Limit search to available items
Book Cover
E-book
Author Traukina, Alena

Title Industrial internet application development : simplify IIoT development using the elasticity of public cloud and native cloud services
Published Birmingham : Packt, 2018

Copies

Description 1 online resource (405 pages)
Contents Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: IIoT Fundamentals and Components -- IIoT fundamentals and components -- Impact of the IoT -- Overview of the IoT technology components -- IoT business models -- How the IoT changes business models -- IIoT use cases -- Healthcare -- Manufacturing -- Aviation (quality control) -- Summary -- Chapter 2: IIoT Application Architecture and Design -- IIoT applications -- an introduction -- The challenges of building an IIoT application -- IIoT system architecture -- Tier 1 -- IIoT machines and sensors -- Tier 2 -- Edge Gateway and cloud connectivity -- Edge Gateway -- Cloud Connectivity -- MQTT Communication -- WebSocket communication -- MQTT over WebSockets -- Event/Message hub-based connectivity -- Tier 3 -- Cloud (IIoT application, data, and analytics) -- Microservice-based application design for IIoT cloud applications -- Platform as a Service (PaaS) -- Overview of Cloud Foundry -- The Hello world application using Cloud Foundry -- Data design for IIoT applications -- Data ingestion -- Timeseries/telemetry data -- The in-memory, Blob, and OLTP data stores -- Analytics for IIoT -- Descriptive analytics -- insight into device health -- Predictive analytics -- understanding the future failure modes of the device -- Prescriptive analytics: advice on possible outcomes -- The anatomy of our first IIoT application -- Edge Gateway triggering alerts -- Cloud connectivity using WebSockets -- Cloud microservices aggregating the alerts -- IIoT/IoT platforms overview -- Predix IIoT architecture -- AWS IoT application architecture -- Google IoT application architecture -- Summary -- Chapter 3: IIoT Edge Development -- Hardware for prototypes -- Variety and cost -- Modifications -- Comparing options -- Supported sensors -- Choosing hardware
Community -- Choosing a data exchange protocol -- Application-level protocols -- HTTP -- Assembling a device -- Preparing an SD card -- Running a sensor application on an RPi -- Running a receiver application on a PC -- Application-level protocols -- WebSocket -- Assembling a device -- Preparing an SD card -- Running a sensor application on an RPi -- Running a receiver application on a PC -- Industrial M2M protocols -- Modbus -- Preparing an SD card -- Running a hub application on an RPi -- Running a simulator application on an RPi -- Running a receiver application on a PC -- Running a receiver application in Predix -- Industrial M2M protocols -- OPC UA -- Preparing an SD card -- Running a simulator application on an RPi -- Running a receiver application on a PC -- Running a receiver application in Predix -- Running a hub application on an RPi -- Getting statistics -- Data management options in Predix -- Asset -- Event Hub -- Time series -- Database as a Service -- Blobstore -- Message Queue -- Predix cache -- Predix Functions -- Predix Message Queue -- Predix-Search -- Predix Insights -- Predix Columnar Store -- Summary -- Chapter 4: Data for IIoT -- Data for IIoT -- Challenges in handling IIoT data -- Data architecture for IIoT -- Technology stack to handle data for IIoT -- Best practices and standards -- Sample code and frameworks for handling data -- Summary -- Chapter 5: Advanced Analytics for the IIoT -- IIoT business use cases and analytics -- Power plant performance using heat rate -- Manufacturing process -- IIoT analytics types -- Reliable analytics -- Efficient analytics -- Profitable analytics -- Digital twins -- What-if -- analysis and simulations -- Recommendation, notifications, and alarms -- Analytics catalog and market opportunity -- IIoT analytics -- cloud and edge -- Cloud-based analytics -- Edge-based analytics
Cloud and edge-analytics combined -- IIoT data for analytics -- Time series data -- Asset data -- Process, recipes, and steps -- Manufacturing Execution System (MES) data -- IIoT analytics -- architecture -- Big data and analytics -- technology stack -- Automation and cloud provisioning -- Big data and analytics -- architecture -- Data ingestion -- Data streaming -- Data computing -- Data persistence -- Data search -- Applications -- Analytics definition -- Streaming and batch analytics -- Event-driven analytics -- ETL pipelines -- Analytics orchestration -- Advanced analytics -- artificial intelligence, machine learning, and deep learning -- Building a model -- Exploratory data analysis -- Analytics life cycle -- Machine learning model life cycle -- Training a model -- Testing a model -- Validating a model -- Predictions using a model -- Retraining a model -- Model performance -- Hypertuning parameters, or the optimization of model parameters -- Model performance metrics -- Determining outliers and offset management -- Continuous training of a model -- ML pipelines and orchestration -- IIoT data -- ETL -- Feature extraction process -- Model generation process -- Storing the model -- Developing an ML pipeline -- IIoT data variety -- Spatial analytics -- Image analysis -- Acoustics -- based analytics -- Machine learning types -- Supervised learning -- Unsupervised learning -- PMML for predictive analytics -- Event -- driven machine learning model -- Event -- driven model architecture -- Building models in offline mode -- Reference architecture -- Real-time model tuning and deployment -- Machine learning as a service -- Creating an ML model endpoint -- Step 1 -- Step 2 -- Step 3 -- Containerization of machine learning models -- Legacy analytics and challenges -- Containerization for legacy analytics -- Data for legacy analytics
Analytic Orchestration -- Architecture -- Analytics orchestration -- Data flow -- Pros and cons of this approach -- Time series data-based analytics -- Windows-based calculations -- Forecasting of time series data points -- Developing a neural network using Keras and TensorFlow using Jupyter -- Environment setup -- Developing the neural network -- Developing an analytics for analyzing time series data using Spark -- Environment setup -- Creating a Spark-based Notebook and creating the Spark session -- Developing streaming analytics using Spark -- Environment setup -- Developing the streaming analytics -- Summary -- Chapter 6: Developing Your First Application for IIoT -- Developing and modeling assets using the S95 standard -- ISA-95 control levels -- Exchange of asset data as represented in S95 -- Selecting a storage -- Relational DBMS -- Key-value stores -- Advanced forms -- Document stores -- Graph DBMS -- Time series DBMS -- RDF stores -- Object-oriented DBMS -- Search engines -- MultiValue DBMS -- Wide column stores -- Native XML DBMS -- Content stores -- Event stores -- Navigational DBMS -- Blockchain -- Important considerations -- Time series storage -- Using InfluxDB as a time series storage -- Creating instances of assets and adding time series data -- Understanding the analytics -- Exploring descriptive analytics with InfluxDB -- Example -- count the field values associated with a field key -- Example -- calculate the mean field value associated with a field key -- Deploying your first analytics -- Examples of queries with InfluxDB analytical functions -- Example -- select all fields and tags from a single measurement -- Example -- group query results by a single tag -- Running a query -- Visualizing time series data and charts -- Visualizing time series data with Highcharts -- Visualizing time series data with Grafana -- Grafana building blocks
Configuring a Grafana visualization -- Graph panel -- Visualizing the outcomes of the analytics as alerts -- Configuring email notifications -- Configuring notifications via Slack -- Configuring alerts in Grafana -- Summary -- Chapter 7: Deployment, Scale, and Security -- IIoT security practices -- Key principles of securing IIoT applications -- Phase 1 -- third-party and architecture risk assessments -- Phase 2 -- technical security assessments -- Static analysis security testing (SAST) -- Dynamic analysis security testing (DAST) -- Open source scans -- Phase 3 -- secure by design -- Phase 4 -- penetration testing -- IIoT device security design and architecture -- IIoT device and IIoT device management -- IIoT device communication and privacy controls -- IIoT device communication and encryption -- IIoT device user privacy controls -- IIoT device placement in the network -- IIoT Gateway security principles -- TPM -- TEE -- IIoT Gateway network security -- IIoT Gateway authentication -- IIoT cloud security architecture and design -- IIoT API security -- IIoT access control -- IIoT identity store -- IIoT security analytics -- IIoT application deployment -- IIoT applications at scale -- Capacity planning -- Testing for load/performance -- Measure and identify bottlenecks -- Scale individual components -- X-scaling or horizontal duplication -- Y-axis scaling -- Z-axis scaling -- Summary -- Chapter 8: Reliability, Fault Tolerance, and Monitoring IIoT Applications -- Complexity of an IIoT system -- Art of building reliable and resilient IIoT applications -- Designing for reliability on the cloud -- Programming for network latency using the circuit breaker pattern -- Issues and considerations -- When to use this pattern -- Example -- Handling for bandwidth constraints and transport costs using the API Gateway pattern -- Issues and considerations
Summary Industrial Internet is the integration of complex physical machines and networked sensors and software. Increasing the number of sensors in industrial equipment is going to increase the data being captured, which needs to be analyzed. This book is a one-stop guide for software professionals to design, build, manage, and operate IIoT applications
Notes Online resource; title from PDF title page (EBSCO, viewed October 17, 2018)
Subject Computer software -- Development.
Application software.
Information technology -- Management.
Computer programming -- software development.
Network security.
Web programming.
COMPUTERS -- Software Development & Engineering -- General.
Application software
Computer software -- Development
Information technology -- Management
Form Electronic book
Author Thomas, Jayant
Tyagi, Prashant
Reddipalli, Kishore
ISBN 9781788297585
178829758X