{"id":1751,"date":"2023-01-12T08:49:54","date_gmt":"2023-01-12T08:49:54","guid":{"rendered":"https:\/\/blog.amt.in\/?p=1751"},"modified":"2023-01-12T08:49:54","modified_gmt":"2023-01-12T08:49:54","slug":"insights-on-content-delivery-network","status":"publish","type":"post","link":"https:\/\/blog.amt.in\/index.php\/2023\/01\/12\/insights-on-content-delivery-network\/","title":{"rendered":"Insights on Content Delivery Network"},"content":{"rendered":"<p>A\u00c2\u00a0content delivery network, or\u00c2\u00a0content distribution network\u00c2\u00a0(CDN), is a geographically distributed network of\u00c2\u00a0proxy servers\u00c2\u00a0and their\u00c2\u00a0data centers. The goal is to provide high availability and performance by distributing the service spatially relative to\u00c2\u00a0end users. CDNs came into existence in the late 1990s as a means for alleviating the performance bottlenecks of the Internet,\u00c2\u00a0even as the Internet was starting to become a mission-critical medium for people and enterprises. Since then, CDNs have grown to serve a large portion of the Internet content today, including web objects (text, graphics and scripts), downloadable objects (media files, software, documents), applications (e-commerce,\u00c2\u00a0portals),\u00c2\u00a0live streaming\u00c2\u00a0media, on-demand streaming media, and\u00c2\u00a0social media\u00c2\u00a0sites.<\/p>\n<p>CDNs are a layer in the internet ecosystem. Content owners such as media companies and e-commerce vendors pay CDN operators to deliver their content to their end users. In turn, a CDN pays\u00c2\u00a0Internet service providers (ISPs), carriers, and network operators for hosting its servers in their data centers.<\/p>\n<p>CDN is an umbrella term spanning different types of content delivery services:\u00c2\u00a0video streaming, software downloads, web and mobile content acceleration, licensed\/managed CDN, transparent caching, and services to measure CDN performance,\u00c2\u00a0load balancing, Multi CDN switching and analytics and cloud intelligence. CDN vendors may cross over into other industries like security, with\u00c2\u00a0DDoS\u00c2\u00a0protection and\u00c2\u00a0web application firewalls\u00c2\u00a0(WAF), and WAN optimization.<\/p>\n<p>CDN nodes are usually deployed in multiple locations, often over multiple\u00c2\u00a0Internet backbones. Benefits include reducing bandwidth costs, improving page load times, or increasing global availability of content. The number of nodes and servers making up a CDN varies, depending on the architecture, some reaching thousands of nodes with tens of thousands of servers on many remote\u00c2\u00a0points of presence\u00c2\u00a0(PoPs). Others build a global network and have a small number of geographical PoPs.<\/p>\n<p>Requests for content are typically algorithmically directed to nodes that are optimal in some way. When optimizing for performance, locations that are best for serving content to the user may be chosen. This may be measured by choosing locations that are the fewest\u00c2\u00a0<a title=\"Hop (networking)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Hop_(networking)\">hops<\/a>, the lowest number of network seconds away from the requesting client, or the highest availability in terms of server performance (both current and historical), so as to optimize delivery across local networks. When optimizing for cost, locations that are least expensive may be chosen instead. In an optimal scenario, these two goals tend to align, as\u00c2\u00a0edge servers\u00c2\u00a0that are close to the end user at the edge of the network may have an advantage in performance or cost.<\/p>\n<p>Most CDN providers will provide their services over a varying, defined, set of PoPs, depending on the coverage desired, such as United States, International or Global, Asia-Pacific, etc. These sets of PoPs can be called &#8220;edges&#8221;, &#8220;edge nodes&#8221; or &#8220;edge networks&#8221; as they would be the closest edge of CDN assets to the end user.<\/p>\n<p>CDN providers profit either from direct fees paid by\u00c2\u00a0content providers\u00c2\u00a0using their network, or profit from the user analytics and tracking data collected as their scripts are being loaded onto customer&#8217;s websites inside their\u00c2\u00a0browser origin. As such these services are being pointed out as potential privacy intrusion for the purpose of\u00c2\u00a0behavioral targeting\u00c2\u00a0and solutions are being created to restore single-origin serving and caching of resources.<\/p>\n<p>CDN networks serving JavaScript have been also targeted as a way to inject malicious content into pages using them.\u00c2\u00a0Subresource Integrity\u00c2\u00a0mechanism was created in response to ensure that the page loads a script whose content is known and constrained to a hash referenced by the website author.<\/p>\n<p>The Internet was designed according to the\u00c2\u00a0end-to-end principle.\u00c2\u00a0This principle keeps the core network relatively simple and moves the intelligence as much as possible to the network end-points: the hosts and clients. As a result, the core network is specialized, simplified, and optimized to only forward data packets.<\/p>\n<p>Content Delivery Networks augment the end-to-end transport network by distributing on it a variety of intelligent applications employing techniques designed to optimize content delivery. The resulting tightly integrated overlay uses web caching, server-load balancing, request routing, and content services.<\/p>\n<p>Web caches\u00c2\u00a0store popular content on servers that have the greatest demand for the content requested. These shared network appliances reduce bandwidth requirements, reduce server load, and improve the client response times for content stored in the cache. Web caches are populated based on requests from users (pull caching) or based on preloaded content disseminated from content servers (push caching).<\/p>\n<p>Server-load balancing uses one or more techniques including service-based (global load balancing) or hardware-based (i.e.\u00c2\u00a0layer 4\u00e2\u20ac\u201c7 switches, also known as a web switch, content switch, or multilayer switch) to share traffic among a number of servers or web caches. Here the switch is assigned a single virtual\u00c2\u00a0IP address. Traffic arriving at the switch is then directed to one of the real\u00c2\u00a0web servers\u00c2\u00a0attached to the switch. This has the advantage of balancing load, increasing total capacity, improving scalability, and providing increased reliability by redistributing the load of a failed web server and providing server health checks.<\/p>\n<p>A content cluster or service node can be formed using a layer 4\u00e2\u20ac\u201c7 switch to balance load across a number of servers or a number of web caches within the network.<\/p>\n<p>Request routing directs client requests to the content source best able to serve the request. This may involve directing a client request to the service node that is closest to the client, or to the one with the most capacity. A variety of algorithms are used to route the request. These include Global Server Load Balancing, DNS-based request routing, Dynamic metafile generation, HTML rewriting,\u00c2\u00a0and\u00c2\u00a0anycasting.\u00c2\u00a0Proximity\u00e2\u20ac\u201dchoosing the closest service node\u00e2\u20ac\u201dis estimated using a variety of techniques including reactive probing, proactive probing, and connection monitoring.<\/p>\n<p>CDNs use a variety of methods of content delivery including, but not limited to, manual asset copying, active web caches, and global hardware load balancers.<\/p>\n<p>The above is a brief about Content Delivery Networks. Watch this space for more updates on the latest trends in Technology.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A\u00c2\u00a0content delivery network, or\u00c2\u00a0content distribution<\/p>\n","protected":false},"author":1,"featured_media":1753,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[935,936,7],"tags":[937,938,18],"class_list":["post-1751","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-content-delivery-network","category-proxy-servers","category-techtrends","tag-content-delivery-network","tag-proxy-servers","tag-technology"],"_links":{"self":[{"href":"https:\/\/blog.amt.in\/index.php\/wp-json\/wp\/v2\/posts\/1751","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.amt.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.amt.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.amt.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.amt.in\/index.php\/wp-json\/wp\/v2\/comments?post=1751"}],"version-history":[{"count":1,"href":"https:\/\/blog.amt.in\/index.php\/wp-json\/wp\/v2\/posts\/1751\/revisions"}],"predecessor-version":[{"id":1752,"href":"https:\/\/blog.amt.in\/index.php\/wp-json\/wp\/v2\/posts\/1751\/revisions\/1752"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.amt.in\/index.php\/wp-json\/wp\/v2\/media\/1753"}],"wp:attachment":[{"href":"https:\/\/blog.amt.in\/index.php\/wp-json\/wp\/v2\/media?parent=1751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.amt.in\/index.php\/wp-json\/wp\/v2\/categories?post=1751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.amt.in\/index.php\/wp-json\/wp\/v2\/tags?post=1751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}