
MQTT Protocol
An Industry Brief
What is MQTT (Messase Queueing Telemetry Transport)?

How Do We Implement MQTT at Sightline?
Sightline Systems has created a consumer that subscribes to the MQTT Broker using either a specific topic, such as \House, or a topic and subtopics under it using a wildcard, such as House/#. We then use the topic to create metric groups and in some cases define the metric names.
If your root topic is House with the subtopic kitchen, and Kitchen then has subtopics Temp and Population who’s payloads are a single value, then the data layout in EDM would have a metric group named Kitchen with metrics Temp and Population.
We also support a data payload of a JSON string containing name / value pairs. In this case the name of the metrics created are the names of the name / data pairing in the JSON.
In this case the metric group will be the entire topic, suchs as “House/Kitchen”, and the metrics in that group would be Temp and Population.
How Can We Help You With MQQT Support?
Sightline’s implementation of MQTT support allows the user to easily subscribe to an MQTT broker, dynamically determine what data is available, and to store that data in such a way that it is easily accessible due to the intuitive naming conventions. Once the data is in EDM then all the functionality of EDM is available to use of that data, including not limited to alerts, expressions, and forecasting.
Related Content:
Histogram Data
A histogram is used to summarize discrete or continuous data, grouping data points into specified range values, called “bins.” The histogram is similar to a vertical bar graph; however, the histogram shows no space between the bars. Creating a histogram provides a visual representation of data distribution, and have the ability to displace a large amount of data and the frequency of data values. The median distribution of the data can be determined by a histogram, as well as showing any outliers or gaps in the data. Continue Reading Histogram Data
Zero-Trust Data Security
Zero-Trust is a security concept and cybersecurity framework allowing an organization to aggressively defend itself, its data, and user permissions using an advanced system of automated security protocols. Zero-Trust is centered on the belief that organizations should not automatically trust anything inside or outside their perimeters and instead must verify anything and everything trying to connect to their systems before granting access. Continue Reading Zero-Trust Data Security
Data Correlation
The EDM Correlation data analysis tool is designed to help users perform root cause analysis across multiple devices or systems. It compares the activity of one system over a given period with the activity of multiple other systems and identifies the most highly related data points. This allows EDM to create an intuitive visualization of related events across an entire network of mixed technology enabling root cause analysis to be performed more efficiently than ever before. Continue Reading Data Correlation
Data Forecasting
Forecasting uses historical data as inputs to make informed estimates that are predictive in determining the direction of future trends. Choosing appropriate forecasting techniques depends on the type of data being used and behavior of the data. For example, forecasting techniques used for “financial data” may not be appropriate for time series data like “computer server data” or “data center network activity data” (though underlying forecasting principles stay the same). Continue Reading Data Forecasting