Book Image

Architecting the Industrial Internet

By : Robert Stackowiak, Shyam Varan Nath, Carla Romano
Book Image

Architecting the Industrial Internet

By: Robert Stackowiak, Shyam Varan Nath, Carla Romano

Overview of this book

The Industrial Internet or the IIoT has gained a lot of traction. Many leading companies are driving this revolution by connecting smart edge devices to cloud-based analysis platforms and solving their business challenges in new ways. To ensure a smooth integration of such machines and devices, sound architecture strategies based on accepted principles, best practices, and lessons learned must be applied. This book begins by providing a bird's eye view of what the IIoT is and how the industrial revolution has evolved into embracing this technology. It then describes architectural approaches for success, gathering business requirements, and mapping requirements into functional solutions. In a later chapter, many other potential use cases are introduced including those in manufacturing and specific examples in predictive maintenance, asset tracking and handling, and environmental impact and abatement. The book concludes by exploring evolving technologies that will impact IIoT architecture in the future and discusses possible societal implications of the Industrial Internet and perceptions regarding these projects. By the end of this book, you will be better equipped to embrace the benefits of the burgeoning IIoT.
Table of Contents (19 chapters)
Title Page
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Customer Feedback
Preface

Preface

It seems that every day, one can pick up a technology journal or view an online technology article about the Industrial Internet of Things (IIoT). The articles usually provide insights into specific solutions to business problems or how a specific technology component is evolving to provide a function necessary in deploying an Industrial Internet solution.

If you are undertaking one of your first IIoT projects, this book will provide you with the background needed. The authors have attempted to provide both timely and timeless guidance. The IIoT ecosystem is rapidly evolving, and we'll describe some of those changes in various locations in this book. Yet, we also see that justifications for these projects and use cases are falling into repeatable patterns. The overall architecture is generally well-understood and is also largely repeated, even while individual technology components are growing more capable and sophisticated.

The Industrial Internet Consortium (IIC) provides useful documentation in defining key aspects of the IIoT architecture that the architect must consider. We'll reference the IIC documentation frequently in this book. However, we also felt a desire to provide guidance as to how the architecture is applied in projects as these solutions are defined.

An area of intense interest, as this book was published, is securing the IIoT and the governance of Industrial Internet solutions. In a portion of the book that covers these topics, we’ll provide what we believe is practical guidance and point to the many worldwide, regional, and industry standards that can impact your designs.

Solutions, component capabilities, and certifications around standards are very fluid and will probably have changed between the time we wrote this book and the time you read this. In areas where rapid change is occurring, the content should provide you with a launching point for you to do your own further discovery. We have a lengthy list of sources in an appendix in this book.

The authors of this book work at some of the leading providers of IIoT frameworks and solutions; we have called upon that experience in writing this book, but have sought to do so in a manner that should be largely vendor agnostic.

Our goal is to help you fully realize the complexity and promises of these projects, but also help you gain the experience needed to architect successful solutions. You are probably at an early stage in your journey that will consist of many stages. We hope that you will find the book a useful place to start or add knowledge where you currently have gaps.

What this book covers

Chapter 1, The Industrial Internet Revolution, describes how we reached today's IIoT solutions and the role of the architect.

Chapter 2, Architectural Approaches for Success, talks about architecture viewpoints, the implementation viewpoint, data and analytics, and using proof of concepts to evaluate design.

Chapter 3, Gathering Business Requirements, covers topics such as preparing for business discovery, gathering critical success factors, business benefits and key performance indicators, gaining an understanding of skills, evaluating data sources, value from early mockups and proof of concepts, prioritizing stages, building the business case, and selling the project.

Chapter 4, Mapping Requirements to a Functional Viewpoint, describes the control, operations, information, application, and business domains, and DevOps and the agile development movement.

Chapter 5, Assessing Industrial Internet Applications, covers architecture patterns, build versus buy considerations, asset performance management, analytics, the Brilliant Factory, and a field services application.

Chapter 6, Defining the Data and Analytics Architecture, describes typical requirements and capabilities, the Lambda architecture, analytics, machine learning and analyst tools, early Industrial Internet applications and historians, and the speed and batch layers in the architecture.

Chapter 7, Defining a Deployment Architecture, covers past and current architecture, on-premises and cloud deployment, designing for the edge, networking considerations, device management, management and support infrastructure, and consumption models.

Chapter 8, Securing the Industrial Internet, describes examples of cybersecurity attacks, core building blocks, NIST cybersecurity frameworks, security guidelines, securing devices and communications to the cloud and backend, risk assessment, and best practices.

Chapter 9, Governance and Assuring Compliance, covers assessing governance, risk and compliance, international compliance, consortia and emerging standards, government and public institutions, industry compliance, and determining the guidelines that apply.

Chapter 10, Industrial Internet Use Cases in Various Industries, describes summarized use cases in various industries and then provides more in-depth looks at manufacturing, predictive maintenance, asset tracking and handling, and environmental impact and abatement.

Chapter 11, A Vision of the Future, covers the possible impacts of maturing frameworks and applications, evolution in edge devices, networking, human machine interfaces and industrial robotics, and the applicability of blockchain and quantum computing in the future.

Appendix, Sources, provides a list of sources the authors used throughout this book that might prove useful in your own research.

In several chapters of this book, we apply what is learned to a supply chain optimization example that can be relevant in many industries.

What you need for this book

The book assumes that the reader possesses a basic IT and technology architecture background. There are no coding examples as that is beyond the scope of this book.

Who this book is for

This book is intended to be used by architects as they gather requirements, justify projects, and consider the components that they will include in the architecture of their Industrial Internet projects. Others in roles involved in defining these projects should also find this book to be of value.

Conventions

In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning.

New terms and important words are shown in bold. 

Note

Warnings or important notes appear like this.

Note

Tips and tricks appear like this.

Reader feedback

Feedback from our readers is always welcome. Let us know what you think about this book-what you liked or disliked. Reader feedback is important for us as it helps us develop titles that you will really get the most out of.

To send us general feedback, simply e-mail [email protected], and mention the book's title in the subject of your message.

If there is a topic that you have expertise in and you are interested in either writing or contributing to a book, see our author guide at www.packtpub.com/authors.

Customer support

Now that you are the proud owner of a Packt book, we have a number of things to help you to get the most from your purchase.

Downloading the color images of this book

We also provide you with a PDF file that has color images of the screenshots/diagrams used in this book. The color images will help you better understand the changes in the output. You can download this file from https://www.packtpub.com/sites/default/files/downloads/ArchitectingtheIndustrialInternet_ColorImages.pdf.

Errata

Although we have taken every care to ensure the accuracy of our content, mistakes do happen. If you find a mistake in one of our books-maybe a mistake in the text or the code-we would be grateful if you could report this to us. By doing so, you can save other readers from frustration and help us improve subsequent versions of this book. If you find any errata, please report them by visiting http://www.packtpub.com/submit-errata, selecting your book, clicking on the Errata Submission Form link, and entering the details of your errata. Once your errata are verified, your submission will be accepted and the errata will be uploaded to our website or added to any list of existing errata under the Errata section of that title.

To view the previously submitted errata, go to https://www.packtpub.com/books/content/support and enter the name of the book in the search field. The required information will appear under the Errata section.

Piracy

Piracy of copyrighted material on the Internet is an ongoing problem across all media. At Packt, we take the protection of our copyright and licenses very seriously. If you come across any illegal copies of our works in any form on the Internet, please provide us with the location address or website name immediately so that we can pursue a remedy.

Please contact us at [email protected] with a link to the suspected pirated material.

We appreciate your help in protecting our authors and our ability to bring you valuable content.

Questions

If you have a problem with any aspect of this book, you can contact us at [email protected], and we will do our best to address the problem.