https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/mobile-logo.png
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Metaverse
  • Development
  • Security
ioti.com

IIoT/Manufacturing


IoT App Development Gets Agility Boost From Container Technologies

IoT app development has clamored for greater agility, productivity and security. Container technologies can realize those benefits.
  • Written by Linda Rosencrance
  • 15th December 2020

For the most part, container technologies have been developed for traditional enterprise IT environments and have enabled modern cloud architecture. But there are also similarities and advantages to adopting containers for the Industrial Internet of Things (IIoT), according to Tim Winter, chief technology officer at Machfu, a provider of IIoT solutions.

A container is a lightweight virtualization technology that consists of an entire runtime environment: an application, plus all its dependencies, libraries and other binaries, and configuration files needed to run it, bundled into a single package. By containerizing an application platform and its dependencies, differences in operating system distributions and underlying infrastructure are abstracted away. 

“A container software development process creates a repository of  ‘stuff,’ which is your application and the supporting software, and it builds what’s called a container image – kind of like a layer cake of the application and supporting software,” said Harry Forbes, an analyst at ARC Advisory Group. 

According to research firm Gartner, more than 75% of global organizations will use containerized apps in production by 2022. 

The Benefits of Containers 

Because all application elements “containerized” into a package, the application can be shipped off to run on any computing environment, reducing complexity as applications are deployed and updated in different environments, Forbes said.

Containers can also benefit a fast-changing environment through their isolation. Modules interact with one another only through well-defined application programming interfaces (APIs) and are otherwise independent. Thus modules can be updated without affecting others, 

Isolation becomes important as the pace of changes and updates to applications increases. 

So too, containers also enable the Holy Grail of edge computing: that is, intelligent, or AI-enabled, processes at the edge.

“With the growing demand to process data in real time and avoid the high costs of transferring and storing the high-volume and high-speed raw telemetry data onto the cloud,” said Ayush Tiwari, senior IoT product manager, PTC, an IIoT solution provider, “more IoT users are preferring to pre-process the data, transform it and run their custom business logic right at the edge.” Then artificial intelligence and machine learning-enabled models can be trained and deployed via on-premises, isolated containers on edge devices.

In addition, because it’s critical to secure and update software deployed at the edge with the latest patches and features, it has become important to run containerized workloads that can be easily managed and operated from the cloud, he said.

“By shifting certain workloads to the edge of the network, connected products spend less time communicating with the cloud, can react faster to local changes in context, and operate reliably even in low-network bandwidth areas,” Tiwari said.

[For more coverage on Industrial IoT, take part in Industrial IoT World this December.}

Using Containers for IIoT Devices: Partitioning Improves Security

As such, containers are compelling for such non-enterprise uses as IIoT edge devices. Because these containerized packages and their contents are partitioned from one another and the rest of the system, they can be updated individually without affecting other containerized applications on the same server, according to Winter.

When using containerization technologies for IIoT, it’s important to think about the partitioning properties of a container (known as sandboxing), he said. 

“So, instead of having just one container that performs all the monolithic operations at the edge, could we have, conceptually, two containers? One container, for example, might be responsible for acquiring data and another container might be responsible for configuring the edge device,” Winter said.

Partitioning edge functionalities between different containers means one container can be granted greater privileges than another, Winter said.

“In the utility industry, there are different drivers for security and things like that where partitioning pieces of the application …  are advantages,” he said. 

An application component, for example, that periodically reads, assesses and reports alarms could be granted read-only privileges to interact with an edge device. However, an application whose role it is to perform a software upgrade on the edge device would have to have more privileges and would be secured in a different way, Winter said.

“From the enterprise side it may be like an administrator role, as opposed to a read-only data acquisition role,” he said. “So being able to partition the functions at the edge is consistent with modern security best practices.”

The ability to separate application components enhances implementation by preventing the behavior of one application from directly affecting another, and also allows developers to more easily enhance edge devices, according to Winter. In addition, implementing operating system-level controls and policies allows developers – by design – to better limit the potential effect of security breaches on a system. 

But because the applications are separated, developers have to implement an inter-process communication (IPC) scheme/remote procedure call (RPC) scheme so separate applications can interact within the edge node, Winter said. Developers also have to authenticate and control these IPC/RPC schemes so they allow only approved interactions, he added. 

“You really cannot run a process on the device itself in an industrial setting because most of the devices are very, very simple sensors and they have a very small CPU [central processing unit],” said Stefano Iannucci, assistant professor, Department of Computer Science and Engineering, Mississippi State University.

“So you really need to combine all these sensors and actuators in a way that they are orchestrated by some process that is necessarily run by other components,” he added.

These components can run either in the cloud or on the edge – and most of the time, these components run in containers.

“With the Industrial Internet of Things, you use containers to implement the functionalities that could not be otherwise implemented in the things themselves,” Iannucci said.

One benefit of containers for IIoT is that developers can create container development-and-deployment environments that enforce specific work and testing processes before they deploy applications into production environments, according to Forbes.

Forbes explained the steps necessary for developers to use containers to develop applications for IIoT.

“There’s a development pipeline … to create the repository, where they keep all the various versions of the software they have and the container system, such as Docker, which is the software that packages all this stuff,” Forbes said.

The container deployment then takes the elements from the repository, builds a container image, and pushes it out to a target system, he said. 

“And the target system is where the IIoT comes in,” Forbes said. “You may have one target system, you may have a hundred, you may have a thousand. And [using containers] it’s not significantly more difficult to update a thousand systems than it is to update one. “Containers are a very economical and excellent way to manage an application that you have running in a hundred or a thousand places.”

At the same time, containers don’t solve every problem, and indeed, they invite a few. Containers are ephemeral—they can be created and torn down easily—so visibility into them and tracking can be problematic.

Tags: IIoT/Manufacturing Other Content Features

Related


  • Key Considerations for Smart Light Switch Development
    Experts from Silicon Labs and Jasco Products discuss some of the most important considerations to keep in mind when designing a smart light switch, from hardware selection to determining which features to include in the final product. It’s important to consider the size of the device and regulatory requirements because these will influence so many […]
  • Case Study: Bringing a Complex Industrial Product to Market
    Given the unprecedented pace of technology today, speed-to-market is the number one priority for many customers. Developing complex technology as efficiently and cost-effectively as possible is what Benchmark does best, especially for applications that require reliability and precision, such as complex industrial products. Download this case study about Fluke and Benchmark now! Brought to you […]
  • Picking a Path: Build Versus Buy
    Every organization in our digital world must determine whether it is better to buy commercial off-the-shelf (COTS) software or build software that directly meets their needs. For many years, the argument has strongly favored buy. Historically, COTS has had several advantages: faster time-to-market, lower engineering costs, lower risk and immediate deployment for use. In this […]
  • Image shows welding robotics and a digital manufacturing operation.
    IoT Supply Chain Vulnerability Poses Threat to IIoT Security
    The supply chain provides building blocks for IoT but also vulnerabilities. IT pros need to ward against malicious attacks that exploit supply chain security gaps.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • Adoption of the Internet of Robotics Things Accelerates
  • Panel: Smart Manufacturing as a Driver for Business Outcomes – Investing in Industry 4.0
  • Argent Case Study
  • COVID-19 Poised to Build a Robotic Ecosystem

Roundups

View all

IoT Product Roundup: PTC, Nokia, Arm and More

19th May 2022

IoT Deals, Partnerships Roundup: Intel, Nauto, Helium and more

14th May 2022

IoT Product Roundup: Amazon, Synaptics, Urban Control and More

27th April 2022

White Papers

View all

The Role of Manufacturing Technology in Continuous Improvement Ebook

6th April 2022

IIoT Platform Trends for Manufacturing in 2022

6th April 2022

Latest Videos

View all
Dylan Kennedy of EMQ

Embedded IoT World 2022: Dylan Kennedy of EMQ

Dylan Kennedy, EMQ’s VP of global operations, sat down with Chuck Martin at Embedded IoT World 2022.

Embedded IoT World 2022: Omdia’s Sang Oh Talks Vehicle Chip Shortage

Omdia’s automotive semiconductor analyst sits down with Chuck Martin at this year’s event

E-books

View all

How Remote Access Helps Enterprises Improve IT Service and Employee Satisfaction

12th January 2022

An Integrated Approach to IoT Security

6th November 2020

Webinars

View all

Rethinking the Database in the IoT Era

18th May 2022

Jumpstarting Industrial IoT solutions with an edge data management platform

12th May 2022

AI led Digital Transformation of Manufacturing: Time is NOW

9th December 2021

Special Reports

View all

Omdia’s Smart Home Market Dynamics Report

7th January 2022

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

IoT Security Best Practices for Industry and Enterprise

20th October 2020

Twitter

IoTWorldToday, IoTWorldSeries

Explore Emerging Tech For Enterprises at @TechXLR8 2022 this June ➡️ Join us from 1-3 June in harnessing the pow… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

Clearview AI has been fined $9.4 million for collecting images of people from social media platforms to add to its… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

Swiss-startup Airyacht is developing an eponymously named vehicle that it says will take the luxury-yacht experienc… twitter.com/i/web/status/1…

23rd May 2022
IoTWorldToday, IoTWorldSeries

@Tesla’s #Autopilot being investigated once again following fatal crash in Newport Beach, California. iotworldtoday.com/2022/05/23/tes…

23rd May 2022
IoTWorldToday, IoTWorldSeries

A new Kansas law will enable #driverless deliveries from @Walmart and its partner @Gatik_AI. #AVs… twitter.com/i/web/status/1…

23rd May 2022
IoTWorldToday, IoTWorldSeries

Access a world of opportunity in 2022 with @IoTWorldToday ➡️ Now is time to unlock ROI, by accessing a global com… twitter.com/i/web/status/1…

23rd May 2022
IoTWorldToday, IoTWorldSeries

3D Home Printer to Build 72 Residences for National Homebuilder dlvr.it/SQhWSF https://t.co/XJOs70DqzH

19th May 2022
IoTWorldToday, IoTWorldSeries

Microsoft Ramping up Cybersecurity Service Offerings dlvr.it/SQhPR0 https://t.co/nYzaDRnyVY

19th May 2022

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X