Advantages
With service development, an increasing number of enterprises choose to combine IoT technologies for business growth. Huawei Cloud IoT services have outstanding advantages in capabilities, costs, O&M, security, and ecosystem compared with MQTT clusters managed by enterprises.
Dimension |
Item |
Huawei Cloud IoT |
MQTT Cluster Managed by Enterprises |
---|---|---|---|
Capabilities |
Flexible protocols |
|
Supports only the MQTT protocol. The capability of supporting other protocols requires development. It is difficult, expensive, and inefficient to maintain multiple protocols. |
Access |
|
Developers are required to be familiar with different programming languages, causing heavy development workload. |
|
Performance stability |
|
R&D engineers need to perform tuning. To ensure 99.9% or higher availability, R&D engineers who are proficient in open-source MQTT and senior architecture personnel are required. |
|
Features |
|
Open-source MQTT provides basic functions. Developers need to develop a complete solution based on open-source capabilities. However, some open-source code left unmodified during intrusive modification by developers may cause accidents on the live network during open-source middleware upgrades. |
|
- |
- |
- |
|
Technical support |
|
Open-source MQTT does not provide technical support and has a large number of default configuration parameters. Enterprises need to adjust the parameters based on service scenarios. If developers of enterprises are not familiar with the open-source code, their improper parameter adjustments pose huge potential risks to commercial systems. When problems occur, they have to solve problems by themselves. |
|
Costs |
Server cost |
Servers do not need to be purchased. |
Servers need to be purchased. |
Labor cost |
No extra labor is required for cloud services. |
Enterprises need to pay for professional development and O&M teams. |
|
Resource use |
Resources are out-of-the-box and elastic for service growth and scale-out without interruption. |
Enterprises need to develop the elastic resource scaling function by themselves. |
|
Architecture cost |
The high-availability, high-performance, and secure architecture is built based on cloud native 2.0 and supports continuous evolution. |
It is difficult for an enterprise to build the architecture that achieves high availability, high performance, and high security. |
|
O&M |
Infrastructure O&M |
Provides unified O&M, quick response, scaling, upgrade, and troubleshooting based on professional teams. |
Enterprises need to build their own O&M teams or use third-party O&M teams to solve scaling, upgrade, and O&M problems. Statistics show that most service faults are triggered by scaling and upgrade operations. The O&M cost is several times or even dozens of times the development cost. |
Service platform version |
Provides unified update by public cloud service providers, fast version iteration. |
It is managed by enterprises. |
|
O&M |
|
It is managed by enterprises. |
|
Security |
System security |
Establishes a trusted security system: It obtains international security certifications such as ISO27001, ISO27017, ISO27018, and CSA STAR. It complies with EU's GDPR.
|
It is managed by enterprises. End-to-end security is a systematic project with high requirements. It is expensive and difficult to build and maintain system-level security capabilities. |
Data security |
Provides a complete security protection system. Data is stored in redundant mode in the data center of the cloud service provider, ensuing data security. |
Enterprises need to build data redundancy, backup, and recovery capabilities. |
|
Disaster recovery |
Supports active-active service deployment, multi-data center DR, as well as high availability and DR capabilities based on multiple regions and availability zones (AZs). |
Self-managed clusters usually do not have DR capabilities. Huge investment in active-active service deployment and DR devices often ends up with low return on investment (ROI). |
|
Vulnerability fixing |
Establishes a comprehensive vulnerability management system and a dedicated security research department to detect, track, and fix vulnerabilities in a timely manner. |
Most enterprises do not have a vulnerability management mechanism or fix vulnerabilities in a timely manner. As a result, they are prone to attacks and are not aware of attacks and data theft. |
|
Ecosystem |
Third-party access |
Integrates upstream and downstream ecosystem resources and provides value-added services. |
It is built by vendors. |
Scalability |
|
The scaling period is long. Enterprises need to implement system or component interconnection. The labor and equipment costs are high. |
Item |
Huawei Cloud IoT |
MQTT Cluster Managed by Enterprises |
Cloud resource cost |
One SU3 supports 40 million messages per day, and 1,000 TPS upstream and downstream messages. It costs about USD1,000 per month or USD12,000 per year. Total: about USD12,000/year |
Total: USD3,256/year |
Labor cost |
None |
Basic middleware implements basic functions.
Special functions are added based on the basic middleware.
Bonuses are not included. |
Total |
USD12,000/year |
Basic functions: USD63,256/year Basic and special functions: USD423,256/year |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot