Why You Should Consider Visibility and Performance Monitoring for Edge Computing
January 15, 2020

Keith Bromley
Ixia

Share this

Edge computing usage is starting to increase. See my previous posting from September 2019 that illustrates what is driving this network change. The obvious follow-up question is, "So, what can I do with edge computing?" I'm glad you asked. There are lots of things you can do.

In fact, here are six fundamental use cases that you allow you to:

1. Improve network visibility

2. Improve network performance monitoring

3. Reduce the cost of MPLS circuits for transport

4. Improve troubleshooting capabilities

5. Enhance endpoint security

6. Upgrade compliance support

Improving network visibility is the first use case. Use of IP enables NOC engineers to see all the way out to the edge of the network. They can use application intelligence to look at application performance and NetFlow information to these locations. Currently, many (maybe most) enterprises lose visibility for the "last mile" of their network. This is especially true when using Telco circuits.

So why is this important? Are there potential problems (outages) getting ready to happen? Without visibility — who knows. It's easy to know once it happens but this puts IT into a reactive position that consumes more time, more money, and creates unnecessary problems for customers and senior management. It would be better if you could start to "see" the problem before everything goes bad.

Taking this one step further, a network packet broker (NPB) equipped with proactive performance monitoring features integrated into the architecture provides the NOC with an easy way to check latent network performance and also the ability to actively test performance at will all the way to the edge using synthetic traffic.

Network and IT teams need remote access to server and network traffic activity for performance monitoring and troubleshooting. Active monitoring (also known as "synthetic monitoring") is used to actively monitor latency/performance of WAN/SD-WAN links. This type of tool simulates traffic by sending synthetic packet data to various endpoints across the network to measure performance metrics.

Enterprises also want to reduce, if not eliminate, MPLS circuit costs and move to IP links. Remote sites typically have low speed internet access (100 MB). IP gives them more flexibility, less headaches (as they don't have to strip off MPLS headers), and lower cost to get IP links from ISPs and CLECs.

Troubleshooting can also be improved with edge computing. The shift to IP links allows the NOC to use IP-based tools and application intelligence to troubleshoot problems as fast as possible, all the way to the edge of the network.

Network security can be improved by placing next generation firewalls (NGFW) right up to the edge. A NPB is very useful here to integrate the security device along with other edge devices and capabilities into the network.

With regard to regulatory compliance, several organizations (including utilities) require that all control traffic to remotely manageable systems to be monitored, logged and analyzed. Data needs to be replicated and sent to different locations. A small NPB and taps can be placed at the last routing hop, or even the last switch and the controller.

Join the "shift" and live on the edge!

Keith Bromley is Senior Manager, Solutions Marketing at Ixia Solutions Group, a Keysight Technologies business
Share this

The Latest

March 19, 2024

If there's one thing we should tame in today's data-driven marketing landscape, this would be data debt, a silent menace threatening to undermine all the trust you've put in the data-driven decisions that guide your strategies. This blog aims to explore the true costs of data debt in marketing operations, offering four actionable strategies to mitigate them through enhanced marketing observability ...

March 18, 2024

Gartner has highlighted the top trends that will impact technology providers in 2024: Generative AI (GenAI) is dominating the technical and product agenda of nearly every tech provider ...

March 15, 2024

In MEAN TIME TO INSIGHT Episode 4 - Part 1, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses artificial intelligence and network management ...

March 14, 2024

The integration and maintenance of AI-enabled Software as a Service (SaaS) applications have emerged as pivotal points in enterprise AI implementation strategies, offering both significant challenges and promising benefits. Despite the enthusiasm surrounding AI's potential impact, the reality of its implementation presents hurdles. Currently, over 90% of enterprises are grappling with limitations in integrating AI into their tech stack ...

March 13, 2024

In the intricate landscape of IT infrastructure, one critical component often relegated to the back burner is Active Directory (AD) forest recovery — an oversight with costly consequences ...

March 12, 2024

eBPF is a technology that allows users to run custom programs inside the Linux kernel, which changes the behavior of the kernel and makes execution up to 10x faster(link is external) and more efficient for key parts of what makes our computing lives work. That includes observability, networking and security ...

March 11, 2024

Data mesh, an increasingly important decentralized approach to data architecture and organizational design, focuses on treating data as a product, emphasizing domain-oriented data ownership, self-service tools and federated governance. The 2024 State of the Data Lakehouse report from Dremio presents evidence of the growing adoption of data mesh architectures in enterprises ... The report highlights that the drive towards data mesh is increasingly becoming a business strategy to enhance agility and speed in problem-solving and innovation ...

March 07, 2024
In this digital era, consumers prefer a seamless user experience, and here, the significance of performance testing cannot be overstated. Application performance testing is essential in ensuring that your software products, websites, or other related systems operate seamlessly under varying conditions. However, the cost of poor performance extends beyond technical glitches and slow load times; it can directly affect customer satisfaction and brand reputation. Understand the tangible and intangible consequences of poor application performance and how it can affect your business ...
March 06, 2024

Too much traffic can crash a website ... That stampede of traffic is even more horrifying when it's part of a malicious denial of service attack ... These attacks are becoming more common, more sophisticated and increasingly tied to ransomware-style demands. So it's no wonder that the threat of DDoS remains one of the many things that keep IT and marketing leaders up at night ...

March 05, 2024

Today, applications serve as the backbone of businesses, and therefore, ensuring optimal performance has never been more critical. This is where application performance monitoring (APM) emerges as an indispensable tool, empowering organizations to safeguard their applications proactively, match user expectations, and drive growth. But APM is not without its challenges. Choosing to implement APM is a path that's not easily realized, even if it offers great benefits. This blog deals with the potential hurdles that may manifest when you actualize your APM strategy in your IT application environment ...