Overlay Networks: An Akamai Perspective Ramesh K. Sitaraman, mangesh kasbekar, Woody Lichtenstein, and Manish Jain Akamai Technologies Inc Univerisy of.

Slides:



Advertisements
Similar presentations
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Advertisements

Network Resource Management Jason Gaedtke Chief Scientist W3C Video on the Web Workshop December 2007.
1 Content Delivery Networks iBAND2 May 24, 1999 Dave Farber CTO Sandpiper Networks, Inc.
19 Historical overview Main challenge: How to distribute content in high quality over the Internet cost-effectively? • Traditional “Best-effort” model:
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
An Analysis of Internet Content Delivery Systems Stefan Saroiu, Krishna P. Gommadi, Richard J. Dunn, Steven D. Gribble, and Henry M. Levy Proceedings of.
CSE 190: Internet E-Commerce Lecture 16: Performance.
PSMC Proxy Server-based Multipath Connection CS 526 Advanced Networking - Richard White.
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Lecture Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Or, Providing Scalable, Decentralized Location and Routing Network Services Tapestry: Fault-tolerant Wide-area Application Infrastructure Motivation and.
Content Delivery Networks. History Early 1990s sees 100% growth in internet traffic per year 1994 o Netscape forms and releases their first browser.
Tradeoffs in CDN Designs for Throughput Oriented Traffic Minlan Yu University of Southern California 1 Joint work with Wenjie Jiang, Haoyuan Li, and Ion.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Wally Kowal, President and Founder Canadian Cloud Computing Inc.
SPRING 2011 CLOUD COMPUTING Cloud Computing San José State University Computer Architecture (CS 147) Professor Sin-Min Lee Presentation by Vladimir Serdyukov.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Lecture 1, 1Spring 2003, COM1337/3501Computer Communication Networks Rajmohan Rajaraman COM1337/3501 Textbook: Computer Networks: A Systems Approach, L.
1 Content Distribution Networks. 2 Replication Issues Request distribution: how to transparently distribute requests for content among replication servers.
P2P Games Conference “Attributes of the Gaming Cloud?” Norman Henderson ASANKYA
Content Distribution March 8, : Application Layer1.
Page  1 SaaS – BUSINESS MODEL Debmalya Khan DEBMALYA KHAN.
Introduction to Cloud Computing
Design Windows Media Services Infrastructure. Module 7: Design Windows Media Services Infrastructure Design Windows Media Services for live streaming.
Hosted by Gain Maximum WAN and LAN Performance Michael Hoch Research Director Aberdeen Group.
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
{ Content Distribution Networks ECE544 Dhananjay Makwana Principal Software Engineer, Semandex Networks 5/2/14ECE544.
Global NetWatch Copyright © 2003 Global NetWatch, Inc. Factors Affecting Web Performance Getting Maximum Performance Out Of Your Web Server.
Network management Reinhard Laroy BIPT European Parliament - 27 February 2012.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Overcast: Reliable Multicasting with an Overlay Network CS294 Paul Burstein 9/15/2003.
P4P: Provider Portal for Applications Haiyong Xie, Y. Richard Yang Arvind Krishnamurthy, Yanbin Liu, Avi Silberschatz SIGCOMM ’08 Hoon-gyu Choi
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
An Efficient Approach for Content Delivery in Overlay Networks Mohammad Malli Chadi Barakat, Walid Dabbous Planete Project To appear in proceedings of.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
Economic Incentives in Information- Centric Networking: Implications for Protocol Design and Public Policy Group Members: Muhammad Kamran Siddique Adel.
Kiew-Hong Chua a.k.a Francis Computer Network Presentation 12/5/00.
Distributed Information Systems. Motivation ● To understand the problems that Web services try to solve it is helpful to understand how distributed information.
Flashback: A Peer-to-Peer Web Server for Flash Crowds Presented by Tom Batkiewicz CS 587x Fall ‘07.
Akamai capabilities overview and it’s impact on Iowa.Gov and selected web pages.
PROP: A Scalable and Reliable P2P Assisted Proxy Streaming System Computer Science Department College of William and Mary Lei Guo, Songqing Chen, and Xiaodong.
TSV P2P Efforts – From an ISP’s Perspective Richard Woundy DECADE and CDNI co-chair.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
CoopNet: Cooperative Networking
Overlay Networks : An Akamai Perspective
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Content Delivery Networks: Status and Trends Speaker: Shao-Fen Chou Advisor: Dr. Ho-Ting Wu 5/8/
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
Content Delivery Cloud A Better Alternative To Your Content Delivery Network (CDN) ©2013 Riverbed Technology Confidential and Proprietary.
Multicast in Information-Centric Networking March 2012.
Barracuda Link Balancer
CIIT-Human Computer Interaction-CSC456-Fall-2015-Mr
Distributed Cache Technology in Cloud Computing and its Application in the GIS Software Wang Qi Zhu Yitong Peng Cheng
P4P : Provider Portal for (P2P) Applications Haiyong Xie, Y
Dedicated Servers vs Cloud Hosting
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Mohammad Malli Chadi Barakat, Walid Dabbous Alcatel meeting
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Introduction to Local Area Networks
AWS Cloud Computing Masaki.
It Followed Me Home: Exploring Strong Last Hop Devices and CDNs
Internet and Web Simple client-server model
Beyond FTP & hard drives: Accelerating LAN file transfers
Engineering a Content Delivery Network
EE 122: Lecture 22 (Overlay Networks)
Engineering a Content Delivery Network
Presentation transcript:

Overlay Networks: An Akamai Perspective Ramesh K. Sitaraman, mangesh kasbekar, Woody Lichtenstein, and Manish Jain Akamai Technologies Inc Univerisy of Massachusetts, Amherst Presented by Huazhe Wang

Akamai Technologies, Inc. is a content delivery network and cloud services provider headquartered in Cambridge, Massachusetts, in the United States.

Outline Motivation Overview of Overlay Networks Caching Overlays Routing Overlays Security Overlays

Content Distribution using the Internet The Internet is increasingly being used for digital content and media delivery.  Business, commerce, entertainment, news and social interactions Requirements: high reliability, performance, security, scalability and low operating costs.  Major e-commerce sites require 99.99% of reliability  TransportingTens of petabits per second of data to support High quality television

Deficiencies of the Internet A heterogeneous network of networks  Access traverses multiple networks to obtain content “Best effort” Failures and performance degradation are common

Major shortcomings of the Internet Outrages  Misconfigured routers, DDoS attacks, cable cuts, power disruptions… Congestion  High traffic demand  Economic reasons Lack of scalability  One point failure  Over/under provisioning server C0C0 client 1 client 2 client n

Major shortcomings of the Internet Slow adaptability  Large investment  Business relations Lack of security  Growing Distributed denial of service (DDoS) attacks  Cost additional servers and bandwidth

Challenges: How to bridge the gap between what modern Internet-based services need and what the Internet actually provides? Redesign of the Internet  Hard to implement given the wide-adoption of the current technology Overlay Networks

Overview of Overlay Networks Fundamental idea: virtually great what you want with what you have.  Fragmented storage to a single, contiguous virtual memory space  Virtual machine  Internet was built as a overlay on top of the telephone network

Overview of Overlay Networks An overlay network is built on top of the public Internet to provide the stringent requirements that rich Internet-based services need.

Peer to peer (P2P) Overlays P2P uses end users’ host to form overlays that can be used for downloading content.  Unnecessary long distance  Traversing multiple Ass

P2P Problem : Network Inefficiency P2P applications are largely network- oblivious and may not be network efficient  Verizon (2008) average P2P bit traverses 1,000 miles on network average P2P bit traverses 5.5 metro-hops  Karagiannis et al. on BitTorrent, a university network (2005) 50%-90% of existing local pieces in active users are downloaded externally

Peer to peer (P2P) Overlays Hybrid approaches that combine P2P principles with a dedicated overlay infrastructure are widely used. Overlays described in the paper use a dedicated server infrastructure owned and operated by the overlay provider, rather than the computers belonging to users.

Overlay Architecture Overlays used to deliver content, applications and services  Origins One or a few, locates in core  Edge servers Hundreds thousand Locates at the edges, close to users  Transport system High reliability and performance

Outline Motivation Overview of Overlay Networks Caching Overlays Routing Overlays Security Overlays

Caching Overlays Caching HTTP/HTTPS proxy servers Usage  Static objects can be cached for some period Embedded image on a web page, a movie, a music, a software download, or a software update Benefits  Availability, performance and origin offload

Performance benefits 30 agents located in Asia, Europe, and North America The agents hourly download a popular web page Origin servers locate in Dallas

Origin offload benefits Origin offload  Is equal to the ratio of the volume of traffic served by the origin without the overlay to the volume of traffic served by the origin with the overlay.  A large decrease in server, bandwidth, expenses. Popular vs cold traffic  Cache hierarchy Adding a layer of parent servers Increases the origin offload, easy to implement

Performance benefits Origin offload increases with deployment of cache hierarchy

Performance benefits

Outline Motivation Overview of Overlay Networks Caching Overlays Routing Overlays Security Overlays

Yale LANS Routing Overlays Usage  Not all content on the Internet is cacheable for long time Gaming, live streams. Benefits  Discovering better ‘overlay path’ to improve performance and availability

Yale LANS Routing Overlays Some issues to be considered  An overlay construction algorithm to compute a set of candidate overlay paths Real-time latency, loss, available bandwidth Choosing which of these paths to use depends on real-time testing of the different path options.

Yale LANS Routing Overlays Formulating overlay construction as multi- commodity flow

Yale LANS Routing Overlays Link costs can be defined in different ways to construct different types of routing overlays.  Latency vs bandwidth price e.g. finding the fastest overlay routes while avoiding links that are too expensive, or finding the cheapest overlay paths while avoiding paths that are too slow.  Throughput Minimizing latency is important when delivering small-size responses. Maximizing throughput is important for large responses.  TCP performance The overlay paths must remain “sticky" over longer periods of time.

Yale LANS Routing Overlays Selecting the reverse proxy  Choosing a reverse proxy close to the origin Low latency, loss, Shared link Reducing penalty to set up a new TCP connection

Performance benefits The significantly greater performance is due to the ability of the routing overlay to find alternate paths that avoid the failed links between different parts of Asia to the Boston origin.

Performance benefits Without major Internet outrage

Outline Motivation Overview of Overlay Networks Caching Overlays Routing Overlays Security Overlays

Yale LANS Security Overlays Defending against DDoS attacks  Not provided by Internet architecture  In caching/routing overlay networks, performing security tasks at the edge server of overlay networks is effective. Security overlay Architecture

Yale LANS Security Overlays Security overlay Architecture  Shared attack capacity Is flexible to increase bandwidth capacity at some locations on-demand as needed. Cost effective.  Shared expertise and lower costs A team of security experts provides high level of defense with low costs.  Advanced security features Security features to defend against all kind of attacks, like a networking stack, firewall.

Yale LANS Security Overlays  Shielding the origin Shielding the origin from accesses coming from strange end hosts  Control design Controls are provided for individual content providers

Performance benefits 50 to 9000 during a DDoS attack 90% of attacker’s requests are denied

Summary  Overlays hold the keys to the rapid evolution of Internet services.  Three key types of overlays.

Thank you and Questions