solution should update modules using the smallest possi-
ble file size in order to minimize network data charges
and enable faster remote updates. For example, the Telit
Firmware Update Service – co-developed by Telit
Wireless Solutions, Inc., and Red Bend Software – uses
file sizes typically less than 100 kb. That’s roughly 5 to
10 percent of the original firmware file size, reducing net
usage costs by up to 95 percent.
The ideal FOTA solution also should be 100 percent
fail-safe, even if power is lost to the module during the
update process. Without this fail-safe feature, a device
could remain non-functioning until the application could
be physically reached and updated, replaced or repaired
by a technician, which would negate the business case for
deploying over-the-air updates.
All of these features produce a FOTA solution that is
always predictable and repeatable, with no limits on the
number of updates. It’s important to note that although
FOTA is a relatively new option in M2M, it’s been
widely used in the handset industry for several years. In
second quarter 2007, roughly one-third of all mobile
phones sold were FOTA-compatible, according to
Ovum, an independent research firm. That adoption
helps provide peace of mind for enterprises considering
FOTA M2M because it means that FOTA is a mature,
widely used technology.
To understand the benefits of FOTA, it helps to look at
how it’s used today in verticals such as OEM automotive,
utilities and data synchronization.
OEM AutomotiveAutomotive manufacturing is an excellent example of
an industry that will significantly benefit from the
implementation of M2M technology with FOTA
capabilities. Currently, vehicles are generally
designed for a lifetime of 10 years or 150,000
miles. FOTA helps ensure that the M2M module
can remain in service as long as the vehicle does.
A significant amount of a vehicle’s actual cost is
related to electronic components. This cost can
increase further because many expensive vehicle
recalls are related to electronic components.
When vehicles are recalled to the dealership for
software updates, this generates an enormous
expense for auto manufacturers. Not only does it
entail the costly maintenance on thousands of vehi-
cles, but it also involves expensive human interac-
tion at the dealership. Every time the vehicle needs
servicing for M2M application software upgrades
or changes in cellular networks, it requires a visit
to the dealership. That’s a hassle for vehicle own-
ers, and it can drive additional costs for the dealer-
ship if, for example, it has to maintain a fleet of
loaner vehicles or shuttles to minimize customer
inconvenience while service is performed.
By utilizing FOTA, auto manufacturers can dras-
tically cut back on vehicle recalls by simply
upgrading or solving software defects remotely.
Meanwhile, OEMs can remotely track and run
diagnostics on vehicles, often recognizing and
remotely solving electronic component problems in
Maximizing the Lifetime Value of M2M Wireless Devices
Figure 1: Illustration of the key components of a FOTA solution
August/September 2008 Remote Site & Equipment Management 25www.RemoteMagazine.com
FeatureNETWORKING
the vehicle even before the consumer notices trouble.
Once the problem is recognized, the auto manufacturer
can make necessary changes on the assembly line prior to
deploying more potentially faulty components. Besides
saving money on recalls, avoiding those problems also
protects the vehicle manufacturer’s brand reputation and
market perception.
In addition to significantly reducing recall costs,
FOTA also lowers warranty costs and extends the life-
time of the vehicle. At the same time, FOTA can quickly
reprogram the M2M application to almost immediately
adjust to changes on the cellular network.
Networks throughout the world vary greatly with
respect to their configurations. While GSM is a global
standard, there are thousands of parameters with-
in any given network setup that are configured
by the network operator. These parameters
include such items as timeouts and registration
intervals. While interoperability testing greatly
improves the chances of a device operating cor-
rectly in a given network, there are no assur-
ances. Some network operators require certifica-
tion of the device on their network, but even this
level of testing is only valid for the current con-
figuration. Should a network operator change
settings, existing devices in the field may begin
to experience problems that were not apparent
when the device was validated. FOTA can help
to resolve these issues by updating the firmware
to a compatible configuration.
Utilities and MeteringMuch like the automotive industry, the utilities
and metering sector stands to benefit from signif-
icant cost savings by implementing M2M tech-
nology with FOTA capabilities. M2M enables
AMR to transmit utility usage data via cellular
networks at regular intervals. By implementing
an M2M application, this eliminates the need for
human meter readers, a significant cost savings.
Those savings are one of the reasons why M2M
deployments in the electric, water and gas indus-
tries will have a compound annual growth rate of
24 percent through 2013, according to a
December 2007 report by ABI Research.
FOTA enables quick response to a growing phe-
nomenon in the utilities and metering sector: gov-
ernment legislation. Recently, some European
governments mandated that utility companies have
the ability to control energy usage in individual
homes. Instead of physically replacing all meters
with technology programmed to meet the govern-
ment’s mandate, companies using FOTA-enabled
M2M devices would simply send an over-the-air
update to meters upgrading the application.
By implementing a FOTA-enabled M2M
device, companies also can upgrade a meter to
track and control energy usage as precise as an
individual appliance in a user’s home. Utilities
can then educate their customers about energy
and cost saving opportunities by sharing that
detailed usage information.
Data SynchronizationA relatively new concept that is taking off at
an incredible rate, data synchronization is a
function that is primarily a result of FOTA
capabilities. M2M enables cellular phones,
computers, MP3 players and other devices to
communicate with one another via a combina-
tion of cellular, Bluetooth, Wi-Fi and ZigBee
technologies. With the addition of FOTA capa-
bilities, devices can automatically synchronize
data when prompted.
FOTA not only enables quick over-the-air
updates, it also updates the differences between the two
devices. That approach significantly reduces airtime
costs and time spent downloading. In the process,
FOTA also frees up network capacity for revenue-gen-
erating applications, instead of using it for mundane
tasks such as synchronization.
Flexibility for the FutureFOTA provides an excellent solution for implement-
ing, maintaining and updating M2M devices in the field,
as well as maximizing their useful lives. FOTA protects
the enterprise’s M2M investment by giving it a graceful,
cost-effective way to adapt quickly to changes in net-
work configurations and software upgrades implemented
by the wireless carrier.
FOTA is particularly valuable for M2M applications that
involve devices and assets that are constantly moving or are
located in remote locations, such as shipping containers,
trucks and utility meters. For those applications, FOTA
helps preserve the business case for deploying M2M by
minimizing the cost of upgrading modules in the field.
Telit is a global wireless technology company. Itdevelops, manufactures and markets GSM/GPRS,UMTS/ HSDPA and CDMA/EVDO enterprise communi-cation modules for machine-to-machine (m2m) applica-tions. For more information about the company, pleasevisit www.telit.com.
26 Remote Site & Equipment Management August/September 2008
Products & ServicesONSITE POWER
www.RemoteMagazine.com
FMP25.48 Rectifiers Save EnergyDeliver 25 kW Per Rack Unit forNetwork Power Applications
Power-One, Inc. has introduced the FMP25.48 rectifi-
er. This energy-saving 2,500 watt, -48 V product delivers
efficiencies exceeding 92 percent and power densities
surpassing 27 watts/cubic inch, while enabling 25 kW of
power in a one rack-unit 23 inch shelf. A wide variety of
distribution options are available to enhance flexibility
when powering site-level communications applications
such as wireless base stations, remote switches and
broadband access.
Additional features include a wide-range 90 to 300
VAC input, high-input-voltage shutdown and the ability
to withstand a loss
of phase or neutral
without damage.
Advanced reso-
nant soft-switch-
ing topology sig-
nificantly reduces
rectifier compo-
nent stresses to increase reliability. The FMP25.48 uti-
lizes a compact 4.2 by 13.2 by 1.6 inch package.
This rugged product is earthquake rated to GR 63 Core
Zone 4 and exceeds EN61000-4-5 surge immunity.
Safety agency approvals include EN 60950, UL 1950 and
IEC60950, and CSA C22-2 No. 950.
The PMP25.48 is compatible with Power-One’s
Guardian series of DC power solutions, which
includes rack and cabinet systems that can deliver up
to 500 amps with up to 720 Ah of backup battery capa-
bility. Medium and large power requirements are also
supported with 1,200 A per bay, up to 6,400 A.
GE Energy Releases New OpFlexExtended Turndown for 9FA+eGas Turbines
Citing the need in the power industry for additional
operational flexibility, GE Energy has introduced
OpFlex Extended Turndown, which enables customers
to operate their 9FA+e gas turbines with additional
turndown without jeopardizing performance, reliabili-
ty or emissions.
OpFlex Extended Turndown extends the reduced-
emissions operating range to lower load levels by
increasing gas turbine turndown capability. Currently,
the typical turndown minimum for the 9FA+e gas tur-
bine equipped with the DLN 2.6+ combustion system is
40 percent load at ISO conditions. OpFlex Extended
Turndown is targeted to provide a minimum of 5 percent
additional turndown. By reducing the turndown to 35
percent load, customers are able to reduce the amount of
fuel consumed during off-peak hours and avoid shut-
down and start-up costs, as well as minimize mainte-
nance requirements associated with shut-downs.
OpFlex Extended Turndown builds upon decades of
GE expertise and experience in the area of combustion
technology. This software solution optimizes the com-
bustion process and enables power generators to reduce
fuel costs significantly. CO2 emissions associated with
low-load operation are also reduced, while maintaining
low NOx and CO emission levels.
“OpFlex Extended Turndown is an exciting new
development that will provide our customers with addi-
tional flexibility to meet the challenges of maximizing
operational revenues while minimizing operational
costs,” said Dan Heintzelman, president of GE Energy’s
services business.
New Robust and Compact PowerConverter for Critical Applications
Schaefer, Inc. has intro-
duced the C4700 series of
2,500 Watt DC/DC converter,
AC/DC power supply and
battery charging products.
The series’ robust design,
using industrial grade com-
ponents, yields an efficient,
space-saving solution for
extreme environments in
industries such as controls
and communications equip-
ment, military applications,
alternative energy applica-
tions, transportation and process control systems.
The C4700 series features an extensive lineup of over
200 standard models, with requests for modifications
also welcomed. Nine standard DC input voltage options
span a range from 10 VDC to 800 VDC. AC input mod-
MIT engineers have improved the power output of one type of fuel cell by more
than 50 percent through technology that could help these environmentally friendly
energy storage devices find a much broader market. The new material key to the work
is also considerably less expensive than its conventional indus-
trial counterpart, among other advantages.
“Our goal is to replace traditional fuel-cell membranes
with these cost-effective, highly tunable and better-perform-
ing materials,” said Paula T. Hammond, Bayer Professor of
Chemical Engineering and leader of the research team. She
noted that the new material also has potential for use in other
electrochemical systems such as batteries.
Like a battery, a fuel cell has three principal parts, two
electrodes (a cathode and anode) separated by an electrolyte.
Chemical reactions at the electrodes produce an electronic
current that can be made to flow through an appliance con-
nected to the battery or fuel cell. What is the principal dif-
ference between the two? Fuel cells get their energy from an
external source of hydrogen fuel, while conventional batteries
draw from a finite source in a contained system.
The MIT team focused on direct methanol fuel cells (DMFCs), in which the
methanol is directly used as the fuel and reforming of alcohol down to hydrogen is not
required. Such a fuel cell is attractive because the only waste products are water and
carbon dioxide (the latter produced in small quantities). Also, because methanol is a
liquid, it is easier to store and transport than hydrogen gas, and is safer as it won't
explode. Methanol also has a high energy density-a little goes a long way, making it
especially interesting for portable devices.
The DMFCs currently on the market, however, have limitations. For example, the
material currently used for the electrolyte sandwiched between the electrodes is
expensive. Even more important, that material (known as Nafion) is permeable to
methanol, allowing some of the fuel to seep across the center of the fuel cell. Among
other disadvantages, this wastes fuel-and lowers the efficiency
of the cell because the fuel isn't available for the reactions
that generate electricity.
Using a relatively new technique known as layer-by-
layer assembly, the MIT researchers created an alternative
to Nafion.
“We were able to tune the structure of our film a few
nanometers at a time,” said Hammond. “This got around
some of the problems associated with other approaches. The
result is a thin film that is two orders of magnitude less per-
meable to methanol but compares favorably to Nafion in
proton conductivity.”
To test their creation, the engineers coated a Nafion mem-
brane with the new film and incorporated the whole into a
direct methanol fuel cell. The result was an increase in power
output of more than 50 percent.
The team is now exploring whether the new film could be used by itself, com-
pletely replacing Nafion. To that end, they have been generating thin films that stand
alone, with a consistency much like plastic wrap.
Interested in Direct Methanol Fuel Cells for Remote Power Applications?
If so then you should attend Smart Fuel Cells Remote 2008 Conference Session:
The New Alternative: Direct Methanol Fuel Cells for Remote Powerwww.RemoteExpo.com
MIT Creates New Material for Fuel Cells
Products & ServicesONSITE POWER
August/September 2008 Remote Site & Equipment Management 27www.RemoteMagazine.com
els offer either 1-Phase or 3-Phase options as well as bat-
tery charging models. Single outputs are available in 12
standard ranges encompassing 4.5 VDC to 400 VDC. All
outputs are adjustable and fully regulated to 0.2 percent
or better (load) and 0.1 percent (line). DC/DC and
AC/DC models have remote sense capability, while effi-
ciencies are up to 95 percent. Operating temperature is -
20°C to 75°C, with -40°C to 75°C as an option.
The units are packaged in a space saving 6U by 19
inch by 306 mm rack module, a wall mount module, or a
newly introduced chassis mount configuration. Options
include decoupling diodes for parallel / redundant opera-
tion, further mechanical ruggedization, inhibit, Power
Fail / DC-OK alarms, system reset and program-
ming/monitoring functions.
Tripp Lite Introduces 8 kVASmartOnline UPS Systems withCorded Input
Tripp Lite has introduced two new 8 kVA SmartOnline
hot-swappable modular UPS systems named model
SU8000RT3UN50 and
SU8000RT3UN50TF.
The new models
include a convenient
corded input that elimi-
nates the need for an
electrician to install the
UPS via hardwire con-
nection. Model SU8000RT3UN50 features 200-240 V
input/output and model SU8000RT3UN50TF includes a
transformer module for additional 120 V output. Both
units include a 50 amp Hubbell twist-lock plug and
heavy-duty input power cord.
SmartOnline hot swappable modular UPS systems
have been designed from the ground up for the needs of
enterprise business customers. Tripp Lite's hot-swap-
pable design eliminates power-related downtime and
ensures maximum power availability. End users can per-
form all potential UPS maintenance, including complete
power module exchange, without powering down con-
nected equipment. Additional features include expand-
able runtime, cost-reducing user-service options, flexible
outlet configurations, remote management capability and
N+1 configurability for efficient fault tolerance.
Cellwatch.net Provides EmailOptions for Battery Monitoring
Cellwatch.net is now available to extend the
functionality of Cellwatch battery monitoring
systems by providing email alarm routing and a
web-based resource for disaster recovery and
uptime monitoring. Cellwatch is a permanently
wired battery monitoring system that warns users
of failing or degrading batteries in critical power
applications, such as a UPS. It can also alert
users of potential problems caused by a UPS,
such as overcharging batteries and causing poten-
tially harmful thermal conditions. Cellwatch
alarms and reports are typically routed to a dedi-
cated PC, but now Cellwatch.net adds the dimen-
sion of multiple email routings to widely dis-
persed personnel.
Cellwatch.net is a two part application, involv-
ing a dedicated program running on the
Cellwatch PC and a secure remote web site. The
Cellwatch.net web site provides users with email
routing options, five different alarm functions, a
complete alarm log for each site, a site heartbeat
monitor, complete data files and mapping. The
email function sends daily emails to specified
users with updated battery reports. Email routing
options allow alarm and heartbeat reports to be
sent to different people, or multiple people. The heartbeat
monitor notifies users if a battery monitoring system is
not reporting, so facility management can be alerted to
check the status.
By accessing the Cellwatch.net web site, users can
select from five different alarm functions (voltage, ohmic
value, temperature, discharge and system off-line), view
a complete alarm log and access the data restore facility,
which contains all files for discharge data, current and
temperature. The mapping facility provides a visual dis-
play of site locations, color coded to show system status.
Powerware BladeUPS MaintenanceBypass Cabinet Integrates ThreeFunctions In One Unit
Eaton Corp. has made avail-
able the new Powerware
BladeUPS maintenance bypass
cabinet (MBC). Information
technology (IT) and facilities
managers can now integrate
power transformation, power dis-
tribution and maintenance bypass
into a single cabinet.
The MBC complements a 60
kVA Powerware BladeUPS par-
allel system, an energy effi-
cient, rack-based uninterrupt-
ible power system (UPS)
designed and optimized for
high-powered blade servers and
high-density computing envi-
ronments. This three-in-one cabinet is designed to
allow the transfer of power to full system bypass to
perform service, testing and maintenance on up to a
full rack of Powerware BladeUPS without interrupting
power to the critical load.
The integral maintenance bypass is a mechanical way
to bypass the internal components of the UPS while still
sending utility power to the load. If the UPS must be
repaired internally, it can be completely isolated from
utility power and a technician can safely perform service
without voltage present.
The MBC uses a TP-1 transformer, which meets the
US Department of Energy standard for the Energy Star
program, to step down utility power from 480 V to
208/120 V to provide electrical isolation and appropriate
input voltage for Powerware BladeUPS modules. With
high efficiency, even at low loads, the TP-1 transformer
yields significant savings in utility costs.
Cummins Provides Backup PowerSystems for Critical Facilities
Cummins Power Generation now offers closed-transi-
tion bypass switches from 150 to 4,000 amps for critical
locations and facilities. Cummins' BTPC bypass switch-
es offer redundant power transfer capability for situations
where even a brief power interruption can have serious
consequences. The closed-transition BTPC switch auto-
matically transfers loads between two live sources (utili-
ty and backup) without interruption.
The BTPC consists of a rail-mounted, removable auto-
matic transfer switch (ATS) and a fixed, manually oper-
ated bypass switch. Before the ATS is pulled out for
repair or maintenance, the load power is diverted to the
bypass switch. By having the bypass switch activated
before the ATS is disconnected, the power supply contin-
ues without interruption. After the bypass switch is
engaged, the ATS can be placed in one of three positions:
connected (normal), test (powered but offline) and isolat-
ed (disconnected).
BTPC switches from Cummins Power Generation are
UL listed, having passed the tests required by UL 1008,
the strict standard for emergency, legally required and
standby applications. Safety features include closed-
door ATS isolation to protect against arc flash, and shut-
ters to protect the stationary bypass terminals during
removal. BTPC switches use field-configurable
PowerCommand microprocessor-based controllers fea-
turing easy-to-use push-button controls for activating
testing, programming timing delays and setting the exer-
cise clock. Flash memory retains settings, even if the
switch loses power. LED indicators provide at-a-glance
system status, and a digital display provides status infor-
mation on other ATS equipment in the facility. In a fully
integrated Cummins system, the ATS controller also dis-
plays generator set status information.
28 Remote Site & Equipment Management August/September 2008
Products & ServicesSECURITY
www.RemoteMagazine.com
Extreme CCTV's EX36 IP DeliversNetworked Surveillance for Utilities
Extreme CCTV
has released the
EX36 IP camera,
combining perform-
ance optics, vandal-
resistant construction
and IP connectivity to
provide networked
surveillance for water
and energy sites.
EX36 IP features IP
infrared imaging (i3), which utilizes infrared illumination
to deliver high quality images day and night, integrating
with IP networks.
Low-noise images produce lower bandwidth than
standard IP cameras, helping ensure properly functioning
networks and real-time, instantaneous transmittal of crit-
ical surveillance video for improved response to security
breaches. EX36 IP incorporates a 45° tilt for vandal-
resistant monitoring of an entire room including the area
directly below the camera, while 940 nm infrared illumi-
nation enables covert night-time imaging.
New Add-On Universal Lock forHandwheel Valves
Dutch industrial
safety and valve con-
trol company
Netherlocks is
launching the SHL,
their new Smart Hand
wheel lock. The key
transfer lock can be
fitted easily like a
simple lock-out
device to any size or
type of hand wheel
operated valve. No
valve details, extra
parts or customized adaptors are needed, and it locks the
wheel into pre-set, safe positions controlled by the inter-
locking key release mechanism.
Traditionally, valve locks have depended on the precise
specification of each valve in order to be fitted effective-
ly. Detailed valve information would need to be collected
and used to fashion the mountings for the lock. The
unique design of this product means that it can be added
onto any existing hand wheel-operated valve to mechani-
cally secure it, without the need for such information.
The SHL attaches onto the valve stem underneath the
wheel without replacing or altering any part of the valve
assembly. No specially machined parts are needed, and the
innovative design that attaches the lock to the hand wheel
still leaves space to grip it. This makes it much easier to
simply, securely and safely provide interlocking for hand
wheel valves: no specific valve information is required, no
machined adaptors or mounting brackets are needed and
the lock can be fitted whilst the valve is still operational.
Interlocks minimized the danger caused by the poten-
tial for human error, as they prevent the valve from being
operated until it is safe to do so. The coded key to unlock
the valve is only released for use once the correct
sequence of precautions has been completed, with each
stage of the process enabled only once the previous one
is finished. This physically prevents accidental and
potentially dangerous actions from being performed,
negating the risk of human error.
OxBlue Releases Solar WebcamsOxBlue is now offering a line of professional grade
solar ready construction webcams and rugged solar power
stations to run them. The units provide the same high-def-
inition image capabilities of the OxBlue cameras and are
backed by OxBlue's comprehensive customer care.
The solar offering has been designed for remote sites
and simple installation. The solar power stations provide
digital readouts on system status and performance. They
are comprised of battery banks managed by an automated
charge controller system. The unit is housed in a pole-
mountable, lockable aluminum enclosure, with lightning
protection and circuit-breakers for both the solar array and
battery banks. Both the solar-ready camera and power sta-
tion are designed for easy client-installation, requiring
minimal setup.
While solar and green-friendly solutions have been
desired across the industry, the
accelerating demand resulted in
OxBlue's decision to begin pro-
duction of a standardized solar-
ready webcam solution.
"We've seen an increase in cus-
tomer demand for solar systems,
in tandem with an ever-increasing
use of security cameras, said
Chandler McCormack, CEO,
OxBlue. “We felt that it was time
to develop a truly integrated
solar-ready camera solution.”
“By redesigning the internal
power components of the system
and working with a team of expe-
rienced solar engineers, the solar-ready cameras can
afford an 80 percent drop in energy consumption allow-
ing for a power solution with five-plus days of solar
autonomy,” said McCormack. “We wanted to standardize
the system, to take the guess-work out of solar perform-
ance, reliability and pricing."
Secure Asset Management nowAvailable for Tofino Security Users
MTL Instruments has released a new loadable securi-
ty module (LSM) for its Tofino industrial security solu-
tion that discovers and identifies what devices are on the
network and creates the firewall rules to control the traf-
fic flowing to them, all without risk to the industrial
process. This latest LSM, known as the Tofino secure
asset management module, locates devices and generates
rules simply by analyzing the traffic on the network.
This innovation is a first in the industrial security
world and possibly also in the IT security market. Asset
management tools in the IT world have been available for
over a decade, but all are based on the principle of send-
ing probing messages onto the network to discover what
is deployed. Unfortunately for industrial users, there have
been many documented cases where these discovery
messages have caused SCADA and process control sys-
tems to crash.
As a result, many major energy and manufacturing
companies have banned the use of IT-style asset tools
on industrial networks, leaving control engi-
neers without any techniques to determine what
is actually connected to their network at any
given moment.
With the release of the Tofino secure asset
management module, engineers now have a safe
and secure means of locating what is on their con-
trol system networks. Designed specifically for
industrial control operations in critical industries
such as oil and gas, manufacturing, utilities and
power generation, the Tofino never probes the
control devices. Instead, it quietly listens for traf-
fic and then uses special characterization tech-
niques to determine the types of control devices
on the network. When it discovers a new device,
it prompts the system administrator to either
accept its deductions and insert the new device
into the network inventory diagram, or flag the
device as a potential intruder. This way, an up-to-
August/September 2008 Remote Site & Equipment Management 29www.RemoteMagazine.com
Products & ServicesSECURITY
the-minute network map is always available to the con-
trol engineer.
“Passive scanning techniques have been discussed in
academic literature or released in open source projects
before, but as far as we are aware, this may be the first
successful commercial application of the technology in
the world, said Eric Byres, CTO at Byres Security Inc.”
The secure asset management module doesn’t rest on
its laurels once it discovers everything on the network. It
also guides the user through creating appropriate fire-
wall rules to allow or block messages, based on what it
has learned about the network traffic. Technical com-
plexities such as IP addressing and TCP/UDP port num-
bers are managed behind the scenes, making the normal-
ly byzantine art of firewall configuration easy for the
controls professional.
The new module is receiving very positive reviews
from the security professionals who have seen the pre-
release version. Charles Payne of Adventium Labs, a
noted firewall expert who has lead numerous US Navy
security projects, said "Tofino's novel context-sensitive
approach ensures appropriate security policies for each
protected device. The new automatic asset discovery and
automatic rule generation will ensure that nothing is
missed. These capabilities are critical for creating
informed security policy in the industrial world."
“The Asset Management module is a key step in our
Tofino Intrinsically Secure strategy”, said Byres. “Our
goal is to make security understandable for control engi-
neers, so that they can focus on keeping their process run-
ning safely and efficiently.”
New High Resolution CameraFeatures AL1 Lens for Picture Quality
VISIONtech has introduced its 6 mm AL1 IR bullet
camera that can see up to 100 feet at 0.0 LUX and fea-
tures 1/3 inch Sony Color 420 TVL Day/Night
CCD technology. Additionally, the AL1 lens pro-
vides added picture quality in any light situation.
Fully weatherproof, this camera is designed for
rugged environments. Its size and strong metal
structure offer easy installation and make it suit-
able for a wide variety of professional applications.
videoNEXT Launches ThreeNew Products
videoNEXT has introduced its v-MX video
wall solution, the v-IQ and its v-AC. All three
units are designed to help professionals manage
their security solutions.
The v-MX is a new virtual-multiplexing dis-
play system that enables videoNEXT's Security
Knowledge Manager (SKM) users to display live
and archived video and command and control
data to an infinite number of displays in their
command center.
Adding v-MX to an SKM installation enables
video wall and multiplexing functionality in a
pure IP-based environment. v-MX can scale to
route and display live video directly from any
number of cameras to a limitless number of video
wall configurations. Whether an organization
needs a dual monitor terminal or a massive, multi-
display command center video wall for hundreds
of cameras and monitors, v-MX is a value-rich
solution both techni-
cally and fiscally.
v i d e o N E X T ' s
SKM is an open, stan-
dards-based software
solution that works
with almost any IP,
digital or analog cam-
era, runs on any Intel
or compatible server
and uses an organiza-
tion's existing security and data infrastructure in new and
powerful ways. It provides an easy and scalable IP sur-
veillance and security solution. Combining this with full
policy-level administration and a flexible high availabil-
ity Storage Volume Manager - organizations now have a
highly capable, powerful, scalable and easy-to-use sur-
veillance and security tool.
videoNEXT’s new video analytics solution, v-IQ, is
designed to accurately mine and evaluate critical events
amidst a massive amount of video data. The v-IQ was
developed as a result of years of research and develop-
ment (R&D) and partnerships with leading universities,
computer vision scientists and an exclusive cooperative
R&D initiative with the US Army Research Lab.
videoNEXT has broken down the video analytic
dilemma into two components. The first is the actual
object tracking, down via advanced ground subtraction
algorithms to isolate objects from the background. The
second is the logic used to determine what the object is
doing. Applying this two-step method allows
videoNEXT to easily tailor its advanced video algorithms
for use in a multitude of environments. These v-IQ mod-
ules can be applied in real-time or in a forensic search to
recognize many behaviors, such as abandoned objects,
velocity and count of objects, access control tailgating,
directional violations, zone of protection violation and
camera-to-camera object hand off.
"Surveillance video technology is a valuable physical
security method for facilities, however, it is the ability to
analyze these videos that provides the real value to an
organization," said David Marra, chief technology officer,
videoNEXT. "Our v-IQ solution offers advanced analyti-
cal capabilities to enable users of our Security Knowledge
Manager (SKM) solution to easily detect and prevent
potential events or to review video for forensic purposes."
The third and final new product is videoNEXT’s access
control solution, v-AC. This addition to the videoNEXT
family of IP video and physical security information man-
agement products provides a framework for the integra-
tion of both legacy and new IP-enabled access control
systems with the company's Security Knowledge
Manager (SKM) command and control center.
v-AC provides a single command and control appli-
cation to monitor video and associated access control
alarms in real-time by visually interrogating access con-
trol alarms and automatically seeing the video from the
access points in question. It integrates with many legacy
systems, including SoftwareHouse and Lenel, and offers
door control functionality within the SKM command and
control display.
The videoNEXT v-AC solution also provides forensic
search capabilities for visual card holder interrogation.
If an employee unknowingly lost their access control
card, for example, and there had been a string of thefts
at the facility, the security team could use the v-AC solu-
tion to access the video that is correlated to the lost card
and see who is using the card during the time period
when the theft occurred. This feature of v-AC is a fre-
quently requested functionality by SKM users in all
types of industries.
Check out Remote 2008 Conference and Expo’s
New Security Session Track Online at:
www.remotemagazine.com/rem08_program.php
videoNext’s v-MX solution
videoNext’s SKM software solution
www.RemoteMagazine.com
Todd Nicholson, Chief Marketing Officer Industrial Defender
Our nation’s resources, as well as our interconnected
global economy, depend on the security of our critical
infrastructure systems, which include the power, oil and
gas, transportation, water and chemical industries. And
yet, despite the grave potential social and economic con-
sequences of a critical infrastructure security breach,
these systems face growing risk from cyber security
threats that are doubling each year.
Why? The need for real-time business intelligence has
spurred changes in the critical infrastructure environment
that, while resulting in increased convenience, have also
increased cyber security risk.
Remote sites present a unique security challenge in
that they are often in relatively isolated locations, and
therefore not readily accessible as they are frequently
unattended and remotely operated. In addition, many
remote sites use legacy equipment (intelligent electronic
devices, meters, etc.) that support aging protocols, and
may be accessible only via dial-up telephony. Further,
these devices were first and foremost designed with pro-
duction and operational resiliency as top priorities and
security second.
Security of Legacy SystemsTraditionally, the security of legacy industrial control
and Supervisory Control and Data Acquisition (SCADA)
systems was inherent in their forced separation. By “air
gapping” the systems, the plant environment was pur-
posely disconnected from the enterprise, creating an
island of protection for mission-critical equipment.
Industrial control and SCADA systems were typically
used by the control automation experts in the plant or fac-
tory; management interested in obtaining data from this
environment had to pick up the phone or read the infor-
mation from a hard copy report. This has all changed due
to increased global competition as well as regulatory
compliance requirements which have driven the need for
real-time industrial control system data to enable timely
strategic business decisions.
Today, critical business data and information extracted
from the industrial control system environment is being
used to maximize production lifecycles, profit margins
and the return on corporate assets.
Thus, the need for the convergence of both enter-
prise IT and industrial control system and SCADA
domains has emerged as both a necessary — and dan-
gerous — initiative in terms of cyber security protec-
tion. In order to effectively protect a critical infra-
structure network, developing a comprehensive
defense-in-depth security strategy in no longer an
option, but rather a critical requirement.
Performance Challenges and the IncreasedUse of Remote Access Methods
It is essential that the plant environment is both reli-
able and accessible. Without exception, plants must
operate reliably 24x7x365. Remote access methods
including virtual private networks (VPN), dial-up tech-
nology and terminal servers enable flexible remote
access to be more conveniently achieved.
Previously, when the majority of plants were pur-
posefully air-gapped, there was no real need to pro-
vide remote access capability to support the plant net-
work. Today, with an increase in resource constraints
of plant operations staff and a shortage of qualified
industrial control system and SCADA expertise, some
plant employees (and even in some cases vendor per-
sonnel) are routinely allowed to remotely access the
plant network. With this increased convenience and
emphasis upon increased productivity undoubtedly
comes the increased threat of a major cyber security
breach or incident.
The requirement, then, is for a method of securing cen-
tral and remote plant systems while providing convenient
access to approved personnel. Current security best prac-
tices require active, real-time detection of suspicious
activity, from within or outside the facility, powerful
tools for management of user privileges and port access,
comprehensive logging and reporting features and ongo-
ing software updates to ensure protection from the latest
malicious activity.
A Unified Security Strategy: Defense-in-Depth According to a 2005 study from the UK-based compa-
ny NTA Monitor, over 90 percent of remote access VPN
systems have exploitable security vulnerabilities due to a
lack of security best practices. Clearly, the need for a
secure remote access strategy is inherent in order to
effectively support any type of remote access to the plant
network. The solution? A comprehensive defense-in-
depth approach to cyber security effectively enables the
efficient protection of the industrial control and SCADA
plant network environment.
This approach begins with securing the perimeter of
the network, specifying who is allowed access to the
network, as well as the explicit user privileges granted
to each individual user. Further, using this approach
will provide end customers with the ability to maintain
full control of all critical network devices while main-
taining the option to outsource the security manage-
ment, monitoring and reporting of those devices to
experts with industrial control system and SCADA
cyber security experience.
This unique method provides customers with the flex-
ibility to augment their plant network staff and selective-
ly choose the level of plant network control that is
required depending on the customer comfort level, expe-
rience and resource availability.
Ideally, a comprehensive and fully unified defense-in-
depth approach would offer comprehensive secu-
rity protection via the following components:
• UTM / Firewall Perimeter Protection
A comprehensive defense-in-depth approach to
securing remote critical infrastructure sites begins
with perimeter security protection. A
UTM/firewall device is used for creating a
boundary of the control system network to form a
virtual electronic perimeter. A UTM / firewall
device can be used for firewall protection, virus
protection, Intrusion prevention, virtual private
networking, and pre-planned lockdown states.
• Security Event Management
A security event management appliance is used
for monitoring, control, alarm management,
analysis, storage and reporting of security and
performance information. In addition, historical
data is captured and used to generate trend
graphs, reports and other data analysis functions.
• Network Intrusion Detection System
A network intrusion detection system is a sen-
sor-based device which detects attacks, rogue sys-
tems and unauthorized traffic within your network
perimeter. The network sensor should also proac-
tively detect the addition of new computers to the
network, for example, a contractor plugging in a
30 Remote Site & Equipment Management August/September 2008
FeatureSECURITY
Securing Remote Site Access: A Defense-in-Depth Approach
FeatureSECURITY
August/September 2008 Remote Site & Equipment Management 31www.RemoteMagazine.com
laptop or a new connection to a wireless access point.
Since industrial control networks tend to be quite stable,
it is fairly simple to detect rogue devices being connected
with a NIDS sensor.
• Host Intrusion Detection System
Host intrusion detection sensors are miniature soft-
ware applications residing on control system computers
used to detect control application issues, internal or
external intrusions and misuse, as well as performance
bottlenecks on key servers and HMI's. Security sensors
are available for Unix, Windows or Linux operating sys-
tems. In addition to specific control applications, the
sensors report on platform-specific information such as
failed login attempts, password age, logged-in
user counts, event log activity and insertion of
removable media.
• Secure Remote Communications
An effective secure remote access solution
provides authorized users with transparent access
to remotely located devices, while also ensuring
that only individuals with appropriate credentials
are allowed access to the equipment, and proac-
tively blocking all other access attempts. All
activity at each point in the system must be
logged and collected at the central administrative
server, for inventory management, usage analy-
sis, fraud detection, etc., or to support regulatory
reporting requirements. Management software
tools should be provided for administration of
user rights (especially immediate revoking of
rights for problematic or former employees), spe-
cific port access for remote gateway devices, pro-
vision of certificates and password maintenance,
report generation, and providing software updates
to all system elements.
A decentralized architecture should be imple-
mented for maximum resiliency; a failure of one
element shouldn’t affect other parts of the system.
Most importantly, user access should always be
available, especially in critical conditions which
might require real-time configuration of remote
device settings. In addition, the system should be
designed to be protocol agnostic, supporting the
many legacy installations as well as modern con-
trol equipment.
Roaming technicians requiring access to
remote devices should be able to use their normal
communications/polling application without hin-
drance from excessive login routines or network
latency. In this scheme, they are required to occa-
sionally download time-based, port-specific
access credentials from the central host for access
to secured devices for a limited time.
A fundamental component of the remote
access system is the secure gateway or firewall
device (either dial-up or IP based depending on
the environment) which proactively blocks all
access unless from authorized users possessing
current security credentials and approved equip-
ment IDs. No device ports must ever be exposed
to the public network; rather they should pas-
sively “listen” for a predetermined signal, after
which a multipart handshake process will grant
port access.
ConclusionIn summary, it is important to develop a com-
prehensive defense-in-depth cyber risk protection
strategy for securing remote critical infrastructure
environments. With the rapid adoption of con-
verged corporate IT and critical infrastructure
plant networks in order to drive real time business
intelligence, the need for remote access capabili-
ty will continue to increase over time. Implementing a
defense-in-depth approach to cyber risk protection will
ensure the continuous reliability, availability, and securi-
ty of your industrial control system or SCADA network
as the needs of your company’s business evolve.
Todd Nicholsonis responsible for leading IndustrialDefender Inc.'s global marketing and product strategy..Todd brings over 16 years of experience in corporate andproduct marketing, product strategy, business develop-ment and sales working for emerging and mature tech-nology companies including Digital Equipment, EMC,IBM and InfiniSwitch. Todd joined Industrial Defenderfrom EMC, where he was responsible for directing prod-
uct marketing and product management for the compa-ny's grid and utility computing business unit. Todd holdsa B.S. in business administration from Nichols Collegewith a major in marketing.
Industrial Defender, Inc. offers a completely integratedDefense-in-Depth cyber security solution designed to pro-tect the industrial control system and SCADA environ-ment in a flexible and cost effective platform. Formerlyknown as Verano, Inc., Industrial Defender is a privatelyheld company with over 17 years of industrial control sys-tem and SCADA industry experience, and more than 6years of industrial cyber security experience. For moreinformation please visit: www.industrialdefender.com.
32 Remote Site & Equipment Management August/September 2008
FeatureSECURITY
www.RemoteMagazine.com
Jim White, VP, Infrastructure SecurityUniloc, Inc.
SCADA networks have become increasingly intercon-
nected both with each other and with enterprise informa-
tion technology infrastructures. The risks of unauthorized
access to and manipulation of these systems has become
unacceptably high. Because these networks are frequent-
ly central to critical infrastructure systems, federal regula-
tors have begun mandating cyber security requirements.
While these networks deliver significant operational
efficiencies and are pervasive throughout North America,
security of these systems is often less than optimal
because emphasis has been placed on performance, reli-
ability, and safety – leaving these networks prone to
attack. In order to assist industries in securing these envi-
ronments, the following is a list of ten guidelines for pro-
tecting these networks against attack.
Begin with Your Environment1. Start with a Risk Analysis
Determine what your exposure is to identified threats,
their consequences, cost of mitigation and risk tolerance.
Critical assets have many vulnerabilities, but not all carry
the same level of consequence if attacked. Develop a risk
profile will be used as the basis for the development of
policies and procedures as well as the deployment of
technologies. As new threats are identified, the risk
analysis can be updated to provide guidance for imple-
mentation of mitigation strategies
2. Build Policies and Procedures
Before the implementation of any technical solution,
there must be a comprehensive set of policies and proce-
dures that serve as guidance to operators, security per-
sonnel, vendors, contractors, maintenance personnel,
management and all others who could have access to or
contact with SCADA systems and their critical compo-
nents. Standards such ISO/IEC 27000 series, NIST 800-
53, NIST 800-82 and ISA 99 are good sources of both
management and technical controls that should form the
basis of a workable set of policies and procedures.
3. Integrate Training at the Core of Your Defenses
Too often the most overlooked area of security train-
ing is one of the most important components of a viable
security plan. Having the right technical policies, proce-
dures and infrastructure will be rendered useless without
personnel having the knowledge of how to properly use
them. Training should encompass all aspects of the secu-
rity plan including but not limited to basic security
awareness training, physical access policies; cyber access
policies, e-mail policies, proper handling of internal doc-
uments (both in electronic format and hardcopy), tele-
phone policies (how to avoid social engineering
attempts), hardware and software upgrade policies,
authentication/authorization policies and proper use of
associated technologies, remote access, vendor and con-
tractor policies and procedures.
Technical personnel should have additional training to
include network and communications infrastructure stan-
dards and restrictions for SCADA systems, the proper
use and addition of network/ communications compo-
nents including use and setup of perimeter security
devices and use of standard security applications/devices
(anti-virus, IDS/IPS, firewalls, VPNs, etc.) in a real-time
SCADA environment.
4. Make Security Policies Important as Safety Policies
Security breaches by internal personnel should have
similar consequences as a safety breach. There should be
low tolerance within the organization for security breach-
es of any asset but in particular critical assets such as
SCADA systems. Security breaches in this environment
can be the leading edge of a serious safety breach that
could lead to loss of life, bodily injury or other conse-
quences such as a detrimental impact to the environment
or local community.
Too often, organizations treat security, particularly
cyber security of critical assets, as something that must
be justified on an ROI basis or as something that would
be “nice to have.” The treatment of SCADA security as
an afterthought or add-on is a recipe for disaster. Security
must be an integral part of every purchase, implementa-
tion, upgrade, hire, and contractor and vendor decision as
it relates to the security of critical assets. Never forget,
the low level service worker that has physical access to
the site of a critical asset could be a very sophisticated
intruder in disguise.
5. Integrate Physical and Cyber Security
Physical access controls and surveillance technolo-
gies need to be an integral part of an overall cyber secu-
rity infrastructure. Once used in isolation and by differ-
ent functional groups, these functions are now based on
the same technologies used by other assets such as
SCADA systems. Just as SCADA has migrated to the
use of IP protocols and COTs technologies, access and
surveillance functions have moved in parallel. What the
“good guys” use for surveillance, the “bad guys” can
use for reconnaissance. As such, these technologies
need to be integrated into the overall cyber/critical
infrastructure architecture. Integrating these functional-
ities allows for a more coordinated approach to protect-
ing critical systems than the typical standalone
approach in use in most organizations.
An IP based camera has similar vulnerabilities to hack-
ing attempts as other remotely accessible assets. A cyber
breach of access control or surveillance assets can have
consequences beyond just a physical threat. The devices
that provide these functions should be protected in the
same manner as other cyber assets. Authenticated access
and authorization for use is just as important for these
devices as for the assets they are intended to protect.
Know Your Enemy, Better Yet, Know Your Friends 6. Create a “Trust” Zone
Isolate cyber assets from all except those
specifically authorized. Focus on methodologies
and technologies that authenticate and authorize
only those who are trusted and prohibits all others
by default. Device-based endpoint security
devices provide multi-functional capabilities to
implement secure perimeters and controlled
access through multi-faceted authentication.
7. Authentication Should be for Both Users
And Devices/Systems
Device/system “fingerprinting” provides the
first layer in creating a “cyber fortress” architec-
ture. A cyber fortress creates a trust perimeter for
both SCADA systems and access clients based on
the actual physical fingerprint authentication of
systems and devices. Users are still required to
authenticate to the machine/application through
password combination of “what you know (pass-
word)” with “what you have (hardware authenti-
cated device)” provides a simple but sophisticat-
ed two factor authentication methodology.
8. Ensure Role Based Access Control at the
Application and Device Level
Only those physically authenticated systems
and clients are allowed to communicate across an
encrypted communications channel. All applica-
tions should use Role Based Access Control
(RBAC) implemented at both the application and
Ten Rules for Combating Cyber Security Attacks on Critical Infrastructure
August/September 2008 Remote Site & Equipment Management 33www.RemoteMagazine.com
FeatureSECURITY
device level. Device fingerprinting technology allows
RBAC to be implemented at a second level that has not
been available before, the device itself. Only those with
the proper roles for access or use of the SCADA infra-
structure will be authenticated and authorized.
9. Integrate Dynamic Password Methodologies
The practice of periodically changing passwords is a
good best practice policy. However, in some cases the
policy can be restrictive and non enforceable. Using a
dynamic challenge and response mechanism between
hardware devices creates a hardware password that is
only known between trusted devices and is enforced
dynamically to remain flexible as situations require. The
hardware password is changed each time the
challenge is issued and the corresponding
response will also be different, thus guarding
against traffic sniffing technologies.
10. Ensure Multi-Factor Authentication
In most security schemas, humans are recog-
nized as the “weak link” and subject to social
engineering tactics that can often reveal the
“what they know”… password, IP address,
machine type, operating system. To mitigate this
risk, the use of multi-factor authentication is rec-
ommended. Common “factors” usually consist of
human biometrics such as retina scanning, smart
cards and fingerprinting. While all of these serve
to identify an authorized user, most are not prac-
tical in an industrial environment.
The alternative and better solution is to use
device fingerprinting as part of the multi-factor
equation. For example, PC characteristics can
produce variables on the order of human DNA to
differentiate one from the other, thereby render-
ing a “machine metric” or device fingerprint that
can be used in the same manner as biometrics
without the inherent problems of the latter.
Critical infrastructure security solutions using
physical device recognition restrict access to only
designated computers used by authorized person-
nel, including distributed field components and
control center systems. Solutions using device-
based authentication assure a user is on an author-
ized device to access control system networks.
Advanced systems provide notification and loca-
tion of unauthorized connection attempts to the
network as well as attempted physical connection
attempts to field controls. Solutions that defend
against Cyber attacks using device-based authen-
tication should also shield control systems against
malicious code threats, ensuring against network
vulnerabilities and allowing centralized field
security monitoring.
Core Capabilities of an InfrastructureDefense System Should Include:
• Protection of SCADA systems and field
controls from the effects of cyber attack
• Hack-resistance that improves upon
traditional router, switch and firewall security;
• Uncompromising security on any
infrastructure – including communication open
standards such as Ethernet, wireless and the
public Internet
• Field access control – prohibiting network
access from breached field substations or other
network access points
• Cross-platform compatibility with any and all
operating systems and field control hardware
• Notification and location of unauthorized
connection attempts
• Extraordinarily low impact on network performance.
About the AuthorJim White has 38 years experience in control system
automation and security technologies. Jim presently runsthe critical infrastructure security business for UnilocUSA, a leader in security technologies based on physicaldevice recognition.
Uniloc USA is the technology leader in electronicPhysical Device Recognition (PDR) for critical infra-structure security. The core technology platform drivingUniloc innovation is physical device fingerprinting, thecompany’s patented method of uniquely identifying a user
device, such as a PC or PDA, by the naturally occurring,inherent physical imperfections of that device, and thenincorporating that physical device fingerprint intolicenses or access credentials. Uniloc’s technologies canidentify devices with more comparable accuracy thanhuman DNA. Uniloc is the inventor and holder of theseminal physical device locking patent (U.S. 5,490,216)and has 9 related patents pending. Uniloc has applied itsPhysical Device Fingerprinting technical expertise toseveral vertical markets, including software publishing,network authentication, transportation, social network-ing and DVD retailing. For more detailed information,please visit www.uniloc.com.
34 Remote Site & Equipment Management August/September 2008
Market InformationINDUSTRY NEWS
www.RemoteMagazine.com
OSI to Implement a Hot StandbyBackup Control Center System forSalt River Project
Open Systems International, Inc. (OSI) has been cho-
sen by the Salt River Project (SRP) to supply SRP’s
enhanced next-generation backup control center (BCC)
system. OSI’s high availability monarch backup control
center architecture, which supports virtual hot standby
operation with the primary control center, is the core
technology employed.
SRP provides electricity to more than 935,000 cus-
tomers in the greater Phoenix metropolitan area. It is part
of the critical Southwestern transmission grid that
includes large inter-area transfers due to the unprece-
dented growth in the Southwestern US. This growth and
mandated new industry regulations necessitate an
enhanced and modern BCC solution that not only main-
tains NERC regulatory compliance, but also increases
system reliability, safety, availability and control.
Benefits SRP can realize by upgrading to OSI’s hot
standby BCC solution include faster synchronization
time, seamless disaster recovery and seamless database
and display updates, as well as automatic failover capa-
bility and inter-site process monitoring for optimal con-
trol of applications at the backup site. In addition to
OSI’s standard applications, the hot standby environment
enables custom user applications to be executed at each
site and remotely health monitored.
Uplogix Expands into West AfricaWith UnoTelos Partnership
Uplogix is now partnering with Lagos-based
UnoTelos to deliver its fully-integrated remote manage-
ment platform to help Nigerian-based oil and gas compa-
nies address management challenges across highly dis-
persed remote locations. UnoTelos is Uplogix’ first sys-
tems integrator partner in Nigeria and is already experi-
encing high interest from customers seeking to go
beyond just monitoring.
“We had initially looked at basic remote monitoring
appliances but found functionality was limited to simple
SNMP reporting and event logging which is generally
not good enough to meet the needs of our clients, said
Jude Egbokwu, CEO and founder, UnoTelos. “After
careful evaluation of several vendors, we decided to part-
ner with Uplogix as it provides the most effective solu-
tion for our clients particularly suited in the oil and gas
industry with its large number of geographically dis-
persed sites both on land and offshore.”
UnoTelos was also impressed by the flexible connec-
tivity offered by the Uplogix solution. Each Uplogix
management appliance directly connects to an adminis-
tration station via the IP network, or in the event of a net-
work outage, via Satellite, PSTN or Cellular networks
allowing an always-available, secure and intelligent con-
nection to the devices being managed. The Uplogix solu-
tion is also able to automate many of the common admin-
istration tasks such as OS upgrades, password updates
and configuration changes, which is a major advantage
compared to simple monitoring devices.
“Within the oil and gas industry, there are always sites
in remote locations with critical IT infrastructure but with
no local IT support,” explains Egbokwu, “In the event of
a problem, the high cost of sending support staff to these
locations either by road or helicopter makes systems like
Uplogix extremely cost effective and also dramatically
improves operational efficiency. Our expertise with satel-
lite systems is a natural fit for the Uplogix solution and
gives us the ability to role out a secure remote manage-
ment solution to meet the operational needs of companies
within this sector.”
Although oil and gas is an initial target market,
Egbokwu also highlights the airline industry, telecommu-
nication providers and governmental agencies as future
potential customers for Uplogix. “The last decade has
seen a massive expansion of IT infrastructure across
Nigeria and the challenge for many organisations is to
reduce support costs and increase reliability. We believe
Uplogix has a significant role to play in helping them
achieve this goal.”
Hear Uplogix at the
Remote 2008 Conference and Expo!
Session Title: Ensuring Constant Connectivity andSecure Access to Remote Locations
www.RemoteExpo.com
Baltimore Gas and ElectricCompany to Pilot AclaraTechnology for Advanced Metering
Baltimore Gas and Electric Company (BGE), has
selected the Aclara Star Network system to support the
utility’s advanced metering infrastructure (AMI) pilot
program. As part of BGE’s Smart Energy Savers
ProgramS, BGE is evaluating selected AMI technologies
to transform and expand customer options to better man-
age energy use and lower energy consumption.
During the pilot BGE will evaluate Aclara’s Star
Network System as well as other AMI technologies in
two Maryland service areas – the urban Baltimore City
area as well as more rural Westminster. BGE is expected
to select an AMI technology based on the results of the
pilot and, upon approval by the Maryland Public Service
Commission, plans to implement its chosen AMI pro-
gram to its 1.2 million gas and electric customers begin-
ning in 2009.
The pilot will evaluate system performance with both
electric and gas meters and is scheduled to complete by the
end of the year. It also will test two-way communications
with demand-response devices, such as smart thermostats
and load-control switches, which permit remote control of
air conditioners, water heaters and other equipment. The
Star Network solution will integrate with BGE’s meter
data management system (MDMS), allowing transfer of
information such as meter reads, outage data, tamper mes-
sages and diagnostics between both systems.
“Two-way smart metering systems will allow our cus-
tomers more control of energy use because they enable
alternate time-of-use billing rates and provide customers
with innovative energy management tools,” said
Michael Butts, director of business transformation for
BGE. “We are eager to test the capabilities of the Star
Network RF-based system in our urban and rural areas,
and hope that the experience Aclara brings to the project
will result in an effective, functioning system that will
contribute to BGE’s energy conservation goals and
improved customer service.”
Interested in AMI?
If so then yo ushould attend Ember’s presentation at
the Remote 2008 Conference and Expo:
Leveraging the ZigBee Wireless Standard forAMI Networks
www.RemoteExpo.com
Arteco Working with theColumbus Division of ElectricityTo Prevent Copper Theft
Arteco has recently installed IVS systems in the
Columbus Division of Electricity utility substa-
tions, in Columbus, Ohio, for the purpose of pre-
venting copper theft and other security related
issues. With the demand for copper overseas driv-
ing up the price for scrap, increasing numbers of
criminals are engaging in metal theft. Among the
hardest hit victims of copper theft are electrical
utility substations because of the large amounts of
copper wire they use for electrical grounding and
transmission, and because these facilities are often
located remotely where theft is hard to monitor.
Recognizing its metal is an asset to protect, the
Columbus Division of Electricity has recently
turned to Arteco to proactively combat this prob-
lem. The Columbus Division of Electricity, part
of the Division of Power and Water for the City of
Columbus, Ohio, provides over one million resi-
dents and contracting communities with water
treatment and electric power distribution through
various water plants and utility substations.
August/September 2008 Remote Site & Equipment Management 35www.RemoteMagazine.com
Market InformationINDUSTRY NEWS
Arteco’s Intelligent Video surveillance offers the
Columbus Division of Electricity a practical, efficient
resolution. After setting up a virtual perimeter around the
fence of the substations and areas within the substation
around the transformer, video analytics technology pro-
vides true object orientation and recognition and real-
time alerts that can prevent the theft.
Should a dog wander into this perimeter or trash be
blown in it, the system holds steady. If a man approach-
es the gate of the substation the system detects the size
and orientation immediately, and triggers an event with-
in the IVS. At the utility control center, an alert sounds
and a red box appears on a video monitor that draws
attention to the violated area. Personnel double-click on
the red box to instantly review video of the man entering
the gate while simultaneously watching the perpetrator
real-time in a second window. Security uses this infor-
mation to take the appropriate countermeasure.
Wurldtech Named to NERC Cyber-Security Drafting Team
Wurldtech Security Technologies has announced that
the company's VP of security services, Bryan Singer, has
been selected to join the North American Electric
Reliability Corporation’s cyber-security Standards Action
Request (SAR) drafting team. Singer was one of eleven
appointments made by the NERC Standards Committee.
“As advocates for standards-based industrial cyber-
security policies and practices, we are extremely pleased
to have Bryan selected to the NERC team,” said Tyler
Williams, president and CEO, Wurldtech Security
Technologies, Inc. "Bryan is a recognized subject matter
expert who brings unique experience in assisting ven-
dors, operators and government agencies in addressing
the constantly evolving cyber-security risks across criti-
cal infrastructure industries. We look forward to support-
ing the team’s efforts to ensure that the electric system
infrastructure in North America is secure."
As the federally designated Electric Reliability
Organization (ERO) in the US, NERC develops and
enforces reliability standards for the planning and opera-
tion of the bulk power system. Approved by the Federal
Energy Regulatory Commission (FERC) in the US and
governmental authorities in Ontario and New Brunswick,
the Critical Infrastructure Protection (CIP)
Standards are now mandatory and enforceable
across all users, owners and operators of the bulk-
power system in those jurisdictions. This SAR
drafting team is charged with developing the scope
for improving the current set of CIP standards.
"NERC is playing an instrumental role in defin-
ing the way that the entire electric industry incor-
porates reliability standards for cyber-security,"
said Singer. "I am extremely honored to join the
efforts of such a committed and influential organ-
ization within our industry and look forward to
addressing the ever-changing challenges of cyber-
security and reliability of critical infrastructure.”
Attend Wurldtech’s Presentation at
Remote 2008 Conference and Expo?
Session Title - Technical Network SecurityAssessments: Understanding Your Vulnerabilities
www.RemoteExpo.com
New Company to SpecializeIn Fiber Optic Video and DataTransmission with Emphasis onHardened Ethernet Solutions
Communication Networks, doing business as
ComNet, has been formed and will focus on pro-
viding connectivity and communications network
solutions to the security, intelligent transportation and
factory automation/industrial control markets.
The product line will consist of fiber optic video, data
and audio transmission products as well as a broad
Ethernet product line, for use in CCTV, access control,
traffic signalization, incident detection and WMS/CMS
control. The ComNet team is made up of proven per-
formers from the communications and networking prod-
ucts industry, with a goal of providing competence and
service to customers.
“One of the key reasons for the success of IFS was our
decision to be a true resource for the customers who chose
to partner with us” said George Lichtblau, founder,
ComNet. “That was a successful philosophy and one that
we plan to improve on at ComNet.”
Many of the most significant and appreciated benefits
of partnering with ComNet are the high levels of pre- and
post-sale technical support; design center services and cus-
tomer care available to every ComNet customer.
Harris Battery Expands withAcquisition of Discover Energy Branch
Harris Battery Co. has expanded its operations to the
West Coast with the acquisition of the Los Angeles,
Calif. branch of Discover Energy. Harris Battery's new
California operation features a 6,000 sq. ft. regional dis-
tribution center located in Westminster, Calif, and a
sales office in San Francisco, Calif. The market area
served by the new branch includes Arizona, California,
Hawaii, New Mexico, Nevada, Oregon, Texas,
Washington and Wyoming.
"The addition of California to our service area demon-
strates our commitment to the Clean & Green movement
and to the Discover product,” said Jerry Harris, president.
“These products not only use the highest levels of sus-
tainable and environmental stewardship, but are also
engineered to provide more energy while reducing our
environmental footprint.”
Harris Battery is the US factory warehouse for
Discover dry cell batteries, which carry the Clean &
Green trademark, identifying the company’s commit-
ment to provide responsible products that conserve
resources and help protect the environment. They are 98-
percent recyclable.
Additionally, Discover batteries are completely sealed,
leak-proof, spill proof and 100-percent maintenance free.
They are non-hazardous, non-gassing, approved for envi-
ronmentally sensitive areas and a direct replacement for
hazardous battery technology.
ISA100 Standards CommitteeForms WirelessHART ConvergenceSubcommittee
The ISA100 standards committee on wireless systems
for automation has created a new subcommittee to address
options for convergence of the ISA100.11a and
WirelessHART standards. This initiative is a key step in
the mission of the ISA100 committee to develop a family
of universal industrial wireless standards designed to sat-
isfy the needs of end users across a variety of applications.
The subcommittee will contrast and compare the tech-
nology within the ISA100.11a and WirelessHART stan-
dards, building on the experiences gained with industrial
applications of both standards, with an ultimate goal of
merging the best of both standards into a single con-
verged subsequent release of the ISA standard.
“This is an important development for industry since it
furthers the mission of ISA100 to embrace relevant indus-
trial wireless standards and serves the expressed needs of
the end user community,” said Paul Sereiko of Airsprite,
who has been invited, along with Dick Caro of CMC
Associates, to serve as co-chairs of the new subcommittee.
An early activity of the ISA100 WirelessHART
Convergence Subcommittee is to prepare the
WirelessHART standard in an ISA standard format by the
end of July to facilitate the evaluations.
“Adoption of the ISA100.11a standard in 2008 will be
an important step in fulfilling our ISA100 committee
mission and of significant value to industry. This new
subcommittee is the next logical step to helping industry
fully achieve the significant benefits of wireless technol-
ogy,” added Pat Schweitzer of ExxonMobil who serves
as co-chair of the ISA100 committee along with Wayne
Manges of Oak Ridge National Laboratories.
Hear Paul Sereiko, the Hart Foundation, ISA and Wayne
Manges Speak at Remote 2008 Conference and Expo!
Learn more at www.RemoteExpo.com
36 Remote Site & Equipment Management August/September 2008
Continued FeatureSCADA
www.RemoteMagazine.com
Western Weather Group’s monitoring solutions act as a warning system, measuring
set parameters (e.g., temperature or movement) and then proactively notifying the end
user through email/text communication. WWG environmental monitoring systems are
typically used in businesses such as farming and agriculture, as well as meteorology
and environmental research projects. Applications include temperature monitoring to
alert vineyard or orchard owners when frost point has been reached and a sensor-based
security system that detects unauthorized access.
A WWG solution consists of
antennas, sensors and a data
logger. Units are solar-pow-
ered, with an additional small,
12 volt battery. WWG cus-
tomizes each solution by pro-
gramming the data logger to
recognize specific parameters
and take action once a thresh-
old is reached, such as opening
flood gates to depress water
levels, turning fans off or on to
regulate temperature, control-
ling irrigation pumps to reduce
or increase pressure and initi-
ating visual or audible alarms
with suspicious movement.
Many of WWG’s imple-
mentations involve weather
stations connected to analog
cellular telephones, utilizing
voice synthesizer modems that allow farmers and agricultural producers to remotely
view current weather conditions. With the sunset of analog networks, WWG was forced
to convert its analog cellular solutions to digital.
WWG considered many options, including radio telemetry and hardwire telephone
lines. Radio telemetry requires line-of-sight communication, which is not always avail-
able at weather station locations. Telephone lines require installation of new wires into
locations that aren’t already serviced, which is expensive and time-consuming.
WWG found the answer to its conversion question with the integration of intelligent
cellular gateways into its monitoring solution to provide reliable two-way connectivity
and enhanced remote monitoring capabilities. The wireless gateways access the expan-
sive cellular networks and have embedded intelligence that simplifies installation, oper-
ation and maintenance of any solution. These reliable communications platforms pro-
vide the “always-on” and “always-aware” connection management required for
unmanned applications. In addition, the use of sophisticated software tools allows
WWG to remotely configure the wireless gateways and troubleshoot problems from a
single location. Remote management capabilities drastically reduce the cost of total
ownership and lead the way to a rapid ROI (return on investment).
“The combination of new data logger technology and the digital gateways enables us
to send out text messages directly to a cellular phone or email address based on meas-
urements in the field,” said Don Schukraft, CEO of WWG. “This enables one to be
immediately notified when environmental parameters exceed a specific threshold.”
The WWG monitoring solution takes only a few hours to install and bring online.
Western Weather Group currently has about 25 digital wireless gateways in use by a
dozen customers. Additionally, ROI is realized in as little as one to two months depend-
ing on the application.
“If you can save grapes from a pending frost, you prevent revenue loss worth many
times the cost of the system,” explained Schukraft.
Intelligence is the AnswerAs the world moves toward integrated communication systems, industries dependent
on consistent data acquisition need an efficient way to provide the intelligence neces-
sary for advanced capabilities like remote monitoring and infrastructure management,
as well as the connectivity requirement to see and act on acquired data in real-time.
While an analog data logger is a reliable source to capture measurements, it is simply a
storage facility unless enhanced with an intelligent device that can transform the instru-
ment into a solution. By implementing intelligent wireless gateways with legacy ana-
log equipment business owners can monitor mission critical parameters in real-time,
and can troubleshoot equipment issues remotely. Having two-way wireless communi-
cation with remote equipment drastically reduces operating and maintenance costs and
generally leads to a rapid return on investment.
The remote nature and often geographically disparate deployments of monitoring
solutions lends itself to the use of cellular data networks as a communications medium.
Many deployments are located in areas with no landline access, and even when land-
line access is available, wireless has clear advantages. With a cellular solution cus-
tomers can utilize one provider for deployments across wide geographic areas, instead
of negotiating contracts with several regional providers.
There is no doubt that wireless communications are evolving towards digital trans-
missions, yet it can’t be ignored that legacy equipment is very often designed to com-
municate with an analog device. Companies that cross the chasm from analog to digi-
tal communications with the least amount of capital investment will be in the best posi-
tion to serve their customers.
Justin Schmid is Vice President for the Mobile and M2M Group at Sierra Wireless. Sierra Wireless modems and software connect people and systems to mobile broad-
band networks around the world. The company offers a diverse product portfolioaddressing enterprise, consumer, original equipment manufacturer, specialized verticalindustry, and machine-to-machine markets, and provides professional services to cus-tomers requiring expertise in wireless design, integration, and carrier certification. Formore information, please visit www.sierrawireless.com.
Sierra continued from page 13
August/September 2008 Remote Site & Equipment Management 37www.RemoteMagazine.com
Continued FeatureNETWORKING
The ability to perform remote, in-service testing, one-
way delay and jitter monitoring, and to establish end-to-
end OAM is critical to ensure quality of service.
Every network, regardless of the type, will have brief
outages from time to time and microwave networks are
not an exception. So, we have to be careful enough not to
try to over-dimension the microwave network and make
it un-necessary costly.
7) Adaptive Modulation Radio (AMR)Microwave radio links work at frequencies which are
subject to rain fading (usually above 10 GHz) which may
cause links to fail during heavy rain. Adaptive modulation
is starting to be employed in microwave point-to-point
systems to combat rain fading by dynamically changing
the modulation scheme depending on weather
conditions. During good weather conditions an
efficient modulation scheme is used providing
a high data rate. During heavy rain, adaptive
modulation uses a more robust modulation
scheme to guarantee the high availability of the
link at the cost of a reduced data rate while the
most efficient modulation is used during good
weather conditions. The addition of adaptive
modulation is an efficient way to support
increased bandwidth requirements in backhaul
networks, while preserving limited available
frequency spectrum and re-using previously
installed equipment. Adaptive modulation on a
single link will ensure a high availability for
“guaranteed traffic” and a high data rate for
“best effort” traffic but lower availability.
8) Protected Microwave LinksRadio path has two transmitters and two receivers
always on-line (“hot”). A switch keeps one radio trans-
mitting or receiving until a failure occurs and at that
moment, signal is switched to the stand-by radio. The
MSHB configuration (1+1) protects against equipment
failures only, not path propagation problems.
Protected microwave links are used in cases where
there is a small chance of a quick microwave link repair
i.e. long MTTR (Mean Time-To-Repair). Some of the
examples would be difficult access sites - high towers
requiring tower climbers, remote microwave sites, high-
voltage towers, etc. High-capacity links are also good
candidates for protected radio configuration, unless they
are protected by ring network topology itself.
Engineers, Consultants, Contractors and Turn-key Solutions
Deployment of a large and/or complex communica-
tions system is not an easy task and more often than not,
companies do not have technical and managerial capacity
in terms of experience, education or available work force.
Many of the tasks can be given to contracting and/or
consulting companies and there is a significant trend
toward outsourcing in the telecommunications industry
today. It is important to ensure that you and your suppli-
ers have enough people working on a project since mis-
managing work force is a common problem on large
projects. It is easier to pull people out of the project later
on (when they are not required any longer) than mobilize
and bring up to speed new people in the middle of the
project. In addition, it is important to choose and inde-
pendent engineering company not affiliated with any
equipment manufacturer, so they can provide an optimal
and unbiased design.
There is no doubt about it - turnkey solutions on large-
scale microwave projects can save money. Using a single
point of contact to not just design, but also build, and
commission a telecommunications network involves
many obvious benefits like lowering overall costs, reduc-
ing cycle time, regulates quality and safety, and simpli-
fies administration and project management. The practi-
cal experience shows that using one company to coordi-
nate all aspects of the job, including resource planning
(people, equipment, material management), work sched-
ule, and cost management, will reduce cycle time and
duplication. It will maintain continuity for the project and
therefore reducing costs for materials, equipment, and
human resources, as it will not allow for any downtime
and overlap because of bad planning. Operator may
either retain comprehensive engineering services from a
project's start to finish, or develop a work plan for con-
tracting out specific phases of the telecom network proj-
ect to various parties. Operator should determine which
alternative is appropriate in their situation but in any case
it is an imperative to create detailed SOW (Scope of
Work) and carefully define who is doing what
(Responsibility Matrix). There is no such thing as “too
detailed scope of work.”
Common Missing Link - Change Orders, As-builtDocumentation, and Record Keeping
When a consulting/contracting company is hired for
the job, like on any other large-scale project, there are a
number of documents produced during the life of the
microwave buildout project (Figure 4). Document con-
trol should provide the administrative support and con-
trol of all project documentation; this should include, but
is not limited to, contract change proposals, manual
updates, drawing control, specification changes, etc. At
the end of the project, the documents that should be sup-
plied are technical manuals for the equipment supplied,
one set of interim as-built drawings
for each site, final as-built drawings
following final acceptance, factory
test results, relevant ATPs
(Acceptance Test Plans), training
manuals (if training specified), etc.
To avoid the trap of performing
the work during the fast-paced
build-out phase without the written
authorization, “Change
Notification Form” also called
“Change Order” has to be issued.
Contractor(s) or consultant(s) must
receive a written approval of
his/her deliverable prior to starting
the new task or making any
changes to the previously defined
task. Make sure that all the suppli-
ers, consultants, and contractors
leave behind detailed written trail
in the form of path calculations and
path profiles, drawings, test results,
(As-Built documentation), etc. You
will be running the network long
after they are all gone to other proj-
ects and clients [4].
ConclusionAt the end, we can summarize
and say that sound microwave engi-
neering practices, in the long run, will save money and
aggravation. Building and maintaining a reliable
microwave network does not have to be a difficult task;
assuming that the proper engineering practice had been
utilized from the start, using expert workforce and rep-
utable hardware and services suppliers.
References and Further Reading
1) Harvey Lehpamer, “Microwave TransmissionNetworks – Planning, Design and Deployment,”McGraw-Hill, 2004, ISBN 0-07-143249-3
2) Harvey Lehpamer, “Transmission Systems DesignHandbook for Wireless Networks,” Artech House, 2002,ISBN 1-58053-243-8
3) Articles, Q&A, and technical papers atwww.cicusa.com
4) Harvey Lehpamer, “How to Build aReliable and Cost-effective MicrowaveNetwork,” ENTELEC, Houston, Texas, 2006
About the Author
Harvey Lehpamer, MSEE, has over 25 yearsof experience in the planning, design anddeployment of transmission and microwavenetworks around the world. Mr. Lehpamer haspreviously worked for Ontario Hydro,Ericsson Wireless Communications, Inc.,Qualcomm Inc., and Clearnet, Inc. He is cur-rently working for CommunicationInfrastructure Corporation (CIC), microwaveengineering company, and has published threebooks. In addition to his daily engineeringresponsibilities, Harvey Lehpamer is teaching
Microwave Transmission Engineering at University ofCalifornia – SD Extension and math classes atSouthwestern College, both in San Diego, CA. He can becontacted at: [email protected] [email protected].
Hear Harvey Lehpamer Speak at the
Remote 2008 Conference and Expo
Learn more about his session at: www.remotemagazine.com/rem08_program.php#ci
Comminucation continued from page 23
Figure 4 Document control during the microwave project
38 Remote Site & Equipment Management August/September 2008
New PublicationsLITERATURE
www.RemoteMagazine.com
Find the Right Sensor with Banner’s Newly Updated Catalog
Banner Engineering’s 2008-2009 sensor products catalog delivers new sensing prod-
ucts and applications in an improved design. The full-color catalog showcases Banner’s
industrial product line, which includes photoelec-
tric and special-purpose sensors as well as meas-
urement and inspection sensors. Highlights
include the expanded variety of vision sensors and
lighting accessories and the latest offerings from
Banner's two new product divisions, wireless net-
works and EZ-Light Indicators.
The catalog’s multiple navigation options sig-
nificantly improve its usability. Choose a sensor
solution with the comprehensive selection guide
that compares and contrasts sensor features.
Browse the “what’s new” section for the latest
innovations from the sensor experts. Quickly find
the right section using color-coded side tabs in
combination with the table of contents.
High-quality application illustrations show
Banner sensing products solving industrial automation problems, and page references
within these applications help users find the featured product. Scattered throughout are
thousands of “more info online” icons that directly link users with expanded and updat-
ed information on Banner's website.
Featured within the seven product sections are two sections showcasing Banner’s
SureCross wireless networks and EZ-Light indicators. An expanded and improved
machine vision section includes the following new products such as PresencePlus Pro
cameras, the PresencePlus ProIII controller and the two piece PresencePlus Pro Color
or one piece P4 Color Omni vision sensors. Other new product highlights include
World-Beam Q20 compact sensors, M12 miniature 12 mm barrel sensors, R-Gage
QT50R radar sensors, EZ-Array measuring light screens, and further expansions to the
flagship families of World-Beam Q12, QS18 and QS30.
Sixnet Releases "Best Edition Ever" Product CDSixnet has released a brand new CD which features the entire product line from their
automation, industrial connectivity and wireless connectivity divisions.
This free CD is packed full of easy access downloads and comprehensive informa-
tion detailing SIXNET's product portfolio. The completely new layout is also designed
to be easy to navigate. Product pages, datasheets, user manuals, software, AutoCAD
files and tech notes put all the information at user’s fingertips.
The "what's new" page provides a quick overview on the latest advancements from
Sixnet. The SL-8MG "all gigabit ethernet switch" is the newest addition to the Slim
Line product family. It offers 8 Gigabit ports for 10/100/1000 RJ45 Ethernet links, four
of which are combination ports that also accept industry standard SPF transceivers.
Sixnet's ISaGRAF Open Workbench is a seamless migration path for the tens of
thousands of installed ISaGRAF applications to upgrade to the newest generation, 32-
bit look and feel of ISaGRAF program development tools. The BT-6000 series, by
BlueTree Wireless Data, Inc. is a completely new generation of rugged cellular data
modems. Each modem has application specific functionality targeting the teleme-
try/SCADA, business continuity and mobile data markets, enabling SIXNET customers
the most appropriate cellular modem for their specific application requirements.
New Brochure Highlights Expanded Wago IO System WAGO Corp. has issued a new Wago-I/O-System
brochure. The brochure includes a removable four-
panel reference poster that outlines Wago’s
range of bus couplers, PLCs and more than 300
digital input/output, analog input/output and
specialty modules.
The brochure includes background on Wago,
the Wago-I/O-System and key 750/753 series
features. It lists available software tools such as
Wago-I/O-Check (commissioning) and Wago-
I/O-Pro (programming), as well as Wago-I/O-
Systems applications including industrial
automation, process engineering, facility manage-
ment and both onshore and offshore marine uses - with applicable worldwide cer-
tifications and approvals.
Videx Releases a Electronic Lock Product CatalogVidex, Inc. has released its new catalog that is packed with helpful information
on CyberLock electronic locks and intelligent padlocks. The catalog is free and
includes an instructive CD on electronic lock and key technology. CyberLock brings
electronic access control and an audit trail to mechanical locks and padlocks simply
by replacing the cylinders in the existing locks with CyberLock electronic cylinders.
ISA Releases Third Edition of Wireless NetworksResource Book
ISA has released the third edition of its book, Wireless Networks for Industrial
Automation by Dick Caro. Available in digital format, this book includes the
increasingly popular wireless application Radio Frequency Identification (RFID)
topic and also provides a clear, unbiased view of the emerging wireless communi-
cations market. Caro's goal is to help keep readers up-to-date with the wireless mar-
ket so they can make better decisions on the timing and strategy for implementing
wireless networks for automation projects.
According to Caro, going wireless is more than just plugging in some wireless
components to replace the wires. Residential networks are easily justified using
today's inexpensive wireless components to avoid costly or unsightly wire installa-
tions. Industrial use is not quite so clear due to privacy and security problems and
the potential for signal loss in plant environments.
Industrial use must have secure communications that never fails. However, the
cost of industrial wiring is so high, that wireless can usually be justified.
In this third edition, the author includes a general update of events that have
occurred since the previous edition. Of significance is an overview of new technol-
ogy, such as ISA100.11a, WirelessHART and WiFi, including IEEE 802.11n.
Attend ISA Pre-Conference Workshop at Remote 2008 Conference and Expo
Topic: Practical Applications of SCADA Systems IntegrationFor more information visit: www.remotemagazine.com/rem08_workshop.php
WEB GUIDESwww.digi.com/rdm
Leveraging expertise in cellular, Wi-Fi,
ZigBee/802.15.4 and proprietary RF tech-
nologies, Digi offers reliable wireless device
connectivity solutions. From simple cable
replacement, to sophisticated end-to-end
wireless device connectivity and management
with our unsurpassed Drop-in Networking
family of products, Digi knows wireless.
www.lem.com
LEM is a market leader in providing innovative
and high quality solutions for measuring electri-
cal parameters. Its core products – current and
voltage transducers - are used in a broad range of
applications in industrial, traction, energy and
automotive markets.
www.satelnorthamerica.com
Introducing Satel North America, where quality,
selection and service is our guarantee. Think
quality, think service, think wireless. Think
Satel. 800.292.9778
Data Comm for Business, Inc. (DCB) man-
ufactures and distributes a broad line of
data communications equipment including
DSU, Stat Mux, Statistical Multiplexer,
FRAD, Routers, Wireless, Remote Access,
RS-232, modems, FRADs, SCADA, and
remote interconnection equipment, The
DCB Website includes complete data sheets
for all DCB products, PDF versions of all
product manuals; and most importantly, in
the education section, hundreds of white
papers and tutorials covering communica-
tions technologies and methodologies.
www.dcbnet.com
August/September 2008 Remote Site & Equipment Management 39www.RemoteMagazine.com
Conferences/TrainingCALENDAR
August3-7, APCO, Kansas City, Mo. Contact www.apcointl.org
5-6, Solar Metering Performance and Monitoring Expo, Berkley, Calif. Contact www.solarelectricpower.org
5-7, 3rd Annual Water and Wastewater and Automatic Controls Symposium,Orlando, Fla. Contact www.isa.org/wwac
21-24, SPE Annual Technical Conf. & Exhibition (ATCE), Denver, Co. Contact www.spe.org/atce/2008
September7-10, Autovation 2008, Atlanta, Ga. Contact www.amra-intl.org
9-12, Field Service East, Atlanta, Ga. Contact www.FieldServiceEast.com
10-12, CTIA Wireless IT and Entertainment, San Francisco, Calif. Contactwww.wirelessit.com
14-18, INTELEC 2008, San Deigo, Calif. Contact www.intelec.org
15-18, ASIS International 2008, Atlanta, Ga. Contact www.asisonline.org
October8-10, WEEC, Washington DC, Contact: www.aeecenter.org/shows
14-16, ISA Expo, Houston, Texas, Contact www.isa.org
15-16, SATCON, New York, NY, Contact: www.satconexpo.com
CALENDAR
Campbell Scientific, Inc. 23www.campbell.com/m2m
Control Microsystems, Inc. 16www.controlmicrosystems.com
Data Comm for Business 12, 38www.dcbnet.com
Dielectric SPX 18www.arguson.com/remote1
Digi International, Inc. 5, 38www.digi.com
Eaton/Pulizzi Engineering Inc. 40www.powerware.com/ePDU
GE Security 7www.gesecurity.com
LEM 36, 38www.lem.com
Lemos International 36www.lemosint.com
Moxa Technologies 17www.moxa.com
Phoenix Contact 15www.phoenixcon.com/wireless
Precision Quincy Corp. 14www.precisionquincy.com
Prosoft Technology 8www.prosoft-technology.com
Radicom 37www.radi.com
Satel North America 22, 38www.satelnorthamerica.com
SEL Schweitzer Engineering 2www.selinc.com/remote6
Sensaphone 23www.sensaphone.com
SI Tech 36www.sitech-bitdriver.com
Tadiran Batteries 13www.tadiranbat.com
Tessco Technologies 10, 11, 19www.tessco.com
www.RemoteMagazine.com
ADVERTISER INDEX