Case Study: Akamai Technologies

2116 Words5 Pages

Case Study: Akamai Technologies

Akamai Technologies, Inc. is an organization which delivers the content over the Internet. It is one of the largest organizations which provide the distributive Computing Platforms; it provides a cloud based services to the end user. It serves 30% of the overall web traffic. Akamai provided numbers of servers which are located all over the globe and stores the web application of the clients. It provides a faster access to those applications because of the distributive contents in to various servers around the world. Akamai does not want the long routes to it distributed the data based on the locations, it works as like a work or a task which is not possible to be completed by a single persons is divided in to multiple process or threats or assign to teams to complete their individual part, so that task can be complete faster, in the same way the contents are stored at different servers based on their access mechanism.

Akamai provides services to their customers, it delivers the content to user by just browsing through web browser and downloading the contents from the server. “ Akamai does this task simultaneously mirroring contents, sometimes all site content including HTML, CSS and all software downloads and sometime just media objects, audio, graphics, animation, video or hyper texts ”, than Customer makes up an request and domain name is same and the Internet protocol address points to the one of the Akamai server or to some different machine, after the client request the servers from Akamai picked up automatically which depends on the current location of the user or the contents required by the user.

The user can than receive the contents from any of the Server of Akamai which depend...

... middle of paper ...

...stealing the data and hacking. The attacker sends botmaster sends attack commands to Bolts. A bolt then attacks the victims system. Boltmaster can update the Bolts remotely. (Panko, 2009).

References

Forouzan, B., A. (2010). TCP-IP Protocol Suite. Print ISBN: 0 07337604 3

Johnson, D., Maltz, D. (1996). Dynamic Source Routing in Ad-hoc Wireless network. Print ISBN: 0 79239697 0

Odom, W. (2008) CCNA ICND2 Official Exam Certification Guide Second Edition ISBN: 1 58720 181 X

Lv, X., Li, H., Wang, B. (2012) Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks ISSN: 19390114

Panko, R., R. (2009). Business Data Networks and Telecommunications. Print ISBN: 0 13615340 2

Zaliwski, A. (2005) Computer Network Simulation and Network Security Auditing in a Spatial Context of an Organization ISSN: 15475840

Open Document