The Future Of Device Servers

June 30, 2005
The next wave of the Internet is just starting to develop, bringing with it a substantial market opportunity for companies that develop machine-to-machine (M2M) technology. Device servers provide the technology that enables M2M communications. Devic

The next wave of the Internet is just starting to develop, bringing with it a substantial market opportunity for companies that develop machine-to-machine (M2M) technology. Device servers provide the technology that enables M2M communications. Device servers typically come in embedded and external forms. They supply the intelligence that allows virtually any type of device to communicate over a network. Additionally, device servers provide the building blocks for distributed device intelligence, making M2M a reality.

Distributed Intelligence: In the past, device servers provided the connectivity to allow a discrete device—one that was never designed to communicate over a network—to be accessed, monitored, and controlled over a network. However, the intelligence for monitoring and responding to events was handled by an administrator, or in some cases, by computer software at the remote end. Now, device servers are evolving to include intelligence about the attached device, enabling them to locally monitor events, respond proactively, and provide notification on what has occurred.

Inherent intelligence: Distributed intelligence devices now can talk to each other, allowing events from one device to affect a change in another.

No longer just for personal benefits: This new intelligence opens up the possibilities for new revenue streams with active services and monitoring. It ultimately saves money by having systems automatically make adjustments or corrections to changing conditions. It also minimizes unnecessary service truck deployments.

Management and control: Having devices accessible over a network allow for management from virtually anywhere.

Fault detection: Devices on a network can proactively notify administrators of faults and, in many cases, even be programmed to automatically log and correct the fault.

Security (SSH, SSL, AES, etc.): Security is critical, specifically the importance of standard interfaces like SSH, SSL, and AES encryption. These are vital to protect device access, secure the data being transmitted, and ensure ease of deployment and acceptance by IT administrators and government agencies.

Sponsored Recommendations

Board-Mount DC/DC Converters in Medical Applications

March 27, 2024
AC/DC or board-mount DC/DC converters provide power for medical devices. This article explains why isolation might be needed and which safety standards apply.

Use Rugged Multiband Antennas to Solve the Mobile Connectivity Challenge

March 27, 2024
Selecting and using antennas for mobile applications requires attention to electrical, mechanical, and environmental characteristics: TE modules can help.

Out-of-the-box Cellular and Wi-Fi connectivity with AWS IoT ExpressLink

March 27, 2024
This demo shows how to enroll LTE-M and Wi-Fi evaluation boards with AWS IoT Core, set up a Connected Health Solution as well as AWS AT commands and AWS IoT ExpressLink security...

How to Quickly Leverage Bluetooth AoA and AoD for Indoor Logistics Tracking

March 27, 2024
Real-time asset tracking is an important aspect of Industry 4.0. Various technologies are available for deploying Real-Time Location.

Comments

To join the conversation, and become an exclusive member of Electronic Design, create an account today!