0%

Book Description

Learn the ins and outs of the Industrial Internet of Things through subjects ranging from its history and evolution, right up to what the future holds.

About This Book

  • Define solutions that can connect existing systems and newer cloud-based solutions to thousands of thousands of edge devices and industrial machines
  • Identify, define, and justify Industrial Internet of Things (IIoT) projects, and design an application that can connect to and control thousands of machines
  • Leverage the power and features of a platform to monitor, perform analytics, and maintain the Industrial Internet

Who This Book Is For

Architects who are interested in learning how to define solutions for the Industrial Internet will benefit immensely from this book. Relevant architect roles include enterprise architects, business architects, information architects, cloud solution architects, software architects, and others. The content is also relevant for technically inclined line of business leaders investing in these solutions.

What You Will Learn

  • Learn the history of the Industrial Internet and why an architectural approach is needed
  • Define solutions that can connect to and control thousands of edge devices and machines
  • Understand the significance of working with line of business leadership and key metrics to be gathered
  • Connect business requirements to the functional architecture
  • Gain the right expectation as to the capabilities of Industrial Internet applications and how to assess them
  • Understand what data and analytics components should be included in your architecture solution
  • Understand deployment trade-offs, management and security considerations, and the impact of emerging technologies

In Detail

The Industrial Internet or the IIoT has gained a lot of traction. Many leading companies are driving this revolution by connecting smart edge devices to cloud-based analysis platforms and solving their business challenges in new ways. To ensure a smooth integration of such machines and devices, sound architecture strategies based on accepted principles, best practices, and lessons learned must be applied.

This book begins by providing a bird's eye view of what the IIoT is and how the industrial revolution has evolved into embracing this technology. It then describes architectural approaches for success, gathering business requirements, and mapping requirements into functional solutions. In a later chapter, many other potential use cases are introduced including those in manufacturing and specific examples in predictive maintenance, asset tracking and handling, and environmental impact and abatement. The book concludes by exploring evolving technologies that will impact IIoT architecture in the future and discusses possible societal implications of the Industrial Internet and perceptions regarding these projects.

By the end of this book, you will be better equipped to embrace the benefits of the burgeoning IIoT.

Style and approach

This book takes a comprehensive approach to the Industrial Internet, thoroughly acquainting the reader with the concepts and philosophy of the IIoT. It provides a basis for defining an IIoT solution in a thoughtful manner and creating what will be viewed as a successful project.

Table of Contents

  1. Preface
    1. What this book covers
    2. What you need for this book
    3. Who this book is for
    4. Conventions
    5. Reader feedback
    6. Customer support
      1. Downloading the color images of this book
      2. Errata
      3. Piracy
      4. Questions
  2. The Industrial Internet Revolution
    1. How today's Industrial Internet came about
      1. Earlier generations of the Industrial Revolution
      2. Why is it time for the Industrial Internet?
      3. Challenges to IIoT
    2. The architect's roles and skills
    3. Architectural approaches for success
      1. Reference architectures for the Industrial Internet
      2. The multi-tier IIoT architecture
      3. A security framework for the Industrial Internet
      4. A connectivity framework for the Industrial Internet
      5. The industrial data analytics framework
      6. Cloud and user experience considerations
        1. Business strategy framework for the Industrial Internet
    4. Summary
  3. Architectural Approaches for Success
    1. Architectural framework
    2. Architectural viewpoints
      1. Business viewpoint
        1. Security considerations for the business viewpoint
      2. Usage viewpoint
        1. Security considerations for the usage viewpoint
      3. Functional viewpoint
        1. Control domain
        2. Operations domain
        3. Information domain
        4. Application domain
        5. Business domain
          1. Cross-cutting functions and system characteristics
          2. Computational deployment patterns
        6. Security considerations for the functional viewpoint
      4. Implementation viewpoint
        1. Security considerations for the implementation viewpoint
    3. Data and analytics
      1. Data management
      2. Analytics and advanced data processing
      3. Integrability, interoperability, and composability
      4. Connectivity
      5. Intelligent and resilient control
      6. Dynamic composition and automated interoperability
    4. Using PoCs to evaluate design
      1. Scope definition
        1. Business case considerations
      2. Solution definition
      3. Building the PoC
      4. Prototype scale
      5. Evaluate/modify
      6. Production scale
        1. Architecture
        2. Components
        3. Continuing engineering
    5. Summary
  4. Gathering Business Requirements
    1. Initial business discovery
      1. Getting ready for business discovery
      2. Gathering CSFs
      3. Gathering KPIs
      4. From data sources to KPI delivery
      5. Prioritizing the building of solutions
    2. Building the business case
      1. Components of backend infrastructure cost models
      2. Smart device and networking costs
      3. Estimating implementation costs
      4. Documenting future benefits
      5. Financial justification of our supply chain project
    3. Selling the project
    4. Summary
  5. Mapping Requirements to a Functional Viewpoint
    1. The control domain
      1. Basic edge device capabilities
      2. Smarter edge device configurations
      3. Selecting sensors and edge devices
      4. The supply chain optimization control domain
    2. The operations domain
    3. The information domain
      1. Solving information domain functional requirements
      2. A supply chain optimization information domain
    4. The application domain
      1. Assessing business analysts and user skills
      2. The supply chain optimization application domain
    5. The business domain
    6. DevOps and the agile movement
      1. Agile approaches
      2. Using microservices and containers to speed DevOps
    7. Summary
  6. Assessing Industrial Internet Applications
    1. Architecture patterns for the Industrial Internet
    2. Build versus buy decisions
    3. Asset Performance Management (APM)
    4. Assessing the analytics applications
      1. Descriptive analytics
      2. Diagnostic analytics
      3. Predictive analytics
      4. Prescriptive analytics
      5. Fit gap analysis
      6. Brilliant Manufacturing
      7. Field Service Management (FSM) application
    5. Summary
  7. Defining the Data and Analytics Architecture
    1. Data and analytics requirements and capabilities
      1. Data reduction and analytics
      2. Publish and subscribe
      3. Query
      4. Storage persistence and retrieval
      5. Integration
      6. Description and presence
      7. Data framework
      8. Rights management
      9. Creating business value
      10. Analytics functionality
      11. Mapping analytics architecture to reference architecture
      12. Advanced analytics
    2. The Lambda architecture and IIoT
    3. Analytics, machine learning, and analyst tools
      1. A process for advanced analytics creation
      2. Machine learning tools
      3. Other analyst tools
    4. Early Industrial Internet applications and historians
    5. The speed layer and field gateways
    6. The batch layer
      1. Data lakes and Hadoop
        1. Graph database
      2. Data warehouses, data marts, and relational databases
      3. Supply chain optimization in the batch layer
    7. Summary
  8. Defining a Deployment Architecture
    1. Current state of deployment architectures for IT systems
      1. Hosted systems and the cloud
        1. Hosted services
          1. Single-tenant hosting
          2. Multi-tenancy
        2. Cloud computing
          1. Public cloud
          2. Private cloud
          3. Hybrid cloud
          4. Billing
      2. Enterprise Resource Planning (ERP)
        1. Considerations for SaaS cloud versus on-premises
        2. Customer Relationship Management (CRM)
        3. Human Resource Management Systems
      3. Data warehousing and big data
        1. Data warehouse and decision support
          1. Management considerations for data warehouse
          2. Big data
          3. Hadoop file systems
          4. Data lakes
          5. Management considerations for data lakes
          6. Big data analytics and data science
      4. Converged infrastructure and engineered systems
        1. Deployment considerations
      5. IIoT constraints
        1. Incremental upgrades
        2. On-premises versus cloud
          1. Consumption models
        3. Analytics capacity considerations
        4. Analytics considerations
          1. Key constraints in analytics architecture design
      6. Design for the edge tier
      7. Networking considerations
        1. Connectivity transport layer
          1. Network layer consideration
          2. Topology 
        2. Edge connectivity
      8. Management and support infrastructure
    2. Summary
  9. Securing the Industrial Internet
    1. Examples of cybersecurity attacks
    2. IIoT security core building blocks
    3. NIST cybersecurity frameworks
    4. IIoT security guidelines
    5. Securing devices and the edge to the cloud gateway
      1. Device considerations
      2. Device to gateway connections
    6. Securing the backend
      1. Data lake security
      2. Securing other NoSQL databases
      3. Data warehouse security
    7. Risk assessments and best security practices
    8. Planning for security in the supply chain example
    9. Summary
  10. Governance and Assuring Compliance
    1. Assessing governance, risk, and compliance
      1. Data governance
      2. Assessing risk and trustworthiness
    2. International compliance certifications
    3. International consortia and emerging standards
    4. Government and public institution compliance
      1. Non-U.S. government standards and certifications
      2. U.S. government standards
    5. Industry compliance certifications
      1. Which guidelines apply
    6. GRC in the supply chain optimization example
    7. Summary
  11. Industrial Internet Use Cases in Various Industries
    1. Use cases versus case studies
    2. Use cases within industry vertical
      1. Use cases in agribusiness
        1. Use cases in alternative energy and environmental control
        2. Use cases in construction
        3. Use cases in logistics and transportation
        4. Use cases in manufacturing and CPGs
        5. Use cases in oil and gas
        6. Use cases in pharmaceuticals, medical equipment, and healthcare
        7. Use cases in utility companies
    3. Manufacturing IIoT architectures and examples
      1. A manufacturing test bed
        1. Factory operation visibility and intelligence
        2. Omnichannel initiatives
    4. Predictive maintenance
      1. Airline industry background
        1. Airline proactive and preventive maintenance
        2. Preventive maintenance as a business
    5. Asset tracking and handling
      1. Baggage and cargo handling
        1. Expanded baggage-handling services
        2. Tracking tools in manufacturing and construction
        3. Chemical industry automated tracking and replenishment
    6. Environmental impact and abatement
    7. Summary
  12. A Vision of the Future
    1. Maturing IIoT frameworks and applications
    2. Evolving edge devices
    3. The evolution of networking
    4. Cognitive and mixed reality HMIs and deep learning
    5. The impact on robotics and mobile devices
    6. Improved security through blockchain technology
    7. Quantum computing
    8. The Industrial Internet's impact on society
    9. Summary
  13. Sources
    1. Chapter 1
    2. Chapter 2
    3. Chapter 3
    4. Chapter 4
    5. Chapter 5
    6. Chapter 6
    7. Chapter 7
    8. Chapter 8
    9. Chapter 9
    10. Chapter 10
    11. Chapter 11 
18.217.228.35