Device server protects serial interfacesThe JetPort 5604i offers 2kV optical isolation protection and 15kV ESD surge protection of serial interfacesKorenix has released the JetPort 5604i industrial four-port isolation redundant serial device server. Users can use one IP address and redundant Ethernet paths to control up to four serial devices over the Ethernet. It has two types of power inputs, four 5V TTL digital inputs and two digital outputs. It provides 2kV isolation protection for industrial environments and has dual Ethernet ports. When the dual Ethernet ports are connected, only one path will be activated, this is known as the primary path. The inactive path will be the backup path. When the primary path is down, the backup path will recover Ethernet connection in less than 200ms. The system allows users to connect the termination unit's 5V TTL digital input/output. JetPort Commander allows users to monitor the status of the DI and DO and assign the value of 0 or 1 to the DO. JetPort also provides one data port for user to program DI/O 'get' and 'set' commands figure on the right. The logic Low (Value=0) power voltage is 0-0.8V, 0.8V is the maximum value. The logic High (Value =1) power voltage is 2-5V, 2V is the minimum value. JetPort also opens one TCP socket port for DI/DO programming commands. The JetPort 5604i offers 2kV optical isolation protection and 15kV ESD surge protection of serial interfaces. Optical isolation solves the problem of ground looping by effectively lifting the connection between the serial data line and 'ground' at either end of the serial networking line. HTTPS is a web protocol built into browser that encrypts and decrypts the user's page requests as well as the pages that are returned by the web server. It is a security protocol that provides communication privacy over the internet. By adapting HTTPS technology, encrypted data packets can be transmitted safely between the JetPort 5604i and PC web browser, preventing unauthorised access. The SSH technology enables users to securely login to remote host computers. It uses a client/server architecture to provide secure communications between two nontrusted ends. |