IIC Journal of Innovation 7th Edition | Page 14

I ² M ²— The Future of Industrial Internet Monetization
shown in Figure 8 : In the cloud platform for example , the Internet should always be available , otherwise the cloud applications cannot be operated . This high-availability ( level 4 ) is also typical between cloud services and the WAN connections which are used to connect to the LAN and the edge . But the connectivity level from the WAN and LAN at the edge itself to the internet can be much lower :
A typical internet connection from an office or a plant is not necessarily redundant , so the internet is typically available , but in many cases with no guaranteed minimum down time , defined as Level 3 of the Connectivity Quality . Many Operational Users of IIoT systems refuse typical permanent internet connectivity from a production or a power plant , for example , due to security reasons . In this case , they may want to restrict the internet access only during maintenance intervals , for example . Such “ limited by demand ” availability is defined as Level 2 . Even more careful Operational Users additionally restrict the format which can be used for data exchanged across the internet . One example is only permitting the exchange of files via special high-security gateways . Our model defines this as connectivity quality level 1 .
The most restricted connectivity — no access at all — is defined as level 0 and is not considered in the I ² M ² because an IIoT operation cannot be established in this case .
But it should be clear that any widely accepted industrial Monetization Method must support more than just Level 4 . So , typical payment methods which are established in the cloud and also frequently used with connected cell phones cannot be automatically used in the IIoT systems .
Conditions
An industrial system operates in the real world and its specific demands influence any Monetization Methods as well . Most operational conditions dictate the level of trustworthiness of this system 5 Error ! Reference source not found .. For example , safety regulations as part of trustworthiness could demand that a safety-related component must also work even if its subscription was not payed .
Monetization Methods
The most important parameter of the I ² M ² is the Monetization Method itself . Ideally the Model can describe many of such methods and the list of methods is open-ended for the future . But all of these methods use the other parameters of I ² M ², so they can also be compared to each other relatively easily . For example , the minimum IIoT Connectivity Quality Model Level ( Figure 8 ) could be a fixed parameter for a specific method .
5
IIC : The Industrial Internet , Volume G4 : Security Framework Technical Report , version 1.0 , 2016-Sep-26 , retrieved 2017-01-10 http :// www . iiconsortium . org / IISF
IIC Journal of Innovation - 13 -