Why You Should Consider Visibility and Performance Monitoring for Edge Computing
January 15, 2020

Keith Bromley
Ixia

Share this

Edge computing usage is starting to increase. See my previous posting from September 2019 that illustrates what is driving this network change. The obvious follow-up question is, "So, what can I do with edge computing?" I'm glad you asked. There are lots of things you can do.

In fact, here are six fundamental use cases that you allow you to:

1. Improve network visibility

2. Improve network performance monitoring

3. Reduce the cost of MPLS circuits for transport

4. Improve troubleshooting capabilities

5. Enhance endpoint security

6. Upgrade compliance support

Improving network visibility is the first use case. Use of IP enables NOC engineers to see all the way out to the edge of the network. They can use application intelligence to look at application performance and NetFlow information to these locations. Currently, many (maybe most) enterprises lose visibility for the "last mile" of their network. This is especially true when using Telco circuits.

So why is this important? Are there potential problems (outages) getting ready to happen? Without visibility — who knows. It's easy to know once it happens but this puts IT into a reactive position that consumes more time, more money, and creates unnecessary problems for customers and senior management. It would be better if you could start to "see" the problem before everything goes bad.

Taking this one step further, a network packet broker (NPB) equipped with proactive performance monitoring features integrated into the architecture provides the NOC with an easy way to check latent network performance and also the ability to actively test performance at will all the way to the edge using synthetic traffic.

Network and IT teams need remote access to server and network traffic activity for performance monitoring and troubleshooting. Active monitoring (also known as "synthetic monitoring") is used to actively monitor latency/performance of WAN/SD-WAN links. This type of tool simulates traffic by sending synthetic packet data to various endpoints across the network to measure performance metrics.

Enterprises also want to reduce, if not eliminate, MPLS circuit costs and move to IP links. Remote sites typically have low speed internet access (100 MB). IP gives them more flexibility, less headaches (as they don't have to strip off MPLS headers), and lower cost to get IP links from ISPs and CLECs.

Troubleshooting can also be improved with edge computing. The shift to IP links allows the NOC to use IP-based tools and application intelligence to troubleshoot problems as fast as possible, all the way to the edge of the network.

Network security can be improved by placing next generation firewalls (NGFW) right up to the edge. A NPB is very useful here to integrate the security device along with other edge devices and capabilities into the network.

With regard to regulatory compliance, several organizations (including utilities) require that all control traffic to remotely manageable systems to be monitored, logged and analyzed. Data needs to be replicated and sent to different locations. A small NPB and taps can be placed at the last routing hop, or even the last switch and the controller.

Join the "shift" and live on the edge!

Keith Bromley is Senior Manager, Solutions Marketing at Ixia Solutions Group, a Keysight Technologies business
Share this

The Latest

February 20, 2020

Over 70% of C-Suite decision makers believe business innovation and staff retention are driven by improved visibility into network and application performance, according to Rethink Possible: Visibility and Network Performance – The Pillars of Business Success, a survey
conducted by Riverbed ...

February 19, 2020

Modern enterprises rely upon their IT departments to deliver a seamless digital customer experience. Performance and availability are the foundational stepping stones to delivering that customer experience. Along those lines, this month we released a new research study titled the IT Downtime Detection and Mitigation Report that contains recommendations on how to best prevent, detect or mitigate brownouts and outages, given the context of today’s IT transformation trends ...

February 18, 2020

While Application Performance Management (APM) has become mainstream, with a majority of tech pros using APM tools regularly, there's work to be done to move beyond troubleshooting ...

February 13, 2020

Over the last few decades, IT departments have decreased budgets in part because of recession. As a result, they have are being asked to do more with less. The increase in work has amplified the need for automation ...

February 12, 2020

Many variables must align for optimum APM, and security is certainly among them. I offer the following APM predictions for 2020, which revolve around the reality that we will definitely begin to see much deeper integration of WAN technology on the security front. Look for this integration to take shape in the following ways ...

February 11, 2020

When it comes to growing a successful company, research shows it isn't about getting the most out of employees, but delivering an experience that empowers them to be and do their best. And according to Priming a New Era of Digital Wellness, a new study conducted by Quartz Insights in partnership with Citrix Systems, technology is the secret to doing so ...

February 10, 2020

Only 11% of website decision-makers feel that they have complete insight into the scripts that they use on their websites. However, industry estimates state that about 70% of the code on a website comes from a third-party library or service. Research highlights a clear need to raise awareness of the potential threats associated with the vulnerabilities inherent in third-party code ...

February 06, 2020

The ever-increasing access and speeds offered by today's modern networks offer many advantages to businesses and consumers, but also make the integrity of their performance and security more paramount than ever before. Organizations are struggling to manage the constant fluctuations in network conditions and security threats. This has prompted many to explore how automation can help to streamline network management and security processes ...

February 05, 2020

The demand to deliver a consistently positive and innovative customer experience is something that many companies — more specifically, their DevOps teams — are currently grappling with. While the ability to push out multiple features a week may appear as a great accomplishment for DevOps teams, our survey showed that 82% commonly discover bugs in production ...

February 04, 2020

Ensuring reliable data security is a critical part of Application Performance Management (APM) — or at least it should be. The fact is, as a result of our need for speed, increasingly development teams are confronted with the problem of releasing applications faster without compromising security ...