A-Z Popular New Study Guide Search »
Technology
 
Related Guides
Architectural Patterns

What is an Overlay Network?

 , updated on
An overlay network is a logical computer network that is built on top of a another network. In most cases, this means a private or special purpose network that is built on top of the internet using encryption and specialized network protocols.

Peer-to-peer

An approach to distributed processing that builds networks from peers for workload processing and data sharing. For example, a game might be run from the processors of players over a peer-to-peer network as opposed to centralized cloud infrastructure.

Virtual Private Network (VPN)

A private network constructed on top of internet protocols. Typically used to secure privacy. For example, an individual who works from home might connect to a corporate VPN so that their work and communications are secured from view of the public internet using encryption.

Resilient Overlay Networks

In some cases, overlay networks are created to improve network management functions. One such technique, known as Resilient Overlay Networks, detect disruptions in internet traffic and route around it.
Overview: Overlay Network
Type
Networking
Security
Architectural Patterns
Definition
A logical network built on top of another network.
Value
Security & Privacy
Network Management
Distributed Processing
Related Concepts
Architectural Patterns
Information Security
Privacy

Software Architecture

This is the complete list of articles we have written about software architecture.
Algorithms
Business Capabilities
Complexity Hiding
Data Architecture
Design Debt
Design For Scale
Forward Compatibility
Graceful Degradation
Information Security
Logical Architecture
Microservices
Precomputation
Privacy By Design
Push Technology
Reliability Engineering
Service Architecture
Smart Endpoints
Software Entropy
Software Quality
Solution Architecture
System Architecture
System Of Systems
Worse Is Better
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.

Types of Technology

A reasonably comprehensive list of information technologies.

Gamification

A list of gamification techniques.

Information Technology Problems

A list of common IT problems.

Types Of Cloud

The basic types of cloud computing.

Machine Data

The common types of machine data.

Types Of Software

The common types of software.

Proprietary Technology

A definition of proprietary technology with examples.

Systems Design

The common elements of a systems design.

Systems vs Applications

The difference between systems and applications explained.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map