HOME

TheInfoList



OR:

An application delivery controller (ADC) is a
computer network A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections ar ...
device in a datacenter, often part of an
application delivery network An application delivery network (ADN) is a suite of technologies that, when deployed together, provide availability, security, visibility, and acceleration for Internet applications such as websites. ADN components provide supporting functionality ...
(ADN), that helps perform common tasks, such as those done by
web accelerator A web accelerator is a proxy server that reduces website access time. They can be a self-contained hardware appliance or installable software. Web accelerators may be installed on the client computer or mobile device, on ISP servers, on the ser ...
s to remove load from the
web server A web server is computer software and underlying hardware that accepts requests via HTTP (the network protocol created to distribute web content) or its secure variant HTTPS. A user agent, commonly a web browser or web crawler, initi ...
s themselves. Many also provide load balancing. ADCs are often placed in the DMZ, between the outer firewall or router and a
web farm A server farm or server cluster is a collection of Server (computing), computer servers, usually maintained by an organization to supply server functionality far beyond the capability of a single machine. They often consist of thousands of compu ...
.


Features

An Application Delivery Controller (ADC) is a type of server that provides a variety of services designed to optimize the distribution of load being handled by backend content servers. An ADC directs web request traffic to optimal data sources in order to remove unnecessary load from web servers. To accomplish this, an ADC includes many OSI layer 3-7 services, including load-balancing. ADCs are intended to be deployed within the DMZ of a computer server cluster hosting web applications and/or services. In this sense, an ADC can be envisioned as a drop-in load balancer replacement. But that is where the similarities end. When an ADC receives a web request from an external host, it enacts the following process (assuming all features exist and are enabled): # Serve as TLS endpoint for the cluster and decrypt incoming requests (HTTPS-only). # Examine the Request URI and determine the type of resource being requested. # Verify that the entity making the request is authorized to access the given URI. # Perform any URI translation, if applicable. # Lookup the pool of hosts associated with that resource type (e.g. image, stylesheet, HTML, etc). # In the case of login requests, the request may be translated, rather than simply forwarded, to an instance within a pool of authentication servers. # In the case of static objects, the ADC may serve the object directly from its own internal cache or direct it to a dedicated static object repository. # Maintain a table describing the health of the servers in every pool via one of several methods (e.g. average response time). # Forward the request to the server within the target pool with the best health score. Features commonly found in ADCs include: *
Traffic Shaping Traffic shaping is a bandwidth management technique used on computer networks which delays some or all datagrams to bring them into compliance with a desired ''traffic profile''. Traffic shaping is used to optimize or guarantee performance, imp ...
* SSL/TLS offloading * Web Application Firewall *
DNS The Domain Name System (DNS) is a hierarchical and distributed naming system for computers, services, and other resources in the Internet or other Internet Protocol (IP) networks. It associates various information with domain names assigned to ...
*
Reverse Proxy In computer networks, a reverse proxy is the application that sits in front of back-end applications and forwards client (e.g. browser) requests to those applications. Reverse proxies help increase scalability, performance, resilience and securi ...
* API Gateway * HTTP Content Redirection * Server Health Monitoring * Payload Compression/Decompression *
A/B Testing A/B testing (also known as bucket testing, split-run testing, or split testing) is a user experience research methodology. A/B tests consist of a randomized experiment that usually involves two variants (A and B), although the concept can be als ...
* Facilitation of zero-downtime server maintenance cycles (by temporarily removing servers being upgraded from their respective pool) *
Authorization Authorization or authorisation (see spelling differences) is the function of specifying access rights/privileges to resources, which is related to general information security and computer security, and to access control in particular. More f ...
&
Access Control In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of ''accessing'' may mean consuming ...
(but typically does not include
Authentication Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicat ...
) In the context of Telco infrastructure, an ADC could provide access control services for a Gi-LAN area.


History

Starting around 2004, first generation ADCs offered simple application acceleration and load balancing. In 2006, ADCs began to mature when they began featuring advanced applications services such as compression,
caching In computing, a cache ( ) is a hardware or software component that stores data so that future requests for that data can be served faster; the data stored in a cache might be the result of an earlier computation or a copy of data stored elsewher ...
, connection multiplexing,
traffic shaping Traffic shaping is a bandwidth management technique used on computer networks which delays some or all datagrams to bring them into compliance with a desired ''traffic profile''. Traffic shaping is used to optimize or guarantee performance, imp ...
, application layer security, SSL offload, and content switching, combined with services like server load balancing in an integrated services framework that optimized and secured business critical application flows. By 2007, application acceleration products were available from many companies. Until leaving the market in 2012,
Cisco Systems Cisco Systems, Inc., commonly known as Cisco, is an American-based multinational corporation, multinational digital communications technology conglomerate (company), conglomerate corporation headquartered in San Jose, California. Cisco develo ...
offered application delivery controllers. Market leaders like F5 Networks, Radware, and
Citrix Citrix Systems, Inc. is an American multinational cloud computing and virtualization technology company that provides server, application and desktop virtualization, networking, software as a service (SaaS), and cloud computing technologies. C ...
had been gaining market share from Cisco in previous years. The ADC market segment became fragmented into two general areas: 1) general network optimization; and 2) application/framework specific optimization. Both types of devices improve performance, but the latter is usually more aware of optimization strategies that work best with a particular application framework, focusing on ASP.NET or
AJAX Ajax may refer to: Greek mythology and tragedy * Ajax the Great, a Greek mythological hero, son of King Telamon and Periboea * Ajax the Lesser, a Greek mythological hero, son of Oileus, the king of Locris * ''Ajax'' (play), by the ancient Gree ...
applications, for example.Edgenexus Limited (2022). Edgenexus load balancers and Application. Retrieved from https://www.edgenexus.io/.


See also

*
Application delivery network An application delivery network (ADN) is a suite of technologies that, when deployed together, provide availability, security, visibility, and acceleration for Internet applications such as websites. ADN components provide supporting functionality ...
(ADN)


References

{{DEFAULTSORT:Advance Application Delivery Controller Networking hardware Load balancing (computing)