| Bottom | Home | Article | Bookshelf | Keyword | Author | Oxymoron |

 

Industry 4.0 Terms

Category: ICT
Published: 2015
#1517a

Kanzo Kobayashi

up 15731
Index
I
Why?
  • "Industry 4.0" is an urgent theme in 21C for all industrial nations; which visualize the next generation type of integration of manufacturing and ICT technology, as well as total new relationship of producers and consumers.
  • It is difficult to recognize the historical importance when the revolutions are actually in the process of development; it is also hard to differentiate social mess and revolution, or digital buss words and real breakthrough.
  • Here are the key words or concepts related the Industry 4.0.
  • Industry 4.0は全ての工業国にとって21世紀の緊急テーマである。それは製造とICT技術との次世代型の融合であり、さらには生産者と消費者との新たな関係を明示している。
  • 革命が現に進展している中ではその歴史的重要性を認識することは困難である。人々は社会的混乱と革命とを、またデジタルなバズワードと真のブレークスルーとを見分けるのは難しい。
  • 以下はIndustry 4.0関連のキーワード集である。
Key
English
Remarks

>Top <A>:

<A>:

<A>:

>Top <B>:

  1. Big Data

<B>:

  1. Big Data Analysis: anomaly detection, cause investigation, quality control, utilization rate up, energy saving
    • Seamless connection of IT & OT by use of SDN (SW defined networking)
    • connectivity with various devices; tablet, camera, sensor, PLC (Programmable Logic Controller), robot, CNC (Computer Numerical Control)

<B>:

>Top <C>:

  1. CPS (Cyber Physical Systems)
  2. CVE (Common Vulnerabilities & Exporsures)

<C>:

  1. similar to smart factories or smart machines, including digitalized facility of production and storage.
  2. many common vulnerabilities or attacks are documented in CVE: 1) Backdoors; bypassing normal authentication, 2) DoS (Denial-of-service) or Distributed DoS attack; make a machine unavailable by entering a wrong password enough consecutive times to cause to be locked, or overload the capabilitiles of a machine. 3) Direct-access attacks; by installing software worms and download data. 4) Eavesdropping; surreptitiously listen to a private conversation via monitoring faint electromagnetic transmissions generated by the hardware. 5) Spoofing; program successfully masquerades as another by falsifying data. 6) Tampering; malicious modification of products. 7) Repudiation; authenticity of a signature to be challenged. 8) Information disclosure; privacy breach or data leak. 9) Privilege escalation; an attacker gains elevated privileges or accesses to resources. 10) Exploits; a software to take advantage of a flaw in a computer system. 11) Social engineering & Trojans; to convince a user to disclose secrets by impersonating a bank or a customer. 12) Indirect attacks; an attack launched by a third-party computer. 13) Computer crime

<C>:

>Top <D>:

  1. Demographic change
  2. Design principles of Industry 4.0

<D>:

  1. countermeasures to aging society, shortage of skilled labor, diversity of workforce (age, gender, foreign immigrants), and flexible career paths. (work-life balance)
  2. includes 1) Interoperability by cyber-physical systems, 2) Virtualizaion by smart factories, 3) Decentralization by CPS, 4) Real-time capability, 5) Service orientation, and 6) Modularity.

<D>:

>Top <E>:

<E>:

<E>:

>Top <F>:

<F>:

<F>:

>Top <G>:

  1. Global movement for Industry 4.0

<G>:

  1. Germany: Industrie 4.0
  2. US: Industrial Internet Consortium
  3. China: 制造强国 zhìzào qiángguó 2025
  4. India: IoT Policy

<G>:

>Top <H>:

<H>:

<H>:

>Top < I >:

  1. Industrial Internet
  2. Industrie 4.0
  3. Internet of Services

 

< I >:

  1. US GE version of Industry 4.0, including intelligent machines, advanced analysis and people at work.
  2. German version of Industry 4.0; 'Industrie' is German/French spelling of Industry;
    • first used in Hanover Fair in 2011, and Working Group on Industry 4.0 submitted recommendations to German federal government.
    • Industrie 4.0 includes 1) horizontal integration through value chain networks, 2) vertical integration of networked manufacturing systems, and 3) end-to-end digital integration across the value chain including consumer.
    • In US, mostly used as 'Advanced Manufacturing'
  3. Reference architecture:
    • 1) IoT: Connectivity by API/IPv6/TCPIP/SMTP, etc.
    • 2) Platform: Internet based service platform
    • 3) IoS: Business knowledge & application
    • 4) Application: Access to markets & customers
  4. a

< I >:

>Top <J>:

<J>:

<J>:

>Top <K>:

<K>:

<K>:

>Top <L>:

<L>:

<L>:

>Top <M>:

  1. MES (Manufacturing Execution System)
  2. Migration strategy from Industry 3.0 to Industry 4.0

<M>:

  1. computer systems used in manufacturing, providing right information at right time, inform current condition, particularly used in regulated industries such as food, beverage or pharmaceutical.
    • used as an intermediate step between ERP, or SCADA (Supervisory Control and Data Acquisition).
    • MES is situated at Level-3 between ERP at L4 and process control at L0/1/2. Activities in L3 were divided in four main operations; 1) production, 2) quality, 3) logistics, and 4) maintenance.
    • Relationship with L3 systems; 1) LIMS (Laboratory Information Management System, 20 WMS (Warehouse Management System), 3) CMMS (Computerized Maintenance Management System)
    • Relationship with L4 systems; PLM (Product LiveCycle Management), ERP (Enterprise Resource Planning), CRM (Customer Relationship Management), HRM (Human Resource Management) , PDES (Process Development Execution System).

<M>:

  1. 製造実行システム

>Top <N>:

  1. NEC Industrial IoT
  2. NNMI INational Network for Manufacturing Innovation) of US

<N>:

  1. Process Innovation + Product Innovation; aiming
    • 1) Global Manufacturing Process Innovation; seamless connection with ERP, IoT oriented MES, secure IoT network; M2M, sensorss
    • 2) QA by global traceablity improvement; quality analysis of big data; 4M information; lifecycle management data
    • 3) New Product & Services creation: scalable IoT architecture; embedded SW & SI services; user data analysis
    • Key concept: 1) Co-study & collaborate, 2) Use of various assets, 3) Co-improvement with producer & consumers, 4) Connetion by global supply chain
  2. US's challeng for Industry 4.0, having networked collaboration of US manufactures including 45 category of industries named 'IMI, Institue for Manufactiring Innovation'; whose core operator is NIST supported by US government (DOC, DOD, DOE, NASA, NSF, ED); the original was promotion of 3D printer laboratory in Ohio. The budget of each center has ¥70M from government and similar fund from privae sector.

<N>:

  1. NEC ものつくり共創Program;
    つながる工場+つながる製品
    1. 共、匠、活、繋

 

>Top <O>:

<O>:

<O>:

>Top <P>:

  1. PLC (Programmable Logic Controller)
  2. Predix
  3. Product Piracy
  4. Productivity and efficiency

<P>:

  1. 'Sequencer' by Mitsubishi Electric.; digital computer use for automation of industrial electromechanical processes. (control of machines, assembly lines, etc.); developed as 'ladder logic' from 'relay logic system'.
    • Desktop computers are not tolerate to temperature, humidity vibration and longevity as processors used in PLCs.
    • PLR (Programable Logic Relay); smaller, modular, and programmable PLC, still offers robust design.
  2. Platform for Industrial Internet proposed by GE, to operate industrial machines and performace management; aiming a function of Google of industrial machines.
  3. Intellectural property protection is the key to the survival of Industry 4.0. Pirates can even become competitors.
  4. resource efficiency and potential savings.

<P>:

>Top <Q>:

<Q>:

<Q>:

>Top <R>:

  1. RAMI 4.0
  2. Regulatory framework
  3. Roadmap

<R>:

  1. Reference Architecture Model Industrie 4.0; jointly proposed by German ICT industy association (BITKOM), German machinery industry association (VDMA), and German electronic industry association (ZVEI), showing three dimensions 1) ICT layer, 2) Value Chain, and 3) Manufacturing Line.
  2. protection of corporate data, liability, handing of personal data, trade restriction, etc.
  3. a

<R>:

>Top <S>:

  1. Safety & Security
  2. Smart Factory
  3. SMLC (Smart Manufacturing Leadership Coalition)
  4. Stage of revolution

<S>:

  1. Expaned idea for Safety & Security:
    • Safety: not to pose a dager either to people or to environment (machine, facility, products, etc.)
    • Security: increase confidentiality, integrity & availability; against misuse and unauthorized use (access protection, against attck, data security, etc.)
  2. is focused smart product and smart processes based on IoT (Internet of Things), IoS (Internet of Services), and IoP (Internet of People); including 1) smart logistics, 2) smart building, 3) smart product, 4) smart grids, 5) smart mobility
  3. US version of Industry 4.0; US non-profit organization of manufacturing practitioners, etc.
  4. First Industrial Revolution (from later 18C); steam engine and mechanical manufacturing, started from UK.
    • Second Industrial Revolution (from beginning 20C); electric powered mass production, developed in US.
    • Third Industrial Revolution (Start from 1970s); electronics and ICT to achieve further automated production, based on the division of labor.
    • Fourth Industrial Revolution (Actually start from 2015) based on Cyber-Physical Systems), including advanced use of embedded devices, IC tag, SDN, logistics, 3D Printer, Cloud computing, and various smart machines.

<S>:

  1. What will be Product Liability of Industry 4.0?
  2. Operational safety, fault tolerance, robustness (in the event of a fault), and reliability during a given period.

>Top <T>:

  1. 3D Printer

<T>:

  1. using laser sintering technology which can print complex 3D structure in a matter of hours; local 'copyshop' could be available based on consumers own design.
    • customer-specific criteria including design, configuration, manufacturing, operation, and frequent changes.
    • flexible decision; end-to-end transparency in real time.

<T>:

>Top <U>:

<U>:

<U>:

>Top <V>:

<V>:

<V>:

>Top <W>:

  1. WoL (Wake-On-LAN)

<W>:

  1. If a Magic packet is received that is directed to device's MAC address or NIC (Network Interface Card), which enables to be uniquely recognized and address on a network, initiating the system wake-up.
    • the magic packet is set on data link layer (L2) not on IP address (L3); can only be used within current network subnet.
    • Magic packet; FF FF FF FF FF FF in hexadecimal followed by 16 repetitions of the target computer's 48-bit MAC address.

<W>:

>Top <X>:

<X>:

<X>:

>Top <Y>:

<Y>:

<Y>:

>Top <Z>:

<Z>:

<Z>:

Pinyin
I
Comment
  • a

| Top | Home | Article | Bookshelf | Keyword | Author | Oxymoron |