Core Design Focus – Environmentally Hardened<br />Wide operating range: -40°C to 75°C (-40°F to 167°F)<br />High electrostatic discharge immunity & surge protection<br />Redundant Power – Term Block inputs & locking DC jack<br />Interference Protection (EMI / RFI)<br />Beyond-Industrial-Grade Certifications<br />High Shake, Rattle & Roll Tolerances<br />Fast Link-Fault Recovery for seamless network operations <br />
Environmentally Hardened Devices - Markets<br />Cost versus Feature analysis – Environment is a Feature<br />Environmental factors – heat/cold, dust, vibration, interference<br />Any user that requires a step above approach to device design, build and support<br />Edge to End Quality – not just the environment<br />Hardened typically equates to higher quality<br />Front loaded cost > Back End higher ROI<br />
Edge to End Solutions<br />Backbone Switch<br />Managed Field Switch<br />Un-managed Field Switch<br />Ethernet Switches<br />Serial-to-Ethernet <br />Intelligent Ethernet<br />GbE Converter<br />Fiber to Cat5/6<br />PoE Converter<br />Media Conversion<br />Ethernet Extender <br />over Coax / STP<br />Small Form Factor<br />
Designed for ITS – Hardened Ethernet<br />Versatile / Flexible / Robust<br />EX71000<br /><ul><li>IEC61850-3 & IEEE1613
Managed Devices<br />Allows more control over your LAN traffic and offer advanced features to control that traffic; enables port configuration, prioritize traffic, create VLAN’s, bandwidth allocation per port, access & security, etc.<br />Advantages<br /><ul><li>Highly robust management features
Total Cost of Ownership can be reduced by creating VLANs (increasing port footprint)
Aggregated bandwidth across the network can be controlled
Port and User security is addressed and maintained</li></ul>Disadvantages<br /><ul><li>Cost is typically higher than an un-managed or web-managed device
Requires more technical knowledge of the user to deploy and maintain
Can be large and highly complex as network scales</li></li></ul><li>Managed Devices – Features<br /><ul><li>α-ring
Designed to overcome traditional STP and RSTP’s inability to provide fast network recovery and minimize packet loss caused by link failure. α-ring sets the LAST connection as the backup path – ensures no additional packet loss when the ring is restored in < 15ms.
Management tool used for collecting information from, and configuring network devices on an IP network. Use to monitor network performance, detect faults or unauthorized access with minimal impact on network traffic.
Used to send a copy of network packets seen on one switch (or an entire VLAN) to a network monitoring connection on another switch. Commonly used for network appliances (typically a thin client) that require monitoring of network traffic, such as an intrusion detection system.</li></li></ul><li>Managed Devices – Features<br /><ul><li>802.1D STP
Basic function is to prevent bridge loops and broadcast storm(s). Creates spanning tree within a mesh network of connected Layer 2 devices, disables those links that are not part of the spanning tree, leaving a single active path between any two network nodes. Can take 30-50 seconds to respond to a topology change.
IGMP (Snooping – most requested feature in security applications)
Only need for IPv4, IGMP is a communications protocol that is used to manage the membership of IP multicast groups (but does not act as a transport protocol – analogous to ICMP for unicast connections. It allows more efficient utilization of network resources when supporting applications such as streaming video
RADIUS is a networking protocol that provides centralized Authentication, Authorization and Accounting (AAA) to allow users access and usage of network resources. EtherWAN’s managed devices support RADIUS processes</li></li></ul><li>Managed Devices – Features<br /><ul><li>CLI
Command Line Interface – integral to remote device setup, management and troubleshooting
Network protocol that provides an authentication mechanism to devices wishing to attach to a LAN or WLAN, and involves three components: a supplicant, an authenticator (Ethernet switch), and an authentication server. The authenticator acts as a security guard to a protected network area
Allows the user to limit the bit rate on a port by port basis. This is sometimes used to limit the bit rate for a streaming device such as a CCTV camera to prevent it from flooding the network in the event that it malfunctions.
Partner integration</li></li></ul><li>Why EtherWAN<br />From Concept to Deployment <br />Strategic & Intellectual Focus on the ITS market<br />Quality Focus – from the factory to the End User<br />Niche – Industrial and Hardened Ethernet devices<br />Design Capabilities – agile and fast to market<br />Education – Ethernet 101, ESA approved series for CEs<br />Field support – Regional Manager, FAE<br /> Value<br />High MTBF devices provide greater long term ROI for the network manager<br />Hardened devices provide greater margin value to EtherWAN partners<br />