Monthly Archives: December 2018

Phoenix Contact mGuard Secure Cloud

From |

What is Cloud Computing and why have people started to use it?

The usage of the internet has increased massively in last few years, which increases the cost of hardware and software. The new technology of Cloud Computing has been used to solve all these issues by providing online service, which reduces the cost of hardware and software effectively.

Cloud Computing is architecture or it can be defined as a type of internet service, which is designed to provide shared resources and computing services via the internet on demand over centralized server resources on a scalable platform. Cloud Computing allows customers to share resources like networks, storage, servers, services and applications without physical devices, on a pay-per-use basis.

There are three major cloud computing service categories:

Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS)
These are applications hosted by third party providers. Customers are able to use them over the internet.

Pay-as-you-use model.

Examples:

Salesforce, NetSuite

Third-party application development platform and services built on its own infrastructure.

Again these tools are made available to customers over the internet.

Examples:

Google App Engine, AWS Lambda

Third-party servers, storage, computing resources available for customers. Customers can use IaaS to build their own PaaS and SaaS service.

Examples:

Google Cloud Compute, Amazon S3

Major security issues on implementing Cloud Computing Services

Cloud Computing is known as an emerging domain, the security of the data must be protected over the network. There are many issues in cloud computing but security is the major issue.

  • Misuse of Cloud Computing

Some criminals like Hackers and spammers can take advantage of the suitable registration, easy procedures and unspecified access to cloud services to launch malicious attacks like key cracking.

  • Insecure Application Programming Interfaces (API)

Customers handle and interact with cloud services by interfaces or API. Service providers must make sure that the security is integrated into their service models, while users must be aware of the security risks.

  • Wicked Insiders

Malicious insiders pose a greater threat in the Cloud Computing environment because consumers do not understand the providers’ policies and procedures. Malicious insiders may gain unauthorized access to the organization and its assets.

  • Shared Technology issues/multi-tenancy nature

This is based on a shared infrastructure and does not apply to multi-tenant architectures.

  • Data Crash

Compromised data may include deleted or changed data without backup, unrecorded with larger environments, lost encoded keys and illegal access to sensitive data.

  • Account, Service & Traffic hijacking

Account or service hijacking is usually done using stolen certificates. Such attacks include phishing, fraud, and exploitation of software vulnerabilities. Attackers can access key areas of Cloud Computing services such as confidentiality, integrity and service availability.

  • Unidentified Risk Report

Cloud services mean that organizations are less involved in software and hardware, so organizations should be aware that internal security, security compliance, auditing and logging issues may be overlooked.

Phoenix Contact mGuard Secure Cloud

A simple, secure, reliable solution to risks

mGuard VPN technology uses IPsec security protocols with strong encryption. This guarantees the confidentiality, authenticity and integrity of all information and data transmitted between the service personnel and the machine.

For any demo request or enquiry, feel free to contact me via the form below!

What product(s) would you like more information on? (required)

.

Please prove that you are not a bot

Smart Buildings for the Future

From |

Smart Buildings and smart cities are continuously transforming how people carry out their activities on a daily basis. Smart cities will soon emerge with things like street lights and parking meters connected to commercial buildings and connected to the internet. At present, some cities have started implementing the smart city approach by connecting everything about their community to the internet. Along with conserving energy, smart buildings will help save money. Here are some of the biggest IoT smart building trends likely to take shape this year.

Phoenix Contact designs robust and high-speed controls for the most demanding applications using the Niagara 4 Framework. The ILC 2050 BI goes far beyond building automation, providing industrially hardened control and modular I/O running the Niagara 4 Framework. Gain maximum flexibility from a large variety of I/O modules Connect up to 63 I/O modules on the local bus. Get support for DALI, MP-Bus, and M-Bus maximum 16 (RS‐232, RS‐485, M‐Bus, DALI) with special function modules.

You can use the ILC 2050 BI controller to automate different subsections in the building infrastructure, data centers and distributed properties. It has a variety of interfaces and supports a wide range of protocols. The integrated Niagara Framework enables you to have IoT-based automation due to standardization of various data types. This makes it easy to connect various sensors and actuators regardless of the manufacturer and communication protocol. The controller’s functions can be expanded with the Inline I/O Portfolio from Phoenix Contact.

The Inline I/O Concept

  • Digital input terminals
  • Relay terminals
  • Digital output terminals
  • TRIAC terminals
  • Analog input terminals
  • Analog output terminals
  • Functional terminals (DALI, 8 / S0, MBUS, UNI)
  • Power and segment clamps

 

 

 

 

 

IoT smart building trends in future

 

  • Predictive maintenance
  • Air quality measurement
  • IoT-supported complex applications
  • Measurement and verification using IoT
  • Real-time data accessibility
  • IoT in green building movement
  • IoT and prefabricated building components
  • IoT in efficient construction management
  • IoT for energy efficiency
  • IoT for better asset optimization

ILC 2050 BI Advantages: Summary

  • Unique: the only modular, industrial controller running Niagara.
  • Cost saving: no unused IOs, no gateways required, integrated switch. Simplified installation and reduced size.
  • Easy maintenance and quick setup.
  • High Quality: Robust, industrial design, made in Germany.
  • Part of the entire Phoenix Contact product portfolio!

If you would like to find out more about Phoenix Contact’s E-Mobility, feel free to contact me via the form below!

What product(s) would you like more information on? (required)

Please prove that you are not a bot

Termitrab Complete – The Narrowest Surge Protection

From |

The latest surge protection, Termitrab Complete (TTC) for MCR offers a peace of mind for users. With the TTC, you can reliably protect your signals against surge voltages from the field to the controller.

The TTC product range is a tailored product range for almost all applications in measurement and control technology. Depending on the type of signal to be protected, with TTC, you will find an ideally suited circuit version in the portfolio.

The areas of application for TTC are so diverse that they can be used in any industry. Thanks to the narrow overall width, starting at 3.5mm, the product range is ideal for process technology, as very often, a high density is required in the distribution cabinets. They protect up to 572 signals in one meter, which mean more products can be installed in the cabinets. The number of cabinets can be reduced so as to save cost. The various approvals permit use in onshore and offshore applications. The TTC portfolio offers the widest range of features and therefore an optimum selection of products for your applications.

The narrowest surge protection

Starting from an overall width of 3.5mm, Termitrab Complete is the world’s first surge protection solution for measurement and control technology.

Remote Signaling

You can decide if and when you require the remote signalling modules that are available. Up to 40 protective devices are visually monitored with the optional remote signalling modules.

To monitor retrospectively, you can easily align remote signalling modules to protective devices that are already installed.

If a protective element is disconnected in the event of surge voltages, the disconnected device closes the monitoring channel and group remote signalling is triggered. The overloaded device is displayed on site by the status indicator (in the picture highlighted in red). This is purely mechanical, without consuming energy from the signal lines.

Pluggability

For repeated tests, remove the surge element connector from the base of the multi-piece protective device without impedance. The signals are not interrupted and the controllers do not immediately detect an impedance change in the measuring circuit.

Testing and documentation takes place in the CHECKMASTER 2. If a replacement is required, the affected surge element connector can be replaced without accessing the installation.

Innovative knife disconnection

The integrated two knife disconnection enables the signal path to be broken so as to carry out isolation measurements. An open signal path is easy to detect from the projecting function screws. The screws are equipped with overwind protection.

Versatile

Certain applications require special tests and approvals. TTC meets the requirements of Underwriters Laboratories (UL), Furthermore, versions with ATEX, IEC Ex and GL approvals are available as well.

If you would like more information about Termitrab Complete, feel free to contact me via the form below!

What product(s) would you like more information on? (required)

Please prove that you are not a bot

Planning for Lightning and Surge Protection?

From |

Choosing the right Lightning and Surge Protection is a lifelong investment, just like purchasing a good comprehensive life insurance policy. Without proper planning and consideration, your business, your home maybe inadequately protected and most importantly your people/investments will be at risk.

In this article we shall dive in on the risk assessment, lightning and surge protection zoning and protective devices type.

A point to note: As you may know, Surge Arresters are vital when you are planning for a lightning and surge protection system. For information on when Lightning and Surge Protection is necessary, visit our previous article here.

Three points to consider when planning for Lightning and Surge Protection: 

  1. Risk analysis with accordance with IEC 62305

The answer to the common question: “Do I need to install lightning and surge protection devices?” boils down to the result of a careful and systematic risk assessment, which is carried out after inspection of the physical structure and electrical installation.

It would start with addressing the risk of various sources of damages (e.g. a direct lightning strike in the building, transient overvoltages that are coupled into the electrical installation caused by atmospheric influences) which come into focus, as do the types of damage resulting from these incidents:

  • Impact on health or loss of life
  • Loss of technical services for the public
  • Loss of irreplaceable objects of cultural significance
  • Financial losses

The financial benefits are determined as follows:

  • How does the total annual cost for a lightning protection system compare to the costs of potential damage without a protection system?
  • The cost evaluation is based on the expenditures for the planning, assembly, and maintenance of the lightning protection system.

If the risk assessment determines that lightning and surge protection is required, then the type and scope of the specific measures for protection to be considered will include:

  • External lightning and surge protection
  • Internal lightning and surge protection
  • Grounding and equipotential bonding
  • Coordinated Lightning and Surge Protection Devices system
  1. Characterizing the lightning protection zones (LPZ)

In order to ensure the total protection of a physical structure from the effects of lightning strikes and surge voltages, various protective measures or equipment that are tailored to one another are required.

The installation locations of surge protective devices within a physical structure are determined using the lightning protection zone from part 4 of lightning protection standard IEC 62305.

It divides a physical structure into lightning protection zones (LPZ), and does so from outside to inside with decreasing lightning protection levels. In external zones only resistant equipment can be used. However, in internal zones, sensitive equipment can also be used. The individual zones are characterized and named as follows:

  • LPZ 0A: Unprotected zone outside of a building where direct lightning strikes are possible. The direct coupling of lightning currents in cables and the undamped magnetic field of the lightning strike can lead to danger and damage.
  • LPZ 0B: Zone outside the building that is protected from direct lightning strikes, for example, by an air terminal. The undamped magnetic field of the lightning strike and induced surge currents can cause hazards and damage.
  • LPZ 1: Zone inside the building where high energy surge voltages or surge currents and strong electromagnetic fields are still to be expected.
  • LPZ 2: Zone inside a building where surge voltages or surge currents and electromagnetic fields that have already been significantly weakened are to be expected.
  • LPZ 3: Zone inside the building where surge voltages or surge currents are expected to be only extremely low or entirely absent and electromagnetic fields are expected to be only very weak or non-existent.

Lightning protection zone concept with coordinated SPDs at the respective zone transition points

  1. Lightning and Surge Protection Device types

The lightning protection zone concept provides coordinated surge protective devices for all cables that cross between zones. Their power values are based on the protection class to be achieved. As such, different SPDs are required based on the zone transition points.

 

The requirements for the individual SPD types are defined in the standard IEC 61643- 11 [6] for surge protective devices used in low-voltage systems. A multi-level protection concept is derived from this:

Risk assessment, in general, is a complicated and demanding process. An advisable starting point is to list out the areas that are most at risk and filter to the ones that are not.

Once you’ve listed out the potential risk areas, you can then consider the types of SPD best suited to the kind of application/equipment you’re protecting.

Food for Thought: Lightning strikes 90% of the earth. Some parts are highly prone to lightning strikes while some aren’t.

Since Southeast Asia sits comfortably near the equator, the hot and humid weather makes conditions favourable for the development of lightning producing thunderstorms. Thus, it is important to make sure you are well-protected.

Lightning strike densities across the world

Lightning strike densities across the world

Other tips for Risk Assessment

Be sure to refer to risk assessment standards IEC 62305-2. Some countries make it compulsory to use the standard when considering surge protection for large scale or highly sensitive buildings such as industrial facilities, hospitals, and data centres.

More information on Phoenix Contact’s Lightning and Surge Protection Devices can be found here.

 

References

  1. International Electrotechnical Commission. IEC 62305-1 – Lightning protection – Part 1: General principles. s.l. : VDE Verlag GmbH, 2010.
  2. International Electrotechnical Commission. IEC 62305-2 – Lightning protection – Part 2: Risk management. s.l. : VDE Verlag GmbH, 2010.
  3. International Electrotechnical Commission. IEC 62305-3 – Lightning protection – Part 3: Physical damage to structures and life hazard. s.l. : VDE Verlag GmbH, 2010.
  4. International Electrotechnical Commission. IEC 62305-4 – Lightning protection – Part 4: Protection against lightning. Electrical and electronic systems within structures. s.l.: VDE Verlag GmbH, 2010.
  5. International Electrotechnical Commission. IEC 61643-11 – Surge protective devices connected to low-voltage power systems – Requirements and test methods. s.l. : VDE Verlag GmbH, 2011.
  6. http://news.nationalgeographic.com/news/2013/11/131102-lightning-deaths-developing-countries-storms/