Sie sind auf Seite 1von 16

NOVEMBER 2017

Inside:
 Connect the physical with
the digital p3
 Best practices for industrial
Cloud computing p6
 Core technologies make
edge-intelligence possible p10

Supplement to Periodicals Publication


No place to PROVEN

replace a battery.
40
YEAR
OPERATING

LIFE *

Highly remote locations call for Tadiran batteries.

Battery replacement is costly and often ANNUAL SELF-DISCHARGE


dangerous work. Reduce the risk with Tadiran
bobbin-type lithium thionyl chloride (LiSOCl2) TADIRAN COMPETITORS
batteries. With an annual self-discharge rate of
just 0.7% per year, Tadiran LiSOCl2 batteries
enable low power consuming wireless devices to
operate for up to 40 years on a single battery,
0.7%
up to 4 times longer than the competition.
Our batteries also feature the highest capacity,
highest energy density, and widest temperature
range of any lithium cell, plus a glass-to-
metal hermetic seal for added ruggedness and
reliability in extreme environments.
Up to 3%
Take no chances. Take Tadiran batteries Tadiran Batteries
2001 Marcus Ave.
that last a lifetime.
Suite 125E
Lake Success,
NY 11042
1-800-537-1368
516-621-4980
* Tadiran LiSOCL2 batteries feature the lowest annual self-discharge rate of any competitive battery, less than 1% per year, enabling these
batteries to operate over 40 years depending on device operating usage. However, this is not an expressed or implied warranty, as each
application differs in terms of annual energy consumption and/or operating environment. www.tadiranbat.com
PRODUCTIVITY & BEST PRACTICES: EDITOR’S COLUMN
Kevin Parker
Senior Contributing Editor

Workforce education becomes


an essential task
Five essential competencies for the digital era identified

A
t its recent user conference, the always thought- piece. “The readiness and capacity for change is limited,”
ful management of Emerson Automation Solutions said Train.
discussed work’s changing nature. Emerson is expanding its service offerings to help
The U.S. manufacturing sector experienced 4.0% pro- fill the gap. What industry needs, Emerson said, is an
ductivity growth from 1990 to 2000, and 4.7% from 2000 increased focus on education and upskilling along with
to 2007. Analyses of productivity growth statistics can be improved organizational workflows to effectively leverage
highly speculative. At the time, however, experts and media their technology investments. An analysis commissioned
credited computerization for these productivity gains. by Emerson of the organization behaviors of Top Quartile
Since then, productivity growth has stagnated at about industry performers indicated five essential competencies
1.5%. Yet computerization has continued apace. If digita- for the digital era.
lization was the cause of productivity growth in the 1990s Automated workflow allow focus on exceptions requir-
and in the first decade of the 21st century, what caused ing human intervention. Analytics and embedded exper-
the subsequent productivity growth slowdown? tise reduce complexity. Workforce upskilling empowers
Computers today are communication devices in support personnel to acquire knowledge and experience more
of the coordination of work, as much as they are any- quickly. Mobility provides access to information regardless
thing else. If the network is the computer, then advances of location. Change management accelerates institution-
depend on integration, and just 50 years into the com- alization of operational best practices.
puter revolution we’re faced with a multi-layered installed
base. In fact, integration seems to be the constraining Expectations expanding
challenge. Moving forward, while remaining cognizant of “Process control has been digitalized already,” said Pe-
legacy systems, has proved complex and daunting. ter Zornio, chief technology officer, Emerson Automation
Solutions. “Users expect real-time information, embed-
Essential competencies ded expertise, and a closed-loop system. We can now
Another kind of “installed base” is the industrial work do the same thing for other type operations, including
force involved. In the last 40 years, many kinds of work reliability, safety, and energy, for example. In the new era,
were transformed, and quantified, as computerization core production workers will be focused on collaboration,
supported work-process reengineering. interpretation, and analytics, rather than data collection
At the conference, Emerson tackled the topic during a and reporting.”
briefing on “essential competencies for an empowered Where are we at this moment? One last quotation
digital workforce.” taken from the user conference provides a hint:
“The past 30 years have brought fantastic advances “Wireless is arguably the most impactful technology for
in the manufacturing sector, including greater operating industrial manufacturers since the introduction of digital
efficiencies enabled by automation. But the incremental instrumentation more than three decades ago,” said Bob
gains are diminishing,” Mike Train, executive president, Karschnia, vice president and general manager, wireless,
Emerson Automation Solutions, said. Emerson Automation Solutions. “Industrial wireless com-
The silver lining will come with an emerging generation bined with smart sensors are the foundation to support
of technologies able to revitalize productivity gain, as in cloud-based applications, remote monitoring, and other
the former era. However, the work force is the essential IIoT programs over the next decade.” IIoT
www.controleng.com/IIoT IIoT For Engineers NOVEMBER 2017 | 1
IIoT IN THE NEWS

IIoT platforms released


and updated
Suppliers package IIoT capabilities as a solution

K epware released the


KEPServerEX version 6.3
industrial connectivity plat-
Time sync functionality for driv-
ers with EFM capabilities: Users
can now set a custom time sync
According to Schneider, the plat-
form is a “proven solution capability
for engineering, planning and opera-
form. Key enhancements include threshold for any driver with EFM tions, asset performance, and control
improved create, read, update, and capabilities and ensure no synchro- and information management.” With
delete (CRUD) functionality for the nization occurs unless a specific more than 2 million software licenses
configuration API, time sync func- deviation limit is exceeded. OnPoll, deployed at 100,000+ sites world-
tionality for drivers with electronic the new time sync method includ- wide, processing 10+ trillion daily
flow measurement (EFM) capabili- ed in version 6.3, also lets users transactions spanning 20+ billion
ties, a Keyence KV Ethernet driver, configure time synchronization to operating parameters, the platform
and remote project loading via the occur only after an EFM poll. This operates at a scale to support com-
ThingWorx IoT Platform. reduces network traffic and pro- plex and mission-critical industrial
“This release will give users more vides users more control over time operations.
control over their projects, even synchronization. The platform is hardware and sys-
when connecting remotely. With Remote project loading: Taking tems agnostic and can be deployed in
version 6.3 we’ve also added a advantage of the existing security a scaled, modular fashion.
new driver to our industry-leading of the ThingWorx native client The platform includes a wide range
portfolio.” said Jeff Bates, Kepware interface in KEPServerEX, users can of commercial options (Subscription,
product manager. now import a KEPServerEX project SaaS, Perpetual) and deployment
Along with the Keyence KV Ether- from a local file store and push the flexibility (on-premise, cloud-based)
net driver, KEPServerEX version 6.3 project down to any connected for all its available functionality. This
also includes: instance of KEPServerEX. lowers total cost of ownership with-
Enhanced CRUD functionality for Users can easily adjust network out compromising risk, data security,
the configuration API: Configuration settings and deploy KEPServerEX and performance requirements.
API users can now remotely trigger projects remotely—while manag- The domain-specific functionality
project saves for any instance of ing all of their machine instances of the industrial software platform
KEPServerEX, create an object with from a single ThingWorx platform enables business excellence: sup-
a child hierarchy in a single transac- interface. ports engineering, operations, asset
tion, and create multiple objects in management and people enable-
a single transaction. Configuration Industrial software ment. The information management,
API users can also now make bulk platform reintroduced business process knowledge and
changes to the configuration and Schneider Electric announced decision support capability available
trigger ATG, enabling faster changes EcoStruxure Industrial Software across the modules of the platform
on larger projects. KEPServerEX Platform, an integrated, modular are specific to industry problems.
version 6.3 enables users to interact software suite that delivers func- They allow companies to upgrade
less with the local configuration tionality to address operational and competencies, document operational
and easily write common code for business imperatives in industrial experience, and develop the next
objects in disparate projects. and infrastructure markets. generation workforce. IIoT

2 | NOVEMBER 2017 IIoT For Engineers www.controleng.com/IIoT


WORKPLACE TRANSFORMATION

Connect the physical


with the digital
Leaders say, don’t let culture impede technology progress

By Dr. Keshab Panda techniques support these efforts. IIoT IIoT are to enable augmented opera-
gives these companies an opportunity tions, human-robot collaboration, ad-

B
ridging the divide between to go beyond Six Sigma, fool-proofing vanced digital-product development,
the physical and the digital many activities and processes related data-driven control of operations, and
worlds, the Industrial Internet to operational efficiency. predictive maintenance.
of Things (IIoT) transforms how com- These trends see support in a survey Early adopter feedback shows that
panies function and how work gets from L&T Technology Services and the transition to an IIoT ecosystem
done, based on gains in sensor and ARC Advisory Group conducted at depends on employee initiative. The
microcontroller technology, connec- this year’s ARC Forum. Half the survey survey also highlights that 42% of
tivity, and analytics. These emerging respondents were with large corpora- business leaders feel that organiza-
technologies are also conceptualized tions having more than $10 billion tional culture acts as an impendent
as Industrie 4.0. in revenue. According to the survey to IIoT adoption. Capital expenditure
Businesses focus on operational results, 57% of business leaders and concerns are also prevalent.
excellence to streamline and tighten organizations embrace IIoT for opera- While about 40% of organizations
production processes. Six Sigma tions-related work. Key focus areas for said their companies are at the pilot

The positive impact of IIoT can be short-term operational efficiency, but it also can have a
long-term influence on resource optimization, product design, and automation. All graphics courtesy L&T Technology Services

www.controleng.com/IIoT IIoT For Engineers NOVEMBER 2017 | 3


WORKPLACE TRANSFORMATION

While conventional IIoT frameworks


are available, a scalable and long-
term approach integrates IT, OT, and
BT. While IT deals with increasingly
large databases, OT is about physical
devices and processes, and BT is about
business software applications.
Two typical characteristics of any
IIoT-based system include informa-
tion processing on a 24x7 basis and
real-time constraints imposed by the
environment.
A comprehensive IIoT architecture
might include sensors, for detecting
An IIoT-enabled framework streamlines and integrates a value chain, including with appli- events or changes; edge gateways that
cations in predictive maintenance, plant performance optimization, and asset tracking. aggregate and filter sensor data; IIoT
Cloud-enabled platforms, including
smart-signal aggregators and model-
ling algorithms; Big Data analytics,
including machine learning, artificial
intelligence, augmented reality, data
store, and security. The entire system is
meant to run as a managed service.
In addition, technology firms add
IIoT value by offering managed
engineering services as a key building
block of the IIoT system. Managed
services comprise round-the-clock
remote monitoring, predictive main-
tenance using data analytics, and
value engineering. Thus, a new kind
of build-operate-manage model will
An IIoT system includes sensors/chips, edge gateway, IoT platform, cloud services, and increasingly become the paradigm for
data analytics. Bringing together these disparate elements enables the system to be run technology providers.
as a managed service.
Case study examples
stage of evaluating IIoT, 31% said as materials, machines, and plant Business-process management
they’re already in discussions with control systems, interconnect with and enterprise-resources planning
partners and ready for gains on first- information systems and technology integrate systems and processes to a
mover advantage. Predictive analytics (IT). Also connected are users, along degree. The comprehensive structure
and Integrated IIoT are key those with the enterprise business processes enabled by IIoT takes further steps. An
adopting IIoT. and technology (BT). Once connectiv- IIoT-enabled framework can integrate
ity and system data flow between OT- processes starting from the product-
Given the need IT and BT is accomplished, data can be development stage through manufac-
Let’s take a step back to discuss aggregated and analytics applied. turing to supply chains. Possible capa-
what really makes up an IIoT architec- As insights are gained, smart decision- bilities include data-driven inventory,
ture. In IIoT systems, industrial assets making leads to intelligent industrial- remote asset testing and inspection,
and operations technology (OT) such operation and business models. data-driven quality control, remote

4 | NOVEMBER 2017 IIoT For Engineers www.controleng.com/IIoT


service, additive parts manufacturing, IIoT platforms will be a critical suc-
augmented operations, human-robot cess factor for goods makers and ser- Dr. Keshab Panda is CEO and
collaboration, and advanced digital- vices providers. Industries that leverage managing director, L&T Technology
product development. IIoT to integrate data, machines, and Services.
While IIoT is in the early stages people will see impacts on productivity,
of adoption, inspirational narra- efficiency, and operations. IIoT
tives abound. For instance, a global
construction company faced critical
business challenges managing field
assets and equipment. This was ad-
dressed using IIoT technologies that
in turn enabled development of a
remote asset performance manage-
ment framework. The framework
covers 30,000 assets across 500 asset
types. It delivered an estimated 12%
improvement in asset utilization. On-
time asset availability will likely lower
overall costs as well.
Services supporting the solution
implementation included sensor
identification, gateway selection,
sensor-gateway commissioning, and
on-boarding. Such an IIoT system gen-
erates six gigabytes of data per day,
deriving data intelligence from about
2,500 nodes.
In another instance, a consumer-
goods manufacturer addressed the
operational disruptions caused by
frequent compressor failures in its
manufacturing plants using IIoT tech-
nologies. The system used predictive
analytics to proactively estimate time
to failure, using anomaly indica-
tors including temperature, current,
vibration, and other parameters. The
model works at more than 70% inac-
curacy and is estimated to result in
annual savings of about $500,000.

The impact to come


According to a report by McKinsey
& Co. Inc, IIoT will have a potential
economic impact of up to $6.2 trillion
by 2025. McKinsey lists IIoT as one
of the key technologies capable of
economic transformation.
IIoT For Engineers NOVEMBER 2017 | 5
THE DIGITAL WORKPLACE

Best practices for industrial


Cloud computing delineated
Match organizational preferences with the relevant technology requirements

by Melissa Topp However, without the ability to data to a selected cloud service. For
connect devices from behind fire- instance, a manufacturer may have

I
ntegrating the Industrial walls and to publish data securely to updated assembly machines with
Internet of Things (IIoT) into IIoT-integrated applications, organi- units equipped for more advanced
traditional supervisory control zations may miss out on the promise networking. This works well for
and data acquisition (SCADA) and of advanced analytics via Cloud com- companies that can afford such ret-
human-machine interfaces scenarios puting. If your organization is consid- rofitting, but might not be the most
delivers multiple benefits. ering an IIoT integration strategy, the cost-effective means of ensuring IIoT
Increased scalability follows from answers to the following questions connectivity.
secure access to multiple locations highlight some best practices. Legacy industrial machinery can be
via cloud platforms, including the connected to an IIoT infrastructure.
popular Microsoft Azure. Hardware 1. Does your organization However, some add-on hardware
obsolescence can be alleviated, as the already have existing IoT/cloud- connection options often prove,
“heavy lifting” of processor-intensive ready hardware? comparatively speaking, cost-prohib-
analysis can be off-loaded. Connectiv- Some organizations planned for itive. That’s where the concept of IoT
ity is enhanced, as increasing num- IIoT’s emergence, to ensure machin- gateway devices comes in.
bers of devices communicate via IIoT ery electronics and discrete devices IIoT gateways are lightweight
transport protocols. in production facilities can transfer devices that act as a bridge be-
tween on-premise communications
networks and cloud services, at a
fraction of the cost of an equip-
ment retrofit. These edge devices
provide “southbound” data con-
nectivity to end devices, completely
on-premises. A device also provides
a “northbound” communication
path for connectivity between itself
and the cloud.
IIoT gateways incorporate strict se-
curity requirements. They serve as the
delivery mechanism between the data
generated and stored on-premise and
that shared with the outside world.
Intel, through its IoT Solutions Alliance
One benefit of Internet-based automation is that it allows program, supports original-design
centralization of disparate operations, and for expertise to be manufacturers with advanced security
more easily brought to bear at remote locations. All graphics courtesy: Iconics features such as unique hardware IDs,

6 | NOVEMBER 2017 IIoT For Engineers www.controleng.com/IIoT


secure booting, whitelisting, and dis-
abling of onboard peripherals, such as
USB and com ports. Edge management
is of equal concern when considering
IIoT gateways, as they require remote
management once online and are reg-
istered with a preferred cloud service.
Needed security configuration and
other features are incorporated in
IIoT gateway hardware integrated
with comprehensive IIoT software
solutions.

2. Do you already have a


preferred cloud-services vendor?
Decisions about preferred cloud-
services providers might already have
been made at your organization,
based on on-premise computer,
server, and operating system prefer-
ences, as well as those for network In important industries, communications among on-premise machinery and networks with
communication protocols and other cloud services involve numerous industry protocols, including OPC UA and Modbus.
factors. Many industrial users rely
on Microsoft Azure, while others called “cold storage,” abilities and a number of industry protocols,
use Amazon Web Services (AWS) or costs? including:
Google Cloud Platform. These are  Where are the data centers locat-  OPC Classic specifications are
not the only cloud service options, ed? Will there be anticipated latency based on Microsoft Windows tech-
although they are the biggest. Many due to distance? How will that effect nology, using COM/DCOM (Distrib-
others are available, depending on connected user experience? uted Component Object Model) for
location, each with its own strengths Equally important is how well a data exchange between software
and weaknesses. Cloud-services vendor works with components. The specifications
For organizations that have not existing or planned IIoT devices cover real-time data access (DA),
selected a provider, consider the fol- and software solutions. Selecting historical data access (HDA), alarms
lowing: solutions that embrace open stan- and events (A/E), XML data access
 What is the pricing structure? Is it dards can help. Ensuring immediate (XML-DA), and data exchange (DX),
easy to understand, with no possible interoperability is an important first complex data, security, and batch.
hidden fees? step in the best practices for indus-  OPC Unified Architecture (OPC
 What is the comparative comput- trial cloud computing. UA) is an open standard for ex-
ing power? How many processing changing information in a rich,
nodes are available at any given time? 3. Does your organization prefer object-oriented, and secure way. It
What type of database integration specific communication proto- provides a platform-independent
is offered—SQL or otherwise? What cols, both for internal use and means for mapping and exchanging
types of network integration are pub/sub-based? real-time information while remain-
included—load balancing, DNS, VPN, In important industries, south- ing compatible with the OPC Classic
or another type? bound communications between specification.
 What are the provided storage on-premise machinery and net-  Modbus is an open commu-
limits? What are the archiving, so- works with cloud services involve nication protocol widely used by
www.controleng.com/IIoT IIoT For Engineers NOVEMBER 2017 | 7
THE DIGITAL WORKPLACE

many manufacturers throughout many open-source examples coded connectivity. Additional value can
multiple industries. The protocol can in multiple popular programming be obtained via IIoT connectivity.
cover serial lines (Modbus RTU and languages. MQTT is recommended This includes connected applica-
Modbus ASCII) as well as Ethernet when network bandwidth is a con- tions that are provided through a
(Modbus TCP). cern and should always be used in Cloud-services provider, which take
 Simple Network Management tandem with a secure communica- customer data at the edge and use
Protocol (SNMP) allows devices to tion method such as TLS. it for mobile visualization or analysis.
expose useful information to other  Hyper Text Transfer Protocol Examples include energy manage-
connected devices. Almost all tradi- Secure (HTTPS) was designed to ment or fault detection and diagno-
tional IT devices can handle SNMP serve requests and responses in a sis, rapid data historian storage and
requests. computing model for Web-page retrieval.
 BACnet is the most widely used communication. It can more easily Some IIoT gateway software
open communications standard in traverse firewalls without the need solutions provide seamless integra-
the building automation industry. for specific IT policies that handle tion for these types of applications.
Some organizations might use server request messages and return Off-the-shelf SCADA and other type
a proprietary communications responses in the form of resources interfaces, analytics, and data histo-
method, either in unison with one such as HTML files, content, and rians can connect to a cloud-servic-
of the industry standard protocols or completion status details. es provider, subscribing to an “IIoT
exclusively.  Representational State Transfer Hub” from where these applications
Northbound communications (REST)/JSON provides a stateless can ingest the provided data. One
involve additional protocols, with means for IoT-friendly informa- possible use case is energy monitor-
the need for high security levels and tion access. It leverages the HTTP ing, where IIoT gateway software
often using a pub/sub mechanism. transport protocol to deliver data, running on typical IIoT gateway
These protocols include: typically using JSON, which is a flex- hardware can connect to popular
 Advanced Message Queuing ible, lightweight format like XML, energy, gas, or water meters for se-
Protocol (AMQP) provides flow- to define its presentation. cure, real-time infrastructure moni-
controlled, message-oriented com- When considering IIoT hard- toring and timely analytics. Another
munication with built-in options for ware devices and accompanying use case is innovative fault detec-
message-delivery guarantees. Au- software solutions, consider both tion and diagnostics, where the IIoT
thentication and encryption is based your organization’s southbound software suite can alert personnel
on popular Internet authentication and northbound communication of actions to prevent equipment
and data-security protocols such as requirements. failures or excessive energy use.
Simple Authentication and Security Cloud-based computing options,
Layer (SASL) and Transport Layer 4. What additional functional- like other emergent technologies,
Security (TLS). AMQP, optimized for ity is needed for the industrial will continue to evolve. A com-
messaging between devices, sup- cloud-based solution? bined IIoT-integrated hardware and
ports read-and-write functionality By this point, it may be known software solution delivers value in
for command and control or indus- what new equipment is needed the forms of equipment monitor-
trial-automation equipment. to connect electronic assets to the ing, predictive maintenance, and
 Message Queuing Telemetry cloud, who the preferred cloud- operational efficiency. Cognizance
Transport (MQTT) was created for services provider will be, and what of suggested best practices can lead
SCADA environments and related communication protocols are consid- to more informed decisions for any
networks, using pub/sub to minimize ered most important. organization’s cloud integration
payloads and overhead with appli- Cloud connectivity initially may plans. IIoT
cation-specific, custom JavaScript have been considered to secure the
Object Notation (JSON) or binary benefits of increased scalability with Melissa Topp is senior director of
formats. Widely accepted in IT ensured security, reduced hard- global marketing at ICONICS
departments worldwide, MQTT has ware obsolescence, and expanded (www.iconics.com)

8 | NOVEMBER 2017 IIoT For Engineers www.controleng.com/IIoT


Announcing the World’s Most
Advanced Communication Chips for
the Industrial Internet of Things...

netX 90: netX 4000:


Slave Applications Controller Class Applications

Built-in Security: Designed for the IIoT:


• Secure boot and cryptography • Industrial IoT ready
Encryption via SSL/TLS for OPC UA and MQTT to connect
HTTPS, OPC UA, MQTT, VPN devices to cloud and IT services
• IEC 62443 compatible • Future proof
Enables layered security for Flexibly adapts by software to
Defense-in-Depth design emerging standards such as TSN
• Built-in diagnostics • Scalable SoC platform Learn more from Hilscher:
Monitor operating conditions Standalone or companion call 1.630.505.5301
for predictive analysis chip applications email: info@hilscher.us or
• Multiple processors • Multiprotocol capability visit www.hilscher.com,
Logical separation of Pre-certified firmware for all popular www.netIOT.com
communication and Industrial Ethernets and Fieldbuses
application tasks • Embedded application
• Partitioned design Feature-rich set of standard and
Restricts software access industry-related peripherals
to on-chip peripherals on • Best-in-class real-time
either side Supports deterministic,
• Ten-year availability real-time networking

©2017 Hilscher North America, Inc. All trademarks are the properties of their respective companies.
THE IIoT LEXICON

Core technologies make


edge-intelligence possible
Development environments combine device management,
connectivity, Cloud, and analytics

By Kurt Au  Quickly develop robust applica- network resources. Often it is more


tions. efficient to process data near its

A
s the Industrial Internet of  Deploy, update, upgrade, and source and send only the valuable
Things (IIoT) evolves it’s im- maintain large numbers of fraction to a Cloud center.
pacted by the same integra- devices and services. Edge computing is a distributed
tion challenges as previous automa-  Transform Big Data into valuable information technology (IT) architec-
tion generations. Besides changing business information. ture in which client data is processed
requirements, many different hard- at the periphery of the network, as
ware and software technologies and Thus, an IIoT product or solution close to the originating source as
applications apply. However, today, must meet challenges related to possible. Time-sensitive data in edge
with open standards, these diverse sensors, connectivity, security, Cloud computing may be processed at the
elements can be melded together to point of origin by an intelligent


deliver solutions. device or sent to an intermediary
In IIoT product and application server located in close geographical
Emerging architectures
development, developers’ goals may proximity. Data that is less time-
include: help companies develop sensitive can be sent to the Cloud for
historical analysis, Big Data analytics,
 Support heterogeneous sensors
complex IIoT infrastruc- and long-term storage.
and actuators via the Internet. tures in an integrated Companies must have the means
 Integrate heterogeneous wired to manage the edge-computing


and wireless connectivity proto- ecosystem paradigm, whether the solution
cols, including Modbus, LoRa, be referred to as an infrastructure,
Sigfox, Wi-Fi, Bluetooth, and architecture, platform, or server. What
others. services, storage, device hardware, Advantech calls its edge intelligence
 Port original software to differ- device maintenance, edge/Cloud server (EIS) solution enables local IIoT
ent hardware, including MCU, analytics, system integration, appli- networks to allow edge intelligence
x86/ARM CPU, GPU, and others, cation development, and so on. The to maximize energy efficiency, reduce
and operating systems that first challenge many companies face privacy threats, promote ease of
include Microsoft Windows, is migrating to an IoT application implementation and modularization,
Linux Distributions, mbed OS, while balancing design time, time- and minimize latencies.
Android, and others. to-market, and risk. IIoT software platform services are
 Connect cloud services that might based on three key components: the
include WISE-PaaS, Microsoft Anatomy of a network IIoT node, edge-Intelligence server,
Azure, IBM Bluemix, and others. IoT data can be large in volume. and Cloud services. The following
 Maintain data ownership and Applications typically have real-time describes some technology choices
integrity and understand its impli- requirements. Transmitting massive any supplier or using enterprise must
cations for security and privacy. amounts of raw data puts a load on make in developing its platform.

10 | NOVEMBER 2017 IIoT For Engineers www.controleng.com/IIoT


An IIoT software platform includes IIoT nodes, edge-intelligence server, and cloud services. Graphic images courtesy: Advantech

For edge-device development, real time, as data is generated. A The last component is Cloud
“southbound” sensing-device con- predictive maintenance and quality services, with SSL/TLS communica-
nectivity must handle diverse sensing capability serves as a proof-of-con- tions and Intel Security both on
protocols, such as Modbus, OPC, cept for edge field prediction. the edge device and for Cloud. The
BACnet, and Wireless IP/NonIP. These Using companies extend this data service can provide the Post-
protocols can be handled by plug-in framework to develop analytic or greSQL DB and Mongo NoSQL DB
modules that process sensor data, data predictive-maintenance modules via as standard offerings, and supports
normalization, and communications. the architecture’s open standard, a standard integration interface
The solution then handles the based on the ubiquitous MQTT with a wide range of data pro-
“northbound” Cloud connectivity communications protocol and the cessing and storage products. The
and intelligence facilities using the modularizing Docker container dashboard website serves as the
microservice container paradigm to technology. IoT application user interface, and
modularize the different Cloud con- Other technologies, like RESTful displays information via browser or
nections and enable device manage- API, MQTT, and Node-RED, facilitate mobile device through visualization
ment. Similarly, intelligence facilities drag-and-drop application develop- facilities such as Azure Power BI or
also adopt the microservice container ment. Node-RED and the configura- Tableau.
architecture to support the data tion utility make it easy to imple- At end of day, a platform pro-
ingestion workload, such as data pre- ment custom applications. Moreover, vides a marketplace for sourcing
processing and cleaning. well-documented SDK-with-MQTT diverse IoT software utilities, provid-
Perhaps most valuable of all is the sample code and the RESTful API ing pure Cloud solutions such as
on-demand, real-time analytics service interface allow advanced developers database, dashboard, and machine-
that extracts pre-set data features, in to fulfill high-level requirements. learning tools.

www.controleng.com/IIoT IIoT For Engineers NOVEMBER 2017 | 11


THE IIoT LEXICON

Further explication a RESTful API that the client and  Component interactions can be
Now let’s look a little more server are coupled loosely and the dominant factor in user-per-
closely at some of the technologies remain independent of each other, ceived performance and network
previously mentioned. allowing either client or server efficiency.
MQTT is a simple, lightweight to be coded in any language and  Scalability to support large num-
publish/subscribe messaging pro- improved upon at will, which leads bers of components and interac-
tocol used for constrained devices to system longevity and ease of tions among components.
and low-bandwidth, high-latency, evolution.  The simplicity of a uniform
or unreliable networks. The service The RESTful API specifies what interface.
publishes its capability and data to it can provide and how it can be  Modifiability of components
an MQTT broker and subscribes to used, and requires that details such to meet changing needs, even
specific topics for input interfaces. as query parameters, response while the application is running.
A RESTful API defines a set of format, request limitations, public  Visibility of communication
functions that developers use use/API keys, methods (GET/POST/ between components by service
to perform requests and receive PUT/DELETE), language support, agent.
responses via HTTP protocols, such callback usage, HTTPS support, and  Portability of components by mov-
as GET and POST. Because REST- resource representations should all ing program code with the data.
ful APIs use HTTP as a transport, be self-descriptive.  Resistance to failure at the
they can be used by practically any The properties impacted by the system level despite failures of
programming language and are constraints of the RESTful architec- components, connectors, or
easy to test. It’s a requirement of tural style include: data.

Edge computing is a distributed IT architecture in which client data is processed at the network periphery, as close to the originating
source as possible.

12 | NOVEMBER 2017 IIoT For Engineers www.controleng.com/IIoT


A microservice architecture pat- together using the wide range of translates sensor protocols to the
tern allows a designer to split the nodes in the palette. Flows can MQTT protocol, then passes data to
application into sets of smaller, inter- then be deployed to runtime with the MQTT communication bus.
connected services instead of having a single click. The flows created in
a single monolithic application. A Node-RED are stored using JSON, 2. The SDK layer provides soft-
service typically implements distinct and can be imported and exported ware services such as EIS RESTful
features or functionalities, such as for sharing with others. It can be API, HDD Fault Prediction Algorithm
connectivity management, vertical run at the edge of the network Service, and so on. Developers call
application, or other. Each microser- or in the cloud. The node pack- these services through RESTful API or
vice is a mini-application with its age manager ecosystem is used to MQTT. Users add their own services,
own architecture, including business extend the palette of nodes avail- such as Machine Learning Platform,
logic along with various adapters. able, enabling connections to new Data Base engine, and so on.
Containerization is an OS-level devices and services.
virtualization method for deploying Freeboard provides simple, real- 3. A flow-based layer has Node-
and running distributed applications time visualization of key perfor- RED as the data-flow design engine,
without launching an entire virtual mance indicators. This tool opens plus add-ons such as SUSI API,
machine (VM) for each application. up many possibilities for IoT proj- WSN, and HDD prediction nodes.
Instead, multiple isolated subsys- ects because it’s simple, affordable, Users design logic paths via simple
tems, called containers, run on one open source, and ready for exten- drag-and-drop operations in a
control host and access a single sion. Customers can get started graphical environment.
kernel. Containers share the same for free and then when it is time
OS kernel as the host and are usu- to ramp up, they can select a plan 4.The management and presen-
ally more efficient than VMs, either that’s right for them. tation UI interface layer. A Webmin
of which requires a separate OS for system administration and IoT
instance. Architecture alignment connection configuration uses the
A Docker container wraps up a An architecture of the type under Node-RED-UI for presenting IoT/sen-
piece of software in an independent discussion can be classified into five sor data.
subsystem, complete with file sys- category layers. Each is implemented
tem and everything it needs to run: as its own microservice, using an 5.The Cloud layer may be pre-
code, runtime, system tools, system MQTT broker as the communication installed, as for example, with the
libraries, and anything that may be bus. All microservices interface with WISE-Agent connected to WISE-
installed on a server. This guaran- other microservices or clients. At PaaS/RMM Cloud Server.
tees that it always runs the same, runtime, each instance is a Docker
regardless of environment. container. This makes it easy to de- Concluding observations
Containers hold the components ploy distinct experiences for specific A flexible and scalable hardware/
necessary to run the desired ap- users, devices, or special-use cases. software architecture helps compa-
plication, such as files, environment Containerization is an OS-level nies develop complex IoT infrastruc-
variables, and libraries. The host OS virtualization method for deploying ture in an integrated ecosystem that
also constrains the container’s ac- and running distributed applications. serves different vertical markets.
cess to physical resources—such as Such an architecture can be cus-
CPU and memory—so one container 1. The bottom layer of the tomized, combining several software
cannot consume all of a host’s architecture is the sensor network services; it is then installed on differ-
physical resources. connectivity layer. Wired sensors ent hardware depending on require-
Node-RED is available as open support various types, including ments. IIoT
source, and is implemented by the supervisory control and data acquisi-
IBM Emerging Technology organiza- tion (SCADA), Modbus, and OPC-
tion. It includes a browser-based UA. The network connectivity layer Kurt Au is a product manager in the
flow editor that easily wires flows collects data, manages sensor hubs, Advantech Embedded IoT Group.
www.controleng.com/IIoT IIoT For Engineers NOVEMBER 2017 | 13
PLC WITH
BUILT-IN RIT
Y B UI LT-IN

VPN & FIREWALL C U


SE

PFC Series Performance Class Controllers


• VPN technology with IPsec and OpenVPN security protocols
• IIoT-ready application security with SSL/TLS encryption
• Firewall with whitelisting for increased network security

www.wago.us/PLC-VPN

Das könnte Ihnen auch gefallen