SlideShare une entreprise Scribd logo
1  sur  17
Overlay Networks
1. Architectural Description based
   Overlay Networks
2. Multiple Overlay Networks


                        - Akshay Hegde
Definitions
Overlay Network
Applications of overlay network
Architectural Description based
             Overlay Networks

• Abstract

 Heavily used in Distributed computing applications.
 Heterogeneous architectures
 A try to abstract architecture of an overlay n/w into a document
  called an ‘Architectural Description’ (AD)
 Contain Roles and Relationships of a particular Overlay n/w
 May be exchanged among nodes and parsed by nodes themselves
  enabling nodes to adopt different Roles and Relationships
 Dynamic formation of Overlay n/w
 Allows heterogeneous networks to work
  collaboratively, maintaining Security
 Allows multiple overlays
 Allows same set of nodes to switch between heterogeneous
  overlays at different time intervals.
Introduction
                         Overlay Network
                           TCP/IP layer


Architecture of an Overlay n/w is fixed.
However memberships and roles played by the nodes can be
changed dynamically.

Actual overlay application run on top of the deployed overlay n/w

As a result tight coupling between Overlay application and overlay
n/w.
We try to decouple these two by introducing an Architectural
Description.
Creates Meta-layer between them
 Faciliating n/w :




   When AD documents pass through nodes, each node would adopt Roles and
   Relationships defined in AD.
   Enables node to create their own ‘Security roles’
• By using AD documents and Role based approach, each node
  would be able to play multiple roles and adopt relative
  relationships.
• This improves dynamic behavior of Overlays, as AD
  documents are exchanged and executed dynamically.
• Hence AD based architecture facilitates creating new overlay
  architectures.
• By ‘injecting’ a new AD through the node, existing overlay
  may be erased.
• Alternatively may be superimposed or overlapped on an
  existing Overlay.
AD Framework
A. Architectural Description
• Tries to abstract the Overlay n/w architecture to an XML document.
• In this abstraction we try to identify the roles and relationships in a
  particular architecture.
• Ex: Client Server Network, Peer to peer n/w
• In addition to roles & relationships AD would contain parameters
  such as ‘Override’, ‘onFailure’.
• Security tags contains the security settings for a particular AD, such
  as encryption type, algorithm, key size.
B. Design
AD framework would enable the formation of the overlay n/w on top
of the Facilitating n/w. It should sit in parallel with Facilitating n/w to
exchange and execute AD documents.
Features and applications
1. Integrating Heterogeneous Overlays
2. Super-impose Multiple Overlays
3. Switching between Heterogeneous Overlays
4. Enabling Overlays with Heterogeneous
   Security settings to collaborate
5. Key Exchange & key Management
Future work
• The prototype system needs to be extended to
  an actual distributed implementation. Which
  would make it possible to identify any
  practical issues.
• Current AD documents are concise and do
  carry only essential details. To make the full
  use of the AD based approach, AD documents
  need to have more details about architecture
  of overlay n/w.
• In the future implementation the routing
  information also be embedded in the AD
  document itself. This would allow the overlay n/w
  to dynamically change routing algorithm, adding
  more flexibility.
• ‘Security role’ can be further expanded so that
  networks having different security settings can
  inter-operate. This would allow n/w with
  heterogeneous security settings to work
  collaboratively.
Conclusion
• AD based overlay n/w is a novel concept in
  implementing overlay n/w. it tries to abstract
  architecture of an overlay n/w into ‘Architectural
  Description’ document.
• By exchanging the AD documents and ‘Executing’
  them; each node in n/w may play different roles
  allowing dynamically change the Overlay n/w
  architecture.
• This also allows heterogeneous Overlays to work
  collaboratively.
• Allows n/w with heterogeneous security
  settings to work collaboratively , enabling
  nodes to play different ‘Security Roles’.
• Mean time AD documents serves as a means
  of Security Key Exchange as soon as a node is
  added to an Overlay n/w.

Contenu connexe

Tendances

Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network LayerRahul Hada
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage VirtualizationMehul Jariwala
 
Chapter 1 Introduction to Cloud Computing
Chapter 1 Introduction to Cloud ComputingChapter 1 Introduction to Cloud Computing
Chapter 1 Introduction to Cloud Computingnewbie2019
 
Dynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attackDynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attackDr Praveen Jain
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDNVenkata Naga Ravi
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point ProtocolPhan Vuong
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS Dushhyant Kumar
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...Sagar Rai
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
Distributed system architecture
Distributed system architectureDistributed system architecture
Distributed system architectureYisal Khan
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network) Netwax Lab
 
Introduction to Cloud Data Center and Network Issues
Introduction to Cloud Data Center and Network IssuesIntroduction to Cloud Data Center and Network Issues
Introduction to Cloud Data Center and Network IssuesJason TC HOU (侯宗成)
 

Tendances (20)

Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
Chapter 1 Introduction to Cloud Computing
Chapter 1 Introduction to Cloud ComputingChapter 1 Introduction to Cloud Computing
Chapter 1 Introduction to Cloud Computing
 
Dynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attackDynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attack
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
Wide Area Network (WAN)
Wide Area Network (WAN)Wide Area Network (WAN)
Wide Area Network (WAN)
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
 
Vlan
VlanVlan
Vlan
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Distributed system architecture
Distributed system architectureDistributed system architecture
Distributed system architecture
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Introduction to Cloud Data Center and Network Issues
Introduction to Cloud Data Center and Network IssuesIntroduction to Cloud Data Center and Network Issues
Introduction to Cloud Data Center and Network Issues
 

En vedette

Introduction of Software Engineering
Introduction of Software EngineeringIntroduction of Software Engineering
Introduction of Software EngineeringZafar Ayub
 
Delivering Over The Top Video at Scale - Akamai at OTTCon 2013
Delivering Over The Top Video at Scale - Akamai at OTTCon 2013Delivering Over The Top Video at Scale - Akamai at OTTCon 2013
Delivering Over The Top Video at Scale - Akamai at OTTCon 2013Akamai Technologies
 
Customer App Flow
Customer App FlowCustomer App Flow
Customer App FlowZafar Ayub
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scopeSanat Maharjan
 
QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006Kalman Graffi
 
Benkelman beam deflection studies
Benkelman beam deflection studiesBenkelman beam deflection studies
Benkelman beam deflection studiesvikasravekar
 
Highway failure & their maintenance ppt
 Highway failure & their maintenance ppt Highway failure & their maintenance ppt
Highway failure & their maintenance pptBeing Deepak
 
VMworld 2015: Networking Virtual SAN's Backbone
VMworld 2015: Networking Virtual SAN's BackboneVMworld 2015: Networking Virtual SAN's Backbone
VMworld 2015: Networking Virtual SAN's BackboneVMworld
 
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep DiveVMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep DiveVMworld
 
VMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SANVMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SANVMworld
 
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes ConfigurationsVMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes ConfigurationsVMworld
 
VMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld
 
VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld
 
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld
 

En vedette (20)

SKYPE AS OVERLAY NETWORK
SKYPE AS OVERLAY NETWORKSKYPE AS OVERLAY NETWORK
SKYPE AS OVERLAY NETWORK
 
Network virtualization
Network virtualizationNetwork virtualization
Network virtualization
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 
Introduction of Software Engineering
Introduction of Software EngineeringIntroduction of Software Engineering
Introduction of Software Engineering
 
Preventive maintainance
Preventive  maintainancePreventive  maintainance
Preventive maintainance
 
Delivering Over The Top Video at Scale - Akamai at OTTCon 2013
Delivering Over The Top Video at Scale - Akamai at OTTCon 2013Delivering Over The Top Video at Scale - Akamai at OTTCon 2013
Delivering Over The Top Video at Scale - Akamai at OTTCon 2013
 
Customer App Flow
Customer App FlowCustomer App Flow
Customer App Flow
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
 
Benkelman beam
Benkelman beamBenkelman beam
Benkelman beam
 
QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006
 
Benkelman beam deflection studies
Benkelman beam deflection studiesBenkelman beam deflection studies
Benkelman beam deflection studies
 
Highway failure & their maintenance ppt
 Highway failure & their maintenance ppt Highway failure & their maintenance ppt
Highway failure & their maintenance ppt
 
Use case
Use caseUse case
Use case
 
VMworld 2015: Networking Virtual SAN's Backbone
VMworld 2015: Networking Virtual SAN's BackboneVMworld 2015: Networking Virtual SAN's Backbone
VMworld 2015: Networking Virtual SAN's Backbone
 
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep DiveVMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
 
VMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SANVMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SAN
 
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes ConfigurationsVMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
 
VMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts Panel
 
VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!
 
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
 

Similaire à Overlay networks ppt

Cloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsCloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsVijay Karan
 
Cloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 ProjectsCloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 ProjectsVijay Karan
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication1crore projects
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Performance and cost evaluation of an ...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Performance and cost evaluation of an ...2014 IEEE JAVA CLOUD COMPUTING PROJECT Performance and cost evaluation of an ...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Performance and cost evaluation of an ...IEEEFINALSEMSTUDENTPROJECTS
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationTmks Infotech
 
Ieeepro techno solutions 2014 ieee java project - a hybrid cloud approach f...
Ieeepro techno solutions   2014 ieee java project - a hybrid cloud approach f...Ieeepro techno solutions   2014 ieee java project - a hybrid cloud approach f...
Ieeepro techno solutions 2014 ieee java project - a hybrid cloud approach f...hemanthbbc
 
Ieeepro techno solutions 2014 ieee dotnet project - a hybrid cloud approach...
Ieeepro techno solutions   2014 ieee dotnet project - a hybrid cloud approach...Ieeepro techno solutions   2014 ieee dotnet project - a hybrid cloud approach...
Ieeepro techno solutions 2014 ieee dotnet project - a hybrid cloud approach...ASAITHAMBIRAJAA
 
ITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment modelITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment modelHitesh Mohapatra
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationPvrtechnologies Nellore
 
Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cl...
Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cl...Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cl...
Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cl...Editor IJLRES
 
Openflow for Cloud Scalability
Openflow for Cloud ScalabilityOpenflow for Cloud Scalability
Openflow for Cloud ScalabilityDaoliCloud Ltd
 
Agile Architecture and NFR in a Cloud Native Design.pptx
Agile Architecture and NFR in a Cloud Native Design.pptxAgile Architecture and NFR in a Cloud Native Design.pptx
Agile Architecture and NFR in a Cloud Native Design.pptxTurja Narayan Chaudhuri
 
From IaaS to PaaS to Docker Networking to … Cloud Networking Scalability
From IaaS to PaaS to Docker Networking to … Cloud Networking ScalabilityFrom IaaS to PaaS to Docker Networking to … Cloud Networking Scalability
From IaaS to PaaS to Docker Networking to … Cloud Networking ScalabilityDaoliCloud Ltd
 
05958007cloud
05958007cloud05958007cloud
05958007cloudyassram
 
Mohit seminar gs.cse2012
Mohit seminar gs.cse2012Mohit seminar gs.cse2012
Mohit seminar gs.cse2012Mohit Modi
 
Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing IntroductionVivek Shelke
 
Ieeepro techno solutions 2014 ieee dotnet project - distributed, concurrent...
Ieeepro techno solutions   2014 ieee dotnet project - distributed, concurrent...Ieeepro techno solutions   2014 ieee dotnet project - distributed, concurrent...
Ieeepro techno solutions 2014 ieee dotnet project - distributed, concurrent...ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee java project - distributed, concurrent, ...
Ieeepro techno solutions   2014 ieee java project - distributed, concurrent, ...Ieeepro techno solutions   2014 ieee java project - distributed, concurrent, ...
Ieeepro techno solutions 2014 ieee java project - distributed, concurrent, ...hemanthbbc
 

Similaire à Overlay networks ppt (20)

Cloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsCloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projects
 
Cloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 ProjectsCloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 Projects
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Performance and cost evaluation of an ...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Performance and cost evaluation of an ...2014 IEEE JAVA CLOUD COMPUTING PROJECT Performance and cost evaluation of an ...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Performance and cost evaluation of an ...
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Ieeepro techno solutions 2014 ieee java project - a hybrid cloud approach f...
Ieeepro techno solutions   2014 ieee java project - a hybrid cloud approach f...Ieeepro techno solutions   2014 ieee java project - a hybrid cloud approach f...
Ieeepro techno solutions 2014 ieee java project - a hybrid cloud approach f...
 
Ieeepro techno solutions 2014 ieee dotnet project - a hybrid cloud approach...
Ieeepro techno solutions   2014 ieee dotnet project - a hybrid cloud approach...Ieeepro techno solutions   2014 ieee dotnet project - a hybrid cloud approach...
Ieeepro techno solutions 2014 ieee dotnet project - a hybrid cloud approach...
 
ITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment modelITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment model
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cl...
Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cl...Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cl...
Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cl...
 
Openflow for Cloud Scalability
Openflow for Cloud ScalabilityOpenflow for Cloud Scalability
Openflow for Cloud Scalability
 
Agile Architecture and NFR in a Cloud Native Design.pptx
Agile Architecture and NFR in a Cloud Native Design.pptxAgile Architecture and NFR in a Cloud Native Design.pptx
Agile Architecture and NFR in a Cloud Native Design.pptx
 
From IaaS to PaaS to Docker Networking to … Cloud Networking Scalability
From IaaS to PaaS to Docker Networking to … Cloud Networking ScalabilityFrom IaaS to PaaS to Docker Networking to … Cloud Networking Scalability
From IaaS to PaaS to Docker Networking to … Cloud Networking Scalability
 
05958007cloud
05958007cloud05958007cloud
05958007cloud
 
Cloud Networking
Cloud NetworkingCloud Networking
Cloud Networking
 
Mohit seminar gs.cse2012
Mohit seminar gs.cse2012Mohit seminar gs.cse2012
Mohit seminar gs.cse2012
 
Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introduction
 
Ieeepro techno solutions 2014 ieee dotnet project - distributed, concurrent...
Ieeepro techno solutions   2014 ieee dotnet project - distributed, concurrent...Ieeepro techno solutions   2014 ieee dotnet project - distributed, concurrent...
Ieeepro techno solutions 2014 ieee dotnet project - distributed, concurrent...
 
Ieeepro techno solutions 2014 ieee java project - distributed, concurrent, ...
Ieeepro techno solutions   2014 ieee java project - distributed, concurrent, ...Ieeepro techno solutions   2014 ieee java project - distributed, concurrent, ...
Ieeepro techno solutions 2014 ieee java project - distributed, concurrent, ...
 

Overlay networks ppt

  • 1. Overlay Networks 1. Architectural Description based Overlay Networks 2. Multiple Overlay Networks - Akshay Hegde
  • 5. Architectural Description based Overlay Networks • Abstract  Heavily used in Distributed computing applications.  Heterogeneous architectures  A try to abstract architecture of an overlay n/w into a document called an ‘Architectural Description’ (AD)  Contain Roles and Relationships of a particular Overlay n/w  May be exchanged among nodes and parsed by nodes themselves enabling nodes to adopt different Roles and Relationships
  • 6.  Dynamic formation of Overlay n/w  Allows heterogeneous networks to work collaboratively, maintaining Security  Allows multiple overlays  Allows same set of nodes to switch between heterogeneous overlays at different time intervals.
  • 7. Introduction Overlay Network TCP/IP layer Architecture of an Overlay n/w is fixed. However memberships and roles played by the nodes can be changed dynamically. Actual overlay application run on top of the deployed overlay n/w As a result tight coupling between Overlay application and overlay n/w. We try to decouple these two by introducing an Architectural Description. Creates Meta-layer between them
  • 8.  Faciliating n/w : When AD documents pass through nodes, each node would adopt Roles and Relationships defined in AD. Enables node to create their own ‘Security roles’
  • 9. • By using AD documents and Role based approach, each node would be able to play multiple roles and adopt relative relationships. • This improves dynamic behavior of Overlays, as AD documents are exchanged and executed dynamically. • Hence AD based architecture facilitates creating new overlay architectures. • By ‘injecting’ a new AD through the node, existing overlay may be erased. • Alternatively may be superimposed or overlapped on an existing Overlay.
  • 10. AD Framework A. Architectural Description • Tries to abstract the Overlay n/w architecture to an XML document. • In this abstraction we try to identify the roles and relationships in a particular architecture. • Ex: Client Server Network, Peer to peer n/w • In addition to roles & relationships AD would contain parameters such as ‘Override’, ‘onFailure’. • Security tags contains the security settings for a particular AD, such as encryption type, algorithm, key size.
  • 11.
  • 12. B. Design AD framework would enable the formation of the overlay n/w on top of the Facilitating n/w. It should sit in parallel with Facilitating n/w to exchange and execute AD documents.
  • 13. Features and applications 1. Integrating Heterogeneous Overlays 2. Super-impose Multiple Overlays 3. Switching between Heterogeneous Overlays 4. Enabling Overlays with Heterogeneous Security settings to collaborate 5. Key Exchange & key Management
  • 14. Future work • The prototype system needs to be extended to an actual distributed implementation. Which would make it possible to identify any practical issues. • Current AD documents are concise and do carry only essential details. To make the full use of the AD based approach, AD documents need to have more details about architecture of overlay n/w.
  • 15. • In the future implementation the routing information also be embedded in the AD document itself. This would allow the overlay n/w to dynamically change routing algorithm, adding more flexibility. • ‘Security role’ can be further expanded so that networks having different security settings can inter-operate. This would allow n/w with heterogeneous security settings to work collaboratively.
  • 16. Conclusion • AD based overlay n/w is a novel concept in implementing overlay n/w. it tries to abstract architecture of an overlay n/w into ‘Architectural Description’ document. • By exchanging the AD documents and ‘Executing’ them; each node in n/w may play different roles allowing dynamically change the Overlay n/w architecture. • This also allows heterogeneous Overlays to work collaboratively.
  • 17. • Allows n/w with heterogeneous security settings to work collaboratively , enabling nodes to play different ‘Security Roles’. • Mean time AD documents serves as a means of Security Key Exchange as soon as a node is added to an Overlay n/w.