Premium Content

Access "Overlays may be the best path forward for networking"

Published: 25 Mar 2013

The network must virtualize, and overlay networks may be the best path available. The demand for network virtualization is prompted by the cloud provider community’s quest for a new way to manage, orchestrate and automate network management. Traditional networks just can’t keep pace with the cloud’s requirements for agility, flexibility and manageability. In an effort to evolve, the networking industry is virtualizing networks to give them properties similar to server virtualization. This network virtualization involves networks being decoupled from hardware, with the flexibility of virtualization and quick provisioning speeds. One way to decouple networks is to create a virtual network abstraction. Just like server virtualization provided a virtual machine abstraction from x86 hardware, networks can provide virtual network abstractions with the same properties and operational simplicity. How can you create virtual network abstractions? This is where overlay networks come into play. Role of Overlays in Network Virtualization An overlay is essentially a ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • How to manage and monitor the converged network
    modern_converged_network.png
    E-Handbook

    The network is converging. Voice, video, and storage and data networks are already converged, and more recently networking pros have had to tackle ...

  • What does WebRTC video mean for the network?
    net_evo_0914.png
    E-Zine

    WebRTC, an emerging standard for embedding voice and video-conferencing applications into Web browsers, is aimed at making real-time communications ...

  • Context makes network security policy smarter, but not easier
    network_evo_0814.jpg
    E-Zine

    Traditional approaches to network security are no longer sufficient to combat today's advanced threats. Attacks now target users and applications, ...