SlideShare a Scribd company logo
Overlay Network
Content
 Internet
 Deficiencies of Internet
 What is Overlay Network ?
 Type of Overlay Network
 Why Overlay Network ?
 Overlay Network Performance & Benefit
 Architecture
 Types of Overlay
 Performance benefits
 Internet Security Report
 Conclusion
 The Internet is transforming every aspect of communication in human
society by enabling a wide range of applications for business, commerce,
entertainment, news, and social interaction.
 Requirements of Modern applications
Performance
Reliability
Scalability
Security
low cost
Internet
 Network layer
 Defines addressing, routing, and service model for communication
between hosts.
 Default IP- routing
 Hierarchical structures (IGP and BGP)
 Allow flexibility and distributed management
 Achieve global reachability/connectivity
 CIDR allows route aggregation for announcements, leading to smaller
routing tables
Traditional Internet Infrastructure
 Routing anomalies impact network/service availability
 Trade-off performance of scalability
 New services need new capabilities
 Mobility? Multicast service?
Solution Space:
 Change the existing network layer, or
 Bridge the gap is use of overlay on top of existing networks.
Why its not good enough ?
What is Overlay Network?
 An overlay network is a computer network that is built on top
of another network.
 Nodes in the overlay network can be thought of as being
connected by virtual or logical links, each of which corresponds
to a path, perhaps through many physical links, in the
underlying network.
Example : Internet is overlay network & Virtualization
An overlay network is built on top of the public Internet to provide
the exact requirements that rich Internet-based services need.
Basic Diagram of overlay network
 CDN – Resilience overlay network
 P2P
 VPN
 MPLS
 IPv4 to IPv6
 GRE
 Multicast
 VoIP
 Frame Relay
Type of Overlay Network
Need for Overlay Network?
Due to following drawbacks/limitation of Internet
 Outages
 Congestion
 Lack of scalability
 Slow adaptability
 Lack of security
 (2008 and 2013) -16 Outage
Last outage – 22-26 October 2015 (Due to fiber cut)
Internet Outage example
 Outages
 Congestion
 Lack of scalability
 Slow adaptability
 Lack of security
Drawbacks/Limitation of Internet
What Overlay Network offer?
 Performance
 Scalability
 Security
 Intelligence
Overlay Architecture
 To deliver the content, applications and services to users on behalf of content providers.
 Examples: E commerce sites, news channels, social networks, web portals, banks, credit
card companies.
 A large distributed system consisting of hundreds of thousands of globally deployed
servers that run sophisticated algorithms.
System level Architecture of Overlay
Network
Overlay Architecture:
 Origins
 One or a few,
 locates in core
 Edge servers
 Hundreds thousand
 Locates at the edges,
 close to users
 Transport system
 High reliability and performance
Types of Overlay
1) Caching overlay
2) Routing overlay
3) Security overlay
Caching overlay
Caching Overlay
Caching overlay is used for the content which is cached over a period
of time.
 Usage
 Static objects can be cached for some period
Embedded image on a web page, a movie, a music file, a
software download, or a software update.
 Benefits
 Availability, performance and origin offload
Caching Overlay
 Architecture – Mapping System
 Performance benefits
 Edge Hit rate
 Speedup time
 The caching overlay is used for content that can be cached for some
period of time.
 The key benefits that a caching overlay provides are greater
availability, performance, origin offload, and scalability.
 Origin offload
Caching overlay architecture example
Performance Benefits
30 agents located in Asia, Europe, and North America
The agents hourly download a popular web page
 Origin servers located in Dallas NA
Performance Benefits
Origin Offload Benefits
 Origin offload
 Is equal to the ratio of the volume of traffic served by the origin without
the overlay to the volume of traffic served by the origin with the overlay.
 A large decrease in server, bandwidth, operational expenses.
 Popular vs cold traffic
 Cache hierarchy
 Adding a layer of parent servers to reduce the flow of traffic to origin server.
 Increases the origin offload, easy to implement .
Performance Benifits
Origin offload increases with deployment of cache
hierarchy
Routing overlay
Routing Overlay
 For Internet-based applications such as shopping, banking, and gaming,
the downloaded content is dynamic and hence uncacheable.
 Therefore, in order to improve performance and availability, routing
overlay is used.
 It improve performance and availability by discovering better “overlay
paths” from the origin to the user.
 An overlay construction algorithm is used to compute a set of overlay
paths that each edge server can use to reach each of the origins.
 Overlay construction algorithm metric :
 Latency
 Packet loss
 Bandwidth
 Server load
 Based on metric find RANK for best path : Request / Response
 Algorithm construct path by solving multi-commodity flow
Routing Overlay Architecture
Routing Overlay Architecture
Routing Overlay link cost attributes
 Latency
 Bandwidth
 Throughput
 TCP performance
 Revers Proxy
Performance Benefits
The significantly greater performance in file download is due to the ability of the
routing overlay to find alternate paths that avoid the failed links between different
parts of Asia to the Boston origin.
Performance Benefits
Even when there is no major Internet outage, the routing
overlay provides a significant performance benefit by
discovering and using better performing overlay paths for
communication.
Performance Benefits
 In Figure (a), shows the performance benefit of a large routing overlay uses a single
optimized path .
 Value of speedups increases as user moves away from the origin.
 In Figure (b), shows the performance benefits for a different smaller routing overlay that
uses multiple optimized paths for each communication.
 In figure (b), the speedups are less compared to (a) as fewer choices for alternate paths
and edge servers are less proximal to users.
Security Overlay
Why Security Overlay
 An Internet-based service needs to defend itself from distributed denial of
service (DDoS) attacks
 SYN Flood,
 UDP Flood,
 Brute force attack.
 Defending against DDoS and hacker attacks requires a vast amount of
spare capacity, Cost and Security expertise team to mitigate attack on
distributed large shared platform.
 DDoS attacks on the rise: 71% increase since Q3 2015
 New record DDoS attack: 623 Gbps in Q3 2016
 Mega attacks over 100 Gbps on the rise: 138% increase since
Q3 2015
 427 DDOS attack launched against a single organization in Q3
2016
Reference : Q3 2016 state of the internet security report
Security Overlay
Q3 2016 State of the Internet Security Report
Q3 2016 State of the Internet Security Report
Security Architectural Elements
 Shared spare capacity
 Shared expertise and lower costs
 Advanced security features
 Shielding the origin
 Control Design
Security Overlay Use
Performance benefits
-->Figure (a) shows a sudden increase in
the traffic of the content provider’s
website due to the DDoS attack. The web
site that is normally accessed at a rate
less than 50 pages/second was accessed
at a much higher rate of 9000 pages/sec
during the attack.
 Figure (b) shows firewall rules getting
triggered in response to the attack and
denying over 90% of the attackers’
requests, and protecting the origin from
the significant surge of traffic.
Conclusion
Overlays hold the keys to the rapid evolution of Internet services,
even as the underlying Internet architecture is slow to change.
Thank You

More Related Content

What's hot

Cloud Networking
Cloud NetworkingCloud Networking
Cloud Networking
Venkatesh Sekar
 
Networking in cloud computing
Networking in cloud computingNetworking in cloud computing
Networking in cloud computing
Barani Tharan
 
Translating from legacy to cloud
Translating from legacy to cloudTranslating from legacy to cloud
Translating from legacy to cloud
Manikandan Sekar
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Dilum Bandara
 
A Breif On Cloud computing
A Breif On Cloud computingA Breif On Cloud computing
A Breif On Cloud computing
Raja Raman
 
Introduction on Cloud Computing
Introduction on Cloud Computing Introduction on Cloud Computing
Introduction on Cloud Computing
Sanjiv Pradhan
 
Data Center Solutions: Radical Shift toward Design-Driven Innovation
Data Center Solutions: Radical Shift toward Design-Driven InnovationData Center Solutions: Radical Shift toward Design-Driven Innovation
Data Center Solutions: Radical Shift toward Design-Driven Innovation
Netmagic Solutions Pvt. Ltd.
 
Envisioning the Network Cloud
Envisioning the Network CloudEnvisioning the Network Cloud
Envisioning the Network Cloud
APNIC
 
Data-Centric and Message-Centric System Architecture
Data-Centric and Message-Centric System ArchitectureData-Centric and Message-Centric System Architecture
Data-Centric and Message-Centric System Architecture
Rick Warren
 
CDN
CDNCDN
SD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperSD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperMarc Curtis
 
Cloud computing - dien toan dam may
Cloud computing - dien toan dam mayCloud computing - dien toan dam may
Cloud computing - dien toan dam mayNguyen Duong
 
Tata Comm whitepaper
Tata Comm whitepaperTata Comm whitepaper
Tata Comm whitepaperAbhishek Iyer
 
Cloud Enablement - IT Services Model
Cloud Enablement - IT Services Model Cloud Enablement - IT Services Model
Cloud Enablement - IT Services Model
Vishal Sharma
 
08 sdn system intelligence short public beijing sdn conference - 130828
08 sdn system intelligence   short public beijing sdn conference - 13082808 sdn system intelligence   short public beijing sdn conference - 130828
08 sdn system intelligence short public beijing sdn conference - 130828
Mason Mei
 
White Paper: The Distributed Cloud
White Paper: The Distributed CloudWhite Paper: The Distributed Cloud
White Paper: The Distributed Cloud
GCC Computers
 
Modern Applications Demand Network Analytics
Modern Applications Demand Network AnalyticsModern Applications Demand Network Analytics
Modern Applications Demand Network Analytics
Pluribus Networks
 
My Ph.D. Defense - Software-Defined Systems for Network-Aware Service Compos...
 My Ph.D. Defense - Software-Defined Systems for Network-Aware Service Compos... My Ph.D. Defense - Software-Defined Systems for Network-Aware Service Compos...
My Ph.D. Defense - Software-Defined Systems for Network-Aware Service Compos...
Pradeeban Kathiravelu, Ph.D.
 
Common Standards in Cloud Computing
Common Standards in Cloud ComputingCommon Standards in Cloud Computing
Common Standards in Cloud Computing
mrzahidfaiz.blogspot.com
 

What's hot (20)

Cloud Networking
Cloud NetworkingCloud Networking
Cloud Networking
 
Networking in cloud computing
Networking in cloud computingNetworking in cloud computing
Networking in cloud computing
 
Translating from legacy to cloud
Translating from legacy to cloudTranslating from legacy to cloud
Translating from legacy to cloud
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A Breif On Cloud computing
A Breif On Cloud computingA Breif On Cloud computing
A Breif On Cloud computing
 
Introduction on Cloud Computing
Introduction on Cloud Computing Introduction on Cloud Computing
Introduction on Cloud Computing
 
Data Center Solutions: Radical Shift toward Design-Driven Innovation
Data Center Solutions: Radical Shift toward Design-Driven InnovationData Center Solutions: Radical Shift toward Design-Driven Innovation
Data Center Solutions: Radical Shift toward Design-Driven Innovation
 
Envisioning the Network Cloud
Envisioning the Network CloudEnvisioning the Network Cloud
Envisioning the Network Cloud
 
Data-Centric and Message-Centric System Architecture
Data-Centric and Message-Centric System ArchitectureData-Centric and Message-Centric System Architecture
Data-Centric and Message-Centric System Architecture
 
CDN
CDNCDN
CDN
 
SD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperSD_WAN_NFV_White_Paper
SD_WAN_NFV_White_Paper
 
Cloud computing - dien toan dam may
Cloud computing - dien toan dam mayCloud computing - dien toan dam may
Cloud computing - dien toan dam may
 
Tata Comm whitepaper
Tata Comm whitepaperTata Comm whitepaper
Tata Comm whitepaper
 
Cloud Enablement - IT Services Model
Cloud Enablement - IT Services Model Cloud Enablement - IT Services Model
Cloud Enablement - IT Services Model
 
08 sdn system intelligence short public beijing sdn conference - 130828
08 sdn system intelligence   short public beijing sdn conference - 13082808 sdn system intelligence   short public beijing sdn conference - 130828
08 sdn system intelligence short public beijing sdn conference - 130828
 
White Paper: The Distributed Cloud
White Paper: The Distributed CloudWhite Paper: The Distributed Cloud
White Paper: The Distributed Cloud
 
Modern Applications Demand Network Analytics
Modern Applications Demand Network AnalyticsModern Applications Demand Network Analytics
Modern Applications Demand Network Analytics
 
My Ph.D. Defense - Software-Defined Systems for Network-Aware Service Compos...
 My Ph.D. Defense - Software-Defined Systems for Network-Aware Service Compos... My Ph.D. Defense - Software-Defined Systems for Network-Aware Service Compos...
My Ph.D. Defense - Software-Defined Systems for Network-Aware Service Compos...
 
Common Standards in Cloud Computing
Common Standards in Cloud ComputingCommon Standards in Cloud Computing
Common Standards in Cloud Computing
 

Similar to Overlay Network Overview

Cloud Computing Final1
Cloud Computing Final1Cloud Computing Final1
Cloud Computing Final1Sandip Kadam
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
SaiRamdev3
 
Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...
Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...
Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...EuroCloud
 
Essay On Ethernet
Essay On EthernetEssay On Ethernet
Essay On Ethernet
Jennifer Wood
 
iWAN - Cisco Application Experience Solution
iWAN - Cisco Application Experience SolutioniWAN - Cisco Application Experience Solution
iWAN - Cisco Application Experience Solution
xband
 
introduction to distributed computing.pptx
introduction to distributed computing.pptxintroduction to distributed computing.pptx
introduction to distributed computing.pptx
ApthiriSurekha
 
Taw opening session
Taw opening sessionTaw opening session
Taw opening session
Michel Burger
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Ed Byrne
 
Unit 1.2 move to cloud computing
Unit 1.2   move to cloud computingUnit 1.2   move to cloud computing
Unit 1.2 move to cloud computing
eShikshak
 
Cloud infrastructure and Cloud Services
Cloud infrastructure and Cloud ServicesCloud infrastructure and Cloud Services
Cloud infrastructure and Cloud Services
Intel Corporation
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud Computing
Peter R. Egli
 
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...
IOSR Journals
 
DNIS in SRC
DNIS in SRCDNIS in SRC
DNIS in SRC
Ahmed Saeed
 
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
IJIR JOURNALS IJIRUSA
 
E0332427
E0332427E0332427
E0332427
iosrjournals
 
Edge virtualisation for Carrier Networks
Edge virtualisation for Carrier NetworksEdge virtualisation for Carrier Networks
Edge virtualisation for Carrier Networks
MyNOG
 
Multi cloud networking
Multi cloud networkingMulti cloud networking
Multi cloud networking
Joseph Primicerio
 
AESIT Presents - OmniWAN
AESIT Presents - OmniWANAESIT Presents - OmniWAN
AESIT Presents - OmniWAN
Kenton Wingfield
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Siddiq Abu Bakkar
 

Similar to Overlay Network Overview (20)

Cloud Computing Final1
Cloud Computing Final1Cloud Computing Final1
Cloud Computing Final1
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...
Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...
Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...
 
Essay On Ethernet
Essay On EthernetEssay On Ethernet
Essay On Ethernet
 
iWAN - Cisco Application Experience Solution
iWAN - Cisco Application Experience SolutioniWAN - Cisco Application Experience Solution
iWAN - Cisco Application Experience Solution
 
introduction to distributed computing.pptx
introduction to distributed computing.pptxintroduction to distributed computing.pptx
introduction to distributed computing.pptx
 
Taw opening session
Taw opening sessionTaw opening session
Taw opening session
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Unit 1.2 move to cloud computing
Unit 1.2   move to cloud computingUnit 1.2   move to cloud computing
Unit 1.2 move to cloud computing
 
Cloud infrastructure and Cloud Services
Cloud infrastructure and Cloud ServicesCloud infrastructure and Cloud Services
Cloud infrastructure and Cloud Services
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud Computing
 
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...
 
DNIS in SRC
DNIS in SRCDNIS in SRC
DNIS in SRC
 
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
 
E0332427
E0332427E0332427
E0332427
 
Edge virtualisation for Carrier Networks
Edge virtualisation for Carrier NetworksEdge virtualisation for Carrier Networks
Edge virtualisation for Carrier Networks
 
Multi cloud networking
Multi cloud networkingMulti cloud networking
Multi cloud networking
 
AESIT Presents - OmniWAN
AESIT Presents - OmniWANAESIT Presents - OmniWAN
AESIT Presents - OmniWAN
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Recently uploaded

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

Overlay Network Overview

  • 2. Content  Internet  Deficiencies of Internet  What is Overlay Network ?  Type of Overlay Network  Why Overlay Network ?  Overlay Network Performance & Benefit  Architecture  Types of Overlay  Performance benefits  Internet Security Report  Conclusion
  • 3.  The Internet is transforming every aspect of communication in human society by enabling a wide range of applications for business, commerce, entertainment, news, and social interaction.  Requirements of Modern applications Performance Reliability Scalability Security low cost Internet
  • 4.  Network layer  Defines addressing, routing, and service model for communication between hosts.  Default IP- routing  Hierarchical structures (IGP and BGP)  Allow flexibility and distributed management  Achieve global reachability/connectivity  CIDR allows route aggregation for announcements, leading to smaller routing tables Traditional Internet Infrastructure
  • 5.  Routing anomalies impact network/service availability  Trade-off performance of scalability  New services need new capabilities  Mobility? Multicast service? Solution Space:  Change the existing network layer, or  Bridge the gap is use of overlay on top of existing networks. Why its not good enough ?
  • 6. What is Overlay Network?  An overlay network is a computer network that is built on top of another network.  Nodes in the overlay network can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. Example : Internet is overlay network & Virtualization
  • 7. An overlay network is built on top of the public Internet to provide the exact requirements that rich Internet-based services need. Basic Diagram of overlay network
  • 8.  CDN – Resilience overlay network  P2P  VPN  MPLS  IPv4 to IPv6  GRE  Multicast  VoIP  Frame Relay Type of Overlay Network
  • 9. Need for Overlay Network? Due to following drawbacks/limitation of Internet  Outages  Congestion  Lack of scalability  Slow adaptability  Lack of security
  • 10.  (2008 and 2013) -16 Outage Last outage – 22-26 October 2015 (Due to fiber cut) Internet Outage example
  • 11.  Outages  Congestion  Lack of scalability  Slow adaptability  Lack of security Drawbacks/Limitation of Internet
  • 12. What Overlay Network offer?  Performance  Scalability  Security  Intelligence
  • 13. Overlay Architecture  To deliver the content, applications and services to users on behalf of content providers.  Examples: E commerce sites, news channels, social networks, web portals, banks, credit card companies.  A large distributed system consisting of hundreds of thousands of globally deployed servers that run sophisticated algorithms.
  • 14. System level Architecture of Overlay Network
  • 15. Overlay Architecture:  Origins  One or a few,  locates in core  Edge servers  Hundreds thousand  Locates at the edges,  close to users  Transport system  High reliability and performance
  • 16. Types of Overlay 1) Caching overlay 2) Routing overlay 3) Security overlay
  • 18. Caching Overlay Caching overlay is used for the content which is cached over a period of time.  Usage  Static objects can be cached for some period Embedded image on a web page, a movie, a music file, a software download, or a software update.  Benefits  Availability, performance and origin offload
  • 19. Caching Overlay  Architecture – Mapping System  Performance benefits  Edge Hit rate  Speedup time  The caching overlay is used for content that can be cached for some period of time.  The key benefits that a caching overlay provides are greater availability, performance, origin offload, and scalability.  Origin offload
  • 21. Performance Benefits 30 agents located in Asia, Europe, and North America The agents hourly download a popular web page  Origin servers located in Dallas NA
  • 23. Origin Offload Benefits  Origin offload  Is equal to the ratio of the volume of traffic served by the origin without the overlay to the volume of traffic served by the origin with the overlay.  A large decrease in server, bandwidth, operational expenses.  Popular vs cold traffic  Cache hierarchy  Adding a layer of parent servers to reduce the flow of traffic to origin server.  Increases the origin offload, easy to implement .
  • 24. Performance Benifits Origin offload increases with deployment of cache hierarchy
  • 26. Routing Overlay  For Internet-based applications such as shopping, banking, and gaming, the downloaded content is dynamic and hence uncacheable.  Therefore, in order to improve performance and availability, routing overlay is used.  It improve performance and availability by discovering better “overlay paths” from the origin to the user.
  • 27.  An overlay construction algorithm is used to compute a set of overlay paths that each edge server can use to reach each of the origins.  Overlay construction algorithm metric :  Latency  Packet loss  Bandwidth  Server load  Based on metric find RANK for best path : Request / Response  Algorithm construct path by solving multi-commodity flow Routing Overlay Architecture
  • 29. Routing Overlay link cost attributes  Latency  Bandwidth  Throughput  TCP performance  Revers Proxy
  • 30. Performance Benefits The significantly greater performance in file download is due to the ability of the routing overlay to find alternate paths that avoid the failed links between different parts of Asia to the Boston origin.
  • 31. Performance Benefits Even when there is no major Internet outage, the routing overlay provides a significant performance benefit by discovering and using better performing overlay paths for communication.
  • 32. Performance Benefits  In Figure (a), shows the performance benefit of a large routing overlay uses a single optimized path .  Value of speedups increases as user moves away from the origin.  In Figure (b), shows the performance benefits for a different smaller routing overlay that uses multiple optimized paths for each communication.  In figure (b), the speedups are less compared to (a) as fewer choices for alternate paths and edge servers are less proximal to users.
  • 34. Why Security Overlay  An Internet-based service needs to defend itself from distributed denial of service (DDoS) attacks  SYN Flood,  UDP Flood,  Brute force attack.  Defending against DDoS and hacker attacks requires a vast amount of spare capacity, Cost and Security expertise team to mitigate attack on distributed large shared platform.
  • 35.  DDoS attacks on the rise: 71% increase since Q3 2015  New record DDoS attack: 623 Gbps in Q3 2016  Mega attacks over 100 Gbps on the rise: 138% increase since Q3 2015  427 DDOS attack launched against a single organization in Q3 2016 Reference : Q3 2016 state of the internet security report Security Overlay
  • 36. Q3 2016 State of the Internet Security Report
  • 37. Q3 2016 State of the Internet Security Report
  • 38. Security Architectural Elements  Shared spare capacity  Shared expertise and lower costs  Advanced security features  Shielding the origin  Control Design
  • 40. Performance benefits -->Figure (a) shows a sudden increase in the traffic of the content provider’s website due to the DDoS attack. The web site that is normally accessed at a rate less than 50 pages/second was accessed at a much higher rate of 9000 pages/sec during the attack.  Figure (b) shows firewall rules getting triggered in response to the attack and denying over 90% of the attackers’ requests, and protecting the origin from the significant surge of traffic.
  • 41. Conclusion Overlays hold the keys to the rapid evolution of Internet services, even as the underlying Internet architecture is slow to change.