1. Where is the AGV data stored?
AGV data, including mission logs, real-time telemetry, and environment maps, is typically stored in one of two places:
On-Premises Server: Most industrial setups use a local serverlocated behind the facility's firewall. This offers the highest security and lowest latency.
Edge Computing (On-Vehicle): Critical operational data (like point clouds for immediate navigation) is processed and stored temporarily on the AGV's internal industrial PC to ensure it can function if the network drops.

2. Does RCS need external internet?
In the context of AGVs, the Robot Control System (RCS) or Fleet Manager generally does not require an external internet connection to operate the vehicles. It communicates with the AGVs over a local Wi-Fi or 5G network.
Internal LAN: The RCS usually lives on a local network.
Exceptions: Internet is only needed for remote technical support from the manufacturer, software updates, or if you are using a cloud-based management platform.
3. Can I use a local private server?
Yes, and for high-security environments, it is the recommended standard. Using a local private server ensures your warehouse layout and operational throughput data never leave your physical building.
Recommended Industrial Servers for Local Deployment:
Dell PowerEdge R250 1U Rack Server: A compact, entry-level 1U server ideal for managing smaller fleets with high reliability and a cyber-resilient architecture.
Dell PowerEdge R450 Server: A more powerful option with dual processors, suited for complex environments with large fleets and intensive data processing needs.
RS3110 Rackmount Server: A high-performance departmental server that supports redundant power supplies to prevent downtime.
4. What encryption is used for AGV?
Security for AGVs occurs at several layers:
Wireless Encryption: Most systems use WPA3 or WPA2-Enterprise (802.1X) to secure the communication between the AGV and the Access Points.
Data in Transit: Communication between the Fleet Manager and the AGV often uses TLS/SSL (HTTPS/MQTTS) protocols to prevent data interception.
Authentication: High-end systems require unique certificates for each AGV to join the network, ensuring that "rogue" devices cannot spoof your fleet.