February issue

Page 1

Vol : 1, Issue 02, February 2016, Monthly

5G

Security

Science Gazette &Technol gy

The way Ahead and Challenges

Necessity of new label: Cyber Physical System (CPS) A network of Mechatronics Systems Automation of Application Delivery at Data Centre's: Challenges and Solutions 10 Ways to Stay Safe Against Ransomware and Other Advanced Threats


NOTION

Time ripe for Indian electronics makers U.S and China have recently locked horns over the semiconductor trade where US accused China of rigging the industry by giving an unfair advantage to Chinese chip companies and artificially reducing the prices of the chips. While China seems to pay no heed to the allegations and continues to expand its innovative semiconductor industry, the clash between these global leaders has certainly carved a window of opportunity for various countries to step up and fill in the inevitable void; which is, ‘the need for an alternate electronics export partner’. Amidst the uncertainties and the ongoing tussle, the Indian Government recently rolled out its Union Budget which has set straight the country’s ambitious of reviving the electronics manufacturing sector and taking up the role of the alternative export partner global manufacturers seek. An initial allotment of RS 725 crore was made to the manufacturing sector, which is the highest ever investment by the Indian Government in its manufacturing prowess. In Indian IT industry too seems to be upbeat post the budget announcement and while the global trade policies too seem to be working in their favor. For instance, President Trump, in an attempt to fulfill his poll promise of generating more jobs in America, has proposed a Bill that increases the minimum salaries of H1-B employees to $130,000. This Bill will likely increase the cost of the Indian IT firms, who derive almost 62 percent of their revenue from the US and send a large number of Indian staff to the US on the H1-B visa for offsite work. The plan to reduce income tax will further increase the purchasing power of the consumer, which would in turn go a

long way in increasing the demand in the Electronic System Design & Manufacturing (ESDM), Aerospace and Defence space. While presenting Union budget 2017-18 in the Lok Sabha, Indian Finance minister, Arun Jaitley confirmed the government’s plans to create an ecosystem which will help India pave the way to becoming a global hub for electronics manufacturers. Another factor which will prove crucial in giving a leg up to both the ESDM and Aerospace and Defence sectors will be the design-led manufacturing and a robust ESDM ecosystem. Japan, Taiwan, Israel, Singapore and United States are countries that the government and the industry need to keep an eye on. A stronger bond with these countries will only propel up-gradation of the ESDM industry in India. The odds seem to be playing in the favor of India and recent developments may have boosted the moral of the Indian makers, but becoming a global electronics manufacturing is still a vision is a bit farfetched. I hope you enjoy reading our Feb Issue! Sincerely Yours

Sagar Rawat Asst. Editor scigazetteofficial@gmail.com

Scigazette | 02 | February, 2017


5G

Security

contents 14 Cover Story The way Ahead and Challenges

Inside News

04 08 Innovation First ever blueprint unveiled to construct a large scale quantum computer

Technology

Automation of Application Delivery at Data Centre's : Challenges and Solutions

12 Necessity of new label Cyber Physical System (CPS) A network of Mechatronics Systems

19 How sensor technology will shape the cars of the future Artificially introduced atomic-level sensors enable measurements of the electric

21 field within a working semiconductor device 23 Time to Say Yes to Hyper Convergence

25 10 Ways to Stay Safe Against Ransomware and Other Advanced Threats New 32 Gbaud PAM4 High Amplitude Output

27 and CTLE/PAM4 Decoder BER Test Functions for MP1800A Series 29 New Products

09


News

AES and Mitsubishi to build first grid-scale storage system in India The battery plant will be operated by Tata Power Delhi Distribution Limited (Tata Power-DDL), but AES and Mitsubishi will develop and own the 10MW array based on the Advancion energy storage system developed by AES. This will handle peak load management, increase system flexibility and support high levels of reliability for more than 7 million customers in the region. “For a rooftop solar program to be successful, it is important for the distribution network to integrate it with energy storage solutions to take care of power generation spikes and fluctuations, system stability, reactive power compensation and grid emergencies," said Praveer Sinha, CEO and MD of Tata Power-DDL. "Tata Power-DDL has implemented many smart grid technologies and is

privileged to implement India’s first utility-scale 10 MW storage solution with AES and Mitsubishi Corporation. This will prove to be an important learning for developing integrated rooftop solar and storage solutions for India,” . India plans to install 160,000 MW of solar and wind generation over the next five years and energy storage will play a critical role in ensuring its integration into the grid.

Budget 2017: Allocation for Apple files $1 billion lawsuit against chip supplier Qualcomm electronics makers to Rs 745 crore

Apple Inc filed a $1 billion lawsuit against supplier Qualcomm Inc days after the U.S. government accused the chip maker of resorting to anticompetitive tactics to maintain a monopoly over key semiconductors in mobile phones. Qualcomm is a major supplier to both Apple and Samsung Electronics Co Ltd for “modem” chips that connect phones to wireless networks. The two companies together accounted for 40 percent of Qualcomm’s $23.5 billion in revenue in its most recent fiscal year. In the lawsuit filed in U.S. District Court for the Southern District of California, Apple accused Qualcomm of overcharging for chips and refusing to pay some $1 billion in promised rebates. Apple said in its complaint that Qualcomm withheld the rebates because of Apple’s discussions with South Korea’s antitrust regulator, the Korea Fair Trade Commission. “If that were not enough, Qualcomm then attempted to extort Apple into changing its responses and providing false information to the KFTC in exchange for Qualcomm’s release of those payments to Apple. Apple refused,” Apple said in its lawsuit.

Aimed at positioning India as a global manufacturing hub, finance minister Arun Jaitley announced increase in allocations towards schemes like Modified Special Incentive Package Scheme (M-SIPS) and Electronic Development Fund (EDF) to Rs 745 crore in 2017-18. “We are also creating an ecosystem to make India a global hub for electronics manufacturers. Over 250 investment proposals for electronics manufacturing has been received in the last 2 years, totaling an investment of Rs 1.26 lakh crore,” Jaitley said while presenting Union budget 2017-18 in the Lok Sabha. A number of global leaders and mobile manufacturers have set up production facilities in India, he added. “I have therefore exponentially increased the allocation and incentives of schemes like M-SIPS and EDF to Rs745 crore in 2017-18, this is an all-time high,” he said.

Scigazette | 04 | February, 2017


News

China's Tsinghua to build $30 billion chip factory Tsinghua Unigroup Ltd. plans to build a $30 billion memory-chip production complex that will become China’s largest, even as U.S. officials raise concerns about the country’s intention of dominating an industry crucial to the computing and smartphone markets. The arm of the government-linked Tsinghua group intends to erect a semiconductor complex around an envisioned plant in the eastern city of Nanjing that will have an initial monthly capacity of 100,000 wafers.

That will help China “leapfrog development in mainstream storage,” according to a statement carried on the company’s website. Tsinghua, the investment and technology affiliate of the university attended by Chinese President Xi Jinping, is leading a $150 billion charge to develop a world-class semiconductor industry and reduce the country’s reliance on foreign technology. The U.S. however is concerned that a dominant China could threaten the competitiveness of

American players and even national security. Intel Corp., Micron Technology Inc. and Qualcomm Inc. are among the biggest U.S. suppliers of chips to China.

Cisco LaunchPad to accelerate Modi's Startup India initiative

In a fillip to Prime Minister Narendra Modi’s ‘Start-up India’ campaign, USbased global technology company Cisco on Wednesday unveiled

‘LaunchPad’, an open innovation initiative to accelerate startups and support growth among India’s young developer community. For this, Cisco will provide a space at its Bangalore campus with access to a suite of Cisco technologies and free grants to startups chosen to work at its campus. “Innovation and investment are the key drivers of the Indian economy, leading to jobs, growth and long-term prosperity. India is a hotbed of entrepreneurial talent and Cisco LaunchPad will be a tremendous

accelerator for startups to develop digital solutions that reach a global market,” added KS Vishwanathan, Vice President, Nasscom, Indian IT industry trade body. India is the youngest startup and developer nation in the world and is projected to have the world’s largest number of developers by 2018. Through ‘LaunchPad’, the startups will get an opportunity to work on solving business relevant problems by catering to use cases that are identified and validated by Cisco goto-market teams.

element14 extends 'Change the World' design competition deadline element14 has extended the deadline of its global competition to discover how engineers can ‘Change the World’ with their design ideas. Entries will now be accepted on the competition website until 28th February 2017. The competition asks designers to think of creative ways they could use $1,000 of products from element14 to make a positive impact. Entrants provide a short explanation of their ideas, together with a list of the

products they would use, and 10 finalists will receive their chosen products to the value of $1,000 to make their idea real. “Once you have an idea, entering is really simple and only takes a few minutes,” said Steve Carr, Head of Marketing for Premier Farnell. “With over 600,000 products to choose from, we’ve already seen some great ideas that use technology to have a positive impact.” Entrants simply need an idea that Scigazette | 05 | February, 2017

uses element14 products to make a positive impact the world through technology. Engineers looking to enter the competition can find more information at www.element14changetheworld.com


News

India plans to build over 1,000 digital villages India took another step toward a digital economy with the government’s announcement that it would provide free wi-fi to 1,050 villages in the next six months as part of its Digital Village initiative, CNN reported. Cell phone users will get access to the internet via wi-fi hotspots mounted on towers. The Digital Villages initiative will initially cost over Rs420 crore ($62 million) and, along with basic internet

access, will provide avenues for interactive telemedicine and educational sessions. “The project is a public-private partnership, and will be driven through the common service centres (CSCs),” Aruna Sundararajan, secretary at the ministry of electronics and information technology, told The Economic Times. “We’ll be partnering with different service providers to do it,” Sundararajan said. Common service

centres are used by rural residents for a variety of digital services, such as filling out online forms or making digital payments.

Trump's 'Buy American-hire American' pledge unnerves Indian IT

New US President Donald Trump’s ’Buy American-hire American’ rallying cry has put the USD 150- billion Indian IT industry on edge, which is in waitand-watch mode to see how the new administration evolves policies around

outsourcing and movement of skilled workers. India hopes to have a meaningful engagement with the US, Electronics and IT Minister Ravi Shankar Prasad has said. Given that US market accounts for 60 per cent of India’s IT exports, the industry and the government here will spare no efforts in their outreach programme over the next few weeks to showcase the role of Indian technology sector in making the US economy more competitive and highlight its contribution in terms of

billions of dollars paid in taxes and creation of local jobs. “Indian IT companies are in 200 cities across 80 countries. They have added big value to the US, and given jobs to lakhs of people including American people there. I am given to understand that they have paid billions of dollars in tax. So they have added value to America in terms of money, by way of tax and also employment,” Prasad said in an interview just hours before Trump was sworn in as the 45th US President.

Local electronic component makers to invest Rs 1K cr in 2017 Domestic electronic component makers have plans to invest over Rs 1,000 crore this year on manufacturing units in the ELCINA Bhiwadi Cluster. “The space in the cluster has been allocated to 19 domestic electronic components makers as of now. Together they are planning to invest over Rs 1,000 crore in phase 1 which is expected to be completed by October this year,” ELCINA Secretary General Rajoo Goel said. The ELCINA Electronics Manufacturing Cluster (EMC) is spread over 100 acres in Bhiwadi, Rajasthan, and is to be completed in two phases. “We expect direct employment in the range of 5,000-6,000 people and indirect employment of up to 12,000 in phase 1. We have utilised 28 acre of land as of now. Besides domestic component makers, we are also in talks with foreign component makers based out of Taiwan to set up

their units here,” Goel said. Investors in the cluster include Sahasra Electronics, Deki Electronics, Elin Electronics, Fiem Industries, Digital Circuits, Kraft Box and E-Durables.

Scigazette | 06 | February, 2017


News

RS Components sets up a new Electronic Center in Bangalore

RS Components, a 50:50 joint venture between RS Components (UK) & C&S Electric Ltd. (India), has opened their innovation hub, a new ‘Electronic Centre’ in Bangalore. The high service level supplier of electronic

components and tools plans to invest close to $15 million over the next two to five years at the Bangalore centre. The new 2000 Sq feet office in the heart of Bangalore has been set up to support electronic design engineers

and manufacturers in the region. The company also plans to set up a warehouse which will enable RS Components to undertake “next day delivery” to its customers. The Bangalore Centre will have technical marketing and support teams, specialized sales force that will focus on specific industry verticals like IoT, Medical Electronics, Aeronautics, Automotive and R&D sector. Speaking at the launch of the Electronic Centre, Mr. Keith Rice, Head of Emerging Markets, RS Components, said, “Our Electronic Centre at Bangalore is a great opportunity to bespeak RS’ strong value proposition in the light of our technical expertise and tailor made solutions that create a huge difference in the day-to-day life of a design engineer.”

UK fraud hits record £1.1bn as cybercrime soars The value of fraud committed in the UK last year topped £1bn for the first time since 2011, prompting a warning about increasing cyber crime and the risk of more large-scale scams as the economy comes under pressure. The 55% year-on-year rise in the value of fraud to £1.1bn reported in the court system was recorded by accountants KPMG, which found that while the cost of fraud was higher the number of incidents was lower. Highlighting a dramatic rise in cybercrime, KPMG’s statistics included a £113m cold-calling scam for which the ringleader received an 11-year jail sentence in September. Feezan Hameed was caught after targeting 750 Royal Bank of Scotland customers in the biggest cyberfraud the Metropolitan police had seen. Hitesh Patel, UK forensic partner at KPMG, said: “The figures for 2016 tell

us two things. Firstly, that we can expect more of these super frauds as challenging economic circumstances place pressures on businesses and individuals and as technology Scigazette | 07 | February, 2017

becomes more sophisticated.


Innovation

First ever blueprint unveiled to construct a large scale quantum computer An international team, led by a scientist from the University of Sussex, has unveiled the first practical blueprint for how to build a quantum computer, the most powerful computer on Earth. It has long been known that such a computer would revolutionize industry, science and commerce on a similar scale as the invention of ordinary computers. But this new work features the actual industrial blueprint to construct such a large-scale machine, more powerful in solving certain problems than any computer ever constructed before. Once built, the computer's capabilities mean it would have the potential to answer many questions in science; create new, lifesaving medicines; solve the most mind-boggling scientific problems; unravel the yet unknown mysteries of the furthest reaches of deepest space; and solve some problems that an ordinary computer would take billions of years to compute. The work features a new invention permitting actual quantum bits to be transmitted between individual quantum computing modules in order to obtain a fully modular large-scale machine capable of reaching nearly arbitrary large computational processing powers. Previously, scientists had proposed using fibre optic connections to connect individual computer modules. The new invention introduces connections created by electric fields that allow charged atoms (ions) to be transported from one module to another. This new approach allows 100,000 times faster connection speeds between individual quantum computing modules compared to current state-ofthe-art fibre link technology. The new blueprint is the work of an international team of scientists from the University of Sussex (UK), Google (USA), Aarhus University (Denmark), RIKEN (Japan) and Siegen University (Germany). Prof Winfried Hensinge, head of Ion Quantum Technology Group at the University of Sussex, who has been leading this research, said: "For many years, people said that it was

completely impossible to construct an actual quantum computer. With our work we have not only shown that it can be done but now we are delivering a nuts and bolts construction plan to build an actual large-scale machine." Lead author Bjoern Lekitsch, also from the University of Sussex, explains: "It was most important to us to highlight the substantial technical challenges as well as to provide practical engineering solutions". As a next step, the team will construct a prototype quantum computer, based on this design, at the University. The effort is part of the UK Government's plan to develop quantum technologies towards industrial exploitation and makes use of a recent invention by the Sussex team to replace billions of laser beams required for quantum computing operations within a large-scale quantum computer with the simple application of voltages to a microchip. Prof Hensinger said: "The availability of a universal quantum computer may have a fundamental impact on society as a whole. Without doubt it is still challenging to build a largescale machine, but now is the time to translate academic excellence into actual application building on the UK's strengths in this ground-breaking technology. I am very excited to work with industry and government to make this happen." The computer's possibilities for solving, explaining or developing could be endless. However, its size will be anything but small. The machine is expected to fill a large building, consisting of sophisticated vacuum apparatus featuring integrated quantum computing silicon microchips that hold individual charged atoms (ions) using electric fields. The blueprint to develop such computers has been made public to ensure scientists throughout the world can collaborate and further develop this brilliant, groundbreaking technology as well as to encourage industrial exploitation.

Scigazette | 08 | February, 2017


Automation of Application Delivery at Data Centre's Challenges and Solutions

Nikhiil Taneja MD, Radware

Businesses are continuously looking to adjust IT practices to improve operational efficiencies and reduce overall costs. The operational processes of current data center environments create numerous challenges.

T

virtual versions of applications introduces the challenge of managing and maintaining your application instance inventory at all times.

The virtualization of the data center adds another layer of complexity in managing and maintaining appliances and applications. The application is hosted in an environment that includes multiple form factors such as physical standalone appliances, modular chassis-based solutions with integrated modules, and software based virtual appliances. The flexibility and ease of deployment for

More solutions and technologies are continuously being added to the application delivery infrastructure. Tools are available to accelerate web content, offer application-level security, and perform high-speed encryption/decryption. Business policies need to be centrally defined and applied to all of the policies through the solutions equally and consistently. Data center operators need to manage, synchronize and maintain configurations and policies across multiple devices, even as these devices are added and removed in the newly created virtualized

his includes an increasing number of devices and solutions in the data center across multiple geographical locations, complex solutions comprised of several technologies with cross-dependent configuration and solutions that integrate with one another.

Scigazette | 09 | February, 2017


environment. The challenges of management and maintenance are highly relevant to L4L7 services, including application delivery controllers (ADC). Automation becomes a critical requirement for such services to simplify and streamline the operational control of these services. When a new application is deployed and it is necessary to onboard multiple ADCs in multiple data centers as quickly and as reliably as possible, ADCs often perform high speed encryption/decryption, so it’s important to obtain reliable and clear status of the SSL certificates across a range of ADCs and services (and being able to execute SSL related actions as a result). The increased complexity and integration of application delivery technologies highlight the need for automation.

The allows ADC and security customers to benefit from a complete toolset that provides advanced automation and productivity capabilities. This results in the streamlining of complex operations and the automation of recurring tasks. Operational teams are no longer required to have the advanced technical expertise required to manage and support the advanced application delivery and security solutions. The automation of the workload reduces the introduction of mistakes and human error to the recurring operational processes. All of this results in reduced operational costs and improved operational

A library of tools is provided with the delivery of the Operator Toolbox. The most common tasks that are used to operationally support the application delivery and security solutions for end-to-end application support have been identified. Scripts are created and delivered as simple tools that can automatically execute these tasks without the need for extensive training or advanced technology knowledge. Most companies need to make adjustments based on their specific application requirements or for customized applications that are unique to their business. The set of

Enhanced Lifecycle Management with Operator Toolbox Productivity Tools For as long as data centers have existed, automating and streamlining the processes and operations of IT infrastructure has been a critical priority for IT organizations. Businesses want to reduce their operational expenses via the simplification of operational tasks. Automation reduces the expertise necessary to carry out these functions and minimizes the introduction of human error. With APSolute Vision and its embedded Operator Toolbox, customers can benefit from greater productivity while receiving the following benefits: Ÿ Reduced application spin-up time

to market Ÿ Error-proof configuration &

maintenance tools Ÿ Reliable and easy configuration of

complex services Ÿ Increased IT team productivity Ÿ Reduced capacity planning risk

efficiency.

Extensible Automation with Operator Toolbox Operator Toolbox enables streamlined execution of complex operations, automation of common recurring tasks, and the reduction of manual errors and overhead associated with administrative tasks. Operator Toolbox uses the integrated Radware vDirect management technology to execute vDirect Configuration templates based on a shared script repository. This mechanism allows the ADC administrator to automate an array of ADC-related operations to substantially increase the operations staff’s productivity. Scigazette | 10 | February, 2017

tools that are delivered with Operator Toolbox can be modified to meet the customer requirements. Customized tools can be created by the business to support their unique applications and operational processes.

Turning Manual Operational ADC and Security Processes into Automated Tools Operator Toolbox transforms the traditional manual service management approach into an automated process managed via an intuitive UI that doesn’t require any familiarity or expertise with the managed solutions. The expertise and knowledge to manage the advanced ADC and security services is built into


the tools and scripts available through the easy-to-use Operator Toolbox UI. When a new instance of a service or application is deployed, the Operator Toolbox tools will guide the operator through a graphical wizard that asks for the unique parameters of the service, such as IP address, server name, and SSL key. The bulk of the service configuration is standardized based on application and business requirements. All of these standardized components including load balancing algorithm, security policy, SNMP management, and global variables are automatically added to the solution configuration. This process simplifies and automates the delivery of application and security services and eliminates the potential for certain configuration steps to be forgotten or misconfigured. It becomes impossible to have inconsistent application and security deployments because the Operator Toolbox takes the manual variability out of the process. Complex and advanced services can be managed by the operational team without the expensive and extensive training necessary to make them application delivery and security experts. The advanced functions and knowledge to enable them in the IT infrastructure is built into the tools that operational staff have access to via the Operator Toolbox. The operations team only needs to understand which tool to execute for a service to be enabled and updated. This eliminates the need for the operations team to escalate configuration and management questions to the subject matter experts (SME) and architects. Reducing the number of escalations and total time spent improves the operational efficiency of the IT organization.

Automation Equals Cost and Resource Savings

Businesses can see immediate benefits and cost savings when implementing the Operator Toolbox. Tasks that were time consuming and prone to error are immediately converted to automated processes. Over time, businesses can modify the tools to meet their specific IT requirements to deliver increase savings.

architectures to support their application delivery requirements. The support of application delivery and security services for these architectures can be both costly and time-consuming. IT executives are looking for tools to simplify the operational management of these solutions and reduce the overall costs to support the IT infrastructure.

The automation of operational tasks can reduce the resources and time spent managing ADC and security services up to 95%. This reduces operational resources required to manage other tasks and services while increasing IT agility and freeing resources for other projects.

Operator Toolbox through APSolute Vision can deliver unique and differentiating solutions that simplify complex task of managing and supporting advanced application delivery and security services. The benefits of automating and simplifying the configuration and management of application delivery and security services extend across the entire IT organization.

The standardization of the advanced tasks via templates and scripts enables organizations to deliver complex services faster and more efficiently. The potential for error is reduced or eliminated and large portions of the delivery process can be managed by team members that are less skilled since the complexity of the task is built into the Operator Toolbox scripts.

Adding Interoperability through REST API Thanks to a comprehensive REST API, APSolute Vision exposes its entire functionality of vDirect and Operator Toolbox to third-party portals and data center management/automation systems. With APSolute Vision’s REST API, customers can gain programmatic access to any report, chart, table or screen which appears on APSolute Vision Web-based management (WBM). The APSolute Vision REST API works in concurrence with the APSolute Vision WBM and enforces shared-device locking to prevent concurrent configuration modification.

Conclusion Businesses are building more advanced and complex IT

Scigazette | 11 | February, 2017

Businesses can: Reduce the operational time needed to manage application delivery and security services by up to 95% Improve project delivery times via automated tasks Reduce the training times necessary to support application delivery and security solutions Eliminate human error and misconfiguration throughout the IT infrastructure Reduce costs through operational efficiencies *APSolute Vision is Radware’s centralized management and reporting system.


Necessity of new label

Cyber Physical System (CPS) A network of Mechatronics Systems

Dr Madhavan Shanmugavel Monash University Malaysia campus

Mechatroincs System (MS) encompasses one or more physical system with sensors and actuators with closed loop (CL) feedback control. By nature, a CL feedback system immune to external disturbances. Thanks to advances in Micro Electro Mechanical Systems (MEMS) which paved the way for miniaturization in turn lead to affordable sensors. Since the date of introduction, the major contribution of MS can be found within the realm automation and manufacturing.

A

typical manufacturing industry has several worksites such as production, assembly, development, prototype section etc. with hundreds of MS.The material flow, quality control, products, processes, and operations at one site depend on what’s going on other site. The Quality and Performance (Q&P) of final product would be the summation of Q&P of individual systems from the work sites. For example, consider two work sites: WA, and WB, each produces component CA, and CB, and their Q&P are evaluated by their corresponding MSA, and MSB. A Final Product (FP) is produced by assembly of these components: FP  CA CB. The Q&P of the FP would be assessed after the assembly. The quality of the FP will be attributed from that of CA, and CB, while the performance of the FP is partially attributed from the components. The better quality can be achieved by making interaction between MSA, and MSB at the critical stages during the production of components. Also, better performance can be achieved by the user feedback, or the live field data. Until recently, no such practice is not available in a large scale.Such a Network of Mechatronic Systems(NMS): MSAB{i,j}– MSA{i,j}r MSB{i,j}.form a network of their own. This network is formed within the realm of the industry. This definitely needs a seamless communication and higher Scigazette | 12 | February, 2017


computations. The recent influx of massive data from distributed mobile sensor platforms through the cyber world increases the complexity of the network not only in terms of computation and also with communication, and decision making. The collection of these sensor platformstalk to one another through internet called Internet of Things (IOT). They exchange knowledge {K1, K2,‌,Ki, Kn} with the Mechatronics Systems. This knowledge may be customer feedback, field data, services, and servicerequests. They may be required to take a wise decision which will enhance time to market, high productivity, reduced latency, delay and so on. Fundamentally, the whole system is formed by network of Mechatronic Systems (NMS) which are interacting with the cyber world through knowledge, information, or services & requests. It is the necessity of time to inform the new generation about these changes through new buzz word called Cyber Physical System (CPS). In addition to higher computation loads and communications, the CPS also carries one of the most challenges persists with the Mechatronic system design, that is Unified Modelling platform which would provide a seamless communication and exchange of ideas and thoughts across different domains and stakeholders is still not available for designing a Mechatronics product. There are various software tools: Model Driven Development (MDD), Unified Modelling Language (UML) and Object Constraint Language (OCL), etc. However, they have limitations in providing a common design platform. Recently, Bond Graph based Unified Modelling Framework was proposed which could handle this design issue through both signal, and energy level interactions between system entities. Short bio:

experience in Mechatronics, Automotive and Aerospace domains. He holds PhD for the thesis work on Cooperative path planning of Unmanned Autonomous Vehicles from Cranfield University, UK. He acquired industrial experience in automotive testing and development from TATA Motors, India for four years. He got his Masters degree from Indian Institute of Technology Madras, India for the research on active suspension control. He holds professional memberships in Society of Automotive Engineers (SAE), International Federation of Automatic Control (IFAC) Aerospace section. His main teaching duties are Dynamical systems, Mechatronics project, Engineering Mechanics, and Mechanics of Materials.

Dr Madhavan Shanmugavel is involved in teaching and research of Mechatronics at Monash University Malaysia campus for the past five years. His area of research includes Unmanned Autonomous Vehicle & vehicle systems, Path & trajectory planning and control, Navigation, Lateral dynamics and uncertainty propagation, Dynamical systems - Design, Modelling, Control, and experimentations. He has extensive research and industrial Scigazette | 13 | February, 2017


Cover Story

enabler for continuity of the business. Users already realize that security and privacy are important, and they could be aware of the security/privacy service provided to them. It is believed that the extent and strength of the security mechanisms provided correlate with the perceived security level, at least in the long run. Perception is closely related to trust, hence negative changes may happen very quickly (e.g. because of front-page news about observed attacks). In the 5G context, users may already have some perception of provided security level based on experience with earlier generations. To provide continuity of perceived security, it is important that security and privacy features that exist in earlier generations are also present in 5G, although the actual technical security mechanisms may be different.

5G

Security

T

he explosive growth in mobile data traffic, combined with the proliferation of “smart” devices, is forcing communications systems providers to transform their networks. Although much of this transformation to date has been tactical in its approach, future demands in the network will require new network architectures that support an increasingly diverse set of services, user applications and resource requirements. As vertical industries are thriving —Vehicle Network, Internet of Things (IoT), AR/VR, and high speed railways, just to name a few — they all demand fast yet ubiquitous network access to gain a new momentum. The rise of new business, new architecture, and new technologies in 5G will present new challenges to security and privacy protection. In 5G business environment, security is a necessary

Scigazette | 14 | February, 2017

The way Ahead and Challenges


On the other hand, it is clear that it is not sufficient just to provide the same security features as in the legacy systems because there may be new security requirements and challenges. 5G systems are going to be service-oriented. This implies there will be a special emphasis on security and privacy requirements that stem from the angle of services. Traditional Security Practice Mobile communications systems have evolved through wireless technology innovation into 2G, 3G, and then 4G to keep pace with ever increasing voice and data traffic. Tougher security mechanisms are in place to safeguard today’s mobile communication systems. For instance, oneway authentication in 2G has been elevated to mutual authentication in 3G & 4G; key length and algorithms are becoming more robust; as mobility management is improving, a forward key separation in handovers has been added in 4G; also more effective privacy protection is considered. Traditional security architectures focus on protection of voice and data, and they all have the following security features in common: Ÿ User identity management based on (U)SIM Ÿ Mutual authentication between networks and users Ÿ Securing the path between communicating parties hopby-hop Security Challenges Ahead of 5G New Business Models In traditional mobile communications networks, the primary goal is to enrich people's life through communication. Users may communicate by text messages, voice calls, and video calls, or surf Internet or access app services using smart phones. However, 5G is no longer confined to individual customers. It's not simply about having a faster mobile network or richer functions in smart phones. 5G will also serve vertical industries, from which a diversity of new services are going to stem. In the context of vertical industry, security demands could vary significantly among services. For instance, mobile Internet of Things (IoT) devices require lightweight security while high-speed mobile services demand high efficient mobile security. The network based hop-by-hop security approach may not be efficient enough to build differentiated end-to-end (E2E) security for different services. As IoT is gaining momentum, more people will be able to remotely operate or "talk" to networked devices, for instance, instructing facilities at a smart home to get up. Therefore, there is a need of a more stringent authentication method to prevent unauthorized access to IoT devices. For example, biometric identification could be part of the authentication in smart homes. IT-Driven Network Architecture

New IT technologies, like virtualization and Software Defined Network (SDN)/Network Functions Virtualization (NFV), are seen as a way to make 5G networks more nimble and efficient, yet less costly. While CT are happy to see IT injecting new vigor into their networks, new security concerns are emerging. Security cannot be built for 5G services unless the network infrastructure is robust. In legacy networks, security of function network elements (NEs) relies largely on how well their physical entities could be isolated from each other. However, in 5G, the isolation will work differently as virtual NEs on cloud-based infrastructure. It’s likely that time is right to take 5G infrastructure security into consideration. SDN is proved to be of help in improving transmission efficiency and resource configuration. On the other hand, it is important to consider in the 5G security design that it could be managed in terms of the isolation for network nodes such as control nodes and forwarding nodes, and the secure and correct enforcement of the SDN flow table. Based on network virtualization technology, a network could build different virtual network slices. Each virtual network slice could accommodate a particular service requirement and thereby may require differentiated security capabilities. 5G security design may need to consider issues of how to isolate, deploy, and manage virtual network slices securely. Heterogeneous Access Heterogeneous will be one of the network features of next-generation access networks. The heterogeneous nature comes not only from the use of different access technologies (WiFi and LTE), but also from multi-network environment, which might imply that the access network architecture from different networks are different. So a consideration for security designers is building security architecture suitable for different access technologies. IoT devices have many choices in the way they access networks. For instance, they may connect to networks directly, or via a gateway, or in the D2D or Relay fashion. Comparing to mobile handset, security management of IOT device in 5G may be efficient and lightweight in order to establish trust relationships between devices and networks. Privacy Protection With the advances of mobile Internet, more and more vertical industries, including health care, smart home, and smart transport, will resort to 5G networks. As open network platforms, 5G networks raise serious concerns on privacy leakage. In many cases, privacy leakage can cause serious consequences. As primary method for network accessing, mobile networks carries data and signaling that contains many personal privacy information (for instance, identity,

Scigazette | 15 | February, 2017


position, and private content). In order to offer differentiated quality of service, networks may need to sense what type of service a user is using. The service type sensing may involve user privacy. Add all this together, privacy protection in 5G is more challenging. 5G Security Blueprint 5G Security Goals As the 5G era is drawing near, the volume of data traffic and variety of services will increase to unseen-before levels. IoT service is just one of the many. When it comes to 5G, it is not simply about being a medium for communication. It can be seen as a catalyst for minimizing the boundary between the digital world and physical world. 5G security design is an all-encompassing one that provides security protection for the everything-connected world. E2E Security for Vertical Industries Ÿ Differentiated security protection E2E security design caters to different vertical industries. In that case, the design of security protection needs to consider how to fulfils various security requirements. Ÿ Flexibility In order to provide better support and rapid response to the vertical industry requirement, it is nice that E2E security capabilities could be rapidly aligned with business changes. In that case. it would request flexible and high efficient E2E security deployment and adaptation. Ÿ Privacy protection 5G will see APP services thriving vigorously. Along with this thriving, personal privacy data is growing massively also, including device identifiers, user IDs, and user preference. Considering that, privacy protection could be built end to end, leaving no part of the security chain vulnerable to privacy leaks. Ÿ Security as service In face of convergence of IT and CT, telecom industry is seeking to boost their strength and better serve vertical industries. Tele communications systems have done well in protecting user privacy, and users have built relatively good level of trust with security strength of the communication systems. 5G could continue to extend the user trust by opening up security capabilities as a service to individual users and vertical industries. Secure Infrastructure Ÿ Diversified system level protection of IT-aware infrastructure after IT technologies (e.g. NFV and SDN) are put into use, a vast array of system-level protections is in place to defend against distributed denial of service (DDoS) and other active attacks that may increase.

Ÿ Identity management Both software and hardware

infrastructures run in multi-vendor environment. In order to mitigate unauthorized access to network resources, stringent identity management is a possible need. Ÿ Data protection Integrity and confidentiality protection are provided throughout data transmission to prevent data from being intercepted or re-routed to unauthorized destinations. 5G Security Perspectives New Trust Model and Identity Management In legacy mobile communications networks, Telecom networks are responsible for authenticating user for network access only. A trust model with two elements, between users and networks, is formed. The authentication between user and services are not covered by the networks. However, in 5G networks, a trust model with an additional element, the vertical service provider, is favored possible design. Networks may cooperate with service providers to carry out an even secure and more efficient identity management. Hybrid Authentication Management 5G networks are open platforms with a plethora of services. Smart transport, smart grid, industrial IoT are

some of them. Both networks and service providers face challenges in making access & service authentication simpler and less costly. Three authentication models would possibly co-exist in 5G to address needs of different businesses. Ÿ Authentication by networks only Service authentication incurs significant amount of costs to service providers. Service providers can pay networks for service authentication so users will be able to access multiple services once they complete a single authentication. This frees users from the cumbersome task of getting service grant repeatedly when accessing different services. Ÿ Authentication by service providers only On the other hand, networks may rely on the proven authentication capabilities from vertical industries and exempt devices from radio network access authentication, which can help the networks lower down operating cost. Ÿ Authentication by both networks and service providers For some of the services, a legacy model might be

Scigazette | 16 | February, 2017


adopted. Networks take care of network access, and service providers deal with service access. Diversified Identity Management Ÿ Legacy cellular networks rely on (U)SIM cards to manage user identities and keys. In 5G, equipments such as sensors, wearable devices, and smart home devices are possibly either too small or too cheap to accommodate (U)SIM. Now the time has come to find a new way of managing device identities, for instance, produce, assign, and apply lifecycle management on device identities. Ÿ Combination of device identity and service identity In the new identity management framework, an identity consists of a device identity and a service identity. Each device identity (also called physical identity) is globally unique and may be assigned to a device at the manufacturing phase. Service identities are assigned by service providers or networks. A physical identity may correspond to one or more service identities. Ÿ From device-based management to user-based management It leaves to users to decide which of their devices is allowed to access the network and which service is allowed to use. As an example, devices of a same user may share bandwidth quotas with each other in either online or offline manner. Service-oriented Security Ÿ Build E2E Security Differentiated security for different services 5G systems are going to be service-oriented. This implies that there will be a special emphasis on security requirements that stem from the angle of services. For instance, remote health care requires resilient security while IoT requires lightweight security. It is quite reasonable to offer differentiated security to different services. Flexible security architecture to support security attributes for different network slices If differentiated security is offered, then flexible security architecture is needed to support E2E protection for different service, based on network slicing architecture. Network manages different E2E security capabilities, including strength of security algorithms, ways to derive and negotiate secret keys, and mechanisms for protecting confidentiality and integrity. Within a virtual network slice, security capabilities could further be distributed. A Uniformed security management framework for multivendor environment In cloud environment, software and equipments of network infrastructure come from more than one equipment vendors, which relatively complicate the

security issues. For the services and users, building an E2E data security chain could be a way to reduce the reliance on individual link security and simplifies security management. Open Up Security Capabilities, and provide security as a Service Security management, for instance, managing identities, performing authentication, defending against denial of service (DoS) attacks, and protecting confidentiality and

integrity of service traffic, is a general request to vertical industries. However, perhaps not all industry players have the capabilities to build security management on their own, either due to economic burdens or technical challenges, etc. Utilizing security service could be a good choice to these players. On the other hand, Telecom networks have relatively nice work in the security capabilities (i.e. authentication, identity & key management) and are trusted by users after years of commitment in services. It is a good opportunity for networks to provide their security capabilities as a service to vertical industries. For instance, networks could authenticate service access and return the authentication result to vertical industries. It is the network's choice either to deploy the security service on a cloud platform or simply built it into a virtual network slice of the vertical industry who has bought the security service from networks. Security capabilities can be seamlessly built into business flows of vertical industries. • Isolate Virtual Network Slices For virtual network slices, each of which handles a different type of application service to facilitate flexible resource orchestration and scheduling, there is a need to isolate slices from each other to prevent their resources from being accessed by network nodes in other slices. For instance, patients in a health care slice desire to allow only doctors access their health data, and they are reluctant to see their data accessed by someone in other slices. The isolation statement is also applicable to virtual network slices with the same type of application service. For instance, enterprise A may hope to block other enterprises from using its resources, although these enterprises are served by a same type of virtual network slices. The isolation effect for service and data in the virtual network slices could approach to the user experience in

Scigazette | 17 | February, 2017


traditional private network, only in this way the users are willing to store the private data on cloud, and then they could freely access their private data without concern about the security risk on the data. Security Assessment 5G needs an open platform to support a vast array of services from vertical industries, for instance, remote health care, Internet of Vehicle (IoV), and IoT. The platform can be further divided into units based on the functions. Different software or hardware vendors can contribute their own strength in the development of the units. In this way, the service deployment can be more rapid and the operating cost can be reduced. To build an open software & hardware ecosystem, it is essential that network function units from different vendors are interoperable via standard interfaces. All network function units may need to attest to each other that they are secure, so that when they are integrated into a platform, a high level of platform security could be achieved. A traditional way to assess their security strength is that vendors sign a trust agreement and then test security performance of each other. However, the testing model is expensive and impedes the growth of the open software & hardware ecosystem. Therefore, a well-received assessment procedure and tools are seemed to be possible approaching, by which all vendors could follow a standard procedure to test their network function units. Security assessment is feasible only if specific and measurable security metrics are figured out for each network function unit. For instance, the metrics could be the password length and its complexity. An important point to note is that the way for defining and 5 G 5G Security: Forward Thinking measuring these security metrics. Security metrics that are standardized and well received could help in the case that even third-party test bodies can effectively assess network function units. To support dynamic service deployment as well as automatic service rollout, deployment, and management, network units that pass the security assessment can be granted a certificate and an electric signature for automatic verification upon integration. To keep track of security risks, it is nice that security management maintenance be performed on a regular basis during business operations that security measures can be taken on a timely manner in the event of an incident. Low-Delay Mobility Security Emerging of delay-sensitive applications such as vehicles network and remote surgery have communication scenarios characterized by low-delay and high-security. In these scenarios, the 5G network may need to support high reliability while providing QoS guarantee with a delay not more than 1 millisecond, so as to prevent accidents such as

vehicle collision and surgical operation errors. Further, with the deployment of ultra-dense deployment technologies in the 5G network, when a vehicle is on the move, mobility management procedure can occur frequently. Considering the delay requirement, the mobility management-specific functional entities and processes need to be optimized. To address these new challenges, mobility security may be redesigned and optimized for the 5G network to build an efficient, lightweight, and compatible mobility management mechanism to meet the more stringent delay requirements. User Privacy Protection As 5G networks will serve a large number of vertical industries. This indicates that a great amount of user privacy information will be carried over the 5G network also. Any information leak may lead to severe consequences. With advancements in data mining technologies, retrieval of user privacy information has been made easier. Therefore, user privacy information must be securely protected in the 5G network so that users and vertical industries can use the network without worrying about information leakage. Ÿ Usage management of privacy information in 5G network The 5G network provides customized network services (including slice customization or selection) for users by sensing their service features. However, privacy information, such as user health information and location, may be utilized in the service type sensing process. To protect user privacy, a service sensing rule must be clearly defined for the 5G network to address users' concerns about privacy. The method must stipulate how the privacy information is used and how it is handled after being used. Ÿ More rigorous privacy protection scheme in 5G network In a heterogeneous network where multiple access technologies are used, the protection for user privacy information varies depending on the access technology. In addition, the 5G network is one that runs over multiple types of network. User data may traverse various access networks and network functional entities supplied by different vendors. As a result, it’s possible that user privacy information could exist in any corner of the networks. With data mining technologies, a 3rdparty may be able to derive detailed user privacy information through analysis on the disperse user privacy data. Therefore, it’s time to have privacy information exposure risks thoroughly considered in the 5G network.

Scigazette | 18 | February, 2017


How sensor technology will shape the

cars of the future Sensors are now a vital part of any modern automobile design, serving many different purposes. They are instrumental in helping car manufacturers to bring models to market that are safer, more fuel efficient and more comfortable to drive. Over time, sensors will also enable greater degrees of vehicle automation, which the industry will benefit from. Vincent Hiligsmann VP corporate strategy core markets Melexis

Scigazette | 19 | February, 2017


Intelligent observation Besides full controllability and data processing, intelligent observability is one of the prerequisites to enable a car to take action on its own. To attain the objective of full observability cars will need to process a wide variety of parametric data - including speed, current, pressure, temperature, positioning, proximity detection, gesture recognition, etc. In terms of proximity detection and gesture recognition, great strides have been made over recent years, with ultrasonic sensors and time-of-flight (ToF) cameras now starting to be implemented into vehicles.

Ultrasonic sensors As automation in vehicles progresses, we are not only seeing new technologies being applied to the automotive sector for the first time, but we are also witnessing the adaptation of mature automotive technologies to the special requirements that autonomous driving will mandate. At the moment, ultrasonic sensors are typically mounted into vehicle bumpers for assisted parking systems. So far, such sensors are only expected to function at a driving speed of less than 10 km/hour and they are not able to measure small distances with 100% accuracy. In an autonomous car, however, such sensors could potentially be used in combination with radar, cameras and other sensing technologies to provide distance measuring functionality.

Gesture recognition While ultrasonic sensor technology is used to observe the outside world, ToF cameras are focused on the car interior. As the transition to autonomous driving will be a gradual one, it is important that drivers can switch from autonomous mode back to manual mode in specific scenarios. Currently cars are only partially autonomous, through use of their ADAS mechanisms, but human involvement can potentially be required at any moment. We expect the industry to advance towards greater levels of automation in the coming years, but even then the driver will still need to be able to take control in certain circumstances (e.g. when the car is in city centres). It will be a considerable length of time before this changes. Until that point a vehicle will need to be able to alert its driver. Therefore, real-time monitoring of the driver’s position and movements is crucial. Although still in its initial phases, ToF technology is already being employed today, such as to make drivers aware when they suffer a lapse in concentration and cause the vehicle to drift towards the edge of the road. It also enables different functions to be carried out based on gesture recognition - for example, via hand swipes to increase the radio volume or to answer an incoming phone call. The

potential scope of ToF goes way beyond these sort of tasks, however, and it will be pivotal in more sophisticated driver automation as this is developed. ToF cameras will be able to map a driver’s entire upper body in 3D, so that it can be ascertained whether the driver’s head position is facing the road ahead and whether their hands are placed on the wheel.

3D mapping of the traffic situation Today’s adaptive cruise control systems utilise radar to measure the distance to the vehicle in front. This technology performs well enough on motorways, but in an urban environment - where distances are shorter and pedestrians/vehicles can also approach from other directions - more precise position measurement is needed. One solution is to add a camera for better determination of perspective. However, current image processing hardware is nowhere near good enough to detect all the important features with the necessary speed and reliability to ensure safe driving. This is where lidar seems destined to prove advantageous. Lidar works according to the same principle as radar and is based on measurement of the reflection of a transmitted signal. While radar relies on radio waves, lidar makes uses of light beams (e.g. laser). The distance to the object or surface is calculated by measuring the time that elapses between the transmission of a pulse and when a reflection of that pulse is received. The big advantage of lidar is that the technology enables much smaller objects to be detected than is possible with radar. In contrast to a camera, which views its environment in focal planes, lidar delivers an accurate, relatively detailed 3D rendering. Through this it is easy to isolate objects from what is in front of them or behind them, regardless of the lighting conditions (day or night). As the price points associated with lidar technology gradually lower, and further technological progression is made, the impetus for following this approach will increase. The next generation sensors that are now being developed will ultimately define the autonomous driving experience that is being envisaged. Through innovation in the areas outlined in this article, the cars of tomorrow will be providing a clear, constantly updated picture of what is happening, both in relation to the external environment and in terms of what their occupants are doing too. Sensing technologies therefore hold the key to the future of the automotive industry.

Scigazette | 20 | February, 2017


Artificially introduced atomic-level sensors enable measurements of the electric field within a working semiconductor device Semiconductors lie at the heart of many of the electronic devices that govern our daily lives. The proper functioning of semiconductor devices relies on their internally generated electric fields. Being able to measure these fields on the nanoscale is crucial for the development of next-generation electronics, but present techniques have been restricted to measurements of the electric field at a semiconductor's surface.

A group of Takayuki Iwasaki, Mutsuko Hatano and colleagues at the Tokyo Institute of Technology, the Japan Science and Technology Agency (JST) and Toshiharu Makino at the National Institute of Advanced Industrial Science and Technology (AIST) has reported a new method for sensing internal electric fields at the interior of operating semiconductor devices. The technique exploits the response of an artificially introduced single electron spin to variations in its surrounding electric field, and enabled the researchers to study a semiconductor diode subject to bias voltages of up to 150 V. Iwasaki and co-workers applied their method to diamond, a so-called wide-band-gap semiconductor in which the electric fields can become very strong -- a property important for low-loss electronic applications. Diamond has the advantage that it easily accommodates nitrogen-

vacancy (NV) centers, a type of point defect that arises when two neighboring carbon atoms are removed from the diamond lattice and one of them is replaced by a nitrogen atom. NV centers can be routinely created in diamond by means of ion implantation. A nearby electric field affects an NV center's energy state, which in turn can be probed by a method called optically detected magnetic resonance (ODMR). The researchers first fabricated a diamond p-i-n diode (an intrinsic diamond layer sandwiched between an electronand a hole-doped layer) embedded with NV centers. They then localized an NV center in the bulk of the i-layer, several hundreds of nanometers away from the interface, and recorded its ODMR spectrum for increasing bias voltages. From these spectra, values for the electric field could be obtained using theoretical formulas. The

Scigazette | 21 | February, 2017


experimental values were then compared with numerical results obtained with a device simulator and found to be in good agreement -- confirming the potential of NV centers as local electric-field sensors. Iwasaki and colleagues explain that the experimentally determined value for the electric field around a given NV center is essentially the field's component perpendicular to the direction of the NV center -- aligned along one of four possible directions in the diamond lattice. They reason that a regular matrix of implanted NV centers should enable reconstructing the electric field with a spatial resolution of about 10 nm by combining with super-resolution techniques, which is promising for studying more complex devices in further studies. The researchers also point out that electric-field sensing is not only relevant for electronic devices, but also for electrochemical applications: the efficiency of electrochemical reactions taking place between a semiconductor and a solution depends on the former's internal electric field. In addition, Iwasaki and co-workers note that their approach need not be restricted to NV centers in diamond: similar single-electron-spin structures exist in other semiconductors like e.g. silicon carbide.

Background Wide-band-gap semiconductors Semiconducting materials feature a so-called band gap: an energy range wherein no accessible energy levels exist. In order for a semiconductor to conduct, electrons must acquire sufficient energy to overcome the band gap; controlling electronic transitions across the band gap forms the basis of semiconducting device action. Typical semiconductors like silicon or gallium arsenide have a band gap of the order of 1 electron volt (eV). Wide-band-gap semiconductors, like diamond or silicon carbide, have a larger band gap -- values as high as 3-5 eV are not uncommon. Due to their large band gap, wide-band-gap semiconductors can operate at temperatures over 300 °C. In addition, they can sustain high voltages and currents. Because of these properties, wide-band-gap

semiconductors have many applications, including lightemitting diodes, transducers, alternative-energy devices and high-power components. For further development of these and other future applications, it is essential to be able to characterize wide-band-gap devices in operation. The technique proposed by Iwasaki and colleagues for measuring the electric field generated in a wide-band-gap semiconductor subject to large bias voltages is therefore a crucial step forward. Nitrogen-vacancy centers Diamond consists of carbon atoms arranged on a lattice where each atom has four neighbors forming a tetrahedron. The diamond lattice is prone to defects; one such defect is the nitrogen-vacancy (NV) center, which can be thought of as resulting from replacing a carbon atom with a nitrogen atom and removing one neighboring carbon atom. The energy level of an NV center lies in the band gap of diamond but is sensitive to its local environment. In particular, the so-called nuclear hyperfine structure of an NV center depends on its surrounding electric field. This dependence is well understood theoretically, and was exploited by Iwasaki and co-workers: detecting changes in an NV center's hyperfine structure enabled them to obtain values for the local electric field. A major advantage of this approach is that it allows monitoring the field within the material -- not just at the surface, for which methods had already been developed.

Optically-detected magnetic resonance For probing the nuclear hyperfine structure of an NV center in the bulk of the diamond-based device, Iwasaki and colleagues employed optically detected magnetic resonance (ODMR): by irradiating the sample with laser light, the NV center was optically excited, after which the magnetic resonance spectrum could be recorded. An electric field makes the ODMR resonance split; the experimentally detected split width provides a measure for the electric field.

Scigazette | 22 | February, 2017


T&M

Time to Say Yes to Hyper Convergence Anoop Pai Dhungat Chairman & Managing Director Galaxy Office Automation Pvt. Ltd.

HCI combines the advantages of converged infrastructure, virtualization and software-defined storage technologies

Every year, the industry looks forward to embracing disruptive technologies that change the traditional approach to IT and equip businesses to deal with new challenges. Hyper-convergence is probably one of the most-talked about topic for analysts and IT leaders this year. Hyper-convergence infrastructure is a softwarecentric architecture which is rapidly gaining interest and adoption worldwide. Major tech vendors and solution providers have already upped their ante to reap the best of this emerging technology. Hyper-convergence has been touted as the panacea for the increasing challenges on the IT teams to remain costeffective, while providing better performance, protection, and resiliency to the business and end users. The immediate benefits of hyper-convergence infrastructure that also include improved stability, faster time to value and reduction in physical footprint, as well as the long-term advantages like the reduction in the amount of serverrelated incidents and a single point of contact for any issues that pops up post sales whether it is related to the compute, storage or virtualization which adds to the customer satisfaction. According to a recent survey by Gartner, the market for Hyper-Converged Integrated Systems (HCIS) grew 79

percent to reach almost $2 billion in 2016, propelling it toward mainstream use in the next five years. HCIS will be the fastest-growing segment of the overall market for integrated systems, reaching almost $5 billion, which is 24 percent of the market, by 2019. Here are the reasons organizations across the world are adopting hyper-convergence.

Improved Efficiency HCI includes the latest flash technology and powerefficient processors which make it more efficient than the traditional data centers. This will help in simplifying your processes and eliminate complexity. With the exponential growth in data today, you can easily phase out the time spent in data centers to manage the storage and reduce it considerably. Less number of IT staff will reduce your financial burden also.

Reduced Cost of Operating HCI consumes less floor space and hence will result in lower rental costs for data centers. With the less power consumption and heat production, it can help in significantly reducing operational costs. It is highly flexible and you can quickly convert your needs to functionality without going through the procurement process, if there is

Scigazette | 23 | February, 2017


a need for more capacity. Usually, companies spent more in maintaining and operating the old equipment for years and this cost them more than purchasing and adopting a new technology. With HCIS you can easily lower your opex expenditure and can efficiently cut down on maintenance fees i.e., it leverages pay as you grow model

Achieve Agility, Scalability, Resiliency and Simplicity One of the best advantages of HCI is that it lets you scale up and scale out easily, without disruption. The fast and easy software updates make it more responsive compared with the traditional infrastructures. You can easily customize your policies for each application and accelerate its deployment with agile infrastructure. HCI enables IT to achieve positive outcomes much faster. HCI offers the utmost availability of data with high fault tolerance, which ensures the safety for your data even in the case of a drive, nodes or network failure. With the selfoptimizing, self-monitoring, and self-healing features, it removes all the complexity which we face in traditional architectures and hence ensures simplicity with performance.

Focus on Innovation With HCI, it’s easy to devote more resources to innovation, because they aren’t tied up in maintaining and managing old infrastructure. As HCI automates manual tasks and provides intelligence that allocates resources as needed, it saves time and efforts to focus on more important things. Given that compute, network and storage elements are all integrated into one, this avoids having a separate staff to manage each component separately. More and more can be done with less time, cost and workforce.

platform, whether it’s the enterprise database, messaging, or the application servers. It provides the user an easier and smarter way to access the virtual capabilities from any location as long as it is connected to the network in a secure and protected environment. HCI is capable of managing the resources spread across multiple physical data centers from a single, centralized interface and thus can reduce the variety of hardware and software that needs to be managed and maintained separately within the IT infrastructure

The Bottom Line Hyper-convergence can be considered as a relatively young technology, but it comes with many advantages that can add eminent value to a company’s IT infrastructure. It will allow companies to reduce their reliance on different computing and storage platforms. HCI combines the advantages of converged infrastructure, virtualization and software-defined storage technologies. HCI will be the hottest technology in 2017 and with the competitive advantages it offer, businesses are surely going to benefit from its early adoption.

About Galaxy Office Automation. Galaxy is a leading provider of best of breed solutions for Infrastructure, Networking, Security, Application Delivery, Automation, Mobility and Business Intelligence. Incorporated in 1987, Galaxy is a trusted IT solutions provider for more than 1000 companies across India. Galaxy is an ISO 9001:2008 organization, backed by over 250 skilled professionals with PAN India presence. With the best-in-class technologies, Galaxy help protects, optimize and safeguard companies’ IT infrastructure, and turns it into a competitive edge with business-driven IT solutions for complex enterprise environments. To learn more, visit www.goapl.com

Uncompromised Performance HCI has the ability to run business-critical systems on one

Scigazette | 24 | February, 2017


10

Ways to Stay Safe Against Ransomware and Other Advanced Threats

Mr. Hatem Naguib Senior Vice President and GM Barracuda Networks

The connection between IT security and data protection has never been as tight as it should be inside most organizations. In a perfect scenario, the identification of a probable security threat would initiate a series of backups to ensure there is no data loss or breach in data security in. This however While that theory has been around for decades, the rise of “ransomware” is now turning that best practice into an absolute necessity. The growth in ransomware attacks is expected to continue throughout the year, and expand to other platforms such as Macs, smartphones, and IoT endpoints. Even the most successful iterations of ransomware will evolve to stay ahead of defenses. grown as a method of attacking

businesses and other large organisations. It is nothing but a number of versions of malicious software which takes control of a target computer and then encodes all the data on it, rendering it inaccessible. Be it an individual or an SME or a global corporation—nobody is now safe from ransomware, phishing, and advanced persistent threats. A successful attack, apart from being terribly costly can cause huge damage to your Brand reputation. But there is a lot you can do to reduce the risk. Here are our top 10 tips for preventing ransomware, phishing, and APT attacks:

Scigazette | 25 | February, 2017


1. Understand the targets There is a common misconception that only large scale companies are its prey and SMEs are safe. However, results show a complete different picture. SMEs are infact more vulnerable. No company or bank account is safe.

2. Secure all internet threat vectors Multiple attack vectors including user behavior, applications, and systems are exploited by the modern attacks and having a mere firewall is not enough. Email, web applications, remote users, on-site users, the network perimeter, and remote access are some of the attack vendors.

3. Secure all attack surfaces With more and more businesses migrating to virtual and cloud environments, hybrid networks are increasingly becoming the norm. Effectively securing cloud or SaaSbased applications like Office 365 requires a comprehensive solution designed to centrally manage hybrid networks.

4. Educate your users User behavior can be your single greatest vulnerability. Good security is a combination of enforcement, monitoring, and user education—especially against threats like phishing, spear phishing, typo-squatting and social engineering.

5. Don’t forget your remote workforce The mobile revolution drives productivity but it also means much of your workforce is connected via personal devices which creates a huge potential gap in your security if not properly protected.

patches to eliminate them. You must make sure that you’ve installed the latest, on all potential attack surfaces.

7. Detect latent threats There is a huge possibility that your system contains a number of latent threats. It might be a hostile link or attachment waiting to be opened. As such, all applications—whether locally hosted or cloudbased—must be regularly scanned and patched for vulnerabilities.

8. Prevent new attacks Attacks are evolving and coming your way every day. To stop them, you need advanced, dynamic protection with sandbox analysis and access to up-to-the-minute global threat intelligence.

9. Use a good backup solution A simple and reliable backup system is the need of the hour. When data is corrupted or stolen by malware, simply restore from backup and get started.

10. Keep management simple As networks and threat landscapes are growing more complex, security management can become a major burden on IT staff. And this will only cause security gaps. Minimize both risk and cost with a simple, comprehensive solution that provides “single-pane-of-glass” security administration and visibility across your entire infrastructure. As cybercriminals become more sophisticated in their use of social engineering techniques to indulge more end users into downloading malware, it’s only a matter of time before IT organizations find themselves routinely dealing with these attacks. The real issue at hand is the poor state of data management hygiene that exists inside most IT organizations today.For this reason, it is imperative that organizations revisit their data protection strategies. Some of these tips may be more challenging to implement than others. Safe computing should be practiced —and maintaining that awareness over time—may be the most difficult, but it may also bring the greatest benefits.

6. Keep your systems updated When vulnerabilities in platforms, operating systems, and applications are discovered, vendors issue updates and Scigazette | 26 | February, 2017


T&M

New 32 Gbaud PAM4 High Amplitude Output and CTLE/PAM4 Decoder BER Test Functions for MP1800A Series

A

nritsu Corporation is releasing two upgrades on January 31, 2017 to strengthen the company’s 32 GBaud PAM4 BER test solutions for its Signal Quality Analyzer MP1800A series. The newly developed G0375A 32 Gbaud Power PAM4 Converter and G0376A 32 Gbaud PAM4 Decoder with CTLE support the PAM4*1 input tests and BER*2 measurements defined in the next-generation 200GbE/400GbE*3 and CEI56G*4 standards. Development Background Faster communications speeds between servers and network devices are being investigated to help cope with the recent explosive increase in data traffic. The 200GbE/400GbE next-generation Ethernet standard not only uses faster symbol rates and multiple lanes to increase transmission capacity per unit time but also used PAM (pulse amplitude modulation). Like the NRZ*5 method, evaluation of PAM4 optical communications modules requires a high-amplitude test signal for direct-driving the optical modulator performing the electro-optical conversion. Additionally, evaluation of EA Modulators*6 must take non-linearity of the optical output level into consideration and requires a signal source supporting independent adjustment of the PAM4 signal 3Eye amplitude.

On the other hand, the BER of the 4-level PAM4 signal is measured like the NRZ method by splitting into two binary signals at the PAM4 decoder. Furthermore, confirming the correlation with simulation results requires use of an equalizer circuit such as a Continuous Time Linear Equalizer (CTLE) and BER measurement of a signal corrected for transmission path loss. Anritsu expects that its signal source for implementing 32 Gbaud*7 PAM4 BER measurements and BER measurement solutions will play a major role in development of nextgeneration PAM4 communication standards. Outline of PAM4 Signal Evaluation using G0375A/G0376A and MP1800A Series The Signal Quality Analyzer MP1800A is a plug-in module type Bit Error Rate Tester; the built-in 32G multichannel PPG and ED modules assure multichannel, high-quality signal generation and high-input-sensitivity measurement. The newly developed G0375A and G0376A are remote heads for addition to the MP1800A series 32G PPG/ED to extend measurement support for both NRZ and PAM4 measurements using NRZ measuring instruments. Combining the G0375A with the 28G/32Gbit/s PPG MU183020A converts 32 Gbit/s NRZ signals to PAM4 signals to output a high-amplitude signal of 4.4 Vp-p (differential, max.). Additionally, the 3ch PPG synchronization function for independent control of the PAM4 signal 3Eye amplitudes enables high-reproducibility

Scigazette | 27 | February, 2017


T&M

evaluation of optical modulators without using an external driver amplifier.

Ÿ High-quality, low-jitter output waveform

With built-in PAM4 decode and CTLE functions, the G0376A supports measurement of PAM4 decoded binary signals using the 28G/32Gbit/s High Sensitivity ED MU183040B. In addition, combination with the CTLE function supports high-efficiency, input-sensitivity performance tests.

Ÿ 10 to 32.1 Gbaud rate

G0375A Features

Ÿ Gain of –12 to 0 dB

Ÿ 10 to 32.1 Gbaud rate

Ÿ Real-time PAM4 BER Measurement using PAM4

Ÿ High input sensitivity of 40 mV typical (per eye, single-

end, Eye Height) Ÿ BER measurement after PAM4 Eye opening adjustment

using continuously variable CTLE

Decoder and 2ch Error Detector

Ÿ Optical modulator direct driving Ÿ High output amplitude of 4.4 Vp-p max. (differential) Ÿ 3Eye independent level control

Ÿ G0376A Features

Ÿ Details of MP1800A https://www.anritsu.com/en-IN/test-measurement/products/mp1800a

Visit scigazette.com Active Pages & stay abreast with the Technology

Science Gazette &Technol gy Scigazette | 28 | February, 2017


New Products

Sanyo Denki Rugged AC and DC Fans and Blowers Available Globally through Digi-Key Sanyo Denki’s ultra-long life, high reliability rugged AC and DC fans and blowers are currently available for immediate shipment globally from Digi-Key Electronics, a global electronic components distributor. Sanyo Denki produces fans with a high temperature range, long life, and environmental protection options, which dramatically increase the overall application life of many products and designs. “We are very excited to partner globally with Digi-Key,” said Stan Kato, President of Sanyo Denki America. “This will significantly expand our market reach for our high-quality fans and blowers. Digi-Key’s global presence will provide Sanyo Denki and our customers with instant access to inventory for our products, with service that is highly

lauded throughout the electronics industry.” The fans and blowers are ideal for many applications including automation, server cabinets, telecom, medical, the food industry, and anywhere air needs to be moved. Visit http://www.digikey.com/ for more info.

Hirose's new I/O connector 60V I²C Battery Monitor offers significant space savings Measures State of Charge Hirose has Parameters with 1% Accuracy

developed a rugged I/O connector with an innovative space-saving design that enables a size reduction of industrial modules. The IX Series connector provides a space savings of up to 65% compared to RJ45 solutions, and up to 28% compared to competing snap-in I/O connector offerings. The IX Series I/O connector combines high reliability and enhanced EMI/ESD shielding with high-speed transmission capability of 3Gbps -- all in a compact package. Supporting CAT5 cabling, the IX Series I/O connector offers significant space-savings potential in equipment such as factory automation controllers, programmable logic controllers, servo amps, servers, robotics and more. Available in a right angle or straight version, the IX Series I/O has maximum dimensions of 22.9mm x 8.4mm x 14.3mm. The connector receptacles can be mounted in parallel with a pitch distance of only 10mm. The narrow width of the receptacle is particularly beneficial when multiple connectors are positioned on a single PCB side-byside.

Linear Technology Corporation introduces the LTC2944 multicell battery monitor, which makes direct measurements of 3.6V to 60V battery stacks. Absolutely no level shifting circuitry on the supply and measurement pins is required to interface with multicell voltages, so total current consumption is minimized and measurement accuracy is preserved. The LTC2944 is a true high voltage battery monitor that measures charge, voltage, current and temperature to 1% accuracy, the essential parameters required to accurately assess battery state of charge (SoC). The LTC2944 is ideal for multicell applications, including electric vehicles, ebikes/motorcycles/scooters, wheelchairs, golf carts and battery backup systems. Battery current is measured by monitoring the voltage across an external, high side sense resistor and integrating this information to infer charge. A bidirectional analog integrator accommodates either current polarity (battery charge or discharge), and a programmable prescaler supports a wide range of battery capacities.

For additional information about the IX Series connectors, please visit: https://www.hirose.com/product/en/products/IX/

Please visit www.linear.com/product/LTC2944 for more product selection and information.

Scigazette | 30 | February, 2017


New Products

Mouser stocks CTH Series capacitive touch sensor displays from VCC Combining an integrated touch sensor IC with a high optical LED display, the CTH Series of capacitive touch devices provide a fast and intuitive display interface that offers an attractive cost savings by eliminating the need for a traditional switch. The robust design combines graphic interactive control with color identification for use in a wide range of applications. The VCC CTH Series capacitive touch sensor displays, available from Mouser Electronics, offer translucent icons illuminated with different

colored LEDs, and provide superior device interaction by communicating a singular action to users such as on/off, alarm status. The LED displays produces uniform illumination and high optical clarity and are available with or without a wide variety of standard graphic overlays and colors. Unlike mechanical membrane switches or mechanical push buttons, VCC’s CTH Series capacitive touch sensor displays have no moving parts, which improve reliability and increases operational life of the product. These compact displays also

eliminate the need for designing-in a traditional switch, which saves on cost and simplifies the design process. To learn more, visit http://www.mouser.com/new/vcc/vcc-cthdisplays/.

Orolia Fortifies Resilient Positioning, Navigation and Timing Solutions Orolia, the worldwide leader in Resilient Positioning, Navigation and Timing (PNT) solutions, announced that it has formed a strategic alliance, including an equity investment, with Satelles Inc. to develop market and sell PNT solutions based on Satelles’ Satellite Time and Location (STL) signal technology. STL is a unique space-based PNT technology that provides location and timing data independent from traditional GPS and other GNSS satellite signals. By using STL, Orolia’s proven Spectracom and McMurdo branded solutions will be

less susceptible to vulnerabilities – spoofing, interference and jamming – associated with GPS/GNSS. Many highly sensitive military, defense, government and commercial applications and operations including maritime/aviation, fleet/asset tracking management, search and rescue and data center management require accurate and reliable PNT data. oday, these applications rely on signals from GPS/GNSS satellites SBAS GAGAN or Regional Satellite Navigation Systems such as the Indian Regional Navigation Satellite system

(IRNSS). There are instances, however where GPS/GNSS/IRNSS signal strength and security are not sufficient and prone to signal disruption. For these cases, STL can be used as a secure signal of opportunity to complement GPS/GNSS making the application more accurate and secure and less prone to interference attack. For information on Orolia, please visit www.orolia.com

u-blox IoT gateway module enables Industrial IoT u-blox a global leader in wireless and positioning modules and chips, announced its technology is powering a new smart factory solution from Industrial IoT leader HMS Industrial Networks. The Anybus Wireless Bolt uses the u-blox ODIN-W2 Bluetooth+Wi-Fi IoT gateway module to provide easy-to-use and robust wireless connectivity for industrial environments. The Anybus Wireless Bolt is a simple to install, rugged IP67 wireless

module which connects industrial equipment to the cloud. It mounts onto existing industrial equipment, similar to a mechanical bolt and features an 18-pin internal connector compatible with industry standard protocols operating over serial, CAN, or Ethernet interfaces. Via its wireless Scigazette | 31 | February, 2017

connectivity (Bluetooth and Wi-Fi), it offers the possibility to manage machine configuration via a standard tablet or smartphone as well as to connect to a cloud service realizing Industrial IoT. The u-blox stand-alone IoT gateway module ODIN-W2 turned out to be the ideal fit for the Anybus Wireless Bolt. It offers cost-efficient and compact multiradio gateway functionality supporting both Bluetooth and Wi-Fi. For more information visit: (www.u-blox.com)


New Products

R&S introduces probe for power integrity measurements The R&S RT-ZPR20 is a new, extremely low-noise power rail probe with a bandwidth of 2 GHz. Its 1:1 attenuation also ensures very good sensitivity. The large offset range of ± 60 V permits analysis of the smallest disturbance signals during power integrity measurements, even on DC power supplies with a high voltage level. The probe also features an integrated high-precision DC voltmeter. The quality of the power supply is a key factor in the

functionality and performance of sensitive electronic circuits. Disturbance signals on the DC power supply network can lead to EMC problems or impair the functioning of a circuit. This is particularly critical for Internet of Things (IoT) components with fast digital interfaces, as well as for fast memory chips and highly sensitive analog circuits. To assess the quality of the power supply for such components, Rohde & Schwarz is launching the R&S RTZPR20 power rail probe. The R&S RT-

ZPR20 is designed for power integrity measurements in combination with the R&S RTE and R&S RTO2000 oscilloscopes from Rohde & Schwarz. For more information, visit: www.rohdeschwarz.com/ad/press/powerelectronics.

Next-Gen Intelligent Power Modules for Motor Drives from STMicro STMicroelectronics has extended its SLLIMM nano series of Intelligent Power Modules (IPMs) for motor drives with more package options that help minimize overall size and complexity, extra integrated features, and greater efficiency leveraging the latest-generation 500V MOSFETs. With a current rating of 1A or 2A, the new IPMs target applications up to 100 Watts, such as refrigerator compressors, washing-machine or dishwasher motors, draining and recirculation pumps, fans, and other drives running at less than 20kHz in hard-switching circuitries. Operation up to 150°C allows use in harsh environments. The modules integrate a three-phase MOSFET bridge and gate-driver HVICs, with value-added features including an unassigned op-amp and comparator for functions such as

over-current protection and current sensing. Additional built-in safety features include interlocking to prevent shoot-through currents from damaging MOSFETs of the bridge, a fault-status output, shutdown input, and smartshutdown capability. An optional built-in thermistor helps simplify over-temperature protection. For further information please visit www.st.com/ipm

TI technology extends flight time and battery life of quadcopters and industrial drones Texas Instruments today introduced two circuit-based subsystem reference designs that will help manufacturers add flight time and extend battery life to quadcopters and other non-military consumer and industrial drones used to deliver packages, provide surveillance or communicate and assist at long distances. “Flight time continues to be a top design challenge for recreational quadcopters and professional drones, especially those being used by

companies for beyond visual line-ofsight operation. Delivery companies want drones with enhanced battery life, and are testing delivery of parcels with drones to see how far they can go,” said Stelios Kotakis, senior analyst of data transmission & managed services with IHS Markit. According to a recent IHS Markit study*, almost 50 percent of drones in the market have an estimated battery life of less than 30 minutes, 35 percent can fly between 31 and 60 minutes and the remaining 15 percent and less can fly Scigazette | 32 | February, 2017

more than an hour – all under ideal flying conditions without additional payload. For more info visit: www.ti.com


February

January

ISSUE

Editorial Closing Feb 27, 2016 AD Closing Feb 28, 2016

Editorial Closing Jan 27, 2016 AD Closing Jan 28, 2016

Editorial Closing Dec 27, 2016 AD Closing Dec 28, 2016

Deadline

Embedded operating systems

Power Management: DC Power supplles, AC Power Systems

Cover Story

Sensor technologies, electromechanics

Smart Grid technologies, Home Automation

Instrumentation & Test: Test equipment, Securing Big Data, Robotics systems (ATE), Software

Electronics trends 2017: Trends & Visions

IoT & RFID designs

vision, Controllers, Motors, Cameras, Sensors and Software

Programmable devices, FPGAs & PLDs

Display panels, systems, modules, touch screen

Biomedical Instrumentation, Sensor

Sensors, Smart Chips

IoT Connectivity

Industry Trends

MEMS technologies

Organic semiconductors

3D vision and 3D gesture recognition systems

Alternative Energy: Trends and Insights

Trends in electronic Components Distribution

Industrial Automation & Control

Special Focus

Wireless Charging Technology

Prototyping & Development Boards, Biometrics

Machine Learning, Artificial Intelligence

Electronic Warfare

Wearable Electronics

Cloud Computing, Encryption and Data Security

Technology

Editorial Calendar 2017

March Editorial Closing Mar 27, 2016 AD Closing Mar 28, 2016 PC-board, IC, System design software

Processors, Memory, connectivity, sensors, security, power and operating systems

Augmented & virtual Reality

Science Gazette &Technol gy

April Editorial Closing April 27, 2016 AD Closing April 28, 2016 Wireless Network Testing

Semiconductor strategies in vehicles

Tech Focus

May Editorial Closing May 27, 2016 AD Closing May 28, 2016

Implementation of green Technology/Design

5G, LTE/LTE Advanced

June

Storage products & chips

Rechargeable Technologies

LEDs, LED Drivers, Power Supplies, LED Control

T&M: Data acquisition, loggers, counters, transducers

Discrete semiconductors, Power semis

Editorial Closing Jun 27, 2016 AD Closing Jun 28, 2016

Medical Electronics: New Product applications and technological advancements

Connectors

Microcontrollers & Microprocessors

July

LED Based Lighting

Consumer Electronics

Industrial sensors, transducers, connectors, terminal blocks, wire & cable

Wi-Fi & RF Modules

VRLA, SMF & Li-ion Batteries

Electronics Production equipment

Rugged & Embedded computing

Power electronics, drive technology, AC/DC, DC/DC

IIOT and Automation

Wearable Tech & Sensors

Optoelectronics

Editorial Closing July 27, 2016 AD Closing July 28, 2016

Sensors & Machine Vision

Automotive Measurement

Editorial Closing Oct 27, 2016

Editorial Closing Nov 27, 2016

Fieldbuses/networks/wireless, identification systems

August

AGBTs/MOSFETs

Industrial automation software, networking

Editorial Closing Aug 27, 2016 September AD Closing Aug 28, 2016

Interconnect Devices

Drive Technology

Editorial Closing Sept 27, 2016 AD Closing Sept 28, 2016

November AD Closing Oct 28, 2016

Industry 4.0

October

40.00 December AD Closing Nov 28, 2016

Editorial: Sagar Rawat | edit@scigazette.com | 9654259469


New Products

Vishay's New Series of Long Side Termination Thick Film Chip Resistors Vishay Intertechnology has released a new series of sulfur-resistant long side termination thick film chip resistors optimized for automotive and industrial applications. For high sulfur environments, resistors in the AEC-Q200-qualified Vishay Draloric RCA LS e3 series feature a patented construction that provides sulfur withstand ability in accordance with ASTM B809 95, tested at an

advanced level of 90 °C for 1,000 hours. The devices' wide terminals enable high power ratings up to 2.0 W. RCA-LS e3 series resistors are available in five compact case sizes to save space on densely packed PCBs: 0406, 0612, 1020, 1218, and 1225. The devices offer a resistance range from 1 Ω up to 2.2 MΩ with tolerances of ± 1 % and ± 5 %, TCR of

± 100 ppm/K and ± 200 ppm/K, and an operating voltage range from 50 V to 200 V. The resistors are RoHScompliant and halogen-free. For more information visit: http://www.vishay.com/

AVX Releases New Multilayer Organic High Pass Filters for Wireless Applications STMicroelectronics has extended its SLLIMM nano series of Intelligent Power Modules (IPMs) for motor drives with more package options that help minimize overall size and complexity, extra integrated features, and greater efficiency leveraging the latest-generation 500V MOSFETs. With a current rating of 1A or 2A, the new IPMs target applications up to 100 Watts, such as refrigerator compressors, washing-machine or dishwasher motors, draining and recirculation pumps, fans, and other drives running at less than 20kHz in

hard-switching circuitries. Operation up to 150°C allows use in harsh environments. The modules integrate a three-phase MOSFET bridge and gate-driver HVICs, with value-added features including an unassigned op-amp and comparator for functions such as over-current protection and current sensing. Additional built-in safety features include interlocking to prevent shoot-through currents from damaging MOSFETs of the bridge, a fault-status output, shutdown input, and smart-shutdown capability. An

optional built-in thermistor helps simplify over-temperature protection. For further information please visit www.st.com/ipm

NI Upgrades Oscilloscope and Function Generator Performance for VirtualBench NI has unveiled the VB-8054 instrument, a new higher performance model of VirtualBench. VirtualBench plays a key role in reducing the cost and footprint of test and measurement systems by consolidating five of the most commonly used instruments into one device without compromising the performance of each instrument. Combined with a modern software experience and simple programming interface, it creates new efficiencies for engineers interacting with

benchtop test equipment or developing low-cost automated test systems. “Engineering workbenches and test systems are getting more and more crowded every day as technologies converge in the latest smart devices,” said Luke Schreier, director of automated test product marketing at NI. “VirtualBench provides the ideal combination of capability at performance levels that can legitimately replace five or more instruments needed to characterize Scigazette | 34 | February, 2017

new product designs or validate assembled units on a production floor. With 500 MHz of scope bandwidth and a faster generator in the latest model, VirtualBench meets the needs of even more engineers wrestling with how to lower their cost of capital equipment.” To learn more about VirtualBench, visit www.ni.com/virtualbench/what-is/


Time for

HEROES T

he world of industrial production is faced with major upheaval. New problems and risks – but also challenges and great opportunities – must be managed and utilised. In uncertain times, we need orientation points and role models. Sometimes even little heroes. HARTING's Captain ix is a pioneer and a symbolic figure for a new generation of Ethernet interfaces and for a cooperation establishing the new ix Industrial connector as a new global standard. Communication and networks are in flux. The development of I4.0 and IoT is ensuring the continuous spread and connection of ever more components and participants in the industrial environment around Ethernet networks. Ethernet is capturing more and more areas of our lives and will penetrate every company structure in the future. The path is going away from co-existent Ethernet and bus systems for data and sensor technology, and towards a complete Ethernet system – from the cloud through to the smallest recesses of industrial production. In addition to uniform protocols, this also includes the corresponding infrastructure, which must itself shrink as a result of ever smaller terminals and sensor/actuator systems. The demands being placed on the "nerves" and "synapses" of future industry are clear. The device interfaces and system cables must be smaller and more powerful, yet at the same time more robust. Plenty of challenges and opportunities await users and manufacturers. HARTING's new ix Industrial connector is a clear commitment towards miniaturization and sets a new standard.

Matthias Fritsche Product Manager HARTING Electronics

Jonas Diekmann Specialist Editor HARTING Electronics

Scigazette | 35 | February, 2017


And looking forward? HARTING presents the HARTING ix Industrial – a system which meets all of these requirements.The sockets, which are 70% smaller than for the RJ45, allow device manufacturers to use them with considerably smaller devices, which can thus be more easily adapted to the needs of miniaturisation. This is the case with ever shrinking camera systems, for example, where a conventional RJ45 socket already occupies most of the space in the housing, as well as with control units and small industrial computers. This also requires fast Ethernet over a small interface, as well as for switches, LAN access points, routers and other network components. This little superhero can also play its strengths in other industrial sectors, however. On public trains and buses, the displays and passenger information systems can also be supplied with power via PoE/PoE+ and with data via the ix interface. Vibrations and other mechanical stresses are not an issue. For device integration, a small yet robust connector with five THR shield contacts gives maximum stability on the PCB. The data contacts are SMD contacts. As a result, the PCB sockets can be processed using normal reflow soldering along with all other conventional components, and no separate manual or wave-soldering step is necessary. As a result, the developer and device manufacturer can easily integrate the new ix Industrial system into new devices, and can also be sure that this interface is firmly anchored on the PCB and can reliably withstand even rough handling. In overall terms, the end devices can be made slightly smaller by reducing the physical space required for the socket, as miniaturised sockets and plugs enable a significantly higher packing density. For the upright and angled sockets (illustrated), the spacing between the sockets is just 10 millimetres. In the foreseeable future, the socket will also be available in a flat, angled design for very flat devices. Wall ducts too, which complete the application spectrum, also form part of the ix range in terms of their perspective, and complete the new ix "ecosystem". HARTING provides the next evolutionary stage, HARTING ix Industrial, with everything that was missing from its predecessor. As both the components and the housings of the systems are constantly reducing in size, the space for the cabling is also limited. By way of device cabling, HARTING offers the

user flexible and thin system cables with a small bending radius, which also makes installation in miniaturised housings a possibility. They can have the ix connector face on both ends, or mixed ix and RJ45 connectors. The third option has an X-coded M12 on one end. At an initial stage, the HARTING ix Industrial connector is available in straight form. Angled connector variants will follow in the future so that more space critical applications can also be achieved using angled cable outlets. All in the name of maximum flexibility. Thanks to the mixed system cables from ix to Rj45 connector faces in particular, the step-by-step devices can be easily integrated into existing cabling systems with the new ix connector face. A perfectly interfaced system consisting of a socket and a plug connector as well as finished system cables guarantee a process-safe solution from a single source.

Smaller, yet more rugged "Small" is generally equated with "delicate", "fine", and "sensitive". However, since it is these negative characteristics (in the industrial environment) which have often led to problems with the RJ45, the ix Industrial has been designed to be considerably more robust.The ix connectors have a stable locking mechanism using two metal hooks, which engage with a clearly audible click when plugged in, thus providing the user with acoustic and haptic feedback as to correct interlocking. This guarantees anabsolutely safe and vibration-proof connection from the cable through to the PCB. This makes them suitable for industrial applications as well as for applications in the railway, robotics and automation sectors, and indeed everywhere else where there are high mechanical loads. In order to intercept the forces acting on the cable too, the new ix Industrial has robust strain relief which connects the cable firmly to the connector shielding via a robust shield crimp.This ensures a completely robust connection – from the 5 THR shield contacts connected by means of 2 snaphooks in the plug area, through to the cable itself. As a result of increasingly modular thinking and planning, higher contact durability is an issue that manufacturers must consider carefully. Modules such as production units, tools and other system components, are no longer simply rigidly wired, but are also re-arranged and frequently reconnected. In a connector's life, it may be plugged in and

Scigazette | 36 | February, 2017


taken out several hundred to a thousand times. In order to offer absolute safety to users, the HARTING ix Industrial is designed and tested for at least 5,000 cycles. Even after this high number of (dis-) connections, all relevant parameters, such as transition and insulation resistance, voltage resistance and the connection and pulling forces, remain within the permissible limits. Quality and reliability are a top priority at HARTING. To meet these requirements, all connectors are subjected to various tests at our in-house, state-of-the-art test laboratory and are examined using state-of-the-art equipment. This applies to all environmental simulations, such as various storage situations involving climatic extremes and corrosive gases, as well as a variety of mechanical tests, such as shock and vibration tests, contact durability and connection and pulling forces, as well as various other test methods. It's no problem for our little superhero. He easily passes even the most demanding of shock and vibration tests according to the railway standard EN 50155. But Captain ix is not merely a rugged type. He is fast too.

For more performance Transmission bandwidth also plays a role at a time of ever more data suppliers.This is also the case under difficult operating conditions, where EMC is an issue. Highfrequency transmission is always subject to the problem of interference. HARTING offers continuous 360° shielding in this respect. There are no longer any unprotected wires from the cable to the connection point, which can affect a fault-free high-frequency signal. The cable shield is crimped directly to the connector housing with the crimped ring and thus has strain relief and continuous shield transition. A particular challenge is to effectively minimise the interrelation between the individual data pairs with this small design with very close contacts. For this purpose, a shield case is concealed between the two contact rows in the socket, which effectively prevents interrelation between the two opposing contact rows. Furthermore, the new ix Industrial has not 8, but 10 contacts. In each row of contacts, the central contact serves as a shield between the two pairs of wires. For this

purpose, this central contact on the PCB is connected to the earth potential. Due to the shield case and the earthed contacts, the arrangement of the signal carrying contacts results in a similar arrangement to that of an X-coded M12 round connector. Each pair of wires are shielded well from their neighbours in a separate cable or connector quadrant. This measure effectively protects against crosstalk and ensures perfect data transmission.

Cooperation In response to the challenging and growing demand for global digitisation technology, the HARTING Technology Group from Espelkamp has entered into cooperation with the Japanese company HIROSE Electric C. Ltd., Tokyo, in which both partners have agreed to bundle their strengths together. In the course of global digitisation through the Internet of things and services, the miniaturisation of components and interfaces in connection technology is a decisive factor which must be promoted globally. "Industry 4.0 as an expression of the Internet of things needs one thing above all: an Ethernet connection to any Industry 4.0 component," explained Philip Harting, Chairman of the HARTING Technology Group. "The international standardisation of new high-performance components and infrastructures is an essential prerequisite for market success, and provides security in terms of planning." The Japanese partner HIROSE Electric offers miniaturised connection solutions for small portable devices such as mobile phones, tablets and cameras. HIROSE Electric has thus contributed to the miniaturisation of and highspeed transmission by electronic devices. The result of this cooperation is the development of a new miniaturised and robust Ethernet interface for high data rates. The ix Industrial! Dimensions, robustness and Cat. 6A performance in combination with the possibility of Powerover Ethernet (PoE) are examples of successful miniaturisation, and more of the same is sought. They give the HARTING ix Industrial the potential to assume the great legacy of the RJ45. A new standard for Industry 4.0 and IoT applications. For this vision to become a reality, both partners have jointly launched a new standard and have disclosed and standardised this new Ethernet interface in the published IEC /PAS 61076-3-124.

Scigazette | 37 | February, 2017


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.