Some basic questions about CDN and what for

1. What are the seven requirements of end users that relate to Content Networking?
The seven requirements of end users that relate to Content Networking are performance, availability, anonymity, ubiquity/accessibility, security, privacy, and personalization/relevancy.
2. What are the nine requirements of service providers that relate to Content Networking?
The nine requirements of service providers that relate to Content Networking are security, control, manageability, scalability, flexibility, diversity, customer demographics/data, differentiation, and profitability.
3. What was the original driving factor that led to today’s concept of Content Networking?
The original driving factor that led to today’s concept of Content Networking was performance requirements and to void peering congestion and server constraints.
4. What is a “health check?”
A health check is a test connection of some type sent to a system—often a server, but not always—to ascertain if that service on that system is functioning as expected. A failure means that service on that system won’t be used and a different healthy system must be used instead.

5. What was the original load balancing metric used?
The original load balancing metric used was round robin.
6. What is the most prevalent load balancing metric used? The most prevalent load balancing metric used is Least
Connections–LeastConns.
7. Are server agents an effective tool to improve load balancing metrics?
Server agents are not an effective tool to improve load balancing metrics. The benefit is small for most companies, compared to the cost involved with the type of detailed analysis and management required to make them beneficial rather than useless or even detrimental.
8. What are the most common functions performed by Content Networking devices?
The most common functions performed by Content Networking devices are load balancing, bandwidth management, caching, offload, redirection, and filtering.
9. What is the best data replication method?
The best data replication method depends on the environment and the needs of the business. Many factors must be considered such as data update frequency, purpose of replication (performance vs. availability), and content types.
10. What are the three major types of CDN service?
The three major types of CDN service are Internet CDN, subscriber CDN,
and enterprise CDN.
11. What are the three major types of Internet CDN implementation styles?
The three major types of Internet CDN implementation styles are overlay, peering, and hosting.
12. What are the two main purposes of CDNs?
The two main purposes of CDNs are higher performance and availability.

About the Author

Trần Huy

View all author's posts

Bài viết khác

Use AWS to deploy your applications and services

Amazon Web Services (AWS) is a cloud computing platform that provides a wide range of services to help businesses and individuals build and deploy applications in the cloud. AWS offers a variety of services such as compute, storage, databases, networking, security, and more. In this guide, we will walk through the steps to get started […]

Use docker to run go project

Docker is a powerful tool that enables developers to create, deploy and run applications in a containerized environment. Using Docker to run Go projects has many advantages, including the ability to isolate your application from the underlying operating system, simplifying the deployment process, and allowing for greater scalability and flexibility. In this guide, we will […]

Install WSL for windows 10

1/ Enable feature Windows Subsystem for Linux Head to Control Panel > Programs > Turn Windows Features On Or Off. Enable the “Windows Subsystem for Linux” option in the list, and then click the “OK” button. Restart computer Now you can type on console: wsl –help 2/ Download ubuntu 18 from Microsoft Store or open […]

Make a binary file or script file run on startup on ubuntu

To make a binary file run on boot, you can create a startup script that will run the binary file when the operating system starts. The exact process for creating a startup script depends on the operating system you’re using. Here’s an example for a Linux operating system using the systemd init system: Create a […]

Explicit ssl bumping with Squid

To perform explicit SSL bumping with Squid, you need to perform the following steps: Generate a SSL certificate and key: You can either generate a self-signed certificate or obtain one from a certificate authority. The certificate and key will be used by Squid to encrypt and decrypt the traffic. Install and configure Squid: Squid is […]

Explicit ssl bumping with HAProxy

Basic guide About Explicit SSL bumping Explicit SSL bumping also known as “SSL interception,” is a feature of some reverse proxies and security appliances that allows the proxy to decrypt, inspect, and re-encrypt SSL/TLS encrypted traffic. The proxy acts as a man-in-the-middle, decrypting incoming SSL/TLS traffic and re-encrypting it before forwarding it to the destination […]