Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Architecting the Industrial Internet

You're reading from   Architecting the Industrial Internet The architect's guide to designing Industrial Internet solutions

Arrow left icon
Product type Paperback
Published in Sep 2017
Publisher Packt
ISBN-13 9781787282759
Length 360 pages
Edition 1st Edition
Arrow right icon
Authors (3):
Arrow left icon
Robert Stackowiak Robert Stackowiak
Author Profile Icon Robert Stackowiak
Robert Stackowiak
Shyam Varan Nath Shyam Varan Nath
Author Profile Icon Shyam Varan Nath
Shyam Varan Nath
Carla Romano Carla Romano
Author Profile Icon Carla Romano
Carla Romano
Arrow right icon
View More author details
Toc

Table of Contents (13) Chapters Close

Preface 1. The Industrial Internet Revolution FREE CHAPTER 2. Architectural Approaches for Success 3. Gathering Business Requirements 4. Mapping Requirements to a Functional Viewpoint 5. Assessing Industrial Internet Applications 6. Defining the Data and Analytics Architecture 7. Defining a Deployment Architecture 8. Securing the Industrial Internet 9. Governance and Assuring Compliance 10. Industrial Internet Use Cases in Various Industries 11. A Vision of the Future 12. Sources

What this book covers

Chapter 1, The Industrial Internet Revolution, describes how we reached today's IIoT solutions and the role of the architect.

Chapter 2, Architectural Approaches for Success, talks about architecture viewpoints, the implementation viewpoint, data and analytics, and using proof of concepts to evaluate design.

Chapter 3, Gathering Business Requirements, covers topics such as preparing for business discovery, gathering critical success factors, business benefits and key performance indicators, gaining an understanding of skills, evaluating data sources, value from early mockups and proof of concepts, prioritizing stages, building the business case, and selling the project.

Chapter 4, Mapping Requirements to a Functional Viewpoint, describes the control, operations, information, application, and business domains, and DevOps and the agile development movement.

Chapter 5, Assessing Industrial Internet Applications, covers architecture patterns, build versus buy considerations, asset performance management, analytics, the Brilliant Factory, and a field services application.

Chapter 6, Defining the Data and Analytics Architecture, describes typical requirements and capabilities, the Lambda architecture, analytics, machine learning and analyst tools, early Industrial Internet applications and historians, and the speed and batch layers in the architecture.

Chapter 7, Defining a Deployment Architecture, covers past and current architecture, on-premises and cloud deployment, designing for the edge, networking considerations, device management, management and support infrastructure, and consumption models.

Chapter 8, Securing the Industrial Internet, describes examples of cybersecurity attacks, core building blocks, NIST cybersecurity frameworks, security guidelines, securing devices and communications to the cloud and backend, risk assessment, and best practices.

Chapter 9, Governance and Assuring Compliance, covers assessing governance, risk and compliance, international compliance, consortia and emerging standards, government and public institutions, industry compliance, and determining the guidelines that apply.

Chapter 10, Industrial Internet Use Cases in Various Industries, describes summarized use cases in various industries and then provides more in-depth looks at manufacturing, predictive maintenance, asset tracking and handling, and environmental impact and abatement.

Chapter 11, A Vision of the Future, covers the possible impacts of maturing frameworks and applications, evolution in edge devices, networking, human machine interfaces and industrial robotics, and the applicability of blockchain and quantum computing in the future.

Appendix, Sources, provides a list of sources the authors used throughout this book that might prove useful in your own research.

In several chapters of this book, we apply what is learned to a supply chain optimization example that can be relevant in many industries.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image