Feature – Electronics World https://www.electronicsworld.co.uk Electronic Engineering and Design Wed, 22 Oct 2025 15:05:29 +0000 en-GB hourly 1 https://www.electronicsworld.co.uk/wp-content/uploads/2019/02/cropped-ew-logo-square3-32x32.png Feature – Electronics World https://www.electronicsworld.co.uk 32 32 DeepSeek and the future of Open AI: What it means for edge computing https://www.electronicsworld.co.uk/deepseek-and-the-future-of-open-ai-what-it-means-for-edge-computing/39804/ Wed, 22 Oct 2025 15:05:29 +0000 https://www.electronicsworld.co.uk/?p=39804 The AI industry is at an inflection point. For years, deep learning advancements have been driven by massive, proprietary models trained in the cloud, making AI adoption an expensive and centralised endeavor. But a new shift is underway – one that emphasizes openness, efficiency and scaleability, particularly for edge computing.

DeepSeek, an emerging open-weight AI model, is a powerful example of this trend. Its development highlights the growing movement toward democratising AI, providing developers and enterprises with new ways to integrate intelligence across devices without the constraints of proprietary, cloud-based models.

With the latest release of DeepSeek-R1, this trend is accelerating. DeepSeek-R1 is trained via large-scale reinforcement learning from human feedback, allowing it to develop strong reasoning capabilities autonomously. Benchmark results show that it performs on par with OpenAI-o1-1217 on tasks like math, coding and factual knowledge retrieval. Moreover, DeepSeek-R1 includes distilled versions (1.5B, 7B, 14B, 32B, 70B) optimised for efficiency, making it highly relevant for edge computing.

But open-weight AI models alone aren’t enough. For AI at the edge to reach its full potential, it requires efficient, AI-native compute platforms that can handle these models in real-world scenarios. This is where innovations in low-power, high-performance MPUs and MCUs play a crucial role.

The AI compute challenge

AI workloads today are increasingly constrained by compute demands. The dominant model of AI deployment has been centred around large-scale cloud inference, where models like GPT-4 or Gemini require massive GPU clusters to function effectively. While this approach works for centralised applications, it becomes impractical for edge-based applications like smart cameras, industrial automation and intelligent IoT devices that need real-time processing and autonomy.

This challenge has driven demand for efficient AI models that can run closer to the data source, minimising latency, power consumption and connectivity dependencies, while also enhancing security and privacy. Open-weight models like DeepSeek-R1 are a step in the right direction, but they must be paired with the right AI-enabled silicon to unlock their true potential.

Why open-weight ai models matter

DeepSeek is part of a larger movement toward open AI innovation, following in the footsteps of models like LLaMA and Mistral. By offering transparency and flexibility through customisation, open-weight models enable developers to fine-tune AI for specialised applications (industrial IoT, automotive, robotics, etc.); reduce dependence on cloud providers for inference, lowering costs and increasing control; and optimise performance for edge deployments, where compute resources are constrained.

With DeepSeek-R1, this movement is evolving further. The distillation approach used in R1 allows for smaller, more efficient models that still retain high reasoning capabilities. This is critical for edge AI, where power and memory constraints make deploying large models infeasible.

AI at the edge

Open AI models like DeepSeek-R1 are just one part of the equation. To make AI truly viable at the edge, we need hardware designed to handle these models efficiently and cost-effectively.

At Synaptics, we’ve built the Astra platform with this exact challenge in mind. Astra is an AI-Native compute platform designed for power-efficient, multimodal AI inference in embedded and IoT devices. By leveraging Arm Cortex-A processors and tightly integrated AI acceleration, Astra enables real-time AI processing at the edge—without the need for cloud offloading.

The distilled models from DeepSeek-R1 provide an ideal complement to this approach. These models maintain high performance in reasoning tasks while significantly reducing compute requirements, making them well-suited for AI-native edge devices. This synergy between open AI models, distillation and optimised edge compute will define the next phase of AI innovation. Imagine a world where smart home devices can process user interactions locally, preserving privacy and reducing latency. Or where industrial sensors leverage AI for real-time anomaly detection, preventing costly downtime. Or, indeed, where AI-driven medical devices provide real-time diagnostics without requiring cloud connectivity. In these types of applications open-weight AI models with AI-native processors will redefine what’s possible.

Unlocking AI innovation

As AI adoption accelerates, the industry is recognising that proprietary, cloud-centric models alone won’t be enough. Open-weight AI like DeepSeek-R1 represents a pivotal shift toward scaleable, customisable and efficient intelligence, but to truly bring AI everywhere, we need compute platforms built for real-world constraints.

At Synaptics, we’re excited about this transformation. The combination of open AI models, distillation techniques and AI-native compute will shape the future of edge intelligence, empowering developers, businesses and industries to deploy AI in ways that were previously impossible.

By John Weil, Vice President of IoT and Edge AI Processor Business, Synaptics

]]>
Maximising industrial system performance through custom approach to cable assemblies https://www.electronicsworld.co.uk/maximising-industrial-system-performance-through-custom-approach-to-cable-assemblies/39765/ Fri, 17 Oct 2025 14:07:30 +0000 https://www.electronicsworld.co.uk/?p=39765 The UK’s industrial automation market is experiencing significant growth – and showing little signs of slowing down.

While the robotics market continues to be dominated by manufacturers in central Europe and Asia, UK manufacturers are increasingly leading in other areas of industrial automation, such as robotic process automation, packing, warehousing, logistics and more. Original equipment manufacturers in the UK therefore have a unique opportunity to innovate and compete by embracing smarter, more resilient machinery.

Taking a customised approach from the design and development stage will help limit downtime, streamline assembly and deliver leading performance, helping businesses capitalise on the situation.

Areas of focus

The rise of the smart factory has significantly increased the scope of industrial automation outside the realm of traditional robotics, both on and off the factory floor. Cobots (collaborative robots) are entering these areas, too, alongside robotic pickers, conveyor systems and high-speed sensors. This is in addition to autonomous guided vehicles used in warehousing, automated test rigs in use for in-house testing and measurement, and more.

Opting for custom cable assemblies and components at the earliest stages of a project ensures robustness and suitability of the design, but also it simplifies it, reducing component count and streamlining assembly. Custom wiring looms, for example, combine multiple complex types of wires and cables to meet space constraints, simplify installation and leave room to accommodate future growth or the addition of new features.

Ruggedisation against stress

Off-the-shelf solutions often fall short of this sector’s tough requirements, where high levels of vibration and temperature resistance are required to protect component from failure due to mechanical stress.

Similarly, design and development engineers might be required to specify cable assemblies rated to industrial IP standards for dust, moisture and shock protection to meet industry or country-specific compliance laws.

Giving engineers the ability to customise and ruggedise components means increasing the reliability of the system, particularly where physical impacts are likely – such as in material handling or packaging lines. This minimises the risk of failure and downtime.

Then, there is the testing and validation stage, which is just as important. Physical prototyping is a must, to ensure your customised assembly meets all performance and safety standards.

Precision for high-movement applications

Taking a custom approach to design and manufacturing can be especially relevant for OEMs that supply drives and motion control systems, where a high degree of precision, speed and control is required. This includes servo motors, linear actuators, or gear-driven robotic arms — machinery that operates with constant flexing, repetitive cycles, and high acceleration and deceleration forces.

Customising the assemblies and components provides peace of mind about the precision of your electronics, whilst guarding against assembly failure, which could cause misalignment. Where standard industrial cabling might fail in servo motors, due to either conductor fatigue or sheath breakdown, design and development engineers can specify customised cables with controlled bend radii, overmoulded strain reliefs and reinforced jacketing to deliver extended flex lives.

EMI shielding for signal integrity

Another vital consideration during the product development stages is the preservation of signal integrity, especially in the presence of other electronics. This is even an even greater concern for industrial electronics operating in ‘noisy’ factory floor environments.

Signal degradation can deliver faulty test results and unreliable system feedback, while control panels near heavy machinery can also be affected by electromagnetic interference (EMI). Selecting suitable materials for the cable, insulation, shielding and connectors – based on performance and environmental requirements – is a crucial design consideration for engineers.

Customising cable assemblies means that design engineers can combine power and signal functions into a single assembly, enjoying simpler routing without worrying about crosstalk. Instead, they can work with the manufacturer to specify shielded enclosures within the assembly, EMI filters on power and signal lines, and physical separation within the assembly. This can all be achieved while maintaining a minimal level of interference acceptable for high-spec environments.

Custom cable assemblies

In essence, engineers designing automation and industrial systems should consider specifying custom cable assemblies early in the design process to ensure system reliability, reduce on-site rework, and meet safety and compliance standards.

By Paul Dearman, Head of Business Development, GTK

www.gtk.co.uk

]]>
Enabling the future of intelligent rail https://www.electronicsworld.co.uk/enabling-the-future-of-intelligent-rail/39586/ Mon, 08 Sep 2025 08:35:24 +0000 https://www.electronicsworld.co.uk/?p=39586 Rail transport is heading toward autonomy, promising increased efficiency, safety and sustainability. Central to this transformation are connectors, which ensure seamless communication between various subsystems. From real-time diagnostics to autonomous navigation, connectors underpin the intelligent infrastructure driving modern rail innovation.

Powered by investments

Rail operators are making significant investments in digitalisation and automation, worldwide. In Germany, Deutsche Bahn is trialling fully automated trains in Hamburg as part of its ‘Digital Rail Germany’ initiative, planning to increase capacity and reduce emissions without expanding the physical infrastructure. Meanwhile, East Japan Railway Company (JR East) is advancing plans to introduce driverless Shinkansen bullet trains by the mid-2030s, starting with a line between Tokyo and Niigata.

All these efforts signal a wider shift toward rail systems built with AI at the heart, with real-time analytics and high-speed communication, all of which depend on reliable interconnect technology.

Connecting complexity

However, the railway environment has some of the most severe conditions for electrical cables and connectors. Rolling stock and trackside hardware are exposed to constant vibration, harsh temperature extremes from -55°C up to +200°C, as well as high humidity. Equally, connectors are also exposed to contaminants like dust, oil and de-icing agents.

Then, there is electromagnetic interference (EMI) generated by traction drives and overhead cables, which can affect signal integrity, unless connectors are effectively shielded.

Connectors designed for rail applications must be ruggedised to meet stringent international standards such as EN 50155 and EN 45545-2, NFPA 130, VG 95234 and MIL-DTL-5015. These benchmarks define the connector’s ability to withstand shock, vibration, fire exposure and long-term environmental stress. RoHS and REACH variations along with corrosion resistant plating make for rugged and reliable connector solutions in the harshest environments.

Autonomous trains bring added demands on the connectors: They must be capable of supporting high-speed data transmission protocols such as Gigabit and 10-Gigabit Ethernet (typically Cat 6A and Cat 7), USB 3.1 and fibre optic interfaces.

All these protocols are essential for handling real-time data streams from sensors, LiDAR systems, onboard diagnostics and communication networks. Data rates in these environments can exceed 10Gbps, especially when multiple high-bandwidth systems, such as video surveillance, telemetry and predictive maintenance sensors are operating concurrently.

We mustn’t forget the mechanical aspect of connectors, where resilience remains critical. Connectors generally incorporate bayonet or threaded coupling systems to maintain secure connections under vibration. Contact retention mechanisms are designed for longevity, often rated for thousands of mating cycles. Contacts are generally gold-plated to minimise corrosion and offer low contact resistance for a prolonged time. These are also available in silver-plated versions.

Then, there is ease of maintenance as another crucial factor, particularly for retrofit applications. Modular connector designs and coding schemes enable simple installation and error-proofing. In addition, quick-disconnect configurations ensure quick field servicing with minimal downtime.

Future-proofing rail connectivity

As Rail 4.0 evolves, so too must the technology that supports it. Upcoming innovations in train autonomy and electrification demand connectors with greater bandwidth, higher power ratings and smarter integration capabilities.

For example, the development of distributed traction systems and battery-electric multiple units (BEMUs) introduces new requirements for high-voltage, high-current connectors that can handle regenerative braking energy and rapid charging. These connectors must include safety interlocks, arc suppression features and compliance with standards such as IEC 61373 for shock and vibration.

Simultaneously, increased deployment of real-time diagnostics and condition monitoring means that connectors must support multiple sensor interfaces. Emerging designs now incorporate built-in diagnostics, enabling connectors themselves to report on temperature, contact resistance, or mechanical wear, turning passive components into intelligent assets.

Modularity is another key trend. Future rail systems will demand flexible, reconfigurable architectures to accommodate upgrades and regional customisations. Connectors that support daisy-chaining, backplane mounting and tool-less assembly are increasingly favoured to reduce downtime and simplify system expansion.

PEI-Genesis supplies a wide range of connectors engineered specifically for challenging rail environments. The portfolio includes high-power solutions designed to handle demanding electrical loads, as well as high-speed data connectors used in communications and control systems. These connectors are designed to meet strict global rail standards, including EN 50155. With modularity and rugged design as core principles, our connectors support applications ranging from onboard control systems to trackside signal units, playing an essential role in powering the next generation of autonomous rail technology.

Connectors remain vital

As the global rail industry accelerates towards full automation, the supporting technologies behind the scenes are just as vital as the software that guides the trains. Connectors play a crucial role in delivering the reliability, safety and performance required by Rail 4.0. They serve as the nervous system of modern trains, making real-time communication and electrified propulsion possible in even the harshest environments. Looking ahead, the connector landscape will continue to evolve alongside rail innovation, offering smarter, faster and more resilient solutions that keep the railways of the future on track.

By Karen James, Product Manager, PEI-Genesis

]]>
Is RISC-V marching into a legal minefield? https://www.electronicsworld.co.uk/is-risc-v-marching-into-a-legal-minefield/39566/ Tue, 02 Sep 2025 13:11:15 +0000 https://www.electronicsworld.co.uk/?p=39566 RISC-V, the open standard instruction set architecture (ISA), is quietly reshaping processor design. By eliminating licensing fees and proprietary restrictions, it has enabled start-ups, researchers and semiconductor newcomers to create custom CPUs and accelerators on a more level playing field. In a landscape long dominated by architectures like ARM and x86, RISC-V offers a welcome shift. According to market analysis house, SNS Insider, the RISC-V market was valued at $1.44bn in 2024, projected to reach $11.50bn by 2032, growing at a compound annual rate of nearly 30%.

However, while the ISA itself is royalty-free, its implementations are not free from legal risks. The architecture may be open, but it exists within a patent-heavy environment, presenting increasing challenges for developers and startups. Many developers are pushing ahead with innovative designs, unaware of the intellectual property complexities that accompany hardware development. If left unaddressed, it could threaten the very openness this movement champions.

As most mainstream chip standards and architectures are predominantly controlled by major commercial entities such as Intel, AMD and ARM, access to high-performance semiconductor designs has increasingly become a matter of strategic concern. Export controls now restrict the sale of advanced chip technologies to China and other countries, aiming to limit their ability to produce cutting-edge semiconductors. In this context, RISC-V has emerged as a particularly attractive alternative, especially for China’s defence and research sectors, because it offers a geopolitically neutral, open-source architecture. According to the Shanghai Science and Technology Commission, RISC-V’s openness makes it a strategic choice for building domestic chip capabilities. A 2023 report by The Japan Times revealed that, in response to US sanctions, Chinese defence contractors, state-backed entities and academic institutions invested more than 50 million dollars in RISC-V projects between 2018 and 2023. Today, RISC-V chips are already being used in applications ranging from self-driving cars to artificial intelligence, showing how rapidly the technology is transitioning from research to real-world deployment.

The patent problem

RISC-V’s flexibility is both its greatest strength and its main legal vulnerability. The ISA promotes innovation where designers can customise various aspects of computer architecture, such as memory models, cache coherency, neuro technology, and hardware accelerators to fit their specific needs. However, these areas are also where patent risks frequently arise. Many modern SoCs include features such as hybrid branch predictors, boot-time power gating, and custom interrupt schedulers, which are components that may already be covered by patents held by companies such as Intel, IBM, Qualcomm, or ARM. The issue is: even if an engineer creates their bespoke implementation, they might still unintentionally infringe a patent. In patent law, originality does not shield you from legal action.

Patent filings related to RISC-V have surged in recent years. According to publications from The Japan Times, in China, RISC-V patent publications increased from around 10 in 2018 to approximately 1,061 in 2022, while US filings grew from about 10 to around 2,018 during the same period; see Figure 2. Similarly, Chinese fabless companies account for about 40% of global RISC-V patents, according to industry trackers. Worldwide, filings involving RISC-V have risen by more than 400% between 2018 and 2023, reflecting growing innovation, as well as increased competition and legal risks. Companies such as SiFive, Andes Technology, and Alibaba’s T‑Head are driving these trends, securing patents on microarchitecture innovations like vector units, custom accelerators, and cache management systems. Academic institutions are also entering the IP game, compounding the ecosystem’s legal complexity.

In the GCC, particularly, United Arab Emirates, RISC-V research and chip design are gaining momentum. The Technology Innovation Institute (TII) in Abu Dhabi has played a central role by joining RISC-V International in 2021. Additionally, the Neuromorphic Engineering Lab at the American University of Ras Al Khaimah is pioneering open-source chip design research in the northern emirate. In a notable first for the UAE, the research team successfully taped out an open-source healthcare platform using Google’s SkyWater 130nm process, setting a foundational step for domestic innovation.

Saudi Arabia, meanwhile, is laying the groundwork for a national semiconductor ecosystem that may soon embrace RISC-V. As reported by Arab News in 2024, the Saudi government launched the National Semiconductor Hub (NSH) with a strategic funding commitment of $266m, aiming to incubate 50 fabless chip companies by 2030. While current investments are broad-based and not RISC-V specific, the infrastructure and funding environment are well-positioned to support open-source architectures in future Saudi chip initiatives.

As reviewed by Reuters, the number of RISC-V patents filed during 2018 – 2022 has grown significantly, primarily dominated by the US and China.

The open nature of RISC-V can sometimes gives the wrong impression that “open” automatically means “safe”. But that is not the case. Developers, especially those in universities or startups, need to understand that while the instruction set is free to use, the specific designs built on top of it can still run into patent issues. As RISC-V moves from the lab into commercial products, this misunderstanding can become a serious risk.

Startups are particularly vulnerable. They tend to focus on performance, power efficiency and chip size, but often do not have the legal resources to fully check for intellectual property problems. A clever new memory controller or accelerator can quickly become a liability if it overlaps with an existing patent. That could mean a costly redesign, licensing fees, production delays, or even losing investor confidence. A notable example is the Apple versus Rivos case (2022–2023), which highlighted how even open-source hardware projects can become entangled in serious legal disputes over intellectual property.

Making openness sustainable

For RISC-V to deliver on its promise, the community must evolve, not just technically, but legally. Developers need to treat intellectual property with the same rigour as performance or power efficiency. That means evaluating the originality of designs, considering potential patent overlaps, and building innovations defensibly. There are promising signs of progress. In 2023, nine major Chinese chipmakers, including Alibaba’s T‑Head, StarFive, and VeriSilicon, formed a patent‑sharing alliance, agreeing not to sue one another over RISC-V implementations. This model of cross-licensing offers a path for reducing litigation risk and fostering collaboration.

To extend this model globally, the RISC-V community can form a global patent pool where companies share key patents under fair, low-cost, or royalty-free terms, providing legal clarity for startups and open‑source developers. Another suggestion could be to create a certification scheme for “IP‑safe” RISC-V cores, offering assurance to downstream users and strengthening the ecosystem.

Going forward, RISC-V is one of the most exciting shifts in computing architecture in decades. It provides a democratised route to processor design, challenges the ARM–x86 duopoly, and drives global innovation forward. However, openness alone is not sufficient. To ensure it creates genuine opportunities rather than recreating old barriers, RISC-V must combine technical excellence with legal strategy, shared governance and community accountability. Only then can openness genuinely translate into opportunity and long-term progress.

By Arfan Ghani, Professor of Computer Engineering at the American University of Ras Al Khaimah, and Director, Neuromorphic Engineering Lab, United Arab Emirates

]]>
CASE STUDY: PANORAMA ANTENNAS AUTOMATES DULL, REPETITIVE SCREWDRIVING TASK WITH RARUK AUTOMATION AND VIKASO https://www.electronicsworld.co.uk/case-study-panorama-antennas-automates-dull-repetitive-screwdriving-task-with-raruk-automation-and-vikaso/36863/ Fri, 30 Aug 2024 10:14:23 +0000 https://www.electronicsworld.co.uk/?p=36863 British company Panorama Antennas has automated one of its assembly tasks with a collaborative robot (cobot) solution.

The company develops and manufactures innovative and fit-for-purpose antenna solutions and wireless communication products. Using a Universal Robots cobot paired with the Robotiq Screwdriving Solution, Panorama Antennas has automated a dull, repetitive assembly task. The solution was provided by leading robotics and automation distributor RARUK Automation and integrated by Universal Robots Certified Systems Integrator (CSI) VIKASO.

The Application

Panorama Antennas wanted to automate a monotonous screwdriving process which involved securing screws onto a cover panel of a network antenna. 

“The primary reason for integrating a robotic arm into the assembly process was to increase quality through a uniform, repetitive assembly process, whilst at the same time enabling the company to redeploy the assembly operators to higher skilled tasks such as soldering, connector assembly or RF testing.” Explained Mark Jesman, operations and supply director at Panorama Antennas.

For the application, Panorama Antennas chose the UR5e cobot arm from Universal Robots, combined with the Robotiq Screwdriving Solution. VIKASO also provided its V-CAP URCap software plug-in and V-EYE remote access and monitoring solution, which includes a camera module.

The UR5e is the second smallest cobot model in Universal Robots’ range of 6-axis robotic arms. With a payload capacity of 5 kg, the UR5e is the ideal choice for low-weight collaborative processes such as pick-and-place or screwdriving. The robot’s small footprint makes it easy to integrate into existing production set-ups.

01 DSC06429 1 CASE STUDY: PANORAMA ANTENNAS AUTOMATES DULL, REPETITIVE SCREWDRIVING TASK WITH RARUK AUTOMATION AND VIKASO

“Universal Robots is the market-leading manufacturer of cobot arms, and they have a solution that fit our requirements.” Said Jesman. “The Robotiq screwdriver was chosen because it is easy to deploy.”

“We used the Robotiq Screwdriving Solution for our project. The equipment is very easy to use, and our integration process was quite straightforward.” Concurs Vaibhav Boricha, director at VIKASO.

Robotiq offers out-of-the-box solutions for a range of applications including palletising, machine tending and screwdriving. The Screwdriving Solution includes a screwdriver end-effector for the robot, as well as a screw feeder. Utilising vacuum technology, the robust solution can pick screws of almost any material.

The Automation Process

As Universal Robots’ Top Global Distributor, RARUK Automation provides robots in three ways: just the robot, an out-of-the-box solution or by referring the customer to an integrator for additional support. VIKASO is a Universal Robots Certified Systems Integrator (CSI) and frequent integration partner of RARUK Automation. Panorama Antennas and VIKASO met in the middle for this application, explained Boricha:

“VIKASO has taken a very different approach with this project. Our core business is providing turnkey solutions. However, this collaboration with Panorama Antennas only required us to develop the application whilst they did the programming and testing.”

01 DSC06432 1 CASE STUDY: PANORAMA ANTENNAS AUTOMATES DULL, REPETITIVE SCREWDRIVING TASK WITH RARUK AUTOMATION AND VIKASO

“RARUK Automation put us in touch with VIKASO.” Said Jesman, describing the process. “VIKASO has a supportive team that were able to help us build the solution we required and carry out the training so that we were able to programme and operate the equipment with minimum support.”

The Outcome

The result has been positive for Panorama Antennas, as the company has successfully deployed a robotic screwdriving cell at its London facility. The efficient, reliable solution ensures consistent product quality. Despite initial hesitation, Panorama Antenna’s staff have embraced the change.

Jesman said: “Initially the assembly operators were anxious and apprehensive because they felt the robotic arm was going to take away their jobs, but after training and understanding the vision for this equipment they have embraced it as an asset to their process.”  

01 DSC06434 1 CASE STUDY: PANORAMA ANTENNAS AUTOMATES DULL, REPETITIVE SCREWDRIVING TASK WITH RARUK AUTOMATION AND VIKASO

Automating the screwdriving station has enabled Panorama Antenna’s skilled workers to focus on more complex, rewarding assembly tasks. After the successful deployment of the screwdriving cell, Panorama Antennas is looking to implement more robotic solutions.

“We are looking to replicate this process at our subsidiary sites, and we also have various other processes that we are looking to automate.” Concluded Jesman.

]]>
TA35/TA36: Thermal-Magnetic Circuit Breakers https://www.electronicsworld.co.uk/ta35-ta36-thermal-magnetic-circuit-breakers/36830/ Fri, 30 Aug 2024 08:21:48 +0000 https://www.electronicsworld.co.uk/?p=36830 SCHURTER has a long tradition with circuit breakers. In addition to their thermal release (bimetal), the classic TA35 and TA36 are now optionally equipped with an additional magnetic module, which promises reliable protection within milliseconds in the event of very high overcurrent (short circuit).

Thermal Circuit Breakers

Circuit breakers are usually designed according to the thermal principle with a bimetal. If a defined temperature is exceeded due to overcurrent, the electric circuit is interrupted. Once the bimetal cooled down, the appliance is ready for use again. However, if a short circuit occurs, the bimetal cannot react fast enough. For this reason, thermal circuit breakers are usually combined with a fuse.

Additional Magnetic Module

SCHURTER is now upgrading its 2-pole classic TA35 and TA36 models with an additional, optional magnetic module. From now on, no additional fuse is required when using a thermal-magnetic type. Depending on the application, the magnetic modules are available either with a slow or a fast acting characteristic.

Both models are designed for snap-in mounting and with finely graduated rated currents. A variety of colours and lighting options make the designer’s choice easier. The SCHURTER TA35 has a more classic style, while its TA36 counterpart comes in a more modern design.

A circuit breaker with a short circuit protection is mainly meant for applications, where a full protection on the primary side is required.

Links

Datasheet TA35

Datasheet TA36

Company

The SCHURTER Group is a globally successful Swiss technology business. With our components ensuring the clean and safe supply of power, input systems for ease of use and sophisticated overall solutions, we impress our customers with agility and excellent product and service quality. We focus on industrial equipment, medical equipment, automotive, avionics and space, data and communication and energy.

]]>
Safeguarding edge devices with secure element chips https://www.electronicsworld.co.uk/safeguarding-edge-devices-with-secure-element-chips/36807/ Mon, 19 Aug 2024 13:34:57 +0000 https://www.electronicsworld.co.uk/?p=36807 As the Internet of Things (IoT) continues to proliferate, the security of edge devices—those operating on the periphery of networks—becomes increasingly critical. These devices, often situated in uncontrolled environments, are vulnerable to various forms of attacks, ranging from remote unauthorized access to physical tampering. To fortify the defense of these devices, solutions such as Secure Element Chips, Tamper Detection hardware, as well as fully assembled and encapsulated general-purpose secured computing platforms are gaining traction.

Core Security Strategies: Trusted Platform Modules and Secure Elements

At the core of edge device security strategies lies the integration of Trusted Platform Modules (TPM) or Secure Elements (SE). These hardware-based solutions serve as a cornerstone in establishing trust at the device level. By leveraging hardware cryptographic accelerators, a true random number generator, and secure key storage, they ensure that sensitive key material remains protected from unauthorized access. Their adoption not only enhances security but also simplifies the deployment and management of IoT devices, even for organizations lacking extensive security expertise.

Design and System Development Considerations:

For engineers looking to incorporate Secure Elements into their projects, careful consideration should be given to the selection of SEs that align with the security needs of the specific application. Integration involves using microcontrollers or processors that support secure boot and cryptographic operations. The hardware design should include dedicated I2C or SPI communication lines to the SE, ensuring data integrity and security during transmission. Additionally, software development should leverage available APIs provided by SE manufacturers, such as Microchip’s CryptoAuthLib, which simplifies the process of implementing secure key storage and encryption.

Secure Elements in Cryptographic Applications

Secure elements provide functionalities used in a wide range of cryptographic applications, including blockchain-related ones. Examples include provisioning unique identifiers for device authentication (generated either during manufacturing or dynamically at runtime), generating random values from internal noise sources (making sure adequate entropy is maintained when utilized), and implementing various cipher suites that meet industry standards like those set by NIST (National Institute of Standards and Technology at the U.S. Department of Commerce). Furthermore, when coupled with their accompanying toolsets, secure elements such as Microchip’s ATECC608B and its Trust Platform, enable effortless integration with cloud-based platforms like AWS IoT.

Integration Tips:

When implementing secure element chips in your project, consider the following:

  • Provisioning: Decide if your device will use static or dynamic keys and configure your SE accordingly.
  • Random Number Generation: Ensure that your application leverages the SE’s true random number generator to avoid predictable keys.
  • Cipher Suite Selection: Match the SE’s available cipher suites with the security requirements of your target application and compliance needs.

Motion Sensor Tamper Detection: An Additional Layer of Defense

In addition to robust cryptographic measures, motion sensors (e.g., accelerometers) can be used for tamper detection to add another layer of defense against physical attacks. These sensors, strategically placed within the device enclosure, monitor changes in orientation or movement. Any unauthorized attempt to open or tamper with the device triggers an alert, allowing for immediate response and mitigation. This ensures the integrity of sensitive data by locking it or even destroying it if a possible breach is detected.

Engineering Focus:

To effectively incorporate motion sensor-based tamper detection:

  • Sensor Placement: Determine optimal sensor placement within the enclosure to detect unauthorized movement without triggering false positives.
  • Sensitivity Calibration: Calibrate the sensor’s sensitivity based on the operational environment to differentiate between normal usage and potential tampering.
  • Interrupt Handling: Implement software routines to handle interrupts generated by the motion sensor, triggering security protocols such as data encryption or system shutdown.

Power Supply Monitoring: Ensuring Continuous Operation

Further methodologies include monitoring the main power supply, as well as possible auxiliary batteries, to ensure continuous availability of power to critical components. By closely monitoring power sources, anomalies such as sudden power surges, fluctuations, or unexpected power outages can be detected promptly, alerting cybersecurity teams to potential threats or attempted breaches. Additionally, monitoring auxiliary batteries ensures that backup power systems are functioning correctly, providing resilience against power-related cyberattacks or disruptions.

Design Considerations:

  • Redundancy: Design redundant power systems with failover mechanisms to maintain operation during a primary power failure.
  • Data Logging: Implement data logging for power metrics to analyze patterns that might indicate tampering attempts or power instability.

Power Glitch Attacks:

In the context of power supply monitoring, it’s essential to consider power glitch attacks, where attackers deliberately induce brief power interruptions or voltage spikes to destabilize or bypass security mechanisms. These attacks can lead to unexpected behavior in edge devices, such as skipping security checks during reboot or causing malfunctions in cryptographic operations. To mitigate such risks, design engineers should ensure that devices have appropriate brown-out detection and that the firmware is capable of handling unexpected power glitches gracefully. Incorporating robust power supply circuits with proper filtering and surge protection can also help in defending against these types of attacks.

The Importance of Layered Security

Protection against threats requires a layered security approach, which combines multiple considerations and mechanisms to create a robust defense. This includes not only hardware-based solutions like Secure Elements and tamper detection but also software strategies such as secure boot, encryption, and regular firmware updates. By integrating these diverse layers of security, engineers can create a resilient system where each layer reinforces the other, minimizing the risk of successful attacks and ensuring comprehensive protection for edge devices.

Sfera Labs’ Strato Pi Max: A Comprehensive Security Solution

An example of a solution incorporating these security measures is Sfera Labs’ Strato Pi Max, which combines a Raspberry Pi Compute Module and an RP2040 microcontroller with a modular and expandable set of security, safety, and fault-resilience features to address a variety of scenarios. Strato Pi Max also offers the option of using Zymbit’s Secure Compute Module (SCM) as the processing core to further enhance security capabilities. Strato Pi Max’s expansions include an uninterruptible power supply (UPS) with auxiliary power output that can be used to power external devices. The platform also supports several redundancy storage options, including embedded eMMC, SSDs, and dual SD cards, allowing for data recovery and system restoration in case of storage failures.

Practical Implementation:

When working with platforms like the Strato Pi Max:

  • Modular Integration: Leverage the modularity to add or swap security components based on your application’s evolving needs.
  • Customization: Customize the I/O interfaces to connect additional sensors or actuators required by your specific use case.
  • Powering External Devices: Utilize the auxiliary power supply output to keep critical external devices, such as modems, powered during outages, ensuring continuous operation and communication.
  • Redundant Storage: Take advantage of the multiple storage options to ensure system/data redundancy and facilitate recovery from storage failures.

As the IoT landscape continues to evolve, the importance of robust security measures cannot be overstated. The above-mentioned solutions represent critical components in safeguarding edge devices against a myriad of threats. By leveraging these technologies, companies like Sfera Labs are at the forefront of innovation, delivering secure and resilient solutions that meet the demands of today’s interconnected world. As threats evolve, staying ahead of the curve requires a proactive stance towards security, embracing cutting-edge technologies to fortify the defenses of edge devices and ensure a secure foundation for the IoT ecosystem.

By Giampiero Baggiani, Co-Founder and Head of Software Development at Sfera Labs.

]]>
Saab UK innovates deep-sea exploration mitigating risk to divers and the environment https://www.electronicsworld.co.uk/saab-uk-innovates-deep-sea-exploration-mitigating-risk-to-divers-and-the-environment/36615/ Wed, 19 Jun 2024 09:47:20 +0000 https://www.electronicsworld.co.uk/?p=36615 Less than two years ago, two Saab remotely operated vehicles (ROVs) descended over 3,000 meters into the frigid Antarctic waters in search of Sir Ernest Shackleton’s ship, Endurance, which sank in 1915. The story of the British explorer is a legendary tale of courageous leadership and perseverance. Saab’s Seaeye ROVs were integral to the mission’s success, using sophisticated technology to locate, examine and film the wreckage, thus eliminating the need to endanger human lives for deep-sea exploration.

Historically, commercial divers have taken great risks to inspect oil and gas pipelines, high-voltage electrical cables, wind turbines and other critical infrastructure deep undersea. Saab has eliminated that risk bringing deep-sea exploration expertise to commercial underwater applications.

With a mission to keep people and society safe, the Seaeye range of ROVs has been developed with more agile and modular systems designs. Saab UK’s Seaeye systems are capable of performing a wide range of tasks from observation and inspection to more complex functions like underwater maintenance.

This evolution has culminated in the development of the world’s most advanced all-electric work-class ROV (eWROV), which combines versatility and maneuverability. Unlike traditional hydraulic ROVs, the eWROV eliminates the need for large amounts of hydraulic fluid, thereby mitigating environmental risks.

High-density modular power achieves a compact scaleable design

Critical specifications for the eWROV’s power converter are size, mass and thermal dissipation, given that the electronic systems are housed in sealed enclosures where space is at a premium and conventional convection cooling is not possible.

To meet these requirements, Saab chose Vicor power modules for their high density and efficiency. These modules enable efficient power distribution to various eWROV subsystems such as thrusters, manipulators and onboard electronics. The use of Vicor power modules allows Saab to customize Seaeye subsystems according to specific industry-standard 24V and 48V levels required by onboard computers, sensors, video cameras, lights and navigation equipment.

]]>
How silos get in the way of telecoms automation https://www.electronicsworld.co.uk/how-silos-get-in-the-way-of-telecoms-automation/36577/ Thu, 06 Jun 2024 09:50:50 +0000 https://www.electronicsworld.co.uk/?p=36577 Automation is often hailed as potentially transformational for the telecoms industry. This is especially true when it comes to new technologies like 5G and OpenRan, which will impose a new level of complexity upon the industry and one which cannot be handled manually. Herein lies the problem.

Many operators have been running for decades and grown into large, complex multinationals. As a direct result of that success, they have an enormous backload of embedded technologies and processes which cannot be easily automated. This is mostly because these technologies are often siloed between disciplines and departments which artificially balkanise the data collection necessary for wholesale automation.

How siloing happens

Telecoms organisations are highly siloed across a whole number of areas. If they’re multinational – each separate country will likely have their own processes, practices and policies. If they’re big enough, each department will have their own budgets and metrics. Each part of these organisations will use their own technology stacks, databases and collect data in their own ways to serve the specific objectives of that particular department. These technologies and practices are often highly complex and they can’t share or integrate the various data streams they’re working with.

It’s this complex system of silos that prevents automation pipelines from getting off the ground. Automating processes requires the aggregate analysis and correlation of data points across the organisation – in order to train automation models. In turn, that requires automation at the most basic levels of data collection across the organisation and yet here we get unintegratable metrics, different technologies, conflicting practices and altogether separate processes. It’s technically possible to wrangle all that data together for the purposes of training an automation model, but doing so would be prohibitively time consuming, labour intensive and expensive.

This is as much of a technical problem as it is an administrative one. Operator silos create low visibility across the entire organisation and because each department is dealing with different streams of data and different metrics, they have a hard time translating that to streamlined processes and necessary organisational changes. When, for example, testing labs need a budget increase to increase test capacity, they need to justify it to management. They’ll need proof points to establish that need so they’ll need to dig through their specific tooling, manually extract the data and use those as proof points.

Testing automation

Automation is a particularly necessary development because of the rapid rise of transformational technologies like OpenRAN and 5G. These are unprecedentedly complex systems and will be deployed in such a wide array of use cases that they present a series of issues and considerations that telecommunications has never had to deal with beforehand. As a result, testing those networks is both a crucial and correspondingly complex process.

One of the places in urgent need of automation is the testing lab. It’s here where operators will test their products, services, components and technologies to see if they can serve the use cases and high standards for which they’re intended. Automation could help those labs execute hundreds or even thousands of test scenarios a day – but while testing remains manual, they are restricted to only a few test scenarios a day which dramatically slows down the process.

It’s worth noting that these problems aren’t shared amongst all 5G operators. In fact, smaller operators and start-ups are able to deploy virtualised 5G networks and OpenRAN much faster than their larger counterparts. This is largely because they don’t have the legacy backload of technology nor the silos that larger organisations are saddled with. In turn, this has allowed them to automate testing so they can test hundreds and thousands of test scenarios every day, compared with their larger, older counterparts who are stuck testing a mere handful of their potential. This faster pace in testing enables these start-up operators to launch new services faster, often leading to better user experience.

Automation is a matter of long-term survival for many operators who are now moving from the hardware based generations of mobile technology represented by 3G and 4G to the software primacy of 5G. Their ability to roll out new services and technologies effectively will have huge implications for operator’s long term profitability and market share. However, in order to go forward, they have to go back and start their automation efforts with some of their most foundational data collection processes.

By Aleksi Helakari, Business Development Manager, EMEA – Spirent

]]>
Wireless sensor nodes as a key application for energy harvesting https://www.electronicsworld.co.uk/wireless-sensor-nodes-as-a-key-application-for-energy-harvesting/36477/ Thu, 09 May 2024 10:30:12 +0000 https://www.electronicsworld.co.uk/?p=36477 It seems that everything is going green in today’s environmentally planet-friendly mindset. The concept of energy harvesting has been around for over a decade; however, the implementation of ambient energy-powered systems in the real-world environment has been cumbersome, complex, and costly. Nevertheless, examples of markets where an energy harvesting approach has been used successfully include transportation infrastructure, wireless medical devices, tire pressure sensing, and building automation. Specifically, in the case of building automation systems, such things as occupancy sensors, thermostats, and even light switches have eliminated the power or control wiring normally associated with their installation and used localized energy harvesting systems instead.

Constructing smart buildings that will conserve energy, encompassing both commercial and residential structures, is a prerequisite to ensure energy efficient structures do not draw heavily from traditional power sources that utilize fossil fuels.

In the case of commercial buildings, making them smart can be critical for the organization that is housed in them, since having a building that is energy efficient and streamlined helps to reduce energy costs while also providing a productive environment for the workers within them. However, getting to this point is not without its own set of drawbacks. For example, these buildings will require an infrastructure that can provide the necessary feedback to enable efficient operation of heating and cooling systems, lighting control, and efficient space utilization. This will most likely necessitate the use of the Internet of Things (IoT) as a methodology to monitor and control the environment and will increase their reliance on alternative power sources to effectively manage and control them.

IoT Trends for Smart Buildings

Smart buildings will continuously transform how people carry out their activities on a daily basis. Furthermore, along with conserving energy, smart buildings will help to save money. Already some IoT smart building trends are taking shape to enable this transition.

A good example is how predictive maintenance will make use of sensors (IoT) and other hardware devices to get a report on the state of a commercial building and all equipment in it. This feedback will enable the timing of any necessary maintenance when it is needed, in a timely and effective manner. Unforeseen issues that usually crop up with a preventive maintenance schedule can be overcome by using a predictive maintenance approach.

Furthermore, worker productivity can be adversely affected by air quality. Industry research in this area has shown that workers are 10% more efficient in their duty when they work from buildings with good indoor environmental quality compared to more conventional buildings. Again, IoT devices can be used to measure and check the air quality, as well as carbon dioxide levels in the air using various sensors that are part of a mesh network. These devices are connected to all areas of the building infrastructure, thereby enabling a way to keep the environment and everyone in it healthy and productive.

Another new trend that is expected going forward is the use of IoT supported applications in smart buildings. A good example of this is the use of thermal imaging to allow facility managers to check if their equipment goes outside of its operating temperature range. This can be easily detected, thereby allowing maintenance to be performed before the equipment disrupts its normal operational mode. For example, IoT will transform the way commercial facility managers can track information and measure and collect data; this includes inaccessible areas that were previously too hard to reach. Installing sensors in various parts of the building will track all information that they never had access to in the past. By using IoT interconnected systems, facility managers will now have access to all pertinent information using these systems.

Furthermore, IoT will make it possible for commercial owners to have buildings that are energy sufficient. This influences the design of the buildings and allows them to be eco-friendly and resource efficient. Moreover, these intelligent building management systems can be remotely managed from anywhere, making it possible to replace outdated heavy construction equipment with sensors that can be controlled using indicators such as vibration and temperature fluctuations. Clearly, this saves a lot of energy and money while also reducing the maintenance costs.

Finally, one of the most important impacts that IoT can have on buildings is energy efficiency. Sensor networks help to provide information that helps managers control their assets more effectively, while also reducing harmful waste in the environment. Examples include:

  • Using sensors for temperature control
  • Using actuators for HVAC controls
  • Complex applications like providing complete energy automation for a building
  • Considering weather forecasts to save real-time energy costs

Wireless Sensor Nodes: An Energy Harvesting Key Application

A key application of energy harvesting systems is radio sensors in building automation systems. In the United States, buildings are the number one user of energy production on an annual basis, closely followed by the transportation and industrial segments.

A wireless network utilizing an energy harvesting technique can link any number of sensors together in a building to reduce HVAC and electricity costs by adjusting the temperature or turning off lights to nonessential areas when the building or rooms within are unoccupied. Furthermore, the cost of energy harvesting electronics is often lower than running supply wires, or the routine maintenance required to replace batteries, so there is clearly an economic gain to be had by adopting a harvested power technique.

Nevertheless, many of the advantages of a wireless sensor network disappear if each node requires its own external power source. Even though ongoing power management developments have enabled electronic circuits to operate longer for a given power supply, this has its limitations, and power energy harvesting provides a complementary approach. Thus, energy harvesting is a means of powering wireless sensor nodes by converting local ambient energy into useable electrical energy. Ambient energy sources include light, heat differentials, mechanical vibration, transmitted RF signals, or any source that can produce an electrical charge through a transducer. These energy sources are all around us and they can be converted into an electrical energy by using a suitable transducer, such as a thermoelectric generator (TEG) for temperature differential, a piezoelectric element for vibration, a photovoltaic cell for sunlight (or indoor lighting), and even galvanic energy from moisture. These so-called “free” energy sources can be used to autonomously power electronic components and systems.

With entirely wireless sensor nodes now capable of operating at microwatt average power levels, it is feasible to power them from nontraditional sources. This has led to energy harvesting, which provides the power to charge, supplement, or replace batteries in systems where battery use is inconvenient, impractical, expensive, or dangerous. It can also eliminate the need for wires to carry power or to transmit data.

A typical energy harvesting configuration or wireless sensor node (WSN) is comprised of four blocks, as illustrated in Figure 1. These are:

  • Ambient energy sources
  • A transducer element and a power conversion circuit to power downstream electronics
  • A sensing component that links the node to the physical world and a computing component consisting of a microprocessor or a microcontroller that processes measurement data and stores them in memory
  • A communication component consisting of a short-range radio for wireless communication with neighboring nodes and the outside world.

Examples of ambient energy sources include TEGs (or thermopiles) attached to a heat-generating source such as HVAC ducts, or a piezoelectric transducer attached to a vibrating mechanical source such as a windowpane. In the case of a heat source, a compact thermoelectric device can convert small temperature differences into electrical energy. In the case where there are mechanical vibrations or strain, a piezoelectric device can be used to convert these into electrical energy.

Once the electrical energy has been produced, it can then be converted by an energy harvesting circuit and modified into a suitable form to power the downstream electronics. Thus, a microprocessor can wake up a sensor to take a reading or measurement, which can then be manipulated by an analog-to-digital converter (ADC) for transmission via an ultra low power wireless transceiver.

 

318435 fig 01 Wireless sensor nodes as a key application for energy harvesting

Figure 1. The main blocks of a typical energy harvesting system.

Of course, the energy provided by the energy harvesting source depends on how long the source is in operation. Therefore, the primary metric for comparison of scavenged sources is power density, not energy density. Energy harvesting is generally subject to low, variable, and unpredictable levels of available power so a hybrid structure that interfaces to the harvester and a secondary power reservoir is often used. The harvester, due to its unlimited energy supply and deficiency in power, is the energy source of the system. The secondary power reservoir, either a battery or a capacitor, yields higher output power but stores less energy, supplying power when required but otherwise regularly receiving charge from the harvester. Thus, in situations when there is no ambient energy from which to harvest power, the secondary power reservoir must be used to power the WSN.

Successfully designing a completely self-contained wireless sensor system requires readily available power-saving microcontrollers and transducers that consume minimal electrical energy from low energy environments. Existing implementations of such energy harvester blocks are shown in Figure 1. These typically consist of low performing discrete configurations, usually comprising 30 components or more. Such designs have low conversion efficiency and high quiescent currents. These deficiencies result in compromised performance in an end system.

Since high quiescent current limit how low the output of the energy-harvesting source can be, it must first overcome the current level needed for its own operation before it can supply any excess power to the output. This is where ADI’s power product offerings can bring a new level of performance and simplicity.

An Energy Harvesting Example

The LTC3109 is a highly integrated dc-to-dc converter and power manager. It can harvest and manage surplus energy from extremely low input voltage sources such as TEGs, thermopiles, and even small solar cells. Its unique proprietary autopolarity topology allows it to operate from input sources as low as 30 mV, regardless of polarity.

 

318435 fig 02 Wireless sensor nodes as a key application for energy harvesting

Figure 2. An LTC3109 typical application schematic.

The circuit in Figure 2 uses two compact step-up transformers to boost the input voltage source to the LTC3109, which then provides a complete power management solution for wireless sensing and data acquisition. It can harvest small temperature differences and generate system power instead of using traditional battery power.

The ac voltage produced on the secondary winding of each transformer is boosted and rectified using an external charge pump capacitor and the rectifiers internal to the LTC3109. This rectifier circuit feeds current into the VAUX pin, providing charge to the external VAUX capacitor and then the other outputs. The internal 2.2 V LDO regulator can support a low power processor or other low power ICs.

With analog switch-mode power supply design expertise in short supply around the globe, it has been difficult to design effective energy harvesting systems for use in green buildings. One of the primary hurdles has been power management aspects associated with remote wireless sensing. Nevertheless, products like the LTC3109 can extract energy from almost any thermal source, thereby enabling a system designer to use an energy harvested power source. This not only reduces the use of fossil fuels but helps to make a greener building environment for current and future generations.

By Tony Armstrong, Business Development Director, Analog Devices (ADI)

]]>
Maintaining connectivity with load-bank tested backup batteries https://www.electronicsworld.co.uk/maintaining-connectivity-with-load-bank-tested-backup-batteries/36392/ Fri, 12 Apr 2024 08:06:29 +0000 https://www.electronicsworld.co.uk/?p=36392 Few sectors play a more crucial role in daily life than telecommunications. Allowing us to stay connected to people, businesses and public services, keeping telecom services online is vital. But maintaining power to base stations, particularly those in rural areas, can be challenging. In this article, Andrew Keith, director of load bank manufacturer Power Prove, explores how telecom batteries ensure connectivity, and the importance of regularly testing them.

As we move into the colder months, the weather can wreak havoc on our power services. Although designed to withstand wintery conditions, as the UK’s grid infrastructure ages, extreme temperatures cause the power system’s electromechanical components to work less effectively.

Wind and snow can cause branches to land on power lines, and other extreme conditions such as lightning also pose a threat. In 2019, two power stations failed immediately after a major lightning strike, resulting in almost a million people in England and Wales being left without power.

During extreme weather conditions, emergency services often see an increase in calls, meaning access to telecommunications is key. For the sake of our safety, power supply must be maintained. When so much depends on the availability of mains power, how can we maintain connectivity?

An additional source of power

To safeguard the power supply, mobile base stations have uninterruptable power supply systems (UPS) to provide backup during outages. Limited space and resources mean these stations and street cabinets cannot always be equipped with their own independent generator. As a result, batteries are the most common back-up solution, which are charged using mains electricity and can be used during outages.

Consequently, battery health is crucial. There are tens of thousands of mobile base stations in the UK, with each one potentially responsible for providing connectivity to thousands of households and businesses. Therefore, in emergency situations, a loss of service could have wide-ranging negative implications. Knowing the exact condition of each battery within the network enables engineers to identify whether batteries are still fit for use or if they need replacing.

So, how can we determine battery health? Although all batteries degrade naturally over time, those in locations that often experience outages are likely to degrade faster than those in areas with a more reliable supply. Degradation often occurs when batteries are partially discharged and recharged during outages, and can worsen battery condition. Static performance measurements can be useful, but don’t always offer a full picture of battery health or capacity.

Testing with load banks

Load banks offer a clearer image of these metrics. A load bank is a piece of electrical test equipment capable of testing power sources by simulating loads. Frequently used to check generator performance, load banks can also verify battery health with a simple discharge test. Complete battery discharge allows the explicit identification of battery health and condition.

Load bank testing as part of a preventative maintenance plan not only ensures connectivity is maintained during outages, but can also reduce costs of rush purchasing and installing new backup batteries.

While the weight of standard generator testing load banks makes them difficult to transport, Power Prove offers a variety of portable DC load banks, ideally suited for telecom battery testing. Load banks on wheels enable portability, and with a load capacity of up to 30kW, they allow access to higher voltages.

As the UK has thousands of mobile base stations with backup batteries in need of testing, it is essential that load banks are suited to use across multiple sites. To reduce the amount of time and fuel used on repetitive tests, Power Prove offers a load bank equipped with load profile memory. This enables the unlimited input of pre-configured load step sequences for quick and efficient testing.

As the likelihood of extreme winter weather events increases, it threatens the reliability of our energy supply. But for sectors that depend on uninterrupted power, where individual generators are not viable, there are options available. When tested regularly, backup batteries play a crucial role in ensuring connectivity for when we need it most.

]]>
Surge protection best practices for communications sites https://www.electronicsworld.co.uk/surge-protection-best-practices-for-communications-sites/36260/ Tue, 05 Mar 2024 11:33:01 +0000 https://www.electronicsworld.co.uk/?p=36260 The growing number of extreme weather events around the world has cast a bright light on the importance of protecting key systems in communication networks, like radio towers, broadband sites, small cell applications and the headend communication infrastructure that supports downstream networks. These sites all have one major growing pain driven by the need for faster speeds and data bandwidth.

Wireless communication has become an integral part of our lives. Each day, millions of people and billions of devices are connected to a radio tower. Total global mobile data traffic is expected to grow 300% by the end of 2028 to reach 472 EB per month, according to Ericsson. Municipalities, private businesses, healthcare providers and emergency services rely on wireless communication to function properly and serve their communities – and the towers distributing wireless signals are a vital part of private and public communications networks.

To meet the growing demand of data-hungry consumers, today’s telecommunications operators are investing heavily in the latest high-bandwidth technology. This next-generation equipment is more compact and integrates multiple pieces of previously used site equipment into a single unit with broader capabilities and greater processing capacity, which makes the equipment more vulnerable to lightning strikes and other surge events. These high-tech solutions are invaluable parts of communications infrastructure and must be equipped with cutting-edge surge protection devices (SPDs). This ensures uptime and a way to protect your communication system investments while providing users with an experience that creates loyalty with an uninterrupted, data-rich service.

Furthermore, the equipment being installed to keep up with these growing numbers is more sophisticated, which comes with a higher price tag. This means safeguarding these investments from transient surge events is critical to any network design. The other consideration is the cost to maintain, repair or replace damaged equipment, and the labor cost required to get customers back online. Tower climbs, troubleshooting sites and equipment replacement are areas where businesses can reduce costs by utilizing SPDs to eliminate one major variable facing the network.

Protecting communication networks

We hear from customers every day that surges are a prime concern when it comes to protecting their networks, as they are notorious for degrading, damaging, or destroying microprocessor-based electronics and interrupting, delaying and corrupting signal transmissions. Surges can compromise communications equipment in different ways. A nearby lightning event can induce transients onto the signal and power transmission lines or energize the earth around the equipment. Another common occurrence is a direct strike to equipment located on the site.

Due to the combination of increased reliance on wireless communication and the rising risk of severe weather events, I find that engineers are paying more attention to SPDs and how this relatively inexpensive – yet critical – piece of equipment can better safeguard communication networks. Engineers are searching for robust and reliable solutions, especially for sensitive communications systems in areas with high exposure to lightning storms.

Having worked with operators and manufacturers around the world for the past five decades, our surge protection experts at Transtector and PolyPhaser, both Infinite Electronics brands, recommend focusing on key areas when searching for SPD solutions: reliability, performance and ease of installation.

Reliability: The reliability of the SPDs safeguarding your radio and related equipment is paramount. SPDs must be able to withstand huge swings in voltage without failing to protect your hardware. It is also important that when these SPDs see transient events, they can divert a surge event away from the equipment of concern and reset quickly to protect from the next event. Lightning events are not a single event – each strike can have 12 to 20 events in a microsecond timeframe, which makes robust and repetitive surge protection critical to your sensitive equipment.

Performance: The performance of SPDs directly impacts the longevity of both the devices themselves and the equipment they protect. Surge capacity, voltage protection levels and sacrifice modes are all important performance criteria to consider when evaluating SPDs. That performance level is critical for a wide variety of applications, including cellular networks, distributed antenna systems, emergency response, public safety systems and citizens broadband radio services.

We also recommend that engineers closely review test results. Ask for data on performance testing, UL listing and NEC/local code compliance.

Ease of installation: The importance of easy installation cannot be understated. It is an area engineers often overlook because they are hyper-focused on reliability and performance. Installing surge protection incorrectly without properly grounding the device or connecting it to a site with bad grounding can impede the effectiveness and performance of an SPD. Quick, straightforward installation procedures make it easier to replace SPDs when sites are exposed to lightning or other extreme surge events.

Other things to look for when selecting SPDs include technical support (to help size products correctly to customer applications) and manufacturers with solutions to support the ever-changing communication architecture.

Surge protection best practices

It is impossible to prevent lightning, but when speaking with customers I always suggest they take simple steps to minimize the potential for damage and downtime due to a strike. As a former applications engineer, here are seven best practices I recommend to help prevent damage to sensitive communication systems that could be caused by lightning and other power surge sources1.

  1. Confirm the correct installation. Protection starts with proper installation. SPDs should be installed on both ends of Ethernet and DC power cables going up a tower to a radio. Surge energy that couples with a cable will travel in both directions to find a path to the ground, and it will enter any unprotected equipment on the line. During my time in the field, this is something I noticed is often overlooked. By installing SPDs at both ends of a cable, you’re able to mitigate that risk. Consider protecting all paths and equipment from AC, data, RF and DC applications with surge protection. This saves on costs by eliminating the need for replacement equipment as well as the labor associated with replacing damaged equipment, while also keeping your end customers happy and connected.
  2. Ensure the ground connection is present. An SPD requires a ground connection to divert the surge energy away from the radio. Poor grounding is the most common reason for radio failure even with surge protection installed. An SPD can be rendered ineffective by no ground connection, a high-impedance ground connection or an improperly installed grounding system.
  3. Repetitive surge capabilities are a must. For specific applications, select SPDs that can withstand repetitive surges without degrading. For these applications use SPDs with silicon avalanche suppression diode (SASD) circuits. This type of component does not degrade or cause thermal runaway conditions and has one of the lowest VPLs to provide the highest level of protection for communication equipment.
  4. SPDs should sacrifice themselves. Under extreme surge events, SPDs should sacrifice themselves to protect the communication equipment. SPD components like MOVs can fail very violently and will damage everything around them. Standalone SPDs are designed to fail safely in their enclosure and contain a violent failure. This is a critical reason to consider standalone surge protection versus integrating surge components on a board or directly into your radios or communication equipment. The ideal way to protect equipment is to eliminate the transient before it enters your equipment and system.
  5. Properly apply DC power SPDs. DC surge protection on both (+) to ground and (−) to ground are critical. The addition of protection across the + to – (line to line) provides an added level of safety for grounded DC systems.
  6. Get GPS synchronization insurance. Despite the increased utilization of fiber, coaxial radio deployments still play a critical role in broadband communication infrastructure. GPS systems are critical to the time synchronization of today’s networks. The GPS antennas are often at a high elevation connected to the network with a conductive coaxial cable that requires a unique approach to surge protection. The use of maintenance-free inductor-based DC-pass RF protection is highly recommended for GPS antenna installations.
  7. Ensure proper AC power protection. A lot of time is spent making sure the proper protection for radios is used while often overlooking one of the most common paths for surge energy. The main AC power feed at a site is directly connected to an aging utility grid that provides a wide-open path for high-level surge events. Proper protection on the main AC power source at a communication site is highly recommended.

In today’s increasingly connected world, communication networks have become indispensable to our daily lives, but they are not immune to the forces of mother nature. By following these tips and best practices, network engineers and site managers can be confident they have the right SPDs protecting their communication sites – and have the peace of mind that the systems will function properly when their customers need them the most.

By Jason Koshy, VP Global Sales at Infinite Electronics

]]>