18
NexLog Recorder User Manual v2.2.0
providing rack cabinets and concentrating communication wiring – phone lines,
radio, etc. – nearby.
2.4.2. Operating Limits
The installation should allow the units to operate within their electrical and
physical operational limits.
Table 3
—Operating Limits
Parameter
Range or Limits
Voltage
100 - 250VAC
Frequency
47 - 63 Hz
Power (typical/max) NexLog 740-200W/350W, NexLog 840 - 200W/400W
thatTemperature
Ope5C (41F) to 40C (104F)
Humidity
10% - 80% relative, non-condensing
Altitude
-2,000 to +10,000 feet operating (to 22,000 feet non-operating). If operated
at high altitudes, take special care that airflow is unrestricted by dust or
obstacles.
Vibration (Hard Disk
Drives)
These units contain hard disk drive storage units and mechanical
components that are sensitive to mechanical vibration. They are intended
for operation in fixed locations.
Typical vibration limits for the hard disk drives are as follows:
Operating: .2 G, 5-300 Hz
Non-Operating: 1 G, 5-300 Hz
Shock (Hard Disk
Drives)
Typical shock limits for the hard disk drives are as follows:
Operating: 1 G, 11 ms half-sine
Non-Operating: 40 G, 11 ms half-sine
Orientation
The archive drives are very sensitive to orientation. The recorder should
always be mounted on a flat, non-sloping surface.
2.4.3. Location Considerations
When choosing a location, consider the following:
Operating Limits.
The location must respect the unit’s operating limits, as
listed in the Operating Limits section of this manual.
Convenience.
If the unit will be operated from its front panel, then it should
be comfortably accessible to the operator. Service personnel should have
access to the unit. If the unit is to be installed in a rack, special rack units
that provide a horizontal writing surface are commercially available.
Security.
If the unit must be physically secure, then it can be placed in a
locked equipment room with limited access. This will also help ensure data
security. Consider that a user with access to the unit can remove power,
disconnect the input cables, play back recordings, monitor calls, remove
archive media, and do other things to compromise your data. Logins are no
protection against a determined attacker with physical access to a machine.