Coaxial Cable Network Connection - GuardIAN Connect
Enjoy easy network connection with the GuardIAN Connect Coaxial Cable - a high speed, fit for purpose, linear access layer network.
Powered by RFI Technology Solutions, GuardIAN Connect supports the integration of GuardIAN Nodes and Refuge Chambers to the GuardIAN Intelligence Network. Designed specifically for an underground mining environment, GuardIAN Connect uses a single coaxial cable to carry both power and data.
GuardIAN Connect eliminates separate distribution by enabling power to be carried over the communications cable with the data. Power centres can be consolidated every 1-2km.
Power over Ethernet (PoE+) outlets can be tapped off the GuardIAN Connect Cable wherever endpoint devices (such as the GuardIAN Node and Lighting) are required.
Distributes reliable, standard-compliant power
Full speed native Ethernet communications
Inter-operable with a site's preferred network equipment
Can be installed & maintained by UG trades - as easy as leaky feeder
GuardIAN Connect is easy to install as a leaky feeder system, whilst at the same time providing a full-speed native Ethernet network. It overcomes the challenges of underground networks with a cost effective solution.
Underground trades can advance and branch the network easily, allowing additional ports to be added as required. Damage can be readily repaired with basic tools in wet, dirty conditions.
The GuardIAN Connect Portal is the bridge between the edge of the existing data network and the coaxial cable.
The GuardIAN Connect QuadPort breaks out standard-compliant Power over Ethernet (PoE) ports right where they are needed, supplying power and data back-haul for any industrial Ethernet device.
Unmanaged: GC-ELE-COM-002 / Managed: GC-ELE-COM-003
The GuardIAN Connect Splitter evenly divides the coaxial cable, so that the system can proceed down two different headings. DC power present on any one of the ports is also passed along to the other ports of the Splitter.
The GuardIAN Connect Branch taps a portion of the power and signal from the coaxial cable, enabling a QuadPort to be spliced into the line wherever it is needed.
The GuardIAN Connect DC Splice is installed immediately after the DC power supply to adapt regular DC power cable to the coaxial cable format; protecting the coaxial cable and communications devices from excessive voltage being applied to the system.
The GuardIAN Connect Repeater digitally regenerates the data signal, enabling coaxial cable segments to be extended indefinitely. Repeaters are not required for coaxial cable segments that are less than one kilometre in length.
The GuardIAN Connect Power Inserter places DC power onto the coaxial cable. The DC power flows along the coaxial cable to operate the communications system and the industrial Ethernet devices that are attached to the system.
GuardIAN Connect eliminates separate distribution by enabling power to be carried over the communications cable with the data. Power centres can be consolidated every 1-2km. Semi-rigid aluminium and flexible half-inch coaxial cables are available.
Semi-Rigid: GC-ELE-CBL-008 / Flexible: GC-ELE-CBL-009
Expensive to deploy and maintain
Repair is impractical
Power required at each Ethernet outlet, or sent along a separate cable
Complex to maintain
Head end (CMTS) is a single point of failure
Data rate is shared across all endpoints
Breaking out an Ethernet port and powering it is complex and expensive
Limited data rates
Only viable for a small number of Ethernet endpoints
A set of rules or common network language.
A protocol stack refers to a group of protocols that are concurrently running that are employed for the implementation of a network protocol suite.
The protocols in a stack determine the interconnectivity rules for a layered network model such as in the OSI or TCP/IP models. To become a stack, the protocols must be interoperable; being able to connect both vertically between the layers of the network and horizontally between the end-points of each transmission segment.
Protocol Data Unit
A Protocol Data Unit (PDU) is a specific block of information transferred over a network. It is often used in reference to the OSI model, since it describes the different types of data that are transferred from each layer.
Ethernet is the traditional technology for connecting wired local area networks (LANs), enabling devices to communicate with each other via a protocol.
Ethernet describes how network devices can format and transmit data packets so other devices on the same local or campus area network segment can recognise, receive and process them. An Ethernet cable is the physical, encased wiring over which the data travels.
Any device accessing a geographically localised network using a cable -- i.e., with a wired rather than wireless connection -- likely uses Ethernet.
The Ethernet protocol touches both Layer 1 - the physical layer, and Layer 2 - the data link layer, on the OSI network protocol model. Ethernet defines two units of transmission: packet and frame.
The frame includes not just the payload of data being transmitted, but also:
• the physical media access control (MAC) addresses of both the sender and receiver;
• VLAN tagging and quality of service information; and
• error correction information to detect transmission problems.
Each frame is wrapped in a packet that contains several bytes of information to establish the connection and mark where the frame starts.
Ethernet vs. Wireless
Compared to wireless LAN technology, Ethernet is typically less vulnerable to disruptions -- whether from radio wave interference, physical barriers or bandwidth hogs. It can also offer a greater degree of network security and control than wireless technology, as devices must connect using physical cabling.
Power over Ethernet
Power over Ethernet (PoE) is a technology for wired Ethernet local area networks (LANs) that allows the electrical current necessary for the operation of each device to be carried by the data cables rather than by power cords.
For PoE to work, the electrical current must go into the data cable at the power-supply end, and come out at the device end, in such a way that the current is kept separate from the data signal so that neither interferes with the other. The current enters the cable using a component called an injector. If the device at the other end of the cable is PoE compatible, then that device will function properly without modification. If the device is not PoE compatible, then a component called a picker (or tap) must be installed to remove the current from the cable.
Ethernet network switches are broadly categorised into two main categories – modular and fixed configuration.
Fixed configuration switches are switches with a fixed number of ports and are typically not expandable. The fixed configuration switch category is further broken down into unmanaged switches, smart switches, and managed L2 and L3 switches.
Managed Layer 2 Switch
Managed switches are designed to deliver the most comprehensive set of features to provide the best application experience, the highest levels of security, the most precise control and management of the network, and offer the greatest scalability in the fixed configuration category of switches. As a result, managed switches are deployed as aggregation/access switches in extensive networks or as core switches in relatively smaller networks. Managed switches should support both L2 switching
and L3 IP routing though you’ll find some with only L2 switching support.
From a security perspective, managed switches protect the data plane (user traffic being forwarded), control plane (traffic being communicated between networking devices to ensure user traffic goes to the right destination), and management plane (traffic used to manage the network or device itself). Managed switches also offer network storm control, denial-of-service protection, and much more.
The Access Control List capabilities allow for flexibly dropping, rate limiting, mirroring, or logging of traffic by L2 address, L3 address, TCP/UDP port numbers, Ethernet type, ICMP or TCP flags, etc.
Managed switches are rich in features that enable them to protect themselves and the network from deliberate or unintended Denial of Service attacks. It includes Dynamic ARP Inspection, IPv4 DHCP snooping, IPv6 First Hop Security with RA Guard, ND Inspection, Neighbor Binding Integrity, and much more.
A bit (short for binary digit) is the smallest unit of data in a computer. A bit has a single binary value, either 0 or 1.
Coaxial cable aka coax is a type of copper cable specially built with a metal shield and other components engineered to block signal interference. Coaxial cables tend to carry signals at a greater distance and are a good choice for weak signals, due to their layered protection.
The Open Systems Interconnection (OSI) reference model is a layered, conceptual framework that stereotypes the communication functions of a networking or telecommunication system, without regard to its internal technology or structure.
The OSI model aims to define the interoperability of diverse communication systems with standard communication protocols. This methodology is achieved by dividing the networking process into seven logical layers, each with its unique functionality.
Information is passed from one layer to the next, starting at the Application layer on the transmitting host, and proceeding down the hierarchy to the Physical layer, then passing over the communications channel to the destination host, where the information moves back up the hierarchy, ending at the Application layer.
1. Physical 2. Data Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application