Features | Brief Introduction | Detailed instructions |
Cache Control | With the development of business derived from the new cache configuration needs, we can provide customers with flexible cache control policies, adapt to a variety of application scenarios, to achieve a better acceleration experience. | Custom cache strategy: The product supports caching according to the cache header time of the origin server and customizes caching rules based on the file type and directory to meet diversified caching requirements of customers. Cache sharing: Different domain names with the same content share the same cache to reduce back-to-origin and increase the hit ratio. Header customization: The product supports adding and deleting a request header or response header. Offline mode: When the origin server breakdown, the content cached by CDN nodes is used and the CDN will not go back to origin server to verify whether the file is expired. Error page caching: The product supports caching error pages to reduce the pressure of going back to origin server. File check: Checking MD5 files for the cache is supported to ensure data consistency.
|
Origin Control | By supporting flexible back-to-origin methods and back-to-origin bandwidth control policies, it can adapt to different customers' origin configuration requirements while achieving back-to-origin cost control and improving service availability. | Back-to-origin strategy: support the resolution of domain names to obtain the origin IP, and support the configuration of multi-IP polling mutual backup, and support special ports and modify back to the origin host. Back to origin bandwidth optimization: intermediate cache nodes are set between origin and edge to reduce back-to-origin bandwidth Back to origin retry: The product supports configuring the number of retries according to the abnormal status code when back-to-origin fails to improve the availability Origin monitoring: The origin server monitoring service is provided. When the origin server becomes abnormal and cannot provide services, the system switches services to the standby origin server.
|
Access Control | In order to cope with the high cost of hotlink theft to customers, we support different levels of hotlink protection solutions and access control policies to help customers effectively resolve the problem of hotlink theft. | Hotlink Protection: The product supports IP blacklist and whitelist, referer based hotlink protection, cookie based hotlink protection, timestamp hotlink protection and remote authentication hotlink protection and rejects illegal requests to help customers save unnecessary bandwidth and traffic costs.l Restriction on access frequency: The product supports restricting the access frequency based on IP, directory and file type and denies attacks such as malicious access. Access control over regions and countries: The product supports users in restricted regions and countries in accessing CDN nodes. Single-link rate limiting: The product supports single-link rate limiting to avoid bandwidth spike caused by a higher single-link download rate and supports no rate limiting for the initial part of a specific file in a video acceleration scenario to improve the first screen playing experience of the user. Bandwidth Control: The product supports restricting the total bandwidth of the customer and controls the bandwidth cost within the budget.
|
Supported protocols | In order to meet the relevant regulatory requirements, we can provide customers with IPv4/IPv6 dual-stack nodes to meet their IPv6 usage needs, and support http3.0 to provide faster and more stable access experience for customers in weak network environments. | Network protocol: The product supports IPv4 and IPv6. Application protocols: The product supports HTTP, HTTPS, HTTP2.0 and HTTP3.0.
|
Transmission Optimization | In order to improve the transmission efficiency between CDN nodes, we have reduced the transmission latency and greatly improved the CDN acceleration experience through our self-developed private transmission protocol and link optimization. | Protocol optimization: Through the transmission protocol optimization technology, the product intelligently judges the network conditions of users and optimizes the transmission window to achieve rapid content transmission and improve user experience. Link optimization: The product supports long connection holding and link reuse to save the three-way handshake time and accelerate access. Content optimization: The intelligent compression technology is used to optimize transmitted content and improve the transmission efficiency.
|
Self-Service | The CDN console supports rich customer self-service features, including statistical analysis, content management, log download, etc., which greatly facilitates customers to do business-level analysis and management, as an important basis for business decisions. | Domain name management: The product supports self-service domain name configuration management and deployment. Statistical analysis: The product supports self-service query for information such as bandwidth, traffic, number of requests, status code, PV and hit ratio. The query granularity can be detailed to regions and carriers so that customers can follow up their own business. Content refresh: After the content of the origin server is updated, the customer is allowed to submit a refresh request to force the cache of CDN nodes to expire so that users can obtain new content when they access data. Content prefetch: Before release of new content, the customer is allowed to submit a prefetch request so that the latest content of the origin server is cached to CDN nodes. This ensures that the nodes can respond directly to user access after the content is released, improves user access experience and avoids back-to-origin pressure. Log management: The product supports self-service log download.
|
Value-added Services | Support the identification of image content compliance in CDN distribution, such as the identification of pornographic images, and once the problematic images are found, a network-wide ban will be issued in a timely manner, thus effectively helping customers to avoid policy or legal risks. | Content audit: Support the identification of image content compliance in CDN distribution, such as the identification of pornographic images, and once the problematic images are found, a network-wide ban will be issued in a timely manner, thus effectively helping customers to avoid policy or legal risks.
|