JimMontague0609

Six steps to implement effective edge computing

Feb. 26, 2020
Successful edge computing: Part 5
Five parts to successful edge computing

This is the final part in this series about edge computing. Read Parts 1, 2, 3 and 4 now.

  • Part 1: What and where is edge computing?
  • Part 2: Edge computing thrives in increasingly capable, embedded servers
  • Part 3: Edge computing provides flexibility for mobile applications
  • Part 4: How a data separation strategy to edge computing is effective for managing information

Because they all have microprocessors, Ethernet ports and software, practically every sensor, instrument, I/O point, switch, gateway, PLC or server is getting simpler to use and maintain. However, even easier-to-use edge devices still require users to learn and understand how to apply them in individual process applications. Here are some basic steps for implementing effective edge computing:

  1. Strive to identify pain points and  operations that could benefit from edge computing, even though potential opportunities may not be apparent in existing applications and networks;
  2. Recruit OT and IT staffs, who can show where edge computing might  solve problems and improve production, and invite all stakeholders to develop a plan for migrating to edge devices and software;
  3. Draft edge program specifications based on requirements, such as application cycles, lags and turnaround periods, and required response times to determine how close to real-time an edge-computing solution will need to be, or if a cloud service would be sufficient;
  4. Determine what data should be handled by local/edge devices, where to retain  it, and what should be reported to the cloud and administrative/business platforms, and on what schedule to deliver it;
  5. Research and decide which edge components and enabling devices will satisfy the edge project's requirements, such as where to locate computing functions, how to tie in legacy equipment, what Ethernet infrastructure and communication protocols to use, whether to employ wired or wireless, and linking to PLCs and servers; and
  6. Evaluate and enable the most appropriate cybersecurity capabilities are each stage of the edge computing application and its network.
About the author: Jim Montague
About the Author

Jim Montague | Executive Editor

Jim Montague is executive editor of Control.