上QQ阅读APP看书,第一时间看更新
Usage viewpoint
The activities and workflows involved in the usage of an IIoT system to achieve the key system and business objectives are analyzed in this viewpoint. An example workflow would be:
- Register new device to the edge gateway
- Register the new device in the cloud-based management platform by automatic discovery and querying of all gateways
- Run remote test procedure appropriate for this device type and verify that values generated are within expected range and consistent with similar devices in the proximity
This analysis maps the usage elements to their functional and implementation counterparts in the overall architecture. Safety is an important trustworthiness factor of IIoT system usage—in addition to data integrity, data confidentiality, and resilience—that needs to be factored in across the usage cycle.