
MULTIPLE INPUT MULTIPLE OUTPUT (MIMO) – Understanding Network and Security for Far-Edge Computing
MIMO is a method of increasing the effective capacity of a radio link by deliberately exploiting multipath propagation. This is typically accomplished via the use of multiple transmitters and receivers on both sides 6: 6 Some implementations have a single antenna on one side and multiple antennas on the other. Figure 3.16 – MIMO exploiting
Circular – Understanding Network and Security for Far-Edge Computing
Sometimes, the antennas do not remain in a fixed orientation and rotate continually – sometimes at random. This is also known as the Faraday rotation. It is a common problem when communicating with satellites in space. Circular polarization is a method that can be used to overcome it: Figure 3.5 – Circular polarization of a
Network segmentation – Understanding Network and Security for Near-Edge Computing
Implement network segmentation to isolate and protect critical edge computing resources. Use Virtual LANs (VLANs) or Software-Defined Networking (SDN) techniques to create separate network segments for different types of devices and services. This helps contain potential security breaches and limit the lateral movement of threats within the network. Monitoring and logging Implement comprehensive monitoring and
Addressing TCP issues with HTTP/3 and QUIC – Understanding Network and Security for Near-Edge Computing
HTTP/3 – Hypertext Transfer Protocol version 3 This is the latest revision of the HTTP protocol and is widely used for communication between web browsers and servers. It is based on Quick UDP Internet Connections (QUIC), a transport protocol developed by Google. QUIC is designed to provide a secure and efficient transport layer protocol over
Enhanced security – Understanding Network and Security for Near-Edge Computing
SD-WAN provides built-in security features, such as end-to-end encryption and segmentation, to protect sensitive data as it traverses the network. Optimizing ingress with global server load balancing (GSLB) Consider the situation shown in Figure 2.8: Figure 2.8 – A geographically distributed application This application has a server on the west coast of the US, and
Software-defined WAN (SD-WAN) – Understanding Network and Security for Near-Edge Computing
SD-WAN is the application of SDN principles to networks outside your data center or span of control. The problems that SDN solves within your data center are even larger challenges on the internet, where you definitely won’t be given access to modify equipment you don’t own. The general idea is to implement a logical overlay
TCP RWIN FORMULA – Understanding Network and Security for Near-Edge Computing
Here’s the TCP RWIN formula: Here, we have the following: t is the throughput in megabits per second w is the RWIN in kilobits r is the RTT value in milliseconds When you’re trying to work out the effective throughput of any connection, both calculations must be performed. First, apply both the Mathis equation for
Understanding internet challenges – Understanding Network and Security for Near-Edge Computing
There are two types of edge computing where the cloud is concerned – near the cloud and far from the cloud. Near-edge networking assumes reliable high-speed access and is probably what you are familiar with. Servers connecting from a data center over Multiprotocol Label Switching (MPLS), a laptop in a home worker’s apartment with a
Legacy IIoT networking technologies – Getting Started with Edge Computing on AWS
Legacy industrial automation systems relied on a variety of networks and protocols to facilitate communication and control among devices, machines, and systems. Examples include MODBUS, PROFINET, EtherCAT, and Fieldbus. These networks were typically closed systems – islands unto themselves. They were also developed at a time when such devices were limited in number and directly
Specialized requirements – Getting Started with Edge Computing on AWS
Immersive experiences rely heavily on real-time user interactions, and any delay or lag can significantly degrade the user experience. AWS edge computing services can help to minimize latency by processing data closer to the source, thereby reducing the time taken to transmit data between the user’s device and the data center. Services such as AWS
Archives
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- May 2023
- April 2023
- February 2023
- January 2023
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- December 2021
- November 2021
- October 2021
- September 2021
- June 2021
Calendar
M | T | W | T | F | S | S |
---|---|---|---|---|---|---|
1 | 2 | |||||
3 | 4 | 5 | 6 | 7 | 8 | 9 |
10 | 11 | 12 | 13 | 14 | 15 | 16 |
17 | 18 | 19 | 20 | 21 | 22 | 23 |
24 | 25 | 26 | 27 | 28 | 29 | 30 |
31 |