I ² M ²— The Future of Industrial Internet Monetization
shown in Figure 8: In the cloud platform for example, the Internet should always be available, otherwise the cloud applications cannot be operated. This high-availability( level 4) is also typical between cloud services and the WAN connections which are used to connect to the LAN and the edge. But the connectivity level from the WAN and LAN at the edge itself to the internet can be much lower:
�
�
�
A typical internet connection from an office or a plant is not necessarily redundant, so the internet is typically available, but in many cases with no guaranteed minimum down time, defined as Level 3 of the Connectivity Quality. Many Operational Users of IIoT systems refuse typical permanent internet connectivity from a production or a power plant, for example, due to security reasons. In this case, they may want to restrict the internet access only during maintenance intervals, for example. Such“ limited by demand” availability is defined as Level 2. Even more careful Operational Users additionally restrict the format which can be used for data exchanged across the internet. One example is only permitting the exchange of files via special high-security gateways. Our model defines this as connectivity quality level 1.
�
The most restricted connectivity— no access at all— is defined as level 0 and is not considered in the I ² M ² because an IIoT operation cannot be established in this case.
But it should be clear that any widely accepted industrial Monetization Method must support more than just Level 4. So, typical payment methods which are established in the cloud and also frequently used with connected cell phones cannot be automatically used in the IIoT systems.
Conditions
An industrial system operates in the real world and its specific demands influence any Monetization Methods as well. Most operational conditions dictate the level of trustworthiness of this system 5 Error! Reference source not found.. For example, safety regulations as part of trustworthiness could demand that a safety-related component must also work even if its subscription was not payed.
Monetization Methods
The most important parameter of the I ² M ² is the Monetization Method itself. Ideally the Model can describe many of such methods and the list of methods is open-ended for the future. But all of these methods use the other parameters of I ² M ², so they can also be compared to each other relatively easily. For example, the minimum IIoT Connectivity Quality Model Level( Figure 8) could be a fixed parameter for a specific method.
5
IIC: The Industrial Internet, Volume G4: Security Framework Technical Report, version 1.0, 2016-Sep-26, retrieved 2017-01-10 http:// www. iiconsortium. org / IISF
IIC Journal of Innovation- 13-