Engineering a Content Delivery Network COMPSCI 214 Computer Networks and Distributed Systems Bruce Maggs.

Slides:



Advertisements
Similar presentations
Akamai Content Delivery Network Slides from Bruce Maggs.
Advertisements

1 Server Selection & Content Distribution Networks (slides by Srini Seshan, CS CMU)
Video Streaming Services Justin Hourigan, Senior Network Engineer, HEAnet Limited
Key Algorithms in a Content Delivery System Akamai Technologies and Carnegie Mellon University Bruce Maggs.
Engineering a Content Delivery Network Bruce Maggs.
Cold Fusion High Availability “Taking It To The Next Level” Presenter: Jason Baker, Digital North Date:
Module 8: Concepts of a Network Load Balancing Cluster
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
Internet Content Providers End Users The Internet: Simple on the Outside…
Lesson 15 – INSTALL AND SET UP NETWARE 5.1. Understanding NetWare 5.1 Preparing for installation Installing NetWare 5.1 Configuring NetWare 5.1 client.
Akamai OS War Stories Bruce Maggs Gratuitous Quote of the Day Well you’re not hardcore (No you’re not hardcore) Unless you live hardcore (Unless.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS eCommerce Technology Web Content Delivery.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
1 Web Content Delivery Reading: Section and COS 461: Computer Networks Spring 2007 (MW 1:30-2:50 in Friend 004) Ioannis Avramopoulos Instructor:
Caching and Content Distribution Networks. Web Caching r As an example, we use the web to illustrate caching and other related issues browser Web Proxy.
OARtech Patrick W. Gilmore April 11, 2001.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Virtual Network Servers. What is a Server? 1. A software application that provides a specific one or more services to other computers  Example: Apache.
Module 2 Deploying SharePoint Portal Server 2003.
Name Title Microsoft Windows Azure: Migrating Web Applications.
The Role of Content Delivery Networks in Protecting Web Sites from Attacks Bruce Maggs VP for Research, Akamai Technologies.
Windows Server MIS 424 Professor Sandvig. Overview Role of servers Performance Requirements Server Hardware Software Windows Server IIS.
Welcome Thank you for taking our training. Collection 6421: Configure and Troubleshoot Windows Server® 2008 Network Course 6690 – 6709 at
Design Windows Media Services Infrastructure. Module 7: Design Windows Media Services Infrastructure Design Windows Media Services for live streaming.
{ Content Distribution Networks ECE544 Dhananjay Makwana Principal Software Engineer, Semandex Networks 5/2/14ECE544.
Components of Windows Azure - more detail. Windows Azure Components Windows Azure PaaS ApplicationsWindows Azure Service Model Runtimes.NET 3.5/4, ASP.NET,
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
World Wide Web Hypertext model Use of hypertext in World Wide Web (WWW) WWW client-server model Use of TCP/IP protocols in WWW.
Global Internet Content Delivery Akamai Technologies and Carnegie Mellon University Bruce Maggs.
Akamai vs. Flash Crowds and Distributed Denial of Service Akamai Technologies & Carnegie Mellon Bruce Maggs.
How Akamai Handles Large Events Bruce Maggs Carnegie Mellon Duke Akamai Technologies.
Section 2 Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices.
Protect Your Business-Critical Data in the Cloud with SoftNAS, a Full-Featured, Highly Available Solution for the Agile Microsoft Azure Platform MICROSOFT.
Status report on Lame Delegations (work in progress) George Michaelson DB SIG APNIC17/APRICOT 2004 Feb KL, Malaysia.
RAL PPD Computing A tier 2, a tier 3 and a load of other stuff Rob Harper, June 2011.
Introduction. Readings r Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 m Note: All figures from this book.
FireProof. The Challenge Firewall - the challenge Network security devices Critical gateway to your network Constant service The Challenge.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
 Load balancing is the process of distributing a workload evenly throughout a group or cluster of computers to maximize throughput.  This means that.
ISA SERVER 2004 Group members : Sagar Bhakta – [intro] Orit Ahmed – [installation] Michael Wijaya [advantages] Rene Salazar - [features]
1 Copyright © 2015 Pexus LLC Patriot PS Personal Server Installing Patriot PS ISO Image on.
Day12 Network OS. What is an OS? Provides resource management and conflict resolution. –This includes Memory CPU Network Cards.
Bruce Maggs Duke University Akamai Technologies Carnegie Mellon University delivering content to the next billion.
Zvezdan Pavković. Storage Non-Persistent Storage Persistent Storage Easily add additional storage. Networking Internal and Input Endpoints configured.
Globally Distributed Content Delivery Presenter: Baoning Wu 03/25/2003.
Content Distribution Network, Proxy CDN: Distributed Environment
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Akamai “War” Stories Bruce Maggs. Akamai’s First Network Connection We moved into our offices at 201 Broadway at midnight, December 1, 1998, and built.
Content Distribution Networks (CDNs)
Engineering a Content Delivery Network Bruce Maggs.
2: Operating Systems Networking for Home & Small Business.
Virtual Machines Module 2. Objectives Define virtual machine Define common terminology Identify advantages and disadvantages Determine what software is.
Matt Jennings.  What is DDoS?  Recent DDoS attacks  History of DDoS  Prevention Techniques.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
A Complete Guide to Select the Best VPS Hosting Providers.
Akamai “War” Stories Bruce Maggs.
Univa Grid Engine Makes Work Management Automatic and Efficient, Accelerates Deployment of Cloud Services with Power of Microsoft Azure MICROSOFT AZURE.
Lab A: Planning an Installation
A. Cookie B. Google Earth C. Cache D. ISP E. Netiquette F. Phishing
Engineering a Content Delivery Network
Akamai “War” Stories Bruce Maggs.
W3 Status Analyzer.
Network Load Balancing
Akamai “War” Stories Bruce Maggs.
Engineering a Content Delivery Network
Akamai “War” Stories Bruce Maggs.
Engineering a Content Delivery Network
Akamai “War” Stories Bruce Maggs.
The Evolution of a Content Delivery Network: A 21-Year Perspective
Presentation transcript:

Engineering a Content Delivery Network COMPSCI 214 Computer Networks and Distributed Systems Bruce Maggs

Current Installations Network Deployment Servers Networks 72+ Countries

Part I: Services

Design Themes RedundancyRedundancy Self-assessmentSelf-assessment Fail-over at multiple levelsFail-over at multiple levels Robust algorithmsRobust algorithms

FirstPoint – DNS (e.g., Yahoo!) Selects from among several mirror sites operated by content providerSelects from among several mirror sites operated by content provider

Embedded Image Delivery (e.g., Amazon) <html><head> Welcome to xyz.com! Welcome to xyz.com! </head><body> <img src=“ Welcome to our Web site! Welcome to our Web site! Click here to enter Click here to enter </body></html> Embedded URLs are Converted to ARLs ak

End User Akamai DNS Resolution Akamai High-Level DNS Servers 10 g.akamai.net 1 Browser’s Cache OS 2 Local Name Server 3 xyz.com’s nameserver 6 ak.xyz.com 7 a212.g.akamai.net Akamai Low-Level DNS Servers 12 a212.g.akamai.net xyz.com.com.net Root (Verisign) akamai.net8 select cluster select servers within cluster

Regions Live Streaming Architecture x X X x Satellite Downlink Entry Point Satellite Uplink Top-level reflectors Encoding

SiteShield ( Content provider’s website Hacker! AKAMAIAKAMAI AKAMAIAKAMAI AKAMAIAKAMAI

Part II: Failures 1.Hardware 2.Network 3.Software 4.Configuration 5.Misperceptions 6.Attacks

Hardware / Server Failures Linux boxes with large RAM and disk capacity, Windows servers Sample Failures: 1.Memory SIMMS jumping out of their sockets 2.Network cards screwed down but not in slot 3.Etc.

Akamai Cluster Servers pool resources RAM Disk Throughput

View of Clusters hardware failure buddy suspended datacenter odd man out

Network Failures E.g., congestion at public and private peering points, misconfigured routers, inaccessible networks, etc., etc., etc.

Core Points Core point X is the first router at which all paths to nameservers 1, 2, 3, and 4 intersect.Core point X is the first router at which all paths to nameservers 1, 2, 3, and 4 intersect. X can be viewed as the straddling the core and the edge of the network.X can be viewed as the straddling the core and the edge of the network. X 1 234

Core Points 500,000 nameservers reduced to 90,000 core points 90,000 core points 7,000 account for 95% end-user load

Engineering Methodology C programming language (gcc). Reliance on open-source code. Large distributed testing systems. Burn-in on “invisible” system. Staged rollout to production. Backwards compatibility.

Perceived Failures Examples 1.Personal firewalls 2.Reporting tools 3.Customer-side problems 4.Third-party measurements

Cascading Failures MTU adjustment problem in Linux kernel Linux crashes when TCP connection forces it to reduce MTU to approximately 570 bytes. Someone in Malaysia configured a router to use this value as its MTU. Client connecting through the router caused a cascade of Akamai servers to fail.

Attacks 8Gb/s attack inflicted on Akamai customer, October 2003 Attack on Akamai FirstPoint DNS system, July 2004

Lost in Space The most worrisome “attack” we faced: One of our servers started receiving properly authenticated control messages from an unknown host. Fortunately, the messages were not formatted correctly and were discarded by our server. After two days of investigation, we discovered that the “attacker” was an old server we had lost track of, trying to rejoin the system. It had been sending these messages for months before we noticed!