HVAC, HMI and integration platform for building automation based on Beckhoff PLC

SmartUnity.nEXT Server

SmartUnity.nEXT server is the heart of the SmartUnity.nEXT platform. It is utilized in distributed control and monitoring systems together with several SmartUnity automation PACs and is capable of performing all central system functions: system and user administration, data acquisition and archiving, web access, trending, notifications, etc.

Key Benefits

Web-Oriented Architecture

SmartUnity.nEXT is built on the most modern architecture, which was initially developed for the Web. Indeed, it is various web services that take advantage of the most sophisticated high-load systems and state-of-the-art technologies. Thanks to the use of the full stack of web technologies, SmartUnity boasts universal access to the system, outstanding performance, system scalability, and much more.

Ultra-fast

SmartUnity.nEXT offers top-notch speed of data recording and processing. The server lets you create a system with a large number of monitoring points, using significantly less hardware than its competitors. As a result, the overall cost of the system goes down while its speed increases.

Scalability

SmartUnity .nEXT has originally been based on the web technologies, which require scalability as one of the essential features, this is why a SmartUnity-based system is extra scalable. You can at any time boost its performance by simply duplicating the components that have been overloaded.

Fault-tolerance

SmartUnity.nEXT is a highly fault tolerant system. The whole logic of the system is distributed between SmartUnity automation PACs, and a server failure does not affect the entire system. Moreover, SmartUnity.nEXT supports distributed server architecture which lets logic elements operate on different physical machines. Finally, each of these elements may additionally be backed up.

Security

SmartUnity.nEXT uses modern methods to ensure system security. The data channels are encrypted through highly reliable methods to prevent data interception and unauthorised management. The security of the whole system is further enhanced by different levels of access for specific user groups, logging of user actions, and several protection levels.