Building the Intelligent Edge

Building the Intelligent Edge

Transition from simple devices to intelligent edge functionality almost complete

Building the Intelligent EdgePhilosophical and physical shifts in intelligence and management at the edge are remaking corporate networks. A move toward decentralization and the pushing of intelligence to the edges are changing how companies handle security, data and storage.

In the beginning, there was the network core, and at the heart of the core was heavy iron, otherwise known as the “blade chassis.” The concept was centralized management and wiring at the inception of network switching and the dawn of hubs. IT would invest significant resources in the core, and then sprinkle the occasional edge switch or router on the fringe to get to those hardto- reach desktops and printers. It was a reasonable strategy in its day.

However, more than a decade ago, even the staunchest, heavyiron manufacturers were looking at more intelligent edge switching as a means of freeing up core fabric memory and CPU cycles. The goal was to have the edge take on the role of a data super highway. Early on, the barrier to the release and deployment of more distributed network topology was the disruptive effect it would have on the vendors’ then-popular products and the investments IT had already made.

The Early Edge

The first widely-adopted, intelligent edge devices showed up in service-provider markets; these were home routers. It is interesting that even now there are not many noticeable changes to home-router features. They are a little bit more secure, and there are more configuration options, but basic NATing and firewall functionality has not really changed.

It was not too long ago that network hardware manufacturers made a shift to widespread adoption of off-the-shelf processors to build their offerings. The processors contained the gamut of Layer II and Layer III to VII functionality, and came with basic reference codes that could be used by the vendors. The same chipsets were used by low-cost, basic switch and router providers and the big-league, “my-OS-is-the-only- OS” manufacturers.

The real difference was found in the ability of coders to make the chips dance. Even within the same manufacturer, the chipset would be used across multiple product families, offering a varied level of functionality. The real difference in the products was the firmware and the features it enabled.

Stage 2: Advanced Features

The chipset’s capabilities set the stage for the next round of edge technology. Due to economies of scale, the Basic Layer II edge switch supported features like SNMP, discover protocols, data-flow sampling statistics and more advanced discovery protocols, like LLDP.

The significance of this is that administrators could have greater control of network traffic at the port level of their edge switches and routers. In addition, the edge switch could also discover edge devices, such as IP-based video cameras, access control devices, audio and video devices, and so on.

While convergence is exploding as the industry moves from traditional analog technology to IP, the ability to discover a device, make network policy based on template rules and better manage the numerous add-on elements is making this process less disruptive and easier to maintain. Auto discovery and auto policy also helps busy administrators manage constant moves and changes. Switch, router and Wi-Fi manufacturers are refining this intelligence at an unprecedented scale. One could even consider these features as a subset or precursor to Software Defined Networks (SDN).

True-edge Intelligence

While this level of intelligence takes us near the edge, exciting advances are taking place at the actual end node, or customer premise equipment (CPE). We are now seeing capabilities, such as IP to MPLS, residing directly in an end access point. This simplifies both deployment and maintenance concerns. We are also seeing prebuilt, complex policies scripted into easy-to-follow, one-click steps such as a Voice over IP circuit or establishing a service level for Internet access.

From a physical security perspective, the really exciting and pertinent advances are coming in the form of onboard storage capabilities in IP video cameras: the ability to upload resident programs for video analytics; advance event triggers and traps; and optimization agents, such as video over Wi-Fi, that can identify itself to the network infrastructure and allow for automated Quality of Service settings for the camera output.

IP video cameras are an interesting case as they essentially become miniature PCs with lenses and sensors. Axis cameras, for instance, employ a Linux OS, an Apache Web server and a user interface that is not unlike that of a home router. This allows for wide support of critical network requirements, including advanced cybersecurity protocols ranging from basic 802.1x to RAS, and PKI and HTTPS to SLL.

The real system value that comes from this next generation of intelligent edge technology is the ability for IT to operate and support a specific network OS strategy while extending the system’s capabilities to third-party network elements in a secure and manageable fashion. We are now seeing previously unparalleled cooperation between technology partners, who are working toward optimized and validated solutions to provide the best in end-customer satisfaction and experience.

IT departments looking to provide reliable and scalable services to their organizations in a manageable service model need only look to vendor websites to find a list of hardware and software technology partnerships including servers, storage, IP cameras, access controls, IP audio, intelligent building automation and so on.

This article originally appeared in the May 2014 issue of Security Today.

Featured

  • 12 Commercial Crime Sites to Do Your Research

    12 Commercial Crime Sites to Do Your Research

    Understanding crime statistics in your industry and area is crucial for making important decisions about your security budget. With so much information out there, how can you know which statistics to trust? Read Now

  • Boosting Safety and Efficiency

    Boosting Safety and Efficiency

    In alignment with the state of Mississippi’s mission of “Empowering Mississippi citizens to stay connected and engaged with their government,” Salient's CompleteView VMS is being installed throughout more than 150 state boards, commissions and agencies in order to ensure safety for thousands of constituents who access state services daily. Read Now

  • Live From GSX: Post-Show Review

    Live From GSX: Post-Show Review

    This year’s Live From GSX program was a rousing success! Again, we’d like to thank our partners, and IPVideo, for working with us and letting us broadcast their solutions to the industry. You can follow our Live From GSX 2023 page to keep up with post-show developments and announcements. And if you’re interested in working with us in 2024, please don’t hesitate to ask about our Live From programs for ISC West in March or next year’s GSX. Read Now

    • Industry Events
    • GSX
  • People Say the Funniest Things

    People Say the Funniest Things

    By all accounts, GSX version 2023 was completely successful. Apparently, there were plenty of mix-ups with the airlines and getting aircraft from the East Coast into Big D. I am all ears when I am in a gathering of people. You never know when a nugget of information might flip out. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3