What Is Driving Edge Computing and Edge Performance Monitoring?
September 23, 2019

Keith Bromley
Ixia

Share this

There is a fundamental shift currently happening in operational technology today — it's the shift from core computing to edge computing. This shift is being driven by a completely massive growth in data that has already started to take place. According to Cisco Systems, network traffic will reach 4.8 zettabytes (i.e. 4.8 billion terabytes) by 2022.

Businesses cannot continue as usual and still keep up with network performance, security threats, and business decisions. So, in response, network architects are starting to move as much of the core compute resources as they can to the edge of the network. This helps IT reduce costs, improve network performance and maintain a secure network.

However, is the shifting of resources to the edge the right approach?

It could have a negative impact to the network in terms of new security holes, performance issues due to remote equipment, and reduced network visibility.

At the same time, if the network changes are done right, the pendulum could swing to the other side and great there could be great improvements to network security, performance, visibility that take place.

The answer comes down to the deployment of the new architecture. The pivotal tactic is to deploy a visibility architecture that can support the application services and monitoring functions needed. You need network visibility more than ever to: access the data you need, filter it properly, inspect for security threats, and manage SLAs to keep the latency low from the core to the edge.

Two key components are necessary to a successful visibility in this situation — a network packet broker (NPB) and SD-WAN. The NPB provides data aggregation and filtering, application filtering, and performance monitoring all the way to edge devices. SD-WAN services can (and probably should) then be layered on top of the IP-based links to guarantee link performance, as Internet-based services can introduce unacceptable levels of latency and packet loss into the network.

Edge computing deployments have already started to begin. According to a report from Gartner Research, by year-end of 2021, more than 50% of large enterprises will deploy at least one edge computing use case to support IoT or immersive experiences, versus the less than 5% that are currently performing this in 2019.

When it comes down to it, while the promise of edge computing is real, the actual deployment scenario (and whether or not you build network visibility into your network) is what is going to make or break the performance of your new architecture.

Keith Bromley is Senior Manager, Solutions Marketing at Ixia Solutions Group, a Keysight Technologies business
Share this

The Latest

February 13, 2020

Over the last few decades, IT departments have decreased budgets in part because of recession. As a result, they have are being asked to do more with less. The increase in work has amplified the need for automation ...

February 12, 2020

Many variables must align for optimum APM, and security is certainly among them. I offer the following APM predictions for 2020, which revolve around the reality that we will definitely begin to see much deeper integration of WAN technology on the security front. Look for this integration to take shape in the following ways ...

February 11, 2020

When it comes to growing a successful company, research shows it isn't about getting the most out of employees, but delivering an experience that empowers them to be and do their best. And according to Priming a New Era of Digital Wellness, a new study conducted by Quartz Insights in partnership with Citrix Systems, technology is the secret to doing so ...

February 10, 2020

Only 11% of website decision-makers feel that they have complete insight into the scripts that they use on their websites. However, industry estimates state that about 70% of the code on a website comes from a third-party library or service. Research highlights a clear need to raise awareness of the potential threats associated with the vulnerabilities inherent in third-party code ...

February 06, 2020

The ever-increasing access and speeds offered by today's modern networks offer many advantages to businesses and consumers, but also make the integrity of their performance and security more paramount than ever before. Organizations are struggling to manage the constant fluctuations in network conditions and security threats. This has prompted many to explore how automation can help to streamline network management and security processes ...

February 05, 2020

The demand to deliver a consistently positive and innovative customer experience is something that many companies — more specifically, their DevOps teams — are currently grappling with. While the ability to push out multiple features a week may appear as a great accomplishment for DevOps teams, our survey showed that 82% commonly discover bugs in production ...

February 04, 2020

Ensuring reliable data security is a critical part of Application Performance Management (APM) — or at least it should be. The fact is, as a result of our need for speed, increasingly development teams are confronted with the problem of releasing applications faster without compromising security ...

February 03, 2020

To effectively deliver a great CX requires that the CX team, which represents the business requirements, and the IT/ digital team, which represents the technological possibilities and can execute on those, collaborate effectively. To better understand this dynamic, Cyara fielded research on the state of collaboration between IT/digital teams and CX professionals in North America ...

January 30, 2020

In response to noisier and more complex IT environments, operations teams are growing in size and using more monitoring tools. But timely outage detection, investigation and resolution are still a major challenge ...

January 29, 2020

This year, enterprises that have not yet moved to the cloud will need to take a look at their current strategy and make critical decisions as moving to the cloud is now a business imperative. Embracing a cloud native strategy will create new and exciting business opportunities and insights, however, there are also many complexities and obstacles standing in the way of success. The following are five critical elements needed for long term cloud native transformation success ...