售 价:¥
温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印
为你推荐
Title Page
Copyright
Architecting the Industrial Internet
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Why subscribe?
Customer Feedback
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Downloading the color images of this book
Errata
Piracy
Questions
The Industrial Internet Revolution
How today's Industrial Internet came about
Earlier generations of the Industrial Revolution
Why is it time for the Industrial Internet?
Challenges to IIoT
The architect's roles and skills
Architectural approaches for success
Reference architectures for the Industrial Internet
The multi-tier IIoT architecture
A security framework for the Industrial Internet
A connectivity framework for the Industrial Internet
The industrial data analytics framework
Cloud and user experience considerations
Business strategy framework for the Industrial Internet
Summary
Architectural Approaches for Success
Architectural framework
Architectural viewpoints
Business viewpoint
Security considerations for the business viewpoint
Usage viewpoint
Security considerations for the usage viewpoint
Functional viewpoint
Control domain
Operations domain
Information domain
Application domain
Business domain
Cross-cutting functions and system characteristics
Computational deployment patterns
Security considerations for the functional viewpoint
Implementation viewpoint
Security considerations for the implementation viewpoint
Data and analytics
Data management
Analytics and advanced data processing
Integrability, interoperability, and composability
Connectivity
Intelligent and resilient control
Dynamic composition and automated interoperability
Using PoCs to evaluate design
Scope definition
Business case considerations
Solution definition
Building the PoC
Prototype scale
Evaluate/modify
Production scale
Architecture
Components
Continuing engineering
Summary
Gathering Business Requirements
Initial business discovery
Getting ready for business discovery
Gathering CSFs
Gathering KPIs
From data sources to KPI delivery
Prioritizing the building of solutions
Building the business case
Components of backend infrastructure cost models
Smart device and networking costs
Estimating implementation costs
Documenting future benefits
Financial justification of our supply chain project
Selling the project
Summary
Mapping Requirements to a Functional Viewpoint
The control domain
Basic edge device capabilities
Smarter edge device configurations
Selecting sensors and edge devices
The supply chain optimization control domain
The operations domain
The information domain
Solving information domain functional requirements
A supply chain optimization information domain
The application domain
Assessing business analysts and user skills
The supply chain optimization application domain
The business domain
DevOps and the agile movement
Agile approaches
Using microservices and containers to speed DevOps
Summary
Assessing Industrial Internet Applications
Architecture patterns for the Industrial Internet
Build versus buy decisions
Asset Performance Management (APM)
Assessing the analytics applications
Descriptive analytics
Diagnostic analytics
Predictive analytics
Prescriptive analytics
Fit gap analysis
Brilliant Manufacturing
Field Service Management (FSM) application
Summary
Defining the Data and Analytics Architecture
Data and analytics requirements and capabilities
Data reduction and analytics
Publish and subscribe
Query
Storage persistence and retrieval
Integration
Description and presence
Data framework
Rights management
Creating business value
Analytics functionality
Mapping analytics architecture to reference architecture
Advanced analytics
The Lambda architecture and IIoT
Analytics, machine learning, and analyst tools
A process for advanced analytics creation
Machine learning tools
Other analyst tools
Early Industrial Internet applications and historians
The speed layer and field gateways
The batch layer
Data lakes and Hadoop
Graph database
Data warehouses, data marts, and relational databases
Supply chain optimization in the batch layer
Summary
Defining a Deployment Architecture
Current state of deployment architectures for IT systems
Hosted systems and the cloud
Hosted services
Single-tenant hosting
Multi-tenancy
Cloud computing
Public cloud
Private cloud
Hybrid cloud
Billing
Enterprise Resource Planning (ERP)
Considerations for SaaS cloud versus on-premises
Customer Relationship Management (CRM)
Human Resource Management Systems
Data warehousing and big data
Data warehouse and decision support
Management considerations for data warehouse
Big data
Hadoop file systems
Data lakes
Management considerations for data lakes
Big data analytics and data science
Converged infrastructure and engineered systems
Deployment considerations
IIoT constraints
Incremental upgrades
On-premises versus cloud
Consumption models
Analytics capacity considerations
Analytics considerations
Key constraints in analytics architecture design
Design for the edge tier
Networking considerations
Connectivity transport layer
Network layer consideration
Topology
Edge connectivity
Management and support infrastructure
Summary
Securing the Industrial Internet
Examples of cybersecurity attacks
IIoT security core building blocks
NIST cybersecurity frameworks
IIoT security guidelines
Securing devices and the edge to the cloud gateway
Device considerations
Device to gateway connections
Securing the backend
Data lake security
Securing other NoSQL databases
Data warehouse security
Risk assessments and best security practices
Planning for security in the supply chain example
Summary
Governance and Assuring Compliance
Assessing governance, risk, and compliance
Data governance
Assessing risk and trustworthiness
International compliance certifications
International consortia and emerging standards
Government and public institution compliance
Non-U.S. government standards and certifications
U.S. government standards
Industry compliance certifications
Which guidelines apply
GRC in the supply chain optimization example
Summary
Industrial Internet Use Cases in Various Industries
Use cases versus case studies
Use cases within industry vertical
Use cases in agribusiness
Use cases in alternative energy and environmental control
Use cases in construction
Use cases in logistics and transportation
Use cases in manufacturing and CPGs
Use cases in oil and gas
Use cases in pharmaceuticals, medical equipment, and healthcare
Use cases in utility companies
Manufacturing IIoT architectures and examples
A manufacturing test bed
Factory operation visibility and intelligence
Omnichannel initiatives
Predictive maintenance
Airline industry background
Airline proactive and preventive maintenance
Preventive maintenance as a business
Asset tracking and handling
Baggage and cargo handling
Expanded baggage-handling services
Tracking tools in manufacturing and construction
Chemical industry automated tracking and replenishment
Environmental impact and abatement
Summary
A Vision of the Future
Maturing IIoT frameworks and applications
Evolving edge devices
The evolution of networking
Cognitive and mixed reality HMIs and deep learning
The impact on robotics and mobile devices
Improved security through blockchain technology
Quantum computing
The Industrial Internet's impact on society
Summary
Sources
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
买过这本书的人还买过
读了这本书的人还在读
同类图书排行榜