A question that has come up quite a bit in the “Factory 4.0” world is: What do we need to get on the internet of things (IoT) train?

When you break them down to their simplest components, you only need a small amount of things to yield benefits from implementing IoT.

The first part is real-world connections. These are inputs and outputs.

Inputs — Sensors

A sensor can come in any variety of packages. These can sense motion, a switch closure, temperature, weight, material properties, vision systems, etc. These can be analog, variable input; or digital, open or closed input. The single binary inputs are the simplest because they don’t require much more than a single-line input, just a one or a zero.

The analog sensors require a variable signal and a device to convert that into a value. As an example, you might use a sensor that reads 0-100 degrees Celsius values from a 0-10v signal. You convert that analog signal into a digital number. That number is then sent up to the cloud to monitor the value.

Outputs — Actuators

These can be motors, hydraulic cylinders, relays, etc.You may want to monitor that analog temperature, and if it exceeds 80 degrees Celsius you actuate a motor to move the sensor or the device away from the heating element.

Compilers

Compilers are used to process information on the local level. Sometimes even making decisions before moving up to the cloud.

As an example, the conversion to a digital value as opposed to sending the voltage out, then converting it to a temperature.

Sometimes these combine a dozen or more digital signals that can all be sent in a single communication packet. All of these must have an indicator as to the source of the signal so when it gets to the cloud it gets put into the correct register for processing.

Processor input/uplink

Processor or uplink refers to the way the information is communicated. If it’s communicated via direct wiring or hardware, just a simple on or off input.

The uplink refers to when you’re using a communications protocol. So instead of a sensor turning on and off like a light connected to a switch, this is like your mouse clicking and the computer processing it to tell your screen what to display.

These communications have a more complex protocol that dictates the order that information is going to be received. They usually have a defined rate at which they’re sent, so if they don’t see the info, it can report the error.

Control/computer

The control or computer is taking the information and acting upon it. It may have one, both or any combination to get the information into the control or computer.

In the case of a local control where speed is of the essence, a local control or processor that handles safety monitoring is very common. Any delay could increase the severity of a problem, so in these instances a local level of decision making must be done. It can then be sent on with an alarm that a safety condition exists and was acted upon.

The information may be processed at local level or processed after the discreet device, which then feeds the info up to the cloud. In some systems, the processing or decision is made after it reaches the cloud.

At this level the information is accumulated, and that information is added to existing information and then compared to an existing model and operated upon.

Modeling is always evolving in artificial intelligence. You start with very basic information, which models linear points that can be measured and compared against.

The information can then be filtered into reports, compiled with other information, such as taking information from fixed sensors and comparing this against sensors that are in motion. For example, a sensor on buoy measuring wave information along with water temperature, water currents, time of year, time of day, etc; and then comparing this with sensors on a boat and sensors on a drone that are in motion. Subsequently, taking similar readings gives us a more complete picture of what we measure.

This is how we build smarter cars, boats, cities, devices and, more importantly, smarter decisions.

Not to be overlooked in all of these developments is the increasing demand for cybersecurity that these open-source items create. Unfortunately, with all of these direct-connected sensors, compilers and computers connecting to the internet, they create holes that can be exploited if not securely reinforced.

Many times, IT departments prefer to use an intranet or Local Area Network (LAN) that does not communicate outside of the walls of the company, plant or server location. However, many companies are using externally hosted server farms, so this can require an even greater need for security.