A Survey of Cloud Network Overlay Protocols

被引:0
|
作者
Nadeem, Muhammad Aamir [1 ]
Karamat, Taimur [1 ]
机构
[1] Virtual Univ Pakistan, Dept Comp Sci, MA Jinnah Campus,Def Rd,Raiwind Rd, Lahore, Pakistan
关键词
Cloud Computing; Cloud network overlay protocols; SPB; TRILL; LISP; VXLAN; NVGRE; STT;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing is model for sharing of computing and storage resources over Internet. Virtualization is the key technique behind Cloud. It enables provisioning of various kinds of services to the Cloud users on one hand; on the other it increases utilization of computing resources and bandwidth. Virtualization of server and network puts pressure on existing hardware features and protocols by arousing issues of scalability, limitation of number of ports, under utilized resources and bandwidth. MAC address table of Network Interface Card has a limited size, VLANs are not enough scalable to cater demands of Cloud, and Spanning Tree Protocol results in idle or under utilization of resources. Cloud network overlay protocols are the intricacies devised to resolve these issues. It resolves the issues of scalability, mobility, better resources and bandwidth utilization and workload migration. This paper presents comparative overview of different overlay protocols namely Shortest Path Bridging (SPB), Transparent Interconnection of Lots of Link (TRILL), Locator/ID Separation Protocol (LISP), Virtual Extensible LANs (VXLANs), Network Virtualization using Generic Routing Encapsulation (NVGRE), and Stateless Transport Tunnelling (STT) followed by conclusions and future recommendations.
引用
收藏
页码:177 / 182
页数:6
相关论文
共 50 条
  • [1] CLON: Overlay Networks and Gossip Protocols for Cloud Environments
    Matos, Miguel
    Sousa, Antonio
    Pereira, Jose
    Oliveira, Rui
    Deliot, Eric
    Murray, Paul
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2009, PT 1, 2009, 5870 : 549 - +
  • [2] Auditing Protocols for Cloud Storage: A Survey
    Shen, Jun
    Ji, Sai
    Shen, Jian
    Fu, Zhangjie
    Wang, Jin
    2015 FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE THEORY, SYSTEMS AND APPLICATIONS (CCITSA 2015), 2015, : 222 - 227
  • [3] A semantic overlay network for unstructured Peer-to-Peer protocols
    Xie, Junfeng
    Li, Zhenhua
    Chen, Guihai
    2007 INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, VOLS 1 AND 2, 2007, : 1 - 8
  • [4] Using Cloud Computing to Implement a Security Overlay Network
    Salah, Khaled
    Alcaraz Calero, Jose M.
    Zeadally, Sherali
    Al-Mulla, Sameera
    Alzaabi, Mohammed
    IEEE SECURITY & PRIVACY, 2013, 11 (01) : 44 - 53
  • [5] Using Overlay Cloud Network to Accelerate Global Communications
    Xu, Zhaogui
    Ju, Ran
    Gu, Liang
    Wang, Weiguang
    Li, Jin
    Li, Feng
    Han, Lei
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM 2019 WKSHPS), 2019, : 139 - 144
  • [6] A Survey on Group Key Agreement Protocols in Cloud Environment
    Li, Meng
    Zhang, Ruijie
    Du, Xiang
    Zhou, Min
    Yan, Luqi
    Song, Jiacheng
    2018 FIRST INTERNATIONAL COGNITIVE CITIES CONFERENCE (IC3 2018), 2018, : 160 - 165
  • [7] Survey of Network Management Protocols in Wireless Sensor Network
    Zhang, Bin
    Li, Guohui
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 850 - 854
  • [8] A survey on peer-to-peer overlay network schemes
    Park, Hyojin
    Yang, Jinhong
    Park, Juyoung
    Kang, Shin Gak
    Choi, Jun Kyun
    10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 986 - 988
  • [9] IBN@Cloud: An Intent-based Cloud and Overlay Network Orchestration System
    Sarwar, Mir Muhammad Suleman
    Muhammad, Afaq
    Song, Wang-Cheol
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2024, 26 (01) : 131 - 146
  • [10] Modelling and Simulation of Peer-to-Peer Overlay Network Protocols Using OverSim
    Moorhouse, Jamie
    Liu, Lu
    Li, Zhiyuan
    Ding, Zhijun
    UKSIM-AMSS 15TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM 2013), 2013, : 144 - 149