Overlay Networks : An Akamai Perspective

Slides:



Advertisements
Similar presentations
Ningning HuCarnegie Mellon University1 Optimizing Network Performance In Replicated Hosting Peter Steenkiste (CMU) with Ningning Hu (CMU), Oliver Spatscheck.
Advertisements

Cloud Download : Using Cloud Utilities to Achieve High-quality Content Distribution for Unpopular Videos Yan Huang, Tencent Research, Shanghai, China Zhenhua.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Criticisms of I3 Jack Lange. General Issues ► Design ► Performance ► Practicality.
An Analysis of Internet Content Delivery Systems Stefan Saroiu, Krishna P. Gommadi, Richard J. Dunn, Steven D. Gribble, and Henry M. Levy Proceedings of.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
1 Drafting Behind Akamai (Travelocity-Based Detouring) AoJan Su, David R. Choffnes, Aleksandar Kuzmanovic, and Fabian E. Bustamante Department of Electrical.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Content Delivery Networks. History Early 1990s sees 100% growth in internet traffic per year 1994 o Netscape forms and releases their first browser.
Caching and Content Distribution Networks. Web Caching r As an example, we use the web to illustrate caching and other related issues browser Web Proxy.
Content Distribution Networks (CDNs) Mike Freedman COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
WAN Technologies.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Networking Components Chad Benedict – LTEC
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 Content Distribution Networks. 2 Replication Issues Request distribution: how to transparently distribute requests for content among replication servers.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
P2P Games Conference “Attributes of the Gaming Cloud?” Norman Henderson ASANKYA
P2P File Sharing Systems
Content Distribution March 8, : Application Layer1.
VAP What is a Virtual Application ? A virtual application is an application that has been optimized to run on virtual infrastructure. The application software.
P2P Architecture Case Study: Gnutella Network
Hosted by Gain Maximum WAN and LAN Performance Michael Hoch Research Director Aberdeen Group.
1 MultimEDia transport for mobIlE Video AppLications 9 th Concertation Meeting Brussels, 13 th February 2012 MEDIEVAL Consortium.
Infrastructure for Better Quality Internet Access & Web Publishing without Increasing Bandwidth Prof. Chi Chi Hung School of Computing, National University.
The application of P2P technology. Team Member: LIU Chang, ZHANG jianing Presentation: LIU Chang.
Web Application Firewall (WAF) RSA ® Conference 2013.
Akamai Technologies - Overview RSA ® Conference 2013.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
Higashino Lab. Maximizing User Gain in Multi-flow Multicast Streaming on Overlay Networks Y.Nakamura, H.Yamaguchi and T.Higashino Graduate School of Information.
Bellwether: Surrogate Services for Popular Content Duane Wessels & Ted Hardie NANOG 19 June 12, 2000.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
Putting Intelligence in Internetworking: an Architecture of Two Level Overlay EE228 Project Anshi Liang Ye Zhou.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
CONTENT DELIVERY NETWORKS
Multimedia & Mobile Communications Lab.
A Utility-based Approach to Scheduling Multimedia Streams in P2P Systems Fang Chen Computer Science Dept. University of California, Riverside
APPLICATION LAYER MULTICASTING
PROP: A Scalable and Reliable P2P Assisted Proxy Streaming System Computer Science Department College of William and Mary Lei Guo, Songqing Chen, and Xiaodong.
Overlay Networks: An Akamai Perspective Ramesh K. Sitaraman, mangesh kasbekar, Woody Lichtenstein, and Manish Jain Akamai Technologies Inc Univerisy of.
Content Distribution Network, Proxy CDN: Distributed Environment
Kona Security Solutions - Overview
Bruce Hammer, Steve Wallis, Raymond Ho
Ming-Chen Zhao, Paarijaat Aditya, Yin Lin Andreas Haeberlen, Peter Druschel, Bruce Maggs, and William Wishon A First Look at a Hybrid Content Delivery.
Content Delivery Networks: Status and Trends Speaker: Shao-Fen Chou Advisor: Dr. Ho-Ting Wu 5/8/
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Hiearchial Caching in Traffic Server. Hiearchial Caching  A set of techniques and mechanisms to increase the size and performance of network caches.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
An Analysis of Internet Content Delivery Systems 19 rd November, 2007 Youngsub CSE, SNU.
Content Distribution Networks (CDNs)
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Content Delivery Cloud A Better Alternative To Your Content Delivery Network (CDN) ©2013 Riverbed Technology Confidential and Proprietary.
Multicast in Information-Centric Networking March 2012.
Content Distribution Networks
Auction-based in-network caching in Information-centric networks Workshop ACROSS, 16th of September 2016 | Lucia D’Acunto.
Content Distribution Networks
Mohammad Malli Chadi Barakat, Walid Dabbous Alcatel meeting
Introduction to Networking
Utilization of Azure CDN for the large file distribution
ECE 671 – Lecture 16 Content Distribution Networks
Evaluating Proxy Caching Algorithms in Mobile Environments
Edge computing (1) Content Distribution Networks
Content Distribution Networks
AWS Cloud Computing Masaki.
Consideration on applying ICN to Edge Computing
It Followed Me Home: Exploring Strong Last Hop Devices and CDNs
Engineering a Content Delivery Network
EE 122: Lecture 22 (Overlay Networks)
Engineering a Content Delivery Network
Presentation transcript:

Overlay Networks : An Akamai Perspective Ramesh K. Sitaraman, Mangesh Kasbekar, Woody Lichtenstein, Manish Jain Akamai Technologies Inc

Why Overlay Networks? Today's Internet is a vast patchwork of more than 13,000 autonomous networks that often compete for business. Failures and security breach are routine occurrences. The gap between what the Internet offers and what the user wants is bridged by Overlay networks

Virtualization The fundamental idea is rooted in the age-old computing paradigm of virtualization that states that “if you do not have what you want, then you can virtually create what you want with what you have.”

Types of Overlay Networks Caching overlays deliver online immutable content at a larger scale Routing overlays deliver dynamic content with good efficiency – improves latency and throughput Security overlays improve the security and mitigates DDoS Often used together as a part of a single solution

Overlay Networks An overlay network is built on top of the public Internet to provide the stringent requirements that rich Internet-based services need

Overlay Networks Sometimes there is an additional layer of cache servers between the edge and the origin The architecture of a a caching overlay for content delivery

Overlay Networks Performance benefits of a caching overlay

Origin offload rate Determined by what fraction of the content is served by the edge servers. It depends on the cache hit rate, which is high for the popular items, but low for the infrequently accessed objects. Mostly popular contents

Caching unpopular contents Unpopular contents have a much lower hit rate for the edge server, but Akamai uses a sophisticated content location technique to direct these requests to the right parent server. This facilitates origin offload. Mostly unpopular contents

Routing Overlays Required for scaling up the delivery of dynamic contents and live streams. These are not cacheable. An end-user (EU) downloads dynamic content from an edge server (ES). The edge server in turn can download directly from origin (O) or through a set of alternate overlay paths constructed between the edge server (ES) and a reverse proxy (I1)

Routing Overlays The overlay construction algorithm typically chooses a reverse proxy close to or even co-located with the origin. The reverse proxy must have the smallest possible latency. Further, while the overlay provider can ensure persistent TCP connections between any two nodes of the overlay, the first hop is dependent on the origin that is controlled by the content provider.

Routing Overlays Download time Performance of the routing overlay during an undersea cable cut from Europe to Asia in 2010

Security Overlay To combat DDoS, one approach taken by Akamai is to deploy shared spare capacity of servers. The spare capacity that can be made available should be large enough so that it is unlikely to be overwhelmed even by the largest DDoS attacks that are likely to occur. Thus the spare capacity can be used to hold a high-volume attack away from the origin servers. Other approaches include firewalling the origin from users not in a specified ip address range, thus easily identifying and blocking any traffic that arrives at the origin from outside the secure overla

The Last Mile Content from an edge server is distributed by a BitTorrent-like mechanism to the end users. However, Red Swoosh (acquired by Akamai for $15 million in 2007 did not last for more than a year. Facebook to optimize mobile CDN with QuickFire purchase January 9, 2015 Facebook is targeting mobile video with the QuickFire Networks, in a bid to upgrade its mobile video hosting capabilities. The San Diego-based startup utilizes bandwidth compression technology to reduce the amount of capacity required to host video online.