Book Image

Architecting the Industrial Internet

By : Robert Stackowiak, Shyam Varan Nath, Carla Romano
Book Image

Architecting the Industrial Internet

By: Robert Stackowiak, Shyam Varan Nath, Carla Romano

Overview of this book

The Industrial Internet or the IIoT has gained a lot of traction. Many leading companies are driving this revolution by connecting smart edge devices to cloud-based analysis platforms and solving their business challenges in new ways. To ensure a smooth integration of such machines and devices, sound architecture strategies based on accepted principles, best practices, and lessons learned must be applied. This book begins by providing a bird's eye view of what the IIoT is and how the industrial revolution has evolved into embracing this technology. It then describes architectural approaches for success, gathering business requirements, and mapping requirements into functional solutions. In a later chapter, many other potential use cases are introduced including those in manufacturing and specific examples in predictive maintenance, asset tracking and handling, and environmental impact and abatement. The book concludes by exploring evolving technologies that will impact IIoT architecture in the future and discusses possible societal implications of the Industrial Internet and perceptions regarding these projects. By the end of this book, you will be better equipped to embrace the benefits of the burgeoning IIoT.
Table of Contents (19 chapters)
Title Page
About the Authors
About the Reviewers
Customer Feedback

International compliance certifications

ISA standards often eventually become part of the IEC standards and extend interpretations of existing IEC standards. For example, the previously mentioned ISA 99.0.1 standards became IEC 62443 for industrial network and system security. This standard's pedigree includes earlier defined ISO / IEC 27000 series standards.

IEC 62443 addresses securing external network communications paths into device networks, including the control network interconnect, interactive remote access to the control network, inter-control center access to the shared control net, standalone embedded devices, portable engineering computers and devices, and portable storage medium. It also addresses securing internal network communications paths within device networks for inter-area communications, control center networks within a single control area, and field control networks within a single control area. Finally, it addresses securing devices within their networks, including...