1660238328261 Jimmontague0609

Six steps to implement effective edge computing

Feb. 26, 2020
Successful edge computing: Part 5

Five parts to successful edge computing

This is the final part in this series about edge computing. Read Parts 1, 2, 3 and 4 now.

  • Part 1: What and where is edge computing?
  • Part 2: Edge computing thrives in increasingly capable, embedded servers
  • Part 3: Edge computing provides flexibility for mobile applications
  • Part 4: How a data separation strategy to edge computing is effective for managing information

Because they all have microprocessors, Ethernet ports and software, practically every sensor, instrument, I/O point, switch, gateway, PLC or server is getting simpler to use and maintain. However, even easier-to-use edge devices still require users to learn and understand how to apply them in individual process applications. Here are some basic steps for implementing effective edge computing:

  1. Strive to identify pain points and  operations that could benefit from edge computing, even though potential opportunities may not be apparent in existing applications and networks;
  2. Recruit OT and IT staffs, who can show where edge computing might  solve problems and improve production, and invite all stakeholders to develop a plan for migrating to edge devices and software;
  3. Draft edge program specifications based on requirements, such as application cycles, lags and turnaround periods, and required response times to determine how close to real-time an edge-computing solution will need to be, or if a cloud service would be sufficient;
  4. Determine what data should be handled by local/edge devices, where to retain  it, and what should be reported to the cloud and administrative/business platforms, and on what schedule to deliver it;
  5. Research and decide which edge components and enabling devices will satisfy the edge project's requirements, such as where to locate computing functions, how to tie in legacy equipment, what Ethernet infrastructure and communication protocols to use, whether to employ wired or wireless, and linking to PLCs and servers; and
  6. Evaluate and enable the most appropriate cybersecurity capabilities are each stage of the edge computing application and its network.
About the author: Jim Montague

About the Author

Jim Montague | Executive Editor

Jim Montague is executive editor of Control. 

Sponsored Recommendations

Make Effortless HMI and PLC Modifications from Anywhere

The tiny EZminiWiFi is a godsend for the plant maintenance engineers who need to make a minor modification to the HMI program or, for that matter, the PLC program. It's very easy...

The Benefits of Using American-Made Automation Products

Discover the benefits of American-made automation products, including stable pricing, faster delivery, and innovative features tailored to real-world applications. With superior...

50 Years of Automation Innovation and What to Expect Next

Over the past 50 years, the automation technology landscape has changed dramatically, but many of the underlying industry needs remain unchanged. To learn more about what’s changed...

Manufacturing Marvels Highlights Why EZAutomation Is a Force to Be Reckoned With

Watch EZAutomation's recent feature on the popular FOX Network series "Manufacturing Marvels" and discover what makes them a force to be reckoned with in industrial automation...