Connected Machines - MYS · • Provide formidable solution to address today’s cyber security...

16
Connected Machines

Transcript of Connected Machines - MYS · • Provide formidable solution to address today’s cyber security...

Page 1: Connected Machines - MYS · • Provide formidable solution to address today’s cyber security concerns • Meet IT requirements for control of security from SHOP to OFFICE • Create

Connected Machines

Page 2: Connected Machines - MYS · • Provide formidable solution to address today’s cyber security concerns • Meet IT requirements for control of security from SHOP to OFFICE • Create

Security Concerns at Every Level

Machine Network

Shop Network

Plant Network

Global Network

Page 3: Connected Machines - MYS · • Provide formidable solution to address today’s cyber security concerns • Meet IT requirements for control of security from SHOP to OFFICE • Create

Shop Floor Office/Enterprise

ERP

DNC

vlan

OEE

Page 4: Connected Machines - MYS · • Provide formidable solution to address today’s cyber security concerns • Meet IT requirements for control of security from SHOP to OFFICE • Create

• Provide formidable solution to address today’s cyber security concerns• Meet IT requirements for control of security from SHOP to OFFICE• Create a Communications HUB for one or more machines / device• Provide “free flow” OPEN communications via MTConnect to Enterprise or cloud• Expandable platform for future capabilities

Design Goals

Page 5: Connected Machines - MYS · • Provide formidable solution to address today’s cyber security concerns • Meet IT requirements for control of security from SHOP to OFFICE • Create

Launch Platform for IIOT!

Preemptive Diagnostics

Maintenance

Enterprise Integration

Utilization

Page 6: Connected Machines - MYS · • Provide formidable solution to address today’s cyber security concerns • Meet IT requirements for control of security from SHOP to OFFICE • Create

Security from Within

Adapter7878

Agent5000

VLANFactory NetworkCisco IE4000

WIN95/WIN98/WIN2k/WINXPProtect factory network from Legacy connections

Virtual Local Area NetworkAGENT runs on #2 core and exposes MTConnect to factory network

Page 7: Connected Machines - MYS · • Provide formidable solution to address today’s cyber security concerns • Meet IT requirements for control of security from SHOP to OFFICE • Create

Security from Outside

VLANFactory NetworkCisco IE4000

Protect equipment network from Hackers

Virtual Local Area Network

Page 8: Connected Machines - MYS · • Provide formidable solution to address today’s cyber security concerns • Meet IT requirements for control of security from SHOP to OFFICE • Create

Collection of Process Data

Adapter7878

Agent5000

VLANFactory NetworkCisco IE4000 Virtual Local Area Network

Page 9: Connected Machines - MYS · • Provide formidable solution to address today’s cyber security concerns • Meet IT requirements for control of security from SHOP to OFFICE • Create

Allow Process/software applications to communicate

VLANFactory NetworkCisco IE4000

WIN95/WIN98/WIN2k/WINXP

Access Control List (ACL)

Tool ManagementDNC, etc

Virtual Local Area Network

Page 10: Connected Machines - MYS · • Provide formidable solution to address today’s cyber security concerns • Meet IT requirements for control of security from SHOP to OFFICE • Create

Collection of Utilization / OEE Data

Adapter7878

Agent5000

VLANFactory NetworkCisco IE4000 Virtual Local Area Network

Page 11: Connected Machines - MYS · • Provide formidable solution to address today’s cyber security concerns • Meet IT requirements for control of security from SHOP to OFFICE • Create

Collection of Sensor Data for Maintenance

Adapter7878

Agent5000

VLANFactory NetworkCisco IE4000

Adapter7878

database

Virtual Local Area Network

Page 12: Connected Machines - MYS · • Provide formidable solution to address today’s cyber security concerns • Meet IT requirements for control of security from SHOP to OFFICE • Create

Analytics at “The Edge”

Streaming High Frequency Data

Ex. 100 HERTZ

High frequency Sensor Data------------------------------------Vibration(spindles)Temperature (Spindles,base)PH (coolant)Sound (db)Ambient temp

EdgeAnalytics

(EDGE of the Network)

Agent

• Data crunching at edge• Send results via MTConnect/XML• Big Data integration• Pre-emptive Diagnostics

Page 13: Connected Machines - MYS · • Provide formidable solution to address today’s cyber security concerns • Meet IT requirements for control of security from SHOP to OFFICE • Create

(Data Dictionary) MTConnect (Implied Semantics / Expressed meanings)

NewMachines

Paint Systems Assembly

MaintenancePre-emptive Diagnostics

Sensors

Utilization(Merlin)

Capacity Planning

MES(Merlin)

Enterprise Resource Planning (ERP)

OEE(Merlin)

Pure

Workplace Safety

Tool Management

Tool Presetters CMMsAnodizing

Lines

iSmartCurrentFocus

LegacyEquipment

Press Brakes Grinders Wire EDM

Quality

Simple Dashboards

DatabaseMicrosoftDynamics

ProfibusEthernet I/POPC-UA

Page 14: Connected Machines - MYS · • Provide formidable solution to address today’s cyber security concerns • Meet IT requirements for control of security from SHOP to OFFICE • Create

Allow OEM/Mazak secure access to Device or system

Agent5000

VLANFactory NetworkCisco IE4000

Mazak Service

VPNSecure Tunnel

Virtual Local Area Network

Customer must have Specific type VPN and IT dept capabilities / support

Page 15: Connected Machines - MYS · • Provide formidable solution to address today’s cyber security concerns • Meet IT requirements for control of security from SHOP to OFFICE • Create

Unsecure Method Secure Method via Mazak SmartBox

1 1. Basic Visualization 1. Basic Visualization

2 1. Basic Visualization 2. Utilization

1. Basic Visualization 2. Utilization

3 1. Basic Visualization 2. Utilization3. Overall Equipment Effectiveness (OEE)

1. Basic Visualization 2. Utilization3. Overall Equipment Effectiveness (OEE)

4 Highest level of integration Not possible without a secure platform

1. Mazak Cloud (Maintenance)2. Secure File Transfer3. Monitoring system of your choice(OEE)4. Secure Remote access to equipment via VPN

Page 16: Connected Machines - MYS · • Provide formidable solution to address today’s cyber security concerns • Meet IT requirements for control of security from SHOP to OFFICE • Create

Thank You!