1、 System features
(1) Unified device management: Unified device model and device data management. Unified device operation API, shielding the differences between different protocols and devices from various manufacturers, supporting cross service, synchronous (RRpc), and asynchronous device messaging.
(2)Multi protocol adaptation: It integrates various common network protocols (MQTT, HTTP, TCP, UDP, CoAP), etc. Different devices use different protocols for access and encapsulate them to achieve unified management, monitoring, online debugging, online start, stop, update and other functions, reducing the complexity of network programming.
(3)Visual configuration dashboard: dynamically configure charts, line charts, pie charts, maps, etc., generating a large screen interface.
(4) Visual Rule Engine: A visual drag and drop rule engine designer that supports a variety of flexible and expandable rule nodes. Data and business processing logic can be dynamically configured online through a rule engine.
2、 Functional modules
(1) System settings: The system settings include user management, permission management, OpenApi client, institution management, and role management.
(2)Statistical analysis: Statistical analysis is presented in the form of charts and graphs, which show the total number of online devices, today's device message volume, CPU usage, and JVM memory, achieving precise control and statistical analysis of device data.
(3) Device management: Device management includes protocol management, device model, device instance, gateway device, and geographic location. Used for unified management of devices, device modeling, security configuration, and other operations.
(4)Network components: Network components include certificate management, component management, and device gateway.
(5) Notification management: Notification management includes notification configuration and notification templates.
(6)Rule engine: The rule engine includes rule models, rule instances, and data forwarding.
(7)Log management: Log management includes access logs and system logs. Access logs contain information data such as access IP, request path, access description, request time, and requesting user.