Improving Asset Management with IIoT
25th April 2018
Presented by:
Mike Devrell
Image source: Adapted from original by Wilgengebroed
Agenda
What is the Internet of Things (IoT) and IIoT?
Preventable Field Failures
Technology
Intelligent Asset Management
Improving Site Performance
Industry Acceptance & Security
Redefining Flow Control 1
What is the Internet of Things (IoT)?
2
The world will have 20.4 billion connected devices by 2020, predicted by Gartner.
Isn’t IoT just connecting things to the Internet? For the consumer this may be their doorbell, fridge, toaster, mirror…
What is the Internet of Things (IoT)?
3
In 2010 Ericsson’s former CEO Hans Vestburg predicted 50 billion connected devices by 2020
In 2011 Cisco also predicted 50 billion by 2020
In 2012 IBM predicted 1 trillion connected devices (The world’s population is 7.5 billion people, so 133 devices each!?)
Where are we now?
– In 2017 we had 8.4 billion (source: Gartner)
These early predictions generated a lot of investment
The Internet of Things is not about Things!
4
Where are my 1 trillion devices?
The majority will be consumer devices, but IoT technology has a growing adoption in industry too (IIoT)
IoT is not about things, or even the internet, it’s about data
Specifically real-time data, combining multiple data sources together to make smart, timely decisions that save money, save time, increase safety and improve performance
The Internet of Things is not about Things!
5
IoT in Industry
6
IoT in industry has most value in improving asset management
Several sources define Asset Management as the"coordinated activity of an organisation to realise value from assets”
The art and science of making the right decisions and optimising the delivery of value
Preventable Field Failures
7
Pipeline valve diagnostics
Pump starts
Preventable Field Failures
8
Actuator rated torque was above calculated required value including 1.5x safety factor
Effect of starting pump was underestimated, able to control pump using VFD to prevent tripping
Preventable Field Failures
9
Gearbox diagnostics
Preventable Field Failures
10
Preventable Field Failures
11
Preventable Field Failures
12
Preventable Field Failures
13
Preventable Field Failures
14
Actuator ejection
Technology – 1920s
15
Technology – 1920s
16
Technology
17
Rotork is an innovator and market leader in providing Intelligent Asset Management (iAM)
– In 1993 a datalogger option was introduced to IQ Mk1
– In 2000 the datalogger became standard
– IQ3 adds enhanced asset management features
Rotork continues to invest in IIoT / Industry 4.0 / Smart Factory technology to automate collection of field data
This allows interconnected and intelligent systems to enable smart, timely and data-driven decisions to be made
Technology
18
Why doesn’t existing device data get used?
– Difficult to collect
• Legacy fieldbus and control systems
• Hazardous areas: IECEx, ATEX, CSA, etc.
• Confined spaces
• Environmental challenges
• Cost of tools and software
– Different methods for different equipment
– System required to record data
– Data collection is time consuming
Technology
19
Actuators are getting smarter
The data is not always used
IIoT helps to gather data
Intelligent Asset Management
20
ISO 55000 - Set of 3 standards (from BSI PAS 55:2008)
Intelligent Asset Management
Redefining Flow Control 21
Intelligent Asset Management
Redefining Flow Control 22
Intelligent Asset Management
Redefining Flow Control 23
Intelligent Asset Management
Redefining Flow Control 24
Improving Site Performance
Redefining Flow Control 25
Operational Stability
Predictive Diagnostics Installed
Industry Acceptance
26
Acceptance is a challenge
Rotork’s customers are actively connecting their sites to wireless based services
Some large companies saying “wireless communication will become more secure than wired”
– Wireless protocols are generally recent, with high levels of security
– Wired networks such as Modbus and Profibus have limited security
Security
27
Security is extremely important
– Security cannot be added, must be built in from design stage
Solutions
– Secure design, don’t assume an attack won’t be attempted
– Layered Defence
– Use of certificates
– Use of strong passwords
– Solution appropriate for use case
– Application specific