Problem solve Get help with specific problems with your technologies, process and projects.

A new guide for the IIoT connectivity space

The industrial internet of things will combine intelligence and interconnection to revolutionize nearly every industry, from healthcare to transportation to power to factories. IIoT will be a much bigger network with bigger value than today’s enterprise-focused internet. The analysts all agree it will have a multi-trillion-dollar economic impact, as billions of devices come online.

However, that impact is largely yet to be felt. Interoperability is widely acknowledged as the key issue holding back IIoT. Unlike today’s internet, the amazing diversity of applications in dozens of industries cannot be easily addressed by a single connectivity technology. IIoT must therefore combine multiple standards and approaches addressing very different use cases. Removing this blocker has potential to ignite much faster adoption.

After nearly three years of analysis and debates, the largest IoT consortium published a landmark document last month. The Industrial Internet Consortium (IIC) Industrial Internet Connectivity Framework (IICF) is by far the most detailed and profound work yet published on IIoT connectivity. It rolls up insights from and negotiations between a wide variety of industry, consortia and standards. The design offers profound insights into architecture, standards analysis and use case analysis.

The IICF architecture will create IIoT connectivity from a small number of “core connectivity standards.” These standards address different regions of the connectivity space. The industry must build standardized “core gateways” between standards. This architecture merges “best fit” industrial application technologies with a design for eventual internet-scale integration.

IIoT connectivity

Assessment and placement of relevant IIoT connectivity standards on the IIoT connectivity stack

The IICF also deeply analyzes the eight main technologies used in the industry and culminates in practical selection guidance.

This guide to the IIoT connectivity and interoperability challenge could unleash the value promised by IIoT. Its combination of immediate practical execution with long-term integrated vision offers a clear path to the future.

All IoT Agenda network contributors are responsible for the content and accuracy of their posts. Opinions are of the writers and do not necessarily convey the thoughts of IoT Agenda.

Join the conversation


Send me notifications when other members comment.

Please create a username to comment.

Does your company have shadow IT issues?
We often have users bring in equipment from home (laptops) or depts purchase external storage that is not authorized. Also, many users use Dropbox and other such sites to circumvent IT. We are limited in our recourse by upper management, who puts users needs above security.
Yes - users putting their own WAP devices; using USB sticks for work related documents
No Simple way to Audit Productivity Tools \ Apps \ SAAS
Problems with reinstalling OS with changed/unapproved configuration
we do a lot of experiments on big data, and we do not have the internal capacity to support all experiments on Monday morning, so folks are reaching into the public web to get their work done.
We use private cloud
la cultura organizacional impide que nuestros empleados tengan este comportamiento, con un monitoreo en la empresa constante se puede determinar esta actividad, pero cuando se utilizan dispositivos moviles con control de la organizacion se puede tener un conocimiento mas preciso si esta actividad puede estar pasando
One Large Corporation I was an Engineer at offered Self Provisioning Virtualized Lab for Development work. Several Pre-Approved Templates were available. All VMs had a time bomb of 90 days. You had an option each 90 days to continue or delete. Internet Access was also available and Firewall Protected.
Follow the money for sure. Several Large Corporates have GM's with an I want it and IT are a barrier mantra. But none will take reponsibility for their actions, if it impacts the company.
I believe the key is strong relationship between IT and business. It is also important that business leaders understand risk and security - at the end of the day there business is at risk...
Working with end users is key – and can be a cultural shift for organizations that have traditionally had a focus on system administration – especially for business units within an enterprise tasked with moving at the speed of the market to remain competitive. In addition to the recommendations here, I’ve seen success at organizations that offered an amnesty program, giving them an opportunity to gracefully come out of the shadows and eliminate the potential security and risk burden they’ve been carrying. For more:
- Shawn Douglass, CTO, ServiceMesh