SlideShare a Scribd company logo
© Copyright 2013 RF Code Inc.
All Rights Reserved
M240 Network Closet Reader
Network Closet Environmental Monitoring Bundle
April 24, 2013
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 2
M240 Network Closet Reader - Overview
• The M240 Network Closet Reader is an entry level device designed for distributed
network closet spaces.
• The M240 Reader supports a maximum of 20 RF Code Sensor Tags or Asset Tags.
• The M240 Reader supports the entire family of RF Code Asset Tags and Sensor
Tags.
 The ideal use of the M240 is environmental monitoring in IT / Network Closets.
• The M240 Reader is fully compatible with RF Code’s Asset Manager software and
Zone Manager middleware.
• The M240 Reader is simple to install:
 Wall or ceiling mount
 Multiple power options: POE, AC power brick, DC power connectors
• There is only a wired network version of the M240.
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 3
Network Closet Environmental Monitoring Bundle
• The Network Closet EM Bundle is enables the
monitoring of critical environmental conditions in
distributed network closets.
• The Network Closet EM Bundle consists of:
 One - M240 Network Closet Reader
 Two – R155 Humidity and Temperature Sensor Tags
 One – R150 Temperature Sensor Tag
 One – R120 Door Position Sensor Tag
• The Network Closet EM Bundle has a EMEA list
price of $995.00
• The M240 is only sold as part of the “Network Closet
EM Bundle”.
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 4
M240 Photos
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 5
M240 Network Closet Reader – Technical Specifications
• Support for a maximum of 20 Sensor Tags or Asset Tags
• Support for multiple simultaneous application connection
 Compatible with Asset Manager and Zone Manager software
• Typical read range of 50 to 75 feet LoS (line of sight) in a network closet
environment depending upon building construction.
 Dual Channel Radio Receivers equipped with helical antennae
• Full function Ethernet port (10 / 100, full duplex)
• Multiple Power Sources:
 Integrated POE (power-over-ethernet)
 External universal power supply (110/220 VAC)
 12 to 24 volt DC via bare wire connector Full function Ethernet port (10 / 100, full
duplex)
• USB A port for USB options
• USB B port for serial connectivity
• Support for Open API for direct reader integration
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 6
M240 Network Closet Reader FAQ – 1 of 4
Q1 – How is the M250 Reader different from the M250 Reader?
A1 – The M240 and M250 have similar physical characteristics and features.
However, the M240 is limited to only receiving data from the first 20 tags that it
finds.
Q2 – What happens when the M240 reaches it maximum of 20 tags?
A2 – Once the M240 finds the first 20 tags, it ignores all other tags that in
proximity to it.
Q3 – If I have more than 20 tags in proximity to the M240 Reader, can I assign
specific tags to it?
A3 – Yes. The M240 Reader supports the concept of a Tag Filter List or “white
list” which can be configured via the web interface on the reader. Once tags
are added to the Tag Filter List, only these tags will be observed and all others
will be ignored. The tag filter list must be administered on a reader by reader
basis.
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 7
M240 Network Closet Reader FAQ – 2 of 4
Q4 – Can the M240 Reader be utilized in a data center environment?
A4 – The M240 Reader is not designed for use in a data center environment.
The M240 reader has a limitation of 20 tags that it can observe. Data Center
environments typically have far more asset and/or sensor tags than 20.
Q5 – Can the M240 Reader be upgraded to the M250 Reader?
A5 – No, not at this time.
Q6 – Do all of the RF Code Sensor Tags work with the M240 Reader?
A6 – Yes, all types of RF Code Sensor Tags and Asset Tags work with the
M240.
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 8
M240 Network Closet Reader FAQ – 3 of 4
Q7 – Can I use Asset Tracking Tags with the M240 Reader?
A7 – Yes, but there are limitations. If the Tag Filter List feature of the M240 is
being utilized, the ability to track tags from one reader to the next will be
restricted and probably not produce the desired results. Contact RF Code for
more information on this topic.
Q8 – Is the M240 fully supported by RF Code’s Asset Manager and Zone
Manager applications?
A8 – Yes. The M240 is fully supported by Asset Manager, Sensor
Manager, and Zone Manager.
A9 – Does the M240 support Up Connect mode like the M250 Reader?
A9 – Yes, the M240 supports Up Connect Mode.
Q10 – Does the M240 Reader support encrypted network communications?
A10 – Yes, via HTTPS.
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 9
M240 Network Closet Reader FAQ – 4 of 4
Q11 – Can the M240 Reader be purchased by itself without the Network Closet
Bundle?
A11 – No.
Q12 – If more sensor tags are needed for monitoring my Network Closet, can
additional tags be added to the closet?
A12 – Yes, any of the RF Code Sensor Tags can be purchased and installed in
the Network Closet up to a maximum of 20 tags per M240 reader.
Q13 – How long does it take to deploy the Network Closet Reader Bundle?
A13 – Assuming the availability of network connectivity and power in the
closet, approximately about 30 minutes to configure the reader, deploy the
reader, and deploy the sensor tags.
Q14 – Can more than 1 M240 Reader be installed in a Network Closet?
A14 – Yes, but each reader must be managed and configured individually.
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 10
M240 Tag Filter List
• If the M240 Reader only “sees” the 20 or less tags in its closet, same
deployment pattern as the M250 today.
 If there is even the slightest chance, the M240 will see more than 20 tags, then
RF Code highly recommend configuration of the Tag Filter List or “white list”
• If the M240 Reader can see more than the 20 tags, then deploy the reader
using the same steps as the M250 plus the additional step of configuring the
Tag Filter List or “white list” via the Reader’s web interface
• How to configure the Tag Filter List or “white list”:
 Once the M240 reader is functional on the IP network, point a web
browser at the IP address of the reader.
 Under the “Configuration” section of the reader web UI, select “Tag
Filter”. Utilize the multi-line entry field to enter up to 20 tag ID’s (group
code + numeric).
 Save the configuration and close the web interface
 The M240 reader will now only observe the tags in the Tag Filter List
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 11
Asset Tracking & the M240
• Asset Tracking with the M240 may not be a viable solution if the
Tag Filter List or “white list” is enabled.
 Note: Operating the M240 without the Tag Filter List enabled, could
result in unpredictable results if more than 20 tags ever enter the read
range of the reader.
• Since the Tag Filter List only allows the M240 to observe a
specific list of tags, if a new tags comes into the range of the
M240 and is not in the Tag Filter List, the reader will never
report it.
• For configured tags in the M240 Tag Filter List, presence and
absence of presence (online / offline) can be reported.
© Copyright 2013 RF Code Inc. All Rights Reserved
Slide 12
Monitoring the Tag Capacity Used of the M240
• Just like the M250, the M240 Reader will
publish via its API the “Tag Capacity Used”
in a percentage.
 For an M240, the maximum number of tags
will be 20, so the percentage will be
number of tags seen divided by 20.
 If the Tag Filter List or “white list” is
configured, then the calculation will be the
“number of entries in the Tag Filter List”
divided by 20.
• The “Tag Capacity Used” is visible in ZM
and AM. In AM, thresholds can be
configured to warn users where they are
out of tag capacity on an M240.
• RF Code highly recommends configuring a
threshold on Tag Capacity Used on M240
Readers.

More Related Content

PPTX
RF Code solutions presentation
PDF
Rf Code Solutions Brochure
PDF
Rfs4000 product snapshot
PPTX
Internet of Things Protocol - Session 2
DOCX
LoRa application for detecting the harmful gases
PPTX
Webnesday - Introduction to LoRaWAN
PPTX
PDF
Sentry IT Fire & Gas Detection Overview
RF Code solutions presentation
Rf Code Solutions Brochure
Rfs4000 product snapshot
Internet of Things Protocol - Session 2
LoRa application for detecting the harmful gases
Webnesday - Introduction to LoRaWAN
Sentry IT Fire & Gas Detection Overview

What's hot (20)

PPTX
Practical Examples of LoRaWAN in Action
PDF
Key Open Standards for inter-operable IoT systems
PDF
[CLASS 2014] Palestra Técnica - Ilan Barda
PPTX
Uranium corporation of india ltd.
PPTX
Aruba ClearPass Exchange Deep Dive
PDF
Track 4 session 1 - st dev con 2016 - body area network and sensor synchron...
PDF
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
PDF
Modified Epc Global Network Architecture of Internet of Things for High Load ...
PPTX
Link labs 2G 3G CDMA transition webinar slides
PDF
Track 4 session 6 - st dev con 2016 - samsung artik
PPTX
Sierra Monitor Corp overview 2015.r1
PDF
Track 1 session 8 - st dev con 2016 - smart factories
PDF
Get Smart with Cold Chain Monitoring Webinar
PPTX
Ble overview and_implementation
PPTX
Introduction to Bluetooth low energy
PPTX
Enhancing mobile apps in the public facing enterprise with the aruba meridian...
PPTX
Protocols for internet of things
PPTX
Working with mobile app developers to enable indoor location based services
PPTX
Wi-Fi Security Fundamentals
PPTX
Getting the most out of the aruba policy enforcement firewall
Practical Examples of LoRaWAN in Action
Key Open Standards for inter-operable IoT systems
[CLASS 2014] Palestra Técnica - Ilan Barda
Uranium corporation of india ltd.
Aruba ClearPass Exchange Deep Dive
Track 4 session 1 - st dev con 2016 - body area network and sensor synchron...
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
Modified Epc Global Network Architecture of Internet of Things for High Load ...
Link labs 2G 3G CDMA transition webinar slides
Track 4 session 6 - st dev con 2016 - samsung artik
Sierra Monitor Corp overview 2015.r1
Track 1 session 8 - st dev con 2016 - smart factories
Get Smart with Cold Chain Monitoring Webinar
Ble overview and_implementation
Introduction to Bluetooth low energy
Enhancing mobile apps in the public facing enterprise with the aruba meridian...
Protocols for internet of things
Working with mobile app developers to enable indoor location based services
Wi-Fi Security Fundamentals
Getting the most out of the aruba policy enforcement firewall
Ad

Similar to M240 reader-bundle for environmental monitoring in IT / Network Closets. (20)

PDF
CWNP Wi-Fi IoT Connectivity Professional CWICP-202 Certification Study Guide
PDF
Latest CWNP CWICP-202 Certification Study Guide
PPTX
What is LoRaWaN
PPTX
What is LoRaWAN_Tom Zamir_IoT Expert
PDF
Ethernet The Definitive Guide 2nd Edition Charles E. Spurgeon 2024 Scribd Dow...
PDF
IRJET- RFID based Authentication and Access of Vehicles
PDF
Ccna 4 Chapter 5 V4.0 Answers
DOC
Apds --ata03001 aen
PPTX
PDF
Internet of Things (IoT) Applicability in a Metropolitan City
PDF
Ptcl Modem User Manual
PDF
Ptcl modem (user manual)
PDF
LAN Proposal
PDF
Ethernet The Definitive Guide 2nd Edition Charles E. Spurgeon
PPTX
Rfid ppt
PDF
Mavenir: OpenRAN – What It Is and What It Means for Rural Operators
PDF
Aruba 310 Series Access Point Data Sheet
PDF
LCG-300 Industrial LoRaWAN Gateway
DOC
The feature of huawei ma5600
PDF
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
CWNP Wi-Fi IoT Connectivity Professional CWICP-202 Certification Study Guide
Latest CWNP CWICP-202 Certification Study Guide
What is LoRaWaN
What is LoRaWAN_Tom Zamir_IoT Expert
Ethernet The Definitive Guide 2nd Edition Charles E. Spurgeon 2024 Scribd Dow...
IRJET- RFID based Authentication and Access of Vehicles
Ccna 4 Chapter 5 V4.0 Answers
Apds --ata03001 aen
Internet of Things (IoT) Applicability in a Metropolitan City
Ptcl Modem User Manual
Ptcl modem (user manual)
LAN Proposal
Ethernet The Definitive Guide 2nd Edition Charles E. Spurgeon
Rfid ppt
Mavenir: OpenRAN – What It Is and What It Means for Rural Operators
Aruba 310 Series Access Point Data Sheet
LCG-300 Industrial LoRaWAN Gateway
The feature of huawei ma5600
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
Ad

Recently uploaded (20)

PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
August Patch Tuesday
PDF
Getting Started with Data Integration: FME Form 101
PDF
Encapsulation theory and applications.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Hybrid model detection and classification of lung cancer
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
TLE Review Electricity (Electricity).pptx
Group 1 Presentation -Planning and Decision Making .pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Programs and apps: productivity, graphics, security and other tools
Univ-Connecticut-ChatGPT-Presentaion.pdf
Encapsulation_ Review paper, used for researhc scholars
August Patch Tuesday
Getting Started with Data Integration: FME Form 101
Encapsulation theory and applications.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Unlocking AI with Model Context Protocol (MCP)
Assigned Numbers - 2025 - Bluetooth® Document
NewMind AI Weekly Chronicles - August'25-Week II
A comparative analysis of optical character recognition models for extracting...
Zenith AI: Advanced Artificial Intelligence
Chapter 5: Probability Theory and Statistics
Hybrid model detection and classification of lung cancer
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...

M240 reader-bundle for environmental monitoring in IT / Network Closets.

  • 1. © Copyright 2013 RF Code Inc. All Rights Reserved M240 Network Closet Reader Network Closet Environmental Monitoring Bundle April 24, 2013
  • 2. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 2 M240 Network Closet Reader - Overview • The M240 Network Closet Reader is an entry level device designed for distributed network closet spaces. • The M240 Reader supports a maximum of 20 RF Code Sensor Tags or Asset Tags. • The M240 Reader supports the entire family of RF Code Asset Tags and Sensor Tags.  The ideal use of the M240 is environmental monitoring in IT / Network Closets. • The M240 Reader is fully compatible with RF Code’s Asset Manager software and Zone Manager middleware. • The M240 Reader is simple to install:  Wall or ceiling mount  Multiple power options: POE, AC power brick, DC power connectors • There is only a wired network version of the M240.
  • 3. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 3 Network Closet Environmental Monitoring Bundle • The Network Closet EM Bundle is enables the monitoring of critical environmental conditions in distributed network closets. • The Network Closet EM Bundle consists of:  One - M240 Network Closet Reader  Two – R155 Humidity and Temperature Sensor Tags  One – R150 Temperature Sensor Tag  One – R120 Door Position Sensor Tag • The Network Closet EM Bundle has a EMEA list price of $995.00 • The M240 is only sold as part of the “Network Closet EM Bundle”.
  • 4. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 4 M240 Photos
  • 5. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 5 M240 Network Closet Reader – Technical Specifications • Support for a maximum of 20 Sensor Tags or Asset Tags • Support for multiple simultaneous application connection  Compatible with Asset Manager and Zone Manager software • Typical read range of 50 to 75 feet LoS (line of sight) in a network closet environment depending upon building construction.  Dual Channel Radio Receivers equipped with helical antennae • Full function Ethernet port (10 / 100, full duplex) • Multiple Power Sources:  Integrated POE (power-over-ethernet)  External universal power supply (110/220 VAC)  12 to 24 volt DC via bare wire connector Full function Ethernet port (10 / 100, full duplex) • USB A port for USB options • USB B port for serial connectivity • Support for Open API for direct reader integration
  • 6. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 6 M240 Network Closet Reader FAQ – 1 of 4 Q1 – How is the M250 Reader different from the M250 Reader? A1 – The M240 and M250 have similar physical characteristics and features. However, the M240 is limited to only receiving data from the first 20 tags that it finds. Q2 – What happens when the M240 reaches it maximum of 20 tags? A2 – Once the M240 finds the first 20 tags, it ignores all other tags that in proximity to it. Q3 – If I have more than 20 tags in proximity to the M240 Reader, can I assign specific tags to it? A3 – Yes. The M240 Reader supports the concept of a Tag Filter List or “white list” which can be configured via the web interface on the reader. Once tags are added to the Tag Filter List, only these tags will be observed and all others will be ignored. The tag filter list must be administered on a reader by reader basis.
  • 7. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 7 M240 Network Closet Reader FAQ – 2 of 4 Q4 – Can the M240 Reader be utilized in a data center environment? A4 – The M240 Reader is not designed for use in a data center environment. The M240 reader has a limitation of 20 tags that it can observe. Data Center environments typically have far more asset and/or sensor tags than 20. Q5 – Can the M240 Reader be upgraded to the M250 Reader? A5 – No, not at this time. Q6 – Do all of the RF Code Sensor Tags work with the M240 Reader? A6 – Yes, all types of RF Code Sensor Tags and Asset Tags work with the M240.
  • 8. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 8 M240 Network Closet Reader FAQ – 3 of 4 Q7 – Can I use Asset Tracking Tags with the M240 Reader? A7 – Yes, but there are limitations. If the Tag Filter List feature of the M240 is being utilized, the ability to track tags from one reader to the next will be restricted and probably not produce the desired results. Contact RF Code for more information on this topic. Q8 – Is the M240 fully supported by RF Code’s Asset Manager and Zone Manager applications? A8 – Yes. The M240 is fully supported by Asset Manager, Sensor Manager, and Zone Manager. A9 – Does the M240 support Up Connect mode like the M250 Reader? A9 – Yes, the M240 supports Up Connect Mode. Q10 – Does the M240 Reader support encrypted network communications? A10 – Yes, via HTTPS.
  • 9. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 9 M240 Network Closet Reader FAQ – 4 of 4 Q11 – Can the M240 Reader be purchased by itself without the Network Closet Bundle? A11 – No. Q12 – If more sensor tags are needed for monitoring my Network Closet, can additional tags be added to the closet? A12 – Yes, any of the RF Code Sensor Tags can be purchased and installed in the Network Closet up to a maximum of 20 tags per M240 reader. Q13 – How long does it take to deploy the Network Closet Reader Bundle? A13 – Assuming the availability of network connectivity and power in the closet, approximately about 30 minutes to configure the reader, deploy the reader, and deploy the sensor tags. Q14 – Can more than 1 M240 Reader be installed in a Network Closet? A14 – Yes, but each reader must be managed and configured individually.
  • 10. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 10 M240 Tag Filter List • If the M240 Reader only “sees” the 20 or less tags in its closet, same deployment pattern as the M250 today.  If there is even the slightest chance, the M240 will see more than 20 tags, then RF Code highly recommend configuration of the Tag Filter List or “white list” • If the M240 Reader can see more than the 20 tags, then deploy the reader using the same steps as the M250 plus the additional step of configuring the Tag Filter List or “white list” via the Reader’s web interface • How to configure the Tag Filter List or “white list”:  Once the M240 reader is functional on the IP network, point a web browser at the IP address of the reader.  Under the “Configuration” section of the reader web UI, select “Tag Filter”. Utilize the multi-line entry field to enter up to 20 tag ID’s (group code + numeric).  Save the configuration and close the web interface  The M240 reader will now only observe the tags in the Tag Filter List
  • 11. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 11 Asset Tracking & the M240 • Asset Tracking with the M240 may not be a viable solution if the Tag Filter List or “white list” is enabled.  Note: Operating the M240 without the Tag Filter List enabled, could result in unpredictable results if more than 20 tags ever enter the read range of the reader. • Since the Tag Filter List only allows the M240 to observe a specific list of tags, if a new tags comes into the range of the M240 and is not in the Tag Filter List, the reader will never report it. • For configured tags in the M240 Tag Filter List, presence and absence of presence (online / offline) can be reported.
  • 12. © Copyright 2013 RF Code Inc. All Rights Reserved Slide 12 Monitoring the Tag Capacity Used of the M240 • Just like the M250, the M240 Reader will publish via its API the “Tag Capacity Used” in a percentage.  For an M240, the maximum number of tags will be 20, so the percentage will be number of tags seen divided by 20.  If the Tag Filter List or “white list” is configured, then the calculation will be the “number of entries in the Tag Filter List” divided by 20. • The “Tag Capacity Used” is visible in ZM and AM. In AM, thresholds can be configured to warn users where they are out of tag capacity on an M240. • RF Code highly recommends configuring a threshold on Tag Capacity Used on M240 Readers.