SlideShare a Scribd company logo
2
Most read
4
Most read
10
Most read
Overlay Networks
1. Architectural Description based
   Overlay Networks
2. Multiple Overlay Networks


                        - Akshay Hegde
Definitions
Overlay Network
Applications of overlay network
Architectural Description based
             Overlay Networks

• Abstract

 Heavily used in Distributed computing applications.
 Heterogeneous architectures
 A try to abstract architecture of an overlay n/w into a document
  called an ‘Architectural Description’ (AD)
 Contain Roles and Relationships of a particular Overlay n/w
 May be exchanged among nodes and parsed by nodes themselves
  enabling nodes to adopt different Roles and Relationships
 Dynamic formation of Overlay n/w
 Allows heterogeneous networks to work
  collaboratively, maintaining Security
 Allows multiple overlays
 Allows same set of nodes to switch between heterogeneous
  overlays at different time intervals.
Introduction
                         Overlay Network
                           TCP/IP layer


Architecture of an Overlay n/w is fixed.
However memberships and roles played by the nodes can be
changed dynamically.

Actual overlay application run on top of the deployed overlay n/w

As a result tight coupling between Overlay application and overlay
n/w.
We try to decouple these two by introducing an Architectural
Description.
Creates Meta-layer between them
 Faciliating n/w :




   When AD documents pass through nodes, each node would adopt Roles and
   Relationships defined in AD.
   Enables node to create their own ‘Security roles’
• By using AD documents and Role based approach, each node
  would be able to play multiple roles and adopt relative
  relationships.
• This improves dynamic behavior of Overlays, as AD
  documents are exchanged and executed dynamically.
• Hence AD based architecture facilitates creating new overlay
  architectures.
• By ‘injecting’ a new AD through the node, existing overlay
  may be erased.
• Alternatively may be superimposed or overlapped on an
  existing Overlay.
AD Framework
A. Architectural Description
• Tries to abstract the Overlay n/w architecture to an XML document.
• In this abstraction we try to identify the roles and relationships in a
  particular architecture.
• Ex: Client Server Network, Peer to peer n/w
• In addition to roles & relationships AD would contain parameters
  such as ‘Override’, ‘onFailure’.
• Security tags contains the security settings for a particular AD, such
  as encryption type, algorithm, key size.
Overlay networks ppt
B. Design
AD framework would enable the formation of the overlay n/w on top
of the Facilitating n/w. It should sit in parallel with Facilitating n/w to
exchange and execute AD documents.
Features and applications
1. Integrating Heterogeneous Overlays
2. Super-impose Multiple Overlays
3. Switching between Heterogeneous Overlays
4. Enabling Overlays with Heterogeneous
   Security settings to collaborate
5. Key Exchange & key Management
Future work
• The prototype system needs to be extended to
  an actual distributed implementation. Which
  would make it possible to identify any
  practical issues.
• Current AD documents are concise and do
  carry only essential details. To make the full
  use of the AD based approach, AD documents
  need to have more details about architecture
  of overlay n/w.
• In the future implementation the routing
  information also be embedded in the AD
  document itself. This would allow the overlay n/w
  to dynamically change routing algorithm, adding
  more flexibility.
• ‘Security role’ can be further expanded so that
  networks having different security settings can
  inter-operate. This would allow n/w with
  heterogeneous security settings to work
  collaboratively.
Conclusion
• AD based overlay n/w is a novel concept in
  implementing overlay n/w. it tries to abstract
  architecture of an overlay n/w into ‘Architectural
  Description’ document.
• By exchanging the AD documents and ‘Executing’
  them; each node in n/w may play different roles
  allowing dynamically change the Overlay n/w
  architecture.
• This also allows heterogeneous Overlays to work
  collaboratively.
• Allows n/w with heterogeneous security
  settings to work collaboratively , enabling
  nodes to play different ‘Security Roles’.
• Mean time AD documents serves as a means
  of Security Key Exchange as soon as a node is
  added to an Overlay n/w.

More Related Content

PPTX
Overlay network
PDF
frame relay.pdf
PPTX
Network traffic analysis with cyber security
PPTX
WLAN:VPN Security
PDF
Cisco project ideas
PDF
Distributed Coordination-Based Systems
PPTX
Point To Point Protocol
PPT
Storage area network
Overlay network
frame relay.pdf
Network traffic analysis with cyber security
WLAN:VPN Security
Cisco project ideas
Distributed Coordination-Based Systems
Point To Point Protocol
Storage area network

What's hot (20)

PPTX
PPT
CLOUD COMPUTING AND STORAGE
PDF
Cloud Computing and Service oriented Architecture
PPTX
Computer Networks - Unit 1 PPT
PPTX
Telnet presentation
PPTX
Virtual Private Networks (VPN) ppt
PPTX
Congestion control
PPT
Gi fi Technology
PPT
Introduction to SSH
PPTX
Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...
PPT
Vpn presentation
PPTX
Network Attached Storage (NAS)
PPTX
Internet of things for the “smart home”
PPT
PPTX
Zigbee technology ppt
PPTX
Data Center Networks
PPT
Chord Algorithm
PPTX
Network architecture - part-I
PDF
Dna cryptography
PPTX
Virtual Private Network
CLOUD COMPUTING AND STORAGE
Cloud Computing and Service oriented Architecture
Computer Networks - Unit 1 PPT
Telnet presentation
Virtual Private Networks (VPN) ppt
Congestion control
Gi fi Technology
Introduction to SSH
Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...
Vpn presentation
Network Attached Storage (NAS)
Internet of things for the “smart home”
Zigbee technology ppt
Data Center Networks
Chord Algorithm
Network architecture - part-I
Dna cryptography
Virtual Private Network
Ad

Viewers also liked (20)

PPTX
Overlay networks
PPTX
SKYPE AS OVERLAY NETWORK
PPTX
Network virtualization
PDF
Introduction to virtualization
PDF
Introduction of Software Engineering
PPTX
Preventive maintainance
PPTX
Delivering Over The Top Video at Scale - Akamai at OTTCon 2013
PDF
Customer App Flow
PPTX
Network protocol structure scope
PDF
Benkelman beam
PPT
QuaP2P P2P Tutorial 2006
PPTX
Benkelman beam deflection studies
PPTX
Highway failure & their maintenance ppt
PDF
Use case
PPTX
VMworld 2015: Networking Virtual SAN's Backbone
PPTX
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
PPTX
VMworld 2015: Building a Business Case for Virtual SAN
PPTX
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
PPTX
VMworld 2016: Ask the vCenter Server Exerts Panel
PPTX
VMworld 2015: Virtualize Active Directory, the Right Way!
Overlay networks
SKYPE AS OVERLAY NETWORK
Network virtualization
Introduction to virtualization
Introduction of Software Engineering
Preventive maintainance
Delivering Over The Top Video at Scale - Akamai at OTTCon 2013
Customer App Flow
Network protocol structure scope
Benkelman beam
QuaP2P P2P Tutorial 2006
Benkelman beam deflection studies
Highway failure & their maintenance ppt
Use case
VMworld 2015: Networking Virtual SAN's Backbone
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
VMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2015: Virtualize Active Directory, the Right Way!
Ad

Similar to Overlay networks ppt (20)

PDF
Cloud Computing IEEE 2014 Projects
PDF
Cloud computing-ieee-2014-projects
PDF
A Hybrid Cloud Approach for Secure Authorized Deduplication
PPTX
Azure DevOps Training In Ameerpet | Azure DevSecOps Online Training.pptx
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT Performance and cost evaluation of an ...
PDF
A hybrid cloud approach for secure authorized deduplication
PDF
Ieeepro techno solutions 2014 ieee java project - a hybrid cloud approach f...
PDF
Ieeepro techno solutions 2014 ieee dotnet project - a hybrid cloud approach...
PDF
ITU-T requirement for cloud and cloud deployment model
PDF
A hybrid cloud approach for secure authorized deduplication
PDF
Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cl...
PDF
Openflow for Cloud Scalability
PPTX
Agile Architecture and NFR in a Cloud Native Design.pptx
PDF
From IaaS to PaaS to Docker Networking to … Cloud Networking Scalability
PDF
05958007cloud
PPTX
Cloud Networking
PDF
Mohit seminar gs.cse2012
PPTX
Cloud Computing Introduction
PDF
Ieeepro techno solutions 2014 ieee java project - distributed, concurrent, ...
Cloud Computing IEEE 2014 Projects
Cloud computing-ieee-2014-projects
A Hybrid Cloud Approach for Secure Authorized Deduplication
Azure DevOps Training In Ameerpet | Azure DevSecOps Online Training.pptx
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Performance and cost evaluation of an ...
A hybrid cloud approach for secure authorized deduplication
Ieeepro techno solutions 2014 ieee java project - a hybrid cloud approach f...
Ieeepro techno solutions 2014 ieee dotnet project - a hybrid cloud approach...
ITU-T requirement for cloud and cloud deployment model
A hybrid cloud approach for secure authorized deduplication
Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cl...
Openflow for Cloud Scalability
Agile Architecture and NFR in a Cloud Native Design.pptx
From IaaS to PaaS to Docker Networking to … Cloud Networking Scalability
05958007cloud
Cloud Networking
Mohit seminar gs.cse2012
Cloud Computing Introduction
Ieeepro techno solutions 2014 ieee java project - distributed, concurrent, ...

Overlay networks ppt

  • 1. Overlay Networks 1. Architectural Description based Overlay Networks 2. Multiple Overlay Networks - Akshay Hegde
  • 5. Architectural Description based Overlay Networks • Abstract  Heavily used in Distributed computing applications.  Heterogeneous architectures  A try to abstract architecture of an overlay n/w into a document called an ‘Architectural Description’ (AD)  Contain Roles and Relationships of a particular Overlay n/w  May be exchanged among nodes and parsed by nodes themselves enabling nodes to adopt different Roles and Relationships
  • 6.  Dynamic formation of Overlay n/w  Allows heterogeneous networks to work collaboratively, maintaining Security  Allows multiple overlays  Allows same set of nodes to switch between heterogeneous overlays at different time intervals.
  • 7. Introduction Overlay Network TCP/IP layer Architecture of an Overlay n/w is fixed. However memberships and roles played by the nodes can be changed dynamically. Actual overlay application run on top of the deployed overlay n/w As a result tight coupling between Overlay application and overlay n/w. We try to decouple these two by introducing an Architectural Description. Creates Meta-layer between them
  • 8.  Faciliating n/w : When AD documents pass through nodes, each node would adopt Roles and Relationships defined in AD. Enables node to create their own ‘Security roles’
  • 9. • By using AD documents and Role based approach, each node would be able to play multiple roles and adopt relative relationships. • This improves dynamic behavior of Overlays, as AD documents are exchanged and executed dynamically. • Hence AD based architecture facilitates creating new overlay architectures. • By ‘injecting’ a new AD through the node, existing overlay may be erased. • Alternatively may be superimposed or overlapped on an existing Overlay.
  • 10. AD Framework A. Architectural Description • Tries to abstract the Overlay n/w architecture to an XML document. • In this abstraction we try to identify the roles and relationships in a particular architecture. • Ex: Client Server Network, Peer to peer n/w • In addition to roles & relationships AD would contain parameters such as ‘Override’, ‘onFailure’. • Security tags contains the security settings for a particular AD, such as encryption type, algorithm, key size.
  • 12. B. Design AD framework would enable the formation of the overlay n/w on top of the Facilitating n/w. It should sit in parallel with Facilitating n/w to exchange and execute AD documents.
  • 13. Features and applications 1. Integrating Heterogeneous Overlays 2. Super-impose Multiple Overlays 3. Switching between Heterogeneous Overlays 4. Enabling Overlays with Heterogeneous Security settings to collaborate 5. Key Exchange & key Management
  • 14. Future work • The prototype system needs to be extended to an actual distributed implementation. Which would make it possible to identify any practical issues. • Current AD documents are concise and do carry only essential details. To make the full use of the AD based approach, AD documents need to have more details about architecture of overlay n/w.
  • 15. • In the future implementation the routing information also be embedded in the AD document itself. This would allow the overlay n/w to dynamically change routing algorithm, adding more flexibility. • ‘Security role’ can be further expanded so that networks having different security settings can inter-operate. This would allow n/w with heterogeneous security settings to work collaboratively.
  • 16. Conclusion • AD based overlay n/w is a novel concept in implementing overlay n/w. it tries to abstract architecture of an overlay n/w into ‘Architectural Description’ document. • By exchanging the AD documents and ‘Executing’ them; each node in n/w may play different roles allowing dynamically change the Overlay n/w architecture. • This also allows heterogeneous Overlays to work collaboratively.
  • 17. • Allows n/w with heterogeneous security settings to work collaboratively , enabling nodes to play different ‘Security Roles’. • Mean time AD documents serves as a means of Security Key Exchange as soon as a node is added to an Overlay n/w.