JNT Visual - Fotolia
A network overlay is a method used to abstract underlying network hardware, software and protocols. Early on, network overlays were designed with the sole purpose of creating multiple, separated networks on shared physical hardware. The primary use-case scenario was when a cloud service provider wanted to segment customer traffic without having to use separate hardware or network connections.
Over time, network overlays were adapted to create an end-to-end, software-defined networking architecture using legacy network hardware and software -- or to create an SDN across incompatible network vendor equipment. Using this architecture, overlay software can be used to create a virtual, end-to-end network for centralized control plane purposes related to SDN.
Commercial network vendors offer several network overlays to fit with software-defined networking architecture. There are also many available open source options. While some users praise the flexibility of network overlays, others are quick to point out faults. For example, adding yet another layer of abstraction to an already heavily virtualized data center and campus network can further complicate troubleshooting processes.
Additionally, one must consider the extra overhead that is consumed by running an abstracted software layer on top of hardware. Overlays can be slow when compared to native SDN options that run directly on application-specific integrated circuits.
The flexibility benefits must be gauged against performance when looking at network overlay options for software-defined networking architecture. In many cases, IT leadership may choose to go with an SDN overlay as a temporary stopgap to gain SDN benefits without an expensive and time-consuming network upgrade. Yet, as time moves on, it's likely that overlay approaches will give way to hardware and software that is specifically designed to provide all the benefits of software-defined networking architecture without the overhead.
Dig Deeper on Software-defined networking
Related Q&A from Andrew Froehlich
One difference between managed and unmanaged switches is complexity. A managed switch is more complex and requires more skills, but it offers better ... Continue Reading
Variables such as third-party business partners create unique cyberthreats for organizations. Find out when a cybersecurity insurance policy is a ... Continue Reading
To vet potential cybersecurity insurance providers, there are a few questions every customer should ask. Learn more about the questions to ask and ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.