IOTA--Help you build a secure edge computing network

For cloud computing, we are already familiar with it and are used to enjoying the services provided by cloud computing providers. Cloud computing services provide us with a wealth of network security tools and help enterprises with network security. Edge computing is different. Currently, many edge computing vendors are developing their own products and services, but they have not achieved standardization. Edge computing networks are diversified. Therefore, there are still many unknowns about the security of edge computing networks.

What is edge computing

Edge computing refers to computing close to the source of data generation. More generally speaking, it can also be called proximity computing or proximity computing (Proximity Computing). Cloud computing, as we know it, refers to sending data from the local to the cloud for processing, and then returning the results after processing. Although this method can solve the problem of local equipment’s hardware conditions or insufficient computing power, it also brings There are many problems, such as a large amount of data that needs to be transmitted, insufficient broadband, large investment, and large network delays.

Edge computing can solve those problems

  • Massive Data

With the rapid development of the Internet, the number of equipment terminals has exploded. The resulting data is already astronomical, which has brought tremendous pressure to cloud computing data processing.

  • bandwidth

Using cloud computing to transmit all terminal data to the cloud will cause the network bandwidth load to increase dramatically.

  • Time delay

Long-distance information transmission under the complex network environment of the Internet of Things in the future will require complex network traffic scheduling, which will inevitably cause great delays.

  • Security and privacy

Uploading all information to the cloud via a complicated network is very dangerous and does not meet our requirements for protecting some security and privacy information.

Mobile edge computing for 5G

Uploading all information to the cloud via a complicated network is very dangerous and does not meet our requirements for protecting some security and privacy information.
When it comes to edge computing, we have to mention mobile edge computing (MEC). The concept of MEC was first proposed by ETSI in 2014. MEC provides a new platform that enables the wireless access network side of mobile users to provide powerful meta-computing capabilities and Application service, its main feature is to sink the network control and storage function in mobile computing to the edge of the network, so that computing-intensive and high-latency key applications can also be run on mobile terminals with limited resources. MEC can provide services similar to cloud computing and can effectively reduce latency. In the 5G era, MEC technology will bring about brand-new changes by integrating the computing platform of the mobile traditional centralized data center with the mobile network.

Cybersecurity in edge computing

Ben Goodman, head of business development at ForgeRock, compares network security in edge computing to the "Wild West". Currently, many edge computing vendors are developing their own products and services, but they have not achieved standardization. Edge computing is not just a concept applicable to a certain industry or field. It can be applied to shopping malls, enterprises, banks, transportation, intelligent driving and many other fields. It does not have a single operating system or unified hardware, so how to solve the network security problem in edge computing and how to monitor such a network is a difficult problem.

IOTA-a convenient integrated network analysis tool

IOTA was developed to meet the needs of the industry's top network analysts and engineers. It is a multifunctional integrated solution that combines capture, storage and analysis functions in a single device. It can be used as a portable data processing solution or as a rack-mounted data center solution to be easily deployed anywhere on the site.

IOTA is easy to use and can be set up and activated without extensive IT knowledge. Once in place, network experts can perform analysis remotely. IOTA is a series circuit isolated from other interfaces, internal storage and analysis processing, thus ensuring the integrity of the monitored network.

IOTA's combination of functions in a single compact device makes it a complete network capture and analysis solution, and it is also an important supplement to the network engineer's toolkit.

IOTA-what are the functions

  • Keep an eye on your network

Use a set of pre-made comprehensive dashboards to monitor host, top talker, bandwidth, latency, TCP, UDP, IPv4, IPv6, VLAN, DNS, etc. at a glance.

  • Monitor network performance

Pay close attention to the most important performance indicators, retransmission, packet loss, delay, throughput, availability, connectivity, etc.

  • Monitor remote sites and branches

Use a set of pre-made comprehensive dashboards to monitor host, top talker, bandwidth, latency, TCP, UDP, IPv4, IPv6, VLAN, DNS, etc. at a glance.

  • Track security vulnerabilities and usage of protocols/applications

It is fully managed via HTTPS and has a built-in VPN, which can be easily deployed and used in any network topology.

Original link

Guess you like

Origin blog.csdn.net/HongkeTraining/article/details/108081493
Recommended