Ecmweb 8339 Jagged Edge Web Image
Ecmweb 8339 Jagged Edge Web Image
Ecmweb 8339 Jagged Edge Web Image
Ecmweb 8339 Jagged Edge Web Image
Ecmweb 8339 Jagged Edge Web Image

The Jagged Data Center Edge

July 22, 2016
Dispelling four common myths about the edge of the network

Forget everything you know about the data center. Well, not everything. The traditional data center isn’t going anywhere, but various kinds of architectures are emerging that bear only a passing resemblance to the familiar enterprise model. Each hyperscale facility is its own animal, and distributed networks with computing at the edge of the network are increasingly common. These aren’t just isolated computing rooms; they are active, vital components of a larger network, and their infrastructure and performance are just as important as those of more traditional environments.

That being said, some elements are different at the edge of the network. The edge presents its own challenges, something some organizations have been slow to recognize. Certain misconceptions about the edge could be dangerous if allowed to germinate, and they’re certainly compromising network performance. Let’s look at a few of those misconceptions (we’ll call them myths), the challenges they present, and some potential solutions.

Myth No. 1: Edge facilities are no different than IT closets.

OK, this may be overstating it just a bit. Most IT managers understand the difference between computing at the edge of the network and an isolated, on-site computing room. But just because they understand it doesn’t mean they’re treating edge spaces any differently than they did the average IT closet. Maybe it’s habit, or maybe it’s because they superficially look like the same space. Whatever the reason, too many edge sites receive the cursory attention typical of a couple of servers stashed in a converted linen closet, and that’s a waste.

Computing at the edge refers to pushing processing for certain data-intensive, remotely isolated applications away from the core of the data center to the network’s outer edges where the processing is needed.

Those servers are critical pieces of the larger network, single outposts in a distributed data center architecture — a sophisticated matrix that brings computing closer to the user without sacrificing the muscle of a traditional data center. It’s becoming increasingly important as the Internet of Things (IoT) becomes a reality, relying on a vast array of intelligent sensors, controls, and computing assets to ensure our machines and our lives are more connected than ever before. Edge systems are monitoring shopping trends, traffic patterns, financial data, and security threats, and they’re processing and acting on that activity in real time.

Myth No. 2: You don’t really need a UPS system.

We’ve heard this said before. “They’re small sites, sometimes with nothing more than a single rack and a couple of servers. What’s the worst that could happen?”

Unfortunately, we’ve seen this perspective played out with disastrous results. Some critical edge sites are only protected with simple, outdated UPS systems or even off-the-shelf power strips. It’s an extension of the problem we discussed in Myth No. 1, and the result isn’t pretty. Understand this: These edge systems are as much a part of the network as any server in a central data center, and just like those servers they require clean, consistent power. That starts with a robust UPS system.

Power is a complicated issue. Why take chances? We once evaluated a site that seemed to be getting unusually short UPS battery life. What should have been routine failovers during electric utility outages instead were causing IT downtime that impacted the entire network — all because the batteries were dying too soon. As we evaluated the site, we noticed the IT equipment was located close to the elevators, meaning the UPS was forced to handle power sags every time the elevator went up or down. Those sags drained the batteries, and they couldn’t deliver appropriate backup power when the site really needed it.

As more devices join the grid, more sags and spikes in electricity use will occur. Many UPS systems today are designed for edge facilities that monitor and manage these types of issues to ensure the computing assets receive clean power and reliable protection.

Myth No. 3: Everything on the network is communicating.

It’s only natural to assume all of these devices that are networked together are talking to each other. However, that’s not necessarily the case.

Edge facilities bring computing resources and data storage closer to end-users while connecting back to centralized data centers that act as the hub of the network. That’s Edge 101. But some of these networks have hundreds or even thousands of edge sites, making the network an intimidatingly complex labyrinth of data storage, analysis, and delivery with monumental management challenges. Those challenges demand a corresponding level of sophistication when it comes to remote monitoring, visibility, and machine-to-machine communication. It’s impossible to fully realize the full capabilities of a distributed network without it — although your definition of “it” may vary.

In some cases, it may be as simple as a console server, which enables secure access to remote servers. Other networks may benefit from more sophisticated software and systems incorporating some level of data center infrastructure management (DCIM). In fact, today’s DCIM solutions are adapting to evolving network architectures by offering scalable, modular options that allow organizations to build a DCIM solution that fits their needs — from data center to edge.

The bottom line: Secure remote management maximizes the effectiveness of these distributed data centers, ensuring they operate as holistic IT assets rather than loosely connected outposts of IT equipment.

Myth No. 4: The central data center is responsible for network security.

Remember the Target data breach of 2013? It started with an HVAC vendor. Since then, we’ve heard about countless data breaches, including well-publicized hacks of Sony, JP Morgan Chase, and eBay. If we’ve learned anything, it’s that vulnerabilities excst everywhere. Anything on the network is at risk — and that includes everything at the edge.

Securing hundreds or thousands of sites at the edge is a daunting task, but failure to do so can be catastrophic. Despite our increased awareness of cybersecurity, the cost and frequency of breaches is on the rise. According to a recent Ponemon Institute study of data center downtime commissioned by Emerson Network Power, cyberattacks were responsible for 23% of all unplanned data center outages in 2015 — that’s up from 2% in 2010. And those incidents are increasingly costly. According to the study, the average total cost of a data security breach is $3.8 million — up 23% in just the last two years.

Increased awareness isn’t translating to better prevention. Organizations must be more vigilant in closing vulnerabilities across distributed networks. The first step is recognizing the scope of the challenge.

Wirts is the vice president and general manager of IT Management at Emerson Network Power in Huntsville, Ala. He can be reached at [email protected].  

About the Author

Jay Wirts

Voice your opinion!

To join the conversation, and become an exclusive member of EC&M, create an account today!

Sponsored Recommendations

Electrical Conduit Comparison Chart

CHAMPION FIBERGLASS electrical conduit is a lightweight, durable option that provides lasting savings when compared to other materials. Compare electrical conduit types including...

Fiberglass Electrical Conduit Chemical Resistance Chart

This information is provided solely as a guide since it is impossible to anticipate all individual site conditions. For specific applications which are not covered in this guide...

Considerations for Direct Burial Conduit

Installation type plays a key role in the type of conduit selected for electrical systems in industrial construction projects. Above ground, below ground, direct buried, encased...

How to Calculate Labor Costs

Most important to accurately estimating labor costs is knowing the approximate hours required for project completion. Learn how to calculate electrical labor cost.