I'M Duong

Senior Systems Development Engineer


#white2: The Rise of CDN

Since the 1990s, commercial CDNs have arisen. They evolved through numerous phases of evolution, much like any other decades-old technology, before becoming the strong application delivery platform they are today.

Market dynamics, such as new patterns in content consumption and huge advancements in connectivity, have impacted the CDN development trajectory. Optical fiber and other new communication technologies enabled the latter.

Overall, CDN evolution may be divided into three generations, each of which introduces new capabilities, technologies, and concepts into its own network architecture. Working in tandem, each generation has seen the pricing of CDN services fall, signaling the technology's transition into mainstream technology.

Following on from the first #white "What is a CDN? | How does a CDN work?", this one will explain the process of the rise of CDN, as well as many other sectors, before it made the huge advances it has now.

CDN and Cloud Security Evolution

When we consider what is lacking in the cloud, security is the missing element. While security has been relatively simple in the past, the cloud has made it a significant issue. When all of the hardware was installed, the usual security strategy (firewalls, intrusion prevention systems, intrusion detection systems, antivirus, and so on) was adequate. These techniques, however, no longer operate at the cloud or “hyperscale” scale. The internet will no longer be usable until the proper cloud security solution is implemented. Most of us are linked to the Internet 24 hours a day, seven days a week, but with the rising quantity and size of DDoS assaults, as well as the increasing amount of malware that is released every day, the Internet would be so hazardous that no one would want to stay connected. Users would most likely log in to perform a job and log out after it was completed. So, how can we improve cloud security? Begin with the content delivery network (CDN).

Rising Traffic Equals Rising Vulnerabilities

ResearchAndMarkets.com published a new article on the data processing and hosting industry "Data Center IP Traffic Estimated to Reach 20.6 Zettabytes by the End of 2021".

One of the consequences of the epidemic has been an acceleration of digital transformation in nearly every business. Data center IP traffic is anticipated to exceed 20.6 zettabytes (ZB) by the end of 2021, representing a roughly 7-fold increase over 2016. The need for colocation and hyperscale services will drive much of the development in the processing and computing sector Data hosting. suppliers of cloud services According to 451 Research, hyperscale providers will have installed 2.1 million additional IT racks between 2020 and 2025. Planned deployments will need an expenditure of roughly $62 billion in data center infrastructure.

The rising usage of data-generating IoT goods such as remote health monitoring systems, packing and shipment tracking devices, and streaming gadgets is projected to drive up demand for data storage. Because of the rising usage of telecommuting, telemedicine, and remote learning, the use of these IoT goods is increasing. Data processing and hosting services are likely to profit from the growth in teleworking for some time, as the COVID19 vaccination may not eliminate the need for social distance quickly.

The Internet of Things (IoT) emerged as a concept in the early 2000s, and as we approach 2021, trends indicate that this technology will be around for a long time. According to reports, there will be 35.82 billion IoT devices deployed globally by 2021, and 75.44 billion by 2025. IoT gadgets, ranging from smartwatches to voice assistants, are changing the way we work. We converse and connect with one another. Botnets may abuse all of these linked devices (for example, printers, gaming consoles, WiFi cameras, smart gadgets, and so on). As more gadgets connect to the internet, we will witness increasingly frequent and large-scale assaults.

Malicious activity hit an all-time high on March 7, 2017, following the publication of NSA tools on Wikileaks. 45,000 firms in 74 countries were affected in the days following the breach. Krebs' assault was almost 700 gigabytes in size, Dyn's attack was one terabit in size, and OVH's most recent attack was nearly two terabits in size. Throughout 2020, when communities throughout the world implemented lockdowns in an effort to limit COVID-19, Nokia Deepfield reported a 50% spike in DDoS activity.

"The continuous increases in the intensity, frequency, and complexity of DDoS assaults have led in a 100 percent rise in the 'high watermark level' of DDoS daily peaks — from 1.5 Tbps (January 2020) to over 3 Tbps (May 2021")," the business claimed. 

This is all owing to the hyper-scale. Linear mathematical methods can no longer correctly anticipate the rise of traffic and viruses. Overscaling, traffic, and malware are all on the rise. So, where does CDN play a factor?

The CDN serves as a link between data and consumers. The CDN transports data on both sides. You can address significant weaknesses in cloud computing by protecting the connections and pipelines that transport data between computers. Several sources put CDN market growth at 34% (CAGR), but I believe this is just 20-50% of true growth. be because it does not account for the cloud's rapid expansion. The quantity of data used by Cloudfront and Google in terms of CDN is not disclosed, but it is far greater than what we estimate for the traditional CDN sector. And he rises.

The CDN acts as a go-between in All Of This

When analyzing CDN rises, there are two key factors to examine. The first thing to mention is the mobile. By the end of 2017, mobile traffic will outnumber fixed traffic, accounting for 51% of total traffic. The second trend is overthetop (OTT) streaming, which will eventually supplant live TV. With these two significant events, CDN is preparing for a strong rise in the next few years. The issue is, who will have the best chance of winning? CDNs have developed to provide a wide variety of perimeter services, from hosting websites and downloading files to hosting and protecting APIs, including WAF (Web Application Firewall) and DDoS mitigation. It evolves by separating the servers for the services with a corporate infrastructure (triple stack router, network architecture). As the demand for a specific service arises, servers are added to meet the demand (eg WAF, DDoS, etc.). However, at the cloud-like hyperscale, this paradigm is inefficient.

Well how Begin with a CDN

A CDN must be the default inbound gateway for all inbound traffic in order to function. To do this, you will need to alter the DNS settings of your main domain (for example, domain.com) as well as those of your subdomains (eg www.domain.com, img.domain.com). 

You will change the A record for your primary domain to point to one of the CDN's IP address ranges. Change the CNAME record for each subdomain to point to a CDN-provided subdomain address (for example, ns1.cdn.com). In any case, all visitors will be routed to your CDN instead of being sent to your origin server.

Don't worry if all of this puzzles you. Today's CDN providers give step-by-step instructions to assist you with the activation process. They also offer assistance through their support staff. The entire procedure takes approximately five minutes and consists of a few copies and pastes.

You may begin utilizing CDN with VNG Cloud - vCDN, a prominent service in Vietnam.

(More #white to come)

Work hard and learn more invaluable lessons when serving in a professional, business-oriented environment so as to accumulate more experience for further overall advancement.


Start Work With Me

Contact Me

Duong Nguyen
+84 938-620-379
Ho Chi Minh City, Vietnam