SlideShare a Scribd company logo
1 of 12
© Copyright 2013 RF Code Inc.
All Rights Reserved
M240 Network Closet Reader
Network Closet Environmental Monitoring Bundle
April 24, 2013
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 2
M240 Network Closet Reader - Overview
• The M240 Network Closet Reader is an entry level device designed for distributed
network closet spaces.
• The M240 Reader supports a maximum of 20 RF Code Sensor Tags or Asset Tags.
• The M240 Reader supports the entire family of RF Code Asset Tags and Sensor
Tags.
 The ideal use of the M240 is environmental monitoring in IT / Network Closets.
• The M240 Reader is fully compatible with RF Code’s Asset Manager software and
Zone Manager middleware.
• The M240 Reader is simple to install:
 Wall or ceiling mount
 Multiple power options: POE, AC power brick, DC power connectors
• There is only a wired network version of the M240.
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 3
Network Closet Environmental Monitoring Bundle
• The Network Closet EM Bundle is enables the
monitoring of critical environmental conditions in
distributed network closets.
• The Network Closet EM Bundle consists of:
 One - M240 Network Closet Reader
 Two – R155 Humidity and Temperature Sensor Tags
 One – R150 Temperature Sensor Tag
 One – R120 Door Position Sensor Tag
• The Network Closet EM Bundle has a EMEA list
price of $995.00
• The M240 is only sold as part of the “Network Closet
EM Bundle”.
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 4
M240 Photos
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 5
M240 Network Closet Reader – Technical Specifications
• Support for a maximum of 20 Sensor Tags or Asset Tags
• Support for multiple simultaneous application connection
 Compatible with Asset Manager and Zone Manager software
• Typical read range of 50 to 75 feet LoS (line of sight) in a network closet
environment depending upon building construction.
 Dual Channel Radio Receivers equipped with helical antennae
• Full function Ethernet port (10 / 100, full duplex)
• Multiple Power Sources:
 Integrated POE (power-over-ethernet)
 External universal power supply (110/220 VAC)
 12 to 24 volt DC via bare wire connector Full function Ethernet port (10 / 100, full
duplex)
• USB A port for USB options
• USB B port for serial connectivity
• Support for Open API for direct reader integration
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 6
M240 Network Closet Reader FAQ – 1 of 4
Q1 – How is the M250 Reader different from the M250 Reader?
A1 – The M240 and M250 have similar physical characteristics and features.
However, the M240 is limited to only receiving data from the first 20 tags that it
finds.
Q2 – What happens when the M240 reaches it maximum of 20 tags?
A2 – Once the M240 finds the first 20 tags, it ignores all other tags that in
proximity to it.
Q3 – If I have more than 20 tags in proximity to the M240 Reader, can I assign
specific tags to it?
A3 – Yes. The M240 Reader supports the concept of a Tag Filter List or “white
list” which can be configured via the web interface on the reader. Once tags
are added to the Tag Filter List, only these tags will be observed and all others
will be ignored. The tag filter list must be administered on a reader by reader
basis.
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 7
M240 Network Closet Reader FAQ – 2 of 4
Q4 – Can the M240 Reader be utilized in a data center environment?
A4 – The M240 Reader is not designed for use in a data center environment.
The M240 reader has a limitation of 20 tags that it can observe. Data Center
environments typically have far more asset and/or sensor tags than 20.
Q5 – Can the M240 Reader be upgraded to the M250 Reader?
A5 – No, not at this time.
Q6 – Do all of the RF Code Sensor Tags work with the M240 Reader?
A6 – Yes, all types of RF Code Sensor Tags and Asset Tags work with the
M240.
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 8
M240 Network Closet Reader FAQ – 3 of 4
Q7 – Can I use Asset Tracking Tags with the M240 Reader?
A7 – Yes, but there are limitations. If the Tag Filter List feature of the M240 is
being utilized, the ability to track tags from one reader to the next will be
restricted and probably not produce the desired results. Contact RF Code for
more information on this topic.
Q8 – Is the M240 fully supported by RF Code’s Asset Manager and Zone
Manager applications?
A8 – Yes. The M240 is fully supported by Asset Manager, Sensor
Manager, and Zone Manager.
A9 – Does the M240 support Up Connect mode like the M250 Reader?
A9 – Yes, the M240 supports Up Connect Mode.
Q10 – Does the M240 Reader support encrypted network communications?
A10 – Yes, via HTTPS.
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 9
M240 Network Closet Reader FAQ – 4 of 4
Q11 – Can the M240 Reader be purchased by itself without the Network Closet
Bundle?
A11 – No.
Q12 – If more sensor tags are needed for monitoring my Network Closet, can
additional tags be added to the closet?
A12 – Yes, any of the RF Code Sensor Tags can be purchased and installed in
the Network Closet up to a maximum of 20 tags per M240 reader.
Q13 – How long does it take to deploy the Network Closet Reader Bundle?
A13 – Assuming the availability of network connectivity and power in the
closet, approximately about 30 minutes to configure the reader, deploy the
reader, and deploy the sensor tags.
Q14 – Can more than 1 M240 Reader be installed in a Network Closet?
A14 – Yes, but each reader must be managed and configured individually.
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 10
M240 Tag Filter List
• If the M240 Reader only “sees” the 20 or less tags in its closet, same
deployment pattern as the M250 today.
 If there is even the slightest chance, the M240 will see more than 20 tags, then
RF Code highly recommend configuration of the Tag Filter List or “white list”
• If the M240 Reader can see more than the 20 tags, then deploy the reader
using the same steps as the M250 plus the additional step of configuring the
Tag Filter List or “white list” via the Reader’s web interface
• How to configure the Tag Filter List or “white list”:
 Once the M240 reader is functional on the IP network, point a web
browser at the IP address of the reader.
 Under the “Configuration” section of the reader web UI, select “Tag
Filter”. Utilize the multi-line entry field to enter up to 20 tag ID’s (group
code + numeric).
 Save the configuration and close the web interface
 The M240 reader will now only observe the tags in the Tag Filter List
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 11
Asset Tracking & the M240
• Asset Tracking with the M240 may not be a viable solution if the
Tag Filter List or “white list” is enabled.
 Note: Operating the M240 without the Tag Filter List enabled, could
result in unpredictable results if more than 20 tags ever enter the read
range of the reader.
• Since the Tag Filter List only allows the M240 to observe a
specific list of tags, if a new tags comes into the range of the
M240 and is not in the Tag Filter List, the reader will never
report it.
• For configured tags in the M240 Tag Filter List, presence and
absence of presence (online / offline) can be reported.
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 12
Monitoring the Tag Capacity Used of the M240
• Just like the M250, the M240 Reader will
publish via its API the “Tag Capacity Used”
in a percentage.
 For an M240, the maximum number of tags
will be 20, so the percentage will be
number of tags seen divided by 20.
 If the Tag Filter List or “white list” is
configured, then the calculation will be the
“number of entries in the Tag Filter List”
divided by 20.
• The “Tag Capacity Used” is visible in ZM
and AM. In AM, thresholds can be
configured to warn users where they are
out of tag capacity on an M240.
• RF Code highly recommends configuring a
threshold on Tag Capacity Used on M240
Readers.

More Related Content

What's hot

Practical Examples of LoRaWAN in Action
Practical Examples of LoRaWAN in ActionPractical Examples of LoRaWAN in Action
Practical Examples of LoRaWAN in ActionRobin Harris
 
Key Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systemsKey Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systemsPratul Sharma
 
[CLASS 2014] Palestra Técnica - Ilan Barda
[CLASS 2014] Palestra Técnica - Ilan Barda[CLASS 2014] Palestra Técnica - Ilan Barda
[CLASS 2014] Palestra Técnica - Ilan BardaTI Safe
 
Uranium corporation of india ltd.
Uranium corporation of india ltd.Uranium corporation of india ltd.
Uranium corporation of india ltd.engineeringwatch
 
Track 4 session 1 - st dev con 2016 - body area network and sensor synchron...
Track 4   session 1 - st dev con 2016 - body area network and sensor synchron...Track 4   session 1 - st dev con 2016 - body area network and sensor synchron...
Track 4 session 1 - st dev con 2016 - body area network and sensor synchron...ST_World
 
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...ST_World
 
Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...IDES Editor
 
Link labs 2G 3G CDMA transition webinar slides
Link labs 2G 3G CDMA transition webinar slidesLink labs 2G 3G CDMA transition webinar slides
Link labs 2G 3G CDMA transition webinar slidesBrian Ray
 
Track 4 session 6 - st dev con 2016 - samsung artik
Track 4   session 6 - st dev con 2016 - samsung artikTrack 4   session 6 - st dev con 2016 - samsung artik
Track 4 session 6 - st dev con 2016 - samsung artikST_World
 
Sierra Monitor Corp overview 2015.r1
Sierra Monitor Corp overview 2015.r1Sierra Monitor Corp overview 2015.r1
Sierra Monitor Corp overview 2015.r1Eric W Dunn
 
Track 1 session 8 - st dev con 2016 - smart factories
Track 1   session 8 - st dev con 2016 -  smart factoriesTrack 1   session 8 - st dev con 2016 -  smart factories
Track 1 session 8 - st dev con 2016 - smart factoriesST_World
 
Get Smart with Cold Chain Monitoring Webinar
Get Smart with Cold Chain Monitoring WebinarGet Smart with Cold Chain Monitoring Webinar
Get Smart with Cold Chain Monitoring WebinarLaird Connectivity
 
Ble overview and_implementation
Ble overview and_implementationBle overview and_implementation
Ble overview and_implementationStanley Chang
 
Introduction to Bluetooth low energy
Introduction to Bluetooth low energyIntroduction to Bluetooth low energy
Introduction to Bluetooth low energyNEEVEE Technologies
 
Enhancing mobile apps in the public facing enterprise with the aruba meridian...
Enhancing mobile apps in the public facing enterprise with the aruba meridian...Enhancing mobile apps in the public facing enterprise with the aruba meridian...
Enhancing mobile apps in the public facing enterprise with the aruba meridian...Aruba, a Hewlett Packard Enterprise company
 
Protocols for internet of things
Protocols for internet of thingsProtocols for internet of things
Protocols for internet of thingsCharles Gibbons
 

What's hot (20)

Practical Examples of LoRaWAN in Action
Practical Examples of LoRaWAN in ActionPractical Examples of LoRaWAN in Action
Practical Examples of LoRaWAN in Action
 
Key Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systemsKey Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systems
 
[CLASS 2014] Palestra Técnica - Ilan Barda
[CLASS 2014] Palestra Técnica - Ilan Barda[CLASS 2014] Palestra Técnica - Ilan Barda
[CLASS 2014] Palestra Técnica - Ilan Barda
 
Uranium corporation of india ltd.
Uranium corporation of india ltd.Uranium corporation of india ltd.
Uranium corporation of india ltd.
 
Aruba ClearPass Exchange Deep Dive
Aruba ClearPass Exchange Deep DiveAruba ClearPass Exchange Deep Dive
Aruba ClearPass Exchange Deep Dive
 
Track 4 session 1 - st dev con 2016 - body area network and sensor synchron...
Track 4   session 1 - st dev con 2016 - body area network and sensor synchron...Track 4   session 1 - st dev con 2016 - body area network and sensor synchron...
Track 4 session 1 - st dev con 2016 - body area network and sensor synchron...
 
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
 
Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...
 
Link labs 2G 3G CDMA transition webinar slides
Link labs 2G 3G CDMA transition webinar slidesLink labs 2G 3G CDMA transition webinar slides
Link labs 2G 3G CDMA transition webinar slides
 
Track 4 session 6 - st dev con 2016 - samsung artik
Track 4   session 6 - st dev con 2016 - samsung artikTrack 4   session 6 - st dev con 2016 - samsung artik
Track 4 session 6 - st dev con 2016 - samsung artik
 
Sierra Monitor Corp overview 2015.r1
Sierra Monitor Corp overview 2015.r1Sierra Monitor Corp overview 2015.r1
Sierra Monitor Corp overview 2015.r1
 
Track 1 session 8 - st dev con 2016 - smart factories
Track 1   session 8 - st dev con 2016 -  smart factoriesTrack 1   session 8 - st dev con 2016 -  smart factories
Track 1 session 8 - st dev con 2016 - smart factories
 
Get Smart with Cold Chain Monitoring Webinar
Get Smart with Cold Chain Monitoring WebinarGet Smart with Cold Chain Monitoring Webinar
Get Smart with Cold Chain Monitoring Webinar
 
Ble overview and_implementation
Ble overview and_implementationBle overview and_implementation
Ble overview and_implementation
 
Introduction to Bluetooth low energy
Introduction to Bluetooth low energyIntroduction to Bluetooth low energy
Introduction to Bluetooth low energy
 
Enhancing mobile apps in the public facing enterprise with the aruba meridian...
Enhancing mobile apps in the public facing enterprise with the aruba meridian...Enhancing mobile apps in the public facing enterprise with the aruba meridian...
Enhancing mobile apps in the public facing enterprise with the aruba meridian...
 
Protocols for internet of things
Protocols for internet of thingsProtocols for internet of things
Protocols for internet of things
 
Working with mobile app developers to enable indoor location based services
Working with mobile app developers to enable indoor location based servicesWorking with mobile app developers to enable indoor location based services
Working with mobile app developers to enable indoor location based services
 
Wi-Fi Security Fundamentals
Wi-Fi Security FundamentalsWi-Fi Security Fundamentals
Wi-Fi Security Fundamentals
 
Getting the most out of the aruba policy enforcement firewall
Getting the most out of the aruba policy enforcement firewallGetting the most out of the aruba policy enforcement firewall
Getting the most out of the aruba policy enforcement firewall
 

Similar to M240 reader-bundle for environmental monitoring in IT / Network Closets.

What is LoRaWaN
What is LoRaWaNWhat is LoRaWaN
What is LoRaWaNTom Zamir
 
What is LoRaWAN_Tom Zamir_IoT Expert
What is LoRaWAN_Tom Zamir_IoT ExpertWhat is LoRaWAN_Tom Zamir_IoT Expert
What is LoRaWAN_Tom Zamir_IoT ExpertGuy Vinograd ☁
 
IRJET- RFID based Authentication and Access of Vehicles
IRJET-  	  RFID based Authentication and Access of VehiclesIRJET-  	  RFID based Authentication and Access of Vehicles
IRJET- RFID based Authentication and Access of VehiclesIRJET Journal
 
Ccna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 AnswersCcna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 Answersccna4discovery
 
Internet of Things (IoT) Applicability in a Metropolitan City
Internet of Things (IoT) Applicability in a Metropolitan CityInternet of Things (IoT) Applicability in a Metropolitan City
Internet of Things (IoT) Applicability in a Metropolitan CityEswar Publications
 
Ptcl modem (user manual)
Ptcl modem (user manual)Ptcl modem (user manual)
Ptcl modem (user manual)Ali Usman
 
Mavenir: OpenRAN – What It Is and What It Means for Rural Operators
Mavenir: OpenRAN – What It Is and What It Means for Rural OperatorsMavenir: OpenRAN – What It Is and What It Means for Rural Operators
Mavenir: OpenRAN – What It Is and What It Means for Rural OperatorsMavenir
 
Aruba 310 Series Access Point Data Sheet
Aruba 310 Series Access Point Data SheetAruba 310 Series Access Point Data Sheet
Aruba 310 Series Access Point Data Sheet美兰 曾
 
The feature of huawei ma5600
The feature of huawei ma5600The feature of huawei ma5600
The feature of huawei ma5600Huanetwork
 
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
Monitoring and Centering a Remote Discrete Using Rfid through Sim Moduleinventionjournals
 
Webinar: Tecnologia LoRa – Do dispositivo à nuvem
Webinar: Tecnologia LoRa – Do dispositivo à nuvemWebinar: Tecnologia LoRa – Do dispositivo à nuvem
Webinar: Tecnologia LoRa – Do dispositivo à nuvemEmbarcados
 
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMAyush Dixit
 
Yeastar Technical Training Course
Yeastar Technical Training CourseYeastar Technical Training Course
Yeastar Technical Training CourseHossein Yavari
 

Similar to M240 reader-bundle for environmental monitoring in IT / Network Closets. (20)

What is LoRaWaN
What is LoRaWaNWhat is LoRaWaN
What is LoRaWaN
 
What is LoRaWAN_Tom Zamir_IoT Expert
What is LoRaWAN_Tom Zamir_IoT ExpertWhat is LoRaWAN_Tom Zamir_IoT Expert
What is LoRaWAN_Tom Zamir_IoT Expert
 
IRJET- RFID based Authentication and Access of Vehicles
IRJET-  	  RFID based Authentication and Access of VehiclesIRJET-  	  RFID based Authentication and Access of Vehicles
IRJET- RFID based Authentication and Access of Vehicles
 
Ccna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 AnswersCcna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 Answers
 
Apds --ata03001 aen
Apds --ata03001 aenApds --ata03001 aen
Apds --ata03001 aen
 
Rfid
RfidRfid
Rfid
 
Internet of Things (IoT) Applicability in a Metropolitan City
Internet of Things (IoT) Applicability in a Metropolitan CityInternet of Things (IoT) Applicability in a Metropolitan City
Internet of Things (IoT) Applicability in a Metropolitan City
 
Ptcl modem (user manual)
Ptcl modem (user manual)Ptcl modem (user manual)
Ptcl modem (user manual)
 
Ptcl Modem User Manual
Ptcl Modem User Manual Ptcl Modem User Manual
Ptcl Modem User Manual
 
LAN Proposal
LAN Proposal LAN Proposal
LAN Proposal
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 
Mavenir: OpenRAN – What It Is and What It Means for Rural Operators
Mavenir: OpenRAN – What It Is and What It Means for Rural OperatorsMavenir: OpenRAN – What It Is and What It Means for Rural Operators
Mavenir: OpenRAN – What It Is and What It Means for Rural Operators
 
Aruba 310 Series Access Point Data Sheet
Aruba 310 Series Access Point Data SheetAruba 310 Series Access Point Data Sheet
Aruba 310 Series Access Point Data Sheet
 
LCG-300 Industrial LoRaWAN Gateway
LCG-300 Industrial LoRaWAN GatewayLCG-300 Industrial LoRaWAN Gateway
LCG-300 Industrial LoRaWAN Gateway
 
The feature of huawei ma5600
The feature of huawei ma5600The feature of huawei ma5600
The feature of huawei ma5600
 
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
 
Webinar: Tecnologia LoRa – Do dispositivo à nuvem
Webinar: Tecnologia LoRa – Do dispositivo à nuvemWebinar: Tecnologia LoRa – Do dispositivo à nuvem
Webinar: Tecnologia LoRa – Do dispositivo à nuvem
 
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM
 
Yeastar Technical Training Course
Yeastar Technical Training CourseYeastar Technical Training Course
Yeastar Technical Training Course
 
1.pptx
1.pptx1.pptx
1.pptx
 

Recently uploaded

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 

Recently uploaded (20)

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

M240 reader-bundle for environmental monitoring in IT / Network Closets.

  • 1. © Copyright 2013 RF Code Inc. All Rights Reserved M240 Network Closet Reader Network Closet Environmental Monitoring Bundle April 24, 2013
  • 2. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 2 M240 Network Closet Reader - Overview • The M240 Network Closet Reader is an entry level device designed for distributed network closet spaces. • The M240 Reader supports a maximum of 20 RF Code Sensor Tags or Asset Tags. • The M240 Reader supports the entire family of RF Code Asset Tags and Sensor Tags.  The ideal use of the M240 is environmental monitoring in IT / Network Closets. • The M240 Reader is fully compatible with RF Code’s Asset Manager software and Zone Manager middleware. • The M240 Reader is simple to install:  Wall or ceiling mount  Multiple power options: POE, AC power brick, DC power connectors • There is only a wired network version of the M240.
  • 3. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 3 Network Closet Environmental Monitoring Bundle • The Network Closet EM Bundle is enables the monitoring of critical environmental conditions in distributed network closets. • The Network Closet EM Bundle consists of:  One - M240 Network Closet Reader  Two – R155 Humidity and Temperature Sensor Tags  One – R150 Temperature Sensor Tag  One – R120 Door Position Sensor Tag • The Network Closet EM Bundle has a EMEA list price of $995.00 • The M240 is only sold as part of the “Network Closet EM Bundle”.
  • 4. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 4 M240 Photos
  • 5. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 5 M240 Network Closet Reader – Technical Specifications • Support for a maximum of 20 Sensor Tags or Asset Tags • Support for multiple simultaneous application connection  Compatible with Asset Manager and Zone Manager software • Typical read range of 50 to 75 feet LoS (line of sight) in a network closet environment depending upon building construction.  Dual Channel Radio Receivers equipped with helical antennae • Full function Ethernet port (10 / 100, full duplex) • Multiple Power Sources:  Integrated POE (power-over-ethernet)  External universal power supply (110/220 VAC)  12 to 24 volt DC via bare wire connector Full function Ethernet port (10 / 100, full duplex) • USB A port for USB options • USB B port for serial connectivity • Support for Open API for direct reader integration
  • 6. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 6 M240 Network Closet Reader FAQ – 1 of 4 Q1 – How is the M250 Reader different from the M250 Reader? A1 – The M240 and M250 have similar physical characteristics and features. However, the M240 is limited to only receiving data from the first 20 tags that it finds. Q2 – What happens when the M240 reaches it maximum of 20 tags? A2 – Once the M240 finds the first 20 tags, it ignores all other tags that in proximity to it. Q3 – If I have more than 20 tags in proximity to the M240 Reader, can I assign specific tags to it? A3 – Yes. The M240 Reader supports the concept of a Tag Filter List or “white list” which can be configured via the web interface on the reader. Once tags are added to the Tag Filter List, only these tags will be observed and all others will be ignored. The tag filter list must be administered on a reader by reader basis.
  • 7. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 7 M240 Network Closet Reader FAQ – 2 of 4 Q4 – Can the M240 Reader be utilized in a data center environment? A4 – The M240 Reader is not designed for use in a data center environment. The M240 reader has a limitation of 20 tags that it can observe. Data Center environments typically have far more asset and/or sensor tags than 20. Q5 – Can the M240 Reader be upgraded to the M250 Reader? A5 – No, not at this time. Q6 – Do all of the RF Code Sensor Tags work with the M240 Reader? A6 – Yes, all types of RF Code Sensor Tags and Asset Tags work with the M240.
  • 8. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 8 M240 Network Closet Reader FAQ – 3 of 4 Q7 – Can I use Asset Tracking Tags with the M240 Reader? A7 – Yes, but there are limitations. If the Tag Filter List feature of the M240 is being utilized, the ability to track tags from one reader to the next will be restricted and probably not produce the desired results. Contact RF Code for more information on this topic. Q8 – Is the M240 fully supported by RF Code’s Asset Manager and Zone Manager applications? A8 – Yes. The M240 is fully supported by Asset Manager, Sensor Manager, and Zone Manager. A9 – Does the M240 support Up Connect mode like the M250 Reader? A9 – Yes, the M240 supports Up Connect Mode. Q10 – Does the M240 Reader support encrypted network communications? A10 – Yes, via HTTPS.
  • 9. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 9 M240 Network Closet Reader FAQ – 4 of 4 Q11 – Can the M240 Reader be purchased by itself without the Network Closet Bundle? A11 – No. Q12 – If more sensor tags are needed for monitoring my Network Closet, can additional tags be added to the closet? A12 – Yes, any of the RF Code Sensor Tags can be purchased and installed in the Network Closet up to a maximum of 20 tags per M240 reader. Q13 – How long does it take to deploy the Network Closet Reader Bundle? A13 – Assuming the availability of network connectivity and power in the closet, approximately about 30 minutes to configure the reader, deploy the reader, and deploy the sensor tags. Q14 – Can more than 1 M240 Reader be installed in a Network Closet? A14 – Yes, but each reader must be managed and configured individually.
  • 10. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 10 M240 Tag Filter List • If the M240 Reader only “sees” the 20 or less tags in its closet, same deployment pattern as the M250 today.  If there is even the slightest chance, the M240 will see more than 20 tags, then RF Code highly recommend configuration of the Tag Filter List or “white list” • If the M240 Reader can see more than the 20 tags, then deploy the reader using the same steps as the M250 plus the additional step of configuring the Tag Filter List or “white list” via the Reader’s web interface • How to configure the Tag Filter List or “white list”:  Once the M240 reader is functional on the IP network, point a web browser at the IP address of the reader.  Under the “Configuration” section of the reader web UI, select “Tag Filter”. Utilize the multi-line entry field to enter up to 20 tag ID’s (group code + numeric).  Save the configuration and close the web interface  The M240 reader will now only observe the tags in the Tag Filter List
  • 11. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 11 Asset Tracking & the M240 • Asset Tracking with the M240 may not be a viable solution if the Tag Filter List or “white list” is enabled.  Note: Operating the M240 without the Tag Filter List enabled, could result in unpredictable results if more than 20 tags ever enter the read range of the reader. • Since the Tag Filter List only allows the M240 to observe a specific list of tags, if a new tags comes into the range of the M240 and is not in the Tag Filter List, the reader will never report it. • For configured tags in the M240 Tag Filter List, presence and absence of presence (online / offline) can be reported.
  • 12. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 12 Monitoring the Tag Capacity Used of the M240 • Just like the M250, the M240 Reader will publish via its API the “Tag Capacity Used” in a percentage.  For an M240, the maximum number of tags will be 20, so the percentage will be number of tags seen divided by 20.  If the Tag Filter List or “white list” is configured, then the calculation will be the “number of entries in the Tag Filter List” divided by 20. • The “Tag Capacity Used” is visible in ZM and AM. In AM, thresholds can be configured to warn users where they are out of tag capacity on an M240. • RF Code highly recommends configuring a threshold on Tag Capacity Used on M240 Readers.