SlideShare a Scribd company logo
© Copyright 2013 RF Code Inc.
All Rights Reserved
M240 Network Closet Reader
Network Closet Environmental Monitoring Bundle
April 24, 2013
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 2
M240 Network Closet Reader - Overview
• The M240 Network Closet Reader is an entry level device designed for distributed
network closet spaces.
• The M240 Reader supports a maximum of 20 RF Code Sensor Tags or Asset Tags.
• The M240 Reader supports the entire family of RF Code Asset Tags and Sensor
Tags.
 The ideal use of the M240 is environmental monitoring in IT / Network Closets.
• The M240 Reader is fully compatible with RF Code’s Asset Manager software and
Zone Manager middleware.
• The M240 Reader is simple to install:
 Wall or ceiling mount
 Multiple power options: POE, AC power brick, DC power connectors
• There is only a wired network version of the M240.
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 3
Network Closet Environmental Monitoring Bundle
• The Network Closet EM Bundle is enables the
monitoring of critical environmental conditions in
distributed network closets.
• The Network Closet EM Bundle consists of:
 One - M240 Network Closet Reader
 Two – R155 Humidity and Temperature Sensor Tags
 One – R150 Temperature Sensor Tag
 One – R120 Door Position Sensor Tag
• The Network Closet EM Bundle has a EMEA list
price of $995.00
• The M240 is only sold as part of the “Network Closet
EM Bundle”.
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 4
M240 Photos
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 5
M240 Network Closet Reader – Technical Specifications
• Support for a maximum of 20 Sensor Tags or Asset Tags
• Support for multiple simultaneous application connection
 Compatible with Asset Manager and Zone Manager software
• Typical read range of 50 to 75 feet LoS (line of sight) in a network closet
environment depending upon building construction.
 Dual Channel Radio Receivers equipped with helical antennae
• Full function Ethernet port (10 / 100, full duplex)
• Multiple Power Sources:
 Integrated POE (power-over-ethernet)
 External universal power supply (110/220 VAC)
 12 to 24 volt DC via bare wire connector Full function Ethernet port (10 / 100, full
duplex)
• USB A port for USB options
• USB B port for serial connectivity
• Support for Open API for direct reader integration
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 6
M240 Network Closet Reader FAQ – 1 of 4
Q1 – How is the M250 Reader different from the M250 Reader?
A1 – The M240 and M250 have similar physical characteristics and features.
However, the M240 is limited to only receiving data from the first 20 tags that it
finds.
Q2 – What happens when the M240 reaches it maximum of 20 tags?
A2 – Once the M240 finds the first 20 tags, it ignores all other tags that in
proximity to it.
Q3 – If I have more than 20 tags in proximity to the M240 Reader, can I assign
specific tags to it?
A3 – Yes. The M240 Reader supports the concept of a Tag Filter List or “white
list” which can be configured via the web interface on the reader. Once tags
are added to the Tag Filter List, only these tags will be observed and all others
will be ignored. The tag filter list must be administered on a reader by reader
basis.
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 7
M240 Network Closet Reader FAQ – 2 of 4
Q4 – Can the M240 Reader be utilized in a data center environment?
A4 – The M240 Reader is not designed for use in a data center environment.
The M240 reader has a limitation of 20 tags that it can observe. Data Center
environments typically have far more asset and/or sensor tags than 20.
Q5 – Can the M240 Reader be upgraded to the M250 Reader?
A5 – No, not at this time.
Q6 – Do all of the RF Code Sensor Tags work with the M240 Reader?
A6 – Yes, all types of RF Code Sensor Tags and Asset Tags work with the
M240.
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 8
M240 Network Closet Reader FAQ – 3 of 4
Q7 – Can I use Asset Tracking Tags with the M240 Reader?
A7 – Yes, but there are limitations. If the Tag Filter List feature of the M240 is
being utilized, the ability to track tags from one reader to the next will be
restricted and probably not produce the desired results. Contact RF Code for
more information on this topic.
Q8 – Is the M240 fully supported by RF Code’s Asset Manager and Zone
Manager applications?
A8 – Yes. The M240 is fully supported by Asset Manager, Sensor
Manager, and Zone Manager.
A9 – Does the M240 support Up Connect mode like the M250 Reader?
A9 – Yes, the M240 supports Up Connect Mode.
Q10 – Does the M240 Reader support encrypted network communications?
A10 – Yes, via HTTPS.
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 9
M240 Network Closet Reader FAQ – 4 of 4
Q11 – Can the M240 Reader be purchased by itself without the Network Closet
Bundle?
A11 – No.
Q12 – If more sensor tags are needed for monitoring my Network Closet, can
additional tags be added to the closet?
A12 – Yes, any of the RF Code Sensor Tags can be purchased and installed in
the Network Closet up to a maximum of 20 tags per M240 reader.
Q13 – How long does it take to deploy the Network Closet Reader Bundle?
A13 – Assuming the availability of network connectivity and power in the
closet, approximately about 30 minutes to configure the reader, deploy the
reader, and deploy the sensor tags.
Q14 – Can more than 1 M240 Reader be installed in a Network Closet?
A14 – Yes, but each reader must be managed and configured individually.
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 10
M240 Tag Filter List
• If the M240 Reader only “sees” the 20 or less tags in its closet, same
deployment pattern as the M250 today.
 If there is even the slightest chance, the M240 will see more than 20 tags, then
RF Code highly recommend configuration of the Tag Filter List or “white list”
• If the M240 Reader can see more than the 20 tags, then deploy the reader
using the same steps as the M250 plus the additional step of configuring the
Tag Filter List or “white list” via the Reader’s web interface
• How to configure the Tag Filter List or “white list”:
 Once the M240 reader is functional on the IP network, point a web
browser at the IP address of the reader.
 Under the “Configuration” section of the reader web UI, select “Tag
Filter”. Utilize the multi-line entry field to enter up to 20 tag ID’s (group
code + numeric).
 Save the configuration and close the web interface
 The M240 reader will now only observe the tags in the Tag Filter List
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 11
Asset Tracking & the M240
• Asset Tracking with the M240 may not be a viable solution if the
Tag Filter List or “white list” is enabled.
 Note: Operating the M240 without the Tag Filter List enabled, could
result in unpredictable results if more than 20 tags ever enter the read
range of the reader.
• Since the Tag Filter List only allows the M240 to observe a
specific list of tags, if a new tags comes into the range of the
M240 and is not in the Tag Filter List, the reader will never
report it.
• For configured tags in the M240 Tag Filter List, presence and
absence of presence (online / offline) can be reported.
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 12
Monitoring the Tag Capacity Used of the M240
• Just like the M250, the M240 Reader will
publish via its API the “Tag Capacity Used”
in a percentage.
 For an M240, the maximum number of tags
will be 20, so the percentage will be
number of tags seen divided by 20.
 If the Tag Filter List or “white list” is
configured, then the calculation will be the
“number of entries in the Tag Filter List”
divided by 20.
• The “Tag Capacity Used” is visible in ZM
and AM. In AM, thresholds can be
configured to warn users where they are
out of tag capacity on an M240.
• RF Code highly recommends configuring a
threshold on Tag Capacity Used on M240
Readers.

More Related Content

What's hot

Practical Examples of LoRaWAN in Action
Practical Examples of LoRaWAN in ActionPractical Examples of LoRaWAN in Action
Practical Examples of LoRaWAN in Action
Robin Harris
 
Key Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systemsKey Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systems
Pratul Sharma
 
[CLASS 2014] Palestra Técnica - Ilan Barda
[CLASS 2014] Palestra Técnica - Ilan Barda[CLASS 2014] Palestra Técnica - Ilan Barda
[CLASS 2014] Palestra Técnica - Ilan Barda
TI Safe
 
Uranium corporation of india ltd.
Uranium corporation of india ltd.Uranium corporation of india ltd.
Uranium corporation of india ltd.
engineeringwatch
 
Aruba ClearPass Exchange Deep Dive
Aruba ClearPass Exchange Deep DiveAruba ClearPass Exchange Deep Dive
Aruba ClearPass Exchange Deep Dive
Aruba, a Hewlett Packard Enterprise company
 
Track 4 session 1 - st dev con 2016 - body area network and sensor synchron...
Track 4   session 1 - st dev con 2016 - body area network and sensor synchron...Track 4   session 1 - st dev con 2016 - body area network and sensor synchron...
Track 4 session 1 - st dev con 2016 - body area network and sensor synchron...
ST_World
 
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
ST_World
 
Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...
IDES Editor
 
Link labs 2G 3G CDMA transition webinar slides
Link labs 2G 3G CDMA transition webinar slidesLink labs 2G 3G CDMA transition webinar slides
Link labs 2G 3G CDMA transition webinar slides
Brian Ray
 
Track 4 session 6 - st dev con 2016 - samsung artik
Track 4   session 6 - st dev con 2016 - samsung artikTrack 4   session 6 - st dev con 2016 - samsung artik
Track 4 session 6 - st dev con 2016 - samsung artik
ST_World
 
Sierra Monitor Corp overview 2015.r1
Sierra Monitor Corp overview 2015.r1Sierra Monitor Corp overview 2015.r1
Sierra Monitor Corp overview 2015.r1
Eric W Dunn
 
Track 1 session 8 - st dev con 2016 - smart factories
Track 1   session 8 - st dev con 2016 -  smart factoriesTrack 1   session 8 - st dev con 2016 -  smart factories
Track 1 session 8 - st dev con 2016 - smart factories
ST_World
 
Get Smart with Cold Chain Monitoring Webinar
Get Smart with Cold Chain Monitoring WebinarGet Smart with Cold Chain Monitoring Webinar
Get Smart with Cold Chain Monitoring Webinar
Laird Connectivity
 
Ble overview and_implementation
Ble overview and_implementationBle overview and_implementation
Ble overview and_implementation
Stanley Chang
 
Introduction to Bluetooth low energy
Introduction to Bluetooth low energyIntroduction to Bluetooth low energy
Introduction to Bluetooth low energy
NEEVEE Technologies
 
Enhancing mobile apps in the public facing enterprise with the aruba meridian...
Enhancing mobile apps in the public facing enterprise with the aruba meridian...Enhancing mobile apps in the public facing enterprise with the aruba meridian...
Enhancing mobile apps in the public facing enterprise with the aruba meridian...
Aruba, a Hewlett Packard Enterprise company
 
Protocols for internet of things
Protocols for internet of thingsProtocols for internet of things
Protocols for internet of things
Charles Gibbons
 
Working with mobile app developers to enable indoor location based services
Working with mobile app developers to enable indoor location based servicesWorking with mobile app developers to enable indoor location based services
Working with mobile app developers to enable indoor location based services
Aruba, a Hewlett Packard Enterprise company
 
Wi-Fi Security Fundamentals
Wi-Fi Security FundamentalsWi-Fi Security Fundamentals
Wi-Fi Security Fundamentals
Aruba, a Hewlett Packard Enterprise company
 
Getting the most out of the aruba policy enforcement firewall
Getting the most out of the aruba policy enforcement firewallGetting the most out of the aruba policy enforcement firewall
Getting the most out of the aruba policy enforcement firewall
Aruba, a Hewlett Packard Enterprise company
 

What's hot (20)

Practical Examples of LoRaWAN in Action
Practical Examples of LoRaWAN in ActionPractical Examples of LoRaWAN in Action
Practical Examples of LoRaWAN in Action
 
Key Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systemsKey Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systems
 
[CLASS 2014] Palestra Técnica - Ilan Barda
[CLASS 2014] Palestra Técnica - Ilan Barda[CLASS 2014] Palestra Técnica - Ilan Barda
[CLASS 2014] Palestra Técnica - Ilan Barda
 
Uranium corporation of india ltd.
Uranium corporation of india ltd.Uranium corporation of india ltd.
Uranium corporation of india ltd.
 
Aruba ClearPass Exchange Deep Dive
Aruba ClearPass Exchange Deep DiveAruba ClearPass Exchange Deep Dive
Aruba ClearPass Exchange Deep Dive
 
Track 4 session 1 - st dev con 2016 - body area network and sensor synchron...
Track 4   session 1 - st dev con 2016 - body area network and sensor synchron...Track 4   session 1 - st dev con 2016 - body area network and sensor synchron...
Track 4 session 1 - st dev con 2016 - body area network and sensor synchron...
 
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
 
Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...
 
Link labs 2G 3G CDMA transition webinar slides
Link labs 2G 3G CDMA transition webinar slidesLink labs 2G 3G CDMA transition webinar slides
Link labs 2G 3G CDMA transition webinar slides
 
Track 4 session 6 - st dev con 2016 - samsung artik
Track 4   session 6 - st dev con 2016 - samsung artikTrack 4   session 6 - st dev con 2016 - samsung artik
Track 4 session 6 - st dev con 2016 - samsung artik
 
Sierra Monitor Corp overview 2015.r1
Sierra Monitor Corp overview 2015.r1Sierra Monitor Corp overview 2015.r1
Sierra Monitor Corp overview 2015.r1
 
Track 1 session 8 - st dev con 2016 - smart factories
Track 1   session 8 - st dev con 2016 -  smart factoriesTrack 1   session 8 - st dev con 2016 -  smart factories
Track 1 session 8 - st dev con 2016 - smart factories
 
Get Smart with Cold Chain Monitoring Webinar
Get Smart with Cold Chain Monitoring WebinarGet Smart with Cold Chain Monitoring Webinar
Get Smart with Cold Chain Monitoring Webinar
 
Ble overview and_implementation
Ble overview and_implementationBle overview and_implementation
Ble overview and_implementation
 
Introduction to Bluetooth low energy
Introduction to Bluetooth low energyIntroduction to Bluetooth low energy
Introduction to Bluetooth low energy
 
Enhancing mobile apps in the public facing enterprise with the aruba meridian...
Enhancing mobile apps in the public facing enterprise with the aruba meridian...Enhancing mobile apps in the public facing enterprise with the aruba meridian...
Enhancing mobile apps in the public facing enterprise with the aruba meridian...
 
Protocols for internet of things
Protocols for internet of thingsProtocols for internet of things
Protocols for internet of things
 
Working with mobile app developers to enable indoor location based services
Working with mobile app developers to enable indoor location based servicesWorking with mobile app developers to enable indoor location based services
Working with mobile app developers to enable indoor location based services
 
Wi-Fi Security Fundamentals
Wi-Fi Security FundamentalsWi-Fi Security Fundamentals
Wi-Fi Security Fundamentals
 
Getting the most out of the aruba policy enforcement firewall
Getting the most out of the aruba policy enforcement firewallGetting the most out of the aruba policy enforcement firewall
Getting the most out of the aruba policy enforcement firewall
 

Similar to M240 reader-bundle for environmental monitoring in IT / Network Closets.

What is LoRaWaN
What is LoRaWaNWhat is LoRaWaN
What is LoRaWaN
Tom Zamir
 
What is LoRaWAN_Tom Zamir_IoT Expert
What is LoRaWAN_Tom Zamir_IoT ExpertWhat is LoRaWAN_Tom Zamir_IoT Expert
What is LoRaWAN_Tom Zamir_IoT Expert
Guy Vinograd ☁
 
IRJET- RFID based Authentication and Access of Vehicles
IRJET-  	  RFID based Authentication and Access of VehiclesIRJET-  	  RFID based Authentication and Access of Vehicles
IRJET- RFID based Authentication and Access of Vehicles
IRJET Journal
 
Ccna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 AnswersCcna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 Answers
ccna4discovery
 
Apds --ata03001 aen
Apds --ata03001 aenApds --ata03001 aen
Apds --ata03001 aen
Arvind Balaji
 
Rfid
RfidRfid
Internet of Things (IoT) Applicability in a Metropolitan City
Internet of Things (IoT) Applicability in a Metropolitan CityInternet of Things (IoT) Applicability in a Metropolitan City
Internet of Things (IoT) Applicability in a Metropolitan City
Eswar Publications
 
Ptcl modem (user manual)
Ptcl modem (user manual)Ptcl modem (user manual)
Ptcl modem (user manual)
Ali Usman
 
Ptcl Modem User Manual
Ptcl Modem User Manual Ptcl Modem User Manual
Ptcl Modem User Manual
Mohammad Qureshi
 
LAN Proposal
LAN Proposal LAN Proposal
LAN Proposal
Niva tharan
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
Anal Mandal
 
Mavenir: OpenRAN – What It Is and What It Means for Rural Operators
Mavenir: OpenRAN – What It Is and What It Means for Rural OperatorsMavenir: OpenRAN – What It Is and What It Means for Rural Operators
Mavenir: OpenRAN – What It Is and What It Means for Rural Operators
Mavenir
 
Aruba 310 Series Access Point Data Sheet
Aruba 310 Series Access Point Data SheetAruba 310 Series Access Point Data Sheet
Aruba 310 Series Access Point Data Sheet
美兰 曾
 
LCG-300 Industrial LoRaWAN Gateway
LCG-300 Industrial LoRaWAN GatewayLCG-300 Industrial LoRaWAN Gateway
LCG-300 Industrial LoRaWAN Gateway
BluBoxx Communication Pvt. ltd
 
The feature of huawei ma5600
The feature of huawei ma5600The feature of huawei ma5600
The feature of huawei ma5600
Huanetwork
 
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
inventionjournals
 
Webinar: Tecnologia LoRa – Do dispositivo à nuvem
Webinar: Tecnologia LoRa – Do dispositivo à nuvemWebinar: Tecnologia LoRa – Do dispositivo à nuvem
Webinar: Tecnologia LoRa – Do dispositivo à nuvem
Embarcados
 
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM
Ayush Dixit
 
Yeastar Technical Training Course
Yeastar Technical Training CourseYeastar Technical Training Course
Yeastar Technical Training Course
Hossein Yavari
 
1.pptx
1.pptx1.pptx

Similar to M240 reader-bundle for environmental monitoring in IT / Network Closets. (20)

What is LoRaWaN
What is LoRaWaNWhat is LoRaWaN
What is LoRaWaN
 
What is LoRaWAN_Tom Zamir_IoT Expert
What is LoRaWAN_Tom Zamir_IoT ExpertWhat is LoRaWAN_Tom Zamir_IoT Expert
What is LoRaWAN_Tom Zamir_IoT Expert
 
IRJET- RFID based Authentication and Access of Vehicles
IRJET-  	  RFID based Authentication and Access of VehiclesIRJET-  	  RFID based Authentication and Access of Vehicles
IRJET- RFID based Authentication and Access of Vehicles
 
Ccna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 AnswersCcna 4 Chapter 5 V4.0 Answers
Ccna 4 Chapter 5 V4.0 Answers
 
Apds --ata03001 aen
Apds --ata03001 aenApds --ata03001 aen
Apds --ata03001 aen
 
Rfid
RfidRfid
Rfid
 
Internet of Things (IoT) Applicability in a Metropolitan City
Internet of Things (IoT) Applicability in a Metropolitan CityInternet of Things (IoT) Applicability in a Metropolitan City
Internet of Things (IoT) Applicability in a Metropolitan City
 
Ptcl modem (user manual)
Ptcl modem (user manual)Ptcl modem (user manual)
Ptcl modem (user manual)
 
Ptcl Modem User Manual
Ptcl Modem User Manual Ptcl Modem User Manual
Ptcl Modem User Manual
 
LAN Proposal
LAN Proposal LAN Proposal
LAN Proposal
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 
Mavenir: OpenRAN – What It Is and What It Means for Rural Operators
Mavenir: OpenRAN – What It Is and What It Means for Rural OperatorsMavenir: OpenRAN – What It Is and What It Means for Rural Operators
Mavenir: OpenRAN – What It Is and What It Means for Rural Operators
 
Aruba 310 Series Access Point Data Sheet
Aruba 310 Series Access Point Data SheetAruba 310 Series Access Point Data Sheet
Aruba 310 Series Access Point Data Sheet
 
LCG-300 Industrial LoRaWAN Gateway
LCG-300 Industrial LoRaWAN GatewayLCG-300 Industrial LoRaWAN Gateway
LCG-300 Industrial LoRaWAN Gateway
 
The feature of huawei ma5600
The feature of huawei ma5600The feature of huawei ma5600
The feature of huawei ma5600
 
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
 
Webinar: Tecnologia LoRa – Do dispositivo à nuvem
Webinar: Tecnologia LoRa – Do dispositivo à nuvemWebinar: Tecnologia LoRa – Do dispositivo à nuvem
Webinar: Tecnologia LoRa – Do dispositivo à nuvem
 
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM
 
Yeastar Technical Training Course
Yeastar Technical Training CourseYeastar Technical Training Course
Yeastar Technical Training Course
 
1.pptx
1.pptx1.pptx
1.pptx
 

Recently uploaded

Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 

Recently uploaded (20)

Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 

M240 reader-bundle for environmental monitoring in IT / Network Closets.

  • 1. © Copyright 2013 RF Code Inc. All Rights Reserved M240 Network Closet Reader Network Closet Environmental Monitoring Bundle April 24, 2013
  • 2. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 2 M240 Network Closet Reader - Overview • The M240 Network Closet Reader is an entry level device designed for distributed network closet spaces. • The M240 Reader supports a maximum of 20 RF Code Sensor Tags or Asset Tags. • The M240 Reader supports the entire family of RF Code Asset Tags and Sensor Tags.  The ideal use of the M240 is environmental monitoring in IT / Network Closets. • The M240 Reader is fully compatible with RF Code’s Asset Manager software and Zone Manager middleware. • The M240 Reader is simple to install:  Wall or ceiling mount  Multiple power options: POE, AC power brick, DC power connectors • There is only a wired network version of the M240.
  • 3. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 3 Network Closet Environmental Monitoring Bundle • The Network Closet EM Bundle is enables the monitoring of critical environmental conditions in distributed network closets. • The Network Closet EM Bundle consists of:  One - M240 Network Closet Reader  Two – R155 Humidity and Temperature Sensor Tags  One – R150 Temperature Sensor Tag  One – R120 Door Position Sensor Tag • The Network Closet EM Bundle has a EMEA list price of $995.00 • The M240 is only sold as part of the “Network Closet EM Bundle”.
  • 4. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 4 M240 Photos
  • 5. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 5 M240 Network Closet Reader – Technical Specifications • Support for a maximum of 20 Sensor Tags or Asset Tags • Support for multiple simultaneous application connection  Compatible with Asset Manager and Zone Manager software • Typical read range of 50 to 75 feet LoS (line of sight) in a network closet environment depending upon building construction.  Dual Channel Radio Receivers equipped with helical antennae • Full function Ethernet port (10 / 100, full duplex) • Multiple Power Sources:  Integrated POE (power-over-ethernet)  External universal power supply (110/220 VAC)  12 to 24 volt DC via bare wire connector Full function Ethernet port (10 / 100, full duplex) • USB A port for USB options • USB B port for serial connectivity • Support for Open API for direct reader integration
  • 6. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 6 M240 Network Closet Reader FAQ – 1 of 4 Q1 – How is the M250 Reader different from the M250 Reader? A1 – The M240 and M250 have similar physical characteristics and features. However, the M240 is limited to only receiving data from the first 20 tags that it finds. Q2 – What happens when the M240 reaches it maximum of 20 tags? A2 – Once the M240 finds the first 20 tags, it ignores all other tags that in proximity to it. Q3 – If I have more than 20 tags in proximity to the M240 Reader, can I assign specific tags to it? A3 – Yes. The M240 Reader supports the concept of a Tag Filter List or “white list” which can be configured via the web interface on the reader. Once tags are added to the Tag Filter List, only these tags will be observed and all others will be ignored. The tag filter list must be administered on a reader by reader basis.
  • 7. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 7 M240 Network Closet Reader FAQ – 2 of 4 Q4 – Can the M240 Reader be utilized in a data center environment? A4 – The M240 Reader is not designed for use in a data center environment. The M240 reader has a limitation of 20 tags that it can observe. Data Center environments typically have far more asset and/or sensor tags than 20. Q5 – Can the M240 Reader be upgraded to the M250 Reader? A5 – No, not at this time. Q6 – Do all of the RF Code Sensor Tags work with the M240 Reader? A6 – Yes, all types of RF Code Sensor Tags and Asset Tags work with the M240.
  • 8. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 8 M240 Network Closet Reader FAQ – 3 of 4 Q7 – Can I use Asset Tracking Tags with the M240 Reader? A7 – Yes, but there are limitations. If the Tag Filter List feature of the M240 is being utilized, the ability to track tags from one reader to the next will be restricted and probably not produce the desired results. Contact RF Code for more information on this topic. Q8 – Is the M240 fully supported by RF Code’s Asset Manager and Zone Manager applications? A8 – Yes. The M240 is fully supported by Asset Manager, Sensor Manager, and Zone Manager. A9 – Does the M240 support Up Connect mode like the M250 Reader? A9 – Yes, the M240 supports Up Connect Mode. Q10 – Does the M240 Reader support encrypted network communications? A10 – Yes, via HTTPS.
  • 9. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 9 M240 Network Closet Reader FAQ – 4 of 4 Q11 – Can the M240 Reader be purchased by itself without the Network Closet Bundle? A11 – No. Q12 – If more sensor tags are needed for monitoring my Network Closet, can additional tags be added to the closet? A12 – Yes, any of the RF Code Sensor Tags can be purchased and installed in the Network Closet up to a maximum of 20 tags per M240 reader. Q13 – How long does it take to deploy the Network Closet Reader Bundle? A13 – Assuming the availability of network connectivity and power in the closet, approximately about 30 minutes to configure the reader, deploy the reader, and deploy the sensor tags. Q14 – Can more than 1 M240 Reader be installed in a Network Closet? A14 – Yes, but each reader must be managed and configured individually.
  • 10. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 10 M240 Tag Filter List • If the M240 Reader only “sees” the 20 or less tags in its closet, same deployment pattern as the M250 today.  If there is even the slightest chance, the M240 will see more than 20 tags, then RF Code highly recommend configuration of the Tag Filter List or “white list” • If the M240 Reader can see more than the 20 tags, then deploy the reader using the same steps as the M250 plus the additional step of configuring the Tag Filter List or “white list” via the Reader’s web interface • How to configure the Tag Filter List or “white list”:  Once the M240 reader is functional on the IP network, point a web browser at the IP address of the reader.  Under the “Configuration” section of the reader web UI, select “Tag Filter”. Utilize the multi-line entry field to enter up to 20 tag ID’s (group code + numeric).  Save the configuration and close the web interface  The M240 reader will now only observe the tags in the Tag Filter List
  • 11. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 11 Asset Tracking & the M240 • Asset Tracking with the M240 may not be a viable solution if the Tag Filter List or “white list” is enabled.  Note: Operating the M240 without the Tag Filter List enabled, could result in unpredictable results if more than 20 tags ever enter the read range of the reader. • Since the Tag Filter List only allows the M240 to observe a specific list of tags, if a new tags comes into the range of the M240 and is not in the Tag Filter List, the reader will never report it. • For configured tags in the M240 Tag Filter List, presence and absence of presence (online / offline) can be reported.
  • 12. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 12 Monitoring the Tag Capacity Used of the M240 • Just like the M250, the M240 Reader will publish via its API the “Tag Capacity Used” in a percentage.  For an M240, the maximum number of tags will be 20, so the percentage will be number of tags seen divided by 20.  If the Tag Filter List or “white list” is configured, then the calculation will be the “number of entries in the Tag Filter List” divided by 20. • The “Tag Capacity Used” is visible in ZM and AM. In AM, thresholds can be configured to warn users where they are out of tag capacity on an M240. • RF Code highly recommends configuring a threshold on Tag Capacity Used on M240 Readers.