Introduction
The AIG-302 Series advanced IIoT gateways connect Modbus RTU/ASCII/TCP devices to clouds such as Azure, and MQTT platform. The gateways support the Modbus TCP server mode, enabling simultaneous transmission of data to a cloud platform and local SCADA system.
Boost Edge Computing Capabilities With Azure IoT Edge
AIG-302 supports Azure IoT Edge to bring in a multitude of benefits, including edge computing capabilities, reduced bandwidth costs, flexibility and scalability, seamless integration with Azure services, and ease of management and updates. Specifically, with the AIG-302 processing data locally, it not only offers rapid response and low latency but also effectively reduces network bandwidth usage, thereby cutting costs. Additionally, the modular design of AIG-302 supporting Azure IoT Edge makes your system both flexible and easily expandable. At the same time, its seamless integration with Azure cloud services allows you to effortlessly extend cloud capabilities to edge devices.
Built-in Ready-to-use Data Preprocessing Functions, No Coding Required
Energy Management Systems mainly collect energy data such as average power generation and energy efficiency. This data is then used to display on-site conditions, observe the energy trend, and optimize energy usage. Most energy management systems require meaningful data so gateways at the field site require to preprocess the edge collected data in advanced. For some applications, they even require to do actions within a short period of time after preprocessing the collected data. AIG-302 series have built in the intuitive UI enables to handle the data easily.
Secure Remote Access Reduces Maintenance Costs
The AIG-302 comes with powerful troubleshooting tools to diagnose issues with protocol statuses and capture and analyze traffic packets, enabling engineers to remotely identify the root cause of issues and quickly bring the operation back to normal. Moreover, AIG-302 series provide secure remote access allowing maintenance engineers saving a lot of time and effort and reducing system downtime in energy management systems.
Security Dashboard Optimized for Detecting Security Issues
The security dashboard utilizes device scanning to identify potential cybersecurity threats from multiple angles, such as during account settings management, application networking, application resource usage monitoring, product certificates deployment, service settings modifications, and system status checks. Upon detecting threats, a mitigation plan is recommended to resolve issues.
|
|
|