Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A survey on the design, applications, and enhancements of application-layer overlay networks
Kurian J., Sarac K. ACM Computing Surveys43 (1):1-34,2010.Type:Article
Date Reviewed: Apr 25 2011

Considering the fact that overlay networks have experienced overwhelming growth over the past two decades, Kurian and Sarac’s survey of related technologies will be useful to newcomers. Since overlay networks make up a rather large field, this survey focuses on application-specific overlay networks. (It notably distances itself from peer-to-peer (P2P) networks, the largest overlay network application area in terms of research.)

Overlay networks are networks that operate on virtual connectivity. The virtualization of computer networks plays an important role in overcoming shortcomings at a logical level. Moreover, they can also be used as testbeds for new services prior to full-blown installations.

The authors begin with a definition for an overlay network: “a virtual network that is built on top of another.” So, the definition remains open for multi-layered overlays, though the composition of such networks limits them to native and overlay layers. A multi-layered or virtual network on top of another virtual network might be useful for merging different overlay services. Thus, the broader definition is more appropriate.

Kurian and Sarac classify the numerous overlay network applications into five categories: content delivery networks (CDNs), overlay multicast, quality-of-service (QoS) guarantees, resilient routing, and security and denial-of-service (DoS) defense. The most successful application to date is the Akamai CDN, which they discuss first, followed by other commercially less-successful applications.

Kurian and Sarac also survey overlay enhancements. They propose three generalized overlay models: a routing overlay model, a service overlay model, and a security overlay model. This modeling seems a bit inappropriate since they refer to an application-specific solution instead of architectural separation. Hence, rather than introducing models, they could have used service names in sections 3 and 4. They also discuss topology, routing performance, and overhead/scalability issues, and the crosscutting approach for overlay and underlay traffic.

Finally, the authors discuss the pluralist versus purist argument. The pluralist view sees a future in having a heterogeneous network with many overlay services, whereas the purist view reserves the overlay network as a testbed for future networks.

In summary, this is a quite extensive survey, as evidenced by its five pages of references.

Reviewer:  Mohammed Ziaur Rahman Review #: CR139008 (1111-1169)
Bookmark and Share
 
Network Architecture And Design (C.2.1 )
 
 
Network Operations (C.2.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Network Architecture And Design": Date
Designing data networks
Ellis R., Prentice-Hall, Inc., Upper Saddle River, NJ, 1986. Type: Book (9789780132018647)
Apr 1 1986
Internetworking
Pouzin L., Prentice-Hall, Inc., Upper Saddle River, NJ, 1986. Type: Book (9789780131650503)
Feb 1 1987
Broadband network technology: an overview for the data and telecommunications industries
Cooper E., Prentice-Hall, Inc., Upper Saddle River, NJ, 1986. Type: Book (9789780130833792)
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy