Download PDF

Bakkersland Goes Automatic with eWON Remote Maintenance

The main concern of the Bakkersland company is the possible standstill of machinery in a production process. Any standstill situation could lead to delays in the logistic process.

more...
  • SUPPLIER
  • HMS Networks
    HMS Industrial Networks is the leading independent supplier of products for industrial communication. HMS develops and manufactures solutions under three brands: Anybus, IXXAT and eWON. HMS products enable industrial devices to connect to different industrial networks and also be monitored and controlled remotely. The company is headquartered in Halmstad, Sweden and has development centers in Germany and Belgium. Local sales and support are handled by branch offices in China, Switzerland, France, Germany, Italy, India, Japan, UK and USA, plus distributors in more than 50 countries. HMS employs over 450 people and is listed on the NASDAQ OMX Nordic Exchange in Stockholm. HMS manufactures and markets industrial communication products which connect industrial devices to different industrial networks. HMS products act as translators between robots, control systems, motors, sensors, etc. and the different industrial networks that exist on the market (fieldbuses and Industrial Ethernet). HMS also offers products for Remote Management - web-based control of field equipment such as Power Generators, Tanks, Telecom Base Stations, Buildings etc.
  • INDUSTRIES
  • Construction & Buildings
  • FUNCTIONS
  • Maintenance
  • CUSTOMER
  • Bakkersland BV operates bakeries across the Netherlands. It produces and supplies an assortment of daily fresh bread, rolls, donuts, patisserie products, pastry specialties, seasonal specialties, cakes, and bake-off products for the retail industry. The company was founded in 1999 and is based in Hedel, the Netherlands. Bakkersland BV is a former subsidiary of Bakkersland Groep B.V.

  • CONNECTIVITY PROTOCOLS
  • SOLUTION
  • The eWON routers are installed in the control room next to the PLC on the DIN rail. The structure works online and can provide a remote supervision of the machine to the operator through a secure VPN connection. The VPN connection enables the operator to avoid virus and prevent outside people from wanting to gain access to sensitive information.

  • DATA COLLECTED
  • Alarms For Automated Applications, Connectivity Status, Production Efficiency, Throughput Per Machine
  • SOLUTION TYPE
  • SOLUTION MATURITY
  • Cutting Edge (technology has been on the market for < 2 years)
  • OPERATIONAL IMPACT
  • Impact #1
    [Efficiency Improvement - Operation]
    Problems are indicated to line operators when the condition of a device or associated equipment changes beyond predetermined limits.
    Impact #2
    [Efficiency Improvement - Labor]
    Employee efficiency is increased since the machine manufacturer has no need to send an engineer out.
    Impact #3
  • QUANTITATIVE BENEFIT
  • USE CASES
  • Intrusion Detection Systems
    Intrusion detection systems monitor network traffic and search for suspicious activity and known threats, sending alerts when suspicious activity is identified. The overall purpose of an intrusion detection system is to inform IT personnel that a network intrusion has or may be taking place. Alerts will generally include information about the source address of the intrusion, the target/victim address, and the type of attack that is suspected. Each IDS is programmed to analyze traffic and identify patterns in that traffic that may indicate a cyberattack of various sorts. ID systems are being developed in response to the increasing number of attacks on major infrastructure and commercial sites and networks, including those of the Pentagon, the White House, NATO, ports, and electrical grids. The safeguarding of security is becoming increasingly difficult because the possible technologies of attack are becoming ever more sophisticated; at the same time, less technical ability is required for the novice attacker, because proven past methods are easily accessed through the Web. The adoption of IoT technologies also provides new avenues of attack through end points, such as connected devices, that often have weak security features.
  • HARDWARE
© 2020 IoT ONE