Documente Academic
Documente Profesional
Documente Cultură
Pursuing M.Tech(CSE), Nalanda Institute of Engineering & Technology, Siddharth Nagar, Sattenapalli, Guntur Affiliated to JNTUK, Kakinada, A.P., India.
2
Asst. Professor, Department of Computer Science Engineering, Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur Affiliated to JNTUK, Kakinada, A.P., India.
Abstract Overlay networks have been used for adding and enhancing functionality to the end-users without requiring modifications in the Internet core mechanisms. Overlay networks have been used for a variety of popular applications including routing, file sharing, content distribution, and server deployment. Overlay network provides effective and reliable services by creating a virtual topology on top of existing networks. However, new network environments and network services require new management strategies which can cope with resource constraints, scalability, dependability, context awareness, security, mobility, and other issues. This paper presents an overview of overlay networks and it also considers the scenario when multiple overlays are constructed on top of a common physical network. These overlays have partially overlapping paths and even nodes. Each overlay is selfish by nature in that it performs overlay routing so as to optimize its own performance without considering the impact on other overlays.
abstraction that provides load balancing, query forwarding and bounded lookup times [2]. In an overlay topology, node behavior can be either cooperative or selfish. In the cooperative mode of operation, each node creates overlay links to send its traffic demands to allow other nodes to route their traffic demands over them. In the selfish mode of operation, nodes create overlay links in the network to maximize their own benefits. Thus, an overlay network has the following properties: To be built on top of one or more existing networks. To add an additional layer of indirection/virtualization. To change properties in one or more areas of underlying networks. To be possible to change an existing network layer.
I. INTRODUCTION Overlay networks are computer networks that are built on top of physical networks of interconnected routers and end-systems. A number of application layer overlay designs have been proposed to address issues like ensuring performance and availability of Internet routing, enabling multicasting, providing Quality of Service (QoS) guarantees, protecting from denial of service attacks, and content distribution and file sharing services [1]. It is well known that flooding-based systems do not scale well due to the bandwidth and processing requirements they impose on the network. In addition, they provide no guarantees as to lookup times or content accessibility. Overlay networks can help in addressing these issues because they have a network semantics layer above the basic transport protocol level (Fig. 1). This organizes the network topology according the nodes content, implementing a distributed hash table
Fig 1. An example of an overlay network Large scale distributed applications can take advantages of promising characteristics of overlay networks, such as resilience in the event of node failures, adaptation of extended structures and applications and ease of deployment in setting up overlay networks and services. Although the concept of overlay networks has received much attention lately, there has been little focus on the
Page 154
Page 155
There are two overlays in the network: overlay 1 consists of node A,C,E while overlay 2 consists of node B,D, F. For overlay 1, all logical links map to the corresponding physical links except for the logical link between node C and node E, which corresponds to the physical links C D E. For overlay 2, all logical links map to the corresponding physical links except for the logical link between node B and node D, which corresponds to the
Page 156
V. CONCLUSION Overlay networks are used for a variety of popular applications including routing , content distribution , peerto-peer (P2P) file sharing and streaming, data-center applications , and online multi-player games. Overlay network provides effective and reliable services by creating a virtual topology on top of existing networks. However, new network environments and network services require new management strategies which can cope with resource constraints, scalability, dependability, context awareness, security, mobility, and other issues. This paper presents an overview of overlay networks and it also considers the scenario when multiple overlays are constructed on top of a common physical network. These overlays have partially overlapping paths and even nodes. Each overlay is selfish by nature in that it performs overlay routing so as to optimize its own performance without considering the impact on other overlays.
AUTHORS PROFILE
Venkata Rao Gangineni, pursuing M.Tech(CSE) from Nalanda Institute of Engineering & Technology, Siddharth Nagar, Sattenapalli, Guntur Affiliated to JNTUK, Kakinada, A.P., India. My research Interests are Computer Networks.
REFERENCES
[1] N.M. Mosharaf Kabir Chowdhury and R. Boutaba, (2009). Network Virtualization: State of the Art and Research Challenges. IEEE Communications Magazine, Vol. 47, Issue 7, pp20-26. [2] D. Doval and D. OMahony, (2003). Overlay Networks: A Scalable Alternative for P2P. IEEE Internet Computing, Vol. 7, No. 4, pp79-82. [3] M. Hofmann and L.R. Beaumont, (2005). Content networking: architecture, protocols, and practice. Morgan Kaufmann, ISBN: 1558608346. [4] H. De Meer and C. Koppen, (2005). Self-Organization in Peer-toPeer Systems. R. Steinmetz and K. Wehrle (Eds.): P2P Systems and Applications, LNCS 3485, pp247-266.
Bala Krishna, working as Asst. Professor, Department of Computer Science Engineering at Nalanda Institute of Engineering & Technology, Siddharth Nagar, Sattenapalli, Guntur Affiliated to JNTUK, Kakinada, A.P., India. My research Interests are Data Mining and Computer Networks.
Page 157