Massive Heterogeneous Resource Management and Scheduling Technology
The massive heterogeneous resource management and scheduling technology is designed to coordinate the usage of various kinds of networks and computing resources, such as IDC networks, enterprise office networks, personal computers and home routers that are located near the end users. We employ advanced decision-making algorithms to optimize resource allocation and task scheduling based on user demand and network conditions. This ensures swift delivery of contents and optimizes the utilization of network resources. In addition, such technologies also possess key functions including non-intrusive user access based on temporary redirects, web-wide caching, and hot/cold data exchange engine based on data volumes. These technological advancements enable the breakthroughs from the traditional CDN scale of thousands of nodes and tens of thousands of servers to the capability of managing and using millions of nodes and numerous servers to process massive heterogeneous resources.As a result, we are able to process massive data closer to end users at lower costs and minimized network latency, with service quality comparable to traditional CDN.
Global High-performance SD-WAN
We have designed and implemented a set of proprietary technologies to optimize the performance of network transmission, represented by the global high-performance SD-WAN that effectively interconnects massive heterogeneous edge nodes securely and efficiently. Central cloud service providers must construct fiber network to address this problem. In comparison, our global high-performance SD-WAN constitutes all edge nodes into one network, which lays the network foundation for edge cloud scheduling control and end-to-end use cases, such as video conferencing, IoT communication control and multi-branch security networking, to achieve intelligently and centrally unified network management. Our technical advancements in SD-WAN are mainly represented by (1)data plane with stateless transit nodes achieved through segmented routing for fast convergence optimal traffic scheduling on the global scale and flexible adaptation to the network transmission needs of different business scenarios; and (3) global dynamic intelligent routing algorithm and real-time dynamic link optimization, aiming to achieve high accessibility, high stability, high speed and low cost for peer-to-peer communication worldwide. Global high-performance SD-WAN can achieve faster data transmission in different use cases. For example, the speed of file download can be accelerated by more than 10 times.
Edge-native Technology
Edge-native technology serves as the unified underlying technical infrastructure for our service modules. Although edge cloud nodes are a large number of heterogeneous networks, devices and operating systems, we introduce edge-native technology to achieve unified abstraction and encapsulation to build and run highly scalable,flexible and resilient applications on cloud infrastructure. We adopt the same standardized cloud computing technology architecture for each edge cloud node through edge-native technology so that the underlying computing resources are pooled for flexible yet unified platform-wise capacity management. The underlying heterogeneity is transparent to the upper layer business and simplifies our development and operation management. Based on such a standardized technology platform, we are able to significantly improve the efficiency of application development and shorten the development cycle of new services.
Built-in Edge Security Technology
We have developed built-in edge security technology to protect both our infrastructures and our security and computing services. To cope with massive DDoS attacks, we developed the high-performance anti-DDoS firewall software,which is capable of achieving a single machine IP message processing capacity of 10 million PPS. Our edge nodes use containers and the microservice architecture to achieve secure resource orchestration when allocating separate network and process spaces for different services, minimizing the mutual impact caused by application security vulnerabilities.Furthermore, we have built a globally unified zero-trust network to achieve secureinterconnection of global office intranets and a zero-trust security-based access control to enable a transparent and secure authentication of each access to office applications.