THE INFERRIX GATEWAY

Our edge intelligence enabled Inferrix Gateway is a real time, flexible and dynamically programmable onsite control point. This Gateway can command, control, route process and encrypt information as it moves to the cloud.

The Inferrix Gateway* is compact and ruggedised with high operational temperature range, especially suited for ‘Enterprise / Industrial’ applications. The Inferrix Gateway provides a web-based user interface and a mobile application option, which is role-based and secure, making access seamless.
*(Gateways are available in multiple configurations).

Features

  • Intelligent – Edge Analytics Enabled
  • Monitor, Control & Actuate
  • Threshold, Notification & Co-relation
  • 50+ Sensors per Gateway
  • Optimise Bandwidth
  • Interoperable – Publish to any Cloud / Application
  • RestAPI, Web socket and MQTT publish Support
  • Mobile App & Web Access
  • Secure – 128 bits-based Encryption SSL Access.

KEY FEATURES OF THE INFERRIX PLATFORM

  • Multiple protocols - Can receive data from any device for which there is a protocol driver. Currently
    • supported protocols include -
      • BACnet I/P & MS/TP
      • Modbus (ASCII, RTU, TCP, and UDP)
      • SNMP and SNMP Traps
      • SQL
      • HTTP (Receiver, Retriever and Image)
      • Meta Points 
  • RDBMS Support - Supports Mysql at the back-end for high performance.
  • Web Based – Ubiquitous Access 
  • Meta points / Root Cause Identification- Meta points allow for powerful combinations of point values as well as historical point information to correlate information across asset classes. This helps suppress alarms generated due to failure of downstream devices that are dependent on an upstream device and identify the exact point of failure.
  • User-defined events - Users can define unlimited event criteria on points to detect conditions such as high and low limits, value changes, state change counts, and run-times.
  • Event handling - Any events that occur, either system or user defined, can be handled arbitrarily using user-defined event handlers. These handlers can send emails / notifications to defined mailing lists.
  • Security - User permissions are defined by system administrators, and all communications with the platform can be secured with SSL (Secure Socket Layer), ensuring the privacy of information.
  • Data logging - Each point can be configured with its own data logging and log purging characteristics. Logging schedules can be made to be independent of reading schedules.
  • Reports - Create and schedule reports for online viewing or email. Download data in CSV format for quick upload into spreadsheets or other data analysis programs.
  • Quick charts and set points - Access and control is quick and up to date with roll-over charts and point set controls.
  • Watch lists - Create custom list of points that you want to watch. Easily add and remove points from the list to keep an eye on particular point values and alarms. Create named watch lists with favourite groups of points. Instantly see multi-point graphs of the points on the list.
  • Point hierarchies - Create arbitrary hierarchies of points and point folders to organise the information the way user would want to see
  •  Graphical views - Create graphical representations of points upon backgrounds with drag and drop functionality. All roll-over charts controls and charts work the same in graphics as they do everywhere else.
  • Point details - View point detail information including current value, detailed tabular and graphical charts, alarms, event detectors, and user permissions. Set point controls are also available.
  • Active alarms list - All pages in the application include an indicator of the highest active alarm level. Use it to link to the active alarms list where you can see all active alarms at-a-glance, read and add comments, and link to point details pages where actions can be taken.
  • User memos - Users can comment on events and points so that valuable knowledge is not lost. Event comments are sent with email notifications so that all users are kept up to date on system status.
  • Event scheduling - Define events based upon time schedules. Events raised by schedules have access to all the handling functionality that other event types have.
  • Audit trail - Changes to all information processing objects cause audit events to be raised, including new objects, changes, and deletions. These events pass through the event management system so that all users can independently acknowledge the event.
  • Alarm sounds - Hear sounds when alarms are generated.