What is CDN? Learn All About Content Delivery Network

READ FULL ARTICLE CLOSE
Akamai logo image

Akamai 4.8

3.9

RESPONSE TIME

22ms

RUM by cedexis.com

Type: Response Time
Last 24 Hours: 19/03/2024
Geography: North America
Based on: 50th Percentile

Availability

99.54%

RUM by cedexis.com

Type: Availability
Last 24 Hours: 19/03/2024
Geography: North America
Based on: 50th Percentile

THROUGHPUT

18,906Mbps

RUM by cedexis.com

Type: Throughput
Last 24 Hours: 19/03/2024
Geography: North America
Based on: 50th Percentile

points of presence

2200

Point of Presence

Total number of CDN Provider Point of Presence. CDN providers might have multiple POPs / Nodes per edge location.
300 0 50 75 50 650 75 1000
  • SSl . Yes
  • HTTP/2 . Yes
  • COMPRESSION . Yes
  • IPV6 . Yes
  • ORIGIN SHIELD . Yes
  • PCI COMPLIANT . Yes
 

Annual Review

  • Better
  • Worse
  • Yesterday

Last updated August, 2018 .
Data by Cedexis 19 March 2024

Price
$1,250 - $22,500
Performance
Response Time - 22ms
Availability - 99.54%
Throughput - 18,906Mbps
Focus
Web, Streaming, Private, Security
Pros
- Market leader with over 50% market shares based on annual revenue and has majority of fortune 500 as customers- Mature, scalable and established with truly global extensive footprint- Offer CDN, DNS, Security and Performance solutions (intelligent Real User Measurement (RUM))
Cons
- Charges for midress traffic (Data transfer generated between edge locations - Usually 25% of total data transfer)- Purging (Invalidating) cached content takes longer across the whole network as of the many edge locations- Bureaucratic and less flexible than other CDNs

provider’s focus

  • Web 22
  • Streaming 21
  • Reseller 1
  • Private 9
  • Federation 3
  • Security 11
  • Telco 3
  • Hosting 4

pros

  • Market leader with over 50% market shares based on annual revenue and has majority of fortune 500 as customers
  • Mature, scalable and established with truly global extensive footprint
  • Offer CDN, DNS, Security and Performance solutions (intelligent Real User Measurement (RUM))

CONS

  • Charges for midress traffic (Data transfer generated between edge locations - Usually 25% of total data transfer)
  • Purging (Invalidating) cached content takes longer across the whole network as of the many edge locations
  • Bureaucratic and less flexible than other CDNs

edge locations

Last updated August, 2018

performance

Data by Cedexis 19 March 2024
Response Time, ms
  • North America 22
  • Oceania 12
  • Europe 14
  • Asia 11
  • Africa 69
  • South America 19
Availability, %
  • North America 99.54
  • Oceania 99.26
  • Europe 98.43
  • Asia 99.33
  • Africa 98.94
  • South America 99.54
Throughput, Mbps
  • North America 18,906
  • Oceania 15,065
  • Europe 15,027
  • Asia 11,560
  • Africa 5,637
  • South America 12,686

supported services

  • Web 22
  • Streaming 21
  • Private 9
  • Security 11
  • Not Supported
  • Unknown
  • Supported
  • Additional Cost
  • Cacheable Content Acceleration Commonly referred as CDN, is the core service that brings cacheable content closer to the end-users either geographically or logically by caching content on CDN pops or edges so that is scalable, available and fast to deliver.
  • Non-Cacheable Content Acceleration CDN provider creates a persistent connection between customer origin and the closest CDN edge location to eliminate the tcp 3 way handshake and tcp slow start. then applies a series of tcp optimisations (multIPlexing, etc) between CDN edge locations to deliver non-cacheable content as fast and efficiently as possible to the end-users.
  • Shared CDN Domain SSL CDN provider generates a hostname that is used by customer to HTTPs. domain and SSL certificate belongs to CDN provider.
  • Shared IP SSL Hosting Commonly called SNI, your SSL certificate is hosted in each CDN pop/edge location on a shared IP among other certificates. SNI SSL it’s not supported by some older browsers like IE6 and it’s not as secure as dedicated IP.
  • Dedicated IP SSL Hosting your SSL certificate is hosted in each CDN pop/edge location on a dedicated IP and dedicated resources.
  • RTMP to RTMP Streaming customer origin publishes RTMP format and CDN provider delivers in RTMP format.
  • RTMP to HTTP Streaming customer origin publishes RTMP format and CDN provider transcode to HTTP and delivers in HTTP format.
  • HTTP to HTTP Streaming customer origin publishes HTTP format and CDN provider delivers in HTTP format .
  • Image Optimization CDN transforms customer images on demand at the edge. it can dynamically resize, convert, adjust quality, crop / trim, change orientations and image background colors, and much more.
  • DDoS Mitigation DDoS mitigation is a set of techniques or tools for resisting or mitigating the impact of distributed denial-of-service (DDoS) attacks on networks attached to the internet by protecting the target and relay networks.
  • WAF A web application firewall (or WAF) filters, monitors, and blocks HTTP traffic to and from a web application. a WAF is differentiated from a regular firewall in that a WAF is able to filter the content of specific web applications while regular firewalls serve as a safety gate between servers.
  • Bot Mitigation Bot Mitigation is a set of techniques or tools for resisting or mitigating the impact of bots attacks.
  • Managed DNS globally distributed, redundant DNS service.
  • DNS Failover a service that guarantees that as soon as your website, service, or internet connection is offline, all your traffic will be automatically pointed over to a secondary IP address, server, or provider you have set up at another location.
  • DNS Traffic Manager DNS traffic manager is a DNS based traffic load balancer that enables customers to distribute traffic optimally based on set roles.

supported features

  • Web 22
  • Streaming 21
  • Private 9
  • Security 11
  • Not Supported
  • Unknown
  • Supported
  • Additional Cost
  • SSL Hosting the ability to host customer SSL certificate on each CDN provider pop/edge location.
  • HTTP/2 Enabled HTTP/2 (originally named HTTP/2.0) is a major revision of the HTTP network protocol used by the world wide web. it was developed from the earlier experimental speedy protocol, originally developed by google.
  • IPV6 Enabled Internet protocol version 6 (IPV6) is the most recent version of the internet protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the internet. IPV6 was developed by the internet engineering task force (IETF) to deal with the long-anticIPated problem of IPV4 address exhaustion. IPV6 is intended to replace IPV4.
  • Gzip Compression compressing your website pages and static assets on the web/hosting server is a great way to improve your site speed overall. gzIP compression reduces the size of static content which subsequently makes a website load faster. most modern browsers support compression of html, css, and javascrIPt files.
  • PCI Compliment PCI DSS (payment card industry data security standard) is a set of regulations governing information security that applies to all organizations taking credit or debit card payments. PCI DSS is a worldwide standard that is designed to reduce card fraud and ensure that businesses take card payments securely.
  • Custom Roles the ability to setup custom roles over.
  • Origin Shield A mid-tier caching layer that sits between the CDN and your origin to protect you from request overload.
  • Raw Logs The ability to setup custom roles over origin shield: a mid-tier caching layer that sits between the CDN and your origin to protect you from request overload.
  • Real-time Statistics Statistics are published realtime with a delay of maximum 5 minutes.
  • Instant Setup the ability to instantly setup (self-provision) the CDN service.
  • Instant Purge the ability to instantly (up to 10/15 minutes globally) invalidate CDN cache content.
  • Origin Pull CDN to fetch content from customer origin.
  • Origin Push CDN to fetch content from CDN storage instead of customer origin. requires purchase of CDN storage.
  • Geoblocking Geo-blocking or geoblocking is a form of technological protection measure where access to internet content is restricted based upon the user's geographical location.
  • Token Authentication Token-based authentication is a security technique that authenticates the users who attempt to log in to a server, a network, or some other secure system, using a security token provided by the server.

suggested providers

view all

top 3 providers

Nanneq

It’s rare to find a team as obsessed over optimization as we are!

CDNfinder team has helped to improve our global web performance significantly, which helped us overcome the issues faced growth and success we are experiencing.

MySupermarket     Nanneq

Head of IT

Sorin Brabete

CDNFinder was our Swiss army knife when we were looking for a new CDN and DNS provider. It allowed us to quickly review and filter various offers based on selected criteria and identify the best option.

An ideal time saver that I would highly recommend!

SoftPedia     Sorin

Head of Development

Thank you for rating Akamai

Your rating has been removed for Akamai