DCS; Industrial control system
NameDescriptionContent
NEW CENTER
Current Location:

Practical IIoT and Wireless Network Practices for Modern Mining

From:automation | Author:H | Time :2024-11-27 | 56 Browse: | Share:
Practical IIoT and Wireless Network Practices for Modern Mining
Practical IIoT and Wireless Network Practices for Modern Mining

Automation, IIoT and wireless technologies are fundamental to current mining and metals companies. These technologies are evolving quickly, producing an exciting time of growth in data collection and data sharing, expanding capability, increasing efficiency, and supporting sustainability. However, strong cybersecurity controls and governance are crucial. 

Modern metals and mining companies are sophisticated and often highly automated businesses with long histories. Current macroeconomic trends and business pressures increasingly demand that operations respond to technology advances, including faster and more reliable communications. The Industrial Internet of Things (IIoT), edge and cloud computing, 5G wireless communications, and other new technology promise increased functionality, but also require new approaches to security and daily governance to protect the investments needed to support them.

Here we share practical considerations about how wireless technology combined with good cybersecurity practices can support modern industrial facilities. Our examples come from mining and metals operations but apply to modern industrial operations of all types. Our focus is on wireless communication and IIoT, where practices are less mature, use and functionality are expanding quite rapidly, and security practices need to keep up with the growing risks that the sheer volume of additional endpoints will create.


Need for near-real-time data

With sustainability increasingly guiding the central decision-making processes, production functions, and the wider enterprise, businesses expect communication and processing to happen efficiently and with the lowest possible carbon production. This translates to producing with minimum energy consumption and with the least impact on water demands and water quality. Shareholders and the wider public are demanding sound environmental, social, and governance (ESG) and best practices for energy efficiency.

The efficiency of these processes can only happen with the right data. Tracking production to a level of trace metal specificity is being increasingly requested for the related Scope 1, 2 and 3 reporting needs of the downstream production and purification companies. Companies can address requirements for such near-real-time data to support business needs separately or by a combination of wired and wireless solutions. 

Communication can happen over hardware spread across the premise, or it can move wirelessly to the cloud for bulk data storage. IIoT devices deployed at industry sites communicate with field gateways/edge devices via an edge network (typically a wireless network). Data is collected from sensors and systems, analyzed at the edge hub level for real-time integration, or sent to a central cloud-based service. This data is aggregated with other data and delivered for advanced data analytics, such as digital twin, virtual reality, and value chain optimization (Figure 1).


Figure 1: A common IIoT deployment architecture at a mining site. Source: MMID


The edge network is critical communication infrastructure that enables fleet automation, decision automation, and optimization of production processes in the pit. Through the edge network, companies manage operations and maintenance with integrated planning and live fleet updates from drills, haul trucks, shovels, sensors and unmanned aerial vehicles or drones. 

Edge compute capacity is commonly achieved by deploying compute/storage hardware at the industry site data center close to the operation site. Data collected from IIoT devices can be processed quickly, and real-time integration with operational management systems takes care of hygiene, water management, energy and power quality, and product and assay management. Without IIoT, these processes would normally be manual, slower, and less accurate. With edge computing, the data reaches decision makers more quickly. Many workflows are therefore shortened, resulting in better decision making and overall plant efficiency.


Wireless trends in metals and mining

The use of wireless communication is already large and growing in mining and metals operations, often because the work is dangerous or spread over large areas. Steel is manufactured with very hot smelting processes, for example, and many operations use robotics for productivity and safety. There is a growing interest in autonomous robotic operations, including the management of in-process inventory, because these products are heavy and hard to handle. 

In secondary steelmaking, requirements for speed and custom-made production volumes and grades are increasingly affecting efficiency, as these processes are added (through intelligent real-time scheduling) on top of brownfield applications and existing architectures, producing new safety scenarios and challenges. This strains existing wireless communications infrastructure.

Mines generally have similar challenges to efficiency, as well as multiple production- and safety-critical systems that are reliant on a consistent wireless connection. Mining continues to increase its levels of automation, and this includes the need for data connections to traditional (crewed) heavy mobile equipment (HME) and to autonomous or remote-controlled HME such as drills, haul trucks, excavators and dozers.

The following mine systems are typically reliant on some kind of wireless connection:

  • operations and fleet management

  • remote HME operations

  • collision avoidance for mobile equipment

  • asset health monitoring and reporting

  • ore and grade control, drill patterns

  • high-precision GPS for GPS corrections

  • geotechnical monitoring

  • fatigue monitoring of personnel

  • underground remote equipment operation

  • electrical power equipment monitoring and control

  • leaching field monitoring

  • condition-based monitoring of intelligent instruments and control elements.

When it comes to cybersecurity, every industrial sector has its own requirements, but mining and metals companies are benefiting from the work of the ISA Global Cybersecurity Alliance to advance cybersecurity readiness and awareness in manufacturing and critical infrastructure facilities and processes. Secure communication is key, because mining and metals information also involves business information as products change hands across the value chain. 

Another more local example of the need for secure communications happens when contractors who manage the pit fleet are moving material at the right grade from the pit to the owners of the plant: If trusted information is available for decision making, sites can realize the highest potential value of the ore based on specific productivity key performance indicators and other requirements. 


Updating a 10-year-old wireless data network

Consider the situation facing a mining operation with a 10-year-old wireless data network. At this point, it is likely at its bandwidth capacity, which limits new technologies and upgrades to existing systems (e.g., collision avoidance, turn-by-turn dispatch directions). Besides the environmental challenges of dust, vibration, and other dynamics affecting operation of the current network, there is a risk of increased system failure as the network ages, demands for performance and data rate increase, and spare parts availability diminishes over time. Likely after 10 years, parts are no longer commercially available and must be procured through third-party sellers. 

To mitigate the risk of unplanned system failure and therefore outage of several production- and safety-critical systems, management would have determined that the current wireless system must be upgraded or replaced with fit-for-purpose wireless technology that meets current and future bandwidth and cybersecurity needs. The new network must adapt to the current complexity of mine topography and evolve as the mine is further developed, either in an open pit or deeper and deeper underground. 

Execution of the upgrade (modernization versus migration) also needs to accommodate new and updated wireless technologies to improve safety, such as systems for driver safety and collision avoidance, upgraded fleet management, and improved production and processing capabilities. Ideally systems are “future ready” for some of the expected innovation currently in pilot stages at the mine to prevent regret costs. 

Given these requirements, the mine site has five options: run the existing network to failure; upgrade the current mesh network with no changes; replace it with a hybrid mesh/LTE network; replace it with a hybrid mesh/LTE network “as a service”; or install a site-specific 5G network. Here are considerations for each choice. 


Run the existing network to failure

Pro: Low cost up front. Cons: Potential incidents because the current network supports safety-critical systems; increased maintenance on the existing network with no replacement components commercially available; estimated three-week production impacts due to network failure.


Replace with latest version of current mesh network hardware with no change

A typical wireless infrastructure provider offers fixed wireless and Wi-Fi to broadband service providers and enterprises to provide Internet access. An example of this is a Canopy network. Pros: Replacement systems support safety-critical systems and are often downward compatible; components are readily available; the overall system is supported by the vendor of choice; and the solution provides the easiest cutover without much additional training. Cons: Inflated cost, and the system may not provide as much bandwidth as a hybrid mesh/LTE solution.


Replace with a hybrid mesh/LTE network

Pro: The replacement system supports safety-critical systems and avoids production impacts from a network failure; addition of LTE provides additional bandwidth; components are readily available; and the system is supported by the vendor. Cons: Highest cost option; added complexity; unfamiliarity of LTE would require training and SLA setting with the vendor.


Replacement with a mesh OR hybrid mesh/LTE 'as a service'

Like many platforms, hardware as a service is also available. Pros: Lower up-front cost and in greenfield sites, often a plus; good option when capital is scarce; there is a replacement system to support safety-critical systems; and the approach avoids production impacts from failure. Cons: Requires a long(er) term support contract and expense; network as a service relies on a service agreement between the customer and vendor for network maintenance and managing a business-critical system. (For this it is best if the vendor is intimate with the challenges in OT and IT for the specific industry.)


Upgrade to site-specific 5G network

Pro: Site-specific 5G networks are up to 20 times faster than traditional LTE networks; the added speed allows the benefit of additional connections. Con: Additional connections means additional cybersecurity implications that must be addressed.


Additional actions/considerations for choosing among the five options:

  • Give network components due consideration (for likely types of scenarios) and make sure the design receives a third-party review if safety and production rely on it.

  • Identify all details to be included in the design. 

  • Conduct a constructability review for an initial state and a future state, as mines evolve over time.

  • Calculate the current bandwidth requirements of all mine equipment and systems, and estimate bandwidth requirements for anticipated future technologies to produce a target bandwidth with a suitable safety margin.

  • Perform a proof-of-concept test for each option or case under consideration to ensure the system functions as advertised in your environment. Test physical and electromagnetic functions, performance under additional security, performance beyond vendor default, and performance when adding potential overhead of various additional protocols (safety, functionality, or integration). 

Consider the following major priorities when comparing the solutions: 

  • maximizing your bandwidth return relative to cost

  • having a proven, established enterprise solution ready for mine deployment

  • fulfilling cybersecurity requirements, default and specific to risk profile (such as for autonomous mining)

  • having straightforward scope/implementation requirements to minimize schedule delays of the rollout

  • having a low operating cost relative to the capital cost, but more importantly to the total cost of ownership

  • minimizing reliance on the vendor for support for servicing as well as achieving a service level in response to the specific needs for the site. The Information Technology Infrastructure Library (ITIL) foundation provides a good framework to consider the details of service functions in IT and OT.


IIoT security considerations

IIoT devices leverage wireless technologies such as LTE, 5G and Wi-Fi. They also leverage cloud technologies for analytics and storage, and low-power-consumption technologies for operational longevity. These technologies allow IIoT devices to be widely adopted in mining sites supporting autonomous mining or other processes. However, IIoT devices often have significant cybersecurity vulnerabilities to security threats.

Cyber threat actors frequently exploit security vulnerabilities in IIoT devices. A mining company faces different threat actors depending on its profile. Many mining companies have assets worth multiple billions of dollars, and many of these assets operate critical infrastructure, such as water and power supplies. Mining companies have exploration knowledge about future mining assets that, for example, influences decisions about adjacent infrastructure investments. Hence, various motivations attract intense interest from different cyber threat groups, including nation states, cyber terrorists or even disgruntled employees.

Either external or internal threat actors can exploit a wide range of vulnerabilities in IIoT solutions, and the impact can seriously damage physical assets and risk the health and safety of people. For example, bad actors can hack the sensors used to monitor tailings dam water levels and maliciously change readings to be lower than the actual ones. This can delay or prevent an emergency response to a spill of the tailings water, resulting in damage to the environment and potential loss of human life. 

Another example of an IIoT cyber threat target is the sensors used for stockpile slope monitoring. Sensors are commonly used to monitor the angle or stability of large stockpiles of different materials. If the stockpile slopes cannot be monitored correctly due to hackers intentionally changing the sensor data in the monitoring system, the stockpiles can collapse. This can cause production delays, financial loss, equipment damage, and loss of human life. 

Common IIoT device vulnerabilities include:

  • Hardware devices that are unmanaged: No device registration, tracking, compliance monitoring, or access control. 

  • Hardware and software versions that are out of date combined with versions of operating systems and applications that are no longer supported, leaving significant exposure.

  • No endpoint protection, which makes the devices vulnerable to malware infection.

  • Communication channels that are unencrypted or have no or weak authentication or are using unsecured protocols. 

  • Network IIoT devices connected to untrusted networks or the IIoT exposed to the Internet without proper security protections.

  • Unprotected data in transit and storage, exposing sensitive or critical data either at rest or in transit.

  • Unsecured IIoT services running either on premise or in the cloud.

  • Increased exposure of critical IIoT through connected and converged IT/OT infrastructure. 

  • Software as a service (SaaS) with no segregation of customer data and unsecured cloud services. Vendor implementations have varying levels of security and are often open (not secure) by default.

  • The supply chains are not well secured due to history and missing government practices on how third-party-supplied software/firmware/hardware should be secured. 

  • The lack of physical access control for installed IIoT devices.

Protecting the IIoT environment is only possible by minimizing IIoT vulnerabilities and reducing potential risks. Cybersecurity is not just a technology challenge. It is also a business issue that must be addressed comprehensively through people, processes and technology. Every organization should consider following the National Institute of Standards and Technology (NIST) Security Framework. This framework provides guidance on balancing the effort to mitigate risks and provides processes where previously none existed. 


Considering standards

Automation, IIoT, and wireless technologies are fundamental to current mining and metals companies. These technologies are evolving quickly, producing an exciting time of growth in data collection and data sharing, expanding capability, increasing efficiency, and supporting sustainability. At the same time, it is important to ensure strong cybersecurity controls and governance to keep functionality in place, safely. Companies can increase production and reduce costs through the deployment of connected technologies, but they can also lose significant value due to cyberattacks. 

At first view, smaller companies seem less vulnerable to cyberrisks. They have lower profiles. However, they also have smaller budgets for protection and less to work with when it comes to the increasingly complex capability areas that cannot be fully performed through contractors. This is where standards can help ensure best-practice implementation of technology and cybersecurity protections at reduced cost.

Some internal function needs to exist for setting and auditing the best practices supporting mining and metals companies of the future. Our companies are continuously evolving their autonomous processes across the supply chain, supported by IIoT and sound cybersecurity practices. Simple steps like network segregation and training can provide additional protection.

We in ISA MMID believe it is worth sharing some of our experiences to motivate members using the standards ISA offers in this space (Figure 2). From our personal experience, we believe we need to find the balance between production gains, risk exposure, and implementation cost. This can be tricky, but with a regular inventory of the risks and some good cybersecurity practices and related frameworks, most companies can solve these challenges.

Figure 2: ISA standards related to mining and metals.


ISA’s Mining & Metals Division

The Mining & Metals Industries Division (MMID) is one of ISA’s technical divisions. It focuses on leveraging automation functionality and technology solutions to enhance mining processes and metal production.

Who is best served by this division? Professionals concerned with economically and environmentally sound practices related to the extraction of metal ores, coal, cement, sand, gravel, and other minerals—and the handling, separation, processing, fabrication, related processes, and research and development for the production of finished mineral or metal products. The division also covers the iron and steelmaking industries, aluminum processing and other light metals, and the production and manufacturing of metals products. Find out more by visiting the division’s page on ISA Connect.


  • Honeywell 30735863-502 - SWITCH
  • Honeywell TK-CCR014 - REDUNDANT NET INTERFACE NEW ORIGINAL FREE EXPEDITED SHIPPING/
  • Honeywell 51403165-400 - new 51403165400/
  • Honeywell318-049-001 - "100 Batteries(Japan Liion2Ah14.8Wh)INTERMEC/ PR2,PR3 P/N.:."
  • Honeywell FC-PSU-UNI2450U - Power Supply
  • Honeywell 965-0676-010 - WARNING COMPUTER SV
  • Honeywell 51403519-160 - module
  • Honeywell 107843 - HOUSING CARBON FILE P/N NE COND # 11438 (4)
  • Honeywell VR434VA5009-1000 - Brand new in box Condensing boiler valve DHL fast shipping
  • Honeywell SPXCDALMFX - plc new FREE EXPEDITED SHIPPING/
  • Honeywell BCM-PWS - BCM-ETH BCM-MS/TP BCM-MS/TP Network controller setFedEx or DHL
  • Honeywell YSTR12D-22/C/-2J0DFA/BE/400/T/-CM.HO.TG.SB.SM,ZS,F1,LP,/FX/,1C-BT - UNMP
  • Honeywell IWS-1603-HW - 90-250VAC 1.0A UNMP
  • Honeywell 51304386-150 - MEASUREX Factory Packed
  • Honeywell CC-IP0101 - Profibus Gateway Module
  • Honeywell CC-PFB401 - / CCPFB401 (NEW IN BOX)
  • Honeywell 50071726 - St 800 Series Pressure Transmitter Remote Diaphragm 11-42VDC
  • Honeywell 621-2150 - / 6212150 (NEW NO BOX)
  • Honeywell 80360206-001 - USED YAMATAKE CLI BOARD
  • Honeywell BMDX001A-001 - ACCURAY / BOARD BMDX001A001
  • Honeywell XCL8010A - New CPU Controller.
  • Honeywell PGM-7320 - 1PCS NEW Rae Systems MiniRAE 3000 Portable VOC Monitor#XR
  • Honeywell BK-G40 - U65 *FULL INSTALLATION* Gas Meter 3?± Inlet/Outlet Spool NEW UNUSED
  • Honeywell DM106-0-B-00-0-R-1-00000-000-E0 - DPR100 250V NSNP
  • Honeywell KFD840 - PRIMARY FLIGHT DISPLAY CORE PN: 066-01206-0104
  • Honeywell 51401914-100 - 51400996-100
  • Honeywell TK-PRS021 - Module Via FEDEX/DHL
  • Honeywell C7012A1145 - 1PC New UV Flame Detector Expedited Shipping
  • Honeywell OV210 - Baxter Bakery Oven Igition Control. For DRO. 00-616973 NEW
  • Honeywell 51304431-125 - 1PC New /51304431125 1 year warranty#XR
  • Honeywell QPP-0002 - Quad Processor Module / 5 Vdc / Massima 1.2A/24Vdc/max.25mA
  • Honeywell QPP-0002 - Quad Processor Module / 5Vdc / Max. 1.2A/24Vdc/max.25mA
  • Honeywell 8C-PCNT02 - 514543363-275 module
  • Honeywell DPCB21010002 - Tata Printed Circuit Board
  • Honeywell DPCB21010002 - Tata Printed Circuit Board Rev: 0
  • Honeywell 001649-M5T028 - Tata Printed Circuit Board Rev: 0
  • Honeywell YSTD924-(J2A)-00000-FF,W3,TP,TG,SS - NSFS
  • Honeywell XF523-A - / XF523A (NEW IN BOX)
  • Honeywell TK-PRS021 - NEW IN STOCK ship by UPS
  • Honeywell 2MLR-AC22 - " 2mlr-dbsf,2mlf-ad4s,2mlf-dc4s,2mlr-ac22 Rack"
  • Honeywell 9436610 - MEASUREX NSMP
  • Honeywell RT10A-L0N-18C12S0E - RT10A.WLAN.IN.6803.CAM.STD.GMS
  • Honeywell 51305896-200 - P:C1 Rev D Nim Modem - FAST SHIP BY Fedex
  • Honeywell TK-FTEB01 - PCL module Brand New Fast Shipping By DHL
  • Honeywell 8694500 - Measurex Control Processor Module
  • Honeywell DR4500 - Truline and DR4300 Circular Chart Recorder
  • Honeywell EC-7850-A-1122 - / EC7850A1122 (NEW IN BOX)
  • Honeywell XNX-UTAI-RNNNN - NEW Universal transmitter DHL Fast delivery
  • Honeywell SPXCDALMFX - plc new One Year Warranty #
  • Honeywell TC-RPFM01 - C200 system card brand new Fast Shipping
  • Honeywell 51196655-100 - NSMP
  • Honeywell XCL8010A - / XCL8010A (USED TESTED CLEANED)
  • Honeywell 51198801-100 - NEW CPU INTERFACE BOARD UPGRADE KIT UPIU 51306154-100
  • Honeywell 84795 - Sputtering Target 5N Al5Cu 7830x11640x13050
  • Honeywell W7704A-1004 - / W7704A1004 (USED TESTED CLEANED)
  • Honeywell RA890G1229 - FOR FSG UV Protectorelay /PL3
  • Honeywell KFS-599B - 071-01576-0101 UHF Communication Control with Mods (28V)
  • Honeywell WPC2000 - WINTRISS 9683001 WINTRISS CLUTCH/BRAKE CONTROL *NO KEYS*
  • Honeywell C7012E1112 - 1PC C7012E 1112 Burner Detector New In Box Expedited Ship #
  • Honeywell 8C-TCNTA1 - C300 system card brand new Fast Shipping
  • Honeywell ANT67A - TCAS Antenna 071-01548-0100 w/ October 2023 Repaired 8130
  • Honeywell CC-PDIS01 - PLC Module Brand New Fast Shipping FedEx or DHL
  • Honeywell R7247C1001 - 2-4SECS NSMP
  • Honeywell ALI-80A - Collins Encoding Altimeter - P/N 622-3975-011 - Tested 8130 -Serviceable
  • Honeywell 001650-M5T028 - Tata Relay Circuit Board
  • Honeywell 51196886-100 - PC BOARDS (126201 - NEW)
  • Honeywell J-HAM10 - NSNP
  • Honeywell TC-IXL062 - 1PCS module New fedex or DHL
  • Honeywell 114M4910-6 - PISTON ASSY PN NS COND 12037
  • Honeywell C7076 - 191002B Sensor Amplifier 220/240v
  • Honeywell 510STR12D21A-B77P - NSNP
  • Honeywell 51304511-200 - Module Nim Modem Via FEDEX/DHL
  • Honeywell IC-600 - Integrated Communication Unit RCZ851E 7510700-806 Removed Working
  • Honeywell TC-IAH161 - 1PC NEW REDUNDANT NET INTERFACE one year warranty#XR
  • Honeywell 2001-100-150-126-280-20-100000 - REMAN
  • Honeywell QPP-0001 - FSC QUAD PROCESSOR PACK QPP MODULE CC V1.4
  • Honeywell 30734558-001 - / 30734558001 (USED TESTED CLEANED)
  • Honeywell STD830-E1HS4AS-1-A-ADB-11C-B-21A0-00-0000 - 4500PSI NSNP
  • Honeywell 900C75-0560 - NEW HC900 Controller module FedEx DHL Fast delivery
  • Honeywell BL870 - Bezel 7014331-921 w/ October 2018 Repaired 8130
  • Honeywell STG77L-E1G000-1-A-CDC-11S-A-20A0-00-0000 - NSMP
  • Honeywell FF-SB14E12K-S2 - / FFSB14E12KS2 (USED TESTED CLEANED)
  • Honeywell 51198685-100 - "Rev. A, 140519-2-LF Power Supply Module 10A 100-240 VAC"
  • Honeywell 942-M96-M - plc new FREE EXPEDITED SHIPPING
  • Honeywell TK-IAH161 - 1PC New ANALOG INPUT TKIAH161 Expedited Shipping
  • Honeywell C7061F2001 - 1PC UV Flame Detector New In Box #
  • Honeywell 0190-20139/D - ONE Sputtering Coating Disc 4N5TI NEW
  • Honeywell 82408667-001 - NEW MEMORY BOARD ROM/RAM 82408667001
  • Honeywell C7012A1194 - NEW IN STOCK ship by UPS
  • Honeywell TK-FTEB01 - NEW IN BOX FTE BRIDGE Brand New Fast Shipping FedEx or DHL
  • Honeywell RA890G1344 - 1pc NEW Combustion Controller DHL or FedEX
  • Honeywell DH-AP-1/ - Miller 3 Workers per System 4-3/4 Ft Overall H Post Anchor
  • Honeywell TCOAV081 - NEW IN BOX ANALOG OUTPUT EXPEDITED SHIPPING
  • Honeywell W7704D1016 - Control Unit
  • Honeywell 9437710 - USED PIDP MEASUREX / 09437710-RP MODULE REV D STOCK 1603
  • Honeywell 51403165-400 - Brand new industrial computer Fast FedEx or DHL
  • Honeywell DC3200-EE-000R-240-00000-E0-0 - New DHL FastShip
  • Honeywell 51305348-100 - / 51305348100 (USED TESTED CLEANED)
  • Honeywell CC-PAIX01 - 1PCS Brand New Expedited Shipping
  • Honeywell 51305890-175 - REV B NEW
  • Honeywell XCL8010A - NEW IN STOCK ship by UPS
  • Honeywell D18-UU0000-D00000-0000-2-0000-00-E - CHART RECORDER CHART RECORDER
  • Honeywell TC-IAH161 - ANALOG INPUT NEW 1PCS
  • Honeywell 10020/1/2 - / 1002012 (NEW IN BOX)
  • Honeywell DC3200-EE-000R-240-00000-E0-0 - Digital Controller UPS Express New Zy
  • Honeywell 2MLR-CPUH/F - 1PC NEW EXPRESS P3097E YL/
  • Honeywell 9437710 - USED PIDP MEASUREX MODULE REV D STOCK 1608
  • Honeywell CC-PAIX02 - Fast Shipping
  • Honeywell DPR500 - Brand New Fast Shipping By DHL
  • Honeywell 10004/I/F - / 10004IF (USED TESTED CLEANED)
  • Honeywell C7012E1112 - 1PCS New in box UV Flame Detector
  • Honeywell HPTZ-361W - Brand New Expedited Shipping
  • Honeywell 10006/2/1 - / 1000621 (NEW NO BOX)
  • Honeywell SC-PCMX01 - 1PC NEW RTU2020 51307195-175 SHIP EXPRESS #P2254E YL
  • Honeywell X-NPMS(H) - 1PC Network Paging Console Fire Equipment Brand New Via DHL
  • Honeywell C7012E1112 - 1Pcs new Explosion-proof flame detector
  • Honeywell 0190-20139/D - 4N5TI Sputtering Coating Disc
  • Honeywell RM7840E1016 - SER. 3 REV. 4141 120VAC 15SEC NSMP
  • Honeywell C7012E1120 - Brand new Fast shipping via DHL
  • Honeywell MU-PSIM11 - 1PCS card Brand New Expedited Shipping
  • Honeywell DPR500 - Brand New Fast Shipping FedEx or DHL
  • Honeywell 2108B2101N - Gas Detector OPTIMA PLUS-UL-HC
  • Honeywell 51403578-100 - Rev F Operator Keyboard 1x Ship By DHL/FEDEX/UPS
  • Honeywell 51403165-400 - ONE industrial computer
  • Honeywell FF-SB12E/R02E-S2/3 - Securitram Pair FF-SB12E02E-S2/3 + FF-SB12R02E-S2/3
  • Honeywell STR12D-21A-1B0AFAAA21BP-1C,DE,MB+XXXX - NSMP
  • Honeywell STR17G-11A-1K0AFCAA21A0-A1,CC,HC,MB,NE,TG,W2,3H+XXXX - NSMP
  • Honeywell TK-FTEB01 - "FTE connection module , 51309512-175 Fast Shipping"