更新时间:2021-06-10 19:22:49
coverpage
Title Page
Dedication
About Packt
Why subscribe?
Packt.com
Contributors
About the authors
About the reviewer
Packt is searching for authors like you
Preface
Who this book is for
What this book covers
To get the most out of this book
Download the example code files
Download the color images
Conventions used
Get in touch
Reviews
Introduction to Industrial IoT
Technical requirements
IoT background
History and definition
IoT enabling factors
IoT use cases
IoT key technologies
What is the I-IoT?
Use cases of the I-IoT
IoT and I-IoT – similarities and differences
IoT analytics and AI
Industry environments and scenarios covered by I-IoT
Summary
Questions
Further reading
Understanding the Industrial Process and Devices
The industrial process
Automation in the industrial process
Control and measurement systems
Types of industrial processes
Continuous processes
Batch processes
Semi-continuous processes
Discrete processes
The CIM pyramid
CIM pyramid architecture – devices and networks
Level 1 – sensors transducers and actuators
Level 2 – RTU embedded controllers CNCs PLCs and DCSes
Level 3 – SCADA Historian
Level 4 – MES
Level 5 – ERP
CIM networks
The I-IoT data flow
The Industrial IoT data flow in a factory
The edge device
The Industrial IoT data flow in the cloud
Industrial Data Flow and Devices
The I-IoT data flow in the factory
Measurements and the actuator chain
Sensors
The converters
Digital to analogical
Analog to digital
Actuators
Controllers
Microcontrollers
Embedded microcontrollers
Microcontrollers with external memory
DSPs
PLCs
Processor module
Input and output (I/O) module
Remote I/O module
Network module
Other modules
DCS
Industrial protocols
Automation networks
The fieldbus
Supervisory control and data acquisition (SCADA)
Historian
ERP and MES
The asset model
ISA-95 equipment entities
SA-88 extensions
Implementing the Industrial IoT Data Flow
Discovering OPC
OPC Classic
The data model and retrieving data in OPC Classic
OPC UA
The OPC UA information model
OPC UA sessions
The OPC UA security model