Canberra Industries RMSA7070822 Manual De Usuario
• Magnetic switch activation (Authenticated Switch only)
The plastic optical fiber (POF) cable is a 200-micron single fiber in a 1000 micron (1mm)
plastic jacket. At each end is a removable plastic ferrule for connecting the POF into the Seal
body. There is a 1 mm hole in the ferrule to allow the POF to pass through and insert into the
Seal case opening to allow light from the POF to either enter or exit.
plastic jacket. At each end is a removable plastic ferrule for connecting the POF into the Seal
body. There is a 1 mm hole in the ferrule to allow the POF to pass through and insert into the
Seal case opening to allow light from the POF to either enter or exit.
To communicate with the Seal, the Seal is connected to a PC USB port through the
Programming Card. The Seal’s two replaceable AA 3.6V lithium batteries may provide a
source of power for over four years, although it is recommended that they be replaced sooner if
there is more RF transmitting activity than normal.
Programming Card. The Seal’s two replaceable AA 3.6V lithium batteries may provide a
source of power for over four years, although it is recommended that they be replaced sooner if
there is more RF transmitting activity than normal.
1.4
Translator
The Translator is the device used to read the Seal data in situ. The Translator collects, stores,
and then forwards data from Seals upon request, local or remote. All data is encrypted by the
Seals before transmission, though some portions of the data frame such as Seal ID is sent in
the clear (no encryption). An authentication signature is part of the overall Seal message. The
Translator can then transfer this pre-encrypted Seal data via its Ethernet link as it does not
decrypt the data nor authenticate nor does not contain such functionality. The Translator
sends on the encrypted Seal messages as well as non-encrypted information regarding the
Seal address, the number of bytes in the encrypted messages, received signal strength as
seen by the Translator, and other information. Data can then be verified and analyzed on-site
or remotely worldwide.
and then forwards data from Seals upon request, local or remote. All data is encrypted by the
Seals before transmission, though some portions of the data frame such as Seal ID is sent in
the clear (no encryption). An authentication signature is part of the overall Seal message. The
Translator can then transfer this pre-encrypted Seal data via its Ethernet link as it does not
decrypt the data nor authenticate nor does not contain such functionality. The Translator
sends on the encrypted Seal messages as well as non-encrypted information regarding the
Seal address, the number of bytes in the encrypted messages, received signal strength as
seen by the Translator, and other information. Data can then be verified and analyzed on-site
or remotely worldwide.
When a message is transmitted the source device expects an acknowledge response from the
destination device. If an acknowledge message is not received the source device retransmits
the message after a random stand-off period of time. This RF “hand-shake” is an affirmative
action and has been shown to cut down the amount of RF traffic used by other types of Seals.
The Seal will only try to wait for this acknowledgement of successful data reception by the
Translator up to three times before stopping any further attempts for that particular message.
The Translator stores the messages chronologically in non-volatile memory.
destination device. If an acknowledge message is not received the source device retransmits
the message after a random stand-off period of time. This RF “hand-shake” is an affirmative
action and has been shown to cut down the amount of RF traffic used by other types of Seals.
The Seal will only try to wait for this acknowledgement of successful data reception by the
Translator up to three times before stopping any further attempts for that particular message.
The Translator stores the messages chronologically in non-volatile memory.
For physical security, the Translator is housed in a tamper-indicating enclosure with openings
for RF antenna and an Ethernet cable. The Translator consists of an ARM9 based single
board computer (SBC) with a specially designed PC/104 daughter card called the Translator
Communication Card (TCC), a universal 115/230V, 50/60Hz AC to 5VDC power supply, two
external vertical swivel antennas and a tamper switch. See Figure 5 for a block diagram of the
Translator. The SBC runs Debian Linux and contains the Operating System and RMSA
application on a removable 4 GB SD card. There are 128 MB of DDR RAM, 512MB of NAND
Flash, USB ports, Gigabit Ethernet, a serial port and several other items which are not used on
the SBC. The Translator may be powered by Power Over Ethernet (POE) if desired. Total
power consumption is around 5 watts.
for RF antenna and an Ethernet cable. The Translator consists of an ARM9 based single
board computer (SBC) with a specially designed PC/104 daughter card called the Translator
Communication Card (TCC), a universal 115/230V, 50/60Hz AC to 5VDC power supply, two
external vertical swivel antennas and a tamper switch. See Figure 5 for a block diagram of the
Translator. The SBC runs Debian Linux and contains the Operating System and RMSA
application on a removable 4 GB SD card. There are 128 MB of DDR RAM, 512MB of NAND
Flash, USB ports, Gigabit Ethernet, a serial port and several other items which are not used on
the SBC. The Translator may be powered by Power Over Ethernet (POE) if desired. Total
power consumption is around 5 watts.
REMOTELY MONITORED SEAL ARRAY(RMSA)
SFG-MAN-001
REVISION: 1.7
2016 CANBERRA
9