Current location - Plastic Surgery and Aesthetics Network - Plastic surgery and beauty - What is edge intelligence?
What is edge intelligence?
If many network applications are classified, they can be roughly divided into three types: data, voice and video, which requires that the network edge should have the characteristics of stability, security and multifunction, and the ease of use of network equipment can not be ignored. For the definition of edge intelligence, various equipment manufacturers have different opinions. Nowadays, the network application is paid more and more attention, and it is the inevitable direction of network development to pay attention to the intelligence of edge network. Network edge intelligence includes four elements: usability, expansibility, security and controllability. In terms of usability, it can minimize the impact of faults and improve the recovery ability of faults; In terms of scalability, because it supports multi-layer protocols and bandwidth management, it can use existing equipment, with higher efficiency and less upgrades; In terms of security, because access control can be customized at all nodes of the network, the ability of the network to restrict unauthorized users is strengthened; In controllability, users and applications are sorted, and data streams with high QoS requirements are given priority, which improves the efficiency of the network. The realization of intelligent edge network is to optimize, coordinate, configure and manage business, performance and security through intelligent means. Intelligent edge network can be embodied in the following aspects. The demand for the overall performance of the network is improved, which is manifested in the substantial increase in port density and the development of user access rate to the desktop to1000 Mbps; The application tends to be complex and diversified, and the amount of multimedia data increases, which requires the network to be able to cope with sudden data traffic and have QoS policy mechanism to ensure that key services or key departments are not congested; User strategy and management complexity are improved; Unified intelligent network management platform realizes remote centralized management, ensures simple network management and convenient maintenance, requires as few professionals as possible, and reduces TCO;; Monitor the network status in real time to ensure the stable operation and rapid fault recovery of the network; From a single plane switching network to a hierarchical routing switching network; Network can develop with the development of enterprises, whether it is the expansion of the overall scale or the establishment of branches, the network can be easily expanded; In line with the development trend of network applications, the built network is outdated and can expand the latest applications such as voice, wireless and video. The network has preventive measures against all kinds of unsafe factors from outside and inside to ensure the safe operation of the network. At best, the early prototype of edge intelligence is to provide manageable intelligent switches. With the disadvantages of the traditional design mode dominated by network core increasingly exposed, the era of deeper network edge intelligence has arrived. The new network architecture method extends the key intelligent functions beyond the core equipment and integrates with the infrastructure to provide enterprises with economical, efficient and manageable solutions. This architecture enables organizations to protect network investments and prepare for future business needs and network upgrades. The mixed transmission of stable data stream, voice stream and video stream in the edge intelligent switch has a great influence on the stability of the network, and these applications are initiated at the edge of the network, so the intelligent switch needs to distinguish different traffic streams and allocate different bandwidths according to different priorities. As a result, intelligent switches introduced by many manufacturers support QoS strategies such as VLAN division, mandatory priority 802. 1p, traffic monitoring vehicles, etc. Security of Edge Intelligent Switches Because the network is facing various security threats, especially these security threats are increasingly characterized by mixed attacks, edge switches need to have the ability to effectively prevent malicious attacks and illegal intrusions. MAC address authentication, 802. 1x authentication and other functions can help users complete the necessary identity authentication when accessing the network, thus effectively preventing illegal users from accessing the network. The ability of ACL access control depends entirely on the ability of traffic classification, so the edge intelligent switch is required to classify data traffic according to the user's source MAC, destination MAC, source physical port number, source IP address, destination IP address, source network address, layer 4 protocol type and user-defined rules. At the same time, according to these classifications, different service quality control can be carried out for different traffic flows or the forwarding of specific flows can be filtered through ACL. The transformation of multi-service traditional voice communication by edge intelligent switch and the enterprise application of IP telephone communication require IP network to carry the application of internal voice transmission; With the maturity of IP video and H.323 protocol, video conferencing technology has realized remote training, remote collaboration and point-to-point communication in modern economy and society. The wide application of wireless LAN equipment requires edge switches to have a variety of services. The new products of edge switches introduced by many manufacturers integrate hardware-based voice gateways and support MPLS VPN services. Advantages of edge intelligence Controllability of edge access points Edge intelligent switches can make decisions at access points, reduce the load of core devices, and implement access and security policies before traffic enters the network. In addition, these intelligent edge switches can be dynamically and automatically configured for each user and each session according to the instructions of the IT manager. For individuals accessing the network, the switch can grant or restrict their access rights according to their specific access rights. These automatic configuration functions make the network more dynamic, secure and adaptable, and can meet the unique needs of users. Manageability of edge switches Intelligent edge switches should have device management function, which enables network managers to remotely configure and monitor switch ports, and support 802. 1p, VLAN division, port link aggregation and port mirroring function, backup download and upload of switch configuration files, setting IP address range of switch management users, STP spanning tree protocol (802.5438+0d) and port-based traffic shaping function. Security of Edge Switches After using intelligent edge devices to implement intelligence at the edge of the network, the security is enhanced and the overall security of the network is improved. Centralized control of network configuration After the central command is realized by network management software with dynamic policy control function and module to ensure security, mobility and integration, enterprises will centrally control network configuration, thus making it easier to realize new applications and support new traffic types in enterprises. This method not only enables enterprises to improve security, realize mobile edge and make full use of new technologies, but also helps to reduce costs and protect IT investment. Get rid of the network's excessive dependence on the core