Anda di halaman 1dari 16

AN ADVERTISING SUPPLEMENT TO JULY 2016

Digital Transformation:
A Pragmatic Approach, p2

An IIoT-enabled Vision
for Process Automation, p4

OPC Unified Architecture:


Key Enabler of the IIoT, p10

PLUS: A DevOps Case Study


in IIoT Servitization, p13

A Secure
Foundation for
Digital Transformation
Deliver on the Industrial IoTs Promise With Honeywell Technology Today

SPONSORED BY
INTERVIEW

A pragmatic approach
to digital transformation
Honeywells vision for the Industrial Internet of Things builds enterprise
optimization, ecosystem analytics and domain expertise on a secure
foundation of seamless data access and information transparency

Honeywell Process Solutions is no stranger to tems where you can leverage the advanced analytics
helping its process industry clients harness digital and expertise that exists across the organization.
innovation for business benefit. Indeed, the com- The third essential aspect of the IIoT is the ability
panys digital firsts include both the distributed to securely tap the domain expertise of a whole
control system (DCS) and the smart, digitally ecosystem of partners in the cloud, where other
communicating transmitter. Today, the Industrial organizations such as process licensors and original
Internet of Things (IIoT) represents only the lat- equipment manufacturers [OEMs] can help solve
est advance in the evolution of digital technology additional problems. Its not just about monitoring,
through which Honeywell has continuously sup- its about taking that diagnostic knowledge of the
ported its customers since the 1970s, according to OEM and embedding it in an application that can
Andrew Hird, vice president and general manager predict and prevent failure.
of the companys newly minted Digital Transfor-
mation organization.
Honeywells approach to the IIoT is a pragmatic Q What business benefits can processors expect
to realize by investing in the IIoT?
one, Hird says. Its still all about finding out our
customers challenges and problems, then applying
technology to solve them, he says. And while the
IIoT can help solve important, previously unsolv-
A The IIoT can help solve a range of histori-
cally difficult problems. The first has to do
with reducing plant downtime. Most customers I
able problems, our fundamental approach hasnt know are happy with 88% plant availability. They
changed. CONTROL recently caught up with plan to lose 5% on planned shutdowns, and the
Hird to discuss the IIoT by Honeywell and why other 7% just happens. So, theres a big payback
the company is uniquely positioned to help the if you can go after this 7%. The second problem
process industries to realize the IIoTs transforma- where the IIoT can help involves staying on spec.
tive potential. Product that doesnt meet specificationsor an in-
process batch that has to be thrown awaymight

Q What do you see as the essential aspects of


the IIoT as applied to the process industries?
represent millions in lost revenue for a pharma-
ceuticals manufacturer. A third key area where
the IIoT can help business is in the integration of

A There are three important aspects to the IIoT,


and if you get all three right you can extract
huge value. The first is data consolidation. Mul-
supply chains, which run far more efficiently with
real-time visibility among participants.

tiple disparate systems of data have to be brought


together. Only then can you identify the root causes Q Honeywell has a long-standing industry
leadership position in measurement, control
of problems that simply werent visible before. and optimization. How has the company evolved
Second, you need to be able to move that data, in the range of its portfolio in order to help clients
a secure fashion, from the plant into enterprise sys- realize the promise of the IIoT?

S-2 More on the IIoT by Honeywell: www.hwll.co/IIoT


INTERVIEW

Without rock-solid
cyber security, customers
are reticent to put data
up into their own
enterprise systems
let alone into the cloud.
Andrew Hird, Vice President and General
Manager, Digital Transformation, Honeywell
Process Solutions

A Through our consistent evolution philosophy,


weve never left a platformor a customer
behind. No matter when you bought a control
advanced software applications. Whats different
now is that we have to do it much more rapidly
and we have to allow our customers to use these
system from Honeywell it can coexist under the capabilities in the cloudto run not only their
current architecture. For example, a TDC 2000 individual sites but their enterprises.
customer from 1975 is able to run that technol- We also are focused on developing partners,
ogy inside Experion, preserving their intellectual finding those OEMs and process technology com-
property. And because Experion is Ethernet-based, panies that have that depth of domain knowledge
its also IIoT-ready. Its very, very easy to pull data on particular assets and bringing them into the
from it. Further, the Experion Orion operator Honeywell ecosystem.
console itself is a fantastic device for consolidat-
ing data and giving operators the information they
need to make better decisions. Q What distinguishes Honeywells approach
from that of other technology suppliers?
Our IIoT capabilities also are supported by
several key technologies including Intuition Execu-
tive, the platform in which our data models reside.
OPC Unified Architecture (UA) allows stranded
A The process industries need a partner that has
foundational technologies in process automa-
tion and advanced software applications, but also
data from all sorts of devices to be brought very secure integration and communication technolo-
securely and simply back into the DCS, or directly gies like OPC UA and cyber security. We invented
into the cloud. The third key enabler is rock-solid the DCS; we own MatrikonOPC; weve got the
cyber security. Without it, customers are reticent most progressive cyber security organization of
to put data up into their own enterprise systems any process automation supplier; and weve been
let alone into the cloud. All the investments weve building software for 40 years, particularly around
made into making our systems and our customers advanced solutions.
networks secure is accelerating the IIoTs uptake. Our control systems are in 10,000 plants
around the world, and weve already solved many

Q Youve been tapped to lead the newly formed


Digital Transformation business unit within
of these problems for our customers at individual
sites. Now were solving bigger problems for them
Honeywell Process Solutions. Can you explain by getting data up into the enterprise layer where
why that organization was formed and how you they can optimize not only individual sites but
envision it working to deliver results for your entire businesses. Further, the IIoT by Honeywell
process industry clients? is securely bringing that data into the cloud where
we can bring to bear Honeywells expertise as well

A Weve actually been solving these sorts of


problems for a long time. Weve collected
data, weve done analytics and weve written
as that of a larger ecosystem of process licensors
and OEMsall to better solve our customers
particular problems and challenges.

More on the IIoT by Honeywell: www.hwll.co/IIoT S-3


ARCHITECTURE

An IIoT-enabled
vision for
process
automation
As functionality is securely redistributed across cloud and edge environments, process
automation systems will perform better and be easier to manage and maintain, too

T
he Industrial Internet of Things (IIoT), has Integration with legacy systems a given
the promise and potential to be the most Another distinction of the IIoT is that a factory
influential and disruptive influence on or processing plant is a very long-lived, capital-
automation since the advent of the microproces- intensive asset requiring long-term support in the
sor-based distributed control system (DCS). Early face of rapid technological advances. This reality
architectural styles are emerging for the broader requires support for existing, ageing equipment
IoT in which ubiquitous sensing is coupled to and infrastructure and a means of protecting
cloud-borne data analytics and storage systems. investments in intellectual property. As a result,
While these approaches are certainly viable for a many devices that will form part of the IIoT will
broad-class of IoT solutionssuch as for smart continue to communicate via existing, often older
grid and consumer-grade appliancesindustrial protocols and will need special mechanisms to
automation systems require a more considered integrate them into the wider IIoT environment.
approach. Bringing IoT ideas to the industrial enterprise
A fundamental difference is that the IIoT aims means reconciling and integrating them with
to enhance the operation and management of existing automation systems. Indeed, the IIoT is,
industrial production processes, many of which in spirit, an extension of concepts that Honeywell
involve exothermic reactions for which safety is a pioneered in the 1970s with the introduction of
primary concern. Security of IIoT-based systems the Totally Distributed Control system (the TDC
is also of paramount importance not just from a 2000 distributed control system, or DCS), a pre-
safety perspective, but also in cases of the produc- cursor to the IoT concept of edge computing. The
tion of essential and strategically important goods lower layers of a DCS tend to be autonomous,
and services. This concern results in more strin- with responsibility for the real-time control of the
gent security, reliability and availability require- process, while the layers above provide various su-
ments as well as the ability to continue operation pervisory capabilities including advanced control
with intermittent access to Internet resources. and human-machine interface (HMI) plus data
When failures do occur, the system must continue historian and planning and scheduling activities.
operation where possible or degrade gracefully, It is tempting to draw a direct comparison
deterministically and safely. between the DCS of today and the IIoT-based

S-4 More on the IIoT by Honeywell: www.hwll.co/IIoT


ARCHITECTURE

automation system of the future and claim that tectural qualities provided by the Purdue model
we are already doing IIoT, but to do so ignores the (safety, security, reliability, efficiency) are main-
significant changes to the DCS, as we understand tained and enhanced within an IIoT-based struc-
it, that will occur with the introduction of the ture. Level 1 of the Purdue model, basic control,
IIoT. The IIoT arises from the combination of core moves to the edge in the IoT model, while Level
DCS concepts such as local, high availability real- 4, business planning and logistics, moves to the
time control of industrial processes together with cloud. There is also a strong argument for mov-
the technologies and architectures that enable the ing much of Level 2, area control, to the edge for
IoT (Figure 1). performance, security and reliability reasons. The
Some of the key differences between an IIoT functionality represented by Level 3, site manufac-
architecture and a conventional DCS architecture turing operations, will be split between cloud and
can be illustrated by comparing the architectures edge depending on the balance of key system qual-
at their highest levels (Figure 2). The structure of a ity attributes. History, advanced process control,
DCS and associated applications typically con- batch and alarm management are all examples of
forms to the well understood Purdue Enterprise functions that can be deployed either in the cloud,
Reference Architecture developed in the 1990s. on premise in embedded devices, or both.
This abstract model typically has a correspond- Moving functionality to either the cloud or the
ing realization in the topology of the system in edge represents a tradeoff amongst a number of
which boundaries between levels are often ex- system qualities. For example, moving function-
pressed as network boundaries across which secu- ality to the edge can improve performance and
rity can be enforced. The IIoT architecture illus- reliability at the expense of having to provision
trated in Figure 1 is, at the highest level, separated and manage functionality distributed across a
into two major subdivisionsthe edge and the large number of devices. On the other hand, mov-
cloud. This structure can be further broken down ing functionality to the cloud makes it easier to
into the seven-level model shown in Figure 2. install, scale up, upgrade and retire at the expense
Applying an IIoT architecture to an industrial of the functionality being remote from the devices
enterprise requires reconciling these two different and controllers on which the functionality may
organizational structures so that the key archi- depend. In general, the move to an IIoT-based

Applications Analytics Reporting Planning Optimize Engineering HMI

Honeywell Cloud Platform


Compute and Store
The Cloud

The Network Internet

The Edge
Real Time
Edge Edge Control
Gateway Gateway
HMI

HMI HMI

Real Time Real Time Real Time


Control Control Control

Sensors, Sensors, Sensors,


Actuators, Actuators, Actuators,
Controllers Controllers Controllers

Figure 1. The Industrial IoT arises from the combination of core DCS concepts such as local, high availability real-time
control of industrial processes together with the technologies and architectures that enable the IoT.

More on the IIoT by Honeywell: www.hwll.co/IIoT S-5


ARCHITECTURE

Enterprise Zone Enterprise Network Level 5


The Cloud Collaboration and Process

Site business and logistics Level 4 Application


network

DMZ Demilitarized Zone Data Abstraction


Shared Access

Manufacturing Site Manufacturing Level 3 Data Accumulation


Zone Operations and Control

Cell/ The Edge Edge computing


Area Control Level 2
Area
Zone
Basic Control Level 1 Connectivity

Process Physical Devices and


Level 0
Controller Process

Figure 2. The traditional Purdue Enterprise Reference Architecture model (left) compared with Ciscos Internet of Things
Reference Model (right).

architecture will result in a system unconstrained Such legacy components do not disappear in an
by the hierarchical structure of a DCS. IIoT-based system but are confined to the edge
computing environment to which access is strictly
Improved support for key operational objectives controlled. Access to legacy DCS components, via
The overriding concern in any industrial enterprise edge gateway devices, involves both access control
is safety, for which there are well-developed sets of and secure communications.
practices and standards. For example, the safety Another vulnerability in current automation
integrity level (SIL) model provides a quantitative systems stems from the use of open systems plat-
measure of the risk reduction provided by safety forms, particularly in Levels 2 and higher in the
instrumented systems (SIS) that are responsible for Purdue model. These platforms pose risks due to
the basic safety of a process and formalized in IEC their widespread use across many domains, mak-
61511. There will continue to be a key role for SIS ing their vulnerabilities and associated exploits
at the edge in any IIoT-based automation system. well understood. The IIoT helps address these
A concern closely related to safety is that of issues by pushing automation system functional-
securityboth physical and cyber. Unless an ity either down into the hardened edge computing
automation system is secure from unauthorized environment or up into the cloud. The cloud com-
access and activity its safety cannot be guaranteed. puting environment has rich access control and
Cyber secure operations require a combination of communications security mechanisms built-in, and
protective measures, inherently secure communica- the centralized nature of the infrastructure makes
tions and active monitoring systems to detect and it much easier to maintain in order to address
mitigate any unauthorized activity across the net- vulnerabilities that are discovered.
work. Aside from preventing compromises to the Overall reliability of the automation system
safety of the plant, security also serves to protect can be enhanced both by pushing functions out
the intellectual property inherent in an industrial to the edge and into the cloud. As with safety,
process itself and the procedures for planning, pushing functions, especially control functions,
scheduling, executing, maintaining and optimizing out to the edge allows those functions to act more
production on the process. autonomously, reducing potential causes of failure.
Many existing DCS components have no Moving functions into the cloud allows them to be
inherent security built in. For example, they may more easily managed, maintained and upgraded.
lack any explicit access control mechanism and Further, the decoupling of edge and cloud-based
may transmit data on the network in plain text. functions allows them to be managed more inde-

S-6 More on the IIoT by Honeywell: www.hwll.co/IIoT


ARCHITECTURE

Cyber security requires a combination of protective measures,


inherently secure communications and active monitoring systems
to detect and mitigate any unauthorized activity across the network.

pendently, again allowing the system to remain existing equipment to be integrated into and IIoT
operational through a range of life-cycle events. architecture in a secure way.
With a production process that is running safely, Maintaining safety: Established SIL qualifica-
securely and reliably, attention can turn to mak- tions of equipment and systems in an automation
ing production as efficient as possible in order to system are central to it maintaining safe opera-
maximize profitability of the enterprise. The IIoT tions. Any move to new deployment patterns and
approach can help improve decision-making by new devices needs to maintain existing SIL levels.
delivering timely information in the right format Of course, the same applies to maintaining secure
to the right people (and systems)wherever they operations. In both cases, the evolution of the
may be located. system should be seen as an opportunity to not
The ability to collect more data from uncorrelat- only maintain levels of safety and security, but to
ed sources also provides opportunities for apply- enhance them beyond their current levels.
ing data analytics, modeling, and machine learning On-process updates: As changes to a system are
techniques to gain better insight into the current introduced, they need to be done in a way that
and future state of the enterprise. does not interrupt or compromise plant produc-
tion. Hardware and software updates as well as
Getting from here to there enhancements should be done on process.
The benefits that flow from new and highly scal- Ongoing performance of existing systems: The
able deployment patterns, smarter devices, more IIoT encourages the collection of more data from
comprehensive data collection and analytics, and more sources. While more data can be fodder for
broader reach through mobile applications are sig- improved analytics, the impact of this increased
nificant. However, achieving these benefits requires demand for data on the existing components of
an orderly transition from the automation system an automation system needs to be managed. There
of today to the automation system of the future. is little point in enabling new applications if their
As industry proceeds, we will need to consider the needs compromise the core mission of the automa-
following key aspects: tion system.
Preservation of core intellectual property: The good news is that Honeywell Process Solu-
Customers typically have very large engineer- tions has a long history of exactly this sort of
ing and intellectual property investments in their system evolution. The evolution of TDC 2000 to
automation systems. Control strategies, supervi- TDC 3000 and on to Experion Process Knowledge
sory applications, and operator graphics need to System demonstrates Honeywells ability to insti-
be preserved as the automation system evolves. tute significant architectural change in automation
Re-engineering these is expensive and adds little systems while honoring the key principles outlined
value. It is far better to preserve this investment ei- above. This evolution continues as Experion PKS
ther by providing ongoing support for these items evolves toward the IIoT.
in their current form or by providing high fidelity In many ways, the IIoT represents an undiscov-
translation to new forms. ered country, full of promise, but waiting to be
Preservation of in-place equipment: In addi- explored and mapped.
tion to the engineering content of an automa- The IIoT by Honeywell vision is of a new form
tion system there exists a tremendous amount of of automation system architecture that balances
associated equipment. Ripping and replacing is the computational and life-cycle benefits of cloud
seldom feasible or cost effective, so it is imperative computing with the requisite on-premise, appli-
that evolution to the IIoT accommodate existing ance-hosted capabilities necessary to provide safe,
systems. A key strategy here is to provide support secure and long-lasting automation for complex
for existing communications protocols that allows manufacturing systems and processes.

More on the IIoT by Honeywell: www.hwll.co/IIoT S-7


Pr
CLOUD-BASED DATA ANALYTICS pr
an
Fast Answers for the Toughest Problems
an

1 01:00 AM
OPERATOR:
"Oh, there's a product quality alarm on the New Overhead Q
fractionator. The feed and controls look
normal. What is causing this problem?
Better contact the Process Engineer."
Feed Comp Prev
Overhead Quality

Uniformance A
creates Operato

Experion PKS process


graphics show process upset.

2 08:00 AM
PROCESS ENGINEER:
"It is easy to search and explore visual data
to confirm the off-spec problem has hap-
pened before. I will contact our
Corporate Expert.

Overhead Quality

Flooding

Feed Comp

Flexible visual da
Uniformance Insight on all fractionato
visualization tools allow navigation is enabled with th
to the fractionator data without asset model.
knowing cryptic tag names.
S-8 Advertising supplement to CONTROL
roduct quality and reliability in a process plant impacts company
rofit. Honeywell's cloud-enabled Uniformance Suite, with advanced
nalytics, enables rapid discovery of the root cause and deployment of
n online, predictive monitoring solution.

4 PROCESS ENGINEER:
04:00 PM

Quality With this insight, a predictive alert from


Uniformance Asset Sentinel can provide
early warning so operations can respond.
Look at the minor upset in overhead
quality now.
vious Overhead Quality

Asset Sentinel
or alerts.

3 02:00 PM
CORPORATE EXPERT:
I have isolated similar off-spec issues in
other plants with new visual pattern
searches and discovered relationships
in the data we didn't see before. We can
solve this problem.

CLOUD
HISTORIAN

Supplier Data OPC UA

Downtime
Quality Data

Uniformance PHD

ata exploration
ors across sites A B C
he common

Advertising supplement to CONTROL S-9


OPC Unified
Architecture:
Key Enabler
of the IIoT
Designed to scale and evolve, specifi-
cation separates communication and
security protocols from information
models. New pub-sub capabilities to
reinforce relevance to the Industrial IoT

T
he list of technologies that make possible for a variety of task such as data acquisition
the Industrial Internet of Things (IIoT) is (OPC DA) and alarms & events (OPC A&E). But
lengthy and includes technologies such as DCOM technology proved limited, for example,
cloud computing, big data analytics, embedded in its ability to facilitate cyber secure communi-
systems, wireless sensor networks and security cations. To address these and other issues, OPC
protocols. But communication standards form the Unified Architecture (OPC UA, also IEC 62541)
backbone of the IIoT in that they enable the se- was created to enable secure and reliable data
cure integration and interoperability of the many acquisition, information modeling and communi-
devices and software applications that participate cation among plant-floor devices, applications and
in the system of systems that is the IIoT. the enterprise.
OPC Unified Architecture (UA) offers a compel- A key OPC UA design objective was to prevent
ling solution for connecting applications within technology lock in, ensuring that OPC UA could
the IIoT.It provides for a layered model that embrace future technologies. To that end, OPC UA
separates the configuration, format and packaging defines services and related concepts in an abstract
of the information from the underlying security manner, then further defines mappings between
and communication protocols.Further, OPC UA the abstract specifications and the technologies
is broadly supported by both device manufactur- that can be used to implement them.
ers and software developers across the industrial Central to the design of OPC UA is scalabil-
automation space. Importantly, the specification ity.The specification defines the many complex
continues to evolve, with the addition of publish- feature sets available with OPC UA client and
subscribe connectivity common to cloud-side server applications.However, OPC UA is designed
participants in the Industrial IoT. in such a manner that individual implementations
need not support all possible feature sets in order
Scalable and future-proofed to be compliant with the specification.For ex-
The need for application interoperability and ample, implementation within a small, embedded
standardization in the control realm drove a device may support a profile that mandates only
consortium of automation suppliers to develop data-read capabilities together with a small set of
the original OPC specification in the early 1990s. address-space constructs. PC-based OPC UA serv-
Based on Microsoft DCOM technology, OPC ers, however, can support a profile that includes
Classic was extended to a suite of specifications many more features such as alarms and history.

S-10 More on the IIoT by Honeywell: www.hwll.co/IIoT


OPC UA

OPC UA technology mappings are organized into their relationships are grouped together to form
three groups: data encodings, security protocols information models.
and transport protocols (Figure 1).Different map-
pings are combined together to create a profile.Cli- Companion specs for particular domains
ent and server applications can support one or Standardization committees associated with many
more profiles; however, a client and server must areas within automation and process control
each provide an implementation for at least one technologies have created or are creating OPC
profile in common in order to communicate. UA companion specifications.These companion
The OPC UA security model is a three-layer specifications extend the base OPC UA informa-
approach where each layer has specific security- tion model to describe objects and relationships
related responsibilities (Figure 2).The application of relevance to a particular domain.Examples
layer is responsible for transmitting plant informa- include OPC UA for FDI (Field Device Integra-
tion and real-time data from devices and between
a client and a server within a session. A session Binary Hybrid Web Services
Profile Profile Profiles
provides for user and authentication and autho-
rization and runs atop a secure channel that both
UA XML Data
signs and encrypts the data.The secure channel UA Binary
Encodings
also is responsible for mutual authentication and WS Secure
UA Secure Security
authorization between client and server applica- conversation conservation Protocols
tions.The transport layer is responsible for trans-
UA TCP
mitting and receiving the secured data, including SOAP
Transport
mechanisms for error recovery. HTTPS HTTP
Protocols
The OPC UA object model describes how
clients access information on the server.The TCP/IP
model defines a set of standardized node types
which can be used to represent objects within the
address space, object properties, methods, events Figure 1. OPC UA technology mappings are organized into
and relationships between objects.By building three groups: data encodings, security protocols and transport
on these elementary concepts, OPC UA enables protocols.Different mappings are combined together to cre-
the modelling of any object. Related objects and ate profiles based on an applications particular requirements.

More on the IIoT by Honeywell: www.hwll.co/IIoT S-11


OPC UA

Application Layer Application Layer


Session
User Authentication and Authorization User Authentication and Authorization

Communication Layer Communication Layer


Application Secure Application
Authentication Confidentiality Integrity Channel Authentication Confidentiality Integrity
and Authorization and Authorization

Transport Layer Transport Layer


Socket
Availability Connection Availability

Figure 2. The OPC UA security model reinforces security at all levels of the communication standard.

tion), PLCOpen (PLC programming), and BACNet To address this need, work is underway within
(building automation). the OPC Foundation to create a publish-subscribe
In addition to the generic information models model that complements the specifications origi-
specified by OPC UA and in companion standards, nal client-server model. With the OPC UA server
individual vendors are free to define new informa- acting as publisher, data is published to a global
tion models or extend existing information models space governed by existing middleware such as
tailored to their systems. Microsoft Azure. In contrast to the client-server
The OPC UA specification was created with the model where the UA client decides what to sub-
goal of enabling interoperability among products scribe to, the published datasets are configured
from different vendors. In order to ensure that a on the OPC UA server. Subscribers are recipients
product is actually compliant to the specification, of published dataset data and may or may not be
it must undergo a series of tests that certify com- OPC UA client applications. Subscribers must sim-
pliance to the specification. The OPC Foundation ply understand the message-oriented middleware
maintains an independent certification test labo- and the rules for decoding messages. Evaluation of
ratory that validates compliance to the specifica- candidate protocols currently is underway, includ-
tion, including fault and stress scenarios, as well ing Advanced Message Queuing Protocol (AMQP)
as verifying interoperability against a number of and UDP Multicast as well as Data-Distribution
reference clients and servers. Service Real-Time Publish-Subscribe Protocol
For developers, tools such as Honeywells (DDS-RTPS).
MatrikonOPC UA software development kit When this pub-sub functionality is incorporated
(SDK) can facilitate a fast track to specification- within OPC UA, one can conceive of domain-spe-
compliant OPC UA connectivity. The SDK allows cific usage scenarios includingpeer-to-peer control-
developers to quickly add pre-engineered OPC ler/device communication and delivery of process
UA connectivity to all their productsfrom small messages to advanced application clients connected
embedded devices to powerful PC-based servers via an enterprise service bus (where clients likely
without having to become OPC UA experts. reside outside of the local area network).
OPC Unified Architecture is an information-
Pub-sub extends client-server model centric layered architecture that is at once secure,
While these features form a solid foundation platform-independent, scalable, interoperable
as IIoT enablers, an additional key enabler is and object-oriented. The OPC Foundations agile
requireda data exchange model that is efficient, ability to enhance the base information model to
performant, robust as well as scalable for use with include publish-subscribe is further evidence of
one-to-many, many-to-one, or many-to-many its commitment to be a leading technology for
configurations. enabling the IIoT for years to come.

S-12 More on the IIoT by Honeywell: www.hwll.co/IIoT


CASE STUDY

Fast-track development process


demonstrates Honeywell vision
of secure and transparent information
accessdelivered at the speed
needed in industry today

A DevOps case study in


IIoT servitization
M
uch has been written outsource responsibility for form its own value proposition,
in recent years about system maintenance. quickly bringing to market solu-
the accelerating trans- In both cases, contract per- tions that leverage secure cloud
formation of manufacturing formance is measured against technologies and the integration
companies into organizations established key performance in- of information from multiple
that sell not only products, but dicators (KPIs), as now continu- applications to deliver value for
new services or outcomes closely ously monitored and measured its customers.
aligned with those productsof- in the companys new Assurance The Assurance 360 Dash-
ten enabled through the deploy- 360 Dashboard application. board (Figure 1) pulls data from
ment of technologies exemplified Honeywells development and customer sites as well as Honey-
by the Industrial Internet of deployment of the Dashboard well business systems, delivers a
Things (IIoT). for monitoring the perfor- consistent user experience, and
Honeywell Process Solu- mance of these contracts clearly is integrated into the Honeywell
tions already is a pioneer in demonstrates how the company Process Solutions e-presence
this ongoing servitization continues to digitally trans- site, HoneywellProcess.com. The
of industry, and has for many
years delivered to its custom-
ers a range of services related
to its instrumentation, control
systems and advanced software,
as well as standalone, product-
independent services in arenas
such as industrial cyber security.
The companys Assurance 360
program, for example, is a two-
tier service contract for manag-
ing the system maintenance of
customer systems. Customers
can choose to complement the
capabilities of its own main-
tenance staff with those of Figure 1. Honeywells Assurance 360 Dashboard provides customers with a trans-
Honeywell, or choose to fully parent, KPI-based view of system status as well as service contract fulfillment.

More on the IIoT by Honeywell: www.hwll.co/IIoT S-13


CASE STUDY

DevOps methodology speeds time-to-market


DevOps is a concept or software development methodology lems, but rather to identify if there was anything blocking
that promotes the collaboration among solution development someone from making progress and what resources they
and IT operations teams with the goal of faster time-to-mar- needed to connect with to resolve the problem. By focusing
ket and increased efficiency of application update delivery. A only on the blockers, the global team often was able to hear
key element in the timely release of Honeywells Assurance from all members well within the 30 minute scheduled call,
360 Dashboardand in subsequent eight-week release ensuring that all team members were able to be productive
cycleswas the identification of smaller sets of functional during regular work hours.
content that can, given the cloud deployment nature of the The results proved outstanding. The integrated team
solution, be released more often. delivered top-priority functionality four months early (on an
From a process perspective, the Assurance 360 Dashboard original 10-month schedule), representing a 40% schedule
was the first to pilot Honeywell Process Solutions Agile Itera- reduction. Functional updates originally planned for eight-
tive Process, or Agile HIP, which enabled the team to tailor the week intervals now go live when ready, increasing the rate
process deliverables and tools to better match the needs of of continuous feedback and improvement. The eight-week
the program, removing duplication and non-value added tasks. planning cycle also enables the team to be more responsive
From a DevOps perspective, Honeywell established a shared to changing business priorities.
deployment sandbox where both development and IT teams Honeywell credits the programs success to an integrated
deploy their changes to a security-restricted common system development and IT operations team that was committed to
on the Honeywell network. This new, agile approach allowed demonstrating a new breakthrough development approach
the teams to significantly reduce the initial delivery time, and as well as an enthusiastic, customer-focused business team
to get customer feedback sooner and more frequently so that that was able to articulate a practical path for initial and
it could be incorporated into incremental updates. incremental functionality. Further, the full team picked up and
Not having a formal DevOps model in place or experience solved problems regardless of whether they were develop-
in doing a cross-functional development, Honeywell first ment- or operations-focused. This has worked well so far, but
identified an integrated development team and established has introduced some inefficiencies in hand-over, development
a daily global stand-up call to identify blocks for any of the and support. To further enhance its won best practices, Hon-
teams activities. The goal of this meeting wasnt to formally eywell is engaging its suppliers and partners to learn from
track progress on program tasks or to solve specific prob- their DevOps journeys.

solution was developed using earlier than initially scheduled on HoneywellProcess.com,


an agile continuous delivery ap- as well as new capabilities every where customers have a single
proach that brought the solution few weeks (see sidebar). point of access to all informa-
to market in a very short period tion relevant to their Honeywell
of time by combining the engi- From manual spreadsheets systems. It provides customers
neering and IT teams together in to online KPIs with improved visibility of KPIs
a collaborative DevOps engage- Previously, Assurance 360 while reducing the chance of
ment. DeOps, short for devel- contracts were managed via manual-entry induced errors.
opment and operations, is a a partly manual, spreadsheet- System performance KPIs
methodology designed to bring based KPI reporting process. are computed based on ac-
efficiency and speed-to-market Now, system and contractual tual system performance of the
to the application deployment performance KPIs are auto- customers servers, stations,
process. matically brought together with network, controllers, process
As part of the Assurance 360 detailed system performance control network (UCN/LCN) as
Dashboard program, the devel- reports, drill-down screens for well as the currency of antivirus
opment and IT teams adopted a details influencing the actual definition files. This information
new DevOps methodology that KPI scores as well as a roadmap is captured at the customers
allowed them deliver the initial of planned maintenance activi- site and securely transmitted to
public release four months ties into a single view hosted one of Honeywells two Secure

S-14 More on the IIoT by Honeywell: www.hwll.co/IIoT


CASE STUDY

Service Centers via a Secure


HIP Distributed Platform Model
Service Node provided as part of
Honeywells Remote Monitoring Internet Legend
solution. The solution also pulls
Client New
data related to the performance
of service requests and comple- Dashboard Existing
tion of planned maintenance ac-
tivities from Honeywells Siebel
customer relationship manage-
ment (CRM) system. Integration
with HoneywellProcess.com not Honeywell DMZ (Application tier)
only influenced the dashboard
presentation to conform to the Assurance 360 Web Server
HoneywellProcess.com
experience presented by this Web Services
portal, but also leveraged the ex-
isting Honeywell Common Web Performance Analyzer
Authentication (CWA) and User CWA Server Web Service
Profiles held within Honeywell-
Process.com. Figure 2 illustrates
the various information sources
Honeywell DMZ (Data tier) Honeywell Intranet
that have been integrated togeth-
er and now feed the Assurance
Shared Database Server CRM Server
360 Dashboard.
Assurance 360
Development continues CRM Data
While the Assurance 360 site User Profiles
today is suitable for the current
customer base, the prospect
of increasing demand for such Remote Service Center(s)
services over the coming years
Performance Analyzer Server
has the development team look-
ing to transition the solution Performance Metrics Web Service
to a cloud-native, platform-as-
Performance Analyzer Data
a-service (PaaS) offering for
improved scale and support.
The Assurance 360 Dashboard
supports mobile devices today Figure 2. The Assurance 360 Dashboard securely integrates system performance
through an HTML5-based data from customers systems with data from Honeywell support systems.
responsive design, and as Hon-
eywell continues to develop its unique skills of both organiza- The speedy launch and ac-
mobile worker support, push- tions. And while the solution celerated enhancements to
style notification, workflow and was brought to market well in Assurance 360 Dashboard
a more optimized experience for advance of original estimates, demonstrate Honeywell Pro-
smaller devices are in the works. the company believes that more cess Solutions commitment to
Honeywell started this jour- productivity gains are to be leverage the Industial Internet of
ney with a goal of improving hadnot only in improved col- Things to deliver business value
time-to-market, and with the laboration between the teams for its customers. Honeywell
belief that a joint collabora- but also in the more efficient clearly is committed to its own
tion between development and handover of responsibilities and digital transformation, even as
IT operations would enable ownership between develop- it seeks to help its customers
the company to leverage the ment and operations teams. transform themselves.

More on the IIoT by Honeywell: www.hwll.co/IIoT S-15


7% -10% of total production is lost
due to unplanned downtime. This can

unsolvable. now be avoided. IIoT by Honeywell is


solving the industrys biggest challenges,
once thought to be unsolvable. Helping
you avert unplanned plant downtime
before it occurs.

For more information, please visit


2016 Honeywell International Inc. All rights reserved. www.hwll.co/IIoT

Anda mungkin juga menyukai