banner

NEWS

2022/12/17

Anti-Oxidation & Anti-Corrosion: Sealed And Hermetically-Sealed Connectors

Dear customers, we would offer you the detailed insight of our sealed connectors in this article.

 

Here is the table of content :

What are sealed and hermetically sealed connectors?

How many series? What is your IP rating?

Comparison: Sealing materials

Comparison: Sealed & Hermetically-sealed connectors

Comparison: Sealing Type

Testing method

Testing report  

 
 
 

What Are Sealed And Hermetically Sealed Connectors?

Sealed and hermetically sealed connectors are specifically designed to protect the connectors from oxidation or corrosion caused by the ingress of moisture or gas.

And they make sure the signal transmitting without being interfered.  

 

 

 

How Many Series? What Is Your IP Rating?

Series include N, BNCTNCSMA and adapters. Our sealed connectors give protection incorporating with IP 68.

Hermetically sealed connectors give protection in the sealing (helium leak) rate to 1X10-8 cc/sec. Both are suitable in outdoor and harsh environments.


Customizing configurations is also available.

 

IP Rating Guide

  

 

 

 

Comparison: Sealing Materials

The sealing materials such as o-ring and glass bead are commonly used in the design. 

Glass bead is an ideal electrical insulating material for hermetic connectors because its mechanical character can provide a very high strength and reliability hermetic seal.


We also use the one piece integrated connector body working with the glass bead to perfectly achieve the hermetic function when unmated.


The graphic below lists comparison between different sealing materials.

Comparison: Sealing Materials

  

 

 

 

Comparison: Sealed & Hermitically-Sealed Connectors

The following table listed the features of sealed and hermetically sealed connectors to help you understand our products better.
 

Comparison: Sealed & Hermitically-Sealed Connectors

  

 

 

 

Comparison: Sealing Type

Besides the choice of sealing materials, Chin Nan utilizes different techniques to fulfill customers' requirements. There are four sealing types in the below graphic.

The level of sealing can be achieved to meet the requirements when mated or unmated. 

Comparison: Sealing Type

   
 

 

 

Testing Method

Testing Method

  
 

 

 

Testing Report

 

Degrees of Protection Provided by Enclosures

(1) Degrees of Protection Provided by Enclosures

 

IP-68

(2) IP-68

 

Dustproof Test(3) Dustproof Test

 

Sign In / Register

Write a review

已送出
Thank you for your review
OK

We will use cookies on our website for technical, analytical, and marketing purposes. By continuing to browse this website, you agree to our use of cookies. To learn more, read our Privacy Policy. 

I AGREE

PRIVACY POLICY

LEGAL, TERMS & CONDITIONS

Chin Nan respects the privacy rights and interests of each customer. Chin Nan will observe the principles when processing your personal information fairly and lawfully. We take the protection of personal data very seriously. We want you to know when we are storing your data, what data we are storing and how we are using it.

PERSONAL INFORMATION YOU PROVIDE TO US THROUGH OUR SITE.

We may collect and store personal information that you choose to voluntarily provide to us when you provide it through the Site. The types of personal information may include:

  • Company name, contact name, job title, company website, country, business type, email,telephone number, fax number, address.

  • Other personal information you may include in content you submit on the Site.

COOKIE:

There is a technology called "cookie" which is an element of data that a website can send to your browser which may then store on your system. Some Site pages use cookies so that we can better serve you when you return to our Site. You can set your browser to notify you when you receive a cookie, giving the chance to decide whether to accept it.

We use Track ID (cookies) to collect and store information when you visit our website; the information is saved at Amazon Web Services (AWS) and used to identify your browser or device.

Cookies do not harm your computer and do not contain any viruses.

Cookies help make our website more user-friendly, efficient, and secure.

Cookies are small text files that are stored on your computer and saved by your browser. Using cookies enables us to provide you with certain features and provides us with information regarding website visits.

WEB ANALYSIS WITH GOOGLE ANALYTICS

We use Google Analytics to analyze user activity in order to improve the Website. For example, using Google Analytics Cookies we can look at aggregate patterns like the average number of searches that users perform, what keywords users searched, countries and languages. We can use such analysis to gain insights about how to improve the functionality and experience of the website. You can visit Google Analytics’ Privacy Policy at: https://policies.google.com/technologies/cookies

YOUR INFORMATION COLLECTED FROM OTHER TECHNOLOGIES

Besides Cookies, we use other technologies to improve your user experience and the overall quality of our services by collecting the information below:

[site visitor] visited website (URL)

[site visitor] IP Address

[site visitor] Internet Connection Device Brand, Model and OS

[site visitor] Internet Connection Device Browser, Resolution, Color

[site visitor] GeoIP

[site visitor] ISP

INFORMATION, BLOCKING, DELETION

As permitted by law, you have the right to be provided at any time with information free of charge about any of your personal data that is stored as well as its origin, the recipient and the purpose for which it has been processed. You also have the right to have this data corrected, blocked or deleted. You can contact us at any time using the address given in our legal notice if you have further questions on the topic of personal data.

All the collected information is saved for 24 months on Amazon Web Services (AWS) and regularly deleted every month..

THE PROTECTION OF YOUR PERSONAL DATA

Your personal data is stored on Amazon Web Services (AWS). AWS Announces CISPE Membership and Compliance with First-Ever Code of Conduct for Data Protection in the Cloud.

INFORMATION SECURITY

We use standard security technology SSL or HTTPS standard technology for keeping an internet connection secure and safeguarding any sensitive data that is being sent between two systems, preventing criminals from reading and modifying any information transferred, including potential personal details.

CHANGES TO THIS PRIVACY POLICY

We may update this Privacy Policy to reflect changes to our information practices. If we make any material changes we will notify you by email (sent to the e-mail address specified in your account) or by means of a notice on this website prior to the change becoming effective.