Brownfield IoT: Legacy Machine Connectivity Playbook (2026)

Brownfield IoT: Legacy Machine Connectivity Playbook (2026)

Brownfield IoT: Legacy Machine Connectivity Playbook (2026)

Last Updated: 2026-05-18

Walk into almost any factory built before 2010 and you will find a contradiction. The boardroom has a digital-transformation roadmap; the shop floor is still running PLCs commissioned during the Clinton administration. Industry surveys from the LNS Research, ARC Advisory, and McKinsey 2025 manufacturing benchmarks all settle on the same uncomfortable number: around seventy per cent of installed industrial control assets are more than fifteen years old, and a meaningful share still talks Modbus RTU over RS-485 to a controller whose vendor stopped patching firmware before TLS 1.2 existed. Brownfield IoT legacy machine connectivity is the discipline of bringing those assets onto a modern data plane without ripping them out, without voiding their warranty, and without taking down a line that has been producing acceptable parts for two decades. This playbook walks the 2026 reference architecture end to end — protocol bridging, retrofit sensors, edge gateway hardware and software, the OT/IT bridge, and the ROI math that justifies the spend. If you finish a brownfield rollout and the only thing the shop floor noticed is that the data is suddenly in the historian, you did it right.

What Brownfield IoT Means

Brownfield IoT is the practice of connecting existing, often pre-IP industrial assets — PLCs, RTUs, drives, sensors, building-management controllers — to modern data systems through protocol bridges, retrofit instrumentation, and edge gateways, rather than replacing the underlying equipment. The asset itself stays untouched; only the data path is modernized.

The term is usually contrasted with greenfield IoT, where a new line is engineered with native MQTT or OPC UA, IEC 62443-aware identity, and a unified namespace from day one. Greenfield is engineering. Brownfield is archaeology with a budget. A typical brownfield site has three to seven incompatible serial fieldbuses, two or three generations of proprietary OEM protocols, an undocumented BACnet building system inherited from a facilities contractor, and a mix of pre-IP and IP-native controllers that share neither time nor identity. The playbook has to handle all of them at once.

Three constraints define the work. First, the assets cannot be touched destructively. A 1998 injection-molding PLC running a validated tool may have qualification documents from a customer audit that took six months. Re-flashing it is not on the table. Second, downtime windows are scarce and expensive. A line producing automotive subassemblies at sixty parts per minute pays for an unplanned hour with five-figure scrap. Third, the safety boundary cannot move. Anything you do must keep the existing Safety Integrity Level (SIL) rating and the IEC 61508 / 62061 / 13849 evidence trail intact. Most of the brownfield IoT failures we have seen come from teams that forgot one of those three.

Once you accept those constraints, the rest of this post is about the patterns that work.

Reference Architecture for Legacy-to-Modern Integration

The 2026 reference for brownfield IoT is a five-layer stack that turns whatever ancient signal you can extract from the asset into a normalized, identity-bearing, MQTT-or-OPC-UA payload in a unified namespace, then makes it available to the historian, the digital twin, and the IT estate. It is intentionally boring, because boring scales.

Figure 1: Brownfield IoT reference architecture — legacy PLC/RTU through protocol-bridge edge gateway into a unified namespace and IT/cloud.

The contract between layers is what matters. Each layer hides a category of mess from the one above it, so a change in the field — a swapped drive, a new OEM, a firmware revision — never propagates past the edge gateway.

Layer 0 and 1 — Physical Asset and Legacy Control

The bottom two layers are exactly what they have been since the late 1990s. A physical asset (a press, a chiller, a VFD-driven motor) is controlled by a legacy PLC or RTU speaking its native protocol. The Fanuc CNCs speak Focas. The Allen-Bradley SLC500s talk DH+ over the original RIO cable. The Siemens S5s speak something older than the engineers maintaining them. The HVAC plant talks BACnet MS/TP, and half the field instruments still output 4-20 mA with HART superimposed. None of this is going to change voluntarily.

The architectural job at Layers 0 and 1 is to inventory. You cannot bridge what you have not catalogued, and the most common cause of a stalled brownfield program is a six-month “data discovery” phase that produces a spreadsheet nobody trusts. Use an automated discovery tool — Claroty, Nozomi Networks, Dragos, or the discovery features inside Inductive Automation Ignition and HighByte Intelligence Hub — to find every controller on the wire before you start writing drivers. Treat the inventory as a living artefact; it will move under you as the line evolves.

Layer 2 — Protocol Bridge / Edge Gateway

This is where the real engineering happens. The edge gateway is a small, ruggedized compute node that lives on the OT network, speaks every legacy protocol it can be coerced into, normalizes the resulting tags into a sane data model, buffers locally when the northbound link goes down, and republishes everything to a modern broker. Layer 2 is also where you decide what your data model actually is — what a “machine” means, what a “lot” means, what units you publish in, and how you encode quality and timestamp metadata.

The dominant products in 2026 are Inductive Automation Ignition Edge, AVEVA Edge (the modern descendant of InduSoft Web Studio), Kepware / KEPServerEX from PTC, HighByte Intelligence Hub for the data-ops side, Litmus Edge and Crosser for industrial flow processing, and Node-RED for the long tail of glue logic. We compare the hardware and software choices in detail under Edge Gateways below.

Layer 3 — Unified Namespace

The protocol bridge publishes into a unified namespace (UNS), almost always realized as an MQTT broker plus a topic hierarchy that mirrors the ISA-95 site / area / line / cell / machine path. The 2026 default is HiveMQ or EMQX brokers with Sparkplug B for state semantics, birth/death certificates, and template-based payloads. We walk the UNS pattern in detail in unified namespace architecture with HiveMQ and Sparkplug B (2026), and you have a parallel option in OPC UA PubSub — see the trade-offs in Sparkplug B vs OPC UA PubSub comparison (2026).

The reason the UNS is its own layer is that brownfield deployments inevitably accumulate multiple gateways from multiple vendors at multiple sites. Forcing them all to publish into a single namespace with a single naming convention is what turns “we have data” into “we can build a digital twin”.

Layer 4 — IT / Cloud

The top layer is whatever your IT estate already runs — a time-series historian (Aveva PI, InfluxDB, TimescaleDB), a digital twin service (Azure Digital Twins, AWS IoT TwinMaker), an MES/ERP integration (SAP, Oracle, Infor), and a BI surface (Power BI, Snowflake, Databricks). Brownfield work does not change this layer; it just feeds it cleanly. The discipline is to never let Layer 4 reach across the DMZ and poll a Layer 1 PLC directly, no matter how convenient. That single rule is what keeps the OT/IT boundary defensible.

The whole architecture is a careful exercise in narrow contracts. Layer 2 hides protocol mess from Layer 3. Layer 3 hides per-site naming from Layer 4. Layer 4 hides cloud sprawl from the operations team. When something fails, the layered model is what tells you which team to wake up.

Protocol Bridging: Modbus, Profibus, DH+, BACnet to MQTT/OPC UA

The bulk of brownfield engineering is protocol translation. There is no single right way to do it because the source protocols span four decades of design philosophy, but the patterns are well-understood.

Figure 2: Protocol bridge taxonomy — serial, proprietary OEM, and IP-native legacy protocols mapping to direct-driver, tunneling, OPC UA wrap, or file-scrape conversion strategies.

Modbus RTU is the path of least resistance. Almost every gateway product ships a battle-tested Modbus master that can poll holding registers, input registers, coils, and discrete inputs over RS-485 at typical 9600 to 115200 baud. The hard part is not the protocol; it is the register map. Vendors hide critical values in unmarked registers, scale them by arbitrary factors, and reuse register numbers across firmware revisions. Plan for a documentation excavation step for each asset class and store the resulting map under version control.

Modbus TCP is the same protocol over Ethernet and is trivial in comparison. Where you see Modbus TCP, the bridge is a few lines of configuration. The trap is that older Modbus TCP slaves were never designed for security and will happily accept connections from anywhere on the VLAN — make sure that VLAN is segmented.

Profibus DP and Profinet are the Siemens story. Profibus is dying gracefully — most new Siemens deployments are Profinet — but installed Profibus DP networks still drive millions of machines. The 2026 path is to put a Profibus master like the Anybus Communicator or the Hilscher netTAP on the segment, expose its values as Modbus TCP or OPC UA, and let the edge gateway consume from there. Profinet is IP-native and supports an OPC UA companion specification, so a direct OPC UA client on the gateway usually works.

Allen-Bradley DH+ and DH-485 are the Rockwell legacy story. The Prosoft Technology gateways and the older Equustek converters tunnel DH+ over Ethernet so a modern driver can reach it; from there, RSLinx or KEPServerEX exposes the tags via OPC UA. EtherNet/IP and CIP are the IP-native equivalents and are well-served by every OPC UA server in the market.

BACnet MS/TP and BACnet/IP are the building-side story. Tridium Niagara is the de facto standard for BACnet integration in 2026 and quietly underpins a large fraction of facilities IoT. Most edge gateways now ship BACnet drivers directly, but if your building stack already has Niagara, treat Niagara as the bridge and bring its data northbound rather than reinventing it.

Proprietary OEM protocols — Fanuc Focas for CNC, Mitsubishi MELSEC, Omron FINS, Siemens S7comm — are where the vendor matters. Kepware, Matrikon, and Ignition all maintain certified drivers; HighByte and Litmus integrate with those drivers rather than reimplementing them. Trying to reverse-engineer a proprietary protocol is almost always cheaper to buy than to build.

The catch-all pattern is OPC UA wrap. When you have a protocol that does not have a clean MQTT bridge — HART, an obscure serial format, a vendor’s REST API — wrap it in an OPC UA server first, then let the rest of the architecture consume from there. OPC UA is the universal middle term in brownfield, and its information-model semantics travel well into the digital twin.

The last-resort pattern, and we say this with no shame because everybody ends up here at least once, is file or FTP scrape. Some controllers will only emit CSV files to a local FTP server. Some legacy MES systems will only export a flat-file batch report every fifteen minutes. The bridge in those cases is a small, well-tested watcher that parses the files, normalizes them, and publishes the result. Document the choice openly so the next engineer does not try to “fix” it.

Two cross-cutting reminders. Polling cadence matters. Hammering a 1996 Fanuc with 100 ms Focas requests will crash the controller; respect the manufacturer’s published rate and prefer event-driven reads where the protocol supports them. Time and quality stamps are part of the payload. Every value the bridge publishes must carry a source timestamp (not the bridge’s clock), a quality flag, and an asset identifier. Without those, a year of data is unusable for analytics.

Retrofit Sensors When You Can’t Touch the PLC

Sometimes the controller is genuinely off limits. A validated medical-device line, a contractually warranty-locked OEM machine, a sealed UL-listed control panel — whatever the reason, you cannot add tags to the PLC and you cannot mirror its registers. The brownfield answer is to instrument the asset externally with non-invasive retrofit sensors, aggregate them through wireless gateways, and treat them as a parallel data stream.

Figure 3: Retrofit sensor placement and edge ingestion — clamp-on instruments, wireless aggregation, edge gateway, northbound to UNS and twin.

The retrofit sensor catalogue is mature in 2026. Clamp-on current transformers (Continental Control Systems, Accuenergy, Banner Engineering) attach over a phase conductor and give you motor current — which by itself is enough to compute load, detect stall, and infer mechanical wear. Tri-axial accelerometers for vibration (Banner QM30VT, IFM Vibration, Fluke 3563, Petasense) glue or screw onto a bearing housing and stream a few thousand samples per second over Bluetooth Low Energy. IR thermometers and contact thermistors measure surface temperature without piercing the asset. Ultrasonic level sensors read tank levels from above through a flange. Sub-meters with Modbus output read three-phase power from outside the panel.

The aggregation layer is where wireless protocols earn their keep. BLE 5 mesh carries vibration and temperature data from dozens of points to a single gateway. LoRaWAN and Mioty cover long-range, low-power telemetry across a sprawling plant or a remote yard. WirelessHART is the right answer when you already have a WirelessHART gateway and the process-industry instrumentation to feed it. Industrial Wi-Fi 6 / 7 carries higher-bandwidth retrofits like vision sensors and acoustic monitoring.

The edge gateway becomes both a protocol bridge for the controllers it can reach and an aggregator for the wireless retrofit fabric. This is where on-edge ML pays off. A vibration sensor producing a few thousand samples per second is not something you want to send unfiltered to the cloud; an FFT and a simple anomaly score on the gateway turn that firehose into a few hundred bytes per minute of meaningful state. Inductive Automation Ignition Perspective Module, AVEVA Edge analytics, and HighByte’s data-modeling functions all support this kind of edge processing without writing a line of Python — although Python and TensorFlow Lite remain the right call for serious condition-monitoring models.

The honest caveat with retrofit is that you are sampling, not controlling. A retrofit instrumentation network sees the world but cannot change it, and you must avoid the temptation to act on it through any back-channel into the safety-rated control. Retrofit gives you visibility, predictive maintenance, OEE, and energy data. It does not give you new control loops, and trying to make it do so is how brownfield programs end up in legal review.

Edge Gateways: Hardware and Software Choices

The edge gateway is the single most consequential decision in a brownfield rollout. It is the long-lived asset that runs ten years on a DIN rail in a humid plant. Get it wrong and every site visit costs you a service truck.

Figure 4: Edge gateway reference stack — hardware (Moxa, HMS, Advantech, Siemens, NVIDIA Jetson) under OS/container tier, connectivity software, and northbound publish/govern layer.

The 2026 hardware tier sorts into four buckets. Arm-based DIN-rail boxes like the Moxa UC-8200 and UC-8580 series, Advantech UNO, and Siemens IOT2050 are the workhorses for protocol-bridge duty. They run a hardened Linux, ship with serial and Ethernet on board, and sit happily on a control cabinet rail. x86 fanless industrial PCs like the Advantech WISE-PA series, OnLogic Karbon, and the Eurotech ReliaGATE family give you more headroom for heavier software stacks (Ignition Edge with multiple drivers, HighByte plus Crosser) and broader OS support. Protocol-multi-master appliances like the HMS Anybus Edge and Red Lion FlexEdge are pre-engineered for sites with many incompatible fieldbuses on one rail. Edge-AI nodes — NVIDIA Jetson Orin Nano / NX / AGX — earn their place where you also need vision processing, on-device inference, or fast vibration analytics.

The OS and container tier has converged. Yocto-based custom Linux ships on most ruggedized gateways and is now consistently good enough for production. Debian or Red Hat Device Edge work where the gateway is closer to an industrial PC. Container orchestration on the edge is mainstream in 2026 — K3s and MicroK8s for self-managed deployments, Azure IoT Edge or AWS Greengrass v2 for cloud-managed fleets. The pattern is one container per concern: protocol drivers in one image, normalization in another, MQTT publisher in a third, observability sidecar in a fourth. That decomposition is what lets you roll out a new driver without restarting the whole stack.

The software tier is where the brand wars happen and where you should expect to pay licence fees that genuinely matter at fleet scale. Inductive Automation Ignition Edge is the broad-stack favourite — drivers, a tag historian, an HMI, Sparkplug-native MQTT, all on one runtime. AVEVA Edge (the InduSoft / Wonderware lineage) is the natural pick where the IT side already runs AVEVA PI. Kepware / KEPServerEX remains the most-installed OPC UA server in the world and is the safe default for driver coverage. HighByte Intelligence Hub is the data-ops layer that sits between drivers and brokers and does the modeling, naming, and transformation work that nobody else does well. Litmus Edge and Crosser target the same data-ops space with stronger flow-based UIs. Node-RED is still the right answer for the long tail of “we just need this one CSV pulled in” cases — but resist the temptation to run a whole site on it.

The publish-and-govern tier is non-negotiable. Every gateway must publish over MQTT 5 with Sparkplug B or OPC UA with proper certificates, must export OpenTelemetry metrics and traces, must rotate its TLS certificates on a schedule, and must be remotely upgradeable through a managed control plane. If a gateway cannot do those four things, it is a future incident waiting to happen. The full protocol modularity story — clean separation between driver, normalization, transport, and identity — is laid out in modular IoT protocol architecture design guide (2026).

OT/IT Bridge and Security

The brownfield bridge is also a security boundary, and 2026 is the year that line stopped being optional. The Volt Typhoon and Lockbit campaigns from 2023-2025, the Colonial Pipeline lessons, and the cumulative pressure from regulators across the EU NIS2, the US CIRCIA, and the various national OT cybersecurity strategies have all made one point: an internet-reachable PLC is a corporate-risk-register item, not an engineering preference.

Figure 5: OT/IT bridge with industrial DMZ, IEC 62443 zones and conduits, segmentation, identity broker, and IDS monitoring.

The architectural pattern is the IEC 62443 zones-and-conduits model, which has effectively won as the lingua franca. Zone 0 is the cell or process where the PLCs live. Zone 1 is the plant-floor network, segmented per area or line. The industrial DMZ sits between OT and IT, and Zone 3 is the enterprise IT estate. Each zone carries a Security Level (SL1 through SL4) appropriate to the risk, and every conduit between zones is firewalled with a known protocol set.

The 2026 reference deployment puts the MQTT broker (HiveMQ Edge or EMQX Enterprise) and the historian connector in the DMZ. The edge gateways in Layer 1 push outbound to the DMZ broker; the DMZ broker is the only thing the IT estate ever talks to. Inbound connections from IT to OT are forbidden by firewall rule, with the narrow exception of a managed jump host for vendor service. Identity for both OT and IT consumers is brokered through an OAuth2 / X.509 service so the broker never sees long-lived shared passwords.

Detection sits in parallel. Claroty, Nozomi Networks, and Dragos are the dominant OT-aware IDS / anomaly platforms; they passively listen on a SPAN port and report deviations to a central SIEM (Splunk, Microsoft Sentinel). A well-instrumented brownfield site forwards both the IDS findings and the broker access logs to the SIEM so the SOC can correlate.

Two practical reminders. Patching legacy controllers is mostly impossible, so you compensate with compensating controls — segmentation, allowlisted comms, and detection. The IEC 62443 standard explicitly accounts for this with its “compensating controls” language; auditors are familiar with the pattern. Backup and recovery are part of security. A ransomware event that encrypts the edge gateway and the historian is recoverable only if you have offline backups of both the gateway configuration and the asset data. The 3-2-1 rule from IT applies just as cleanly in OT.

ROI Math and Phased Rollout

The board does not approve brownfield projects on architecture diagrams. They approve them on payback periods. Here is the math that actually works in 2026.

A medium-complexity rollout — eight machines across two lines, mix of CNCs, presses, and a chiller — runs in the ballpark of USD 30,000 to 60,000 for hardware (two edge gateways, retrofit sensors, network upgrades), USD 25,000 to 75,000 for software licences across the first three years (Ignition Edge, HighByte, broker), and USD 50,000 to 150,000 for integration labour depending on how clean the documentation is and how exotic the protocols are. Call it USD 150,000 to 250,000 all-in for a first site.

The return depends on what you go after. Energy submetering typically returns 5 to 15 per cent of the metered load once the data drives behaviour change, which in a USD 500,000-per-year energy bill is USD 25,000 to 75,000 per year. Unplanned-downtime reduction through vibration and current-based condition monitoring is the biggest needle-mover; published case studies from Augury, Petasense, and Senseye consistently report 20 to 40 per cent reductions in unplanned downtime on the instrumented assets. At a downtime cost of USD 5,000 per hour for a mid-size line, even a hundred avoided hours pays for the project. OEE improvements from cycle-time data and reject-rate analytics typically land 3 to 8 per cent OEE points after the first year. Quality-cost reduction through SPC-grade analytics on the historian comes more slowly but is the most durable.

A typical payback is twelve to eighteen months on the first site, six to nine months on subsequent sites once the patterns are reusable. The discount factor — and the reason brownfield programs stall — is that you have to fund the first site without the savings from the second.

The phased rollout pattern is consistent across successful programs. Phase 0 is inventory and a paid pilot on two or three assets that produce a defensible savings number in a single quarter. Phase 1 is one full line with end-to-end UNS integration, historian, and a basic dashboard. Phase 2 is the rest of the site. Phase 3 is the second site, using a templated deployment from Phase 2. Phase 4 is fleet-wide governance, including a central control plane for the gateways and a consistent twin model. Programs that try to skip Phase 0 fail in budget review; programs that try to skip Phase 1 fail in operations.

Trade-offs, Gotchas, and What Goes Wrong

Every brownfield program ships with a set of characteristic failure modes. Naming them honestly saves a lot of cycles.

The first is scope creep into control. A retrofit sensor network is for visibility. Engineers see clean data and start wanting to close loops with it. The moment you do that you have crossed into a safety boundary you did not engineer for, and the regulatory and insurance consequences are serious. Keep retrofit on its side of the fence.

The second is register-map decay. The vendor changes firmware, a register meaning shifts, and the historian quietly fills with nonsense for six months before anyone notices. Build automated unit-validity tests into the data pipeline — a torque reading outside a sane physical range, a pressure that goes negative, a temperature that flatlines — and alarm on them.

The third is gateway sprawl. Three vendors, four configurations, two operating systems, no central control plane. Within five years your fleet is unmanageable and every site visit costs a service truck. Standardize the gateway hardware and the software stack early, even at the cost of paying more per node.

The fourth is PLC overload. Polling cadences that look fine in the spec sheet melt a 1996 controller when combined with the existing SCADA traffic. Always negotiate cadence with the OEM, prefer subscriptions or change-of-state over polling, and have a backout plan.

The fifth, and the most expensive, is OT/IT politics. The OT team is on the hook for uptime; the IT team is on the hook for security. A brownfield project lives on the boundary and dies if either side is excluded from the design. Make the steering committee jointly owned from day one.

Practical Recommendations

If you are starting a brownfield IoT program in 2026, the decisions worth pre-committing to are:

  • Inventory before you bridge. Use a passive discovery tool (Claroty, Nozomi, Dragos, or the discovery features inside Ignition or HighByte) to enumerate every controller, version, and protocol before writing a single driver.
  • Standardize the edge gateway hardware and software. Pick one ruggedized hardware family and one software stack (Ignition Edge plus HighByte, or AVEVA Edge plus Kepware, or Litmus plus your broker of choice) and reuse it everywhere.
  • Publish into a single unified namespace. MQTT with Sparkplug B is the 2026 default; OPC UA PubSub is the strong alternative where you need rich type models. Pick one and force every gateway through it.
  • Retrofit where the PLC is off limits. Clamp-on current, vibration, temperature, and submetering give you 80 per cent of the analytics value without ever touching the controller.
  • Bake IEC 62443 zones and conduits into the architecture from day one. Put the broker in an industrial DMZ, never let IT reach into OT directly, and deploy an OT-aware IDS in parallel.
  • Phase the rollout and fund the first site honestly. Phase 0 pilot, Phase 1 first line, Phase 2 site, Phase 3 templated next site, Phase 4 fleet governance.
  • Invest in observability for the gateways themselves. OpenTelemetry, certificate rotation, remote upgrade, and managed control plane are non-negotiable in a multi-site fleet.

None of this is glamorous. All of it compounds.

FAQ

What is brownfield IoT?
Brownfield IoT is the practice of connecting existing industrial assets — legacy PLCs, RTUs, drives, sensors, and building controllers — to modern data systems through protocol bridges, retrofit instrumentation, and edge gateways, rather than replacing the underlying equipment. It contrasts with greenfield IoT, where a new line is designed with native MQTT or OPC UA, modern identity, and a unified namespace from the start. Most factories in 2026 are brownfield because seventy per cent of installed industrial control assets are over fifteen years old.

How do you connect a legacy PLC to the cloud?
The standard pattern is a four-step path. First, an edge gateway on the OT network speaks the PLC’s native protocol (Modbus, DH+, Profibus, Focas, MELSEC, S7comm, BACnet) using a driver from Kepware, Ignition, or a similar OPC UA server. Second, the gateway normalizes the tags into a clean data model with units, scaling, timestamps, and quality flags. Third, the gateway publishes the data over MQTT with Sparkplug B (or OPC UA) to a broker sitting in an industrial DMZ. Fourth, the IT estate consumes from the broker into a historian, digital twin, MES, or BI platform. The PLC itself is never touched destructively.

What is the difference between Modbus and OPC UA?
Modbus is a 1979 protocol designed for simple register-based communication between a master and slaves over RS-485 or TCP. It has no native security, no type system beyond 16-bit registers, and no information model — meaning has to be encoded out-of-band. OPC UA, standardized as IEC 62541, is a modern industrial protocol with built-in security (TLS, certificates), a rich object-oriented information model with companion specifications per industry, and support for both client-server and publish-subscribe (PubSub) patterns. Brownfield architectures typically use OPC UA as the bridge layer above whatever legacy protocols (including Modbus) the underlying assets speak.

What is the best edge gateway for industrial IoT?
There is no single best, but the 2026 leaders by category are: Moxa UC-8200 / 8580 and Advantech UNO for Arm-based DIN-rail gateways; HMS Anybus Edge and Red Lion FlexEdge for multi-protocol field appliances; Siemens IOT2050 for Siemens-aligned deployments; OnLogic Karbon and Eurotech ReliaGATE for heavier x86 stacks; and NVIDIA Jetson Orin for edge-AI workloads. On the software side, Inductive Automation Ignition Edge, AVEVA Edge, Kepware, HighByte Intelligence Hub, Litmus Edge, and Crosser are the dominant connectivity and data-ops stacks.

Is OPC UA replacing Modbus?
Not replacing — supplementing. Modbus is still the most-deployed industrial protocol and will be on factory floors for decades. OPC UA has become the dominant middle-term protocol for new integrations and is the standard for vendor-neutral information modeling. The pragmatic 2026 pattern is to leave Modbus where it is on the field side, run an OPC UA server on the edge gateway that wraps Modbus values into a typed information model, and let everything northbound consume OPC UA or MQTT.

Further Reading

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *