IT in Manufacturing


Enhanced intelligence at the edge

February 2019 IT in Manufacturing

A new computing model that helps create autonomous edge nodes is changing the IIoT landscape. Edge nodes are data-aggregation points in an IIoT system, where the physical world of sensors and actuators interacts with computational resources such as IIoT gateway computers. This new computing model is based on edge nodes that are enhanced with local storage and computing power, in addition to machine-learning algorithms that enable them to process data locally and make quick decisions. An intelligent edge node enables faster decisions according to local identity management and access control policies, secures data close to its source, and reduces communication costs.

Edge intelligence is edge computing fortified with machine or self-learning algorithms, advanced networking capabilities, and end-to-end security. This article discusses four key elements of a good edge intelligence solution.

1. Localised data processing

The troves of data collected at the edge of a network can quickly lose their relevance. Hence, the data should be processed and useful insights derived from it at the earliest opportunity. Mission critical systems, such as healthcare and factory monitoring, require quality data measurements and instant decisions. In addition to being time consuming, sending data from the edge to the cloud can lead to data corruption and processed data without the required context.

For these reasons, the edge node should be equipped with the ability to process data locally and only key information should be sent to the cloud to develop data models. Edge nodes with local storage and processing capabilities keep the data closer to the source.

2. Real-time decision making at the edge

Edge intelligence enables real-time decision making at the edge nodes. Decision latency can be drastically reduced by enabling edge node analytics. Machine learning or self-learning algorithms can be developed locally or in the cloud and deployed at the edge to make the edge nodes autonomous, enabling quick decision making.

3. Robust edge-to-node communication

Data integrity is key in the edge-computing model because decisions are made at the edge node level. Data that is sensed and measured at these devices is of little use if the communication between the devices and the edge node is not consistent. No data loss or data corruption can be tolerated as the edge node is now responsible for making key process-related decisions. Other communication aspects to consider are range, bandwidth, device-to-device communication, the communication protocols to support, and how to power edge devices. A good edge network is one that is optimised for wireless sensor communication.

4. Secure edge

The lifecycle of an IIoT system is often longer than a traditional computing system as many edge devices remain in operation even decades after they were deployed. While servers and PCs are complex enough to allow for security provisions, IIoT nodes are usually low in power consumption and processing power. Edge-intelligence solutions equip the edge node with local storage and processing power and a varied set of software and hardware options help secure the edge devices and nodes. Some of the methods used to secure the edge nodes include:

• Secure edge platform with end-to-end security.

• Intrusion prevention systems (IPS).

• External hardware security.

• Secure boot capability.

Since edge nodes are the gateways to the physical world, when an edge device or node is compromised it is not just data that is at risk. Cyber attackers can now potentially access unsecure edge nodes and devices to interfere with industrial processes or shut down equipment resulting in financial loss and even life-threatening situations.



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Enhancing cyber security for industrial drives
Siemens South Africa IT in Manufacturing
The growing connection between production networks and office networks as part of IT/OT integration and the utilisation of IoT have many benefits for industrial companies. At the same time, they also increase the risk of cyber threats. Siemens ensures that your know-how and plants are protected at all times.

Read more...
Immersion cooling systems for data centres
IT in Manufacturing
The demand for data centres in Africa is growing. The related need for increasing rack densities brings with it escalating cooling requirements.

Read more...
Transforming pulp and paper with automation and digitalisation
ABB South Africa IT in Manufacturing
The pulp and paper industry in South Africa is undergoing a significant transformation from traditional manual processes to embracing automation technologies. Automation in pulp and paper mills aims to improve various production stages, from raw material preparation to final product creation.

Read more...
New world of process control: A completely web-based process control system
Siemens South Africa IT in Manufacturing
Control technology is crucial for gaining a competitive edge in the process industry. That’s why there’s SIMATIC PCS neo - the innovative ground-breaking process control system by Siemens.

Read more...
Protecting industrial networks with resilient defence
RJ Connect IT in Manufacturing
Network security is no longer just about preventing hacking or data breaches. For operational technology networks, resilient defence and consistent uptime are crucial. They are the core tenets that underpin Moxa’s guarded uptime and resilient defence (GUARD).

Read more...
The metaverse is now: are you ready to reimagine your business?
IT in Manufacturing
The convergence of the digital and physical worlds, driven by spatial computing and the metaverse, is rapidly reshaping business landscapes. This transformation extends beyond the mere novelty of virtual reality headsets and augmented reality filters, signalling a fundamental shift in how organisations operate, collaborate and innovate.

Read more...
AI and cyber security: South Africa’s next battleground
IT in Manufacturing
Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise, AI presents both an opportunity and a threat.Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise, AI presents both an opportunity and a threat.

Read more...
Technology won’t save your business from cyber threats
IT in Manufacturing
Artificial Intelligence is reshaping the landscape of information security, presenting both unprecedented opportunities and significant new threats.

Read more...
Addressing the cooling needs of the modern data centre
Schneider Electric South Africa IT in Manufacturing
The rise in hardware density in data centres is gaining speed and is largely driven by the demands of artificial intelligence and machine learning, requiring more powerful servers and specialised hardware.

Read more...
South Africa’s next cyber security frontier
IT in Manufacturing
AI-powered agents are rapidly transforming how South African businesses operate, from chatbots managing customer inquiries to automated systems processing financial transactions. While these AI-driven assistants increase efficiency and reduce operational costs, they also present a new, and often underestimated, cybersecurity challenge: identity management.

Read more...