
MULTIPLE INPUT MULTIPLE OUTPUT (MIMO) – Understanding Network and Security for Far-Edge Computing
MIMO is a method of increasing the effective capacity of a radio link by deliberately exploiting multipath propagation. This is typically accomplished via the use of multiple transmitters and receivers on both sides 6: 6 Some implementations have a single antenna on one side and multiple antennas on the other. Figure 3.16 – MIMO exploiting
Antennas– Understanding Network and Security for Far-Edge Computing
To know more about antennas we will cover the size, polarization, and types of antennas. We’ll look at these three in detail in the following sub sections. Size An antenna’s size is directly related to the wavelength of the signal involved – which, as you’ll recall, is inversely proportional to the frequency. Higher frequency signals
Security considerations – Understanding Network and Security for Near-Edge Computing
The inbuilt encryption makes it more difficult to inspect network traffic for security purposes, such as intrusion detection or deep packet inspection. Network administrators and security professionals may need to adapt their monitoring and security practices to accommodate the encrypted nature of HTTP/3 and QUIC. Increased complexity for troubleshooting The layered nature of these protocols
Steering traffic at the network layer with IP Anycast – Understanding Network and Security for Near-Edge Computing
IP Anycast is another common approach for global traffic distribution. Figure 2.13 depicts an example of how it works: Figure 2.10 – IP Anycast Both servers have a public IP address of 144.12.11.5. Customers are automatically routed to the closest one. This makes DNS simple; you just need a single A record for myapp.io pointing
Enhanced security – Understanding Network and Security for Near-Edge Computing
SD-WAN provides built-in security features, such as end-to-end encryption and segmentation, to protect sensitive data as it traverses the network. Optimizing ingress with global server load balancing (GSLB) Consider the situation shown in Figure 2.8: Figure 2.8 – A geographically distributed application This application has a server on the west coast of the US, and

Multiprotocol Label Switching (MPLS) – Understanding Network and Security for Near-Edge Computing
Whereas IP routing operates at Layer 3 of the OSI model, MPLS operates below that (often called Layer 2.5). Data is forwarded based on labels along predetermined paths, which allows MPLS to offer far more reliable packet delivery than IP routing over the internet can. The trouble with MPLS is bandwidth cost. Because many organizations
Understanding internet challenges – Understanding Network and Security for Near-Edge Computing
There are two types of edge computing where the cloud is concerned – near the cloud and far from the cloud. Near-edge networking assumes reliable high-speed access and is probably what you are familiar with. Servers connecting from a data center over Multiprotocol Label Switching (MPLS), a laptop in a home worker’s apartment with a
Overview of the AWS edge computing toolbox – Getting Started with Edge Computing on AWS
The AWS edge computing strategy aims to provide a comprehensive suite of services and solutions that enable businesses to harness the power of edge computing, addressing the challenges of data processing, latency, security, and scalability. By bringing AWS services and resources closer to end users and devices, this strategy allows organizations to optimize their applications
Supervisory Control and Data Acquisition – Getting Started with Edge Computing on AWS
Supervisory Control and Data Acquisition (SCADA) systems are used in industrial settings to monitor and control processes and infrastructure in various industries – including manufacturing, utilities, oil and gas, water management, and transportation. SCADA systems enable real-time data collection and processing from remote equipment, allowing operators to supervise and manage industrial processes from a centralized
Legacy IIoT networking technologies – Getting Started with Edge Computing on AWS
Legacy industrial automation systems relied on a variety of networks and protocols to facilitate communication and control among devices, machines, and systems. Examples include MODBUS, PROFINET, EtherCAT, and Fieldbus. These networks were typically closed systems – islands unto themselves. They were also developed at a time when such devices were limited in number and directly
Archives
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- May 2023
- April 2023
- February 2023
- January 2023
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- December 2021
- November 2021
- October 2021
- September 2021
- June 2021
Calendar
M | T | W | T | F | S | S |
---|---|---|---|---|---|---|
1 | 2 | |||||
3 | 4 | 5 | 6 | 7 | 8 | 9 |
10 | 11 | 12 | 13 | 14 | 15 | 16 |
17 | 18 | 19 | 20 | 21 | 22 | 23 |
24 | 25 | 26 | 27 | 28 | 29 | 30 |
31 |