JNT Visual - Fotolia
A network overlay is a method used to abstract underlying network hardware, software and protocols. Early on, network overlays were designed with the sole purpose of creating multiple, separated networks on shared physical hardware. The primary use-case scenario was when a cloud service provider wanted to segment customer traffic without having to use separate hardware or network connections.
Over time, network overlays were adapted to create an end-to-end, software-defined networking architecture using legacy network hardware and software -- or to create an SDN across incompatible network vendor equipment. Using this architecture, overlay software can be used to create a virtual, end-to-end network for centralized control plane purposes related to SDN.
Commercial network vendors offer several network overlays to fit with software-defined networking architecture. There are also many available open source options. While some users praise the flexibility of network overlays, others are quick to point out faults. For example, adding yet another layer of abstraction to an already heavily virtualized data center and campus network can further complicate troubleshooting processes.
Additionally, one must consider the extra overhead that is consumed by running an abstracted software layer on top of hardware. Overlays can be slow when compared to native SDN options that run directly on application-specific integrated circuits.
The flexibility benefits must be gauged against performance when looking at network overlay options for software-defined networking architecture. In many cases, IT leadership may choose to go with an SDN overlay as a temporary stopgap to gain SDN benefits without an expensive and time-consuming network upgrade. Yet, as time moves on, it's likely that overlay approaches will give way to hardware and software that is specifically designed to provide all the benefits of software-defined networking architecture without the overhead.
Dig Deeper on Software-defined networking
Related Q&A from Andrew Froehlich
Andrew Froehlich breaks down how authentication and digital identity differ and how each of them are intrinsic to identity and access management. Continue Reading
In order to build and maintain a comprehensive access management program, enterprise leaders must get to know the various forms of digital ... Continue Reading
Are you up to date on the most popular digital authentication methods and their potential cybersecurity risks? Learn how the right technology can ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.