google-site-verification=OSgqRs2WBTnLZB-qEi6JUxfnfPPF_44ULyF0ibKfBuw
top of page
  • What is the difference between the Data Commander™ and the IIoTA™ MES platforms?
    The IIoTA™ not only incorporates but builds upon all the innovative features the Data Commander™ MES Gateway Appliance offers manufacturers. The features that awarded the Data Commander™ the 2018 Hardware and Software Innovation of the year include the ability for production engineers to securely move data between the plant floor machines and the enterprise-level databases on the IT side without a PC. The point-and-click nature of the Data Commander™ provides easy deployment in minutes vs. days or even months. The Data Commander™ and certainly the IIoTA™ can be utilized to provide end-users with real-time information for Manufacturing Execution, Statistical Process Control, Quality Assurance and Control, Key Performance Indicators (KPIs), and Six Sigma feedback. Building upon the innovative features offered by the Data Commander™ line, the IIoTA™ platform goes above and beyond by delivering: • Higher performance (increased from 800MHz to 1GHz CPU) • A 3x Increase in memory (increased from 4GB to 32GB) • The ETH1 RJ45 LAN port is upgraded from 10/100 baseT to 1 GB • A fully functioning, integrated Database Server, DB2 for the stand alone IIoTA™ and MySQL for the DIN mount IIoTA MiNi™. • Optional addon’s for customized user-configurable dashboards, integrated product traceability & skip check, all available within the same form factor of the traditional Data Commander™ . elliTek’s Workflow Management software tool provides the built-in capability to manage product traceability and can be used as a means of skip check. This functionality offers a lineside means of confirming the process flow of products through the line. A complete database server can be implemented allowing users to store data lineside, consequently eliminating network latency or high-level connection concerns. Because the IIoTA™ platform is lineside and standalone, it is unaffected by situations such as loss of connection to the main database while preserving the ability to store process results data into the main database for historical purposes. This equates to continued production even when network connection downtime events occur.
  • How is the IIoTA™/Data Commander™ different than other data exchange software?
    Unlike most data exchange software, the firmware on the IIoTA™/Data Commander™ is capable of STORED PROCEDURES along with Selects, Inserts, Updates, etc. as part of its bidirectional communication with a database which means the logic of whole processes can be triggered with a single bit from the PLC. The IIoTA™ and Data Commander™ platforms do not use APIs for you to write code like traditional platforms do for a typical interface with enterprise (IT) applications. Connections are made via TRANSPORTS. The IIoTA™/Data Commander™ are secure GATEWAYS between your OT and IT networks that utilize point-and-click to map data. The IIoTA™/Data Commander™ are dedicated appliances. Read more about why that is so important. The IIoTA™/Data Commander™ speak natively. elliTek produces a monthly podcast. Here are links to a couple of episodes where we talk about industrial IoT and security. "Industrial Automation - It Doesn't Have To... Be Overwhelming" "Industrial Automation - It Doesn't Have To... Be Like Colonial Pipeline" "Industrial Automation - It Doesn't Have To... Lag"
  • What can the IIoTA™/ Data Commander™ do?
    The IIoTA™/Data Commander™ can communicate directly with devices and can provide secure, isolated connections directly with database tables or servers.
  • How can the IIoTA™/Data Commander™ be deployed?
    The IIoTA™/Data Commander™ can be utilized to provide you with real-time information for Manufacturing Execution, Statistical Process Control, Quality Assurance and Control, Key Performance Indicators, and Six Sigma feedback.
  • How does the IIoTA™/Data Commander™ RECOGNIZE devices and enterprise systems on the network?
    Our appliance has a comprehensive library of drivers, so it is an intelligent network device which can quickly connect to PLCs, robots, vision systems, scales, printers, IoT devices, etc. Within minutes, the IIoTA™/Data Commander™ can be viewing all the data in a PLC, transferring it, and reacting to changes in any item of data.
  • How does the IIoTA™/Data Commander™ address SECURITY issues?
    A method of translating data between the Enterprise side and the Devices side assures SECURITY, which is isolated Ethernet and serial ports, using their own MAC addresses and drivers. Hackers and malware cannot penetrate the IIoTA™/Data Commander™, so no one can accidentally or intentionally modify a program or see the devices.
  • What happens on the DEVICES side?
    DEVICES can be set up, monitored and logged by the IIoTA™/Data Commander™. It can also Listen to the devices, capture events, consolidate this data from several devices, and control the process, or send it up to a higher computer and await instructions for the next step.
  • What happens on the DATABASE side?
    The IIoTA™ and IIoTA MiNi™ have an integrated database server resulting in an industrial IoT system that can be configured to operate 100% stand alone. No enterprise network is required. Because the data server is locally integrated, data can be captured without the need for an external storage area. Further, this allows a stand alone production line to meet traceability and defect flow-out prevention requirements without implementing a costly network infrastructure.
  • What PROGRAMMING is required?
    NONE. Set up is simple, using Connections, Transports to databases, Listeners to devices, Triggers which handle the data coming into the Listeners, and internal SQL database, a set of Trigger steps which are filled in with point-and-shoot to data in communications packets, internal variables, and the data registers in the floor devices. All programming is accomplished through our Windows application, Workbench interface. So, the internal programs are not accessible or decipherable by any other computers.
  • What PROCESS DECISIONS is the IIoTA™/Data Commander™ capable of performing?
    There are several ways to include decision making using the firmware application on our appliance. Each Trigger from the PLC, initiating an event of the IIoTA™/Data Commander™, has a myriad of actions available for PROCESS DECISIONS that include scheduling, equations, and more.
  • How can I use the IIoTA™/Data Commander™ to achieve ZERO DEFECTS?
    Because the IIoTA™/Data Commander™ can talk amongst PLCs (peer-to-peer), as well as, translating between the PLCs and the databases, our customers have easy access to three types of pass/fail to accomplish ZERO DEFECTS: Part parameters (one PLC/machine/station) Assemblies across multiple stations: “skip check” (multiple PLCs/machines) Sub-assemblies across the production lines on the factory network and from plant to plant (database/OT-IT network)
  • What LOGGING capabilities does the IIoTA™/Data Commander™ offer?
    LOGGING is configurable down to every Trigger for a type of data from each computer or device on either side.
  • Does the IIoTA™/Data Commander™ have REPORTING features?
    REPORTING can show every execution step of a Trigger, and the data in and out, for easy debugging. INFORMATION: For each assembly line, the IIoTA™/Data Commander™ can provide real-time production data, from simple lights and logging to large flat screen displays. Data can be fed to factory-level visualization systems.
  • What happens in the event of a network interruption?
    With the IIoTA™ and IIoTA MiNi™, there is no need to worry about network interruptions or failures. The IIoTA™ MES platforms are edge based appliances, so the network response time is not affected by external network traffic or enterprise network failures. The IIoTA™ and Data Commander™ also have a store and forward feature that will maintain data flow regardless of a network interruption.
  • What features do the IIoTA™ and IIoTA MiNi™ have?
  • How much does the IIoTA™ and IIoTA MiNi™ cost?
    Pricing is based on device (PLC, press tool, etc.) connections. No device software is required. All drivers “speaking” the native protocols of the devices are included on our appliance, e.g. no Rockwell software is needed to exchange database records with AB PLC tags. No system integrators required. Only connection needed is an ethernet port. No security updates or OS maintenance required. It replaces PC’s or isolates current production line PC’s from the devices.
  • Where can I buy the IIoTA™ and IIoTA MiNi™?
    Contact elliTek at (865) 409-1555 or info@ellitek.com.
  • Do the IIoTA™ MES platforms have a warranty?
    Yes. elliTek, Inc. (“elliTek”) provides a limited warranty for its products covering defects in materials and workmanship for a period of one year from the date of original purchase. The limited warranty is available on the elliTek web site at www.ellitek.com, or you may obtain a copy by contacting elliTek’s primary office by mail at 7139 Regal Lane, Knoxville, Tennessee 37918, or by phone at (865) 409-1555. Only the original purchaser of an elliTek product from elliTek or an authorized reseller is covered under the limited warranty. The limited warranty does not cover damage from misuse, improper maintenance or repair or acts of nature, and certain other exclusions apply as more particularly described in the warranty. Also, consequential and incidental damages are not covered under the warranty. Except as otherwise provided by law, the limited warranty is the exclusive remedy for claims against elliTek associated with elliTek products. EXCEPT AS PROVIDED IN THE LIMITED WARRANTY OR AS REQUIRED BY LAW, ELLITEK PRODUCTS ARE SOLD ON AN “AS IS” BASIS WITHOUT WARRANTY OF ANY KIND. TO THE MAXIMUM EXTENT PERMITTED BY LAW, ELLITEK SPECIFICALLY DISCLAIMS ANY AND ALL IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, WARRANTIES OF TITLE, MERCHANTABILITY, INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE, AND IMPLIED WARRANTIES ARISING FROM A COURSE OF DEALING OR COURSE OF PERFORMANCE. A Return Merchandise Authorization (RMA) request form can be found here.
  • Can I reset my IIoTA's IP addresses back to default?
    Yes, resetting your IIoTA™ allows you to return the IP address assignments to the factory settings without compromising existing programs and settings. Follow these instructions for the stand alone IIoTA™: 1. Power OFF the IIoTA™ 2. Fully press and HOLD the RESET button 3. Press and RELEASE the POWER button. Ensure the red POWER indicator remains illuminated. 4. Continue HOLDING the RESET button for 25 seconds 5. Release RESET button - the IP addresses will be reset to: ETH0: 192.168.1.68 / 255.255.255.0 ETH1: 10.10.10.10 / 255.255.255.0 Follow these instructions for the DIN Mount IIoTA MiNi™: 1. Power OFF the IIoTA MiNi™ 2. Switch to the RESET position 3. Power ON the IIoTA MiNi™ 4. After 25 seconds, move the switch back to NORMAL 5. The IP addresses will be reset to: ETH0: 192.168.1.68 / 255.255.255.0 ETH1: 10.10.10.10 / 255.255.255.0
  • What we may need to know to help you.
    What problems do you need to solve, what process improvements would you like to make, and what new information would you want to have to facilitate these things? What equipment would you like to connect eventually? What would need to be connected initially to give some immediate value? What is available for connection in a demonstration? What databases and upstream MES, QC, SQA, and other systems do you want to connect? What are the makes and models of the PLCs they are controlling? What Machine Tools to you want to connect? What communications protocols do they use, or do they have another controller on them with which we can connect the IIoTA™? What Robots, Vision Systems, Scales, Printers, etc. do you want to connect? Where does everything sit on the network relative to each other: tools, PLCs, PC w/ applications, local database, MES or ERP?
  • What is the String Builder function for the IIoTA™?
    The String Builder action builds a string from multiple constants and variables. This can be used to build (or concatenate) a single output string from multiple strings variables and constants. Format String: Enter the set of text and substitution variables that are used to build the single output string. The Input tab appears when you type the first substitution variable in the form of $(). For example: $(TEMP). A row is added to the Input tab for each substitution variable, in this example TEMP. If you want to include a $ character as part of the text, you must use double $$ characters. Otherwise, the $ character will not appear in the output. For example: $$5.75. Maximum Output Size: Available when the Use Advanced Properties checkbox is selected. Defaults to 1024. This parameter controls the maximum size of the Output parameter on the Output tab. Input Tab The Input tab appears when you type the first substitution variable in the form of $() in the Format String parameter. The Input tab lets you map substitution variables to variables or constants. A row is added to the Input tab for each substitution variable, in the example TEMP, VATID and BATID would be the added rows. The substitution variable is mapped to any trigger macro, constant, started device variable, trigger local variable, trigger static variable or trigger event variable by selecting the Value cell for the row. Once the cell is selected, a drop-down list of the available items is displayed. Output Tab The output variable that receives the result of the multiple input parameters and text concatenated into a single string. For the example Format String: Temperature $(TEMP) Celsius from vat $VATID) batch $(BATID) Where: TEMP is mapped to a device variable with the value of 20 VATID is mapped to a device variable with the value of 100 BATID is mapped to a device variable with the value of 2 Then the output string would be: Temperature 20 Celsius from vat 100 batch 2. Supported control characters The String Builder action supports control characters for the output of the action. The following control character patterns will be accepted: Pattern Result \t: The tab character \r: The line feed character \n: The new line character (0x0A) \xNN: Any character specified in hexadecimal notation, for example \x35 will print the number 5. Warning: use of \x00 to specify an embedded null should not be used. \0: Null - not supported for embedded nulls. String functions that use the length of the string when processing will not give the expected results. \\: Places a backslash \ character
  • How does the String Compare function work on the IIoTA™/Data Commander™?
    A String Compare action compares strings based on a specific criterion such as exact match. Parameter description This action compares all or part of a string with another string. You must specify whether to use case sensitivity and the number of characters in the string to compare. Comparison Method The comparison criteria options are: Exact Match — The input string must exactly match the search string. Starts With — The input string must start with the search string. Ends With — The input string must end with the search string. Contains — The input string must contain the search string. Ignore Case Indicates if the comparison is case sensitive. The options are: True — Do not apply case-sensitivity. The string comparison is insensitive to uppercase and lowercase letters. False — Apply case sensitivity. The string must exactly match uppercase and lowercase letters. Input tab String: The input string, which will be compared to based upon the Comparison Method and the Search String parameter. Search String: The pattern to match or find in the String parameter. Routing tab True: Route to take when the comparison is successful (pattern found based on the Comparison Method) in the String parameter. False: Route to take when the comparison is not successful (pattern is not found based on the Comparison Method) in the String parameter. Failure: Route when there is a failure.
  • Where can I find more Technical Information?
    Specific tutorials, white papers, and downloads are located on our resources page here. Our blog has different entries that include security presentations. If those resources do not provide the technical information required, we host one-on-one web conferences to engineer individual applications. Click here to request a conference call.
bottom of page