Which NEMA Enclosure is best for your application?

May 29, 2014 at 10:00 AM


Let’s help you decide. We can figure this out together, I’m sure of it.

 

First we will talk about why you might want an enclosure, or for those of you who don’t know yet- what they are used for.

 

When deploying a wired or wireless network, it’s common to use expensive components like switches, routers, access points, and PLC's. These devices are critical to the operation of the network and can cost thousands of dollars.

 

When these devices are located outside or in an industrial setting such as a factory or processing plant, they become susceptible to damage from the elements, chemicals and physical contact.

 

The best way to protect your valuable communications equipment from this contact is with an enclosure. An enclosure is like Iron Man’s suit; the outer shielding protects the valuable inner-goods.

 

Who would Iron Man be without his suit anyways?

 

A common term that you’ll see used with enclosures is “industrial.” This is because most enclosures are built to be weatherproof, rugged, and often sport features such as heaters, cooling fans and more. They are designed for indoor and outdoor use, hot and cold temperature environments, as well as where equipment and critical systems need power, environmental protection, and security for the network to function.

 

NEMA (National Electrical Manufacturers Association) and the IEC (International Electrotechnical Commission) are two standard groups, and each has their own ratings based on resistance to dust, moisture, water immersion, and ice. Equipment enclosures typically use one of these rating systems to define how much abuse a particular enclosure can take.

 

You can find enclosures at use in places like:

 

Industrial data and control systems in factories and manufacturing plants, Municipal/State/Federal wired and remote sensor applications, secure WLAN network installations and more.

 

Some enclosures can even be used in extremely harsh environments such as mines, hydraulic or pneumatic control installations, and petrochemical refineries. They are made to endure all manner of abuse and keep the sensitive electronics inside safe.

 

As you will see, there are many varieties of enclosures with endless features. For the purpose of this tutorial we are going to walk through three categories: Non-powered, Powered, and Heated & Cooled.

 

 

Non-Powered

 

These enclosures are perfect for housing both wired and wireless communications equipment that do not require power. L-com’s non-powered weatherproof enclosures feature either a fully-removable gasketed lid with a stainless steel continuous hinge or a continuous gasketed lid secured by four non-metallic molded screws that ensure optimal integrity.

 

Our non-powered enclosures are also available in a variety of materials including Molded Fiberglass Reinforced Polyester (FRP) and VALOX 357U thermoplastic material.

 

 

Powered

 

Depending on the type of devices you are protecting in an enclosure, you may require a power source. Some of our enclosures have built in power outlets for a variety of interfaces, including 12V DC120V AC, 240V AC, and POE.

 

In addition to sharing some of the many features the non powered enclosures have, some of our powered interfaces include built in lightning protection. This helps add an extra level of security for the equipment installed in the enclosure.

 

 

Heating & Cooling

 

Weather your application requires power or not, there’s another piece of the puzzle to keep in mind. Will your equipment be exposed to cold temperatures, extreme heat, or moisture?

 

If your equipment will be experiencing any of these conditions, there are options for cooled, vented, and heated enclosures.

 

For example, L-com carries a sub-zero 48 VDC PoE-powered weatherproof enclosure, which is perfect for heating critical equipment in sub-zero temperatures. This sub-zero model has a thermostat-controlled heating system that is powered by a single Cat5 cable plugged into the remote-mounted power supply. This thermostat is designed for use in sub-zero environments up to -30°F (-34°C), maintaining a nominal internal ambient temperature of +40°F (4°C). The insulation properties of fiberglass, as well as foam insulation, aid in heat retention. 

 

Here's a helpful diagram that describes where all of these features would be located:


 

 

 

If you still haven’t yet figured out what you need, ask us about customization!

 

You might be able to design exactly what your application needs. At L-com we can customize mounting plates, cut outs and more to enable any mounting configuration. As mentioned previously, we also offer variations with heating, cooling, and venting. 

 

How Secure is Your Datacenter?

May 22, 2014 at 10:00 AM

 

Let’s hope your data center isn’t this vulnerable.

 

If its security system is still in a diaper phase you could be in a lot of trouble, and most likely at risk of a security breach...

 

Why, you might ask, are we talking about babies and computers?

 

Because data centers are the nerve center of an organization. This means that security should be top priority, and your data center security should be as impenetrable as a fully grown, seven-foot bearded lumberjack.

 

And surely it’s not probable that a baby could hack into your data center, but the point is to assess who or what could interfere with the security of your data.

 

In a study done by the 2013 IBM Cyber Security Intelligence Index that encompassed 3,700 clients across 130 countries, it was estimated that the average number of cyber attacks on a single organization over the course of a week is 1,400. That’s two hundred per day!

 

The 2014 Data Breach Investigations Report (DBIR) also examined another 50 organizations and found that a collective 63,000 “security incidents”  occurred as well as 1,367 actual data breaches.

 

One security breach that happened recently at Iowa State University left about 30,000 students exposed. And we all remember what happened at Target; it was the largest retail breach in U.S history. Yikes.

 

 

Check it once, check it twice

 

 

Next-generation data centers will require ever-evolving solutions to keep sensitive business and client information secure, and this is the reality that businesses will have to face as they grow and build upon their server infrastructure.

 

But it doesn’t have to be a huge daunting task. There are different levels of security we can all utilize in order for our datacenters to have a robust security system.

 

Here are 3 different levels of security with examples to help you prepare in securing your datacenter:

 

Physical security: locked entry-way doors with HID key access only, retina scan or fingerprint entry, locking IT closets, security cameras, motion sensors, etc.

 

Software security: firewall protection, data encryption, implementing VLANs, using IP routing and access control lists, web filtering and security, malware protection.

 

Employee security:  First assess, who should have access to what? Set permissions, clear sensitive information from desks, monitor entries and requests for important material, and check your wireless network security- do you have CPE’s (access points) in place with high levels of data encryption for transferring info wirelessly?

 

IT managers and facility operations can also schedule routine audits to help find any type of security infiltration.

 

At L-com we carry a variety of products and technologies that support security and could be helpful with your system implementation:

 

  • ·         IP cameras: These can be used in a variety of areas including data closets, server rooms, warehouses, hallways, etc.
  • ·         Fiber optic cable: Since fiber transfers data with light this makes it very hard to tap and steal data.
  • ·         Physical Layer Isolation: Isolate and protect data by placing a physical barrier between your computer or other device and the network cables that are attached to it.
  • ·         Ethernet Switches that use VLANS:  Virtual Local Area Networks (VLANs) can be used to isolated select users to specified servers, routers and other network devices limiting access to sensitive information.
  • ·         Middle Atlantic cabinets and our NEMA enclosures are lockable for rugged protection.

 

By assessing and maximizing your security systems you can find peace of mind that your critical information is secure and protected at all times, with zero threat of unauthorized access or infiltration.

 

None of us want to be hacked. We don’t want to go down in history like any of these guys (20 infamous hacker break-ins).

 

So take precaution. Review your current security systems and ask yourself, how secure is my data center?

 

Former Editor-In-Chief of PC Magazine Rocks Out with L-com USB Guitar

May 15, 2014 at 10:00 AM

 

(photo by Bill Machrone)

 

This is quite possibly one of the coolest ways we’ve ever seen our USB adapter used.

 

You don’t have to be a lover of music, lover of all things guitars, or even a lover of techie building projects to appreciate this guy’s experiment (though it’s so well done it deserves more credit than just being a neat experiment).   

 

Bill Machrone, former editor-in-chief of PC Magazine, put L-com’s USB ECF Adapter Cable (part number ECF504-12AAS) to good use when he decided to build a USB enabled guitar. Machrone was well equipped with the necessary tools and experience in electronics to take on the task. Having built both electric and acoustic guitars before also helped Machrone set off to construct this one of a kind instrument.


As part of that design, Machrone had to figure out which USB jack to use.

 

“One of the reasons I went to L-com was because they have such a complete catalog,” said Machrone, “You can find anything, any type of connectivity gear.” Machrone had done a lot of research for this part of the project. He had an idea of what he wanted, but was surprised when he couldn’t find it until hitting the L-com website.

 

One of the reasons Machrone chose L-com’s USB Type A Connector is because it had a polished metalized surface and a compatible square shape that could easily be added into the guitar.

 

“It had a lot going for it in terms of appearance and it was a convenient choice,” said Machrone.   

 

Selecting the USB jack was part of a 10 step process which Machrone outlines in his article for PC Magazine:


  1. 1. Select a guitar
  2. 2. Acquire a Micro USB board
  3. 3. Measure and cut for jack and module layout
  4. 4. Drill your holes
  5. 5. Ready the USB
  6. 6. Wire your interface
  7. 7. Craft a cover
  8. 8. Drill metal for the jacks
  9. 9. Insert the Micro USB board
  10. 9. Finishing touches

 

According to Machrone, there’s one simple explanation why you might want a USB port in an electric guitar: for convenience. With a USB port the guitar will not only rock out like normal, but will also automatically transmit the recording signals to your computer.

 

“It was like a problem solving exercise, deciding how I was going to connect it, adding the head phone jack and listening to myself as the software recorded it,” said Machrone, “It was fun.”

 

Another advantage to building your own USB Guitar is cost savings. If you select an inexpensive guitar to repurpose on your own, Machrone advised, it will most likely be cheaper since USB guitars sell for about $300 nowadays.

 

Above all, the excitement of the finished product makes all the hard work worth it. “Once I had it together, it started working, and that was a thrill,” Machrone exclaimed.

 

Machrone was also pleased with the quality output of the L-com USB jack, how it functioned within the guitar, and its durability. “I can say that it gets nicked and banged around and beat up,” said Machrone. “The last time I looked at the USB jack it was in perfect shape. It’s standing up to the beating.”

 

For the full tutorial on building a USB guitar, visit Bill Machrone’s how-to at: http://machrone.net/usbguitar/

  

Take Aim with L-com’s Yagi Antenna

May 8, 2014 at 10:00 AM

 

Have you ever seen a Yagi antenna at a target practice?

 

Certainly there are numerous ways to put a Yagi to good use, but this application really surprised us.

 

At Sniper’s Hide, an online community for serious tactical marksman, one member from Idaho put our Yagi to the test. He set up a long range target camera system with a 14dB gain Yagi antenna, and posted a how-to tutorial.

 

The target camera system included using the L-com 900 MHz 14 dBi Yagi Antenna with N Female Connector, along with a camera, wireless transmitter and antenna at the target end, a wireless receiver, and  antenna and TV on the shooters end.

 

It’s no surprise to us that our HyperGain High-Performance Yagi Antenna held up in the sniper’s rugged, long-range application.

 

Why? This series of Yagi antennas provides the user with anodized aluminum boom, solid elements, a 400 series low loss series coax pigtail, and rugged mounting hardware. This antenna also combines accurate gain with a wide beam-width, ideally suited for directional applications in the 900 MHz ISM and GSM bands.

 

To date, the farthest distance their team has recorded at target practice is 2,640 yards (1.5 miles) with no problems or signs of the signal losing strength. They were even confident that the set up with our Yagi would reach over 5 miles!

 

More on Sniper’s Hide: The Sniper’s Hide community was founded on the knowledge, science and the appreciation of the art involved in long range shooting. Sniper’s Hide’s mission is to uphold the traditions and professionalism of those who came before them, expanding on the science, and developing the art. Their members extend beyond Doctors, Lawyers, Police Officers, as well as past and present members of the Armed Forces. Monthly classes are held in Colorado, as well as the largest tactical precision rifle match in the United States. In 2013, 125 shooters participated in the Sniper’s Hide Cup.

  

(Photo courtesy of Sniper’s Hide)

 

What’s the most unique application you’ve seen that uses a Yagi antenna?  We want to know!

 

How We’re Launching into the Future of Fiber & Wireless Technologies

May 1, 2014 at 10:00 AM

 

Picture this:

 

You’ve consistently worked hard on keeping up with the latest technologies and standards so that you can be the best in your business.

 

You’re confident in your knowledge and technique.

 

Then you get the call that you’re in. They want you.

 

And you have the opportunity to present this knowledge in front of some really important people……

 

That’s how we feel this month!

 

We’re honored to announce that we’ve been given the chance to present at a technology seminar at the Kennedy Space Center.

 

In the wave of 21st century technology, our sights are set on all that the future holds for our industry and we couldn’t be more proud to be a part of it. On Friday, May 9, 2014, our product managers and wireless application specialists will be presenting wireless application trends and the future of fiber optic communications. For NASA!

 


The Facts on Fiber

 

Our team plans to discuss a variety of fiber optic technology trends and future applications. The first will explain and examine the increasingly relevant crossover between commercial and military grade products.

 

It’s a common misconception that if an organization is qualified as a “government” or “military” entity, it absolutely must use military grade fiber products. This isn’t necessarily the case. What we want to emphasize is that it’s important to analyze all characteristics and factors within the application in order to get the best product match, as well as the best use of one’s money. 

 

For example: a military grade cable might be applicable in a certain outdoor location where large trucks and tanks run over it. But, if each end of that cable runs into a building where it‘s protected, a commercial grade connector or cable assembly could likely be a viable option.

 

It’s also important for us to mention how fiber has evolved. Fiber is no longer just a delicate and expensive cable option. Not only is fiber capable of being used in a rugged application, but it is also an efficient green choice that saves energy. To put this into perspective- one single fiber cable can be run 100 kilometers without a connection break-up or even having to use additional electrical repeater equipment for support along the way.

 

Other fiber optic topics that we’ll discuss are port density, cable weight, and the relatively new MPO connectors. Our hands-on discussion will also focus on how advancements in RF and optical networks will help NASA achieve new design insight. 

 

Lastly, we plan to touch on the topic of security in relation to fiber optics. In the past it was believed that fiber cable was “un-tapable.” However, there is knowledge to prove that fiber actually can be tapped into, so it might be worth considering taking certain safety precautions for the security of the data being passed.

 

 

What about Wireless?

 

In addition to our focus on fiber technology, we will also hold a technical discussion about the next generation Wi-Fi standard, 802.11ac technology. 802.11ac has the ability to support up to eight MIMO spatial streams, with a lot more functionality. Check out our recent post about 802.11ac technology here.

 

In relation to 802.11ac, we will also discuss MIMO technology and using MIMO compliant dual polarity antennas. Our presentation will include the latest in new MIMO wireless technology that provides improved spectral efficiency along with increased link capacity and reliability.  

 

By utilizing multiple antennas you can increase the data throughput and range, compared to a single antenna using the same radio transmit power. Additionally, MIMO antennas improve link reliability and experience less fading than a single antenna system. By transmitting multiple data streams at the same time, wireless capacity is increased.

 

Overall, there's lots of exciting stuff propagating in the world of wireless and fiber optic technology.


What do you foresee in the future?


© L-com, Inc. All Rights Reserved. L-com, Inc., 50 High Street, West Mill, Third Floor, Suite 30, North Andover, MA 01845