Content Distribution Networks Flashcards

1
Q

Why do we want to deploy caching?

A
  • High load on websites (video streaming)
  • Distance means latency
  • DDoS atacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do we want to achieve with caching?

A
  • Distribute load
  • min distance
  • distribute load
  • reduce intra-AS traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are edge-caches?

A

Content servers at the end of cdn

- placed in ISP networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why do we want to send packets from the same flow on the same path?

A

to prevent re-ordering if paths with different lengths are used. Re-ordering messes with TCP congestion control (in-order property of tcp).
Flows can be identified via the 5 tuple hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does consistent hashing work and why do we need it?

A

Map clients to a point on a circle. Clients walk around to find the server they should use. If n changes, only K/N keys need to be remapped.

servers can be remapped to mult positions on circle -> more even distribution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does HTTP load balancing work?

A

The load balancer redirects the user to the worker instead of forwarding traffic. Main server answers with a 302 temporarily moved with the IP address of the “worker” to the client. Browser automatically connects to this point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What 2 options exist for dealing with https traffic in loadbalancing?

A
  • SSL/TLS frontend - entry server decrypts traffic for internal network: cost efficient, central config&cert but snooping in network yields clear text
  • Perform enc/dec on content server: May burn resources, decryption as late as possible, easy deployment out-of-box
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does DNS load balancing work?

A

Resolve the same domain name for multiple ip addresses.

1: client chooses randomly
2: Dns LB chooses endpoint near to client (GeoIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does DDoS protection work?

A
  • Setup a DNS to protection provider (Cloudflare)
  • CDN serves static content
  • Dynamic content is served via the provider’s server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the problem with HTTPS on DDoS protection?

A
  • CDN needs to terminate the conneciton & has complete access
  • We don’t know how th e follow-up connection is encrypted (maybe not at all)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does anycast-based load balancing work?

A
  • DNS was not intended vs LB
  • Packet routing (& routing manipulation) via BGP
  • assign lots of content servers with same IP
  • announce IP prefix through lots of different sites
  • > BGP takes care of finding best available content server
  • > In practice, everybody uses 5-tuple hashing so no mult paths for same flow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which objescts do we cache in CDN caches?

A
  • Many objects are cached once
  • Disk space without benefits
  • > use cache filtering
  • > Bloom filter to decide which objects to cache
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are bloom filters and how do they work?

A

Bloom filters are binary arrays with mult hash functions. It can say in O(1) if a entry is (most likely) part of the base-set of the BF but can say definetly if its not.

It maps object hashes from mult functions into table with binary entries. “Lookup elements” are hashen and then checked if the hash values are part of the BF. If one is not present, it is definetly not an element in set of BF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly