Overlay Network
Get Overlay Network essential facts below. View Videos or join the Overlay Network discussion. Add Overlay Network to your PopFlock.com topic list for future reference or share this resource on social media.
Overlay Network

An overlay network is a computer network that is built on top of another network[1].

Structure

Nodes in the overlay network can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. For example, distributed systems such as peer-to-peer networks and client-server applications are overlay networks because their nodes run on top of the Internet.[]

The Internet was originally built as an overlay upon the telephone network, while today (through the advent of VoIP), the telephone network is increasingly turning into an overlay network built on top of the Internet.[]

Uses

In telecommunication

Figure 1: A sample overlay network
Figure 2: Overlay network broken up into logical layers

Overlay networks are used in telecommunication because of the availability of digital circuit switching equipment and optical fiber.[2] Telecommunication transport networks and IP networks (which combined make up the broader Internet) are all overlaid with at least an optical fiber layer, a transport layer and an IP or circuit switching layers (in the case of the PSTN).

Enterprise private networks were first overlaid on telecommunication networks such as frame relay and Asynchronous Transfer Mode packet switching infrastructures but migration from these (now legacy) infrastructures to IP based MPLS networks and virtual private networks started (2001~2002).

From a physical standpoint, overlay networks are quite complex (see Figure 1) as they combine various logical layers that are operated and built by various entities (businesses, universities, government etc.) but they allow separation of concerns that over time permitted the buildup of a broad set of services that could not have been proposed by a single telecommunication operator (ranging from broadband Internet access, voice over IP or IPTV, competitive telecom operators etc.).[3]

Over the Internet

Nowadays the Internet is the basis for more overlaid networks that can be constructed in order to permit routing of messages to destinations not specified by an IP address. For example, distributed hash tables can be used to route messages to a node having a specific logical address, whose IP address is not known in advance.

Overlay networks have also been proposed as a way to improve Internet routing, such as through quality of service guarantees to achieve higher-quality streaming media. Previous proposals such as IntServ, DiffServ, and IP multicast have not seen wide acceptance, largely because they require modification of all routers in the network. On the other hand, an overlay network can be incrementally deployed on end-hosts running the overlay protocol software, without cooperation from ISPs. The overlay has no control over how packets are routed in the underlying network between two overlay nodes, but it can control, for example, the sequence of overlay nodes a message traverses before reaching its destination.

For example, Akamai Technologies manages an overlay network which provides reliable, efficient content delivery (a kind of multicast). Academic research includes End System Multicast and Overcast, which is multicasting on an overlay network; RON (Resilient Overlay Network) for resilient routing; and OverQoS for quality of service guarantees, among others.


Internet of Things

The dispersed nature of the Internet of Things (IoT) presents a major operational challenge that is uncommon in the traditional Internet or enterprise networks[4]. Devices that are managed together --- say a fleet of railcars --- are not physically colocated. Instead, they are widely geographically distributed. The operational approaches for management and security used in enterprise networks, where most hosts are densely contained in buildings or campuses, do not translate to the IoT. IoT devices operate outside of the enterprise network security and operational perimeter and the corporate LAN firewall can't protect them. Dispatching technicians is expensive, so manual provisioning and configuration doesn't scale. Devices connect to the Internet via a variety of last-mile ISPs, so many devices won't share share a common IP prefix and addresses will change at arbitrary times. Any configuration based on these IPs will require continued upkeep and will often be out-of-date, exposing hosts and devices to external threats.


Founded in 2013 and incubated at AT&T Foundry's M2M Center of Excellence[5], Chicago- headquartered Xaptum provides a purpose-built Network-as-a-Service (NaaS) to secure and scale the IoT. Xaptum has built a software-defined secure overlay network for dispersed nature of the IoT. The multi-tenant, internet protocol (IPv6) network is globally available, but publicly invisible, isolating devices and operational technology (OT) networks from threats on the public Internet.

As an overlay network, Xaptum leverages the Internet's growing infrastructure to cost effectively achieve global availability. The standards-compliant IPv6 overlay network works seamlessly with existing industrial (e.g., MODBUS, CANBUS, DNP3, BACnet) and application protocols (e.g., MQTT, CoAP, HTTP, etc.). This future proof network gives enterprises the flexibility to adapt to an evolving business and technology landscape.

Advantages and Benefits

Resilience

Resilient Overlay Networks (RON) are architectures that allow distributed Internet applications to detect and recover from disconnection or interference. Current wide area routing protocols that take at least several minutes to recover from are improved upon with this application layer overlay. The RON nodes monitor the Internet paths among themselves and will determine whether or not to reroute packets directly over the internet or over other RON nodes thus optimizing application specific metrics.[6]

The Resilient Overlay Network has a relatively simple conceptual design. RON nodes are deployed at various locations on the Internet. These nodes form an application layer overlay that cooperate in routing packets. Each of the RON nodes monitor the quality of the Internet paths between each other and uses this information to accurately and automatically select paths from each packet, thus reducing the amount of time required to recover from poor quality of service.[6]

Multicast

Overlay multicast is also known as End System or Peer-to-Peer Multicast. High bandwidth multi-source multicast among widely distributed nodes is a critical capability for a wide range of applications, including audio and video conferencing, multi-party games and content distribution. Throughout the last decade, a number of research projects have explored the use of multicast as an efficient and scalable mechanism to support such group communication applications. Multicast decouples the size of the receiver set from the amount of state kept at any single node and potentially avoids redundant communication in the network.

The limited deployment of IP Multicast, a best effort network layer multicast protocol, has led to considerable interest in alternate approaches that are implemented at the application layer, using only end-systems. In an overlay or end-system multicast approach, participating peers organize themselves into an overlay topology for data delivery. Each edge in this topology corresponds to a unicast path between two end-systems or peers in the underlying Internet. All multicast-related functionality is implemented at the peers instead of at routers, and the goal of the multicast protocol is to construct and maintain an efficient overlay for data transmission.

Disadvantages

  • Slow in spreading the data.
  • Long latency.
  • Duplicate packets at certain points.

List of overlay network protocols

Overlay network protocols based on TCP/IP include:

Overlay network protocols based on UDP/IP include:

Overlay network protocols based on IP in IP include:

See also

References

  1. ^ Sasu Tarkoma (2010). Overlay Networks: Toward Information Networking. CRS Press. p. 3. ISBN 9781439813737.
  2. ^ AT&T history of Network transmission
  3. ^ Fransman, Martin. Telecoms in the Internet Age: From Boom to Bust to ...?. Oxford University Press.
  4. ^ Weldon, Marcus K. (2018). The Future X Network : a Bell Labs Perspective. Chapman and Hall/CRC. ISBN 9781498779715. OCLC 1080084190.
  5. ^ "AT&T: On Message With Lots to Share". VDC Research: Enterprise & Government Mobility Market Blog. Retrieved .
  6. ^ a b David Andersen , Hari Balakrishnan , Frans Kaashoek , Robert Morris (December 2001). Resilient Overlay Networks. Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles. pp. 131-45. doi:10.1145/502034.502048. ISBN 978-1581133899.CS1 maint: multiple names: authors list (link)

External links


  This article uses material from the Wikipedia page available here. It is released under the Creative Commons Attribution-Share-Alike License 3.0.

Overlay_network
 



 



 
Music Scenes