tayastores.blogg.se

Overplay for the underlay
Overplay for the underlay












overplay for the underlay

On overlay networks, traffic can be transmitted from the source to the destination through multiple paths to implement load balancing and maximize the bandwidth utilization of links. Different services can be separated to achieve optimal allocation of network resources. Network slicing and segmentation are supported.Encryption approaches can be used to ensure security of private traffic on the Internet.Different virtual topologies can be established on overlay networks as required without the need to modify the underlying network.Overlay networks use tunneling technologies to flexibly select different underlying links and use multiple methods to ensure stable traffic transmission.

overplay for the underlay

  • Traffic transmission does not depend on specific lines.
  • With the introduction of software-defined networking ( SDN) technology, overlay networks with the controller deployed have the following advantages: Overlay networks support various network protocols and standards, including virtual extensible local area network ( VXLAN), Network Virtualization using Generic Routing Encapsulation (NVGRE), single spanning tree (SST), GRE, Network Virtualization over Layer 3 (NVO3), and Ethernet Virtual Private Network ( EVPN). In this process, overlay network devices are unaware of the underlay network. When the data packet is received by another device, the device removes the outer IP header and tunnel header to obtain the original data packet. The data packet is then forwarded based on the new IP header. When sending a data packet, a device adds a new IP header and a tunnel header to the data packet and shields the inner IP header. Tunnels are established between interconnected overlay devices.
  • Multi-path forwarding is complex, and underlying networks cannot be integrated to implement load balancing.ĭevices on overlay networks are interconnected through logical links, constituting overlay topologies.
  • Network slicing and segmentation are complex, and cannot implement on-demand allocation of network resources.
  • The Internet cannot satisfy security requirements of private communications.
  • When services are added or changed, existing underlying network connections need to be modified.
  • Therefore, packet forwarding is highly dependent on transmission paths.

    overplay for the underlay

    Hardware devices forward data packets based on destination IP addresses.An underlay network constructed based on traditional network devices has the following problems:

    overplay for the underlay

    However, traditional network devices forward data packets based on hardware. As technologies advance, underlay networks can also be constructed using Multiprotocol Label Switching ( MPLS), which is a wide area network (WAN) technology running between Layer 2 and Layer 3. The Open Shortest Path First (OSPF) or Intermediate System to Intermediate System (IS-IS) protocol is used for route control in an autonomous system (AS), while the Border Gateway Protocol (BGP) is used for route transfer and interconnection between ASs. The Internet is a typical Layer 3 underlay network. A typical example of Layer 2 underlay network is an Ethernet network, on which VLANs are created. The underlay network can be a Layer 2 or Layer 3 network. However, routing protocols must be used to ensure IP connectivity between these devices. On an underlay network, devices such as switches, routers, load balancers, and firewalls can be interconnected.














    Overplay for the underlay