Difference between revisions of "M2M Bridge"
From AMTech WikiDocs
(→Functionality) |
(→Functionality) |
||
Line 1: | Line 1: | ||
== Functionality == | == Functionality == | ||
− | Configurable edge intelligence | + | * Configurable edge intelligence |
− | Bridges standard and proprietary protocols to AMTech IoT DAP. | + | * Bridges standard and proprietary protocols to AMTech IoT DAP. |
− | Device-to-device or device-to-server communications. | + | * Device-to-device or device-to-server communications. |
− | MQTT, LLRP, CoAP, STOMP, SmartM2M, LWM2M, PLC, Zigbee and others | + | * MQTT, LLRP, CoAP, STOMP, SmartM2M, LWM2M, PLC, Zigbee and others |
− | Allow remote and centralized control of IoT devices and gateways. | + | * Allow remote and centralized control of IoT devices and gateways. |
− | SNMP/MIB/TRAP, Reader Management and other | + | * SNMP/MIB/TRAP, Reader Management and other |
− | Configurable autodiscover | + | * Configurable autodiscover |
− | Implements common functionality and host the execution of the protocols | + | * Implements common functionality and host the execution of the protocols |
− | Network failure detection and recovery | + | * Network failure detection and recovery |
− | Get centralized configuration information at startup and real time modifications | + | * Get centralized configuration information at startup and real time modifications |
− | Access control policies to manage observation production and consumption | + | * Access control policies to manage observation production and consumption |
== Configuration == | == Configuration == |
Revision as of 14:14, 3 March 2016
Contents
Functionality
- Configurable edge intelligence
- Bridges standard and proprietary protocols to AMTech IoT DAP.
- Device-to-device or device-to-server communications.
* MQTT, LLRP, CoAP, STOMP, SmartM2M, LWM2M, PLC, Zigbee and others
- Allow remote and centralized control of IoT devices and gateways.
- SNMP/MIB/TRAP, Reader Management and other
- Configurable autodiscover
- Implements common functionality and host the execution of the protocols
- Network failure detection and recovery
- Get centralized configuration information at startup and real time modifications
- Access control policies to manage observation production and consumption