Overlay Networks EECS 122: Lecture 18 Department of Electrical Engineering and Computer Sciences University of California Berkeley.

Slides:



Advertisements
Similar presentations
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Advertisements

Peer to Peer and Distributed Hash Tables
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Scalable Content-Addressable Network Lintao Liu
Peer-to-Peer Systems Chapter 25. What is Peer-to-Peer (P2P)? Napster? Gnutella? Most people think of P2P as music sharing.
Topologically-Aware Overlay Construction and Server Selection Sylvia Ratnasamy, Mark Handly, Richard Karp and Scott Shenker Presented by Shreeram Sahasrabudhe.
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
1 Accessing nearby copies of replicated objects Greg Plaxton, Rajmohan Rajaraman, Andrea Richa SPAA 1997.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Application Layer Overlays IS250 Spring 2010 John Chuang.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Shenker A Scalable, Content- Addressable Network (CAN) ACIRI U.C.Berkeley Tahoe Networks.
P2P: Advanced Topics Filesystems over DHTs and P2P research Vyas Sekar.
A Scalable Content-Addressable Network Authors: S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker University of California, Berkeley Presenter:
Distributed Lookup Systems
Content Addressable Networks. CAN Associate with each node and item a unique id in a d-dimensional space Goals –Scales to hundreds of thousands of nodes.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
1 Network Layer: Host-to-Host Communication. 2 Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 CS 194: Distributed Systems Distributed Hash Tables Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer.
CS 268: Overlay Networks: Distributed Hash Tables Kevin Lai May 1, 2001.
Peer-to-Peer Networks Slides largely adopted from Ion Stoica’s lecture at UCB.
ICDE A Peer-to-peer Framework for Caching Range Queries Ozgur D. Sahin Abhishek Gupta Divyakant Agrawal Amr El Abbadi Department of Computer Science.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
1 A scalable Content- Addressable Network Sylvia Rathnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Shenker Pirammanayagam Manickavasagam.
09/07/2004Peer-to-Peer Systems in Mobile Ad-hoc Networks 1 Lookup Service for Peer-to-Peer Systems in Mobile Ad-hoc Networks M. Tech Project Presentation.
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Vincent Matossian September 21st 2001 ECE 579 An Overview of Decentralized Discovery mechanisms.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Content Addressable Network CAN. The CAN is essentially a distributed Internet-scale hash table that maps file names to their location in the network.
1 Slides from Richard Yang with minor modification Peer-to-Peer Systems: DHT and Swarming.
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
SIGCOMM 2001 Lecture slides by Dr. Yingwu Zhu Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
1 Distributed Hash Table CS780-3 Lecture Notes In courtesy of Heng Yin.
Peer to Peer Network Design Discovery and Routing algorithms
15-744: Computer Networking L-22: P2P. L -22; © Srinivasan Seshan, P2P Peer-to-peer networks Assigned reading [Cla00] Freenet: A Distributed.
ECE 544 Project3 Group 9 Brien Range Sidhika Varshney Sanhitha Rao Puskuru.
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
Topologically-Aware Overlay Construction and Sever Selection Sylvia Ratnasamy, Mark Handley, Richard Karp, Scott Shenker.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
1 Plaxton Routing. 2 History Greg Plaxton, Rajmohan Rajaraman, Andrea Richa. Accessing nearby copies of replicated objects, SPAA 1997 Used in several.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Peer-to-Peer Information Systems Week 12: Naming
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
CS 268: Lecture 22 (Peer-to-Peer Networks)
Early Measurements of a Cluster-based Architecture for P2P Systems
EE 122: Peer-to-Peer (P2P) Networks
CS 268: Peer-to-Peer Networks and Distributed Hash Tables
DHT Routing Geometries and Chord
A Scalable content-addressable network
CS 162: P2P Networks Computer Science Division
An Overview of Peer-to-Peer
Peer-to-Peer Networks and Distributed Hash Tables
Peer-to-Peer Information Systems Week 12: Naming
Presentation transcript:

Overlay Networks EECS 122: Lecture 18 Department of Electrical Engineering and Computer Sciences University of California Berkeley

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 2 A network defined over another set of networks The overlay addresses its own nodes Links on one layer are network segments of lower layers  Requires lower layer routing to be utilized Overlaying mechanism is called tunneling A’ What is an overlay network? A A

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 3 Overlay Concept: Going Up A B C Overlay Network Nodes

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 4 Overlay Concept: Going Up A B C Overlay Networks are extremely popular MBONE, Akamai, Virtual Private Networks, Napster, Gnutella Overlay Networks may even peer!

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 5 Overlay Concept: Going Down

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 6 IP Network is the Overlay… a b d c ATM links can be the “physical layer” for IP

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 7 IP Network is the overlay a b d c Virtual Circuit under Datagram!

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 8 Example: Napster A B C D E F m1 m2 m3 m4 m5 m6 m1 A m2 B m3 C m4 D m5 E m6 F E? m5 E? E

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 9 Underlying Network Routing On the overlay

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 10 Underlying Network Routing on the Overlay The underlying network induces a complete graph of connectivity  No routing required!

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 11 Routing on the Overlay The underlying network induces a complete graph of connectivity  No routing required! But  One virtual hop may be many underlying hops away.  Latency and cost vary significantly over the virtual links  State information may grow with E (n^2)

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 12 Underlying Network Routing Issues The underlying network induces a complete graph of connectivity  No routing required! But  One virtual hop may be many underlying hops away.  Latency and cost vary significantly over the virtual links  State information may grow with E (n^2)

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 13 Routing Issues The underlying network induces a complete graph of connectivity  No routing required! But  One virtual hop may be many underlying hops away.  Latency and cost vary significantly over the virtual links  State information may grow with E (n^2)

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 14 Relating the virtual topology to the underlying network Message from 4  1

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 15 Relating the virtual topology to the underlying network Message from 4  1 4  3  2  1 413413  1  5  2  5  1 Extreme Inefficiencies Possible

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 16 Routing Issues The underlying network induces a complete graph of connectivity  No routing required! But  One virtual hop may be many underlying hops away.  Latency and cost vary significantly over the virtual links  State information may grow with E (n^2) At any given time, the overlay network picks a connected sub- graph based on nearest neighbors  How often can vary  Also, structured (Chord) v/s unstructured (Gnutella)

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 17 Three kinds of Overlays 1. Only Hosts: Peer to Peer Networks (P2P)  Example: Gnutella, Napster 2. Only Gateway nodes: Infrastructure Overlays  Content Distribution Networks (CDNs)  Example: Akamai 3. Host and Gateway Nodes:  Virtual Private Networks Overlay node structure  Regular: Chord, Pastry  Adhoc: Gnutella Functions  Route Enhancement: Better QoS, Application Level Multicast  Resource Discovery: P2P Kinds of Overlay Networks

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 18 Outline Infrastructure Overlays  Adding performance and route functionality  Resource Discovery P2P Overlays  Resource Discovery in Gnutella Example of an Infrastructure Overlay  Application Level Multicast Example of a P2P Overlay  Content Addressable Networks Conclusions

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 19 Infrastructure Overlays Overlay network users are not directly connected to the overlay nodes E.g. Akamai

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 20 Overlay Routing: Edge Mapping Overlay network users are not directly connected to the overlay nodes E.g. Akamai User must be redirected to a “close by” overlay node Edge-Mapping, or redirection function is hard since  # potential users enormous  User clients not under direct control When overlay clients are directly connected the edge mapping function is obviated  E.g. P2P: users/nodes colocated IP(5) ?

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 21 Overlay Routing: Edge Mapping Overlay nodes interconnect clients Enhance nature of connection  Multicast  Secure  Low Loss Much easier to add functionality than to integrate into a router IP(5) ?

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 22 Overlay Routing: Adding Function to the route Overlay nodes interconnect clients Enhance nature of connection  Multicast  Secure  Low Loss Much easier to add functionality than to integrate into a router Overlay nodes can become bottlenecks

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 23 Overlay Routing: Resource Location ABCABC ADAD BFBF B DEDE B? Overlay network may contain resources. Eg.  Servers  Files Client makes request for resource Overlay must “search” for “closest” node that has the resource  E.g. find the least loaded server that has a piece of content and that is has low network latency to client

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 24 Overlay Routing: Resource Location ABCABC ADAD BFBF B DEDE B? ACAC D B FCFC DEDE Overlay network may contain resources. Eg.  Servers  Files Client makes request for resource Overlay must “search” for “closest” node that has the resource  E.g. find the least loaded server that has a piece of content and that is has low network latency to client A single “index” is not scalable Overlay launches a query to locate resource

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 25 Overlay Routing: Resource Location ABCABC ADAD BFBF B DEDE B? ACAC D B FCFC DEDE Overlay network may contain resources. Eg.  Servers  Files Client makes request for resource Overlay must “search” for “closest” node that has the resource  E.g. find the least loaded server that has a piece of content and that is has low network latency to client A single “index” is not scalable Overlay launches a query to locate resource Query is “Routed” through the overlay until object is located

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 26 Overlay Routing: Resource Location ABCABC ADAD BFBF B DEDE ACAC D B FCFC DEDE 4 4 B? 4 Overlay network may contain resources. Eg.  Servers  Files Client makes request for resource Overlay must “search” for “closest” node that has the resource  E.g. find the least loaded server that has a piece of content and that is has low network latency to client A single “index” is not scalable Overlay launches a query to locate resource Query is “Routed” through the overlay until object is located

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 27 Overlay Routing: Resource Location Overlay network may contain resources. Eg.  Servers  Files Client makes request for resource Overlay must “search” for “closest” node that has the resource  E.g. find the least loaded server that has a piece of content and that is has low network latency to client A single “index” is not scalable Overlay launches a query to locate resource Query is “Routed” through the overlay until object is located ABCABC ADAD BFBF B DEDE ACAC D B FCFC DEDE 4 4 B? 4

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 28 P2P Overlays Overlay network users are not directly connected to the overlay nodes E.g. Napster, Gnutella No edge mapping problem No gateways to maintain But Nodes have limited resources  storage,  connectivity  computational power

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 29 Gnutella Distribute file location Idea: multicast the request Hot to find a file:  Send request to all neighbors  Neighbors recursively multicast the request  Eventually a machine that has the file receives the request, and it sends back the answer Advantages:  Totally decentralized, highly robust Disadvantages:  Not scalable; the entire network can be swamped with request (to alleviate this problem, each request has a TTL)

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 30 Gnutella: Example Assume: m1’s neighbors are m2 and m3; m3’s neighbors are m4 and m5;… A B C D E F m1 m2 m3 m4 m5 m6 E? E

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 31 Summary Two kinds of overlays functions  Overlay provides access to distributed resources  Overlay facilitates communication among other client applications Two kinds of virtual topologies  Structured: mesh, ring etc.  Unstructured Two kinds of client connectivty  Direct: P2P  Not direct: Akamai Overlay Network Functions  Select Virtual Edges (fast or slow timescales)  Overlay Routing Protocol  Edge Mapping  Resource Location

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 32 Content Producer Media Clients Example: Application Level Multicast Media Distribution Network Content Producer

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 33 The Broadcast Internet Content Producer

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 34 Management Platform redirection management load balancing system availability network management monitoring & provisioning server management viewer management subscriptions, PPV, monitoring, Neilson ratings, targeted advertising content management injection & real-time control Redirection Media Delivery System Broadcast Overlay Architecture

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 35 Broadcast Management Application-level information for management and tracking Works across multiple networks Content Producer event programming with ad-hoc query audience statistics

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 36 Broadcast Manager Node Information Stream Switchover

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 37 Policy Management

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 38 Example: Content Addressable P2P Networks (CAN) CAN is one of several recent P2P architectures that  imposes a structure on the virtual topology  uses a distributed hash-table data structure abstraction Note: item can be anything: a data object, document, file, pointer to a file…  routes queries through the structured overlay  attempts to distribute (object, location) pairs uniformly throughout the network  supports object lookup, insertion and deletion of objects efficiently. Others: Chord, Pastry, Tapestry

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 39 Content Addressable Network (CAN) Associate to each node and item a unique id in an d-dimensional space Properties  Routing table size O(d)  Guarantee that a file is found in at most d*n 1/d steps, where n is the total number of nodes

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 40 CAN Example: Two Dimensional Space Space divided between nodes All nodes cover the entire space Each node covers either a square or a rectangular area of ratios 1:2 or 2:1 Example:  Assume space size (8 x 8)  Node n1:(1, 2) first node that joins  cover the entire space n1

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 41 CAN Example: Two Dimensional Space Node n2:(4, 2) joins  space is divided between n1 and n n1 n2

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 42 CAN Example: Two Dimensional Space Node n2:(4, 2) joins  space is divided between n1 and n n1 n2 n3

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 43 CAN Example: Two Dimensional Space Nodes n4:(5, 5) and n5:(6,6) join n1 n2 n3 n4 n5

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 44 CAN Example: Two Dimensional Space Nodes: n1:(1, 2); n2:(4,2); n3:(3, 5); n4:(5,5);n5:(6,6) Items: f1:(2,3); f2:(5,1); f3:(2,1); f4:(7,5); n1 n2 n3 n4 n5 f1 f2 f3 f4

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 45 CAN Example: Two Dimensional Space Each item is stored by the node who owns its mapping in the space n1 n2 n3 n4 n5 f1 f2 f3 f4

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 46 CAN: Query Example Each node knows its neighbors in the d-space Forward query to the neighbor that is closest to the query id Example: assume n1 queries f n1 n2 n3 n4 n5 f1 f2 f3 f4

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 47 Adding/Deleting nodes New node picks a point P at random Assuming it can find any overlay node, it sends a join message to the node which owns that point When the message has reached P, the node divides itself in half along one of the dimensions (first x then y etc) Pairs are transferred and neighbor sets updated Similar reasoning handles departures and failures

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 48 Relating Virtual Topology to the Underlying Network Neighbors should be close to each other in terms of latency on the underlying network Pick a set of well known landmark hosts Each node distributively computes its “bin”  Nodes in the same bin are “close” to each other  Orders the landmark set in increasing order of RTT from it.  Latency is partitioned into levels  Thus, associated with each landmark, at each node is a rank and a level.  These values identify the bin Example: Three landmarks  0-30ms: level 0  ms: level 1  ms: level 2 Node j measures latencies of 10ms, 110ms, 40ms to the three landmarks. The bin of node j is  (l 1,l 3,l 2 : 021)

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 49 Your standard Networking Functions… Addressing: Uniquely identify the nodes  host IP address, group address, attributes  set is dynamic! Topology Update: Characterize and maintain connectivity  Discover topology  Measure “distance” metric(s)  Dynamically provision (on slower timescale) Destination Discovery: Find node identifiers of the destination set Route Computation: Pick the tree (path)  Kind of path: Multicast, Unicast  Global or Distributed Algorithm  Policy  Hierarchy Switching: Forward the packets at each node

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 50 And Their Overlay Analogs Addressing: Uniquely identify the nodes  host IP address, group address, attributes  set is dynamic! Topology Update: Characterize and maintain connectivity  Discover topology  Measure “distance” metric(s)  Dynamically provision (on slower timescale) Destination Discovery: Find node identifiers of the destination set Route Computation: Pick the tree (path)  Kind of path: Multicast, Unicast  Global or Distributed Algorithm  Policy  Hierarchy Switching: Forward the packets at each node Structured Topology Add/Insert Nodes, Binning Resource LocationEdge Mapping Application Level Routing. E..g streaming broadcast Structured Topology

April 3, 2003 A. Parekh, EE122 S2003. Revised and enhanced F'02 Lectures 51 Conclusions Overlays are an irreversible trend in network Overlays add new functions to the network infrastructure much faster than  by trying to integrate them in the router  relying on a infrastructure service provider on deploy the function Disadvantages  Overlay nodes can create performance bottlenecks  New end-to-end protocols may not work since the overlay nodes don’t understand them Generally better to improve performance by building an “underlay” and add functionality by building an overlay