Considering network of devices used for communication, there are edge networking devices connected to endpoint devices. They encapsulate or decapsulate data send by endpoints. There are also many networking devices lying between these edge devices which provide connectivity for edge devices.
The underlying network of devices that exist between edge networking devices is called Underlay.
They include switches, routers, cables and wireless links to create physical network.
Like GRE tunnel, path defined for packet to take (as specified by protocol used) can be though as a virtual connection between edge devices. This virtual path along with edge devices is collectively called Overlay.
Network implementing SDA also uses this concept of overlay and underlay. All switches in distribution and access layer used in SDA network are layer 3 switches. This network which uses layer 3 access layer switches is called Routed access layer. The virtual link that exists between edge networking devices in SDA network is called VXLAN.
In SDA network architecture, Overlay and Underlay are collectively known as SDA fabric and edge networking devices are called Fabric edge nodes.
Location Identifier Separation Protocol :
In network implementing SDA, for identifying the location of endpoint devices and routes to reach them is learned through a different concept than traditional mac and ip address learning. These concepts are defined by Location Identifier Separation Protocol (LISP). Each endpoint devices are given a identification number called Endpoint Identifier (EID).
- Fabric Edge nodes uses traditional mac or IP address method to identify endpoint devices. Then an EID is given to all endpoint devices.
- A database called LISP map server contains EID list.
- LISP map server also contains list to reach each EID via fabric edge node’s IP address. IP address of fabric edge node is called Routing location (RLOC). This list contains EID and matching RLOC.
Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.
- Difference between Stop and Wait, GoBackN and Selective Repeat
- Difference between Stop and Wait protocol and Sliding Window protocol
- Stop and Wait protocol, its problems and solutions
- Difference between VoIP and and POTS
- Denial of Service and Prevention
- What’s difference between The Internet and The Web ?
- Difference between HTML and HTTP
- Difference between http:// and https://
- IPv4 Datagram Fragmentation and Delays
- Introduction and IPv4 Datagram Header
- Why does DNS use UDP and not TCP?
- Difference between Circuit Switching and Packet Switching
- Stop and Wait ARQ
- Difference between Ping and Traceroute
- Differences between Virtual Circuits and Datagram Networks
- Digital Signatures and Certificates
- Program to determine class, Network and Host ID of an IPv4 address
- Network configuration and trouble shooting commands in Linux
- Difference between RFID and Barcode
- Know your public and private IP addresses
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.