Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Architecting the Industrial Internet
  • Table Of Contents Toc
Architecting the Industrial Internet

Architecting the Industrial Internet

By : Carla Romano, Robert Stackowiak, Shyam Varan Nath
5 (3)
close
close
Architecting the Industrial Internet

Architecting the Industrial Internet

5 (3)
By: Carla Romano, Robert Stackowiak, Shyam Varan Nath

Overview of this book

The Industrial Internet or the IIoT has gained a lot of traction. Many leading companies are driving this revolution by connecting smart edge devices to cloud-based analysis platforms and solving their business challenges in new ways. To ensure a smooth integration of such machines and devices, sound architecture strategies based on accepted principles, best practices, and lessons learned must be applied. This book begins by providing a bird's eye view of what the IIoT is and how the industrial revolution has evolved into embracing this technology. It then describes architectural approaches for success, gathering business requirements, and mapping requirements into functional solutions. In a later chapter, many other potential use cases are introduced including those in manufacturing and specific examples in predictive maintenance, asset tracking and handling, and environmental impact and abatement. The book concludes by exploring evolving technologies that will impact IIoT architecture in the future and discusses possible societal implications of the Industrial Internet and perceptions regarding these projects. By the end of this book, you will be better equipped to embrace the benefits of the burgeoning IIoT.
Table of Contents (13 chapters)
close
close

Improved security through blockchain technology

Blockchain technology provides a means of building a secure, shared, and distributed database that can't be modified, often referred to as a distributed ledger, ensuring that data remains in its original, unaltered state. Data is replicated across many nodes. New transactions are digitally signed for security, with private keys used to create signatures and public keys used to verify the signatures. When participating nodes agree the data is valid, it is written to the database. The unique digital signatures ensure no individual blockchain node can modify the transaction message.

Transactions contain information about the sender, receiver, time of creation, data to be transferred, and reference transactions. Transactions are grouped together in blocks and a chain is created that maintains a history of ownership of digital assets...

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Architecting the Industrial Internet
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon