Skip to content
New reference section added 🎉 Communication Protocols information.

Glossary

Access Control List (ACL)
Rule set defining which users or systems can access specific resources and operations.
AI Microservice
Autonomous AI-powered software module within the platform architecture performing specialized data processing tasks.
AI-Powered Server
Server software utilizing machine learning algorithms for predictive analytics, anomaly detection, and automated decision-making.
Alarm Threshold
Predefined limit value triggering automatic notifications when sensor readings exceed acceptable ranges.
Anomaly Detection
AI-driven process identifying deviations from normal operational patterns in telemetry data streams.
API Gateway
Entry point managing and routing external API requests to appropriate microservices within platform.
API Orchestration
Coordinated execution of multiple API calls to automate complex workflows across microservices.
Asset Hierarchy
Multi-level organizational structure representing relationships between meters, sensors, zones, and supply networks.
ATEX Certification
European conformity certification for equipment intended for use in explosive atmospheres.
Audit Trail
Immutable chronological record of all system activities for security and compliance verification.
Authentication Server
Dedicated service validating user credentials and issuing secure access tokens.
Autonomous Power Supply
Self-contained battery system enabling device operation without external power connections for extended periods.
Batch Processing
Non-real-time data processing method handling large volumes of historical records efficiently.
Battery Life Cycle
Total operational duration of telemetry device battery under specified measurement and transmission schedules.
Blockchain Authentication
Decentralized verification mechanism using distributed ledger technology for secure session management.
CAN Bus
Controller Area Network serial communication protocol for connecting industrial controllers and sensors.
Certificate Authority
Trusted entity issuing digital certificates for secure device authentication.
Cloud Deployment
Hosting platform infrastructure on distributed cloud provider resources instead of on-premises servers.
Cloud-Native Architecture
Software design optimized for cloud deployment with microservices, containers, and dynamic scaling capabilities.
Collection Server
Central server component responsible for receiving, processing, and storing telemetry data from distributed IoT devices.
Configuration Management
Centralized system for maintaining device settings, user preferences, and operational parameters.
Consumption Forecasting
Predictive analytics module estimating future resource consumption based on historical patterns and external factors.
Consumption Pattern
Recurring characteristics in resource usage data revealing behavioral trends and seasonal dependencies.
Cross-Platform Compatibility
Ability of software components to operate consistently across different operating systems and hardware architectures.
Dashboard Widget
Interactive UI component displaying real-time metrics, charts, or device status within monitoring interface.
Data Archive
Long-term storage repository for historical telemetry records with configurable retention policies.
Data Compression
Algorithm reducing payload size of transmitted telemetry packets to minimize network traffic.
Data Encryption
Cryptographic protection of telemetry data during transmission and storage using industry-standard algorithms.
Data Integrity
Guarantee that data remains accurate and unaltered during storage and transmission.
Data Lake
Centralized repository storing structured and unstructured telemetry data in native format.
Data Pipeline
Automated workflow moving data from ingestion through processing to storage and visualization.
Data Point
Single measurement value with timestamp representing state of monitored parameter at specific moment.
Data Sovereignty
Legal principle requiring data to be stored and processed within geographic boundaries of originating country.
Data Visualization
Graphical representation of telemetry data through charts, maps, and interactive dashboards.
Device Driver
Software module enabling communication between collection server and specific meter/sensor hardware models.
Device Firmware
Embedded software controlling telemetry module hardware operations and communication protocols.
Device Provisioning
Automated process of registering new IoT devices and configuring connectivity parameters on the platform.
Device Registry
Central database maintaining inventory of all registered IoT devices with metadata and status.
Distributed Database
Database architecture spreading data storage across multiple physical nodes for scalability and fault tolerance.
District Heating
Centralized heat generation system distributing thermal energy through pipeline network to multiple buildings.
Docker Container
Lightweight virtualization unit packaging application and dependencies for consistent deployment.
Edge Computing
Data processing performed directly on telemetry devices before transmission to central server.
Electronic Signature
Cryptographic mechanism validating authenticity and integrity of digital documents within EDMS integration.
Embedded System
Specialized computing system integrated within telemetry hardware for autonomous operation.
Encryption Key
Cryptographic parameter controlling data encryption and decryption operations.
Energy Consumption Map
Geospatial visualization highlighting geographic distribution of resource consumption across monitored areas.
Event Log
Chronological record of system events, alarms, and user actions with timestamps and severity levels.
Event-Driven Architecture
System design where components react to events rather than polling for state changes.
Fault Domain
Group of components sharing common failure characteristics requiring isolation for high availability.
Fault Tolerance
System capability to maintain operation despite hardware or software component failures.
Field Gateway
Intermediate device aggregating data from multiple sensors before forwarding to collection server.
Firewall
Network security system controlling incoming and outgoing traffic based on predetermined security rules.
Firmware Repository
Secure storage system maintaining versioned firmware images for OTA update distribution.
Flow Anomaly
Unexpected deviation in fluid/gas flow parameters indicating potential leaks or equipment malfunction.
Flow Meter
Instrument measuring volume or mass flow rate of liquids or gases in pipeline systems.
FOTA Update (FOTA)
Firmware Over-The-Air update mechanism delivering software patches to devices via wireless networks.
Gas Distribution Network
Infrastructure transporting natural gas from transmission pipelines to end consumers.
Gas Volume Corrector
Device calculating standardized gas volume considering temperature, pressure, and composition parameters.
Gateway Redundancy
Failover mechanism using multiple communication paths to ensure continuous data transmission.
GDPR Compliance
Adherence to European General Data Protection Regulation requirements for personal data processing.
Geofencing
Virtual boundary triggering actions when devices enter or exit predefined geographic areas.
Geographic Hierarchy
Multi-level organizational structure scaling from single meter to worldwide deployment (settlement-region-country-world).
GPRS
General Packet Radio Service cellular technology enabling moderate-speed data transmission for IoT devices.
HART Protocol
Hybrid analog/digital communication protocol widely used in process automation instrumentation.
Heartbeat Signal
Periodic status message transmitted by device confirming operational health to collection server.
Heatmap Visualization
Color-coded graphical representation showing intensity distribution of measured parameters across geographic areas.
High Availability
System design principle ensuring continuous operation with minimal downtime through redundancy and failover.
HMI Interface
Human-Machine Interface providing operators with controls and visualizations for industrial equipment monitoring.
HVAC System
Heating, Ventilation, and Air Conditioning system regulating indoor environmental conditions.
Hydraulic System
Fluid power transmission system using pressurized liquid to generate, control, and transmit power.
Hyperconverged Infrastructure
Integrated system combining compute, storage, and networking resources in unified software-defined architecture.
IEC 62056
International standard defining communication protocols for electricity meter data exchange.
IIoT Ecosystem (IIoT)
Integrated hardware and software environment for industrial IoT applications with data collection, processing, and analytics capabilities.
In-Memory Cache
High-speed temporary storage layer accelerating frequent data access operations.
Industrial Automation
Use of control systems and information technologies reducing human intervention in industrial processes.
Industrial IoT (IIoT)
Application of IoT technologies in industrial environments for monitoring, control, and optimization of manufacturing processes.
Intrusion Detection
Security monitoring system identifying unauthorized access attempts or malicious activities.
IoT Device
Physical object embedded with sensors, software, and connectivity enabling data exchange over networks.
ISO 27001
International standard specifying requirements for information security management systems.
Latency
Time delay between data generation at source device and availability in central monitoring system.
Leak Detection
AI-powered algorithm identifying abnormal pressure drops or flow variations indicating pipeline leaks.
Legacy System Integration
Connectivity solution enabling modern IoT platforms to interface with existing industrial control systems.
Load Balancing
Distribution of processing tasks across multiple server instances to optimize resource utilization.
LoRaWAN
Low-Power Wide-Area Network protocol enabling long-range communication with minimal energy consumption.
M-Bus
Meter-Bus standard protocol for remote reading of utility consumption meters.
Machine Learning Model
Statistical algorithm trained on historical data to recognize patterns and make predictions.
Message Queue
Buffering mechanism decoupling data producers from consumers enabling asynchronous processing.
Metering Unit
Complete assembly comprising resource meter, telemetry module, and associated sensors.
Microservice Architecture
Software design pattern decomposing application into loosely coupled, independently deployable services.
Microservice Mesh
Network infrastructure managing service-to-service communication, security, and observability.
Middleware
Software layer facilitating communication and data management between IoT devices and enterprise applications.
Modbus
Serial communication protocol widely used for connecting industrial electronic devices.
MQTT Protocol (MQTT)
Lightweight publish-subscribe messaging protocol optimized for constrained IoT devices and unreliable networks.
Multi-Processing
Parallel execution of multiple data processing tasks utilizing multiple CPU cores simultaneously.
Multi-Tenancy
Architecture enabling single platform instance to serve multiple independent customer organizations with data isolation.
NB-IoT
Narrowband IoT cellular technology optimized for low data rate applications with extended coverage and battery life.
Network Topology
Physical or logical arrangement of devices and communication links within IoT infrastructure.
Node
Individual device or server participating in IoT network data exchange.
Oil & Gas Pipeline
Transport infrastructure for crude oil, refined products, or natural gas over long distances.
On-Premises Deployment
Platform installation within customer's own data center infrastructure under their control.
OPC UA
Open Platform Communications Unified Architecture enabling secure, platform-independent data exchange.
Orchestration Engine
Central coordinator managing lifecycle, scaling, and interconnection of platform microservices.
Over-the-Air Update (OTA)
Wireless delivery mechanism for software updates to remotely deployed IoT devices.
Payload
Actual measurement data transmitted within communication packet excluding headers and metadata.
Penetration Testing
Authorized simulated cyberattack evaluating system security vulnerabilities.
Platform API
Programmatic interface exposing platform functionality for third-party application integration.
Pneumatic System
Power transmission system using compressed gas to generate mechanical motion.
Power Grid
Interconnected network for electricity generation, transmission, and distribution to consumers.
Predictive Maintenance
AI-driven approach forecasting equipment failures before occurrence based on operational data patterns.
Pressure Regulation
Automatic control maintaining pipeline pressure within specified operational ranges.
Pressure Sensor
Transducer converting fluid or gas pressure into electrical signal for remote monitoring.
Process Control
Monitoring and regulation of industrial processes to maintain desired operational parameters.
Protocol Translator
Software component converting data between different communication protocols for interoperability.
Query Engine
Component translating user requests into optimized database queries for efficient data retrieval.
Rate Limiting
Traffic control mechanism preventing API abuse by restricting request frequency per client.
RBAC
Role-Based Access Control system assigning permissions to users according to organizational roles.
Real-Time Database
Database system optimized for low-latency writes and queries supporting live dashboards.
Real-Time Monitoring
Continuous observation of operational parameters with minimal delay between measurement and display.
Redundancy
Duplication of critical components ensuring system continuity during failures.
Remote Diagnostics
Capability to analyze device health status and troubleshoot issues without physical access.
Resource Accounting
Systematic tracking and aggregation of consumption data across hierarchical supply networks.
Resource Meter
Instrument measuring consumption of utilities such as gas, water, electricity, or thermal energy.
REST API
Representational State Transfer interface enabling programmatic access to platform functionality.
RoHS Compliance
Adherence to Restriction of Hazardous Substances directive limiting use of specific materials in electronics.
Role Hierarchy
Multi-level permission structure where higher roles inherit capabilities of subordinate roles.
Root Cause Analysis
Systematic investigation methodology identifying fundamental reasons behind operational anomalies.
RS-232
Standard serial communication interface for point-to-point data exchange between devices.
RS-485
Differential serial communication standard supporting multi-drop networks over long distances.
Sampling Rate
Frequency at which sensor measurements are captured and processed by telemetry device.
SCADA Integration
Connectivity between IoT platform and Supervisory Control and Data Acquisition systems.
SCADA System
Supervisory Control and Data Acquisition system for industrial process monitoring and control.
Scalability
System capability to handle growing amounts of data, devices, or users without performance degradation.
Scalable Architecture
System design enabling horizontal expansion by adding resources without architectural changes.
Secure Boot
Hardware-enforced verification ensuring only authenticated firmware executes during device startup.
Security Audit
Systematic evaluation of information security controls against established standards.
Sensor Fusion
Algorithmic combination of data from multiple sensors to improve measurement accuracy and reliability.
Service Discovery
Dynamic mechanism allowing microservices to locate and communicate with each other at runtime.
Session Management
Mechanism controlling user authentication duration and secure token handling.
Session Persistence
Mechanism maintaining user session state across multiple server instances in load-balanced environment.
Smart Contract
Self-executing contract with terms directly written into code triggering actions based on IoT data.
Smart Meter
Utility meter with integrated communication capabilities enabling remote reading and two-way data exchange.
SNMP
Simple Network Management Protocol for monitoring and managing network-connected devices.
Stateless Service
Microservice design pattern where each request contains all information needed for processing.
Stream Processing
Real-time analysis of continuous data flows enabling immediate anomaly detection and alerts.
Supply Chain Monitoring
End-to-end tracking of resource flow from production through distribution to end consumers.
Telemetry
Automatic measurement and transmission of data from remote sources to receiving equipment for monitoring.
Telemetry Device
Hardware module collecting sensor data and transmitting it to central collection server via wireless networks.
Temperature Sensor
Transducer measuring thermal conditions of environment or process media for monitoring purposes.
Tenant Isolation
Security boundary preventing data access between different customer organizations in multi-tenant system.
Time Series Database
Specialized database optimized for storing and querying sequential data points indexed by time.
Time Synchronization
Protocol ensuring all distributed devices maintain consistent timestamp references.
TLS Encryption
Transport Layer Security protocol encrypting data transmitted between devices and servers.
Token Authentication
Security mechanism using cryptographically signed tokens for session validation instead of passwords.
Two-Factor Authentication (2FA)
Security process requiring two independent verification methods before granting system access.
Universal Telemetry Device (UTD)
Hardware abstraction layer enabling collection server to communicate with diverse meter types through standardized drivers.
Uptime
Percentage of time system remains operational and accessible during specified period.
Utility Metering
Measurement of consumed resources including electricity, gas, water, and thermal energy.
Valve Control
Remote actuation capability for pipeline valves based on pressure thresholds or operator commands.
Virtual Server
Software-based server instance running on shared physical hardware through hypervisor technology.
Virtualization
Abstraction layer enabling multiple logical environments to operate on single physical hardware.
Vulnerability Assessment
Process identifying, classifying, and prioritizing security weaknesses in system components.
Water Parameter Monitoring
Continuous measurement of water quality characteristics including pressure, flow, temperature, and chemical composition.
Water Treatment
Process removing contaminants from raw water to produce potable or process water.
Web Interface
Browser-based user interface providing access to platform functionality without client software installation.
WebSocket
Communication protocol enabling full-duplex interaction between web clients and servers for real-time updates.
Zero-Day Vulnerability
Previously unknown software flaw exploited before vendor releases security patch.