Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

6. Kepware_IIoT_Solution

342 views

Published on

  • Be the first to comment

6. Kepware_IIoT_Solution

  1. 1. Enabling Industry 4.0 with Kepware Steve Lim | Sales Engineer
  2. 2. IoT or Industry 4.0? • IoT : Physical world is becoming a type of information system—through sensors and actuators embedded in physical objects and linked through wired and wireless networks via the Internet Protocol. • Industry 4.0: Manufacturing Production built upon the concept and enabled by IoT. Everything is networked and interlinked with everything else. 2
  3. 3. Internet of things model Services Things
  4. 4. Production Machine Data PLCs, SCADA, HMI, ICS, Production Input, output RFID Tags, Barcode Scanners, Robots Arms, Cell Machines, CNC, Custom Devices, Packaging , Storage, Switches, Routers ,UPS,Servers, Security Disparate|High Velocity | High Volume | Real-time
  5. 5. 5 Complete Visibility into Edge Devices • Root Cause Failures • System Correlation • Complete Operational visibility • Fast, Flexible configuration with Search Processing Language • Geo Spatial Systems • Smart Industrial Systems IIoT application
  6. 6. Real-time Connectivity Solution to enable interoperable “Things” IIoT enabled service oriented architecture Data Modelling of raw unstructured data MES/POP SCNERP SPC Industrial Data Analytics Highly Flexible solution High Volume High Velocity High Performance Devices that now interoperates and communicates with one another
  7. 7. Datalogger MQTT REST C AMQP CoAP IoT API Splunk IDF Connectivity Historian OPC Connectivity Suites Web Apps External DCS/ICS ODBC Database or Historian Kepware IIoT Solution Overview
  8. 8. Device Kepware IoT Plugin / IDF IIoT Application / Traditional HMI Fastest time to live IIoT Solution with Kepware Already completed OR connect to your device in 5 min Simple installation to make the data accessible
  9. 9. Kepware IoT Plugin • Measurement, Verification, and Constant Commissioning: Ensure that devices in the field operate as intended. • Capacity Planning: Monitor data for risk of unplanned device or system downtime. • Root-Cause Analysis and Remote Troubleshooting: Gain a better understanding of the cause of a particular failure on a particular device and improve efficiency. • Anomaly and Outlier Detection: Identify outliers that may be an early indicator of issues in device production or deployment. • Safety, Security, and Compliance: Gain visibility into system performance or set points that could put machines or people at risk, and quickly develop and access reports for compliance purposes. • Cybersecurity: Improve security posture across industrial systems to mitigate emerging cybersecurity threats.
  10. 10. Kepware Industrial Forwarder
  11. 11. Kepware Communications Platform IIoT enabled service oriented architecture Splunk IDF Splunk > Devices that now interoperates and communicates with one another (M2M)
  12. 12. Building Automation Real Time HVAC Data from Kepware for machine based condition monitoring Quick Glance for System ROI and KPI Geographic Monitoring capabilities In depth analytics and stats for root cause analysis Historical Trending for predictive analysis
  13. 13. Intelligent Lighting Systems
  14. 14. Remote monitoring of asset
  15. 15. Do more with your data.
  16. 16. Grant your system intelligence with Splunk Machine Learning
  17. 17. Predict Downtime based on your historical data Predict the value of a numeric field using a weighted combination of the values of other fields in that event. A common use of these predictions is to identify anomalies: predictions that differ significantly from the actual value may be considered anomalous. IT admins could predict the values of sensors that were malfunctioning; security analysts could predict how much data a user is likely to transfer and flag unusually high prediction errors; and business analysts could predict the likely spending habits of customers. Algorithm: Linear Regression
  18. 18. Detect Outliers Find values that are far from previous values. IT admins could look for machines with unusually high resource utilization; security analysts could look for employees transfering unusually large amounts of data; and business analysts could identify big spenders. Algorithm: Distribution statistics
  19. 19. Forecast your production data Predict likely future values given past values of a metric (numerical time series). IT admins could perform capacity planning by forecasting when a resource will be exhausted; security analysts could identify subtle attack signatures by finding trends; and business analysts could forecast earnings and other business metrics. Algorithm: State-space Method using Kalman Filter
  20. 20. Product Support • Local Phone and Email • Demo and proof of concepts • Local engineering and sales support • Your local representative: Support team with extensive Industry knowledge and experience. Available via Phone, email and web request. Utilize documents, conversations and remote access to fix issues. License Recovery from Server Hardware Failure Knowledge base available 24 hours a day, 7 days a week via web access.

×