Building the Intelligent Edge

Building the Intelligent Edge

Transition from simple devices to intelligent edge functionality almost complete

Building the Intelligent EdgePhilosophical and physical shifts in intelligence and management at the edge are remaking corporate networks. A move toward decentralization and the pushing of intelligence to the edges are changing how companies handle security, data and storage.

In the beginning, there was the network core, and at the heart of the core was heavy iron, otherwise known as the “blade chassis.” The concept was centralized management and wiring at the inception of network switching and the dawn of hubs. IT would invest significant resources in the core, and then sprinkle the occasional edge switch or router on the fringe to get to those hardto- reach desktops and printers. It was a reasonable strategy in its day.

However, more than a decade ago, even the staunchest, heavyiron manufacturers were looking at more intelligent edge switching as a means of freeing up core fabric memory and CPU cycles. The goal was to have the edge take on the role of a data super highway. Early on, the barrier to the release and deployment of more distributed network topology was the disruptive effect it would have on the vendors’ then-popular products and the investments IT had already made.

The Early Edge

The first widely-adopted, intelligent edge devices showed up in service-provider markets; these were home routers. It is interesting that even now there are not many noticeable changes to home-router features. They are a little bit more secure, and there are more configuration options, but basic NATing and firewall functionality has not really changed.

It was not too long ago that network hardware manufacturers made a shift to widespread adoption of off-the-shelf processors to build their offerings. The processors contained the gamut of Layer II and Layer III to VII functionality, and came with basic reference codes that could be used by the vendors. The same chipsets were used by low-cost, basic switch and router providers and the big-league, “my-OS-is-the-only- OS” manufacturers.

The real difference was found in the ability of coders to make the chips dance. Even within the same manufacturer, the chipset would be used across multiple product families, offering a varied level of functionality. The real difference in the products was the firmware and the features it enabled.

Stage 2: Advanced Features

The chipset’s capabilities set the stage for the next round of edge technology. Due to economies of scale, the Basic Layer II edge switch supported features like SNMP, discover protocols, data-flow sampling statistics and more advanced discovery protocols, like LLDP.

The significance of this is that administrators could have greater control of network traffic at the port level of their edge switches and routers. In addition, the edge switch could also discover edge devices, such as IP-based video cameras, access control devices, audio and video devices, and so on.

While convergence is exploding as the industry moves from traditional analog technology to IP, the ability to discover a device, make network policy based on template rules and better manage the numerous add-on elements is making this process less disruptive and easier to maintain. Auto discovery and auto policy also helps busy administrators manage constant moves and changes. Switch, router and Wi-Fi manufacturers are refining this intelligence at an unprecedented scale. One could even consider these features as a subset or precursor to Software Defined Networks (SDN).

True-edge Intelligence

While this level of intelligence takes us near the edge, exciting advances are taking place at the actual end node, or customer premise equipment (CPE). We are now seeing capabilities, such as IP to MPLS, residing directly in an end access point. This simplifies both deployment and maintenance concerns. We are also seeing prebuilt, complex policies scripted into easy-to-follow, one-click steps such as a Voice over IP circuit or establishing a service level for Internet access.

From a physical security perspective, the really exciting and pertinent advances are coming in the form of onboard storage capabilities in IP video cameras: the ability to upload resident programs for video analytics; advance event triggers and traps; and optimization agents, such as video over Wi-Fi, that can identify itself to the network infrastructure and allow for automated Quality of Service settings for the camera output.

IP video cameras are an interesting case as they essentially become miniature PCs with lenses and sensors. Axis cameras, for instance, employ a Linux OS, an Apache Web server and a user interface that is not unlike that of a home router. This allows for wide support of critical network requirements, including advanced cybersecurity protocols ranging from basic 802.1x to RAS, and PKI and HTTPS to SLL.

The real system value that comes from this next generation of intelligent edge technology is the ability for IT to operate and support a specific network OS strategy while extending the system’s capabilities to third-party network elements in a secure and manageable fashion. We are now seeing previously unparalleled cooperation between technology partners, who are working toward optimized and validated solutions to provide the best in end-customer satisfaction and experience.

IT departments looking to provide reliable and scalable services to their organizations in a manageable service model need only look to vendor websites to find a list of hardware and software technology partnerships including servers, storage, IP cameras, access controls, IP audio, intelligent building automation and so on.

This article originally appeared in the May 2014 issue of Security Today.

Featured

  • NRF Supports Federal Bill to Thwart Retail Crime

    The National Retail Federation recently announced its support for the Combating Organized Retail Crime Act of 2025. The act was introduced by Chairman Chuck Grassley, R-Iowa, Senator Catherine Cortez Masto, D-Nev., and Representative Dave Joyce, R-Ohio. Read Now

  • ISC West 2025 Brings Almost 29,000 Industry Professionals to Las Vegas

    ISC West 2025, organized by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s leading comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. Read Now

    • Industry Events
    • ISC West
  • Tradeshow Work Can Be Fun

    While at ISC West last week, I ran into numerous friends and associates all of which was a pleasant experience. The first question always seemed to be, “How many does this make for you?” Read Now

    • Industry Events
    • ISC West
  • New Report Says 1 in 5 SMBs Would Be Forced to Shutter After Successful Cyberattack

    Small and medium-sized businesses (SMBs) play a crucial role in the U.S. economy, making up 99.9% of all businesses and contributing to half of the nation's GDP. However, these vital economic growth drivers face an escalating threat—cyberattacks that could put them out of business. Read Now

  • The Yellow Brick Road

    The road to and throughout Wednesday's and Thursday's ISC West was crowded but it was amazing. Read Now

    • Industry Events
    • ISC West

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.