Gigabit-capable industrial PoE Plus switch with Layer 2 management features
Transition Networks, Inc.
L2 switch capable of operating in a wide temperature range to supply power to surveillance cameras and wireless APs with power receiving devices.
The SISPM1040-382-LRT from Transition Networks is a gigabit-capable industrial PoE Plus switch with Layer 2 network management features. It has eight IEEE802.3at compliant PoE ports, each capable of delivering up to 30W, and a combo port configuration with two slots for 1000BASE-X SFP or two 10/100/1000BASE-T compatible RJ-45 ports for uplink. The presence of two combo ports allows for three possible combinations: using two SFP slots, one RJ-45 and one SFP port, or two RJ-45 ports. The SISPM1040-382-LRT is designed to operate fanless in harsh industrial environments, with a temperature range of -40°C to +75°C.
Inquire About This Product
basic information
Industrial PoE+ switches comply with the IEEE802.3at and IEEE802.3af standards and are designed as P.S.E power supply devices that can convert and link to fiber optic ports with a DC50V power supply. They can supply power to powered devices (PD) via unshielded twisted pair cables. These industrial PoE+ switches are robust devices designed to operate in harsh environments such as factory floors and outdoor enclosures while maintaining the advantages of PoE power supply. The SISPM1040-382-LRT features advanced Ethernet management, redundancy, and security with a switching bandwidth of 5.6Gbps using a store-and-forward method, providing the hardware specifications required for industrial and outdoor power-over-Ethernet applications that demand high reliability and availability. Two gigabit SFP ports offer flexibility by allowing the use of combo ports in combination with 10/100/1000BASE-T, making gigabit bandwidth available for uplink.
Price information
Due to overseas products, prices may change dynamically. Please feel free to contact us.
Price range
P3
Delivery Time
※The delivery time may vary depending on the quantity, so please feel free to contact us.
Applications/Examples of results
It is widely used for the purpose of transmitting images from surveillance cameras on highways, railways, and parking lots over a network. In the Kyushu Expressway, a higher class model, the SISPM1040-384-LRT all-port gigabit switch, is utilized to integrate the images from surveillance cameras along with the processing of ETC card data into a gigabit fiber optic network. To ensure mission-critical operations, power supply redundancy is implemented to prevent issues caused by power outages.
Detailed information
-
Higher-class product than SISPM1040-382-LRT. It features 8 ports of 10/100/1000Base-T PoE+ ports and 4 ports of 1000BASE-X SFP open slots.
Line up(1)
Model number | overview |
---|---|
SISPM1040-384-LRT | Gigabit industrial PoE Plus L2 switch with 8 ports of 10/100/1000BASE-T PoE Plus and 4 ports of 1000BASE-X SFP open slots, featuring a backplane with a processing capacity of 24Gbps. It includes Layer 2 management functions and supports STP/RSTP and LACP, as well as power and network redundancy, IEEE 802.1Q, 802.1w, 802.1s, and 802.1x. |
catalog(2)
Download All CatalogsCompany information
The company was established in 1994 as a provider of IT-related product imports, sales, and technical support. We primarily offer distribution and technical support for cutting-edge computer network-related products and information communication security products from the United States. Recognizing early on that security measures against computer viruses and malware are essential for information communication networks, we have also engaged in the sales and support of information security-related products. In recent years, cyber attacks targeting specific entities have become a social issue, making defense measures against threats essential for businesses and organizations. In addition to solutions for defending against malicious external attacks and preventing information leaks, we provide new solutions that utilize artificial intelligence (AI) to detect early signs of cyber attacks that penetrate internal networks and internal threats by leveraging machine learning and mathematical theories, thereby preventing incidents before they occur.